From cc2399df0b9a7a1193f3d203201c0e798fb634cf Mon Sep 17 00:00:00 2001 From: cfig Date: Mon, 28 Feb 2022 14:28:22 +0800 Subject: [PATCH] doc: add guide on working with system.img --- README.md | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 98ab8b9..bae8095 100644 --- a/README.md +++ b/README.md @@ -10,7 +10,7 @@ A tool for reverse engineering Android ROM images. Linux: `sudo apt install git device-tree-compiler lz4 xz-utils zlib1g-dev openjdk-11-jdk gcc g++ python3 python-is-python3` -Mac: `brew install lz4 xz dtc` +Mac: `brew install lz4 xz dtc` Mac: Make sure you have `JDK9+` properly installed. @@ -161,6 +161,17 @@ Please note that to use 'gradle flash', your host machine must be connectted to +
+ working with system.img + +First enable **hacking mode** by setting `bHackingMode = true` in file `build.gradle.kts`, then +```bash +cp system.img +./gradlew unpack +``` +You get `system.img.unsparse`, that's a plain ext4 filesystem data. + +
How to disable AVB verification