New SDK manager can't flash TX2NX

@WayneWWW
Sorry! My nano devkit is tegra210-p3448-0000-p3449-0000-b00, not b01.
It’s 4G nano
I know that. But why I can use the older sdkm to flash tx2nx?
When I update, It doesn’t work?
Or any suggestion?How to flash the tx2nx?
The sdkm can auto detect the tx2nx.

@WayneWWW
I use “sudo ./flash.sh jetson-xavier-nx-devkit-tx2-nx mmcblk0p1”, but it report
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0186 ] tegrasign_v3.py --getmode mode.txt --key None
[ 0.0188 ] Assuming zero filled SBK key
[ 0.0091 ] Generating RCM messages
[ 0.0309 ] tegrarcm_v2 --listrcm rcm_list.xml --chip 0x18 0 --download rcm mb1_recovery_prod.bin 0 0
[ 0.0324 ] RCM 0 is saved as rcm_0.rcm
[ 0.0444 ] RCM 1 is saved as rcm_1.rcm
[ 0.0444 ] List of rcm files are saved in rcm_list.xml
[ 0.0444 ]
[ 0.0445 ] Signing RCM messages
[ 0.0593 ] tegrasign_v3.py --key None --list rcm_list.xml --pubkeyhash pub_key.key
[ 0.0594 ] Assuming zero filled SBK key
[ 0.1092 ] Copying signature to RCM mesages
[ 0.1124 ] tegrarcm_v2 --chip 0x18 0 --updatesig rcm_list_signed.xml
[ 0.1139 ]
[ 0.1140 ] Parsing partition layout
[ 0.1166 ] tegraparser_v2 --pt flash.xml.tmp
[ 0.1192 ]
[ 0.1193 ] Using default ramcode: 0
[ 0.1193 ] Disable BPMP dtb trim, using default dtb
[ 0.1193 ]
[ 0.1194 ] Creating list of images to be signed
[ 0.1633 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --list images_list.xml zerosbk
[ 1.0078 ]
[ 1.0079 ] Generating signatures
[ 1.0209 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key
[ 1.0210 ] Assuming zero filled SBK key
[ 2.0693 ] Generating br-bct
[ 2.1117 ] Updating dev and MSS params in BR BCT
[ 2.1120 ] tegrabct_v2 --dev_param emmc.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --brbct br_bct.cfg --chip 0x18 0
[ 2.1715 ]
[ 2.1716 ] Updating bl info
[ 2.1738 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updateblinfo flash.xml.bin --updatesig images_list_signed.xml
[ 2.1755 ]
[ 2.1756 ] Updating smd info
[ 2.1776 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 --updatesmdinfo flash.xml.bin
[ 2.1786 ]
[ 2.1786 ] Updating Odmdata
[ 2.1806 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatefields Odmdata =0x2090000
[ 2.1823 ]
[ 2.1823 ] Get Signed section of bct
[ 2.1852 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --listbct bct_list.xml
[ 2.1864 ]
[ 2.1887 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key
[ 2.1896 ] Assuming zero filled SBK key
[ 2.2853 ]
[ 2.2853 ] Updating BCT with signature
[ 2.2877 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x18 0 --updatesig bct_list_signed.xml
[ 2.2891 ]
[ 2.2892 ] Generating coldboot mb1-bct
[ 2.2917 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_cold_boot_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr mobile_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 2.2931 ] MB1-BCT version: 0xf
[ 2.2934 ] Copying Sdram info from 1 to 2 set
[ 2.3070 ] Copying Sdram info from 2 to 3 set
[ 2.3072 ] Packing sdram param for instance[0]
[ 2.3074 ] Packing sdram param for instance[1]
[ 2.3076 ] Packing sdram param for instance[2]
[ 2.3077 ] Packing sdram param for instance[3]

[ 2.3183 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg
[ 2.3187 ] Appending platform config data of size :- 2280

[ 2.3470 ] Parsing config file :mobile_scr.cfg
[ 2.3474 ] Appending platform config data of size :- 12240

[ 2.3515 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg
[ 2.3523 ] Appending platform config data of size :- 24
[ 2.3526 ]
[ 2.3526 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg
[ 2.3526 ] Appending platform config data of size :- 508
[ 2.3526 ]
[ 2.3526 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg
[ 2.3526 ] Appending platform config data of size :- 64
[ 2.3526 ]
[ 2.3526 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 2.3527 ] Appending platform config data of size :- 1628
[ 2.3527 ]
[ 2.3528 ] Updating mb1-bct with firmware information
[ 2.3557 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 2.3572 ] MB1-BCT version: 0xf
[ 2.3580 ]
[ 2.3580 ] Updating mb1-bct with storage information
[ 2.3602 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_cold_boot_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 2.3611 ] MB1-BCT version: 0xf
[ 2.3615 ]
[ 2.3636 ] tegrahost_v2 --chip 0x18 --align mb1_cold_boot_bct_MB1.bct
[ 2.3644 ]
[ 2.3664 ] tegrahost_v2 --chip 0x18 0 --appendsigheader mb1_cold_boot_bct_MB1.bct zerosbk
[ 2.3675 ]
[ 2.3799 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 2.3800 ] Assuming zero filled SBK key
[ 2.3779 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_cold_boot_bct_MB1_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_sigheader.bct.hash zerosbk
[ 2.3794 ]
[ 2.3796 ] Generating recovery mb1-bct
[ 2.3819 ] tegrabct_v2 --chip 0x18 0 --mb1bct mb1_bct.cfg --sdram tegra186-mb1-bct-memcfg-p3636-0001-a01.cfg --misc tegra186-mb1-bct-misc-si-l4t.cfg --scr minimal_scr.cfg --pinmux tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg --pmc tegra186-mb1-bct-pad-p3636-0001-a00.cfg --pmic tegra186-mb1-bct-pmic-p3636-0001-a00.cfg --brcommand tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg --prod tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 2.3830 ] MB1-BCT version: 0xf
[ 2.3834 ] Copying Sdram info from 1 to 2 set
[ 2.3968 ] Copying Sdram info from 2 to 3 set
[ 2.3970 ] Packing sdram param for instance[0]
[ 2.3972 ] Packing sdram param for instance[1]
[ 2.3974 ] Packing sdram param for instance[2]
[ 2.3975 ] Packing sdram param for instance[3]

[ 2.3977 ] Parsing config file :tegra186-mb1-bct-pinmux-p3636-0001-a00.cfg
[ 2.3980 ] Appending platform config data of size :- 2280

[ 2.3982 ] Parsing config file :minimal_scr.cfg
[ 2.3984 ] Appending platform config data of size :- 12240

