andriod驱动之旅-解压img文件

1 下载链接:下载工具204版本
http://forum.xda-developers.com/showthread.php?p=28329544




2 打开win--cmd窗口,将imgRePacker.exe拖进去输入如下:
C:\Users\Administrator>E:\save-ygm\imgRePacker\imgRePacker\imgRePacker.exe -help




        imgRePacker (version 2.04 windows)
        LiveSuit's & PhoenixSuit's firmware image unpacker/packer


        (c) RedScorpio, Moscow, 2012-2013
            RedScorpio@land.ru


        Usage:  imgRePacker.exe [options] <file_name>


                imgRePacker.exe [options] <name>.img            - for unpacking
                imgRePacker.exe [options] <name>.img.dump       - for packing


        Options:
                /log    - write log
                /debug  - debug mode on (works with /log option)
                /quiet  - don't output to console
                /old    - use modified old method mode (1.xx win)
                /noiso  - don't save/load disk image (iso)
                /unimg  - unimg compatibility mode
                /8600   - pack fw for old SC8600
                /smt    - zdisk.img packed by SMT (unpack option)
                /latin  - replace non-latin symbols in path (unpack option)
                /skip   - skip image size check (unpack option)
                /mono   - monochrome mode on
                /ini    - rewrite *.ini-file with new parameters


        Thanks:
                esxgx for his research
                losber for testing


输入
C:\Users\Administrator>E:\save-ygm\imgRePacker\imgRePacker\imgRePacker.exe /noiso 
/unimg E:\save-ygm\imgRePacker\*****adb.img


        imgRePacker (version 2.04 windows)
        LiveSuit's & PhoenixSuit's firmware image unpacker/packer


        (c) RedScorpio, Moscow, 2012-2013
            RedScorpio@land.ru


        ==========================[ START ]==========================


        --- Firmware unpacking ---
        Modified old method
        PhoenixSuit image format detected


        - Headers extracting (unimg mode) -
        base.hdr                        extracted
        "COMMON  _SYS_CONFIG100000.hdr" extracted
        "COMMON  _SYS_CONFIG000000.hdr" extracted
        "COMMON  _SPLIT_0000000000.hdr" extracted
        "RFSFAT16_DISKFS_000000000.hdr" extracted
        "BOOT    _BOOT0_0000000000.hdr" extracted
        "12345678_1234567890BOOT_0.hdr" extracted
        "12345678_UBOOT_0000000000.hdr" extracted
        "12345678_1234567890BOOT_1.hdr" extracted
        "UPFLYTLS_XXXXXXXXXXXXXXXX.hdr" extracted
        "UPFLTL32_XXXXXXXXXXXXXXXX.hdr" extracted
        "PXTOOLSB_XXXXXXXXXXXXXXXX.hdr" extracted
        "FES     _FES_1-1000000000.hdr" extracted
        "FES     _FES_1-2000000000.hdr" extracted
        "FES     _FES_200000000000.hdr" extracted
        "FES     _FES_000000000000.hdr" extracted
        "FET     _HW_SCAN_00000000.hdr" extracted
        "FET     _UPDATE_BOOT0_000.hdr" extracted
        "FET     _UPDATE_BOOT1_000.hdr" extracted
        "FET     _FET_RESTORE_0000.hdr" extracted
        "FET     _MAGIC_CRC_START_.hdr" extracted
        "FET     _MAGIC_CRC_EN_000.hdr" extracted
        "FET     _MAGIC_DE_START_0.hdr" extracted
        "FET     _MAGIC_DE_END_000.hdr" extracted
        "FED     _FED_NAND_0000000.hdr" extracted
        "12345678_1234567890CARDTL.hdr" extracted
        "12345678_1234567890SCRIPT.hdr" extracted
        "12345678_1234567890___MBR.hdr" extracted
        "12345678_1234567890DLINFO.hdr" extracted
        "FET     _CARD_UPDATE_BOT0.hdr" extracted
        "FET     _CARD_UPDATE_BOT1.hdr" extracted
        "FED     _CARD_FED_0000000.hdr" extracted
        "FET     _CARD_HW_SCAN_000.hdr" extracted
        "RFSFAT16_BOOTLOADER_FEX00.hdr" extracted
        "RFSFAT16_VBOOTLOADER_FEX0.hdr" extracted
        "RFSFAT16_ENV_FEX000000000.hdr" extracted
        "RFSFAT16_VENV_FEX00000000.hdr" extracted
        "RFSFAT16_BOOT_FEX00000000.hdr" extracted
        "RFSFAT16_VBOOT_FEX0000000.hdr" extracted
        "RFSFAT16_SYSTEM_FEX000000.hdr" extracted
        "RFSFAT16_VSYSTEM_FEX00000.hdr" extracted
        "RFSFAT16_RECOVERY_FEX0000.hdr" extracted
        "RFSFAT16_VRECOVERY_FEX000.hdr" extracted
        "RFSFAT16_DISKFS_FEX000000.hdr" extracted




        - image.cfg creating -
        image.cfg created
        Img size: Expected = 368819712, Real = 368820224


