Quote:
Originally Posted by jgray
Earlier tonight I installed Ubuntu in VirtualBox, as I don't currently have a Linux system running. I downloaded the current Jetbook firmware with the goal of seeing if anything could be modified or fonts added.
There are several files contained in the firmware Zip file. You are supposed to copy the contents of the archive to an SD card, insert into the Jetbook and then invoke the magic keypresses.
I'm certainly no Linux guru, but I did learn a little about what's going on with Jetbook firmware flashing. Files containing a boot loader, kernel and root filesystem are on the SD card. These files are used to boot the Jetbook prior to installing the new firmware image.
Before getting to the actual firmware, here are some interesting things from the root filesystem image used for flashing. Busybox is used (no surprise). The binary executables are "ELF 32-bit LSB executable, ARM, version 1, dynamically linked". It seems that the "uClibc" library is used. There is a shell running on "ttySMX0", which I understand is a serial port built in to the ARM chip (I'm not yet ready to disassemble my Jetbook to look for a connector).
All of this is very interesting and I thought if I could mount the actual firmware image, I might be able to do something with it. At this point, I am unable to proceed. The firmware image file is encrypted with AES. There is a shell script that calls a binary "aespipe", which decrypts the firmware image before flashing it.
Perhaps if I can modify the shell script so that it saves an unencrypted firmware image on the SD card, I might be able to continue. I'm currently on the ragged edge of my Linux skills with this, so it will take some head scratching. If any gurus care to pitch in, I would be happy to have the assistance.
|
sounds pretty cool, if i was literate in any of the above lingo i would comment lol
so what can you add to the jetBook if you're able to manipulate the codes?