forked from sidex15/susfs4ksu-module
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcustomize.sh
94 lines (82 loc) · 3.47 KB
/
customize.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
#!/bin/sh
DEST_BIN_DIR=/data/adb/ksu/bin
if [ -z "$KSU" ] ; then
abort '[!] SuSFS is for KernelSU only.'
fi
if [ ! -d ${DEST_BIN_DIR} ]; then
ui_print "'${DEST_BIN_DIR}' not existed, installation aborted."
rm -rf ${MODPATH}
exit 1
fi
unzip ${ZIPFILE} -d ${TMPDIR}/susfs
ver=$(uname -r | cut -d. -f1)
if [ ${ver} -lt 5 ]; then
KERNEL_VERSION=non-gki
ui_print "Non-GKI kernel detected... use non-GKI susfs bins..."
chmod +x "${TMPDIR}/susfs/tools/1.5.3/${KERNEL_VERSION}/ksu_susfs_arm64"
if [ ${ARCH} = "arm64" ]; then
SUSFS_VERSION=$(${TMPDIR}/susfs/tools/1.5.3/${KERNEL_VERSION}/ksu_susfs_arm64 show version | cut -d. -f3)
fi
else
KERNEL_VERSION=gki
ui_print "GKI kernel detected... use GKI susfs bins..."
chmod +x "${TMPDIR}/susfs/tools/1.5.3/${KERNEL_VERSION}/ksu_susfs_arm64"
if [ ${ARCH} = "arm64" ]; then
SUSFS_VERSION=$(${TMPDIR}/susfs/tools/1.5.3/${KERNEL_VERSION}/ksu_susfs_arm64 show version | cut -d. -f3)
fi
fi
if [ ${ARCH} = "arm64" ]; then
if [ -n "$SUSFS_VERSION" ] && [ "$SUSFS_VERSION" -gt 2 ] 2>/dev/null; then
ui_print "Kernel is using susfs 1.5.3"
cp ${TMPDIR}/susfs/tools/1.5.3/${KERNEL_VERSION}/ksu_susfs_arm64 ${DEST_BIN_DIR}/ksu_susfs
else
ui_print "Kernel is using susfs 1.5.2"
cp ${TMPDIR}/susfs/tools/1.5.2/${KERNEL_VERSION}/ksu_susfs_arm64 ${DEST_BIN_DIR}/ksu_susfs
fi
cp ${TMPDIR}/susfs/tools/sus_su_arm64 ${DEST_BIN_DIR}/sus_su
fi
chmod 755 ${DEST_BIN_DIR}/ksu_susfs ${DEST_BIN_DIR}/sus_su
chmod 644 ${MODPATH}/post-fs-data.sh ${MODPATH}/service.sh ${MODPATH}/uninstall.sh
prop_value=$(getprop ro.boot.vbmeta.digest)
HASH_DIR=/data/adb/VerifiedBootHash
if [ -z "$prop_value" ]; then
ui_print "Property ro.boot.vbmeta.digest is empty, generate VerifiedBootHash directory"
if [ ! -d "$HASH_DIR" ]; then
ui_print "- Creating VerifiedBootHash directory"
mkdir -p "$HASH_DIR"
[ ! -f "$HASH_DIR/VerifiedBootHash.txt" ] && touch "$HASH_DIR/VerifiedBootHash.txt"
fi
ui_print "*********************************************************"
ui_print "! Please copy your VerifiedBootHash in Key Attestation demo"
ui_print "! And Paste it to /data/adb/VerifiedBootHash/VerifiedBootHash.txt"
ui_print "*********************************************************"
else
ui_print "*********************************************************"
ui_print "! Property ro.boot.vbmeta.digest has a value"
ui_print "! skipping VerifiedBootHash creation"
ui_print "*********************************************************"
fi
ui_print "! Preparing susfs4ksu persistent directory"
PERSISTENT_DIR=/data/adb/susfs4ksu
[ ! -d /data/adb/susfs4ksu ] && mkdir -p $PERSISTENT_DIR
files="sus_mount.txt try_umount.txt sus_path.txt kernelversion.txt config.sh"
for i in $files ; do
if [ ! -f $PERSISTENT_DIR/$i ] ; then
# If file doesn't exist, create it
cat $MODPATH/$i > $PERSISTENT_DIR/$i
elif [ "$i" = "config.sh" ]; then
# Ensure file ends with newline
[ -s "$PERSISTENT_DIR/$i" ] && [ "$(tail -c1 "$PERSISTENT_DIR/$i" | xxd -p)" != "0a" ] && echo "" >> "$PERSISTENT_DIR/$i"
# For config.sh, append only new keys
while IFS= read -r line; do
# Extract key name before = sign
key=$(echo "$line" | cut -d'=' -f1)
# Only append if key doesn't exist
grep -q "^${key}=" "$PERSISTENT_DIR/$i" || echo "$line" >> "$PERSISTENT_DIR/$i"
done < "$MODPATH/$i"
fi
rm $MODPATH/$i
done
rm -rf ${MODPATH}/tools
rm ${MODPATH}/customize.sh ${MODPATH}/README.md
# EOF