[BUG] U-boot does not detect emmc card in odroid-c2 for newer U-boot as 2020.04
Otto Meier
gf435 at gmx.net
Wed Nov 18 12:44:28 CET 2020
Hi,
it is not a new issue, since u-boot 2020.07 this issue exists.
even by using the repo you mention the error exist.
I allways use : make odroid-c2_defconfig with no other config option set
to build u-boot.
Best regards
Otto
Am 18.11.20 um 09:12 schrieb Alexander Dahl:
> Hei hei,
>
> FWIW see below,
>
> Am Dienstag, 17. November 2020, 20:08:21 CET schrieb Otto Meier:
>> Dear Jaehoon Chung,
>>
>> I cloned github.com/u-boot which i believe is the master repo.
>
> That seems to be an up to date mirror. However, according to [1] and [2] the
> real upstream repository is here:
>
> https://gitlab.denx.de/u-boot/u-boot
>
> Greets
> Alex
>
> [1] https://www.denx.de/wiki/U-Boot/SourceCode
> [2] https://u-boot.readthedocs.io/en/latest/build/source.html
>
>>
>> I enabled CONFIG_MMC_TRACE and got following
>> response:
>>
>> GXBB:BL1:08dafd:0a8993;FEAT:EDFC318C;POC:3;RCY:0;EMMC:0;READ:0;CHK:0;
>> TE: 308588
>> no sdio debug board detected
>>
>> BL2 Built : 11:44:26, Nov 25 2015.
>> gxb gfb13a3b-c2 - jcao at wonton
>>
>> Board ID = 8
>> set vcck to 1100 mv
>> set vddee to 1050 mv
>> CPU clk: 1536MHz
>> DDR channel setting: DDR0 Rank0+1 same
>> DDR0: 2048MB(auto) @ 912MHz(2T)-13
>> DataBus test pass!
>> AddrBus test pass!
>> Load fip header from eMMC, src: 0x0000c200, des: 0x01400000, size:
>> 0x000000b0
>> Load bl30 from eMMC, src: 0x00010200, des: 0x01000000, size: 0x00009ef0
>> Sending bl30........................................OK.
>> Run bl30...
>> Load bl301 from eMMC, src: 0x0001c200, des: 0x01000000, size: 0x000018c0
>> Wait bl30...Done
>> Sending bl301.......OK.
>> Run bl301...
>> from eMMC, src: 0x00020200, des: 0x10100000, size: 0x00011130
>>
>>
>> --- UART initialized after reboot ---
>> [Reset cause: unknown]
>> [Image: unknown, amlogic_v1.1.3046-00db630-dirty 2016-08-31 09:24:14
>> tao.zeng at droid04]
>> bl30: check_permit, count is 1
>> bl30: check_permit: ok!
>> chipidLoad bl33 from eMMC, src: 0x00034200, des: 0x01000000, size:
>> 0x0009e330
>>
>> : ef be ad de d f0 ad ba ef be ad de not ES chip
>>
>> [0.423714 Inits done]
>> secure task start!
>> high task start!
>> low task start!
>> NOTICE: BL3-1: v1.0(debug):4d2e34d
>> NOTICE: BL3-1: Built : 17:08:35, Oct 29 2015
>> INFO: BL3-1: Initializing runtime services
>> INFO: BL3-1: Preparing for EL3 exit to normal world
>> INFO: BL3-1: Next image address = 0x1000000
>> INFO: BL3-1: Next image spsr = 0x3c9
>>
>>
>> U-Boot 2021.01-rc2-00047-g9324c9a823 (Nov 17 2020 - 19:34:41 +0100)
>> odroid-c2
>>
>> Model: Hardkernel ODROID-C2
>> SoC: Amlogic Meson GXBB (S905) Revision 1f:c (0:1)
>> DRAM: 2 GiB
>> MMC: mmc at 72000: 0, mmc at 74000: 1
>> In: serial
>> Out: serial
>> Err: serial
>> Net: Could not get PHY for ethernet at c9410000: addr -1
>> No ethernet found.
>>
>> Hit any key to stop autoboot: 0
>> CMD_SEND:0
>> ARG 0x00000000
>> MMC_RSP_NONE
>> CMD_SEND:8
>> ARG 0x000001aa
>> RET -110
>> CMD_SEND:55
>> ARG 0x00000000
>> RET -110
>> CMD_SEND:0
>> ARG 0x00000000
>> MMC_RSP_NONE
>> CMD_SEND:1
>> ARG 0x00000000
>> RET -110
>> Card did not respond to voltage select!
>> CMD_SEND:0
>> ARG 0x00000000
>> MMC_RSP_NONE
>> CMD_SEND:8
>> ARG 0x000001aa
>> RET -110
>> CMD_SEND:55
>>
>> ARG 0x00000000
>>
>> RET -110
>> CMD_SEND:0
>> ARG 0x00000000
>> MMC_RSP_NONE
>> CMD_SEND:1
>> ARG 0x00000000
>> MMC_RSP_R3,4 0x00000000
>> CMD_SEND:1
>> ARG 0x40000000
>> RET -110
>> Card did not respond to voltage select!
>> MMC Device 2 not found
>> no mmc device at slot 2
>> starting USB...
>> Bus usb at c9100000: USB DWC2
>> scanning bus usb at c9100000 for devices... 2 USB Device(s) found
>> scanning usb for storage devices... 0 Storage Device(s) found
>>
>>
>> Following you find a working boot from emmc:
>>
>>
>>
>>
>> GXBB:BL1:08dafd:0a8993;FEAT:EDFC318C;POC:3;RCY:0;EMMC:0;READ:0;CHK:0;
>> TE: 303447
>> no sdio debug board detected
>>
>> BL2 Built : 11:44:26, Nov 25 2015.
>> gxb gfb13a3b-c2 - jcao at wonton
>>
>> Board ID = 8
>> set vcck to 1100 mv
>> set vddee to 1050 mv
>> CPU clk: 1536MHz
>> DDR channel setting: DDR0 Rank0+1 same
>> DDR0: 2048MB(auto) @ 912MHz(2T)-13
>> DataBus test pass!
>> AddrBus test pass!
>> Load fip header from eMMC, src: 0x0000c200, des: 0x01400000, size:
>> 0x000000b0 Load bl30 from eMMC, src: 0x00010200, des: 0x01000000, size:
>> 0x00009ef0 Sending bl30........................................OK.
>> Run bl30...
>> Load bl301 from eMMC, src: 0x0001c200, des: 0x01000000, size: 0x000018c0
>> Wait bl30...Done
>> Sending bl301.......OK.
>> Run bl301...
>> MC, src: 0x00020200, des: 0x10100000, size: 0x00011130
>>
>>
>> --- UART initialized after reboot ---
>> [Reset cause: unknown]
>> [Image: unknown, amlogic_v1.1.3046-00db630-dirty 2016-08-31 09:24:14
>> tao.zeng at droid04] bl30: check_permit, count is 1
>> bl30: check_permit: ok!
>> chipidLoad bl33 from eMMC, src: 0x00034200, des: 0x01000000, size:
>> 0x0007da20
>> : ef be ad de d f0 ad ba ef be ad de not ES chip
>>
>> [0.418578 Inits done]
>> secure task start!
>> high task start!
>> low task start!
>> NOTICE: BL3-1: v1.0(debug):4d2e34d
>> NOTICE: BL3-1: Built : 17:08:35, Oct 29 2015
>> INFO: BL3-1: Initializing runtime services
>> INFO: BL3-1: Preparing for EL3 exit to normal world
>> INFO: BL3-1: Next image address = 0x1000000
>> INFO: BL3-1: Next image spsr = 0x3c9
>>
>>
>> U-Boot 2020.04 (Nov 17 2020 - 19:56:40 +0100) odroid-c2
>>
>> Model: Hardkernel ODROID-C2
>> SoC: Amlogic Meson GXBB (S905) Revision 1f:c (0:1)
>> DRAM: 2 GiB
>> MMC: mmc at 72000: 0, mmc at 74000: 1
>> In: serial
>> Out: serial
>> Err: serial
>> Net: eth0: ethernet at c9410000
>> Hit any key to stop autoboot: 0
>> CMD_SEND:0
>> ARG 0x00000000
>> MMC_RSP_NONE
>> CMD_SEND:8
>> ARG 0x000001aa
>> RET -110
>> CMD_SEND:55
>> ARG 0x00000000
>> RET -110
>> CMD_SEND:0
>> ARG 0x00000000
>> MMC_RSP_NONE
>> CMD_SEND:1
>> ARG 0x00000000
>> RET -110
>> Card did not respond to voltage select!
