#!/system/bin/sh ########################################################################################## # # Magisk Boot Image Patcher # by topjohnwu # # Usage: boot_patch.sh # # The following flags can be set in environment variables: # KEEPVERITY, KEEPFORCEENCRYPT # # This script should be placed in a directory with the following files: # # File name Type Description # # boot_patch.sh script A script to patch boot. Expect path to boot image as parameter. # (this file) The script will use binaries and files in its same directory # to complete the patching process # util_functions.sh script A script which hosts all functions requires for this script # to work properly # magiskinit binary The binary to replace /init, which has the magisk binary embedded # magiskboot binary A tool to unpack boot image, decompress ramdisk, extract ramdisk, # and patch the ramdisk for Magisk support # chromeos folder This folder should store all the utilities and keys to sign # (optional) a chromeos device. Used for Pixel C # # If the script is not running as root, then the input boot image should be a stock image # or have a backup included in ramdisk internally, since we cannot access the stock boot # image placed under /data we've created when previously installed # ########################################################################################## ########################################################################################## # Functions ########################################################################################## # Pure bash dirname implementation getdir() { case "$1" in */*) dir=${1%/*}; [ -z $dir ] && echo "/" || echo $dir ;; *) echo "." ;; esac } ########################################################################################## # Initialization ########################################################################################## if [ -z $SOURCEDMODE ]; then # Switch to the location of the script file cd "`getdir "${BASH_SOURCE:-$0}"`" # Load utility functions . ./util_functions.sh fi BOOTIMAGE="$1" [ -e "$BOOTIMAGE" ] || abort "$BOOTIMAGE does not exist!" # Flags [ -z $KEEPVERITY ] && KEEPVERITY=false [ -z $KEEPFORCEENCRYPT ] && KEEPFORCEENCRYPT=false chmod -R 755 . # Extract magisk if doesn't exist [ -e magisk ] || ./magiskinit -x magisk magisk ########################################################################################## # Unpack ########################################################################################## CHROMEOS=false ui_print "- Unpacking boot image" ./magiskboot --unpack "$BOOTIMAGE" case $? in 1 ) abort "! Unable to unpack boot image" ;; 2 ) ui_print "- ChromeOS boot image detected" CHROMEOS=true ;; 3 ) ui_print "! Sony ELF32 format detected" abort "! Please use BootBridge from @AdrianDC to flash Magisk" ;; 4 ) ui_print "! Sony ELF64 format detected" abort "! Stock kernel cannot be patched, please use a custom kernel" esac ########################################################################################## # Ramdisk restores ########################################################################################## # Test patch status and do restore, after this section, ramdisk.cpio.orig is guaranteed to exist ui_print "- Checking ramdisk status" ./magiskboot --cpio ramdisk.cpio test case $? in 0 ) # Stock boot ui_print "- Stock boot image detected" ui_print "- Backing up stock boot image" SHA1=`./magiskboot --sha1 "$BOOTIMAGE" 2>/dev/null` STOCKDUMP=stock_boot_${SHA1}.img.gz ./magiskboot --compress "$BOOTIMAGE" $STOCKDUMP cp -af ramdisk.cpio ramdisk.cpio.orig ;; 1 ) # Magisk patched ui_print "- Magisk patched boot image detected" # Find SHA1 of stock boot image [ -z $SHA1 ] && SHA1=`./magiskboot --cpio ramdisk.cpio sha1 2>/dev/null` ./magiskboot --cpio ramdisk.cpio restore cp -af ramdisk.cpio ramdisk.cpio.orig ;; 2 ) # Other patched ui_print "! Boot image patched by unsupported programs" abort "! Please restore stock boot image" ;; esac ########################################################################################## # Ramdisk patches ########################################################################################## ui_print "- Patching ramdisk" echo "KEEPVERITY=$KEEPVERITY" > config echo "KEEPFORCEENCRYPT=$KEEPFORCEENCRYPT" >> config [ ! -z $SHA1 ] && echo "SHA1=$SHA1" >> config ./magiskboot --cpio ramdisk.cpio \ "add 750 init magiskinit" \ "patch $KEEPVERITY $KEEPFORCEENCRYPT" \ "backup ramdisk.cpio.orig" \ "add 000 .backup/.magisk config" rm -f ramdisk.cpio.orig config ########################################################################################## # Binary patches ########################################################################################## if ! $KEEPVERITY; then [ -f dtb ] && ./magiskboot --dtb-patch dtb && ui_print "- Removing dm(avb)-verity in dtb" [ -f extra ] && ./magiskboot --dtb-patch extra && ui_print "- Removing dm(avb)-verity in extra-dtb" fi if [ -f kernel ]; then # Remove Samsung RKP ./magiskboot --hexpatch kernel \ 49010054011440B93FA00F71E9000054010840B93FA00F7189000054001840B91FA00F7188010054 \ A1020054011440B93FA00F7140020054010840B93FA00F71E0010054001840B91FA00F7181010054 # Remove Samsung defex # Before: [mov w2, #-221] (-__NR_execve) # After: [mov w2, #-32768] ./magiskboot --hexpatch kernel 821B8012 E2FF8F12 # Force kernel to load rootfs # skip_initramfs -> want_initramfs ./magiskboot --hexpatch kernel \ 736B69705F696E697472616D667300 \ 77616E745F696E697472616D667300 fi ########################################################################################## # Repack and flash ########################################################################################## ui_print "- Repacking boot image" ./magiskboot --repack "$BOOTIMAGE" || abort "! Unable to repack boot image!" # Sign chromeos boot $CHROMEOS && sign_chromeos ./magiskboot --cleanup