Jetson TX2i broken EMMC

Hi, I have a Jetson TX2i on a custom carrier. It was working normally until a few days ago when it stopped booting. After debugging it, I found that nothing was coming through the UART and the power consumption was quite low relative to the nominal. So I opted to flash it, but it hangs during the process. The captured logs are the following:

Flash log:

###############################################################################
# L4T BSP Information:
# R32 , REVISION: 3.1
###############################################################################
# Target Board Information:
# Name: jetson-tx2i, Board Family: t186ref, SoC: Tegra 186, 
# OpMode: production, Boot Authentication: NS, 
###############################################################################
./tegraflash.py --chip 0x18 --applet "/root/LFT/bootloader/mb1_recovery_prod.bin" --skipuid --cmd "dump eeprom boardinfo cvm.bin" 
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.4059 ] Generating RCM messages
[   0.5054 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm /root/LFT/bootloader/mb1_recovery_prod.bin 0 0
[   0.5768 ] RCM 0 is saved as rcm_0.rcm
[   0.6999 ] RCM 1 is saved as rcm_1.rcm
[   0.7009 ] List of rcm files are saved in rcm_list.xml
[   0.7012 ] 
[   0.7030 ] Signing RCM messages
[   0.7580 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.8480 ] Assuming zero filled SBK key
[   1.1967 ] 
[   1.2009 ] Copying signature to RCM mesages
[   1.2637 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   1.4001 ] 
[   1.4059 ] Boot Rom communication
[   1.4608 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml --skipuid
[   1.5206 ] RCM version 0X180001
[   1.6271 ] Boot Rom communication completed
[   2.6630 ] 
[   3.7327 ] tegrarcm_v2 --isapplet
[   3.9341 ] 
[   4.0768 ] tegradevflash_v2 --iscpubl
[   4.1542 ] Cannot Open USB
[   4.5327 ] 
[   5.6040 ] tegrarcm_v2 --isapplet
[   5.6611 ] Applet version 01.00.0000
[   5.7572 ] 
[   5.8130 ] Retrieving EEPROM data
[   5.8209 ] tegrarcm_v2 --oem platformdetails eeprom cvm /root/LFT/bootloader/cvm.bin
[   5.8767 ] Applet version 01.00.0000
[   6.0257 ] Saved platform info in /root/LFT/bootloader/cvm.bin
[   6.1558 ] 
creating dummy /root/LFT/bootloader/badpage.bin
Copy /root/LFT/kernel/dtb/tegra186-quill-p3489-1000-a00-00-ucm1.dtb to /root/LFT/kernel/dtb/tegra186-quill-p3489-1000-a00-00-ucm1.dtb.rec
copying bctfile(/root/LFT/bootloader/t186ref/BCT/P3489_A00_8GB_Samsung_8GB_lpddr4_204Mhz_P134_A02_ECC_en_l4t.cfg)... done.
copying misc_config(/root/LFT/bootloader/t186ref/BCT/tegra186-mb1-bct-misc-si-l4t-storm.cfg)... done.
copying pinmux_config(/root/LFT/bootloader/t186ref/BCT/tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg)... done.
copying pmic_config(/root/LFT/bootloader/t186ref/BCT/tegra186-mb1-bct-pmic-quill-p3489-1000-a00.cfg)... done.
copying pmc_config(/root/LFT/bootloader/t186ref/BCT/tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg)... done.
copying prod_config(/root/LFT/bootloader/t186ref/BCT/tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg)... done.
copying scr_config(/root/LFT/bootloader/t186ref/BCT/minimal_scr.cfg)... done.
copying scr_cold_boot_config(/root/LFT/bootloader/t186ref/BCT/mobile_scr.cfg)... done.
copying bootrom_config(/root/LFT/bootloader/t186ref/BCT/tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg)... done.
