mirror of
https://github.com/topjohnwu/Magisk.git
synced 2024-12-22 16:07:39 +00:00
670fe8590c
Fixes #13 and #17
457 lines
13 KiB
Bash
457 lines
13 KiB
Bash
#!/sbin/sh
|
|
##########################################################################################
|
|
#
|
|
# Magisk Boot Image Patcher
|
|
# by topjohnwu
|
|
#
|
|
# This zip will patch your boot image with Magisk support
|
|
#
|
|
##########################################################################################
|
|
|
|
if [ -z "$BOOTMODE" ]; then
|
|
BOOTMODE=false
|
|
fi
|
|
|
|
TMPDIR=/tmp
|
|
($BOOTMODE) && TMPDIR=/dev/tmp
|
|
|
|
INSTALLER=$TMPDIR/magisk
|
|
|
|
COREDIR=/magisk/.core
|
|
|
|
# Boot Image Variables
|
|
CHROMEDIR=$INSTALLER/chromeos
|
|
NEWBOOT=$TMPDIR/boottmp/new-boot.img
|
|
UNPACKDIR=$TMPDIR/boottmp/bootunpack
|
|
RAMDISK=$TMPDIR/boottmp/ramdisk
|
|
|
|
# Default permissions
|
|
umask 022
|
|
|
|
##########################################################################################
|
|
# Flashable update-binary preparation
|
|
##########################################################################################
|
|
|
|
OUTFD=$2
|
|
ZIP=$3
|
|
|
|
readlink /proc/$$/fd/$OUTFD 2>/dev/null | grep /tmp >/dev/null
|
|
if [ "$?" -eq "0" ]; then
|
|
OUTFD=0
|
|
|
|
for FD in `ls /proc/$$/fd`; do
|
|
readlink /proc/$$/fd/$FD 2>/dev/null | grep pipe >/dev/null
|
|
if [ "$?" -eq "0" ]; then
|
|
ps | grep " 3 $FD " | grep -v grep >/dev/null
|
|
if [ "$?" -eq "0" ]; then
|
|
OUTFD=$FD
|
|
break
|
|
fi
|
|
fi
|
|
done
|
|
fi
|
|
|
|
mkdir -p $INSTALLER
|
|
cd $INSTALLER
|
|
unzip -o "$ZIP"
|
|
|
|
##########################################################################################
|
|
# Functions
|
|
##########################################################################################
|
|
|
|
ui_print() {
|
|
if ($BOOTMODE); then
|
|
echo "$1"
|
|
else
|
|
echo -n -e "ui_print $1\n" >> /proc/self/fd/$OUTFD
|
|
echo -n -e "ui_print\n" >> /proc/self/fd/$OUTFD
|
|
fi
|
|
}
|
|
|
|
getvar() {
|
|
local VARNAME=$1
|
|
local VALUE=$(eval echo \$"$VARNAME");
|
|
for FILE in /dev/.magisk /data/.magisk /cache/.magisk /system/.magisk; do
|
|
if [ -z "$VALUE" ]; then
|
|
LINE=$(cat $FILE 2>/dev/null | grep "$VARNAME=")
|
|
if [ ! -z "$LINE" ]; then
|
|
VALUE=${LINE#*=}
|
|
fi
|
|
fi
|
|
done
|
|
eval $VARNAME=\$VALUE
|
|
}
|
|
|
|
find_boot_image() {
|
|
if [ -z "$BOOTIMAGE" ]; then
|
|
for PARTITION in kern-a KERN-A android_boot ANDROID_BOOT kernel KERNEL boot BOOT lnx LNX; do
|
|
BOOTIMAGE=`readlink /dev/block/by-name/$PARTITION || readlink /dev/block/platform/*/by-name/$PARTITION || readlink /dev/block/platform/*/*/by-name/$PARTITION`
|
|
if [ ! -z "$BOOTIMAGE" ]; then break; fi
|
|
done
|
|
fi
|
|
if [ -z "$BOOTIMAGE" ]; then
|
|
FSTAB="/etc/recovery.fstab"
|
|
[ ! -f "$FSTAB" ] && FSTAB="/etc/recovery.fstab.bak"
|
|
[ -f "$FSTAB" ] && BOOTIMAGE=`grep -E '\b/boot\b' "$FSTAB" | grep -oE '/dev/[a-zA-Z0-9_./-]*'`
|
|
fi
|
|
}
|
|
|
|
is_mounted() {
|
|
if [ ! -z "$2" ]; then
|
|
cat /proc/mounts | grep $1 | grep $2, >/dev/null
|
|
else
|
|
cat /proc/mounts | grep $1 >/dev/null
|
|
fi
|
|
return $?
