Stuck on Beelink Logo... GS1 2GB 16GB - Android Stick & Console AllWinner based Computers
Stuck on Beelink initial boot logo. Just bought it... damn thing.
Went to Beelink forums, downloaded the firmware for it, and used Pheonix USBPRO to flash it (did what instructions said.
Everything seemed to flash fine... but hot damn, same problem! Stuck on Beelink logo.
I tried holding power button to get into Recovery, but it wont go there. I don't think it has a bootloader to be honest... but I can't get into fastboot so I'm just stuck
Here is the log file when I flashed... anyone have any ideas?
00000001 10:40:41 PM [1252] Img_OpenItem now!
00000002 10:40:41 PM [1252] Img_OpenItem[PXTOOLSB][xxxxxxxxxxxxxxxx]
00000003 10:40:41 PM [1252] Closing image now!
00000004 10:40:41 PM [1252] CloseImage OK
00000005 10:40:41 PM [1252] **************************************
00000006 10:40:41 PM [1252] *********global_info_entry***********
00000007 10:40:41 PM [1252] **************************************
00000008 10:40:41 PM [1252] Load "privatedata.ini" Failed: .\ProProcMan.cpp @ 2107
00000009 10:40:57 PM [1252] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000010 10:40:57 PM [1252] DevicePlugOut: \\?\USB#VID_1F3A&PID_EFE8#5&17bd6111&0&1#{0e57c50f-0ccc-4ad2-a895-93c5ed119860}
00000011 10:40:57 PM [1252] Find USB Index:-1----------
00000012 10:41:11 PM [1252] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000013 10:41:11 PM [1252] DevicePlugIn: \\?\USB#VID_1F3A&PID_EFE8#5&17bd6111&0&1#{0e57c50f-0ccc-4ad2-a895-93c5ed119860},BOOL to AWUSB:1
00000014 10:41:11 PM [1252] ***************************************
00000015 10:41:11 PM [1252] ********ToolEntry_fel************
00000016 10:41:11 PM [1252] ***************************************
00000017 10:41:11 PM [1252] PANIC :do not enter fel choose mode
00000018 10:41:11 PM [1252] Img_OpenItem now!
00000019 10:41:11 PM [1252] Img_OpenItem[FES ][FES_1-0000000000]
00000020 10:41:11 PM [1252] down file length = 4340.
00000021 10:41:11 PM [1252] magic eGON.BT059’^@C, it is fes1
00000022 10:41:11 PM [1252] down and run fes1 at addr 0x28000
00000023 10:41:11 PM [1252] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000024 10:41:11 PM [1252] Clear dram log OK.
00000025 10:41:11 PM [1252] DOWN FES1_dram OK
00000026 10:41:12 PM [1252] dram paras[0]: 0x2e8
00000027 10:41:12 PM [1252] dram paras[1]: 0x7
00000028 10:41:12 PM [1252] dram paras[2]: 0x3b3bfb
00000029 10:41:12 PM [1252] dram paras[3]: 0x31
00000030 10:41:12 PM [1252] dram paras[4]: 0x30fa
00000031 10:41:12 PM [1252] dram paras[5]: 0x8001000
00000032 10:41:12 PM [1252] dram paras[6]: 0x0
00000033 10:41:12 PM [1252] dram paras[7]: 0x43
00000034 10:41:12 PM [1252] dram paras[8]: 0x1a
00000035 10:41:12 PM [1252] dram paras[9]: 0x1
00000036 10:41:12 PM [1252] dram paras[10]: 0x0
00000037 10:41:12 PM [1252] dram paras[11]: 0x400
00000038 10:41:12 PM [1252] dram paras[12]: 0x848
00000039 10:41:12 PM [1252] dram paras[13]: 0x1249a25b
00000040 10:41:12 PM [1252] dram paras[14]: 0x11b1b1d0
00000041 10:41:12 PM [1252] dram paras[15]: 0x84f02d
00000042 10:41:12 PM [1252] dram paras[16]: 0x78787896
00000043 10:41:12 PM [1252] dram paras[17]: 0x0
00000044 10:41:12 PM [1252] dram paras[18]: 0x0
00000045 10:41:12 PM [1252] dram paras[19]: 0x9090900
00000046 10:41:12 PM [1252] dram paras[20]: 0x4d462a3e
00000047 10:41:12 PM [1252] dram paras[21]: 0x0
00000048 10:41:12 PM [1252] dram paras[22]: 0x0
00000049 10:41:12 PM [1252] dram paras[23]: 0xa0
00000050 10:41:12 PM [1252] dram paras[24]: 0x200000
00000051 10:41:12 PM [1252] dram paras[25]: 0x2222
00000052 10:41:12 PM [1252] dram paras[26]: 0x6003
00000053 10:41:12 PM [1252] dram paras[27]: 0x0
00000054 10:41:12 PM [1252] dram paras[28]: 0x0
00000055 10:41:12 PM [1252] dram paras[29]: 0x0
00000056 10:41:12 PM [1252] dram paras[30]: 0x0
00000057 10:41:12 PM [1252] dram paras[31]: 0x0
00000058 10:41:12 PM [1252] RUN fes1 OK.
00000059 10:41:12 PM [1252] INFO: try to down and run fes2
00000060 10:41:12 PM [1252] Img_OpenItem now!
00000061 10:41:12 PM [1252] Img_OpenItem[12345678][UBOOT_0000000000]
00000062 10:41:12 PM [1252] fes2 size 0x138000
00000063 10:41:12 PM [1252] uboot down and run addr 0x4a000000
00000064 10:41:12 PM [1252] dtb_syscfg_base 0x4a200000
00000065 10:41:16 PM [1252] INFO: try to down dtb at 0x4a200000
00000066 10:41:16 PM [1252] Img_OpenItem now!
00000067 10:41:16 PM [1252] Img_OpenItem[COMMON ][DTB_CONFIG000000]
00000068 10:41:16 PM [1252] down_dtb_syscfg size 0x18c00
00000069 10:41:16 PM [1252] INFO: try to down soc cfg at 0x4a300000
00000070 10:41:16 PM [1252] Img_OpenItem now!
00000071 10:41:16 PM [1252] Img_OpenItem[COMMON ][SYS_CONFIG_BIN00]
00000072 10:41:16 PM [1252] down_dtb_syscfg size 0xd000
00000073 10:41:17 PM [1252] INFO: try to down board cfg at 0x4a380000
00000074 10:41:17 PM [1252] Img_OpenItem now!
00000075 10:41:17 PM [1252] Img_OpenItem[COMMON ][BOARD_CONFIG_BIN]
00000076 10:41:17 PM [1252] down_dtb_syscfg size 0x400
00000077 10:41:17 PM [1252] INFO: down dtb syscfg OK
00000078 10:41:17 PM [1252] INFO: down fes2 ok
00000079 10:41:17 PM [1252] INFO: run fes2 ok
00000080 10:41:17 PM [1252] Closing image now!
00000081 10:41:17 PM [1252] CloseImage OK
00000082 10:41:31 PM [1252] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000083 10:41:31 PM [1252] DevicePlugOut: \\?\USB#VID_1F3A&PID_EFE8#5&17bd6111&0&1#{0e57c50f-0ccc-4ad2-a895-93c5ed119860}
00000084 10:41:31 PM [1252] Find USB Index:-1----------
00000085 10:41:34 PM [1252] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000086 10:41:34 PM [1252] DevicePlugIn: \\?\USB#VID_1F3A&PID_EFE8#5&1aa2fb8f&0&3#{0e57c50f-0ccc-4ad2-a895-93c5ed119860},BOOL to AWUSB:1
00000087 10:41:34 PM [1252] Find USB Index:0----------
00000088 10:41:34 PM [1252] find,USB Record Size=1, this usb.num=1
00000089 10:41:34 PM [1252] SetFesPrivateData 1510
00000090 10:41:34 PM [1252] ################### OnFesIn
00000091 10:41:34 PM [1252] priv_info = 0x28b2ba8
00000092 10:41:34 PM [1252] Tools get size of image C:\Users\Win7Service\Downloads\update_gs1_rv106N0.img
00000093 10:41:34 PM [1252] ^^Locale string of English_United States.437 is supported.
00000094 10:41:34 PM [1252] File Size High is 0X0Bytes, Low is 0X31859000Bytes.
00000095 10:41:34 PM [1252] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000096 10:41:34 PM [1252] ID=1, fes_thread() : get download map
00000097 10:41:34 PM [1252] fes_thread, get download map
00000098 10:41:34 PM [1252] Img_OpenItem now!
00000099 10:41:34 PM [1252] Img_OpenItem[12345678][1234567890DLINFO]
00000100 10:41:34 PM [1252] *************DOWNLOAD MAP DUMP************
00000101 10:41:34 PM [1252] total download part 7
00000102 10:41:34 PM [1252]
00000103 10:41:34 PM [1252] download part[0] name :bootloader
00000104 10:41:34 PM [1252] download part[0] download file:BOOTLOADER_FEX00
00000105 10:41:34 PM [1252] download part[0] verify file :VBOOTLOADER_FEX0
00000106 10:41:34 PM [1252] download part[0] lenlo :0x8000
00000107 10:41:34 PM [1252] download part[0] addrlo :0x8000
00000108 10:41:34 PM [1252] download part[0] encrypt :0
00000109 10:41:34 PM [1252] download part[0] verify :1
00000110 10:41:34 PM [1252]
00000111 10:41:34 PM [1252] download part[1] name :env
00000112 10:41:34 PM [1252] download part[1] download file:ENV_FEX000000000
00000113 10:41:34 PM [1252] download part[1] verify file :VENV_FEX00000000
00000114 10:41:34 PM [1252] download part[1] lenlo :0x8000
00000115 10:41:34 PM [1252] download part[1] addrlo :0x10000
00000116 10:41:34 PM [1252] download part[1] encrypt :0
00000117 10:41:34 PM [1252] download part[1] verify :1
00000118 10:41:34 PM [1252]
00000119 10:41:34 PM [1252] download part[2] name :boot
00000120 10:41:34 PM [1252] download part[2] download file:BOOT_FEX00000000
00000121 10:41:34 PM [1252] download part[2] verify file :VBOOT_FEX0000000
00000122 10:41:34 PM [1252] download part[2] lenlo :0x10000
00000123 10:41:34 PM [1252] download part[2] addrlo :0x18000
00000124 10:41:34 PM [1252] download part[2] encrypt :0
00000125 10:41:34 PM [1252] download part[2] verify :1
00000126 10:41:34 PM [1252]
00000127 10:41:34 PM [1252] download part[3] name :system
00000128 10:41:34 PM [1252] download part[3] download file:SYSTEM_FEX000000
00000129 10:41:34 PM [1252] download part[3] verify file :VSYSTEM_FEX00000
00000130 10:41:34 PM [1252] download part[3] lenlo :0x300000
00000131 10:41:34 PM [1252] download part[3] addrlo :0x28000
00000132 10:41:34 PM [1252] download part[3] encrypt :0
00000133 10:41:34 PM [1252] download part[3] verify :1
00000134 10:41:34 PM [1252]
00000135 10:41:34 PM [1252] download part[4] name :verity_block
00000136 10:41:34 PM [1252] download part[4] download file:VERITY_BLOCK_FEX
00000137 10:41:34 PM [1252] download part[4] verify file :VVERITY_BLOCK_FE
00000138 10:41:34 PM [1252] download part[4] lenlo :0x8000
00000139 10:41:34 PM [1252] download part[4] addrlo :0x328000
00000140 10:41:34 PM [1252] download part[4] encrypt :0
00000141 10:41:34 PM [1252] download part[4] verify :1
00000142 10:41:34 PM [1252]
00000143 10:41:34 PM [1252] download part[5] name :recovery
00000144 10:41:34 PM [1252] download part[5] download file:RECOVERY_FEX0000
00000145 10:41:34 PM [1252] download part[5] verify file :VRECOVERY_FEX000
00000146 10:41:34 PM [1252] download part[5] lenlo :0x10000
00000147 10:41:34 PM [1252] download part[5] addrlo :0x338000
00000148 10:41:34 PM [1252] download part[5] encrypt :0
00000149 10:41:34 PM [1252] download part[5] verify :1
00000150 10:41:34 PM [1252]
00000151 10:41:34 PM [1252] download part[6] name :UDISK
00000152 10:41:34 PM [1252] download part[6] download fileISKFS_FEX000000
00000153 10:41:34 PM [1252] download part[6] verify file :
00000154 10:41:34 PM [1252] download part[6] lenlo :0x0
00000155 10:41:34 PM [1252] download part[6] addrlo :0x510000
00000156 10:41:34 PM [1252] download part[6] encrypt :0
00000157 10:41:34 PM [1252] download part[6] verify :0
00000158 10:41:34 PM [1252]
00000159 10:41:34 PM [1252] ID=1, fes_thread() : --167--
00000160 10:41:34 PM [1252] Img_OpenItem now!
