Jump to content

Nick A

Members
  • Posts

    504
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. @PH Ph Ask Google AI mode... I haven't played with 4G CPE routers.
  2. @PH Ph You didn't tell us which image you used? Your dts shows axp1530. Which is also known as axp313a. https://linux-sunxi.org/AXP_PMICs pmu { compatible = "x-powers,axp1530";
  3. @PH Ph Recovery is your boot.bin nick@nick:~/Documents$ file recovery recovery: Android bootimg, kernel (0x40080000), ramdisk (0x43000000), page size: 2048, cmdline (selinux=1 androidboot.selinux=permissive androidboot.dtbo_idx=0,1,2 buildvariant=userdebug) nick@nick:~/Documents$ cp ~/Documents/recovery ~/Documents/Android_boot_image_editor/boot.img nick@nick:~/Documents$ cd ~/Documents/Android_boot_image_editor/ nick@nick:~/Documents/Android_boot_image_editor$ ./gradlew unpack Starting a Gradle Daemon (subsequent builds will be faster) > Task :unpack 18:58:16.027 [main] INFO cfig.packable.PackableLauncher - [^boot(-debug)?\.img$, ^recovery\.img$, ^recovery-two-step\.img$, ^init_boot\.img$, ^ramdisk\.img$]/class cfig.packable.BootImgParser 18:58:16.030 [main] INFO cfig.packable.PackableLauncher - [^.*\.dtb$]/class packable.DeviceTreeParser 18:58:16.030 [main] INFO cfig.packable.PackableLauncher - [^dtbo\.img$]/class cfig.packable.DtboParser 18:58:16.030 [main] INFO cfig.packable.PackableLauncher - [^misc\.img$]/class cfig.packable.MiscImgParser 18:58:16.030 [main] INFO cfig.packable.PackableLauncher - [^ota\.zip$]/class cfig.packable.OTAzipParser 18:58:16.030 [main] INFO cfig.packable.PackableLauncher - [^payload\.bin$]/class cfig.packable.PayloadBinParser 18:58:16.030 [main] INFO cfig.packable.PackableLauncher - [^(system|system_ext|system_other|system_dlkm)\.img$, ^(vendor|vendor_dlkm|product|cache|userdata|super|oem|odm|odm_dlkm)\.img$]/class rom.sparse.SparseImgParser 18:58:16.030 [main] INFO cfig.packable.PackableLauncher - [^vbmeta\.img$, ^vbmeta\_[a-z]+.img$]/class cfig.packable.VBMetaParser 18:58:16.030 [main] INFO cfig.packable.PackableLauncher - [^vendor_boot(-debug)?\.img$, ^vendor_kernel_boot\.img$]/class cfig.packable.VendorBootParser 18:58:16.030 [main] INFO XXXX - args: [unpack] 18:58:16.033 [main] INFO XXXX - arg: #0 - unpack 18:58:16.035 [main] INFO XXXX - loop #0 18:58:16.035 [main] INFO XXXX - lazy mode (in current dir) 18:58:16.205 [main] INFO cfig.packable.PackableLauncher - Found: boot.img, ^boot(-debug)?\.img$ 18:58:16.206 [main] WARN cfig.packable.PackableLauncher - args: 1, targetHandler: class cfig.packable.BootImgParser 18:58:16.206 [main] INFO cfig.packable.PackableLauncher - continue ... 18:58:16.206 [main] WARN cfig.packable.PackableLauncher - [/home/nick/Documents/Android_boot_image_editor/boot.img] will be handled by [BootImgParser] 18:58:16.274 [main] WARN cfig.packable.PackableLauncher - 'unpack' sequence initialized 18:58:16.274 [main] WARN cfig.packable.PackableLauncher - XXXX: args.size: 1 clazz = BootImgParser func = fun cfig.packable.BootImgParser.unpack(kotlin.String): kotlin.Unit orig args: 0: unpack Converted args: 0: /home/nick/Documents/Android_boot_image_editor/boot.img 18:58:16.281 [main] INFO cfig.packable.BootImgParser - unpackInternal(fileName: /home/nick/Documents/Android_boot_image_editor/boot.img, unpackDir: build/unzip_boot/) 18:58:16.282 [main] INFO cfig.packable.BootImgParser - workspace set to build/unzip_boot/ 18:58:16.282 [main] INFO cfig.packable.IPackable - deleting /home/nick/Documents/Android_boot_image_editor/build/unzip_boot ... 