Unbrick after failed install Windows ARM - Redmi K20 Pro / Xiaomi Mi 9T Pro Questions & Answe

Welcome,
I got a Mi 9T Pro from a friend after failing to upload Windows ARM.
I would like to upload Stock Rom but fastboot and recovery mode doesn't works. When trying to enter fastboot or recovery it freeze on Redmi logo.
And this is what it looks like during power up:
Your browser is not able to display this video.
Error code : 0xc000000f
Is there any chance to save this phone?

download ROM
flash with Miflash
https://forum.xda-developers.com/t/prog-emmc-firehose-mbn-for-mi-9t-pro.4263977

I downloaded MiFlash and ROM, but I get a message popping up about logging into my Mi account while uploading.
I downloaded the Fastboot ROM version
Any ideas?
EDIT:
From what I've been able to find it is not possible to upload software via EDL without an authorized account. Could someone please share access to their account via TeamViewer?

use the no auth firehose programmer.

I copied the no auth firehose programmer on the folder images download rom but when try flash the error: Couln'd not read from COM6

[GUIDE][TOOL] Reboot to EDL mode from FASTBOOT! No More "Test Point Method"! [kenzo]
[GUIDE][TOOL] Reboot to EDL mode from FASTBOOT! No More "Test Point Method"! [kenzo] Reboot to EDL mode from FASTBOOT! No more Test Point Method needed ;) Technical Details: Redmi Note 3 support rebooting to EDL in Android Bootloader aboot...
forum.xda-developers.com

But my phone is can't boot to fastboot mode and i can boot my phone with edl mode.

buy deep flash cable

why? so autorized mi account not enough?
the error couldn't not read from port COM6 is only when I copy no auth programmmer file
so will you share your mi account via teamviewer ?

authorized xiaomi account is fine. do you have one? still it needs device connected in EDL mode, you must buy cable anyway.

I don't have an account. my device is connected in EDL mode
this cable is fine ? https://multi-com.pl/,details,id_pr,21749,key,kabel-edl-deep-flash-mode-microusb-i-type-c.html
And there is no way to do it with a regular cable?

try with this tool
https://github.com/bkerler/edl

I don't think I know how to use this tool

usage is similar to fastboot usage
Code:
python3 edl w boot_a boot.img

This is output for command: edl w boot_a boot.img --debugmode
Any ideas ?
Code:
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'mprg8626'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'mprg8974'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'mprg8974'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
main - Trying with no loader given ...
main - Waiting for the device
DeviceClass
DeviceClass - [LIB]: ←[95mNo kernel driver supported: Operation not supported or unimplemented on this platform←[0m
main - Device detected :)

first, try if the loader works
Code:
python.exe edl printgpt --memory=ufs --loader="path\to\prog_ufs_firehose_sdm855_ddr.elf"

This is output :
Code:
C:\Users\michael\edl>C:\Python39\python.exe edl printgpt --memory=ufs --loader="C:\Users\michael\Downloads\prog_ufs_firehose_sdm855_ddr.elf" --debugmode
Qualcomm Sahara / Firehose Client V3.60 (c) B.Kerler 2018-2022.
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'mprg8626'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'mprg8974'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'mprg8974'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
main - Using loader C:\Users\michael\Downloads\prog_ufs_firehose_sdm855_ddr.elf ...
main - Waiting for the device
DeviceClass
DeviceClass - [LIB]: ←[95mNo kernel driver supported: Operation not supported or unimplemented on this platform←[0m
main - Device detected :)
C:\Users\michael\edl>C:\Python39\python.exe edl printgpt --memory=ufs --loader="C:\Users\michael\Downloads\loader.elf" --debugmode
Qualcomm Sahara / Firehose Client V3.60 (c) B.Kerler 2018-2022.
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95mlist index out of range←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'mprg8626'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'mprg8974'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'mprg8974'←[0m
loader_utils
loader_utils - [LIB]: ←[95minvalid literal for int() with base 16: 'prog'←[0m
main - Using loader C:\Users\michael\Downloads\loader.elf ...
main - Waiting for the device
DeviceClass
DeviceClass - [LIB]: ←[95mNo kernel driver supported: Operation not supported or unimplemented on this platform←[0m
main - Device detected :)
According to the information on github:
Code:
Your device needs to have a usb pid of 0x9008 in order to make the edl tool work.
device detects as pid:9008 so it detects the phone correctly?
Thank you so much alecxs for your help
Do you have a autorized mi account? maybe try with miflash and account? if you can share account for me

check lsusb if you can see 9008 QDL mode. I meant VID/PID in device manager. I remember there is a timeout of 30 seconds or so, try to reboot EDL and read printgpt right after.

Yes. device is 9008.
Use driver : libusb-win32 (v1.2.6.0) from zadig (wiyhout it, edl can't find libusb-win32 and need install driver from zadig)
I know, i added last quote and edit previous post.

I don't own that device, I have no authorized xiaomi account, and I don't use windows for EDL.
"Operation not supported or unimplemented on this platform" sounds like windows issue with libusb. I recommend to try the Live DVD iso from pendrive. you can use rufus.ie
this is how it should look like (on linux no drivers needed)
https://github.com/bkerler/Loaders/issues/41

Related

Development creation of vbmeta dependencies for current images [WHEN UNLOCK BOOTLOADER AVAILABLE]

vbmeta GDPR variant for RMX3081.
Since GDPR rom don't have unlocked bootloader, no flashing of vbmeta dependent partitions boot, dtbo and recovery possible.
avbtool.py available at :
avbtool.py - platform/external/avb - Git at Google
Info :
vbmeta.img
Code:
C:\Program Files (x86)\Minimal ADB and Fastboot>python avbtool.py info_image --image vbmeta.img
Minimum libavb version: 1.0
Header Block: 256 bytes
Authentication Block: 576 bytes
Auxiliary Block: 6400 bytes
Public key (sha1): 1a38638478d682b11e32cdb80c6a78b6eacbce91
Algorithm: SHA256_RSA4096
Rollback Index: 0
Flags: 0
Rollback Index Location: 0
Release String: 'avbtool 1.1.0'
Descriptors:
Chain Partition descriptor:
Partition Name: boot
Rollback Index Location: 4
Public key (sha1): 1a38638478d682b11e32cdb80c6a78b6eacbce91
Chain Partition descriptor:
Partition Name: dtbo
Rollback Index Location: 3
Public key (sha1): 1a38638478d682b11e32cdb80c6a78b6eacbce91
Chain Partition descriptor:
Partition Name: recovery
Rollback Index Location: 1
Public key (sha1): 1a38638478d682b11e32cdb80c6a78b6eacbce91
Chain Partition descriptor:
Partition Name: vbmeta_system
Rollback Index Location: 2
Public key (sha1): 1a130f9ac8720d5c66e8b62c92505173633166f6
Chain Partition descriptor:
Partition Name: vbmeta_vendor
Rollback Index Location: 5
Public key (sha1): 1a130f9ac8720d5c66e8b62c92505173633166f6
Prop: com.android.build.boot.os_version -> '11'
Prop: com.android.build.boot.security_patch -> '2021-11-05'
Prop: com.android.build.boot.security_patch -> '2021-11-05'
Prop: com.android.build.odm.fingerprint -> 'qti/atoll/atoll:11/RKQ1.201112.002/root05281023:user/release-keys'
Prop: com.android.build.odm.os_version -> '11'
Hashtree descriptor:
Version of dm-verity: 1
Image Size: 65974272 bytes
Tree Offset: 65974272
Tree Size: 520192 bytes
Data Block Size: 4096 bytes
Hash Block Size: 4096 bytes
FEC num roots: 2
FEC offset: 66494464
FEC size: 532480 bytes
Hash Algorithm: sha1
Partition Name: odm
Salt: cd17909e55ad176f67af4b4ebdf73edaf9bf48a7
Root Digest: ac824b50e11b4753d4f007a93530a3bbca470b38
Flags: 0
vbmeta_system.img
Code:
C:\Program Files (x86)\Minimal ADB and Fastboot>python avbtool.py info_image --image vbmeta_system.img
Minimum libavb version: 1.0
Header Block: 256 bytes
Authentication Block: 320 bytes
Auxiliary Block: 3392 bytes
Public key (sha1): 1a130f9ac8720d5c66e8b62c92505173633166f6
Algorithm: SHA256_RSA2048
Rollback Index: 1636070400
Flags: 0
Rollback Index Location: 0
Release String: 'avbtool 1.1.0'
Descriptors:
Prop: com.android.build.system.fingerprint -> 'qti/atoll/atoll:11/RKQ1.201112.002/root05281023:user/release-keys'
Prop: com.android.build.system.os_version -> '11'
Prop: com.android.build.system.security_patch -> '2021-11-05'
Prop: com.android.build.system.security_patch -> '2021-11-05'
Prop: com.android.build.product.fingerprint -> 'qti/atoll/atoll:11/RKQ1.201112.002/root05281023:user/release-keys'
Prop: com.android.build.product.os_version -> '11'
Prop: com.android.build.product.security_patch -> '2021-11-05'
Prop: com.android.build.product.security_patch -> '2021-11-05'
Prop: com.android.build.system_ext.fingerprint -> 'qti/atoll/atoll:11/RKQ1.201112.002/root05281023:user/release-keys'
Prop: com.android.build.system_ext.os_version -> '11'
Prop: com.android.build.system_ext.security_patch -> '2021-11-05'
Prop: com.android.build.system.fingerprint -> 'qti/qssi/qssi:11/RKQ1.201112.002/root05281023:user/release-keys'
Prop: com.android.build.system.os_version -> '11'
Prop: com.android.build.system.security_patch -> '2021-11-05'
Prop: com.android.build.system.security_patch -> '2021-11-05'
Prop: com.android.build.product.fingerprint -> 'qti/qssi/qssi:11/RKQ1.201112.002/root05281023:user/release-keys'
Prop: com.android.build.product.os_version -> '11'
Prop: com.android.build.product.security_patch -> '2021-11-05'
Prop: com.android.build.product.security_patch -> '2021-11-05'
Prop: com.android.build.system_ext.fingerprint -> 'qti/qssi/qssi:11/RKQ1.201112.002/root05281023:user/release-keys'
Prop: com.android.build.system_ext.os_version -> '11'
Prop: com.android.build.system_ext.security_patch -> '2021-11-05'
Hashtree descriptor:
Version of dm-verity: 1
Image Size: 4018176 bytes
Tree Offset: 4018176
Tree Size: 36864 bytes
Data Block Size: 4096 bytes
Hash Block Size: 4096 bytes
FEC num roots: 2
FEC offset: 4055040
FEC size: 32768 bytes
Hash Algorithm: sha1
Partition Name: product
Salt: ea90cf3d978f9b3dd57ae086e7e8ff3a3f83cda9
Root Digest: 0a753c4708bfa3521f27324265a5d32663340868
Flags: 0
Hashtree descriptor:
Version of dm-verity: 1
Image Size: 1024299008 bytes
Tree Offset: 1024299008
Tree Size: 8073216 bytes
Data Block Size: 4096 bytes
Hash Block Size: 4096 bytes
FEC num roots: 2
FEC offset: 1032372224
FEC size: 8167424 bytes
Hash Algorithm: sha1
Partition Name: system
Salt: 4a5e0c61837ed051993c8b8003e3f0b3cc04e9e6
Root Digest: bb03f13b0e827bb6c911a8fbda5043361bd454fc
Flags: 0
Hashtree descriptor:
Version of dm-verity: 1
Image Size: 1258614784 bytes
Tree Offset: 1258614784
Tree Size: 9916416 bytes
Data Block Size: 4096 bytes
Hash Block Size: 4096 bytes
FEC num roots: 2
FEC offset: 1268531200
FEC size: 10035200 bytes
Hash Algorithm: sha1
Partition Name: system_ext
Salt: 0b7343a5bb191ca1d07b831fdb75518029854ff4
Root Digest: cd83991a3cf1ef068e1b208a22c5ca4ab3eba2c5
Flags: 0
vbmeta_vendor.img
Code:
C:\Program Files (x86)\Minimal ADB and Fastboot>python avbtool.py info_image --image vbmeta_vendor.img
Minimum libavb version: 1.0
Header Block: 256 bytes
Authentication Block: 320 bytes
Auxiliary Block: 1536 bytes
Public key (sha1): 1a130f9ac8720d5c66e8b62c92505173633166f6
Algorithm: SHA256_RSA2048
Rollback Index: 1636070400
Flags: 0
Rollback Index Location: 0
Release String: 'avbtool 1.1.0'
Descriptors:
Prop: com.android.build.vendor.fingerprint -> 'qti/atoll/atoll:11/RKQ1.201112.002/root05281023:user/release-keys'
Prop: com.android.build.vendor.os_version -> '11'
Prop: com.android.build.vendor.security_patch -> '2021-11-05'
Prop: com.android.build.vendor.security_patch -> '2021-11-05'
Prop: com.android.build.vendor.fingerprint -> 'qti/atoll/atoll:11/RKQ1.201112.002/root05281023:user/release-keys'
Prop: com.android.build.vendor.os_version -> '11'
Prop: com.android.build.vendor.security_patch -> '2021-11-05'
Prop: com.android.build.vendor.security_patch -> '2021-11-05'
Hashtree descriptor:
Version of dm-verity: 1
Image Size: 593604608 bytes
Tree Offset: 593604608
Tree Size: 4681728 bytes
Data Block Size: 4096 bytes
Hash Block Size: 4096 bytes
FEC num roots: 2
FEC offset: 598286336
FEC size: 4734976 bytes
Hash Algorithm: sha1
Partition Name: vendor
Salt: e868cf7fced08126a87913c9f79f8a07609ed5c1
Root Digest: 0be5f0290f1702550d417cd7eea6017ec7bb9594
Flags: 0
For .44 ROM
vbmeta.img 8 kb (8.192 B)
vbmeta_system.img 4 kb(4096 B)
vbmeta_vendor.img 4 kb(4096 B)
Minimum libavb version: 1.0
Header Block: 256 bytes
Authentication Block: 576 bytes
Auxiliary Block: 6400 bytes
Public key (sha1): 1a38638478d682b11e32cdb80c6a78b6eacbce91
Algorithm: SHA256_RSA4096
Rollback Index: 0
Flags: 0
Rollback Index Location: 0
Release String: 'avbtool 1.1.0'
Descriptors:
Chain Partition descriptor:
Partition Name: boot
Rollback Index Location: 4
Public key (sha1): 1a38638478d682b11e32cdb80c6a78b6eacbce91
Chain Partition descriptor:
Partition Name: dtbo
Rollback Index Location: 3
Public key (sha1): 1a38638478d682b11e32cdb80c6a78b6eacbce91
Chain Partition descriptor:
Partition Name: recovery
Rollback Index Location: 1
Public key (sha1): 1a38638478d682b11e32cdb80c6a78b6eacbce91
Chain Partition descriptor:
Partition Name: vbmeta_system
Rollback Index Location: 2
Public key (sha1): 1a130f9ac8720d5c66e8b62c92505173633166f6
Chain Partition descriptor:
Partition Name: vbmeta_vendor
Rollback Index Location: 5
Public key (sha1): 1a130f9ac8720d5c66e8b62c92505173633166f6
Prop: com.android.build.boot.os_version -> '11'
Prop: com.android.build.boot.security_patch -> '2021-11-05'
Prop: com.android.build.boot.security_patch -> '2021-11-05'
Prop: com.android.build.odm.fingerprint -> 'qti/atoll/atoll:11/RKQ1.201112.002/root05281023:user/release-keys'
Prop: com.android.build.odm.os_version -> '11'
Hashtree descriptor:
Version of dm-verity: 1
Image Size: 65974272 bytes
Tree Offset: 65974272
Tree Size: 520192 bytes
Data Block Size: 4096 bytes
Hash Block Size: 4096 bytes
FEC num roots: 2
FEC offset: 66494464
FEC size: 532480 bytes
Hash Algorithm: sha1
Partition Name: odm
Salt: cd17909e55ad176f67af4b4ebdf73edaf9bf48a7
Root Digest: ac824b50e11b4753d4f007a93530a3bbca470b38
Flags: 0
Chainded descriptor for vbmeta check also for boot, dtbo, recovery, vbmeta of system and vendor and odm.
Blocks :
odm -> /dev/block/dm-3
odm-verity -> /dev/block/dm-18
product -> /dev/block/dm-2
product-verity -> /dev/block/dm-16
system -> /dev/block/dm-1
system-verity -> /dev/block/dm-14
system_ext -> /dev/block/dm-6
system_ext-verity -> /dev/block/dm-15
vendor -> /dev/block/dm-0
vendor-verity -> /dev/block/dm-17
dtbo -> /dev/block/sde19
C:\Program Files (x86)\Minimal ADB and Fastboot>py avbtool.py print_partition_digests --image vbmeta.img
boot: 07448596b526b4eef8cdc9455aebe1b27568db2491469876a18cc97e860a4f81
dtbo: 2bec465c55e6d326fc4f79d9a1bdc81a55bd3d5c18198ba2847a467b22fb6330
recovery: f7c3dd185db49a6af8432af658029b47d27b8a48b83be83d5d478f096e84aee8
product: 0a753c4708bfa3521f27324265a5d32663340868
system: bb03f13b0e827bb6c911a8fbda5043361bd454fc
system_ext: cd83991a3cf1ef068e1b208a22c5ca4ab3eba2c5
vendor: 0be5f0290f1702550d417cd7eea6017ec7bb9594
odm: ac824b50e11b4753d4f007a93530a3bbca470b38
More to come when the bootloader can be unlocked and we can flash custom images via fastboot.
.... And private key is also needed ....... !

