Awutils
Jump to navigation
Jump to search
AllWinner Utils or AWUtils is an abandoned set of tools for handling Allwinner images
- awflash - flash devices over USB
- awimage - pack/unpack images
- log2bin - convert filtered UsbSnoop log data to binary file
These tools were initially intended to allow for livesuit like flashing of devices, but this project was abandoned.
Download
Sources can be obtained from Ithmar's github repository and 'make' should work to build it.
git clone git://github.com/Ithamar/awutils.git cd awutils make
You might need some developer libraries for USB like libusb-dev
Usage
Usage is quite straight forward, 'awimage -v image.img'.
Output should look something like this:
./awimage: unpacking image.img to iamge.img.dump Extracting: COMMON SYS_CONFIG000000 (6032, 6032) Extracting: COMMON SYS_CONFIG100000 (57653, 57664) Extracting: COMMON SPLIT_0000000000 (512, 512) Extracting: RFSFAT16 BOOTLOADER_00000 (4668416, 4668416) Extracting: RFSFAT16 ENVIROMENT_00000 (131072, 131072) Extracting: RFSFAT16 BOOT_00000000000 (8292352, 8292352) Extracting: RFSFAT16 SYSTEM_000000000 (250293504, 250293504) Extracting: RFSFAT16 RECOVERY_0000000 (8630272, 8630272) Extracting: RFSFAT16 DISKFS_000000000 (8, 16) Extracting: RFSFAT16 VBOOTLOADER_0000 (4, 16) Extracting: RFSFAT16 VENVIROMENT_0000 (4, 16) Extracting: RFSFAT16 VBOOT_0000000000 (4, 16) Extracting: RFSFAT16 VSYSTEMFS_000000 (4, 16) Extracting: RFSFAT16 VRECOVERYFS_0000 (4, 16) Extracting: BOOT BOOT0_0000000000 (24576, 24576) Extracting: BOOT BOOT1_0000000000 (221184, 221184) Extracting: PXTOOLS xxxxxxxxxxxxxxxx (166912, 166912) Extracting: FES FES_1-1000000000 (692, 704) Extracting: FES FES_1-2000000000 (3100, 3104) Extracting: FES FES_200000000000 (1488, 1488) Extracting: FES FES_000000000000 (80960, 80960) Extracting: FET HW_SCAN_00000000 (113152, 113152) Extracting: FET UPDATE_BOOT0_000 (103728, 103728) Extracting: FET UPDATE_BOOT1_000 (108560, 108560) Extracting: FET FET_RESTORE_0000 (4528, 4528) Extracting: FET MAGIC_CRC_START_ (128, 128) Extracting: FET MAGIC_CRC_EN_000 (128, 128) Extracting: FET MAGIC_DE_START_0 (128, 128) Extracting: FET MAGIC_DE_END_000 (128, 128) Extracting: FED FED_NAND_0000000 (116736, 116736) Extracting: 12345678 1234567890cardtl (81920, 81920) Extracting: 12345678 1234567890script (2014, 2016) Extracting: 12345678 1234567890boot_0 (20480, 20480) Extracting: 12345678 1234567890boot_1 (131072, 131072) Extracting: 12345678 1234567890___mbr (4096, 4096) Extracting: 12345678 1234567890dlinfo (1340, 1344) Extracting: FET CARD_UPDATE_BOT0 (21424, 21424) Extracting: FET CARD_UPDATE_BOT1 (20352, 20352) Extracting: FED CARD_FED_0000000 (26640, 26640) Extracting: FET CARD_HW_SCAN_000 (19248, 19248)
You can then enter the newly created directory image.img.dump and explore.
Filelist.txt is a summary of what was found (similar to what is above).
Status
July 2014:
- awflash - not compilable (patched version requires also pkg-config)
- awimage - packing triggers error (bypass), unpacked-then-packed and original images are differs