i'm on the latest delta. i see no option to disable 'enforce denylist'. well, i 'removed' dlu and shamiko, rebooted, installed shamiko 0.5.1 afresh. now momo 4.3.1 does not find zygisk. but, init.rc is modified.
I have one of my devices on the delta. I believe there is no option to disable enforce denylist because the delta includes magiskhide and with it the denylist must be enabled. I asked @huskydg this twice to clarify, but he never responded, if I recall he responded with something else.
Turning Magisk hide off acts like disabling enforce.I have one of my devices on the delta. I believe there is no option to disable enforce denylist because the delta includes magiskhide and with it the denylist must be enabled. I asked @huskydg this twice to clarify, but he never responded, if I recall he responded with something else.
I disabled magiskhide in the delta, installed the new shamiko and rebooted and shamiko now shows as working. Onn 8 first gen, Android 9 tablet. The latest momo only reports init.rc modified.
Now reading all these recent posts about Delta, everything is pretty logical
True, but for that one must be somewhat familiar with GitHub, while newbies usually are not, and then they ask how this/how that/where is what, what to click, etc
Just to clarify:
For me (recently I learnt it's 2SI device - whatever it means - ok, 2 Stage Init), nothing changed
Haha ... Suitably cryptic comment about fish prices...
I answered and detailed the hallmarks of each Android boot-type (Legacy Ramdisk, Legacy SAR & 2SI "SAR"):Sorry, I didn't decipher
It's Xiaomi Mi 11 Lite 5G NE, launched with MIUI 12.5, Android 11 - I didn't upgrade to A12, and running stock firmware (only Magisk and custom Recovery)
It's A/B device, with Recovery integrated to Boot, Magisk recognizes as Ramdisk Yes
2SI or not?
Too late to be of help this time, butI am not sure where I am supposed to post this. I have a google pixel 6 pro rooted on android 13.3. I accidentally hit 'reboot to recovery' in magisk and I am stuck in a bootloop. I am able to get into fastboot mode but adb does not recognize my device. Device manager recognizes it as lemobile android device>android bootloader interface. I searched on here, the pixel 6 forum and just google but am not too sure what I should do. I don't know if I have a rogue module but I do not know how to uninstall it since I cannot find a twrp for the pixel 6 pro.
edit: I didn't realize it was 'fastboot devices' instead of 'adb devices'. I downloaded the android 13.3 factory image and am now installing via the 'flash-all' script. Hoping I don't run into any more problems.
Bro, I formatted my data and everything and flashed disable dm verity force encrypt. After patching this file, I wasn't able to patch magisk.zip (I got the same error that I talked about in this thread."Unsupported boot image extra"). So I re-formatted my phone again and flashed magisk.zip only in twrp and it worked. But I want to disable force encryption in my device because I'm not able to access internal storage in twrp. Please I need helpPlease see my last post for further explanation...
so since you seem to have this issue, you still need to do this...
Known issue, but not a regression, so no further fixes will come... (Edit: Except this one: https://forum.xda-developers.com/t/magisk-general-support-discussion.3432382/post-87068697 )
Basically, Direct install breaks due to previous Magisk injection method for 2SI being incompatible with new Magisk... It's more complicated in configurations where disabling verity/verification to boot is still required, but for most 2SI device users the solution is simply to do initial Patch and fasttboot flash original boot image again, thereby replacing the incompatible fstab-patched image...
Search the threads again. I think, after installing TWRP, you use TWRP to wipe data. And somewhere in there you say "do not encrypt".Bro, I formatted my data and everything and flashed disable dm verity force encrypt. After patching this file, I wasn't able to patch magisk.zip (I got the same error that I talked about in this thread."Unsupported boot image extra"). So I re-formatted my phone again and flashed magisk.zip only in twrp and it worked. But I want to disable force encryption in my device because I'm not able to access internal storage in twrp. Please I need help
Thank you for your help and thank you for your kind words.I understand completely, i have to use Firefox Addon to translate some russian android sites all the time, so something like this may make things easier, you can use it to translate an entire page or from a highlighted section of text via right click
And without getting too political (actually impossible not to) as a former infantry soldier, know theres plenty of us here in Australia would come to help if we could. The Ukrainian people have really shown their courage and determination, and may there be peace for you soon.
FYI (& others):
Do you have Shamiko?... PW
How did this issue start? Did it happen after upgrading magisk? Or you've updated your rom?
I wouldn't source. The script is supposed to be called as an executableHow does PixelFlasher invoke boot_patch.sh?
Does it invoke it as an "executable", creating a new process? Or does it "source" it, so changes to the environment will survive?
Does PixelFlasher create an environment variable named "SHA1"?
My copy of boot_patch.sh has a compound statement that tests whether SHA1 has a non-zero length value before setting it to the sha1 of the boot image. If the environment variable is already set, it will not be overwritten. I don't know why.
#!/system/bin/sh # Boot partition AB=$(getprop ro.boot.slot_suffix) BOOT_PART=/dev/block/bootdevice/by-name/boot"$AB" # Boot and patched boot images DOWNLOAD=/sdcard/Download/ BOOT_IMG="$DOWNLOAD"boot.img PATCHED_BOOT_IMG="$DOWNLOAD"patched-boot.img # Magisk path MAGISK_PATH=/data/adb/magisk/ # Disk-dump boot image to Download folder dd if="$BOOT_PART" of="$BOOT_IMG" # Patch the boot image and move to Download folder "$MAGISK_PATH"boot_patch.sh "$BOOT_IMG" mv "$MAGISK_PATH"new-boot.img "$PATCHED_BOOT_IMG" # Flash the patched boot image dd if="$PATCHED_BOOT_IMG" of="$BOOT_PART" # Reboot reboot
You can do some cleaning like this:I'm using the systemless debloater module to degoogle and debloat a device (and several other magisk modules to assist in that endeavor). I'd really like to be able to do a factory reset to clear the device of any data/artifacts from the debloated apps, but of course a factory reset wipes out magisk modules, so I'm in a catch 22.
For everyone, a bit ofI'm sorry I didn't realize that.
I've been so used to generic steps (boot recovery -> flash recovery -> reboot recovery -> wipe all -> flash firmware -> flash ROM -> flash GApps -> flash dm-verity disabler -> boot system -> boot recovery -> flash Magisk -> flash *Posed) that I didn't bother checking if steps have changed.
Honestly I think it's too bad that we can't just flash ZIPs anymore, that was so easy.
Anyway, thank you for your response.
https://forum.xda-developers.com/t/magisk-the-magic-mask-for-android.3473445/post-74961572update Magisk to be modular and adaptive to follow Google's Pixel concept... modding a device has changed completely. I am a strong advocate of these new changes, praising the effort Google has put into designing such weird but fascinating setup despite many view this as "moves against developers".
With the announcement of Project Treble, all devices will go through the same "Pixel-ize" treatment, so this future is inevitable. Project Treble is all about "modular", and Magisk has been rewritten to embrace this concept. I have spent extra effort to backport the changes made requires to run on these new modern devices to downward support all devices, so we do not need 2 drastically different installation methods...
...This installation method is deprecated and is maintained with minimum effort. YOU HAVE BEEN WARNED!
Installing using custom recoveries is only possible if your device has boot ramdisk.
Installing Magisk through custom recoveries on modern devices is no longer recommended. If you face any issues, please use the proper Patch Image method.