Register Guidelines E-Books Today's Posts Search

Go Back   MobileRead Forums > E-Book Readers > Onyx Boox

Notices

Reply
 
Thread Tools Search this Thread
Old 12-26-2025, 02:51 AM   #31
Renate
Onyx-maniac
Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.Renate ought to be getting tired of karma fortunes by now.
 
Posts: 4,280
Karma: 20532355
Join Date: Feb 2012
Location: Germany
Device: Nook NST, Glow2, 3, 4, '21, Kobo Aura2, Poke3, Poke5, Go6
Are we having fun yet?
Code:
flatten /v abl /d
32 bit ELF
0000  ZERO
0010  FSS2
0020  Length  00022000
0028  Sig     _FVH
002c  Attr    0003feff
0030  HdrLen  0048
0032  Check   d3be -> 0000
0034  ExtHdr  0000
0037  Vers    2
0038  Blocks  000110 x 0200 -> 00022000
0048  IMG
0058  Check   16 -> 00
005c  Size1   01ebc0
0060  Size2   01eba8
0064  LZMA
----------
0008  ZERO
0018  FSS2
0028  Length  0006a0c0
0030  Sig     _FVH
0034  Attr    0003feff
0038  HdrLen  0048
003a  Check   3ae7 -> 0000
003c  ExtHdr  0060
003f  Vers    2
0040  Blocks  001a83 x 0040 -> 0006a0c0
0050  ONES
0068  QCOM
0080  APP1
009c  LL
00b8  MZ
0f10  PE
10b8  Code

Last edited by Renate; 12-26-2025 at 03:24 AM.
Renate is offline   Reply With Quote
Old 12-27-2025, 01:31 PM   #32
darkwill
Member
darkwill began at the beginning.
 
Posts: 17
Karma: 10
Join Date: Dec 2025
Device: Boox Note Air 5c
I found someone managed to root Palma 2 Pro by flashing fairphone images to get the fastboot unlock commands working.

https://github.com/jdkruzr/BooxPalma2RootGuide/issues/9
darkwill is offline   Reply With Quote
Old 12-28-2025, 02:45 PM   #33
Kisuke-CZE
Enthusiast
Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.
 
Posts: 33
Karma: 53196
Join Date: Apr 2018
Device: Kobo Forma, Onyx Boox Palma 2 Pro
Oh, thank you guys very much. Last comment put me on right track. My Palma 2 Pro is now unlocked and rooted.

Working procedure is this.

BEWARE - THIS PROCEDURE WILL WIPE YOUR DATA!

Preparing tools

Get edl utility

Get Palma loader file for EDL utility:
Code:
wget -O palma2pro.bin 'https://github.com/bkerler/Loaders/raw/refs/heads/main/lenovo_motorola/0000000000000000_bdaf51b59ba21d8a_fhprg.bin'
Get latest available eOS build for Fairphone 4 Android 15 from eOS site. I used this specifically.

From that Fairphone 4 image, extract abl.img somewhere. I will reference it as abl-fp4.img in the process.

Reboot phone into bootloader with
Code:
adb reboot bootloader
then issue
Code:
fastboot getvar current-slot
Note down that letter. For me it was and rest of the guide I will be using slot `a`. Do adjust those commands for your active slot.

Backing up data

Put the device into EDL mode with
Code:
adb reboot edl
Now do the backup of the device. Best way how to do that is backing up all partitions.
This takes about 1 hour and backup is about 128GB in size.
It is optional, but highly recommended. Can be done with command (folder stock_partitions_backup must exists):
Code:
edl --loader=palma2pro.bin --memory=ufs rl stock_partitions_backup/
Now let's backup the important stuff only. This cannot be skipped:
Code:
mkdir stock_backup
edl --loader=palma2pro.bin --memory=ufs r devinfo stock_backup/devinfo.img
edl --loader=palma2pro.bin --memory=ufs r boot_a stock_backup/boot_a.img
edl --loader=palma2pro.bin --memory=ufs r boot_b stock_backup/boot_b.img
edl --loader=palma2pro.bin --memory=ufs r vbmeta_a stock_backup/vbmeta_a.img
edl --loader=palma2pro.bin --memory=ufs r vbmeta_b stock_backup/vbmeta_b.img
edl --loader=palma2pro.bin --memory=ufs r vbmeta_system_a stock_backup/vbmeta_system_a.img
edl --loader=palma2pro.bin --memory=ufs r vbmeta_system_b stock_backup/vbmeta_system_b.img
edl --loader=palma2pro.bin --memory=ufs r recovery_a stock_backup/recovery_a.img
edl --loader=palma2pro.bin --memory=ufs r recovery_b stock_backup/recovery_b.img
edl --loader=palma2pro.bin --memory=ufs r abl_a stock_backup/abl_a.img
edl --loader=palma2pro.bin --memory=ufs r abl_b stock_backup/abl_b.img
Unlocking bootloader

Unfortunately Boox firmware does not allow unlocking device. But since hardware is similar to Fairphone 4 we will take Fairphone image to help.

Get into edl mode again with
Code:
adb reboot edl
Then issue those commands to write FP4 ABL into Palma (not sure why, but for me it was needed to write into both slots):

Code:
edl --loader=palma2pro.bin --memory=ufs w abl_a abl-fp4.img
edl --loader=palma2pro.bin --memory=ufs w abl_b abl-fp4.img
Now use your activeslot you noted before (my palma was not booting without this) and reboot device:
Code:
edl --loader=palma2pro.bin setactiveslot a
edl --loader=palma2pro.bin reset
Go into android settings.

Select System submenu.

Then select Developer options.

In those go to Developer options enable OEM unlocking.

Reboot the device.

Now we will proceed to unlocking bootloader. Your data will be WIPED from the device. There is no going back! Ready?

Reboot into bootloader with
Code:
adb reboot bootloader
You should get BOOX logo on screen and command
Code:
fastboot devices
should see the device.

Issue
Code:
fastboot flashing unlock
to begin unlocking.

On screen there will still bee BOOX logo, nothing visible.
Press Vol Up once, and then Power button.
Now device will automatically reboot few times and wipes all your data.

Now you are with clear device in defaults. Enable ADB in settings again. And issue
Code:
adb reboot bootloader
Issue
Code:
fastboot flashing unlock_critical
AGAIN: On screen there will still bee BOOX logo, nothing visible.
Press Vol Up once, and then Power button.
Device will automatically reboot few times and wipes all your data once again.

Now you have unlocked device.
Issuing fastboot oem device-info should say something like:
Code:
(bootloader) Verity mode: true
(bootloader) Device unlocked: true
(bootloader) Device critical unlocked: true
(bootloader) Charger screen enabled: true
Rooting with Magisk

From now the rooting procedure can be done as on Palma 2.

Install Magisk to your Palma

Push your backed up boot image for your activeslot onto Palma
Code:
adb push stock_backup/boot_a.img /sdcard/
Patch the boot image using Magisk in your phone. Note the filename and use it in next command.

Then download it back to your computer
Code:
adb pull /sdcard/Download/magisk_patched-30600_x1Hl9.img boot_a_patched.img
Reboot Palma into EDL mode
Code:
adb reboot edl
Write modified image into Palma and reboot it:
Code:
edl --loader=palma2pro.bin --memory=ufs w boot_a boot_a_patched.img
edl --loader=palma2pro.bin reset
Congrats! Your Palma is rooted now!

If you want, you can now flash back the stock ABL images back into Palma.
I do recommend it, because without it, device was kinda unstable and for example launching Onyx settings from top-tray did not worked (after flashing original ABL it did worked)
Code:
edl --loader=palma2pro.bin --memory=ufs w abl_a stock_backup/abl_a.img
edl --loader=palma2pro.bin --memory=ufs w abl_b stock_backup/abl_b.img
Procedure is described in Github repository.
Kisuke-CZE is offline   Reply With Quote
Old 12-29-2025, 10:33 AM   #34
Kisuke-CZE
Enthusiast
Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.
 
Posts: 33
Karma: 53196
Join Date: Apr 2018
Device: Kobo Forma, Onyx Boox Palma 2 Pro
Hi,

I am trying to continue in mission of modifying Palma 2 Pro.

My thinking was, that maybe I could make it reliable phone for incoming calls. So I am trying to replace various components from Palma 2 Pro software with software from FP4.

