[A510] [Firmware] German .1099 FOTA - Acer Iconia A700 and A510
New FW available .1099: https://www.box.com/shared/6e23aee341b9ae089cac
update.7z (may be incomplete)
https://dl.dropbox.com/u/82306515/A510_german_backup.rar (better use this one, may be gone soon though)
mirror: A510_german_backup.rar
no major changes, root needs to be re-applied via fastboot
Sent from my A510 using xda app-developers app
people in german android forum reported better Touchscreen sensitivity. Confirmed?
As it has been theorized that poor touch performance is actually due to loss of calibration I think it's too early to tell.
I think it's a little faster and better, but still testing.
As I have not rooted, I'm thinking of just waiting for this via OTA (or hopefully my tablet will come with this from the service center).
Has anyone tried if the mempodroid root exploit is still working with this version?
Randomwalker said:
New FW available .1099: https://www.box.com/shared/6e23aee341b9ae089cac
no major changes, root needs to be re-applied via fastboot
Sent from my A510 using xda app-developers app
Click to expand...
Click to collapse
Which version did you install this update over ? Would it update my 1.073 WW_GEN1 ?
slvrbllt said:
Which version did you install this update over ? Would it update my 1.073 WW_GEN1 ?
Click to expand...
Click to collapse
German .1076. It probably will work just fine, but can't be sure until someone gives it a try .
Sent from my GT-N7000 using xda app-developers app
Randomwalker said:
German .1076. It probably will work just fine, but can't be sure until someone gives it a try .
Sent from my GT-N7000 using xda app-developers app
Click to expand...
Click to collapse
One more question mate: has this update solved any touch screen issues you might have experienced before?
Well, as I am just typing this reply from my tab lying on the table the issue might have improved, but still not perfect. Best to give it a shot yourself.
Sent from my A510 using xda app-developers app
there is a checking of the current region EMEA WW etc in this update.
so until somebody remove it and sign it again, you'll have to use a recovery to make the update.
EDIT : ok, i've tried a few thing, but the assert step fails..
i'm a little concerned to remove it and to launch the patch directly on files, as i'm not sure the version are the same (i'm on 1.60 EMEA_CUS1) and this update should apply on EMEA_DE (1.076 ?)..
we need a EMEA_DE user who has applied the update to make a dump of the modified files
---------- Post added at 05:39 PM ---------- Previous post was at 05:00 PM ----------
look a this list
Code:
ssert(apply_patch_check("/system/app/AcerRing.odex", "5218bb8ead9eb2b95fcde9d42e71105989251ed5", "69af0bd51d1dd8fca717d6ca04d0bfc6a6ecbe7d"));
set_progress(0.000919);
assert(apply_patch_check("/system/app/AcerShellData.odex", "02138a3fbad503a2170e9e00816da1c57e577083", "b34c3ca7489564d018939adc5e74ab3ec595dc07"));
set_progress(0.000928);
assert(apply_patch_check("/system/app/ApplicationsProvider.apk", "59fb595fd037b3e557b06006ec072d6ed5149396", "2063a90c1b93375ce404276051f1d9db93e910e7"));
set_progress(0.000969);
assert(apply_patch_check("/system/app/ApplicationsProvider.odex", "0758d753e2fd7c71969a4a99bf70347a40c06cf7", "aa621caf9a6772c612c7a21dab5675b222a963a4"));
set_progress(0.001123);
assert(apply_patch_check("/system/app/BackupRestoreConfirmation.apk", "e636bf2e24bf41aaca871a08eee5dc0cbce6fce5", "e42d6f5f8e5fe8ebe8d6fd3a082881c0055760b9"));
set_progress(0.001226);
assert(apply_patch_check("/system/app/BackupRestoreConfirmation.odex", "748ecfd86aafcb2c771e9f56c0b5f50d2a7f7c22", "093a522e8640661d18df9f4923eb6e748badfaa2"));
set_progress(0.001285);
assert(apply_patch_check("/system/app/Bluetooth.apk", "b20b1064e512e3bcde69c2d37065c4616fc42ded", "61fed36265e7e457d776978b68004c399a9b2c38"));
set_progress(0.001640);
assert(apply_patch_check("/system/app/Bluetooth.odex", "ce46f3c7b5c33c493215c5e7cdbddda056cd9bac", "eca3ab0a0044d6a54a7a9bd98ae521137e09e36a"));
set_progress(0.003050);
assert(apply_patch_check("/system/app/Browser.apk", "814a3ac6bef314431e54a38153d36981fbd60bad", "8626da68eb49f39b35e92392ca36d603a812ed3e"));
set_progress(0.008549);
assert(apply_patch_check("/system/app/Browser.odex", "c68139d8eaa3fbb328b5f5eca8ad84ce8bcc1eca", "1e6d56ff1cdbfd66403ff9a9600203a6a358cb73"));
set_progress(0.013471);
assert(apply_patch_check("/system/app/Calculator.apk", "47cbcd576ca8564473c58f2830efc89227bb35bc", "de99f18f41a17c1fd9def1b0f6536c73a287c6c9"));
set_progress(0.013840);
assert(apply_patch_check("/system/app/Calculator.odex", "92f277eb2910cc3815c4083df843f0950398b7ba", "a5cfb0e894117cfe5b23a9d4d2433e9c533798a2"));
set_progress(0.014676);
assert(apply_patch_check("/system/app/CalendarGoogle.apk", "caab71ff81f3183c6d05f9ab934ec01022eb6ba3", "fdeaae0e6ea63fdb9a282593206157ecc61051f2"));
set_progress(0.023146);
assert(apply_patch_check("/system/app/CalendarProvider.apk", "423fa239daab8c099a930aacb74e36b7f06c39a8", "ff757addf130028ea8ee8189416b3b0507d443bf"));
set_progress(0.023252);
assert(apply_patch_check("/system/app/CalendarProvider.odex", "6fe32d40f3f0cba43d3c37b1aa0a04b5783753cb", "3678b0b8d50a5cc33e1260842d24e5b797aee5b9"));
set_progress(0.024926);
assert(apply_patch_check("/system/app/Camera.odex", "9d007597559178e727552ca9e8c2bbadcd5c088f", "49326c7b19cf2663b314dcedc03488f68df5332c"));
set_progress(0.026902);
assert(apply_patch_check("/system/app/CertInstaller.apk", "03358f1bb3df263348b305dd85c5e33ad5538010", "01b0057a3ba15ebd1b4adfa7018a8244fd475894"));
set_progress(0.027014);
assert(apply_patch_check("/system/app/CertInstaller.odex", "a8a4f73ada5dd3bf7c48a78d5d18620d04f47c90", "7195b66f9a8f60e9fa20c77036cf9b0734038899"));
set_progress(0.027263);
assert(apply_patch_check("/system/app/ChromeBookmarksSyncAdapter.apk", "15b82b3c5ebd8a10920200351dba27d890a009b8", "69b62666cb19da9c09dcc20cfed56142215b6ed2"));
set_progress(0.028402);
assert(apply_patch_check("/system/app/Contacts.apk", "ec13a160ecc60eb451c9191034d6e90d6c8c170e", "dc0dc34b6229b4c47fff8c08a5968e0d7271f962"));
set_progress(0.032939);
assert(apply_patch_check("/system/app/Contacts.odex", "a41993eabe7ca0fda976bfe56974d17b7f4d9789", "cffee2d28f42c58ee4fb354de04aea8ae8b32dde"));
set_progress(0.046142);
assert(apply_patch_check("/system/app/ContactsProvider.apk", "3df7e4b8ec9c9a5f18e368c5470fa6c943b86ce9", "59dc951c73bb8af6e3e3a20dbd850d9659b493b4"));
set_progress(0.046225);
assert(apply_patch_check("/system/app/ContactsProvider.odex", "cc0a8a7138860fca8e2c130ec0a15f5f0209f6b5", "5bf89dc8dd9aa082538ae9287321fb6eb0dbdb69"));
set_progress(0.054392);
assert(apply_patch_check("/system/app/DefaultContainerService.apk", "787ee6d52e35452c969a000b0d64e4d7b9f3ad4a", "5574dac269776099e145da6a55c0c981ef4c9ede"));
set_progress(0.054417);
assert(apply_patch_check("/system/app/DefaultContainerService.odex", "435ac008e6d60c90c0d1db5209bbb236247b7cbe", "3a4ff366632f0a3a80f5a675f9299a7c1ebc9cbf"));
set_progress(0.054510);
assert(apply_patch_check("/system/app/DeskClock.odex", "5d3fd58f34b5f49229ec431085f63813f7ffc4a7", "5195003ffeb7acfc276baeb8fb8701b85315dbee"));
set_progress(0.055075);
assert(apply_patch_check("/system/app/DownloadProvider.apk", "558475659ada32138965c7285706adf51185cba6", "188f21487f7c29b5cc48fab05c162a83090ad28d"));
set_progress(0.055203);
assert(apply_patch_check("/system/app/DownloadProvider.odex", "a9361a0368382f8edc10034f32706254f4f24131", "897451aec354480ca974cf565401db491d3132c6"));
set_progress(0.056319);
assert(apply_patch_check("/system/app/DownloadProviderUi.apk", "9c26eba5c5474cd3a9db6a3c1680311b51fbac12", "14e157202bef1b2ed871ecb10e53356595799f4c"));
set_progress(0.056664);
assert(apply_patch_check("/system/app/DownloadProviderUi.odex", "f52d34dbb0cb1567b85ce041395dce38c17d1329", "192a859f0bb2743ca5b1742248004f9988437bcc"));
set_progress(0.056904);
assert(apply_patch_check("/system/app/DrmProvider.apk", "dc2dc9a628f930c961fd8e802058f72821811938", "068c7455800e7d506383d2a2ae9a10df2c39a17b"));
set_progress(0.056941);
assert(apply_patch_check("/system/app/DrmProvider.odex", "8b1bb63d660f7d025fcdc4ee1e27b8ff548078cb", "d09db581ab4b0069366ffc932fb3d6a5f679ffc7"));
set_progress(0.057022);
assert(apply_patch_check("/system/app/DxDrmApplication.odex", "539a36978386a32708aede289e094e34a302eb69", "b4a2803637d84db45182bb841e39cd042962b1ef"));
set_progress(0.057275);
assert(apply_patch_check("/system/app/Email.apk", "0bdeb62332ad16793b5ee31e755568a604698eec", "1dcaf97c9693a5eaf6abd468773f7e27831a6a21"));
set_progress(0.060709);
assert(apply_patch_check("/system/app/Email.odex", "fe195f24443dcb9393791a0a441f2b7f7805045d", "40681f62d80c23308473ef73362eb240c87245df"));
set_progress(0.073140);
assert(apply_patch_check("/system/app/Exchange.odex", "c410e51889ffabfc4d62674eb1e99cbe57fb6207", "4a7fb38da746ce38d8019beb2278befbf8103410"));
set_progress(0.081951);
assert(apply_patch_check("/system/app/FWupdateService.odex", "00553cafd2a52f933a90f8814e80248ab3db4fe3", "ada31d6665942cfe5aaa68a81932b60dd0bc258d"));
set_progress(0.081989);
assert(apply_patch_check("/system/app/GMS_Maps.apk", "8e188323196da09973fc1b6ea44cd29a9fdfd8f3", "e3c5b43a1fed0799d20a9ed8f33ea645452fd429"));
set_progress(0.119333);
assert(apply_patch_check("/system/app/GalleryGoogle.apk", "32331f5ce5b8df0d999b6c24392408b6e217f6a7", "b6c029fef3d7ff6f95cc242331359e5334c689ab"));
set_progress(0.136725);
assert(apply_patch_check("/system/app/Gmail.apk", "32eb5e4394f7b183f711cd83b5ac843cba86e19e", "7e6ae825567a8d32b016aee7e3aea082e2525b55"));
set_progress(0.154683);
assert(apply_patch_check("/system/app/GoogleBackupTransport.apk", "07c27d9ce23a3dc71f2b0131f64b37fcd3c9d69a", "b1c00695f4423ed7f3176e1983a7deb2d3765996"));
set_progress(0.155220);
assert(apply_patch_check("/system/app/GoogleContactsSyncAdapter.apk", "345259b7740a1af0c1809cbe1abafe092937d563", "05ea0f1d0b0bc240a21ec6b8bd4adff93a9ee172"));
set_progress(0.156235);
assert(apply_patch_check("/system/app/GoogleFeedback.apk", "966e41afa29f64bb2a5a9ce23985e3704ad2979b", "4d7875b5da2ca91c0cd45f4a325bd27462b9b48d"));
set_progress(0.157844);
assert(apply_patch_check("/system/app/GoogleLoginService.apk", "c746cb940b289c52a6686f481b1f3ad835e2703b", "f2358bd19c6b4eb48e8c95a33e5385c0f03007ea"));
set_progress(0.184440);
assert(apply_patch_check("/system/app/GooglePartnerSetup.apk", "2bbe8074afeab1b13202ec32415ef2deccebbb5a", "b4891c4295b58b1d73ccccf78f02a86fc5ca84ed"));
set_progress(0.185061);
assert(apply_patch_check("/system/app/GoogleQuickSearchBox.apk", "d97306272d64c54817342b2d81e47d3d9090cecc", "b1f8c07a92c54cde5353538c0269303a843c2b76"));
set_progress(0.189753);
assert(apply_patch_check("/system/app/GoogleServicesFramework.apk", "210a86da6f5f152bc667fdbba0f1159dd9a7027a", "9cbc46c5388e1d36054e227ef7d45fb07c706034"));
set_progress(0.208308);
assert(apply_patch_check("/system/app/GoogleTTS.apk", "65933477a698d6192ab3b5750166fc24fb64ca1b", "9ddd938be34ce0d52b0dde03e9a05d76b854cb14"));
set_progress(0.235815);
assert(apply_patch_check("/system/app/HTMLViewer.apk", "0094d779be2985a3630bdaa0985f018fc813afe1", "44af0fd95fa84ccbf9c4691849eb50f836b78b1e"));
set_progress(0.235841);
assert(apply_patch_check("/system/app/HTMLViewer.odex", "f9d247c96be2a0d0006e7d3c699c8c09a07a6630", "1d4042d69e276c4d491e63e0088b8378145cb7da"));
set_progress(0.235885);
assert(apply_patch_check("/system/app/HoloSpiralWallpaper.apk", "c95a952fba80047535b8e6fe52b329ad1539faef", "cb7a5b174934d77e19e637724ef047e9d7621936"));
set_progress(0.236089);
assert(apply_patch_check("/system/app/HoloSpiralWallpaper.odex", "fa4ba6b379cae8656d869a695dbd70efa8542476", "7e886f2e18865e2541779e871f85af606d3352ed"));
set_progress(0.236226);
assert(apply_patch_check("/system/app/KeyChain.apk", "62c4718b925e6b84851a8ae973a79dffc4d932d3", "83ead1a1c7dea339c88295684d2a1d8ce25d95c0"));
set_progress(0.236276);
assert(apply_patch_check("/system/app/KeyChain.odex", "40b5b831ac1009df63ff85fd8712729c7ddba1ff", "d378e2b05d8fa7391dcb36af8965e297add5b3b5"));
set_progress(0.236453);
assert(apply_patch_check("/system/app/LatinImeDictionaryPack.apk", "940b1a950ec08b7512dcbc953ad44bf39f702ba7", "176241f53267caa2f07e2adc9ea3b2327f8db898"));
set_progress(0.237250);
assert(apply_patch_check("/system/app/LatinImeGoogle.apk", "e473083da57d6b1c5190bbf19a8c80e81743144c", "de1428d9a73d0a92f581bb0973268b8eed71e5e7"));
set_progress(0.276309);
assert(apply_patch_check("/system/app/Launcher2.apk", "1fca841ab99a951f5b9d3889bfa63c2c01c64d2a", "6dea222d0bedf42ab2abecbe0bb5c53e7f9c0fb3"));
set_progress(0.360516);
assert(apply_patch_check("/system/app/Launcher2.odex", "2ee6a364e47cf774b10cff0bfcb50df121de277f", "4901d03c3a90539be95ab09b5886ece393edc324"));
set_progress(0.363567);
assert(apply_patch_check("/system/app/LinkToFacebook.odex", "b71b92b72b9a18191efe04db51d176aad139999c", "aee722c76780eb74a3e0c41d7b79c155cfbbe3ef"));
set_progress(0.363579);
assert(apply_patch_check("/system/app/LiveWallpapers.apk", "5ffcdfb6d9131887bb68aeb59d1b7ceff6948ace", "7f7c0ea7033c994084e54c93d26df9415913ad02"));
set_progress(0.370355);
assert(apply_patch_check("/system/app/LiveWallpapers.odex", "a422d973527e11d5e18322fbc643156175c29da7", "3c34fbd7bf25d09f6f513fe56024a5408b36c8b1"));
set_progress(0.370850);
assert(apply_patch_check("/system/app/LiveWallpapersPicker.apk", "410747484f5315fbc777bc8bb16c4d4e0f1d78d2", "66e30c6ee882307a96fe552e92d81d031c6a859a"));
set_progress(0.371502);
assert(apply_patch_check("/system/app/LiveWallpapersPicker.odex", "d50765de072a544ac59aef10f91dba56f0b16c20", "3b4f5b0ab18c76ea311e6d0b04e16ababb9bd904"));
set_progress(0.371649);
assert(apply_patch_check("/system/app/MagicSmokeWallpapers.apk", "c162d48c2ac30547029921fbb082f192fb42d59b", "ae74d467ca29d8a321a5e55c628448037c6eb69e"));
set_progress(0.372917);
assert(apply_patch_check("/system/app/MagicSmokeWallpapers.odex", "908e4eb06608eb4dd6e252e4f7bd20148c51d38e", "47fca089c4de69a31483ffb7fcc237f80dcd3b95"));
set_progress(0.373105);
assert(apply_patch_check("/system/app/MediaProvider.apk", "96103eecd340384608bfc7e75aece243470a6a1e", "83fc8e4806efd9296f9ceec9e1b5e3bff96f5901"));
set_progress(0.373173);
assert(apply_patch_check("/system/app/MediaProvider.odex", "a818925531cee4d156c8127af65857fd8667476e", "2daabee97a6e7c041421b9584c305cb4b625e73d"));
set_progress(0.373919);
assert(apply_patch_check("/system/app/MusicFX.odex", "549dcec3de6a34f6b01b70d74cda3f44cc3a5f89", "633d1f60c3c84899d41a0a355adcab0519a4b1a6"));
set_progress(0.374452);
assert(apply_patch_check("/system/app/NoiseField.odex", "2c92f55012a7679d72c76ad44693373b9094d3da", "9a9f27591c6d253652977f83a2f061a244821774"));
set_progress(0.374592);
assert(apply_patch_check("/system/app/OneTimeInitializer.apk", "e60620ebd4791765d9a79ba1974cec5d7c5d9e5d", "43ddb9bdfaf6c3171a7087261e5ad2d4b2dfc612"));
set_progress(0.374634);
assert(apply_patch_check("/system/app/PackageInstaller.apk", "663a3414f8339e410c8b525d5714a37e8b297198", "a5571cf8f6fdd20cba4e0cce56261a202a70d2cb"));
set_progress(0.374839);
assert(apply_patch_check("/system/app/PackageInstaller.odex", "22d06576ca76062c4084f454ad212d238c3daac7", "2ada256d626953c18d90039bdd22526fbbdd08e8"));
set_progress(0.375028);
assert(apply_patch_check("/system/app/PhaseBeam.odex", "9d9e9f49e02ac210e851cbd1ed1acd2983a477ec", "79cb2621f1acfa66755803e949b77a7ca09e471c"));
set_progress(0.375166);
assert(apply_patch_check("/system/app/Phone.apk", "0a409bf350ef9467c0c476226fdab515f30f195a", "1ecc56d254e5fc9a39c589a05d31669fcf99506a"));
set_progress(0.377949);
assert(apply_patch_check("/system/app/Phone.odex", "0ae183bb25d2bc26d2c979ed3a5f2d0dfbd901a2", "4c72c85c8a53dadd2b38768ca5a6e12ce0dd5a25"));
set_progress(0.382213);
assert(apply_patch_check("/system/app/Phonesky.apk", "6fbdc7da35943518d5f8fb89a55c0cdb685fef4c", "c569e27b439bbcd14f9eac1bad42bd564a08b654"));
set_progress(0.406219);
assert(apply_patch_check("/system/app/PlusOne.apk", "81189be08769574ead6be71459b7d96c71f33078", "8ad5cba642365162a4c4e9160f91c75f58c6be51"));
set_progress(0.462762);
assert(apply_patch_check("/system/app/Settings.apk", "d3fb6a0f7a74fed2477668865772305dda243aa6", "10821e21da311350965720ede4c79abd08d7e050"));
set_progress(0.472996);
assert(apply_patch_check("/system/app/Settings.odex", "ec606a91c2649cc683e6e5cb3f28bffa36956d27", "e21e8ffec04265e017e03a947efba71bda0fcde9"));
set_progress(0.480235);
assert(apply_patch_check("/system/app/SettingsProvider.apk", "6fd90aacec4811394e3e7cd733712f9c401bbdaf", "ae74bbffe6fb771fd58c105c7faafc487e30bb68"));
set_progress(0.480317);
assert(apply_patch_check("/system/app/SettingsProvider.odex", "45ec966ac219d3812971f346cfa19836ea7d10a3", "c312a1a7fc45f56544beebe82cb253c7749c4691"));
set_progress(0.480700);
assert(apply_patch_check("/system/app/SharedStorageBackup.apk", "b11180186cbda3691ed15e4eeb2853d049b64520", "001a728899339a5588188ec832b60bc930bd4743"));
set_progress(0.480717);
assert(apply_patch_check("/system/app/SharedStorageBackup.odex", "e3777157c0531666e468ad745c3fce123ee0f8dc", "a9b472b9ed7ceb4e4137133007be82d17cf3d777"));
set_progress(0.480744);
assert(apply_patch_check("/system/app/SoundRecorder.apk", "361886660355af7b49c6eaeb923f858ca60f24fb", "30c4a15abcc9a0d0182defdb651082ffb63fe1b5"));
set_progress(0.480948);
assert(apply_patch_check("/system/app/SoundRecorder.odex", "ead2784611bf4b1ffd762c2b11deefe257ec88bf", "c9d89b52bb0f77c8658191749e94cc2669abaee2"));
set_progress(0.481108);
assert(apply_patch_check("/system/app/Street.apk", "a783f23032951dc10dbe603b1ca7a524d386eb4a", "92fe9b0353a72af94eeb1c64a5362cbf8b6160a7"));
set_progress(0.482937);
assert(apply_patch_check("/system/app/SystemUI.apk", "55dddd7d5cda43d56b280866fb78a223a527d635", "d69fa963609f437aaa10f7d5dd7530988d16b9ea"));
set_progress(0.485567);
assert(apply_patch_check("/system/app/SystemUI.odex", "12c91b286715cfc3c4397ded976b439060f17325", "92cc5db5de7706f6cc9f23572192b0aea5903d4f"));
set_progress(0.487776);
assert(apply_patch_check("/system/app/Talk.apk", "58c86aef171cfd59d6d832b9085fb6f3df3137c1", "e3b6f13d4e8260869fe423df007cc778e2959c7b"));
set_progress(0.501944);
assert(apply_patch_check("/system/app/TelephonyProvider.apk", "25fe46c4bca4ab3a2204a37ec67cdcd210c4d568", "8d6c5e99f38c3f396746164c2110f8b9defb06b9"));
set_progress(0.501998);
assert(apply_patch_check("/system/app/TelephonyProvider.odex", "1a141d4e3b936059f1c229a80e151a383dbdc657", "3fe2e8b2d7c9bae6d400d2c26fcc67d8c5c63dda"));
set_progress(0.502650);
assert(apply_patch_check("/system/app/UserDictionaryProvider.apk", "c6033c1b91c6282185699c1f09c46dac533764eb", "6db42d9e768b054daefb922554981bbca8a628ef"));
set_progress(0.502673);
assert(apply_patch_check("/system/app/UserDictionaryProvider.odex", "daa88eda2afac9b58768c0a17ae46fc78b5c198e", "b0097d9416ccd11f0c0cac854773dc56887d82ae"));
set_progress(0.502768);
assert(apply_patch_check("/system/app/VisualizationWallpapers.apk", "a96b99cf98487ad037ab727c1714d2a0083bc7c6", "e681c7a09af7682d81381a74d83e181f0f67ae7a"));
set_progress(0.503641);
assert(apply_patch_check("/system/app/VisualizationWallpapers.odex", "daab45e7d75914aa2cb0185d6bafc910fa3b8084", "5f26a4d5ed31924e8515327ed83b2fc95ebad9fe"));
set_progress(0.503869);
assert(apply_patch_check("/system/app/VpnDialogs.apk", "8ffe87290ca44c3035ec9eb4e22da1a6d018d0a8", "8accee7e64066332be6a1fd7a9e03b88a5cbd491"));
set_progress(0.503933);
assert(apply_patch_check("/system/app/VpnDialogs.odex", "d3d64453a4a81a30a407f7c0019c2cccb06f720c", "a9231c0ce6c3afebb8bf16893619b21173c36375"));
set_progress(0.503992);
assert(apply_patch_check("/system/app/YouTube.apk", "1cead37fcd8e2fe37cbb9227fe177cd0189827f6", "427dfddb730afa3c4e6283eb2d110f7d0170ede3"));
set_progress(0.528179);
assert(apply_patch_check("/system/app/xt9.apk", "f2b25c7e76e19bf732180c64feeda21370e0620b", "0df562b2863b4a14ff3fb9576402750079582caa"));
set_progress(0.535905);
assert(apply_patch_check("/system/bin/DxDrmServerIpc", "8ad5f6a7fe510c2fec03c83cc73dbe74632cdda3", "7dcae883b0fef267210464d2663a7a42e6fe8288"));
set_progress(0.561950);
assert(apply_patch_check("/system/bin/adb", "4d51287107a37aa2b25a4142c3f5b153cd577fd7", "98f141ed7439e8ed1922c599b3da0d1a6bbd8767"));
set_progress(0.562566);
assert(apply_patch_check("/system/bin/debuggerd", "9d684aa7488c8a3c81c6a8703ba5a1692466c24b", "c45f09d0c405a7556232f6c765e6c1b7f0ecf988"));
set_progress(0.562707);
assert(apply_patch_check("/system/bin/dhcpcd", "4a7dc152766ce6d2da3469f8bc65a72338b5bac5", "e5c2985886230b62c57adcaf929491f5b2ad16dc"));
set_progress(0.563098);
assert(apply_patch_check("/system/bin/dnsmasq", "2309c03d34469cc7732c749aac33780c9c9cbe6c", "0834603ec5374fa1676f097e2811ccc3f5d8cfbf"));
set_progress(0.563762);
assert(apply_patch_check("/system/bin/dumpstate", "c43f11aa5733725b2b99ab27c5b3699ab7e4d6fc", "dd417507aa60c35bdf8dbe8dd5105751db626ef0"));
set_progress(0.564034);
