HOW TO ROOT LG G3 D852 Running 5.0.1 - G3 Q&A, Help & Troubleshooting

I can't find this anywhere. ! someone help me root my phone i hate it

BiggTeddy26 said:
I can't find this anywhere. ! someone help me root my phone i hate it
Click to expand...
Click to collapse
there is no rooting methode for lollipop(g3) downgrade to kitkat then flash an lollipop rom(not kdz) that is the only way

**** that.

BiggTeddy26 said:
**** that.
Click to expand...
Click to collapse
That's the only way dude, no-one can yet root Android L.

I already ota flashed 5.0.1 if I downgrade I'll brick it. ? Where can I find good android l ROM

To go back to KitKat : http://forum.xda-developers.com/showthread.php?t=2785089
Good Android rom for the 852 : http://forum.xda-developers.com/lg-g3/general/canada-lg-g3-d852-source-built-ported-t2955464

I have the 852. Got it on friday and did the ota upgrade to 5.0.1. Downgraded, rooted and installed CyanogenMod 12.
Your going to want LG Flashtool and the TOT file for your phone just in case anyways probably.
I used instructions, flashtool, and DLL from lgg3root and got the ROM from wolfgart on codefire. First download I found with decent speed.
Never give up!

I want a decent Stock Lolipop LG Rom.. I dont want stock cause i love LG Features. Also is Gravity Box and keepchat avilable yet for xposed 3.0

http://www.smartphoneclinics.com/easy-root-lg-g3-us990-d852-d858hk-kitkat-lollipop/
just found this online to root my d832 and its the only one that worked

Morngkilr said:
http://www.smartphoneclinics.com/easy-root-lg-g3-us990-d852-d858hk-kitkat-lollipop/
just found this online to root my d832 and its the only one that worked
Click to expand...
Click to collapse
Big thx my friend
tested with roottool/ioroot25r1/New_LG_Root_v0.1_by_dig/Newest root method V03/iRoot/KingRoot/KingoRoot all not work
tested with LGONECLICKROOT (LG Root Script v1.2) and miracle phone is 100% Rooted
LG G3 D852 5.0.1 FIDO CANADA Rooted
---------------------------------
LG Root - One click script
Written by avicohh
---------------------------------
Please make sure that USB debugging is enabled, and LG drivers are installed.
Starting adb server..
* server not running *
Waiting for device..
Device detected!
Pushing files..
2259 KB/s (1048328 bytes in 0.453s)
1834 KB/s (9393 bytes in 0.005s)
2353 KB/s (4017098 bytes in 1.667s)
Rebooting..
Looking for LG serial port..
Phone found at COM9!
Rebooting into Download mode..
Waiting for device..
Phone found at COM9!
Rooting phone..
If you don't see the SuperSu installer script runs within about a minute,
then the root failed.
Author : blog.lvu.kr
SPECIAL COMMAND : ENTER, LEAVE
#ui_print *****************
ui_print SuperSU installer
ui_print *****************
ui_print - Mounting /system, /data and rootfs
ui_print - Extracting files
Archive: /data/local/tmp/UPDATE-SuperSU-v2.46.zip
inflating: META-INF/MANIFEST.MF
inflating: META-INF/CERT.SF
inflating: META-INF/CERT.RSA
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
inflating: arm/chattr
inflating: arm/chattr.pie
inflating: arm/libsupol.so
inflating: arm/su
inflating: arm/supolicy
inflating: arm64/libsupol.so
inflating: arm64/su
inflating: arm64/supolicy
inflating: armv7/chattr.pie
inflating: armv7/libsupol.so
inflating: armv7/su
inflating: armv7/supolicy
inflating: common/99SuperSUDaemon
inflating: common/Superuser.apk
inflating: common/install-recovery.sh
inflating: mips/chattr.pie
inflating: mips/libsupol.so
inflating: mips/su
inflating: mips/supolicy
inflating: mips64/libsupol.so
inflating: mips64/su
inflating: mips64/supolicy
inflating: x64/libsupol.so
inflating: x64/su
inflating: x64/supolicy
inflating: x86/chattr
inflating: x86/chattr.pie
inflating: x86/libsupol.so
inflating: x86/su
inflating: x86/supolicy
ui_print - Disabling OTA survival
ui_print - Removing old files
ui_print - Placing files
ui_print - Post-installation script
ui_print - Unmounting /system and /data
ui_print - Done !
Please press Ctrl+C, and then type N and ENTER to reboot.
#^CTerminer le programme de commandes (O/N) ? N
Rebooting..
Done!
Press any key to exit..

allal123 said:
Big thx my friend
tested with roottool/ioroot25r1/New_LG_Root_v0.1_by_dig/Newest root method V03/iRoot/KingRoot/KingoRoot all not work
tested with LGONECLICKROOT (LG Root Script v1.2) and miracle phone is 100% Rooted
LG G3 D852 5.0.1 FIDO CANADA Rooted
---------------------------------
LG Root - One click script
Written by avicohh
---------------------------------
Please make sure that USB debugging is enabled, and LG drivers are installed.
Starting adb server..
* server not running *
Waiting for device..
Device detected!
Pushing files..
2259 KB/s (1048328 bytes in 0.453s)
1834 KB/s (9393 bytes in 0.005s)
2353 KB/s (4017098 bytes in 1.667s)
Rebooting..
Looking for LG serial port..
Phone found at COM9!
Rebooting into Download mode..
Waiting for device..
Phone found at COM9!
Rooting phone..
If you don't see the SuperSu installer script runs within about a minute,
then the root failed.
Author : blog.lvu.kr
SPECIAL COMMAND : ENTER, LEAVE
#ui_print *****************
ui_print SuperSU installer
ui_print *****************
ui_print - Mounting /system, /data and rootfs
ui_print - Extracting files
Archive: /data/local/tmp/UPDATE-SuperSU-v2.46.zip
inflating: META-INF/MANIFEST.MF
inflating: META-INF/CERT.SF
inflating: META-INF/CERT.RSA
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
inflating: arm/chattr
inflating: arm/chattr.pie
inflating: arm/libsupol.so
inflating: arm/su
inflating: arm/supolicy
inflating: arm64/libsupol.so
inflating: arm64/su
inflating: arm64/supolicy
inflating: armv7/chattr.pie
inflating: armv7/libsupol.so
inflating: armv7/su
inflating: armv7/supolicy
inflating: common/99SuperSUDaemon
inflating: common/Superuser.apk
inflating: common/install-recovery.sh
inflating: mips/chattr.pie
inflating: mips/libsupol.so
inflating: mips/su
inflating: mips/supolicy
inflating: mips64/libsupol.so
inflating: mips64/su
inflating: mips64/supolicy
inflating: x64/libsupol.so
inflating: x64/su
inflating: x64/supolicy
inflating: x86/chattr
inflating: x86/chattr.pie
inflating: x86/libsupol.so
inflating: x86/su
inflating: x86/supolicy
ui_print - Disabling OTA survival
ui_print - Removing old files
ui_print - Placing files
ui_print - Post-installation script
ui_print - Unmounting /system and /data
ui_print - Done !
Please press Ctrl+C, and then type N and ENTER to reboot.
#^CTerminer le programme de commandes (O/N) ? N
Rebooting..
Done!
Press any key to exit..
Click to expand...
Click to collapse
You are very welcome mt friend. Our canadian phones are always harder and more complex to root it seems. We must stand strong together.

since you are rooted, dont forget to install twrp if you want to install custom rom

anyone with tot file for lollipop for lg g3 D852. Please share the link. I only have tot file for kitkat, but before i brick my phone i was on lollipop. can someone share it plz.

Related

help

using prebuilt boot.img from IMAGES...
boot size (19613696) is 58.45% of limit (33554432)
warning radio-update: no radio image in input target_files; not flashing radio
running: openssl pkcs8 -in build/target/product/security/testkey.pk8 -inform DER -nocrypt
running: java -Xmx2048m -jar /home/pranav18062001/roms/pac/out/host/linux-x86/framework/signapk.jar -w build/target/product/security/testkey.x509.pem build/target/product/security/testkey.pk8 /tmp
/tmpI0uIDc /home/pranav18062001/roms/pac/out/target/product/lettuce/pac_lettuce-ota-1cdea6516f.zip
done.
ln: failed to access ‘/home/pranav18062001/roms/pac/out/target/product/lettuce/pac_lettuce-ota-1cdea6516f.zip’: No such file or directory
build/core/Makefile:1759: recipe for target 'bacon' failed
make: *** [bacon] Error 1
#### make failed to build some targets (01:38:40 (hh:mm:ss)) ####
jasonhosu said:
using prebuilt boot.img from IMAGES...
boot size (19613696) is 58.45% of limit (33554432)
warning radio-update: no radio image in input target_files; not flashing radio
running: openssl pkcs8 -in build/target/product/security/testkey.pk8 -inform DER -nocrypt
running: java -Xmx2048m -jar /home/pranav18062001/roms/pac/out/host/linux-x86/framework/signapk.jar -w build/target/product/security/testkey.x509.pem build/target/product/security/testkey.pk8 /tmp
/tmpI0uIDc /home/pranav18062001/roms/pac/out/target/product/lettuce/pac_lettuce-ota-1cdea6516f.zip
done.
ln: failed to access ‘/home/pranav18062001/roms/pac/out/target/product/lettuce/pac_lettuce-ota-1cdea6516f.zip’: No such file or directory
build/core/Makefile:1759: recipe for target 'bacon' failed
make: *** [bacon] Error 1
#### make failed to build some targets (01:38:40 (hh:mm:ss)) ####
Click to expand...
Click to collapse
tried a lot still same
no dev to help
jasonhosu said:
using prebuilt boot.img from IMAGES...
boot size (19613696) is 58.45% of limit (33554432)
warning radio-update: no radio image in input target_files; not flashing radio
running: openssl pkcs8 -in build/target/product/security/testkey.pk8 -inform DER -nocrypt
running: java -Xmx2048m -jar /home/pranav18062001/roms/pac/out/host/linux-x86/framework/signapk.jar -w build/target/product/security/testkey.x509.pem build/target/product/security/testkey.pk8 /tmp
/tmpI0uIDc /home/pranav18062001/roms/pac/out/target/product/lettuce/pac_lettuce-ota-1cdea6516f.zip
done.
ln: failed to access ‘/home/pranav18062001/roms/pac/out/target/product/lettuce/pac_lettuce-ota-1cdea6516f.zip’: No such file or directory
build/core/Makefile:1759: recipe for target 'bacon' failed
make: *** [bacon] Error 1
#### make failed to build some targets (01:38:40 (hh:mm:ss)) ####
Click to expand...
Click to collapse
no dev to help me?
repo sync will help ?
jasonhosu said:
repo sync will help ?
Click to expand...
Click to collapse
Did you try make clean && make clobber?