I am using magic_overlayfs to be able to write into /system partition.

But I did run into another problem. When I replace system app, it refuses to function.

For example replacing TeleService app:
Code:
adb push ../apk_from_fairphone/TeleService.* /tmp/
adb shell
su -mm -c magic_remount_rw
su
cp /tmp/TeleService.apk /system/priv-app/TeleService/TeleService.apk
cp /tmp/TeleService.odex /system/priv-app/TeleService/oat/arm64/TeleService.odex
cp /tmp/TeleService.vdex /system/priv-app/TeleService/oat/arm64/TeleService.vdex
su -mm -c magic_remount_ro
exit
exit
adb reboot
Unfortunately on next boot it does not work. Ends up with this error:
Code:
12-29 15:17:29.359  7481  7481 E System  : ******************************************
12-29 15:17:29.359  7481  7481 E System  : ************ Failure starting system services
12-29 15:17:29.359  7481  7481 E System  : java.lang.IllegalStateException: Signature mismatch on system package com.android.phone for shared user SharedUserSetting{ee5270f android.uid.phone/1001}
12-29 15:17:29.359  7481  7481 E System  : 	at com.android.server.pm.ReconcilePackageUtils.reconcilePackages(ReconcilePackageUtils.java:284)
12-29 15:17:29.359  7481  7481 E System  : 	at com.android.server.pm.InstallPackageHelper.addForInitLI(InstallPackageHelper.java:3960)
12-29 15:17:29.359  7481  7481 E System  : 	at com.android.server.pm.InstallPackageHelper.installPackagesFromDir(InstallPackageHelper.java:3704)
12-29 15:17:29.359  7481  7481 E System  : 	at com.android.server.pm.InitAppsHelper.scanDirTracedLI(InitAppsHelper.java:377)
12-29 15:17:29.359  7481  7481 E System  : 	at com.android.server.pm.InitAppsHelper.scanSystemDirs(InitAppsHelper.java:345)
12-29 15:17:29.359  7481  7481 E System  : 	at com.android.server.pm.InitAppsHelper.initSystemApps(InitAppsHelper.java:178)
12-29 15:17:29.359  7481  7481 E System  : 	at com.android.server.pm.PackageManagerService.<init>(PackageManagerService.java:2292)
12-29 15:17:29.359  7481  7481 E System  : 	at com.android.server.pm.PackageManagerService.main(PackageManagerService.java:1763)
12-29 15:17:29.359  7481  7481 E System  : 	at com.android.server.SystemServer.startBootstrapServices(SystemServer.java:1259)
12-29 15:17:29.359  7481  7481 E System  : 	at com.android.server.SystemServer.run(SystemServer.java:945)
12-29 15:17:29.359  7481  7481 E System  : 	at com.android.server.SystemServer.main(SystemServer.java:666)
12-29 15:17:29.359  7481  7481 E System  : 	at java.lang.reflect.Method.invoke(Native Method)
12-29 15:17:29.359  7481  7481 E System  : 	at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:580)
12-29 15:17:29.359  7481  7481 E System  : 	at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:870)
12-29 15:17:29.359  7481  7481 E Zygote  : System zygote died with fatal exception
12-29 15:17:29.359  7481  7481 E Zygote  : java.lang.IllegalStateException: Signature mismatch on system package com.android.phone for shared user SharedUserSetting{ee5270f android.uid.phone/1001}
12-29 15:17:29.359  7481  7481 E Zygote  : 	at com.android.server.pm.ReconcilePackageUtils.reconcilePackages(ReconcilePackageUtils.java:284)
12-29 15:17:29.359  7481  7481 E Zygote  : 	at com.android.server.pm.InstallPackageHelper.addForInitLI(InstallPackageHelper.java:3960)
12-29 15:17:29.359  7481  7481 E Zygote  : 	at com.android.server.pm.InstallPackageHelper.installPackagesFromDir(InstallPackageHelper.java:3704)
12-29 15:17:29.359  7481  7481 E Zygote  : 	at com.android.server.pm.InitAppsHelper.scanDirTracedLI(InitAppsHelper.java:377)
12-29 15:17:29.359  7481  7481 E Zygote  : 	at com.android.server.pm.InitAppsHelper.scanSystemDirs(InitAppsHelper.java:345)
12-29 15:17:29.359  7481  7481 E Zygote  : 	at com.android.server.pm.InitAppsHelper.initSystemApps(InitAppsHelper.java:178)
12-29 15:17:29.359  7481  7481 E Zygote  : 	at com.android.server.pm.PackageManagerService.<init>(PackageManagerService.java:2292)
12-29 15:17:29.359  7481  7481 E Zygote  : 	at com.android.server.pm.PackageManagerService.main(PackageManagerService.java:1763)
12-29 15:17:29.359  7481  7481 E Zygote  : 	at com.android.server.SystemServer.startBootstrapServices(SystemServer.java:1259)
12-29 15:17:29.359  7481  7481 E Zygote  : 	at com.android.server.SystemServer.run(SystemServer.java:945)
12-29 15:17:29.359  7481  7481 E Zygote  : 	at com.android.server.SystemServer.main(SystemServer.java:666)
12-29 15:17:29.359  7481  7481 E Zygote  : 	at java.lang.reflect.Method.invoke(Native Method)
12-29 15:17:29.359  7481  7481 E Zygote  : 	at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:580)
12-29 15:17:29.359  7481  7481 E Zygote  : 	at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:870)
12-29 15:17:29.359  7481  7481 D AndroidRuntime: Shutting down VM
12-29 15:17:29.359  7481  7481 E AndroidRuntime: *** FATAL EXCEPTION IN SYSTEM PROCESS: main
I will try to search for some answers. But maybe there will be again someone smarter who did this in past.
Kisuke-CZE is offline   Reply With Quote
Old 12-29-2025, 11:39 AM   #35
amperage4255
Member
amperage4255 began at the beginning.
 
Posts: 15
Karma: 10
Join Date: Dec 2025
Device: Boox Air 4C
Quote:
Originally Posted by Kisuke-CZE View Post
Oh, thank you guys very much. Last comment put me on right track. My Palma 2 Pro is now unlocked and rooted.

Working procedure is this.

BEWARE - THIS PROCEDURE WILL WIPE YOUR DATA!

Preparing tools

Get edl utility

Get Palma loader file for EDL utility:
Code:
wget -O palma2pro.bin 'https://github.com/bkerler/Loaders/raw/refs/heads/main/lenovo_motorola/0000000000000000_bdaf51b59ba21d8a_fhprg.bin'
Get latest available eOS build for Fairphone 4 Android 15 from eOS site. I used this specifically.

From that Fairphone 4 image, extract abl.img somewhere. I will reference it as abl-fp4.img in the process.

Reboot phone into bootloader with
Code:
adb reboot bootloader
then issue
Code:
fastboot getvar current-slot
Note down that letter. For me it was and rest of the guide I will be using slot `a`. Do adjust those commands for your active slot.

Backing up data

Put the device into EDL mode with
Code:
adb reboot edl
Now do the backup of the device. Best way how to do that is backing up all partitions.
This takes about 1 hour and backup is about 128GB in size.
It is optional, but highly recommended. Can be done with command (folder stock_partitions_backup must exists):
Code:
edl --loader=palma2pro.bin --memory=ufs rl stock_partitions_backup/
Now let's backup the important stuff only. This cannot be skipped:
Code:
mkdir stock_backup
edl --loader=palma2pro.bin --memory=ufs r devinfo stock_backup/devinfo.img
edl --loader=palma2pro.bin --memory=ufs r boot_a stock_backup/boot_a.img
edl --loader=palma2pro.bin --memory=ufs r boot_b stock_backup/boot_b.img
edl --loader=palma2pro.bin --memory=ufs r vbmeta_a stock_backup/vbmeta_a.img
edl --loader=palma2pro.bin --memory=ufs r vbmeta_b stock_backup/vbmeta_b.img
edl --loader=palma2pro.bin --memory=ufs r vbmeta_system_a stock_backup/vbmeta_system_a.img
edl --loader=palma2pro.bin --memory=ufs r vbmeta_system_b stock_backup/vbmeta_system_b.img
edl --loader=palma2pro.bin --memory=ufs r recovery_a stock_backup/recovery_a.img
edl --loader=palma2pro.bin --memory=ufs r recovery_b stock_backup/recovery_b.img
edl --loader=palma2pro.bin --memory=ufs r abl_a stock_backup/abl_a.img
edl --loader=palma2pro.bin --memory=ufs r abl_b stock_backup/abl_b.img
Unlocking bootloader

Unfortunately Boox firmware does not allow unlocking device. But since hardware is similar to Fairphone 4 we will take Fairphone image to help.

