[BUG] U-boot does not detect emmc card in odroid-c2 for newer U-boot as 2020.04
Jaehoon Chung
jh80.chung at samsung.com
Wed Nov 18 13:23:09 CET 2020
On 11/18/20 8:44 PM, Otto Meier wrote:
> Hi,
>
> it is not a new issue, since u-boot 2020.07 this issue exists.
> even by using the repo you mention the error exist.
Yes, git repo doesn't matter. When i have checked, you are using almost latest u-boot. (commit 9324c9a823)
If it's existed since 2020.07, it seems that relevant to below commit.
commit fe95905ffed57d617cad81a71ac419d53aaa1ebf
Author: Haibo Chen <haibo.chen at nxp.com>
Date: Mon Jun 15 17:18:12 2020 +0800
mmc: retry CMD1 in mmc_send_op_cond() until the eMMC is ready
According to eMMC specification v5.1 section 6.4.3, we should issue
CMD1 repeatedly in the idle state until the eMMC is ready even if
mmc_send_op_cond() send CMD1 with argument = 0. Otherwise some eMMC
devices seems to enter the inactive mode after mmc_complete_op_cond()
issued CMD0 when the eMMC device is busy.
Signed-off-by: Haibo Chen <haibo.chen at nxp.com>
Reviewed-by: Peng Fan <peng.fan at nxp.com>
Could you check it?
Best Regards,
Jaehoon Chung
>
> I allways use : make odroid-c2_defconfig with no other config option set to build u-boot.
>
> Best regards
>
> Otto
>
> Am 18.11.20 um 09:12 schrieb Alexander Dahl:
>> Hei hei,
>>
>> FWIW see below,
>>
>> Am Dienstag, 17. November 2020, 20:08:21 CET schrieb Otto Meier:
>>> Dear Jaehoon Chung,
>>>
>>> I cloned github.com/u-boot which i believe is the master repo.
>>
>> That seems to be an up to date mirror. However, according to [1] and [2] the
>> real upstream repository is here:
>>
>> https://protect2.fireeye.com/v1/url?k=6b6d3e43-34f6074f-6b6cb50c-000babff3563-39827ce0c87bb58b&q=1&e=29cccebd-0f84-49bd-a69e-c1c8a1916260&u=https%3A%2F%2Fgitlab.denx.de%2Fu-boot%2Fu-boot
>>
>> Greets
>> Alex
>>
>> [1] https://protect2.fireeye.com/v1/url?k=582063cf-07bb5ac3-5821e880-000babff3563-5e4585439f04bb00&q=1&e=29cccebd-0f84-49bd-a69e-c1c8a1916260&u=https%3A%2F%2Fwww.denx.de%2Fwiki%2FU-Boot%2FSourceCode
>> [2] https://protect2.fireeye.com/v1/url?k=d5f680f6-8a6db9fa-d5f70bb9-000babff3563-dc85cc723e07fae0&q=1&e=29cccebd-0f84-49bd-a69e-c1c8a1916260&u=https%3A%2F%2Fu-boot.readthedocs.io%2Fen%2Flatest%2Fbuild%2Fsource.html
>>
>>>
>>> I enabled CONFIG_MMC_TRACE and got following
>>> response:
>>>
>>> GXBB:BL1:08dafd:0a8993;FEAT:EDFC318C;POC:3;RCY:0;EMMC:0;READ:0;CHK:0;
>>> TE: 308588
>>> no sdio debug board detected
>>>
>>> BL2 Built : 11:44:26, Nov 25 2015.
>>> gxb gfb13a3b-c2 - jcao at wonton
>>>
>>> Board ID = 8
>>> set vcck to 1100 mv
>>> set vddee to 1050 mv
>>> CPU clk: 1536MHz
>>> DDR channel setting: DDR0 Rank0+1 same
>>> DDR0: 2048MB(auto) @ 912MHz(2T)-13
>>> DataBus test pass!
>>> AddrBus test pass!
>>> Load fip header from eMMC, src: 0x0000c200, des: 0x01400000, size:
>>> 0x000000b0
>>> Load bl30 from eMMC, src: 0x00010200, des: 0x01000000, size: 0x00009ef0
>>> Sending bl30........................................OK.
>>> Run bl30...
>>> Load bl301 from eMMC, src: 0x0001c200, des: 0x01000000, size: 0x000018c0
>>> Wait bl30...Done
>>> Sending bl301.......OK.
>>> Run bl301...
>>> from eMMC, src: 0x00020200, des: 0x10100000, size: 0x00011130
>>>
>>>
>>> --- UART initialized after reboot ---
>>> [Reset cause: unknown]
>>> [Image: unknown, amlogic_v1.1.3046-00db630-dirty 2016-08-31 09:24:14
>>> tao.zeng at droid04]
>>> bl30: check_permit, count is 1
>>> bl30: check_permit: ok!
>>> chipidLoad bl33 from eMMC, src: 0x00034200, des: 0x01000000, size:
>>> 0x0009e330
>>>
>>> : ef be ad de d f0 ad ba ef be ad de not ES chip
>>>
>>> [0.423714 Inits done]
>>> secure task start!
>>> high task start!
>>> low task start!
>>> NOTICE: BL3-1: v1.0(debug):4d2e34d
>>> NOTICE: BL3-1: Built : 17:08:35, Oct 29 2015
>>> INFO: BL3-1: Initializing runtime services
>>> INFO: BL3-1: Preparing for EL3 exit to normal world
>>> INFO: BL3-1: Next image address = 0x1000000
>>> INFO: BL3-1: Next image spsr = 0x3c9
>>>
>>>
>>> U-Boot 2021.01-rc2-00047-g9324c9a823 (Nov 17 2020 - 19:34:41 +0100)
>>> odroid-c2
>>>
>>> Model: Hardkernel ODROID-C2
>>> SoC: Amlogic Meson GXBB (S905) Revision 1f:c (0:1)
>>> DRAM: 2 GiB
>>> MMC: mmc at 72000: 0, mmc at 74000: 1
>>> In: serial
>>> Out: serial
>>> Err: serial
>>> Net: Could not get PHY for ethernet at c9410000: addr -1
>>> No ethernet found.
>>>
>>> Hit any key to stop autoboot: 0
>>> CMD_SEND:0
>>> ARG 0x00000000
>>> MMC_RSP_NONE
>>> CMD_SEND:8
>>> ARG 0x000001aa
>>> RET -110
>>> CMD_SEND:55
>>> ARG 0x00000000
>>> RET -110
>>> CMD_SEND:0
>>> ARG 0x00000000
>>> MMC_RSP_NONE
>>> CMD_SEND:1
>>> ARG 0x00000000
>>> RET -110
>>> Card did not respond to voltage select!
>>> CMD_SEND:0
>>> ARG 0x00000000
>>> MMC_RSP_NONE
>>> CMD_SEND:8
>>> ARG 0x000001aa
>>> RET -110
>>> CMD_SEND:55
>>>
>>> ARG 0x00000000
>>>
>>> RET -110
>>> CMD_SEND:0
>>> ARG 0x00000000
>>> MMC_RSP_NONE
>>> CMD_SEND:1
>>> ARG 0x00000000
>>> MMC_RSP_R3,4 0x00000000
>>> CMD_SEND:1
>>> ARG 0x40000000
>>> RET -110
>>> Card did not respond to voltage select!
>>> MMC Device 2 not found
>>> no mmc device at slot 2
>>> starting USB...
>>> Bus usb at c9100000: USB DWC2
>>> scanning bus usb at c9100000 for devices... 2 USB Device(s) found
>>> scanning usb for storage devices... 0 Storage Device(s) found
>>>
>>>
>>> Following you find a working boot from emmc:
>>>
>>>
>>>
>>>
>>> GXBB:BL1:08dafd:0a8993;FEAT:EDFC318C;POC:3;RCY:0;EMMC:0;READ:0;CHK:0;
>>> TE: 303447
>>> no sdio debug board detected
>>>
>>> BL2 Built : 11:44:26, Nov 25 2015.
>>> gxb gfb13a3b-c2 - jcao at wonton
>>>
>>> Board ID = 8
>>> set vcck to 1100 mv
>>> set vddee to 1050 mv
>>> CPU clk: 1536MHz
>>> DDR channel setting: DDR0 Rank0+1 same
>>> DDR0: 2048MB(auto) @ 912MHz(2T)-13
>>> DataBus test pass!
