Magisk/scripts/addon.d.sh

137 lines
3.0 KiB
Bash
Raw Normal View History

2020-02-09 12:07:49 +01:00
#!/sbin/sh
# ADDOND_VERSION=2
########################################################
2017-07-30 21:03:52 +02:00
#
2017-06-18 18:15:44 +02:00
# Magisk Survival Script for ROMs with addon.d support
2020-02-09 12:07:49 +01:00
# by topjohnwu and osm0sis
2017-07-30 21:03:52 +02:00
#
2020-02-09 12:07:49 +01:00
########################################################
trampoline() {
mount /data 2>/dev/null
if [ -f /data/adb/magisk/addon.d.sh ]; then
exec sh /data/adb/magisk/addon.d.sh "$@"
else
OUTFD=$(ps | grep -v 'grep' | grep -oE 'update(.*)' | cut -d" " -f3)
[ "$OUTFD" -eq "$OUTFD" ] 2>/dev/null || OUTFD=$(ps -Af | grep -v 'grep' | grep -oE 'update(.*)' | cut -d" " -f3)
[ "$OUTFD" -eq "$OUTFD" ] 2>/dev/null || OUTFD=$(ps | grep -v 'grep' | grep -oE 'status_fd=(.*)' | cut -d= -f2)
[ "$OUTFD" -eq "$OUTFD" ] 2>/dev/null || OUTFD=$(ps -Af | grep -v 'grep' | grep -oE 'status_fd=(.*)' | cut -d= -f2)
ui_print() { echo -e "ui_print $1\nui_print" >> /proc/self/fd/$OUTFD; }
ui_print "************************"
ui_print "* Magisk addon.d failed"
ui_print "************************"
ui_print "! Cannot find Magisk binaries - was data wiped or not decrypted?"
ui_print "! Reflash OTA from decrypted recovery or reflash Magisk"
exit 1
fi
}
# Always use the script in /data
[ "$0" = /data/adb/magisk/addon.d.sh ] || trampoline
2017-06-18 18:15:44 +02:00
2018-08-03 16:40:49 +02:00
V1_FUNCS=/tmp/backuptool.functions
V2_FUNCS=/postinstall/system/bin/backuptool_ab.functions
if [ -f $V1_FUNCS ]; then
. $V1_FUNCS
backuptool_ab=false
elif [ -f $V2_FUNCS ]; then
. $V2_FUNCS
else
return 1
fi
2017-06-18 18:15:44 +02:00
initialize() {
MAGISKBIN=/data/adb/magisk
2017-07-02 15:36:09 +02:00
if [ ! -d $MAGISKBIN ]; then
echo "! Cannot find Magisk binaries!"
exit 1
fi
2017-07-09 18:17:34 +02:00
# Load utility functions
2017-06-18 18:15:44 +02:00
. $MAGISKBIN/util_functions.sh
if $BOOTMODE; then
# Override ui_print when booted
ui_print() { log -t Magisk -- "$1"; }
else
OUTFD=
setup_flashable
fi
}
main() {
if ! $backuptool_ab; then
# Wait for post addon.d-v1 processes to finish
sleep 5
fi
# Ensure we aren't in /tmp/addon.d anymore (since it's been deleted by addon.d)
cd $TMPDIR
$BOOTMODE || recovery_actions
2017-06-18 18:15:44 +02:00
ui_print "************************"
2017-07-30 21:03:52 +02:00
ui_print "* Magisk v$MAGISK_VER addon.d"
2017-06-18 18:15:44 +02:00
ui_print "************************"
mount_partitions
check_data
2019-04-06 19:04:17 +02:00
get_flags
if $backuptool_ab; then
# Swap the slot for addon.d-v2
if [ ! -z $SLOT ]; then [ $SLOT = _a ] && SLOT=_b || SLOT=_a; fi
fi
find_boot_image
2018-07-04 17:46:16 +02:00
[ -z $BOOTIMAGE ] && abort "! Unable to detect target image"
ui_print "- Target image: $BOOTIMAGE"
2017-06-18 18:15:44 +02:00
remove_system_su
find_manager_apk
install_magisk
2017-09-26 14:21:43 +02:00
# Cleanups
$BOOTMODE || recovery_cleanup
rm -rf $TMPDIR
2017-06-18 18:15:44 +02:00
ui_print "- Done"
exit 0
}
case "$1" in
backup)
# Stub
;;
restore)
# Stub
;;
pre-backup)
# Stub
;;
post-backup)
# Stub
;;
pre-restore)
# Stub
;;
post-restore)
initialize
if $backuptool_ab; then
$BOOTMODE && su=su || su=sh
exec $su -c "sh $0 addond-v2"
else
# Run in background, hack for addon.d-v1
(main) &
fi
2017-06-18 18:15:44 +02:00
;;
2018-08-03 16:40:49 +02:00
addond-v2)
initialize
main
2018-08-03 16:40:49 +02:00
;;
2017-06-18 18:15:44 +02:00
esac