[FS#3320] Ubiquiti Routerstation compilation produces no sysupgrade image anymore

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Wed Dec 9 03:47:23 EST 2020


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

The following task has a new comment added:

FS#3320 - Ubiquiti Routerstation compilation produces no sysupgrade image anymore
User who did this - william wortel (wwortel)

----------
>so this is the way to enable tftp in case you do not have serial access to the devices right ? No. Plesae read again; I write physically access, i.e. touch, and refer to the power supply, the rectangular black 24V supply. These power supplies from some date onwards have on one side this pin hole. The side opposite the LED, near the RJ45 connectors. So e.g. the device sits in a box in a mast, and the supply is accessible at the ground.<
Powering up pressing that switch is detected by the bootloader and it starts waiting for a tftp connection to receive a factory image.

>but if I understand correctly, if you brick your box, these switches are useless. You will need a jtag to restore a backup bootloader on the device, correct ?<
Yes. If the bootloader is damaged, or the data it needs, nothing will start and nothing will be seen. Jtag then still can access the memory and the CPU because of special jtag circuitry in the CPU. The CPU is brought into sleep mode via JTAG and the flash can be unprotected, erased, written, and reprotected per block or range of blocks.

I think in this case it is the bootloader configuration that mtd damages, but am not sure.
0x000000ff0000-0x000000fff000 : "FIS directory"
0x000000fff000-0x000001000000 : "RedBoot config"
The erase block size is 0x10000. So this fff000 is halfway. Sysupgrade needs to write into FIS to put the new size of the kernel and rootfs there but if mtd, doing the writing, does not stop at fff000 or writes somewhere else ... Did not investigate where exactly the damage is done. Just flashed again the bootloader mtd0 and its configuration mtd5, using jtag. And then could use tftp again.
----------

More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=3320#comment9125

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list