copying dev_params(/root/LFT/bootloader/t186ref/BCT/emmc.cfg)... done.
Existing bootloader(/root/LFT/bootloader/nvtboot_cpu.bin) reused.
copying initrd(/root/LFT/bootloader/l4t_initrd.img)... done.
	populating kernel to rootfs... done.
	populating initrd to rootfs... done.
	populating /root/LFT/kernel/dtb/tegra186-quill-p3489-1000-a00-00-ucm1.dtb to rootfs... done.
Making Boot image... done.
Existing sosfile(/root/LFT/bootloader/mb1_recovery_prod.bin) reused.
copying tegraboot(/root/LFT/bootloader/t186ref/nvtboot.bin)... done.
Existing cpu_bootloader(/root/LFT/bootloader/nvtboot_cpu.bin) reused.
Existing mb2blfile(/root/LFT/bootloader/nvtboot_recovery.bin) reused.
Existing mtspreboot(/root/LFT/bootloader/preboot_d15_prod_cr.bin) reused.
Existing mts(/root/LFT/bootloader/mce_mts_d15_prod_cr.bin) reused.
Existing mb1file(/root/LFT/bootloader/mb1_prod.bin) reused.
Existing bpffile(/root/LFT/bootloader/bpmp.bin) reused.
copying bpfdtbfile(/root/LFT/bootloader/t186ref/tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1.dtb)... done.
Existing scefile(/root/LFT/bootloader/camera-rtcpu-sce.img) reused.
Existing spefile(/root/LFT/bootloader/spe.bin) reused.
Existing drameccfile(/root/LFT/bootloader/dram-ecc.bin) reused.
Existing badpagefile(/root/LFT/bootloader/badpage.bin) reused.
copying wb0boot(/root/LFT/bootloader/t186ref/warmboot.bin)... done.
Existing tosfile(/root/LFT/bootloader/tos-trusty.img) reused.
Existing eksfile(/root/LFT/bootloader/eks.img) reused.
copying dtbfile(/root/LFT/kernel/dtb/tegra186-quill-p3489-1000-a00-00-ucm1.dtb)... done.
Copying nv_boot_control.conf to rootfs
Making system.img... 
	populating rootfs from /root/LFT/rootfs ... done.
	Sync'ing system.img ... done.
	Converting RAW image to Sparse image... 
done.
system.img built successfully. 
Existing tbcfile(/root/LFT/bootloader/cboot.bin) reused.
copying tbcdtbfile(/root/LFT/kernel/dtb/tegra186-quill-p3489-1000-a00-00-ucm1.dtb)... done.
copying cfgfile(/root/LFT/bootloader/t186ref/cfg/flash_l4t_t186.xml) to flash.xml... done.
Existing flasher(/root/LFT/bootloader/nvtboot_recovery_cpu.bin) reused.
Existing flashapp(/root/LFT/bootloader/tegraflash.py) reused.
./tegraflash.py --bl nvtboot_recovery_cpu.bin --sdram_config P3489_A00_8GB_Samsung_8GB_lpddr4_204Mhz_P134_A02_ECC_en_l4t.cfg --odmdata 0x1090000 --applet mb1_recovery_prod.bin --cmd "flash; reboot"  --cfg flash.xml --chip 0x18 --misc_config tegra186-mb1-bct-misc-si-l4t-storm.cfg --pinmux_config tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg --pmic_config tegra186-mb1-bct-pmic-quill-p3489-1000-a00.cfg --pmc_config tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg --prod_config tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg --scr_config minimal_scr.cfg --scr_cold_boot_config mobile_scr.cfg --br_cmd_config tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg --dev_params emmc.cfg  --bins "mb2_bootloader nvtboot_recovery.bin; mts_preboot preboot_d15_prod_cr.bin; mts_bootpack mce_mts_d15_prod_cr.bin; bpmp_fw bpmp.bin; bpmp_fw_dtb tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1.dtb; tlk tos-trusty.img; eks eks.img; bootloader_dtb tegra186-quill-p3489-1000-a00-00-ucm1.dtb"   
saving flash command in /root/LFT/bootloader/flashcmd.txt
saving Windows flash command to /root/LFT/bootloader/flash_win.bat
*** Flashing target device started. ***
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands
 
