Magisk/scripts/avd_patch.sh

93 lines
2.8 KiB
Bash
Raw Normal View History

2022-01-19 13:12:11 +00:00
#!/usr/bin/env bash
#####################################################################
# AVD MagiskInit Setup
#####################################################################
#
2023-03-17 12:08:31 +00:00
# Support API level: 23 - 33
2022-01-19 13:12:11 +00:00
#
# With an emulator booted and accessible via ADB, usage:
# ./build.py avd_patch path/to/booted/avd-image/ramdisk.img
#
# The purpose of this script is to patch AVD ramdisk.img and do a
# full integration test of magiskinit under several circumstances.
# After patching ramdisk.img, close the emulator, then select
# "Cold Boot Now" in AVD Manager to force a full reboot.
#
2022-01-20 04:28:01 +00:00
# P.S. If running against the API 28 image, modify init.hpp and set
# ENABLE_AVD_HACK to 1 to enable special hacks designed specifically
# for this use case.
#
2022-01-19 13:12:11 +00:00
#####################################################################
# AVD Init Configurations:
#
# rootfs w/o early mount: API 23 - 25
# rootfs with early mount: API 26 - 27
# Legacy system-as-root: API 28
# 2 stage init: API 29 - 33
2022-01-19 13:12:11 +00:00
#####################################################################
if [ ! -f /system/build.prop ]; then
# Running on PC
echo 'Please run `./build.py avd_patch` instead of directly executing the script!'
exit 1
fi
cd /data/local/tmp
chmod 755 busybox
if [ -z "$FIRST_STAGE" ]; then
export FIRST_STAGE=1
export ASH_STANDALONE=1
# Re-exec script with busybox
exec ./busybox sh $0
fi
# Extract files from APK
2022-10-31 14:31:15 +00:00
unzip -oj magisk.apk 'assets/util_functions.sh' 'assets/stub.apk'
2022-01-19 13:12:11 +00:00
. ./util_functions.sh
api_level_arch_detect
unzip -oj magisk.apk "lib/$ABI/*" "lib/$ABI32/libmagisk32.so" -x "lib/$ABI/libbusybox.so"
2022-01-19 13:12:11 +00:00
for file in lib*.so; do
chmod 755 $file
mv "$file" "${file:3:${#file}-6}"
done
2022-02-10 20:34:26 +00:00
./magiskboot decompress ramdisk.cpio.tmp ramdisk.cpio
2022-01-19 13:12:11 +00:00
cp ramdisk.cpio ramdisk.cpio.orig
export KEEPVERITY=false
export KEEPFORCEENCRYPT=true
echo "KEEPVERITY=$KEEPVERITY" > config
echo "KEEPFORCEENCRYPT=$KEEPFORCEENCRYPT" >> config
if [ -e "/system/bin/linker64" ]; then
echo "RULESDEVICE=$(./magisk64 --rules-device)" >> config
else
echo "RULESDEVICE=$(./magisk32 --rules-device)" >> config
fi
2022-01-19 13:12:11 +00:00
# For API 28, we also patch advancedFeatures.ini to disable SAR
# Manually override skip_initramfs by setting RECOVERYMODE=true
[ $API = "28" ] && echo 'RECOVERYMODE=true' >> config
./magiskboot compress=xz magisk32 magisk32.xz
./magiskboot compress=xz magisk64 magisk64.xz
2022-10-31 14:31:15 +00:00
./magiskboot compress=xz stub.apk stub.xz
2022-01-19 13:12:11 +00:00
./magiskboot cpio ramdisk.cpio \
"add 0750 init magiskinit" \
"mkdir 0750 overlay.d" \
"mkdir 0750 overlay.d/sbin" \
"add 0644 overlay.d/sbin/magisk32.xz magisk32.xz" \
"add 0644 overlay.d/sbin/magisk64.xz magisk64.xz" \
2022-10-31 14:31:15 +00:00
"add 0644 overlay.d/sbin/stub.xz stub.xz" \
2022-01-19 13:12:11 +00:00
"patch" \
"backup ramdisk.cpio.orig" \
"mkdir 000 .backup" \
"add 000 .backup/.magisk config"
2022-10-31 14:31:15 +00:00
rm -f ramdisk.cpio.orig config magisk*.xz stub.xz
2022-02-10 20:34:26 +00:00
./magiskboot compress=gzip ramdisk.cpio ramdisk.cpio.gz
2022-11-21 08:59:22 +00:00
pm install magisk.apk || true