Stuck on Beelink Logo... GS1 2GB 16GB - Android Stick & Console AllWinner based Computers

Stuck on Beelink initial boot logo. Just bought it... damn thing.
Went to Beelink forums, downloaded the firmware for it, and used Pheonix USBPRO to flash it (did what instructions said.
Everything seemed to flash fine... but hot damn, same problem! Stuck on Beelink logo.
I tried holding power button to get into Recovery, but it wont go there. I don't think it has a bootloader to be honest... but I can't get into fastboot so I'm just stuck
Here is the log file when I flashed... anyone have any ideas?
00000001 10:40:41 PM [1252] Img_OpenItem now!
00000002 10:40:41 PM [1252] Img_OpenItem[PXTOOLSB][xxxxxxxxxxxxxxxx]
00000003 10:40:41 PM [1252] Closing image now!
00000004 10:40:41 PM [1252] CloseImage OK
00000005 10:40:41 PM [1252] **************************************
00000006 10:40:41 PM [1252] *********global_info_entry***********
00000007 10:40:41 PM [1252] **************************************
00000008 10:40:41 PM [1252] Load "privatedata.ini" Failed: .\ProProcMan.cpp @ 2107
00000009 10:40:57 PM [1252] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000010 10:40:57 PM [1252] DevicePlugOut: \\?\USB#VID_1F3A&PID_EFE8#5&17bd6111&0&1#{0e57c50f-0ccc-4ad2-a895-93c5ed119860}
00000011 10:40:57 PM [1252] Find USB Index:-1----------
00000012 10:41:11 PM [1252] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000013 10:41:11 PM [1252] DevicePlugIn: \\?\USB#VID_1F3A&PID_EFE8#5&17bd6111&0&1#{0e57c50f-0ccc-4ad2-a895-93c5ed119860},BOOL to AWUSB:1
00000014 10:41:11 PM [1252] ***************************************
00000015 10:41:11 PM [1252] ********ToolEntry_fel************
00000016 10:41:11 PM [1252] ***************************************
00000017 10:41:11 PM [1252] PANIC :do not enter fel choose mode
00000018 10:41:11 PM [1252] Img_OpenItem now!
00000019 10:41:11 PM [1252] Img_OpenItem[FES ][FES_1-0000000000]
00000020 10:41:11 PM [1252] down file length = 4340.
00000021 10:41:11 PM [1252] magic eGON.BT059’^@C, it is fes1
00000022 10:41:11 PM [1252] down and run fes1 at addr 0x28000
00000023 10:41:11 PM [1252] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000024 10:41:11 PM [1252] Clear dram log OK.
00000025 10:41:11 PM [1252] DOWN FES1_dram OK
00000026 10:41:12 PM [1252] dram paras[0]: 0x2e8
00000027 10:41:12 PM [1252] dram paras[1]: 0x7
00000028 10:41:12 PM [1252] dram paras[2]: 0x3b3bfb
00000029 10:41:12 PM [1252] dram paras[3]: 0x31
00000030 10:41:12 PM [1252] dram paras[4]: 0x30fa
00000031 10:41:12 PM [1252] dram paras[5]: 0x8001000
00000032 10:41:12 PM [1252] dram paras[6]: 0x0
00000033 10:41:12 PM [1252] dram paras[7]: 0x43
00000034 10:41:12 PM [1252] dram paras[8]: 0x1a
00000035 10:41:12 PM [1252] dram paras[9]: 0x1
00000036 10:41:12 PM [1252] dram paras[10]: 0x0
00000037 10:41:12 PM [1252] dram paras[11]: 0x400
00000038 10:41:12 PM [1252] dram paras[12]: 0x848
00000039 10:41:12 PM [1252] dram paras[13]: 0x1249a25b
00000040 10:41:12 PM [1252] dram paras[14]: 0x11b1b1d0
00000041 10:41:12 PM [1252] dram paras[15]: 0x84f02d
00000042 10:41:12 PM [1252] dram paras[16]: 0x78787896
00000043 10:41:12 PM [1252] dram paras[17]: 0x0
00000044 10:41:12 PM [1252] dram paras[18]: 0x0
00000045 10:41:12 PM [1252] dram paras[19]: 0x9090900
00000046 10:41:12 PM [1252] dram paras[20]: 0x4d462a3e
00000047 10:41:12 PM [1252] dram paras[21]: 0x0
00000048 10:41:12 PM [1252] dram paras[22]: 0x0
00000049 10:41:12 PM [1252] dram paras[23]: 0xa0
00000050 10:41:12 PM [1252] dram paras[24]: 0x200000
00000051 10:41:12 PM [1252] dram paras[25]: 0x2222
00000052 10:41:12 PM [1252] dram paras[26]: 0x6003
00000053 10:41:12 PM [1252] dram paras[27]: 0x0
00000054 10:41:12 PM [1252] dram paras[28]: 0x0
00000055 10:41:12 PM [1252] dram paras[29]: 0x0
00000056 10:41:12 PM [1252] dram paras[30]: 0x0
00000057 10:41:12 PM [1252] dram paras[31]: 0x0
00000058 10:41:12 PM [1252] RUN fes1 OK.
00000059 10:41:12 PM [1252] INFO: try to down and run fes2
00000060 10:41:12 PM [1252] Img_OpenItem now!
00000061 10:41:12 PM [1252] Img_OpenItem[12345678][UBOOT_0000000000]
00000062 10:41:12 PM [1252] fes2 size 0x138000
00000063 10:41:12 PM [1252] uboot down and run addr 0x4a000000
00000064 10:41:12 PM [1252] dtb_syscfg_base 0x4a200000
00000065 10:41:16 PM [1252] INFO: try to down dtb at 0x4a200000
00000066 10:41:16 PM [1252] Img_OpenItem now!
00000067 10:41:16 PM [1252] Img_OpenItem[COMMON ][DTB_CONFIG000000]
00000068 10:41:16 PM [1252] down_dtb_syscfg size 0x18c00
00000069 10:41:16 PM [1252] INFO: try to down soc cfg at 0x4a300000
00000070 10:41:16 PM [1252] Img_OpenItem now!
00000071 10:41:16 PM [1252] Img_OpenItem[COMMON ][SYS_CONFIG_BIN00]
00000072 10:41:16 PM [1252] down_dtb_syscfg size 0xd000
00000073 10:41:17 PM [1252] INFO: try to down board cfg at 0x4a380000
00000074 10:41:17 PM [1252] Img_OpenItem now!
00000075 10:41:17 PM [1252] Img_OpenItem[COMMON ][BOARD_CONFIG_BIN]
00000076 10:41:17 PM [1252] down_dtb_syscfg size 0x400
00000077 10:41:17 PM [1252] INFO: down dtb syscfg OK
00000078 10:41:17 PM [1252] INFO: down fes2 ok
00000079 10:41:17 PM [1252] INFO: run fes2 ok
00000080 10:41:17 PM [1252] Closing image now!
00000081 10:41:17 PM [1252] CloseImage OK
00000082 10:41:31 PM [1252] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000083 10:41:31 PM [1252] DevicePlugOut: \\?\USB#VID_1F3A&PID_EFE8#5&17bd6111&0&1#{0e57c50f-0ccc-4ad2-a895-93c5ed119860}
00000084 10:41:31 PM [1252] Find USB Index:-1----------
00000085 10:41:34 PM [1252] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000086 10:41:34 PM [1252] DevicePlugIn: \\?\USB#VID_1F3A&PID_EFE8#5&1aa2fb8f&0&3#{0e57c50f-0ccc-4ad2-a895-93c5ed119860},BOOL to AWUSB:1
00000087 10:41:34 PM [1252] Find USB Index:0----------
00000088 10:41:34 PM [1252] find,USB Record Size=1, this usb.num=1
00000089 10:41:34 PM [1252] SetFesPrivateData 1510
00000090 10:41:34 PM [1252] ################### OnFesIn
00000091 10:41:34 PM [1252] priv_info = 0x28b2ba8
00000092 10:41:34 PM [1252] Tools get size of image C:\Users\Win7Service\Downloads\update_gs1_rv106N0.img
00000093 10:41:34 PM [1252] ^^Locale string of English_United States.437 is supported.
00000094 10:41:34 PM [1252] File Size High is 0X0Bytes, Low is 0X31859000Bytes.
00000095 10:41:34 PM [1252] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000096 10:41:34 PM [1252] ID=1, fes_thread() : get download map
00000097 10:41:34 PM [1252] fes_thread, get download map
00000098 10:41:34 PM [1252] Img_OpenItem now!
00000099 10:41:34 PM [1252] Img_OpenItem[12345678][1234567890DLINFO]
00000100 10:41:34 PM [1252] *************DOWNLOAD MAP DUMP************
00000101 10:41:34 PM [1252] total download part 7
00000102 10:41:34 PM [1252]
00000103 10:41:34 PM [1252] download part[0] name :bootloader
00000104 10:41:34 PM [1252] download part[0] download file:BOOTLOADER_FEX00
00000105 10:41:34 PM [1252] download part[0] verify file :VBOOTLOADER_FEX0
00000106 10:41:34 PM [1252] download part[0] lenlo :0x8000
00000107 10:41:34 PM [1252] download part[0] addrlo :0x8000
00000108 10:41:34 PM [1252] download part[0] encrypt :0
00000109 10:41:34 PM [1252] download part[0] verify :1
00000110 10:41:34 PM [1252]
00000111 10:41:34 PM [1252] download part[1] name :env
00000112 10:41:34 PM [1252] download part[1] download file:ENV_FEX000000000
00000113 10:41:34 PM [1252] download part[1] verify file :VENV_FEX00000000
00000114 10:41:34 PM [1252] download part[1] lenlo :0x8000
00000115 10:41:34 PM [1252] download part[1] addrlo :0x10000
00000116 10:41:34 PM [1252] download part[1] encrypt :0
00000117 10:41:34 PM [1252] download part[1] verify :1
00000118 10:41:34 PM [1252]
00000119 10:41:34 PM [1252] download part[2] name :boot
00000120 10:41:34 PM [1252] download part[2] download file:BOOT_FEX00000000
00000121 10:41:34 PM [1252] download part[2] verify file :VBOOT_FEX0000000
00000122 10:41:34 PM [1252] download part[2] lenlo :0x10000
00000123 10:41:34 PM [1252] download part[2] addrlo :0x18000
00000124 10:41:34 PM [1252] download part[2] encrypt :0
00000125 10:41:34 PM [1252] download part[2] verify :1
00000126 10:41:34 PM [1252]
00000127 10:41:34 PM [1252] download part[3] name :system
00000128 10:41:34 PM [1252] download part[3] download file:SYSTEM_FEX000000
00000129 10:41:34 PM [1252] download part[3] verify file :VSYSTEM_FEX00000
00000130 10:41:34 PM [1252] download part[3] lenlo :0x300000
00000131 10:41:34 PM [1252] download part[3] addrlo :0x28000
00000132 10:41:34 PM [1252] download part[3] encrypt :0
00000133 10:41:34 PM [1252] download part[3] verify :1
00000134 10:41:34 PM [1252]
00000135 10:41:34 PM [1252] download part[4] name :verity_block
00000136 10:41:34 PM [1252] download part[4] download file:VERITY_BLOCK_FEX
00000137 10:41:34 PM [1252] download part[4] verify file :VVERITY_BLOCK_FE
00000138 10:41:34 PM [1252] download part[4] lenlo :0x8000
00000139 10:41:34 PM [1252] download part[4] addrlo :0x328000
00000140 10:41:34 PM [1252] download part[4] encrypt :0
00000141 10:41:34 PM [1252] download part[4] verify :1
00000142 10:41:34 PM [1252]
00000143 10:41:34 PM [1252] download part[5] name :recovery
00000144 10:41:34 PM [1252] download part[5] download file:RECOVERY_FEX0000
00000145 10:41:34 PM [1252] download part[5] verify file :VRECOVERY_FEX000
00000146 10:41:34 PM [1252] download part[5] lenlo :0x10000
00000147 10:41:34 PM [1252] download part[5] addrlo :0x338000
00000148 10:41:34 PM [1252] download part[5] encrypt :0
00000149 10:41:34 PM [1252] download part[5] verify :1
00000150 10:41:34 PM [1252]
00000151 10:41:34 PM [1252] download part[6] name :UDISK
00000152 10:41:34 PM [1252] download part[6] download fileISKFS_FEX000000
00000153 10:41:34 PM [1252] download part[6] verify file :
00000154 10:41:34 PM [1252] download part[6] lenlo :0x0
00000155 10:41:34 PM [1252] download part[6] addrlo :0x510000
00000156 10:41:34 PM [1252] download part[6] encrypt :0
00000157 10:41:34 PM [1252] download part[6] verify :0
00000158 10:41:34 PM [1252]
00000159 10:41:34 PM [1252] ID=1, fes_thread() : --167--
00000160 10:41:34 PM [1252] Img_OpenItem now!
00000161 10:41:34 PM [1252] Img_OpenItem[12345678][1234567890___MBR]
00000162 10:41:34 PM [1252] *************MBR DUMP***************
00000163 10:41:34 PM [1252] total mbr part 14
00000164 10:41:34 PM [1252]
00000165 10:41:34 PM [1252] part[0] name :bootloader
00000166 10:41:34 PM [1252] part[0] classname ISK
00000167 10:41:34 PM [1252] part[0] addrlo :0x8000
00000168 10:41:34 PM [1252] part[0] lenlo :0x8000
00000169 10:41:34 PM [1252] part[0] user_type :32768
00000170 10:41:34 PM [1252] part[0] keydata :0
00000171 10:41:34 PM [1252] part[0] ro :0
00000172 10:41:34 PM [1252]
00000173 10:41:34 PM [1252] part[1] name :env
00000174 10:41:34 PM [1252] part[1] classname ISK
00000175 10:41:34 PM [1252] part[1] addrlo :0x10000
00000176 10:41:34 PM [1252] part[1] lenlo :0x8000
00000177 10:41:34 PM [1252] part[1] user_type :32768
00000178 10:41:34 PM [1252] part[1] keydata :0
00000179 10:41:34 PM [1252] part[1] ro :0
00000180 10:41:34 PM [1252]
00000181 10:41:34 PM [1252] part[2] name :boot
00000182 10:41:34 PM [1252] part[2] classname ISK
00000183 10:41:34 PM [1252] part[2] addrlo :0x18000
00000184 10:41:34 PM [1252] part[2] lenlo :0x10000
00000185 10:41:34 PM [1252] part[2] user_type :32768
00000186 10:41:34 PM [1252] part[2] keydata :0
00000187 10:41:34 PM [1252] part[2] ro :0
00000188 10:41:34 PM [1252]
00000189 10:41:34 PM [1252] part[3] name :system
00000190 10:41:34 PM [1252] part[3] classname ISK
00000191 10:41:34 PM [1252] part[3] addrlo :0x28000
00000192 10:41:34 PM [1252] part[3] lenlo :0x300000
00000193 10:41:34 PM [1252] part[3] user_type :32768
00000194 10:41:34 PM [1252] part[3] keydata :0
00000195 10:41:34 PM [1252] part[3] ro :0
00000196 10:41:34 PM [1252]
00000197 10:41:34 PM [1252] part[4] name :verity_block
00000198 10:41:34 PM [1252] part[4] classname ISK
00000199 10:41:34 PM [1252] part[4] addrlo :0x328000
00000200 10:41:34 PM [1252] part[4] lenlo :0x8000
00000201 10:41:34 PM [1252] part[4] user_type :32768
00000202 10:41:34 PM [1252] part[4] keydata :0
00000203 10:41:34 PM [1252] part[4] ro :0
00000204 10:41:34 PM [1252]
00000205 10:41:34 PM [1252] part[5] name :misc
00000206 10:41:34 PM [1252] part[5] classname ISK
00000207 10:41:34 PM [1252] part[5] addrlo :0x330000
00000208 10:41:34 PM [1252] part[5] lenlo :0x8000
00000209 10:41:34 PM [1252] part[5] user_type :32768
00000210 10:41:34 PM [1252] part[5] keydata :0
00000211 10:41:34 PM [1252] part[5] ro :0
00000212 10:41:34 PM [1252]
00000213 10:41:34 PM [1252] part[6] name :recovery
00000214 10:41:34 PM [1252] part[6] classname ISK
00000215 10:41:34 PM [1252] part[6] addrlo :0x338000
00000216 10:41:34 PM [1252] part[6] lenlo :0x10000
00000217 10:41:34 PM [1252] part[6] user_type :32768
00000218 10:41:34 PM [1252] part[6] keydata :0
00000219 10:41:34 PM [1252] part[6] ro :0
00000220 10:41:34 PM [1252]
00000221 10:41:34 PM [1252] part[7] name rivate
00000222 10:41:34 PM [1252] part[7] classname ISK
00000223 10:41:34 PM [1252] part[7] addrlo :0x348000
00000224 10:41:34 PM [1252] part[7] lenlo :0x8000
00000225 10:41:34 PM [1252] part[7] user_type :32768
00000226 10:41:34 PM [1252] part[7] keydata :32768
00000227 10:41:34 PM [1252] part[7] ro :0
00000228 10:41:34 PM [1252]
00000229 10:41:34 PM [1252] part[8] name :alog
00000230 10:41:34 PM [1252] part[8] classname ISK
00000231 10:41:34 PM [1252] part[8] addrlo :0x350000
00000232 10:41:34 PM [1252] part[8] lenlo :0x20000
00000233 10:41:34 PM [1252] part[8] user_type :32768
00000234 10:41:34 PM [1252] part[8] keydata :0
00000235 10:41:34 PM [1252] part[8] ro :0
00000236 10:41:34 PM [1252]
00000237 10:41:34 PM [1252] part[9] name :Reserve0
00000238 10:41:34 PM [1252] part[9] classname ISK
00000239 10:41:34 PM [1252] part[9] addrlo :0x370000
00000240 10:41:34 PM [1252] part[9] lenlo :0x8000
00000241 10:41:34 PM [1252] part[9] user_type :32768
00000242 10:41:34 PM [1252] part[9] keydata :0
00000243 10:41:34 PM [1252] part[9] ro :0
00000244 10:41:34 PM [1252]
00000245 10:41:34 PM [1252] part[10] name :Reserve1
00000246 10:41:34 PM [1252] part[10] classname ISK
00000247 10:41:34 PM [1252] part[10] addrlo :0x378000
00000248 10:41:34 PM [1252] part[10] lenlo :0x10000
00000249 10:41:34 PM [1252] part[10] user_type :49408
00000250 10:41:34 PM [1252] part[10] keydata :0
00000251 10:41:34 PM [1252] part[10] ro :0
00000252 10:41:34 PM [1252]
00000253 10:41:34 PM [1252] part[11] name :Reserve2
00000254 10:41:34 PM [1252] part[11] classname ISK
00000255 10:41:34 PM [1252] part[11] addrlo :0x388000
00000256 10:41:34 PM [1252] part[11] lenlo :0x8000
00000257 10:41:34 PM [1252] part[11] user_type :49408
00000258 10:41:34 PM [1252] part[11] keydata :0
00000259 10:41:34 PM [1252] part[11] ro :0
00000260 10:41:34 PM [1252]
00000261 10:41:34 PM [1252] part[12] name :cache
00000262 10:41:34 PM [1252] part[12] classname ISK
00000263 10:41:34 PM [1252] part[12] addrlo :0x390000
00000264 10:41:34 PM [1252] part[12] lenlo :0x180000
00000265 10:41:34 PM [1252] part[12] user_type :49408
00000266 10:41:34 PM [1252] part[12] keydata :0
00000267 10:41:34 PM [1252] part[12] ro :0
00000268 10:41:34 PM [1252]
00000269 10:41:34 PM [1252] part[13] name :UDISK
00000270 10:41:34 PM [1252] part[13] classname ISK
00000271 10:41:34 PM [1252] part[13] addrlo :0x510000
00000272 10:41:34 PM [1252] part[13] lenlo :0x0
00000273 10:41:34 PM [1252] part[13] user_type :49664
00000274 10:41:34 PM [1252] part[13] keydata :0
00000275 10:41:34 PM [1252] part[13] ro :0
00000276 10:41:34 PM [1252]
00000277 10:41:37 PM [1252] fes_check_crc.media_crc=0
00000278 10:41:37 PM [1252] ID=1, fes_thread() : --163--
00000279 10:41:37 PM [1252] download image
00000280 10:41:37 PM [1252] Img_OpenItem now!
00000281 10:41:37 PM [1252] Img_OpenItem[RFSFAT16][BOOTLOADER_FEX00VBOOTLOADER_FEX0]
00000282 10:41:37 PM [1252] id[1]art_name = bootloader, packet_len_high = 0x0, packet_len_low = 0x74A400, pkt_name = BOOTLOADER_FEX00VBOOTLOADER_FEX0, verify_file = VBOOTLOADER_FEX0, encrypt = 1
00000283 10:41:37 PM [1252] sparse: bad magic, it is NOT a sparse format part
00000284 10:41:37 PM [1252] part bootloader need verify
00000285 10:41:37 PM [1252] Img_OpenItem now!
00000286 10:41:37 PM [1252] Img_OpenItem[RFSFAT16][VBOOTLOADER_FEX0]
00000287 10:41:37 PM [1252] the verify value of part bootloader is 0x4663288
00000288 10:41:37 PM [1252] id[1]: down pkt_name(BOOTLOADER_FEX00VBOOTLOADER_FEX0) to part(bootloader) successful
00000289 10:41:37 PM [1252] +++++++++++ down part: BOOTLOADER_FEX00VBOOTLOADER_FEX0 bootloader,used time 0s
00000290 10:41:37 PM [1252] download_firmware: bootloader 21
00000291 10:41:37 PM [1252]
00000292 10:41:37 PM [1252] Img_OpenItem now!
00000293 10:41:37 PM [1252] Img_OpenItem[RFSFAT16][ENV_FEX000000000VENV_FEX00000000]
00000294 10:41:37 PM [1252] id[1]art_name = env, packet_len_high = 0x0, packet_len_low = 0x20000, pkt_name = ENV_FEX000000000VENV_FEX00000000, verify_file = VENV_FEX00000000, encrypt = 1
00000295 10:41:37 PM [1252] sparse: bad magic, it is NOT a sparse format part
00000296 10:41:37 PM [1252] part env need verify
00000297 10:41:37 PM [1252] Img_OpenItem now!
00000298 10:41:37 PM [1252] Img_OpenItem[RFSFAT16][VENV_FEX00000000]
00000299 10:41:37 PM [1252] the verify value of part env is 0xe0ebb087
00000300 10:41:37 PM [1252] id[1]: down pkt_name(ENV_FEX000000000VENV_FEX00000000) to part(env) successful
00000301 10:41:37 PM [1252] +++++++++++ down part: ENV_FEX000000000VENV_FEX00000000 env,used time 0s
00000302 10:41:37 PM [1252] download_firmware: env 32
00000303 10:41:37 PM [1252]
00000304 10:41:37 PM [1252] Img_OpenItem now!
00000305 10:41:37 PM [1252] Img_OpenItem[RFSFAT16][BOOT_FEX00000000VBOOT_FEX0000000]
00000306 10:41:37 PM [1252] id[1]art_name = boot, packet_len_high = 0x0, packet_len_low = 0x10AB800, pkt_name = BOOT_FEX00000000VBOOT_FEX0000000, verify_file = VBOOT_FEX0000000, encrypt = 1
00000307 10:41:38 PM [1252] sparse: bad magic, it is NOT a sparse format part
00000308 10:41:39 PM [1252] part boot need verify
00000309 10:41:39 PM [1252] Img_OpenItem now!
00000310 10:41:39 PM [1252] Img_OpenItem[RFSFAT16][VBOOT_FEX0000000]
00000311 10:41:39 PM [1252] the verify value of part boot is 0x596291ce
00000312 10:41:39 PM [1252] id[1]: down pkt_name(BOOT_FEX00000000VBOOT_FEX0000000) to part(boot) successful
00000313 10:41:39 PM [1252] +++++++++++ down part: BOOT_FEX00000000VBOOT_FEX0000000 boot,used time 1s
00000314 10:41:39 PM [1252] download_firmware: boot 43
00000315 10:41:39 PM [1252]
00000316 10:41:39 PM [1252] Img_OpenItem now!
00000317 10:41:39 PM [1252] Img_OpenItem[RFSFAT16][SYSTEM_FEX000000VSYSTEM_FEX00000]
00000318 10:41:39 PM [1252] id[1]art_name = system, packet_len_high = 0x0, packet_len_low = 0x2E854194, pkt_name = SYSTEM_FEX000000VSYSTEM_FEX00000, verify_file = VSYSTEM_FEX00000, encrypt = 1
00000319 10:41:39 PM [1252] this IS a sparse format part
00000320 10:42:30 PM [1252] id[1]: down pkt_name(SYSTEM_FEX000000VSYSTEM_FEX00000) to part(system) successful
00000321 10:42:30 PM [1252] +++++++++++ down part: SYSTEM_FEX000000VSYSTEM_FEX00000 system,used time 50s
00000322 10:42:30 PM [1252] download_firmware: system 54
00000323 10:42:30 PM [1252]
00000324 10:42:30 PM [1252] Img_OpenItem now!
00000325 10:42:30 PM [1252] Img_OpenItem[RFSFAT16][VERITY_BLOCK_FEXVVERITY_BLOCK_FE]
00000326 10:42:30 PM [1252] id[1]art_name = verity_block, packet_len_high = 0x0, packet_len_low = 0x10C654, pkt_name = VERITY_BLOCK_FEXVVERITY_BLOCK_FE, verify_file = VVERITY_BLOCK_FE, encrypt = 1
00000327 10:42:30 PM [1252] sparse: bad magic, it is NOT a sparse format part
00000328 10:42:30 PM [1252] part verity_block need verify
00000329 10:42:30 PM [1252] Img_OpenItem now!
00000330 10:42:30 PM [1252] Img_OpenItem[RFSFAT16][VVERITY_BLOCK_FE]
00000331 10:42:30 PM [1252] the verify value of part verity_block is 0x2ba04f3b
00000332 10:42:30 PM [1252] id[1]: down pkt_name(VERITY_BLOCK_FEXVVERITY_BLOCK_FE) to part(verity_block) successful
00000333 10:42:30 PM [1252] +++++++++++ down part: VERITY_BLOCK_FEXVVERITY_BLOCK_FE verity_block,used time 0s
00000334 10:42:30 PM [1252] download_firmware: verity_block 65
00000335 10:42:30 PM [1252]
00000336 10:42:30 PM [1252] Img_OpenItem now!
00000337 10:42:30 PM [1252] Img_OpenItem[RFSFAT16][RECOVERY_FEX0000VRECOVERY_FEX000]
00000338 10:42:30 PM [1252] id[1]art_name = recovery, packet_len_high = 0x0, packet_len_low = 0x130B800, pkt_name = RECOVERY_FEX0000VRECOVERY_FEX000, verify_file = VRECOVERY_FEX000, encrypt = 1
00000339 10:42:30 PM [1252] sparse: bad magic, it is NOT a sparse format part
00000340 10:42:31 PM [1252] part recovery need verify
00000341 10:42:31 PM [1252] Img_OpenItem now!
00000342 10:42:31 PM [1252] Img_OpenItem[RFSFAT16][VRECOVERY_FEX000]
00000343 10:42:31 PM [1252] the verify value of part recovery is 0x6a0608de
00000344 10:42:31 PM [1252] id[1]: down pkt_name(RECOVERY_FEX0000VRECOVERY_FEX000) to part(recovery) successful
00000345 10:42:31 PM [1252] +++++++++++ down part: RECOVERY_FEX0000VRECOVERY_FEX000 recovery,used time 1s
00000346 10:42:31 PM [1252] download_firmware: recovery 76
00000347 10:42:31 PM [1252]
00000348 10:42:31 PM [1252] Img_OpenItem now!
