Solved

SD Card, CMD38 - strange erase problem

Posted on 2009-03-29
4
1,244 Views
Last Modified: 2013-12-10
Hello all,

Developing my current microcontroller project I discovered a strange behavior trying to erase some SDHC card labeled PQI but reported from CID as 'Transcent SM 00000, rev. 1.0'. I searched this manufacturer and seems to be pirate

Anyhow, after CMD32 and 33 (both acknowledged ok by R1=0x00) and after CMD38 -> erase execute (this one too acknowledged ok, R1=0x00) my card isn't erased ! I tried many START-END sector combinations. Instead I get for all SCR (card status register or R2) = 0x0002 meaning 'Write-protect erase-skip/lock/unlock command failed'.

Ok but card is new, lock is in unlock state (checked) and I can read/write single/multiple sectors without any problems.
I tried to get so called 'Write Protected' sectors (to see if have ones) by CMD30 and report is 'Illegal command' so card don't have that feature.

One more thing... after CMD38... this card replies immediatelly by 0xFF after 2 bytes 0x00 so I observed too short 'time of erase' or erase isn't executed at all. For all other cards this takes a little while erasing to complete... (keeping 0x00 bus as busy)

So is possible 'Erase' not to be implemented as long as card manufacturer is questionable ?...
Any ideas ? Tnx in advance,
0
Comment
Question by:mxzuzu
  • 2
4 Comments
 
LVL 34

Expert Comment

by:Michael-Best
ID: 24017965
Return it, I had SD that worked if you jiggled it???
But I lost reciept, so Ahhh
0
 
LVL 34

Expert Comment

by:Michael-Best
ID: 24017979
0
 
LVL 26

Accepted Solution

by:
PCBONEZ earned 500 total points
ID: 24065691
Transcent a real company that makes cheap junk and tries to look like Transcend.
But, I don't think Transcent is the actual counterfeiter.
Some third slapped PQI labels on Transcent parts to beef up their profits.

You problems are because the card is actually Transcent,,,
... a real company that makes cheap junk.

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Article by: SHIELD1
The 5 R's 1. Repair 2. Restore 3. Reinstall 4. Remote admin 5. Run away OK so I'm not the most skilled engineer around but I definitely have an abundance of experience: electronic repairs since I was 13 and PC and computer hardware repair…
Like many organizations, your foray into cloud computing may have started with an ancillary or security service, like email spam and virus protection. For some, the first or second step into the cloud was moving email off-premise. For others, a clou…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now