spirytsick |
2009-05-30 20:13 |
Re: N800 Unable to run Diablo
Quote:
Originally Posted by lma
(Post 292083)
That's missing the first second or so, which may contain interesting flash initialisation messages. There's an init script attached to bug 2770 that captures dmesg as early as possible.
This entry looks suspicious however:
Code:
[ 1.250000] Empty flash at 0x001d88e0 ends at 0x001d9000
Never seen that on mine. That area seems to be in the config partition, which you can't flash AFAIK, but 0xFFFF will let you dump it at least.
Do your /proc/partitions & /proc/mtd looks like this?
Code:
major minor #blocks name
31 0 128 mtdblock0
31 1 384 mtdblock1
31 2 2048 mtdblock2
31 3 4096 mtdblock3
31 4 255488 mtdblock4
Code:
dev: size erasesize name
mtd0: 00020000 00020000 "bootloader"
mtd1: 00060000 00020000 "config"
mtd2: 00200000 00020000 "kernel"
mtd3: 00400000 00020000 "initfs"
mtd4: 0f980000 00020000 "rootfs"
|
Mine /proc/partitions is:
Code:
31 0 128 mtdblock0
31 1 384 mtdblock1
31 2 2048 mtdblock2
31 3 4096 mtdblock3
31 4 255488 mtdblock4
254 0 8009728 mmcblk0
254 1 2097151 mmcblk0p1
254 2 5388288 mmcblk0p2
254 3 524288 mmcblk0p3
254 8 7864320 mmcblk1
254 9 7864312 mmcblk1p1
and /proc/mtd:
Code:
dev: size erasesize name
mtd0: 00020000 00020000 "bootloader"
mtd1: 00060000 00020000 "config"
mtd2: 00200000 00020000 "kernel"
mtd3: 00400000 00020000 "initfs"
mtd4: 0f980000 00020000 "rootfs"
the dump from 0xFFFF below:
Code:
Dumping firmware pieces to disk.
Fiasco version: 2
Name: OSSO UART+USB
Name: 1 RX-34_DIABLO_5.2008.43-7_PR_MR0
kernel
offset: 0x0000003b
size: 1536640 bytes
hash: b126
version-length: 20
version: 2.6.21-200842maemo1
sub-version: 2.6.21-200842maemo1
name: kernel-2.6.21-200842maemo1
body-at: 0x0000006f
==> ((null)) kernel-2.6.21-200842maemo1
Skipping 36 padding bytes
initfs
offset: 0x00177312
size: 2327808 bytes
hash: 8f98
version-length: 26
version: 0.95.22-200842maemo1w38b3
sub-version: 0.95.22-200842maemo1w38b3
name: initfs-0.95.22-200842maemo1w38b3
body-at: 0x0017734c
==> ((null)) initfs-0.95.22-200842maemo1w38b3
rootfs
offset: 0x003af84c
size: 138149888 bytes
hash: 382e
version-length: 44
version: RX-34+RX-44+RX-48_DIABLO_5.2008.43-7_PR_MR0
sub-version: RX-34+RX-44+RX-48_DIABLO_5.2008.43-7_PR_MR0
name: rootfs-RX-34+RX-44+RX-48_DIABLO_5.2008.43-7_PR_MR0
body-at: 0x003af898
==> ((null)) rootfs-RX-34+RX-44+RX-48_DIABLO_5.2008.43-7_PR_MR0
2nd
offset: 0x0876f898
size: 8192 bytes
hash: 9c5f
version-length: 80
version: RX-34
sub-version: RX-34
sub-version: 1301
sub-version: 1302
sub-version: 1501
sub-version: 1502
sub-version: 1503
sub-version: 1504
sub-version: 1601
sub-version: 1602
version-length: 20
version: 1.1.16-200844maemo2
sub-version: 1.1.16-200844maemo2
name: 2nd-RX-34,1301,1302,1501,1502,1503,1504,1601,1602-1.1.16-200844maemo2
body-at: 0x0876f91e
==> ((null)) 2nd-RX-34,1301,1302,1501,1502,1503,1504,1601,1602-1.1.16-200844maemo2
xloader
offset: 0x0877191e
size: 9088 bytes
hash: 95ac
version-length: 80
version: RX-34
sub-version: RX-34
sub-version: 1301
sub-version: 1302
sub-version: 1501
sub-version: 1502
sub-version: 1503
sub-version: 1504
sub-version: 1601
sub-version: 1602
version-length: 20
version: 1.1.16-200844maemo2
sub-version: 1.1.16-200844maemo2
name: xloader-RX-34,1301,1302,1501,1502,1503,1504,1601,1602-1.1.16-200844maemo2
body-at: 0x087719a4
==> ((null)) xloader-RX-34,1301,1302,1501,1502,1503,1504,1601,1602-1.1.16-200844maemo2
secondary
offset: 0x08773d24
size: 99072 bytes
hash: 3715
version-length: 80
version: RX-34
sub-version: RX-34
sub-version: 1301
sub-version: 1302
sub-version: 1501
sub-version: 1502
sub-version: 1503
sub-version: 1504
sub-version: 1601
sub-version: 1602
version-length: 20
version: 1.1.16-200844maemo2
sub-version: 1.1.16-200844maemo2
name: secondary-RX-34,1301,1302,1501,1502,1503,1504,1601,1602-1.1.16-200844maemo2
body-at: 0x08773daa
==> ((null)) secondary-RX-34,1301,1302,1501,1502,1503,1504,1601,1602-1.1.16-200844maemo2
I will have to compile 0xFFFF for maemo but I have no scratchbox installed atm. Will have to download and try that to dump the hidden bit.
|