-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ppsMmcTool.txt #1
Comments
Hey @guino - thanks for this. Another piece of the puzzle. I hadn't gone back to this li'l side project for a while, but I may try a few things when I get some spare time over the next few weeks or so, see if I can get somewhere with it. Cheers! |
This was referenced Dec 1, 2020
Figured it out: |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
I have a similar camera with anyka uboot (password protected) and you can make uboot read ppsMmcTool preparing it with 'mkimage':
I used 'script' as type above but it doesn't seem to be looking for a script, instead it seems to be directly executing the binary loaded at that address. The problem is that it can't be a very big code as it will only load around 4Kb of data, so it seems like a way for them to execute some code that uses the already loaded u-boot functions OR it self loads from mmc/network/etc.
Here's the output I got -- notice it doesn't show 'magic err' or 'shorter than offset + len' during that startup:
Obviously it is crashing the CPU because I only put in u-boot script commands (text) in the file hoping that it would load/execute the script, but doesn't seem to be the case.
I don't want to go writing code just to get access to this thing but I may invest in a hardware SPI reader (which I can use on this and other boards) to read/write the onboard flash chip directly to gain access, but I am still wondering if it's worth the effort.
The text was updated successfully, but these errors were encountered: