Logfile of prepare_phone..sh all to install OmniROM 14 on the ASUS Zenfone 8


[10.01.2024 08:46 ] ### prepare_phone.sh started at 10.01.2024 08:46:07 (The PID of this process is 767094)
[10.01.2024 08:46 ] ### Processing the parameter ...
[10.01.2024 08:46 ] Not yet used parameter are: "all"
[10.01.2024 08:46 ] Tasks to execute are: "all"
[10.01.2024 08:46 ] Parameter for the function init_tasks are: ""
[10.01.2024 08:46 ] ### The logfile used is /var/tmp/prepare_phone.sh.log


[10.01.2024 08:46 ] Checking the include file "/data/develop/android/scripts_on_linux/prepare_phone.include" ...
[10.01.2024 08:46 ] Reading the include file "/data/develop/android/scripts_on_linux/prepare_phone.include" ...

[10.01.2024 08:46 ] Processing the parameter  ...

[10.01.2024 08:46 ] Preparing the list of tasks to execute ...
[10.01.2024 08:46 ] Parameter "all" found - now ignoring all other task parameter and executing all defined tasks
[10.01.2024 08:46 ] Executing the tasks defined in the include file(s) for "all"
[10.01.2024 08:46 ] "init_tasks" is defined - now executing it ...
 ----------------------------------------------------------------------
[10.01.2024 08:46 ] Searching for a config file ....
[10.01.2024 08:46 ] Config file "prepare_phone.conf" succesfully read
[10.01.2024 08:46 ] Using the directory "/tmp" for temporary files
[10.01.2024 08:46 ] The PID of this process is 767094
[10.01.2024 08:46 ] The include file used is :
-rwxr-xr-x. 1 xtrnaw7 xtrnaw7 335189 Dec 23 12:12 /data/develop/android/scripts_on_linux/prepare_phone.include
[10.01.2024 08:46 ] The include file used was last edited at: "23.12.2023 /bs"
[10.01.2024 08:46 ] The version of the used execute_tasks.sh script is "v2.2.4"
-----------------------------------------------------------------------
[10.01.2024 08:46 ] Using the TWRP image "/data/backup/ASUS_ZENFONE8/twrp_local/twrp-3.7.0_12-0-I006D-with_Android14_support_and_tools.img" for booting the phone into TWRP
[10.01.2024 08:46 ] Using the working directory "/tmp/prepare_phone.sh_WORKDIR.767094" .

[10.01.2024 08:46 ] *** Reading the include file "/data/develop/android/scripts_on_linux/boot_phone_from_twrp.sh" ...
[10.01.2024 08:46 ] The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ...
[10.01.2024 08:46 ] Will use the attached phone with the serial number "M6AIB760D0939LX"
[10.01.2024 08:46 ] Using the TWRP image found in the parameter: "/data/backup/ASUS_ZENFONE8/twrp_local/twrp-3.7.0_12-0-I006D-with_Android14_support_and_tools.img"
[10.01.2024 08:46 ] Using the options "-d -s M6AIB760D0939LX " for the adb commands
[10.01.2024 08:46 ] Using the options " -s M6AIB760D0939LX " for the fastboot commands
[10.01.2024 08:46 ] Checking the script prerequisites ...
[10.01.2024 08:46 ] Will wait up to 60 second(s) after booting the phone into the bootloader
[10.01.2024 08:46 ] Will wait up to 120 second(s) after booting the phone from the TWRP image
[10.01.2024 08:46 ] Will wait up to 30 second(s) until the adb daemon is ready to use
[10.01.2024 08:46 ] The phone is currently booted into the bootloader
[10.01.2024 08:46 ] The boot slot is _b.
 ----------------------------------------------------------------------
[10.01.2024 08:46 ] Executing the tasks now ...

[10.01.2024 08:46 ] The tasks to execute are:
Task  1: enable_disable_abort_on_error enable
Task  2: boot_phone_from_twrp_image 
Task  3: install_os noreboot:factory_reset
Task  4: install_twrp noreboot:next
Task  5: install_magisk_in_boot_partition_only noreboot:next
Task  6: enable_adb reboot
Task  7: install_magisk_in_data_adb_only noreboot:copy_apk:use_apk
Task  8: wait_for_access_via_adb 120:kill
Task  9: enable_root_access_for_the_shell reboot
Task 10: wait_for_access_via_adb 120:kill
Task 11: install_magisk_v26_in_boot_partition active:reboot
Task 12: install_the_magisk_app 
Task 13: wait_for_access_via_adb 120:kill
Task 14: install_archive_file twrp:reboot:script=/cache/correct_setlinux_for_wifconifg.sh
Task 15: enable_disable_abort_on_error disable
Task 16: install_essential_scripts 
Task 17: execute_script_on_the_phone ignorerc:/data/develop/android/scripts_on_linux/enable_wlan.sh
Task 18: install_essential_apps 
Task 19: install_essential_magisk_modules 
Task 20: enable_root_access_for_apps reboot
Task 21: execute_script_on_the_phone ignorerc

[10.01.2024 08:46 ] Processing the task "enable_disable_abort_on_error" with the parameter "enable" ...
[10.01.2024 08:46 ] Executing now "enable_disable_abort_on_error enable"

 ----------------------------------------------------------------------
[10.01.2024 08:46 ] Setting the variable "ABORT_TASK_EXECUTION_ON_ERROR" to "0" ..
 ----------------------------------------------------------------------

[10.01.2024 08:46 ] Processing the task "boot_phone_from_twrp_image"  ...
[10.01.2024 08:46 ] Executing now "boot_phone_from_twrp_image "

 ----------------------------------------------------------------------
[10.01.2024 08:46 ]
[10.01.2024 08:46 ] *** Booting the attached phone from the TWRP image "/data/backup/ASUS_ZENFONE8/twrp_local/twrp-3.7.0_12-0-I006D-with_Android14_support_and_tools.img"  ...
[10.01.2024 08:46 ]
[10.01.2024 08:46 ] The task execution will stop if the script ends with a return code not zero
[10.01.2024 08:46 ] The phone is booted into the bootloader
[10.01.2024 08:46 ] Booting the phone from the TWRP image "/data/backup/ASUS_ZENFONE8/twrp_local/twrp-3.7.0_12-0-I006D-with_Android14_support_and_tools.img" now  ...
Sending 'boot.img' (98304 KB)                      OKAY [  2.842s]
Booting                                            OKAY [ 10.360s]
Finished. Total time: 13.252s
Waiting up to 120 seconds for a working adb connection .....
Waiting up to 30 seconds for the adb daemon to get ready 
[10.01.2024 08:46 ] ... the adb daemon is ready after 0.014 second(s)

[10.01.2024 08:46 ] Waiting up to 20 seconds until /data is mounted ...

[10.01.2024 08:46 ] Testing if the data partition on the phone is encrypted ...
[10.01.2024 08:46 ] The test directory for the encryption test is "/data/media/0/Download"
[10.01.2024 08:46 ] The data partition on the phone is either not mounted or not encrypted
[10.01.2024 08:46 ] The phone is booted into TWRP version "3.7.0_12-0"
 ----------------------------------------------------------------------

[10.01.2024 08:46 ] Processing the task "install_os" with the parameter "noreboot:factory_reset" ...
[10.01.2024 08:46 ] Executing now "install_os noreboot factory_reset"

 ----------------------------------------------------------------------
[10.01.2024 08:46 ]
[10.01.2024 08:46 ] *** Installing the Android OS using the image "/data/backup/ASUS_ZENFONE8/omnirom_local/omni-14/omni-14-20240109-zenfone8-MICROG.zip" using the script "/data/develop/android/scripts_on_linux/install_os_via_twrp.sh" with the parameter " factory_reset /data/backup/ASUS_ZENFONE8/omnirom_local/omni-14/omni-14-20240109-zenfone8-MICROG.zip"  ...
[10.01.2024 08:46 ]
[10.01.2024 08:46 ] The automatic reboot after executing the script is disabled
[10.01.2024 08:46 ] The task execution will stop if the script ends with a return code not zero

[10.01.2024 08:46 ]  ----------------------------------------------------------------------

[10.01.2024 08:46 ] *** Executing now "/data/develop/android/scripts_on_linux/install_os_via_twrp.sh factory_reset /data/backup/ASUS_ZENFONE8/omnirom_local/omni-14/omni-14-20240109-zenfone8-MICROG.zip" ...
# ---------------------------------------------------------------------

install_os_via_twrp.sh version - v1.2.0.0 - install an OS image via the TWRP command twrp

Using the TWRP helper script "/data/develop/android/scripts_on_linux/boot_phone_from_twrp.sh"
The OS image to install is: "/data/backup/ASUS_ZENFONE8/omnirom_local/omni-14/omni-14-20240109-zenfone8-MICROG.zip"
Reading the helper script "boot_phone_from_twrp.sh" ...
The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ...
Will use the attached phone with the serial number "M6AIB760D0939LX"
Using the default TWRP image: "/data/backup/ASUS_ZENFONE8/twrp/current_twrp.img"
Using the options "-d -s M6AIB760D0939LX " for the adb commands
Using the options " -s M6AIB760D0939LX " for the fastboot commands
Checking the script prerequisites ...
Will wait up to 60 second(s) after booting the phone into the bootloader
Will wait up to 120 second(s) after booting the phone from the TWRP image
Will wait up to 30 second(s) until the adb daemon is ready to use
Retrieving the current status of the phone ...
The phone is currently booted from a TWRP image
The boot slot is _b.
The phone is booted from a TWRP image
The phone is booted into TWRP version "3.7.0_12-0"
Waiting up to 30 seconds for the adb daemon to get ready 
... the adb daemon is ready after 0 second(s)

/data is mounted to "/dev/block/dm-10" -- will umount it now ...
Unmounted '/data'
Done processing script file
Umounting /data sucesfully done.

Formating /data ...

real    0m1.666s
user    0m0.002s
sys    0m0.002s
Done.
You may need to reboot recovery to be able to use /data again.
TWRP will not recreate /data/media on an FBE device. Please reboot into your rom to create /data/media
Formatting Metadata using mke2fs...
Done.
Done processing script file
Formating the data partition sucesfully done.

Formating the metadata partition ...
++ /usr/bin/adb -d -s M6AIB760D0939LX shell umount /dev/block/by-name/metadata
umount: /dev/block/sda22: Invalid argument
++ /usr/bin/adb -d -s M6AIB760D0939LX shell mke2fs -F -t ext4 /dev/block/by-name/metadata
mke2fs 1.45.4 (23-Sep-2019)
Discarding device blocks:          done                           
Creating filesystem with 4096 4k blocks and 4096 inodes

Allocating group tables: 0/1   done                           
Writing inode tables: 0/1   done                           
Creating journal (1024 blocks): done
Writing superblocks and filesystem accounting information: 0/1   done
Formating the metadata partition sucesfully done.

Waiting up to 10 seconds for a working adb connection

Coyping the OS image file "/data/backup/ASUS_ZENFONE8/omnirom_local/omni-14/omni-14-20240109-zenfone8-MICROG.zip" to "/tmp/omni-14-20240109-zenfone8-MICROG.zip" on the phone ...
/data/backup/ASUS_ZENFONE8/omnirom_local/omni-14/omni-14-20240109-zenfone8-MICROG.zip: 1 file pushed, 0 skipped. 32.0 MB/s (1365507886 bytes in 40.694s)

Installing the OS image "/tmp/omni-14-20240109-zenfone8-MICROG.zip" into the slot "_a" ...
Installing zip file '/tmp/omni-14-20240109-zenfone8-MICROG.zip'
Flashing A/B zip to inactive slot: A
Step 1/2Step 2/2Updating partition details...
...done
Devices on super may not mount until rebooting recovery.
To flash additional zips, please reboot recovery to switch to the updated slot.
Done processing script file
OS image file "/tmp/omni-14-20240109-zenfone8-MICROG.zip" successfully installed.
Now changing the next active slot to _a ...
... successfully changed the active slot for the next reboot
Automatically rebooting the phone is disabled

# ---------------------------------------------------------------------
[10.01.2024 08:49 ]  ... the script ended with RC=0
 ----------------------------------------------------------------------

[10.01.2024 08:49 ] Processing the task "install_twrp" with the parameter "noreboot:next" ...
[10.01.2024 08:49 ] Executing now "install_twrp noreboot next"

 ----------------------------------------------------------------------
[10.01.2024 08:49 ] The slot to use for this task is "next"
[10.01.2024 08:49 ]
[10.01.2024 08:49 ] *** Installing the TWRP image "/data/backup/ASUS_ZENFONE8/twrp_local/twrp-3.7.0_12-0-I006D-with_Android14_support_and_tools.img" using the script /data/develop/android/scripts_on_linux/install_twrp.sh with the parameter " next  /data/backup/ASUS_ZENFONE8/twrp_local/twrp-3.7.0_12-0-I006D-with_Android14_support_and_tools.img"  ...
[10.01.2024 08:49 ]
[10.01.2024 08:49 ] The automatic reboot after executing the script is disabled
[10.01.2024 08:49 ] The task execution will stop if the script ends with a return code not zero

[10.01.2024 08:49 ]  ----------------------------------------------------------------------

[10.01.2024 08:49 ] *** Executing now "/data/develop/android/scripts_on_linux/install_twrp.sh next /data/backup/ASUS_ZENFONE8/twrp_local/twrp-3.7.0_12-0-I006D-with_Android14_support_and_tools.img" ...
# ---------------------------------------------------------------------

install_twrp.sh version - v1.3.1.0 - install TWRP to the boot partition of a phone running Android using TWRP

Using the TWRP image "/data/backup/ASUS_ZENFONE8/twrp_local/twrp-3.7.0_12-0-I006D-with_Android14_support_and_tools.img"
Checking the script prerequisites ...
Will wait 10 second(s) before starting the script on the phone
The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ...
Will patch the boot partition on the attached phone with the serial number "M6AIB760D0939LX"
Using the options "-d -s M6AIB760D0939LX " for the adb commands
Using the options " -s M6AIB760D0939LX " for the fastboot commands
Checking for a connected phone booted into fastboot mode ...
No attached phone in fastboot mode found
Checking for an attached phone with working access via adb (USB) ...
Linux localhost 5.4.147-BeyondStock™-Sake-A13.001-CPTB-g17db0633edf3 #32 SMP PREEMPT Sat Oct 14 11:34:03 EDT 2023 aarch64
... found a phone connected via USB with working adb access
The phone is already booted from a TWRP image: "twrp_I006D" version "3.7.0_12-0"
Retrieving the current boot slot from the phone ...
The current boot slot is "_b"
The boot slot to patch is "_a"
The boot partition to patch is "boot_a"
Checking if the directory "/data/local/tmp" exists on the phone ....
ls: /data/local/tmp: No such file or directory
WARNING: Directory "/data/local/tmp" not found on the phone, will try /tmp now ...
/tmp
Copying the script "/data/develop/android/scripts_on_linux/install_twrp_from_within_twrp.sh" to the phone ...
/data/develop/android/scripts_on_linux/install_twrp_from_within_twrp.sh: 1 file pushed, 0 skipped. 386.8 MB/s (15014 bytes in 0.000s)
Creating the boot image file "/tmp/boot_a.767928.img" from the partition "/dev/block/by-name/boot_a" ...
196608+0 records in
196608+0 records out
100663296 bytes (96 M) copied, 0.191529 s, 501 M/s

Checking the result ...
-rw-rw-rw- 1 root root 100663296 2024-01-10 07:49 /tmp/boot_a.767928.img
The check sums are:
The check sum of the boot partition "/dev/block/by-name/boot_a" on the phohe is  "3120002899"
The check sum of the boot image file on the phone is "/tmp/boot_a.767928.img" is "3120002899"  
Installing TWRP using the boot image file "/tmp/boot_a.767928.img"  ...

[2024.01.10 08:49:15] Waiting now 10 seconds ...
Now executing "/tmp/install_twrp_from_within_twrp.sh" on the phone ...
 ----------------------------------------------------------------------
+ adb -d -s M6AIB760D0939LX shell /tmp/install_twrp_from_within_twrp.sh /tmp/boot_a.767928.img /tmp/boot_a_witn_twrp.767928.img

Installing TWRP into a boot image or boot partition via script

Checking the running OS ...
OK, running a shell in TWRP: "twrp_I006D" version "3.7.0_12-0"
Checking the prerequisites for installing TWRP ...
Using the file "/tmp/boot_a.767928.img" as source for the installation of TWRP
Creating the boot image with TWRP in the file "/tmp/boot_a_witn_twrp.767928.img"
Checking if the required executables exist ...
OK, the file "/system/bin/magiskboot" exists and is executable
OK, the file "/system/bin/cpio" exists and is executable
OK, the file "/system/bin/getprop" exists and is executable
Checking if the required data files exist ...
OK, the file "/ramdisk-files.sha256sum" exists
OK, the file "/ramdisk-files.txt" exists
OK, the file "/tmp/boot_a.767928.img" exists
Checking the check sums of the files for the new ramdisk ...
OK, the check sums of the files for the new ramdisk are okay
Directory "/tmp/install_twrp.776" successfully created
Directory "/tmp/install_twrp.776/img.776" successfully created
Directory "/tmp/install_twrp.776/img_files.776" successfully created
The temporary directory to unpack the boot image is "/tmp/install_twrp.776/img_files.776"
Unpacking the boot image from "/tmp/boot_a.767928.img" ...
Parsing boot image: [/tmp/boot_a.767928.img]
HEADER_VER      [3]
KERNEL_SZ       [39928320]
RAMDISK_SZ      [17441527]
OS_VERSION      [14.0.0]
OS_PATCH_LEVEL  [2024-01]
PAGESIZE        [4096]
CMDLINE         []
KERNEL_FMT      [raw]
RAMDISK_FMT     [gzip]
VBMETA
OK, "/tmp/boot_a.767928.img" successfully unpacked to "/tmp/install_twrp.776/img_files.776" :
Creating a backup of the original ramdisk ...
total 56036
-rw-rw-rw- 1 root root       50 2024-01-10 07:49 header
-rw-r--r-- 1 root root 39928320 2024-01-10 07:49 kernel
-rw-r--r-- 1 root root 17441527 2024-01-10 07:49 ramdisk.cpio.org
Creating the new ramdisk with TWRP ...
New ramdisk with TWRP "/tmp/install_twrp.776/img_files.776/ramdisk.cpio" successfully created.

-rw-rw-rw- 1 root root 116057568 2024-01-10 07:49 /tmp/install_twrp.776/img_files.776/ramdisk.cpio
-rw-r--r-- 1 root root  17441527 2024-01-10 07:49 /tmp/install_twrp.776/img_files.776/ramdisk.cpio.org

Repacking the boot image into the file "/tmp/boot_a_witn_twrp.767928.img" ...
+ cd /tmp/install_twrp.776/img_files.776
+ /system/bin/magiskboot repack /tmp/boot_a.767928.img /tmp/boot_a_witn_twrp.767928.img
Parsing boot image: [/tmp/boot_a.767928.img]
HEADER_VER      [3]
KERNEL_SZ       [39928320]
RAMDISK_SZ      [17441527]
OS_VERSION      [14.0.0]
OS_PATCH_LEVEL  [2024-01]
PAGESIZE        [4096]
CMDLINE         []
KERNEL_FMT      [raw]
RAMDISK_FMT     [gzip]
VBMETA
Repack to boot image: [/tmp/boot_a_witn_twrp.767928.img]
HEADER_VER      [3]
KERNEL_SZ       [39928320]
RAMDISK_SZ      [48221240]
OS_VERSION      [14.0.0]
OS_PATCH_LEVEL  [2024-01]
PAGESIZE        [4096]
CMDLINE         []
OK, the new boot image "/tmp/boot_a_witn_twrp.767928.img" successfully created
+ TEMPRC=0
+ set +x
-rw-r--r-- 1 root root 100663296 2024-01-10 07:49 /tmp/boot_a_witn_twrp.767928.img
Note: Flashing the new image to the boot partition was not requested
+ TEMPRC=0
+ set +x
 ----------------------------------------------------------------------
Checking the result ...
The patched boot image is "/tmp/boot_a_witn_twrp.767928.img"
-rw-r--r-- 1 root root 100663296 2024-01-10 07:49 /tmp/boot_a_witn_twrp.767928.img
[2024.01.10 08:49:40] Waiting now 5 seconds ...
Patching the partition "/dev/block/by-name/boot_a" from the patched boot image file "/tmp/boot_a_witn_twrp.767928.img" via dd ...
196608+0 records in
196608+0 records out
100663296 bytes (96 M) copied, 4.880873 s, 20 M/s
Checking the result ....
The check sums for the images and devices on the phone are:

Checksum   Size      File/Device name
-------------------------------------
3120002899 100663296 /tmp/boot_a.767928.img
2702684391 100663296 /tmp/boot_a_witn_twrp.767928.img
2702684391 100663296 /dev/block/by-name/boot_a

OK, patching the boot partition "/dev/block/by-name/boot_a" was successfull
Automatically rebooting the phone is disabled

# ---------------------------------------------------------------------
[10.01.2024 08:49 ]  ... the script ended with RC=0
 ----------------------------------------------------------------------

[10.01.2024 08:49 ] Processing the task "install_magisk_in_boot_partition_only" with the parameter "noreboot:next" ...
[10.01.2024 08:49 ] Executing now "install_magisk_in_boot_partition_only noreboot next"

 ----------------------------------------------------------------------
[10.01.2024 08:49 ] The slot to use for this task is "next"
[10.01.2024 08:49 ]
[10.01.2024 08:49 ] *** Installing Magisk using the apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" into the boot partition using the script "/data/develop/android/scripts_on_linux/install_magisk_via_twrp.sh" with the parameter "next copy_apk  delete_adb_dir  magisk_apk_file=/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk"  ...
[10.01.2024 08:49 ]
[10.01.2024 08:49 ] The automatic reboot after executing the script is disabled
[10.01.2024 08:49 ] The task execution will stop if the script ends with a return code not zero

[10.01.2024 08:49 ]  ----------------------------------------------------------------------

[10.01.2024 08:49 ] *** Executing now "/data/develop/android/scripts_on_linux/install_magisk_via_twrp.sh next copy_apk delete_adb_dir magisk_apk_file=/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" ...
# ---------------------------------------------------------------------

install_magisk_via_twrp.sh version - v3.1.3.1 - add Magisk to the boot partition of a phone running Android using TWRP

Parameter "copy_apk" found: Will copy the Magisk apk file to the phone if neccessary
Parameter "delete_adb_dir" found: All files and directories created by this script in the directory  "/data/adb" will be deleted at script end.
Parameter "magisk_apk_file=file" found : Will use the Magisk apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk"
Using the TWRP image hardcoded in the script: "/data/backup/ASUS_ZENFONE8/twrp/current_twrp.img"
Checking the script prerequisites ...
Will wait 10 second(s) before starting the script on the phone
The Magisk version used is v25.x or older
Using the temporary directory "/data/MagiskInst" on the phone
The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ...
Will patch the boot partition on the attached phone with the serial number "M6AIB760D0939LX"
Using the options "-d -s M6AIB760D0939LX " for the adb commands
Using the options " -s M6AIB760D0939LX " for the fastboot commands
Checking for a connected phone booted into fastboot mode ...
No attached phone in fastboot mode found
Checking for an attached phone with working access via adb (USB) ...
Linux localhost 5.4.147-BeyondStock™-Sake-A13.001-CPTB-g17db0633edf3 #32 SMP PREEMPT Sat Oct 14 11:34:03 EDT 2023 aarch64
... found a phone connected via USB with working adb access
The phone is already booted from a TWRP image: "twrp_I006D" version "3.7.0_12-0"
Retrieving the current boot slot from the phone ...
The current boot slot is "_b"
The boot slot to patch is "_a"
The boot partition to patch is "boot_a"
Copying the Magisk apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" to the phone into the directory "/data" ...
/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk: 1 file pushed, 0 skipped. 48.7 MB/s (11278270 bytes in 0.221s)
Creating the temporary directory "/data/MagiskInst" with the Magisk files necessarry to install Magisk into the boot partition ...

Creating the script file "/tmp/init_magisk_dirs.sh" to create the directory "/data/MagiskInst" on the phone ...
Creating the directory "/data/MagiskInst" on the phone ...
Copying the temporary script file "/tmp/init_magisk_dirs.sh" to the file "/data/MagiskInst/create_temporary_magisk_dir.sh" on the phone ...
/tmp/init_magisk_dirs.sh: 1 file pushed, 0 skipped. 292.6 MB/s (7716 bytes in 0.000s)
Executing the script "/data/MagiskInst/create_temporary_magisk_dir.sh" on the phone ...
 ------------------------------------------------------------------------------
+ adb -d -s M6AIB760D0939LX shell /data/MagiskInst/create_temporary_magisk_dir.sh /data/MagiskInst ''
Searching for an installed Magisk app ....
ls: /data/app/*/com.topjohnwu.magisk*/base.apk: No such file or directory
Searching for a Magisk apk file in the directory /sdcard/Download ...
ls: /sdcard/Download/Magisk*apk: No such file or directory
Searching for a Magisk apk file in the directdory /data ...
Found the apk file "/data/Magisk-v25.2.apk"
Using the directory "/data/MagiskInst/bin" for the Magisk Binaries
Creating the files in the directory "/data/MagiskInst/bin" using the files for the CPU "arm64-v8a" from the apk file "/data/Magisk-v25.2.apk" ...
Unpacking the apk file "/data/Magisk-v25.2.apk" into the directory "/data/MagiskInst/magisk_apk_contents.834" ...
Delete all existing files in the directory "/data/MagiskInst/bin" ...
total 0
total 0

Copying the files to "/data/MagiskInst/bin" ...
+ mv ./assets/util_functions.sh /data/MagiskInst/bin
+ mv ./assets/chromeos /data/MagiskInst/bin/
+ mv ./assets/boot_patch.sh /data/MagiskInst/bin
+ mv ./assets/addon.d.sh /data/MagiskInst/bin
+ '[' -r ./assets/stub.apk ']'
+ cd ./lib/arm64-v8a
+ mv libbusybox.so /data/MagiskInst/bin/busybox
+ mv libmagisk64.so /data/MagiskInst/bin/magisk64
+ mv libmagiskboot.so /data/MagiskInst/bin/magiskboot
+ mv libmagiskinit.so /data/MagiskInst/bin/magiskinit
+ mv libmagiskpolicy.so /data/MagiskInst/bin/magiskpolicy
+ cd ../..
+ file=libmagisk32.so
+ '[' arm64-v8ax '=' arm64-v8ax -a -r ./lib/armeabi-v7a/libmagisk32.so ']'
+ mv ./lib/armeabi-v7a/libmagisk32.so /data/MagiskInst/bin/magisk32
+ set +x
+ TEMPRC=0
+ set +x
 ------------------------------------------------------------------------------
... "/data/MagiskInst/create_temporary_magisk_dir.sh" successfully executed

Checking if the Magisk patch script "boot_patch.sh" exists on the phone ....
-rwxr-xr-x 1 root root 5987 2024-01-10 07:49 /data/MagiskInst/bin/boot_patch.sh
Checking if the download directory "/sdcard/Download" exists on the phone ....
ls: /sdcard/Download: No such file or directory
WARNING: Directory "/sdcard/Download" not found on the phone .
Checking if the download directory "/tmp" exists on the phone ....
/tmp
Creating the boot image file "/tmp/boot_a.768076.img" from the partition "/dev/block/by-name/boot_a" ...
196608+0 records in
196608+0 records out
100663296 bytes (96 M) copied, 0.190113 s, 505 M/s

Checking the result ...
-rw-rw-rw- 1 root root 100663296 2024-01-10 07:49 /tmp/boot_a.768076.img
The check sums are:
The check sum of the boot partition "/dev/block/by-name/boot_a" on the phone is "2702684391"
The check sum of th boot image file on the phone is "/tmp/boot_a.768076.img" is "2702684391"  
Installing Magisk into the boot partition using the old method ...
Patching the boot image file "/tmp/boot_a.768076.img"  ...
Waiting now 10 seconds ...
- Unpacking boot image
Parsing boot image: [/tmp/boot_a.768076.img]
HEADER_VER      [3]
KERNEL_SZ       [39928320]
RAMDISK_SZ      [48221240]
OS_VERSION      [14.0.0]
OS_PATCH_LEVEL  [2024-01]
PAGESIZE        [4096]
CMDLINE         []
KERNEL_FMT      [raw]
RAMDISK_FMT     [gzip]
VBMETA
- Checking ramdisk status
Loading cpio: [ramdisk.cpio]
- Stock boot image detected
- Patching ramdisk
Loading cpio: [ramdisk.cpio]
Add entry [init] (0750)
Create directory [overlay.d] (0750)
Create directory [overlay.d/sbin] (0750)
Add entry [overlay.d/sbin/magisk32.xz] (0644)
Add entry [overlay.d/sbin/magisk64.xz] (0644)
Patch with flag KEEPVERITY=[false] KEEPFORCEENCRYPT=[false]
Found fstab file [system/etc/fstab.postinstall]
Remove pattern [,avb_keys=/product/etc/security/avb/system_other.avbpubkey]
Loading cpio: [ramdisk.cpio.orig]
Backup mismatch entry: [init] -> [.backup/init]
Record new entry: [overlay.d] -> [.backup/.rmlist]
Record new entry: [overlay.d/sbin] -> [.backup/.rmlist]
Record new entry: [overlay.d/sbin/magisk32.xz] -> [.backup/.rmlist]
Record new entry: [overlay.d/sbin/magisk64.xz] -> [.backup/.rmlist]
Backup mismatch entry: [system/etc/fstab.postinstall] -> [.backup/system/etc/fstab.postinstall]
Create directory [.backup] (0000)
Add entry [.backup/.magisk] (0000)
Dump cpio: [ramdisk.cpio]
- Repacking boot image
Parsing boot image: [/tmp/boot_a.768076.img]
HEADER_VER      [3]
KERNEL_SZ       [39928320]
RAMDISK_SZ      [48221240]
OS_VERSION      [14.0.0]
OS_PATCH_LEVEL  [2024-01]
PAGESIZE        [4096]
CMDLINE         []
KERNEL_FMT      [raw]
RAMDISK_FMT     [gzip]
VBMETA
Repack to boot image: [new-boot.img]
HEADER_VER      [3]
KERNEL_SZ       [39928320]
RAMDISK_SZ      [48518065]
OS_VERSION      [14.0.0]
OS_PATCH_LEVEL  [2024-01]
PAGESIZE        [4096]
CMDLINE         []
Checking the result ...
-rw-r--r-- 1 root root 100663296 2024-01-10 07:50 /data/MagiskInst/bin/new-boot.img
The patched boot image is "/tmp/patched_boot_a.768076.img"
Waiting now 10 seconds ...
Patching the partition "/dev/block/by-name/boot_a" from the patched boot image file "/tmp/patched_boot_a.768076.img" via dd ...
196608+0 records in
196608+0 records out
100663296 bytes (96 M) copied, 4.560841 s, 21 M/s
Checking the result ....

The check sums for the images and devices on the phone are:

2702684391 100663296 /tmp/boot_a.768076.img
1813464446 100663296 /tmp/patched_boot_a.768076.img
1813464446 100663296 /dev/block/by-name/boot_a

OK, patching the boot partition "/dev/block/by-name/boot_a" was successfull
Deleting all used files and directories in the directory /data  ...
Automatically rebooting the phone is disabled

# ---------------------------------------------------------------------
[10.01.2024 08:50 ]  ... the script ended with RC=0
 ----------------------------------------------------------------------

[10.01.2024 08:50 ] Processing the task "enable_adb" with the parameter "reboot" ...
[10.01.2024 08:50 ] Executing now "enable_adb reboot"

 ----------------------------------------------------------------------
[10.01.2024 08:50 ]
[10.01.2024 08:50 ] *** Enabling access via adb using the script "/data/develop/android/scripts_on_linux/enable_access_via_adb.sh" with the parameter ""  ...
[10.01.2024 08:50 ]
[10.01.2024 08:50 ] The automatic reboot after executing the script is enabled
[10.01.2024 08:50 ] The task execution will stop if the script ends with a return code not zero
[10.01.2024 08:50 ] The phone is currently booted from a TWRP image
[10.01.2024 08:50 ] The boot slot is _b.

[10.01.2024 08:50 ]  ----------------------------------------------------------------------

[10.01.2024 08:50 ] *** Executing now "/data/develop/android/scripts_on_linux/enable_access_via_adb.sh " ...
# ---------------------------------------------------------------------

enable_access_via_adb.sh version - v1.1.0.0 -  shell script to enable adb access via an init .rc file configured via Magisk

Using the TWRP helper script "/data/develop/android/scripts_on_linux/boot_phone_from_twrp.sh"
Using the Magisk helper script "/data/develop/android/scripts_on_linux/enable_adb_using_magisk.sh"
Reading the helper script "boot_phone_from_twrp.sh" ...
The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ...
Will use the attached phone with the serial number "M6AIB760D0939LX"
Using the default TWRP image: "/data/backup/ASUS_ZENFONE8/twrp/current_twrp.img"
Using the options "-d -s M6AIB760D0939LX " for the adb commands
Using the options " -s M6AIB760D0939LX " for the fastboot commands
Checking the script prerequisites ...
Will wait up to 60 second(s) after booting the phone into the bootloader
Will wait up to 120 second(s) after booting the phone from the TWRP image
Will wait up to 30 second(s) until the adb daemon is ready to use
Retrieving the current status of the phone ...
The phone is currently booted from a TWRP image
The boot slot is _b.
Copying the public ssl key for access via adb "/home/xtrnaw7/.android/adbkey.pub" to "/tmp/adbkey.pub" on the phone ...
Copying the file "/home/xtrnaw7/.android/adbkey.pub" to "/tmp/adbkey.pub" the phone ...
/home/xtrnaw7/.android/adbkey.pub: 1 file pushed, 0 skipped. 31.3 MB/s (721 bytes in 0.000s)
Copying the Magisk helper script "/data/develop/android/scripts_on_linux/enable_adb_using_magisk.sh" to "/tmp/enable_adb_using_magisk.sh" on the phone ...
/data/develop/android/scripts_on_linux/enable_adb_using_magisk.sh: 1 file pushed, 0 skipped. 395.0 MB/s (13980 bytes in 0.000s)
Executing the temporary script "/tmp/enable_adb_using_magisk.sh" on the phone ...
The directory /data/recovery does not exist -- will now create it ...
chcon '/data/recovery' to u:object_r:system_data_file:s0
The directory /data/cache does not exist -- will now create it ...
chcon '/data/cache' to u:object_r:cache_file:s0
The working directory "/data/recovery/work" does not exist -- will now create it ...
chcon '/data/recovery/work' to u:object_r:system_data_file:s0
Reading the public ssl key for the access via adb from the file "/tmp/adbkey.pub" ...
Creating the script to enable access via adb "/data/recovery/enable_adb_via_service.sh" ...
chcon '/data/recovery/enable_adb_via_service.sh' to u:object_r:system_data_file:s0
Doing a syntax check for the script "/data/recovery/enable_adb_via_service.sh" ...
Creating the RC file with the additional trigger to enable access via adb "/data/recovery/work/enable_adb_via_service.rc" ...
Copying the partition "/dev/block/by-name/boot_a" into the file "boot_a.img" ...
196608+0 records in
196608+0 records out
100663296 bytes (96 M) copied, 0.308833 s, 311 M/s
Successfully created the script "/data/recovery/work/restore_boot_partition.sh" to restore the boot partition
Extracting the ramdisk from the file "boot_a.img" ...
Parsing boot image: [boot_a.img]
HEADER_VER      [3]
KERNEL_SZ       [39928320]
RAMDISK_SZ      [48518065]
OS_VERSION      [14.0.0]
OS_PATCH_LEVEL  [2024-01]
PAGESIZE        [4096]
CMDLINE         []
KERNEL_FMT      [raw]
RAMDISK_FMT     [gzip]
VBMETA
Adding the new RC file "/data/recovery/work/enable_adb_via_service.rc" to the ramdisk ...
Loading cpio: [ramdisk.cpio]
Create directory [overlay.d] (0700)
Add entry [overlay.d/init.custom.rc] (0700)
Dump cpio: [ramdisk.cpio]
Recreating the boot image file "boot_a.img" ...
Parsing boot image: [boot_a.img]
HEADER_VER      [3]
KERNEL_SZ       [39928320]
RAMDISK_SZ      [48518065]
OS_VERSION      [14.0.0]
OS_PATCH_LEVEL  [2024-01]
PAGESIZE        [4096]
CMDLINE         []
KERNEL_FMT      [raw]
RAMDISK_FMT     [gzip]
VBMETA
Repack to boot image: [boot_a_new.img]
HEADER_VER      [3]
KERNEL_SZ       [39928320]
RAMDISK_SZ      [48518658]
OS_VERSION      [14.0.0]
OS_PATCH_LEVEL  [2024-01]
PAGESIZE        [4096]
CMDLINE         []
Patching the new image file "boot_a_new.img" to the boot partition /dev/block/by-name/boot_a ...
196608+0 records in
196608+0 records out
100663296 bytes (96 M) copied, 4.515827 s, 21 M/s
adb access will now be enabled by Magisk while doing the next reboot
Automatically rebooting the phone is disabled

# ---------------------------------------------------------------------
[10.01.2024 08:51 ]  ... the script ended with RC=0


[10.01.2024 08:51 ] *** Rebooting the phone now ....
[10.01.2024 08:51 ] Parameter for "reboot_phone" are: wait
[10.01.2024 08:51 ] The current phone status is "1"
[10.01.2024 08:51 ] Will boot the phone using "adb"
[10.01.2024 08:51 ] Rebooting the phone using the command " /usr/bin/adb -d -s M6AIB760D0939LX  reboot " now ...
Waiting up to 120 second(s) for the phone ...........
[10.01.2024 08:52 ] Booting the phone into the Android OS succeeded after 55 seconds; the current status of the phone is 3
[10.01.2024 08:52 ] Waiting up to 20 seconds until /data is mounted ...

[10.01.2024 08:52 ] Testing if the data partition on the phone is encrypted ...
[10.01.2024 08:52 ] The test directory for the encryption test is "/sdcard/Download"
[10.01.2024 08:52 ] The data partition on the phone is either not mounted or not encrypted
[10.01.2024 08:52 ] Retrieving the UID from the shell ...
[10.01.2024 08:52 ] The UID for the shell is "2000"
 ----------------------------------------------------------------------

[10.01.2024 08:52 ] Processing the task "install_magisk_in_data_adb_only" with the parameter "noreboot:copy_apk:use_apk" ...
[10.01.2024 08:52 ] Executing now "install_magisk_in_data_adb_only noreboot copy_apk use_apk"

 ----------------------------------------------------------------------
[10.01.2024 08:52 ]
[10.01.2024 08:52 ] *** Installing the Magisk directories and files in /data/adb from the apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" using the script "/data/develop/android/scripts_on_linux/install_magisk_via_twrp.sh" with the parameter " adb_only  copy_apk use_apk magisk_apk_file=/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk"  ...
[10.01.2024 08:52 ]
[10.01.2024 08:52 ] The automatic reboot after executing the script is disabled
[10.01.2024 08:52 ] The task execution will stop if the script ends with a return code not zero

[10.01.2024 08:52 ]  ----------------------------------------------------------------------

[10.01.2024 08:52 ] *** Executing now "/data/develop/android/scripts_on_linux/install_magisk_via_twrp.sh adb_only copy_apk use_apk magisk_apk_file=/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" ...
# ---------------------------------------------------------------------

install_magisk_via_twrp.sh version - v3.1.3.1 - add Magisk to the boot partition of a phone running Android using TWRP

Parameter "adb_only" found: Will only install the directories and files in the directory "/data/adb"
Parameter "copy_apk" found: Will copy the Magisk apk file to the phone if neccessary
Parameter "use_apk" found: Will use the files from the apk file even if the files in /data/adb/magisk exist
Parameter "magisk_apk_file=file" found : Will use the Magisk apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk"
Using the TWRP image hardcoded in the script: "/data/backup/ASUS_ZENFONE8/twrp/current_twrp.img"
Checking the script prerequisites ...
Will wait 10 second(s) before starting the script on the phone
The Magisk version used is v25.x or older
Using the temporary directory "/data/MagiskInst" on the phone
The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ...
Will patch the boot partition on the attached phone with the serial number "M6AIB760D0939LX"
Using the options "-d -s M6AIB760D0939LX " for the adb commands
Using the options " -s M6AIB760D0939LX " for the fastboot commands
Checking for a connected phone booted into fastboot mode ...
No attached phone in fastboot mode found
Checking for an attached phone with working access via adb (USB) ...
Linux localhost 5.4.147-Omni-qgki-perf-g63bfa47476a7-dirty #1 SMP PREEMPT Thu Dec 14 08:17:06 CET 2023 aarch64 Toybox
... found a phone connected via USB with working adb access
The phone is booted in normal mode
The installed OS is based on Android 14 (Tue Jan  9 09:23:29 CET 2024); the description for the distribution is "omni_zenfone8-user 14 UQ1A.240105.004.A1 eng.xtrnaw.20240109.092500 release-keys"
WARNING: Can not detect the version of the installed Magisk
Booting the phone into the fastboot mode now ...
Waiting up to 60 seconds for the boot into the fastboot mode ...
Booting the phone from the TWRP image "/data/backup/ASUS_ZENFONE8/twrp/current_twrp.img" now  ...
Sending 'boot.img' (98304 KB)                      OKAY [  2.837s]
Booting                                            OKAY [ 10.359s]
Finished. Total time: 13.245s
Waiting up to 60 seconds for the boot of the phone .....
Retrieving the current boot slot from the phone ...
The current boot slot is "_a"
The boot slot to patch is "_a"
The boot partition to patch is "boot_a"
Copying the Magisk apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" to the phone into the directory "/data" ...
/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk: 1 file pushed, 0 skipped. 47.8 MB/s (11278270 bytes in 0.225s)
Creating the temporary directory "/data/MagiskInst" with the Magisk files necessarry to install Magisk into the boot partition ...

Creating the script file "/tmp/init_magisk_dirs.sh" to create the directory "/data/MagiskInst" on the phone ...
Creating the directory "/data/MagiskInst" on the phone ...
Copying the temporary script file "/tmp/init_magisk_dirs.sh" to the file "/data/MagiskInst/create_temporary_magisk_dir.sh" on the phone ...
/tmp/init_magisk_dirs.sh: 1 file pushed, 0 skipped. 120.7 MB/s (7716 bytes in 0.000s)
Executing the script "/data/MagiskInst/create_temporary_magisk_dir.sh" on the phone ...
 ------------------------------------------------------------------------------
+ adb -d -s M6AIB760D0939LX shell /data/MagiskInst/create_temporary_magisk_dir.sh /data/MagiskInst /data/Magisk-v25.2.apk
Magisk is not yet installed
Using the directory "/data/MagiskInst/bin" for the Magisk Binaries
Creating the files in the directory "/data/MagiskInst/bin" using the files for the CPU "arm64-v8a" from the apk file "/data/Magisk-v25.2.apk" ...
Unpacking the apk file "/data/Magisk-v25.2.apk" into the directory "/data/MagiskInst/magisk_apk_contents.630" ...
Delete all existing files in the directory "/data/MagiskInst/bin" ...
total 0
total 0

Copying the files to "/data/MagiskInst/bin" ...
+ mv ./assets/util_functions.sh /data/MagiskInst/bin
+ mv ./assets/chromeos /data/MagiskInst/bin/
+ mv ./assets/boot_patch.sh /data/MagiskInst/bin
+ mv ./assets/addon.d.sh /data/MagiskInst/bin
+ '[' -r ./assets/stub.apk ']'
+ cd ./lib/arm64-v8a
+ mv libbusybox.so /data/MagiskInst/bin/busybox
+ mv libmagisk64.so /data/MagiskInst/bin/magisk64
+ mv libmagiskboot.so /data/MagiskInst/bin/magiskboot
+ mv libmagiskinit.so /data/MagiskInst/bin/magiskinit
+ mv libmagiskpolicy.so /data/MagiskInst/bin/magiskpolicy
+ cd ../..
+ file=libmagisk32.so
+ '[' arm64-v8ax '=' arm64-v8ax -a -r ./lib/armeabi-v7a/libmagisk32.so ']'
+ mv ./lib/armeabi-v7a/libmagisk32.so /data/MagiskInst/bin/magisk32
+ set +x
+ TEMPRC=0
+ set +x
 ------------------------------------------------------------------------------
... "/data/MagiskInst/create_temporary_magisk_dir.sh" successfully executed

chcon '/data/adb/magisk' to u:object_r:system_file:s0
chcon '/data/adb/magisk/util_functions.sh' to u:object_r:system_file:s0
chcon '/data/adb/magisk/chromeos' to u:object_r:system_file:s0
chcon '/data/adb/magisk/chromeos/kernel_data_key.vbprivk' to u:object_r:system_file:s0
chcon '/data/adb/magisk/chromeos/kernel.keyblock' to u:object_r:system_file:s0
chcon '/data/adb/magisk/chromeos/futility' to u:object_r:system_file:s0
chcon '/data/adb/magisk/boot_patch.sh' to u:object_r:system_file:s0
chcon '/data/adb/magisk/addon.d.sh' to u:object_r:system_file:s0
chcon '/data/adb/magisk/busybox' to u:object_r:system_file:s0
chcon '/data/adb/magisk/magisk64' to u:object_r:system_file:s0
chcon '/data/adb/magisk/magiskboot' to u:object_r:system_file:s0
chcon '/data/adb/magisk/magiskinit' to u:object_r:system_file:s0
chcon '/data/adb/magisk/magiskpolicy' to u:object_r:system_file:s0
chcon '/data/adb/magisk/magisk32' to u:object_r:system_file:s0
chcon '/data/adb/modules' to u:object_r:system_file:s0
chcon '/data/adb/post-fs-data.d' to u:object_r:adb_data_file:s0
chcon '/data/adb/service.d' to u:object_r:adb_data_file:s0
Automatically rebooting the phone is disabled

# ---------------------------------------------------------------------
[10.01.2024 08:53 ]  ... the script ended with RC=0
 ----------------------------------------------------------------------

[10.01.2024 08:53 ] Processing the task "wait_for_access_via_adb" with the parameter "120:kill" ...
[10.01.2024 08:53 ] Executing now "wait_for_access_via_adb 120 kill"

 ----------------------------------------------------------------------
[10.01.2024 08:53 ] The phone is currently booted from a TWRP image
[10.01.2024 08:53 ] The boot slot is _a.
[10.01.2024 08:53 ] adb access to the phone is working
 ----------------------------------------------------------------------

[10.01.2024 08:53 ] Processing the task "enable_root_access_for_the_shell" with the parameter "reboot" ...
[10.01.2024 08:53 ] Executing now "enable_root_access_for_the_shell reboot"

 ----------------------------------------------------------------------
[10.01.2024 08:53 ]
[10.01.2024 08:53 ] *** Enabling root access for shell in Magisk using the script "/data/develop/android/scripts_on_linux/init_magisk_db.sh" with the parameter " apps=2000"  ...
[10.01.2024 08:53 ]
[10.01.2024 08:53 ] The automatic reboot after executing the script is enabled
[10.01.2024 08:53 ] The task execution will stop if the script ends with a return code not zero

[10.01.2024 08:53 ]  ----------------------------------------------------------------------

[10.01.2024 08:53 ] *** Executing now "/data/develop/android/scripts_on_linux/init_magisk_db.sh apps=2000" ...
# ---------------------------------------------------------------------

init_magisk_db.sh version - v1.0.2.0 - shell script to enable root access via Magisk for specified apps

Using the TWRP helper script "/data/develop/android/scripts_on_linux/boot_phone_from_twrp.sh"
Using the Magisk helper script "/data/develop/android/scripts_on_linux/enable_root_access_via_magisk.sh"
The apps for which root access should be enabled are:
   2000
Apps that should be enabled are:
UIDs that should be enabled are:  2000
Reading the helper script "boot_phone_from_twrp.sh" ...
The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ...
Will use the attached phone with the serial number "M6AIB760D0939LX"
Using the default TWRP image: "/data/backup/ASUS_ZENFONE8/twrp/current_twrp.img"
Using the options "-d -s M6AIB760D0939LX " for the adb commands
Using the options " -s M6AIB760D0939LX " for the fastboot commands
Checking the script prerequisites ...
Will wait up to 60 second(s) after booting the phone into the bootloader
Will wait up to 120 second(s) after booting the phone from the TWRP image
Will wait up to 30 second(s) until the adb daemon is ready to use
Retrieving the current status of the phone ...
The phone is currently booted from a TWRP image
The boot slot is _a.
Will enable the root access via Magisk for these UIDs:  2000
The phone is booted from a TWRP image
The phone is booted into TWRP version "3.7.0_12-0"
Copying the Magisk helper script "/data/develop/android/scripts_on_linux/enable_root_access_via_magisk.sh" to /cache/enable_root_access_via_magisk.sh on the phone ...
/data/develop/android/scripts_on_linux/enable_root_access_via_magisk.sh: 1 file pushed, 0 skipped. 617.4 MB/s (25307 bytes in 0.000s)
Executing the Magisk helper script "/cache/enable_root_access_via_magisk.sh" on the phone now ...

Enabling root access for apps by adding entries to the Magisk database

OK, running in TWRP
TWRP is booted from an image file
Using the Magisk binary "/data/adb/magisk/magisk64"
Using the Magisk database "/data/adb/magisk.db"
Checking the prerequisites ...
Checking if the required executables exist ...
OK, the file "/data/adb/magisk/magisk64" exists and is executable
The Magisk database does not yet exist
Checking if the Magisk daemon is running ...
No daemon is currently running!
The Magisk daemon is not running -- will start it now ...
25.2:MAGISK:R
Successfully started the Magisk daemon
Creating the database "/data/adb/magisk.db" using "/data/adb/magisk/magisk64" ...
user_version=12
Successfully created the Magisk database "/data/adb/magisk.db" :
-rw------- 1 root root 40960 2024-01-10 07:53 /data/adb/magisk.db
Stopping the Magisk daemon now
No daemon is currently running!
Checking if the required data files exist ...
OK, the file "/data/adb/magisk.db" exists
Using the sqlite3 executable "/system/bin/sqlite3"
Checking the parameter ...
The parameter "2000" is okay
OK, all parameter are okay
OK, the installed Magisk version "25.2" is supported
Creating a backup of the existing Magisk database in "/data/adb/magisk.db.700.bkp" ...

Reading the current entries from the Magisk database ...
Current entries in the Magisk database table "policies":


Enabling the root access for these app UIDs:  2000

Processing the UID "2000" ...
Enabling root access for the UID "2000" now ...

OK, root access successfully enabled for the UID "2000"

Summary

root access enabled for 1 UID(s):
   2000

Current entries in the Magisk database table "policies":

uid   policy  until  logging  notification
----  ------  -----  -------  ------------
2000  2       0      1        1          

root access for the UIDs via Magisk successfully enabled
Rebooting the phone now ...
Parameter for "reboot_phone" are:
The current phone status is "1"
Will boot the phone using "adb"
Rebooting the phone using the command " /usr/bin/adb -d -s M6AIB760D0939LX  reboot " now ...
Waiting up to 120 second(s) for the phone .....
Booting the phone into the Android OS succeeded after 25 seconds; the current status of the phone is 3
Waiting up to 20 seconds until /data is mounted ...

Testing if the data partition on the phone is encrypted ...
The test directory for the encryption test is "/sdcard/Download"
drwxrws--x 5 media_rw media_rw 3452 2024-01-10 08:51 /data/media/0/3bLNGDAAAAQwta9U10hpl8uNvaoq7Nsj
drwxrws--- 3 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/982i1CAAAAw4eBU1e8NaKH9Dldv4lnao
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/9S0OeBAAAAAb7Rjsq6h5Lz5xzg4AHP2J
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/C1VoZAAAAAwyn6YE9,e1FbBjCJrazxFL
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/HHd9lDAAAAg9OjA8+hRMzMuwh8OXPoRQ
drwxrws--- 3 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/ThtwSDAAAAwwyTG94pGIKFhMgtPTYGXp
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/YnZkNBAAAAwesM+Z7qxGg8REj64hLl0U
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/fX5R1BAAAAwSn+JS0xhLLGqfs,6YIDwd
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/nVY4JDAAAAgnMjvNJ9b,GcOkYiX1Z1cY
drwxrws--- 2 root     media_rw 3452 2024-01-10 08:52 /data/media/0/nyt6ACAAAAwSm3L49T8J6TjP1MQdR,1M
drwxrws--- 4 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/o,s61CAAAAwjtRpbUt9dn+ID2BKs9AMs
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/oubo1CAAAAA+VplIm,qX+cDM31aWGIAo
drwxrws--- 3 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/rE36RCAAAAQ72e+zDBrVkX2+a9j1w0k6
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/y3VP4CAAAAAECnV7bV6PtyPBnt1ugXph
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/zrSWOCAAAAADiNwb+bnYBLSN40GqP+yf
The user password is not set - now using the default password from Android (default_password) to decrypt the files
The data partition on the phone is encrypted
twrp not found -- now decrypting the data partition on the phone using the Android command "input"
Waiting up to 15 seconds to complete the decrypting
....
(Waited for 4 second(s))
Waiting up to 30 seconds for the adb daemon to get ready 
... the adb daemon is ready after 0 second(s)

Sucessfully decrypted the data partition

# ---------------------------------------------------------------------
[10.01.2024 08:53 ]  ... the script ended with RC=0
 ----------------------------------------------------------------------

[10.01.2024 08:53 ] Processing the task "wait_for_access_via_adb" with the parameter "120:kill" ...
[10.01.2024 08:53 ] Executing now "wait_for_access_via_adb 120 kill"

 ----------------------------------------------------------------------
[10.01.2024 08:53 ] The phone is currently booted into the Android OS
[10.01.2024 08:53 ] The boot slot is _a.
[10.01.2024 08:53 ] adb access to the phone is working
 ----------------------------------------------------------------------

[10.01.2024 08:53 ] Processing the task "install_magisk_v26_in_boot_partition" with the parameter "active:reboot" ...
[10.01.2024 08:53 ] Executing now "install_magisk_v26_in_boot_partition active reboot"

 ----------------------------------------------------------------------
[10.01.2024 08:53 ] The slot to use for this task is "active"
[10.01.2024 08:53 ]
[10.01.2024 08:53 ] *** Installing Magisk using the apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk" into the boot partition using the script "/data/develop/android/scripts_on_linux/install_magisk_via_twrp.sh" with the parameter "active copy_apk use_apk  magisk_apk_file=/data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk"  ...
[10.01.2024 08:53 ]
[10.01.2024 08:53 ] The automatic reboot after executing the script is enabled
[10.01.2024 08:53 ] The task execution will stop if the script ends with a return code not zero

[10.01.2024 08:53 ]  ----------------------------------------------------------------------

[10.01.2024 08:53 ] *** Executing now "/data/develop/android/scripts_on_linux/install_magisk_via_twrp.sh active copy_apk use_apk magisk_apk_file=/data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk" ...
# ---------------------------------------------------------------------

install_magisk_via_twrp.sh version - v3.1.3.1 - add Magisk to the boot partition of a phone running Android using TWRP

Parameter "copy_apk" found: Will copy the Magisk apk file to the phone if neccessary
Parameter "use_apk" found: Will use the files from the apk file even if the files in /data/adb/magisk exist
Parameter "magisk_apk_file=file" found : Will use the Magisk apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk"
Using the TWRP image hardcoded in the script: "/data/backup/ASUS_ZENFONE8/twrp/current_twrp.img"
Checking the script prerequisites ...
Will wait 10 second(s) before starting the script on the phone
The Magisk version used is v26.0 or newer
Using the temporary directory "/data/local/tmp/MagiskInst" on the phone
The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ...
Will patch the boot partition on the attached phone with the serial number "M6AIB760D0939LX"
Using the options "-d -s M6AIB760D0939LX " for the adb commands
Using the options " -s M6AIB760D0939LX " for the fastboot commands
Checking for a connected phone booted into fastboot mode ...
No attached phone in fastboot mode found
Checking for an attached phone with working access via adb (USB) ...
Linux localhost 5.4.147-Omni-qgki-perf-g63bfa47476a7-dirty #1 SMP PREEMPT Thu Dec 14 08:17:06 CET 2023 aarch64 Toybox
... found a phone connected via USB with working adb access
The phone is booted in normal mode
The installed OS is based on Android 14 (Tue Jan  9 09:23:29 CET 2024); the description for the distribution is "omni_zenfone8-user 14 UQ1A.240105.004.A1 eng.xtrnaw.20240109.092500 release-keys"
WARNING: Can not detect the version of the installed Magisk
Booting the phone into the fastboot mode now ...
Waiting up to 60 seconds for the boot into the fastboot mode ...
Booting the phone from the TWRP image "/data/backup/ASUS_ZENFONE8/twrp/current_twrp.img" now  ...
Sending 'boot.img' (98304 KB)                      OKAY [  2.801s]
Booting                                            OKAY [ 10.362s]
Finished. Total time: 13.203s
Waiting up to 60 seconds for the boot of the phone .....
Retrieving the current boot slot from the phone ...
The current boot slot is "_a"
The boot slot to patch is "_a"
The boot partition to patch is "boot_a"
Copying the Magisk apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk" to the phone into the directory "/data" ...
/data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk: 1 file pushed, 0 skipped. 48.0 MB/s (12526383 bytes in 0.249s)
Creating the temporary directory "/data/local/tmp/MagiskInst" with the Magisk files necessarry to install Magisk into the boot partition ...

Creating the script file "/tmp/init_magisk_dirs.sh" to create the directory "/data/local/tmp/MagiskInst" on the phone ...
Creating the directory "/data/local/tmp/MagiskInst" on the phone ...
Copying the temporary script file "/tmp/init_magisk_dirs.sh" to the file "/data/local/tmp/MagiskInst/create_temporary_magisk_dir.sh" on the phone ...
/tmp/init_magisk_dirs.sh: 1 file pushed, 0 skipped. 199.7 MB/s (7716 bytes in 0.000s)
Executing the script "/data/local/tmp/MagiskInst/create_temporary_magisk_dir.sh" on the phone ...
 ------------------------------------------------------------------------------
+ adb -d -s M6AIB760D0939LX shell /data/local/tmp/MagiskInst/create_temporary_magisk_dir.sh /data/local/tmp/MagiskInst /data/Magisk-v26.4.apk
Magisk is not yet installed
Using the directory "/data/local/tmp/MagiskInst/bin" for the Magisk Binaries
Creating the files in the directory "/data/local/tmp/MagiskInst/bin" using the files for the CPU "arm64-v8a" from the apk file "/data/Magisk-v26.4.apk" ...
Unpacking the apk file "/data/Magisk-v26.4.apk" into the directory "/data/local/tmp/MagiskInst/magisk_apk_contents.635" ...
Delete all existing files in the directory "/data/local/tmp/MagiskInst/bin" ...
total 0
total 0

Copying the files to "/data/local/tmp/MagiskInst/bin" ...
+ mv ./assets/util_functions.sh /data/local/tmp/MagiskInst/bin
+ mv ./assets/chromeos /data/local/tmp/MagiskInst/bin/
+ mv ./assets/boot_patch.sh /data/local/tmp/MagiskInst/bin
+ mv ./assets/addon.d.sh /data/local/tmp/MagiskInst/bin
+ '[' -r ./assets/stub.apk ']'
+ mv ./assets/stub.apk /data/local/tmp/MagiskInst/bin
+ cd ./lib/arm64-v8a
+ mv libbusybox.so /data/local/tmp/MagiskInst/bin/busybox
+ mv libmagisk64.so /data/local/tmp/MagiskInst/bin/magisk64
+ mv libmagiskboot.so /data/local/tmp/MagiskInst/bin/magiskboot
+ mv libmagiskinit.so /data/local/tmp/MagiskInst/bin/magiskinit
+ mv libmagiskpolicy.so /data/local/tmp/MagiskInst/bin/magiskpolicy
+ cd ../..
+ file=libmagisk32.so
+ '[' arm64-v8ax '=' arm64-v8ax -a -r ./lib/armeabi-v7a/libmagisk32.so ']'
+ mv ./lib/armeabi-v7a/libmagisk32.so /data/local/tmp/MagiskInst/bin/magisk32
+ set +x
+ TEMPRC=0
+ set +x
 ------------------------------------------------------------------------------
... "/data/local/tmp/MagiskInst/create_temporary_magisk_dir.sh" successfully executed

Checking if the Magisk patch script "boot_patch.sh" exists on the phone ....
-rwxr-xr-x 1 root root 7078 2024-01-10 07:54 /data/local/tmp/MagiskInst/bin/boot_patch.sh
Checking if the download directory "/sdcard/Download" exists on the phone ....
/sdcard/Download
Creating the boot image file "/sdcard/Download/boot_a.769436.img" from the partition "/dev/block/by-name/boot_a" ...
196608+0 records in
196608+0 records out
100663296 bytes (96 M) copied, 0.312397 s, 307 M/s

Checking the result ...
-rw-rw---- 1 root media_rw 100663296 2024-01-10 07:54 /sdcard/Download/boot_a.769436.img
The check sums are:
The check sum of the boot partition "/dev/block/by-name/boot_a" on the phone is "3854456080"
The check sum of th boot image file on the phone is "/sdcard/Download/boot_a.769436.img" is "3854456080"  
Installing Magisk into the boot partition using the new method ...
Patching the boot image file "/sdcard/Download/boot_a.769436.img" ...
Preparing the directory with the temporary Magisk installation files for usage by the user with the UID 2000 (this is the user "shell") ...
+ adb -d -s M6AIB760D0939LX shell chown -R 2000:2000 /data/local/tmp/MagiskInst
+ adb -d -s M6AIB760D0939LX shell chmod -R 755 /data/local/tmp/MagiskInst
+ adb -d -s M6AIB760D0939LX shell chown -R 2000:2000 /sdcard/Download/boot_a.769436.img
+ adb -d -s M6AIB760D0939LX shell chmod o+r /sdcard/Download/boot_a.769436.img
+ set +x
Rebooting the phone into the Android OS now ...
Waiting up to 60 seconds for the boot of the phone .....
The phone is now booted into the Android OS.
Using the patch script "/data/local/tmp/MagiskInst/bin/boot_patch.sh" ...
Waiting up to 20 seconds for /data to get mounted .........
- Unpacking boot image
Parsing boot image: [/sdcard/Download/boot_a.769436.img]
HEADER_VER      [3]
KERNEL_SZ       [39928320]
RAMDISK_SZ      [48518658]
OS_VERSION      [14.0.0]
OS_PATCH_LEVEL  [2024-01]
PAGESIZE        [4096]
CMDLINE         []
KERNEL_FMT      [raw]
RAMDISK_FMT     [gzip]
unexpected ASN.1 DER tag: expected SEQUENCE, got APPLICATION [1] (primitive)
VBMETA
- Checking ramdisk status
Loading cpio: [ramdisk.cpio]
- Magisk patched boot image detected
Loading cpio: [ramdisk.cpio]
Extracting entry [.backup/.magisk] to [config.orig]
Restore [.backup/init] -> [init]
Restore [.backup/system/etc/fstab.postinstall] -> [system/etc/fstab.postinstall]
Removed entry [.backup]
Removed entry [overlay.d]
Removed entry [overlay.d/sbin]
Removed entry [overlay.d/sbin/magisk32.xz]
Removed entry [overlay.d/sbin/magisk64.xz]
Dumping cpio: [ramdisk.cpio]
- Patching ramdisk
- Pre-init storage partition: metadata
Loading cpio: [ramdisk.cpio]
Add file [init] (100750)
Create directory [overlay.d] (0750)
Create directory [overlay.d/sbin] (0750)
Add file [overlay.d/sbin/magisk32.xz] (100644)
Add file [overlay.d/sbin/magisk64.xz] (100644)
Add file [overlay.d/sbin/stub.xz] (100644)
Patch with flag KEEPVERITY=[false] KEEPFORCEENCRYPT=[false]
Loading cpio: [ramdisk.cpio.orig]
Backup [init] -> [.backup/init]
Record new entry: [overlay.d] -> [.backup/.rmlist]
Record new entry: [overlay.d/sbin] -> [.backup/.rmlist]
Record new entry: [overlay.d/sbin/magisk32.xz] -> [.backup/.rmlist]
Record new entry: [overlay.d/sbin/magisk64.xz] -> [.backup/.rmlist]
Record new entry: [overlay.d/sbin/stub.xz] -> [.backup/.rmlist]
Create directory [.backup] (0000)
Add file [.backup/.magisk] (100000)
Dumping cpio: [ramdisk.cpio]
- Repacking boot image
Parsing boot image: [/sdcard/Download/boot_a.769436.img]
HEADER_VER      [3]
KERNEL_SZ       [39928320]
RAMDISK_SZ      [48518658]
OS_VERSION      [14.0.0]
OS_PATCH_LEVEL  [2024-01]
PAGESIZE        [4096]
CMDLINE         []
KERNEL_FMT      [raw]
RAMDISK_FMT     [gzip]
unexpected ASN.1 DER tag: expected SEQUENCE, got APPLICATION [1] (primitive)
VBMETA
Repack to boot image: [new-boot.img]
HEADER_VER      [3]
KERNEL_SZ       [39928320]
RAMDISK_SZ      [48624519]
OS_VERSION      [14.0.0]
OS_PATCH_LEVEL  [2024-01]
PAGESIZE        [4096]
CMDLINE         []
Checking the result ...
-rw-r--r-- 1 shell shell 100663296 2024-01-10 08:55 /data/local/tmp/MagiskInst/bin/new-boot.img
The patched boot image is "/sdcard/Download/patched_boot_a.769436.img"
The Magisk app is not yet installed
Now installing the Magisk App using the apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk" ...
+ cat /data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk
+ adb -d -s M6AIB760D0939LX shell pm install -S 12526383
Success
+ set +x
Will now grant the permission "android.permission.POST_NOTIFICATIONS" for the Magisk App ...
+ adb -d -s M6AIB760D0939LX shell pm grant com.topjohnwu.magisk android.permission.POST_NOTIFICATIONS
+ set +x
The status of the permission "android.permission.POST_NOTIFICATIONS" for the Magisk App is now:
        android.permission.POST_NOTIFICATIONS: granted=true, flags=[ USER_SENSITIVE_WHEN_GRANTED|USER_SENSITIVE_WHEN_DENIED]
Waiting now 10 seconds ...
Now rebooting the phone into the bootloader  ...
Waiting up to 60 seconds for the boot into the fastboot mode ...
Booting the phone from the TWRP image "/data/backup/ASUS_ZENFONE8/twrp/current_twrp.img" now  ...
Sending 'boot.img' (98304 KB)                      OKAY [  2.821s]
Booting                                            OKAY [ 10.355s]
Finished. Total time: 13.223s
Waiting up to 60 seconds for the boot of the phone .....
Copying the Magisk binaries from "/data/local/tmp/MagiskInst/bin" to "/data/adb/magisk" ...
chcon '/data/adb/magisk' to u:object_r:system_file:s0
chcon '/data/adb/magisk/addon.d.sh' to u:object_r:system_file:s0
chcon '/data/adb/magisk/boot_patch.sh' to u:object_r:system_file:s0
chcon '/data/adb/magisk/busybox' to u:object_r:system_file:s0
chcon '/data/adb/magisk/chromeos' to u:object_r:system_file:s0
chcon '/data/adb/magisk/magisk32' to u:object_r:system_file:s0
chcon '/data/adb/magisk/magisk64' to u:object_r:system_file:s0
chcon '/data/adb/magisk/magiskboot' to u:object_r:system_file:s0
chcon '/data/adb/magisk/magiskinit' to u:object_r:system_file:s0
chcon '/data/adb/magisk/magiskpolicy' to u:object_r:system_file:s0
chcon '/data/adb/magisk/ramdisk.cpio' to u:object_r:system_file:s0
chcon '/data/adb/magisk/stub.apk' to u:object_r:system_file:s0
chcon '/data/adb/magisk/util_functions.sh' to u:object_r:system_file:s0
Magisk binaries successfully copied to "/data/adb/magisk"
Waiting now 10 seconds ...
Patching the partition "/dev/block/by-name/boot_a" from the patched boot image file "/sdcard/Download/patched_boot_a.769436.img" via dd ...
196608+0 records in
196608+0 records out
100663296 bytes (96 M) copied, 4.690106 s, 20 M/s
Checking the result ....

The check sums for the images and devices on the phone are:

3854456080 100663296 /sdcard/Download/boot_a.769436.img
857298480 100663296 /sdcard/Download/patched_boot_a.769436.img
857298480 100663296 /dev/block/by-name/boot_a

OK, patching the boot partition "/dev/block/by-name/boot_a" was successfull
INFO: The Magisk binaries in "/data/adb/magisk" already exist
Rebooting the phone now ...

# ---------------------------------------------------------------------
[10.01.2024 08:56 ]  ... the script ended with RC=0
 ----------------------------------------------------------------------

[10.01.2024 08:56 ] Processing the task "install_the_magisk_app"  ...
[10.01.2024 08:56 ] Executing now "install_the_magisk_app "

 ----------------------------------------------------------------------
[10.01.2024 08:56 ]
[10.01.2024 08:56 ] *** Installing the Magisk App from the apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk" using the script "/data/develop/android/scripts_on_linux/install_apk.sh" with the parameter " /data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk"  ...
[10.01.2024 08:56 ]
[10.01.2024 08:56 ] The automatic reboot after executing the script is disabled
[10.01.2024 08:56 ] The task execution will stop if the script ends with a return code not zero
[10.01.2024 08:56 ] Parameter for "reboot_phone" are:
[10.01.2024 08:56 ] The current phone status is "3"
[10.01.2024 08:56 ] Will boot the phone using "adb"
[10.01.2024 08:56 ] The phone is already booted into the android
[10.01.2024 08:56 ] Waiting up to 20 seconds until /sdcard is mounted ...
..........
[10.01.2024 08:57 ] wait_until_sdcard_is_mounted: /sdcard is mounted after 11 second(s)

[10.01.2024 08:57 ]  ----------------------------------------------------------------------

[10.01.2024 08:57 ] *** Executing now "/data/develop/android/scripts_on_linux/install_apk.sh -d -s M6AIB760D0939LX -- /data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk" ...
# ---------------------------------------------------------------------

Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk



Installing the apk "/data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk" ...
Success
"/data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps_Backup/Magisk-v26.4.apk



# ---------------------------------------------------------------------
[10.01.2024 08:57 ]  ... the script ended with RC=0
[10.01.2024 08:57 ] Magisk app successfully installed
[10.01.2024 08:57 ] Will now grant the permission "android.permission.POST_NOTIFICATIONS" for the Magisk app ...

The status of the permission "android.permission.POST_NOTIFICATIONS" for the Magisk App is now:
        android.permission.POST_NOTIFICATIONS: granted=true, flags=[ USER_SENSITIVE_WHEN_GRANTED|USER_SENSITIVE_WHEN_DENIED]
 ----------------------------------------------------------------------

[10.01.2024 08:57 ] Processing the task "wait_for_access_via_adb" with the parameter "120:kill" ...
[10.01.2024 08:57 ] Executing now "wait_for_access_via_adb 120 kill"

 ----------------------------------------------------------------------
[10.01.2024 08:57 ] The phone is currently booted into the Android OS
[10.01.2024 08:57 ] The boot slot is _a.
[10.01.2024 08:57 ] adb access to the phone is working
 ----------------------------------------------------------------------

[10.01.2024 08:57 ] Processing the task "install_archive_file" with the parameter "twrp:reboot:script=/cache/correct_setlinux_for_wifconifg.sh" ...
[10.01.2024 08:57 ] Executing now "install_archive_file twrp reboot script=/cache/correct_setlinux_for_wifconifg.sh"

 ----------------------------------------------------------------------
[10.01.2024 08:57 ] Assuming the file "/data/develop/android/android_config.tar" is a tar archive
[10.01.2024 08:57 ]
[10.01.2024 08:57 ] *** Installing the contents of the file "/data/develop/android/android_config.tar" on the phone  ...
[10.01.2024 08:57 ]
[10.01.2024 08:57 ] The automatic reboot after executing the script is enabled
[10.01.2024 08:57 ] The task execution will stop if the script ends with a return code not zero
[10.01.2024 08:57 ] The requested boot environment to unpack the file is "twrp"
[10.01.2024 08:57 ] The phone is booted into the Android OS
[10.01.2024 08:57 ] Booting the phone into the bootloader now ...
[10.01.2024 08:57 ] Waiting up to 60 seconds for the boot into the fastboot mode ...
[10.01.2024 08:57 ] The phone is booted into the bootloader
[10.01.2024 08:57 ] Booting the phone from the TWRP image "/data/backup/ASUS_ZENFONE8/twrp_local/twrp-3.7.0_12-0-I006D-with_Android14_support_and_tools.img" now  ...
Sending 'boot.img' (98304 KB)                      OKAY [  2.831s]
Booting                                            OKAY [ 10.358s]
Finished. Total time: 13.229s
Waiting up to 120 seconds for a working adb connection .....
Waiting up to 30 seconds for the adb daemon to get ready 
[10.01.2024 08:58 ] ... the adb daemon is ready after 0.014 second(s)

[10.01.2024 08:58 ] Waiting up to 20 seconds until /data is mounted ...

[10.01.2024 08:58 ] Testing if the data partition on the phone is encrypted ...
[10.01.2024 08:58 ] The test directory for the encryption test is "/data/media/0/Download"
[10.01.2024 08:58 ] The data partition on the phone is either not mounted or not encrypted
[10.01.2024 08:58 ] The phone is booted into TWRP version "3.7.0_12-0"
[10.01.2024 08:58 ] The phone is currently booted from a TWRP image
[10.01.2024 08:58 ] The boot slot is _a.
[10.01.2024 08:58 ] Retrieving the download directory on the phone ...
[10.01.2024 08:58 ] The user on the phone is the user "root"
[10.01.2024 08:58 ] Now uploading the file "/data/develop/android/android_config.tar" to the phone into the directory "/sdcard/Download" ....
/data/develop/android/android_config.tar: 1 file pushed, 0 skipped. 312.7 MB/s (10240 bytes in 0.000s)
[10.01.2024 08:58 ] Creating the temporary script "/tmp/prepare_phone.sh_WORKDIR.767094/task_install_archive_file_767094.sh" to unpack the file ...
[10.01.2024 08:58 ] Uploading the temporary script "/tmp/prepare_phone.sh_WORKDIR.767094/task_install_archive_file_767094.sh" to the file "/sdcard/Download/unpack.767094.sh" on the phone  ...
/tmp/prepare_phone.sh_WORKDIR.767094/task_install_archive_file_767094.sh: 1 file pushed, 0 skipped. 2.6 MB/s (72 bytes in 0.000s)
[10.01.2024 08:58 ] Unpacking the file "/data/develop/android/android_config.tar" on the phone using the temporary script "/sdcard/Download/unpack.767094.sh" on the phone ....
+ cd /
+ tar -xvf /sdcard/Download/android_config.tar
cache/correct_setlinux_for_wifconifg.sh
data/misc/apexdata/com.android.wifi/WifiConfigStore.xml
[10.01.2024 08:58 ] Successfully unpacked the file "/data/develop/android/android_config.tar" on the phone
[10.01.2024 08:58 ] Checking if the post install script "/cache/correct_setlinux_for_wifconifg.sh" exists on the phone ...
[10.01.2024 08:58 ] Executing the post install script "/cache/correct_setlinux_for_wifconifg.sh" on the phone ...
# ---------------------------------------------------------------------
chcon '/data/misc/apexdata/com.android.wifi/WifiConfigStore.xml' to u:object_r:apex_system_server_data_file:s0
# ---------------------------------------------------------------------
[10.01.2024 08:58 ]  ... the RC of the script is 0
[10.01.2024 08:58 ] *** Now rebooting the phone ...
[10.01.2024 08:58 ] Parameter for "reboot_phone" are: wait force
[10.01.2024 08:58 ] The current phone status is "1"
[10.01.2024 08:58 ] Will boot the phone using "adb"
[10.01.2024 08:58 ] Rebooting the phone using the command " /usr/bin/adb -d -s M6AIB760D0939LX  reboot " now ...
Waiting up to 120 second(s) for the phone .....
[10.01.2024 08:58 ] Booting the phone into the Android OS succeeded after 25 seconds; the current status of the phone is 3
[10.01.2024 08:58 ] Waiting up to 20 seconds until /data is mounted ...

[10.01.2024 08:58 ] Testing if the data partition on the phone is encrypted ...
[10.01.2024 08:58 ] The test directory for the encryption test is "/sdcard/Download"
drwxrws--x 5 media_rw media_rw 3452 2024-01-10 08:51 /data/media/0/3bLNGDAAAAQwta9U10hpl8uNvaoq7Nsj
drwxrws--- 3 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/982i1CAAAAw4eBU1e8NaKH9Dldv4lnao
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/9S0OeBAAAAAb7Rjsq6h5Lz5xzg4AHP2J
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/C1VoZAAAAAwyn6YE9,e1FbBjCJrazxFL
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/HHd9lDAAAAg9OjA8+hRMzMuwh8OXPoRQ
drwxrws--- 3 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/ThtwSDAAAAwwyTG94pGIKFhMgtPTYGXp
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/YnZkNBAAAAwesM+Z7qxGg8REj64hLl0U
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/fX5R1BAAAAwSn+JS0xhLLGqfs,6YIDwd
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/nVY4JDAAAAgnMjvNJ9b,GcOkYiX1Z1cY
drwxrws--- 2 root     media_rw 3452 2024-01-10 08:52 /data/media/0/nyt6ACAAAAwSm3L49T8J6TjP1MQdR,1M
drwxrws--- 4 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/o,s61CAAAAwjtRpbUt9dn+ID2BKs9AMs
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:58 /data/media/0/oubo1CAAAAA+VplIm,qX+cDM31aWGIAo
drwxrws--- 3 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/rE36RCAAAAQ72e+zDBrVkX2+a9j1w0k6
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/y3VP4CAAAAAECnV7bV6PtyPBnt1ugXph
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/zrSWOCAAAAADiNwb+bnYBLSN40GqP+yf
[10.01.2024 08:58 ] The user password is not set - now using the default password from Android (default_password) to decrypt the files
[10.01.2024 08:58 ] The data partition on the phone is encrypted
[10.01.2024 08:58 ] twrp not found -- now decrypting the data partition on the phone using the Android command "input"
[10.01.2024 08:58 ] Waiting up to 15 seconds to complete the decrypting
....
(Waited for 4 second(s))
Waiting up to 30 seconds for the adb daemon to get ready 
[10.01.2024 08:58 ] ... the adb daemon is ready after 0.028 second(s)

[10.01.2024 08:58 ] Sucessfully decrypted the data partition
 ----------------------------------------------------------------------

[10.01.2024 08:58 ] Processing the task "enable_disable_abort_on_error" with the parameter "disable" ...
[10.01.2024 08:58 ] Executing now "enable_disable_abort_on_error disable"

 ----------------------------------------------------------------------
[10.01.2024 08:58 ] Setting the variable "ABORT_TASK_EXECUTION_ON_ERROR" to "1" ..
 ----------------------------------------------------------------------

[10.01.2024 08:58 ] Processing the task "install_essential_scripts"  ...
[10.01.2024 08:58 ] Executing now "install_essential_scripts "

 ----------------------------------------------------------------------
[10.01.2024 08:58 ]
[10.01.2024 08:58 ] *** Installing the essential scripts from the local directory "/data/backup/Android/EssentialScripts/" onto the phone  ...
[10.01.2024 08:58 ]
[10.01.2024 08:58 ] The automatic reboot after executing the script is disabled
[10.01.2024 08:58 ] The task execution will stop if the script ends with a return code not zero
[10.01.2024 08:58 ] Parameter for "reboot_phone" are:
[10.01.2024 08:58 ] The current phone status is "3"
[10.01.2024 08:58 ] Will boot the phone using "adb"
[10.01.2024 08:58 ] The phone is already booted into the android
[10.01.2024 08:58 ] Waiting up to 20 seconds until /sdcard is mounted ...

[10.01.2024 08:58 ] wait_until_sdcard_is_mounted: /sdcard is mounted after 1 second(s)
[10.01.2024 08:58 ] Copying the scripts to the phone ...
/data/backup/Android/EssentialScripts//0001logcatboot: 1 file pushed, 0 skipped. 1.6 MB/s (156 bytes in 0.000s)
/data/backup/Android/EssentialScripts//correct_dev_pn553.sh: 1 file pushed, 0 skipped. 4.9 MB/s (354 bytes in 0.000s)
/data/backup/Android/EssentialScripts//disable_intent_filter_verification.sh: 1 file pushed, 0 skipped. 1.7 MB/s (51 bytes in 0.000s)
/data/backup/Android/EssentialScripts//enable_microg.sh: 1 file pushed, 0 skipped. 7.7 MB/s (146 bytes in 0.000s)
/data/backup/Android/EssentialScripts//enable_wifi.sh: 1 file pushed, 0 skipped. 152.2 MB/s (2956 bytes in 0.000s)
/data/backup/Android/EssentialScripts//install_apk.sh: 1 file pushed, 0 skipped. 261.2 MB/s (6052 bytes in 0.000s)
/data/backup/Android/EssentialScripts//list_magisk_root_permissions.sh: 1 file pushed, 0 skipped. 10.8 MB/s (223 bytes in 0.000s)
/data/backup/Android/EssentialScripts//remove_screenlock.sh: 1 file pushed, 0 skipped. 3.5 MB/s (69 bytes in 0.000s)
[10.01.2024 08:58 ] Successfully copied the essential scripts from the directory "/data/backup/Android/EssentialScripts/" to the phone
 ----------------------------------------------------------------------

[10.01.2024 08:58 ] Processing the task "execute_script_on_the_phone" with the parameter "ignorerc:/data/develop/android/scripts_on_linux/enable_wlan.sh" ...
[10.01.2024 08:58 ] Executing now "execute_script_on_the_phone ignorerc /data/develop/android/scripts_on_linux/enable_wlan.sh"

 ----------------------------------------------------------------------
[10.01.2024 08:58 ]
[10.01.2024 08:58 ] *** Executing the script "/data/develop/android/scripts_on_linux/enable_wlan.sh" on the phone  ...
[10.01.2024 08:58 ]
[10.01.2024 08:58 ] The Returncode of the script will be ignored
[10.01.2024 08:58 ] Waiting for a working adb connection ...
Waiting up to 120 seconds for a working adb connection
Waiting up to 30 seconds for the adb daemon to get ready 
[10.01.2024 08:59 ] ... the adb daemon is ready after 0.049 second(s)

[10.01.2024 08:59 ] Waiting up to 20 seconds until /data is mounted ...

[10.01.2024 08:59 ] Testing if the data partition on the phone is encrypted ...
[10.01.2024 08:59 ] The test directory for the encryption test is "/sdcard/Download"
[10.01.2024 08:59 ] The data partition on the phone is either not mounted or not encrypted

[10.01.2024 08:59 ] Copying the script "/data/develop/android/scripts_on_linux/enable_wlan.sh" to "/sdcard/Download/enable_wlan.sh" on the phone ...
/data/develop/android/scripts_on_linux/enable_wlan.sh: 1 file pushed, 0 skipped. 6.9 MB/s (559 bytes in 0.000s)
[10.01.2024 08:59 ] Now executing the script "/sdcard/Download/enable_wlan.sh" on the phone ...

*** The script to enable WLAN and disable mobile Data is running ...

Disabling mobile data ...
Enabling WiFi ...
Configuring WiFi ...
Connection failed
 ----------------------------------------------------------------------

[10.01.2024 08:59 ] Processing the task "install_essential_apps"  ...
[10.01.2024 08:59 ] Executing now "install_essential_apps "

 ----------------------------------------------------------------------
[10.01.2024 08:59 ]
[10.01.2024 08:59 ] *** Installing the essential apss from the local directory "/data/backup/Android/EssentialApps" onto the phone using the script "/data/develop/android/scripts_on_linux/install_apk.sh" ...
[10.01.2024 08:59 ]
[10.01.2024 08:59 ] The automatic reboot after executing the script is disabled
[10.01.2024 08:59 ] The task execution will stop if the script ends with a return code not zero
[10.01.2024 08:59 ] Parameter for "reboot_phone" are:
[10.01.2024 08:59 ] The current phone status is "3"
[10.01.2024 08:59 ] Will boot the phone using "adb"
[10.01.2024 08:59 ] The phone is already booted into the android
[10.01.2024 08:59 ] Android 14 found -- will use the pm install option --bypass-low-target-sdk-block
[10.01.2024 08:59 ] (Set the environment variable NO_BYPASS_LOW_TARGET to a non-zero value to suppress using this parameter)
Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/axp.tool.apkextractor_v5.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/axp.tool.apkextractor_v5.apk" ...
Success
"/data/backup/Android/EssentialApps/axp.tool.apkextractor_v5.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/axp.tool.apkextractor_v5.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/com.android.keepass_196.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/com.android.keepass_196.apk" ...
Success
"/data/backup/Android/EssentialApps/com.android.keepass_196.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/com.android.keepass_196.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/com.apk.editor_v25.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/com.apk.editor_v25.apk" ...
Success
"/data/backup/Android/EssentialApps/com.apk.editor_v25.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/com.apk.editor_v25.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/com.bytehamster.changelog_v49.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/com.bytehamster.changelog_v49.apk" ...
Success
"/data/backup/Android/EssentialApps/com.bytehamster.changelog_v49.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/com.bytehamster.changelog_v49.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/com.dkanada.openapk_v35.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/com.dkanada.openapk_v35.apk" ...
Success
"/data/backup/Android/EssentialApps/com.dkanada.openapk_v35.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/com.dkanada.openapk_v35.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/com.elsdoerfer.android.autostarts_v33.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/com.elsdoerfer.android.autostarts_v33.apk" ...
Success
"/data/backup/Android/EssentialApps/com.elsdoerfer.android.autostarts_v33.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/com.elsdoerfer.android.autostarts_v33.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/com.keramidas.TitaniumBackupAddon_v1.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/com.keramidas.TitaniumBackupAddon_v1.apk" ...
Success
"/data/backup/Android/EssentialApps/com.keramidas.TitaniumBackupAddon_v1.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/com.keramidas.TitaniumBackupAddon_v1.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/com.keramidas.TitaniumBackup_v417.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/com.keramidas.TitaniumBackup_v417.apk" ...
Success
"/data/backup/Android/EssentialApps/com.keramidas.TitaniumBackup_v417.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/com.keramidas.TitaniumBackup_v417.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/com.kunzisoft.keepass.libre_57.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/com.kunzisoft.keepass.libre_57.apk" ...
Success
"/data/backup/Android/EssentialApps/com.kunzisoft.keepass.libre_57.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/com.kunzisoft.keepass.libre_57.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/com.matoski.adbm_v27.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/com.matoski.adbm_v27.apk" ...
Success
"/data/backup/Android/EssentialApps/com.matoski.adbm_v27.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/com.matoski.adbm_v27.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/com.offsec.nhterm_2020040001.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/com.offsec.nhterm_2020040001.apk" ...
Success
"/data/backup/Android/EssentialApps/com.offsec.nhterm_2020040001.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/com.offsec.nhterm_2020040001.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/com.termux_v118.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/com.termux_v118.apk" ...
Success
"/data/backup/Android/EssentialApps/com.termux_v118.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/com.termux_v118.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/F-Droid.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/F-Droid.apk" ...
Success
"/data/backup/Android/EssentialApps/F-Droid.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/F-Droid.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/FoxMmm-0.5.6.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/FoxMmm-0.5.6.apk" ...
Success
"/data/backup/Android/EssentialApps/FoxMmm-0.5.6.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/FoxMmm-0.5.6.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/io.github.muntashirakon.AppManager_v397.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/io.github.muntashirakon.AppManager_v397.apk" ...
Success
"/data/backup/Android/EssentialApps/io.github.muntashirakon.AppManager_v397.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/io.github.muntashirakon.AppManager_v397.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/MiX.addon.Archive-arm64.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/MiX.addon.Archive-arm64.apk" ...
Success
"/data/backup/Android/EssentialApps/MiX.addon.Archive-arm64.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/MiX.addon.Archive-arm64.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/MiX.addon.AutoTag.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/MiX.addon.AutoTag.apk" ...
Success
"/data/backup/Android/EssentialApps/MiX.addon.AutoTag.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/MiX.addon.AutoTag.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/MiX.addon.Codecs-arm64.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/MiX.addon.Codecs-arm64.apk" ...
Success
"/data/backup/Android/EssentialApps/MiX.addon.Codecs-arm64.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/MiX.addon.Codecs-arm64.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/MiX.addon.Image-arm64.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/MiX.addon.Image-arm64.apk" ...
Success
"/data/backup/Android/EssentialApps/MiX.addon.Image-arm64.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/MiX.addon.Image-arm64.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/MiX.addon.Metadata.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/MiX.addon.Metadata.apk" ...
Success
"/data/backup/Android/EssentialApps/MiX.addon.Metadata.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/MiX.addon.Metadata.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/MiX.addon.PDF-arm64.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/MiX.addon.PDF-arm64.apk" ...
Success
"/data/backup/Android/EssentialApps/MiX.addon.PDF-arm64.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/MiX.addon.PDF-arm64.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/MiX.addon.Signer.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/MiX.addon.Signer.apk" ...
Success
"/data/backup/Android/EssentialApps/MiX.addon.Signer.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/MiX.addon.Signer.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/MiX.addon.SMB.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/MiX.addon.SMB.apk" ...
Success
"/data/backup/Android/EssentialApps/MiX.addon.SMB.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/MiX.addon.SMB.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/MiX.addon.Tagger.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/MiX.addon.Tagger.apk" ...
Success
"/data/backup/Android/EssentialApps/MiX.addon.Tagger.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/MiX.addon.Tagger.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/MiXplorer.v6.63.1.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/MiXplorer.v6.63.1.apk" ...
Success
"/data/backup/Android/EssentialApps/MiXplorer.v6.63.1.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/MiXplorer.v6.63.1.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/NetHunterStore.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/NetHunterStore.apk" ...
Success
"/data/backup/Android/EssentialApps/NetHunterStore.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/NetHunterStore.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/Notecase_Pro_1.2.2.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/Notecase_Pro_1.2.2.apk" ...
Success
"/data/backup/Android/EssentialApps/Notecase_Pro_1.2.2.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/Notecase_Pro_1.2.2.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/OmniStore.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/OmniStore.apk" ...
Success
"/data/backup/Android/EssentialApps/OmniStore.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/OmniStore.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/org.omnirom.chromium_v535910915.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/org.omnirom.chromium_v535910915.apk" ...
Success
"/data/backup/Android/EssentialApps/org.omnirom.chromium_v535910915.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/org.omnirom.chromium_v535910915.apk


Running on a PC
Using adb with the options " -d -s M6AIB760D0939LX " to install the packages
The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX
Installing these apks

 
/data/backup/Android/EssentialApps/yasnac-v1.1.5.r65.15110ef310-release.apk

The additional parameter for the command "pm install" are: " --bypass-low-target-sdk-block "


Installing the apk "/data/backup/Android/EssentialApps/yasnac-v1.1.5.r65.15110ef310-release.apk" ...
Success
"/data/backup/Android/EssentialApps/yasnac-v1.1.5.r65.15110ef310-release.apk" succcessfully installed

Installation summary
====================

1 package(s) successfully installed:
 
/data/backup/Android/EssentialApps/yasnac-v1.1.5.r65.15110ef310-release.apk



[10.01.2024 08:59 ] Summary:

[10.01.2024 08:59 ] 30 apk(s) successfully installed:

/data/backup/Android/EssentialApps/axp.tool.apkextractor_v5.apk
/data/backup/Android/EssentialApps/com.android.keepass_196.apk
/data/backup/Android/EssentialApps/com.apk.editor_v25.apk
/data/backup/Android/EssentialApps/com.bytehamster.changelog_v49.apk
/data/backup/Android/EssentialApps/com.dkanada.openapk_v35.apk
/data/backup/Android/EssentialApps/com.elsdoerfer.android.autostarts_v33.apk
/data/backup/Android/EssentialApps/com.keramidas.TitaniumBackupAddon_v1.apk
/data/backup/Android/EssentialApps/com.keramidas.TitaniumBackup_v417.apk
/data/backup/Android/EssentialApps/com.kunzisoft.keepass.libre_57.apk
/data/backup/Android/EssentialApps/com.matoski.adbm_v27.apk
/data/backup/Android/EssentialApps/com.offsec.nhterm_2020040001.apk
/data/backup/Android/EssentialApps/com.termux_v118.apk
/data/backup/Android/EssentialApps/F-Droid.apk
/data/backup/Android/EssentialApps/FoxMmm-0.5.6.apk
/data/backup/Android/EssentialApps/io.github.muntashirakon.AppManager_v397.apk
/data/backup/Android/EssentialApps/MiX.addon.Archive-arm64.apk
/data/backup/Android/EssentialApps/MiX.addon.AutoTag.apk
/data/backup/Android/EssentialApps/MiX.addon.Codecs-arm64.apk
/data/backup/Android/EssentialApps/MiX.addon.Image-arm64.apk
/data/backup/Android/EssentialApps/MiX.addon.Metadata.apk
/data/backup/Android/EssentialApps/MiX.addon.PDF-arm64.apk
/data/backup/Android/EssentialApps/MiX.addon.Signer.apk
/data/backup/Android/EssentialApps/MiX.addon.SMB.apk
/data/backup/Android/EssentialApps/MiX.addon.Tagger.apk
/data/backup/Android/EssentialApps/MiXplorer.v6.63.1.apk
/data/backup/Android/EssentialApps/NetHunterStore.apk
/data/backup/Android/EssentialApps/Notecase_Pro_1.2.2.apk
/data/backup/Android/EssentialApps/OmniStore.apk
/data/backup/Android/EssentialApps/org.omnirom.chromium_v535910915.apk
/data/backup/Android/EssentialApps/yasnac-v1.1.5.r65.15110ef310-release.apk
 ----------------------------------------------------------------------

[10.01.2024 08:59 ] Processing the task "install_essential_magisk_modules"  ...
[10.01.2024 08:59 ] Executing now "install_essential_magisk_modules "

 ----------------------------------------------------------------------
[10.01.2024 08:59 ]
[10.01.2024 08:59 ] *** Installing the essential Magisk modules from the local directory "/data/backup/Android/EssentialMagiskModules" onto the phone ...
[10.01.2024 08:59 ]
[10.01.2024 08:59 ] The automatic reboot after executing the script is disabled
[10.01.2024 08:59 ] The task execution will stop if the script ends with a return code not zero
[10.01.2024 08:59 ] Parameter for "reboot_phone" are:
[10.01.2024 08:59 ] The current phone status is "3"
[10.01.2024 08:59 ] Will boot the phone using "adb"
[10.01.2024 08:59 ] The phone is already booted into the android

[10.01.2024 08:59 ] *** Installing the Magisk Module addbin-v1.3.1.0.zip ...
addbin-v1.3.1.0.zip: 1 file pushed, 0 skipped. 32.3 MB/s (90852099 bytes in 2.684s)
- Current boot slot: _a
- Device is system-as-root
**********************
 Additional Binaries
 by bnsmb01@gmail.com
**********************
*******************
 Powered by Magisk
*******************
- Extracting module files
The current envrironment for this installation is
The version of the installed Magisk is "26.4" (26400)
INFO: BOOTMODE is "true"
INFO: MODPATH is "/data/adb/modules_update/addbin"
INFO: TMPDIR is "/dev/tmp"
INFO: ZIPFILE is "/storage/emulated/0/Download/MagiskModules/addbin-v1.3.1.0.zip"
INFO: ARCH is "arm64"
INFO: IS64BIT is "true"
INFO: API is "34"
Installing the Magisk Module for the additional binaries version "1.0.0.0" ...
Checking the type of the CPU used in this device ....
The CPU in this device is a arm64 CPU
OK, the CPU is supported by this module
Copying the config files to /sdcard ...
Creating the config file "/sdcard/.viminfo" ...
Creating the config file "/sdcard/.aliases" ...
Creating the config file "/sdcard/.customrc" ...
Creating the config file "/sdcard/.bashrc" ...
- Done

[10.01.2024 09:01 ] *** Installing the Magisk Module Audio_Modification_Library-v4.2_57_-fix_for_Magisk_v26.zip ...
Audio_Modification_Library-v4.2_57_-fix_for_Magisk_v26.zip: 1 file pushed, 0 skipped. 114.7 MB/s (7925 bytes in 0.000s)
- Current boot slot: _a
- Device is system-as-root
*************************************************
 Audio Modification Library (fix for Magisk v26)
 by zackptg5, ahrion (zgfg)
*************************************************
*******************
 Powered by Magisk
*******************
- Extracting module files
 
  Mod detection and patching now happens at boot
  The boot script handles everything now
 
  Also note that disabled mods will be ignored!
 
- Done

[10.01.2024 09:01 ] *** Installing the Magisk Module bootctl-binary-v2.1.3.zip ...
bootctl-binary-v2.1.3.zip: 1 file pushed, 0 skipped. 506.0 MB/s (23026 bytes in 0.000s)
- Current boot slot: _a
- Device is system-as-root
*******************
 Bootctl Binary
 by Roee Hershberg
*******************
*******************
 Powered by Magisk
*******************
**************************************
*   MMT Extended by Zackptg5 @ XDA   *
**************************************
 
- Extracting module files
- Removing old files
- Installing
   Installing for arm64 SDK 34 device...
 
- Setting Permissions
- Done

[10.01.2024 09:01 ] *** Installing the Magisk Module btop_v1.2.13.zip ...
btop_v1.2.13.zip: 1 file pushed, 0 skipped. 56.2 MB/s (5900366 bytes in 0.100s)
- Current boot slot: _a
- Device is system-as-root
****************************************
 btop for Android
 by Author of btop: Jakob P. Liljenberg 
****************************************
*******************
 Powered by Magisk
*******************
- Extracting module files
The current environment for this installation is
The version of the installed Magisk is "26.4" (26400)
INFO: BOOTMODE is "true"
INFO: MODPATH is "/data/adb/modules_update/btop"
INFO: TMPDIR is "/dev/tmp"
INFO: ZIPFILE is "/storage/emulated/0/Download/MagiskModules/btop_v1.2.13.zip"
INFO: ARCH is "arm64"
INFO: IS64BIT is "true"
INFO: API is "34"
Installing the Magisk Module for the additional binaries version "1.0.0.0" ...
Checking the type of the CPU used in this device ....
The CPU in this device is a arm64 CPU
The machine type reported by "uname -m" is "aarch64"
[File copied]: /data/adb/modules_update/btop/bin/btop_arm64 to /data/adb/modules_update/btop/system/xbin/btop.bin
- Done

[10.01.2024 09:01 ] *** Installing the Magisk Module disable_fake_store.zip ...
disable_fake_store.zip: 1 file pushed, 0 skipped. 268.3 MB/s (9952 bytes in 0.000s)
- Current boot slot: _a
- Device is system-as-root
*********************************************************
 Disable the fake store installed in OmniROM with MicroG
 by bnsmb01@gmail.com
*********************************************************
*******************
 Powered by Magisk
*******************
- Extracting module files
- Done

[10.01.2024 09:01 ] *** Installing the Magisk Module magisk_ssh_v0.14.zip ...
magisk_ssh_v0.14.zip: 1 file pushed, 0 skipped. 34.9 MB/s (23306755 bytes in 0.637s)
- Current boot slot: _a
- Device is system-as-root
*******************************
      OpenSSH for Android     
*******************************
[0/7] Preparing module directory
[1/7] Extracting architecture unspecific module files
[2/7] Extracting libraries and binaries for arm64
[3/7] Configuring library path wrapper
[4/7] Recreating symlinks
[5/7] Creating SSH user directories
[6/7] Extracting sshd_config
[7/7] Cleaning up
- Setting permissions
- Done

[10.01.2024 09:01 ] *** Installing the Magisk Module microG-GApps.v0.2.28.231657.zip ...
microG-GApps.v0.2.28.231657.zip: 1 file pushed, 0 skipped. 32.4 MB/s (36869669 bytes in 1.086s)
- Current boot slot: _a
- Device is system-as-root
**************
 microG-GApps
 by Psk.It
**************
*******************
 Powered by Magisk
*******************
- Extracting module files
  ____________________________________________________
 |                                                    |
 |    Play Store settings...                          |
 |                                                    |
 |    downaloding microG Services Core...             |
 |                                                    |
 |    downloading microG Services Framework Proxy...  |
 |                                                    |
 |    Enjoy!                                          |
 |____________________________________________________|

- Done

[10.01.2024 09:02 ] *** Installing the Magisk Module Nano_for_Android_NDK-6_3-6300.zip ...
Nano_for_Android_NDK-6_3-6300.zip: 1 file pushed, 0 skipped. 494.0 MB/s (380554 bytes in 0.001s)
- Current boot slot: _a
- Device is system-as-root
*****************************
 Nano for Android NDK
 by osm0sis @ xda-developers
*****************************
*******************
 Powered by Magisk
*******************
Archive:  /storage/emulated/0/Download/MagiskModules/Nano_for_Android_NDK-6_3-6300.zip
  inflating: diffusion_config.sh
  inflating: module.prop
 
Mounting...
 
Extracting files...
Archive:  /storage/emulated/0/Download/MagiskModules/Nano_for_Android_NDK-6_3-6300.zip
  inflating: META-INF/com/google/android/updater-script
  inflating: META-INF/com/google/android/update-binary
  inflating: sbin/nano
  inflating: etc/terminfo/r/rxvt
  inflating: etc/terminfo/r/rxvt-basic
  inflating: etc/terminfo/h/hurd
  inflating: etc/terminfo/m/mach-bold
  inflating: etc/terminfo/m/mach-color
  inflating: etc/terminfo/m/mach
  inflating: etc/terminfo/v/vt100
  inflating: etc/terminfo/v/vt52
  inflating: etc/terminfo/v/vt220
  inflating: etc/terminfo/v/vt102
  inflating: etc/terminfo/E/Eterm-color
  inflating: etc/terminfo/E/Eterm
  inflating: etc/terminfo/x/xterm
  inflating: etc/terminfo/x/xterm-vt220
  inflating: etc/terminfo/x/xterm-r6
  inflating: etc/terminfo/x/xterm-color
  inflating: etc/terminfo/x/xterm-xfree86
  inflating: etc/terminfo/x/xterm-256color
  inflating: etc/terminfo/x/xterm-r5
  inflating: etc/terminfo/w/wsvt25
  inflating: etc/terminfo/w/wsvt25m
  inflating: etc/terminfo/d/dumb
  inflating: etc/terminfo/s/screen-256color
  inflating: etc/terminfo/s/screen-bce
  inflating: etc/terminfo/s/sun
  inflating: etc/terminfo/s/screen
  inflating: etc/terminfo/s/screen-w
  inflating: etc/terminfo/s/screen-s
  inflating: etc/terminfo/s/screen-256color-bce
  inflating: etc/terminfo/c/cygwin
  inflating: etc/terminfo/c/cons25
  inflating: etc/terminfo/p/pcansi
  inflating: etc/terminfo/a/ansi
  inflating: etc/terminfo/l/linux
  inflating: customize.sh
  inflating: update.json
  inflating: bin/nano
  inflating: bin/nano.bin
  inflating: README.md
  inflating: diffusion_config.sh
  inflating: module.prop
 
Installing...
 
Installing nano to /data/adb/modules_update/nano-ndk/system/bin ...
Installing terminfo to /data/adb/modules_update/nano-ndk/system/etc ...
 
Unmounting...
 
Done!

[10.01.2024 09:02 ] *** Installing the Magisk Module twrp-keep.zip ...
twrp-keep.zip: 1 file pushed, 0 skipped. 192.6 MB/s (6228 bytes in 0.000s)
- Current boot slot: _a
- Device is system-as-root
*****************************
 TWRP A/B Retention Script
 by osm0sis @ xda-developers
*****************************
*******************
 Powered by Magisk
*******************
- Unpacking boot_a image
- Image is signed with AVB 1.0
- Unrooting TWRP ramdisk
- Backing up TWRP ramdisk
- Unpacking boot_b image
- Image is signed with AVB 1.0
- Replacing ramdisk with TWRP backup
- Repacking boot image
- Done
 
*************************************************
 DO NOT REBOOT NOW - SEE README FOR INSTRUCTIONS
*************************************************

[10.01.2024 09:02 ] Summary:

[10.01.2024 09:02 ] 9 Magisk Module(s) successfully installed:

addbin-v1.3.1.0.zip
Audio_Modification_Library-v4.2_57_-fix_for_Magisk_v26.zip
bootctl-binary-v2.1.3.zip
btop_v1.2.13.zip
disable_fake_store.zip
magisk_ssh_v0.14.zip
microG-GApps.v0.2.28.231657.zip
Nano_for_Android_NDK-6_3-6300.zip
twrp-keep.zip
 ----------------------------------------------------------------------

[10.01.2024 09:02 ] Processing the task "enable_root_access_for_apps" with the parameter "reboot" ...
[10.01.2024 09:02 ] Executing now "enable_root_access_for_apps reboot"

 ----------------------------------------------------------------------
[10.01.2024 09:02 ]
[10.01.2024 09:02 ] *** Enabling root access for additional apps using the script "/data/develop/android/scripts_on_linux/init_magisk_db.sh" with the parameter "apps=+com.mixplorer,com.keramidas.TitaniumBackup,io.github.muntashirakon.AppManager,com.matoski.adbm,com.fox2code.mmm"  ...
[10.01.2024 09:02 ]
[10.01.2024 09:02 ] The automatic reboot after executing the script is enabled
[10.01.2024 09:02 ] The task execution will stop if the script ends with a return code not zero

[10.01.2024 09:02 ]  ----------------------------------------------------------------------

[10.01.2024 09:02 ] *** Executing now "/data/develop/android/scripts_on_linux/init_magisk_db.sh apps=+com.mixplorer,com.keramidas.TitaniumBackup,io.github.muntashirakon.AppManager,com.matoski.adbm,com.fox2code.mmm" ...
# ---------------------------------------------------------------------

init_magisk_db.sh version - v1.0.2.0 - shell script to enable root access via Magisk for specified apps

Using the TWRP helper script "/data/develop/android/scripts_on_linux/boot_phone_from_twrp.sh"
Using the Magisk helper script "/data/develop/android/scripts_on_linux/enable_root_access_via_magisk.sh"
The apps for which root access should be enabled are:
   com.android.shell com.mixplorer com.keramidas.TitaniumBackup io.github.muntashirakon.AppManager com.matoski.adbm com.fox2code.mmm
Apps that should be enabled are:  com.android.shell com.mixplorer com.keramidas.TitaniumBackup io.github.muntashirakon.AppManager com.matoski.adbm com.fox2code.mmm
UIDs that should be enabled are:
Found one more app names in the list of apps
Reading the helper script "boot_phone_from_twrp.sh" ...
The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ...
Will use the attached phone with the serial number "M6AIB760D0939LX"
Using the default TWRP image: "/data/backup/ASUS_ZENFONE8/twrp/current_twrp.img"
Using the options "-d -s M6AIB760D0939LX " for the adb commands
Using the options " -s M6AIB760D0939LX " for the fastboot commands
Checking the script prerequisites ...
Will wait up to 60 second(s) after booting the phone into the bootloader
Will wait up to 120 second(s) after booting the phone from the TWRP image
Will wait up to 30 second(s) until the adb daemon is ready to use
Retrieving the current status of the phone ...
The phone is currently booted into the Android OS
The boot slot is _a.
Retrieving the UIDs for the app names ...
Parameter for "reboot_phone" are:
The current phone status is "3"
Will boot the phone using "adb"
The phone is already booted into the android
Retrieving the UID for the app "com.android.shell" ...
The UID for the app "com.android.shell" is "2000"
Retrieving the UID for the app "com.mixplorer" ...
The UID for the app "com.mixplorer" is "10164"
Retrieving the UID for the app "com.keramidas.TitaniumBackup" ...
The UID for the app "com.keramidas.TitaniumBackup" is "10147"
Retrieving the UID for the app "io.github.muntashirakon.AppManager" ...
The UID for the app "io.github.muntashirakon.AppManager" is "10154"
Retrieving the UID for the app "com.matoski.adbm" ...
The UID for the app "com.matoski.adbm" is "10149"
Retrieving the UID for the app "com.fox2code.mmm" ...
The UID for the app "com.fox2code.mmm" is "10153"
Will enable the root access via Magisk for these UIDs:  2000 10164 10147 10154 10149 10153
The phone is booted into the Android OS
Booting the phone into the bootloader now ...
Waiting up to 60 seconds for the boot into the fastboot mode ...
The phone is booted into the bootloader
Booting the phone from the TWRP image "/data/backup/ASUS_ZENFONE8/twrp/current_twrp.img" now  ...
Sending 'boot.img' (98304 KB)                      OKAY [  2.814s]
Booting                                            OKAY [ 10.360s]
Finished. Total time: 13.214s
Waiting up to 120 seconds for a working adb connection .....
Waiting up to 30 seconds for the adb daemon to get ready 
... the adb daemon is ready after 0 second(s)

Waiting up to 20 seconds until /data is mounted ...

Testing if the data partition on the phone is encrypted ...
The test directory for the encryption test is "/data/media/0/Download"
The data partition on the phone is either not mounted or not encrypted
The phone is booted into TWRP version "3.7.0_12-0"
Copying the Magisk helper script "/data/develop/android/scripts_on_linux/enable_root_access_via_magisk.sh" to /cache/enable_root_access_via_magisk.sh on the phone ...
/data/develop/android/scripts_on_linux/enable_root_access_via_magisk.sh: 1 file pushed, 0 skipped. 190.8 MB/s (25307 bytes in 0.000s)
Executing the Magisk helper script "/cache/enable_root_access_via_magisk.sh" on the phone now ...

Enabling root access for apps by adding entries to the Magisk database

OK, running in TWRP
TWRP is booted from an image file
Using the Magisk binary "/data/adb/magisk/magisk64"
Using the Magisk database "/data/adb/magisk.db"
Checking the prerequisites ...
Checking if the required executables exist ...
OK, the file "/data/adb/magisk/magisk64" exists and is executable
The Magisk database file "/data/adb/magisk.db" already exists.
-rw------- 1 root root 40960 2024-01-10 07:53 /data/adb/magisk.db
Checking if the required data files exist ...
OK, the file "/data/adb/magisk.db" exists
Using the sqlite3 executable "/system/bin/sqlite3"
Checking the parameter ...
The parameter "2000" is okay
The parameter "10164" is okay
The parameter "10147" is okay
The parameter "10154" is okay
The parameter "10149" is okay
The parameter "10153" is okay
OK, all parameter are okay
OK, the installed Magisk version "26.4" is supported
Creating a backup of the existing Magisk database in "/data/adb/magisk.db.644.bkp" ...

Reading the current entries from the Magisk database ...
Current entries in the Magisk database table "policies":

uid   policy  until  logging  notification
----  ------  -----  -------  ------------
2000  2       0      1        1          

Enabling the root access for these app UIDs:  2000 10164 10147 10154 10149 10153

Processing the UID "2000" ...
The entry for the UID "2000" already exists in the Magisk database:
OK, root access is already enabled for the UID "2000"

Processing the UID "10164" ...
Enabling root access for the UID "10164" now ...

OK, root access successfully enabled for the UID "10164"

Processing the UID "10147" ...
Enabling root access for the UID "10147" now ...

OK, root access successfully enabled for the UID "10147"

Processing the UID "10154" ...
Enabling root access for the UID "10154" now ...

OK, root access successfully enabled for the UID "10154"

Processing the UID "10149" ...
Enabling root access for the UID "10149" now ...

OK, root access successfully enabled for the UID "10149"

Processing the UID "10153" ...
Enabling root access for the UID "10153" now ...

OK, root access successfully enabled for the UID "10153"

Summary

root access enabled for 5 UID(s):
   10164 10147 10154 10149 10153

root access was already enabled for 1 UID(s):
   2000

Current entries in the Magisk database table "policies":

uid    policy  until  logging  notification
-----  ------  -----  -------  ------------
2000   2       0      1        1          
10164  2       0      1        1          
10147  2       0      1        1          
10154  2       0      1        1          
10149  2       0      1        1          
10153  2       0      1        1          

root access for the UIDs via Magisk successfully enabled
Rebooting the phone now ...
Parameter for "reboot_phone" are:
The current phone status is "1"
Will boot the phone using "adb"
Rebooting the phone using the command " /usr/bin/adb -d -s M6AIB760D0939LX  reboot " now ...
Waiting up to 120 second(s) for the phone ......
Booting the phone into the Android OS succeeded after 30 seconds; the current status of the phone is 3
Waiting up to 20 seconds until /data is mounted ...

Testing if the data partition on the phone is encrypted ...
The test directory for the encryption test is "/sdcard/Download"
drwxrws--x 5 media_rw media_rw 3452 2024-01-10 08:51 /data/media/0/3bLNGDAAAAQwta9U10hpl8uNvaoq7Nsj
drwxrws--- 3 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/982i1CAAAAw4eBU1e8NaKH9Dldv4lnao
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/9S0OeBAAAAAb7Rjsq6h5Lz5xzg4AHP2J
-rw-rw---- 1 u0_a136  media_rw  578 2024-01-10 09:01 /data/media/0/9qmEsAAAAAwuuzD2L2y8kSVq74GpUWly
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/C1VoZAAAAAwyn6YE9,e1FbBjCJrazxFL
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/HHd9lDAAAAg9OjA8+hRMzMuwh8OXPoRQ
drwxrws--- 3 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/ThtwSDAAAAwwyTG94pGIKFhMgtPTYGXp
-rw-rw---- 1 u0_a136  media_rw 1062 2024-01-10 09:01 /data/media/0/W,6HVAAAAAw3au3MJpICFg,ZM7S03VSP
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/YnZkNBAAAAwesM+Z7qxGg8REj64hLl0U
-rw-rw---- 1 u0_a136  media_rw 3823 2024-01-10 09:01 /data/media/0/bl1IADAAAAg6Kxq5XwWwQxuj+ZAG+MfE
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/fX5R1BAAAAwSn+JS0xhLLGqfs,6YIDwd
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/nVY4JDAAAAgnMjvNJ9b,GcOkYiX1Z1cY
drwxrws--- 2 root     media_rw 3452 2024-01-10 08:52 /data/media/0/nyt6ACAAAAwSm3L49T8J6TjP1MQdR,1M
drwxrws--- 4 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/o,s61CAAAAwjtRpbUt9dn+ID2BKs9AMs
drwxrws--- 4 u0_a136  media_rw 3452 2024-01-10 08:59 /data/media/0/oubo1CAAAAA+VplIm,qX+cDM31aWGIAo
drwxrws--- 3 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/rE36RCAAAAQ72e+zDBrVkX2+a9j1w0k6
-rw-rw---- 1 u0_a136  media_rw    0 2024-01-10 09:01 /data/media/0/t+0NUDAAAAwgEG,ou3NkwGlr5OD4oB7U
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/y3VP4CAAAAAECnV7bV6PtyPBnt1ugXph
drwxrws--- 2 u0_a136  media_rw 3452 2024-01-10 08:51 /data/media/0/zrSWOCAAAAADiNwb+bnYBLSN40GqP+yf
The user password is not set - now using the default password from Android (default_password) to decrypt the files
The data partition on the phone is encrypted
twrp not found -- now decrypting the data partition on the phone using the Android command "input"
Waiting up to 15 seconds to complete the decrypting
.......
(Waited for 7 second(s))
Waiting up to 30 seconds for the adb daemon to get ready 
... the adb daemon is ready after 0 second(s)

Sucessfully decrypted the data partition

# ---------------------------------------------------------------------
[10.01.2024 09:04 ]  ... the script ended with RC=0
 ----------------------------------------------------------------------

[10.01.2024 09:04 ] Processing the task "execute_script_on_the_phone" with the parameter "ignorerc" ...
[10.01.2024 09:04 ] Executing now "execute_script_on_the_phone ignorerc"

 ----------------------------------------------------------------------
[10.01.2024 09:04 ]
[10.01.2024 09:04 ] *** Executing the script "/data/develop/android/scripts_on_linux/post_install.sh" on the phone  ...
[10.01.2024 09:04 ]
[10.01.2024 09:04 ] The Returncode of the script will be ignored
[10.01.2024 09:04 ] Waiting for a working adb connection ...
Waiting up to 120 seconds for a working adb connection
Waiting up to 30 seconds for the adb daemon to get ready 
[10.01.2024 09:04 ] ... the adb daemon is ready after 0.022 second(s)

[10.01.2024 09:04 ] Waiting up to 20 seconds until /data is mounted ...

[10.01.2024 09:04 ] Testing if the data partition on the phone is encrypted ...
[10.01.2024 09:04 ] The test directory for the encryption test is "/sdcard/Download"
[10.01.2024 09:04 ] The data partition on the phone is either not mounted or not encrypted

[10.01.2024 09:04 ] Copying the script "/data/develop/android/scripts_on_linux/post_install.sh" to "/sdcard/Download/post_install.sh" on the phone ...
/data/develop/android/scripts_on_linux/post_install.sh: 1 file pushed, 0 skipped. 67.3 MB/s (2080 bytes in 0.000s)
[10.01.2024 09:04 ] Now executing the script "/sdcard/Download/post_install.sh" on the phone ...

*** Postinstall script is running ...

Disabling sound effects ...
Enabling WiFi ...
Use SIM 1 for phone calls ...
Use SIM 1 for data connections ...
Disabling mobile data ...
Enable logcat for boot messages ...
Will now grant the permission "android.permission.POST_NOTIFICATIONS" for the Magisk App ...
Removing the directories system/priv-app/DocumentsUIGoogle and system/priv-app/DocumentsUI from the MiXplorer Magisk Module ...
Waiting 15 seconds now before rebooting - press CTRL-C to abort ....
...............
Now rebooting the phone ...
 ----------------------------------------------------------------------

[10.01.2024 09:04 ] "finish_tasks" is defined - now executing it ...
 ----------------------------------------------------------------------

-------------------------------------------------------------------------------------------------------------
[10.01.2024 09:04 ] *** Task summary :


-------------------------------------------------------------------------------------------------------------
[10.01.2024 09:04 ] Tasks executed successfully are:
enable_disable_abort_on_error
boot_phone_from_twrp_image
install_os
install_twrp
install_magisk_in_boot_partition_only
enable_adb
install_magisk_in_data_adb_only
wait_for_access_via_adb
enable_root_access_for_the_shell
wait_for_access_via_adb
install_magisk_v26_in_boot_partition
install_the_magisk_app
wait_for_access_via_adb
install_archive_file
enable_disable_abort_on_error
install_essential_scripts
execute_script_on_the_phone
install_essential_apps
install_essential_magisk_modules
enable_root_access_for_apps
execute_script_on_the_phone

-------------------------------------------------------------------------------------------------------------

[10.01.2024 09:04 ] The working directory used is: "/tmp/prepare_phone.sh_WORKDIR.767094" .


[10.01.2024 09:04 ] The include file used was :
[10.01.2024 09:04 ]   -rwxr-xr-x. 1 xtrnaw7 xtrnaw7 335189 Dec 23 12:12 /data/develop/android/scripts_on_linux/prepare_phone.include
[10.01.2024 09:04 ] The include file used was last edited at: "23.12.2023 /bs"
 ----------------------------------------------------------------------

[10.01.2024 09:04 ] Execution summary:

[10.01.2024 09:04 ] Tasks processed:               21 
[10.01.2024 09:04 ] Tasks executed succesfully:    21
[10.01.2024 09:04 ] Tasks executed with errors:    0
[10.01.2024 09:04 ] Tasks not executed on request: 0
[10.01.2024 09:04 ] Tasks not found:               0

[10.01.2024 09:04 ] ### The logfile used was /var/tmp/prepare_phone.sh.log
[10.01.2024 09:04 ] ### The start time was 10.01.2024 08:46:07, the script runtime is (day:hour:minute:seconds) 0:00:18:40 (= 1120 seconds)
[10.01.2024 09:04 ] ### prepare_phone.sh ended at 10.01.2024 09:04:47 (The PID of this process is 767094; the RC is 0)