Magisk made my phone stuck on bootloop unable to uninstall - Magisk

Last evening Magisk asked me to install it's latest app version (v6.1.0 I suppose, can't remember), and so i did, then it asked me to update the Magisk root itself (to v18.0 I suppose), and so i did. Then my phone was stuck on a eternal
bootloop.
i tried to remove Magisk via TWRP (like many people did before) using the official uninstall .zip file, to no avail; TWRP is unable to unpack boot image.
the log says:
Iperation_start: 'Flashing'
Installing zip file '/sdcard/URAAA/Magisk-uninstaller-20181208.zip'
Checking for Digest file...
Skipping Digest check: no Digest file found
I:Update binary zip
I:Zip does not contain SELinux file_contexts file in its root.
I:Legacy property environment not used in updater.
Archive: /sdcard/URAAA/Magisk-uninstaller-20181208.zip
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
inflating: arm/magisk
inflating: arm/magiskboot
inflating: chromeos/futility
inflating: chromeos/kernel.keyblock
inflating: chromeos/kernel_data_key.vbprivk
inflating: util_functions.sh
inflating: x86/magisk
inflating: x86/magiskboot
inflating: META-INF/MANIFEST.MF
inflating: META-INF/CERT.SF
inflating: META-INF/CERT.RSA
************************
Magisk Uninstaller
************************
- Mounting /system, /vendor
- Device platform: arm64
- Found boot/ramdisk image: /dev/block/sde36
- Unpacking boot image
MagiskBoot v18.0(18000) (by topjohnwu) - Boot Image Modification Tool
Parsing boot image: [/dev/block/sde36]
No boot image magic found!
! Unable to unpack boot image
- Unmounting partitions
Updater process ended with ERROR: 1
I:Install took 10 second(s).
Error installing zip file '/sdcard/URAAA/Magisk-uninstaller-20181208.zip'​
After that i also tried redownloading the uninstaller, same error; installing version 18.0 via trwp, same problem; installing version 16.0 from a .zip already used that way, also same problem.
So, why is it not working, did the boot image get corrupted and therefore can't be mounted or booted ?
can I solve this without reflashing my phone and losing my files and app configurations ?
Backgound:
Phone: Xiaomi Mi Note 2, 128 GB storage, 6 GB RAM
Software: MIUI MINote2 Global V9.5.2.0.NADMIFA
TWRP: v3.2.1-0
unlocked and rooted as per: http en.miui.com thread-415067-1-1.html

The error is telling you it can't find the boot image that was supposed to have been backed up when installing Magisk in the first place.
Flashing the stock boot image or kernel usually removes Magisk and fixes these boot problems.

how
gk1984 said:
The error is telling you it can't find the boot image that was supposed to have been backed up when installing Magisk in the first place.
Flashing the stock boot image or kernel usually removes Magisk and fixes these boot problems.
Click to expand...
Click to collapse
where do i found the right boot image to flash ? i had months ago flashed the original rom (all partitions) from the vendor website and using their tool, it came in a big fat zip file.
can q flash it from TWRP or a have to use adb ?

