New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Stuck at the "Google" screen after flashing #1
Comments
I looked at the log posted in one of your links and didn't see anything obvious. I don't have a Pixel 4a, so it will be hard for me to test. Does it happen every time, or is it intermittent? From a glance at the kernel zip, boot is the only partition modified. Would you be willing to post a dump of the stock partition and the modified one after flashing both with Kernel Flasher and FKM? I'm not sure why the latter two would be different, since the actual write should be handled by AK3 in both cases, but it might be a good first step. |
So the following includes the stock boot partition and the stock-rooted one. I am flashing the custom kernel based on the latter. I have included the resulting boot.img from 'stock-rooted -> custom' via FKM and KernelFlasher. Link: https://wormhole.app/D3Q8J#le7SnR_yQmni1Ds3zJMiMQ What I additionally noticed was that after flashing the custom Kernel with KernelFlasher, the KernelFlasher app crashes and can't be opened again! .. Even when clearing its cache + local storage.
I think it happens everytime, but I can't say that for sure. |
Once I flash the (working) backup of stock-rooted manually via dd, KernelFlasher opens again just fine |
Thanks for the files. I've got them downloaded and will take a peek at them shortly.
It sounds like it's flashing a bad image to boot and can't read that image on startup. Does it open to a error screen, or is it a hard crash? Once the issue with flashing goes away, the inability to open the app should as well, but if you'll provide a logcat during the crash, I can try to catch the specific issue and at least display a useful error message. If you reflash in KernelFlasher to get the crash logcat, the flash log from FKM when you revert might also be useful. |
I'm able to unpack the KernelFlasher flashed image, but magiskboot throws I'm curious if you can can copy, unpack, and extract the files if performed directly from the terminal. You can test it with the following commands:
If for some reason it doesn't work there, can you also try in Edit: Also, what is the output of |
Thank you for investigating!
A hard crash, I will attach the logcat in the .zip
I have attached the FKM log from 'stock-root -> custom'
stock-rooted -> yes
|
I didn't get to your zip in time, if you wouldn't mind sharing it again. I'll be out of pocket for two days beginning in the morning, so if it doesn't let you set an expiration beyond that, we may need to wait until I return or use a different file host. Maybe we can try running the AK3 zip directly, just to rule out something with the environment (assuming the zip is in
You may have also included it in the previous zip, but might be interesting to see the logcat during a failed flash, as well. |
When I execute those commands I get:
New Link: https://send.q1q.wtf/download/db7608ac460bc63c/#ANDNn9RQbjYxdxJgmB4U3w |
Sorry for the delay in getting back to you on this. I just returned home from nearly two weeks on the road yesterday and am still playing a bit of catch up. Now that I'm home, I have access to a Pixel 6a to run a few tests. I probably forgot a step somewhere with running AK3 directly. I'll have to track down the script I was using before I wrote Kernel Flasher. |
I couldn't immediately find my old version, but I found the script that was the basis for that script that developed into Kernel Flasher. I reworked it to basically the same thing Kernel Flasher does in the background. I reduced the latest stock AK3 to just the Once you have those two files, run the following commands:
In theory, you should get output similar to this. Edit: If the above works, it might also be interesting to flash that zip in Kernel Flasher and see if you get any errors. Note: I tested both the command line and Kernel Flasher operations with success on Pixel 6a and Pixel 7 (on |
I realized |
Hey, this seems to work fine, here are the logs I got: logs.zip |
There's obviously no issue with unpacking the image or extracting the ramdisk in Kernel Flasher on your device. It's weird that it has trouble in the write phase. It might be interesting to patch blu_spark_r171-1-pxl4a.patch.gz Assuming you have the above patch and
Note: This one will actually flash blu_spark r171 to your device. I patched blu_spark_r171-2-pxl4a.patch.gz Assuming you have the above patch,
Note: This one will not actually flash anything, as it will create a If you have any trouble generating the zips, let me know, and maybe I can share them with you directly via DM on XDA or elsewhere. I would rather not host blu_spark test builds publicly, if only to avoid the possibility of someone ending up with them by accident. Since there were no major changes to the relevant file in blu_spark r172, you can apply those same patches to it instead, if you prefer. I used r171 in my testing just to make it easier to compare against your logs. Note: The Sorry for the wall of text, but hopefully I didn't miss anything. Thanks for your help with debugging this. |
Someone shared a |
Since the ramdisk is fine here and here but throws an error here, I'm guessing the issue is here or here. The With the kernel zip and a good
I intentionally left out the bits copying the ramdisk files from the kernel zip to isolate it, so if the above works without a
You can clean up with:
Edit: I'm guessing the second set of commands is unnecessary, as a kernel zip for another device with the same issue here doesn't contain that folder. Edit 2: If it works directly from the command line, here's a zip (patch) to try it in Kernel Flasher: |
The issue has been isolated. See here, here, here, here, and here for more info. AK3 uses busybox rather than toybox, but it was affected in the same way and hasn't been patched. It is inconsistent between devices as it was patched in the kernel, and some devices may not have gotten the patch. The solution was to basically chroot the flashing environment, which works around the issue. FKM and likely EXKM were already doing this or something very similar, which is why they weren't affected. |
A test build with the fix included, v1.0.0-alpha12+tempfs, is on the releases page. I'll close this issue when I merge it into main. Thanks for the report and your help in getting this debugged. |
fixed in c834f5f and released in v1.0.0-alpha14 |
Using FKM instead worked fine. Others seem to have the same problem:
https://forum.xda-developers.com/t/kernel-blu_spark-r171-a13-jan-2023.4182455/post-87337427
https://forum.xda-developers.com/t/kernel-blu_spark-r171-a13-jan-2023.4182455/post-87940883
The text was updated successfully, but these errors were encountered: