Magisk/scripts/boot_patch.sh

193 lines
4.8 KiB
Bash
Raw Normal View History

2017-06-03 14:19:01 +02:00
#!/system/bin/sh
###########################################################################################
2017-06-03 14:19:01 +02:00
#
# Magisk Boot Image Patcher
# by topjohnwu
2017-07-24 20:02:19 +02:00
#
2018-08-09 12:13:07 +02:00
# Usage: boot_patch.sh <bootimage>
#
2018-08-09 12:13:07 +02:00
# The following flags can be set in environment variables:
# KEEPVERITY, KEEPFORCEENCRYPT, RECOVERYMODE
#
2017-07-09 18:17:34 +02:00
# This script should be placed in a directory with the following files:
2017-07-24 20:02:19 +02:00
#
# File name Type Description
2017-07-24 20:02:19 +02:00
#
# boot_patch.sh script A script to patch boot image for Magisk.
# (this file) The script will use binaries and files in its same directory
# to complete the patching process
# util_functions.sh script A script which hosts all functions required for this script
# to work properly
# magiskinit binary The binary to replace /init; magisk binary embedded
# magiskboot binary A tool to manipulate boot images
# chromeos folder This folder includes all the utilities and keys to sign
# (optional) chromeos boot images. Currently only used for Pixel C
2017-06-03 14:19:01 +02:00
#
###########################################################################################
############
2017-06-24 16:38:20 +02:00
# Functions
############
2017-06-03 14:19:01 +02:00
2017-06-24 16:38:20 +02:00
# Pure bash dirname implementation
getdir() {
case "$1" in
*/*)
dir=${1%/*}
if [ -z $dir ]; then
echo "/"
else
echo $dir
fi
;;
*) echo "." ;;
esac
2017-06-24 16:38:20 +02:00
}
#################
2017-06-24 16:38:20 +02:00
# Initialization
#################
2017-06-03 14:19:01 +02:00
if [ -z $SOURCEDMODE ]; then
# Switch to the location of the script file
cd "`getdir "${BASH_SOURCE:-$0}"`"
# Load utility functions
. ./util_functions.sh
fi
2017-10-07 16:08:10 +02:00
BOOTIMAGE="$1"
[ -e "$BOOTIMAGE" ] || abort "$BOOTIMAGE does not exist!"
# Flags
2017-10-07 16:08:10 +02:00
[ -z $KEEPVERITY ] && KEEPVERITY=false
[ -z $KEEPFORCEENCRYPT ] && KEEPFORCEENCRYPT=false
[ -z $RECOVERYMODE ] && RECOVERYMODE=false
export KEEPVERITY
export KEEPFORCEENCRYPT
2017-10-07 16:08:10 +02:00
2017-09-02 17:24:34 +02:00
chmod -R 755 .
2017-06-03 14:19:01 +02:00
# Extract magisk if doesn't exist
2017-11-09 17:54:54 +01:00
[ -e magisk ] || ./magiskinit -x magisk magisk
#########
2017-06-24 16:38:20 +02:00
# Unpack
#########
2017-09-06 10:13:23 +02:00
2017-08-16 21:46:01 +02:00
CHROMEOS=false
2017-06-24 16:38:20 +02:00
2017-09-15 21:48:58 +02:00
ui_print "- Unpacking boot image"
./magiskboot unpack "$BOOTIMAGE"
2017-06-03 14:19:01 +02:00
case $? in
1 )
abort "! Unsupported/Unknown image format"
2017-06-03 14:19:01 +02:00
;;
2 )
2017-10-07 16:08:10 +02:00
ui_print "- ChromeOS boot image detected"
CHROMEOS=true
;;
2017-06-03 14:19:01 +02:00
esac
[ -f recovery_dtbo ] && RECOVERYMODE=true
###################
# Ramdisk Restores
###################
2017-06-03 14:19:01 +02:00
# Test patch status and do restore
2017-09-15 21:48:58 +02:00
ui_print "- Checking ramdisk status"
if [ -e ramdisk.cpio ]; then
./magiskboot cpio ramdisk.cpio test
STATUS=$?