Building Spark OS with manjaro and can't properly build kernel coral/flame

I'm seeming to have a problem where it doesn't seem to build the dtbo.img. I assume it's because of a symlink problem, but I'm not sure how to solve it...
Here is the full log
Trying dependencies-only mode on a non-existing device tree?
============================================
PLATFORM_VERSION_CODENAME=REL
PLATFORM_VERSION=11
SPARK_VERSION=Spark-vIgnite-flame-Unofficial-vanilla-20220228
TARGET_PRODUCT=spark_flame
TARGET_BUILD_VARIANT=userdebug
TARGET_BUILD_TYPE=release
TARGET_ARCH=arm64
TARGET_ARCH_VARIANT=armv8-2a
TARGET_CPU_VARIANT=cortex-a76
TARGET_2ND_ARCH=arm
TARGET_2ND_ARCH_VARIANT=armv8-a
TARGET_2ND_CPU_VARIANT=cortex-a76
HOST_ARCH=x86_64
HOST_2ND_ARCH=x86
HOST_OS=linux
HOST_OS_EXTRA=Linux-5.16.9-xanmod0-rog-1-x86_64-Manjaro-Linux
HOST_CROSS_OS=windows
HOST_CROSS_ARCH=x86
HOST_CROSS_2ND_ARCH=x86_64
HOST_BUILD_TYPE=release
BUILD_ID=RQ3A.210905.001
OUT_DIR=/home/tech180/android/spark/out
PRODUCT_SOONG_NAMESPACES=hardware/google/av hardware/google/camera hardware/google/interfaces hardware/google/pixel device/google/coral hardware/qcom/sm8150/display hardware/qcom/sm8150/data/ipacfg-mgr hardware/qcom/sm8150/gps vendor/google/airbrush/floral vendor/google/biometrics/face vendor/google/camera vendor/google/darwinn vendor/qcom/sm8150 vendor/qcom/sm8150/proprietary/commonsys/telephony-apps/DataStatusNotification vendor/qcom/sm8150/proprietary/gps vendor/qcom/sm8150/codeaurora/location vendor/google/interfaces vendor/qcom/sensors vendor/google/tools/sensors vendor/qcom/sm7250/codeaurora/commonsys/telephony/ims/ims-ext-common vendor/qcom/sm7250/codeaurora/dataservices/rmnetctl vendor/qcom/sm7250/proprietary/commonsys/qcrilOemHook vendor/qcom/sm7250/proprietary/commonsys/telephony-apps/ims vendor/qcom/sm7250/proprietary/commonsys/telephony-apps/QtiTelephonyService vendor/qcom/sm7250/proprietary/commonsys/telephony-apps/xdivert vendor/qcom/sm7250/proprietary/qcril-data-hal vendor/qcom/sm7250/proprietary/qcril-hal vendor/qcom/sm7250/proprietary/data vendor/qcom/opensource/commonsys-intf/display vendor/google/flame packages/apps/Bluetooth frameworks/av/camera/cameraserver frameworks/av/services/camera/libcameraservice
============================================
[1mvendor/spark/config/common.mk:140: [35mwarning: [0m[1m"TARGET_BOOT_ANIMATION_RES is undefined, assuming 1080p"[0m
============================================
PLATFORM_VERSION_CODENAME=REL
PLATFORM_VERSION=11
SPARK_VERSION=Spark-vIgnite-flame-Unofficial-vanilla-20220228
TARGET_PRODUCT=spark_flame
TARGET_BUILD_VARIANT=userdebug
TARGET_BUILD_TYPE=release
TARGET_ARCH=arm64
TARGET_ARCH_VARIANT=armv8-2a
TARGET_CPU_VARIANT=cortex-a76
TARGET_2ND_ARCH=arm
TARGET_2ND_ARCH_VARIANT=armv8-a
TARGET_2ND_CPU_VARIANT=cortex-a76
HOST_ARCH=x86_64
HOST_2ND_ARCH=x86
HOST_OS=linux
HOST_OS_EXTRA=Linux-5.16.9-xanmod0-rog-1-x86_64-Manjaro-Linux
HOST_CROSS_OS=windows
HOST_CROSS_ARCH=x86
HOST_CROSS_2ND_ARCH=x86_64
HOST_BUILD_TYPE=release
BUILD_ID=RQ3A.210905.001
OUT_DIR=/home/tech180/android/spark/out
PRODUCT_SOONG_NAMESPACES=hardware/google/av hardware/google/camera hardware/google/interfaces hardware/google/pixel device/google/coral hardware/qcom/sm8150/display hardware/qcom/sm8150/data/ipacfg-mgr hardware/qcom/sm8150/gps vendor/google/airbrush/floral vendor/google/biometrics/face vendor/google/camera vendor/google/darwinn vendor/qcom/sm8150 vendor/qcom/sm8150/proprietary/commonsys/telephony-apps/DataStatusNotification vendor/qcom/sm8150/proprietary/gps vendor/qcom/sm8150/codeaurora/location vendor/google/interfaces vendor/qcom/sensors vendor/google/tools/sensors vendor/qcom/sm7250/codeaurora/commonsys/telephony/ims/ims-ext-common vendor/qcom/sm7250/codeaurora/dataservices/rmnetctl vendor/qcom/sm7250/proprietary/commonsys/qcrilOemHook vendor/qcom/sm7250/proprietary/commonsys/telephony-apps/ims vendor/qcom/sm7250/proprietary/commonsys/telephony-apps/QtiTelephonyService vendor/qcom/sm7250/proprietary/commonsys/telephony-apps/xdivert vendor/qcom/sm7250/proprietary/qcril-data-hal vendor/qcom/sm7250/proprietary/qcril-hal vendor/qcom/sm7250/proprietary/data vendor/qcom/opensource/commonsys-intf/display vendor/google/flame packages/apps/Bluetooth frameworks/av/camera/cameraserver frameworks/av/services/camera/libcameraservice
============================================
...
[ 3% 3908/102649] //bionic/libc:libc.llndk versioner preprocess include
warning: attempted to generate guard with empty availability: obsoleted = 21
warning: attempted to generate guard with empty availability: obsoleted = 23
[ 3% 3909/102649] //system/core/base:libbase clang++ logging.cpp
[ 3% 3910/102649] //external/libcxx:libc++_static clang++ src/condition_variable.cpp
[ 3% 3911/102649] //bionic/libc:crtbegin_dynamic1 clang arch-common/bionic/crtbegin.c [apex29]
[ 3% 3912/102649] //bionic/libc:crtbegin_so1 clang arch-common/bionic/crtbegin_so.c [apex29]
[ 3% 3913/102649] //bionic/libc:crtend_so clang arch-common/bionic/crtend_so.S [apex29]
[ 3% 3914/102649] //bionic/libc:crtbrand clang arch-common/bionic/crtbrand.S [apex29]
[ 3% 3915/102649] //bionic/libc:crtend_android clang arch-common/bionic/crtend.S [apex29]
[ 3% 3916/102649] //bionic/libc:crtbegin_dynamic link crtbegin_dynamic.o [apex29]
[ 3% 3917/102649] //external/libcxx:libc++_static clang++ src/hash.cpp
[ 3% 3918/102649] //bionic/libc:crtbegin_so link crtbegin_so.o [apex29]
[ 3% 3919/102649] //bionic/libc:libc.llndk versioner preprocess include [arm]
warning: attempted to generate guard with empty availability: obsoleted = 21
warning: attempted to generate guard with empty availability: obsoleted = 23
[ 3% 3920/102649] //external/flac/libFLAC:libFLAC clang bitmath.c [apex29]
[ 3% 3921/102649] //bionic/libc:libc.llndk versioner preprocess include [arm]
warning: attempted to generate guard with empty availability: obsoleted = 21
warning: attempted to generate guard with empty availability: obsoleted = 23
[ 3% 3922/102649] target thumb C: libtunnel_32 <= hardware/knowles/athletico/sound_trigger_hal/tunnel.c
FAILED: /home/tech180/android/spark/out/target/product/flame/obj_arm/SHARED_LIBRARIES/libtunnel_intermediates/tunnel.o
/bin/bash -c "PWD=/proc/self/cwd prebuilts/clang/host/linux-x86/clang-r383902b1/bin/clang -I hardware/knowles/athletico/sound_trigger_hal -I /home/tech180/android/spark/out/target/product/flame/obj_arm/SHARED_LIBRARIES/libtunnel_intermediates -I /home/tech180/android/spark/out/target/product/flame/gen/SHARED_LIBRARIES/libtunnel_intermediates -Isystem/core/liblog/include_vndk -Isystem/core/libcutils/include_vndk -Isystem/core/libprocessgroup/include -Isystem/core/libcutils/include -Iexternal/libcxx/include -Iexternal/libcxxabi/include -isystem /home/tech180/android/spark/out/soong/.intermediates/bionic/libc/libc.llndk/android_vendor.30_arm_armv8-a_cortex-a76_shared/gen/include -isystem bionic/libc/kernel/android/scsi -isystem bionic/libc/kernel/android/uapi -isystem bionic/libc/kernel/uapi -isystem bionic/libc/kernel/uapi/asm-arm -Iexternal/libcxxabi/include -isystem /home/tech180/android/spark/out/target/product/flame/obj/include -c -fomit-frame-pointer -DANDROID -fmessage-length=0 -W -Wall -Wno-unused -Winit-self -Wpointer-arith -no-canonical-prefixes -DNDEBUG -UDEBUG -fno-exceptions -Wno-multichar -O2 -g -fno-strict-aliasing -Werror=date-time -Werror=pragma-pack -Werror=pragma-pack-suspicious-include -fdebug-prefix-map=/proc/self/cwd= -D__compiler_offsetof=__builtin_offsetof -faddrsig -Werror=int-conversion -fexperimental-new-pass-manager -Wno-reserved-id-macro -Wno-unused-command-line-argument -fcolor-diagnostics -Wno-sign-compare -Wno-defaulted-function-deleted -Wno-inconsistent-missing-override -Wno-c99-designator -ftrivial-auto-var-init=zero -enable-trivial-auto-var-init-zero-knowing-it-will-be-removed-from-clang -ffunction-sections -fdata-sections -fno-short-enums -funwind-tables -fstack-protector-strong -Wa,--noexecstack -D_FORTIFY_SOURCE=2 -Wstrict-aliasing=2 -Werror=return-type -Werror=non-virtual-dtor -Werror=address -Werror=sequence-point -Werror=format-security -nostdlibinc -msoft-float -march=armv8-a -mfloat-abi=softfp -mfpu=neon-fp-armv8 -mcpu=cortex-a55 -mfpu=neon-fp-armv8 -D__ARM_FEATURE_LPAE=1 -Bprebuilts/gcc/linux-x86/arm/arm-linux-androideabi-4.9/arm-linux-androideabi/bin -std=gnu99 -mthumb -Os -Wall -Werror -DDO_NOT_CHECK_MANUAL_BINDER_INTERFACES -D__ANDROID_VNDK__ -fPIC -DANDROID_STRICT -target armv7a-linux-androideabi30 -Werror=int-to-pointer-cast -Werror=pointer-to-int-cast -Werror=fortify-source -Werror=address-of-temporary -Werror=return-type -Wno-tautological-constant-compare -Wno-tautological-type-limit-compare -Wno-reorder-init-list -Wno-implicit-int-float-conversion -Wno-int-in-bool-context -Wno-sizeof-array-div -Wno-tautological-overlap-compare -Wno-deprecated-copy -Wno-range-loop-construct -Wno-misleading-indentation -Wno-zero-as-null-pointer-constant -Wno-deprecated-anon-enum-enum-conversion -Wno-deprecated-enum-enum-conversion -Wno-string-compare -Wno-enum-enum-conversion -Wno-enum-float-conversion -Wno-pessimizing-move -MD -MF /home/tech180/android/spark/out/target/product/flame/obj_arm/SHARED_LIBRARIES/libtunnel_intermediates/tunnel.d -o /home/tech180/android/spark/out/target/product/flame/obj_arm/SHARED_LIBRARIES/libtunnel_intermediates/tunnel.o hardware/knowles/athletico/sound_trigger_hal/tunnel.c"
hardware/knowles/athletico/sound_trigger_hal/tunnel.c:28:10: fatal error: 'linux/mfd/adnc/iaxxx-tunnel-intf.h' file not found
#include <linux/mfd/adnc/iaxxx-tunnel-intf.h>
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1 error generated.
[ 3% 3923/102649] target thumb C: adnc_strm.primary.default_32 <= hardware/knowles/athletico/sound_trigger_hal/adnc_strm.c
FAILED: /home/tech180/android/spark/out/target/product/flame/obj_arm/SHARED_LIBRARIES/adnc_strm.primary.default_intermediates/adnc_strm.o
/bin/bash -c "PWD=/proc/self/cwd prebuilts/clang/host/linux-x86/clang-r383902b1/bin/clang -I hardware/knowles/athletico/sound_trigger_hal -I /home/tech180/android/spark/out/target/product/flame/obj_arm/SHARED_LIBRARIES/adnc_strm.primary.default_intermediates -I /home/tech180/android/spark/out/target/product/flame/gen/SHARED_LIBRARIES/adnc_strm.primary.default_intermediates -Isystem/core/liblog/include_vndk -Isystem/core/libcutils/include_vndk -Isystem/core/libprocessgroup/include -Isystem/core/libcutils/include -Iexternal/tinyalsa/include -Iexternal/tinyalsa/include -Iexternal/libcxx/include -Iexternal/libcxxabi/include -isystem /home/tech180/android/spark/out/soong/.intermediates/bionic/libc/libc.llndk/android_vendor.30_arm_armv8-a_cortex-a76_shared/gen/include -isystem bionic/libc/kernel/android/scsi -isystem bionic/libc/kernel/android/uapi -isystem bionic/libc/kernel/uapi -isystem bionic/libc/kernel/uapi/asm-arm -Iexternal/libcxxabi/include -isystem /home/tech180/android/spark/out/target/product/flame/obj/include -c -fomit-frame-pointer -DANDROID -fmessage-length=0 -W -Wall -Wno-unused -Winit-self -Wpointer-arith -no-canonical-prefixes -DNDEBUG -UDEBUG -fno-exceptions -Wno-multichar -O2 -g -fno-strict-aliasing -Werror=date-time -Werror=pragma-pack -Werror=pragma-pack-suspicious-include -fdebug-prefix-map=/proc/self/cwd= -D__compiler_offsetof=__builtin_offsetof -faddrsig -Werror=int-conversion -fexperimental-new-pass-manager -Wno-reserved-id-macro -Wno-unused-command-line-argument -fcolor-diagnostics -Wno-sign-compare -Wno-defaulted-function-deleted -Wno-inconsistent-missing-override -Wno-c99-designator -ftrivial-auto-var-init=zero -enable-trivial-auto-var-init-zero-knowing-it-will-be-removed-from-clang -ffunction-sections -fdata-sections -fno-short-enums -funwind-tables -fstack-protector-strong -Wa,--noexecstack -D_FORTIFY_SOURCE=2 -Wstrict-aliasing=2 -Werror=return-type -Werror=non-virtual-dtor -Werror=address -Werror=sequence-point -Werror=format-security -nostdlibinc -msoft-float -march=armv8-a -mfloat-abi=softfp -mfpu=neon-fp-armv8 -mcpu=cortex-a55 -mfpu=neon-fp-armv8 -D__ARM_FEATURE_LPAE=1 -Bprebuilts/gcc/linux-x86/arm/arm-linux-androideabi-4.9/arm-linux-androideabi/bin -std=gnu99 -mthumb -Os -Wall -Werror -DDO_NOT_CHECK_MANUAL_BINDER_INTERFACES -D__ANDROID_VNDK__ -fPIC -DANDROID_STRICT -target armv7a-linux-androideabi30 -Werror=int-to-pointer-cast -Werror=pointer-to-int-cast -Werror=fortify-source -Werror=address-of-temporary -Werror=return-type -Wno-tautological-constant-compare -Wno-tautological-type-limit-compare -Wno-reorder-init-list -Wno-implicit-int-float-conversion -Wno-int-in-bool-context -Wno-sizeof-array-div -Wno-tautological-overlap-compare -Wno-deprecated-copy -Wno-range-loop-construct -Wno-misleading-indentation -Wno-zero-as-null-pointer-constant -Wno-deprecated-anon-enum-enum-conversion -Wno-deprecated-enum-enum-conversion -Wno-string-compare -Wno-enum-enum-conversion -Wno-enum-float-conversion -Wno-pessimizing-move -MD -MF /home/tech180/android/spark/out/target/product/flame/obj_arm/SHARED_LIBRARIES/adnc_strm.primary.default_intermediates/adnc_strm.d -o /home/tech180/android/spark/out/target/product/flame/obj_arm/SHARED_LIBRARIES/adnc_strm.primary.default_intermediates/adnc_strm.o hardware/knowles/athletico/sound_trigger_hal/adnc_strm.c"
hardware/knowles/athletico/sound_trigger_hal/adnc_strm.c:30:10: fatal error: 'linux/mfd/adnc/iaxxx-system-identifiers.h' file not found
#include <linux/mfd/adnc/iaxxx-system-identifiers.h>
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1 error generated.
[ 3% 3924/102649] //system/core/base:libbase clang++ strings.cpp
[ 3% 3925/102649] //external/flac/libFLAC:libFLAC clang bitwriter.c [apex29]
[ 3% 3926/102649] //external/libcxx:libc++_static clang++ src/future.cpp
[ 3% 3927/102649] //external/flac/libFLAC:libFLAC clang bitreader.c [apex29]
[ 3% 3928/102649] target thumb C++: gralloc.default_32 <= hardware/libhardware/modules/gralloc/gralloc.cpp
[ 3% 3929/102649] //bionic/libc:libc.llndk versioner preprocess include
warning: attempted to generate guard with empty availability: obsoleted = 21
warning: attempted to generate guard with empty availability: obsoleted = 23
[ 3% 3930/102649] build /home/tech180/android/spark/out/target/product/flame/dtb.img
FAILED: /home/tech180/android/spark/out/target/product/flame/dtb.img
/bin/bash -c "(echo -e \"\\033[32m\"\"Building DTBs\"\"\\033[0m\" ) && (PATH=/home/tech180/android/spark/prebuilts/jdk/jdk11/linux-x86/bin:/home/tech180/android/spark/prebuilts/jdk/jdk11/linux-x86/bin:/home/tech180/android/spark/out/soong/host/linux-x86/bin:/home/tech180/android/spark/out/host/linux-x86/bin:/home/tech180/android/spark/prebuilts/gcc/linux-x86/aarch64/aarch64-linux-android-4.9/bin:/home/tech180/android/spark/prebuilts/gcc/linux-x86/arm/arm-linux-androideabi-4.9/bin:/home/tech180/android/spark/development/scripts:/home/tech180/android/spark/prebuilts/devtools/tools:/home/tech180/android/spark/external/selinux/prebuilts/bin:/home/tech180/android/spark/prebuilts/misc/linux-x86/dtc:/home/tech180/android/spark/prebuilts/misc/linux-x86/libufdt:/home/tech180/android/spark/prebuilts/clang/host/linux-x86/llvm-binutils-stable:/home/tech180/android/spark/prebuilts/android-emulator/linux-x86_64:/home/tech180/android/spark/prebuilts/asuite/acloud/linux-x86:/home/tech180/android/spark/prebuilts/asuite/aidegen/linux-x86:/home/tech180/android/spark/prebuilts/asuite/atest/linux-x86:/home/tech180/.local/bin:/usr/local/sbin:/usr/local/bin:/usr/bin:/home/tech180/.dotnet/tools:/usr/lib/jvm/default/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl:/var/lib/snapd/snap/bin:\$PATH PATH=/home/tech180/android/spark/prebuilts/clang/host/linux-x86/clang-r383902b1/bin:\$PATH LD_LIBRARY_PATH=/home/tech180/android/spark/prebuilts/clang/host/linux-x86/clang-r383902b1/lib64:\$LD_LIBRARY_PATH PATH=//bin:\$PATH prebuilts/build-tools/linux-x86/bin/make -j16 CFLAGS_MODULE=\"-fno-pic\" DTC=/home/tech180/android/spark/prebuilts/tools-lineage/linux-x86/dtc/dtc MKDTIMG=/home/tech180/android/spark/prebuilts/misc/linux-x86/libufdt/mkdtimg -C kernel/google/coral O=/home/tech180/android/spark/out/target/product/flame/dtbs ARCH=arm64 CROSS_COMPILE=\"aarch64-linux-android-\" CROSS_COMPILE_ARM32=\"arm-linux-androideabi-\" CLANG_TRIPLE=aarch64-linux-gnu- CC=\" /home/tech180/android/spark/prebuilts/clang/host/linux-x86/clang-r383902b1/bin/clang\" KERNEL_THINLTO_CACHE_PATH=\"/home/tech180/android/spark//home/tech180/android/spark/out/target/product/flame/obj/KERNEL_THINLTO-CACHE\" floral_defconfig ) && (PATH=/home/tech180/android/spark/prebuilts/jdk/jdk11/linux-x86/bin:/home/tech180/android/spark/prebuilts/jdk/jdk11/linux-x86/bin:/home/tech180/android/spark/out/soong/host/linux-x86/bin:/home/tech180/android/spark/out/host/linux-x86/bin:/home/tech180/android/spark/prebuilts/gcc/linux-x86/aarch64/aarch64-linux-android-4.9/bin:/home/tech180/android/spark/prebuilts/gcc/linux-x86/arm/arm-linux-androideabi-4.9/bin:/home/tech180/android/spark/development/scripts:/home/tech180/android/spark/prebuilts/devtools/tools:/home/tech180/android/spark/external/selinux/prebuilts/bin:/home/tech180/android/spark/prebuilts/misc/linux-x86/dtc:/home/tech180/android/spark/prebuilts/misc/linux-x86/libufdt:/home/tech180/android/spark/prebuilts/clang/host/linux-x86/llvm-binutils-stable:/home/tech180/android/spark/prebuilts/android-emulator/linux-x86_64:/home/tech180/android/spark/prebuilts/asuite/acloud/linux-x86:/home/tech180/android/spark/prebuilts/asuite/aidegen/linux-x86:/home/tech180/android/spark/prebuilts/asuite/atest/linux-x86:/home/tech180/.local/bin:/usr/local/sbin:/usr/local/bin:/usr/bin:/home/tech180/.dotnet/tools:/usr/lib/jvm/default/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl:/var/lib/snapd/snap/bin:\$PATH PATH=/home/tech180/android/spark/prebuilts/clang/host/linux-x86/clang-r383902b1/bin:\$PATH LD_LIBRARY_PATH=/home/tech180/android/spark/prebuilts/clang/host/linux-x86/clang-r383902b1/lib64:\$LD_LIBRARY_PATH PATH=//bin:\$PATH prebuilts/build-tools/linux-x86/bin/make -j16 CFLAGS_MODULE=\"-fno-pic\" DTC=/home/tech180/android/spark/prebuilts/tools-lineage/linux-x86/dtc/dtc MKDTIMG=/home/tech180/android/spark/prebuilts/misc/linux-x86/libufdt/mkdtimg -C kernel/google/coral O=/home/tech180/android/spark/out/target/product/flame/dtbs ARCH=arm64 CROSS_COMPILE=\"aarch64-linux-android-\" CROSS_COMPILE_ARM32=\"arm-linux-androideabi-\" CLANG_TRIPLE=aarch64-linux-gnu- CC=\" /home/tech180/android/spark/prebuilts/clang/host/linux-x86/clang-r383902b1/bin/clang\" KERNEL_THINLTO_CACHE_PATH=\"/home/tech180/android/spark//home/tech180/android/spark/out/target/product/flame/obj/KERNEL_THINLTO-CACHE\" dtbs ) && (cat \$(find /home/tech180/android/spark/out/target/product/flame/dtbs/arch/arm64/boot/dts/** -type f -name \"*.dtb\" | sort) > /home/tech180/android/spark/out/target/product/flame/dtb.img )"
Building DTBs
make: Entering directory '/home/tech180/android/spark/kernel/google/coral'
make[1]: Entering directory '/home/tech180/android/spark/out/target/product/flame/dtbs'
GEN ./Makefile
#
# configuration written to .config
#
make[1]: Leaving directory '/home/tech180/android/spark/out/target/product/flame/dtbs'
make: Leaving directory '/home/tech180/android/spark/kernel/google/coral'
make: Entering directory '/home/tech180/android/spark/kernel/google/coral'
make[1]: Entering directory '/home/tech180/android/spark/out/target/product/flame/dtbs'
GEN ./Makefile
scripts/kconfig/conf --silentoldconfig Kconfig
CHK include/config/kernel.release
GEN ./Makefile
CHK include/generated/uapi/linux/version.h
CHK scripts/mod/devicetable-offsets.h
Using /home/tech180/android/spark/kernel/google/coral as source for kernel
CHK include/generated/utsrelease.h
CHK include/generated/timeconst.h
CHK include/generated/bounds.h
CHK include/generated/asm-offsets.h
CALL /home/tech180/android/spark/kernel/google/coral/scripts/checksyscalls.sh
DTC arch/arm64/boot/dts/google/qcom-base/sm8150-v2.dtb
DTC arch/arm64/boot/dts/google/qcom-base/sm8150.dtb
/bin/sh: line 1: /home/tech180/android/spark/prebuilts/tools-lineage/linux-x86/dtc/dtc: No such file or directory
/bin/sh: line 1: /home/tech180/android/spark/prebuilts/tools-lineage/linux-x86/dtc/dtc: No such file or directory
make[3]: *** [scripts/Makefile.lib:325: arch/arm64/boot/dts/google/qcom-base/sm8150-v2.dtb] Error 127
make[3]: *** Waiting for unfinished jobs....
make[3]: *** [scripts/Makefile.lib:325: arch/arm64/boot/dts/google/qcom-base/sm8150.dtb] Error 127
make[2]: *** [/home/tech180/android/spark/kernel/google/coral/scripts/Makefile.build:678: arch/arm64/boot/dts/google] Error 2
make[1]: *** [arch/arm64/Makefile:236: dtbs] Error 2
make[1]: Leaving directory '/home/tech180/android/spark/out/target/product/flame/dtbs'
make: *** [Makefile:146: sub-make] Error 2
make: Leaving directory '/home/tech180/android/spark/kernel/google/coral'
[ 3% 3931/102649] //external/libcxx:libc++_static clang++ src/iostream.cpp
[ 3% 3932/102649] build /home/tech180/android/spark/out/target/product/flame/dtbo/arch/arm64/boot/dtbo.img
FAILED: /home/tech180/android/spark/out/target/product/flame/dtbo/arch/arm64/boot/dtbo.img
