[05.05.2024 17:21 ] ### prepare_phone.sh started at 05.05.2024 17:21:28 (The PID of this process is 542501) [05.05.2024 17:21 ] ### Processing the parameter ... [05.05.2024 17:21 ] Not yet used parameter are: "all_sideload" [05.05.2024 17:21 ] Tasks to execute are: "all_sideload" [05.05.2024 17:21 ] Parameter for the function init_tasks are: "" [05.05.2024 17:21 ] ### The logfile used is /var/tmp/prepare_phone.sh.log [05.05.2024 17:21 ] Checking the include file "/data/develop/android/scripts_on_linux/prepare_phone.include" ... [05.05.2024 17:21 ] Reading the include file "/data/develop/android/scripts_on_linux/prepare_phone.include" ... [05.05.2024 17:21 ] Processing the parameter ... [05.05.2024 17:21 ] Preparing the list of tasks to execute ... [05.05.2024 17:21 ] "init_tasks" is defined - now executing it ... ---------------------------------------------------------------------- [05.05.2024 17:21 ] Searching for a config file .... [05.05.2024 17:21 ] Config file "prepare_phone.conf" succesfully read [05.05.2024 17:21 ] Using the directory "/tmp" for temporary files [05.05.2024 17:21 ] The PID of this process is 542501 [05.05.2024 17:21 ] The include file used is : -rw-r--r--. 1 xtrnaw7 xtrnaw7 487189 May 5 17:00 /data/develop/android/scripts_on_linux/prepare_phone.include [05.05.2024 17:21 ] The include file used was last edited at: "05.05.2024 /bs" [05.05.2024 17:21 ] The version of the used execute_tasks.sh script is "v2.3.0" ----------------------------------------------------------------------- [05.05.2024 17:21 ] Using the TWRP image "/data/backup/ASUS_ZENFONE8/twrp/current_twrp.img" for booting the phone into TWRP [05.05.2024 17:21 ] Using the working directory "/tmp/prepare_phone.sh_WORKDIR.542501" . [05.05.2024 17:21 ] *** Reading the include file "/data/develop/android/scripts_on_linux/boot_phone_from_twrp.sh" ... [05.05.2024 17:21 ] The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ... [05.05.2024 17:21 ] Will use the attached phone with the serial number "M6AIB760D0939LX" [05.05.2024 17:21 ] Using the TWRP image defined in the environment variable TWRP_IMAGE: "/data/backup/ASUS_ZENFONE8/twrp/current_twrp.img" [05.05.2024 17:21 ] Using the options "-d -s M6AIB760D0939LX " for the adb commands [05.05.2024 17:21 ] Using the options " -s M6AIB760D0939LX " for the fastboot commands [05.05.2024 17:21 ] Checking the script prerequisites ... [05.05.2024 17:21 ] Will wait up to 60 second(s) after booting the phone into the bootloader [05.05.2024 17:21 ] Will wait up to 120 second(s) after booting the phone from the TWRP image [05.05.2024 17:21 ] Will wait up to 30 second(s) until the adb daemon is ready to use [05.05.2024 17:21 ] The phone is currently booted into the Android OS [05.05.2024 17:21 ] Selecting the TWRP image to use depending on the installed OS on the phone ... [05.05.2024 17:21 ] Checking the installed OS on the phone ... [05.05.2024 17:21 ] The OS on the phone is the ASUS Android 13 [05.05.2024 17:21 ] Checking the type of the file "/data1/backup/ASUS_ZENFONE8/twrp/twrp-3.7.0_12-1-I006D-enhanced.img" ... [05.05.2024 17:21 ] The file type is "Android bootimg, kernel (0x2d52a0b)" [05.05.2024 17:21 ] OK, the file "/data1/backup/ASUS_ZENFONE8/twrp/twrp-3.7.0_12-1-I006D-enhanced.img" is a valid boot image for Android devices [05.05.2024 17:21 ] The installed OS is "ASUS_Android" [05.05.2024 17:21 ] The TWRP file necessary for this OS is "/data1/backup/ASUS_ZENFONE8/twrp/twrp-3.7.0_12-1-I006D-enhanced.img" [05.05.2024 17:21 ] The boot slot is _b. ---------------------------------------------------------------------- [05.05.2024 17:21 ] Executing the tasks now ... [05.05.2024 17:21 ] The tasks to execute are: Task 1: enable_disable_abort_on_error enable Task 2: select_twrp_image ignorerc Task 3: boot_phone_from_twrp_image Task 4: install_os noreboot:sideload:factory_reset:restart_as_root Task 5: select_twrp_image_for_install_image Task 6: boot_phone_from_twrp_image force Task 7: backup_boot_partition active Task 8: install_magisk_in_boot_partition_only noreboot:active Task 9: enable_adb reboot:active Task 10: execute_script_on_the_phone ignorerc:pre_install.sh Task 11: select_twrp_image ignorerc Task 12: install_magisk_in_data_adb_only noreboot:copy_apk:use_apk Task 13: wait_for_access_via_adb 120:kill Task 14: enable_root_access_for_the_shell reboot Task 15: wait_for_access_via_adb 120:kill Task 16: install_magisk_v26_in_boot_partition active:reboot Task 17: install_the_magisk_app Task 18: wait_for_access_via_adb 120:kill Task 19: install_archive_file twrp:reboot:script=/cache/correct_setlinux_for_wifconifg.sh Task 20: enable_disable_abort_on_error disable Task 21: install_essential_scripts Task 22: execute_script_on_the_phone ignorerc:/data/develop/android/scripts_on_linux/enable_wlan.sh Task 23: install_essential_apps /data/backup/Android/Essential_Apps_for_ASUS_Android Task 24: install_essential_magisk_modules ignorerc Task 25: enable_root_access_for_apps reboot Task 26: execute_script_on_the_phone ignorerc [05.05.2024 17:21 ] The remaining tasks will be executed in single step mode after a task ends with an error [05.05.2024 17:21 ] Processing the task "enable_disable_abort_on_error" with the parameter "enable" ... [05.05.2024 17:21 ] Executing now "enable_disable_abort_on_error enable" ---------------------------------------------------------------------- [05.05.2024 17:21 ] Setting the variable "ABORT_TASK_EXECUTION_ON_ERROR" to "0" .. ---------------------------------------------------------------------- [05.05.2024 17:21 ] Processing the task "select_twrp_image" with the parameter "ignorerc" ... [05.05.2024 17:21 ] Executing now "select_twrp_image ignorerc" ---------------------------------------------------------------------- [05.05.2024 17:21 ] [05.05.2024 17:21 ] *** Selecting the TWRP image to use depending on the installed OS on the phone ... [05.05.2024 17:21 ] [05.05.2024 17:21 ] The phone is currently booted into the Android OS [05.05.2024 17:21 ] Selecting the TWRP image to use depending on the installed OS on the phone ... [05.05.2024 17:21 ] Checking the installed OS on the phone ... [05.05.2024 17:21 ] The OS on the phone is the ASUS Android 13 [05.05.2024 17:21 ] Checking the type of the file "/data1/backup/ASUS_ZENFONE8/twrp/twrp-3.7.0_12-1-I006D-enhanced.img" ... [05.05.2024 17:21 ] The file type is "Android bootimg, kernel (0x2d52a0b)" [05.05.2024 17:21 ] OK, the file "/data1/backup/ASUS_ZENFONE8/twrp/twrp-3.7.0_12-1-I006D-enhanced.img" is a valid boot image for Android devices [05.05.2024 17:21 ] The installed OS is "ASUS_Android" [05.05.2024 17:21 ] The TWRP file necessary for this OS is "/data1/backup/ASUS_ZENFONE8/twrp/twrp-3.7.0_12-1-I006D-enhanced.img" [05.05.2024 17:21 ] The boot slot is _b. ---------------------------------------------------------------------- [05.05.2024 17:21 ] Processing the task "boot_phone_from_twrp_image" ... [05.05.2024 17:21 ] Executing now "boot_phone_from_twrp_image " ---------------------------------------------------------------------- [05.05.2024 17:21 ] [05.05.2024 17:21 ] *** Booting the attached phone from the TWRP image "/data1/backup/ASUS_ZENFONE8/twrp/twrp-3.7.0_12-1-I006D-enhanced.img" ... [05.05.2024 17:21 ] [05.05.2024 17:21 ] The task execution stops if the script ends with a return code not zero [05.05.2024 17:21 ] The phone is booted into the Android OS [05.05.2024 17:21 ] Booting the phone into the bootloader now ... [05.05.2024 17:21 ] Waiting up to 60 seconds for the boot into the fastboot mode ... [05.05.2024 17:21 ] The phone is booted into the bootloader [05.05.2024 17:21 ] Booting the phone from the TWRP image "/data1/backup/ASUS_ZENFONE8/twrp/twrp-3.7.0_12-1-I006D-enhanced.img" now ... Sending 'boot.img' (98304 KB) OKAY [ 2.785s] Booting OKAY [ 10.391s] Finished. Total time: 13.232s Waiting up to 120 seconds for a working adb connection ..... [05.05.2024 17:22 ] The adb connection is working after 25 second(s) Waiting up to 30 seconds for the adb daemon to get ready [05.05.2024 17:22 ] ... the adb daemon is ready after 0 second(s) [05.05.2024 17:22 ] The adb connection is ready after 0 second(s) [05.05.2024 17:22 ] Waiting up to 20 seconds until /data is mounted ... [05.05.2024 17:22 ] /data is mounted after 0 second(s). [05.05.2024 17:22 ] /data/media not found - /data is not yet initialized [05.05.2024 17:22 ] The phone is booted into TWRP version "3.7.0_12-1" ---------------------------------------------------------------------- [05.05.2024 17:22 ] Processing the task "install_os" with the parameter "noreboot:sideload:factory_reset:restart_as_root" ... [05.05.2024 17:22 ] Executing now "install_os noreboot sideload factory_reset restart_as_root" ---------------------------------------------------------------------- [05.05.2024 17:22 ] [05.05.2024 17:22 ] *** Installing the Android OS using the image "/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip" using the script "/data/develop/android/scripts_on_linux/install_os_via_twrp.sh" with the parameter " sideload factory_reset restart_as_root /data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip" ... [05.05.2024 17:22 ] [05.05.2024 17:22 ] The automatic reboot after executing the script is disabled [05.05.2024 17:22 ] The task execution stops if the script ends with a return code not zero [05.05.2024 17:22 ] ---------------------------------------------------------------------- [05.05.2024 17:22 ] *** Executing now "/data/develop/android/scripts_on_linux/install_os_via_twrp.sh sideload factory_reset restart_as_root /data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip" ... # --------------------------------------------------------------------- install_os_via_twrp.sh version - v2.1.1.0 - install an OS image via the TWRP command twrp Checking the contents of the file "/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip" ... Using the TWRP helper script "/data/develop/android/scripts_on_linux/boot_phone_from_twrp.sh" The OS image to install is: "/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip" Reading the helper script "boot_phone_from_twrp.sh" ... The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ... Will use the attached phone with the serial number "M6AIB760D0939LX" Using the TWRP image defined in the environment variable TWRP_IMAGE: "/data1/backup/ASUS_ZENFONE8/twrp/twrp-3.7.0_12-1-I006D-enhanced.img" Using the options "-d -s M6AIB760D0939LX " for the adb commands Using the options " -s M6AIB760D0939LX " for the fastboot commands Checking the script prerequisites ... Will wait up to 60 second(s) after booting the phone into the bootloader Will wait up to 120 second(s) after booting the phone from the TWRP image Will wait up to 30 second(s) until the adb daemon is ready to use Retrieving the current status of the phone ... The phone is currently booted from a TWRP image The boot slot is _b. The phone is booted from a TWRP image The phone is booted into TWRP version "3.7.0_12-1" Waiting up to 30 seconds for the adb daemon to get ready ... the adb daemon is ready after 0 second(s) The adb connection is ready after 0 second(s) /data is mounted to "/dev/block/dm-5" -- will umount it now ... Unmounted '/data' Done processing script file Umounting /data sucesfully done. Formating /data ... ++ /usr/bin/adb -d -s M6AIB760D0939LX shell -tt twrp format data real 0m1.805s user 0m0.001s sys 0m0.002s Done. You may need to reboot recovery to be able to use /data again. TWRP will not recreate /data/media on an FBE device. Please reboot into your rom to create /data/media Formatting Metadata using mke2fs... Done. Done processing script file Formating the data partition sucesfully done. Formating the metadata partition ... ++ /usr/bin/adb -d -s M6AIB760D0939LX shell umount /dev/block/by-name/metadata umount: /dev/block/sda22: Invalid argument ++ /usr/bin/adb -d -s M6AIB760D0939LX shell mke2fs -F -t ext4 /dev/block/by-name/metadata mke2fs 1.45.4 (23-Sep-2019) Discarding device blocks: done Creating filesystem with 4096 4k blocks and 4096 inodes Allocating group tables: 0/1 done Writing inode tables: 0/1 done Creating journal (1024 blocks): done Writing superblocks and filesystem accounting information: 0/1 done Formating the metadata partition sucesfully done. Waiting up to 10 seconds for a working adb connection The adb connection is working after 0 second(s) Installing the OS image file "/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip" via the "sideload" functionality from TWRP into the slot "_a" ... Starting sideload on the phone .. + /usr/bin/adb -d -s M6AIB760D0939LX shell twrp sideload The RC is 0 [2024.05.05 17:22:28] Waiting now 5 seconds ... ..... The phone is booted into the adb sideload mode The phone is NOT booted into the Android OS - can not detect which OS is installed on the phone Now sideloading the image file "/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip" ... + /usr/bin/adb -d -s M6AIB760D0939LX sideload /data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~0%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~1%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~2%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~3%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~4%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~5%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~6%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~7%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~8%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~9%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~10%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~11%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~12%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~13%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~14%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~15%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~16%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~17%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~18%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~19%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~20%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~21%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~22%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~23%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~24%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~25%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~26%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~27%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~28%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~29%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~30%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~31%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~32%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~33%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~34%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~35%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~36%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~37%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~38%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~39%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~40%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~41%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~42%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~43%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~44%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~45%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~46%) serving: '/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip' (~47%) Total xfer: 1.00x The RC is 0 Installing the image via "twrp sideload" took 173 seconds(s) Finishing the sideload mode now ... + /usr/bin/adb -d -s M6AIB760D0939LX reboot Waiting up to 60 seconds for a working adb connection . The adb connection is working after 5 second(s) The phone is currently booted from a TWRP image The boot slot is _b. Now changing the next active slot to _a ... + /usr/bin/adb -d -s M6AIB760D0939LX shell bootctl set-active-boot-slot 0 The RC is 0 ... successfully changed the active slot for the next reboot Automatically rebooting the phone is disabled # --------------------------------------------------------------------- [05.05.2024 17:25 ] ... the script ended with RC=0 ---------------------------------------------------------------------- [05.05.2024 17:25 ] Processing the task "select_twrp_image_for_install_image" ... [05.05.2024 17:25 ] Executing now "select_twrp_image_for_install_image " ---------------------------------------------------------------------- [05.05.2024 17:25 ] [05.05.2024 17:25 ] *** Selecting the TWRP image to use based for the OS installed using the image file "/data/backup/ASUS_ZENFONE8/e/e-1.21-t-20240325389105-dev-sake.zip" ... [05.05.2024 17:25 ] [05.05.2024 17:25 ] This seems to be a /e/ installation image [05.05.2024 17:25 ] The TWRP image to be used for the OS installed with the image file "e-1.21-t-20240325389105-dev-sake.zip" is "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" [05.05.2024 17:25 ] The task execution stops if the script ends with a return code not zero ---------------------------------------------------------------------- [05.05.2024 17:25 ] Processing the task "boot_phone_from_twrp_image" with the parameter "force" ... [05.05.2024 17:25 ] Executing now "boot_phone_from_twrp_image force" ---------------------------------------------------------------------- [05.05.2024 17:25 ] [05.05.2024 17:25 ] *** Booting the attached phone from the TWRP image "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" ... [05.05.2024 17:25 ] [05.05.2024 17:25 ] The task execution stops if the script ends with a return code not zero [05.05.2024 17:25 ] The phone is booted from a TWRP image [05.05.2024 17:25 ] Rebooting the phone from the TWRP image requested via parameter [05.05.2024 17:25 ] Booting the phone into the bootloader now ... [05.05.2024 17:25 ] Waiting up to 60 seconds for the boot into the fastboot mode ... [05.05.2024 17:25 ] The phone is booted into the bootloader [05.05.2024 17:25 ] Booting the phone from the TWRP image "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" now ... Sending 'boot.img' (98304 KB) OKAY [ 2.812s] Booting OKAY [ 10.369s] Finished. Total time: 13.232s Waiting up to 120 seconds for a working adb connection ...... [05.05.2024 17:26 ] The adb connection is working after 30 second(s) Waiting up to 30 seconds for the adb daemon to get ready [05.05.2024 17:26 ] ... the adb daemon is ready after 0 second(s) [05.05.2024 17:26 ] The adb connection is ready after 0 second(s) [05.05.2024 17:26 ] Waiting up to 20 seconds until /data is mounted ... [05.05.2024 17:26 ] /data is mounted after 0 second(s). [05.05.2024 17:26 ] /data/media not found - /data is not yet initialized [05.05.2024 17:26 ] The phone is booted into TWRP version "3.7.0_12-1" ---------------------------------------------------------------------- [05.05.2024 17:26 ] Processing the task "backup_boot_partition" with the parameter "active" ... [05.05.2024 17:26 ] Executing now "backup_boot_partition active" ---------------------------------------------------------------------- [05.05.2024 17:26 ] Imagefile not defined in the parameter -- using the default image file [05.05.2024 17:26 ] [05.05.2024 17:26 ] *** Creating a backup of a boot partition ... [05.05.2024 17:26 ] [05.05.2024 17:26 ] The automatic reboot after executing the task is disabled [05.05.2024 17:26 ] The task execution stops if the script ends with a return code not zero [05.05.2024 17:26 ] The phone is currently booted from a TWRP image [05.05.2024 17:26 ] The boot slot is _a. [05.05.2024 17:26 ] Creating an image file of the partition "boot_a" in the file "/data/recovery/initial_boot_a.img" on the phone [05.05.2024 17:26 ] Retrieving the current status of the phone ... [05.05.2024 17:26 ] The phone is booted from a recovery or TWRP image with root access [05.05.2024 17:26 ] Creating a backup of the partition "/dev/block/by-name/boot_a" into the file "/data/recovery/initial_boot_a.img" on the phone ... 196608+0 records in 196608+0 records out 100663296 bytes (96 M) copied, 0.246584 s, 389 M/s [05.05.2024 17:26 ] .. image file "/data/recovery/initial_boot_a.img" successfully created [05.05.2024 17:26 ] Creating the check sum of the boot partition "/dev/block/by-name/boot_a" ... 807582107 100663296 /dev/block/by-name/boot_a [05.05.2024 17:26 ] Creating the check sum of the image file "/data/recovery/initial_boot_a.img" .... 807582107 100663296 /data/recovery/initial_boot_a.img [05.05.2024 17:26 ] OK, the check sum for the partition "/dev/block/by-name/boot_a" is equal to the check sum for the image file "/data/recovery/initial_boot_a.img" [05.05.2024 17:26 ] Rebooting the phone was NOT requested via task parameter ---------------------------------------------------------------------- [05.05.2024 17:26 ] Processing the task "install_magisk_in_boot_partition_only" with the parameter "noreboot:active" ... [05.05.2024 17:26 ] Executing now "install_magisk_in_boot_partition_only noreboot active" ---------------------------------------------------------------------- [05.05.2024 17:26 ] The slot to use for this task is "active" [05.05.2024 17:26 ] [05.05.2024 17:26 ] *** Installing Magisk using the apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" into the boot partition using the script "/data/develop/android/scripts_on_linux/install_magisk_via_twrp.sh" with the parameter "active copy_apk delete_adb_dir magisk_apk_file=/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" ... [05.05.2024 17:26 ] [05.05.2024 17:26 ] The automatic reboot after executing the script is disabled [05.05.2024 17:26 ] The task execution stops if the script ends with a return code not zero [05.05.2024 17:26 ] ---------------------------------------------------------------------- [05.05.2024 17:26 ] *** Executing now "/data/develop/android/scripts_on_linux/install_magisk_via_twrp.sh active copy_apk delete_adb_dir magisk_apk_file=/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" ... # --------------------------------------------------------------------- install_magisk_via_twrp.sh version - v3.1.3.3 - add Magisk to the boot partition of a phone running Android using TWRP Parameter "copy_apk" found: Will copy the Magisk apk file to the phone if neccessary Parameter "delete_adb_dir" found: All files and directories created by this script in the directory "/data/adb" will be deleted at script end. Parameter "magisk_apk_file=file" found : Will use the Magisk apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" Using the TWRP image found in the parameter: "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" Checking the script prerequisites ... Will wait 10 second(s) before starting the script on the phone The Magisk version used is v25.x or older Using the temporary directory "/data/MagiskInst" on the phone The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ... Will patch the boot partition on the attached phone with the serial number "M6AIB760D0939LX" Using the options "-d -s M6AIB760D0939LX " for the adb commands Using the options " -s M6AIB760D0939LX " for the fastboot commands Checking for a connected phone booted into fastboot mode ... No attached phone in fastboot mode found Checking for an attached phone with working access via adb (USB) ... Linux localhost 5.4.233-qgki-perf-g9797389ec560 #1 SMP PREEMPT Mon Mar 25 22:15:46 UTC 2024 aarch64 ... found a phone connected via USB with working adb access The phone is already booted from a TWRP image: "twrp_I006D" version "3.7.0_12-1" Retrieving the current boot slot from the phone ... The current boot slot is "_a" The boot slot to patch is "_a" The boot partition to patch is "boot_a" Copying the Magisk apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" to the phone into the directory "/data" ... /data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk: 1 file pushed, 0 skipped. 49.6 MB/s (11278270 bytes in 0.217s) Creating the temporary directory "/data/MagiskInst" with the Magisk files necessarry to install Magisk into the boot partition ... Creating the script file "/tmp/init_magisk_dirs.sh" to create the directory "/data/MagiskInst" on the phone ... Creating the directory "/data/MagiskInst" on the phone ... Copying the temporary script file "/tmp/init_magisk_dirs.sh" to the file "/data/MagiskInst/create_temporary_magisk_dir.sh" on the phone ... /tmp/init_magisk_dirs.sh: 1 file pushed, 0 skipped. 185.4 MB/s (7716 bytes in 0.000s) Executing the script "/data/MagiskInst/create_temporary_magisk_dir.sh" on the phone ... ------------------------------------------------------------------------------ + adb -d -s M6AIB760D0939LX shell /data/MagiskInst/create_temporary_magisk_dir.sh /data/MagiskInst '' Searching for an installed Magisk app .... ls: /data/app/*/com.topjohnwu.magisk*/base.apk: No such file or directory Searching for a Magisk apk file in the directory /sdcard/Download ... ls: /sdcard/Download/Magisk*apk: No such file or directory Searching for a Magisk apk file in the directdory /data ... Found the apk file "/data/Magisk-v25.2.apk" Using the directory "/data/MagiskInst/bin" for the Magisk Binaries Creating the files in the directory "/data/MagiskInst/bin" using the files for the CPU "arm64-v8a" from the apk file "/data/Magisk-v25.2.apk" ... Unpacking the apk file "/data/Magisk-v25.2.apk" into the directory "/data/MagiskInst/magisk_apk_contents.613" ... Delete all existing files in the directory "/data/MagiskInst/bin" ... total 0 total 0 Copying the files to "/data/MagiskInst/bin" ... + mv ./assets/util_functions.sh /data/MagiskInst/bin + mv ./assets/chromeos /data/MagiskInst/bin/ + mv ./assets/boot_patch.sh /data/MagiskInst/bin + mv ./assets/addon.d.sh /data/MagiskInst/bin + '[' -r ./assets/stub.apk ']' + cd ./lib/arm64-v8a + mv libbusybox.so /data/MagiskInst/bin/busybox + mv libmagisk64.so /data/MagiskInst/bin/magisk64 + mv libmagiskboot.so /data/MagiskInst/bin/magiskboot + mv libmagiskinit.so /data/MagiskInst/bin/magiskinit + mv libmagiskpolicy.so /data/MagiskInst/bin/magiskpolicy + cd ../.. + file=libmagisk32.so + '[' arm64-v8ax '=' arm64-v8ax -a -r ./lib/armeabi-v7a/libmagisk32.so ']' + mv ./lib/armeabi-v7a/libmagisk32.so /data/MagiskInst/bin/magisk32 + set +x + TEMPRC=0 + set +x ------------------------------------------------------------------------------ ... "/data/MagiskInst/create_temporary_magisk_dir.sh" successfully executed Checking if the Magisk patch script "boot_patch.sh" exists on the phone .... -rwxr-xr-x 1 root root 5987 2024-05-05 15:26 /data/MagiskInst/bin/boot_patch.sh Checking if the download directory "/sdcard/Download" exists on the phone .... ls: /sdcard/Download: No such file or directory WARNING: Directory "/sdcard/Download" not found on the phone . Checking if the download directory "/tmp" exists on the phone .... /tmp Creating the boot image file "/tmp/boot_a.545094.img" from the partition "/dev/block/by-name/boot_a" ... 196608+0 records in 196608+0 records out 100663296 bytes (96 M) copied, 0.163454 s, 587 M/s Checking the result ... -rw-rw-rw- 1 root root 100663296 2024-05-05 15:26 /tmp/boot_a.545094.img The check sums are: The check sum of the boot partition "/dev/block/by-name/boot_a" on the phone is "807582107" The check sum of th boot image file on the phone is "/tmp/boot_a.545094.img" is "807582107" Installing Magisk into the boot partition using the old method ... Patching the boot image file "/tmp/boot_a.545094.img" ... Waiting now 10 second(s) ... - Unpacking boot image Parsing boot image: [/tmp/boot_a.545094.img] HEADER_VER [4] KERNEL_SZ [39909888] RAMDISK_SZ [1663236] OS_VERSION [13.0.0] OS_PATCH_LEVEL [2024-02] PAGESIZE [4096] CMDLINE [] KERNEL_FMT [raw] RAMDISK_FMT [lz4_legacy] VBMETA - Checking ramdisk status Loading cpio: [ramdisk.cpio] - Stock boot image detected - Patching ramdisk Loading cpio: [ramdisk.cpio] Add entry [init] (0750) Create directory [overlay.d] (0750) Create directory [overlay.d/sbin] (0750) Add entry [overlay.d/sbin/magisk32.xz] (0644) Add entry [overlay.d/sbin/magisk64.xz] (0644) Patch with flag KEEPVERITY=[false] KEEPFORCEENCRYPT=[false] Loading cpio: [ramdisk.cpio.orig] Backup mismatch entry: [init] -> [.backup/init] Record new entry: [overlay.d] -> [.backup/.rmlist] Record new entry: [overlay.d/sbin] -> [.backup/.rmlist] Record new entry: [overlay.d/sbin/magisk32.xz] -> [.backup/.rmlist] Record new entry: [overlay.d/sbin/magisk64.xz] -> [.backup/.rmlist] Create directory [.backup] (0000) Add entry [.backup/.magisk] (0000) Dump cpio: [ramdisk.cpio] - Repacking boot image Parsing boot image: [/tmp/boot_a.545094.img] HEADER_VER [4] KERNEL_SZ [39909888] RAMDISK_SZ [1663236] OS_VERSION [13.0.0] OS_PATCH_LEVEL [2024-02] PAGESIZE [4096] CMDLINE [] KERNEL_FMT [raw] RAMDISK_FMT [lz4_legacy] VBMETA Repack to boot image: [new-boot.img] HEADER_VER [4] KERNEL_SZ [39909888] RAMDISK_SZ [2147946] OS_VERSION [13.0.0] OS_PATCH_LEVEL [2024-02] PAGESIZE [4096] CMDLINE [] Checking the result ... -rw-r--r-- 1 root root 100663296 2024-05-05 15:26 /data/MagiskInst/bin/new-boot.img The patched boot image is "/tmp/patched_boot_a.545094.img" Waiting now 10 second(s) ... Patching the partition "/dev/block/by-name/boot_a" from the patched boot image file "/tmp/patched_boot_a.545094.img" via dd ... 196608+0 records in 196608+0 records out 100663296 bytes (96 M) copied, 4.130612 s, 23 M/s Checking the result .... The check sums for the images and devices on the phone are: 807582107 100663296 /tmp/boot_a.545094.img 3263586564 100663296 /tmp/patched_boot_a.545094.img 3263586564 100663296 /dev/block/by-name/boot_a OK, patching the boot partition "/dev/block/by-name/boot_a" was successfull Deleting all used files and directories in the directory /data ... Automatically rebooting the phone is disabled # --------------------------------------------------------------------- [05.05.2024 17:27 ] ... the script ended with RC=0 ---------------------------------------------------------------------- [05.05.2024 17:27 ] Processing the task "enable_adb" with the parameter "reboot:active" ... [05.05.2024 17:27 ] Executing now "enable_adb reboot active" ---------------------------------------------------------------------- _a[05.05.2024 17:27 ] [05.05.2024 17:27 ] *** Enabling access via adb using the script "/data/develop/android/scripts_on_linux/enable_access_via_adb.sh" with the parameter " _a" ... [05.05.2024 17:27 ] [05.05.2024 17:27 ] The automatic reboot after executing the script is enabled [05.05.2024 17:27 ] The task execution stops if the script ends with a return code not zero [05.05.2024 17:27 ] The phone is currently booted from a TWRP image [05.05.2024 17:27 ] The boot slot is _a. [05.05.2024 17:27 ] ---------------------------------------------------------------------- [05.05.2024 17:27 ] *** Executing now "/data/develop/android/scripts_on_linux/enable_access_via_adb.sh _a" ... # --------------------------------------------------------------------- enable_access_via_adb.sh version - v1.3.0.0 - shell script to enable adb access via an init .rc file configured via Magisk Using the TWRP helper script "/data/develop/android/scripts_on_linux/boot_phone_from_twrp.sh" Using the Magisk helper script "/data/develop/android/scripts_on_linux/enable_adb_using_magisk.sh" Reading the helper script "boot_phone_from_twrp.sh" ... The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ... Will use the attached phone with the serial number "M6AIB760D0939LX" Using the TWRP image defined in the environment variable TWRP_IMAGE: "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" Using the options "-d -s M6AIB760D0939LX " for the adb commands Using the options " -s M6AIB760D0939LX " for the fastboot commands Checking the script prerequisites ... Will wait up to 60 second(s) after booting the phone into the bootloader Will wait up to 120 second(s) after booting the phone from the TWRP image Will wait up to 30 second(s) until the adb daemon is ready to use Checking which user startd the adb daemon ... ERROR: The adb daemon (PID=488285) was started by the user "root" but the user running this script is "xtrnaw7" - most probably the pubkeys for these user are different and enabling access via adb using the script will NOT work Retrieving the current status of the phone ... The phone is currently booted from a TWRP image The boot slot is _a. Copying the public ssl key for access via adb "/data/develop/android/adb.pubkey" to "/tmp/adbkey.pub" on the phone ... Copying the file "/data/develop/android/adb.pubkey" to "/tmp/adbkey.pub" the phone ... /data/develop/android/adb.pubkey: 1 file pushed, 0 skipped. 