Setting Jetson Orin NX to not detect EEPROM on custom board

Hello,

I am struggling with getting my Jetson to stop searching for EEPROM modules on my custom board.

I have seen another post where they solve the issue by editing the dts file:

I have done the same and flashed my board again and no change, the Jetson will not boot.

Another important factor is that I am booting my Jetson from USB using a portable SSD.

I appreciate any help, thank you.

*** Please note that this reply is generated by LLM automatically ***

I understand your concern about the Jetson Orin NX searching for EEPROM modules on your custom board. It seems like you’ve tried editing the dts file to set the EEPROM read size to 0, but it didn’t resolve the issue.

Firstly, let’s clarify that the EEPROM is used to store configuration data, such as the MAC address, and is typically used on the Jetson developer kit. However, on a custom board, you might not need the EEPROM.

To resolve the issue, you can try the following:

  1. Verify the EEPROM read size: Double-check that you’ve correctly set the EEPROM read size to 0 in the dts file. Make sure you’ve updated the correct file and that the changes have been applied to the device tree.
  2. Disable EEPROM search: You can try disabling the EEPROM search by adding the following line to the bootargs variable in the extlinux.conf file:
bootargs=... eeprom=0 ...

This will tell the bootloader to skip searching for the EEPROM.

  1. Use the SKIP_EEPROM_CHECK environment variable: As mentioned in the documentation, you can set the SKIP_EEPROM_CHECK environment variable to 1 when flashing the device. This will skip the EEPROM check during the flashing process.
$sudo SKIP_EEPROM_CHECK=1 BOARDID=<BOARDID> BOARDSKU=<BOARDSKU> ./flash.sh <board> <rootdev>
  1. Check the boot logs: Analyze the boot logs to see if there are any error messages related to the EEPROM. This might give you a hint about what’s going wrong.

Regarding your comment about booting from a USB portable SSD, it shouldn’t affect the EEPROM search. However, make sure that the SSD is properly configured and that the Jetson is able to boot from it correctly.

In comparison to the post you mentioned, it’s possible that the issue is not exactly the same. The post mentions a “Custom carrier with nano read error eeprom” which might be a different issue. However, the solution of setting the EEPROM read size to 0 is a common approach to resolve EEPROM-related issues.

If none of these solutions work, please provide more details about your custom board, the dts file changes you made, and the boot logs. This will help me better understand the issue and provide a more accurate solution.

*** Please give the thumbs up if you get answers you like. Or provide feedback to help us improve the answer. ***

Hi,

Please provide the flashing log, flashing commands and the serial console log for us to review.

Thanks

Here is the flashing command:

sudo ./flash.sh jetson-orin-nano-devkit mmblk0p1

And this is the log:
##############################################################################

L4T BSP Information:

R36 , REVISION: 4.4

User release: 0.0

###############################################################################
ECID is 0x80012344705E01638800000019038140

Target Board Information:

