Jetpack Flashing Issue

I am experiencing difficulties while trying to flash Jetpack 5.0.2 in Jetson AGX Orin. I have attempted to flash it using both the SDK Manager and the flash.sh script on the host machine. However, I am encountering errors during the flashing process for Jetpack 5.0.2, whereas both methods work perfectly fine when flashing Jetpack 5.1.1. Could someone please assist me in understanding and resolving this issue?

Which Jetson AGX product? A devkit or with custom carrier board?

Jetson Agx orin

@kaycc asks whether you use a NVIDIA developer kit or custom carrier board.

Hi,

AGX Orin is just the module, and we need to know whether you are using the official DevKit or a custom carrier board.
Please also attach the log when you fail to flash it with 5.0.2. Something like I am encountering errors during the flashing process does not help at all.

I am using Official Dev Kit not custom board.


"Error while flashing through terminal:
/nvidia/nvidia_sdk/JetPack_5.0.2_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra$ sudo ./flash.sh jetson-agx-orin-devkit mmcblk0p1
[sudo] password for enord: 
###############################################################################
# L4T BSP Information:
# R35 , REVISION: 1.0
###############################################################################
# Target Board Information:
# Name: jetson-agx-orin-devkit, Board Family: t186ref, SoC: Tegra 234, 
# OpMode: production, Boot Authentication: NS, 
# Disk encryption: disabled ,
###############################################################################
copying emc_fuse_dev_params(/home/enord/nvidia/nvidia_sdk/JetPack_5.0.2_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-br-bct-diag-boot.dts)... done.
copying device_config(/home/enord/nvidia/nvidia_sdk/JetPack_5.0.2_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-device-p3701-0000.dts)... done.
copying misc_config(/home/enord/nvidia/nvidia_sdk/JetPack_5.0.2_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/t186ref/BCT/tegra234-mb1-bct-misc-p3701-0000.dts)... done.
./tegraflash.py --chip 0x23 --applet "/home/enord/nvidia/nvidia_sdk/JetPack_5.0.2_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/mb1_t234_prod.bin" --skipuid --cfg readinfo_t234_min_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --device_config tegra234-mb1-bct-device-p3701-0000.dts --misc_config tegra234-mb1-bct-misc-p3701-0000.dts --bins "mb2_applet applet_t234.bin" --cmd "dump eeprom cvm cvm.bin; dump custinfo custinfo_out.bin; reboot recovery" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0060 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   0.0066 ] File rcm_state open failed
[   0.0068 ] ERROR: failed to read rcm_state
[   0.0068 ] 
[   0.0074 ] tegrasign_v3.py --key None --getmode mode.txt
[   0.0075 ] Assuming zero filled SBK key
[   0.0070 ] Pre-processing config: tegra234-mb1-bct-device-p3701-0000.dts
[   0.0180 ] Pre-processing config: tegra234-mb1-bct-misc-p3701-0000.dts
[   0.0344 ] Parsing partition layout
[   0.0361 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.0394 ] Parsing partition layout
[   0.0412 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[   0.0433 ] Creating list of images to be signed
[   0.0448 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --list images_list.xml zerosbk
[   0.0453 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   0.0460 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   0.0462 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[   0.0554 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[   0.0562 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   0.0589 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   0.0590 ] adding BCH for mb2_t234_aligned.bin
[   0.0612 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[   0.0713 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[   0.0714 ] adding BCH for mb2_t234_aligned.bin
[   0.0902 ] Generating signatures
[   0.0908 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.0910 ] Assuming zero filled SBK key
[   0.1077 ] Warning: pub_key.key is not found
[   0.1073 ] Parsing dev params for multi chains
[   0.1153 ] Generating br-bct
[   0.1162 ] Updating dev and MSS params in BR BCT
[   0.1162 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[   0.1169 ] Updating bl info
[   0.1174 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[   0.1179 ] WARNING: boot chain is not completed. set to 0
[   0.1186 ] Get Signed section of bct
[   0.1192 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml
[   0.1206 ] Signing BCT
[   0.1213 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.1217 ] Assuming zero filled SBK key
[   0.1239 ] Sha saved in br_bct_BR.sha
[   0.1241 ] Warning: pub_key.key is not found
[   0.1235 ] Updating BCT with signature
[   0.1241 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml
[   0.1245 ] Offset :4608 Len :3584
[   0.1248 ] Generating SHA2 Hash
[   0.1254 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512
[   0.1255 ] Assuming zero filled SBK key
[   0.1255 ] Assuming zero filled SBK key
[   0.1273 ] Sha saved in br_bct_BR.sha
[   0.1269 ] Updating BCT with SHA2 Hash
[   0.1274 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml
[   0.1280 ] Offset :4608 Len :3584
[   0.1282 ] Offset :68 Len :8124
[   0.1283 ] Generating coldboot mb1-bct
[   0.1289 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3701-0000_cpp.dtb --device tegra234-mb1-bct-device-p3701-0000_cpp.dtb
[   0.1294 ] MB1-BCT version: 0.9

