View Single Post
Community Council | Posts: 4,920 | Thanked: 12,867 times | Joined on May 2012 @ Southerrn Finland
#132
Originally Posted by Flowcont View Post
If you could give us some hints of the work you've done and where/how to start working on it(even create a new thread) that'd be awesome.

Thanks for your work.
The usual way I start such reverse engineering tasks is I try to get as much raw data as possible, and then try to make sense of it.

I compiled the driver module (bcm4751-gps.ko) with a lot of debug printouts, restarted nped, started maps and looked at the results to see what the intresting parts were.

Then I added more thorough logging to get at the data buffers passed between the kernel driver and nped.

Now next step would be to try to make sense of the data, and try to decipher the protocol specification. When that's done the positioning daemon can be replaced with a new implementation.
The source of nped is closed, but the algorithms on GPS calculation are public so the task should be doable.
 

The Following 10 Users Say Thank You to juiceme For This Useful Post: