This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

NRF9160-DK - LED 4 fails to blink on the kit.

Hi, I am in the initial stages of starting development with nRF9160-DK. At this step, the LED 4 on the board absolutely does not blink. I have tried taking the kit to different places too, for better connectivity but with no luck. 

How can I troubleshoot it?

Parents
  • Hello,

    What application is running on your kit? What is the status on LED 3? Has your kit been used by someone before you, e.g. has it been registered to another nRF Cloud account?

    Kind regards,
    Oeyvind

  • So I went back and reactivated the sim card and tried the first step again (LED 3 and 4 both blink) .

    I go to the next step that was the pairing sequence after which LED 4 blinked for a while and turned solid. But I still can not see the kit added as a device.

    According to this article: https://devzone.nordicsemi.com/tutorials/b/getting-started/posts/getting-started-with-nrf9160-dk#h69sjqflk6om1o8mdrn1vfnph47lq1r7

    The kit should be added as a device at this point. Please help me with what could be going wrong. 

    Thanks.

  • Ple

    IMEI CODE -352656100110868
    
    CAT M1
    
    LOG FROM LTE MONITOR
    
    15:17:54.841	Application data folder: C:\Users\kbarde\AppData\Roaming\nrfconnect\pc-nrfconnect-linkmonitor
    15:17:54.961	Error while probing devices: Error occured when get serial numbers. Errorcode: CouldNotOpenDLL (0x7) Lowlevel error: JLINKARM_DLL_NOT_FOUND (ffffff9c)
    15:17:57.876	Modem port is opened
    15:18:21.019	Error: 'AT+CFUN?
     ' timed out
    15:18:35.489	Error: 'AT+CFUN?
     ' timed out
    15:19:07.289	Error: 'AT
     ' timed out
    15:19:10.089	Error: 'AT+CFUN?
     ' timed out
    15:19:12.138	Error: 'AT+CFUN=1
     ' timed out
    
    COMMANDS FROM TERMINAL:
    AT+CFUN?
    ***** Booting Zephyr OS v1.13.99-ncs1-1823-g715d2df3dd *****
    Secure Boot: configure flash
    Secure Boot: SPU: set region 0 as Secure
    Secure Boot: SPU: set region 1 as Secure
    Secure Boot: SPU: set region 2 as Secure
    Secure Boot: SPU: set region 3 as Secure
    Secure Boot: SPU: set region 4 as Secure
    Secure Boot: SPU: set region 5 as Secure
    Secure Boot: SPU: set region 6 as Secure
    Secure Boot: SPU: set region 7 as Secure
    Secure Boot: SPU: set Flash region 8 as Non-Secure
    Secure Boot: SPU: set Flash region 9 as Non-Secure
    Secure Boot: SPU: set Flash region 10 as Non-Secure
    Secure Boot: SPU: set Flash region 11 as Non-Secure
    Secure Boot: SPU: set Flash region 12 as Non-Secure
    Secure Boot: SPU: set Flash region 13 as Non-Secure
    Secure Boot: SPU: set Flash region 14 as Non-Secure
    Secure Boot: SPU: set Flash region 15 as Non-Secure
    Secure Boot: SPU: set Flash region 16 as Non-Secure
    Secure Boot: SPU: set Flash region 17 as Non-Secure
    Secure Boot: SPU: set Flash region 18 as Non-Secure
    Secure Boot: SPU: set Flash region 19 as Non-Secure
    Secure Boot: SPU: set Flash region 20 as Non-Secure
    Secure Boot: SPU: set Flash region 21 as Non-Secure
    Secure Boot: SPU: set Flash region 22 as Non-Secure
    Secure Boot: SPU: set Flash region 23 as Non-Secure
    Secure Boot: SPU: set Flash region 24 as Non-Secure
    Secure Boot: SPU: set Flash region 25 as Non-Secure
    Secure Boot: SPU: set Flash region 26 as Non-Secure
    Secure Boot: SPU: set Flash region 27 as Non-Secure
    Secure Boot: SPU: set Flash region 28 as Non-Secure
    Secure Boot: SPU: set Flash region 29 as Non-Secure
    Secure Boot: SPU: set Flash region 30 as Non-Secure
    Secure Boot: SPU: set Flash region 31 as Non-Secure
    Secure Boot: configure SRAM
    Secure Boot: SPU: set SRAM region 0 as Secure
    Secure Boot: SPU: set SRAM region 1 as Secure
    Secure Boot: SPU: set SRAM region 2 as Secure
    Secure Boot: SPU: set SRAM region 3 as Secure
    Secure Boot: SPU: set SRAM region 4 as Secure
    Secure Boot: SPU: set SRAM region 5 as Secure
    Secure Boot: SPU: set SRAM region 6 as Secure
    Secure Boot: SPU: set SRAM region 7 as Secure
    Secure Boot: SPU: set SRAM region 8 as Non-Secure
    Secure Boot: SPU: set SRAM region 9 as Non-Secure
    Secure Boot: SPU: set SRAM region 10 as Non-Secure
    Secure Boot: SPU: set SRAM region 11 as Non-Secure
    Secure Boot: SPU: set SRAM region 12 as Non-Secure
    Secure Boot: SPU: set SRAM region 13 as Non-Secure
    Secure Boot: SPU: set SRAM region 14 as Non-Secure
    Secure Boot: SPU: set SRAM region 15 as Non-Secure
    Secure Boot: SPU: set SRAM region 16 as Non-Secure
    Secure Boot: SPU: set SRAM region 17 as Non-Secure
    Secure Boot: SPU: set SRAM region 18 as Non-Secure
    Secure Boot: SPU: set SRAM region 19 as Non-Secure
    Secure Boot: SPU: set SRAM region 20 as Non-Secure
    Secure Boot: SPU: set SRAM region 21 as Non-Secure
    Secure Boot: SPU: set SRAM region 22 as Non-Secure
    Secure Boot: SPU: set SRAM region 23 as Non-Secure
    Secure Boot: SPU: set SRAM region 24 as Non-Secure
    Secure Boot: SPU: set SRAM region 25 as Non-Secure
    Secure Boot: SPU: set SRAM region 26 as Non-Secure
    Secure Boot: SPU: set SRAM region 27 as Non-Secure
    Secure Boot: SPU: set SRAM region 28 as Non-Secure
    Secure Boot: SPU: set SRAM region 29 as Non-Secure
    Secure Boot: SPU: set SRAM region 30 as Non-Secure
    Secure Boot: SPU: set SRAM region 31 as Non-Secure
    Secure Boot: configure peripherals
    Secure Boot: MSP_NS 200265f0
    Secure Boot: prepare to jump to Non-Secure image
    ***** Booting Zephyr OS v1.13.99-ncs2 *****
    The AT host sample started
    AT+CFUN?
    AT+CFUN?
    AT
    AT+CFUN?
    AT+CFUN=1
    AT+COPS=?
    
    UART - GREEN
    Modem - RED
    UICC - RED
    LTE - RED
    PDN - GREY
    
    AT+CFUN?
    ***** Booting Zephyr OS v1.13.99-ncs1-1823-g715d2df3dd *****
    Secure Boot: configure flash
    Secure Boot: SPU: set region 0 as Secure
    Secure Boot: SPU: set region 1 as Secure
    Secure Boot: SPU: set region 2 as Secure
    Secure Boot: SPU: set region 3 as Secure
    Secure Boot: SPU: set region 4 as Secure
    Secure Boot: SPU: set region 5 as Secure
    Secure Boot: SPU: set region 6 as Secure
    Secure Boot: SPU: set region 7 as Secure
    Secure Boot: SPU: set Flash region 8 as Non-Secure
    Secure Boot: SPU: set Flash region 9 as Non-Secure
    Secure Boot: SPU: set Flash region 10 as Non-Secure
    Secure Boot: SPU: set Flash region 11 as Non-Secure
    Secure Boot: SPU: set Flash region 12 as Non-Secure
    Secure Boot: SPU: set Flash region 13 as Non-Secure
    Secure Boot: SPU: set Flash region 14 as Non-Secure
    Secure Boot: SPU: set Flash region 15 as Non-Secure
    Secure Boot: SPU: set Flash region 16 as Non-Secure
    Secure Boot: SPU: set Flash region 17 as Non-Secure
    Secure Boot: SPU: set Flash region 18 as Non-Secure
    Secure Boot: SPU: set Flash region 19 as Non-Secure
    Secure Boot: SPU: set Flash region 20 as Non-Secure
    Secure Boot: SPU: set Flash region 21 as Non-Secure
    Secure Boot: SPU: set Flash region 22 as Non-Secure
    Secure Boot: SPU: set Flash region 23 as Non-Secure
    Secure Boot: SPU: set Flash region 24 as Non-Secure
    Secure Boot: SPU: set Flash region 25 as Non-Secure
    Secure Boot: SPU: set Flash region 26 as Non-Secure
    Secure Boot: SPU: set Flash region 27 as Non-Secure
    Secure Boot: SPU: set Flash region 28 as Non-Secure
    Secure Boot: SPU: set Flash region 29 as Non-Secure
    Secure Boot: SPU: set Flash region 30 as Non-Secure
    Secure Boot: SPU: set Flash region 31 as Non-Secure
    Secure Boot: configure SRAM
    Secure Boot: SPU: set SRAM region 0 as Secure
    Secure Boot: SPU: set SRAM region 1 as Secure
    Secure Boot: SPU: set SRAM region 2 as Secure
    Secure Boot: SPU: set SRAM region 3 as Secure
    Secure Boot: SPU: set SRAM region 4 as Secure
    Secure Boot: SPU: set SRAM region 5 as Secure
    Secure Boot: SPU: set SRAM region 6 as Secure
    Secure Boot: SPU: set SRAM region 7 as Secure
    Secure Boot: SPU: set SRAM region 8 as Non-Secure
    Secure Boot: SPU: set SRAM region 9 as Non-Secure
    Secure Boot: SPU: set SRAM region 10 as Non-Secure
    Secure Boot: SPU: set SRAM region 11 as Non-Secure
    Secure Boot: SPU: set SRAM region 12 as Non-Secure
    Secure Boot: SPU: set SRAM region 13 as Non-Secure
    Secure Boot: SPU: set SRAM region 14 as Non-Secure
    Secure Boot: SPU: set SRAM region 15 as Non-Secure
    Secure Boot: SPU: set SRAM region 16 as Non-Secure
    Secure Boot: SPU: set SRAM region 17 as Non-Secure
    Secure Boot: SPU: set SRAM region 18 as Non-Secure
    Secure Boot: SPU: set SRAM region 19 as Non-Secure
    Secure Boot: SPU: set SRAM region 20 as Non-Secure
    Secure Boot: SPU: set SRAM region 21 as Non-Secure
