kgursu
kgursu
On some apps the rotation of screen refreshes the task it is running, in this case scanning of all apps. It might occur in this regard, I'm not sure about...
I could not access them right now. Should I install Kitsune Mask again? It seems so. The only way to access them after these bootlops are while connecting the device...
[magisk.log](https://github.com/HuskyDG/magisk-files/files/14170918/magisk.log) [magisk.log.bak.log](https://github.com/HuskyDG/magisk-files/files/14170923/magisk.log.bak.log) Sent cache logs.
[magisk_log_2024-02-05T22.01.42.log](https://github.com/HuskyDG/magisk-files/files/14170928/magisk_log_2024-02-05T22.01.42.log) And this one I could get from inside Magisk.
So, bootloop might be caused by some module or a remnant from previous Delta install.
I properly attached files now. Please look these...
Update after installing R65C33E4F.   Log files: [bootlog-2024-02-07-16-45-21.tar.gz](https://github.com/HuskyDG/magisk-files/files/14194709/bootlog-2024-02-07-16-45-21.tar.gz) Magisk log from inside Magisk: [magisk_log_2024-02-07T16.48.32.log](https://github.com/HuskyDG/magisk-files/files/14194715/magisk_log_2024-02-07T16.48.32.log) Magisk logs from cache directory: [magisk.log](https://github.com/HuskyDG/magisk-files/files/14194719/magisk.log) [magisk.log.bak.log](https://github.com/HuskyDG/magisk-files/files/14194720/magisk.log.bak.log)
> [@F3FFO](https://github.com/F3FFO) > > ``` > availableByDefault="true" > description="Cromite WebView" > packageName="com.android.webview"> > MIIEzzCCAregAwIBAgIIe3EoNsMIx7QwDQYJKoZIhvcNAQENBQAwFTETMBEGA1UEAxMKQ3JvbWl0ZU9yZzAgFw0yMzA3MTkxMTI1MjBaGA8yMDUwMTIwNDExMjUyMFowFTETMBEGA1UEAxMKQ3JvbWl0ZU9yZzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKZcpHyZ3cAQ7kUwR4gtIG5bf7ZzW29aidEw2ShUuOIL7u1pk/xgyTAQk9CZMO3PjMFJiCpv84ILwwpqgF+nLFCdnOMizApD138qxLENnHcGOJ+vxNdIsLk9NwbK8BmtT4SXclta5QOy246+DtM0Lysf7QxuQ0KCPeia8n/JTBy+YbeRhHxfXlgdO8LScOVdcvC/Be+5uAylUcbCQX0xcgSvDXBGX3OcIQ+kpPbocDkR+H01V6KY8BZI5g2iULyRjoqAvJT6rdeWzK4mHfXKYhEu1xrhWs5mQCbvp/ZYTmEcyoBvJE2lj+qRxgQDUh6XX41NIjjMiZuVtyyWDcsAsO3cGSghDWFbHrnIans90/GH37KSxMRPazSEinLem6bUfZye6U2SaP+pf4emv8SZLJXQJh5Uwsx4OOOGl7MFQKgyXEMJCS+6JKXFgg4FroFti5zir/1dSg4xwhmkM8+wgXuX2Gnb/5yTPcCX4VV9Ugg2xiblart4iixST66CNfqLHeFOQ9yy7fV8DzjbZY/zCxNflgr+839Q/74fHCvK22byMZ0f7BoWIvIi/1eex1Wjmpgk2WPyLEbhtbfNXR78xDFVQFc4GqO6PtbRsA6EUy2GBnrkiqaBjMP4Q11hkOd+zJ/IafNAKoYvdwKWDa/YOMiKCatsrPA6TyooZpY936pHAgMBAAGjITAfMB0GA1UdDgQWBBSwECBD7Hxf98TW2Qt1HyvplUshAjANBgkqhkiG9w0BAQ0FAAOCAgEAG39YouUPiHZKPQslEP3VXmyz6vIPk5kPygZegrVCPqL8XesxiO8cCRpILNq+C2vj03wzWf5BM7zz75E+Eil1CURQ0NQ2zJVLnxQF32cbyiEg+VU6E2BA24qgUkfNHKcrwURacci7SF9cRFfLKUiY/1MlwF/aKYOuAhbGEHLRIyQHNvAd1pd+mYLpa2yMxDoIi/OnRQ4lwnBYFCN9CIwdU3NQKnioTYaURTKhrQtSmgB5wVsZbqIbqdkSS9UIGodCW6aU3zEpkY1Oqhu++J4h8/ydfKf2RcaCz3EF8nM9G3BlNsbYEi2A+Ev/T2EbXC4b+QQmnjdVOxZgdKj7ul6z9EzfPxBn/A0Yl/5Iecj1sE92aBOqxdFKK8NQMT/AJbCkU8XurwRSHR4hY5F/EjzBsN4v7s2KtmkXyzmmp4skABebThypKautc93hzv+ZMILJbqyKvUkuUYs5gR1CHINn4xJLYdCDlGfdqno2IAHWKakV2uOGpcDCFFzf5ZUZ3PvmM/dnme7gYhYPFEgffMrknrNbERr9lIX4USAu5yDJ6vVAQp6/UZo1W+sM9uuTvt2J1ktkoJH9pDRB3mIrJDAKatO1BrZ8CW4mu/xqsmfM3k6gvawc6LH6G0g3+zvxvYQBI+fEdY2dzlUpAqEWuaT7IRttNOV+XW9Yn+k99J8nXGg= > > ``` How to temporarily use these lines to bypass the current download and install...