Nexus S AOSP ROM - Stuck at 'Obtaining IP Adress' - Nexus S Q&A, Help & Troubleshooting

How do I fix this? I did a clean AOSP build from latest ICS code.
Every network I try to connect to leaves me stuck at 'Obtaining IP Adress'
mobile data works just fine...
can anyone help me out so I could release my ROM?

wrong section
Sent from my Nexus S using xda premium

djjonastybe said:
How do I fix this? I did a clean AOSP build from latest ICS code.
Every network I try to connect to leaves me stuck at 'Obtaining IP Adress'
mobile data works just fine...
can anyone help me out so I could release my ROM?
Click to expand...
Click to collapse
I have ran into this a few times in my ROM. Usually after installing gapps. I am not sure what caused it but you can look at my updater-script and see what is different. Also make sure you have the matching retouch binary lines right. You want to only use the retouch line and file names from the same ROM that comes out of your compiler. Do use the lines from ROM A on ROM B...

djjonastybe said:
How do I fix this? I did a clean AOSP build from latest ICS code.
Every network I try to connect to leaves me stuck at 'Obtaining IP Adress'
mobile data works just fine...
can anyone help me out so I could release my ROM?
Click to expand...
Click to collapse
Like AndroidUser said. You have to re touch the right binary files. Compile your ROM with make -j4 otapackage option, then copy the retouch binaries part into your existing zip package. if you are running a 32 bit OS like me, you have adjust the VM size from 2048 to 1024. refer below for details.
"Try changing "java -Xmx2048m" in common.py to "java -Xmx1024m" if that fails try "java -Xmx512m" located in system/build/tools/releasetools/common.py"

basziee said:
wrong section
Sent from my Nexus S using xda premium
Click to expand...
Click to collapse
In my opinion it is the right since it's related to development. If you ask this in the Q&A section you never get an answer.

AndroidUser00110001 said:
I have ran into this a few times in my ROM. Usually after installing gapps. I am not sure what caused it but you can look at my updater-script and see what is different. Also make sure you have the matching retouch binary lines right. You want to only use the retouch line and file names from the same ROM that comes out of your compiler. Do use the lines from ROM A on ROM B...
Click to expand...
Click to collapse
Thanks I will compare the lines!

krarvind said:
Like AndroidUser said. You have to re touch the right binary files. Compile your ROM with make -j4 otapackage option, then copy the retouch binaries part into your existing zip package. if you are running a 32 bit OS like me, you have adjust the VM size from 2048 to 1024. refer below for details.
"Try changing "java -Xmx2048m" in common.py to "java -Xmx1024m" if that fails try "java -Xmx512m" located in system/build/tools/releasetools/common.py"
Click to expand...
Click to collapse
I use a 64-Bit Ubuntu in a VMWare VM with 4GB RAM I will try that tomorrow!
Thanks!

djjonastybe said:
I use a 64-Bit Ubuntu in a VMWare VM with 4GB RAM I will try that tomorrow!
Thanks!
Click to expand...
Click to collapse
then you should be good. just compile with otapackage option, copy and paste the retouch binaries from the updater-script into your existing one. it's prob not retouching the right binary files.

I noticed the line which is wrong. Do I have to do that all by hand? Seems like a lot of work...
my line has 17000 characters. While the one in AOSP+ only has 13000
I corrected the line with Notepad++. Now I am getting a status 6 error.
retouch_binaries /system/lib/libril.so 5c5ecbd5bec3083fd3462407d1dbb6cc1c1cde33 /system/lib/libhwui.so d36feb80018b476875bb9bb2a6c9e9977f3d0b1b /system/lib/libjni_mosaic.so 0db4a6633c3d70302044c656bea4f6e8da877ebf /system/lib/libsoundpool.so 4d4caff3b23123b829071fa61515a2b33a89140e /system/lib/libs3cjpeg.so e91ca63b991708a938ff01ef4f1765302cc65acd /system/lib/libsqlite_jni.so 760a909fe3bbe066f7bd213cff0734977e2feb25 /system/lib/libfilterpack_imageproc.so 08b8d60475bb0f345b52f608890ead97f9ddcb45 /system/lib/libwnndict.so 19bbfd314d2b8b8110a12e207fc7cd2653a13d61 /system/lib/libWnnJpnDic.so 0587b63761fd97847b1ce8a32228503d39f0fb7c /system/lib/libdefcontainer_jni.so 562b6b8f9c7c5ffb666d0edf74cc93a5dfae9d6c /system/lib/libnfc_ndef.so 15d024475cb42c58378d70670e4ebeb8ca0682e6 /system/lib/libRS.so 9cb5892ffd9350863705bba2f30beb9dd3d1655b /system/lib/libFFTEm.so d205648fbb7ca62dfc090ba77a9350870e996b59 /system/lib/libstagefright_soft_amrdec.so 48536564e2244d05af7536057895ec289b38a9da /system/lib/libWnnEngDic.so 0479928f7e103b0a13b9511de4e962fd978fe5a5 /system/lib/libskia.so 7a64ee04a64c82e6d3ffcdcdfcb8d312ac87c979 /system/lib/libcameraservice.so 02258d952c22630e9c40137e981893bda1d25f51 /system/lib/libOMX.SEC.AVC.Encoder.so 66d96958143e71144ac0d04a7506d2fd3b5eb501 /system/lib/libvideoeditorplayer.so 47fec7637670d351d95b982fd680e7d208e94331 /system/lib/libext2_profile.so 8348405a2617ba83a2a25f3f654f31335e13a2a0 /system/lib/libOMX.SEC.M4V.Encoder.so 123ce0d9b6f7a0ce93834c2de48bfe4e3fda285c /system/lib/libsystem_server.so 44237b2a6f56c89692e3ffbb21030273fc8914a6 /system/lib/libbluetoothd.so 8812f6b29f661ab6a47f18d7e4ced577ba41fdcd /system/lib/libbcinfo.so 79413ea98bfe2bc9bad7bfd7dd041a9b7614c41e /system/lib/libinput.so fbd929c5de843cd70911ff0094867b88956aea11 /system/lib/libctest.so a0a33000cdd5946da28fca2ee3333d6ab8773a78 /system/lib/libOpenSLES.so b306dffc88e678ba582bd55a9a8284ff66543b74 /system/lib/egl/egl.cfg 4d50747fefcca7d073d1e8a0b79c06ce5d83cc7d /system/lib/egl/libGLES_android.so 7a4ac57ffe0dca1cb955ff1f75e2d403ce5915d3 /system/lib/libsurfaceflinger.so 0e3612154128a06bcb6bcc6cd74a4e20bbc77d0f /system/lib/libui.so ba72369aefb074e3c3495a3e91ed07dfad11c138 /system/lib/libdvm.so a76008d1a70e06121c28b5dcda977f64b2e92a99 /system/lib/libOMX.SEC.M4V.Decoder.so 894c346fd5f0317528097bcb54a94acb925ed66c /system/lib/libstagefright.so 29578261ae508e9fe446d2657bc2ba8afab328b4 /system/lib/libexpat.so e762fca8ce1f7325560b5128236ed671ffe62d73 /system/lib/libwpa_client.so 0ce21914e07211152b9afcf1476ea9046e7290a8 /system/lib/libttscompat.so 0249f1061883156a62bca5b6a2d7f6d750129626 /system/lib/libnfc_jni.so 757aeb46b59d8631ef81ef6b67d1cc60d801daa1 /system/lib/soundfx/libreverbwrapper.so 0c58199b5047749ee85e8d74f63cc36fa8dc8b57 /system/lib/soundfx/libbundlewrapper.so d0b8da83859b446e8373437cd99468b4a0a02fe9 /system/lib/soundfx/libaudiopreprocessing.so 592e53ac441fdd3090ed5b5235675f1a52d0a2e7 /system/lib/soundfx/libvisualizer.so 242887595ca616f1fbff3aaaea803b1afb879fe0 /system/lib/libgui.so f8629d039f8763691d0ee395ae3b9842e64e302a /system/lib/libaudioeffect_jni.so cab444c9afa2e36a5c59c17ddfee0554db5e300d /system/lib/libandroid_servers.so 917c61b39d0fb4df48182d378c0f7fc664f33de0 /system/lib/libandroid_runtime.so e718e6769456bc1bd5c4c1e2d979352af93921a2 /system/lib/libhardware_legacy.so b67671f8bbc36f3323120e1fb02252eee18d2ae0 /system/lib/libstagefright_omx.so 08d18209d20afd6ba6dc5cd72af1d8b20fd00bbc /system/lib/libwilhelm.so 07c11ebc4752522e114e8515914d5f55915ab49a /system/lib/libdrm1_jni.so ed5849f6fd52f641c20f5ad7fe93456666f90df1 /system/lib/libtinyalsa.so 1f012d7309c45d878de67396285d1f65f4c0973d /system/lib/libdrm1.so 841ff99cfb2e6563d8abc421eb621aefe5816a5d /system/lib/libstagefright_soft_h264dec.so 4c31173ec1c867b21fbef938aee8ce4292d22f0a /system/lib/libext4_utils.so 00338e1e7edda9405fb19f9f80eb0b282417a608 /system/lib/libpower.so 3dd509ce82fa5201e3f0333c153bdf63d18d2952 /system/lib/libchromium_net.so 47db619a6ce4952c43aa33311f4397e81320c3f9 /system/lib/libvideoeditor_jni.so 22c9d8acd7c768e4f0e3b2b4a89315ad369476f4 /system/lib/libbluetooth.so d6c575728925efa4a53a7c690c4facaf6f70099a /system/lib/libpagemap.so 394799768ac07cc3ab909afd2e58d2a2551bd993 /system/lib/libdrmframework.so c48efc16920c468ebce152df92883259fcd79c71 /system/lib/libeffects.so c8c9728e04eddd40515231af248b92d53d7e5748 /system/lib/libstlport.so 4f7fa232df107cefeca44547928267f39368e0f5 /system/lib/libdl.so 92aa66ff903957b4ba32c3343d7af22360ca1428 /system/lib/libwebrtc_audio_preprocessing.so 78ef4160bb40c484454d3ef7ee07d0153c5456f3 /system/lib/libmedia_jni.so 8f85fb9645dcd0ffd0ab4a05841fe3a5f2570d79 /system/lib/libwebcore.so c57dce2036fe70c9378cffe38c5b7e3de48c6b81 /system/lib/libGLESv2_dbg.so c7d28d96e993cf7fb32cb1608f8b67579e2eab84 /system/lib/libGLESv2.so 51cb20b37c28b3690f92a8cc7b6f0084cdedd417 /system/lib/hw/nfc.herring.so f38ced47c20d270cb40f58d79886d5cbd8c67e48 /system/lib/hw/audio.primary.herring.so 844272b1a82cbe7f7bda1806644c5dcaca86b657 /system/lib/hw/gralloc.default.so a6790b23307be7cb817cf88decd9d3c335d11c0e /system/lib/hw/audio_policy.herring.so a77bad78910f39ad426242d8d8a7d0d5df043188 /system/lib/hw/camera.herring.so 4f5c6c39c515e941a614991dd9fe1c963bfccf79 /system/lib/hw/audio.primary.default.so 8e97370c698fd33ae2ecfd5c25354901327c1800 /system/lib/hw/camera.goldfish.so 69bbf2e5d9fb4953687b14fdb21a807e408f7092 /system/lib/hw/audio.a2dp.default.so 4a8dacfd432fa4bc8a720f27397c9a4f3703aef4 /system/lib/hw/lights.s5pc110.so 33804e261c213fb847b96557fc1cad7ec1a564a1 /system/lib/hw/audio_policy.default.so e4b82202be4a060f91d6c28f44d892b250cf6a47 /system/lib/hw/hwcomposer.s5pc110.so 1071e36da59ace4169c138118eb72d1f38375fcf /system/lib/hw/gps.goldfish.so 9cfd267a6f6c15b99403c3b0eb0304417cf1f3e8 /system/lib/hw/sensors.goldfish.so 3ee28ec356ffa83b698f7d703605b03e37f182cf /system/lib/hw/sensors.herring.so 9c933cfaf4d7a3fd75ff3fd3ba1f5c99fb61aea4 /system/lib/hw/lights.goldfish.so 5ce97f2a4245d7acb2b1a1319a5415a98c00fbf3 /system/lib/libjpeg.so bdb88fe8732a0dce2fa7338b7a1c7b3ad55fe1b3 /system/lib/libglib.so 43b7bbb92a37d689b000d971c29795f4808474c8 /system/lib/libdiskconfig.so e0a86139ce1c36aebc4bc9a677f9120ace45522c /system/lib/libbcc.so 8008001ef050fc13eda0c3c542dcdea354106a50 /system/lib/libutils.so 49ea83ebe8c6b0811e599d3d400f79c415f5c80a /system/lib/libvorbisidec.so 6b2f23794ea0b13d13e8d1fb1e72b5d54c371747 /system/lib/libnfc.so 4a32babd8ed1b124005706f6a40709396cfd021e /system/lib/bluez-plugin/input.so c526503459dfc2bf9ee222e54d2ca63f84c2f2e6 /system/lib/bluez-plugin/bluetooth-health.so 405d65ac52c5b7c91adaf16dfa8e1cb51308f890 /system/lib/bluez-plugin/audio.so 492a454e9c5e39945877885b938cb382d13b1272 /system/lib/bluez-plugin/network.so 3d115ad393d11a8ca05cd47459374f491c662871 /system/lib/libdbus.so 49bf20cf4bac139cea4c9e4bcb75f2ef60729a51 /system/lib/libsensorservice.so b82a4abc809937bcb0aec3fc2228b2af37674c11 /system/lib/libstagefright_soft_mpeg4dec.so e5614f2cf47c4814eaaefb642332a93636814af6 /system/lib/libstagefright_amrnb_common.so e6081dfb53f2f5f0fda0e22edd56bdbb5aeeaf95 /system/lib/libcamera_client.so d9dbdaaf42af5c77452406ecf2abb9b31faf6843 /system/lib/libsrec_jni.so 8d06dc316c4209c18048a1bd2e4eb65a229705c3 /system/lib/libcrypto.so aca58b6b72c7b2016d8141d0e26de26b9c9d30e2 /system/lib/libicuuc.so ef7007d17bde7e5e4883cf74d580bd892c08ff55 /system/lib/libext2_e2p.so c8eee6f7fa24e916d0848203c574c3d1e95b3e5a /system/lib/libc_malloc_debug_leak.so 0e754257ff0d01a1e809ea1ea084a4c2cb749a37 /system/lib/libiprouteutil.so 9c52922eeed75e9abc501fd45851404200bd8266 /system/lib/libjnigraphics.so 1ba961165e656e8eae3c320834b7609841410546 /system/lib/libaudioutils.so 60ea6b5440f8011ce001cdb2daf4b129bc025215 /system/lib/libSR_AudioIn.so 98e47e448c4b537db2bb907154c106eae133fcc1 /system/lib/libETC1.so f5ed26d3ca63400a6d43b907b3f7369c2d7fc57c /system/lib/libc_malloc_debug_qemu.so 43786af19f6d1cd757472331590188e2a6b53afb /system/lib/libnetutils.so fff5e5b88dcd10ba706cd6c35a20addc550e4abe /system/lib/libharfbuzz.so 49747238cfdd060c99bce5ab2f626b9ff675967f /system/lib/libsecril-client.so ca76d330b5ec8fc0a507369c31e8f9ce234bc7a2 /system/lib/libOMX.SEC.AVC.Decoder.so 4c067b2b0d08c26159ef7824401ce70bb228e983 /system/lib/libicui18n.so aeabcd0ff2460abb58dba8db5b97344de9340f28 /system/lib/libext2fs.so 9ed07dad377e80ad913490f374709842aa56687c /system/lib/libexif.so 71bda6b2c596982208c5326087494d3e31969a74 /system/lib/libmedia.so 9ff9429dce4c474b6bcf87f89ae93ab9b481b247 /system/lib/libandroid.so f63609ac8d0297aa774405bdff66e41434258829 /system/lib/drm/libfwdlockengine.so c139f2aeeb4dc0e7d1dfb760e881f332e5df947f /system/lib/libEGL.so dce1f3e3349c5aa7c9864661f68de0ba6f9ed960 /system/lib/libbluedroid.so 4e56d57bac668d054339cedb17a04a4112703c64 /system/lib/libstagefright_foundation.so 676f4b61281a304adcb7564b0cc7cc86bc4e7c3e /system/lib/libGLESv1_CM.so c95db97407430746a789d3c063f31885a0a38204 /system/lib/libjni_latinime.so dca61bf57ef76d665f291ee41655d05a51e41c7a /system/lib/libstagefright_enc_common.so 6f63373abb5504982603a71c00585c00a4d38e18 /system/lib/libttspico.so fdbc215d0bf4d32c2226ad2eeb05c8af400c055a /system/lib/libusbhost.so a49530e273480a400b16e373eb2933c183ff3587 /system/lib/libmtp.so ee4c51abb8d362944c61ebe81c75c016bbdd00a6 /system/lib/libcutils.so fbd8fd369f0e8629e6ef9b5cc5a1fec2cb81bd86 /system/lib/liblog.so d9eccfb9e338b2b1d3f5f6acff9500eca8a369fa /system/lib/libc.so bcd1339c098c346c0982bcd42f11518bf70f2ce7 /system/lib/libbinder.so b78cf9234d01ffe6e61d11f4bee0d9f9878970d9 /system/lib/librtp_jni.so a24e2e6386fba2d4f0e52ce7ef18ad36224db235 /system/lib/libdrmframework_jni.so ec2ded5bfc8168dfc5f87671ab00c709a69c11b4 /system/lib/libsysutils.so 524f6ff488f9f6627430fb55764e540e6d792472 /system/lib/libext2_com_err.so b9d60c4852cca097969db78202924860fa08c532 /system/lib/libspeexresampler.so 524334257b87c352b9835161df0d2f8bd54573b5 /system/lib/libstagefright_soft_vorbisdec.so 1a5a90a8a21cf76d8077564f9f94e7b474106cdf /system/lib/libext2_uuid.so 85d78fe8b4eb7d220bae92411bf5494fffd27bfb /system/lib/libfilterfw.so 82912f4b30df7650ea8fa21aae0f73f68cf31e1a /system/lib/libmediaplayerservice.so 5f9a45918c28ff5f72dbeeaae166cb2b8e23f00e /system/lib/libOpenMAXAL.so 484fa267f7a3b2ec9151e6c0319615b8a4c5d477 /system/lib/libssl.so 2a000f0891605179c9713055cb71d0f7836b6348 /system/lib/libstagefright_yuv.so aa3f2ae22ad4152b28e5ec7568047e3546785931 /system/lib/libz.so 341286f98a455daf3e7283e9bd90e065800ded38 /system/lib/libsonivox.so fff1920ab99925168d968e4aea8dfe2a8bad9f22 /system/lib/libstagefright_soft_vpxdec.so 41a2e328f93de570a97f8cf4f854983fee9fb919 /system/lib/libclcore.bc a1e2610fdc0c2ef151248092fa32be807d1b983d /system/lib/libstagefright_soft_aacdec.so 8d3e2e2ad9f6f7576d69d46c2e44cf36323dc2ca /system/lib/libsurfaceflinger_client.so 12ba180d276b44d96e23f91c3d328f6ffdeed0eb /system/lib/libnetlink.so 984b69f6ac2cfcebe6f1cd7c517cd0a753933d07 /system/lib/libstagefright_avc_common.so 513fc8b1dc28c59859fd615dcb7ff23453dcbba6 /system/lib/libaudioflinger.so 92d44f8380cef98be2312ccc6424ad1519408c1e /system/lib/libreference-ril.so 5e3f8dc54c7d3988f4efcc527827ae282bff1c01 /system/lib/libstagefright_soft_g711dec.so bf0a19063e6dbf7d27ebf2864be85e69b682b5f2 /system/lib/libsqlite.so de9f83f35a5331b748f841274b5ace3a40bf4f96 /system/lib/libstagefright_soft_mp3dec.so 788827a9d0aa25d978e0438a98f90027828301bf /system/lib/libnativehelper.so 93012e7952de63e0d135eda13c5fe81013f429b5 /system/lib/libstagefrighthw.so 9febb1608223ffff6de8242fd992493b02de86fe /system/lib/libvariablespeed.so fa5453fd5509d21cc786c372d4078b2f64e16d14 /system/lib/libSEC_OMX_Core.so 0ddc0742a0530eccf78682465a02d8080aa9bd82 /system/lib/libbtio.so 50bc7fa64e1c38db3da0874cec7f333ab79be543 /system/lib/libhardware.so 7b7bf794a080c86188286e1659b76d23f541cd6a /system/lib/librs_jni.so 7c6c4dbbd63d5caa91f109d4fc0f5e7fe24c0eb4 /system/lib/libemoji.so 5425905ee8f2e3f2d0e620d0f43fded0238c9ce1 /system/lib/libpowermanager.so 64e41a6be4a18e1a759d16efdbb308c64fe917b7 /system/lib/libgabi++.so 3967faff8029e179dd87367f0556ea600c6fcb83 /system/lib/libbcc.so.sha1 925f36b279ff57ed8b31b51ae1382e97465b6c0c /system/lib/libext2_blkid.so 1c959589996f9dd25fafceeee03fe4cde5611f0e /system/lib/libpixelflinger.so 135aefc8f8dafdfe5e7db71501006f309b25257b /system/lib/libstdc++.so 886dc19f381fafec376dc1f292aa1f0383e63bf2 /system/lib/libm.so c763a2b65489fea3335ea77d697a98498a63413e /system/lib/libthread_db.so 8bd44c66b1bf7b3f44ccab084407aebefdc17648
Click to expand...
Click to collapse