00000349 10:42:31 PM [1252] Img_OpenItem[RFSFAT16][DISKFS_FEX000000]
00000350 10:42:31 PM [1252] the data length of udisk is too small, ignore it
00000351 10:42:31 PM [1252] do NOT need download_udisk
00000352 10:42:31 PM [1252] download_firmware: UDISK 87
00000353 10:42:31 PM [1252]
00000354 10:42:31 PM [1252] ID=1, fes_thread() : --161--
00000355 10:42:31 PM [1252] secure_type=4
00000356 10:42:31 PM [1252] Img_OpenItem now!
00000357 10:42:31 PM [1252] Img_OpenItem[12345678][BOOTPKG-00000000]
00000358 10:42:31 PM [1252] fes_check_crc.media_crc=0
00000359 10:42:31 PM [1252] ID=1, fes_thread() : --160--
00000360 10:42:31 PM [1252] secure_type=4
00000361 10:42:31 PM [1252] Img_OpenItem now!
00000362 10:42:31 PM [1252] Img_OpenItem[12345678][1234567890BOOT_0]
00000363 10:42:31 PM [1252] fes_check_crc.media_crc=0
00000364 10:42:31 PM [1252] trans tool type
00000365 10:42:31 PM [1252] set next work 0x4
00000366 10:42:31 PM [1252] Closing image now!
00000367 10:42:31 PM [1252] CloseImage OK
00000368 10:42:31 PM [1252]
00000369 10:42:31 PM [1252] INFO: ID=1, update successful
00000370 10:42:31 PM [1252]
00000371 10:42:31 PM [1252] GetDevTimeStamp(1) nCnt = 1
00000372 10:42:31 PM [1252] MSG Callback Code: 0x40
00000373 10:42:31 PM [1252] free param...
00000374 10:48:33 PM [1252] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000375 10:48:33 PM [1252] DevicePlugOut: \\?\USB#VID_1F3A&PID_EFE8#5&1aa2fb8f&0&3#{0e57c50f-0ccc-4ad2-a895-93c5ed119860}
00000376 10:48:33 PM [1252] Find USB Index:0----------

Related

Error in android porting(booting) to NAND for allwinner A13

Hi,
I have allwinner A13 board. I am trying to boot that with NAND using PhonixUSBPro v4.0 from allwinner but after 26% it gives errors like:
00000319 11:17:06 AM [4840] ID=1, fes_thread() : --163--
00000320 11:17:06 AM [4840] Img_OpenItem now!
00000321 11:17:06 AM [4840] Img_OpenItem[RFSFAT16][BOOTLOADER_00000]
00000322 11:17:06 AM [4840] id[1]art_name = bootloader, packet_len_high = 0x0, packet_len_low = 0x529400, pkt_name = BOOTLOADER_00000, verify_file = VBOOTLOADER_0000, encrypt = 0
00000323 11:17:06 AM [4840] Img_OpenItem now!
00000324 11:17:06 AM [4840] Img_OpenItem[FET ][MAGIC_CRC_START_]
00000325 11:17:06 AM [4840] [fes]: id =1, download_packet ooc Open
00000326 11:17:09 AM [4840] [fes]: id = 1, download_packet ooc close
00000327 11:17:09 AM [4840] Img_OpenItem now!
00000328 11:17:09 AM [4840] Img_OpenItem[FET ][MAGIC_CRC_EN_000]
00000329 11:17:09 AM [4840] Img_OpenItem now!
00000330 11:17:09 AM [4840] Img_OpenItem[RFSFAT16][VBOOTLOADER_0000]
00000331 11:17:10 AM [4840] INFO: ID = 1, pc_crc = 0xbc1881b0, fex_crc = 0x0, nand_crc = 0xbc1881b8
00000332 11:17:10 AM [4840] ERR : check_crc32_form_efex, pc_crc != nand_crc
00000333 11:17:10 AM [4840] err: download_packet, check_crc32_form_efex failed
00000334 11:17:10 AM [4840] ERR: step_download_firmware, download_packet failed
00000335 11:17:10 AM [4840] ERR : ID=1, fes_thread() : step 163 ,fail
00000336 11:17:10 AM [4840]
00000337 11:17:10 AM [4840] INFO: ID=1, update failed
00000338 11:17:10 AM [4840]
00000339 11:17:10 AM [4840] Closing image now!
00000340 11:17:10 AM [4840] CloseImage OK
00000341 11:17:10 AM [4840] MSG Callback Code: 0x20
00000342 11:17:10 AM [4840] free param...
Can anyone tell reasons of these errors and how to resolve that.
Full booting debug view:
00000001 11:16:44 AM [4840] Img_OpenItem now!
00000002 11:16:44 AM [4840] Img_OpenItem[PXTOOLS ][xxxxxxxxxxxxxxxx]
00000003 11:16:44 AM [4840] Closing image now!
00000004 11:16:44 AM [4840] CloseImage OK
00000005 11:16:44 AM [4840] Img_OpenItem now!
00000006 11:16:44 AM [4840] Img_OpenItem[COMMON ][SYS_CONFIG000000]
00000007 11:16:44 AM [4840] Img_OpenItem now!
00000008 11:16:44 AM [4840] Img_OpenItem[COMMON ][SYS_CONFIG100000]
00000009 11:16:44 AM [4840] =============sys_config===<2012-2-23 19:07:43>=======
00000010 11:16:44 AM [4840] dram->reallen = 0x0
00000011 11:16:44 AM [4840] -------sys_config------
00000012 11:16:44 AM [4840] sys_config_t_size = 0x1598
00000013 11:16:44 AM [4840] version = 0x100
00000014 11:16:44 AM [4840] magic = 20090319
00000015 11:16:44 AM [4840]
00000016 11:16:44 AM [4840] magic = SYS_PARA
00000017 11:16:44 AM [4840] ver = 256
00000018 11:16:44 AM [4840] enable_erase_nand = 0
00000019 11:16:44 AM [4840] enable_jtag = 1
00000020 11:16:44 AM [4840] ----------------epos_para-------------
00000021 11:16:44 AM [4840] chip =33554432
00000022 11:16:44 AM [4840] pid =33554432
00000023 11:16:44 AM [4840] sid =33554688
00000024 11:16:44 AM [4840] bid =128
00000025 11:16:44 AM [4840] target.debugenable =0
00000026 11:16:44 AM [4840] target.burnClk =720
00000027 11:16:44 AM [4840]
00000028 11:16:44 AM [4840] ---------dram_para-----------
00000029 11:16:44 AM [4840] dram_baseaddr = 0x40000000
00000030 11:16:44 AM [4840] dram_clk = 384
00000031 11:16:44 AM [4840] dram_type = 3
00000032 11:16:44 AM [4840] dram_rank_num = 1
00000033 11:16:44 AM [4840] dram_chip_density = 2048
00000034 11:16:44 AM [4840] dram_io_width = 8
00000035 11:16:44 AM [4840] dram_bus_width = 16
00000036 11:16:44 AM [4840] dram_cas = 9
00000037 11:16:44 AM [4840] dram_zq = 0x7b
00000038 11:16:44 AM [4840] dram_odt_en = 0
00000039 11:16:44 AM [4840] dram_size = 512
00000040 11:16:44 AM [4840] dram_tpr0 = 0x42d899b7
00000041 11:16:44 AM [4840] dram_tpr1 = 0xa090
00000042 11:16:44 AM [4840] dram_tpr2 = 0x22a00
00000043 11:16:44 AM [4840] dram_tpr3 = 0x0
00000044 11:16:44 AM [4840] dram_tpr4 = 0x0
00000045 11:16:44 AM [4840] dram_tpr5 = 0x0
00000046 11:16:44 AM [4840] dram_emr1 = 0x0
00000047 11:16:44 AM [4840] dram_emr2 = 0x10
00000048 11:16:44 AM [4840] dram_emr3 = 0x0
00000049 11:16:44 AM [4840]
00000050 11:16:44 AM [4840] p1_para->Battery_cap = 0
00000051 11:16:44 AM [4840] p1_para->Discharge_current_rate = 0
00000052 11:16:44 AM [4840]
00000053 11:16:44 AM [4840]
00000054 11:16:44 AM [4840] ---------------boot_extend------------------
00000055 11:16:44 AM [4840] sys_config_para->vol_threshold = 0
00000056 11:16:44 AM [4840]
00000057 11:16:44 AM [4840]
00000058 11:16:44 AM [4840] ----------product_para---------
00000059 11:16:44 AM [4840] magic = (null)
00000060 11:16:44 AM [4840] ver = 0
00000061 11:16:44 AM [4840] size = 0
00000062 11:16:44 AM [4840] magic =
00000063 11:16:44 AM [4840] magic =
00000064 11:16:44 AM [4840]
00000065 11:16:44 AM [4840] ----------part_para---------
00000066 11:16:44 AM [4840] ///////////max part number is 14. , configured part is 8.
