OmniROM 13 | How to compile the OmniROM 13 for the ASUS Zenfone 8 |
OmniROM 14 |
How to compile the OmniROM 14 for the ASUS Zenfone 8 |
OmniROM 15 |
How to compile the OmniROM 15 for the ASUS Zenfone 8 |
repo init -u https://github.com/omnirom/android.git -b
android-12.1
repo sync
[xtrnaw7@t15g /data/develop/android/OmniROM]$ cat
.repo/local_manifests/local_manifest.xml
<?xml version="1.0" encoding="UTF-8"?>
<manifest>
<remote name="DonkeyCoyote"
fetch="https://github.com/DonkeyCoyote" />
<project path="device/asus/zenfone8"
name="android_device_asus_zenfone8" remote="omnirom"
revision="android-12.0" />
<project path="vendor/asus" name="proprietary_vendor_asus"
remote="DonkeyCoyote" revision="android-12.1" />
</manifest>
repo sync
. build/envsetup.sh
brunch omni_zenfone8-user
[xtrnaw7@t15g /data/develop/android/OmniROM]$ ls -ltr
out/target/product/zenfone8/omni-12-20220621-zenfone8-HOMEMADE.zip
-rw-rw-r--. 25 xtrnaw7 xtrnaw7 1253703465 Jun 25 10:03
out/target/product/zenfone8/omni-12-20220621-zenfone8-HOMEMADE.zip
[xtrnaw7@t15g /data/develop/android/OmniROM]$
[xtrnaw7@t15g /data/develop/android/OmniROM]$ cat
.repo/local_manifests/local_manifest.xml
<?xml version="1.0" encoding="UTF-8"?>
<manifest>
<remote name="DonkeyCoyote"
fetch="https://github.com/DonkeyCoyote" />
<project path="device/asus/zenfone8"
name="android_device_asus_zenfone8" remote="omnirom"
revision="android-12.0" />
<project path="vendor/asus" name="proprietary_vendor_asus"
remote="DonkeyCoyote" revision="android-12.1" />
<project path="vendor/microg"
name="android_prebuilts_prebuiltapks" remote="omnirom"
revision="android-12.0" />
</manifest>
[xtrnaw7@t15g /data/develop/android/OmniROM]$
repo sync
export ROM_BUILDTYPE=MICROG
brunch omni_zenfone8-user
[xtrnaw7@t15g /data/develop/android/OmniROM]$ ls -ltr
out/target/product/zenfone8/omni-12-20220621-zenfone8-MICROG.zip
-rw-rw-r--. 25 xtrnaw7 xtrnaw7 1253703465 Jun 25 10:03
out/target/product/zenfone8/omni-12-20220621-zenfone8-MICROG.zip
[xtrnaw7@t15g /data/develop/android/OmniROM]$
./build/make/target/product/security
[xtrnaw7@t15g /data/develop/android/OmniROM]$ ls -l
./build/make/target/product/security/platform.*
-rw-------. 1 xtrnaw7 xtrnaw7 1219 Jun 25 09:39
./build/make/target/product/security/platform.pk8
-rw-rw-r--. 1 xtrnaw7 xtrnaw7 1460 Jun 25 09:39
./build/make/target/product/security/platform.x509.pem
[xtrnaw7@t15g /data/develop/android/OmniROM]$
# remove the current certificate files from the apk (probably
not neccessary -- but shouldn't harm)
#
zip -d SMMI_TEST.apk META-INF/CERT.SF META-INF/CERT.RSA
# do a zip align for the apk and write the output to
SMMI_TEST1.apk
#
# (zipalign is part of the OTA tools)
#
/data/develop/android/otatools/bin/zipalign 4 SMMI_TEST.apk
SMMI_TEST1.apk
# test the result (there should be NO output from this command)
#
/data/develop/android/otatools/bin/zipalign -c 4 SMMI_TEST1.apk
# and now sign the apk with the platform key from the
development tree for your self compiled CustomROM
# (apksigner.jar is part of the Sdk from Google for Android)
#
java -jar ./Android/Sdk/build-tools/33.0.0/lib/apksigner.jar
sign --key platform.pk8 --cert platform.x509.pem SMMI_TEST1.apk
adb shell su - -c mkdir -p
/data/adb/modules/SMMI_TEST/system/app/SMMI_TEST
adb push SMMI_TEST1.apk /sdcard/Download/
adb shell su - -c cp /sdcard/Download/SMMI_TEST1.apk
/data/adb/modules/SMMI_TEST/system/app/SMMI_TEST/SMMI_TEST1.apk
adb shell su - -c chmod o+r
/data/adb/modules/SMMI_TEST/system/app/SMMI_TEST/SMMI_TEST1.apk
ASUS_I006D:/ # find /system/app/SMMI_TEST/
/system/app/SMMI_TEST/
/system/app/SMMI_TEST/SMMI_TEST1.apk
ASUS_I006D:/ #
# open a shell on the ASUS Zenfone 8 (either local or via "adb
shell"), become root user
su -
# switch SELinux to permissive mode (I currently do not know the
neccessary SELinux policies to avoid this step ...)