00000161 10:41:34 PM [1252] Img_OpenItem[12345678][1234567890___MBR]
00000162 10:41:34 PM [1252] *************MBR DUMP***************
00000163 10:41:34 PM [1252] total mbr part 14
00000164 10:41:34 PM [1252]
00000165 10:41:34 PM [1252] part[0] name :bootloader
00000166 10:41:34 PM [1252] part[0] classname ISK
00000167 10:41:34 PM [1252] part[0] addrlo :0x8000
00000168 10:41:34 PM [1252] part[0] lenlo :0x8000
00000169 10:41:34 PM [1252] part[0] user_type :32768
00000170 10:41:34 PM [1252] part[0] keydata :0
00000171 10:41:34 PM [1252] part[0] ro :0
00000172 10:41:34 PM [1252]
00000173 10:41:34 PM [1252] part[1] name :env
00000174 10:41:34 PM [1252] part[1] classname ISK
00000175 10:41:34 PM [1252] part[1] addrlo :0x10000
00000176 10:41:34 PM [1252] part[1] lenlo :0x8000
00000177 10:41:34 PM [1252] part[1] user_type :32768
00000178 10:41:34 PM [1252] part[1] keydata :0
00000179 10:41:34 PM [1252] part[1] ro :0
00000180 10:41:34 PM [1252]
00000181 10:41:34 PM [1252] part[2] name :boot
00000182 10:41:34 PM [1252] part[2] classname ISK
00000183 10:41:34 PM [1252] part[2] addrlo :0x18000
00000184 10:41:34 PM [1252] part[2] lenlo :0x10000
00000185 10:41:34 PM [1252] part[2] user_type :32768
00000186 10:41:34 PM [1252] part[2] keydata :0
00000187 10:41:34 PM [1252] part[2] ro :0
00000188 10:41:34 PM [1252]
00000189 10:41:34 PM [1252] part[3] name :system
00000190 10:41:34 PM [1252] part[3] classname ISK
00000191 10:41:34 PM [1252] part[3] addrlo :0x28000
00000192 10:41:34 PM [1252] part[3] lenlo :0x300000
00000193 10:41:34 PM [1252] part[3] user_type :32768
00000194 10:41:34 PM [1252] part[3] keydata :0
00000195 10:41:34 PM [1252] part[3] ro :0
00000196 10:41:34 PM [1252]
00000197 10:41:34 PM [1252] part[4] name :verity_block
00000198 10:41:34 PM [1252] part[4] classname ISK
00000199 10:41:34 PM [1252] part[4] addrlo :0x328000
00000200 10:41:34 PM [1252] part[4] lenlo :0x8000
00000201 10:41:34 PM [1252] part[4] user_type :32768
00000202 10:41:34 PM [1252] part[4] keydata :0
00000203 10:41:34 PM [1252] part[4] ro :0
00000204 10:41:34 PM [1252]
00000205 10:41:34 PM [1252] part[5] name :misc
00000206 10:41:34 PM [1252] part[5] classname ISK
00000207 10:41:34 PM [1252] part[5] addrlo :0x330000
00000208 10:41:34 PM [1252] part[5] lenlo :0x8000
00000209 10:41:34 PM [1252] part[5] user_type :32768
00000210 10:41:34 PM [1252] part[5] keydata :0
00000211 10:41:34 PM [1252] part[5] ro :0
00000212 10:41:34 PM [1252]
00000213 10:41:34 PM [1252] part[6] name :recovery
00000214 10:41:34 PM [1252] part[6] classname ISK
00000215 10:41:34 PM [1252] part[6] addrlo :0x338000
00000216 10:41:34 PM [1252] part[6] lenlo :0x10000
00000217 10:41:34 PM [1252] part[6] user_type :32768
00000218 10:41:34 PM [1252] part[6] keydata :0
00000219 10:41:34 PM [1252] part[6] ro :0
00000220 10:41:34 PM [1252]
00000221 10:41:34 PM [1252] part[7] name rivate
00000222 10:41:34 PM [1252] part[7] classname ISK
00000223 10:41:34 PM [1252] part[7] addrlo :0x348000
00000224 10:41:34 PM [1252] part[7] lenlo :0x8000
00000225 10:41:34 PM [1252] part[7] user_type :32768
00000226 10:41:34 PM [1252] part[7] keydata :32768
00000227 10:41:34 PM [1252] part[7] ro :0
00000228 10:41:34 PM [1252]
00000229 10:41:34 PM [1252] part[8] name :alog
00000230 10:41:34 PM [1252] part[8] classname ISK
00000231 10:41:34 PM [1252] part[8] addrlo :0x350000
00000232 10:41:34 PM [1252] part[8] lenlo :0x20000
00000233 10:41:34 PM [1252] part[8] user_type :32768
00000234 10:41:34 PM [1252] part[8] keydata :0
00000235 10:41:34 PM [1252] part[8] ro :0
00000236 10:41:34 PM [1252]
00000237 10:41:34 PM [1252] part[9] name :Reserve0
00000238 10:41:34 PM [1252] part[9] classname ISK
00000239 10:41:34 PM [1252] part[9] addrlo :0x370000
00000240 10:41:34 PM [1252] part[9] lenlo :0x8000
00000241 10:41:34 PM [1252] part[9] user_type :32768
00000242 10:41:34 PM [1252] part[9] keydata :0
00000243 10:41:34 PM [1252] part[9] ro :0
00000244 10:41:34 PM [1252]
00000245 10:41:34 PM [1252] part[10] name :Reserve1
00000246 10:41:34 PM [1252] part[10] classname ISK
00000247 10:41:34 PM [1252] part[10] addrlo :0x378000
00000248 10:41:34 PM [1252] part[10] lenlo :0x10000
00000249 10:41:34 PM [1252] part[10] user_type :49408
00000250 10:41:34 PM [1252] part[10] keydata :0
00000251 10:41:34 PM [1252] part[10] ro :0
00000252 10:41:34 PM [1252]
00000253 10:41:34 PM [1252] part[11] name :Reserve2
00000254 10:41:34 PM [1252] part[11] classname ISK
00000255 10:41:34 PM [1252] part[11] addrlo :0x388000
00000256 10:41:34 PM [1252] part[11] lenlo :0x8000
00000257 10:41:34 PM [1252] part[11] user_type :49408
00000258 10:41:34 PM [1252] part[11] keydata :0
00000259 10:41:34 PM [1252] part[11] ro :0
00000260 10:41:34 PM [1252]
00000261 10:41:34 PM [1252] part[12] name :cache
00000262 10:41:34 PM [1252] part[12] classname ISK
00000263 10:41:34 PM [1252] part[12] addrlo :0x390000
00000264 10:41:34 PM [1252] part[12] lenlo :0x180000
00000265 10:41:34 PM [1252] part[12] user_type :49408
00000266 10:41:34 PM [1252] part[12] keydata :0
00000267 10:41:34 PM [1252] part[12] ro :0
00000268 10:41:34 PM [1252]
00000269 10:41:34 PM [1252] part[13] name :UDISK
00000270 10:41:34 PM [1252] part[13] classname ISK
00000271 10:41:34 PM [1252] part[13] addrlo :0x510000
00000272 10:41:34 PM [1252] part[13] lenlo :0x0
00000273 10:41:34 PM [1252] part[13] user_type :49664
00000274 10:41:34 PM [1252] part[13] keydata :0
00000275 10:41:34 PM [1252] part[13] ro :0
00000276 10:41:34 PM [1252]
00000277 10:41:37 PM [1252] fes_check_crc.media_crc=0
00000278 10:41:37 PM [1252] ID=1, fes_thread() : --163--
00000279 10:41:37 PM [1252] download image
00000280 10:41:37 PM [1252] Img_OpenItem now!
00000281 10:41:37 PM [1252] Img_OpenItem[RFSFAT16][BOOTLOADER_FEX00VBOOTLOADER_FEX0]
00000282 10:41:37 PM [1252] id[1]art_name = bootloader, packet_len_high = 0x0, packet_len_low = 0x74A400, pkt_name = BOOTLOADER_FEX00VBOOTLOADER_FEX0, verify_file = VBOOTLOADER_FEX0, encrypt = 1
00000283 10:41:37 PM [1252] sparse: bad magic, it is NOT a sparse format part
00000284 10:41:37 PM [1252] part bootloader need verify
00000285 10:41:37 PM [1252] Img_OpenItem now!
00000286 10:41:37 PM [1252] Img_OpenItem[RFSFAT16][VBOOTLOADER_FEX0]
00000287 10:41:37 PM [1252] the verify value of part bootloader is 0x4663288
00000288 10:41:37 PM [1252] id[1]: down pkt_name(BOOTLOADER_FEX00VBOOTLOADER_FEX0) to part(bootloader) successful
00000289 10:41:37 PM [1252] +++++++++++ down part: BOOTLOADER_FEX00VBOOTLOADER_FEX0 bootloader,used time 0s
00000290 10:41:37 PM [1252] download_firmware: bootloader 21
00000291 10:41:37 PM [1252]
00000292 10:41:37 PM [1252] Img_OpenItem now!
00000293 10:41:37 PM [1252] Img_OpenItem[RFSFAT16][ENV_FEX000000000VENV_FEX00000000]
00000294 10:41:37 PM [1252] id[1]art_name = env, packet_len_high = 0x0, packet_len_low = 0x20000, pkt_name = ENV_FEX000000000VENV_FEX00000000, verify_file = VENV_FEX00000000, encrypt = 1
00000295 10:41:37 PM [1252] sparse: bad magic, it is NOT a sparse format part
00000296 10:41:37 PM [1252] part env need verify
00000297 10:41:37 PM [1252] Img_OpenItem now!
00000298 10:41:37 PM [1252] Img_OpenItem[RFSFAT16][VENV_FEX00000000]
00000299 10:41:37 PM [1252] the verify value of part env is 0xe0ebb087
00000300 10:41:37 PM [1252] id[1]: down pkt_name(ENV_FEX000000000VENV_FEX00000000) to part(env) successful
00000301 10:41:37 PM [1252] +++++++++++ down part: ENV_FEX000000000VENV_FEX00000000 env,used time 0s
00000302 10:41:37 PM [1252] download_firmware: env 32
00000303 10:41:37 PM [1252]
00000304 10:41:37 PM [1252] Img_OpenItem now!
00000305 10:41:37 PM [1252] Img_OpenItem[RFSFAT16][BOOT_FEX00000000VBOOT_FEX0000000]
00000306 10:41:37 PM [1252] id[1]art_name = boot, packet_len_high = 0x0, packet_len_low = 0x10AB800, pkt_name = BOOT_FEX00000000VBOOT_FEX0000000, verify_file = VBOOT_FEX0000000, encrypt = 1
00000307 10:41:38 PM [1252] sparse: bad magic, it is NOT a sparse format part
00000308 10:41:39 PM [1252] part boot need verify
00000309 10:41:39 PM [1252] Img_OpenItem now!
00000310 10:41:39 PM [1252] Img_OpenItem[RFSFAT16][VBOOT_FEX0000000]
00000311 10:41:39 PM [1252] the verify value of part boot is 0x596291ce
00000312 10:41:39 PM [1252] id[1]: down pkt_name(BOOT_FEX00000000VBOOT_FEX0000000) to part(boot) successful
00000313 10:41:39 PM [1252] +++++++++++ down part: BOOT_FEX00000000VBOOT_FEX0000000 boot,used time 1s
00000314 10:41:39 PM [1252] download_firmware: boot 43
00000315 10:41:39 PM [1252]
00000316 10:41:39 PM [1252] Img_OpenItem now!
00000317 10:41:39 PM [1252] Img_OpenItem[RFSFAT16][SYSTEM_FEX000000VSYSTEM_FEX00000]
00000318 10:41:39 PM [1252] id[1]art_name = system, packet_len_high = 0x0, packet_len_low = 0x2E854194, pkt_name = SYSTEM_FEX000000VSYSTEM_FEX00000, verify_file = VSYSTEM_FEX00000, encrypt = 1
00000319 10:41:39 PM [1252] this IS a sparse format part
00000320 10:42:30 PM [1252] id[1]: down pkt_name(SYSTEM_FEX000000VSYSTEM_FEX00000) to part(system) successful
00000321 10:42:30 PM [1252] +++++++++++ down part: SYSTEM_FEX000000VSYSTEM_FEX00000 system,used time 50s
00000322 10:42:30 PM [1252] download_firmware: system 54
00000323 10:42:30 PM [1252]
00000324 10:42:30 PM [1252] Img_OpenItem now!
00000325 10:42:30 PM [1252] Img_OpenItem[RFSFAT16][VERITY_BLOCK_FEXVVERITY_BLOCK_FE]
00000326 10:42:30 PM [1252] id[1]art_name = verity_block, packet_len_high = 0x0, packet_len_low = 0x10C654, pkt_name = VERITY_BLOCK_FEXVVERITY_BLOCK_FE, verify_file = VVERITY_BLOCK_FE, encrypt = 1
00000327 10:42:30 PM [1252] sparse: bad magic, it is NOT a sparse format part
00000328 10:42:30 PM [1252] part verity_block need verify
00000329 10:42:30 PM [1252] Img_OpenItem now!
00000330 10:42:30 PM [1252] Img_OpenItem[RFSFAT16][VVERITY_BLOCK_FE]
00000331 10:42:30 PM [1252] the verify value of part verity_block is 0x2ba04f3b
00000332 10:42:30 PM [1252] id[1]: down pkt_name(VERITY_BLOCK_FEXVVERITY_BLOCK_FE) to part(verity_block) successful
00000333 10:42:30 PM [1252] +++++++++++ down part: VERITY_BLOCK_FEXVVERITY_BLOCK_FE verity_block,used time 0s
00000334 10:42:30 PM [1252] download_firmware: verity_block 65
00000335 10:42:30 PM [1252]
00000336 10:42:30 PM [1252] Img_OpenItem now!
00000337 10:42:30 PM [1252] Img_OpenItem[RFSFAT16][RECOVERY_FEX0000VRECOVERY_FEX000]
00000338 10:42:30 PM [1252] id[1]art_name = recovery, packet_len_high = 0x0, packet_len_low = 0x130B800, pkt_name = RECOVERY_FEX0000VRECOVERY_FEX000, verify_file = VRECOVERY_FEX000, encrypt = 1
00000339 10:42:30 PM [1252] sparse: bad magic, it is NOT a sparse format part
00000340 10:42:31 PM [1252] part recovery need verify
00000341 10:42:31 PM [1252] Img_OpenItem now!
00000342 10:42:31 PM [1252] Img_OpenItem[RFSFAT16][VRECOVERY_FEX000]
00000343 10:42:31 PM [1252] the verify value of part recovery is 0x6a0608de
00000344 10:42:31 PM [1252] id[1]: down pkt_name(RECOVERY_FEX0000VRECOVERY_FEX000) to part(recovery) successful
00000345 10:42:31 PM [1252] +++++++++++ down part: RECOVERY_FEX0000VRECOVERY_FEX000 recovery,used time 1s
00000346 10:42:31 PM [1252] download_firmware: recovery 76
00000347 10:42:31 PM [1252]
00000348 10:42:31 PM [1252] Img_OpenItem now!
00000349 10:42:31 PM [1252] Img_OpenItem[RFSFAT16][DISKFS_FEX000000]
00000350 10:42:31 PM [1252] the data length of udisk is too small, ignore it
00000351 10:42:31 PM [1252] do NOT need download_udisk
00000352 10:42:31 PM [1252] download_firmware: UDISK 87
00000353 10:42:31 PM [1252]
00000354 10:42:31 PM [1252] ID=1, fes_thread() : --161--
00000355 10:42:31 PM [1252] secure_type=4
00000356 10:42:31 PM [1252] Img_OpenItem now!
00000357 10:42:31 PM [1252] Img_OpenItem[12345678][BOOTPKG-00000000]
00000358 10:42:31 PM [1252] fes_check_crc.media_crc=0
00000359 10:42:31 PM [1252] ID=1, fes_thread() : --160--
00000360 10:42:31 PM [1252] secure_type=4
00000361 10:42:31 PM [1252] Img_OpenItem now!
00000362 10:42:31 PM [1252] Img_OpenItem[12345678][1234567890BOOT_0]
00000363 10:42:31 PM [1252] fes_check_crc.media_crc=0
00000364 10:42:31 PM [1252] trans tool type
00000365 10:42:31 PM [1252] set next work 0x4
00000366 10:42:31 PM [1252] Closing image now!
00000367 10:42:31 PM [1252] CloseImage OK
00000368 10:42:31 PM [1252]
00000369 10:42:31 PM [1252] INFO: ID=1, update successful
00000370 10:42:31 PM [1252]
00000371 10:42:31 PM [1252] GetDevTimeStamp(1) nCnt = 1
00000372 10:42:31 PM [1252] MSG Callback Code: 0x40
00000373 10:42:31 PM [1252] free param...
00000374 10:48:33 PM [1252] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000375 10:48:33 PM [1252] DevicePlugOut: \\?\USB#VID_1F3A&PID_EFE8#5&1aa2fb8f&0&3#{0e57c50f-0ccc-4ad2-a895-93c5ed119860}
00000376 10:48:33 PM [1252] Find USB Index:0----------
Related
Error in android porting(booting) to NAND for allwinner A13
Hi, I have allwinner A13 board. I am trying to boot that with NAND using PhonixUSBPro v4.0 from allwinner but after 26% it gives errors like: 00000319 11:17:06 AM [4840] ID=1, fes_thread() : --163-- 00000320 11:17:06 AM [4840] Img_OpenItem now! 00000321 11:17:06 AM [4840] Img_OpenItem[RFSFAT16][BOOTLOADER_00000] 00000322 11:17:06 AM [4840] id[1]art_name = bootloader, packet_len_high = 0x0, packet_len_low = 0x529400, pkt_name = BOOTLOADER_00000, verify_file = VBOOTLOADER_0000, encrypt = 0 00000323 11:17:06 AM [4840] Img_OpenItem now! 00000324 11:17:06 AM [4840] Img_OpenItem[FET ][MAGIC_CRC_START_] 00000325 11:17:06 AM [4840] [fes]: id =1, download_packet ooc Open 00000326 11:17:09 AM [4840] [fes]: id = 1, download_packet ooc close 00000327 11:17:09 AM [4840] Img_OpenItem now! 00000328 11:17:09 AM [4840] Img_OpenItem[FET ][MAGIC_CRC_EN_000] 00000329 11:17:09 AM [4840] Img_OpenItem now! 00000330 11:17:09 AM [4840] Img_OpenItem[RFSFAT16][VBOOTLOADER_0000] 00000331 11:17:10 AM [4840] INFO: ID = 1, pc_crc = 0xbc1881b0, fex_crc = 0x0, nand_crc = 0xbc1881b8 00000332 11:17:10 AM [4840] ERR : check_crc32_form_efex, pc_crc != nand_crc 00000333 11:17:10 AM [4840] err: download_packet, check_crc32_form_efex failed 00000334 11:17:10 AM [4840] ERR: step_download_firmware, download_packet failed 00000335 11:17:10 AM [4840] ERR : ID=1, fes_thread() : step 163 ,fail 00000336 11:17:10 AM [4840] 00000337 11:17:10 AM [4840] INFO: ID=1, update failed 00000338 11:17:10 AM [4840] 00000339 11:17:10 AM [4840] Closing image now! 00000340 11:17:10 AM [4840] CloseImage OK 00000341 11:17:10 AM [4840] MSG Callback Code: 0x20 00000342 11:17:10 AM [4840] free param... Can anyone tell reasons of these errors and how to resolve that. Full booting debug view: 00000001 11:16:44 AM [4840] Img_OpenItem now! 00000002 11:16:44 AM [4840] Img_OpenItem[PXTOOLS ][xxxxxxxxxxxxxxxx] 00000003 11:16:44 AM [4840] Closing image now! 00000004 11:16:44 AM [4840] CloseImage OK 00000005 11:16:44 AM [4840] Img_OpenItem now! 00000006 11:16:44 AM [4840] Img_OpenItem[COMMON ][SYS_CONFIG000000] 00000007 11:16:44 AM [4840] Img_OpenItem now! 00000008 11:16:44 AM [4840] Img_OpenItem[COMMON ][SYS_CONFIG100000] 00000009 11:16:44 AM [4840] =============sys_config===<2012-2-23 19:07:43>======= 00000010 11:16:44 AM [4840] dram->reallen = 0x0 00000011 11:16:44 AM [4840] -------sys_config------ 00000012 11:16:44 AM [4840] sys_config_t_size = 0x1598 00000013 11:16:44 AM [4840] version = 0x100 00000014 11:16:44 AM [4840] magic = 20090319 00000015 11:16:44 AM [4840] 00000016 11:16:44 AM [4840] magic = SYS_PARA 00000017 11:16:44 AM [4840] ver = 256 00000018 11:16:44 AM [4840] enable_erase_nand = 0 00000019 11:16:44 AM [4840] enable_jtag = 1 00000020 11:16:44 AM [4840] ----------------epos_para------------- 00000021 11:16:44 AM [4840] chip =33554432 00000022 11:16:44 AM [4840] pid =33554432 00000023 11:16:44 AM [4840] sid =33554688 00000024 11:16:44 AM [4840] bid =128 00000025 11:16:44 AM [4840] target.debugenable =0 00000026 11:16:44 AM [4840] target.burnClk =720 00000027 11:16:44 AM [4840] 00000028 11:16:44 AM [4840] ---------dram_para----------- 00000029 11:16:44 AM [4840] dram_baseaddr = 0x40000000 00000030 11:16:44 AM [4840] dram_clk = 384 00000031 11:16:44 AM [4840] dram_type = 3 00000032 11:16:44 AM [4840] dram_rank_num = 1 00000033 11:16:44 AM [4840] dram_chip_density = 2048 00000034 11:16:44 AM [4840] dram_io_width = 8 00000035 11:16:44 AM [4840] dram_bus_width = 16 00000036 11:16:44 AM [4840] dram_cas = 9 00000037 11:16:44 AM [4840] dram_zq = 0x7b 00000038 11:16:44 AM [4840] dram_odt_en = 0 00000039 11:16:44 AM [4840] dram_size = 512 00000040 11:16:44 AM [4840] dram_tpr0 = 0x42d899b7 00000041 11:16:44 AM [4840] dram_tpr1 = 0xa090 00000042 11:16:44 AM [4840] dram_tpr2 = 0x22a00 00000043 11:16:44 AM [4840] dram_tpr3 = 0x0 00000044 11:16:44 AM [4840] dram_tpr4 = 0x0 00000045 11:16:44 AM [4840] dram_tpr5 = 0x0 00000046 11:16:44 AM [4840] dram_emr1 = 0x0 00000047 11:16:44 AM [4840] dram_emr2 = 0x10 00000048 11:16:44 AM [4840] dram_emr3 = 0x0 00000049 11:16:44 AM [4840] 00000050 11:16:44 AM [4840] p1_para->Battery_cap = 0 00000051 11:16:44 AM [4840] p1_para->Discharge_current_rate = 0 00000052 11:16:44 AM [4840] 00000053 11:16:44 AM [4840] 00000054 11:16:44 AM [4840] ---------------boot_extend------------------ 00000055 11:16:44 AM [4840] sys_config_para->vol_threshold = 0 00000056 11:16:44 AM [4840] 00000057 11:16:44 AM [4840] 00000058 11:16:44 AM [4840] ----------product_para--------- 00000059 11:16:44 AM [4840] magic = (null) 00000060 11:16:44 AM [4840] ver = 0 00000061 11:16:44 AM [4840] size = 0 00000062 11:16:44 AM [4840] magic = 00000063 11:16:44 AM [4840] magic = 00000064 11:16:44 AM [4840] 00000065 11:16:44 AM [4840] ----------part_para--------- 00000066 11:16:44 AM [4840] ///////////max part number is 14. , configured part is 8. 00000067 11:16:44 AM [4840] mbr_size = 1024 00000068 11:16:44 AM [4840] part_num = 8 00000069 11:16:44 AM [4840] 00000070 11:16:44 AM [4840] [part0] 00000071 11:16:44 AM [4840] lenhi = 0 00000072 11:16:44 AM [4840] lenlo = 16384 00000073 11:16:44 AM [4840] classname = DISK 00000074 11:16:44 AM [4840] name = bootloader 00000075 11:16:44 AM [4840] user_type = 0 00000076 11:16:44 AM [4840] ro = 0 00000077 11:16:44 AM [4840] 00000078 11:16:44 AM [4840] [part1] 00000079 11:16:44 AM [4840] lenhi = 0 00000080 11:16:44 AM [4840] lenlo = 2048 00000081 11:16:44 AM [4840] classname = DISK 00000082 11:16:44 AM [4840] name = env 00000083 11:16:44 AM [4840] user_type = 0 00000084 11:16:44 AM [4840] ro = 0 00000085 11:16:44 AM [4840] 00000086 11:16:44 AM [4840] [part2] 00000087 11:16:44 AM [4840] lenhi = 0 00000088 11:16:44 AM [4840] lenlo = 32768 00000089 11:16:44 AM [4840] classname = DISK 00000090 11:16:44 AM [4840] name = boot 00000091 11:16:44 AM [4840] user_type = 0 00000092 11:16:44 AM [4840] ro = 0 00000093 11:16:44 AM [4840] 00000094 11:16:44 AM [4840] [part3] 00000095 11:16:44 AM [4840] lenhi = 0 00000096 11:16:44 AM [4840] lenlo = 262144 00000097 11:16:44 AM [4840] classname = DISK 00000098 11:16:44 AM [4840] name = system 00000099 11:16:44 AM [4840] user_type = 2 00000100 11:16:44 AM [4840] ro = 0 00000101 11:16:44 AM [4840] 00000102 11:16:44 AM [4840] [part4] 00000103 11:16:44 AM [4840] lenhi = 0 00000104 11:16:44 AM [4840] lenlo = 524288 00000105 11:16:44 AM [4840] classname = DISK 00000106 11:16:44 AM [4840] name = data 00000107 11:16:44 AM [4840] user_type = 2 00000108 11:16:44 AM [4840] ro = 0 00000109 11:16:44 AM [4840] 00000110 11:16:44 AM [4840] [part5] 00000111 11:16:44 AM [4840] lenhi = 0 00000112 11:16:44 AM [4840] lenlo = 1024 00000113 11:16:44 AM [4840] classname = DISK 00000114 11:16:44 AM [4840] name = misc 00000115 11:16:44 AM [4840] user_type = 2 00000116 11:16:44 AM [4840] ro = 0 00000117 11:16:44 AM [4840] 00000118 11:16:44 AM [4840] [part6] 00000119 11:16:44 AM [4840] lenhi = 0 00000120 11:16:44 AM [4840] lenlo = 32768 00000121 11:16:44 AM [4840] classname = DISK 00000122 11:16:44 AM [4840] name = recovery 00000123 11:16:44 AM [4840] user_type = 2 00000124 11:16:44 AM [4840] ro = 0 00000125 11:16:44 AM [4840] 00000126 11:16:44 AM [4840] [part7] 00000127 11:16:44 AM [4840] lenhi = 0 00000128 11:16:44 AM [4840] lenlo = 262144 00000129 11:16:44 AM [4840] classname = DISK 00000130 11:16:44 AM [4840] name = cache 00000131 11:16:44 AM [4840] user_type = 2 00000132 11:16:44 AM [4840] ro = 0 00000133 11:16:44 AM [4840] 00000134 11:16:44 AM [4840] ----------down_para--------- 00000135 11:16:44 AM [4840] /////////max downLoad items is 14. , configured downLoad is 6. 00000136 11:16:44 AM [4840] down_num = 6 00000137 11:16:44 AM [4840] 00000138 11:16:44 AM [4840] [download_para0] 00000139 11:16:44 AM [4840] part_name = bootloader 00000140 11:16:44 AM [4840] pkt_name = BOOTLOADER_00000 00000141 11:16:44 AM [4840] verify_file = VBOOTLOADER_0000 00000142 11:16:44 AM [4840] encrypt = 0 00000143 11:16:44 AM [4840] 00000144 11:16:44 AM [4840] 00000145 11:16:44 AM [4840] [download_para1] 00000146 11:16:44 AM [4840] part_name = env 00000147 11:16:44 AM [4840] pkt_name = ENVIROMENT_00000 00000148 11:16:44 AM [4840] verify_file = VENVIROMENT_0000 00000149 11:16:44 AM [4840] encrypt = 0 00000150 11:16:44 AM [4840] 00000151 11:16:44 AM [4840] 00000152 11:16:44 AM [4840] [download_para2] 00000153 11:16:44 AM [4840] part_name = boot 00000154 11:16:44 AM [4840] pkt_name = BOOT_00000000000 00000155 11:16:44 AM [4840] verify_file = VBOOT_0000000000 00000156 11:16:44 AM [4840] encrypt = 0 00000157 11:16:44 AM [4840] 00000158 11:16:44 AM [4840] 00000159 11:16:44 AM [4840] [download_para3] 00000160 11:16:44 AM [4840] part_name = system 00000161 11:16:44 AM [4840] pkt_name = SYSTEM_000000000 00000162 11:16:44 AM [4840] verify_file = VSYSTEMFS_000000 00000163 11:16:44 AM [4840] encrypt = 0 00000164 11:16:44 AM [4840] 00000165 11:16:44 AM [4840] 00000166 11:16:44 AM [4840] [download_para4] 00000167 11:16:44 AM [4840] part_name = recovery 00000168 11:16:44 AM [4840] pkt_name = RECOVERY_0000000 00000169 11:16:44 AM [4840] verify_file = VRECOVERYFS_0000 00000170 11:16:44 AM [4840] encrypt = 0 00000171 11:16:44 AM [4840] 00000172 11:16:44 AM [4840] 00000173 11:16:44 AM [4840] [download_para5] 00000174 11:16:44 AM [4840] part_name = UDISK 00000175 11:16:44 AM [4840] pkt_name = DISKFS_000000000 00000176 11:16:44 AM [4840] verify_file = 00000177 11:16:44 AM [4840] encrypt = 0 00000178 11:16:44 AM [4840] 00000179 11:16:44 AM [4840] ---uart para--- 00000180 11:16:44 AM [4840] uart_debug_port = 1. 00000181 11:16:44 AM [4840] uart_debug_tx = portG3<4><1><-1><-1>. 00000182 11:16:44 AM [4840] 00000183 11:16:44 AM [4840] ----------fex misc--------- 00000184 11:16:44 AM [4840] restore = 0 00000185 11:16:44 AM [4840] env_pkt = 0 00000186 11:16:44 AM [4840] storage_type = 0. 00000187 11:16:44 AM [4840] 00000188 11:16:44 AM [4840] 00000189 11:16:44 AM [4840] ============================================ 00000190 11:16:44 AM [4840] Closing image now! 00000191 11:16:44 AM [4840] CloseImage OK 00000192 11:16:44 AM [4840] Load "privatedata.ini" Failed: .\ProProcMan.cpp @ 2107 00000193 11:16:52 AM [4840] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0 00000194 11:16:52 AM [4840] DevicePlugIn: \\?\USB#VID_1F3A&PID_EFE8#6&944c330&0&4#{0e57c50f-0ccc-4ad2-a895-93c5ed119860},BOOL to AWUSB:1 00000195 11:16:52 AM [4840] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0 00000196 11:16:52 AM [4840] down and run fes1-1 00000197 11:16:52 AM [4840] Img_OpenItem now! 00000198 11:16:52 AM [4840] Img_OpenItem[FES ][FES_1-1000000000] 00000199 11:16:52 AM [4840] down and run fes1-2 00000200 11:16:52 AM [4840] Clear dram log OK. 00000201 11:16:52 AM [4840] Img_OpenItem now! 00000202 11:16:52 AM [4840] Img_OpenItem[FES ][FES_1-2000000000] 00000203 11:16:52 AM [4840] DOWN FES1_dram OK 00000204 11:16:53 AM [4840] update dram size to 512MB 00000205 11:16:53 AM [4840] RUN fes1-2 OK. 00000206 11:16:53 AM [4840] INFO: Simple Test for Dram is OK. 00000207 11:16:53 AM [4840] 00000208 11:16:53 AM [4840] INFO: dram initialize successful 00000209 11:16:53 AM [4840] 00000210 11:16:53 AM [4840] Img_OpenItem now! 00000211 11:16:53 AM [4840] Img_OpenItem[FES ][FES_000000000000] 00000212 11:16:54 AM [4840] Img_OpenItem now! 00000213 11:16:54 AM [4840] Img_OpenItem[FES ][FES_200000000000] 00000214 11:16:54 AM [4840] INFO: run fes2 00000215 11:16:54 AM [4840] Closing image now! 00000216 11:16:54 AM [4840] CloseImage OK 00000217 11:16:54 AM [4840] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0 00000218 11:16:54 AM [4840] DevicePlugOut: \\?\USB#VID_1F3A&PID_EFE8#6&944c330&0&4#{0e57c50f-0ccc-4ad2-a895-93c5ed119860} 00000219 11:16:54 AM [4840] Find USB Index:0---------- 00000220 11:16:57 AM [4840] DevicePlugIn: \\?\USB#VID_1F3A&PID_EFE8#6&944c330&0&4#{0e57c50f-0ccc-4ad2-a895-93c5ed119860},BOOL to AWUSB:1 00000221 11:16:57 AM [4840] Find USB Index:0---------- 00000222 11:16:57 AM [4840] find,USB Record Size=1, this usb.num=1 00000223 11:16:57 AM [4840] SetFesPrivateData 1510 00000224 11:16:57 AM [4840] ################### OnFesIn 00000225 11:16:57 AM [4840] ^^Locale string of English_United States.437 is supported. 00000226 11:16:57 AM [4840] File Size High is 0X0Bytes, Low is 0XE437800Bytes. 00000227 11:16:57 AM [4840] ID=1, fes_thread() : --162-- 00000228 11:16:57 AM [4840] ****eraseflag = 0****. 00000229 11:16:57 AM [4840] Img_OpenItem now! 00000230 11:16:57 AM [4840] Img_OpenItem[FET ][MAGIC_DE_START_0] 00000231 11:16:57 AM [4840] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0 00000232 11:16:57 AM [4840] Img_OpenItem now! 00000233 11:16:57 AM [4840] Img_OpenItem[FED ][FED_NAND_0000000] 00000234 11:16:57 AM [4840] Img_OpenItem now! 00000235 11:16:57 AM [4840] Img_OpenItem[FET ][MAGIC_DE_END_000] 00000236 11:16:57 AM [4840] Info: _step_6_fed_nand() : To run & reg fed. 00000237 11:17:06 AM [4840] DISK_SIZE High(0X0Sec), Low(0X76C000Sec), UDisk size High(0X0Sec), Low(0X542000Sec). 