View Single Post
Old 07-31-2011, 21:08   #4 (permalink)
asbokid
Junior Member
 
Join Date: Jul 2011
Posts: 2
Member: 1626477
Status: Offline
Thanks Meter: 1
Hi jinjean14,

I have a similar Huawei device. After changing your MAC address, you may have to issue the command /bin/equipcmd restoredefault (note that there is no space between the two words).

That command apparently stores the new MAC address to the flash.

You can check whether it has been stored with /bin/equipcmd macaddr display

If your Huawei device is like the ones that I have used then the equipcmd tool invokes a library function in /lib/libhuawei.so. That function issues various ioctl system calls to the /dev/bhal character device.

If you are very keen on hacking this device and can't get equipcmd to play ball with you, then you could use the 'strace' tool when you run equipcmd. That will reveal the system calls that equipcmd is issuing (whether directly or indirectly via the libhuawei library.)

I have built strace for mips32 linux, so if you can get the strace binary onto the device, with tftp, ftp, over serial with xmodem, or some such, then you could try it out.

https://docs.google.com/leaf?id=0B6w...2MmYz&hl=en_US
  Reply With Quote
The Following User Says Thank You to asbokid For This Useful Post:
 
Page generated in 0.08457 seconds with 7 queries