|
|
}
|
|
|
|
mount_image() {
|
|
if [ ! -d "$2" ]; then
|
|
mount -o rw,remount rootfs /
|
|
mkdir -p $2 2>/dev/null
|
|
($BOOTMODE) && mount -o ro,remount rootfs /
|
|
[ ! -d "$2" ] && return 1
|
|
fi
|
|
if (! is_mounted $2); then
|
|
LOOPDEVICE=
|
|
for LOOP in 0 1 2 3 4 5 6 7; do
|
|
if (! is_mounted $2); then
|
|
LOOPDEVICE=/dev/block/loop$LOOP
|
|
if [ ! -f "$LOOPDEVICE" ]; then
|
|
mknod $LOOPDEVICE b 7 $LOOP 2>/dev/null
|
|
fi
|
|
losetup $LOOPDEVICE $1
|
|
if [ "$?" -eq "0" ]; then
|
|
mount -t ext4 -o loop $LOOPDEVICE $2
|
|
if (! is_mounted $2); then
|
|
/system/bin/toolbox mount -t ext4 -o loop $LOOPDEVICE $2
|
|
fi
|
|
if (! is_mounted $2); then
|
|
/system/bin/toybox mount -t ext4 -o loop $LOOPDEVICE $2
|
|
fi
|
|
fi
|
|
if (is_mounted $2); then
|
|
ui_print "- Mounting $1 to $2"
|
|
break;
|
|
fi
|
|
fi
|
|
done
|
|
fi
|
|
}
|
|
|
|
grep_prop() {
|
|
REGEX="s/^$1=//p"
|
|
shift
|
|
FILES=$@
|
|
if [ -z "$FILES" ]; then
|
|
FILES='/system/build.prop'
|
|
fi
|
|
cat $FILES 2>/dev/null | sed -n $REGEX | head -n 1
|
|
}
|
|
|
|
unpack_boot() {
|
|
rm -rf $UNPACKDIR $RAMDISK 2>/dev/null
|
|
mkdir -p $UNPACKDIR
|
|
mkdir -p $RAMDISK
|
|
cd $UNPACKDIR
|
|
LD_LIBRARY_PATH=$SYSTEMLIB $BINDIR/bootimgtools --extract $1
|
|
|
|
cd $RAMDISK
|
|
gunzip -c < $UNPACKDIR/ramdisk.gz | cpio -i
|
|
}
|
|
|
|
repack_boot() {
|
|
cd $RAMDISK
|
|
find . | cpio -o -H newc 2>/dev/null | gzip -9 > $UNPACKDIR/ramdisk.gz
|
|
cd $UNPACKDIR
|
|
LD_LIBRARY_PATH=$SYSTEMLIB $BINDIR/bootimgtools --repack $ORIGBOOT
|
|
if [ -f chromeos ]; then
|
|
echo " " > config
|
|
echo " " > bootloader
|
|
LD_LIBRARY_PATH=$SYSTEMLIB $CHROMEDIR/futility vbutil_kernel --pack new-boot.img.signed --keyblock $CHROMEDIR/kernel.keyblock --signprivate $CHROMEDIR/kernel_data_key.vbprivk --version 1 --vmlinuz new-boot.img --config config --arch arm --bootloader bootloader --flags 0x1
|
|
rm -f new-boot.img
|
|
mv new-boot.img.signed new-boot.img
|
|
fi
|
|
if ($SAMSUNG); then
|
|
SAMSUNG_CHECK=$(cat new-boot.img | grep SEANDROIDENFORCE)
|
|
if [ $? -ne 0 ]; then
|
|
echo -n "SEANDROIDENFORCE" >> new-boot.img
|
|
fi
|
|
fi
|
|
mv new-boot.img $NEWBOOT
|
|
LD_LIBRARY_PATH=$SYSTEMLIB $BINDIR/bootimgtools --hexpatch $NEWBOOT \
|
|
49010054011440B93FA00F71E9000054010840B93FA00F7189000054001840B91FA00F7188010054 \
|
|
A1020054011440B93FA00F7140020054010840B93FA00F71E0010054001840B91FA00F7181010054
|
|
}
|
|
|
|
##########################################################################################
|
|
# Detection
|
|
##########################################################################################
|
|
|
|
ui_print "*****************************"
|
|
ui_print "MAGISK_VERSION_STUB"
|
|
ui_print "*****************************"
|
|
|
|
if [ ! -d "$INSTALLER/common" ]; then
|
|
ui_print "! Failed: Unable to extract zip file!"
|
|
exit 1
|
|
fi
|
|
|
|
ui_print "- Mounting /system(ro), /cache, /data"
|
|
mount -o ro /system 2>/dev/null
|
|
mount /cache 2>/dev/null
|
|
mount /data 2>/dev/null
|
|
|
|
if [ ! -f '/system/build.prop' ]; then
|
|
ui_print "! Failed: /system could not be mounted!"
|
|
exit 1
|
|
fi
|
|
|
|
if [ -z "$NOOVERRIDE" ]; then
|
|
# read override variables
|
|
getvar KEEPVERITY
|
|
getvar KEEPFORCEENCRYPT
|
|
getvar NORESTORE
|
|
getvar BOOTIMAGE
|
|
fi
|
|
|
|
if [ -z "$KEEPVERITY" ]; then
|
|
# we don't keep dm-verity by default
|
|
KEEPVERITY=false
|
|
fi
|
|
if [ -z "$KEEPFORCEENCRYPT" ]; then
|
|
# we don't keep forceencrypt by default
|
|
KEEPFORCEENCRYPT=false
|
|
fi
|
|
if [ -z "$NORESTORE" ]; then
|
|
# we restore ramdisk by default
|
|
NORESTORE=false
|
|
fi
|
|
|
|
SAMSUNG=false
|
|
SAMSUNG_CHECK=$(cat /system/build.prop | grep "ro.build.fingerprint=" | grep -i "samsung")
|
|
if [ $? -eq 0 ]; then
|
|
SAMSUNG=true
|
|
fi
|
|
|
|
API=$(grep_prop ro.build.version.sdk)
|
|
ABI=$(grep_prop ro.product.cpu.abi | cut -c-3)
|
|
ABI2=$(grep_prop ro.product.cpu.abi2 | cut -c-3)
|
|
ABILONG=$(grep_prop ro.product.cpu.abi)
|
|
|
|
ARCH=arm
|
|
IS64BIT=false
|
|
if [ "$ABI" = "x86" ]; then ARCH=x86; fi;
|
|
if [ "$ABI2" = "x86" ]; then ARCH=x86; fi;
|
|
if [ "$ABILONG" = "arm64-v8a" ]; then ARCH=arm64; IS64BIT=true; fi;
|
|
if [ "$ABILONG" = "x86_64" ]; then ARCH=x64; IS64BIT=true; fi;
|
|
|
|
|
|
if [ "$API" -lt "21" ]; then
|
|
ui_print "! Magisk is only for Lollipop 5.0+ (SDK 21+)"
|
|
exit 1
|
|
fi
|
|
|
|
ui_print "- Device platform: $ARCH"
|
|
|
|
BINDIR=$INSTALLER/$ARCH
|
|
chmod -R 755 $CHROMEDIR/futility $BINDIR
|
|
|
|
SYSTEMLIB=/system/lib
|
|
($IS64BIT) && SYSTEMLIB=/system/lib64
|
|
|
|
find_boot_image
|
|
if [ -z "$BOOTIMAGE" ]; then
|
|
ui_print "! Unable to detect boot image"
|
|
exit 1
|
|
fi
|
|
|
|
##########################################################################################
|
|
# Environment
|
|
##########################################################################################
|
|
|
|
ui_print "- Constructing environment"
|
|
|
|
if (is_mounted /data); then
|
|
rm -rf /data/busybox /data/magisk 2>/dev/null
|
|
mkdir -p /data/busybox
|
|
cp -af $BINDIR /data/magisk
|
|
cp -af $INSTALLER/common/init.magisk.rc $INSTALLER/common/magic_mask.sh /data/magisk
|
|
/data/magisk/busybox --install -s /data/busybox
|
|
ln -s /data/magisk/busybox /data/busybox/busybox
|
|
# Prevent issues
|
|
rm -f /data/busybox/su /data/busybox/sh
|
|
chcon -hR "u:object_r:system_file:s0" /data/magisk /data/busybox
|
|
chmod -R 755 /data/magisk /data/busybox
|
|
PATH=/data/busybox:$PATH
|
|
else
|
|
rm -rf /cache/data_bin 2>/dev/null
|
|
cp -af $BINDIR /cache/data_bin
|
|
cp -af $INSTALLER/common/init.magisk.rc $INSTALLER/common/magic_mask.sh /cache/data_bin
|
|
fi
|
|
|
|
##########################################################################################
|
|
# Image
|
|
##########################################################################################
