Flashing Jetson TX2 from Ubuntu failed

Choose Files
hello

I just received my TX2 jetson card with JetPack 3.0 - L4T R27.1 released for Jetson TX2

But I have a problem for flash bootloader , I tried with several pc

[ 6.0415 ] Added binary blob_tos_sigheader.img.encrypt of size 54784
[ 6.0419 ] Added binary blob_eks_sigheader.img.encrypt of size 1488
[ 6.0422 ] Added binary blob_tegra186-quill-p3310-1000-c03-00-base.dtb of size 248032
[ 6.0489 ]
[ 6.0490 ] Sending bootloader and pre-requisite binaries
[ 6.0498 ] tegrarcm_v2 --download blob blob.bin
[ 6.0505 ] Applet version 01.00.0000
[ 6.0637 ] Sending blob
[ 6.1889 ]
Error: Return value 1
Command tegrarcm_v2 --download blob blob.bin
Failed flashing t186ref.

why ?
Thanks for yours help

Mo

Mentioned in another thread:
https://devtalk.nvidia.com/default/topic/1001880/jetson-tx2/tx2-not-booting-after-successful-flashing-/post/5117997/#5117997

I’m having the same problem as laazizi. My board worked for about 2 weeks and then failed. In the middle of working with it, I got a bright white screen and was unable to reboot. I’ve reviewed the link mentioned by linuxdev, but the posts are co-mingled with another issue and it does not appear that this was ever resolved.

Here are some relevant notes:

  • I tried cloning the flash and got a similar error. This was my first choice because I really wanted to recover a couple of files from the Jetson (https://devtalk.nvidia.com/default/topic/1000105/jetson-tx2/tx2-cloning/post/5110183/#5110183)
  • I'm running Ubuntu 14.04 natively
  • I've tried different USB ports
  • lsusb shows that the NVIDIA usb devices is connected
  • During the flash procedure, the device is mounted and I can see files loading on the device. I'm optimistic that the board is not completely dead because of this, but I'm out of ideas for fixing it.

Here are is the tail of: /_installer/logs/64_TX2/flash_os_tx2.log

2701: SKP:        4096(      1 blks) ==>  3341749944:12
2702: RAW:    17248256(   4211 blks) ==>  3341749956:17248268
2703: SKP:        8192(      2 blks) ==>  3358998224:12
2704: RAW:      258048(     63 blks) ==>  3358998236:258060
2705: SKP:  1834012672( 447757 blks) ==>  3359256296:12
-- Total: -----------------------------------------------------------
2706 CHUNK 30064771072(7340032 blks) ==>  3359256308(820123 blks)

done.
system.img built successfully. 
Existing tbcfile(/home/matt/Downloads/JetPack/64_TX2/Linux_for_Tegra_tx2/bootloader/cboot.bin) reused.
copying tbcdtbfile(/home/matt/Downloads/JetPack/64_TX2/Linux_for_Tegra_tx2/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)... done.
copying cfgfile(/home/matt/Downloads/JetPack/64_TX2/Linux_for_Tegra_tx2/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml... done.
Existing flasher(/home/matt/Downloads/JetPack/64_TX2/Linux_for_Tegra_tx2/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/home/matt/Downloads/JetPack/64_TX2/Linux_for_Tegra_tx2/bootloader/tegraflash.py) reused.
./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --odmdata 0x1090000 --applet mb1_recovery_prod.bin --cmd "flash;reboot"  --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c03.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg  --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2.dtb; tlk tos.img; eks eks.img; bootloader_dtb tegra186-quill-p3310-1000-c03-00-base.dtb"  
saving flash command in /home/matt/Downloads/JetPack/64_TX2/Linux_for_Tegra_tx2/bootloader/flashcmd.txt
./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --odmdata 0x1090000 --applet mb1_recovery_prod.bin --cmd "flash;reboot"  --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c03.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg  --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2.dtb; tlk tos.img; eks eks.img; bootloader_dtb tegra186-quill-p3310-1000-c03-00-base.dtb"  
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0014 ] tegrasign_v2 --key None --getmode mode.txt
[   0.0022 ] Assuming zero filled SBK key
[   0.0031 ] 
[   0.0031 ] Generating RCM messages
[   0.0047 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 --download rcm mb1_recovery_prod.bin 0 0
[   0.0065 ] RCM 0 is saved as rcm_0.rcm
[   0.0072 ] RCM 1 is saved as rcm_1.rcm
[   0.0075 ] List of rcm files are saved in rcm_list.xml
[   0.0075 ] 
[   0.0076 ] Signing RCM messages
[   0.0085 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.0093 ] Assuming zero filled SBK key
[   0.0128 ] 
[   0.0128 ] Copying signature to RCM mesages
[   0.0137 ] tegrarcm_v2 --chip 0x18 --updatesig rcm_list_signed.xml
[   0.0148 ] 
[   0.0148 ] Parsing partition layout
[   0.0186 ] tegraparser_v2 --pt flash.xml.tmp
[   0.0203 ] 
[   0.0204 ] Creating list of images to be signed
[   0.0224 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[   0.0382 ] 
[   0.0383 ] Generating signatures
[   0.0395 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[   0.0405 ] Assuming zero filled SBK key
[   0.1394 ] 
[   0.1394 ] Generating br-bct
[   0.1424 ] Updating dev and MSS params in BR BCT
[   0.1424 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --brbct br_bct.cfg --chip 0x18
[   0.1432 ] MB1 BCT version is : c
[   0.1447 ] Copying Sdram info from 0 to 1 set
[   0.1509 ] Copying Sdram info from 1 to 2 set
[   0.1509 ] Copying Sdram info from 2 to 3 set
[   0.1509 ] 
[   0.1509 ] Updating bl info
[   0.1517 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[   0.1528 ] 
[   0.1528 ] Updating Odmdata
[   0.1537 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatefields Odmdata =0x1090000
[   0.1548 ] 
[   0.1548 ] Get Signed section bct
[   0.1558 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --listbct bct_list.xml
[   0.1568 ] 
[   0.1568 ] Signing BCT
[   0.1578 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key
[   0.1585 ] Assuming zero filled SBK key
[   0.1588 ] 
[   0.1588 ] Updating BCT with signature
[   0.1598 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesig bct_list_signed.xml
[   0.1608 ] 
[   0.1608 ] Generating coldboot mb1-bct
[   0.1619 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct.cfg --sdram P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c03.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   0.1627 ] MB1 BCT version is : c
[   0.1629 ] Copying Sdram info from 0 to 1 set
[   0.1690 ] Copying Sdram info from 1 to 2 set
[   0.1694 ] Copying Sdram info from 2 to 3 set
[   0.1696 ] Packing sdram param for instance[0]
[   0.1698 ] Packing sdram param for instance[1]
[   0.1699 ] Packing sdram param for instance[2]
[   0.1701 ] Packing sdram param for instance[3]

[   0.1708 ] Parsing platform config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[   0.1726 ] Appending platform config data of size :- 2904

[   0.1735 ] Parsing platform config file :minimal_scr.cfg 
[   0.1738 ] Appending platform config data of size :- 12240

[   0.1742 ] Parsing platform config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[   0.1746 ] Appending platform config data of size :- 24

[   0.1749 ] Parsing platform config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c03.cfg 
[   0.1755 ] Appending platform config data of size :- 684

[   0.1758 ] Parsing platform config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[   0.1763 ] Appending platform config data of size :- 64

[   0.1766 ] Parsing platform config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[   0.1771 ] Appending platform config data of size :- 1628
[   0.1776 ] 
[   0.1777 ] Updating mb1-bct with firmware information
[   0.1790 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.1810 ] 
[   0.1826 ] tegrahost_v2 --align mb1_cold_boot_bct_MB1.bct
[   0.1839 ] 
[   0.1848 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[   0.1858 ] 
[   0.1870 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml
[   0.1877 ] Assuming zero filled SBK key
[   0.1895 ] 
[   0.1905 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[   0.1914 ] 
[   0.1914 ] Generating recovery mb1-bct
[   0.1924 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct.cfg --sdram P3310_A00_8GB_Samsung_8GB_lpddr4_204Mhz_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c03.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[   0.1931 ] MB1 BCT version is : c
[   0.1933 ] Copying Sdram info from 0 to 1 set
[   0.1990 ] Copying Sdram info from 1 to 2 set
[   0.1995 ] Copying Sdram info from 2 to 3 set
[   0.2003 ] Packing sdram param for instance[0]
[   0.2013 ] Packing sdram param for instance[1]
[   0.2022 ] Packing sdram param for instance[2]
[   0.2025 ] Packing sdram param for instance[3]
[   0.2025 ] 
[   0.2025 ] Parsing platform config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg 
[   0.2025 ] Appending platform config data of size :- 2904
[   0.2025 ] 
[   0.2025 ] Parsing platform config file :minimal_scr.cfg 
[   0.2025 ] Appending platform config data of size :- 12240
[   0.2025 ] 
[   0.2025 ] Parsing platform config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg 
[   0.2025 ] Appending platform config data of size :- 24
[   0.2025 ] 
[   0.2025 ] Parsing platform config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c03.cfg 
[   0.2025 ] Appending platform config data of size :- 684
[   0.2025 ] 
[   0.2025 ] Parsing platform config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg 
[   0.2025 ] Appending platform config data of size :- 64
[   0.2025 ] 
[   0.2025 ] Parsing platform config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg 
[   0.2025 ] Appending platform config data of size :- 1628
[   0.2025 ] 
[   0.2025 ] Updating mb1-bct with firmware information
[   0.2035 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[   0.2046 ] 
[   0.2056 ] tegrahost_v2 --align mb1_bct_MB1.bct
[   0.2065 ] 
[   0.2073 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk
[   0.2082 ] 
[   0.2094 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml
[   0.2102 ] Assuming zero filled SBK key
[   0.2118 ] 
[   0.2128 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[   0.2144 ] 
[   0.2145 ] Copying signatures
[   0.2160 ] tegrahost_v2 --chip 0x18 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[   0.2233 ] 
[   0.2234 ] Boot Rom communication
[   0.2246 ] tegrarcm_v2 --chip 0x18 --rcm rcm_list_signed.xml
[   0.2254 ] BootRom is not running
[   0.2655 ] 
[   5.2707 ] Retrieving board information
[   5.2732 ] tegrarcm_v2 --oem platformdetails chip chip_info.bin
[   5.2755 ] Applet version 01.00.0000
[   5.2790 ] Saved platform info in chip_info.bin
[   5.2799 ] Chip minor revision: 2
[   5.2799 ] 
[   5.2800 ] Sending BCTs
[   5.2832 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[   5.2854 ] Applet version 01.00.0000
[   5.2879 ] Sending bct_bootrom
[   5.2882 ] [................................................] 100%
[   5.2979 ] Sending bct_mb1
[   5.3034 ] [................................................] 100%
[   5.6473 ] 
[   5.6474 ] Generating blob
[   5.6483 ] tegrahost_v2 --align blob_nvtboot_recovery_cpu.bin
[   5.6490 ] 
[   5.6497 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[   5.6507 ] 
[   5.6520 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml
[   5.6532 ] Assuming zero filled SBK key
[   5.6630 ] 
[   5.6640 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[   5.6650 ] 
[   5.6662 ] tegrahost_v2 --align blob_nvtboot_recovery.bin
[   5.6670 ] 
[   5.6681 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[   5.6694 ] 
[   5.6715 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml
[   5.6728 ] Assuming zero filled SBK key
[   5.6748 ] 
[   5.6759 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[   5.6768 ] 
[   5.6781 ] tegrahost_v2 --align blob_preboot_d15_prod_cr.bin
[   5.6789 ] 
[   5.6798 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[   5.6807 ] 
[   5.6820 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml
[   5.6828 ] Assuming zero filled SBK key
[   5.6849 ] 
[   5.6860 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[   5.6874 ] 
[   5.6894 ] tegrahost_v2 --align blob_mce_mts_d15_prod_cr.bin
[   5.6902 ] 
[   5.6913 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[   5.6952 ] 
[   5.6965 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml
[   5.6972 ] Assuming zero filled SBK key
[   5.7523 ] 
[   5.7535 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[   5.7570 ] 
[   5.7583 ] tegrahost_v2 --align blob_bpmp.bin
[   5.7597 ] 
[   5.7615 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk
[   5.7633 ] 
[   5.7646 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml
[   5.7654 ] Assuming zero filled SBK key
[   5.7802 ] 
[   5.7813 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[   5.7828 ] 
[   5.7841 ] tegrahost_v2 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2.dtb
[   5.7849 ] 
[   5.7859 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2.dtb zerosbk
[   5.7873 ] 
[   5.7885 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2_sigheader.dtb_list.xml
[   5.7893 ] Assuming zero filled SBK key
[   5.7986 ] 
[   5.7997 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[   5.8011 ] 
[   5.8024 ] tegrahost_v2 --align blob_tos.img
[   5.8032 ] 
[   5.8040 ] tegrahost_v2 --appendsigheader blob_tos.img zerosbk
[   5.8049 ] 
[   5.8061 ] tegrasign_v2 --key None --list blob_tos_sigheader.img_list.xml
[   5.8068 ] Assuming zero filled SBK key
[   5.8086 ] 
[   5.8103 ] tegrahost_v2 --updatesigheader blob_tos_sigheader.img.encrypt blob_tos_sigheader.img.hash zerosbk
[   5.8113 ] 
[   5.8123 ] tegrahost_v2 --align blob_eks.img
[   5.8130 ] 
[   5.8140 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk
[   5.8148 ] 
[   5.8159 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml
[   5.8166 ] Assuming zero filled SBK key
[   5.8174 ] 
[   5.8186 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[   5.8194 ] 
[   5.8208 ] tegrahost_v2 --generateblob blob.xml blob.bin
[   5.8216 ] number of images in blob are 9
[   5.8218 ] blobsize is 3497944
[   5.8220 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 144272
[   5.8375 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 60096
[   5.8394 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 59824
[   5.8414 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2077344
[   5.8424 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 524880
[   5.8424 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c01-00-te770d-ucm2_sigheader.dtb.encrypt of size 327072
[   5.8424 ] Added binary blob_tos_sigheader.img.encrypt of size 54784
[   5.8424 ] Added binary blob_eks_sigheader.img.encrypt of size 1488
[   5.8424 ] Added binary blob_tegra186-quill-p3310-1000-c03-00-base.dtb of size 248032
[   5.8424 ] 
[   5.8425 ] Sending bootloader and pre-requisite binaries
[   5.8437 ] tegrarcm_v2 --download blob blob.bin
[   5.8447 ] Applet version 01.00.0000
[   5.8472 ] Sending blob
[   5.9739 ] 
Error: Return value 1
Command tegrarcm_v2 --download blob blob.bin
Failed flashing t186ref.

Is the above log from a flash, or from a clone? Basically you know part of the system works, but some data exchanges may be in RAM, others may be in eMMC…having one part work doesn’t guarantee the other will.

What was the exact command line producing the log?

The above log is from a flash. That specific log is from running:

sudo bash JetPack-L4T-3.0-linux-x64.run

When I tried cloning, I get a got a similar error reading the device (but, unfortunately didn’t save the log).

Anyway, I received a new Jetson module today and was able to flash it using the same PC, eval board, cables, etc. I’m planning on hanging onto the “troubled” module for a couple of days in case you or anyone else has an idea for recovering it. Otherwise, RMA.

Thanks for you time!

I’ll suggest RMA. If clone fails then you can’t get anything from it…it may be an eMMC failure. Short of unsoldering memory and putting on a new module there isn’t much you can do…and even unsoldering/resoldering is very unlikely to have a good result.

Thanks for the advice.