Code Monkey home page Code Monkey logo

android_universal's Issues

hello

pc@PC:~/android_universal$ ./makeramdisk.sh -filename boot.img
Traceback (most recent call last):
File "root/scripts/makeramdisk.py", line 20, in
from bootsignature import sign, verify
File "/home/pc/android_universal/root/scripts/bootsignature.py", line 18, in
from pyasn1_modules import rfc2459, rfc4055
ImportError: cannot import name 'rfc4055' from 'pyasn1_modules' (/usr/lib/python3/dist-packages/pyasn1_modules/init.py)

ModuleNotFoundError: No module named 'Crypto.Util.asn1'

android_universal$ ./makeramdisk.sh -filename boot.img
Traceback (most recent call last):
File "root/scripts/makeramdisk.py", line 17, in
from Library.utils import del_rw, getheader, run_command, rsa,
File "/home/sapphire/ๆกŒ้ข/android_universal/android_universal/root/scripts/Library/utils.py", line 5, in
from Crypto.Util.asn1 import DerSequence
ModuleNotFoundError: No module named 'Crypto.Util.asn1'

Android 11: Could not open file init@0750, init.rc@0750: No such file or directory

Xiaomi A3

Firmware:

https://bigota.d.miui.com/V12.0.3.0.RFQEUXM/laurel_sprout_eea_global_images_V12.0.3.0.RFQEUXM_20210129.0000.00_11.0_e5463f39f1.tgz

Makeramdisk Android v3.30 (c) B. Kerler 2019-2021
---------------------------------------------

Linux/Mac detected.
32Bit detected
Target: Boot
AVBv2 signature detected.

Signature-RSA-Modulus (n):	ee6953a810e208a71441e2c963d31b8a4fbb76cabbc3cef1d084e02533cbf3fab9d1fffea2989f844f4eff74cbc013cf7714ce4b9c540b35c509f856081a36d8773142552604adf553abde9edfbfecc554fce99bb3dfddaaf0e064638505ce935dc30cd6aba27ed2d02c132bbbefc10221388f71e4c982897b231ce32258c771c2b77df3fd7507f5173881e8105339004a8f6e89d8a0aab529973372a4e06795d3074231951472e5971abb745239ab0fec476bc8d28fdf9845bec159ef917d8097b6aac06ab79efd0db81809b89d2ce70e37d21f84f9d0988d06469e39ff5867042587aec9b4565bb9e50fe69ae54377979ae6dd7687670342dd0e4389a28047bcc64033fef7f805adb1fd78e6f31151db6ebe3e43a7db2147e907681a01efc910daf51cad3ede7ad4329eb1f54edc295f35ea01fcc745fbf5b70da272f3e78c5615ee6de78cd72b6f4e41c7fa0cbea2b3af1f7d9026445ae566f2e9f7802fee716f5c5e4001fa89d34277c96de4b95dc6c43dc664b90d1bec17a90927189ccae538c482958625f0e3cd2b9efa6116b6290c5d5846ddba48a134885a66104dfeda9db33036c36f7ad2b3bbd1e92d9630553cfea6da3713e62574b293227abb392ada99f1ccbef94ae1be0d265a2b8f727b9ee0bed6e7d95ff5b255964685ac17ce1efc4c7609a6ac70a065df76efccc9ad80e014ad7b9288f04aaaaac0292815
Signature-n0inv: 			3720533641
Unpacking image : boot.img to tmp
- Unpacking initramfs to tmp/ramdisk
- Doing our stuff
- Copying needed binaries
- Injecting rootshell
sed: can't read tmp/ramdisk/init.rc@0750: No such file or directory
sed: can't read tmp/ramdisk/init.rc@0750: No such file or directory
- Injecting adb
- Patching init
Could not open file tmp/ramdisk/init@0750 for writing

Could not open file tmp/ramdisk/init@0750 for writing

Could not open file tmp/ramdisk/init@0750 for writing

Could not open file tmp/ramdisk/init@0750 for writing

Bootimage will try to boot !
Packing image as boot.img.patched
error: cannot open directory 'tmp/ramdisk/acct'
Found key: key/testkey_rsa4096.pk8.
Signing AVBv2 using key...
writing RSA key
Done :D