[   0.0967 ] tegrasign_v2 --key None --getmode mode.txt
[   0.2038 ] Assuming zero filled SBK key
[   0.2827 ] 
[   0.2887 ] Generating RCM messages
[   0.3596 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[   0.4508 ] RCM 0 is saved as rcm_0.rcm
[   0.5452 ] RCM 1 is saved as rcm_1.rcm
[   0.5470 ] List of rcm files are saved in rcm_list.xml
[   0.5492 ] 
[   0.5505 ] Signing RCM messages
[   0.6062 ] tegrasign_v2 --key None --list rcm_list.xml --pubkeyhash pub_key.key
[   0.6717 ] Assuming zero filled SBK key
[   0.9289 ] 
[   0.9320 ] Copying signature to RCM mesages
[   0.9981 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[   1.1318 ] 
[   1.1346 ] Parsing partition layout
[   1.2002 ] tegraparser_v2 --pt flash.xml.tmp
[   1.3781 ] 
[   1.3807 ] Creating list of images to be signed
[   1.4381 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[   3.3810 ] 
[   3.3828 ] Generating signatures
[   3.4402 ] tegrasign_v2 --key None --list images_list.xml --pubkeyhash pub_key.key
[   3.4997 ] Assuming zero filled SBK key
[  11.4839 ] 
[  11.4877 ] Generating br-bct
[  11.5599 ] Updating dev and MSS params in BR BCT
[  11.5711 ] tegrabct_v2 --dev_param emmc.cfg --sdram P3489_A00_8GB_Samsung_8GB_lpddr4_204Mhz_P134_A02_ECC_en_l4t.cfg --brbct br_bct.cfg --chip 0x18 0
[  12.2137 ] 
[  12.2151 ] Updating bl info
[  12.2731 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[  12.4362 ] 
[  12.4386 ] Updating smd info
[  12.4927 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[  12.5997 ] 
[  12.6027 ] Updating Odmdata
[  12.6558 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x1090000
[  12.7622 ] 
[  12.7655 ] Get Signed section of bct
[  12.8228 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[  12.9227 ] 
[  12.9829 ] tegrasign_v2 --key None --list bct_list.xml --pubkeyhash pub_key.key
[  13.0430 ] Assuming zero filled SBK key
[  13.0860 ] 
[  13.0872 ] Updating BCT with signature
[  13.1449 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml
[  13.2508 ] 
[  13.2548 ] Generating coldboot mb1-bct
[  13.3150 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram P3489_A00_8GB_Samsung_8GB_lpddr4_204Mhz_P134_A02_ECC_en_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t-storm.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg --pmc tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg --pmic tegra186-mb1-bct-pmic-quill-p3489-1000-a00.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg --prod tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg
[  13.3870 ] MB1-BCT version: 0xf
[  13.5210 ] Copying Sdram info from 1 to 2 set
[  14.0836 ] Copying Sdram info from 2 to 3 set
[  14.3252 ] Packing sdram param for instance[0]
[  14.5612 ] Packing sdram param for instance[1]
[  14.8310 ] Packing sdram param for instance[2]
[  14.8321 ] Packing sdram param for instance[3]
[  14.8340 ] 
[  14.8347 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg 
[  14.8357 ] Appending platform config data of size :- 2952
[  14.8361 ] 
[  14.8363 ] Parsing config file :mobile_scr.cfg 
[  14.8377 ] Appending platform config data of size :- 12240
[  14.8380 ] 
[  14.8381 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg 
[  14.8385 ] Appending platform config data of size :- 24
[  14.8388 ] 
[  14.8389 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3489-1000-a00.cfg 
[  14.8391 ] Appending platform config data of size :- 744
[  14.8394 ] 
[  14.8396 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg 
[  14.8399 ] Appending platform config data of size :- 64
[  14.8401 ] 
[  14.8404 ] Parsing config file :tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg 
[  14.8406 ] Appending platform config data of size :- 2132
[  14.8408 ] 
[  14.8421 ] Updating mb1-bct with firmware information
[  14.9017 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[  14.9751 ] MB1-BCT version: 0xf