[   0.1303 ] Parsing config file :tegra234-mb1-bct-device-p3701-0000_cpp.dtb 
[   0.1305 ] Added Platform Config 9 data with size :- 80
[   0.1305 ] 
[   0.1305 ] Updating mb1-bct with firmware information
[   0.1310 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.1324 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[   0.1335 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[   0.1340 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[   0.1352 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.1353 ] Assuming zero filled SBK key
[   0.1363 ] Warning: pub_key.key is not found
[   0.1363 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   0.1373 ] Generating recovery mb1-bct
[   0.1378 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3701-0000_cpp.dtb --device tegra234-mb1-bct-device-p3701-0000_cpp.dtb
[   0.1383 ] MB1-BCT version: 0.9

[   0.1392 ] Parsing config file :tegra234-mb1-bct-device-p3701-0000_cpp.dtb 
[   0.1393 ] Added Platform Config 9 data with size :- 80
[   0.1393 ] 
[   0.1393 ] Updating mb1-bct with firmware information
[   0.1398 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin
[   0.1411 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct
[   0.1422 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --appendsigheader mb1_bct_MB1_aligned.bct zerosbk
[   0.1427 ] adding BCH for mb1_bct_MB1_aligned.bct
[   0.1438 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.1440 ] Assuming zero filled SBK key
[   0.1449 ] Warning: pub_key.key is not found
[   0.1449 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk
[   0.1459 ] Error: Skip generating mem_bct because sdram_config is not defined
[   0.1459 ] Error: Skip generating mem_bct because sdram_config is not defined
[   0.1459 ] Copying signatures
[   0.1464 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[   0.1501 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[   0.1502 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[   0.1502 ] Boot Rom communication
[   0.1508 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[   0.1512 ] BR_CID: 0x80012344705DD5233C00000002FD8140
[   0.2162 ] Sending bct_br
[   0.2703 ] Sending mb1
[   0.2712 ] Sending psc_bl1
[   0.2813 ] Sending bct_mb1
[   0.2875 ] Boot Rom communication completed
[   0.2905 ] tegrahost_v2 --chip 0x23 0 --align applet_t234_aligned.bin
[   0.2937 ] tegrahost_v2 --chip 0x23 0 --magicid MB2A --appendsigheader applet_t234_aligned.bin zerosbk
[   0.2953 ] adding BCH for applet_t234_aligned.bin
[   0.3080 ] tegrasign_v3.py --key None --list applet_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[   0.3081 ] Assuming zero filled SBK key
[   0.3107 ] Warning: pub_key.key is not found
[   0.3119 ] tegrahost_v2 --chip 0x23 0 --updatesigheader applet_t234_aligned_sigheader.bin.encrypt applet_t234_aligned_sigheader.bin.hash zerosbk
[   0.3142 ] Sending mb2_applet...

[   0.3147 ] tegrarcm_v2 --chip 0x23 0 --pollbl --download applet applet_t234_sigheader.bin.encrypt
[   0.3152 ] BL: version 0.23.0.0-t234-54845784-92215740 last_boot_error: 0
[   0.4733 ] Sending applet
[   0.5938 ] completed
[   0.5961 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   0.5979 ] MB2 Applet version 01.00.0000
[   0.7890 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   0.7906 ] MB2 Applet version 01.00.0000
[   0.8495 ] Retrieving board information
[   0.8513 ] tegrarcm_v2 --chip 0x23 0 --oem platformdetails chip chip_info.bin
[   0.8527 ] MB2 Applet version 01.00.0000
[   0.9076 ] Saved platform info in chip_info.bin
[   0.9127 ] Chip minor revision: 1
[   0.9128 ] Bootrom revision: 0x7
[   0.9130 ] Ram code: 0x3
[   0.9130 ] Chip sku: 0xd0
[   0.9131 ] Chip Sample: prod
[   0.9138 ] Retrieving EEPROM data
[   0.9139 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/enord/nvidia/nvidia_sdk/JetPack_5.0.2_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/cvm.bin --chip 0x23 0
[   0.9155 ] MB2 Applet version 01.00.0000
[   0.9717 ] Saved platform info in /home/enord/nvidia/nvidia_sdk/JetPack_5.0.2_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/cvm.bin
[   1.0057 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   1.0073 ] MB2 Applet version 01.00.0000
[   1.0652 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   1.0668 ] MB2 Applet version 01.00.0000
[   1.1237 ] Dumping customer Info
[   1.1260 ] tegrarcm_v2 --chip 0x23 0 --oem dump bct tmp.bct
[   1.1275 ] MB2 Applet version 01.00.0000
[   1.1843 ] Saved bct in tmp.bct
[   1.1939 ] tegrabct_v2 --brbct tmp.bct --chip 0x23 0 --custinfo /home/enord/nvidia/nvidia_sdk/JetPack_5.0.2_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/custinfo_out.bin
[   1.1953 ] C[   1.1958 ] ustomer data saved in /home/enord/nvidia/nvidia_sdk/JetPack_5.0.2_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/bootloader/custinfo_out.bin successfully
[   1.1959 ] Rebooting to recovery mode
[   1.1976 ] tegrarcm_v2 --chip 0x23 0 --ismb2
[   1.2578 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[   1.2593 ] MB2 Applet version 01.00.0000
[   1.3235 ] Booting to recovery mode
[   1.3253 ] tegrarcm_v2 --chip 0x23 0 --reboot recovery
[   1.3269 ] MB2 Applet version 01.00.0000
Board ID(3701) version(500) sku(0005) revision(M.0)
Error: missing dtbfile (/home/enord/nvidia/nvidia_sdk/JetPack_5.0.2_Linux_JETSON_AGX_ORIN_TARGETS/Linux_for_Tegra/kernel/dtb/tegra234-p3701-0005-p3737-0000.dtb).

Usage: sudo ./flash.sh [options] t186ref mmcblk0p1
    options:
        -c <cfgfile> ---------- Flash partition table config file.
        -d <dtbfile> ---------- device tree file.
        -f <flashapp> --------- Path to flash application (tegraflash.py)
        -h -------------------- print this message.
        -i <enc rfs key file>-- key for disk encryption support.
        -k <partition id> ----- partition name or number specified in flash.cfg.
        -m <mts preboot> ------ MTS preboot such as mts_preboot_si.
        -n <nfs args> --------- Static nfs network assignments
                                <Client IP>:<Server IP>:<Gateway IP>:<Netmask>
        -o <odmdata> ---------- ODM data.
        -r -------------------- skip building and reuse existing system.img.
        -t <tegraboot> -------- tegraboot binary such as nvtboot.bin
        -u <PKC key file>------ PKC key used for odm fused board.
        -v <SBK key file>------ Secure Boot Key (SBK) key used for ODM fused board.
        -w <wb0boot> ---------- warm boot binary such as nvtbootwb0.bin
        -x <tegraid> ---------- Tegra CHIPID.
        -B <boardid> ---------- BoardId.
        -C <cmdline> ---------- Kernel commandline arguments.
                                WARNING:
                                Each option in this kernel commandline gets
                                higher preference over the values set by
                                flash.sh. In case of NFS booting, this script
                                adds NFS booting related arguments, if -i option
                                is omitted.
        -F <flasher> ---------- Flash server such as cboot.bin.
        -G <file name> -------- Read partition and save image to file.
        -I <initrd> ----------- initrd file. Null initrd is default.
        -K <kernel> ----------- Kernel image file such as zImage or Image.
        -L <bootloader> ------- Bootloader such as cboot.bin or u-boot-dtb.bin.
        -M <mts boot> --------- MTS boot file such as mts_si.
        -N <nfsroot> ---------- i.e. <my IP addr>:/my/exported/nfs/rootfs.
        -R <rootfs dir> ------- Sample rootfs directory.
        -S <size> ------------- Rootfs size in bytes. Valid only for internal
                                rootdev. KiB, MiB, GiB short hands are allowed,
                                for example, 1GiB means 1024 * 1024 * 1024 bytes.
        -Z -------------------- Print configurations and then exit.
        --no-flash ------------ perform all steps except physically flashing the board.
                                This will create a system.img.
        --external-device------ Generate flash images for external devices
        --sparseupdate--------- only flash partitions that have changed. Currently only support SPI flash memory
        --no-systemimg -------- Do not create or re-create system.img.
        --bup ----------------- Generate bootloader update payload(BUP).
        --multi-spec----------- Enable support for building multi-spec BUP.
        --clean-up------------- Clean up BUP buffer when multi-spec is enabled.
        --usb-instance <id> --- Specify the USB instance to connect to;
                                <id> = USB port path (e.g. 3-14).
        --no-root-check ------- Typical usage of this script require root permissions.
                                Pass this option to allow running the script as a
                                regular user, in which case only specific combinations
                                of command-line options will be functional.
        --user_key <key_file>   User provided key file (16-byte) to encrypt user images,
                                like kernel, kernel-dtb and initrd.
                                If user_key is specified, SBK key (-v) has to be specified.
                                For now, user_key file must contain all 0's.
        --rcm-boot ------------ Do RCM boot instead of physically flashing the board.
        --sign ---------------- Sign images and store them under "bootloader/signed"
                                directory. The board will not be physically flashed.
        --image --------------- Specify the image to be written into board.
        --boot-chain-flash <c>  Flash only a specific boot chain (ex. "A, "B", "all").
                                Defaults to "all", inputs are case insensitive.
                                Not suitable for production.
        --boot-chain-select <c> Specify booting chain (ex. "A" or "B") after the board is flashed.
                                Defaults to "A", inputs are case insensitive."

Attaching a zip LOG file
SDKM_logs_JetPack_5.0.2_(rev._2)_Linux_for_Jetson_AGX_Orin_modules_2023-05-31_15-07-04.zip (120.5 KB)

Hi,

with the missing dtb file tegra234-p3701-0005-p3737-0000.dtb, looks like you are using the 64GB module, and it’s expected you won’t be able to flash JetPack 5.0.2 into it, as it’s only supported by JetPack 5.1.1or later versions.

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.