Get into edl mode again with
Code:
adb reboot edl
Then issue those commands to write FP4 ABL into Palma (not sure why, but for me it was needed to write into both slots):

Code:
edl --loader=palma2pro.bin --memory=ufs w abl_a abl-fp4.img
edl --loader=palma2pro.bin --memory=ufs w abl_b abl-fp4.img
Now use your activeslot you noted before (my palma was not booting without this) and reboot device:
Code:
edl --loader=palma2pro.bin setactiveslot a
edl --loader=palma2pro.bin reset
Go into android settings.

Select System submenu.

Then select Developer options.

In those go to Developer options enable OEM unlocking.

Reboot the device.

Now we will proceed to unlocking bootloader. Your data will be WIPED from the device. There is no going back! Ready?

Reboot into bootloader with
Code:
adb reboot bootloader
You should get BOOX logo on screen and command
Code:
fastboot devices
should see the device.

Issue
Code:
fastboot flashing unlock
to begin unlocking.

On screen there will still bee BOOX logo, nothing visible.
Press Vol Up once, and then Power button.
Now device will automatically reboot few times and wipes all your data.

Now you are with clear device in defaults. Enable ADB in settings again. And issue
Code:
adb reboot bootloader
Issue
Code:
fastboot flashing unlock_critical
AGAIN: On screen there will still bee BOOX logo, nothing visible.
Press Vol Up once, and then Power button.
Device will automatically reboot few times and wipes all your data once again.

Now you have unlocked device.
Issuing fastboot oem device-info should say something like:
Code:
(bootloader) Verity mode: true
(bootloader) Device unlocked: true
(bootloader) Device critical unlocked: true
(bootloader) Charger screen enabled: true
Rooting with Magisk

From now the rooting procedure can be done as on Palma 2.

Install Magisk to your Palma

Push your backed up boot image for your activeslot onto Palma
Code:
adb push stock_backup/boot_a.img /sdcard/
Patch the boot image using Magisk in your phone. Note the filename and use it in next command.

Then download it back to your computer
Code:
adb pull /sdcard/Download/magisk_patched-30600_x1Hl9.img boot_a_patched.img
Reboot Palma into EDL mode
Code:
adb reboot edl
Write modified image into Palma and reboot it:
Code:
edl --loader=palma2pro.bin --memory=ufs w boot_a boot_a_patched.img
edl --loader=palma2pro.bin reset
Congrats! Your Palma is rooted now!

If you want, you can now flash back the stock ABL images back into Palma.
I do recommend it, because without it, device was kinda unstable and for example launching Onyx settings from top-tray did not worked (after flashing original ABL it did worked)
Code:
edl --loader=palma2pro.bin --memory=ufs w abl_a stock_backup/abl_a.img
edl --loader=palma2pro.bin --memory=ufs w abl_b stock_backup/abl_b.img
Procedure is described in Github repository.
Would this also be a viable solution for the Air 4C, I am currently stuck using what appears to be a old github for root instruction. Any assistance is much appreciated. I just want to debloat my boox so it doesn't sound off on the internet.

Thank you
amperage4255 is offline   Reply With Quote
Old 12-31-2025, 01:06 PM   #36
Kisuke-CZE
Enthusiast
Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.Kisuke-CZE is no e-book dilettante.
 
Posts: 33
Karma: 53196
Join Date: Apr 2018
Device: Kobo Forma, Onyx Boox Palma 2 Pro
Regarding using system apps from different device.

I got little bit further. Found all apps that shares sharedUserId="android.uid.phone"
Replaced them.

