OK sure, makes sense why you would want photos, I'll need to find time to pull it apart fully but when I do I'll get proper scans of both sides of the pcbs. Yeh I noticed the Sam driver havnt had a chance to investigate it. I havnt seen it on my other tools.No. I have no idea if the backplane FPGA ever got updated (never seen other FPGA bitstreams on the TOOL HDDs.
Yes, AFAIK, most FPGA's load it from an external serial EEPROM/Flash.
But you will need a programmer to read it. And there is no knowing if it will be compressed or encrypted.
That one might actually be more interesting, as I have speculations that the backplane has extended monitoring/diagnostic capabilities.
There is also the SAM device, for which some TOOLs have a driver on the HDD, but nobody really knows what it does.
Back when I showed interest in pictures of the PCBs, that was mainly because of the MIF board with the SPEED chip: The NetHDD of PA TOOLs seems to be encrypted. I have a speculation that even a normal SPEED chip can do on-the-fly encryption, if configured somehow, but I have no idea how. The PSX DVR has a similar feature, but it uses a later, extended version of the SPEED chip (includes a Flash interface and a command interface that connects the IOP to the DVRP).
So if we have pictures from the MIF board, we could at least see what chips are used, and if the old SPEED chip is used, or some extended version of it and if there is an additional chip doing the encryption.
That is the weird thing when I log into the z account thats what comes up. So if the root account is the name then I dont know where to go.I see, you are logged under "root", all commands can fail cause of that. It seems that first command fail too. Can you login as "z" before? I will try to adopt commands for root account.
Thanks to @wisi and @water111 one more FPGA flash firmware was extracted from another T15k.Thanks to AKuHAK, and a program I made to combine the file's fragments, I was able to extract FPGA0526_master_pfm.exo from partition 6 (0,1...,5<-) of the SBC HDD from the first post.
MediaFire is a simple to use free service that lets you put all your photos, documents, music, and video in a single place so you can access them anywhere and share them everywhere.www.mediafire.com
Then it turned-out that R-Studio can extract it too, but I didn't think of checking that before writing the program (so now the prog is useless).
FPGA0526_master_pfm.exo Contains the logic configurations of the 4 Performance Analyzer Xilinx XC2V1000 FPGAs. The file is basically a Motorola SREC file.
The data looks uncompressed and not encrypted. And there is a lot of info about reversing Xilinx bitsteams, so in theory it should be possible it to be reversed back to logic/netlist. Although what it does and can do is quite clear from the manuals of the Performance Analyzer.
On the HDD there is a program to write this image to the FPGAs(or external memory that stores the logic config). AFAIK the connection is done through the SBC's parallel port.
The FPGA on the Backplane seems separate and is not stored in this file.
Fantastic work, this is really greatThanks to @wisi and @water111 one more FPGA flash firmware was extracted from another T15k.
BTW numbers in filename correspond to the firmware release date:
0507.exo - 7 May 2003
FPGA0526_master_pfm.exo - 26 May 2003
Also, exist fpga1.0-1.exo which is newer but we were not able to recover it. it comes with pafpga-1.0-1.src.rpm package which we also cannot recover.
To all. The above code should be run from any service account (like "ez", "pz", "z", etc) from the devkit terminal.
This should show all hardware revisions on the screen.Bash:
cd /usr/local/sony/diag/ chkrev/showrev.sh romrev.sh mpubid.sh eerev gsrev ioprev.sh spu2rev.sh pcicrev.sh macaddr.sh