OESF Portal | OESF Forum | OESF Wiki | LinuxPDA | #planetgemini chat on matrix.org | #gemini-pda chat on Freenode | #zaurus and #alarmz chat on Freenode | ELSI (coming soon) | Ibiblio


Welcome Guest ( Log In | Register )

> Archospma-430 Bootflash-signature Check' Removed!, ho ho ho
post Jan 4 2006, 01:31 PM
Post #1

Group: Members
Posts: 388
Joined: 7-December 03
Member No.: 1,058

If you like our work - please consider donating on http://www.pdaxrom.org

Here is the Archos PMA 400/430 flash hack which is avoid the bootloader checksum.

Unlike the Zaurus, the Archos bootloader checks the aimage.img for correct signature. Because it stops people for custom building aimage.img, i hacked flash bootloader for disable signature checkin.

Heres manual:

1) Download http://mail.pdaxrom.org/archos.ru/experime...ack-0.1.tar.bz2
2) Unpack it on PC
3) Check you bootrom to see if its compatible with the bootloader hack need the same flash images by following the next steps
4) Connect PMA to PC
5) From phys directory on the PC copy files phys_m.o, xxx1 to PMA
6) Disconnect PMA from PC
7) Run console on PMA
8) Go in directory where files, probably it will /media :
cd /media

9) Load kernel module phys_m.o:
insmod ./phys_m.o

10) Run xxx1 for get your flash rom:

11) Check md5sum for the flash image and cut some from flash smile.gif :
cd /tmp
dd if=bios.rom of=bios.rom.part bs=1 count=128000
md5sum bios.rom.part

The checksum must be
f67a0f5d320be1b0dc8bfa602ca6cdac  bios.rom.part

12) If your md5sum is different, stop here - you cannot use this hack sad.gif gzip rom file and send it me smile.gif
13) If md5sum OK, connect PMA to PC again
14) Copy file flash_m.o to PMA
15) Disconnect PMA
16) Run console on PMA and go to directory where file is placed
17) Load module:
insmod ./flash_m.o

18) Ohh, there error! hehe , dont worry. It is ok - we just run flash patcher in kernel space and then come back.
19) Run dmesg:

20) There must be messages "Sector 0xD patched!" and "Sector 0xE patched!"
21) DONE!!! Now your PMA wil able run aimage.img with any signature smile.gif

if you got message "Unknown flash chip!", that mean your device uses M29W400BB flash. Go to step 14 and use flash-m29_m.o file for hack your device smile.gif

There russian version PMA-430 system, with custom aimage.img :

If you like our work - please consider donating on http://www.pdaxrom.org
Go to the top of the page
+Quote Post
Start new topic
post Jan 5 2006, 02:42 AM
Post #2

Group: Members
Posts: 388
Joined: 7-December 03
Member No.: 1,058

Fast guide how build custom aimage)

in flash-hack archive ( http://mail.pdaxrom.org/archos.ru/experime...ack-0.1.tar.bz2 ) look aimage directory.
There 2 utils: extract and build.

extract will write cramfs image and kernel image from exists aimage.img:

./extract aimage.img

when it will finish you get 2 files: rootfs.bin and zImage

for unpack cramfs you must use cramfs stuff with XIP feature (sticky files is uncompressed), for example this: http://mail.pdaxrom.org/archos.ru/experime...-archos.tar.bz2

cramfsck -x root rootfs.bin

all files from archos system will in directory root. Now you can hack it and add your own features in system:) for roll new cramfs image use mkcramfs utility:

mkcramfs root rootfs.bin

New rootfs.bin will created.

cramfs image must be ~21MB - need better understand aimage header smile.gif

For build aimage.img use build utility. Copy aimage.hdr in directory where your zImage and rootfs.bin and run build:


that will create new aimage.img
Go to the top of the page
+Quote Post

Posts in this topic

Reply to this topicStart new topic
1 User(s) are reading this topic (1 Guests and 0 Anonymous Users)
0 Members:


RSS Lo-Fi Version Time is now: 23rd February 2018 - 06:57 AM