Firefly Open Source Community

   Login   |   Register   |
New_Topic
Print Previous Topic Next Topic

Board is dead

83

Credits

0

Prestige

0

Contribution

registered members

Rank: 2

Credits
83

Board is dead

Posted at 6/30/2017 01:01:52      View:3799 | Replies:3        Print      Only Author   [Copy Link] 1#
After flashing the Android image as requested for diagnostic purposes.  I attempted to re-flash the Ubuntu image.  The board become unresponsive after pressing the "recover" and "reset" key.  It no longer shows up as a USB device.  It also will no longer boot.  I have attempted the "mask rom" mode as documented and still can not get the device to do anything:
http://wiki.t-firefly.com/index.php/Firefly-RK3399/MaskRom/en

No LEDs are illuminated.  Numerous attempts at reset produce no result.  The fan on the heatsink is spinning and the SPDIF light can be seen through the connector.

Any suggestions before I return the board?
Reply

Use props Report

83

Credits

0

Prestige

0

Contribution

registered members

Rank: 2

Credits
83
Posted at 6/30/2017 01:57:03        Only Author  2#
I hooked up a serial console cable to the board and was able to determine it was not as dead as it appeared.

  1. DDR Version 1.07 20161103
  2. In
  3. Channel 0: DDR3, 666MHz
  4. Bus Width=32 Col=10 Bank=8 Row=15 CS=1 Die Bus-Width=16 Size=1024MB
  5. Channel 1: DDR3, 666MHz
  6. Bus Width=32 Col=10 Bank=8 Row=15 CS=1 Die Bus-Width=16 Size=1024MB
  7. 256B stride
  8. ch 0 ddrconfig = 0x101, ddrsize = 0x20
  9. ch 1 ddrconfig = 0x101, ddrsize = 0x20
  10. pmugrf_os_reg[2] = 0x32817281, stride = 0x9
  11. OUT
  12. Boot1: 2016-07-29, version: 1.05
  13. CPUId = 0x0
  14. ChipType = 10 1844
  15. SdmmcInit=2 0
  16. BootCapSize=100000
  17. UserCapSize=14910MB
  18. FwPartOffset=2000 , 100000
  19. SdmmcInit=0 20
  20. StorageInit ok = 62780
  21. LoadTrustBL
  22. No find bl30.bin
  23. No find bl32.bin
  24. theLoader 200000 76886
  25. LoaderFlag2: 0x0
  26. Unhandled Exception in EL3.
  27. x30 =           0x0000000000045004
  28. x0 =            0x0f1e2d3c4b5a6978
  29. x1 =            0x00000000ff3b1fd0
  30. x2 =            0x0000000000000018
  31. x3 =            0x0000000000000018
  32. x4 =            0x0000000000000018
  33. x5 =            0x0000000000000000
  34. x6 =            0x0000000000000000
  35. x7 =            0x0000000000000000
  36. x8 =            0x0000000003011908
  37. x9 =            0x0000000000010080
  38. x10 =           0x0000000000020f88
  39. x11 =           0x0000000000000000
  40. x12 =           0x000000000000000a
  41. x13 =           0x0000000000000001
  42. x14 =           0x0000000000000002
  43. x15 =           0x0000000000000004
  44. x16 =           0x0000000000000000
  45. x17 =           0x0000000000000000
  46. x18 =           0x0000000000800000
  47. x19 =           0x0f1e2d3c4b5a6978
  48. x20 =           0x000000000004b0c0
  49. x21 =           0x0f1e2d3c4b5a6978
  50. x22 =           0x00000000000419e9
  51. x23 =           0x0000000000041000
  52. x24 =           0x000000000004b0d0
  53. x25 =           0x0000000000000001
  54. x26 =           0x00000000ff8c2000
  55. x27 =           0x0000000000000110
  56. x28 =           0x0000000000000110
  57. x29 =           0x00000000000468c0
  58. scr_el3 =               0x0000000000000238
  59. sctlr_el3 =             0x0000000000c5383a
  60. cptr_el3 =              0x0000000000000000
  61. tcr_el3 =               0x0000000000000000
  62. daif =          0x00000000000003c0
  63. mair_el3 =              0x44e048e000098aa4
  64. spsr_el3 =              0x00000000600002cc
  65. elr_el3 =               0x0000000000011c64
  66. ttbr0_el3 =             0x0088124561007008
  67. esr_el3 =               0x0000000096000000
  68. far_el3 =               0x0f1e2d3c4b5a6978
  69. spsr_el1 =              0x00000000d0321142
  70. elr_el1 =               0xca71c8eb500a2c4a
  71. spsr_abt =              0x00000000f4011022
  72. spsr_und =              0x00000000801810b8
  73. spsr_irq =              0x000000004000ed29
  74. spsr_fiq =              0x00000000c2000081
  75. sctlr_el1 =             0x0000000000c52838
  76. actlr_el1 =             0x0000000000000000
  77. cpacr_el1 =             0x0000000000000000
  78. csselr_el1 =            0x0000000000000000
  79. sp_el1 =                0xf18e04402a400247
  80. esr_el1 =               0x00000000173473e8
  81. ttbr0_el1 =             0x8a604054920020e0
  82. ttbr1_el1 =             0x185ac482805a5088
  83. mair_el1 =              0x44e048e000098aa4
  84. amair_el1 =             0x0000000000000000
  85. tcr_el1 =               0x0000000000000000
  86. tpidr_el1 =             0x010f497e01800fa0
  87. tpidr_el0 =             0x00009a42004200e0
  88. tpidrro_el0 =           0x601285380c416888
  89. dacr32_el2 =            0x0000000000410130
  90. ifsr32_el2 =            0x0000000000001633
  91. par_el1 =               0x3200005830c24812
  92. mpidr_el1 =             0x0000000080000000
  93. afsr0_el1 =             0x0000000000000000
  94. afsr1_el1 =             0x0000000000000000
  95. contextidr_el1 =                0x0000000000000000
  96. vbar_el1 =              0x0000000000000000
  97. cntp_ctl_el0 =          0x0000000000000000
  98. cntp_cval_el0 =         0x6122082080820c0a
  99. cntv_ctl_el0 =          0x0000000000000000
  100. cntv_cval_el0 =         0x33502a1485090302
  101. cntkctl_el1 =           0x0000000000000000
  102. fpexc32_el2 =           0x0000000000000700
  103. sp_el0 =                0x00000000000468c0
  104. isr_el1 =               0x0000000000000000
  105. cpuectlr_el1 =          0x0000000000000040
  106. cpumerrsr_el1 =         0x0000000000000000
  107. l2merrsr_el1 =          0x0000000000000000
  108. gicc_hppir =            0x0000000000000000
  109. gicc_ahppir =           0x0000000000000000
  110. gicc_ctlr =             0x0000000014000082
  111. gicd_ispendr regs (Offsets 0x200 - 0x278)
  112. 0000000000000200:               0x0000001800000000
  113. 0000000000000208:               0x0000000000000000
  114. 0000000000000210:               0x0000000000000010
  115. 0000000000000218:               0x0000000000000000
  116. 0000000000000220:               0x0000000000000000
  117. 0000000000000228:               0x0000000000000000
  118. 0000000000000230:               0x0000000000000000
  119. 0000000000000238:               0x0000000000000000
  120. 0000000000000240:               0x0000000000000000
  121. 0000000000000248:               0x0000000000000000
  122. 0000000000000250:               0x0000000000000000
  123. 0000000000000258:               0x0000000000000000
  124. 0000000000000260:               0x0000000000000000
  125. 0000000000000268:               0x0000000000000000
  126. 0000000000000270:               0x0000000000000000
  127. 0000000000000278:               0x0000000000000000
  128. cci_snoop_ctrl_cluster0 =               0x00000000c0000000
  129. cci_snoop_ctrl_cluster1 =               0x00000000c0000000
Copy the code


