Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

extracting from vmlinux containing in-built gsl1688.c #151

Open
Mis012 opened this issue Aug 21, 2020 · 1 comment
Open

extracting from vmlinux containing in-built gsl1688.c #151

Mis012 opened this issue Aug 21, 2020 · 1 comment

Comments

@Mis012
Copy link

Mis012 commented Aug 21, 2020

Hi,
I've finally found where the fw is hiding (I think) on this device, but it seems the extraction tool is not happy with me supplying the entire vmlinux file...

do you have any suggestion?

(had to gzip the file so github doesn't complain)
vmlinux.gz

@valpackett
Copy link

Several years late :) but leaving the hints here as I've just had to do this for a device I have:

  • convert the kernel image to ELF with vmlinux-to-elf
  • likely fail to extract it with the tool as it's probably inlined
  • open the ELF in Ghidra or whatever your favorite RE tool is
  • find the "gsl_load_fw start" string and jump to the function referencing it
  • find the address and size used by the loading loop (size is in pairs of 32-bit ints (position & value), not bytes; and if you see that funky -1 dereference like in the screenshot below, the start address is 4 bytes earlier)
  • copy that much data (size*8) from that start address into a new file
  • compare it with other firmwares in a hex editor, it should start and end similarly enough

ghidra screenshot

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants