########################################################################################## # # Magisk General Utility Functions # by topjohnwu # # Used everywhere in Magisk # ########################################################################################## #MAGISK_VERSION_STUB SCRIPT_VERSION=$MAGISK_VER_CODE # Default location, will override if needed [ -d /data/adb/magisk ] && MAGISKBIN=/data/adb/magisk || MAGISKBIN=/data/magisk BOOTSIGNER="/system/bin/dalvikvm -Xnodex2oat -Xnoimage-dex2oat -cp \$APK com.topjohnwu.magisk.utils.BootSigner" BOOTSIGNED=false get_outfd() { readlink /proc/$$/fd/$OUTFD 2>/dev/null | grep /tmp >/dev/null if [ "$?" -eq "0" ]; then OUTFD=0 for FD in `ls /proc/$$/fd`; do readlink /proc/$$/fd/$FD 2>/dev/null | grep pipe >/dev/null if [ "$?" -eq "0" ]; then ps | grep " 3 $FD " | grep -v grep >/dev/null if [ "$?" -eq "0" ]; then OUTFD=$FD break fi fi done fi } ui_print() { $BOOTMODE && echo "$1" || echo -e "ui_print $1\nui_print" >> /proc/self/fd/$OUTFD } mount_partitions() { # Check A/B slot SLOT=`getprop ro.boot.slot_suffix` if [ -z $SLOT ]; then SLOT=_`getprop ro.boot.slot` [ $SLOT = "_" ] && SLOT= fi [ -z $SLOT ] || ui_print "- A/B partition detected, current slot: $SLOT" ui_print "- Mounting /system, /vendor" is_mounted /system || [ -f /system/build.prop ] || mount -o ro /system 2>/dev/null if ! is_mounted /system && ! [ -f /system/build.prop ]; then SYSTEMBLOCK=`find /dev/block -iname system$SLOT | head -n 1` mount -t ext4 -o ro $SYSTEMBLOCK /system fi is_mounted /system || [ -f /system/build.prop ] || abort "! Cannot mount /system" cat /proc/mounts | grep -E '/dev/root|/system_root' >/dev/null && SKIP_INITRAMFS=true || SKIP_INITRAMFS=false if [ -f /system/init.rc ]; then SKIP_INITRAMFS=true mkdir /system_root 2>/dev/null mount --move /system /system_root mount -o bind /system_root/system /system fi $SKIP_INITRAMFS && ui_print "- Device skip_initramfs detected" if [ -L /system/vendor ]; then # Seperate /vendor partition is_mounted /vendor || mount -o ro /vendor 2>/dev/null if ! is_mounted /vendor; then VENDORBLOCK=`find /dev/block -iname vendor$SLOT | head -n 1` mount -t ext4 -o ro $VENDORBLOCK /vendor fi is_mounted /vendor || abort "! Cannot mount /vendor" fi } grep_prop() { REGEX="s/^$1=//p" shift FILES=$@ [ -z "$FILES" ] && FILES='/system/build.prop' sed -n "$REGEX" $FILES 2>/dev/null | head -n 1 } getvar() { local VARNAME=$1 local VALUE=$(eval echo \$$VARNAME) [ ! -z $VALUE ] && return for DIR in /.backup /data /cache /system; do VALUE=`grep_prop $VARNAME $DIR/.magisk` [ ! -z $VALUE ] && break; done eval $VARNAME=\$VALUE } resolve_link() { RESOLVED="$1" while RESOLVE=`readlink $RESOLVED`; do RESOLVED=$RESOLVE done echo $RESOLVED } find_boot_image() { BOOTIMAGE= if [ ! -z $SLOT ]; then BOOTIMAGE=`find /dev/block -iname boot$SLOT | head -n 1` 2>/dev/null else for BLOCK in boot_a kern-a android_boot kernel boot lnx bootimg; do BOOTIMAGE=`find /dev/block -iname $BLOCK | head -n 1` 2>/dev/null [ ! -z $BOOTIMAGE ] && break done fi # Recovery fallback if [ -z "$BOOTIMAGE" ]; then for FSTAB in /etc/*fstab*; do BOOTIMAGE=`grep -v '#' $FSTAB | grep -E '/boot[^a-zA-Z]' | grep -oE '/dev/[a-zA-Z0-9_./-]*'` [ ! -z $BOOTIMAGE ] && break done fi BOOTIMAGE=`resolve_link $BOOTIMAGE` } migrate_boot_backup() { # Update the broken boot backup if [ -f /data/stock_boot_.img.gz ]; then $MAGISKBIN/magiskboot --decompress /data/stock_boot_.img.gz /data/stock_boot.img fi # Update our previous backup to new format if exists if [ -f /data/stock_boot.img ]; then ui_print "- Migrating boot image backup" SHA1=`$MAGISKBIN/magiskboot --sha1 /data/stock_boot.img 2>/dev/null` STOCKDUMP=/data/stock_boot_${SHA1}.img mv /data/stock_boot.img $STOCKDUMP $MAGISKBIN/magiskboot --compress $STOCKDUMP fi mv /data/magisk/stock_boot* /data 2>/dev/null mv /data/magisk/adb/stock_boot* /data 2>/dev/null } flash_boot_image() { # Make sure all blocks are writable $MAGISKBIN/magisk --unlock-blocks 2>/dev/null case "$1" in *.gz) COMMAND="gzip -d < '$1'";; *) COMMAND="cat '$1'";; esac $BOOTSIGNED && SIGNCOM="$BOOTSIGNER -sign" || SIGNCOM="cat -" case "$2" in /dev/block/*) ui_print "- Flashing new boot image" eval $COMMAND | eval $SIGNCOM | cat - /dev/zero 2>/dev/null | dd of="$2" bs=4096 2>/dev/null ;; *) ui_print "- Storing new boot image" eval $COMMAND | eval $SIGNCOM | dd of="$2" bs=4096 2>/dev/null ;; esac } find_dtbo_image() { DTBOIMAGE=`find /dev/block -iname dtbo$SLOT | head -n 1` 2>/dev/null [ ! -z $DTBOIMAGE ] && DTBOIMAGE=`resolve_link $DTBOIMAGE` } patch_dtbo_image() { if [ ! -z $DTBOIMAGE ]; then if $MAGISKBIN/magiskboot --dtb-test $DTBOIMAGE; then ui_print "- Backing up stock dtbo image" $MAGISKBIN/magiskboot --compress $DTBOIMAGE $MAGISKBIN/stock_dtbo.img.gz ui_print "- Patching fstab in dtbo to remove avb-verity" $MAGISKBIN/magiskboot --dtb-patch $DTBOIMAGE return 0 fi fi return 1 } restore_imgs() { STOCKBOOT=/data/stock_boot_${1}.img.gz STOCKDTBO=/data/stock_dtbo.img.gz # Make sure all blocks are writable $MAGISKBIN/magisk --unlock-blocks 2>/dev/null find_dtbo_image if [ ! -z "$DTBOIMAGE" -a -f "$STOCKDTBO" ]; then ui_print "- Restoring stock dtbo image" gzip -d < $STOCKDTBO | dd of=$DTBOIMAGE fi BOOTSIGNED=false find_boot_image if [ ! -z "$BOOTIMAGE" -a -f "$STOCKBOOT" ]; then ui_print "- Restoring stock boot image" gzip -d < $STOCKBOOT | cat - /dev/zero 2>/dev/null | dd of="$BOOTIMAGE" bs=4096 2>/dev/null return 0 fi return 1 } sign_chromeos() { ui_print "- Signing ChromeOS boot image" echo > empty ./chromeos/futility vbutil_kernel --pack new-boot.img.signed \ --keyblock ./chromeos/kernel.keyblock --signprivate ./chromeos/kernel_data_key.vbprivk \ --version 1 --vmlinuz new-boot.img --config empty --arch arm --bootloader empty --flags 0x1 rm -f empty new-boot.img mv new-boot.img.signed new-boot.img } is_mounted() { TARGET="`resolve_link $1`" cat /proc/mounts | grep " $TARGET " >/dev/null return $? } remove_system_su() { if [ -f /system/bin/su -o -f /system/xbin/su ] && [ ! -f /su/bin/su ]; then ui_print "! System installed root detected, mount rw :(" mount -o rw,remount /system # SuperSU if [ -e /system/bin/.ext/.su ]; then mv -f /system/bin/app_process32_original /system/bin/app_process32 2>/dev/null mv -f /system/bin/app_process64_original /system/bin/app_process64 2>/dev/null mv -f /system/bin/install-recovery_original.sh /system/bin/install-recovery.sh 2>/dev/null cd /system/bin if [ -e app_process64 ]; then ln -sf app_process64 app_process else ln -sf app_process32 app_process fi fi rm -rf /system/.pin /system/bin/.ext /system/etc/.installed_su_daemon /system/etc/.has_su_daemon \ /system/xbin/daemonsu /system/xbin/su /system/xbin/sugote /system/xbin/sugote-mksh /system/xbin/supolicy \ /system/bin/app_process_init /system/bin/su /cache/su /system/lib/libsupol.so /system/lib64/libsupol.so \ /system/su.d /system/etc/install-recovery.sh /system/etc/init.d/99SuperSUDaemon /cache/install-recovery.sh \ /system/.supersu /cache/.supersu /data/.supersu \ /system/app/Superuser.apk /system/app/SuperSU /cache/Superuser.apk 2>/dev/null fi } api_level_arch_detect() { API=`grep_prop ro.build.version.sdk` ABI=`grep_prop ro.product.cpu.abi | cut -c-3` ABI2=`grep_prop ro.product.cpu.abi2 | cut -c-3` ABILONG=`grep_prop ro.product.cpu.abi` ARCH=arm IS64BIT=false if [ "$ABI" = "x86" ]; then ARCH=x86; fi; if [ "$ABI2" = "x86" ]; then ARCH=x86; fi; if [ "$ABILONG" = "arm64-v8a" ]; then ARCH=arm64; IS64BIT=true; fi; if [ "$ABILONG" = "x86_64" ]; then ARCH=x64; IS64BIT=true; fi; } boot_actions() { if [ ! -d /sbin/.core/mirror/bin ]; then mkdir -p /sbin/.core/mirror/bin mount -o bind $MAGISKBIN /sbin/.core/mirror/bin fi MAGISKBIN=/sbin/.core/mirror/bin } recovery_actions() { # TWRP bug fix mount -o bind /dev/urandom /dev/random # Preserve environment varibles OLD_PATH=$PATH OLD_LD_PATH=$LD_LIBRARY_PATH if [ ! -d $TMPDIR/bin ]; then # Add busybox to PATH mkdir -p $TMPDIR/bin ln -s $MAGISKBIN/busybox $TMPDIR/bin/busybox $MAGISKBIN/busybox --install -s $TMPDIR/bin export PATH=$TMPDIR/bin:$PATH fi # Temporarily block out all custom recovery binaries/libs mv /sbin /sbin_tmp # Add all possible library paths $IS64BIT && export LD_LIBRARY_PATH=/system/lib64:/system/vendor/lib64 || export LD_LIBRARY_PATH=/system/lib:/system/vendor/lib } recovery_cleanup() { mv /sbin_tmp /sbin 2>/dev/null export LD_LIBRARY_PATH=$OLD_LD_PATH [ -z $OLD_PATH ] || export PATH=$OLD_PATH ui_print "- Unmounting partitions" umount -l /system_root 2>/dev/null umount -l /system 2>/dev/null umount -l /vendor 2>/dev/null umount -l /dev/random 2>/dev/null } abort() { ui_print "$1" $BOOTMODE || recovery_cleanup exit 1 } set_perm() { chown $2:$3 $1 || exit 1 chmod $4 $1 || exit 1 [ -z $5 ] && chcon 'u:object_r:system_file:s0' $1 || chcon $5 $1 } set_perm_recursive() { find $1 -type d 2>/dev/null | while read dir; do set_perm $dir $2 $3 $4 $6 done find $1 -type f -o -type l 2>/dev/null | while read file; do set_perm $file $2 $3 $5 $6 done } mktouch() { mkdir -p ${1%/*} 2>/dev/null [ -z $2 ] && touch $1 || echo $2 > $1 chmod 644 $1 } request_size_check() { reqSizeM=`du -s $1 | cut -f1` reqSizeM=$((reqSizeM / 1024 + 1)) } request_zip_size_check() { reqSizeM=`unzip -l "$1" | tail -n 1 | awk '{ print int($1 / 1048567 + 1) }'` } image_size_check() { SIZE="`$MAGISKBIN/magisk --imgsize $IMG`" curUsedM=`echo "$SIZE" | cut -d" " -f1` curSizeM=`echo "$SIZE" | cut -d" " -f2` curFreeM=$((curSizeM - curUsedM)) }