Ramdisk file list:

./init.recovery.qcom.rc
./miui.factoryreset.fstab
./miui.factoryreset.rc
./odm_file_contexts
./odm_property_contexts
./plat_file_contexts
./plat_property_contexts
./product_file_contexts
./product_property_contexts
./prop.default
./sepolicy
./system_ext_file_contexts
./system_ext_property_contexts
./vendor_file_contexts
./vendor_property_contexts
./verity_key
./acct
./apex
./config
./data
./data_mirror
./debug_ramdisk
./dev
./linkerconfig
./metadata
./mnt
./odm
./oem
./postinstall
./proc
./product
./res
./res/images
./res/images/erasing_text.png
./res/images/error_text.png
./res/images/fastbootd.png
./res/images/font.png
./res/images/icon_error.png
./res/images/installing_security_text.png
./res/images/installing_text.png
./res/images/loop00000.png
./res/images/loop00001.png
./res/images/loop00002.png
./res/images/loop00003.png
./res/images/loop00004.png
./res/images/loop00005.png
./res/images/loop00006.png
./res/images/loop00007.png
./res/images/loop00008.png
./res/images/loop00009.png
./res/images/loop00010.png
./res/images/loop00011.png
./res/images/loop00012.png
./res/images/loop00013.png
./res/images/loop00014.png
./res/images/loop00015.png
./res/images/loop00016.png
./res/images/loop00017.png
./res/images/loop00018.png
./res/images/loop00019.png
./res/images/loop00020.png
./res/images/loop00021.png
./res/images/loop00022.png
./res/images/loop00023.png
./res/images/loop00024.png
./res/images/loop00025.png
./res/images/loop00026.png
./res/images/loop00027.png
./res/images/loop00028.png
./res/images/loop00029.png
./res/images/loop00030.png
./res/images/loop00031.png
./res/images/loop00032.png
./res/images/loop00033.png
./res/images/loop00034.png
./res/images/loop00035.png
./res/images/loop00036.png
./res/images/loop00037.png
./res/images/loop00038.png
./res/images/loop00039.png
./res/images/loop00040.png
./res/images/loop00041.png
./res/images/loop00042.png
./res/images/loop00043.png
./res/images/loop00044.png
./res/images/loop00045.png
./res/images/loop00046.png
./res/images/loop00047.png
./res/images/loop00048.png
./res/images/loop00049.png
./res/images/loop00050.png
./res/images/loop00051.png
./res/images/loop00052.png
./res/images/loop00053.png
./res/images/loop00054.png
./res/images/loop00055.png
./res/images/loop00056.png
./res/images/loop00057.png
./res/images/loop00058.png
./res/images/loop00059.png
./res/images/loop00060.png
./res/images/loop00061.png
./res/images/loop00062.png
./res/images/loop00063.png
./res/images/loop00064.png
./res/images/loop00065.png
./res/images/loop00066.png
./res/images/loop00067.png
./res/images/loop00068.png
./res/images/loop00069.png
./res/images/loop00070.png
./res/images/loop00071.png
./res/images/loop00072.png
./res/images/loop00073.png
./res/images/loop00074.png
./res/images/loop00075.png
./res/images/loop00076.png
./res/images/loop00077.png
./res/images/loop00078.png
./res/images/loop00079.png
./res/images/loop00080.png
./res/images/loop00081.png
./res/images/loop00082.png