00000067 11:16:44 AM [4840] mbr_size = 1024
00000068 11:16:44 AM [4840] part_num = 8
00000069 11:16:44 AM [4840]
00000070 11:16:44 AM [4840] [part0]
00000071 11:16:44 AM [4840] lenhi = 0
00000072 11:16:44 AM [4840] lenlo = 16384
00000073 11:16:44 AM [4840] classname = DISK
00000074 11:16:44 AM [4840] name = bootloader
00000075 11:16:44 AM [4840] user_type = 0
00000076 11:16:44 AM [4840] ro = 0
00000077 11:16:44 AM [4840]
00000078 11:16:44 AM [4840] [part1]
00000079 11:16:44 AM [4840] lenhi = 0
00000080 11:16:44 AM [4840] lenlo = 2048
00000081 11:16:44 AM [4840] classname = DISK
00000082 11:16:44 AM [4840] name = env
00000083 11:16:44 AM [4840] user_type = 0
00000084 11:16:44 AM [4840] ro = 0
00000085 11:16:44 AM [4840]
00000086 11:16:44 AM [4840] [part2]
00000087 11:16:44 AM [4840] lenhi = 0
00000088 11:16:44 AM [4840] lenlo = 32768
00000089 11:16:44 AM [4840] classname = DISK
00000090 11:16:44 AM [4840] name = boot
00000091 11:16:44 AM [4840] user_type = 0
00000092 11:16:44 AM [4840] ro = 0
00000093 11:16:44 AM [4840]
00000094 11:16:44 AM [4840] [part3]
00000095 11:16:44 AM [4840] lenhi = 0
00000096 11:16:44 AM [4840] lenlo = 262144
00000097 11:16:44 AM [4840] classname = DISK
00000098 11:16:44 AM [4840] name = system
00000099 11:16:44 AM [4840] user_type = 2
00000100 11:16:44 AM [4840] ro = 0
00000101 11:16:44 AM [4840]
00000102 11:16:44 AM [4840] [part4]
00000103 11:16:44 AM [4840] lenhi = 0
00000104 11:16:44 AM [4840] lenlo = 524288
00000105 11:16:44 AM [4840] classname = DISK
00000106 11:16:44 AM [4840] name = data
00000107 11:16:44 AM [4840] user_type = 2
00000108 11:16:44 AM [4840] ro = 0
00000109 11:16:44 AM [4840]
00000110 11:16:44 AM [4840] [part5]
00000111 11:16:44 AM [4840] lenhi = 0
00000112 11:16:44 AM [4840] lenlo = 1024
00000113 11:16:44 AM [4840] classname = DISK
00000114 11:16:44 AM [4840] name = misc
00000115 11:16:44 AM [4840] user_type = 2
00000116 11:16:44 AM [4840] ro = 0
00000117 11:16:44 AM [4840]
00000118 11:16:44 AM [4840] [part6]
00000119 11:16:44 AM [4840] lenhi = 0
00000120 11:16:44 AM [4840] lenlo = 32768
00000121 11:16:44 AM [4840] classname = DISK
00000122 11:16:44 AM [4840] name = recovery
00000123 11:16:44 AM [4840] user_type = 2
00000124 11:16:44 AM [4840] ro = 0
00000125 11:16:44 AM [4840]
00000126 11:16:44 AM [4840] [part7]
00000127 11:16:44 AM [4840] lenhi = 0
00000128 11:16:44 AM [4840] lenlo = 262144
00000129 11:16:44 AM [4840] classname = DISK
00000130 11:16:44 AM [4840] name = cache
00000131 11:16:44 AM [4840] user_type = 2
00000132 11:16:44 AM [4840] ro = 0
00000133 11:16:44 AM [4840]
00000134 11:16:44 AM [4840] ----------down_para---------
00000135 11:16:44 AM [4840] /////////max downLoad items is 14. , configured downLoad is 6.
00000136 11:16:44 AM [4840] down_num = 6
00000137 11:16:44 AM [4840]
00000138 11:16:44 AM [4840] [download_para0]
00000139 11:16:44 AM [4840] part_name = bootloader
00000140 11:16:44 AM [4840] pkt_name = BOOTLOADER_00000
00000141 11:16:44 AM [4840] verify_file = VBOOTLOADER_0000
00000142 11:16:44 AM [4840] encrypt = 0
00000143 11:16:44 AM [4840]
00000144 11:16:44 AM [4840]
00000145 11:16:44 AM [4840] [download_para1]
00000146 11:16:44 AM [4840] part_name = env
00000147 11:16:44 AM [4840] pkt_name = ENVIROMENT_00000
00000148 11:16:44 AM [4840] verify_file = VENVIROMENT_0000
00000149 11:16:44 AM [4840] encrypt = 0
00000150 11:16:44 AM [4840]
00000151 11:16:44 AM [4840]
00000152 11:16:44 AM [4840] [download_para2]
00000153 11:16:44 AM [4840] part_name = boot
00000154 11:16:44 AM [4840] pkt_name = BOOT_00000000000
00000155 11:16:44 AM [4840] verify_file = VBOOT_0000000000
00000156 11:16:44 AM [4840] encrypt = 0
00000157 11:16:44 AM [4840]
00000158 11:16:44 AM [4840]
00000159 11:16:44 AM [4840] [download_para3]
00000160 11:16:44 AM [4840] part_name = system
00000161 11:16:44 AM [4840] pkt_name = SYSTEM_000000000
00000162 11:16:44 AM [4840] verify_file = VSYSTEMFS_000000
00000163 11:16:44 AM [4840] encrypt = 0
00000164 11:16:44 AM [4840]
00000165 11:16:44 AM [4840]
00000166 11:16:44 AM [4840] [download_para4]
00000167 11:16:44 AM [4840] part_name = recovery
00000168 11:16:44 AM [4840] pkt_name = RECOVERY_0000000
00000169 11:16:44 AM [4840] verify_file = VRECOVERYFS_0000
00000170 11:16:44 AM [4840] encrypt = 0
00000171 11:16:44 AM [4840]
00000172 11:16:44 AM [4840]
00000173 11:16:44 AM [4840] [download_para5]
00000174 11:16:44 AM [4840] part_name = UDISK
00000175 11:16:44 AM [4840] pkt_name = DISKFS_000000000
00000176 11:16:44 AM [4840] verify_file =
00000177 11:16:44 AM [4840] encrypt = 0
00000178 11:16:44 AM [4840]
00000179 11:16:44 AM [4840] ---uart para---
00000180 11:16:44 AM [4840] uart_debug_port = 1.
00000181 11:16:44 AM [4840] uart_debug_tx = portG3<4><1><-1><-1>.
00000182 11:16:44 AM [4840]
00000183 11:16:44 AM [4840] ----------fex misc---------
00000184 11:16:44 AM [4840] restore = 0
00000185 11:16:44 AM [4840] env_pkt = 0
00000186 11:16:44 AM [4840] storage_type = 0.
00000187 11:16:44 AM [4840]
00000188 11:16:44 AM [4840]
00000189 11:16:44 AM [4840] ============================================
00000190 11:16:44 AM [4840] Closing image now!
00000191 11:16:44 AM [4840] CloseImage OK
00000192 11:16:44 AM [4840] Load "privatedata.ini" Failed: .\ProProcMan.cpp @ 2107
00000193 11:16:52 AM [4840] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000194 11:16:52 AM [4840] DevicePlugIn: \\?\USB#VID_1F3A&PID_EFE8#6&944c330&0&4#{0e57c50f-0ccc-4ad2-a895-93c5ed119860},BOOL to AWUSB:1
00000195 11:16:52 AM [4840] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000196 11:16:52 AM [4840] down and run fes1-1
00000197 11:16:52 AM [4840] Img_OpenItem now!
00000198 11:16:52 AM [4840] Img_OpenItem[FES ][FES_1-1000000000]
00000199 11:16:52 AM [4840] down and run fes1-2
00000200 11:16:52 AM [4840] Clear dram log OK.
00000201 11:16:52 AM [4840] Img_OpenItem now!
00000202 11:16:52 AM [4840] Img_OpenItem[FES ][FES_1-2000000000]
00000203 11:16:52 AM [4840] DOWN FES1_dram OK
00000204 11:16:53 AM [4840] update dram size to 512MB
00000205 11:16:53 AM [4840] RUN fes1-2 OK.
00000206 11:16:53 AM [4840] INFO: Simple Test for Dram is OK.
00000207 11:16:53 AM [4840]
00000208 11:16:53 AM [4840] INFO: dram initialize successful
00000209 11:16:53 AM [4840]
00000210 11:16:53 AM [4840] Img_OpenItem now!
00000211 11:16:53 AM [4840] Img_OpenItem[FES ][FES_000000000000]
00000212 11:16:54 AM [4840] Img_OpenItem now!
00000213 11:16:54 AM [4840] Img_OpenItem[FES ][FES_200000000000]
00000214 11:16:54 AM [4840] INFO: run fes2
00000215 11:16:54 AM [4840] Closing image now!
00000216 11:16:54 AM [4840] CloseImage OK
00000217 11:16:54 AM [4840] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000218 11:16:54 AM [4840] DevicePlugOut: \\?\USB#VID_1F3A&PID_EFE8#6&944c330&0&4#{0e57c50f-0ccc-4ad2-a895-93c5ed119860}
00000219 11:16:54 AM [4840] Find USB Index:0----------
00000220 11:16:57 AM [4840] DevicePlugIn: \\?\USB#VID_1F3A&PID_EFE8#6&944c330&0&4#{0e57c50f-0ccc-4ad2-a895-93c5ed119860},BOOL to AWUSB:1
00000221 11:16:57 AM [4840] Find USB Index:0----------
00000222 11:16:57 AM [4840] find,USB Record Size=1, this usb.num=1
00000223 11:16:57 AM [4840] SetFesPrivateData 1510
00000224 11:16:57 AM [4840] ################### OnFesIn
00000225 11:16:57 AM [4840] ^^Locale string of English_United States.437 is supported.
00000226 11:16:57 AM [4840] File Size High is 0X0Bytes, Low is 0XE437800Bytes.