72.6 MB/s (2156 bytes in 0.000s) Copying the Magisk helper script "/data/develop/android/scripts_on_linux/enable_adb_using_magisk.sh" to "/tmp/enable_adb_using_magisk.sh" on the phone ... /data/develop/android/scripts_on_linux/enable_adb_using_magisk.sh: 1 file pushed, 0 skipped. 199.9 MB/s (19692 bytes in 0.000s) Executing the temporary script "/tmp/enable_adb_using_magisk.sh _a" on the phone ... The directory /data/cache does not exist -- will now create it ... chcon '/data/cache' to u:object_r:cache_file:s0 The working directory "/data/recovery/work" does not exist -- will now create it ... chcon '/data/recovery/work' to u:object_r:system_data_file:s0 Reading the public ssl key for the access via adb from the file "/tmp/adbkey.pub" ... Creating the script to enable access via adb "/data/recovery/enable_adb_via_service.sh" ... chcon '/data/recovery/enable_adb_via_service.sh' to u:object_r:system_data_file:s0 Doing a syntax check for the script "/data/recovery/enable_adb_via_service.sh" ... Creating the RC file with the additional trigger to enable access via adb "/data/recovery/work/enable_adb_via_service.rc" ... Copying the partition "/dev/block/by-name/boot_a" into the file "boot_a.img" ... 196608+0 records in 196608+0 records out 100663296 bytes (96 M) copied, 0.245059 s, 392 M/s Successfully created the script "/data/recovery/work/restore_boot_partition.sh" to restore the boot partition Extracting the ramdisk from the file "boot_a.img" ... Parsing boot image: [boot_a.img] HEADER_VER [4] KERNEL_SZ [39909888] RAMDISK_SZ [2147946] OS_VERSION [13.0.0] OS_PATCH_LEVEL [2024-02] PAGESIZE [4096] CMDLINE [] KERNEL_FMT [raw] RAMDISK_FMT [lz4_legacy] VBMETA Adding the new RC file "/data/recovery/work/enable_adb_via_service.rc" to the ramdisk ... Loading cpio: [ramdisk.cpio] Create directory [overlay.d] (0700) Add entry [overlay.d/init.custom.rc] (0700) Dump cpio: [ramdisk.cpio] Recreating the boot image file "boot_a.img" ... Parsing boot image: [boot_a.img] HEADER_VER [4] KERNEL_SZ [39909888] RAMDISK_SZ [2147946] OS_VERSION [13.0.0] OS_PATCH_LEVEL [2024-02] PAGESIZE [4096] CMDLINE [] KERNEL_FMT [raw] RAMDISK_FMT [lz4_legacy] VBMETA Repack to boot image: [boot_a_new.img] HEADER_VER [4] KERNEL_SZ [39909888] RAMDISK_SZ [2148369] OS_VERSION [13.0.0] OS_PATCH_LEVEL [2024-02] PAGESIZE [4096] CMDLINE [] Patching the new image file "boot_a_new.img" to the boot partition /dev/block/by-name/boot_a ... 196608+0 records in 196608+0 records out 100663296 bytes (96 M) copied, 3.728580 s, 26 M/s adb access will now be enabled by Magisk while doing the next reboot Automatically rebooting the phone is disabled # --------------------------------------------------------------------- [05.05.2024 17:27 ] ... the script ended with RC=0 [05.05.2024 17:27 ] *** Rebooting the phone now .... [05.05.2024 17:27 ] Parameter for "reboot_phone" are: wait [05.05.2024 17:27 ] The current phone status is "1" [05.05.2024 17:27 ] Will boot the phone using "adb" [05.05.2024 17:27 ] Rebooting the phone using the command " /usr/bin/adb -d -s M6AIB760D0939LX reboot " now ... Waiting up to 120 second(s) for the phone .............. [05.05.2024 17:28 ] Booting the phone into the Android OS succeeded after 70 seconds; the current status of the phone is 3 [05.05.2024 17:28 ] Waiting up to 20 seconds until /data is mounted ... [05.05.2024 17:28 ] /data is mounted after 0 second(s). [05.05.2024 17:28 ] Testing if the data partition on the phone is encrypted ... [05.05.2024 17:28 ] The test directory for the encryption test is "/sdcard/Download" [05.05.2024 17:28 ] The data partition on the phone is either not mounted or not encrypted [05.05.2024 17:28 ] Retrieving the UID from the shell ... [05.05.2024 17:28 ] The UID for the shell is "2000" ---------------------------------------------------------------------- [05.05.2024 17:28 ] Processing the task "execute_script_on_the_phone" with the parameter "ignorerc:pre_install.sh" ... [05.05.2024 17:28 ] Executing now "execute_script_on_the_phone ignorerc pre_install.sh" ---------------------------------------------------------------------- [05.05.2024 17:28 ] [05.05.2024 17:28 ] *** Executing the script "/data/develop/android/scripts_on_linux/pre_install.sh" on the phone ... [05.05.2024 17:28 ] [05.05.2024 17:28 ] The Returncode of the script is ignored [05.05.2024 17:28 ] Waiting for a working adb connection ... Waiting up to 120 seconds for a working adb connection [05.05.2024 17:28 ] The adb connection is working after 0 second(s) Waiting up to 30 seconds for the adb daemon to get ready [05.05.2024 17:28 ] ... the adb daemon is ready after 0 second(s) [05.05.2024 17:28 ] The adb connection is ready after 0 second(s) [05.05.2024 17:28 ] Waiting up to 20 seconds until /data is mounted ... [05.05.2024 17:28 ] /data is mounted after 0 second(s). [05.05.2024 17:28 ] Testing if the data partition on the phone is encrypted ... [05.05.2024 17:28 ] The test directory for the encryption test is "/sdcard/Download" [05.05.2024 17:28 ] The data partition on the phone is either not mounted or not encrypted [05.05.2024 17:28 ] Copying the script "/data/develop/android/scripts_on_linux/pre_install.sh" to "/sdcard/Download/pre_install.sh" on the phone ... /data/develop/android/scripts_on_linux/pre_install.sh: 1 file pushed, 0 skipped. 17.8 MB/s (1191 bytes in 0.000s) [05.05.2024 17:28 ] Now executing the script "/sdcard/Download/pre_install.sh" on the phone ... Disabling the setup dialog .. Configuring initial settings for the LineageOS ... ---------------------------------------------------------------------- [05.05.2024 17:28 ] Processing the task "select_twrp_image" with the parameter "ignorerc" ... [05.05.2024 17:28 ] Executing now "select_twrp_image ignorerc" ---------------------------------------------------------------------- [05.05.2024 17:28 ] [05.05.2024 17:28 ] *** Selecting the TWRP image to use depending on the installed OS on the phone ... [05.05.2024 17:28 ] [05.05.2024 17:28 ] The phone is currently booted into the Android OS [05.05.2024 17:28 ] Selecting the TWRP image to use depending on the installed OS on the phone ... [05.05.2024 17:28 ] Checking the installed OS on the phone ... [05.05.2024 17:28 ] The OS on the phone is the /e/ (Android 13) [05.05.2024 17:28 ] Checking the type of the file "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" ... [05.05.2024 17:28 ] The file type is "Android bootimg, kernel (0x3421539), ramdisk (0x630)" [05.05.2024 17:28 ] OK, the file "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" is a valid boot image for Android devices [05.05.2024 17:28 ] The installed OS is "/e/" [05.05.2024 17:28 ] The TWRP file necessary for this OS is "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" [05.05.2024 17:28 ] The boot slot is _a. ---------------------------------------------------------------------- [05.05.2024 17:28 ] Processing the task "install_magisk_in_data_adb_only" with the parameter "noreboot:copy_apk:use_apk" ... [05.05.2024 17:28 ] Executing now "install_magisk_in_data_adb_only noreboot copy_apk use_apk" ---------------------------------------------------------------------- [05.05.2024 17:28 ] [05.05.2024 17:28 ] *** Installing the Magisk directories and files in /data/adb from the apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" using the script "/data/develop/android/scripts_on_linux/install_magisk_via_twrp.sh" with the parameter " adb_only copy_apk use_apk magisk_apk_file=/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" ... [05.05.2024 17:28 ] [05.05.2024 17:28 ] The automatic reboot after executing the script is disabled [05.05.2024 17:28 ] The task execution stops if the script ends with a return code not zero [05.05.2024 17:28 ] ---------------------------------------------------------------------- [05.05.2024 17:28 ] *** Executing now "/data/develop/android/scripts_on_linux/install_magisk_via_twrp.sh adb_only copy_apk use_apk magisk_apk_file=/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" ... # --------------------------------------------------------------------- install_magisk_via_twrp.sh version - v3.1.3.3 - add Magisk to the boot partition of a phone running Android using TWRP Parameter "adb_only" found: Will only install the directories and files in the directory "/data/adb" Parameter "copy_apk" found: Will copy the Magisk apk file to the phone if neccessary Parameter "use_apk" found: Will use the files from the apk file even if the files in /data/adb/magisk exist Parameter "magisk_apk_file=file" found : Will use the Magisk apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" Using the TWRP image found in the parameter: "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" Checking the script prerequisites ... Will wait 10 second(s) before starting the script on the phone The Magisk version used is v25.x or older Using the temporary directory "/data/MagiskInst" on the phone The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ... Will patch the boot partition on the attached phone with the serial number "M6AIB760D0939LX" Using the options "-d -s M6AIB760D0939LX " for the adb commands Using the options " -s M6AIB760D0939LX " for the fastboot commands Checking for a connected phone booted into fastboot mode ... No attached phone in fastboot mode found Checking for an attached phone with working access via adb (USB) ... Linux localhost 5.4.233-qgki-perf-g9797389ec560 #1 SMP PREEMPT Mon Mar 25 22:15:46 UTC 2024 aarch64 Toybox ... found a phone connected via USB with working adb access The phone is booted in normal mode The installed OS is based on Android 13 (Mon Mar 25 22:03:23 UTC 2024); the description for the distribution is "e_sake-user 13 TQ3A.230901.001 eng.root.20240325.220445 dev-keys" WARNING: Can not detect the version of the installed Magisk Booting the phone into the fastboot mode now ... Waiting up to 60 seconds for the boot into the fastboot mode ... The phone is booted into the fastboot mode after 12 second(s) Booting the phone from the TWRP image "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" now ... Sending 'boot.img' (98304 KB) OKAY [ 2.808s] Booting OKAY [ 10.361s] Finished. Total time: 13.224s Waiting up to 60 second(s) for the boot of the phone ..... ... ro.build.version.release is "99.87.36" The adb connection is working after 25 second(s) Retrieving the current boot slot from the phone ... The current boot slot is "_a" The boot slot to patch is "_a" The boot partition to patch is "boot_a" Copying the Magisk apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk" to the phone into the directory "/data" ... /data/backup/Android/EssentialApps_Backup/Magisk-v25.2.apk: 1 file pushed, 0 skipped. 50.5 MB/s (11278270 bytes in 0.213s) Creating the temporary directory "/data/MagiskInst" with the Magisk files necessarry to install Magisk into the boot partition ... Creating the script file "/tmp/init_magisk_dirs.sh" to create the directory "/data/MagiskInst" on the phone ... Creating the directory "/data/MagiskInst" on the phone ... Copying the temporary script file "/tmp/init_magisk_dirs.sh" to the file "/data/MagiskInst/create_temporary_magisk_dir.sh" on the phone ... /tmp/init_magisk_dirs.sh: 1 file pushed, 0 skipped. 197.9 MB/s (7716 bytes in 0.000s) Executing the script "/data/MagiskInst/create_temporary_magisk_dir.sh" on the phone ... ------------------------------------------------------------------------------ + adb -d -s M6AIB760D0939LX shell /data/MagiskInst/create_temporary_magisk_dir.sh /data/MagiskInst /data/Magisk-v25.2.apk Magisk is not yet installed Using the directory "/data/MagiskInst/bin" for the Magisk Binaries Creating the files in the directory "/data/MagiskInst/bin" using the files for the CPU "arm64-v8a" from the apk file "/data/Magisk-v25.2.apk" ... Unpacking the apk file "/data/Magisk-v25.2.apk" into the directory "/data/MagiskInst/magisk_apk_contents.602" ... Delete all existing files in the directory "/data/MagiskInst/bin" ... total 0 total 0 Copying the files to "/data/MagiskInst/bin" ... + mv ./assets/util_functions.sh /data/MagiskInst/bin + mv ./assets/chromeos /data/MagiskInst/bin/ + mv ./assets/boot_patch.sh /data/MagiskInst/bin + mv ./assets/addon.d.sh /data/MagiskInst/bin + '[' -r ./assets/stub.apk ']' + cd ./lib/arm64-v8a + mv libbusybox.so /data/MagiskInst/bin/busybox + mv libmagisk64.so /data/MagiskInst/bin/magisk64 + mv libmagiskboot.so /data/MagiskInst/bin/magiskboot + mv libmagiskinit.so /data/MagiskInst/bin/magiskinit + mv libmagiskpolicy.so /data/MagiskInst/bin/magiskpolicy + cd ../.. + file=libmagisk32.so + '[' arm64-v8ax '=' arm64-v8ax -a -r ./lib/armeabi-v7a/libmagisk32.so ']' + mv ./lib/armeabi-v7a/libmagisk32.so /data/MagiskInst/bin/magisk32 + set +x + TEMPRC=0 + set +x ------------------------------------------------------------------------------ ... "/data/MagiskInst/create_temporary_magisk_dir.sh" successfully executed chcon '/data/adb/magisk' to u:object_r:system_file:s0 chcon '/data/adb/magisk/util_functions.sh' to u:object_r:system_file:s0 chcon '/data/adb/magisk/chromeos' to u:object_r:system_file:s0 chcon '/data/adb/magisk/chromeos/kernel_data_key.vbprivk' to u:object_r:system_file:s0 chcon '/data/adb/magisk/chromeos/kernel.keyblock' to u:object_r:system_file:s0 chcon '/data/adb/magisk/chromeos/futility' to u:object_r:system_file:s0 chcon '/data/adb/magisk/boot_patch.sh' to u:object_r:system_file:s0 chcon '/data/adb/magisk/addon.d.sh' to u:object_r:system_file:s0 chcon '/data/adb/magisk/busybox' to u:object_r:system_file:s0 chcon '/data/adb/magisk/magisk64' to u:object_r:system_file:s0 chcon '/data/adb/magisk/magiskboot' to u:object_r:system_file:s0 chcon '/data/adb/magisk/magiskinit' to u:object_r:system_file:s0 chcon '/data/adb/magisk/magiskpolicy' to u:object_r:system_file:s0 chcon '/data/adb/magisk/magisk32' to u:object_r:system_file:s0 chcon '/data/adb/modules' to u:object_r:system_file:s0 chcon '/data/adb/post-fs-data.d' to u:object_r:adb_data_file:s0 chcon '/data/adb/service.d' to u:object_r:adb_data_file:s0 Automatically rebooting the phone is disabled # --------------------------------------------------------------------- [05.05.2024 17:29 ] ... the script ended with RC=0 ---------------------------------------------------------------------- [05.05.2024 17:29 ] Processing the task "wait_for_access_via_adb" with the parameter "120:kill" ... [05.05.2024 17:29 ] Executing now "wait_for_access_via_adb 120 kill" ---------------------------------------------------------------------- [05.05.2024 17:29 ] The phone is currently booted from a TWRP image [05.05.2024 17:29 ] The boot slot is _a. [05.05.2024 17:29 ] adb access to the phone is working ---------------------------------------------------------------------- [05.05.2024 17:29 ] Processing the task "enable_root_access_for_the_shell" with the parameter "reboot" ... [05.05.2024 17:29 ] Executing now "enable_root_access_for_the_shell reboot" ---------------------------------------------------------------------- [05.05.2024 17:29 ] [05.05.2024 17:29 ] *** Enabling root access for shell in Magisk using the script "/data/develop/android/scripts_on_linux/init_magisk_db.sh" with the parameter " apps=2000" ... [05.05.2024 17:29 ] [05.05.2024 17:29 ] The automatic reboot after executing the script is enabled [05.05.2024 17:29 ] The task execution stops if the script ends with a return code not zero [05.05.2024 17:29 ] ---------------------------------------------------------------------- [05.05.2024 17:29 ] *** Executing now "/data/develop/android/scripts_on_linux/init_magisk_db.sh apps=2000" ... # --------------------------------------------------------------------- init_magisk_db.sh version - v1.0.3.0 - shell script to enable root access via Magisk for specified apps Using the TWRP helper script "/data/develop/android/scripts_on_linux/boot_phone_from_twrp.sh" Using the Magisk helper script "/data/develop/android/scripts_on_linux/enable_root_access_via_magisk.sh" The apps for which root access should be enabled are: 2000 Apps that should be enabled are: UIDs that should be enabled are: 2000 Reading the helper script "boot_phone_from_twrp.sh" ... The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ... Will use the attached phone with the serial number "M6AIB760D0939LX" Using the TWRP image defined in the environment variable TWRP_IMAGE: "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" Using the options "-d -s M6AIB760D0939LX " for the adb commands Using the options " -s M6AIB760D0939LX " for the fastboot commands Checking the script prerequisites ... Will wait up to 60 second(s) after booting the phone into the bootloader Will wait up to 120 second(s) after booting the phone from the TWRP image Will wait up to 30 second(s) until the adb daemon is ready to use Retrieving the current status of the phone ... The phone is currently booted from a TWRP image The boot slot is _a. Will enable the root access via Magisk for these UIDs: 2000 The phone is booted from a TWRP image The phone is booted into TWRP version "3.7.0_12-1" Copying the Magisk helper script "/data/develop/android/scripts_on_linux/enable_root_access_via_magisk.sh" to /cache/enable_root_access_via_magisk.sh on the phone ... /data/develop/android/scripts_on_linux/enable_root_access_via_magisk.sh: 1 file pushed, 0 skipped. 545.5 MB/s (25391 bytes in 0.000s) Executing the Magisk helper script "/cache/enable_root_access_via_magisk.sh" on the phone now ... Enabling root access for apps by adding entries to the Magisk database OK, running in TWRP TWRP is booted from an image file Using the Magisk binary "/data/adb/magisk/magisk64" Using the Magisk database "/data/adb/magisk.db" Checking the prerequisites ... Checking if the required executables exist ... OK, the file "/data/adb/magisk/magisk64" exists and is executable The Magisk database does not yet exist Checking if the Magisk daemon is running ... No daemon is currently running! The Magisk daemon is not running -- will start it now ... 25.2:MAGISK:R Successfully started the Magisk daemon Creating the database "/data/adb/magisk.db" using "/data/adb/magisk/magisk64" ... user_version=12 Successfully created the Magisk database "/data/adb/magisk.db" : -rw------- 1 root root 40960 2024-05-05 15:29 /data/adb/magisk.db Stopping the Magisk daemon now No daemon is currently running! Checking if the required data files exist ... OK, the file "/data/adb/magisk.db" exists Using the sqlite3 executable "/system/bin/sqlite3" Checking the parameter ... The parameter "2000" is okay OK, all parameter are okay OK, the installed Magisk version "25.2" is supported Creating a backup of the existing Magisk database in "/data/adb/magisk.db.676.bkp" ... Reading the current entries from the Magisk database ... Current entries in the Magisk database table "policies": Enabling the root access for these app UIDs: 2000 Processing the UID "2000" ... Enabling root access for the UID "2000" now ... OK, root access successfully enabled for the UID "2000" Summary root access enabled for 1 UID(s): 2000 Current entries in the Magisk database table "policies": uid policy until logging notification ---- ------ ----- ------- ------------ 2000 2 0 1 1 root access for the UIDs via Magisk successfully enabled Rebooting the phone now ... Parameter for "reboot_phone" are: The current phone status is "1" Will boot the phone using "adb" Rebooting the phone using the command " /usr/bin/adb -d -s M6AIB760D0939LX reboot " now ... Waiting up to 120 second(s) for the phone ..... Booting the phone into the Android OS succeeded after 25 seconds; the current status of the phone is 3 Waiting up to 20 seconds until /data is mounted ... /data is mounted after 0 second(s). Testing if the data partition on the phone is encrypted ... The test directory for the encryption test is "/sdcard/Download" drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/+dt9UDAAAAw,ZI0J3R5lB2aM0YqzhQq2 drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/,p93kCAAAAgC+HXVg1eNE3wc2Vz6SDDv drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/3kII+DAAAAQ8Qe,u2n5a1I9ntkQqv4la drwxrws--- 3 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/92AyhCAAAAQsjdhsk6krrXWId7RrMgjc drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/ApexsAAAAAwM5E0LE54,fIg7wXLKjncn drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/CwHtXDAAAAgzMb9ysJnnq4iBaX5cMdtA drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/GcWaNDAAAAwp,ozUEPvKOIWdgRBMvPAU drwxrws--- 2 root media_rw 3452 2024-05-05 17:29 /data/media/0/HeYOnDAAAAwld+tGXa09dPgYNmcHrWP2 drwxrws--- 3 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/Ir9o5AAAAAQ8B,uilMShj3qL3BiQjAVJ drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/KD09uBAAAAgaIqujtgmO6bIyxZuZG697 drwxrws--x 5 media_rw media_rw 3452 2024-05-05 17:28 /data/media/0/daT5oDAAAAAQkX03CUdamKDqvrmHOY86 drwxrws--- 3 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/dx59NCAAAAgTvrXQFL63Wo7OTz4GwvgU drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/lNe+VDAAAAAYC7+U4e2EgOcYy0i0jVCj drwxrws--- 4 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/pT67pBAAAAwYsuGMFq0W0ZA7GPJjLUis drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/uIkBsDAAAAQIJw9HLD8VlSVbfIgUDxjd The user password is not set - now using the default password from Android (default_password) to decrypt the files The data partition on the phone is encrypted twrp not found -- now decrypting the data partition on the phone using the Android command "input" Waiting up to 150 seconds to complete the decrypting ..... (Waited for 5 second(s)) Waiting up to 30 seconds for the adb daemon to get ready ... the adb daemon is ready after 0 second(s) The adb connection is ready after 0 second(s) Sucessfully decrypted the data partition # --------------------------------------------------------------------- [05.05.2024 17:30 ] ... the script ended with RC=0 ---------------------------------------------------------------------- [05.05.2024 17:30 ] Processing the task "wait_for_access_via_adb" with the parameter "120:kill" ... [05.05.2024 17:30 ] Executing now "wait_for_access_via_adb 120 kill" ---------------------------------------------------------------------- [05.05.2024 17:30 ] The phone is currently booted into the Android OS [05.05.2024 17:30 ] Selecting the TWRP image to use depending on the installed OS on the phone ... [05.05.2024 17:30 ] Checking the installed OS on the phone ... [05.05.2024 17:30 ] The OS on the phone is the /e/ (Android 13) [05.05.2024 17:30 ] Checking the type of the file "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" ... [05.05.2024 17:30 ] The file type is "Android bootimg, kernel (0x3421539), ramdisk (0x630)" [05.05.2024 17:30 ] OK, the file "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" is a valid boot image for Android devices [05.05.2024 17:30 ] The installed OS is "/e/" [05.05.2024 17:30 ] The TWRP file necessary for this OS is "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" [05.05.2024 17:30 ] The boot slot is _a. [05.05.2024 17:30 ] adb access to the phone is working ---------------------------------------------------------------------- [05.05.2024 17:30 ] Processing the task "install_magisk_v26_in_boot_partition" with the parameter "active:reboot" ... [05.05.2024 17:30 ] Executing now "install_magisk_v26_in_boot_partition active reboot" ---------------------------------------------------------------------- [05.05.2024 17:30 ] The slot to use for this task is "active" [05.05.2024 17:30 ] [05.05.2024 17:30 ] *** Installing Magisk using the apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk" into the boot partition using the script "/data/develop/android/scripts_on_linux/install_magisk_via_twrp.sh" with the parameter "active copy_apk use_apk magisk_apk_file=/data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk" ... [05.05.2024 17:30 ] [05.05.2024 17:30 ] The automatic reboot after executing the script is enabled [05.05.2024 17:30 ] The task execution stops if the script ends with a return code not zero [05.05.2024 17:30 ] ---------------------------------------------------------------------- [05.05.2024 17:30 ] *** Executing now "/data/develop/android/scripts_on_linux/install_magisk_via_twrp.sh active copy_apk use_apk magisk_apk_file=/data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk" ... # --------------------------------------------------------------------- install_magisk_via_twrp.sh version - v3.1.3.3 - add Magisk to the boot partition of a phone running Android using TWRP Parameter "copy_apk" found: Will copy the Magisk apk file to the phone if neccessary Parameter "use_apk" found: Will use the files from the apk file even if the files in /data/adb/magisk exist Parameter "magisk_apk_file=file" found : Will use the Magisk apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk" Using the TWRP image found in the parameter: "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" Checking the script prerequisites ... Will wait 10 second(s) before starting the script on the phone The Magisk version used is v26.0 or newer Using the temporary directory "/data/local/tmp/MagiskInst" on the phone The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ... Will patch the boot partition on the attached phone with the serial number "M6AIB760D0939LX" Using the options "-d -s M6AIB760D0939LX " for the adb commands Using the options " -s M6AIB760D0939LX " for the fastboot commands Checking for a connected phone booted into fastboot mode ... No attached phone in fastboot mode found Checking for an attached phone with working access via adb (USB) ... Linux localhost 5.4.233-qgki-perf-g9797389ec560 #1 SMP PREEMPT Mon Mar 25 22:15:46 UTC 2024 aarch64 Toybox ... found a phone connected via USB with working adb access The phone is booted in normal mode The installed OS is based on Android 13 (Mon Mar 25 22:03:23 UTC 2024); the description for the distribution is "e_sake-user 13 TQ3A.230901.001 eng.root.20240325.220445 dev-keys" The installed version of Magisk is com.topjohnwu.magisk versionCode 1 Booting the phone into the fastboot mode now ... Waiting up to 60 seconds for the boot into the fastboot mode ... The phone is booted into the fastboot mode after 10 second(s) Booting the phone from the TWRP image "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" now ... Sending 'boot.img' (98304 KB) OKAY [ 2.826s] Booting OKAY [ 10.359s] Finished. Total time: 13.238s Waiting up to 60 second(s) for the boot of the phone ..... ... ro.build.version.release is "99.87.36" The adb connection is working after 25 second(s) Retrieving the current boot slot from the phone ... The current boot slot is "_a" The boot slot to patch is "_a" The boot partition to patch is "boot_a" Copying the Magisk apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk" to the phone into the directory "/data" ... /data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk: 1 file pushed, 0 skipped. 52.2 MB/s (12498796 bytes in 0.228s) Creating the temporary directory "/data/local/tmp/MagiskInst" with the Magisk files necessarry to install Magisk into the boot partition ... Creating the script file "/tmp/init_magisk_dirs.sh" to create the directory "/data/local/tmp/MagiskInst" on the phone ... Creating the directory "/data/local/tmp/MagiskInst" on the phone ... Copying the temporary script file "/tmp/init_magisk_dirs.sh" to the file "/data/local/tmp/MagiskInst/create_temporary_magisk_dir.sh" on the phone ... /tmp/init_magisk_dirs.sh: 1 file pushed, 0 skipped. 147.4 MB/s (7716 bytes in 0.000s) Executing the script "/data/local/tmp/MagiskInst/create_temporary_magisk_dir.sh" on the phone ... ------------------------------------------------------------------------------ + adb -d -s M6AIB760D0939LX shell /data/local/tmp/MagiskInst/create_temporary_magisk_dir.sh /data/local/tmp/MagiskInst /data/Magisk-v27.0.apk Magisk is not yet installed Using the directory "/data/local/tmp/MagiskInst/bin" for the Magisk Binaries Creating the files in the directory "/data/local/tmp/MagiskInst/bin" using the files for the CPU "arm64-v8a" from the apk file "/data/Magisk-v27.0.apk" ... Unpacking the apk file "/data/Magisk-v27.0.apk" into the directory "/data/local/tmp/MagiskInst/magisk_apk_contents.602" ... Delete all existing files in the directory "/data/local/tmp/MagiskInst/bin" ... total 0 total 0 Copying the files to "/data/local/tmp/MagiskInst/bin" ... + mv ./assets/util_functions.sh /data/local/tmp/MagiskInst/bin + mv ./assets/chromeos /data/local/tmp/MagiskInst/bin/ + mv ./assets/boot_patch.sh /data/local/tmp/MagiskInst/bin + mv ./assets/addon.d.sh /data/local/tmp/MagiskInst/bin + '[' -r ./assets/stub.apk ']' + mv ./assets/stub.apk /data/local/tmp/MagiskInst/bin + cd ./lib/arm64-v8a + mv libbusybox.so /data/local/tmp/MagiskInst/bin/busybox + mv libmagisk64.so /data/local/tmp/MagiskInst/bin/magisk64 + mv libmagiskboot.so /data/local/tmp/MagiskInst/bin/magiskboot + mv libmagiskinit.so /data/local/tmp/MagiskInst/bin/magiskinit + mv libmagiskpolicy.so /data/local/tmp/MagiskInst/bin/magiskpolicy + cd ../.. + file=libmagisk32.so + '[' arm64-v8ax '=' arm64-v8ax -a -r ./lib/armeabi-v7a/libmagisk32.so ']' + mv ./lib/armeabi-v7a/libmagisk32.so /data/local/tmp/MagiskInst/bin/magisk32 + set +x + TEMPRC=0 + set +x ------------------------------------------------------------------------------ ... "/data/local/tmp/MagiskInst/create_temporary_magisk_dir.sh" successfully executed Checking if the Magisk patch script "boot_patch.sh" exists on the phone .... -rwxr-xr-x 1 root root 7078 2024-05-05 15:31 /data/local/tmp/MagiskInst/bin/boot_patch.sh Checking if the download directory "/sdcard/Download" exists on the phone .... /sdcard/Download Creating the boot image file "/sdcard/Download/boot_a.546982.img" from the partition "/dev/block/by-name/boot_a" ... 196608+0 records in 196608+0 records out 100663296 bytes (96 M) copied, 0.251004 s, 382 M/s Checking the result ... -rw-rw---- 1 root media_rw 100663296 2024-05-05 15:31 /sdcard/Download/boot_a.546982.img The check sums are: The check sum of the boot partition "/dev/block/by-name/boot_a" on the phone is "1594622860" The check sum of th boot image file on the phone is "/sdcard/Download/boot_a.546982.img" is "1594622860" Installing Magisk into the boot partition using the new method ... Patching the boot image file "/sdcard/Download/boot_a.546982.img" ... Preparing the directory with the temporary Magisk installation files for usage by the user with the UID 2000 (this is the user "shell") ... + adb -d -s M6AIB760D0939LX shell chown -R 2000:2000 /data/local/tmp/MagiskInst + adb -d -s M6AIB760D0939LX shell chmod -R 755 /data/local/tmp/MagiskInst + adb -d -s M6AIB760D0939LX shell chown -R 2000:2000 /sdcard/Download/boot_a.546982.img + adb -d -s M6AIB760D0939LX shell chmod o+r /sdcard/Download/boot_a.546982.img + set +x Copying the file "/sdcard/Download/boot_a.546982.img" to the local PC now "/tmp/boot_a.546982.img" ... /sdcard/Download/boot_a.546982.img: 1 file pulled, 0 skipped. 42.7 MB/s (100663296 bytes in 2.250s) Rebooting the phone into the Android OS now ... Waiting up to 60 second(s) for the boot of the phone ..... ... ro.build.version.release is "13" The adb connection is working after 25 second(s) The phone is now booted into the Android OS. Using the patch script "/data/local/tmp/MagiskInst/bin/boot_patch.sh" ... Waiting up to 240 seconds for /data to get mounted and decrypted ............ .. /data is mounted and decrypted after 8 second(s) Checking if the file "/sdcard/Download/boot_a.546982.img" exists on the phone ... - - Unpacking boot image Parsing boot image: [/sdcard/Download/boot_a.546982.img] HEADER_VER [4] KERNEL_SZ [39909888] RAMDISK_SZ [2148369] OS_VERSION [13.0.0] OS_PATCH_LEVEL [2024-02] PAGESIZE [4096] CMDLINE [] KERNEL_FMT [raw] RAMDISK_FMT [lz4_legacy] unexpected ASN.1 DER tag: expected SEQUENCE, got APPLICATION [1] (primitive) VBMETA - Checking ramdisk status Loading cpio: [ramdisk.cpio] - Magisk patched boot image detected Loading cpio: [ramdisk.cpio] Extracting entry [.backup/.magisk] to [config.orig] Restore [.backup/init] -> [init] Removed entry [.backup] Removed entry [overlay.d] Removed entry [overlay.d/sbin] Removed entry [overlay.d/sbin/magisk32.xz] Removed entry [overlay.d/sbin/magisk64.xz] Dumping cpio: [ramdisk.cpio] - Patching ramdisk - Pre-init storage partition: metadata Loading cpio: [ramdisk.cpio] Add file [init] (100750) Create directory [overlay.d] (0750) Create directory [overlay.d/sbin] (0750) Add file [overlay.d/sbin/magisk32.xz] (100644) Add file [overlay.d/sbin/magisk64.xz] (100644) Add file [overlay.d/sbin/stub.xz] (100644) Patch with flag KEEPVERITY=[false] KEEPFORCEENCRYPT=[false] Loading cpio: [ramdisk.cpio.orig] Backup [init] -> [.backup/init.xz] Record new entry: [overlay.d] -> [.backup/.rmlist] Record new entry: [overlay.d/sbin] -> [.backup/.rmlist] Record new entry: [overlay.d/sbin/magisk32.xz] -> [.backup/.rmlist] Record new entry: [overlay.d/sbin/magisk64.xz] -> [.backup/.rmlist] Record new entry: [overlay.d/sbin/stub.xz] -> [.backup/.rmlist] Create directory [.backup] (0000) Add file [.backup/.magisk] (100000) Dumping cpio: [ramdisk.cpio] - Repacking boot image Parsing boot image: [/sdcard/Download/boot_a.546982.img] HEADER_VER [4] KERNEL_SZ [39909888] RAMDISK_SZ [2148369] OS_VERSION [13.0.0] OS_PATCH_LEVEL [2024-02] PAGESIZE [4096] CMDLINE [] KERNEL_FMT [raw] RAMDISK_FMT [lz4_legacy] unexpected ASN.1 DER tag: expected SEQUENCE, got APPLICATION [1] (primitive) VBMETA Repack to boot image: [new-boot.img] HEADER_VER [4] KERNEL_SZ [39909888] RAMDISK_SZ [1673545] OS_VERSION [13.0.0] OS_PATCH_LEVEL [2024-02] PAGESIZE [4096] CMDLINE [] Checking the result ... -rw-r--r-- 1 shell shell 100663296 2024-05-05 17:31 /data/local/tmp/MagiskInst/bin/new-boot.img The patched boot image is "/sdcard/Download/patched_boot_a.546982.img" The Magisk app is not yet installed Now installing the Magisk App using the apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk" ... + cat /data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk + adb -d -s M6AIB760D0939LX shell pm install -S 12498796 Success + set +x Will now grant the permission "android.permission.POST_NOTIFICATIONS" for the Magisk App ... + adb -d -s M6AIB760D0939LX shell pm grant com.topjohnwu.magisk android.permission.POST_NOTIFICATIONS + set +x The status of the permission "android.permission.POST_NOTIFICATIONS" for the Magisk App is now: android.permission.POST_NOTIFICATIONS: granted=true, flags=[ USER_SENSITIVE_WHEN_GRANTED|USER_SENSITIVE_WHEN_DENIED] Waiting now 10 seconds ... Now rebooting the phone into the bootloader ... Waiting up to 60 seconds for the boot into the fastboot mode ... The phone is booted into the fastboot mode after 10 second(s) Booting the phone from the TWRP image "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" now ... Sending 'boot.img' (98304 KB) OKAY [ 2.800s] Booting OKAY [ 10.406s] Finished. Total time: 13.253s Waiting up to 60 second(s) for the boot of the phone ..... ... ro.build.version.release is "99.87.36" The adb connection is working after 25 second(s) Copying the Magisk binaries from "/data/local/tmp/MagiskInst/bin" to "/data/adb/magisk" ... chcon '/data/adb/magisk' to u:object_r:system_file:s0 chcon '/data/adb/magisk/addon.d.sh' to u:object_r:system_file:s0 chcon '/data/adb/magisk/boot_patch.sh' to u:object_r:system_file:s0 chcon '/data/adb/magisk/busybox' to u:object_r:system_file:s0 chcon '/data/adb/magisk/chromeos' to u:object_r:system_file:s0 chcon '/data/adb/magisk/magisk32' to u:object_r:system_file:s0 chcon '/data/adb/magisk/magisk64' to u:object_r:system_file:s0 chcon '/data/adb/magisk/magiskboot' to u:object_r:system_file:s0 chcon '/data/adb/magisk/magiskinit' to u:object_r:system_file:s0 chcon '/data/adb/magisk/magiskpolicy' to u:object_r:system_file:s0 chcon '/data/adb/magisk/ramdisk.cpio' to u:object_r:system_file:s0 chcon '/data/adb/magisk/stub.apk' to u:object_r:system_file:s0 chcon '/data/adb/magisk/util_functions.sh' to u:object_r:system_file:s0 Magisk binaries successfully copied to "/data/adb/magisk" Waiting now 10 second(s) ... Patching the partition "/dev/block/by-name/boot_a" from the patched boot image file "/sdcard/Download/patched_boot_a.546982.img" via dd ... 196608+0 records in 196608+0 records out 100663296 bytes (96 M) copied, 4.242273 s, 23 M/s Checking the result .... The check sums for the images and devices on the phone are: 1594622860 100663296 /sdcard/Download/boot_a.546982.img 2340134477 100663296 /sdcard/Download/patched_boot_a.546982.img 2340134477 100663296 /dev/block/by-name/boot_a OK, patching the boot partition "/dev/block/by-name/boot_a" was successfull INFO: The Magisk binaries in "/data/adb/magisk" already exist Rebooting the phone now ... # --------------------------------------------------------------------- [05.05.2024 17:33 ] ... the script ended with RC=0 ---------------------------------------------------------------------- [05.05.2024 17:33 ] Processing the task "install_the_magisk_app" ... [05.05.2024 17:33 ] Executing now "install_the_magisk_app " ---------------------------------------------------------------------- [05.05.2024 17:33 ] [05.05.2024 17:33 ] *** Installing the Magisk App from the apk file "/data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk" using the script "/data/develop/android/scripts_on_linux/install_apk.sh" with the parameter " /data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk" ... [05.05.2024 17:33 ] [05.05.2024 17:33 ] The automatic reboot after executing the script is disabled [05.05.2024 17:33 ] The task execution stops if the script ends with a return code not zero [05.05.2024 17:33 ] Parameter for "reboot_phone" are: [05.05.2024 17:33 ] The current phone status is "3" [05.05.2024 17:33 ] Will boot the phone using "adb" [05.05.2024 17:33 ] The phone is already booted into the android [05.05.2024 17:33 ] Waiting up to 20 seconds until /sdcard is mounted ... .......... [05.05.2024 17:33 ] wait_until_sdcard_is_mounted: /sdcard is mounted after 11 second(s) [05.05.2024 17:33 ] ---------------------------------------------------------------------- [05.05.2024 17:33 ] *** Executing now "/data/develop/android/scripts_on_linux/install_apk.sh -d -s M6AIB760D0939LX -- /data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk" ... # --------------------------------------------------------------------- Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk Installing the apk "/data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk" ... Success "/data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/EssentialApps_Backup/Magisk-v27.0.apk # --------------------------------------------------------------------- [05.05.2024 17:33 ] ... the script ended with RC=0 [05.05.2024 17:33 ] Magisk app successfully installed [05.05.2024 17:33 ] Granting the permission "android.permission.POST_NOTIFICATIONS" for the Magisk app ... The status of the permission "android.permission.POST_NOTIFICATIONS" for the Magisk App is now: android.permission.POST_NOTIFICATIONS: granted=true, flags=[ USER_SENSITIVE_WHEN_GRANTED|USER_SENSITIVE_WHEN_DENIED] ---------------------------------------------------------------------- [05.05.2024 17:33 ] Processing the task "wait_for_access_via_adb" with the parameter "120:kill" ... [05.05.2024 17:33 ] Executing now "wait_for_access_via_adb 120 kill" ---------------------------------------------------------------------- [05.05.2024 17:33 ] The phone is currently booted into the Android OS [05.05.2024 17:33 ] Selecting the TWRP image to use depending on the installed OS on the phone ... [05.05.2024 17:33 ] Checking the installed OS on the phone ... [05.05.2024 17:33 ] The OS on the phone is the /e/ (Android 13) [05.05.2024 17:33 ] Checking the type of the file "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" ... [05.05.2024 17:33 ] The file type is "Android bootimg, kernel (0x3421539), ramdisk (0x630)" [05.05.2024 17:33 ] OK, the file "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" is a valid boot image for Android devices [05.05.2024 17:33 ] The installed OS is "/e/" [05.05.2024 17:33 ] The TWRP file necessary for this OS is "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" [05.05.2024 17:33 ] The boot slot is _a. [05.05.2024 17:33 ] adb access to the phone is working ---------------------------------------------------------------------- [05.05.2024 17:33 ] Processing the task "install_archive_file" with the parameter "twrp:reboot:script=/cache/correct_setlinux_for_wifconifg.sh" ... [05.05.2024 17:33 ] Executing now "install_archive_file twrp reboot script=/cache/correct_setlinux_for_wifconifg.sh" ---------------------------------------------------------------------- [05.05.2024 17:33 ] Assuming the file "/data/develop/android/android_config.tar" is a tar archive [05.05.2024 17:33 ] [05.05.2024 17:33 ] *** Installing the contents of the file "/data/develop/android/android_config.tar" on the phone ... [05.05.2024 17:33 ] [05.05.2024 17:33 ] The automatic reboot after executing the script is enabled [05.05.2024 17:33 ] The task execution stops if the script ends with a return code not zero [05.05.2024 17:33 ] The requested boot environment to unpack the file is "twrp" [05.05.2024 17:33 ] The phone is booted into the Android OS [05.05.2024 17:33 ] Booting the phone into the bootloader now ... [05.05.2024 17:33 ] Waiting up to 60 seconds for the boot into the fastboot mode ... [05.05.2024 17:33 ] The phone is booted into the bootloader [05.05.2024 17:33 ] Booting the phone from the TWRP image "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" now ... Sending 'boot.img' (98304 KB) OKAY [ 2.791s] Booting OKAY [ 10.360s] Finished. Total time: 13.198s Waiting up to 120 seconds for a working adb connection ..... [05.05.2024 17:34 ] The adb connection is working after 25 second(s) Waiting up to 30 seconds for the adb daemon to get ready [05.05.2024 17:34 ] ... the adb daemon is ready after 0 second(s) [05.05.2024 17:34 ] The adb connection is ready after 0 second(s) [05.05.2024 17:34 ] Waiting up to 20 seconds until /data is mounted ... [05.05.2024 17:34 ] /data is mounted after 0 second(s). [05.05.2024 17:34 ] /data/media not found - /data is not yet initialized [05.05.2024 17:34 ] The phone is booted into TWRP version "3.7.0_12-1" [05.05.2024 17:34 ] The phone is currently booted from a TWRP image [05.05.2024 17:34 ] The boot slot is _a. [05.05.2024 17:34 ] Retrieving the download directory on the phone ... [05.05.2024 17:34 ] The user on the phone is the user "root" [05.05.2024 17:34 ] Now uploading the file "/data/develop/android/android_config.tar" to the phone into the directory "/sdcard/Download" .... /data/develop/android/android_config.tar: 1 file pushed, 0 skipped. 216.4 MB/s (10240 bytes in 0.000s) [05.05.2024 17:34 ] Creating the temporary script "/tmp/prepare_phone.sh_WORKDIR.542501/task_install_archive_file_542501.sh" to unpack the file ... [05.05.2024 17:34 ] Uploading the temporary script "/tmp/prepare_phone.sh_WORKDIR.542501/task_install_archive_file_542501.sh" to the file "/sdcard/Download/unpack.542501.sh" on the phone ... /tmp/prepare_phone.sh_WORKDIR.542501/task_install_archive_file_542501.sh: 1 file pushed, 0 skipped. 