It contains the same android boot.img as the kernel firmware, with the following header from offset 0x24:
struct {
int lmode; // boot mode: 1 - direct boot, 2 - boot using A-core restart method
int size; // component size
int adr; // component's memory load address
int offset; // component's offset from the beginning of the file
}
The first component is raminit, the second is usbldr. More information is available in balong-usbdload
Extract boot.img (usbldr) with any Android extracting/repacking scripts, modify and repack it, replace original component from it's offset and adjust component size in the header if it's changed.
borther can you help me how to unpack and repack loader please help
https://github.com/forth32/balong-usbdload/blob/master/usbloader_b315_shell.bin
extract.sh
i have extract scripit but dont know how to repack
It contains the same android boot.img as the kernel firmware, with the following header from offset 0x24:
struct {
int lmode; // boot mode: 1 - direct boot, 2 - boot using A-core restart method
int size; // component size
int adr; // component's memory load address
int offset; // component's offset from the beginning of the file
}
The first component is raminit, the second is usbldr. More information is available in balong-usbdload
Extract boot.img (usbldr) with any Android extracting/repacking scripts, modify and repack it, replace original component from it's offset and adjust component size in the header if it's changed.
borther can you help me how to unpack and repack loader please help
https://github.com/forth32/balong-usbdload/blob/master/usbloader_b315_shell.bin
extract.sh
i have extract scripit but dont know how to repack