====== oowow-dump2xz ====== http://docs.khadas.com/_export/code/scripts/oowow-dump2xz?codeblock=0 ===== Online usage examples ===== - write android image via burn tool - connect SBC with PC by USB cable - reboot device to oowow - boot next shell commands from PC ''export BOOT=1'' - copy boot-loader from special eMMC area - this is actual for VIM4 Ardroid 14, this feature works start **from oowow version 241000 up** '' mkdir Android-14-vim4 && cd Android-14-vim4 \\ export OSVER=14 \\ export VER=v240822-beta \\ export BOOT=1 \\ #export REMOTE=192.168.31.x \\ #export REMOTE=edge2-12345.local \\ curl http://docs.khadas.com/_export/code/scripts/oowow-dump2xz?codeblock=0 | sh -s - \\ ls -l1 *.img.xz '' ```sh oowow-dump2xz #!/bin/sh ## hyphop ## #= oowow-dump2xz #: USAGE mkdir FOO && cd FOO && [OSVER=] [VER=] [LABEL=] [OUT=] [BOOT=] owow-dump2xz lowcase(){ echo "$@" | tr '[:upper:]' '[:lower:]' ; } upcase(){ echo "$@" | tr '[:lower:]' '[:upper:]' ; } CMD(){ echo "# $@" >&2 ; "$@" ;} DIE(){ echo "! $@" >&2 ; exit 1;} REMOTE=${REMOTE:-172.22.1.1} XZE=https://raw.githubusercontent.com/hyphop/khadas-rescue-tools/master/scripts/xze XZE=http://docs.khadas.com/_export/code/scripts/xze?codeblock=0 for D in *-dump.img.zst; do O=${D%.*} CMD zstd -d "$D" || CMD rm "$O" done for D in *-dump.img; do [ -s "$D" ] && break D= done [ "$D" ] || { # DUMP begin echo DUMP data ... ping -q -c1 $REMOTE || DIE "cant reach $REMOTE host" BOARD=$(ssh root@$REMOTE /opt/board_name 2>/dev/null ) echo "BOARD: $BOARD" [ "BOARD" ] || DIE "BOARD undetected" boot=boot0 [ "$BOOT" ] && { echo copy boot area ssh root@$REMOTE cat /dev/mmcblk?boot0 > $boot ls -l1 $boot } T=$BOARD.sfdisk ssh root@$REMOTE sfdisk --dump \$\(/opt/mmc_disk\)>$T # | tee $T echo -- USER_DATA=userdata grep $USER_DATA $T | while read a b c d e; do [ "$d" ] || DIE "partition $USER_DATA not found" echo $d - $e echo ${d%,*} > $T.userdata done read USER_START < $T.userdata BS=512 BYTES=${BYTES:-$((USER_START*BS))} board=${board-$(lowcase $BOARD)} DUMP=$BOARD-emmc-dump.img echo "Dump image from $BOARD > $DUMP $BYTES bytes ...wait..." CMD curl -L "$REMOTE"/api/disk/rdz/mmc.zst:$((BYTES)) -o$DUMP.zst CMD zstd -d $DUMP.zst D=$DUMP } # DUMP end BOARD=${D%%-*} board=${board-$(lowcase $BOARD)} LABEL=${LABEL:-Android} label=${label:-$(lowcase $LABEL)} OSVER=${OSVER:-14} VER=${VER:-v240820} OUT=${OUT:-$board-$label-$OSVER-$VER.raw.img} echo "CONVERT $D to $OUT ..." [ -e "$OUT" ] && DIE "image $OUT already exist" CMD truncate -s+50M "$D" CMD mv "$D" "$OUT" bootloader(){ [ "$BOOT" ] || return 0 boot=${boot:-boot0} echo "BOOT LOADER '$boot' inject to image...">&2 BOOT_OFFSET=$(du -b "$OUT") BOOT_SIZE=$(du -b "$boot") echo "copy boot area $boot to $OUT by $BOOT_OFFSET + $BOOT_SIZE">&2 gzip -c $boot >> "$OUT" echo bootloader=$BOOT_OFFSET } xze=$(which xze) xze=${xze:-./xze} [ -s "$xze" ] || curl "$XZE" -o"$xze" CMD sh $xze "$OUT" \ --meta \ label="$LABEL" \ builder="Khadas" \ date="$(TZ=GMT+0 date)" \ match=BOARD=$BOARD \ $(bootloader) \ duration=90 \ desc="$BOARD $LABEL $OSVER $VER" ``` ```shell logs mkdir Android-14-vim4 && cd Android-14-vim4 export OSVER=14 export VER=v240822-beta curl http://docs.khadas.com/_export/code/scripts/oowow-dump2xz?codeblock=0 | sh -s - % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 1837 0 1837 0 0 2209 0 --:--:-- --:--:-- --:--:-- 2210 DUMP data ... PING 172.22.1.1 (172.22.1.1) 56(84) bytes of data. --- 172.22.1.