|
|
|
|
# Fix SuperSU.....
|
|
($BOOTMODE) && $BINDIR/sepolicy-inject -s fsck --live
|
|
|
|
if (is_mounted /data); then
|
|
IMG=/data/magisk.img
|
|
else
|
|
IMG=/cache/magisk.img
|
|
ui_print "- Data unavalible, use cache workaround"
|
|
fi
|
|
|
|
if [ -f "$IMG" ]; then
|
|
ui_print "- $IMG detected!"
|
|
else
|
|
ui_print "- Creating $IMG"
|
|
make_ext4fs -l 64M -a /magisk -S $INSTALLER/common/file_contexts_image $IMG
|
|
fi
|
|
|
|
mount_image $IMG /magisk
|
|
if (! is_mounted /magisk); then
|
|
ui_print "! Image mount failed... abort"
|
|
exit 1
|
|
fi
|
|
MAGISKLOOP=$LOOPDEVICE
|
|
|
|
mkdir -p /magisk/.core/magiskhide 2>/dev/null
|
|
cp -af $INSTALLER/common/magiskhide/. /magisk/.core/magiskhide
|
|
|
|
##########################################################################################
|
|
# Boot image patch
|
|
##########################################################################################
|
|
|
|
ui_print "- Found Boot Image: $BOOTIMAGE"
|
|
|
|
rm -rf $TMPDIR/boottmp 2>/dev/null
|
|
mkdir -p $TMPDIR/boottmp
|
|
|
|
ORIGBOOT=$BOOTIMAGE
|
|
|
|
ui_print "- Unpacking boot image"
|
|
unpack_boot $ORIGBOOT
|
|
|
|
# Restore ramdisk
|
|
SUPERSU=false
|
|
if (! $NORESTORE); then
|
|
if [ -d ".backup" ]; then
|
|
ui_print "- Restoring ramdisk with ramdisk backup"
|
|
cp -af .backup/. .
|
|
rm -rf magisk init.magisk.rc sbin/magic_mask.sh 2>/dev/null
|
|
else
|
|
[ -f "sbin/launch_daemonsu.sh" ] && SUPERSU=true
|
|
if ($SUPERSU); then
|
|
ui_print "- SuperSU patched boot detected!"
