ROM Androud: Manipulasi recovery.img
Revision as of 17:50, 5 January 2015 by Onnowpurbo (talk | contribs)
Menggunakan unpack-MT.pl
Download dari
https://github.com/bgcngm/mtk-tools/
Caranya
cd ~/Downloads wget https://github.com/bgcngm/mtk-tools/archive/master.zip
Buka
cd ~/Downloads unzip mtk-tools-master.zip
unpack boot.img dari upgrade ROM MTK
cd ~/lokasi-upgrade-ROM-MTK/ ~/Downloads/mtk-tools-master/unpack-MTK.pl TWRP_2810_Micromax_A350_KK.img
Hasilnya
MTK-Tools by Bruno Martins MTK unpack script (last update: 30-12-2014) Valid Android signature found... Input file information: Header: Boot magic: ANDROID! Kernel size (bytes): 5076992 (0x004d7800) Kernel load address: 0x10008000 Ramdisk size (bytes): 4099097 (0x003e8c19) Ramdisk load address: 0x11000000 Second stage size (bytes): 0 (0x00000000) Second stage load address: 0x10f00000 Tags address: 0x10000100 Page size (bytes): 2048 (0x00000800) ASCIIZ product name: Command line: ID: b2fff3b00c887fac7dd1eb1b1615b1817f6adec3 Other: Boot magic offset: 0x00000000 Base address: 0x10000000 Kernel offset: 0x00008000 Ramdisk offset: 0x01000000 Second stage offset: 0x00f00000 Tags offset: 0x00000100 Extra arguments written to 'TWRP_2810_Micromax_A350_KK.img-args.txt' Kernel written to 'TWRP_2810_Micromax_A350_KK.img-kernel.img' Ramdisk size: 13717 blocks Extracted ramdisk contents to directory 'TWRP_2810_Micromax_A350_KK.img-ramdisk' Successfully unpacked kernel and ramdisk.