With the console cable in place, I was able to determine that "mask rom" was not being entered.  I used a piece of wire to short the test points and reset the device until it appeared over USB.  At this point I was able to erase and re-flash it with the Ubuntu image.

For anyone else that experiences this, the tip is to make sure you have good contact on the test points.  Also, its much easier to press the reset button while shorting the pins than it is to plug/un-plug the power connector.
Reply

Use props Report

52

Credits

0

Prestige

0

Contribution

registered members

Rank: 2

Credits
52
Posted at 8/3/2017 00:55:18        Only Author  3#
I am trying to flash the Android 7.1 image through maskrom mode, but after I get this:

Download Boot Start
Download Boot Success
Wait For Maskrom Start
Wait For Maskrom Fail

And it says USB device not recognized. Any idea how I can fix this? Thanks!
Reply

Use props Report

37

Credits

0

Prestige

0

Contribution

new registration

Rank: 1

Credits
37
Posted at 8/15/2017 03:24:38        Only Author  4#
Last edited by euroeffie In 8/15/2017 03:54 Editor

Off-topic question, since I cannot create a new topic:The official 7,85" EDP display, is it plug-and-play for RK3399 board or does it need some setups in Android?
Question 2: Have anyone successfully tried to connect any non-official touchscreen display to the RK3399? If so, what kind of display was it and how much programming did you actually need to do?
Reply

Use props Report

You need to log in before you can reply Login | Register

This forum Credits Rules

Quick Reply Back to top Back to list