18:58:16.298 [main] INFO cfig.bootimg.Common - workspace file overridden: /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/workspace.ini 18:58:16.299 [main] INFO cfig.packable.BootImgParser - header version 2 18:58:16.408 [main] WARN cfig.bootimg.v2.BootHeaderV2 - BootImgHeader constructor 18:58:16.414 [main] INFO cfig.Avb - python aosp/avb/avbtool.v1.2.py verify_image --image /home/nick/Documents/Android_boot_image_editor/boot.img Verifying image /home/nick/Documents/Android_boot_image_editor/boot.img using embedded public key vbmeta: Successfully verified footer and NONE vbmeta struct in /home/nick/Documents/Android_boot_image_editor/boot.img Traceback (most recent call last): File "/home/nick/Documents/Android_boot_image_editor/aosp/avb/avbtool.v1.2.py", line 4935, in <module> tool.run(sys.argv) File "/home/nick/Documents/Android_boot_image_editor/aosp/avb/avbtool.v1.2.py", line 4739, in run args.func(args) File "/home/nick/Documents/Android_boot_image_editor/aosp/avb/avbtool.v1.2.py", line 4874, in verify_image self.avb.verify_image(args.image.name, args.key, File "/home/nick/Documents/Android_boot_image_editor/aosp/avb/avbtool.v1.2.py", line 2582, in verify_image elif not desc.verify(image_dir, image_ext, expected_chain_partitions_map, ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/home/nick/Documents/Android_boot_image_editor/aosp/avb/avbtool.v1.2.py", line 1687, in verify image = ImageHandler(image_filename, read_only=True) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/home/nick/Documents/Android_boot_image_editor/aosp/avb/avbtool.v1.2.py", line 760, in __init__ self._read_header() File "/home/nick/Documents/Android_boot_image_editor/aosp/avb/avbtool.v1.2.py", line 775, in _read_header self._image = open(self.filename, 'rb') ^^^^^^^^^^^^^^^^^^^^^^^^^ FileNotFoundError: [Errno 2] No such file or directory: '/home/nick/Documents/Android_boot_image_editor/recovery.img' 18:58:16.563 [main] ERROR cfig.Avb - /home/nick/Documents/Android_boot_image_editor/boot.img failed integrity check by "python aosp/avb/avbtool.v1.2.py verify_image --image /home/nick/Documents/Android_boot_image_editor/boot.img" 18:58:16.633 [main] WARN cfig.bootimg.Common - s.srcFile: boot.img, s.dumpFile: /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/kernel, s.offset: 2048, s.length: 18651144 18:58:16.701 [main] INFO KernelExtractor - [aosp/make/tools/extract_kernel.py, --input, /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/kernel, --output-configs, /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/kernel_configs.txt, --output-version, /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/kernel_version.txt] 18:58:16.703 [main] INFO KernelExtractor - kernel version: [4.9.170] 18:58:16.703 [main] INFO KernelExtractor - kernel config dumped to : /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/kernel_configs.txt 18:58:16.799 [main] INFO ZipHelper - decompress(gz) done: /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/ramdisk.img.gz -> /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/ramdisk.img 18:58:16.801 [main] INFO cfig.bootimg.cpio.AndroidCpio - Cleaning /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/root ... 