Provided by: 0xffff_0.6~git20130406-1_amd64 bug

NAME

       0xFFFF - Open Free Fiasco Firmware Flasher

SYNOPSIS

       0xFFFF [options]

DESCRIPTION

       The  ‘Open  Free  Fiasco  Firmware Flasher’ aka 0xFFFF utility implements a free userspace
       handler for the NOLO bootloader and extended features for flashing,  dumping  and  getting
       information for the Nokia Internet Tablets.

Supported devices

       SU-18          Nokia 770
       RX-34          Nokia N800
       RX-44          Nokia N810
       RX-48          Nokia N810 Wimax
       RX-51          Nokia N900

Operations

       -b [cmdline]
              boot default or loaded kernel (default: no cmdline)

       -b update
              boot default or loaded kernel to Update mode

       -r     reboot device

       -l     load kernel and initfs images to RAM

       -f     flash all specified images

       -c     cold flash 2nd and secondary image

       -x [/dev/mtd]
              check for bad blocks on mtd device (default: all)

       -E file
              dump all device images to one fiasco image, see -t

       -e [dir]
              dump all device images to directory, see -t (default: current)

Device Configuration

       -I     identify, show all information about device

       -D 0|1|2
              change root device: 0 - flash, 1 - mmc, 2 - usb

       -U 0|1 disable/enable USB host mode

       -R 0|1 disable/enable R&D mode

       -F flags
              change  R&D  flags,  flags are comma separated list, can be empty, see section "R&D
              flags"

       -H rev change HW revision

       -N ver change NOLO version string

       -K ver change kernel version string

       -T ver change initfs version string

       -S ver change SW release version string

       -C ver change content eMMC version string

Input Image

       -M file
              specify fiasco image

       -m arg specify normal image
              arg is [[[dev:[hw:]]ver:]type:]file[%lay]
                dev is device name string (default: emtpy), see section "Supported devices"
                hw are comma separated list of HW revisions (default: empty)
                ver is image version string (default: empty)
                type is image type (default: autodetect), see section "Supported image types"
                file is image file name
                lay is layout file name (default: none)

Image filters

       -t types
              filter images by type

       -d dev filter images by device

       -w hw  filter images by HW revision

Fiasco image

       -u [dir]
              unpack fiasco image to directory (default: current)

       -g file[%sw]
              generate fiasco image with SW rel version (default: no version)

Other options

       -i     identify images

       -s     simulate, do not flash or write on disk

       -n     disable hash, checksum and image type checking

       -v     be verbose and noisy

       -h     show help message

R&D flags

       no-omap-wd
              disable auto reboot by OMAP watchdog

       no-ext-wd
              disable auto reboot by external watchdog

       no-lifeguard-reset
              disable auto reboot by software lifeguard

       serial-console
              enable serial console

       no-usb-timeout
              disable usb timeout for flashing

       sti-console
              enable sti console

       no-charging
              disable battery charging

       force-power-key
              force omap boot reason to power key

Supported image types

       xloader
       2nd
       secondary
       kernel
       initfs
       rootfs
       mmc
       cmt-2nd
       cmt-algo
       cmt-mcusw

Supported connection protocols

       Local on device
       NOLO via USB
       Cold flashing via USB
       Mk II protocol via USB
       RAW disk via USB

EXAMPLE

       Print device information
              0xFFFF -I

       Load kernel/initramfs without flashing
              0xFFFF -l -b "<cmdline>" -m kernel:<file> -m initfs:<file>

       Flash kernel (or second bootloader) and reboot
              0xFFFF -m kernel:<file> -r

AUTHOR

       Pali Rohár <pali.rohar@gmail.com>

                                           31 Mar 2013                                  0xFFFF(1)