assert(apply_patch_check("/system/bin/fusermount", "d5a24dc257974fa7833773b720341e481a063eab", "9ca2268b79469159cf8576272f6aacf171c107f9"));
set_progress(0.564177);
assert(apply_patch_check("/system/bin/hostapd", "5088c355b601c1eef970d2919caa460f6298b43b", "e3ba3dadfe74227aa9bc381503c1f3eac9fcbff4"));
set_progress(0.565757);
assert(apply_patch_check("/system/bin/installd", "09febaeb1b7c1144a9ba0656ba62be6c5e2e1843", "501ccfd047243243b07049ed26e676dcedf8ab5a"));
set_progress(0.565900);
assert(apply_patch_check("/system/bin/ip", "b8771db666f98dd32dee43722b9ef890b6513948", "7309f93d0a2de0ea21c6514902858081a1e94a2c"));
set_progress(0.566774);
assert(apply_patch_check("/system/bin/ip6tables", "1eded24b3a21e0cdf4df7b68da81be05f220916d", "a1923194b74564ac31eb17993f85afc7ebf7bc97"));
set_progress(0.567911);
assert(apply_patch_check("/system/bin/iptables", "e3469a95d211045bdc687830138ce9b31aa0f1a7", "99d9a162ae37859602572baac9ee2534d67a8b8a"));
set_progress(0.569083);
assert(apply_patch_check("/system/bin/logcat", "c114821cd3bce6ba259f97f50c03ca57c3e7462b", "38f13162c0ee291623c64dd93cf870a2dd1919ca"));
set_progress(0.569172);
assert(apply_patch_check("/system/bin/mksh", "86024db3d6c082fa148dc236082fd8719f9e2dcb", "cc742093369a6c321e033f06f97b2e034c2525f9"));
set_progress(0.570136);
assert(apply_patch_check("/system/bin/netd", "2a737461f317607c770baa7fe57a44923f86ee47", "58708971045220bd4345704b547ffb7f546cdd28"));
set_progress(0.570493);
assert(apply_patch_check("/system/bin/ping", "6f0e86120cfb1d83754bbf7db0adc5e8d86e5916", "a0b3f7111eb1a730f1e7be137ebfa57799508315"));
set_progress(0.570662);
assert(apply_patch_check("/system/bin/vold", "51c2cc7c3eac44050aa86e19b25291e78a1cfb67", "fe72ff17a46a90a91a51348bb83ee250c5a93212"));
set_progress(0.571122);
assert(apply_patch_check("/system/bin/wpa_supplicant", "e652d41ba12be9d63895fe7d611c97e45c786dcf", "d264d5b52a849225fc5dc78ed84fc3b264d17425"));
set_progress(0.574518);
assert(apply_patch_check("/system/build.prop", "6bda9cafded4c41b8420054d7c4e0aa269b488b2", "2b2e25fe61843f4846cceef9cfdccb65ff3357fc"));
set_progress(0.574531);
assert(apply_patch_check("/system/etc/NOTICE.html.gz", "b27cf10ebafc89745efdc579e9f63a750e229575", "6b93dc34052842ca394fb615958303b4584b17eb"));
set_progress(0.575239);
assert(apply_patch_check("/system/etc/security/otacerts.zip", "3a0d51a1270366e87635a0d054d55278a1f047bb", "577e0a384192fad6e51eed0e69288d0104e4d800"));
set_progress(0.575251);
assert(apply_patch_check("/system/etc/wifi/bcmdhd.cal", "afd933b9dfa859c31ebcce994b1930214b1e8d05", "119d122ad978e4fe8d91cb618bd637eb0f64a183"));
set_progress(0.575256);
assert(apply_patch_check("/system/framework/am.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "5d01f84fa85b4169e31ca9ed6cf31b8f48b05bbd"));
set_progress(0.575258);
assert(apply_patch_check("/system/framework/am.odex", "18bc9c5bc8d74a2db62be9427d037ba666c6e58d", "1604a9939c91ba847f635a9da5eedbaca7009701"));
set_progress(0.575507);
assert(apply_patch_check("/system/framework/android.policy.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "416b66401686329299214220ab88f455c5175855"));
set_progress(0.575509);
assert(apply_patch_check("/system/framework/android.policy.odex", "7d46b0f6f859612ec151123626467ee22fd5625f", "ede5fd428513ab664be46303596df63eb7a6f003"));
set_progress(0.577685);
assert(apply_patch_check("/system/framework/android.test.runner.jar", "2a338c2f4e5166059048d787a7c830d012022bd6", "5b477946fc53a7512653b99d41a2a7615bd05163"));
set_progress(0.577687);
assert(apply_patch_check("/system/framework/android.test.runner.odex", "5bae3b47b41c4c814ef71c425adf5793ab741d7d", "d1e03a67f49481b3808acae7989956fe837d9882"));
set_progress(0.578842);
assert(apply_patch_check("/system/framework/apache-xml.jar", "0200154508806dfcd5d3d8de8836414e8967ea1c", "ea64781b839bc7e515ee39d8cc4c3a965a7a8383"));
set_progress(0.578956);
assert(apply_patch_check("/system/framework/apache-xml.odex", "c9d7aaf2d6a5a736d872ef821f2ecf49de9dd4fd", "3f7b7e3726e389e961cf68081d2d05b90bbfdf59"));
set_progress(0.587700);
assert(apply_patch_check("/system/framework/bmgr.jar", "0d2673417d1a548756c92af3430ef4cc2720e8cc", "465be10d9168c99f06a353763463597cc1e16696"));
set_progress(0.587702);
assert(apply_patch_check("/system/framework/bmgr.odex", "1a68e3fccf92a1bd6a840eafd825a7bc3a74a56f", "528a69205d3b3ac34ca17d488e8cff5f8501398a"));
set_progress(0.587796);
assert(apply_patch_check("/system/framework/bouncycastle.jar", "924c0b0d1f9643a7c197f99fc2716160941ad0ac", "8e25ca40f1b87f7006b970c1366d7816538e7e46"));
set_progress(0.587798);
assert(apply_patch_check("/system/framework/bouncycastle.odex", "db8a3d58365c26f3f4a4848baa6861406fa965d8", "9569aa9caedbb956b8db2900c5a3975ab120488d"));
set_progress(0.594001);
assert(apply_patch_check("/system/framework/bu.jar", "0d2673417d1a548756c92af3430ef4cc2720e8cc", "465be10d9168c99f06a353763463597cc1e16696"));
set_progress(0.594003);
assert(apply_patch_check("/system/framework/bu.odex", "183fc7b01c42d7aee6b16426304d7bc21edac70f", "1d611a1f79911330c005822e39e8935038e773d8"));
set_progress(0.594032);
assert(apply_patch_check("/system/framework/com.acer.android.os.jar", "64941b97afd2c3ddccc323b8151eae29ee35c622", "eb38901fcacb6ba4c9328f92a983d66ddb17dce1"));
set_progress(0.594034);
assert(apply_patch_check("/system/framework/com.acer.android.os.odex", "1afd8fa45b07a71ad70069e8896db57ff78cf680", "41759bb0b97cf3ec2befe79d85177c287a73c0f3"));
set_progress(0.594450);
assert(apply_patch_check("/system/framework/com.android.future.usb.accessory.jar", "0d2673417d1a548756c92af3430ef4cc2720e8cc", "465be10d9168c99f06a353763463597cc1e16696"));
set_progress(0.594452);
assert(apply_patch_check("/system/framework/com.android.future.usb.accessory.odex", "b7b58382cd10e559a26b2436bbab007ddec197b0", "d568501ee618a87e336d60700ddd6ad729a24d77"));
set_progress(0.594490);
assert(apply_patch_check("/system/framework/com.android.location.provider.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "465be10d9168c99f06a353763463597cc1e16696"));
set_progress(0.594492);
assert(apply_patch_check("/system/framework/com.android.location.provider.odex", "cc6530462a835a39ff508d032ffee22dcad1e3ce", "25b187e1ccf4e4c948e290002b7323b1c94af61d"));
set_progress(0.594539);
assert(apply_patch_check("/system/framework/com.google.android.maps.jar", "757ecb4dbe85ae09fa9f1b1484a2ea347a588e73", "bcbf7bab3229485e33dc40378a636a61ca947ecb"));
set_progress(0.595534);
assert(apply_patch_check("/system/framework/com.google.android.media.effects.jar", "dc1360ec2fcf3206f48abf8fb44fc944f2d8f1bb", "a80975fcb984b162176df67ef97bb7d7bf77619d"));
set_progress(0.595757);
assert(apply_patch_check("/system/framework/com.google.widevine.software.drm.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "5d01f84fa85b4169e31ca9ed6cf31b8f48b05bbd"));
set_progress(0.595759);
assert(apply_patch_check("/system/framework/com.google.widevine.software.drm.odex", "0407bf72f183cdbf76cf13fb1b301d1206c37112", "84377d57ed8ad1e5e063489e891265b807d12ffc"));
set_progress(0.595766);
assert(apply_patch_check("/system/framework/core-junit.jar", "cb48860709bdb781570d7ba11c1dd2864282681b", "5f8c5cc027fdfeab5c0ab5a7d3c5fb22647a948e"));
set_progress(0.595768);
assert(apply_patch_check("/system/framework/core-junit.odex", "a50bc815b578f4169b48b3684fb61a9460fd0b8f", "3a837fe6eff2068b649d4251ae0d4ad7982ed088"));
set_progress(0.595918);
assert(apply_patch_check("/system/framework/core.jar", "2a7acf7edcea469a5015fc034a277a27703a6fef", "f6158be41e36b4f167675ccfe5fa1b23ba67134b"));
set_progress(0.595944);
assert(apply_patch_check("/system/framework/core.odex", "7512edb702da09e30a22791e810a7ba17347afab", "e8522dfdc92b4ec76384486ab984b8b0233795c5"));
set_progress(0.617279);
assert(apply_patch_check("/system/framework/ext.jar", "40603e617196a532826c62e73f0fb798e00e7f88", "7f920cad462df32308926877e5131b0e158da2de"));
set_progress(0.620074);
assert(apply_patch_check("/system/framework/ext.odex", "97cd4d66900f46289c6e5b7fac8204ac633ffdb2", "306be3b50d6b2e578729a530e0d8be746e1cd783"));
set_progress(0.629552);
assert(apply_patch_check("/system/framework/filterfw.jar", "dace49693f7f90ea161afea34bac50f0585db463", "e74df0b461f6cc64f14119b6cd115ca779db263e"));
set_progress(0.629554);
assert(apply_patch_check("/system/framework/filterfw.odex", "09104eb69921f276b819e5e89ba64ce379aae80d", "ebe45fdd6bfef2c8ea0c61701dbff7051c394dc4"));
set_progress(0.631602);
assert(apply_patch_check("/system/framework/framework-res.apk", "aaa7fc11353ce1e115bb7ff77c02b717e67da406", "8077962649872cd826c0597edd2eba350591422b"));
set_progress(0.663821);
assert(apply_patch_check("/system/framework/framework.jar", "5cf2eb326bb79ca10aeb987ce026875b1dd34576", "c8a99df5cbcc02c8947e80d48c5d8ca1f253a920"));
set_progress(0.663916);
assert(apply_patch_check("/system/framework/framework.odex", "71855914b32b4fa8314076deab6561afa970d959", "517f47caf3e2ccafdb5a265c5fe7cb9669aecb6c"));
set_progress(0.732167);
assert(apply_patch_check("/system/framework/ime.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "5d01f84fa85b4169e31ca9ed6cf31b8f48b05bbd"));
set_progress(0.732169);
assert(apply_patch_check("/system/framework/ime.odex", "f7109e062eb19b01d5d11c838572e54a2f69a6a0", "6b72269b36f5450701656a86392134da93d93277"));
set_progress(0.732212);
assert(apply_patch_check("/system/framework/input.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "5d01f84fa85b4169e31ca9ed6cf31b8f48b05bbd"));
set_progress(0.732214);
assert(apply_patch_check("/system/framework/input.odex", "a7b48e1ad3c4cc9af956563e6641c57d04aa9d28", "5d6a7b3ee559e2ea7348f448d3b9a98db617a438"));
set_progress(0.732243);
assert(apply_patch_check("/system/framework/javax.obex.jar", "0d2673417d1a548756c92af3430ef4cc2720e8cc", "ad77e56c15e28d3429b3c706408c1af351514231"));
set_progress(0.732245);
assert(apply_patch_check("/system/framework/javax.obex.odex", "a0122c043711a90e99cc9d02d522238ec2eadf47", "43aa39c104b4453f977d4086545dda350b2ad1e4"));
set_progress(0.732614);
assert(apply_patch_check("/system/framework/monkey.jar", "0e345052670db5bc47611272b281d677fe24f6c8", "5b477946fc53a7512653b99d41a2a7615bd05163"));
set_progress(0.732616);
assert(apply_patch_check("/system/framework/monkey.odex", "2b024576a7c2c4018e43d10bcf23e3d3f744ebac", "63e6acec50579c91a950f4a33d115f80d98dc691"));
set_progress(0.733347);
assert(apply_patch_check("/system/framework/pm.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "416b66401686329299214220ab88f455c5175855"));
set_progress(0.733349);
follow ..
Code:
assert(apply_patch_check("/system/framework/pm.odex", "5484d2dec30a6a77e7f076a439a073e270ecae20", "741537deaf3c87e791c9732949065eb99610db84"));
set_progress(0.733542);
assert(apply_patch_check("/system/framework/services.jar", "31fd90c0232389acdcaea608fa0e08c5f8629bc3", "d16248128effc71dd626f168d4a535aff2dcac7b"));
set_progress(0.733544);
assert(apply_patch_check("/system/framework/services.odex", "fcc9dd29ad84b9fbbbdbd6b5c33a976c4c44855c", "9b24db37fdcb7afc4dc31bdaefcc189f43e6899f"));
set_progress(0.746307);
assert(apply_patch_check("/system/framework/svc.jar", "21588d0f282665c732f6585294bf2cdea7a2baf4", "416b66401686329299214220ab88f455c5175855"));
set_progress(0.746309);
assert(apply_patch_check("/system/framework/svc.odex", "4c8f60c8ae184c487964d8925954cee47c16bac7", "24e9c1495256263767bca22acacae89912e0d5cd"));
set_progress(0.746363);
assert(apply_patch_check("/system/lib/libDxAndroidSpecific.so", "5ddbb1ccdad85202bae46e3ab16f66f84840e571", "9b19379b3c0082071f7bfdfbea114e2cf7408c30"));
set_progress(0.746441);
assert(apply_patch_check("/system/lib/libDxDrmCAPI.so", "830635884cfc79fefed9b9f952c76833ffab014a", "bc07fa3ee9364b665ff5d1d13c1da670e6e70257"));
set_progress(0.752685);
assert(apply_patch_check("/system/lib/libDxDrmJava.so", "b3123c7fa13a64245af0e867f2f1908aea8c09e4", "79f23452efbf3d33f552ed06ebba3b740d05e2a8"));
set_progress(0.758610);
assert(apply_patch_check("/system/lib/libbcc.so", "6664db631b6bbb8899b58fe05649ee8ff0788088", "bd66b3cdb4b90f9118aefaf352ac8abfe9f0014f"));
set_progress(0.787235);
assert(apply_patch_check("/system/lib/libc.so", "28cb55c0dfc6aa904b7554cda8063199fff950bf", "dc8ca9fbeb7d52391304c6872a16dd95f1c3a94e"));
set_progress(0.789025);
assert(apply_patch_check("/system/lib/libchromium_net.so", "a880c55b8655ee5c60fe582f595454dedcd962d2", "ddddae913eca4cd55dc0d3ae77fd9d86e936cb83"));
set_progress(0.800625);
assert(apply_patch_check("/system/lib/libcrypto.so", "63c414646279add74ca7e4ed055ab3a84c2b73cb", "4dc3032a8e09f69dc2637befcbc76d7577b85f2a"));
set_progress(0.805866);
assert(apply_patch_check("/system/lib/libexif.so", "a25f51bef7fda744f1ee34bd10a7d85d528e51a7", "5fc163743fbf37849da4f4761c5b08b55907d584"));
set_progress(0.806152);
assert(apply_patch_check("/system/lib/libfilterpack_facedetect.so", "df6cc630b46422294191474e4ef9a80ce6943c4b", "356232d535906045f059043174ea99b795f46f84"));
set_progress(0.809723);
assert(apply_patch_check("/system/lib/libfrsdk.so", "03088193c2d2438560b40b4c9c7ce037e726c7b9", "fc0418b8562140cd65cf075b148baf02125b9bd7"));
set_progress(0.821131);
assert(apply_patch_check("/system/lib/libfuse.so", "3c65020b06a57e0be16c6afceea857e582e65c7e", "d068a0f819cfd78b16817535c3a5573027174a29"));
set_progress(0.822063);
assert(apply_patch_check("/system/lib/libgcomm_jni.so", "de50b694bce41f263561d87419f3e472066a265d", "319b5e7b408187a32a8359c9a1c3c6ab1c95fb3d"));
set_progress(0.870328);
assert(apply_patch_check("/system/lib/libmediaplayerservice.so", "2188b3c509643ff85153c699d9ba89b88506c7cb", "de9452881eee99ab4317c30cbc37f77aaa703053"));
set_progress(0.872577);
assert(apply_patch_check("/system/lib/libmllite.so", "c1b3f86f4d38d3f1b7ffac14f133eb6a8ffa3186", "62de29d28077a9778a66877ad0186853625ffb3d"));
set_progress(0.873136);
assert(apply_patch_check("/system/lib/libpicowrapper.so", "1980fd45e0422f81635d694803dca15251bc69f4", "643bbcf106e970ba9d6e135cf159cc97834ee589"));
set_progress(0.874986);
assert(apply_patch_check("/system/lib/libskia.so", "965eb164ec5a5e04cc2675b5e8471cf9dc8f9db7", "924cc034944e35d23b87063ccfe6f372e756a1af"));
set_progress(0.882505);
assert(apply_patch_check("/system/lib/libsqlite.so", "f4806b155ac93a85dc14754f22c3b62549b9b85e", "e1078b9d1558eb9c038e8cc4668f9a3d09bf7bc3"));
set_progress(0.884603);
assert(apply_patch_check("/system/lib/libstagefright.so", "bd283f54502253d66b03e9187a22fbdda05ddd54", "980cbd6c924bd865c122606d790e8e96ba2980fe"));
set_progress(0.894152);
assert(apply_patch_check("/system/lib/libvideochat_jni.so", "0171ebbf8b1fbbaf6a9f083df53fb717bf37a0c8", "76fb5cd53b2f695366286e878d54956528e357b6"));
set_progress(0.919325);
assert(apply_patch_check("/system/lib/libvideochat_stabilize.so", "508f14b4d70d9508cebf0008e335105e77a6d34b", "781b7e99717d277841b80ec002fa7bee0a25a270"));
set_progress(0.919881);
assert(apply_patch_check("/system/lib/libwebcore.so", "bfcefcc9d72e9ca993aa92ff8515cb15b1e42e26", "288bb97aaaec0f61375d2771a4e7a18b432d8338"));
set_progress(0.968385);
assert(apply_patch_check("/system/lib/libwebrtc_audio_preprocessing.so", "e039e76871b3382ea3b82780c4dbd3460950cc0c", "baf24d70e68a6f4b7c491e6271b324f69b5ea645"));
set_progress(0.970134);
assert(apply_patch_check("/flex/app/McAfee.apk", "8184980ef17c54e8a4a8f381745106b3bd7d28ca", "b453779a5c6fb80458a81be94a4b226ba4601a70"));
set_progress(0.974218);
assert(apply_patch_check("/flex/etc/preload.xml", "7b032cf465b0df3e4fdaf07ed0d7c5409e626e7d", "1df68dc91fbd70da5b8208092e0ec96779526633"));
set_progress(0.974225);
assert(apply_patch_check("EMMC:/dev/block/platform/sdhci-tegra.3/by-name/LNX:4063488:caad169aa6cde2d9289af08527945ee950fcfe34:4063488:757965aa4ca5375ad070ba6c69c1991d233c4035"));
set_progress(1.000000);
I wouldn't apply an update on a ROM that it's not made for... first it might not work and second if it applies there might be unwanted side effects.
BENETNATH said:
we need a EMEA_DE user who has applied the update to make a dump of the modified files
Click to expand...
Click to collapse
If you tell me how...
BTW: Anyone else having the issue that an outdated version of Play Books is applied during every reboot, forcing an update afterwards?
Randomwalker said:
If you tell me how...
Click to expand...
Click to collapse
can you try that as a .bat or .sh script (depending of your config)
with a computer connected through adb
Code:
adb shell su -c 'mkdir /mnt/sdcard/update'
adb shell su -c 'mkdir /mnt/sdcard/update/flex'
adb shell su -c 'mkdir /mnt/sdcard/update/flex/app'
adb shell su -c 'mkdir /mnt/sdcard/update/flex/etc'
adb shell su -c 'mkdir /mnt/sdcard/update/system'
adb shell su -c 'mkdir /mnt/sdcard/update/system/app'
adb shell su -c 'mkdir /mnt/sdcard/update/system/bin'
adb shell su -c 'mkdir /mnt/sdcard/update/system/etc'
adb shell su -c 'mkdir /mnt/sdcard/update/system/framework'
adb shell su -c 'mkdir /mnt/sdcard/update/system/lib'
adb shell su -c 'dd if=/flex/app/McAfee.apk of=/mnt/sdcard/update/flex/app/McAfee.apk'
adb shell su -c 'dd if=/flex/etc/preload.xml of=/mnt/sdcard/update/flex/etc/preload.xml'
adb shell su -c 'dd if=/system/app/AcerRing.odex of=/mnt/sdcard/update/system/app/AcerRing.odex'
adb shell su -c 'dd if=/system/app/AcerShellData.odex of=/mnt/sdcard/update/system/app/AcerShellData.odex'
adb shell su -c 'dd if=/system/app/ApplicationsProvider.apk of=/mnt/sdcard/update/system/app/ApplicationsProvider.apk'
adb shell su -c 'dd if=/system/app/ApplicationsProvider.odex of=/mnt/sdcard/update/system/app/ApplicationsProvider.odex'
adb shell su -c 'dd if=/system/app/BackupRestoreConfirmation.apk of=/mnt/sdcard/update/system/app/BackupRestoreConfirmation.apk'
adb shell su -c 'dd if=/system/app/BackupRestoreConfirmation.odex of=/mnt/sdcard/update/system/app/BackupRestoreConfirmation.odex'
adb shell su -c 'dd if=/system/app/Bluetooth.apk of=/mnt/sdcard/update/system/app/Bluetooth.apk'
adb shell su -c 'dd if=/system/app/Bluetooth.odex of=/mnt/sdcard/update/system/app/Bluetooth.odex'
adb shell su -c 'dd if=/system/app/Browser.apk of=/mnt/sdcard/update/system/app/Browser.apk'
adb shell su -c 'dd if=/system/app/Browser.odex of=/mnt/sdcard/update/system/app/Browser.odex'
adb shell su -c 'dd if=/system/app/Calculator.apk of=/mnt/sdcard/update/system/app/Calculator.apk'
adb shell su -c 'dd if=/system/app/Calculator.odex of=/mnt/sdcard/update/system/app/Calculator.odex'
adb shell su -c 'dd if=/system/app/CalendarGoogle.apk of=/mnt/sdcard/update/system/app/CalendarGoogle.apk'
adb shell su -c 'dd if=/system/app/CalendarProvider.apk of=/mnt/sdcard/update/system/app/CalendarProvider.apk'
adb shell su -c 'dd if=/system/app/CalendarProvider.odex of=/mnt/sdcard/update/system/app/CalendarProvider.odex'
adb shell su -c 'dd if=/system/app/Camera.odex of=/mnt/sdcard/update/system/app/Camera.odex'
adb shell su -c 'dd if=/system/app/CertInstaller.apk of=/mnt/sdcard/update/system/app/CertInstaller.apk'
adb shell su -c 'dd if=/system/app/CertInstaller.odex of=/mnt/sdcard/update/system/app/CertInstaller.odex'
adb shell su -c 'dd if=/system/app/ChromeBookmarksSyncAdapter.apk of=/mnt/sdcard/update/system/app/ChromeBookmarksSyncAdapter.apk'
adb shell su -c 'dd if=/system/app/Contacts.apk of=/mnt/sdcard/update/system/app/Contacts.apk'
adb shell su -c 'dd if=/system/app/Contacts.odex of=/mnt/sdcard/update/system/app/Contacts.odex'
adb shell su -c 'dd if=/system/app/ContactsProvider.apk of=/mnt/sdcard/update/system/app/ContactsProvider.apk'
adb shell su -c 'dd if=/system/app/ContactsProvider.odex of=/mnt/sdcard/update/system/app/ContactsProvider.odex'
adb shell su -c 'dd if=/system/app/DefaultContainerService.apk of=/mnt/sdcard/update/system/app/DefaultContainerService.apk'
adb shell su -c 'dd if=/system/app/DefaultContainerService.odex of=/mnt/sdcard/update/system/app/DefaultContainerService.odex'
adb shell su -c 'dd if=/system/app/DeskClock.odex of=/mnt/sdcard/update/system/app/DeskClock.odex'
adb shell su -c 'dd if=/system/app/DownloadProvider.apk of=/mnt/sdcard/update/system/app/DownloadProvider.apk'
adb shell su -c 'dd if=/system/app/DownloadProvider.odex of=/mnt/sdcard/update/system/app/DownloadProvider.odex'
adb shell su -c 'dd if=/system/app/DownloadProviderUi.apk of=/mnt/sdcard/update/system/app/DownloadProviderUi.apk'
adb shell su -c 'dd if=/system/app/DownloadProviderUi.odex of=/mnt/sdcard/update/system/app/DownloadProviderUi.odex'
adb shell su -c 'dd if=/system/app/DrmProvider.apk of=/mnt/sdcard/update/system/app/DrmProvider.apk'
adb shell su -c 'dd if=/system/app/DrmProvider.odex of=/mnt/sdcard/update/system/app/DrmProvider.odex'
adb shell su -c 'dd if=/system/app/DxDrmApplication.odex of=/mnt/sdcard/update/system/app/DxDrmApplication.odex'
adb shell su -c 'dd if=/system/app/Email.apk of=/mnt/sdcard/update/system/app/Email.apk'
adb shell su -c 'dd if=/system/app/Email.odex of=/mnt/sdcard/update/system/app/Email.odex'
adb shell su -c 'dd if=/system/app/Exchange.odex of=/mnt/sdcard/update/system/app/Exchange.odex'
adb shell su -c 'dd if=/system/app/FWupdateService.odex of=/mnt/sdcard/update/system/app/FWupdateService.odex'
adb shell su -c 'dd if=/system/app/GalleryGoogle.apk of=/mnt/sdcard/update/system/app/GalleryGoogle.apk'
adb shell su -c 'dd if=/system/app/Gmail.apk of=/mnt/sdcard/update/system/app/Gmail.apk'
adb shell su -c 'dd if=/system/app/GMS_Maps.apk of=/mnt/sdcard/update/system/app/GMS_Maps.apk'
adb shell su -c 'dd if=/system/app/GoogleBackupTransport.apk of=/mnt/sdcard/update/system/app/GoogleBackupTransport.apk'
adb shell su -c 'dd if=/system/app/GoogleContactsSyncAdapter.apk of=/mnt/sdcard/update/system/app/GoogleContactsSyncAdapter.apk'
adb shell su -c 'dd if=/system/app/GoogleFeedback.apk of=/mnt/sdcard/update/system/app/GoogleFeedback.apk'
adb shell su -c 'dd if=/system/app/GoogleLoginService.apk of=/mnt/sdcard/update/system/app/GoogleLoginService.apk'
adb shell su -c 'dd if=/system/app/GooglePartnerSetup.apk of=/mnt/sdcard/update/system/app/GooglePartnerSetup.apk'
adb shell su -c 'dd if=/system/app/GoogleQuickSearchBox.apk of=/mnt/sdcard/update/system/app/GoogleQuickSearchBox.apk'
adb shell su -c 'dd if=/system/app/GoogleServicesFramework.apk of=/mnt/sdcard/update/system/app/GoogleServicesFramework.apk'
adb shell su -c 'dd if=/system/app/GoogleTTS.apk of=/mnt/sdcard/update/system/app/GoogleTTS.apk'
adb shell su -c 'dd if=/system/app/HoloSpiralWallpaper.apk of=/mnt/sdcard/update/system/app/HoloSpiralWallpaper.apk'
adb shell su -c 'dd if=/system/app/HoloSpiralWallpaper.odex of=/mnt/sdcard/update/system/app/HoloSpiralWallpaper.odex'
adb shell su -c 'dd if=/system/app/HTMLViewer.apk of=/mnt/sdcard/update/system/app/HTMLViewer.apk'
adb shell su -c 'dd if=/system/app/HTMLViewer.odex of=/mnt/sdcard/update/system/app/HTMLViewer.odex'
adb shell su -c 'dd if=/system/app/KeyChain.apk of=/mnt/sdcard/update/system/app/KeyChain.apk'
adb shell su -c 'dd if=/system/app/KeyChain.odex of=/mnt/sdcard/update/system/app/KeyChain.odex'
adb shell su -c 'dd if=/system/app/LatinImeDictionaryPack.apk of=/mnt/sdcard/update/system/app/LatinImeDictionaryPack.apk'
adb shell su -c 'dd if=/system/app/LatinImeGoogle.apk of=/mnt/sdcard/update/system/app/LatinImeGoogle.apk'
adb shell su -c 'dd if=/system/app/Launcher2.apk of=/mnt/sdcard/update/system/app/Launcher2.apk'
adb shell su -c 'dd if=/system/app/Launcher2.odex of=/mnt/sdcard/update/system/app/Launcher2.odex'
adb shell su -c 'dd if=/system/app/LinkToFacebook.odex of=/mnt/sdcard/update/system/app/LinkToFacebook.odex'
adb shell su -c 'dd if=/system/app/LiveWallpapers.apk of=/mnt/sdcard/update/system/app/LiveWallpapers.apk'
adb shell su -c 'dd if=/system/app/LiveWallpapers.odex of=/mnt/sdcard/update/system/app/LiveWallpapers.odex'
adb shell su -c 'dd if=/system/app/LiveWallpapersPicker.apk of=/mnt/sdcard/update/system/app/LiveWallpapersPicker.apk'
adb shell su -c 'dd if=/system/app/LiveWallpapersPicker.odex of=/mnt/sdcard/update/system/app/LiveWallpapersPicker.odex'
adb shell su -c 'dd if=/system/app/MagicSmokeWallpapers.apk of=/mnt/sdcard/update/system/app/MagicSmokeWallpapers.apk'
adb shell su -c 'dd if=/system/app/MagicSmokeWallpapers.odex of=/mnt/sdcard/update/system/app/MagicSmokeWallpapers.odex'
adb shell su -c 'dd if=/system/app/MediaProvider.apk of=/mnt/sdcard/update/system/app/MediaProvider.apk'
adb shell su -c 'dd if=/system/app/MediaProvider.odex of=/mnt/sdcard/update/system/app/MediaProvider.odex'
adb shell su -c 'dd if=/system/app/MusicFX.odex of=/mnt/sdcard/update/system/app/MusicFX.odex'
adb shell su -c 'dd if=/system/app/NoiseField.odex of=/mnt/sdcard/update/system/app/NoiseField.odex'
adb shell su -c 'dd if=/system/app/OneTimeInitializer.apk of=/mnt/sdcard/update/system/app/OneTimeInitializer.apk'
adb shell su -c 'dd if=/system/app/PackageInstaller.apk of=/mnt/sdcard/update/system/app/PackageInstaller.apk'
adb shell su -c 'dd if=/system/app/PackageInstaller.odex of=/mnt/sdcard/update/system/app/PackageInstaller.odex'
adb shell su -c 'dd if=/system/app/PhaseBeam.odex of=/mnt/sdcard/update/system/app/PhaseBeam.odex'
adb shell su -c 'dd if=/system/app/Phone.apk of=/mnt/sdcard/update/system/app/Phone.apk'
adb shell su -c 'dd if=/system/app/Phone.odex of=/mnt/sdcard/update/system/app/Phone.odex'
adb shell su -c 'dd if=/system/app/Phonesky.apk of=/mnt/sdcard/update/system/app/Phonesky.apk'
adb shell su -c 'dd if=/system/app/PlusOne.apk of=/mnt/sdcard/update/system/app/PlusOne.apk'
adb shell su -c 'dd if=/system/app/Settings.apk of=/mnt/sdcard/update/system/app/Settings.apk'
adb shell su -c 'dd if=/system/app/Settings.odex of=/mnt/sdcard/update/system/app/Settings.odex'
adb shell su -c 'dd if=/system/app/SettingsProvider.apk of=/mnt/sdcard/update/system/app/SettingsProvider.apk'
adb shell su -c 'dd if=/system/app/SettingsProvider.odex of=/mnt/sdcard/update/system/app/SettingsProvider.odex'
adb shell su -c 'dd if=/system/app/SharedStorageBackup.apk of=/mnt/sdcard/update/system/app/SharedStorageBackup.apk'
adb shell su -c 'dd if=/system/app/SharedStorageBackup.odex of=/mnt/sdcard/update/system/app/SharedStorageBackup.odex'
adb shell su -c 'dd if=/system/app/SoundRecorder.apk of=/mnt/sdcard/update/system/app/SoundRecorder.apk'
adb shell su -c 'dd if=/system/app/SoundRecorder.odex of=/mnt/sdcard/update/system/app/SoundRecorder.odex'
adb shell su -c 'dd if=/system/app/Street.apk of=/mnt/sdcard/update/system/app/Street.apk'
adb shell su -c 'dd if=/system/app/SystemUI.apk of=/mnt/sdcard/update/system/app/SystemUI.apk'
adb shell su -c 'dd if=/system/app/SystemUI.odex of=/mnt/sdcard/update/system/app/SystemUI.odex'
adb shell su -c 'dd if=/system/app/Talk.apk of=/mnt/sdcard/update/system/app/Talk.apk'
adb shell su -c 'dd if=/system/app/TelephonyProvider.apk of=/mnt/sdcard/update/system/app/TelephonyProvider.apk'
adb shell su -c 'dd if=/system/app/TelephonyProvider.odex of=/mnt/sdcard/update/system/app/TelephonyProvider.odex'
adb shell su -c 'dd if=/system/app/UserDictionaryProvider.apk of=/mnt/sdcard/update/system/app/UserDictionaryProvider.apk'
adb shell su -c 'dd if=/system/app/UserDictionaryProvider.odex of=/mnt/sdcard/update/system/app/UserDictionaryProvider.odex'