[  15.0681 ] 
[  15.0700 ] Updating mb1-bct with storage information
[  15.1291 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[  15.2071 ] MB1-BCT version: 0xf
[  15.3172 ] 
[  15.3780 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[  15.4471 ] 
[  15.5081 ] tegrahost_v2 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[  15.6058 ] 
[  15.7520 ] tegrasign_v2 --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[  15.8125 ] Assuming zero filled SBK key
[  15.9647 ] 
[  16.0677 ] tegrahost_v2 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[  16.1652 ] 
[  16.1711 ] Generating recovery mb1-bct
[  16.2290 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram P3489_A00_8GB_Samsung_8GB_lpddr4_204Mhz_P134_A02_ECC_en_l4t.cfg --misc tegra186-mb1-bct-misc-si-l4t-storm.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg --pmc tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg --pmic tegra186-mb1-bct-pmic-quill-p3489-1000-a00.cfg --brcommand tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg --prod tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg
[  16.3059 ] MB1-BCT version: 0xf
[  16.4303 ] Copying Sdram info from 1 to 2 set
[  17.0959 ] Copying Sdram info from 2 to 3 set
[  17.2658 ] Packing sdram param for instance[0]
[  17.2667 ] Packing sdram param for instance[1]
[  17.2670 ] Packing sdram param for instance[2]
[  17.2675 ] Packing sdram param for instance[3]
[  17.2679 ] 
[  17.2682 ] Parsing config file :tegra186-mb1-bct-pinmux-quill-p3489-1000-a00.cfg 
[  17.2696 ] Appending platform config data of size :- 2952
[  17.2700 ] 
[  17.2702 ] Parsing config file :minimal_scr.cfg 
[  17.2707 ] Appending platform config data of size :- 12240
[  17.2710 ] 
[  17.2712 ] Parsing config file :tegra186-mb1-bct-pad-quill-p3489-1000-a00.cfg 
[  17.2716 ] Appending platform config data of size :- 24
[  17.2718 ] 
[  17.2720 ] Parsing config file :tegra186-mb1-bct-pmic-quill-p3489-1000-a00.cfg 
[  17.2722 ] Appending platform config data of size :- 744
[  17.2736 ] 
[  17.2739 ] Parsing config file :tegra186-mb1-bct-bootrom-quill-p3489-1000-a00.cfg 
[  17.2742 ] Appending platform config data of size :- 64
[  17.2745 ] 
[  17.2748 ] Parsing config file :tegra186-mb1-bct-prod-storm-p3489-1000-a00.cfg 
[  17.2750 ] Appending platform config data of size :- 2132
[  17.2752 ] 
[  17.2778 ] Updating mb1-bct with firmware information
[  17.3356 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[  17.4018 ] MB1-BCT version: 0xf
[  17.4787 ] 
[  17.4819 ] Updating mb1-bct with storage information
[  17.5456 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[  17.6102 ] MB1-BCT version: 0xf
[  17.6957 ] 
[  17.7529 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[  17.8232 ] 
[  17.8899 ] tegrahost_v2 --appendsigheader mb1_bct_MB1.bct zerosbk
[  17.9736 ] 
[  18.0550 ] tegrasign_v2 --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[  18.1251 ] Assuming zero filled SBK key
[  18.2966 ] 
[  18.3889 ] tegrahost_v2 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[  18.4767 ] 
[  18.4822 ] Copying signatures
[  18.5477 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[  20.2965 ] 
[  20.2982 ] Boot Rom communication
[  20.3542 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[  20.4140 ] BootRom is not running
[  25.6029 ] 
[  26.6740 ] tegrarcm_v2 --isapplet
[  26.7338 ] Applet version 01.00.0000
[  26.8179 ] 
[  26.8218 ] Sending BCTs
[  26.8830 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[  26.9429 ] Applet version 01.00.0000
[  27.1072 ] Sending bct_bootrom
[  27.2100 ] [................................................] 100%
[  27.3566 ] Sending bct_mb1
[  27.3889 ] [................................................] 100%
[  36.5047 ] 
[  36.5089 ] Generating blob
[  36.5737 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin
[  36.6491 ] 
[  36.7110 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[  36.8193 ] 
[  36.9167 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  36.9765 ] Assuming zero filled SBK key
[  37.2152 ] 
[  37.3041 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[  37.4072 ] 
[  37.4811 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin
[  37.5439 ] 
[  37.6032 ] tegrahost_v2 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[  37.6957 ] 
[  37.7831 ] tegrasign_v2 --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  37.8721 ] Assuming zero filled SBK key
[  38.0320 ] 
[  38.1267 ] tegrahost_v2 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[  38.2249 ] 
[  38.2962 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin
[  38.3642 ] 
[  38.4273 ] tegrahost_v2 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[  38.5119 ] 
[  38.6006 ] tegrasign_v2 --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  38.6580 ] Assuming zero filled SBK key
[  38.7712 ] 
[  38.8708 ] tegrahost_v2 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[  38.9610 ] 
[  39.0276 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin
[  39.1071 ] 
[  39.1702 ] tegrahost_v2 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[  39.4861 ] 
[  39.5675 ] tegrasign_v2 --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  39.6256 ] Assuming zero filled SBK key
[  41.2158 ] 
[  41.3096 ] tegrahost_v2 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[  41.5772 ] 
[  41.6451 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin
[  41.7220 ] 
[  41.7792 ] tegrahost_v2 --appendsigheader blob_bpmp.bin zerosbk
[  41.9560 ] 
[  42.1338 ] tegrasign_v2 --key None --list blob_bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key
[  42.1880 ] Assuming zero filled SBK key
[  42.7032 ] 
[  42.7942 ] tegrahost_v2 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[  42.9294 ] 
[  42.9986 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1.dtb
[  43.0730 ] 
[  43.1332 ] tegrahost_v2 --appendsigheader blob_tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1.dtb zerosbk
[  43.2218 ] 
[  43.3023 ] tegrasign_v2 --key None --list blob_tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[  43.3571 ] Assuming zero filled SBK key
[  43.5471 ] 
[  43.6309 ] tegrahost_v2 --updatesigheader blob_tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1_sigheader.dtb.encrypt blob_tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1_sigheader.dtb.hash zerosbk
[  43.7235 ] 
[  43.7945 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img
[  43.8770 ] 
[  43.9379 ] tegrahost_v2 --appendsigheader blob_tos-trusty.img zerosbk
[  44.0537 ] 
[  44.1391 ] tegrasign_v2 --key None --list blob_tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key
[  44.1972 ] Assuming zero filled SBK key
[  44.5050 ] 
[  44.5881 ] tegrahost_v2 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk
[  44.7011 ] 
[  44.7775 ] tegrahost_v2 --chip 0x18 --align blob_eks.img
[  44.8497 ] 
[  44.9078 ] tegrahost_v2 --appendsigheader blob_eks.img zerosbk
[  44.9830 ] 
[  45.0661 ] tegrasign_v2 --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[  45.1277 ] Assuming zero filled SBK key
[  45.1747 ] 
[  45.2652 ] tegrahost_v2 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[  45.3487 ] 
[  45.4121 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-quill-p3489-1000-a00-00-ucm1.dtb
[  45.4740 ] 
[  45.5320 ] tegrahost_v2 --appendsigheader blob_tegra186-quill-p3489-1000-a00-00-ucm1.dtb zerosbk
[  45.6560 ] 
[  45.7429 ] tegrasign_v2 --key None --list blob_tegra186-quill-p3489-1000-a00-00-ucm1_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[  45.8091 ] Assuming zero filled SBK key
[  46.3020 ] 
[  46.3872 ] tegrahost_v2 --updatesigheader blob_tegra186-quill-p3489-1000-a00-00-ucm1_sigheader.dtb.encrypt blob_tegra186-quill-p3489-1000-a00-00-ucm1_sigheader.dtb.hash zerosbk
