Latest update - Post #15
Overview - There are various models of infoTMIC devices supported by different manufacturers/distributors however, they all seem to utilize the same base firmware and automatic update process.
The are many currently known infoTMIC CPU based devices are:
7" I7Y-MP1 - Superpad i7
7" Zenithink ZT180 v1
7" Zenithink
7" Disco 6000
7" Sylvania SYNET7LP/SYTABEX7, SYTABBL7/SYTABBL7-0608/SYTABEX7-2, SYTAB7MX
7" AIRIS OnePAD 700 Model: TAB700x iMAPx210 supported in Spain
8" Klu by Curtis International LT8025
ICAN! 10 - 10" Tablet PC
10" FlyTouch II, SuperPAD, WOWpad, WWE10, PC1002I, HyPE-Pad, ZH10X2, APad GF10, CEM111, Daystar MD10, Careeror CM10104
I10Y
10" Sylvania SYTAB10MT (SYNET10LP), SYTAB10ST
10" SuperPAD II
10" Zenithink ZT180 v2
Each of these devices is best identified by their Hardware ID "hwver" as the information displayed on the "Settings > About device" screen is often incorrect since the "Model number" is hard coded in to the Settings application (.apk) or extracted from the build.prop.
Example - DeviceInfoSettings.smali in Settings.apk from SuperPad decoded with android-apktool
Code:
.line 59
const-string v1, "firmware_version"
const-string v2, "Android2.2-20110325"
invoke-direct {p0, v1, v2}, Lcom/android/settings/DeviceInfoSettings;->setStringSummary(Ljava/lang/String;Ljava/lang/String;)V
.line 60
const-string v1, "baseband_version"
const-string v2, "gsm.version.baseband"
invoke-direct {p0, v1, v2}, Lcom/android/settings/DeviceInfoSettings;->setValueSummary(Ljava/lang/String;Ljava/lang/String;)V
.line 61
const-string v1, "[B]device_model[/B]"
const-string v2, "[B]disco[/B]"
invoke-direct {p0, v1, v2}, Lcom/android/settings/DeviceInfoSettings;->setStringSummary(Ljava/lang/String;Ljava/lang/String;)V
The infoTMIC tablet's Hardware ID "hwver" is determined by reviewing the "Kernel command line" output of either shell command "dmesg" or "cat /proc/cmdline".
On some devices, the Hardware ID "hwver" is displayed on the initial boot screen in the lower right corner followed by the U0 - u-boot-nand.bin version in parenthesis (###).
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
dmesg - Example from SuperPad "WWE10" initial firmware did not include "hwver=" output, it was added in a later firmware update.
Code:
<5>[ 0.000000] Kernel command line: console=ttySAC3,115200 androidboot.mode=normal bmagic=0xdb6db610
dmesg - Example Sylvania, no bmagic
Code:
<5>Kernel command line: console=ttySAC3,115200 androidboot.mode=normal bmagic=0x00000000 hwver=11.2.1.8
Code:
C:\>adb shell cat /proc/cmdline
console=ttySAC3,115200 androidboot.mode=normal bmagic=0xeef07901 hwver=11.2.0.6
The automatic update, "Settings > Update System > Check for Update", polls an update server for available file using the following GET command -
Code:
http //222.73.93.45/sysup.php?data=##.#.#.#&vcode=##
Note: On some of the newer Sylvania tablets the update server is coded in the build prop - persist.sys.server=dg-support2a.com
The #'s after "data=" are subsituted with the values returned for the "hwver=" as seen in "dmesg" or "cat /proc/cmdline". The "vcode=" is the Version code are returned by "getprop ro.versioncode" if it exists in the build.prop.
If an update file (*.ius) is available, a download link is returned. Preceding the link separated by a pipe "|" symbol is the current available version. If nothing is available or the update server database is "turned off" a "1" is returned. Many times no file was identified but by using the previous update files names the additional files were identified.
Code:
5|http //222.73.93.45/update/0.7.1.5/WWE08B_Android-2.1_0.7.1.5_v5full.ius
The currently known InfoTM Update Wrap (IUW) multi-part update files for each of the various Hardward ID's "hwver" are listed below.
The multi-part update file contains an IUW header, U0 - u-boot-nand.bin, UBOOT, RD - RAMDISK, LK - KERNEL, ADR-USER - UserData, and ADR-AS - system.img. The Wrap Information details can be viewed for each *.ius using the IUW Version 1.2 InfoTM Update Wrap Tool attached in post #2.
WARNING - Burning the incorrect update file (more specifically the U0 "u-boot-nand.bin" image) can brick the device.
Code:
[FONT="Courier New"]
[B]Hardware ID InfoTM update wrap(*.ius) FileNum: U0 u-boot-nand.bin U0 UBOOT RD LK ADR_USER ADR_AS
"hwver" Firmware Version RAMDISK KERNEL USER SYSTEM
[/B]----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
[B]Infotmic AV-P8088A[/B]
32.9.0.1 P8088A_Android_v11_2.2.ius 32.9.0.1.1.11 2009.08-svn619 (Mar 11 2011 - 17:09:24) 258 KB NA 165KB 2658 KB NA 144860.5 KB
[B]Zenithink 10" ZT-180/Infotmic AV-P8088[/B]
32.8.0.1 P8088_Android_10.ius 32.8.0.1.0.10 NA NA NA 159.5 KB NA 4.5 KB 75766.5 KB
32.8.0.1 P8088_Android_9.ius 32.8.0.1.0.9 NA NA NA 159.5 KB NA 8.5 KB 68640.5 KB
32.8.0.1 P8088_Android_8.ius 32.8.0.1.0.8 NA NA NA 159.5 KB NA 8.5 KB 68629.5 KB
[B]FlyTouch V2.7[/B]
14.6.1.5 wwe10_Android_v4.ius 14.6.1.5.1.4 2009.08-dirty ( 9 e6 9c 88 23 2011 - 17:26:34)
[B]I7Y & I10Y[/B] Note the confusion between Hardware ID "hwver" and FileNum:
13.4.0.1 I10Y_Android_17.ius 0.5.0.1.0.3 2009.08-svn467 (Dec 24 2010 - 10:52:47) 232 KB 216 KB 159 KB 2394 KB 4.5 KB 70731.5 KB
13.5.0.1 I7Y_Android_10.ius 0.4.0.1.0.3 No U0 image included in this update NA NA 159.5 KB 2394 KB 4.5 KB 69249.5 KB
[B]Disgo 6000[/B]
12.2.0.5 disgo_12.2.0.5.1.4.ius 12.2.0.5.1.4 2009.08-svn483 (Nov 23 2010 - 08:42:32) 247 KB 231 KB 178.5 KB 2370.5 KB 4.5 KB 49677.5 KB
[B]Sylvania 10" SYTAB10ST[/B]
11.6.8.2 SYTABEX7-2_Android_395266.ius 11.6.8.2.21.1 NA NA NA 170 KB 2347 KB 8.5 KB 59742.5 KB Note: Also includes RD_ (4477 KB) updater.img. File naming inconsistent with device.
[B]Sylvania 10" SYTAB10MT(SYNET10LP)[/B]
11.6.3.1 0106rd_11.6.3.1.2.0_beta3.ius 11.6.3.1.2.0 2009.08-svn678 (Mar 14 2015 - 09:59:41) 270.5 KB NA 195.5 KB 2617.5 KB 8.5 KB 55639.5 KB
11.6.3.1 wwe10_11.6.1.5.2.0_beta3.ius 11.6.3.1.2.0 2009.08-svn678 (Mar 14 2015 - 09:55:48) 270.5 KB NA 195.5 KB 2617.5 KB 4.5 KB 55699 KB
11.6.3.1 11.6.3.1.2.0_beta4_0523.ius 11.6.3.1.2.0 2009.08-svn678 (Mar 14 2015 - 09:59:41) 270.5 KB NA 195.5 KB 2617.5 KB 8.5 KB 56392.5 KB
11.6.1.5 11.6.1.5.2.0_beta4_0523.ius 11.6.1.5.2.0 2009.08-svn678 (Mar 14 2015 - 09:55:48) 270.5 KB NA 195.5 KB 2617.5 KB 4.5 KB 56456.5 KB
[B]Sylvania 7" SYTAB7MX[/B]
11.2.7.4 SYTAB7MX_Android_132868.ius 11.2.7.4.7.4 2009.08 (10 e6 9c 88 24 2011 - 11:10:21) 257 KB NA 178.5 KB 2392.5 KB 8.5 KB 60365 KB Note: Also includes RD_ (4778.5 KB) updater.img. Update server coded as persist.sys.server=dg-support2a.com
[B]Sylvania 7" SYTABBL7/SYTABBL7-0608/SYTABEX7-2[/B]
11.2.3.1 P7901UC_131841_v2.ius 11.2.3.1.1.1 2009.08 (9 e6 9c 88 06 2011 - 10:07:12) 259 KB NA 174.5 KB 2369.5 KB 8.5 KB 61821 KB Note: v2 & v1 are identical on dg-support2a.com
11.2.3.1 P7901UC_131841_v1.ius 11.2.3.1.1.1 2009.08 (9 e6 9c 88 06 2011 - 10:07:12) 259 KB NA 174.5 KB 2369.5 KB 8.5 KB 61821 KB
11.2.3.1 7901UC_11.2.3.1.2.0_beta3.ius 11.2.3.1.2.0 2009.08-svn661 (Feb 26 2015 - 08:50:14) 249 KB NA 173 KB 2369.5 KB 8.5 KB 63859 KB
11.2.3.1 11.2.3.1.2.0.ius 11.2.3.1.2.1 2009.08-svn640 (Feb 14 2015 - 00:37:12) 249 KB NA 173 KB 2369.5 KB 8.5 KB 63223 KB
11.2.3.1 11.2.3.1.2.1.ius 11.2.0.6.2.0 2009.08-svn661 (Feb 26 2015 - 08:50:14) 249 KB NA 173 KB 2369.5 KB 8.5 KB 63859 KB Note: FileNum?
[B]Sylvania 7" SYNET7LP[/B]
11.2.1.8 11.2.1.8.2.0_beta3.ius 11.2.1.8.2.1 2009.08-svn627 (Jan 22 2013 - 09:19:18) 248.5 KB NA 173 KB 2370 KB 4.5 KB 63294 KB
11.2.1.8 11.2.1.8.2.0_beta4.ius 11.2.1.8.2.1 2009.08-svn627 (Jan 22 2013 - 09:19:18) 248.5 KB NA 173 KB 2370.5 KB 8.5 KB 62934.5 KB
11.2.1.8 11.2.1.8.2.0_beta5.ius 11.2.1.8.2.1 2009.08-svn627 (Jan 22 2013 - 09:19:18) 248.5 KB NA 173 KB 2370.5 KB 4.5 KB 62934.5 KB
11.2.1.8 11.2.1.8.2.0.ius 11.2.1.8.2.0 2009.08-svn627 (Jan 22 2013 - 09:19:18) 248.5 KB 233 KB 173 KB 2369.5 KB 4.5 KB 64243.5 KB
11.2.1.8 11.2.1.8.2.1.ius 11.2.1.8.2.1 2009.08-svn627 (Jan 21 2013 - 23:02:21) 248.5 KB NA 173 KB 2369.5 KB 4.5 KB 63294 KB
11.2.1.8 11.2.1.8.2.2.ius 11.2.1.8.2.1 2009.08-svn627 (Jan 22 2013 - 09:19:18) 248.5 KB NA 173 KB 2369.5 KB 4.5 KB 63294 KB
[B]Sylvania 7" SYTABEX7[/B]
11.2.1.5 11.2.1.5.2.0_beta3_1.ius 11.2.1.5.2.1 2009.08-svn660 (Feb 25 2015 - 05:50:18) 246.5 KB NA 173 KB 2354.5 KB 4.5 KB 62933 KB
11.2.1.5 11.2.1.5_beta3_fina2.ius 11.2.1.5.2.0 2009.08-svn660 (Feb 25 2015 - 05:50:18) 246.5 KB 230.5 KB 173 KB NA 4.5 KB 62933 KB
11.2.1.5 11.2.1.5_beta3_final.ius 11.2.1.5.2.0 2009.08-svn660 (Feb 25 2015 - 05:50:18) 246.5 KB 230.5 KB 173 KB 2354.5 KB 4.5 KB 62933 KB
11.2.1.5 11.2.1.5.2.0_beta4.ius 11.2.1.5.2.0 2009.08-svn660 (Feb 25 2015 - 05:50:18) 246.5 KB 230.5 KB 173 KB 2354.5 KB 4.5 KB 54901.5 KB
11.2.1.5 11.2.1.5.2.0_beta5.ius 20.2.1.5.2.10 2009.08-svn660 (Feb 25 2015 - 05:50:18) 246.5 KB 230.5 KB 173 KB 2287.5 KB 4.5 KB 54620 KB
[B]Sylvania 7" SYNET7LP[/B]
11.2.0.5 system.bin 11.2.0.5.1.3 2009.08-svn466 (Nov 18 2010 - 13:17:30) 246.4 KB 2210 KB 166 KB 2393 KB 4.5 KB 51229.5 KB
11.2.0.6 11.2.0.6.2.0_beta3.ius 11.2.0.6.2.0 2009.08-svn660 (Feb 25 2015 - 05:47:47) 246 KB NA 173 KB 2376 KB 4.5 KB 62934.5 KB
11.2.0.7 11.2.0.7.2.0_beta3.ius 11.2.0.7.2.0 2009.08-svn661 (Mar 06 2015 - 05:33:51) 246 KB NA 173 KB 2375 KB 4.5 KB 62933 KB
[B]WowPad 8"[/B]
1.7.1.5 WWE08B_Android_2.1-0128.ius 1.7.1.5.1.1 2009.08-svn587 (Jan 05 2011 - 07:22:27) 253.5 KB 237.5 KB 159.5 KB 2613 KB 4.5 KB 72583.5 KB
[B]ICAN! 10 - 10" Tablet PC[/B]
1.6.1.5 ICANV2655.ius (Round button) 1.6.1.5.1.1 2009.08-svn672 (Mar 11 2011 - 06:40:06) 270.5 KB 239 KB 165 KB 2623 KB 4.5 KB 72338.5 KB
1.6.1.5 ICANV2005.ius (Square button) 1.6.1.5.1.1 2009.08-svn672 (Mar 11 2011 - 06:40:06) 271 KB 239 KB 165 KB 2623 KB 4.5 KB 72338.5 KB
[B]SuperPAD I 10" (WowPad, Gome Flytouch II), SuperPAD II[/B]
1.6.1.5 WWE10B_Android_2_2_V1_8_U0M_GT2005.ius 1.6.1.5.1.1 2009.08-svn672 (Mar 11 2011 - 06:40:06) 271 KB 239 KB 165 KB 2623 KB 4.5 KB 72338.5 KB
1.6.1.5 WWE10B_Android_2_2_V2_1_U0M_GT2005_flash.ius1.6.1.5.1.1 2009.08-svn672 (Mar 11 2011 - 06:40:06) 271 KB 239 KB 165 KB 2623 KB 4.5 KB 77366 KB
1.6.3.2 P011CZ_Android_2_2_V2_1_U0E_GT2005_flash.ius1.6.3.2.1.1 2009.08-svn676 (Mar 14 2011 - 09:26:47) 271 KB 239 KB 165 KB 2623 KB 4.5 KB 72263.5 KB
[B]Klu by Curtis International LT8025 8"[/B]
0.7.1.5 WWE08B_Android-2.1_0.7.1.5_v5full.ius 0.7.1.5.1.5 2009.08-svn587 (Jan 05 2011 - 07:22:27) 253.5 KB 237.5 KB 159.5 KB 0 KB 4.5 KB 71690 KB
0.7.3.1 -None identified
[B]SuperPAD I 10" (WowPad, Gome Flytouch II), SuperPAD II[/B]
0.6.1.5 WWE10B_Android_393477-v9full.ius 0.6.1.5.1.9 2009.08-svn587 (Jan 05 2011 - 07:20:58) 253.5 KB 237.5 KB 159.5 KB 2618 KB 4.5 KB 72143 KB
0.6.1.5 WWE10B_Android_2.1-HappyNewYear.ius 0.6.1.5.1.8 2009.08-svn559 (Dec 16 2010 - 11:31:51) 253.5 KB 237.5 KB 159.5 KB 2618.5 KB 4.5 KB 71285.5 KB
0.6.1.2 -None identified
0.6.3.2 -None identified
[B]Superpad i7[/B]
0.5.1.2 m701_4g_8188_256.ius 0.5.1.2.4.8 2009.08-svn24 (Sep 22 2022 - 02:21:13) 251.5 KB 251.5 KB 148.5 KB 2558 KB 8.5 KB 61251 KB Note: Also include RD_ (4815 KB) and ADR_NDISK (8.5 KB)
0.5.2.2 M701SA_0722_V2.1.ius 0.5.2.2.2.1 2009.08-svn735 (Jul 11 2015 - 05:03:28)
[B]AIRIS OnePAD 700 TAB700x[/B]
0.2.1.8 -[URL="http://translate.google.com/translate?js=n&prev=_t&hl=en&ie=UTF-8&layout=2&eotf=1&sl=auto&tl=en&u=http%3A%2F%2Fforo.airis.es%2Ft640-nueva-version-de-software-20-android-22-09-06-2011&act=url"]Embedded in disk image update file[/URL] 0.2.1.8.1.4 2009.08-svn716 (May 13 2011 - 07:15:50) 332.5 KB NA 167 KB 2352.5 KB 8.5 KB 59888.5 KB ADR_NDISK (8.5 KB)
NA - Not Applicable, not included in update file
[/FONT]
Most of the files above are Android 2.2 "Froyo", however some Android 2.1update1 files are the only ones identified for a specific Hardware ID.
These are infoTMIC supplied updates as directed by the distributor, so not all devices have not been updated.
Query the update server to see if an update link is returned. If the server is "offline" or no update is posted a "1" is returned.
Many of the Hardware ID's "hwver" included below do NOT exist but were made up using the sequence of known "hwver" in order to search for previously unknown files.
As of June 24, 2011
Code:
[B]hwver =concatenate("http://222.73.93.45/sysup.php?data=",A2,"&vcode=0") Version | Update file link[/B]
32.9.0.1 [URL]http://222.73.93.45/sysup.php?data=32.9.0.1&vcode=0[/URL] 11|[url]http://222.73.93.45/update/32.9.0.1/P8088A_Android_v11_2.2.ius[/url]
32.8.0.1 [URL]http://222.73.93.45/sysup.php?data=32.8.0.1&vcode=0[/URL] 8|[url]http://222.73.93.45/update/32.8.0.1/P8088_Android_8.ius[/url]
13.4.0.1 [URL]http://222.73.93.45/sysup.php?data=13.4.0.1&vcode=0[/URL] 16|[url]http://222.73.93.45/update/13.4.0.1/I10Y_Android_17.ius[/url]
13.5.0.1 [URL]http://222.73.93.45/sysup.php?data=13.5.0.1&vcode=0[/URL] 10|[url]http://222.73.93.45/update/13.5.0.1/I7Y_Android_10.ius[/url]
12.2.0.5 [URL]http://222.73.93.45/sysup.php?data=12.2.0.5&vcode=0[/URL] 1|[url]http://222.73.93.45/update/12.2.0.5/disgo_12.2.0.5.1.4.ius[/url]
12.2.0.6 [URL]http://222.73.93.45/sysup.php?data=12.2.0.6&vcode=0[/URL] 1
12.2.0.7 [URL]http://222.73.93.45/sysup.php?data=12.2.0.7&vcode=0[/URL] 1
12.2.1.2 [URL]http://222.73.93.45/sysup.php?data=12.2.1.2&vcode=0[/URL] 1
12.2.1.5 [URL]http://222.73.93.45/sysup.php?data=12.2.1.5&vcode=0[/URL] 1
12.2.1.8 [URL]http://222.73.93.45/sysup.php?data=12.2.1.8&vcode=0[/URL] 1
12.2.3.1 [URL]http://222.73.93.45/sysup.php?data=12.2.3.1&vcode=0[/URL] 1
11.6.3.2 [URL]http://222.73.93.45/sysup.php?data=11.6.3.2&vcode=0[/URL] 1
11.6.3.1 [URL]http://222.73.93.45/sysup.php?data=11.6.3.1&vcode=0[/URL] 11|[url]http://222.73.93.45/update/11.6.3.1/11.6.3.1.2.0_beta4_0523.ius[/url]
11.6.1.8 [URL]http://222.73.93.45/sysup.php?data=11.6.1.8&vcode=0[/URL] 1
11.6.1.5 [URL]http://222.73.93.45/sysup.php?data=11.6.1.5&vcode=0[/URL] 1
11.6.1.2 [URL]http://222.73.93.45/sysup.php?data=11.6.1.2&vcode=0[/URL] 1
11.2.3.2 [URL]http://222.73.93.45/sysup.php?data=11.2.3.2&vcode=0[/URL] 1
11.2.3.1 [URL]http://222.73.93.45/sysup.php?data=11.2.3.1&vcode=0[/URL] 1|[url]http://222.73.93.45/update/11.2.3.1/7901UC_11.2.3.1.2.0_beta3.ius[/url]
11.2.1.8 [URL]http://222.73.93.45/sysup.php?data=11.2.1.8&vcode=0[/URL] 1
11.2.1.5 [URL]http://222.73.93.45/sysup.php?data=11.2.1.5&vcode=0[/URL] 1
11.2.1.2 [URL]http://222.73.93.45/sysup.php?data=11.2.1.2&vcode=0[/URL] 1
11.2.0.7 [URL]http://222.73.93.45/sysup.php?data=11.2.0.7&vcode=0[/URL] 12|[url]http://222.73.93.45/update/11.2.0.7/11.2.0.7.2.0_beta3.ius[/url]
11.2.0.6 [URL]http://222.73.93.45/sysup.php?data=11.2.0.6&vcode=0[/URL] 12|[url]http://222.73.93.45/update/11.2.0.6/11.2.0.6.2.0_beta3.ius[/url]
11.2.0.5 [URL]http://222.73.93.45/sysup.php?data=11.2.0.5&vcode=0[/URL] 1
1.7.3.2 [URL]http://222.73.93.45/sysup.php?data=1.7.3.2&vcode=0[/URL] 1
1.7.3.1 [URL]http://222.73.93.45/sysup.php?data=1.7.3.1&vcode=0[/URL] 1
1.7.1.8 [URL]http://222.73.93.45/sysup.php?data=1.7.1.8&vcode=0[/URL] 1
1.7.1.5 [URL]http://222.73.93.45/sysup.php?data=1.7.1.5&vcode=0[/URL] 1
1.7.1.2 [URL]http://222.73.93.45/sysup.php?data=1.7.1.2&vcode=0[/URL] 1
1.7.0.7 [URL]http://222.73.93.45/sysup.php?data=1.7.0.7&vcode=0[/URL] 1
1.7.0.6 [URL]http://222.73.93.45/sysup.php?data=1.7.0.6&vcode=0[/URL] 1
1.7.0.5 [URL]http://222.73.93.45/sysup.php?data=1.7.0.5&vcode=0[/URL] 1
1.6.3.2 [URL]http://222.73.93.45/sysup.php?data=1.6.3.2&vcode=0[/URL] 1
1.6.3.1 [URL]http://222.73.93.45/sysup.php?data=1.6.3.1&vcode=0[/URL] 1
1.6.1.8 [URL]http://222.73.93.45/sysup.php?data=1.6.1.8&vcode=0[/URL] 1
1.6.1.5 [URL]http://222.73.93.45/sysup.php?data=1.6.1.5&vcode=0[/URL] 1
1.6.1.2 [URL]http://222.73.93.45/sysup.php?data=1.6.1.2&vcode=0[/URL] 1
1.6.0.7 [URL]http://222.73.93.45/sysup.php?data=1.6.0.7&vcode=0[/URL] 1
1.6.0.6 [URL]http://222.73.93.45/sysup.php?data=1.6.0.6&vcode=0[/URL] 1
1.6.0.5 [URL]http://222.73.93.45/sysup.php?data=1.6.0.5&vcode=0[/URL] 1
0.7.3.2 [URL]http://222.73.93.45/sysup.php?data=0.7.3.2&vcode=0[/URL] 1
0.7.3.1 [URL]http://222.73.93.45/sysup.php?data=0.7.3.1&vcode=0[/URL] 1
0.7.1.8 [URL]http://222.73.93.45/sysup.php?data=0.7.1.8&vcode=0[/URL] 1
0.7.1.5 [URL]http://222.73.93.45/sysup.php?data=0.7.1.5&vcode=0[/URL] 5|[url]http://222.73.93.45/update/0.7.1.5/WWE08B_Android-2.1_0.7.1.5_v5full.ius[/url]
0.7.1.2 [URL]http://222.73.93.45/sysup.php?data=0.7.1.2&vcode=0[/URL] 1
0.7.0.7 [URL]http://222.73.93.45/sysup.php?data=0.7.0.7&vcode=0[/URL] 1
0.7.0.6 [URL]http://222.73.93.45/sysup.php?data=0.7.0.6&vcode=0[/URL] 1
0.7.0.5 [URL]http://222.73.93.45/sysup.php?data=0.7.0.5&vcode=0[/URL] 1
0.6.3.2 [URL]http://222.73.93.45/sysup.php?data=0.6.3.2&vcode=0[/URL] 1
0.6.3.1 [URL]http://222.73.93.45/sysup.php?data=0.6.3.1&vcode=0[/URL] 1
0.6.1.8 [URL]http://222.73.93.45/sysup.php?data=0.6.1.8&vcode=0[/URL] 1
0.6.1.5 [URL]http://222.73.93.45/sysup.php?data=0.6.1.5&vcode=0[/URL] 8|[url]http://222.73.93.45/update/0.6.1.5/WWE10B_Android_2.1-HappyNewYear.ius[/url]
0.6.1.2 [URL]http://222.73.93.45/sysup.php?data=0.6.1.2&vcode=0[/URL] 1
0.6.0.7 [URL]http://222.73.93.45/sysup.php?data=0.6.0.7&vcode=0[/URL] 1
0.6.0.6 [URL]http://222.73.93.45/sysup.php?data=0.6.0.6&vcode=0[/URL] 1
0.6.0.5 [URL]http://222.73.93.45/sysup.php?data=0.6.0.5&vcode=0[/URL] 1
If no update link was returned using the GET command above, and since it is not possible to browse the update server directories, one way to find an update is to try different variations of known update files names and apply them to another hwver.
