Magisk/scripts/boot_patch.sh

246 lines
6.5 KiB
Bash
Raw Normal View History

2017-06-03 20:19:01 +08:00
#!/system/bin/sh
#######################################################################################
2017-06-03 20:19:01 +08:00
# Magisk Boot Image Patcher
#######################################################################################
2017-07-25 02:02:19 +08:00
#
2018-08-09 18:13:07 +08:00
# Usage: boot_patch.sh <bootimage>
#
2018-08-09 18:13:07 +08:00
# The following flags can be set in environment variables:
# KEEPVERITY, KEEPFORCEENCRYPT, PATCHVBMETAFLAG, RECOVERYMODE, SYSTEM_ROOT
#
2017-07-10 00:17:34 +08:00
# This script should be placed in a directory with the following files:
2017-07-25 02:02:19 +08:00
#
# File name Type Description
2017-07-25 02:02:19 +08:00
#
# boot_patch.sh script A script to patch boot image for Magisk.
# (this file) The script will use files in its same
2022-12-26 15:59:56 -08:00
# directory to complete the patching process.
# util_functions.sh script A script which hosts all functions required
2022-12-26 15:59:56 -08:00
# for this script to work properly.
# magiskinit binary The binary to replace /init.
# magisk(32/64) binary The magisk binaries.
# magiskboot binary A tool to manipulate boot images.
# stub.apk binary The stub Magisk app to embed into ramdisk.
# chromeos folder This folder includes the utility and keys to sign
# (optional) chromeos boot images. Only used for Pixel C.
2017-06-03 20:19:01 +08:00
#
#######################################################################################
############
2017-06-24 23:38:20 +09:00
# Functions
############
2017-06-03 20:19:01 +08:00
2017-06-24 23:38:20 +09:00
# Pure bash dirname implementation
getdir() {
case "$1" in
*/*)
dir=${1%/*}
if [ -z $dir ]; then
echo "/"
else
echo $dir
fi
;;
*) echo "." ;;
esac
2017-06-24 23:38:20 +09:00
}
#################
2017-06-24 23:38:20 +09:00
# Initialization
#################
2017-06-03 20:19:01 +08:00
if [ -z $SOURCEDMODE ]; then
# Switch to the location of the script file
cd "$(getdir "${BASH_SOURCE:-$0}")"
# Load utility functions
. ./util_functions.sh
2021-01-18 12:37:08 -08:00
# Check if 64-bit
api_level_arch_detect
fi
2017-10-07 22:08:10 +08:00
BOOTIMAGE="$1"
[ -e "$BOOTIMAGE" ] || abort "$BOOTIMAGE does not exist!"
# Dump image for MTD/NAND character device boot partitions
if [ -c "$BOOTIMAGE" ]; then
nanddump -f boot.img "$BOOTIMAGE"
BOOTNAND="$BOOTIMAGE"
BOOTIMAGE=boot.img
fi
# Flags
2017-10-07 22:08:10 +08:00
[ -z $KEEPVERITY ] && KEEPVERITY=false
[ -z $KEEPFORCEENCRYPT ] && KEEPFORCEENCRYPT=false
[ -z $PATCHVBMETAFLAG ] && PATCHVBMETAFLAG=false
[ -z $RECOVERYMODE ] && RECOVERYMODE=false
[ -z $SYSTEM_ROOT ] && SYSTEM_ROOT=false
[ -z $ISENCRYPTED ] && ISENCRYPTED=false
export KEEPVERITY
export KEEPFORCEENCRYPT
export PATCHVBMETAFLAG
export ISENCRYPTED
2017-10-07 22:08:10 +08:00
2017-09-02 23:24:34 +08:00
chmod -R 755 .
2017-06-03 20:19:01 +08:00
RULESDEVICE="$(./magiskinit --rules-device)" || abort "! Unable to find rules partition!"
#########
2017-06-24 23:38:20 +09:00
# Unpack
#########
2017-09-06 16:13:23 +08:00
2017-08-17 03:46:01 +08:00
CHROMEOS=false
2017-06-24 23:38:20 +09:00
2017-09-16 03:48:58 +08:00
ui_print "- Unpacking boot image"
./magiskboot unpack "$BOOTIMAGE"
2017-06-03 20:19:01 +08:00
case $? in
0 ) ;;
2017-06-03 20:19:01 +08:00
1 )
abort "! Unsupported/Unknown image format"
2017-06-03 20:19:01 +08:00
;;
2 )
2017-10-07 22:08:10 +08:00
ui_print "- ChromeOS boot image detected"
CHROMEOS=true
;;
* )
abort "! Unable to unpack boot image"
;;
2017-06-03 20:19:01 +08:00
esac
###################
# Ramdisk Restores
###################
2017-06-03 20:19:01 +08:00
# Test patch status and do restore
2017-09-16 03:48:58 +08:00
ui_print "- Checking ramdisk status"
if [ -e ramdisk.cpio ]; then
./magiskboot cpio ramdisk.cpio test
STATUS=$?
else
2022-05-12 03:04:55 -07:00
# Stock A only legacy SAR, or some Android 13 GKIs
STATUS=0
fi
2019-02-24 20:39:01 -05:00
case $((STATUS & 3)) in
2017-06-03 20:19:01 +08:00
0 ) # Stock boot
ui_print "- Stock boot image detected"
SHA1=$(./magiskboot sha1 "$BOOTIMAGE" 2>/dev/null)
cat $BOOTIMAGE > stock_boot.img
cp -af ramdisk.cpio ramdisk.cpio.orig 2>/dev/null
2017-06-03 20:19:01 +08:00
;;
1 ) # Magisk patched
2018-08-09 18:13:07 +08:00
ui_print "- Magisk patched boot image detected"
# Find SHA1 of stock boot image
[ -z $SHA1 ] && SHA1=$(./magiskboot cpio ramdisk.cpio sha1 2>/dev/null)
./magiskboot cpio ramdisk.cpio restore
2019-09-22 06:17:54 -04:00
cp -af ramdisk.cpio ramdisk.cpio.orig
2021-02-07 01:54:08 -08:00
rm -f stock_boot.img
2017-06-03 20:19:01 +08:00
;;
2 ) # Unsupported
2018-08-09 18:13:07 +08:00
ui_print "! Boot image patched by unsupported programs"
abort "! Please restore back to stock boot image"
2017-06-03 20:19:01 +08:00
;;
esac
# Work around custom legacy Sony /init -> /(s)bin/init_sony : /init.real setup
INIT=init
if [ $((STATUS & 4)) -ne 0 ]; then
INIT=init.real
fi
##################
# Ramdisk Patches
##################
2017-06-03 20:19:01 +08:00
2017-09-16 03:48:58 +08:00
ui_print "- Patching ramdisk"
2017-06-03 20:19:01 +08:00
echo "KEEPVERITY=$KEEPVERITY" > config
echo "KEEPFORCEENCRYPT=$KEEPFORCEENCRYPT" >> config
echo "PATCHVBMETAFLAG=$PATCHVBMETAFLAG" >> config
echo "RECOVERYMODE=$RECOVERYMODE" >> config
echo "RULESDEVICE=$RULESDEVICE" >> config
[ ! -z $SHA1 ] && echo "SHA1=$SHA1" >> config
2021-01-18 04:25:26 -08:00
# Compress to save precious ramdisk space
2021-05-13 00:21:04 -07:00
SKIP32="#"
SKIP64="#"
if [ -f magisk32 ]; then
./magiskboot compress=xz magisk32 magisk32.xz
unset SKIP32
fi
if [ -f magisk64 ]; then
./magiskboot compress=xz magisk64 magisk64.xz
unset SKIP64
fi
2022-10-31 22:31:15 +08:00
./magiskboot compress=xz stub.apk stub.xz
2021-01-18 04:25:26 -08:00
./magiskboot cpio ramdisk.cpio \
"add 0750 $INIT magiskinit" \
2021-01-18 04:25:26 -08:00
"mkdir 0750 overlay.d" \
"mkdir 0750 overlay.d/sbin" \
2021-05-13 00:21:04 -07:00
"$SKIP32 add 0644 overlay.d/sbin/magisk32.xz magisk32.xz" \
2021-01-18 12:37:08 -08:00
"$SKIP64 add 0644 overlay.d/sbin/magisk64.xz magisk64.xz" \
2022-10-31 22:31:15 +08:00
"add 0644 overlay.d/sbin/stub.xz stub.xz" \
"patch" \
"backup ramdisk.cpio.orig" \
"mkdir 000 .backup" \
"add 000 .backup/.magisk config"
2017-06-03 20:19:01 +08:00
2022-10-31 22:31:15 +08:00
rm -f ramdisk.cpio.orig config magisk*.xz stub.xz
2017-06-03 20:19:01 +08:00
#################
# Binary Patches
#################
2017-06-03 20:19:01 +08:00
2021-01-14 05:59:53 -08:00
for dt in dtb kernel_dtb extra; do
2022-06-16 01:47:23 -07:00
if [ -f $dt ]; then
if ! ./magiskboot dtb $dt test; then
2022-07-02 06:15:54 +08:00
ui_print "! Boot image $dt was patched by old (unsupported) Magisk"
abort "! Please try again with *unpatched* boot image"
2022-06-16 01:47:23 -07:00
fi
if ./magiskboot dtb $dt patch; then
ui_print "- Patch fstab in boot image $dt"
fi
fi
done
2017-06-03 20:19:01 +08:00
2018-02-10 03:34:13 +08:00
if [ -f kernel ]; then
PATCHEDKERNEL=false
# Remove Samsung RKP
./magiskboot hexpatch kernel \
2018-02-10 03:34:13 +08:00
49010054011440B93FA00F71E9000054010840B93FA00F7189000054001840B91FA00F7188010054 \
A1020054011440B93FA00F7140020054010840B93FA00F71E0010054001840B91FA00F7181010054 \
&& PATCHEDKERNEL=true
2017-06-03 20:19:01 +08:00
# Remove Samsung defex
# Before: [mov w2, #-221] (-__NR_execve)
# After: [mov w2, #-32768]
./magiskboot hexpatch kernel 821B8012 E2FF8F12 && PATCHEDKERNEL=true
# Force kernel to load rootfs for legacy SAR devices
2018-02-10 03:34:13 +08:00
# skip_initramfs -> want_initramfs
$SYSTEM_ROOT && ./magiskboot hexpatch kernel \
736B69705F696E697472616D667300 \
77616E745F696E697472616D667300 \
&& PATCHEDKERNEL=true
# If the kernel doesn't need to be patched at all,
# keep raw kernel to avoid bootloops on some weird devices
$PATCHEDKERNEL || rm -f kernel
2018-02-10 03:34:13 +08:00
fi
2017-09-13 04:07:25 +08:00
#################
# Repack & Flash
#################
2017-11-11 01:33:50 +08:00
2017-09-16 03:48:58 +08:00
ui_print "- Repacking boot image"
./magiskboot repack "$BOOTIMAGE" || abort "! Unable to repack boot image"
2017-06-03 20:19:01 +08:00
2017-07-10 00:17:34 +08:00
# Sign chromeos boot
2017-09-06 16:13:23 +08:00
$CHROMEOS && sign_chromeos
2017-07-10 00:17:34 +08:00
# Restore the original boot partition path
[ -e "$BOOTNAND" ] && BOOTIMAGE="$BOOTNAND"
2019-02-24 20:39:01 -05:00
# Reset any error code
true