On Fri, Aug 19, 2005 at 01:21:11PM +0200, Johannes Berg wrote: > I have successfully reverse engineered the AMS using a variety of python > scripts, otool, libiberty (for C++ name demangling) and a bit of time. > Most useful is an old script I have that uses graphviz' dot to make a > flow graph out of asm. > What I found is documented here: > > http://johannes.sipsolutions.net/PowerBook/Apple_Motion_Sensor_Specification Cool, I didn't even know I had such a device. http://www.kernelthread.com/software/ams2hid/ shows that there is much fun to it, too.
Description: PGP signature