Flashing to NVMe initially worked, but now I cannot flash again

Hello, I am attempting to flash a Orin NX with a NVMe drive attached. It is on a custom carrier board and all the hardware is verified to work. I was able to initially flash Jetpack 6.2.1 onto the NX, but every attempt at flashing after the first always fails. In the Initial flash I had the ODMDATA set wrong, it is now set correctly in the the p3767.conf.common

Commands I run to flash ($DIR_CUSTOM_LFT is the Linux_for_Tegra directory)

           cd "$DIR_CUSTOM_LFT" || exit
           sudo "$DIR_CUSTOM_LFT"/tools/l4t_flash_prerequisites.sh
           sudo systemctl restart nfs-server.service
           echo 0 | sudo tee /proc/sys/kernel/hung_task_timeout_secs >/dev/null
           sudo "$DIR_CUSTOM_LFT"/nvsdkmanager_flash.sh --storage nvme0n1p1
           sync; sync

I have verified the NX is in forced recovery mode, and I do see the Nvidia APX when running lsusb on the host.
When I attempt to flash it appears the USB disconnects, the flash fails, then the USB reconnects. I have doublechecked the hardware and it is not a USB issue, also I was able to flash it initially.

I am not Using a VM

Flash Log

/mnt/cdrom/l4t-gcc/Linux_for_Tegra/tools/l4t_flash_prerequisites.sh: line 41: /etc/lsb-release: No such file or directory
[65565.497218] nfsd: last server has exited, flushing export cache
[65565.585004] usb 1-5: new high-speed USB device number 8 using xhci_hcd
[65565.694927] NFSD: Using nfsdcld client tracking operations.
[65565.700538] NFSD: no clients to reclaim, skipping NFSv4 grace period (net f0000000)
[65565.719061] usb 1-5: New USB device found, idVendor=0955, idProduct=7323, bcdDevice= 4.01
[65565.727306] usb 1-5: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[65565.734482] usb 1-5: Product: APX
[65565.737838] usb 1-5: Manufacturer: NVIDIA Corp.
tee: /proc/sys/kernel/hung_task_timeout_secs: Invalid argument
13:34:28.108 - Debug: User passed parameters: nvme0n1p1
13:34:28.109 - Debug: Identifying target board...
*** Checking ONLINE mode ... OK.
*** Checking target board connection ... 1 connections found.
*** Reading ECID ... FUSELEVEL=fuselevel_production hwchipid=0x23 bootauth=NS
*** Reading EEPROM ... "/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/tegraflash.py" --chip 0x23 --applet "/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/mb1_t234_prod.bin" --cfg readinfo_t234_mi
n_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --device_config tegra234-mb1-bct-device-p3701-0000.dts --misc_config tegra234-mb1-bct-misc-p3701-0000.dts --bins "mb2_applet applet_t234.bin
" --skipuid --cmd "dump eeprom cvm cvm.bin; reboot recovery" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0389 ] tegrasign_v3.py --key None --getmode mode.txt
[   0.0394 ] Assuming zero filled SBK key
[   0.0380 ] Pre-processing config: tegra234-mb1-bct-device-p3701-0000.dts
[   0.0538 ] Pre-processing config: tegra234-mb1-bct-misc-p3701-0000.dts
[   0.0740 ] Parsing partition layout
[   0.0756 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.0785 ] Kernel DTB used: None
[   0.0785 ] WARNING: dce base dtb is not provided

[   0.0785 ] Parsing partition layout
[   0.0801 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.0819 ] Creating list of images to be signed
[   0.0835 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --list images_list.xml zerosbk
[   0.0850 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   0.0872 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   0.0876 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   0.1146 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   0.1189 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   0.1397 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   0.1402 ] adding BCH for mb2_t234_aligned.bin
[   0.1469 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   0.1781 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   0.1853 ] adding BCH for mb2_t234_aligned.bin
[   0.2346 ] Filling MB1 storage info
[   0.2346 ] Parsing dev params for multi chains
[   0.2504 ] Generating br-bct
[   0.2520 ] Updating dev and MSS params in BR BCT
[   0.2521 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   0.2538 ] Updating bl info
[   0.2553 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin
[   0.2567 ] WARNING: boot chain is not completed. set to 0
[   0.2585 ] Generating signatures
[   0.2602 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.2605 ] Assuming zero filled SBK key
[   0.2973 ] Warning: pub_key.key is not found
[   0.2961 ] Parsing dev params for multi chains
[   0.2961 ] Generating br-bct
[   0.2978 ] Updating dev and MSS params in BR BCT
[   0.2979 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   0.2999 ] Updating bl info
[   0.3013 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[   0.3027 ] WARNING: boot chain is not completed. set to 0
[   0.3043 ] Generating SHA2 Hash
[   0.3088 ] Sha saved in br_bct_BR.sha
[   0.3073 ] Get Signed section of bct
[   0.3088 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml
[   0.3108 ] Signing BCT
[   0.3125 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.3129 ] Assuming zero filled SBK key
[   0.3185 ] Sha saved in br_bct_BR.sha
[   0.3191 ] Warning: pub_key.key is not found
[   0.3175 ] Updating BCT with signature
[   0.3191 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml
[   0.3205 ] Offset :4608 Len :3584
[   0.3212 ] Generating SHA2 Hash
[   0.3230 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512
[   0.3234 ] Assuming zero filled SBK key
[   0.3235 ] Assuming zero filled SBK key
[   0.3293 ] Sha saved in br_bct_BR.sha
[   0.3283 ] Updating BCT with SHA2 Hash
[   0.3299 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml
[   0.3314 ] Offset :4608 Len :3584
[   0.3319 ] Offset :68 Len :8124
[   0.3323 ] Generating coldboot mb1-bct
[   0.3339 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3701-0000_cpp.dtb --device tegra234-mb1-bct-device-p3701-0000_cpp.dtb
[   0.3359 ] MB1-BCT version: 0.13

[   0.3384 ] Parsing config file :tegra234-mb1-bct-device-p3701-0000_cpp.dtb 
[   0.3388 ] Added Platform Config 9 data with size :- 100
[   0.3388 ] 
[   0.3388 ] Updating mb1-bct with firmware information
[   0.3405 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.3445 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[   0.3460 ] Generating SHA2 Hash for mb1bct
[   0.3504 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha
[   0.3531 ] Sha saved in mb1_cold_boot_bct_MB1.sha
[   0.3531 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[   0.3545 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[   0.3579 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.3584 ] Assuming zero filled SBK key
[   0.3617 ] Warning: pub_key.key is not found
[   0.3620 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   0.3647 ] Generating recovery mb1-bct
[   0.3663 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3701-0000_cpp.dtb --device tegra234-mb1-bct-device-p3701-0000_cpp.dtb
[   0.3677 ] MB1-BCT version: 0.13