>>> AddrBus test pass!
>>> Load fip header from eMMC, src: 0x0000c200, des: 0x01400000, size:
>>> 0x000000b0 Load bl30 from eMMC, src: 0x00010200, des: 0x01000000, size:
>>> 0x00009ef0 Sending bl30........................................OK.
>>> Run bl30...
>>> Load bl301 from eMMC, src: 0x0001c200, des: 0x01000000, size: 0x000018c0
>>> Wait bl30...Done
>>> Sending bl301.......OK.
>>> Run bl301...
>>> MC, src: 0x00020200, des: 0x10100000, size: 0x00011130
>>>
>>>
>>> --- UART initialized after reboot ---
>>> [Reset cause: unknown]
>>> [Image: unknown, amlogic_v1.1.3046-00db630-dirty 2016-08-31 09:24:14
>>> tao.zeng at droid04] bl30: check_permit, count is 1
>>> bl30: check_permit: ok!
>>> chipidLoad bl33 from eMMC, src: 0x00034200, des: 0x01000000, size:
>>> 0x0007da20
>>> : ef be ad de d f0 ad ba ef be ad de not ES chip
>>>
>>> [0.418578 Inits done]
>>> secure task start!
>>> high task start!
>>> low task start!
>>> NOTICE: BL3-1: v1.0(debug):4d2e34d
>>> NOTICE: BL3-1: Built : 17:08:35, Oct 29 2015
>>> INFO: BL3-1: Initializing runtime services
>>> INFO: BL3-1: Preparing for EL3 exit to normal world
>>> INFO: BL3-1: Next image address = 0x1000000
>>> INFO: BL3-1: Next image spsr = 0x3c9
>>>
>>>
>>> U-Boot 2020.04 (Nov 17 2020 - 19:56:40 +0100) odroid-c2
>>>
>>> Model: Hardkernel ODROID-C2
>>> SoC: Amlogic Meson GXBB (S905) Revision 1f:c (0:1)
>>> DRAM: 2 GiB
>>> MMC: mmc at 72000: 0, mmc at 74000: 1
>>> In: serial
>>> Out: serial
>>> Err: serial
>>> Net: eth0: ethernet at c9410000
>>> Hit any key to stop autoboot: 0
>>> CMD_SEND:0
>>> ARG 0x00000000
>>> MMC_RSP_NONE
>>> CMD_SEND:8
>>> ARG 0x000001aa
>>> RET -110
>>> CMD_SEND:55
>>> ARG 0x00000000
>>> RET -110
>>> CMD_SEND:0
>>> ARG 0x00000000
>>> MMC_RSP_NONE
>>> CMD_SEND:1
>>> ARG 0x00000000
>>> RET -110
>>> Card did not respond to voltage select!
>>> CMD_SEND:0
>>> ARG 0x00000000
>>> MMC_RSP_NONE
>>> CMD_SEND:8
>>> ARG 0x000001aa
>>> RET -110
>>> CMD_SEND:55
>>> ARG 0x00000000
>>> RET -110
>>> CMD_SEND:0
>>> ARG 0x00000000
>>> MMC_RSP_NONE
>>> CMD_SEND:1
>>> ARG 0x00000000
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:0
>>> ARG 0x00000000
>>> MMC_RSP_NONE
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0x40ff8080
>>> CMD_SEND:1
>>> ARG 0x40380080
>>> MMC_RSP_R3,4 0xc0ff8080
>>> CMD_SEND:2
>>> ARG 0x00000000
>>> MMC_RSP_R2 0x15010043
>>> 0x4a544434
>>> 0x52042550
>>> 0xfa197700
>>>
>>> DUMPING DATA
>>> 000 - 15 01 00 43
>>> 004 - 4a 54 44 34
>>> 008 - 52 04 25 50
>>> 012 - fa 19 77 00
>>> CMD_SEND:3
>>> ARG 0x00010000
>>> MMC_RSP_R1,5,6,7 0x00000500
>>> CMD_SEND:9
>>> ARG 0x00010000
>>> MMC_RSP_R2 0xd0270132
>>> 0x0f5903ff
>>> 0xf6dbffef
>>> 0x8e404000
>>>
>>> DUMPING DATA
>>> 000 - d0 27 01 32
>>> 004 - 0f 59 03 ff
>>> 008 - f6 db ff ef
>>> 012 - 8e 40 40 00
>>> CMD_SEND:7
>>> ARG 0x00010000
>>> MMC_RSP_R1,5,6,7 0x00000700
>>> CMD_SEND:8
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:6
>>> ARG 0x03b70200
>>> MMC_RSP_R1b 0x00000900
>>> CMD_SEND:13
>>> ARG 0x00010000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CURR STATE:4
>>> CMD_SEND:6
>>> ARG 0x03b90100
>>> MMC_RSP_R1b 0x00000900
>>> CMD_SEND:13
>>> ARG 0x00010000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CURR STATE:4
>>> CMD_SEND:8
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:8
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> switch to partitions #0, OK
>>> mmc1(part 0) is current device
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000800
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> Scanning mmc 1:1...
