EMMCFirmwareBugs » History » Revision 5
Revision 4 (Denis 'GNUtoo' Carikli, 11/22/2020 03:47 PM) → Revision 5/11 (Denis 'GNUtoo' Carikli, 11/22/2020 04:55 PM)
h1. EMMCFirmwareBugs {{toc}} h2. Data corruption Several devices have fixes or workarounds in vendor kernels for data corruptions in the eMMC. This can lead to non-working devices as it could potentially corrupt the bootloaders for instance. The bug #2104 has more details for the Galaxy SIII. h3. Affected devices h4. VTU00M *Affected devices*: Some Galaxy SIII (GT-I9300) *Vendor kernel patch*: "mmc: Soft-patch MoviNAND VTU00M (16GB) eMMC failure":https://git.replicant.us/replicant/kernel_samsung_smdk4412/commit/?id=da8461692362317a8ffce4d4646953985fcf4e1d *Upstream status*: not upstream *Replicant >=9 status*: not yet ported h5. How to check As this patch shows: <pre> + if (!strncmp(host->card->cid.prod_name, "VTU00M", 6) && + (host->card->cid.prod_rev == 0xf1) && + (mmc_start_movi_smart(host->card) == 0x2)) + host->card->movi_ops = 0x2; </pre> * The name of the eMMC is VTU00M * Only certain revisions are affected (revision 0xf1) * The revision is probably in the prv field With Replicant > 6 we can find the eMMC name like that: <pre> $ adb root $ adb shell i9300:/ # cat /sys/bus/mmc/devices/mmc2:0001/name VTU00M </pre> Here this has been tested with a GT-I9300 with a work in progress Replicant 10 image that uses a kernel closely based on upstream Linux. h5. Vendor kernel workaround analysis The "mmc: Soft-patch MoviNAND VTU00M (16GB) eMMC failure":https://git.replicant.us/replicant/kernel_samsung_smdk4412/commit/?id=da8461692362317a8ffce4d4646953985fcf4e1d patch patches the eMMC firmware at runtime (it patches the firmware in RAM). The eMMC firmware patch makes the eMMC hang when a corruption is about to happen.