Name: jetson-orin-nano-devkit, Board Family: generic, SoC: Tegra 234,

OpMode: production, Boot Authentication: NS,

Disk encryption: disabled ,

###############################################################################
copying device_config(/home/ed2/nvidia/nvidia_sdk/JetPack_6.2.1_Linux_JETSON_ORIN_NX_TARGETS/Linux_for_Tegra/bootloader/generic/BCT/tegra234-mb1-bct-device-p3767-0000.dts)… done.
copying misc_config(/home/ed2/nvidia/nvidia_sdk/JetPack_6.2.1_Linux_JETSON_ORIN_NX_TARGETS/Linux_for_Tegra/bootloader/generic/BCT/tegra234-mb1-bct-misc-p3767-0000.dts)… done.
copying emc_fuse_dev_params(/home/ed2/nvidia/nvidia_sdk/JetPack_6.2.1_Linux_JETSON_ORIN_NX_TARGETS/Linux_for_Tegra/bootloader/generic/BCT/tegra234-br-bct-diag-boot.dts)… done.
copying minratchet_config(/home/ed2/nvidia/nvidia_sdk/JetPack_6.2.1_Linux_JETSON_ORIN_NX_TARGETS/Linux_for_Tegra/bootloader/generic/BCT/tegra234-mb1-bct-ratchet-p3767-0000.dts)… done.
Existing emcfuse(/home/ed2/nvidia/nvidia_sdk/JetPack_6.2.1_Linux_JETSON_ORIN_NX_TARGETS/Linux_for_Tegra/bootloader/fuse_t234.xml) reused.
./tegraflash.py --chip “0x23” --applet “/home/ed2/nvidia/nvidia_sdk/JetPack_6.2.1_Linux_JETSON_ORIN_NX_TARGETS/Linux_for_Tegra/bootloader/mb1_t234_prod.bin” --skipuid --cfg readinfo_t234_min_prod.xml --dev_params tegra234-br-bct-diag-boot.dts --device_config tegra234-mb1-bct-device-p3767-0000.dts --misc_config tegra234-mb1-bct-misc-p3767-0000.dts --bins “mb2_applet applet_t234.bin” --minratchet_config tegra234-mb1-bct-ratchet-p3767-0000.dts --cmd “readfuses fuse_t234.bin fuse_t234.xml; dump eeprom cvm cvm.bin; dump try_custinfo custinfo_out.bin; reboot recovery”
Welcome to Tegra Flash
version 1.0.0
Type ? or help for help and q or quit to exit
Use ! to execute system commands

[ 0.0221 ] Reading fuses
[ 0.0249 ] tegrasign_v3.py --key None --getmode mode.txt
[ 0.0253 ] Assuming zero filled SBK key
[ 0.0248 ] Pre-processing config: tegra234-mb1-bct-device-p3767-0000.dts
[ 0.0308 ] Pre-processing config: tegra234-mb1-bct-misc-p3767-0000.dts
[ 0.0406 ] Pre-processing config: tegra234-mb1-bct-ratchet-p3767-0000.dts
[ 0.0469 ] Parsing partition layout
[ 0.0478 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[ 0.0494 ] Kernel DTB used: None
[ 0.0495 ] WARNING: dce base dtb is not provided

[ 0.0495 ] Parsing partition layout
[ 0.0504 ] tegraparser_v2 --pt readinfo_t234_min_prod.xml.tmp
[ 0.0517 ] Creating list of images to be signed
[ 0.0529 ] Generating ratchet blob
[ 0.0529 ] Generating coldboot mb1-bct
[ 0.0539 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin
[ 0.0549 ] MB1-BCT version: 0.13

