[A510] [Firmware] German .1099 FOTA - Acer Iconia A700 and A510

New FW available .1099: https://www.box.com/shared/6e23aee341b9ae089cac
update.7z (may be incomplete)
https://dl.dropbox.com/u/82306515/A510_german_backup.rar (better use this one, may be gone soon though)
mirror: A510_german_backup.rar
no major changes, root needs to be re-applied via fastboot
Sent from my A510 using xda app-developers app

people in german android forum reported better Touchscreen sensitivity. Confirmed?

As it has been theorized that poor touch performance is actually due to loss of calibration I think it's too early to tell.

I think it's a little faster and better, but still testing.

As I have not rooted, I'm thinking of just waiting for this via OTA (or hopefully my tablet will come with this from the service center).
Has anyone tried if the mempodroid root exploit is still working with this version?

Randomwalker said:
New FW available .1099: https://www.box.com/shared/6e23aee341b9ae089cac
no major changes, root needs to be re-applied via fastboot
Sent from my A510 using xda app-developers app
Click to expand...
Click to collapse
Which version did you install this update over ? Would it update my 1.073 WW_GEN1 ?

slvrbllt said:
Which version did you install this update over ? Would it update my 1.073 WW_GEN1 ?
Click to expand...
Click to collapse
German .1076. It probably will work just fine, but can't be sure until someone gives it a try .
Sent from my GT-N7000 using xda app-developers app

Randomwalker said:
German .1076. It probably will work just fine, but can't be sure until someone gives it a try .
Sent from my GT-N7000 using xda app-developers app
Click to expand...
Click to collapse
One more question mate: has this update solved any touch screen issues you might have experienced before?

Well, as I am just typing this reply from my tab lying on the table the issue might have improved, but still not perfect. Best to give it a shot yourself.
Sent from my A510 using xda app-developers app

