Initial commit
This commit is contained in:
commit
d07ace7fc5
674
Magisk-v23.0/LICENSE
Normal file
674
Magisk-v23.0/LICENSE
Normal file
@ -0,0 +1,674 @@
|
|||||||
|
GNU GENERAL PUBLIC LICENSE
|
||||||
|
Version 3, 29 June 2007
|
||||||
|
|
||||||
|
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||||
|
Everyone is permitted to copy and distribute verbatim copies
|
||||||
|
of this license document, but changing it is not allowed.
|
||||||
|
|
||||||
|
Preamble
|
||||||
|
|
||||||
|
The GNU General Public License is a free, copyleft license for
|
||||||
|
software and other kinds of works.
|
||||||
|
|
||||||
|
The licenses for most software and other practical works are designed
|
||||||
|
to take away your freedom to share and change the works. By contrast,
|
||||||
|
the GNU General Public License is intended to guarantee your freedom to
|
||||||
|
share and change all versions of a program--to make sure it remains free
|
||||||
|
software for all its users. We, the Free Software Foundation, use the
|
||||||
|
GNU General Public License for most of our software; it applies also to
|
||||||
|
any other work released this way by its authors. You can apply it to
|
||||||
|
your programs, too.
|
||||||
|
|
||||||
|
When we speak of free software, we are referring to freedom, not
|
||||||
|
price. Our General Public Licenses are designed to make sure that you
|
||||||
|
have the freedom to distribute copies of free software (and charge for
|
||||||
|
them if you wish), that you receive source code or can get it if you
|
||||||
|
want it, that you can change the software or use pieces of it in new
|
||||||
|
free programs, and that you know you can do these things.
|
||||||
|
|
||||||
|
To protect your rights, we need to prevent others from denying you
|
||||||
|
these rights or asking you to surrender the rights. Therefore, you have
|
||||||
|
certain responsibilities if you distribute copies of the software, or if
|
||||||
|
you modify it: responsibilities to respect the freedom of others.
|
||||||
|
|
||||||
|
For example, if you distribute copies of such a program, whether
|
||||||
|
gratis or for a fee, you must pass on to the recipients the same
|
||||||
|
freedoms that you received. You must make sure that they, too, receive
|
||||||
|
or can get the source code. And you must show them these terms so they
|
||||||
|
know their rights.
|
||||||
|
|
||||||
|
Developers that use the GNU GPL protect your rights with two steps:
|
||||||
|
(1) assert copyright on the software, and (2) offer you this License
|
||||||
|
giving you legal permission to copy, distribute and/or modify it.
|
||||||
|
|
||||||
|
For the developers' and authors' protection, the GPL clearly explains
|
||||||
|
that there is no warranty for this free software. For both users' and
|
||||||
|
authors' sake, the GPL requires that modified versions be marked as
|
||||||
|
changed, so that their problems will not be attributed erroneously to
|
||||||
|
authors of previous versions.
|
||||||
|
|
||||||
|
Some devices are designed to deny users access to install or run
|
||||||
|
modified versions of the software inside them, although the manufacturer
|
||||||
|
can do so. This is fundamentally incompatible with the aim of
|
||||||
|
protecting users' freedom to change the software. The systematic
|
||||||
|
pattern of such abuse occurs in the area of products for individuals to
|
||||||
|
use, which is precisely where it is most unacceptable. Therefore, we
|
||||||
|
have designed this version of the GPL to prohibit the practice for those
|
||||||
|
products. If such problems arise substantially in other domains, we
|
||||||
|
stand ready to extend this provision to those domains in future versions
|
||||||
|
of the GPL, as needed to protect the freedom of users.
|
||||||
|
|
||||||
|
Finally, every program is threatened constantly by software patents.
|
||||||
|
States should not allow patents to restrict development and use of
|
||||||
|
software on general-purpose computers, but in those that do, we wish to
|
||||||
|
avoid the special danger that patents applied to a free program could
|
||||||
|
make it effectively proprietary. To prevent this, the GPL assures that
|
||||||
|
patents cannot be used to render the program non-free.
|
||||||
|
|
||||||
|
The precise terms and conditions for copying, distribution and
|
||||||
|
modification follow.
|
||||||
|
|
||||||
|
TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
0. Definitions.
|
||||||
|
|
||||||
|
"This License" refers to version 3 of the GNU General Public License.
|
||||||
|
|
||||||
|
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||||
|
works, such as semiconductor masks.
|
||||||
|
|
||||||
|
"The Program" refers to any copyrightable work licensed under this
|
||||||
|
License. Each licensee is addressed as "you". "Licensees" and
|
||||||
|
"recipients" may be individuals or organizations.
|
||||||
|
|
||||||
|
To "modify" a work means to copy from or adapt all or part of the work
|
||||||
|
in a fashion requiring copyright permission, other than the making of an
|
||||||
|
exact copy. The resulting work is called a "modified version" of the
|
||||||
|
earlier work or a work "based on" the earlier work.
|
||||||
|
|
||||||
|
A "covered work" means either the unmodified Program or a work based
|
||||||
|
on the Program.
|
||||||
|
|
||||||
|
To "propagate" a work means to do anything with it that, without
|
||||||
|
permission, would make you directly or secondarily liable for
|
||||||
|
infringement under applicable copyright law, except executing it on a
|
||||||
|
computer or modifying a private copy. Propagation includes copying,
|
||||||
|
distribution (with or without modification), making available to the
|
||||||
|
public, and in some countries other activities as well.
|
||||||
|
|
||||||
|
To "convey" a work means any kind of propagation that enables other
|
||||||
|
parties to make or receive copies. Mere interaction with a user through
|
||||||
|
a computer network, with no transfer of a copy, is not conveying.
|
||||||
|
|
||||||
|
An interactive user interface displays "Appropriate Legal Notices"
|
||||||
|
to the extent that it includes a convenient and prominently visible
|
||||||
|
feature that (1) displays an appropriate copyright notice, and (2)
|
||||||
|
tells the user that there is no warranty for the work (except to the
|
||||||
|
extent that warranties are provided), that licensees may convey the
|
||||||
|
work under this License, and how to view a copy of this License. If
|
||||||
|
the interface presents a list of user commands or options, such as a
|
||||||
|
menu, a prominent item in the list meets this criterion.
|
||||||
|
|
||||||
|
1. Source Code.
|
||||||
|
|
||||||
|
The "source code" for a work means the preferred form of the work
|
||||||
|
for making modifications to it. "Object code" means any non-source
|
||||||
|
form of a work.
|
||||||
|
|
||||||
|
A "Standard Interface" means an interface that either is an official
|
||||||
|
standard defined by a recognized standards body, or, in the case of
|
||||||
|
interfaces specified for a particular programming language, one that
|
||||||
|
is widely used among developers working in that language.
|
||||||
|
|
||||||
|
The "System Libraries" of an executable work include anything, other
|
||||||
|
than the work as a whole, that (a) is included in the normal form of
|
||||||
|
packaging a Major Component, but which is not part of that Major
|
||||||
|
Component, and (b) serves only to enable use of the work with that
|
||||||
|
Major Component, or to implement a Standard Interface for which an
|
||||||
|
implementation is available to the public in source code form. A
|
||||||
|
"Major Component", in this context, means a major essential component
|
||||||
|
(kernel, window system, and so on) of the specific operating system
|
||||||
|
(if any) on which the executable work runs, or a compiler used to
|
||||||
|
produce the work, or an object code interpreter used to run it.
|
||||||
|
|
||||||
|
The "Corresponding Source" for a work in object code form means all
|
||||||
|
the source code needed to generate, install, and (for an executable
|
||||||
|
work) run the object code and to modify the work, including scripts to
|
||||||
|
control those activities. However, it does not include the work's
|
||||||
|
System Libraries, or general-purpose tools or generally available free
|
||||||
|
programs which are used unmodified in performing those activities but
|
||||||
|
which are not part of the work. For example, Corresponding Source
|
||||||
|
includes interface definition files associated with source files for
|
||||||
|
the work, and the source code for shared libraries and dynamically
|
||||||
|
linked subprograms that the work is specifically designed to require,
|
||||||
|
such as by intimate data communication or control flow between those
|
||||||
|
subprograms and other parts of the work.
|
||||||
|
|
||||||
|
The Corresponding Source need not include anything that users
|
||||||
|
can regenerate automatically from other parts of the Corresponding
|
||||||
|
Source.
|
||||||
|
|
||||||
|
The Corresponding Source for a work in source code form is that
|
||||||
|
same work.
|
||||||
|
|
||||||
|
2. Basic Permissions.
|
||||||
|
|
||||||
|
All rights granted under this License are granted for the term of
|
||||||
|
copyright on the Program, and are irrevocable provided the stated
|
||||||
|
conditions are met. This License explicitly affirms your unlimited
|
||||||
|
permission to run the unmodified Program. The output from running a
|
||||||
|
covered work is covered by this License only if the output, given its
|
||||||
|
content, constitutes a covered work. This License acknowledges your
|
||||||
|
rights of fair use or other equivalent, as provided by copyright law.
|
||||||
|
|
||||||
|
You may make, run and propagate covered works that you do not
|
||||||
|
convey, without conditions so long as your license otherwise remains
|
||||||
|
in force. You may convey covered works to others for the sole purpose
|
||||||
|
of having them make modifications exclusively for you, or provide you
|
||||||
|
with facilities for running those works, provided that you comply with
|
||||||
|
the terms of this License in conveying all material for which you do
|
||||||
|
not control copyright. Those thus making or running the covered works
|
||||||
|
for you must do so exclusively on your behalf, under your direction
|
||||||
|
and control, on terms that prohibit them from making any copies of
|
||||||
|
your copyrighted material outside their relationship with you.
|
||||||
|
|
||||||
|
Conveying under any other circumstances is permitted solely under
|
||||||
|
the conditions stated below. Sublicensing is not allowed; section 10
|
||||||
|
makes it unnecessary.
|
||||||
|
|
||||||
|
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||||
|
|
||||||
|
No covered work shall be deemed part of an effective technological
|
||||||
|
measure under any applicable law fulfilling obligations under article
|
||||||
|
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||||
|
similar laws prohibiting or restricting circumvention of such
|
||||||
|
measures.
|
||||||
|
|
||||||
|
When you convey a covered work, you waive any legal power to forbid
|
||||||
|
circumvention of technological measures to the extent such circumvention
|
||||||
|
is effected by exercising rights under this License with respect to
|
||||||
|
the covered work, and you disclaim any intention to limit operation or
|
||||||
|
modification of the work as a means of enforcing, against the work's
|
||||||
|
users, your or third parties' legal rights to forbid circumvention of
|
||||||
|
technological measures.
|
||||||
|
|
||||||
|
4. Conveying Verbatim Copies.
|
||||||
|
|
||||||
|
You may convey verbatim copies of the Program's source code as you
|
||||||
|
receive it, in any medium, provided that you conspicuously and
|
||||||
|
appropriately publish on each copy an appropriate copyright notice;
|
||||||
|
keep intact all notices stating that this License and any
|
||||||
|
non-permissive terms added in accord with section 7 apply to the code;
|
||||||
|
keep intact all notices of the absence of any warranty; and give all
|
||||||
|
recipients a copy of this License along with the Program.
|
||||||
|
|
||||||
|
You may charge any price or no price for each copy that you convey,
|
||||||
|
and you may offer support or warranty protection for a fee.
|
||||||
|
|
||||||
|
5. Conveying Modified Source Versions.
|
||||||
|
|
||||||
|
You may convey a work based on the Program, or the modifications to
|
||||||
|
produce it from the Program, in the form of source code under the
|
||||||
|
terms of section 4, provided that you also meet all of these conditions:
|
||||||
|
|
||||||
|
a) The work must carry prominent notices stating that you modified
|
||||||
|
it, and giving a relevant date.
|
||||||
|
|
||||||
|
b) The work must carry prominent notices stating that it is
|
||||||
|
released under this License and any conditions added under section
|
||||||
|
7. This requirement modifies the requirement in section 4 to
|
||||||
|
"keep intact all notices".
|
||||||
|
|
||||||
|
c) You must license the entire work, as a whole, under this
|
||||||
|
License to anyone who comes into possession of a copy. This
|
||||||
|
License will therefore apply, along with any applicable section 7
|
||||||
|
additional terms, to the whole of the work, and all its parts,
|
||||||
|
regardless of how they are packaged. This License gives no
|
||||||
|
permission to license the work in any other way, but it does not
|
||||||
|
invalidate such permission if you have separately received it.
|
||||||
|
|
||||||
|
d) If the work has interactive user interfaces, each must display
|
||||||
|
Appropriate Legal Notices; however, if the Program has interactive
|
||||||
|
interfaces that do not display Appropriate Legal Notices, your
|
||||||
|
work need not make them do so.
|
||||||
|
|
||||||
|
A compilation of a covered work with other separate and independent
|
||||||
|
works, which are not by their nature extensions of the covered work,
|
||||||
|
and which are not combined with it such as to form a larger program,
|
||||||
|
in or on a volume of a storage or distribution medium, is called an
|
||||||
|
"aggregate" if the compilation and its resulting copyright are not
|
||||||
|
used to limit the access or legal rights of the compilation's users
|
||||||
|
beyond what the individual works permit. Inclusion of a covered work
|
||||||
|
in an aggregate does not cause this License to apply to the other
|
||||||
|
parts of the aggregate.
|
||||||
|
|
||||||
|
6. Conveying Non-Source Forms.
|
||||||
|
|
||||||
|
You may convey a covered work in object code form under the terms
|
||||||
|
of sections 4 and 5, provided that you also convey the
|
||||||
|
machine-readable Corresponding Source under the terms of this License,
|
||||||
|
in one of these ways:
|
||||||
|
|
||||||
|
a) Convey the object code in, or embodied in, a physical product
|
||||||
|
(including a physical distribution medium), accompanied by the
|
||||||
|
Corresponding Source fixed on a durable physical medium
|
||||||
|
customarily used for software interchange.
|
||||||
|
|
||||||
|
b) Convey the object code in, or embodied in, a physical product
|
||||||
|
(including a physical distribution medium), accompanied by a
|
||||||
|
written offer, valid for at least three years and valid for as
|
||||||
|
long as you offer spare parts or customer support for that product
|
||||||
|
model, to give anyone who possesses the object code either (1) a
|
||||||
|
copy of the Corresponding Source for all the software in the
|
||||||
|
product that is covered by this License, on a durable physical
|
||||||
|
medium customarily used for software interchange, for a price no
|
||||||
|
more than your reasonable cost of physically performing this
|
||||||
|
conveying of source, or (2) access to copy the
|
||||||
|
Corresponding Source from a network server at no charge.
|
||||||
|
|
||||||
|
c) Convey individual copies of the object code with a copy of the
|
||||||
|
written offer to provide the Corresponding Source. This
|
||||||
|
alternative is allowed only occasionally and noncommercially, and
|
||||||
|
only if you received the object code with such an offer, in accord
|
||||||
|
with subsection 6b.
|
||||||
|
|
||||||
|
d) Convey the object code by offering access from a designated
|
||||||
|
place (gratis or for a charge), and offer equivalent access to the
|
||||||
|
Corresponding Source in the same way through the same place at no
|
||||||
|
further charge. You need not require recipients to copy the
|
||||||
|
Corresponding Source along with the object code. If the place to
|
||||||
|
copy the object code is a network server, the Corresponding Source
|
||||||
|
may be on a different server (operated by you or a third party)
|
||||||
|
that supports equivalent copying facilities, provided you maintain
|
||||||
|
clear directions next to the object code saying where to find the
|
||||||
|
Corresponding Source. Regardless of what server hosts the
|
||||||
|
Corresponding Source, you remain obligated to ensure that it is
|
||||||
|
available for as long as needed to satisfy these requirements.
|
||||||
|
|
||||||
|
e) Convey the object code using peer-to-peer transmission, provided
|
||||||
|
you inform other peers where the object code and Corresponding
|
||||||
|
Source of the work are being offered to the general public at no
|
||||||
|
charge under subsection 6d.
|
||||||
|
|
||||||
|
A separable portion of the object code, whose source code is excluded
|
||||||
|
from the Corresponding Source as a System Library, need not be
|
||||||
|
included in conveying the object code work.
|
||||||
|
|
||||||
|
A "User Product" is either (1) a "consumer product", which means any
|
||||||
|
tangible personal property which is normally used for personal, family,
|
||||||
|
or household purposes, or (2) anything designed or sold for incorporation
|
||||||
|
into a dwelling. In determining whether a product is a consumer product,
|
||||||
|
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||||
|
product received by a particular user, "normally used" refers to a
|
||||||
|
typical or common use of that class of product, regardless of the status
|
||||||
|
of the particular user or of the way in which the particular user
|
||||||
|
actually uses, or expects or is expected to use, the product. A product
|
||||||
|
is a consumer product regardless of whether the product has substantial
|
||||||
|
commercial, industrial or non-consumer uses, unless such uses represent
|
||||||
|
the only significant mode of use of the product.
|
||||||
|
|
||||||
|
"Installation Information" for a User Product means any methods,
|
||||||
|
procedures, authorization keys, or other information required to install
|
||||||
|
and execute modified versions of a covered work in that User Product from
|
||||||
|
a modified version of its Corresponding Source. The information must
|
||||||
|
suffice to ensure that the continued functioning of the modified object
|
||||||
|
code is in no case prevented or interfered with solely because
|
||||||
|
modification has been made.
|
||||||
|
|
||||||
|
If you convey an object code work under this section in, or with, or
|
||||||
|
specifically for use in, a User Product, and the conveying occurs as
|
||||||
|
part of a transaction in which the right of possession and use of the
|
||||||
|
User Product is transferred to the recipient in perpetuity or for a
|
||||||
|
fixed term (regardless of how the transaction is characterized), the
|
||||||
|
Corresponding Source conveyed under this section must be accompanied
|
||||||
|
by the Installation Information. But this requirement does not apply
|
||||||
|
if neither you nor any third party retains the ability to install
|
||||||
|
modified object code on the User Product (for example, the work has
|
||||||
|
been installed in ROM).
|
||||||
|
|
||||||
|
The requirement to provide Installation Information does not include a
|
||||||
|
requirement to continue to provide support service, warranty, or updates
|
||||||
|
for a work that has been modified or installed by the recipient, or for
|
||||||
|
the User Product in which it has been modified or installed. Access to a
|
||||||
|
network may be denied when the modification itself materially and
|
||||||
|
adversely affects the operation of the network or violates the rules and
|
||||||
|
protocols for communication across the network.
|
||||||
|
|
||||||
|
Corresponding Source conveyed, and Installation Information provided,
|
||||||
|
in accord with this section must be in a format that is publicly
|
||||||
|
documented (and with an implementation available to the public in
|
||||||
|
source code form), and must require no special password or key for
|
||||||
|
unpacking, reading or copying.
|
||||||
|
|
||||||
|
7. Additional Terms.
|
||||||
|
|
||||||
|
"Additional permissions" are terms that supplement the terms of this
|
||||||
|
License by making exceptions from one or more of its conditions.
|
||||||
|
Additional permissions that are applicable to the entire Program shall
|
||||||
|
be treated as though they were included in this License, to the extent
|
||||||
|
that they are valid under applicable law. If additional permissions
|
||||||
|
apply only to part of the Program, that part may be used separately
|
||||||
|
under those permissions, but the entire Program remains governed by
|
||||||
|
this License without regard to the additional permissions.
|
||||||
|
|
||||||
|
When you convey a copy of a covered work, you may at your option
|
||||||
|
remove any additional permissions from that copy, or from any part of
|
||||||
|
it. (Additional permissions may be written to require their own
|
||||||
|
removal in certain cases when you modify the work.) You may place
|
||||||
|
additional permissions on material, added by you to a covered work,
|
||||||
|
for which you have or can give appropriate copyright permission.
|
||||||
|
|
||||||
|
Notwithstanding any other provision of this License, for material you
|
||||||
|
add to a covered work, you may (if authorized by the copyright holders of
|
||||||
|
that material) supplement the terms of this License with terms:
|
||||||
|
|
||||||
|
a) Disclaiming warranty or limiting liability differently from the
|
||||||
|
terms of sections 15 and 16 of this License; or
|
||||||
|
|
||||||
|
b) Requiring preservation of specified reasonable legal notices or
|
||||||
|
author attributions in that material or in the Appropriate Legal
|
||||||
|
Notices displayed by works containing it; or
|
||||||
|
|
||||||
|
c) Prohibiting misrepresentation of the origin of that material, or
|
||||||
|
requiring that modified versions of such material be marked in
|
||||||
|
reasonable ways as different from the original version; or
|
||||||
|
|
||||||
|
d) Limiting the use for publicity purposes of names of licensors or
|
||||||
|
authors of the material; or
|
||||||
|
|
||||||
|
e) Declining to grant rights under trademark law for use of some
|
||||||
|
trade names, trademarks, or service marks; or
|
||||||
|
|
||||||
|
f) Requiring indemnification of licensors and authors of that
|
||||||
|
material by anyone who conveys the material (or modified versions of
|
||||||
|
it) with contractual assumptions of liability to the recipient, for
|
||||||
|
any liability that these contractual assumptions directly impose on
|
||||||
|
those licensors and authors.
|
||||||
|
|
||||||
|
All other non-permissive additional terms are considered "further
|
||||||
|
restrictions" within the meaning of section 10. If the Program as you
|
||||||
|
received it, or any part of it, contains a notice stating that it is
|
||||||
|
governed by this License along with a term that is a further
|
||||||
|
restriction, you may remove that term. If a license document contains
|
||||||
|
a further restriction but permits relicensing or conveying under this
|
||||||
|
License, you may add to a covered work material governed by the terms
|
||||||
|
of that license document, provided that the further restriction does
|
||||||
|
not survive such relicensing or conveying.
|
||||||
|
|
||||||
|
If you add terms to a covered work in accord with this section, you
|
||||||
|
must place, in the relevant source files, a statement of the
|
||||||
|
additional terms that apply to those files, or a notice indicating
|
||||||
|
where to find the applicable terms.
|
||||||
|
|
||||||
|
Additional terms, permissive or non-permissive, may be stated in the
|
||||||
|
form of a separately written license, or stated as exceptions;
|
||||||
|
the above requirements apply either way.
|
||||||
|
|
||||||
|
8. Termination.
|
||||||
|
|
||||||
|
You may not propagate or modify a covered work except as expressly
|
||||||
|
provided under this License. Any attempt otherwise to propagate or
|
||||||
|
modify it is void, and will automatically terminate your rights under
|
||||||
|
this License (including any patent licenses granted under the third
|
||||||
|
paragraph of section 11).
|
||||||
|
|
||||||
|
However, if you cease all violation of this License, then your
|
||||||
|
license from a particular copyright holder is reinstated (a)
|
||||||
|
provisionally, unless and until the copyright holder explicitly and
|
||||||
|
finally terminates your license, and (b) permanently, if the copyright
|
||||||
|
holder fails to notify you of the violation by some reasonable means
|
||||||
|
prior to 60 days after the cessation.
|
||||||
|
|
||||||
|
Moreover, your license from a particular copyright holder is
|
||||||
|
reinstated permanently if the copyright holder notifies you of the
|
||||||
|
violation by some reasonable means, this is the first time you have
|
||||||
|
received notice of violation of this License (for any work) from that
|
||||||
|
copyright holder, and you cure the violation prior to 30 days after
|
||||||
|
your receipt of the notice.
|
||||||
|
|
||||||
|
Termination of your rights under this section does not terminate the
|
||||||
|
licenses of parties who have received copies or rights from you under
|
||||||
|
this License. If your rights have been terminated and not permanently
|
||||||
|
reinstated, you do not qualify to receive new licenses for the same
|
||||||
|
material under section 10.
|
||||||
|
|
||||||
|
9. Acceptance Not Required for Having Copies.
|
||||||
|
|
||||||
|
You are not required to accept this License in order to receive or
|
||||||
|
run a copy of the Program. Ancillary propagation of a covered work
|
||||||
|
occurring solely as a consequence of using peer-to-peer transmission
|
||||||
|
to receive a copy likewise does not require acceptance. However,
|
||||||
|
nothing other than this License grants you permission to propagate or
|
||||||
|
modify any covered work. These actions infringe copyright if you do
|
||||||
|
not accept this License. Therefore, by modifying or propagating a
|
||||||
|
covered work, you indicate your acceptance of this License to do so.
|
||||||
|
|
||||||
|
10. Automatic Licensing of Downstream Recipients.
|
||||||
|
|
||||||
|
Each time you convey a covered work, the recipient automatically
|
||||||
|
receives a license from the original licensors, to run, modify and
|
||||||
|
propagate that work, subject to this License. You are not responsible
|
||||||
|
for enforcing compliance by third parties with this License.
|
||||||
|
|
||||||
|
An "entity transaction" is a transaction transferring control of an
|
||||||
|
organization, or substantially all assets of one, or subdividing an
|
||||||
|
organization, or merging organizations. If propagation of a covered
|
||||||
|
work results from an entity transaction, each party to that
|
||||||
|
transaction who receives a copy of the work also receives whatever
|
||||||
|
licenses to the work the party's predecessor in interest had or could
|
||||||
|
give under the previous paragraph, plus a right to possession of the
|
||||||
|
Corresponding Source of the work from the predecessor in interest, if
|
||||||
|
the predecessor has it or can get it with reasonable efforts.
|
||||||
|
|
||||||
|
You may not impose any further restrictions on the exercise of the
|
||||||
|
rights granted or affirmed under this License. For example, you may
|
||||||
|
not impose a license fee, royalty, or other charge for exercise of
|
||||||
|
rights granted under this License, and you may not initiate litigation
|
||||||
|
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||||
|
any patent claim is infringed by making, using, selling, offering for
|
||||||
|
sale, or importing the Program or any portion of it.
|
||||||
|
|
||||||
|
11. Patents.
|
||||||
|
|
||||||
|
A "contributor" is a copyright holder who authorizes use under this
|
||||||
|
License of the Program or a work on which the Program is based. The
|
||||||
|
work thus licensed is called the contributor's "contributor version".
|
||||||
|
|
||||||
|
A contributor's "essential patent claims" are all patent claims
|
||||||
|
owned or controlled by the contributor, whether already acquired or
|
||||||
|
hereafter acquired, that would be infringed by some manner, permitted
|
||||||
|
by this License, of making, using, or selling its contributor version,
|
||||||
|
but do not include claims that would be infringed only as a
|
||||||
|
consequence of further modification of the contributor version. For
|
||||||
|
purposes of this definition, "control" includes the right to grant
|
||||||
|
patent sublicenses in a manner consistent with the requirements of
|
||||||
|
this License.
|
||||||
|
|
||||||
|
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||||
|
patent license under the contributor's essential patent claims, to
|
||||||
|
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||||
|
propagate the contents of its contributor version.
|
||||||
|
|
||||||
|
In the following three paragraphs, a "patent license" is any express
|
||||||
|
agreement or commitment, however denominated, not to enforce a patent
|
||||||
|
(such as an express permission to practice a patent or covenant not to
|
||||||
|
sue for patent infringement). To "grant" such a patent license to a
|
||||||
|
party means to make such an agreement or commitment not to enforce a
|
||||||
|
patent against the party.
|
||||||
|
|
||||||
|
If you convey a covered work, knowingly relying on a patent license,
|
||||||
|
and the Corresponding Source of the work is not available for anyone
|
||||||
|
to copy, free of charge and under the terms of this License, through a
|
||||||
|
publicly available network server or other readily accessible means,
|
||||||
|
then you must either (1) cause the Corresponding Source to be so
|
||||||
|
available, or (2) arrange to deprive yourself of the benefit of the
|
||||||
|
patent license for this particular work, or (3) arrange, in a manner
|
||||||
|
consistent with the requirements of this License, to extend the patent
|
||||||
|
license to downstream recipients. "Knowingly relying" means you have
|
||||||
|
actual knowledge that, but for the patent license, your conveying the
|
||||||
|
covered work in a country, or your recipient's use of the covered work
|
||||||
|
in a country, would infringe one or more identifiable patents in that
|
||||||
|
country that you have reason to believe are valid.
|
||||||
|
|
||||||
|
If, pursuant to or in connection with a single transaction or
|
||||||
|
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||||
|
covered work, and grant a patent license to some of the parties
|
||||||
|
receiving the covered work authorizing them to use, propagate, modify
|
||||||
|
or convey a specific copy of the covered work, then the patent license
|
||||||
|
you grant is automatically extended to all recipients of the covered
|
||||||
|
work and works based on it.
|
||||||
|
|
||||||
|
A patent license is "discriminatory" if it does not include within
|
||||||
|
the scope of its coverage, prohibits the exercise of, or is
|
||||||
|
conditioned on the non-exercise of one or more of the rights that are
|
||||||
|
specifically granted under this License. You may not convey a covered
|
||||||
|
work if you are a party to an arrangement with a third party that is
|
||||||
|
in the business of distributing software, under which you make payment
|
||||||
|
to the third party based on the extent of your activity of conveying
|
||||||
|
the work, and under which the third party grants, to any of the
|
||||||
|
parties who would receive the covered work from you, a discriminatory
|
||||||
|
patent license (a) in connection with copies of the covered work
|
||||||
|
conveyed by you (or copies made from those copies), or (b) primarily
|
||||||
|
for and in connection with specific products or compilations that
|
||||||
|
contain the covered work, unless you entered into that arrangement,
|
||||||
|
or that patent license was granted, prior to 28 March 2007.
|
||||||
|
|
||||||
|
Nothing in this License shall be construed as excluding or limiting
|
||||||
|
any implied license or other defenses to infringement that may
|
||||||
|
otherwise be available to you under applicable patent law.
|
||||||
|
|
||||||
|
12. No Surrender of Others' Freedom.
|
||||||
|
|
||||||
|
If conditions are imposed on you (whether by court order, agreement or
|
||||||
|
otherwise) that contradict the conditions of this License, they do not
|
||||||
|
excuse you from the conditions of this License. If you cannot convey a
|
||||||
|
covered work so as to satisfy simultaneously your obligations under this
|
||||||
|
License and any other pertinent obligations, then as a consequence you may
|
||||||
|
not convey it at all. For example, if you agree to terms that obligate you
|
||||||
|
to collect a royalty for further conveying from those to whom you convey
|
||||||
|
the Program, the only way you could satisfy both those terms and this
|
||||||
|
License would be to refrain entirely from conveying the Program.
|
||||||
|
|
||||||
|
13. Use with the GNU Affero General Public License.
|
||||||
|
|
||||||
|
Notwithstanding any other provision of this License, you have
|
||||||
|
permission to link or combine any covered work with a work licensed
|
||||||
|
under version 3 of the GNU Affero General Public License into a single
|
||||||
|
combined work, and to convey the resulting work. The terms of this
|
||||||
|
License will continue to apply to the part which is the covered work,
|
||||||
|
but the special requirements of the GNU Affero General Public License,
|
||||||
|
section 13, concerning interaction through a network will apply to the
|
||||||
|
combination as such.
|
||||||
|
|
||||||
|
14. Revised Versions of this License.
|
||||||
|
|
||||||
|
The Free Software Foundation may publish revised and/or new versions of
|
||||||
|
the GNU General Public License from time to time. Such new versions will
|
||||||
|
be similar in spirit to the present version, but may differ in detail to
|
||||||
|
address new problems or concerns.
|
||||||
|
|
||||||
|
Each version is given a distinguishing version number. If the
|
||||||
|
Program specifies that a certain numbered version of the GNU General
|
||||||
|
Public License "or any later version" applies to it, you have the
|
||||||
|
option of following the terms and conditions either of that numbered
|
||||||
|
version or of any later version published by the Free Software
|
||||||
|
Foundation. If the Program does not specify a version number of the
|
||||||
|
GNU General Public License, you may choose any version ever published
|
||||||
|
by the Free Software Foundation.
|
||||||
|
|
||||||
|
If the Program specifies that a proxy can decide which future
|
||||||
|
versions of the GNU General Public License can be used, that proxy's
|
||||||
|
public statement of acceptance of a version permanently authorizes you
|
||||||
|
to choose that version for the Program.
|
||||||
|
|
||||||
|
Later license versions may give you additional or different
|
||||||
|
permissions. However, no additional obligations are imposed on any
|
||||||
|
author or copyright holder as a result of your choosing to follow a
|
||||||
|
later version.
|
||||||
|
|
||||||
|
15. Disclaimer of Warranty.
|
||||||
|
|
||||||
|
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||||
|
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||||
|
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||||
|
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||||
|
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||||
|
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||||
|
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||||
|
|
||||||
|
16. Limitation of Liability.
|
||||||
|
|
||||||
|
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||||
|
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||||
|
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||||
|
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||||
|
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||||
|
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||||
|
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||||
|
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||||
|
SUCH DAMAGES.
|
||||||
|
|
||||||
|
17. Interpretation of Sections 15 and 16.
|
||||||
|
|
||||||
|
If the disclaimer of warranty and limitation of liability provided
|
||||||
|
above cannot be given local legal effect according to their terms,
|
||||||
|
reviewing courts shall apply local law that most closely approximates
|
||||||
|
an absolute waiver of all civil liability in connection with the
|
||||||
|
Program, unless a warranty or assumption of liability accompanies a
|
||||||
|
copy of the Program in return for a fee.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
How to Apply These Terms to Your New Programs
|
||||||
|
|
||||||
|
If you develop a new program, and you want it to be of the greatest
|
||||||
|
possible use to the public, the best way to achieve this is to make it
|
||||||
|
free software which everyone can redistribute and change under these terms.
|
||||||
|
|
||||||
|
To do so, attach the following notices to the program. It is safest
|
||||||
|
to attach them to the start of each source file to most effectively
|
||||||
|
state the exclusion of warranty; and each file should have at least
|
||||||
|
the "copyright" line and a pointer to where the full notice is found.
|
||||||
|
|
||||||
|
{one line to give the program's name and a brief idea of what it does.}
|
||||||
|
Copyright (C) {year} {name of author}
|
||||||
|
|
||||||
|
This program is free software: you can redistribute it and/or modify
|
||||||
|
it under the terms of the GNU General Public License as published by
|
||||||
|
the Free Software Foundation, either version 3 of the License, or
|
||||||
|
(at your option) any later version.
|
||||||
|
|
||||||
|
This program is distributed in the hope that it will be useful,
|
||||||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
GNU General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU General Public License
|
||||||
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
Also add information on how to contact you by electronic and paper mail.
|
||||||
|
|
||||||
|
If the program does terminal interaction, make it output a short
|
||||||
|
notice like this when it starts in an interactive mode:
|
||||||
|
|
||||||
|
{project} Copyright (C) {year} {fullname}
|
||||||
|
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||||
|
This is free software, and you are welcome to redistribute it
|
||||||
|
under certain conditions; type `show c' for details.
|
||||||
|
|
||||||
|
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||||
|
parts of the General Public License. Of course, your program's commands
|
||||||
|
might be different; for a GUI interface, you would use an "about box".
|
||||||
|
|
||||||
|
You should also get your employer (if you work as a programmer) or school,
|
||||||
|
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||||
|
For more information on this, and how to apply and follow the GNU GPL, see
|
||||||
|
<http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
The GNU General Public License does not permit incorporating your program
|
||||||
|
into proprietary programs. If your program is a subroutine library, you
|
||||||
|
may consider it more useful to permit linking proprietary applications with
|
||||||
|
the library. If this is what you want to do, use the GNU Lesser General
|
||||||
|
Public License instead of this License. But first, please read
|
||||||
|
<http://www.gnu.org/philosophy/why-not-lgpl.html>.
|
207
Magisk-v23.0/boot_patch.sh
Executable file
207
Magisk-v23.0/boot_patch.sh
Executable file
@ -0,0 +1,207 @@
|
|||||||
|
#!/system/bin/sh
|
||||||
|
#######################################################################################
|
||||||
|
# Magisk Boot Image Patcher
|
||||||
|
#######################################################################################
|
||||||
|
#
|
||||||
|
# Usage: boot_patch.sh <bootimage>
|
||||||
|
#
|
||||||
|
# The following flags can be set in environment variables:
|
||||||
|
# KEEPVERITY, KEEPFORCEENCRYPT, RECOVERYMODE
|
||||||
|
#
|
||||||
|
# This script should be placed in a directory with the following files:
|
||||||
|
#
|
||||||
|
# File name Type Description
|
||||||
|
#
|
||||||
|
# boot_patch.sh script A script to patch boot image for Magisk.
|
||||||
|
# (this file) The script will use files in its same
|
||||||
|
# directory to complete the patching process
|
||||||
|
# util_functions.sh script A script which hosts all functions required
|
||||||
|
# for this script to work properly
|
||||||
|
# magiskinit binary The binary to replace /init
|
||||||
|
# magisk(32/64) binary The magisk binaries
|
||||||
|
# magiskboot binary A tool to manipulate boot images
|
||||||
|
# chromeos folder This folder includes the utility and keys to sign
|
||||||
|
# (optional) chromeos boot images. Only used for Pixel C.
|
||||||
|
#
|
||||||
|
#######################################################################################
|
||||||
|
|
||||||
|
############
|
||||||
|
# Functions
|
||||||
|
############
|
||||||
|
|
||||||
|
# Pure bash dirname implementation
|
||||||
|
getdir() {
|
||||||
|
case "$1" in
|
||||||
|
*/*)
|
||||||
|
dir=${1%/*}
|
||||||
|
if [ -z $dir ]; then
|
||||||
|
echo "/"
|
||||||
|
else
|
||||||
|
echo $dir
|
||||||
|
fi
|
||||||
|
;;
|
||||||
|
*) echo "." ;;
|
||||||
|
esac
|
||||||
|
}
|
||||||
|
|
||||||
|
#################
|
||||||
|
# Initialization
|
||||||
|
#################
|
||||||
|
|
||||||
|
if [ -z $SOURCEDMODE ]; then
|
||||||
|
# Switch to the location of the script file
|
||||||
|
cd "$(getdir "${BASH_SOURCE:-$0}")"
|
||||||
|
# Load utility functions
|
||||||
|
. ./util_functions.sh
|
||||||
|
# Check if 64-bit
|
||||||
|
api_level_arch_detect
|
||||||
|
fi
|
||||||
|
|
||||||
|
BOOTIMAGE="$1"
|
||||||
|
[ -e "$BOOTIMAGE" ] || abort "$BOOTIMAGE does not exist!"