Many but not all of the links to the update files all follow the same pattern. It would be nice if they would all use the same naming nomenclature.
"http : //222.73.93.45/update/" + the results from /proc/cmdline where hwver=##.#.#.# + "/" and the file name *.ius.
By concatenating the various parts together using different hwver and update file names, it will produce a link like the EXAMPLE below where the hwver is 11.2.1.8 and using the structure of the file names above.
Code:
[B]http://222.73.93.45/update/[/B] [COLOR="Blue"][B]11.2.1.8[/B][/COLOR] [B][COLOR="Black"]/[/COLOR][/B] [COLOR="Blue"][B]11.2.1.8[/B][/COLOR] [B].2.0_beta5.ius[/B]
http://222.73.93.45/update/11.2.1.8/11.2.1.8.2.0_beta5.ius
As this was a previously unknown update file, it can now be downloaded and evaluated.
The exception to this approach are the following, however there seems to be some attempt at similar file naming.
Information on the methods the utilize these updates files and how to split them into their various images for inspection exist in other posts.
Please post any omissions/corrections/additions.
InfoTM Update Wrap tools
IUW Version 1.2
Attached is Version 1.2 of the InfoTM Update Wrap tools.
This utility is used to burn updates to various infoTMIC powered tablets.
The utility has a "Boot Disk" option which creates a bootable microSD card to update the tablet directly from the infoTM Update Wrap file (*.ius).
The utility also has a "Link USB" option which allows the tablet to be connected to a PC through the tablet's OTG port using a USB 2.0 Male to Mini Cable.
The USB Mode: has two (2) methods: Easy burn or Expert Burn.
Easy burn - Utilizes the infoTM Update Wrap file (*.ius)
Expert burn - Allows for the selection of the various parts of the firmware
Note: For detailed information on the multi-part update wrap file see stragulus's tutorial on how to extract images from the *.ius files.
The corresponding files are:
UBOOT: u-boot.img
U0: u-boot-nand.bin
KERNEL: uImage (OR uimg.xxxx)
SYSTEM: system.img
USER: userdata.img
RAMDISK: ramdisk.img
RECVRD: recovery_rd.img
SYSBACK: zSYS.img
The configuration files included with this version of the update tools provide insight to the naming nomenclature of the "FileNum:" (Firmware Version) above.
config_company.ini
Code:
None,0
InfoTM,1
Sawee,2
sylvania,11
Disgo,12
config_board.ini
Code:
Dev-board,0,0,1
P7901A,2,0,1
P7901B,2,0,2
P7901C,2,0,3
P7901D,2,0,4
P7901E,2,0,5
P7901UH,2,0,6
P7901UJ,2,0,7
P7901UI,2,1,8
P0702A,3,0,1
P0702B,3,0,2
I7Y,4,0,1
I10Y,5,0,1
WWE10A,6,0,1
WWE10B,6,1,2
WWE10C,6,1,3
WWE10D,6,1,4
WWE08A,7,0,1
WWE08B,7,1,2
WWE08C,7,1,3
It is now obvious how the various Hardware ID's "hwver" are derived based on Company and config_board.
Instructions on how to use the "InfoTM Update Wrap tools" utility have been copied directly from "Introduction of IUW burning-20110118.docx" which was included in a various previous update file (*.ius) archives and posted here - Introduction of IUW Burning Tools
Please post any corrections/additions/omissions.
Credits - http://www.apad.tv/apadforum/showth...amp-Tools-Download&p=5777&viewfull=1#post5777
Ius Editor
androidtablets.net Member vio has released an application "Ius Editor" that extracts images from InfoTM Update Wrap (*.ius) multi-part update files.
Some of the images still require manual removal of the uImage header, uncompressing, and unyaffs but additional functionality is planned. See post #71 in Custom Sylvania ROM development for detail and download.
Ius Editor
An updated version of the InfoTM Update Wrap (.ius) editor application IusEdit_0.03 has been posted by vio at androidtablets.net with the following description.
It allows adding and removing for images as well as saving the modified IUS file. You can also edit version info, magic number and checksum value. I had little time to test it, but it is at least consistent with itself - I have exported the "system" image, removed the image from IUS file, saved it, then added the image from the previously created "system.img" and the final file was binary identical with the original one.
PLEASE USE WITH CARE! I don't have a solution for computing the checksum bytes, as noted above, so the resulting IUS file might be deemed incorrect by the flashing application. Also, please note that I don't have too much validation code added, so you could technically create a IUS file containing 2 "U0" images, or some other invalid configuration. Try to avoid any "exotic" configurations if you decide to try to use it.
Click to expand...
Click to collapse
Update IusEdit_0.04
I've updated the editor with the new image types found by cfrockit (thanks). Plus, added the option to change the order of the images inside the file (it might be important) and a quick sort button that arrange images by type.
I also added a protection when adding images, so it is no longer possible to add more images of the same type.
In regards with checksum bytes, still no progress. I've run multiple algorithms (including a few CRC32 implementations) over both the header and the image part of the file, but the results are not close to the expected values.
The visual inspection of the "U0" image suggests that there is indeed a "header crc" and a "data crc", but so far I couldn't break the code.
Click to expand...
Click to collapse
Good news. Maybe this simplify firmware for users.
Hi! I just bought an superpad (1ghz, 256MB Ram...) On startup, bottom right it shows 0.6.3.2 (677). I tried to flash froyo with an SD card and I ended with a brick in my hands. Can anybody help me?
ezequias1012 said:
Hi! I just bought an superpad (1ghz, 256MB Ram...) On startup, bottom right it shows 0.6.3.2 (677). I tried to flash froyo with an SD card and I ended with a brick in my hands. Can anybody help me?
Click to expand...
Click to collapse
ezequias, 0.6.3.2 is a previously unknown Hardware ID "hwver" as well as the 677 version of U0 u-boot-nand.bin.
The update server doesn't provide a current upgrade file link and randomly searching various known file names didn't provide any results.
In the recently discovered IUW Version 1.2 InfoTM Update Wrap tools one of the "initialization" .ini files strings references "WWE8 down from FTP" however, we're not aware of an infoTMIC FTP update file server yet.
I have updated the Original Post (OP) to include this Hardware ID "hwver".
cfrockit said:
ezequias, 0.6.3.2 is a previously unknown Hardware ID "hwver" as well as the 677 version of U0 u-boot-nand.bin.
The update server doesn't provide a current upgrade file link and randomly searching various known file names didn't provide any results.
In the recently discovered IUW Version 1.2 InfoTM Update Wrap tools one of the "initialization" .ini files strings references "WWE8 down from FTP" however, we're not aware of an infoTMIC FTP update file server yet.
I have updated the Original Post (OP) to include this Hardware ID "hwver".
Click to expand...
Click to collapse
Well, is it a brick then? Good for garbage?
Updated Original Post (OP)
Updated Original Post (OP) to include two recently identified InfoTM Update Wrap files.
11.2.1.5.2.0_beta5.ius
11.2.1.8.2.0_beta5.ius
Caution: Use this information at your own risk. It is being provided by users of the device NOT the manufacturer/distributor.
Warning: Confirm the tablets Hardware ID "hwver" as described to ensure you have the appropriate file before updating.
Note: The incorrect update file (*.ius) CANNOT / SHOULD NOT be burned to the device. If you can't determine the "hwver" attempting to burn with an incorrect update file may / will brick the tablet.
Updated Original Post (OP) to add AIRIS OnePAD 700 7" TAB700x iMAPx210 support Spain
Updated Original Post (OP) to include Version 2.0 update file information for AIRIS ONEP 700 based on Android 2.2, provided by the supplier AIRIS.
AIRIS OnePAD 700 7" iMAPx210 supported in Spain
Model: TAB700x
Hardware ID "hwver" 0.2.1.8
The update is applied using an older method requiring a WinImage disk image, however the disk image includes a complete InfoTM Update Wrap (.ius) file.
Caution: Use of this update on other tablets may cause irreparable damage (brick) to the device.
Thanks a lot for this thread.
Updated Original Post (OP) to add I7Y & I10Y
Updated Original Post (OP) to include I7Y & I10Y file information however, the Hardware ID "hwver" and FileNum of the InfoTMIC Update Wrap (.ius) conflict.
Credit Android0x7 @androidtablets.net
The I7Y was described as 7" tablet while it displays version of I10Y 10" tablet.
One update file does not contain a U0 image therefore, it may not matter.
I10Y_Android_17.ius (ROM Name : s01-eng 2.1-update1 ERE27 eng.liuqi.20101224.110921 test-keys)
Wrap Information:
Code:
Company: None
Board: I10Y
FileNum: 0.5.0.1.0.3
Size: 72MB
Image List:
U0 (232 KB)
UBOOT (216 KB)
RD (159 KB)
LK (2394 KB)
ADD_USER (4.5 KB)
ADD_AS (70731.5 KB)
I7Y_Android_10.ius
Wrap Information:
Code:
Company: None
Board: I7Y
FileNum: 0.4.0.1.0.3
Size: 70MB
Image List:
RD (159.5 KB)
LK (2394 KB)
ADD_USER (4.5 KB)
ADD_AS (69249.5 KB)
Caution: Use of thess update file on other tablets may cause irreparable damage (brick) to the device.
Typically with infotm(ic) devices as long as you don't touch U0 you can't brick. On this note, I might add, if you use the ius editor, extract an ius, then use iuw to burn everything EXCEPT u0 you actually have a decent chance of booting into that system. If it has the same drivers, it might even work perfectly. Since the sytabex7 is fully compatible with images crafted for other infotm(ic) devices the only obvious difference is U0 and its hardware config.
cfrockit, I have a write-up I'm sure you'd love over on androidtablets in my developer sub-forum.
Added Sylvania SYTABBL7/SYTABBL7-0608/SYTABEX7-2, SYTAB7MX, SYTAB10ST
Updated Original Post (OP) to add three (3) Sylvania tablets - SYTABBL7/SYTABBL7-0608/SYTABEX7-2, SYTAB7MX, SYTAB10ST
Also, updated warning regarding burning incorrect InfoTMIC Update Wrap (.ius) to specifically identify the U0 "u-boot-nand.bin" image as the most likely cause of bricking the tablet. Using more advanced techniques and utilities it is possible to burn individual images avoiding burning all images files as is done using the .ius file.
SYTABBL7/SYTABBL7-0608/SYTABEX7-2 Hardware Id "hwver" 11.2.3.1
Note: v1 & v2 are identical. Update server coded as persist.sys.server=dg-support2a.com in the build.prop for the GET command to obtain updates.
P7901UC_131841_v1.ius
P7901UC_131841_v2.ius
Wrap Information:
Code:
Company: sylvania
Board: error
FileNum: 11.2.3.1.1.1
Size 63 MB
Image List:
U0 (259 K) U-Boot 2009.08 ( 9 0xe6 0x9c 0x88 06 2011 - 10:07:12)
RD (174.5 KB)
LK (2369.5 KB)
ADR_USER (8.5 KB)
ADR_AS (61821 KB)
SYTAB7MX Hardware Id "hwver" 11.2.7.4
Note: Includes RD_ (4778.5 KB) updater.img. Update server coded as persist.sys.server=dg-support2a.com in the build.prop for the GET command to obtain updates.
SYTAB7MX_Android_132868.ius
Wrap Information:
Code:
Company: sylvania
Board: error
FileNum: 11.2.7.4.7.4
Size 66 MB
Image List:
U0 (257 K) 2009.08-svn (10<bh:e6><bh:9c><bh:88> 24 2011 - 11:10:21)
RD (178.5 KB)
RD_ (4778.5 KB)
LK (2392.5 KB)
ADR_USER (8.5 KB)
ADR_AS (60365 KB)
SYTAB10ST Hardware Id "hwver" 11.6.8.2
Note: File name is inconsistent with tablet hardware. Update server coded as persist.sys.server=dg-support2a.com in the build.prop for the GET command to obtain updates.
SYTABEX7-2_Android_395266.ius
Wrap Information:
Code:
Company: sylvania
Board: error
FileNum: 11.6.8.2.21.1
Size 65 MB
Image List:
RD (170 KB)
RD_ (4477 KB)
LK (2347 KB)
ADR_AS (59742.5 KB)
Added " FlyTouch V2.7" & Superpad i7
Updating to add InfoTMIC Update Wrap (.ius) file information for " FlyTouch V2.7" Hardware Id "hwver" 14.6.1.5 & Superpad i7 Hardware Id "hwver" 0.5.2.2
" FlyTouch V2.7" Hardware Id "hwver" 14.6.1.5 - wwe10_Android_v4.ius
Wrap Information:
Code:
Company: None
Board: error
FileNum: 14.6.1.5.1.4
Size 83 MB
Image List:
U0 (264.5 K) U-Boot 2009.08-dirty ( 9 e6 9c 88 23 2011 - 17:26:34)
RD (184 KB)
LK (2385.5 KB)
ADR_USER (4.5 KB)
ADR_AS (82566.5 KB)
Superpad i7 Hardware Id "hwver" 0.5.2.2 - M701SA_0722_V2.1.ius
Wrap Information:
Code:
Company: None
Board: error
FileNum: 0.5.2.2.2.1
Size 72 MB
Image List:
U0 (258.5 K) U-Boot 2009.08-svn735 (Jul 11 2015 - 05:03:28)
RD (191 KB)
RD_ (4779 KB)
LK (2346 KB)
ADR_USER (8.5 KB)
ADR_NDISK (8.5 KB)
ADR_AS (66767 KB)
Good thread..
heavy reading for the average joe..
but I get the idea..
Alright for the life of me I can't figure out the address for the SYTAB7mx ius. Could anyone please provide the link as the instructions to obtain the actual ius is VERY confusing... I've tried for several hours and can't figure this out and there's clearly one available from the posts or could someone post a dropbox link to one??
I've posted tools for packing/unpacking .ius files @ http://github.com/Ithamar/iusutils, I hope this will be useful for someone else besides myself. The ius.h header file contains all the nitty-gritty details of the .ius file format.
Superpad i7
Can i flash any of the firmwares posted making sure i extract the images and NOT flash the U0?
I have M701SA firmware on my Superpad i7, but i'd like to try other firmwares to improve performance, but i don't want to brick the device.
Thanks in advance
releaser said:
Can i flash any of the firmwares posted making sure i extract the images and NOT flash the U0?
I have M701SA firmware on my Superpad i7, but i'd like to try other firmwares to improve performance, but i don't want to brick the device.
Thanks in advance
Click to expand...
Click to collapse
Same for me, Can I, somehow, improve performance of my Superpad i7 (Who doesn't have anything SUPER at all )
It's almost impossible to find any kinda of firmeware/rom for this device. At least, 4 me..
Related
This is a "new/beta" Froyo infoTMIC Update Wrap (IUW) for the Sylvania SYTAB10MT 10-Inch Magni Tablet also reported as a SYNET10LP.
The multi-part update file contains an IUW header, U0 - u-boot-nand.bin, RD - RAMDISK, LK - KERNEL, ADR-USER - UserData, and ADR-AS - system.img.
The Wrap Information details can be viewed for each *.ius using the IUW Version 1.2 InfoTM Update Wrap tools.
Wrap Information:
Code:
Company: sylvania
Board: error
FileNum: 11.6.3.1.2.0
Size: 58 MB
Image List:
U0 (270 KB)
RD (195.5 KB)
LK (2617.5 KB)
ADD_USER (8.5 KB)
ADD_AS (56392.5 KB)
U0 "u-boot-nand.bin" - 2009.08-svn678 (Mar 14 2015 - 09:59:41)
The update server can be manually queried for update files using the method described in this post infoTMIC Hardware ID's "hwver" and updates (*.ius)
Code:
http://222.73.93.45/sysup.php?data=11.6.3.1&vcode=0
Returns the following link -
11|http://222.73.93.45/update/11.6.3.1/11.6.3.1.2.0_beta4_0523.ius
The digits "11" preceding the the update server url link are assumed to be the current Version "ro.versioncode" noted in the build.prop.
While no link to an update file is provided for hwver=11.6.1.5, the links to the update files all follow the same pattern when you concatenate the various parts together.
"http : //222.73.93.45/update/" + the results from /proc/cmdline where hwver=##.#.#.# + "/" and the file name *.ius.
This results is something like this where hwver=11.6.1.5
http://222.73.93.45/update/11.6.1.5/11.6.1.5.2.0_beta4_0523.ius
Wrap Information:
Code:
Company: sylvania
Board: error
FileNum: 11.6.1.5.2.0
Size: 58 MB
Image List:
U0 (270.5 KB)
RD (195.5 KB)
LK (2617.5 KB)
ADD_USER (4.5 KB)
ADD_AS (56456.5 KB)
Caution: Using these files to update anything other than the corresponding "hwver" (11.6.3.1 or 11.6.1.5) may brick the tablet.
Instructions on how to use the "InfoTM Update Wrap tools" utility have been copied directly from "Introduction of IUW burning-20110118.docx" which was included in a various previous update file (*.ius) archives and posted here - Introduction of IUW Burning Tools
Update: system.img CAN be unpacked
Based in part from stragulus's method to extract images from the *.ius files androidtablets.net Member vio has released an application "Ius Editor" that extracts images from InfoTM Update Wrap (*.ius) multi-part update files. Some of the images still require manual removal of the uImage header, uncompressing, and unyaffs but additional functionality is planned. See post #71 in Custom Sylvania ROM development for detail and download.
Selected output of Settings.apk > DeviceInfoSettings.smali using android-apktool - A tool for reengineering Android apk files
Code:
.line 63
const-string v9, "firmware_version"
const-string v10, "[B]DG2.2.1-10a1[/B]"
invoke-direct {p0, v9, v10}, Lcom/android/settings/DeviceInfoSettings;->setStringSummary(Ljava/lang/String;Ljava/lang/String;)V
.line 65
const-string v9, "device_model"
const-string v10, "[B]SYTAB10MT[/B]"
I just wanted to get a discussion going about the transform since i've been searching and haven't been able to find another. So feel free to post anything you think people should know about the Samsung Transform. Oh and please ask questions too!
Sent from my SPH-M920 using xda premium
I guess I'll start by asking does any other transform user have problems with their phone like...
1. Very short battery time?
2. Incredibly slow performance?
3. Bad quality front facing camera?
4. Not being able to use the front camera as a webcam? (Skype, Tango, ooVoo)
5. Low range of compatible apps and games?
These are just a few of the problems with my samsung transform. I want to hear from you guys to see if you have any problems or questions. (I'm no expert but i'd like to try to help.
Sent from my SPH-M920 using xda premium
Sdx-developers.com
Sent from my HTC Glacier using Tapatalk
I suffered long and hard under the m920 and lemme tell ya it was bad enough to send me to T-Mobile. And cancel my contract mid year. Anyway xda doesn't have a forum for that phone nor will they due to its low level specs and God awful nature but sdx has a great group for the device. Good luck from a former victim!
Sent from my HTC Glacier using Tapatalk
Thanks i'll check it out
Sent from my SPH-M920 using xda premium
Rooting Transform M920 EB28 Sprint/CDMA
Rooting of Samsung Transform M920 (EB28 Sprint/CDMA 2.2.2 Froyo), by using below tool, was very easy:
"Intercept Root" (V1-35)
https://code.google.com/p/intercept-root/
SHA1 Checksum: 17b7c66cbf5ecb18cdab6890063e903db6091150, Filesize: 7,095,583 bytes (7.1 MB on disk).
or get from here
I previously tried SOC (SuperOneClick), Framaroot, Z4root, etc, but none of them worked, in above mentioned phone.
Anyone still has a working LINK to a CM7 ROM for Transform ? and a working link to a CWM Recovery for Transform ? then, please help+share :highfive:
Transform (M920), and Transform Ultra (M930), are two different phone.
Thanks in advance
ROM files for Transform M920
The [SIZE="+1"]Samsung Transform M920[/SIZE] Sprint/CDMA phone, initially was released in Oct-2010 with Android 2.1 Eclair (firmware: M920.06 Eclair.DI11), then Sprint in Mar-2011 OTA-updated their M920 subscribers into Android 2.2.2 Froyo (firmware M920.06 EB28), then M920 was again OTA updated in July-2011 into Android 2.2.? (firmware: M920.06 EF09). EB28 was a stable update, but EF09 caused problems for some M920 phones.
More info: https://en.wikipedia.org/wiki/Samsung_Transform
http://www.samsung.com/us/mobile/cell-phones/SPH-M920ZKASPR-specs
http://www.gsmarena.com/samsung_m920_transform-3581.php
I was able to locate back these below files, in one of my older MacBook OS X computer. When i got the M920 phone, then i or my brother or my friend downloaded them, we were attempting to update it with newer or better Android or CM OS, but lack of Mac OS X compatible proper drivers & related tools, caused our attempts to fail, and these files remained there. But when we attempted again, we found out, source webpages on source website SDX-Developers.com servers are now (Dec-2015) empty/down! So i'm sharing these with others, these should+might be helpful:
Some [SIZE="+1"]ROM[/SIZE] updates require an existing stock/build (initial build at initial released-time), some ROM updates required a Froyo.EB28 build, and some ROM updates required EF09 build.
In below:
"sdx" means = it was obtained from sdx-developers.com forum webpages, and the previous word before "_sdx", is the username in that website.
"xda" = it was obtained from xda-developers.com webpages.
http://www.mediafire.com/download/br9gs8w90iwhbmi/
cm-7-20120701-UNOFFICIAL-transform-wGApps_Andro-2.3.7_rel-Jul-1-2012_rom_by_qnhoang81_(wwjoshdew_sdx).zip
SHA1 checksum: eff7286f9da8c6702d2233230377db1825e9a6f4.
Size: 86,881,680 bytes (86.9 MB on disk).
http://www.mediafire.com/download/1kv818wijtw56ao/
CM7-270_(unofc-CM7_tranform)_rom_(xbooow59_sdx).zip
SHA1 checksum: 026eb4ecbc535a7d0adb8759f2464b43584ce958.
Size: 72,959,078 bytes (73 MB on disk).
http://www.mediafire.com/download/xbb3o8gyclm7cm0/
CM9-122_rel-Mar-26-2012_rom_(by_qnhoang81_sdx).zip
SHA1 checksum: 32cd4563bbd37c5c2da18b3b9df2c494f336116f.
Size: 83,155,515 bytes (83.2 MB on disk).
http://www.mediafire.com/download/bb300verjsr9j7n/
CM9-122_rel-Mar-26-2012_GAPPS-ics-20120317-signed_edited_Transform_(by_qnhoang81).zip
SHA1 checksum: f3173b7adfdfc15b58d5ba3a30bf4c8a561a80f7.
Size: 22,270,968 bytes (22.3 MB on disk).
http://www.mediafire.com/download/4n0g308t5062j5h/
SpeedM7.1-V1.1_(CM7-Speedier_Andro_2.3.7_Transform)_rel-Sep-19-2012_rom_(by_xbooow59_sdx).zip
SHA1 checksum: 1da667e0e719dbbb59b5b75f4f6d81de85a85f35.
Size: 73,818,117 bytes (73.8 MB on disk).
http://www.mediafire.com/download/da1rckuf223n4wg/
TransGingerOnCrack_EF09-2.2.2_(1.3.5_Vampirefo)-SDX_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 32c525fe17d51f0ab90c282de4b2ff33bbaf495e.
Size: 63,826,308 bytes (63.8 MB on disk).
http://www.mediafire.com/download/tunoa1nsb55lz8r/
Andro_2.2.2_EB28_stock_froyo_rom_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: d6cf0135d50f449a0ab93e245ad4add131a3374b.
Size: 74,149,790 bytes (74.2 MB on disk).
http://www.mediafire.com/download/q328rrc7pt5jhjy/
Andro_EF09_Stock_Rom_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 0605e1a4d15b83b1cd398397de33a21d8c531b4f.
Size: 70,085,916 bytes (70.1 MB on disk).
If anyone else posts further related items, i will post here & add a link here to that post.
Recovery Tools for Transform M920
Recovery Tools for Transform M920:
http://www.mediafire.com/download/pjbmfwernp4ty6r/
CWM_transform_EB28-EF09_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 8ed722eb9151fff5301a32f845d89e84eefc6421.
Size: 5,445,520 bytes (5.5 MB on disk).
http://www.mediafire.com/download/yt3l0clm1qwhohy/
Odin_v3.07_v3.06_v3.04_v1.85_v1.83.zip
SHA1 checksum: 3ff4297890ca7392d6da3bc509aec0753d7b7842.
Size: 1,749,547 bytes (1.8 MB on disk).
http://www.mediafire.com/download/7mdj2r4llb1atp4/
SPH-M920_vampirefo_ext_Recovery_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 00060345b7b1ba78268c54fb76add95fa0591781.
Size: 6,133,326 bytes (6.1 MB on disk).
http://www.mediafire.com/download/1m5l64gd0bdpka1/
SPH-M920_vampirefo_RFS_Recovery_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 8ad0cae4833d6554b6f096ca0c47e0287ac3305e.
