Infinite loop with patched magisk boot.img

Search This thread

Kaka0

Member
Mar 19, 2016
29
3
Brasília
I flashed the patched magisk boot.img and I get an infinite loop showing this key: 80012A99-867FDA48-4E357816-0E549F1B-B067FBD5

I used Magisk Manager 7.4.0. G6 Play XT1922-4 Pie. Screenshot attached.

Code:
- Device platform: armeabi-v7a
- Copying image to cache
- Boot image is signed with AVB 1.0
1566+0 records in
1566+0 records out
1603584 bytes transferred in 0.030 secs (53452800 bytes/sec)
1045+1 records in
1045+1 records out
1070668 bytes transferred in 0.020 secs (53533400 bytes/sec)
- Unpacking boot image
Parsing boot image: [/data/user_de/0/com.topjohnwu.magisk/install/boot.img]
HEADER_VER      [0]
KERNEL_SZ       [10251215]
RAMDISK_SZ      [1508130]
SECOND_SZ       [0]
EXTRA_SZ        [0]
OS_VERSION      [9.0.0]
OS_PATCH_LEVEL  [2019-05]
PAGESIZE        [2048]
NAME            []
CMDLINE         [console=ttyHSL0,115200,n8 androidboot.console=ttyHSL0 androidboot.hardware=qcom androidboot.memcg=false user_debug=30 msm_rtb.filter=0x237 ehci-hcd.park=3 androidboot.bootdevice=7824900.sdhci lpm_levels.sleep_disabled=1 earlycon=msm_hsl_uart,0x78B0000 firmware_class.path=/vendor/firmware_mnt/image loop.max_part=7 vmalloc=400M buildvariant=user]
CHECKSUM        [77549a9032634b395110bb3a9eb0227033621915000000000000000000000000]
KERNEL_DTB      [896823]
KERNEL_FMT      [raw]
RAMDISK_FMT     [gzip]
- Checking ramdisk status
Loading cpio: [ramdisk.cpio]
- Stock boot image detected
- Backing up stock boot image
- Patching ramdisk
Loading cpio: [ramdisk.cpio]
Add entry [init] (0750)
Patch with flag KEEPVERITY=[false] KEEPFORCEENCRYPT=[true]
Remove [verity_key]
Loading cpio: [ramdisk.cpio.orig]
Backup mismatch entry: [init] -> [.backup/init]
Backup missing entry: [verity_key] -> [.backup/verity_key]
Create directory [.backup] (0000)
Add entry [.backup/.magisk] (0000)
Dump cpio: [ramdisk.cpio]
Loading dtbs from [kernel_dtb]
Found fstab in dtb.0000
Found entry [system] in fstab
Found pattern [,verify]
Found entry [vendor] in fstab
Found pattern [,verify]
Found fstab in dtb.0001
Found entry [system] in fstab
Found pattern [,verify]
Found entry [vendor] in fstab
Found pattern [,verify]
Found fstab in dtb.0002
Found entry [system] in fstab
Found pattern [,verify]
Found entry [vendor] in fstab
Found pattern [,verify]
Found fstab in dtb.0003
Found entry [system] in fstab
Found pattern [,verify]
Found entry [vendor] in fstab
Found pattern [,verify]
- Patching fstab in kernel_dtb
- Repacking boot image
Parsing boot image: [/data/user_de/0/com.topjohnwu.magisk/install/boot.img]
HEADER_VER      [0]
KERNEL_SZ       [10251215]
RAMDISK_SZ      [1508130]
SECOND_SZ       [0]
EXTRA_SZ        [0]
OS_VERSION      [9.0.0]
OS_PATCH_LEVEL  [2019-05]
PAGESIZE        [2048]
NAME            []
CMDLINE         [console=ttyHSL0,115200,n8 androidboot.console=ttyHSL0 androidboot.hardware=qcom androidboot.memcg=false user_debug=30 msm_rtb.filter=0x237 ehci-hcd.park=3 androidboot.bootdevice=7824900.sdhci lpm_levels.sleep_disabled=1 earlycon=msm_hsl_uart,0x78B0000 firmware_class.path=/vendor/firmware_mnt/image loop.max_part=7 vmalloc=400M buildvariant=user]
CHECKSUM        [77549a9032634b395110bb3a9eb0227033621915000000000000000000000000]
KERNEL_DTB      [896823]
KERNEL_FMT      [raw]
RAMDISK_FMT     [gzip]
Repack to boot image: [new-boot.img]
HEADER_VER      [0]
KERNEL_SZ       [10247087]
RAMDISK_SZ      [1770428]
SECOND_SZ       [0]
EXTRA_SZ        [0]
OS_VERSION      [9.0.0]
OS_PATCH_LEVEL  [2019-05]
PAGESIZE        [2048]
NAME            []
CMDLINE         [console=ttyHSL0,115200,n8 androidboot.console=ttyHSL0 androidboot.hardware=qcom androidboot.memcg=false user_debug=30 msm_rtb.filter=0x237 ehci-hcd.park=3 androidboot.bootdevice=7824900.sdhci lpm_levels.sleep_disabled=1 earlycon=msm_hsl_uart,0x78B0000 firmware_class.path=/vendor/firmware_mnt/image loop.max_part=7 vmalloc=400M buildvariant=user]
CHECKSUM        [3a228177359924a940499d2a84e7dcc6ec41deca000000000000000000000000]
- Signing boot image with verity keys

