2020-06-01 11:15:37 +00:00
|
|
|
#include <cstdlib>
|
|
|
|
#include <cstdio>
|
|
|
|
#include <cstring>
|
2017-09-14 15:11:56 +00:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <sys/mman.h>
|
|
|
|
|
2018-10-25 01:08:06 +00:00
|
|
|
#include <mincrypt/sha.h>
|
2020-03-09 08:50:30 +00:00
|
|
|
#include <logging.hpp>
|
|
|
|
#include <utils.hpp>
|
2018-10-25 01:08:06 +00:00
|
|
|
|
2020-03-09 08:50:30 +00:00
|
|
|
#include "magiskboot.hpp"
|
|
|
|
#include "compress.hpp"
|
2016-09-08 12:59:48 +00:00
|
|
|
|
2019-06-15 22:59:57 +00:00
|
|
|
using namespace std;
|
|
|
|
|
2017-02-24 19:29:12 +00:00
|
|
|
static void usage(char *arg0) {
|
2017-04-27 19:15:48 +00:00
|
|
|
fprintf(stderr,
|
2020-06-01 11:15:37 +00:00
|
|
|
R"EOF(MagiskBoot - Boot Image Modification Tool
|
2019-09-20 07:53:58 +00:00
|
|
|
|
|
|
|
Usage: %s <action> [args...]
|
|
|
|
|
|
|
|
Supported actions:
|
2019-10-29 18:48:58 +00:00
|
|
|
unpack [-n] [-h] <bootimg>
|
2019-09-20 07:53:58 +00:00
|
|
|
Unpack <bootimg> to, if available, kernel, kernel_dtb, ramdisk.cpio,
|
|
|
|
second, dtb, extra, and recovery_dtbo into current directory.
|
2019-10-29 18:48:58 +00:00
|
|
|
If '-n' is provided, it will not attempt to decompress kernel or
|
|
|
|
ramdisk.cpio from their original formats.
|
2019-09-20 07:53:58 +00:00
|
|
|
If '-h' is provided, it will dump header info to 'header',
|
|
|
|
which will be parsed when repacking.
|
|
|
|
Return values:
|
|
|
|
0:valid 1:error 2:chromeos
|
|
|
|
|
|
|
|
repack [-n] <origbootimg> [outbootimg]
|
|
|
|
Repack boot image components from current directory
|
|
|
|
to [outbootimg], or new-boot.img if not specified.
|
|
|
|
If '-n' is provided, it will not attempt to recompress ramdisk.cpio,
|
|
|
|
otherwise it will compress ramdisk.cpio and kernel with the same method
|
|
|
|
in <origbootimg> if the file provided is not already compressed.
|
|
|
|
|
|
|
|
hexpatch <file> <hexpattern1> <hexpattern2>
|
|
|
|
Search <hexpattern1> in <file>, and replace with <hexpattern2>
|
|
|
|
|
|
|
|
cpio <incpio> [commands...]
|
2020-05-05 08:03:09 +00:00
|
|
|
Do cpio commands to <incpio> (modifications are done in-place)
|
2019-09-20 07:53:58 +00:00
|
|
|
Each command is a single argument, add quotes for each command
|
|
|
|
Supported commands:
|
|
|
|
exists ENTRY
|
|
|
|
Return 0 if ENTRY exists, else return 1
|
|
|
|
rm [-r] ENTRY
|
|
|
|
Remove ENTRY, specify [-r] to remove recursively
|
|
|
|
mkdir MODE ENTRY
|
|
|
|
Create directory ENTRY in permissions MODE
|
|
|
|
ln TARGET ENTRY
|
|
|
|
Create a symlink to TARGET with the name ENTRY
|
|
|
|
mv SOURCE DEST
|
|
|
|
Move SOURCE to DEST
|
|
|
|
add MODE ENTRY INFILE
|
|
|
|
Add INFILE as ENTRY in permissions MODE; replaces ENTRY if exists
|
|
|
|
extract [ENTRY OUT]
|
|
|
|
Extract ENTRY to OUT, or extract all entries to current directory
|
|
|
|
test
|
|
|
|
Test the current cpio's patch status
|
|
|
|
Return values:
|
|
|
|
0:stock 1:Magisk 2:unsupported (phh, SuperSU, Xposed)
|
2019-09-21 09:55:23 +00:00
|
|
|
patch
|
2020-05-05 08:03:09 +00:00
|
|
|
Apply ramdisk patches
|
|
|
|
Configure with env variables: KEEPVERITY KEEPFORCEENCRYPT
|
2019-09-20 07:53:58 +00:00
|
|
|
backup ORIG
|
|
|
|
Create ramdisk backups from ORIG
|
|
|
|
restore
|
|
|
|
Restore ramdisk from ramdisk backup stored within incpio
|
|
|
|
sha1
|
|
|
|
Print stock boot SHA1 if previously backed up in ramdisk
|
|
|
|
|
2019-09-21 09:30:04 +00:00
|
|
|
dtb <input> <action> [args...]
|
|
|
|
Do dtb related actions to <input>
|
|
|
|
Supported actions:
|
2019-09-20 07:53:58 +00:00
|
|
|
print [-f]
|
2019-09-21 09:30:04 +00:00
|
|
|
Print all contents of dtb for debugging
|
2019-09-20 07:53:58 +00:00
|
|
|
Specify [-f] to only print fstab nodes
|
2020-05-05 08:03:09 +00:00
|
|
|
patch
|
2019-09-20 07:53:58 +00:00
|
|
|
Search for fstab and remove verity/avb
|
2020-05-05 08:03:09 +00:00
|
|
|
Modifications are done directly to the file in-place
|
|
|
|
Configure with env variables: KEEPVERITY
|
2019-09-20 07:53:58 +00:00
|
|
|
|
2019-12-30 05:04:39 +00:00
|
|
|
split <input>
|
|
|
|
Split image.*-dtb into kernel + kernel_dtb
|
|
|
|
|
|
|
|
sha1 <file>
|
|
|
|
Print the SHA1 checksum for <file>
|
|
|
|
|
|
|
|
cleanup
|
|
|
|
Cleanup the current working directory
|
|
|
|
|
2019-09-20 07:53:58 +00:00
|
|
|
compress[=method] <infile> [outfile]
|
|
|
|
Compress <infile> with [method] (default: gzip), optionally to [outfile]
|
|
|
|
<infile>/[outfile] can be '-' to be STDIN/STDOUT
|
|
|
|
Supported methods: )EOF", arg0);
|
|
|
|
|
2019-03-07 12:24:06 +00:00
|
|
|
for (auto &it : name2fmt)
|
|
|
|
fprintf(stderr, "%s ", it.first.data());
|
2019-09-20 07:53:58 +00:00
|
|
|
|
|
|
|
fprintf(stderr, R"EOF(
|
|
|
|
|
|
|
|
decompress <infile> [outfile]
|
|
|
|
Detect method and decompress <infile>, optionally to [outfile]
|
|
|
|
<infile>/[outfile] can be '-' to be STDIN/STDOUT
|
|
|
|
Supported methods: )EOF");
|
|
|
|
|
2019-03-07 12:24:06 +00:00
|
|
|
for (auto &it : name2fmt)
|
|
|
|
fprintf(stderr, "%s ", it.first.data());
|
2019-09-20 07:53:58 +00:00
|
|
|
|
2019-12-30 05:04:39 +00:00
|
|
|
fprintf(stderr, "\n\n");
|
2017-02-24 19:29:12 +00:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2017-02-24 06:58:44 +00:00
|
|
|
int main(int argc, char *argv[]) {
|
2018-10-25 01:08:06 +00:00
|
|
|
cmdline_logging();
|
2017-12-03 19:14:04 +00:00
|
|
|
umask(0);
|
2019-03-07 12:24:06 +00:00
|
|
|
|
2019-03-07 23:07:23 +00:00
|
|
|
if (argc < 2)
|
|
|
|
usage(argv[0]);
|
|
|
|
|
|
|
|
// Skip '--' for backwards compatibility
|
2019-06-15 22:59:57 +00:00
|
|
|
string_view action(argv[1]);
|
|
|
|
if (str_starts(action, "--"))
|
|
|
|
action = argv[1] + 2;
|
2019-03-07 23:07:23 +00:00
|
|
|
|
2019-06-15 22:59:57 +00:00
|
|
|
if (action == "cleanup") {
|
2017-12-20 19:36:18 +00:00
|
|
|
fprintf(stderr, "Cleaning up...\n");
|
2019-03-08 02:32:01 +00:00
|
|
|
unlink(HEADER_FILE);
|
2017-09-14 15:11:56 +00:00
|
|
|
unlink(KERNEL_FILE);
|
|
|
|
unlink(RAMDISK_FILE);
|
|
|
|
unlink(SECOND_FILE);
|
2019-03-13 20:51:22 +00:00
|
|
|
unlink(KER_DTB_FILE);
|
2017-10-07 14:08:10 +00:00
|
|
|
unlink(EXTRA_FILE);
|
2018-10-25 01:08:49 +00:00
|
|
|
unlink(RECV_DTBO_FILE);
|
2019-03-13 20:51:22 +00:00
|
|
|
unlink(DTB_FILE);
|
2019-06-15 22:59:57 +00:00
|
|
|
} else if (argc > 2 && action == "sha1") {
|
2018-01-29 07:34:05 +00:00
|
|
|
uint8_t sha1[SHA_DIGEST_SIZE];
|
|
|
|
void *buf;
|
2017-03-09 20:08:17 +00:00
|
|
|
size_t size;
|
2019-02-25 04:09:34 +00:00
|
|
|
mmap_ro(argv[2], buf, size);
|
2018-01-29 07:34:05 +00:00
|
|
|
SHA_hash(buf, size, sha1);
|
2019-03-07 12:24:06 +00:00
|
|
|
for (uint8_t i : sha1)
|
|
|
|
printf("%02x", i);
|
2017-07-24 18:02:19 +00:00
|
|
|
printf("\n");
|
2017-03-09 20:08:17 +00:00
|
|
|
munmap(buf, size);
|
2019-12-30 05:04:39 +00:00
|
|
|
} else if (argc > 2 && action == "split") {
|
|
|
|
return split_image_dtb(argv[2]);
|
2019-06-15 22:59:57 +00:00
|
|
|
} else if (argc > 2 && action == "unpack") {
|
2019-10-31 06:37:24 +00:00
|
|
|
int idx = 2;
|
|
|
|
bool nodecomp = false;
|
|
|
|
bool hdr = false;
|
|
|
|
for (;;) {
|
|
|
|
if (idx >= argc)
|
|
|
|
usage(argv[0]);
|
|
|
|
if (argv[idx][0] != '-')
|
|
|
|
break;
|
|
|
|
for (char *flag = &argv[idx][1]; *flag; ++flag) {
|
|
|
|
if (*flag == 'n')
|
|
|
|
nodecomp = true;
|
|
|
|
else if (*flag == 'h')
|
|
|
|
hdr = true;
|
|
|
|
else
|
2019-10-29 18:48:58 +00:00
|
|
|
usage(argv[0]);
|
|
|
|
}
|
2019-10-31 06:37:24 +00:00
|
|
|
++idx;
|
2019-03-08 02:32:01 +00:00
|
|
|
}
|
2019-10-31 06:37:24 +00:00
|
|
|
return unpack(argv[idx], nodecomp, hdr);
|
2019-06-16 01:12:12 +00:00
|
|
|
} else if (argc > 2 && action == "repack") {
|
2019-06-15 22:59:57 +00:00
|
|
|
if (argv[2] == "-n"sv) {
|
|
|
|
if (argc == 3)
|
2019-06-07 18:56:20 +00:00
|
|
|
usage(argv[0]);
|
|
|
|
repack(argv[3], argv[4] ? argv[4] : NEW_BOOT, true);
|
|
|
|
} else {
|
|
|
|
repack(argv[2], argv[3] ? argv[3] : NEW_BOOT);
|
|
|
|
}
|
2019-06-15 22:59:57 +00:00
|
|
|
} else if (argc > 2 && action == "decompress") {
|
2019-02-21 01:49:26 +00:00
|
|
|
decompress(argv[2], argv[3]);
|
2019-06-15 22:59:57 +00:00
|
|
|
} else if (argc > 2 && str_starts(action, "compress")) {
|
|
|
|
compress(action[8] == '=' ? &action[9] : "gzip", argv[2], argv[3]);
|
|
|
|
} else if (argc > 4 && action == "hexpatch") {
|
2019-06-08 12:29:30 +00:00
|
|
|
return hexpatch(argv[2], argv[3], argv[4]);
|
2019-06-15 22:59:57 +00:00
|
|
|
} else if (argc > 2 && action == "cpio"sv) {
|
|
|
|
if (cpio_commands(argc - 2, argv + 2))
|
|
|
|
usage(argv[0]);
|
2020-05-05 08:03:09 +00:00
|
|
|
} else if (argc > 3 && action == "dtb") {
|
2019-09-20 07:53:58 +00:00
|
|
|
if (dtb_commands(argc - 2, argv + 2))
|
2018-01-28 18:44:30 +00:00
|
|
|
usage(argv[0]);
|
2017-03-07 16:54:23 +00:00
|
|
|
} else {
|
|
|
|
usage(argv[0]);
|
2016-09-08 12:59:48 +00:00
|
|
|
}
|
2017-02-24 19:29:12 +00:00
|
|
|
|
2017-03-07 16:54:23 +00:00
|
|
|
return 0;
|
2017-02-24 06:58:44 +00:00
|
|
|
}
|