-
-
Notifications
You must be signed in to change notification settings - Fork 221
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Android OTA payload.bin extraction #233
Comments
Looks quite interesting and should not too hard to integrate this feature into EMBA. Is EMBA currently able to extract something useful from such a payload file? |
If you have a full installation of EMBA up and running you could give it a try over here: https://github.com/m-1-k-3/emba Please note that you currently have to install the needed deps manually and it is only running in dev mode (./installer.sh -F):
In my initial testrun it looks not too bad. It extracts the ota update but fails with the ext extractor afterwards. I will take a deeper look into this issue the next days. |
Merged in master. Docker container updated. |
Hi, I tried the code on a ota.zip file and on a plain payload.bin. It looks like the OTA extractor only triggers on a top level payload.bin and not when inside a zip. I am not 100% sure because I also got the "Extractor needs too much disk space" message. anyway: It looks like the installation of the dependencies is not yet working
|
|
I will do a check on this during the next days ... |
As far as I can see bsdiff4 is missing on your system. In the docker container you will find a working installation of it. So, you can use the official docker image and everything should works as expected. Regarding your local installation I am wondering as the bsdiff4 package should be installed via the installer module Could you please verify your local installation and the state of the package:
The deep extraction mode for ota updates is fixed in #246 |
Is your feature request related to a problem? Please describe.
"Modern" android OTA updates contain a file called payload.bin that start with a magic "CrAU"
While emba does find some part of the file it would be nice to have full support for this (common) file format
Describe the solution you'd like
Starting from a zip obtained from
https://developers.google.com/android/ota
oriole-ota-sd1a.210817.015.a4-19a77b62.zip
https://dl.google.com/dl/android/aosp/oriole-ota-sd1a.210817.015.a4-19a77b62.zip
git clone https://github.com/vm03/payload_dumper.git
cd payload_dumper
pip install -r requirements.txt
unzip ../oriole-ota-sd1a.210817.015.a4-19a77b62.zip
python payload_dumper.py payload.bin
The result is found in output
file output/*.img
It would be nice to integrate this .
Describe alternatives you've considered
Manual work
Additional context
https://www.thecustomdroid.com/how-to-extract-android-payload-bin-file/
The text was updated successfully, but these errors were encountered: