go and learn at open**** elementry school, opens on the 1st of September.
ps. dont forget to bring a pen and a paper,
and your lunchbox.
I heard you get a special school uniform with open**** logo on it.
Printable View
azbox already dead! ?
uneventful, with no support, no users, no sales.
opensat isolated in Europe, and company goodbye az
Black humor is very optimistic :)))
No other similar receiver does not use Oficial Software all of them are on the alternatives and alternatives to aza on the way :auto:
Check this - another way to get new software easy and nearly for free.
It is not only opensat who needs free programming ;)
check this ,azbox way to get a good software.
Read §3 of the contract pdf,that is like a NDA.
But the question is,who is Opensat and who is Dream?
They drive/drove big mercedes,also McLaren and what you will get,
a sweet vw polo..:sifone:
By the way,OS-Boss drive a normal midclass car,Lancia or Seat,
can t remember me.:biggrinjester:
Im a step forward, but not on Target :)
jtag is talking with me, also telnet on localhost is working, I get an Answer, but then all comands are coming with error in line blabla
halt --- error
reset --- error
shutdown works :)
ubuntu@ubuntu:/usr/local/share/openocd/scripts$ sudo openocd -f interface/parport_dlc5.cfg -f board/azbox.cfg
Open On-Chip Debugger 0.4.0 (2010-08-18-06:43)
Licensed under GNU GPL v2
For bug reports, read
http://openocd.berlios.de/doc/doxygen/bugs.html
parport port = 0x0
jtag_nsrst_delay: 100
jtag_ntrst_delay: 100
trst_and_srst separate srst_gates_jtag trst_push_pull srst_open_drain
Warn : smp8634.cpu: nonstandard IR mask
Warn : use 'smp8634.cpu' as target identifier, not '0'
Info : clock speed 500 kHz
Info : JTAG tap: smp8634.cpu tap/device found: 0xe0110001 (mfg: 0x000, part: 0x0110, ver: 0xe)
Warn : JTAG tap: smp8634.cpu UNEXPECTED: 0xe0110001 (mfg: 0x000, part: 0x0110, ver: 0xe)
Error: JTAG tap: smp8634.cpu expected 1 of 1: 0x08630001 (mfg: 0x000, part: 0x8630, ver: 0x0)
Error: Trying to use configured scan chain anyway...
Warn : Bypassing JTAG setup events due to errors
Info : accepting 'telnet' connection from 0
Info : Halt timed out, wake up GDB.
Error: timed out while waiting for target halted
Command handler execution failed
OK, all breaked and tried tjtag,but dont work:
CPU Chip ID: 11100000000100010000000000000001 (E0110001)
*** Unknown or NO CPU Chip ID Detected ***
*** Possible Causes:
1) Device is not Connected.
2) Device is not Powered On.
3) Improper JTAG Cable.
4) Unrecognized CPU Chip ID.
ubuntu@ubuntu:~/az$
So Im out of Ideas, someone needs a cheap Elite with nice Booting display?
I get stuck and I dont think that anyone gets an Elite working again with no zboot, maybe script wrong, maybe other Adresses like Premium, I dont know.
So my Time ended here for AZbox I think :respect-040:
OK, out of Nerves I shortned all Cables, now max 20cm and CPU is correctly detected, but I Cannot set a halt.
Reset works but no halt
any Ideas please? (kick it out to **** is one, I know)
For to clear what Ive done: Made the jtag, using Ping 2,3,4,13 and 20 (do I need a Bridge between 20 and 25? for me not clear if Ground needed on only 20 or on 20 AND 25 If Yes thats then my Error )
here the new tjtag
This cant work because no CPU halted, but I cant/dunno how:
ad@ubuntu:~/azbox$ sudo ./tjtag -flash:cfe /fc:104 /bypass
================================= =============
EJTAG Debrick Utility v3.0.1 Tornado-MOD
================================= =============
Probing bus ... Done
Instruction Length set to 5
CPU Chip ID: 00001000011000110000000000000001 (08630001)
*** Found a SigmaDesigns SMP8634 Rev A CPU chip ***
- EJTAG IMPCODE ....... : 11111111111111111111111111111110 (FFFFFFFE)
- EJTAG Version ....... : Unknown (7 is a reserved value)
- EJTAG DMA Support ... : No
- EJTAG Implementation flags: R3k DINTsup ASID_8 ASID_6 MIPS16 NoDMA MIPS32
Issuing Processor / Peripheral Reset ... Done
Enabling Memory Writes ... Skipped
Halting Processor ... <Processor Entered Debug Mode!> ... Done
Here the openocd
ad@ubuntu:/usr/local/share/openocd/scripts$ sudo openocd -f interface/parport_dlc5.cfg -f board/azbox.cfg
Open On-Chip Debugger 0.4.0 (2010-08-18-08:29)
Licensed under GNU GPL v2
For bug reports, read
http://openocd.berlios.de/doc/doxygen/bugs.html
parport port = 0x0
jtag_nsrst_delay: 100
jtag_ntrst_delay: 100
trst_and_srst separate srst_gates_jtag trst_push_pull srst_open_drain
Warn : smp8634.cpu: nonstandard IR mask
Warn : use 'smp8634.cpu' as target identifier, not '0'
Info : clock speed 500 kHz
Info : JTAG tap: smp8634.cpu tap/device found: 0x08630001 (mfg: 0x000, part: 0x8630, ver: 0x0)
Info : accepting 'telnet' connection from 0
Info : Halt timed out, wake up GDB.