00000238 11:17:06 AM [4840] 00000239 11:17:06 AM [4840] ===============mbr_info==================== 00000240 11:17:06 AM [4840] mbr_info->version = 0x100 00000241 11:17:06 AM [4840] mbr_info->magic = softw311 00000242 11:17:06 AM [4840] mbr_info->copy = 0x4 00000243 11:17:06 AM [4840] mbr_info->index = 0x0 00000244 11:17:06 AM [4840] mbr_info->PartCount = 0x9 00000245 11:17:06 AM [4840] mbr_info->array[0].addrhi = 0x0 00000246 11:17:06 AM [4840] mbr_info->array[0].addrlo = 0x800 00000247 11:17:06 AM [4840] mbr_info->array[0].lenhi = 0x0 00000248 11:17:06 AM [4840] mbr_info->array[0].lenlo = 0x8000 00000249 11:17:06 AM [4840] mbr_info->array[0].classname = DISK 00000250 11:17:06 AM [4840] mbr_info->array[0].name = bootloader 00000251 11:17:06 AM [4840] mbr_info->array[0].user_type = 0 00000252 11:17:06 AM [4840] mbr_info->array[0].ro = 0 00000253 11:17:06 AM [4840] mbr_info->array[1].addrhi = 0x0 00000254 11:17:06 AM [4840] mbr_info->array[1].addrlo = 0x8800 00000255 11:17:06 AM [4840] mbr_info->array[1].lenhi = 0x0 00000256 11:17:06 AM [4840] mbr_info->array[1].lenlo = 0x1000 00000257 11:17:06 AM [4840] mbr_info->array[1].classname = DISK 00000258 11:17:06 AM [4840] mbr_info->array[1].name = env 00000259 11:17:06 AM [4840] mbr_info->array[1].user_type = 0 00000260 11:17:06 AM [4840] mbr_info->array[1].ro = 0 00000261 11:17:06 AM [4840] mbr_info->array[2].addrhi = 0x0 00000262 11:17:06 AM [4840] mbr_info->array[2].addrlo = 0x9800 00000263 11:17:06 AM [4840] mbr_info->array[2].lenhi = 0x0 00000264 11:17:06 AM [4840] mbr_info->array[2].lenlo = 0x10000 00000265 11:17:06 AM [4840] mbr_info->array[2].classname = DISK 00000266 11:17:06 AM [4840] mbr_info->array[2].name = boot 00000267 11:17:06 AM [4840] mbr_info->array[2].user_type = 0 00000268 11:17:06 AM [4840] mbr_info->array[2].ro = 0 00000269 11:17:06 AM [4840] mbr_info->array[3].addrhi = 0x0 00000270 11:17:06 AM [4840] mbr_info->array[3].addrlo = 0x19800 00000271 11:17:06 AM [4840] mbr_info->array[3].lenhi = 0x0 00000272 11:17:06 AM [4840] mbr_info->array[3].lenlo = 0x80000 00000273 11:17:06 AM [4840] mbr_info->array[3].classname = DISK 00000274 11:17:06 AM [4840] mbr_info->array[3].name = system 00000275 11:17:06 AM [4840] mbr_info->array[3].user_type = 2 00000276 11:17:06 AM [4840] mbr_info->array[3].ro = 0 00000277 11:17:06 AM [4840] mbr_info->array[4].addrhi = 0x0 00000278 11:17:06 AM [4840] mbr_info->array[4].addrlo = 0x99800 00000279 11:17:06 AM [4840] mbr_info->array[4].lenhi = 0x0 00000280 11:17:06 AM [4840] mbr_info->array[4].lenlo = 0x100000 00000281 11:17:06 AM [4840] mbr_info->array[4].classname = DISK 00000282 11:17:06 AM [4840] mbr_info->array[4].name = data 00000283 11:17:06 AM [4840] mbr_info->array[4].user_type = 2 00000284 11:17:06 AM [4840] mbr_info->array[4].ro = 0 00000285 11:17:06 AM [4840] mbr_info->array[5].addrhi = 0x0 00000286 11:17:06 AM [4840] mbr_info->array[5].addrlo = 0x199800 00000287 11:17:06 AM [4840] mbr_info->array[5].lenhi = 0x0 00000288 11:17:06 AM [4840] mbr_info->array[5].lenlo = 0x800 00000289 11:17:06 AM [4840] mbr_info->array[5].classname = DISK 00000290 11:17:06 AM [4840] mbr_info->array[5].name = misc 00000291 11:17:06 AM [4840] mbr_info->array[5].user_type = 2 00000292 11:17:06 AM [4840] mbr_info->array[5].ro = 0 00000293 11:17:06 AM [4840] mbr_info->array[6].addrhi = 0x0 00000294 11:17:06 AM [4840] mbr_info->array[6].addrlo = 0x19a000 00000295 11:17:06 AM [4840] mbr_info->array[6].lenhi = 0x0 00000296 11:17:06 AM [4840] mbr_info->array[6].lenlo = 0x10000 00000297 11:17:06 AM [4840] mbr_info->array[6].classname = DISK 00000298 11:17:06 AM [4840] mbr_info->array[6].name = recovery 00000299 11:17:06 AM [4840] mbr_info->array[6].user_type = 2 00000300 11:17:06 AM [4840] mbr_info->array[6].ro = 0 00000301 11:17:06 AM [4840] mbr_info->array[7].addrhi = 0x0 00000302 11:17:06 AM [4840] mbr_info->array[7].addrlo = 0x1aa000 00000303 11:17:06 AM [4840] mbr_info->array[7].lenhi = 0x0 00000304 11:17:06 AM [4840] mbr_info->array[7].lenlo = 0x80000 00000305 11:17:06 AM [4840] mbr_info->array[7].classname = DISK 00000306 11:17:06 AM [4840] mbr_info->array[7].name = cache 00000307 11:17:06 AM [4840] mbr_info->array[7].user_type = 2 00000308 11:17:06 AM [4840] mbr_info->array[7].ro = 0 00000309 11:17:06 AM [4840] mbr_info->array[8].addrhi = 0x0 00000310 11:17:06 AM [4840] mbr_info->array[8].addrlo = 0x22a000 00000311 11:17:06 AM [4840] mbr_info->array[8].lenhi = 0x0 00000312 11:17:06 AM [4840] mbr_info->array[8].lenlo = 0x542000 00000313 11:17:06 AM [4840] mbr_info->array[8].classname = DISK 00000314 11:17:06 AM [4840] mbr_info->array[8].name = UDISK 00000315 11:17:06 AM [4840] mbr_info->array[8].user_type = 0 00000316 11:17:06 AM [4840] mbr_info->array[8].ro = 0 00000317 11:17:06 AM [4840] ===============mbr_info==================== 00000318 11:17:06 AM [4840] 00000319 11:17:06 AM [4840] ID=1, fes_thread() : --163-- 00000320 11:17:06 AM [4840] Img_OpenItem now! 00000321 11:17:06 AM [4840] Img_OpenItem[RFSFAT16][BOOTLOADER_00000] 00000322 11:17:06 AM [4840] id[1]art_name = bootloader, packet_len_high = 0x0, packet_len_low = 0x529400, pkt_name = BOOTLOADER_00000, verify_file = VBOOTLOADER_0000, encrypt = 0 00000323 11:17:06 AM [4840] Img_OpenItem now! 00000324 11:17:06 AM [4840] Img_OpenItem[FET ][MAGIC_CRC_START_] 00000325 11:17:06 AM [4840] [fes]: id =1, download_packet ooc Open 00000326 11:17:09 AM [4840] [fes]: id = 1, download_packet ooc close 00000327 11:17:09 AM [4840] Img_OpenItem now! 00000328 11:17:09 AM [4840] Img_OpenItem[FET ][MAGIC_CRC_EN_000] 00000329 11:17:09 AM [4840] Img_OpenItem now! 00000330 11:17:09 AM [4840] Img_OpenItem[RFSFAT16][VBOOTLOADER_0000] 00000331 11:17:10 AM [4840] INFO: ID = 1, pc_crc = 0xbc1881b0, fex_crc = 0x0, nand_crc = 0xbc1881b8 00000332 11:17:10 AM [4840] ERR : check_crc32_form_efex, pc_crc != nand_crc 00000333 11:17:10 AM [4840] err: download_packet, check_crc32_form_efex failed 00000334 11:17:10 AM [4840] ERR: step_download_firmware, download_packet failed 00000335 11:17:10 AM [4840] ERR : ID=1, fes_thread() : step 163 ,fail 00000336 11:17:10 AM [4840] 00000337 11:17:10 AM [4840] INFO: ID=1, update failed 00000338 11:17:10 AM [4840] 00000339 11:17:10 AM [4840] Closing image now! 00000340 11:17:10 AM [4840] CloseImage OK 00000341 11:17:10 AM [4840] MSG Callback Code: 0x20 00000342 11:17:10 AM [4840] free param... Please tell solution of this problem. Thanks
Running Samsung Firmware in qemu / emulator
Hi, did anyone attempted & succeeded in running Samsung FW in the qemu / emulator? I've got the FW for SM-T720 (Samsung Galaxy S5e Wi-Fi) from sammobile com. Code: $ tar tvf AP_T720XXU1ASCF_CL15641490_QB22738516_REV00_user_low_ship_MULTI_CERT_meta_OS9.tar.md5 -rw-rw-r-- dpi/dpi 15254983 2019-03-20 19:16 boot.img.lz4 -rw-rw-r-- dpi/dpi 26207870 2019-03-20 19:17 recovery.img.lz4 -rw-rw-r-- dpi/dpi 2636504669 2019-03-20 19:19 system.img.ext4.lz4 -rw-rw-r-- dpi/dpi 292280 2019-03-20 19:16 dtbo.img.lz4 -rw-rw-r-- dpi/dpi 450811971 2019-03-20 19:19 vendor.img.ext4.lz4 -rw-rw-r-- dpi/dpi 7539 2019-03-20 19:19 persist.img.ext4.lz4 -rw-rw-r-- dpi/dpi 584790192 2019-03-20 19:19 userdata.img.ext4.lz4 -rw-rw-r-- dpi/dpi 3255 2019-03-20 19:19 vbmeta.img.lz4 -r--r--r-- dpi/dpi 6759622 2019-03-20 19:15 modem.bin.lz4 drwxrwxr-x dpi/dpi 0 2019-03-20 19:20 meta-data/ -rw-rw-r-- dpi/dpi 97583402 2019-03-20 19:20 meta-data/fota.zip $ tar tvf BL_T720XXU1ASCF_CL15641490_QB22738516_REV00_user_low_ship_MULTI_CERT.tar.md5 -rw-rw-r-- dpi/dpi 1039308 2019-03-20 19:16 abl.elf.lz4 -rw-rw-r-- dpi/dpi 2266645 2019-03-20 19:17 xbl.elf.lz4 -rw-rw-r-- dpi/dpi 20165 2019-03-20 19:17 xbl_config.elf.lz4 -rw-rw-r-- dpi/dpi 742765 2019-03-20 19:17 tz.mbn.lz4 -rw-rw-r-- dpi/dpi 202881 2019-03-20 19:16 hyp.mbn.lz4 -rw-rw-r-- dpi/dpi 20651 2019-03-20 19:16 devcfg.mbn.lz4 -rw-rw-r-- dpi/dpi 105969 2019-03-20 19:16 aop.mbn.lz4 -rw-rw-r-- dpi/dpi 289374 2019-03-20 19:16 cmnlib.mbn.lz4 -rw-rw-r-- dpi/dpi 346839 2019-03-20 19:16 cmnlib64.mbn.lz4 -rw-rw-r-- dpi/dpi 141807 2019-03-20 19:16 keymaster64.mbn.lz4 -rw-rw-r-- dpi/dpi 795224 2019-03-20 19:16 vaultkeeper.mbn.lz4 -rw-rw-r-- dpi/dpi 19243 2019-03-20 19:16 qupv3fw.elf.lz4 -rw-rw-r-- dpi/dpi 688 2019-03-20 19:17 sec.dat.lz4 -rw-rw-r-- dpi/dpi 3352 2019-03-20 19:16 apdp.mbn.lz4 -rw-rw-r-- dpi/dpi 3353 2019-03-20 19:17 msadp.mbn.lz4 -rw-rw-r-- dpi/dpi 48393 2019-03-20 19:16 bksecapp.mbn.lz4 -rw-rw-r-- dpi/dpi 7781 2019-03-20 19:17 storsec.mbn.lz4 -rw-rw-r-- dpi/dpi 39580563 2019-03-20 19:17 NON-HLOS.bin.lz4 -rwxr-xr-x dpi/dpi 12085956 2019-03-20 19:15 dspso.bin.lz4 -rw-rw-r-- dpi/dpi 3255 2019-03-20 19:19 vbmeta.img.lz4 $ tar tvf CSC_OMC_OXM_T720OXM1ASCF_CL15641490_QB22738516_REV00_user_low_ship_MULTI_CERT.tar.md5 -rw-rw-r-- dpi/dpi 8592 2019-03-20 19:17 GTS4LVWIFI_EUR_OPEN.pit -rw-rw-r-- dpi/dpi 1625 2019-03-20 19:19 cache.img.ext4.lz4 -rw-rw-r-- dpi/dpi 440030404 2019-03-20 19:19 product.img.ext4.lz4 -rw-rw-r-- dpi/dpi 1281 2019-03-20 19:19 omr.img.ext4.lz4 drwxrwxr-x dpi/dpi 0 2019-03-20 19:20 meta-data/ -rw-rw-r-- dpi/dpi 6278 2019-03-20 19:20 meta-data/fota.zip $ tar tvf HOME_CSC_OMC_OXM_T720OXM1ASCF_CL15641490_QB22738516_REV00_user_low_ship_MULTI_CERT.tar.md5 -rw-rw-r-- dpi/dpi 1603 2019-03-20 19:19 cache.img.ext4.lz4 -rw-rw-r-- dpi/dpi 440030404 2019-03-20 19:19 product.img.ext4.lz4 drwxrwxr-x dpi/dpi 0 2019-03-20 19:19 meta-data/ -rw-rw-r-- dpi/dpi 324 2019-03-20 19:19 meta-data/download-list.txt $ I've tried running it with qemu-system-aarch64 -serial stdio ... but it shows no output. I've also used split_bootimg.pl to split the boot.img and "recovery.img" to get the ramdisk.