[   0.3701 ] Parsing config file :tegra234-mb1-bct-device-p3701-0000_cpp.dtb 
[   0.3705 ] Added Platform Config 9 data with size :- 100
[   0.3705 ] 
[   0.3706 ] Updating mb1-bct with firmware information
[   0.3721 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.3761 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct
[   0.3777 ] Generating SHA2 Hash for mb1bct
[   0.3820 ] Sha saved in mb1_bct_MB1_aligned.sha
[   0.3846 ] Sha saved in mb1_bct_MB1.sha
[   0.3847 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_bct_MB1_aligned.bct zerosbk
[   0.3862 ] adding BCH for mb1_bct_MB1_aligned.bct
[   0.3896 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.3900 ] Assuming zero filled SBK key
[   0.3933 ] Warning: pub_key.key is not found
[   0.3933 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   0.3958 ] Info: Skip generating mem_bct because sdram_config is not defined
[   0.3958 ] Info: Skip generating mem_bct because sdram_config is not defined
[   0.3958 ] Copying signatures
[   0.3975 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[   0.4414 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[   0.4417 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[   0.4417 ] Boot Rom communication
[   0.4435 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned
_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[   0.4449 ] BR_CID: 0x80012344705DF2D1200000000B010100
[   0.4461 ] Sending bct_br
[   0.4462 ] Sending mb1
[ [65566.814541] usb 1-5: USB disconnect, device number 8
  0.4467 ] Sending psc_bl1
[   0.4560 ] Sending bct_mb1
[   0.4619 ] Boot Rom communication completed
[   0.4645 ] tegrahost_v2 --chip 0x23 0 --align applet_t234_aligned.bin
[   0.4677 ] tegrahost_v2 --chip 0x23 0 --magicid MB2A --appendsigheader applet_t234_aligned.bin zerosbk
[   0.4690 ] adding BCH for applet_t234_aligned.bin
[   0.4913 ] tegrasign_v3.py --key None --list applet_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.4917 ] Assuming zero filled SBK key
[   0.4963 ] Warning: pub_key.key is not found
[   0.4967 ] tegrahost_v2 --chip 0x23 0 --updatesigheader applet_t234_aligned_sigheader.bin.encrypt applet_t234_aligned_sigheader.bin.hash zerosbk
[   0.5039 ] Sending mb2_applet...

[   0.5056 ] tegrarcm_v2 --chip 0x23 0 --pollbl --download applet applet_t234_sigheader.bin.encrypt
[   0.5071 ] BL: version 1.4.0.4-t234-54845784-e89ea9bc last_boot_error: 656573201
[   0.6855 ] Sending applet
[   0.6859 ] ERROR: might be timeout in USB write.
Error: Return value 3
Command tegrarcm_v2 --chip 0x23 0 --pollbl --download applet applet_t234_sigheader.bin.encrypt
--- Error: Reading board information failed.
13:34:29.132 - Error: Parsing boardid failed.

Serial Console Log

[0001.180] I> MB1 (version: 1.4.0.4-t234-54845784-e89ea9bc)
[0001.185] I> t234-A01-1-Silicon (0x12347) Prod
[0001.190] I> Boot-mode : BPMP Diagnostic
[0001.193] I> Entry timestamp: 0x00000000
[0001.197] I> last_boot_error: 0x27228311
[0001.201] I> BR-BCT: preprod_dev_sign: 0
[0001.205] I> rst_source: 0xb, rst_level: 0x1
[0001.209] I> Task: Initialize MB2 params
[0001.213] I> MB2-params @ 0x40060000
[0001.217] I> Task: Crypto init
[0001.219] I> Task: Perform MB1 KAT tests
[0001.223] I> Task: NVRNG health check
[0001.227] I> NVRNG: Health check success
[0001.231] I> Task: Secure debug controls
[0001.235] I> Task: strap war set
[0001.238] I> Task: Program NV master stream id
[0001.242] I> Task: Verify boot mode
[0001.248] I> Task: Alias fuses
[0001.252] W> FUSE_ALIAS: Fuse alias on production fused part is not supported.
[0001.259] I> Task: Print SKU type
[0001.262] I> FUSE_OPT_CCPLEX_CLUSTER_DISABLE = 0x000001c0
[0001.267] I> FUSE_OPT_GPC_DISABLE = 0x00000002
[0001.271] I> FUSE_OPT_TPC_DISABLE = 0x000000f0
[0001.276] I> FUSE_OPT_DLA_DISABLE = 0x00000000
[0001.280] I> FUSE_OPT_PVA_DISABLE = 0x00000000
[0001.284] I> FUSE_OPT_NVENC_DISABLE = 0x00000000
[0001.289] I> FUSE_OPT_NVDEC_DISABLE = 0x00000000
[0001.293] I> FUSE_OPT_FSI_DISABLE = 0x00000001
[0001.297] I> FUSE_OPT_EMC_DISABLE = 0x00000000
[0001.302] I> FUSE_BOOTROM_PATCH_VERSION = 0x7
[0001.306] I> FUSE_PSCROM_PATCH_VERSION = 0x7
[0001.310] I> FUSE_OPT_ADC_CAL_FUSE_REV = 0x2
[0001.314] I> FUSE_SKU_INFO_0 = 0xd3
[0001.317] I> FUSE_OPT_SAMPLE_TYPE_0 = 0x3 PS 
[0001.321] I> FUSE_PACKAGE_INFO_0 = 0x2
[0001.325] I> SKU: Prod
[0001.327] I> Task: Boost clocks
[0001.330] I> Initializing NAFLL for BPMP_CPU_NIC.
[0001.335] I> BPMP NAFLL: fll_lock = 1, dvco_min_reached = 0
[0001.341] I> BPMP NAFLL lock success.
[0001.344] I> BPMP_CPU_NIC : src = 42, divisor = 0
[0001.349] I> Initializing PLLC2 for AXI_CBB.
[0001.353] I> AXI_CBB : src = 35, divisor = 0
[0001.357] I> Task: Voltage monitor
[0001.360] I> VMON: Vmon re-calibration and fine tuning done
[0001.366] I> Task: UPHY init
[0001.369] W> UPHY: UPHY lane info table is empty in MB1 BCT.
[0001.374] I> Task: Boot device init
[0001.377] I> Boot_device: RCM
[0001.380] I> USB configuration success
[0001.384] I> Task: TSC init
[0001.387] I> Task: Enable WDT 5th expiry
[0001.391] I> Task: I2C register
[0001.394] I> Task: Set I2C bus freq
[0001.397] I> Task: Reset FSI
[0001.400] I> Task: Enable clock-mon
[0001.404] I> FMON: Fmon re-programming done
[0001.408] I> Task: Mapper init
[0001.411] I> Task: MB1 fixed firewalls
[0001.417] W> Firewall readback mismatch
[0001.422] I> Task: Load MB2/Applet/FSKP
[0001.426] I> Loading MB2 Applet
[0001.429] I> Slot: 1
[0001.431] E> BLOCK_DEV: Failed to open blockdev.
[0001.436] E> LOADER: Failed to open blockdev 0(0).
[0001.441] E> LOADER: Failed to get storage info for binary 21 from loader.
[0001.448] C> LOADER: Could not read binary 21.
[0001.453] E> Failed to load MB2
[0001.456] C> Task 0x46 failed (err: 0x27228311)
[0001.460] E> Top caller module: MB2_PARAMS, error module: LOADER, reason: 0x11, aux_info: 0x83
[0001.469] C> Boot Info Table status dump :
0111100000111000110111111111000000011110000000000000011000001

*** Please note that this reply is generated by LLM automatically ***

Based on the provided information, it appears that you are experiencing issues with flashing a Jetson Orin NX module on a custom carrier board with a NVMe drive attached. You were able to initially flash Jetpack 6.2.1 onto the NX, but subsequent attempts at flashing have failed.

