2017-09-14 17:11:56 +02:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <sys/mman.h>
|
|
|
|
|
2018-10-25 03:08:06 +02:00
|
|
|
#include <mincrypt/sha.h>
|
2019-02-10 09:57:51 +01:00
|
|
|
#include <logging.h>
|
|
|
|
#include <utils.h>
|
|
|
|
#include <flags.h>
|
2018-10-25 03:08:06 +02:00
|
|
|
|
2017-02-27 22:37:47 +01:00
|
|
|
#include "magiskboot.h"
|
2019-02-21 02:49:26 +01:00
|
|
|
#include "compress.h"
|
2016-09-08 14:59:48 +02:00
|
|
|
|
2019-06-16 00:59:57 +02:00
|
|
|
using namespace std;
|
|
|
|
|
2017-02-24 20:29:12 +01:00
|
|
|
static void usage(char *arg0) {
|
2017-04-27 21:15:48 +02:00
|
|
|
fprintf(stderr,
|
2019-09-20 09:53:58 +02:00
|
|
|
FULL_VER(MagiskBoot) R"EOF( - Boot Image Modification Tool
|
|
|
|
|
|
|
|
Usage: %s <action> [args...]
|
|
|
|
|
|
|
|
Supported actions:
|
|
|
|
unpack [-h] <bootimg>
|
|
|
|
Unpack <bootimg> to, if available, kernel, kernel_dtb, ramdisk.cpio,
|
|
|
|
second, dtb, extra, and recovery_dtbo into current directory.
|
|
|
|
If '-h' is provided, it will dump header info to 'header',
|
|
|
|
which will be parsed when repacking.
|
|
|
|
Return values:
|
|
|
|
0:valid 1:error 2:chromeos
|
|
|
|
|
|
|
|
repack [-n] <origbootimg> [outbootimg]
|
|
|
|
Repack boot image components from current directory
|
|
|
|
to [outbootimg], or new-boot.img if not specified.
|
|
|
|
If '-n' is provided, it will not attempt to recompress ramdisk.cpio,
|
|
|
|
otherwise it will compress ramdisk.cpio and kernel with the same method
|
|
|
|
in <origbootimg> if the file provided is not already compressed.
|
|
|
|
|
|
|
|
hexpatch <file> <hexpattern1> <hexpattern2>
|
|
|
|
Search <hexpattern1> in <file>, and replace with <hexpattern2>
|
|
|
|
|
|
|
|
cpio <incpio> [commands...]
|
|
|
|
Do cpio commands to <incpio> (modifications are done directly)
|
|
|
|
Each command is a single argument, add quotes for each command
|
|
|
|
Supported commands:
|
|
|
|
exists ENTRY
|
|
|
|
Return 0 if ENTRY exists, else return 1
|
|
|
|
rm [-r] ENTRY
|
|
|
|
Remove ENTRY, specify [-r] to remove recursively
|
|
|
|
mkdir MODE ENTRY
|
|
|
|
Create directory ENTRY in permissions MODE
|
|
|
|
ln TARGET ENTRY
|
|
|
|
Create a symlink to TARGET with the name ENTRY
|
|
|
|
mv SOURCE DEST
|
|
|
|
Move SOURCE to DEST
|
|
|
|
add MODE ENTRY INFILE
|
|
|
|
Add INFILE as ENTRY in permissions MODE; replaces ENTRY if exists
|
|
|
|
extract [ENTRY OUT]
|
|
|
|
Extract ENTRY to OUT, or extract all entries to current directory
|
|
|
|
test
|
|
|
|
Test the current cpio's patch status
|
|
|
|
Return values:
|
|
|
|
0:stock 1:Magisk 2:unsupported (phh, SuperSU, Xposed)
|
2019-09-21 11:55:23 +02:00
|
|
|
patch
|
|
|
|
Apply ramdisk patches. Configure settings with env variables:
|
|
|
|
KEEPVERITY KEEPFORCEENCRYPT
|
2019-09-20 09:53:58 +02:00
|
|
|
backup ORIG
|
|
|
|
Create ramdisk backups from ORIG
|
|
|
|
restore
|
|
|
|
Restore ramdisk from ramdisk backup stored within incpio
|
|
|
|
sha1
|
|
|
|
Print stock boot SHA1 if previously backed up in ramdisk
|
|
|
|
|
2019-09-21 11:30:04 +02:00
|
|
|
dtb <input> <action> [args...]
|
|
|
|
Do dtb related actions to <input>
|
|
|
|
Supported actions:
|
2019-09-20 09:53:58 +02:00
|
|
|
print [-f]
|
2019-09-21 11:30:04 +02:00
|
|
|
Print all contents of dtb for debugging
|
2019-09-20 09:53:58 +02:00
|
|
|
Specify [-f] to only print fstab nodes
|
2019-09-21 11:30:04 +02:00
|
|
|
patch [OUT]
|
2019-09-20 09:53:58 +02:00
|
|
|
Search for fstab and remove verity/avb
|
2019-09-21 11:30:04 +02:00
|
|
|
If [OUT] is not specified, it will directly output to <input>
|
2019-09-22 12:45:23 +02:00
|
|
|
Configure with env variables: KEEPVERITY TWOSTAGEINIT
|
2019-09-20 09:53:58 +02:00
|
|
|
|
|
|
|
compress[=method] <infile> [outfile]
|
|
|
|
Compress <infile> with [method] (default: gzip), optionally to [outfile]
|
|
|
|
<infile>/[outfile] can be '-' to be STDIN/STDOUT
|
|
|
|
Supported methods: )EOF", arg0);
|
|
|
|
|
2019-03-07 13:24:06 +01:00
|
|
|
for (auto &it : name2fmt)
|
|
|
|
fprintf(stderr, "%s ", it.first.data());
|
2019-09-20 09:53:58 +02:00
|
|
|
|
|
|
|
fprintf(stderr, R"EOF(
|
|
|
|
|
|
|
|
decompress <infile> [outfile]
|
|
|
|
Detect method and decompress <infile>, optionally to [outfile]
|
|
|
|
<infile>/[outfile] can be '-' to be STDIN/STDOUT
|
|
|
|
Supported methods: )EOF");
|
|
|
|
|
2019-03-07 13:24:06 +01:00
|
|
|
for (auto &it : name2fmt)
|
|
|
|
fprintf(stderr, "%s ", it.first.data());
|
2019-09-20 09:53:58 +02:00
|
|
|
|
|
|
|
fprintf(stderr, R"EOF(
|
|
|
|
|
|
|
|
sha1 <file>
|
|
|
|
Print the SHA1 checksum for <file>
|
|
|
|
|
|
|
|
cleanup
|
|
|
|
Cleanup the current working directory
|
|
|
|
|
|
|
|
)EOF");
|
2017-03-07 17:54:23 +01:00
|
|
|
|
2017-02-24 20:29:12 +01:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2017-02-24 07:58:44 +01:00
|
|
|
int main(int argc, char *argv[]) {
|
2018-10-25 03:08:06 +02:00
|
|
|
cmdline_logging();
|
2017-12-03 20:14:04 +01:00
|
|
|
umask(0);
|
2019-03-07 13:24:06 +01:00
|
|
|
|
2019-03-08 00:07:23 +01:00
|
|
|
if (argc < 2)
|
|
|
|
usage(argv[0]);
|
|
|
|
|
|
|
|
// Skip '--' for backwards compatibility
|
2019-06-16 00:59:57 +02:00
|
|
|
string_view action(argv[1]);
|
|
|
|
if (str_starts(action, "--"))
|
|
|
|
action = argv[1] + 2;
|
2019-03-08 00:07:23 +01:00
|
|
|
|
2019-06-16 00:59:57 +02:00
|
|
|
if (action == "cleanup") {
|
2017-12-20 20:36:18 +01:00
|
|
|
fprintf(stderr, "Cleaning up...\n");
|
2019-03-08 03:32:01 +01:00
|
|
|
unlink(HEADER_FILE);
|
2017-09-14 17:11:56 +02:00
|
|
|
unlink(KERNEL_FILE);
|
|
|
|
unlink(RAMDISK_FILE);
|
|
|
|
unlink(SECOND_FILE);
|
2019-03-13 21:51:22 +01:00
|
|
|
unlink(KER_DTB_FILE);
|
2017-10-07 16:08:10 +02:00
|
|
|
unlink(EXTRA_FILE);
|
2018-10-25 03:08:49 +02:00
|
|
|
unlink(RECV_DTBO_FILE);
|
2019-03-13 21:51:22 +01:00
|
|
|
unlink(DTB_FILE);
|
2019-06-16 00:59:57 +02:00
|
|
|
} else if (argc > 2 && action == "sha1") {
|
2018-01-29 08:34:05 +01:00
|
|
|
uint8_t sha1[SHA_DIGEST_SIZE];
|
|
|
|
void *buf;
|
2017-03-09 21:08:17 +01:00
|
|
|
size_t size;
|
2019-02-25 05:09:34 +01:00
|
|
|
mmap_ro(argv[2], buf, size);
|
2018-01-29 08:34:05 +01:00
|
|
|
SHA_hash(buf, size, sha1);
|
2019-03-07 13:24:06 +01:00
|
|
|
for (uint8_t i : sha1)
|
|
|
|
printf("%02x", i);
|
2017-07-24 20:02:19 +02:00
|
|
|
printf("\n");
|
2017-03-09 21:08:17 +01:00
|
|
|
munmap(buf, size);
|
2019-06-16 00:59:57 +02:00
|
|
|
} else if (argc > 2 && action == "unpack") {
|
|
|
|
if (argv[2] == "-h"sv) {
|
2019-03-08 03:32:01 +01:00
|
|
|
if (argc == 3)
|
|
|
|
usage(argv[0]);
|
|
|
|
return unpack(argv[3], true);
|
|
|
|
} else {
|
|
|
|
return unpack(argv[2]);
|
|
|
|
}
|
2019-06-16 03:12:12 +02:00
|
|
|
} else if (argc > 2 && action == "repack") {
|
2019-06-16 00:59:57 +02:00
|
|
|
if (argv[2] == "-n"sv) {
|
|
|
|
if (argc == 3)
|
2019-06-07 20:56:20 +02:00
|
|
|
usage(argv[0]);
|
|
|
|
repack(argv[3], argv[4] ? argv[4] : NEW_BOOT, true);
|
|
|
|
} else {
|
|
|
|
repack(argv[2], argv[3] ? argv[3] : NEW_BOOT);
|
|
|
|
}
|
2019-06-16 00:59:57 +02:00
|
|
|
} else if (argc > 2 && action == "decompress") {
|
2019-02-21 02:49:26 +01:00
|
|
|
decompress(argv[2], argv[3]);
|
2019-06-16 00:59:57 +02:00
|
|
|
} else if (argc > 2 && str_starts(action, "compress")) {
|
|
|
|
compress(action[8] == '=' ? &action[9] : "gzip", argv[2], argv[3]);
|
|
|
|
} else if (argc > 4 && action == "hexpatch") {
|
2019-06-08 14:29:30 +02:00
|
|
|
return hexpatch(argv[2], argv[3], argv[4]);
|
2019-06-16 00:59:57 +02:00
|
|
|
} else if (argc > 2 && action == "cpio"sv) {
|
|
|
|
if (cpio_commands(argc - 2, argv + 2))
|
|
|
|
usage(argv[0]);
|
2019-09-20 09:53:58 +02:00
|
|
|
} else if (argc > 2 && action == "dtb") {
|
|
|
|
if (dtb_commands(argc - 2, argv + 2))
|
2018-01-28 19:44:30 +01:00
|
|
|
usage(argv[0]);
|
2017-03-07 17:54:23 +01:00
|
|
|
} else {
|
|
|
|
usage(argv[0]);
|
2016-09-08 14:59:48 +02:00
|
|
|
}
|
2017-02-24 20:29:12 +01:00
|
|
|
|
2017-03-07 17:54:23 +01:00
|
|
|
return 0;
|
2017-02-24 07:58:44 +01:00
|
|
|
}
|