Message ID | 3894732.7V3RtbdnC8@tool |
---|---|
State | Superseded |
Delegated to: | Álvaro Fernández |
Headers | show
Return-Path: <openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org> X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.openwrt.org (client-ip=2607:7c80:54:e::133; helo=bombadil.infradead.org; envelope-from=openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org; receiver=<UNKNOWN>) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20170209 header.b=pdEhQZhK; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20161025 header.b=IDyXT0ZK; dkim-atps=neutral Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 49XxBY2mW2z9sSk for <incoming@patchwork.ozlabs.org>; Fri, 29 May 2020 04:32:21 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:Subject:MIME-Version:Message-ID:Date:To :From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=1moPr0z4PukCa24w6tgCsidYfEPXnwxkyg1r3mxZLV0=; b=pdEhQZhK3C99qw vjXrLqLlEt/orZ02IKR29IVUI+wi3YH9FeuEA8Crp+r9NihnY5F8ZLTvGhy3OTL60kk56UJpBpZE3 o9MpIt58TtXzGahupfrfV7O387L3AHE1G3ea83ixniNtWVjjn6Dy/cv2ztE8Z4gwXzv2L0lfuEBUc Z7ZyR1dAIoGPjWO75nr0g7Zwjeb5zymGbUC7W1lQ1IrtpFT0YsHjAIavmMB6zdzP/9hD9lU32fyJo fm24L8UxYBGD//w3V//8gDwBB2TGp6xIHMJCKKO1QbH10XHp7TtD7XIFrNWmEGw5gH7zWwPlBhyc4 7i3q7AHAvSQRf+CVeSKA==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1jeNKA-00048A-N6; Thu, 28 May 2020 18:32:14 +0000 Received: from mail-wm1-x344.google.com ([2a00:1450:4864:20::344]) by bombadil.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1jeNK8-00047e-8N for openwrt-devel@lists.openwrt.org; Thu, 28 May 2020 18:32:13 +0000 Received: by mail-wm1-x344.google.com with SMTP id k26so4589866wmi.4 for <openwrt-devel@lists.openwrt.org>; Thu, 28 May 2020 11:32:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=673DIcRzP2TSSqsdDlFdOhGGWvM04D0kskOtXDZK2iY=; b=IDyXT0ZKCZz25+2bsyemdIkigeIuqUABIyp8fEUtM8IGsxUDk3HoUCttqBUDPDVAKy heyttTci0p5QzK9S8JbvQNNYpkZIur5B+rnx9wOJatk/6oJgnCKFQFuW6w9q+ZMAXZmm vUKpRnLe5cuCAY++3uj9H7vf1G39WunT3kY68nP/RRkLkIgLaNUT8UUVjeMzJ2vFG5Dy U7+IDNtRunqh9J8vlvEw3qx14Y5UHewU3X1uOwaFuMEo4fgVi1hkHjBvuCKjTKlTzo0d K1einMOP97mMHaNwldlcgFhtYoqu5utq+QrSSOnNT7nL5zPeODclLGHGHlLAr1nu9CWG UFSA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=673DIcRzP2TSSqsdDlFdOhGGWvM04D0kskOtXDZK2iY=; b=oiP0yNWKmHjK5T3rJYxUaMNRzbDpdZJLxzfoVOPG/bG0DCNH/4zRJ4Ngnn1J7Hf+Gn bAPZaYMOsQOM9sLyQoIJmirfrKgHeeLwYKefYllnG2mnH4Yz+BzsSxkh/5x9fuBj/Sv6 cPr8ypzCMkZTm0v21BeTiEmK9xab6QoK7c0Q9UU9NQd/LplexZ3XxfHhcePtRY4tSvMZ Z3PklF8sgv120YMCpCUAcW3XI00Lje1NSFyZDN2m0FPySexQC9RCCSwmDgNx8uE9eh8y zVqjRaJA75kyzt5wEiKAjuUzGxystrIujxWU1cVTf8vKBVn7LHdjsAXs2g1o2/3jB2Mf fwbw== X-Gm-Message-State: AOAM533g3eBTrI3DoyEGcu/xYBfAZ31fwZXsBXqGKcljYw21O0gBpi/X G2aFsMWOUffmueWvRsr49fGcrKRP X-Google-Smtp-Source: ABdhPJyC9km+3/ge2C/ecgL0td7zbdWHMAKrtBnzAn9gWnbRnY4wxJ8+4KLI0Z0G/rt5LJQ966BfGQ== X-Received: by 2002:a05:600c:146:: with SMTP id w6mr4459347wmm.97.1590690728428; Thu, 28 May 2020 11:32:08 -0700 (PDT) Received: from tool.localnet ([213.177.197.81]) by smtp.googlemail.com with ESMTPSA id z22sm7044195wmf.9.2020.05.28.11.32.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 28 May 2020 11:32:05 -0700 (PDT) From: Daniel =?iso-8859-1?q?Gonz=E1lez?