there is a checking of the current region EMEA WW etc in this update.
so until somebody remove it and sign it again, you'll have to use a recovery to make the update.
EDIT : ok, i've tried a few thing, but the assert step fails..
i'm a little concerned to remove it and to launch the patch directly on files, as i'm not sure the version are the same (i'm on 1.60 EMEA_CUS1) and this update should apply on EMEA_DE (1.076 ?)..
we need a EMEA_DE user who has applied the update to make a dump of the modified files
---------- Post added at 05:39 PM ---------- Previous post was at 05:00 PM ----------
look a this list
Code:
ssert(apply_patch_check("/system/app/AcerRing.odex", "5218bb8ead9eb2b95fcde9d42e71105989251ed5", "69af0bd51d1dd8fca717d6ca04d0bfc6a6ecbe7d"));
set_progress(0.000919);
assert(apply_patch_check("/system/app/AcerShellData.odex", "02138a3fbad503a2170e9e00816da1c57e577083", "b34c3ca7489564d018939adc5e74ab3ec595dc07"));
set_progress(0.000928);
assert(apply_patch_check("/system/app/ApplicationsProvider.apk", "59fb595fd037b3e557b06006ec072d6ed5149396", "2063a90c1b93375ce404276051f1d9db93e910e7"));
set_progress(0.000969);
assert(apply_patch_check("/system/app/ApplicationsProvider.odex", "0758d753e2fd7c71969a4a99bf70347a40c06cf7", "aa621caf9a6772c612c7a21dab5675b222a963a4"));
set_progress(0.001123);
assert(apply_patch_check("/system/app/BackupRestoreConfirmation.apk", "e636bf2e24bf41aaca871a08eee5dc0cbce6fce5", "e42d6f5f8e5fe8ebe8d6fd3a082881c0055760b9"));
set_progress(0.001226);
assert(apply_patch_check("/system/app/BackupRestoreConfirmation.odex", "748ecfd86aafcb2c771e9f56c0b5f50d2a7f7c22", "093a522e8640661d18df9f4923eb6e748badfaa2"));
set_progress(0.001285);
assert(apply_patch_check("/system/app/Bluetooth.apk", "b20b1064e512e3bcde69c2d37065c4616fc42ded", "61fed36265e7e457d776978b68004c399a9b2c38"));
set_progress(0.001640);
assert(apply_patch_check("/system/app/Bluetooth.odex", "ce46f3c7b5c33c493215c5e7cdbddda056cd9bac", "eca3ab0a0044d6a54a7a9bd98ae521137e09e36a"));
set_progress(0.003050);
assert(apply_patch_check("/system/app/Browser.apk", "814a3ac6bef314431e54a38153d36981fbd60bad", "8626da68eb49f39b35e92392ca36d603a812ed3e"));
set_progress(0.008549);
assert(apply_patch_check("/system/app/Browser.odex", "c68139d8eaa3fbb328b5f5eca8ad84ce8bcc1eca", "1e6d56ff1cdbfd66403ff9a9600203a6a358cb73"));
set_progress(0.013471);
assert(apply_patch_check("/system/app/Calculator.apk", "47cbcd576ca8564473c58f2830efc89227bb35bc", "de99f18f41a17c1fd9def1b0f6536c73a287c6c9"));
set_progress(0.013840);
assert(apply_patch_check("/system/app/Calculator.odex", "92f277eb2910cc3815c4083df843f0950398b7ba", "a5cfb0e894117cfe5b23a9d4d2433e9c533798a2"));
set_progress(0.014676);
assert(apply_patch_check("/system/app/CalendarGoogle.apk", "caab71ff81f3183c6d05f9ab934ec01022eb6ba3", "fdeaae0e6ea63fdb9a282593206157ecc61051f2"));
set_progress(0.023146);
assert(apply_patch_check("/system/app/CalendarProvider.apk", "423fa239daab8c099a930aacb74e36b7f06c39a8", "ff757addf130028ea8ee8189416b3b0507d443bf"));
set_progress(0.023252);
assert(apply_patch_check("/system/app/CalendarProvider.odex", "6fe32d40f3f0cba43d3c37b1aa0a04b5783753cb", "3678b0b8d50a5cc33e1260842d24e5b797aee5b9"));
set_progress(0.024926);
assert(apply_patch_check("/system/app/Camera.odex", "9d007597559178e727552ca9e8c2bbadcd5c088f", "49326c7b19cf2663b314dcedc03488f68df5332c"));
set_progress(0.026902);
assert(apply_patch_check("/system/app/CertInstaller.apk", "03358f1bb3df263348b305dd85c5e33ad5538010", "01b0057a3ba15ebd1b4adfa7018a8244fd475894"));
set_progress(0.027014);
assert(apply_patch_check("/system/app/CertInstaller.odex", "a8a4f73ada5dd3bf7c48a78d5d18620d04f47c90", "7195b66f9a8f60e9fa20c77036cf9b0734038899"));
set_progress(0.027263);
assert(apply_patch_check("/system/app/ChromeBookmarksSyncAdapter.apk", "15b82b3c5ebd8a10920200351dba27d890a009b8", "69b62666cb19da9c09dcc20cfed56142215b6ed2"));
set_progress(0.028402);
assert(apply_patch_check("/system/app/Contacts.apk", "ec13a160ecc60eb451c9191034d6e90d6c8c170e", "dc0dc34b6229b4c47fff8c08a5968e0d7271f962"));
set_progress(0.032939);
assert(apply_patch_check("/system/app/Contacts.odex", "a41993eabe7ca0fda976bfe56974d17b7f4d9789", "cffee2d28f42c58ee4fb354de04aea8ae8b32dde"));
set_progress(0.046142);
assert(apply_patch_check("/system/app/ContactsProvider.apk", "3df7e4b8ec9c9a5f18e368c5470fa6c943b86ce9", "59dc951c73bb8af6e3e3a20dbd850d9659b493b4"));
set_progress(0.046225);
assert(apply_patch_check("/system/app/ContactsProvider.odex", "cc0a8a7138860fca8e2c130ec0a15f5f0209f6b5", "5bf89dc8dd9aa082538ae9287321fb6eb0dbdb69"));
set_progress(0.054392);
assert(apply_patch_check("/system/app/DefaultContainerService.apk", "787ee6d52e35452c969a000b0d64e4d7b9f3ad4a", "5574dac269776099e145da6a55c0c981ef4c9ede"));
set_progress(0.054417);
assert(apply_patch_check("/system/app/DefaultContainerService.odex", "435ac008e6d60c90c0d1db5209bbb236247b7cbe", "3a4ff366632f0a3a80f5a675f9299a7c1ebc9cbf"));
set_progress(0.054510);
assert(apply_patch_check("/system/app/DeskClock.odex", "5d3fd58f34b5f49229ec431085f63813f7ffc4a7", "5195003ffeb7acfc276baeb8fb8701b85315dbee"));
set_progress(0.055075);
assert(apply_patch_check("/system/app/DownloadProvider.apk", "558475659ada32138965c7285706adf51185cba6", "188f21487f7c29b5cc48fab05c162a83090ad28d"));
set_progress(0.055203);
assert(apply_patch_check("/system/app/DownloadProvider.odex", "a9361a0368382f8edc10034f32706254f4f24131", "897451aec354480ca974cf565401db491d3132c6"));
set_progress(0.056319);
assert(apply_patch_check("/system/app/DownloadProviderUi.apk", "9c26eba5c5474cd3a9db6a3c1680311b51fbac12", "14e157202bef1b2ed871ecb10e53356595799f4c"));
set_progress(0.056664);
assert(apply_patch_check("/system/app/DownloadProviderUi.odex", "f52d34dbb0cb1567b85ce041395dce38c17d1329", "192a859f0bb2743ca5b1742248004f9988437bcc"));
set_progress(0.056904);
assert(apply_patch_check("/system/app/DrmProvider.apk", "dc2dc9a628f930c961fd8e802058f72821811938", "068c7455800e7d506383d2a2ae9a10df2c39a17b"));
set_progress(0.056941);
assert(apply_patch_check("/system/app/DrmProvider.odex", "8b1bb63d660f7d025fcdc4ee1e27b8ff548078cb", "d09db581ab4b0069366ffc932fb3d6a5f679ffc7"));
set_progress(0.057022);
assert(apply_patch_check("/system/app/DxDrmApplication.odex", "539a36978386a32708aede289e094e34a302eb69", "b4a2803637d84db45182bb841e39cd042962b1ef"));
set_progress(0.057275);
assert(apply_patch_check("/system/app/Email.apk", "0bdeb62332ad16793b5ee31e755568a604698eec", "1dcaf97c9693a5eaf6abd468773f7e27831a6a21"));
set_progress(0.060709);
assert(apply_patch_check("/system/app/Email.odex", "fe195f24443dcb9393791a0a441f2b7f7805045d", "40681f62d80c23308473ef73362eb240c87245df"));
set_progress(0.073140);
assert(apply_patch_check("/system/app/Exchange.odex", "c410e51889ffabfc4d62674eb1e99cbe57fb6207", "4a7fb38da746ce38d8019beb2278befbf8103410"));
set_progress(0.081951);
assert(apply_patch_check("/system/app/FWupdateService.odex", "00553cafd2a52f933a90f8814e80248ab3db4fe3", "ada31d6665942cfe5aaa68a81932b60dd0bc258d"));
set_progress(0.081989);
assert(apply_patch_check("/system/app/GMS_Maps.apk", "8e188323196da09973fc1b6ea44cd29a9fdfd8f3", "e3c5b43a1fed0799d20a9ed8f33ea645452fd429"));
set_progress(0.119333);
assert(apply_patch_check("/system/app/GalleryGoogle.apk", "32331f5ce5b8df0d999b6c24392408b6e217f6a7", "b6c029fef3d7ff6f95cc242331359e5334c689ab"));
set_progress(0.136725);
assert(apply_patch_check("/system/app/Gmail.apk", "32eb5e4394f7b183f711cd83b5ac843cba86e19e", "7e6ae825567a8d32b016aee7e3aea082e2525b55"));
set_progress(0.154683);
assert(apply_patch_check("/system/app/GoogleBackupTransport.apk", "07c27d9ce23a3dc71f2b0131f64b37fcd3c9d69a", "b1c00695f4423ed7f3176e1983a7deb2d3765996"));
set_progress(0.155220);
assert(apply_patch_check("/system/app/GoogleContactsSyncAdapter.apk", "345259b7740a1af0c1809cbe1abafe092937d563", "05ea0f1d0b0bc240a21ec6b8bd4adff93a9ee172"));
set_progress(0.156235);
assert(apply_patch_check("/system/app/GoogleFeedback.apk", "966e41afa29f64bb2a5a9ce23985e3704ad2979b", "4d7875b5da2ca91c0cd45f4a325bd27462b9b48d"));
set_progress(0.157844);
assert(apply_patch_check("/system/app/GoogleLoginService.apk", "c746cb940b289c52a6686f481b1f3ad835e2703b", "f2358bd19c6b4eb48e8c95a33e5385c0f03007ea"));
set_progress(0.184440);
assert(apply_patch_check("/system/app/GooglePartnerSetup.apk", "2bbe8074afeab1b13202ec32415ef2deccebbb5a", "b4891c4295b58b1d73ccccf78f02a86fc5ca84ed"));
set_progress(0.185061);
assert(apply_patch_check("/system/app/GoogleQuickSearchBox.apk", "d97306272d64c54817342b2d81e47d3d9090cecc", "b1f8c07a92c54cde5353538c0269303a843c2b76"));
set_progress(0.189753);
assert(apply_patch_check("/system/app/GoogleServicesFramework.apk", "210a86da6f5f152bc667fdbba0f1159dd9a7027a", "9cbc46c5388e1d36054e227ef7d45fb07c706034"));
set_progress(0.208308);
assert(apply_patch_check("/system/app/GoogleTTS.apk", "65933477a698d6192ab3b5750166fc24fb64ca1b", "9ddd938be34ce0d52b0dde03e9a05d76b854cb14"));
set_progress(0.235815);
assert(apply_patch_check("/system/app/HTMLViewer.apk", "0094d779be2985a3630bdaa0985f018fc813afe1", "44af0fd95fa84ccbf9c4691849eb50f836b78b1e"));
set_progress(0.235841);
assert(apply_patch_check("/system/app/HTMLViewer.odex", "f9d247c96be2a0d0006e7d3c699c8c09a07a6630", "1d4042d69e276c4d491e63e0088b8378145cb7da"));
set_progress(0.235885);
assert(apply_patch_check("/system/app/HoloSpiralWallpaper.apk", "c95a952fba80047535b8e6fe52b329ad1539faef", "cb7a5b174934d77e19e637724ef047e9d7621936"));
set_progress(0.236089);
assert(apply_patch_check("/system/app/HoloSpiralWallpaper.odex", "fa4ba6b379cae8656d869a695dbd70efa8542476", "7e886f2e18865e2541779e871f85af606d3352ed"));
set_progress(0.236226);
assert(apply_patch_check("/system/app/KeyChain.apk", "62c4718b925e6b84851a8ae973a79dffc4d932d3", "83ead1a1c7dea339c88295684d2a1d8ce25d95c0"));
set_progress(0.236276);
assert(apply_patch_check("/system/app/KeyChain.odex", "40b5b831ac1009df63ff85fd8712729c7ddba1ff", "d378e2b05d8fa7391dcb36af8965e297add5b3b5"));
set_progress(0.236453);
assert(apply_patch_check("/system/app/LatinImeDictionaryPack.apk", "940b1a950ec08b7512dcbc953ad44bf39f702ba7", "176241f53267caa2f07e2adc9ea3b2327f8db898"));
set_progress(0.237250);
assert(apply_patch_check("/system/app/LatinImeGoogle.apk", "e473083da57d6b1c5190bbf19a8c80e81743144c", "de1428d9a73d0a92f581bb0973268b8eed71e5e7"));
set_progress(0.276309);
assert(apply_patch_check("/system/app/Launcher2.apk", "1fca841ab99a951f5b9d3889bfa63c2c01c64d2a", "6dea222d0bedf42ab2abecbe0bb5c53e7f9c0fb3"));
set_progress(0.360516);
assert(apply_patch_check("/system/app/Launcher2.odex", "2ee6a364e47cf774b10cff0bfcb50df121de277f", "4901d03c3a90539be95ab09b5886ece393edc324"));
set_progress(0.363567);
assert(apply_patch_check("/system/app/LinkToFacebook.odex", "b71b92b72b9a18191efe04db51d176aad139999c", "aee722c76780eb74a3e0c41d7b79c155cfbbe3ef"));
set_progress(0.363579);
assert(apply_patch_check("/system/app/LiveWallpapers.apk", "5ffcdfb6d9131887bb68aeb59d1b7ceff6948ace", "7f7c0ea7033c994084e54c93d26df9415913ad02"));
set_progress(0.370355);
assert(apply_patch_check("/system/app/LiveWallpapers.odex", "a422d973527e11d5e18322fbc643156175c29da7", "3c34fbd7bf25d09f6f513fe56024a5408b36c8b1"));
set_progress(0.370850);
assert(apply_patch_check("/system/app/LiveWallpapersPicker.apk", "410747484f5315fbc777bc8bb16c4d4e0f1d78d2", "66e30c6ee882307a96fe552e92d81d031c6a859a"));
set_progress(0.371502);
assert(apply_patch_check("/system/app/LiveWallpapersPicker.odex", "d50765de072a544ac59aef10f91dba56f0b16c20", "3b4f5b0ab18c76ea311e6d0b04e16ababb9bd904"));
set_progress(0.371649);
assert(apply_patch_check("/system/app/MagicSmokeWallpapers.apk", "c162d48c2ac30547029921fbb082f192fb42d59b", "ae74d467ca29d8a321a5e55c628448037c6eb69e"));
set_progress(0.372917);
assert(apply_patch_check("/system/app/MagicSmokeWallpapers.odex", "908e4eb06608eb4dd6e252e4f7bd20148c51d38e", "47fca089c4de69a31483ffb7fcc237f80dcd3b95"));
set_progress(0.373105);
assert(apply_patch_check("/system/app/MediaProvider.apk", "96103eecd340384608bfc7e75aece243470a6a1e", "83fc8e4806efd9296f9ceec9e1b5e3bff96f5901"));
set_progress(0.373173);
assert(apply_patch_check("/system/app/MediaProvider.odex", "a818925531cee4d156c8127af65857fd8667476e", "2daabee97a6e7c041421b9584c305cb4b625e73d"));
set_progress(0.373919);
assert(apply_patch_check("/system/app/MusicFX.odex", "549dcec3de6a34f6b01b70d74cda3f44cc3a5f89", "633d1f60c3c84899d41a0a355adcab0519a4b1a6"));
set_progress(0.374452);
assert(apply_patch_check("/system/app/NoiseField.odex", "2c92f55012a7679d72c76ad44693373b9094d3da", "9a9f27591c6d253652977f83a2f061a244821774"));
set_progress(0.374592);
assert(apply_patch_check("/system/app/OneTimeInitializer.apk", "e60620ebd4791765d9a79ba1974cec5d7c5d9e5d", "43ddb9bdfaf6c3171a7087261e5ad2d4b2dfc612"));
set_progress(0.374634);
assert(apply_patch_check("/system/app/PackageInstaller.apk", "663a3414f8339e410c8b525d5714a37e8b297198", "a5571cf8f6fdd20cba4e0cce56261a202a70d2cb"));
set_progress(0.374839);
assert(apply_patch_check("/system/app/PackageInstaller.odex", "22d06576ca76062c4084f454ad212d238c3daac7", "2ada256d626953c18d90039bdd22526fbbdd08e8"));
set_progress(0.375028);
assert(apply_patch_check("/system/app/PhaseBeam.odex", "9d9e9f49e02ac210e851cbd1ed1acd2983a477ec", "79cb2621f1acfa66755803e949b77a7ca09e471c"));
set_progress(0.375166);
assert(apply_patch_check("/system/app/Phone.apk", "0a409bf350ef9467c0c476226fdab515f30f195a", "1ecc56d254e5fc9a39c589a05d31669fcf99506a"));
set_progress(0.377949);
assert(apply_patch_check("/system/app/Phone.odex", "0ae183bb25d2bc26d2c979ed3a5f2d0dfbd901a2", "4c72c85c8a53dadd2b38768ca5a6e12ce0dd5a25"));
set_progress(0.382213);
assert(apply_patch_check("/system/app/Phonesky.apk", "6fbdc7da35943518d5f8fb89a55c0cdb685fef4c", "c569e27b439bbcd14f9eac1bad42bd564a08b654"));
set_progress(0.406219);
assert(apply_patch_check("/system/app/PlusOne.apk", "81189be08769574ead6be71459b7d96c71f33078", "8ad5cba642365162a4c4e9160f91c75f58c6be51"));
set_progress(0.462762);
assert(apply_patch_check("/system/app/Settings.apk", "d3fb6a0f7a74fed2477668865772305dda243aa6", "10821e21da311350965720ede4c79abd08d7e050"));
set_progress(0.472996);
assert(apply_patch_check("/system/app/Settings.odex", "ec606a91c2649cc683e6e5cb3f28bffa36956d27", "e21e8ffec04265e017e03a947efba71bda0fcde9"));
set_progress(0.480235);
assert(apply_patch_check("/system/app/SettingsProvider.apk", "6fd90aacec4811394e3e7cd733712f9c401bbdaf", "ae74bbffe6fb771fd58c105c7faafc487e30bb68"));
set_progress(0.480317);
assert(apply_patch_check("/system/app/SettingsProvider.odex", "45ec966ac219d3812971f346cfa19836ea7d10a3", "c312a1a7fc45f56544beebe82cb253c7749c4691"));
set_progress(0.480700);
assert(apply_patch_check("/system/app/SharedStorageBackup.apk", "b11180186cbda3691ed15e4eeb2853d049b64520", "001a728899339a5588188ec832b60bc930bd4743"));
set_progress(0.480717);
assert(apply_patch_check("/system/app/SharedStorageBackup.odex", "e3777157c0531666e468ad745c3fce123ee0f8dc", "a9b472b9ed7ceb4e4137133007be82d17cf3d777"));
set_progress(0.480744);
assert(apply_patch_check("/system/app/SoundRecorder.apk", "361886660355af7b49c6eaeb923f858ca60f24fb", "30c4a15abcc9a0d0182defdb651082ffb63fe1b5"));
set_progress(0.480948);
assert(apply_patch_check("/system/app/SoundRecorder.odex", "ead2784611bf4b1ffd762c2b11deefe257ec88bf", "c9d89b52bb0f77c8658191749e94cc2669abaee2"));
set_progress(0.481108);
assert(apply_patch_check("/system/app/Street.apk", "a783f23032951dc10dbe603b1ca7a524d386eb4a", "92fe9b0353a72af94eeb1c64a5362cbf8b6160a7"));
set_progress(0.482937);
assert(apply_patch_check("/system/app/SystemUI.apk", "55dddd7d5cda43d56b280866fb78a223a527d635", "d69fa963609f437aaa10f7d5dd7530988d16b9ea"));
set_progress(0.485567);
assert(apply_patch_check("/system/app/SystemUI.odex", "12c91b286715cfc3c4397ded976b439060f17325", "92cc5db5de7706f6cc9f23572192b0aea5903d4f"));
set_progress(0.487776);
assert(apply_patch_check("/system/app/Talk.apk", "58c86aef171cfd59d6d832b9085fb6f3df3137c1", "e3b6f13d4e8260869fe423df007cc778e2959c7b"));
set_progress(0.501944);
assert(apply_patch_check("/system/app/TelephonyProvider.apk", "25fe46c4bca4ab3a2204a37ec67cdcd210c4d568", "8d6c5e99f38c3f396746164c2110f8b9defb06b9"));
set_progress(0.501998);
assert(apply_patch_check("/system/app/TelephonyProvider.odex", "1a141d4e3b936059f1c229a80e151a383dbdc657", "3fe2e8b2d7c9bae6d400d2c26fcc67d8c5c63dda"));
set_progress(0.502650);
assert(apply_patch_check("/system/app/UserDictionaryProvider.apk", "c6033c1b91c6282185699c1f09c46dac533764eb", "6db42d9e768b054daefb922554981bbca8a628ef"));
set_progress(0.502673);
assert(apply_patch_check("/system/app/UserDictionaryProvider.odex", "daa88eda2afac9b58768c0a17ae46fc78b5c198e", "b0097d9416ccd11f0c0cac854773dc56887d82ae"));
set_progress(0.502768);
assert(apply_patch_check("/system/app/VisualizationWallpapers.apk", "a96b99cf98487ad037ab727c1714d2a0083bc7c6", "e681c7a09af7682d81381a74d83e181f0f67ae7a"));
set_progress(0.503641);
assert(apply_patch_check("/system/app/VisualizationWallpapers.odex", "daab45e7d75914aa2cb0185d6bafc910fa3b8084", "5f26a4d5ed31924e8515327ed83b2fc95ebad9fe"));
set_progress(0.503869);
assert(apply_patch_check("/system/app/VpnDialogs.apk", "8ffe87290ca44c3035ec9eb4e22da1a6d018d0a8", "8accee7e64066332be6a1fd7a9e03b88a5cbd491"));
set_progress(0.503933);
assert(apply_patch_check("/system/app/VpnDialogs.odex", "d3d64453a4a81a30a407f7c0019c2cccb06f720c", "a9231c0ce6c3afebb8bf16893619b21173c36375"));
set_progress(0.503992);
assert(apply_patch_check("/system/app/YouTube.apk", "1cead37fcd8e2fe37cbb9227fe177cd0189827f6", "427dfddb730afa3c4e6283eb2d110f7d0170ede3"));
set_progress(0.528179);
assert(apply_patch_check("/system/app/xt9.apk", "f2b25c7e76e19bf732180c64feeda21370e0620b", "0df562b2863b4a14ff3fb9576402750079582caa"));
set_progress(0.535905);
assert(apply_patch_check("/system/bin/DxDrmServerIpc", "8ad5f6a7fe510c2fec03c83cc73dbe74632cdda3", "7dcae883b0fef267210464d2663a7a42e6fe8288"));
set_progress(0.561950);
assert(apply_patch_check("/system/bin/adb", "4d51287107a37aa2b25a4142c3f5b153cd577fd7", "98f141ed7439e8ed1922c599b3da0d1a6bbd8767"));
set_progress(0.562566);
assert(apply_patch_check("/system/bin/debuggerd", "9d684aa7488c8a3c81c6a8703ba5a1692466c24b", "c45f09d0c405a7556232f6c765e6c1b7f0ecf988"));
set_progress(0.562707);
assert(apply_patch_check("/system/bin/dhcpcd", "4a7dc152766ce6d2da3469f8bc65a72338b5bac5", "e5c2985886230b62c57adcaf929491f5b2ad16dc"));
set_progress(0.563098);
assert(apply_patch_check("/system/bin/dnsmasq", "2309c03d34469cc7732c749aac33780c9c9cbe6c", "0834603ec5374fa1676f097e2811ccc3f5d8cfbf"));
set_progress(0.563762);
assert(apply_patch_check("/system/bin/dumpstate", "c43f11aa5733725b2b99ab27c5b3699ab7e4d6fc", "dd417507aa60c35bdf8dbe8dd5105751db626ef0"));
set_progress(0.564034);
assert(apply_patch_check("/system/bin/fusermount", "d5a24dc257974fa7833773b720341e481a063eab", "9ca2268b79469159cf8576272f6aacf171c107f9"));
set_progress(0.564177);
assert(apply_patch_check("/system/bin/hostapd", "5088c355b601c1eef970d2919caa460f6298b43b", "e3ba3dadfe74227aa9bc381503c1f3eac9fcbff4"));
set_progress(0.565757);
assert(apply_patch_check("/system/bin/installd", "09febaeb1b7c1144a9ba0656ba62be6c5e2e1843", "501ccfd047243243b07049ed26e676dcedf8ab5a"));
set_progress(0.565900);
assert(apply_patch_check("/system/bin/ip", "b8771db666f98dd32dee43722b9ef890b6513948", "7309f93d0a2de0ea21c6514902858081a1e94a2c"));
set_progress(0.566774);
assert(apply_patch_check("/system/bin/ip6tables", "1eded24b3a21e0cdf4df7b68da81be05f220916d", "a1923194b74564ac31eb17993f85afc7ebf7bc97"));
set_progress(0.567911);
assert(apply_patch_check("/system/bin/iptables", "e3469a95d211045bdc687830138ce9b31aa0f1a7", "99d9a162ae37859602572baac9ee2534d67a8b8a"));
set_progress(0.569083);
assert(apply_patch_check("/system/bin/logcat", "c114821cd3bce6ba259f97f50c03ca57c3e7462b", "38f13162c0ee291623c64dd93cf870a2dd1919ca"));
set_progress(0.569172);
assert(apply_patch_check("/system/bin/mksh", "86024db3d6c082fa148dc236082fd8719f9e2dcb", "cc742093369a6c321e033f06f97b2e034c2525f9"));
set_progress(0.570136);
assert(apply_patch_check("/system/bin/netd", "2a737461f317607c770baa7fe57a44923f86ee47", "58708971045220bd4345704b547ffb7f546cdd28"));
set_progress(0.570493);
assert(apply_patch_check("/system/bin/ping", "6f0e86120cfb1d83754bbf7db0adc5e8d86e5916", "a0b3f7111eb1a730f1e7be137ebfa57799508315"));
set_progress(0.570662);
assert(apply_patch_check("/system/bin/vold", "51c2cc7c3eac44050aa86e19b25291e78a1cfb67", "fe72ff17a46a90a91a51348bb83ee250c5a93212"));
set_progress(0.571122);
assert(apply_patch_check("/system/bin/wpa_supplicant", "e652d41ba12be9d63895fe7d611c97e45c786dcf", "d264d5b52a849225fc5dc78ed84fc3b264d17425"));
set_progress(0.574518);
assert(apply_patch_check("/system/build.prop", "6bda9cafded4c41b8420054d7c4e0aa269b488b2", "2b2e25fe61843f4846cceef9cfdccb65ff3357fc"));
set_progress(0.574531);
assert(apply_patch_check("/system/etc/NOTICE.html.gz", "b27cf10ebafc89745efdc579e9f63a750e229575", "6b93dc34052842ca394fb615958303b4584b17eb"));
set_progress(0.575239);
assert(apply_patch_check("/system/etc/security/otacerts.zip", "3a0d51a1270366e87635a0d054d55278a1f047bb", "577e0a384192fad6e51eed0e69288d0104e4d800"));
set_progress(0.575251);
assert(apply_patch_check("/system/etc/wifi/bcmdhd.cal", "afd933b9dfa859c31ebcce994b1930214b1e8d05", "119d122ad978e4fe8d91cb618bd637eb0f64a183"));
set_progress(0.575256);
assert(apply_patch_check("/system/framework/am.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "5d01f84fa85b4169e31ca9ed6cf31b8f48b05bbd"));
set_progress(0.575258);
assert(apply_patch_check("/system/framework/am.odex", "18bc9c5bc8d74a2db62be9427d037ba666c6e58d", "1604a9939c91ba847f635a9da5eedbaca7009701"));
set_progress(0.575507);
assert(apply_patch_check("/system/framework/android.policy.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "416b66401686329299214220ab88f455c5175855"));
set_progress(0.575509);
assert(apply_patch_check("/system/framework/android.policy.odex", "7d46b0f6f859612ec151123626467ee22fd5625f", "ede5fd428513ab664be46303596df63eb7a6f003"));
set_progress(0.577685);
assert(apply_patch_check("/system/framework/android.test.runner.jar", "2a338c2f4e5166059048d787a7c830d012022bd6", "5b477946fc53a7512653b99d41a2a7615bd05163"));
set_progress(0.577687);
assert(apply_patch_check("/system/framework/android.test.runner.odex", "5bae3b47b41c4c814ef71c425adf5793ab741d7d", "d1e03a67f49481b3808acae7989956fe837d9882"));
set_progress(0.578842);
assert(apply_patch_check("/system/framework/apache-xml.jar", "0200154508806dfcd5d3d8de8836414e8967ea1c", "ea64781b839bc7e515ee39d8cc4c3a965a7a8383"));
set_progress(0.578956);
assert(apply_patch_check("/system/framework/apache-xml.odex", "c9d7aaf2d6a5a736d872ef821f2ecf49de9dd4fd", "3f7b7e3726e389e961cf68081d2d05b90bbfdf59"));
set_progress(0.587700);
assert(apply_patch_check("/system/framework/bmgr.jar", "0d2673417d1a548756c92af3430ef4cc2720e8cc", "465be10d9168c99f06a353763463597cc1e16696"));
set_progress(0.587702);
assert(apply_patch_check("/system/framework/bmgr.odex", "1a68e3fccf92a1bd6a840eafd825a7bc3a74a56f", "528a69205d3b3ac34ca17d488e8cff5f8501398a"));
set_progress(0.587796);
assert(apply_patch_check("/system/framework/bouncycastle.jar", "924c0b0d1f9643a7c197f99fc2716160941ad0ac", "8e25ca40f1b87f7006b970c1366d7816538e7e46"));
set_progress(0.587798);
assert(apply_patch_check("/system/framework/bouncycastle.odex", "db8a3d58365c26f3f4a4848baa6861406fa965d8", "9569aa9caedbb956b8db2900c5a3975ab120488d"));
set_progress(0.594001);
assert(apply_patch_check("/system/framework/bu.jar", "0d2673417d1a548756c92af3430ef4cc2720e8cc", "465be10d9168c99f06a353763463597cc1e16696"));
set_progress(0.594003);
assert(apply_patch_check("/system/framework/bu.odex", "183fc7b01c42d7aee6b16426304d7bc21edac70f", "1d611a1f79911330c005822e39e8935038e773d8"));
set_progress(0.594032);
assert(apply_patch_check("/system/framework/com.acer.android.os.jar", "64941b97afd2c3ddccc323b8151eae29ee35c622", "eb38901fcacb6ba4c9328f92a983d66ddb17dce1"));
set_progress(0.594034);
assert(apply_patch_check("/system/framework/com.acer.android.os.odex", "1afd8fa45b07a71ad70069e8896db57ff78cf680", "41759bb0b97cf3ec2befe79d85177c287a73c0f3"));
set_progress(0.594450);
assert(apply_patch_check("/system/framework/com.android.future.usb.accessory.jar", "0d2673417d1a548756c92af3430ef4cc2720e8cc", "465be10d9168c99f06a353763463597cc1e16696"));
set_progress(0.594452);
assert(apply_patch_check("/system/framework/com.android.future.usb.accessory.odex", "b7b58382cd10e559a26b2436bbab007ddec197b0", "d568501ee618a87e336d60700ddd6ad729a24d77"));
set_progress(0.594490);
assert(apply_patch_check("/system/framework/com.android.location.provider.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "465be10d9168c99f06a353763463597cc1e16696"));
set_progress(0.594492);
assert(apply_patch_check("/system/framework/com.android.location.provider.odex", "cc6530462a835a39ff508d032ffee22dcad1e3ce", "25b187e1ccf4e4c948e290002b7323b1c94af61d"));
set_progress(0.594539);
assert(apply_patch_check("/system/framework/com.google.android.maps.jar", "757ecb4dbe85ae09fa9f1b1484a2ea347a588e73", "bcbf7bab3229485e33dc40378a636a61ca947ecb"));
set_progress(0.595534);
assert(apply_patch_check("/system/framework/com.google.android.media.effects.jar", "dc1360ec2fcf3206f48abf8fb44fc944f2d8f1bb", "a80975fcb984b162176df67ef97bb7d7bf77619d"));
set_progress(0.595757);
assert(apply_patch_check("/system/framework/com.google.widevine.software.drm.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "5d01f84fa85b4169e31ca9ed6cf31b8f48b05bbd"));
set_progress(0.595759);
assert(apply_patch_check("/system/framework/com.google.widevine.software.drm.odex", "0407bf72f183cdbf76cf13fb1b301d1206c37112", "84377d57ed8ad1e5e063489e891265b807d12ffc"));
set_progress(0.595766);
assert(apply_patch_check("/system/framework/core-junit.jar", "cb48860709bdb781570d7ba11c1dd2864282681b", "5f8c5cc027fdfeab5c0ab5a7d3c5fb22647a948e"));
set_progress(0.595768);
assert(apply_patch_check("/system/framework/core-junit.odex", "a50bc815b578f4169b48b3684fb61a9460fd0b8f", "3a837fe6eff2068b649d4251ae0d4ad7982ed088"));
set_progress(0.595918);
assert(apply_patch_check("/system/framework/core.jar", "2a7acf7edcea469a5015fc034a277a27703a6fef", "f6158be41e36b4f167675ccfe5fa1b23ba67134b"));
set_progress(0.595944);
assert(apply_patch_check("/system/framework/core.odex", "7512edb702da09e30a22791e810a7ba17347afab", "e8522dfdc92b4ec76384486ab984b8b0233795c5"));
set_progress(0.617279);
assert(apply_patch_check("/system/framework/ext.jar", "40603e617196a532826c62e73f0fb798e00e7f88", "7f920cad462df32308926877e5131b0e158da2de"));
set_progress(0.620074);
assert(apply_patch_check("/system/framework/ext.odex", "97cd4d66900f46289c6e5b7fac8204ac633ffdb2", "306be3b50d6b2e578729a530e0d8be746e1cd783"));
set_progress(0.629552);
assert(apply_patch_check("/system/framework/filterfw.jar", "dace49693f7f90ea161afea34bac50f0585db463", "e74df0b461f6cc64f14119b6cd115ca779db263e"));
set_progress(0.629554);
assert(apply_patch_check("/system/framework/filterfw.odex", "09104eb69921f276b819e5e89ba64ce379aae80d", "ebe45fdd6bfef2c8ea0c61701dbff7051c394dc4"));
set_progress(0.631602);
assert(apply_patch_check("/system/framework/framework-res.apk", "aaa7fc11353ce1e115bb7ff77c02b717e67da406", "8077962649872cd826c0597edd2eba350591422b"));
set_progress(0.663821);
assert(apply_patch_check("/system/framework/framework.jar", "5cf2eb326bb79ca10aeb987ce026875b1dd34576", "c8a99df5cbcc02c8947e80d48c5d8ca1f253a920"));
set_progress(0.663916);
assert(apply_patch_check("/system/framework/framework.odex", "71855914b32b4fa8314076deab6561afa970d959", "517f47caf3e2ccafdb5a265c5fe7cb9669aecb6c"));
set_progress(0.732167);
assert(apply_patch_check("/system/framework/ime.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "5d01f84fa85b4169e31ca9ed6cf31b8f48b05bbd"));
set_progress(0.732169);
assert(apply_patch_check("/system/framework/ime.odex", "f7109e062eb19b01d5d11c838572e54a2f69a6a0", "6b72269b36f5450701656a86392134da93d93277"));
set_progress(0.732212);
assert(apply_patch_check("/system/framework/input.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "5d01f84fa85b4169e31ca9ed6cf31b8f48b05bbd"));
set_progress(0.732214);
assert(apply_patch_check("/system/framework/input.odex", "a7b48e1ad3c4cc9af956563e6641c57d04aa9d28", "5d6a7b3ee559e2ea7348f448d3b9a98db617a438"));
set_progress(0.732243);
assert(apply_patch_check("/system/framework/javax.obex.jar", "0d2673417d1a548756c92af3430ef4cc2720e8cc", "ad77e56c15e28d3429b3c706408c1af351514231"));
set_progress(0.732245);
assert(apply_patch_check("/system/framework/javax.obex.odex", "a0122c043711a90e99cc9d02d522238ec2eadf47", "43aa39c104b4453f977d4086545dda350b2ad1e4"));
set_progress(0.732614);
assert(apply_patch_check("/system/framework/monkey.jar", "0e345052670db5bc47611272b281d677fe24f6c8", "5b477946fc53a7512653b99d41a2a7615bd05163"));
set_progress(0.732616);
assert(apply_patch_check("/system/framework/monkey.odex", "2b024576a7c2c4018e43d10bcf23e3d3f744ebac", "63e6acec50579c91a950f4a33d115f80d98dc691"));
set_progress(0.733347);
assert(apply_patch_check("/system/framework/pm.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "416b66401686329299214220ab88f455c5175855"));
set_progress(0.733349);

