We used the devkit backplane to burn Jetpack4.6.6 for the Jetson nano module.
Here is the full flash log.
cx@ubuntu:~/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra$ sudo ./flash.sh jetson-nano-emmc mmcblk0p1
###############################################################################
# L4T BSP Information:
# R32 , REVISION: 7.6
###############################################################################
# Target Board Information:
# Name: jetson-nano-emmc, Board Family: t210ref, SoC: Tegra 210,
# OpMode: production, Boot Authentication: ,
# Disk encryption: disabled ,
###############################################################################
./tegraflash.py --chip 0x21 --applet "/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/nvtboot_recovery.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin"
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0016 ] Generating RCM messages
[ 0.0032 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm /home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/nvtboot_recovery.bin 0 0
[ 0.0040 ] RCM 0 is saved as rcm_0.rcm
[ 0.0289 ] RCM 1 is saved as rcm_1.rcm
[ 0.0289 ] List of rcm files are saved in rcm_list.xml
[ 0.0289 ]
[ 0.0290 ] Signing RCM messages
[ 0.0627 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0637 ] Assuming zero filled SBK key
[ 0.0721 ]
[ 0.0722 ] Copying signature to RCM mesages
[ 0.0752 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[ 0.0766 ]
[ 0.0767 ] Boot Rom communication
[ 0.0792 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml --skipuid
[ 0.0807 ] RCM version 0X210001
[ 0.1824 ] Boot Rom communication completed
[ 1.1923 ]
[ 1.1924 ] dump EEPROM info
[ 1.1955 ] tegrarcm --oem platformdetails eeprom /home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/cvm.bin
[ 1.1968 ] Applet version 00.01.0000
[ 1.2692 ] Saved platform info in /home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/cvm.bin
[ 1.3476 ]
[ 1.3506 ] tegrarcm --reboot recovery
[ 1.3514 ] Applet version 00.01.0000
[ 1.4302 ]
Board ID(3448) version(402)
copying bctfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/BCT/P3448_A00_lpddr4_204Mhz_P987.cfg)... done.
copying bootloader(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
copying initrd(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/l4t_initrd.img)... done.
Making Boot image... done.
Existing sosfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/nvtboot_recovery.bin) reused.
copying tegraboot(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/nvtboot.bin)... done.
copying cpu_bootloader(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
copying bpffile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/sc7entry-firmware.bin)... done.
copying wb0boot(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/warmboot.bin)... done.
Existing tosfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/tos-mon-only.img) reused.
Existing eksfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/eks.img) reused.
./flash.sh: line 2663: [: : integer expression expected
copying dtbfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb)... done.
Copying nv_boot_control.conf to rootfs
populating kernel to rootfs... done.
populating initrd to rootfs... done.
populating kernel_tegra210-p3448-0002-p3449-0000-b00.dtb to rootfs... done.
Making system.img...
populating rootfs from /home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/rootfs ... populating /boot/extlinux/extlinux.conf ... done.
Sync'ing system.img ... done.
Converting RAW image to Sparse image... done.
system.img built successfully.
Existing tbcfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/nvtboot_cpu.bin) reused.
copying tbcdtbfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/kernel/dtb/tegra210-p3448-0002-p3449-0000-b00.dtb)... done.
copying cfgfile(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/cfg/flash_l4t_t210_emmc_p3448.xml) to flash.xml... done.
copying flasher(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/t210ref/cboot.bin)... done.
Existing flashapp(/home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/tegraflash.py) reused.