#
setenforce 0
# and start the ASUS Hardware Test App from within the shell
#
am start -n
com.asus.atd.smmitest/com.asus.atd.smmitest.main.MAIN
# switch SELinux to permissive mode (I currenlty do not know
the neccessary SELinux policies to avoid this step ...)
#
setenforce
# simple script to start the ASUS Hardware App
CUR_SELINUX_STATUS="$( getenforce )"
CUR_USERID=$( id -u -n )
RESTORE_SELINUX_STATE="false"
if [ "${CUR_SELINUX_STATUS}"x != "Permissive"x ] ; then
if [ "${CUR_USERID}"x != "root"x ] ; then
echo "Either start this script as user \"root\" or set
the SELinux mode to \"permissive\" using the command
\"setenforce 0\" before starting this script"
exit 1
fi
echo "Setting the SELinux mode to \"Permissive\" ..."
setenforce 0
RESTORE_SELINUX_STATE="true"
else
echo "The SELinux mode is already \"Permissive}\" "
fi
am start -n
com.asus.atd.smmitest/com.asus.atd.smmitest.main.MAIN
2>&1 | tee /sdcard/Download/test.out
if [ ${RESTORE_SELINUX_STATE} = true ] ; then
echo "Press return when done with the tests .."
read USER_INPUT
echo "Setting the SElinux mode back to \"Enforcing\"
...."
setenforce 1
else
echo "Do not forget to set the SELinxu mode back to
\"Enforcing\" using the command \"setenforce 1\" "
fi
# connect to the phone via adb (that should work!)
#
adb shell
# become root user
#
su -
# delete the file with the AUS Hardware Test App
#
rm
/data/adb/modules/SMMI_TEST/system/app/SMMI_TEST/SMMI_TEST1.apk
# and reboot the phone
#
reboot
# try to install the apk as root user
#
su -
# and then
#
setenforce 0
pm install /sdcard/Download/SMMI_TEST.apk
chmod +x
scriptname
) and reboot the phone.# boot the phone into the bootloader and then do
sudo fastboot boot
/data/backup/ASUS_ZENFONE8/twrp/twrp-3.6.1_12-1-I006D.img
cat /data/adb/service.d/correct_dev_pn553.sh
#!/system/bin/sh
NFC_DEVICE="/dev/pn553"
echo ""
echo "The SELinux context for \"${NFC_DEVICE}\" is now:"
ls -lZ ${NFC_DEVICE}
echo ""
echo "Correcting the SELinux context for the NFC device
\"${NFC_DEVICE}\" ..."
chcon -v u:object_r:nfc_device:s0 /dev/pn553
echo ""
echo "The SELinux context for \"${NFC_DEVICE}\" is now:"
ls -lZ ${NFC_DEVICE}
REBOOT=yes install_magisk_via_twrp.sh
REBOOT=no install_magisk_via_twrp.sh
/data/adb/magisk/boot_patch.sh[211]: can't create
/proc/self/fd/: Is a directory
[ 77%] /sdcard/Download/patched_boot_a.391985.img ERROR:
Error downloading the file
"/sdcard/Download/patched_boot_a.391985.img" from the phone!