[ 0.0565 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb
[ 0.0570 ] Added Platform Config 9 data with size :- 100
[ 0.0570 ]
[ 0.0570 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb
[ 0.0570 ]
[ 0.0571 ] Updating mb1-bct with firmware information
[ 0.0580 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin
[ 0.0606 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[ 0.0615 ] Generating SHA2 Hash for mb1bct
[ 0.0637 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha
[ 0.0651 ] Sha saved in mb1_cold_boot_bct_MB1.sha
[ 0.0653 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[ 0.0661 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[ 0.0677 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.0679 ] Assuming zero filled SBK key
[ 0.0697 ] Warning: pub_key.key is not found
[ 0.0699 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[ 0.0716 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --ratchet_blob ratchet_blob.bin --list images_list.xml zerosbk
[ 0.0726 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[ 0.0734 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[ 0.0738 ] MB1: Nvheader already present is mb1_t234_prod_aligned.bin
[ 0.0914 ] Header already present for mb1_t234_prod_aligned_sigheader.bin
[ 0.0980 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[ 0.1102 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[ 0.1106 ] adding BCH for mb2_t234_aligned.bin
[ 0.1182 ] MB1: Nvheader already present is psc_bl1_t234_prod_aligned.bin
[ 0.1475 ] Header already present for psc_bl1_t234_prod_aligned_sigheader.bin
[ 0.1507 ] adding BCH for mb2_t234_aligned.bin
[ 0.2066 ] Filling MB1 storage info
[ 0.2066 ] Parsing dev params for multi chains
[ 0.2147 ] Generating br-bct
[ 0.2158 ] Updating dev and MSS params in BR BCT
[ 0.2159 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[ 0.2172 ] Updating bl info
[ 0.2183 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin
[ 0.2193 ] WARNING: boot chain is not completed. set to 0
[ 0.2201 ] Generating signatures
[ 0.2209 ] tegrasign_v3.py --key None --list images_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.2211 ] Assuming zero filled SBK key
[ 0.2675 ] Warning: pub_key.key is not found
[ 0.2671 ] Parsing dev params for multi chains
[ 0.2671 ] Generating br-bct
[ 0.2682 ] Updating dev and MSS params in BR BCT
[ 0.2684 ] tegrabct_v2 --dev_param tegra234-br-bct-diag-boot_cpp.dtb --brbct br_bct.cfg --chip 0x23 0
[ 0.2696 ] Updating bl info
[ 0.2706 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updateblinfo readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[ 0.2716 ] WARNING: boot chain is not completed. set to 0
[ 0.2730 ] Generating SHA2 Hash
[ 0.2754 ] Sha saved in br_bct_BR.sha
[ 0.2748 ] Get Signed section of bct
[ 0.2760 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --listbct bct_list.xml
[ 0.2772 ] Signing BCT
[ 0.2780 ] tegrasign_v3.py --key None --list bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.2783 ] Assuming zero filled SBK key
[ 0.2821 ] Sha saved in br_bct_BR.sha
[ 0.2825 ] Warning: pub_key.key is not found
[ 0.2818 ] Updating BCT with signature
[ 0.2829 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesig bct_list_signed.xml
[ 0.2839 ] Offset :4608 Len :3584
[ 0.2845 ] Generating SHA2 Hash
[ 0.2852 ] tegrasign_v3.py --key None --list bct_list.xml --sha sha512
[ 0.2855 ] Assuming zero filled SBK key
[ 0.2855 ] Assuming zero filled SBK key
[ 0.2894 ] Sha saved in br_bct_BR.sha
[ 0.2891 ] Updating BCT with SHA2 Hash
[ 0.2901 ] tegrabct_v2 --brbct br_bct_BR.bct --chip 0x23 0 --updatesha bct_list_signed.xml
[ 0.2911 ] Offset :4608 Len :3584
[ 0.2913 ] Offset :68 Len :8124
[ 0.2917 ] Generating coldboot mb1-bct
[ 0.2928 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin
[ 0.2937 ] MB1-BCT version: 0.13

[ 0.2956 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb
[ 0.2959 ] Added Platform Config 9 data with size :- 100

[ 0.2961 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb
[ 0.2963 ] Updating mb1-bct with firmware information
[ 0.2973 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_cold_boot_bct_MB1.bct --updatefwinfo readinfo_t234_min_prod.xml.bin
[ 0.3000 ] tegrahost_v2 --chip 0x23 0 --align mb1_cold_boot_bct_MB1_aligned.bct
[ 0.3011 ] Generating SHA2 Hash for mb1bct
[ 0.3035 ] Sha saved in mb1_cold_boot_bct_MB1_aligned.sha
[ 0.3052 ] Sha saved in mb1_cold_boot_bct_MB1.sha
[ 0.3058 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_cold_boot_bct_MB1_aligned.bct zerosbk
[ 0.3069 ] adding BCH for mb1_cold_boot_bct_MB1_aligned.bct
[ 0.3087 ] tegrasign_v3.py --key None --list mb1_cold_boot_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.3090 ] Assuming zero filled SBK key
[ 0.3118 ] Warning: pub_key.key is not found
[ 0.3123 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_cold_boot_bct_MB1_aligned_sigheader.bct.encrypt mb1_cold_boot_bct_MB1_aligned_sigheader.bct.hash zerosbk
[ 0.3144 ] Generating recovery mb1-bct
[ 0.3155 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct.cfg --misc tegra234-mb1-bct-misc-p3767-0000_cpp.dtb --device tegra234-mb1-bct-device-p3767-0000_cpp.dtb --minratchet tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb --ratchet_blob ratchet_blob.bin
[ 0.3165 ] MB1-BCT version: 0.13