Bump! I too am interesting in accomplishing this. It seems like it should be possible, provided that the hardware that qemu is capable of emulating is supported by the firmware in question. I found qemu-system-aarch64 -cpu help and -machine help is a good reference to get a list of hardware and cpu supported. But that being all good, I myself have only managed to just get a blank screen, but I know there is a lot more research I have to do. I can't seem to post links for some reason but just search for "Start the emulator from the command line" on android developer website - This doc details running the android studio emulator from its command line- of course avd actually uses qemu so there's definitely gonna be a lot of useful information on there. I'm thinking of starting with trying to emulate a different stock firmware through avd first before trying to invoke qemu directly- avd is a lot more than just a wrapper for qemu, after all.
Excellent idea to investigate firmware in rooting, factory reset protection in qemu first. Github has https://github.com/astarasikov/qemu/tree/exynos9820, and I am going to examine in qemu as well as in real Galaxy S9. Similar idea to study jailbreaking in qemu of iphone using https://github.com/alephsecurity/xnu-qemu-arm64/wiki/Build-iOS-on-QEMU. I want to understand how to "fix calls" in most of unlcoking iCloud.
Question Nord N200 5G
Hey, I recently Downloaded and Flashed the new android 12 full OTA on my bl unlocked and rooted n200, and the bootloader unlocked warning at boot is gone!! I have since boot flashed the extracted magisk patched. fully rooted and bl unlocked, and no warning !! has anyone seen this?
Motomark said: Hey, I recently Downloaded and Flashed the new android 12 full OTA on my bl unlocked and rooted n200, and the bootloader unlocked warning at boot is gone!! I have since boot flashed the extracted magisk patched. fully rooted and bl unlocked, and no warning !! has anyone seen this? Click to expand... Click to collapse Yep. I can confirm too. A nice feature of a12.
Metconnect2000 said: Yep. I can confirm too. A nice feature of a12. Click to expand... Click to collapse that is so awesome. ive tried with several phones and failed.
It only happened on N200 Same notice still happens on Moto Edge 2021 and many video subscription app don't work
Motomark said: Hey, I recently Downloaded and Flashed the new android 12 full OTA on my bl unlocked and rooted n200, and the bootloader unlocked warning at boot is gone!! I have since boot flashed the extracted magisk patched. fully rooted and bl unlocked, and no warning !! has anyone seen this? Click to expand... Click to collapse Where did you download the A12 full OTA(for metro/TMO) and how did you flash it? I can't even install via OTA even if I unroot
Tyreethetruth said: Where did you download the A12 full OTA(for metro/TMO) and how did you flash it? I can't even install via OTA even if I unroot Click to expand... Click to collapse https://android.googleapis.com/packages/ota-api/package/2ae18bc3e36cfe74ae7f1b65d0f817043c57707a.zip
Second that, got the file, but how to flash? GSI installer wants a .img, and with the a/b setup it's very odd with fastbootenhanced. (edited to add, I'm on the Global version myself, no TWRP recovery exists for it as far as I know)
AboveTG said: https://android.googleapis.com/packages/ota-api/package/2ae18bc3e36cfe74ae7f1b65d0f817043c57707a.zip Click to expand... Click to collapse Im still trying to figure that out. I just bricked it trying to flash the magisk patched boot.img, but forgot to finish the OTA.. so I flashed an android 12 boot.img into android 11.. lol. I have a good tool for extracting the payload.bin. should work as a portable app, unzip it and run the exe. That is how you get the images to flash. Make sure your bootloader is unlocked. Dont blame me for any bricking that may occur.
AboveTG said: Im still trying to figure that out. I just bricked it trying to flash the magisk patched boot.img, but forgot to finish the OTA.. so I flashed an android 12 boot.img into android 11.. lol. I have a good tool for extracting the payload.bin. should work as a portable app, unzip it and run the exe. That is how you get the images to flash. Make sure your bootloader is unlocked. Dont blame me for any bricking that may occur. Click to expand... Click to collapse Ok, cool, so extract the images from the bin and flash them individually. I might just hang back with Oxygen 11 for now, at least 5g works and I've bricked it more times than I can count.
I have extracted the boot.img from the Android12 Tmobile payload.bin using Payload-Dumper-Go: Code: Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>payload-dumper-go payload.bin payload.bin: payload.bin Payload Version: 2 Payload Manifest Length: 151601 Payload Manifest Signature Length: 267 Found partitions: system (642 MB), system_ext (966 MB), product (14 MB), vbmeta_system (4.1 kB), oplusstanvbk (6.4 MB), featenabler (90 kB), hyp (397 kB), rpm (254 kB), logo (344 kB), boot (101 MB), vendor_boot (101 MB), vendor (430 MB), odm (630 MB), dtbo (25 MB), vbmeta (8.2 kB), xbl (3.5 MB), xbl_config (74 kB), tz (3.4 MB), modem (178 MB), bluetooth (979 kB), abl (209 kB), dsp (34 MB), keymaster (250 kB), devcfg (45 kB), qupfw (57 kB), imagefv (537 kB), core_nhlos (125 MB), uefisecapp (127 kB), my_product (136 MB), my_engineering (348 kB), my_stock (732 MB), my_company (348 kB), my_carrier (348 kB), my_region (704 kB), my_heytap (714 MB), my_preload (348 kB), my_manifest (348 kB), my_bigball (624 MB) system_ext (966 MB) [===========================] 100 % product (14 MB) [===========================] 100 % vbmeta_system (4.1 kB) [===========================] 100 % system (642 MB) [============================] 100 % oplusstanvbk (6.4 MB) [===========================] 100 % featenabler (90 kB) [============================] 100 % hyp (397 kB) [=============================] 100 % rpm (254 kB) [============================] 100 % logo (344 kB) [============================] 100 % boot (101 MB) [===========================] 100 % vendor_boot (101 MB) [=========================] 100 % vendor (430 MB) [===========================] 100 % odm (630 MB) [===========================] 100 % dtbo (25 MB) [============================] 100 % vbmeta (8.2 kB) [============================] 100 % xbl (3.5 MB) [=============================] 100 % xbl_config (74 kB) [===========================] 100 % tz (3.4 MB) [=============================] 100 % modem (178 MB) [==========================] 100 % bluetooth (979 kB) [===========================] 100 % abl (209 kB) [============================] 100 % dsp (34 MB) [============================] 100 % keymaster (250 kB) [===========================] 100 % devcfg (45 kB) [============================] 100 % qupfw (57 kB) [============================] 100 % imagefv (537 kB) [===========================] 100 % core_nhlos (125 MB) [==========================] 100 % my_product (136 MB) [=========================] 100 % uefisecapp (127 kB) [==========================] 100 % my_engineering (348 kB) [========================] 100 % my_stock (732 MB) [=========================] 100 % my_company (348 kB) [========================] 100 % my_carrier (348 kB) [==========================] 100 % my_region (704 kB) [=========================] 100 % my_heytap (714 MB) [========================] 100 % my_preload (348 kB) [========================] 100 % my_manifest (348 kB) [========================] 100 % my_bigball (624 MB) [=======================] 100 % Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>dir Volume in drive Y is Y - Drivers - Software Volume Serial Number is 32B4-C37E Directory of Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0 07/01/2022 04:57 PM <DIR> . 07/01/2022 04:57 PM <DIR> .. 07/01/2022 04:57 PM <DIR> extracted_20220701_165705 12/09/2021 07:28 AM 154,319 liblzma-5.dll 07/01/2022 04:46 PM 22 liblzma-5.zip 10/06/2020 08:50 AM 12,354,453 payload-dumper-go.exe 01/01/2009 12:00 AM 3,777,851,373 payload.bin 07/01/2022 04:21 PM 1,765,502 PayloadDumper.zip 5 File(s) 3,792,125,669 bytes 3 Dir(s) 1,244,134,313,984 bytes free Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>dir extracted_20220701_165705 /C Volume in drive Y is Y - Drivers - Software Directory of Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0\extracted_20220701_165531 07/01/2022 04:56 PM <DIR> . 07/01/2022 04:56 PM <DIR> .. 07/01/2022 04:56 PM 208,896 abl.img 07/01/2022 04:56 PM 978,944 bluetooth.img 07/01/2022 04:55 PM 100,663,296 boot.img 07/01/2022 04:56 PM 125,042,688 core_nhlos.img 07/01/2022 04:56 PM 45,056 devcfg.img 07/01/2022 04:56 PM 33,554,432 dsp.img 07/01/2022 04:55 PM 25,165,824 dtbo.img 07/01/2022 04:55 PM 90,112 featenabler.img 07/01/2022 04:55 PM 397,312 hyp.img 07/01/2022 04:56 PM 536,576 imagefv.img 07/01/2022 04:56 PM 249,856 keymaster.img 07/01/2022 04:55 PM 344,064 logo.img 07/01/2022 04:55 PM 177,459,200 modem.img 07/01/2022 04:56 PM 623,935,488 my_bigball.img 07/01/2022 04:56 PM 348,160 my_carrier.img 07/01/2022 04:56 PM 348,160 my_company.img 07/01/2022 04:56 PM 348,160 my_engineering.img 07/01/2022 04:56 PM 714,235,904 my_heytap.img 07/01/2022 04:56 PM 348,160 my_manifest.img 07/01/2022 04:56 PM 348,160 my_preload.img 07/01/2022 04:56 PM 135,450,624 my_product.img 07/01/2022 04:56 PM 704,512 my_region.img 07/01/2022 04:56 PM 731,537,408 my_stock.img 07/01/2022 04:55 PM 630,448,128 odm.img 07/01/2022 04:55 PM 6,381,568 oplusstanvbk.img 07/01/2022 04:55 PM 13,729,792 product.img 07/01/2022 04:56 PM 57,344 qupfw.img 07/01/2022 04:55 PM 253,952 rpm.img 07/01/2022 04:55 PM 642,093,056 system.img 07/01/2022 04:56 PM 966,074,368 system_ext.img 07/01/2022 04:55 PM 3,366,912 tz.img 07/01/2022 04:56 PM 126,976 uefisecapp.img 07/01/2022 04:55 PM 8,192 vbmeta.img 07/01/2022 04:55 PM 4,096 vbmeta_system.img 07/01/2022 04:55 PM 429,576,192 vendor.img 07/01/2022 04:55 PM 100,663,296 vendor_boot.img 07/01/2022 04:55 PM 3,530,752 xbl.img 07/01/2022 04:55 PM 73,728 xbl_config.img 38 File(s) 5,468,729,344 bytes 2 Dir(s) 1,244,134,313,984 bytes free Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0> XDA won't allow me to attach the file here. I applied just now for developer at AndroidFileHost to post it there. In the meantime I can post it to the N200 channel at Telegram: Nord N200 Testers A group for discussing N200 custom software testing. All off topic discussion has been moved to this group: https://t.me/+1qZHIItf9R80MTYx Check pinned messages for important messages and shared/confirmed working files. t.me
Tiltowait said: Ok, cool, so extract the images from the bin and flash them individually. I might just hang back with Oxygen 11 for now, at least 5g works and I've bricked it more times than I can count. Click to expand... Click to collapse niiice man I figured it out. & I hear ya on that bricking.. lol. thank god for the msm tool.
