Monthly Archives: April 2009

La Fonera Pt.7

via Wolf Paulus » Embedded

La Fonera 2.0 Preview

The Fonera 2.0 just became available in Europe (on April 21st) and is expected to arrive here in the US in May, making this the perfect time for taking a first look at the new 2.0 software.

I had gotten my hands on the La Fonera 2.0 beta hardware back in December 2008 and had deployed an OpenWrt 8.09 RC release soon there after, which was still on there. This meant that I needed to somehow reflash the router with the new loader and firmware before I could see what the new Software was all about.

Putting The Original (Or Newer) Firmware Back On A Fonera FON 2.0

During booting, the FON 2200, waits at IP address 192.168.1.1 on port 9000, for a brief moment, to receive an interrupting Control-C. The process of how to get to the bootloader prompt is described in some detail over here: La Fonera 2.0 (FON 2202) Hacking, Cleaning House

Files

The following 3 files are required during re-flashing and need to be made available to the router via TFTP.

Also, check here for a more current Fonera 2 image: http://download.fonosfera.org

RedBoot Prompt

Here are steps required to put the three files back on the fonera router. Writing to flash takes some time, especially the last step, in which a 4.4 MBytes are written, requires some patience.

#========================================================
# Reset the current flash and the partition table
#========================================================
RedBoot> fis init
About to initialize [format] FLASH image system – continue (y/n)? y
*** Initialize FLASH Image System
… Erase from 0xa87e0000-0xa87f0000: .
… Program from 0x80ff0000-0×81000000 at 0xa87e0000: .

#========================================================
# Tell RedBoot about the TFTP-Server’s IP
#========================================================
RedBoot> ip_address -l 192.168.1.1/24 -h 192.168.1.2
IP: 192.168.1.1/255.255.255.0, Gateway: 0.0.0.0
Default server: 192.168.1.2

#========================================================
# write the 2nd stage bootloader into flash
#========================================================
RedBoot> load -r -b %{FREEMEMLO} loader.bin
Using default protocol (TFTP)
Raw file loaded 0×80040400-0x800503ff, assumed entry at 0×80040400

RedBoot> fis create -e 0×80100000 -r 0×80100000 loader
… Erase from 0xa8030000-0xa8040000: .
… Program from 0×80040400-0×80050400 at 0xa8030000: .
… Erase from 0xa87e0000-0xa87f0000: .
… Program from 0x80ff0000-0×81000000 at 0xa87e0000: .

#========================================================
# load into RAM and write the failsafe image into flash
#========================================================
RedBoot> load -r -b %{FREEMEMLO} failsafe.image
Using default protocol (TFTP)
Raw file loaded 0×80040400-0x801803ff, assumed entry at 0×80040400

RedBoot> fis create -f 0xA8660000 image2
… Erase from 0xa8660000-0xa87a0000: ………………..
… Program from 0×80040400-0×80180400 at 0xa8660000: ………………..
… Erase from 0xa87e0000-0xa87f0000: .
… Program from 0x80ff0000-0×81000000 at 0xa87e0000: .

#========================================================
# load into RAM and write the image (4+ MB) into flash
#========================================================
RedBoot> load -r -b %{FREEMEMLO} flipper.image
Using default protocol (TFTP)
Raw file loaded 0×80040400-0x804b0403, assumed entry at 0×80040400

RedBoot> fis create image
… Erase from 0xa8040000-0xa84b0004: ………………………………………………………………
… Program from 0×80040400-0x804b0404 at 0xa8040000: ………………………………………………………………
… Erase from 0xa87e0000-0xa87f0000: .
… Program from 0x80ff0000-0×81000000 at 0xa87e0000: .
RedBoot>

When the re-flashing is finally done, all what’s left to do to is to reboot the router.

Fonera 2.0 UI