- Jul 30, 2019
- 495
- 117
- 43
- AGName
- slycooper124
- AG Join Date
- June 2019
Here are my findings. From your commands.Just ignore the error and continue entering commands.
Here are my findings. From your commands.Just ignore the error and continue entering commands.
OK sure, makes sense why you would want photos, I'll need to find time to pull it apart fully but when I do I'll get proper scans of both sides of the pcbs. Yeh I noticed the Sam driver havnt had a chance to investigate it. I havnt seen it on my other tools.No. I have no idea if the backplane FPGA ever got updated (never seen other FPGA bitstreams on the TOOL HDDs.
Yes, AFAIK, most FPGA's load it from an external serial EEPROM/Flash.
But you will need a programmer to read it. And there is no knowing if it will be compressed or encrypted.
That one might actually be more interesting, as I have speculations that the backplane has extended monitoring/diagnostic capabilities.
There is also the SAM device, for which some TOOLs have a driver on the HDD, but nobody really knows what it does.
Back when I showed interest in pictures of the PCBs, that was mainly because of the MIF board with the SPEED chip: The NetHDD of PA TOOLs seems to be encrypted. I have a speculation that even a normal SPEED chip can do on-the-fly encryption, if configured somehow, but I have no idea how. The PSX DVR has a similar feature, but it uses a later, extended version of the SPEED chip (includes a Flash interface and a command interface that connects the IOP to the DVRP).
So if we have pictures from the MIF board, we could at least see what chips are used, and if the old SPEED chip is used, or some extended version of it and if there is an additional chip doing the encryption.
It's complaining that it can't find those files, either they don't exist on your drive or the path your executing from is wrong, ls the directory and see if you can find those filesHere are my findings. From your commands.
I see, you are logged under "root", all commands can fail cause of that. It seems that first command fail too. Can you login as "z" before? I will try to adopt commands for root account.Here are my findings. From your commands.
That is the weird thing when I log into the z account thats what comes up. So if the root account is the name then I dont know where to go.I see, you are logged under "root", all commands can fail cause of that. It seems that first command fail too. Can you login as "z" before? I will try to adopt commands for root account.
Thanks to @wisi and @water111 one more FPGA flash firmware was extracted from another T15k.Thanks to AKuHAK, and a program I made to combine the file's fragments, I was able to extract FPGA0526_master_pfm.exo from partition 6 (0,1...,5<-) of the SBC HDD from the first post.
FPGA0526_master_pfm
MediaFire is a simple to use free service that lets you put all your photos, documents, music, and video in a single place so you can access them anywhere and share them everywhere.www.mediafire.com
Then it turned-out that R-Studio can extract it too, but I didn't think of checking that before writing the program (so now the prog is useless).
FPGA0526_master_pfm.exo Contains the logic configurations of the 4 Performance Analyzer Xilinx XC2V1000 FPGAs. The file is basically a Motorola SREC file.
The data looks uncompressed and not encrypted. And there is a lot of info about reversing Xilinx bitsteams, so in theory it should be possible it to be reversed back to logic/netlist. Although what it does and can do is quite clear from the manuals of the Performance Analyzer.
On the HDD there is a program to write this image to the FPGAs(or external memory that stores the logic config). AFAIK the connection is done through the SBC's parallel port.
The FPGA on the Backplane seems separate and is not stored in this file.
Fantastic work, this is really greatThanks to @wisi and @water111 one more FPGA flash firmware was extracted from another T15k.
0507.exo
BTW numbers in filename correspond to the firmware release date:
0507.exo - 7 May 2003
FPGA0526_master_pfm.exo - 26 May 2003
Also, exist fpga1.0-1.exo which is newer but we were not able to recover it. it comes with pafpga-1.0-1.src.rpm package which we also cannot recover.
To all. The above code should be run from any service account (like "ez", "pz", "z", etc) from the devkit terminal.
This should show all hardware revisions on the screen.Bash:cd /usr/local/sony/diag/ chkrev/showrev.sh romrev.sh mpubid.sh eerev gsrev ioprev.sh spu2rev.sh pcicrev.sh macaddr.sh
Can you share the sdk? Like to do also some research.started going through the 3.3 sdk, didn't realise how much content was here for the PA. The video tutorials on the on the PaCon and probe tools are incredibly valuable
Gday All,
This thread will serve as an investigation log for the DTL-T15000.
I've recently gotten my hands on the kit and considering the scarcity of information around it i figure it would be worth opening a dialog for myself and others to contribute to.
To start us off, you can find drive dumps from my kit below:
Drive 1:
Drive 2 (Appears blank):
- Image: https://mega.nz/file/zKpkGQAC#8W_OJ_3qGTQ_ntJZ2KELuDQ0AsJy1YwJnripRsPvcgs
- R-Studio SCN: https://mega.nz/file/2KBSEI6K#DftvKad6ATPMdH6pW0BbH8UCb2uKlW-WSOYYDkuQ3ys
Both drives were Sony rebranded "Maxtor 4 D040H2" 40gb hard drives
- Image: https://mega.nz/file/GSolxb6Y#CFoltdjfNafBiyyT3ei8hUsQULQu1LEWJtZT6pnfebw
- R-Studio SCN: https://mega.nz/file/jHhijSrR#nD5p2wECxyFFvX-QJo6avyedJIfu9s0Ji8OJCHybNUw
The image has redhat linux 6.2 running dsnet 2.2.14.-5.0
The username and password "z" as used with the DTL-T10000 wont work for this image.
instead the username and password is "pz", this will drop you into the diag shell.
PC card in this unit is a PCI-815VE - http://lorezan.free.fr/ps2/PCI-815VE-MAL.pdf
I've created a mega folder with a bunch of files extracted from this kit: https://mega.nz/folder/jTYCCCJJ#G1e-3wG_cxrMHGvbf-y0Ug
diagversion: 4.1
diagrevision: 13
Useful Links Below