summaryrefslogtreecommitdiffstats
path: root/doc/faq2
blob: 1532f3a664c2a5e2f15bd73c27e6d85ee77e43b3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
FAQ2:

This file tries to collect a bunch of common questions/answers about flashing


*) Why implement a free software flasher?

  The Nokia Internet Tablets are based on Free Software (software libre), but
  not everything included *is* free software, for instance, the firmware flasher
  tool.

  The 0xFFFF project aims to feed the minds of those who really want to
  understand how these gadgets work internally, free the knowledge to
  avoid the restrictions and fill the lack of information on the most
  important part of the system.

  That's it, now you can build and run this flasher on *BSD, w32, MacOSX on ARM,
  powerpc, x86, mips, etc...


*) Can I brick my device?

  Of course! You're free to do what you want with your device :)

  Seriously. Flashing a device is not a safe thing, so I give no warranty
  of what will happen to your device when using this tool.

  BTW, after a huge number of tests I can say that these devices are hard
  to brick, but if you are scared about bricking your device you should
  use the flasher provided by Nokia, it's better for your heart's health.


*) What can I do with 0xFFFF?

  Actually 0xFFFF allows you to:

  - flash separated pieces of the firmware
  - flash full FIASCO image
  - load kernel & initfs without flashing
  - cold-flash bricked device (without NOLO)
  - retrieve information about the device
  - reboot de mother board
  - extract the current firmware pieces from the device (dump)
  - set the USB host/slave mode
  - set the R&R mode and flags
  - pack/unpack FIASCO firmwares
  - automatic piece identifier


*) What is NOLO?

  NOLO is the 'server-side' part of the flasher from Nokia. NOLO means
  NOkia LOader and it's composed by two pieces of the firmware that are
  flashed together.

  On the n800 firmwares, these two pieces are distributed in a single
  file, but when flashing a 770, NOLO requires to provide the xloader
  (without committing) and then the secondary piece.

  This piece of software is closed source and is the responsible of
  handling the requests from the client-side flasher. It provides a
  query-like interface via usb control messages for doing different
  actions on the device.


*) How can I identify my device?

  Theoretically 770 and n800 have different USB device ID, but this is not
  true at all. The first series of the n800 comes with the same usb-id
  than 770. That's weird!

  So, the only way to identify the device is by asking nolo for the version
  information of different pieces of the firmware. This can be faked, because
  you can flash 770 stuff on n800 and viceversa, but it's not recommended
  because it wouldn't work :)


*) Can I unpack FIASCO blobs?

  Yes, last version of 0xFFFF has full support of FIASCO images.