|
||||||
|
|
||||||
|
# Dump image for MTD/NAND character device boot partitions
|
||||||
|
if [ -c "$BOOTIMAGE" ]; then
|
||||||
|
nanddump -f boot.img "$BOOTIMAGE"
|
||||||
|
BOOTNAND="$BOOTIMAGE"
|
||||||
|
BOOTIMAGE=boot.img
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Flags
|
||||||
|
[ -z $KEEPVERITY ] && KEEPVERITY=false
|
||||||
|
[ -z $KEEPFORCEENCRYPT ] && KEEPFORCEENCRYPT=false
|
||||||
|
[ -z $RECOVERYMODE ] && RECOVERYMODE=false
|
||||||
|
export KEEPVERITY
|
||||||
|
export KEEPFORCEENCRYPT
|
||||||
|
|
||||||
|
chmod -R 755 .
|
||||||
|
|
||||||
|
#########
|
||||||
|
# Unpack
|
||||||
|
#########
|
||||||
|
|
||||||
|
CHROMEOS=false
|
||||||
|
|
||||||
|
ui_print "- Unpacking boot image"
|
||||||
|
./magiskboot unpack "$BOOTIMAGE"
|
||||||
|
|
||||||
|
case $? in
|
||||||
|
0 ) ;;
|
||||||
|
1 )
|
||||||
|
abort "! Unsupported/Unknown image format"
|
||||||
|
;;
|
||||||
|
2 )
|
||||||
|
ui_print "- ChromeOS boot image detected"
|
||||||
|
CHROMEOS=true
|
||||||
|
;;
|
||||||
|
* )
|
||||||
|
abort "! Unable to unpack boot image"
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
|
||||||
|
[ -f recovery_dtbo ] && RECOVERYMODE=true
|
||||||
|
|
||||||
|
###################
|
||||||
|
# Ramdisk Restores
|
||||||
|
###################
|
||||||
|
|
||||||
|
# Test patch status and do restore
|
||||||
|
ui_print "- Checking ramdisk status"
|
||||||
|
if [ -e ramdisk.cpio ]; then
|
||||||
|
./magiskboot cpio ramdisk.cpio test
|
||||||
|
STATUS=$?
|
||||||
|
else
|
||||||
|
# Stock A only system-as-root
|
||||||
|
STATUS=0
|
||||||
|
fi
|
||||||
|
case $((STATUS & 3)) in
|
||||||
|
0 ) # Stock boot
|
||||||
|
ui_print "- Stock boot image detected"
|
||||||
|
SHA1=$(./magiskboot sha1 "$BOOTIMAGE" 2>/dev/null)
|
||||||
|
cat $BOOTIMAGE > stock_boot.img
|
||||||
|
cp -af ramdisk.cpio ramdisk.cpio.orig 2>/dev/null
|
||||||
|
;;
|
||||||
|
1 ) # Magisk patched
|
||||||
|
ui_print "- Magisk patched boot image detected"
|
||||||
|
# Find SHA1 of stock boot image
|
||||||
|
[ -z $SHA1 ] && SHA1=$(./magiskboot cpio ramdisk.cpio sha1 2>/dev/null)
|
||||||
|
./magiskboot cpio ramdisk.cpio restore
|
||||||
|
cp -af ramdisk.cpio ramdisk.cpio.orig
|
||||||
|
rm -f stock_boot.img
|
||||||
|
;;
|
||||||
|
2 ) # Unsupported
|
||||||
|
ui_print "! Boot image patched by unsupported programs"
|
||||||
|
abort "! Please restore back to stock boot image"
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
|
||||||
|
##################
|
||||||
|
# Ramdisk Patches
|
||||||
|
##################
|
||||||
|
|
||||||
|
ui_print "- Patching ramdisk"
|
||||||
|
|
||||||
|
echo "KEEPVERITY=$KEEPVERITY" > config
|
||||||
|
echo "KEEPFORCEENCRYPT=$KEEPFORCEENCRYPT" >> config
|
||||||
|
echo "RECOVERYMODE=$RECOVERYMODE" >> config
|
||||||
|
[ ! -z $SHA1 ] && echo "SHA1=$SHA1" >> config
|
||||||
|
|
||||||
|
# Compress to save precious ramdisk space
|
||||||
|
./magiskboot compress=xz magisk32 magisk32.xz
|
||||||
|
./magiskboot compress=xz magisk64 magisk64.xz
|
||||||
|
$IS64BIT && SKIP64="" || SKIP64="#"
|
||||||
|
|
||||||
|
./magiskboot cpio ramdisk.cpio \
|
||||||
|
"add 0750 init magiskinit" \
|
||||||
|
"mkdir 0750 overlay.d" \
|
||||||
|
"mkdir 0750 overlay.d/sbin" \
|
||||||
|
"add 0644 overlay.d/sbin/magisk32.xz magisk32.xz" \
|
||||||
|
"$SKIP64 add 0644 overlay.d/sbin/magisk64.xz magisk64.xz" \
|
||||||
|
"patch" \
|
||||||
|
"backup ramdisk.cpio.orig" \
|
||||||
|
"mkdir 000 .backup" \
|
||||||
|
"add 000 .backup/.magisk config"
|
||||||
|
|
||||||
|
rm -f ramdisk.cpio.orig config magisk*.xz
|
||||||
|
|
||||||
|
#################
|
||||||
|
# Binary Patches
|
||||||
|
#################
|
||||||
|
|
||||||
|
for dt in dtb kernel_dtb extra; do
|
||||||
|
[ -f $dt ] && ./magiskboot dtb $dt patch && ui_print "- Patch fstab in $dt"
|
||||||
|
done
|
||||||
|
|
||||||
|
if [ -f kernel ]; then
|
||||||
|
# Remove Samsung RKP
|
||||||
|
./magiskboot hexpatch kernel \
|
||||||
|
49010054011440B93FA00F71E9000054010840B93FA00F7189000054001840B91FA00F7188010054 \
|
||||||
|
A1020054011440B93FA00F7140020054010840B93FA00F71E0010054001840B91FA00F7181010054
|
||||||
|
|
||||||
|
# Remove Samsung defex
|
||||||
|
# Before: [mov w2, #-221] (-__NR_execve)
|
||||||
|
# After: [mov w2, #-32768]
|
||||||
|
./magiskboot hexpatch kernel 821B8012 E2FF8F12
|
||||||
|
|
||||||
|
# Force kernel to load rootfs
|
||||||
|
# skip_initramfs -> want_initramfs
|
||||||
|
./magiskboot hexpatch kernel \
|
||||||
|
736B69705F696E697472616D667300 \
|
||||||
|
77616E745F696E697472616D667300
|
||||||
|
fi
|
||||||
|
|
||||||
|
#################
|
||||||
|
# Repack & Flash
|
||||||
|
#################
|
||||||
|
|
||||||
|
ui_print "- Repacking boot image"
|
||||||
|
./magiskboot repack "$BOOTIMAGE" || abort "! Unable to repack boot image"
|
||||||
|
|
||||||
|
# Sign chromeos boot
|
||||||
|
$CHROMEOS && sign_chromeos
|
||||||
|
|
||||||
|
# Restore the original boot partition path
|
||||||
|
[ -e "$BOOTNAND" ] && BOOTIMAGE="$BOOTNAND"
|
||||||
|
|
||||||
|
# Reset any error code
|
||||||
|
true
|
BIN
Magisk-v23.0/magisk32
Executable file
BIN
Magisk-v23.0/magisk32
Executable file
Binary file not shown.
BIN
Magisk-v23.0/magisk64
Executable file
BIN
Magisk-v23.0/magisk64
Executable file
Binary file not shown.
BIN
Magisk-v23.0/magiskboot
Executable file
BIN
Magisk-v23.0/magiskboot
Executable file
Binary file not shown.
BIN
Magisk-v23.0/magiskinit
Executable file
BIN
Magisk-v23.0/magiskinit
Executable file
Binary file not shown.
796
Magisk-v23.0/util_functions.sh
Executable file
796
Magisk-v23.0/util_functions.sh
Executable file
@ -0,0 +1,796 @@
|
|||||||
|
############################################
|
||||||
|
# Magisk General Utility Functions
|
||||||
|
############################################
|
||||||
|
|
||||||
|
MAGISK_VER='23.0'
|
||||||
|
MAGISK_VER_CODE=23000
|
||||||
|
|
||||||
|
###################
|
||||||
|
# Helper Functions
|
||||||
|
###################
|
||||||
|
|
||||||
|
ui_print() {
|
||||||
|
echo "$1"
|
||||||
|
}
|
||||||
|
|
||||||
|
toupper() {
|
||||||
|
echo "$@" | tr '[:lower:]' '[:upper:]'
|
||||||
|
}
|
||||||
|
|
||||||
|
grep_cmdline() {
|
||||||
|
local REGEX="s/^$1=//p"
|
||||||
|
cat /proc/cmdline | tr '[:space:]' '\n' | sed -n "$REGEX" 2>/dev/null
|
||||||
|
}
|
||||||
|
|
||||||
|
grep_prop() {
|
||||||
|
local REGEX="s/^$1=//p"
|
||||||
|
shift
|
||||||
|
local FILES=$@
|
||||||
|
[ -z "$FILES" ] && FILES='/system/build.prop'
|
||||||
|
cat $FILES 2>/dev/null | dos2unix | sed -n "$REGEX" | head -n 1
|
||||||
|
}
|
||||||
|
|
||||||
|
grep_get_prop() {
|
||||||
|
local result=$(grep_prop $@)
|
||||||
|
if [ -z "$result" ]; then
|
||||||
|
# Fallback to getprop
|
||||||
|
adb shell getprop "$1"
|
||||||
|
else
|
||||||
|
echo $result
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
getvar() {
|
||||||
|
local VARNAME=$1
|
||||||
|
local VALUE
|
||||||
|
local PROPPATH='/data/.magisk /cache/.magisk'
|
||||||
|
[ ! -z $MAGISKTMP ] && PROPPATH="$MAGISKTMP/config $PROPPATH"
|
||||||
|
VALUE=$(grep_prop $VARNAME $PROPPATH)
|
||||||
|
[ ! -z $VALUE ] && eval $VARNAME=\$VALUE
|
||||||
|
}
|
||||||
|
|
||||||
|
is_mounted() {
|
||||||
|
grep -q " $(readlink -f $1) " /proc/mounts 2>/dev/null
|
||||||
|
return $?
|
||||||
|
}
|
||||||
|
|
||||||
|
abort() {
|
||||||
|
ui_print "$1"
|
||||||
|
$BOOTMODE || recovery_cleanup
|
||||||
|
[ ! -z $MODPATH ] && rm -rf $MODPATH
|
||||||
|
rm -rf $TMPDIR
|
||||||
|
exit 1
|
||||||
|
}
|
||||||
|
|
||||||
|
resolve_vars() {
|
||||||
|
MAGISKBIN=$NVBASE/magisk
|
||||||
|
POSTFSDATAD=$NVBASE/post-fs-data.d
|
||||||
|
SERVICED=$NVBASE/service.d
|
||||||
|
}
|
||||||
|
|
||||||
|
print_title() {
|
||||||
|
local len line1len line2len pounds
|
||||||
|
line1len=$(echo -n $1 | wc -c)
|
||||||
|
line2len=$(echo -n $2 | wc -c)
|
||||||
|
len=$line2len
|
||||||
|
[ $line1len -gt $line2len ] && len=$line1len
|
||||||
|
len=$((len + 2))
|
||||||
|
pounds=$(printf "%${len}s" | tr ' ' '*')
|
||||||
|
ui_print "$pounds"
|
||||||
|
ui_print " $1 "
|
||||||
|
[ "$2" ] && ui_print " $2 "
|
||||||
|
ui_print "$pounds"
|
||||||
|
}
|
||||||
|
|
||||||
|
######################
|
||||||
|
# Environment Related
|
||||||
|
######################
|
||||||
|
|
||||||
|
setup_flashable() {
|
||||||
|
ensure_bb
|
||||||
|
$BOOTMODE && return
|
||||||
|
if [ -z $OUTFD ] || readlink /proc/$$/fd/$OUTFD | grep -q /tmp; then
|
||||||
|
# We will have to manually find out OUTFD
|
||||||
|
for FD in `ls /proc/$$/fd`; do
|
||||||
|
if readlink /proc/$$/fd/$FD | grep -q pipe; then
|
||||||
|
if ps | grep -v grep | grep -qE " 3 $FD |status_fd=$FD"; then
|
||||||
|
OUTFD=$FD
|
||||||
|
break
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
fi
|
||||||
|
recovery_actions
|
||||||
|
}
|
||||||
|
|
||||||
|
ensure_bb() {
|
||||||
|
if set -o | grep -q standalone; then
|
||||||
|
# We are definitely in busybox ash
|
||||||
|
set -o standalone
|
||||||
|
return
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Find our busybox binary
|
||||||
|
local bb
|
||||||
|
if [ -f $TMPDIR/busybox ]; then
|
||||||
|
bb=$TMPDIR/busybox
|
||||||
|
elif [ -f $MAGISKBIN/busybox ]; then
|
||||||
|
bb=$MAGISKBIN/busybox
|
||||||
|
else
|
||||||
|
abort "! Cannot find BusyBox"
|
||||||
|
fi
|
||||||
|
chmod 755 $bb
|
||||||
|
|
||||||
|
# Busybox could be a script, make sure /system/bin/sh exists
|
||||||
|
if [ ! -f /system/bin/sh ]; then
|
||||||
|
umount -l /system 2>/dev/null
|
||||||
|
mkdir -p /system/bin
|
||||||
|
ln -s $(command -v sh) /system/bin/sh
|
||||||
|
fi
|
||||||
|
|
||||||
|
export ASH_STANDALONE=1
|
||||||
|
|
||||||
|
# Find our current arguments
|
||||||
|
# Run in busybox environment to ensure consistent results
|
||||||
|
# /proc/<pid>/cmdline shall be <interpreter> <script> <arguments...>
|
||||||
|
local cmds="$($bb sh -c "
|
||||||
|
for arg in \$(tr '\0' '\n' < /proc/$$/cmdline); do
|
||||||
|
if [ -z \"\$cmds\" ]; then
|
||||||
|
# Skip the first argument as we want to change the interpreter
|
||||||
|
cmds=\"sh\"
|
||||||
|
else
|
||||||
|
cmds=\"\$cmds '\$arg'\"
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
echo \$cmds")"
|
||||||
|
|
||||||
|
# Re-exec our script
|
||||||
|
echo $cmds | $bb xargs $bb
|
||||||
|
exit
|
||||||
|
}
|
||||||
|
|
||||||
|
recovery_actions() {
|
||||||
|
# Make sure random won't get blocked
|
||||||
|
mount -o bind /dev/urandom /dev/random
|
||||||
|
# Unset library paths
|
||||||
|
OLD_LD_LIB=$LD_LIBRARY_PATH
|
||||||
|
OLD_LD_PRE=$LD_PRELOAD
|
||||||
|
OLD_LD_CFG=$LD_CONFIG_FILE
|
||||||
|
unset LD_LIBRARY_PATH
|
||||||
|
unset LD_PRELOAD
|
||||||
|
unset LD_CONFIG_FILE
|
||||||
|
}
|
||||||
|
|
||||||
|
recovery_cleanup() {
|
||||||
|
local DIR
|
||||||
|
ui_print "- Unmounting partitions"
|
||||||
|
(umount_apex
|
||||||
|
if [ ! -d /postinstall/tmp ]; then
|
||||||
|
umount -l /system
|
||||||
|
umount -l /system_root
|
||||||
|
fi
|
||||||
|
umount -l /vendor
|
||||||
|
umount -l /persist
|
||||||
|
umount -l /metadata
|
||||||
|
for DIR in /apex /system /system_root; do
|
||||||
|
if [ -L "${DIR}_link" ]; then
|
||||||
|
rmdir $DIR
|
||||||
|
mv -f ${DIR}_link $DIR
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
umount -l /dev/random) 2>/dev/null
|
||||||
|
[ -z $OLD_LD_LIB ] || export LD_LIBRARY_PATH=$OLD_LD_LIB
|
||||||
|
[ -z $OLD_LD_PRE ] || export LD_PRELOAD=$OLD_LD_PRE
|
||||||
|
[ -z $OLD_LD_CFG ] || export LD_CONFIG_FILE=$OLD_LD_CFG
|
||||||
|
}
|
||||||
|
|
||||||
|
#######################
|
||||||
|
# Installation Related
|
||||||
|
#######################
|
||||||
|
|
||||||
|
# find_block [partname...]
|
||||||
|
find_block() {
|
||||||
|
local BLOCK DEV DEVICE DEVNAME PARTNAME UEVENT
|
||||||
|
for BLOCK in "$@"; do
|
||||||
|
DEVICE=`find /dev/block \( -type b -o -type c -o -type l \) -iname $BLOCK | head -n 1` 2>/dev/null
|
||||||
|
if [ ! -z $DEVICE ]; then
|
||||||
|
readlink -f $DEVICE
|
||||||
|
return 0
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
# Fallback by parsing sysfs uevents
|
||||||
|
for UEVENT in /sys/dev/block/*/uevent; do
|
||||||
|
DEVNAME=`grep_prop DEVNAME $UEVENT`
|
||||||
|
PARTNAME=`grep_prop PARTNAME $UEVENT`
|
||||||
|
for BLOCK in "$@"; do
|
||||||
|
if [ "$(toupper $BLOCK)" = "$(toupper $PARTNAME)" ]; then
|
||||||
|
echo /dev/block/$DEVNAME
|
||||||
|
return 0
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
done
|
||||||
|
# Look just in /dev in case we're dealing with MTD/NAND without /dev/block devices/links
|
||||||
|
for DEV in "$@"; do
|
||||||
|
DEVICE=`find /dev \( -type b -o -type c -o -type l \) -maxdepth 1 -iname $DEV | head -n 1` 2>/dev/null
|
||||||
|
if [ ! -z $DEVICE ]; then
|
||||||
|
readlink -f $DEVICE
|
||||||
|
return 0
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
return 1
|
||||||
|
}
|
||||||
|
|
||||||
|
# setup_mntpoint <mountpoint>
|
||||||
|
setup_mntpoint() {
|
||||||
|
local POINT=$1
|
||||||
|
[ -L $POINT ] && mv -f $POINT ${POINT}_link
|
||||||
|
if [ ! -d $POINT ]; then
|
||||||
|
rm -f $POINT
|
||||||
|
mkdir -p $POINT
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
# mount_name <partname(s)> <mountpoint> <flag>
|
||||||
|
mount_name() {
|
||||||
|
local PART=$1
|
||||||
|
local POINT=$2
|
||||||
|
local FLAG=$3
|
||||||
|
setup_mntpoint $POINT
|
||||||
|
is_mounted $POINT && return
|
||||||
|
# First try mounting with fstab
|
||||||
|
mount $FLAG $POINT 2>/dev/null
|
||||||
|
if ! is_mounted $POINT; then
|
||||||
|
local BLOCK=$(find_block $PART)
|
||||||
|
mount $FLAG $BLOCK $POINT || return
|
||||||
|
fi
|
||||||
|
ui_print "- Mounting $POINT"
|
||||||
|
}
|
||||||
|
|
||||||
|
# mount_ro_ensure <partname(s)> <mountpoint>
|
||||||
|
mount_ro_ensure() {
|
||||||
|
# We handle ro partitions only in recovery
|
||||||
|
$BOOTMODE && return
|
||||||
|
local PART=$1
|
||||||
|
local POINT=$2
|
||||||
|
mount_name "$PART" $POINT '-o ro'
|
||||||
|
is_mounted $POINT || abort "! Cannot mount $POINT"
|
||||||
|
}
|
||||||
|
|
||||||
|
mount_partitions() {
|
||||||
|
# Check A/B slot
|
||||||
|
SLOT=`grep_cmdline androidboot.slot_suffix`
|
||||||
|
if [ -z $SLOT ]; then
|
||||||
|
SLOT=`grep_cmdline androidboot.slot`
|
||||||
|
[ -z $SLOT ] || SLOT=_${SLOT}
|
||||||
|
fi
|
||||||
|
[ -z $SLOT ] || ui_print "- Current boot slot: $SLOT"
|
||||||
|
|
||||||
|
# Mount ro partitions
|
||||||
|
if is_mounted /system_root; then
|
||||||
|
umount /system 2&>/dev/null
|
||||||
|
umount /system_root 2&>/dev/null
|
||||||
|
fi
|
||||||
|
mount_ro_ensure "system$SLOT app$SLOT" /system
|
||||||
|
if [ -f /system/init -o -L /system/init ]; then
|
||||||
|
SYSTEM_ROOT=true
|
||||||
|
setup_mntpoint /system_root
|
||||||
|
if ! mount --move /system /system_root; then
|
||||||
|
umount /system
|
||||||
|
umount -l /system 2>/dev/null
|
||||||
|
mount_ro_ensure "system$SLOT app$SLOT" /system_root
|
||||||
|
fi
|
||||||
|
mount -o bind /system_root/system /system
|
||||||
|
else
|
||||||
|
SYSTEM_ROOT=false
|
||||||
|
grep ' / ' /proc/mounts | grep -qv 'rootfs' || grep -q ' /system_root ' /proc/mounts && SYSTEM_ROOT=true
|
||||||
|
fi
|
||||||
|
# /vendor is used only on some older devices for recovery AVBv1 signing so is not critical if fails
|
||||||
|
[ -L /system/vendor ] && mount_name vendor$SLOT /vendor '-o ro'
|
||||||
|
$SYSTEM_ROOT && ui_print "- Device is system-as-root"
|
||||||
|
|
||||||
|
# Allow /system/bin commands (dalvikvm) on Android 10+ in recovery
|
||||||
|
$BOOTMODE || mount_apex
|
||||||
|
}
|
||||||
|
|
||||||
|
# loop_setup <ext4_img>, sets LOOPDEV
|
||||||
|
loop_setup() {
|
||||||
|
unset LOOPDEV
|
||||||
|
local LOOP
|
||||||
|
local MINORX=1
|
||||||
|
[ -e /dev/block/loop1 ] && MINORX=$(stat -Lc '%T' /dev/block/loop1)
|
||||||
|
local NUM=0
|
||||||
|
while [ $NUM -lt 64 ]; do
|
||||||
|
LOOP=/dev/block/loop$NUM
|
||||||
|
[ -e $LOOP ] || mknod $LOOP b 7 $((NUM * MINORX))
|
||||||
|
if losetup $LOOP "$1" 2>/dev/null; then
|
||||||
|
LOOPDEV=$LOOP
|
||||||
|
break
|
||||||
|
fi
|
||||||
|
NUM=$((NUM + 1))
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
mount_apex() {
|
||||||
|
$BOOTMODE || [ ! -d /system/apex ] && return
|
||||||
|
local APEX DEST
|
||||||
|
setup_mntpoint /apex
|
||||||
|
mount -t tmpfs tmpfs /apex -o mode=755
|
||||||
|
local PATTERN='s/.*"name":[^"]*"\([^"]*\).*/\1/p'
|
||||||
|
for APEX in /system/apex/*; do
|
||||||
|
if [ -f $APEX ]; then
|
||||||
|
# APEX APKs, extract and loop mount
|
||||||
|
unzip -qo $APEX apex_payload.img -d /apex
|
||||||
|
DEST=$(unzip -qp $APEX apex_manifest.pb | strings | head -n 1)
|
||||||
|
[ -z $DEST ] && DEST=$(unzip -qp $APEX apex_manifest.json | sed -n $PATTERN)
|
||||||
|
[ -z $DEST ] && continue
|
||||||
|
DEST=/apex/$DEST
|
||||||
|
mkdir -p $DEST
|
||||||
|
loop_setup /apex/apex_payload.img
|
||||||
|
if [ ! -z $LOOPDEV ]; then
|
||||||
|
ui_print "- Mounting $DEST"
|
||||||
|
mount -t ext4 -o ro,noatime $LOOPDEV $DEST
|
||||||
|
fi
|
||||||
|
rm -f /apex/apex_payload.img
|
||||||
|
elif [ -d $APEX ]; then
|
||||||
|
# APEX folders, bind mount directory
|
||||||
|
if [ -f $APEX/apex_manifest.json ]; then
|
||||||
|
DEST=/apex/$(sed -n $PATTERN $APEX/apex_manifest.json)
|
||||||
|
elif [ -f $APEX/apex_manifest.pb ]; then
|
||||||
|
DEST=/apex/$(strings $APEX/apex_manifest.pb | head -n 1)
|
||||||
|
else
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
mkdir -p $DEST
|
||||||
|
ui_print "- Mounting $DEST"
|
||||||
|
mount -o bind $APEX $DEST
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
export ANDROID_RUNTIME_ROOT=/apex/com.android.runtime
|
||||||
|
export ANDROID_TZDATA_ROOT=/apex/com.android.tzdata
|
||||||
|
export ANDROID_ART_ROOT=/apex/com.android.art
|
||||||
|
export ANDROID_I18N_ROOT=/apex/com.android.i18n
|
||||||
|
local APEXJARS=$(find /apex -name '*.jar' | sort | tr '\n' ':')
|
||||||
|
local FWK=/system/framework
|
||||||
|
export BOOTCLASSPATH=${APEXJARS}\
|
||||||
|
$FWK/framework.jar:$FWK/ext.jar:$FWK/telephony-common.jar:\
|
||||||
|
$FWK/voip-common.jar:$FWK/ims-common.jar:$FWK/telephony-ext.jar
|
||||||
|
}
|
||||||
|
|
||||||
|
umount_apex() {
|
||||||
|
[ -d /apex ] || return
|
||||||
|
umount -l /apex
|
||||||
|
for loop in /dev/block/loop*; do
|
||||||
|
losetup -d $loop 2>/dev/null
|
||||||
|
done
|
||||||
|
unset ANDROID_RUNTIME_ROOT
|
||||||
|
unset ANDROID_TZDATA_ROOT
|
||||||
|
unset ANDROID_ART_ROOT
|
||||||
|
unset ANDROID_I18N_ROOT
|
||||||
|
unset BOOTCLASSPATH
|
||||||
|
}
|
||||||
|
|
||||||
|
get_flags() {
|
||||||
|
# override variables
|
||||||
|
getvar KEEPVERITY
|
||||||
|
getvar KEEPFORCEENCRYPT
|
||||||
|
getvar RECOVERYMODE
|
||||||
|
if [ -z $KEEPVERITY ]; then
|
||||||
|
if $SYSTEM_ROOT; then
|
||||||
|
KEEPVERITY=true
|
||||||
|
ui_print "- System-as-root, keep dm/avb-verity"
|
||||||
|
else
|
||||||
|
KEEPVERITY=false
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
ISENCRYPTED=false
|
||||||
|
grep ' /data ' /proc/mounts | grep -q 'dm-' && ISENCRYPTED=true
|
||||||
|
[ "$(adb shell getprop ro.crypto.state)" = "encrypted" ] && ISENCRYPTED=true
|
||||||
|
if [ -z $KEEPFORCEENCRYPT ]; then
|
||||||
|
# No data access means unable to decrypt in recovery
|
||||||
|
if $ISENCRYPTED || ! $DATA; then
|
||||||
|
KEEPFORCEENCRYPT=true
|
||||||
|
ui_print "- Encrypted data, keep forceencrypt"
|
||||||
|
else
|
||||||
|
KEEPFORCEENCRYPT=false
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
[ -z $RECOVERYMODE ] && RECOVERYMODE=false
|
||||||
|
}
|
||||||
|
|
||||||
|
find_boot_image() {
|
||||||
|
BOOTIMAGE=
|
||||||
|
if $RECOVERYMODE; then
|
||||||
|
BOOTIMAGE=`find_block recovery_ramdisk$SLOT recovery$SLOT sos`
|
||||||
|
elif [ ! -z $SLOT ]; then
|
||||||
|
BOOTIMAGE=`find_block ramdisk$SLOT recovery_ramdisk$SLOT boot$SLOT`
|
||||||
|
else
|
||||||
|
BOOTIMAGE=`find_block ramdisk recovery_ramdisk kern-a android_boot kernel bootimg boot lnx boot_a`
|
||||||
|
fi
|
||||||
|
if [ -z $BOOTIMAGE ]; then
|
||||||
|
# Lets see what fstabs tells me
|
||||||
|
BOOTIMAGE=`grep -v '#' /etc/*fstab* | grep -E '/boot(img)?[^a-zA-Z]' | grep -oE '/dev/[a-zA-Z0-9_./-]*' | head -n 1`
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
flash_image() {
|
||||||
|
case "$1" in
|
||||||
|
*.gz) CMD1="gzip -d < '$1' 2>/dev/null";;
|
||||||
|
*) CMD1="cat '$1'";;
|
||||||
|
esac
|
||||||
|
if $BOOTSIGNED; then
|
||||||
|
CMD2="$BOOTSIGNER -sign"
|
||||||
|
ui_print "- Sign image with verity keys"
|
||||||
|
else
|
||||||
|
CMD2="cat -"
|
||||||
|
fi
|
||||||
|
if [ -b "$2" ]; then
|
||||||
|
local img_sz=$(stat -c '%s' "$1")
|
||||||
|
local blk_sz=$(blockdev --getsize64 "$2")
|
||||||
|
[ "$img_sz" -gt "$blk_sz" ] && return 1
|
||||||
|
blockdev --setrw "$2"
|
||||||
|
local blk_ro=$(blockdev --getro "$2")
|
||||||
|
[ "$blk_ro" -eq 1 ] && return 2
|
||||||
|
eval "$CMD1" | eval "$CMD2" | cat - /dev/zero > "$2" 2>/dev/null
|
||||||
|
elif [ -c "$2" ]; then
|
||||||
|
flash_eraseall "$2" >&2
|
||||||
|
eval "$CMD1" | eval "$CMD2" | nandwrite -p "$2" - >&2
|
||||||
|
else
|
||||||
|
ui_print "- Not block or char device, storing image"
|
||||||
|
eval "$CMD1" | eval "$CMD2" > "$2" 2>/dev/null
|
||||||
|
fi
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
# Common installation script for flash_script.sh and addon.d.sh
|
||||||
|
install_magisk() {
|
||||||
|
cd $MAGISKBIN
|
||||||
|
|
||||||
|
if [ ! -c $BOOTIMAGE ]; then
|
||||||
|
eval $BOOTSIGNER -verify < $BOOTIMAGE && BOOTSIGNED=true
|
||||||
|
$BOOTSIGNED && ui_print "- Boot image is signed with AVB 1.0"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Source the boot patcher
|
||||||
|
SOURCEDMODE=true
|
||||||
|
. ./boot_patch.sh "$BOOTIMAGE"
|
||||||
|
|
||||||
|
ui_print "- Flashing new boot image"
|
||||||
|
flash_image new-boot.img "$BOOTIMAGE"
|
||||||
|
case $? in
|
||||||
|
1)
|
||||||
|
abort "! Insufficient partition size"
|
||||||
|
;;
|
||||||
|
2)
|
||||||
|
abort "! $BOOTIMAGE is read only"
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
|
||||||
|
./magiskboot cleanup
|
||||||
|
rm -f new-boot.img
|
||||||
|
|
||||||
|
run_migrations
|
||||||
|
}
|
||||||
|
|
||||||
|
sign_chromeos() {
|
||||||
|
ui_print "- Signing ChromeOS boot image"
|
||||||
|
|
||||||
|
echo > empty
|
||||||
|
./chromeos/futility vbutil_kernel --pack new-boot.img.signed \
|
||||||
|
--keyblock ./chromeos/kernel.keyblock --signprivate ./chromeos/kernel_data_key.vbprivk \
|
||||||
|
--version 1 --vmlinuz new-boot.img --config empty --arch arm --bootloader empty --flags 0x1
|
||||||
|
|
||||||
|
rm -f empty new-boot.img
|
||||||
|
mv new-boot.img.signed new-boot.img
|
||||||
|
}
|
||||||
|
|
||||||
|
remove_system_su() {
|
||||||
|
if [ -f /system/bin/su -o -f /system/xbin/su ] && [ ! -f /su/bin/su ]; then
|
||||||
|
ui_print "- Removing system installed root"
|
||||||
|
blockdev --setrw /dev/block/mapper/system$SLOT 2>/dev/null
|
||||||
|
mount -o rw,remount /system
|
||||||
|
# SuperSU
|
||||||
|
if [ -e /system/bin/.ext/.su ]; then
|
||||||
|
mv -f /system/bin/app_process32_original /system/bin/app_process32 2>/dev/null
|
||||||
|
mv -f /system/bin/app_process64_original /system/bin/app_process64 2>/dev/null
|
||||||
|
mv -f /system/bin/install-recovery_original.sh /system/bin/install-recovery.sh 2>/dev/null
|
||||||
|
cd /system/bin
|
||||||
|
if [ -e app_process64 ]; then
|
||||||
|
ln -sf app_process64 app_process
|
||||||
|
elif [ -e app_process32 ]; then
|
||||||
|
ln -sf app_process32 app_process
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
rm -rf /system/.pin /system/bin/.ext /system/etc/.installed_su_daemon /system/etc/.has_su_daemon \
|
||||||
|
/system/xbin/daemonsu /system/xbin/su /system/xbin/sugote /system/xbin/sugote-mksh /system/xbin/supolicy \
|
||||||
|
/system/bin/app_process_init /system/bin/su /cache/su /system/lib/libsupol.so /system/lib64/libsupol.so \
|
||||||
|
/system/su.d /system/etc/install-recovery.sh /system/etc/init.d/99SuperSUDaemon /cache/install-recovery.sh \
|
||||||
|
/system/.supersu /cache/.supersu /data/.supersu \
|
||||||
|
/system/app/Superuser.apk /system/app/SuperSU /cache/Superuser.apk
|
||||||
|
elif [ -f /cache/su.img -o -f /data/su.img -o -d /data/adb/su -o -d /data/su ]; then
|
||||||
|
ui_print "- Removing systemless installed root"
|
||||||
|
umount -l /su 2>/dev/null
|
||||||
|
rm -rf /cache/su.img /data/su.img /data/adb/su /data/adb/suhide /data/su /cache/.supersu /data/.supersu \
|
||||||
|
/cache/supersu_install /data/supersu_install
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
api_level_arch_detect() {
|
||||||
|
API=$(grep_get_prop ro.build.version.sdk)
|
||||||
|
ABI=$(grep_get_prop ro.product.cpu.abi | cut -c-3)
|
||||||
|
ABI2=$(grep_get_prop ro.product.cpu.abi2 | cut -c-3)
|
||||||
|
ABILONG=$(grep_get_prop ro.product.cpu.abi)
|
||||||
|
|
||||||
|
ARCH=arm
|
||||||
|
ARCH32=arm
|
||||||
|
IS64BIT=false
|
||||||
|
if [ "$ABI" = "x86" ]; then ARCH=x86; ARCH32=x86; fi;
|
||||||
|
if [ "$ABI2" = "x86" ]; then ARCH=x86; ARCH32=x86; fi;
|
||||||
|
if [ "$ABILONG" = "arm64-v8a" ]; then ARCH=arm64; ARCH32=arm; IS64BIT=true; fi;
|
||||||
|
if [ "$ABILONG" = "x86_64" ]; then ARCH=x64; ARCH32=x86; IS64BIT=true; fi;
|
||||||
|
}
|
||||||
|
|
||||||
|
check_data() {
|
||||||
|
DATA=false
|
||||||
|
DATA_DE=false
|
||||||
|
if grep ' /data ' /proc/mounts | grep -vq 'tmpfs'; then
|
||||||
|
# Test if data is writable
|
||||||
|
touch /data/.rw && rm /data/.rw && DATA=true
|
||||||
|
# Test if data is decrypted
|
||||||
|
$DATA && [ -d /data/adb ] && touch /data/adb/.rw && rm /data/adb/.rw && DATA_DE=true
|
||||||
|
$DATA_DE && [ -d /data/adb/magisk ] || mkdir /data/adb/magisk || DATA_DE=false
|
||||||
|
fi
|
||||||
|
NVBASE=/data
|
||||||
|
$DATA || NVBASE=/cache/data_adb
|
||||||
|
$DATA_DE && NVBASE=/data/adb
|
||||||
|
resolve_vars
|
||||||
|
}
|
||||||
|
|
||||||
|
find_magisk_apk() {
|
||||||
|
local DBAPK
|
||||||
|
[ -z $APK ] && APK=/data/adb/magisk.apk
|
||||||
|
[ -f $APK ] || APK=/data/magisk/magisk.apk
|
||||||
|
[ -f $APK ] || APK=/data/app/com.topjohnwu.magisk*/*.apk
|
||||||
|
[ -f $APK ] || APK=/data/app/*/com.topjohnwu.magisk*/*.apk
|
||||||
|
if [ ! -f $APK ]; then
|
||||||
|
DBAPK=$(magisk --sqlite "SELECT value FROM strings WHERE key='requester'" 2>/dev/null | cut -d= -f2)
|
||||||
|
[ -z $DBAPK ] && DBAPK=$(strings /data/adb/magisk.db | grep -oE 'requester..*' | cut -c10-)
|
||||||
|
[ -z $DBAPK ] || APK=/data/user_de/*/$DBAPK/dyn/*.apk
|
||||||
|
[ -f $APK ] || [ -z $DBAPK ] || APK=/data/app/$DBAPK*/*.apk
|
||||||
|
[ -f $APK ] || [ -z $DBAPK ] || APK=/data/app/*/$DBAPK*/*.apk
|
||||||
|
fi
|
||||||
|
[ -f $APK ] || ui_print "! Unable to detect Magisk app APK for BootSigner"
|
||||||
|
}
|
||||||
|
|
||||||
|
run_migrations() {
|
||||||
|
local LOCSHA1
|
||||||
|
local TARGET
|
||||||
|
# Legacy app installation
|
||||||
|
local BACKUP=/data/adb/magisk/stock_boot*.gz
|
||||||
|
if [ -f $BACKUP ]; then
|
||||||
|
cp $BACKUP /data
|
||||||
|
rm -f $BACKUP
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Legacy backup
