<div dir="ltr">Well, Engenious or Senao have been ignoring GPL source request for a while.<br>And completely violating the GPL licence.</div><div class="gmail_extra"><br><div class="gmail_quote">On 20 August 2018 at 16:26, Chuanhong Guo <span dir="ltr"><<a href="mailto:gch981213@gmail.com" target="_blank">gch981213@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">GPL doesn't prevent the manufacturer from blocking third-party<br>
firmware being installed on their router.<br>
They just need to provide GPL code for their firmware (and they don't<br>
need to explicitly submit their device support to OpenWrt project.)<br>
BTW: It seemed that the bootrom of Qualcomm IPQ40xx comes from other<br>
Qualcomm Android chips and contains some security features that<br>
preventing unauthorized firmware to be installed on their router. An<br>
RSA pubkey can be burnt in to SoC and SoC bootrom will verify contents<br>
on flash before booting it. If this feature is used by the<br>
manufacturer you'll be impossible to flash any third-party firmware on<br>
this router.<br>
Michael Holstein <<a href="mailto:moholstein@gmail.com">moholstein@gmail.com</a>> 于2018年8月20日周一 下午9:41写道:<br>
<div class="HOEnZb"><div class="h5">><br>
> I was finally frustrated at these Engenus/Saneo units and found the<br>
> serial port and got into uBoot and looked at the image .. it's yours<br>
> .. but oddly, you don't support it all.<br>
><br>
> Well gee, that's curious, it seems somebody's breaking the rules, and<br>
> it isn't you.<br>
><br>
> I'd nastygram Engenius and make them post the GPL contrib so you have<br>
> the BLOB for the Broacdom IPQ4019 that's in there. This is the<br>
> EAP1250/1300 (identical except for where RJ45 port is) .. there are<br>
> 100 others that use this board (I ran the board ID through the FCC API<br>
> if you want all the makes/models).<br>
><br>
> Here's your goods let me know if you want anything else .. I'm going<br>
> to build the image for it and flash but since they broke the rules to<br>
> begin with I'm dumping the flash and using the FDT to help modernize.<br>
><br>
> These are cool because they are dual radio soft APs that are PoE and<br>
> AC wave 2. A 3 pack is $160 on Amazon. With OpenWISP you can do most<br>
> anything shy of a college campus<br>
><br>
> ahywho ..here's all the proof you need. They didn't even bother to<br>
> change the name.<br>
><br>
> I'm not a contributor I just do lots of embedded work and this made me<br>
> mad. Note that the you've already noticed this on the Engenius 300<br>
> (the wiki poings out the factory firmware is openwrt)<br>
><br>
> Company contact/owner is easiest found via their FCC filings : most<br>
> recent one from<br>
> company president<br>
><br>
> <a href="https://fccid.io/A8J-EAP1300/Letter/Confidentiality-Request-3409208" rel="noreferrer" target="_blank">https://fccid.io/A8J-EAP1300/<wbr>Letter/Confidentiality-<wbr>Request-3409208</a><br>
><br>
> Cheers,<br>
><br>
> -Michael.<br>
><br>
> PS: It looks like they locked the UART from which I obtained this in<br>
> u-boot from allowing interrupt so I'm going to poke about and find out<br>
> how to get in there. I know this can be done but it's first I've seen<br>
> it done .. The uBoot is reworked from Saneo, per the version string.<br>
><br>
> Anyone have a clever tip on that work-around? .. If I can get console<br>
> at u-Boot I can skip a couple steps.<br>
><br>
> ---snip---.<br>
><br>
> bootm 0x84000000#configÉ4<br>
><br>
> ## Booting kernel from FIT Image at 84000000 ...<br>
> Using 'configÉ4' configuration<br>
> Trying 'kernelÉ1' kernel subimage<br>
> Description: ARM OpenWrt Linux-3.14.43 <<<<<<<< LOL OKAY COUGH IT UP<br>
> Type: Kernel Image<br>
> Compression: gzip compressed<br>
> Data Start: 0x840000e4<br>
> Data Size: 3180186 Bytes = 3 MiB<br>
> Architecture: ARM<br>
> OS: t Linux<br>
> Load Address: 0x80208000<br>
> Entry Point: 0x80208000<br>
> Hash algo: crc32<br>
> Hash value: 34c16a99<br>
> Hash algo: sha1<br>
> Hash value: 620a666c88729f60ee5b3f90fa261e<wbr>d2bb3de6cb<br>
> Verifying Hash Integrity ... crc32+ sha1+ OK<br>
><br>
> ## Flattened Device Tree from FIT Image at 84000000<br>
> Using 'configÉ4' configuration<br>
> Trying 'fdtÉ4' FDT blob subimage<br>
> Description: ARM OpenWrt qcom-ipq40xx-ap.dkxx device tree blob<br>
> Type: Flat Device Tree<br>
> Compression: uncompressed<br>
> Data Start: 0x84325520<br>
> Data Size: 33495 Bytes = 32.7 KiB<br>
> Architecture: ARM<br>
> Hash algo: crc32<br>
> Hash value: 19be728a<br>
> Hash algo: sha1<br>
> Hash value: 633f6dbf948179ecf1f72f737981d2<wbr>b38fabe6ee<br>
> Verifying Hash Integrity ... crc32+ sha1+ OK<br>
> Booting using the fdt blob at 0x84325520<br>
> Uncompressing Kernel Image ... OK<br>
><br>
> Loading Device Tree to 86ff4000, end 86fff2d6 ...<br>
><br>
> And guilty party :<br>
><br>
> Linux version 3.14.43 (root@liwei) (gcc version 4.8.3 20140106<br>
> (prerelease) (Linaro GCC 4.8-2014.01) ) #1 SMP PREEMPT Tue Jan 30<br>
> 18:20:10 CST 2018<br>
><br>
> [ 0.000000] CPU: ARMv7 Processor [410fc075] revision 5 (ARMv7), cr=10c5387d<br>
><br>
> [ 0.000000] CPU: PIPT / VIPT nonaliasing data cache, VIPT aliasing<br>
> instruction cache<br>
><br>
> [ 0.000000] Machine model: Qualcomm Technologies, Inc. IPQ40xx/EAP1250<br>
><br>
> ______________________________<wbr>_________________<br>
> openwrt-devel mailing list<br>
> <a href="mailto:openwrt-devel@lists.openwrt.org">openwrt-devel@lists.openwrt.<wbr>org</a><br>
> <a href="https://lists.openwrt.org/mailman/listinfo/openwrt-devel" rel="noreferrer" target="_blank">https://lists.openwrt.org/<wbr>mailman/listinfo/openwrt-devel</a><br>
<br>
______________________________<wbr>_________________<br>
openwrt-devel mailing list<br>
<a href="mailto:openwrt-devel@lists.openwrt.org">openwrt-devel@lists.openwrt.<wbr>org</a><br>
<a href="https://lists.openwrt.org/mailman/listinfo/openwrt-devel" rel="noreferrer" target="_blank">https://lists.openwrt.org/<wbr>mailman/listinfo/openwrt-devel</a><br>
</div></div></blockquote></div><br></div>