doc: add guide on working with system.img

pull/94/head
cfig 3 years ago
parent 2d7e164da5
commit cc2399df0b
No known key found for this signature in database
GPG Key ID: B104C307F0FDABB7

@ -10,7 +10,7 @@ A tool for reverse engineering Android ROM images.
Linux: `sudo apt install git device-tree-compiler lz4 xz-utils zlib1g-dev openjdk-11-jdk gcc g++ python3 python-is-python3`
Mac: `brew install lz4 xz dtc`
Mac: `brew install lz4 xz dtc`
Mac: Make sure you have `JDK9+` properly installed.
@ -161,6 +161,17 @@ Please note that to use 'gradle flash', your host machine must be connectted to
</details>
<details>
<summary>working with system.img</summary>
First enable **hacking mode** by setting `bHackingMode = true` in file `build.gradle.kts`, then
```bash
cp <your_system_image> system.img
./gradlew unpack
```
You get `system.img.unsparse`, that's a plain ext4 filesystem data.
</details>
<details>
<summary>How to disable AVB verification</summary>

Loading…
Cancel
Save