Nandflash0 at obio0 addr 0xfa000000-0xfa0fffffflashattach: no device found Ppb2 at pci1 dev 2 function 0: vendor 0x12d8 product 0x0303 (rev. 0x03)īwl0 at pci2 dev 0 function 0wlan: mac acl policy registeredīwl0: 11b rates: 1Mbps 2Mbps 5.5Mbps 11Mbpsīwl0: 11g rates: 1Mbps 2Mbps 5.5Mbps 11Mbps 6Mbps 9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbpsīwl0: 11ng MCS: 15Mbps 30Mbps 45Mbps 60Mbps 90Mbps 120Mbps 135Mbps 150Mbps 30Mbps 60Mbps 90Mbps 120Mbps 180Mbps 240Mbps 270Mbps 300Mbps 45Mbps 90Mbps 135Mbps 180Mbps 270Mbps 360Mbps 405Mbps 450Mbps Ppb1 at pci1 dev 1 function 0: vendor 0x12d8 product 0x0303 (rev. Ppb0 at pci0 dev 1 function 0: vendor 0x12d8 product 0x0303 (rev. Scsibus1 at mv_sata_integ0 channel 1: 15 targets, 1 lun per targetĪpplgpio0 at mv_socbus0 unit -1GPIO_interrupt_pin_ex: flipping pin 49. Scsibus0 at mv_sata_integ0 channel 0: 15 targets, 1 lun per target Mgitool0 at mv_socbus0 unit -1mvcesa0 at mv_socbus0 unit -1mvCesaInit: sessions=640, queue=32, pSram=0xf0000000 cpucnt0 at mv_socbus0 unit -1 **** counter 0 event = 6 The device is largely spread worldwide and as apple dropped his support for these devices, it could get the interest of a lot of owner and could avoid the coming waste due to the disaffection of thousand of these devices.Īny advises, clues or help would be very much appreciated !Įd. It really sounds as attractive hardware and the wifi could be easily updated to something newer. I guess the first step would be to build a new u-boot and use existing kirkwood target to build something ? It comes with a (BCM4331) Broadcom BCM94331 PCIEDUAL with 4 antennaġ2v 1.8A for the A1408 & A1409, and a Marvell 88W8366 for the A1354 & 1355 RAM : 128 MB ( Hynix H5PS1G83EFR) (256 on Time Machine version)Įthernet chip : Marvell 88E6350R (up to 7 ports)Ĥ gigabits port, 1 USB 2.0, 1 mini PCIe and of course 1 SATA port on the Time Machine version It's using a netbsd 4 os and an ssh root access is easily available.įlash : 16 MB ( Macronix MX25L12845EMI-10G) Impact: An attacker in Wi-Fi range may force nonce reuse in WPA multicast/GTK clients (Key Reinstallation Attacks - KRACK)I'm looking if is there any way to port openwrt to the apple kirkwood based devices (apple A1408 & A1409, A1354 & A1355). This was addressed with improved state management. Impact: An attacker in Wi-Fi range may force nonce reuse in WPA unicast/PTK clients (Key Reinstallation Attacks - KRACK)ĭescription: A logic issue existed in the handling of state transitions. Impact: An attacker within range may be able to execute arbitrary code on the Wi-Fi chipĭescription: A memory corruption issue was addressed with improved memory handling.
0 Comments
Leave a Reply. |