Search found 48 matches

by kostia111
Sun Feb 09, 2020 1:04 am
Forum: Engineering and Reverse Engineering
Topic: GM E38 E67 E40 Kernel/Bootloader Development Extravaganza
Replies: 676
Views: 412556

Re: GM E38 Kernel/Bootloader Deveopment Extravaganza

Yeah I understand. Im more focusing on making my own custom kernel so I can read/write to absolutely any address including the parameter block which has VIN/Seed/Key ect. if you are talking about a memory area from 0xc000 to 0x10000 then this is emulation of non-volatile memory in flash there are s...
by kostia111
Sun Feb 09, 2020 12:34 am
Forum: Engineering and Reverse Engineering
Topic: GM E38 E67 E40 Kernel/Bootloader Development Extravaganza
Replies: 676
Views: 412556

Re: GM E38 Kernel/Bootloader Deveopment Extravaganza

if you want to program the whole block
in one piece
but modified files
there’s still a lot to fix
much easier to use the standard procedure
breaking a common piece into pieces like GM does
by kostia111
Sun Feb 09, 2020 12:12 am
Forum: Engineering and Reverse Engineering
Topic: GM E38 E67 E40 Kernel/Bootloader Development Extravaganza
Replies: 676
Views: 412556

Re: GM E38 Kernel/Bootloader Deveopment Extravaganza

if you want to do programming just like sps does then in addition to software and calibrations, nothing more needs to be programmed if checksums are already calculated in the file if the checksums are not yet corrected this can be done on the fly before programming memory area where you still found ...
by kostia111
Sat Feb 08, 2020 11:09 pm
Forum: Engineering and Reverse Engineering
Topic: GM E38 E67 E40 Kernel/Bootloader Development Extravaganza
Replies: 676
Views: 412556

Re: GM E38 Kernel/Bootloader Deveopment Extravaganza

I showed the markup a little incorrectly but I think the meaning is clear file consists of 2 parts in the header can be indicated not only the address of the beginning and end but also the starting address and length I translate through google and the translation is not quite right sorry 0x0000---0x...
by kostia111
Sat Feb 08, 2020 10:50 pm
Forum: Engineering and Reverse Engineering
Topic: GM E38 E67 E40 Kernel/Bootloader Development Extravaganza
Replies: 676
Views: 412556

Re: GM E38 Kernel/Bootloader Deveopment Extravaganza

see
the header is not always at the beginning of the file
he can describe the memory above and below himself
by kostia111
Sat Feb 08, 2020 10:26 pm
Forum: Engineering and Reverse Engineering
Topic: GM E38 E67 E40 Kernel/Bootloader Development Extravaganza
Replies: 676
Views: 412556

Re: GM E38 Kernel/Bootloader Deveopment Extravaganza

see also
address 0х3f0
it's a boot
its title will show you
how its parts are located in memory
the principle is the same
by kostia111
Sat Feb 08, 2020 8:57 pm
Forum: Engineering and Reverse Engineering
Topic: GM E38 E67 E40 Kernel/Bootloader Development Extravaganza
Replies: 676
Views: 412556

Re: GM E38 Kernel/Bootloader Deveopment Extravaganza

each block has two checksums
first two bytes to check load
and the second to verify that calibration is unchanged by tuning
by kostia111
Sat Feb 08, 2020 8:52 pm
Forum: Engineering and Reverse Engineering
Topic: GM E38 E67 E40 Kernel/Bootloader Development Extravaganza
Replies: 676
Views: 412556

Re: GM E38 Kernel/Bootloader Deveopment Extravaganza

there is the same heading
and slave processor files
only addressing will be two byte
and the title itself will be shorter
I think 0x80
by kostia111
Sat Feb 08, 2020 8:45 pm
Forum: Engineering and Reverse Engineering
Topic: GM E38 E67 E40 Kernel/Bootloader Development Extravaganza
Replies: 676
Views: 412556

Re: GM E38 Kernel/Bootloader Deveopment Extravaganza

look at the log
at the beginning of this topic
after loading the kernel
header loaded first
and then the software file was downloaded
but from the very beginning again including the title
by kostia111
Sat Feb 08, 2020 8:12 pm
Forum: Engineering and Reverse Engineering
Topic: GM E38 E67 E40 Kernel/Bootloader Development Extravaganza
Replies: 676
Views: 412556

Re: GM E38 Kernel/Bootloader Deveopment Extravaganza

open the dump you read from address 0x10000 there is a heading it clearly shows at what addresses software is loaded and calibration as well as addresses regarding which control addresses are considered sum of blocks and cvn when is programming after loading the kernel this header is loaded first sp...