Solved

SD Card, CMD38 - strange erase problem

Posted on 2009-03-29
4
1,215 Views
Last Modified: 2013-12-10
Hello all,

Developing my current microcontroller project I discovered a strange behavior trying to erase some SDHC card labeled PQI but reported from CID as 'Transcent SM 00000, rev. 1.0'. I searched this manufacturer and seems to be pirate

Anyhow, after CMD32 and 33 (both acknowledged ok by R1=0x00) and after CMD38 -> erase execute (this one too acknowledged ok, R1=0x00) my card isn't erased ! I tried many START-END sector combinations. Instead I get for all SCR (card status register or R2) = 0x0002 meaning 'Write-protect erase-skip/lock/unlock command failed'.

Ok but card is new, lock is in unlock state (checked) and I can read/write single/multiple sectors without any problems.
I tried to get so called 'Write Protected' sectors (to see if have ones) by CMD30 and report is 'Illegal command' so card don't have that feature.

One more thing... after CMD38... this card replies immediatelly by 0xFF after 2 bytes 0x00 so I observed too short 'time of erase' or erase isn't executed at all. For all other cards this takes a little while erasing to complete... (keeping 0x00 bus as busy)

So is possible 'Erase' not to be implemented as long as card manufacturer is questionable ?...
Any ideas ? Tnx in advance,
0
Comment
Question by:mxzuzu
  • 2
4 Comments
 
LVL 34

Expert Comment

by:Michael-Best
Comment Utility
Return it, I had SD that worked if you jiggled it???
But I lost reciept, so Ahhh
0
 
LVL 34

Expert Comment

by:Michael-Best
Comment Utility
0
 
LVL 26

Accepted Solution

by:
PCBONEZ earned 500 total points
Comment Utility
Transcent a real company that makes cheap junk and tries to look like Transcend.
But, I don't think Transcent is the actual counterfeiter.
Some third slapped PQI labels on Transcent parts to beef up their profits.

You problems are because the card is actually Transcent,,,
... a real company that makes cheap junk.

0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Hello It is a very old trick to use a ram disk in order to boost PC performances, in the past, when in home environments the fastest common devices were floppy disks a part of the very small ram memory available was used to create a virtual hard …
I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
This video discusses moving either the default database or any database to a new volume.
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now