device_phh_treble/rw-system.sh

56 lines
2.0 KiB
Bash
Raw Normal View History

#!/system/bin/sh
set -e
2018-05-14 11:34:52 +00:00
fixSPL() {
img="$(find /dev/block -type l |grep by-name |grep /kernel$(getprop ro.boot.slot_suffix) |head -n 1)"
[ -z "$img" ] && img="$(find /dev/block -type l |grep by-name |grep /boot$(getprop ro.boot.slot_suffix) |head -n 1)"
if [ -n "$img" ];then
#Rewrite SPL/Android version if needed
Arelease="$(getSPL $img android)"
setprop ro.keymaster.xxx.release $Arelease
setprop ro.keymaster.xxx.security_patch "$(getSPL $img spl)"
#Only Android 8.0 needs this
if ! echo "$Arelease" |grep -qF 8.0;then
return 0
fi
for f in /vendor/lib64/hw/android.hardware.keymaster@3.0-impl-qti.so /system/lib64/vndk-26/libsoftkeymasterdevice.so;do
[ ! -f $f ] && continue
b="$(basename "$f")"
mkdir -p /dev/phh/
cp $f /dev/phh/$b
sed -i -e 's/ro.build.version.release/ro.keymaster.xxx.release/g' -e 's/ro.build.version.security_patch/ro.keymaster.xxx.security_patch/g' /dev/phh/$b
if echo $f |grep vendor;then
chcon u:object_r:vendor_file:s0 /dev/phh/$b
else
chcon u:object_r:system_file:s0 /dev/phh/$b
fi
chmod 0644 /dev/phh/$b
mount -o bind /dev/phh/$b $f
done
setprop ctl.restart keymaster-3-0
fi
}
if mount -o remount,rw /system;then
resize2fs $(grep ' /system ' /proc/mounts |cut -d ' ' -f 1)
elif mount -o remount,rw /;then
resize2fs /dev/root
fi
mount -o remount,ro /system
mount -o remount,ro /
2018-05-14 11:34:52 +00:00
fixSPL
2018-04-30 11:56:06 +00:00
if grep vendor.huawei.hardware.biometrics.fingerprint /vendor/manifest.xml;then
mount -o bind system/phh/huawei/fingerprint.kl /vendor/usr/keylayout/fingerprint.kl
fi
2018-05-14 11:34:52 +00:00
#Disable trustkernel keystore, because it doesn't work for the moment
#Found on MTK devices
mount -o bind /system/phh/empty /vendor/lib/hw/keystore.trustkernel.so || true
mount -o bind /system/phh/empty /vendor/lib64/hw/keystore.trustkernel.so || true