Error: timed out while waiting for target halted
Command handler execution failed
This is the log from the other window, jumper is set(otherwise you get no connect)
> Connection closed by foreign host.
ad@ubuntu:/$ sudo telnet localhost 4444
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
Open On-Chip Debugger
> halt
Halt timed out, wake up GDB.
timed out while waiting for target halted
Command handler execution failed
in procedure 'halt' called at file "command.c", line 650
called at file "command.c", line 361
It seems to be only a small step to get CPU halted ....
As far as I know you have to put 20-25 to GND (all of them). My jtag for dm500 and other was done like this and worked.
Make the cable less than 20cm.
@Hanswurscht
This diagram will explain the connection in addition to shorten Jumber 309
http://i29.tinypic.com/wme841.jpg
Thx for Reply 4@@@, I have no Yamon, so any try without Jtag is useless
@tonybam, this is new for me, never seen bevor and not really understanding for Elite
Ive used this one in Picture.
So I use in Elite
Pin2 to TDI
Pin3 to TCK
Pin4 to TMS
Pin 13 to TD0
and Pin 20 to GND, also tested 20 AND 25 to GND
It has worked as you see in Log but no Command halt for CPU is working.
Jumper on Elite on right Position for unlock is also set and works(without you cant get a connect with openocd)
@Hanswurscht
The Jtag and archtecture is same for elite and Premium you will find detail in this post use google for translation as it is Russian forum
http://www.pristavka.de/index.php/topic,6691.0.html
I know so far, but I dont need like your Graphic shows. Elite hast two Pins, you can get it very Good. Ive made two Pins in and a Jumper connected, this works!
Again, otherwise you NEVER get a connect with OpenOCD !
So Thematic Jumper should be 100% OK, but... should the Jumper be set on Power on or when booting is on Display. I dont know. I have set it bevor Power on but it is always the same
Here again with Pin 20up to 25 connected to GND
LOG OPENOCD
Open On-Chip Debugger 0.4.0 (2010-08-18-21:06)
Licensed under GNU GPL v2
For bug reports, read
http://openocd.berlios.de/doc/doxygen/bugs.html
parport port = 0x0
jtag_nsrst_delay: 100
jtag_ntrst_delay: 100
trst_and_srst separate srst_gates_jtag trst_push_pull srst_open_drain
Warn : smp8634.cpu: nonstandard IR mask
Warn : use 'smp8634.cpu' as target identifier, not '0'
Info : clock speed 500 kHz
Info : JTAG tap: smp8634.cpu tap/device found: 0x08630001 (mfg: 0x000, part: 0x8630, ver: 0x0)
Info : accepting 'telnet' connection from 0
Warn : target was in unknown state when halt was requested
Info : Halt timed out, wake up GDB.
Error: timed out while waiting for target halted
Command handler execution failed
################################
Now I try with telnet to OCD. There is something new now
> reset
JTAG tap: smp8634.cpu tap/device found: 0x08630001 (mfg: 0x000, part: 0x8630, ver: 0x0)
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
target state: halted
target halted in MIPS32 mode due to debug-request, pc: 0x00000000
> reset init
JTAG tap: smp8634.cpu tap/device found: 0x08630001 (mfg: 0x000, part: 0x8630, ver: 0x0)
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
target state: halted
target halted in MIPS32 mode due to debug-request, pc: 0x00000000
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
> flash protect 0 0 last off
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Flash Manufacturer/Device: 0x46e0 0x46e0
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Could not probe bank: no QRY
Try workaround w/0x555 instead of 0x55 to get QRY.
