Working with Emmc

Total Page:16

File Type:pdf, Size:1020Kb

Working with Emmc Working with eMMC Copyright 2020 © Embedded Artists AB Working with embedded MultiMediaCard (eMMC) Working with eMMC Page 2 Embedded Artists AB Jörgen Ankersgatan 12 SE-211 45 Malmö Sweden http://www.EmbeddedArtists.com Copyright 2020 © Embedded Artists AB. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of Embedded Artists AB. Disclaimer Embedded Artists AB makes no representation or warranties with respect to the contents hereof and specifically disclaim any implied warranties or merchantability or fitness for any particular purpose. Information in this publication is subject to change without notice and does not represent a commitment on the part of Embedded Artists AB. Feedback We appreciate any feedback you may have for improvements on this document. Send your comments by using the contact form: www.embeddedartists.com/contact. Trademarks All brand and product names mentioned herein are trademarks, services marks, registered trademarks, or registered service marks of their respective owners and should be treated as such. Copyright 2020 © Embedded Artists AB Rev A Working with eMMC Page 3 Table of Contents 1 Document Revision History ................................. 4 2 Introduction ........................................................... 5 2.1 Additional information ................................................................... 5 2.2 Conventions in this document ...................................................... 5 3 Default configuration ............................................ 6 3.1 Memory areas ................................................................................. 6 3.2 Usage of the areas ......................................................................... 6 4 Get information about the eMMC device............. 8 4.1 List MMC devices ........................................................................... 8 4.2 mmc-utils ........................................................................................ 8 4.2.1 Check eMMC version .................................................................... 8 4.2.2 Max Enhanced Area Size .............................................................. 8 4.2.3 Boot partition size .......................................................................... 8 4.2.4 Boot configuration ......................................................................... 8 4.2.5 Life time estimation ....................................................................... 9 4.3 fdisk ................................................................................................. 9 4.4 df ...................................................................................................... 9 4.5 mount ............................................................................................ 10 5 Create / modify partitions ................................... 11 5.1 Partition user area ........................................................................ 11 5.2 Switch boot partition .................................................................... 11 6 Create enhanced mode (SLC) partition ............. 13 6.1 Why enhanced mode? ................................................................. 13 6.2 Create partition from Linux ......................................................... 13 6.2.1 Linux distributions ........................................................................ 13 6.2.2 Yocto configuration ...................................................................... 13 6.2.3 Instructions .................................................................................. 13 6.3 Create partition from u-boot ........................................................ 14 6.3.1 U-boot version ............................................................................. 14 6.3.2 Instructions .................................................................................. 14 Copyright 2020 © Embedded Artists AB Rev A Working with eMMC Page 4 1 Document Revision History Revision Date Description A 2020-04-28 First release Copyright 2020 © Embedded Artists AB Rev A Working with eMMC Page 5 2 Introduction Most embedded devices need some kind of storage area for firmware and data files. Many different solutions exist, but this document will focus on embedded MultiMediaCard normally referred to as eMMC. An eMMC consists of two parts; the flash memory (of type NAND) and the memory controller. Having the memory controller integrated simplifies the usage of the storage device. Without this controller the software driver on the host would have to handle the low-level flash memory management, such as wear levelling and error correction. 