scanman0 said: I have extracted the boot.img from the Android12 Tmobile payload.bin using Payload-Dumper-Go: Code: Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>payload-dumper-go payload.bin payload.bin: payload.bin Payload Version: 2 Payload Manifest Length: 151601 Payload Manifest Signature Length: 267 Found partitions: system (642 MB), system_ext (966 MB), product (14 MB), vbmeta_system (4.1 kB), oplusstanvbk (6.4 MB), featenabler (90 kB), hyp (397 kB), rpm (254 kB), logo (344 kB), boot (101 MB), vendor_boot (101 MB), vendor (430 MB), odm (630 MB), dtbo (25 MB), vbmeta (8.2 kB), xbl (3.5 MB), xbl_config (74 kB), tz (3.4 MB), modem (178 MB), bluetooth (979 kB), abl (209 kB), dsp (34 MB), keymaster (250 kB), devcfg (45 kB), qupfw (57 kB), imagefv (537 kB), core_nhlos (125 MB), uefisecapp (127 kB), my_product (136 MB), my_engineering (348 kB), my_stock (732 MB), my_company (348 kB), my_carrier (348 kB), my_region (704 kB), my_heytap (714 MB), my_preload (348 kB), my_manifest (348 kB), my_bigball (624 MB) system_ext (966 MB) [===========================] 100 % product (14 MB) [===========================] 100 % vbmeta_system (4.1 kB) [===========================] 100 % system (642 MB) [============================] 100 % oplusstanvbk (6.4 MB) [===========================] 100 % featenabler (90 kB) [============================] 100 % hyp (397 kB) [=============================] 100 % rpm (254 kB) [============================] 100 % logo (344 kB) [============================] 100 % boot (101 MB) [===========================] 100 % vendor_boot (101 MB) [=========================] 100 % vendor (430 MB) [===========================] 100 % odm (630 MB) [===========================] 100 % dtbo (25 MB) [============================] 100 % vbmeta (8.2 kB) [============================] 100 % xbl (3.5 MB) [=============================] 100 % xbl_config (74 kB) [===========================] 100 % tz (3.4 MB) [=============================] 100 % modem (178 MB) [==========================] 100 % bluetooth (979 kB) [===========================] 100 % abl (209 kB) [============================] 100 % dsp (34 MB) [============================] 100 % keymaster (250 kB) [===========================] 100 % devcfg (45 kB) [============================] 100 % qupfw (57 kB) [============================] 100 % imagefv (537 kB) [===========================] 100 % core_nhlos (125 MB) [==========================] 100 % my_product (136 MB) [=========================] 100 % uefisecapp (127 kB) [==========================] 100 % my_engineering (348 kB) [========================] 100 % my_stock (732 MB) [=========================] 100 % my_company (348 kB) [========================] 100 % my_carrier (348 kB) [==========================] 100 % my_region (704 kB) [=========================] 100 % my_heytap (714 MB) [========================] 100 % my_preload (348 kB) [========================] 100 % my_manifest (348 kB) [========================] 100 % my_bigball (624 MB) [=======================] 100 % Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>dir Volume in drive Y is Y - Drivers - Software Volume Serial Number is 32B4-C37E Directory of Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0 07/01/2022 04:57 PM <DIR> . 07/01/2022 04:57 PM <DIR> .. 07/01/2022 04:57 PM <DIR> extracted_20220701_165705 12/09/2021 07:28 AM 154,319 liblzma-5.dll 07/01/2022 04:46 PM 22 liblzma-5.zip 10/06/2020 08:50 AM 12,354,453 payload-dumper-go.exe 01/01/2009 12:00 AM 3,777,851,373 payload.bin 07/01/2022 04:21 PM 1,765,502 PayloadDumper.zip 5 File(s) 3,792,125,669 bytes 3 Dir(s) 1,244,134,313,984 bytes free Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>dir extracted_20220701_165705 /C Volume in drive Y is Y - Drivers - Software Directory of Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0\extracted_20220701_165531 07/01/2022 04:56 PM <DIR> . 07/01/2022 04:56 PM <DIR> .. 07/01/2022 04:56 PM 208,896 abl.img 07/01/2022 04:56 PM 978,944 bluetooth.img 07/01/2022 04:55 PM 100,663,296 boot.img 07/01/2022 04:56 PM 125,042,688 core_nhlos.img 07/01/2022 04:56 PM 45,056 devcfg.img 07/01/2022 04:56 PM 33,554,432 dsp.img 07/01/2022 04:55 PM 25,165,824 dtbo.img 07/01/2022 04:55 PM 90,112 featenabler.img 07/01/2022 04:55 PM 397,312 hyp.img 07/01/2022 04:56 PM 536,576 imagefv.img 07/01/2022 04:56 PM 249,856 keymaster.img 07/01/2022 04:55 PM 344,064 logo.img 07/01/2022 04:55 PM 177,459,200 modem.img 07/01/2022 04:56 PM 623,935,488 my_bigball.img 07/01/2022 04:56 PM 348,160 my_carrier.img 07/01/2022 04:56 PM 348,160 my_company.img 07/01/2022 04:56 PM 348,160 my_engineering.img 07/01/2022 04:56 PM 714,235,904 my_heytap.img 07/01/2022 04:56 PM 348,160 my_manifest.img 07/01/2022 04:56 PM 348,160 my_preload.img 07/01/2022 04:56 PM 135,450,624 my_product.img 07/01/2022 04:56 PM 704,512 my_region.img 07/01/2022 04:56 PM 731,537,408 my_stock.img 07/01/2022 04:55 PM 630,448,128 odm.img 07/01/2022 04:55 PM 6,381,568 oplusstanvbk.img 07/01/2022 04:55 PM 13,729,792 product.img 07/01/2022 04:56 PM 57,344 qupfw.img 07/01/2022 04:55 PM 253,952 rpm.img 07/01/2022 04:55 PM 642,093,056 system.img 07/01/2022 04:56 PM 966,074,368 system_ext.img 07/01/2022 04:55 PM 3,366,912 tz.img 07/01/2022 04:56 PM 126,976 uefisecapp.img 07/01/2022 04:55 PM 8,192 vbmeta.img 07/01/2022 04:55 PM 4,096 vbmeta_system.img 07/01/2022 04:55 PM 429,576,192 vendor.img 07/01/2022 04:55 PM 100,663,296 vendor_boot.img 07/01/2022 04:55 PM 3,530,752 xbl.img 07/01/2022 04:55 PM 73,728 xbl_config.img 38 File(s) 5,468,729,344 bytes 2 Dir(s) 1,244,134,313,984 bytes free Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0> XDA won't allow me to attach the file here. I applied just now for developer at AndroidFileHost to post it there. In the meantime I can post it to the N200 channel at Telegram: Nord N200 Testers A group for discussing N200 custom software testing. All off topic discussion has been moved to this group: https://t.me/+1qZHIItf9R80MTYx Check pinned messages for important messages and shared/confirmed working files. t.me Click to expand... Click to collapse I joined the telegram channel
scanman0 said: I have extracted the boot.img from the Android12 Tmobile payload.bin using Payload-Dumper-Go: Code: Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>payload-dumper-go payload.bin payload.bin: payload.bin Payload Version: 2 Payload Manifest Length: 151601 Payload Manifest Signature Length: 267 Found partitions: system (642 MB), system_ext (966 MB), product (14 MB), vbmeta_system (4.1 kB), oplusstanvbk (6.4 MB), featenabler (90 kB), hyp (397 kB), rpm (254 kB), logo (344 kB), boot (101 MB), vendor_boot (101 MB), vendor (430 MB), odm (630 MB), dtbo (25 MB), vbmeta (8.2 kB), xbl (3.5 MB), xbl_config (74 kB), tz (3.4 MB), modem (178 MB), bluetooth (979 kB), abl (209 kB), dsp (34 MB), keymaster (250 kB), devcfg (45 kB), qupfw (57 kB), imagefv (537 kB), core_nhlos (125 MB), uefisecapp (127 kB), my_product (136 MB), my_engineering (348 kB), my_stock (732 MB), my_company (348 kB), my_carrier (348 kB), my_region (704 kB), my_heytap (714 MB), my_preload (348 kB), my_manifest (348 kB), my_bigball (624 MB) system_ext (966 MB) [===========================] 100 % product (14 MB) [===========================] 100 % vbmeta_system (4.1 kB) [===========================] 100 % system (642 MB) [============================] 100 % oplusstanvbk (6.4 MB) [===========================] 100 % featenabler (90 kB) [============================] 100 % hyp (397 kB) [=============================] 100 % rpm (254 kB) [============================] 100 % logo (344 kB) [============================] 100 % boot (101 MB) [===========================] 100 % vendor_boot (101 MB) [=========================] 100 % vendor (430 MB) [===========================] 100 % odm (630 MB) [===========================] 100 % dtbo (25 MB) [============================] 100 % vbmeta (8.2 kB) [============================] 100 % xbl (3.5 MB) [=============================] 100 % xbl_config (74 kB) [===========================] 100 % tz (3.4 MB) [=============================] 100 % modem (178 MB) [==========================] 100 % bluetooth (979 kB) [===========================] 100 % abl (209 kB) [============================] 100 % dsp (34 MB) [============================] 100 % keymaster (250 kB) [===========================] 100 % devcfg (45 kB) [============================] 100 % qupfw (57 kB) [============================] 100 % imagefv (537 kB) [===========================] 100 % core_nhlos (125 MB) [==========================] 100 % my_product (136 MB) [=========================] 100 % uefisecapp (127 kB) [==========================] 100 % my_engineering (348 kB) [========================] 100 % my_stock (732 MB) [=========================] 100 % my_company (348 kB) [========================] 100 % my_carrier (348 kB) [==========================] 100 % my_region (704 kB) [=========================] 100 % my_heytap (714 MB) [========================] 100 % my_preload (348 kB) [========================] 100 % my_manifest (348 kB) [========================] 100 % my_bigball (624 MB) [=======================] 100 % Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>dir Volume in drive Y is Y - Drivers - Software Volume Serial Number is 32B4-C37E Directory of Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0 07/01/2022 04:57 PM <DIR> . 07/01/2022 04:57 PM <DIR> .. 07/01/2022 04:57 PM <DIR> extracted_20220701_165705 12/09/2021 07:28 AM 154,319 liblzma-5.dll 07/01/2022 04:46 PM 22 liblzma-5.zip 10/06/2020 08:50 AM 12,354,453 payload-dumper-go.exe 01/01/2009 12:00 AM 3,777,851,373 payload.bin 07/01/2022 04:21 PM 1,765,502 PayloadDumper.zip 5 File(s) 3,792,125,669 bytes 3 Dir(s) 1,244,134,313,984 bytes free Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>dir extracted_20220701_165705 /C Volume in drive Y is Y - Drivers - Software Directory of Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0\extracted_20220701_165531 07/01/2022 04:56 PM <DIR> . 07/01/2022 04:56 PM <DIR> .. 07/01/2022 04:56 PM 208,896 abl.img 07/01/2022 04:56 PM 978,944 bluetooth.img 07/01/2022 04:55 PM 100,663,296 boot.img 07/01/2022 04:56 PM 125,042,688 core_nhlos.img 07/01/2022 04:56 PM 45,056 devcfg.img 07/01/2022 04:56 PM 33,554,432 dsp.img 07/01/2022 04:55 PM 25,165,824 dtbo.img 07/01/2022 04:55 PM 90,112 featenabler.img 07/01/2022 04:55 PM 397,312 hyp.img 07/01/2022 04:56 PM 536,576 imagefv.img 07/01/2022 04:56 PM 249,856 keymaster.img 07/01/2022 04:55 PM 344,064 logo.img 07/01/2022 04:55 PM 177,459,200 modem.img 07/01/2022 04:56 PM 623,935,488 my_bigball.img 07/01/2022 04:56 PM 348,160 my_carrier.img 07/01/2022 04:56 PM 348,160 my_company.img 07/01/2022 04:56 PM 348,160 my_engineering.img 07/01/2022 04:56 PM 714,235,904 my_heytap.img 07/01/2022 04:56 PM 348,160 my_manifest.img 07/01/2022 04:56 PM 348,160 my_preload.img 07/01/2022 04:56 PM 135,450,624 my_product.img 07/01/2022 04:56 PM 704,512 my_region.img 07/01/2022 04:56 PM 731,537,408 my_stock.img 07/01/2022 04:55 PM 630,448,128 odm.img 07/01/2022 04:55 PM 6,381,568 oplusstanvbk.img 07/01/2022 04:55 PM 13,729,792 product.img 07/01/2022 04:56 PM 57,344 qupfw.img 07/01/2022 04:55 PM 253,952 rpm.img 07/01/2022 04:55 PM 642,093,056 system.img 07/01/2022 04:56 PM 966,074,368 system_ext.img 07/01/2022 04:55 PM 3,366,912 tz.img 07/01/2022 04:56 PM 126,976 uefisecapp.img 07/01/2022 04:55 PM 8,192 vbmeta.img 07/01/2022 04:55 PM 4,096 vbmeta_system.img 07/01/2022 04:55 PM 429,576,192 vendor.img 07/01/2022 04:55 PM 100,663,296 vendor_boot.img 07/01/2022 04:55 PM 3,530,752 xbl.img 07/01/2022 04:55 PM 73,728 xbl_config.img 38 File(s) 5,468,729,344 bytes 2 Dir(s) 1,244,134,313,984 bytes free Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0> XDA won't allow me to attach the file here. I applied just now for developer at AndroidFileHost to post it there. In the meantime I can post it to the N200 channel at Telegram: Nord N200 Testers A group for discussing N200 custom software testing. All off topic discussion has been moved to this group: https://t.me/+1qZHIItf9R80MTYx Check pinned messages for important messages and shared/confirmed working files. t.me Click to expand... Click to collapse Boot.img for DE2118_11_C.15 T-Mobile/MetroPCS AOSP 12 posted here
towardsdawn said: Boot.img for DE2118_11_C.15 T-Mobile/MetroPCS AOSP 12 posted here Click to expand... Click to collapse I need the boot image for magisk for the unlocked variant (best buy version)
Question Which of these packages are making my Messenger freeze every time I click on a link sent to me?