follow ..
Code:
assert(apply_patch_check("/system/framework/pm.odex", "5484d2dec30a6a77e7f076a439a073e270ecae20", "741537deaf3c87e791c9732949065eb99610db84"));
set_progress(0.733542);
assert(apply_patch_check("/system/framework/services.jar", "31fd90c0232389acdcaea608fa0e08c5f8629bc3", "d16248128effc71dd626f168d4a535aff2dcac7b"));
set_progress(0.733544);
assert(apply_patch_check("/system/framework/services.odex", "fcc9dd29ad84b9fbbbdbd6b5c33a976c4c44855c", "9b24db37fdcb7afc4dc31bdaefcc189f43e6899f"));
set_progress(0.746307);
assert(apply_patch_check("/system/framework/svc.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "416b66401686329299214220ab88f455c5175855"));
set_progress(0.746309);
assert(apply_patch_check("/system/framework/svc.odex", "4c8f60c8ae184c487964d8925954cee47c16bac7", "24e9c1495256263767bca22acacae89912e0d5cd"));
set_progress(0.746363);
assert(apply_patch_check("/system/lib/libDxAndroidSpecific.so", "5ddbb1ccdad85202bae46e3ab16f66f84840e571", "9b19379b3c0082071f7bfdfbea114e2cf7408c30"));
set_progress(0.746441);
assert(apply_patch_check("/system/lib/libDxDrmCAPI.so", "830635884cfc79fefed9b9f952c76833ffab014a", "bc07fa3ee9364b665ff5d1d13c1da670e6e70257"));
set_progress(0.752685);
assert(apply_patch_check("/system/lib/libDxDrmJava.so", "b3123c7fa13a64245af0e867f2f1908aea8c09e4", "79f23452efbf3d33f552ed06ebba3b740d05e2a8"));
set_progress(0.758610);
assert(apply_patch_check("/system/lib/libbcc.so", "6664db631b6bbb8899b58fe05649ee8ff0788088", "bd66b3cdb4b90f9118aefaf352ac8abfe9f0014f"));
set_progress(0.787235);
assert(apply_patch_check("/system/lib/libc.so", "28cb55c0dfc6aa904b7554cda8063199fff950bf", "dc8ca9fbeb7d52391304c6872a16dd95f1c3a94e"));
set_progress(0.789025);
assert(apply_patch_check("/system/lib/libchromium_net.so", "a880c55b8655ee5c60fe582f595454dedcd962d2", "ddddae913eca4cd55dc0d3ae77fd9d86e936cb83"));
set_progress(0.800625);
assert(apply_patch_check("/system/lib/libcrypto.so", "63c414646279add74ca7e4ed055ab3a84c2b73cb", "4dc3032a8e09f69dc2637befcbc76d7577b85f2a"));
set_progress(0.805866);
assert(apply_patch_check("/system/lib/libexif.so", "a25f51bef7fda744f1ee34bd10a7d85d528e51a7", "5fc163743fbf37849da4f4761c5b08b55907d584"));
set_progress(0.806152);
assert(apply_patch_check("/system/lib/libfilterpack_facedetect.so", "df6cc630b46422294191474e4ef9a80ce6943c4b", "356232d535906045f059043174ea99b795f46f84"));
set_progress(0.809723);
assert(apply_patch_check("/system/lib/libfrsdk.so", "03088193c2d2438560b40b4c9c7ce037e726c7b9", "fc0418b8562140cd65cf075b148baf02125b9bd7"));
set_progress(0.821131);
assert(apply_patch_check("/system/lib/libfuse.so", "3c65020b06a57e0be16c6afceea857e582e65c7e", "d068a0f819cfd78b16817535c3a5573027174a29"));
set_progress(0.822063);
assert(apply_patch_check("/system/lib/libgcomm_jni.so", "de50b694bce41f263561d87419f3e472066a265d", "319b5e7b408187a32a8359c9a1c3c6ab1c95fb3d"));
set_progress(0.870328);
assert(apply_patch_check("/system/lib/libmediaplayerservice.so", "2188b3c509643ff85153c699d9ba89b88506c7cb", "de9452881eee99ab4317c30cbc37f77aaa703053"));
set_progress(0.872577);
assert(apply_patch_check("/system/lib/libmllite.so", "c1b3f86f4d38d3f1b7ffac14f133eb6a8ffa3186", "62de29d28077a9778a66877ad0186853625ffb3d"));
set_progress(0.873136);
assert(apply_patch_check("/system/lib/libpicowrapper.so", "1980fd45e0422f81635d694803dca15251bc69f4", "643bbcf106e970ba9d6e135cf159cc97834ee589"));
set_progress(0.874986);
assert(apply_patch_check("/system/lib/libskia.so", "965eb164ec5a5e04cc2675b5e8471cf9dc8f9db7", "924cc034944e35d23b87063ccfe6f372e756a1af"));
set_progress(0.882505);
assert(apply_patch_check("/system/lib/libsqlite.so", "f4806b155ac93a85dc14754f22c3b62549b9b85e", "e1078b9d1558eb9c038e8cc4668f9a3d09bf7bc3"));
set_progress(0.884603);
assert(apply_patch_check("/system/lib/libstagefright.so", "bd283f54502253d66b03e9187a22fbdda05ddd54", "980cbd6c924bd865c122606d790e8e96ba2980fe"));
set_progress(0.894152);
assert(apply_patch_check("/system/lib/libvideochat_jni.so", "0171ebbf8b1fbbaf6a9f083df53fb717bf37a0c8", "76fb5cd53b2f695366286e878d54956528e357b6"));
set_progress(0.919325);
assert(apply_patch_check("/system/lib/libvideochat_stabilize.so", "508f14b4d70d9508cebf0008e335105e77a6d34b", "781b7e99717d277841b80ec002fa7bee0a25a270"));
set_progress(0.919881);
assert(apply_patch_check("/system/lib/libwebcore.so", "bfcefcc9d72e9ca993aa92ff8515cb15b1e42e26", "288bb97aaaec0f61375d2771a4e7a18b432d8338"));
set_progress(0.968385);
assert(apply_patch_check("/system/lib/libwebrtc_audio_preprocessing.so", "e039e76871b3382ea3b82780c4dbd3460950cc0c", "baf24d70e68a6f4b7c491e6271b324f69b5ea645"));
set_progress(0.970134);
assert(apply_patch_check("/flex/app/McAfee.apk", "8184980ef17c54e8a4a8f381745106b3bd7d28ca", "b453779a5c6fb80458a81be94a4b226ba4601a70"));
set_progress(0.974218);
assert(apply_patch_check("/flex/etc/preload.xml", "7b032cf465b0df3e4fdaf07ed0d7c5409e626e7d", "1df68dc91fbd70da5b8208092e0ec96779526633"));
set_progress(0.974225);
assert(apply_patch_check("EMMC:/dev/block/platform/sdhci-tegra.3/by-name/LNX:4063488:caad169aa6cde2d9289af08527945ee950fcfe34:4063488:757965aa4ca5375ad070ba6c69c1991d233c4035"));
set_progress(1.000000);

I wouldn't apply an update on a ROM that it's not made for... first it might not work and second if it applies there might be unwanted side effects.

BENETNATH said:
we need a EMEA_DE user who has applied the update to make a dump of the modified files
Click to expand...
Click to collapse
If you tell me how...

BTW: Anyone else having the issue that an outdated version of Play Books is applied during every reboot, forcing an update afterwards?

Randomwalker said:
If you tell me how...
Click to expand...
Click to collapse
can you try that as a .bat or .sh script (depending of your config)
with a computer connected through adb
Code:
adb shell su -c 'mkdir /mnt/sdcard/update'
adb shell su -c 'mkdir /mnt/sdcard/update/flex'
adb shell su -c 'mkdir /mnt/sdcard/update/flex/app'
adb shell su -c 'mkdir /mnt/sdcard/update/flex/etc'
adb shell su -c 'mkdir /mnt/sdcard/update/system'
adb shell su -c 'mkdir /mnt/sdcard/update/system/app'
adb shell su -c 'mkdir /mnt/sdcard/update/system/bin'
adb shell su -c 'mkdir /mnt/sdcard/update/system/etc'
adb shell su -c 'mkdir /mnt/sdcard/update/system/framework'
adb shell su -c 'mkdir /mnt/sdcard/update/system/lib'
adb shell su -c 'dd if=/flex/app/McAfee.apk of=/mnt/sdcard/update/flex/app/McAfee.apk'
adb shell su -c 'dd if=/flex/etc/preload.xml of=/mnt/sdcard/update/flex/etc/preload.xml'
adb shell su -c 'dd if=/system/app/AcerRing.odex of=/mnt/sdcard/update/system/app/AcerRing.odex'
adb shell su -c 'dd if=/system/app/AcerShellData.odex of=/mnt/sdcard/update/system/app/AcerShellData.odex'
adb shell su -c 'dd if=/system/app/ApplicationsProvider.apk of=/mnt/sdcard/update/system/app/ApplicationsProvider.apk'
adb shell su -c 'dd if=/system/app/ApplicationsProvider.odex of=/mnt/sdcard/update/system/app/ApplicationsProvider.odex'
adb shell su -c 'dd if=/system/app/BackupRestoreConfirmation.apk of=/mnt/sdcard/update/system/app/BackupRestoreConfirmation.apk'
adb shell su -c 'dd if=/system/app/BackupRestoreConfirmation.odex of=/mnt/sdcard/update/system/app/BackupRestoreConfirmation.odex'
adb shell su -c 'dd if=/system/app/Bluetooth.apk of=/mnt/sdcard/update/system/app/Bluetooth.apk'
adb shell su -c 'dd if=/system/app/Bluetooth.odex of=/mnt/sdcard/update/system/app/Bluetooth.odex'
adb shell su -c 'dd if=/system/app/Browser.apk of=/mnt/sdcard/update/system/app/Browser.apk'
adb shell su -c 'dd if=/system/app/Browser.odex of=/mnt/sdcard/update/system/app/Browser.odex'
adb shell su -c 'dd if=/system/app/Calculator.apk of=/mnt/sdcard/update/system/app/Calculator.apk'
adb shell su -c 'dd if=/system/app/Calculator.odex of=/mnt/sdcard/update/system/app/Calculator.odex'
adb shell su -c 'dd if=/system/app/CalendarGoogle.apk of=/mnt/sdcard/update/system/app/CalendarGoogle.apk'
adb shell su -c 'dd if=/system/app/CalendarProvider.apk of=/mnt/sdcard/update/system/app/CalendarProvider.apk'
adb shell su -c 'dd if=/system/app/CalendarProvider.odex of=/mnt/sdcard/update/system/app/CalendarProvider.odex'
adb shell su -c 'dd if=/system/app/Camera.odex of=/mnt/sdcard/update/system/app/Camera.odex'
adb shell su -c 'dd if=/system/app/CertInstaller.apk of=/mnt/sdcard/update/system/app/CertInstaller.apk'
adb shell su -c 'dd if=/system/app/CertInstaller.odex of=/mnt/sdcard/update/system/app/CertInstaller.odex'
adb shell su -c 'dd if=/system/app/ChromeBookmarksSyncAdapter.apk of=/mnt/sdcard/update/system/app/ChromeBookmarksSyncAdapter.apk'
adb shell su -c 'dd if=/system/app/Contacts.apk of=/mnt/sdcard/update/system/app/Contacts.apk'
adb shell su -c 'dd if=/system/app/Contacts.odex of=/mnt/sdcard/update/system/app/Contacts.odex'
adb shell su -c 'dd if=/system/app/ContactsProvider.apk of=/mnt/sdcard/update/system/app/ContactsProvider.apk'
adb shell su -c 'dd if=/system/app/ContactsProvider.odex of=/mnt/sdcard/update/system/app/ContactsProvider.odex'
adb shell su -c 'dd if=/system/app/DefaultContainerService.apk of=/mnt/sdcard/update/system/app/DefaultContainerService.apk'
adb shell su -c 'dd if=/system/app/DefaultContainerService.odex of=/mnt/sdcard/update/system/app/DefaultContainerService.odex'
adb shell su -c 'dd if=/system/app/DeskClock.odex of=/mnt/sdcard/update/system/app/DeskClock.odex'
adb shell su -c 'dd if=/system/app/DownloadProvider.apk of=/mnt/sdcard/update/system/app/DownloadProvider.apk'
adb shell su -c 'dd if=/system/app/DownloadProvider.odex of=/mnt/sdcard/update/system/app/DownloadProvider.odex'
adb shell su -c 'dd if=/system/app/DownloadProviderUi.apk of=/mnt/sdcard/update/system/app/DownloadProviderUi.apk'
adb shell su -c 'dd if=/system/app/DownloadProviderUi.odex of=/mnt/sdcard/update/system/app/DownloadProviderUi.odex'
adb shell su -c 'dd if=/system/app/DrmProvider.apk of=/mnt/sdcard/update/system/app/DrmProvider.apk'
adb shell su -c 'dd if=/system/app/DrmProvider.odex of=/mnt/sdcard/update/system/app/DrmProvider.odex'
adb shell su -c 'dd if=/system/app/DxDrmApplication.odex of=/mnt/sdcard/update/system/app/DxDrmApplication.odex'
adb shell su -c 'dd if=/system/app/Email.apk of=/mnt/sdcard/update/system/app/Email.apk'
adb shell su -c 'dd if=/system/app/Email.odex of=/mnt/sdcard/update/system/app/Email.odex'
adb shell su -c 'dd if=/system/app/Exchange.odex of=/mnt/sdcard/update/system/app/Exchange.odex'
adb shell su -c 'dd if=/system/app/FWupdateService.odex of=/mnt/sdcard/update/system/app/FWupdateService.odex'
adb shell su -c 'dd if=/system/app/GalleryGoogle.apk of=/mnt/sdcard/update/system/app/GalleryGoogle.apk'
adb shell su -c 'dd if=/system/app/Gmail.apk of=/mnt/sdcard/update/system/app/Gmail.apk'
adb shell su -c 'dd if=/system/app/GMS_Maps.apk of=/mnt/sdcard/update/system/app/GMS_Maps.apk'
adb shell su -c 'dd if=/system/app/GoogleBackupTransport.apk of=/mnt/sdcard/update/system/app/GoogleBackupTransport.apk'
adb shell su -c 'dd if=/system/app/GoogleContactsSyncAdapter.apk of=/mnt/sdcard/update/system/app/GoogleContactsSyncAdapter.apk'
adb shell su -c 'dd if=/system/app/GoogleFeedback.apk of=/mnt/sdcard/update/system/app/GoogleFeedback.apk'
adb shell su -c 'dd if=/system/app/GoogleLoginService.apk of=/mnt/sdcard/update/system/app/GoogleLoginService.apk'
adb shell su -c 'dd if=/system/app/GooglePartnerSetup.apk of=/mnt/sdcard/update/system/app/GooglePartnerSetup.apk'
adb shell su -c 'dd if=/system/app/GoogleQuickSearchBox.apk of=/mnt/sdcard/update/system/app/GoogleQuickSearchBox.apk'
adb shell su -c 'dd if=/system/app/GoogleServicesFramework.apk of=/mnt/sdcard/update/system/app/GoogleServicesFramework.apk'
adb shell su -c 'dd if=/system/app/GoogleTTS.apk of=/mnt/sdcard/update/system/app/GoogleTTS.apk'
adb shell su -c 'dd if=/system/app/HoloSpiralWallpaper.apk of=/mnt/sdcard/update/system/app/HoloSpiralWallpaper.apk'
adb shell su -c 'dd if=/system/app/HoloSpiralWallpaper.odex of=/mnt/sdcard/update/system/app/HoloSpiralWallpaper.odex'
adb shell su -c 'dd if=/system/app/HTMLViewer.apk of=/mnt/sdcard/update/system/app/HTMLViewer.apk'
adb shell su -c 'dd if=/system/app/HTMLViewer.odex of=/mnt/sdcard/update/system/app/HTMLViewer.odex'
adb shell su -c 'dd if=/system/app/KeyChain.apk of=/mnt/sdcard/update/system/app/KeyChain.apk'
adb shell su -c 'dd if=/system/app/KeyChain.odex of=/mnt/sdcard/update/system/app/KeyChain.odex'
adb shell su -c 'dd if=/system/app/LatinImeDictionaryPack.apk of=/mnt/sdcard/update/system/app/LatinImeDictionaryPack.apk'
adb shell su -c 'dd if=/system/app/LatinImeGoogle.apk of=/mnt/sdcard/update/system/app/LatinImeGoogle.apk'
adb shell su -c 'dd if=/system/app/Launcher2.apk of=/mnt/sdcard/update/system/app/Launcher2.apk'
adb shell su -c 'dd if=/system/app/Launcher2.odex of=/mnt/sdcard/update/system/app/Launcher2.odex'
adb shell su -c 'dd if=/system/app/LinkToFacebook.odex of=/mnt/sdcard/update/system/app/LinkToFacebook.odex'
adb shell su -c 'dd if=/system/app/LiveWallpapers.apk of=/mnt/sdcard/update/system/app/LiveWallpapers.apk'
adb shell su -c 'dd if=/system/app/LiveWallpapers.odex of=/mnt/sdcard/update/system/app/LiveWallpapers.odex'
adb shell su -c 'dd if=/system/app/LiveWallpapersPicker.apk of=/mnt/sdcard/update/system/app/LiveWallpapersPicker.apk'
adb shell su -c 'dd if=/system/app/LiveWallpapersPicker.odex of=/mnt/sdcard/update/system/app/LiveWallpapersPicker.odex'
adb shell su -c 'dd if=/system/app/MagicSmokeWallpapers.apk of=/mnt/sdcard/update/system/app/MagicSmokeWallpapers.apk'
adb shell su -c 'dd if=/system/app/MagicSmokeWallpapers.odex of=/mnt/sdcard/update/system/app/MagicSmokeWallpapers.odex'
adb shell su -c 'dd if=/system/app/MediaProvider.apk of=/mnt/sdcard/update/system/app/MediaProvider.apk'
adb shell su -c 'dd if=/system/app/MediaProvider.odex of=/mnt/sdcard/update/system/app/MediaProvider.odex'
adb shell su -c 'dd if=/system/app/MusicFX.odex of=/mnt/sdcard/update/system/app/MusicFX.odex'
adb shell su -c 'dd if=/system/app/NoiseField.odex of=/mnt/sdcard/update/system/app/NoiseField.odex'
adb shell su -c 'dd if=/system/app/OneTimeInitializer.apk of=/mnt/sdcard/update/system/app/OneTimeInitializer.apk'
adb shell su -c 'dd if=/system/app/PackageInstaller.apk of=/mnt/sdcard/update/system/app/PackageInstaller.apk'
adb shell su -c 'dd if=/system/app/PackageInstaller.odex of=/mnt/sdcard/update/system/app/PackageInstaller.odex'
adb shell su -c 'dd if=/system/app/PhaseBeam.odex of=/mnt/sdcard/update/system/app/PhaseBeam.odex'
adb shell su -c 'dd if=/system/app/Phone.apk of=/mnt/sdcard/update/system/app/Phone.apk'
adb shell su -c 'dd if=/system/app/Phone.odex of=/mnt/sdcard/update/system/app/Phone.odex'
adb shell su -c 'dd if=/system/app/Phonesky.apk of=/mnt/sdcard/update/system/app/Phonesky.apk'
adb shell su -c 'dd if=/system/app/PlusOne.apk of=/mnt/sdcard/update/system/app/PlusOne.apk'
adb shell su -c 'dd if=/system/app/Settings.apk of=/mnt/sdcard/update/system/app/Settings.apk'
adb shell su -c 'dd if=/system/app/Settings.odex of=/mnt/sdcard/update/system/app/Settings.odex'
adb shell su -c 'dd if=/system/app/SettingsProvider.apk of=/mnt/sdcard/update/system/app/SettingsProvider.apk'
adb shell su -c 'dd if=/system/app/SettingsProvider.odex of=/mnt/sdcard/update/system/app/SettingsProvider.odex'
adb shell su -c 'dd if=/system/app/SharedStorageBackup.apk of=/mnt/sdcard/update/system/app/SharedStorageBackup.apk'
adb shell su -c 'dd if=/system/app/SharedStorageBackup.odex of=/mnt/sdcard/update/system/app/SharedStorageBackup.odex'
adb shell su -c 'dd if=/system/app/SoundRecorder.apk of=/mnt/sdcard/update/system/app/SoundRecorder.apk'
adb shell su -c 'dd if=/system/app/SoundRecorder.odex of=/mnt/sdcard/update/system/app/SoundRecorder.odex'
adb shell su -c 'dd if=/system/app/Street.apk of=/mnt/sdcard/update/system/app/Street.apk'
adb shell su -c 'dd if=/system/app/SystemUI.apk of=/mnt/sdcard/update/system/app/SystemUI.apk'
adb shell su -c 'dd if=/system/app/SystemUI.odex of=/mnt/sdcard/update/system/app/SystemUI.odex'
adb shell su -c 'dd if=/system/app/Talk.apk of=/mnt/sdcard/update/system/app/Talk.apk'
adb shell su -c 'dd if=/system/app/TelephonyProvider.apk of=/mnt/sdcard/update/system/app/TelephonyProvider.apk'
adb shell su -c 'dd if=/system/app/TelephonyProvider.odex of=/mnt/sdcard/update/system/app/TelephonyProvider.odex'
adb shell su -c 'dd if=/system/app/UserDictionaryProvider.apk of=/mnt/sdcard/update/system/app/UserDictionaryProvider.apk'
adb shell su -c 'dd if=/system/app/UserDictionaryProvider.odex of=/mnt/sdcard/update/system/app/UserDictionaryProvider.odex'
adb shell su -c 'dd if=/system/app/VisualizationWallpapers.apk of=/mnt/sdcard/update/system/app/VisualizationWallpapers.apk'
adb shell su -c 'dd if=/system/app/VisualizationWallpapers.odex of=/mnt/sdcard/update/system/app/VisualizationWallpapers.odex'
adb shell su -c 'dd if=/system/app/VpnDialogs.apk of=/mnt/sdcard/update/system/app/VpnDialogs.apk'
adb shell su -c 'dd if=/system/app/VpnDialogs.odex of=/mnt/sdcard/update/system/app/VpnDialogs.odex'
adb shell su -c 'dd if=/system/app/xt9.apk of=/mnt/sdcard/update/system/app/xt9.apk'
adb shell su -c 'dd if=/system/app/YouTube.apk of=/mnt/sdcard/update/system/app/YouTube.apk'
adb shell su -c 'dd if=/system/bin/adb of=/mnt/sdcard/update/system/bin/adb'
adb shell su -c 'dd if=/system/bin/debuggerd of=/mnt/sdcard/update/system/bin/debuggerd'
adb shell su -c 'dd if=/system/bin/dhcpcd of=/mnt/sdcard/update/system/bin/dhcpcd'
adb shell su -c 'dd if=/system/bin/dnsmasq of=/mnt/sdcard/update/system/bin/dnsmasq'
adb shell su -c 'dd if=/system/bin/dumpstate of=/mnt/sdcard/update/system/bin/dumpstate'
adb shell su -c 'dd if=/system/bin/DxDrmServerIpc of=/mnt/sdcard/update/system/bin/DxDrmServerIpc'
adb shell su -c 'dd if=/system/bin/fusermount of=/mnt/sdcard/update/system/bin/fusermount'
adb shell su -c 'dd if=/system/bin/hostapd of=/mnt/sdcard/update/system/bin/hostapd'
adb shell su -c 'dd if=/system/bin/installd of=/mnt/sdcard/update/system/bin/installd'
adb shell su -c 'dd if=/system/bin/ip of=/mnt/sdcard/update/system/bin/ip'
adb shell su -c 'dd if=/system/bin/ip6tables of=/mnt/sdcard/update/system/bin/ip6tables'
adb shell su -c 'dd if=/system/bin/iptables of=/mnt/sdcard/update/system/bin/iptables'
adb shell su -c 'dd if=/system/bin/logcat of=/mnt/sdcard/update/system/bin/logcat'
adb shell su -c 'dd if=/system/bin/mksh of=/mnt/sdcard/update/system/bin/mksh'
adb shell su -c 'dd if=/system/bin/netd of=/mnt/sdcard/update/system/bin/netd'
adb shell su -c 'dd if=/system/bin/ping of=/mnt/sdcard/update/system/bin/ping'
adb shell su -c 'dd if=/system/bin/vold of=/mnt/sdcard/update/system/bin/vold'
adb shell su -c 'dd if=/system/bin/wpa_supplicant of=/mnt/sdcard/update/system/bin/wpa_supplicant'
adb shell su -c 'dd if=/system/build.prop of=/mnt/sdcard/update/system/build.prop'
adb shell su -c 'dd if=/system/etc/NOTICE.html.gz of=/mnt/sdcard/update/system/etc/NOTICE.html.gz'
adb shell su -c 'dd if=/system/etc/security/otacerts.zip of=/mnt/sdcard/update/system/etc/security/otacerts.zip'
adb shell su -c 'dd if=/system/etc/wifi/bcmdhd.cal of=/mnt/sdcard/update/system/etc/wifi/bcmdhd.cal'
adb shell su -c 'dd if=/system/framework/am.jar of=/mnt/sdcard/update/system/framework/am.jar'
adb shell su -c 'dd if=/system/framework/am.odex of=/mnt/sdcard/update/system/framework/am.odex'
adb shell su -c 'dd if=/system/framework/android.policy.jar of=/mnt/sdcard/update/system/framework/android.policy.jar'
adb shell su -c 'dd if=/system/framework/android.policy.odex of=/mnt/sdcard/update/system/framework/android.policy.odex'
adb shell su -c 'dd if=/system/framework/android.test.runner.jar of=/mnt/sdcard/update/system/framework/android.test.runner.jar'
adb shell su -c 'dd if=/system/framework/android.test.runner.odex of=/mnt/sdcard/update/system/framework/android.test.runner.odex'
adb shell su -c 'dd if=/system/framework/apache-xml.jar of=/mnt/sdcard/update/system/framework/apache-xml.jar'
adb shell su -c 'dd if=/system/framework/apache-xml.odex of=/mnt/sdcard/update/system/framework/apache-xml.odex'
adb shell su -c 'dd if=/system/framework/bmgr.jar of=/mnt/sdcard/update/system/framework/bmgr.jar'
adb shell su -c 'dd if=/system/framework/bmgr.odex of=/mnt/sdcard/update/system/framework/bmgr.odex'
adb shell su -c 'dd if=/system/framework/bouncycastle.jar of=/mnt/sdcard/update/system/framework/bouncycastle.jar'
adb shell su -c 'dd if=/system/framework/bouncycastle.odex of=/mnt/sdcard/update/system/framework/bouncycastle.odex'
adb shell su -c 'dd if=/system/framework/bu.jar of=/mnt/sdcard/update/system/framework/bu.jar'
adb shell su -c 'dd if=/system/framework/bu.odex of=/mnt/sdcard/update/system/framework/bu.odex'
adb shell su -c 'dd if=/system/framework/com.acer.android.os.jar of=/mnt/sdcard/update/system/framework/com.acer.android.os.jar'
adb shell su -c 'dd if=/system/framework/com.acer.android.os.odex of=/mnt/sdcard/update/system/framework/com.acer.android.os.odex'
adb shell su -c 'dd if=/system/framework/com.android.future.usb.accessory.jar", of=/mnt/sdcard/update/system/framework/com.android.future.usb.accessory.jar",'
adb shell su -c 'dd if=/system/framework/com.android.future.usb.accessory.odex", of=/mnt/sdcard/update/system/framework/com.android.future.usb.accessory.odex",'
adb shell su -c 'dd if=/system/framework/com.android.location.provider.jar", of=/mnt/sdcard/update/system/framework/com.android.location.provider.jar",'
adb shell su -c 'dd if=/system/framework/com.android.location.provider.odex", of=/mnt/sdcard/update/system/framework/com.android.location.provider.odex",'
adb shell su -c 'dd if=/system/framework/com.google.android.maps.jar of=/mnt/sdcard/update/system/framework/com.google.android.maps.jar'
adb shell su -c 'dd if=/system/framework/com.google.android.media.effects.jar", of=/mnt/sdcard/update/system/framework/com.google.android.media.effects.jar",'
adb shell su -c 'dd if=/system/framework/com.google.widevine.software.drm.jar", of=/mnt/sdcard/update/system/framework/com.google.widevine.software.drm.jar",'
adb shell su -c 'dd if=/system/framework/com.google.widevine.software.drm.odex", of=/mnt/sdcard/update/system/framework/com.google.widevine.software.drm.odex",'
adb shell su -c 'dd if=/system/framework/core.jar of=/mnt/sdcard/update/system/framework/core.jar'
adb shell su -c 'dd if=/system/framework/core.odex of=/mnt/sdcard/update/system/framework/core.odex'
adb shell su -c 'dd if=/system/framework/core-junit.jar of=/mnt/sdcard/update/system/framework/core-junit.jar'
adb shell su -c 'dd if=/system/framework/core-junit.odex of=/mnt/sdcard/update/system/framework/core-junit.odex'
adb shell su -c 'dd if=/system/framework/ext.jar of=/mnt/sdcard/update/system/framework/ext.jar'
adb shell su -c 'dd if=/system/framework/ext.odex of=/mnt/sdcard/update/system/framework/ext.odex'
adb shell su -c 'dd if=/system/framework/filterfw.jar of=/mnt/sdcard/update/system/framework/filterfw.jar'
adb shell su -c 'dd if=/system/framework/filterfw.odex of=/mnt/sdcard/update/system/framework/filterfw.odex'
adb shell su -c 'dd if=/system/framework/framework.jar of=/mnt/sdcard/update/system/framework/framework.jar'
adb shell su -c 'dd if=/system/framework/framework.odex of=/mnt/sdcard/update/system/framework/framework.odex'
adb shell su -c 'dd if=/system/framework/framework-res.apk of=/mnt/sdcard/update/system/framework/framework-res.apk'
adb shell su -c 'dd if=/system/framework/ime.jar of=/mnt/sdcard/update/system/framework/ime.jar'
adb shell su -c 'dd if=/system/framework/ime.odex of=/mnt/sdcard/update/system/framework/ime.odex'
adb shell su -c 'dd if=/system/framework/input.jar of=/mnt/sdcard/update/system/framework/input.jar'
adb shell su -c 'dd if=/system/framework/input.odex of=/mnt/sdcard/update/system/framework/input.odex'
adb shell su -c 'dd if=/system/framework/javax.obex.jar of=/mnt/sdcard/update/system/framework/javax.obex.jar'
adb shell su -c 'dd if=/system/framework/javax.obex.odex of=/mnt/sdcard/update/system/framework/javax.obex.odex'
adb shell su -c 'dd if=/system/framework/monkey.jar of=/mnt/sdcard/update/system/framework/monkey.jar'
adb shell su -c 'dd if=/system/framework/monkey.odex of=/mnt/sdcard/update/system/framework/monkey.odex'
adb shell su -c 'dd if=/system/framework/pm.jar of=/mnt/sdcard/update/system/framework/pm.jar'
adb shell su -c 'dd if=/system/framework/pm.odex of=/mnt/sdcard/update/system/framework/pm.odex'
adb shell su -c 'dd if=/system/framework/services.jar of=/mnt/sdcard/update/system/framework/services.jar'
adb shell su -c 'dd if=/system/framework/services.odex of=/mnt/sdcard/update/system/framework/services.odex'
adb shell su -c 'dd if=/system/framework/svc.jar of=/mnt/sdcard/update/system/framework/svc.jar'
adb shell su -c 'dd if=/system/framework/svc.odex of=/mnt/sdcard/update/system/framework/svc.odex'
adb shell su -c 'dd if=/system/lib/libbcc.so of=/mnt/sdcard/update/system/lib/libbcc.so'
adb shell su -c 'dd if=/system/lib/libc.so of=/mnt/sdcard/update/system/lib/libc.so'
adb shell su -c 'dd if=/system/lib/libchromium_net.so of=/mnt/sdcard/update/system/lib/libchromium_net.so'
adb shell su -c 'dd if=/system/lib/libcrypto.so of=/mnt/sdcard/update/system/lib/libcrypto.so'
adb shell su -c 'dd if=/system/lib/libDxAndroidSpecific.so of=/mnt/sdcard/update/system/lib/libDxAndroidSpecific.so'
adb shell su -c 'dd if=/system/lib/libDxDrmCAPI.so of=/mnt/sdcard/update/system/lib/libDxDrmCAPI.so'
adb shell su -c 'dd if=/system/lib/libDxDrmJava.so of=/mnt/sdcard/update/system/lib/libDxDrmJava.so'
adb shell su -c 'dd if=/system/lib/libexif.so of=/mnt/sdcard/update/system/lib/libexif.so'
adb shell su -c 'dd if=/system/lib/libfilterpack_facedetect.so of=/mnt/sdcard/update/system/lib/libfilterpack_facedetect.so'
adb shell su -c 'dd if=/system/lib/libfrsdk.so of=/mnt/sdcard/update/system/lib/libfrsdk.so'
adb shell su -c 'dd if=/system/lib/libfuse.so of=/mnt/sdcard/update/system/lib/libfuse.so'
adb shell su -c 'dd if=/system/lib/libgcomm_jni.so of=/mnt/sdcard/update/system/lib/libgcomm_jni.so'
adb shell su -c 'dd if=/system/lib/libmediaplayerservice.so of=/mnt/sdcard/update/system/lib/libmediaplayerservice.so'
adb shell su -c 'dd if=/system/lib/libmllite.so of=/mnt/sdcard/update/system/lib/libmllite.so'
adb shell su -c 'dd if=/system/lib/libpicowrapper.so of=/mnt/sdcard/update/system/lib/libpicowrapper.so'
adb shell su -c 'dd if=/system/lib/libskia.so of=/mnt/sdcard/update/system/lib/libskia.so'
adb shell su -c 'dd if=/system/lib/libsqlite.so of=/mnt/sdcard/update/system/lib/libsqlite.so'
adb shell su -c 'dd if=/system/lib/libstagefright.so of=/mnt/sdcard/update/system/lib/libstagefright.so'
adb shell su -c 'dd if=/system/lib/libvideochat_jni.so of=/mnt/sdcard/update/system/lib/libvideochat_jni.so'
adb shell su -c 'dd if=/system/lib/libvideochat_stabilize.so of=/mnt/sdcard/update/system/lib/libvideochat_stabilize.so'
adb shell su -c 'dd if=/system/lib/libwebcore.so of=/mnt/sdcard/update/system/lib/libwebcore.so'
adb shell su -c 'dd if=/system/lib/libwebrtc_audio_preprocessing.so of=/mnt/sdcard/update/system/lib/libwebrtc_audio_preprocessing.so'
adb shell su -c 'dd if=/dev/block/platform/sdhci-tegra.3/by-name/LNX of=/mnt/sdcard/update/boot.img'
and give us the zip file of the update folder created on the sdcard
thanks

