Working xposed for ze550kl, asus_z00ld, zenfone laser,zenfone selfie slim rooted rom - Asus Zenfone Selfie Guides, News, & Discussion

New working xposed may be find here
http://forum.xda-developers.com/zenfone-2-laser/general/wroking-xposed-ze550kl-t3247915
XDA and We are not responsible for any loss, do it on your own risk.
Hit thanks, if it helps you.

here's my log.. I can't install xpose.. it will reboot when installing xposed but after reboot it is said failed after I press a key.. here's the log
' Connecting ZenFone 2 Laser
'
'
'
'
' Remounting system
'
'
Press any key to continue . . .
'
'
' Pushing files
'
'
push: assets/xposed-sdk21-arm64/META-INF/com/google/android/updater-script -> /sdcard/tmp2/META-INF/com/google/android/updater-script
push: assets/xposed-sdk21-arm64/META-INF/com/google/android/update-binary -> /sdcard/tmp2/META-INF/com/google/android/update-binary
push: assets/xposed-sdk21-arm64/META-INF/com/google/android/flash-script.sh -> /sdcard/tmp2/META-INF/com/google/android/flash-script.sh
push: assets/xposed-sdk21-arm64/META-INF/MANIFEST.MF -> /sdcard/tmp2/META-INF/MANIFEST.MF
push: assets/xposed-sdk21-arm64/META-INF/CERT.SF -> /sdcard/tmp2/META-INF/CERT.SF
push: assets/xposed-sdk21-arm64/META-INF/CERT.RSA -> /sdcard/tmp2/META-INF/CERT.RSA
push: assets/xposed-sdk21-arm64/system/bin/patchoat -> /sdcard/tmp2/system/bin/patchoat
push: assets/xposed-sdk21-arm64/system/bin/oatdump -> /sdcard/tmp2/system/bin/oatdump
push: assets/xposed-sdk21-arm64/system/bin/dex2oat -> /sdcard/tmp2/system/bin/dex2oat
push: assets/xposed-sdk21-arm64/system/bin/app_process64_xposed -> /sdcard/tmp2/system/bin/app_process64_xposed
push: assets/xposed-sdk21-arm64/system/bin/app_process32_xposed -> /sdcard/tmp2/system/bin/app_process32_xposed
push: assets/xposed-sdk21-arm64/system/framework/XposedBridge.jar -> /sdcard/tmp2/system/framework/XposedBridge.jar
push: assets/xposed-sdk21-arm64/system/lib/libxposed_art.so -> /sdcard/tmp2/system/lib/libxposed_art.so
push: assets/xposed-sdk21-arm64/system/lib/libsigchain.so -> /sdcard/tmp2/system/lib/libsigchain.so
push: assets/xposed-sdk21-arm64/system/lib/libart.so -> /sdcard/tmp2/system/lib/libart.so
push: assets/xposed-sdk21-arm64/system/lib/libart-compiler.so -> /sdcard/tmp2/system/lib/libart-compiler.so
push: assets/xposed-sdk21-arm64/system/lib64/libxposed_art.so -> /sdcard/tmp2/system/lib64/libxposed_art.so
push: assets/xposed-sdk21-arm64/system/lib64/libsigchain.so -> /sdcard/tmp2/system/lib64/libsigchain.so
push: assets/xposed-sdk21-arm64/system/lib64/libart.so -> /sdcard/tmp2/system/lib64/libart.so
push: assets/xposed-sdk21-arm64/system/lib64/libart-disassembler.so -> /sdcard/tmp2/system/lib64/libart-disassembler.so
push: assets/xposed-sdk21-arm64/system/xposed.prop -> /sdcard/tmp2/system/xposed.prop
push: assets/xposed-sdk21-arm64/flash-script.sh -> /sdcard/tmp2/flash-script.sh
22 files pushed. 0 files skipped.
4632 KB/s (12807304 bytes in 2.700s)
Press any key to continue . . .
'
'
' Installing Xposed
'
'
******************************
Xposed framework installer zip
******************************
- Mounting /system and /vendor read-write
- Checking environment
Xposed version: 75
- Placing files
Press any key to continue . . .
' Let phone reboot first, then press any key
Press any key to continue . . .
'
'
' Removing files
'
'
Press any key to continue . . .
'
'
' Installing Xposed Installer ..
'
'
6125 KB/s (626521 bytes in 0.099s)
pkg: /data/local/tmp/XposedInstaller_3.0_alpha4.apk
Failure [INSTALL_FAILED_ALREADY_EXISTS]
Click to expand...
Click to collapse
oke I flashed again and here's the problem on xposed.. if I reboot that the android upgrading will continue and after that the above log will occur
' Installing Xposed
'
'
******************************
Xposed framework installer zip
******************************
- Mounting /system and /vendor read-write
- Checking environment
Xposed version: 75
- Placing files
WARNING: linker: could not load library "libsigchain.so" from LD_PRELOAD for "gzip"; caused by library "libsigchain.so" not found
WARNING: linker: could not load library "libsigchain.so" from LD_PRELOAD for "chown"; caused by library "libsigchain.so" not found
WARNING: linker: could not load library "libsigchain.so" from LD_PRELOAD for "chmod"; caused by library "libsigchain.so" not found
WARNING: linker: could not load library "libsigchain.so" from LD_PRELOAD for "cp"; caused by library "libsigchain.so" not found
- Done
Press any key to continue . . .
' Let phone reboot first, then press any key
Press any key to continue . . .
Click to expand...
Click to collapse
EDIT:
Got it working now.. I dunno how it just said success on xposed installer hope other do not experience this.. Thank you for this

first time you got error because there was xposed framework installed already.
please make sure there is no xposed installed before starting process.
About warning
just ignore that, it s common.

which modules are working?
i had gravity box,Xinternal sd and few others and after rebooting i am stuck at asus screen.

' Pushing files
'
'
push: assets/xposed-sdk21-arm64/META-INF/com/google/android/updater-script -> /s
dcard/tmp2/META-INF/com/google/android/updater-script
push: assets/xposed-sdk21-arm64/META-INF/com/google/android/update-binary -> /sd
card/tmp2/META-INF/com/google/android/update-binary
push: assets/xposed-sdk21-arm64/META-INF/com/google/android/flash-script.sh -> /
sdcard/tmp2/META-INF/com/google/android/flash-script.sh
push: assets/xposed-sdk21-arm64/META-INF/MANIFEST.MF -> /sdcard/tmp2/META-INF/MA
NIFEST.MF
push: assets/xposed-sdk21-arm64/META-INF/CERT.SF -> /sdcard/tmp2/META-INF/CERT.S
F
push: assets/xposed-sdk21-arm64/META-INF/CERT.RSA -> /sdcard/tmp2/META-INF/CERT.
RSA
push: assets/xposed-sdk21-arm64/system/bin/patchoat -> /sdcard/tmp2/system/bin/p
atchoat
push: assets/xposed-sdk21-arm64/system/bin/oatdump -> /sdcard/tmp2/system/bin/oa
tdump
push: assets/xposed-sdk21-arm64/system/bin/dex2oat -> /sdcard/tmp2/system/bin/de
x2oat
push: assets/xposed-sdk21-arm64/system/bin/app_process64_xposed -> /sdcard/tmp2/
system/bin/app_process64_xposed
push: assets/xposed-sdk21-arm64/system/bin/app_process32_xposed -> /sdcard/tmp2/
system/bin/app_process32_xposed
push: assets/xposed-sdk21-arm64/system/framework/XposedBridge.jar -> /sdcard/tmp
2/system/framework/XposedBridge.jar
push: assets/xposed-sdk21-arm64/system/lib/libxposed_art.so -> /sdcard/tmp2/syst
em/lib/libxposed_art.so
push: assets/xposed-sdk21-arm64/system/lib/libsigchain.so -> /sdcard/tmp2/system
/lib/libsigchain.so
push: assets/xposed-sdk21-arm64/system/lib/libart.so -> /sdcard/tmp2/system/lib/
libart.so
push: assets/xposed-sdk21-arm64/system/lib/libart-compiler.so -> /sdcard/tmp2/sy
stem/lib/libart-compiler.so
push: assets/xposed-sdk21-arm64/system/lib64/libxposed_art.so -> /sdcard/tmp2/sy
stem/lib64/libxposed_art.so
push: assets/xposed-sdk21-arm64/system/lib64/libsigchain.so -> /sdcard/tmp2/syst
em/lib64/libsigchain.so
push: assets/xposed-sdk21-arm64/system/lib64/libart.so -> /sdcard/tmp2/system/li
b64/libart.so
push: assets/xposed-sdk21-arm64/system/lib64/libart-disassembler.so -> /sdcard/t
mp2/system/lib64/libart-disassembler.so
push: assets/xposed-sdk21-arm64/system/xposed.prop (1).txt -> /sdcard/tmp2/syste
m/xposed.prop (1).txt
push: assets/xposed-sdk21-arm64/system/xposed.prop -> /sdcard/tmp2/system/xposed
.prop
push: assets/xposed-sdk21-arm64/flash-script.sh -> /sdcard/tmp2/flash-script.sh
23 files pushed. 0 files skipped.
3677 KB/s (12807304 bytes in 3.400s)
Press any key to continue . . .
'
'
' Installing Xposed
'
'
******************************
Xposed framework installer zip
******************************
- Mounting /system and /vendor read-write
- Checking environment
Xposed version:
! Wrong platform: arm64
! This file is for:
! Please download the correct package
! for your platform/ROM!
Press any key to continue . . .
' Let phone reboot first, then press any key
Press any key to continue . . .
'
'
' Removing files
'
'
override rwxrwxrwx root:root for '/system/tmp'?
---------- Post added at 10:45 AM ---------- Previous post was at 10:41 AM ----------
What to do...?
---------- Post added at 11:33 AM ---------- Previous post was at 10:45 AM ----------
' Pushing files
'
'
push: assets/xposed-sdk21-arm64/META-INF/com/google/android/updater-script -> /s
dcard/tmp2/META-INF/com/google/android/updater-script
push: assets/xposed-sdk21-arm64/META-INF/com/google/android/update-binary -> /sd
card/tmp2/META-INF/com/google/android/update-binary
push: assets/xposed-sdk21-arm64/META-INF/com/google/android/flash-script.sh -> /
sdcard/tmp2/META-INF/com/google/android/flash-script.sh
push: assets/xposed-sdk21-arm64/META-INF/MANIFEST.MF -> /sdcard/tmp2/META-INF/MA
NIFEST.MF
push: assets/xposed-sdk21-arm64/META-INF/CERT.SF -> /sdcard/tmp2/META-INF/CERT.S
F
push: assets/xposed-sdk21-arm64/META-INF/CERT.RSA -> /sdcard/tmp2/META-INF/CERT.
RSA
push: assets/xposed-sdk21-arm64/system/bin/patchoat -> /sdcard/tmp2/system/bin/p
atchoat
push: assets/xposed-sdk21-arm64/system/bin/oatdump -> /sdcard/tmp2/system/bin/oa
tdump
push: assets/xposed-sdk21-arm64/system/bin/dex2oat -> /sdcard/tmp2/system/bin/de
x2oat
push: assets/xposed-sdk21-arm64/system/bin/app_process64_xposed -> /sdcard/tmp2/
system/bin/app_process64_xposed
push: assets/xposed-sdk21-arm64/system/bin/app_process32_xposed -> /sdcard/tmp2/
system/bin/app_process32_xposed
push: assets/xposed-sdk21-arm64/system/framework/XposedBridge.jar -> /sdcard/tmp
2/system/framework/XposedBridge.jar
push: assets/xposed-sdk21-arm64/system/lib/libxposed_art.so -> /sdcard/tmp2/syst
em/lib/libxposed_art.so
push: assets/xposed-sdk21-arm64/system/lib/libsigchain.so -> /sdcard/tmp2/system
/lib/libsigchain.so
push: assets/xposed-sdk21-arm64/system/lib/libart.so -> /sdcard/tmp2/system/lib/
libart.so
push: assets/xposed-sdk21-arm64/system/lib/libart-compiler.so -> /sdcard/tmp2/sy
stem/lib/libart-compiler.so
push: assets/xposed-sdk21-arm64/system/lib64/libxposed_art.so -> /sdcard/tmp2/sy
stem/lib64/libxposed_art.so
push: assets/xposed-sdk21-arm64/system/lib64/libsigchain.so -> /sdcard/tmp2/syst
em/lib64/libsigchain.so
push: assets/xposed-sdk21-arm64/system/lib64/libart.so -> /sdcard/tmp2/system/li
b64/libart.so
push: assets/xposed-sdk21-arm64/system/lib64/libart-disassembler.so -> /sdcard/t
mp2/system/lib64/libart-disassembler.so
push: assets/xposed-sdk21-arm64/system/xposed.prop (1).txt -> /sdcard/tmp2/syste
m/xposed.prop (1).txt
push: assets/xposed-sdk21-arm64/system/xposed.prop -> /sdcard/tmp2/system/xposed
.prop
push: assets/xposed-sdk21-arm64/flash-script.sh -> /sdcard/tmp2/flash-script.sh
23 files pushed. 0 files skipped.
3677 KB/s (12807304 bytes in 3.400s)
Press any key to continue . . .
'
'
' Installing Xposed
'
'
******************************
Xposed framework installer zip
******************************
- Mounting /system and /vendor read-write
- Checking environment
Xposed version:
! Wrong platform: arm64
! This file is for:
! Please download the correct package
! for your platform/ROM!
Press any key to continue . . .
' Let phone reboot first, then press any key
Press any key to continue . . .
'
'
' Removing files
'
'
override rwxrwxrwx root:root for '/system/tmp'?
---------- Post added at 10:45 AM ---------- Previous post was at 10:41 AM ----------
What to do...?

make sure you have busybox installed in your phone, allow root permission to adb.
if tried any other version previously then please uninstall.
if you are still getting error then wipe data/factory reset
wipe cache partition.
install supersu apk
install busybox
allow root access to busy box, adb shell
then click 1.bat & let process complete.