djjonastybe said:
In my opinion it is the right since it's related to development. If you ask this in the Q&A section you never get an answer.
Click to expand...
Click to collapse
1 - 0 for you .
Good luck with you rom
Sent from my Nexus S using xda premium

assert(!less_than_int(1325606577, getprop("ro.build.date.utc")));
assert(getprop("ro.product.device") == "crespo" ||
getprop("ro.build.product") == "crespo");
show_progress(0.500000, 0);
format("ext4", "EMMC", "/dev/block/platform/s3c-sdhci.0/by-name/system", "0");
mount("ext4", "EMMC", "/dev/block/platform/s3c-sdhci.0/by-name/system", "/system");
package_extract_dir("recovery", "/system");
package_extract_dir("system", "/system");
symlink("Roboto-Bold.ttf", "/system/fonts/DroidSans-Bold.ttf");
symlink("Roboto-Regular.ttf", "/system/fonts/DroidSans.ttf");
symlink("mksh", "/system/bin/sh");
symlink("toolbox", "/system/bin/cat", "/system/bin/chmod",
"/system/bin/chown", "/system/bin/cmp", "/system/bin/date",
"/system/bin/dd", "/system/bin/df", "/system/bin/dmesg",
"/system/bin/getevent", "/system/bin/getprop", "/system/bin/hd",
"/system/bin/id", "/system/bin/ifconfig", "/system/bin/iftop",
"/system/bin/insmod", "/system/bin/ioctl", "/system/bin/ionice",
"/system/bin/kill", "/system/bin/ln", "/system/bin/log",
"/system/bin/ls", "/system/bin/lsmod", "/system/bin/lsof",
"/system/bin/mkdir", "/system/bin/mount", "/system/bin/mv",
"/system/bin/nandread", "/system/bin/netstat",
"/system/bin/newfs_msdos", "/system/bin/notify", "/system/bin/printenv",
"/system/bin/ps", "/system/bin/r", "/system/bin/reboot",
"/system/bin/renice", "/system/bin/rm", "/system/bin/rmdir",
"/system/bin/rmmod", "/system/bin/route", "/system/bin/schedtop",
"/system/bin/sendevent", "/system/bin/setconsole",
"/system/bin/setprop", "/system/bin/sleep", "/system/bin/smd",
"/system/bin/start", "/system/bin/stop", "/system/bin/sync",
"/system/bin/top", "/system/bin/touch", "/system/bin/umount",
"/system/bin/uptime", "/system/bin/vmstat", "/system/bin/watchprops",
"/system/bin/wipe");
retouch_binaries("/system/lib/libril.so", "5c5ecbd5bec3083fd3462407d1dbb6cc1c1cde33", "/system/lib/libhwui.so", "d36feb80018b476875bb9bb2a6c9e9977f3d0b1b", "/system/lib/libjni_mosaic.so", "0db4a6633c3d70302044c656bea4f6e8da877ebf", "/system/lib/libsoundpool.so", "4d4caff3b23123b829071fa61515a2b33a89140e", "/system/lib/libs3cjpeg.so", "e91ca63b991708a938ff01ef4f1765302cc65acd", "/system/lib/libsqlite_jni.so", "760a909fe3bbe066f7bd213cff0734977e2feb25", "/system/lib/libfilterpack_imageproc.so", "08b8d60475bb0f345b52f608890ead97f9ddcb45", "/system/lib/libwnndict.so", "19bbfd314d2b8b8110a12e207fc7cd2653a13d61", "/system/lib/libWnnJpnDic.so", "0587b63761fd97847b1ce8a32228503d39f0fb7c", "/system/lib/libdefcontainer_jni.so", "562b6b8f9c7c5ffb666d0edf74cc93a5dfae9d6c", "/system/lib/libnfc_ndef.so", "15d024475cb42c58378d70670e4ebeb8ca0682e6", "/system/lib/libRS.so", "9cb5892ffd9350863705bba2f30beb9dd3d1655b", "/system/lib/libFFTEm.so", "d205648fbb7ca62dfc090ba77a9350870e996b59", "/system/lib/libstagefright_soft_amrdec.so", "48536564e2244d05af7536057895ec289b38a9da", "/system/lib/libWnnEngDic.so", "0479928f7e103b0a13b9511de4e962fd978fe5a5", "/system/lib/libskia.so", "7a64ee04a64c82e6d3ffcdcdfcb8d312ac87c979", "/system/lib/libcameraservice.so", "02258d952c22630e9c40137e981893bda1d25f51", "/system/lib/libOMX.SEC.AVC.Encoder.so", "66d96958143e71144ac0d04a7506d2fd3b5eb501", "/system/lib/libvideoeditorplayer.so", "47fec7637670d351d95b982fd680e7d208e94331", "/system/lib/libext2_profile.so", "8348405a2617ba83a2a25f3f654f31335e13a2a0", "/system/lib/libOMX.SEC.M4V.Encoder.so", "123ce0d9b6f7a0ce93834c2de48bfe4e3fda285c", "/system/lib/libsystem_server.so", "44237b2a6f56c89692e3ffbb21030273fc8914a6", "/system/lib/libbluetoothd.so", "8812f6b29f661ab6a47f18d7e4ced577ba41fdcd", "/system/lib/libbcinfo.so", "79413ea98bfe2bc9bad7bfd7dd041a9b7614c41e", "/system/lib/libinput.so", "fbd929c5de843cd70911ff0094867b88956aea11", "/system/lib/libctest.so", "a0a33000cdd5946da28fca2ee3333d6ab8773a78", "/system/lib/libOpenSLES.so", "b306dffc88e678ba582bd55a9a8284ff66543b74", "/system/lib/egl/egl.cfg", "4d50747fefcca7d073d1e8a0b79c06ce5d83cc7d", "/system/lib/egl/libGLES_android.so", "7a4ac57ffe0dca1cb955ff1f75e2d403ce5915d3", "/system/lib/libsurfaceflinger.so", "0e3612154128a06bcb6bcc6cd74a4e20bbc77d0f", "/system/lib/libui.so", "ba72369aefb074e3c3495a3e91ed07dfad11c138", "/system/lib/libdvm.so", "a76008d1a70e06121c28b5dcda977f64b2e92a99", "/system/lib/libOMX.SEC.M4V.Decoder.so", "894c346fd5f0317528097bcb54a94acb925ed66c", "/system/lib/libstagefright.so", "29578261ae508e9fe446d2657bc2ba8afab328b4", "/system/lib/libexpat.so", "e762fca8ce1f7325560b5128236ed671ffe62d73", "/system/lib/libwpa_client.so", "0ce21914e07211152b9afcf1476ea9046e7290a8", "/system/lib/libttscompat.so", "0249f1061883156a62bca5b6a2d7f6d750129626", "/system/lib/libnfc_jni.so", "757aeb46b59d8631ef81ef6b67d1cc60d801daa1", "/system/lib/soundfx/libreverbwrapper.so", "0c58199b5047749ee85e8d74f63cc36fa8dc8b57", "/system/lib/soundfx/libbundlewrapper.so", "d0b8da83859b446e8373437cd99468b4a0a02fe9", "/system/lib/soundfx/libaudiopreprocessing.so", "592e53ac441fdd3090ed5b5235675f1a52d0a2e7", "/system/lib/soundfx/libvisualizer.so", "242887595ca616f1fbff3aaaea803b1afb879fe0", "/system/lib/libgui.so", "f8629d039f8763691d0ee395ae3b9842e64e302a", "/system/lib/libaudioeffect_jni.so", "cab444c9afa2e36a5c59c17ddfee0554db5e300d", "/system/lib/libandroid_servers.so", "917c61b39d0fb4df48182d378c0f7fc664f33de0", "/system/lib/libandroid_runtime.so", "e718e6769456bc1bd5c4c1e2d979352af93921a2", "/system/lib/libhardware_legacy.so", "b67671f8bbc36f3323120e1fb02252eee18d2ae0", "/system/lib/libstagefright_omx.so", "08d18209d20afd6ba6dc5cd72af1d8b20fd00bbc", "/system/lib/libwilhelm.so", "07c11ebc4752522e114e8515914d5f55915ab49a", "/system/lib/libdrm1_jni.so", "ed5849f6fd52f641c20f5ad7fe93456666f90df1", "/system/lib/libtinyalsa.so", "1f012d7309c45d878de67396285d1f65f4c0973d", "/system/lib/libdrm1.so", "841ff99cfb2e6563d8abc421eb621aefe5816a5d", "/system/lib/libstagefright_soft_h264dec.so", "4c31173ec1c867b21fbef938aee8ce4292d22f0a", "/system/lib/libext4_utils.so", "00338e1e7edda9405fb19f9f80eb0b282417a608", "/system/lib/libpower.so", "3dd509ce82fa5201e3f0333c153bdf63d18d2952", "/system/lib/libchromium_net.so", "47db619a6ce4952c43aa33311f4397e81320c3f9", "/system/lib/libvideoeditor_jni.so", "22c9d8acd7c768e4f0e3b2b4a89315ad369476f4", "/system/lib/libbluetooth.so", "d6c575728925efa4a53a7c690c4facaf6f70099a", "/system/lib/libpagemap.so", "394799768ac07cc3ab909afd2e58d2a2551bd993", "/system/lib/libdrmframework.so", "c48efc16920c468ebce152df92883259fcd79c71", "/system/lib/libeffects.so", "c8c9728e04eddd40515231af248b92d53d7e5748", "/system/lib/libstlport.so", "4f7fa232df107cefeca44547928267f39368e0f5", "/system/lib/libdl.so", "92aa66ff903957b4ba32c3343d7af22360ca1428", "/system/lib/libwebrtc_audio_preprocessing.so", "78ef4160bb40c484454d3ef7ee07d0153c5456f3", "/system/lib/libmedia_jni.so", "8f85fb9645dcd0ffd0ab4a05841fe3a5f2570d79", "/system/lib/libwebcore.so", "c57dce2036fe70c9378cffe38c5b7e3de48c6b81", "/system/lib/libGLESv2_dbg.so", "c7d28d96e993cf7fb32cb1608f8b67579e2eab84", "/system/lib/libGLESv2.so", "51cb20b37c28b3690f92a8cc7b6f0084cdedd417", "/system/lib/hw/nfc.herring.so", "f38ced47c20d270cb40f58d79886d5cbd8c67e48", "/system/lib/hw/audio.primary.herring.so", "844272b1a82cbe7f7bda1806644c5dcaca86b657", "/system/lib/hw/gralloc.default.so", "a6790b23307be7cb817cf88decd9d3c335d11c0e", "/system/lib/hw/audio_policy.herring.so", "a77bad78910f39ad426242d8d8a7d0d5df043188", "/system/lib/hw/camera.herring.so", "4f5c6c39c515e941a614991dd9fe1c963bfccf79", "/system/lib/hw/audio.primary.default.so", "8e97370c698fd33ae2ecfd5c25354901327c1800", "/system/lib/hw/camera.goldfish.so", "69bbf2e5d9fb4953687b14fdb21a807e408f7092", "/system/lib/hw/audio.a2dp.default.so", "4a8dacfd432fa4bc8a720f27397c9a4f3703aef4", "/system/lib/hw/lights.s5pc110.so", "33804e261c213fb847b96557fc1cad7ec1a564a1", "/system/lib/hw/audio_policy.default.so", "e4b82202be4a060f91d6c28f44d892b250cf6a47", "/system/lib/hw/hwcomposer.s5pc110.so", "1071e36da59ace4169c138118eb72d1f38375fcf", "/system/lib/hw/gps.goldfish.so", "9cfd267a6f6c15b99403c3b0eb0304417cf1f3e8", "/system/lib/hw/sensors.goldfish.so", "3ee28ec356ffa83b698f7d703605b03e37f182cf", "/system/lib/hw/sensors.herring.so", "9c933cfaf4d7a3fd75ff3fd3ba1f5c99fb61aea4", "/system/lib/hw/lights.goldfish.so", "5ce97f2a4245d7acb2b1a1319a5415a98c00fbf3", "/system/lib/libjpeg.so", "bdb88fe8732a0dce2fa7338b7a1c7b3ad55fe1b3", "/system/lib/libglib.so", "43b7bbb92a37d689b000d971c29795f4808474c8", "/system/lib/libdiskconfig.so", "e0a86139ce1c36aebc4bc9a677f9120ace45522c", "/system/lib/libbcc.so", "8008001ef050fc13eda0c3c542dcdea354106a50", "/system/lib/libutils.so", "49ea83ebe8c6b0811e599d3d400f79c415f5c80a", "/system/lib/libvorbisidec.so", "6b2f23794ea0b13d13e8d1fb1e72b5d54c371747", "/system/lib/libnfc.so", "4a32babd8ed1b124005706f6a40709396cfd021e", "/system/lib/bluez-plugin/input.so", "c526503459dfc2bf9ee222e54d2ca63f84c2f2e6", "/system/lib/bluez-plugin/bluetooth-health.so", "405d65ac52c5b7c91adaf16dfa8e1cb51308f890", "/system/lib/bluez-plugin/audio.so", "492a454e9c5e39945877885b938cb382d13b1272", "/system/lib/bluez-plugin/network.so", "3d115ad393d11a8ca05cd47459374f491c662871", "/system/lib/libdbus.so", "49bf20cf4bac139cea4c9e4bcb75f2ef60729a51", "/system/lib/libsensorservice.so", "b82a4abc809937bcb0aec3fc2228b2af37674c11", "/system/lib/libstagefright_soft_mpeg4dec.so", "e5614f2cf47c4814eaaefb642332a93636814af6", "/system/lib/libstagefright_amrnb_common.so", "e6081dfb53f2f5f0fda0e22edd56bdbb5aeeaf95", "/system/lib/libcamera_client.so", "d9dbdaaf42af5c77452406ecf2abb9b31faf6843", "/system/lib/libsrec_jni.so", "8d06dc316c4209c18048a1bd2e4eb65a229705c3", "/system/lib/libcrypto.so", "aca58b6b72c7b2016d8141d0e26de26b9c9d30e2", "/system/lib/libicuuc.so", "ef7007d17bde7e5e4883cf74d580bd892c08ff55", "/system/lib/libext2_e2p.so", "c8eee6f7fa24e916d0848203c574c3d1e95b3e5a", "/system/lib/libc_malloc_debug_leak.so", "0e754257ff0d01a1e809ea1ea084a4c2cb749a37", "/system/lib/libiprouteutil.so", "9c52922eeed75e9abc501fd45851404200bd8266", "/system/lib/libjnigraphics.so", "1ba961165e656e8eae3c320834b7609841410546", "/system/lib/libaudioutils.so", "60ea6b5440f8011ce001cdb2daf4b129bc025215", "/system/lib/libSR_AudioIn.so", "98e47e448c4b537db2bb907154c106eae133fcc1", "/system/lib/libETC1.so", "f5ed26d3ca63400a6d43b907b3f7369c2d7fc57c", "/system/lib/libc_malloc_debug_qemu.so", "43786af19f6d1cd757472331590188e2a6b53afb", "/system/lib/libnetutils.so", "fff5e5b88dcd10ba706cd6c35a20addc550e4abe", "/system/lib/libharfbuzz.so", "49747238cfdd060c99bce5ab2f626b9ff675967f", "/system/lib/libsecril-client.so", "ca76d330b5ec8fc0a507369c31e8f9ce234bc7a2", "/system/lib/libOMX.SEC.AVC.Decoder.so", "4c067b2b0d08c26159ef7824401ce70bb228e983", "/system/lib/libicui18n.so", "aeabcd0ff2460abb58dba8db5b97344de9340f28", "/system/lib/libext2fs.so", "9ed07dad377e80ad913490f374709842aa56687c", "/system/lib/libexif.so", "71bda6b2c596982208c5326087494d3e31969a74", "/system/lib/libmedia.so", "9ff9429dce4c474b6bcf87f89ae93ab9b481b247", "/system/lib/libandroid.so", "f63609ac8d0297aa774405bdff66e41434258829", "/system/lib/drm/libfwdlockengine.so", "c139f2aeeb4dc0e7d1dfb760e881f332e5df947f", "/system/lib/libEGL.so", "dce1f3e3349c5aa7c9864661f68de0ba6f9ed960", "/system/lib/libbluedroid.so", "4e56d57bac668d054339cedb17a04a4112703c64", "/system/lib/libstagefright_foundation.so", "676f4b61281a304adcb7564b0cc7cc86bc4e7c3e", "/system/lib/libGLESv1_CM.so", "c95db97407430746a789d3c063f31885a0a38204", "/system/lib/libjni_latinime.so", "dca61bf57ef76d665f291ee41655d05a51e41c7a", "/system/lib/libstagefright_enc_common.so", "6f63373abb5504982603a71c00585c00a4d38e18", "/system/lib/libttspico.so", "fdbc215d0bf4d32c2226ad2eeb05c8af400c055a", "/system/lib/libusbhost.so", "a49530e273480a400b16e373eb2933c183ff3587", "/system/lib/libmtp.so", "ee4c51abb8d362944c61ebe81c75c016bbdd00a6", "/system/lib/libcutils.so", "fbd8fd369f0e8629e6ef9b5cc5a1fec2cb81bd86", "/system/lib/liblog.so", "d9eccfb9e338b2b1d3f5f6acff9500eca8a369fa", "/system/lib/libc.so", "bcd1339c098c346c0982bcd42f11518bf70f2ce7", "/system/lib/libbinder.so", "b78cf9234d01ffe6e61d11f4bee0d9f9878970d9", "/system/lib/librtp_jni.so", "a24e2e6386fba2d4f0e52ce7ef18ad36224db235", "/system/lib/libdrmframework_jni.so", "ec2ded5bfc8168dfc5f87671ab00c709a69c11b4", "/system/lib/libsysutils.so", "524f6ff488f9f6627430fb55764e540e6d792472", "/system/lib/libext2_com_err.so", "b9d60c4852cca097969db78202924860fa08c532", "/system/lib/libspeexresampler.so", "524334257b87c352b9835161df0d2f8bd54573b5", "/system/lib/libstagefright_soft_vorbisdec.so", "1a5a90a8a21cf76d8077564f9f94e7b474106cdf", "/system/lib/libext2_uuid.so", "85d78fe8b4eb7d220bae92411bf5494fffd27bfb", "/system/lib/libfilterfw.so", "82912f4b30df7650ea8fa21aae0f73f68cf31e1a", "/system/lib/libmediaplayerservice.so", "5f9a45918c28ff5f72dbeeaae166cb2b8e23f00e", "/system/lib/libOpenMAXAL.so", "484fa267f7a3b2ec9151e6c0319615b8a4c5d477", "/system/lib/libssl.so", "2a000f0891605179c9713055cb71d0f7836b6348", "/system/lib/libstagefright_yuv.so", "aa3f2ae22ad4152b28e5ec7568047e3546785931", "/system/lib/libz.so", "341286f98a455daf3e7283e9bd90e065800ded38", "/system/lib/libsonivox.so", "fff1920ab99925168d968e4aea8dfe2a8bad9f22", "/system/lib/libstagefright_soft_vpxdec.so", "41a2e328f93de570a97f8cf4f854983fee9fb919", "/system/lib/libclcore.bc", "a1e2610fdc0c2ef151248092fa32be807d1b983d", "/system/lib/libstagefright_soft_aacdec.so", "8d3e2e2ad9f6f7576d69d46c2e44cf36323dc2ca", "/system/lib/libsurfaceflinger_client.so", "12ba180d276b44d96e23f91c3d328f6ffdeed0eb", "/system/lib/libnetlink.so", "984b69f6ac2cfcebe6f1cd7c517cd0a753933d07", "/system/lib/libstagefright_avc_common.so", "513fc8b1dc28c59859fd615dcb7ff23453dcbba6", "/system/lib/libaudioflinger.so", "92d44f8380cef98be2312ccc6424ad1519408c1e", "/system/lib/libreference-ril.so", "5e3f8dc54c7d3988f4efcc527827ae282bff1c01", "/system/lib/libstagefright_soft_g711dec.so", "bf0a19063e6dbf7d27ebf2864be85e69b682b5f2", "/system/lib/libsqlite.so", "de9f83f35a5331b748f841274b5ace3a40bf4f96", "/system/lib/libstagefright_soft_mp3dec.so", "788827a9d0aa25d978e0438a98f90027828301bf", "/system/lib/libnativehelper.so", "93012e7952de63e0d135eda13c5fe81013f429b5", "/system/lib/libstagefrighthw.so", "9febb1608223ffff6de8242fd992493b02de86fe", "/system/lib/libvariablespeed.so", "fa5453fd5509d21cc786c372d4078b2f64e16d14", "/system/lib/libSEC_OMX_Core.so", "0ddc0742a0530eccf78682465a02d8080aa9bd82", "/system/lib/libbtio.so", "50bc7fa64e1c38db3da0874cec7f333ab79be543", "/system/lib/libhardware.so", "7b7bf794a080c86188286e1659b76d23f541cd6a", "/system/lib/librs_jni.so", "7c6c4dbbd63d5caa91f109d4fc0f5e7fe24c0eb4", "/system/lib/libemoji.so", "5425905ee8f2e3f2d0e620d0f43fded0238c9ce1", "/system/lib/libpowermanager.so", "64e41a6be4a18e1a759d16efdbb308c64fe917b7", "/system/lib/libgabi++.so", "3967faff8029e179dd87367f0556ea600c6fcb83", "/system/lib/libbcc.so.sha1", "925f36b279ff57ed8b31b51ae1382e97465b6c0c", "/system/lib/libext2_blkid.so", "1c959589996f9dd25fafceeee03fe4cde5611f0e", "/system/lib/libpixelflinger.so", "135aefc8f8dafdfe5e7db71501006f309b25257b", "/system/lib/libstdc++.so", "886dc19f381fafec376dc1f292aa1f0383e63bf2", "/system/lib/libm.so", "c763a2b65489fea3335ea77d697a98498a63413e", "/system/lib/libthread_db.so", "8bd44c66b1bf7b3f44ccab084407aebefdc17648");
set_perm_recursive(0, 0, 0755, 0644, "/system");
set_perm_recursive(0, 2000, 0755, 0755, "/system/bin");
set_perm(0, 3003, 02750, "/system/bin/netcfg");
set_perm(0, 3004, 02755, "/system/bin/ping");
set_perm(0, 2000, 06750, "/system/bin/run-as");
set_perm_recursive(1002, 1002, 0755, 0440, "/system/etc/bluetooth");
set_perm(0, 0, 0755, "/system/etc/bluetooth");
set_perm(1000, 1000, 0640, "/system/etc/bluetooth/auto_pairing.conf");
set_perm(3002, 3002, 0444, "/system/etc/bluetooth/blacklist.conf");
set_perm(1002, 1002, 0440, "/system/etc/dbus.conf");
set_perm(1014, 2000, 0550, "/system/etc/dhcpcd/dhcpcd-run-hooks");
set_perm(0, 2000, 0550, "/system/etc/init.goldfish.sh");
set_perm(0, 0, 0544, "/system/etc/install-recovery.sh");
set_perm_recursive(0, 0, 0755, 0555, "/system/etc/ppp");
set_perm(0, 2000, 0755, "/system/vendor");
set_perm_recursive(0, 2000, 0755, 0755, "/system/vendor/bin");
set_perm_recursive(0, 2000, 0755, 0644, "/system/vendor/etc");
set_perm(0, 0, 0644, "/system/vendor/etc/gps.xml");
set_perm(0, 2000, 0755, "/system/vendor/firmware");
set_perm(0, 2000, 0755, "/system/vendor/lib");
set_perm(0, 2000, 0755, "/system/vendor/lib/egl");
set_perm(0, 2000, 0755, "/system/vendor/lib/hw");
set_perm_recursive(0, 2000, 0755, 0755, "/system/xbin");
set_perm(0, 0, 06755, "/system/xbin/librank");
set_perm(0, 0, 06755, "/system/xbin/procmem");
set_perm(0, 0, 06755, "/system/xbin/procrank");
set_perm(0, 0, 06755, "/system/xbin/su");
show_progress(0.200000, 0);
show_progress(0.200000, 10);
write_raw_image(package_extract_file("boot.img"), "boot");
show_progress(0.100000, 0);
unmount("/system");
Click to expand...
Click to collapse
This is my original updater-script file. Maybe someone here can see if it's right. But it looks ok to me.

djjonastybe said:
This is my original updater-script file. Maybe someone here can see if it's right. But it looks ok to me.
Click to expand...
Click to collapse
Did you try what I suggested, that should have solved your problem.

