Please help me understand Magisk Alpha. Is this a Magisk Alpha - Public build?Agree... This is an abusive member who thinks I'm a toxic know-it-all anyway...
I've run Alpha since this was just the base for mtk fix and other branches... Not going down the "it's not legit" route either... Already cited @huskydg's view, but nothing has changed in last couple of weeks ... Source and GitHub builds have been unavailable publicly for months now... PW
Yes, checksum for app-release.apk is the same as when 25210 downloaded from the TG channelPlease help me understand Magisk Alpha. Is this a Magisk Alpha - Public build?
I mentioned that, so did @zgfg... Who cares who said it first?...The guy you are replying quoted husky first. See told you, you are toxic. Blaming me for something someone else did too. Lol. Literally the guy you are responding saying I am bad for linking that linked it before me.
Last Alpha with published source was July last year AFAIK... Source began to be linked from inaccessible (to public) LSPosed GitHub since Feb this year... That's inaccessible for month's in my book...That is toxic. Ok for him before me but not me. LMFAO. Literally are proving my point on the daily.
2weeks≠months
Ok.Yes, checksum for app-release.apk is the same as when 25210 downloaded from the TG channel
But only the Readme, JSON for auto-updating and latest apk for download, no sources
You originally said:Post in thread '[Discussion] Magisk Alpha (Public Released) fork - @vvb2060' https://forum.xda-developers.com/t/...c-released-fork-vvb2060.4424845/post-88296465
So what I originally said is still true. The GitHub Alpha repos all point to official Magisk now. They didn't a week ago before being wiped...
This is still NOT true... At best, JSON in vv's Alpha GitHub repo points to official Canary notes, and Alpha does build Canary commits but it adds her experimental ones... always has... And lack of public source doesn't change that; ie. Alpha builds are a very different animal...
That's only the original (Chinese) Alpha Discussion thread, now name has changed but a number of members here are in that discussion... Builds aren't shared there however, only in the official Alpha channel...View attachment 5868873
It's all shared from a private channel you can't even see. And the owner isn't listed.
For those who might be confused is that the official Magisk Alpha GitHub source (wrong, it is not) and why its Readme Download links to the official Canary (yielding somebody to wrongly think that Alpha is nothing else but Magisk Canary)This is the Magsik Alpha. The links on this page link to Magisk Debug latest version. The code hasn't been updated but the links and where they are the same as canary/debug official build.![]()
GitHub - CoderTyn/Magisk-Alpha
Contribute to CoderTyn/Magisk-Alpha development by creating an account on GitHub.github.com
Thank you, though that link is, of course, in the information thread and peppered all through this discussion thread so nothing newI have been using this link for current code changes.
![]()
GitHub - topjohnwu/Magisk: The Magic Mask for Android
The Magic Mask for Android. Contribute to topjohnwu/Magisk development by creating an account on GitHub.github.com
Users should be aware that official @kdrag0n fix is busted ATM however.... Use this fork:Also current changes for safetynet Fix
![]()
kdrag0n - Overview
Generalist dev exploring new things. kdrag0n has 120 repositories available. Follow their code on GitHub.github.com
Who is this talking to
Who is spreading the lies?
