Safe to update this one? Do we have good release notes on what changed? ThanksMagisk Canary Update
app-release_47d2d4e3-26102.apk
Notes:
- Tap app-release.apk
- Tap 3 dots (...) across from 10.x MB
- Tap Download
Safe to update this one? Do we have good release notes on what changed? ThanksMagisk Canary Update
app-release_47d2d4e3-26102.apk
Notes:
- Tap app-release.apk
- Tap 3 dots (...) across from 10.x MB
- Tap Download
Its been out for a while and no problems here....ymmvSafe to update this one? Do we have good release notes on what changed? Thanks
notes.md file for Magisk 206102...Safe to update this one? Do we have good release notes on what changed? Thanks
<<Edited>>Would I need to disable dm verity etc to install bootloop protector into the boot image? Is this even possible on the 7 series, what with root living in init_boot?
I'm on 7a (lynx) but this seems to be the default "pixel 7 series root" thread.
I assume disabling dm verity etc will involve a data wipe?
Lynx is Google's codename for the pixel 7aThis is a Pixel 7 Pro guide, but Google Pixel 7 owner can use it. Pixel 7 users must download the Pixel 7 software for their phone. I assume Pixel 7a owners can do the same.
What is "lynx"? Did you mean your PC has a Linux Operating System? What is the bootloop protector that you want to install in the the boot.img?
AFAIK, A first time disabling verity does require a wipe.
Lynx is Google's codename for the phone, like panther and cheetah for the other p7 series phones.This is a Pixel 7 Pro guide, but Google Pixel 7 owner can use it. Pixel 7 users must download the Pixel 7 software for their phone. I assume Pixel 7a owners can do the same.
What is "lynx"? Did you mean your PC has a Linux Operating System? What is the bootloop protector that you want to install in the the boot.img?
AFAIK, A first time disabling verity does require a wipe.
Lynx is Google's codename for the phone, like panther and cheetah for the other p7 series phones.
The module I'm referring to is this one https://github.com/gibcheesepuffs/Magisk_BootloopSaver
While it can run as just a script, it also offers to install itself into the boot image.
As we patch init_boot.img instead of boot.img on these phones, I'm wondering if that will even work, or (rather ironically) cause a bootloop.
<<Edited>>Would I need to disable dm verity etc to install bootloop protector into the boot image? Is this even possible on the 7 series, what with root living in init_boot?
I'm on 7a (lynx) but this seems to be the default "pixel 7 series root" thread.
I assume disabling dm verity etc will involve a data wipe?
Thank you, OP updated!June Factory images are out.
Rooted successfully with Latest Magisk Delta
Do you mean HuskyDG's delta?June Factory images are out.
Rooted successfully with Latest Magisk Delta
That's right and it's using the Canary Update Channel.
Why don't you like the default one?
I couldn't get safetynet to pass a few updates back and needed to use Delta variant. Likely not needed anymore, but haven't had a chance to go back to main build or canary build. Delta seems to work fine anyways.
No.Does anyone have this issue after updating to June? An endless attempt to update a 0kb Cross-Device Services? Thanks. Pls see the screenshot
Thanks. It does seem to work. The last version was dated May 31. Not sure why it keeps pushing when 0kb. Some other apps update also seems dubious. Hopefully the clearing cures all
Try the ADB kill-server command and then connect again.Updated a rooted phone with no trouble. Am trying to update a non rooted phone with the OTA image. Adb devices shows it. It doesn't show any more so adb sideload doesn't work. USB debugging is on. Any ideas?
If you are on a rooted slot you can switch using the app below. As stated above, if you are on an unrooted slot you need to use a PC since this app requires root.Is it possible to switch slot within the phone? I mean, without connecting it to a pc.
eio
corrupt message. boot
partition doesn't match. The bootloader is looking for an updated OS. Flashing an old boot image and then a new/current boot image often gets rid of it. The bootloader notices an updated boot image and switches back to restart
mode instead of eio
mode.You can use the app I mentioned above. Or if you sideloaded the OTA onto your current slot then just sideload it again and both slots will be bootable.many thanks. One more dumb question. How can I quickly check if both of my current 2 slots are even bootable? Obviously one is already bootable. But I have no idea about the other. I forgot if I had flash both the last time.
fastboot --version
at the prompt. If a adb/fastboot is found delete the folder containing them. Also, check the path environment for paths to them and remove it.fastboot flashing unlock
and press enter.fastboot reboot
at the Command Prompt and press enter.fastboot flashing lock
fastboot reboot
fastboot flash init_boot boot.img --slot all
adb wait-for-device shell magisk --remove-modules
fastboot Reboot
flash-all
at the Command Prompt and press enter.flash-all
at the Command Prompt and press enter.adb wait-for-device shell magisk --remove-modules
fastboot Reboot
adb reboot sideload
adb sideload cheetah-ota-aa9a.999999.999-aaaa9999.zip
at the command prompt and press Enter.adb reboot bootloader
at the command prompt and press Enter.fastboot flash init_boot magisk_patched-99999_aA99a.img
at the command prompt and press Enter.fastboot reboot
at the command prompt and press Enter.adb devices
at the command prompt and press Enter. You should see your device's serial number.adb reboot sideload
at the command prompt and press Enter.adb sideload cheetah-ota-aa9a.999999.999-aaaa9999.zip
at the command prompt and press Enter.adb reboot
at the command prompt and press Enter.adb reboot sideload
adb sideload cheetah-ota-aa9a.999999.999-aaaa9999.zip
at the command prompt and press Enter.adb reboot bootloader
at the command prompt and press Enter.fastboot flash init_boot magisk_patched-99999_aA99a.img
at the command prompt and press Enter.fastboot reboot
at the command prompt and press Enter.fastboot flash init_boot init_boot.img --slot all
adb wait-for-device shell magisk --remove-modules
fastboot flash init_boot "magisk_patched...img"
(name of patched.img file) without the quote marks at the Prompt and press enter.fastboot reboot
at the Prompt and press enter.fastboot devices
to verify communication with phone. It should return your phone's serial number.