Bug#884557: diffoscope: please support Android ROM boot.img introspection

Simon Josefsson simon at josefsson.org
Sat Dec 16 19:22:42 UTC 2017


Package: diffoscope
Version: 88
Severity: wishlist

Hello.  I'd like to see reproducible builds of Replicant (an Android
clone), and diffoscope support for Android boot.img files would be
useful.  See diffoscope --debug output below.

It can be done through <https://tracker.debian.org/pkg/abootimg>, see
ideas here <http://k.japko.eu/boot-img-manipulation.html>.  Use the -i
parameter to display info about the image, and -x to extract its
components.  I tested and the resulting initrd.img can be diffoscope'd
further already.

Cheers,
/Simon
-------------- next part --------------
2017-12-16 18:36:57 D: diffoscope.presenters.formats: Will generate the following formats: text
2017-12-16 18:36:57 D: diffoscope.main: Starting diffoscope 88
2017-12-16 18:36:57 D: diffoscope.locale: Normalising locale, timezone, etc.
2017-12-16 18:36:57 D: diffoscope.main: Starting comparison
2017-12-16 18:36:57 D: diffoscope.comparators: Loaded 62 comparator classes
2017-12-16 18:36:57 D: diffoscope.comparators.utils.specialize: Unidentified file. Magic says: Android bootimg, kernel (0x40008000), ramdisk (0x41000000), page size: 2048, cmdline (console=ttySAC2,115200)
2017-12-16 18:36:57 D: diffoscope.comparators.utils.specialize: Unidentified file. Magic says: Android bootimg, kernel (0x40008000), ramdisk (0x41000000), page size: 2048, cmdline (console=ttySAC2,115200)
2017-12-16 18:36:57 D: diffoscope.comparators.utils.compare: Comparing 2/boot.img (FilesystemFile) and 3/boot.img (FilesystemFile)
2017-12-16 18:36:57 D: diffoscope.comparators.utils.file: File.has_same_content: <<class 'diffoscope.comparators.binary.FilesystemFile'> 2/boot.img> <<class 'diffoscope.comparators.binary.FilesystemFile'> 3/boot.img>
2017-12-16 18:36:57 D: diffoscope.comparators.utils.specialize: Unidentified file. Magic says: Android bootimg, kernel (0x40008000), ramdisk (0x41000000), page size: 2048, cmdline (console=ttySAC2,115200)
2017-12-16 18:36:57 D: diffoscope.comparators.utils.specialize: Unidentified file. Magic says: Android bootimg, kernel (0x40008000), ramdisk (0x41000000), page size: 2048, cmdline (console=ttySAC2,115200)
2017-12-16 18:36:57 D: diffoscope.comparators.utils.command: Executing xxd 2/boot.img
2017-12-16 18:36:57 D: diffoscope.comparators.utils.command: Executing xxd 3/boot.img
2017-12-16 18:36:57 D: diffoscope.diff: Running diff -aU7 /tmp/tmpx1bwiuyq_diffoscope/fifo1 /tmp/tmpx1bwiuyq_diffoscope/fifo2
2017-12-16 18:36:58 D: diffoscope.comparators.utils.command: xxd 2/boot.img returned (exit code: 0)
2017-12-16 18:36:59 D: diffoscope.comparators.utils.command: xxd 3/boot.img returned (exit code: 0)
2017-12-16 18:37:01 D: diffoscope.diff: diff -aU7 /tmp/tmpx1bwiuyq_diffoscope/fifo1 /tmp/tmpx1bwiuyq_diffoscope/fifo2: returncode 1, parsed True
2017-12-16 18:37:01 D: diffoscope.presenters.formats: Generating 'text' output at '-'
--- 2/boot.img
+++ 3/boot.img
@@ -1,9 +1,9 @@
-00000000: 414e 4452 4f49 4421 4855 3300 0080 0040  ANDROID!HU3....@
-00000010: 9fde 0c00 0000 0041 0000 0000 0000 f040  .......A.......@
+00000000: 414e 4452 4f49 4421 e84e 3300 0080 0040  ANDROID!.N3....@
+00000010: f7df 0c00 0000 0041 0000 0000 0000 f040  .......A.......@
 00000020: 0001 0040 0008 0000 0000 0000 0000 0000  ... at ............
 00000030: 0000 0000 0000 0000 0000 0000 0000 0000  ................
 00000040: 636f 6e73 6f6c 653d 7474 7953 4143 322c  console=ttySAC2,
 00000050: 3131 3532 3030 0000 0000 0000 0000 0000  115200..........
 00000060: 0000 0000 0000 0000 0000 0000 0000 0000  ................
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 487 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/reproducible-builds/attachments/20171216/2e2bee9a/attachment.sig>


More information about the Reproducible-builds mailing list