Size: 5,984,112 bytes (6 MB on disk).
http://www.mediafire.com/download/bxoh5fbxjcbj6a9/
recovery_(Froyo_Transform)_(vampirefo_sdx).rfs
SHA1 checksum: 46e6581fa06009e491cc91000a73b0fc0ff90546.
Size: 6,395,792 bytes (6.4 MB on disk).
Drivers, ADB, Fastboot, Rom Update Utilities for Transform M920
Drivers, ADB, Fastboot, Rom Update Utilities for Transform M920:
Windows platform/os:
http://www.mediafire.com/download/s7vc5295ncsm291/
SAMSUNG_USB_Driver_for_Mobile_Phones_1.5.27.0_(Droid_Dustin_xda_zippyshare).zip
SHA1 checksum: 5650076fc99bfb55f2957ee8425fe13fcb13a0a8.
Size: 8,344,834 bytes (8.4 MB on disk).
http://www.mediafire.com/download/hc99a61491no149/
Samsung_USB_Driver_for_Mobile_Phones_v1.5.14.0_Win-Xp-V-7-8.exe
SHA1 checksum: 3f3d710db181cb655c8ba17275a298228960aac0.
Size: 24,178,176 bytes (24.2 MB on disk).
http://www.mediafire.com/download/sqg4abv723567mh/
SAMSUNG_USB_Driver_for_Mobile_Phones_v1.5.25.0-retail_official_(srinivasmv419_xda).exe
SHA1 checksum: 4f32a42c730184e15f023892fac0fc9670c4a4db.
Size: 15,364,480 bytes (15.4 MB on disk).
http://www.mediafire.com/download/r8zln40ox7jgcj4/
M920-Transform_ADB_Drivers_(AquilaChill_sdx).zip
SHA1 checksum: cae8f06892ad88444801f7f50d34785880b0b5ca.
Size: 3,886,289 bytes (3.9 MB on disk).
http://www.mediafire.com/download/3v5ngmsfihccr6t/
ADB_Fastboot_13-03-2013.zip
SHA1 checksum: 6473957c884775e1371ce04070de9a0e8e42b83e.
Size: 538,460 bytes (541 KB on disk).
http://www.mediafire.com/download/i0m2wav23oo565k/
Universal_Naked_Driver_0.73_(adb).zip
SHA1 checksum: ce1c6a8e8052c2638560767ae5a3574e4b1f3edc.
Size: 8,683,455 bytes (8.7 MB on disk).
http://www.mediafire.com/download/m256hfve5bqxa85/
UniversalAdbDriverSetup.msi
SHA1 checksum: 745bb99063748a2f309888467aac70c3c7ef6a2e.
Size: 17,060,864 bytes (17.1 MB on disk).
http://www.mediafire.com/download/5scfqfsfiaxa63w/
FastbootCommanderV.1.51.zip
SHA1 checksum: 9cb12ae39b38a154425e90214877f7fc8388a50c.
Size: 357,339 bytes (360 KB on disk).
http://www.mediafire.com/download/ph2nxd22mf4o5mx/
heimdall-suite-1.4.0-win32_JOdin.zip
SHA1 checksum: 87ba63c9917fe50b5c1d4305585ff65213e99ad5.
Size: 10,013,808 bytes (10 MB on disk).
http://www.mediafire.com/download/141twbr9x0dxare/
JOdin3CASUAL-r1035-dist.jar (for any platform/os with Java SE SDK).
SHA1 checksum: d6e331eecc3e149e779b888dedd59c4258c5cbf1.
Size: 19,747,175 bytes (19.8 MB on disk).
http://www.mediafire.com/download/u7nsns0ch1se69f/
libusb-win32-bin-1.2.6.0.zip
SHA1 checksum: e1362d9ba4a9c9b30394691e7acdee05631fd54e.
Size: 913,186 bytes (913 KB on disk).
http://www.mediafire.com/download/joaq4oji7r8a5bu/
msvcp110.dll
SHA1 checksum: 557b67e372e85eb39989cb53cffd3ef1adabb9fe.
Size: 535,008 bytes (537 KB on disk).
http://www.mediafire.com/download/qq8kcfkvk4b79jw/
Visual_C++_Redist_for_VS2012Upd4_en-au_vcredist_x64.exe
SHA1 checksum: 1a5d93dddbc431ab27b1da711cd3370891542797.
Size: 7,186,992 bytes (7.2 MB on disk).
http://www.mediafire.com/download/8kxa2m5rkc32s7h/
Super-One-Click_v2-3-3_Team-M-metropolis_(pass-1234)_(by_mercado79_sdx-dev).zip
SHA1 checksum: 7cd3f54eea5a2af07150501150be0146a7de82af.
Size: 10,550,007 bytes (10.6 MB on disk).
Note: above zip-file has utility software, which can flash/write into phone's firmware/rom components (this process is also known as "rooting" or "jail-breaking"), so your (anti-virus) security software will give you warning (if you decompress the zip file), that Android rooting related malware exists in 2 files: psneuter (Andr/Droid-Rt-A), zergRush (Andr/Droid-Rt-C). You need to create exception rules inside your security software and allow those 2 files to remain intact, if you want to utilize functionality from those 2 files, or, try other alternatives shown here, or, search further in xda/sdx forum.
http://www.mediafire.com/download/48m2m09ik598v0j/
SW_Updater_CL14_v1.0.001_Transform_EB28-EF09_(Mpgrimm2_sdx).exe
SHA1 checksum: 46e79cfb5ecd55aa8f3edc51355cf426b067f309.
Size: 88,321,715 bytes (88.3 MB on disk).
http://www.mediafire.com/download/80xxrj51c4pv9a7/
OneClickRootCWM3.1.0.1-EC05.zip
SHA1 checksum: 35589f673e71ef4d3fd47abd57e402c44fb80153.
Size: 8,593,920 bytes (8.6 MB on disk).
http://www.mediafire.com/download/olm3a38557u7g5d/
Odin_Multi_Downloader_v4.42.exe
SHA1 checksum: 0ff061097c976bce75c97baa51df8c71f2da0c81.
Size: 455,680 bytes (459 KB on disk).
-_-_-_-_-_-_-
Mac OS X platform/os:
(some core tools are compatible with BSD / FreeBSD unix)
http://www.mediafire.com/download/l502b9e8s72vy20/
heimdall-suite-1.4.0-mac_JOdin.dmg
SHA1 checksum: 133466e39b96062a253d6c325c7a79cf1b16f421.
Size: 7,301,742 bytes (7.3 MB on disk).
http://www.mediafire.com/download/ycqi8j78w2chsc7/
Heimdall-1.4.1-Unofficial-Signed-macosx.dmg
SHA1 checksum: 45a879fcea817e4f00ce1250725c2e4231e08ef4.
Size: 120,279 bytes (123 KB on disk).
http://www.mediafire.com/download/h2fazmndr79533r/
heimdall.kext.tar.gz
SHA1 checksum: b0668faf76ec27899093079e786127ae7365f3a5.
Size: 6,167 bytes (8 KB on disk).
http://www.mediafire.com/download/141twbr9x0dxare/
JOdin3CASUAL-r1035-dist.jar (for any platform/os with Java SE SDK).
SHA1 checksum: d6e331eecc3e149e779b888dedd59c4258c5cbf1.
Size: 19,747,175 bytes (19.8 MB on disk).
http://www.mediafire.com/download/cwcc7wlkh4ayotm/
adb-fastboot-mac.zip
SHA1 checksum: 3596bcea4088ef888536a21fc6d0a0b81eab59d1.
Size: 158,466 bytes (160 KB on disk).
http://www.mediafire.com/download/80xxrj51c4pv9a7/
OneClickRootCWM3.1.0.1-EC05.zip
SHA1 checksum: 35589f673e71ef4d3fd47abd57e402c44fb80153.
Size: 8,593,920 bytes (8.6 MB on disk).
-_-_-_-_-_-_-
Linux/Unix platform/os:
http://www.mediafire.com/download/6a5didlt45jgnae/
libusb-1.0.20.tar.bz2
SHA1 checksum: 9537243f165927bde74ad742e6b3effb0bd50cd2.
Size: 795,247 bytes (799 KB on disk).
http://www.mediafire.com/download/3lkrtbf18v2sfck/
libusb-compat-0.1.5.tar.bz2
SHA1 checksum: 062319276d913c753a4b1341036e6a2e42abccc9.
Size: 276,769 bytes (279 KB on disk).
http://www.mediafire.com/download/141twbr9x0dxare/
JOdin3CASUAL-r1035-dist.jar (for any platform/os with Java SE SDK).
SHA1 checksum: d6e331eecc3e149e779b888dedd59c4258c5cbf1.
Size: 19,747,175 bytes (19.8 MB on disk).
-_-_-_-_-_-_-
Looking for file Hash/Checksum calculator tools ? visit:
http://forum.xda-developers.com/showpost.php?p=64447183&postcount=2
Looking for file (and folder) compression (aka, zip/archive) or decompression (aka, unzip/unarchive) tools ? visit:
http://forum.xda-developers.com/showpost.php?p=64447381&postcount=3
reserved it here, to add more related info in sequence.
Can anyone tell me how i can use any of these to install custom recovery, back up my rom, and install one of the custom roms? there are a ton of files, I'm presuming CWM is clockworkmod, but my phone is EB28 and the file says EB28-EF09. is this something I can use, if so how?
thanks.
Hello,
i hope you may help me.
I try to flash my domino to remove all the Orange stuff with a stock firmware.
So, as you understand the flash did not work, and now impossible to start or reflash the modem.
It's a Domino "S" with the LCD screen.
The only thing i 've found, is to maintain the "connect" button and (without battery), plug the modem.
Windows 7 or XP with Huawei drivers, display in the device manager :
Code:
Modems: HUAWEI Mobile Connect – 3G Modem VID:12D1 PID:1003
Ports: HUAWEI Mobile Connect – 3G PC UI Interface (COM4) VID:12D1 PID:1003
I've read that PID:1003 is Download mode, but it's normaly :modem PID 1446, port :142D
I try to reflash it with E5832sUpdate_956.11.17.05.309.exe
the result is
Code:
COM4
Connected
Download (Offline)
Unkown
956.11.17.05.309
FAILED TO UPDATE…
So if i use REVSKILLS:
Code:
[U]MENU SETUP[/U]
Serial Com Port →
[B]COM4 - HUAWEI Mobile Connect – 3G PC UI Interface (COM4)[/B] ←
COM3 – HUAWEI Mobile Connect – 3G Modem
COM3 - \Device\QCUSB_COM3_1
COM4 - \Device\QCUSB_COM4_2
I've some answers from the modem:
Code:
[U]MENU DIAG[/U]
DIAG Commands, OC – STATUS REPORT →
0D 14 37 36 32 35 41 2D 31 33 35 35 31 31 35
30 2D 53 4E 43 41 41
7625A-13551150-SNCAA
DIAG Commands, 22 – DISPLAY EMU →
7E 03 00 06
~___
DIAG Commands, 3A -DOWNLOAD MODE →
3A
:
Then in the BL MENU
Code:
BL
BOOTLDR:Hello
7E 03 00 04
~___
DWNMODE: No Operation
7E 02
~_
DWNMODE: Poweroff Phone :
7E 02
~_ [B][COLOR="Red"] (AND IT POWER OFF)[/COLOR][/B]
DWNMODE: SwitchDwnMode
3A
:
And finally:
Code:
[U]Show MEM Partitions in DWNMODE[/U]
Name : EBI Memory - ebi.bin
------------------------------
Base : 00000000 - Length : 07FFFFFC - Info : 2
Name : MDSP RAM A region - mdsp_rama.bin
------------------------------
Base : B1000000 - Length : 00008000 - Info : 1
Name : MDSP RAM B region - mdsp_ramb.bin
------------------------------
Base : B1200000 - Length : 00008000 - Info : 1
Name : MDSP RAM C region - mdsp_ramc.bin
------------------------------
Base : B1400000 - Length : 0000C000 - Info : 1
Name : MDSP Register region - mdsp_regs.bin
------------------------------
Base : B1C00000 - Length : 00000028 - Info : 1
Name : ADSP RAM A region - adsp_rama.bin
------------------------------
Base : AC000000 - Length : 00080000 - Info : 1
Name : ADSP RAM B region - adsp_ramb.bin
------------------------------
Base : AC200000 - Length : 00080000 - Info : 1
Name : ADSP RAM C region - adsp_ramc.bin
------------------------------
Base : AC400000 - Length : 00080000 - Info : 1
Name : ADSP RAM I region - adsp_rami.bin
------------------------------
Base : AC800000 - Length : 00080000 - Info : 1
Name : CMM Script - load.cmm
------------------------------
Base : 0015D8D0 - Length : 0000030C - Info : 2
I'm beyond my limits now, so that why i try to find some help to know if it's definitly bricked or if there is any hope to revival.
Thanks.
Hello,
I would like to ask you for a help please. I have downloaded HTC One X kernel source (for HTC One X EU 4.2.2 - version 4.18.401.4 CRC).
My setup is: Ubuntu 14.04 64bit, Java JDK 6u45 x64, arm-eabi-4.6 (as told in README in source).
I also installed all required packages (sudo apt-get install bison g++-multilib git gperf libxml2-utils make zlib1g-dev:i386 zip).
The thing is, I tried to compile kernel without any changes from source, so I woudl compare result with pure stock and compiled (which I thought should be exactly the same size - but it is not, and that's why I am askign you for a help)
Log of compilation is in attachment.
Compiled zImage size is 4 766 884 but original stock zImage size is 4 771 560.
Also sizes of modules don't match at all:
Modules: my compilation - Stock sizes
baseband_usb_chr.ko 189 602 - 190 602
baseband-xmm-power2.ko 151 915 - 152 771
bluetooth.ko 3 298 677 - 3 310 809
bnep.ko 556 426 - 559 722
btwilink.ko 198 204 - 199 408
cdc-acm.ko 223 019 - 224 087
cfg80211.ko 3 609 337 - 3 627 609
compat.ko 548 160 - 551 608
fm_drv.ko 147 276 - 148 204
gps_drv.ko 151 467 - 152 395
hci_uart.ko 571 294 - 574 310
hid-magicmouse.ko 151 450 - 152 310
hidp.ko 455 980 - 458 196
kineto_gan.ko 196 068 - 197 272
lib80211.ko 72 114 - 73 114
mac80211.ko 10 050 004 - 10 092 052
raw_ip_net.ko 217 121 - 218 325
rfcomm.ko 568 997 - 571 357
scsi_wait_scan.ko 39 694 - 40 482
st_drv.ko 401 057 - 403 249
tcrypt.ko 179 515 - 180 583
ti_hci_drv.ko 232 204 - 233 412
wl12xx.ko 3 026 511 - 3 038 719
wl12xx_sdio.ko 319 095 - 320 655
Also, when I executed "make ap33_android_defconfig" I got some warning. I can get rid of them by deleting line 28 in drivers/net/wireless/bcmdhd_4334/Kconfig and deleting DYNAMIC_DEBUG=y line 590 in arch/arm/configs/ap33_android_defconfig and by adding CONFIG_LOCKUP_DETECTOR=y to defconfig.
But should I get those errors & warning when compiling from source without any changes? And why it is impossible to get exact same sizes? Hope somebody could explain this to me, please. Thank you in advance.
Backstory:
I want to debloat my phone i connected my phone to my other device and started adb shell from otg then i opened a activity manager and uninstall system related apps then i uninstalled com.android.shell then boom package manager stopped working and always giving illegalargumentexception
I tried to reset but com.android.shell is still not installed
Also sometimes recovery just gives "no command" after i uninstalled com.android.shell
PLEASE HELP!
Kgstate said:
Backstory:
I want to debloat my phone i connected my phone to my other device and started adb shell from otg then i opened a activity manager and uninstall system related apps then i uninstalled com.android.shell then boom package manager stopped working and always giving illegalargumentexception
I tried to reset but com.android.shell is still not installed
Also sometimes recovery just gives "no command" after i uninstalled com.android.shell
PLEASE HELP!
Click to expand...
Click to collapse
Re-flash your stock firmware.
Google search for:
"Return to stock (your specific model number)"
That should find guides, tools and firmware.
Don't kill the goose that lays the golden eggs hehe
com.android.shell = adb
AFAIK com.android.shell is the "command prompt" ( CLI ) for Linux, which is the Android OS runs on. If you connect the phone to a PC that has an ADB driver for that phone installed, and type
Code:
adb shell
you'll be in the window-less phone's "command prompt" waiting for Linux commands to be input ( can be one single string or a list of commands ) to be executed. You leave this command prompt by typing
Code:
exit
aIecxs said:
Don't kill the goose that lays the golden eggs hehe
com.android.shell = adb
Click to expand...
Click to collapse
Also the bad thing is that app not stored in /system/priv-app
com.android.shell is just a dummy system package to connect shell to android framework (which is java, not linux btw)
you can enable it in /data/system/users/0/package-restrictions.xml
aIecxs said:
com.android.shell is just a dummy system package to connect shell to android framework (which is java, not linux btw)
Click to expand...
Click to collapse
I never paid attention to /system/priv-app/Shell/Shell.apk
Mmm, I just looked at it.
Like many priv-apps, they threw in practically every permission (150+).
It seems that it provides androidx.core.content.FileProvider and a bunch of stuff to do with bug reports.
I think that "Shell" means as in Windows "Shell" which has to do with file system paths and not to command line shell.
in contrast to regular shell, this packages grantes privileged shell to user 'shell' (uid 2000) used by adb
Renate said:
I never paid attention to /system/priv-app/Shell/Shell.apk
Mmm, I just looked at it.
Like many priv-apps, they threw in practically every permission (150+).
It seems that it provides androidx.core.content.FileProvider and a bunch of stuff to do with bug reports.
I think that "Shell" means as in Windows "Shell" which has to do with file system paths and not to command line shell.
Click to expand...
Click to collapse
I think shells purpose is opening , installing and managing apps
ADB Shell -> Package Manager -> Phone -> com.android.shell -> Android Applications
actually 'shell' just forwards the installation request to package manager
aIecxs said:
in contrast to regular shell, this packages grantes privileged shell to user 'shell' (uid 2000) used by adb
Click to expand...
Click to collapse
How can that be? You can stop Android. Reconnect USB and your ADB will recreate a new sh that will be the same as it was.
(My ADB is always root without su or anything so I can't test this.)
When you look at the code, there is very little that isn't androidx, support-v4 or bug report related.
androidx/core/content/FileProvider.smali is just a bit of gobbledeegook about paths.
aIecxs said:
actually 'shell' just forwards the installation request to package manager
Click to expand...
Click to collapse
So when i try to install apk shell forward request to local package manager?
OH MY GOD GUYS I FOUND THE SOLUTION:
Developer Settings > Bug report shortcut on power menu = ON
Then try to take a bug report from powr menu then it will stuck %0 for 5 - 6 mins and when progress bar start to raise check if com.android.shell is installed
Renate said:
How can that be? You can stop Android. Reconnect USB and your ADB will recreate a new sh that will be the same as it was.
(My ADB is always root without su or anything so I can't test this.)
When you look at the code, there is very little that isn't androidx, support-v4 or bug report related.
androidx/core/content/FileProvider.smali is just a bit of gobbledeegook about paths.
Click to expand...
Click to collapse
How does user 'shell' get WRITE_EXTERNAL_STORAGE permissions without system_server?
Renate said:
I think that "Shell" means as in Windows "Shell" which has to do with file system paths and not to command line shell.
Click to expand...
Click to collapse
Read here to get what Microsoft understands under "shell" in Windows OS:
Windows commands
Reference
learn.microsoft.com
aIecxs said:
How does user 'shell' get WRITE_EXTERNAL_STORAGE permissions without system_server?
Click to expand...
Click to collapse
There are Android permissions, SELinux permissions and regular file permissions.
Look at shell supplementary groups and you see:
Code:
$ id
uid=2000(shell) gid=2000(shell) groups=2000(shell),1004(input),1007(log),1011(adb),1015(sdcard_rw),1028(sdcard_r),1078(ext_data_rw),1079(ext_obb_rw),3001(net_bt_admin),3002(net_bt),3003(inet),3006(net_bw_stats),3009(readproc),3011(uhid) context=u:r:shell:s0
So 2000 belongs to a group that owns all the files (1015, 1028, 1078, 1079).
In ye olde days for the Android permissions (that you use when Android happens to be running), /system/etc/permissions/platform.xml:
Code:
<permission name="android.permission.READ_EXTERNAL_STORAGE">
<group gid="media_rw"/>
</permission>
Nowadays they use sdcardfs and mount it 4 different ways!
Code:
/data/media on /mnt/runtime/default/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,derive_gid,default_normal,unshared_obb)
/data/media on /mnt/runtime/read/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=23,derive_gid,default_normal,unshared_obb)
/data/media on /mnt/runtime/write/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=7,derive_gid,default_normal,unshared_obb)
/data/media on /mnt/runtime/full/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=7,derive_gid,default_normal,unshared_obb)
xXx yYy said:
Read here to get what Microsoft understands with "shell" in Windows OS:
Click to expand...
Click to collapse
Code:
C:\Windows\System32\shell32.dll
VS_VERSION_INFO - 52 bytes
StringFileInfo
040904B0
CompanyName Microsoft Corporation
FileDescription Windows Shell Common Dll
FileVersion 10.0.19041.964 (WinBuild.160101.0800)
InternalName SHELL32
LegalCopyright © Microsoft Corporation. All rights reserved.
OriginalFilename SHELL32.DLL.MUI
ProductName Microsoft® Windows® Operating System
ProductVersion 10.0.19041.964
VarFileInfo
Translation - 4 bytes
Spoiler: List of exports from shell32.dll
Code:
Exports from SHELL32.dll
477 exported name(s), 2000 export addresse(s). Ordinal base is 2.