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000800
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:18
>>> ARG 0x00000844
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:12
>>> ARG 0x00000000
>>> MMC_RSP_R1b 0x00000b00
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000800
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:18
>>> ARG 0x00000844
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:12
>>> ARG 0x00000000
>>> MMC_RSP_R1b 0x00000b00
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000800
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:18
>>> ARG 0x00000844
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:12
>>> ARG 0x00000000
>>> MMC_RSP_R1b 0x00000b00
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000800
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:18
>>> ARG 0x00000844
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:12
>>> ARG 0x00000000
>>> MMC_RSP_R1b 0x00000b00
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000800
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:18
>>> ARG 0x00000844
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:12
>>> ARG 0x00000000
>>> MMC_RSP_R1b 0x00000b00
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000800
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:18
>>> ARG 0x00000844
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:12
>>> ARG 0x00000000
>>> MMC_RSP_R1b 0x00000b00
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000800
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:18
>>> ARG 0x00000844
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:12
>>> ARG 0x00000000
>>> MMC_RSP_R1b 0x00000b00
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000800
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:18
>>> ARG 0x00000844
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:12
>>> ARG 0x00000000
>>> MMC_RSP_R1b 0x00000b00
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000800
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:18
>>> ARG 0x00000844
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:12
>>> ARG 0x00000000
>>> MMC_RSP_R1b 0x00000b00
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000000
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:17
>>> ARG 0x00000800
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:18
>>> ARG 0x00000844
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:12
>>> ARG 0x00000000
>>> MMC_RSP_R1b 0x00000b00
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:18
>>> ARG 0x00000868
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:12
>>> ARG 0x00000000
>>> MMC_RSP_R1b 0x00000b00
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:18
>>> ARG 0x00000804
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:12
>>> ARG 0x00000000
>>> MMC_RSP_R1b 0x00000b00
>>> CMD_SEND:16
>>> ARG 0x00000200
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:18
>>> ARG 0x0000086c
>>> MMC_RSP_R1,5,6,7 0x00000900
>>> CMD_SEND:12
>>> ARG 0x00000000
>>> MMC_RSP_R1b 0x00000b00
>>> Found EFI removable media binary efi/boot/bootaa64.efi
>>>
>>>
>>> This is the output from mmc info command u-boot 2020.04
>>>
>>> => mmc info
>>> Device: mmc at 74000
>>> Manufacturer ID: 15
>>> OEM: 100
>>> Name: CJTD4
>>> Bus Speed: 52000000
>>> Mode: MMC High Speed (52MHz)
>>> Rd Block Len: 512
>>> MMC version 5.1
>>> High Capacity: Yes
>>> Capacity: 58.2 GiB
>>> Bus Width: 8-bit
>>> Erase Group Size: 512 KiB
>>> HC WP Group Size: 8 MiB
>>> User Capacity: 58.2 GiB WRREL
>>> Boot Capacity: 4 MiB ENH
>>> RPMB Capacity: 4 MiB ENH
>>> =>
>>>
>>> Any Idea?
>>>
>>> best regards
>>>
>>> Otto
>>>
>>> Am 16.11.20 um 23:39 schrieb Jaehoon Chung:
>>>> Dear Otto,
>>>>
>>>> On 11/16/20 11:16 PM, Otto Meier wrote:
>>>>> I tried to build an actual u-boot from git for my odroid-c2 board.
>>>>
>>>> Which git repository did you use?
