Motorola G6

2020, Feb 18    

Motorola G6

This phone was a steal at $99 but of course the fulfilment was a nightmare. The order was placed on January 7, 2020 but did not actually arrive until February 14, 2020. This was initially supposed to take 3-6 working days but the fulfillment company Ebuynow was taking orders knowing that they couldn’t fulfill them. To boot they were selectively offering refunds up to 15% for those who complained about their process.

Motorola you need to find a better supplier as they are quite unprofessional.

The phone initially came with:

Android: 9
Build number: PPS29.55-24.

After several official updates and reboots later we are at:

Android: 9
Build number: PPSS29.118-15-11-5
Security patch level: December 1, 2019

Rooting

Use these specific versions as I had a bootloop using Magisk v19.0 and a 02.02.2020 version of DM Verity. You can simply upgrade them after the initial install.

Stock Rom
TWRP
Dejello TWRP (for custom roms when if you need google apps)
Magisk v19.3
Magisk Manager v7.1.1
DM Verity Disabler 08.18.2019
Unlocked Bootloader via Motorola
Minimal ADB/Fastboot (Windows only)
Moto USB Drivers (drivers only, no manager)

settings->system->about phone tap build number 7 times to enter developer mode
settings->system->developer options->automatic system updates DISABLE (so that ota updates in the future don't mess up your system)
settings->system->developer options->usb debugging ENABLE
install motorola usb drivers

unlock bootloader by going to https://motorola-global-portal.custhelp.com/app/standalone/bootloader/unlock-your-device-a
settings->system->advanced->developer options->oem unlocking ENABLE
disconnect phone from usb if connected
enter fastboot mode (power off, then press the power and volume down buttons simultaneously
connect phone via usb cable to your computer
$ fastboot oem get_unlock_data
     EXAMPLE DATA RESPONSE
     (bootloader) 0A40040192024205#4C4D3556313230
     (bootloader) 30373731363031303332323239#BD00
     (bootloader) 8A672BA4746C2CE02328A2AC0C39F95
     (bootloader) 1A3E5#1F53280002000000000000000
     (bootloader) 0000000
paste together the 5 lines of output into one continuous string without (bootloader) or "INFO" or white spaces
your string needs to look like this:
0A40040192024205#4C4D355631323030373731363031303332323239#BD008A672BA4746C2CE02328A2AC0C39F951A3E5#1F532800020000000000000000000000     
enter this into the website and they will send an email with a unique 20 character password     
$ fastboot devices
you should see your device listed
$ fastboot oem unlock UNIQUE_KEY
you need to run this twice
$ fastboot reboot

set up developer options/usb debugging again
$ adb reboot bootloader
$ fastboot boot twrp-3.3.0-0-ali.img
make a backup of boot.img/recovery.img for safe keeping
$ adb pull /dev/block/bootdevice/by-name/boot stock_boot.img
$ adb pull /dev/block/bootdevice/by-name/recovery stock_recovery.img

$ adb reboot bootloader
$ fastboot flash recovery twrp-3.3.0-0-ali.img (ie customized recovery.img)
select "recovery mode" using the volume keys on the phone
if it asks for a password hit CANCEL
keep system read only
go to WIPE and confirm with YES
press BACK button until main menu
press REBOOT then RECOVERY
repeat same process again
you are now connected on the 3rd recovery reboot via a usb cable
$ adb push Disable_Dm-Verity_ForceEncrypt_08.18.2019.zip /sdcard (use this version only)
$ adb push Magisk-v19.3.zip /sdcard (use this version only)
go to INSTALL 
install dm-verity first
install magisk second

you are now rooted
reboot system

update magisk within installed app
successfully updated to: Magisk: 20.3 (20300) Magisk Manager 7.5.1 (267)