        - Files extracting -
        "\sys_config.fex"               extracted
                "COMMON  _SYS_CONFIG100000"     extracted (unimg mode)
        "\sys_partition.fex"            extracted
                "COMMON  _SYS_CONFIG000000"     extracted (unimg mode)
        "\split_xxxx.fex"               extracted
                "COMMON  _SPLIT_0000000000"     extracted (unimg mode)
        "\diskfs.fex"           extracted
                "RFSFAT16_DISKFS_000000000"     extracted (unimg mode)
        "\boot0_nand.bin"               decrypted
                "BOOT    _BOOT0_0000000000"     extracted (unimg mode)
        "\boot0_sdcard.fex"             extracted
                "12345678_1234567890BOOT_0"     extracted (unimg mode)
        "\boot1_nand.fex"               extracted
                "12345678_UBOOT_0000000000"     extracted (unimg mode)
        "\boot1_sdcard.fex"             extracted
                "12345678_1234567890BOOT_1"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\aultools.fex"                extracted
                "UPFLYTLS_XXXXXXXXXXXXXXXX"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\aultls32.fex"                extracted
                "UPFLTL32_XXXXXXXXXXXXXXXX"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\toolsb.fex"          extracted
                "PXTOOLSB_XXXXXXXXXXXXXXXX"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\fes_1-1.fex"         extracted
                "FES     _FES_1-1000000000"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\fes_1-2.fex"         extracted
                "FES     _FES_1-2000000000"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\fes_2.fex"           extracted
                "FES     _FES_200000000000"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\fes.fex"             extracted
                "FES     _FES_000000000000"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\hw_scan.axf"         decrypted
                "FET     _HW_SCAN_00000000"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\update_boot0.axf"            decrypted
                "FET     _UPDATE_BOOT0_000"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\update_boot1.axf"            decrypted
                "FET     _UPDATE_BOOT1_000"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\fet_restore.axf"             decrypted
                "FET     _FET_RESTORE_0000"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\magic_cr_start.fex"          extracted
                "FET     _MAGIC_CRC_START_"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\magic_cr_end.fex"            extracted
                "FET     _MAGIC_CRC_EN_000"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\magic_de_start.fex"          extracted
                "FET     _MAGIC_DE_START_0"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\magic_de_end.fex"            extracted
                "FET     _MAGIC_DE_END_000"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\fed_nand.axf"                decrypted
                "FED     _FED_NAND_0000000"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\c
ard\cardtool.fex"               extracted
                "12345678_1234567890CARDTL"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\c
ard\cardscript.fex"             extracted
                "12345678_1234567890SCRIPT"     extracted (unimg mode)
        "\sunxi_mbr.fex"                extracted
                "12345678_1234567890___MBR"     extracted (unimg mode)
        "\dlinfo.fex"           extracted
                "12345678_1234567890DLINFO"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\card_update_boot0.axf"               decrypted
                "FET     _CARD_UPDATE_BOT0"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\card_update_boot1.axf"               decrypted
                "FET     _CARD_UPDATE_BOT1"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\fed_card.axf"                decrypted
                "FED     _CARD_FED_0000000"     extracted (unimg mode)
        "\media\develop1\dengzhengui\workspace\A31S_4.2\lichee\tools\pack\eFex\u
sb\card_HW_scan.axf"            decrypted
                "FET     _CARD_HW_SCAN_000"     extracted (unimg mode)
        "\bootloader.fex"               extracted
                "RFSFAT16_BOOTLOADER_FEX00"     extracted (unimg mode)
        "\Vbootloader.fex"              extracted
                "RFSFAT16_VBOOTLOADER_FEX0"     extracted (unimg mode)
        "\env.fex"              extracted
                "RFSFAT16_ENV_FEX000000000"     extracted (unimg mode)
        "\Venv.fex"             extracted
                "RFSFAT16_VENV_FEX00000000"     extracted (unimg mode)
        "\boot.fex"             extracted
                "RFSFAT16_BOOT_FEX00000000"     extracted (unimg mode)
        "\Vboot.fex"            extracted
                "RFSFAT16_VBOOT_FEX0000000"     extracted (unimg mode)
        "\system.fex"           extracted
                "RFSFAT16_SYSTEM_FEX000000"     extracted (unimg mode)
        "\Vsystem.fex"          extracted
                "RFSFAT16_VSYSTEM_FEX00000"     extracted (unimg mode)
        "\recovery.fex"         extracted
                "RFSFAT16_RECOVERY_FEX0000"     extracted (unimg mode)
        "\Vrecovery.fex"                extracted
                "RFSFAT16_VRECOVERY_FEX000"     extracted (unimg mode)
        "\diskfs.fex"           extracted
                "RFSFAT16_DISKFS_FEX000000"     extracted (unimg mode)


        - Filelist.txt creating -
        Filelist.txt created


        ==========================[ STOP  ]==========================


C:\Users\Administrator>
C:\Users\Administrator>




3 将生成的system.fex改后缀名为system.img
参考:http://blog.csdn.net/sjz_iron/article/details/8246029
data类型
        如前所述,本人所使用的平台为Android 4.0的版本,编译得到的system.img为data类型(即Linux中的ext4文件系统),其压缩与解压缩使用的工具为分别为make_ext4fs和simg2img,它们都是android自带的工具,在android编译后的out/host/linux-x86/bin目录中可找到。
        system.img的解压缩过程如下:
(1) 分别将需要解压的system.img与simg2img复制到test目录(目录任选);
(2) 执行命令simg2img进行解压:./simg2img system.img system.img.ext4;
可能出现错误:header error 
解决办法:用64bit编译android源码后再用工具

(3) 创建目录tmp用来挂载system.img.ext4;

(4) 将system.img.ext4挂载至tmp目录:mount -t ext4 -o loop system.img.ext4 tmp/


4生成img文件

mkyaffs2image system syetem.img






















评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

ygmdream

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值