./tegraflash.py --bl cboot.bin --bct P3448_A00_lpddr4_204Mhz_P987.cfg --odmdata 0xa4000 --bldtb kernel_tegra210-p3448-0002-p3449-0000-b00.dtb --applet nvtboot_recovery.bin --cmd "flash; reboot" --cfg flash.xml --chip 0x21 --bins "EBT cboot.bin; DTB tegra210-p3448-0002-p3449-0000-b00.dtb"
saving flash command in /home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/flashcmd.txt
saving Windows flash command to /home/cx/nvidia/nvidia_sdk/JetPack_4.6.6_Linux_JETSON_NANO_TARGETS/Linux_for_Tegra/bootloader/flash_win.bat
assign_value: crc-flash.xml.bin 1 131056 1
printf '\x1' | dd of=crc-flash.xml.bin bs=1 seek=131056 count=1 conv=notrunc
1+0 records in
1+0 records out
1 byte copied, 4.2722e-05 s, 23.4 kB/s
assign_value: crc-flash.xml.bin 0 131057 1
printf '\x0' | dd of=crc-flash.xml.bin bs=1 seek=131057 count=1 conv=notrunc
1+0 records in
1+0 records out
1 byte copied, 5.8387e-05 s, 17.1 kB/s
assign_string: crc-flash.xml.bin PTHD 131064 4
echo PTHD | dd of=crc-flash.xml.bin bs=1 seek=131064 count=4 conv=notrunc
4+0 records in
4+0 records out
4 bytes copied, 3.2449e-05 s, 123 kB/s
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
[ 0.0154 ] tegrasign --getmode mode.txt --key None
[ 0.0163 ] Assuming zero filled SBK key
[ 0.0252 ]
[ 0.0254 ] Generating RCM messages
[ 0.0440 ] tegrarcm --listrcm rcm_list.xml --chip 0x21 0 --download rcm nvtboot_recovery.bin 0 0
[ 0.0449 ] RCM 0 is saved as rcm_0.rcm
[ 0.2824 ] RCM 1 is saved as rcm_1.rcm
[ 0.2828 ] List of rcm files are saved in rcm_list.xml
[ 0.2829 ]
[ 0.2829 ] Signing RCM messages
[ 0.2860 ] tegrasign --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.2879 ] Assuming zero filled SBK key
[ 0.2913 ]
[ 0.2914 ] Copying signature to RCM mesages
[ 0.2945 ] tegrarcm --chip 0x21 0 --updatesig rcm_list_signed.xml
[ 0.3971 ]
[ 0.3971 ] Parsing partition layout
[ 0.4002 ] tegraparser --pt flash.xml.tmp
[ 0.4017 ]
[ 0.4019 ] Using default ramcode: 0
[ 0.4019 ] Disable BPMP dtb trim, using default dtb
[ 0.4020 ]
[ 0.4020 ] Creating list of images to be signed
[ 0.4041 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --list images_list.xml
[ 2.9170 ]
[ 2.9170 ] Generating signatures
[ 2.9203 ] tegrasign --key None --list images_list.xml --pubkeyhash pub_key.key
[ 2.9209 ] Assuming zero filled SBK key
[ 5.1261 ]
[ 5.1262 ] Generating br-bct
[ 5.3904 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.cfg --chip 0x21 0
[ 5.5612 ]
[ 5.5613 ] Updating boot device parameters
[ 5.5673 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatedevparam flash.xml.bin
[ 5.5695 ] Warning: No sdram params
[ 5.5703 ]
[ 5.5703 ] Updating bl info
[ 5.5725 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 6.0112 ]
[ 6.0113 ] Updating secondary storage information into bct
[ 6.0142 ] tegraparser --pt flash.xml.bin --chip 0x21 0 --updatecustinfo P3448_A00_lpddr4_204Mhz_P987.bct
[ 6.0150 ]
[ 6.0150 ] Updating Odmdata
[ 6.0171 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatefields Odmdata =0xa4000
[ 6.0177 ] Warning: No sdram params
[ 6.0189 ]
[ 6.0189 ] Get Signed section of bct
[ 6.0222 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --listbct bct_list.xml
[ 6.0233 ]
[ 6.0234 ] Signing BCT
[ 6.0286 ] tegrasign --key None --list bct_list.xml --pubkeyhash pub_key.key
[ 6.0296 ] Assuming zero filled SBK key
[ 6.0302 ]
[ 6.0302 ] Updating BCT with signature
[ 6.0329 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatesig bct_list_signed.xml
[ 6.0341 ]
[ 6.0342 ] Copying signatures
[ 6.0369 ] tegrahost --chip 0x21 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[ 6.0483 ]
[ 6.0483 ] Updating BFS information on BCT
[ 6.0523 ] tegrabct --bct P3448_A00_lpddr4_204Mhz_P987.bct --chip 0x21 0 --updatebfsinfo flash.xml.bin
[ 6.0545 ] BFS:
[ 6.0557 ] 0: [PT ] crc-flash.xml.bin (size=131072/131072)
[ 6.0563 ] 1: [TBC] nvtboot_cpu.bin.encrypt (size=80816/196608)
[ 6.0569 ] 2: [RP1] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=238224/1048576)
[ 6.0579 ] 3: [EBT] cboot.bin.encrypt (size=485952/655360)
[ 6.0584 ] 4: [WB0] warmboot.bin.encrypt (size=3952/131072)
[ 6.0590 ] 5: [BPF] sc7entry-firmware.bin.encrypt (size=3376/262144)