1.8 MB/s (72 bytes in 0.000s) [05.05.2024 17:34 ] Unpacking the file "/data/develop/android/android_config.tar" on the phone using the temporary script "/sdcard/Download/unpack.542501.sh" on the phone .... + cd / + tar -xvf /sdcard/Download/android_config.tar cache/correct_setlinux_for_wifconifg.sh data/misc/apexdata/com.android.wifi/WifiConfigStore.xml [05.05.2024 17:34 ] Successfully unpacked the file "/data/develop/android/android_config.tar" on the phone [05.05.2024 17:34 ] Checking if the post install script "/cache/correct_setlinux_for_wifconifg.sh" exists on the phone ... [05.05.2024 17:34 ] Executing the post install script "/cache/correct_setlinux_for_wifconifg.sh" on the phone ... # --------------------------------------------------------------------- chcon '/data/misc/apexdata/com.android.wifi/WifiConfigStore.xml' to u:object_r:apex_system_server_data_file:s0 # --------------------------------------------------------------------- [05.05.2024 17:34 ] ... the RC of the script is 0 [05.05.2024 17:34 ] *** Now rebooting the phone ... [05.05.2024 17:34 ] Parameter for "reboot_phone" are: wait force [05.05.2024 17:34 ] The current phone status is "1" [05.05.2024 17:34 ] Will boot the phone using "adb" [05.05.2024 17:34 ] Rebooting the phone using the command " /usr/bin/adb -d -s M6AIB760D0939LX reboot " now ... Waiting up to 120 second(s) for the phone ..... [05.05.2024 17:35 ] Booting the phone into the Android OS succeeded after 25 seconds; the current status of the phone is 3 [05.05.2024 17:35 ] Waiting up to 20 seconds until /data is mounted ... [05.05.2024 17:35 ] /data is mounted after 0 second(s). [05.05.2024 17:35 ] Testing if the data partition on the phone is encrypted ... [05.05.2024 17:35 ] The test directory for the encryption test is "/sdcard/Download" drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/+dt9UDAAAAw,ZI0J3R5lB2aM0YqzhQq2 drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/,p93kCAAAAgC+HXVg1eNE3wc2Vz6SDDv drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/3kII+DAAAAQ8Qe,u2n5a1I9ntkQqv4la drwxrws--- 3 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/92AyhCAAAAQsjdhsk6krrXWId7RrMgjc drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/ApexsAAAAAwM5E0LE54,fIg7wXLKjncn drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/CwHtXDAAAAgzMb9ysJnnq4iBaX5cMdtA drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/GcWaNDAAAAwp,ozUEPvKOIWdgRBMvPAU drwxrws--- 2 root media_rw 3452 2024-05-05 17:29 /data/media/0/HeYOnDAAAAwld+tGXa09dPgYNmcHrWP2 drwxrws--- 3 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/Ir9o5AAAAAQ8B,uilMShj3qL3BiQjAVJ drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:34 /data/media/0/KD09uBAAAAgaIqujtgmO6bIyxZuZG697 drwxrws--x 5 media_rw media_rw 3452 2024-05-05 17:28 /data/media/0/daT5oDAAAAAQkX03CUdamKDqvrmHOY86 drwxrws--- 3 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/dx59NCAAAAgTvrXQFL63Wo7OTz4GwvgU drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/lNe+VDAAAAAYC7+U4e2EgOcYy0i0jVCj drwxrws--- 4 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/pT67pBAAAAwYsuGMFq0W0ZA7GPJjLUis drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/uIkBsDAAAAQIJw9HLD8VlSVbfIgUDxjd [05.05.2024 17:35 ] The user password is not set - now using the default password from Android (default_password) to decrypt the files [05.05.2024 17:35 ] The data partition on the phone is encrypted [05.05.2024 17:35 ] twrp not found -- now decrypting the data partition on the phone using the Android command "input" [05.05.2024 17:35 ] Waiting up to 150 seconds to complete the decrypting ..... (Waited for 5 second(s)) Waiting up to 30 seconds for the adb daemon to get ready [05.05.2024 17:35 ] ... the adb daemon is ready after 0 second(s) [05.05.2024 17:35 ] The adb connection is ready after 0 second(s) [05.05.2024 17:35 ] Sucessfully decrypted the data partition ---------------------------------------------------------------------- [05.05.2024 17:35 ] Processing the task "enable_disable_abort_on_error" with the parameter "disable" ... [05.05.2024 17:35 ] Executing now "enable_disable_abort_on_error disable" ---------------------------------------------------------------------- [05.05.2024 17:35 ] Setting the variable "ABORT_TASK_EXECUTION_ON_ERROR" to "1" .. ---------------------------------------------------------------------- [05.05.2024 17:35 ] Processing the task "install_essential_scripts" ... [05.05.2024 17:35 ] Executing now "install_essential_scripts " ---------------------------------------------------------------------- [05.05.2024 17:35 ] [05.05.2024 17:35 ] *** Installing the essential scripts from the local directory "/data/backup/Android/EssentialScripts/" onto the phone ... [05.05.2024 17:35 ] [05.05.2024 17:35 ] The automatic reboot after executing the script is disabled [05.05.2024 17:35 ] The task execution stops if the script ends with a return code not zero [05.05.2024 17:35 ] Parameter for "reboot_phone" are: [05.05.2024 17:35 ] The current phone status is "3" [05.05.2024 17:35 ] Will boot the phone using "adb" [05.05.2024 17:35 ] The phone is already booted into the android [05.05.2024 17:35 ] Waiting up to 20 seconds until /sdcard is mounted ... [05.05.2024 17:35 ] wait_until_sdcard_is_mounted: /sdcard is mounted after 1 second(s) [05.05.2024 17:35 ] Copying the scripts to the phone ... /data/backup/Android/EssentialScripts//0001logcatboot: 1 file pushed, 0 skipped. 3.4 MB/s (156 bytes in 0.000s) /data/backup/Android/EssentialScripts//correct_dev_pn553.sh: 1 file pushed, 0 skipped. 6.8 MB/s (354 bytes in 0.000s) /data/backup/Android/EssentialScripts//disable_intent_filter_verification.sh: 1 file pushed, 0 skipped. 1.4 MB/s (51 bytes in 0.000s) /data/backup/Android/EssentialScripts//enable_microg.sh: 1 file pushed, 0 skipped. 2.9 MB/s (146 bytes in 0.000s) /data/backup/Android/EssentialScripts//enable_wifi.sh: 1 file pushed, 0 skipped. 83.6 MB/s (2956 bytes in 0.000s) /data/backup/Android/EssentialScripts//install_apk.sh: 1 file pushed, 0 skipped. 216.4 MB/s (6052 bytes in 0.000s) /data/backup/Android/EssentialScripts//list_magisk_root_permissions.sh: 1 file pushed, 0 skipped. 6.0 MB/s (223 bytes in 0.000s) /data/backup/Android/EssentialScripts//remove_screenlock.sh: 1 file pushed, 0 skipped. 3.3 MB/s (69 bytes in 0.000s) [05.05.2024 17:35 ] Successfully copied the essential scripts from the directory "/data/backup/Android/EssentialScripts/" to the phone ---------------------------------------------------------------------- [05.05.2024 17:35 ] Processing the task "execute_script_on_the_phone" with the parameter "ignorerc:/data/develop/android/scripts_on_linux/enable_wlan.sh" ... [05.05.2024 17:35 ] Executing now "execute_script_on_the_phone ignorerc /data/develop/android/scripts_on_linux/enable_wlan.sh" ---------------------------------------------------------------------- [05.05.2024 17:35 ] [05.05.2024 17:35 ] *** Executing the script "/data/develop/android/scripts_on_linux/enable_wlan.sh" on the phone ... [05.05.2024 17:35 ] [05.05.2024 17:35 ] The Returncode of the script is ignored [05.05.2024 17:35 ] Waiting for a working adb connection ... Waiting up to 120 seconds for a working adb connection [05.05.2024 17:35 ] The adb connection is working after 0 second(s) Waiting up to 30 seconds for the adb daemon to get ready [05.05.2024 17:35 ] ... the adb daemon is ready after 0 second(s) [05.05.2024 17:35 ] The adb connection is ready after 0 second(s) [05.05.2024 17:35 ] Waiting up to 20 seconds until /data is mounted ... [05.05.2024 17:35 ] /data is mounted after 0 second(s). [05.05.2024 17:35 ] Testing if the data partition on the phone is encrypted ... [05.05.2024 17:35 ] The test directory for the encryption test is "/sdcard/Download" [05.05.2024 17:35 ] The data partition on the phone is either not mounted or not encrypted [05.05.2024 17:35 ] Copying the script "/data/develop/android/scripts_on_linux/enable_wlan.sh" to "/sdcard/Download/enable_wlan.sh" on the phone ... /data/develop/android/scripts_on_linux/enable_wlan.sh: 1 file pushed, 0 skipped. 10.0 MB/s (559 bytes in 0.000s) [05.05.2024 17:35 ] Now executing the script "/sdcard/Download/enable_wlan.sh" on the phone ... *** The script to enable WLAN and disable mobile Data is running ... Disabling mobile data ... Enabling WiFi ... Configuring WiFi ... Connection initiated ---------------------------------------------------------------------- [05.05.2024 17:35 ] Processing the task "install_essential_apps" with the parameter "/data/backup/Android/Essential_Apps_for_ASUS_Android" ... [05.05.2024 17:35 ] Executing now "install_essential_apps /data/backup/Android/Essential_Apps_for_ASUS_Android" ---------------------------------------------------------------------- [05.05.2024 17:35 ] [05.05.2024 17:35 ] *** Installing the essential apps from the local directory "/data/backup/Android/Essential_Apps_for_ASUS_Android" onto the phone using the script "/data/develop/android/scripts_on_linux/install_apk.sh" ... [05.05.2024 17:35 ] [05.05.2024 17:35 ] The automatic reboot after executing the script is disabled [05.05.2024 17:35 ] The task execution stops if the script ends with a return code not zero [05.05.2024 17:35 ] Parameter for "reboot_phone" are: [05.05.2024 17:35 ] The current phone status is "3" [05.05.2024 17:35 ] Will boot the phone using "adb" [05.05.2024 17:35 ] The phone is already booted into the android Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/axp.tool.apkextractor_v5.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/axp.tool.apkextractor_v5.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/axp.tool.apkextractor_v5.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/axp.tool.apkextractor_v5.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/com.apk.editor_v25.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.apk.editor_v25.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.apk.editor_v25.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/com.apk.editor_v25.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/com.bytehamster.changelog_v49.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.bytehamster.changelog_v49.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.bytehamster.changelog_v49.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/com.bytehamster.changelog_v49.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/com.dkanada.openapk_v35.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.dkanada.openapk_v35.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.dkanada.openapk_v35.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/com.dkanada.openapk_v35.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/com.elsdoerfer.android.autostarts_v33.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.elsdoerfer.android.autostarts_v33.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.elsdoerfer.android.autostarts_v33.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/com.elsdoerfer.android.autostarts_v33.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/com.jecelyin.editor.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.jecelyin.editor.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.jecelyin.editor.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/com.jecelyin.editor.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/com.keramidas.TitaniumBackupAddon_v1.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.keramidas.TitaniumBackupAddon_v1.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.keramidas.TitaniumBackupAddon_v1.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/com.keramidas.TitaniumBackupAddon_v1.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/com.keramidas.TitaniumBackup_v417.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.keramidas.TitaniumBackup_v417.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.keramidas.TitaniumBackup_v417.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/com.keramidas.TitaniumBackup_v417.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/com.kunzisoft.keepass.libre_57.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.kunzisoft.keepass.libre_57.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.kunzisoft.keepass.libre_57.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/com.kunzisoft.keepass.libre_57.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/com.matoski.adbm_v27.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.matoski.adbm_v27.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.matoski.adbm_v27.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/com.matoski.adbm_v27.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/com.offsec.nhterm_2020040001.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.offsec.nhterm_2020040001.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.offsec.nhterm_2020040001.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/com.offsec.nhterm_2020040001.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/com.termux_v118.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.termux_v118.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/com.termux_v118.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/com.termux_v118.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/F-Droid.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/F-Droid.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/F-Droid.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/F-Droid.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/FoxMmm-0.5.6.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/FoxMmm-0.5.6.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/FoxMmm-0.5.6.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/FoxMmm-0.5.6.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/io.github.muntashirakon.AppManager_v397.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/io.github.muntashirakon.AppManager_v397.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/io.github.muntashirakon.AppManager_v397.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/io.github.muntashirakon.AppManager_v397.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Archive-arm64.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Archive-arm64.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Archive-arm64.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Archive-arm64.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.AutoTag.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.AutoTag.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.AutoTag.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.AutoTag.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Codecs-arm64.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Codecs-arm64.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Codecs-arm64.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Codecs-arm64.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Image-arm64.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Image-arm64.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Image-arm64.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Image-arm64.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Metadata.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Metadata.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Metadata.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Metadata.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.PDF-arm64.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.PDF-arm64.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.PDF-arm64.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.PDF-arm64.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Signer.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Signer.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Signer.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Signer.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.SMB.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.SMB.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.SMB.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.SMB.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Tagger.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Tagger.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Tagger.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Tagger.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/MiXplorer_v6.64.3_B23090710.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiXplorer_v6.64.3_B23090710.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/MiXplorer_v6.64.3_B23090710.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/MiXplorer_v6.64.3_B23090710.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/NetHunterStore.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/NetHunterStore.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/NetHunterStore.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/NetHunterStore.apk Running on a PC Using adb with the options " -d -s M6AIB760D0939LX " to install the packages The apks will be installed on the phone model ASUS_I006D with the serial number M6AIB760D0939LX Installing these apks /data/backup/Android/Essential_Apps_for_ASUS_Android/yasnac-v1.1.5.r65.15110ef310-release.apk Installing the apk "/data/backup/Android/Essential_Apps_for_ASUS_Android/yasnac-v1.1.5.r65.15110ef310-release.apk" ... Success "/data/backup/Android/Essential_Apps_for_ASUS_Android/yasnac-v1.1.5.r65.15110ef310-release.apk" succcessfully installed Installation summary ==================== 1 package(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/yasnac-v1.1.5.r65.15110ef310-release.apk [05.05.2024 17:35 ] Summary: [05.05.2024 17:35 ] 27 apk(s) successfully installed: /data/backup/Android/Essential_Apps_for_ASUS_Android/axp.tool.apkextractor_v5.