Error Flashing Multiple Tegra Device

Hello,

i got an error during flashing two Jeston TX2 at the same time.
I used the ./multi_tegra_flash.sh script and followed the “Flashing Multiple Tegra Devices” guide.
One module was flashed successfully but on the other module I got an error after 4%. See the logs below.
This module seems to be broken now. It doesn’t boot anymore and also the recovery mode isn’t working anymore.

Is there any change to recover my module?
Do you have an idea what went wrong and how i could avoid that in future?

Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0027 ] tegrasign_v2 --key None --getmode mode.txt
[   0.0047 ] Assuming zero filled SBK key
[   0.0131 ] 
[   0.0131 ] Generating RCM messages
[   0.0204 ] tegrarcm_v2 --instance 1-6.4 --listrcm rcm_list.xml --chip 0x18 --download rcm mb1_recovery_prod.bin 0 0
[   0.0215 ] RCM 0 is saved as rcm_0.rcm
[   0.0220 ] RCM 1 is saved as rcm_1.rcm
[   0.0220 ] List of rcm files are saved in rcm_list.xml
[   0.0220 ] 
[   0.0220 ] Signing RCM messages
[   0.0229 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0245 ] Assuming zero filled SBK key
[   0.0401 ] 
[   0.0401 ] Copying signature to RCM mesages
[   0.0413 ] tegrarcm_v2 --instance 1-6.4 --chip 0x18 --updatesig rcm_list_signed.xml
[   0.0521 ] 
[   0.0522 ] Parsing partition layout
[   0.0767 ] tegraparser_v2 --pt flash.xml.tmp
[   0.0873 ] 
[   0.0873 ] Creating list of images to be signed
[   0.0945 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[   0.3080 ] 
[   0.3081 ] Generating signatures
[   0.3100 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[   0.3109 ] Assuming zero filled SBK key
[   0.7515 ] 
[   0.7516 ] Generating br-bct
[   0.7727 ] Updating dev and MSS params in BR BCT
[   0.7727 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --brbct br_bct.cfg --chip 0x18
[   0.8321 ] 
[   0.8322 ] Updating bl info
[   0.8334 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   0.8363 ] 
[   0.8363 ] Updating smd info
[   0.8374 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[   0.8405 ] 
[   0.8405 ] Updating Odmdata
[   0.8414 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatefields Odmdata =0x07090000
[   0.8446 ] 
[   0.8446 ] Get Signed section bct
[   0.8455 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --listbct bct_list.xml
[   0.8486 ] 
[   0.8486 ] Signing BCT
[   0.8510 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key
[   0.8523 ] Assuming zero filled SBK key
[   0.8526 ] 
[   0.8526 ] Updating BCT with signature
[   0.8540 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesig bct_list_signed.xml
[   0.8641 ] 
[   0.8642 ] Generating coldboot mb1-bct
[   0.8652 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct.cfg --sdram P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   0.8665 ] MB1-BCT version: 0xe
[   0.8669 ] Copying Sdram info from 2 to 3 set
[   0.8971 ] Packing sdram param for instance[0]
[   0.8976 ] Packing sdram param for instance[1]
[   0.8980 ] Packing sdram param for instance[2]
[   0.8985 ] Packing sdram param for instance[3]

[   0.8991 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[   0.8999 ] Appending platform config data of size :- 2840

[   0.9009 ] Parsing config file :mobile_scr.cfg 
[   0.9013 ] Appending platform config data of size :- 12240

[   0.9043 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[   0.9051 ] Appending platform config data of size :- 24

[   0.9057 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg 
[   0.9064 ] Appending platform config data of size :- 708

[   0.9072 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[   0.9080 ] Appending platform config data of size :- 64
[   0.9085 ] 
[   0.9085 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[   0.9085 ] Appending platform config data of size :- 1652
[   0.9085 ] 
[   0.9086 ] Updating mb1-bct with firmware information
[   0.9097 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.9130 ] MB1-BCT version: 0xe
[   0.9152 ] 
[   0.9152 ] Updating mb1-bct with storage information
[   0.9164 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   0.9174 ] MB1-BCT version: 0xe
[   0.9253 ] 
[   0.9263 ] tegrahost_v2 --align mb1_cold_boot_bct_MB1.bct
[   0.9277 ] 
[   0.9287 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[   0.9401 ] 
[   0.9414 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[   0.9433 ] Assuming zero filled SBK key
[   0.9521 ] 
[   0.9536 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   0.9641 ] 
[   0.9642 ] Generating recovery mb1-bct
[   0.9652 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct.cfg --sdram P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   0.9670 ] MB1-BCT version: 0xe
[   0.9674 ] Copying Sdram info from 2 to 3 set
[   0.9946 ] Packing sdram param for instance[0]
[   0.9950 ] Packing sdram param for instance[1]
[   0.9955 ] Packing sdram param for instance[2]
[   0.9959 ] Packing sdram param for instance[3]