Here are some potential causes and solutions to consider:

  1. ODMDATA configuration: You mentioned that the ODMDATA was set incorrectly during the initial flash, but it is now set correctly in the p3767.conf.common file. However, it’s essential to ensure that the ODMDATA configuration is correct for your custom carrier board. Verify that the configuration matches the hardware setup, especially the gbe-uphy-config setting, which should be set to 0 or 1 if your CVB is not using MGBE.

  2. USB connection issues: Although you’ve verified that the hardware is not causing the issue, it’s possible that the USB connection is being interrupted during the flashing process. Try using a different USB port or a USB hub to rule out any issues with the USB connection.

  3. Forced recovery mode: Ensure that the NX is in forced recovery mode before attempting to flash. You can verify this by checking the device’s presence in the lsusb output on the host machine.

  4. Flash commands: Double-check the flash commands you are using. The commands should be run from the Linux for Tegra (L4T) directory, and the correct syntax should be used. For example:

sudo ./flash.sh jetson-orin-nano-devkit mmcblk0p1

   or
   ```bash
sudo ./tools/kernel_flash/l4t_initrd_flash.sh --external-device nvme0n1p1 \
   -c tools/kernel_flash//flash_l4t_t234_nvme.xml -p "-c bootloader/generic/cfg/flash_t234_qspi.xml" \
   --showlogs --network usb0 jetson-orin-nano-devkit internal
  1. Flash log and serial console log analysis: Analyze the flash log and serial console log to identify any specific error messages or patterns that may indicate the cause of the issue.

  2. Comparison with Jetson AGX Orin: Although the flashing process for Jetson Orin NX and Jetson AGX Orin is similar, there may be some differences in the configuration files or flash commands. Compare the flashing process for Jetson AGX Orin with the one you are using for Jetson Orin NX to ensure that you are using the correct configuration files and flash commands.

To troubleshoot the issue, you can try the following steps:

  1. Verify the ODMDATA configuration and ensure that it matches the hardware setup.
  2. Check the USB connection and try using a different USB port or a USB hub.
  3. Ensure that the NX is in forced recovery mode before attempting to flash.
  4. Double-check the flash commands and syntax.
  5. Analyze the flash log and serial console log to identify any specific error messages or patterns.
  6. Compare the flashing process for Jetson AGX Orin with the one you are using for Jetson Orin NX to ensure that you are using the correct configuration files and flash commands.

If none of these steps resolve the issue, please provide more details about the error messages or patterns you are seeing in the flash log and serial console log, and I’ll be happy to help you further.

*** Please give the thumbs up if you get answers you like. Or provide feedback to help us improve the answer. ***

Hello @Jetson_tester,

Have you tried power cycling the board and re-booting into recovery mode?

Sometimes if a flash fails and then you try flashing without power cycle, the system ends on a bad state.

best regards,
Andrew
Embedded Software Engineer at ProventusNova

Yes I have power cycled the board multiple times with the same ending.

I have also tried different methods of going into forced recovery mode such as entering it from the bios and the sudo reboot --force forced-recovery .

@Jetson_tester,

Interesting.

I have seen a similar behavior in the past, where the flashing procedure was not working on NVMe’s that were already flashed due to an error to flash the QSPI.

Have you tried flashing using the devkit just to see if the same happens ?

best regards,
Andrew
Embedded Software Engineer at ProventusNova

I have not attempted to flash a devkit NX yet with this current image, but in the past it has worked (5.1.2 and 6.2.1).

One weird thing i noticed in the flash logs was this

*** Reading EEPROM ... "/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/tegraflash.py" --chip 0x23 --applet "/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/mb1_t234_prod.bin" --cfg readinfo_t234_mi
n_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --device_config tegra234-mb1-bct-device-p3701-0000.dts --misc_config tegra234-mb1-bct-misc-p3701-0000.dts --bins "mb2_applet applet_t234.bin
" --skipuid --cmd "dump eeprom cvm cvm.bin; reboot recovery" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0389 ] tegrasign_v3.py --key None --getmode mode.txt
[   0.0394 ] Assuming zero filled SBK key
[   0.0380 ] Pre-processing config: tegra234-mb1-bct-device-p3701-0000.dts
[   0.0538 ] Pre-processing config: tegra234-mb1-bct-misc-p3701-0000.dts
[   0.0740 ] Parsing partition layout
[   0.0756 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.0785 ] Kernel DTB used: None
[   0.0785 ] WARNING: dce base dtb is not provided

Why is it reading p3701 from the EEPROM and doing some Pre-processing with p3701 when I never use those files when flashing. That’s for the AGX not the NX

@Jetson_tester,

Apologies for the wait time.
I was taking the wife to work.

Can you share the command you are using for flashing?

best regards,
Andrew
Embedded Software Engineer at ProventusNova

@Jetson_tester,

Update.
I think you might be onto something with your last message.

This is how it looks for us when successfully flashing one our client’s NXs.

Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0552 ] Reading fuses
[   0.0650 ] tegrasign_v3.py --key None --getmode mode.txt
[   0.0651 ] Assuming zero filled SBK key
[   0.0570 ] Pre-processing config: tegra234-mb1-bct-device-p3767-0000.dts
[   0.0847 ] Pre-processing config: tegra234-mb1-bct-misc-p3767-0000.dts
[   0.0977 ] Pre-processing config: tegra234-mb1-bct-ratchet-p3767-0000.dts
[   0.1072 ] Parsing partition layout
[   0.1077 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.1098 ] Kernel DTB used: None
[   0.1098 ] WARNING: dce base dtb is not provided

Could it be the board config you are using?

best regards,
Andrew
Embedded Software Engineer at ProventusNova

       cd "$DIR_CUSTOM_LFT" || exit
       sudo "$DIR_CUSTOM_LFT"/tools/l4t_flash_prerequisites.sh
       sudo systemctl restart nfs-server.service
       echo 0 | sudo tee /proc/sys/kernel/hung_task_timeout_secs >/dev/null
       sudo "$DIR_CUSTOM_LFT"/nvsdkmanager_flash.sh --storage nvme0n1p1
       sync; sync

These are the commands I use for the current image

I went back to a stable image which utilized the backup/restore feature, and attempted to do a restore on the NX and got a slightly similar error.

The below command line and serial output is from the Stable Image
Command Used to attempt the flash:
sudo "$DIR_CUSTOM_LFT"/tools/backup_restore/l4t_backup_restore.sh -e nvme0n1 -r jetson-orin-nano-devkit
Where $DIR_CUSTOM_LFT is the Linux_for_Tegra directory

[ 5237.425981] nfsd: last server has exited, flushing export cache
[ 5237.550742] usb 1-5: new high-speed USB device number 4 using xhci_hcd
[ 5237.622379] NFSD: Using nfsdcld client tracking operations.
[ 5237.627989] NFSD: no clients to reclaim, skipping NFSv4 grace period (net f0000000)
[ 5237.683701] usb 1-5: New USB device found, idVendor=0955, idProduct=7323, bcdDevice= 4.01
[ 5237.691988] usb 1-5: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[ 5237.699154] usb 1-5: Product: APX
[ 5237.702486] usb 1-5: Manufacturer: NVIDIA Corp.
tee: /proc/sys/kernel/hung_task_timeout_secs: Invalid argument
Please install the Secureboot package to use initrd flash for fused board
# Entry added by NVIDIA initrd flash tool
/mnt/cdrom/l4t-gcc/Linux_for_Tegra/tools/kernel_flash/tmp 127.0.0.1(rw,nohide,insecure,no_subtree_check,async,no_root_squash)
rpcbind: another rpcbind is already running. Aborting
Redirecting to /bin/systemctl restart nfs-kernel-server.service
Export list for localhost:
/mnt/cdrom/l4t-gcc/Linux_for_Tegra/tools/kernel_flash/tmp 127.0.0.1
16:43:36.864 - Debug: UFW is not installed. NFS port should be open.
16:43:36.866 - Debug: Checking VPN connections...
whack: Pluto is not running (no "/run/pluto/pluto.ctl")
16:43:36.881 - Debug: IPSec service is not running.
16:43:36.882 - Debug: VPN routes none in tun|tap|ppp|vpn|gpd.
16:43:36.884 - Debug: No VPN connection detected.
/mnt/cdrom/l4t-gcc/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --no-flash --initrd --showlogs jetson-orin-nano-devkit internal
******************************************
*                                        *
*  Step 1: Generate rcm boot commandline *
*                                        *
******************************************
ROOTFS_AB= ROOTFS_ENC= /mnt/cdrom/l4t-gcc/Linux_for_Tegra/flash.sh  --no-flash --rcm-boot jetson-orin-nano-devkit mmcblk0p1
###############################################################################
# L4T BSP Information:
# R36 , REVISION: 4.4
# User release: 0.0
###############################################################################
ECID is 0x80012344705DF2D1200000000B010100
copying device_config(/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/generic/BCT/tegra234-mb1-bct-device-p3767-0000.dts)... done.
copying misc_config(/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/generic/BCT/tegra234-mb1-bct-misc-p3767-0000.dts)... done.
copying emc_fuse_dev_params(/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/generic/BCT/tegra234-br-bct-diag-boot.dts)... done.
copying minratchet_config(/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/generic/BCT/tegra234-mb1-bct-ratchet-p3767-0000.dts)... done.
Existing emcfuse(/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/fuse_t234.xml) reused.
./tegraflash.py --chip "0x23" --applet "/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/mb1_t234_prod.bin" --skipuid --cfg readinfo_t234_min_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --d
evice_config tegra234-mb1-bct-device-p3767-0000.dts --misc_config tegra234-mb1-bct-misc-p3767-0000.dts --bins "mb2_applet applet_t234.bin" --minratchet_config tegra234-mb1-bct-ratchet-p3767-0000
.dts --cmd "readfuses fuse_t234.bin fuse_t234.xml; dump eeprom cvm cvm.bin; dump try_custinfo custinfo_out.bin; reboot recovery" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0429 ] Reading fuses
[   0.0482 ] tegrasign_v3.py --key None --getmode mode.txt
[   0.0486 ] Assuming zero filled SBK key
[   0.0472 ] Pre-processing config: tegra234-mb1-bct-device-p3767-0000.dts
[   0.0748 ] Pre-processing config: tegra234-mb1-bct-misc-p3767-0000.dts
[   0.0970 ] Pre-processing config: tegra234-mb1-bct-ratchet-p3767-0000.dts
[   0.1118 ] Parsing partition layout
[   0.1133 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.1161 ] Kernel DTB used: None
[   0.1161 ] WARNING: dce base dtb is not provided

[   0.1161 ] Parsing partition layout
[   0.1177 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.1196 ] Creating list of images to be signed
[   0.1213 ] Generating ratchet blob
[   0.1213 ] Generating coldboot mb1-bct
[   0.1228 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb
1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin
[   0.1241 ] MB1-BCT version: 0.13

[   0.1268 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb 
[   0.1275 ] Added Platform Config 9 data with size :- 100
[   0.1275 ] 
[   0.1275 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb 
[   0.1276 ] 
[   0.1276 ] Updating mb1-bct with firmware information
[   0.1292 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.1331 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[   0.1346 ] Generating SHA2 Hash for mb1bct
[   0.1390 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha
[   0.1416 ] Sha saved in mb1_cold_boot_bct_MB1.sha
[   0.1415 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[   0.1429 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[   0.1462 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.1466 ] Assuming zero filled SBK key
[   0.1499 ] Warning: pub_key.key is not found
[   0.1500 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   0.1528 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --ratchet_blob ratchet_blob.bin --list images_list.xml zerosbk
[   0.1543 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   0.1560 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   0.1566 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   0.1765 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   0.1817 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   0.1923 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   0.1927 ] adding BCH for mb2_t234_aligned.bin
[   0.1990 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   0.2274 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   0.2278 ] adding BCH for mb2_t234_aligned.bin
[   0.2724 ] Filling MB1 storage info
[   0.2724 ] Parsing dev params for multi chains
[   0.2877 ] Generating br-bct
[   0.2892 ] Updating dev and MSS params in BR BCT
[   0.2893 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   0.2911 ] Updating bl info
[   0.2927 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin
[   0.2940 ] WARNING: boot chain is not completed. set to 0
[   0.2953 ] Generating signatures
[   0.2971 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.2974 ] Assuming zero filled SBK key
[   0.3444 ] Warning: pub_key.key is not found