|
||||||
|
for gz in /data/stock_boot*.gz; do
|
||||||
|
[ -f $gz ] || break
|
||||||
|
LOCSHA1=`basename $gz | sed -e 's/stock_boot_//' -e 's/.img.gz//'`
|
||||||
|
[ -z $LOCSHA1 ] && break
|
||||||
|
mkdir /data/magisk_backup_${LOCSHA1} 2>/dev/null
|
||||||
|
mv $gz /data/magisk_backup_${LOCSHA1}/boot.img.gz
|
||||||
|
done
|
||||||
|
|
||||||
|
# Stock backups
|
||||||
|
LOCSHA1=$SHA1
|
||||||
|
for name in boot dtb dtbo dtbs; do
|
||||||
|
BACKUP=/data/adb/magisk/stock_${name}.img
|
||||||
|
[ -f $BACKUP ] || continue
|
||||||
|
if [ $name = 'boot' ]; then
|
||||||
|
LOCSHA1=`$MAGISKBIN/magiskboot sha1 $BACKUP`
|
||||||
|
mkdir /data/magisk_backup_${LOCSHA1} 2>/dev/null
|
||||||
|
fi
|
||||||
|
TARGET=/data/magisk_backup_${LOCSHA1}/${name}.img
|
||||||
|
cp $BACKUP $TARGET
|
||||||
|
rm -f $BACKUP
|
||||||
|
gzip -9f $TARGET
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
copy_sepolicy_rules() {
|
||||||
|
# Remove all existing rule folders
|
||||||
|
rm -rf /data/unencrypted/magisk /cache/magisk /metadata/magisk /persist/magisk /mnt/vendor/persist/magisk
|
||||||
|
|
||||||
|
# Find current active RULESDIR
|
||||||
|
local RULESDIR
|
||||||
|
local active_dir=$(magisk --path)/.magisk/mirror/sepolicy.rules
|
||||||
|
if [ -L $active_dir ]; then
|
||||||
|
RULESDIR=$(readlink $active_dir)
|
||||||
|
[ "${RULESDIR:0:1}" != "/" ] && RULESDIR="$(magisk --path)/.magisk/mirror/$RULESDIR"
|
||||||
|
elif [ -d /data/unencrypted ] && ! grep ' /data ' /proc/mounts | grep -qE 'dm-|f2fs'; then
|
||||||
|
RULESDIR=/data/unencrypted/magisk
|
||||||
|
elif grep -q ' /cache ' /proc/mounts; then
|
||||||
|
RULESDIR=/cache/magisk
|
||||||
|
elif grep -q ' /metadata ' /proc/mounts; then
|
||||||
|
RULESDIR=/metadata/magisk
|
||||||
|
elif grep -q ' /persist ' /proc/mounts; then
|
||||||
|
RULESDIR=/persist/magisk
|
||||||
|
elif grep -q ' /mnt/vendor/persist ' /proc/mounts; then
|
||||||
|
RULESDIR=/mnt/vendor/persist/magisk
|
||||||
|
else
|
||||||
|
return
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Copy all enabled sepolicy.rule
|
||||||
|
for r in /data/adb/modules*/*/sepolicy.rule; do
|
||||||
|
[ -f "$r" ] || continue
|
||||||
|
local MODDIR=${r%/*}
|
||||||
|
[ -f $MODDIR/disable ] && continue
|
||||||
|
[ -f $MODDIR/remove ] && continue
|
||||||
|
local MODNAME=${MODDIR##*/}
|
||||||
|
mkdir -p $RULESDIR/$MODNAME
|
||||||
|
cp -f $r $RULESDIR/$MODNAME/sepolicy.rule
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
#################
|
||||||
|
# Module Related
|
||||||
|
#################
|
||||||
|
|
||||||
|
set_perm() {
|
||||||
|
chown $2:$3 $1 || return 1
|
||||||
|
chmod $4 $1 || return 1
|
||||||
|
CON=$5
|
||||||
|
[ -z $CON ] && CON=u:object_r:system_file:s0
|
||||||
|
chcon $CON $1 || return 1
|
||||||
|
}
|
||||||
|
|
||||||
|
set_perm_recursive() {
|
||||||
|
find $1 -type d 2>/dev/null | while read dir; do
|
||||||
|
set_perm $dir $2 $3 $4 $6
|
||||||
|
done
|
||||||
|
find $1 -type f -o -type l 2>/dev/null | while read file; do
|
||||||
|
set_perm $file $2 $3 $5 $6
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
mktouch() {
|
||||||
|
mkdir -p ${1%/*} 2>/dev/null
|
||||||
|
[ -z $2 ] && touch $1 || echo $2 > $1
|
||||||
|
chmod 644 $1
|
||||||
|
}
|
||||||
|
|
||||||
|
request_size_check() {
|
||||||
|
reqSizeM=`du -ms "$1" | cut -f1`
|
||||||
|
}
|
||||||
|
|
||||||
|
request_zip_size_check() {
|
||||||
|
reqSizeM=`unzip -l "$1" | tail -n 1 | awk '{ print int(($1 - 1) / 1048576 + 1) }'`
|
||||||
|
}
|
||||||
|
|
||||||
|
boot_actions() { return; }
|
||||||
|
|
||||||
|
# Require ZIPFILE to be set
|
||||||
|
is_legacy_script() {
|
||||||
|
unzip -l "$ZIPFILE" install.sh | grep -q install.sh
|
||||||
|
return $?
|
||||||
|
}
|
||||||
|
|
||||||
|
# Require OUTFD, ZIPFILE to be set
|
||||||
|
install_module() {
|
||||||
|
rm -rf $TMPDIR
|
||||||
|
mkdir -p $TMPDIR
|
||||||
|
cd $TMPDIR
|
||||||
|
|
||||||
|
setup_flashable
|
||||||
|
mount_partitions
|
||||||
|
api_level_arch_detect
|
||||||
|
|
||||||
|
# Setup busybox and binaries
|
||||||
|
if $BOOTMODE; then
|
||||||
|
boot_actions
|
||||||
|
else
|
||||||
|
recovery_actions
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Extract prop file
|
||||||
|
unzip -o "$ZIPFILE" module.prop -d $TMPDIR >&2
|
||||||
|
[ ! -f $TMPDIR/module.prop ] && abort "! Unable to extract zip file!"
|
||||||
|
|
||||||
|
local MODDIRNAME=modules
|
||||||
|
$BOOTMODE && MODDIRNAME=modules_update
|
||||||
|
local MODULEROOT=$NVBASE/$MODDIRNAME
|
||||||
|
MODID=`grep_prop id $TMPDIR/module.prop`
|
||||||
|
MODNAME=`grep_prop name $TMPDIR/module.prop`
|
||||||
|
MODAUTH=`grep_prop author $TMPDIR/module.prop`
|
||||||
|
MODPATH=$MODULEROOT/$MODID
|
||||||
|
|
||||||
|
# Create mod paths
|
||||||
|
rm -rf $MODPATH
|
||||||
|
mkdir -p $MODPATH
|
||||||
|
|
||||||
|
if is_legacy_script; then
|
||||||
|
unzip -oj "$ZIPFILE" module.prop install.sh uninstall.sh 'common/*' -d $TMPDIR >&2
|
||||||
|
|
||||||
|
# Load install script
|
||||||
|
. $TMPDIR/install.sh
|
||||||
|
|
||||||
|
# Callbacks
|
||||||
|
print_modname
|
||||||
|
on_install
|
||||||
|
|
||||||
|
[ -f $TMPDIR/uninstall.sh ] && cp -af $TMPDIR/uninstall.sh $MODPATH/uninstall.sh
|
||||||
|
$SKIPMOUNT && touch $MODPATH/skip_mount
|
||||||
|
$PROPFILE && cp -af $TMPDIR/system.prop $MODPATH/system.prop
|
||||||
|
cp -af $TMPDIR/module.prop $MODPATH/module.prop
|
||||||
|
$POSTFSDATA && cp -af $TMPDIR/post-fs-data.sh $MODPATH/post-fs-data.sh
|
||||||
|
$LATESTARTSERVICE && cp -af $TMPDIR/service.sh $MODPATH/service.sh
|
||||||
|
|
||||||
|
ui_print "- Setting permissions"
|
||||||
|
set_permissions
|
||||||
|
else
|
||||||
|
print_title "$MODNAME" "by $MODAUTH"
|
||||||
|
print_title "Powered by Magisk"
|
||||||
|
|
||||||
|
unzip -o "$ZIPFILE" customize.sh -d $MODPATH >&2
|
||||||
|
|
||||||
|
if ! grep -q '^SKIPUNZIP=1$' $MODPATH/customize.sh 2>/dev/null; then
|
||||||
|
ui_print "- Extracting module files"
|
||||||
|
unzip -o "$ZIPFILE" -x 'META-INF/*' -d $MODPATH >&2
|
||||||
|
|
||||||
|
# Default permissions
|
||||||
|
set_perm_recursive $MODPATH 0 0 0755 0644
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Load customization script
|
||||||
|
[ -f $MODPATH/customize.sh ] && . $MODPATH/customize.sh
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Handle replace folders
|
||||||
|
for TARGET in $REPLACE; do
|
||||||
|
ui_print "- Replace target: $TARGET"
|
||||||
|
mktouch $MODPATH$TARGET/.replace
|
||||||
|
done
|
||||||
|
|
||||||
|
if $BOOTMODE; then
|
||||||
|
# Update info for Magisk app
|
||||||
|
mktouch $NVBASE/modules/$MODID/update
|
||||||
|
cp -af $MODPATH/module.prop $NVBASE/modules/$MODID/module.prop
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Copy over custom sepolicy rules
|
||||||
|
if [ -f $MODPATH/sepolicy.rule ]; then
|
||||||
|
ui_print "- Installing custom sepolicy rules"
|
||||||
|
copy_sepolicy_rules
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Remove stuff that doesn't belong to modules and clean up any empty directories
|
||||||
|
rm -rf \
|
||||||
|
$MODPATH/system/placeholder $MODPATH/customize.sh \
|
||||||
|
$MODPATH/README.md $MODPATH/.git*
|
||||||
|
rmdir -p $MODPATH
|
||||||
|
|
||||||
|
cd /
|
||||||
|
$BOOTMODE || recovery_cleanup
|
||||||
|
rm -rf $TMPDIR
|
||||||
|
|
||||||
|
ui_print "- Done"
|
||||||
|
}
|
||||||
|
|
||||||
|
##########
|
||||||
|
# Presets
|
||||||
|
##########
|
||||||
|
|
||||||
|
# Detect whether in boot mode
|
||||||
|
[ -z $BOOTMODE ] && ps | grep zygote | grep -qv grep && BOOTMODE=true
|
||||||
|
[ -z $BOOTMODE ] && ps -A 2>/dev/null | grep zygote | grep -qv grep && BOOTMODE=true
|
||||||
|
[ -z $BOOTMODE ] && BOOTMODE=false
|
||||||
|
|
||||||
|
NVBASE=/data/adb
|
||||||
|
TMPDIR=/dev/tmp
|
||||||
|
|
||||||
|
# Bootsigner related stuff
|
||||||
|
BOOTSIGNERCLASS=com.topjohnwu.signing.SignBoot
|
||||||
|
BOOTSIGNER='/system/bin/dalvikvm -Xnoimage-dex2oat -cp $APK $BOOTSIGNERCLASS'
|
||||||
|
BOOTSIGNED=false
|
||||||
|
|
||||||
|
resolve_vars
|
81
README.md
Normal file
81
README.md
Normal file
@ -0,0 +1,81 @@
|
|||||||
|
# Overview
|
||||||
|
|
||||||
|
This scripts aims in simplifing patching and installing Magisk after a LineageOS **for microG** update.
|
||||||
|
|
||||||
|
It has been made to run on Linux x86 or x64 and patch a boot image for an ARM device.
|
||||||
|
|
||||||
|
It detects LineageOS **for microG** version via adb, download the ROM, extracts `payload.bin` and dumps `boot.img`, patches it with Magisk, and flashes it.
|
||||||
|
|
||||||
|
:warning: **This has only been tested on a FP3 device, at the time of writing with LineageOS for microG 18.1 (November 18, 2021 build) Magisk v23.0** :warning:
|
||||||
|
|
||||||
|
## Run on other device
|
||||||
|
|
||||||
|
Before to run this script for an other device, please make sure you understand what you run and every step of the script.
|
||||||
|
**I won't be responsible if anything goes wrong.**
|
||||||
|
|
||||||
|
The script is designed to:
|
||||||
|
* run the script `boot_patch.sh boot.img` with KEEPVERITY and KEEPFORCEENCRYPT to true
|
||||||
|
* install Magisk by patching the **boot image** and **not the recovery image**.
|
||||||
|
* run to flash the boot image in **boot_a** or **boot_b** partition (the FP3 way) and **not boot partition**
|
||||||
|
|
||||||
|
|
||||||
|
If you fit the conditions above, you have to make sure the patch `KEEPVERITY=true KEEPFORCEENCRYPT=true sh boot_patch.sh` outputs the same boot image than the Magisk Manager app:
|
||||||
|
* patch boot via Magisk Manager app
|
||||||
|
* run `boot_patch.sh boot.img` manually
|
||||||
|
* compare both files `magisk_patched-*.img` and `new-boot.img` with diff or by comparing hashes.
|
||||||
|
|
||||||
|
If **and only if** both output files are the same and you meet all the conditions, you can try the python script.