|
|
ui_print "- Adding auto patch script for SuperSU"
|
|
cp -af $INSTALLER/common/custom_ramdisk_patch.sh /data/custom_ramdisk_patch.sh
|
|
fi
|
|
if [ -d "magisk" ]; then
|
|
# If Magisk is installed and not SuperSU and no ramdisk backups
|
|
# Restore previous stock boot image
|
|
if (! $SUPERSU); then
|
|
cp -af /data/stock_boot_*.gz /data/stock_boot.img.gz 2>/dev/null
|
|
gzip -d /data/stock_boot.img.gz 2>/dev/null
|
|
if [ -f "/data/stock_boot.img" ]; then
|
|
ui_print "- Restoring boot image with backup"
|
|
$ORIGBOOT=/data/stock_boot.img
|
|
unpack_boot $ORIGBOOT
|
|
fi
|
|
fi
|
|
# Removing possible modifications
|
|
rm -rf magisk init.magisk.rc sbin/magic_mask.sh 2>/dev/null
|
|
rm -rf init.xposed.rc sbin/mount_xposed.sh 2>/dev/null
|
|
fi
|
|
fi
|
|
fi
|
|
|
|
# SuperSU already backup stock boot, no need to do again
|
|
if (! $SUPERSU); then
|
|
ui_print "- Creating backups"
|
|
mkdir .backup 2>/dev/null
|
|
cp -af *fstab* verity_key sepolicy .backup 2>/dev/null
|
|
if (is_mounted /data); then
|
|
[ "$ORIGBOOT" != "/data/stock_boot.img" ] && dd if=$ORIGBOOT of=/data/stock_boot.img
|
|
else
|
|
dd if=$ORIGBOOT of=/cache/stock_boot.img
|
|
fi
|
|
fi
|
|
|
|
# Patch ramdisk
|
|
ui_print "- Patching ramdisk"
|
|
|
|
# Add magisk entrypoint
|
|
for INIT in init*.rc; do
|
|
if [ $(grep -c "import /init.environ.rc" $INIT) -ne "0" ] && [ `grep -c "import /init.magisk.rc" $INIT` -eq "0" ]; then
|
|
cp $INIT .backup
|
|
sed -i "/import \/init\.environ\.rc/iimport /init.magisk.rc" $INIT
|
|
break
|
|
fi
|
|
done
|
|
|
|
if (! $SUPERSU); then
|
|
sed -i "/selinux.reload_policy/d" init.rc
|
|
find . -type f -name "*fstab*" 2>/dev/null | while read FSTAB ; do
|
|
if (! $KEEPVERITY); then
|
|
sed -i "s/,support_scfs//g" $FSTAB
|
|
sed -i 's;,\{0,1\}verify\(=[^,]*\)\{0,1\};;g' $FSTAB
|
|
fi
|
|
if (! $KEEPFORCEENCRYPT); then
|
|
sed -i "s/forceencrypt/encryptable/g" $FSTAB
|
|
sed -i "s/forcefdeorfbe/encryptable/g" $FSTAB
|
|
fi
|
|
done
|
|
if (! $KEEPVERITY); then
|
|
rm verity_key 2>/dev/null
|
|
fi
|
|
fi
|
|
|
|
# sepolicy patches
|
|
LD_LIBRARY_PATH=$SYSTEMLIB $BINDIR/sepolicy-inject --magisk -P sepolicy
|
|
|
|
# Add new items
|
|
mkdir -p magisk 2>/dev/null
|
|
cp -af $INSTALLER/common/init.magisk.rc init.magisk.rc
|
|
cp -af $INSTALLER/common/magic_mask.sh sbin/magic_mask.sh
|
|
|
|
chmod 0755 magisk
|
|
chmod 0750 init.magisk.rc sbin/magic_mask.sh
|
|
|
|
ui_print "- Repacking boot image"
|
|
repack_boot
|
|
|
|
BOOTSIZE=`blockdev --getsize64 $BOOTIMAGE 2>/dev/null`
|
|
NEWSIZE=`ls -l $NEWBOOT | awk '{print $5}'`
|
|
if [ "$NEWSIZE" -gt "$BOOTSIZE" ]; then
|
|
ui_print "! Boot partition space insufficient"
|
|
ui_print "! Remove ramdisk backups and try again"
|
|
rm -rf $RAMDISK/.backup $NEWBOOT 2>/dev/null
|
|
repack_boot
|
|
NEWSIZE=`ls -l $NEWBOOT | awk '{print $5}'`
|
|
if [ "$NEWSIZE" -gt "$BOOTSIZE" ]; then
|
|
ui_print "! Boot partition size still too small..."
|
|
ui_print "! Unable to install Magisk"
|
|
exit 1
|
|
fi
|
|
fi
|
|
|
|
chmod 644 $NEWBOOT
|
|
|
|
ui_print "- Flashing new boot image"
|
|
[ ! -L "$BOOTIMAGE" ] && dd if=/dev/zero of=$BOOTIMAGE bs=4096 2>/dev/null
|
|
dd if=$NEWBOOT of=$BOOTIMAGE bs=4096
|
|
|
|
if (! $BOOTMODE); then
|
|
ui_print "- Unmounting partitions"
|
|
umount /magisk
|
|
losetup -d $MAGISKLOOP
|
|
umount /system
|
|
rmdir /magisk
|
|
fi
|
|
|
|
ui_print "- Done"
|
|
exit 0
|