i have an azbox premium stuck on booting, serial port shows only this:
xosPe0 serial#fb6660ccb1914db3d671f1ff6e 9b0713 subid 0x50
xenv cs2
Now, i finally managed to get the JTAG working on this premium, see attached diagram, i used the second one as this premiun has no resistor packs, seven pullup resistors go to 3.3v one pulldown goes to gnd( shown as a ? in diagram).
After succesfully reflashing which took 28 hours to do, the same bloody thing, stuck on booting with "xenv CS2". I really thought that reflashing would cure this.
Has anyone suggestions how i can proceed? I used the instructions and cfe.bin file from a russian web site. I'm hoping there is maybe another file i can flash to get this box recovered, i read somewhere about getting a YAMON loaded without xenv and reset?
So if anyone knows why the box is not getting past the "xenv cs2" bit, i'd appreciate it.
==============
procedure:
1 -Open a terminal and create a new folder named azbox:
mkdir azbox
cd azbox
sudo apt-get install libftdi-dev libftdi1 libusb-dev
-Download the file ===>
http://www.4shared.com/file/a6Wz4Bc5...-azboxtar.html
tar xjvf openocd-0.4.0-azbox.tar.bz2
cd openocd-0.4.0-azbox/
./configure --enable-dummy --enable-parport --enable-parport_ppdev --enable-amtjtagaccel --enable-verbose
make
sudo make install
sudo ln sf /usr/local/bin/openocd /usr/bin/openocd
sudo cp smp8634.cfg /usr/local/share/openocd/scripts/target/smp8634.cfg
sudo cp azbox.cfg /usr/local/share/openocd/scripts/board/azbox.cfg
################################# ##############################
-2 UNPROTECT BIOS BEFORE YOU WRITE WITH tjtag
################################# ##############################
sudo rmmod lp
cd /usr/local/share/openocd/scripts
sudo openocd -f interface/parport_dlc5.cfg -f board/azbox.cfg
Open a new terminal and type:
sudo telnet localhost 4444
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
Open On-Chip Debugger
>halt
>reset
>reset init
>flash protect 0 0 last off
>flash protect_check 0
>flash info 0
>shutdown
-3 Flash is ready to use the now unprotected tjtag to flash the bios.
sudo ./tjtag -flash:cfe /fc:104 /bypass
=============
final output lines from flashing log:
.
.
[ 99% Flashed] ac7fffb0: ffffffff ffffffff ffffffff ffffffff
[ 99% Flashed] ac7fffc0: ffffffff ffffffff ffffffff ffffffff
[ 99% Flashed] ac7fffd0: ffffffff ffffffff ffffffff ffffffff
[ 99% Flashed] ac7fffe0: ffffffff ffffffff ffffffff ffffffff
[ 99% Flashed] ac7ffff0: ffffffff ffffffff ffffffff ffffffff
Done (CFE.BIN loaded into Flash Memory OK)
=========================
Flashing Routine Complete
=========================
elapsed time: 103053 seconds
*** REQUESTED OPERATION IS COMPLETE ***