[   0.9966 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[   0.9974 ] Appending platform config data of size :- 2840

[   0.9984 ] Parsing config file :minimal_scr.cfg 
[   0.9988 ] Appending platform config data of size :- 12240

[   1.0057 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[   1.0065 ] Appending platform config data of size :- 24

[   1.0071 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg 
[   1.0079 ] Appending platform config data of size :- 708

[   1.0087 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[   1.0095 ] Appending platform config data of size :- 64

[   1.0107 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[   1.0116 ] Appending platform config data of size :- 1652
[   1.0123 ] 
[   1.0123 ] Updating mb1-bct with firmware information
[   1.0136 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[   1.0149 ] MB1-BCT version: 0xe
[   1.0178 ] 
[   1.0179 ] Updating mb1-bct with storage information
[   1.0188 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[   1.0201 ] MB1-BCT version: 0xe
[   1.0281 ] 
[   1.0292 ] tegrahost_v2 --align mb1_bct_MB1.bct
[   1.0304 ] 
[   1.0318 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk
[   1.0424 ] 
[   1.0435 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml
[   1.0462 ] Assuming zero filled SBK key
[   1.0561 ] 
[   1.0576 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   1.0590 ] 
[   1.0590 ] Copying signatures
[   1.0601 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   1.1933 ] 
[   1.1933 ] Boot Rom communication
[   1.1948 ] tegrarcm_v2 --instance 1-6.4 --chip 0x18 --rcm rcm_list_signed.xml
[   1.1960 ] BR_CID: 0x81801001643215c00400000009ff0380
[   1.2011 ] RCM version 0X180001
[   1.2069 ] Boot Rom communication completed
[   2.3255 ] 
[   2.3272 ] tegrarcm_v2 --instance 1-6.4 --isapplet
[   2.3284 ] Applet version 01.00.0000
[   2.3438 ] 
[   2.3439 ] Retrieving board information
[   2.3452 ] tegrarcm_v2 --instance 1-6.4 --oem platformdetails chip chip_info.bin
[   2.3465 ] Applet version 01.00.0000
[   2.3619 ] Saved platform info in chip_info.bin
[   2.3647 ] Chip minor revision: 2
[   2.3662 ] 
[   2.3662 ] Sending BCTs
[   2.3675 ] tegrarcm_v2 --instance 1-6.4 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[   2.3688 ] Applet version 01.00.0000
[   2.3842 ] Sending bct_bootrom
[   2.3844 ] [................................................] 100%
[   2.3989 ] Sending bct_mb1
[   2.4057 ] [................................................] 100%
[   2.8158 ] 
[   2.8159 ] Generating blob
[   2.8173 ] tegrahost_v2 --align blob_nvtboot_recovery_cpu.bin
[   2.8269 ] 
[   2.8287 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[   2.8303 ] 
[   2.8318 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml
[   2.8338 ] Assuming zero filled SBK key
[   2.8521 ] 
[   2.8536 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[   2.8681 ] 
[   2.8695 ] tegrahost_v2 --align blob_nvtboot_recovery.bin
[   2.8707 ] 
[   2.8719 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[   2.8733 ] 
[   2.8746 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml
[   2.8754 ] Assuming zero filled SBK key
[   2.8881 ] 
[   2.8922 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[   2.9002 ] 
[   2.9013 ] tegrahost_v2 --align blob_preboot_d15_prod_cr.bin
[   2.9105 ] 
[   2.9162 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[   2.9442 ] 
[   2.9483 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml
[   2.9558 ] Assuming zero filled SBK key
[   2.9653 ] 
[   2.9673 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[   2.9762 ] 
[   2.9889 ] tegrahost_v2 --align blob_mce_mts_d15_prod_cr.bin
[   3.0001 ] 
[   3.0139 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[   3.0410 ] 
[   3.0529 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml
[   3.0549 ] Assuming zero filled SBK key
[   3.2487 ] 
[   3.2573 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[   3.3002 ] 
[   3.3083 ] tegrahost_v2 --align blob_bpmp.bin
[   3.3203 ] 
[   3.3219 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk
[   3.3389 ] 
[   3.3410 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml
[   3.3424 ] Assuming zero filled SBK key
[   3.3755 ] 
[   3.3778 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[   3.3882 ] 
[   3.3906 ] tegrahost_v2 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[   3.4003 ] 
[   3.4019 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[   3.4123 ] 
[   3.4143 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml
[   3.4156 ] Assuming zero filled SBK key
[   3.4442 ] 
[   3.4463 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[   3.4563 ] 
[   3.4587 ] tegrahost_v2 --align blob_tos.img
[   3.4683 ] 
[   3.4715 ] tegrahost_v2 --appendsigheader blob_tos.img zerosbk
[   3.4802 ] 
[   3.4822 ] tegrasign_v2 --key None --list blob_tos_sigheader.img_list.xml
[   3.4835 ] Assuming zero filled SBK key
[   3.4934 ] 
[   3.4955 ] tegrahost_v2 --updatesigheader blob_tos_sigheader.img.encrypt blob_tos_sigheader.img.hash zerosbk
[   3.5041 ] 
[   3.5058 ] tegrahost_v2 --align blob_eks.img
[   3.5067 ] 
[   3.5076 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk
[   3.5086 ] 
[   3.5098 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml
[   3.5106 ] Assuming zero filled SBK key
[   3.5109 ] 
[   3.5122 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[   3.5132 ] 
[   3.5145 ] tegrahost_v2 --align blob_tegra186-quill-p3310-1000-c03-00-base.dtb
[   3.5198 ] 
[   3.5208 ] tegrahost_v2 --appendsigheader blob_tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[   3.5224 ] 
[   3.5236 ] tegrasign_v2 --key None --list blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml
[   3.5244 ] Assuming zero filled SBK key
[   3.5340 ] 
[   3.5364 ] tegrahost_v2 --updatesigheader blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[   3.5482 ] 
[   3.5503 ] tegrahost_v2 --generateblob blob.xml blob.bin
[   3.5522 ] number of images in blob are 9
[   3.5528 ] blobsize is 3687944
[   3.5530 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 190048
[   3.5563 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 79600
[   3.5572 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63024
[   3.5581 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2076832
[   3.5592 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 529440
[   3.5603 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt of size 466160
[   3.5616 ] Added binary blob_tos_sigheader.img.encrypt of size 62976
[   3.5623 ] Added binary blob_eks_sigheader.img.encrypt of size 1488
[   3.5630 ] Added binary blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt of size 218224
[   3.5654 ] 
[   3.5655 ] Sending bootloader and pre-requisite binaries
[   3.5667 ] tegrarcm_v2 --instance 1-6.4 --download blob blob.bin
[   3.5676 ] Applet version 01.00.0000
[   3.5798 ] Sending blob
[   3.5799 ] [..............                                  ] 028%
[   3.5799 ] [............................                    ] 056%
[   3.5799 ] [..........................................      ] 085%
[   3.5799 ] [................................................] 100%
[   7.4407 ] 
[   7.4424 ] tegrarcm_v2 --instance 1-6.4 --boot recovery
[   7.4436 ] Applet version 01.00.0000
[   7.4608 ] 
[   7.4619 ] tegrarcm_v2 --instance 1-6.4 --isapplet
[   8.1606 ] 
[   8.1623 ] tegradevflash_v2 --instance 1-6.4 --iscpubl
[   8.1636 ] CPU Bootloader is not running on device.
[   8.1696 ] 
[  10.2567 ] Retrieving storage infomation
[  10.2592 ] tegrarcm_v2 --instance 1-6.4 --oem platformdetails storage storage_info.bin
[  10.2609 ] Applet is not running on device. Continue with Bootloader
[  10.2762 ] 
[  10.2773 ] tegradevflash_v2 --instance 1-6.4 --oem platformdetails storage storage_info.bin
[  10.2781 ] Bootloader version 01.00.0000
[  10.2869 ] Saved platform info in storage_info.bin
[  10.2942 ] 
[  10.2943 ] Flashing the device
[  10.2954 ] tegraparser_v2 --storageinfo storage_info.bin --generategpt --pt flash.xml.bin
[  10.2968 ] 
[  10.2977 ] tegradevflash_v2 --instance 1-6.4 --pt flash.xml.bin --create
[  10.2985 ] Bootloader version 01.00.0000
[  10.3106 ] Erasing sdmmc_boot: 3 ......... [Done]
[  10.3556 ] Writing partition secondary_gpt with gpt_secondary_0_3.bin
[  10.3567 ] [................................................] 100%