su
TB=toybox
which $TB
ls -l $(which $TB)
$TB --version
# to learn more, read:
$TB --help
cd $(which $TB | sed "s,/$TB$,,")
pwd
ls -l cut
ls -l grep
ls -l ls
ls -l pwd
ls -l sed
ls -l wc
ls -l which
lrwxrwxrwx 1 root root 6 1971-07-07 12:40 cut -> toybox
lrwxrwxrwx 1 root root 6 1971-07-07 12:40 grep -> toybox
lrwxrwxrwx 1 root root 6 1971-07-07 12:40 ls -> toybox
lrwxrwxrwx 1 root root 6 1971-07-07 12:40 pwd -> toybox
lrwxrwxrwx 1 root root 6 1971-07-07 12:40 sed -> toybox
lrwxrwxrwx 1 root root 6 1971-07-07 12:40 wc -> toybox
lrwxrwxrwx 1 root root 6 1971-07-07 12:40 which -> toybox
toybox cut --help
# or shorter, just:
cut --help
ls -l | grep $TB | grep ^lr.x | wc -l
ls -l | grep $TB | grep ^lr.x | rev | cut -d ' ' -f 3 | rev
Continuing on the previous talk about /system/bin
That folder serves to provide pre-installed Linux binaries and utilities (many are needed by the system itself, like during the booting to System), and that includes also the toybox tool-box, ie, the toybox binary and its applets (Linux utilities linked to the toybox binary)
If I recall correctly, toybox comes already as part of AOSP, those utilities that are needed to run the AOSP build scripts (except for the compiler, linker, and so)
Hence the pre-installed toybox with its applets built to AOSP are self-sufficient to rebuild the AOSP (that was like the agenda behind)
Now, I'd like to ask those of you who are not afraid of Terminal emulator, to run the following commands to find about the toybox preinstalled to your ROMs
Commands must be executed in the given order, since I define some variable ($TB), switch to a particular directory, and use them all till the end
First we look if the toybox binary is preinstalled, where (full path), and for its version:
Code:su TB=toybox which $TB ls -l $(which $TB) $TB --version # to learn more, read: $TB --help
Expected output will be: /system/bin/toybox (maybe on some older ROMs /sbin/toybox ?!), v0.8.4-android or so (on my two phones)
Btw the latest toybox is v0.8.9 from Jan 2023, see the official ToyBox site https://landley.net/toybox
Now we extract the system folder/path where the toybox is installed, change to that directory and print the current path (pwd):
Code:cd $(which $TB | rev | cut -c 7- | rev) pwd
Observe that I used a trick: rev applet/utility to reverse the full path string (eg /system/bin/toybox to xobyot/nib/metsys/), then cut to cut all before the 7th character now counting from the beginning, (/nib/metsys/) and then rev to reverse it back (/system/bin/)
That way I didn't need heavy artillery like sed or even awk (awk is not part of toybox and it requires additional toolbox like busybox) to cut off from the end but from the path/string with an unknown/variable length
Now we look for the expected toybox utilities to be installed to the same directory (I'm looking for the utilities I'm just using: cut, grep, ls, pwd, wc, which; the others like cd and rev are provided by the shell itself, hence I don't need an additional tool-box like busybox and its applets)
Code:ls -l cut ls -l grep ls -l ls ls -l pwd ls -l wc ls -l which
They are expected to be linked to the toybox binary with chmod 755 or 744 (executable files), like:
Code:lrwxrwxrwx 1 root root 6 1971-07-07 12:40 cut -> toybox lrwxrwxrwx 1 root root 6 1971-07-07 12:40 grep -> toybox lrwxrwxrwx 1 root root 6 1971-07-07 12:40 ls -> toybox lrwxrwxrwx 1 root root 6 1971-07-07 12:40 pwd -> toybox lrwxrwxrwx 1 root root 6 1971-07-07 12:40 wc -> toybox lrwxrwxrwx 1 root root 6 1971-07-07 12:40 which -> toybox
Hence they can be called two ways, like:
Code:toybox cut --help # or shorter, just: cut --help
Now we list all files in this directory (line by line), grep (filter) for those having toybox in the line/string (either the toybox binary itself or applets linked to the toybox binary) and additionally filter from them those being the executable links (lrwx), and count the number of these filtered lines:
Code:ls -l | grep $TB | grep lrwx | wc -l
Expected result will be like 174 (latest toybox v0.8.9 can provide many more, 233 applets), meaning that we have the toybox binary with eg 174 its applets
To summarize, we will use again the trick with reversing the lines/strings and cutting out their third fields (applet names) but counting the field ordinals from the (reversed) beginning, since the cut utility cannot count and cut from the end
Eg, we have to extract the third field/word (applet name) counting from the end, eg: pwd, from the ls -l line/string ending with the known end part of the format like:
... pwd -> toybox
hence we execute:
Code:ls -l | grep $TB | grep lrwx | rev | cut -d ' ' -f 3 | rev
