summaryrefslogtreecommitdiffstats
path: root/doc/usage
blob: d297505a2b935e070dcd6ec29ae92987b63d100e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
<b>Usage guide</b>

0xFFFF is a free software implementation of the flasher for the Nokia Internet
Tablets (n770 and n800).
 <pre>
  - flash separated pieces of the firmware.
  - retrieve information about the device
  - reboot de mother board
  - extract the current firmware pieces from the device (dump)
  - set the USB host/slave mode
  - fine grained R&D flags support
  - identify firmware pieces
  - dump mtd partitions (embedded mtd-utils source code)
  - reconstruct initfs from a dump
  - dump config partition
  - automatic piece identifier
  - console mode (shell like)
  </pre>
This is the help message of the tool:
<pre>
<b>~$ 0xFFFF -h</b>
0xFFFF v0.2  // The Free Fiasco Firmware Flasher
 -b [arg]       boots the kernel with arguments
 -e [path]      dump and extract pieces to path
 -r [0|1]       disable/enable R&D mode
 -f <flags>     set the given RD flags (see '-f help')
 -p [[p%]file]  piece-of-firmware % file-where-this-piece-is
 -u [fiasco]    unpack target fiasco image
 -U [0|1]       disable/enable the usb host mode
 -s [serial]    serial port console (minicom like terminal)
 -C [/dev/mtd]  check bad blocks on mtd
 -c             console prompt mode
 -h             show this help message
 -i             show device information (let standby mode)
 -I [piece]     identify a firmware piece
 -l             list supported usb device ids
 -d [vid:pid]   injects a usb device into the supported list
 -D [0|1|2]     sets the root device to flash (0), mmc (1) or usb (2)
 -R             reboot the omap board
 -x             extract configuration entries from /dev/mtd1
 -v             be verbose and noisy
 -V             show 0xFFFF version information
Pieces are: xloader secondary kernel initfs rootfs omap-nand 
</pre>

Before anything we can execute failsafe queries like getting device information:
<pre> <b>~$ 0xFFFF -i</b></pre>
This command will put the bootloader in standby mode, so you can now send other
commands without having to reboot the tablet manually. To reboot the mother
board via USB type:
<pre> <b>~$ 0xFFFF -R</b></pre>
You can run 'offline' commands to identify the type of the firmware pieces:
<pre> <b>~$ 0xFFFF -I zImage -I xloader.bin -I initfs.jffs2.orig</b>
 kernel: zImage
 xloader: xloader.bin
 initfs: initfs.jffs2.orig</pre>
If you want to backup your device firmware you can crosscompile the 0xFFFF
utility and type this on the terminal:
<pre> <b>~$ sudo gainroot</b>
 ~# mkdir /media/mmc1/firmware
 ~# ./0xFFFF -e /media/mmc1/firmware</pre>
Now is time to flash something :) By default the flasher identifies the type
of the piece automatically, but you can force't prefixing the filename with
the piece-type name. To do this is just as simple as typing:
<pre> <b>~$ 0xFFFF -p zImage</b></pre>