| Products > Test Equipment |
| MSO2000 Application module hack |
| << < (19/24) > >> |
| drsurfer:
It's always a good sensation when you prove you were wrong. 8) I don't want to know what went wrong the other time, something stupid, I think. :-// May be it's related to the old 1.52 firmware I had. I've just upgraded to the latest 1.56. Anyway here it is the boot log for my MSO 2024B scope. --- Code: --- U-Boot 1.1.4 (Oct 29 2008 - 14:14:00) Tektronix, Inc. V1.01 CPU: MPC870ZPnn at 133.333 MHz: 8 kB I-Cache 8 kB D-Cache FEC present Board: Tektronix Fusion MPC870 Main Board Version: 4 (QUAL) 4 channel MSO Tek0001A ChipId: 0x1400c Tek0001A SubBlocksId: 0x0 Tek0001B ChipId: 0x1400c Tek0001B SubBlocksId: 0x0 CPLD Version: 0x11 I2C: ready DRAM: 64 MB FLASH: 32 MB In: serial Out: serial Err: serial Net: FEC ETHERNET Enter password - autobooting in 3 seconds ## Booting image at efec0000 ... Image Name: Linux-2.4.20_mvl31-885ads Image Type: PowerPC Linux Multi-File Image (gzip compressed) Data Size: 1278107 Bytes = 1.2 MB Load Address: 00000000 Entry Point: 00000000 Contents: Image 0: 868895 Bytes = 848.5 kB Image 1: 409199 Bytes = 399.6 kB Verifying Checksum ... OK Uncompressing Multi-File Image ... OK cmdline is console=ttyS0,115200 quiet bigphysarea=10570 panic=2 root=/dev/mtdblock4 rw mem=175190k NO_option_board Loading Ramdisk to 03e3a000, end 03e9de6f ... OK No option module board found Checking for firmware update... No USB mass storage devices found to update from. Linux 2.4.20_mvl31-885ads V 1.06 Tektronix Fusion Tue Apr 26 14:44:49 PDT 2011 Warning: loading NiDKEng-1.6 will taint the kernel: non-GPL license - Proprietary See http://www.tux.org/lkml/#export-tainted for information about tainted modules Warning: loading NiDUsb-1.6 will taint the kernel: non-GPL license - Proprietary See http://www.tux.org/lkml/#export-tainted for information about tainted modules Warning: loading tek will taint the kernel: non-GPL license - Proprietary See http://www.tux.org/lkml/#export-tainted for information about tainted modules Scope application starting (normal mode) ----------------------------------------------------------------- Running Init code versionBuildFWVersionString(), TimestampString: 17-Jul-14 11:00 versionBuildFWVersionString(), VersionFIRMWAREVERSIONversion: v1.56 versionBuildFWVersionString(), Major ver num: 1 Minor ver num: 56 hwInit mpc8xx GPIO open successful Initializing Mpc8xx[0] adg420a open successful. adg420b open successful. Initializing Adg420[3] Initializing Adg420[2] Initializing Adg420[1] Initializing Adg420[0] adg420b open successful. Initializing ExtTrig[0] adc08d1020a open successful. adc08d1020b open successful. Initializing Adc08D1000[1] Initializing Adc08D1000[0] Initializing Dac121s101[1] Initializing Dac121s101[0] Initializing ad5160[0] ad5305 open successful. Initializing ad5300[0] tek0001 detected, patching device offsets. lm95241[0] open successful. lm95241[1] not present. Initializing Lm95241[1] Initializing Lm95241[0] Initializing ResetCpld[0] Factory Checksum: Stored: 29892, Calculated: 29892 - OK Spc CheckSum: stored: 64237 calculated: 64237 - OK Starting POST diags Finished POST diags Fp Id response: 6 4 19 Front Panel Software Rev 19 - no update needed. cfgGetBoardModel: modelID 6 idStr MSO2024B hcPtpInit: Starting PictBridge PTP subsystem fusadInit utilInit ----------------------------------------------------------------- Running Start code diagStart fusionTrigStart(): calibrateTrigIf() ran 1 times and passed fusionTrigStart(): testTrigIf() for TEK0001A returned 0 fusionTrigStart(): testTrigIf() for TEK0001B returned 0 fusadStart ----------------------------------------------------------------- Running Run code wfmMgr OK for diags diagRun fusadRun eth0: unknown interface: No such device eth0: unknown interface: No such device enetLinkPresent: ioctl failed, errno 19 enetLinkPresent: ioctl failed, errno 19 ----------------------------------------------------------------- Scope startup complete; duration = 22.829660 seconds ================================================================= PID to Task info: PID: 62 ThrdID: 16386 Task: tUsrRoot PID: 63 ThrdID: 32771 Task: tExcTask PID: 64 ThrdID: 49156 Task: errSuspendAllThread PID: 65 ThrdID: 65541 Task: hwIntReceiver PID: 66 ThrdID: 81926 Task: fpIntTask PID: 67 ThrdID: 98311 Task: fpIrqMonitor PID: 68 ThrdID: 114696 Task: usbHotplug PID: 0 ThrdID: 131081 Task: probesSharedUnloadCmdQueueThread PID: 70 ThrdID: 147466 Task: fusad executive PID: 71 ThrdID: 163851 Task: UsbTmcOutputMgr PID: 72 ThrdID: 180236 Task: piUsb PID: 73 ThrdID: 196621 Task: piVGpib PID: 74 ThrdID: 213006 Task: Nios A listener PID: 75 ThrdID: 229391 Task: Nios B listener PID: 76 ThrdID: 245776 Task: exec PID: 77 ThrdID: 262161 Task: autoset PID: 78 ThrdID: 278546 Task: cal PID: 79 ThrdID: 294931 Task: diag PID: 80 ThrdID: 311316 Task: fp PID: 81 ThrdID: 327701 Task: hc PID: 82 ThrdID: 344086 Task: UsbSicInputMsgMgr PID: 83 ThrdID: 360471 Task: wfmMgrTest PID: 84 ThrdID: 376856 Task: search PID: 85 ThrdID: 393241 Task: periodicZoom PID: 86 ThrdID: 409626 Task: periodicClockAnimation PID: 87 ThrdID: 426011 Task: periodicBusyIndicAnimation PID: 88 ThrdID: 442396 Task: math PID: 89 ThrdID: 458781 Task: meas PID: 90 ThrdID: 475166 Task: measImmed PID: 91 ThrdID: 491551 Task: piCmdIntfc PID: 92 ThrdID: 507936 Task: probes PID: 93 ThrdID: 524321 Task: ref PID: 94 ThrdID: 540706 Task: rtl PID: 0 ThrdID: 557091 Task: thttpd PID: 112 ThrdID: 573476 Task: tVxi11SRQd PID: 0 ThrdID: 589861 Task: tVxi11Rpcd PID: 114 ThrdID: 606246 Task: tVxi11FlushThread PID: 0 ThrdID: 622631 Task: bus PID: 0 ThrdID: 639016 Task: debugConsole PID: 117 ThrdID: 655401 Task: VgpibRead PID: 118 ThrdID: 671786 Task: VgpibWrite PID: 119 ThrdID: 688171 Task: UsbTmcEventDispatcher PID: 0 ThrdID: 704556 Task: probesHandleBulkPowerChangeThread Power Up Completed at 20:28:37 Enter 'ctrl-\' twice to quit scopeApp Received testTrigIfcMsgAck, nios = 1, payload = 10 OK to connect by: telnet MSO2024B-05NTD7 1072 Received testTrigIfcMsgAck, nios = 0, payload = 10 20:28:37 fusadSetNiosUsable 20:28:42 --- Power Up Phase Cal - PASSED --- End code --- |
| luisprata:
Gooood!!! Now you can prepare a root blank password firmware.... mount firmware.img, untar filesystem.tar.gz, edit /etc/passwd to remove root password... tar filesystem.tar.gz again... calc m5sum... update md5sum.txt with new filesysytem.tar.gz md5 and unmount firmware.img. ;) Then after boot serial messages press ctrl \ twice and you can get accesss to internal linux. |
| luisprata:
The log is identical to MSO2014, except for SPC and Factory check sums and... "cfgGetBoardModel: modelID 6 idStr MSO2024B" After upgrading, I can change this Model message to MSO2024 too, so I really think the bandwidth upgrade was successful. Thank you drsurfer, and I am so happy your scope serial is not damaged. |
| drsurfer:
I think I will do this when I find a reliable way to attach the wires to the connector. Beside the personal satisfaction to have broken a lock, is there any pratical purpose in accessing to linux shell? Is there any chance to decrypt the original password? I'm not exactly a linux expert, as you may have understood... After a while: Could anyone try "taurus" as root password? 8) I'm not at my desk... --- Quote from: luisprata on February 25, 2016, 02:38:40 am ---Gooood!!! Now you can prepare a root blank password firmware.... mount firmware.img, untar filesystem.tar.gz, edit /etc/passwd to remove root password... tar filesystem.tar.gz again... calc m5sum... update md5sum.txt with new filesysytem.tar.gz md5 and unmount firmware.img. ;) Then after boot serial messages press ctrl \ twice and you can get accesss to internal linux. --- End quote --- |
| computer7geek9:
Well I managed to brick my mso2014b so thats fun. Any ideas on how to repair? I was attempting to install a firmware version with no password and it stayed on the splash screen for hours so I had no choice but to unplug it. Now it just has a white screen. Any ideas? |
| Navigation |
| Message Index |
| Next page |
| Previous page |