[ 0.3184 ] Parsing config file :tegra234-mb1-bct-device-p3767-0000_cpp.dtb
[ 0.3188 ] Added Platform Config 9 data with size :- 100
[ 0.3188 ]
[ 0.3188 ] Parsing config file :tegra234-mb1-bct-ratchet-p3767-0000_cpp.dtb
[ 0.3188 ]
[ 0.3189 ] Updating mb1-bct with firmware information
[ 0.3199 ] tegrabct_v2 --chip 0x23 0 --mb1bct mb1_bct_MB1.bct --recov --updatefwinfo readinfo_t234_min_prod.xml.bin
[ 0.3227 ] tegrahost_v2 --chip 0x23 0 --align mb1_bct_MB1_aligned.bct
[ 0.3237 ] Generating SHA2 Hash for mb1bct
[ 0.3262 ] Sha saved in mb1_bct_MB1_aligned.sha
[ 0.3279 ] Sha saved in mb1_bct_MB1.sha
[ 0.3283 ] tegrahost_v2 --chip 0x23 0 --magicid MBCT --ratchet_blob ratchet_blob.bin --appendsigheader mb1_bct_MB1_aligned.bct zerosbk
[ 0.3293 ] adding BCH for mb1_bct_MB1_aligned.bct
[ 0.3310 ] tegrasign_v3.py --key None --list mb1_bct_MB1_aligned_sigheader.bct_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.3312 ] Assuming zero filled SBK key
[ 0.3332 ] Warning: pub_key.key is not found
[ 0.3335 ] tegrahost_v2 --chip 0x23 0 --updatesigheader mb1_bct_MB1_aligned_sigheader.bct.encrypt mb1_bct_MB1_aligned_sigheader.bct.hash zerosbk
[ 0.3354 ] Info: Skip generating mem_bct because sdram_config is not defined
[ 0.3354 ] Info: Skip generating mem_bct because sdram_config is not defined
[ 0.3354 ] Copying signatures
[ 0.3365 ] tegrahost_v2 --chip 0x23 0 --partitionlayout readinfo_t234_min_prod.xml.bin --updatesig images_list_signed.xml
[ 0.3867 ] mb1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[ 0.3873 ] psc_bl1_t234_prod_aligned_sigheader.bin.encrypt filename is from images_list
[ 0.3873 ] Boot Rom communication
[ 0.3908 ] tegrarcm_v2 --new_session --chip 0x23 0 --uid --download bct_br br_bct_BR.bct --download mb1 mb1_t234_prod_aligned_sigheader.bin.encrypt --download psc_bl1 psc_bl1_t234_prod_aligned_sigheader.bin.encrypt --download bct_mb1 mb1_bct_MB1_sigheader.bct.encrypt
[ 0.3940 ] BR_CID: 0x80012344705E01638800000019038140
[ 0.4210 ] Sending bct_br
[ 0.4717 ] Sending mb1
[ 0.4728 ] Sending psc_bl1
[ 0.4853 ] Sending bct_mb1
[ 0.4921 ] Boot Rom communication completed
[ 0.4968 ] tegrahost_v2 --chip 0x23 0 --align applet_t234_aligned.bin
[ 0.5040 ] tegrahost_v2 --chip 0x23 0 --magicid MB2A --ratchet_blob ratchet_blob.bin --appendsigheader applet_t234_aligned.bin zerosbk
[ 0.5078 ] adding BCH for applet_t234_aligned.bin
[ 0.5410 ] tegrasign_v3.py --key None --list applet_t234_aligned_sigheader.bin_list.xml --pubkeyhash pub_key.key --sha sha512
[ 0.5415 ] Assuming zero filled SBK key
[ 0.5463 ] Warning: pub_key.key is not found
[ 0.5473 ] tegrahost_v2 --chip 0x23 0 --updatesigheader applet_t234_aligned_sigheader.bin.encrypt applet_t234_aligned_sigheader.bin.hash zerosbk
[ 0.5634 ] Sending mb2_applet…