|
||||||
|
|
||||||
|
# Prerequisites
|
||||||
|
|
||||||
|
## In PATH
|
||||||
|
|
||||||
|
You need to have on your system (in your PATH):
|
||||||
|
* adb
|
||||||
|
* fastboot
|
||||||
|
* payload-dumper-go
|
||||||
|
* python (3)
|
||||||
|
* dos2unix
|
||||||
|
|
||||||
|
|
||||||
|
## USB debugging
|
||||||
|
|
||||||
|
You need to have USB debugging Enabled and configured.
|
||||||
|
Check your devices appears when running `adb devices` with device connected via USB.
|
||||||
|
|
||||||
|
## Using
|
||||||
|
|
||||||
|
Replace the `device` variable by your device code, as [listed here](https://download.lineage.microg.org/).
|
||||||
|
|
||||||
|
Run `python magisk_boot_flasher.py`
|
||||||
|
|
||||||
|
|
||||||
|
# Run patch boot locally
|
||||||
|
|
||||||
|
That's how we can run Magisk's `boot_patch.sh` on Linux x86 or x64 and patch a boot image for an ARM device
|
||||||
|
|
||||||
|
> Tested with Magisk v23.0 with FP3
|
||||||
|
|
||||||
|
* Get Magisk `.apk`
|
||||||
|
* Extract it
|
||||||
|
|
||||||
|
Keep in the same folder:
|
||||||
|
* `assets/boot_patch.sh` -> `boot_patch.sh`
|
||||||
|
* `assets/util_functions.sh` -> `util_functions.sh`
|
||||||
|
* `lib/armeabi-v7a/libmagisk32.so` -> `magisk32`
|
||||||
|
* `lib/armeabi-v7a/libmagisk64.so` -> `magisk64`
|
||||||
|
* `lib/armeabi-v7a/libmagiskinit.so` -> `magiskinit`
|
||||||
|
* `lib/x86/libmagiskboot.so` -> `magiskboot`
|
||||||
|
* `lib/armeabi-v7a/libmagiskinit.so` -> `magiskinit`
|
||||||
|
|
||||||
|
You can delete all the rest.
|
||||||
|
|
||||||
|
In util_functions.sh:
|
||||||
|
* Change function `ui_print()` to contain only `echo "$1"`
|
||||||
|
* Change every `getprop` command, to `adb shell getprop`, to go run it on device rather than locally.
|
||||||
|
|
||||||
|
You can now run:
|
||||||
|
`sh boot_patch.sh boot.img`
|
||||||
|
|
||||||
|
The outpout file `new-boot.img` has the exact same sha256 hash as the `magisk_patched-*.img`, so we can consider it works :)
|
||||||
|
|
201
magisk_boot_flasher.py
Normal file
201
magisk_boot_flasher.py
Normal file
@ -0,0 +1,201 @@
|
|||||||
|
import requests
|
||||||
|
import hashlib
|
||||||
|
import sys
|
||||||
|
import zipfile
|
||||||
|
from tqdm import tqdm
|
||||||
|
import subprocess
|
||||||
|
import time
|
||||||
|
|
||||||
|
|
||||||
|
device = 'FP3'
|
||||||
|
magiskdir = 'Magisk-v23.0'
|
||||||
|
|
||||||
|
|
||||||
|
def yes_or_no(question, default=None):
|
||||||
|
"""Ask a yes/no question via raw_input() and return their answer.
|
||||||
|
|
||||||
|
"question" is a string that is presented to the user.
|
||||||
|
"default" is the presumed answer if the user just hits <Enter>.
|
||||||
|
It must be "yes" (the default), "no" or None (meaning
|
||||||
|
an answer is required of the user).
|
||||||
|
|
||||||
|
The "answer" return value is True for "yes" or False for "no".
|
||||||
|
"""
|
||||||
|
valid = {"yes": True, "y": True, "ye": True, "no": False, "n": False}
|
||||||
|
if default is None:
|
||||||
|
prompt = " [y/n] "
|
||||||
|
elif default == "yes":
|
||||||
|
prompt = " [Y/n] "
|
||||||
|
elif default == "no":
|
||||||
|
prompt = " [y/N] "
|
||||||
|
else:
|
||||||
|
raise ValueError("Invalid default answer: '%s'" % default)
|
||||||
|
|
||||||
|
while True:
|
||||||
|
choice = input(question + prompt).lower()
|
||||||
|
if default is not None and choice == "":
|
||||||
|
return valid[default]
|
||||||
|
elif choice in valid:
|
||||||
|
return valid[choice]
|
||||||
|
else:
|
||||||
|
print("Please respond with 'yes' or 'no' " "(or 'y' or 'n').\n")
|
||||||
|
|
||||||
|
|
||||||
|
def isMagiskInstalled():
|
||||||
|
cmdlist = ['adb', 'shell', 'command', '-v', 'su']
|
||||||
|
sp = subprocess.run(cmdlist, stdout=subprocess.DEVNULL,
|
||||||
|
stderr=subprocess.STDOUT)
|
||||||
|
if sp.returncode != 0:
|
||||||
|
return False
|
||||||
|
else:
|
||||||
|
return True
|
||||||
|
|
||||||
|
|
||||||
|
def checkInstalledVersion():
|
||||||
|
cmdlist = ['adb', 'shell', 'getprop', 'ro.lineage.version']
|
||||||
|
sp = subprocess.run(cmdlist, stdout=subprocess.PIPE)
|
||||||
|
currentversion = sp.stdout.decode('UTF-8').rstrip()
|
||||||
|
return currentversion
|
||||||
|
|
||||||
|
|
||||||
|
def downloadUpdate(device, version):
|
||||||
|
filename = f"lineage-{version}.zip"
|
||||||
|
url = f'https://download.lineage.microg.org/{device}/{filename}'
|
||||||
|
r = requests.get(url, stream=True)
|
||||||
|
with tqdm.wrapattr(open(filename, "wb"), "write",
|
||||||
|
miniters=1, desc=filename,
|
||||||
|
total=int(r.headers.get('Content-Length'))) as fout:
|
||||||
|
for chunk in r.iter_content(chunk_size=4096):
|
||||||
|
fout.write(chunk)
|
||||||
|
|
||||||
|
print('Comparing hashes...', end='', flush=True)
|
||||||
|
checkHash(filename)
|
||||||
|
print(' [OK]')
|
||||||
|
|
||||||
|
return filename
|
||||||
|
|
||||||
|
|
||||||
|
def checkHash(filename):
|
||||||
|
filehash = sha256sum(filename)
|
||||||
|
|
||||||
|
hurl = f'https://download.lineage.microg.org/{device}/{filename}.sha256sum'
|
||||||
|
r = requests.get(hurl)
|
||||||
|
correcthash = r.text.split(' ')[0]
|
||||||
|
|
||||||
|
if filehash != correcthash:
|
||||||
|
sys.exit("Error: File hash doesn't match ! Aborting.")
|
||||||
|
|
||||||
|
|
||||||
|
def sha256sum(filename, block_size=65536):
|
||||||
|
sha256 = hashlib.sha256()
|
||||||
|
with open(filename, 'rb') as f:
|
||||||
|
for block in iter(lambda: f.read(block_size), b''):
|
||||||
|
sha256.update(block)
|
||||||
|
return sha256.hexdigest()
|
||||||
|
|
||||||
|
|
||||||
|
def patchBootimg():
|
||||||
|
cmd = ['sh', f'{magiskdir}/boot_patch.sh', '../boot.img']
|
||||||
|
env = {"KEEPVERITY": "true", "KEEPFORCEENCRYPT": "true"}
|
||||||
|
sp = subprocess.run(cmd, env=env, stdout=subprocess.DEVNULL,
|
||||||
|
stderr=subprocess.STDOUT)
|
||||||
|
if sp.returncode != 0:
|
||||||
|
sys.exit('\nERROR: boot_patch.sh exited with errors!')
|
||||||
|
|
||||||
|
|
||||||
|
def rebootToBootloader():
|
||||||
|
cmd = ['adb', 'reboot', 'bootloader']
|
||||||
|
subprocess.run(cmd, stdout=subprocess.DEVNULL)
|
||||||
|
|
||||||
|
cmd = ['fastboot', 'devices']
|
||||||
|
while "Waiting for device in fastboot":
|
||||||
|
time.sleep(2)
|
||||||
|
sp = subprocess.run(cmd, stdout=subprocess.PIPE)
|
||||||
|
if sp.stdout != b'':
|
||||||
|
break
|
||||||
|
|
||||||
|
|
||||||
|
def flashBoot():
|
||||||
|
currentSlot = getCurrentSlot()
|
||||||
|
cmd = ['fastboot', 'flash', f'boot_{currentSlot}',
|
||||||
|
f'{magiskdir}/new-boot.img']
|
||||||
|
subprocess.run(cmd, stdout=subprocess.DEVNULL, stderr=subprocess.STDOUT)
|
||||||
|
|
||||||
|
|
||||||
|
def getCurrentSlot():
|
||||||
|
cmd = ['fastboot', 'getvar', 'current-slot']
|
||||||
|
ps = subprocess.run(cmd, stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
|
||||||
|
currentSlot = ps.stdout.decode('UTF-8').rstrip()
|
||||||
|
currentSlot = currentSlot.split('slot: ')[1].split('\n')[0]
|
||||||
|
return currentSlot
|
||||||
|
|
||||||
|
|
||||||
|
def cleanUp():
|
||||||
|
cmd = ['rm', 'payload.bin', 'boot.img']
|
||||||
|
subprocess.run(cmd, stdout=subprocess.DEVNULL)
|
||||||
|
|
||||||
|
cmd = ['rm', 'lineage-*.zip']
|
||||||
|
subprocess.run(cmd, shell=True, stdout=subprocess.DEVNULL)
|
||||||
|
|
||||||
|
magiskFilelist = ['kernel', 'kernel_dtb', 'ramdisk.cpio', 'new-boot.img',
|
||||||
|
'stock_boot.img']
|
||||||
|
for f in magiskFilelist:
|
||||||
|
cmd = ['rm', f'{magiskdir}/{f}']
|
||||||
|
subprocess.run(cmd, stdout=subprocess.DEVNULL)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
print("Checking if Magisk already installed...", end='', flush=True)
|
||||||
|
if isMagiskInstalled():
|
||||||
|
print("\nIt seems Magisk is already installed (su in PATH).")
|
||||||
|
print("Aborting.")
|
||||||
|
sys.exit()
|
||||||
|
print(' [OK]')
|
||||||
|
|
||||||
|
print("Getting installed verion (via adb)...", end='', flush=True)
|
||||||
|
installedversion = checkInstalledVersion()
|
||||||
|
print(' [OK]')
|
||||||
|
|
||||||
|
print("Seems you have haven't flashed yet Magisk on the new firmaware.")
|
||||||
|
if not yes_or_no("Would you like do download the new firmware?"):
|
||||||
|
sys.exit()
|
||||||
|
|
||||||
|
print(f"Downloading version: {installedversion}")
|
||||||
|
filename = downloadUpdate(device, installedversion)
|
||||||
|
|
||||||
|
print("Download finished, extracting payload.bin from release...", end='',
|
||||||
|
flush=True)
|
||||||
|
with zipfile.ZipFile(filename, 'r') as zip_ref:
|
||||||
|
zip_ref.extract('payload.bin')
|
||||||
|
print(' [OK]')
|
||||||
|
|
||||||
|
print("Extracting boot.img...", end='', flush=True)
|
||||||
|
cmd = ['payload-dumper-go', '-p', 'boot', '-o', '.', 'payload.bin']
|
||||||
|
subprocess.run(cmd, stdout=subprocess.DEVNULL)
|
||||||
|
print(' [OK]')
|
||||||
|
|
||||||
|
print("Patching boot.img with Magisk scripts...", end='', flush=True)
|
||||||
|
patchBootimg()
|
||||||
|
print(' [OK]')
|
||||||
|
|
||||||
|
if not yes_or_no("Would you like to flash the new boot image?"):
|
||||||
|
sys.exit()
|
||||||
|
|
||||||
|
print("Make sure your device is connected via USB.")
|
||||||
|
input("Press Enter to continue...")
|
||||||
|
|
||||||
|
print('Rebooting device to bootloader...', end='', flush=True)
|
||||||
|
rebootToBootloader()
|
||||||
|
print(' [OK]')
|
||||||
|
|
||||||
|
print('Flashing new boot image...', end='', flush=True)
|
||||||
|
flashBoot()
|
||||||
|
print(' [OK]')
|
||||||
|
|
||||||
|
print('Cleaning up files...', end='', flush=True)
|
||||||
|
cleanUp()
|
||||||
|
print(' [OK]')
|
||||||
|
|
||||||
|
print('Rebooting device, enjoy Magisk! ;)')
|
||||||
|
cmd = ['fastboot', 'reboot']
|
||||||
|
subprocess.run(cmd, stdout=subprocess.DEVNULL, stderr=subprocess.STDOUT)
|
Reference in New Issue
Block a user