[ 2.3993 ] Parsing config file :tegra186-mb1-bct-pad-p3636-0001-a00.cfg
[ 2.3995 ] Appending platform config data of size :- 24
[ 2.3995 ]
[ 2.3995 ] Parsing config file :tegra186-mb1-bct-pmic-p3636-0001-a00.cfg
[ 2.3995 ] Appending platform config data of size :- 508
[ 2.3995 ]
[ 2.3995 ] Parsing config file :tegra186-mb1-bct-bootrom-p3636-0001-a00.cfg
[ 2.3995 ] Appending platform config data of size :- 64
[ 2.3995 ]
[ 2.3995 ] Parsing config file :tegra186-mb1-bct-prod-p3636-0001-a00.cfg
[ 2.3995 ] Appending platform config data of size :- 1628
[ 2.3995 ]
[ 2.3996 ] Updating mb1-bct with firmware information
[ 2.4017 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatefwinfo flash.xml.bin
[ 2.4026 ] MB1-BCT version: 0xf
[ 2.4031 ]
[ 2.4031 ] Updating mb1-bct with storage information
[ 2.4053 ] tegrabct_v2 --chip 0x18 --mb1bct mb1_bct_MB1.bct --updatestorageinfo flash.xml.bin
[ 2.4063 ] MB1-BCT version: 0xf
[ 2.4071 ]
[ 2.4095 ] tegrahost_v2 --chip 0x18 --align mb1_bct_MB1.bct
[ 2.4103 ]
[ 2.4122 ] tegrahost_v2 --chip 0x18 0 --appendsigheader mb1_bct_MB1.bct zerosbk
[ 2.4133 ]
[ 2.4257 ] tegrasign_v3.py --key None --list mb1_bct_MB1_sigheader.bct_list.xml --pubkeyhash pub_key.key
[ 2.4258 ] Assuming zero filled SBK key
[ 2.4214 ] tegrahost_v2 --chip 0x18 0 --updatesigheader mb1_bct_MB1_sigheader.bct.encrypt mb1_bct_MB1_sigheader.bct.hash zerosbk
[ 2.4226 ]
[ 2.4228 ] Copying signatures
[ 2.4249 ] tegrahost_v2 --chip 0x18 0 --partitionlayout flash.xml.bin --updatesig images_list_signed.xml
[ 3.0297 ]
[ 3.0298 ] Boot Rom communication
[ 3.0317 ] tegrarcm_v2 --chip 0x18 0 --rcm rcm_list_signed.xml
[ 3.0330 ] BootRom is not running
[ 8.1461 ]
[ 9.1521 ] tegrarcm_v2 --isapplet
[ 9.1538 ] Applet version 01.00.0000
[ 9.1759 ]
[ 9.1760 ] Sending BCTs
[ 9.1786 ] tegrarcm_v2 --download bct_bootrom br_bct_BR.bct --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[ 9.1797 ] Applet version 01.00.0000
[ 9.1966 ] Sending bct_bootrom
[ 9.1969 ] […] 100%
[ 9.1983 ] Sending bct_mb1
[ 9.1991 ] […] 100%
[ 9.2154 ]
[ 9.2156 ] Generating blob
[ 9.2196 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery_cpu.bin
[ 9.2215 ]
[ 9.2249 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_nvtboot_recovery_cpu.bin zerosbk
[ 9.2278 ]
[ 9.2411 ] tegrasign_v3.py --key None --list blob_nvtboot_recovery_cpu_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 9.2411 ] Assuming zero filled SBK key
[ 9.2412 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_nvtboot_recovery_cpu_sigheader.bin.encrypt blob_nvtboot_recovery_cpu_sigheader.bin.hash zerosbk
[ 9.2431 ]
[ 9.2462 ] tegrahost_v2 --chip 0x18 --align blob_nvtboot_recovery.bin
[ 9.2748 ]
[ 9.2790 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_nvtboot_recovery.bin zerosbk
[ 9.3196 ]
[ 9.3336 ] tegrasign_v3.py --key None --list blob_nvtboot_recovery_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 9.3338 ] Assuming zero filled SBK key
[ 9.3368 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_nvtboot_recovery_sigheader.bin.encrypt blob_nvtboot_recovery_sigheader.bin.hash zerosbk
[ 9.3382 ]
[ 9.3407 ] tegrahost_v2 --chip 0x18 --align blob_preboot_d15_prod_cr.bin
[ 9.3420 ]
[ 9.3440 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_preboot_d15_prod_cr.bin zerosbk
[ 9.3450 ]
[ 9.3575 ] tegrasign_v3.py --key None --list blob_preboot_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 9.3576 ] Assuming zero filled SBK key
[ 9.3548 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_preboot_d15_prod_cr_sigheader.bin.encrypt blob_preboot_d15_prod_cr_sigheader.bin.hash zerosbk
[ 9.3560 ]
[ 9.3585 ] tegrahost_v2 --chip 0x18 --align blob_mce_mts_d15_prod_cr.bin
[ 9.3596 ]
[ 9.3618 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_mce_mts_d15_prod_cr.bin zerosbk
[ 9.3684 ]
[ 9.3814 ] tegrasign_v3.py --key None --list blob_mce_mts_d15_prod_cr_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 9.3816 ] Assuming zero filled SBK key
[ 9.4160 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt blob_mce_mts_d15_prod_cr_sigheader.bin.hash zerosbk
[ 9.4197 ]
[ 9.4220 ] tegrahost_v2 --chip 0x18 --align blob_bpmp.bin
[ 9.4230 ]
[ 9.4250 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_bpmp.bin zerosbk
[ 9.4269 ]
[ 9.4393 ] tegrasign_v3.py --key None --list blob_bpmp_sigheader.bin_list.xml --pubkeyhash pub_key.key