I am still redownloading all source files. My VM crashed yesterday. So I have to redownload everything.
It can take lots of hours. Last time it took like 6 hours.

djjonastybe said:
I am still redownloading all source files. My VM crashed yesterday. So I have to redownload everything.
It can take lots of hours. Last time it took like 6 hours.
Click to expand...
Click to collapse
I am not a fan of compiling it in VM. You haven't considered a dual boot with linux? that would faster.

yeah but I like to play counter strike source meanwhile compiling Since it takes a long time...
And I dont know if bumblebee project is compatible with the 10.04 LTS release ? normally it should
I wonder how decreasing from 2048 to 1024 can solve that kind of problem. Is that all I have to do?

Related

Download Sprint 2.27.651.6 Update Here For Testing

Warning!!! Do not install if you want to keep root!!!
With that out of the way, I am posting this for anyone that wants to tear it apart and tell us exactly what this does. We know it patches the recent 2.1 root exploit, but does it do anything else?
I am uploading the exact file that my phone downloaded OTA for anyone who wants to look through it.
We now have 4 seperate posts in three (3) different sub's.
Does ANYONE use search before posting anymore?
After getting the Hero Forums seperate, it seems we get more and more of these double,triple, quad posts than before.
Just my 0.02
bubbacs1 said:
We now have 4 seperate posts in three (3) different sub's.
Does ANYONE use search before posting anymore?
After getting the Hero Forums seperate, it seems we get more and more of these double,triple, quad posts than before.
Just my 0.02
Click to expand...
Click to collapse
Why ***** about it???? its gonna keep Happening
bubbacs1 said:
We now have 4 seperate posts in three (3) different sub's.
Does ANYONE use search before posting anymore?
After getting the Hero Forums seperate, it seems we get more and more of these double,triple, quad posts than before.
Just my 0.02
Click to expand...
Click to collapse
Please, I beg of you, link me to the 4 separate posts in 3 different subforums where you can download this file for testing.
Yes, there are other threads concerning this update affecting root, how to downgrade if you did update, etc. However, this is the thread that provides the file for users to snoop through and see what all it does. This is the first time this has been posted, and I felt it deserved it's own thread. If the mods disagree, then they can merge this post with another (mostly) unrelated thread, or delete it altogether.
I'm of the opinion that if someone posts something new, it should be in a new thread.
well looking at the files it patches
system/bin/debuggerd
system/etc/security/otacerts
system/customize/MNS/default.xml
system/lib/opencore_rtsp.so
also every file in /system/framework
and updates the build.prop to reflect the update.
I'm guessing debuggerd is the main one that disables the root exploit. But I don't know since I've been rooted since 1.5 so I don't know how the new exploit works.
Here is the update script.
Code:
mount("MTD", "system", "/system");
assert(file_getprop("/system/build.prop", "ro.build.fingerprint") == "sprint/htc_heroc/heroc/heroc:2.1-update1/ERE27/169236:user/release-keys" ||
file_getprop("/system/build.prop", "ro.build.fingerprint") == "sprint/htc_heroc/heroc/heroc:2.1-update1/ERE27/169236:user/release-keys");
assert(getprop("ro.product.device") == "heroc" ||
getprop("ro.build.product") == "heroc");
ui_print("Verifying current system...");
show_progress(0.100000, 0);
assert(apply_patch_check("/system/bin/debuggerd", "ce6fb95f01f5a9b71862ccf6e081f895c0e220d1", "2ae6b87aca6c4473f4780d4ce2b8f2b8be39936d"));
set_progress(0.001011);
assert(apply_patch_check("/system/build.prop", "67f237c118d5af73f71af7630e4fe59c7155ae96", "69679987003e6012bd2d27d83fd52f7c99179f40"));
set_progress(0.001219);
assert(apply_patch_check("/system/customize/MNS/default.xml", "9e200a7e2a4253dc77ac58373cdae8b98ed49d51", "2c60d43a5669b603b2d007ac5c4edcee22e6599a"));
set_progress(0.005992);
assert(apply_patch_check("/system/etc/security/otacerts.zip", "c90533af43764c2d87acca4141cde42b47a543d2", "8372dcc231da14f77107163b4a4d4ca10b798878"));
set_progress(0.006056);
assert(apply_patch_check("/system/framework/am.jar", "b41e5cc0320f383489f144dbd3d1e75936a854b8", "cb7533a678c007dd7fd82c7a2db148c9dbc62490"));
set_progress(0.006076);
assert(apply_patch_check("/system/framework/am.odex", "0be0c8b999ed4a73139b08d557df35c0bebb1415", "5d3fb3e8589ec671bc4349a40dc4ad689daf6a15"));
set_progress(0.006920);
assert(apply_patch_check("/system/framework/android.policy.jar", "eb9f1e5117a0c13fd7129b0cb91e8e410c738bdc", "ac50c63ff745a09463a99f91ea7ee4a86298e318"));
set_progress(0.006939);
assert(apply_patch_check("/system/framework/android.policy.odex", "8dd0b527f096bb491c698f554458ebf323ec5937", "7fc293c153eccf33ddf5f71166a8ad36d695e3fd"));
set_progress(0.018669);
assert(apply_patch_check("/system/framework/android.test.runner.jar", "fdcac2b79a50c262bed63e0ccfb357268a49d701", "548d27f81751ea7f3c55cc17059ae073861047f5"));
set_progress(0.018689);
assert(apply_patch_check("/system/framework/android.test.runner.odex", "e0372aa81e892c718d9098ac06ff2e542ad3f7e7", "00628b91c88d45d5966eeb2c408b6321c823fb6a"));
set_progress(0.028288);
assert(apply_patch_check("/system/framework/bmgr.jar", "b41e5cc0320f383489f144dbd3d1e75936a854b8", "cb7533a678c007dd7fd82c7a2db148c9dbc62490"));
set_progress(0.028307);
assert(apply_patch_check("/system/framework/bmgr.odex", "4a33204d344ac9582856c08135eed612dc18d5e4", "e51d289dc39eabd5e65048067c162804ca78fc0e"));
set_progress(0.028979);
assert(apply_patch_check("/system/framework/com.htc.android.easopen.jar", "87c1fc4ce78476c91f4c01f3161d35b1648b09c0", "b8ce9d576ebe9abada46e613328ad181fc03b1fe"));
set_progress(0.028999);
assert(apply_patch_check("/system/framework/com.htc.android.easopen.odex", "c1885f72e5ee1142de943f09f19d77618a7733db", "13632aecd83b889fe35ca37340bfdd5d9b53add3"));
set_progress(0.030389);
assert(apply_patch_check("/system/framework/com.htc.android.pimlib.jar", "8ea8f2f1e71f01d5fe641d2d187b9bead8080cd7", "548d27f81751ea7f3c55cc17059ae073861047f5"));
set_progress(0.030408);
assert(apply_patch_check("/system/framework/com.htc.android.pimlib.odex", "2523d41c2d66f2f8a772e1420e3a69c17dc3f385", "ee1604618e8c43b501fbedf25f0a90c47e2bad50"));
set_progress(0.035069);
assert(apply_patch_check("/system/framework/com.htc.framework.jar", "fdcac2b79a50c262bed63e0ccfb357268a49d701", "548d27f81751ea7f3c55cc17059ae073861047f5"));
set_progress(0.035088);
assert(apply_patch_check("/system/framework/com.htc.framework.odex", "38376a1f5f7b695cbcac38ca2fe535ba3d9ea964", "7c07a4542df4a305abf3d34c7ab832d05c082fa8"));
set_progress(0.137094);
assert(apply_patch_check("/system/framework/com.scalado.util.ScaladoUtil.jar", "1aecd5fedaf8768a9073a7b0be796cabc4575c98", "36c35cd6bc8fc2de27c013b455890af7e0767e4b"));
set_progress(0.137114);
assert(apply_patch_check("/system/framework/com.scalado.util.ScaladoUtil.odex", "be671bdceb23bd20d5c235921228bebc95f0698b", "3efa0553a5b4b63c3162ebed1a357396c45a8d5b"));
set_progress(0.137481);
assert(apply_patch_check("/system/framework/core.jar", "d9c7d22b7d9a0ff164d93dbe2dd7a4a6c83e0abc", "f5bfbe8db7f95c30b73abf34eec7e8a0ae92bb09"));
set_progress(0.139889);
assert(apply_patch_check("/system/framework/core.odex", "fa51af8728bff16125eb30e0642358e9fe67c245", "89d452b584335c3e17fb80580dcd597e3db24f71"));
set_progress(0.348324);
assert(apply_patch_check("/system/framework/ext.jar", "643eebba2ceda7aa988f9ddb3955a4fee14da73a", "2594d06a71b3ed9b156cad71789f14fda93c4083"));
set_progress(0.348343);
assert(apply_patch_check("/system/framework/ext.odex", "92baaa74dbaad5a549751079759ce7661fde6d46", "161186c58a908465f5ea11e4d772f6bdd77591a4"));
set_progress(0.405171);
assert(apply_patch_check("/system/framework/framework-tests.jar", "c4aec7a8af1686b2f4b7dc58a235166ec11955e3", "e799a6ce03a33b33786eed065211eb599d736b18"));
set_progress(0.405191);
assert(apply_patch_check("/system/framework/framework-tests.odex", "dd95a253bdf3673798b096f0bd07816cbe0c6329", "82b014c7b64704cc3683e6d1d35b26a5562a6b5e"));
set_progress(0.406659);
assert(apply_patch_check("/system/framework/framework.jar", "1f98194a524b8784dd8f998aff6d808454fb2a01", "40196613e8e7554f600dd8b25d79e387e6001781"));
set_progress(0.407436);
assert(apply_patch_check("/system/framework/framework.odex", "7d89568d1b0ec7546d05e4dc92cc63923b939e06", "9d7fdf5cd1b55756e7249ff038b1749295dc8146"));
set_progress(0.895468);
assert(apply_patch_check("/system/framework/ime.jar", "b41e5cc0320f383489f144dbd3d1e75936a854b8", "4cc96cc93afe79078534ab11eac62c1c80772622"));
set_progress(0.895488);
assert(apply_patch_check("/system/framework/ime.odex", "f16a9a299e15a17187cd8ba7a8cd16f8cf650781", "4ad8caa92d93d0c8318b1a95640d03d34cb07b47"));
set_progress(0.895844);
assert(apply_patch_check("/system/framework/input.jar", "b41e5cc0320f383489f144dbd3d1e75936a854b8", "4cc96cc93afe79078534ab11eac62c1c80772622"));
set_progress(0.895863);
assert(apply_patch_check("/system/framework/input.odex", "db1e5cbde1c58bc548d4fee0093dda847cd42b26", "504077fd36d82b6ee032c9369d56eb32083f37f2"));
set_progress(0.896103);
assert(apply_patch_check("/system/framework/javax.obex.jar", "fdcac2b79a50c262bed63e0ccfb357268a49d701", "548d27f81751ea7f3c55cc17059ae073861047f5"));
set_progress(0.896122);
assert(apply_patch_check("/system/framework/javax.obex.odex", "8f792d0a88df1679304aa04b71dd16db53cf0d8e", "06eea40a2d39dd93f321c770db7c2883ff4947d9"));
set_progress(0.899211);
assert(apply_patch_check("/system/framework/monkey.jar", "7c3e195ba8d8787b238dfd7f75c85223b686be68", "4cc96cc93afe79078534ab11eac62c1c80772622"));
set_progress(0.899230);
assert(apply_patch_check("/system/framework/monkey.odex", "e480bd11a04f753fb799ecf2eaa9c0891817af14", "39224e26446b89d2381c3c4b75e9a577820691c8"));
set_progress(0.902917);
assert(apply_patch_check("/system/framework/pm.jar", "7c3e195ba8d8787b238dfd7f75c85223b686be68", "4cc96cc93afe79078534ab11eac62c1c80772622"));
set_progress(0.902937);
assert(apply_patch_check("/system/framework/pm.odex", "8e3c25e5a27cd182acf24ea9e719d37d73a56c91", "bb6103a6c49fc371ce653e2ca6d8aacce50aba93"));
set_progress(0.904142);
assert(apply_patch_check("/system/framework/services.jar", "229080d612ae9ec470dbdecbf9dd652facf0a732", "b5d2e2f5da714f2a0ef268b688e7e63b4957a3d8"));
set_progress(0.904161);
assert(apply_patch_check("/system/framework/services.odex", "e48ef50dfd10faf55e673ca7a30331cefc45842a", "898680d8734bcf39dc3feb95619363d55735e51e"));
set_progress(0.973288);
assert(apply_patch_check("/system/framework/svc.jar", "7c3e195ba8d8787b238dfd7f75c85223b686be68", "4cc96cc93afe79078534ab11eac62c1c80772622"));
set_progress(0.973307);
assert(apply_patch_check("/system/framework/svc.odex", "43d22f19282adf2ae0fefbb44f9a654c0d582c4c", "989c40f9bbc016e0b35876f8cecead139ec20bd8"));
set_progress(0.973748);
assert(apply_patch_check("/system/lib/libopencore_rtsp.so", "a6d1dbe964e3d27998e9390067423dc673785de2", "0424cf7b46ac11d2217ec306243b330426ae3737"));
set_progress(1.000000);
ui_print("Unpacking patches...");
package_extract_dir("patch", "/tmp/patchtmp");
# ---- start making changes here ----
ui_print("Removing unneeded files...");
delete("/system/bin/skyagent");
show_progress(0.800000, 0);
ui_print("Patching system files...");
apply_patch("/system/bin/debuggerd", "-",
ce6fb95f01f5a9b71862ccf6e081f895c0e220d1, 18056,
"2ae6b87aca6c4473f4780d4ce2b8f2b8be39936d:/tmp/patchtmp/system/bin/debuggerd.p");
set_progress(0.001011);
apply_patch("/system/build.prop", "-",
67f237c118d5af73f71af7630e4fe59c7155ae96, 3711,
"69679987003e6012bd2d27d83fd52f7c99179f40:/tmp/patchtmp/system/build.prop.p");
set_progress(0.001219);
apply_patch("/system/customize/MNS/default.xml", "-",
9e200a7e2a4253dc77ac58373cdae8b98ed49d51, 85253,