Sorted by Name:
RVA Ord. Hint Name
-------- ---- ---- ----
0026F310 255 0000 AppCompat_RunDLLW
000FD400 263 0001 AssocCreateForClasses
002753D0 267 0002 AssocElemCreateForKey
001772A0 268 0003 AssocGetDetailsOfPropKey
0027AE50 701 0004 CDefFolderMenu_Create2
0027B780 83 0005 CIDLData_CreateFromIDArray
002266B0 937 0006 CStorageItem_GetValidatedStorageItemObject
0018AC70 269 0007 CallFileCopyHook
0027FFE0 272 0008 CheckEscapesW
0015A250 273 0009 CommandLineToArgvW
002825D0 274 000A Control_RunDLL
002825D0 275 000B Control_RunDLLA
00282630 276 000C Control_RunDLLAsUserW
00282670 277 000D Control_RunDLLW
002266F0 935 000E CreateStorageItemFromPath_FullTrustCaller
00226710 936 000F CreateStorageItemFromPath_FullTrustCaller_ForPackage
00226730 920 0010 CreateStorageItemFromPath_PartialTrustCaller
00226750 921 0011 CreateStorageItemFromShellItem_FullTrustCaller
00226770 925 0012 CreateStorageItemFromShellItem_FullTrustCaller_ForPackage
00226790 929 0013 CreateStorageItemFromShellItem_FullTrustCaller_ForPackage_WithProcessHandle
002267B0 931 0014 CreateStorageItemFromShellItem_FullTrustCaller_UseImplicitFlagsAndPackage
0016F1D0 129 0015 DAD_AutoScroll
00170B70 131 0016 DAD_DragEnterEx
002949E0 22 0017 DAD_DragEnterEx2
00294A80 132 0018 DAD_DragLeave
00294AB0 134 0019 DAD_DragMove
0016EE00 136 001A DAD_SetDragImage
00178350 137 001B DAD_ShowDragImage
001569E0 278 001C DllCanUnloadNow
00221270 279 001D DllGetActivationFactory
00138730 280 001E DllGetClassObject
00297AA0 281 001F DllGetVersion
00297B70 282 0020 DllInstall
0016EDF0 283 0021 DllRegisterServer
0016EDF0 284 0022 DllUnregisterServer
002129E0 285 0023 DoEnvironmentSubstA
00212A50 286 0024 DoEnvironmentSubstW
0016D020 287 0025 DragAcceptFiles
0021DFF0 288 0026 DragFinish
0021E000 289 0027 DragQueryFile
0021E000 290 0028 DragQueryFileA
0021E030 291 0029 DragQueryFileAorW
0021E240 292 002A DragQueryFileW
0021E3A0 293 002B DragQueryPoint
002987A0 64 002C DriveType
0015C870 294 002D DuplicateIcon
00212B40 295 002E ExtractAssociatedIconA
00212BE0 296 002F ExtractAssociatedIconExA
00212CA0 297 0030 ExtractAssociatedIconExW
00212E80 298 0031 ExtractAssociatedIconW
00212F20 299 0032 ExtractIconA
00212F80 300 0033 ExtractIconEx
00212F80 301 0034 ExtractIconExA
00157090 302 0035 ExtractIconExW
00212FE0 303 0036 ExtractIconW
002A4500 304 0037 FindExecutableA
002A45A0 305 0038 FindExecutableW
0016EE20 306 0039 FreeIconList
002A4EC0 307 003A GetCurrentProcessExplicitAppUserModelID
002A7E90 63 003B GetFileNameFromBrowse
002267D0 919 003C GetSystemPersistedStorageItemList
002ADE60 154 003D ILAppendID
0013B660 18 003E ILClone
001042E0 19 003F ILCloneFirst
0013F9A0 25 0040 ILCombine
002ADFE0 157 0041 ILCreateFromPath
002ADF10 189 0042 ILCreateFromPathA
002ADFE0 190 0043 ILCreateFromPathW
000EDE70 24 0044 ILFindChild
0012BB10 16 0045 ILFindLastID
00116D70 155 0046 ILFree
000EE500 153 0047 ILGetNext
0013CDE0 152 0048 ILGetSize
0013CD60 21 0049 ILIsEqual
000C4F20 23 004A ILIsParent
002AE270 846 004B ILLoadFromStreamEx
0013B620 17 004C ILRemoveLastID
002AE380 27 004D ILSaveToStream
002AE750 308 004E InitNetworkAddressControl
0016F1D0 309 004F InternalExtractIconListA
0016F1D0 310 0050 InternalExtractIconListW
0015E1A0 942 0051 IsDesktopExplorerProcess
00178350 119 0052 IsLFNDrive
00178350 41 0053 IsLFNDriveA
00178350 42 0054 IsLFNDriveW
002987C0 66 0055 IsNetDrive
00165240 941 0056 IsProcessAnExplorer
002AE8F0 680 0057 IsUserAnAdmin
00221390 311 0058 LaunchMSHelp_RunDLLW
001741B0 81 0059 OpenAs_RunDLL
001741B0 125 005A OpenAs_RunDLLA
002296D0 133 005B OpenAs_RunDLLW
0016C4E0 85 005C OpenRegStream
0046F1A0 312 005D Options_RunDLL
0046F1A0 313 005E Options_RunDLLA
0046F1E0 314 005F Options_RunDLLW
00177010 171 0060 PathCleanupSpec
002802F0 92 0061 PathGetShortPath
000CA310 43 0062 PathIsExe
00280520 240 0063 PathIsSlowA
00280570 239 0064 PathIsSlowW
00280690 47 0065 PathMakeUniqueName
00280A20 49 0066 PathQualify
00160160 51 0067 PathResolve
00280AF0 75 0068 PathYetAnotherMakeUniqueName
00214E90 62 0069 PickIconDlg
0021AE00 13 006A PifMgr_CloseProperties
0021AEB0 10 006B PifMgr_GetProperties
0021B180 9 006C PifMgr_OpenProperties
0021B700 11 006D PifMgr_SetProperties
0022D4D0 135 006E PrepareDiscForBurnRunDllW
002386C0 138 006F PrintersGetCommand_RunDLL
002386C0 139 0070 PrintersGetCommand_RunDLLA
00238740 150 0071 PrintersGetCommand_RunDLLW
000E6900 654 0072 ReadCabinetState
002B0030 524 0073 RealDriveType
0023AFE0 199 0074 RealShellExecuteA
0023AFF0 207 0075 RealShellExecuteExA
0023AFF0 208 0076 RealShellExecuteExW
0023AFE0 226 0077 RealShellExecuteW
0021EE30 315 0078 RegenerateUserEnvironment
00295530 59 0079 RestartDialog
00295550 730 007A RestartDialogEx
00222380 316 007B RunAsNewUser_RunDLLW
000E60B0 317 007C SHAddDefaultPropertiesByExt
002B81C0 167 007D SHAddFromPropSheetExtArray
0016DA20 318 007E SHAddToRecentDocs
0016C440 196 007F SHAlloc
002987E0 319 0080 SHAppBarMessage
002BE740 320 0081 SHAssocEnumHandlers
002BE7B0 321 0082 SHAssocEnumHandlersForProtocolByApplication
00168C00 322 0083 SHBindToFolderIDListParent
0013B100 323 0084 SHBindToFolderIDListParentEx
0013B720 324 0085 SHBindToObject
0013B580 325 0086 SHBindToParent
002C13F0 326 0087 SHBrowseForFolder
002C13F0 327 0088 SHBrowseForFolderA
002C15A0 328 0089 SHBrowseForFolderW
000D8A70 147 008A SHCLSIDFromString
0015DD50 644 008B SHChangeNotification_Lock
001633B0 645 008C SHChangeNotification_Unlock
00113450 329 008D SHChangeNotify
00146D40 4 008E SHChangeNotifyDeregister
00144CE0 2 008F SHChangeNotifyRegister
00146E60 330 0090 SHChangeNotifyRegisterThread
002B7AA0 331 0091 SHChangeNotifySuspendResume
0016B870 89 0092 SHCloneSpecialIDList
001610F0 102 0093 SHCoCreateInstance
002C1D30 332 0094 SHCoCreateInstanceWorker
0016D880 333 0095 SHCreateAssociationRegistration
002C6EE0 334 0096 SHCreateCategoryEnum
000B3060 335 0097 SHCreateDataObject
000FF370 336 0098 SHCreateDefaultContextMenu
00155C90 337 0099 SHCreateDefaultExtractIcon
002B7F00 338 009A SHCreateDefaultPropertiesOp
00269040 165 009B SHCreateDirectory
00269020 339 009C SHCreateDirectoryExA
0017B670 340 009D SHCreateDirectoryExW
002C8CF0 341 009E SHCreateDrvExtIcon
00277390 743 009F SHCreateFileExtractIconW
0013BCE0 342 00A0 SHCreateItemFromIDList
001138A0 343 00A1 SHCreateItemFromParsingName
002774A0 344 00A2 SHCreateItemFromRelativeName
0013B810 345 00A3 SHCreateItemInKnownFolder
001444C0 346 00A4 SHCreateItemWithParent
000F9D70 347 00A5 SHCreateLocalServerRunDll
0023C230 348 00A6 SHCreateProcessAsUserW
000F6E60 168 00A7 SHCreatePropSheetExtArray
00178310 349 00A8 SHCreateQueryCancelAutoPlayMoniker
00147BD0 256 00A9 SHCreateShellFolderView
002D3DC0 174 00AA SHCreateShellFolderViewEx
00177A70 350 00AB SHCreateShellItem
00226840 351 00AC SHCreateShellItemArray
00226860 352 00AD SHCreateShellItemArrayFromDataObject
0016C420 353 00AE SHCreateShellItemArrayFromIDLists
000F9F40 354 00AF SHCreateShellItemArrayFromShellItem
00212540 74 00B0 SHCreateStdEnumFmtEtc
002A3F10 3 00B1 SHDefExtractIconA
00121100 6 00B2 SHDefExtractIconW
000F6F40 169 00B3 SHDestroyPropSheetExtArray
00294B40 88 00B4 SHDoDragDrop
0016CF20 355 00B5 SHELL32_AddToBackIconTable
00164810 356 00B6 SHELL32_AddToFrontIconTable
0010CE80 357 00B7 SHELL32_AreAllItemsAvailable
002D6C90 358 00B8 SHELL32_CCommonPlacesFolder_CreateInstance
002D6CA0 359 00B9 SHELL32_CDBurn_CloseSession
002D6CC0 360 00BA SHELL32_CDBurn_DriveSupportedForDataBurn
002D6CE0 361 00BB SHELL32_CDBurn_Erase
002D6D00 362 00BC SHELL32_CDBurn_GetCDInfo
002D6D20 363 00BD SHELL32_CDBurn_GetLiveFSDiscInfo
0015EB50 364 00BE SHELL32_CDBurn_GetStagingPathOrNormalPath
002D6D40 365 00BF SHELL32_CDBurn_GetTaskInfo
002D6DC0 367 00C0 SHELL32_CDBurn_IsBlankDisc
002D6D70 366 00C1 SHELL32_CDBurn_IsBlankDisc2
002D6DE0 368 00C2 SHELL32_CDBurn_IsLiveFS
002D6E00 369 00C3 SHELL32_CDBurn_OnDeviceChange
002D6E20 370 00C4 SHELL32_CDBurn_OnEject
002D6E80 371 00C5 SHELL32_CDBurn_OnMediaChange
002D6EA0 372 00C6 SHELL32_CDefFolderMenu_Create2
002D6EB0 373 00C7 SHELL32_CDefFolderMenu_Create2Ex
002D6EE0 374 00C8 SHELL32_CDefFolderMenu_MergeMenu
002D6EF0 375 00C9 SHELL32_CDrivesContextMenu_Create
002D6F10 376 00CA SHELL32_CDrivesDropTarget_Create
002D6F30 377 00CB SHELL32_CDrives_CreateSFVCB
00166C60 378 00CC SHELL32_CFSDropTarget_CreateInstance
000ED780 379 00CD SHELL32_CFSFolderCallback_Create
0016F9B0 380 00CE SHELL32_CFillPropertiesTask_CreateInstance
002D6F80 381 00CF SHELL32_CLibraryDropTarget_CreateInstance
0016F290 382 00D0 SHELL32_CLocationContextMenu_Create
002D6FA0 383 00D1 SHELL32_CLocationFolderUI_CreateInstance
002D6FC0 384 00D2 SHELL32_CMountPoint_DoAutorun
002D6FE0 385 00D3 SHELL32_CMountPoint_DoAutorunPrompt
002D7000 386 00D4 SHELL32_CMountPoint_IsAutoRunDriveAndEnabledByPolicy
002D7020 387 00D5 SHELL32_CMountPoint_ProcessAutoRunFile
002D7040 388 00D6 SHELL32_CMountPoint_WantAutorunUI
002D7060 389 00D7 SHELL32_CMountPoint_WantAutorunUIGetReady
002D7080 390 00D8 SHELL32_CNetFolderUI_CreateInstance
000AED60 391 00D9 SHELL32_CPL_CategoryIdArrayFromVariant
002D70A0 392 00DA SHELL32_CPL_IsLegacyCanonicalNameListedUnderKey
002D70C0 393 00DB SHELL32_CPL_ModifyWowDisplayName
002D70E0 394 00DC SHELL32_CRecentDocsContextMenu_CreateInstance
002D70F0 395 00DD SHELL32_CTransferConfirmation_CreateInstance
002D7110 396 00DE SHELL32_CallFileCopyHooks
002D7130 397 00DF SHELL32_CanDisplayWin8CopyDialog
002D7160 398 00E0 SHELL32_CloseAutoplayPrompt
002D7180 399 00E1 SHELL32_CommandLineFromMsiDescriptor
0016EF90 400 00E2 SHELL32_CopySecondaryTiles
002D71A0 401 00E3 SHELL32_CreateConfirmationInterrupt
002D71C0 402 00E4 SHELL32_CreateConflictInterrupt
002D71F0 403 00E5 SHELL32_CreateDefaultOperationDataProvider
002D7210 404 00E6 SHELL32_CreateFileFolderContextMenu
0016AD60 405 00E7 SHELL32_CreateLinkInfoW
00170620 406 00E8 SHELL32_CreateQosRecorder
002D7240 407 00E9 SHELL32_CreateSharePointView
00290FC0 408 00EA SHELL32_Create_IEnumUICommand
0016B950 409 00EB SHELL32_DestroyLinkInfo
002D7260 410 00EC SHELL32_EncryptDirectory
002D7280 411 00ED SHELL32_EncryptedFileKeyInfo
002D72A0 412 00EE SHELL32_EnumCommonTasks
002D72B0 413 00EF SHELL32_FreeEncryptedFileKeyInfo
002D72C0 414 00F0 SHELL32_GenerateAppID
002D72E0 415 00F1 SHELL32_GetAppIDRoot
002D72F0 416 00F2 SHELL32_GetCommandProviderForFolderType
000E1710 417 00F3 SHELL32_GetDPIAdjustedLogicalSize