IronMan_in said:
which modules are working?
i had gravity box,Xinternal sd and few others and after rebooting i am stuck at asus screen.
Click to expand...
Click to collapse
tested on
gravity box LP
youtube ad remover
advance reboot menu +

I do this only and that also of 2 times after flashing full rom again.

Got This working with zenfone selfie slim rooted rom
list of module that i currently use
- Gravitybox LP
- Greenify
- Lucky Patcher
- Spotify AVRCP
- SpotifySkip
- Youtube
- YouTube AdAway
- YouTube Background Playback

I got this error now how to download feamework?
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}

Why not work with a Stock Rom 1:13 Zenfone Selfie ZD551KL?

Mandrakerj said:
Why not work with a Stock Rom 1:13 Zenfone Selfie ZD551KL?
Click to expand...
Click to collapse
At present we are unable to figure out what s going wrong with that.
We can not test as we dont have that model, we have only ze550kl & working well while testing & using.
I update thread title after getting positive feedback from users regarding working on slim version.

rajlko said:
At present we are unable to figure out what s going wrong with that.
We can not test as we dont have that model, we have only ze550kl & working well while testing & using.
I update thread title after getting positive feedback from users regarding working on slim version.
Click to expand...
Click to collapse
Ok fine friend ..
waiting

not working
ZE550KL_WW_1.15.40.639 not working with this version

BTiwari said:
ZE550KL_WW_1.15.40.639 not working with this version
Click to expand...
Click to collapse
If you're running the rooted version of WW_1.15.40.639 by @shakalaca then you'll notice there's a xposed_patch file and an associated xposed_patch.README file that he included with the pre-rooted ROM image. Follow the instructions in that file and maybe you'll get it to work? (I haven't tried it yet, so I'm not sure).
@rajlko started a new thread for installing xposed on WW_1.15.40.639. Have you tried that?

xyberz09 said:
If you're running the rooted version of WW_1.15.40.639 by @shakalaca then you'll notice there's a xposed_patch file and an associated xposed_patch.README file that he included with the pre-rooted ROM image. Follow the instructions in that file and maybe you'll get it to work? (I haven't tried it yet, so I'm not sure).
@rajlko started a new thread for installing xposed on WW_1.15.40.639. Have you tried that?
Click to expand...
Click to collapse
how to apply that patch i have try it but no luck

BTiwari said:
how to apply that patch i have try it but no luck
Click to expand...
Click to collapse
Try installing Xposed Framework by following the instructions on @rajlko's new thread: http://forum.xda-developers.com/zenfone-2-laser/general/wroking-xposed-ze550kl-t3247915
If that doesn't work, you'll need to download xdelta and apply the patch on the unzipped system.img file from the pre-rooted image. The command you need to run is this:
Code:
xdelta3 -d -s system.img xposed_patch system_xposed.img
After the command completes, you'll see a new file called system_xposed.img and you'll need to flash it using the following command:
Code:
fastboot flash system system_xposed.img
NOTE: I haven't tried any of this. I'm simply reiterating the instructions from the README file. If this doesn't work, you'll probably have to contact @shakalaca about the issue.

If some one having issue regarding xposed,then first run remove xposed framework, let that finished, if there is any xposed apk install remove that, restart your your mobile, start procedure from begining.