    Secure Boot: SPU: set SRAM region 22 as Non-Secure
    Secure Boot: SPU: set SRAM region 23 as Non-Secure
    Secure Boot: SPU: set SRAM region 24 as Non-Secure
    Secure Boot: SPU: set SRAM region 25 as Non-Secure
    Secure Boot: SPU: set SRAM region 26 as Non-Secure
    Secure Boot: SPU: set SRAM region 27 as Non-Secure
    Secure Boot: SPU: set SRAM region 28 as Non-Secure
    Secure Boot: SPU: set SRAM region 29 as Non-Secure
    Secure Boot: SPU: set SRAM region 30 as Non-Secure
    Secure Boot: SPU: set SRAM region 31 as Non-Secure
    Secure Boot: configure peripherals
    Secure Boot: MSP_NS 200265f0
    Secure Boot: prepare to jump to Non-Secure image
    ***** Booting Zephyr OS v1.13.99-ncs2 *****
    The AT host sample started
    AT+CFUN?
    AT+CFUN?
    AT
    AT+CFUN?
    AT+CFUN=1
    AT+COPS=?
    AT+CFUN?
    +CFUN: 4
    OK
    AT+CFUN=1
    OK
    AT+CFUN?
    +CFUN: 1
    OK
    AT+CGSN=1
    +CGSN: "352656100110868"
    OK
    AT+CGMI
    Nordic Semiconductor ASA
    OK
    AT+CGMM
    nRF9120
    OK
    AT+CGMR
    mfw-m1_nrf9160_0.6.6-46.prealpha
    OK
    AT+CEMODE?
    +CEMODE: 2
    OK
    AT%XCBAND=?
    %XCBAND: (3,4,13,20)
    OK
    AT+CMEE?
    +CMEE: 0
    OK
    AT+CMEE=1
    OK
    AT+CNEC?
    +CNEC: 0
    OK
    AT+CNEC=24
    OK
    AT+CGEREP?
    +CGEREP: 0,0
    OK
    AT+CGDCONT?
    OK
    AT+CGACT?
    OK
    AT+CGEREP=1
    OK
    AT+CIND=1,1,1
    OK
    AT+CEREG=2
    OK
    AT+CEREG?
    +CEREG: 2,4,"FFFE","FFFFFFFF",7
    OK
    AT%CESQ=1
    OK
    AT+CESQ
    +CESQ: 99,99,255,255,255,255
    OK
    AT%XSIM=1
    OK
    AT%XSIM?
    %XSIM: 1
    OK
    AT+CPIN?
    +CPIN: READY
    OK
    AT+CPINR="SIM PIN"
    +CPINR: "SIM PIN",3
    OK
    AT+CIMI
    204080813511312
    OK
    AT+COPS=?
    +CEREG: 2,"FFFE","FFFFFFFF",7
    +COPS: (1,"","","311480",7)
    OK
    AT+COPS?
    +COPS: 2
    OK
    
    LOGS:
    15:22:13.046	Modem port is closed
    15:22:13.072	Modem port is opened
    15:22:19.037	Nordic Semiconductor ASA nRF9120 [mfw-m1_nrf9160_0.6.6-46.prealpha] SerNr: 352656100110868
    15:22:20.459	IMSIdentity: 204080813511312
    ase see attached. 

  • From this output I can see that your modem FW is outdated. Please download latest FW from this link, under nRF9160 Modem Firmware and Modem DFU Tool. This should fix the connectivity issue.

  • The error message "...out of range for Intel hex file" is connected to the GNU ARM Embedded toolchain. The latest version has a bug which causes this issue. Please download version GNU Arm Embedded Toolchain: 7-2018-q2-update June 27, 2018 instead.


    Unable to read connectivity firmware version: Unable to get version info for 960018772: Error occured when get device info. Errorcode: CouldNotOpenDLL (0x7)
    Lowlevel error: JLINKARM_DLL_NOT_FOUND

    Can you elaborate on what caused this issue? What example did you try to build? There is a similar case here.

  • I downloaded the firmware and tried to update it as per the readme file. Now I get this error. 

Reply Children
No Data
Related