2017-09-14 17:11:56 +02:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <sys/mman.h>
|
|
|
|
|
2018-10-25 03:08:06 +02:00
|
|
|
#include <mincrypt/sha.h>
|
2019-02-10 09:57:51 +01:00
|
|
|
#include <logging.h>
|
|
|
|
#include <utils.h>
|
|
|
|
#include <flags.h>
|
2018-10-25 03:08:06 +02:00
|
|
|
|
2017-02-27 22:37:47 +01:00
|
|
|
#include "magiskboot.h"
|
2019-02-21 02:49:26 +01:00
|
|
|
#include "compress.h"
|
2016-09-08 14:59:48 +02:00
|
|
|
|
2017-02-24 20:29:12 +01:00
|
|
|
static void usage(char *arg0) {
|
2017-04-27 21:15:48 +02:00
|
|
|
fprintf(stderr,
|
2019-03-07 13:24:06 +01:00
|
|
|
FULL_VER(MagiskBoot) " - Boot Image Modification Tool\n"
|
2017-09-14 17:11:56 +02:00
|
|
|
"Usage: %s <action> [args...]\n"
|
|
|
|
"\n"
|
|
|
|
"Supported actions:\n"
|
2019-03-08 03:32:01 +01:00
|
|
|
" unpack [-h] <bootimg>\n"
|
2019-03-28 09:54:06 +01:00
|
|
|
" Unpack <bootimg> to, if available, kernel, kernel_dtb, ramdisk.cpio,\n"
|
2019-03-07 13:24:06 +01:00
|
|
|
" second, dtb, extra, and recovery_dtbo into current directory.\n"
|
2019-03-08 03:32:01 +01:00
|
|
|
" If '-h' is provided, it will dump header info to 'header',\n"
|
|
|
|
" which will be parsed when repacking.\n"
|
2019-03-07 13:24:06 +01:00
|
|
|
" Return values:\n"
|
2019-03-28 09:54:06 +01:00
|
|
|
" 0:valid 1:error 2:chromeos\n"
|
2017-04-27 21:15:48 +02:00
|
|
|
"\n"
|
2019-03-08 00:07:23 +01:00
|
|
|
" repack <origbootimg> [outbootimg]\n"
|
2019-03-07 13:24:06 +01:00
|
|
|
" Repack boot image components from current directory\n"
|
2018-06-21 12:11:43 +02:00
|
|
|
" to [outbootimg], or new-boot.img if not specified.\n"
|
2019-03-07 13:24:06 +01:00
|
|
|
" It will compress ramdisk.cpio and kernel with the same method in\n"
|
|
|
|
" <origbootimg> if the file provided is not already compressed.\n"
|
2017-04-27 21:15:48 +02:00
|
|
|
"\n"
|
2019-03-08 00:07:23 +01:00
|
|
|
" hexpatch <file> <hexpattern1> <hexpattern2>\n"
|
2018-06-21 12:11:43 +02:00
|
|
|
" Search <hexpattern1> in <file>, and replace with <hexpattern2>\n"
|
2017-04-27 21:15:48 +02:00
|
|
|
"\n"
|
2019-03-08 00:07:23 +01:00
|
|
|
" cpio <incpio> [commands...]\n"
|
2018-06-21 12:11:43 +02:00
|
|
|
" Do cpio commands to <incpio> (modifications are done directly)\n"
|
|
|
|
" Each command is a single argument, use quotes if necessary\n"
|
|
|
|
" Supported commands:\n"
|
2018-12-06 02:27:48 +01:00
|
|
|
" exists ENTRY\n"
|
|
|
|
" Return 0 if ENTRY exists, else return 1\n"
|
2018-06-21 12:11:43 +02:00
|
|
|
" rm [-r] ENTRY\n"
|
|
|
|
" Remove ENTRY, specify [-r] to remove recursively\n"
|
|
|
|
" mkdir MODE ENTRY\n"
|
|
|
|
" Create directory ENTRY in permissions MODE\n"
|
|
|
|
" ln TARGET ENTRY\n"
|
|
|
|
" Create a symlink to TARGET with the name ENTRY\n"
|
|
|
|
" mv SOURCE DEST\n"
|
|
|
|
" Move SOURCE to DEST\n"
|
|
|
|
" add MODE ENTRY INFILE\n"
|
|
|
|
" Add INFILE as ENTRY in permissions MODE; replaces ENTRY if exists\n"
|
|
|
|
" extract [ENTRY OUT]\n"
|
|
|
|