>> CMD_SEND:0
>> ARG 0x00000000
>> MMC_RSP_NONE
>> CMD_SEND:8
>> ARG 0x000001aa
>> RET -110
>> CMD_SEND:55
>> ARG 0x00000000
>> RET -110
>> CMD_SEND:0
>> ARG 0x00000000
>> MMC_RSP_NONE
>> CMD_SEND:1
>> ARG 0x00000000
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:0
>> ARG 0x00000000
>> MMC_RSP_NONE
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0x40ff8080
>> CMD_SEND:1
>> ARG 0x40380080
>> MMC_RSP_R3,4 0xc0ff8080
>> CMD_SEND:2
>> ARG 0x00000000
>> MMC_RSP_R2 0x15010043
>> 0x4a544434
>> 0x52042550
>> 0xfa197700
>>
>> DUMPING DATA
>> 000 - 15 01 00 43
>> 004 - 4a 54 44 34
>> 008 - 52 04 25 50
>> 012 - fa 19 77 00
>> CMD_SEND:3
>> ARG 0x00010000
>> MMC_RSP_R1,5,6,7 0x00000500
>> CMD_SEND:9
>> ARG 0x00010000
>> MMC_RSP_R2 0xd0270132
>> 0x0f5903ff
>> 0xf6dbffef
>> 0x8e404000
>>
>> DUMPING DATA
>> 000 - d0 27 01 32
>> 004 - 0f 59 03 ff
>> 008 - f6 db ff ef
>> 012 - 8e 40 40 00
>> CMD_SEND:7
>> ARG 0x00010000
>> MMC_RSP_R1,5,6,7 0x00000700
>> CMD_SEND:8
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:6
>> ARG 0x03b70200
>> MMC_RSP_R1b 0x00000900
>> CMD_SEND:13
>> ARG 0x00010000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CURR STATE:4
>> CMD_SEND:6
>> ARG 0x03b90100
>> MMC_RSP_R1b 0x00000900
>> CMD_SEND:13
>> ARG 0x00010000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CURR STATE:4
>> CMD_SEND:8
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:8
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> switch to partitions #0, OK
>> mmc1(part 0) is current device
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000800
>> MMC_RSP_R1,5,6,7 0x00000900
>> Scanning mmc 1:1...
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000800
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:18
>> ARG 0x00000844
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:12
>> ARG 0x00000000
>> MMC_RSP_R1b 0x00000b00
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000800
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:18
>> ARG 0x00000844
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:12
>> ARG 0x00000000
>> MMC_RSP_R1b 0x00000b00
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000800
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:18
>> ARG 0x00000844
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:12
>> ARG 0x00000000
>> MMC_RSP_R1b 0x00000b00
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000800
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:18
>> ARG 0x00000844
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:12
>> ARG 0x00000000
>> MMC_RSP_R1b 0x00000b00
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000800
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:18
>> ARG 0x00000844
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:12
>> ARG 0x00000000
>> MMC_RSP_R1b 0x00000b00
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000800
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:18
>> ARG 0x00000844
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:12
>> ARG 0x00000000
>> MMC_RSP_R1b 0x00000b00
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000800
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:18
>> ARG 0x00000844
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:12
>> ARG 0x00000000
>> MMC_RSP_R1b 0x00000b00
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000800
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:18
>> ARG 0x00000844
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:12
>> ARG 0x00000000
>> MMC_RSP_R1b 0x00000b00
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000800
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:18
>> ARG 0x00000844
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:12
>> ARG 0x00000000
>> MMC_RSP_R1b 0x00000b00
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000000
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:17
>> ARG 0x00000800
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:18
>> ARG 0x00000844
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:12
>> ARG 0x00000000
>> MMC_RSP_R1b 0x00000b00
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:18
>> ARG 0x00000868
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:12
>> ARG 0x00000000
>> MMC_RSP_R1b 0x00000b00
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:18
>> ARG 0x00000804
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:12
>> ARG 0x00000000
>> MMC_RSP_R1b 0x00000b00
>> CMD_SEND:16
>> ARG 0x00000200
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:18
>> ARG 0x0000086c
>> MMC_RSP_R1,5,6,7 0x00000900
>> CMD_SEND:12
>> ARG 0x00000000
>> MMC_RSP_R1b 0x00000b00
>> Found EFI removable media binary efi/boot/bootaa64.efi
>>
>>
>> This is the output from mmc info command u-boot 2020.04
>>
>> => mmc info
>> Device: mmc at 74000
>> Manufacturer ID: 15
>> OEM: 100
>> Name: CJTD4
>> Bus Speed: 52000000
>> Mode: MMC High Speed (52MHz)
>> Rd Block Len: 512
>> MMC version 5.1
>> High Capacity: Yes
>> Capacity: 58.2 GiB
>> Bus Width: 8-bit
>> Erase Group Size: 512 KiB
>> HC WP Group Size: 8 MiB
>> User Capacity: 58.2 GiB WRREL
>> Boot Capacity: 4 MiB ENH
>> RPMB Capacity: 4 MiB ENH
>> =>
>>
>> Any Idea?
