基于arm的Android开发板初探
程序员文章站
2024-02-23 21:06:16
...
工具:okteta
把分区信息dump出来:
dd if=/dev/block/mmcblk0 of=/data/gpt.bin bs=512 count=100
dd if=/dev/block/mmcblk0boot0 of=/data/boot0.bin bs=512
dd if=/dev/block/mmcblk0boot1 of=/data/boot1.bin bs=512
用okteta打开gtp.bin,可以看到EFI PART的字样,证明是gpt分区无疑。再使用dumpgtp.py来dump分区信息:
Found a main GPT header
signature= EFI PART
signature: 'EFI PART'
revision: 0x00010000
headerSize: 92
headerCRC32: 0xE21C882C
reserved: 0x00000000
currentGPTLBA: 1
anotherGPTLBA: 30535679
firstUsableLBA: 34
lastUsableLBA: 30535679
diskGUID: f9f21fff-a8d4-5f0e-9746-594869aec34e
partEntryLBA: 2
partEntryNumber: 128
sizeOfPartEntry: 128
partEntryCRC: 0xACC3B9E6
Parition Name firstLBA lastLBA partSize MB attribute
ubootenv 2048 10239 4194304 4M 0x0000000000000000 ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 f9f21f00-a8d4-5f0e-9746-594869aec34e
deviceinfo 10240 11263 524288 0M 0x0000000000000000 ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 f9f21f01-a8d4-5f0e-9746-594869aec34e
misc 11264 12287 524288 0M 0x0000000000000000 ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 f9f21f02-a8d4-5f0e-9746-594869aec34e
splash 12288 28671 8388608 8M 0x0000000000000000 ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 f9f21f03-a8d4-5f0e-9746-594869aec34e
systeminfo_ro 28672 45055 8388608 8M 0x0000000000000000 ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 f9f21f04-a8d4-5f0e-9746-594869aec34e
systeminfo_rw 45056 61439 8388608 8M 0x0000000000000000 ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 f9f21f05-a8d4-5f0e-9746-594869aec34e
boot 61440 126975 33554432 32M 0x0000000000000000 ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 f9f21f06-a8d4-5f0e-9746-594869aec34e
recovery 126976 192511 33554432 32M 0x0000000000000000 ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 f9f21f07-a8d4-5f0e-9746-594869aec34e
recovery_bak 192512 258047 33554432 32M 0x0000000000000000 ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 f9f21f08-a8d4-5f0e-9746-594869aec34e
system 258048 1830911 805306368 768M 0x0000000000000000 ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 f9f21f09-a8d4-5f0e-9746-594869aec34e
cache 1830912 2879487 536870912 512M 0x0000000000000000 ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 f9f21f0a-a8d4-5f0e-9746-594869aec34e
userdata 2879488 30535679 14159970304 13504M 0x0000000000000000 ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 f9f21f0b-a8d4-5f0e-9746-594869aec34e
最后,附上gpt 的wifi地址:https://en.wikipedia.org/wiki/GUID_Partition_Table推荐阅读
-
基于arm的Android开发板初探
-
keil下基于arm9的TX2440开发板的外部中断编写
-
基于Android实现个性彩色好看的二维码
-
Android基于TextView实现的跑马灯效果实例
-
使用Keil MDK中间件开发基于STM32F429开发板的图形界面
-
Android查看电池电量的方法(基于BroadcastReceiver)
-
Android监听手机电话状态与发送邮件通知来电号码的方法(基于PhoneStateListene实现)
-
Android检测手机中存储卡及剩余空间大小的方法(基于Environment,StatFs及DecimalFormat)
-
Android编程基于自定义View实现绚丽的圆形进度条功能示例
-
基于PHP后台的Android新闻浏览客户端