[ 9.4394 ] Assuming zero filled SBK key
[ 9.4469 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_bpmp_sigheader.bin.encrypt blob_bpmp_sigheader.bin.hash zerosbk
[ 9.4484 ]
[ 9.4505 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-bpmp-p3636-0001-a00-00.dtb
[ 9.4515 ]
[ 9.4534 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tegra186-bpmp-p3636-0001-a00-00.dtb zerosbk
[ 9.4551 ]
[ 9.4677 ] tegrasign_v3.py --key None --list blob_tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 9.4678 ] Assuming zero filled SBK key
[ 9.4661 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt blob_tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.hash zerosbk
[ 9.4676 ]
[ 9.4700 ] tegrahost_v2 --chip 0x18 --align blob_tos-trusty.img
[ 9.4711 ]
[ 9.4734 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tos-trusty.img zerosbk
[ 9.4759 ]
[ 9.4887 ] tegrasign_v3.py --key None --list blob_tos-trusty_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 9.4888 ] Assuming zero filled SBK key
[ 9.4937 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tos-trusty_sigheader.img.encrypt blob_tos-trusty_sigheader.img.hash zerosbk
[ 9.4960 ]
[ 9.4988 ] tegrahost_v2 --chip 0x18 --align blob_eks.img
[ 9.4998 ]
[ 9.5018 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_eks.img zerosbk
[ 9.5028 ]
[ 9.5151 ] tegrasign_v3.py --key None --list blob_eks_sigheader.img_list.xml --pubkeyhash pub_key.key
[ 9.5152 ] Assuming zero filled SBK key
[ 9.5107 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_eks_sigheader.img.encrypt blob_eks_sigheader.img.hash zerosbk
[ 9.5118 ]
[ 9.5141 ] tegrahost_v2 --chip 0x18 --align blob_tegra186-p3636-0001-p3509-0000-a01.dtb
[ 9.5151 ]
[ 9.5174 ] tegrahost_v2 --chip 0x18 0 --appendsigheader blob_tegra186-p3636-0001-p3509-0000-a01.dtb zerosbk
[ 9.5189 ]
[ 9.5314 ] tegrasign_v3.py --key None --list blob_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb_list.xml --pubkeyhash pub_key.key
[ 9.5315 ] Assuming zero filled SBK key
[ 9.5315 ] tegrahost_v2 --chip 0x18 0 --updatesigheader blob_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt blob_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.hash zerosbk
[ 9.5328 ]
[ 9.5352 ] tegrahost_v2 --chip 0x18 --generateblob blob.xml blob.bin
[ 9.5361 ] number of images in blob are 9
[ 9.5364 ] blobsize is 3950312
[ 9.5365 ] Added binary blob_nvtboot_recovery_cpu_sigheader.bin.encrypt of size 225152
[ 9.5386 ] Added binary blob_nvtboot_recovery_sigheader.bin.encrypt of size 122272
[ 9.5390 ] Added binary blob_preboot_d15_prod_cr_sigheader.bin.encrypt of size 58384
[ 9.5394 ] Added binary blob_mce_mts_d15_prod_cr_sigheader.bin.encrypt of size 2298464
[ 9.5402 ] Added binary blob_bpmp_sigheader.bin.encrypt of size 534816
[ 9.5410 ] Added binary blob_tegra186-bpmp-p3636-0001-a00-00_sigheader.dtb.encrypt of size 113648
[ 9.5416 ] Added binary blob_tos-trusty_sigheader.img.encrypt of size 403264
[ 9.5420 ] Added binary blob_eks_sigheader.img.encrypt of size 1440
[ 9.5423 ] Added binary blob_tegra186-p3636-0001-p3509-0000-a01_sigheader.dtb.encrypt of size 192720
[ 9.5442 ]
[ 9.5443 ] Sending bootloader and pre-requisite binaries
[ 9.5466 ] tegrarcm_v2 --download blob blob.bin
[ 9.5475 ] Applet version 01.00.0000
[ 9.5645 ] Sending blob
[ 9.5646 ] […] 100%
[ 9.9996 ]
[ 10.0025 ] tegrarcm_v2 --boot recovery
[ 10.0043 ] Applet version 01.00.0000
[ 10.0082 ]
[ 11.0146 ] tegrarcm_v2 --isapplet
[ 11.0168 ] USB communication failed.Check if device is in recovery
[ 11.5073 ]
[ 11.5336 ] tegradevflash_v2 --iscpubl
[ 11.5349 ] Bootloader version 01.00.0000
[ 11.5378 ] Bootloader version 01.00.0000
[ 11.5389 ]
[ 11.5390 ] Retrieving storage infomation
[ 11.5414 ] tegrarcm_v2 --oem platformdetails storage storage_info.bin
[ 11.5427 ] Applet is not running on device. Continue with Bootloader
[ 11.5768 ]
[ 11.5798 ] tegradevflash_v2 --oem platformdetails storage storage_info.bin
[ 11.5813 ] Bootloader version 01.00.0000
[ 11.5996 ] Saved platform info in storage_info.bin
[ 11.6045 ]
[ 11.6046 ] Flashing the device
[ 11.6065 ] tegraparser_v2 --storageinfo storage_info.bin --generategpt --pt flash.xml.bin
[ 11.6083 ]
[ 11.6108 ] tegradevflash_v2 --pt flash.xml.bin --create
[ 11.6117 ] Bootloader version 01.00.0000
[ 11.6136 ] Erasing sdmmc_boot: 3 … [Done]
[ 11.6246 ] Writing partition secondary_gpt with gpt_secondary_0_3.bin
[ 11.6250 ] […] 100%