./res/images/loop00083.png
./res/images/loop00084.png
./res/images/loop00085.png
./res/images/loop00086.png
./res/images/loop00087.png
./res/images/loop00088.png
./res/images/loop00089.png
./res/images/loop00090.png
./res/images/no_command_text.png
./res/images/progress_empty.png
./res/images/progress_fill.png
./res/images/stage_empty.png
./res/images/stage_fill.png
./sdcard
./storage
./sys
./system
./system/bin
./system/bin/adbd
./system/bin/charger
./system/bin/e2fsdroid
./system/bin/init
./system/bin/linker64
./system/bin/make_f2fs
./system/bin/minadbd
./system/bin/mke2fs
./system/bin/reboot
./system/bin/recovery
./system/bin/sh
./system/bin/sload_f2fs
./system/bin/toolbox
./system/bin/toybox
./system/bin/update_engine_sideload
./system/bin/watchdogd
./system/etc
./system/etc/cgroups.json
./system/etc/ld.config.txt
./system/etc/mke2fs.conf
./system/etc/recovery.fstab
./system/etc/ueventd.rc
./system/etc/init
./system/etc/init/hw
./system/etc/init/hw/init.rc
./system/etc/security
./system/etc/security/otacerts.zip
./system/lib64
./system/lib64/[email protected]
./system/lib64/[email protected]
./system/lib64/[email protected]
./system/lib64/[email protected]
./system/lib64/[email protected]
./system/lib64/ld-android.so
./system/lib64/libadb_protos.so
./system/lib64/libadbd_auth.so
./system/lib64/libadbd_fs.so
./system/lib64/libbacktrace.so
./system/lib64/libbase.so
./system/lib64/libboot_control_qti.so
./system/lib64/libbootloader_message.so
./system/lib64/libc++.so
./system/lib64/libc.so
./system/lib64/libcgrouprc.so
./system/lib64/libcrypto.so
./system/lib64/libcrypto_utils.so
./system/lib64/libcutils.so
./system/lib64/libdl.so
./system/lib64/libext2_blkid.so
./system/lib64/libext2_com_err.so
./system/lib64/libext2_e2p.so
./system/lib64/libext2_misc.so
./system/lib64/libext2_quota.so
./system/lib64/libext2_uuid.so
./system/lib64/libext2fs.so
./system/lib64/libext4_utils.so
./system/lib64/libfec.so
./system/lib64/libfs_mgr.so
./system/lib64/libfusesideload.so
./system/lib64/libgsi.so
./system/lib64/libhardware.so
./system/lib64/libhidl-gen-utils.so
./system/lib64/libhidlbase.so
./system/lib64/libion.so
./system/lib64/libjsoncpp.so
./system/lib64/libkeyutils.so
./system/lib64/liblog.so
./system/lib64/liblogwrap.so
./system/lib64/liblp.so
./system/lib64/liblzma.so
./system/lib64/libm.so
./system/lib64/libpackagelistparser.so
./system/lib64/libpcre2.so
./system/lib64/libpng.so
./system/lib64/libprocessgroup.so
./system/lib64/libprocessgroup_setup.so
./system/lib64/libprotobuf-cpp-lite.so
./system/lib64/librecovery_ui.so
./system/lib64/librecovery_ui_ext.so
./system/lib64/librecovery_updater.so
./system/lib64/libselinux.so
./system/lib64/libsparse.so
./system/lib64/libsquashfs_utils.so
./system/lib64/libtinyxml2.so
./system/lib64/libunwindstack.so
./system/lib64/libutils.so
./system/lib64/libz.so
./system/lib64/libziparchive.so
./system/lib64/hw
./system/lib64/hw/[email protected]
./system/lib64/hw/[email protected]
./tmp
./vendor