****************************
 Output file is placed in 
 /storage/emulated/0/Download/magisk_patched.img 
****************************
- All done!
 

Attachments

  • Screenshot_20191108-162750_menor.png
    Screenshot_20191108-162750_menor.png
    57.3 KB · Views: 192
  • Like
Reactions: Ivan683

Dendy420

Member
Feb 6, 2020
25
0
Nokia X10/X20
I flashed the patched magisk boot.img and I get an infinite loop showing this key: 80012A99-867FDA48-4E357816-0E549F1B-B067FBD5

I used Magisk Manager 7.4.0. G6 Play XT1922-4 Pie. Screenshot attached.

Code:
- Device platform: armeabi-v7a
- Copying image to cache
- Boot image is signed with AVB 1.0
1566+0 records in
1566+0 records out
1603584 bytes transferred in 0.030 secs (53452800 bytes/sec)
1045+1 records in
1045+1 records out
1070668 bytes transferred in 0.020 secs (53533400 bytes/sec)
- Unpacking boot image
Parsing boot image: [/data/user_de/0/com.topjohnwu.magisk/install/boot.img]
HEADER_VER      [0]
KERNEL_SZ       [10251215]
RAMDISK_SZ      [1508130]
SECOND_SZ       [0]
EXTRA_SZ        [0]
OS_VERSION      [9.0.0]
OS_PATCH_LEVEL  [2019-05]
PAGESIZE        [2048]
NAME            []
CMDLINE         [console=ttyHSL0,115200,n8 androidboot.console=ttyHSL0 androidboot.hardware=qcom androidboot.memcg=false user_debug=30 msm_rtb.filter=0x237 ehci-hcd.park=3 androidboot.bootdevice=7824900.sdhci lpm_levels.sleep_disabled=1 earlycon=msm_hsl_uart,0x78B0000 firmware_class.path=/vendor/firmware_mnt/image loop.max_part=7 vmalloc=400M buildvariant=user]
CHECKSUM        [77549a9032634b395110bb3a9eb0227033621915000000000000000000000000]
KERNEL_DTB      [896823]
KERNEL_FMT      [raw]
RAMDISK_FMT     [gzip]
- Checking ramdisk status
Loading cpio: [ramdisk.cpio]
- Stock boot image detected
- Backing up stock boot image
- Patching ramdisk
Loading cpio: [ramdisk.cpio]
Add entry [init] (0750)
Patch with flag KEEPVERITY=[false] KEEPFORCEENCRYPT=[true]
Remove [verity_key]
Loading cpio: [ramdisk.cpio.orig]
Backup mismatch entry: [init] -> [.backup/init]
Backup missing entry: [verity_key] -> [.backup/verity_key]
Create directory [.backup] (0000)
Add entry [.backup/.magisk] (0000)
Dump cpio: [ramdisk.cpio]
Loading dtbs from [kernel_dtb]
Found fstab in dtb.0000
Found entry [system] in fstab
Found pattern [,verify]
Found entry [vendor] in fstab
Found pattern [,verify]
Found fstab in dtb.0001
Found entry [system] in fstab
Found pattern [,verify]