[  10.4364 ] Erasing sdmmc_user: 3 ......... [Done]
[  15.9789 ] Writing partition master_boot_record with mbr_1_3.bin
[  15.9799 ] [................................................] 100%
[  15.9896 ] Writing partition primary_gpt with gpt_primary_1_3.bin
[  16.0011 ] [................................................] 100%
[  16.0312 ] Writing partition secondary_gpt with gpt_secondary_1_3.bin
[  16.0481 ] [................................................] 100%

[  16.0946 ] Writing partition mb1 with mb1_prod.bin.encrypt
[  16.0955 ] [................................................] 100%
[  16.2125 ] Writing partition mb1_b with mb1_prod.bin.encrypt
[  16.2376 ] [................................................] 100%
[  16.3539 ] Writing partition spe-fw with spe_sigheader.bin.encrypt
[  16.3809 ] [................................................] 100%
[  16.4846 ] Writing partition spe-fw_b with spe_sigheader.bin.encrypt
[  16.5017 ] [................................................] 100%
[  16.6047 ] Writing partition mb2 with nvtboot_sigheader.bin.encrypt
[  16.6138 ] [................................................] 100%
[  16.7386 ] Writing partition mb2_b with nvtboot_sigheader.bin.encrypt
[  16.7819 ] [................................................] 100%
[  16.9062 ] Writing partition mts-preboot with preboot_d15_prod_cr_sigheader.bin.encrypt
[  16.9560 ] [................................................] 100%
[  17.0381 ] Writing partition mts-preboot_b with preboot_d15_prod_cr_sigheader.bin.encrypt
[  17.0859 ] [................................................] 100%
[  17.1678 ] Writing partition SMD with slot_metadata.bin
[  17.2247 ] [................................................] 100%
[  17.2343 ] Writing partition SMD_b with slot_metadata.bin
[  17.2449 ] [................................................] 100%
[  17.2548 ] Writing partition master_boot_record with mbr_1_3.bin
[  17.3081 ] [................................................] 100%
[  17.3209 ] Writing partition APP with system.img
[  17.3264 ] [                                                ] 000%
[  17.3264 ] [                                                ] 001%
[  17.3264 ] [.                                               ] 002%
[  17.3264 ] [.                                               ] 003%
[  17.3264 ] [..                                              ] 004%
[ 1596.1284 ] 
Error: Return value 3
Command tegradevflash_v2 --instance 1-6.4 --pt flash.xml.bin --create

hello rabe,

may I have more details,
for example,

  1. may I know which JetPack release you’re working with.
  2. could you please use the hardware key to put device into forced-recovery and using $lsusb command on the host to check the connection status.
    thanks

thank you for the fast answer

  1. i am using Jetpack 3.2.1
  2. the Jetson doesn’t get recognized

hello rabe,

may I know whether the led on the carrier board is still active when the power connected?
were you able to setup serial console to gather bootloader logs to check if we could have more details.
thanks

I don’t get any log messages ;(

4 leds are active: CR5 (CVM powered), CR6 (PCIE/SATA Powerd up), CR2 (Pwr) and CR1 (Soc).

hello rabe,

you might consider a Return Material Authorization process to issue a replacement.
thanks

Ok, thank you.

Do you have any advise how i could prevent that in future?
Do you recommend using the ./multi_tegra_flash.sh script or is there an other way to flash multiple modules at once (or speed up flashing generally)?

hello rabe,

we also verify multiple flash script files for flashing multiple modules, we tried to flash three device simultaneously for confirmation.
multiple flash script file just doing the same thing as flash.sh, it should not terminate the process accidentally or even smash emmc.

FYI,
we had setup environment with multiple devices connect to host desktop directly.

could you please share your hardware environment setups, were you using usb-hub to connect several device with the host machine?
thanks

yes, i used a usb-hub to connect two devices to my host machine…

Is the “recovery mode bootloader” also stored in the emmc?
Could it be that i have overwritten it during flashing?
I cloned one module and wanted to apply this image to other modules.

The flash.sh script has the option -k (partition id), the description says “partition name or number specified in flash.cfg”, but i can’t find such a file.

hello rabe,

please check below xml file for the list of partition names,
you should put partition name after the -k to specify the partition-id.
$OUT/Linux_for_Tegra/bootloader/flash.xml

for example,
$ sudo ./flash.sh -r -k kernel jetson-tx2 mmcblk0p1