A tool for reverse engineering Android ROM images.
Mac: brew install lz4 xz
Linux: sudo apt install device-tree-compiler lz4 xz zlib1g-dev openjdk-11-jdk
Windows: Make sure you have python3
, JDK9+
and openssl
properly installed.
An easy way is to install Anaconda and Oracle JDK 11, then run the program under anaconda PowerShell.
Put your boot.img to current directory, then start gradle 'unpack' task:
cp <original_boot_image> boot.img
./gradlew unpack
Your get the flattened kernel and /root filesystem under ./build/unzip_boot:
build/unzip_boot/
├── boot.json (boot image info)
├── boot.avb.json (AVB only)
├── kernel
├── second (2nd bootloader, if exists)
├── dtb (dtb, if exists)
├── dtbo (dtbo, if exists)
└── root (extracted initramfs)
Then you can edit the actual file contents, like rootfs or kernel. Now, pack the boot.img again
./gradlew pack
You get the repacked boot.img at $(CURDIR):
boot.img.signed
Well done you did it! The last step is to star this repo :smile
Image Type | file names | |
---|---|---|
boot images | boot.img, vendor_boot.img | |
recovery images | recovery.img, recovery-two-step.img | |
vbmeta images | vbmeta.img, vbmeta_system.img etc. | |
sparse images | system.img, vendor.img etc. | |
dtbo images | dtbo.img |
Please note that the boot.img MUST follows AOSP verified boot flow, either Boot image signature in VBoot 1.0 or AVB HASH footer (a.k.a. AVB) in VBoot 2.0.
Device Model | Manufacturer | Compatible | Android Version | Note |
---|---|---|---|---|
Pixel 3 (blueline) | Y | 11 (RP1A.200720.009, 2020) |
more ... | |
Pixel 3 (blueline) | Y | Q preview (qpp2.190228.023, 2019) |
more ... | |
Pixel XL (marlin) | HTC | Y | 9.0.0 (PPR2.180905.006, Sep 2018) |
more ... |
K3 (CPH1955) | OPPO | Y for recovery.img N for boot.img |
Pie | more |
Z18 (NX606J) | ZTE | Y | 8.1.0 | more... |
Nexus 9 (volantis/flounder) | HTC | Y(with some tricks) | 7.1.1 (N9F27M, Oct 2017) | tricks |
Nexus 5x (bullhead) | LG | Y | 6.0.0_r12 (MDA89E) | |
Moto X (2013) T-Mobile | Motorola | N | ||
X7 (PD1602_A_3.12.8) | VIVO | N | ? | Issue 35 |
- recovery.img
If you are working with recovery.img, the steps are similar:
cp <your_recovery_image> recovery.img
./gradlew unpack
./gradlew pack
- vbmeta.img
cp <your_vbmeta_image> vbmeta.img
./gradlew unpack
./gradlew pack
- boot.img and vbmeta.img
cp <your_boot_image> boot.img
cp <your_vbmeta_image> vbmeta.img
./gradlew unpack
./gradlew pack
Your boot.img.signed and vbmeta.img.signd will be updated together.
- sparse vendor.img
cp <your_vendor_image> vendor.img
./gradlew unpack
./gradlew pack
You get vendor.img.unsparse, then you can mount it.
mkdir mnt
sudo mount -o ro vendor.img mnt
Read layout of Android boot.img and vendor_boot.img.
boot_signer https://android.googlesource.com/platform/system/extras
cpio / fs_config https://android.googlesource.com/platform/system/core https://www.kernel.org/doc/Documentation/early-userspace/buffer-format.txt
AVB https://android.googlesource.com/platform/external/avb/
mkbootimg https://android.googlesource.com/platform/system/tools/mkbootimg/+/refs/heads/master/
Android version list https://source.android.com/source/build-numbers.html
kernel info extractor https://android.googlesource.com/platform/build/+/refs/heads/master/tools/extract_kernel.py
mkdtboimg https://android.googlesource.com/platform/system/libufdt/
libsparse https://android.googlesource.com/platform/system/core/+/refs/heads/master/libsparse/
Android Nexus/Pixle factory images https://developers.google.cn/android/images