00000227 11:16:57 AM [4840] ID=1, fes_thread() : --162--
00000228 11:16:57 AM [4840] ****eraseflag = 0****.
00000229 11:16:57 AM [4840] Img_OpenItem now!
00000230 11:16:57 AM [4840] Img_OpenItem[FET ][MAGIC_DE_START_0]
00000231 11:16:57 AM [4840] DeviceEvent jzr = NULL: wParam=0x7 lParam=0x0
00000232 11:16:57 AM [4840] Img_OpenItem now!
00000233 11:16:57 AM [4840] Img_OpenItem[FED ][FED_NAND_0000000]
00000234 11:16:57 AM [4840] Img_OpenItem now!
00000235 11:16:57 AM [4840] Img_OpenItem[FET ][MAGIC_DE_END_000]
00000236 11:16:57 AM [4840] Info: _step_6_fed_nand() : To run & reg fed.
00000237 11:17:06 AM [4840] DISK_SIZE High(0X0Sec), Low(0X76C000Sec), UDisk size High(0X0Sec), Low(0X542000Sec).
00000238 11:17:06 AM [4840]
00000239 11:17:06 AM [4840] ===============mbr_info====================
00000240 11:17:06 AM [4840] mbr_info->version = 0x100
00000241 11:17:06 AM [4840] mbr_info->magic = softw311
00000242 11:17:06 AM [4840] mbr_info->copy = 0x4
00000243 11:17:06 AM [4840] mbr_info->index = 0x0
00000244 11:17:06 AM [4840] mbr_info->PartCount = 0x9
00000245 11:17:06 AM [4840] mbr_info->array[0].addrhi = 0x0
00000246 11:17:06 AM [4840] mbr_info->array[0].addrlo = 0x800
00000247 11:17:06 AM [4840] mbr_info->array[0].lenhi = 0x0
00000248 11:17:06 AM [4840] mbr_info->array[0].lenlo = 0x8000
00000249 11:17:06 AM [4840] mbr_info->array[0].classname = DISK
00000250 11:17:06 AM [4840] mbr_info->array[0].name = bootloader
00000251 11:17:06 AM [4840] mbr_info->array[0].user_type = 0
00000252 11:17:06 AM [4840] mbr_info->array[0].ro = 0
00000253 11:17:06 AM [4840] mbr_info->array[1].addrhi = 0x0
00000254 11:17:06 AM [4840] mbr_info->array[1].addrlo = 0x8800
00000255 11:17:06 AM [4840] mbr_info->array[1].lenhi = 0x0
00000256 11:17:06 AM [4840] mbr_info->array[1].lenlo = 0x1000
00000257 11:17:06 AM [4840] mbr_info->array[1].classname = DISK
00000258 11:17:06 AM [4840] mbr_info->array[1].name = env
00000259 11:17:06 AM [4840] mbr_info->array[1].user_type = 0
00000260 11:17:06 AM [4840] mbr_info->array[1].ro = 0
00000261 11:17:06 AM [4840] mbr_info->array[2].addrhi = 0x0
00000262 11:17:06 AM [4840] mbr_info->array[2].addrlo = 0x9800
00000263 11:17:06 AM [4840] mbr_info->array[2].lenhi = 0x0
00000264 11:17:06 AM [4840] mbr_info->array[2].lenlo = 0x10000
00000265 11:17:06 AM [4840] mbr_info->array[2].classname = DISK
00000266 11:17:06 AM [4840] mbr_info->array[2].name = boot
00000267 11:17:06 AM [4840] mbr_info->array[2].user_type = 0
00000268 11:17:06 AM [4840] mbr_info->array[2].ro = 0
00000269 11:17:06 AM [4840] mbr_info->array[3].addrhi = 0x0
00000270 11:17:06 AM [4840] mbr_info->array[3].addrlo = 0x19800
00000271 11:17:06 AM [4840] mbr_info->array[3].lenhi = 0x0
00000272 11:17:06 AM [4840] mbr_info->array[3].lenlo = 0x80000
00000273 11:17:06 AM [4840] mbr_info->array[3].classname = DISK
00000274 11:17:06 AM [4840] mbr_info->array[3].name = system
00000275 11:17:06 AM [4840] mbr_info->array[3].user_type = 2
00000276 11:17:06 AM [4840] mbr_info->array[3].ro = 0
00000277 11:17:06 AM [4840] mbr_info->array[4].addrhi = 0x0
00000278 11:17:06 AM [4840] mbr_info->array[4].addrlo = 0x99800
00000279 11:17:06 AM [4840] mbr_info->array[4].lenhi = 0x0
00000280 11:17:06 AM [4840] mbr_info->array[4].lenlo = 0x100000
00000281 11:17:06 AM [4840] mbr_info->array[4].classname = DISK
00000282 11:17:06 AM [4840] mbr_info->array[4].name = data
00000283 11:17:06 AM [4840] mbr_info->array[4].user_type = 2
00000284 11:17:06 AM [4840] mbr_info->array[4].ro = 0
00000285 11:17:06 AM [4840] mbr_info->array[5].addrhi = 0x0
00000286 11:17:06 AM [4840] mbr_info->array[5].addrlo = 0x199800
00000287 11:17:06 AM [4840] mbr_info->array[5].lenhi = 0x0
00000288 11:17:06 AM [4840] mbr_info->array[5].lenlo = 0x800
00000289 11:17:06 AM [4840] mbr_info->array[5].classname = DISK
00000290 11:17:06 AM [4840] mbr_info->array[5].name = misc
00000291 11:17:06 AM [4840] mbr_info->array[5].user_type = 2
00000292 11:17:06 AM [4840] mbr_info->array[5].ro = 0
00000293 11:17:06 AM [4840] mbr_info->array[6].addrhi = 0x0
00000294 11:17:06 AM [4840] mbr_info->array[6].addrlo = 0x19a000
00000295 11:17:06 AM [4840] mbr_info->array[6].lenhi = 0x0
00000296 11:17:06 AM [4840] mbr_info->array[6].lenlo = 0x10000
00000297 11:17:06 AM [4840] mbr_info->array[6].classname = DISK
00000298 11:17:06 AM [4840] mbr_info->array[6].name = recovery
00000299 11:17:06 AM [4840] mbr_info->array[6].user_type = 2
00000300 11:17:06 AM [4840] mbr_info->array[6].ro = 0
00000301 11:17:06 AM [4840] mbr_info->array[7].addrhi = 0x0
00000302 11:17:06 AM [4840] mbr_info->array[7].addrlo = 0x1aa000
00000303 11:17:06 AM [4840] mbr_info->array[7].lenhi = 0x0
00000304 11:17:06 AM [4840] mbr_info->array[7].lenlo = 0x80000
00000305 11:17:06 AM [4840] mbr_info->array[7].classname = DISK
00000306 11:17:06 AM [4840] mbr_info->array[7].name = cache
00000307 11:17:06 AM [4840] mbr_info->array[7].user_type = 2
00000308 11:17:06 AM [4840] mbr_info->array[7].ro = 0
00000309 11:17:06 AM [4840] mbr_info->array[8].addrhi = 0x0
00000310 11:17:06 AM [4840] mbr_info->array[8].addrlo = 0x22a000
00000311 11:17:06 AM [4840] mbr_info->array[8].lenhi = 0x0
00000312 11:17:06 AM [4840] mbr_info->array[8].lenlo = 0x542000
00000313 11:17:06 AM [4840] mbr_info->array[8].classname = DISK
00000314 11:17:06 AM [4840] mbr_info->array[8].name = UDISK
00000315 11:17:06 AM [4840] mbr_info->array[8].user_type = 0
00000316 11:17:06 AM [4840] mbr_info->array[8].ro = 0
00000317 11:17:06 AM [4840] ===============mbr_info====================
00000318 11:17:06 AM [4840]
00000319 11:17:06 AM [4840] ID=1, fes_thread() : --163--
00000320 11:17:06 AM [4840] Img_OpenItem now!
00000321 11:17:06 AM [4840] Img_OpenItem[RFSFAT16][BOOTLOADER_00000]
00000322 11:17:06 AM [4840] id[1]art_name = bootloader, packet_len_high = 0x0, packet_len_low = 0x529400, pkt_name = BOOTLOADER_00000, verify_file = VBOOTLOADER_0000, encrypt = 0
00000323 11:17:06 AM [4840] Img_OpenItem now!
00000324 11:17:06 AM [4840] Img_OpenItem[FET ][MAGIC_CRC_START_]
00000325 11:17:06 AM [4840] [fes]: id =1, download_packet ooc Open
00000326 11:17:09 AM [4840] [fes]: id = 1, download_packet ooc close
00000327 11:17:09 AM [4840] Img_OpenItem now!
00000328 11:17:09 AM [4840] Img_OpenItem[FET ][MAGIC_CRC_EN_000]
00000329 11:17:09 AM [4840] Img_OpenItem now!
00000330 11:17:09 AM [4840] Img_OpenItem[RFSFAT16][VBOOTLOADER_0000]
00000331 11:17:10 AM [4840] INFO: ID = 1, pc_crc = 0xbc1881b0, fex_crc = 0x0, nand_crc = 0xbc1881b8
00000332 11:17:10 AM [4840] ERR : check_crc32_form_efex, pc_crc != nand_crc
00000333 11:17:10 AM [4840] err: download_packet, check_crc32_form_efex failed
00000334 11:17:10 AM [4840] ERR: step_download_firmware, download_packet failed
00000335 11:17:10 AM [4840] ERR : ID=1, fes_thread() : step 163 ,fail
00000336 11:17:10 AM [4840]
00000337 11:17:10 AM [4840] INFO: ID=1, update failed
00000338 11:17:10 AM [4840]
00000339 11:17:10 AM [4840] Closing image now!