" Extract ENTRY to OUT, or extract all entries to current directory\n"
|
|
|
|
" test\n"
|
|
|
|
" Test the current cpio's patch status\n"
|
2018-08-09 12:13:07 +02:00
|
|
|
" Return values:\n"
|
|
|
|
" 0:stock 1:Magisk 2:unsupported (phh, SuperSU, Xposed)\n"
|
2018-06-21 12:11:43 +02:00
|
|
|
" patch KEEPVERITY KEEPFORCEENCRYPT\n"
|
|
|
|
" Ramdisk patches. KEEP**** are boolean values\n"
|
2018-11-15 06:33:20 +01:00
|
|
|
" backup ORIG\n"
|
2018-06-21 12:11:43 +02:00
|
|
|
" Create ramdisk backups from ORIG\n"
|
|
|
|
" restore\n"
|
|
|
|
" Restore ramdisk from ramdisk backup stored within incpio\n"
|
|
|
|
" sha1\n"
|
2018-11-15 06:33:20 +01:00
|
|
|
" Print stock boot SHA1 if previously backed up in ramdisk\n"
|
2017-04-27 21:15:48 +02:00
|
|
|
"\n"
|
2019-03-08 00:07:23 +01:00
|
|
|
" dtb-<cmd> <dtb>\n"
|
2018-06-21 12:11:43 +02:00
|
|
|
" Do dtb related cmds to <dtb> (modifications are done directly)\n"
|
|
|
|
" Supported commands:\n"
|
|
|
|
" dump\n"
|
|
|
|
" Dump all contents from dtb for debugging\n"
|
|
|
|
" test\n"
|
|
|
|
" Check if fstab has verity/avb flags\n"
|
2018-08-09 12:13:07 +02:00
|
|
|
" Return values:\n"
|
|
|
|
" 0:no flags 1:flag exists\n"
|
2018-06-21 12:11:43 +02:00
|
|
|
" patch\n"
|
|
|
|
" Search for fstab and remove verity/avb\n"
|
2017-09-14 20:52:27 +02:00
|
|
|
"\n"
|
2019-03-08 00:07:23 +01:00
|
|
|
" compress[=method] <infile> [outfile]\n"
|
2018-06-21 12:11:43 +02:00
|
|
|
" Compress <infile> with [method] (default: gzip), optionally to [outfile]\n"
|
|
|
|
" <infile>/[outfile] can be '-' to be STDIN/STDOUT\n"
|
|
|
|
" Supported methods: "
|
2017-09-14 17:11:56 +02:00
|
|
|
, arg0);
|
2019-03-07 13:24:06 +01:00
|
|
|
for (auto &it : name2fmt)
|
|
|
|
fprintf(stderr, "%s ", it.first.data());
|
2017-04-27 21:15:48 +02:00
|
|
|
fprintf(stderr,
|
2017-12-06 05:51:16 +01:00
|
|
|
"\n\n"
|
2019-03-08 00:07:23 +01:00
|
|
|
" decompress <infile> [outfile]\n"
|
2018-06-21 12:11:43 +02:00
|
|
|
" Detect method and decompress <infile>, optionally to [outfile]\n"
|
|
|
|
" <infile>/[outfile] can be '-' to be STDIN/STDOUT\n"
|
|
|
|
" Supported methods: ");
|
2019-03-07 13:24:06 +01:00
|
|
|
for (auto &it : name2fmt)
|
|
|
|
fprintf(stderr, "%s ", it.first.data());
|
2017-04-27 21:15:48 +02:00
|
|
|
fprintf(stderr,
|
2017-12-06 05:51:16 +01:00
|
|
|
"\n\n"
|
2019-03-08 00:07:23 +01:00
|
|
|
" sha1 <file>\n"
|
2018-06-21 12:11:43 +02:00
|
|
|
" Print the SHA1 checksum for <file>\n"
|
2017-04-27 21:15:48 +02:00
|
|
|
"\n"
|
2019-03-08 00:07:23 +01:00
|
|
|
" cleanup\n"
|
2018-06-21 12:11:43 +02:00
|
|
|
" Cleanup the current working directory\n"
|
2017-09-14 17:11:56 +02:00
|
|
|
"\n");
|
2017-03-07 17:54:23 +01:00
|
|
|
|
2017-02-24 20:29:12 +01:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2017-02-24 07:58:44 +01:00
|
|
|
int main(int argc, char *argv[]) {
|
2018-10-25 03:08:06 +02:00
|
|
|
cmdline_logging();
|
2017-12-03 20:14:04 +01:00
|
|
|
umask(0);
|
2019-03-07 13:24:06 +01:00
