Title: Board is dead [Print This Page] Author: crashoverride Time: 6/30/2017 01:01 Title: Board is dead After flashing the Android image as requested for diagnostic purposes. I attempted to re-flash the Ubuntu image. The board become unresponsive after pressing the "recover" and "reset" key. It no longer shows up as a USB device. It also will no longer boot. I have attempted the "mask rom" mode as documented and still can not get the device to do anything: http://wiki.t-firefly.com/index.php/Firefly-RK3399/MaskRom/en
No LEDs are illuminated. Numerous attempts at reset produce no result. The fan on the heatsink is spinning and the SPDIF light can be seen through the connector.
Any suggestions before I return the board?Author: crashoverride Time: 6/30/2017 01:57
I hooked up a serial console cable to the board and was able to determine it was not as dead as it appeared.
DDR Version 1.07 20161103
In
Channel 0: DDR3, 666MHz
Bus Width=32 Col=10 Bank=8 Row=15 CS=1 Die Bus-Width=16 Size=1024MB
Channel 1: DDR3, 666MHz
Bus Width=32 Col=10 Bank=8 Row=15 CS=1 Die Bus-Width=16 Size=1024MB
256B stride
ch 0 ddrconfig = 0x101, ddrsize = 0x20
ch 1 ddrconfig = 0x101, ddrsize = 0x20
pmugrf_os_reg[2] = 0x32817281, stride = 0x9
OUT
Boot1: 2016-07-29, version: 1.05
CPUId = 0x0
ChipType = 10 1844
SdmmcInit=2 0
BootCapSize=100000
UserCapSize=14910MB
FwPartOffset=2000 , 100000
SdmmcInit=0 20
StorageInit ok = 62780
LoadTrustBL
No find bl30.bin
No find bl32.bin
theLoader 200000 76886
LoaderFlag2: 0x0
Unhandled Exception in EL3.
x30 = 0x0000000000045004
x0 = 0x0f1e2d3c4b5a6978
x1 = 0x00000000ff3b1fd0
x2 = 0x0000000000000018
x3 = 0x0000000000000018
x4 = 0x0000000000000018
x5 = 0x0000000000000000
x6 = 0x0000000000000000
x7 = 0x0000000000000000
x8 = 0x0000000003011908
x9 = 0x0000000000010080
x10 = 0x0000000000020f88
x11 = 0x0000000000000000
x12 = 0x000000000000000a
x13 = 0x0000000000000001
x14 = 0x0000000000000002
x15 = 0x0000000000000004
x16 = 0x0000000000000000
x17 = 0x0000000000000000
x18 = 0x0000000000800000
x19 = 0x0f1e2d3c4b5a6978
x20 = 0x000000000004b0c0
x21 = 0x0f1e2d3c4b5a6978
x22 = 0x00000000000419e9
x23 = 0x0000000000041000
x24 = 0x000000000004b0d0
x25 = 0x0000000000000001
x26 = 0x00000000ff8c2000
x27 = 0x0000000000000110
x28 = 0x0000000000000110
x29 = 0x00000000000468c0
scr_el3 = 0x0000000000000238
sctlr_el3 = 0x0000000000c5383a
cptr_el3 = 0x0000000000000000
tcr_el3 = 0x0000000000000000
daif = 0x00000000000003c0
mair_el3 = 0x44e048e000098aa4
spsr_el3 = 0x00000000600002cc
elr_el3 = 0x0000000000011c64
ttbr0_el3 = 0x0088124561007008
esr_el3 = 0x0000000096000000
far_el3 = 0x0f1e2d3c4b5a6978
spsr_el1 = 0x00000000d0321142
elr_el1 = 0xca71c8eb500a2c4a
spsr_abt = 0x00000000f4011022
spsr_und = 0x00000000801810b8
spsr_irq = 0x000000004000ed29
spsr_fiq = 0x00000000c2000081
sctlr_el1 = 0x0000000000c52838
actlr_el1 = 0x0000000000000000
cpacr_el1 = 0x0000000000000000
csselr_el1 = 0x0000000000000000
sp_el1 = 0xf18e04402a400247
esr_el1 = 0x00000000173473e8
ttbr0_el1 = 0x8a604054920020e0
ttbr1_el1 = 0x185ac482805a5088
mair_el1 = 0x44e048e000098aa4
amair_el1 = 0x0000000000000000
tcr_el1 = 0x0000000000000000
tpidr_el1 = 0x010f497e01800fa0
tpidr_el0 = 0x00009a42004200e0
tpidrro_el0 = 0x601285380c416888
dacr32_el2 = 0x0000000000410130
ifsr32_el2 = 0x0000000000001633
par_el1 = 0x3200005830c24812
mpidr_el1 = 0x0000000080000000
afsr0_el1 = 0x0000000000000000
afsr1_el1 = 0x0000000000000000
contextidr_el1 = 0x0000000000000000
vbar_el1 = 0x0000000000000000
cntp_ctl_el0 = 0x0000000000000000
cntp_cval_el0 = 0x6122082080820c0a
cntv_ctl_el0 = 0x0000000000000000
cntv_cval_el0 = 0x33502a1485090302
cntkctl_el1 = 0x0000000000000000
fpexc32_el2 = 0x0000000000000700
sp_el0 = 0x00000000000468c0
isr_el1 = 0x0000000000000000
cpuectlr_el1 = 0x0000000000000040
cpumerrsr_el1 = 0x0000000000000000
l2merrsr_el1 = 0x0000000000000000
gicc_hppir = 0x0000000000000000
gicc_ahppir = 0x0000000000000000
gicc_ctlr = 0x0000000014000082
gicd_ispendr regs (Offsets 0x200 - 0x278)
0000000000000200: 0x0000001800000000
0000000000000208: 0x0000000000000000
0000000000000210: 0x0000000000000010
0000000000000218: 0x0000000000000000
0000000000000220: 0x0000000000000000
0000000000000228: 0x0000000000000000
0000000000000230: 0x0000000000000000
0000000000000238: 0x0000000000000000
0000000000000240: 0x0000000000000000
0000000000000248: 0x0000000000000000
0000000000000250: 0x0000000000000000
0000000000000258: 0x0000000000000000
0000000000000260: 0x0000000000000000
0000000000000268: 0x0000000000000000
0000000000000270: 0x0000000000000000
0000000000000278: 0x0000000000000000
cci_snoop_ctrl_cluster0 = 0x00000000c0000000
cci_snoop_ctrl_cluster1 = 0x00000000c0000000
Copy the code
With the console cable in place, I was able to determine that "mask rom" was not being entered. I used a piece of wire to short the test points and reset the device until it appeared over USB. At this point I was able to erase and re-flash it with the Ubuntu image.
For anyone else that experiences this, the tip is to make sure you have good contact on the test points. Also, its much easier to press the reset button while shorting the pins than it is to plug/un-plug the power connector.Author: tuan2195 Time: 8/3/2017 00:55
I am trying to flash the Android 7.1 image through maskrom mode, but after I get this:
Download Boot Start
Download Boot Success
Wait For Maskrom Start
Wait For Maskrom Fail
And it says USB device not recognized. Any idea how I can fix this? Thanks! Author: euroeffie Time: 8/15/2017 03:24 Last edited by euroeffie In 8/15/2017 03:54 Editor
Off-topic question, since I cannot create a new topic:The official 7,85" EDP display, is it plug-and-play for RK3399 board or does it need some setups in Android?
Question 2: Have anyone successfully tried to connect any non-official touchscreen display to the RK3399? If so, what kind of display was it and how much programming did you actually need to do?
Welcome Firefly Open Source Community (https://bbs.t-firefly.com/)