Jetson TX2 usb port not working after flashing

i’m using Jetson TX2 and Astro Carrier.
when i’m using jetpack software, it turns ‘bad system’
so i’m using sudo ./flash.sh jetson-tx2 mmcblk0p1 for flash. in terminal, there was an error message
[ 10.6872 ] tegradevflash_v2 --iscpubl
[ 10.6912 ] Cannot Open USB

*** The target t186ref has been flashed successfully. ***
Reset the board to boot from internal eMMC.

but all procedure ended clearly. and the jetson monitor shows System configuration, but no USB port work. i can’t do nothing on that page.
is there any solution here?
i’m using jetpack 4.6.5 and ubuntu 18.04

Have you contacted with vendor who provided the carrier board?

thanks to reply. no… actuallly, we use this jetson very long time, but i broken file system so reinstall jetson filesystem. i wonder why all ‘sudo ./flash.sh jetson-tx2 mmcblk0p1’ procedure ended clearly, but no usb port worked… enven i used usb-A port to flash.

Share the dmesg from uart log and attached it here.

Basically you provided not much helpful information yet but I have some comment first

  1. We don’t know what is Astro Carrier. Sounds like a custom board to me.

  2. A custom board may not work with pure image from sdkmanager. The image from sdkmanager can only guarantee working on NV developer kit. For any custom board, the better method is to check whether the vendor has customized BSP for their board.

  3. We are not able to directly tell you what is wrong on a custom board because the hardware design is made by other vendor. Sharing the software log may only tell something like “I don’t see the driver is working”. As for why it cannot work, it is not what we can directly tell.

  4. The flash port can work in flash procedure totally does not mean this usb port is okay.

Board ID(3310) version(C03) sku() revision()
Copy /home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb to /home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb.rec
copying bctfile(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/t186ref/BCT/P3310_A00_8GB_lpddr4_A02_l4t.cfg)… done.
copying misc_config(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t.cfg)… done.
copying pinmux_config(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg)… done.
copying pmic_config(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg)… done.
copying pmc_config(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg)… done.
copying prod_config(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg)… done.
copying scr_config(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/t186ref/BCT/minimal_scr.cfg)… done.
copying scr_cold_boot_config(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/t186ref/BCT/mobile_scr.cfg)… done.
copying bootrom_config(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg)… done.
copying dev_params(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/t186ref/BCT/emmc.cfg)… done.
Existing bootloader(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/nvtboot_cpu.bin) reused.
copying initrd(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/l4t_initrd.img)… done.
Making Boot image… done.
/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/tegraflash.py --chip 0x18 --key --cmd sign boot.img kernel
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0003 ] Generating signature
[ 0.0025 ] tegrasign_v3.py --getmode mode.txt --key
[ 0.0026 ] Assuming zero filled SBK key : not reading
[ 0.0026 ] sign_type : 0
[ 0.0026 ] header_magic: 414e4452
[ 0.0044 ] tegrahost_v2 --chip 0x18 --align 1_boot.img
[ 0.0051 ]
[ 0.0071 ] tegrahost_v2 --chip 0x18 0 --appendsigheader 1_boot.img zerosbk
[ 0.0087 ]
[ 0.0114 ] tegrasign_v3.py --key --list 1_boot_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 0.0114 ] Assuming zero filled SBK key : not reading
[ 0.0239 ] tegrahost_v2 --chip 0x18 0 --updatesigheader 1_boot_sigheader.img.encrypt 1_boot_sigheader.img.hash zerosbk
[ 0.0253 ]
[ 0.0259 ] Signed file: /home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/temp_user_dir/boot_sigheader.img.encrypt
l4t_sign_image.sh: Generate header for boot_sigheader.img.encrypt
l4t_sign_image.sh: chip 0x18: Don’t need to do anything
l4t_sign_image.sh: Generate 16-byte-size-aligned base file for boot_sigheader.img.encrypt
l4t_sign_image.sh: the signed file is /home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/temp_user_dir/boot_sigheader.img.encrypt
done.
Making recovery ramdisk for recovery image…
Re-generating recovery ramdisk for recovery image…
~/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/ramdisk_tmp ~/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader ~/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5
30412 blocks
_BASE_KERNEL_VERSION=4.9.337-tegra
~/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/ramdisk_tmp/lib ~/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/ramdisk_tmp ~/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader ~/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5
66034 blocks
Making Recovery image…
copying recdtbfile(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb.rec)… done.
20+0 records in
20+0 records out
20 bytes copied, 0.000396222 s, 50.5 kB/s
Existing sosfile(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/mb1_recovery_prod.bin) reused.
copying tegraboot(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/t186ref/nvtboot.bin)… done.
Existing cpu_bootloader(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/nvtboot_cpu.bin) reused.
Existing mb2blfile(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/nvtboot_recovery.bin) reused.
Existing mtspreboot(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/mce_mts_d15_prod_cr.bin) reused.
Existing mb1file(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/mb1_prod.bin) reused.
Existing bpffile(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/bpmp.bin) reused.
copying bpfdtbfile(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/t186ref/tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb)… done.
Existing scefile(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/camera-rtcpu-sce.img) reused.
Existing spefile(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/spe.bin) reused.
copying wb0boot(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/t186ref/warmboot.bin)… done.
Existing tosfile(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/tos-trusty.img) reused.
Existing eksfile(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/eks.img) reused.
./flash.sh: line 2663: [: : integer expression expected
copying dtbfile(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)… done.
Copying nv_boot_control.conf to rootfs
/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/tegraflash.py --chip 0x18 --key --cmd sign kernel_tegra186-quill-p3310-1000-c03-00-base.dtb kernel_dtb
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0005 ] Generating signature
[ 0.0028 ] tegrasign_v3.py --getmode mode.txt --key
[ 0.0029 ] Assuming zero filled SBK key : not reading
[ 0.0028 ] sign_type : 808464433
[ 0.0028 ] header_magic: d00dfeed
[ 0.0047 ] tegrahost_v2 --chip 0x18 --align 1_kernel_tegra186-quill-p3310-1000-c03-00-base.dtb
[ 0.0054 ]
[ 0.0073 ] tegrahost_v2 --chip 0x18 0 --appendsigheader 1_kernel_tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[ 0.0085 ]
[ 0.0113 ] tegrasign_v3.py --key --list 1_kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 0.0114 ] Assuming zero filled SBK key : not reading
[ 0.0197 ] tegrahost_v2 --chip 0x18 0 --updatesigheader 1_kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt 1_kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[ 0.0211 ]
[ 0.0216 ] Signed file: /home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/temp_user_dir/kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
l4t_sign_image.sh: Generate header for kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
l4t_sign_image.sh: chip 0x18: Don’t need to do anything
l4t_sign_image.sh: Generate 16-byte-size-aligned base file for kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
l4t_sign_image.sh: the signed file is /home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/temp_user_dir/kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
done.
Reusing existing system.img…
done.
Existing tbcfile(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/cboot.bin) reused.
copying tbcdtbfile(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/kernel/dtb/tegra186-quill-p3310-1000-c03-00-base.dtb)… done.
copying cfgfile(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml… done.
Existing flasher(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/tegraflash.py) reused.
./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config P3310_A00_8GB_lpddr4_A02_l4t.cfg --odmdata 0x1090000 --applet mb1_recovery_prod.bin --cmd “flash; reboot” --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --prod_config tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --dev_params emmc.cfg --bins “mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra186-quill-p3310-1000-c03-00-base.dtb” --skipuid
saving flash command in /home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/flashcmd.txt
saving Windows flash command to /home/fdl/nvidia/nvidia_sdk/JetPack_4.6.5_Linux_JETSON_TX2_TARGETS/Linux_for_Tegra_4.6.5/bootloader/flash_win.bat
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0078 ] tegrasign_v3.py --getmode mode.txt --key None
[ 0.0078 ] Assuming zero filled SBK key
[ 0.0023 ] Generating RCM messages
[ 0.0042 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[ 0.0049 ] RCM 0 is saved as rcm_0.rcm
[ 0.0052 ] RCM 1 is saved as rcm_1.rcm
[ 0.0052 ] List of rcm files are saved in rcm_list.xml
[ 0.0052 ]
[ 0.0052 ] Signing RCM messages
[ 0.0128 ] tegrasign_v3.py --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0129 ] Assuming zero filled SBK key
[ 0.0128 ] Copying signature to RCM mesages
[ 0.0150 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[ 0.0160 ]
[ 0.0160 ] Parsing partition layout
[ 0.0179 ] tegraparser_v2 --pt flash.xml.tmp
[ 0.0190 ]
[ 0.0192 ] Using default ramcode: 0
[ 0.0192 ] Disable BPMP dtb trim, using default dtb
[ 0.0192 ]
[ 0.0192 ] Creating list of images to be signed
[ 0.0211 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[ 0.1135 ]
[ 0.1136 ] Generating signatures
[ 0.1215 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key
[ 0.1217 ] Assuming zero filled SBK key
[ 0.9517 ] Generating br-bct
[ 0.9537 ] Updating dev and MSS params in BR BCT
[ 0.9538 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --brbct br_bct.cfg --chip 0x18 0
[ 0.9767 ]
[ 0.9767 ] Updating bl info
[ 0.9789 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 0.9807 ]
[ 0.9808 ] Updating smd info
[ 0.9829 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[ 0.9847 ]
[ 0.9847 ] Updating Odmdata
[ 0.9896 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000
[ 0.9911 ]
[ 0.9912 ] Get Signed section of bct
[ 0.9932 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[ 0.9941 ]
[ 0.9961 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key
[ 0.9968 ] Assuming zero filled SBK key
[ 1.0202 ]
[ 1.0202 ] Updating BCT with signature
[ 1.0220 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml
[ 1.0234 ]
[ 1.0234 ] Generating coldboot mb1-bct
[ 1.0255 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 1.0262 ] MB1-BCT version: 0xf
[ 1.0264 ] Packing sdram param for instance[0]
[ 1.0513 ] Packing sdram param for instance[1]
[ 1.0517 ] Packing sdram param for instance[2]
[ 1.0520 ] Packing sdram param for instance[3]

[ 1.0524 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg
[ 1.0532 ] Appending platform config data of size :- 3032
[ 1.0535 ]
[ 1.0535 ] Parsing config file :mobile_scr.cfg
[ 1.0535 ] Appending platform config data of size :- 12240
[ 1.0535 ]
[ 1.0535 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg
[ 1.0535 ] Appending platform config data of size :- 24
[ 1.0536 ]
[ 1.0536 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg
[ 1.0536 ] Appending platform config data of size :- 672
[ 1.0536 ]
[ 1.0536 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg
[ 1.0536 ] Appending platform config data of size :- 64
[ 1.0536 ]
[ 1.0536 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 1.0536 ] Appending platform config data of size :- 1628
[ 1.0536 ]
[ 1.0537 ] Updating mb1-bct with firmware information
[ 1.0560 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 1.0567 ] MB1-BCT version: 0xf
[ 1.0571 ]
[ 1.0571 ] Updating mb1-bct with storage information
[ 1.0591 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 1.0598 ] MB1-BCT version: 0xf
[ 1.0601 ]
[ 1.0619 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[ 1.0627 ]
[ 1.0647 ] tegrahost_v2 --chip 0x18 0 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[ 1.0655 ]
[ 1.0733 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 1.0734 ] Assuming zero filled SBK key
[ 1.0723 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[ 1.0733 ]
[ 1.0735 ] Generating recovery mb1-bct
[ 1.0761 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram P3310_A00_8GB_lpddr4_A02_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg --pmc tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg --pmic tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg --prod tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 1.0775 ] MB1-BCT version: 0xf
[ 1.0777 ] Packing sdram param for instance[0]
[ 1.1022 ] Packing sdram param for instance[1]
[ 1.1024 ] Packing sdram param for instance[2]
[ 1.1026 ] Packing sdram param for instance[3]

[ 1.1027 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3310-1000-c03.cfg
[ 1.1031 ] Appending platform config data of size :- 3032

[ 1.1033 ] Parsing config file :minimal_scr.cfg
[ 1.1035 ] Appending platform config data of size :- 12240

