Rockbox Development > New Ports
Sandisk Sansa View
rockfarm:
Well, As CrackMonkey421 has found, I believe that we can run our own code using a dummy sign and then encrypting with the View's key. We just need to figure out how to show that, and make a bootloader, right?
So, as cout has said, we need to find strings that are displayed to the LCD. We have found many of these strings. I just wouldn't know how to find the code that actually does the displaying.
The strings that I have found start at offset x2ada6c, and continue for about the next 8,000 or so bytes (FW 01.01.06). Also, this is for English only. Following that, the other languages are there too. I can also confirm that I have done some changing of strings and flashing thanks to (crackmonkey421), and it does work.
Maybe I'm stating the obvious, but I'm still trying to help as best as I can.
Would it make sense to look in the bootloader for strings (or the code), or would it be best to stick to the firmware.mi4?
AeroBlue:
Hi! :)
I found these picture on a french website ( a high quality pictures of the sansa view )
http://img231.imageshack.us/img231/8697/image0001lm9.jpg
http://img231.imageshack.us/img231/6956/image0003zw5.jpg
http://img231.imageshack.us/img231/6971/image0002cz6.jpg
I hope they would be useful
crackmonkey421:
--- Quote from: AeroBlue on June 30, 2008, 11:37:09 AM ---Hi! :)
I found these picture on a french website ( a high quality pictures of the sansa view )
http://img231.imageshack.us/img231/8697/image0001lm9.jpg
http://img231.imageshack.us/img231/6956/image0003zw5.jpg
http://img231.imageshack.us/img231/6971/image0002cz6.jpg
I hope they would be useful
--- End quote ---
Those pictures came from space_ghost on this forum on this thread even. Please read the thread before posting.
Here's where that really came from:
http://forums.rockbox.org/index.php?topic=13562.msg113697#msg113697
I'll update the View port's wiki soon if nobody else does.
--- Quote from: rockfarm on June 27, 2008, 08:38:06 PM ---Would it make sense to look in the bootloader for strings (or the code), or would it be best to stick to the firmware.mi4?
--- End quote ---
Well you certainly can explore all options, but everything we need to run code is probably in the firmware.mi4. This device is based on the GoForce 6100 chipset which contains a 250MHz ARM1176JZ-S core. It is believed that the GoForce 6100 is based on previous PortalPlayer products because of their firmware format, PP6110 being mentioned in the firmware, and nVidia acquired the PortalPlayer company in the beginning of 2007. This device also contains an AS3517 chip. So, disassembling the unencrypted firmware.mi4 with an ARM assembler will show a lot of what is going on, but knowing how to actually read what is going on is another story because I am not experienced in assembly code of any kind. Whatever documentation or SDK nVidia supplies for their GoForce 6100 would be nice to have, but I don't think we're going to be able to get those materials. It's all about disassembling and deciphering at this point.
Maybe if we ever get this thing ported we could play with the 3D graphics engine built into it. The OF doesn't do this hardware justice at all.
Bagder:
I figure a sensible next step is to figure out how to use the LCD and how to read buttons.
madnut:
Can someone post the unencripted firmware?
Navigation
[0] Message Index
[#] Next page
[*] Previous page
Go to full version