2.1 Additional information Additional documentation you might need is. • “TN-52-07: e.MMC Partitioning”, from Micron • “TN-FC-40: Configuring the Embedded e.MMC Device”, from Micron • “TN-FC-06: Booting from Embedded MMC”, from Micron • Introduction of eMMC by Yejin Moon at Samsung Electronics 2.2 Conventions in this document A number of conventions have been used throughout to help the reader better understand the content of the document. Constant width text – is used for file system paths and command, utility and tool names. $ This field illustrates user input in a terminal running on the development workstation, i.e., on the workstation where you edit, configure and build Linux # This field illustrates user input on the target hardware, i.e., input given to the terminal attached to the COM Board This field is used to illustrate example code or excerpt from a document. This field is used for important notes and highlights Copyright 2020 © Embedded Artists AB Rev A Working with eMMC Page 6 3 Default configuration 3.1 Memory areas When the eMMC component is delivered from the manufacturer it is normally divided into four areas as shown in Figure 1 below. Figure 1 - Default memory organization Area Description Boot Typically used to store firmware and data needed during booting of the device. Two boot areas are normally available and these are of type SLC NAND (enhanced mode) RPMB Replay-protected memory-block area. This area is typically used to store secure data such as encryption keys. This area is of type SLC NAND (enhanced mode). User This area is used to store user data such as a file system. This is the area that is normally divided into several partitions. By default, it is of type MLC NAND, but can be changed to SLC NAND (enhanced mode), see chapter 6 3.2 Usage of the areas Figure 2 show the default usage of the eMMC areas on Embedded Artists COM boards. Copyright 2020 © Embedded Artists AB Rev A Working with eMMC Page 7 Figure 2 - Default usage of the eMMC areas Area Description Boot area 1 The bootloader images (such as SPL and u-boot) are stored in this area. The boot area is not formatted and contains no file system. The images are instead stored at fixed offsets. When SPL and u-boot are used SPL will be stored at an offset of 1024 bytes (1 Kbyte) and u-boot will be stored at an offset of 69 Kbytes. The area also contains the u-boot environment which is stored at an offset of 2 Mbytes minus 8 Kbytes (2MB – 8KB). User area The user area is divided into two partitions. The first partition will be FAT32 formatted Partition 1 and contain the Linux kernel and device tree files. User area The second partition contains the root file system and is by default ext3 formatted. Partition 2 Copyright 2020 © Embedded Artists AB Rev A Working with eMMC Page 8 4 Get information about the eMMC device 4.1 List MMC devices In Linux you can list available MMC devices (and partitions) by checking the /dev/ directory # ls -la /dev/mmcblk* brw-rw---- 1 root disk 179, 0 Dec 23 11:57 /dev/mmcblk2 brw-rw---- 1 root disk 179, 32 Dec 23 11:57 /dev/mmcblk2boot0 brw-rw---- 1 root disk 179, 64 Dec 23 11:57 /dev/mmcblk2boot1 brw-rw---- 1 root disk 179, 1 Dec 23 11:57 /dev/mmcblk2p1 brw-rw---- 1 root disk 179, 2 Dec 23 11:57 /dev/mmcblk2p2 brw-rw---- 1 root disk 179, 96 Dec 23 11:57 /dev/mmcblk2rpmb In the above example there is one MMC device (mmcblk2) which has 5 partitions. 4.2 mmc-utils The tool mmc-utils is by default installed in the root file system when using Embedded Artists Yocto image. This tool can be used not only to retrieve information about the eMMC device, but also change its configuration. 4.2.1 Check eMMC version # mmc extcsd read /dev/mmcblk2 | head 2 ============================================= Extended CSD rev 1.8 (MMC 5.1) 4.2.2 Max Enhanced Area Size You can check the maximum enhanced area size that can be used (see chapter 6 for more information about enhanced area). # mmc extcsd read /dev/mmcblk2 | grep -A2 MAX_ENH_SIZE_MULT Max Enhanced Area Size [MAX_ENH_SIZE_MULT]: 0x0001d2 i.e. 3817472 KiB 4.2.3 Boot partition size Check the boot partition size by running the command below. You can then calculate the actual size by 128 KB x BOOT_SIZE_MULTI. In the example below the size is 128 KB x 64 = 8192 KB = 8 MB. # mmc extcsd read /dev/mmcblk2 | grep BOOT_SIZE_MULTI Boot partition size [BOOT_SIZE_MULTI: 0x40] 4.2.4 Boot configuration Check the current boot configuration by running the command below. In this example BOOT_ACK (bit 6) is set and boot partition 1 is enabled (bit 3). See the table below for the field / bit descriptions. # mmc extcsd read /dev/mmcblk2
Recommended publications
  • Active@ Boot Disk User Guide Copyright © 2008, LSOFT TECHNOLOGIES INC
    Active@ Boot Disk User Guide Copyright © 2008, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from LSOFT TECHNOLOGIES INC. LSOFT TECHNOLOGIES INC. reserves the right to revise this documentation and to make changes in content from time to time without obligation on the part of LSOFT TECHNOLOGIES INC. to provide notification of such revision or change. LSOFT TECHNOLOGIES INC. provides this documentation without warranty of any kind, either implied or expressed, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. LSOFT may make improvements or changes in the product(s) and/or the program(s) described in this documentation at any time. All technical data and computer software is commercial in nature and developed solely at private expense. As the User, or Installer/Administrator of this software, you agree not to remove or deface any portion of any legend provided on any licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide. LSOFT.NET logo is a trademark of LSOFT TECHNOLOGIES INC. Other brand and product names may be registered trademarks or trademarks of their respective holders. 2 Active@ Boot Disk User Guide Contents 1.0 Product Overview ..........................................................................................................
