Awutils

AllWinner Utils or AWUtils is a set of tools for handling Allwinner images


 * awflash - flash devices over USB
 * awimage - pack/unpack images
 * log2bin - convert filtered UsbSnoop log data to binary file

Download
Sources can be obtained from Ithmar's github repository and 'make' should work to build it. git clone git://github.com/Ithamar/awutils.git cd awutils make You might need some developer libraries for USB like libusb-dev

Usage
Usage is quite straight forward, 'awimage -v image.img'.

Output should look something like this: ./awimage: unpacking image.img to iamge.img.dump Extracting: COMMON  SYS_CONFIG000000 (6032, 6032) Extracting: COMMON  SYS_CONFIG100000 (57653, 57664) Extracting: COMMON  SPLIT_0000000000 (512, 512) Extracting: RFSFAT16 BOOTLOADER_00000 (4668416, 4668416) Extracting: RFSFAT16 ENVIROMENT_00000 (131072, 131072) Extracting: RFSFAT16 BOOT_00000000000 (8292352, 8292352) Extracting: RFSFAT16 SYSTEM_000000000 (250293504, 250293504) Extracting: RFSFAT16 RECOVERY_0000000 (8630272, 8630272) Extracting: RFSFAT16 DISKFS_000000000 (8, 16) Extracting: RFSFAT16 VBOOTLOADER_0000 (4, 16) Extracting: RFSFAT16 VENVIROMENT_0000 (4, 16) Extracting: RFSFAT16 VBOOT_0000000000 (4, 16) Extracting: RFSFAT16 VSYSTEMFS_000000 (4, 16) Extracting: RFSFAT16 VRECOVERYFS_0000 (4, 16) Extracting: BOOT    BOOT0_0000000000 (24576, 24576) Extracting: BOOT    BOOT1_0000000000 (221184, 221184) Extracting: PXTOOLS xxxxxxxxxxxxxxxx (166912, 166912) Extracting: FES     FES_1-1000000000 (692, 704) Extracting: FES     FES_1-2000000000 (3100, 3104) Extracting: FES     FES_200000000000 (1488, 1488) Extracting: FES     FES_000000000000 (80960, 80960) Extracting: FET     HW_SCAN_00000000 (113152, 113152) Extracting: FET     UPDATE_BOOT0_000 (103728, 103728) Extracting: FET     UPDATE_BOOT1_000 (108560, 108560) Extracting: FET     FET_RESTORE_0000 (4528, 4528) Extracting: FET     MAGIC_CRC_START_ (128, 128) Extracting: FET     MAGIC_CRC_EN_000 (128, 128) Extracting: FET     MAGIC_DE_START_0 (128, 128) Extracting: FET     MAGIC_DE_END_000 (128, 128) Extracting: FED     FED_NAND_0000000 (116736, 116736) Extracting: 12345678 1234567890cardtl (81920, 81920) Extracting: 12345678 1234567890script (2014, 2016) Extracting: 12345678 1234567890boot_0 (20480, 20480) Extracting: 12345678 1234567890boot_1 (131072, 131072) Extracting: 12345678 1234567890___mbr (4096, 4096) Extracting: 12345678 1234567890dlinfo (1340, 1344) Extracting: FET     CARD_UPDATE_BOT0 (21424, 21424) Extracting: FET     CARD_UPDATE_BOT1 (20352, 20352) Extracting: FED     CARD_FED_0000000 (26640, 26640) Extracting: FET     CARD_HW_SCAN_000 (19248, 19248)

You can then enter the newly created directory image.img.dump and explore.

Filelist.txt is a summary of what was found (similar to what is above).

Status
July 2014:
 * awflash - not compilable (patched version requires also pkg-config)
 * awimage - packing triggers error (bypass), unpacked-then-packed and original images are differs