Page 1 of 1

GFT3 for A705

Posted: Mon Jan 25, 2010 8:35 pm
by lalarc
Hi all,
have been watching the show ever since I got my archos 705 wifi 80gig. Had to send it in due to a dead battery while under warranty, came back with FW 2.1.04 :evil:

Great to see the progress that was made now with GFT3. Thanks to all who made this possible for the persistance.

Have tried to use it on the 705, but... not.

Problem seems to be the avos file, which appears to differ from the 605, 'cause I get

Code: Select all

/usr/bin/avos: can't resolve symbol 'GUI_yuv255_bitmaps'
at the point where it tries to start avos again.

What I've doen so far:
To get some logging, I have added following line to hack.sh

Code: Select all

exec > /mnt/data/hack_gft3.log 2>&1
Also in restartavos.sh I've enabled logging by uncommenting

Code: Select all

exec > /mnt/data/restartavos.log 2>&1
Then I figured what to change to unload the wifi driver in restartavos.sh:

Code: Select all

rmmod sd8xxx sdio sdio_host_davinci sdio_dma_davinci sdio_core
becomes

Code: Select all

rmmod ga_linuxdrv_sdio sdio_host_davinci sdio_dma_davinci sdio_core 
SO, unloading works. I've also added some echo commands to the scripts to see where it stops. Restartavos.sh goes all the way through to restarting avos. Then I get

Code: Select all

/usr/bin/avos: can't resolve symbol 'GUI_yuv255_bitmaps'
in the restartavos.log, and at that point the 705 freezes. Have to hard-power-off (hold pwr button).

I understand that as for the 605-Flash model the 705's avos bin file would need different patch addresses than the normal 605-HDD for which mouldy cheese was made. But decompiling that avos bin file is a bit beyond my skills really.

Anyone else playing with a 705 who could get me further? Anyone who's got the required patch code or a patched 705 patched bin file?

Thanks & Greetz
lala

Re: GFT3 for A705

Posted: Wed Jan 27, 2010 3:59 am
by generic_username
first: md5sum for your avos plz
example

Code: Select all

[email protected]:~$ ls
avos
[email protected]:~$ md5sum avos
50d496b158f3033cc097e44f89fece0a  avos
havnt produced much yet.. but if u wanna hop on the bandwagon post a 2.1.04 avos and ill try to take a look (may not be quick, im a student, but ill look)

heres the offsets identified by divx and sideways, thanks to archilles:


OFFSET: 0x244c47
hdStock:
hdHACKED: 0x e3
705Stock:
fStock:

OFFSET: 0x90f0b8
hdStock:
hdHACKED: 0x 00 00 a0 e3 1e ff 2f e1
705Stock:
fStock:

OFFSET: 0x91023c
hdStock:
hdHACKED: 0x 01 30 a0 e3
705Stock:
fStock:

OFFSET: 0x910663
hdStock:
hdHACKED: 0x e3
705Stock:
fStock:

OFFSET: 0x9f5978
hdStock:
hdHACKED: 0x 00 00 00 00 00 00
705Stock:
fStock:

Re: GFT3 for A705

Posted: Wed Jan 27, 2010 10:06 pm
by lalarc
Hi generic_username,
thanks for taking this up.


My stock avos
http://rapidshare.com/files/342058489/avos.705.zip.html
MD5 of the zip: 2D5BA873E72C6A74EC8ABE6F11A42091
MD5 of the avos file: 10E2500029B98E369AF5B6202F254043

The MD5 for the hacked avos from the mouldy cheese release (extracted from rootfs.cramfs.secure) is
1434578a0b5d706f4698b40a08d8b586

The one you posted is
50d496b158f3033cc097e44f89fece0a
What avos "version" is yours for? Stock or patched 605Flash version?

OFFSET: 0x244c47
hdStock: <<== what's this? 605hd?
hdHACKED: 0x e3
705Stock: 0x e3
fStock:<<== 605flash?

OFFSET: 0x90f0b8
hdStock:
hdHACKED: 0x 00 00 a0 e3 1e ff 2f e1
705Stock: 0x A7 17 00 EB F4 FF FF EA
fStock:

OFFSET: 0x91023c
hdStock:
hdHACKED: 0x 01 30 a0 e3
705Stock: 0x B0 FE FF EB
fStock:

OFFSET: 0x910663
hdStock:
hdHACKED: 0x e3
705Stock: 0x E1
fStock:

OFFSET: 0x9f5978
hdStock:
hdHACKED: 0x 00 00 00 00 00 00
705Stock: 0x 6C 3E 00 00 0A 00
fStock:

What else can I provide? Anything unless it bricks my 705... ;-)
Thanks
lala

Re: GFT3 for A705

Posted: Sat Jan 30, 2010 3:59 pm
by sleepnot
thanks for looking into this. i have a 705 wifi 160gb version as well with the 2.1.04 firmware. i was going to try the GFT3 hack on it but then saw this post. :badgrin:

Re: GFT3 for A705

Posted: Sat Jan 30, 2010 4:41 pm
by generic_username
the md5 was just an example sry for any confusion

also, if u are filling in the 705 table with hex valus from the offset i provided then u are missing the point... those hex offsets/values(derived from a MC'd hard drivec2.1.04) did NOT work with the 705 or u would not be here...

what needs to be done is:

1. to compare as grond called it 'vanilla avos'(non-hacked hd 2.1.04) to the mc'd version...
2. then you would search for the binary string(if ur lucky) from the vanilla605 in your vanilla705 and determine the correct 705 offsets
3. then replace the hex values searched for at the new offset with the string of hex values from the mc'd avos

Re: GFT3 for A705

Posted: Wed Feb 03, 2010 9:23 am
by sleepnot
so owners of 705 wifi will have to wait until GFT4 to come out for the hack to work? another 2 years of waiting? :?

Re: GFT3 for A705

Posted: Wed Feb 03, 2010 11:33 am
by grond
sleepnot wrote:so owners of 705 wifi will have to wait until GFT4 to come out for the hack to work? another 2 years of waiting? :?
Not really, this is a ten minutes job:
what needs to be done is:

1. to compare as grond called it 'vanilla avos'(non-hacked hd 2.1.04) to the mc'd version...
2. then you would search for the binary string(if ur lucky) from the vanilla605 in your vanilla705 and determine the correct 705 offsets
3. then replace the hex values searched for at the new offset with the string of hex values from the mc'd avos

Re: GFT3 for A705

Posted: Wed Feb 03, 2010 7:30 pm
by lalarc
grond wrote: Not really, this is a ten minutes job:
Or there about. I'll do that this weekend I hope.

But if GFT4 was quicker than that, count me in :D

Re: GFT3 for A705

Posted: Wed Feb 03, 2010 10:11 pm
by sleepnot
lalarc wrote:
grond wrote: Not really, this is a ten minutes job:
Or there about. I'll do that this weekend I hope.

But if GFT4 was quicker than that, count me in :D
well, for me it would take about 2 years. 1.5 years to learn linux. then .5 year to figure out the 3 steps above. ;) by that time, we'll have had not only GFT4 but probably pre-beta version of GFT5. :D