[ 1.1041 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3310-1000-c03.cfg
[ 1.1043 ] Appending platform config data of size :- 24
[ 1.1043 ]
[ 1.1043 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3310-1000-c04.cfg
[ 1.1043 ] Appending platform config data of size :- 672
[ 1.1043 ]
[ 1.1044 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3310-1000-c03.cfg
[ 1.1044 ] Appending platform config data of size :- 64
[ 1.1044 ]
[ 1.1044 ] Parsing config file :tegra186-mb1-bct-prod-quill-p3310-1000-c03.cfg
[ 1.1044 ] Appending platform config data of size :- 1628
[ 1.1044 ]
[ 1.1044 ] Updating mb1-bct with firmware information
[ 1.1066 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 1.1074 ] MB1-BCT version: 0xf
[ 1.1078 ]
[ 1.1078 ] Updating mb1-bct with storage information
[ 1.1097 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 1.1103 ] MB1-BCT version: 0xf
[ 1.1106 ]
[ 1.1125 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[ 1.1132 ]
[ 1.1151 ] tegrahost_v2 --chip 0x18 0 --appendsigheader mb1_bct_MB1.bct zerosbk
[ 1.1159 ]
[ 1.1237 ] tegrasign_v3.py --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 1.1238 ] Assuming zero filled SBK key
[ 1.1264 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[ 1.1278 ]
[ 1.1279 ] Copying signatures
[ 1.1299 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[ 1.4494 ]
[ 1.4495 ] Boot Rom communication
[ 1.4543 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml --skipuid
[ 1.4571 ] RCM version 0X180001
[ 1.4590 ] Boot Rom communication completed
[ 2.4655 ]
[ 3.4715 ] tegrarcm_v2 --isapplet
[ 3.4743 ] Applet version 01.00.0000
[ 3.4775 ]
[ 3.4777 ] Sending BCTs
[ 3.4821 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[ 3.4852 ] Applet version 01.00.0000
[ 3.5024 ] Sending bct_bootrom
[ 3.5030 ] […] 100%
[ 3.5048 ] Sending bct_mb1
[ 3.5054 ] […] 100%
[ 3.5218 ]
[ 3.5220 ] Generating blob
[ 3.5310 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin
[ 3.5339 ]
[ 3.5375 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[ 3.5404 ]
[ 3.5493 ] tegrasign_v3.py --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 3.5494 ] Assuming zero filled SBK key
[ 3.5570 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[ 3.5582 ]
[ 3.5603 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin
[ 3.5610 ]
[ 3.5629 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[ 3.5642 ]
[ 3.5723 ] tegrasign_v3.py --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 3.5725 ] Assuming zero filled SBK key
[ 3.5751 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[ 3.5763 ]
[ 3.5787 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin
[ 3.5794 ]
[ 3.5814 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[ 3.5823 ]
[ 3.5902 ] tegrasign_v3.py --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 3.5903 ] Assuming zero filled SBK key
[ 3.5896 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[ 3.5904 ]
[ 3.5925 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin
[ 3.5932 ]
[ 3.5955 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[ 3.6005 ]
[ 3.6091 ] tegrasign_v3.py --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 3.6092 ] Assuming zero filled SBK key
[ 3.6399 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[ 3.6429 ]
[ 3.6451 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin
[ 3.6457 ]
[ 3.6476 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_bpmp.bin zerosbk
[ 3.6490 ]
[ 3.6568 ] tegrasign_v3.py --key None --list blob_bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 3.6569 ] Assuming zero filled SBK key
[ 3.6656 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[ 3.6680 ]
[ 3.6704 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb
[ 3.6711 ]
[ 3.6731 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2.dtb zerosbk
[ 3.6746 ]
[ 3.6825 ] tegrasign_v3.py --key None --list blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 3.6826 ] Assuming zero filled SBK key
[ 3.6876 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.hash zerosbk
[ 3.6896 ]
[ 3.6923 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img
[ 3.6936 ]
[ 3.6949 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tos-trusty.img zerosbk
[ 3.6966 ]
[ 3.7049 ] tegrasign_v3.py --key None --list blob_tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 3.7049 ] Assuming zero filled SBK key
[ 3.7086 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk
[ 3.7098 ]
[ 3.7119 ] tegrahost_v2 --chip 0x18 --align blob_eks.img
[ 3.7126 ]
[ 3.7146 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_eks.img zerosbk
[ 3.7153 ]
[ 3.7231 ] tegrasign_v3.py --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 3.7232 ] Assuming zero filled SBK key
[ 3.7222 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[ 3.7237 ]
[ 3.7260 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-quill-p3310-1000-c03-00-base.dtb
[ 3.7280 ]
[ 3.7302 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tegra186-quill-p3310-1000-c03-00-base.dtb zerosbk
[ 3.7318 ]
[ 3.7397 ] tegrasign_v3.py --key None --list blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 3.7398 ] Assuming zero filled SBK key
[ 3.7427 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.hash zerosbk
[ 3.7439 ]
[ 3.7460 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin
[ 3.7467 ] number of images in blob are 9
[ 3.7469 ] blobsize is 4541416
[ 3.7470 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 225392
[ 3.7490 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 122272
[ 3.7492 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 58256
[ 3.7495 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2197920
[ 3.7504 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 534816
[ 3.7509 ] Added binary blob_tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt of size 617920
[ 3.7515 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 407360
[ 3.7519 ] Added binary blob_eks_sigheader.img.encrypt of size 1440
[ 3.7522 ] Added binary blob_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt of size 375888
[ 3.7537 ]
[ 3.7538 ] Sending bootloader and pre-requisite binaries
[ 3.7560 ] tegrarcm_v2 --download blob blob.bin
[ 3.7567 ] Applet version 01.00.0000
[ 3.7738 ] Sending blob
[ 3.7739 ] […] 100%
[ 4.2776 ]
[ 4.2823 ] tegrarcm_v2 --boot recovery
[ 4.2851 ] Applet version 01.00.0000
[ 4.2892 ]
[ 5.2937 ] tegrarcm_v2 --isapplet
[ 5.7409 ]
[ 5.7459 ] tegradevflash_v2 --iscpubl
[ 5.7499 ] Cannot Open USB
[ 6.2012 ]
[ 7.2072 ] tegrarcm_v2 --isapplet
[ 7.2126 ]
[ 7.2174 ] tegradevflash_v2 --iscpubl
[ 7.2203 ] Bootloader version 01.00.0000
[ 7.2422 ] Bootloader version 01.00.0000
[ 7.2423 ]
[ 7.2425 ] Retrieving storage infomation
[ 7.2481 ] tegrarcm_v2 --oem platformdetails storage storage_info.bin
[ 7.2529 ] Applet is not running on device. Continue with Bootloader
[ 7.2702 ]
[ 7.2745 ] tegradevflash_v2 --oem platformdetails storage storage_info.bin
[ 7.2762 ] Bootloader version 01.00.0000
[ 7.2924 ] Saved platform info in storage_info.bin
[ 7.2968 ]
[ 7.2968 ] Flashing the device
[ 7.2995 ] tegraparser_v2 --storageinfo storage_info.bin --generategpt --pt flash.xml.bin
[ 7.3009 ]
[ 7.3031 ] tegradevflash_v2 --pt flash.xml.bin --create
[ 7.3038 ] Bootloader version 01.00.0000
[ 7.3059 ] Erasing sdmmc_boot: 3 … [Done]
[ 7.3172 ] Writing partition secondary_gpt with gpt_secondary_0_3.bin
[ 7.3175 ] […] 100%