"2c60d43a5669b603b2d007ac5c4edcee22e6599a:/tmp/patchtmp/system/customize/MNS/default.xml.p");
set_progress(0.005992);
apply_patch("/system/etc/security/otacerts.zip", "-",
c90533af43764c2d87acca4141cde42b47a543d2, 1144,
"8372dcc231da14f77107163b4a4d4ca10b798878:/tmp/patchtmp/system/etc/security/otacerts.zip.p");
set_progress(0.006056);
apply_patch("/system/framework/am.jar", "-",
b41e5cc0320f383489f144dbd3d1e75936a854b8, 345,
"cb7533a678c007dd7fd82c7a2db148c9dbc62490:/tmp/patchtmp/system/framework/am.jar.p");
set_progress(0.006076);
apply_patch("/system/framework/am.odex", "-",
0be0c8b999ed4a73139b08d557df35c0bebb1415, 15072,
"5d3fb3e8589ec671bc4349a40dc4ad689daf6a15:/tmp/patchtmp/system/framework/am.odex.p");
set_progress(0.006920);
apply_patch("/system/framework/android.policy.jar", "-",
eb9f1e5117a0c13fd7129b0cb91e8e410c738bdc, 345,
"ac50c63ff745a09463a99f91ea7ee4a86298e318:/tmp/patchtmp/system/framework/android.policy.jar.p");
set_progress(0.006939);
apply_patch("/system/framework/android.policy.odex", "-",
8dd0b527f096bb491c698f554458ebf323ec5937, 209504,
"7fc293c153eccf33ddf5f71166a8ad36d695e3fd:/tmp/patchtmp/system/framework/android.policy.odex.p");
set_progress(0.018669);
apply_patch("/system/framework/android.test.runner.jar", "-",
fdcac2b79a50c262bed63e0ccfb357268a49d701, 345,
"548d27f81751ea7f3c55cc17059ae073861047f5:/tmp/patchtmp/system/framework/android.test.runner.jar.p");
set_progress(0.018689);
apply_patch("/system/framework/android.test.runner.odex", "-",
e0372aa81e892c718d9098ac06ff2e542ad3f7e7, 171432,
"00628b91c88d45d5966eeb2c408b6321c823fb6a:/tmp/patchtmp/system/framework/android.test.runner.odex.p");
set_progress(0.028288);
apply_patch("/system/framework/bmgr.jar", "-",
b41e5cc0320f383489f144dbd3d1e75936a854b8, 345,
"cb7533a678c007dd7fd82c7a2db148c9dbc62490:/tmp/patchtmp/system/framework/bmgr.jar.p");
set_progress(0.028307);
apply_patch("/system/framework/bmgr.odex", "-",
4a33204d344ac9582856c08135eed612dc18d5e4, 12008,
"e51d289dc39eabd5e65048067c162804ca78fc0e:/tmp/patchtmp/system/framework/bmgr.odex.p");
set_progress(0.028979);
apply_patch("/system/framework/com.htc.android.easopen.jar", "-",
87c1fc4ce78476c91f4c01f3161d35b1648b09c0, 345,
"b8ce9d576ebe9abada46e613328ad181fc03b1fe:/tmp/patchtmp/system/framework/com.htc.android.easopen.jar.p");
set_progress(0.028999);
apply_patch("/system/framework/com.htc.android.easopen.odex", "-",
c1885f72e5ee1142de943f09f19d77618a7733db, 24832,
"13632aecd83b889fe35ca37340bfdd5d9b53add3:/tmp/patchtmp/system/framework/com.htc.android.easopen.odex.p");
set_progress(0.030389);
apply_patch("/system/framework/com.htc.android.pimlib.jar", "-",
8ea8f2f1e71f01d5fe641d2d187b9bead8080cd7, 345,
"548d27f81751ea7f3c55cc17059ae073861047f5:/tmp/patchtmp/system/framework/com.htc.android.pimlib.jar.p");
set_progress(0.030408);
apply_patch("/system/framework/com.htc.android.pimlib.odex", "-",
2523d41c2d66f2f8a772e1420e3a69c17dc3f385, 83232,
"ee1604618e8c43b501fbedf25f0a90c47e2bad50:/tmp/patchtmp/system/framework/com.htc.android.pimlib.odex.p");
set_progress(0.035069);
apply_patch("/system/framework/com.htc.framework.jar", "-",
fdcac2b79a50c262bed63e0ccfb357268a49d701, 345,
"548d27f81751ea7f3c55cc17059ae073861047f5:/tmp/patchtmp/system/framework/com.htc.framework.jar.p");
set_progress(0.035088);
apply_patch("/system/framework/com.htc.framework.odex", "-",
38376a1f5f7b695cbcac38ca2fe535ba3d9ea964, 1821800,
"7c07a4542df4a305abf3d34c7ab832d05c082fa8:/tmp/patchtmp/system/framework/com.htc.framework.odex.p");
set_progress(0.137094);
apply_patch("/system/framework/com.scalado.util.ScaladoUtil.jar",
"-", 1aecd5fedaf8768a9073a7b0be796cabc4575c98, 345,
"36c35cd6bc8fc2de27c013b455890af7e0767e4b:/tmp/patchtmp/system/framework/com.scalado.util.ScaladoUtil.jar.p");
set_progress(0.137114);
apply_patch("/system/framework/com.scalado.util.ScaladoUtil.odex",
"-", be671bdceb23bd20d5c235921228bebc95f0698b, 6560,
"3efa0553a5b4b63c3162ebed1a357396c45a8d5b:/tmp/patchtmp/system/framework/com.scalado.util.ScaladoUtil.odex.p");
set_progress(0.137481);
apply_patch("/system/framework/core.jar", "-",
d9c7d22b7d9a0ff164d93dbe2dd7a4a6c83e0abc, 43000,
"f5bfbe8db7f95c30b73abf34eec7e8a0ae92bb09:/tmp/patchtmp/system/framework/core.jar.p");
set_progress(0.139889);
apply_patch("/system/framework/core.odex", "-",
fa51af8728bff16125eb30e0642358e9fe67c245, 3722584,
"89d452b584335c3e17fb80580dcd597e3db24f71:/tmp/patchtmp/system/framework/core.odex.p");
set_progress(0.348324);
apply_patch("/system/framework/ext.jar", "-",
643eebba2ceda7aa988f9ddb3955a4fee14da73a, 345,
"2594d06a71b3ed9b156cad71789f14fda93c4083:/tmp/patchtmp/system/framework/ext.jar.p");
set_progress(0.348343);
apply_patch("/system/framework/ext.odex", "-",
92baaa74dbaad5a549751079759ce7661fde6d46, 1014928,
"161186c58a908465f5ea11e4d772f6bdd77591a4:/tmp/patchtmp/system/framework/ext.odex.p");
set_progress(0.405171);
apply_patch("/system/framework/framework-tests.jar", "-",
c4aec7a8af1686b2f4b7dc58a235166ec11955e3, 345,
"e799a6ce03a33b33786eed065211eb599d736b18:/tmp/patchtmp/system/framework/framework-tests.jar.p");
set_progress(0.405191);
apply_patch("/system/framework/framework-tests.odex", "-",
dd95a253bdf3673798b096f0bd07816cbe0c6329, 26216,
"82b014c7b64704cc3683e6d1d35b26a5562a6b5e:/tmp/patchtmp/system/framework/framework-tests.odex.p");
set_progress(0.406659);
apply_patch("/system/framework/framework.jar", "-",
1f98194a524b8784dd8f998aff6d808454fb2a01, 13891,
"40196613e8e7554f600dd8b25d79e387e6001781:/tmp/patchtmp/system/framework/framework.jar.p");
set_progress(0.407436);
apply_patch("/system/framework/framework.odex", "-",
7d89568d1b0ec7546d05e4dc92cc63923b939e06, 8716080,
"9d7fdf5cd1b55756e7249ff038b1749295dc8146:/tmp/patchtmp/system/framework/framework.odex.p");
set_progress(0.895468);
apply_patch("/system/framework/ime.jar", "-",
b41e5cc0320f383489f144dbd3d1e75936a854b8, 345,
"4cc96cc93afe79078534ab11eac62c1c80772622:/tmp/patchtmp/system/framework/ime.jar.p");
set_progress(0.895488);
apply_patch("/system/framework/ime.odex", "-",
f16a9a299e15a17187cd8ba7a8cd16f8cf650781, 6368,
"4ad8caa92d93d0c8318b1a95640d03d34cb07b47:/tmp/patchtmp/system/framework/ime.odex.p");
set_progress(0.895844);
apply_patch("/system/framework/input.jar", "-",
b41e5cc0320f383489f144dbd3d1e75936a854b8, 345,
"4cc96cc93afe79078534ab11eac62c1c80772622:/tmp/patchtmp/system/framework/input.jar.p");
set_progress(0.895863);
apply_patch("/system/framework/input.odex", "-",
db1e5cbde1c58bc548d4fee0093dda847cd42b26, 4272,
"504077fd36d82b6ee032c9369d56eb32083f37f2:/tmp/patchtmp/system/framework/input.odex.p");
set_progress(0.896103);
apply_patch("/system/framework/javax.obex.jar", "-",
fdcac2b79a50c262bed63e0ccfb357268a49d701, 345,
"548d27f81751ea7f3c55cc17059ae073861047f5:/tmp/patchtmp/system/framework/javax.obex.jar.p");
set_progress(0.896122);
apply_patch("/system/framework/javax.obex.odex", "-",
8f792d0a88df1679304aa04b71dd16db53cf0d8e, 55160,
"06eea40a2d39dd93f321c770db7c2883ff4947d9:/tmp/patchtmp/system/framework/javax.obex.odex.p");
set_progress(0.899211);
apply_patch("/system/framework/monkey.jar", "-",
7c3e195ba8d8787b238dfd7f75c85223b686be68, 345,
"4cc96cc93afe79078534ab11eac62c1c80772622:/tmp/patchtmp/system/framework/monkey.jar.p");
set_progress(0.899230);
apply_patch("/system/framework/monkey.odex", "-",
e480bd11a04f753fb799ecf2eaa9c0891817af14, 65856,
"39224e26446b89d2381c3c4b75e9a577820691c8:/tmp/patchtmp/system/framework/monkey.odex.p");
set_progress(0.902917);
apply_patch("/system/framework/pm.jar", "-",
7c3e195ba8d8787b238dfd7f75c85223b686be68, 345,
"4cc96cc93afe79078534ab11eac62c1c80772622:/tmp/patchtmp/system/framework/pm.jar.p");
set_progress(0.902937);
apply_patch("/system/framework/pm.odex", "-",
8e3c25e5a27cd182acf24ea9e719d37d73a56c91, 21520,
"bb6103a6c49fc371ce653e2ca6d8aacce50aba93:/tmp/patchtmp/system/framework/pm.odex.p");
set_progress(0.904142);
apply_patch("/system/framework/services.jar", "-",
229080d612ae9ec470dbdecbf9dd652facf0a732, 345,
"b5d2e2f5da714f2a0ef268b688e7e63b4957a3d8:/tmp/patchtmp/system/framework/services.jar.p");
set_progress(0.904161);
apply_patch("/system/framework/services.odex", "-",
e48ef50dfd10faf55e673ca7a30331cefc45842a, 1234584,
"898680d8734bcf39dc3feb95619363d55735e51e:/tmp/patchtmp/system/framework/services.odex.p");
set_progress(0.973288);
apply_patch("/system/framework/svc.jar", "-",
7c3e195ba8d8787b238dfd7f75c85223b686be68, 345,
"4cc96cc93afe79078534ab11eac62c1c80772622:/tmp/patchtmp/system/framework/svc.jar.p");
set_progress(0.973307);
apply_patch("/system/framework/svc.odex", "-",
43d22f19282adf2ae0fefbb44f9a654c0d582c4c, 7880,
"989c40f9bbc016e0b35876f8cecead139ec20bd8:/tmp/patchtmp/system/framework/svc.odex.p");
set_progress(0.973748);
apply_patch("/system/lib/libopencore_rtsp.so", "-",
a6d1dbe964e3d27998e9390067423dc673785de2, 468844,
"0424cf7b46ac11d2217ec306243b330426ae3737:/tmp/patchtmp/system/lib/libopencore_rtsp.so.p");
set_progress(1.000000);
show_progress(0.100000, 10);
ui_print("Symlinks and permissions...");
set_perm_recursive(0, 0, 0755, 0644, "/system");
set_perm_recursive(0, 2000, 0755, 0755, "/system/bin");
set_perm(0, 3003, 06755, "/system/bin/ip");
set_perm(0, 3003, 02755, "/system/bin/netcfg");
set_perm(0, 3004, 02755, "/system/bin/ping");
set_perm(0, 2000, 04755, "/system/bin/pppd");
set_perm(0, 2000, 06755, "/system/bin/reboot");
set_perm(0, 1000, 06755, "/system/bin/wifitools");
set_perm(1001, 1005, 0444, "/system/etc/AudioPara4.csv");
set_perm_recursive(1002, 1002, 0755, 0440, "/system/etc/bluez");
set_perm(0, 0, 0755, "/system/etc/bluez");
set_perm(1002, 1002, 0440, "/system/etc/dbus.conf");
set_perm(1014, 2000, 0550, "/system/etc/dhcpcd/dhcpcd-run-hooks");
set_perm(0, 2000, 0550, "/system/etc/init.goldfish.sh");
set_perm_recursive(0, 0, 0755, 0555, "/system/etc/ppp");
set_perm_recursive(0, 2000, 0755, 0755, "/system/xbin");
unmount("/system");
Just thinking out loud. Couldn't we remove the debuggerd and add in su? I'm sure it isn't that easy.
Mr. Biggz said:
Just thinking out loud. Couldn't we remove the debuggerd and add in su? I'm sure it isn't that easy.
Click to expand...
Click to collapse
It's not that easy. Anyway this problem can be avoided by simply not installing this update or not using the 2.27.651.6 ruu.
But....seeing as sprint/bestbuy/radioshack or what have you have dropped the prices of the hero I can imagine we'll see a bunch of people looking for root since new hero's will most likely have the updated/patched firmware.
The only thing this zip does is patch the security hole that was used for rooting. and updates the build.prop to .6 (and changes the date)

[Q] help with my kernel.zip, doesn't install kernel modules

In my kernel installer ZIP file, I have added some modules in system/lib/modules ... however they never end up getting installed.
My updater-script is:
Code:
ui_print("");
ui_print("Flashing Kernel");
mount("ext4", "EMMC", "/dev/block/mmcblk0p24", "/system");
package_extract_dir("system", "/system");
symlink("/lib/modules", "/system/lib/modules");
set_perm(0, 0, 0644, "/system/lib/libhardware_legacy.so");
set_perm(0, 0, 0644, "/system/lib/hw/lights.msm8660.so");
set_perm(0, 2000, 0550, "/system/etc/init.qcom.post_boot.sh");
set_perm_recursive(0, 0, 0755, 0644, "/system/lib/modules");
unmount("/system");
show_progress(0.500000, 0);
assert(package_extract_file("boot.img", "/tmp/boot.img"),
write_raw_image("/tmp/boot.img", "/dev/block/mmcblk0p8"),
delete("/tmp/boot.img"));
show_progress(0.100000, 0);
ui_print("Done");
I've included my kernel zip file also so you can extract it and find the directory structure. Is it because the initramfs in boot.img overwrites this directory or something?
http://users.ece.cmu.edu/~gnychis/hedpe_kernel.zip
it appears that anything put in the root of /system or in /system/lib is not honored. If I put something in /system/etc it will get installed via the updater script

Update script permission?

I am finishing off an update script and ran into a problem trying to set the permissions on an init.d script that I am loading to the system. Here are a few things I have tried to set on "crystal_clear" without success.
set_perm_recursive(0, 0, 0777, 0777, "/system/etc/init.d");
set_perm(0, 0, 0777, "/system/etc/init.d/crystal_clear");
Am I even close with this? This is my first update script. I bet i'm just missing something stupid but it's been killing me for hours and tried so many variations.
Here is everything so far. If there is something else you see here that doesn't look right please let me know.
show_progress(0.1, 0);
ui_print("Mounting System Partition");
mount("ext4", "EMMC", "/dev/block/mmcblk0p14", "/system");
package_extract_file("tweaks/buildprop.sh", "/tmp/buildprop.sh");
package_extract_file("tweaks/sysmount/sysrw", "/tmp/sysrw");
package_extract_file("tweaks/sysmount/sysro", "/tmp/sysro");
set_perm(0, 0, 0777, "/tmp/buildprop.sh");
set_perm(0, 0, 0777, "/tmp/sysrw");
set_perm(0, 0, 0777, "/tmp/sysro");
ui_print("");
ui_print("Patching Build.prop");
run_program("/sbin/sh", "/tmp/sysrw");
run_program("/sbin/sh", "/tmp/buildprop.sh");
ui_print("");
ui_print("Patching adreno_config.txt, and egl.cfg");
package_extract_dir("system", "/system");
run_program("/sbin/sh", "/tmp/sysro");
show_progress(0.1, 10);
ui_print("");
ui_print("All tweaking processes are done");
ui_print("Adjusting framebuffer and color depth");
package_extract_file("system", "/system/etc/init.d");
set_perm(0, 0, 0777, 0777, "/etc/init.d/crystal_clear");
show_progress(0.2, 0);
unmount("/system");
ui_print("DONE");
General comments.
A simple
Code:
set_perm_recursive(0, 0, 0755, 0755, "/system/etc/init.d");
after I've extracted the all the files I've wanted to the right place has always worked fine in the CWM ZIP I keep for personal use to install BusyBox etc.
razz1 said:
package_extract_file("tweaks/sysmount/sysrw", "/tmp/sysrw");
package_extract_file("tweaks/sysmount/sysro", "/tmp/sysro");
set_perm(0, 0, 0777, "/tmp/sysrw");
set_perm(0, 0, 0777, "/tmp/sysro");
run_program("/sbin/sh", "/tmp/sysrw");
run_program("/sbin/sh", "/tmp/sysro");
Click to expand...
Click to collapse
You don't need these. CWM/TWRP will mount /system rw by default and you don't really need to remount it ro in CWM.
package_extract_dir("system", "/system");
package_extract_file("system", "/system/etc/init.d");
Click to expand...
Click to collapse
Is "system" a directory or a file?
That said, I think you want the former - just have a system folder in the root of your ZIP mirroring where you want the files to be placed (so in your ZIP, create a "system" folder at the same level as META-INF and then have a "etc" folder inside that, then a "init.d" folder inside "etc" with your script inside "init.d").
THANK YOU!
I'm going to try a few things you said and go from there.
Here is my current hierarchy...
4xMultiSampling_Antialiasing.zip
......META-INF
..........com
.............google
................android
.....................update-binary
.....................updater-script
......system
.........etc
.............Init.d
................crystal_clear. <-----this is what would not change to 0777
......lib
........egl
..........egl.config
......tweaks
.........build.prop.sh
.........sysmount
..............sysro
..............sysrw
razz1 said:
.............Init.d
Click to expand...
Click to collapse
If that's not a typo, it needs to be init.d - ext* file systems, unlike Windows', are case-sensitive
Yes that was a typo, but I appreciate your attention to detail because that's is exactly what I need. As you know, its that sort of thing that can kill a script. Critique away!
It appears I was able to pull it off with your help. Thanks. All is well here now.
Glad to hear it.

