On Fri, Aug 19, 2005 at 01:21:11PM +0200, Johannes Berg wrote:
> I have successfully reverse engineered the AMS using a variety of python
> scripts, otool, libiberty (for C++ name demangling) and a bit of time.
> Most useful is an old script I have that uses graphviz' dot to make a
> flow graph out of asm.
> What I found is documented here:
> 
> http://johannes.sipsolutions.net/PowerBook/Apple_Motion_Sensor_Specification

Cool, I didn't even know I had such a device.

http://www.kernelthread.com/software/ams2hid/ shows that there is
much fun to it, too.

Attachment: pgpSJWCDZAZXp.pgp
Description: PGP signature

Reply via email to