[ 7.3303 ] Erasing sdmmc_user: 3 … [Done]
[ 8.0161 ] Writing partition master_boot_record with mbr_1_3.bin
[ 8.0175 ] […] 100%
[ 8.0212 ] Writing partition primary_gpt with gpt_primary_1_3.bin
[ 8.0231 ] […] 100%
[ 8.0274 ] Writing partition secondary_gpt with gpt_secondary_1_3.bin
[ 8.0408 ] […] 100%

[ 8.0525 ] Writing partition mb1 with mb1_prod.bin.encrypt
[ 8.0537 ] […] 100%
[ 8.0609 ] Writing partition mb1_b with mb1_prod.bin.encrypt
[ 8.0668 ] […] 100%
[ 8.0746 ] Writing partition spe-fw with spe_sigheader.bin.encrypt
[ 8.0789 ] […] 100%
[ 8.0850 ] Writing partition spe-fw_b with spe_sigheader.bin.encrypt
[ 8.0905 ] […] 100%
[ 8.0970 ] Writing partition mb2 with nvtboot_sigheader.bin.encrypt
[ 8.1030 ] […] 100%
[ 8.1100 ] Writing partition mb2_b with nvtboot_sigheader.bin.encrypt
[ 8.1157 ] […] 100%
[ 8.1231 ] Writing partition mts-preboot with preboot_d15_prod_cr_sigheader.bin.encrypt
[ 8.1289 ] […] 100%
[ 8.1348 ] Writing partition mts-preboot_b with preboot_d15_prod_cr_sigheader.bin.encrypt
[ 8.1400 ] […] 100%
[ 8.1463 ] Writing partition SMD with slot_metadata.bin
[ 8.1511 ] […] 100%
[ 8.1551 ] Writing partition SMD_b with slot_metadata.bin
[ 8.1571 ] […] 100%
[ 8.1614 ] Writing partition VER_b with emmc_bootblob_ver.txt
[ 8.1634 ] […] 100%
[ 8.1677 ] Writing partition VER with emmc_bootblob_ver.txt
[ 8.1696 ] […] 100%
[ 8.1738 ] Writing partition master_boot_record with mbr_1_3.bin
[ 8.1758 ] […] 100%
[ 8.1797 ] Writing partition APP with system.img
[ 8.1814 ] […] 100%090%
[ 239.0562 ] Writing partition mts-bootpack with mce_mts_d15_prod_cr_sigheader.bin.encrypt
[ 239.0844 ] […] 100%
[ 239.1800 ] Writing partition mts-bootpack_b with mce_mts_d15_prod_cr_sigheader.bin.encrypt
[ 239.1874 ] […] 100%
[ 239.2951 ] Writing partition cpu-bootloader with cboot_sigheader.bin.encrypt
[ 239.3014 ] […] 100%
[ 239.3157 ] Writing partition cpu-bootloader_b with cboot_sigheader.bin.encrypt
[ 239.3237 ] […] 100%
[ 239.3368 ] Writing partition bootloader-dtb with tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
[ 239.3443 ] […] 100%
[ 239.3584 ] Writing partition bootloader-dtb_b with tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
[ 239.3687 ] […] 100%
[ 239.3846 ] Writing partition secure-os with tos-trusty_sigheader.img.encrypt
[ 239.3945 ] […] 100%
[ 239.4098 ] Writing partition secure-os_b with tos-trusty_sigheader.img.encrypt
[ 239.4196 ] […] 100%
[ 239.4384 ] Writing partition eks with eks_sigheader.img.encrypt
[ 239.4484 ] […] 100%
[ 239.4527 ] Writing partition adsp-fw with adsp-fw_sigheader.bin.encrypt
[ 239.4562 ] […] 100%
[ 239.4623 ] Writing partition adsp-fw_b with adsp-fw_sigheader.bin.encrypt
[ 239.4677 ] […] 100%
[ 239.4744 ] Writing partition bpmp-fw with bpmp_sigheader.bin.encrypt
[ 239.4798 ] […] 100%
[ 239.4998 ] Writing partition bpmp-fw_b with bpmp_sigheader.bin.encrypt
[ 239.5124 ] […] 100%
[ 239.5345 ] Writing partition bpmp-fw-dtb with tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt
[ 239.5476 ] […] 100%
[ 239.5692 ] Writing partition bpmp-fw-dtb_b with tegra186-a02-bpmp-quill-p3310-1000-c04-00-te770d-ucm2_sigheader.dtb.encrypt
[ 239.5840 ] […] 100%
[ 239.6045 ] Writing partition sce-fw with camera-rtcpu-sce_sigheader.img.encrypt
[ 239.6169 ] […] 100%
[ 239.6244 ] Writing partition sce-fw_b with camera-rtcpu-sce_sigheader.img.encrypt
[ 239.6306 ] […] 100%
[ 239.6381 ] Writing partition sc7 with warmboot_wbheader.bin.encrypt
[ 239.6448 ] […] 100%
[ 239.6493 ] Writing partition sc7_b with warmboot_wbheader.bin.encrypt
[ 239.6538 ] […] 100%
[ 239.6585 ] Writing partition BMP with bmp.blob
[ 239.6631 ] […] 100%
[ 239.6712 ] Writing partition BMP_b with bmp.blob
[ 239.6778 ] […] 100%
[ 239.6861 ] Writing partition recovery with recovery_sigheader.img.encrypt
[ 239.6936 ] […] 100%
[ 241.9553 ] Writing partition recovery-dtb with tegra186-quill-p3310-1000-c03-00-base.dtb_sigheader.rec.encrypt
[ 241.9654 ] […] 100%
[ 241.9803 ] Writing partition kernel-bootctrl with kernel_bootctrl.bin
[ 241.9907 ] […] 100%
[ 241.9953 ] Writing partition kernel-bootctrl_b with kernel_bootctrl.bin
[ 241.9974 ] […] 100%
[ 242.0025 ] Writing partition kernel with boot_sigheader.img.encrypt
[ 242.0045 ] […] 100%
[ 242.0254 ] Writing partition kernel_b with boot_sigheader.img.encrypt
[ 242.0372 ] […] 100%
[ 242.0582 ] Writing partition kernel-dtb with kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
[ 242.0701 ] […] 100%
[ 242.0832 ] Writing partition kernel-dtb_b with kernel_tegra186-quill-p3310-1000-c03-00-base_sigheader.dtb.encrypt
[ 242.0954 ] […] 100%
[ 242.1196 ]
[ 242.1218 ] tegradevflash_v2 --write BCT br_bct_BR.bct
[ 242.1225 ] Bootloader version 01.00.0000
[ 242.1243 ] Writing partition BCT with br_bct_BR.bct
[ 242.1247 ] […] 100%
[ 242.1336 ]
[ 242.1369 ] tegradevflash_v2 --write MB1_BCT mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 242.1378 ] Bootloader version 01.00.0000
[ 242.1396 ] Writing partition MB1_BCT with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 242.1404 ] […] 100%
[ 242.1503 ]
[ 242.1536 ] tegradevflash_v2 --write MB1_BCT_b mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 242.1564 ] Bootloader version 01.00.0000
[ 242.1599 ] Writing partition MB1_BCT_b with mb1_cold_boot_bct_MB1_sigheader.bct.encrypt
[ 242.1616 ] […] 100%
[ 242.1692 ]
[ 242.1694 ] Flashing completed

[ 242.1695 ] Coldbooting the device
[ 242.1740 ] tegradevflash_v2 --reboot coldboot
[ 242.1779 ] Bootloader version 01.00.0000
[ 242.1807 ]
*** The target t186ref has been flashed successfully. ***
Reset the board to boot from internal eMMC.

and i found [FAILED] Failed to start Configure USB flashing port for device mode during jetson boot. other people suffer same thing said there’s problem in sdk version…

  1. Please learn to dump the log. What you posted is not what we need…
    https://www.jetsonhacks.com/2017/03/24/serial-console-nvidia-jetson-tx2/

  2. You shared a post which I replied in 2021 and the conclusion is still same as what I am telling even now…

You better reading the post first… If you don’t understand, I can explain again. But these things won’t change…

im sorry… i read document about carrier, they say i can use jetpack from nvidia.

NVIDIA Linux For Tegra (L4T)
The Astro Carrier Board is designed to be used with the stock NVIDIA Linux For Tegra (L4T) Builds.
However, the Connect Tech Board Support Package is required for full functionality.
NVIDIA’s L4T can be downloaded directly from NVIDIA here:

NVIDIA Jetpack for L4T
The JetPack for L4T is an on-demand all-in-one package that bundles and installs all software tools
required to develop for the NVIDIA’s TX2/TX2i Platform with Connect Tech’s Jetson Carrier Boards.
JetPack includes host and target development tools, APIs and packages (OS images, tools, APIs,
middleware, samples, documentation including compiling samples) to enable developers to jump start
their development environment for developing with the Jetson Embedded Platform. The latest release
of JetPack runs on an Ubuntu 14.04 Linux 64-bit host system and supports both the latest Jetson
TX2/TX2i Development Kit and Jetson TK1 Development Kit.
NVIDIA’s Jetpack can be downloaded directly from NVIDIA here:

im tryinig to “Please learn to dump the log. What you posted is not what we need…” sorry i am noob to linux…

Please make sure you are using the same Jetpack image as before with that comment “I used this board for long time” .

If the image is same, but the usb port is suddenly broken, then it is highly possible a hardware defect.

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.