I did a file search for those partitions and found no script.
Can’t imagine where you were looking, but the file has a very obvious name…
partitionDisk.sh
Thanks for your information. I was looking everywhere for sda5 … sda8. The file you mention imho is irrelevant, because those variables assigned seem not to be used anywhere.> And of course, if I were to program a NSA backdoor I would call this code Kernel and control > The miracle remains: These partitions hold information that is acessed when booting, but nobody here knows how, why and when it is used. It would be a good hiding place
Count_Dooku wrote: And of course, if I were to program a NSA backdoor I would call this code Kernel and control
I’ll bet you would.
But until you actually examine the contents of those partitions and see something unusual, you need to stop spreading conspiracy theories.
I did this for you, because I know your ONLY intent is to stir up conspiracies and fear.
SDA5 and SDA6 contain IDENTICAL data. And what is that data? It’s the KERNEL! Just as the name says.
Compare the contents of SDA5 to /boot/uImage. They’re identical until bytes 0038e300. In fact, the contents of SDA5 and 6 are just smaller uImage files. The RESIDENT uImage file contains 7K of additional data. They even begin with a uImage header; bytes 0x00 - 0x03 are 27 05 19 56.
SDA7 and SDA8 contain IDENTICAL data. What is that data? It’s a simple script:
## Button initial state
btn_status=0
get_button_status
sata
satapart 0x3008000 5 0x5000
sata stop
# This is customized for each environment variable script
bootargs="console=ttyS0,115200n8, init=/sbin/init"
bootargs="$bootargs root=/dev/md0 raid=autodetect"
bootargs="$bootargs rootfstype=ext3 rw noinitrd debug initcall_debug swapaccount=1 panic=3"
bootargs="$bootargs mac_addr=$eth0.ethaddr"
bootargs="$bootargs model=$model serial=$serial board_test=$board_test btn_status=$btn_status"
bootm /dev/mem.uImage
Yeah, that looks VERY suspicious. It’s a diagnostics setup to boot the kernel into a hardware console with debugs enabled!
Count_Dooku wrote: And of course, if I were to program a NSA backdoor I would call this code Kernel and control
I’ll bet you would.
But until you actually examine the contents of those partitions and see something unusual, you need to stop spreading conspiracy theories.
I did this for you, because I know your ONLY intent is to stir up conspiracies and fear.
SDA5 and SDA6 contain IDENTICAL data. And what is that data? It’s the KERNEL! Just as the name says.
Compare the contents of SDA5 to /boot/uImage. They’re identical until bytes 0038e300. In fact, the contents of SDA5 and 6 are just smaller uImage files. The RESIDENT uImage file contains 7K of additional data. They even begin with a uImage header; bytes 0x00 - 0x03 are 27 05 19 56.
SDA7 and SDA8 contain IDENTICAL data. What is that data? It’s a simple script:
[…]
Yeah, that looks VERY suspicious. It’s a diagnostics setup to boot the kernel into a hardware console with debugs enabled!
Ooh. Yeah, that’s the NSA alright…
I would never have believed that you bet anything …
“because I know your ONLY intent is to stir up conspiracies and fear.”
Plain wrong, but my question got no convincing answer for more than a week!
My comparison of /boot/uImage and content of sda5 and sda6 show some similarities, but comp spits out differences for almost all byte positions. So your disk seems to be different from mine.
“It’s a diagnostics setup to boot the kernel into a hardware console with debugs enabled!”
You must have acess to insider know-how
Can you tell what must be done to boot into that image?
My comparison of /boot/uImage and content of sda5 and sda6 show some similarities, but comp spits out differences for almost all byte positions. So your disk seems to be different from mine.
I don’t understand what you’re saying “Show some similarities…but different in almost all byte positions.” That’s contradictory.
You’ve already indicated that you’ve been monkeying around with those partitions. There’s no surprise yours might be corrupt or out of state.
Count_Dooku wrote:
You must have acess to insider know-how
Another conspiracy? Just because I did some legwork you were unwilling to do, you now say I’m an insider? No, I just spent about 30 minutes looking at the obvious.
Count_Dooku wrote:
Can you tell what must be done to boot into that image?
Gee. Maybe that script has a clue – perhaps a button? Perhaps there’s a switch or jumper on the motherboard? At this point, I don’t really care.
I’m just writing this because people searching the net for various things are going to come across this post and need to see level heads explaining away the claptrap.
TonyPH12345, please don’t encourage Count_Dooku by denying the conspiracy. However It is amazing that this post has survived this long without the mods deleting it as well as the Count himself.
When the Count disappears from this forum; we will know that there must be a conspiracy… although we would most likely see a Count2, Count3_Dooku etc. BTW What ever happen to Linadmin666?
As has been explained before, WD is not involved in any conspiracies, nor do we have any knowledge of any government agency attempting to use our drives to spy on anyone.
Please keep posts relevant to product topics. [edit] Moreover, please refrain from making threats towards one another, whether blatant or subtle, it will get you banned immediately.