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Could not probe bank: no QRY
auto_probe failed -900
> flash protect_check 0
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Flash Manufacturer/Device: 0x9810 0x9810
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Could not probe bank: no QRY
Try workaround w/0x555 instead of 0x55 to get QRY.
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Could not probe bank: no QRY
auto_probe failed -900
flash bank '0' not found
flash protect_check bank_id
Command handler execution failed
in procedure 'flash' called at file "command.c", line 650
called at file "command.c", line 361
> shutdown
shutdown command invoked
> Connection closed by foreign host.
ad@ubu:~$
################################# ######
Also here again TJTAG commands
================================= =============
EJTAG Debrick Utility v3.0.1 Tornado-MOD
================================= =============
Probing bus ... Done
Instruction Length set to 5
CPU Chip ID: 00001000011000110000000000000001 (08630001)
*** Found a SigmaDesigns SMP8634 Rev A CPU chip ***
- EJTAG IMPCODE ....... : 11111111111111111111111111111110 (FFFFFFFE)
- EJTAG Version ....... : Unknown (7 is a reserved value)
- EJTAG DMA Support ... : No
- EJTAG Implementation flags: R3k DINTsup ASID_8 ASID_6 MIPS16 NoDMA MIPS32
Issuing Processor / Peripheral Reset ... Done
Enabling Memory Writes ... Skipped
Halting Processor ... <Processor Entered Debug Mode!> ... Done
#############################
I dont see anything I can do
Ill try also this Command:
sudo ./tjtag -flash:cfe /fc:104 /noemw /nocwd /bypass
And it comes one Step more... clearing Wathdog skipped
Then nothing happens...End...Game over
Flashbank 0 not found with command flash_protect check 0
Maybe a Flashchip is dead?
OK, I give up, no Way, no Idea anymore
This was posted by Andrew who success to recover flash
Linux run exclusively from the CD. All data were only on a flash drive .
Further actions can be divided into 3 phases .
1 . install software for removing the protection to access the flash memory of the receiver ;
2 . removal of protection to access the flash memory of the receiver ;
3 . Programming flash memory receiver .
Now detail the stages that I can explain.
1 . install software for removing the protection to access the flash memory of the receiver .
1.1. In Linux run the terminal and go to the directory on flash which recorded above said files
1.2 . the NTsudo apt-get install libftdi-dev libftdi1 libusb-dev
after the execution of this command complains the lack of libusb-dev, but it does not interfere
1.3 . razarhiviruem archive command tar xjvf openocd-0.4.0-azbox.tar.bz2
1.4 . go to the directory cd openocd-0.4.0-azbox /
1.5 . the NT
1.5.1 . / Configure - enable-dummy - enable-parport - enable-parport_ppdev - enable-amtjtagaccel - enable-verbose
1.5.2 . make
1.5.3. sudo make install
1.5.4. sudo ln sf / usr / local / bin / openocd / usr / bin / openocd
1.6 . go to the directory where recorded on flash and type the command
1.6.1 . sudo cp smp8634.cfg / usr/local/share/openocd/scripts/target/smp8634.cfg
1.6.2 . sudo cp azbox.cfg / usr / local / share / openocd / scripts / board / azbox.cfg
2 . removal of protection to access the flash memory of the receiver
2.1 . We type the following commands
2.1.1 . sudo rmmod lp
2.1.2 .cd / usr / local / share / openocd / scripts
2.1.3 . sudo openocd-f interface/parport_dlc5.cfg-f board / azbox.cfg
2.2. Open a second terminal window and type the command
2.2.1 . sudo telnet localhost 4444
2.2.2. On the screen we see something like:
Trying 127.0.0.1 ...
Connected to localhost.
Escape character is'^]'.
Open On-Chip Debugger
>
2.2.3 . recruit with a command
2.2.3.1. halt
2.2.3.2. reset
2.2.3.3. reset init
2.2.3.4. flash protect 0 0 last off
2.2.3.5. flash protect_check 0
2.2.3.6. flash info 0
2.2.3.7. shutdown
In this second stage is completed .
The following quote log unprotect my receiver :
ubuntu @ ubuntu: / media/E0CF-DBCF/azbox $ sudo rmmod lp
ubuntu @ ubuntu: / media/E0CF-DBCF/azbox $ cd / usr / local / share / openocd / scripts
ubuntu @ ubuntu: / usr / local / share / openocd / scripts $ sudo openocd-f interface/parport_dlc5.cfg-f board / azbox.cfg
Open On-Chip Debugger 0.4.0 (2010-07-13-19:47)
Licensed under GNU GPL v2
For bug reports, read
http://openocd.berlios.de/doc/doxygen/bugs.html
parport port = 0x0
jtag_nsrst_delay: 100
jtag_ntrst_delay: 100
trst_and_srst separate srst_gates_jtag trst_push_pull srst_open_drain
Warn: smp8634.cpu: nonstandard IR mask
Warn: use 'smp8634.cpu' as target identifier, not '0 '
Info: clock speed 500 kHz
Info: JTAG tap: smp8634.cpu tap / device found: 0x08630001 (mfg: 0x000, part: 0x8630, ver: 0x0)
Info: accepting 'telnet' connection from 0
target state: halted
target halted in MIPS32 mode due to debug-request, pc: 0xbfc00000
Info: JTAG tap: smp8634.cpu tap / device found: 0x08630001 (mfg: 0x000, part: 0x8630, ver: 0x0)
target state: halted
target halted in MIPS32 mode due to debug-request, pc: 0xbfc00000
Info: JTAG tap: smp8634.cpu tap / device found: 0x08630001 (mfg: 0x000, part: 0x8630, ver: 0x0)
target state: halted
target halted in MIPS32 mode due to debug-request, pc: 0xbfc00000
Info: Flash Manufacturer / Device: 0x007f 0x22cb
Error: protect: cfi primary command set 2 unsupported
cleared protection for sectors 0 through 134 on flash bank 0
successfully checked protect state
# 0 : cfi at 0xac000000, size 0x00800000, buswidth 2 , chipwidth 2
# 0 : 0x00000000 (0x2000 8kB) not protected
This is where the remaining data
spoiler ( click to view hidden text )
# 1: 0x00002000 (0x2000 8kB) not protected
# 2: 0x00004000 (0x2000 8kB) not protected
# 3: 0x00006000 (0x2000 8kB) not protected
# 4: 0x00008000 (0x2000 8kB) not protected
# 5: 0x0000a000 (0x2000 8kB) not protected
# 6: 0x0000c000 (0x2000 8kB) not protected
# 7: 0x0000e000 (0x2000 8kB) not protected
# 8: 0x00010000 (0x10000 64kB) not protected
# 9: 0x00020000 (0x10000 64kB) not protected
# 10: 0x00030000 (0x10000 64kB) not protected
# 11: 0x00040000 (0x10000 64kB) not protected
# 12: 0x00050000 (0x10000 64kB) not protected
# 13: 0x00060000 (0x10000 64kB) not protected
# 14: 0x00070000 (0x10000 64kB) not protected
# 15: 0x00080000 (0x10000 64kB) not protected
# 16: 0x00090000 (0x10000 64kB) not protected
# 17: 0x000a0000 (0x10000 64kB) not protected
# 18: 0x000b0000 (0x10000 64kB) not protected
# 19: 0x000c0000 (0x10000 64kB) not protected
# 20: 0x000d0000 (0x10000 64kB) not protected
# 21: 0x000e0000 (0x10000 64kB) not protected
# 22: 0x000f0000 (0x10000 64kB) not protected
# 23: 0x00100000 (0x10000 64kB) not protected
# 24: 0x00110000 (0x10000 64kB) not protected
# 25: 0x00120000 (0x10000 64kB) not protected
# 26: 0x00130000 (0x10000 64kB) not protected
# 27: 0x00140000 (0x10000 64kB) not protected
# 28: 0x00150000 (0x10000 64kB) not protected
# 29: 0x00160000 (0x10000 64kB) not protected
# 30: 0x00170000 (0x10000 64kB) not protected
# 31: 0x00180000 (0x10000 64kB) not protected
# 32: 0x00190000 (0x10000 64kB) not protected
# 33: 0x001a0000 (0x10000 64kB) not protected
# 34: 0x001b0000 (0x10000 64kB) not protected
# 35: 0x001c0000 (0x10000 64kB) not protected
# 36: 0x001d0000 (0x10000 64kB) not protected
# 37: 0x001e0000 (0x10000 64kB) not protected
# 38: 0x001f0000 (0x10000 64kB) not protected
# 39: 0x00200000 (0x10000 64kB) not protected
# 40: 0x00210000 (0x10000 64kB) not protected
# 41: 0x00220000 (0x10000 64kB) not protected
# 42: 0x00230000 (0x10000 64kB) not protected
# 43: 0x00240000 (0x10000 64kB) not protected
# 44: 0x00250000 (0x10000 64kB) not protected
# 45: 0x00260000 (0x10000 64kB) not protected
# 46: 0x00270000 (0x10000 64kB) not protected
# 47: 0x00280000 (0x10000 64kB) not protected
# 48: 0x00290000 (0x10000 64kB) not protected
# 49: 0x002a0000 (0x10000 64kB) not protected
# 50: 0x002b0000 (0x10000 64kB) not protected
# 51: 0x002c0000 (0x10000 64kB) not protected
# 52: 0x002d0000 (0x10000 64kB) not protected
# 53: 0x002e0000 (0x10000 64kB) not protected
# 54: 0x002f0000 (0x10000 64kB) not protected
# 55: 0x00300000 (0x10000 64kB) not protected
# 56: 0x00310000 (0x10000 64kB) not protected
# 57: 0x00320000 (0x10000 64kB) not protected
# 58: 0x00330000 (0x10000 64kB) not protected
# 59: 0x00340000 (0x10000 64kB) not protected
# 60: 0x00350000 (0x10000 64kB) not protected
# 61: 0x00360000 (0x10000 64kB) not protected
# 62: 0x00370000 (0x10000 64kB) not protected
# 63: 0x00380000 (0x10000 64kB) not protected
# 64: 0x00390000 (0x10000 64kB) not protected
# 65: 0x003a0000 (0x10000 64kB) not protected
# 66: 0x003b0000 (0x10000 64kB) not protected
# 67: 0x003c0000 (0x10000 64kB) not protected
# 68: 0x003d0000 (0x10000 64kB) not protected
# 69: 0x003e0000 (0x10000 64kB) not protected
# 70: 0x003f0000 (0x10000 64kB) not protected
# 71: 0x00400000 (0x10000 64kB) not protected
# 72: 0x00410000 (0x10000 64kB) not protected
# 73: 0x00420000 (0x10000 64kB) not protected
# 74: 0x00430000 (0x10000 64kB) not protected
# 75: 0x00440000 (0x10000 64kB) not protected
# 76: 0x00450000 (0x10000 64kB) not protected
# 77: 0x00460000 (0x10000 64kB) not protected
# 78: 0x00470000 (0x10000 64kB) not protected
# 79: 0x00480000 (0x10000 64kB) not protected
# 80: 0x00490000 (0x10000 64kB) not protected
# 81: 0x004a0000 (0x10000 64kB) not protected
# 82: 0x004b0000 (0x10000 64kB) not protected
# 83: 0x004c0000 (0x10000 64kB) not protected
# 84: 0x004d0000 (0x10000 64kB) not protected
# 85: 0x004e0000 (0x10000 64kB) not protected
# 86: 0x004f0000 (0x10000 64kB) not protected
# 87: 0x00500000 (0x10000 64kB) not protected
# 88: 0x00510000 (0x10000 64kB) not protected
# 89: 0x00520000 (0x10000 64kB) not protected
# 90: 0x00530000 (0x10000 64kB) not protected
# 91: 0x00540000 (0x10000 64kB) not protected
# 92: 0x00550000 (0x10000 64kB) not protected
# 93: 0x00560000 (0x10000 64kB) not protected
# 94: 0x00570000 (0x10000 64kB) not protected
# 95: 0x00580000 (0x10000 64kB) not protected
# 96: 0x00590000 (0x10000 64kB) not protected
# 97: 0x005a0000 (0x10000 64kB) not protected
# 98: 0x005b0000 (0x10000 64kB) not protected
# 99: 0x005c0000 (0x10000 64kB) not protected
#100: 0x005d0000 (0x10000 64kB) not protected
#101: 0x005e0000 (0x10000 64kB) not protected
#102: 0x005f0000 (0x10000 64kB) not protected
#103: 0x00600000 (0x10000 64kB) not protected
#104: 0x00610000 (0x10000 64kB) not protected
#105: 0x00620000 (0x10000 64kB) not protected
#106: 0x00630000 (0x10000 64kB) not protected
#107: 0x00640000 (0x10000 64kB) not protected
#108: 0x00650000 (0x10000 64kB) not protected
#109: 0x00660000 (0x10000 64kB) not protected
#110: 0x00670000 (0x10000 64kB) not protected
#111: 0x00680000 (0x10000 64kB) not protected
#112: 0x00690000 (0x10000 64kB) not protected
#113: 0x006a0000 (0x10000 64kB) not protected
#114: 0x006b0000 (0x10000 64kB) not protected
#115: 0x006c0000 (0x10000 64kB) not protected
#116: 0x006d0000 (0x10000 64kB) not protected
#117: 0x006e0000 (0x10000 64kB) not protected
#118: 0x006f0000 (0x10000 64kB) not protected
#119: 0x00700000 (0x10000 64kB) not protected
#120: 0x00710000 (0x10000 64kB) not protected
#121: 0x00720000 (0x10000 64kB) not protected
#122: 0x00730000 (0x10000 64kB) not protected
#123: 0x00740000 (0x10000 64kB) not protected
#124: 0x00750000 (0x10000 64kB) not protected
#125: 0x00760000 (0x10000 64kB) not protected
#126: 0x00770000 (0x10000 64kB) not protected
#127: 0x00780000 (0x10000 64kB) not protected
#128: 0x00790000 (0x10000 64kB) not protected
#129: 0x007a0000 (0x10000 64kB) not protected
#130: 0x007b0000 (0x10000 64kB) not protected
#131: 0x007c0000 (0x10000 64kB) not protected
#132: 0x007d0000 (0x10000 64kB) not protected
#133: 0x007e0000 (0x10000 64kB) not protected
# 134 : 0x007f0000 (0x10000 64kB) not protected
cfi information:
mfr: 0x007f, id: 0x22cb
qry: 'QRY', pri_id: 0x0002, pri_addr: 0x0040, alt_id: 0x0000, alt_addr: 0x0000
Vcc min: 2.7, Vcc max: 3.6, Vpp min: 0.0, Vpp max: 0.0
typ. word write timeout: 16 , typ. buf write timeout: 1 , typ. block erase timeout: 1024 , typ. chip erase timeout: 1
max. word write timeout: 512 , max. buf write timeout: 1 , max. block erase timeout: 16384 , max. chip erase timeout: 1
size: 0x800000, interface desc: February , max buffer write size: 1
Spansion primary algorithm extend information:
pri: 'PRI', version: 1.1
Silicon Rev.: 0x0, Address Sensitive unlock: 0x0
Erase Suspend: 0x2, Sector Protect: 0x4
VppMin: 10.5, VppMax: 12.5
shutdown command invoked
ubuntu @ ubuntu: / usr / local / share / openocd / scripts $
3 . Programming flash memory receiver .
The easiest step , but the longest time ( I progammirovanija took almost 24 hours)
3.1 . We turn now to the first terminal window
3.2 . We turn to flyshku where the files and the NT
3.2.1 . make
3.2.2 . sudo rmmod lp
3.2.3. sudo. / tjtag-flash: cfe / fc: 104 / bypass
3.3. terpilivo forward to watching the clock periodically running through the addresses, data
I have it looked something like this (the last seconds of the program ):
[99 % Flashed] ac7fffb0: ffffffff ffffffff ffffffff ffffffff
[99 % Flashed] ac7fffc0: ffffffff ffffffff ffffffff ffffffff
[99 % Flashed] ac7fffd0: ffffffff ffffffff ffffffff ffffffff
[99 % Flashed] ac7fffe0: ffffffff ffffffff ffffffff ffffffff
[99 % Flashed] ac7ffff0: ffffffff ffffffff ffffffff ffffffff
Done (CFE.BIN loaded into Flash Memory OK)
=========================
Flashing Routine Complete
=========================
elapsed time: 85853 seconds
*** REQUESTED OPERATION IS COMPLETE ***
ubuntu @ ubuntu: / media/E0CF-DBCF/azbox $
thx tonibam,
but I know it and done like you did but..... look at my Logs!
When I try halt it dont work because System IS halted and something wrong or defect.
When you look at reset what happened this is not normal:
reset
JTAG tap: smp8634.cpu tap/device found: 0x08630001 (mfg: 0x000, part: 0x8630, ver: 0x0)
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
Error writing unexpected address 0xfffffffe
target state: halted
target halted in MIPS32 mode due to debug-request, pc: 0x00000000
So Im near sure it is a Hardware defect, Flash or something. I give up for this Box, I have really no more Ideas and a lot of Time for nothing at the End...again