[  46.5032 ] 
[  46.5835 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin
[  46.6390 ] number of images in blob are 9
[  46.8996 ] blobsize is 3744408
[  47.0400 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 220096
[  47.4996 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 89776
[  47.7870 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 63104
[  48.1741 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2082144
[  48.6261 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 533904
[  48.6269 ] Added binary blob_tegra186-a02-bpmp-storm-p3489-a00-00-ta795sa-ucm1_sigheader.dtb.encrypt of size 76080
[  48.6272 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 313152
[  48.6276 ] Added binary blob_eks_sigheader.img.encrypt of size 1440
[  48.6279 ] Added binary blob_tegra186-quill-p3489-1000-a00-00-ucm1_sigheader.dtb.encrypt of size 364560
[  48.6281 ] 
[  48.6309 ] Sending bootloader and pre-requisite binaries
[  48.6927 ] tegrarcm_v2 --download blob blob.bin
[  48.7578 ] Applet version 01.00.0000
[  48.8928 ] Sending blob
[  48.9182 ] [..............                                  ] 028%
[  48.9182 ] [............................                    ] 056%
[  48.9182 ] [..........................................      ] 084%
[  48.9182 ] [................................................] 100%
[  50.0698 ] 
[  50.1329 ] tegrarcm_v2 --boot recovery
[  50.1958 ] Applet version 01.00.0000
[  50.3059 ] 
[  51.3661 ] tegrarcm_v2 --isapplet
[ 1081.3389 ] 
[ 1081.4403 ] tegradevflash_v2 --iscpubl
[ 1081.5439 ] CPU Bootloader is not running on device.
[ 2097.1559 ] 
[ 2098.2223 ] tegrarcm_v2 --isapplet
[ 3112.9455 ] 
[ 3113.0032 ] tegradevflash_v2 --iscpubl
[ 3113.0630 ] CPU Bootloader is not running on device.
[ 4128.7602 ] 
[ 4129.8248 ] tegrarcm_v2 --isapplet
[ 5144.5652 ] 
[ 5144.6296 ] tegradevflash_v2 --iscpubl
[ 5144.6859 ] CPU Bootloader is not running on device.
[ 5884.4382 ] 
[ 5885.5311 ] tegrarcm_v2 --isapplet
[ 5885.6130 ] USB communication failed.Check if device is in recovery
[ 5885.6716 ] 
[ 5885.7467 ] tegradevflash_v2 --iscpubl
[ 5885.8127 ] Cannot Open USB
[ 5885.8778 ] 
[ 5886.9397 ] tegrarcm_v2 --isapplet
[ 5887.0031 ] USB communication failed.Check if device is in recovery
[ 5887.0630 ] 
[ 5887.1336 ] tegradevflash_v2 --iscpubl
[ 5887.2058 ] Cannot Open USB
[ 5887.2743 ] 
[ 5888.3389 ] tegrarcm_v2 --isapplet
[ 5888.4018 ] USB communication failed.Check if device is in recovery
[ 5888.4605 ] 
[ 5888.5151 ] tegradevflash_v2 --iscpubl
[ 5888.5670 ] Cannot Open USB
[ 5888.6177 ] 
[ 5889.6780 ] tegrarcm_v2 --isapplet
[ 5889.7419 ] USB communication failed.Check if device is in recovery
[ 5889.7982 ] 
[ 5889.8606 ] tegradevflash_v2 --iscpubl
[ 5889.9212 ] Cannot Open USB
[ 5889.9752 ] 
[ 5891.0321 ] tegrarcm_v2 --isapplet
[ 5891.0899 ] USB communication failed.Check if device is in recovery
[ 5891.1481 ] 
[ 5891.2075 ] tegradevflash_v2 --iscpubl
[ 5891.2648 ] Cannot Open USB
[ 5891.3270 ] 
[ 5892.3885 ] tegrarcm_v2 --isapplet
[ 5892.4481 ] USB communication failed.Check if device is in recovery
[ 5892.5022 ] 
[ 5892.5569 ] tegradevflash_v2 --iscpubl
[ 5892.6112 ] Cannot Open USB
[ 5892.6638 ] 
[ 5893.7249 ] tegrarcm_v2 --isapplet
[ 5893.7869 ] USB communication failed.Check if device is in recovery
[ 5893.8451 ] 
[ 5893.9001 ] tegradevflash_v2 --iscpubl
[ 5893.9596 ] Cannot Open USB
[ 5894.0155 ] 
[ 5895.0768 ] tegrarcm_v2 --isapplet
[ 5895.1391 ] USB communication failed.Check if device is in recovery
[ 5895.1978 ] 
[ 5895.2622 ] tegradevflash_v2 --iscpubl
[ 5895.3241 ] Cannot Open USB
[ 5895.3800 ] 
[ 5896.4400 ] tegrarcm_v2 --isapplet
[ 5896.5009 ] USB communication failed.Check if device is in recovery
[ 5896.5579 ] 
[ 5896.6148 ] tegradevflash_v2 --iscpubl
[ 5896.6712 ] Cannot Open USB