= Cabanelas <dgcbueu@gmail.com> To: openwrt-devel@lists.openwrt.org Date: Thu, 28 May 2020 20:29:14 +0200 Message-ID: <3894732.7V3RtbdnC8@tool> MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20200528_113212_299692_D25DBE48 X-CRM114-Status: UNSURE ( 6.81 ) X-CRM114-Notice: Please train this message. X-Spam-Score: -0.2 (/) X-Spam-Report: SpamAssassin version 3.4.4 on bombadil.infradead.org summary: Content analysis details: (-0.2 points) pts rule name description ---- ---------------------- -------------------------------------------------- -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at https://www.dnswl.org/, no trust [2a00:1450:4864:20:0:0:0:344 listed in] [list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider [dgcbueu[at]gmail.com] -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature Subject: [OpenWrt-Devel] [PATCH] bcm63xx: AD1018: generate a factory image X-BeenThere: openwrt-devel@lists.openwrt.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: <openwrt-devel.lists.openwrt.org> List-Unsubscribe: <http://lists.infradead.org/mailman/options/openwrt-devel>, <mailto:openwrt-devel-request@lists.openwrt.org?subject=unsubscribe> List-Archive: <http://lists.infradead.org/pipermail/openwrt-devel/> List-Post: <mailto:openwrt-devel@lists.openwrt.org> List-Help: <mailto:openwrt-devel-request@lists.openwrt.org?subject=help> List-Subscribe: <http://lists.infradead.org/mailman/listinfo/openwrt-devel>, <mailto:openwrt-devel-request@lists.openwrt.org?subject=subscribe> Cc: noltari@gmail.com Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Sender: "openwrt-devel" <openwrt-devel-bounces@lists.openwrt.org> Errors-To: openwrt-devel-bounces+incoming=patchwork.ozlabs.org@lists.openwrt.org |
Series |
[OpenWrt-Devel] bcm63xx: AD1018: generate a factory image
|
expand
|
diff --git a/target/linux/bcm63xx/image/bcm63xx_nand.mk b/target/linux/bcm63xx/image/bcm63xx_nand.mk index 5483c73077..510a6f26c8 100644 --- a/target/linux/bcm63xx/image/bcm63xx_nand.mk +++ b/target/linux/bcm63xx/image/bcm63xx_nand.mk @@ -113,6 +113,8 @@ TARGET_DEVICES += netgear_dgnd3700-v2 ### Sercomm ### define Device/sercomm_ad1018 $(Device/bcm63xx-nand) + IMAGES += factory.bin + IMAGE/factory.bin := append-kernel | pad-to $$$$(KERNEL_SIZE) | append-ubi IMAGE/cfe.bin := append-kernel | pad-to $$$$(KERNEL_SIZE) | ad1018-jffs2-cferam | append-ubi | cfe-wfi-tag DEVICE_VENDOR := Sercomm DEVICE_MODEL := AD1018
Currently there is no image that can be flashed without opening the case and accessing the serial port on the Sercomm AD1018 router. We can use an unencrypted factory image to flash Openwrt through the stock firmware. The router comes with 2 stock firmwares, we must perform the flash operation from the 2nd one. 1st option: using the factory busybox CLI: - boot the second firmware flash_eraseall /dev/mtd8 flash_eraseall /dev/mtd9 echo -n "eRcOmM.000" | dd of=/dev/mtdblock8 echo -n "eRcOmM.001" | dd of=/dev/mtdblock9 reboot - flash the Openwrt factory image flash_eraseall -j /dev/mtd6 dd if=openwrt-factory.bin of=/dev/mtdblock6 - boot the first firmware flash_eraseall /dev/mtd8 echo -n "eRcOmM.002" | dd of=/dev/mtdblock8 reboot 2nd option: using the factory web UI - with sercomm make_img proprietary utility and the openwrt-factory.bin as the input, generate the openwrt-factory.img encrypted image - boot the second firmware flash_eraseall /dev/mtd8 flash_eraseall /dev/mtd9 echo -n "eRcOmM.000" | dd of=/dev/mtdblock8 echo -n "eRcOmM.001" | dd of=/dev/mtdblock9 reboot - flash the openwrt-factory.img image using the factory web UI Signed-off-by: Daniel González Cabanelas <dgcbueu@gmail.com> --- target/linux/bcm63xx/image/bcm63xx_nand.mk | 2 ++ 1 file changed, 2 insertions(+)