2. Post treatment to remove the protection in the flash memory of the receiver:
2.1. We execute the following commands
2.1.1. sudo rmmod lp
2.1.2.cd /usr/local/share/openocd/scripts
2.1.3. sudo openocd -f interface/parport_dlc5.cfg -f board/azbox.cfg
2.2. Open a second terminal shell and type the command
2.2.1. sudo telnet localhost 4444
2.2.2. On the screen you see something like this:
Code:
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
Open On-Chip Debugger
>
2.2.3. In this terminal type the following commands:
2.2.3.1. halt
2.2.3.2. reset
2.2.3.3. reset init
2.2.3.4. flash protect 0 0 last off
2.2.3.5. flash protect_check 0
2.2.3.6. flash info 0
2.2.3.7. shutdown
This is the log of removing protection:
Code:
Open On-Chip Debugger 0.4.0 (2010-07-13-19:47)
Licensed under GNU GPL v2
For bug reports, read
http://openocd.berlios.de/doc/doxygen/bugs.html
parport port = 0x0
jtag_nsrst_delay: 100
jtag_ntrst_delay: 100
trst_and_srst separate srst_gates_jtag trst_push_pull srst_open_drain
Warn : smp8634.cpu: nonstandard IR mask
Warn : use 'smp8634.cpu' as target identifier, not '0'
Info : clock speed 500 kHz
Info : JTAG tap: smp8634.cpu tap/device found: 0x08630001 (mfg: 0x000, part: 0x8630, ver: 0x0)
Info : accepting 'telnet' connection from 0
target state: halted
target halted in MIPS32 mode due to debug-request, pc: 0xbfc00000
Info : JTAG tap: smp8634.cpu tap/device found: 0x08630001 (mfg: 0x000, part: 0x8630, ver: 0x0)
target state: halted
target halted in MIPS32 mode due to debug-request, pc: 0xbfc00000
Info : JTAG tap: smp8634.cpu tap/device found: 0x08630001 (mfg: 0x000, part: 0x8630, ver: 0x0)
target state: halted
target halted in MIPS32 mode due to debug-request, pc: 0xbfc00000
Info : Flash Manufacturer/Device: 0x007f 0x22cb
Error: protect: cfi primary command set 2 unsupported
cleared protection for sectors 0 through 134 on flash bank 0
successfully checked protect state
#0 : cfi at 0xac000000, size 0x00800000, buswidth 2, chipwidth 2
# 0: 0x00000000 (0x2000 8kB) not protected
# 1: 0x00002000 (0x2000 8kB) not protected
# 2: 0x00004000 (0x2000 8kB) not protected
# 3: 0x00006000 (0x2000 8kB) not protected
--------------------------------------------------------
#134: 0x007f0000 (0x10000 64kB) not protected
cfi information:
mfr: 0x007f, id:0x22cb
qry: 'QRY', pri_id: 0x0002, pri_addr: 0x0040, alt_id: 0x0000, alt_addr: 0x0000
Vcc min: 2.7, Vcc max: 3.6, Vpp min: 0.0, Vpp max: 0.0
typ. word write timeout: 16, typ. buf write timeout: 1, typ. block erase timeout: 1024, typ. chip erase timeout: 1
max. word write timeout: 512, max. buf write timeout: 1, max. block erase timeout: 16384, max. chip erase timeout: 1
size: 0x800000, interface desc: 2, max buffer write size: 1
Spansion primary algorithm extend information:
pri: 'PRI', version: 1.1
Silicon Rev.: 0x0, Address Sensitive unlock: 0x0
Erase Suspend: 0x2, Sector Protect: 0x4
VppMin: 10.5, VppMax: 12.5
shutdown command invoked
ubuntu@ubuntu:/usr/local/share/openocd/scripts$
3. Programming the nor-flash memory
3.1. We return to the first terminal window open
3.2. Let's go to the root directory where the files are registered and enter the commands:
3.2.1. make
3.2.2. sudo rmmod lp
3.2.3. sudo ./tjtag -flash:cfe /fc:104 /bypass
From the research I did ... added ....
3.2.3.1 In the case of Azbox Elite on section 3.2.3, type command:sudo ./tjtag -flash:cfe /fc:87 /bypass
Code:
[ 99% Flashed] ac7fffb0: ffffffff ffffffff ffffffff ffffffff
[ 99% Flashed] ac7fffc0: ffffffff ffffffff ffffffff ffffffff
[ 99% Flashed] ac7fffd0: ffffffff ffffffff ffffffff ffffffff
[ 99% Flashed] ac7fffe0: ffffffff ffffffff ffffffff ffffffff
[ 99% Flashed] ac7ffff0: ffffffff ffffffff ffffffff ffffffff
Done (CFE.BIN loaded into Flash Memory OK)
=========================
Flashing Routine Complete
=========================
elapsed time: 85853 seconds
*** REQUESTED OPERATION IS COMPLETE ***
Bookmarks