Hi. I'm surprised this conversation went this far without a single mention of my name... Considering I'm the only developer who has ever published a guide on any hardware modification which makes any piece of technology "UnBrickable".. The capitol B in UnBrickable was started to represent my line of development... Also, I see directly quoted posts in this thread without reference to my name *cough*I-wrote-TamaraAce's-entire-post*cough*... How about a mention?
I've never been to this forum before, however, I do appreciate the clarity and detail which you people put into each post and I intend on reading and posting more here. So, with that out of the way, I will now make my first post.
OMAP4430 and OMAP4460 are nearly entirely the same device. We are working with them simultaniously and practically interchangeably. While I have not yet held one of these devices, I expect the Galaxy Nexus to be a low security device as it is made by a company which prides itself on openness. Whereas the Nook Tablet is an example of a high security device with signature checking in each stage of the bootloader. I am currently tackling the Nook Tablet and searching for security holes..
I would appreciate it if anyone with a nice large set of e-balls would tackle the project I'm about to mention on the Galaxy Nexus. First things first, we need to tackle the configuration of the boot mode.
BOOT_MODE5 pin must be low to enable boot from USB first. The boot from USB mode will reveal a USBID of 0451:d00e at the beginning portion of the boot if the device is configured to boot from USB.
If the device is not configured to boot from USB, we need to find out the initial mode in which it is configured. The Viewmem tool will give us an output
You must mount your system R/W and copy this binary into /system/bin, mark the binary executable (chmod 777), then check the status of the registers.
Post the output of the following command run from a terminal on your device
Code:
echo "CONTROL_STATUS=`viewmem 0x4A0022C4 |hexdump`"
This should show a nice clean output like this:
Code:
CONTROL_STATUS=0000000 0a96 0000
The 96, decoded into binary, starting with the LSB will show the mode in which the Galaxy Nexus is configured to boot.
Next we begin the hardware hacking: [
For now, we need the CONTROL STATUS register value.
Bookmarks