002D7310 418 00F4 SHELL32_GetDiskCleanupPath
002D7330 419 00F5 SHELL32_GetFileNameFromBrowse
0016B3A0 420 00F6 SHELL32_GetIconOverlayManager
002D7340 421 00F7 SHELL32_GetLinkInfoData
002D7360 422 00F8 SHELL32_GetRatingBucket
002D7390 423 00F9 SHELL32_GetSqmableFileName
002D73B0 425 00FA SHELL32_GetThumbnailAdornerFromFactory
000C58E0 424 00FB SHELL32_GetThumbnailAdornerFromFactory2
002D73D0 426 00FC SHELL32_HandleUnrecognizedFileSystem
0010FC90 427 00FD SHELL32_IconCacheCreate
0016C620 428 00FE SHELL32_IconCacheDestroy
002D73F0 429 00FF SHELL32_IconCacheHandleAssociationChanged
0010FCA0 430 0100 SHELL32_IconCacheRestore
0015F4F0 431 0101 SHELL32_IconCache_AboutToExtractIcons
0015F2E0 432 0102 SHELL32_IconCache_DoneExtractingIcons
001688F0 433 0103 SHELL32_IconCache_ExpandEnvAndSearchPath
00166A50 434 0104 SHELL32_IconCache_RememberRecentlyExtractedIconsW
00101AA0 435 0105 SHELL32_IconOverlayManagerInit
00165BA0 436 0106 SHELL32_IsGetKeyboardLayoutPresent
002D7400 437 0107 SHELL32_IsSystemUpgradeInProgress
00167620 438 0108 SHELL32_IsValidLinkInfo
002D7410 439 0109 SHELL32_LegacyEnumSpecialTasksByType
002D7420 440 010A SHELL32_LegacyEnumTasks
00120190 441 010B SHELL32_LookupBackIconIndex
0011ECC0 442 010C SHELL32_LookupFrontIconIndex
002D7430 443 010D SHELL32_NormalizeRating
002D7460 444 010E SHELL32_NotifyLinkTrackingServiceOfMove
002D7480 445 010F SHELL32_PifMgr_CloseProperties
002D7490 446 0110 SHELL32_PifMgr_GetProperties
002D74A0 447 0111 SHELL32_PifMgr_OpenProperties
002D74B0 448 0112 SHELL32_PifMgr_SetProperties
002D74C0 449 0113 SHELL32_Printers_CreateBindInfo
002D74E0 450 0114 SHELL32_Printjob_GetPidl
002D7500 451 0115 SHELL32_PurgeSystemIcon
00101A30 452 0116 SHELL32_RefreshOverlayImages
000F66F0 453 0117 SHELL32_ResolveLinkInfoW
002D7530 454 0118 SHELL32_SHAddSparseIcon
002D7550 455 0119 SHELL32_SHCreateByValueOperationInterrupt
000FF360 456 011A SHELL32_SHCreateDefaultContextMenu
002D7570 457 011B SHELL32_SHCreateLocalServer
0014B600 458 011C SHELL32_SHCreateShellFolderView
002D7580 459 011D SHELL32_SHDuplicateEncryptionInfoFile
002D75A0 460 011E SHELL32_SHEncryptFile
002D75C0 461 011F SHELL32_SHFormatDriveAsync
002D75E0 462 0120 SHELL32_SHGetThreadUndoManager
002D75F0 463 0121 SHELL32_SHGetUserNameW
002D7610 464 0122 SHELL32_SHIsVirtualDevice
002D7630 465 0123 SHELL32_SHLaunchPropSheet
002D7650 466 0124 SHELL32_SHLogILFromFSIL
002D7660 467 0125 SHELL32_SHOpenWithDialog
002D7670 468 0126 SHELL32_SHStartNetConnectionDialogW
002A3480 469 0127 SHELL32_SHUICommandFromGUID
004709D0 470 0128 SHELL32_SendToMenu_InvokeTargetedCommand
00470A10 471 0129 SHELL32_SendToMenu_VerifyTargetedCommand
002D7690 472 012A SHELL32_ShowHideIconOnlyOnDesktop
002D76B0 473 012B SHELL32_SimpleRatingToFilterCondition
002D76D0 474 012C SHELL32_StampIconForFile
00164610 475 012D SHELL32_SuspendUndo
002D7720 476 012E SHELL32_TryVirtualDiscImageDriveEject
0016A090 477 012F SHELL32_VerifySaferTrust
002D7A70 478 0130 SHEmptyRecycleBinA
002D7AE0 479 0131 SHEmptyRecycleBinW
00127030 480 0132 SHEnableServiceObject
00269230 481 0133 SHEnumerateUnreadMailAccountsW
00160450 482 0134 SHEvaluateSystemCommandTemplate
002D9770 483 0135 SHExecuteErrorMessageBox
00213100 484 0136 SHExtractIconsW
00226880 485 0137 SHFileOperation
00226880 486 0138 SHFileOperationA
002268A0 487 0139 SHFileOperationW
002694F0 90 013A SHFindFiles
002D9C60 149 013B SHFind_InitMenuPopup
002DA1D0 526 013C SHFlushSFCache
0026F670 488 013D SHFormatDrive
00116D70 195 013E SHFree
002268C0 489 013F SHFreeNameMappings
000B2EC0 750 0140 SHGetAttributesFromDataObject
002777D0 490 0141 SHGetDataFromIDListA
00165350 491 0142 SHGetDataFromIDListW
0016D320 492 0143 SHGetDesktopFolder
002778A0 493 0144 SHGetDiskFreeSpaceA
002778A0 494 0145 SHGetDiskFreeSpaceExA
00277900 495 0146 SHGetDiskFreeSpaceExW
002DFED0 496 0147 SHGetDriveMedia
00176E90 497 0148 SHGetFileInfo
00176E90 498 0149 SHGetFileInfoA
001139A0 499 014A SHGetFileInfoW
000F9D10 500 014B SHGetFolderLocation
00178260 501 014C SHGetFolderPathA
00298B60 502 014D SHGetFolderPathAndSubDirA
00178A00 503 014E SHGetFolderPathAndSubDirW
000F78B0 504 014F SHGetFolderPathEx
0015DD30 505 0150 SHGetFolderPathW
0013BB60 506 0151 SHGetIDListFromObject
002E0440 507 0152 SHGetIconOverlayIndexA
002E04A0 508 0153 SHGetIconOverlayIndexW
00152540 727 0154 SHGetImageList
000FA170 509 0155 SHGetInstanceExplorer
00160A20 510 0156 SHGetItemFromDataObject
001474B0 511 0157 SHGetItemFromObject
0016AE20 512 0158 SHGetKnownFolderIDList
000F3A40 513 0159 SHGetKnownFolderItem
00169F20 514 015A SHGetKnownFolderPath
00277920 515 015B SHGetLocalizedName
00178050 516 015C SHGetMalloc
0016D6F0 517 015D SHGetNameFromIDList
00277A80 518 015E SHGetNewLinkInfo
00277A80 179 015F SHGetNewLinkInfoA
00277B60 180 0160 SHGetNewLinkInfoW
002695B0 519 0161 SHGetPathFromIDList
002695B0 527 0162 SHGetPathFromIDListA
00165470 528 0163 SHGetPathFromIDListEx
00137730 529 0164 SHGetPathFromIDListW
000FCB00 530 0165 SHGetPropertyStoreForWindow
00277B90 531 0166 SHGetPropertyStoreFromIDList
00277C10 532 0167 SHGetPropertyStoreFromParsingName
002696C0 98 0168 SHGetRealIDL
00213370 709 0169 SHGetSetFolderCustomSettings
00111750 68 016A SHGetSetSettings
002E0A10 533 016B SHGetSettings
0016CEC0 534 016C SHGetSpecialFolderLocation
00298B80 535 016D SHGetSpecialFolderPathA
0016B3C0 536 016E SHGetSpecialFolderPathW
0015F730 537 016F SHGetStockIconInfo
00147300 538 0170 SHGetTemporaryPropertyForItem
002696E0 539 0171 SHGetUnreadMailCountW
002B7B30 193 0172 SHHandleUpdateImage
0025BCF0 228 0173 SHHelpShortcuts_RunDLL
0025BCF0 229 0174 SHHelpShortcuts_RunDLLA
0025BD50 238 0175 SHHelpShortcuts_RunDLLW
002AE410 28 0176 SHILCreateFromPath
00238FE0 540 0177 SHInvokePrinterCommandA
00239090 541 0178 SHInvokePrinterCommandW
000EE710 542 0179 SHIsFileAvailableOffline
002E16E0 747 017A SHLimitInputEdit
0016ECE0 543 017B SHLoadInProc
00269CB0 544 017C SHLoadNonloadedIconOverlayIdentifiers
000AA9B0 77 017D SHMapPIDLToSystemImageListIndex
002E1F80 716 017E SHMultiFileProperties
0025BE60 178 017F SHObjectProperties
00277CA0 545 0180 SHOpenFolderAndSelectItems
002E1FA0 80 0181 SHOpenPropSheetW
0022A260 546 0182 SHOpenWithDialog
00113EC0 547 0183 SHParseDisplayName
002268F0 548 0184 SHPathPrepareForWriteA
00226910 549 0185 SHPathPrepareForWriteW
00298BE0 685 0186 SHPropStgCreate
00298C00 688 0187 SHPropStgReadMultiple
00298C20 689 0188 SHPropStgWriteMultiple
002E2FC0 550 0189 SHQueryRecycleBinA
002E3030 551 018A SHQueryRecycleBinW
00298C40 552 018B SHQueryUserNotificationState
00278040 553 018C SHRemoveLocalizedName
002B8240 170 018D SHReplaceFromPropSheetExtArray
00298CB0 554 018E SHResolveLibrary
001121E0 100 018F SHRestricted
002B7FE0 555 0190 SHSetDefaultProperties
00298CD0 231 0191 SHSetFolderPathA
00298CF0 232 0192 SHSetFolderPathW
0016D930 176 0193 SHSetInstanceExplorer
00298D10 556 0194 SHSetKnownFolderPath
002780C0 557 0195 SHSetLocalizedName
000CB450 558 0196 SHSetTemporaryPropertyForItem
00269E00 559 0197 SHSetUnreadMailCountW
002D3E60 73 0198 SHShellFolderView_Message
0049ABE0 560 0199 SHShowManageLibraryUI
00269FA0 162 019A SHSimpleIDListFromPath
002D7670 14 019B SHStartNetConnectionDialogW
00169220 245 019C SHTestTokenMembership
002B7BD0 191 019D SHUpdateImageA
002B7C30 192 019E SHUpdateImageW
0016A030 561 019F SHUpdateRecycleBinIcon
002A48B0 173 01A0 SHValidateUNC
00178330 562 01A1 SetCurrentProcessExplicitAppUserModelID
0021D890 563 01A2 SheChangeDirA
0021D8F0 564 01A3 SheChangeDirExW
0021DD90 565 01A4 SheGetDirA
0021DF50 566 01A5 SheSetCurDrive
002F0950 567 01A6 ShellAboutA
002F0A10 568 01A7 ShellAboutW
0023C250 569 01A8 ShellExec_RunDLL
0023C250 570 01A9 ShellExec_RunDLLA
0023C2D0 571 01AA ShellExec_RunDLLW
0023C3C0 572 01AB ShellExecuteA
0023C430 573 01AC ShellExecuteEx
0023C430 574 01AD ShellExecuteExA
00154540 575 01AE ShellExecuteExW
00155580 576 01AF ShellExecuteW
0016F1D0 577 01B0 ShellHookProc
00543B7F 183 01B1 ShellMessageBoxA => shlwapi.ShellMessageBoxA
00543BA9 182 01B2 ShellMessageBoxW => shlwapi.ShellMessageBoxW
002A3F70 72 01B3 Shell_GetCachedImageIndex
002A3F80 578 01B4 Shell_GetCachedImageIndexA
0011FC30 579 01B5 Shell_GetCachedImageIndexW
0016C010 71 01B6 Shell_GetImageLists
0014ADE0 67 01B7 Shell_MergeMenus
00298D50 580 01B8 Shell_NotifyIcon
00298D50 581 01B9 Shell_NotifyIconA
00177B90 582 01BA Shell_NotifyIconGetRect
001270F0 583 01BB Shell_NotifyIconW
000F0030 103 01BC SignalFileOpen
001A5BB0 584 01BD StateRepoNewMenuCache_EnsureCacheAsync
00166D60 585 01BE StateRepoNewMenuCache_RebuildCacheAsync
002F0CA0 682 01BF StgMakeUniqueName
0017DAF0 586 01C0 StrChrA
0017DB00 587 01C1 StrChrIA
0017DB10 588 01C2 StrChrIW
0017DB20 589 01C3 StrChrW
0017DB30 590 01C4 StrCmpNA
0017DB40 591 01C5 StrCmpNIA
0017DB50 592 01C6 StrCmpNIW
0017DB60 593 01C7 StrCmpNW
00214250 594 01C8 StrNCmpA
002142C0 595 01C9 StrNCmpIA
00214330 596 01CA StrNCmpIW
002143C0 597 01CB StrNCmpW
0017DB70 598 01CC StrRChrA
0017DB80 599 01CD StrRChrIA
0017DB90 600 01CE StrRChrIW
0017DBA0 601 01CF StrRChrW
002144A0 602 01D0 StrRStrA
0017DBB0 603 01D1 StrRStrIA
0017DBC0 604 01D2 StrRStrIW
00214520 605 01D3 StrRStrW
0017DBD0 606 01D4 StrStrA
0017DBE0 607 01D5 StrStrIA
0017DBF0 608 01D6 StrStrIW
0017DC00 609 01D7 StrStrW
002F2680 610 01D8 UsersLibrariesFolderUI_CreateInstance
0023C4D0 611 01D9 WOWShellExecute
00297E20 612 01DA WaitForExplorerRestartW
00214AA0 164 01DB Win32DeleteFile
000E6840 652 01DC WriteCabinetState
I have an older Huawei device lying around where it was not possible to adb push straight to MicroSD card, so I had to push into /sdcard and move files every time. to my understanding the Android permissions are the missing link. in settings - apps - com.android.shell one can allow other permissions for example install apps from unknown source, I am pretty sure that permissions are granted to uid 2000 (adb shell) although I don't understand much how it is ongoing under the hood.
aIecxs said:
I have an older Huawei device lying around...
Click to expand...
Click to collapse
Then your 2000 was missing group 1078 (ext_data_rw)
See: https://android.googlesource.com/pl...s/include/private/android_filesystem_config.h
1077 (EXTERNAL_STORAGE) to be nitpicky...
Adb package manager still gives me illegalargument exception when i try to install apk