Please share the old files, or if it is possible can you tell us where to find them. Is it imperattive that we reflash?
@art: I hope I can remember what I did... It's basically all in fanoush's post above, though (his script): First I unpack the fiasco image: Code: flasher-3.0 -u -F SU-18_2007HACKER_4.2007.46-3_PR_F5_MR0_ARM.bin <your fiasco file name goes here> One of the files I get is rootfs.jffs2. I used this one and deleted everything else that was in the image. Then I find a free loop device (usually /dev/loop0) with "losetup -f" and attach the rootfs-file to it: Code: losetup /dev/loop0 rootfs.jffs2 Next I set up the block2mtd-module to work with the loop device. Honestly, I have no idea what all these things are... I just do as I'm told: Code: modprobe block2mtd block2mtd=/dev/loop0,131072 I didnt do the "modprobe jffs2", "modprobe mtdblock" because those are not modules in my kernel; normally you will have them as modules and use modprobe as described by fanoush. (I learned that you have to compile block2mtd as a module, though, otherwise you can't cleanly undo all of this.) Next you mount the device: Code: mount -t jffs2 -o ro /dev/mtdblock0 /mnt/jffs2/ ...
flasher-3.0 -u -F SU-18_2007HACKER_4.2007.46-3_PR_F5_MR0_ARM.bin <your fiasco file name goes here>
losetup /dev/loop0 rootfs.jffs2
modprobe block2mtd block2mtd=/dev/loop0,131072
mount -t jffs2 -o ro /dev/mtdblock0 /mnt/jffs2/