>>>> If you can enable CONFIG_MMC_TRACE, it's more helpful to debug.
>>>>
>>>>
>>>> Best Regards,
>>>> Jaehoon Chung
>>>>
>>>>> It doesn't find the emmc card and therefore does not boot from it.
>>>>> emmc is Ok and boots with u-boot 2020.04 fine.
>>>>>
>>>>> Newer u-boot then 2020.04 show these messages:
>>>>>
>>>>> GXBB:BL1:08dafd:0a8993;FEAT:EDFC318C;POC:3;RCY:0;EMMC:0;READ:0;CHK:0;
>>>>> TE: 156394
>>>>> no sdio debug board detected
>>>>>
>>>>> BL2 Built : 11:44:26, Nov 25 2015.
>>>>> gxb gfb13a3b-c2 - jcao at wonton
>>>>>
>>>>> Board ID = 8
>>>>> set vcck to 1100 mv
>>>>> set vddee to 1050 mv
>>>>> CPU clk: 1536MHz
>>>>> DDR channel setting: DDR0 Rank0+1 same
>>>>> DDR0: 2048MB(auto) @ 912MHz(2T)-13
>>>>> DataBus test pass!
>>>>> AddrBus test pass!
>>>>> Load fip header from eMMC, src: 0x0000c200, des: 0x01400000, size:
>>>>> 0x000000b0 Load bl30 from eMMC, src: 0x00010200, des: 0x01000000, size:
>>>>> 0x00009ef0 Sending bl30........................................OK.
>>>>> Run bl30...
>>>>> Load bl301 from eMMC, src: 0x0001c200, des: 0x01000000, size: 0x000018c0
>>>>> Wait bl30...Done
>>>>> Sending bl301.......OK.
>>>>> Run bl301...
>>>>> 31 from eMMC, src: 0x00020200, des: 0x10100000, size: 0x00011130
>>>>>
>>>>>
>>>>> --- UART initialized after reboot ---
>>>>> [Reset cause: unknown]
>>>>> [Image: unknown, amlogic_v1.1.3046-00db630-dirty 2016-08-31 09:24:14
>>>>> tao.zeng at droid04] bl30: check_permit, count is 1
>>>>> bl30: check_permit: ok!
>>>>> chipidLoad bl33 from eMMC, src: 0x00034200, des: 0x01000000, size:
>>>>> 0x0009e8f0>>
>>>>> : ef be ad de d f0 ad ba ef be ad de not ES chip
>>>>>
>>>>> [0.271464 Inits done]
>>>>> secure task start!
>>>>> high task start!
>>>>> low task start!
>>>>> NOTICE: BL3-1: v1.0(debug):4d2e34d
>>>>> NOTICE: BL3-1: Built : 17:08:35, Oct 29 2015
>>>>> INFO: BL3-1: Initializing runtime services
>>>>> INFO: BL3-1: Preparing for EL3 exit to normal world
>>>>> INFO: BL3-1: Next image address = 0x1000000
>>>>> INFO: BL3-1: Next image spsr = 0x3c9
>>>>>
>>>>>
>>>>> U-Boot 2021.01-rc2 (Nov 15 2020 - 19:06:55 +0100) odroid-c2
>>>>>
>>>>> Model: Hardkernel ODROID-C2
>>>>> SoC: Amlogic Meson GXBB (S905) Revision 1f:c (0:1)
>>>>> DRAM: 2 GiB
>>>>> MMC: mmc at 72000: 0, mmc at 74000: 1
>>>>> In: serial
>>>>> Out: serial
>>>>> Err: serial
>>>>> Net: eth0: ethernet at c9410000
>>>>> Hit any key to stop autoboot: 0
>>>>> Card did not respond to voltage select!
>>>>> Card did not respond to voltage select!
>>>>> MMC Device 2 not found
>>>>> no mmc device at slot 2
>>>>> starting USB...
>>>>> Bus usb at c9100000: USB DWC2
>>>>> scanning bus usb at c9100000 for devices... 2 USB Device(s) found
>>>>>
>>>>>
>>>>> Does anybody know how to fixes this breakage?
>>>>>
>>>>> Best regards
>>>>>
>>>>> Otto
>>
>>
>>
>>
>>
>
More information about the U-Boot
mailing list