Testing done using a Canon EOS 600D and a Canon EF-S18-55mm f/3.5-5.6 IS II.
- VBAT
- DET (common with P-GND on lens side)
- P-GND
- VDD
- DCL
- DLC
From 82f995d4e164795c69a3c67be44eacfa8f5c3c14 Mon Sep 17 00:00:00 2001 | |
From: Hector Martin <[email protected]> | |
Date: Fri, 5 Feb 2021 05:34:10 +0900 | |
Subject: [PATCH 00/18] Apple M1 SoC platform bring-up | |
To: Hector Martin <[email protected]> | |
To: [email protected] | |
Cc: [email protected] | |
Cc: Marc Zyngier <[email protected]> | |
Cc: [email protected] | |
Cc: Arnd Bergmann <[email protected]> |
#!/usr/bin/python | |
import sys | |
from construct import * | |
LoadCmdType = "LoadCmdType" / Enum(Int32ul, | |
UNIXTHREAD = 0x05, | |
SEGMENT_64 = 0x19, | |
UUID = 0x1b, | |
BUILD_VERSION = 0x32, | |
DYLD_CHAINED_FIXUPS = 0x80000034, |
#!/usr/bin/env python3 | |
import time, math, threading, struct, sys, os.path, random | |
import obswebsocket, obswebsocket.requests | |
client = obswebsocket.obsws("localhost", 4444) | |
client.connect() | |
source_patterns = [ | |
"RTMP", "JACK", "AUX" | |
] |
#!/usr/bin/python3 | |
import mido, sys | |
mid = mido.MidiFile(sys.argv[1]) | |
new_track = mido.MidiTrack() | |
sustain = 0 | |
last = 0 | |
t = 0 | |
for ev in mido.merge_tracks(mid.tracks): |
Starlet memory map | |
00000000-04000000: MEM1 area (2 mirrors, 0x2000000 each) | |
0000000-1800000: MEM1 (0x1800000) | |
1800000-2000000: unimplemented / bus noise / junk? (looks like uninitialized memory but unwritable) | |
04000000-08000000: unimplemented, read as zeroes | |
08000000-10000000: register/SRAM area (8 mirrors, 0x800000 each) | |
000000-400000: registers (4 mirrors, 0x100000 each) CANONICAL ADDRESSES: 0x0d000000 and 0x0d800000 |
--- glibc-2.29/localedata/locales/ja_JP.old 2019-04-01 17:26:52.808154026 +0900 | |
+++ glibc-2.29/localedata/locales/ja_JP 2019-04-01 17:38:48.872822551 +0900 | |
@@ -14946,7 +14946,9 @@ | |
t_fmt_ampm "%p%I<U6642>%M<U5206>%S<U79D2>" | |
-era "+:2:1990//01//01:+*:<U5E73><U6210>:%EC%Ey<U5E74>";/ | |
+era "+:2:2020//01//01:+*:<U4EE4><U548C>:%EC%Ey<U5E74>";/ | |
+ "+:1:2019//05//01:2019//12//31:<U4EE4><U548C>:%EC<U5143><U5E74>";/ | |
+ "+:2:1990//01//01:2019//04//30:<U5E73><U6210>:%EC%Ey<U5E74>";/ |
import hmac, hashlib | |
# Data from I²C trace at https://hackaday.io/project/19480-raspberry-pi-camera-v21-reversed/log/52547-i2c-logic-analyzer-trace | |
# Secret key from VideoCore blob | |
# serial[8], serial[7:4], serial[3:0] | |
serial = bytes.fromhex("EE8C196D8301230B59") | |
# rPi -> camera random number | |
numIn = bytes.fromhex("5805F3C898C3133154498E082F2E703516F2DBD1") |
from asm import * | |
blob = open("image.bin", "rb").read() | |
start_addr = 0x08003000 | |
patch_start = start_addr + len(blob) | |
assert patch_start % 4 == 0 |
#!/usr/bin/env python | |
import os, tempfile, shutil, subprocess | |
class AsmException(Exception): | |
pass | |
class BaseAsm(object): | |
def __init__(self, source, addr = 0): | |
self.source = source | |
self._tmp = tempfile.mkdtemp() + os.sep |