    [Show full text]
  • Disk Clone Industrial
    Disk Clone Industrial USER MANUAL Ver. 1.0.0 Updated: 9 June 2020 | Contents | ii Contents Legal Statement............................................................................... 4 Introduction......................................................................................4 Cloning Data.................................................................................................................................... 4 Erasing Confidential Data..................................................................................................................5 Disk Clone Overview.......................................................................6 System Requirements....................................................................................................................... 7 Software Licensing........................................................................................................................... 7 Software Updates............................................................................................................................. 8 Getting Started.................................................................................9 Disk Clone Installation and Distribution.......................................................................................... 12 Launching and initial Configuration..................................................................................................12 Navigating Disk Clone.....................................................................................................................14
    [Show full text]
  • The NTFS File System
    The NTFS File System OVERVIEW: This lab is part of a series of lab exercises intended to support courseware for Forensics training. The development of this document is funded by the Department of Labor (DOL) Trade Adjustment Assistance Community College and Career Training (TAACCCT) Grant No. TC-22525-11-60-A-48. In this lab, students will enumerate hosts on the network using various tools. This lab includes the following tasks: 1 – Examining the NTFS File System 2 – Using a HEX Editor to explore an NTFS Partition 3 – Verifying and viewing the image details 4 – Analyzing an NTFS Partition With Autopsy Key TermDescription The acronym NTFS stands for New Technology File System. The NTFS File System was originally introduced with the Windows NT. NTFS is a journaling file system which means it keeps a log of changes being written to the disk. If a computer is shutdown improperly, it will have a better NTFS chance of recovery if it has a journaling file system. Files and folder access can be restricted with the security feature of NTFS. Starting with Windows 2000, Microsoft included the Encrypted File System, or EFS, as an NTFS feature. EFS allows users to encrypt files to protect against unauthorized access. A Feature of the NTFS File system that allows you to encrypt files and folders. The feature EFS became available on the NTFS File system starting with Windows 2000, and is still available today on Windows 10 and Server 2016. An Alternate Data Stream, or ADS, is a feature of the NTFS file system that allowed compatibility ADS with older versions of the Mac OS.
    [Show full text]
  • MIPS32 Malta Linux
    MIPS32 Malta Linux Imperas Software Limited Imperas Buildings, North Weston, Thame, Oxfordshire, OX9 2HA, UK [email protected] Author: OVP Version: 1.4.1 Filename: OVP_MIPS_Linux_Platform_User_Guide.doc Project: MIPS32 Malta Linux Platform Last Saved: December 7, 2016 Keywords: OVP MIPS Malta Linux © 2010 Imperas Software Limited www.OVPworld.org Page 1 of 115 MIPS32 Malta Linux Platform Copyright Notice Copyright © 2016 Imperas Software Limited All rights reserved. This software and documentation contain information that is the property of Imperas Software Limited. The software and documentation are furnished under a license agreement and may be used or copied only in accordance with the terms of the license agreement. No part of the software and documentation may be reproduced, transmitted, or translated, in any form or by any means, electronic, mechanical, manual, optical, or otherwise, without prior written permission of Imperas Software Limited, or as expressly provided by the license agreement. Right to Copy Documentation The license agreement with Imperas permits licensee to make copies of the documentation for its internal use only. Each copy shall include all copyrights, trademarks, service marks, and proprietary rights notices, if any. Destination Control Statement All technical data contained in this publication is subject to the export control laws of the United States of America. Disclosure to nationals of other countries contrary to United States law is prohibited. It is the reader’s responsibility to determine the applicable regulations and to comply with them. Disclaimer IMPERAS SOFTWARE LIMITED, AND ITS LICENSORS MAKE NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
    [Show full text]
  • Chapter 3. Booting Operating Systems
    Chapter 3. Booting Operating Systems Abstract: Chapter 3 provides a complete coverage on operating systems booting. It explains the booting principle and the booting sequence of various kinds of bootable devices. These include booting from floppy disk, hard disk, CDROM and USB drives. Instead of writing a customized booter to boot up only MTX, it shows how to develop booter programs to boot up real operating systems, such as Linux, from a variety of bootable devices. In particular, it shows how to boot up generic Linux bzImage kernels with initial ramdisk support. It is shown that the hard disk and CDROM booters developed in this book are comparable to GRUB and isolinux in performance. In addition, it demonstrates the booter programs by sample systems. 3.1. Booting Booting, which is short for bootstrap, refers to the process of loading an operating system image into computer memory and starting up the operating system. As such, it is the first step to run an operating system. Despite its importance and widespread interests among computer users, the subject of booting is rarely discussed in operating system books. Information on booting are usually scattered and, in most cases, incomplete. A systematic treatment of the booting process has been lacking. The purpose of this chapter is to try to fill this void. In this chapter, we shall discuss the booting principle and show how to write booter programs to boot up real operating systems. As one might expect, the booting process is highly machine dependent. To be more specific, we shall only consider the booting process of Intel x86 based PCs.
