55 次浏览
默认关闭verity,无需手动执行OEM解锁和使用命令adb disable-verity
path: /external/avb/avbtool
将default=0改为default=2
sub_parser.add_argument('--flags',
help='VBMeta flags',
type=parse_number,
default=2)
# edited by peng default=0 to default=2
将root所需文件直接放入源码,无需手动push
path: /out/target/product/evk_8mm/system/bin/install-recovery.sh
path: /out/target/product/evk_8mm/system/xbin/su
path: /out/target/product/evk_8mm/system/xbin/daemonsu
path: /out/target/product/evk_8mm/system/xbin/supolicy
path: /out/target/product/evk_8mm/system/lib64/libsupol.so
不编译su文件,防止编译后覆盖上述步骤2中的su文件
path: /system/extras/su/Android.mk
屏蔽如下代码:
# edited by peng
#LOCAL_MODULE_TAGS := debug
尝试在开机自启动脚本中执行下列命令获取文件权限 实际未成功,还需手动输入相关命令
path: /out/target/product/evk_8mm/system/bin/set_rtc.sh
#mount -o remount,rw /system
chmod 0755 /system/bin/install-recovery.sh
chmod 0755 /system/xbin/su
chmod 0755 /system/xbin/daemonsu
chmod 0755 /system/xbin/supolicy
chmod 0755 /system/lib64/libsupol.so
chmod 0755 /system/lib64/libsupol.so
chcon u:object_r:toolbox_exec:s0 /system/bin/install-recovery.sh
chcon u:object_r:system_file:s0 /system/xbin/daemonsu
chcon u:object_r:system_file:s0 /system/xbin/supolicy
chcon u:object_r:system_file:s0 /system/lib64/libsupol.so
尝试修改代码获取文件权限 实际也未成功,还需手动输入相关命令
path: /system/core/libcutils/fs_config.cpp
// added by peng start
{ 06755, AID_ROOT, AID_SHELL, 0, "system/bin/install-recovery.sh" },
{ 06755, AID_ROOT, AID_SHELL, 0, "system/xbin/su" },
{ 06755, AID_ROOT, AID_SHELL, 0, "system/xbin/daemonsu" },
{ 06755, AID_ROOT, AID_SHELL, 0, "system/xbin/supolicy" },
{ 06755, AID_ROOT, AID_SHELL, 0, "system/lib64/libsupol.so" },
// end