[   0.3431 ] Parsing dev params for multi chains
[   0.3432 ] Generating br-bct
[   0.3448 ] Updating dev and MSS params in BR BCT
[   0.3449 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   0.3468 ] Updating bl info
[   0.3483 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[   0.3497 ] WARNING: boot chain is not completed. set to 0
[   0.3513 ] Generating SHA2 Hash
[   0.3556 ] Sha saved in br_bct_BR.sha
[   0.3541 ] Get Signed section of bct
[   0.3556 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml
[   0.3575 ] Signing BCT
[   0.3593 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.3597 ] Assuming zero filled SBK key
[   0.3651 ] Sha saved in br_bct_BR.sha
[   0.3657 ] Warning: pub_key.key is not found
[   0.3640 ] Updating BCT with signature
[   0.3655 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml
[   0.3669 ] Offset :4608 Len :3584
[   0.3676 ] Generating SHA2 Hash
[   0.3693 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512
[   0.3697 ] Assuming zero filled SBK key
[   0.3697 ] Assuming zero filled SBK key
[   0.3755 ] Sha saved in br_bct_BR.sha
[   0.3744 ] Updating BCT with SHA2 Hash
[   0.3759 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml
[   0.3772 ] Offset :4608 Len :3584
[   0.3777 ] Offset :68 Len :8124
[   0.3781 ] Generating coldboot mb1-bct
[   0.3797 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb
1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin
[   0.3810 ] MB1-BCT version: 0.13

[   0.3835 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb 
[   0.3839 ] Added Platform Config 9 data with size :- 100
[   0.3842 ] 
[   0.3842 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb 
[   0.3842 ] 
[   0.3843 ] Updating mb1-bct with firmware information
[   0.3858 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.3897 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[   0.3911 ] Generating SHA2 Hash for mb1bct
[   0.3954 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha
[   0.3981 ] Sha saved in mb1_cold_boot_bct_MB1.sha
[   0.3980 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[   0.3995 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[   0.4028 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.4032 ] Assuming zero filled SBK key
[   0.4067 ] Warning: pub_key.key is not found
[   0.4068 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   0.4095 ] Generating recovery mb1-bct
[   0.4109 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratc
het-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin
[   0.4122 ] MB1-BCT version: 0.13

[   0.4147 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb 
[   0.4151 ] Added Platform Config 9 data with size :- 100
[   0.4153 ] 
[   0.4154 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb 
[   0.4154 ] 
[   0.4154 ] Updating mb1-bct with firmware information
[   0.4174 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.4210 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct
[   0.4226 ] Generating SHA2 Hash for mb1bct
[   0.4270 ] Sha saved in mb1_bct_MB1_aligned.sha
[   0.4295 ] Sha saved in mb1_bct_MB1.sha
[   0.4294 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_bct_MB1_aligned.bct zerosbk
[   0.7801 ] adding BCH for mb1_bct_MB1_aligned.bct
[   0.7834 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.7838 ] Assuming zero filled SBK key
[   0.7872 ] Warning: pub_key.key is not found
[   0.7873 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   0.7900 ] Info: Skip generating mem_bct because sdram_config is not defined
[   0.7900 ] Info: Skip generating mem_bct because sdram_config is not defined
[   0.7901 ] Copying signatures
[   0.7917 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[   0.8284 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[   0.8287 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[   0.8288 ] Boot Rom communication
[   0.8306 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned
_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[   0.8320 ] BR_CID: 0x80012344705DF2D1200000000B010100
[   0.8331 ] Sending bct_br
[   0.8332 ] Sending mb1
[   0.8337 ] Sending psc_bl1
[   0.8432 ] Sending bct_mb1
[   0.8487 ] Boot Rom communication completed
[   0.8512 ] tegrahost_v2 --chip 0x23 0 --align applet_t234_aligned.bin
[   0.8543 ] tegrahost_v2 --chip 0x23 0 --magicid MB2A --ratchet_blob ratchet_blob.bin --appendsigheader applet_t234_aligned.bin zerosbk
[   0.8557 ] adding BCH for applet_t234_aligned.bin
[   0.8780 ] tegrasign_v3.py --key None --list applet_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.8783 ] Assuming zero filled SBK key
[   0.8828 ] Warning: pub_key.key is not found
[   0.8830 ] tegrahost_v2 --chip 0x23 0 --updatesigheader applet_t234_aligned_sigheader.bin.encrypt applet_t234_aligned_sigheader.bin.hash zerosbk
[   0.8893 ] Sending mb2_applet...

[   0.8909 ] tegrarcm_v2 --chip 0x23 0 --pollbl --download applet applet_t234_sigheader.bin.encrypt
[   0.8923 ] BL: version 1.4.0.4-t234-54845784-e89ea9bc last_boot_error: 656573201
[   1.0720 ] Sending applet
[ 5239.400005] usb 1-5: USB disconnect, device number 4
[   1.0721 ] ERROR: might be timeout in USB write.
Error: Return value 3
Command tegrarcm_v2 --chip 0x23 0 --pollbl --download applet applet_t234_sigheader.bin.encrypt
[   1.1780 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   1.1810 ] Retrieving board information
[   1.1826 ] tegrarcm_v2 --chip 0x23 0 --oem platformdetails chip chip_info.bin
[   1.1842 ] Retrieving EEPROM data
[   1.1843 ] tegrarcm_v2 --oem platformdetails eeprom cvm /mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/cvm.bin --chip 0x23 0
[   1.1902 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   1.1923 ] Dumping customer Info
[   1.1938 ] tegrarcm_v2 --chip 0x23 0 --oem dump bct tmp.bct
[   1.1968 ] tegrabct_v2 --brbct tmp.bct --chip 0x23 0 --custinfo /mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/custinfo_out.bin
[   1.1982 ] File tmp.bct open failed
[   1.1984 ] Error: try getting custinfo fail. Moving on
[   1.1985 ] Rebooting to recovery mode
[   1.2000 ] tegrarcm_v2 --chip 0x23 0 --ismb2
[   1.2016 ] Rebooting to recovery mode
[   1.2032 ] tegrarcm_v2 --chip 0x23 0 --reboot recovery
[ 5239.654699] usb 1-5: new high-speed USB device number 5 using xhci_hcd
[ 5239.787974] usb 1-5: New USB device found, idVendor=0955, idProduct=7323, bcdDevice= 4.01
[ 5239.796186] usb 1-5: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[ 5239.803341] usb 1-5: Product: APX
[ 5239.806680] usb 1-5: Manufacturer: NVIDIA Corp.
Parsing board information failed.
Cleaning up...

Serial Log

[0001.806] I> MB1 (version: 1.4.0.4-t234-54845784-e89ea9bc)
[0001.811] I> t234-A01-1-Silicon (0x12347) Prod
