-
The blobs were compiled using
riscv32-unknown-elf-gcc_8.3.0 -march=rv32imfc -mabi=ilp32f -gdwarf -Os -std=gnu99 -ffunction-sections -fdata-sections -fstrict-volatile-bitfields -fshort-enums -ffreestanding -fno-strict-aliasing
-
The target likely supports atomics. If so we may use
-march=rv32imafc
.
-
Our
funcdiff.py
andheaderdiff.py
tools. See their documentation -
Ghidra, an IDA-like RE suite courtesy of the NSA. Use this fork if you want to load RISC-V binaries that have relocations (i.e. unlinked bins)
-
DWARF Explorer, an explorer for DWARF debugging data
-
The proprietary libraries still contain DWARF data, but tool support for showing it varies greatly. This will show you the raw DWARF information (e.g. structures, function local variables, inlined function information).
-
-
Add your favorite disassembly tools here. If the tool is not free, mark it with (non-free).
WiFi and BLE-related binaries available in the BL602 are included within this repo:
-
blobs/
contains.a
files of the libraries along with compiled examples of their use, as.elf
. -
images/
has.bin
files of factory PineCone firmware. See the README for the directory. -
libatcmd/
,libbl602_wifi/
andlibblecontroller/
contain disassembled binaries of the libraries' object files, along with disassembly of their respective example app.
Sources that are being reverse engineered are located in components/
, and reconstructed headers are in dwarf/
and headers/
.
Tooling is available in the script/
directory.
Important
|
Using proprietary RivieraWaves code
This reverse-engineering project tries to stay clear of any possible copyright problems coming from RivieraWaves; i.e. the goal is clean-room RE.
Whatever you do, do not insert proprietary |
-
Pine64 SDK fork’s documentation, if you figure something out that’s documentation-worthy, please update that documentation.
-
Linux Driver and Firmware for SDIO WiFi & BT Module based on BL602
-
Initialized README.adoc and copied LICENSE from the SDK.
-
Split objects out of archives
ar x libx.a
. -
Disassembled objects to their assembly
git/github/pine64/bl_iot_sdk/toolchain/riscv/Linux/bin/riscv64-unknown-elf-objdump -d -r xx.o"
-
Added three statically linked elf built from bl_iot_sdk to provide clear symbols for reverse engineering
-
The three examples are from commit 9a10205e96a6b10e22069c87625550cad666b1b4, bl602_demo_at, bl602_demo_wifi and sdk_app_ble_sync.
-
They are compiled with the riscv toolchain shipped with the sdk and using
make -j
directly in the folders withCONFIG_CHIP_NAME=BL602
andCONFIG_LINK_ROM=1
. The disassembly is generated withriscv64-unknown-elf-objdump -d ./x.elf > ./x.S