Re: APs from the Kernel Summit run Linux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Aug 31, 2005 at 08:53:19PM +0100, Russell King wrote:
> On Wed, Aug 31, 2005 at 12:55:12PM -0400, Mark Lord wrote:
> > I'll try loading the works into another ARM
> > system I have here, and see (1) if it runs as-is,
> > and (2) what the disassembly shows.
> 
> You can identify ARM code quite readily - look for a large number of
> 32-bit words naturally aligned and grouped together whose top nibble
> is 14 - ie 0xE.......
> 
> The top nibble is the conditional execution field, and 14 is "always".
 
Didn't find that. Anyway:

The firmware has four parts. Each starts at a nice round number and is 
padded to the next one with zeros.

        0x000000-0x0fffff 560 kB
        0x100000-0x15ffff 316 kB
        0x160000-0x1bffbf 331 kB
        0x1bffc0-0x1bffff  64 bytes ASCII identificatoin

Each of the first three large parts starts with this sequence of bytes:

        00 10 00 00 03 00 00 00 ED

The first and third parts contain a repeating 7-byte sequence

        81 40 20 10 08 04 02

near the beginning, while part 2 is padded with zeroes in the same
place.

There are no strings except in the last part. Most likely it's
some kind of compressed data, although the repeating parts would appear
in regular compressed blobs.

Anyone, does this ring a bell?

-- 
Vojtech Pavlik
SuSE Labs, SuSE CR
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

[Index of Archives]     [Kernel Newbies]     [Netfilter]     [Bugtraq]     [Photo]     [Gimp]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Video 4 Linux]     [Linux for the blind]
  Powered by Linux