Magisk/scripts/boot_patch.sh

172 lines
6.0 KiB
Bash
Raw Normal View History

2017-06-03 12:19:01 +00:00
#!/system/bin/sh
##########################################################################################
#
# Magisk Boot Image Patcher
# by topjohnwu
2017-07-24 18:02:19 +00:00
#
2018-08-09 10:13:07 +00:00
# Usage: boot_patch.sh <bootimage>
#
2018-08-09 10:13:07 +00:00
# The following flags can be set in environment variables:
# KEEPVERITY, KEEPFORCEENCRYPT
#
2017-07-09 16:17:34 +00:00
# This script should be placed in a directory with the following files:
2017-07-24 18:02:19 +00:00
#
# File name Type Description
2017-07-24 18:02:19 +00:00
#
# boot_patch.sh script A script to patch boot. Expect path to boot image as parameter.
# (this file) The script will use binaries and files in its same directory
# to complete the patching process
# util_functions.sh script A script which hosts all functions requires for this script
# to work properly
# magiskinit binary The binary to replace /init, which has the magisk binary embedded
# magiskboot binary A tool to unpack boot image, decompress ramdisk, extract ramdisk,
# and patch the ramdisk for Magisk support
# chromeos folder This folder should store all the utilities and keys to sign
# (optional) a chromeos device. Used for Pixel C
2017-07-24 18:02:19 +00:00
#
2017-06-03 12:19:01 +00:00
# If the script is not running as root, then the input boot image should be a stock image
# or have a backup included in ramdisk internally, since we cannot access the stock boot
# image placed under /data we've created when previously installed
2017-06-03 12:19:01 +00:00
#
##########################################################################################
2017-06-24 14:38:20 +00:00
##########################################################################################
# Functions
##########################################################################################
2017-06-03 12:19:01 +00:00
2017-06-24 14:38:20 +00:00
# Pure bash dirname implementation
getdir() {
case "$1" in
*/*) dir=${1%/*}; [ -z $dir ] && echo "/" || echo $dir ;;
*) echo "." ;;
esac
2017-06-24 14:38:20 +00:00
}
2017-06-03 12:19:01 +00:00
##########################################################################################
2017-06-24 14:38:20 +00:00
# Initialization
2017-06-03 12:19:01 +00:00
##########################################################################################
if [ -z $SOURCEDMODE ]; then
# Switch to the location of the script file
cd "`getdir "${BASH_SOURCE:-$0}"`"
# Load utility functions
. ./util_functions.sh
fi
2017-10-07 14:08:10 +00:00
BOOTIMAGE="$1"
[ -e "$BOOTIMAGE" ] || abort "$BOOTIMAGE does not exist!"
# Flags
2017-10-07 14:08:10 +00:00
[ -z $KEEPVERITY ] && KEEPVERITY=false
[ -z $KEEPFORCEENCRYPT ] && KEEPFORCEENCRYPT=false
2017-10-07 14:08:10 +00:00
2017-09-02 15:24:34 +00:00
chmod -R 755 .
2017-06-03 12:19:01 +00:00
# Extract magisk if doesn't exist
2017-11-09 16:54:54 +00:00
[ -e magisk ] || ./magiskinit -x magisk magisk
2017-06-24 14:38:20 +00:00
##########################################################################################
# Unpack
##########################################################################################
2017-09-06 08:13:23 +00:00
2017-08-16 19:46:01 +00:00
CHROMEOS=false
2017-06-24 14:38:20 +00:00
2017-09-15 19:48:58 +00:00
ui_print "- Unpacking boot image"
./magiskboot --unpack "$BOOTIMAGE"
2017-06-03 12:19:01 +00:00
case $? in
1 )
2017-09-15 19:48:58 +00:00
abort "! Unable to unpack boot image"
2017-06-03 12:19:01 +00:00
;;
2 )
2017-10-07 14:08:10 +00:00
ui_print "- ChromeOS boot image detected"
CHROMEOS=true
;;
2018-08-09 10:13:07 +00:00
3 )
2017-09-15 19:48:58 +00:00
ui_print "! Sony ELF32 format detected"
abort "! Please use BootBridge from @AdrianDC to flash Magisk"
2017-06-03 12:19:01 +00:00
;;
2018-08-09 10:13:07 +00:00
4 )
2017-09-15 19:48:58 +00:00
ui_print "! Sony ELF64 format detected"
abort "! Stock kernel cannot be patched, please use a custom kernel"
2017-06-03 12:19:01 +00:00
esac
##########################################################################################
# Ramdisk restores
##########################################################################################
# Test patch status and do restore, after this section, ramdisk.cpio.orig is guaranteed to exist
2017-09-15 19:48:58 +00:00
ui_print "- Checking ramdisk status"
./magiskboot --cpio ramdisk.cpio test
2017-06-03 12:19:01 +00:00
case $? in
0 ) # Stock boot
ui_print "- Stock boot image detected"
2017-09-15 19:48:58 +00:00
ui_print "- Backing up stock boot image"
SHA1=`./magiskboot --sha1 "$BOOTIMAGE" 2>/dev/null`
2017-11-10 17:33:50 +00:00
STOCKDUMP=stock_boot_${SHA1}.img.gz
./magiskboot --compress "$BOOTIMAGE" $STOCKDUMP
2017-06-03 12:19:01 +00:00
cp -af ramdisk.cpio ramdisk.cpio.orig
;;
1 ) # Magisk patched
2018-08-09 10:13:07 +00:00
ui_print "- Magisk patched boot image detected"
# Find SHA1 of stock boot image
[ -z $SHA1 ] && SHA1=`./magiskboot --cpio ramdisk.cpio sha1 2>/dev/null`
./magiskboot --cpio ramdisk.cpio restore
cp -af ramdisk.cpio ramdisk.cpio.orig
2017-06-03 12:19:01 +00:00
;;
2018-08-09 10:13:07 +00:00
2 ) # Other patched
ui_print "! Boot image patched by unsupported programs"
2017-09-15 19:48:58 +00:00
abort "! Please restore stock boot image"
2017-06-03 12:19:01 +00:00
;;
esac
##########################################################################################
# Ramdisk patches
##########################################################################################
2017-09-15 19:48:58 +00:00
ui_print "- Patching ramdisk"
2017-06-03 12:19:01 +00:00
./magiskboot --cpio ramdisk.cpio \
"add 750 init magiskinit" \
2018-08-09 10:13:07 +00:00
"magisk ramdisk.cpio.orig $KEEPVERITY $KEEPFORCEENCRYPT $SHA1"
2017-06-03 12:19:01 +00:00
rm -f ramdisk.cpio.orig
##########################################################################################
2017-11-10 17:33:50 +00:00
# Binary patches
2017-06-03 12:19:01 +00:00
##########################################################################################
if ! $KEEPVERITY; then
2018-07-04 15:46:16 +00:00
[ -f dtb ] && ./magiskboot --dtb-patch dtb && ui_print "- Removing dm(avb)-verity in dtb"
[ -f extra ] && ./magiskboot --dtb-patch extra && ui_print "- Removing dm(avb)-verity in extra-dtb"
2017-11-10 17:33:50 +00:00
fi
2017-06-03 12:19:01 +00:00
2018-02-09 19:34:13 +00:00
if [ -f kernel ]; then
# Remove Samsung RKP
./magiskboot --hexpatch kernel \
2018-02-09 19:34:13 +00:00
49010054011440B93FA00F71E9000054010840B93FA00F7189000054001840B91FA00F7188010054 \
A1020054011440B93FA00F7140020054010840B93FA00F71E0010054001840B91FA00F7181010054
2017-06-03 12:19:01 +00:00
# Remove Samsung defex
# Before: [mov w2, #-221] (-__NR_execve)
# After: [mov w2, #-32768]
./magiskboot --hexpatch kernel 821B8012 E2FF8F12
# Force kernel to load rootfs
2018-02-09 19:34:13 +00:00
# skip_initramfs -> want_initramfs
./magiskboot --hexpatch kernel \
736B69705F696E697472616D667300 \
77616E745F696E697472616D667300
2018-02-09 19:34:13 +00:00
fi
2017-09-12 20:07:25 +00:00
2017-11-10 17:33:50 +00:00
##########################################################################################
# Repack and flash
##########################################################################################
2017-09-15 19:48:58 +00:00
ui_print "- Repacking boot image"
./magiskboot --repack "$BOOTIMAGE" || abort "! Unable to repack boot image!"
2017-06-03 12:19:01 +00:00
2017-07-09 16:17:34 +00:00
# Sign chromeos boot
2017-09-06 08:13:23 +00:00
$CHROMEOS && sign_chromeos
2017-07-09 16:17:34 +00:00
./magiskboot --cleanup