Quantcast
Channel: xda-developers - Android Software and Hacking General [Developers Only]
Viewing all articles
Browse latest Browse all 3614

[Q] i9300 bootloader problem

$
0
0
Hey
Currentrly i would like to analyze boostloader/download mode behavior and its internals. Coud someone help me to download bootloader binary from the i9300? :confused:

Through adb i didnt see any bootloader devices attached ( and that's right coz it already executed =D ) But i tried to locate it through
-adb shell
mount

Here is list of mounted devices:
Quote:

rootfs / rootfs ro,relatime 0 0
tmpfs /dev tmpfs rw,nosuid,relatime,mode=755 0 0
devpts /dev/pts devpts rw,relatime,mode=600 0 0
proc /proc proc rw,relatime 0 0
sysfs /sys sysfs rw,relatime 0 0
none /acct cgroup rw,relatime,cpuacct 0 0
tmpfs /mnt/asec tmpfs rw,relatime,mode=755,gid=1000 0 0
tmpfs /mnt/obb tmpfs rw,relatime,mode=755,gid=1000 0 0
none /dev/cpuctl cgroup rw,relatime,cpu 0 0
/dev/block/mmcblk0p3 /efs ext4 rw,nosuid,nodev,noatime,barrier=1,journal_async_c
ommit,data=ordered 0 0
/dev/block/mmcblk0p9 /system ext4 ro,noatime,barrier=1,data=ordered 0 0
/dev/block/mmcblk0p8 /cache ext4 rw,nosuid,nodev,noatime,errors=panic,barrier=1,
journal_async_commit,data=ordered 0 0
/dev/block/mmcblk0p12 /data ext4 rw,nosuid,nodev,noatime,barrier=1,journal_async
_commit,data=ordered,noauto_da_alloc,discard 0 0
/sys/kernel/debug /sys/kernel/debug debugfs rw,relatime 0 0
/dev/fuse /storage/sdcard0 fuse rw,nosuid,nodev,noexec,relatime,user_id=1023,gro
up_id=1023,default_permissions,allow_other 0 0
shell@android:/ $
PS: I'm researching commands that are sent by ODIN to do it work. Also implemented heimdall-based sample that send "control codes" through libusb to the device. But without any success. ( found 0x68 command that was not used in heimdall, but device responses to it ). That's why i'm looking for a way to extract device's bootloader for short arm reverse engineering :fingers-crossed:

Viewing all articles
Browse latest Browse all 3614

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>