MN-100 Development LogBook


13/Feb/2004 by Stas Khirman (staskh at users dot sourceforge dot net)

My first attempt to investigate MN-100.

First look on PCB: CPU - AMD5106 processor (for some reason without proper marking - MS conspiracy?). Flash memory - Intel 28F160C3BC70. Pleasant surprise! It is 2MBytes flash!! See specification
Connectors - ready to use UART 10-pin connector. Solder place to mount 14-pin JTAG connector (unfortunately my soldiering skills will not be enough to put it in place)

First look on Software: For some reason Micro$oft doesn't offer a an individual files for firmware upgrades for variety of MS labeled broadband network equipment, but rather have a one (12M!) downloadable (MSBNDownload.exe) for all its gears - wireline and wireless - MN-100 up to MN-720. When installed , MSBNDownload extract from itself an individual firmware files and MSBNUpdate.exe update utility. MN100_00.01.11.017_RUNTIME.dlf is a latest firmware for MN-100.

OPEN ISSUE : I have no information about internals of the DLF format ! Mast be resolved ASAP MN-500 firmware is stored in similar format. MN-700 and MN-740 are seen to use different format (two individual files per gear - one for bootloader, one for runtime) .

MSBNUpdate is seen as used uPnP protocol for equipment discovery and update. Further investigation required

First look on bootloader: Connecting rs232 level shifter to the 10-pin UART connector. Usual terminal configuration : 115200 bits per second, 8 data bits, parity - none, 1 stop bit.

Booting immediately unveil VxWorks usual bootloader - normal boot sequence maybe interrupted by pressing any key. When in monitor mode (after interrupt) , menu of low level monitor commands is shown. NOTE: some of the commands maybe extremely dangerous - the fact learned by sad experience (see bellow).

Command "p" prints current boot parameters. Command "c" maybe used to change boot configuration. Sub-menu of "c" change mode offers to set up local IP address and remote TFTP and/or BOOTP servers. This is a usual futures of the "standard" VxWorks bootloader and maybe used for fast image load when new image designed or debugged. (functionality require verification).

As I mention before, trying monitor commands is a dangerous business. Almost immediately I manage to corrupt original image and my MN-100 refuses to load. Bootloader verifies integrity of the image and report it as broken. At this stage , it report setup of the Ethernet port and await for "UI restoration procedure" or something similar (sorry, I didn't store log). Unfortunately, I didn't find how to use MS utilities to correct damaged flash.

Fortunately, I find "x" (xmodem download) command. Usually, it's used to download image into RAM and execute it, but in this bootloader it implemented differently - it maybe used only to program code image in the flash (no other options provided). I had used it with MN100_00.01.11.017_RUNTIME.dlf file and seen sucessful image verification and stored in flash starting from 0x20040000 (see details). Note: useful options for future Linux re-flashing if we manage to get internal structure for DLF files.

Under normal conditions , bootloader unpack runtime image from 0x2004000 into ?? and pass control to the 0x1000.
Interesting note: despite the fact that MN-100 PCB has no wireless capabilities, bootloader monitors offers a number of wireless specific test and configuration commands.

First look on original firmware: Finally, after image repairing, I had been able to proceed with runtime image analysis. It is VxWorks system and may be interrupted by any key. After key interrupt, a usual VxWorks monitor is offered - type "help" for details.
Most interesting commands: "d" is to display memory and "l" to disassemble part of the memory code. Interesting to note that runtime code includes symbol table and "l" sometimes provides a greet level of details. "i" command shows a list of all running tasks.

I had used "d" to get values of CPU registers. I'll use it soon to update register map page.

Command "l" is useful to get original bootloader code in the flash. (note: I have no JTAG support to get it other way and analyse outside). Note two distinctive parts of boot code - one started at 0x20000000, another at 0x20008000.

Flash Memory map:
Area Start Address Size Link
Boot 0x00000000   BOOT initial boot kick start
Boot - 2 0x00008000   BOOT second part of the boot code
Code Image 0x00040000 768k ? CODE
end of ROM 0x00200000 Total-2M end of ROM

14/Feb/2004 by Stas Khirman (staskh at users dot sourceforge dot net)

Spend my valuable time updating register values table. Now it represents a registers values at middle of original firmware execution (steady state)

A few interesting reports from MN-100 debug monitor

-> pc
value = 1081956 = 0x108264 = semQPut + 0xc0
-> i

  NAME        ENTRY       TID    PRI   STATUS      PC       SP     ERRNO  DELAY
---------- ------------ -------- --- ---------- -------- -------- ------- -----
tExcTask   _excTask       67b06c   0 PEND         131408   67afa0       0     0
tLogTask   _logTask       678750   0 PEND         131408   678684  3d0001     0
tShell     _shell         5cde68   1 READY         e3690   5cdb08  1c0001     0
tDhcpcTask _dhcpcMon      5b6844  40 PEND         108264   5b67a0       0     0
tDnsProxy  _dns_proxy_D   5b27c8  40 PEND+T       108264   5b2658  3d0004    82
tDhcpsTask _dhcpsStart    5ae9a0  40 PEND         108264   5ae900       0     0
tHTDM      _httpd         589370  40 PEND         108264   589204       0     0
tHTRQ      _ProcessHttp   5871c4  40 PEND         131408   5870e4       0     0
tNetTask   _netTask       638564  50 READY        108264   6384e4       0     0
reset      _Prd_PreRese   556e9c  99 PEND         108264   556e3c       0     0
nvram      _nv_Task       5bdc74 100 READY         ddc68   5bdbdc       0     0
fpi        _fpi_Task      5bb8d0 100 READY         ddc68   5bb858       0     0
sntpMain   _sntpMain      58ea70 100 DELAY         ddc68   58e9b0       0    65
SSDP_Beacon_BeaconStart   55d1f4 100 DELAY         ddc68   55cf6c       0   584
SSDP_readTa_SsdpReadTas   55a048 100 PEND         108264   559ac4       0     0
value = 0 = 0x0

Runtime code is started at 0x1000
Some of interesting functions:
Symbol Address Comments
sysInit 0x1000 sysInit
bsp_ImageVerify 00001088 bsp_ImageVerify.txt
bsp_BootProductCode 00001148 bsp_BootProductCode.txt
bsp_SetBootline 00001270 bsp_SetBootline.txt
usrInit 0x6efc


21/Feb/2004 by Stas Khirman (staskh at users dot sourceforge dot net)

Check symbol table for something started from "download". Bingo! find download_ProcessImage function. Look like is used to burn flash when a new image downloaded via HTTP. It then calls prd_CheckImage to validate correctness of the Image file.
Deep analysis of prd_CheckImage unveil the internal structure of *.DLF file

*.DLF file structure
Offset Description Value from MN*.dlf
0 TF - Type of file 2
4 DL - Data Length
(FileLength-80)
0x000b1e6e
8 DC - Data CheckSum (byte)
for(i=80; i<=fileLen-1;i++)
  DC+ = (byte)file[i];
0x05e2bb5c
0x0c..
12...
Text Signature "msfox_wired"
0x4c
76
HC - header checksum:
for(i=0;i<0x4b;i++)
  HC+ = (byte)header[i];
0x000030ae
0x50...
80...
data file - unknown compression  


22/Feb/2004 by Stas Khirman (staskh at users dot sourceforge dot net )

Decided to check other symbols in vicinity of download_ProcessImage and prd_CheckImage

0x000b8eb4 download_ConfigInit       text
0x000b9004 download_Action           text
0x000b9020 download_SetAction        text
0x000b90a8 download_Mode             text
0x000b90c4 download_SetMode          text
0x000b9134 download_FileName         text
0x000b91c0 download_SetFileName      text
0x000b926c download_ProcessImage     text
0x000b9330 download_ProcessWlanFirmware text
-----
0x000c3094 prd_ResetTask             text
0x000c3138 prd_Reload                text
0x000c3178 Prd_PreResetTask          text
0x000c323c Prd_ResetInit             text
0x000c32e4 prd_FactoryReset          text
0x000c3350 prd_CheckImage            text
0x000c3544 prd_UpdateImage           text
0x000c368c prd_CompareImage          text
0x000c3764 prd_DownloadCfgImg        text
0x000c397c prd_info_SerialNo         text
0x000c39e8 prd_info_HardwareVer      text
0x000c3a54 prd_info_BootCodeVer      text
0x000c3ad4 prd_info_RuntimeCodeVer   text
0x000c3b38 prd_info_RuntimeCodeDate  text
0x000c3b9c prd_info_GetLanMacAddr    text
0x000c3c1c prd_info_GetWanMacAddr    text
=======


$Id: logbook.html,v 1.8 2004/03/02 22:56:55 bcabral Exp $