# Preset created in ADB AppControl 1.7.9.1 # Total applications: 178 # 2023-04-08_19:45:51 # Samsung SM-S918U1 Disabled applications com.samsung.android.service.aircommand com.google.android.projection.gearhead com.android.egg com.google.android.as android.auto_generated_rro_product__ android.auto_generated_rro_vendor__ com.samsung.android.app.updatecenter com.samsung.android.mapsagent com.samsung.android.app.appsedge com.samsung.android.ardrawing com.samsung.android.aremoji com.samsung.android.aremojieditor com.sec.android.mimage.avatarstickers com.google.ar.core com.samsung.android.authfw com.sec.android.autodoodle.service com.sec.mhs.smarttethering com.samsung.android.samsungpassautofill com.sec.android.app.DataCreate com.android.dreams.basic com.samsung.android.bbc.bbcagent com.samsung.android.visionintelligence com.samsung.android.bixby.agent com.samsung.android.bixbyvision.framework com.android.bluetoothmidiservice com.android.bookmarkprovider com.samsung.android.mdecservice com.google.android.cellbroadcastservice com.android.chrome com.sec.android.app.chromecustomizations com.samsung.android.app.clipboardedge com.samsung.cmfa.AuthTouch com.samsung.android.cmfa.framework com.android.providers.partnerbookmarks com.android.sharedstoragebackup com.android.wallpaperbackup com.android.wallpapercropper com.samsung.android.knox.attestation com.samsung.android.smartswitchassistant com.samsung.android.mcfds com.samsung.android.app.camera.sticker.facearavatar.preload com.samsung.android.rubin.app com.google.android.apps.restore com.android.bips com.google.android.apps.turbo com.sec.android.app.dexonpc com.diotek.sec.lookup.dictionary com.samsung.android.carkey com.samsung.android.forest com.samsung.android.da.daagent com.sec.android.easyonehand com.samsung.android.app.cocktailbarservice com.samsung.app.newtrim com.sec.android.app.safetyassurance com.sec.enterprise.mdm.services.simpin com.samsung.faceservice com.google.android.gms.supervision com.sec.android.widgetapp.easymodecontactswidget com.samsung.android.fmm com.samsung.android.app.galaxyfinder com.monotype.android.font.foundation com.samsung.android.gru com.samsung.android.widget.pictureframe com.samsung.storyservice com.samsung.android.game.gametools com.samsung.android.game.gamehome com.samsung.android.game.gos com.samsung.android.service.pentastic com.google.android.googlequicksearchbox com.android.hotwordenrollment.xgoogle com.android.hotwordenrollment.okgoogle com.google.android.syncadapters.calendar com.google.android.gms.location.history com.google.android.onetimeinitializer com.google.android.partnersetup com.samsung.gpuwatchapp com.samsung.android.mobileservice com.samsung.android.sdk.handwriting com.android.htmlviewer com.sec.android.app.hwmoduletest com.samsung.klmsagent com.samsung.android.knox.analytics.uploader com.sec.enterprise.knox.cloudmdm.smdms com.samsung.android.knox.pushmanager com.knox.vpn.proxyhandler com.samsung.android.knox.kpecore com.microsoft.appmanager com.samsung.android.mdx com.samsung.android.service.livedrawing com.google.audio.hearing.visualization.accessibility.scribe com.android.wallpaper.livepicker com.sec.android.app.magnifier com.samsung.android.app.readingglass com.google.android.apps.maps com.google.android.feedback com.samsung.android.mdm com.google.android.apps.tachyon com.google.android.apps.messaging com.facebook.system com.facebook.appmanager com.facebook.services com.samsung.android.inputshare com.samsung.android.easysetup com.samsung.android.beaconmanager com.samsung.android.allshare.service.mediashare com.sec.vsim.ericssonnsds.webapp com.android.internal.systemui.onehanded.gestural com.microsoft.skydrive com.samsung.android.service.peoplestripe com.samsung.android.peripheral.framework com.android.dreams.phototable com.google.android.printservice.recommendation com.android.printspooler com.google.android.as.oss com.samsung.android.privateshare com.samsung.android.app.sharelive com.samsung.android.aware.service com.samsung.android.mdx.kit com.samsung.android.app.omcagent com.samsung.android.app.reminder com.samsung.safetyinformation com.sec.android.app.apex com.samsung.android.coldwalletservice com.sec.android.app.billing com.samsung.android.scpm com.sec.android.desktopmode.uiservice com.sec.android.app.desktoplauncher com.sec.android.dexsystemui com.sec.android.app.ve.vebgm com.samsung.android.kidsinstaller com.sec.location.nsflp2 com.samsung.android.samsungpass com.samsung.android.spayfw com.sec.spp.push com.samsung.SMT com.samsung.android.ipsgeofence com.samsung.android.dkey com.samsung.android.samsungpositioning com.samsung.knox.securefolder com.samsung.android.fast com.samsung.android.appseparation com.sec.android.RilServiceModeApp com.sec.location.nfwlocationprivacy com.samsung.android.app.settings.bixby com.samsung.android.shortcutbackupservice com.sec.modem.settings com.android.simappdialog com.android.stk com.android.stk2 com.skms.android.agent com.samsung.android.location com.samsung.android.smartsuggestions com.sec.android.easyMover.Agent com.samsung.android.visualars com.samsung.android.smartmirroring com.samsung.android.service.stplatform com.google.android.tts com.samsung.android.stickercenter com.google.mainline.telemetry com.samsung.android.svcagent com.android.apps.tag com.samsung.android.service.tagservice com.samsung.android.accessibility.talkback com.samsung.android.app.taskedge com.sec.android.app.quicktool com.samsung.android.service.airviewdictionary com.android.providers.userdictionary com.samsung.android.vtcamerasettings com.sec.android.app.vepreload com.google.android.apps.accessibility.voiceaccess com.samsung.android.bixby.wakeup com.android.vpndialogs com.samsung.android.dynamiclock com.samsung.android.app.watchmanagerstub com.samsung.android.net.wifi.wifiguider com.sec.android.app.wlantest com.samsung.android.knox.containercore com.google.android.youtube
I found out it is the latest messenger update with the glitches. I downgraded to the update before it and it works now
[Tutorial] MIUI 14 Bloatware Removal List
I have compiled a list of unnecessary apps that can be safely removed on MIUI 14.0.3. It was tested on Redmi Note 9s. com.amazon.mShop.android.shopping com.booking com.miui.analytics com.google.android.marvin.talkback com.google.android.projection.gearhead com.android.egg com.google.android.setupwizard com.mi.globalminusscreen com.longcheertel.midtest com.google.android.apps.googleassistant com.longcheertel.AutoTest com.miui.backup com.android.dreams.basic com.android.providers.blockednumber com.android.bookmarkprovider com.xiaomi.barrage com.android.calllogbackup com.qualcomm.qti.callfeaturessetting com.google.android.ims com.android.chrome com.longcheertel.cit com.miui.cloudbackup com.android.backupconfirm com.android.cts.ctsshim com.android.cts.priv.ctsshim com.android.localtransport com.android.ons com.android.providers.partnerbookmarks com.android.sharedstoragebackup com.android.wallpaperbackup com.miui.face.overlay.miui com.miui.rom com.qualcomm.qti.remoteSimlockAuth com.qualcomm.timeservice com.android.companiondevicemanager com.miui.compass com.qualcomm.qti.confdialer com.qti.confuridialer com.google.android.apps.restore com.google.android.apps.turbo com.qti.qualcomm.deviceinfo com.google.android.apps.wellbeing com.android.dynsystem com.android.emergency com.facebook.katana com.facebook.system com.facebook.appmanager com.facebook.services com.miui.bugreport com.fido.asm com.fido.xiaomi.uafclient com.goodix.gftest com.fingerprints.extension.service com.miui.freeform com.caf.fmradio com.miui.fm com.miui.fmservice com.miui.phrase com.xiaomi.glgm com.android.internal.systemui.navbar.gestural_narrow_back com.android.internal.systemui.navbar.gestural_extra_wide_back com.android.internal.systemui.navbar.gestural_wide_back com.android.internal.systemui.navbar.gestural com.xiaomi.mipicks com.goodix.fingerprint com.google.android.gm com.google.android.googlequicksearchbox com.android.hotwordenrollment.xgoogle com.android.hotwordenrollment.okgoogle com.google.android.syncadapters.contacts com.google.android.gms.location.history com.google.android.apps.subscriptions.red com.google.android.onetimeinitializer com.google.android.partnersetup com.google.android.apps.walletnfcrel com.android.vending com.mi.healthglobal org.ifaa.aidl.manager com.xiaomi.joyose com.android.keychain com.android.wallpaper.livepicker com.google.android.apps.maps com.google.android.feedback com.xiaomi.payment com.xiaomi.mi_connect_service cn.wps.xiaomi.abroad.lite com.xiaomi.mircs com.duokan.phone.remotecontroller com.miui.mishare.connectivity com.miui.videoplayer com.miui.micloudsync org.mipay.android.manager com.miui.daemon com.miui.face com.android.mms.service com.amazon.appmanager com.miui.msa.global com.miui.player com.netflix.mediaclient com.android.nfc com.android.internal.systemui.onehanded.gestural com.wdstechnology.android.kryten android.autoinstalls.config.Xiaomi.qssi com.android.dreams.phototable com.google.android.printservice.recommendation com.android.printspooler com.android.provision com.qualcomm.qti.qdma com.miui.hybrid com.miui.touchassistant com.longcheertel.sarauth com.fingerprints.sensortesttool com.miui.miservice com.xiaomi.midrop com.android.stk com.miui.hybrid.accessory com.tencent.soter.soterserver com.google.android.tts com.google.mainline.telemetry com.xiaomi.discover com.android.bips com.android.apps.tag com.android.updater com.android.providers.userdictionary com.miui.weather2 com.android.managedprovisioning com.xiaomi.account com.miui.cloudservice com.xiaomi.xmsfkeeper com.xiaomi.simactivate.service com.miui.yellowpage com.google.android.youtube com.android.systemui.gesture.line.overlay com.qti.diagservices com.qti.dpmserviceapp com.qualcomm.embms com.google.android.configupdater com.miui.wmsvc com.miui.phone.carriers.overlay.h3g com.miui.phone.carriers.overlay.vodafone com.qti.xdivert com.android.traceur com.android.theme.font.notoserifsource com.android.thememanager.gliobal_config.config.overlay com.android.wallpapercropper com.miui.miwallpaper.overlay com.miui.miwallpaper.overlay.customize com.mi.globallayout com.miui.systemui.carriers.overlay com.qti.qualcomm.datastatusnotification com.google.android.overlay.modules.permissioncontroller com.google.android.overlay.modules.permissioncontroller.forframework com.miui.core.internal.services com.miui.system com.qualcomm.qti.poweroffalarm com.qti.service.colorservice com.alibaba.aliexpresshd com.block.puzzle.game.hippo.mi com.sukhavati.gotoplaying.bubble.BubbleShooter.mint com.crazy.juicer.xm com.google.android.apps.tachyon com.google.android.apps.docs com.logame.eliminateintruder3d com.google.android.apps.magazines com.google.android.apps.podcasts com.google.android.videos com.jewelsblast.ivygames.Adventure.free com.google.android.apps.photos com.spotify.music com.mintgames.triplecrush.tile.fun com.mi.global.bbs com.google.android.apps.youtube.music com.amazon.mp3 com.zhiliaoapp.musically com.miui.wallpaper.overlay com.miui.wallpaper.overlay.customize com.kingsgroup.ss.xiaomi com.ss.android.ugc.trill com.miui.android.fashiongallery com.miui.securityadd com.android.thememanager com.miui.securitycore com.google.android.overlay.gmsconfig.common com.google.android.overlay.gmsconfig.geotz com.google.android.overlay.gmsconfig.gsa com.miui.notification com.google.android.ext.shared com.android.smspush com.qualcomm.qti.qccauthmgr com.android.se com.android.musicfx com.miui.global.packageinstaller com.android.proxyhandler com.qti.snapdragon.qcdm_ff com.qualcomm.qti.ridemodeaudio com.android.soundpicker com.miui.misound com.qualcomm.qti.xrcb com.qualcomm.qti.xrvd.service Click to expand... Click to collapse To uninstall apps using ADB use this code: adb shell pm uninstall --user 0 Click to expand... Click to collapse