00000340 11:17:10 AM [4840] CloseImage OK
00000341 11:17:10 AM [4840] MSG Callback Code: 0x20
00000342 11:17:10 AM [4840] free param...
Please tell solution of this problem.
Thanks

Running Samsung Firmware in qemu / emulator

Hi,
did anyone attempted & succeeded in running Samsung FW in the qemu / emulator?
I've got the FW for SM-T720 (Samsung Galaxy S5e Wi-Fi) from sammobile com.
Code:
$ tar tvf AP_T720XXU1ASCF_CL15641490_QB22738516_REV00_user_low_ship_MULTI_CERT_meta_OS9.tar.md5
-rw-rw-r-- dpi/dpi 15254983 2019-03-20 19:16 boot.img.lz4
-rw-rw-r-- dpi/dpi 26207870 2019-03-20 19:17 recovery.img.lz4
-rw-rw-r-- dpi/dpi 2636504669 2019-03-20 19:19 system.img.ext4.lz4
-rw-rw-r-- dpi/dpi 292280 2019-03-20 19:16 dtbo.img.lz4
-rw-rw-r-- dpi/dpi 450811971 2019-03-20 19:19 vendor.img.ext4.lz4
-rw-rw-r-- dpi/dpi 7539 2019-03-20 19:19 persist.img.ext4.lz4
-rw-rw-r-- dpi/dpi 584790192 2019-03-20 19:19 userdata.img.ext4.lz4
-rw-rw-r-- dpi/dpi 3255 2019-03-20 19:19 vbmeta.img.lz4
-r--r--r-- dpi/dpi 6759622 2019-03-20 19:15 modem.bin.lz4
drwxrwxr-x dpi/dpi 0 2019-03-20 19:20 meta-data/
-rw-rw-r-- dpi/dpi 97583402 2019-03-20 19:20 meta-data/fota.zip
$ tar tvf BL_T720XXU1ASCF_CL15641490_QB22738516_REV00_user_low_ship_MULTI_CERT.tar.md5
-rw-rw-r-- dpi/dpi 1039308 2019-03-20 19:16 abl.elf.lz4
-rw-rw-r-- dpi/dpi 2266645 2019-03-20 19:17 xbl.elf.lz4
-rw-rw-r-- dpi/dpi 20165 2019-03-20 19:17 xbl_config.elf.lz4
-rw-rw-r-- dpi/dpi 742765 2019-03-20 19:17 tz.mbn.lz4
-rw-rw-r-- dpi/dpi 202881 2019-03-20 19:16 hyp.mbn.lz4
-rw-rw-r-- dpi/dpi 20651 2019-03-20 19:16 devcfg.mbn.lz4
-rw-rw-r-- dpi/dpi 105969 2019-03-20 19:16 aop.mbn.lz4
-rw-rw-r-- dpi/dpi 289374 2019-03-20 19:16 cmnlib.mbn.lz4
-rw-rw-r-- dpi/dpi 346839 2019-03-20 19:16 cmnlib64.mbn.lz4
-rw-rw-r-- dpi/dpi 141807 2019-03-20 19:16 keymaster64.mbn.lz4
-rw-rw-r-- dpi/dpi 795224 2019-03-20 19:16 vaultkeeper.mbn.lz4
-rw-rw-r-- dpi/dpi 19243 2019-03-20 19:16 qupv3fw.elf.lz4
-rw-rw-r-- dpi/dpi 688 2019-03-20 19:17 sec.dat.lz4
-rw-rw-r-- dpi/dpi 3352 2019-03-20 19:16 apdp.mbn.lz4
-rw-rw-r-- dpi/dpi 3353 2019-03-20 19:17 msadp.mbn.lz4
-rw-rw-r-- dpi/dpi 48393 2019-03-20 19:16 bksecapp.mbn.lz4
-rw-rw-r-- dpi/dpi 7781 2019-03-20 19:17 storsec.mbn.lz4
-rw-rw-r-- dpi/dpi 39580563 2019-03-20 19:17 NON-HLOS.bin.lz4
-rwxr-xr-x dpi/dpi 12085956 2019-03-20 19:15 dspso.bin.lz4
-rw-rw-r-- dpi/dpi 3255 2019-03-20 19:19 vbmeta.img.lz4
$ tar tvf CSC_OMC_OXM_T720OXM1ASCF_CL15641490_QB22738516_REV00_user_low_ship_MULTI_CERT.tar.md5
-rw-rw-r-- dpi/dpi 8592 2019-03-20 19:17 GTS4LVWIFI_EUR_OPEN.pit
-rw-rw-r-- dpi/dpi 1625 2019-03-20 19:19 cache.img.ext4.lz4
-rw-rw-r-- dpi/dpi 440030404 2019-03-20 19:19 product.img.ext4.lz4
-rw-rw-r-- dpi/dpi 1281 2019-03-20 19:19 omr.img.ext4.lz4
drwxrwxr-x dpi/dpi 0 2019-03-20 19:20 meta-data/
-rw-rw-r-- dpi/dpi 6278 2019-03-20 19:20 meta-data/fota.zip
$ tar tvf HOME_CSC_OMC_OXM_T720OXM1ASCF_CL15641490_QB22738516_REV00_user_low_ship_MULTI_CERT.tar.md5
-rw-rw-r-- dpi/dpi 1603 2019-03-20 19:19 cache.img.ext4.lz4
-rw-rw-r-- dpi/dpi 440030404 2019-03-20 19:19 product.img.ext4.lz4
drwxrwxr-x dpi/dpi 0 2019-03-20 19:19 meta-data/
-rw-rw-r-- dpi/dpi 324 2019-03-20 19:19 meta-data/download-list.txt
$
I've tried running it with qemu-system-aarch64 -serial stdio ... but it shows no output.
I've also used split_bootimg.pl to split the boot.img and "recovery.img" to get the ramdisk.
Bump!
I too am interesting in accomplishing this. It seems like it should be possible, provided that the hardware that qemu is capable of emulating is supported by the firmware in question. I found qemu-system-aarch64 -cpu help and -machine help is a good reference to get a list of hardware and cpu supported.
But that being all good, I myself have only managed to just get a blank screen, but I know there is a lot more research I have to do.
I can't seem to post links for some reason but just search for "Start the emulator from the command line" on android developer website - This doc details running the android studio emulator from its command line- of course avd actually uses qemu so there's definitely gonna be a lot of useful information on there.
I'm thinking of starting with trying to emulate a different stock firmware through avd first before trying to invoke qemu directly- avd is a lot more than just a wrapper for qemu, after all.
Excellent idea to investigate firmware in rooting, factory reset protection in qemu first.
Github has https://github.com/astarasikov/qemu/tree/exynos9820, and I am going to examine in qemu as well as in real Galaxy S9. Similar idea to study jailbreaking in qemu of iphone using https://github.com/alephsecurity/xnu-qemu-arm64/wiki/Build-iOS-on-QEMU. I want to understand how to "fix calls" in most of unlcoking iCloud.

Question Nord N200 5G

Hey, I recently Downloaded and Flashed the new android 12 full OTA on my bl unlocked and rooted n200, and the bootloader unlocked warning at boot is gone!!
I have since boot flashed the extracted magisk patched. fully rooted and bl unlocked, and no warning !! has anyone seen this?
Motomark said:
Hey, I recently Downloaded and Flashed the new android 12 full OTA on my bl unlocked and rooted n200, and the bootloader unlocked warning at boot is gone!!
I have since boot flashed the extracted magisk patched. fully rooted and bl unlocked, and no warning !! has anyone seen this?
Click to expand...
Click to collapse
Yep. I can confirm too. A nice feature of a12.
Metconnect2000 said:
Yep. I can confirm too. A nice feature of a12.
Click to expand...
Click to collapse
that is so awesome. ive tried with several phones and failed.
It only happened on N200
Same notice still happens on Moto Edge 2021 and many video subscription app don't work
Motomark said:
Hey, I recently Downloaded and Flashed the new android 12 full OTA on my bl unlocked and rooted n200, and the bootloader unlocked warning at boot is gone!!
I have since boot flashed the extracted magisk patched. fully rooted and bl unlocked, and no warning !! has anyone seen this?
Click to expand...
Click to collapse
Where did you download the A12 full OTA(for metro/TMO) and how did you flash it? I can't even install via OTA even if I unroot
Tyreethetruth said:
Where did you download the A12 full OTA(for metro/TMO) and how did you flash it? I can't even install via OTA even if I unroot
Click to expand...
Click to collapse
https://android.googleapis.com/packages/ota-api/package/2ae18bc3e36cfe74ae7f1b65d0f817043c57707a.zip
Second that, got the file, but how to flash? GSI installer wants a .img, and with the a/b setup it's very odd with fastbootenhanced. (edited to add, I'm on the Global version myself, no TWRP recovery exists for it as far as I know)
AboveTG said:
https://android.googleapis.com/packages/ota-api/package/2ae18bc3e36cfe74ae7f1b65d0f817043c57707a.zip
Click to expand...