else
# Stock A only system-as-root
STATUS=0
fi
2019-02-25 02:39:01 +01:00
case $((STATUS & 3)) in
2017-06-03 14:19:01 +02:00
0 ) # Stock boot
ui_print "- Stock boot image detected"
SHA1=`./magiskboot sha1 "$BOOTIMAGE" 2>/dev/null`
cat $BOOTIMAGE > stock_boot.img
cp -af ramdisk.cpio ramdisk.cpio.orig 2>/dev/null
2017-06-03 14:19:01 +02:00
;;
1 ) # Magisk patched
2018-08-09 12:13:07 +02:00
ui_print "- Magisk patched boot image detected"
# Find SHA1 of stock boot image
[ -z $SHA1 ] && SHA1=`./magiskboot cpio ramdisk.cpio sha1 2>/dev/null`
./magiskboot cpio ramdisk.cpio restore
2019-09-22 12:17:54 +02:00
cp -af ramdisk.cpio ramdisk.cpio.orig
2017-06-03 14:19:01 +02:00
;;
2 ) # Unsupported
2018-08-09 12:13:07 +02:00
ui_print "! Boot image patched by unsupported programs"
abort "! Please restore back to stock boot image"
2017-06-03 14:19:01 +02:00
;;
esac
##################
# Ramdisk Patches
##################
2017-06-03 14:19:01 +02:00
2017-09-15 21:48:58 +02:00
ui_print "- Patching ramdisk"
2017-06-03 14:19:01 +02:00
echo "KEEPVERITY=$KEEPVERITY" > config
echo "KEEPFORCEENCRYPT=$KEEPFORCEENCRYPT" >> config
echo "RECOVERYMODE=$RECOVERYMODE" >> config
[ ! -z $SHA1 ] && echo "SHA1=$SHA1" >> config
./magiskboot cpio ramdisk.cpio \
"add 750 init magiskinit" \
"patch" \
"backup ramdisk.cpio.orig" \
"mkdir 000 .backup" \
"add 000 .backup/.magisk config"
2017-06-03 14:19:01 +02:00
2019-02-25 02:39:01 +01:00
if [ $((STATUS & 4)) -ne 0 ]; then
ui_print "- Compressing ramdisk"
./magiskboot cpio ramdisk.cpio compress
2019-02-25 02:39:01 +01:00
fi
rm -f ramdisk.cpio.orig config
2017-06-03 14:19:01 +02:00
#################
# Binary Patches
#################
2017-06-03 14:19:01 +02:00
for dt in dtb kernel_dtb extra recovery_dtbo; do
[ -f $dt ] && ./magiskboot dtb $dt patch && ui_print "- Patch fstab in $dt"
done
2017-06-03 14:19:01 +02:00
2018-02-09 20:34:13 +01:00
if [ -f kernel ]; then
# Remove Samsung RKP
./magiskboot hexpatch kernel \
2018-02-09 20:34:13 +01:00
49010054011440B93FA00F71E9000054010840B93FA00F7189000054001840B91FA00F7188010054 \
A1020054011440B93FA00F7140020054010840B93FA00F71E0010054001840B91FA00F7181010054
2017-06-03 14:19:01 +02:00
# Remove Samsung defex
# Before: [mov w2, #-221] (-__NR_execve)
# After: [mov w2, #-32768]
./magiskboot hexpatch kernel 821B8012 E2FF8F12
# Force kernel to load rootfs
2018-02-09 20:34:13 +01:00
# skip_initramfs -> want_initramfs
./magiskboot hexpatch kernel \
736B69705F696E697472616D667300 \
77616E745F696E697472616D667300
2018-02-09 20:34:13 +01:00
fi
2017-09-12 22:07:25 +02:00
#################
# Repack & Flash
#################
2017-11-10 18:33:50 +01:00
2017-09-15 21:48:58 +02:00
ui_print "- Repacking boot image"
./magiskboot repack "$BOOTIMAGE" || abort "! Unable to repack boot image!"
2017-06-03 14:19:01 +02:00
2017-07-09 18:17:34 +02:00
# Sign chromeos boot
2017-09-06 10:13:23 +02:00
$CHROMEOS && sign_chromeos
2017-07-09 18:17:34 +02:00
# Copy existing rules for migration
$BOOTMODE && copy_sepolicy_rules
2019-02-25 02:39:01 +01:00
# Reset any error code
true