I have a H910 and rooted with dirty santaHow did you root yours? Did you fresh flash the 10d kdz then start from the beginning?
Ever find a solution for the us cellular version to root?the -0 version I hope should be perfectly fine. not 100% certain on it though, the only difference since rc8 should be a few kernel bug fixes and a new exFAT driver, and a few extra partitions added to Flash Image page to work with the OTA 7z file I uploaded.
update: updated thread for B&H Photo V20 model US996.
This requires the very old december 2016 security patch, which is impossible to revert to on H918's on or past 10p (yours is, since you're on oreo, which is 20 something depending on your actual software version). you need to follow a different process which is exclusive to the H918 because only the H918 can use fastboot oem unlock.all was fine until i got to the command "adb logcat -s recovery" after that it stopped after the first 2 lines. Looked like this (copied from command prompt window)
C:\Program Files (x86)\Minimal ADB and Fastboot>adb logcat -s recowvery
--------- beginning of system
--------- beginning of main
I tried the whole process over three time each doing the same never getting any further, any clues or help would be greatly appreciated. Thank you.
LG V20 H918h on android 8.0.0
This requires the very old december 2016 security patch, which is impossible to revert to on H918's on or past 10p (yours is, since you're on oreo, which is 20 something depending on your actual software version). you need to follow a different process which is exclusive to the H918 because only the H918 can use fastboot oem unlock.
This process, which is explained in more detail here
I have the us996 but i didnt root it had it remotely done i can refer the guy hes amazing running oreo and stable w root
This exploit was patched long ago, not going to work on 10pwhen i put this command adb logcat -s recowvery iget --------- beginning of system
--------- beginning of main and stay like that nothing happened please help il using LG H918 10p .
I would read though this,Can anyone make a Guide to installing Lineage on the G5 in 2021? If you patched past Android 7.0, you're screwed. I'm on 8.0 Oreo, and I just can't downgrade to 7.0 so that I can install a custom recovery. If anyone can explain how to do that, I'd be very gratefully. I so want to run Lineage.
i'm in the same positionCan anyone make a Guide to installing Lineage on the G5 in 2021? If you patched past Android 7.0, you're screwed. I'm on 8.0 Oreo, and I just can't downgrade to 7.0 so that I can install a custom recovery. If anyone can explain how to do that, I'd be very gratefully. I so want to run Lineage.
Hey I'm just finishing up this process with my G5 H830 (T-Mobile).. hopefully this helps someone.
Can anyone make a Guide to installing Lineage on the G5 in 2021? If you patched past Android 7.0, you're screwed. I'm on 8.0 Oreo, and I just can't downgrade to 7.0 so that I can install a custom recovery. If anyone can explain how to do that, I'd be very gratefully. I so want to run Lineage.
On my H830 my bootloader is unlocked but I had to flash back to 7.0 stock from custom os due to fastboot brick. Ricks recovery and easyrecowvery is not working. How do I get TWRP back onto the device?Hey I'm just finishing up this process with my G5 H830 (T-Mobile).. hopefully this helps someone.
Important: when I downgraded from Android 8 to 7, the phone was forced into factory reset. Definitely make a backup of anything you don't want to be erased.
The phone was left to me by my dad and was on android 8. I found a code somewhere (I'll paste below) that allowed me to check the anti-rollback version of the phone and it was 1. Depending on your carrier, I believe there are different codes you input using the dial pad to reveal the anti-rollback "ARB" version. I would double check the firmware you're downloading matches, but from what I've seen, android 8 and 7 both ship as ARB 1. The way it works is the number can go forwards but not backwards. ARB 1 system can flash ARB 2, but then once you have 2, you can't go back to 1. This code is supposed to be for both AT&T and T-mobile: *#*#244773825625#*#* it worked for me. I was able to find the H83020a android 7 KDZ and flash it with LGUP. Still took me hours of work after that and switching between windows 10 and linux mint to root from there, but android 7 took easily. LGUP is only windows. but the ADB commands for dirty cow would not complete for me in windows. It would always hang on "adb logcat -s recowvery". I decided to try the dirty cow commands using linux mint with the ADB 1.0.39 (I believe current) and everything worked as stated in the post. The only difference in command for linux (which to me was actually easier) is that you only "cd" into the dirty cow folder and adb runs from the base terminal.
This was the only tutorial that worked for me and even at that it didn't work on the first PC I was trying it on.
The phone was on android 8, and now it's android 7 nougat with TWRP on the screen.
UPDATE:
I flashed Lineage through TWRP without wiping the phone, and Lineage used some sort of encryption. I would power on the device, and when Lineage loads, it asks for a password. There is no password. I had a lot of trouble getting back to TWRP recovery because of LG's extremely limited recovery handling system. You can't just hold down buttons during power on to get to the proper recovery menu. Once I figured out the button combo, (power + volume down, release power, hold power again), I was able to get to the LG menu to choose the option to factory wipe the phone. That sent me back to TWRP, and there I did an advanced wipe before trying Lineage a second time. After doing a complete wipe and format of the internal storage and then loading the Lineage zip back onto the phone, I was able to flash it again as normal through TWRP and the OS runs as it should. Clean and smooth. I still don't know what encryption was carried over, as I just did a factory reset to downgrade to the 20a nougat firmware, but Lineage seems to need the advanced wipe option in TWRP that formats the internal storage and erases any encryption. At least in my case, it was neccesary. Luckily, you can access internal storage via USB with TWRP running so you can copy off any important files before wiping.
adb push twrp-3.0.2-x-xxxx.img /sdcard/twrp.img
adb shell
$ run-as exec dd if=/sdcard/twrp.img of=/dev/block/bootdevice/by-name/recovery
"<wait for it to complete>"
$ reboot recovery
Well we know root has been achieved, but NOT released for the public as of yet. That's all I was saying... And I am glad to know that it worked on your Mac cause that's what I am in the process of doing at this very moment.