View Single Post
Posts: 3,464 | Thanked: 5,107 times | Joined on Feb 2010 @ Gothenburg in Sweden
#134
Originally Posted by juiceme View Post
The usual way I start such reverse engineering tasks is I try to get as much raw data as possible, and then try to make sense of it.

I compiled the driver module (bcm4751-gps.ko) with a lot of debug printouts, restarted nped, started maps and looked at the results to see what the intresting parts were.

Then I added more thorough logging to get at the data buffers passed between the kernel driver and nped.

Now next step would be to try to make sense of the data, and try to decipher the protocol specification. When that's done the positioning daemon can be replaced with a new implementation.
The source of nped is closed, but the algorithms on GPS calculation are public so the task should be doable.
why cant we just access that chip direcly? or did Nokia put some firmware inside that chip that is binary crap instead of NMEA?

Btw. just found out that Nexus7 using same chip. wonder if android daemon is open source.

Not have a clue what I am talking about here but maybe doable via libhybris as a second alternative?

also found this:

https://gitorious.org/meif_protocol/...5e8ab2578808b:
__________________
Keep safe and healthy

Last edited by mikecomputing; 2013-10-11 at 18:05.
 

The Following User Says Thank You to mikecomputing For This Useful Post: