Magisk/scripts/util_functions.sh

748 lines
19 KiB
Bash
Raw Normal View History

############################################
2017-06-19 00:15:44 +08:00
# Magisk General Utility Functions
############################################
2017-06-19 00:15:44 +08:00
2019-02-24 02:11:11 -05:00
#MAGISK_VERSION_STUB
###################
# Global Variables
###################
# True if the script is running on booted Android, not something like recovery
# BOOTMODE=
# The path to store temporary files that don't need to persist
# TMPDIR=
# The path to store files that can be persisted (non-volatile storage)
# Any modification to this variable should go through the function `set_nvbase`
# NVBASE=
# The non-volatile path where magisk executables are stored
# MAGISKBIN=
2019-02-11 17:14:07 -05:00
###################
# Helper Functions
###################
2017-07-11 01:54:11 +08:00
2019-02-11 17:14:07 -05:00
ui_print() {
if $BOOTMODE; then
echo "$1"
else
echo -e "ui_print $1\nui_print" >> /proc/self/fd/$OUTFD
fi
2019-02-11 17:14:07 -05:00
}
2018-01-01 16:46:28 +08:00
2019-02-11 17:14:07 -05:00
toupper() {
echo "$@" | tr '[:lower:]' '[:upper:]'
}
2019-02-11 17:14:07 -05:00
grep_cmdline() {
local REGEX="s/^$1=//p"
{ echo $(cat /proc/cmdline)$(sed -e 's/[^"]//g' -e 's/""//g' /proc/cmdline) | xargs -n 1; \
sed -e 's/ = /=/g' -e 's/, /,/g' -e 's/"//g' /proc/bootconfig; \
} 2>/dev/null | sed -n "$REGEX"
2019-02-11 17:14:07 -05:00
}
grep_prop() {
local REGEX="s/^$1=//p"
shift
local FILES=$@
[ -z "$FILES" ] && FILES='/system/build.prop'
cat $FILES 2>/dev/null | dos2unix | sed -n "$REGEX" | head -n 1
2019-02-11 17:14:07 -05:00
}
grep_get_prop() {
local result=$(grep_prop $@)
if [ -z "$result" ]; then
# Fallback to getprop
getprop "$1"
else
echo $result
fi
}
2019-02-11 17:14:07 -05:00
getvar() {
local VARNAME=$1
local VALUE
local PROPPATH='/data/.magisk /cache/.magisk'
[ ! -z $MAGISKTMP ] && PROPPATH="$MAGISKTMP/.magisk/config $PROPPATH"
VALUE=$(grep_prop $VARNAME $PROPPATH)
[ ! -z $VALUE ] && eval $VARNAME=\$VALUE
2019-02-11 17:14:07 -05:00
}
is_mounted() {
grep -q " $(readlink -f $1) " /proc/mounts 2>/dev/null
2019-02-11 17:14:07 -05:00
return $?
}
abort() {
ui_print "$1"
$BOOTMODE || recovery_cleanup
[ ! -z $MODPATH ] && rm -rf $MODPATH
rm -rf $TMPDIR
2019-02-11 17:14:07 -05:00
exit 1
}
set_nvbase() {
NVBASE="$1"
MAGISKBIN="$1/magisk"
2019-02-11 17:14:07 -05:00
}
print_title() {
local len line1len line2len bar
line1len=$(echo -n $1 | wc -c)
line2len=$(echo -n $2 | wc -c)
len=$line2len
[ $line1len -gt $line2len ] && len=$line1len
len=$((len + 2))
bar=$(printf "%${len}s" | tr ' ' '*')
ui_print "$bar"
ui_print " $1 "
[ "$2" ] && ui_print " $2 "
ui_print "$bar"
}
2019-02-11 17:14:07 -05:00
######################
# Environment Related
######################
2017-10-31 17:05:24 +08:00
2018-08-28 22:03:12 -04:00
setup_flashable() {
2019-02-24 02:11:11 -05:00
ensure_bb
$BOOTMODE && return
2018-07-07 17:48:05 +08:00
if [ -z $OUTFD ] || readlink /proc/$$/fd/$OUTFD | grep -q /tmp; then
# We will have to manually find out OUTFD
2023-08-28 18:35:20 -07:00
for FD in $(ls /proc/$$/fd); do
2018-07-07 17:48:05 +08:00
if readlink /proc/$$/fd/$FD | grep -q pipe; then
if ps | grep -v grep | grep -qE " 3 $FD |status_fd=$FD"; then
2017-07-10 00:17:34 +08:00
OUTFD=$FD
break
fi
fi
done
fi
recovery_actions
2017-07-10 00:17:34 +08:00
}
2019-02-24 02:11:11 -05:00
ensure_bb() {
if set -o | grep -q standalone; then
# We are definitely in busybox ash
set -o standalone
return
fi
# Find our busybox binary
local bb
if [ -f $TMPDIR/busybox ]; then
bb=$TMPDIR/busybox
elif [ -f $MAGISKBIN/busybox ]; then
bb=$MAGISKBIN/busybox
2019-02-11 17:14:07 -05:00
else
abort "! Cannot find BusyBox"
2019-02-11 17:14:07 -05:00
fi
chmod 755 $bb
# Busybox could be a script, make sure /system/bin/sh exists
if [ ! -f /system/bin/sh ]; then
umount -l /system 2>/dev/null
mkdir -p /system/bin
ln -s $(command -v sh) /system/bin/sh
fi
export ASH_STANDALONE=1
# Find our current arguments
# Run in busybox environment to ensure consistent results
# /proc/<pid>/cmdline shall be <interpreter> <script> <arguments...>
local cmds="$($bb sh -c "
for arg in \$(tr '\0' '\n' < /proc/$$/cmdline); do
if [ -z \"\$cmds\" ]; then
# Skip the first argument as we want to change the interpreter
cmds=\"sh\"
else
cmds=\"\$cmds '\$arg'\"
fi
done
echo \$cmds")"
# Re-exec our script
echo $cmds | $bb xargs $bb
exit
2017-06-19 00:15:44 +08:00
}
2019-02-11 17:14:07 -05:00
recovery_actions() {
# Make sure random won't get blocked
2019-02-11 17:14:07 -05:00
mount -o bind /dev/urandom /dev/random
# Unset library paths
OLD_LD_LIB=$LD_LIBRARY_PATH
OLD_LD_PRE=$LD_PRELOAD
2019-02-24 02:11:11 -05:00
OLD_LD_CFG=$LD_CONFIG_FILE
2019-02-11 17:14:07 -05:00
unset LD_LIBRARY_PATH
unset LD_PRELOAD
2019-02-24 02:11:11 -05:00
unset LD_CONFIG_FILE
2019-02-11 17:14:07 -05:00
}
recovery_cleanup() {
local DIR
2019-02-11 17:14:07 -05:00
ui_print "- Unmounting partitions"
2023-07-17 18:58:48 -07:00
(
if [ ! -d /postinstall/tmp ]; then
umount -l /system
umount -l /system_root
fi
umount -l /vendor
umount -l /persist
umount -l /metadata
for DIR in /apex /system /system_root; do
if [ -L "${DIR}_link" ]; then
rmdir $DIR
mv -f ${DIR}_link $DIR
fi
done
2023-07-17 18:58:48 -07:00
umount -l /dev/random
) 2>/dev/null
[ -z $OLD_LD_LIB ] || export LD_LIBRARY_PATH=$OLD_LD_LIB
[ -z $OLD_LD_PRE ] || export LD_PRELOAD=$OLD_LD_PRE
[ -z $OLD_LD_CFG ] || export LD_CONFIG_FILE=$OLD_LD_CFG
2018-06-21 01:37:08 +08:00
}
2019-02-11 17:14:07 -05:00
#######################
# Installation Related
#######################
2020-02-08 03:26:39 -08:00
# find_block [partname...]
2018-06-21 01:37:08 +08:00
find_block() {
local BLOCK DEV DEVICE DEVNAME PARTNAME UEVENT
for BLOCK in "$@"; do
2023-08-28 18:35:20 -07:00
DEVICE=$(find /dev/block \( -type b -o -type c -o -type l \) -iname $BLOCK | head -n 1) 2>/dev/null
if [ ! -z $DEVICE ]; then
readlink -f $DEVICE
return 0
fi
done
# Fallback by parsing sysfs uevents
for UEVENT in /sys/dev/block/*/uevent; do
2023-08-28 18:35:20 -07:00
DEVNAME=$(grep_prop DEVNAME $UEVENT)
PARTNAME=$(grep_prop PARTNAME $UEVENT)
2018-12-24 21:36:37 +08:00
for BLOCK in "$@"; do
if [ "$(toupper $BLOCK)" = "$(toupper $PARTNAME)" ]; then
2018-06-21 01:37:08 +08:00
echo /dev/block/$DEVNAME
return 0
fi
done
done
# Look just in /dev in case we're dealing with MTD/NAND without /dev/block devices/links
for DEV in "$@"; do
2023-08-28 18:35:20 -07:00
DEVICE=$(find /dev \( -type b -o -type c -o -type l \) -maxdepth 1 -iname $DEV | head -n 1) 2>/dev/null
if [ ! -z $DEVICE ]; then
readlink -f $DEVICE
return 0
fi
done
2018-06-21 01:37:08 +08:00
return 1
}
2020-02-08 03:26:39 -08:00
# setup_mntpoint <mountpoint>
setup_mntpoint() {
local POINT=$1
[ -L $POINT ] && mv -f $POINT ${POINT}_link
if [ ! -d $POINT ]; then
rm -f $POINT
mkdir -p $POINT
fi
}
2020-02-08 03:26:39 -08:00
# mount_name <partname(s)> <mountpoint> <flag>
mount_name() {
local PART=$1
local POINT=$2
local FLAG=$3
2020-02-08 03:26:39 -08:00
setup_mntpoint $POINT
is_mounted $POINT && return
# First try mounting with fstab
mount $FLAG $POINT 2>/dev/null
if ! is_mounted $POINT; then
local BLOCK=$(find_block $PART)
mount $FLAG $BLOCK $POINT || return
fi
ui_print "- Mounting $POINT"
}
2020-02-08 03:26:39 -08:00
# mount_ro_ensure <partname(s)> <mountpoint>
mount_ro_ensure() {
# We handle ro partitions only in recovery
$BOOTMODE && return
local PART=$1
local POINT=$2
mount_name "$PART" $POINT '-o ro'
is_mounted $POINT || abort "! Cannot mount $POINT"
}
2023-08-28 18:35:20 -07:00
# After calling this method, the following variables will be set:
# SLOT, SYSTEM_AS_ROOT, LEGACYSAR
2017-09-13 04:07:25 +08:00
mount_partitions() {
# Check A/B slot
SLOT=$(grep_cmdline androidboot.slot_suffix)
2018-06-21 01:37:08 +08:00
if [ -z $SLOT ]; then
SLOT=$(grep_cmdline androidboot.slot)
[ -z $SLOT ] || SLOT=_${SLOT}
2017-11-11 01:33:50 +08:00
fi
[ "$SLOT" = "normal" ] && unset SLOT
2018-06-21 01:37:08 +08:00
[ -z $SLOT ] || ui_print "- Current boot slot: $SLOT"
2018-01-01 16:46:28 +08:00
# Mount ro partitions
if is_mounted /system_root; then
umount /system 2>/dev/null
umount /system_root 2>/dev/null
fi
mount_ro_ensure "system$SLOT app$SLOT" /system
if [ -f /system/init -o -L /system/init ]; then
2023-08-28 22:13:24 -07:00
SYSTEM_AS_ROOT=true
2020-02-08 03:26:39 -08:00
setup_mntpoint /system_root
if ! mount --move /system /system_root; then
umount /system
umount -l /system 2>/dev/null
mount_ro_ensure "system$SLOT app$SLOT" /system_root
fi
2017-09-13 04:07:25 +08:00
mount -o bind /system_root/system /system
else
2023-08-28 18:35:20 -07:00
if grep ' / ' /proc/mounts | grep -qv 'rootfs' || grep -q ' /system_root ' /proc/mounts; then
2023-08-28 22:13:24 -07:00
SYSTEM_AS_ROOT=true
2023-08-28 18:35:20 -07:00
else
2023-08-28 22:13:24 -07:00
SYSTEM_AS_ROOT=false
2023-08-28 18:35:20 -07:00
fi
2017-09-13 04:07:25 +08:00
fi
2023-08-28 22:13:24 -07:00
$SYSTEM_AS_ROOT && ui_print "- Device is system-as-root"
LEGACYSAR=false
if $BOOTMODE; then
grep ' / ' /proc/mounts | grep -q '/dev/root' && LEGACYSAR=true
else
# Recovery mode, assume devices that don't use dynamic partitions are legacy SAR
local IS_DYNAMIC=false
if grep -q 'androidboot.super_partition' /proc/cmdline; then
IS_DYNAMIC=true
elif [ -n "$(find_block super)" ]; then
IS_DYNAMIC=true
fi
if $SYSTEM_AS_ROOT && ! $IS_DYNAMIC; then
LEGACYSAR=true
ui_print "- Legacy SAR, force kernel to load rootfs"
fi
fi
}
2022-01-12 02:21:26 -08:00
# After calling this method, the following variables will be set:
# ISENCRYPTED, PATCHVBMETAFLAG,
2023-08-28 22:13:24 -07:00
# KEEPVERITY, KEEPFORCEENCRYPT, RECOVERYMODE
get_flags() {
2023-08-28 22:13:24 -07:00
if grep ' /data ' /proc/mounts | grep -q 'dm-'; then
ISENCRYPTED=true
elif [ "$(getprop ro.crypto.state)" = "encrypted" ]; then
ISENCRYPTED=true
2023-08-29 17:14:35 +08:00
elif [ "$DATA" = "false" ]; then
2023-08-28 22:13:24 -07:00
# No data access means unable to decrypt in recovery
ISENCRYPTED=true
else
ISENCRYPTED=false
fi
if [ -n "$(find_block vbmeta vbmeta_a)" ]; then
PATCHVBMETAFLAG=false
else
PATCHVBMETAFLAG=true
ui_print "- No vbmeta partition, patch vbmeta in boot image"
fi
# Overridable config flags with safe defaults
getvar KEEPVERITY
getvar KEEPFORCEENCRYPT
2018-12-25 01:08:46 +08:00
getvar RECOVERYMODE
if [ -z $KEEPVERITY ]; then
2023-08-28 22:13:24 -07:00
if $SYSTEM_AS_ROOT; then
KEEPVERITY=true
2023-08-28 22:13:24 -07:00
ui_print "- System-as-root, keep dm-verity"
else
KEEPVERITY=false
fi
fi
if [ -z $KEEPFORCEENCRYPT ]; then
2023-08-28 22:13:24 -07:00
if $ISENCRYPTED; then
KEEPFORCEENCRYPT=true
2019-03-03 06:35:25 -05:00
ui_print "- Encrypted data, keep forceencrypt"
else
KEEPFORCEENCRYPT=false
fi
fi
2018-12-25 01:08:46 +08:00
[ -z $RECOVERYMODE ] && RECOVERYMODE=false
}
2018-06-21 01:37:08 +08:00
find_boot_image() {
BOOTIMAGE=
if $RECOVERYMODE; then
2022-02-06 01:36:02 +08:00
BOOTIMAGE=$(find_block "recovery_ramdisk$SLOT" "recovery$SLOT" "sos")
elif [ ! -z $SLOT ]; then
2022-02-06 01:36:02 +08:00
BOOTIMAGE=$(find_block "ramdisk$SLOT" "recovery_ramdisk$SLOT" "init_boot$SLOT" "boot$SLOT")
2018-06-21 01:37:08 +08:00
else
2022-02-06 01:36:02 +08:00
BOOTIMAGE=$(find_block ramdisk recovery_ramdisk kern-a android_boot kernel bootimg init_boot boot lnx boot_a)
2018-06-21 01:37:08 +08:00
fi
if [ "$BOOTIMAGE" = "init_boot$SLOT" ]; then
uname -r | grep -q "android12-" && BOOTIMAGE="boot$SLOT"
fi
if [ -z $BOOTIMAGE ]; then
# Lets see what fstabs tells me
2022-02-06 01:36:02 +08:00
BOOTIMAGE=$(grep -v '#' /etc/*fstab* | grep -E '/boot(img)?[^a-zA-Z]' | grep -oE '/dev/[a-zA-Z0-9_./-]*' | head -n 1)
fi
2018-06-21 01:37:08 +08:00
}
2018-08-10 18:59:14 +08:00
flash_image() {
2023-07-17 18:58:48 -07:00
local CMD1
2017-09-26 20:21:43 +08:00
case "$1" in
*.gz) CMD1="gzip -d < '$1' 2>/dev/null";;
2019-02-11 17:14:07 -05:00
*) CMD1="cat '$1'";;
2017-09-26 20:21:43 +08:00
esac
2018-08-10 18:59:14 +08:00
if [ -b "$2" ]; then
local img_sz=$(stat -c '%s' "$1")
local blk_sz=$(blockdev --getsize64 "$2")
[ "$img_sz" -gt "$blk_sz" ] && return 1
blockdev --setrw "$2"
local blk_ro=$(blockdev --getro "$2")
[ "$blk_ro" -eq 1 ] && return 2
2023-07-17 18:58:48 -07:00
eval "$CMD1" | cat - /dev/zero > "$2" 2>/dev/null
elif [ -c "$2" ]; then
flash_eraseall "$2" >&2
2023-07-17 18:58:48 -07:00
eval "$CMD1" | nandwrite -p "$2" - >&2
2018-08-10 18:59:14 +08:00
else
ui_print "- Not block or char device, storing image"
2023-07-17 18:58:48 -07:00
eval "$CMD1" > "$2" 2>/dev/null
2018-02-10 03:34:13 +08:00
fi
return 0
2017-09-06 16:13:23 +08:00
}
# Common installation script for flash_script.sh and addon.d.sh
install_magisk() {
cd $MAGISKBIN
# Source the boot patcher
SOURCEDMODE=true
. ./boot_patch.sh "$BOOTIMAGE"
ui_print "- Flashing new boot image"
flash_image new-boot.img "$BOOTIMAGE"
case $? in
1)
abort "! Insufficient partition size"
;;
2)
abort "! $BOOTIMAGE is read only"
;;
esac
./magiskboot cleanup
rm -f new-boot.img
run_migrations
}
2017-09-06 16:13:23 +08:00
sign_chromeos() {
2017-10-07 22:08:10 +08:00
ui_print "- Signing ChromeOS boot image"
2017-09-06 16:13:23 +08:00
2017-10-07 22:08:10 +08:00
echo > empty
./chromeos/futility vbutil_kernel --pack new-boot.img.signed \
2017-09-06 16:13:23 +08:00
--keyblock ./chromeos/kernel.keyblock --signprivate ./chromeos/kernel_data_key.vbprivk \
--version 1 --vmlinuz new-boot.img --config empty --arch arm --bootloader empty --flags 0x1
rm -f empty new-boot.img
mv new-boot.img.signed new-boot.img
}
2017-06-19 00:15:44 +08:00
remove_system_su() {
[ -d /postinstall/tmp ] && POSTINST=/postinstall
cd $POSTINST/system
if [ -f bin/su -o -f xbin/su ] && [ ! -f /su/bin/su ]; then
2018-08-28 22:03:12 -04:00
ui_print "- Removing system installed root"
blockdev --setrw /dev/block/mapper/system$SLOT 2>/dev/null
mount -o rw,remount $POSTINST/system
2017-06-19 00:15:44 +08:00
# SuperSU
cd bin
if [ -e .ext/.su ]; then
mv -f app_process32_original app_process32 2>/dev/null
mv -f app_process64_original app_process64 2>/dev/null
mv -f install-recovery_original.sh install-recovery.sh 2>/dev/null
2017-06-19 00:15:44 +08:00
if [ -e app_process64 ]; then
ln -sf app_process64 app_process
elif [ -e app_process32 ]; then
2017-06-19 00:15:44 +08:00
ln -sf app_process32 app_process
fi
fi
# More SuperSU, SuperUser & ROM su
cd ..
rm -rf .pin bin/.ext etc/.installed_su_daemon etc/.has_su_daemon \
xbin/daemonsu xbin/su xbin/sugote xbin/sugote-mksh xbin/supolicy \
bin/app_process_init bin/su /cache/su lib/libsupol.so lib64/libsupol.so \
su.d etc/init.d/99SuperSUDaemon etc/install-recovery.sh /cache/install-recovery.sh \
.supersu /cache/.supersu /data/.supersu \
app/Superuser.apk app/SuperSU /cache/Superuser.apk
elif [ -f /cache/su.img -o -f /data/su.img -o -d /data/su -o -d /data/adb/su ]; then
ui_print "- Removing systemless installed root"
umount -l /su 2>/dev/null
rm -rf /cache/su.img /data/su.img /data/su /data/adb/su /data/adb/suhide \
/cache/.supersu /data/.supersu /cache/supersu_install /data/supersu_install
2017-06-19 00:15:44 +08:00
fi
cd $TMPDIR
2017-06-19 00:15:44 +08:00
}
2017-07-02 21:36:09 +08:00
api_level_arch_detect() {
API=$(grep_get_prop ro.build.version.sdk)
2021-05-13 00:21:04 -07:00
ABI=$(grep_get_prop ro.product.cpu.abi)
2024-04-04 22:15:14 +08:00
if [ "$ABI" = "arm64-v8a" ]; then
2021-05-13 00:21:04 -07:00
ARCH=arm64
ABI32=armeabi-v7a
IS64BIT=true
elif [ "$ABI" = "x86_64" ]; then
ARCH=x64
ABI32=x86
IS64BIT=true
2024-04-04 22:15:14 +08:00
elif [ "$ABI" = "armeabi-v7a" ]; then
2021-05-13 00:21:04 -07:00
ARCH=arm
ABI32=armeabi-v7a
IS64BIT=false
2024-04-04 22:15:14 +08:00
elif [ "$ABI" = "x86" ]; then
ARCH=x86
ABI32=x86
IS64BIT=false
elif [ "$ABI" = "riscv64" ]; then
ARCH=riscv64
ABI32=riscv32
IS64BIT=true
2021-05-13 00:21:04 -07:00
fi
2017-07-02 21:36:09 +08:00
}
2018-06-26 22:41:03 +08:00
check_data() {
DATA=false
DATA_DE=false
if grep ' /data ' /proc/mounts | grep -vq 'tmpfs'; then
# Test if data is writable
touch /data/.rw && rm /data/.rw && DATA=true
# Test if data is decrypted
2018-06-26 22:41:03 +08:00
$DATA && [ -d /data/adb ] && touch /data/adb/.rw && rm /data/adb/.rw && DATA_DE=true
2020-12-09 20:11:23 +08:00
$DATA_DE && [ -d /data/adb/magisk ] || mkdir /data/adb/magisk || DATA_DE=false
2018-06-26 22:41:03 +08:00
fi
set_nvbase "/data"
$DATA || set_nvbase "/cache/data_adb"
$DATA_DE && set_nvbase "/data/adb"
2018-06-26 22:41:03 +08:00
}
run_migrations() {
local LOCSHA1
local TARGET
# Legacy app installation
local BACKUP=$MAGISKBIN/stock_boot*.gz
if [ -f $BACKUP ]; then
cp $BACKUP /data
rm -f $BACKUP
fi
# Legacy backup
for gz in /data/stock_boot*.gz; do
[ -f $gz ] || break
2023-08-28 18:35:20 -07:00
LOCSHA1=$(basename $gz | sed -e 's/stock_boot_//' -e 's/.img.gz//')
[ -z $LOCSHA1 ] && break
mkdir /data/magisk_backup_${LOCSHA1} 2>/dev/null
mv $gz /data/magisk_backup_${LOCSHA1}/boot.img.gz
done
# Stock backups
LOCSHA1=$SHA1
for name in boot dtb dtbo dtbs; do
BACKUP=$MAGISKBIN/stock_${name}.img
[ -f $BACKUP ] || continue
if [ $name = 'boot' ]; then
2023-08-28 18:35:20 -07:00
LOCSHA1=$($MAGISKBIN/magiskboot sha1 $BACKUP)
mkdir /data/magisk_backup_${LOCSHA1} 2>/dev/null
fi
TARGET=/data/magisk_backup_${LOCSHA1}/${name}.img
cp $BACKUP $TARGET
rm -f $BACKUP
gzip -9f $TARGET
done
}
copy_preinit_files() {
2023-03-22 14:58:45 +08:00
local PREINITDIR=$(magisk --path)/.magisk/preinit
if ! grep -q " $PREINITDIR " /proc/mounts; then
ui_print "- Unable to find preinit dir"
2021-07-27 17:37:22 +08:00
return 1
fi
2023-03-22 14:58:45 +08:00
if ! grep -q "/adb/modules $PREINITDIR " /proc/self/mountinfo; then
rm -rf $PREINITDIR/*
fi
# Copy all enabled sepolicy.rule
for r in $NVBASE/modules*/*/sepolicy.rule; do
[ -f "$r" ] || continue
local MODDIR=${r%/*}
[ -f $MODDIR/disable ] && continue
[ -f $MODDIR/remove ] && continue
2023-02-28 20:36:58 +08:00
[ -f $MODDIR/update ] && continue
local MODNAME=${MODDIR##*/}
2023-03-22 14:58:45 +08:00
mkdir -p $PREINITDIR/$MODNAME
cp -f $r $PREINITDIR/$MODNAME/sepolicy.rule
done
}
2019-02-11 17:14:07 -05:00
#################
# Module Related
#################
2017-07-10 00:17:34 +08:00
set_perm() {
2018-02-10 03:34:13 +08:00
chown $2:$3 $1 || return 1
chmod $4 $1 || return 1
local CON=$5
[ -z $CON ] && CON=u:object_r:system_file:s0
chcon $CON $1 || return 1
2017-07-10 00:17:34 +08:00
}
set_perm_recursive() {
find $1 -type d 2>/dev/null | while read dir; do
set_perm $dir $2 $3 $4 $6
done
2017-07-31 03:03:52 +08:00
find $1 -type f -o -type l 2>/dev/null | while read file; do
2017-07-10 00:17:34 +08:00
set_perm $file $2 $3 $5 $6
done
}
mktouch() {
2017-07-31 03:03:52 +08:00
mkdir -p ${1%/*} 2>/dev/null
[ -z $2 ] && touch $1 || echo $2 > $1
2017-07-10 00:17:34 +08:00
chmod 644 $1
}
2019-02-24 02:11:11 -05:00
boot_actions() { return; }
2019-02-11 17:14:07 -05:00
2020-03-15 00:22:40 -07:00
# Require ZIPFILE to be set
is_legacy_script() {
unzip -l "$ZIPFILE" install.sh | grep -q install.sh
return $?
}
# Require OUTFD, ZIPFILE to be set
install_module() {
rm -rf $TMPDIR
mkdir -p $TMPDIR
2022-06-07 17:18:41 +08:00
chcon u:object_r:system_file:s0 $TMPDIR
cd $TMPDIR
2020-03-15 00:22:40 -07:00
setup_flashable
mount_partitions
api_level_arch_detect
# Setup busybox and binaries
if $BOOTMODE; then
boot_actions
else
recovery_actions
fi
2020-03-15 00:22:40 -07:00
# Extract prop file
unzip -o "$ZIPFILE" module.prop -d $TMPDIR >&2
[ ! -f $TMPDIR/module.prop ] && abort "! Unable to extract zip file!"