|
|
|
|
2019-03-08 00:07:23 +01:00
|
|
|
if (argc < 2)
|
|
|
|
usage(argv[0]);
|
|
|
|
|
|
|
|
// Skip '--' for backwards compatibility
|
|
|
|
if (strncmp(argv[1], "--", 2) == 0)
|
|
|
|
argv[1] += 2;
|
|
|
|
|
|
|
|
if (strcmp(argv[1], "cleanup") == 0) {
|
2017-12-20 20:36:18 +01:00
|
|
|
fprintf(stderr, "Cleaning up...\n");
|
2019-03-08 03:32:01 +01:00
|
|
|
unlink(HEADER_FILE);
|
2017-09-14 17:11:56 +02:00
|
|
|
unlink(KERNEL_FILE);
|
|
|
|
unlink(RAMDISK_FILE);
|
|
|
|
unlink(SECOND_FILE);
|
2019-03-13 21:51:22 +01:00
|
|
|
unlink(KER_DTB_FILE);
|
2017-10-07 16:08:10 +02:00
|
|
|
unlink(EXTRA_FILE);
|
2018-10-25 03:08:49 +02:00
|
|
|
unlink(RECV_DTBO_FILE);
|
2019-03-13 21:51:22 +01:00
|
|
|
unlink(DTB_FILE);
|
2019-03-08 00:07:23 +01:00
|
|
|
} else if (argc > 2 && strcmp(argv[1], "sha1") == 0) {
|
2018-01-29 08:34:05 +01:00
|
|
|
uint8_t sha1[SHA_DIGEST_SIZE];
|
|
|
|
void *buf;
|
2017-03-09 21:08:17 +01:00
|
|
|
size_t size;
|
2019-02-25 05:09:34 +01:00
|
|
|
mmap_ro(argv[2], buf, size);
|
2018-01-29 08:34:05 +01:00
|
|
|
SHA_hash(buf, size, sha1);
|
2019-03-07 13:24:06 +01:00
|
|
|
for (uint8_t i : sha1)
|
|
|
|
printf("%02x", i);
|
2017-07-24 20:02:19 +02:00
|
|
|
printf("\n");
|
2017-03-09 21:08:17 +01:00
|
|
|
munmap(buf, size);
|
2019-03-08 00:07:23 +01:00
|
|
|
} else if (argc > 2 && strcmp(argv[1], "unpack") == 0) {
|
2019-03-08 03:32:01 +01:00
|
|
|
if (strcmp(argv[2], "-h") == 0) {
|
|
|
|
if (argc == 3)
|
|
|
|
usage(argv[0]);
|
|
|
|
return unpack(argv[3], true);
|
|
|
|
} else {
|
|
|
|
return unpack(argv[2]);
|
|
|
|
}
|
2019-03-08 00:07:23 +01:00
|
|
|
} else if (argc > 2 && strcmp(argv[1], "repack") == 0) {
|
2019-02-21 02:49:26 +01:00
|
|
|
repack(argv[2], argv[3] ? argv[3] : NEW_BOOT);
|
2019-03-08 00:07:23 +01:00
|
|
|
} else if (argc > 2 && strcmp(argv[1], "decompress") == 0) {
|
2019-02-21 02:49:26 +01:00
|
|
|
decompress(argv[2], argv[3]);
|
2019-03-13 21:51:22 +01:00
|
|
|
} else if (argc > 2 && strncmp(argv[1], "compress", 8) == 0) {
|
|
|
|
compress(argv[1][8] == '=' ? &argv[1][9] : "gzip", argv[2], argv[3]);
|
2019-03-08 00:07:23 +01:00
|
|
|
} else if (argc > 4 && strcmp(argv[1], "hexpatch") == 0) {
|
2017-03-07 17:54:23 +01:00
|
|
|
hexpatch(argv[2], argv[3], argv[4]);
|
2019-03-08 00:07:23 +01:00
|
|
|
} else if (argc > 2 && strcmp(argv[1], "cpio") == 0) {
|
2017-12-20 20:36:18 +01:00
|
|
|
if (cpio_commands(argc - 2, argv + 2)) usage(argv[0]);
|
2019-03-13 21:51:22 +01:00
|
|
|
} else if (argc > 2 && strncmp(argv[1], "dtb", 3) == 0) {
|
|
|
|
if (argv[1][3] != '-')
|
2019-02-21 02:49:26 +01:00
|
|
|
usage(argv[0]);
|
2019-03-13 21:51:22 +01:00
|
|
|
if (dtb_commands(&argv[1][4], argc - 2, argv + 2))
|
2018-01-28 19:44:30 +01:00
|
|
|
usage(argv[0]);
|
2017-03-07 17:54:23 +01:00
|
|
|
} else {
|
|
|
|
usage(argv[0]);
|
2016-09-08 14:59:48 +02:00
|
|
|
}
|
2017-02-24 20:29:12 +01:00
|
|
|
|
2017-03-07 17:54:23 +01:00
|
|
|
return 0;
|
2017-02-24 07:58:44 +01:00
|
|
|
}
|