    [Show full text]
  • IBM Cognos Analytics - Reporting Version 11.1
    IBM Cognos Analytics - Reporting Version 11.1 User Guide IBM © Product Information This document applies to IBM Cognos Analytics version 11.1.0 and may also apply to subsequent releases. Copyright Licensed Materials - Property of IBM © Copyright IBM Corp. 2005, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. IBM, the IBM logo and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at " Copyright and trademark information " at www.ibm.com/legal/copytrade.shtml. The following terms are trademarks or registered trademarks of other companies: • Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. • Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. • Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. • Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. • UNIX is a registered trademark of The Open Group in the United States and other countries. • Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
    [Show full text]
  • A Dll Required for This Install Could Not Be Run
    A Dll Required For This Install Could Not Be Run Foldable Hannibal saunter anticipatorily and respectably, she reseat her wentletrap overlaid retractively. Which Arne igniting butso cheap berrying that her Dickie instruments triturated flying. her tanists? Analyzed Giovanne still encyst: salt and Circassian Whitby outface quite fervently This product was an option, microsoft distributed dll required dll for could not a install the problem for fixing the table doe Will not a install could be run this dll required for what is solved by multiple rows into boot. How to resolve my case, code and performance cookies and this dll for install a could not be run in. Any solution is required actions, hardware failure and be. If he're running Windows installation as the repair source or sale you're using Windows from a. Thank you for safe prompt response. A DLL required for this installation to complete could not be run. Does this solution from your pc scan with windows installer on target system is this tool in any proposed solutions to use windows updates about how did run a this dll required for could not install be. Reddit on the respective owners in this dll for a required. Set properties are you hate cookies may not a install be run this dll required for instant savings! Could not initialized handler. Your pc and framework, dll could not be able to customize it? Qgis also for this issue, dll required for could not a install it is a time i run. Fix problems installing Chrome Google Chrome Help.
    [Show full text]
  • Your Performance Task Summary Explanation
    Lab Report: 11.2.5 Manage Files Your Performance Your Score: 0 of 3 (0%) Pass Status: Not Passed Elapsed Time: 6 seconds Required Score: 100% Task Summary Actions you were required to perform: In Compress the D:\Graphics folderHide Details Set the Compressed attribute Apply the changes to all folders and files In Hide the D:\Finances folder In Set Read-only on filesHide Details Set read-only on 2017report.xlsx Set read-only on 2018report.xlsx Do not set read-only for the 2019report.xlsx file Explanation In this lab, your task is to complete the following: Compress the D:\Graphics folder and all of its contents. Hide the D:\Finances folder. Make the following files Read-only: D:\Finances\2017report.xlsx D:\Finances\2018report.xlsx Complete this lab as follows: 1. Compress a folder as follows: a. From the taskbar, open File Explorer. b. Maximize the window for easier viewing. c. In the left pane, expand This PC. d. Select Data (D:). e. Right-click Graphics and select Properties. f. On the General tab, select Advanced. g. Select Compress contents to save disk space. h. Click OK. i. Click OK. j. Make sure Apply changes to this folder, subfolders and files is selected. k. Click OK. 2. Hide a folder as follows: a. Right-click Finances and select Properties. b. Select Hidden. c. Click OK. 3. Set files to Read-only as follows: a. Double-click Finances to view its contents. b. Right-click 2017report.xlsx and select Properties. c. Select Read-only. d. Click OK. e.