[0001.815] I> Boot-mode : BPMP Diagnostic
[0001.819] I> Entry timestamp: 0x00000000
[0001.823] I> last_boot_error: 0x27228311
[0001.826] I> BR-BCT: preprod_dev_sign: 0
[0001.830] I> rst_source: 0xb, rst_level: 0x1
[0001.834] I> Task: Initialize MB2 params
[0001.839] I> MB2-params @ 0x40060000
[0001.842] I> Task: Crypto init
[0001.845] I> Task: Perform MB1 KAT tests
[0001.849] I> Task: NVRNG health check
[0001.852] I> NVRNG: Health check success
[0001.856] I> Task: Secure debug controls
[0001.860] I> Task: strap war set
[0001.863] I> Task: Program NV master stream id
[0001.867] I> Task: Verify boot mode
[0001.873] I> Task: Alias fuses
[0001.876] W> FUSE_ALIAS: Fuse alias on production fused part is not supported.
[0001.884] I> Task: Print SKU type
[0001.887] I> FUSE_OPT_CCPLEX_CLUSTER_DISABLE = 0x000001c0
[0001.892] I> FUSE_OPT_GPC_DISABLE = 0x00000002
[0001.896] I> FUSE_OPT_TPC_DISABLE = 0x000000f0
[0001.900] I> FUSE_OPT_DLA_DISABLE = 0x00000000
[0001.905] I> FUSE_OPT_PVA_DISABLE = 0x00000000
[0001.909] I> FUSE_OPT_NVENC_DISABLE = 0x00000000
[0001.913] I> FUSE_OPT_NVDEC_DISABLE = 0x00000000
[0001.918] I> FUSE_OPT_FSI_DISABLE = 0x00000001
[0001.922] I> FUSE_OPT_EMC_DISABLE = 0x00000000
[0001.927] I> FUSE_BOOTROM_PATCH_VERSION = 0x7
[0001.931] I> FUSE_PSCROM_PATCH_VERSION = 0x7
[0001.935] I> FUSE_OPT_ADC_CAL_FUSE_REV = 0x2
[0001.939] I> FUSE_SKU_INFO_0 = 0xd3
[0001.942] I> FUSE_OPT_SAMPLE_TYPE_0 = 0x3 PS 
[0001.946] I> FUSE_PACKAGE_INFO_0 = 0x2
[0001.950] I> SKU: Prod
[0001.952] I> Task: Boost clocks
[0001.955] I> Initializing NAFLL for BPMP_CPU_NIC.
[0001.960] I> BPMP NAFLL: fll_lock = 1, dvco_min_reached = 0
[0001.966] I> BPMP NAFLL lock success.
[0001.969] I> BPMP_CPU_NIC : src = 42, divisor = 0
[0001.974] I> Initializing PLLC2 for AXI_CBB.
[0001.978] I> AXI_CBB : src = 35, divisor = 0
[0001.982] I> Task: Voltage monitor
[0001.985] I> VMON: Vmon re-calibration and fine tuning done
[0001.991] I> Task: UPHY init
[0001.994] W> UPHY: UPHY lane info table is empty in MB1 BCT.
[0001.999] I> Task: Boot device init
[0002.002] I> Boot_device: RCM
[0002.005] I> USB configuration success
[0002.009] I> Task: TSC init
[0002.012] I> Task: Enable WDT 5th expiry
[0002.016] I> Task: I2C register
[0002.019] I> Task: Set I2C bus freq
[0002.022] I> Task: Reset FSI
[0002.025] I> Task: Enable clock-mon
[0002.029] I> FMON: Fmon re-programming done
[0002.033] I> Task: Mapper init
[0002.036] I> Task: MB1 fixed firewalls
[0002.042] W> Firewall readback mismatch
[0002.047] I> Task: Load MB2/Applet/FSKP
[0002.051] I> Loading MB2 Applet
[0002.054] I> Slot: 1
[0002.056] E> BLOCK_DEV: Failed to open blockdev.
[0002.061] E> LOADER: Failed to open blockdev 0(0).
[0002.066] E> LOADER: Failed to get storage info for binary 21 from loader.
[0002.074] C> LOADER: Could not read binary 21.
[0002.078] E> Failed to load MB2
[0002.081] C> Task 0x46 failed (err: 0x27228311)
[0002.085] E> Top caller module: MB2_PARAMS, error module: LOADER, reason: 0x11, aux_info: 0x83
[0002.094] C> Boot Info Table status dump :
0111100000111000110111111111000000011110000000000000011000001

@Jetson_tester,

Can you try flashing with this command instead?

sudo ./tools/kernel_flash/l4t_initrd_flash.sh --external-device nvme0n1p1 -c tools/kernel_flash/flash_l4t_external.xml -p '-c bootloader/generic/cfg/flash_t234_qspi.xml' --showlogs --network usb0 jetson-orin-nano-devkit internal

best regards,
Andrew
Embedded Software Engineer at ProventusNova

Please install the Secureboot package to use initrd flash for fused board
# Entry added by NVIDIA initrd flash tool
/mnt/cdrom/l4t-gcc/Linux_for_Tegra/tools/kernel_flash/tmp 127.0.0.1(rw,nohide,insecure,no_subtree_check,async,no_root_squash)
rpcbind: another rpcbind is already running. Aborting
Redirecting to /bin/systemctl restart nfs-kernel-server.service
[ 6596.628143] nfsd: last server has exited, flushing export cache
[ 6596.776183] NFSD: Using nfsdcld client tracking operations.
[ 6596.781825] NFSD: no clients to reclaim, skipping NFSv4 grace period (net f0000000)
Export list for localhost:
/mnt/cdrom/l4t-gcc/Linux_for_Tegra/tools/kernel_flash/tmp 127.0.0.1
17:06:15.812 - Debug: UFW is not installed. NFS port should be open.
17:06:15.814 - Debug: Checking VPN connections...
whack: Pluto is not running (no "/run/pluto/pluto.ctl")
17:06:15.824 - Debug: IPSec service is not running.
17:06:15.825 - Debug: VPN routes none in tun|tap|ppp|vpn|gpd.
17:06:15.827 - Debug: No VPN connection detected.
/mnt/cdrom/l4t-gcc/Linux_for_Tegra/tools/kernel_flash/l4t_initrd_flash_internal.sh --no-flash --external-device nvme0n1p1 -c tools/kernel_flash/flash_l4t_external.xml -p -c bootloader/generic/cf
g/flash_t234_qspi.xml --showlogs --network usb0 jetson-orin-nano-devkit internal
************************************
*                                  *
*  Step 1: Generate flash packages *
*                                  *
************************************
Create folder to store images to flash
Generate image for internal storage devices
/mnt/cdrom/l4t-gcc/Linux_for_Tegra/tools/kernel_flash/l4t_create_images_for_kernel_flash.sh: line 516: [: : integer expression expected
Generate images to be flashed
ADDITIONAL_DTB_OVERLAY=""  /mnt/cdrom/l4t-gcc/Linux_for_Tegra/flash.sh --no-flash --sign  -c bootloader/generic/cfg/flash_t234_qspi.xml jetson-orin-nano-devkit internal

###############################################################################
# L4T BSP Information:
# R36 , REVISION: 4.4
# User release: 0.0
###############################################################################
ECID is 0x80012344705DF2D1200000000B010100
copying device_config(/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/generic/BCT/tegra234-mb1-bct-device-p3767-0000.dts)... done.
copying misc_config(/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/generic/BCT/tegra234-mb1-bct-misc-p3767-0000.dts)... done.
copying emc_fuse_dev_params(/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/generic/BCT/tegra234-br-bct-diag-boot.dts)... done.
copying minratchet_config(/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/generic/BCT/tegra234-mb1-bct-ratchet-p3767-0000.dts)... done.
Existing emcfuse(/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/fuse_t234.xml) reused.
./tegraflash.py --chip "0x23" --applet "/mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/mb1_t234_prod.bin" --skipuid --cfg readinfo_t234_min_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --d
evice_config tegra234-mb1-bct-device-p3767-0000.dts --misc_config tegra234-mb1-bct-misc-p3767-0000.dts --bins "mb2_applet applet_t234.bin" --minratchet_config tegra234-mb1-bct-ratchet-p3767-0000
