Random Reverse Engineering Notes

From Linux PARISC Wiki
(Difference between revisions)
Jump to: navigation, search
(Undocumented PDC routines)
(Undocumented PDC routines)
Line 19: Line 19:
 
|-
 
|-
 
! scope="col" | ARG0
 
! scope="col" | ARG0
 +
! scope="col" | ROM internal index
 
! scope="col" | Name
 
! scope="col" | Name
 
|-
 
|-
 
| 0x81
 
| 0x81
 +
| 0x1a
 
| EEPROM read/write
 
| EEPROM read/write
 
|-
 
|-
 
| 0x84
 
| 0x84
 +
| 0x1b
 
|
 
|
 
|-
 
|-
 
| 0x87
 
| 0x87
 +
| 0x1c
 
|
 
|
 
|-
 
|-
 
| 0x88
 
| 0x88
 +
| 0x1d
 
|
 
|
 
|-
 
|-
 
| 0x8a
 
| 0x8a
 +
| 0x1e
 
|
 
|
 
|-
 
|-
 
| 0x8b
 
| 0x8b
 +
| 0x1f
 
|
 
|
 
|-
 
|-
 
| 0x8f
 
| 0x8f
 +
| 0x21
 
|
 
|
 
|-
 
|-
 
| 0x90
 
| 0x90
 +
| 0x22
 
|
 
|
 
|-
 
|-
 
| 0x91
 
| 0x91
 +
| 0x23
 
|
 
|
 
|-
 
|-
 
| 0x93
 
| 0x93
 +
| 0x24
 
|
 
|
 
|-
 
|-
 
| 0xa3
 
| 0xa3
 +
| 0x20
 +
|
 
|
 
|
 
|-
 
|-
 
| 0xa5
 
| 0xa5
 +
| 0x25
 
|
 
|
 
|}
 
|}

Revision as of 07:30, 3 May 2019

Memory Layout J5000

fffffff0f0400000 - unknown, assumed EEPROM, but content different than what eepromread returns
fffffff0f05d0000 - LCD

PDC PAGE0 processor specific

0x640: code that will be executed when PDC_PROC(0) is called, loop with nops:
  0x00000640  e81f1ff5  08000240  08000240  08000240
  0x00000650  08000240  08000240  08000240  08000240
  0x00000660  08000240  08000240  08000240  08000240
  0x00000670  08000240  08000240  08000240  08000240
0x680: OS rendezvous code

Undocumented PDC routines

ARG0 ROM internal index Name
0x81 0x1a EEPROM read/write
0x84 0x1b
0x87 0x1c
0x88 0x1d
0x8a 0x1e
0x8b 0x1f
0x8f 0x21
0x90 0x22
0x91 0x23
0x93 0x24
0xa3 0x20
0xa5 0x25
Personal tools