ok im not using IDA to find ESKONF in 1.4 yet but look what we have in 2.8
here is mine 1.8t 06A906032DR 0002
seg085:C628 sub_85C628:
seg085:C628 mov [-r0], r9
seg085:C62A mov [-r0], r8
seg085:C62C mov [-r0], r7
seg085:C62E mov [-r0], r6
seg085:C630 sub r0, #4
seg085:C632 movb rl4, byte_810BF4 ; ESKONF
seg085:C636 cmpb rl4, #55h ; 'U'
seg085:C63A jmpr cc_NZ, loc_85C648
seg085:C63C movb rl4, byte_810BF4 ; ESKONF
seg085:C640 cmpb rl4, #55h ; 'U'
seg085:C644 jmpa cc_Z, loc_85C9E0
and a VR6 022906032E_v008
seg084:C4A2 sub_84C4A2:
seg084:C4A2 mov [-r0], r9
seg084:C4A4 mov [-r0], r8
seg084:C4A6 mov [-r0], r7
seg084:C4A8 mov [-r0], r6
seg084:C4AA sub r0, #4
seg084:C4AC movb rl4, byte_810C2C ;ESKONF ?
seg084:C4B0 cmpb rl4, #55h ; 'U'
seg084:C4B4 jmpr cc_NZ, loc_84C4C2
seg084:C4B6 movb rl4, byte_810C2E
seg084:C4BA cmpb rl4, #55h ; 'U'
seg084:C4BE jmpa cc_Z, loc_84C696 jmpa cc_Z, loc_84C696
and here is the content at 0x10C2C
C0 FF 55 55 FF 7E EE A4 06 02 A6 0D FE
but another routine uses this 7E above so ive searched by the 0x10BF3 (0D) byte before ESKONF in my 1.8t that i believe map size (0D=13 bytes) and yes 2.8 eskonf is started earlier at 0x10C24
seg085:9D3E jnb word_FD06.3, loc_859D48
seg085:9D42 movbz r5, byte_810BF3 ;1.8t ESKONF map size
seg085:9D46 add r4, r5
seg084:8F22 jnb word_FD06.1, loc_848F2C
seg084:8F26 movbz r5, byte_810C23 ;2.8 ESKONF map size ?
seg084:8F2A add r4, r5
so the target eskonf is
00 FC 2F FC 0C 30 F3 FF C0 FF 55 55 FF
but in 2.8 map size (byte before eskonf @ 0x10C23) = 00 so im confused and i dont know how i can decrypt that ESKONF.. if its really him. thats why im looking for good old error class method
btw last jmpa goes to the end of subroutine, so am i right that changing 0x10C2E to 55 will completely remove all onboard curcuit diagnosis?