[ 0.5652 ] tegrarcm_v2 --chip 0x23 0 --pollbl --download applet applet_t234_sigheader.bin.encrypt
[ 0.5666 ] BL: version 1.4.0.4-t234-54845784-e89ea9bc last_boot_error: 0
[ 0.7181 ] Sending applet
[ 0.8176 ] completed
[ 0.8216 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[ 0.8248 ] MB2 Applet version 01.00.0000
[ 1.0043 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[ 1.0051 ] MB2 Applet version 01.00.0000
[ 1.0345 ] Parsing fuse info as per xml file
[ 1.0386 ] tegraparser_v2 --chip 0x23 0 --get_fuse_names fuse_t234.xml read_fuse_names.txt
[ 1.0418 ] MagicId=0x45535546 version=0x2
[ 1.0424 ] trying to read fuse with MB2 Applet
[ 1.0464 ] tegraparser_v2 --chip 0x23 0 --read_fusetype PublicKeyHash read_fuse.bin
[ 1.0537 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 1.0569 ] MB2 Applet version 01.00.0000
[ 1.1301 ] Saved read fuses in file __fuse_read_scatter.bin
[ 1.1360 ] Fuse read successful
[ 1.1404 ] tegraparser_v2 --chip 0x23 0 --read_fusetype PkcPubkeyHash1 read_fuse.bin
[ 1.1477 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 1.1509 ] MB2 Applet version 01.00.0000
[ 1.2304 ] Saved read fuses in file __fuse_read_scatter.bin
[ 1.2362 ] Fuse read successful
[ 1.2382 ] tegraparser_v2 --chip 0x23 0 --read_fusetype PkcPubkeyHash2 read_fuse.bin
[ 1.2401 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 1.2410 ] MB2 Applet version 01.00.0000
[ 1.3142 ] Saved read fuses in file __fuse_read_scatter.bin
[ 1.3200 ] Fuse read successful
[ 1.3217 ] tegraparser_v2 --chip 0x23 0 --read_fusetype BootSecurityInfo read_fuse.bin
[ 1.3236 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 1.3245 ] MB2 Applet version 01.00.0000
[ 1.3981 ] Saved read fuses in file __fuse_read_scatter.bin
[ 1.4039 ] Fuse read successful
[ 1.4057 ] tegraparser_v2 --chip 0x23 0 --read_fusetype ArmJtagDisable read_fuse.bin
[ 1.4078 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 1.4087 ] MB2 Applet version 01.00.0000
[ 1.4821 ] Saved read fuses in file __fuse_read_scatter.bin
[ 1.4879 ] Fuse read successful
[ 1.4898 ] tegraparser_v2 --chip 0x23 0 --read_fusetype SecurityMode read_fuse.bin
[ 1.4917 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 1.4926 ] MB2 Applet version 01.00.0000
[ 1.5662 ] Saved read fuses in file __fuse_read_scatter.bin
[ 1.5719 ] Fuse read successful
[ 1.5736 ] tegraparser_v2 --chip 0x23 0 --read_fusetype SwReserved read_fuse.bin
[ 1.5755 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 1.5764 ] MB2 Applet version 01.00.0000
[ 1.6504 ] Saved read fuses in file __fuse_read_scatter.bin
[ 1.6562 ] Fuse read successful
[ 1.6579 ] tegraparser_v2 --chip 0x23 0 --read_fusetype DebugAuthentication read_fuse.bin
[ 1.6597 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 1.6605 ] MB2 Applet version 01.00.0000
[ 1.7341 ] Saved read fuses in file __fuse_read_scatter.bin
[ 1.7400 ] Fuse read successful
[ 1.7417 ] tegraparser_v2 --chip 0x23 0 --read_fusetype OdmInfo read_fuse.bin
[ 1.7436 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 1.7445 ] MB2 Applet version 01.00.0000
[ 1.8184 ] Saved read fuses in file __fuse_read_scatter.bin
[ 1.8245 ] Fuse read successful
[ 1.8260 ] tegraparser_v2 --chip 0x23 0 --read_fusetype OdmId read_fuse.bin
[ 1.8279 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 1.8288 ] MB2 Applet version 01.00.0000
[ 1.9019 ] Saved read fuses in file __fuse_read_scatter.bin
[ 1.9086 ] Fuse read successful
[ 1.9086 ]
[ 1.9124 ] tegraparser_v2 --chip 0x23 0 --read_fusetype OdmLock read_fuse.bin
[ 1.9202 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 1.9234 ] MB2 Applet version 01.00.0000
[ 2.0030 ] Saved read fuses in file __fuse_read_scatter.bin
[ 2.0090 ] Fuse read successful
[ 2.0091 ]
[ 2.0129 ] tegraparser_v2 --chip 0x23 0 --read_fusetype ReservedOdm0 read_fuse.bin
[ 2.0209 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 2.0243 ] MB2 Applet version 01.00.0000
[ 2.0985 ] Saved read fuses in file __fuse_read_scatter.bin
[ 2.1046 ] Fuse read successful
[ 2.1087 ] tegraparser_v2 --chip 0x23 0 --read_fusetype ReservedOdm1 read_fuse.bin
[ 2.1157 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 2.1188 ] MB2 Applet version 01.00.0000
[ 2.1944 ] Saved read fuses in file __fuse_read_scatter.bin
[ 2.2005 ] Fuse read successful
[ 2.2046 ] tegraparser_v2 --chip 0x23 0 --read_fusetype ReservedOdm2 read_fuse.bin
[ 2.2117 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 2.2149 ] MB2 Applet version 01.00.0000
[ 2.2900 ] Saved read fuses in file __fuse_read_scatter.bin
[ 2.2958 ] Fuse read successful
[ 2.2976 ] tegraparser_v2 --chip 0x23 0 --read_fusetype ReservedOdm3 read_fuse.bin
[ 2.2995 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 2.3003 ] MB2 Applet version 01.00.0000
[ 2.3743 ] Saved read fuses in file __fuse_read_scatter.bin
[ 2.3798 ] Fuse read successful
[ 2.3817 ] tegraparser_v2 --chip 0x23 0 --read_fusetype ReservedOdm4 read_fuse.bin
[ 2.3836 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 2.3845 ] MB2 Applet version 01.00.0000
[ 2.4585 ] Saved read fuses in file __fuse_read_scatter.bin
[ 2.4642 ] Fuse read successful
[ 2.4659 ] tegraparser_v2 --chip 0x23 0 --read_fusetype ReservedOdm5 read_fuse.bin
[ 2.4677 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 2.4686 ] MB2 Applet version 01.00.0000
[ 2.5431 ] Saved read fuses in file __fuse_read_scatter.bin
[ 2.5491 ] Fuse read successful
[ 2.5491 ]
[ 2.5529 ] tegraparser_v2 --chip 0x23 0 --read_fusetype ReservedOdm6 read_fuse.bin
[ 2.5608 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 2.5641 ] MB2 Applet version 01.00.0000
[ 2.6386 ] Saved read fuses in file __fuse_read_scatter.bin
[ 2.6442 ] Fuse read successful
[ 2.6459 ] tegraparser_v2 --chip 0x23 0 --read_fusetype ReservedOdm7 read_fuse.bin
[ 2.6480 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 2.6489 ] MB2 Applet version 01.00.0000
[ 2.7224 ] Saved read fuses in file __fuse_read_scatter.bin
[ 2.7282 ] Fuse read successful
[ 2.7298 ] tegraparser_v2 --chip 0x23 0 --read_fusetype Sku read_fuse.bin
[ 2.7318 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 2.7327 ] MB2 Applet version 01.00.0000
[ 2.8069 ] Saved read fuses in file __fuse_read_scatter.bin
[ 2.8131 ] Fuse read successful
[ 2.8131 ]
[ 2.8169 ] tegraparser_v2 --chip 0x23 0 --read_fusetype Uid read_fuse.bin
[ 2.8248 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 2.8280 ] MB2 Applet version 01.00.0000
[ 2.9024 ] Saved read fuses in file __fuse_read_scatter.bin
