Closed Iwearthebelt closed 1 year ago
Please in the future click on the support button and attach the zip file it generates. Not only it is more thorough and useful, it redacts your sensitive information.
You are using Magisk 25210 which is known to have issues. I don't know about the delta, but the patch it generated does not look good, and PF told you about it.
The patched image file does not contain source boot's SHA1
This is normal for older devices, but newer deviced should have it.
If you have a newer device, please double check if everything is ok.
This is not a problem with PF, it is with the version of Magisk you're using, which cannot patch a stock boot.
I kind of figured as much. Thanks for our help though. I went ahead and used Android Flash Tool (First time ever) to get back up and running again. Currently going through the setup process. when i get back up and running which magisk do you recommend using?
I use and recommend Official Canary 25206, though your needs might be different.
PixelFlasher 4.8.2.0 started on :2023-04-10 15:28:43 Platform: win32 System Timezone: ('US Mountain Standard Time', 'US Mountain Daylight Time') Offset: -7.0 Configuration Path: C:\Users\rland\AppData\Roaming\PixelFlasher { "advanced_options": false, "boot_id": null, "custom_codepage": "", "custom_rom": false, "custom_rom_path": null, "customize_font": false, "dev_mode": false, "device": null, "disable_verification": false, "disable_verity": false, "fastboot_force": false, "fastboot_verbose": false, "firmware_path": "C:\Users\rland\Downloads\raven-tq2a.230305.008.e1-factory-def2deef.zip", "flash_both_slots": false, "flash_to_inactive_slot": true, "force_codepage": false, "height": 705, "magisk": "io.github.huskydg.magisk", "mode": "keepData", "pf_font_face": "Courier", "pf_font_size": 12, "phone_path": "/storage/emulated/0/Download", "platform_tools_path": "C:\Users\rland\Downloads\platform-tools_r33.0.3-windows (1)\platform-tools", "pos_x": 272, "pos_y": 77, "selected_boot_md5": null, "temporary_root": false, "update_check": true, "verbose": false, "version": "4.8.2.0", "width": 1176 } System Default Encoding: utf-8 File System Encoding: utf-8 Active code page: 437
2023-04-10 15:28:50 Selected Platform Tools Path: C:\Users\rland\Downloads\platform-tools_r33.0.3-windows (1)\platform-tools. SDK Version: 33.0.3-8952118
Please select a boot image!
Loading Device list ... This could take a while, please be patient.
2023-04-10 15:28:50 No Device is selected! Load time: 8 seconds
2023-04-10 15:30:09 Scanning for Devices ... 1 Device(s) are found. 2023-04-10 15:30:09 No Device is selected!
Getting package io.github.huskydg.magisk path on the device ... Package Path is: /data/app/~~sGRwVUkztEAt0-IsKesozg==/io.github.huskydg.magisk-2OA1uZaqBo_3kEg7UNDmTw==/base.apk Selected Device on 2023-04-10 15:30:14: Device ID: 1A011FDEE006UW Device Model: raven Device Active Slot: b Device Mode: adb Device is Rooted: True Device Build: TQ2A.230305.008.E1 Device API Level: 33 Device Architecture: arm64-v8a sys_oem_unlock_allowed: 0 ro.boot.flash.locked: 1 ro.boot.vbmeta.device_state: locked vendor.boot.verifiedbootstate:
ro.product.first_api_level: 31 ro.boot.verifiedbootstate: green vendor.boot.vbmeta.device_state: ro.boot.warranty_bit: 0 ro.warranty_bit: 0 ro.secure: 1 Device Bootloader Version: slider-1.2-9465321 Magisk Manager Version: fdac22ba-delta:25210 Magisk Path: /data/app/~~sGRwVUkztEAt0-IsKesozg==/io.github.huskydg.magisk-2OA1uZaqBo_3kEg7UNDmTw==/base.apk Checked for Package: io.github.huskydg.magisk Magisk Version: fdac22ba-delta:25210 Magisk Config SHA1: 23188b19c91ea163065f57ac7708b4a890d167b6 Magisk Modules: AK3 Helper Module enabled 5.10.167-Kirisakura_4.4.2-995695-gc8e1803f7339-dirty Call Recorder - SKVALEX enabled 2.2.0 (3.5.5) Font Manager enabled v5.7.6 Systemless Hosts enabled 1.0 Magisk Bootloop Protector enabled v1.8.1 mindetach enabled v3 Universal SafetyNet Fix enabled v2.3.1-MOD_3.0 Music ReVanced enabled v5.39.52 YouTube ReVanced enabled v18.05.40
Launching browser for Firmware download URL: https://developers.google.com/android/images#raven 2023-04-10 15:40:00 The following firmware is selected: raven-tq2a.230405.003.e1-factory-6cadf298.zip Selected Firmware raven-tq2a.230405.003.e1-factory-6cadf298.zip SHA-256: 6cadf2983e910cb563dfa09b24b7e0817b808d2d5dd79a096a7664489c49f5d7 Expected to match 6cadf298 in the filename and did. This is good!