OK, should be here any minute... or hours judging by current upload speed: update.7z
should be up now.

Randomwalker said:
OK, should be here any minute... or hours judging by current upload speed: http://min.us/mU3E4pTI7
should be up now.
Click to expand...
Click to collapse
your link is messy :
http://minus.com/mU3E4pTI7/
thanks a lot, downloading
---------- Post added at 03:53 PM ---------- Previous post was at 03:03 PM ----------
EDIT : ok, i've got the file, but strangely it does not contain 2 files : in the flex folder.
did you have two errors ?
may be did you take directly the commands, during the time i was adding these two commands (mkdir for both folders in flex)
can you check you have these files ?
adb shell su -c 'dd if=/flex/app/McAfee.apk of=/mnt/sdcard/update/flex/app/McAfee.apk'
adb shell su -c 'dd if=/flex/etc/preload.xml of=/mnt/sdcard/update/flex/etc/preload.xml'
otherwise, it's great, i'll give a try to that

BENETNATH said:
your link is messy :
http://minus.com/mU3E4pTI7/
thanks a lot, downloading
---------- Post added at 03:53 PM ---------- Previous post was at 03:03 PM ----------
EDIT : ok, i've got the file, but strangely it does not contain 2 files : in the flex folder.
did you have two errors ?
may be did you take directly the commands, during the time i was adding these two commands (mkdir for both folders in flex)
can you check you have these files ?
adb shell su -c 'dd if=/flex/app/McAfee.apk of=/mnt/sdcard/update/flex/app/McAfee.apk'
adb shell su -c 'dd if=/flex/etc/preload.xml of=/mnt/sdcard/update/flex/etc/preload.xml'
otherwise, it's great, i'll give a try to that
Click to expand...
Click to collapse
The time stamp for my batch file is 1116, so it could just be that I missed your last edit at 1111.
I'll have a look.
EDIT: Would /flex be /flexrom? Because I only have /flexrom on my device.DOes it make a difference that I pulled that update.7z from a freshly resetted device?

Just had the great idea to actually look at the batch file...
It does contain the mkdir for the subfolders.

ok, strange..
i'll dig on it when i'm bak near my device.
anyway, thanks a lot

Related

[Q] ADB Backup

Hi All,
I've backed up my device (I9000) using ADB with the following commands:
mkdir backup
cd backup
adb shell su -c "dd if=/dev/block/bml1 of=/sdcard/boot.bin bs=4096"
adb shell su -c "dd if=/dev/block/bml2 of=/sdcard/pit.pit bs=4096"
adb shell su -c "dd if=/dev/block/stl3 of=/sdcard/efs.rfs bs=4096"
adb shell su -c "dd if=/dev/block/bml4 of=/sdcard/Sbl.bin bs=4096"
adb shell su -c "dd if=/dev/block/stl6 of=/sdcard/param.lfs bs=4096"
adb shell su -c "dd if=/dev/block/bml7 of=/sdcard/zImage bs=4096"
adb shell su -c "dd if=/dev/block/stl9 of=/sdcard/factoryfs.rfs bs=4096"
adb shell su -c "dd if=/dev/block/stl10 of=/sdcard/dbdata.rfs bs=4096"
adb shell su -c "dd if=/dev/block/stl11 of=/sdcard/cache.rfs bs=4096"
adb shell su -c "dd if=/dev/block/bml12 of=/sdcard/modem.bin bs=4096"
adb shell su -c "tar -czvf /sdcard/data.tar.gz /data"
adb pull /sdcard/param.lfs .
adb pull /sdcard/zImage .
adb pull /sdcard/factoryfs.rfs .
adb pull /sdcard/dbdata.rfs .
adb pull /sdcard/cache.rfs .
adb pull /sdcard/modem.bin .
adb pull /sdcard/efs.rfs .
adb pull /sdcard/boot.bin .
adb pull /sdcard/Sbl.bin .
adb pull /sdcard/pit.pit .
adb pull /sdcard/data.tar.gz .
And I would like to give the backup to some of my friends, but I would like to verify there are no "personal data" on the backup (I did a factory reset before the backup and there was no contacts \ data that was mine), I don't know what type of data should I delete from the files, (like IMEI and serial data..).
Please help me find out what shouldn't be on the backup,
Thanks,
AYahoo.

need help to make a rom kitchen for sg3

hi guys,i'm working for make a rom kitchen for our sg3 those days
it's 40% done,but i have some troubles
i can't root via this script,can you help me?
this is my code:
Code:
adb push .\root\rageagainstthecage /data/local/tmp/rageagainstthecage
adb push .\root\Superuser.apk /data/local/tmp/Superuser.apk
adb push .\root\su /data/local/tmp/su
adb push .\root\busybox /data/local/tmp/busybox
adb shell chmod 755 /data/local/tmp/busybox
adb shell chmod 755 /data/local/tmp/rageagainstthecage
adb shell "/data/local/tmp/rageagainstthecage"
adb kill-server
adb start-server
adb -d shell "mount -o remount,rw /dev/block/stl9 /system"
adb push .\root\su /system/bin/su
adb push .\root\busybox /system/bin/busybox
adb push .\root\sqlite3 /system/bin/sqlite3
adb push .\root\Superuser.apk /system/app/
adb shell "/system/bin"
adb -d shell "chmod 4755 su"
adb -d shell "chmod 4755 busybox"
adb -d shell "chmod 4755 sqlite3"
maybe it's complicate, i tried many times to mod it,but no result.
i run it ,it goes to
adb -d shell "mount -o remount,rw /dev/block/stl9 /system"
this line ,says ‘mount :operation not permitted ’
and it still $ instead of #
i do not know where the problem is ...
plz help me
hi pls their are two tutorials on this subject pls ask ur question in one of the threads
CLOSED
and my base version is ZHJPF
i think u need to su to remount system as rw.

[Q] Updater-script code

Can someone convert this adb shell code in an updater-script code?
Code:
@files\adb shell "su -c 'busybox mount -o remount,rw /system'"
@files\adb shell "su -c 'busybox mount | grep system'"
@files\adb shell "su -c 'chmod 0777 /system/etc/install-recovery.sh'"
@files\adb shell "su -c 'chown root.shell /system/etc/install-recovery.sh'"
@files\adb shell "su -c 'chmod 0755 /system/bin/sysinit'"
@files\adb shell "su -c 'chown root.shell /system/bin/sysinit'"
@files\adb shell "su -c 'chmod 0777 /system/xbin/run-parts'"
@files\adb shell "su -c 'chown root.shell /system/xbin/run-parts'"
@files\adb shell "su -c 'chmod 0777 /system/etc/init.d/'"
@files\adb shell "su -c 'chmod 0777 /system/etc/init.d/*'"
@files\adb shell "su -c 'chown root.root /system/etc/init.d/'"
mount("(the file system for /system. ie: ext3, ext4, fat)", "(Probably EMMC)", "/dev/block/(the block name for your partition)", "/system");
/system/etc/install-recovery.sh
set_perm(0, 2000, 06777, "/system/etc/install-recovery.sh");
Yada, yada, yada.
The main reason I'm not doing this for you is because it seems specific to a certian issue and I think you should do the research to get it right. Either that of risk screwing something up bad.
About making an edify script. What you are trying to do/
A nice read on linux permissions Check the lower half about setting UID and GID. Nicely done.

[Completed] [Q] Need urgent help with adb fastboot nandroid backup (paid assistance)

Hi,
I have idea like "backup all data (include apps, accounts, system settings) -> wipe all data -> upload backup -> start device", but backup upload on server by ftp/sftp.
After few times another script download necessary backup and upload on phone by adb/fastboot and start device.
PS Since I need it urgently enough and I tried huge amount of scripts and commands - asking for your help (in debt will not stay).
Skype: a.roman2403
Hi
Thanks for writing to us at XDA Assist. It isn't very clear what you're asking, can you please elaborate?
I wanna create now system of create and restore backups from multiply devices by server and without ppl)
Now i create backup by this script (sorr, i`m only learn)
Code:
adb wait-for-device
set dirname=%date:~0,2%%date:~3,2%%date:~8,2%%time:~0,2%%time:~3,2%
mkdir %dirname% > NULL
adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep system | sed -r 's/.* .//') of=/sdcard/blkbackup.img"
adb pull /sdcard/blkbackup.img %dirname%\system.img
adb shell rm /sdcard/blkbackup.img
adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep boot | sed -r 's/.* .//') of=/sdcard/blkbackup.img"
adb pull /sdcard/blkbackup.img %dirname%\boot.img
adb shell rm /sdcard/blkbackup.img
adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep recovery | sed -r 's/.* .//') of=/sdcard/blkbackup.img"
adb pull /sdcard/blkbackup.img %dirname%\recovery.img
adb shell rm /sdcard/blkbackup.img
adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep cache | sed -r 's/.* .//') of=/sdcard/blkbackup.img"
adb pull /sdcard/blkbackup.img %dirname%\cache.img
adb shell rm /sdcard/blkbackup.img
adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep userdata | sed -r 's/.* .//') of=/sdcard/blkbackup.img"
adb pull /sdcard/blkbackup.img %dirname%\userdata.img
adb shell rm /sdcard/blkbackup.img
adb shell "pm list package -s" > %dirname%\system.apps.list
adb shell "pm list package -3" > %dirname%\3d-party.apps.list
i think what this logicaly work, but in realy - dont work and i cant upload backup in server.
can you explain me how i can create fully backup android device and restore it adter few days in device by shellscript.
In an ideal world I see it this way:
1) made a backup using http://forum.xda-developers.com/showthread.php?t=1620255
2) loading on server
3) another script download the desired backup and load it on your phone or PC
4) install
4.1) profit
Ant1Freeze said:
I wanna create now system of create and restore backups from multiply devices by server and without ppl)
Now i create backup by this script (sorr, i`m only learn)
Code:
adb wait-for-device
set dirname=%date:~0,2%%date:~3,2%%date:~8,2%%time:~0,2%%time:~3,2%
mkdir %dirname% > NULL
adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep system | sed -r 's/.* .//') of=/sdcard/blkbackup.img"
adb pull /sdcard/blkbackup.img %dirname%\system.img
adb shell rm /sdcard/blkbackup.img
adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep boot | sed -r 's/.* .//') of=/sdcard/blkbackup.img"
adb pull /sdcard/blkbackup.img %dirname%\boot.img
adb shell rm /sdcard/blkbackup.img
adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep recovery | sed -r 's/.* .//') of=/sdcard/blkbackup.img"
adb pull /sdcard/blkbackup.img %dirname%\recovery.img
adb shell rm /sdcard/blkbackup.img
adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep cache | sed -r 's/.* .//') of=/sdcard/blkbackup.img"
adb pull /sdcard/blkbackup.img %dirname%\cache.img
adb shell rm /sdcard/blkbackup.img
adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep userdata | sed -r 's/.* .//') of=/sdcard/blkbackup.img"
adb pull /sdcard/blkbackup.img %dirname%\userdata.img
adb shell rm /sdcard/blkbackup.img
adb shell "pm list package -s" > %dirname%\system.apps.list
adb shell "pm list package -3" > %dirname%\3d-party.apps.list
i think what this logicaly work, but in realy - dont work and i cant upload backup in server.
can you explain me how i can create fully backup android device and restore it adter few days in device by shellscript.
In an ideal world I see it this way:
1) made a backup using http://forum.xda-developers.com/showthread.php?t=1620255
2) loading on server
3) another script download the desired backup and load it on your phone or PC
4) install
4.1) profit
Click to expand...
Click to collapse
Ok, I understand now. Unfortunately XDA Assist isn't a general helpdesk area, our purpose is to point people who don't know where to post in the right direction. I think the best place for your question would be here:
Android Q&A, Help & Troubleshooting
Transmitted via Bacon
tnx you)
Done http://forum.xda-developers.com/android/help/urgent-help-adb-fastboot-nandroid-t3086756
Cool. Thread closed, thanks.
Transmitted via Bacon

Cloning Pre-configured Android 8.1 Device / ROM

Hey guys,
Not sure if this is the correct place to post, but I am at my wits end and think I need a bit of help. I have been cloning devices on Android 7.1 without too much trouble, but something has changed in Android 8.1 which breaks things. Here is my setup:
Device: Xiaomi Redmi Note 4X 16GB, unlocked bootloader
OS: LineageOS 15.1 (Android 8.1)
My setup process is as follows:
Let stock ROM update (for latest firmware), unlock BL, flash TWRP, clean wipe, flash LineageOS + Gapps + Magisk
Skip through setup wizard, apply customisations (apps via APKs, launcher, settings, etc)
Clear Data for following:
com.google.android.gms.setup
Google App
Google Account Manager
Google Backup Transport
Google One Time Init
Google Partner Setup
Google Play Services
Google Play Services for Instant Apps
Google Play Store
Google Services framework
Reboot to TWRP
Connect to PC, run following ADB command: adb pull /data/system/users/0/settings_secure.xml
Open settings_secure.xml and delete "android_id" line
Push settings_secure.xml back to device: adb push settings_secure.xml /data/system/users/0/
Capture system image, flash onto other devices (either via TWRP backup or pushing system images via ADB)
Boot device, log into client Google account, done
Now this process used to work great on LineageOS 14.1 (Android 7.1), but now I get the following issues:
When adding a Google Account, it does not appear in Android device manager, but it appears in the list of devices in the Google Play Store? If I remove the account and then add it again it appears, but the issues below still occur.
Google's messaging / push system is broken. If I send a Hangouts message to my Google account, it won't appear until I open the app.
Any pre-installed apps won't appear in the "installed" list of apps in the play store, and therefore not update automatically until the user manually searches for the app in the Play Store and hits "update" (ugh).
I need to be deploying around 100 units over the next couple of months or so I need something that is scalable. I might be going around this the wrong way completely. I am not a ROM developer or programmer, just found something that has worked well in the past, so if I need to develop a ROM from scratch based on LineageOS I'll probably need to hire someone to do this for me as this is a bit beyond my current capabilities and time constraints. Let me know your thoughts! Thanks.
Android ID is same for many devices if you clone. That is really bad and can cause issues.
Rayman96 said:
Android ID is same for many devices if you clone. That is really bad and can cause issues.
Click to expand...
Click to collapse
I am deleting the Android ID from settings_secure.xml though. Unless it is somewhere else as well?
I'm still struggling with this problem. Is there anything else I can try? I googled this problem and the first result is this thread :/
stephendt0 said:
I'm still struggling with this problem. Is there anything else I can try? I googled this problem and the first result is this thread :/
Click to expand...
Click to collapse
Code:
adb shell settings delete secure android_id
adb shell settings delete secure advertising_id
adb shell settings delete secure bluetooth_address
adb shell settings put secure bluetooth_name 'YOURNAME'
adb shell settings put global device_name 'YOURNAME'
adb shell settings put global wifi_p2p_device_name 'YOURNAME'
The two IDs are then randomly regenerated. YOURNAME is any name of your choice.
rainman74 said:
Code:
adb shell settings delete secure android_id
adb shell settings delete secure advertising_id
adb shell settings delete secure bluetooth_address
adb shell settings put secure bluetooth_name 'YOURNAME'
adb shell settings put global device_name 'YOURNAME'
adb shell settings put global wifi_p2p_device_name 'YOURNAME'
The two IDs are then randomly regenerated. YOURNAME is any name of your choice.
Click to expand...
Click to collapse
Thanks for that. I believe I actually found their respective strings in settings_secure.xml:
<setting id="59" name="config_update_certificate"
<setting id="43" name="bluetooth_address"
And of course the Android ID. Once I deleted these, they auto-generated on the next boot, so I do this using ADB in TWRP.
I tried this and so far I'm not having any problems! Will report back if I experience any issues.
Another update - turn out that this is NOT enough. You will also want to clear data for the following apps (ideally just before shutting down the system and clearing android, bluetooth and config_update_certificate) to ensure that push notifications continue to work:
Com.google.android.gms.setup
Google App (not 100% sure if this is required, but I do it anyway)
Google Play Services
Google Play Store
Google Services framework
Reboot, clear your IDs, and then take your image. It should be OK after that, I think. I generally like to setup Hangouts on the device and then reboot, and let it sit for 5 minutes so its fully dozed before I send a test message.
Edit: STILL not working even after all this. Anyone else able to offer an explanation as to why push notifications is such an issue? This is becoming really difficult
stephendt0 said:
Another update - turn out that this is NOT enough. You will also want to clear data for the following apps (ideally just before shutting down the system and clearing android, bluetooth and config_update_certificate) to ensure that push notifications continue to work:
Com.google.android.gms.setup
Google App (not 100% sure if this is required, but I do it anyway)
Google Play Services
Google Play Store
Google Services framework
Reboot, clear your IDs, and then take your image. It should be OK after that, I think. I generally like to setup Hangouts on the device and then reboot, and let it sit for 5 minutes so its fully dozed before I send a test message.
Edit: STILL not working even after all this. Anyone else able to offer an explanation as to why push notifications is such an issue? This is becoming really difficult
Click to expand...
Click to collapse
ok, if you want to reset everything in a clone, proceed as follows:
Code:
adb shell su -c mount -o remount,rw /system
adb shell su -c rm /data/system/users/0/accounts.db
adb shell su -c rm /data/system/users/0/accounts.db-journal
adb shell su -c rm /data/system/users/0/photo.png
adb shell su -c rm /data/system/sync/accounts.xml
adb shell su -c rm /data/system/sync/pending.xml
adb shell su -c rm /data/system/sync/stats.bin
adb shell su -c rm /data/system/sync/status.bin
adb shell su -c pm clear com.android.packageinstaller
adb shell su -c pm clear com.android.providers.downloads
adb shell su -c pm clear com.android.vending
adb shell su -c pm clear com.google.android.backuptransport
adb shell su -c pm clear com.google.android.gms
adb shell su -c pm clear com.google.android.gsf
adb shell su -c mount -o remount,ro /system
Please also follow my instructions above for resetting the IDs before rebooting.
Google then recognizes a new device! Have fun :fingers-crossed:
rainman74 said:
ok, if you want to reset everything in a clone, proceed as follows:
Code:
adb shell su -c mount -o remount,rw /system
adb shell su -c rm /data/system/users/0/accounts.db
adb shell su -c rm /data/system/users/0/accounts.db-journal
adb shell su -c rm /data/system/users/0/photo.png
adb shell su -c rm /data/system/sync/accounts.xml
adb shell su -c rm /data/system/sync/pending.xml
adb shell su -c rm /data/system/sync/stats.bin
adb shell su -c rm /data/system/sync/status.bin
adb shell su -c pm clear com.android.packageinstaller
adb shell su -c pm clear com.android.providers.downloads
adb shell su -c pm clear com.android.vending
adb shell su -c pm clear com.google.android.backuptransport
adb shell su -c pm clear com.google.android.gms
adb shell su -c pm clear com.google.android.gsf
adb shell su -c mount -o remount,ro /system
Please also follow my instructions above for resetting the IDs before rebooting.
Google then recognizes a new device! Have fun :fingers-crossed:
Click to expand...
Click to collapse
OMG, I think that worked, thank you! I spent 5 hrs and stayed up to 3am trying to work this out with no luck, and this did the trick. To make things easier however, I morphed these commands into a dirty "one-liner" that saves entering each command.
Code:
adb shell settings delete secure android_id && adb shell settings delete secure advertising_id && adb shell settings delete secure bluetooth_address && adb shell settings put secure bluetooth_name 'Redmi Note 4' && adb shell settings put global device_name 'Redmi Note 4' && adb shell settings put global wifi_p2p_device_name 'Redmi Note 4' && adb shell su -c mount -o remount,rw /system && adb shell su -c rm /data/system/users/0/accounts.db && adb shell su -c rm /data/system/users/0/accounts.db-journal && adb shell su -c rm /data/system/users/0/photo.png && adb shell su -c rm /data/system/sync/accounts.xml && adb shell su -c rm /data/system/sync/pending.xml && adb shell su -c rm /data/system/sync/stats.bin && adb shell su -c rm /data/system/sync/status.bin && adb shell su -c pm clear com.android.packageinstaller && adb shell su -c pm clear com.android.providers.downloads && adb shell su -c pm clear com.android.vending && adb shell su -c pm clear com.google.android.backuptransport && adb shell su -c pm clear com.google.android.gms && adb shell su -c pm clear com.google.android.gsf && adb shell su -c mount -o remount,ro /system
I'm sure there is a more efficient way of stacking commands, but this worked. Replace "Redmi Note 4" with your actual device and reboot. I cleared data for any messaging apps and removed my Google account before I began, however.
stephendt0 said:
OMG, I think that worked, thank you! I spent 5 hrs and stayed up to 3am trying to work this out with no luck, and this did the trick. To make things easier however, I morphed these commands into a dirty "one-liner" that saves entering each command.
I'm sure there is a more efficient way of stacking commands, but this worked. Replace "Redmi Note 4" with your actual device and reboot. I cleared data for any messaging apps and removed my Google account before I began, however.
Click to expand...
Click to collapse
Perfect! You don't need to remove your Google account as the commands do this anyway
rainman74 said:
Perfect! You don't need to remove your Google account as the commands do this anyway
Click to expand...
Click to collapse
Quick update.
After a bit more testing, turns out that there were still a few things that needed clearing, particularly on different versions of Android (7.1). Also, I've noticed that a GSF ID can be generated before you get a chance to capture an image if you leave Wi-Fi enabled, so I've included that in the script. I've ended up with a .BAT file with the following:
Code:
echo on
adb shell settings delete secure android_id
adb shell settings delete secure advertising_id
adb shell settings delete secure bluetooth_address
adb shell su -c mount -o remount,rw /system
adb shell su -c svc wifi disable
adb shell su -c rm /data/system/users/0/accounts.db
adb shell su -c rm /data/system/users/0/accounts.db-journal
adb shell su -c rm /data/system/users/0/photo.png
adb shell su -c rm /data/system/users/0/settings_ssaid.xml
adb shell su -c rm /data/system/sync/accounts.xml
adb shell su -c rm /data/system/sync/pending.xml
adb shell su -c rm /data/system/sync/stats.bin
adb shell su -c rm /data/system/sync/status.bin
adb shell su -c pm clear com.google.android.ext.services
adb shell su -c pm clear com.google.android.ext.shared
adb shell su -c pm clear com.google.android.gsf.login
adb shell su -c pm clear com.google.android.onetimeinitializer
adb shell su -c pm clear com.android.packageinstaller
adb shell su -c pm clear com.android.providers.downloads
adb shell su -c pm clear com.android.vending
adb shell su -c pm clear com.google.android.backuptransport
adb shell su -c pm clear com.google.android.gms
adb shell su -c pm clear com.google.android.instantapps.supervisor
adb shell su -c pm clear com.google.android.gsf
adb shell su -c mount -o remount,ro /system
I have found that this works consistently across both LineageOS 14.1 and LineageOS 15.1 devices.
stephendt0 said:
OMG, I think that worked, thank you! I spent 5 hrs and stayed up to 3am trying to work this out with no luck, and this did the trick. To make things easier however, I morphed these commands into a dirty "one-liner" that saves entering each command.
Code:
adb shell settings delete secure android_id && adb shell settings delete secure advertising_id && adb shell settings delete secure bluetooth_address && adb shell settings put secure bluetooth_name 'Redmi Note 4' && adb shell settings put global device_name 'Redmi Note 4' && adb shell settings put global wifi_p2p_device_name 'Redmi Note 4' && adb shell su -c mount -o remount,rw /system && adb shell su -c rm /data/system/users/0/accounts.db && adb shell su -c rm /data/system/users/0/accounts.db-journal && adb shell su -c rm /data/system/users/0/photo.png && adb shell su -c rm /data/system/sync/accounts.xml && adb shell su -c rm /data/system/sync/pending.xml && adb shell su -c rm /data/system/sync/stats.bin && adb shell su -c rm /data/system/sync/status.bin && adb shell su -c pm clear com.android.packageinstaller && adb shell su -c pm clear com.android.providers.downloads && adb shell su -c pm clear com.android.vending && adb shell su -c pm clear com.google.android.backuptransport && adb shell su -c pm clear com.google.android.gms && adb shell su -c pm clear com.google.android.gsf && adb shell su -c mount -o remount,ro /system
I'm sure there is a more efficient way of stacking commands, but this worked. Replace "Redmi Note 4" with your actual device and reboot. I cleared data for any messaging apps and removed my Google account before I began, however.
Click to expand...
Click to collapse
YES, this did it. I cloned a kindle fire hdx using TWRP backup&restore and had to perform the action mentioned above in order to use both devices independetly.
ATTENTION!
Remember to change the values listed in stephendt0's example that were not part of the original code from rainman74:
- device_name: Equals the device type. E.g. adb shell settings put global device_name 'KFHDX'
- bluetooth_name: Hostname of the device seen in bluetooth.
- wifi_p2p_device_name: Hostname used for a p2p wifi network aka "ad hoc network". Not supported on all devices.

Categories

Resources