adb: insufficient permissions for device
adb kill-server
[xtrnaw7@t15g /data/backup/Android/scripts_on_linux]$
./install_magisk_via_twrp.sh
./install_magisk_via_twrp.sh version - 2.0.0.0 - add Magisk to
the boot partition of a phone running Android using TWRP
Using the TWRP image hardcoded in the script:
"/data/backup/ASUS_ZENFONE8/twrp/twrp-3.7.0_12-0-I006D.img"
Checking the script prerequisites ...
Will wait 10 second(s) before starting the script on the phone
The script is running as user "xtrnaw7" -- will use "sudo" for
the fastboot commands ...
Will patch the boot partition on the attached phone with the
serial number "M6AIB760D0939LX"
Using the options "-d -s M6AIB760D0939LX " for the adb
commands
Using the options " -s M6AIB760D0939LX " for the fastboot
commands
Checking for a connected phone booted into fastboot mode ...
No attached phone in fastboot mode found
Checking for an attached phone with working access via adb
(USB) ...
Linux localhost 5.4.147-Omni-qgki-perf-gea6f815f5af9-dirty #42
SMP PREEMPT Tue Sep 27 18:03:41 CEST 2022 aarch64
... found a phone connected via USB with working adb access
The phone is booted in normal mode
The installed OS is based on Android 12 (Wed Aug 10 06:59:46
CEST 2022); the description for the distribution is
"omni_zenfone8-user 12 SQ3A.220605.009.A1
eng.xtrnaw.20220810.065947 release-keys"
The installed version of Magisk is com.topjohnwu.magisk
versionCode 25200
Booting the phone into the fastboot mode now ...
Waiting up to 60 seconds for the boot into the fastboot mode
...
Booting the phone from the TWRP image
"/data/backup/ASUS_ZENFONE8/twrp/twrp-3.7.0_12-0-I006D.img"
now ...
Sending 'boot.img' (98304 KB) OKAY [ 2.489s]
Booting OKAY [ 10.359s]
Finished. Total time: 12.888s
Waiting up to 60 seconds for the boot of the phone ....
Retrieving the current boot slot from the phone ...
The current boot slot is "_b"
The boot slot to patch is "_b"
The boot partition to patch is "boot_b"
Checking if the Magisk patch script "boot_patch.sh" exists on
the phone ....
-rwxr-xr-x 1 root root 5987 2022-10-27 07:33
/data/adb/magisk/boot_patch.sh
Checking if the download directory "/sdcard/Download" exists
on the phone ....
/sdcard/Download
Creating the boot image file
"/sdcard/Download/boot_b.732627.img" from the partition
"/dev/block/by-name/boot_b" ...
196608+0 records in
196608+0 records out
100663296 bytes (96 M) copied, 0.308243 s, 311 M/s
Checking the result ...
-rw-rw---- 1 root media_rw 100663296 2022-10-28 09:51
/sdcard/Download/boot_b.732627.img
The check sums are:
The check sum of the boot partition
"/dev/block/by-name/boot_b" on the phone is "4108888341"
The check sum of th boot image file on the phone is
"/sdcard/Download/boot_b.732627.img" is "4108888341"
Patching the boot image file
"/sdcard/Download/boot_b.732627.img" ...
Waiting now 10 seconds ...
- Unpacking boot image
Parsing boot image: [/sdcard/Download/boot_b.732627.img]
HEADER_VER [3]
KERNEL_SZ [42025472]
RAMDISK_SZ [34080597]
OS_VERSION [12.0.0]
OS_PATCH_LEVEL [2022-05]
PAGESIZE [4096]
CMDLINE []
KERNEL_FMT [raw]
RAMDISK_FMT [gzip]
VBMETA
- Checking ramdisk status
Loading cpio: [ramdisk.cpio]
- Stock boot image detected
- Patching ramdisk
Loading cpio: [ramdisk.cpio]
Add entry [init] (0750)
Create directory [overlay.d] (0750)
Create directory [overlay.d/sbin] (0750)
Add entry [overlay.d/sbin/magisk64.xz] (0644)
Patch with flag KEEPVERITY=[false] KEEPFORCEENCRYPT=[false]
Found fstab file [system/etc/fstab.postinstall]
Remove pattern
[,avb_keys=/product/etc/security/avb/system_other.avbpubkey]
Loading cpio: [ramdisk.cpio.orig]
Backup mismatch entry: [init] -> [.backup/init]
Record new entry: [overlay.d] -> [.backup/.rmlist]
Record new entry: [overlay.d/sbin] -> [.backup/.rmlist]
Record new entry: [overlay.d/sbin/magisk64.xz] ->
[.backup/.rmlist]
Backup mismatch entry: [system/etc/fstab.postinstall] ->
[.backup/system/etc/fstab.postinstall]
Create directory [.backup] (0000)
Add entry [.backup/.magisk] (0000)
Dump cpio: [ramdisk.cpio]
- Repacking boot image
Parsing boot image: [/sdcard/Download/boot_b.732627.img]
HEADER_VER [3]
KERNEL_SZ [42025472]
RAMDISK_SZ [34080597]
OS_VERSION [12.0.0]
OS_PATCH_LEVEL [2022-05]
PAGESIZE [4096]
CMDLINE []
KERNEL_FMT [raw]
RAMDISK_FMT [gzip]
VBMETA
Repack to boot image: [new-boot.img]
HEADER_VER [3]
KERNEL_SZ [42025472]
RAMDISK_SZ [34331854]
OS_VERSION [12.0.0]
OS_PATCH_LEVEL [2022-05]
PAGESIZE [4096]
CMDLINE []
Checking the result ...
-rw-r--r-- 1 root root 100663296 2022-10-28 09:51
/data/adb/magisk/new-boot.img
The patched boot image is
"/sdcard/Download/patched_boot_b.732627.img"
Waiting now 5 seconds ...
Patching the partition "/dev/block/by-name/boot_b" from the
patched boot image file
"/sdcard/Download/patched_boot_b.732627.img" via dd ...
196608+0 records in
196608+0 records out
100663296 bytes (96 M) copied, 4.721236 s, 20 M/s
Checking the result ....
The check sums for the images and devices on the phone are:
4108888341 100663296 /sdcard/Download/boot_b.732627.img
3369959638 100663296
/sdcard/Download/patched_boot_b.732627.img
3369959638 100663296 /dev/block/by-name/boot_b
OK, patching the boot partition "/dev/block/by-name/boot_b"
was successfull
*** Press return to reboot the phone now
Rebooting the phone now ...
[xtrnaw7@t15g /data/backup/Android/scripts_on_linux]$
adb shell
su -
ASUS_I006D:/ # ls -ld /data/adb/modules/*
drwxrws--- 3 u0_a118 media_rw 3452 2022-05-30 12:12
/data/adb/modules/playstore
ASUS_I006D:/ #
ASUS_I006D:/ # find /data/adb/modules/playstore
/data/adb/modules/playstore
/data/adb/modules/playstore/system
/data/adb/modules/playstore/system/etc
/data/adb/modules/playstore/system/etc/permissions
/data/adb/modules/playstore/system/etc/permissions/com.android.vending.xml
/data/adb/modules/playstore/system/priv-app
/data/adb/modules/playstore/system/priv-app/Phonesky
/data/adb/modules/playstore/system/priv-app/Phonesky/lib
/data/adb/modules/playstore/system/priv-app/Phonesky/lib/arm
/data/adb/modules/playstore/system/priv-app/Phonesky/lib/arm/libbrotli.so
/data/adb/modules/playstore/system/priv-app/Phonesky/lib/arm/libconscrypt_jni.so
/data/adb/modules/playstore/system/priv-app/Phonesky/lib/arm/libcronet.85.0.4181.5.so
/data/adb/modules/playstore/system/priv-app/Phonesky/lib/arm/libgame_sdk_device_info_jni.so
/data/adb/modules/playstore/system/priv-app/Phonesky/lib/arm/libphonesky_data_loader.so
/data/adb/modules/playstore/system/priv-app/Phonesky/lib/arm/libtensorflowlite_jni.so
/data/adb/modules/playstore/system/priv-app/Phonesky/Phonesky.apk
/data/adb/modules/playstore/system/priv-app/FakeStore
/data/adb/modules/playstore/system/priv-app/FakeStore/oat
/data/adb/modules/playstore/system/priv-app/FakeStore/oat/arm64
/data/adb/modules/playstore/system/priv-app/FakeStore/oat/arm64/FakeStore.odex
/data/adb/modules/playstore/system/priv-app/FakeStore/oat/arm64/FakeStore.vdex
/data/adb/modules/playstore/system/priv-app/FakeStore/FakeStore.apk
ASUS_I006D:/ #
ASUS_I006D:/ # find /system/priv-app/Phonesky/
/system/priv-app/Phonesky/
/system/priv-app/Phonesky/lib
/system/priv-app/Phonesky/lib/arm
/system/priv-app/Phonesky/lib/arm/libbrotli.so
/system/priv-app/Phonesky/lib/arm/libconscrypt_jni.so
/system/priv-app/Phonesky/lib/arm/libcronet.85.0.4181.5.so
/system/priv-app/Phonesky/lib/arm/libgame_sdk_device_info_jni.so
/system/priv-app/Phonesky/lib/arm/libphonesky_data_loader.so
/system/priv-app/Phonesky/lib/arm/libtensorflowlite_jni.so
/system/priv-app/Phonesky/Phonesky.apk
ASUS_I006D:/ # ASUS_I006D:/ # find /system/priv-app/FakeStore/
/system/priv-app/FakeStore/
/system/priv-app/FakeStore/oat
/system/priv-app/FakeStore/oat/arm64
/system/priv-app/FakeStore/oat/arm64/FakeStore.vdex
/system/priv-app/FakeStore/oat/arm64/FakeStore.odex
/system/priv-app/FakeStore/FakeStore.apk
ASUS_I006D:/ #
adb push magisk_ssh_v0.14.zip /sdcard/Download/
adb shell su - -c /data/adb/magisk/magisk64 --install-module
/sdcard/Download/magisk_ssh_v0.14.zip
ASUS_I006D:/ # /data/adb/magisk/magisk64 --install-module
/sdcard/Download/magisk_ssh_v0.14.zip
- Current boot slot: _a
- Device is system-as-root
******************************* OpenSSH for Android
*******************************
[0/7] Preparing module directory
[1/7] Extracting architecture unspecific module files
[2/7] Extracting libraries and binaries for arm64
[3/7] Configuring library path wrapper
[4/7] Recreating symlinks
[5/7] Creating SSH user directories
[6/7] Found sshd_config, will not copy a default one
[7/7] Cleaning up - Setting permissions - Done
ASUS_I006D:/ #
adb shell reboot
touch /data/ssh/root/.ssh/authorized_keys
chmod 600 /data/ssh/root/.ssh/authorized_keys
touch /data/ssh/KEEP_ON_UNINSTALL
touch /data/ssh/no-autostart
# start the sshd (as user root)
#
/data/adb/modules/ssh/opensshd.init start
# to stop the sshd (as user root)
#
/data/adb/modules/ssh/opensshd.init stop
PHONE_IP_ADDRESS=$( adb shell ifconfig wlan0 | grep "inet
addr:" | sed -e "s/.*inet addr://g" -e
"s/[[:space:]]*Bcast.*//g" )
[xtrnaw7@t15g ~]$ ssh -l root ${PHONE_IP_ADDRESS} id
uid=0(root) gid=0(root) groups=0(root) context=u:r:magisk:s0
[xtrnaw7@t15g ~]$
# on your local Linux workstation do:
# start the sshd on the phone via adb if not already running
#
adb shell su - -c /data/adb/modules/ssh/opensshd.init start
# retrieve the current IP address from the phone
#
PHONE_IP_ADDRESS=$( adb shell ifconfig wlan0 | grep "inet addr:"
| sed -e "s/.*inet addr://g" -e "s/[[:space:]]*Bcast.*//g" )
# backup the new photos from the phone to the Linux workstation
(rsync only copies new files from the phone)
# to the local directory /data/backup/ASUS_ZENFONE8/DCIM
#
rsync -av --rsync-path /data/adb/modules/ssh/usr/bin/rsync
root@${PHONE_IP_ADDRESS}:/sdcard/DCIM/
/data/backup/ASUS_ZENFONE8/DCIM
# optional stop the sshd on the phone via adb
#
adb shell su - -c /data/adb/modules/ssh/opensshd.init stop
ASUS_I006D:/ # ls -ld /storag
drwx--x--- 4 shell everybody 80 2022-06-26 18:37 /storage
ASUS_I006D:/ #
# /data/adb/service.d/create_ssh_dir_for_shell.sh
#
mkdir -p /storage/shell/.ssh chmod -R 700 /storage/shell/
touch /storage/shell/.ssh/authorized_keys
echo "<ssh_public_key>" >
/storage/shell/.ssh/authorized_keys
chmod 600 /storage/shell/.ssh/authorized_keys
chown -R shell:shell /storage/shell
su - -c sh data/adb/service.d/create_ssh_dir_for_shell.sh
su - -c cp /data/ssh/sshd_config
/storage/ssh/sshd_config.org.$$
Match User shell AuthorizedKeysFile
/storage/shell/.ssh/authorized_keys
[xtrnaw7@t15g ~]$ ssh -l shell 192.168.1.148 id
uid=2000(shell) gid=2000(shell) groups=2000(shell)
context=u:r:magisk:s0
[xtrnaw7@t15g ~]$
sed -i -e "s/.*StrictModes.*//g" -e
"s/UsePrivilegeSeparation/StrictModes
no\nUsePrivilegeSeparation/g" /data/ssh/sshd_config
Match User shell AuthorizedKeysFile
/sdcard/shell/.ssh/authorized_keys
/data/adb/modules/ssh/opensshd.init stop
/data/adb/modules/ssh/opensshd.init start
ASUS_I006D:/ # find /sdcard/shell -exec ls -ld {} \;
drwxrws--- 3 u0_a118 media_rw 3452 2022-06-26 18:32
/sdcard/shell
drwxrws--- 2 u0_a118 media_rw 3452 2022-06-26 18:32
/sdcard/shell/.ssh
-rw-rw---- 1 u0_a118 media_rw 408 2022-06-26 18:32
/sdcard/shell/.ssh/authorized_keys
ASUS_I006D:/ #
ps -fp $PPID| grep adbd >/dev/null if [ $? -ne 0 ] ; then
# # not running in an adb session : else # # running in an adb
session ... fi
#!/system/bin/sh
GRANTED=$(magisk --sqlite "SELECT uid FROM policies WHERE
policy = '2';")
echo 'Packages with root granted:'
for UID in $GRANTED
do
UID=$(echo $UID | sed 's!^uid=!!g')
pm list packages --uid $UID
done
adb shell rm /data/adb/modules/*/disable
A tool to unpack / repack boot images, parse / patch / extract cpio, patch dtb, hex patch binaries, and compress / decompress files with multiple algorithms.
/system/etc/init
/vendor/etc/init
/odm/etc/init
OmniROM 12 | How to compile the OmniROM for the ASUS Zenfone 8 |
OmniROM 14 |
How to compile the OmniROM 14 for the ASUS Zenfone 8 |
OmniROM 15 |
How to compile the OmniROM 15 for the ASUS Zenfone 8 |
repo init -u https://github.com/omnirom/android.git -b
android-13.0
repo sync
[xtrnaw7@t15g /data/develop/android/OmniROM_13.0]$ cat
.repo/local_manifests/local_manifest.xml
<?xml version="1.0" encoding="UTF-8"?>
<manifest>
<remote name="DonkeyCoyote"
fetch="https://github.com/DonkeyCoyote" />
<project path="device/asus/zenfone8"
name="android_device_asus_zenfone8" remote="omnirom"
revision="android-13.0" />
<project path="vendor/asus" name="proprietary_vendor_asus"
remote="DonkeyCoyote" revision="android-13.0" />
<project path="vendor/microg"
name="android_prebuilts_prebuiltapks" remote="omnirom"
revision="android-13.0" />
<project path="vendor/images/asus"
name="android_vendor_images_asus" remote="gitlab"
revision="android-13.0" />
</manifest>
[xtrnaw7@t15g /data/develop/android/OmniROM_13.0]$
repo sync
# optional:
#
# to create an OmniROM image with MicroG packages set the
environment variable ROM_BUILDTYPE to MICROG before starting the
build
#
# to create an OmniROM image with GAPPS packages set the
environment variable ROM_BUILDTYPE to GAPPS before starting the
build
#(that will only work if the repositories for the GAPPS are
configured, of course)
#
export ROM_BUILDTYPE=MICROG
. build/envsetup.sh
brunch omni_zenfone8-user
[xtrnaw7@t15g /data/develop/android/OmniROM_13.0]$ ls -l
out/target/product/zenfone8/omni-13-2022*-zenfone8-*.zip
-rw-rw-r--. 3 xtrnaw7 xtrnaw7 1258920226 Nov 14 11:55
out/target/product/zenfone8/omni-13-202211141148-zenfone8-MICROG.zip
[xtrnaw7@t15g /data/develop/android/OmniROM_13.0]$
[xtrnaw7@t15g /data/develop/android/OmniROM]$ ls -l
./build/make/target/product/security/platform.*
-rw-------. 1 xtrnaw7 xtrnaw7 1219 Jun 25 09:39
./build/make/target/product/security/platform.pk8 -rw-rw-r--. 1
xtrnaw7 xtrnaw7 1460 Jun 25 09:39
./build/make/target/product/security/platform.x509.pem
[xtrnaw7@t15g /data/develop/android/OmniROM]$
TWRP Dev - xtrnaw7@t15g /data/develop/android/twrp ] $
lunch twrp_I006D-eng
In file included from build/make/core/config.mk:313:
In file included from build/make/core/envsetup.mk:312:
build/make/core/product_config.mk:160: error: Can not locate
config makefile for product "twrp_I006D".
11:35:37 dumpvars failed with: exit status 1
Device I006D not found. Attempting to retrieve device
repository from TeamWin Github (http://github.com/TeamWin).
Found repository: android_device_asus_I006D
Checking branch info
Calculated revision: android-12.1
Adding dependency:
Repository: android_device_asus_I006D
Branch: android-12.1
Remote: TeamWin
Path: device/asus/I006D
Syncing repository to retrieve project.
Fetching: 100% (1/1), done in 12.846s
NOT Garbage collecting: 0% (0/1), done in 0.001s
repo sync has finished successfully.
Repository synced!
Looking for dependencies
Adding dependencies to manifest
Adding dependency:
Repository: android_device_asus_sm8350-common
Branch: android-12.1
Remote: TeamWin
Path: device/asus/sm8350-common
Syncing dependencies
Fetching: 100% (1/1), done in 15.848s
NOT Garbage collecting: 0% (0/1), done in 0.001s
repo sync has finished successfully.
Looking for dependencies
device/asus/sm8350-common has no additional dependencies.