Kali Nethunter for GT-I9500

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
This thread is for testing the rom for development of Kali Linux NetHunter to be ported to GT-I9500.
Anybody that interested in this project, please let me know and we can have discussion here or inside Telegram group as link given below.
TELEGRAM Group NetHunter GT-I9500 Development​
ANYONE WOULD LIKE TO USE ANY FILE FROM THIS THREAD, KINDLY GET OUR PERMISSION 1ST
Install Instruction:
Have a AOSP rom and reboot into CWM/TWRP
Flash the zip file
DONE you have Kali Nethunter
Details Instruction : HERE
Kali NetHunter Application
* Home Screen - General information panel, network interfaces and HID device status.
* Kali Chroot Manager - For managing chroot metapackage installations.
* Check App Update - For checking Kali NetHunter Android App updates.
* Kali Services - Start / stop various chrooted services. Enable or disable them at boot time.
* Custom Commands - Add your own custom commands and functions to the launcher.
* MAC Changer - Change your Wi-Fi MAC address (only on certain devices)
* VNC Manager - Set up an instant VNC session with your Kali chroot.
* HID Attacks - Various HID attacks, Teensy style.
* DuckHunter HID - Rubber Ducky style HID attacks
* BadUSB MITM Attack - Nuff said.
* MANA Wireless Toolkit - Setup a malicious Access Point at the click of a button.
* MITM Framework - Inject binary backdoors into downloaded executables on the fly.
* NMap Scan - Quick Nmap scanner interface.
* Metasploit Payload Generator - Generating Metasploit payloads on the fly.
* Searchsploit - Easy searching for exploits in the Exploit-DB.
Join Telegram : TELEGRAM
* Your device warranty is now void.
* We're not responsible for bricked devices, dead SD cards,
* thermonuclear war, or you getting fired because the alarm app failed.
* Please do some research if you have any concerns about features included in this ROM.
* YOU are choosing to make these modifications not us.
* If you point the finger at us for messing up your device, we will laugh at you.
XDA:DevDB Information
NetHunter, ROM for the Samsung Galaxy S4
Contributors
antuketot76, madScript
Source Code: https://github.com/offensive-security/kali-nethunter/wiki/Porting-Nethunter
ROM OS Version: 6.0.x Marshmallow
ROM Kernel: Linux 3.4.x
Based On: CyanogenMod or AOSP
Version Information
Status: Stable
Created 2017-07-27
Last Updated 2017-12-04
Todays Thread Update:
Thanks to @Parinz that willing contribute to develop this rom and ported to GT-I9500, a big thanks to him for supporting in this project. Now, we are waiting confirmation from @jwchen17 that promise to giving me a confirmation by this weekend about kernel development for this project.
Latest Update
After a many hours, spending a time with @madScript in front of pc, we came out with a rom that can be tested out by all of you guys.
Kali NetHunter ported to RR 6.0.1 rom (tested rom). ONLY FOR GT-I95OO
RR ROM : https://www.androidfilehost.com/?fid=529141701856462272
NetHunter : https://www.androidfilehost.com/?fid=817906626617945433
TWRP : https://basketbuild.com/devs/Alberto96/TWRP/3.1.1-0/ja3gxx
How to install :
1- Reboot into TWRP, wipe dalvik/art cache, system, data, internal storage and cache.
2- After wiping, choose to reboot into recovery.
3- Then flash a rom as link given above.
4- Not suggest to flash Gapps due to space and stability. Still want Gapps (prefer pico).
5- Then reboot into system and setup all including wifi/data connection.
6- Then reboot back into recovery and you flash the Nethunter zip file as given above.
7- Reboot into system and done the installation.
This rom can be tested by all of you guys and I would like to remind that we are not responsible to any error or faulty of your device after installing this rom. Happy flashing
Up and running
I'll give feedback tomorrow (GT-I9500)
davypacheco said:
Up and running
I'll give feedback tomorrow (GT-I9500)
Click to expand...
Click to collapse
Did u facing your battery dropping so fast after the installation and during the charging your battery are slowly charging?
Other alternative when u not using it is to turn off all Kali Services and turn off the option for "Start At Boot" to save your battery dropping so fast.
Give us a feedback after installing the trial rom for us to improved the stability of NetHunter. We need more tester for more report on unstability this trial project.
:good::good::good:
antuketot76 said:
Did u facing your battery dropping so fast after the installation and during the charging your battery are slowly charging?
Other alternative when u not using it is to turn off all Kali Services and turn off the option for "Start At Boot" to save your battery dropping so fast.
Give us a feedback after installing the trial rom for us to improved the stability of NetHunter. We need more tester for more report on unstability this trial project.
:good::good::good:
Click to expand...
Click to collapse
I am facing a lot of battery drain ( 30% in 6 hours ) phone gets hot even when i am Just writing
Performance and staboiility is great
davypacheco said:
I am facing a lot of battery drain ( 30% in 6 hours ) phone gets hot even when i am Just writing
Performance and staboiility is great
Click to expand...
Click to collapse
Did u install full package chroot for linux?
Full package size will be around 760mb.
Please ensure u have empty space either sdcard or internal memory, u may choose one location.
Do test all functionality in nethunter.
Thanks...
Sent from my Galaxy S8+ using XDA Labs
Thank you
antuketot76 said:
Todays Thread Update:
Thanks to @Parinz that willing contribute to develop this rom and ported to GT-I9500, a big thanks to him for supporting in this project. Now, we are waiting confirmation from @jwchen17 that promise to giving me a confirmation by this weekend about kernel development for this project.
Click to expand...
Click to collapse
Say a big thanks to antuketot for porting this rom ,I will continue to develop this rom for improved battery and performance
Parinz said:
Say a big thanks to antuketot for porting this rom ,I will continue to develop this rom for improved battery and performance
Click to expand...
Click to collapse
Welcome bro, my target for this development was try to get most stable nethunter porting this into marshmallow.
For nougat are still under planning due to we still need a support from contributor, especially on kernel that need compatible with nougat version.
Hoping the development process running well on this trial project.
Sent from my Galaxy S8+ using XDA Labs
Listen
antuketot76 said:
This thread is for testing the rom for development of Kali Linux NetHunter to be ported to GT-I9500.
Anybody that interested in this project, please let me know and we can have discussion here or inside Telegram group as link given below.
Download the Nethunter Here​
ANYONE WOULD LIKE TO USE ANY FILE FROM THIS THREAD, KINDLY GET OUR PERMISSION 1ST
Install Instruction:
Have a AOSP rom and reboot into CWM/TWRP
Flash the zip file
DONE you have Kali Nethunter
Kali NetHunter Application
* Home Screen - General information panel, network interfaces and HID device status.
* Kali Chroot Manager - For managing chroot metapackage installations.
* Check App Update - For checking Kali NetHunter Android App updates.
* Kali Services - Start / stop various chrooted services. Enable or disable them at boot time.
* Custom Commands - Add your own custom commands and functions to the launcher.
* MAC Changer - Change your Wi-Fi MAC address (only on certain devices)
* VNC Manager - Set up an instant VNC session with your Kali chroot.
* HID Attacks - Various HID attacks, Teensy style.
* DuckHunter HID - Rubber Ducky style HID attacks
* BadUSB MITM Attack - Nuff said.
* MANA Wireless Toolkit - Setup a malicious Access Point at the click of a button.
* MITM Framework - Inject binary backdoors into downloaded executables on the fly.
* NMap Scan - Quick Nmap scanner interface.
* Metasploit Payload Generator - Generating Metasploit payloads on the fly.
* Searchsploit - Easy searching for exploits in the Exploit-DB.
Join Telegram : https://t.me/joinchat/GZFUgw4RKVswzWiuqWhxyQ
* Your device warranty is now void.
* We're not responsible for bricked devices, dead SD cards,
* thermonuclear war, or you getting fired because the alarm app failed.
* Please do some research if you have any concerns about features included in this ROM.
* YOU are choosing to make these modifications not us.
* If you point the finger at us for messing up your device, we will laugh at you.
XDA:DevDB Information
NetHunter, ROM for the Samsung Galaxy S4
Contributors
antuketot76, madScript, Parinz
Source Code: https://github.com/offensive-security/kali-nethunter/wiki/Porting-Nethunter
ROM OS Version: 6.0.x Marshmallow
ROM Kernel: Linux 3.4.x
Based On: CyanogenMod or AOSP
Version Information
Status: Testing
Created 2017-07-27
Last Updated 2017-07-30
Click to expand...
Click to collapse
Listen Guys ANTKETOT said I am continuing this but actually I am building a new one for nouagat which should come out pretty soon
Parinz said:
Listen Guys ANTKETOT said I am continuing this but actually I am building a new one for nouagat which should come out pretty soon
Click to expand...
Click to collapse
Keep up develop for nougat version.
:good::good::good:
Sent from my Galaxy S8+ using XDA Labs
Deleted
NetHunter For Nougat
Kindly be informed that we are now in process build the NetHunter for nougat platform. In this thread we are using marshmallow version.
Any queries regarding this development or suggestion or would like to join the development, kindly join our Telegram as below.
https://t.me/joinchat/GZFUg0N-_00th3jOAByBnQ
Cya there
Installation failed with ERROR: 1
Thanks for porting nethunter to i9500.
Today I tried to install it to my S4. I followed to steps in the thread but flashing update-nethunter-jfltexx-marshmallow-20170727_174703.zip failed with ERROR: 1.
/tmp/updater[129]: .: env.sh: No such file or directory
Updater process ended with ERROR: 1
I:Legacy property environment disabled.
I:Install took 4 second(s).
Error installing zip file '/external_sd/update-nethunter-jfltexx-marshmallow-20170727_174703.zip'
I also noticed that as per nethunter devices.cfg jfltexx is the devicename of i9505 not I9500. Devicename of my S4 (i500) is ja3gxx
####recovery.log####
Installing zip file '/external_sd/update-nethunter-jfltexx-marshmallow-20170727_174703.zip'
Checking for MD5 file...
Skipping MD5 check: no MD5 file found
I:Update binary zip
I:Zip does not contain SELinux file_contexts file in its root.
I:Legacy property environment initialized.
##################################################
## ##
## 88 a8P db 88 88 ##
## 88 .88' d88b 88 88 ##
## 88 88' d8''8b 88 88 ##
## 88 d88 d8' '8b 88 88 ##
## 8888'88. d8YaaaaY8b 88 88 ##
## 88P Y8b d8''''''''8b 88 88 ##
## 88 '88. d8' '8b 88 88 ##
## 88 Y8b d8' '8b 888888888 88 ##
## ##
#### ############# NetHunter ####################
Unpacking the installer...
Archive: /external_sd/update-nethunter-jfltexx-marshmallow-20170727_174703.zip
inflating: /tmp/nethunter/META-INF/com/google/android/update-binary
inflating: /tmp/nethunter/META-INF/com/google/android/updater-script
inflating: /tmp/nethunter/boot-patcher/META-INF/com/google/android/update-binary
inflating: /tmp/nethunter/boot-patcher/META-INF/com/google/android/updater-script
inflating: /tmp/nethunter/boot-patcher/boot-patcher.sh
inflating: /tmp/nethunter/boot-patcher/env.sh
inflating: /tmp/nethunter/boot-patcher/patch.d-env
inflating: /tmp/nethunter/boot-patcher/patch.d/01-ramdisk-patch
inflating: /tmp/nethunter/boot-patcher/patch.d/02-no-verity-opt-encrypt
inflating: /tmp/nethunter/boot-patcher/patch.d/03-kernel-modules
inflating: /tmp/nethunter/boot-patcher/patch.d/05-f2fs-fstab
inflating: /tmp/nethunter/boot-patcher/ramdisk-patch/init.nethunter.rc
inflating: /tmp/nethunter/boot-patcher/ramdisk-patch/sbin/usb_config.sh
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/ar9170-1.fw
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/ar9170-2.fw
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/carl9170-1.fw
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/htc_7010.fw
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/htc_9271.fw
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/rt2561.bin
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/rt2860.bin
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/rt2870.bin
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/rt3070.bin
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/rt73.bin
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/rtlwifi/rtl8188efw.bin
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/rtlwifi/rtl8192cufw.bin
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211_ub
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211_uph
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211_uphm
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211_uphr
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211_ur
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211b_ub
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211b_uph
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211b_uphm
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211b_uphr
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211b_ur
inflating: /tmp/nethunter/boot-patcher/system/xbin/hid-keyboard
inflating: /tmp/nethunter/boot-patcher/tools/bbe
inflating: /tmp/nethunter/boot-patcher/tools/bootimg
inflating: /tmp/nethunter/boot-patcher/tools/busybox
inflating: /tmp/nethunter/boot-patcher/tools/bzip2
inflating: /tmp/nethunter/boot-patcher/tools/chromeos/futility
inflating: /tmp/nethunter/boot-patcher/tools/chromeos/kernel.keyblock
inflating: /tmp/nethunter/boot-patcher/tools/chromeos/kernel_data_key.vbprivk
inflating: /tmp/nethunter/boot-patcher/tools/freespace.sh
inflating: /tmp/nethunter/boot-patcher/tools/installbusybox.sh
inflating: /tmp/nethunter/boot-patcher/tools/lz4
inflating: /tmp/nethunter/boot-patcher/tools/sepolicy-inject
inflating: /tmp/nethunter/boot-patcher/tools/sepolicy-inject-N
inflating: /tmp/nethunter/boot-patcher/zImage
inflating: /tmp/nethunter/data/app/Drivedroid.apk
inflating: /tmp/nethunter/data/app/Hackerskeyboard.apk
inflating: /tmp/nethunter/data/app/OpenVPN.apk
inflating: /tmp/nethunter/data/app/RFAnalyzer.apk
inflating: /tmp/nethunter/data/app/RouterKeygen.apk
inflating: /tmp/nethunter/data/app/Shodan.apk
inflating: /tmp/nethunter/data/app/Term-nh.apk
inflating: /tmp/nethunter/data/app/USBKeyboard.apk
inflating: /tmp/nethunter/data/app/VNC-nh.apk
inflating: /tmp/nethunter/data/app/cSploit.apk
inflating: /tmp/nethunter/data/app/nethunter.apk
inflating: /tmp/nethunter/env.sh
inflating: /tmp/nethunter/supersu.zip
inflating: /tmp/nethunter/system/bin/lualibs/commands.lua
inflating: /tmp/nethunter/system/bin/lualibs/default_toys.lua
inflating: /tmp/nethunter/system/bin/lualibs/getopt.lua
inflating: /tmp/nethunter/system/bin/lualibs/hf_reader.lua
inflating: /tmp/nethunter/system/bin/lualibs/html_dumplib.lua
inflating: /tmp/nethunter/system/bin/lualibs/htmlskel.lua
inflating: /tmp/nethunter/system/bin/lualibs/mf_default_keys.lua
inflating: /tmp/nethunter/system/bin/lualibs/read14a.lua
inflating: /tmp/nethunter/system/bin/lualibs/taglib.lua
inflating: /tmp/nethunter/system/bin/lualibs/utils.lua
inflating: /tmp/nethunter/system/bin/scripts/14araw.lua
inflating: /tmp/nethunter/system/bin/scripts/cmdline.lua
inflating: /tmp/nethunter/system/bin/scripts/dumptoemul.lua
inflating: /tmp/nethunter/system/bin/scripts/emul2dump.lua
inflating: /tmp/nethunter/system/bin/scripts/emul2html.lua
inflating: /tmp/nethunter/system/bin/scripts/formatMifare.lua
inflating: /tmp/nethunter/system/bin/scripts/hf_read.lua
inflating: /tmp/nethunter/system/bin/scripts/htmldump.lua
inflating: /tmp/nethunter/system/bin/scripts/mfkeys.lua
inflating: /tmp/nethunter/system/bin/scripts/mifare_autopwn.lua
inflating: /tmp/nethunter/system/bin/scripts/ndef_dump.lua
inflating: /tmp/nethunter/system/bin/scripts/parameters.lua
inflating: /tmp/nethunter/system/bin/scripts/remagic.lua
inflating: /tmp/nethunter/system/bin/scripts/test.lua
inflating: /tmp/nethunter/system/bin/scripts/test_t55x7_ask.lua
inflating: /tmp/nethunter/system/bin/scripts/test_t55x7_bi.lua
inflating: /tmp/nethunter/system/bin/scripts/test_t55x7_fsk.lua
inflating: /tmp/nethunter/system/bin/scripts/test_t55x7_psk.lua
inflating: /tmp/nethunter/system/bin/scripts/tnp3dump.lua
inflating: /tmp/nethunter/system/bin/scripts/tnp3sim.lua
inflating: /tmp/nethunter/system/bin/scripts/tracetest.lua
inflating: /tmp/nethunter/system/bin/scripts/writeraw.lua
inflating: /tmp/nethunter/system/etc/init.d/90userinit
inflating: /tmp/nethunter/system/etc/nano/asm.nanorc
inflating: /tmp/nethunter/system/etc/nano/awk.nanorc
inflating: /tmp/nethunter/system/etc/nano/c.nanorc
inflating: /tmp/nethunter/system/etc/nano/cmake.nanorc
inflating: /tmp/nethunter/system/etc/nano/css.nanorc
inflating: /tmp/nethunter/system/etc/nano/fortran.nanorc
inflating: /tmp/nethunter/system/etc/nano/groff.nanorc
inflating: /tmp/nethunter/system/etc/nano/html.nanorc
inflating: /tmp/nethunter/system/etc/nano/java.nanorc
inflating: /tmp/nethunter/system/etc/nano/makefile.nanorc
inflating: /tmp/nethunter/system/etc/nano/nanorc
inflating: /tmp/nethunter/system/etc/nano/nanorc.nanorc
inflating: /tmp/nethunter/system/etc/nano/objc.nanorc
inflating: /tmp/nethunter/system/etc/nano/ocaml.nanorc
inflating: /tmp/nethunter/system/etc/nano/patch.nanorc
inflating: /tmp/nethunter/system/etc/nano/perl.nanorc
inflating: /tmp/nethunter/system/etc/nano/php.nanorc
inflating: /tmp/nethunter/system/etc/nano/python.nanorc
inflating: /tmp/nethunter/system/etc/nano/ruby.nanorc
inflating: /tmp/nethunter/system/etc/nano/sh.nanorc
inflating: /tmp/nethunter/system/etc/nano/tcl.nanorc
inflating: /tmp/nethunter/system/etc/nano/tex.nanorc
inflating: /tmp/nethunter/system/etc/nano/xml.nanorc
inflating: /tmp/nethunter/system/etc/terminfo/E/Eterm
inflating: /tmp/nethunter/system/etc/terminfo/E/Eterm-color
inflating: /tmp/nethunter/system/etc/terminfo/a/ansi
inflating: /tmp/nethunter/system/etc/terminfo/c/cons25
inflating: /tmp/nethunter/system/etc/terminfo/c/cygwin
inflating: /tmp/nethunter/system/etc/terminfo/d/dumb
inflating: /tmp/nethunter/system/etc/terminfo/h/hurd
inflating: /tmp/nethunter/system/etc/terminfo/l/linux
inflating: /tmp/nethunter/system/etc/terminfo/m/mach
inflating: /tmp/nethunter/system/etc/terminfo/m/mach-bold
inflating: /tmp/nethunter/system/etc/terminfo/m/mach-color
inflating: /tmp/nethunter/system/etc/terminfo/p/pcansi
inflating: /tmp/nethunter/system/etc/terminfo/r/rxvt
inflating: /tmp/nethunter/system/etc/terminfo/r/rxvt-basic
inflating: /tmp/nethunter/system/etc/terminfo/s/screen
inflating: /tmp/nethunter/system/etc/terminfo/s/screen-256color
inflating: /tmp/nethunter/system/etc/terminfo/s/screen-256color-bce
inflating: /tmp/nethunter/system/etc/terminfo/s/screen-bce
inflating: /tmp/nethunter/system/etc/terminfo/s/screen-s
inflating: /tmp/nethunter/system/etc/terminfo/s/screen-w
inflating: /tmp/nethunter/system/etc/terminfo/s/sun
inflating: /tmp/nethunter/system/etc/terminfo/v/vt100
inflating: /tmp/nethunter/system/etc/terminfo/v/vt102
inflating: /tmp/nethunter/system/etc/terminfo/v/vt220
inflating: /tmp/nethunter/system/etc/terminfo/v/vt52
inflating: /tmp/nethunter/system/etc/terminfo/w/wsvt25
inflating: /tmp/nethunter/system/etc/terminfo/w/wsvt25m
inflating: /tmp/nethunter/system/etc/terminfo/x/xterm
inflating: /tmp/nethunter/system/etc/terminfo/x/xterm-256color
inflating: /tmp/nethunter/system/etc/terminfo/x/xterm-color
inflating: /tmp/nethunter/system/etc/terminfo/x/xterm-r5
inflating: /tmp/nethunter/system/etc/terminfo/x/xterm-r6
inflating: /tmp/nethunter/system/etc/terminfo/x/xterm-vt220
inflating: /tmp/nethunter/system/etc/terminfo/x/xterm-xfree86
inflating: /tmp/nethunter/system/media/bootanimation.zip
inflating: /tmp/nethunter/tools/busybox
inflating: /tmp/nethunter/tools/freespace.sh
inflating: /tmp/nethunter/tools/installbusybox.sh
inflating: /tmp/nethunter/tools/installchroot.sh
inflating: /tmp/nethunter/tools/installsu.sh
inflating: /tmp/nethunter/tools/previnstall.sh
inflating: /tmp/nethunter/tools/screenres
inflating: /tmp/nethunter/wallpaper/1080x1920.png
inflating: /tmp/nethunter/wallpaper/1280x1280.png
inflating: /tmp/nethunter/wallpaper/1280x800.png
inflating: /tmp/nethunter/wallpaper/1440x2560.png
inflating: /tmp/nethunter/wallpaper/1536x2048.png
inflating: /tmp/nethunter/wallpaper/1920x1920.png
inflating: /tmp/nethunter/wallpaper/2048x1536.png
inflating: /tmp/nethunter/wallpaper/2560x1440.png
inflating: /tmp/nethunter/wallpaper/2560x1600.png
inflating: /tmp/nethunter/wallpaper/2560x2560.png
inflating: /tmp/nethunter/wallpaper/720x1280.png
inflating: /tmp/nethunter/wallpaper/768x1280.png
inflating: /tmp/nethunter/wallpaper/setwallpaper.sh
caution: excluded filename not matched: kalifs-*
/tmp/updater[129]: .: env.sh: No such file or directory
Updater process ended with ERROR: 1
I:Legacy property environment disabled.
I:Install took 4 second(s).
Error installing zip file '/external_sd/update-nethunter-jfltexx-marshmallow-20170727_174703.zip'
ashadul.hoque said:
Thanks for porting nethunter to i9500.
Today I tried to install it to my S4. I followed to steps in the thread but flashing update-nethunter-jfltexx-marshmallow-20170727_174703.zip failed with ERROR: 1.
/tmp/updater[129]: .: env.sh: No such file or directory
Updater process ended with ERROR: 1
I:Legacy property environment disabled.
I:Install took 4 second(s).
Error installing zip file '/external_sd/update-nethunter-jfltexx-marshmallow-20170727_174703.zip'
I also noticed that as per nethunter devices.cfg jfltexx is the devicename of i9505 not I9500. Devicename of my S4 (i500) is ja3gxx
####recovery.log####
Installing zip file '/external_sd/update-nethunter-jfltexx-marshmallow-20170727_174703.zip'
Checking for MD5 file...
Skipping MD5 check: no MD5 file found
I:Update binary zip
I:Zip does not contain SELinux file_contexts file in its root.
I:Legacy property environment initialized.
##################################################
## ##
## 88 a8P db 88 88 ##
## 88 .88' d88b 88 88 ##
## 88 88' d8''8b 88 88 ##
## 88 d88 d8' '8b 88 88 ##
## 8888'88. d8YaaaaY8b 88 88 ##
## 88P Y8b d8''''''''8b 88 88 ##
## 88 '88. d8' '8b 88 88 ##
## 88 Y8b d8' '8b 888888888 88 ##
## ##
#### ############# NetHunter ####################
Unpacking the installer...
Archive: /external_sd/update-nethunter-jfltexx-marshmallow-20170727_174703.zip
inflating: /tmp/nethunter/META-INF/com/google/android/update-binary
inflating: /tmp/nethunter/META-INF/com/google/android/updater-script
inflating: /tmp/nethunter/boot-patcher/META-INF/com/google/android/update-binary
inflating: /tmp/nethunter/boot-patcher/META-INF/com/google/android/updater-script
inflating: /tmp/nethunter/boot-patcher/boot-patcher.sh
inflating: /tmp/nethunter/boot-patcher/env.sh
inflating: /tmp/nethunter/boot-patcher/patch.d-env
inflating: /tmp/nethunter/boot-patcher/patch.d/01-ramdisk-patch
inflating: /tmp/nethunter/boot-patcher/patch.d/02-no-verity-opt-encrypt
inflating: /tmp/nethunter/boot-patcher/patch.d/03-kernel-modules
inflating: /tmp/nethunter/boot-patcher/patch.d/05-f2fs-fstab
inflating: /tmp/nethunter/boot-patcher/ramdisk-patch/init.nethunter.rc
inflating: /tmp/nethunter/boot-patcher/ramdisk-patch/sbin/usb_config.sh
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/ar9170-1.fw
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/ar9170-2.fw
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/carl9170-1.fw
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/htc_7010.fw
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/htc_9271.fw
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/rt2561.bin
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/rt2860.bin
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/rt2870.bin
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/rt3070.bin
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/rt73.bin
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/rtlwifi/rtl8188efw.bin
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/rtlwifi/rtl8192cufw.bin
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211_ub
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211_uph
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211_uphm
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211_uphr
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211_ur
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211b_ub
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211b_uph
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211b_uphm
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211b_uphr
inflating: /tmp/nethunter/boot-patcher/system/etc/firmware/zd1211/zd1211b_ur
inflating: /tmp/nethunter/boot-patcher/system/xbin/hid-keyboard
inflating: /tmp/nethunter/boot-patcher/tools/bbe
inflating: /tmp/nethunter/boot-patcher/tools/bootimg
inflating: /tmp/nethunter/boot-patcher/tools/busybox
inflating: /tmp/nethunter/boot-patcher/tools/bzip2
inflating: /tmp/nethunter/boot-patcher/tools/chromeos/futility
inflating: /tmp/nethunter/boot-patcher/tools/chromeos/kernel.keyblock
inflating: /tmp/nethunter/boot-patcher/tools/chromeos/kernel_data_key.vbprivk
inflating: /tmp/nethunter/boot-patcher/tools/freespace.sh
inflating: /tmp/nethunter/boot-patcher/tools/installbusybox.sh
inflating: /tmp/nethunter/boot-patcher/tools/lz4
inflating: /tmp/nethunter/boot-patcher/tools/sepolicy-inject
inflating: /tmp/nethunter/boot-patcher/tools/sepolicy-inject-N
inflating: /tmp/nethunter/boot-patcher/zImage
inflating: /tmp/nethunter/data/app/Drivedroid.apk
inflating: /tmp/nethunter/data/app/Hackerskeyboard.apk
inflating: /tmp/nethunter/data/app/OpenVPN.apk
inflating: /tmp/nethunter/data/app/RFAnalyzer.apk
inflating: /tmp/nethunter/data/app/RouterKeygen.apk
inflating: /tmp/nethunter/data/app/Shodan.apk
inflating: /tmp/nethunter/data/app/Term-nh.apk
inflating: /tmp/nethunter/data/app/USBKeyboard.apk
inflating: /tmp/nethunter/data/app/VNC-nh.apk
inflating: /tmp/nethunter/data/app/cSploit.apk
inflating: /tmp/nethunter/data/app/nethunter.apk
inflating: /tmp/nethunter/env.sh
inflating: /tmp/nethunter/supersu.zip
inflating: /tmp/nethunter/system/bin/lualibs/commands.lua
inflating: /tmp/nethunter/system/bin/lualibs/default_toys.lua
inflating: /tmp/nethunter/system/bin/lualibs/getopt.lua
inflating: /tmp/nethunter/system/bin/lualibs/hf_reader.lua
inflating: /tmp/nethunter/system/bin/lualibs/html_dumplib.lua
inflating: /tmp/nethunter/system/bin/lualibs/htmlskel.lua
inflating: /tmp/nethunter/system/bin/lualibs/mf_default_keys.lua
inflating: /tmp/nethunter/system/bin/lualibs/read14a.lua
inflating: /tmp/nethunter/system/bin/lualibs/taglib.lua
inflating: /tmp/nethunter/system/bin/lualibs/utils.lua
inflating: /tmp/nethunter/system/bin/scripts/14araw.lua
inflating: /tmp/nethunter/system/bin/scripts/cmdline.lua
inflating: /tmp/nethunter/system/bin/scripts/dumptoemul.lua
inflating: /tmp/nethunter/system/bin/scripts/emul2dump.lua
inflating: /tmp/nethunter/system/bin/scripts/emul2html.lua
inflating: /tmp/nethunter/system/bin/scripts/formatMifare.lua
inflating: /tmp/nethunter/system/bin/scripts/hf_read.lua
inflating: /tmp/nethunter/system/bin/scripts/htmldump.lua
inflating: /tmp/nethunter/system/bin/scripts/mfkeys.lua
inflating: /tmp/nethunter/system/bin/scripts/mifare_autopwn.lua
inflating: /tmp/nethunter/system/bin/scripts/ndef_dump.lua
inflating: /tmp/nethunter/system/bin/scripts/parameters.lua
inflating: /tmp/nethunter/system/bin/scripts/remagic.lua
inflating: /tmp/nethunter/system/bin/scripts/test.lua
inflating: /tmp/nethunter/system/bin/scripts/test_t55x7_ask.lua
inflating: /tmp/nethunter/system/bin/scripts/test_t55x7_bi.lua
inflating: /tmp/nethunter/system/bin/scripts/test_t55x7_fsk.lua
inflating: /tmp/nethunter/system/bin/scripts/test_t55x7_psk.lua
inflating: /tmp/nethunter/system/bin/scripts/tnp3dump.lua
inflating: /tmp/nethunter/system/bin/scripts/tnp3sim.lua
inflating: /tmp/nethunter/system/bin/scripts/tracetest.lua
inflating: /tmp/nethunter/system/bin/scripts/writeraw.lua
inflating: /tmp/nethunter/system/etc/init.d/90userinit
inflating: /tmp/nethunter/system/etc/nano/asm.nanorc
inflating: /tmp/nethunter/system/etc/nano/awk.nanorc
inflating: /tmp/nethunter/system/etc/nano/c.nanorc
inflating: /tmp/nethunter/system/etc/nano/cmake.nanorc
inflating: /tmp/nethunter/system/etc/nano/css.nanorc
inflating: /tmp/nethunter/system/etc/nano/fortran.nanorc
inflating: /tmp/nethunter/system/etc/nano/groff.nanorc
inflating: /tmp/nethunter/system/etc/nano/html.nanorc
inflating: /tmp/nethunter/system/etc/nano/java.nanorc
inflating: /tmp/nethunter/system/etc/nano/makefile.nanorc
inflating: /tmp/nethunter/system/etc/nano/nanorc
inflating: /tmp/nethunter/system/etc/nano/nanorc.nanorc
inflating: /tmp/nethunter/system/etc/nano/objc.nanorc
inflating: /tmp/nethunter/system/etc/nano/ocaml.nanorc
inflating: /tmp/nethunter/system/etc/nano/patch.nanorc
inflating: /tmp/nethunter/system/etc/nano/perl.nanorc
inflating: /tmp/nethunter/system/etc/nano/php.nanorc
inflating: /tmp/nethunter/system/etc/nano/python.nanorc
inflating: /tmp/nethunter/system/etc/nano/ruby.nanorc
inflating: /tmp/nethunter/system/etc/nano/sh.nanorc
inflating: /tmp/nethunter/system/etc/nano/tcl.nanorc
inflating: /tmp/nethunter/system/etc/nano/tex.nanorc
inflating: /tmp/nethunter/system/etc/nano/xml.nanorc
inflating: /tmp/nethunter/system/etc/terminfo/E/Eterm
inflating: /tmp/nethunter/system/etc/terminfo/E/Eterm-color
inflating: /tmp/nethunter/system/etc/terminfo/a/ansi
inflating: /tmp/nethunter/system/etc/terminfo/c/cons25
inflating: /tmp/nethunter/system/etc/terminfo/c/cygwin
inflating: /tmp/nethunter/system/etc/terminfo/d/dumb
inflating: /tmp/nethunter/system/etc/terminfo/h/hurd
inflating: /tmp/nethunter/system/etc/terminfo/l/linux
inflating: /tmp/nethunter/system/etc/terminfo/m/mach
inflating: /tmp/nethunter/system/etc/terminfo/m/mach-bold
inflating: /tmp/nethunter/system/etc/terminfo/m/mach-color
inflating: /tmp/nethunter/system/etc/terminfo/p/pcansi
inflating: /tmp/nethunter/system/etc/terminfo/r/rxvt
inflating: /tmp/nethunter/system/etc/terminfo/r/rxvt-basic
inflating: /tmp/nethunter/system/etc/terminfo/s/screen
inflating: /tmp/nethunter/system/etc/terminfo/s/screen-256color
inflating: /tmp/nethunter/system/etc/terminfo/s/screen-256color-bce
inflating: /tmp/nethunter/system/etc/terminfo/s/screen-bce
inflating: /tmp/nethunter/system/etc/terminfo/s/screen-s
inflating: /tmp/nethunter/system/etc/terminfo/s/screen-w
inflating: /tmp/nethunter/system/etc/terminfo/s/sun
inflating: /tmp/nethunter/system/etc/terminfo/v/vt100
inflating: /tmp/nethunter/system/etc/terminfo/v/vt102
inflating: /tmp/nethunter/system/etc/terminfo/v/vt220
inflating: /tmp/nethunter/system/etc/terminfo/v/vt52
inflating: /tmp/nethunter/system/etc/terminfo/w/wsvt25
inflating: /tmp/nethunter/system/etc/terminfo/w/wsvt25m
inflating: /tmp/nethunter/system/etc/terminfo/x/xterm
inflating: /tmp/nethunter/system/etc/terminfo/x/xterm-256color
inflating: /tmp/nethunter/system/etc/terminfo/x/xterm-color
inflating: /tmp/nethunter/system/etc/terminfo/x/xterm-r5
inflating: /tmp/nethunter/system/etc/terminfo/x/xterm-r6
inflating: /tmp/nethunter/system/etc/terminfo/x/xterm-vt220
inflating: /tmp/nethunter/system/etc/terminfo/x/xterm-xfree86
inflating: /tmp/nethunter/system/media/bootanimation.zip
inflating: /tmp/nethunter/tools/busybox
inflating: /tmp/nethunter/tools/freespace.sh
inflating: /tmp/nethunter/tools/installbusybox.sh
inflating: /tmp/nethunter/tools/installchroot.sh
inflating: /tmp/nethunter/tools/installsu.sh
inflating: /tmp/nethunter/tools/previnstall.sh
inflating: /tmp/nethunter/tools/screenres
inflating: /tmp/nethunter/wallpaper/1080x1920.png
inflating: /tmp/nethunter/wallpaper/1280x1280.png
inflating: /tmp/nethunter/wallpaper/1280x800.png
inflating: /tmp/nethunter/wallpaper/1440x2560.png
inflating: /tmp/nethunter/wallpaper/1536x2048.png
inflating: /tmp/nethunter/wallpaper/1920x1920.png
inflating: /tmp/nethunter/wallpaper/2048x1536.png
inflating: /tmp/nethunter/wallpaper/2560x1440.png
inflating: /tmp/nethunter/wallpaper/2560x1600.png
inflating: /tmp/nethunter/wallpaper/2560x2560.png
inflating: /tmp/nethunter/wallpaper/720x1280.png
inflating: /tmp/nethunter/wallpaper/768x1280.png
inflating: /tmp/nethunter/wallpaper/setwallpaper.sh
caution: excluded filename not matched: kalifs-*
/tmp/updater[129]: .: env.sh: No such file or directory
Updater process ended with ERROR: 1
I:Legacy property environment disabled.
I:Install took 4 second(s).
Error installing zip file '/external_sd/update-nethunter-jfltexx-marshmallow-20170727_174703.zip'
Click to expand...
Click to collapse
What rom that u use for? Is it nougat?
FYI, the file name was jfltexx but u can use it in ja3gxx
@ashadul.hoque
Click link below and follow the step given.
https://forum.xda-developers.com/showpost.php?p=73196835&postcount=3
Let me know after u flash it.
@antuketot76
I posted when it didn't work for me after following the steps. Step 1 to 5 worked fine. I did flash linked ROM and pico gapps.
What didn't work for me is step 6 i.e. flashing nethunter.
Join Telegram Group
ashadul.hoque said:
@antuketot76
I posted when it didn't work for me after following the steps. Step 1 to 5 worked fine. I did flash linked ROM and pico gapps.
What didn't work for me is step 6 i.e. flashing nethunter.
Click to expand...
Click to collapse
Join us as link below.
Telegram Group
Cya there
good rom ,i think it designed to work on e300 ..but rom work good to i9500 only problem after installing rom in i9500 is that you can't boot phone to recovery or download via buttons ,u need to use adb commands ...
or anyone known how to fiks that problem to boot in download or recovery with buttons .
i try to go back to stock and successfuly instaling stock but buttons dosent work again .
i can only boot on rec/download via adb commands by activatind developer options .
thenks
Ngadhnjim said:
good rom ,i think it designed to work on e300 ..but rom work good to i9500 only problem after installing rom in i9500 is that you can't boot phone to recovery or download via buttons ,u need to use adb commands ...
or anyone known how to fiks that problem to boot in download or recovery with buttons .
i try to go back to stock and successfuly instaling stock but buttons dosent work again .
i can only boot on rec/download via adb commands by activatind developer options .
thenks
Click to expand...
Click to collapse
Tested by by me that is okay that can boot into recovery page using a button combination.
Need to check on your device carefully.
Join us in telegram as below. Click Here TELEGRAM

Brunch cedric errors

I'm trying to compile LineageOS 15 and am getting the following errors in the '' brunch cedric '' command. Does anyone know the solution?
[email protected]:~/android/system$ brunch cedric
including vendor/lineage/vendorsetup.sh
Trying dependencies-only mode on a non-existing device tree?
============================================
PLATFORM_VERSION_CODENAME=REL
PLATFORM_VERSION=8.0.0
LINEAGE_VERSION=15.0-20171029-UNOFFICIAL-cedric
TARGET_PRODUCT=lineage_cedric
TARGET_BUILD_VARIANT=userdebug
TARGET_BUILD_TYPE=release
TARGET_PLATFORM_VERSION=OPR1
TARGET_BUILD_APPS=
TARGET_ARCH=arm
TARGET_ARCH_VARIANT=armv7-a-neon
TARGET_CPU_VARIANT=cortex-a53
TARGET_2ND_ARCH=
TARGET_2ND_ARCH_VARIANT=
TARGET_2ND_CPU_VARIANT=
HOST_ARCH=x86_64
HOST_2ND_ARCH=x86
HOST_OS=linux
HOST_OS_EXTRA=Linux-4.10.0-37-generic-x86_64-with-Ubuntu-16.04-xenial
HOST_CROSS_OS=windows
HOST_CROSS_ARCH=x86
HOST_CROSS_2ND_ARCH=x86_64
HOST_BUILD_TYPE=release
BUILD_ID=OPR6.170623.012
OUT_DIR=/home/cairo100/android/system/out
AUX_OS_VARIANT_LIST=
============================================
make: Entering directory '/home/cairo100/android/system'
============================================
PLATFORM_VERSION_CODENAME=REL
PLATFORM_VERSION=8.0.0
TARGET_PRODUCT=lineage_cedric
TARGET_BUILD_VARIANT=userdebug
TARGET_BUILD_TYPE=release
TARGET_ARCH=arm
TARGET_ARCH_VARIANT=armv7-a-neon
TARGET_CPU_VARIANT=cortex-a53
HOST_ARCH=x86_64
HOST_2ND_ARCH=x86
HOST_OS=linux
HOST_OS_EXTRA=Linux-4.10.0-37-generic-x86_64-with-Ubuntu-16.04-xenial
HOST_CROSS_OS=windows
HOST_CROSS_ARCH=x86
HOST_CROSS_2ND_ARCH=x86_64
HOST_BUILD_TYPE=release
BUILD_ID=OPR6.170623.012
OUT_DIR=/home/cairo100/android/system/out
============================================
ninja: no work to do.
[1/2] glob vendor/*/*/Android.bp
ninja: no work to do.
./vendor/motorola/cedric/Android.mk was modified, regenerating...
[9/1039] including ./cts/Android.mk ...
cts/apps/CtsVerifier/Android.mk:72: warning: FindEmulator: find: `cts/apps/CtsVerifier/src/com/android/cts/verifier/backup': No such file or directory
build/core/java_common.mk:88: warning: FindEmulator: cd: cts/hostsidetests/appsecurity/test-apps/WriteExternalStorageApp/cts/hostsidetests/appsecurity/test-apps/WriteExternalStorageApp/res: No such file or directory
build/core/java_common.mk:88: warning: FindEmulator: cd: cts/hostsidetests/backup/assets: No such file or directory
cts/hostsidetests/os/test-apps/StaticSharedNativeLibProvider/Android.mk:23: warning: FindEmulator: find: `cts/hostsidetests/os/test-apps/StaticSharedNativeLibProvider/src': No such file or directory
cts/hostsidetests/os/test-apps/StaticSharedNativeLibProvider1/Android.mk:23: warning: FindEmulator: find: `cts/hostsidetests/os/test-apps/StaticSharedNativeLibProvider1/src': No such file or directory
cts/tests/tests/contactsproviderwipe/Android.mk:33: warning: FindEmulator: find: `cts/tests/tests/contactsproviderwipe/common/src': No such file or directory
cts/tests/tests/telecom3/Android.mk:37: warning: FindEmulator: find: `cts/tests/tests/telecom/src/android/telecom/cts/MockDialerActivity.java': No such file or directory
[136/1039] including ./device/motorola/cedric/Android.mk ...
ln: falhou ao criar link simbólico '/home/cairo100/android/system/out/target/product/cedric/system/bin/expat': Arquivo existe
[337/1039] including ./external/toybox/Android.mk ...
awk: line 1: syntax error at or near ,
[369/1039] including ./frameworks/av/media/libaaudio/Android.mk ...
frameworks/av/media/libaaudio/examples/input_monitor/static/Android.mk: warning: input_monitor: unusual tags examples
frameworks/av/media/libaaudio/examples/write_sine/static/Android.mk: warning: write_sine: unusual tags examples
[403/1039] including ./frameworks/base/Android.mk ...
./frameworks/base/Android.mk:866: warning: FindEmulator: find: `frameworks/opt/telephony/src/java/android/provider': No such file or directory
./frameworks/base/Android.mk:875: warning: FindEmulator: find: `frameworks/opt/telephony/src/java/android/provider': No such file or directory
./frameworks/base/Android.mk:880: warning: FindEmulator: find: `frameworks/opt/telephony/src/java/android/provider': No such file or directory
./frameworks/base/Android.mk:885: warning: FindEmulator: find: `frameworks/opt/telephony/src/java/android/provider': No such file or directory
[441/1039] including ./frameworks/opt/hardware/Android.mk ...
./frameworks/opt/hardware/Android.mk:21: warning: FindEmulator: find: `frameworks/opt/hardware/cmhw': No such file or directory
[575/1039] including ./hardware/qcom/wlan-caf/Android.mk ...
build/core/binary.mk:39: warning: libwifi-hal-qcom uses kernel headers, but does not depend on them!
build/core/binary.mk:39: warning: libwifi-hal-qcom uses kernel headers, but does not depend on them!
[581/1039] including ./lineage-sdk/Android.mk ...
./lineage-sdk/Android.mk:152: warning: FindEmulator: find: `lineage-sdk/dummy': No such file or directory
build/core/droiddoc.mk:132: warning: FindEmulator: find: `build/tools/droiddoc/templates-sdk': No such file or directory
[752/1039] including ./system/sepolicy/Android.mk ...
./system/sepolicy/Android.mk:107: warning: BOARD_SEPOLICY_VERS not specified, assuming current platform version
[1039/1039] including ./vendor/qcom/opensource/dataservices/Android.mk ...
build/core/Makefile:54: warning: Duplicate header copy: /home/cairo100/android/system/out/target/product/cedric/obj/include/cld80211-lib/cld80211_lib.h
build/core/Makefile:54: warning: Defined in: hardware/qcom/wlan-caf/cld80211-lib/Android.mk hardware/qcom/wlan-caf/cld80211-lib/Android.mk
No private recovery resources for TARGET_DEVICE cedric
platform_testing/build/tasks/tests/instrumentation_metric_test_list.mk: warning: continuous_instrumentation_metric_tests: Unknown installed file for module perf-setup.sh
platform_testing/build/tasks/tests/instrumentation_test_list.mk: warning: continuous_instrumentation_tests: Unknown installed file for module RecyclerViewTests
platform_testing/build/tasks/tests/instrumentation_test_list.mk: warning: continuous_instrumentation_tests: Unknown installed file for module SettingsFunctionalTests
platform_testing/build/tasks/tests/instrumentation_test_list.mk: warning: continuous_instrumentation_tests: Unknown installed file for module LauncherFunctionalTests
platform_testing/build/tasks/tests/native_metric_test_list.mk: warning: continuous_native_metric_tests: Unknown installed file for module perf-setup.sh
test/vts/tools/build/tasks/vts_package.mk:216: warning: FindEmulator: cd: vendor/google_vts/testcases: No such file or directory
test/vts/tools/build/tasks/vts_package.mk:216: warning: FindEmulator: cd: vendor/google_vts/testcases: No such file or directory
test/vts/tools/build/tasks/vts_package.mk:216: warning: FindEmulator: cd: vendor/google_vts/testcases: No such file or directory
./test/vts/utils/python/archive/Android.mk:28: warning: overriding commands for target `default'
./test/vts/runners/host/tcp_server/Android.mk:19: warning: ignoring old commands for target `default'
./test/vts/utils/python/coverage/Android.mk:28: warning: overriding commands for target `default'
./test/vts/utils/python/archive/Android.mk:28: warning: ignoring old commands for target `default'
build/core/Makefile:34: warning: overriding commands for target `/home/cairo100/android/system/out/target/product/cedric/system/lib/hw/camera.msm8937.so'
build/core/base_rules.mk:375: warning: ignoring old commands for target `/home/cairo100/android/system/out/target/product/cedric/system/lib/hw/camera.msm8937.so'
build/core/Makefile:34: warning: overriding commands for target `/home/cairo100/android/system/out/target/product/cedric/system/lib/libqsap_sdk.so'
build/core/base_rules.mk:375: warning: ignoring old commands for target `/home/cairo100/android/system/out/target/product/cedric/system/lib/libqsap_sdk.so'
[ 50% 1/2] glob vendor/*/*/Android.bp
ninja: error: '/home/cairo100/android/system/out/target/product/cedric/obj/SHARED_LIBRARIES/libril_intermediates/export_includes', needed by '/home/cairo100/android/system/out/target/product/cedric/obj/SHARED_LIBRARIES/libreference-ril_intermediates/import_includes', missing and no known rule to make it
14:32:50 ninja failed with: exit status 1
build/core/main.mk:21: recipe for target 'run_soong_ui' failed
make: *** [run_soong_ui] Error 1
make: Leaving directory '/home/cairo100/android/system'
#### make failed to build some targets (01:57 (mm:ss)) ####
Click to expand...
Click to collapse
Missing dependences
You need to git clone them into your working folder
Google which repos you need
The output tells you what you are missing
you could also comment out
BOARD_PROVIDES_LIBRIL := true
from boardconfig.mk by putting a # in front of it so it becomes until you find out what is needed
#BOARD_PROVIDES_LIBRIL := true
don't know what files are needed to make that work but I think thats the line that that causes the error
and you are probably missing
qcom media-caf
qcom display-caf
qcom audio-caf
so git clone these repos for your board which is msm8937
Will this become available soon to download?
aaronboy205 said:
Will this become available soon to download?
Click to expand...
Click to collapse
I doubt it - from the problems the person is posting they haven't even reached the build stage so without being disrespectful they won't have the coding knowledge to fix errors
Best wait for the guys behind lineageos 14.1 - I'm sure they will build it once they have time
And anyway android 8.1 has been announced so there isn't much point until it's fully released & lineageos have updated all their sources
TheFixItMan said:
I doubt it - from the problems the person is posting they haven't even reached the build stage so without being disrespectful they won't have the coding knowledge to fix errors
Best wait for the guys behind lineageos 14.1 - I'm sure they will build it once they have time
And anyway android 8.1 has been announced so there isn't much point until it's fully released & lineageos have updated all their sources
Click to expand...
Click to collapse
There are few guides on the internet and translations often do not help. I was following a guide and in practice, I saw that it is not as simple as it seemed. As I had said, it was my first compilation and I had no experience. I'm going to start compiling roms nougats for anyone who knows how to be a future android oreo compiler for cedric

Help installing magisk on OxygenOS 8 Oreo

Hi, i now that everyone seems to be able to use magisk under oreo, but i can't get it to work since the first oxygenos oreo beta release.
the funny thing is, it seems to install correctly, but after the reboot there is no magisk manager, and no root functionality.
What i tried:
* Dirty and Clean flashed every beta and stable build.
* Tried the last 4 magisk releases, last version 15.3
* Supersu, wich works every time
* TWRP 3.2.1 blu spark 8.61
I deleted everything except /data/media/0/*
Also, a log file from a magisk install after a clean flash:
Code:
Installing zip file '/sdcard/Backup/Magisk-v15.3(1531).zip'
Checking for Digest file...
Skipping Digest check: no Digest file found
I:Update binary zip
I:Zip does not contain SELinux file_contexts file in its root.
I:Legacy property environment not used in updater.
Archive: /sdcard/Backup/Magisk-v15.3(1531).zip
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
inflating: addon.d/99-magisk.sh
inflating: arm/magiskboot
inflating: arm/magiskinit
inflating: arm64/magiskboot
inflating: arm64/magiskinit
inflating: chromeos/futility
inflating: chromeos/kernel.keyblock
inflating: chromeos/kernel_data_key.vbprivk
inflating: common/boot_patch.sh
inflating: common/magisk.apk
inflating: common/util_functions.sh
inflating: x64/magiskboot
inflating: x64/magiskinit
inflating: x86/magiskboot
inflating: x86/magiskinit
inflating: META-INF/MANIFEST.MF
inflating: META-INF/CERT.SF
inflating: META-INF/CERT.RSA
************************
* Magisk v15.3 Installer
************************
- Mounting /system, /vendor
- Device platform: arm64
- Constructing environment
- Found boot image: /dev/block/sde18
Unable to locate class 'com/topjohnwu/magisk/utils/BootSigner'
java.lang.ClassNotFoundException: Didn't find class "com.topjohnwu.magisk.utils.BootSigner" on path: DexPathList[[zip file "/dev/tmp/install/common/magisk.apk"],nativeLibraryDirectories=[/system/lib64, /system/vendor/lib64, /system/lib64, /system/vendor/lib64]]
at dalvik.system.BaseDexClassLoader.findClass(BaseDexClassLoader.java:93)
at java.lang.ClassLoader.loadClass(ClassLoader.java:379)
at java.lang.ClassLoader.loadClass(ClassLoader.java:312)
Exception in thread "main" java.lang.ClassNotFoundException: Didn't find class "com.topjohnwu.magisk.utils.BootSigner" on path: DexPathList[[zip file "/dev/tmp/install/common/magisk.apk"],nativeLibraryDirectories=[/system/lib64, /system/vendor/lib64, /system/lib64, /system/vendor/lib64]]
at dalvik.system.BaseDexClassLoader.findClass(BaseDexClassLoader.java:93)
at java.lang.ClassLoader.loadClass(ClassLoader.java:379)
at java.lang.ClassLoader.loadClass(ClassLoader.java:312)
- Encrypted data detected
- Unpacking boot image
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Parsing boot image: [/dev/block/sde18]
KERNEL [13288446] @ 0x80008000
RAMDISK [2684900] @ 0x81000000
SECOND [0] @ 0x80f00000
EXTRA [0] @ 0x80000100
PAGESIZE [4096]
OS_VERSION [8.0.0]
PATCH_LEVEL [2017-12]
NAME []
CMDLINE [androidboot.hardware=qcom user_debug=31 msm_rtb.filter=0x237 ehci-hcd.park=3 lpm_levels.sleep_disabled=1 [email protected] buildvariant=user]
DTB [4393782]
KERNEL_FMT [gzip]
RAMDISK_FMT [gzip]
- Checking ramdisk status
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Loading cpio: [ramdisk.cpio]
- Stock boot image detected
- Backing up stock boot image
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Compressing to [stock_boot_ca556288a60220a86b3190b8f7e7a7626501472e.img.gz]
- Patching ramdisk
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Loading cpio: [ramdisk.cpio]
Add entry [init] (0750)
Patch with flag KEEPVERITY=[false] KEEPFORCEENCRYPT=[true]
Remove [verity_key]
Save SHA1: [ca556288a60220a86b3190b8f7e7a7626501472e] -> [.backup/.sha1]
Loading cpio: [ramdisk.cpio.orig]
Backup mismatch entry: [init] -> [.backup/init]
Backup missing entry: [verity_key] -> [.backup/verity_key]
Dump cpio: [ramdisk.cpio]
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Loading dtbs from [dtb]
Found fstab in dtb.0000
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0001
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0002
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0003
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0004
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0005
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0006
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0007
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0008
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0009
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0010
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0011
Found block [system] in fstab
Remove pattern [,verify]
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Patch @ 01308BE6 [736B69705F696E697472616D6673]->[77616E745F696E697472616D6673]
- Repacking boot image
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Parsing boot image: [/dev/block/sde18]
KERNEL [13288446] @ 0x80008000
RAMDISK [2684900] @ 0x81000000
SECOND [0] @ 0x80f00000
EXTRA [0] @ 0x80000100
PAGESIZE [4096]
OS_VERSION [8.0.0]
PATCH_LEVEL [2017-12]
NAME []
CMDLINE [androidboot.hardware=qcom user_debug=31 msm_rtb.filter=0x237 ehci-hcd.park=3 lpm_levels.sleep_disabled=1 [email protected] buildvariant=user]
DTB [4393782]
KERNEL_FMT [gzip]
RAMDISK_FMT [gzip]
Repack to boot image: [new-boot.img]
KERNEL [13295950] @ 0x80008000
RAMDISK [3063248] @ 0x81000000
SECOND [0] @ 0x80f00000
EXTRA [0] @ 0x80000100
PAGESIZE [4096]
OS_VERSION [8.0.0]
PATCH_LEVEL [2017-12]
NAME []
CMDLINE [androidboot.hardware=qcom user_debug=31 msm_rtb.filter=0x237 ehci-hcd.park=3 lpm_levels.sleep_disabled=1 [email protected] buildvariant=user]
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Cleaning up...
- Flashing new boot image
- Unmounting partitions
- Done
I:Updater process ended with RC=0
I:Install took 24 second(s).
Updating partition details...
I:Data backup size is 1681MB, free: 10341MB.
I:Unable to mount '/usb-otg'
I:Actual block device: '', current file system: 'vfat'
...done
I:Set page: 'flash_done'
I:operation_end - status=0
I:Set page: 'clear_vars'
I:Set page: 'install'
I:Set page: 'main'
I:Set page: 'clear_vars'
I:Set page: 'main2'
I:Set page: 'advanced'
I:Set page: 'copylog'
I:Set page: 'action_page'
I:operation_start: 'Copy Log'
I:Copying file /tmp/recovery.log to /data/media/0/recovery.log
Copied recovery log to /data/media/0/recovery.log.
madm03 said:
Hi, i now that everyone seems to be able to use magisk under oreo, but i can't get it to work since the first oxygenos oreo beta release.
the funny thing is, it seems to install correctly, but after the reboot there is no magisk manager, and no root functionality.
What i tried:
* Dirty and Clean flashed every beta and stable build.
* Tried the last 4 magisk releases, last version 15.3
* Supersu, wich works every time
* TWRP 3.2.1 blu spark 8.61
I deleted everything except /data/media/0/*
Also, a log file from a magisk install after a clean flash:
Code:
Installing zip file '/sdcard/Backup/Magisk-v15.3(1531).zip'
Checking for Digest file...
Skipping Digest check: no Digest file found
I:Update binary zip
I:Zip does not contain SELinux file_contexts file in its root.
I:Legacy property environment not used in updater.
Archive: /sdcard/Backup/Magisk-v15.3(1531).zip
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
inflating: addon.d/99-magisk.sh
inflating: arm/magiskboot
inflating: arm/magiskinit
inflating: arm64/magiskboot
inflating: arm64/magiskinit
inflating: chromeos/futility
inflating: chromeos/kernel.keyblock
inflating: chromeos/kernel_data_key.vbprivk
inflating: common/boot_patch.sh
inflating: common/magisk.apk
inflating: common/util_functions.sh
inflating: x64/magiskboot
inflating: x64/magiskinit
inflating: x86/magiskboot
inflating: x86/magiskinit
inflating: META-INF/MANIFEST.MF
inflating: META-INF/CERT.SF
inflating: META-INF/CERT.RSA
************************
* Magisk v15.3 Installer
************************
- Mounting /system, /vendor
- Device platform: arm64
- Constructing environment
- Found boot image: /dev/block/sde18
Unable to locate class 'com/topjohnwu/magisk/utils/BootSigner'
java.lang.ClassNotFoundException: Didn't find class "com.topjohnwu.magisk.utils.BootSigner" on path: DexPathList[[zip file "/dev/tmp/install/common/magisk.apk"],nativeLibraryDirectories=[/system/lib64, /system/vendor/lib64, /system/lib64, /system/vendor/lib64]]
at dalvik.system.BaseDexClassLoader.findClass(BaseDexClassLoader.java:93)
at java.lang.ClassLoader.loadClass(ClassLoader.java:379)
at java.lang.ClassLoader.loadClass(ClassLoader.java:312)
Exception in thread "main" java.lang.ClassNotFoundException: Didn't find class "com.topjohnwu.magisk.utils.BootSigner" on path: DexPathList[[zip file "/dev/tmp/install/common/magisk.apk"],nativeLibraryDirectories=[/system/lib64, /system/vendor/lib64, /system/lib64, /system/vendor/lib64]]
at dalvik.system.BaseDexClassLoader.findClass(BaseDexClassLoader.java:93)
at java.lang.ClassLoader.loadClass(ClassLoader.java:379)
at java.lang.ClassLoader.loadClass(ClassLoader.java:312)
- Encrypted data detected
- Unpacking boot image
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Parsing boot image: [/dev/block/sde18]
KERNEL [13288446] @ 0x80008000
RAMDISK [2684900] @ 0x81000000
SECOND [0] @ 0x80f00000
EXTRA [0] @ 0x80000100
PAGESIZE [4096]
OS_VERSION [8.0.0]
PATCH_LEVEL [2017-12]
NAME []
CMDLINE [androidboot.hardware=qcom user_debug=31 msm_rtb.filter=0x237 ehci-hcd.park=3 lpm_levels.sleep_disabled=1 [email protected] buildvariant=user]
DTB [4393782]
KERNEL_FMT [gzip]
RAMDISK_FMT [gzip]
- Checking ramdisk status
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Loading cpio: [ramdisk.cpio]
- Stock boot image detected
- Backing up stock boot image
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Compressing to [stock_boot_ca556288a60220a86b3190b8f7e7a7626501472e.img.gz]
- Patching ramdisk
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Loading cpio: [ramdisk.cpio]
Add entry [init] (0750)
Patch with flag KEEPVERITY=[false] KEEPFORCEENCRYPT=[true]
Remove [verity_key]
Save SHA1: [ca556288a60220a86b3190b8f7e7a7626501472e] -> [.backup/.sha1]
Loading cpio: [ramdisk.cpio.orig]
Backup mismatch entry: [init] -> [.backup/init]
Backup missing entry: [verity_key] -> [.backup/verity_key]
Dump cpio: [ramdisk.cpio]
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Loading dtbs from [dtb]
Found fstab in dtb.0000
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0001
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0002
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0003
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0004
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0005
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0006
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0007
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0008
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0009
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0010
Found block [system] in fstab
Remove pattern [,verify]
Found fstab in dtb.0011
Found block [system] in fstab
Remove pattern [,verify]
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Patch @ 01308BE6 [736B69705F696E697472616D6673]->[77616E745F696E697472616D6673]
- Repacking boot image
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Parsing boot image: [/dev/block/sde18]
KERNEL [13288446] @ 0x80008000
RAMDISK [2684900] @ 0x81000000
SECOND [0] @ 0x80f00000
EXTRA [0] @ 0x80000100
PAGESIZE [4096]
OS_VERSION [8.0.0]
PATCH_LEVEL [2017-12]
NAME []
CMDLINE [androidboot.hardware=qcom user_debug=31 msm_rtb.filter=0x237 ehci-hcd.park=3 lpm_levels.sleep_disabled=1 [email protected] buildvariant=user]
DTB [4393782]
KERNEL_FMT [gzip]
RAMDISK_FMT [gzip]
Repack to boot image: [new-boot.img]
KERNEL [13295950] @ 0x80008000
RAMDISK [3063248] @ 0x81000000
SECOND [0] @ 0x80f00000
EXTRA [0] @ 0x80000100
PAGESIZE [4096]
OS_VERSION [8.0.0]
PATCH_LEVEL [2017-12]
NAME []
CMDLINE [androidboot.hardware=qcom user_debug=31 msm_rtb.filter=0x237 ehci-hcd.park=3 lpm_levels.sleep_disabled=1 [email protected] buildvariant=user]
MagiskBoot v15.3(1531) (by topjohnwu) - Boot Image Modification Tool
Cleaning up...
- Flashing new boot image
- Unmounting partitions
- Done
I:Updater process ended with RC=0
I:Install took 24 second(s).
Updating partition details...
I:Data backup size is 1681MB, free: 10341MB.
I:Unable to mount '/usb-otg'
I:Actual block device: '', current file system: 'vfat'
...done
I:Set page: 'flash_done'
I:operation_end - status=0
I:Set page: 'clear_vars'
I:Set page: 'install'
I:Set page: 'main'
I:Set page: 'clear_vars'
I:Set page: 'main2'
I:Set page: 'advanced'
I:Set page: 'copylog'
I:Set page: 'action_page'
I:operation_start: 'Copy Log'
I:Copying file /tmp/recovery.log to /data/media/0/recovery.log
Copied recovery log to /data/media/0/recovery.log.
Click to expand...
Click to collapse
try installing the4 manager from the playstore. Ever since Google added this stupid encryption there have been issues on encrypted devices. Thankfully not many run encrypted so it doesnt com up often.
hm..., the app is not (anymore) in my localized playstore. I can only sideload it, but i already tried that. Same result
Also, isn't every recent Android device encrypted by default? I mean, i have changed the default_password, but that's it
madm03 said:
hm..., the app is not (anymore) in my localized playstore. I can only sideload it, but i already tried that. Same result
Also, isn't every recent Android device encrypted by default? I mean, i have changed the default_password, but that's it
Click to expand...
Click to collapse
Yes but many disable the encryption and leave their devices unencrypted. Hell it's the first thing I do to all my devices.
I would post this in the magisk thread and see what he says.

Need help with building AOSP 8.0 for XA2 H4113

Hello,
so i have followed all the instructions on the sony site but for some reason it still won't build the rom.
Here is a part of the terminal history after doing the build command, please let me know if you can help me fix this.
[email protected]:~/android$ make -j4
============================================
PLATFORM_VERSION_CODENAME=REL
PLATFORM_VERSION=8.0.0
TARGET_PRODUCT=aosp_h4113
TARGET_BUILD_VARIANT=eng
TARGET_BUILD_TYPE=release
TARGET_ARCH=arm64
TARGET_ARCH_VARIANT=armv8-a
TARGET_CPU_VARIANT=generic
TARGET_2ND_ARCH=arm
TARGET_2ND_ARCH_VARIANT=armv7-a-neon
TARGET_2ND_CPU_VARIANT=cortex-a53
HOST_ARCH=x86_64
HOST_2ND_ARCH=x86
HOST_OS=linux
HOST_OS_EXTRA=Linux-4.15.0-20-generic-x86_64-with-Ubuntu-18.04-bionic
HOST_CROSS_OS=windows
HOST_CROSS_ARCH=x86
HOST_CROSS_2ND_ARCH=x86_64
HOST_BUILD_TYPE=release
BUILD_ID=OPR3.170623.013
OUT_DIR=out
============================================
[38/38] bootstrap out/soong/.minibootstrap/build.ninja.in
[4/4] cp out/soong/.bootstrap/bin/bpglob
[621/622] glob vendor/*/*/Android.bp
[40/40] out/soong/.bootstrap/bin/soong_build out/soong/build.ninja
out/build-aosp_h4113.ninja is missing, regenerating...
Checking build tools versions...
[9/986] including ./cts/Android.mk ...
cts/apps/CtsVerifier/Android.mk:72: warning: FindEmulator: find: `cts/apps/CtsVerifier/src/com/android/cts/verifier/backup': No such file or directory
build/core/java_common.mk:88: warning: FindEmulator: cd: cts/hostsidetests/appsecurity/test-apps/WriteExternalStorageApp/cts/hostsidetests/appsecurity/test-apps/WriteExternalStorageApp/res: No such file or directory
build/core/java_common.mk:88: warning: FindEmulator: cd: cts/hostsidetests/backup/assets: No such file or directory
cts/hostsidetests/os/test-apps/StaticSharedNativeLibProvider/Android.mk:23: warning: FindEmulator: find: `cts/hostsidetests/os/test-apps/StaticSharedNativeLibProvider/src': No such file or directory
cts/hostsidetests/os/test-apps/StaticSharedNativeLibProvider1/Android.mk:23: warning: FindEmulator: find: `cts/hostsidetests/os/test-apps/StaticSharedNativeLibProvider1/src': No such file or directory
cts/tests/tests/contactsproviderwipe/Android.mk:33: warning: FindEmulator: find: `cts/tests/tests/contactsproviderwipe/common/src': No such file or directory
cts/tests/tests/telecom3/Android.mk:37: warning: FindEmulator: find: `cts/tests/tests/telecom/src/android/telecom/cts/MockDialerActivity.java': No such file or directory
[144/986] including ./device/sony/common/Android.mk ...
/bin/bash: line 0: pushd: out/target/product/pioneer/odm/: No such file or directory
/bin/bash: line 0: pushd: out/target/product/pioneer/odm/: No such file or directory
/bin/bash: line 0: pushd: out/target/product/pioneer/odm/: No such file or directory
/bin/bash: line 0: pushd: out/target/product/pioneer/odm/: No such file or directory
[336/986] including ./external/toybox/Android.mk ...
awk: line 1: syntax error at or near ,
[368/986] including ./frameworks/av/media/libaaudio/Android.mk ...
frameworks/av/media/libaaudio/examples/input_monitor/static/Android.mk: warning: input_monitor: unusual tags examples
frameworks/av/media/libaaudio/examples/write_sine/static/Android.mk: warning: write_sine: unusual tags examples
[402/986] including ./frameworks/base/Android.mk ...
./frameworks/base/Android.mk:865: warning: FindEmulator: find: `frameworks/opt/telephony/src/java/android/provider': No such file or directory
./frameworks/base/Android.mk:874: warning: FindEmulator: find: `frameworks/opt/telephony/src/java/android/provider': No such file or directory
./frameworks/base/Android.mk:879: warning: FindEmulator: find: `frameworks/opt/telephony/src/java/android/provider': No such file or directory
./frameworks/base/Android.mk:884: warning: FindEmulator: find: `frameworks/opt/telephony/src/java/android/provider': No such file or directory
[717/986] including ./system/sepolicy/Android.mk ...
./system/sepolicy/Android.mk:107: warning: BOARD_SEPOLICY_VERS not specified, assuming current platform version
[722/986] including ./system/update_engine/Android.mk ...
./system/update_engine/Android.mk:522: warning: No PRODUCT_STATIC_BOOT_CONTROL_HAL configured but AB_OTA_UPDATER is true, no update sideload support.
[986/986] including ./vendor/qcom/opensource/wlan/wcnss-service/Android.mk ...
PRODUCT_COPY_FILES device/generic/goldfish/data/etc/apns-conf.xml:system/etc/apns-conf.xml ignored.
No private recovery resources for TARGET_DEVICE pioneer
platform_testing/build/tasks/tests/instrumentation_metric_test_list.mk: warning: continuous_instrumentation_metric_tests: Unknown installed file for module perf-setup.sh
platform_testing/build/tasks/tests/instrumentation_test_list.mk: warning: continuous_instrumentation_tests: Unknown installed file for module RecyclerViewTests
platform_testing/build/tasks/tests/instrumentation_test_list.mk: warning: continuous_instrumentation_tests: Unknown installed file for module SettingsFunctionalTests
platform_testing/build/tasks/tests/instrumentation_test_list.mk: warning: continuous_instrumentation_tests: Unknown installed file for module LauncherFunctionalTests
platform_testing/build/tasks/tests/native_metric_test_list.mk: warning: continuous_native_metric_tests: Unknown installed file for module perf-setup.sh
test/vts/tools/build/tasks/vts_package.mk:216: warning: FindEmulator: cd: vendor/google_vts/testcases: No such file or directory
test/vts/tools/build/tasks/vts_package.mk:216: warning: FindEmulator: cd: vendor/google_vts/testcases: No such file or directory
test/vts/tools/build/tasks/vts_package.mk:216: warning: FindEmulator: cd: vendor/google_vts/testcases: No such file or directory
build/core/base_rules.mk:466: warning: overriding commands for target `out/host/linux-x86/cts/android-cts/testcases/libcrash-jni.so'
build/core/base_rules.mk:466: warning: ignoring old commands for target `out/host/linux-x86/cts/android-cts/testcases/libcrash-jni.so'
build/core/base_rules.mk:466: warning: overriding commands for target `out/target/product/pioneer/testcases/libcrash-jni/libcrash-jni.so'
build/core/base_rules.mk:466: warning: ignoring old commands for target `out/target/product/pioneer/testcases/libcrash-jni/libcrash-jni.so'
build/core/base_rules.mk:466: warning: overriding commands for target `out/target/product/pioneer/testcases/hello_world_test/hello_world_test'
build/core/base_rules.mk:466: warning: ignoring old commands for target `out/target/product/pioneer/testcases/hello_world_test/hello_world_test'
./test/vts/utils/python/archive/Android.mk:28: warning: overriding commands for target `default'
./test/vts/runners/host/tcp_server/Android.mk:19: warning: ignoring old commands for target `default'
./test/vts/utils/python/coverage/Android.mk:28: warning: overriding commands for target `default'
./test/vts/utils/python/archive/Android.mk:28: warning: ignoring old commands for target `default'
[ 99% 1097/1098] glob vendor/*/*/Android.bp
ninja: error: 'device/sony/common-kernel/kernel-dtb-pioneer', needed by 'out/target/product/pioneer/kernel', missing and no known rule to make it
12:33:56 ninja failed with: exit status 1
build/core/main.mk:21: recipe for target 'run_soong_ui' failed
make: *** [run_soong_ui] Error 1
#### make failed to build some targets (01:50 (mm:ss)) ####
[email protected]:~/android$
Click to expand...
Click to collapse
you're missing device/sony/common-kernel
repo sync again
Sent from my H4113 using Tapatalk
So i just do repo sync without using the -f eich forces it to recover from errors, until i get a successful sync? Ok
frantisheq said:
you're missing device/sony/common-kernel
repo sync again
Sent from my H4113 using Tapatalk
Click to expand...
Click to collapse
Right so i see why I am missing it, it's not even there to download :laugh: .
So can someone like send me that file please? I mean if you have it?
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
davidhozic said:
Right so i see why I am missing it, it's not even there to download :laugh: .
So can someone like send me that file please? I mean if you have it?
Click to expand...
Click to collapse
I see it that file in: android/kernel/sony/msm-4.4/common-kernel
When I follow the build instructions, I don't see H3123 model listed in the lunch menu. Is that something Sony has to add or do I hack together a aosp_h3123.mk file in android/device/sony/pioneer ?
So I tried building for H3113 and got an error:
[ 99% 1437/1438] glob vendor/*/*/Android.bp
ninja: error: 'hardware/qcom/audio/hal/sdm660/platform.c', needed by 'out/target/product/pioneer/obj_arm/SHARED_LIBRARIES/audio.primary.sdm660_intermediates/sdm660/platform.o', missing and no known rule to make it
Click to expand...
Click to collapse

Categories

Resources