Related

[FLASHCAST ROM] [V1.1 - 11/29/13] PwnedCast ROM - Based on 13300

This ROM has been replaced with Eureka-ROM, which is available at http://forum.xda-developers.com/showthread.php?t=2578653
I am happy to announce my new ROM, PwnedCast ROM! This is a replacement for my current rooted ROM.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Now with 500+ installs and counting!
This ROM is based on the 13300 stock image, but with some cool features! The big improvement is the addition of my OTA update system called PwnedCast OTA.
This means that if I ever release an update for this ROM, your ChomeCast will automatically download and install the update!
For more info, click the link under Features. Don't worry though, ill still post updated links in this thread.
Features:
Root SSH/Telnet Access
Uses DHCP DNS Servers
Google OTA's Disabled
Custom Boot Image
PwnedCast OTA Update Engine! Read more Here: http://ota.team-eureka.com/
PwnedCast Recovery Image, which is based on FlashCast V1.1.1
KyoCast Built In!
More to Come?...
Install Instructions:
Setup and Install FlashCast V1.1.1 on a Jump Drive: http://forum.xda-developers.com/showthread.php?t=2452838
Rename the Zip to eureka_image.zip, and place in the root folder on the FlashCast Jump Drive.
Plug the FlashCast jump drive into the ChromeCast, hold the button, and plug in power to boot the device.
NOTE: If you try flashing with FlashCast V1.0, the install will fail.
Flashing will take 6~ minutes, be patient! As long as the ChromeCast LED is white, it is flashing.
Once done, the device will reboot.
Enjoy!
Downloads:
All New Versions: http://forum.xda-developers.com/showthread.php?t=2578653
1.1 [11/29/13]: http://pdl.team-eureka.com/ota/13300.010.zip
Thanks To:
death2all110
ften
GTVHacker
tchebb - Without him, this would have not been possible.
tvall
Anyone Else I Missed!
Changelog:
1.1 [11/29/13] - Updated recovery to flashcast 1.1.1, PwnedCast-OTA updated, KyoCast built in
1.0 [11/6/13] - Initial Release
Extras/Mods:
Disable PwnedCast OTA: http://pdl.team-eureka.com/ota/disable/eureka_image.zip
Re-Enable PwnedCast OTA: http://pdl.team-eureka.com/ota/enable/eureka_image.zip
Change DNS to UnLocator: http://forum.xda-developers.com/showthread.php?t=2455888
Source:
PwnedCast-ROM: https://github.com/team-eureka/PwnedCast-ROM
Thank you for this^^^^^^:thumbup:
Sent from my SAMSUNG-SGH-I317 using Tapatalk
Awesome man that OTA is great effort. Kudos
Does this work on the ones with the latest firmware?
Sent from the TermiNOTEr 2!
borijess said:
Does this work on the ones with the latest firmware?
Sent from the TermiNOTEr 2!
Click to expand...
Click to collapse
This ROM requires a exploitable device that can run FlashCast.
Nice work. The OTA updating works like a charm and it's nice to know that my 'casts will just update themselves when and as needed.
In light of Kynonz' release, perhaps a partnership is in order? Combine your OTA update capabilities with his custom whitelist feature. That would be a truly awesome ROM.
Croptop said:
Nice work. The OTA updating works like a charm and it's nice to know that my 'casts will just update themselves when and as needed.
In light of Kynonz' release, perhaps a partnership is in order? Combine your OTA update capabilities with his custom whitelist feature. That would be a truly awesome ROM.
Click to expand...
Click to collapse
Let's just say things are looking good ATM. But until anything happens, you can flash his mod over my firmware without any issues.
ddggttff3 said:
Let's just say things are looking good ATM. But until anything happens, you can flash his mod over my firmware without any issues.
Click to expand...
Click to collapse
Am I understanding you correctly? If I flash Kyonz's mod onto your OTA ROM, I'll get his custom whitelist AND still keep your OTA updates? If so, nice!
Croptop said:
Am I understanding you correctly? If I flash Kyonz's mod onto your OTA ROM, I'll get his custom whitelist AND still keep your OTA updates? If so, nice!
Click to expand...
Click to collapse
You will still get OTA updates, but an OTA would remove the feature, unless I have said mod added in my next release.
But for the good news, I don't have any new OTA's in the works atm, so there should be no need to worry
Actually, it might be a good idea for me to code-up a MOD saving feature, so mods could be auto downloaded/updated during the OTA process as well... guess I have some researching to do.
Tried flashing your new release. But it keeps failing for what I don't know? Did everything I did the first time.
It shouldn't be a problem just flashing this over the other Rom right?
Oooooh I did change to FlashCast 1.1 which worked perfect!:good:
But when I put the new Rom on the jumpdrive, then rename it like you said.
After powering on the device holding the button til the white light. Soon as I let go it turns red
this is what the log gave me:
Reading recovery parameters
Looking for mods on /dev/sda1
Resetting crash counter and boot mode
Clearing OTAs
Copying /usr/share/flasher/remove-ota to /tmp/tmp.GdFCjI
Flashing mod at /tmp/tmp.GdFCjI
Mounting cache (mtd4) at /tmp/tmp.kRpbiB
Removing temp-ota.zip and ota.zip from cache partition (/tmp/tmp.kRpbiB)
Unmounting /tmp/tmp.kRpbiB
Removing temporary mod directory /tmp/tmp.GdFCjI
Mounting /dev/sda1 to /tmp/tmp.zrwptd
Opened log file /tmp/tmp.zrwptd/flashcast-logs/flashcast-3.log
SETUP FAILED: No images found on /dev/sda1
Unmounting and removing /tmp/tmp.zrwptd
Bajanman said:
Tried flashing your new release. But it keeps failing for what I don't know? Did everything I did the first time.
It shouldn't be a problem just flashing this over the other Rom right?
Oooooh I did change to FlashCast 1.1 which worked perfect!:good:
But when I put the new Rom on the jumpdrive, then rename it like you said.
After powering on the device holding the button til the white light. Soon as I let go it turns red
this is what the log gave me:
Reading recovery parameters
Looking for mods on /dev/sda1
Resetting crash counter and boot mode
Clearing OTAs
Copying /usr/share/flasher/remove-ota to /tmp/tmp.GdFCjI
Flashing mod at /tmp/tmp.GdFCjI
Mounting cache (mtd4) at /tmp/tmp.kRpbiB
Removing temp-ota.zip and ota.zip from cache partition (/tmp/tmp.kRpbiB)
Unmounting /tmp/tmp.kRpbiB
Removing temporary mod directory /tmp/tmp.GdFCjI
Mounting /dev/sda1 to /tmp/tmp.zrwptd
Opened log file /tmp/tmp.zrwptd/flashcast-logs/flashcast-3.log
SETUP FAILED: No images found on /dev/sda1
Unmounting and removing /tmp/tmp.zrwptd
Click to expand...
Click to collapse
did you rename the ROM zip to eureka_image.zip, and place it on the root directory of the flashcast jump drive?
ddggttff3 said:
did you rename the ROM zip to eureka_image.zip, and place it on the root directory of the flashcast jump drive?
Click to expand...
Click to collapse
Yes. Have re-downloaded it about 4 times thinking I had bad downloads.
Going to keep trying
Sent from my SAMSUNG-SGH-I317 using Tapatalk
I am having problem too. I installed FlastCast V1.1 and it went perfect, the device rebooted. Then during the process of PwnedCast ROM the white led is flashing flashing and flashing. I waited for like good 20mins, the device didnt reboot and led kept flashing.
After disconnecting power, the here is my log file (link below). It seems everything went OK but the device just doesnt reboot.
https://dl.dropboxusercontent.com/u/9966680/flashcast-1.log
Now when i start chromecast in normal mode, the white led is still flashing. I am basically stuck.Please HELP!!!
NOTE: During the whole process home WiFi was off just in case.
Also i made minor modification to where i disabled OTA in image.sh file by removing the if-Then block.
paracha3 said:
I am having problem too. I installed FlastCast V1.1 and it went perfect, the device rebooted. Then during the process of PwnedCast ROM the white led is flashing flashing and flashing. I waited for like good 20mins, the device didnt reboot and led kept flashing.
After disconnecting power, the here is my log file (link below). It seems everything went OK but the device just doesnt reboot.
https://dl.dropboxusercontent.com/u/9966680/flashcast-1.log
Now when i start chromecast in normal mode, the white led is still flashing. I am basically stuck.Please HELP!!!
NOTE: During the whole process home WiFi was off just in case.
Click to expand...
Click to collapse
Similar to you. But if I just BOOT up my Chromecast it'll boot to the pwned screen with the older Rom.
Just wondering why I can't get the new one to load!
EDIT: just went looked at the old eureka image vs the new one. Here's what I GOT:
Sent from my SAMSUNG-SGH-I317 using Tapatalk
paracha3 said:
I am having problem too. I installed FlastCast V1.1 and it went perfect, the device rebooted. Then during the process of PwnedCast ROM the white led is flashing flashing and flashing. I waited for like good 20mins, the device didnt reboot and led kept flashing.
After disconnecting power, the here is my log file (link below). It seems everything went OK but the device just doesnt reboot.
https://dl.dropboxusercontent.com/u/9966680/flashcast-1.log
Now when i start chromecast in normal mode, the white led is still flashing. I am basically stuck.Please HELP!!!
NOTE: During the whole process home WiFi was off just in case.
Also i made minor modification to where i disabled OTA in image.sh file by removing the if-Then block.
Click to expand...
Click to collapse
if the white LED is flashing, that normally means the device is booting the system partition. Strange though, the log shows the flash went perfect. The modification to the flash file should not cause an issue tho.
Bajanman said:
Similar to you. But if I just BOOT up my Chromecast it'll boot to the pwned screen with the older Rom.
Just wondering why I can't get the new one to load!
Sent from my SAMSUNG-SGH-I317 using Tapatalk
Click to expand...
Click to collapse
The log you posted earlier showed that flashcast was not able to find the zip file, so make sure its named correctly, and you don't have your file extension name hidden. This can cause you to name it eureka_image.zip.zip http://windows.microsoft.com/en-us/...#show-hide-file-name-extensions=windows-vista
ddggttff3 said:
if the white LED is flashing, that normally means the device is booting the system partition. Strange though, the log shows the flash went perfect. The modification to the flash file should not cause an issue tho.
The log you posted earlier showed that flashcast was not able to find the zip file, so make sure its named correctly, and you don't have your file extension name hidden. This can cause you to name it eureka_image.zip.zip http://windows.microsoft.com/en-us/...#show-hide-file-name-extensions=windows-vista
Click to expand...
Click to collapse
This^^^^^^^^^^ HERE fixed it. Soon as I did the folder options. Plugged it back up worked first try:thumbup:. Finishing as I write this NOW....
Thank you thank you...
Sent from my SAMSUNG-SGH-I317 using Tapatalk
Bajanman said:
Similar to you. But if I just BOOT up my Chromecast it'll boot to the pwned screen with the older Rom.
Just wondering why I can't get the new one to load!
EDIT: just went looked at the old eureka image vs the new one. Here's what I GOT:
Sent from my SAMSUNG-SGH-I317 using Tapatalk
Click to expand...
Click to collapse
That is because I moved the mod files into the system.img file to make the ROM smaller, and it helps speed up the flashing process. If you want to see the files I have added, the source page for this ROM has all the raw files.
ddggttff3 said:
if the white LED is flashing, that normally means the device is booting the system partition. Strange though, the log shows the flash went perfect. The modification to the flash file should not cause an issue tho.
Click to expand...
Click to collapse
Redid the FlastCast V1.1 from start and this time it worked fine. I dont know what was wrong.
