Coder Social home page Coder Social logo

Comments (8)

simonhuwiler avatar simonhuwiler commented on September 26, 2024 1

Ah! The message went away after 1 second so I did not notice, that I can chose something :-)
Thanks for your help!

from rootavd.

simonhuwiler avatar simonhuwiler commented on September 26, 2024 1

I run it on API 31 with Canary and for my understanding it worked. See screenshot.
Thanks you very much for your work!
Bildschirmfoto 2021-11-03 um 13 12 14

from rootavd.

newbit1 avatar newbit1 commented on September 26, 2024

Thank you for using my script.
The issue is that you have chosen
[1] You choose Magisk Local Version '23.0'
You must choose 4 Magisk Alpha.

from rootavd.

newbit1 avatar newbit1 commented on September 26, 2024

I'Ve just seen, that there is new Canary Version.
[2] Canary d232cba0(23012)

I've tested this version with a 64Bit-Only System and it works.
So it should also work with ARM64 Images for the M1. Would be nice If you could try this as well!?

from rootavd.

simonhuwiler avatar simonhuwiler commented on September 26, 2024

I have to specify: With Canary 23012 API Version 31 is rooted correctly, but not Api Version 30.

from rootavd.

newbit1 avatar newbit1 commented on September 26, 2024

Oh really? This is hard to believe. Can you post the log of the script? But the Alpha Version is working on API 30?

from rootavd.

secfb avatar secfb commented on September 26, 2024

When I run it the same way, I get the following error. Even though I tried version 30 and 31, I get the same error. How can I solve this problem?
After downloading the apk version of Magisk from its site, should I install it in the APP folder?
https://magiskmanager.com/downloading-magisk-manager/

sudo bash rootAVD.sh /Users/cmd/Library/Android/sdk/system-images/android-30/google_apis/arm64-v8a/ramdisk.img 
[!] and we are NOT in an emulator shell
[*] Set Directorys
[-] Test if ADB SHELL is working
[-] In any AVD via ADB, you can execute code without root in /data/data/com.android.shell
[-] Magisk installer Zip exists already
[*] Cleaning up the ADB working space
[*] Creating the ADB working space
[*] Push Magisk.zip into /data/data/com.android.shell/Magisk
[-] ./Magisk.zip: 1 file pushed, 0 skipped. 225.3 MB/s (6874374 bytes in 0.029s)
[-] ramdisk.img Backup exists already
[*] Push ramdisk.img into /data/data/com.android.shell/Magisk
[-] /Users/cmd/Library/Android/sdk/system-images/android-30/google_apis/arm64-v8a/ramdisk.img: 1 file pushed, 0 skipped. 300.9 MB/s (1557267 bytes in 0.005s)
[*] Push rootAVD.sh into /data/data/com.android.shell/Magisk
[-] rootAVD.sh: 1 file pushed, 0 skipped. 220.1 MB/s (7826127 bytes in 0.034s)
[-] run the actually Boot/Ramdisk/Kernel Image Patch Script
[*] from Magisk by topjohnwu and modded by NewBit XDA
[!] We are in an emulator shell
[-] Api Level Arch Detect
[-] Device Platform is arm64 only
[-] Device SDK API: 30
[-] First API Level: 30
[-] Switch to the location of the script file
[*] Extracting busybox and Magisk.zip ...
[*] Extracting busybox from script ...
[!] Found a working busybox Binary:
[!] BusyBox v1.33.1-Magisk (2021-05-08 15:20:41 PDT) multi-call binary.
[-] Checking AVDs Internet connection...
[!] AVD is offline
[*] Re-Run rootAVD in Magisk Busybox STANDALONE (D)ASH
[!] We are in an emulator shell
[-] We are now in Magisk Busybox STANDALONE (D)ASH
[*] rootAVD with Magisk '23.0' Installer
[-] Get Flags
[*] System-as-root, keep dm/avb-verity
[-] Encrypted data, keep forceencrypt
[*] RECOVERYMODE=false
[-] KEEPVERITY=true
[*] KEEPFORCEENCRYPT=true
[*] No 64-Bit Binarys found, please consider Magisk Alpha
[-] copy all armeabi-v7a files from /data/data/com.android.shell/Magisk/lib/armeabi-v7a to /data/data/com.android.shell/Magisk
[*] Detecting ramdisk.img compression
[!] Ramdisk.img uses gzip compression
[-] taken from shakalaca's MagiskOnEmulator/process.sh
[*] executing ramdisk splitting / extraction / repacking
[-] API level greater then 30
[*] Check if we need to repack ramdisk before patching ..
[-] Multiple cpio archives detected
[*] Unpacking ramdisk ..
[-] Dumping from 0 to 1832688 ..
[-] Dumping from 1832704 to 4632124 ..
[*] Repacking ramdisk ..
[-] Deleting system ramdisk build.prop
[-] Test patch status and do restore
[-] Checking ramdisk status
[-] STATUS=2
[!] Boot image patched by unsupported programs
[!] Please restore back to stock boot image
[!] aborting the script

from rootavd.

simonhuwiler avatar simonhuwiler commented on September 26, 2024

@newbit1 regarding API 30: it was fake news. I removed everything and now on a clean machine it works fine.

from rootavd.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.