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/com.apk.editor_v25.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/com.bytehamster.changelog_v49.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/com.dkanada.openapk_v35.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/com.elsdoerfer.android.autostarts_v33.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/com.jecelyin.editor.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/com.keramidas.TitaniumBackupAddon_v1.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/com.keramidas.TitaniumBackup_v417.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/com.kunzisoft.keepass.libre_57.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/com.matoski.adbm_v27.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/com.offsec.nhterm_2020040001.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/com.termux_v118.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/F-Droid.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/FoxMmm-0.5.6.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/io.github.muntashirakon.AppManager_v397.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Archive-arm64.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.AutoTag.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Codecs-arm64.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Image-arm64.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Metadata.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.PDF-arm64.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Signer.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.SMB.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/MiX.addon.Tagger.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/MiXplorer_v6.64.3_B23090710.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/NetHunterStore.apk /data/backup/Android/Essential_Apps_for_ASUS_Android/yasnac-v1.1.5.r65.15110ef310-release.apk ---------------------------------------------------------------------- [05.05.2024 17:35 ] Processing the task "install_essential_magisk_modules" with the parameter "ignorerc" ... [05.05.2024 17:35 ] Executing now "install_essential_magisk_modules ignorerc" ---------------------------------------------------------------------- [05.05.2024 17:35 ] [05.05.2024 17:35 ] *** Installing the essential Magisk modules from the local directory "/data/backup/Android/EssentialMagiskModules" onto the phone ... [05.05.2024 17:35 ] [05.05.2024 17:35 ] The automatic reboot after executing the script is disabled [05.05.2024 17:35 ] The Returncode of the script is ignored [05.05.2024 17:35 ] Parameter for "reboot_phone" are: [05.05.2024 17:35 ] The current phone status is "3" [05.05.2024 17:35 ] Will boot the phone using "adb" [05.05.2024 17:35 ] The phone is already booted into the android [05.05.2024 17:35 ] *** Installing the Magisk Module addbin-v1.6.0.0.zip ... addbin-v1.6.0.0.zip: 1 file pushed, 0 skipped. 32.5 MB/s (96207737 bytes in 2.822s) - Current boot slot: _a - Device is system-as-root ********************** Additional Binaries by bnsmb01@gmail.com ********************** ******************* Powered by Magisk ******************* - Extracting module files The current envrironment for this installation is The version of the installed Magisk is "27.0" (27000) INFO: BOOTMODE is "true" INFO: MODPATH is "/data/adb/modules_update/addbin" INFO: TMPDIR is "/dev/tmp" INFO: ZIPFILE is "/storage/emulated/0/Download/MagiskModules/addbin-v1.6.0.0.zip" INFO: ARCH is "arm64" INFO: IS64BIT is "true" INFO: API is "33" Installing the Magisk Module for the additional binaries version "1.6.0.0" ... Checking the type of the CPU used in this device .... The CPU in this device is a arm64 CPU OK, the CPU is supported by this module Copying the config files to /sdcard ... Creating the config file "/sdcard/.viminfo" ... Creating the config file "/sdcard/.aliases" ... Creating the config file "/sdcard/.customrc" ... Creating the config file "/sdcard/.bashrc" ... - Done [05.05.2024 17:37 ] *** Installing the Magisk Module Additional_Binaries_v1.6.1.1.zip ... Additional_Binaries_v1.6.1.1.zip: 1 file pushed, 0 skipped. 32.6 MB/s (97700469 bytes in 2.858s) - Current boot slot: _a - Device is system-as-root ********************** Additional Binaries by bnsmb01@gmail.com ********************** ******************* Powered by Magisk ******************* - Extracting module files The current envrironment for this installation is The version of the installed Magisk is "27.0" (27000) INFO: BOOTMODE is "true" INFO: MODPATH is "/data/adb/modules_update/addbin" INFO: TMPDIR is "/dev/tmp" INFO: ZIPFILE is "/storage/emulated/0/Download/MagiskModules/Additional_Binaries_v1.6.1.1.zip" INFO: ARCH is "arm64" INFO: IS64BIT is "true" INFO: API is "33" Installing the Magisk Module for the additional binaries version "1.6.1.0" ... Checking the type of the CPU used in this device .... The CPU in this device is a arm64 CPU OK, the CPU is supported by this module Copying the config files to /sdcard ... The config file "/sdcard/.viminfo" already exists - will not overwrite the existing file The config file "/sdcard/.aliases" already exists - will not overwrite the existing file The config file "/sdcard/.customrc" already exists - will not overwrite the existing file The config file "/sdcard/.bashrc" already exists - will not overwrite the existing file Replacing symbolic links with absolute links .... Processing the symbolic link "./vi" ... Processing the symbolic link "./join" ... Processing the symbolic link "./ptx" ... Processing the symbolic link "./vdir" ... Processing the symbolic link "./factor" ... Processing the symbolic link "./base32" ... Processing the symbolic link "./b2sum" ... Processing the symbolic link "./zstdmt" ... Processing the symbolic link "./dc" ... Processing the symbolic link "./unexpand" ... Processing the symbolic link "./shred" ... Processing the symbolic link "./fold" ... Processing the symbolic link "./nohup" ... Processing the symbolic link "./cp" ... Processing the symbolic link "./ginstall" ... Processing the symbolic link "./numfmt" ... Processing the symbolic link "./view" ... Processing the symbolic link "./rview" ... Processing the symbolic link "./who" ... Processing the symbolic link "./pathchk" ... Processing the symbolic link "./dircolors" ... Processing the symbolic link "./dir" ... Processing the symbolic link "./unzstd" ... Processing the symbolic link "./pr" ... Processing the symbolic link "./csplit" ... Processing the symbolic link "./users" ... Processing the symbolic link "./pinky" ... Processing the symbolic link "./mv" ... Processing the symbolic link "./vimdiff" ... Processing the symbolic link "./zstdcat" ... Processing the symbolic link "./rnano" ... Processing the symbolic link "./link" ... Processing the symbolic link "./ex" ... Processing the symbolic link "./tsort" ... Processing the symbolic link "./shuf" ... Processing the symbolic link "./rvim" ... Processing the symbolic link "./sum" ... Processing the symbolic link "./basenc" ... - Done [05.05.2024 17:39 ] *** Installing the Magisk Module AndroidSDK_34.0.3.01.zip ... AndroidSDK_34.0.3.01.zip: 1 file pushed, 0 skipped. 38.3 MB/s (19322252 bytes in 0.481s) - Current boot slot: _a - Device is system-as-root *************************************************************************************************************************************************************************************************************** AndroidSDK by bnsmb01@gmail.com for the Magisk Module; the Android SDK binaries in the module are from here: https://github.com/lzhiyong/android-sdk-tools/releases/download/34.0.3/android-sdk-tools-static-aarch64.zip *************************************************************************************************************************************************************************************************************** ******************* Powered by Magisk ******************* - Extracting module files The current environment for this installation is The version of the installed Magisk is "27.0" (27000) INFO: BOOTMODE is "true" INFO: MODPATH is "/data/adb/modules_update/androidsdk34_0_3" INFO: TMPDIR is "/dev/tmp" INFO: ZIPFILE is "/storage/emulated/0/Download/MagiskModules/AndroidSDK_34.0.3.01.zip" INFO: ARCH is "arm64" INFO: IS64BIT is "true" INFO: API is "33" Installing the Magisk Module with the binaries from the Android SDK "34.0.3" ... This module contains the Android SDK binaries from this URL https://github.com/lzhiyong/android-sdk-tools/releases/download/34.0.3/android-sdk-tools-static-aarch64.zip Checking the type of the CPU used in this device .... The CPU in this device is a arm64 CPU The machine type reported by "uname -m" is "aarch64" [05.05.2024 17:39 ] *** Installing the Magisk Module Audio_Modification_Library-v4.2_57_-fix_for_Magisk_v26.zip ... Audio_Modification_Library-v4.2_57_-fix_for_Magisk_v26.zip: 1 file pushed, 0 skipped. 215.6 MB/s (7925 bytes in 0.000s) - Current boot slot: _a - Device is system-as-root ************************************************* Audio Modification Library (fix for Magisk v26) by zackptg5, ahrion (zgfg) ************************************************* ******************* Powered by Magisk ******************* - Extracting module files Mod detection and patching now happens at boot The boot script handles everything now Also note that disabled mods will be ignored! - Done [05.05.2024 17:40 ] *** Installing the Magisk Module bootctl-binary-v2.1.3.zip ... bootctl-binary-v2.1.3.zip: 1 file pushed, 0 skipped. 275.5 MB/s (23026 bytes in 0.000s) - Current boot slot: _a - Device is system-as-root ******************* Bootctl Binary by Roee Hershberg ******************* ******************* Powered by Magisk ******************* ************************************** * MMT Extended by Zackptg5 @ XDA * ************************************** - Extracting module files - Removing old files - Installing Installing for arm64 SDK 33 device... - Setting Permissions - Done [05.05.2024 17:40 ] *** Installing the Magisk Module btop_v1.3.2.1.zip ... btop_v1.3.2.1.zip: 1 file pushed, 0 skipped. 42.7 MB/s (9109502 bytes in 0.204s) - Current boot slot: _a - Device is system-as-root **************************************** btop for Android by Author of btop: Jakob P. Liljenberg **************************************** ******************* Powered by Magisk ******************* - Extracting module files The current environment for this installation is The version of the installed Magisk is "27.0" (27000) INFO: BOOTMODE is "true" INFO: MODPATH is "/data/adb/modules_update/btop" INFO: TMPDIR is "/dev/tmp" INFO: ZIPFILE is "/storage/emulated/0/Download/MagiskModules/btop_v1.3.2.1.zip" INFO: ARCH is "arm64" INFO: IS64BIT is "true" INFO: API is "33" Installing the Magisk Module for btop "1.3.2.1" ... Checking the type of the CPU used in this device .... The CPU in this device is a arm64 CPU The machine type reported by "uname -m" is "aarch64" [File copied]: /data/adb/modules_update/btop/bin/btop_aarch64 to /data/adb/modules_update/btop/system/bin/btop.bin - Done [05.05.2024 17:40 ] *** Installing the Magisk Module disable_fake_store.zip ... disable_fake_store.zip: 1 file pushed, 0 skipped. 254.6 MB/s (9952 bytes in 0.000s) - Current boot slot: _a - Device is system-as-root ********************************************************* Disable the fake store installed in OmniROM with MicroG by bnsmb01@gmail.com ********************************************************* ******************* Powered by Magisk ******************* - Extracting module files - Done [05.05.2024 17:40 ] *** Installing the Magisk Module magisk_ssh_v0.14.zip ... magisk_ssh_v0.14.zip: 1 file pushed, 0 skipped. 34.5 MB/s (23306755 bytes in 0.645s) - Current boot slot: _a - Device is system-as-root ******************************* OpenSSH for Android ******************************* [0/7] Preparing module directory [1/7] Extracting architecture unspecific module files [2/7] Extracting libraries and binaries for arm64 [3/7] Configuring library path wrapper [4/7] Recreating symlinks [5/7] Creating SSH user directories [6/7] Extracting sshd_config [7/7] Cleaning up - Setting permissions - Done [05.05.2024 17:40 ] *** Installing the Magisk Module Nano_for_Android_NDK-6_3-6300.zip ... Nano_for_Android_NDK-6_3-6300.zip: 1 file pushed, 0 skipped. 516.0 MB/s (380554 bytes in 0.001s) - Current boot slot: _a - Device is system-as-root ***************************** Nano for Android NDK by osm0sis @ xda-developers ***************************** ******************* Powered by Magisk ******************* Archive: /storage/emulated/0/Download/MagiskModules/Nano_for_Android_NDK-6_3-6300.zip inflating: diffusion_config.sh inflating: module.prop Mounting... Extracting files... Archive: /storage/emulated/0/Download/MagiskModules/Nano_for_Android_NDK-6_3-6300.zip inflating: META-INF/com/google/android/updater-script inflating: META-INF/com/google/android/update-binary inflating: sbin/nano inflating: etc/terminfo/r/rxvt inflating: etc/terminfo/r/rxvt-basic inflating: etc/terminfo/h/hurd inflating: etc/terminfo/m/mach-bold inflating: etc/terminfo/m/mach-color inflating: etc/terminfo/m/mach inflating: etc/terminfo/v/vt100 inflating: etc/terminfo/v/vt52 inflating: etc/terminfo/v/vt220 inflating: etc/terminfo/v/vt102 inflating: etc/terminfo/E/Eterm-color inflating: etc/terminfo/E/Eterm inflating: etc/terminfo/x/xterm inflating: etc/terminfo/x/xterm-vt220 inflating: etc/terminfo/x/xterm-r6 inflating: etc/terminfo/x/xterm-color inflating: etc/terminfo/x/xterm-xfree86 inflating: etc/terminfo/x/xterm-256color inflating: etc/terminfo/x/xterm-r5 inflating: etc/terminfo/w/wsvt25 inflating: etc/terminfo/w/wsvt25m inflating: etc/terminfo/d/dumb inflating: etc/terminfo/s/screen-256color inflating: etc/terminfo/s/screen-bce inflating: etc/terminfo/s/sun inflating: etc/terminfo/s/screen inflating: etc/terminfo/s/screen-w inflating: etc/terminfo/s/screen-s inflating: etc/terminfo/s/screen-256color-bce inflating: etc/terminfo/c/cygwin inflating: etc/terminfo/c/cons25 inflating: etc/terminfo/p/pcansi inflating: etc/terminfo/a/ansi inflating: etc/terminfo/l/linux inflating: customize.sh inflating: update.json inflating: bin/nano inflating: bin/nano.bin inflating: README.md inflating: diffusion_config.sh inflating: module.prop Installing... Installing nano to /data/adb/modules_update/nano-ndk/system/bin ... Installing terminfo to /data/adb/modules_update/nano-ndk/system/etc ... Unmounting... Done! [05.05.2024 17:40 ] *** Installing the Magisk Module twrp-keep.zip ... twrp-keep.zip: 1 file pushed, 0 skipped. 130.0 MB/s (6228 bytes in 0.000s) - Current boot slot: _a - Device is system-as-root ***************************** TWRP A/B Retention Script by osm0sis @ xda-developers ***************************** ******************* Powered by Magisk ******************* - Unpacking boot_a image - Image is signed with AVB 1.0 ! TWRP ramdisk not found [05.05.2024 17:40 ] Summary: [05.05.2024 17:40 ] 9 Magisk Module(s) successfully installed: addbin-v1.6.0.0.zip Additional_Binaries_v1.6.1.1.zip AndroidSDK_34.0.3.01.zip Audio_Modification_Library-v4.2_57_-fix_for_Magisk_v26.zip bootctl-binary-v2.1.3.zip btop_v1.3.2.1.zip disable_fake_store.zip magisk_ssh_v0.14.zip Nano_for_Android_NDK-6_3-6300.zip [05.05.2024 17:40 ] 1 Magisk Module(s) not installed: twrp-keep.zip [05.05.2024 17:40 ] Ignoring the return code of the task is requested via task parameter ---------------------------------------------------------------------- [05.05.2024 17:40 ] Processing the task "enable_root_access_for_apps" with the parameter "reboot" ... [05.05.2024 17:40 ] Executing now "enable_root_access_for_apps reboot" ---------------------------------------------------------------------- [05.05.2024 17:40 ] [05.05.2024 17:40 ] *** Enabling root access for additional apps using the script "/data/develop/android/scripts_on_linux/init_magisk_db.sh" with the parameter "apps=+com.mixplorer,com.keramidas.TitaniumBackup,io.github.muntashirakon.AppManager,com.matoski.adbm,com.fox2code.mmm" ... [05.05.2024 17:40 ] [05.05.2024 17:40 ] The automatic reboot after executing the script is enabled [05.05.2024 17:40 ] The task execution stops if the script ends with a return code not zero [05.05.2024 17:40 ] ---------------------------------------------------------------------- [05.05.2024 17:40 ] *** Executing now "/data/develop/android/scripts_on_linux/init_magisk_db.sh apps=+com.mixplorer,com.keramidas.TitaniumBackup,io.github.muntashirakon.AppManager,com.matoski.adbm,com.fox2code.mmm" ... # --------------------------------------------------------------------- init_magisk_db.sh version - v1.0.3.0 - shell script to enable root access via Magisk for specified apps Using the TWRP helper script "/data/develop/android/scripts_on_linux/boot_phone_from_twrp.sh" Using the Magisk helper script "/data/develop/android/scripts_on_linux/enable_root_access_via_magisk.sh" The apps for which root access should be enabled are: com.android.shell com.mixplorer com.keramidas.TitaniumBackup io.github.muntashirakon.AppManager com.matoski.adbm com.fox2code.mmm Apps that should be enabled are: com.android.shell com.mixplorer com.keramidas.TitaniumBackup io.github.muntashirakon.AppManager com.matoski.adbm com.fox2code.mmm UIDs that should be enabled are: Found one more app names in the list of apps Reading the helper script "boot_phone_from_twrp.sh" ... The script is running as user "xtrnaw7" -- will use "sudo" for the fastboot commands ... Will use the attached phone with the serial number "M6AIB760D0939LX" Using the TWRP image defined in the environment variable TWRP_IMAGE: "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" Using the options "-d -s M6AIB760D0939LX " for the adb commands Using the options " -s M6AIB760D0939LX " for the fastboot commands Checking the script prerequisites ... Will wait up to 60 second(s) after booting the phone into the bootloader Will wait up to 120 second(s) after booting the phone from the TWRP image Will wait up to 30 second(s) until the adb daemon is ready to use Retrieving the current status of the phone ... The phone is currently booted into the Android OS Selecting the TWRP image to use depending on the installed OS on the phone ... Checking the installed OS on the phone ... The OS on the phone is the /e/ (Android 13) Checking the type of the file "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" ... The file type is "Android bootimg, kernel (0x3421539), ramdisk (0x630)" OK, the file "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" is a valid boot image for Android devices The installed OS is "/e/" The TWRP file necessary for this OS is "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" The boot slot is _a. Retrieving the UIDs for the app names ... Parameter for "reboot_phone" are: The current phone status is "3" Will boot the phone using "adb" The phone is already booted into the android Retrieving the UID for the app "com.android.shell" ... The UID for the app "com.android.shell" is "2000" Retrieving the UID for the app "com.mixplorer" ... The UID for the app "com.mixplorer" is "10227" Retrieving the UID for the app "com.keramidas.TitaniumBackup" ... The UID for the app "com.keramidas.TitaniumBackup" is "10210" Retrieving the UID for the app "io.github.muntashirakon.AppManager" ... The UID for the app "io.github.muntashirakon.AppManager" is "10217" Retrieving the UID for the app "com.matoski.adbm" ... The UID for the app "com.matoski.adbm" is "10212" Retrieving the UID for the app "com.fox2code.mmm" ... The UID for the app "com.fox2code.mmm" is "10216" Will enable the root access via Magisk for these UIDs: 2000 10227 10210 10217 10212 10216 The phone is booted into the Android OS Booting the phone into the bootloader now ... Waiting up to 60 seconds for the boot into the fastboot mode ... The phone is booted into the bootloader Booting the phone from the TWRP image "/data1/backup/ASUS_ZENFONE8/e/twrp_recovery-e-1.21-t-20240325389105-dev-sake.img" now ... Sending 'boot.img' (98304 KB) OKAY [ 2.796s] Booting OKAY [ 10.359s] Finished. Total time: 13.206s Waiting up to 120 seconds for a working adb connection ..... The adb connection is working after 25 second(s) Waiting up to 30 seconds for the adb daemon to get ready ... the adb daemon is ready after 0 second(s) The adb connection is ready after 0 second(s) Waiting up to 20 seconds until /data is mounted ... /data is mounted after 0 second(s). /data/media not found - /data is not yet initialized The phone is booted into TWRP version "3.7.0_12-1" Copying the Magisk helper script "/data/develop/android/scripts_on_linux/enable_root_access_via_magisk.sh" to /cache/enable_root_access_via_magisk.sh on the phone ... /data/develop/android/scripts_on_linux/enable_root_access_via_magisk.sh: 1 file pushed, 0 skipped. 342.6 MB/s (25391 bytes in 0.000s) Executing the Magisk helper script "/cache/enable_root_access_via_magisk.sh" on the phone now ... Enabling root access for apps by adding entries to the Magisk database OK, running in TWRP TWRP is booted from an image file Using the Magisk binary "/data/adb/magisk/magisk64" Using the Magisk database "/data/adb/magisk.db" Checking the prerequisites ... Checking if the required executables exist ... OK, the file "/data/adb/magisk/magisk64" exists and is executable The Magisk database file "/data/adb/magisk.db" already exists. -rw------- 1 root root 40960 2024-05-05 15:29 /data/adb/magisk.db Checking if the required data files exist ... OK, the file "/data/adb/magisk.db" exists Using the sqlite3 executable "/system/bin/sqlite3" Checking the parameter ... The parameter "2000" is okay The parameter "10227" is okay The parameter "10210" is okay The parameter "10217" is okay The parameter "10212" is okay The parameter "10216" is okay OK, all parameter are okay OK, the installed Magisk version "27.0" is supported Creating a backup of the existing Magisk database in "/data/adb/magisk.db.606.bkp" ... Reading the current entries from the Magisk database ... Current entries in the Magisk database table "policies": uid policy until logging notification ---- ------ ----- ------- ------------ 2000 2 0 1 1 Enabling the root access for these app UIDs: 2000 10227 10210 10217 10212 10216 Processing the UID "2000" ... The entry for the UID "2000" already exists in the Magisk database: OK, root access is already enabled for the UID "2000" Processing the UID "10227" ... Enabling root access for the UID "10227" now ... OK, root access successfully enabled for the UID "10227" Processing the UID "10210" ... Enabling root access for the UID "10210" now ... OK, root access successfully enabled for the UID "10210" Processing the UID "10217" ... Enabling root access for the UID "10217" now ... OK, root access successfully enabled for the UID "10217" Processing the UID "10212" ... Enabling root access for the UID "10212" now ... OK, root access successfully enabled for the UID "10212" Processing the UID "10216" ... Enabling root access for the UID "10216" now ... OK, root access successfully enabled for the UID "10216" Summary root access enabled for 5 UID(s): 10227 10210 10217 10212 10216 root access was already enabled for 1 UID(s): 2000 Current entries in the Magisk database table "policies": uid policy until logging notification ----- ------ ----- ------- ------------ 2000 2 0 1 1 10227 2 0 1 1 10210 2 0 1 1 10217 2 0 1 1 10212 2 0 1 1 10216 2 0 1 1 root access for the UIDs via Magisk successfully enabled Rebooting the phone now ... Parameter for "reboot_phone" are: The current phone status is "1" Will boot the phone using "adb" Rebooting the phone using the command " /usr/bin/adb -d -s M6AIB760D0939LX reboot " now ... Waiting up to 120 second(s) for the phone ...... Booting the phone into the Android OS succeeded after 30 seconds; the current status of the phone is 3 Waiting up to 20 seconds until /data is mounted ... /data is mounted after 0 second(s). Testing if the data partition on the phone is encrypted ... The test directory for the encryption test is "/sdcard/Download" drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/+dt9UDAAAAw,ZI0J3R5lB2aM0YqzhQq2 drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/,p93kCAAAAgC+HXVg1eNE3wc2Vz6SDDv drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/3kII+DAAAAQ8Qe,u2n5a1I9ntkQqv4la -rw-rw---- 1 u0_a197 media_rw 0 2024-05-05 17:37 /data/media/0/4uFL,BAAAAg0os82JH87HJ9ZkutsDpQV -rw-rw---- 1 u0_a197 media_rw 1062 2024-05-05 17:37 /data/media/0/6RgNtCAAAAQ14nJNuiumWK+wwCsachWR drwxrws--- 3 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/92AyhCAAAAQsjdhsk6krrXWId7RrMgjc drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/ApexsAAAAAwM5E0LE54,fIg7wXLKjncn drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/CwHtXDAAAAgzMb9ysJnnq4iBaX5cMdtA drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/GcWaNDAAAAwp,ozUEPvKOIWdgRBMvPAU drwxrws--- 2 root media_rw 3452 2024-05-05 17:29 /data/media/0/HeYOnDAAAAwld+tGXa09dPgYNmcHrWP2 drwxrws--- 3 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/Ir9o5AAAAAQ8B,uilMShj3qL3BiQjAVJ drwxrws--- 4 u0_a197 media_rw 3452 2024-05-05 17:35 /data/media/0/KD09uBAAAAgaIqujtgmO6bIyxZuZG697 -rw-rw---- 1 u0_a197 media_rw 3823 2024-05-05 17:37 /data/media/0/dANF3BAAAAgU7B1RLHwvlJecCbBkIT4B drwxrws--x 5 media_rw media_rw 3452 2024-05-05 17:28 /data/media/0/daT5oDAAAAAQkX03CUdamKDqvrmHOY86 drwxrws--- 3 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/dx59NCAAAAgTvrXQFL63Wo7OTz4GwvgU -rw-rw---- 1 u0_a197 media_rw 578 2024-05-05 17:37 /data/media/0/hsWYUBAAAAwWUpjtR1d2oaJ7SNmSt52m drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/lNe+VDAAAAAYC7+U4e2EgOcYy0i0jVCj drwxrws--- 4 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/pT67pBAAAAwYsuGMFq0W0ZA7GPJjLUis drwxrws--- 2 u0_a197 media_rw 3452 2024-05-05 17:28 /data/media/0/uIkBsDAAAAQIJw9HLD8VlSVbfIgUDxjd The user password is not set - now using the default password from Android (default_password) to decrypt the files The data partition on the phone is encrypted twrp not found -- now decrypting the data partition on the phone using the Android command "input" Waiting up to 150 seconds to complete the decrypting ..... (Waited for 5 second(s)) Waiting up to 30 seconds for the adb daemon to get ready ... the adb daemon is ready after 0 second(s) The adb connection is ready after 0 second(s) Sucessfully decrypted the data partition # --------------------------------------------------------------------- [05.05.2024 17:41 ] ... the script ended with RC=0 ---------------------------------------------------------------------- [05.05.2024 17:41 ] Processing the task "execute_script_on_the_phone" with the parameter "ignorerc" ... [05.05.2024 17:41 ] Executing now "execute_script_on_the_phone ignorerc" ---------------------------------------------------------------------- [05.05.2024 17:41 ] [05.05.2024 17:41 ] *** Executing the script "/data/develop/android/scripts_on_linux/post_install.sh" on the phone ... [05.05.2024 17:41 ] [05.05.2024 17:41 ] The Returncode of the script is ignored [05.05.2024 17:41 ] Waiting for a working adb connection ... Waiting up to 120 seconds for a working adb connection [05.05.2024 17:41 ] The adb connection is working after 0 second(s) Waiting up to 30 seconds for the adb daemon to get ready [05.05.2024 17:41 ] ... the adb daemon is ready after 0 second(s) [05.05.2024 17:41 ] The adb connection is ready after 0 second(s) [05.05.2024 17:42 ] Waiting up to 20 seconds until /data is mounted ... [05.05.2024 17:42 ] /data is mounted after 0 second(s). [05.05.2024 17:42 ] Testing if the data partition on the phone is encrypted ... [05.05.2024 17:42 ] The test directory for the encryption test is "/sdcard/Download" [05.05.2024 17:42 ] The data partition on the phone is either not mounted or not encrypted [05.05.2024 17:42 ] Copying the script "/data/develop/android/scripts_on_linux/post_install.sh" to "/sdcard/Download/post_install.sh" on the phone ... /data/develop/android/scripts_on_linux/post_install.sh: 1 file pushed, 0 skipped. 106.5 MB/s (3745 bytes in 0.000s) [05.05.2024 17:42 ] Now executing the script "/sdcard/Download/post_install.sh" on the phone ... *** Postinstall script is running ... Disabling sound effects ... Enabling WiFi ... Use SIM 1 for phone calls ... Use SIM 1 for data connections ... Disabling mobile data ... Enable logcat for boot messages ... Grant the necessary permission to Magisk now ... Titanium Backup is installed Disabling verify for apps installed over usb ... Grant the necessary permission to Titanum Backup now ... Removing the directories system/priv-app/DocumentsUIGoogle and system/priv-app/DocumentsUI from the MiXplorer Magisk Module ... Waiting 15 seconds now before rebooting - press CTRL-C to abort .... ............... Now rebooting the phone ... ---------------------------------------------------------------------- [05.05.2024 17:42 ] "finish_tasks" is defined - now executing it ... ---------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------- [05.05.2024 17:42 ] *** Task summary : ------------------------------------------------------------------------------------------------------------- [05.05.2024 17:42 ] Tasks executed successfully are: enable_disable_abort_on_error select_twrp_image boot_phone_from_twrp_image install_os select_twrp_image_for_install_image boot_phone_from_twrp_image backup_boot_partition install_magisk_in_boot_partition_only enable_adb execute_script_on_the_phone select_twrp_image install_magisk_in_data_adb_only wait_for_access_via_adb enable_root_access_for_the_shell wait_for_access_via_adb install_magisk_v26_in_boot_partition install_the_magisk_app wait_for_access_via_adb install_archive_file enable_disable_abort_on_error install_essential_scripts execute_script_on_the_phone install_essential_apps install_essential_magisk_modules enable_root_access_for_apps execute_script_on_the_phone ------------------------------------------------------------------------------------------------------------- [05.05.2024 17:42 ] The working directory used is: "/tmp/prepare_phone.sh_WORKDIR.542501" . [05.05.2024 17:42 ] The include file used was : [05.05.2024 17:42 ] -rw-r--r--. 1 xtrnaw7 xtrnaw7 487189 May 5 17:00 /data/develop/android/scripts_on_linux/prepare_phone.include [05.05.2024 17:42 ] The include file used was last edited at: "05.05.2024 /bs" ---------------------------------------------------------------------- [05.05.2024 17:42 ] Execution summary: [05.05.2024 17:42 ] Tasks processed: 26 [05.05.2024 17:42 ] Tasks executed succesfully: 26 [05.05.2024 17:42 ] Tasks executed with errors: 0 [05.05.2024 17:42 ] Tasks not executed on request: 0 [05.05.2024 17:42 ] Tasks not found: 0 [05.05.2024 17:42 ] ### The logfile used was /var/tmp/prepare_phone.sh.log [05.05.2024 17:42 ] ### The start time was 05.05.2024 17:21:28, the script runtime is (day:hour:minute:seconds) 0:00:20:55 (= 1255 seconds) [05.05.2024 17:42 ] ### prepare_phone.sh ended at 05.05.2024 17:42:23 (The PID of this process is 542501; the RC is 0)