[Elphel-support] How to recover from bad firmware upload.

David Reyes Samblas Martinez david at tuxbrain.com
Sat Sep 11 11:47:14 PDT 2010


Hey I was trying to upload the precompiled lmage
image353-8.0.8.48.tar.gz, I have set up a nfs dir, and the cam founds
it and pass the firmare webpage nfs test , but it didn't  found  the
files in spite I have cheked via ssh to the cam that the nfs was
mounted on nfs_test directory and the files are there with full
read/write permisions, so I try to execute the nfs_update script
directly from the ssh, and .... well thats all it seems to complet all
the steeps but it never boots again, I was very worried due I not was
in may usual "lab" and the laptop doen't detect any output from the
serial console of the cam, but when I arrive at home I connect the
serial and it gets stucked in the Booting..., here is the serial
output.
Clear cmdline from memory


ETRAX FS NAND boot loader
=========================
Rev 1, Dec  1 2007 23:56:10
Boot config: 0x00040000->0x40440000, len 0x00200000, boot @ 0x40440000
CPU revision: 0x00000020
Bootloader main at 0x38000ce2
Data end: 0x3800573c
Bss: 0x38008000
Heap: 0x38008000
Identifying nand chip...
maf_id: 0x00000020; dev_id: 0x000000f1
mtd->size == 0x08000000
scan_bbt(); mtd->size == 0x08000000
scan_bbt() ...01; mtd->size == 0x08000000
len == 0x00000100; and BBT_LEN_1 == 0x00000400
scan_bbt() ...02; mtd->size == 0x08000000
scan_bbt() ...03; mtd->size == 0x08000000
scan_bbt() ...1; mtd->size == 0x08000000
scan_bbt() ...2; mtd->size == 0x08000000
scan_bbt() search_read_bbts(); mtd->size == 0x08000000
search_read_bbts() search primary table; mtd->size == 0x08000000
search_bbt() ...1; mtd->size == 0x08000000
search_bbt() ...2; maxblocks: 0x00000004; mtd->size == 0x08000000
Block: 0x000003ff
Check, if we found a bbt for each requested chip
Bad block table found at page0x0000ffc0, version 0x00000001
search_read_bbts() search mirror table
search_bbt() ...1; mtd->size == 0x08000000
search_bbt() ...2; maxblocks: 0x00000004; mtd->size == 0x08000000
Block: 0x000003ff
Block: 0x000003fe
Check, if we found a bbt for each requested chip
Bad block table found at page0x0000ff80, version 0x00000001
nand_read_bbt: Bad block at 0x06400000
nand_read_bbt: Bad block at 0x06be0000
scan_bbt() ...3
Done.
Chip identified... 3; NAND 128MiB 3,3V 8-bit
type: 0x00000004
flags: 0x000000c5
size: 0x08000000
erasesize: 0x00020000
oobblock: 0x00000800
oobsize: 0x00000040
ecctype: 0x00000002
eccsize: 0x00000100
Oob info:
useecc: 0x00000002
eccbytes: 0x00000018
eccpos: 0x00000028 0x00000029 0x0000002a 0x0000002b 0x0000002c 0x0000002d 0x000
Bootload in progress...
New block 0x00040000;len: 0x00200000;start: 0x00040000
New block 0x00060000;len: 0x001e0000;start: 0x00060000
New block 0x00080000;len: 0x001c0000;start: 0x00080000
New block 0x000a0000;len: 0x001a0000;start: 0x000a0000
New block 0x000c0000;len: 0x00180000;start: 0x000c0000
New block 0x000e0000;len: 0x00160000;start: 0x000e0000
New block 0x00100000;len: 0x00140000;start: 0x00100000
New block 0x00120000;len: 0x00120000;start: 0x00120000
New block 0x00140000;len: 0x00100000;start: 0x00140000
New block 0x00160000;len: 0x000e0000;start: 0x00160000
New block 0x00180000;len: 0x000c0000;start: 0x00180000
New block 0x001a0000;len: 0x000a0000;start: 0x001a0000
New block 0x001c0000;len: 0x00080000;start: 0x001c0000
New block 0x001e0000;len: 0x00060000;start: 0x001e0000
New block 0x00200000;len: 0x00040000;start: 0x00200000
New block 0x00220000;len: 0x00020000;start: 0x00220000
complete, status 0x00000000, loaded 0x00200000 bytes
Data in DRAM:
0xffffffff 0xffffffff 0xffffffff
Booting...

Now what can we do from here to return the cam to all his glory again?

Regards

-- 
David Reyes Samblas Martinez
http://www.tuxbrain.com
Open ultraportable & embedded solutions
Ben NanoNote, Arduino, Openmoko
Hey, watch out!!! There's a linux in your pocket!!!




More information about the Support-list mailing list