[ 6.0597 ] BFS0: 131072 @ 2560 SUM 703ec141 over 2883584 bytes
[ 6.0603 ] BFS:
[ 6.0604 ] 0: [PT-1] crc-flash.xml.bin (size=131072/131072)
[ 6.0613 ] 1: [TBC-1] nvtboot_cpu.bin.encrypt (size=80816/196608)
[ 6.0621 ] 2: [RP1-1] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=238224/1048576)
[ 6.0631 ] 3: [EBT-1] cboot.bin.encrypt (size=485952/655360)
[ 6.0636 ] 4: [WB0-1] warmboot.bin.encrypt (size=3952/131072)
[ 6.0641 ] 5: [BPF-1] sc7entry-firmware.bin.encrypt (size=3376/262144)
[ 6.0647 ] 8: [VER_b] emmc_bootblob_ver.txt (size=102/32768)
[ 6.1232 ] 9: [VER] emmc_bootblob_ver.txt (size=102/32768)
[ 6.1236 ] BFS1: 131072 @ 8704 SUM 703ec141 over 2981888 bytes
[ 6.1239 ] KFS:
[ 6.1512 ] 0: [DTB] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=238224/1048576)
[ 6.1521 ] 1: [TOS] tos-mon-only.img.encrypt (size=54208/6291456)
[ 6.1524 ] 2: [EKS] eks.img (size=1028/81920)
[ 6.1526 ] 3: [LNX] boot.img.encrypt (size=667648/67092480)
[ 6.1529 ] KFS0: 1048576 @ 29376546 SUM 0d87734f over 8089600 bytes
[ 6.1567 ] KFS:
[ 6.1791 ] 0: [DTB-1] kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt (size=238224/1048576)
[ 6.1796 ] 1: [TOS-1] tos-mon-only.img.encrypt (size=54208/6291456)
[ 6.1798 ] 2: [EKS-1] eks.img (size=1028/81920)
[ 6.1799 ] 3: [LNX-1] boot.img.encrypt (size=667648/67092480)
[ 6.1801 ] KFS1: 1048576 @ 29522082 SUM 0d87734f over 8089600 bytes
[ 6.1835 ]
[ 6.1835 ] Boot Rom communication
[ 6.1867 ] tegrarcm --chip 0x21 0 --rcm rcm_list_signed.xml
[ 6.1877 ] BR_CID: 0x32101001644147c50c0000000b078380
[ 6.2231 ] RCM version 0X210001
[ 6.2634 ] Boot Rom communication completed
[ 7.2758 ]
[ 7.2759 ] Sending BCTs
[ 7.2804 ] tegrarcm --download bct P3448_A00_lpddr4_204Mhz_P987.bct
[ 7.2838 ] Applet version 00.01.0000
[ 7.3585 ] Sending bct
[ 7.3586 ] [................................................] 100%
[ 7.5859 ]
[ 7.5882 ] tegrahost --chip 0x21 --align cboot.bin
[ 7.5889 ]
[ 7.5907 ] tegrahost --magicid EBT --appendsigheader cboot.bin cboot.bin_blheader
[ 7.5929 ]
[ 7.5958 ] tegrasign --key None --list cboot.bin_list.xml
[ 7.5965 ] Assuming zero filled SBK key
[ 7.6077 ]
[ 7.6102 ] tegrahost --updatesigheader cboot.bin_blheader.encrypt cboot.bin_blheader.hash zerosbk
[ 7.6116 ]
[ 7.6151 ] tegrahost --chip 0x21 --align tegra210-p3448-0002-p3449-0000-b00.dtb
[ 7.6166 ]
[ 7.6197 ] tegrahost --magicid DTB --appendsigheader tegra210-p3448-0002-p3449-0000-b00.dtb tegra210-p3448-0002-p3449-0000-b00.dtb_blheader
[ 7.6223 ]
[ 7.6250 ] tegrasign --key None --list tegra210-p3448-0002-p3449-0000-b00.dtb_list.xml
[ 7.6257 ] Assuming zero filled SBK key
[ 7.6315 ]
[ 7.6340 ] tegrahost --updatesigheader tegra210-p3448-0002-p3449-0000-b00.dtb_blheader.encrypt tegra210-p3448-0002-p3449-0000-b00.dtb_blheader.hash zerosbk
[ 7.6354 ]
[ 7.6356 ] Sending bootloader and pre-requisite binaries
[ 7.6381 ] tegrarcm --download ebt cboot.bin.encrypt 0 0 --download rp1 tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt 0
[ 7.6389 ] Applet version 00.01.0000
[ 7.7166 ] Sending ebt
[ 7.7167 ] [................................................] 100%
[ 7.8365 ] Sending rp1
[ 7.8470 ] [................................................] 100%
[ 7.9135 ]
[ 7.9159 ] tegrarcm --boot recovery
[ 7.9166 ] Applet version 00.01.0000
[ 8.0015 ]
[ 8.0015 ] Retrieving storage infomation
[ 8.0044 ] tegrarcm --oem platformdetails storage storage_info.bin
[ 8.0056 ] Applet is not running on device. Continue with Bootloader
[ 8.6048 ]
[ 8.6390 ] tegradevflash --oem platformdetails storage storage_info.bin
[ 8.6400 ] Cboot version 00.01.0000
[ 8.6768 ] Saved platform info in storage_info.bin
[ 8.6835 ]
[ 8.6836 ] Flashing the device
[ 8.6858 ] tegradevflash --pt flash.xml.bin --storageinfo storage_info.bin --create
[ 8.6865 ] Cboot version 00.01.0000
[ 8.7185 ] Writing partition GPT with gpt.bin
[ 8.7187 ] [................................................] 100%
[ 8.7269 ] Writing partition PT with crc-flash.xml.bin
[ 9.4650 ] [................................................] 100%
[ 9.4790 ] Writing partition PT-1 with crc-flash.xml.bin
[ 9.4926 ] [................................................] 100%