ddggttff3 said:
That is because I moved the mod files into the system.img file to make the ROM smaller, and it helps speed up the flashing process. If you want to see the files I have added, the source page for this ROM has all the raw files.
Click to expand...
Click to collapse
Oh ok I understand. And Thanks. I had just thought that was my problem with flashing. But you fixed it for me.
Thank you again @ddggttff3
Sent from my SAMSUNG-SGH-I317 using Tapatalk
Hi Mr. ddggttff3,
I am having the same issues reported earlier...
And I am pretty sure about the filename of the file, and that the version installed earlier was Flashcast 1.1.
Here you can check the first log file indicating a successful flash of the V1.1:
Code:
Clearing OTAs
Changing directory to /usr/share/flasher/remove-ota
Mounting cache (mtd4) at /tmp/tmp.i7zvxd
Removing temp-ota.zip and ota.zip from cache partition (/tmp/tmp.i7zvxd)
Unmounting /tmp/tmp.i7zvxd
Mounting /dev/sda1 to /tmp/tmp.MpeoDU
Opened log file /tmp/tmp.MpeoDU/flashcast-1.log
Found eureka_image.zip, using
Archive: /tmp/tmp.MpeoDU/eureka_image.zip
inflating: boot.img
creating: files/
inflating: files/adbd
inflating: files/busybox
inflating: files/clear_crash_counter
inflating: files/update_engine
inflating: imager.sh
creating: images/
inflating: images/logo1080p_10fps0000.png
inflating: images/logo1080p_10fps0001.png
inflating: images/logo1080p_10fps0002.png
inflating: images/logo1080p_10fps0003.png
inflating: images/logo1080p_10fps0004.png
inflating: images/logo1080p_10fps0005.png
inflating: images/logo1080p_10fps0006.png
inflating: images/logo1080p_10fps0007.png
inflating: images/logo1080p_10fps0008.png
inflating: images/logo1080p_10fps0009.png
inflating: images/logo1080p_10fps0010.png
inflating: images/logo1080p_10fps0011.png
inflating: images/logo1080p_10fps0012.png
inflating: images/logo1080p_10fps0013.png
inflating: images/logo1080p_10fps0014.png
inflating: images/logo1080p_10fps0015.png
inflating: images/logo1080p_10fps0016.png
inflating: images/logo1080p_10fps0017.png
inflating: images/logo1080p_10fps0018.png
inflating: images/logo1080p_10fps0019.png
inflating: images/logo1080p_10fps0020.png
inflating: images/logo1080p_10fps0021.png
inflating: images/logo1080p_10fps0022.png
inflating: images/logo1080p_10fps0023.png
inflating: images/logo1080p_10fps0024.png
inflating: images/logo1080p_10fps0025.png
inflating: images/logo1080p_10fps0026.png
inflating: images/logo1080p_10fps0027.png
inflating: images/logo1080p_10fps0028.png
inflating: images/logo1080p_10fps0029.png
inflating: images/logo1080p_10fps0030.png
inflating: images/logo1080p_10fps0031.png
inflating: images/logo1080p_10fps0032.png
inflating: images/logo1080p_10fps0033.png
inflating: images/logo1080p_10fps0034.png
inflating: images/logo1080p_10fps0035.png
inflating: images/logo1080p_10fps0036.png
inflating: images/logo1080p_10fps0037.png
inflating: images/logo1080p_10fps0038.png
inflating: images/logo1080p_10fps0039.png
inflating: images/logo1080p_10fps0040.png
inflating: images/logo1080p_10fps0041.png
inflating: images/logo1080p_10fps0042.png
inflating: images/logo1080p_10fps0043.png
inflating: images/logo1080p_10fps0044.png
inflating: images/logo1080p_10fps0045.png
inflating: images/logo1080p_10fps0046.png
inflating: images/logo1080p_10fps0047.png
inflating: images/logo1080p_10fps0048.png
inflating: images/logo1080p_10fps0049.png
inflating: images/logo1080p_10fps0050.png
inflating: images/logo1080p_10fps0051.png
inflating: images/logo1080p_10fps0052.png
inflating: images/logo1080p_10fps0053.png
inflating: images/logo1080p_10fps0054.png
inflating: images/logo1080p_10fps0055.png
inflating: images/logo1080p_10fps0056.png
inflating: images/logo1080p_10fps0057.png
inflating: images/logo1080p_10fps0058.png
inflating: images/logo1080p_10fps0059.png
inflating: images/logo480p_10fps0000.png
inflating: images/logo480p_10fps0001.png
inflating: images/logo480p_10fps0002.png
inflating: images/logo480p_10fps0003.png
inflating: images/logo480p_10fps0004.png
inflating: images/logo480p_10fps0005.png
inflating: images/logo480p_10fps0006.png
inflating: images/logo480p_10fps0007.png
inflating: images/logo480p_10fps0008.png
inflating: images/logo480p_10fps0009.png
inflating: images/logo480p_10fps0010.png
inflating: images/logo480p_10fps0011.png
inflating: images/logo480p_10fps0012.png
inflating: images/logo480p_10fps0013.png
inflating: images/logo480p_10fps0014.png
inflating: images/logo480p_10fps0015.png
inflating: images/logo480p_10fps0016.png
inflating: images/logo480p_10fps0017.png
inflating: images/logo480p_10fps0018.png
inflating: images/logo480p_10fps0019.png
inflating: images/logo480p_10fps0020.png
inflating: images/logo480p_10fps0021.png
inflating: images/logo480p_10fps0022.png
inflating: images/logo480p_10fps0023.png
inflating: images/logo480p_10fps0024.png
inflating: images/logo480p_10fps0025.png
inflating: images/logo480p_10fps0026.png
inflating: images/logo480p_10fps0027.png
inflating: images/logo480p_10fps0028.png
inflating: images/logo480p_10fps0029.png
inflating: images/logo480p_10fps0030.png
inflating: images/logo480p_10fps0031.png
inflating: images/logo480p_10fps0032.png
inflating: images/logo480p_10fps0033.png
inflating: images/logo480p_10fps0034.png
inflating: images/logo480p_10fps0035.png
inflating: images/logo480p_10fps0036.png
inflating: images/logo480p_10fps0037.png
inflating: images/logo480p_10fps0038.png
inflating: images/logo480p_10fps0039.png
inflating: images/logo480p_10fps0040.png
inflating: images/logo480p_10fps0041.png
inflating: images/logo480p_10fps0042.png
inflating: images/logo480p_10fps0043.png
inflating: images/logo480p_10fps0044.png
inflating: images/logo480p_10fps0045.png
inflating: images/logo480p_10fps0046.png
inflating: images/logo480p_10fps0047.png
inflating: images/logo480p_10fps0048.png
inflating: images/logo480p_10fps0049.png
inflating: images/logo480p_10fps0050.png
inflating: images/logo480p_10fps0051.png
inflating: images/logo480p_10fps0052.png
inflating: images/logo480p_10fps0053.png
inflating: images/logo480p_10fps0054.png
inflating: images/logo480p_10fps0055.png
inflating: images/logo480p_10fps0056.png
inflating: images/logo480p_10fps0057.png
inflating: images/logo480p_10fps0058.png
inflating: images/logo480p_10fps0059.png
inflating: images/logo720p_10fps0000.png
inflating: images/logo720p_10fps0001.png
inflating: images/logo720p_10fps0002.png
inflating: images/logo720p_10fps0003.png
inflating: images/logo720p_10fps0004.png
inflating: images/logo720p_10fps0005.png
inflating: images/logo720p_10fps0006.png
inflating: images/logo720p_10fps0007.png
inflating: images/logo720p_10fps0008.png
inflating: images/logo720p_10fps0009.png
inflating: images/logo720p_10fps0010.png
inflating: images/logo720p_10fps0011.png
inflating: images/logo720p_10fps0012.png
inflating: images/logo720p_10fps0013.png
inflating: images/logo720p_10fps0014.png
inflating: images/logo720p_10fps0015.png
inflating: images/logo720p_10fps0016.png
inflating: images/logo720p_10fps0017.png
inflating: images/logo720p_10fps0018.png
inflating: images/logo720p_10fps0019.png
inflating: images/logo720p_10fps0020.png
inflating: images/logo720p_10fps0021.png
inflating: images/logo720p_10fps0022.png
inflating: images/logo720p_10fps0023.png
inflating: images/logo720p_10fps0024.png
inflating: images/logo720p_10fps0025.png
inflating: images/logo720p_10fps0026.png
inflating: images/logo720p_10fps0027.png
inflating: images/logo720p_10fps0028.png
inflating: images/logo720p_10fps0029.png
inflating: images/logo720p_10fps0030.png
inflating: images/logo720p_10fps0031.png
inflating: images/logo720p_10fps0032.png
inflating: images/logo720p_10fps0033.png
inflating: images/logo720p_10fps0034.png
inflating: images/logo720p_10fps0035.png
inflating: images/logo720p_10fps0036.png
inflating: images/logo720p_10fps0037.png
inflating: images/logo720p_10fps0038.png
inflating: images/logo720p_10fps0039.png
inflating: images/logo720p_10fps0040.png
inflating: images/logo720p_10fps0041.png
inflating: images/logo720p_10fps0042.png
inflating: images/logo720p_10fps0043.png
inflating: images/logo720p_10fps0044.png
inflating: images/logo720p_10fps0045.png
inflating: images/logo720p_10fps0046.png
inflating: images/logo720p_10fps0047.png
inflating: images/logo720p_10fps0048.png
inflating: images/logo720p_10fps0049.png
inflating: images/logo720p_10fps0050.png
inflating: images/logo720p_10fps0051.png
inflating: images/logo720p_10fps0052.png
inflating: images/logo720p_10fps0053.png
inflating: images/logo720p_10fps0054.png
inflating: images/logo720p_10fps0055.png
inflating: images/logo720p_10fps0056.png
inflating: images/logo720p_10fps0057.png
inflating: images/logo720p_10fps0058.png
inflating: images/logo720p_10fps0059.png
inflating: system.img
Handing off control to imager.sh
Changing directory to /tmp/tmp.BZZIbw
ROOTED-13300-V1.1: Imager.sh now running.
ROOTED-13300-V1.1: Flashing Kernel...
Flashing boot.img to kernel (mtd2)
ROOTED-13300-V1.1: Flashing System...
Flashing system.img to rootfs (mtd3)
ROOTED-13300-V1.1: Deleting boot.img and system.img to free up space in /tmp so we can mount SquashFS.
ROOTED-13300-V1.1: Starting SquashFS Modification
Setting up squashfs union at /tmp/tmp.iwHWIu
ROOTED-13300-V1.1: Replacing Boot Animation
ROOTED-13300-V1.1: Disabling OTA Updates
ROOTED-13300-V1.1: Adding BusyBox Tools
ROOTED-13300-V1.1: Adding ADB
ROOTED-13300-V1.1: Enabling ADB & Telnet at system startup
ROOTED-13300-V1.1: Done editing SquashFS, Now compressing/saving.
Reflashing squashfs union at /tmp/tmp.iwHWIu
Parallel mksquashfs: Using 1 processor
Creating 4.0 filesystem on /tmp/tmp.iwHWIu/repack.sqfs, block size 131072.
Exportable Squashfs 4.0 filesystem, gzip compressed, data block size 131072
compressed data, compressed metadata, compressed fragments, no xattrs
duplicates are removed
Filesystem size 70978.88 Kbytes (69.32 Mbytes)
54.15% of uncompressed filesystem size (131068.61 Kbytes)
Inode table size 20273 bytes (19.80 Kbytes)
27.67% of uncompressed inode table size (73273 bytes)
Directory table size 19112 bytes (18.66 Kbytes)
43.26% of uncompressed directory table size (44175 bytes)
Number of duplicate files found 145
Number of inodes 1783
Number of files 1311
Number of fragments 75
Number of symbolic links 381
Number of device nodes 0
Number of fifo nodes 0
Number of socket nodes 0
Number of directories 91
Number of ids (unique uids + gids) 5
Number of uids 4
root (0)
default (1000)
unknown (1013)
unknown (1001)
Number of gids 5
root (0)
default (1000)
unknown (1013)
unknown (1001)
unknown (1006)
Flashing /tmp/tmp.iwHWIu/repack.sqfs to rootfs (mtd3)
ROOTED-13300-V1.1: Wiping data, AKA, factory reset.
Mounting userdata (mtd5) at /tmp/tmp.P1Eu5S
Clearing userdata partition (/tmp/tmp.P1Eu5S)
Unmounting /tmp/tmp.P1Eu5S
ROOTED-13300-V1.1: Script Finished!
Flashing succeeded
Rebooting
Unmounting and removing /tmp/tmp.MpeoDU
And here is the second log, telling me I am not updated:
Code:
Clearing OTAs
Changing directory to /usr/share/flasher/remove-ota
Mounting cache (mtd4) at /tmp/tmp.UZuHML
Removing temp-ota.zip and ota.zip from cache partition (/tmp/tmp.UZuHML)
Unmounting /tmp/tmp.UZuHML
Mounting /dev/sda1 to /tmp/tmp.hd1LsI
Opened log file /tmp/tmp.hd1LsI/flashcast-2.log
Found eureka_image.zip, using
Archive: /tmp/tmp.hd1LsI/eureka_image.zip
inflating: boot.img
inflating: eureka_recovery.img
inflating: imager.sh
inflating: system.img
Handing off control to imager.sh
Changing directory to /tmp/tmp.HpodAB
PwnedCast-13300-V1-R7: Imager.sh now running
IMAGER.SH FAILED: PwnedCast-13300-V1-R7: Installation Cancelled, Please Update to Flashcast Version 1.1 or Later.
Flashing failed
Unmounting and removing /tmp/tmp.hd1LsI
I have never set the chromecast up, so it may be that your script is expecting an already setup with internet Chromecast?
Thanks and cheers!!

Can't install SuperSU with TWRP, please see logfile

Hello XDA World!
iam a complete rookie to rooting, but it went quite well so far. However, now i got stuck installing SuperSU (already tried older versions, same result) via TWRP.
Rootcheck is always negative.
I would be grateful for any hints.
Regards, Rex
---
My system:
Sony Xperia Z3 compact (D5803)
Andoid Marshmallow 6.0.1
Kernel 3.4.0-perf-gc14c2d5
Here is my logfile from TWRP.
---
Installing zip file '/sdcard/SuperSU-v2.82-201705271822.zip'
Checking for MD5 file...
Skipping MD5 check: no MD5 file found
I:Zip does not contain SELinux file_contexts file in its root.
I:Legacy property environment initialized.
*****************
SuperSU installer
*****************
cat: can't open '/fstab.*': No such file or directory
- Mounting /system, /data and rootfs
mount: mounting /dev/block/mmcblk0p25 on /data failed: Device or resource busy
2+0 records in
2+0 records out
2 bytes (2B) copied, 0.004246 seconds, 471B/s
3+0 records in
3+0 records out
3 bytes (3B) copied, 0.000542 seconds, 5.4KB/s
12+0 records in
12+0 records out
12 bytes (12B) copied, 0.000949 seconds, 12.3KB/s
3+0 records in
3+0 records out
3 bytes (3B) copied, 0.001477 seconds, 2.0KB/s
/tmp/updater: line 989: /system/toolbox: not found
- Extracting files
Archive: /sdcard/SuperSU-v2.82-201705271822.zip
inflating: META-INF/MANIFEST.MF
inflating: META-INF/CERT.SF
inflating: META-INF/CERT.RSA
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
inflating: arm/chattr
inflating: arm/chattr.pie
inflating: arm/libsupol.so
inflating: arm/su
inflating: arm/suinit
inflating: arm/sukernel
inflating: arm/supolicy
inflating: arm64/chromeos/futility
inflating: arm64/libsupol.so
inflating: arm64/su
inflating: arm64/suinit
inflating: arm64/sukernel
inflating: arm64/supolicy
inflating: armv7/chattr.pie
inflating: armv7/libsupol.so
inflating: armv7/su
inflating: armv7/suinit
inflating: armv7/sukernel
inflating: armv7/supolicy
inflating: common/000000deepsleep
inflating: common/99SuperSUDaemon
inflating: common/Superuser.apk
inflating: common/chromeos/kernel.bootloader
inflating: common/chromeos/kernel.config
inflating: common/chromeos/kernel.keyblock
inflating: common/chromeos/kernel_data_key.vbprivk
inflating: common/file_contexts_image
inflating: common/frp_install
inflating: common/hexpatch
inflating: common/init.supersu.rc
inflating: common/init.supersu.rc.24
inflating: common/install-recovery.sh
inflating: common/launch_daemonsu.sh
inflating: mips/chattr.pie
inflating: mips/libsupol.so
inflating: mips/su
inflating: mips/suinit
inflating: mips/sukernel
inflating: mips/supolicy
inflating: mips64/libsupol.so
inflating: mips64/su
inflating: mips64/suinit
inflating: mips64/sukernel
inflating: mips64/supolicy
inflating: x64/libsupol.so
inflating: x64/su
inflating: x64/suinit
inflating: x64/sukernel
inflating: x64/supolicy
inflating: x86/chattr
inflating: x86/chattr.pie
inflating: x86/libsupol.so
inflating: x86/su
inflating: x86/su.pie
inflating: x86/suinit
inflating: x86/sukernel
inflating: x86/supolicy
supolicy v2.82 (ndk:armeabi-v7a) - Copyright (C) 2014-2017 - Chainfire & CCMT
Patching policy ...
(Android M policy compatibility mode)
-permissive:adbd_socket=ok
-permissive:camera_socket=ok
-permissive:functionfs=ok
-permissive:wifip2p_service=ok
-permissive:hci_attach_exec=ok
-permissive:system_server=ok
-permissiveroc_uid_cputime_showstat=ok
-permissive:nfc=ok
-permissive:rild_debug_socket=ok
-permissive:tad_socket=ok
-permissive:file_type=ok
-permissive:sysfs_performance=ok
-permissive:fsck_tmpfs=ok
-permissive:exec_type=ok
-permissiveroperty_type=ok
-permissive:rtc_device=ok
-permissive:surfaceflinger_service=ok
-permissive:binderservicedomain=ok
-permissiveroc_kernel_sched=ok
-permissive:mdns_socket=ok
-permissive:network_score_service=ok
-permissive:node_type=ok
-permissive:registry_service=ok
-permissive:smd_device=ok
-permissive:gatekeeperd_tmpfs=ok
-permissive:ssd_device=ok
-permissive:thermanager_tmpfs=ok
-permissive:ssr_device=ok
-permissive:appwidget_service=ok
-permissivelatform_app=ok
-permissive:ram_device=ok
-permissiveerfprofd_data_file=ok
-permissiveort_type=ok
-permissive:rootfs=ok
-permissive:tmpfs=ok
-permissive:usbfs=ok
-permissive:wcnss_service=ok
-permissive:bootanim_exec=ok
-permissive:gatekeeper_data_file=ok
-permissive:gpsd_tmpfs=ok
-permissive:installd_exec=ok
-permissive:su_tmpfs=ok
-permissiverocessinfo_service=ok
-permissive:untrusted_app_tmpfs=ok
-permissive:cpuctl_device=ok
-permissive:netmgrd_exec=ok
-permissive:launcherapps_service=ok
-permissive:country_detector_service=ok
-permissive:rng_device=ok
-permissive:cgroup=ok
-permissive:drmserver_socket=ok
-permissive:netmgrd_socket=ok
-permissive:qce_device=ok
-permissive:rmt_storage_tmpfs=ok
-permissivepp_device=ok
-permissive:wpa_socket=ok
-permissiveroc_net=ok
-permissive:vdc=ok
-permissive:clatd=ok
-permissive:netd=ok
-permissive:sdcardd=ok
-permissive:zygote=ok
-permissive:debuggerd=ok
-permissive:ipa_dev=ok
-permissive:input_device=ok
-permissive:jobscheduler_service=ok
-permissive:mnt_user_file=ok
-permissiveta_device=ok
-permissive:mediaserver_tmpfs=ok
-permissive:sysfs_ksm=ok
-permissive:sysfs_graphics=ok
-permissive:ueventd_tmpfs=ok
-permissive:serial_service=ok
-permissiveockObserver_service=ok
-permissive:download_file=ok
-permissive:mtp=ok
-permissive:backup_data_file=ok
-permissive:irsc_util_tmpfs=ok
-permissive:servicemanager_tmpfs=ok
-permissive:su_exec=ok
-permissivepp_exec=ok
-permissive:sct_exec=ok
-permissive:tad_exec=ok
-permissive:tee_exec=ok
-permissive:vdc_exec=ok
-permissive:wpa_exec=ok
-permissive:dumpstate_tmpfs=ok
-permissive:mqueue=ok
-permissive:mtp_exec=ok
-permissive:system_ndebug_socket=ok
-permissive:tee=ok
-permissive:sysfs_ssr=ok
-permissive:acdb_data_file=ok
-permissive:adb_data_file=ok
-permissive:anr_data_file=ok
-permissive:app_data_file=ok
-permissive:dhcp_data_file=ok
-permissive:logdr_socket=ok
-permissive:logdw_socket=ok
-permissive:net_data_file=ok
-permissive:shell_data_file=ok
-permissive:vold_data_file=ok
-permissive:vpn_data_file=ok
-permissive:adb_keys_file=ok
-permissive:dalvikcache_data_file=ok
-permissive:media_session_service=ok
-permissive:bluetooth_manager_service=ok
-permissive:keystore_tmpfs=ok
-permissive:fingerprint_service=ok
-permissive:kernel=ok
-permissive:servicediscovery_service=ok
-permissive:dhcp_tmpfs=ok
-permissive:rpmb_device=ok
-permissive:touchfusion_tmpfs=ok
-permissive:msm_irqbalance_socket=ok
-permissivelatform_app_data_file=ok
-permissive:sysfs_mpdecision=ok
-permissive:dhcp=ok
-permissive:hvdcp=ok
-permissive:mediaserver_service=ok
-permissive:recovery_block_device=ok
-permissive:dnsmasq=ok
-permissive:drmserver=ok
-permissive:drmserver_tmpfs=ok
-permissive:keystore=ok
-permissiveroperty_data_file=ok
-permissive:subsys_modem_device=ok
-permissive:vold_exec=ok
-permissive:adbd=ok
-permissive:netmgrd=ok
-permissiveackage_service=ok
-permissive:wcnss_service_tmpfs=ok
-permissive:dumpstate=ok
-permissive:racoon_exec=ok
-permissive:usagestats_service=ok
-permissive:rild_exec=ok
-permissive:unlabeled=ok
-permissive:sysfs_timekeep=ok
-permissiveer_mgr_exec=ok
-permissive:sysfs_fingerprintd_writable=ok
-permissive:bluetooth=ok
-permissive:accessibility_service=ok
-permissive:uncrypt_tmpfs=ok
-permissive:inputflinger=ok
-permissive:dhcp_exec=ok
-permissive:vcs_device=ok
-permissive:fsck_exec=ok
-permissiveer_mgr_service=ok
-permissive:gpsd_exec=ok
-permissive:sensors=ok
-permissiveort=ok
-permissive:qti_init_shell=ok
-permissive:fuse=ok
-permissive:install_data_file=ok
-permissive:mkfs_exec=ok
-permissive:lmkd_exec=ok
-permissive:logd_exec=ok
-permissive:wifi_service=ok
-permissive:netd_exec=ok
-permissive:sgdisk=ok
-permissive:init_exec=ok
-permissive:media_router_service=ok
-permissive:asec_image_file=ok
-permissive:recovery=ok
-permissive:qdsp_device=ok
-permissive:radio_tmpfs=ok
-permissive:tad_tmpfs=ok
-permissive:tee_tmpfs=ok
-permissive:wpa=ok
-permissive:dev_type=ok
-permissive:runas=ok
-permissive:vdc_tmpfs=ok
-permissive:wpa_tmpfs=ok
-permissive:hostapd=ok
-permissive:system_prop=ok
-permissive:vfat=ok
-permissive:fs_type=ok
-permissive:sdcard_external=ok
-permissive:sdcard_internal=ok