[ 11.6387 ] Erasing sdmmc_user: 3 … [Done]
[ 12.0542 ] Writing partition master_boot_record with mbr_1_3.bin
[ 12.0548 ] […] 100%
[ 12.0588 ] Writing partition primary_gpt with gpt_primary_1_3.bin
[ 12.0609 ] […] 100%
[ 12.0655 ] Writing partition secondary_gpt with gpt_secondary_1_3.bin
[ 12.0743 ] […] 100%

[ 12.0867 ] Writing partition mb1 with mb1_prod.bin.encrypt
[ 12.0872 ] […] 100%
[ 12.0939 ] Writing partition mb1_b with mb1_prod.bin.encrypt
[ 12.0995 ] […] 100%
[ 12.1067 ] Writing partition spe-fw with spe_sigheader.bin.encrypt
[ 12.1124 ] […] 100%
[ 12.1196 ] Writing partition spe-fw_b with spe_sigheader.bin.encrypt
[ 12.1249 ] […] 100%
[ 12.1324 ] Writing partition mb2 with nvtboot_sigheader.bin.encrypt
[ 12.1377 ] […] 100%
[ 12.1449 ] Writing partition mb2_b with nvtboot_sigheader.bin.encrypt
[ 12.1507 ] […] 100%
[ 12.1579 ] Writing partition mts-preboot with preboot_d15_prod_cr_sigheader.bin.encrypt
[ 12.1641 ] […] 100%
[ 12.1707 ] Writing partition mts-preboot_b with preboot_d15_prod_cr_sigheader.bin.encrypt
[ 12.1753 ] […] 100%
[ 12.1822 ] Writing partition SMD with slot_metadata.bin
[ 12.1855 ] […] 100%
[ 12.2148 ] Writing partition SMD_b with slot_metadata.bin
[ 12.2183 ] […] 100%
[ 12.2227 ] Writing partition VER_b with emmc_bootblob_ver.txt
[ 12.2250 ] […] 100%
[ 12.2298 ] Writing partition VER with emmc_bootblob_ver.txt
[ 12.2317 ] […] 100%
[ 12.2361 ] Writing partition master_boot_record with mbr_1_3.bin
[ 12.2381 ] […] 100%
[ 12.2422 ] Writing partition APP with system.img
[ 20.0481 ] [. ] 003%
Error: Return value 3
Command tegradevflash_v2 --pt flash.xml.bin --create
Failed flashing t186ref.
What’s the mater? Write system.img wrong?

Are you using the correct carrier board now?

@WayneWWW
I am using the nano 4G carrier board. Or can you tell me where can I buy a nx carrier?
Because I just need tx2nx.

@WayneWWW
if I use “sudo ./flash.sh -S 13GiB jetson-xavier-nx-devkit-tx2-nx mmcblk1p1” and it is flashed complete.But just display the “nvidia” logo and go into the console.
Do you think the tx2nx is too small so that it can’t be flashed?

Hi,

Why do you use mmcblk1p1? Do you really understand what does that stand for here?
You should use mmcblk0p1 for the internal storage.

@WayneWWW
You are right!
Are you sure this issue is from the error carrier board?
If yes, what’s the different of nano carrier and nx carrier hardware? Because the board is out of stock anywhere. I want to manufacture by myself.

Please refer to TX2 NX product design guide - Jetson TX2 NX Product Design Guide