mirror of
https://github.com/topjohnwu/Magisk.git
synced 2024-12-03 23:15:31 +00:00
220 lines
7.5 KiB
C++
220 lines
7.5 KiB
C++
#include <base.hpp>
|
|
|
|
#include "boot-rs.hpp"
|
|
#include "magiskboot.hpp"
|
|
#include "compress.hpp"
|
|
|
|
using namespace std;
|
|
|
|
static void print_formats() {
|
|
for (int fmt = GZIP; fmt < LZOP; ++fmt) {
|
|
fprintf(stderr, "%s ", fmt2name[(format_t) fmt]);
|
|
}
|
|
}
|
|
|
|
static void usage(char *arg0) {
|
|
fprintf(stderr,
|
|
R"EOF(MagiskBoot - Boot Image Modification Tool
|
|
|
|
Usage: %s <action> [args...]
|
|
|
|
Supported actions:
|
|
unpack [-n] [-h] <bootimg>
|
|
Unpack <bootimg> to its individual components, each component to
|
|
a file with its corresponding file name in the current directory.
|
|
Supported components: kernel, kernel_dtb, ramdisk.cpio, second,
|
|
dtb, extra, and recovery_dtbo.
|
|
By default, each component will be decompressed on-the-fly.
|
|
If '-n' is provided, all decompression operations will be skipped;
|
|
each component will remain untouched, dumped in its original format.
|
|
If '-h' is provided, the boot image header information will be
|
|
dumped to the file 'header', which can be used to modify header
|
|
configurations during repacking.
|
|
Return values:
|
|
0:valid 1:error 2:chromeos
|
|
|
|
repack [-n] <origbootimg> [outbootimg]
|
|
Repack boot image components using files from the current directory
|
|
to [outbootimg], or 'new-boot.img' if not specified.
|
|
<origbootimg> is the original boot image used to unpack the components.
|
|
By default, each component will be automatically compressed using its
|
|
corresponding format detected in <origbootimg>. If a component file
|
|
in the current directory is already compressed, then no addition
|
|
compression will be performed for that specific component.
|
|
If '-n' is provided, all compression operations will be skipped.
|
|
If env variable PATCHVBMETAFLAG is set to true, all disable flags in
|
|
the boot image's vbmeta header will be set.
|
|
|
|
verify <bootimg> [x509.pem]
|
|
Check whether the boot image is signed with AVB 1.0 signature.
|
|
Optionally provide a certificate to verify whether the image is
|
|
signed by the public key certificate.
|
|
Return value:
|
|
0:valid 1:error
|
|
|
|
sign <bootimg> [name] [x509.pem pk8]
|
|
Sign <bootimg> with AVB 1.0 signature.
|
|
Optionally provide the name of the image (default: '/boot').
|
|
Optionally provide the certificate/private key pair for signing.
|
|
If the certificate/private key pair is not provided, the AOSP
|
|
verity key bundled in the executable will be used.
|
|
|
|
extract <payload.bin> [partition] [outfile]
|
|
Extract [partition] from <payload.bin> to [outfile].
|
|
If [outfile] is not specified, then output to '[partition].img'.
|
|
If [partition] is not specified, then attempt to extract either
|
|
'init_boot' or 'boot'. Which partition was chosen can be determined
|
|
by whichever 'init_boot.img' or 'boot.img' exists.
|
|
<payload.bin> can be '-' to be STDIN.
|
|
|
|
hexpatch <file> <hexpattern1> <hexpattern2>
|
|
Search <hexpattern1> in <file>, and replace it with <hexpattern2>
|
|
|
|
cpio <incpio> [commands...]
|
|
Do cpio commands to <incpio> (modifications are done in-place).
|
|
Each command is a single argument; add quotes for each command.
|
|
See "cpio --help" for supported commands.
|
|
|
|
dtb <file> <action> [args...]
|
|
Do dtb related actions to <file>
|
|
Supported actions:
|
|
print [-f]
|
|
Print all contents of dtb for debugging
|
|
Specify [-f] to only print fstab nodes
|
|
patch
|
|
Search for fstab and remove verity/avb
|
|
Modifications are done directly to the file in-place
|
|
Configure with env variables: KEEPVERITY
|
|
test
|
|
Test the fstab's status
|
|
Return values:
|
|
0:valid 1:error
|
|
|
|
split <file>
|
|
Split image.*-dtb into kernel + kernel_dtb
|
|
|
|
sha1 <file>
|
|
Print the SHA1 checksum for <file>
|
|
|
|
cleanup
|
|
Cleanup the current working directory
|
|
|
|
compress[=format] <infile> [outfile]
|
|
Compress <infile> with [format] to [outfile].
|
|
<infile>/[outfile] can be '-' to be STDIN/STDOUT.
|
|
If [format] is not specified, then gzip will be used.