.dts --cmd "readfuses fuse_t234.bin fuse_t234.xml; dump eeprom cvm cvm.bin; dump try_custinfo custinfo_out.bin; reboot recovery" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0402 ] Reading fuses
[   0.0455 ] tegrasign_v3.py --key None --getmode mode.txt
[   0.0459 ] Assuming zero filled SBK key
[   0.0445 ] Pre-processing config: tegra234-mb1-bct-device-p3767-0000.dts
[   0.0593 ] Pre-processing config: tegra234-mb1-bct-misc-p3767-0000.dts
[   0.0809 ] Pre-processing config: tegra234-mb1-bct-ratchet-p3767-0000.dts
[   0.0957 ] Parsing partition layout
[   0.0972 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.1000 ] Kernel DTB used: None
[   0.1000 ] WARNING: dce base dtb is not provided

[   0.1000 ] Parsing partition layout
[   0.1016 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.1034 ] Creating list of images to be signed
[   0.1050 ] Generating ratchet blob
[   0.1051 ] Generating coldboot mb1-bct
[   0.1065 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb
1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin
[   0.1079 ] MB1-BCT version: 0.13

[   0.1106 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb 
[   0.1110 ] Added Platform Config 9 data with size :- 100
[   0.1115 ] 
[   0.1115 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb 
[   0.1115 ] 
[   0.1115 ] Updating mb1-bct with firmware information
[   0.1131 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.1172 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[   0.1187 ] Generating SHA2 Hash for mb1bct
[   0.1232 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha
[   0.1258 ] Sha saved in mb1_cold_boot_bct_MB1.sha
[   0.1259 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[   0.1274 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[   0.1308 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.1311 ] Assuming zero filled SBK key
[   0.1347 ] Warning: pub_key.key is not found
[   0.1348 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   0.1375 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --ratchet_blob ratchet_blob.bin --list images_list.xml zerosbk
[   0.1390 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   0.1407 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   0.1413 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   0.1591 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   0.1617 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   0.1724 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   0.1728 ] adding BCH for mb2_t234_aligned.bin
[   0.1787 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   0.2071 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   0.2101 ] adding BCH for mb2_t234_aligned.bin
[   0.2501 ] Filling MB1 storage info
[   0.2502 ] Parsing dev params for multi chains
[   0.2657 ] Generating br-bct
[   0.2673 ] Updating dev and MSS params in BR BCT
[   0.2673 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   0.2692 ] Updating bl info
[   0.2709 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin
[   0.2722 ] WARNING: boot chain is not completed. set to 0
[   0.2737 ] Generating signatures
[   0.2755 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.2759 ] Assuming zero filled SBK key
[   0.3138 ] Warning: pub_key.key is not found
[   0.3126 ] Parsing dev params for multi chains
[   0.3126 ] Generating br-bct
[   0.3143 ] Updating dev and MSS params in BR BCT
[   0.3145 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   0.3164 ] Updating bl info
[   0.3181 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[   0.3194 ] WARNING: boot chain is not completed. set to 0
[   0.3210 ] Generating SHA2 Hash
[   0.3255 ] Sha saved in br_bct_BR.sha
[   0.3239 ] Get Signed section of bct
[   0.3254 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml
[   0.3272 ] Signing BCT
[   0.3290 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.3295 ] Assuming zero filled SBK key
[   0.3352 ] Sha saved in br_bct_BR.sha
[   0.3358 ] Warning: pub_key.key is not found
[   0.3342 ] Updating BCT with signature
[   0.3358 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml
[   0.3374 ] Offset :4608 Len :3584
[   0.3380 ] Generating SHA2 Hash
[   0.3397 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512
[   0.3401 ] Assuming zero filled SBK key
[   0.3402 ] Assuming zero filled SBK key
[   0.3461 ] Sha saved in br_bct_BR.sha
[   0.3450 ] Updating BCT with SHA2 Hash
[   0.3466 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml
[   0.3481 ] Offset :4608 Len :3584
[   0.3487 ] Offset :68 Len :8124
[   0.3488 ] 
[   0.3489 ] Generating coldboot mb1-bct
[   0.3505 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb
1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin
[   0.3520 ] MB1-BCT version: 0.13

[   0.3544 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb 
[   0.3548 ] Added Platform Config 9 data with size :- 100
[   0.3551 ] 
[   0.3551 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb 
[   0.3551 ] 
[   0.3552 ] Updating mb1-bct with firmware information
[   0.3569 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.3612 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[   0.3628 ] Generating SHA2 Hash for mb1bct
[   0.3672 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha
[   0.3699 ] Sha saved in mb1_cold_boot_bct_MB1.sha
[   0.3698 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[   0.3712 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[   0.3747 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.3751 ] Assuming zero filled SBK key
[   0.3788 ] Warning: pub_key.key is not found
[   0.3789 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   0.3815 ] Generating recovery mb1-bct
[   0.3831 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratc
het-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin
[   0.3844 ] MB1-BCT version: 0.13

[   0.3869 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb 
[   0.3872 ] Added Platform Config 9 data with size :- 100
[   0.3874 ] 
[   0.3874 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb [ 6597.922603] usb 1-5: USB disconnect, device number 6

[   0.3874 ] 
[   0.3875 ] Updating mb1-bct with firmware information
[   0.3891 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.3929 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct
[   0.3945 ] Generating SHA2 Hash for mb1bct
[   0.3989 ] Sha saved in mb1_bct_MB1_aligned.sha
[   0.4015 ] Sha saved in mb1_bct_MB1.sha
[   0.4014 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_bct_MB1_aligned.bct zerosbk
[   0.4029 ] adding BCH for mb1_bct_MB1_aligned.bct
[   0.4063 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.4066 ] Assuming zero filled SBK key
[   0.4101 ] Warning: pub_key.key is not found
[   0.4102 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   0.4128 ] Info: Skip generating mem_bct because sdram_config is not defined
[   0.4128 ] Info: Skip generating mem_bct because sdram_config is not defined
[   0.4128 ] Copying signatures
[   0.4145 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[   0.4574 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[   0.4577 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[   0.4577 ] Boot Rom communication
[   0.4595 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned
_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[   0.4610 ] BR_CID: 0x80012344705DF2D1200000000B010100
[   0.4621 ] Sending bct_br
[   0.4621 ] Sending mb1
[   0.4627 ] Sending psc_bl1
[   0.4728 ] Sending bct_mb1
[   0.4787 ] Boot Rom communication completed
[   0.4813 ] tegrahost_v2 --chip 0x23 0 --align applet_t234_aligned.bin
[   0.4844 ] tegrahost_v2 --chip 0x23 0 --magicid MB2A --ratchet_blob ratchet_blob.bin --appendsigheader applet_t234_aligned.bin zerosbk
[   0.4858 ] adding BCH for applet_t234_aligned.bin
[   0.5081 ] tegrasign_v3.py --key None --list applet_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.5084 ] Assuming zero filled SBK key
[   0.5129 ] Warning: pub_key.key is not found
[   0.5131 ] tegrahost_v2 --chip 0x23 0 --updatesigheader applet_t234_aligned_sigheader.bin.encrypt applet_t234_aligned_sigheader.bin.hash zerosbk
[   0.5195 ] Sending mb2_applet...

[   0.5214 ] tegrarcm_v2 --chip 0x23 0 --pollbl --download applet applet_t234_sigheader.bin.encrypt
[   0.5228 ] BL: version [ 6598.177038] usb 1-5: new high-speed USB device number 7 using xhci_hcd
1.4.0.4-t234-54845784-e89ea9bc last_boot_error: 656573201
[   0.7031 ] Sending applet
[   0.7033 ] ERROR: might be timeout in USB write.
Error: Return value 3
Command tegrarcm_v2 --chip 0x23 0 --pollbl --download applet applet_t234_sigheader.bin.encrypt
[   0.8096 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   0.8128 ] Retrieving board information
[   0.8145 ] tegrarcm_v2 --chip 0x23 0 --oem platformdetails chip chip_info.bin
[   0.8161 ] Retrieving EEPROM data
[   0.8162 ] tegrarcm_v2 --oem platformdetails eeprom cvm /mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/cvm.bin --chip 0x23 0
[   0.8225 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   0.8243 ] Dumping customer Info
[   0.8257 ] tegrarcm_v2 --chip 0x23 0 --oem dump bct tmp.bct
[   0.8288 ] tegrabct_v2 --brbct tmp.bct --chip 0x23 0 --custinfo /mnt/cdrom/l4t-gcc/Linux_for_Tegra/bootloader/custinfo_out.bin
[   0.8302 ] File tmp.bct open failed
[ 6598.312389] usb 1-5: New USB device found, idVendor=0955, idProduct=7323, bcdDevice= 4.01
[ 6598.320599] usb 1-5: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[ 6598.327750] usb 1-5: Product: APX
[ 6598.331088] usb 1-5: Manufacturer: NVIDIA Corp.
[   0.8305 ] Error: try getting custinfo fail. Moving on
[   0.8306 ] Rebooting to recovery mode
[   0.8322 ] tegrarcm_v2 --chip 0x23 0 --ismb2
[   0.8339 ] Rebooting to recovery mode
[   0.8354 ] tegrarcm_v2 --chip 0x23 0 --reboot recovery
Parsing board information failed.
Error: failed to generate images
Cleaning up...

Still failed

It fails when sending/loading the applet on the serial console

[0028.214] I> Loading MB2 Applet
[0028.217] I> Slot: 1
[0028.220] E> BLOCK_DEV: Failed to open blockdev.
[0028.225] E> LOADER: Failed to open blockdev 0(0).
[0028.230] E> LOADER: Failed to get storage info for binary 21 from loader.
[0028.237] C> LOADER: Could not read binary 21.
[0028.241] E> Failed to load MB2
[0028.244] C> Task 0x46 failed (err: 0x27228311)
[0028.248] E> Top caller module: MB2_PARAMS, error module: LOADER, reason: 0x11, aux_info: 0x83
[0028.257] C> Boot Info Table status dump :
0111100000111000110111111111000000011110000000000000011000001

This I think is the main issue.

It is a know issue, although is hard to debug.
Since it could be the host pc, the usb cables… I have even seen flashes failed because the Jetson overheats.

On this thread NVIDIA recommends:

  • Trying for another USB cable/port
  • Using an Ubuntu 18.04 host for flashing, in case you are using 20.04
  • Disabling USB auto suspend

For now, given that it’s the easiest. Can you try with:

udo -s echo -1 > /sys/module/usbcore/parameters/autosuspend

Before running the flash command that I sent?

best regards,
Andrew
Embedded Software Engineer at ProventusNova

I have tested that before, it did not work for me. I get the same logs as I sent in my last message sadly.

That sucks, I know how frustrating it is to be hitting a non-sense error that does not let you work on something actually important.

Do you have other boards you might be able to test with ?

Is the custom board completely custom ? Or is it one of those commercial ones like CTI or Auvidea?

Do you have another linux PC we could use to test?

best regards,
Andrew
Embedded Software Engineer at ProventusNova

Its a completely custom board, where we have a CPU SOM and GPU (Nvidia) SOM on the same board. We have the image on the CPU side and flash the GPU with the CPU over the USB protocol.

I’m thinking I may have to wipe the NVMe and reflash it. Is there a method to completely wipe the NVMe while the SOM is in forced recovery mode?

Man that sounds cool !
I have played with similar board configuration in the past where we had a Jetson and co-processor. But they were usually small arm CPU’s managing Bluetooth and other peripherals.

Is removing the NVMe too complex or impossible?

best regards,
Andrew
Embedded Software Engineer at ProventusNova

Late Response but I fixed the issue

Had to wipe the NVMe drive then reflash

Steps to replicate:

  1. On the Host run this from the Linux_for_Tegra Directory while the board is in Forced Recovery Mode
sudo BOARDID=3767 BOARDSKU=0000 FAB=300 BOARDREV="" \
  ./tools/kernel_flash/l4t_initrd_flash.sh \
    --erase-all \
    --external-device nvme0n1p1 \
    -c tools/kernel_flash/flash_l4t_t234_nvme.xml \
    -p "-c bootloader/generic/cfg/flash_t234_qspi.xml" \
    --showlogs \
    jetson-orin-nano-devkit internal

This erases the NVMe drive, once finished it will attempt to boot and you will see some sort of kernel panic.

  1. Reboot the NX and get into the bios (Press ESC when the prompt appears).

  2. Put the NX in Forced Recovery Mode from the Bios
    Reflash the Board from the Host as Normal.

Seems to be a solid way of resetting everything

Thanks for your help @proventusnova

1 Like

@Jetson_tester,

Glad you fixed the issue!

Thanks for sharing the solution.

best regards,
Andrew
Embedded Software Engineer at ProventusNova

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.