-permissive:sdcardd_exec=ok
-permissive:sensors_persist_file=ok
-permissivewntty_device=ok
-permissive:sct_tmpfs=ok
-permissive:selinuxfs=ok
-permissive:tty_device=ok
-permissive:tun_device=ok
-permissive:clatd_exec=ok
-permissive:installd_tmpfs=ok
-permissive:sysfs_thermal=ok
-permissive:uio_device=ok
-permissive:bootanim_tmpfs=ok
-permissive:install_recovery_tmpfs=ok
-permissive:sysinit_exec=ok
-permissive:system_app_service=ok
-permissive:full_device=ok
-permissive:null_device=ok
-permissive:ramdump_device=ok
-permissive:fuse_device=ok
-permissive:usb_device=ok
-permissive:wfd_app=ok
-permissive:camera_device=ok
-permissive:hostapd_exec=ok
-permissive:keystore_exec=ok
-permissive:netpolicy_service=ok
-permissiveower_service=ok
-permissive:user_service=ok
-permissiveersistent_data_block_service=ok
-permissive:tv_input_service=ok
-permissive:input_service=ok
-permissive:tad=ok
-permissive:uncrypt=ok
-permissive:system_app_data_file=ok
-permissive:uimode_service=ok
-permissive:tee_device=ok
-permissive:uncrypt_exec=ok
-permissive:video_device=ok
-permissive:system_api_service=ok
-permissive:timekeep_service=ok
-permissive:blkid_exec=ok
-permissive:labeledfs=ok
-permissive:midi_service=ok
-permissive:mtp_tmpfs=ok
-permissive:audio_device=ok
-permissive:radio_device=ok
-permissive:tfa_amp_exec=ok
-permissive:webviewupdate_service=ok
-permissive:nfc_tmpfs=ok
-permissive:ta_qmi_exec=ok
-permissive:userinit_exec=ok
-permissive:modem_efs_partition_device=ok
-permissivetmx_device=ok
-permissive:restrictions_service=ok
-permissive:textservices_service=ok
-permissive:mdnsd_exec=ok
-permissive:system_app_tmpfs=ok
-permissive:wifiscanner_service=ok
-permissive:bluetooth_data_file=ok
-permissive:tfa_amp_tmpfs=ok
-permissive:usbaccessory_device=ok
-permissive:userinit_data_exec=ok
-permissive:lvm_placeholder=ok
-permissive:rmt_placeholder=ok
-permissive:ffs_prop=ok
-permissive:nfc_prop=ok
-permissive:dex2oat_exec=ok
-permissive:socket_device=ok
-permissive:tee_prop=ok
-permissive:toolbox=ok
-permissive:IProxyService_service=ok
-permissive:bluetooth_tmpfs=ok
-permissive:sysfs_lowmemorykiller=ok
-permissive:system_health_monitor_device=ok
-permissive:installd_socket=ok
-permissive:netd_tmpfs=ok
-permissive:servicemanager_exec=ok
-permissive:irsc_util=ok
-permissive:mnt_media_rw_stub_file=ok
-permissiveroc=ok
-permissive:mlog_qmi_tmpfs=ok
-permissive:scheduling_policy_service=ok
-permissive:ta_qmi_tmpfs=ok
-permissive:asec_public_file=ok
-permissiveroc_cpuinfo=ok
-permissive:tzdatacheck=ok
-permissive:sysfs_usb_supply=ok
-permissive:usermodehelper=ok
-permissive:bluetooth_socket=ok
-permissive:voice_device=ok
-permissive:sensors_socket=ok
-permissive:installd=ok
-permissive:logcat_exec=ok
-permissive:debug_prop=ok
-permissive:netmgrd_tmpfs=ok
-permissive:inputflinger_exec=ok
-permissivean_result_prop=ok
-permissive:security_prop=ok
-permissive:fingerprintd=ok
-permissive:zygote_socket=ok
-permissive:system_server_tmpfs=ok
-permissive:bluetooth_prop=ok
-permissive:mkfs_tmpfs=ok
-permissive:bootchart_data_file=ok
-permissive:rmt_storage_exec=ok
-permissive:ctl_rildaemon_prop=ok
-permissive:irsc_util_exec=ok
-permissive:sysfs_subsys=ok
-permissive:system_radio_prop=ok
-permissive:input_method_service=ok
-permissive:fsck_untrusted=ok
-permissive:contextmount_type=ok
-permissive:lmkd_tmpfs=ok
-permissive:logd_tmpfs=ok
-permissive:uhid_device=ok
-permissive:lock_settings_service=ok
-permissive:ctl_dhcp_pan_prop=ok
-permissive:media_projection_service=ok
-permissive:racoon_socket=ok
-permissive:wcnss_device=ok
-permissive:ctl_bootanim_prop=ok
-permissive:hvdcp_exec=ok
-permissive:restorecon_prop=ok
-permissive:wallpaper_file=ok
-permissive:account_service=ok
-permissive:content_service=ok
-permissive:mount_service=ok
-permissiverint_service=ok
-permissive:sysfs_cpu_online=ok
-permissive:install_recovery=ok
-permissive:net_radio_prop=ok
-permissive:location_service=ok
-permissive:commontime_management_service=ok
-permissive:asec_apk_file=ok
-permissive:sysfs_battery_supply=ok
-permissive:telecom_service=ok
-permissive:console_device=ok
-permissive:userinit_prop=ok
-permissive:sensors_device=ok
-permissive:cameraproxy_service=ok
-permissive:heapdump_data_file=ok
-permissive:rmnet_device=ok
-permissive:sysfs_video=ok
-permissive:connectivity_service=ok
-permissive:notification_service=ok
-permissive:dhcp_prop=ok
-permissive:audio_prop=ok
-permissive:qtaguid_proc=ok
-permissive:ctl_bugreport_prop=ok
-permissive:healthd=ok
-permissive:init=ok
-permissive:qmuxd=ok
-permissive:sysinit=ok
-permissive:fingerprintd_tmpfs=ok
-permissive:keychain_data_file=ok
-permissive:kmem_device=ok
-permissive:avtimer_device=ok
-permissive:netif_type=ok
-permissive:netd_prop=ok
-permissive:gps_control=ok
-permissive:logd_prop=ok
-permissive:init_tmpfs=ok
-permissive:device_policy_service=ok
-permissive:surfaceflinger_exec=ok
-permissive:kmsg_device=ok
-permissive:vold_prop=ok
-permissive:slideshow=ok
-permissive:dreams_service=ok
-permissive:imms_service=ok
-permissive:data_file_type=ok
-permissive:samplingprofiler_service=ok
-permissive:netif=ok
-permissive:bootanim=ok
-permissive:dalvik_prop=ok
-permissive:klog_device=ok
-permissive:smem_log_device=ok
-permissive:zoneinfo_data_file=ok
-permissive:radio=ok
-permissive:inputflinger_service=ok
-permissive:mlstrustedobject=fail
-permissive:debuggerd_tmpfs=ok
-permissive:diskstats_service=ok
-permissiveer_mgr=ok
-permissive:usb_service=ok
-permissive:wallpaper_service=ok
-permissive:firmware_file=ok
-permissive:fscklogs=ok
-permissive:netd_socket=ok
-permissive:msm_irqbalanced_tmpfs=ok
-permissive:search_service=ok
-permissive:battery_service=ok
-permissive:qmuxd_socket=ok
-permissive:task_service=ok
-permissive:zygote_tmpfs=ok
-permissive:mlstrustedsubject=fail
-permissive:graphicsstats_service=ok
-permissive:timekeep_exec=ok
-permissive:mediaserver=ok
-permissive:mediaserver_exec=ok
-permissive:ctl_fuse_prop=ok
-permissive:drmserver_service=ok
-permissive:hvdcp_tmpfs=ok
-permissive:touchfusion_exec=ok
-permissive:fingerprintd_data_file=ok
-permissive:mtpd_socket=ok
-permissive:ctl_console_prop=ok
-permissive:debugfs=ok
-permissive:gatekeeperd_exec=ok
-permissive:hardware_service=ok
-permissive:keystore_service=ok
-permissive:mkfs=ok
-permissiveemfs=ok
-permissiveipefs=ok
-permissive:sockfs=ok
-permissive:sysfs=ok
-permissive:addrsetup_data_file=ok
-permissive:logd=ok
-permissiverocstats_service=ok
-permissivestorefs=ok
-permissive:trust_service=ok
-permissive:default_android_service=ok
-permissive:sensors_prop=ok
-permissive:drmserver_exec=ok
-permissive:config_prop=ok
-permissive:misc_partition=ok
-permissive:timekeep_data_file=ok
-permissive:binfmt_miscfs=ok
-permissive:device_latency=ok
-permissive:inotify=ok
-permissive:sysfs_socinfo=ok
-permissive:vold_tmpfs=ok
-permissive:mlog_qmi_exec=ok
-permissive:sap_uim_socket=ok
-permissive:bluetooth_service=ok
-permissive:fingerprintd_exec=ok
-permissive:alarm_service=ok
-permissive:touchfusion=ok
-permissive:sysfs_devices_system_cpu=ok
-permissive:sd_device=ok
-permissive:rttmanager_service=ok
-permissive:sgdisk_exec=ok
-permissive:storage_file=ok
-permissive:debuggerd_exec=ok
-permissive:untrusted_app=ok
-permissive:appops_service=ok
-permissive:data_qsee_file=ok
-permissive:gps_socket=ok
-permissive:system_block_device=ok
-permissive:ueventd=ok
-permissive:node=ok
-permissiveroc_sysrq=ok
-permissive:sysfs_rqstats=ok
-permissive:gatekeeperd=ok
-permissive:adb_device=ok
-permissive:timekeep=ok
-permissive:consumer_ir_service=ok
-permissive:shared_relro=ok
-permissive:sysfs_type=ok
-permissive:updatelock_service=ok
-permissive:addrsetup_tmpfs=ok
-permissive:system_data_file=ok
-permissive:alarm_device=ok
-permissive:camera_data_file=ok
-permissive:sysfs_bluetooth_writable=ok
-permissive:ctl_mdnsd_prop=ok
-permissive:hci_attach_tmpfs=ok
-permissive:devpts=ok
-permissive:sysfs_zram=ok
-permissive:audio_firmware_file=ok
-permissiveroc_bluetooth_writable=ok
-permissive:apk_data_file=ok
-permissive:audio_data_file=ok
-permissive:bluetooth_efs_file=ok
-permissive:dm_device=ok
-permissive:drm_data_file=ok
-permissive:dts_data_file=ok
-permissive:fm_data_file=ok
-permissive:gps_data_file=ok
-permissive:media_data_file=ok