[ 5896.7218 ] 
[ 5897.7889 ] tegrarcm_v2 --isapplet
[ 5897.8509 ] USB communication failed.Check if device is in recovery
[ 5897.9092 ] 
[ 5897.9700 ] tegradevflash_v2 --iscpubl
[ 5898.0235 ] Cannot Open USB
[ 5898.0808 ] 
[ 5899.1392 ] tegrarcm_v2 --isapplet
[ 5899.2008 ] USB communication failed.Check if device is in recovery
[ 5899.2631 ] 
[ 5899.3232 ] tegradevflash_v2 --iscpubl
[ 5899.3816 ] Cannot Open USB
[ 5899.4313 ] 
[ 5900.4897 ] tegrarcm_v2 --isapplet
[ 5900.5488 ] USB communication failed.Check if device is in recovery
[ 5900.6050 ] 
[ 5900.6627 ] tegradevflash_v2 --iscpubl
[ 5900.7206 ] Cannot Open USB
[ 5900.7736 ] 
[ 5901.8302 ] tegrarcm_v2 --isapplet
[ 5901.8896 ] USB communication failed.Check if device is in recovery
[ 5901.9477 ] 
[ 5902.0086 ] tegradevflash_v2 --iscpubl
[ 5902.0787 ] Cannot Open USB
[ 5902.1368 ] 
[ 5903.2009 ] tegrarcm_v2 --isapplet
[ 5903.2616 ] USB communication failed.Check if device is in recovery
[ 5903.3211 ] 
[ 5903.3779 ] tegradevflash_v2 --iscpubl
[ 5903.4410 ] Cannot Open USB
[ 5903.4961 ] 
[ 5904.5585 ] tegrarcm_v2 --isapplet
[ 5904.6199 ] USB communication failed.Check if device is in recovery
[ 5904.6767 ] 
[ 5904.7351 ] tegradevflash_v2 --iscpubl
[ 5904.7985 ] Cannot Open USB
[ 5904.8530 ] 
[ 5905.9181 ] tegrarcm_v2 --isapplet
[ 5905.9902 ] USB communication failed.Check if device is in recovery
[ 5906.0480 ] 
[ 5906.1078 ] tegradevflash_v2 --iscpubl
[ 5906.1727 ] Cannot Open USB
[ 5906.2319 ] 
[ 5907.3019 ] tegrarcm_v2 --isapplet
[ 5907.3600 ] USB communication failed.Check if device is in recovery
[ 5907.4181 ] 
[ 5907.4776 ] tegradevflash_v2 --iscpubl
[ 5907.5359 ] Cannot Open USB
[ 5907.5895 ] 
[ 5908.6501 ] tegrarcm_v2 --isapplet
[ 5908.7100 ] USB communication failed.Check if device is in recovery
[ 5908.7693 ] 
[ 5908.8258 ] tegradevflash_v2 --iscpubl
[ 5908.8802 ] Cannot Open USB
[ 5908.9307 ] 
[ 5909.9915 ] tegrarcm_v2 --isapplet
[ 5910.0529 ] USB communication failed.Check if device is in recovery
[ 5910.1085 ] 
[ 5910.1672 ] tegradevflash_v2 --iscpubl
[ 5910.2301 ] Cannot Open USB
[ 5910.2930 ] 
[ 5911.3546 ] tegrarcm_v2 --isapplet
[ 5911.4119 ] USB communication failed.Check if device is in recovery
[ 5911.4688 ] 
[ 5911.5252 ] tegradevflash_v2 --iscpubl
[ 5911.5830 ] Cannot Open USB
[ 5911.6432 ] 
[ 5912.7061 ] tegrarcm_v2 --isapplet
[ 5912.7877 ] USB communication failed.Check if device is in recovery
[ 5912.8753 ] 
[ 5912.9360 ] tegradevflash_v2 --iscpubl
[ 5912.9954 ] Cannot Open USB
[ 5913.0521 ] 
[ 5914.1169 ] tegrarcm_v2 --isapplet
[ 5914.1843 ] USB communication failed.Check if device is in recovery
[ 5914.2417 ] 
[ 5914.3101 ] tegradevflash_v2 --iscpubl
[ 5914.3670 ] Cannot Open USB
[ 5914.4291 ] 
[ 5915.4889 ] tegrarcm_v2 --isapplet
[ 5915.5477 ] USB communication failed.Check if device is in recovery
[ 5915.6041 ] 
[ 5915.6642 ] tegradevflash_v2 --iscpubl
[ 5915.7198 ] Cannot Open USB
[ 5915.7791 ] 
[ 5916.8401 ] tegrarcm_v2 --isapplet
[ 5916.9031 ] USB communication failed.Check if device is in recovery
[ 5916.9569 ] 
[ 5917.0146 ] tegradevflash_v2 --iscpubl
[ 5917.0728 ] Cannot Open USB
[ 5917.1222 ] 
[ 5918.1879 ] tegrarcm_v2 --isapplet
[ 5918.2552 ] USB communication failed.Check if device is in recovery
[ 5918.3197 ] 
[ 5918.3841 ] tegradevflash_v2 --iscpubl
[ 5918.4422 ] Cannot Open USB
[ 5918.4972 ] 
[ 5919.5568 ] tegrarcm_v2 --isapplet
[ 5919.6159 ] USB communication failed.Check if device is in recovery
[ 5919.6709 ] 
[ 5919.7331 ] tegradevflash_v2 --iscpubl
[ 5919.7969 ] Cannot Open USB
[ 5919.8471 ] 
[ 5920.9132 ] tegrarcm_v2 --isapplet
[ 5920.9745 ] USB communication failed.Check if device is in recovery
[ 5921.0281 ] 
[ 5921.0847 ] tegradevflash_v2 --iscpubl
[ 5921.1451 ] Cannot Open USB
[ 5921.1960 ] 
Error: None of the bootloaders are running on device. Check the UART log.
Failed flashing t186ref.