    [Show full text]
  • Foxclone User Guide
    Foxclone V46 Return to contents Foxclone User Guide To navigate round the guide: • Any item in the contents can be clicked to go to that item. • At the top of every page is a link that will go to the contents list. • Any items highlighted will go to the item, e.g. this will go to the contents list. 22 August 2021 Page 1 of 58 Foxclone V46 Return to contents Contents Contents ................................................................................................................................ 2 What is it? ............................................................................................................................. 4 How should it be used? ......................................................................................................... 5 Installation ............................................................................................................................ 6 Linux ....................................................................................................................... 6 Windows .................................................................................................................... 8 Boot ................................................................................................................................... 9 The desktop ......................................................................................................................... 11 Foxclone .............................................................................................................................
    [Show full text]
  • WE866C3 Wi-Fi and Bluetooth Network Interface Card (NIC) User
    WE866Cx Wi-Fi and Bluetooth Network Interface Card (NIC) User Guide 1VV0301545 Rev. 10 – 2020-06-08 WE866Cx Wi-Fi and Bluetooth Network Interface Card (NIC) User Guide SPECIFICATIONS ARE SUBJECT TO CHANGE WITHOUT NOTICE NOTICE While reasonable efforts have been made to assure the accuracy of this document, Telit assumes no liability resulting from any inaccuracies or omissions in this document, or from use of the information obtained herein. The information in this document has been carefully checked and is believed to be reliable. However, no responsibility is assumed for inaccuracies or omissions. Telit reserves the right to make changes to any products described herein and reserves the right to revise this document and to make changes from time to time in content hereof with no obligation to notify any person of revisions or changes. Telit does not assume any liability arising out of the application or use of any product, software, or circuit described herein; neither does it convey license under its patent rights or the rights of others. It is possible that this publication may contain references to, or information about Telit products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that Telit intends to announce such Telit products, programming, or services in your country. COPYRIGHTS This instruction manual and the Telit products described in this instruction manual may be, include or describe copyrighted Telit material, such as computer programs stored in semiconductor memories or other media. Laws in the Italy and other countries preserve for Telit and its licensors certain exclusive rights for copyrighted material, including the exclusive right to copy, reproduce in any form, distribute and make derivative works of the copyrighted material.
    [Show full text]
  • Linux Based Mobile Operating Systems
    INSTITUTO SUPERIOR DE ENGENHARIA DE LISBOA Área Departamental de Engenharia de Electrónica e Telecomunicações e de Computadores Linux Based Mobile Operating Systems DIOGO SÉRGIO ESTEVES CARDOSO Licenciado Trabalho de projecto para obtenção do Grau de Mestre em Engenharia Informática e de Computadores Orientadores : Doutor Manuel Martins Barata Mestre Pedro Miguel Fernandes Sampaio Júri: Presidente: Doutor Fernando Manuel Gomes de Sousa Vogais: Doutor José Manuel Matos Ribeiro Fonseca Doutor Manuel Martins Barata Julho, 2015 INSTITUTO SUPERIOR DE ENGENHARIA DE LISBOA Área Departamental de Engenharia de Electrónica e Telecomunicações e de Computadores Linux Based Mobile Operating Systems DIOGO SÉRGIO ESTEVES CARDOSO Licenciado Trabalho de projecto para obtenção do Grau de Mestre em Engenharia Informática e de Computadores Orientadores : Doutor Manuel Martins Barata Mestre Pedro Miguel Fernandes Sampaio Júri: Presidente: Doutor Fernando Manuel Gomes de Sousa Vogais: Doutor José Manuel Matos Ribeiro Fonseca Doutor Manuel Martins Barata Julho, 2015 For Helena and Sérgio, Tomás and Sofia Acknowledgements I would like to thank: My parents and brother for the continuous support and being the drive force to my live. Sofia for the patience and understanding throughout this challenging period. Manuel Barata for all the guidance and patience. Edmundo Azevedo, Miguel Azevedo and Ana Correia for reviewing this document. Pedro Sampaio, for being my counselor and college, helping me on each step of the way. vii Abstract In the last fifteen years the mobile industry evolved from the Nokia 3310 that could store a hopping twenty-four phone records to an iPhone that literately can save a lifetime phone history. The mobile industry grew and thrown way most of the proprietary operating systems to converge their efforts in a selected few, such as Android, iOS and Windows Phone.
    [Show full text]
  • System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1
    SUSE Linux Enterprise Server 15 SP1 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1 An administrator's guide for problem detection, resolution and optimization. Find how to inspect and optimize your system by means of monitoring tools and how to eciently manage resources. Also contains an overview of common problems and solutions and of additional help and documentation resources. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xii 1 Available Documentation xiii
    [Show full text]