|
|
If [outfile] is not specified, then <infile> will be replaced
|
|
with another file suffixed with a matching file extension.
|
|
Supported formats: )EOF", arg0);
|
|
|
|
print_formats();
|
|
|
|
fprintf(stderr, R"EOF(
|
|
|
|
decompress <infile> [outfile]
|
|
Detect format and decompress <infile> to [outfile].
|
|
<infile>/[outfile] can be '-' to be STDIN/STDOUT.
|
|
If [outfile] is not specified, then <infile> will be replaced
|
|
with another file removing its archive format file extension.
|
|
Supported formats: )EOF");
|
|
|
|
print_formats();
|
|
|
|
fprintf(stderr, "\n\n");
|
|
exit(1);
|
|
}
|
|
|
|
int main(int argc, char *argv[]) {
|
|
cmdline_logging();
|
|
umask(0);
|
|
|
|
if (argc < 2)
|
|
usage(argv[0]);
|
|
|
|
// Skip '--' for backwards compatibility
|
|
string_view action(argv[1]);
|
|
if (str_starts(action, "--"))
|
|
action = argv[1] + 2;
|
|
|
|
if (action == "cleanup") {
|
|
fprintf(stderr, "Cleaning up...\n");
|
|
unlink(HEADER_FILE);
|
|
unlink(KERNEL_FILE);
|
|
unlink(RAMDISK_FILE);
|
|
unlink(SECOND_FILE);
|
|
unlink(KER_DTB_FILE);
|
|
unlink(EXTRA_FILE);
|
|
unlink(RECV_DTBO_FILE);
|
|
unlink(DTB_FILE);
|
|
} else if (argc > 2 && action == "sha1") {
|
|
uint8_t sha1[20];
|
|
{
|
|
mmap_data m(argv[2]);
|
|
sha1_hash(m, byte_data(sha1, sizeof(sha1)));
|
|
}
|
|
for (uint8_t i : sha1)
|
|
printf("%02x", i);
|
|
printf("\n");
|
|
} else if (argc > 2 && action == "split") {
|
|
return split_image_dtb(argv[2]);
|
|
} else if (argc > 2 && action == "unpack") {
|
|
int idx = 2;
|
|
bool nodecomp = false;
|
|
bool hdr = false;
|
|
for (;;) {
|
|
if (idx >= argc)
|
|
usage(argv[0]);
|
|
if (argv[idx][0] != '-')
|
|
break;
|
|
for (char *flag = &argv[idx][1]; *flag; ++flag) {
|
|
if (*flag == 'n')
|
|
nodecomp = true;
|
|
else if (*flag == 'h')
|
|
hdr = true;
|
|
else
|
|
usage(argv[0]);
|
|
}
|
|
++idx;
|
|
}
|
|
return unpack(argv[idx], nodecomp, hdr);
|
|
} else if (argc > 2 && action == "repack") {
|
|
if (argv[2] == "-n"sv) {
|
|
if (argc == 3)
|
|
usage(argv[0]);
|
|
repack(argv[3], argv[4] ? argv[4] : NEW_BOOT, true);
|
|
} else {
|
|
repack(argv[2], argv[3] ? argv[3] : NEW_BOOT);
|
|
}
|
|
} else if (argc > 2 && action == "verify") {
|
|
return verify(argv[2], argv[3]);
|
|
} else if (argc > 2 && action == "sign") {
|
|
if (argc == 5) usage(argv[0]);
|
|
return sign(
|
|
argv[2],
|
|
argc > 3 ? argv[3] : "/boot",
|
|
argc > 5 ? argv[4] : nullptr,
|
|
argc > 5 ? argv[5] : nullptr);
|
|
} else if (argc > 2 && action == "decompress") {
|
|
decompress(argv[2], argv[3]);
|
|
} else if (argc > 2 && str_starts(action, "compress")) {
|
|
compress(action[8] == '=' ? &action[9] : "gzip", argv[2], argv[3]);
|
|
} else if (argc > 4 && action == "hexpatch") {
|
|
return hexpatch(byte_view(argv[2]), byte_view(argv[3]), byte_view(argv[4])) ? 0 : 1;
|
|
} else if (argc > 2 && action == "cpio") {
|
|
return rust::cpio_commands(argc - 2, argv + 2) ? 0 : 1;
|
|
} else if (argc > 3 && action == "dtb") {
|
|
if (dtb_commands(argc - 2, argv + 2))
|
|
usage(argv[0]);
|
|
} else if (argc > 2 && action == "extract") {
|
|
return rust::extract_boot_from_payload(
|
|
argv[2],
|
|
argc > 3 ? argv[3] : nullptr,
|
|
argc > 4 ? argv[4] : nullptr
|
|
) ? 0 : 1;
|
|
} else {
|
|
usage(argv[0]);
|
|
}
|
|
|
|
return 0;
|
|
}
|