Found entry [vendor] in fstab
Found pattern [,verify]
Found fstab in dtb.0002
Found entry [system] in fstab
Found pattern [,verify]
Found entry [vendor] in fstab
Found pattern [,verify]
Found fstab in dtb.0003
Found entry [system] in fstab
Found pattern [,verify]
Found entry [vendor] in fstab
Found pattern [,verify]
- Patching fstab in kernel_dtb
- Repacking boot image
Parsing boot image: [/data/user_de/0/com.topjohnwu.magisk/install/boot.img]
HEADER_VER      [0]
KERNEL_SZ       [10251215]
RAMDISK_SZ      [1508130]
SECOND_SZ       [0]
EXTRA_SZ        [0]
OS_VERSION      [9.0.0]
OS_PATCH_LEVEL  [2019-05]
PAGESIZE        [2048]
NAME            []
CMDLINE         [console=ttyHSL0,115200,n8 androidboot.console=ttyHSL0 androidboot.hardware=qcom androidboot.memcg=false user_debug=30 msm_rtb.filter=0x237 ehci-hcd.park=3 androidboot.bootdevice=7824900.sdhci lpm_levels.sleep_disabled=1 earlycon=msm_hsl_uart,0x78B0000 firmware_class.path=/vendor/firmware_mnt/image loop.max_part=7 vmalloc=400M buildvariant=user]
CHECKSUM        [77549a9032634b395110bb3a9eb0227033621915000000000000000000000000]
KERNEL_DTB      [896823]
KERNEL_FMT      [raw]
RAMDISK_FMT     [gzip]
Repack to boot image: [new-boot.img]
HEADER_VER      [0]
KERNEL_SZ       [10247087]
RAMDISK_SZ      [1770428]
SECOND_SZ       [0]
EXTRA_SZ        [0]
OS_VERSION      [9.0.0]
OS_PATCH_LEVEL  [2019-05]
PAGESIZE        [2048]
NAME            []
CMDLINE         [console=ttyHSL0,115200,n8 androidboot.console=ttyHSL0 androidboot.hardware=qcom androidboot.memcg=false user_debug=30 msm_rtb.filter=0x237 ehci-hcd.park=3 androidboot.bootdevice=7824900.sdhci lpm_levels.sleep_disabled=1 earlycon=msm_hsl_uart,0x78B0000 firmware_class.path=/vendor/firmware_mnt/image loop.max_part=7 vmalloc=400M buildvariant=user]
CHECKSUM        [3a228177359924a940499d2a84e7dcc6ec41deca000000000000000000000000]
- Signing boot image with verity keys

****************************
 Output file is placed in 
 /storage/emulated/0/Download/magisk_patched.img 
****************************
- All done!




What did u do to fix this?? Cuz that's exactly what mine is doing but I can't get it to open fastboot
 

Top Liked Posts

  • There are no posts matching your filters.
  • 1
    I flashed the patched magisk boot.img and I get an infinite loop showing this key: 80012A99-867FDA48-4E357816-0E549F1B-B067FBD5

    I used Magisk Manager 7.4.0. G6 Play XT1922-4 Pie. Screenshot attached.

    Code:
    - Device platform: armeabi-v7a
    - Copying image to cache
    - Boot image is signed with AVB 1.0
    1566+0 records in
    1566+0 records out
    1603584 bytes transferred in 0.030 secs (53452800 bytes/sec)
    1045+1 records in
    1045+1 records out
    1070668 bytes transferred in 0.020 secs (53533400 bytes/sec)
    - Unpacking boot image
    Parsing boot image: [/data/user_de/0/com.topjohnwu.magisk/install/boot.img]
    HEADER_VER      [0]
    KERNEL_SZ       [10251215]
    RAMDISK_SZ      [1508130]
    SECOND_SZ       [0]
    EXTRA_SZ        [0]
    OS_VERSION      [9.0.0]
    OS_PATCH_LEVEL  [2019-05]
    PAGESIZE        [2048]
    NAME            []
    CMDLINE         [console=ttyHSL0,115200,n8 androidboot.console=ttyHSL0 androidboot.hardware=qcom androidboot.memcg=false user_debug=30 msm_rtb.filter=0x237 ehci-hcd.park=3 androidboot.bootdevice=7824900.sdhci lpm_levels.sleep_disabled=1 earlycon=msm_hsl_uart,0x78B0000 firmware_class.path=/vendor/firmware_mnt/image loop.max_part=7 vmalloc=400M buildvariant=user]
    CHECKSUM        [77549a9032634b395110bb3a9eb0227033621915000000000000000000000000]
    KERNEL_DTB      [896823]
    KERNEL_FMT      [raw]
    RAMDISK_FMT     [gzip]
    - Checking ramdisk status
    Loading cpio: [ramdisk.cpio]
    - Stock boot image detected
    - Backing up stock boot image
    - Patching ramdisk
    Loading cpio: [ramdisk.cpio]
    Add entry [init] (0750)
    Patch with flag KEEPVERITY=[false] KEEPFORCEENCRYPT=[true]
    Remove [verity_key]
    Loading cpio: [ramdisk.cpio.orig]
    Backup mismatch entry: [init] -> [.backup/init]
    Backup missing entry: [verity_key] -> [.backup/verity_key]
    Create directory [.backup] (0000)
    Add entry [.backup/.magisk] (0000)
    Dump cpio: [ramdisk.cpio]
    Loading dtbs from [kernel_dtb]
    Found fstab in dtb.0000
    Found entry [system] in fstab
    Found pattern [,verify]
    Found entry [vendor] in fstab
    Found pattern [,verify]
    Found fstab in dtb.0001
    Found entry [system] in fstab
    Found pattern [,verify]
    Found entry [vendor] in fstab
    Found pattern [,verify]
    Found fstab in dtb.0002
    Found entry [system] in fstab
    Found pattern [,verify]
    Found entry [vendor] in fstab
    Found pattern [,verify]
    Found fstab in dtb.0003
    Found entry [system] in fstab
    Found pattern [,verify]
    Found entry [vendor] in fstab
    Found pattern [,verify]
    - Patching fstab in kernel_dtb
    - Repacking boot image
    Parsing boot image: [/data/user_de/0/com.topjohnwu.magisk/install/boot.img]
    HEADER_VER      [0]
    KERNEL_SZ       [10251215]
    RAMDISK_SZ      [1508130]
    SECOND_SZ       [0]
    EXTRA_SZ        [0]
    OS_VERSION      [9.0.0]
    OS_PATCH_LEVEL  [2019-05]
    PAGESIZE        [2048]
    NAME            []
    CMDLINE         [console=ttyHSL0,115200,n8 androidboot.console=ttyHSL0 androidboot.hardware=qcom androidboot.memcg=false user_debug=30 msm_rtb.filter=0x237 ehci-hcd.park=3 androidboot.bootdevice=7824900.sdhci lpm_levels.sleep_disabled=1 earlycon=msm_hsl_uart,0x78B0000 firmware_class.path=/vendor/firmware_mnt/image loop.max_part=7 vmalloc=400M buildvariant=user]
    CHECKSUM        [77549a9032634b395110bb3a9eb0227033621915000000000000000000000000]
    KERNEL_DTB      [896823]
    KERNEL_FMT      [raw]
    RAMDISK_FMT     [gzip]
    Repack to boot image: [new-boot.img]
    HEADER_VER      [0]
    KERNEL_SZ       [10247087]
    RAMDISK_SZ      [1770428]
    SECOND_SZ       [0]
    EXTRA_SZ        [0]
    OS_VERSION      [9.0.0]
    OS_PATCH_LEVEL  [2019-05]
    PAGESIZE        [2048]
    NAME            []
    CMDLINE         [console=ttyHSL0,115200,n8 androidboot.console=ttyHSL0 androidboot.hardware=qcom androidboot.memcg=false user_debug=30 msm_rtb.filter=0x237 ehci-hcd.park=3 androidboot.bootdevice=7824900.sdhci lpm_levels.sleep_disabled=1 earlycon=msm_hsl_uart,0x78B0000 firmware_class.path=/vendor/firmware_mnt/image loop.max_part=7 vmalloc=400M buildvariant=user]
    CHECKSUM        [3a228177359924a940499d2a84e7dcc6ec41deca000000000000000000000000]
    - Signing boot image with verity keys
    
    ****************************
     Output file is placed in 
     /storage/emulated/0/Download/magisk_patched.img 
    ****************************
    - All done!