18:58:16.829 [main] WARN cfig.bootimg.cpio.AndroidCpio - root/config has improper file mode 555, fix it 18:58:17.154 [main] INFO cfig.bootimg.cpio.AndroidCpio - cpio trailer found, mode=000001ed 18:58:17.155 [main] INFO cfig.bootimg.Common - ramdisk extracted : /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/ramdisk.img -> /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/root 18:58:17.173 [main] INFO rom.fdt.DTC - Found FDT header: #0 FdtHeader(magic=3490578157, totalsize=119955, offDtStruct=72, offDtStrings=106948, offMemRsvmap=40, version=17, lastCompVersion=16, bootCpuidPhys=0, sizeDtStrings=13007, sizeDtStruct=106876) 18:58:17.174 [main] INFO rom.fdt.DTC - no more FDT header 18:58:17.175 [main] INFO rom.fdt.DTC - Successfully parsed 1 FDT headers from /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/dtb 18:58:17.175 [main] INFO cfig.bootimg.v2.BootV2 - dtb sz = 1 18:58:17.178 [main] INFO rom.fdt.DTC - parsing DTB: /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/dtb.0 18:58:17.185 [main] INFO rom.fdt.DTC - [dtc, -q, -I, dtb, -O, dts, /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/dtb.0, -o, /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/dtb.0.dts] 18:58:17.198 [main] INFO rom.fdt.DTC - [dtc, -q, -I, dts, -O, yaml, /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/dtb.0.dts, -o, /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/dtb.0.dts.yaml] 18:58:17.200 [main] INFO avb.AVBInfo - parseFrom(FILE:boot.img) ... 18:58:17.207 [main] INFO avb.AVBInfo - FILE:boot.img: Glance(footer=Footer(versionMajor=1, versionMinor=0, originalImageSize=25913344, vbMetaOffset=25915392, vbMetaSize=512), vbMetaOffset=25915392).footer 18:58:17.239 [main] INFO avb.AVBInfo - VBMeta: boot.img -> /home/nick/Documents/Android_boot_image_editor/build/unzip_boot/boot.avb.json 18:58:17.289 [main] INFO cfig.Avb - vbmeta blob is unsigned 18:58:17.329 [main] INFO cfig.bootimg.v2.BootV2 - Unpack Summary of boot.img ┌───────────────────────────────────────┬──────────────────────────────────────┐ │What │Where │ └───────────────────────────────────────┴──────────────────────────────────────┘ ┌───────────────────────────────────────┬──────────────────────────────────────┐ │image info │build/unzip_boot/boot.json │ ├───────────────────────────────────────┼──────────────────────────────────────┤ │AVB info [verify fail] │build/unzip_boot/boot.avb.json │ ├───────────────────────────────────────┼──────────────────────────────────────┤ │kernel │build/unzip_boot/kernel │ │\-- version [4.9.170] │build/unzip_boot/kernel_version.txt │ │\-- config │build/unzip_boot/kernel_configs.txt │ ├───────────────────────────────────────┼──────────────────────────────────────┤ │ramdisk │build/unzip_boot/ramdisk.img.gz │ │\-- extracted ramdisk rootfs │build/unzip_boot/root │ ├───────────────────────────────────────┼──────────────────────────────────────┤ │dtb │build/unzip_boot/dtb │ │\-- decompiled dts [1] │build/unzip_boot/dtb.*.dts │ └───────────────────────────────────────┴──────────────────────────────────────┘ 18:58:17.349 [main] WARN cfig.packable.PackableLauncher - 'unpack' sequence completed BUILD SUCCESSFUL in 8s 8 actionable tasks: 1 executed, 7 up-to-date dtb.0.dts
  4. @PH Ph Can I have your recovery and super?
  5. @PH Ph bootloader -> /dev/block/mmcblk0p1 Maybe this is the boot.bin we are looking for? Try extracting it with Android_boot_image_editor.