/bin/bash -c "(echo -e \"\\033[32m\"\"Building DTBO.img\"\"\\033[0m\" ) && (PATH=/home/tech180/android/spark/prebuilts/jdk/jdk11/linux-x86/bin:/home/tech180/android/spark/prebuilts/jdk/jdk11/linux-x86/bin:/home/tech180/android/spark/out/soong/host/linux-x86/bin:/home/tech180/android/spark/out/host/linux-x86/bin:/home/tech180/android/spark/prebuilts/gcc/linux-x86/aarch64/aarch64-linux-android-4.9/bin:/home/tech180/android/spark/prebuilts/gcc/linux-x86/arm/arm-linux-androideabi-4.9/bin:/home/tech180/android/spark/development/scripts:/home/tech180/android/spark/prebuilts/devtools/tools:/home/tech180/android/spark/external/selinux/prebuilts/bin:/home/tech180/android/spark/prebuilts/misc/linux-x86/dtc:/home/tech180/android/spark/prebuilts/misc/linux-x86/libufdt:/home/tech180/android/spark/prebuilts/clang/host/linux-x86/llvm-binutils-stable:/home/tech180/android/spark/prebuilts/android-emulator/linux-x86_64:/home/tech180/android/spark/prebuilts/asuite/acloud/linux-x86:/home/tech180/android/spark/prebuilts/asuite/aidegen/linux-x86:/home/tech180/android/spark/prebuilts/asuite/atest/linux-x86:/home/tech180/.local/bin:/usr/local/sbin:/usr/local/bin:/usr/bin:/home/tech180/.dotnet/tools:/usr/lib/jvm/default/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl:/var/lib/snapd/snap/bin:\$PATH PATH=/home/tech180/android/spark/prebuilts/clang/host/linux-x86/clang-r383902b1/bin:\$PATH LD_LIBRARY_PATH=/home/tech180/android/spark/prebuilts/clang/host/linux-x86/clang-r383902b1/lib64:\$LD_LIBRARY_PATH PATH=//bin:\$PATH prebuilts/build-tools/linux-x86/bin/make -j16 CFLAGS_MODULE=\"-fno-pic\" DTC=/home/tech180/android/spark/prebuilts/tools-lineage/linux-x86/dtc/dtc MKDTIMG=/home/tech180/android/spark/prebuilts/misc/linux-x86/libufdt/mkdtimg -C kernel/google/coral O=/home/tech180/android/spark/out/target/product/flame/dtbo ARCH=arm64 CROSS_COMPILE=\"aarch64-linux-android-\" CROSS_COMPILE_ARM32=\"arm-linux-androideabi-\" CLANG_TRIPLE=aarch64-linux-gnu- CC=\" /home/tech180/android/spark/prebuilts/clang/host/linux-x86/clang-r383902b1/bin/clang\" KERNEL_THINLTO_CACHE_PATH=\"/home/tech180/android/spark//home/tech180/android/spark/out/target/product/flame/obj/KERNEL_THINLTO-CACHE\" floral_defconfig ) && (PATH=/home/tech180/android/spark/prebuilts/jdk/jdk11/linux-x86/bin:/home/tech180/android/spark/prebuilts/jdk/jdk11/linux-x86/bin:/home/tech180/android/spark/out/soong/host/linux-x86/bin:/home/tech180/android/spark/out/host/linux-x86/bin:/home/tech180/android/spark/prebuilts/gcc/linux-x86/aarch64/aarch64-linux-android-4.9/bin:/home/tech180/android/spark/prebuilts/gcc/linux-x86/arm/arm-linux-androideabi-4.9/bin:/home/tech180/android/spark/development/scripts:/home/tech180/android/spark/prebuilts/devtools/tools:/home/tech180/android/spark/external/selinux/prebuilts/bin:/home/tech180/android/spark/prebuilts/misc/linux-x86/dtc:/home/tech180/android/spark/prebuilts/misc/linux-x86/libufdt:/home/tech180/android/spark/prebuilts/clang/host/linux-x86/llvm-binutils-stable:/home/tech180/android/spark/prebuilts/android-emulator/linux-x86_64:/home/tech180/android/spark/prebuilts/asuite/acloud/linux-x86:/home/tech180/android/spark/prebuilts/asuite/aidegen/linux-x86:/home/tech180/android/spark/prebuilts/asuite/atest/linux-x86:/home/tech180/.local/bin:/usr/local/sbin:/usr/local/bin:/usr/bin:/home/tech180/.dotnet/tools:/usr/lib/jvm/default/bin:/usr/bin/site_perl:/usr/bin/vendor_perl:/usr/bin/core_perl:/var/lib/snapd/snap/bin:\$PATH PATH=/home/tech180/android/spark/prebuilts/clang/host/linux-x86/clang-r383902b1/bin:\$PATH LD_LIBRARY_PATH=/home/tech180/android/spark/prebuilts/clang/host/linux-x86/clang-r383902b1/lib64:\$LD_LIBRARY_PATH PATH=//bin:\$PATH prebuilts/build-tools/linux-x86/bin/make -j16 CFLAGS_MODULE=\"-fno-pic\" DTC=/home/tech180/android/spark/prebuilts/tools-lineage/linux-x86/dtc/dtc MKDTIMG=/home/tech180/android/spark/prebuilts/misc/linux-x86/libufdt/mkdtimg -C kernel/google/coral O=/home/tech180/android/spark/out/target/product/flame/dtbo ARCH=arm64 CROSS_COMPILE=\"aarch64-linux-android-\" CROSS_COMPILE_ARM32=\"arm-linux-androideabi-\" CLANG_TRIPLE=aarch64-linux-gnu- CC=\" /home/tech180/android/spark/prebuilts/clang/host/linux-x86/clang-r383902b1/bin/clang\" KERNEL_THINLTO_CACHE_PATH=\"/home/tech180/android/spark//home/tech180/android/spark/out/target/product/flame/obj/KERNEL_THINLTO-CACHE\" dtbo.img )"
Building DTBO.img
make: Entering directory '/home/tech180/android/spark/kernel/google/coral'
make[1]: Entering directory '/home/tech180/android/spark/out/target/product/flame/dtbo'
GEN ./Makefile
#
# configuration written to .config
#
make[1]: Leaving directory '/home/tech180/android/spark/out/target/product/flame/dtbo'
make: Leaving directory '/home/tech180/android/spark/kernel/google/coral'
make: Entering directory '/home/tech180/android/spark/kernel/google/coral'
make[1]: Entering directory '/home/tech180/android/spark/out/target/product/flame/dtbo'
GEN ./Makefile
scripts/kconfig/conf --silentoldconfig Kconfig
CHK include/config/kernel.release
GEN ./Makefile
CHK include/generated/uapi/linux/version.h
CHK scripts/mod/devicetable-offsets.h
Using /home/tech180/android/spark/kernel/google/coral as source for kernel
CHK include/generated/utsrelease.h
CHK include/generated/timeconst.h
CHK include/generated/bounds.h
CHK include/generated/asm-offsets.h
CALL /home/tech180/android/spark/kernel/google/coral/scripts/checksyscalls.sh
DTC arch/arm64/boot/dts/google/qcom-base/sm8150-v2.dtb
DTC arch/arm64/boot/dts/google/qcom-base/sm8150.dtb
/bin/sh: line 1: /home/tech180/android/spark/prebuilts/tools-lineage/linux-x86/dtc/dtc: No such file or directory
make[3]: *** [scripts/Makefile.lib:325: arch/arm64/boot/dts/google/qcom-base/sm8150.dtb] Error 127
make[3]: *** Waiting for unfinished jobs....
/bin/sh: line 1: /home/tech180/android/spark/prebuilts/tools-lineage/linux-x86/dtc/dtc: No such file or directory
make[3]: *** [scripts/Makefile.lib:325: arch/arm64/boot/dts/google/qcom-base/sm8150-v2.dtb] Error 127
make[2]: *** [/home/tech180/android/spark/kernel/google/coral/scripts/Makefile.build:678: arch/arm64/boot/dts/google] Error 2
make[1]: *** [arch/arm64/Makefile:236: dtbs] Error 2
make[1]: Leaving directory '/home/tech180/android/spark/out/target/product/flame/dtbo'
make: *** [Makefile:146: sub-make] Error 2
make: Leaving directory '/home/tech180/android/spark/kernel/google/coral'
[ 3% 3933/102649] //external/libcxx:libc++_static clang++ src/debug.cpp
[ 3% 3934/102649] //system/memory/libmeminfo/libdmabufinfo/tools:dmabuf_dump clang++ dmabuf_dump.cpp
[ 3% 3935/102649] //external/libcxx:libc++_static clang++ src/algorithm.cpp
[ 3% 3936/102649] //external/libcxx:libc++_static clang++ src/ios.cpp
[ 3% 3937/102649] //external/libcxx:libc++_static clang++ src/locale.cpp
[ 3% 3938/102649] //external/fmtlib:fmtlib clang++ src/format.cc
[ 3% 3939/102649] //external/fmtlib:fmtlib clang++ src/format.cc [apex29]
00:40:48 ninja failed with: exit status 1
ninja: build stopped: subcommand failed.
[0;31m#### failed to build some targets (04:23 (mm:ss)) ####[00m
Any help would be greatly appreciated!
Hey did you get an answer? to this?
I am having the same error

Lots of errors when launching AVD emulator

Hi,
I'm completely new to the world of Android development and Android Studio.
Just finished installing the latest Android Studio (Chipmunk 2021.2.1 Patch 2) and following some examples and "get started" guides.
Opened an "Empty Activity" (that display 'Hello World') with Java and minimum SDK: 23 (Marshmallow) that I wanted test on a virtual device.
Created a device with 'Nexus 5' and API level: 31 (S) with default values and started it. All seems fine when it starts up and the home screen pops up after a moment. But when checking 'logcat' for the emulator it is littered with errors and warnings.
Now to my question; is it normal for the emulator to log all these errors in logcat or is there something wrong?
If it's not normal, does any of you have a hint about what can cause these errors (I must have done something wrong I guess...)?
All help would be appreciated!
P.S I attached the first 5000, or so, lines of error level logcat.
Edit: Seems like the attached file won't work so I'm pasting the first 100 rows as an example:
2022-08-29 21:07:13.344 0-0/? E/[Firmware Bug]: CPU1: APIC id mismatch. Firmware: 1 APIC: 0
2022-08-29 21:07:13.344 0-0/? E/[Firmware Bug]: CPU2: APIC id mismatch. Firmware: 2 APIC: 0
2022-08-29 21:07:13.344 0-0/? E/[Firmware Bug]: CPU3: APIC id mismatch. Firmware: 3 APIC: 0
2022-08-29 21:07:14.390 0-0/? E/kvm: no hardware support
2022-08-29 21:07:14.391 0-0/? E/kvm: no hardware support
2022-08-29 21:07:16.189 0-0/? E/init: Failed to copy /avb into /metadata/gsi/dsu/avb/: No such file or directory
2022-08-29 21:07:17.229 0-0/? E/init: [libfs_avb]Device path not found: /dev/block/by-name/system
2022-08-29 21:07:18.256 0-0/? E/init: [libfs_avb]Device path not found: /dev/block/by-name/system
2022-08-29 21:07:18.801 0-0/? E/init: Do not have permissions to set 'persist.sys.usb.config' to 'none' in property file '/vendor/build.prop': SELinux permission check failed
2022-08-29 21:07:18.807 0-0/? E/init: Do not have permissions to set 'persist.sys.usb.config' to 'none' in property file '/vendor_dlkm/etc/build.prop': SELinux permission check failed
2022-08-29 21:07:18.813 0-0/? E/init: Do not have permissions to set 'persist.sys.usb.config' to 'none' in property file '/odm/etc/build.prop': SELinux permission check failed
2022-08-29 21:07:18.846 0-0/? E/selinux: SELinux: Could not get canonical path for /metadata/ota/rollback-indicator restorecon: No such file or directory.
2022-08-29 21:07:18.849 0-0/? E/selinux:
2022-08-29 21:07:18.849 0-0/? E/selinux: SELinux: Could not stat /metadata/gsi: No such file or directory.
2022-08-29 21:07:18.851 0-0/? E/selinux:
2022-08-29 21:07:19.342 0-0/? E/linkerconfig: Unable to access VNDK APEX at path: /apex/com.android.vndk.v31: No such file or directory
2022-08-29 21:07:19.344 0-0/? E/linkerconfig: Unable to access VNDK APEX at path: /apex/com.android.vndk.v31: No such file or directory
2022-08-29 21:07:20.907 0-0/? E/selinux: SELinux: setxattr failed: /cache: Read-only file system
2022-08-29 21:07:20.909 0-0/? E/selinux:
2022-08-29 21:07:21.019 0-0/? E/init: Control message: Could not find 'aidl/android.system.keystore2.IKeystoreService/default' for ctl.interface_start from pid: 192 (/system/bin/servicemanager)
2022-08-29 21:07:22.284 209-209/? E/keystore2: keystore2::error: In generate_key.
Caused by:
0: While generating Key without explicit attestation key.
1: Error::Km(ErrorCode(-67))
2022-08-29 21:07:22.285 202-202/? E/vold: keystore2 Keystore generateKey returned service specific error: -67
2022-08-29 21:07:22.698 0-0/? E/init: Unable to set property 'ro.boottime.init.fsck.data' from uid:0 gid:0 pid:202: Read-only property was already set
2022-08-29 21:07:22.713 0-0/? E/init: Unable to set property 'ro.boottime.init.mount.data' from uid:0 gid:0 pid:202: Read-only property was already set
2022-08-29 21:07:22.785 209-209/? E/keystore2: keystore2::error: In generate_key.
Caused by:
0: While generating Key without explicit attestation key.
1: Error::Km(ErrorCode(-67))
2022-08-29 21:07:22.785 202-202/? E/vold: keystore2 Keystore generateKey returned service specific error: -67
2022-08-29 21:07:22.825 0-0/? E/init: Failed to set encryption policy of /data/misc to 8143bdf7df531a148fb23539f7a3a381 v2 modes 1/4 flags 0x2: Directory not empty
2022-08-29 21:07:22.831 0-0/? E/logwrapper: executing ls failed: Permission denied
2022-08-29 21:07:22.832 0-0/? E/logwrapper:
2022-08-29 21:07:22.839 0-0/? E/init: ls -laZ /data/misc returned failure: 255
2022-08-29 21:07:22.840 0-0/? E/init: Setting 8143bdf7df531a148fb23539f7a3a381 policy on /data/misc failed!
2022-08-29 21:07:22.842 0-0/? E/init: Rebooting into recovery
2022-08-29 21:07:22.904 209-209/? E/keystore2: keystore2::maintenance: Call to earlyBootEnded failed for security level STRONGBOX: In call_with_watchdog: getting keymint device.
2022-08-29 21:07:22.904 209-209/? E/keystore2: keystore2::error: In call_with_watchdog: getting keymint device
Caused by:
0: In get_keymint_device.
1: In connect_keymint: Trying to get Legacy wrapper.
2: Error::Km(ErrorCode(-68))
2022-08-29 21:07:22.905 202-202/? E/vold: keystore2 Keystore earlyBootEnded returned service specific error: -68
2022-08-29 21:07:23.226 0-0/? E/apexd: Can't open /system_ext/apex for reading : No such file or directory
2022-08-29 21:07:23.227 0-0/? E/apexd: Can't open /product/apex for reading : No such file or directory
2022-08-29 21:07:23.229 0-0/? E/apexd: Can't open /vendor/apex for reading : No such file or directory
2022-08-29 21:07:23.447 209-209/? E/keystore2: keystore2::error: In generate_key.
Caused by:
0: While generating Key without explicit attestation key.
1: Error::Km(ErrorCode(-67))
2022-08-29 21:07:23.447 202-202/? E/vold: keystore2 Keystore generateKey returned service specific error: -67
2022-08-29 21:07:23.472 209-209/? E/keystore2: keystore2::error: In generate_key.
Caused by:
0: While generating Key without explicit attestation key.
1: Error::Km(ErrorCode(-67))
2022-08-29 21:07:23.472 202-202/? E/vold: keystore2 Keystore generateKey returned service specific error: -67
2022-08-29 21:07:23.847 318-318/? E/odsign: Initialized Keystore key.
2022-08-29 21:07:23.990 320-320/? E/odrefresh: statvfs '/data/misc/apexdata/com.android.art/dalvik-cache': No such file or directory
2022-08-29 21:07:24.147 0-0/? E/selinux: SELinux: Could not stat /data/dalvik-cache/arm: No such file or directory.
2022-08-29 21:07:24.149 0-0/? E/selinux:
2022-08-29 21:07:24.149 0-0/? E/selinux: SELinux: Could not stat /data/dalvik-cache/arm64: No such file or directory.
2022-08-29 21:07:24.151 0-0/? E/selinux:
2022-08-29 21:07:24.151 0-0/? E/selinux: SELinux: Could not stat /data/dalvik-cache/mips: No such file or directory.
2022-08-29 21:07:24.153 0-0/? E/selinux:
2022-08-29 21:07:24.153 0-0/? E/selinux: SELinux: Could not stat /data/dalvik-cache/mips64: No such file or directory.
2022-08-29 21:07:24.155 0-0/? E/selinux:
2022-08-29 21:07:24.156 0-0/? E/selinux: SELinux: Could not stat /data/dalvik-cache/x86: No such file or directory.
2022-08-29 21:07:24.157 0-0/? E/selinux:
2022-08-29 21:07:24.158 0-0/? E/selinux: SELinux: Could not stat /data/dalvik-cache/x86_64: No such file or directory.
2022-08-29 21:07:24.160 0-0/? E/selinux:
2022-08-29 21:07:24.189 0-0/? E/init: Could not set 'ro.logd.size' to '2M' in /data/local.prop: Read-only property was already set
2022-08-29 21:07:24.191 0-0/? E/init: Could not load single persistent property file, trying legacy directory: Unable to read persistent property file: open() failed: No such file or directory
2022-08-29 21:07:24.213 0-0/? E/logd: FrameworkListener: read() failed (Connection reset by peer)
2022-08-29 21:07:24.638 349-349/? E/LegacySupport: Could not get passthrough implementation for [email protected]::IDevicesFactory/default.
2022-08-29 21:07:24.898 349-349/? E/LegacySupport: Could not get passthrough implementation for [email protected]::IEffectsFactory/default.
2022-08-29 21:07:24.987 349-349/? E/LegacySupport: Could not get passthrough implementation for [email protected]::ISoundTriggerHw/default.
2022-08-29 21:07:25.018 368-368/? E/RanchuHwc: GetFunction: Unknown function descriptor: 44
2022-08-29 21:07:25.018 368-368/? E/RanchuHwc: GetFunction: Unknown function descriptor: 45
2022-08-29 21:07:25.018 368-368/? E/RanchuHwc: GetFunction: Unknown function descriptor: 46
2022-08-29 21:07:25.018 368-368/? E/RanchuHwc: GetFunction: Unknown function descriptor: 47
2022-08-29 21:07:25.018 368-368/? E/RanchuHwc: GetFunction: Unknown function descriptor: 48
2022-08-29 21:07:25.018 368-368/? E/RanchuHwc: GetFunction: Unknown function descriptor: 49
2022-08-29 21:07:25.018 368-368/? E/RanchuHwc: GetFunction: Unknown function descriptor: 50
2022-08-29 21:07:25.019 368-368/? E/RanchuHwc: GetFunction: Unknown function descriptor: 51
2022-08-29 21:07:25.019 368-368/? E/RanchuHwc: GetFunction: Unknown function descriptor: 52
2022-08-29 21:07:25.019 368-368/? E/RanchuHwc: GetFunction: Unknown function descriptor: 55
2022-08-29 21:07:25.019 368-368/? E/RanchuHwc: GetFunction: Unknown function descriptor: 56
2022-08-29 21:07:25.019 368-368/? E/RanchuHwc: GetFunction: Unknown function descriptor: 57
2022-08-29 21:07:25.019 353-353/? E/GCH_CameraProvider: Initialize: HWL doesn't support vendor buffer allocation Function not implemented(-38)
2022-08-29 21:07:25.019 368-368/? E/RanchuHwc: GetFunction: Unknown function descriptor: 58
2022-08-29 21:07:25.019 368-368/? E/RanchuHwc: GetFunction: Unknown function descriptor: 59
2022-08-29 21:07:25.067 349-349/? E/HidlServiceManagement: Service [email protected]::IBluetoothAudioProvidersFactory/default must be in VINTF manifest in order to register/get.

Question Help Bricked 8i. Phone can't boot

Hey there
Recently I've bricked my 8i and I tried many unbrick tutorials on here.
Unfortunately, it worked a little bit, it just boot looped since this moment.
Now I tried another thing to stop boot loops, and it just prevents my phone to turn on now and I get theses error messages when trying to use mtk_client
```
python mtk da seccfg unlock
MTK Flash/Exploit Client V1.6.0 (c) B.Kerler 2018-2022
DA_handler - Please disconnect, start mtkclient and reconnect.
C:\Users\User\Downloads\mtkclient-main>python mtk da seccfg unlock
MTK Flash/Exploit Client V1.6.0 (c) B.Kerler 2018-2022
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Device detected
Preloader - CPU: MT6781(Helio G96)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - Var1: 0x73
Preloader - Disabling Watchdog...
Preloader - HW code: 0x1066
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - Get Target info
Preloader - BROM mode detected.
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: E4A43E3469FC06E6E6BB52C939A6FF58
Preloader - SOC_ID: 3237BB18D43F0CF85FDAFE911AA1F6E0A7F2E419B92870AD711BFFA06AECC9AB
PLTools - Loading payload from mt6781_payload.bin, 0x264 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Kamakiri - Done sending payload...
PLTools - Successfully sent payload: C:\Users\User\Downloads\mtkclient-main\mtkclient\payloads\mt6781_payload.bin
DA_handler - Device is protected.
DA_handler - Device is in BROM mode. Trying to dump preloader.
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
xflashext - Patching da1 ...
Mtk
Mtk - [LIB]: ←[33mFailed to patch preloader security←[0m
xflashext
xflashext - [LIB]: ←[33mError on patching da1 version check...←[0m
Mtk - Patched "get_vfy_policy" in preloader
xflashext - Patching da2 ...
Preloader
Preloader - [LIB]: ←[31mError on DA_Send cmd←[0m
DAXFlash
DAXFlash - [LIB]: ←[31mError on sending DA.←[0m
```
Thanks for your help

Issues rooting Blu Vivo XL3

I have been trying to root a Blu Vivo XL3 that I got my hands on and I've tried mtkclient as well as sp flash tool but I keep getting errors that the DA agent fails. Anyone have any suggestions that I could try?
When I try to dump the firmware using mtk I get the following:
Code:
.........Port - Device detected :)
Preloader - CPU: MT6735/T,MT8735A()
Preloader - HW version: 0x0
Preloader - WDT: 0x10212000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x201000
Preloader - CQ_DMA addr: 0x10217c00
Preloader - Var1: 0x28
Preloader - Disabling Watchdog...
Preloader - HW code: 0x321
Preloader - Target config: 0x0
Preloader - SBC enabled: False
Preloader - SLA enabled: False
Preloader - DAA enabled: False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked: False
Preloader - Get Target info
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xcc00
Preloader - SW Ver: 0x0
DA_handler - Device is unprotected.
DA_handler - Device is in Preloader-Mode :(
DALegacy - Uploading legacy da...
DALegacy - Uploading legacy stage 1 from MTK_AllInOne_DA_5.2152.bin
legacyext - Legacy DA2 is patched.
legacyext
legacyext - [LIB]: Legacy DA2 CMD F0 not patched.
Preloader
Preloader - [LIB]: upload_data failed with error: DA_IMAGE_SIG_VERIFY_FAIL (0x2001)
Preloader
Preloader - [LIB]: Error on uploading da data

Categories

Resources