[ 9.5183 ] Writing partition NVC with nvtboot.bin.encrypt
[ 9.5608 ] [................................................] 100%
[ 9.5824 ] Writing partition TBC with nvtboot_cpu.bin.encrypt
[ 9.6166 ] [................................................] 100%
[ 9.6406 ] Writing partition RP1 with kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[ 9.6900 ] [................................................] 100%
[ 9.7225 ] Writing partition EBT with cboot.bin.encrypt
[ 9.7741 ] [................................................] 100%
[ 9.8116 ] Writing partition WB0 with warmboot.bin.encrypt
[ 9.8686 ] [................................................] 100%
[ 9.8867 ] Writing partition BPF with sc7entry-firmware.bin.encrypt
[ 9.9347 ] [................................................] 100%
[ 9.9529 ] Writing partition NVC-1 with nvtboot.bin.encrypt
[ 10.0024 ] [................................................] 100%
[ 10.0324 ] Writing partition TBC-1 with nvtboot_cpu.bin.encrypt
[ 10.0966 ] [................................................] 100%
[ 10.1220 ] Writing partition RP1-1 with kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[ 10.1833 ] [................................................] 100%
[ 10.2206 ] Writing partition EBT-1 with cboot.bin.encrypt
[ 10.2855 ] [................................................] 100%
[ 10.3359 ] Writing partition WB0-1 with warmboot.bin.encrypt
[ 10.4094 ] [................................................] 100%
[ 10.4323 ] Writing partition BPF-1 with sc7entry-firmware.bin.encrypt
[ 10.4938 ] [................................................] 100%
[ 10.5191 ] Writing partition VER_b with emmc_bootblob_ver.txt
[ 10.5810 ] [................................................] 100%
[ 10.6006 ] Writing partition VER with emmc_bootblob_ver.txt
[ 10.6550 ] [................................................] 100%
[ 10.6749 ] Writing partition APP with system.img
[ 10.7260 ] [................................................] 100%
[ 293.2138 ] Writing partition DTB with kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[ 294.1456 ] [................................................] 100%
[ 294.1730 ] Writing partition TOS with tos-mon-only.img.encrypt
[ 294.2145 ] [................................................] 100%
[ 294.2313 ] Warning: EKS partition magic header mismatch!
[ 294.2686 ] Writing partition EKS with eks.img
[ 294.2687 ] [................................................] 100%
[ 294.2819 ] Writing partition LNX with boot.img.encrypt
[ 294.3178 ] [................................................] 100%
[ 294.3592 ] Writing partition DTB-1 with kernel_tegra210-p3448-0002-p3449-0000-b00.dtb.encrypt
[ 294.4098 ] [................................................] 100%
[ 294.4367 ] Writing partition TOS-1 with tos-mon-only.img.encrypt
[ 294.4803 ] [................................................] 100%
[ 294.4967 ] Writing partition EKS-1 with eks.img
[ 294.5334 ] [................................................] 100%
[ 294.5458 ] Writing partition LNX-1 with boot.img.encrypt
[ 294.5829 ] [................................................] 100%
[ 294.6364 ] Writing partition BMP with bmp.blob
[ 294.6817 ] [................................................] 100%
[ 294.7242 ] Writing partition RP4 with rp4.blob
[ 294.7642 ] [................................................] 100%
[ 294.8337 ]
[ 294.8358 ] tegradevflash --write BCT P3448_A00_lpddr4_204Mhz_P987.bct
[ 294.8366 ] Cboot version 00.01.0000
[ 294.8675 ] Writing partition BCT with P3448_A00_lpddr4_204Mhz_P987.bct
[ 294.8678 ] [................................................] 100%
[ 295.2693 ]
[ 295.2693 ] Flashing completed
[ 295.2694 ] Coldbooting the device
[ 295.2721 ] tegradevflash --reboot coldboot
[ 295.2735 ] Cboot version 00.01.0000
[ 295.3104 ]
*** The target t210ref has been flashed successfully. ***
Reset the board to boot from internal eMMC.
Attached is the log information obtained through the serial console after the flash has finished.
[com COM53] (2025-01-15_162649) COM53 (USB Serial Port (COM53)).log (29.7 KB)
How to solve this problem? The same problem has occurred to 21pcs in our batch.