Related

VillainROM Team VS Cronos Dev

So... I did some research and what are the odds.. VillainROM Team did steal Feeyo's libraries from the first Cronos ROM he released here. And I did not see any thanks from VillainROM Team towards Feeyo in any release notes!
And they are accusing him from stealing their work from the start?
In fact you guys have been saying the libraries en framework files he was using have always been the same because it was from some CDMA leak. This is Bull****!
And I will prove it soon.
I know he did use some Framework files for his latest release without knowing he was using VillainROM's work.
He thought he was using some other dev his Graphic User Interface and DID credit him for it. Not knowing it was the work from VillainROM. So accusing him from STEALING your work is also Bull****! As he did credit someone for it, how can that be stealing?
So anyhow here is the PROOF VillainROM Jerks did steal his files and are have been lying about it since the start! Hypocrite bastards.
Here are the differences from Cronos 1.5.x and VillainROM 5.5.0.
Code:
2,3c2,3
< 426042b40e913a9600fe77c7368347db ./libDMCmd.so
< 49d99a895237d70f78d34bf1f53997bc ./libEGL.so
---
> 7e4d2164781fe3a15e89bb06a412c49b ./libDMCmd.so
> bf63b0ce0e5225df810fc988bfafe042 ./libEGL.so
8c8
< 1b40fc1bbfd95dfc48b1e085a1736deb ./libOlaBase.so
---
> 901d5cdad1ba63e5d654a85a7aea7202 ./libOlaBase.so
10,12c10,13
< 69f8b11ca3360ba96bdc4c8330bbf7a8 ./libOmxH264Dec.so
< 7735a3180dc1606c60e00720d09c9471 ./libOmxMpeg4Dec.so
< 8eaf47fca40fa1182eff4753c44b8714 ./libOmxVidEnc.so
---
> 73ddb59d8d46b8bb94cc5f334dd6563d ./libOmxH264Dec.so
> 9a27cc496b1ae5d8838755d85d23982d ./libOmxMpeg4Dec.so
> c0ecaece722524c2e7d0d74373e962f2 ./libOmxVidEnc.so
> a45acfd93cef001ee27417d3d7dbc269 ./libRS.so
16,17c17,18
< 9b6f249e91a2c43b5854a182e510aa7a ./libalbum_util.so
< f2258ccd01bbe8bc4528a0a3ef128afd ./libandroid_runtime.so
---
> f7fd98214a127de95084c19a32b1274f ./libalbum_util.so
> a57f1060e96d1dae03149a137b1cd3de ./libandroid_runtime.so
19c20
< 5fe01673621de7476c098b3fb7e4859a ./libaudio.so
---
> 9855b002281be104dd51045e970ee183 ./libaudio.so
21,22c22,23
< 9bbe72b88eac6975f6d2d86d098c777d ./libaudioflinger.so
< 2b381f2d15ff9bec4fa3210b60b77245 ./libaudiopolicy.so
---
> 9f5963d1543d846185b65b7857fe23be ./libaudioflinger.so
> 503920af49d40f3fe09f2a3ff4d12fdd ./libaudiopolicy.so
24c25
< fe6c99ec4c2fadabb973bcb5d2ef15a3 ./libbinder.so
---
> c0786a23b090dcfac8cff48eda072142 ./libbinder.so
28,30c29,31
< 486007459d5cee0a8e4837878f801096 ./libc.so
< c7f1c125f3f69596721a50b86aa6aa2f ./libcamera.so
< f9f6faaf3d30154a70f4cb1f10a70aa7 ./libcameraservice.so
---
> 89bbeb932cfa31894f20d204645ff32a ./libc.so
> 38f258747b53a60d15ae7a5be4bb762b ./libcamera.so
> 60e5cdb209b03cf02c0fa6c5f8174cf4 ./libcameraservice.so
31a33,34
> 4052927e5ba53c4fe494c51a543c89b6 ./libciq_client.so
> 88879f8faf4f409322b1e6c7d96d6750 ./libciq_htc.so
34c37
< 54979541ffbdbdb0c00dbb2de0404935 ./libcurl.so
---
> f9832f3714c9262dc8128ed96431343b ./libcurl.so
39,41c42,44
< d6c910c13697a4fa38d1042bf6af2628 ./libdrm1.so
< 22b2ea27535a1028ff01714aa7d48c1c ./libdrm1_jni.so
< 841b1278c0f5d722ef30bcd296dedf04 ./libdvm.so
---
> b14093c9d30d302e3afd1ebfffd97967 ./libdrm1.so
> e62f89e2ffad80a3cdc214968ba2514c ./libdrm1_jni.so
> a328b7ca388f38c7d9dc519770787974 ./libdvm.so
45,48c48,51
< cc4c88afb027536513416525216173c8 ./libflashlite.so
< 65a5319b9414b741d3bddd511ec7ea2c ./libflashsnddec.so
< 75c508f934e5970ef4b38ff803a39c4c ./libflsaplayerlib.so
< 5688054711e2371c7dff6c36c415951f ./libgps.so
---
> 5e232bc91af5530b77b93fb9df35c677 ./libflashlite.so
> 10fc05b9d285db1dfe424e08b85c7a86 ./libflashsnddec.so
> 0b4b929ecb1dc32b0bf6fd0e3fc63a66 ./libflsaplayerlib.so
> ef23583aaf7cdc6f337154c5c1045af9 ./libgps.so
53c56
< 2857bca5b51163004d2254a1b13ab0cd ./libhtc_ril.so
---
> fa6f724144bdb7b08c340fa264ecad27 ./libhtc_ril.so
55c58,59
< 7fd711adb74f231ddc93dd60c0004a24 ./libiconv.so
---
> 40cf5abc2ee3d8d5eb73f4562c3101c8 ./libhtciqagent.so
> 307b3775c349cacbeff603e517acd096 ./libiconv.so
62c66
< 4f19b9cfbc3d4d9ba1c4618ba570d4a7 ./libmedia.so
---
> 5478df9f4037349ba67764dc9c91eaf6 ./libmedia.so
64c68
< 61a08aef150c73bea718c4cc7deca251 ./libmediaplayerservice.so
---
> c2a848982365ffe0c03bd073337ea435 ./libmediaplayerservice.so
68c72
< f30d633e1c1ba67dcb50621f9c97859c ./libnativehelper.so
---
> 6fa64e507dc32f72a345b86834ff5ed5 ./libnativehelper.so
70c74
< b1efb2d03a015fd47caa3138c44e79b6 ./liboemcamera.so
---
> 24455623ea7a8ea19b1e908f65fe424d ./liboemcamera.so
74c78
< 789193da55b4aadf0fb72678917443b0 ./libomx_avcdec_sharedlibrary.so
---
> fdee666971a3d824d459d128c0c24500 ./libomx_avcdec_sharedlibrary.so
77c81
< 3ac5f6d5eeaa96a222fc29b7f3ad328e ./libomx_sharedlibrary.so
---
> 065562c2d4ef5d33e530b5677435a9ec ./libomx_sharedlibrary.so
80,83c84,87
< e27446d23305a6c90bf670a701f1ef7e ./libon2.so
< b30ff7564c26767ddad111af3654cb6d ./libopencore_author.so
< b7922a0f97477c0738a97547f5a0100a ./libopencore_common.so
< 8505b5e6b3c68dd29bb55401cbed27f4 ./libopencore_download.so
---
> c0f8c7bf2262413e63a427476000a60b ./libon2.so
> d5a90d28c846b0e8c49ab700693d7520 ./libopencore_author.so
> 6bfe57203292d0557b768329ed31e977 ./libopencore_common.so
> 1afe6f68e6ceb76b24314d3ad2168b1a ./libopencore_download.so
85c89
< 828f7da7156e25ed2decef5abed20832 ./libopencore_mp4local.so
---
> 079cb1b10bc705bc78bc079dff171a6b ./libopencore_mp4local.so
87,89c91,93
< bae4f489dbedbaf205f30f9603520b4b ./libopencore_net_support.so
< ec1f4c7575903599730baa097b3888ed ./libopencore_player.so
< 8f7e81ab0cb3274eb05becc9c9f08d4e ./libopencore_rtsp.so
---
> d58696122e9adf2a236015cd6047500a ./libopencore_net_support.so
> 4fe6d34d4703a224e308b9e6081c7c3b ./libopencore_player.so
> fb07bd9b8a9b9602f91d5676fbe526bc ./libopencore_rtsp.so
93c97,98
< 265cb69c9e666c137c89932ce4e4fc0d ./libpdfreader.so
---
> 47eb91ca938e06cb2315b14b8853f047 ./libpagemap.so
> 284671a848dafdcfe8459bc1552f33b0 ./libpdfreader.so
95c100
< 4151b62ce7e2864e5dc9ed643db87229 ./libpng.so
---
> b28049ebca1e49617c7144df1b852a9c ./libpng.so
102c107
< dc9190cb11832471b928f89336f8213b ./libril.so
---
> 82a5fe1b361af67a63f8ca6e8ede0e18 ./libril.so
104c109,110
< 86f985092adce4a337e7bc837387cb37 ./libscalado_htcalbum.so
---
> e2a6acb3c11e1565ef922ea86776c53e ./librs_jni.so
> 242fc6432bf7ca088fad06656a7ff701 ./libscalado_htcalbum.so
106,108c112,114
< 748eb67e541ff4ed69cd9b4dfc265355 ./libscaladoutil.so
< 63c7616244ed67dcd62b563cbf8d8083 ./libsiimpl.so
< 8e2d2b9b0ea214bbb31595b29407ecda ./libskia.so
---
> cfc95838d1f579b79b07afe5e15ee0dd ./libscaladoutil.so
> b502f276d0874a0c2c41d91240eb5c8f ./libsiimpl.so
> fb0862274616c9875c9cc045d2b290bc ./libskia.so
111,112c117,118
< a34ba7352a33b7b1de8002a3897e0ae1 ./libsorenson.so
< b6d5e23e92e243cf77fd5f5553a4f573 ./libsoundpool.so
---
> a10e359cd82d3056f137394ad0288041 ./libsorenson.so
> 75a6c9dbcba76e445c578e6d74f1e9c3 ./libsoundpool.so
114c120
< 92b95514e67598375aba00d9aa7ae462 ./libsqlite.so
---
> 8fb9489560dc15fcfe3623527ded1779 ./libsqlite.so
118c124
< 3be7c6d470e7c13400581a8ec713a8e8 ./libstagefright_omx.so
---
> c2075058fce338d1191f163757d98f7b ./libstagefright_omx.so
120c126
< f4a067e0c5d75b7c987ac8eb7a49809d ./libsurfaceflinger.so
---
> 9601969f5353325e6e001c7515f1b589 ./libsurfaceflinger.so
123c129
< 923f986bf6cc3b0d237a5ce471782d06 ./libt9.so
---
> 1786d27c2c6a802eb9d19627678e188d ./libt9.so
127,128c133,134
< 5935e16f649edf953fd0a2f0ee69349e ./libui.so
< 3fc236a560fb5fad26dc7bd3cf7b95fe ./libutils.so
---
> 0541937ea21ea7475044c90d78b8fb83 ./libui.so
> ecc05a845f3a908d5d82dd4a1e1014cb ./libutils.so
130c136,137
< 8821d12213bf755516b3b9e29918dd23 ./libwebcore.so
---
> 820547c2222351e0873a0fd4eb7c5b76 ./libwbxml_jni.so
> bd5d2f0a86880c774cf3fad8da942900 ./libwebcore.so
133a141
> e478b6642290430ec99c59f8c4f2714d ./libxml2wbxml.so
137,160c145,168
< aeb5ee21a84b3f51eb66a1159e9fbb41 ./am.jar
< 6e2278f281d7c2a3be742dec082424e7 ./android.policy.jar
< fa80463684f815f31fba70b0a8848d4a ./android.test.runner.jar
< f206ab13b9d2b2e93ef544083d668c8d ./bmgr.jar
< 6d6f73773df94924749fb75a62f89cb8 ./com.google.android.gtalkservice.jar
< f6a1de68bd536905bb2aa164284fb8b2 ./com.google.android.maps.jar
< 2d5a2998938ae3550fe65c0bd051e05e ./com.htc.android.easopen.jar
< fa80463684f815f31fba70b0a8848d4a ./com.htc.android.pimlib.jar
< 2e0e9f2c40b3d9f41c6c25fa76600bc8 ./com.htc.framework.jar
< 221d52de7667e388c50a646cce4a3293 ./com.htc.resources.apk
< 2d5a2998938ae3550fe65c0bd051e05e ./com.scalado.util.ScaladoUtil.jar
< 00382b12354fb8abfc385cb251c1af84 ./core.jar
< 3e45bf3b17d5126149f25e0a617b0ed7 ./ext.jar
< e38c632e17e366205d617a8ef4782295 ./framework-res.apk
< 12d3a426fa8bde7764ff456723eeeeba ./framework-tests.jar
< 8f70cd27f09ca4dfbb41cfc0db90f856 ./framework.jar
< f206ab13b9d2b2e93ef544083d668c8d ./ime.jar
< f206ab13b9d2b2e93ef544083d668c8d ./input.jar
< fa80463684f815f31fba70b0a8848d4a ./javax.obex.jar
< d41d8cd98f00b204e9800998ecf8427e ./libs
< f206ab13b9d2b2e93ef544083d668c8d ./monkey.jar
< f206ab13b9d2b2e93ef544083d668c8d ./pm.jar
< 044c72308169df624db0d9685a0852d2 ./services.jar
< f206ab13b9d2b2e93ef544083d668c8d ./svc.jar
---
> 1a841b0015b26f894a3e497657722f14 ./am.jar
> 2717079b5e76171bd6a725a48fc854bd ./android.policy.jar
> 3eaa53806fb0f73f35c33761792b10d5 ./android.test.runner.jar
> 9ccd5adadb2d8c7b04fbad94830f0d9b ./bmgr.jar
> cfcd8db937e3264250e54910d8459a1d ./com.google.android.gtalkservice.jar
> d936d256ee84aba06fc73de1d8e69d19 ./com.google.android.maps.jar
> 12f39b8b9196d49c7a5a0e81933b458b ./com.htc.android.easopen.jar
> e8ff01ab1d466e3c96b48be305a66898 ./com.htc.android.pimlib.jar
> e0ea625b80db9580f33d29fa26757986 ./com.htc.framework.jar
> de8032b0c7dc4fdef91c4775d08daa19 ./com.htc.resources.apk
> 892bc39e6ccdca96e90d3b380dbeb3a0 ./com.htc.rss.jar
> be7c119cb51cb61a5719c859956e6f86 ./com.scalado.util.ScaladoUtil.jar
> 874c26e2b3ed3c3299819b1eea8b7485 ./core.jar
> cd98f51a47694451a54c1152c82c01e2 ./ext.jar
> 55cd6a4cb3836506d2e9cd27b55c4b37 ./framework-res.apk
> 9704be446064fa017b118e61df9c0228 ./framework-tests.jar
> d45aef2c4a6d64febeb4aff65ef68100 ./framework.jar
> 6cade0d545db2f51df19998ce9bee2d8 ./ime.jar
> 84f18308870236837227e6c72675e7b6 ./input.jar
> b1890cc71cfa01ac67ca4b0f579c7fb9 ./javax.obex.jar
> d739d68368da39e603dd0886f62a5fcb ./monkey.jar
> feeacf4c771977de1464b2af99948165 ./pm.jar
> efe399bab9f2ac51bca728cc6387195c ./services.jar
> 8332528abff948315f2ec7839cf2c4bc ./svc.jar
You see? EVERYTHING here is different.
Now lets compare the VillainROM 6.x files with Cronos 1.5.x:
Code:
0a1
> 2a0f4ae1d71b8026b71688e48631a3c7 ./libAdobeReader.so
45c46
< cc4c88afb027536513416525216173c8 ./libflashlite.so
---
> 5e232bc91af5530b77b93fb9df35c677 ./libflashlite.so
107c108
< 63c7616244ed67dcd62b563cbf8d8083 ./libsiimpl.so
---
> b502f276d0874a0c2c41d91240eb5c8f ./libsiimpl.so
123a125
> 0c47935ca9e2ae028e53e77984f106af ./libt99.so
137,149c139,152
< aeb5ee21a84b3f51eb66a1159e9fbb41 ./am.jar
< 6e2278f281d7c2a3be742dec082424e7 ./android.policy.jar
< fa80463684f815f31fba70b0a8848d4a ./android.test.runner.jar
< f206ab13b9d2b2e93ef544083d668c8d ./bmgr.jar
< 6d6f73773df94924749fb75a62f89cb8 ./com.google.android.gtalkservice.jar
< f6a1de68bd536905bb2aa164284fb8b2 ./com.google.android.maps.jar
< 2d5a2998938ae3550fe65c0bd051e05e ./com.htc.android.easopen.jar
< fa80463684f815f31fba70b0a8848d4a ./com.htc.android.pimlib.jar
< 2e0e9f2c40b3d9f41c6c25fa76600bc8 ./com.htc.framework.jar
< 221d52de7667e388c50a646cce4a3293 ./com.htc.resources.apk
< 2d5a2998938ae3550fe65c0bd051e05e ./com.scalado.util.ScaladoUtil.jar
< 00382b12354fb8abfc385cb251c1af84 ./core.jar
< 3e45bf3b17d5126149f25e0a617b0ed7 ./ext.jar
---
> 9562b3cce9228437147d12ff8e7831f8 ./am.jar
> 738d0bbf0350d9210d14353c155aa45f ./android.policy.jar
> 586d8546c17549be0ebc90a54280d305 ./android.test.runner.jar
> c656279fc11cca42d733646dca30fc0a ./bmgr.jar
> 24a2858c35900ddd70cc68bd2fa1f82c ./com.google.android.gtalkservice.jar
> 048fb1e412f6b104702983a030455d1d ./com.google.android.maps.jar
> df060f241b0203069fd5a1ee96ac4f17 ./com.htc.android.easopen.jar
> c800cee88d40e9f6f9e724df0b2fbdeb ./com.htc.android.pimlib.jar
> df2924bcd1f5761220748c4604da6f48 ./com.htc.framework.jar
> 0ff831489251bd29b2255168f5b13667 ./com.htc.resources.apk
> 892bc39e6ccdca96e90d3b380dbeb3a0 ./com.htc.rss.jar
> 1ec05b57dd8e200454304684bcff3322 ./com.scalado.util.ScaladoUtil.jar
> 6bc72906b98baf7edf4e3bd1f545c334 ./core.jar
> e84b0b5245bbfa7451d28bda6e5d3d72 ./ext.jar
151,160c154,162
< 12d3a426fa8bde7764ff456723eeeeba ./framework-tests.jar
< 8f70cd27f09ca4dfbb41cfc0db90f856 ./framework.jar
< f206ab13b9d2b2e93ef544083d668c8d ./ime.jar
< f206ab13b9d2b2e93ef544083d668c8d ./input.jar
< fa80463684f815f31fba70b0a8848d4a ./javax.obex.jar
< d41d8cd98f00b204e9800998ecf8427e ./libs
< f206ab13b9d2b2e93ef544083d668c8d ./monkey.jar
< f206ab13b9d2b2e93ef544083d668c8d ./pm.jar
< 044c72308169df624db0d9685a0852d2 ./services.jar
< f206ab13b9d2b2e93ef544083d668c8d ./svc.jar
---
> 6e3679282cf3a91bc22eb20dbb2477f3 ./framework-tests.jar
> 4f8f749668246940685087f734258600 ./framework.jar
> 6dd5de43fd1daa193cf95b5eb31cf915 ./ime.jar
> 5f027f3c7439407909ca9d3234b5ab45 ./input.jar
> 312c0bf18b42cac7dc095be8987bbca1 ./javax.obex.jar
> 346bcdec54666f0258a003ea5911a8c9 ./monkey.jar
> 0e3d40c0c28c831b03ecb27fbeb9c4b1 ./pm.jar
> a6ac5ca10a669a3b18c1a28079eb5e56 ./services.jar
> f0334f865d099d4d2022fcdfe0cb0545 ./svc.jar
Ouch! They are using the files from Cronos 1.5.x! Did you guys post this in your release notes? What? Sorry? I cant hear you... NO!
The framework files are only different because VillainROM deodexed his framework. That is the only difference.
Ok lets compare some more stuff please.
VillainROM 5.5.0 and their newer release 6.x:
Code:
Almost your whole build is different from villain5 to villain 6 series..
0a1
> 2a0f4ae1d71b8026b71688e48631a3c7 ./libAdobeReader.so
2,3c3,4
< 7e4d2164781fe3a15e89bb06a412c49b ./libDMCmd.so
< bf63b0ce0e5225df810fc988bfafe042 ./libEGL.so
---
> 426042b40e913a9600fe77c7368347db ./libDMCmd.so
> 49d99a895237d70f78d34bf1f53997bc ./libEGL.so
8c9
< 901d5cdad1ba63e5d654a85a7aea7202 ./libOlaBase.so
---
> 1b40fc1bbfd95dfc48b1e085a1736deb ./libOlaBase.so
10,13c11,13
< 73ddb59d8d46b8bb94cc5f334dd6563d ./libOmxH264Dec.so
< 9a27cc496b1ae5d8838755d85d23982d ./libOmxMpeg4Dec.so
< c0ecaece722524c2e7d0d74373e962f2 ./libOmxVidEnc.so
< a45acfd93cef001ee27417d3d7dbc269 ./libRS.so
---
> 69f8b11ca3360ba96bdc4c8330bbf7a8 ./libOmxH264Dec.so
> 7735a3180dc1606c60e00720d09c9471 ./libOmxMpeg4Dec.so
> 8eaf47fca40fa1182eff4753c44b8714 ./libOmxVidEnc.so
17,18c17,18
< f7fd98214a127de95084c19a32b1274f ./libalbum_util.so
< a57f1060e96d1dae03149a137b1cd3de ./libandroid_runtime.so
---
> 9b6f249e91a2c43b5854a182e510aa7a ./libalbum_util.so
> f2258ccd01bbe8bc4528a0a3ef128afd ./libandroid_runtime.so
20c20
< 9855b002281be104dd51045e970ee183 ./libaudio.so
---
> 5fe01673621de7476c098b3fb7e4859a ./libaudio.so
22,23c22,23
< 9f5963d1543d846185b65b7857fe23be ./libaudioflinger.so
< 503920af49d40f3fe09f2a3ff4d12fdd ./libaudiopolicy.so
---
> 9bbe72b88eac6975f6d2d86d098c777d ./libaudioflinger.so
> 2b381f2d15ff9bec4fa3210b60b77245 ./libaudiopolicy.so
25c25
< c0786a23b090dcfac8cff48eda072142 ./libbinder.so
---
> fe6c99ec4c2fadabb973bcb5d2ef15a3 ./libbinder.so
29,31c29,31
< 89bbeb932cfa31894f20d204645ff32a ./libc.so
< 38f258747b53a60d15ae7a5be4bb762b ./libcamera.so
< 60e5cdb209b03cf02c0fa6c5f8174cf4 ./libcameraservice.so
---
> 486007459d5cee0a8e4837878f801096 ./libc.so
> c7f1c125f3f69596721a50b86aa6aa2f ./libcamera.so
> f9f6faaf3d30154a70f4cb1f10a70aa7 ./libcameraservice.so
33,34d32
< 4052927e5ba53c4fe494c51a543c89b6 ./libciq_client.so
< 88879f8faf4f409322b1e6c7d96d6750 ./libciq_htc.so
37c35
< f9832f3714c9262dc8128ed96431343b ./libcurl.so
---
> 54979541ffbdbdb0c00dbb2de0404935 ./libcurl.so
42,44c40,42
< b14093c9d30d302e3afd1ebfffd97967 ./libdrm1.so
< e62f89e2ffad80a3cdc214968ba2514c ./libdrm1_jni.so
< a328b7ca388f38c7d9dc519770787974 ./libdvm.so
---
> d6c910c13697a4fa38d1042bf6af2628 ./libdrm1.so
> 22b2ea27535a1028ff01714aa7d48c1c ./libdrm1_jni.so
> 841b1278c0f5d722ef30bcd296dedf04 ./libdvm.so
49,51c47,49
< 10fc05b9d285db1dfe424e08b85c7a86 ./libflashsnddec.so
< 0b4b929ecb1dc32b0bf6fd0e3fc63a66 ./libflsaplayerlib.so
< ef23583aaf7cdc6f337154c5c1045af9 ./libgps.so
---
> 65a5319b9414b741d3bddd511ec7ea2c ./libflashsnddec.so
> 75c508f934e5970ef4b38ff803a39c4c ./libflsaplayerlib.so
> 5688054711e2371c7dff6c36c415951f ./libgps.so
56c54
< fa6f724144bdb7b08c340fa264ecad27 ./libhtc_ril.so
---
> 2857bca5b51163004d2254a1b13ab0cd ./libhtc_ril.so
58,59c56
< 40cf5abc2ee3d8d5eb73f4562c3101c8 ./libhtciqagent.so
< 307b3775c349cacbeff603e517acd096 ./libiconv.so
---
> 7fd711adb74f231ddc93dd60c0004a24 ./libiconv.so
66c63
< 5478df9f4037349ba67764dc9c91eaf6 ./libmedia.so
---
> 4f19b9cfbc3d4d9ba1c4618ba570d4a7 ./libmedia.so
68c65
< c2a848982365ffe0c03bd073337ea435 ./libmediaplayerservice.so
---
> 61a08aef150c73bea718c4cc7deca251 ./libmediaplayerservice.so
72c69
< 6fa64e507dc32f72a345b86834ff5ed5 ./libnativehelper.so
---
> f30d633e1c1ba67dcb50621f9c97859c ./libnativehelper.so
74c71
< 24455623ea7a8ea19b1e908f65fe424d ./liboemcamera.so
---
> b1efb2d03a015fd47caa3138c44e79b6 ./liboemcamera.so
78c75
< fdee666971a3d824d459d128c0c24500 ./libomx_avcdec_sharedlibrary.so
---
> 789193da55b4aadf0fb72678917443b0 ./libomx_avcdec_sharedlibrary.so
81c78
< 065562c2d4ef5d33e530b5677435a9ec ./libomx_sharedlibrary.so
---
> 3ac5f6d5eeaa96a222fc29b7f3ad328e ./libomx_sharedlibrary.so
84,87c81,84
< c0f8c7bf2262413e63a427476000a60b ./libon2.so
< d5a90d28c846b0e8c49ab700693d7520 ./libopencore_author.so
< 6bfe57203292d0557b768329ed31e977 ./libopencore_common.so
< 1afe6f68e6ceb76b24314d3ad2168b1a ./libopencore_download.so
---
> e27446d23305a6c90bf670a701f1ef7e ./libon2.so
> b30ff7564c26767ddad111af3654cb6d ./libopencore_author.so
> b7922a0f97477c0738a97547f5a0100a ./libopencore_common.so
> 8505b5e6b3c68dd29bb55401cbed27f4 ./libopencore_download.so
89c86
< 079cb1b10bc705bc78bc079dff171a6b ./libopencore_mp4local.so
---
> 828f7da7156e25ed2decef5abed20832 ./libopencore_mp4local.so
91,93c88,90
< d58696122e9adf2a236015cd6047500a ./libopencore_net_support.so
< 4fe6d34d4703a224e308b9e6081c7c3b ./libopencore_player.so
< fb07bd9b8a9b9602f91d5676fbe526bc ./libopencore_rtsp.so
---
> bae4f489dbedbaf205f30f9603520b4b ./libopencore_net_support.so
> ec1f4c7575903599730baa097b3888ed ./libopencore_player.so
> 8f7e81ab0cb3274eb05becc9c9f08d4e ./libopencore_rtsp.so
97,98c94
< 47eb91ca938e06cb2315b14b8853f047 ./libpagemap.so
< 284671a848dafdcfe8459bc1552f33b0 ./libpdfreader.so
---
> 265cb69c9e666c137c89932ce4e4fc0d ./libpdfreader.so
100c96
< b28049ebca1e49617c7144df1b852a9c ./libpng.so
---
> 4151b62ce7e2864e5dc9ed643db87229 ./libpng.so
107c103
< 82a5fe1b361af67a63f8ca6e8ede0e18 ./libril.so
---
> dc9190cb11832471b928f89336f8213b ./libril.so
109,110c105
< e2a6acb3c11e1565ef922ea86776c53e ./librs_jni.so
< 242fc6432bf7ca088fad06656a7ff701 ./libscalado_htcalbum.so
---
> 86f985092adce4a337e7bc837387cb37 ./libscalado_htcalbum.so
112c107
< cfc95838d1f579b79b07afe5e15ee0dd ./libscaladoutil.so
---
> 748eb67e541ff4ed69cd9b4dfc265355 ./libscaladoutil.so
114c109
< fb0862274616c9875c9cc045d2b290bc ./libskia.so
---
> 8e2d2b9b0ea214bbb31595b29407ecda ./libskia.so
117,118c112,113
< a10e359cd82d3056f137394ad0288041 ./libsorenson.so
< 75a6c9dbcba76e445c578e6d74f1e9c3 ./libsoundpool.so
---
> a34ba7352a33b7b1de8002a3897e0ae1 ./libsorenson.so
> b6d5e23e92e243cf77fd5f5553a4f573 ./libsoundpool.so
120c115
< 8fb9489560dc15fcfe3623527ded1779 ./libsqlite.so
---
> 92b95514e67598375aba00d9aa7ae462 ./libsqlite.so
124c119
< c2075058fce338d1191f163757d98f7b ./libstagefright_omx.so
---
> 3be7c6d470e7c13400581a8ec713a8e8 ./libstagefright_omx.so
126c121
< 9601969f5353325e6e001c7515f1b589 ./libsurfaceflinger.so
---
> f4a067e0c5d75b7c987ac8eb7a49809d ./libsurfaceflinger.so
129c124,125
< 1786d27c2c6a802eb9d19627678e188d ./libt9.so
---
> 923f986bf6cc3b0d237a5ce471782d06 ./libt9.so
> 0c47935ca9e2ae028e53e77984f106af ./libt99.so
133,134c129,130
< 0541937ea21ea7475044c90d78b8fb83 ./libui.so
< ecc05a845f3a908d5d82dd4a1e1014cb ./libutils.so
---
> 5935e16f649edf953fd0a2f0ee69349e ./libui.so
> 3fc236a560fb5fad26dc7bd3cf7b95fe ./libutils.so
136,137c132
< 820547c2222351e0873a0fd4eb7c5b76 ./libwbxml_jni.so
< bd5d2f0a86880c774cf3fad8da942900 ./libwebcore.so
---
> 8821d12213bf755516b3b9e29918dd23 ./libwebcore.so
141d135
< e478b6642290430ec99c59f8c4f2714d ./libxml2wbxml.so
145,154c139,148
< 1a841b0015b26f894a3e497657722f14 ./am.jar
< 2717079b5e76171bd6a725a48fc854bd ./android.policy.jar
< 3eaa53806fb0f73f35c33761792b10d5 ./android.test.runner.jar
< 9ccd5adadb2d8c7b04fbad94830f0d9b ./bmgr.jar
< cfcd8db937e3264250e54910d8459a1d ./com.google.android.gtalkservice.jar
< d936d256ee84aba06fc73de1d8e69d19 ./com.google.android.maps.jar
< 12f39b8b9196d49c7a5a0e81933b458b ./com.htc.android.easopen.jar
< e8ff01ab1d466e3c96b48be305a66898 ./com.htc.android.pimlib.jar
< e0ea625b80db9580f33d29fa26757986 ./com.htc.framework.jar
< de8032b0c7dc4fdef91c4775d08daa19 ./com.htc.resources.apk
---
> 9562b3cce9228437147d12ff8e7831f8 ./am.jar
> 738d0bbf0350d9210d14353c155aa45f ./android.policy.jar
> 586d8546c17549be0ebc90a54280d305 ./android.test.runner.jar
> c656279fc11cca42d733646dca30fc0a ./bmgr.jar
> 24a2858c35900ddd70cc68bd2fa1f82c ./com.google.android.gtalkservice.jar
> 048fb1e412f6b104702983a030455d1d ./com.google.android.maps.jar
> df060f241b0203069fd5a1ee96ac4f17 ./com.htc.android.easopen.jar
> c800cee88d40e9f6f9e724df0b2fbdeb ./com.htc.android.pimlib.jar
> df2924bcd1f5761220748c4604da6f48 ./com.htc.framework.jar
> 0ff831489251bd29b2255168f5b13667 ./com.htc.resources.apk
156,168c150,162
< be7c119cb51cb61a5719c859956e6f86 ./com.scalado.util.ScaladoUtil.jar
< 874c26e2b3ed3c3299819b1eea8b7485 ./core.jar
< cd98f51a47694451a54c1152c82c01e2 ./ext.jar
< 55cd6a4cb3836506d2e9cd27b55c4b37 ./framework-res.apk
< 9704be446064fa017b118e61df9c0228 ./framework-tests.jar
< d45aef2c4a6d64febeb4aff65ef68100 ./framework.jar
< 6cade0d545db2f51df19998ce9bee2d8 ./ime.jar
< 84f18308870236837227e6c72675e7b6 ./input.jar
< b1890cc71cfa01ac67ca4b0f579c7fb9 ./javax.obex.jar
< d739d68368da39e603dd0886f62a5fcb ./monkey.jar
< feeacf4c771977de1464b2af99948165 ./pm.jar
< efe399bab9f2ac51bca728cc6387195c ./services.jar
< 8332528abff948315f2ec7839cf2c4bc ./svc.jar
---
> 1ec05b57dd8e200454304684bcff3322 ./com.scalado.util.ScaladoUtil.jar
> 6bc72906b98baf7edf4e3bd1f545c334 ./core.jar
> e84b0b5245bbfa7451d28bda6e5d3d72 ./ext.jar
> e38c632e17e366205d617a8ef4782295 ./framework-res.apk
> 6e3679282cf3a91bc22eb20dbb2477f3 ./framework-tests.jar
> 4f8f749668246940685087f734258600 ./framework.jar
> 6dd5de43fd1daa193cf95b5eb31cf915 ./ime.jar
> 5f027f3c7439407909ca9d3234b5ab45 ./input.jar
> 312c0bf18b42cac7dc095be8987bbca1 ./javax.obex.jar
> 346bcdec54666f0258a003ea5911a8c9 ./monkey.jar
> 0e3d40c0c28c831b03ecb27fbeb9c4b1 ./pm.jar
> a6ac5ca10a669a3b18c1a28079eb5e56 ./services.jar
> f0334f865d099d4d2022fcdfe0cb0545 ./svc.jar
Ouch! That gotta hurt real bigtime. EVERYTHING is different between their 5.5.0 and 6.x release. Why in the hell would you make such a big change in your core? Oh yeah because Cronos was passing you by in a time teleporter.
Sorry guys. But you guys are jerks. Flaming Cronos Thread with LIES all f*****g lies.
PS. If Cronos Droid was the faulty one here. I would have write it exactly the same. I have been following you guys in the Cronos Thread all this time and thought I really needed to do this as I think the mods and VillainROM have not been playing fair against Feeyo and his ROM.
Feeyo, you rock man. You did a great job. Keep up the good work!
Oh come on, stop this damn drama.
Who cares really?
I, for one, am massively happy that the Hero scene is rolling again (it was pretty quiet for a while).
Any chance a mod could lock nonsense like this and let us enjoy the fine work devs put out?
I am just making a point here. As they have been fully attacking for no reason and everyone accepted it.
No one from the villain rom ever accused him of stealing you bloody downsie. They just asked for some credit Jesus Christ, drop it already.
Interesting point your making here; but for clarity: how should your listings be interpreted? What are we looking at anyway? I see what looks like MD5 hashes to me in some sort of diff output. When is something different and when not?
seshmaru said:
No one from the villain rom ever accused him of stealing you bloody downsie.
Click to expand...
Click to collapse
wrong. just wrong.
Not wrong, it was all the fanboys who accused him of stealing, all team Villain did was ask for some credit. Stop being so bloody dense.
seshmaru said:
Not wrong, it was all the fanboys who accused him of stealing, all team Villain did was ask for some credit. Stop being so bloody dense.
Click to expand...
Click to collapse
Well the PM he showed was not really asking him anything. More forcing him or he will get noted by the devs as he was braking the opensource rules or forum rules whatever.
Also not to note they have been attacking him stating he did not have any goldfish sources and was lying bastard.
'It's just a disco, darlings.'
You really had some spare time didn't you Shakor?
To be honest I am happy I did not steal anything and lied about it with these kind of proofs you are really pushed the ground in ehhehe/
Oh yeah you know what. As you guys want to play the game like this. I changed my mind about the goldfish sources I use to compile my kernels from.
Shakor said:
Well the PM he showed was not really asking him anything. More forcing him or he will get noted by the devs as he was braking the opensource rules or forum rules whatever.
Also not to note they have been attacking him stating he did not have any goldfish sources and was lying bastard.
Click to expand...
Click to collapse
The original request was not telling him he was stealing, it was asking to give homersp credit, whatever happened after is mostly because of fanboys blowing the situation up and things that were said during the whole dramafest really don't have to be accounted for since everyone was flinging poo at eachother.
seshmaru said:
Not wrong, it was all the fanboys who accused him of stealing, all team Villain did was ask for some credit. Stop being so bloody dense.
Click to expand...
Click to collapse
i know it. i could proof it. but i dont publish pm's (im not feeyo ).
this topic is also not related to the credit things, but points to another highly interesting direction. For the credits of the work and the whole story bout the 1.7 there are other threads.
This thread possibly just shows another face. But im investigating the results. Perhaps there is a reason why Villain got exactly the same libs like Feeyo had (new leak ?). We will see in a short time, I think the guys at Villain have an explanation for that, else... this would be a nightmare for them. Lets see
http://forum.xda-developers.com/showthread.php?p=6764765#post6764765
Andro1d said:
i know it. i could proof it. but i dont publish pm's (im not feeyo ).
this topic is also not related to the credit things, but points to another highly interesting direction. For the credits of the work and the whole story bout the 1.7 there are other threads.
This thread possibly just shows another face. But im investigating the results. Perhaps there is a reason why Villain got exactly the same libs like Feeyo had (new leak ?). We will see in a short time, I think the guys at Villain have an explanation for that, else... this would be a nightmare for them. Lets see
Click to expand...
Click to collapse
Yeah they can make up anything really. BUT if they are saying there was a new leak then I want the original leak posted with exact name of the leak and where they got it from so I can check if that is true or not.
I used both roms and in my modest opinion this is all going too far!
Make Roms not War!
Please!
cyberon said:
I used both roms and in my modest opinion this is all going too far!
Make Roms not War!
Please!
Click to expand...
Click to collapse
Wrong, if this post (#1) here is true, than Villain should be banned. Completely. The libs are 90% of the work of a ROM, and IF (i say, IF, and not they have for sure) they have stolen the complete libraries of Feeyo, THEN this is much much much more massive then credits for 1-2 widgets and a bit of gui.
Not saying that this was OK (the apps feeyo used from vr without the correct credits), but we should take the relations into credit
Im highly interested in an official statement of Villain and a proof that this proof (post #1) is wrong or misinterpreted.
*puh* it's getting complicated
oh my... this is really getting hot
[highlight]Mod Edit: odin13... this is the second time I see a reported post from you. Consider yourself warned[/highlight]
I am happy the truth is finally coming forth. Can someone please tell Villains Devs this thread is going as they are normally really fast with answering.
Also I want proof that my libs were taken from that cdma leak and the post with the exact release date from that so called leak. As I can then compare it with my first rom post and the so called leaked one.

Windows 10 Mobile version 1511 codename Treshold 2 builds number + OS version

Because I was struggling to find them, I create a thread to offer the information I gathered.
So, here is a small list of the builds number and their equivalent OS version:
10.0.10586.0 -> 10.0.13052.0
10.0.10586.11 -> 10.0.13058.11
10.0.10586.29 -> 10.0.13065.29
10.0.10586.36 -> 10.0.13067.36
10.0.10586.63 -> 10.0.13070.63
10.0.10586.71 -> 10.0.13073.71
10.0.10586.107 -> 10.0.13080.107
10.0.10586.122 -> 10.0.13086.122
10.0.10586.164 -> 10.0.13090.164
10.0.10586.218 -> 10.0.13111.218
10.0.10586.242 -> 10.0.13125.242
10.0.10586.318 -> 10.0.13169.318

Block Device/Partition & other dev information Thread

Hi people,
I would like to collect some dev info for the M2 which may help in future development efforts - maybe tweak the official ROMs to be less idiotic, or develop new ROMs, apps, etc.
If any of you can contribute info similar to what I have shown below, it would be greatly appreciated. I will collate and analyze the info from your replies and add it to these first couple of posts so that it serves as the main repo of this dev info.
*** DISCLAIMER *** Please do not attempt to collect any info from your device if you are not confident about or familiar with how to root your device or how to use shell commands in a root terminal shell. Any and all damage you may cause to your device in the pursuit of gathering this information is solely your responsibility and I will be neither responsible nor accountable for any such damage.
Still reading? Good. I commend your enthusiasm :good:
Guide: Block Device/Partition Information
Introduction
Here are some links explaining what Android partitions are and what they do. While some of the info in the links refers to other devices or has been superseded by changes to Android since the article was written, the basic information itself holds good:
http://www.all-things-android.com/content/review-android-partition-layout
http://donandroid.com/android-partitions-sdcard-boot-recovery-cache-data-system-misc-1043
https://sites.google.com/site/tomsgt123/adb-fastboot/understanding-android
This information is important because:
It will help us to map the contents of the official UPDATE.APP to the proper locations on the ROM Storage where they must be flashed.
It will help the developers of the Huawei Update Extractor tool to create an extractor profile specific for our M2 8.0 or 10.0 devices.
EDIT: I have actually already done this for the M2-802L, see my post on the Huawei Update extractor tool thread. Now we just need to wait for worstenbrood to integrate it into a new release of the Extractor.
It will help in the development of new ROMs.
How to get the partition info on your device
Prerequisites:
Your device needs to be rooted.
You need to be able to get a root shell terminal on your phone, either using adb or using a terminal emulator app like "Termux" or "Terminal Emulator for Android". If you're going to be using a Terminal Emulator app on your phone, you'll find that the Hacker's Keyboard app will make your life much much easier when dealing with shells on the phone (ever tried to type any control character sequence at all, like CTRL+C, using all those cute fancy soft keyboards on the play store?)
You need to know how to use a terminal emulator and be comfortable with using shell commands (see Disclaimer above).
Method
Using ADB to get a root shell on your phone:
Ensure that you have the drivers for the phone installed on the computer. If not,
For Windows: just install the HiSuite app from Huawei to get the drivers. You can uninstall HiSuite immediately after it's installed (it's a useless piece of dreck, only useful for the drivers it installs) but the drivers will remain installed.
For Linux: The Android SDK for Linux should give you the generic ADB drivers. Then see this webpage for setting a proper USB device ID for Huawei devices in case you have issues. I have not yet tested this for myself, BTW.
Ensure that you have adb on your computer. If not,
For Windows: you can grab it from the Unlock guide thread.
For Linux: The Android SDK for Linux should have given you this already. If not, something is very very wrong with your universe.
Ensure that your phone is rooted. Follow the above-linked guide if you need to only if you are confident about being able to perform what's required and don't mind voiding your warranty and risking permanent damage to your phone and sanity. If your phone is not rooted, this is not going to work.
Connect your phone to the computer via USB.
Open up a command prompt. On Windows, this involves typing "cmd" in the search bar. On Linux, fire up the terminal app of your choice. I recommend gnome-terminal. Then navigate to the directory where the adb executable is located.
Check whether your device is recognized by adb. Type the following command:
Code:
adb devices
Your output should look something like this (the device ID in the output below will be particular to your phone):
Code:
List of devices attached
AAA0A1234567890 device
If your output doesn't look like the above, you may have a problem with the setup, and subsequent steps may not work. But we'll see.
Obtain a shell into your phone from adb:
Code:
adb shell
This should return a prompt into a shell on your phone which looks something like this:
Code:
[email protected]:/ $
Now convert that plain old shell into a root shell (you are rooted by now, aren't you?):
Code:
su
You should now be in a root shell, as evidenced by the following output (notice that the $ in the previous output changed to #):
Code:
[email protected]:/ #
Using a Terminal Emulator app on the phone to get a root shell:
Fire up the terminal emulator app on your phone (see the "Prerequisites" section above for a couple of suggestions on good terminal emulators I've personally used).
Type the following to get into a root shell in the terminal:
Code:
su
You should now be in a root shell, as evidenced by your prompt changing from $ to #.
Now we actually get to business! If you successfully got a root shell, it's time to issue the command to get the device partitions and their mappings! Type the following command exactly as shown (the cleverer folk can simple copy-paste it):
Code:
ls -l /dev/block/platform/hi_mci.0/by-name | tr -s ' ' | cut -d' ' -f6-8 > /storage/sdcard0/mypartitions.txt
The above command should put a list of partitions and their mappings into a text file called mypartitions.txt on the root directory of your phone's internal SD card mountpoint (if you want it put on your external SD card mountpoint, replace /storage/sdcard0/mypartitions.txt in the command with this: /storage/sdcard1/mypartitions.txt and you should find it placed accordingly).
The file mypartitions.txt can now be transferred from your phone to your computer via USB (or you can open it directly on your phone using a text editor) and add the info to a reply here.
Good luck!
Information on individual devices
Block Device/Partition Information for individual devices
Mediapad M2 8.0 (M2-802L)
Block Device/Partitions
Code:
vrl -> /dev/block/mmcblk0p1
vrl_backup -> /dev/block/mmcblk0p2
mcuimage -> /dev/block/mmcblk0p3
reserved0 -> /dev/block/mmcblk0p4
fastboot -> /dev/block/mmcblk0p5
modemnvm_factory -> /dev/block/mmcblk0p6
nvme -> /dev/block/mmcblk0p7
oeminfo -> /dev/block/mmcblk0p8
splash -> /dev/block/mmcblk0p9
modemnvm_backup -> /dev/block/mmcblk0p10
modemnvm_img -> /dev/block/mmcblk0p11
modemnvm_system -> /dev/block/mmcblk0p12
securetystorage -> /dev/block/mmcblk0p13
3rdmodemnvm -> /dev/block/mmcblk0p14
3rdmodemnvmback -> /dev/block/mmcblk0p15
reserved1 -> /dev/block/mmcblk0p16
modem_om -> /dev/block/mmcblk0p17
splash2 -> /dev/block/mmcblk0p18
misc -> /dev/block/mmcblk0p19
modemnvm_update -> /dev/block/mmcblk0p20
recovery2 -> /dev/block/mmcblk0p21
reserved2 -> /dev/block/mmcblk0p22
teeos -> /dev/block/mmcblk0p23
trustfirmware -> /dev/block/mmcblk0p24
sensorhub -> /dev/block/mmcblk0p25
hifi -> /dev/block/mmcblk0p26
boot -> /dev/block/mmcblk0p27
recovery -> /dev/block/mmcblk0p28
dtimage -> /dev/block/mmcblk0p29
modem -> /dev/block/mmcblk0p30
modem_dsp -> /dev/block/mmcblk0p31
dfx -> /dev/block/mmcblk0p32
3rdmodem -> /dev/block/mmcblk0p33
cache -> /dev/block/mmcblk0p34
hisitest0 -> /dev/block/mmcblk0p35
hisitest1 -> /dev/block/mmcblk0p36
hisitest2 -> /dev/block/mmcblk0p37
system -> /dev/block/mmcblk0p38
cust -> /dev/block/mmcblk0p39
userdata -> /dev/block/mmcblk0p40
CPU Info (gathered by CPU-Z)
Code:
CPUs : 8
SoCs : 1
CPU 0 : AArch64 Processor rev 3 (aarch64)
Name : HiSilicon Kirin 930
CPUs : 8
Core set 0 : ARM Cortex-A53
Core set 0 Nb Cores : 4
Core set 0 Max Clock : 2016 MHz
Core set 0 Impl.id : 0x41
Core set 0 Arch.id : 0x8
Core set 0 Var.id : 0
Core set 0 Part.id : 0xd03
Core set 0 Rev.id : 3
Core set 0 Revision : r0p3
Core set 1 : ARM Cortex-A53
Core set 1 NbCores : 4
Core set 1 Max Clock : 1516 MHz
Core set 1 Part.id : 0xd03
Arch : 4x ARM Cortex-A53 @2.02 GHz+4x ARM Cortex-A53 @1.52 GHz
Codename :
Process : 28 nm
GPU Vendor : ARM
GPU Renderer : Mali-T624
Model : HUAWEI M2-802L (M2)
Manufacturer : HUAWEI
Board : mozart
Hardware : hi3635
Android Ver. : 5.1.1
Kernel Arch. : armv7l
Battery capacity : 4650
--- CPUInfos ---
abi : armeabi-v7a
abi2 : armeabi
supported abis : [arm64-v8a, armeabi-v7a, armeabi]
supported 32-bit abis : [armeabi-v7a, armeabi]
supported 64-bit abis : [arm64-v8a]
Processor : AArch64 Processor rev 3 (aarch64)
processor : 0
processor : 1
processor : 2
processor : 3
processor : 4
processor : 5
processor : 6
processor : 7
Features : fp asimd evtstrm aes pmull sha1 sha2 crc32 wp half thumb fastmult vfp edsp neon vfpv3 tlsi vfpv4 idiva idivt
CPU implementer : 0x41
CPU architecture: 8
CPU variant : 0x0
CPU part : 0xd03
CPU revision : 3
Hardware : Hisilicon Kirin 930
--- Debug Infos ---
16=667000000
17=120000000
18=0
19=120000000 240000000 360000000 400000000 667000000 800000000
20=cluster0=42
21=cluster1=25
22=gpu=37
23=modem=44
24=ddr=82
25=system_h=34
26=system_l=15
27=flash_led=29
28=charger=34
29=pa_0=30
30=Battery=29000
56=cluster0=41
57=cluster1=25
58=gpu=37
59=modem=44
60=ddr=82
clock 0=1516800
clock2 0=151600
clock 1=1516800
clock2 1=151600
clock 2=1516800
clock2 2=151600
clock 3=1516800
clock2 3=151600
clock 4=2016000
clock2 4=201600
clock 5=2016000
clock2 5=201600
clock 6=2016000
clock2 6=201600
clock 7=2016000
clock2 7=201600
Reserved
Reserved
Reserved 2

MIUI Debloat + Optmizations

Hey Guys, i've made a script to debloat MIUI and to install some Kernel optimizations at the INIT.D folder plus anti Google Play Services Wakelock Script (at INIT.D as well).
Usually i use it on mi-globe and MIUI-MIX but it should work for Xiaomi.eu, Global and Chinese ROMs too (both beta and stable).
Thanks to @kevp75 for the line:
Code:
ifelse(
(is_mounted("/system")), (
assert(run_program("/sbin/mount", "-o", "remount,rw", "/system"));
), (
assert(run_program("/sbin/mount", "-o", "rw", "/dev/block/bootdevice/by-name/system", "/system_root"));
)
);
ATTENTION!! I ONLY RECOMMEND USING THE OFFICIAL TWRP, ORANGEFOX AND MAURONO UNOFFICIAL DOES NOT WORK!!
https://twrp.me/xiaomi/xiaomimi9t.html
Instalation:
1 - Reboot in to TWRP after first boot and setup.
2 - Make a nanodroid full system Backup for safety.
3 - Go to Mount and make sure SYSTEM is mounted!
4 - Run the script.
5 - Reboot in to system.
6 - Profit.
If you wipe the system partition, you will need to reboot in to the OS and back to TWRP before flash the debloat script.
Download:
https://androidfilehost.com/?fid=4349826312261796697
What will it debloat:
Code:
delete_recursive("/system/app/AiAsstVision");
delete_recursive("/system/app/AnalyticsCore");
delete_recursive("/system/app/BTProductionLineTool");
delete_recursive("/system/app/BasicDreams");
delete_recursive("/system/app/BookmarkProvider");
delete_recursive("/system/app/BuiltInPrintService");
delete_recursive("/system/app/CatchLog");
delete_recursive("/system/app/Cit");
delete_recursive("/system/app/CloudPrint2");
delete_recursive("/system/app/Email");
delete_recursive("/system/app/FM");
delete_recursive("/system/app/GooglePrintRecommendationService");
delete_recursive("/system/app/GoogleTTS");
delete_recursive("/system/app/GuardProvider");
delete_recursive("/system/app/Health");
delete_recursive("/system/app/Joyose");
delete_recursive("/system/app/KSICibaEngine");
delete_recursive("/system/app/Lens");
delete_recursive("/system/app/MarkupGoogle");
delete_recursive("/system/app/MiLinkService");
delete_recursive("/system/app/MiPlayClient");
delete_recursive("/system/app/MiRadio");
delete_recursive("/system/app/MiuiBugReport");
delete_recursive("/system/app/MiuiCompass");
delete_recursive("/system/app/MiuiContentCatcher");
delete_recursive("/system/app/MiuiDaemon");
delete_recursive("/system/app/MiuiAccessibility");
delete_recursive("/system/app/MiuiSuperMarket");
delete_recursive("/system/app/MiuiVideoGlobal");
delete_recursive("/system/app/NextPay");
delete_recursive("/system/app/PartnerBookmarksProvider");
delete_recursive("/system/app/PaymentService");
delete_recursive("/system/app/PrintRecommendationService");
delete_recursive("/system/app/PrintSpooler");
delete_recursive("/system/app/SoundPickerPrebuilt");
delete_recursive("/system/app/Stk");
delete_recursive("/system/app/WPS_lite");
delete_recursive("/system/app/XMCloudEngine");
delete_recursive("/system/app/YellowPage");
delete_recursive("/system/app/YouDaoEngine");
delete_recursive("/system/app/greenguard");
delete_recursive("/system/app/lens");
delete_recursive("/system/app/mi_connect_service");
delete_recursive("/system/app/wps_lite");
delete_recursive("/system/app/Zman");
delete_recursive("/system/data-app/");
delete_recursive("/system/data-app/BaiduIME");
delete_recursive("/system/data-app/Email");
delete_recursive("/system/data-app/MiFinance");
delete_recursive("/system/data-app/MiMobileNoti");
delete_recursive("/system/data-app/MiShop");
delete_recursive("/system/data-app/XiaomiSpeechEngine");
delete_recursive("/system/data-app/cn.wps.moffice_eng");
delete_recursive("/system/data-app/com.eg.android.AlipayGphone");
delete_recursive("/system/data-app/com.taobao.taobao");
delete_recursive("/system/data-app/com.xunmeng.pinduoduo");
delete_recursive("/system/priv-app/BATestApp");
delete_recursive("/system/priv-app/CleanMaster");
delete_recursive("/system/priv-app/DynamicSystemInstallationService");
delete_recursive("/system/priv-app/GoogleFeedback");
delete_recursive("/system/priv-app/GooglePartnerSetup");
delete_recursive("/system/priv-app/HotwordEnrollmentOKGoogleWCD9340");
delete_recursive("/system/priv-app/HotwordEnrollmentXGoogleWCD9340");
delete_recursive("/system/priv-app/MiMoverGlobal");
delete_recursive("/system/priv-app/MiRecycle");
delete_recursive("/system/priv-app/MiService");
delete_recursive("/system/priv-app/MiShare");
delete_recursive("/system/priv-app/PersonalAssistant");
delete_recursive("/system/priv-app/QuickSearchBox");
delete_recursive("/system/priv-app/Updater");
delete_recursive("/system/priv-app/Velvet");
delete_recursive("/system/priv-app/VpnDialogs");
delete_recursive("/system/priv-app/WellbeingPrebuilt");
delete_recursive("/system/priv-app/YellowPage");
delete_recursive("/system/product/app/GoogleLocationHistory");
delete_recursive("/system/product/app/GoogleTTS");
delete_recursive("/system/product/app/SoundPickerPrebuilt");
delete_recursive("/system/product/app/uceShimService");
delete_recursive("/system/product/app/xdivert");
delete_recursive("/system/product/priv-app/CarrierServices");
delete_recursive("/system/product/priv-app/GoogleAssistant");
delete_recursive("/system/product/priv-app/GoogleFeedback");
delete_recursive("/system/product/priv-app/HotwordEnrollmentOKGoogleHEXAGON");
delete_recursive("/system/product/priv-app/HotwordEnrollmentXGoogleHEXAGON");
delete_recursive("/system/product/priv-app/Launcher3QuickStep");
delete_recursive("/system/product/priv-app/Velvet");
delete_recursive("/system/vendor/app/CneApp");
delete_recursive("/system/vendor/app/aiasst_service");
delete_recursive("/system/vendor/data-app/");
delete_recursive("/system/vendor/data-app/SmartHome");
delete_recursive("/system/vendor/data-app/aiasst_service");
delete_recursive("/system/vendor/data-app/wps-lite");
Kernel Optimization Script:
Code:
#!/system/bin/sh
setenforce 0
set enforce 0
echo 'Y' > /sys/module/sync/parameters/fsync_enabled
sysctl -w net.ipv4.tcp_congestion_control=cubic
#echo '254 255 256' > /sys/devices/platform/kcal_ctrl.0/kcal
#echo '1' > /sys/devices/platform/kcal_ctrl.0/kcal_enable
#echo '290' > /sys/devices/platform/kcal_ctrl.0/kcal_sat
#echo '261' > /sys/devices/platform/kcal_ctrl.0/kcal_val
#echo '264' > /sys/devices/platform/kcal_ctrl.0/kcal_cont
#echo '35' > /sys/devices/platform/kcal_ctrl.0/kcal_min
#echo '0' > /sys/devices/platform/kcal_ctrl.0/kcal_hue
echo 'Y' > /sys/module/wakeup/parameters/enable_timerfd_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_qcom_rx_wakelock_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_netlink_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_ipa_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_wlan_wake_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_wlan_ctrl_wake_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_wlan_rx_wake_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_msm_hsic_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_si_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_smb135x_wake_ws
#echo '0' > /sys/module/lowmemorykiller/parameters/enable_adaptive_lmk
#chmod 666 /sys/module/lowmemorykiller/parameters/minfree
#chown root /sys/module/lowmemorykiller/parameters/minfree
echo '16384,20736,24576,32256,85296,120640' > /sys/module/lowmemorykiller/parameters/minfree
echo '75' > /proc/sys/vm/swappiness
echo '17' > /proc/sys/vm/dirty_ratio
#echo '0' > /sys/kernel/sched/gentle_fair_sleepers
#echo '2830' > /sys/class/timed_output/vibrator/vtg_level
echo '3' > /sys/kernel/power_suspend/power_suspend_mode
echo '1' > /sys/kernel/fast_charge/force_fast_charge
Google Play Services Anti-Wakelock Script:
Code:
#!/system/bin/sh
setenforce 0
powerService.goToSleep(SystemClock.uptimeMillis() + 1);
echo disable_pm_suspend > /sys/power/wake_unlock
android.permission.WAKE_UNLOCK
/sys/power/wake_unlock
killall -9 android.process.media
killall -9 mediaserver
for apk in $(pm list packages -3 | sed 's/package://g' | sort); do
# Analytics
pm disable $apk/com.google.android.gms.analytics.AnalyticsService
pm disable $apk/com.google.android.gms.analytics.AnalyticsJobService
pm disable $apk/com.google.android.gms.analytics.CampaignTrackingService
pm disable $apk/com.google.android.gms.measurement.AppMeasurementService
pm disable $apk/com.google.android.gms.measurement.AppMeasurementJobService
pm disable $apk/com.google.android.gms.analytics.AnalyticsReceiver
pm disable $apk/com.google.android.gms.analytics.CampaignTrackingReceiver
pm disable $apk/com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
pm disable $apk/com.google.android.gms.measurement.AppMeasurementReceiver
pm disable $apk/com.google.android.gms.measurement.AppMeasurementContentProvider
pm disable $apk/com.crashlytics.android.CrashlyticsInitProvider
# Ads
pm disable $apk/com.google.android.gms.ads.AdActivity
# Firebase
pm disable $apk/com.google.firebase.iid.FirebaseInstanceIdService
done
exit 0
"I don't want to debloat an app that it does"
To fix that, you will need to update the script your self, but it's quite easy.
1 - Download the script on a Windows based PC that has 7zip and notepad++ installed.
2 - Open the script with zip and navigate to: "META-INF\com\google\android"
3 - Extract the file "updater-script"
4 - Edit it with notepad++ and look at the app you wish it would not debloat (for example, Clean Master)
5 - The delete the line that says "delete_recursive" and the app path (ex: delete_recursive("/system/priv-app/CleanMaster"); )
6 - Save the script and push it back to the zip file
Some apps such as maps, Google Assistant and Android Auto may be debloated on the script, but if you install it via the playstore after, the script will not debloat it, as it wont be a system app anymore.
Current version: v10 (05/03/2020)
Seems to work but phone gets a bit laggy sometimes...
mejgs said:
Seems to work but phone gets a bit laggy sometimes...
Click to expand...
Click to collapse
It may be the VM and OOM, i'll take off those "optimizations" on the next release tomorrow.
What TWRP did you use, if you don't mind me asking.
New Build Up!
Lag should stop now that i disable the VM and OOM custom parameters, plus i added CatchLog to uninstall.
Pupet_Master said:
It may be the VM and OOM, i'll take off those "optimizations" on the next release tomorrow.
What TWRP did you use, if you don't mind me asking.
Click to expand...
Click to collapse
I used 4pda's
Pupet_Master said:
Hey Guys, i've made a script to debloat MIUI and to install some Kernel optimizations at the INIT.D folder plus anti Google Play Services Wakelock Script (at INIT.D as well) and full hosts for adblock without any external app.
Now, i may add more things to debloat since this script was optimized for Redmi Note 5 Pro Whyred and even though it work on that device, on the Redmi 4X Santoni and even on a Moto G LTE Peregrine.. on 4PA TWRP it didn't work. I'm still troubleshooting why. Once i figure out another TWRP that allow me to flash it or what i'm doing wrong (since it isn't a script issue, it's a recovery problem) i'll test other system apps to debloat specific from our Mi9t DaVinci.
That being said, i would like you guys to test it, see if it work for you guys and give me a feedback to what TWRP do you guys use/ what version of MIUI you guys debloated.
Usually i use it on mi-globe but it should work for Xiaomi.eu, Global and Chinese ROMs too (both beta and stable).
Instalation:
1 - Reboot in to TWRP after first boot and setup.
2 - Make a nanodroid full system Backup for safety.
3 - Run the script.
4 - Reboot in to system.
5 - Profit.
Download:
https://androidfilehost.com/?fid=1899786940962594365
What will it debloat:
Code:
"/system/app/AnalyticsCore"
"/system/app/BasicDreams"
"/system/app/BuiltInPrintService"
"/system/app/CatchLog"
"/system/app/CloudPrint2"
"/system/app/Email"
"/system/app/GooglePrintRecommendationService"
"/system/app/greenguard"
"/system/app/KSICibaEngine"
"/system/app/Lens"
"/system/app/MarkupGoogle"
"/system/app/MiDrive"
"/system/app/MiuiBugReport"
"/system/app/MiuiDaemon"
"/system/app/MiuiSuperMarket"
"/system/app/PrintRecommendationService"
"/system/app/PrintSpooler"
"/system/app/SoundPickerPrebuilt"
"/system/app/Stk"
"/system/app/YellowPage"
"/system/app/YouDaoEngine"
"/system/data-app/"
"/system/data-app/BaiduIME"
"/system/data-app/cn.wps.moffice_eng"
"/system/data-app/com.eg.android.AlipayGphone"
"/system/data-app/com.taobao.taobao"
"/system/data-app/com.xunmeng.pinduoduo"
"/system/data-app/Email"
"/system/data-app/MiFinance"
"/system/data-app/MiMobileNoti"
"/system/data-app/MiShop"
"/system/data-app/XiaomiSpeechEngine"
"/system/priv-app/BATestApp"
"/system/priv-app/Browser"
"/system/priv-app/GoogleBackupTransport"
"/system/priv-app/GoogleFeedback"
"/system/priv-app/MiRecycle"
"/system/priv-app/MusicFX"
"/system/priv-app/HotwordEnrollmentOKGoogleWCD9340"
"/system/priv-app/HotwordEnrollmentXGoogleWCD9340"
"/system/priv-app/Velvet"
"/system/priv-app/WellbeingPrebuilt"
"/system/priv-app/YellowPage"
"/system/vendor/data-app/"
"/system/vendor/data-app/SmartHome"
"/system/vendor/data-app/wps-lite"
"/system/vendor/data-app/aiasst_service"
"/system/vendor/app/aiasst_service"
"/system/app/lens"
"/vendor/data-app/SmartHome"
"/vendor/data-app/wps-lite"
"/data/app/SmartHome"
"/data/app/wps-lite"
"/data/app/aiasst_service"
Full Hosts by Masik ROM (thank Masik Devs)
Kernel Optimization Script:
Code:
#!/system/bin/sh
setenforce 0
set enforce 0
echo 'Y' > /sys/module/sync/parameters/fsync_enabled
sysctl -w net.ipv4.tcp_congestion_control=westwood
#echo '254 255 256' > /sys/devices/platform/kcal_ctrl.0/kcal
#echo '1' > /sys/devices/platform/kcal_ctrl.0/kcal_enable
#echo '290' > /sys/devices/platform/kcal_ctrl.0/kcal_sat
#echo '261' > /sys/devices/platform/kcal_ctrl.0/kcal_val
#echo '264' > /sys/devices/platform/kcal_ctrl.0/kcal_cont
#echo '35' > /sys/devices/platform/kcal_ctrl.0/kcal_min
#echo '0' > /sys/devices/platform/kcal_ctrl.0/kcal_hue
echo 'Y' > /sys/module/wakeup/parameters/enable_timerfd_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_qcom_rx_wakelock_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_netlink_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_ipa_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_wlan_wake_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_wlan_ctrl_wake_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_wlan_rx_wake_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_msm_hsic_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_si_ws
echo 'Y' > /sys/module/wakeup/parameters/enable_smb135x_wake_ws
#echo '0' > /sys/module/lowmemorykiller/parameters/enable_adaptive_lmk
#chmod 666 /sys/module/lowmemorykiller/parameters/minfree
#chown root /sys/module/lowmemorykiller/parameters/minfree
#echo '19712,22272,36864,58368,65792,108494' > /sys/module/lowmemorykiller/parameters/minfree
#echo '0' > /sys/kernel/sched/gentle_fair_sleepers
#echo '2830' > /sys/class/timed_output/vibrator/vtg_level
echo '3' > /sys/kernel/power_suspend/power_suspend_mode
echo '1' > /sys/kernel/fast_charge/force_fast_charge
Google Play Services Anti-Wakelock Script:
Code:
#!/system/bin/sh
setenforce 0
powerService.goToSleep(SystemClock.uptimeMillis() + 1);
echo disable_pm_suspend > /sys/power/wake_unlock
android.permission.WAKE_UNLOCK
/sys/power/wake_unlock
killall -9 android.process.media
killall -9 mediaserver
for apk in $(pm list packages -3 | sed 's/package://g' | sort); do
# Analytics
pm disable $apk/com.google.android.gms.analytics.AnalyticsService
pm disable $apk/com.google.android.gms.analytics.AnalyticsJobService
pm disable $apk/com.google.android.gms.analytics.CampaignTrackingService
pm disable $apk/com.google.android.gms.measurement.AppMeasurementService
pm disable $apk/com.google.android.gms.measurement.AppMeasurementJobService
pm disable $apk/com.google.android.gms.analytics.AnalyticsReceiver
pm disable $apk/com.google.android.gms.analytics.CampaignTrackingReceiver
pm disable $apk/com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
pm disable $apk/com.google.android.gms.measurement.AppMeasurementReceiver
pm disable $apk/com.google.android.gms.measurement.AppMeasurementContentProvider
pm disable $apk/com.crashlytics.android.CrashlyticsInitProvider
# Ads
pm disable $apk/com.google.android.gms.ads.AdActivity
# Firebase
pm disable $apk/com.google.firebase.iid.FirebaseInstanceIdService
done
exit 0
Click to expand...
Click to collapse
Seems very nice I will test it. I think it's like L-Speed, NFS, FDE.AI or LKT kernel improvements but for MIUI while You are debloating stuff.
Is it working on MIUI 11?
Ky0sHiR0 said:
Seems very nice I will test it. I think it's like L-Speed, NFS, FDE.AI or LKT kernel improvements but for MIUI while You are debloating stuff.
Is it working on MIUI 11?
Click to expand...
Click to collapse
First, thanks for the feedback guys
Yes, you got it right but it go beyond lkt once se get kcal on our device as i tune the colors too (currently disabled though).
And yes it work on miui11
New Build Up!!
Added these apps on the list to be debloated:
/system/app/XMCloudEngine
/system/app/MiLinkService
Re Enabled the OOM setting for memory Management (report if phone get sluggish or not please, as it should not).
echo '19712,22272,36864,58368,65792,108494' > /sys/module/lowmemorykiller/parameters/minfree
The transitions is getting slower. (EU ROM 10.3.15)
someone tested the script with the latest weekly miui 11, EU 9.9.26 ?
stefano alegnini said:
someone tested the script with the latest weekly miui 11, EU 9.9.26 ?
Click to expand...
Click to collapse
Should work fine as it don't mod the rom, just debloat and add scripts
I'm testing new parameters for ram management and virtual memory. Next new build should be smoother
New Build Up!
Changes on Kernel tuneup:
sysctl -w net.ipv4.tcp_congestion_control=cubic
echo '16384,20736,24576,32256,85296,120640' > /sys/module/lowmemorykiller/parameters/minfree
echo '75' > /proc/sys/vm/swappiness
echo '17' > /proc/sys/vm/dirty_ratio
Successfully installed on EU 9.9.26 everything is ok, let's show the battery statistics in a couple of days, thanks for your work
Pupet_Master said:
Hey Guys, i've made a script to debloat MIUI and to install some Kernel optimizations at the INIT.D folder plus anti Google Play Services Wakelock Script (at INIT.D as well) and full hosts for adblock without any external app.
Now, i may add more things to debloat since this script was optimized for Redmi Note 5 Pro Whyred and even though it work on that device, on the Redmi 4X Santoni and even on a Moto G LTE Peregrine.. on 4PA TWRP it didn't work. I'm still troubleshooting why. Once i figure out another TWRP that allow me to flash it or what i'm doing wrong (since it isn't a script issue, it's a recovery problem) i'll test other system apps to debloat specific from our Mi9t DaVinci.
That being said, i would like you guys to test it, see if it work for you guys and give me a feedback to what TWRP do you guys use/ what version of MIUI you guys debloated.
Usually i use it on mi-globe but it should work for Xiaomi.eu, Global and Chinese ROMs too (both beta and stable).
Instalation:
1 - Reboot in to TWRP after first boot and setup.
2 - Make a nanodroid full system Backup for safety.
3 - Run the script.
4 - Reboot in to system.
5 - Profit.
Download:
https://androidfilehost.com/?fid=1899786940962596493
Click to expand...
Click to collapse
Could you kindly drop a version without the hosts file?
ah.kh.ali1 said:
Could you kindly drop a version without the hosts file?
Click to expand...
Click to collapse
Sure I'll so it.in a couple of hours and I'll quote.you
ah.kh.ali1 said:
Could you kindly drop a version without the hosts file?
Click to expand...
Click to collapse
No hosts build up
https://androidfilehost.com/?fid=1899786940962597127
Pupet_Master said:
No hosts build up
https://androidfilehost.com/?fid=1899786940962597127
Click to expand...
Click to collapse
Thanks Alot.
Just flashed V4. I don't know what you did, but it's much smoother now
What does the no host means? Edit... No need I got it now

[V3][ENGINEERING][ROM] OFFICIAL Engineering Firmware for MERLIN (Redmi Note 9 / Redmi 10X 4G)

Works with:
- Xiaomi Redmi Note 9
- Xiaomi Redmi 10X 4G
Build Date:
2020/09/20
Android Version:
QP1A.190711.020
Display ID:
AL2522-Merlin-V044-Q-0920
Build Fingerprint:
Redmi/merlin/merlin:10/QP1A.190711.020/17:userdebug/test-keys
Security Patch:
2019-12-05
Radio/Modem/Baseband Version:
MOLY.LR12A.R3.MP.V94.3
Download:
https://www.mediafire.com/file/4nky...V044-Q-0920_QP1A.190711.020_by-VD171.zip/file
Password:
Pass is in the attached file: PASSWORD_by_VD171.txt
How to flash it?
Use the attached scatter file.
Radio/Modem/Baseband properties:
Code:
md1_dbginfodsp=DbgInfo_DSP_MT6768_MOLY_LR12A_R3_MP_V94_3_2019_12_31_16_23.xz
md1_dbginfo=DbgInfo_LR12A.R3.MP_HUAQIN_Q0MP1_MT6769_SP_MOLY_LR12A_R3_MP_V94_3_2020_08_12_17_38.xz
md1_mddbmeta=MDDB.META_MT6768_S00_MOLY_LR12A_R3_MP_V94_3.EDB
md1_mddbmetaodb=MDDB.META.ODB_MT6768_S00_MOLY_LR12A_R3_MP_V94_3.XML.GZ
md1_mddb=MDDB_InfoCustomAppSrcP_MT6768_S00_MOLY_LR12A_R3_MP_V94_3.EDB
Prop.default:
Code:
ro.build.version.incremental=17
ro.vendor.build.version.incremental=17
ro.odm.build.version.incremental=17
ro.build.version.security_patch=2019-12-05
ro.vendor.build.security_patch=2019-12-05
ro.build.display.id=AL2522-Merlin-V044-Q-0920
ro.vendor.mediatek.version.release=alps-mp-q0.mp1.tc8sp2-V1.4_huaqin.q0mp1.k69v1.64_P1
ro.product.system.device=merlin
ro.product.system.model=merlin
ro.product.system.name=merlin
ro.build.product=merlin
ro.product.board=merlin
ro.product.vendor.device=merlin
ro.product.vendor.model=merlin
ro.product.vendor.name=merlin
ro.product.odm.device=merlin
ro.product.odm.model=merlin
ro.product.odm.name=merlin
ro.product.product.device=merlin
ro.product.product.model=merlin
ro.product.product.name=merlin
ro.build.flavor=merlin-userdebug
ro.build.description=merlin-userdebug 10 QP1A.190711.020 17 test-keys
ro.board.platform=mt6768
ro.system.build.id=QP1A.190711.020
ro.build.id=QP1A.190711.020
ro.vendor.build.id=QP1A.190711.020
ro.odm.build.id=QP1A.190711.020
ro.product.build.id=QP1A.190711.020
ro.system.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/17:userdebug/test-keys
ro.vendor.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/17:userdebug/test-keys
ro.bootimage.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/17:userdebug/test-keys
ro.odm.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/17:userdebug/test-keys
ro.product.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/17:userdebug/test-keys
ro.system.build.tags=test-keys
ro.build.tags=test-keys
ro.vendor.build.tags=test-keys
ro.odm.build.tags=test-keys
ro.system.build.type=userdebug
ro.build.type=userdebug
ro.vendor.build.type=userdebug
ro.odm.build.type=userdebug
ro.system.build.date=Sun Sep 20 21:42:19 CST 2020
ro.build.date=Sun Sep 20 21:42:19 CST 2020
ro.vendor.build.date=Sun Sep 20 21:42:19 CST 2020
ro.bootimage.build.date=Sun Sep 20 21:42:19 CST 2020
ro.odm.build.date=Sun Sep 20 21:42:19 CST 2020
ro.product.build.date=Sun Sep 20 21:42:19 CST 2020
MD5 hashes:
Code:
APDB_MT6768_S01__W1953 -> 3adfe0c4e41828cd51ed783da774bd08
boot-debug.img -> d83c79ff64413cee79261a019598843b
boot.img -> cf47a73562cfd84a7337b37637eb8cef
cache.img -> 3cf2afe595f5bce984fe128b0c7ffad7
Checksum.ini -> d7d0d34a198008b9e6fb0c05ae541473
crclist.txt -> 92dd74d56feaecf23e79df4f48f84d5b
cust.img -> e8c4e9f4ee0fe5052cf0dc356aedd8de
DbgInfo_LR12A.R3.MP_HUAQIN_Q0MP1_MT6769_SP_MOLY_LR12A_R3_MP_V94_3_2020_08_12_17_38_1_ulwctg_n -> e0403cc778e00cb658cd02b609ab07c2
dtb.img -> ec4b37b164f1bd9ce6f2b1b911ac0872
dtbo-verified.img -> 5ca7b2b8dbbcd5e8239fc86b9e7b5d19
dtbo.img -> 5ca7b2b8dbbcd5e8239fc86b9e7b5d19
efuse.img -> 421f2cead0fbea555680b96136555941
exaid.img -> e8c4e9f4ee0fe5052cf0dc356aedd8de
flash_all.bat -> a4c24e0551a1386f6e51f36d2d6bdc59
flash_all.sh -> dc8d312852f0a8ac1eb19bbf1aa548b4
flash_all_except_data_storage.bat -> b87fa122acd47a2c56f395d827279e85
flash_all_except_data_storage.sh -> 31d39c3cca6c4cc9d1faada57df05631
flash_all_lock.bat -> 4f72649c336b7851456dd195b054553d
flash_all_lock.sh -> ddc1c485c8ae8bdd3b7aa6c25f4aec68
flash_gen_md5_list.py -> dd670ee88280d308473a7aff355b975d
hat_extract.py -> cbf07a5e8389476f4ed71e34dcbd7591
hat_flash.sh -> fa3bdd091388cdb3fff69421cf4187cd
lk-verified.img -> fb9cf4a240ebca771322c8c8b1cbee0f
lk.img -> fb9cf4a240ebca771322c8c8b1cbee0f
logo.bin -> e5d5093b5d3c4a194717d286ae40b440
md1arm7.img -> a0453e723dc84255940d7791740d06db
md1img-verified.img -> 5d366d0581c6b7b6cee7c571994a9ed3
md1img.img -> 5d366d0581c6b7b6cee7c571994a9ed3
md3img.img -> 9a9c185e3f6234103e5949716b9962d2
MDDB.META.ODB_MT6768_S00_MOLY_LR12A_R3_MP_V94_3_1_ulwctg_n.XML.GZ -> e6a7041c231f66869b7f99e4cb059047
MDDB.META_MT6768_S00_MOLY_LR12A_R3_MP_V94_3_1_ulwctg_n.EDB -> 90f2b755306720c9a027f847940aadab
MDDB_InfoCustomAppSrcP_MT6768_S00_MOLY_LR12A_R3_MP_V94_3_1_ulwctg_n.EDB -> c70b510b9b27f5cce9d26c7e8330fe01
MT6768_Android_scatter.txt -> 0a8f16b2276ee9c37337a3937f71a7c8
preloader.img -> ff20fc3953e5118120a86453e7ae8f94
preloader_emmc.img -> ff20fc3953e5118120a86453e7ae8f94
preloader_merlin.bin -> d2c78e614adf75b98b2b6de74dfb4675
preloader_ufs.img -> 75476892bff904450c5ae508b2eb77f7
product.img -> 70caf1a9a02a51c7d9ab82da995179b3
ramdisk-debug.img -> b6048055b240d3c9f6933544b86416b5
ramdisk-recovery.img -> 2b548447b982a6479c337248cb107923
ramdisk.img -> 545ec84cf25662d1e4f4cf7e496fa56e
recovery.img -> f3d00ee3de8ba4598318c3a80fdbad63
scp-verified.img -> 59c5f50b8c122a4ee24d02a24aa61c24
scp.img -> 59c5f50b8c122a4ee24d02a24aa61c24
secro.img -> 096587b863e1252d67b1b8307291db09
sparsecrclist.txt -> f86c5c6014c64c10f2dc46e5c83cab8e
spmfw-verified.img -> e35bd811230ff7766be8eb25e6c5be75
spmfw.img -> e35bd811230ff7766be8eb25e6c5be75
sspm-verified.img -> 92c771de8cf02d3f0b9f43ae53518218
sspm.img -> 92c771de8cf02d3f0b9f43ae53518218
super.img -> 6afd5e925807b8a2c42c9cbc731972ff
super_empty.img -> a6d56d7a12d989bf31511d866449291d
system.img -> 08c18ce6844b539e4ac3317195c0485b
tee-verified.img -> 56721dfff0af3f502b5bbb8d9d0006c1
tee.img -> 56721dfff0af3f502b5bbb8d9d0006c1
userdata.img -> 0a3dc9f623c1206749ad1093bfa44081
vbmeta.img -> 5003b40cb64cfcd77b9f85fc2cc8f478
vbmeta_system.img -> f67c111ba47702b2e81cd366fa169bec
vbmeta_vendor.img -> 69e70abba51250749258e53e3f6d681d
vendor.img -> 39af156489f31da6b1d2243e5daa6973
Please can someone help me because I flashed this eng rom on my bootloader unlocked redmi Merlin with IMEI null issue, after flashing the phone stays in miui logo for ever. I have tried the versions of engineering rom available both here and halabtech site. The version of the current stock firmware on my device was V12.5.4. Please any help as to get the IMEI number of the phone back.
What is the difference between v1, v2 and v3?
Is there anything that specific one should be used?

Categories

Resources