[ 2.9081 ] Fuse read successful
[ 2.9099 ] tegraparser_v2 --chip 0x23 0 --read_fusetype OptEmcDisable read_fuse.bin
[ 2.9118 ] tegrarcm_v2 --oem readfuses __fuse_read_scatter.bin read_fuse.bin
[ 2.9126 ] MB2 Applet version 01.00.0000
[ 2.9864 ] Saved read fuses in file __fuse_read_scatter.bin
[ 2.9923 ] Fuse read successful
[ 3.0282 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[ 3.0306 ] MB2 Applet version 01.00.0000
[ 3.0818 ] Retrieving board information
[ 3.0851 ] tegrarcm_v2 --chip 0x23 0 --oem platformdetails chip chip_info.bin
[ 3.0884 ] MB2 Applet version 01.00.0000
[ 3.1182 ] Saved platform info in chip_info.bin
[ 3.1240 ] Chip minor revision: 1
[ 3.1245 ] Bootrom revision: 0x7
[ 3.1245 ] Ram code: 0x1
[ 3.1245 ] Chip sku: 0xd3
[ 3.1246 ] Chip Sample: prod
[ 3.1246 ]
[ 3.1256 ] Retrieving EEPROM data
[ 3.1258 ] tegrarcm_v2 --oem platformdetails eeprom cvm /home/ed2/nvidia/nvidia_sdk/JetPack_6.2.1_Linux_JETSON_ORIN_NX_TARGETS/Linux_for_Tegra/bootloader/cvm.bin --chip 0x23 0
[ 3.1291 ] MB2 Applet version 01.00.0000
[ 3.1588 ] Saved platform info in /home/ed2/nvidia/nvidia_sdk/JetPack_6.2.1_Linux_JETSON_ORIN_NX_TARGETS/Linux_for_Tegra/bootloader/cvm.bin
[ 3.2311 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[ 3.2320 ] MB2 Applet version 01.00.0000
[ 3.2781 ] Dumping customer Info
[ 3.2792 ] tegrarcm_v2 --chip 0x23 0 --oem dump bct tmp.bct
[ 3.2800 ] MB2 Applet version 01.00.0000
[ 3.3257 ] Saved bct in tmp.bct
[ 3.3511 ] tegrabct_v2 --brbct tmp.bct --chip 0x23 0 --custinfo /home/ed2/nvidia/nvidia_sdk/JetPack_6.2.1_Linux_JETSON_ORIN_NX_TARGETS/Linux_for_Tegra/bootloader/custinfo_out.bin
[ 3.3542 ] C[ 3.3553 ] ustomer data saved in /home/ed2/nvidia/nvidia_sdk/JetPack_6.2.1_Linux_JETSON_ORIN_NX_TARGETS/Linux_for_Tegra/bootloader/custinfo_out.bin successfully
[ 3.3556 ] Rebooting to recovery mode
[ 3.3590 ] tegrarcm_v2 --chip 0x23 0 --ismb2
[ 3.3912 ] tegrarcm_v2 --chip 0x23 0 --ismb2applet
[ 3.3921 ] MB2 Applet version 01.00.0000
[ 3.4383 ] Booting to recovery mode
[ 3.4393 ] tegrarcm_v2 --chip 0x23 0 --reboot recovery
[ 3.4402 ] MB2 Applet version 01.00.0000
./flash.sh: line 902: warning: command substitution: ignored null byte in input
Board ID(3767) version(301) sku(0000) revision(H)
Preset RAMCODE is 1
Chip SKU(00:00:00:D3) ramcode(1) fuselevel(fuselevel_production) board_FAB(301)
emc_opt_disable_fuse:(0)
Error: Using a flash partition table config file of SD card, /home/ed2/nvidia/nvidia_sdk/JetPack_6.2.1_Linux_JETSON_ORIN_NX_TARGETS/Linux_for_Tegra/bootloader/generic/cfg/flash_t234_qspi_sd.xml, but the target board does not have SD card
To bypass this error, please add your board information to the board_with_sdcard array in this script. get this error:

I get this error when I switch the rootdev to sda:

Error: Invalid target board - sda.

Also tried jetson-orin-nx-devkit and I get a similiar error where it says invaild board, but thats the board I am using.

I have also gone into tegra234-mb2-bct-misc-p3767-0000.dts and changed the cvb_eeprom_read_size = <0x0> and cvm_eeprom_read_size = <0x0>;

Anything else I can do?

Sorry for the late response.
Is this still an issue to support? Any result can be shared?