Hi,
I asked in previous posts for people to hex edit the second partition(the bootloader),
but seems better not, unless you have a recovery method.
The first 710 that felt victim to unsolicited hex editing of the bootloader code:
Code:
Init connection...Done
Enter flash mode...Done
Enter bootloader mode...Done
Boot version: 0.0.0.1
------------------------------------------
Flash File: RM803_12w07_prod_generic_nokia_osbl.esco
Sending certificate...Done.
Sending file...Failed(err: 0x30047).
Did comment out the cert checking functions, but forgot to set this flag:
Code:
ROM:04538458 1C 08 9F E5 LDR R0, =[B]unk_45DE83C[/B]
ROM:0453845C 00 00 D0 E5 LDRB R0, [R0]
ROM:04538460 00 00 50 E3 CMP R0, #0
ROM:04538464 8C 08 9F 05 LDREQ R0, =0x30047
ROM:04538468 7D 00 00 0A BEQ bad_err
Hehe, now need to buy another phone.
I could not find an alternative restore method via test point, as suggested earlier
in the thread. The only possible pins for TP access could be GPIO35 or GPIO160
(not likely, seems WD dissable for JTAG access). Shorting to GND or Vcc will not
give different USB device.
JTAG seems to be alive, at least the RST and HOLD pins respond, did not check
actuall comm.
I am attaching the testpoints description, if somebody wants to push this further.
BR