Safe to update this one? Do we have good release notes on what changed? ThanksMagisk Canary Update
app-release_47d2d4e3-26102.apk
Notes:
- Tap app-release.apk
- Tap 3 dots (...) across from 10.x MB
- Tap Download
Safe to update this one? Do we have good release notes on what changed? ThanksMagisk Canary Update
app-release_47d2d4e3-26102.apk
Notes:
- Tap app-release.apk
- Tap 3 dots (...) across from 10.x MB
- Tap Download
Its been out for a while and no problems here....ymmvSafe to update this one? Do we have good release notes on what changed? Thanks
notes.md file for Magisk 206102...Safe to update this one? Do we have good release notes on what changed? Thanks
<<Edited>>Would I need to disable dm verity etc to install bootloop protector into the boot image? Is this even possible on the 7 series, what with root living in init_boot?
I'm on 7a (lynx) but this seems to be the default "pixel 7 series root" thread.
I assume disabling dm verity etc will involve a data wipe?
Lynx is Google's codename for the pixel 7aThis is a Pixel 7 Pro guide, but Google Pixel 7 owner can use it. Pixel 7 users must download the Pixel 7 software for their phone. I assume Pixel 7a owners can do the same.
What is "lynx"? Did you mean your PC has a Linux Operating System? What is the bootloop protector that you want to install in the the boot.img?
AFAIK, A first time disabling verity does require a wipe.
Lynx is Google's codename for the phone, like panther and cheetah for the other p7 series phones.This is a Pixel 7 Pro guide, but Google Pixel 7 owner can use it. Pixel 7 users must download the Pixel 7 software for their phone. I assume Pixel 7a owners can do the same.
What is "lynx"? Did you mean your PC has a Linux Operating System? What is the bootloop protector that you want to install in the the boot.img?
AFAIK, A first time disabling verity does require a wipe.
Lynx is Google's codename for the phone, like panther and cheetah for the other p7 series phones.
The module I'm referring to is this one https://github.com/gibcheesepuffs/Magisk_BootloopSaver
While it can run as just a script, it also offers to install itself into the boot image.
As we patch init_boot.img instead of boot.img on these phones, I'm wondering if that will even work, or (rather ironically) cause a bootloop.
<<Edited>>Would I need to disable dm verity etc to install bootloop protector into the boot image? Is this even possible on the 7 series, what with root living in init_boot?
I'm on 7a (lynx) but this seems to be the default "pixel 7 series root" thread.
I assume disabling dm verity etc will involve a data wipe?
Thank you, OP updated!June Factory images are out.
Rooted successfully with Latest Magisk Delta
Do you mean HuskyDG's delta?June Factory images are out.
Rooted successfully with Latest Magisk Delta
That's right and it's using the Canary Update Channel.
Why don't you like the default one?
I couldn't get safetynet to pass a few updates back and needed to use Delta variant. Likely not needed anymore, but haven't had a chance to go back to main build or canary build. Delta seems to work fine anyways.
No.Does anyone have this issue after updating to June? An endless attempt to update a 0kb Cross-Device Services? Thanks. Pls see the screenshot
Thanks. It does seem to work. The last version was dated May 31. Not sure why it keeps pushing when 0kb. Some other apps update also seems dubious. Hopefully the clearing cures all
Try the ADB kill-server command and then connect again.Updated a rooted phone with no trouble. Am trying to update a non rooted phone with the OTA image. Adb devices shows it. It doesn't show any more so adb sideload doesn't work. USB debugging is on. Any ideas?
eio
corrupt message. boot
partition doesn't match. The bootloader is looking for an updated OS. Flashing an old boot image and then a new/current boot image often gets rid of it. The bootloader notices an updated boot image and switches back to restart
mode instead of eio
mode.I'm curious to read your answer to @simplepinoi177 question. What version of magic are you using to patch the init_boot.img?
Then try the following on your phone:
Then do this on your computer
- Pull down quick settings tap the power icon, tap and hold Power off until you see Boot Safe Mode tap ok. Let Safe mode boot fully, then reboot.
- Then use TB checker to check for duplicate Magisk Manager app installed:
- Open the TB Checker app
- Tap Run Xposed check
- Scroll down to Magisk Random Package Name: to see a Magisk's Manager app name. Delete that Magisk Manager app.
- Flash the 'stock' init_boot.img to both slots to remove root:
./fastboot flash init_boot boot.img --slot all
- Then flash the Magisk patched image.
./fastboot flash init_boot magisk_patched_[random].img
Check if you have root.
If you just use the flash-all.bat file without editing it, it will wipe your phone.if i may ask what may be a stupid question. in the instructions on the first page, i certainly appreciate the detailed instructions and covering the varied situations and outcomes. i am comfortable with, and have done on my old phone, running the flash-all.
my question is this: if one is simply doing a monthly update on an already rooted phone, is there a reason to go through the process of extracting the flash-all and editing, etc? is it better than flashing the stock image, doing the OTA through settings, then flashing the patched init_boot.img back...or will this miss something that using flash-all won't?
similar questions apply to upgrading to 14, when it's released. can i flash the stock image, do the upgrade, then flash the patched init_boot.img, or is it better to flash-all, etc?
thanks!
fastboot --version
at the prompt. If a adb/fastboot is found delete the folder containing them. Also, check the path environment for paths to them and remove it.fastboot flashing unlock
and press enter.fastboot reboot
at the Command Prompt and press enter.fastboot flashing lock
fastboot reboot
fastboot flash init_boot boot.img --slot all
adb wait-for-device shell magisk --remove-modules
fastboot Reboot
flash-all
at the Command Prompt and press enter.flash-all
at the Command Prompt and press enter.adb wait-for-device shell magisk --remove-modules
fastboot Reboot
adb reboot sideload
adb sideload cheetah-ota-aa9a.999999.999-aaaa9999.zip
at the command prompt and press Enter.adb reboot bootloader
at the command prompt and press Enter.fastboot flash init_boot magisk_patched-99999_aA99a.img
at the command prompt and press Enter.fastboot reboot
at the command prompt and press Enter.adb devices
at the command prompt and press Enter. You should see your device's serial number.adb reboot sideload
at the command prompt and press Enter.adb sideload cheetah-ota-aa9a.999999.999-aaaa9999.zip
at the command prompt and press Enter.adb reboot
at the command prompt and press Enter.adb reboot sideload
adb sideload cheetah-ota-aa9a.999999.999-aaaa9999.zip
at the command prompt and press Enter.adb reboot bootloader
at the command prompt and press Enter.fastboot flash init_boot magisk_patched-99999_aA99a.img
at the command prompt and press Enter.fastboot reboot
at the command prompt and press Enter.fastboot flash init_boot init_boot.img --slot all
adb wait-for-device shell magisk --remove-modules
fastboot flash init_boot "magisk_patched...img"
(name of patched.img file) without the quote marks at the Prompt and press enter.fastboot reboot
at the Prompt and press enter.fastboot devices
to verify communication with phone. It should return your phone's serial number.