Random Reverse Engineering Notes

From Linux PARISC Wiki
(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
__FORCE_TOC__
 
 
== Memory Layout J5000 ==
 
== Memory Layout J5000 ==
  
Line 17: Line 16:
 
== Undocumented PDC routines ==
 
== Undocumented PDC routines ==
  
0x81: EEPROM read/write
+
{| class="wikitable"
0x84
+
|+ARG0
0x87
+
|-
0x88
+
| 0x81
0x8a
+
| EEPROM read/write
0x8b
+
|-
0x8f
+
| 0x84
0x90
+
|
0x91
+
|-
0x93
+
| 0x87
0xa3
+
|
0xa5
+
|-
 +
| 0x88
 +
|
 +
|-
 +
| 0x8a
 +
|
 +
|-
 +
| 0x8b
 +
|
 +
|-
 +
| 0x8f
 +
|
 +
|-
 +
| 0x90
 +
|
 +
|-
 +
| 0x91
 +
|
 +
|-
 +
| 0x93
 +
|
 +
|-
 +
| 0xa3
 +
|
 +
|-
 +
| 0xa5
 +
|}

Revision as of 07:23, 3 May 2019

Memory Layout J5000

fffffff0f0400000 - unknown, assumed EEPROM, but content different than what eepromread returns
fffffff0f05d0000 - LCD

PDC PAGE0 processor specific

0x640: code that will be executed when PDC_PROC(0) is called, loop with nops:
  0x00000640  e81f1ff5  08000240  08000240  08000240
  0x00000650  08000240  08000240  08000240  08000240
  0x00000660  08000240  08000240  08000240  08000240
  0x00000670  08000240  08000240  08000240  08000240
0x680: OS rendezvous code

Undocumented PDC routines

ARG0
0x81 EEPROM read/write
0x84
0x87
0x88
0x8a
0x8b
0x8f
0x90
0x91
0x93
0xa3
0xa5
Personal tools