Available android x86 8.1 for MicroG

493 views
Skip to first unread message

Alberto Pajuelo Montes

unread,
Nov 9, 2018, 5:02:24 AM11/9/18
to Android-x86

For all those who wants a fully open source Android x86 build is available my own custom build of Android x86 patched with signature spoofing enabled and MicroG services and F-droid preinstalled without the propietary google apps.


Enjoy.


Download link:

https://drive.google.com/open?id=12fDzYy1prHvziKh4IzuchjQ8duGe_MiP

Jon West

unread,
Nov 11, 2018, 8:48:28 PM11/11/18
to Android-x86
For those that would like to experiment with this, all that is needed is to remove vendor/opengapps, and $ git clone https://github.com/lineageos4microg/android_prebuilts_prebuiltapks vendor/fdroid (or wherever) Then add the packages to your packages.mk in device/generic/common.

Alberto Pajuelo Montes

unread,
Nov 12, 2018, 8:36:07 AM11/12/18
to Android-x86
You will need also to apply the signature spoofing patch from the git repo https://github.com/microg/android_packages_apps_GmsCore/tree/master/patches before compiling. To be able to have signature spoofing working, with is needed for MicroG to work correctly.

Instructions on how to apply the patch to the android source code can be found here:


Regards!

youling 257

unread,
Nov 12, 2018, 8:53:51 AM11/12/18
to Android-x86
I see MicroG not support chrome sync.

youling 257

unread,
Nov 12, 2018, 8:57:15 AM11/12/18
to Android-x86
I installed magisk 17.3 on Androidx86 8.1, and flash NanoDroid-microG-19.1.1.20181103.zip succeed.
Message has been deleted

John Doe

unread,
Sep 10, 2019, 6:42:45 PM9/10/19
to Android-x86
Can you give some details about the rom generating procedure?
Did you just enabled signature spoofing via patch (like NanoPatcher) on a compiled rom or you compiled it from scratch with spoof support enabled?
Since Relese 2 of Oreo is now available, I've tried to enable microG but I'm having problems enabling signature spoofing.
Here's what I've tried:
1) - Used Haystack and SmaliPatcher to try and patch services.jar but failed (since rom is odexed)
    - Used vdexExtractor to extract services.dex and packed it back into services.jar. Still fails.
2) - Used Tingle to patch (deodexed) framework.jar (took dex files from boot-framework.vdex) but when I put it back and restart the signature spoofing is still not working.
I'm not sure what I'm doing wrong.
Maybe the first method doesn't work since services.dex were compiled for x86(_64) instead of arm?
Or the second method doesn't work because there are two dex files inside framework.vdex and I shouldn't pack both of them into framework.jar?
Or maybe, even if I managed to this the spoofing still wouldn't work because the entire room needs to be deodexed?

I'm very thankful for all the help.
Reply all
Reply to author
Forward
0 new messages