summaryrefslogtreecommitdiffstats
path: root/doc/usage
blob: d27e671f6e6b6522bdad66131d9fd56fc1dfc94f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
<b>Usage guide</b>

0xFFFF is a free software implementation of the flasher for the Nokia Internet
Tablets (770 and n800).
 <pre>
  - flash separated pieces of the firmware.
  - retrieve information about the device
  - reboot de mother board
  - extract the current firmware pieces from the device (dump)
  - set the USB host/slave mode
  - pack/unpack fiasco firmwares
  - fine grained R&D flags support
  - identify firmware pieces
  - dump mtd partitions (embedded mtd-utils source code)
  - reconstruct initfs from a dump
  - dump config partition
  - automatic piece identifier
  - console mode (shell like)
  </pre>
This is the help message of the tool:
<pre>
<b>~$ 0xFFFF -h</b>
0xFFFF v0.3  // The Free Fiasco Firmware Flasher
 -b [arg]       boots the kernel with arguments
 -c             console prompt mode
 -C [/dev/mtd]  check bad blocks on mtd
 -d [vid:pid]   injects a usb device into the supported list
 -D [0|1|2]     sets the root device to flash (0), mmc (1) or usb (2)
 -e [path]      dump and extract pieces to path
 -f <flags>     set the given RD flags (see '-f help')
 -F [fiasco]    flash a fiasco firmware image
 -h             show this help message
 -H [file]      calculate hash for file
 -i             show device information (let standby mode)
 -I [piece]     identify a firmware piece
 -l, -L         list supported usb device ids
 -p [[p%]file]  piece-of-firmware % file-where-this-piece-is
 -r [0|1]       disable/enable R&D mode
 -R             reboot the omap board
 -s [serial]    serial port console (minicom like terminal)
 -u [fiasco]    unpack target fiasco image
 -U [0|1]       disable/enable the usb host mode
 -v             be verbose and noisy
 -V             show 0xFFFF version information
 -x             extract configuration entries from /dev/mtd1
Pieces are: xloader secondary kernel initfs rootfs omap-nand 
</pre>

Before anything we can execute failsafe queries like getting device information:
<pre> <b>~$ 0xFFFF -i</b></pre>
This command will put the bootloader in standby mode, so you can now send other
commands without having to reboot the tablet manually. To reboot the mother
board via USB type:
<pre> <b>~$ 0xFFFF -R</b></pre>
You can run 'offline' commands to identify the type of the firmware pieces:
<pre> <b>~$ 0xFFFF -I zImage -I xloader.bin -I initfs.jffs2.orig</b>
 kernel: zImage
 xloader: xloader.bin
 initfs: initfs.jffs2.orig</pre>
If you want to backup your device firmware you can crosscompile the 0xFFFF
utility and type this on the terminal:
<pre> <b>~$ sudo gainroot</b>
 ~# mkdir /media/mmc1/firmware
 ~# ./0xFFFF -e /media/mmc1/firmware</pre>
Now is time to flash something :) By default the flasher identifies the type
of the piece automatically, but you can force't prefixing the filename with
the piece-type name. To do this is just as simple as typing:
<pre> <b>~$ 0xFFFF -p zImage</b></pre>