Please Process the firmware!
============================================================================== 2023-04-10 15:40:20 PixelFlasher 4.8.2.0 Processing firmware file ...
7-Zip 21.07 (x64) : Copyright (c) 1999-2021 Igor Pavlov : 2021-12-26 Scanning the drive for archives: 1 file, 2437971282 bytes (2326 MiB) Extracting archive: C:\Users\rland\Downloads\raven-tq2a.230405.003.e1-factory-6cadf298.zip
Path = C:\Users\rland\Downloads\raven-tq2a.230405.003.e1-factory-6cadf298.zip Type = zip Physical Size = 2437971282 Everything is Ok Folders: 1 Files: 6 Size: 2502675646 Compressed: 2437971282 Extracting boot.img from C:\Users\rland\AppData\Roaming\PixelFlasher\factory_images\raven-tq2a.230405.003.e1\image-raven-tq2a.230405.003.e1.zip ... sha1 of boot.img: ae0c1141837a7ceb83fd934e068e8fc855246b1b Checking for cached copy of boot.img Cached copy of boot.img with sha1: ae0c1141837a7ceb83fd934e068e8fc855246b1b is not found. Copying C:\Users\rland\AppData\Roaming\PixelFlasher\factory_images\raven-tq2a.230405.003.e1\image-raven-tq2a.230405.003.e1.zip to C:\Users\rland\AppData\Roaming\PixelFlasher\boot_images4\ae0c1141837a7ceb83fd934e068e8fc855246b1b Package ID: 6 Boot ID: 11 Package_Boot ID: 11
Please select a boot image! Process firmware time: 5 seconds
Selected Boot: File: boot.img Path: C:\Users\rland\AppData\Roaming\PixelFlasher\boot_images4\ae0c1141837a7ceb83fd934e068e8fc855246b1b\boot.img SHA1: ae0c1141837a7ceb83fd934e068e8fc855246b1b Patched: False Date: 2023-04-10 15:40:25 Firmware Fingerprint: raven-tq2a.230405.003.e1 Firmware: C:\Users\rland\Downloads\raven-tq2a.230405.003.e1-factory-6cadf298.zip Type: firmware
============================================================================== 2023-04-10 15:40:36 PixelFlasher 4.8.2.0 Patching boot.img
Deleting /storage/emulated/0/Download/boot.img_ae0c1141.img from the device ...
2023-04-10 15:40:36 ERROR: Could not delete /storage/emulated/0/Download/boot.img_ae0c1141.img Return Code: 1. Stdout: . Stderr: adb.exe: device offline . Aborting ...
Selected Boot: File: boot.img Path: C:\Users\rland\AppData\Roaming\PixelFlasher\boot_images4\ae0c1141837a7ceb83fd934e068e8fc855246b1b\boot.img SHA1: ae0c1141837a7ceb83fd934e068e8fc855246b1b Patched: False Date: 2023-04-10 15:40:25 Firmware Fingerprint: raven-tq2a.230405.003.e1 Firmware: C:\Users\rland\Downloads\raven-tq2a.230405.003.e1-factory-6cadf298.zip Type: firmware
============================================================================== 2023-04-10 15:41:14 PixelFlasher 4.8.2.0 Patching boot.img
Deleting /storage/emulated/0/Download/boot.img_ae0c1141.img from the device ...
2023-04-10 15:41:14 ERROR: Could not delete /storage/emulated/0/Download/boot.img_ae0c1141.img Return Code: 1. Stdout: . Stderr: adb.exe: device offline . Aborting ...