>>
>> best regards
>>
>> Otto
>>
>> Am 16.11.20 um 23:39 schrieb Jaehoon Chung:
>>> Dear Otto,
>>>
>>> On 11/16/20 11:16 PM, Otto Meier wrote:
>>>> I tried to build an actual u-boot from git for my odroid-c2 board.
>>>
>>> Which git repository did you use?
>>> If you can enable CONFIG_MMC_TRACE, it's more helpful to debug.
>>>
>>>
>>> Best Regards,
>>> Jaehoon Chung
>>>
>>>> It doesn't find the emmc card and therefore does not boot from it.
>>>> emmc is Ok and boots with u-boot 2020.04 fine.
>>>>
>>>> Newer u-boot then 2020.04 show these messages:
>>>>
>>>> GXBB:BL1:08dafd:0a8993;FEAT:EDFC318C;POC:3;RCY:0;EMMC:0;READ:0;CHK:0;
>>>> TE: 156394
>>>> no sdio debug board detected
>>>>
>>>> BL2 Built : 11:44:26, Nov 25 2015.
>>>> gxb gfb13a3b-c2 - jcao at wonton
>>>>
>>>> Board ID = 8
>>>> set vcck to 1100 mv
>>>> set vddee to 1050 mv
>>>> CPU clk: 1536MHz
>>>> DDR channel setting: DDR0 Rank0+1 same
>>>> DDR0: 2048MB(auto) @ 912MHz(2T)-13
>>>> DataBus test pass!
>>>> AddrBus test pass!
>>>> Load fip header from eMMC, src: 0x0000c200, des: 0x01400000, size:
>>>> 0x000000b0 Load bl30 from eMMC, src: 0x00010200, des: 0x01000000, size:
>>>> 0x00009ef0 Sending bl30........................................OK.
>>>> Run bl30...
>>>> Load bl301 from eMMC, src: 0x0001c200, des: 0x01000000, size: 0x000018c0
>>>> Wait bl30...Done
>>>> Sending bl301.......OK.
>>>> Run bl301...
>>>> 31 from eMMC, src: 0x00020200, des: 0x10100000, size: 0x00011130
>>>>
>>>>
>>>> --- UART initialized after reboot ---
>>>> [Reset cause: unknown]
>>>> [Image: unknown, amlogic_v1.1.3046-00db630-dirty 2016-08-31 09:24:14
>>>> tao.zeng at droid04] bl30: check_permit, count is 1
>>>> bl30: check_permit: ok!
>>>> chipidLoad bl33 from eMMC, src: 0x00034200, des: 0x01000000, size:
>>>> 0x0009e8f0>>
>>>> : ef be ad de d f0 ad ba ef be ad de not ES chip
>>>>
>>>> [0.271464 Inits done]
>>>> secure task start!
>>>> high task start!
>>>> low task start!
>>>> NOTICE: BL3-1: v1.0(debug):4d2e34d
>>>> NOTICE: BL3-1: Built : 17:08:35, Oct 29 2015
>>>> INFO: BL3-1: Initializing runtime services
>>>> INFO: BL3-1: Preparing for EL3 exit to normal world
>>>> INFO: BL3-1: Next image address = 0x1000000
>>>> INFO: BL3-1: Next image spsr = 0x3c9
>>>>
>>>>
>>>> U-Boot 2021.01-rc2 (Nov 15 2020 - 19:06:55 +0100) odroid-c2
>>>>
>>>> Model: Hardkernel ODROID-C2
>>>> SoC: Amlogic Meson GXBB (S905) Revision 1f:c (0:1)
>>>> DRAM: 2 GiB
>>>> MMC: mmc at 72000: 0, mmc at 74000: 1
>>>> In: serial
>>>> Out: serial
>>>> Err: serial
>>>> Net: eth0: ethernet at c9410000
>>>> Hit any key to stop autoboot: 0
>>>> Card did not respond to voltage select!
>>>> Card did not respond to voltage select!
>>>> MMC Device 2 not found
>>>> no mmc device at slot 2
>>>> starting USB...
>>>> Bus usb at c9100000: USB DWC2
>>>> scanning bus usb at c9100000 for devices... 2 USB Device(s) found
>>>>
>>>>
>>>> Does anybody know how to fixes this breakage?
>>>>
>>>> Best regards
>>>>
>>>> Otto
>
>
>
>
>
More information about the U-Boot
mailing list