Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

re-pack payload.bin ? #124

Open
Aarqw12 opened this issue Jun 10, 2023 · 2 comments
Open

re-pack payload.bin ? #124

Aarqw12 opened this issue Jun 10, 2023 · 2 comments

Comments

@Aarqw12
Copy link

Aarqw12 commented Jun 10, 2023

hi , I have succefully unpacked payload.bin using ./gradlew unpack payload.bin

but if I want re-pack its do nothing ! I have immediatly 'pack' sequence completed and they are no file regenerated.

*pixel 6

11:17:01.763 [main] INFO cc.cfig.droid.ota.Payload - Creating build/payload/
11:17:01.886 [main] INFO cc.cfig.droid.ota.Payload - header info dumped to build/payload/header.json
11:17:01.899 [main] INFO cc.cfig.droid.ota.Payload - manifest info dumped to build/payload/manifest.json
11:17:01.902 [main] INFO cc.cfig.droid.ota.Payload - signature info dumped to build/payload/signatures.txt
11:17:01.904 [main] INFO cc.cfig.droid.ota.Payload - There are 20 partitions [abl, bl1, bl2, bl31, boot, dtbo, gsa, ldfw, modem, pbl, product, system, system_ext, tzsw, vbmeta, vbmeta_system, vbmeta_vendor, vendor, vendor_boot, vendor_dlkm]
11:17:01.904 [main] INFO cc.cfig.droid.ota.Payload - dumping images to build/payload/
11:17:01.905 [main] INFO cc.cfig.droid.ota.Payload - [ 1/20] extracting abl.img (1 ops)
11:17:01.968 [main] INFO cc.cfig.droid.ota.Payload - [ 2/20] extracting bl1.img (1 ops)
11:17:01.970 [main] INFO cc.cfig.droid.ota.Payload - [ 3/20] extracting bl2.img (1 ops)
11:17:01.981 [main] INFO cc.cfig.droid.ota.Payload - [ 4/20] extracting bl31.img (1 ops)
11:17:01.989 [main] INFO cc.cfig.droid.ota.Payload - [ 5/20] extracting boot.img (32 ops)
11:17:03.048 [main] INFO cc.cfig.droid.ota.Payload - [ 6/20] extracting dtbo.img (8 ops)
11:17:03.106 [main] INFO cc.cfig.droid.ota.Payload - [ 7/20] extracting gsa.img (1 ops)
11:17:03.113 [main] INFO cc.cfig.droid.ota.Payload - [ 8/20] extracting ldfw.img (2 ops)
11:17:03.123 [main] INFO cc.cfig.droid.ota.Payload - [ 9/20] extracting modem.img (47 ops)
11:17:04.659 [main] INFO cc.cfig.droid.ota.Payload - [10/20] extracting pbl.img (1 ops)
11:17:04.661 [main] INFO cc.cfig.droid.ota.Payload - [11/20] extracting product.img (1388 ops)
11:17:59.500 [main] INFO cc.cfig.droid.ota.Payload - [12/20] extracting system.img (463 ops)
11:18:17.238 [main] INFO cc.cfig.droid.ota.Payload - [13/20] extracting system_ext.img (131 ops)
11:18:22.240 [main] INFO cc.cfig.droid.ota.Payload - [14/20] extracting tzsw.img (4 ops)
11:18:22.354 [main] INFO cc.cfig.droid.ota.Payload - [15/20] extracting vbmeta.img (1 ops)
11:18:22.355 [main] INFO cc.cfig.droid.ota.Payload - [16/20] extracting vbmeta_system.img (1 ops)
11:18:22.356 [main] INFO cc.cfig.droid.ota.Payload - [17/20] extracting vbmeta_vendor.img (1 ops)
11:18:22.357 [main] INFO cc.cfig.droid.ota.Payload - [18/20] extracting vendor.img (290 ops)
11:18:32.317 [main] INFO cc.cfig.droid.ota.Payload - [19/20] extracting vendor_boot.img (32 ops)
11:18:33.556 [main] INFO cc.cfig.droid.ota.Payload - [20/20] extracting vendor_dlkm.img (21 ops)
11:18:33.977 [main] WARN cfig.packable.PackableLauncher - 'unpack' sequence completed
[ada12@fedora boot_editor_v13r3]$ ./gradlew pack payload.bin
11:18:51.043 [main] WARN cfig.packable.PackableLauncher - [payload.bin] will be handled by [PayloadBinParser]
11:18:51.089 [main] WARN cfig.packable.PackableLauncher - 'pack' sequence initialized
11:18:51.094 [main] WARN cfig.packable.PackableLauncher - 'pack' sequence completed
[ada12@fedora boot_editor_v13r3]$

@cfig
Copy link
Owner

cfig commented Dec 25, 2023

repacking payload.bin is a TODO.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants