Hi guys, this is the latest Lollipop ROM rolled out by LG for the international G Pad 8.3.
It's the corean update but works just fine with mine and i hope also with your.
INFO:
1- You can flash it with the TWRP like every Rom out here, i used the bumped TWRP in the original devs thread;
2- The kernel is stock, i only set selinux to permissive because in my works for the G3 i've seen that it's the only way to avoid permission issues;
3- it's bumped so doesn't need nothing special, just flash it in TWRP like i said above;
4- You can dirty flash over the stock 4.4.2 ROM, i made it and had no issues at all.
5- If you are asking why you should flash this instead of the kdz, the answer is that with the "kdz way" you will upload your Bootloader too and you will lost the possibility to flash the twrp and any custom kernel since the new BL patch the exploit used by Bump.
DOWNLOAD
https://www.androidfilehost.com/?fid=95916177934553953
ROOT:
The rom is unrooted, to root it just flash this in recovery:
http://download.chainfire.eu/supersu
Credits:
- Team Codefire for the Bump exploit;
- Chainfire for the root stuff;
It's the corean update but works just fine with mine and i hope also with your.
INFO:
1- You can flash it with the TWRP like every Rom out here, i used the bumped TWRP in the original devs thread;
2- The kernel is stock, i only set selinux to permissive because in my works for the G3 i've seen that it's the only way to avoid permission issues;
3- it's bumped so doesn't need nothing special, just flash it in TWRP like i said above;
4- You can dirty flash over the stock 4.4.2 ROM, i made it and had no issues at all.
5- If you are asking why you should flash this instead of the kdz, the answer is that with the "kdz way" you will upload your Bootloader too and you will lost the possibility to flash the twrp and any custom kernel since the new BL patch the exploit used by Bump.
DOWNLOAD
https://www.androidfilehost.com/?fid=95916177934553953
ROOT:
The rom is unrooted, to root it just flash this in recovery:
http://download.chainfire.eu/supersu
Credits:
- Team Codefire for the Bump exploit;
- Chainfire for the root stuff;