This file has been truncated, but you can view the full file.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Connected to target 169.254.50.21 on port 50000 on local IP 169.254.3.7. | |
You can get the target MAC address by running .kdtargetmac command. | |
Connected to Windows 10 21390 ARM 64-bit (AArch64) target at (Wed Nov 27 17:57:49.731 2024 (UTC + 2:00)), ptr64 TRUE | |
Kernel Debugger connection established. (Initial Breakpoint requested) | |
************* Path validation summary ************** | |
Response Time (ms) Location | |
OK C:\symbols | |
Deferred SRV*C:\symbols*https://msdl.microsoft.com/download/symbols |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
""" | |
Assemble ELF segments into a single mbn file. | |
Usage: pil-squasher.py <mbn output> <mdt header> | |
This script reads an ELF header and program headers from the specified mdt | |
file and combines the corresponding segments from .bXX files or the mdt file | |
itself into a single mbn file. |