  6. @Pop AlexI haven't spent a lot of time on GPU acceleration but I know there's a member here who has worked on it. He's using Radxa's GPU drivers. https://github.com/radxa-pkg/aw-drivers-dkms/ https://github.com/chainsx/build/commit/a0527bd977bbe55b13c1f46ec46d0aab4369c798 fengRadxa Engineer "Allwinner has feedback that the browser hardware decoding support is still under development. You can first use GStreamer to play video files encoded in H264, H265, VP9, or AVS formats as a test." https://forum.radxa.com/t/hardware-decoding-for-video-not-enabled-on-a7a/29836/9 There's a new Tina V1.4.8 SDK. In the directory "debian/packages/arm64/chromium" you will find "chromium-browser-gst_120.0.6099.224-5_arm64.deb". Not sure if this is an updated verison of chromium? https://mega.nz/file/sqRG1RaC#TpVwOuZSOoRaSfLDLF60Y0qHAVaViFTMPuZKFQw6m8c.
  7. @Sarang He Try these images https://github.com/NickAlilovic/build/releases/tag/20250306
  8. @伍翠波 Framebuffer console should work now. https://github.com/NickAlilovic/build/releases/tag/Radxa-a7a-v0.4
  9. @PH Ph there is graphics acceleration but not on chromium. If you can still boot android then you can extract your dts. Not sure what's wrong with PhoenixCard. I rarely use it. That's mostly for Android images.
  10. @PH Ph You need to find the correct GPIO# for your emmc. Extract the boot.bin from your original Android to get the device tree (DTS). Follow the steps in this link. https://forum.armbian.com/topic/29794-how-to-install-armbian-in-h618/#findComment-187672
  11. @Mohammad Adel You need a image with a AXP313a (Power Management IC). Try these images. Armbian-unofficial_25.05.0-trunk_Tanix-tx6s-axp313_bookworm_edge_6.12.11_xfce_desktop.img.xz Armbian-unofficial_25.05.0-trunk_Transpeed-8k618-t_bookworm_edge_6.12.11_xfce_desktop.img.xz Armbian-unofficial_25.05.0-trunk_Vontar-h618_bookworm_edge_6.12.11_xfce_desktop.img.xz Armbian-unofficial_25.05.0-trunk_X98h_bookworm_edge_6.12.11_xfce_desktop.img.xz If it still doesn't boot. You might have secure boot enabled. You can try to compile this image. It includes secure boot. https://github.com/NickAlilovic/build/tree/mainline If it's still not working. Then it might be your Dram Settings. You should install a Usb to serial device on your UART. So we can see your debug messages.
  12. @Mohammad Adel here are some links that will help you. Find your Dram settings https://forum.armbian.com/topic/29794-how-to-install-armbian-in-h618/#findComment-218660 Find boot.bin and extract dts. https://forum.armbian.com/topic/29794-how-to-install-armbian-in-h618/#findComment-187672
  13. Maybe this will work https://xdaforums.com/t/how-to-use-otg-in-twrp.3097688/
  14. You’re more than welcome to clone my repository and fix the frame buffer console. All the sources are there except u-boot.
  15. @Maxim Shell it’s possible to boot using USB OTG. You’ll need the latest u-boot. You can use my mainline build. Not sure if your stick has secure boot enabled. You can remove the secure boot patches if you don't need it. https://github.com/NickAlilovic/build/tree/mainline/patch/u-boot/u-boot-mainline git clone https://github.com/NickAlilovic/build.git --branch mainline cd build ./compile.sh build BOARD=transpeed-8k618-t BRANCH=edge BUILD_DESKTOP=yes BUILD_MINIMAL=no DESKTOP_APPGROUPS_SELECTED=browsers DESKTOP_ENVIRONMENT=xfce DESKTOP_ENVIRONMENT_CONFIG_NAME=config_base EXTRAWIFI=no KERNEL_BTF=no KERNEL_CONFIGURE=no RELEASE=bookworm https://linux-sunxi.org/FEL/USBBoot#Mainline_U-Boot_.28v2015.04_and_newer_versions.29 build/cache/sources/u-boot-worktree/u-boot/v2025.10/spl/u-boot-spl.bin You can mount the compiled image to get the other files. sun50i-h618-transpeed-8k618-t.dtb uImage boot.scr I haven't done this before. Let us know how it works out for you.
×
×
  • Create New...

Important Information

Terms of Use - Privacy Policy - Guidelines