Quote:
Originally Posted by coplate
I've got that 32MB block copied off, and I would love to understand what's in it.
I see a small section at 0x040402.
Then another section at 0x041000
Then another section at 0xe41000
Those two look like the boot images, there was also a variety of other things, but I don't know what they are.
|
0x041000 - uImage for main (bootable)
Copy out mmcblk0p1 - you must have the matching main system file image.
0xE41000 - uImage for diags (bootable)
Copy out mmcblk0p2 - you must have the matching diags system file image.
Copy out mmcblk0p3 - that is the private user data area, used by both 'main' and 'diags'.
Skip any copy out of mmcblk0p4 - that is the visible USB storage area (and destination of the copy command I wrote above).
You already linked to my directions on how to get all of that area over the USB cable.
That info is in the serial de-bricking thread, among others.
And those haven't changed in the series 5 firmware devices that I know of.
0x3F000 - Start of device specific data (idme trampoline) - or at least it used to be on the K5 & PW.
Oxthers are unknown (or I just haven't found the posts that describe them).
It takes a lot of groveling through source code to discover the descriptions.
Some are probably support for NFS - which no one has posted any work on (the Kindles will network boot).