Expected list of the pre-installed toybox applets will include: [ (aka the test utility), test, utilities mentioned above, and more like cat, chmod, echo, find, ln, gunzip, gzip, kill, mkdir, mount, printf, rm, rmdir, even sed, sleep, sort, touch, tar and so on:
[
acpi
base64
basename
blockdev
cal
cat
chattr
chcon
chgrp
chmod
chown
chroot
chrt
cksum
clear
cmp
comm
cp
cpio
cut
date
dd
devmem
df
diff
dirname
dmesg
dos2unix
du
echo
egrep
env
expand
expr
fallocate
false
fgrep
file
find
flock
fmt
free
fsync
getconf
getenforce
grep
groups
gunzip
gzip
head
hostname
hwclock
i2cdetect
i2cdump
i2cget
i2cset
iconv
id
ifconfig
inotifyd
insmod
install
ionice
iorenice
kill
killall
ln
load_policy
log
logname
losetup
ls
lsattr
lsmod
lsof
lspci
lsusb
md5sum
microcom
mkdir
mkfifo
mknod
mkswap
mktemp
modinfo
more
mount
mountpoint
mv
nc
netcat
netstat
nice
nl
nohup
nproc
nsenter
od
paste
patch
pgrep
pidof
pkill
pmap
printenv
printf
ps
pwd
readelf
readlink
realpath
renice
restorecon
rm
rmdir
rmmod
rtcwake
runcon
sed
sendevent
seq
setenforce
setsid
sha1sum
sha224sum
sha256sum
sha384sum
sha512sum
sleep
sort
split
stat
strings
stty
swapoff
swapon
sync
sysctl
tac
tail
tar
taskset
tee
test
time
timeout
top
touch
tr
true
truncate
tty
ulimit
umount
uname
uniq
unix2dos
unlink
unshare
uptime
usleep
uudecode
uuencode
uuidgen
vmstat
watch
wc
which
whoami
xargs
xxd
yes
zcat
---
Finally, I would be interested to see from your ROMs - thanks in advance:
- do you have toybox pre-installed
- is it pre-installed to /system/bin or some other directory
- which version (couple of years ago old v0.8.4 or maybe newer)
- how many toybox executables are preinstalled in your ROM (174 or more or less)
cd $(which $TB | rev | cut -c 7- | rev)
TBP=$( which $TB )
echo ${TBP%/*}
cd ${TBP%/*}
ls -l | cut -c50- | cut -f1 -d " "
Where are you hoping to find these "lost" pictures?I have rooted note 10+ SM-N976B with Magisk in order to recover old pictures. I have root and Magisk is able to grand SU permissions.
Problem I have is that when using file recovery apps like Diskdigger it can't find a single file.
All memory partitions seem to have been renamed. Example /dev/apnfitdolj.magisk/mirror/data instead of just data which is what it should be.
Is there something I can do here as I lost a lot of memorable photos that I really want to recover.
I haven't installed a custom recovery as recovery was already in the magisk file that was flashed.
Would custom recovery resolve this?
If you don't set unlock pin then Android uses some default but random/unique key it creates and secretly stores on the first reboot after factory resetting (formatting Internal storage).It's a galaxy note 10+ with stock rom rooted with Magisk.
You mention encryption. I haven't set up a screen unlock since rooting.
Is it possible that if I set up a password to unlock the device that it'll decrypt these partitions enabling me to recover the photos?
Oh, maybe? The only one I re-installed was the Magisk built-in BusyBox since it said an update was available. The others were a simple enable.
Others have already addressed your question, but for me, the biggest benefit here is to have a safety valve in place where your inactive slot is bootable (without first having to flash the firmware) in case you get into a hairy situation where your active slot becomes unbootable for whatever reason. May be useful in some situations.So as well as making it easier to keep root with an ota we can have the same firmware on the device one rooted and one not? So if magisk hide/safetynet/etc aren't working we can boot to the non rooted firmware to use wallet/banking apps etc and then boot back to rooted. Or is it a bit more complicated than that? Never had a pixel device before
Thanks, I realize it is only needed for custom Kernel cases.Yeah, if I want to run a custom kernel (Pixel 7) then I need to wipe. Should have sideloaded (not booted up), then gone into bootloader and runfastboot flash vbmeta --disable-verity --disable-verification vbmeta.img
to that slot. Once booted after sideload/flashing the firmware it's too late as it's enabled after booting. Don't think it matters if you do it before or after flashing the patched image, just as long as you do it before you boot up. Oh well, lol...
Nothing to do with what we were testing, just custom kernel related. Seems to also help to avoid getting the redeio
corrupt message when things may not go as expected.
You are not supposed to "hide all apps", you are generally advised to hide as few apps as possible; hide an app only when necessary.Hello together
If I tick some apps in the denylist and leave magisk app, some apps untick it themself: Android Auto, Cell Broadcast Service, Google Services Framework, Networkmanager and Tethering. If you wondering why I hide this apps, I just hide all Apps from google. Are there any limitation of hide apps in the list?