Awutils

From linux-sunxi.org
Jump to navigation Jump to search

AllWinner Utils or AWUtils is an abandoned set of tools for handling Allwinner images

  • awflash - flash devices over USB
  • awimage - pack/unpack images
  • log2bin - convert filtered UsbSnoop log data to binary file

These tools were initially intended to allow for livesuit like flashing of devices, but this project was abandoned.

Download

Sources can be obtained from Ithmar's github repository and 'make' should work to build it.

git clone git://github.com/Ithamar/awutils.git
cd awutils
make

You might need some developer libraries for USB like libusb-dev

Usage

Usage is quite straight forward, 'awimage -v image.img'.

Output should look something like this:

./awimage: unpacking image.img to iamge.img.dump
Extracting: COMMON   SYS_CONFIG000000 (6032, 6032)
Extracting: COMMON   SYS_CONFIG100000 (57653, 57664)
Extracting: COMMON   SPLIT_0000000000 (512, 512)
Extracting: RFSFAT16 BOOTLOADER_00000 (4668416, 4668416)
Extracting: RFSFAT16 ENVIROMENT_00000 (131072, 131072)
Extracting: RFSFAT16 BOOT_00000000000 (8292352, 8292352)
Extracting: RFSFAT16 SYSTEM_000000000 (250293504, 250293504)
Extracting: RFSFAT16 RECOVERY_0000000 (8630272, 8630272)
Extracting: RFSFAT16 DISKFS_000000000 (8, 16)
Extracting: RFSFAT16 VBOOTLOADER_0000 (4, 16)
Extracting: RFSFAT16 VENVIROMENT_0000 (4, 16)
Extracting: RFSFAT16 VBOOT_0000000000 (4, 16)
Extracting: RFSFAT16 VSYSTEMFS_000000 (4, 16)
Extracting: RFSFAT16 VRECOVERYFS_0000 (4, 16)
Extracting: BOOT     BOOT0_0000000000 (24576, 24576)
Extracting: BOOT     BOOT1_0000000000 (221184, 221184)
Extracting: PXTOOLS  xxxxxxxxxxxxxxxx (166912, 166912)
Extracting: FES      FES_1-1000000000 (692, 704)
Extracting: FES      FES_1-2000000000 (3100, 3104)
Extracting: FES      FES_200000000000 (1488, 1488)
Extracting: FES      FES_000000000000 (80960, 80960)
Extracting: FET      HW_SCAN_00000000 (113152, 113152)
Extracting: FET      UPDATE_BOOT0_000 (103728, 103728)
Extracting: FET      UPDATE_BOOT1_000 (108560, 108560)
Extracting: FET      FET_RESTORE_0000 (4528, 4528)
Extracting: FET      MAGIC_CRC_START_ (128, 128)
Extracting: FET      MAGIC_CRC_EN_000 (128, 128)
Extracting: FET      MAGIC_DE_START_0 (128, 128)
Extracting: FET      MAGIC_DE_END_000 (128, 128)
Extracting: FED      FED_NAND_0000000 (116736, 116736)
Extracting: 12345678 1234567890cardtl (81920, 81920)
Extracting: 12345678 1234567890script (2014, 2016)
Extracting: 12345678 1234567890boot_0 (20480, 20480)
Extracting: 12345678 1234567890boot_1 (131072, 131072)
Extracting: 12345678 1234567890___mbr (4096, 4096)
Extracting: 12345678 1234567890dlinfo (1340, 1344)
Extracting: FET      CARD_UPDATE_BOT0 (21424, 21424)
Extracting: FET      CARD_UPDATE_BOT1 (20352, 20352)
Extracting: FED      CARD_FED_0000000 (26640, 26640)
Extracting: FET      CARD_HW_SCAN_000 (19248, 19248)

You can then enter the newly created directory image.img.dump and explore.

Filelist.txt is a summary of what was found (similar to what is above).

Status

July 2014:

  • awflash - not compilable (patched version requires also pkg-config)
  • awimage - packing triggers error (bypass), unpacked-then-packed and original images are differs