UART log:

[1401.390] C> I2C command failed
[1401.393] C> block index = (4) and rail_id = (1)
[1401.398] C> Addr: Reg = [0xe8:0x07]: 336166925
[1401.402] C> I2C command failed
[1401.405] C> block index = (5) and rail_id = (1)
[1401.410] C> Addr: Reg = [0xe8:0x07]: 336166925

[1425.135] I> Welcome to MB2(TBoot-BPMP) Recovery(version: 01.00.160913-t186-M-00.00-mobile-e33577f2)
[1425.144] I> bit @ 0xd480000
[1425.147] I> Boot-device: eMMC
[1425.178] E> Error in command_complete 18001 int_status
[1425.183] E> Error opening sdmmc-3
[1425.186] E> Failed to initialize boot device
[1425.191] E> Top caller module: SDMMC, error module: SDMMC, reason: 0x06, aux_info: 0x07
[1425.198] C> Hang

It seems that the EMMC cannot be initialized.

One thing to consider is that I do not have physical access to the Jetson to test it in another carrier.

Is there anything I can do to recover the Jetson? Does the error confirm that the EMMC is broken?

Thanks.

Hi,
Would suggest flash multiple Jetpack 4 versions for a try. If neither version can be flashed and the device is in warranty, please do RMA:

Jetson FAQ | NVIDIA Developer

Hi,
From the comment it looks like it cannot access the EMMC in TX2i module. Please check if you can re-flash the system and share which stage you are failing:

  1. Enter recovery mode
  2. Flash the system image
  3. Reboot
  4. Boot to the userspace

Please share the full UART log, and which Jetpack version you are using.

Not sure if you have the system images based on multiple Jetpack versions. If you have like 4.6.2 and 4.6.3 images for the custom board, please try all the versions and see if it hits the same error. To clarify it is more like a HW or SW issue.

Hi @DaneLLL , thanks for the follow up.

Which Jetpack version you are using.

The BSP version I am using is the 32.3.1 with some modifications for my custom carrier. Just to carify, I am using the same BSP on other Jetsons with the same custom carrier and it is working.

Please share the full UART log

The full UART log is the one I pasted. Nothing else comes out of the UART during the flash process.

Please try all the versions and see if it hits the same error.

I will try using newer BSPs to see if the problem persists.

Please check if you can re-flash the system and share which stage you are failing

I tried flashing it several times but it it always fails.

Now, while debugging, I found that the MB2 binary that attempts to initialize the eMMC during the recovery is nvtboot_recovery.bin. I do not have access to the source code of that binary (maybe you do) but it seems that uses the same sdmmc driver as cboot. Checking in the cboot sources, I found that the Error in command_complete 18001 int_status message is generated by the following function:

static tegrabl_error_t sdmmc_wait_command_complete(sdmmc_context_t *context,
    uint32_t cmd_reg, uint32_t arg)                             
{
    ...
    int_status = sdmmc_readl(context, INTERRUPT_STATUS);
    ...
    if ((int_status & err_mask) != 0U) {
        pr_debug("Error in command_complete %x int_status\n", int_status);
        error =  TEGRABL_ERROR(TEGRABL_ERR_COMMAND_FAILED, 0);
        goto fail;
    }
    ...
}         

The int_status interrupt register binary value is 11000000000000001. According to the hwinc-t18x/arsdmmc.h header file, the high bits are:

  • Bit 16: SDMMC_INTERRUPT_STATUS_0_COMMAND_TIMEOUT_ERR
  • Bit 15: SDMMC_INTERRUPT_STATUS_0_ERR_INTERRUPT
  • Bit 0: SDMMC_INTERRUPT_STATUS_0_CMD_COMPLETE

So it seems that the issue is a timeout when reading a register from the card. Have you experienced a similar behavior in another Jetson module? Can you think of anything else I can test/try via software on the module?

Hi,
In MB2 stage it will try to access the eMMC and then proceed. It fails in the step and looks like the eMMC is physically broken.

If the same software image works on another TX2i module + the custom board, it may indicate the software is good.