-permissive:nfc_data_file=ok
-permissive:radio_data_file=ok
-permissive:ta_data_file=ok
-permissive:tee_data_file=ok
-permissive:wifi_data_file=ok
-permissive:app_api_service=ok
-permissive:display_service=ok
-permissive:mdnsd_tmpfs=ok
-permissive:mnt_media_rw_file=ok
-permissive:system_app=ok
-permissive:misc_logd_file=ok
-permissive:dumpstate_socket=ok
-permissive:sdcard_type=ok
-permissive:system_file=ok
-permissive:sensors_data_file=ok
-permissive:sct=ok
-permissive:apk_private_tmp_file=ok
-permissive:hci_attach_dev=ok
-permissive:su=ok
-permissive:statusbar_service=ok
-permissive:addrsetup=ok
-permissiveerfprofd_exec=ok
-permissive:qmuxd_exec=ok
-permissive:racoon_tmpfs=ok
-permissive:sensors_tmpfs=ok
-permissive:sysfs_power_management=ok
-permissive:apk_tmp_file=ok
-permissive:batterystats_service=ok
-permissiveroc_security=ok
-permissive:system_server_service=ok
-permissive:gps_device=ok
-permissive:gpu_device=ok
-permissive:mnt_expand_file=ok
-permissive:nfc_service=ok
-permissive:rfs_shared_hlos_file=ok
-permissive:gpsd=ok
-permissive:mdnsd=ok
-permissive:device=ok
-permissive:storage_stub_file=ok
-permissive:system_wpa_socket=ok
-permissive:assetatlas_service=ok
-permissive:surfaceflinger=ok
-permissiveerfprofd_tmpfs=ok
-permissive:sysfs_nfc_power_writable=ok
-permissive:fsck=ok
-permissive:voiceinteraction_service=ok
-permissive:mm-qcamerad_tmpfs=ok
-permissive:rild_tmpfs=ok
-permissive:sensorservice_service=ok
-permissive:cpuinfo_service=ok
-permissive:dbinfo_service=ok
-permissive:gfxinfo_service=ok
-permissive:meminfo_service=ok
-permissive:isolated_app_tmpfs=ok
-permissive:runas_exec=ok
-permissive:addrsetup_exec=ok
-permissive:untrusted_app_devpts=ok
-permissive:msm_irqbalanced=ok
-permissive:dex2oat=ok
-permissive:gatekeeper_service=ok
-permissive:netstats_service=ok
-permissive:watchdogd=ok
-permissive:bluetoothdomain=ok
-permissive:dnsmasq_exec=ok
-permissive:fwmarkd_socket=ok
-permissive:qtaguid_device=ok
-permissive:tzdatacheck_exec=ok
-permissive:inputflinger_tmpfs=ok
-permissiveroc_drop_caches=ok
-permissive:shell_exec=ok
-permissive:activity_service=ok
-permissive:backup_service=ok
-permissive:hdmi_control_service=ok
-permissivepp=ok
-permissive:clipboard_service=ok
-permissive:dumpstate_exec=ok
-permissive:hvdcp_device=ok
-permissive:zero_device=ok
-permissive:ethernet_service=ok
-permissiveerfprofd=ok
-permissive:resourcecache_data_file=ok
-permissive:systemkeys_data_file=ok
-permissive:shared_relro_tmpfs=ok
-permissive:wcnss_service_exec=ok
-permissive:binder_device=ok
-permissiverocrank_exec=ok
-permissiveroperty_socket=ok
-permissive:sysfs_smd_open_timeout=ok
-permissive:boot_animation_prop=ok
-permissive:hw_random_device=ok
-permissive:random_device=ok
-permissive:urandom_device=ok
-permissive:watchdog_device=ok
-permissive:sysfs_pronto=ok
-permissive:msm_irqbalance_prop=ok
-permissive:ctl_default_prop=ok
-permissive:ctl_dumpstate_prop=ok
-permissive:security_file=ok
-permissive:userdata_block_device=ok
-permissive:tzdatacheck_tmpfs=ok
-permissive:media_rw_data_file=ok
-permissive:wfd_app_tmpfs=ok
-permissive:default_prop=ok
-permissive:mm-qcamerad_exec=ok
-permissiveer_mgr_tmpfs=ok
-permissive:sysfs_uio=ok
-permissiverocrank=ok
-permissive:mm-qcamerad=ok
-permissiveroc_uid_cputime_removeuid=ok
-permissive:debuggerd_prop=ok
-permissive:shared_relro_file=ok
-permissive:install_recovery_exec=ok
-permissive:coredump_file=ok
-permissive:netdomain=ok
-permissive:cache_block_device=ok
-permissive:appdomain=ok
-permissive:lmkd_socket=ok
-permissive:racoon=ok
-permissive:tfa_amp=ok
-permissive:graphics_device=ok
-permissive:diag_device=ok
-permissive:rfs_file=ok
-permissive:serial_device=ok
-permissive:efs_file=ok
-permissive:boot_block_device=ok
-permissiveowerctl_prop=ok
-permissive:rild=ok
-permissive:vold=ok
-permissive:adbtcp_prop=ok
-permissive:sensors_exec=ok
-permissive:toolbox_exec=ok
-permissive:iio_device=ok
-permissive:devicestoragemonitor_service=ok
-permissive:ion_device=ok
-permissiveermission_service=ok
-permissive:shell=ok
-permissive:tombstone_data_file=ok
-permissive:audio_service=ok
-permissive:radio_service=ok
-permissive:apk_private_data_file=ok
-permissive:mdnsd_socket=ok
-permissive:qmuxd_tmpfs=ok
-permissive:metadata_block_device=ok
-permissive:service_manager_type=ok
-permissive:thermanager_exec=ok
-permissive:unencrypted_data_file=ok
-permissive:healthd_service=ok
-permissive:rmt_storage=ok
-permissive:root_block_device=ok
-permissive:swap_block_device=ok
-permissive:cache_backup_file=ok
-permissive:logd_socket=ok
-permissiveersist_display_file=ok
-permissive:blkid_untrusted=ok
-permissive:sysfs_addrsetup=ok
-permissive:toolbox_tmpfs=ok
-permissive:ta_qmi=ok
-permissiveersist_drm_file=ok
-permissive:hci_attach=ok
-permissive:timekeep_prop=ok
-permissive:dalvikcache_profiles_data_file=ok
-permissive:sdcard_posix=ok
-permissive:vold_socket=ok
-permissive:mlog_qmi=ok
-permissive:block_device=ok
-permissive:sysfs_rmt_storage=ok
-permissive:thermanager=ok
-permissive:timekeep_tmpfs=ok
-permissive:msm_irqbalanced_exec=ok
-permissive:zygote_exec=ok
-permissive:frp_block_device=ok
-permissive:radio_prop=ok
-permissive:tad_block_device=ok
-permissive:loop_device=ok
-permissive:sysfs_writable=ok
-permissive:vold_device=ok
-permissiveroperties_device=ok
-permissive:trim_area_partition_device=ok
-permissive:misc_user_data_file=ok
-permissive:surfaceflinger_tmpfs=ok
-permissive:sysfs_ioscheduler=ok
-permissive:lmkd=ok
-permissive:nfc_device=ok
-permissive:vibrator_service=ok
-permissive:deviceidle_service=ok
-permissive:servicemanager=ok
-permissive:window_service=ok
-permissive:dropbox_service=ok
-permissive:sysfs_wake_lock=ok
-permissive:dnsproxyd_socket=ok
-permissive:rild_socket=ok
-permissive:shell_prop=ok
-permissive:thermal_device=ok
-permissive:keystore_data_file=ok
-permissive:ashmem_device=ok
-permissive:sysfs_ssr_toggle=ok
-permissive:isolated_app=ok
-permissive:sysinit_tmpfs=ok
-permissive:shm=ok
-permissivelatform_app_tmpfs=ok
-permissiveersist_file=ok
-permissivemsg_device=ok
-permissive:rpmsg_device=ok
-permissive:shell_tmpfs=ok
-permissive:network_management_service=ok
-permissive:cache_file=ok
-permissive:fingerprint_prop=ok
-permissive:blkid=ok
-permissive:fingerprintd_service=ok
-permissive:mtp_device=ok
-permissive:mtd_device=ok
-permissive:camera_prop=ok
-permissive:log_device=ok
-permissive:domain=ok
- Success
- Detecting system compatibility
sukernel v2.82 (ndk:armeabi-v7a) - Copyright (C) 2014-2017 - Chainfire & CCMT
Loading from [/dev/block/mmcblk0p14] ...
Could not find header
- System-less mode, boot image support required
- Creating image
/data/su.img: 22/6144 files (0.0% non-contiguous), 1537/24576 blocks
- Mounting image
- Creating paths
mkdir: can't create directory '/su/bin': File exists
mkdir: can't create directory '/su/xbin': File exists
mkdir: can't create directory '/su/lib': File exists
mkdir: can't create directory '/su/etc': File exists
mkdir: can't create directory '/su/su.d': File exists
- Removing old files
- Placing files
rm: can't remove '/su/bin/su': No such file or directory
rm: can't remove '/su/bin/daemonsu': No such file or directory
rm: can't remove '/su/bin/supolicy_wrapped': No such file or directory
rm: can't remove '/su/lib/libsupol.so': No such file or directory
rm: can't remove '/su/bin/sukernel': No such file or directory
******************
Boot image patcher
******************
- Finding boot image
--- Boot image: /dev/block/mmcblk0p14
sukernel v2.82 (ndk:armeabi-v7a) - Copyright (C) 2014-2017 - Chainfire & CCMT
Loading from [/dev/block/mmcblk0p14] ...
Could not find header
- Extracting ramdisk
sukernel v2.82 (ndk:armeabi-v7a) - Copyright (C) 2014-2017 - Chainfire & CCMT
Loading from [/dev/block/mmcblk0p14] ...
Could not find header
--- Failure, aborting
*************************
IMPORTANT NOTICES
*************************
First reboot may take a
few minutes. It can also
loop a few times. Do not
interrupt the process!
*************************
- Unmounting /system
- Done !
Click to expand...
Click to collapse
[solved] sony elf 32 was the reason -> boot bridge
https://forum.xda-developers.com/crossdevice-dev/sony/mod-boot-bridge-sony-elf-t3506883

