Remember, this is a high priority reverse engineering project:
https://www.fsf.org/campaigns/priority-projects/reverse-engineering
Everybody must work on that.
The linking of gpl libraries in the binaries must make the task easier.
It's counterproductive
try to hurt the image of the company in
I don't understand any advantages of put a device driver code in secret.
Someone can explain the advantage of a secret device driver? Maybe is about
money. They want to license the code to some company and charge money for
that. In case I want to buy the source code, how much this will cost?
Hi, if someone want to make a binary analysis/reverse engineering of
proprietary driver I would donate to the project. Is there some paypal
accepting donations to this project? Or some donation box for the
linux-sunxi project as well?
Em quinta-feira, 12 de março de 2015 06:25:41 UTC-3, Simos
2015-03-04 11:19 GMT-03:00 ovidi...@gmail.com:
@Roberto
asuming allwinner has did copy the hardware (speaking about A80 sun9i) and
the reason of violating GPL's and not publishing sources is might be
possible to get sued by original silicon vendor ... but the question is
which silicon
I think they couldn't post the source code because is not easy as we
presume. Their hardware are rip off of other hardware implementations. So
if they release the source code, the hardware companies can sue them. And
it is a more serious business than a gpl violation bothering some few angry
Em domingo, 2 de novembro de 2014 15:38:55 UTC-2, Peter Mattern escreveu:
Hello.
Running mainline kernel from Arch Linux ARM on a Cubietruck I have to
say the so called SBE error [0] makes the on-chip WLAN interface unusable.
My findings strongly suggest there's some kind of load