Done
============================================
PLATFORM_VERSION_CODENAME=REL
PLATFORM_VERSION=99.87.36
TARGET_PRODUCT=twrp_I006D
TARGET_BUILD_VARIANT=eng
TARGET_BUILD_TYPE=release
TARGET_ARCH=arm64
TARGET_ARCH_VARIANT=armv8-a
TARGET_CPU_VARIANT=generic
TARGET_2ND_ARCH=arm
TARGET_2ND_ARCH_VARIANT=armv8-a
TARGET_2ND_CPU_VARIANT=generic
HOST_ARCH=x86_64
HOST_2ND_ARCH=x86
HOST_OS=linux
HOST_OS_EXTRA=Linux-6.0.9-200.fc36.x86_64-x86_64-Fedora-Linux-36-(MATE-Compiz)
HOST_CROSS_OS=windows
HOST_CROSS_ARCH=x86
HOST_CROSS_2ND_ARCH=x86_64
HOST_BUILD_TYPE=release
BUILD_ID=SP2A.220405.004
OUT_DIR=out
PRODUCT_SOONG_NAMESPACES=device/asus/sm8350-common
============================================
[ TWRP Dev - xtrnaw7@t15g /data/develop/android/twrp ] $
[ TWRP Dev - xtrnaw7@t15g /data/develop/android/twrp ] $
time mka bootimage
build/make/core/soong_config.mk:197: warning:
BOARD_PLAT_PUBLIC_SEPOLICY_DIR has been deprecated. Use
SYSTEM_EXT_PUBLIC_SEPOLICY_DIRS instead.
build/make/core/soong_config.mk:198: warning:
BOARD_PLAT_PRIVATE_SEPOLICY_DIR has been deprecated. Use
SYSTEM_EXT_PRIVATE_SEPOLICY_DIRS instead.
============================================
PLATFORM_VERSION_CODENAME=REL
PLATFORM_VERSION=99.87.36
TARGET_PRODUCT=twrp_I006D
TARGET_BUILD_VARIANT=eng
TARGET_BUILD_TYPE=release
TARGET_ARCH=arm64
TARGET_ARCH_VARIANT=armv8-a
TARGET_CPU_VARIANT=generic
TARGET_2ND_ARCH=arm
TARGET_2ND_ARCH_VARIANT=armv8-a
TARGET_2ND_CPU_VARIANT=generic
HOST_ARCH=x86_64
HOST_2ND_ARCH=x86
HOST_OS=linux
HOST_OS_EXTRA=Linux-6.0.9-200.fc36.x86_64-x86_64-Fedora-Linux-36-(MATE-Compiz)
HOST_CROSS_OS=windows
HOST_CROSS_ARCH=x86
HOST_CROSS_2ND_ARCH=x86_64
HOST_BUILD_TYPE=release
BUILD_ID=SP2A.220405.004
OUT_DIR=out
PRODUCT_SOONG_NAMESPACES=device/asus/sm8350-common
============================================
[ 78% 246/312] including bootable/recovery/Android.mk ...
bootable/recovery/prebuilt/Android.mk:437: warning: vendor_hw:
bootable/recovery/prebuilt/relink.sh
out/target/product/I006D/recovery/root/vendor/bin/hw
[ 95% 299/312] including system/sepolicy/Android.mk ...
system/sepolicy/Android.mk:57: warning:
BOARD_PLAT_PUBLIC_SEPOLICY_DIR has been deprecated. Use
SYSTEM_EXT_PUBLIC_SEPOLICY_DIRS instead.
system/sepolicy/Android.mk:62: warning:
BOARD_PLAT_PRIVATE_SEPOLICY_DIR has been deprecated. Use
SYSTEM_EXT_PRIVATE_SEPOLICY_DIRS instead.
[ 30% 8637/28297] //bionic/libc:libc_bionic clang
arch-arm64/bionic/setjmp.S
....
Removing unneeded service: keymaster-4-1-citadel
Service_Cleanup script complete.
[100% 28297/28297] Target boot image from recovery:
out/target/product/I006D/boot.img
#### build completed successfully (14:50 (mm:ss)) ####
real 14m50.110s
user 182m6.217s
sys 11m58.492s
[ TWRP Dev - xtrnaw7@t15g /data/develop/android/twrp ] $
bootctl
lpdump
lpdumpd
lptools