local MODDIRNAME=modules
$BOOTMODE && MODDIRNAME=modules_update
local MODULEROOT=$NVBASE/$MODDIRNAME
2023-08-28 18:35:20 -07:00
MODID=$(grep_prop id $TMPDIR/module.prop)
MODNAME=$(grep_prop name $TMPDIR/module.prop)
MODAUTH=$(grep_prop author $TMPDIR/module.prop)
MODPATH=$MODULEROOT/$MODID
2020-03-15 00:22:40 -07:00
# Create mod paths
rm -rf $MODPATH
2020-03-15 00:22:40 -07:00
mkdir -p $MODPATH
if is_legacy_script; then
unzip -oj "$ZIPFILE" module.prop install.sh uninstall.sh 'common/*' -d $TMPDIR >&2
# Load install script
. $TMPDIR/install.sh
# Callbacks
print_modname
on_install
[ -f $TMPDIR/uninstall.sh ] && cp -af $TMPDIR/uninstall.sh $MODPATH/uninstall.sh
$SKIPMOUNT && touch $MODPATH/skip_mount
$PROPFILE && cp -af $TMPDIR/system.prop $MODPATH/system.prop
cp -af $TMPDIR/module.prop $MODPATH/module.prop
$POSTFSDATA && cp -af $TMPDIR/post-fs-data.sh $MODPATH/post-fs-data.sh
$LATESTARTSERVICE && cp -af $TMPDIR/service.sh $MODPATH/service.sh
ui_print "- Setting permissions"
set_permissions
else
print_title "$MODNAME" "by $MODAUTH"
2020-03-15 00:22:40 -07:00
print_title "Powered by Magisk"
unzip -o "$ZIPFILE" customize.sh -d $MODPATH >&2
if ! grep -q '^SKIPUNZIP=1$' $MODPATH/customize.sh 2>/dev/null; then
ui_print "- Extracting module files"
unzip -o "$ZIPFILE" -x 'META-INF/*' -d $MODPATH >&2
# Default permissions
set_perm_recursive $MODPATH 0 0 0755 0644
set_perm_recursive $MODPATH/system/bin 0 2000 0755 0755
set_perm_recursive $MODPATH/system/xbin 0 2000 0755 0755
set_perm_recursive $MODPATH/system/system_ext/bin 0 2000 0755 0755
set_perm_recursive $MODPATH/system/vendor/bin 0 2000 0755 0755 u:object_r:vendor_file:s0
2020-03-15 00:22:40 -07:00
fi
# Load customization script
[ -f $MODPATH/customize.sh ] && . $MODPATH/customize.sh
fi
# Handle replace folders
for TARGET in $REPLACE; do
ui_print "- Replace target: $TARGET"
mktouch $MODPATH$TARGET/.replace
done
if $BOOTMODE; then
# Update info for Magisk app
2020-03-15 00:22:40 -07:00
mktouch $NVBASE/modules/$MODID/update
rm -rf $NVBASE/modules/$MODID/remove 2>/dev/null
rm -rf $NVBASE/modules/$MODID/disable 2>/dev/null
2020-03-15 00:22:40 -07:00
cp -af $MODPATH/module.prop $NVBASE/modules/$MODID/module.prop
fi
# Copy over custom sepolicy rules
if [ -f $MODPATH/sepolicy.rule ]; then
ui_print "- Installing custom sepolicy rules"
copy_preinit_files
2020-03-15 00:22:40 -07:00
fi
# Remove stuff that doesn't belong to modules and clean up any empty directories
2020-03-15 00:22:40 -07:00
rm -rf \
$MODPATH/system/placeholder $MODPATH/customize.sh \
$MODPATH/README.md $MODPATH/.git*
2022-04-25 16:07:51 +05:30
rmdir -p $MODPATH 2>/dev/null
2020-03-15 00:22:40 -07:00
cd /
$BOOTMODE || recovery_cleanup
rm -rf $TMPDIR
ui_print "- Done"
}
##########
# Presets
##########
# Detect whether in boot mode
[ -z $BOOTMODE ] && ps | grep zygote | grep -qv grep && BOOTMODE=true
[ -z $BOOTMODE ] && ps -A 2>/dev/null | grep zygote | grep -qv grep && BOOTMODE=true
[ -z $BOOTMODE ] && BOOTMODE=false
TMPDIR=/dev/tmp
set_nvbase "/data/adb"