Magisk Module - Call Recording for EMUI 9 (PIE)

This module will enable call recording on EMUI 9.
Install the module with Magisk Manager, reboot and enjoy!
On devices with Call+ option enabled, there will be no "Record" icon in the Dialer screen, so you will have to enable Automatic Recording from Dialer - Settings.
Download link - > https://mega.nz/#!1s9FTQLI!BkXmo2jl9YhVkXqe0j-XgoqGPQFdmpBvJFwRrFy1BmI
Version 9.1 - This version will also disable Call+ (RCS) feature, so you can manually start call registration from Dialer (Registration Icon)
Link - > https://mega.nz/#!xpcTUAxB!sxUuj1NBmwWHnWycQJ9tO3dU43VZuyXouAIav5WqAFE
Version 9.2 - OAT folder removed as it doesn't seems to be required
Link - > https://mega.nz/#!oplFmKrY!ObM6MH34L5pPutRbyVNWPCqULXVOj4yMiq3ZDfxEI9g
Mirror link: https://www.dropbox.com/s/f4vctbexarno8zu/EMUI9_Call_Recording.zip
Pretoriano80 said:
This module will enable call recording on EMUI 9.
Install the module with Magisk Manager, reboot and enjoy!
On devices with Call+ option enabled, there will be no "Record" icon in the Dialer screen, so you will have to enable Automatic Recording from Dialer - Settings.
Download link - > https://mega.nz/#!1s9FTQLI!BkXmo2jl9YhVkXqe0j-XgoqGPQFdmpBvJFwRrFy1BmI
Version 9.1 - This version will also disable Call+ (RCS) feature, so you can manually start call registration from Dialer (Registration Icon)
Link - > https://mega.nz/#!xpcTUAxB!sxUuj1NBmwWHnWycQJ9tO3dU43VZuyXouAIav5WqAFE
Version 9.2 - OAT folder removed as it doesn't seems to be required
Link - > https://mega.nz/#!oplFmKrY!ObM6MH34L5pPutRbyVNWPCqULXVOj4yMiq3ZDfxEI9g
Click to expand...
Click to collapse
I made a copy from cust/hwcall recorder to system/app/call recorder, and it works, but have noticed that the recordings can't be accessed from the dialer, as before. Is there a fix?
Hello, is it possible that calls can be recorded at will?.
I'm not interested in recording absolutely everything, besides, you can edit a list of numbers but what about the numbers you do not have between the contacts?
Thank you and greetings.
Enviado desde mi BLA-L29 mediante Tapatalk
rey_lagarto said:
Hello, is it possible that calls can be recorded at will?.
I'm not interested in recording absolutely everything, besides, you can edit a list of numbers but what about the numbers you do not have between the contacts?
Thank you and greetings.
Enviado desde mi BLA-L29 mediante Tapatalk
Click to expand...
Click to collapse
Just start the recording manually, from the dialer.
Need root
Or i can do it without root
The installation don't work (version 9.2, EMUI 9.0.1, STF-L09)
MAGISK LOG IS:
- Copying zip to temp directory
- Installing EMUI_Call_Recording_v9.2.zip
Archive: /data/user/0/com.topjohnwu.magisk/cache/install.zip
creating: common/
inflating: common/post-fs-data.sh
inflating: common/service.sh
inflating: common/system.prop
inflating: module.prop
inflating: config.sh
- Mounting /system, /vendor
/system/bin/mke2fs: invalid option -- t
*******************************
Call Recording For EMUI 9
*******************************
******************************
Powered by Magisk (@topjohnwu)
******************************
- Creating /data/adb/magisk_merge.img with size 64M
BusyBox v1.29.3-osm0sis (2018-11-17 02:42:59 AST) multi-call binary.
Usage: mke2fs [-Fn] [-b BLK_SIZE] [-i INODE_RATIO] [-I INODE_SIZE] [-m RESERVED_PERCENT] [-L LABEL] BLOCKDEV [KBYTES]
-b BLK_SIZE Block size, bytes
-F Force
-i RATIO Max number of files is filesystem_size / RATIO
-I BYTES Inode size (min 128)
-L LBL Volume label
-m PERCENT Percent of blocks to reserve for admin
-n Dry run
Create /data/adb/magisk_merge.img with size 64M
Cannot mount image!
! /data/adb/magisk_merge.img mount failed...
! Installation failed
gabryrizz02 said:
The installation don't work (version 9.2, EMUI 9.0.1, STF-L09)
MAGISK LOG IS:
- Copying zip to temp directory
- Installing EMUI_Call_Recording_v9.2.zip
Archive: /data/user/0/com.topjohnwu.magisk/cache/install.zip
creating: common/
inflating: common/post-fs-data.sh
inflating: common/service.sh
inflating: common/system.prop
inflating: module.prop
inflating: config.sh
- Mounting /system, /vendor
/system/bin/mke2fs: invalid option -- t
*******************************
Call Recording For EMUI 9
*******************************
******************************
Powered by Magisk (@topjohnwu)
******************************
- Creating /data/adb/magisk_merge.img with size 64M
BusyBox v1.29.3-osm0sis (2018-11-17 02:42:59 AST) multi-call binary.
Usage: mke2fs [-Fn] [-b BLK_SIZE] [-i INODE_RATIO] [-I INODE_SIZE] [-m RESERVED_PERCENT] [-L LABEL] BLOCKDEV [KBYTES]
-b BLK_SIZE Block size, bytes
-F Force
-i RATIO Max number of files is filesystem_size / RATIO
-I BYTES Inode size (min 128)
-L LBL Volume label
-m PERCENT Percent of blocks to reserve for admin
-n Dry run
Create /data/adb/magisk_merge.img with size 64M
Cannot mount image!
! /data/adb/magisk_merge.img mount failed...
! Installation failed
Click to expand...
Click to collapse
Dude, no need for magisk install. Just copy the file in the zip archive to /system/app and make proper permissions.
Can you tell how I have to do?
gabryrizz02 said:
Can you tell how I have to do?
Click to expand...
Click to collapse
First and obvious, you have to be rooted. Next:
- Go to cust/app and copy the folder HWCallRecorder
- Go to system/app and paste the folder
- Set permissions to the folder to 755 in total commander
- Set permissions to the file inside to 644 in total commander
- Reboot
- Enjoy
obviously I have the root, otherwise how did I use Magisk? However I extracted the folder from the zip of version 9.2 because in my version c432 there was not in the cust folder. I copied in system app I restarted and it's all fine.
gabryrizz02 said:
obviously I have the root, otherwise how did I use Magisk? However I extracted the folder from the zip of version 9.2 because in my version c432 there was not in the cust folder. I copied in system app I restarted and it's all fine.
Click to expand...
Click to collapse
Great to hear that it worked out.
does this work on other pie phones or only on hauwei?
xumixu said:
does this work on other pie phones or only on hauwei?
Click to expand...
Click to collapse
As far as I know, only Huawei. It's already implemented into the system, only needs a bit of a nudge.
As for other pie phones, word is that due to some privacy regulations, google is required to stop supporting call recording.
@Pretoriano80 Hi Mate
I'm on EMUI 9 with Mate 9 and I would like to know if your Magisk module is installable on Magisk v19 (Magisk often switch his template and/or configuration with .sh files)?
Thanks!
Tecalote said:
@Pretoriano80 Hi Mate
I'm on EMUI 9 with Mate 9 and I would like to know if your Magisk module is installable on Magisk v19 (Magisk often switch his template and/or configuration with .sh files)?
Thanks!
Click to expand...
Click to collapse
Hi! It's a simple module, nothing fancy, so it should install just fine with Magisk v19 too.
Pretoriano80 said:
Hi! It's a simple module, nothing fancy, so it should install just fine with Magisk v19 too.
Click to expand...
Click to collapse
You are right, thanks :good:
I made a version based on your idea and with credit for you in the readme.md file for Mate 9 /Emui 9.
https://www.androidfilehost.com/?fid=1395089523397943267
Only difference: I used the new Magisk Installer Template for Magisk v19 and additional I use the HwSoundRecorder (deodexed from Chinese Firmware) too in /system/app. Both is possible, manual recording from dialer and auto recording from dialer settings. (RCS I leave disabled)
Thanks Mate :highfive:
If you like you can try to add Soundrecorder to your module for Mate 10 Pro and test.
How to flash your file with fastboot adb command please?
cadkey said:
How to flash your file with fastboot adb command please?
Click to expand...
Click to collapse
Read the first page (OP) - it's a Magisk module and must be flashed directly from Magisk Manager (Modules section + Button)
https://www.xda-developers.com/huawei-honor-emui-9-call-recording/
Found this post by XDA and I'm so pleased that call recording works flawlessly without root.

Cannot see Petnoires safetynet spoofer module after install done

This is the log:
Copying zip to temp directory
- Installing Petnoire's_SafetyNet_Spoofer.zip
- Device is system-as-root
Archive: /data/user/0/com.topjohnwu.magisk/cache/flash/install.zip
inflating: config.sh
inflating: module.prop
creating: common/
inflating: common/post-fs-data.sh
*******************************
PetNoire's SafetySpoofer
*******************************
******************************
Powered by Magisk (@topjohnwu)
******************************
update-binary: line 101: mount_magisk_img: not found
update-binary: line 104: log_start: not found
update-binary: line 106: install_check: not found
update-binary: line 108: check_bb: not found
- Extracting module files
Archive: /data/user/0/com.topjohnwu.magisk/cache/flash/install.zip
creating: system/
creating: system/xbin/
inflating: system/xbin/pnss
update-binary: line 147: script_install: not found
- Setting permissions
update-binary: line 157: unmount_magisk_img: not found
- Done
Phone is Xiaomi Mi 9T (davinci)
Magisk 20,4
LineageOS 17,1

Problem installing Super SU on HTC One M8

I've successfully unlocked the bootloader of my HTC One M8 (Android 6.0) and installed TWRP 3.4.0.1 but I am unable to install any version of SuperSU by flashing the zip through TWRP
Here is a copy of the TWRP log illustrating problems when I tried to install Super SU via TWRP
(I also tried v2.78, v2.79, v2.82 with similar outcomes)
I:Set page: 'install'
I:Set page: 'flash_confirm'
I:Set page: 'flash_zip'
Iperation_start: 'Flashing'
Installing zip file '/external_sd/UPDATE-SuperSU-v2.76-20160630161323.zip'
Checking for Digest file...
Unmounting System...
I:Update binary zip
Verifying package compatibility...
Package doesn't contain compatibility.zip entry
I:Extracting updater binary 'META-INF/com/google/android/update-binary'
I:Zip does not contain SELinux file_contexts file in its root.
I:Legacy property environment not used in updater.
*****************
SuperSU installer
*****************
- Mounting /system, /data and rootfs
mount: '/dev/block/mmcblk0p47'->'/data': Device or resource busy
mount: '/' not in /proc/mounts
2+0 records in
2+0 records out
2 bytes transferred in 0.001 secs (2000 bytes/sec)
3+0 records in
3+0 records out
3 bytes transferred in 0.001 secs (3000 bytes/sec)
12+0 records in
12+0 records out
12 bytes transferred in 0.001 secs (12000 bytes/sec)
3+0 records in
3+0 records out
3 bytes transferred in 0.001 secs (3000 bytes/sec)
/tmp/updater[841]: /system/toolbox: not found
- Extracting files
Archive: /external_sd/UPDATE-SuperSU-v2.76-20160630161323.zip
inflating: common/chromeos/kernel_data_key.vbprivk
inflating: mips/supolicy
inflating: armv7/supolicy
inflating: arm/chattr.pie
inflating: common/chromeos/kernel.bootloader
inflating: x86/supolicy
inflating: arm64/libsupol.so
inflating: mips/sukernel
inflating: armv7/sukernel
inflating: common/chromeos/kernel.keyblock
inflating: mips64/libsupol.so
inflating: mips/libsupol.so
inflating: mips64/su
inflating: x86/chattr
inflating: x86/sukernel
inflating: x86/su
inflating: common/init.supersu.rc
inflating: common/99SuperSUDaemon
inflating: META-INF/MANIFEST.MF
inflating: arm64/chromeos/futility
inflating: x64/libsupol.so
inflating: META-INF/CERT.RSA
inflating: x86/chattr.pie
inflating: common/Superuser.apk
inflating: META-INF/com/google/android/update-binary
inflating: x86/su.pie
inflating: common/chromeos/kernel.config
inflating: META-INF/CERT.SF
inflating: common/000000deepsleep
inflating: mips64/supolicy
inflating: x64/supolicy
inflating: arm/libsupol.so
inflating: armv7/libsupol.so
inflating: mips/su
inflating: armv7/su
inflating: mips64/sukernel
inflating: x64/sukernel
inflating: x64/su
inflating: META-INF/com/google/android/updater-script
inflating: mips/chattr.pie
inflating: armv7/chattr.pie
inflating: arm/supolicy
inflating: arm/chattr
inflating: arm64/supolicy
inflating: x86/libsupol.so
inflating: arm/sukernel
inflating: arm64/sukernel
inflating: arm/su
inflating: common/launch_daemonsu.sh
inflating: arm64/su
inflating: common/install-recovery.sh
inflating: common/file_contexts_image
CANNOT LINK EXECUTABLE: cannot locate symbol "__aeabi_memcpy" referenced by "/sbin/liblog_htc_sbin.so"...
page record for 0xafcb402c was not found (block_size=16)
- Detecting system compatibility
CANNOT LINK EXECUTABLE: cannot locate symbol "__aeabi_memcpy" referenced by "/sbin/liblog_htc_sbin.so"...
page record for 0xac32802c was not found (block_size=16)
- System-less mode, boot image support required
- Creating image
CANNOT LINK EXECUTABLE: cannot locate symbol "__aeabi_memcpy" referenced by "/sbin/liblog_htc_sbin.so"...
page record for 0xb0b1903c was not found (block_size=16)
- Mounting image
mknod: /dev/block/loop0: File exists
I:Found no matching fstab entry for uevent device '/devices/virtual/block/loop0' - change
- Creating paths
mkdir: '/su/bin': File exists
mkdir: '/su/xbin': File exists
mkdir: '/su/lib': File exists
mkdir: '/su/etc': File exists
mkdir: '/su/su.d': File exists
- Removing old files
- Placing files
rm: /su/bin/su: No such file or directory
rm: /su/bin/daemonsu: No such file or directory
rm: /su/bin/supolicy_wrapped: No such file or directory
rm: /su/lib/libsupol.so: No such file or directory
rm: /su/bin/sukernel: No such file or directory
******************
Boot image patcher
******************
- Finding boot image
--- Boot image: /dev/block/mmcblk0p42
CANNOT LINK EXECUTABLE: cannot locate symbol "__aeabi_memcpy" referenced by "/sbin/liblog_htc_sbin.so"...
page record for 0xb5ae203c was not found (block_size=16)
- Extracting ramdisk
CANNOT LINK EXECUTABLE: cannot locate symbol "__aeabi_memcpy" referenced by "/sbin/liblog_htc_sbin.so"...
page record for 0xa82b103c was not found (block_size=16)
--- Failure, aborting
losetup: /dev/block/loop0: No such device or address
I:Found no matching fstab entry for uevent device '/devices/virtual/block/loop0' - change
*************************
IMPORTANT NOTICES
*************************
First reboot may take a
few minutes. It can also
loop a few times. Do not
interrupt the process!
*************************
- Unmounting /system
- Done !

Categories

Resources