Quantcast
Channel: Linux Device Hacking
Viewing all articles
Browse latest Browse all 3247

Problems updating LG N1T1 NAS to new Kirkwood packages (7 replies)

$
0
0
Hi!
I had some problems a few months ago when I tried to update my LG N1T1 NAS from 6.5.7 to 6.6.3, it would not boot with the new uImage and uInitrd. It stopped just after reading them.

After I tried both 6.3.5 and 6.5.7 (the last several times) and got same problems. I also added
MODULES=dep
to the file /etc/initramfs-tools/initramfs.conf and that setting is still there.

Then I got no more time, so I used my backup Linux debian 4.12.1-kirkwood-tld-1 and then it booted OK.

The unit is off site and tomorrow I will go there and try again, this time with 6.7.5.

I have been updating the same way since 5.6.5. For tomorrow, is there anything you heard about that could be the problem?
Last I tried this:
su -
cd /boot
mkdir ./backup/2024-01-02/
cp -a uImage uInitrd ./backup/2024-01-02/
cp -a initrd.img-6.5.7-kirkwood-tld-1 backup/2024-01-02/
cp -a System.map-6.5.7-kirkwood-tld-1 backup/2024-01-02/
cp -a vmlinuz-6.5.7-kirkwood-tld-1 backup/2024-01-02/
cp -a config-6.5.7-kirkwood-tld-1 backup/2024-01-02/
cp -ra dts/ backup/2024-01-02/dts 
wget https://bit.ly/3T5WUwM
mv 3T5WUwM linux-6.6.3-kirkwood-tld-1-bodhi.tar.bz2
tar -vxjf linux-6.6.3-kirkwood-tld-1-bodhi.tar.bz2
tar -xf  linux-dtb-6.6.3-kirkwood-tld-1.tar
apt-get remove flash-kernel 
dpkg -i linux-image-6.6.3-kirkwood-tld-1_1_armel.deb
cp -a zImage-6.6.3-kirkwood-tld-1 zImage.fdt
cat dts/kirkwood-n1t1.dtb >> zImage.fdt

ls -lh initrd.img-6.6.3-kirkwood-tld-1
update-initramfs -u
ls -lh initrd.img-6.6.3-kirkwood-tld-1

mkimage -A arm -O linux -T kernel -C none -a 0x00008000 -e 0x00008000 -n Linux-6.6.3-kirkwood-tld-1 -d zImage.fdt uImage

mkimage -A arm -O linux -T ramdisk -C gzip -a 0x00000000 -e 0x00000000 -n initramfs-6.6.3-kirkwood-tld-1 -d initrd.img-6.6.3-kirkwood-tld-1 uInitrd

sync 
sync
sync
shutdown -r now
su -
cd /boot
rm config-6.5.7-kirkwood-tld-1
rm initrd.img-6.5.7-kirkwood-tld-1
rm linux-6.5.7-kirkwood-tld-1-bodhi.tar.bz2
rm linux-6.5.7-kirkwood-tld-1.patch
rm linux-dtb-6.5.7-kirkwood-tld-1.tar
rm linux-headers-6.5.7-kirkwood-tld-1_1_armel.deb
rm linux-image-6.5.7-kirkwood-tld-1_1_armel.deb
rm System.map-6.5.7-kirkwood-tld-1
rm vmlinuz-6.5.7-kirkwood-tld-1
rm zImage-6.5.7-kirkwood-tld-1
Before did like this
su -
cd /boot
mkdir ./backup/2023-11-10/
cp -a uImage uInitrd ./backup/2023-11-10/
cp -a initrd.img-6.4.11-kirkwood-tld-1 backup/2023-11-10/
cp -a System.map-6.4.11-kirkwood-tld-1 backup/2023-11-10/
cp -a vmlinuz-6.4.11-kirkwood-tld-1 backup/2023-11-10/
cp -a config-6.4.11-kirkwood-tld-1 backup/2023-11-10/
cp -ra dts/ backup/2023-11-10/dts 
wget https://bit.ly/3QpldDY
mv 3QpldDY linux-6.5.7-kirkwood-tld-1-bodhi.tar.bz2
tar -vxjf linux-6.5.7-kirkwood-tld-1-bodhi.tar.bz2
tar -xf  linux-dtb-6.5.7-kirkwood-tld-1.tar
apt-get remove flash-kernel 
dpkg -i linux-image-6.5.7-kirkwood-tld-1_1_armel.deb
cp -a zImage-6.5.7-kirkwood-tld-1 zImage.fdt
cat dts/kirkwood-n1t1.dtb >> zImage.fdt
mkimage -A arm -O linux -T kernel -C none -a 0x00008000 -e 0x00008000 -n Linux-6.5.7-kirkwood-tld-1 -d zImage.fdt uImage
mkimage -A arm -O linux -T ramdisk -C gzip -a 0x00000000 -e 0x00000000 -n initramfs-6.5.7-kirkwood-tld-1 -d initrd.img-6.5.7-kirkwood-tld-1 uInitrd
sync 
sync
sync
shutdown -r now
su -
cd /boot
rm config-6.4.11-kirkwood-tld-1
rm initrd.img-6.4.11-kirkwood-tld-1
rm linux-6.4.11-kirkwood-tld-1-bodhi.tar.bz2
rm linux-6.4.11-kirkwood-tld-1.patch
rm linux-dtb-6.4.11-kirkwood-tld-1.tar
rm linux-headers-6.4.11-kirkwood-tld-1_1_armel.deb
rm linux-image-6.4.11-kirkwood-tld-1_1_armel.deb
rm System.map-6.4.11-kirkwood-tld-1
rm vmlinuz-6.4.11-kirkwood-tld-1
rm zImage-6.4.11-kirkwood-tld-1
If it makes a difference, I have today
root@debian:~# cat /etc/apt/sources.list
deb http://security.debian.org/debian-security bullseye-security main contrib non-free
deb-src http://security.debian.org/debian-security bullseye-security main contrib non-free

deb http://deb.debian.org/debian bullseye main contrib non-free
deb-src http://deb.debian.org/debian bullseye main contrib non-free

deb http://deb.debian.org/debian-security/ bullseye-security main contrib non-free
deb-src http://deb.debian.org/debian-security/ bullseye-security main contrib non-free

deb http://deb.debian.org/debian bullseye-updates main contrib non-free
deb-src http://deb.debian.org/debian bullseye-updates main contrib non-free
Should I change bullseye to stable and try aptitude safe-upgrade ?

Viewing all articles
Browse latest Browse all 3247

Trending Articles