2023-04-10 15:41:46 Scanning for Devices ... 1 Device(s) are found.
Getting package io.github.huskydg.magisk path on the device ... Package Path is: /data/app/~~sGRwVUkztEAt0-IsKesozg==/io.github.huskydg.magisk-2OA1uZaqBo_3kEg7UNDmTw==/base.apk Selected Device on 2023-04-10 15:41:46: Device ID: 1A011FDEE006UW Device Model: raven Device Active Slot: b Device Mode: adb Device is Rooted: True Device Build: TQ2A.230305.008.E1 Device API Level: 33 Device Architecture: arm64-v8a sys_oem_unlock_allowed: 1 ro.boot.flash.locked: 1 ro.boot.vbmeta.device_state: locked vendor.boot.verifiedbootstate:
ro.product.first_api_level: 31 ro.boot.verifiedbootstate: green vendor.boot.vbmeta.device_state: ro.boot.warranty_bit: 0 ro.warranty_bit: 0 ro.secure: 1 Device Bootloader Version: slider-1.2-9465321 Magisk Manager Version: fdac22ba-delta:25210 Magisk Path: /data/app/~~sGRwVUkztEAt0-IsKesozg==/io.github.huskydg.magisk-2OA1uZaqBo_3kEg7UNDmTw==/base.apk Checked for Package: io.github.huskydg.magisk Magisk Version: fdac22ba-delta:25210 Magisk Config SHA1: 23188b19c91ea163065f57ac7708b4a890d167b6 Magisk Modules: AK3 Helper Module enabled 5.10.167-Kirisakura_4.4.2-995695-gc8e1803f7339-dirty Call Recorder - SKVALEX enabled 2.2.0 (3.5.5) Font Manager enabled v5.7.6 Systemless Hosts enabled 1.0 Magisk Bootloop Protector enabled v1.8.1 mindetach enabled v3 Universal SafetyNet Fix enabled v2.3.1-MOD_3.0 Music ReVanced enabled v5.39.52 YouTube ReVanced enabled v18.05.40
Getting package io.github.huskydg.magisk path on the device ... Package Path is: /data/app/~~sGRwVUkztEAt0-IsKesozg==/io.github.huskydg.magisk-2OA1uZaqBo_3kEg7UNDmTw==/base.apk Selected Device on 2023-04-10 15:41:55: Device ID: 1A011FDEE006UW Device Model: raven Device Active Slot: b Device Mode: adb Device is Rooted: True Device Build: TQ2A.230305.008.E1 Device API Level: 33 Device Architecture: arm64-v8a sys_oem_unlock_allowed: 1 ro.boot.flash.locked: 1 ro.boot.vbmeta.device_state: locked vendor.boot.verifiedbootstate:
ro.product.first_api_level: 31 ro.boot.verifiedbootstate: green vendor.boot.vbmeta.device_state: ro.boot.warranty_bit: 0 ro.warranty_bit: 0 ro.secure: 1 Device Bootloader Version: slider-1.2-9465321 Magisk Manager Version: fdac22ba-delta:25210 Magisk Path: /data/app/~~sGRwVUkztEAt0-IsKesozg==/io.github.huskydg.magisk-2OA1uZaqBo_3kEg7UNDmTw==/base.apk Checked for Package: io.github.huskydg.magisk Magisk Version: fdac22ba-delta:25210 Magisk Config SHA1: 23188b19c91ea163065f57ac7708b4a890d167b6 Magisk Modules: AK3 Helper Module enabled 5.10.167-Kirisakura_4.4.2-995695-gc8e1803f7339-dirty Call Recorder - SKVALEX enabled 2.2.0 (3.5.5) Font Manager enabled v5.7.6 Systemless Hosts enabled 1.0 Magisk Bootloop Protector enabled v1.8.1 mindetach enabled v3 Universal SafetyNet Fix enabled v2.3.1-MOD_3.0 Music ReVanced enabled v5.39.52 YouTube ReVanced enabled v18.05.40
Selected Boot: File: boot.img Path: C:\Users\rland\AppData\Roaming\PixelFlasher\boot_images4\ae0c1141837a7ceb83fd934e068e8fc855246b1b\boot.img SHA1: ae0c1141837a7ceb83fd934e068e8fc855246b1b Patched: False Date: 2023-04-10 15:40:25 Firmware Fingerprint: raven-tq2a.230405.003.e1 Firmware: C:\Users\rland\Downloads\raven-tq2a.230405.003.e1-factory-6cadf298.zip Type: firmware
============================================================================== 2023-04-10 15:42:00 PixelFlasher 4.8.2.0 Patching boot.img
Deleting /storage/emulated/0/Download/boot.img_ae0c1141.img from the device ... Return Code: 0 Making sure file is not on the phone ... Checking for /storage/emulated/0/Download/boot.img_ae0c1141.img on the device ... File: /storage/emulated/0/Download/boot.img_ae0c1141.img is not found on the device. Deleting /storage/emulated/0/Download/magisk_patched.img from the device ... Return Code: 0 Making sure file is not on the phone ... Checking for /storage/emulated/0/Download/magisk_patched.img on the device ... File: /storage/emulated/0/Download/magisk_patched*.img is not found on the device. Pushing local file: C:\Users\rland\AppData\Roaming\PixelFlasher\boot_images4\ae0c1141837a7ceb83fd934e068e8fc855246b1b\boot.img to the device: /storage/emulated/0/Download/boot.img_ae0c1141.img ... Return Code: 0 Checking for /storage/emulated/0/Download/boot.img_ae0c1141.img on the device ... File: /storage/emulated/0/Download/boot.img_ae0c1141.img is found on the device. Looking for Magisk Manager app ... Magisk Manager Version: 25210 Magisk Version: 25210 Patching with rooted Magisk: fdac22ba-delta:25210 Cleaning up...
Looking for magisk_patched_ae0c1141.img in /storage/emulated/0/Download ... Checking for /storage/emulated/0/Download/magisk_patched_ae0c1141.img on the device ... File: /storage/emulated/0/Download/magisk_patched_ae0c1141.img is found on the device. Pulling /storage/emulated/0/Download/magisk_patched_ae0c1141.img from the phone to: magisk_patched_ae0c1141.img ... Pulling remote file: /storage/emulated/0/Download/magisk_patched_ae0c1141.img from the device to: "C:\Users\rland\AppData\Roaming\PixelFlasher\tmp\magisk_patched_ae0c1141.img" ... Return Code: 0 Getting SHA1 of C:\Users\rland\AppData\Roaming\PixelFlasher\tmp\magisk_patched_ae0c1141.img ... SHA1 of magisk_patched_ae0c1141.img file: 492584098e0d3ab8c65cf21ea8335f479bdfafd0
Getting SHA1 of source boot.img ... Source boot.img's SHA1 is: ae0c1141837a7ceb83fd934e068e8fc855246b1b Getting SHA1 from Magisk config ... Magisk Config's SHA1 is: 23188b19c91ea163065f57ac7708b4a890d167b6
Checking to see if Magisk made a backup of the source boot.img Magisk has NOT made a backup of the source boot.img Triggering Magisk to create a backup ... Making sure stock_boot.img is found on the device ... Triggering Magisk run_migration to create a Backup of source boot.img run_migration completed. Magisk backup for ae0c1141837a7ceb83fd934e068e8fc855246b1b was successful
Extracting short SHA1 from magisk_patched_ae0c1141.img ...
2023-04-10 15:42:09 NOTICE: The patched image file does not contain source boot's SHA1 This is normal for older devices, but newer deviced should have it. If you have a newer device, please double check if everything is ok.
