Jump to content
AVIC411.com

Upgrading NEX4000 to NEX4100 - Work in Progress


Recommended Posts

  • Replies 623
  • Created
  • Last Reply

Top Posters In This Topic

Ok.  I got the full SDCard image from my AVIC-8100NEX deck.  You can find it here https://builds.casual-dev.com/index.php?dir=random%2FAVIC%2F8100%2F.  I verified the sha256sum after upload.

root@adamoutler-desktop:/var/www/html/sd# sha256sum ./fullsd.img.gz 
e5682db410963d0b57b5eec94f3aa66eb9ae078ffeb1dc3ec4c02c0b7f426da6  ./fullsd.img.gz

This file and the others which are required to enter testmode and obtain this image were included.  Place them on a USB stick, insert into USB1 port to reboot into test mode, then use the write program forcedly>Copy Script option to recreate.

 

This image came from my deck and is unsanitized.  

 

I copied it to my other 8100, with testmode_N.key (2), in hopes I could bring it back to life, but I got the "Software Error" screen.   

post-131243-0-71364700-1438647266_thumb.jpgpost-131243-0-98285000-1438647268_thumb.jpg

Link to post
Share on other sites

I'm totally confused. Can you take a new blank 16gb sd card, record the data on it back using dd command and your fullsd.img file and insert this cart into internal slot of device? Is this method is not working? Or you need to set correct password for this new sd? Device rejecting unknown cards? Why are you trying to use testmode's copy device capability?

I wanted to save the extra SDCard if possible. The SDCard is expensive (80x SDCard).

 

The SDCard password is set by the deck according to bass_rock's similar experiment. This renders the SDCard unusable after power on, because we don't know the password.

Link to post
Share on other sites

According to sources it is possible to change/remove SD card password setting in NOR flash using U-Boot console command:

	"bsp passwd  <passwd> - set sd card password (16bytes)\n"

So all we need is access to console :)

 

Also it is possible to get password using JTAG or SDCard sniffer/logic analyzer

 

@Lucca is this SN linked to iGo device.nng and/or licenses?

I will be doing that soon.  

 

Tell me, are there any commands that allow memory read in U-Boot?  U-Boot has the ability to get through many memory protections which it emplaces.  If anything can read the password from inside the device it's U-Boot.   I forget the commands, but I believe it was two letters, then two parameters for offset and length..

 

yep.. just found it.  http://www.denx.de/wiki/publish/DULG/to-delete/UBootCmdGroupMemory.html 

 

The command is "md".  Is that in the u-boot sources we are working with?

Link to post
Share on other sites
@Lucca is this SN linked to iGo device.nng and/or licenses?

Adam's device id:

05-12 07:01:11.170  2798  3421 E navngo  : ServerRunner:Device ids: 7d15307dcf66e17c,744A45534443202002020007D600E800,74020007D6

Device id from leaked 5000nex image:

01-01 12:19:09.990  2817  3260 E navngo  : 12:19:10.001 ServerRunner:Device ids: 2c9b382df1de42c0,744A45534443202010300012DC00DC00,74300012DC

My ids is completely different :( (UPD: seems like my second id is very close to this two and third id is something like incremental id)

As I mentioned above,each unite has its unique ID,the second strings in your example proove it,so,the last thing I need - those missed connected_services lyc.All the other steps to make Pioneer iGO NextGen works at any android device 2.3 & UP -- not a problem... :cool:

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...



×
×
  • Create New...