Anyone already solved this?

BrokenPipeError: [Errno 32] Broken pipe

Hello,

I have tried your program on Ubuntu 20.04 with Python 3.9.5 then 3.7.5. There is a broken pipe error that pops out when the ramdisk is unpacking to tmp.

image

Have you any idea to circumvent the problem ? (Already tried to add signal(SIGPIPE, SIG_DFL) but as you may know, this doesn't really fix the error)

EDIT : boot.img frop Fairphone 3, Android 10, A/B device.

Could not use this tool

kayshinonome@latitude-e6430 ~/Code/android_universal $ ./makeramdisk.sh -filename boot.img

Makeramdisk Android v3.30 (c) B. Kerler 2019-2021
---------------------------------------------

Linux/Mac detected.
32Bit detected
Target: Boot
AVBv2 signature detected.
VBMeta-Image-Hash: 			b6e4870834085deeee714c7161e2d8beb59c1f8ea5e9000ac2f50b1612d11139

Signature-RSA-Modulus (n):	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
Signature-n0inv: 			2995684981
Unpacking image : boot.img to tmp
- Unpacking initramfs to tmp/ramdisk
Traceback (most recent call last):
  File "/home/kayshinonome/Code/android_universal/root/scripts/makeramdisk.py", line 850, in <module>
    main()
  File "/home/kayshinonome/Code/android_universal/root/scripts/makeramdisk.py", line 846, in main
    rdm.go(args, BOOTPATH, param)
  File "/home/kayshinonome/Code/android_universal/root/scripts/makeramdisk.py", line 676, in go
    self.unpack_initfs("rd.gz", self.RAMDISK)
  File "/home/kayshinonome/Code/android_universal/root/scripts/makeramdisk.py", line 265, in unpack_initfs
    rdcpio = self.guz(os.path.join(self.RPATH, filename))
  File "/home/kayshinonome/Code/android_universal/root/scripts/makeramdisk.py", line 248, in guz
    with gzip.open(filename, 'rb') as f:
  File "/usr/lib/python3.9/gzip.py", line 58, in open
    binary_file = GzipFile(filename, gz_mode, compresslevel)
  File "/usr/lib/python3.9/gzip.py", line 173, in __init__
    fileobj = self.myfileobj = builtins.open(filename, mode or 'rb')
FileNotFoundError: [Errno 2] No such file or directory: 'tmp/rd.gz'

My boot.img boot.zip
My vbmeta.img vbmeta.zip

broken pipe issue

Linux/Mac detected.
32Bit detected
Target: Boot
AVBv2 signature detected.
Unpacking image : boot.img to tmp

  • Unpacking initramfs to tmp/ramdisk
    Traceback (most recent call last):
    File "/media/josol/VENTOY/boot to root/android_universal-master/root/scripts/makeramdisk.py", line 850, in
    main()
    File "/media/josol/VENTOY/boot to root/android_universal-master/root/scripts/makeramdisk.py", line 846, in main
    rdm.go(args, BOOTPATH, param)
    File "/media/josol/VENTOY/boot to root/android_universal-master/root/scripts/makeramdisk.py", line 676, in go
    self.unpack_initfs("rd.gz", self.RAMDISK)
    File "/media/josol/VENTOY/boot to root/android_universal-master/root/scripts/makeramdisk.py", line 268, in unpack_initfs
    p.stdin.write(rdcpio)
    BrokenPipeError: [Errno 32] Broken pipe

Couldn't find any valid sepolicy file. Aborting....

Linux/Mac detected.
32Bit detected
Target: Boot
Unpacking image : boot.img to tmp

  • Unpacking initramfs to tmp/ramdisk
  • Doing our stuff
  • Copying needed binaries
    Couldn't find any valid sepolicy file. Aborting....
  • Injecting rootshell
    sed: can't read tmp/ramdisk/init.rc@0750: No such file or directory
    sed: can't read tmp/ramdisk/init.rc@0750: No such file or directory
  • Injecting adb
  • Patching init
    Bootimage will try to boot !
    Packing image as boot.img.patched
    Traceback (most recent call last):
    File "/root/android_universal/root/scripts/makeramdisk.py", line 850, in
    main()
    File "/root/android_universal/root/scripts/makeramdisk.py", line 846, in main
    rdm.go(args, BOOTPATH, param)
    File "/root/android_universal/root/scripts/makeramdisk.py", line 685, in go
    self.pack_image()
    File "/root/android_universal/root/scripts/makeramdisk.py", line 284, in pack_image
    self.header.pack(self.RPATH, self.TARGET)
    File "/root/android_universal/root/scripts/makeramdisk.py", line 143, in pack
    out.write(struct.pack('<I', self.hdrsize))
    AttributeError: 'androidhdr' object has no attribute 'hdrsize'

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.