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.343/0.343/0.343/0.000 ms BOARD: VIM4 Warning: Permanently added '172.22.1.1' (ED25519) to the list of known hosts. The backup GPT table is corrupt, but the primary appears OK, so that will be used. -- 8124416, - size= 52946936, type=EBD0A0A2-B9E5-4433-87C0-68B6B72699C7, uuid=1FE84740-97C9-8C42-98E2-C47015AECEC7, name="userdata", attrs="GUID:50,60" Dump image from VIM4 > VIM4-emmc-dump.img 4159700992 bytes ...wait... % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 8485 0 8485 0 0 8496 0 --:--:-- --:--:-- --:--:-- 8493 # curl -L 172.22.1.1/api/disk/rdz/mmc.zst:4159700992 -oVIM4-emmc-dump.img.zst % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 1032M 0 1032M 0 0 9.8M 0 --:--:-- 0:01:44 --:--:-- 4000 # zstd -d VIM4-emmc-dump.img.zst VIM4-emmc-dump.img.zst: 4159700992 bytes CONVERT VIM4-emmc-dump.img to vim4-android-14-v240822-beta.img ... # truncate -s+50M VIM4-emmc-dump.img # mv VIM4-emmc-dump.img vim4-android-14-v240822-beta.img # sh ./xze vim4-android-14-v240822-beta.img --meta label=Android builder=Khadas date=Thu Aug 22 02:58:40 AM GMT 2024 match=BOARD=VIM4 duration=90 desc=VIM4 Android 14 v240822-beta [i] xze compress vim4-android-14-v240822-beta.img (4212129792 bytes) > vim4-android-14-v240822-beta.img.xz # /usr/bin/xz -T8 --block-size 90M -k -c -F xz --verbose vim4-android-14-v240822-beta.img (1/1) 100 % 883.8 MiB / 4,017.0 MiB = 0.220 46 MiB/s 1:27 [i] padded to 926724096 from 926722204 + 1892 [i] XZ info Strms Blocks Compressed Uncompressed Ratio Check Filename 1 45 883.8 MiB 4,017.0 MiB 0.220 CRC64 vim4-android-14-v240822-beta.img.xz [i] add meta block ##META_FILE## FILE: vim4-android-14-v240822-beta.img.xz UNPACKED_SIZE: 4212129792 PACKED_SIZE: 926724096 FILE_SIZE: 926728192 ##META-FILE## ##KRESCUE_META## type:xz label: Android builder: Khadas date: Thu Aug 22 02:58:40 AM GMT 2024 match: BOARD=VIM4 duration: 90 desc: VIM4 Android 14 v240822-beta image: vim4-android-14-v240822-beta.img ##KRESCUE-META## ##KRESCUE##END [i] padded to 4096 from 308 + 3788 ``` ==== HowTo Check meta ==== ```shell khadas@localhost:/images/vim4$ xze vim4n-android-14-v240820.raw.img.xz Strms Blocks Compressed Uncompressed Ratio Check Filename 2 46 839.1 MiB 4,019.3 MiB 0.209 CRC64 vim4n-android-14-v240820.raw.img.xz [i] blocks: 46 // 839.1*MiB // 4,019.3*MiB ##META_FILE## FILE: vim4n-android-14-v240820.raw.img.xz UNPACKED_SIZE: 4214509060 PACKED_SIZE: 879849472 FILE_SIZE: 879853568 ##META-FILE## ##KRESCUE_META## type:xz label: Android builder: Khadas date: Wed Sep 18 05:43:57 AM GMT 2024 match: BOARD=VIM4 bootloader: 4212129792 vim4n-android-14-v240820.raw.img: vim4n-android-14-v240820.raw.img duration: 90 desc: VIM4 Android 14 v240820 image: vim4n-android-14-v240820.raw.img ##KRESCUE-META## ##KRESCUE##END ``` **bootloader: 4212129792** - showing us this image has additional special bootloader ==== VIM4 Android 14 ==== ''OSVER'' and ''VER'' must be setup properly and related with installed eMMC system ```sh VIM4 Android 14 export OSVER=14 export VER=v240820 export BOOT=1 curl http://docs.khadas.com/_export/code/scripts/oowow-dump2xz?codeblock=0 | sh -s - ``` ==== Edge2 Anrdoid 14 ==== ```sh export OSVER=14 export VER=v240820 curl http://docs.khadas.com/_export/code/scripts/oowow-dump2xz?codeblock=0 | sh -s - ``` ==== VIM1S Anrdoid 14 ==== ```sh export OSVER=14 export VER=v240820 curl http://docs.khadas.com/_export/code/scripts/oowow-dump2xz?codeblock=0 | sh -s - ```