adb shell su -c 'dd if=/system/app/VisualizationWallpapers.apk of=/mnt/sdcard/update/system/app/VisualizationWallpapers.apk'
adb shell su -c 'dd if=/system/app/VisualizationWallpapers.odex of=/mnt/sdcard/update/system/app/VisualizationWallpapers.odex'
adb shell su -c 'dd if=/system/app/VpnDialogs.apk of=/mnt/sdcard/update/system/app/VpnDialogs.apk'
adb shell su -c 'dd if=/system/app/VpnDialogs.odex of=/mnt/sdcard/update/system/app/VpnDialogs.odex'
adb shell su -c 'dd if=/system/app/xt9.apk of=/mnt/sdcard/update/system/app/xt9.apk'
adb shell su -c 'dd if=/system/app/YouTube.apk of=/mnt/sdcard/update/system/app/YouTube.apk'
adb shell su -c 'dd if=/system/bin/adb of=/mnt/sdcard/update/system/bin/adb'
adb shell su -c 'dd if=/system/bin/debuggerd of=/mnt/sdcard/update/system/bin/debuggerd'
adb shell su -c 'dd if=/system/bin/dhcpcd of=/mnt/sdcard/update/system/bin/dhcpcd'
adb shell su -c 'dd if=/system/bin/dnsmasq of=/mnt/sdcard/update/system/bin/dnsmasq'
adb shell su -c 'dd if=/system/bin/dumpstate of=/mnt/sdcard/update/system/bin/dumpstate'
adb shell su -c 'dd if=/system/bin/DxDrmServerIpc of=/mnt/sdcard/update/system/bin/DxDrmServerIpc'
adb shell su -c 'dd if=/system/bin/fusermount of=/mnt/sdcard/update/system/bin/fusermount'
adb shell su -c 'dd if=/system/bin/hostapd of=/mnt/sdcard/update/system/bin/hostapd'
adb shell su -c 'dd if=/system/bin/installd of=/mnt/sdcard/update/system/bin/installd'
adb shell su -c 'dd if=/system/bin/ip of=/mnt/sdcard/update/system/bin/ip'
adb shell su -c 'dd if=/system/bin/ip6tables of=/mnt/sdcard/update/system/bin/ip6tables'
adb shell su -c 'dd if=/system/bin/iptables of=/mnt/sdcard/update/system/bin/iptables'
adb shell su -c 'dd if=/system/bin/logcat of=/mnt/sdcard/update/system/bin/logcat'
adb shell su -c 'dd if=/system/bin/mksh of=/mnt/sdcard/update/system/bin/mksh'
adb shell su -c 'dd if=/system/bin/netd of=/mnt/sdcard/update/system/bin/netd'
adb shell su -c 'dd if=/system/bin/ping of=/mnt/sdcard/update/system/bin/ping'
adb shell su -c 'dd if=/system/bin/vold of=/mnt/sdcard/update/system/bin/vold'
adb shell su -c 'dd if=/system/bin/wpa_supplicant of=/mnt/sdcard/update/system/bin/wpa_supplicant'
adb shell su -c 'dd if=/system/build.prop of=/mnt/sdcard/update/system/build.prop'
adb shell su -c 'dd if=/system/etc/NOTICE.html.gz of=/mnt/sdcard/update/system/etc/NOTICE.html.gz'
adb shell su -c 'dd if=/system/etc/security/otacerts.zip of=/mnt/sdcard/update/system/etc/security/otacerts.zip'
adb shell su -c 'dd if=/system/etc/wifi/bcmdhd.cal of=/mnt/sdcard/update/system/etc/wifi/bcmdhd.cal'
adb shell su -c 'dd if=/system/framework/am.jar of=/mnt/sdcard/update/system/framework/am.jar'
adb shell su -c 'dd if=/system/framework/am.odex of=/mnt/sdcard/update/system/framework/am.odex'
adb shell su -c 'dd if=/system/framework/android.policy.jar of=/mnt/sdcard/update/system/framework/android.policy.jar'
adb shell su -c 'dd if=/system/framework/android.policy.odex of=/mnt/sdcard/update/system/framework/android.policy.odex'
adb shell su -c 'dd if=/system/framework/android.test.runner.jar of=/mnt/sdcard/update/system/framework/android.test.runner.jar'
adb shell su -c 'dd if=/system/framework/android.test.runner.odex of=/mnt/sdcard/update/system/framework/android.test.runner.odex'
adb shell su -c 'dd if=/system/framework/apache-xml.jar of=/mnt/sdcard/update/system/framework/apache-xml.jar'
adb shell su -c 'dd if=/system/framework/apache-xml.odex of=/mnt/sdcard/update/system/framework/apache-xml.odex'
adb shell su -c 'dd if=/system/framework/bmgr.jar of=/mnt/sdcard/update/system/framework/bmgr.jar'
adb shell su -c 'dd if=/system/framework/bmgr.odex of=/mnt/sdcard/update/system/framework/bmgr.odex'
adb shell su -c 'dd if=/system/framework/bouncycastle.jar of=/mnt/sdcard/update/system/framework/bouncycastle.jar'
adb shell su -c 'dd if=/system/framework/bouncycastle.odex of=/mnt/sdcard/update/system/framework/bouncycastle.odex'
adb shell su -c 'dd if=/system/framework/bu.jar of=/mnt/sdcard/update/system/framework/bu.jar'
adb shell su -c 'dd if=/system/framework/bu.odex of=/mnt/sdcard/update/system/framework/bu.odex'
adb shell su -c 'dd if=/system/framework/com.acer.android.os.jar of=/mnt/sdcard/update/system/framework/com.acer.android.os.jar'
adb shell su -c 'dd if=/system/framework/com.acer.android.os.odex of=/mnt/sdcard/update/system/framework/com.acer.android.os.odex'
adb shell su -c 'dd if=/system/framework/com.android.future.usb.accessory.jar", of=/mnt/sdcard/update/system/framework/com.android.future.usb.accessory.jar",'
adb shell su -c 'dd if=/system/framework/com.android.future.usb.accessory.odex", of=/mnt/sdcard/update/system/framework/com.android.future.usb.accessory.odex",'
adb shell su -c 'dd if=/system/framework/com.android.location.provider.jar", of=/mnt/sdcard/update/system/framework/com.android.location.provider.jar",'
adb shell su -c 'dd if=/system/framework/com.android.location.provider.odex", of=/mnt/sdcard/update/system/framework/com.android.location.provider.odex",'
adb shell su -c 'dd if=/system/framework/com.google.android.maps.jar of=/mnt/sdcard/update/system/framework/com.google.android.maps.jar'
adb shell su -c 'dd if=/system/framework/com.google.android.media.effects.jar", of=/mnt/sdcard/update/system/framework/com.google.android.media.effects.jar",'
adb shell su -c 'dd if=/system/framework/com.google.widevine.software.drm.jar", of=/mnt/sdcard/update/system/framework/com.google.widevine.software.drm.jar",'
adb shell su -c 'dd if=/system/framework/com.google.widevine.software.drm.odex", of=/mnt/sdcard/update/system/framework/com.google.widevine.software.drm.odex",'
adb shell su -c 'dd if=/system/framework/core.jar of=/mnt/sdcard/update/system/framework/core.jar'
adb shell su -c 'dd if=/system/framework/core.odex of=/mnt/sdcard/update/system/framework/core.odex'
adb shell su -c 'dd if=/system/framework/core-junit.jar of=/mnt/sdcard/update/system/framework/core-junit.jar'
adb shell su -c 'dd if=/system/framework/core-junit.odex of=/mnt/sdcard/update/system/framework/core-junit.odex'
adb shell su -c 'dd if=/system/framework/ext.jar of=/mnt/sdcard/update/system/framework/ext.jar'
adb shell su -c 'dd if=/system/framework/ext.odex of=/mnt/sdcard/update/system/framework/ext.odex'
adb shell su -c 'dd if=/system/framework/filterfw.jar of=/mnt/sdcard/update/system/framework/filterfw.jar'
adb shell su -c 'dd if=/system/framework/filterfw.odex of=/mnt/sdcard/update/system/framework/filterfw.odex'
adb shell su -c 'dd if=/system/framework/framework.jar of=/mnt/sdcard/update/system/framework/framework.jar'
adb shell su -c 'dd if=/system/framework/framework.odex of=/mnt/sdcard/update/system/framework/framework.odex'
adb shell su -c 'dd if=/system/framework/framework-res.apk of=/mnt/sdcard/update/system/framework/framework-res.apk'
adb shell su -c 'dd if=/system/framework/ime.jar of=/mnt/sdcard/update/system/framework/ime.jar'
adb shell su -c 'dd if=/system/framework/ime.odex of=/mnt/sdcard/update/system/framework/ime.odex'
adb shell su -c 'dd if=/system/framework/input.jar of=/mnt/sdcard/update/system/framework/input.jar'
adb shell su -c 'dd if=/system/framework/input.odex of=/mnt/sdcard/update/system/framework/input.odex'
adb shell su -c 'dd if=/system/framework/javax.obex.jar of=/mnt/sdcard/update/system/framework/javax.obex.jar'
adb shell su -c 'dd if=/system/framework/javax.obex.odex of=/mnt/sdcard/update/system/framework/javax.obex.odex'
adb shell su -c 'dd if=/system/framework/monkey.jar of=/mnt/sdcard/update/system/framework/monkey.jar'
adb shell su -c 'dd if=/system/framework/monkey.odex of=/mnt/sdcard/update/system/framework/monkey.odex'
adb shell su -c 'dd if=/system/framework/pm.jar of=/mnt/sdcard/update/system/framework/pm.jar'
adb shell su -c 'dd if=/system/framework/pm.odex of=/mnt/sdcard/update/system/framework/pm.odex'
adb shell su -c 'dd if=/system/framework/services.jar of=/mnt/sdcard/update/system/framework/services.jar'
adb shell su -c 'dd if=/system/framework/services.odex of=/mnt/sdcard/update/system/framework/services.odex'
adb shell su -c 'dd if=/system/framework/svc.jar of=/mnt/sdcard/update/system/framework/svc.jar'
adb shell su -c 'dd if=/system/framework/svc.odex of=/mnt/sdcard/update/system/framework/svc.odex'
adb shell su -c 'dd if=/system/lib/libbcc.so of=/mnt/sdcard/update/system/lib/libbcc.so'
adb shell su -c 'dd if=/system/lib/libc.so of=/mnt/sdcard/update/system/lib/libc.so'
adb shell su -c 'dd if=/system/lib/libchromium_net.so of=/mnt/sdcard/update/system/lib/libchromium_net.so'
adb shell su -c 'dd if=/system/lib/libcrypto.so of=/mnt/sdcard/update/system/lib/libcrypto.so'
adb shell su -c 'dd if=/system/lib/libDxAndroidSpecific.so of=/mnt/sdcard/update/system/lib/libDxAndroidSpecific.so'
adb shell su -c 'dd if=/system/lib/libDxDrmCAPI.so of=/mnt/sdcard/update/system/lib/libDxDrmCAPI.so'
adb shell su -c 'dd if=/system/lib/libDxDrmJava.so of=/mnt/sdcard/update/system/lib/libDxDrmJava.so'
adb shell su -c 'dd if=/system/lib/libexif.so of=/mnt/sdcard/update/system/lib/libexif.so'
adb shell su -c 'dd if=/system/lib/libfilterpack_facedetect.so of=/mnt/sdcard/update/system/lib/libfilterpack_facedetect.so'
adb shell su -c 'dd if=/system/lib/libfrsdk.so of=/mnt/sdcard/update/system/lib/libfrsdk.so'
adb shell su -c 'dd if=/system/lib/libfuse.so of=/mnt/sdcard/update/system/lib/libfuse.so'
adb shell su -c 'dd if=/system/lib/libgcomm_jni.so of=/mnt/sdcard/update/system/lib/libgcomm_jni.so'
adb shell su -c 'dd if=/system/lib/libmediaplayerservice.so of=/mnt/sdcard/update/system/lib/libmediaplayerservice.so'
adb shell su -c 'dd if=/system/lib/libmllite.so of=/mnt/sdcard/update/system/lib/libmllite.so'
adb shell su -c 'dd if=/system/lib/libpicowrapper.so of=/mnt/sdcard/update/system/lib/libpicowrapper.so'
adb shell su -c 'dd if=/system/lib/libskia.so of=/mnt/sdcard/update/system/lib/libskia.so'
adb shell su -c 'dd if=/system/lib/libsqlite.so of=/mnt/sdcard/update/system/lib/libsqlite.so'
adb shell su -c 'dd if=/system/lib/libstagefright.so of=/mnt/sdcard/update/system/lib/libstagefright.so'
adb shell su -c 'dd if=/system/lib/libvideochat_jni.so of=/mnt/sdcard/update/system/lib/libvideochat_jni.so'
adb shell su -c 'dd if=/system/lib/libvideochat_stabilize.so of=/mnt/sdcard/update/system/lib/libvideochat_stabilize.so'
adb shell su -c 'dd if=/system/lib/libwebcore.so of=/mnt/sdcard/update/system/lib/libwebcore.so'
adb shell su -c 'dd if=/system/lib/libwebrtc_audio_preprocessing.so of=/mnt/sdcard/update/system/lib/libwebrtc_audio_preprocessing.so'
adb shell su -c 'dd if=/dev/block/platform/sdhci-tegra.3/by-name/LNX of=/mnt/sdcard/update/boot.img'
and give us the zip file of the update folder created on the sdcard
thanks
OK, should be here any minute... or hours judging by current upload speed: update.7z
should be up now.
Randomwalker said:
OK, should be here any minute... or hours judging by current upload speed: http://min.us/mU3E4pTI7
should be up now.
Click to expand...
Click to collapse
your link is messy :
http://minus.com/mU3E4pTI7/
thanks a lot, downloading
---------- Post added at 03:53 PM ---------- Previous post was at 03:03 PM ----------
EDIT : ok, i've got the file, but strangely it does not contain 2 files : in the flex folder.
did you have two errors ?
may be did you take directly the commands, during the time i was adding these two commands (mkdir for both folders in flex)
can you check you have these files ?
adb shell su -c 'dd if=/flex/app/McAfee.apk of=/mnt/sdcard/update/flex/app/McAfee.apk'
adb shell su -c 'dd if=/flex/etc/preload.xml of=/mnt/sdcard/update/flex/etc/preload.xml'
otherwise, it's great, i'll give a try to that
BENETNATH said:
your link is messy :
http://minus.com/mU3E4pTI7/
thanks a lot, downloading
---------- Post added at 03:53 PM ---------- Previous post was at 03:03 PM ----------
EDIT : ok, i've got the file, but strangely it does not contain 2 files : in the flex folder.
did you have two errors ?
may be did you take directly the commands, during the time i was adding these two commands (mkdir for both folders in flex)
can you check you have these files ?
adb shell su -c 'dd if=/flex/app/McAfee.apk of=/mnt/sdcard/update/flex/app/McAfee.apk'
adb shell su -c 'dd if=/flex/etc/preload.xml of=/mnt/sdcard/update/flex/etc/preload.xml'
otherwise, it's great, i'll give a try to that
Click to expand...
Click to collapse
The time stamp for my batch file is 1116, so it could just be that I missed your last edit at 1111.
I'll have a look.
EDIT: Would /flex be /flexrom? Because I only have /flexrom on my device.DOes it make a difference that I pulled that update.7z from a freshly resetted device?
Just had the great idea to actually look at the batch file...
It does contain the mkdir for the subfolders.
ok, strange..
i'll dig on it when i'm bak near my device.
anyway, thanks a lot
Related
[Q] ADB Backup
Hi All, I've backed up my device (I9000) using ADB with the following commands: mkdir backup cd backup adb shell su -c "dd if=/dev/block/bml1 of=/sdcard/boot.bin bs=4096" adb shell su -c "dd if=/dev/block/bml2 of=/sdcard/pit.pit bs=4096" adb shell su -c "dd if=/dev/block/stl3 of=/sdcard/efs.rfs bs=4096" adb shell su -c "dd if=/dev/block/bml4 of=/sdcard/Sbl.bin bs=4096" adb shell su -c "dd if=/dev/block/stl6 of=/sdcard/param.lfs bs=4096" adb shell su -c "dd if=/dev/block/bml7 of=/sdcard/zImage bs=4096" adb shell su -c "dd if=/dev/block/stl9 of=/sdcard/factoryfs.rfs bs=4096" adb shell su -c "dd if=/dev/block/stl10 of=/sdcard/dbdata.rfs bs=4096" adb shell su -c "dd if=/dev/block/stl11 of=/sdcard/cache.rfs bs=4096" adb shell su -c "dd if=/dev/block/bml12 of=/sdcard/modem.bin bs=4096" adb shell su -c "tar -czvf /sdcard/data.tar.gz /data" adb pull /sdcard/param.lfs . adb pull /sdcard/zImage . adb pull /sdcard/factoryfs.rfs . adb pull /sdcard/dbdata.rfs . adb pull /sdcard/cache.rfs . adb pull /sdcard/modem.bin . adb pull /sdcard/efs.rfs . adb pull /sdcard/boot.bin . adb pull /sdcard/Sbl.bin . adb pull /sdcard/pit.pit . adb pull /sdcard/data.tar.gz . And I would like to give the backup to some of my friends, but I would like to verify there are no "personal data" on the backup (I did a factory reset before the backup and there was no contacts \ data that was mine), I don't know what type of data should I delete from the files, (like IMEI and serial data..). Please help me find out what shouldn't be on the backup, Thanks, AYahoo.
need help to make a rom kitchen for sg3
hi guys,i'm working for make a rom kitchen for our sg3 those days it's 40% done,but i have some troubles i can't root via this script,can you help me? this is my code: Code: adb push .\root\rageagainstthecage /data/local/tmp/rageagainstthecage adb push .\root\Superuser.apk /data/local/tmp/Superuser.apk adb push .\root\su /data/local/tmp/su adb push .\root\busybox /data/local/tmp/busybox adb shell chmod 755 /data/local/tmp/busybox adb shell chmod 755 /data/local/tmp/rageagainstthecage adb shell "/data/local/tmp/rageagainstthecage" adb kill-server adb start-server adb -d shell "mount -o remount,rw /dev/block/stl9 /system" adb push .\root\su /system/bin/su adb push .\root\busybox /system/bin/busybox adb push .\root\sqlite3 /system/bin/sqlite3 adb push .\root\Superuser.apk /system/app/ adb shell "/system/bin" adb -d shell "chmod 4755 su" adb -d shell "chmod 4755 busybox" adb -d shell "chmod 4755 sqlite3" maybe it's complicate, i tried many times to mod it,but no result. i run it ,it goes to adb -d shell "mount -o remount,rw /dev/block/stl9 /system" this line ,says ‘mount :operation not permitted ’ and it still $ instead of # i do not know where the problem is ... plz help me hi pls their are two tutorials on this subject pls ask ur question in one of the threads CLOSED
and my base version is ZHJPF
i think u need to su to remount system as rw.
[Q] Updater-script code
Can someone convert this adb shell code in an updater-script code? Code: @files\adb shell "su -c 'busybox mount -o remount,rw /system'" @files\adb shell "su -c 'busybox mount | grep system'" @files\adb shell "su -c 'chmod 0777 /system/etc/install-recovery.sh'" @files\adb shell "su -c 'chown root.shell /system/etc/install-recovery.sh'" @files\adb shell "su -c 'chmod 0755 /system/bin/sysinit'" @files\adb shell "su -c 'chown root.shell /system/bin/sysinit'" @files\adb shell "su -c 'chmod 0777 /system/xbin/run-parts'" @files\adb shell "su -c 'chown root.shell /system/xbin/run-parts'" @files\adb shell "su -c 'chmod 0777 /system/etc/init.d/'" @files\adb shell "su -c 'chmod 0777 /system/etc/init.d/*'" @files\adb shell "su -c 'chown root.root /system/etc/init.d/'"
mount("(the file system for /system. ie: ext3, ext4, fat)", "(Probably EMMC)", "/dev/block/(the block name for your partition)", "/system"); /system/etc/install-recovery.sh set_perm(0, 2000, 06777, "/system/etc/install-recovery.sh"); Yada, yada, yada. The main reason I'm not doing this for you is because it seems specific to a certian issue and I think you should do the research to get it right. Either that of risk screwing something up bad. About making an edify script. What you are trying to do/ A nice read on linux permissions Check the lower half about setting UID and GID. Nicely done.
[Completed] [Q] Need urgent help with adb fastboot nandroid backup (paid assistance)
Hi, I have idea like "backup all data (include apps, accounts, system settings) -> wipe all data -> upload backup -> start device", but backup upload on server by ftp/sftp. After few times another script download necessary backup and upload on phone by adb/fastboot and start device. PS Since I need it urgently enough and I tried huge amount of scripts and commands - asking for your help (in debt will not stay). Skype: a.roman2403
Hi Thanks for writing to us at XDA Assist. It isn't very clear what you're asking, can you please elaborate?
I wanna create now system of create and restore backups from multiply devices by server and without ppl) Now i create backup by this script (sorr, i`m only learn) Code: adb wait-for-device set dirname=%date:~0,2%%date:~3,2%%date:~8,2%%time:~0,2%%time:~3,2% mkdir %dirname% > NULL adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep system | sed -r 's/.* .//') of=/sdcard/blkbackup.img" adb pull /sdcard/blkbackup.img %dirname%\system.img adb shell rm /sdcard/blkbackup.img adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep boot | sed -r 's/.* .//') of=/sdcard/blkbackup.img" adb pull /sdcard/blkbackup.img %dirname%\boot.img adb shell rm /sdcard/blkbackup.img adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep recovery | sed -r 's/.* .//') of=/sdcard/blkbackup.img" adb pull /sdcard/blkbackup.img %dirname%\recovery.img adb shell rm /sdcard/blkbackup.img adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep cache | sed -r 's/.* .//') of=/sdcard/blkbackup.img" adb pull /sdcard/blkbackup.img %dirname%\cache.img adb shell rm /sdcard/blkbackup.img adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep userdata | sed -r 's/.* .//') of=/sdcard/blkbackup.img" adb pull /sdcard/blkbackup.img %dirname%\userdata.img adb shell rm /sdcard/blkbackup.img adb shell "pm list package -s" > %dirname%\system.apps.list adb shell "pm list package -3" > %dirname%\3d-party.apps.list i think what this logicaly work, but in realy - dont work and i cant upload backup in server. can you explain me how i can create fully backup android device and restore it adter few days in device by shellscript. In an ideal world I see it this way: 1) made a backup using http://forum.xda-developers.com/showthread.php?t=1620255 2) loading on server 3) another script download the desired backup and load it on your phone or PC 4) install 4.1) profit
Ant1Freeze said: I wanna create now system of create and restore backups from multiply devices by server and without ppl) Now i create backup by this script (sorr, i`m only learn) Code: adb wait-for-device set dirname=%date:~0,2%%date:~3,2%%date:~8,2%%time:~0,2%%time:~3,2% mkdir %dirname% > NULL adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep system | sed -r 's/.* .//') of=/sdcard/blkbackup.img" adb pull /sdcard/blkbackup.img %dirname%\system.img adb shell rm /sdcard/blkbackup.img adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep boot | sed -r 's/.* .//') of=/sdcard/blkbackup.img" adb pull /sdcard/blkbackup.img %dirname%\boot.img adb shell rm /sdcard/blkbackup.img adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep recovery | sed -r 's/.* .//') of=/sdcard/blkbackup.img" adb pull /sdcard/blkbackup.img %dirname%\recovery.img adb shell rm /sdcard/blkbackup.img adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep cache | sed -r 's/.* .//') of=/sdcard/blkbackup.img" adb pull /sdcard/blkbackup.img %dirname%\cache.img adb shell rm /sdcard/blkbackup.img adb shell su -c "dd if=/$(ls -la /dev/block/platform/msm_sdcc.1/by-name | grep userdata | sed -r 's/.* .//') of=/sdcard/blkbackup.img" adb pull /sdcard/blkbackup.img %dirname%\userdata.img adb shell rm /sdcard/blkbackup.img adb shell "pm list package -s" > %dirname%\system.apps.list adb shell "pm list package -3" > %dirname%\3d-party.apps.list i think what this logicaly work, but in realy - dont work and i cant upload backup in server. can you explain me how i can create fully backup android device and restore it adter few days in device by shellscript. In an ideal world I see it this way: 1) made a backup using http://forum.xda-developers.com/showthread.php?t=1620255 2) loading on server 3) another script download the desired backup and load it on your phone or PC 4) install 4.1) profit Click to expand... Click to collapse Ok, I understand now. Unfortunately XDA Assist isn't a general helpdesk area, our purpose is to point people who don't know where to post in the right direction. I think the best place for your question would be here: Android Q&A, Help & Troubleshooting Transmitted via Bacon
tnx you) Done http://forum.xda-developers.com/android/help/urgent-help-adb-fastboot-nandroid-t3086756
Cool. Thread closed, thanks. Transmitted via Bacon
Cloning Pre-configured Android 8.1 Device / ROM
Hey guys, Not sure if this is the correct place to post, but I am at my wits end and think I need a bit of help. I have been cloning devices on Android 7.1 without too much trouble, but something has changed in Android 8.1 which breaks things. Here is my setup: Device: Xiaomi Redmi Note 4X 16GB, unlocked bootloader OS: LineageOS 15.1 (Android 8.1) My setup process is as follows: Let stock ROM update (for latest firmware), unlock BL, flash TWRP, clean wipe, flash LineageOS + Gapps + Magisk Skip through setup wizard, apply customisations (apps via APKs, launcher, settings, etc) Clear Data for following: com.google.android.gms.setup Google App Google Account Manager Google Backup Transport Google One Time Init Google Partner Setup Google Play Services Google Play Services for Instant Apps Google Play Store Google Services framework Reboot to TWRP Connect to PC, run following ADB command: adb pull /data/system/users/0/settings_secure.xml Open settings_secure.xml and delete "android_id" line Push settings_secure.xml back to device: adb push settings_secure.xml /data/system/users/0/ Capture system image, flash onto other devices (either via TWRP backup or pushing system images via ADB) Boot device, log into client Google account, done Now this process used to work great on LineageOS 14.1 (Android 7.1), but now I get the following issues: When adding a Google Account, it does not appear in Android device manager, but it appears in the list of devices in the Google Play Store? If I remove the account and then add it again it appears, but the issues below still occur. Google's messaging / push system is broken. If I send a Hangouts message to my Google account, it won't appear until I open the app. Any pre-installed apps won't appear in the "installed" list of apps in the play store, and therefore not update automatically until the user manually searches for the app in the Play Store and hits "update" (ugh). I need to be deploying around 100 units over the next couple of months or so I need something that is scalable. I might be going around this the wrong way completely. I am not a ROM developer or programmer, just found something that has worked well in the past, so if I need to develop a ROM from scratch based on LineageOS I'll probably need to hire someone to do this for me as this is a bit beyond my current capabilities and time constraints. Let me know your thoughts! Thanks.
Android ID is same for many devices if you clone. That is really bad and can cause issues.
Rayman96 said: Android ID is same for many devices if you clone. That is really bad and can cause issues. Click to expand... Click to collapse I am deleting the Android ID from settings_secure.xml though. Unless it is somewhere else as well?
I'm still struggling with this problem. Is there anything else I can try? I googled this problem and the first result is this thread :/
stephendt0 said: I'm still struggling with this problem. Is there anything else I can try? I googled this problem and the first result is this thread :/ Click to expand... Click to collapse Code: adb shell settings delete secure android_id adb shell settings delete secure advertising_id adb shell settings delete secure bluetooth_address adb shell settings put secure bluetooth_name 'YOURNAME' adb shell settings put global device_name 'YOURNAME' adb shell settings put global wifi_p2p_device_name 'YOURNAME' The two IDs are then randomly regenerated. YOURNAME is any name of your choice.
rainman74 said: Code: adb shell settings delete secure android_id adb shell settings delete secure advertising_id adb shell settings delete secure bluetooth_address adb shell settings put secure bluetooth_name 'YOURNAME' adb shell settings put global device_name 'YOURNAME' adb shell settings put global wifi_p2p_device_name 'YOURNAME' The two IDs are then randomly regenerated. YOURNAME is any name of your choice. Click to expand... Click to collapse Thanks for that. I believe I actually found their respective strings in settings_secure.xml: <setting id="59" name="config_update_certificate" <setting id="43" name="bluetooth_address" And of course the Android ID. Once I deleted these, they auto-generated on the next boot, so I do this using ADB in TWRP. I tried this and so far I'm not having any problems! Will report back if I experience any issues.
Another update - turn out that this is NOT enough. You will also want to clear data for the following apps (ideally just before shutting down the system and clearing android, bluetooth and config_update_certificate) to ensure that push notifications continue to work: Com.google.android.gms.setup Google App (not 100% sure if this is required, but I do it anyway) Google Play Services Google Play Store Google Services framework Reboot, clear your IDs, and then take your image. It should be OK after that, I think. I generally like to setup Hangouts on the device and then reboot, and let it sit for 5 minutes so its fully dozed before I send a test message. Edit: STILL not working even after all this. Anyone else able to offer an explanation as to why push notifications is such an issue? This is becoming really difficult
stephendt0 said: Another update - turn out that this is NOT enough. You will also want to clear data for the following apps (ideally just before shutting down the system and clearing android, bluetooth and config_update_certificate) to ensure that push notifications continue to work: Com.google.android.gms.setup Google App (not 100% sure if this is required, but I do it anyway) Google Play Services Google Play Store Google Services framework Reboot, clear your IDs, and then take your image. It should be OK after that, I think. I generally like to setup Hangouts on the device and then reboot, and let it sit for 5 minutes so its fully dozed before I send a test message. Edit: STILL not working even after all this. Anyone else able to offer an explanation as to why push notifications is such an issue? This is becoming really difficult Click to expand... Click to collapse ok, if you want to reset everything in a clone, proceed as follows: Code: adb shell su -c mount -o remount,rw /system adb shell su -c rm /data/system/users/0/accounts.db adb shell su -c rm /data/system/users/0/accounts.db-journal adb shell su -c rm /data/system/users/0/photo.png adb shell su -c rm /data/system/sync/accounts.xml adb shell su -c rm /data/system/sync/pending.xml adb shell su -c rm /data/system/sync/stats.bin adb shell su -c rm /data/system/sync/status.bin adb shell su -c pm clear com.android.packageinstaller adb shell su -c pm clear com.android.providers.downloads adb shell su -c pm clear com.android.vending adb shell su -c pm clear com.google.android.backuptransport adb shell su -c pm clear com.google.android.gms adb shell su -c pm clear com.google.android.gsf adb shell su -c mount -o remount,ro /system Please also follow my instructions above for resetting the IDs before rebooting. Google then recognizes a new device! Have fun :fingers-crossed:
rainman74 said: ok, if you want to reset everything in a clone, proceed as follows: Code: adb shell su -c mount -o remount,rw /system adb shell su -c rm /data/system/users/0/accounts.db adb shell su -c rm /data/system/users/0/accounts.db-journal adb shell su -c rm /data/system/users/0/photo.png adb shell su -c rm /data/system/sync/accounts.xml adb shell su -c rm /data/system/sync/pending.xml adb shell su -c rm /data/system/sync/stats.bin adb shell su -c rm /data/system/sync/status.bin adb shell su -c pm clear com.android.packageinstaller adb shell su -c pm clear com.android.providers.downloads adb shell su -c pm clear com.android.vending adb shell su -c pm clear com.google.android.backuptransport adb shell su -c pm clear com.google.android.gms adb shell su -c pm clear com.google.android.gsf adb shell su -c mount -o remount,ro /system Please also follow my instructions above for resetting the IDs before rebooting. Google then recognizes a new device! Have fun :fingers-crossed: Click to expand... Click to collapse OMG, I think that worked, thank you! I spent 5 hrs and stayed up to 3am trying to work this out with no luck, and this did the trick. To make things easier however, I morphed these commands into a dirty "one-liner" that saves entering each command. Code: adb shell settings delete secure android_id && adb shell settings delete secure advertising_id && adb shell settings delete secure bluetooth_address && adb shell settings put secure bluetooth_name 'Redmi Note 4' && adb shell settings put global device_name 'Redmi Note 4' && adb shell settings put global wifi_p2p_device_name 'Redmi Note 4' && adb shell su -c mount -o remount,rw /system && adb shell su -c rm /data/system/users/0/accounts.db && adb shell su -c rm /data/system/users/0/accounts.db-journal && adb shell su -c rm /data/system/users/0/photo.png && adb shell su -c rm /data/system/sync/accounts.xml && adb shell su -c rm /data/system/sync/pending.xml && adb shell su -c rm /data/system/sync/stats.bin && adb shell su -c rm /data/system/sync/status.bin && adb shell su -c pm clear com.android.packageinstaller && adb shell su -c pm clear com.android.providers.downloads && adb shell su -c pm clear com.android.vending && adb shell su -c pm clear com.google.android.backuptransport && adb shell su -c pm clear com.google.android.gms && adb shell su -c pm clear com.google.android.gsf && adb shell su -c mount -o remount,ro /system I'm sure there is a more efficient way of stacking commands, but this worked. Replace "Redmi Note 4" with your actual device and reboot. I cleared data for any messaging apps and removed my Google account before I began, however.
stephendt0 said: OMG, I think that worked, thank you! I spent 5 hrs and stayed up to 3am trying to work this out with no luck, and this did the trick. To make things easier however, I morphed these commands into a dirty "one-liner" that saves entering each command. I'm sure there is a more efficient way of stacking commands, but this worked. Replace "Redmi Note 4" with your actual device and reboot. I cleared data for any messaging apps and removed my Google account before I began, however. Click to expand... Click to collapse Perfect! You don't need to remove your Google account as the commands do this anyway
rainman74 said: Perfect! You don't need to remove your Google account as the commands do this anyway Click to expand... Click to collapse Quick update. After a bit more testing, turns out that there were still a few things that needed clearing, particularly on different versions of Android (7.1). Also, I've noticed that a GSF ID can be generated before you get a chance to capture an image if you leave Wi-Fi enabled, so I've included that in the script. I've ended up with a .BAT file with the following: Code: echo on adb shell settings delete secure android_id adb shell settings delete secure advertising_id adb shell settings delete secure bluetooth_address adb shell su -c mount -o remount,rw /system adb shell su -c svc wifi disable adb shell su -c rm /data/system/users/0/accounts.db adb shell su -c rm /data/system/users/0/accounts.db-journal adb shell su -c rm /data/system/users/0/photo.png adb shell su -c rm /data/system/users/0/settings_ssaid.xml adb shell su -c rm /data/system/sync/accounts.xml adb shell su -c rm /data/system/sync/pending.xml adb shell su -c rm /data/system/sync/stats.bin adb shell su -c rm /data/system/sync/status.bin adb shell su -c pm clear com.google.android.ext.services adb shell su -c pm clear com.google.android.ext.shared adb shell su -c pm clear com.google.android.gsf.login adb shell su -c pm clear com.google.android.onetimeinitializer adb shell su -c pm clear com.android.packageinstaller adb shell su -c pm clear com.android.providers.downloads adb shell su -c pm clear com.android.vending adb shell su -c pm clear com.google.android.backuptransport adb shell su -c pm clear com.google.android.gms adb shell su -c pm clear com.google.android.instantapps.supervisor adb shell su -c pm clear com.google.android.gsf adb shell su -c mount -o remount,ro /system I have found that this works consistently across both LineageOS 14.1 and LineageOS 15.1 devices.
stephendt0 said: OMG, I think that worked, thank you! I spent 5 hrs and stayed up to 3am trying to work this out with no luck, and this did the trick. To make things easier however, I morphed these commands into a dirty "one-liner" that saves entering each command. Code: adb shell settings delete secure android_id && adb shell settings delete secure advertising_id && adb shell settings delete secure bluetooth_address && adb shell settings put secure bluetooth_name 'Redmi Note 4' && adb shell settings put global device_name 'Redmi Note 4' && adb shell settings put global wifi_p2p_device_name 'Redmi Note 4' && adb shell su -c mount -o remount,rw /system && adb shell su -c rm /data/system/users/0/accounts.db && adb shell su -c rm /data/system/users/0/accounts.db-journal && adb shell su -c rm /data/system/users/0/photo.png && adb shell su -c rm /data/system/sync/accounts.xml && adb shell su -c rm /data/system/sync/pending.xml && adb shell su -c rm /data/system/sync/stats.bin && adb shell su -c rm /data/system/sync/status.bin && adb shell su -c pm clear com.android.packageinstaller && adb shell su -c pm clear com.android.providers.downloads && adb shell su -c pm clear com.android.vending && adb shell su -c pm clear com.google.android.backuptransport && adb shell su -c pm clear com.google.android.gms && adb shell su -c pm clear com.google.android.gsf && adb shell su -c mount -o remount,ro /system I'm sure there is a more efficient way of stacking commands, but this worked. Replace "Redmi Note 4" with your actual device and reboot. I cleared data for any messaging apps and removed my Google account before I began, however. Click to expand... Click to collapse YES, this did it. I cloned a kindle fire hdx using TWRP backup&restore and had to perform the action mentioned above in order to use both devices independetly. ATTENTION! Remember to change the values listed in stephendt0's example that were not part of the original code from rainman74: - device_name: Equals the device type. E.g. adb shell settings put global device_name 'KFHDX' - bluetooth_name: Hostname of the device seen in bluetooth. - wifi_p2p_device_name: Hostname used for a p2p wifi network aka "ad hoc network". Not supported on all devices.