Those two files with same file properties:
Code:
root@gpl-vm:/GPL/PX-1531/PX-1532# file 220.img
220.img: HIT archive data
root@gpl-vm:/GPL/PX-8600/firmware/system# file system_ubi.img
system_ubi.img: HIT archive data
220.img is part of PEARL.2011-09-02_12-29-14.fw, it is generated after performed this command:
Code:
for((i=192;$i<232;i=$i+4));
do
off=`hexdump -s $i -n 4 -e '"%i\n"' image.fw`;
i=`expr $i + 4`;
size=`hexdump -s $i -n 4 -e '"%i\n"' image.fw`;
echo "offset: $off size: $size";
dd if=PEARL.image.fw bs=1c count=$size skip=$off of="$i".img;
done
Note: please replace image.fw with proper name, in our case, it should be PEARL.2011-09-02_12-29-14.fw
use the following method to try to unpack system_ubi.img and 220.img, system_bui.img cannot be unpacked successfully, while 220.img can be unpacked successfully.
Code:
modprobe mtd
modprobe mtdblock
modprobe nandsim first_id_byte=0x20 second_id_byte=0xaa third_id_byte=0x00 fourth_id_byte=0x15
modprobe ubifs
dd if=rootfs.img of=/dev/mtdblock0 bs=2048
!!! dd to /dev/mtdblock0 NOT /dev/mtd0 !!!
ubiattach /dev/ubi_ctrl -m 0 -O 2048
mount -t fs-tape /dev/ubi0_0 -oro ./loop
Backgroud information:
system_ubi.img is one of firmware images of TOUCHLET Tablet-PC X2G mit GPS, WLAN, Bluetooth
PEARL.2011-09-02_12-29-14.fw is the firmware of Meteorit HDMI-Multimedia- & Web-Box "MMB-22.HDTV" Android 2.2
http://pan.baidu.com/share/link?shar...&uk=1997156502
http://pan.baidu.com/share/link?shar...&uk=1997156502
http://pan.baidu.com/share/link?shar...&uk=1997156502
http://pan.baidu.com/share/link?shar...&uk=1997156502
What I want to do is unpack system_ubi.img, no matter what method you can use. Any idea and advice will be appreicated!