>Right, this is still the same data as in your first reply. You can try
>
>flash_unlock -i /dev/mtd1 0 1
>
>. Looking at the device tree no other reason for the flash being RO
>sticks out. The chip has a write-protect input, maybe its status can be
>read out with the RDSR command, but I don't see h
Hello,
On 03/02/2017 01:08 AM, Forest wrote:
> I just noticed something, though: In both tests above, the hex dumps aren't
> full of 0x00 or 0xFF, but they aren't full of garbage, either. For example:
>
> : 56190527 9aac8fc2 4e5a9258 28a41f00 '..VX.ZN...(
> 0010: 0080 00800
On Sun, 26 Feb 2017 10:45:03 +0100, Uwe Kleine-König wrote:
>>> Without having checked every byte, this looks okish. Is this NAND or NOR
>>> memory?
>>
>> Looks to me like it's NOR:
>I'd something like this:
>
>dd if=/dev/zero of=zero bs=10240 count=1
>flashcp -v zero /dev/mtd1
>memtool md -s /d
On Wed, Mar 01, 2017 at 04:34:12PM +, Mark Morgan Lloyd wrote:
> On 01/03/17 15:00, Lennart Sorensen wrote:
> >On Wed, Mar 01, 2017 at 08:57:15AM +, Mark Morgan Lloyd wrote:
> >>Yes, I agree. What I don't know yet is whether there's a comparatively
> >>straightforward way to copy the loader
On 01/03/17 15:00, Lennart Sorensen wrote:
On Wed, Mar 01, 2017 at 08:57:15AM +, Mark Morgan Lloyd wrote:
Yes, I agree. What I don't know yet is whether there's a comparatively
straightforward way to copy the loader (plus its header etc.) into the
appropriate area of Qemu's address space and
On Wed, Mar 01, 2017 at 08:57:15AM +, Mark Morgan Lloyd wrote:
> Yes, I agree. What I don't know yet is whether there's a comparatively
> straightforward way to copy the loader (plus its header etc.) into the
> appropriate area of Qemu's address space and then transfer to it. Ideally
> after th
Hi,
Would you be interested in Targeted *OpenText* leads? We are happy to
provide the database across globe, specifically *North America, EMEA, APAC*
and *Latin America*.
We also have other users like *EMC2, Sharepoint, IBM, OnBase, Alfresco,
Oracle, Lexmark, M-files, Wordpress, Confluence, Jive
On 28/02/17 21:30, Lee Fisher wrote:
On 02/28/2017 11:38 AM, Mark Morgan Lloyd wrote:
[...]
Is it possible to use Qemu or some comparable emulator to check the boot
sequence in situ, i.e. without breaking the U-Boot and kernel images out
into separate files?
There are a few tools which take em
On 28/02/17 22:30, Lennart Sorensen wrote:
On Tue, Feb 28, 2017 at 07:38:28PM +, Mark Morgan Lloyd wrote:
I wonder whether I could ask a general question, with a particular focus on
Debian ARM devices.
I've got in front of me a file containing the image of an SD-Card that I've
exfiltrated f
9 matches
Mail list logo