But id does not work (but I kinda expected that after reading something about it).
Palma now accepts the package itself. But it won't grant them privileged permissions protected by signature (unless packages are signed with some correct keys used to build system - so Onyx keys).

Error at boot is following:
Code:
12-31 17:29:55.809  1484  1484 E AndroidRuntime: *** FATAL EXCEPTION IN SYSTEM PROCESS: main
12-31 17:29:55.809  1484  1484 E AndroidRuntime: java.lang.IllegalStateException: Signature|privileged permissions not in privileged permission allowlist: {com.android.stk (/system/app/Stk): android.permission.RECEIVE_STK_COMMANDS, com.android.stk (/system/app/Stk): android.permission.REAL_GET_TASKS, com.qualcomm.atfwd (/system_ext/app/atfwd): android.permission.MASTER_CLEAR, com.qti.qualcomm.deviceinfo (/system_ext/app/DeviceInfo): android.permission.CONTROL_INCALL_EXPERIENCE, com.android.stk (/system/app/Stk): android.permission.USER_ACTIVITY, com.android.stk (/system/app/Stk): android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME, com.qualcomm.qti.uceShimService (/system_ext/app/uceShimService): android.permission.READ_PRIVILEGED_PHONE_STATE, com.android.stk (/system/app/Stk): android.permission.START_ACTIVITIES_FROM_BACKGROUND}
12-31 17:29:55.809  1484  1484 E AndroidRuntime: 	at com.android.server.permission.access.permission.AppIdPermissionPolicy.onSystemReady(AppIdPermissionPolicy.kt:1625)
12-31 17:29:55.809  1484  1484 E AndroidRuntime: 	at com.android.server.permission.access.AccessPolicy.onSystemReady(AccessPolicy.kt:275)
12-31 17:29:55.809  1484  1484 E AndroidRuntime: 	at com.android.server.permission.access.AccessCheckingService.onSystemReady$frameworks__base__services__permission__android_common__services_permission_pre_jarjar(AccessCheckingService.kt:239)
12-31 17:29:55.809  1484  1484 E AndroidRuntime: 	at com.android.server.permission.access.permission.PermissionService.onSystemReady(PermissionService.kt:2295)
12-31 17:29:55.809  1484  1484 E AndroidRuntime: 	at com.android.server.pm.permission.PermissionManagerService$PermissionManagerServiceInternalImpl.onSystemReady(PermissionManagerService.java:772)
12-31 17:29:55.809  1484  1484 E AndroidRuntime: 	at com.android.server.pm.PackageManagerService.systemReady(PackageManagerService.java:4285)
12-31 17:29:55.809  1484  1484 E AndroidRuntime: 	at com.android.server.SystemServer.startOtherServices(SystemServer.java:2981)
12-31 17:29:55.809  1484  1484 E AndroidRuntime: 	at com.android.server.SystemServer.run(SystemServer.java:947)
12-31 17:29:55.809  1484  1484 E AndroidRuntime: 	at com.android.server.SystemServer.main(SystemServer.java:666)
12-31 17:29:55.809  1484  1484 E AndroidRuntime: 	at java.lang.reflect.Method.invoke(Native Method)
12-31 17:29:55.809  1484  1484 E AndroidRuntime: 	at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:580)
12-31 17:29:55.809  1484  1484 E AndroidRuntime: 	at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:870)

There is probably no easy way around this. Nothing I know of.

Only option I found reading some docs is to build whole Android for Palma using some generated keys. And then sign the packages with those keys.
That would mean create custom ROM.
That is outside of my skills.
Kisuke-CZE is offline   Reply With Quote
Reply


Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Palma 2 Pro Notes App ? itsme2020 Onyx Boox 7 12-20-2025 02:20 PM
Palma 3 in 2025? norweger Onyx Boox 10 04-13-2025 12:10 PM
Palma 2 Released twowheels Onyx Boox 62 01-10-2025 05:18 AM
Rooting: Onyx Boox Note Pro - Build 2019-06-12 hansipansi65 Onyx Boox 12 01-25-2020 03:52 AM
Rooting the Poke Pro bel3atar Onyx Boox 13 04-14-2019 10:49 PM


All times are GMT -4. The time now is 02:32 PM.


MobileRead.com is a privately owned, operated and funded community.