DB BOOT record ID: 12 DB Package_Boot record ID: 12
Please select a boot image! Magisk Version: fdac22ba-delta:25210 Patch time: 10 seconds
Selected Boot: File: magisk_patched_ae0c1141.img Path: C:\Users\rland\AppData\Roaming\PixelFlasher\boot_images4\492584098e0d3ab8c65cf21ea8335f479bdfafd0\magisk_patched_ae0c1141.img SHA1: 492584098e0d3ab8c65cf21ea8335f479bdfafd0 Patched: True Patched With Magisk: fdac22ba-delta:25210 Patched on Device: raven Date: 2023-04-10 15:42:09 Firmware Fingerprint: raven-tq2a.230405.003.e1 Firmware: C:\Users\rland\Downloads\raven-tq2a.230405.003.e1-factory-6cadf298.zip Type: firmware
Dialog Android SDK Version: 33.0.3-8952118 Device: 1A011FDEE006UW raven TQ2A.230305.008.E1 Factory Image: C:\Users\rland\Downloads\raven-tq2a.230405.003.e1-factory-6cadf298.zip
Boot image: 49258409 / ae0c1141 From: C:\Users\rland\Downloads\raven-tq2a.230405.003.e1-factory-6cadf298.zip [Patched] with Magisk fdac22ba-delta:25210 on raven
Flash Mode: keepData
Flash To Inactive Slot: True
Note: Pressing OK button will invoke a script that will utilize fastboot commands, this could possibly take a long time and PixelFlasher will appear frozen. PLEASE BE PATIENT. In case it takes excessively long, it could possibly be due to improper or bad fasboot drivers. In such cases, killing the fastboot process will resume to normalcy.
The script content that will be executed:
chcp 437 @ECHO OFF :: This is a generated file by PixelFlasher v4.8.2.0 :: cd C:\Users\rland\AppData\Roaming\PixelFlasher\factory_images\raven-tq2a.230405.003.e1 :: pf_boot.img: C:\Users\rland\AppData\Roaming\PixelFlasher\boot_images4\492584098e0d3ab8c65cf21ea8335f479bdfafd0\magisk_patched_ae0c1141.img :: Android Platform Tools Version: 33.0.3-8952118
echo Switching active slot to the other ... "C:\Users\rland\Downloads\platform-tools_r33.0.3-windows (1)\platform-tools\fastboot.exe" -s 1A011FDEE006UW --set-active=other PATH=%PATH%;"%SYSTEMROOT%\System32" "C:\Users\rland\Downloads\platform-tools_r33.0.3-windows (1)\platform-tools\fastboot.exe" -s 1A011FDEE006UW flash bootloader bootloader-raven-slider-1.2-9465321.img "C:\Users\rland\Downloads\platform-tools_r33.0.3-windows (1)\platform-tools\fastboot.exe" -s 1A011FDEE006UW reboot-bootloader
ping -n 5 127.0.0.1 >nul "C:\Users\rland\Downloads\platform-tools_r33.0.3-windows (1)\platform-tools\fastboot.exe" -s 1A011FDEE006UW flash radio radio-raven-g5123b-112825-230323-b-9800744.img "C:\Users\rland\Downloads\platform-tools_r33.0.3-windows (1)\platform-tools\fastboot.exe" -s 1A011FDEE006UW reboot-bootloader
ping -n 5 127.0.0.1 >nul "C:\Users\rland\Downloads\platform-tools_r33.0.3-windows (1)\platform-tools\fastboot.exe" -s 1A011FDEE006UW --skip-reboot update image-raven-tq2a.230405.003.e1.zip echo rebooting to bootloader ... "C:\Users\rland\Downloads\platform-tools_r33.0.3-windows (1)\platform-tools\fastboot.exe" -s 1A011FDEE006UW reboot bootloader echo Sleeping 5-10 seconds ... ping -n 5 127.0.0.1 >nul ping -n 5 127.0.0.1 >nul echo flashing pf_boot ... "C:\Users\rland\Downloads\platform-tools_r33.0.3-windows (1)\platform-tools\fastboot.exe" -s 1A011FDEE006UW flash boot pf_boot.img echo rebooting to system ... "C:\Users\rland\Downloads\platform-tools_r33.0.3-windows (1)\platform-tools\fastboot.exe" -s 1A011FDEE006UW reboot
2023-04-10 15:42:43 User Pressed Ok.
============================================================================== 2023-04-10 15:42:43 PixelFlasher 4.8.2.0 Flashing Phone
Android Platform Tools Version: 33.0.3-8952118 Rebooting device 1A011FDEE006UW to bootloader ... Waiting 10 seconds ...
Selected Device on 2023-04-10 15:43:00: Device ID: 1A011FDEE006UW Device Model: raven Device Active Slot: b Device Mode: f.b Device Unlocked: True
2023-04-10 15:43:00 Flashing device 1A011FDEE006UW ... C:\Users\rland\AppData\Roaming\PixelFlasher\factory_images\raven-tq2a.230405.003.e1>chcp 437 Active code page: 437 Switching active slot to the other ... Setting current slot to 'a' OKAY [ 0.078s] Finished. Total time: 0.078s Sending 'bootloader_a' (12094 KB) OKAY [ 0.277s] Writing 'bootloader_a' (bootloader) Flashing pack version slider-1.2-9465321 (bootloader) flashing platform gs101 (bootloader) Validating partition ufs (bootloader) Validating partition ufs (bootloader) Validating partition partition:0 (bootloader) Validating partition partition:1 (bootloader) Validating partition partition:2 (bootloader) Validating partition partition:3 (bootloader) Validating partition bl1_a (bootloader) Validating partition pbl_a (bootloader) Validating partition bl2_a (bootloader) Validating partition abl_a (bootloader) Validating partition bl31_a (bootloader) Validating partition tzsw_a (bootloader) Validating partition gsa_a (bootloader) Validating partition ldfw_a (bootloader) Flashing partition ufs (bootloader) Flashing partition ufs (bootloader) Flashing partition partition:0 (bootloader) Flashing partition partition:1 (bootloader) Flashing partition partition:2 (bootloader) Flashing partition partition:3 (bootloader) Flashing partition bl1_a (bootloader) Flashing partition pbl_a (bootloader) Flashing partition bl2_a (bootloader) Flashing partition abl_a (bootloader) Flashing partition bl31_a (bootloader) Flashing partition tzsw_a (bootloader) Flashing partition gsa_a (bootloader) Flashing partition ldfw_a (bootloader) Loading sideload ufsfwupdate OKAY [ 3.141s] Finished. Total time: 3.433s Rebooting into bootloader OKAY [ 0.000s] Finished. Total time: 0.000s < waiting for 1A011FDEE006UW > Sending 'radio_a' (94232 KB) OKAY [ 2.155s] Writing 'radio_a' (bootloader) Flashing pack version g5123b-112825-230323-M-9800744 (bootloader) Flashing partition modem_a OKAY [ 0.344s] Finished. Total time: 2.498s Rebooting into bootloader OKAY [ 0.000s] Finished. Total time: 0.000s < waiting for 1A011FDEE006UW >
Bootloader Version...: slider-1.2-9465321 Baseband Version.....: g5123b-112825-230323-B-9800744 Serial Number........: 1A011FDEE006UW
extracting android-info.txt (0 MB) to RAM... Checking 'product' OKAY [ 0.000s] Checking 'version-bootloader' OKAY [ 0.000s] Checking 'version-baseband' OKAY [ 0.000s] Setting current slot to 'a' OKAY [ 0.094s] extracting boot.img (64 MB) to disk... took 0.237s archive does not contain 'boot.sig' Sending 'boot_a' (65536 KB) OKAY [ 1.493s] Writing 'boot_a' OKAY [ 0.253s] archive does not contain 'init_boot.img' extracting dtbo.img (16 MB) to disk... took 0.062s archive does not contain 'dtbo.sig' Sending 'dtbo_a' (16384 KB) OKAY [ 0.375s] Writing 'dtbo_a' OKAY [ 0.062s] archive does not contain 'dt.img' extracting pvmfw.img (1 MB) to disk... took 0.016s archive does not contain 'pvmfw.sig' Sending 'pvmfw_a' (1024 KB) OKAY [ 0.031s] Writing 'pvmfw_a' OKAY [ 0.000s] archive does not contain 'recovery.img' extracting vbmeta.img (0 MB) to disk... took 0.016s archive does not contain 'vbmeta.sig' Sending 'vbmeta_a' (12 KB) OKAY [ 0.000s] Writing 'vbmeta_a' OKAY [ 0.000s] extracting vbmeta_system.img (0 MB) to disk... took 0.000s archive does not contain 'vbmeta_system.sig' Sending 'vbmeta_system_a' (4 KB) OKAY [ 0.000s] Writing 'vbmeta_system_a' OKAY [ 0.016s] extracting vbmeta_vendor.img (0 MB) to disk... took 0.000s archive does not contain 'vbmeta_vendor.sig' Sending 'vbmeta_vendor_a' (4 KB) OKAY [ 0.000s] Writing 'vbmeta_vendor_a' OKAY [ 0.000s] extracting vendor_boot.img (64 MB) to disk... took 0.250s archive does not contain 'vendor_boot.sig' Sending 'vendor_boot_a' (65536 KB) OKAY [ 1.484s] Writing 'vendor_boot_a' OKAY [ 0.219s] archive does not contain 'vendor_kernel_boot.img' extracting super_empty.img (0 MB) to disk... took 0.016s Rebooting into fastboot OKAY [ 0.000s] < waiting for 1A011FDEE006UW > Sending 'super' (4 KB) OKAY [ 0.000s] Updating super partition OKAY [ 0.022s] Resizing 'product_a' OKAY [ 0.000s] Resizing 'system_a' OKAY [ 0.000s] Resizing 'system_ext_a' OKAY [ 0.016s] Resizing 'system_b' OKAY [ 0.000s] Resizing 'vendor_a' OKAY [ 0.000s] Resizing 'vendor_dlkm_a' OKAY [ 0.000s] Resizing 'vendor_b' OKAY [ 0.000s] archive does not contain 'boot_other.img' archive does not contain 'odm.img' archive does not contain 'odm_dlkm.img' extracting product.img (2620 MB) to disk... took 10.187s archive does not contain 'product.sig' Resizing 'product_a' OKAY [ 0.000s] Sending sparse 'product_a' 1/11 (262112 KB) OKAY [ 6.176s] Writing 'product_a' OKAY [ 1.103s] Sending sparse 'product_a' 2/11 (262124 KB) OKAY [ 6.144s] Writing 'product_a' OKAY [ 1.041s] Sending sparse 'product_a' 3/11 (262128 KB) OKAY [ 6.133s] Writing 'product_a' OKAY [ 1.005s] Sending sparse 'product_a' 4/11 (262116 KB) OKAY [ 6.128s] Writing 'product_a' OKAY [ 1.084s] Sending sparse 'product_a' 5/11 (262120 KB) OKAY [ 6.124s] Writing 'product_a' OKAY [ 1.080s] Sending sparse 'product_a' 6/11 (262124 KB) OKAY [ 6.142s] Writing 'product_a' OKAY [ 1.046s] Sending sparse 'product_a' 7/11 (262128 KB) OKAY [ 6.133s] Writing 'product_a' OKAY [ 1.061s] Sending sparse 'product_a' 8/11 (262128 KB) OKAY [ 6.241s] Writing 'product_a' OKAY [ 1.080s] Sending sparse 'product_a' 9/11 (262128 KB) OKAY [ 6.212s] Writing 'product_a' OKAY [ 0.989s] Sending sparse 'product_a' 10/11 (262116 KB) OKAY [ 6.298s] Writing 'product_a' OKAY [ 1.081s] Sending sparse 'product_a' 11/11 (53036 KB) OKAY [ 1.250s] Writing 'product_a' OKAY [ 0.313s] extracting system.img (827 MB) to disk... took 3.312s archive does not contain 'system.sig' Resizing 'system_a' OKAY [ 0.016s] Sending sparse 'system_a' 1/4 (262112 KB) OKAY [ 6.253s] Writing 'system_a' OKAY [ 1.033s] Sending sparse 'system_a' 2/4 (262116 KB) OKAY [ 6.259s] Writing 'system_a' OKAY [ 1.071s] Sending sparse 'system_a' 3/4 (262140 KB) OKAY [ 6.242s] Writing 'system_a' OKAY [ 1.144s] Sending sparse 'system_a' 4/4 (57780 KB) OKAY [ 1.375s] Writing 'system_a' OKAY [ 0.267s] archive does not contain 'system_dlkm.img' extracting system_ext.img (358 MB) to disk... took 1.453s archive does not contain 'system_ext.sig' Resizing 'system_ext_a' OKAY [ 0.000s] Sending sparse 'system_ext_a' 1/2 (238700 KB) OKAY [ 5.724s] Writing 'system_ext_a' OKAY [ 0.977s] Sending sparse 'system_ext_a' 2/2 (127560 KB) OKAY [ 3.050s] Writing 'system_ext_a' OKAY [ 0.578s] extracting system_other.img (25 MB) to disk... took 0.109s archive does not contain 'system.sig' Resizing 'system_b' OKAY [ 0.000s] Sending 'system_b' (26460 KB) OKAY [ 0.641s] Writing 'system_b' OKAY [ 0.141s] extracting vendor.img (517 MB) to disk... took 2.125s archive does not contain 'vendor.sig' Resizing 'vendor_a' OKAY [ 0.016s] Sending sparse 'vendor_a' 1/3 (262116 KB) OKAY [ 6.301s] Writing 'vendor_a' OKAY [ 1.042s] Sending sparse 'vendor_a' 2/3 (258040 KB) OKAY [ 6.093s] Writing 'vendor_a' OKAY [ 1.107s] Sending sparse 'vendor_a' 3/3 (8284 KB) OKAY [ 0.187s] Writing 'vendor_a' OKAY [ 0.078s] extracting vendor_dlkm.img (39 MB) to disk... took 0.125s archive does not contain 'vendor_dlkm.sig' Resizing 'vendor_dlkm_a' OKAY [ 0.000s] Sending 'vendor_dlkm_a' (40880 KB) OKAY [ 0.958s] Writing 'vendor_dlkm_a' OKAY [ 0.190s] archive does not contain 'vendor_other.img' Finished. Total time: 169.169s rebooting to bootloader ... Rebooting into bootloader OKAY [ 0.000s] Finished. Total time: 0.000s Sleeping 5-10 seconds ... flashing pf_boot ... Sending 'boot_a' (65536 KB) OKAY [ 1.489s] Writing 'boot_a' OKAY [ 0.254s] Finished. Total time: 1.744s rebooting to system ... Rebooting OKAY [ 0.000s] Finished. Total time: 0.000s 2023-04-10 15:46:17 Done! Flashing elapsed time: 214 seconds
2023-04-10 15:54:19 Scanning for Devices ... 1 Device(s) are found. 2023-04-10 15:54:19 No Device is selected!
Getting package io.github.huskydg.magisk path on the device ... Package Path is: /data/app/~~sGRwVUkztEAt0-IsKesozg==/io.github.huskydg.magisk-2OA1uZaqBo_3kEg7UNDmTw==/base.apk
Selected Device on 2023-04-10 15:54:25: Device ID: 1A011FDEE006UW Device Model: raven Device Active Slot: a Device Mode: adb Device is Rooted: False Device Build: TQ2A.230405.003.E1 Device API Level: 33 Device Architecture: arm64-v8a sys_oem_unlock_allowed: 1 ro.boot.flash.locked: 0 ro.boot.vbmeta.device_state: unlocked vendor.boot.verifiedbootstate:
ro.product.first_api_level: 31 ro.boot.verifiedbootstate: orange vendor.boot.vbmeta.device_state: ro.boot.warranty_bit:
ro.warranty_bit:
ro.secure: 1 Device Bootloader Version: slider-1.2-9465321 Magisk Manager Version: fdac22ba-delta:25210 Magisk Path: /data/app/~~sGRwVUkztEAt0-IsKesozg==/io.github.huskydg.magisk-2OA1uZaqBo_3kEg7UNDmTw==/base.apk Checked for Package: io.github.huskydg.magisk
Device Info:
[gsm.version.ril-impl]: [Samsung S.LSI Vendor RIL V2.3 Build 2023-03-16 15:13:48]
bootloader,1681166828 reboot,userrequested,1681165571]
[ro.build.date]: [Fri Mar 24 15:30:17 UTC 2023]
[ro.build.description]: [raven-user 13 TQ2A.230405.003.E1 9802792 release-keys]
[ro.odm.build.date]: [Fri Mar 24 15:30:17 UTC 2023]
[ro.product.build.date]: [Fri Mar 24 15:30:17 UTC 2023]
[ro.product.model]: [Pixel 6 Pro]
[ro.product.odm.model]: [Pixel 6 Pro]
[ro.product.product.model]: [Pixel 6 Pro]
[ro.product.system_ext.model]: [Pixel 6 Pro]
[ro.product.vendor.model]: [Pixel 6 Pro]
[ro.product.vendor_dlkm.model]: [Pixel 6 Pro]
[ro.system.build.date]: [Fri Mar 24 15:30:17 UTC 2023]
[ro.system_ext.build.date]: [Fri Mar 24 15:30:17 UTC 2023]
[ro.vendor.build.date]: [Fri Mar 24 15:30:17 UTC 2023]
[ro.vendor_dlkm.build.date]: [Fri Mar 24 15:30:17 UTC 2023]