Tutorial: How to make Flashable zips

This tutorial will help you to understand the making of a flashable zip or also known as an update zip​
Setting up your zip directories:
You will need to create the following folder structure inside of your flashable zip (The flashable zip can be called whatever it is you want it to be. (These subfolders are case sensitive)):
Code:
/META-INF/com/google/android
All flashable zips include this file structure. The final folder, android, will contain two files within it:
Code:
update-binary
updater-script
Note: The update-binary is specific to our devices based on built API mostly, but with other factors as well. It is currently open source and therefore possible to be built on a personal basis. However, to insure you are using the correct one, I can suggest taking it from the most recent OTA available for your device.
Setting up the updater-script:
-- This we can create ourselves, to ensure it works properly we will use Notepad++ for Window Users, and Gedit for those using Linux.
Open the text editor and start a new file, with the following settings for Window Users:
Format: Unix
Encoding: ANSI
Default Language: Normal Text
Click to expand...
Click to collapse
Save this file as:
File name: updater-script
File type: All types (*.*)
Click to expand...
Click to collapse
And for Linux users:
Just leave it as is.
You can now edit this file, so from here I will be providing some examples:
Code:
[COLOR="Red"]assert(getprop("ro.product.device") == "k2cl" || getprop("ro.build.product") == "k2cl");[/COLOR]
[COLOR="brown"]ui_print(" ");[/COLOR]
[COLOR="brown"]ui_print("Checking Device");[/COLOR]
[COLOR="brown"]ui_print(" ");[/COLOR]
[COLOR="brown"]ui_print("Success");[/COLOR]
[COLOR="brown"]ui_print(" ");[/COLOR]
[COLOR="green"]show_progress(0.200000, 5);[/COLOR]
[COLOR="brown"]ui_print("Mounting System");[/COLOR]
[COLOR="red"]mount("ext4", "EMMC", "/dev/block/mmcblk0p35", "/system");[/COLOR]
[COLOR="brown"]ui_print(" ");[/COLOR]
[COLOR="green"]show_progress(0.200000, 5);[/COLOR]
[COLOR="brown"]ui_print("Updating System Files");[/COLOR]
[COLOR="red"]package_extract_dir("system", "/system");[/COLOR]
[COLOR="brown"]ui_print(" ");[/COLOR]
[COLOR="green"]show_progress(0.200000, 5);[/COLOR]
[COLOR="brown"]ui_print("unmounting system");[/COLOR]
[COLOR="red"]unmount("/system");[/COLOR]
[COLOR="brown"]ui_print(" ");[/COLOR]
[COLOR="green"]show_progress(0.200000, 5);[/COLOR]
[COLOR="brown"]ui_print("Complete!");[/COLOR]
[COLOR="green"]show_progress(0.200000, 5);[/COLOR]
[COLOR="brown"]ui_print(" ");[/COLOR]
***EMPTY LINE***
Ok, I've color coded this so we can break it down, the lines of code in RED are the actual commands, everything else is for visual appearance.
assert(getprop("ro.product.device") == "k2cl" || getprop("ro.build.product") == "k2cl");
Click to expand...
Click to collapse
This is checking to see if you are flashing the correct handset, this is not a requirement, but it insures that the flashable zip will only work for the specified device as to not be accidently flashed by others and to help prevent causing any possible damage to those who do not qualify to use that particular zip. Just insert another device name in the place of "k2cl" if you so wish, or remove the command all together.
To explain this a little further, you have told the script to check certain properties within your 'build.prop' file located in your /system folder. The above command ensures the following categories have the correct definitions before proceeding with the flash:
Code:
ro.product.device=
ro.build.product=
ro.product.board=
Click to expand...
Click to collapse
Take note, that if you apply this to a full rom which result you having to wipe out the system partition before flashing then this will obviously not work, because you also wiped out the build.prop file along with the /system, so the zip will be aborted due to an error by not being able to verify as instructed to do in the syntax.
Here are the main build properties within your build.prop (may slightly vary):
Code:
ro.build.id=
ro.build.display.id=
ro.build.version.incremental=
ro.build.version.sdk=
ro.build.version.codename=
ro.build.version.release=
ro.build.date=
ro.build.date.utc=
ro.build.type=
ro.build.user=
ro.build.host=
ro.build.tags=
ro.product.model=
ro.product.brand=
ro.product.name=
ro.product.device=
ro.product.board=
ro.product.cpu.abi=
ro.product.cpu.abi2=
ro.product.manufacturer=
ro.product.locale.language=
ro.product.locale.region=
ro.wifi.channels=
ro.board.platform=
ro.build.description=
ro.build.fingerprint=
ro.build.characteristics=
Click to expand...
Click to collapse
To mount a partition you need to use the following syntax. Below, will visually show you what each arguement represents:
Code:
mount("filesystem-type", "partition-type", "device-specific-mountpoint (DSM)", "mount-point");
Click to expand...
Click to collapse
filesystem-type: "ext4" or "yaffs2" (k2cl is ext4)
partition-type: "EMMC" or "MTD" (k2cl is EMMC)
DSM: Device specific address - this will be your specified partition
mount-point: /system, /data, /userdata, /cache, etc
mount("ext4", "EMMC", "/dev/block/mmcblk0p35", "/system");
Click to expand...
Click to collapse
This is the specific mount point for the k2cl system partition, if you wish to flash a different partition, data for instance, you can get the mount points for your device by entering the following code over ADB via PC or on our phone via terminal emulator:
Code:
adb shell
mount > /sdcard/PHONENAME_mountinfo.txt
Click to expand...
Click to collapse
This will place a text file on your sdcard with the mount points for your specific device. (Remember to swap 'PHONENAME' with your device name e.g. 'k2cl', as a means of remembrance and for record keeping).
package_extract_dir("system", "/system");
Click to expand...
Click to collapse
This command extracts the files you wish to flash from the zip and flashes them to the phone, it is formatted as follows ("package-path", "/destination-path"). So for this example you are telling it to flash everything from the 'system' folder in your zip to the /system partition of your handset. You can obviously change these values for different partitions.
To flash an entire directory:
Code:
package_extract_dir("system", "/system");
To flash a single file:
Code:
package_extract_file("boot.img", "/dev/block/mmcblk0p20");
These commands are structured as follows:
Entire directory: ("zipfileSource", "destination-partition");
Single File: ("file", "device-specific-mountpoint");
unmount("/system");
Click to expand...
Click to collapse
This simply unmounts whatever partition you previously mounted.
ui_print(" ");
Click to expand...
Click to collapse
Shows text in the recovery while the flash is currently taking place. You would just enter what ever text you feel is necessary to be displayed on the screen.
show_progress(0.200000, 5);
Click to expand...
Click to collapse
Controls what the progress bar in the background is displaying, it is formatted as follows (fragment, seconds).
***EMPTY LINE***
Click to expand...
Click to collapse
This is not actually a text, you simply need to leave a blank line at the end of your script before you save it for it to work properly.
Some Additional commands​
Deleting folders & files:
You can delete multiple folders or files using just one command, as follows:
To delete files:
Code:
delete("file-path-1", "file-path-2", "file-path-3);
Example:
Code:
delete("/system/bin/su","/system/xbin/su","/system/app/Superuser.apk");
You can list as many file-path's as needed in the script. Three is not its limit.
To delete folders/directories:
Code:
delete_recursive("directory-path-1", "directory-path-2", "directory-path-3");
This is also not limited to three directory-path's.
Setting Permissions:
Set permissions of a file or set of files:
Code:
set_perm(uid, gid, mode, "filepath1", "filepath2")
Example:
Code:
set_perm(0, 0, 06755, "/system/xbin/su");
uid - user id
gid - group id
mode - permission mode
filepath... - file to set permission on
Setting permissions of a directory or a set of directories and all files and folders within them:
Code:
set_perm_recursive(uid, gid, dirmode, filemode, "dirpath1", "dirpath2")
Example:
Code:
set_perm_recursive(0, 0, 0755, 0644, "/system");
uid - user id
gid - group id
dirmode - permission to set to directories contained within the specified directory
filemode - permission to set to files contained within the specified directory
dirpath... - directory to set permission on
You will need to also understand the way file permissions are represented:
Example = drwxrwxrwx
-- Use a Root Explorer to find the UID, GID, and permissions for a file. Permissions are the string that looks like some variation on 'rwxr-xr--' next to each file. Long press and choose "change owner" to get the UID and GID. You just want the number next to "owner" and "group", respectively.
-- If you're replacing a file, look up these settings for the existing copy and use them. If you're adding a file, just find a file that does the same functions and copy what it has (for example, installing an app to /system/app? Just look at these settings for any other app in that directory).
-- MODE is technically a 4-bit string, but the first character can be omitted. There doesn't seem to be any android file permissions with the first character set. For good practice, I think it's safe to assume you can always use a leading 0 unless you know otherwise for something specific. Or, just use a 3-digit MODE, which says to leave those settings as they are (disabled by default). (I.e. 0644=644).
The next 9 characters define the file permissions. These permissions are
given in groups of 3 each.
The first 3 characters are the permissions for the owner of the file or directory.
Example = -rwx------
The next 3 are permissions for the group that the file is owned by.
Example = ----rwx---
The final 3 characters define the access permissions for everyone not part of the group.
Example = -------rwx
There are 3 possible attributes that make up file access permissions.
r -- Read permission. Whether the file may be read. In the case of a
directory* this would mean the ability to list the contents of the
directory.
w -- Write permission. Whether the file may be written to or modified. For
a directory this defines whether you can make any changes to the contents
of the directory. If write permission is not set then you will not be able
to delete rename or create a file.
x -- Execute permission. Whether the file may be executed. In the case of a
directory this attribute decides whether you have permission to enter,
run a search through that directory or execute some program from that
directory
You set these permissions using the following binary based numerical system:
Code:
0: --- No Permissions (the user(s) cannot do anything)
1: --x Execute Only (the user(s) can only execute the file)
2: -w- Write Only (the user(s) can only write to the file)
3: -wx Write and Execute Permissions
4: r-- Read Only
5: r-x Read and Execute Permissions
6: rw- Read and Write Permissions
7: rwx Read, Write and Execute Permissions
Click to expand...
Click to collapse
Default Linux permissions:
For Files:
"Read" means to be able to open and view the file
"Write" means to overwrite or modify the file
"eXecute" means to run the file as a binary
For Directories:
"Read" means to be able to view the contents of the directory
"Write" means to be able to create new files/directories within the directory
"eXecute" means to be able to "Change Directory" (cd) into the directory
For further understanding on calculating CHMOD permissions, then click on the following link to another thread here on XDA:
CHMOD Permissions - Reference Guide
Here are two examples of using edify scripting to help give a better visual on all of this:
Example 1:
Folders = Green
Files = Black
SuperSU_1.75_Flashable.zip
|--META-INF
|...|--CERT.RSA
|...|--CERT.SF
|...|--MANIFEST.MF
|...|--com
|.......|--google
|...........|--android
|...............|--update-binary
|...............|--updater-script
|--data
|...|--data
|........|--eu.chainfire.supersu
|............|--files
|............|...|--99SuperSUDaemon
|............|...|--install-recovery.sh
|............|...|--otasurvival.sh
|............|...|--supersu.arm.png
|............|...|--supersu.cfg
|............|--shared_prefs
|................|--eu.chainfire.supersu_preferences.xml
|--system
|...|--app
|...|...|--Superuser.apk
|...|--bin
|...|...|--.ext
|...|...|...|--.su
|...|...|--su
|...|--xbin
|.......|--otasurvival.sh
Code:
ui_print("****************************************");
ui_print("* Created by Modding.MyMind *");
ui_print("****************************************");
ui_print("* Rooting your Device *");
ui_print("****************************************");
ui_print("");
show_progress(1.000000, 0);
ui_print("Mounting filesystems...");
run_program("/sbin/busybox", "mount", "/system");
run_program("/sbin/busybox", "mount", "/data");
set_progress(0.100000);
# Delete old files that may interfere.
ui_print("Preparing install...");
delete("/data/dalvik-cache/[email protected]@[email protected]","/system/bin/su","/system/xbin/su","/system/app/Superuser.apk","/system/app/Superuser.odex","/data/app/Superuser.apk","/system/xbin/daemonsu","/system/bin/.ext/.su","/system/etc/install-recovery.sh","/system/etc/init.d/99SuperSUDaemon","/system/etc/.has_su_daemon","/system/etc/.installed_su_daemon","/system/app/SuperUser.apk","/system/app/SuperUser.odex","/system/app/superuser.apk","/system/app/superuser.odex","/system/app/Supersu.apk","/system/app/Supersu.odex","/system/app/SuperSU.apk","/system/app/SuperSU.odex","/system/app/supersu.apk","/system/app/supersu.odex");
set_progress(0.200000);
ui_print("Extracting files...");
package_extract_dir("system", "/system");
package_extract_dir("data", "/data");
set_progress(0.300000);
ui_print("Setting SU permissions...");
set_perm(0, 0, 06755, "/system/bin/su");
set_perm(0, 0, 06755, "/system/bin/.ext/.su");
set_perm(0, 0, 06755, "/system/xbin/otasurvival.sh");
set_progress(0.400000);
ui_print("Symlinking SU Binary for Root...");
symlink("/system/bin/su", "/system/xbin/su");
set_progress(0.500000);
ui_print("Setting SuperSU permissions...");
set_perm(0, 0, 0644, "/system/app/Superuser.apk");
set_perm(1000, 1000, 0755, "/data/data/eu.chainfire.supersu");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/eu.chainfire.supersu/files");
set_perm_recursive(1000, 1000, 0771, 0660, "/data/data/eu.chainfire.supersu/shared_prefs");
set_progress(0.600000);
set_progress(0.800000);
# Unmounting filesystems...
ui_print("Unmounting filesystems...");
run_program("/sbin/busybox", "umount", "/system");
run_program("/sbin/busybox", "umount", "/data");
set_progress(0.900000);
ui_print("");
set_progress(1.000000);
ui_print("****************************************");
ui_print("* Install Complete! *");
ui_print("****************************************");
Click to expand...
Click to collapse
Example 2:
Code:
ui_print("****************************************");
ui_print(" ");
ui_print(" 4.2.2 CCONVERSIONN ");
ui_print(" Modding.MyMind - XDA Senior Member ");
ui_print(" ");
ui_print("****************************************");
ui_print("");
ui_print("");
#MOUNTING
show_progress(0.1, 0);
ui_print("MOUNTING /system");
mount("ext4", "EMMC", "/dev/block/mmcblk0p35", "/system");
delete_recursive("/system");
#EXTRACTING
ui_print("EXTRACTING SYSTEM FOLDER TO /system");
package_extract_dir("system", "/system");
#SYMLINKING
ui_print("SYMLINKING");
symlink("dumpstate", "/system/bin/dumpcrash");
symlink("toolbox", "/system/bin/cat");
symlink("toolbox", "/system/bin/chmod");
symlink("toolbox", "/system/bin/chown");
symlink("toolbox", "/system/bin/cmp");
symlink("debuggerd", "/system/bin/csview");
symlink("toolbox", "/system/bin/date");
symlink("toolbox", "/system/bin/dd");
symlink("toolbox", "/system/bin/df");
symlink("toolbox", "/system/bin/dmesg");
symlink("toolbox", "/system/bin/getevent");
symlink("toolbox", "/system/bin/getprop");
symlink("toolbox", "/system/bin/hd");
symlink("toolbox", "/system/bin/id");
symlink("toolbox", "/system/bin/ifconfig");
symlink("toolbox", "/system/bin/iftop");
symlink("toolbox", "/system/bin/insmod");
symlink("toolbox", "/system/bin/ioctl");
symlink("toolbox", "/system/bin/ionice");
symlink("toolbox", "/system/bin/kill");
symlink("toolbox", "/system/bin/ln");
symlink("toolbox", "/system/bin/log");
symlink("toolbox", "/system/bin/ls");
symlink("toolbox", "/system/bin/lsmod");
symlink("toolbox", "/system/bin/lsof");
symlink("toolbox", "/system/bin/mkdir");
symlink("toolbox", "/system/bin/mount");
symlink("toolbox", "/system/bin/mv");
symlink("toolbox", "/system/bin/nandread");
symlink("toolbox", "/system/bin/netstat");
symlink("toolbox", "/system/bin/newfs_msdos");
symlink("toolbox", "/system/bin/notify");
symlink("toolbox", "/system/bin/printenv");
symlink("toolbox", "/system/bin/ps");
symlink("toolbox", "/system/bin/renice");
symlink("toolbox", "/system/bin/rm");
symlink("toolbox", "/system/bin/rmdir");
symlink("toolbox", "/system/bin/rmmod");
symlink("toolbox", "/system/bin/route");
symlink("toolbox", "/system/bin/schedtop");
symlink("toolbox", "/system/bin/sendevent");
symlink("toolbox", "/system/bin/setconsole");
symlink("toolbox", "/system/bin/setprop");
symlink("mksh", "/system/bin/sh");
symlink("toolbox", "/system/bin/sleep");
symlink("toolbox", "/system/bin/smd");
symlink("toolbox", "/system/bin/start");
symlink("toolbox", "/system/bin/stop");
symlink("toolbox", "/system/bin/sync");
symlink("toolbox", "/system/bin/top");
symlink("toolbox", "/system/bin/touch");
symlink("toolbox", "/system/bin/umount");
symlink("toolbox", "/system/bin/uptime");
symlink("toolbox", "/system/bin/vmstat");
symlink("toolbox", "/system/bin/watchprops");
symlink("toolbox", "/system/bin/wipe");
symlink("wiperiface_v02.so", "/system/bin/wiperiface");
symlink("libwiperjni_v02.so", "/system/lib/libwiperjni.so");
#PERMISSIONS
ui_print("SETTING PERMISSIONS TO /system");
set_perm_recursive(0, 0, 0755, 0644, "/system");
set_perm_recursive(0, 2000, 0755, 0755, "/system/bin");
set_perm(0, 3003, 06755, "/system/bin/ip");
set_perm(0, 3003, 02750, "/system/bin/netcfg");
set_perm(0, 3004, 02755, "/system/bin/ping");
set_perm(0, 2000, 06750, "/system/bin/run-as");
set_perm_recursive(1002, 1002, 0755, 0440, "/system/etc/bluetooth");
set_perm(0, 0, 0755, "/system/etc/bluetooth");
set_perm(3002, 3002, 0444, "/system/etc/bluetooth/blacklist.conf");
set_perm(1002, 1002, 0440, "/system/etc/dbus.conf");
set_perm(1014, 2000, 0550, "/system/etc/dhcpcd/dhcpcd-run-hooks");
set_perm(0, 2000, 0550, "/system/etc/init.goldfish.sh");
set_perm_recursive(0, 0, 0755, 0555, "/system/etc/ppp");
set_perm_recursive(0, 2000, 0755, 0644, "/system/vendor");
set_perm_recursive(0, 0, 0755, 0644, "/system/vendor/firmware");
set_perm(0, 2000, 0755, "/system/vendor/firmware");
set_perm(0, 2000, 0755, "/system/vendor/lib");
set_perm_recursive(0, 2000, 0755, 0755, "/system/xbin");
show_progress(0.1, 10);
#EXTRACTING
ui_print("INSTALLING boot.img TO mmcblk0p20");
show_progress(0.2, 0);
package_extract_file("boot.img", "/dev/block/mmcblk0p20");
show_progress(0.2, 10);
#UNMOUNTING
ui_print("UNMOUNTING /system");
unmount("/system");
ui_print("****************************************");
ui_print("* CconversionN Complete! *");
ui_print("****************************************");
Files to flash:
You now need to create some other folder(s), this needs to be named based on where within the system you are flashing to help keep it simple (you can technically name them whatever, just as long as they are placed in the proper location of your current daily rom); for the sake of this example we are flashing to the system partition, so:
Code:
/META-INF/com/google/android
/system/app
Click to expand...
Click to collapse
Place whatever files you wish to flash within this file. For example:
Code:
/META-INF/com/google/android
/system/app/nameofapp.apk
Click to expand...
Click to collapse
Creating your .zip file:
Select both of your top directories and their contents 'META-INF' and 'system' and package them into a .zip file with 7zip or any other method you may currently use, using the following settings:
Archive: name_of_your_file
Archive Format: zip
Compression level: Store
Update mode: Add and replace files
And there you have it, your very own flashable .zip file.
How to sign your flashable zip:
You don't actually need to sign your zip file for it to work as most custom recoveries like, TWRP, now support unsigned zips. For the learning developers and the more cautious among us though, here is how. First, go ahead and place your newly made flashable zip on to your device. I preferably place it on the root of my internal sdcard, though the choice is ultimately yours.
Download the free application on the playstore called, zipsigner. Open it up and select the option for, Choose In/Out....
Go and select your zip, and then select, auto-testkey, under where it says, Key/mode. Once done, proceed to sign it. You will recieve an output zip file with the same name as the previous unsigned zip but with it ending in *-signed.zip. At this point, you are now good and you can either apply your zip to your device, or share your work with others.
There are so many different ways you can go about signing the zip, but for something like a simple flashable zip file, I will normally always go this route.
-- Happy Hunting!!!
Please feel free to add on to this tutorial for other things as well. Almost like a grocery list haha.
Sent from my C525c using XDA Premium 4 mobile app
If useful I will add it to the main post as a reference given the post# link.
Sent from my C525c using XDA Premium 4 mobile app
I don't know why, but I feel that I need to include that this process is how one can make many flashable zips like superuser, etc.
Just feel some viewers wouldn't consider their imaginations with this tutorial given that it mainly speaks on bootanimation and fonts lol.
Sent from my C525c using XDA Premium 4 mobile app
Code:
ui_print("");
show_progress(2,0);
run_program("/sbin/busybox", "mount", "/data");
run_program("/sbin/busybox", "mount", "/system");
set_progress(0);
ui_print("Installing app: com.android.vending");
package_extract_file("com.android.vending-1918e4b9fe5d1bc63e7c86588982b7af.apk", "/system/app/com.android.vending-1.apk");
set_perm(0, 0, 0644, "/system/app/com.android.vending-1.apk");
set_progress(1);
ui_print("Installing app: com.keramidas.TitaniumBackup");
delete("/data/app/com.keramidas.TitaniumBackup.apk");
delete("/data/app/com.keramidas.TitaniumBackup-2.apk");
package_extract_file("com.keramidas.TitaniumBackup.apk", "/data/app/com.keramidas.TitaniumBackup-1.apk");
set_perm(0, 0, 0644, "/data/app/com.keramidas.TitaniumBackup-1.apk");
set_progress(2);
unmount("/data");
unmount("/system");
ui_print("Done !");
ui_print("Will reboot in 5 seconds...");
run_program("/sbin/busybox", "sleep", "5");
run_program("/sbin/reboot");
Was playing on my phone earlier and wanted to share this to expands some minds out there for those trying to learn and or understand.
*Link removed by me*
Comes prepared with OTA su survival, su binary (root), system installation, latest stable busybox as of now.
Sent from my C525c using XDA Premium 4 mobile app
supersu is fixed. Can flash and gain root. I permanently unrooted my device for the official test and success. The initial problem I had was in the script... A stupid (") mark.... Spent hours looking for the problem and it came down to one " mark... But, I found it and its up and going. even tested it on my girlfriends HTC Evo Design 4g as she too needed root now for certain things - success.
My apologies for the past problems and delays.
Here is the code used for the su and busybox flash zip. The quotation in red is what was initially missing and overlooked for hours before I found it.
Code:
ui_print("****************************************");
ui_print("* Created by Modding.MyMind *");
ui_print("****************************************");
ui_print("");
ui_print("");
show_progress(1.000000, 0);
ui_print("Mounting filesystems...");
run_program("/sbin/busybox", "mount", "/system");
run_program("/sbin/busybox", "mount", "/data");
set_progress(0.100000);
# Delete old files that may interfere.
ui_print("Preparing install...");
delete("/data/dalvik-cache/[email protected]@[email protected]", [COLOR="Red"][B]"[/B][/COLOR]/system/bin/su","/system/xbin/su","/system/app/Superuser.apk","/data/app/Superuser.apk");
set_progress(0.200000);
ui_print("Extracting files...");
package_extract_dir("system", "/system");
package_extract_dir("data", "/data");
set_progress(0.300000);
ui_print("Setting SU Binary permissions");
set_perm(0, 0, 06755, "/system/bin/su");
set_progress(0.400000);
ui_print("Symlinking SU Binary for Root");
symlink("/system/bin/su", "/system/xbin/su");
set_progress(0.500000);
ui_print("Setting SuperSU permissions");
set_perm(0, 0, 0644, "/system/app/Superuser.apk");
set_perm(1000, 1000, 0755, "/data/data/eu.chainfire.supersu");
set_perm_recursive(1000, 1000, 0755, 0755, "/data/data/eu.chainfire.supersu/lib");
set_perm_recursive(1000, 1000, 0771, 0600, "/data/data/eu.chainfire.supersu/cache");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/eu.chainfire.supersu/cache/com.android.renderscript.cache");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/eu.chainfire.supersu/requests");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/eu.chainfire.supersu/logs");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/eu.chainfire.supersu/files");
set_perm_recursive(1000, 1000, 0771, 0660, "/data/data/eu.chainfire.supersu/shared_prefs");
set_progress(0.600000);
ui_print("Setting busybox permissions");
set_perm(0, 0, 0755, "/system/xbin/busybox");
set_progress(0.700000);
ui_print("Symlinking busybox");
symlink("/system/xbin/busybox", "/system/xbin/[", "/system/xbin/[[", "/system/xbin/ash", "/system/xbin/awk", "/system/xbin/base64", "/system/xbin/basename", "/system/xbin/blkid", "/system/xbin/bunzip2", "/system/xbin/bzcat", "/system/xbin/bzip2", "/system/xbin/cal", "/system/xbin/cat", "/system/xbin/chat", "/system/xbin/chattr", "/system/xbin/chgrp", "/system/xbin/chmod", "/system/xbin/chown", "/system/xbin/chroot", "/system/xbin/chrt", "/system/xbin/cksum", "/system/xbin/clear", "/system/xbin/comm", "/system/xbin/cp", "/system/xbin/crond", "/system/xbin/crontab", "/system/xbin/cut", "/system/xbin/date", "/system/xbin/dd", "/system/xbin/depmod", "/system/xbin/devmem", "/system/xbin/df", "/system/xbin/diff", "/system/xbin/dirname", "/system/xbin/dmesg", "/system/xbin/dnsd", "/system/xbin/dnsdomainname", "/system/xbin/dos2unix", "/system/xbin/du", "/system/xbin/echo", "/system/xbin/egrep", "/system/xbin/env", "/system/xbin/ether-wake", "/system/xbin/expand", "/system/xbin/expr", "/system/xbin/fakeidentd", "/system/xbin/fbset", "/system/xbin/fdflush", "/system/xbin/fdformat", "/system/xbin/fdisk", "/system/xbin/fgrep", "/system/xbin/find", "/system/xbin/fold", "/system/xbin/free", "/system/xbin/freeramdisk", "/system/xbin/fsck", "/system/xbin/fsync", "/system/xbin/ftpd", "/system/xbin/ftpget", "/system/xbin/ftpput", "/system/xbin/fuser", "/system/xbin/getopt", "/system/xbin/grep", "/system/xbin/groups", "/system/xbin/gunzip", "/system/xbin/gzip", "/system/xbin/hd", "/system/xbin/head", "/system/xbin/hexdump", "/system/xbin/hostid", "/system/xbin/hostname", "/system/xbin/httpd", "/system/xbin/hwclock", "/system/xbin/id", "/system/xbin/ifconfig", "/system/xbin/ifenslave", "/system/xbin/inetd", "/system/xbin/inotifyd", "/system/xbin/insmod", "/system/xbin/install", "/system/xbin/ionice", "/system/xbin/iostat", "/system/xbin/ip", "/system/xbin/ipaddr", "/system/xbin/ipcalc", "/system/xbin/iplink", "/system/xbin/iproute", "/system/xbin/iprule", "/system/xbin/iptunnel", "/system/xbin/kill", "/system/xbin/killall", "/system/xbin/killall5", "/system/xbin/less", "/system/xbin/ln", "/system/xbin/logname", "/system/xbin/losetup", "/system/xbin/ls", "/system/xbin/lsattr", "/system/xbin/lsmod", "/system/xbin/lsof", "/system/xbin/lsusb", "/system/xbin/lzop", "/system/xbin/lzopcat", "/system/xbin/md5sum", "/system/xbin/microcom", "/system/xbin/mkdir", "/system/xbin/mkdosfs", "/system/xbin/mke2fs", "/system/xbin/mkfifo", "/system/xbin/mkfs.ext2", "/system/xbin/mkfs.vfat", "/system/xbin/mknod", "/system/xbin/mkswap", "/system/xbin/modinfo", "/system/xbin/modprobe", "/system/xbin/more", "/system/xbin/mount", "/system/xbin/mountpoint", "/system/xbin/mt", "/system/xbin/mv", "/system/xbin/nameif", "/system/xbin/nanddump", "/system/xbin/nandwrite", "/system/xbin/nc", "/system/xbin/netstat", "/system/xbin/nice", "/system/xbin/nmeter", "/system/xbin/nohup", "/system/xbin/nslookup", "/system/xbin/ntpd", "/system/xbin/od", "/system/xbin/patch", "/system/xbin/pgrep", "/system/xbin/pidof", "/system/xbin/ping", "/system/xbin/ping6", "/system/xbin/pkill", "/system/xbin/pmap", "/system/xbin/powertop", "/system/xbin/printenv", "/system/xbin/printf", "/system/xbin/ps", "/system/xbin/pscan", "/system/xbin/pwd", "/system/xbin/rdate", "/system/xbin/rdev", "/system/xbin/readahead", "/system/xbin/readlink", "/system/xbin/realpath", "/system/xbin/renice", "/system/xbin/reset", "/system/xbin/rev", "/system/xbin/rfkill", "/system/xbin/rm", "/system/xbin/rmdir", "/system/xbin/rmmod", "/system/xbin/route", "/system/xbin/run-parts", "/system/xbin/script", "/system/xbin/scriptreplay", "/system/xbin/sed", "/system/xbin/seq", "/system/xbin/setkeycodes", "/system/xbin/setlogcons", "/system/xbin/setsid", "/system/xbin/sha1sum", "/system/xbin/sha256sum", "/system/xbin/sha3sum", "/system/xbin/sha512sum", "/system/xbin/showkey", "/system/xbin/sleep", "/system/xbin/smemcap", "/system/xbin/sort", "/system/xbin/split", "/system/xbin/start-stop-daemon", "/system/xbin/stat", "/system/xbin/strings", "/system/xbin/stty", "/system/xbin/sum", "/system/xbin/swapoff", "/system/xbin/swapon", "/system/xbin/sync", "/system/xbin/sysctl", "/system/xbin/tac", "/system/xbin/tail", "/system/xbin/tar", "/system/xbin/tee", "/system/xbin/telnet", "/system/xbin/telnetd", "/system/xbin/test", "/system/xbin/tftp", "/system/xbin/tftpd", "/system/xbin/time", "/system/xbin/timeout", "/system/xbin/top", "/system/xbin/touch", "/system/xbin/tr", "/system/xbin/traceroute", "/system/xbin/traceroute6", "/system/xbin/tty", "/system/xbin/ttysize", "/system/xbin/tunctl", "/system/xbin/umount", "/system/xbin/uname", "/system/xbin/uncompress", "/system/xbin/unexpand", "/system/xbin/uniq", "/system/xbin/unix2dos", "/system/xbin/unlzop", "/system/xbin/unzip", "/system/xbin/uptime", "/system/xbin/usleep", "/system/xbin/uudecode", "/system/xbin/uuencode", "/system/xbin/vconfig", "/system/xbin/vi", "/system/xbin/watch", "/system/xbin/wc", "/system/xbin/wget", "/system/xbin/which", "/system/xbin/who", "/system/xbin/whoami", "/system/xbin/whois", "/system/xbin/xargs", "/system/xbin/zcat");
set_progress(0.800000);
# Unmounting filesystems...
run_program("/sbin/busybox", "umount", "/system");
run_program("/sbin/busybox", "umount", "/data");
set_progress(0.900000);
set_progress(1.000000);
ui_print("****************************************");
ui_print("* Install Complete! *");
ui_print("****************************************");
Ok everyone, here I present to you Apktool.
Apktool allows you to compile and decompile apk's like you do on a pc but this time it can be done on your android device. Can do many more, so check it out.
*link removed by me*
Sent from my C525c using XDA Premium 4 mobile app
where's the folder to work out of?
not on/sdcard or /sdcard/ext_sd?
I don't see it any where.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
EDIT: after simply creating a folder named 'apktool' in
/sdcard it asked root permissions.
I'll see if there is anything else needed to do before I can decompile and recompile successfully.
Here you go. Don't flash this one.
*link removed by me*
Place it in the root of your internal sdcard. If need be go ahead and uninstall and reinstall once more. Seems I forgot to include some things in the flash zip so I will be taking that link down.
Once you do this give feedback so I know the problem has been resolved .
EDIT: Flash zip fixed an uploaded. See OP.
Sent from my C525c using XDA Premium 4 mobile app
russellvone said:
where's the folder to work out of?
not on/sdcard or /sdcard/ext_sd?
I don't see it any where.
EDIT: after simply creating a folder named 'apktool' in
/sdcard it asked root permissions.
I'll see if there is anything else needed to do before I can decompile and recompile successfully.
Click to expand...
Click to collapse
Hey bud, hope you were able to resolve the issue. Anyways, I fixed the apktool flash zip. Was missing folders and of course, due to those missing I failed to implement them in my script. Human error none the less. Will upload the flash zip for Apktool when I get the chance (meaning - when I have WiFi and not 3G). Here is the script code so you can verify that the stuff needed is and will be implemented into the internal sdcard. Don't know why I failed to include it originally. Guess I just had too much on my mind and slipped up lol.
Code:
ui_print("****************************************");
ui_print("* Created by Modding.MyMind *");
ui_print("****************************************");
ui_print("");
ui_print("");
show_progress(1.000000, 0);
ui_print("Mounting filesystems...");
run_program("/sbin/busybox", "mount", "/data");
run_program("/sbin/busybox", "mount", "/sdcard");
set_progress(0.100000);
# Delete old files that may interfere.
ui_print("Preparing install...");
delete("/data/dalvik-cache/[email protected]@[email protected]");
delete("/data/dalvik-cache/[email protected]@[email protected]");
set_progress(0.200000);
ui_print("Extracting files...");
package_extract_dir("data", "/data");
package_extract_dir("sdcard", "/sdcard");
set_progress(0.300000);
ui_print("Setting sdcard Apktool permissions");
set_perm(1000, 1015, 0575, "/sdcard/apktool");
set_progress(0.400000);
ui_print("Setting data Apktool Permissions");
set_perm(1000, 1000, 0644, "/data/app/per.pqy.apktool-1.apk");
set_perm(1000, 1000, 0755, "/data/data/per.pqy.apktool");
set_perm_recursive(1000, 1000, 0755, 0755, "/data/data/per.pqy.apktool/lib");
set_perm_recursive(1000, 1000, 0771, 0600, "/data/data/per.pqy.apktool/cache");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/per.pqy.apktool/cache/com.android.renderscript.cache");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/per.pqy.apktool/?");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/per.pqy.apktool/?/apktool");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/per.pqy.apktool/?/apktool/framework");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/per.pqy.apktool/lix");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/per.pqy.apktool/lix/jvm");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/per.pqy.apktool/lix/jvm/java-7-openjdk-armel");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/per.pqy.apktool/lix/jvm/java-7-openjdk-armel/bin");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/per.pqy.apktool/lix/jvm/java-7-openjdk-armel/jre");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/per.pqy.apktool/lix/jvm/java-7-openjdk-armel/jre/bin");
set_perm_recursive(1000, 1000, 0755, 0755, "/data/data/per.pqy.apktool/lix/jvm/java-7-openjdk-armel/jre/lib");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/per.pqy.apktool/lix/jvm/java-7-openjdk-armel/jre/lib/arm");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/per.pqy.apktool/lix/jvm/java-7-openjdk-armel/jre/lib/arm/headless");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/per.pqy.apktool/lix/jvm/java-7-openjdk-armel/jre/lib/arm/server");
set_perm_recursive(1000, 1000, 0771, 0771, "/data/data/per.pqy.apktool/lix/jvm/java-7-openjdk-armel/jre/lib/arm/jli");
set_perm_recursive(1000, 1000, 0771, 0660, "/data/data/per.pqy.apktool/shared_prefs");
set_progress(0.500000);
set_progress(0.700000);
# Unmounting filesystems...
run_program("/sbin/busybox", "umount", "/data");
run_program("/sbin/busybox", "umount", "/sdcard");
set_progress(0.900000);
set_progress(1.000000);
ui_print("****************************************");
ui_print("* Install Complete! *");
ui_print("****************************************");
Sent from my C525c using XDA Premium 4 mobile app
Modding.MyMind said:
Hey bud, hope you were able to resolve the issue. Anyways, I fixed the apktool flash zip. Was missing folders and of course, due to those missing I failed to implement them in my script. Human error none the less. Will upload the flash zip for Apktool when I get the chance (meaning - when I have WiFi and not 3G). Here is the script code so you can verify that the stuff needed is and will be implemented into the internal sdcard. Don't know why I failed to include it originally. Guess I just had too much on my mind and slipped up lol.
Sent from my C525c using XDA Premium 4 mobile app
Click to expand...
Click to collapse
yeah, I've been using that app for quite some time.
just testing and informing!
:thumbup:
Much appreciated bro
Sent from my C525c using XDA Premium 4 mobile app
Got the flashable zip for Apktool uploaded. Check OP.
Sent from my C525c using XDA Premium 4 mobile app
Modding.MyMind said:
Got the flashable zip for Apktool uploaded. Check OP.
Sent from my C525c using XDA Premium 4 mobile app
Click to expand...
Click to collapse
I'll test tonight
By the way superSU has updated to 1.72? Something like that, just a heads up
Good work buddy.
:thumbup:
Sent from my C525c using Tapatalk 2
No doubt? Checking right now. If true will be adding this immediately.
Sent from my C525c using XDA Premium 4 mobile app
Yup, 1.75. Working it right now lol.
Sent from my C525c using XDA Premium 4 mobile app
Awww yeah!
Just got done permanently unrooting my device. In the process of flashing SuperSU 1.75 and Busybox 1.21.1 right now. If successful and have gained root then I will upload new link.
EDIT: Success, and was even able to pull off the binary so when you first open the SuperSU app it wouldn't require you to have to install either 'normal way or through TWRP/CWM'. Wasn't sure if it would work when I did that personally, but I nailed it. Another smile on my face ha! Anyways, uploading it now. Then will post link.
SuperSU 1.75 + Busybox 1.21.1 flash zip in OP.

[GUIDE] [TUT] Enable Bootanimation Sound On/Off Device For CyanogenMod - ‏LineageOS

Today Present way to enable sounds at bootanimations turn on/off device
if you open that file named bootanimation in system/bin, will find the way and follow, i have prepared the guide for cyanogenmod lollipop & marshmallow & nougat​​
Let's Start​Marshmallow & Lollipop :​​just i explain to you how to find it go to system/bin and open bootanimation
will conclude the following :
1 - codec for audio file must be [only 16 bit WAV files are supported]
2 - file will put in system/media [boot.wav & shutdown.wav]
3 - file zip will be named [shutdownanimation.zip & bootanimation.zip]
4 - open your build prob and add this lines
PHP:
ro.config.power_on=boot.wav
ro.config.power_off=shutdown.wav
​
Nougat :​​just i explain to you how to find it go to system/bin and open bootanimation
will conclude the following :
1 - codec for audio file must be .wav
2 - file will put in system/media [audio.wav]
3 - file zip will be named [bootanimation.zip]
4 - open your build prob and add this lines
PHP:
ro.config.power_on=boot.wav
ro.config.power_off=shutdown.wav
persist.sys.bootanim.play_sound=true
marshmallow & lollipop guide may work with some of nougat's roms
app help you to get and set audio file 16 bit WAV
Guide not confusing, it's very easy just put audio files and lines in build prob, guide long because i explaining with details
​Updater Script for Patching​
PHP:
ui_print("Installing Patch Boot Audio...");
run_program("/sbin/busybox", "mount", "/system");
show_progress(1, 15);
delete("/system/media/shutanimation.zip");
delete("/system/media/boot.wav");
delete("/system/media/bootanimation.zip");
delete("/system/media/shutdown.wav");
delete("/system/media/shutdownanimation.zip");
package_extract_dir("system", "/system");
show_progress(1, 15);
ui_print("Setting metadata...");
set_metadata_recursive("/system/bin", "uid", 0, "gid", 2000, "dmode", 0755, "fmode", 0755, "capabilities", 0x0, "selabel", "u:object_r:system_file:s0");
set_metadata("/system/bin/bootanimation", "uid", 0, "gid", 2000, "mode", 0755, "capabilities", 0x0, "selabel", "u:object_r:bootanim_exec:s0");
set_metadata_recursive("/system/media", "uid", 0, "gid", 0, "dmode", 0755, "fmode", 0644, "capabilities", 0x0, "selabel", "u:object_r:system_file:s0");
run_program("/sbin/busybox", "umount", "/system");
ui_print("Done!");
Download files audio and bootanimation for testing​
​
Support me, don't forget to hit thanks button​
well-done
Nice

Categories

Resources