Click to collapse
Im still trying to figure that out. I just bricked it trying to flash the magisk patched boot.img, but forgot to finish the OTA.. so I flashed an android 12 boot.img into android 11.. lol. I have a good tool for extracting the payload.bin. should work as a portable app, unzip it and run the exe. That is how you get the images to flash. Make sure your bootloader is unlocked. Dont blame me for any bricking that may occur.
AboveTG said:
Im still trying to figure that out. I just bricked it trying to flash the magisk patched boot.img, but forgot to finish the OTA.. so I flashed an android 12 boot.img into android 11.. lol. I have a good tool for extracting the payload.bin. should work as a portable app, unzip it and run the exe. That is how you get the images to flash. Make sure your bootloader is unlocked. Dont blame me for any bricking that may occur.
Click to expand...
Click to collapse
Ok, cool, so extract the images from the bin and flash them individually. I might just hang back with Oxygen 11 for now, at least 5g works and I've bricked it more times than I can count.
I have extracted the boot.img from the Android12 Tmobile payload.bin using Payload-Dumper-Go:
Code:
Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>payload-dumper-go payload.bin
payload.bin: payload.bin
Payload Version: 2
Payload Manifest Length: 151601
Payload Manifest Signature Length: 267
Found partitions:
system (642 MB), system_ext (966 MB), product (14 MB), vbmeta_system (4.1 kB), oplusstanvbk (6.4 MB), featenabler (90 kB), hyp (397 kB), rpm (254 kB), logo (344 kB), boot (101 MB), vendor_boot (101 MB), vendor (430 MB), odm (630 MB), dtbo (25 MB), vbmeta (8.2 kB), xbl (3.5 MB), xbl_config (74 kB), tz (3.4 MB), modem (178 MB), bluetooth (979 kB), abl (209 kB), dsp (34 MB), keymaster (250 kB), devcfg (45 kB), qupfw (57 kB), imagefv (537 kB), core_nhlos (125 MB), uefisecapp (127 kB), my_product (136 MB), my_engineering (348 kB), my_stock (732 MB), my_company (348 kB), my_carrier (348 kB), my_region (704 kB), my_heytap (714 MB), my_preload (348 kB), my_manifest (348 kB), my_bigball (624 MB)
system_ext (966 MB) [===========================] 100 %
product (14 MB) [===========================] 100 %
vbmeta_system (4.1 kB) [===========================] 100 %
system (642 MB) [============================] 100 %
oplusstanvbk (6.4 MB) [===========================] 100 %
featenabler (90 kB) [============================] 100 %
hyp (397 kB) [=============================] 100 %
rpm (254 kB) [============================] 100 %
logo (344 kB) [============================] 100 %
boot (101 MB) [===========================] 100 %
vendor_boot (101 MB) [=========================] 100 %
vendor (430 MB) [===========================] 100 %
odm (630 MB) [===========================] 100 %
dtbo (25 MB) [============================] 100 %
vbmeta (8.2 kB) [============================] 100 %
xbl (3.5 MB) [=============================] 100 %
xbl_config (74 kB) [===========================] 100 %
tz (3.4 MB) [=============================] 100 %
modem (178 MB) [==========================] 100 %
bluetooth (979 kB) [===========================] 100 %
abl (209 kB) [============================] 100 %
dsp (34 MB) [============================] 100 %
keymaster (250 kB) [===========================] 100 %
devcfg (45 kB) [============================] 100 %
qupfw (57 kB) [============================] 100 %
imagefv (537 kB) [===========================] 100 %
core_nhlos (125 MB) [==========================] 100 %
my_product (136 MB) [=========================] 100 %
uefisecapp (127 kB) [==========================] 100 %
my_engineering (348 kB) [========================] 100 %
my_stock (732 MB) [=========================] 100 %
my_company (348 kB) [========================] 100 %
my_carrier (348 kB) [==========================] 100 %
my_region (704 kB) [=========================] 100 %
my_heytap (714 MB) [========================] 100 %
my_preload (348 kB) [========================] 100 %
my_manifest (348 kB) [========================] 100 %
my_bigball (624 MB) [=======================] 100 %
Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>dir
Volume in drive Y is Y - Drivers - Software
Volume Serial Number is 32B4-C37E
Directory of Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0
07/01/2022 04:57 PM <DIR> .
07/01/2022 04:57 PM <DIR> ..
07/01/2022 04:57 PM <DIR> extracted_20220701_165705
12/09/2021 07:28 AM 154,319 liblzma-5.dll
07/01/2022 04:46 PM 22 liblzma-5.zip
10/06/2020 08:50 AM 12,354,453 payload-dumper-go.exe
01/01/2009 12:00 AM 3,777,851,373 payload.bin
07/01/2022 04:21 PM 1,765,502 PayloadDumper.zip
5 File(s) 3,792,125,669 bytes
3 Dir(s) 1,244,134,313,984 bytes free
Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>dir extracted_20220701_165705 /C
Volume in drive Y is Y - Drivers - Software
Directory of Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0\extracted_20220701_165531
07/01/2022 04:56 PM <DIR> .
07/01/2022 04:56 PM <DIR> ..
07/01/2022 04:56 PM 208,896 abl.img
07/01/2022 04:56 PM 978,944 bluetooth.img
07/01/2022 04:55 PM 100,663,296 boot.img
07/01/2022 04:56 PM 125,042,688 core_nhlos.img
07/01/2022 04:56 PM 45,056 devcfg.img
07/01/2022 04:56 PM 33,554,432 dsp.img
07/01/2022 04:55 PM 25,165,824 dtbo.img
07/01/2022 04:55 PM 90,112 featenabler.img
07/01/2022 04:55 PM 397,312 hyp.img
07/01/2022 04:56 PM 536,576 imagefv.img
07/01/2022 04:56 PM 249,856 keymaster.img
07/01/2022 04:55 PM 344,064 logo.img
07/01/2022 04:55 PM 177,459,200 modem.img
07/01/2022 04:56 PM 623,935,488 my_bigball.img
07/01/2022 04:56 PM 348,160 my_carrier.img
07/01/2022 04:56 PM 348,160 my_company.img
07/01/2022 04:56 PM 348,160 my_engineering.img
07/01/2022 04:56 PM 714,235,904 my_heytap.img
07/01/2022 04:56 PM 348,160 my_manifest.img
07/01/2022 04:56 PM 348,160 my_preload.img
07/01/2022 04:56 PM 135,450,624 my_product.img
07/01/2022 04:56 PM 704,512 my_region.img
07/01/2022 04:56 PM 731,537,408 my_stock.img
07/01/2022 04:55 PM 630,448,128 odm.img
07/01/2022 04:55 PM 6,381,568 oplusstanvbk.img
07/01/2022 04:55 PM 13,729,792 product.img
07/01/2022 04:56 PM 57,344 qupfw.img
07/01/2022 04:55 PM 253,952 rpm.img
07/01/2022 04:55 PM 642,093,056 system.img
07/01/2022 04:56 PM 966,074,368 system_ext.img
07/01/2022 04:55 PM 3,366,912 tz.img
07/01/2022 04:56 PM 126,976 uefisecapp.img
07/01/2022 04:55 PM 8,192 vbmeta.img
07/01/2022 04:55 PM 4,096 vbmeta_system.img
07/01/2022 04:55 PM 429,576,192 vendor.img
07/01/2022 04:55 PM 100,663,296 vendor_boot.img
07/01/2022 04:55 PM 3,530,752 xbl.img
07/01/2022 04:55 PM 73,728 xbl_config.img
38 File(s) 5,468,729,344 bytes
2 Dir(s) 1,244,134,313,984 bytes free
Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>
XDA won't allow me to attach the file here.
I applied just now for developer at AndroidFileHost to post it there.
In the meantime I can post it to the N200 channel at Telegram:
Nord N200 Testers
A group for discussing N200 custom software testing. All off topic discussion has been moved to this group: https://t.me/+1qZHIItf9R80MTYx Check pinned messages for important messages and shared/confirmed working files.
t.me
Tiltowait said:
Ok, cool, so extract the images from the bin and flash them individually. I might just hang back with Oxygen 11 for now, at least 5g works and I've bricked it more times than I can count.
Click to expand...
Click to collapse
niiice man I figured it out. & I hear ya on that bricking.. lol. thank god for the msm tool.
scanman0 said:
I have extracted the boot.img from the Android12 Tmobile payload.bin using Payload-Dumper-Go:
Code:
Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>payload-dumper-go payload.bin
payload.bin: payload.bin
Payload Version: 2
Payload Manifest Length: 151601
Payload Manifest Signature Length: 267
Found partitions:
system (642 MB), system_ext (966 MB), product (14 MB), vbmeta_system (4.1 kB), oplusstanvbk (6.4 MB), featenabler (90 kB), hyp (397 kB), rpm (254 kB), logo (344 kB), boot (101 MB), vendor_boot (101 MB), vendor (430 MB), odm (630 MB), dtbo (25 MB), vbmeta (8.2 kB), xbl (3.5 MB), xbl_config (74 kB), tz (3.4 MB), modem (178 MB), bluetooth (979 kB), abl (209 kB), dsp (34 MB), keymaster (250 kB), devcfg (45 kB), qupfw (57 kB), imagefv (537 kB), core_nhlos (125 MB), uefisecapp (127 kB), my_product (136 MB), my_engineering (348 kB), my_stock (732 MB), my_company (348 kB), my_carrier (348 kB), my_region (704 kB), my_heytap (714 MB), my_preload (348 kB), my_manifest (348 kB), my_bigball (624 MB)
system_ext (966 MB) [===========================] 100 %
product (14 MB) [===========================] 100 %
vbmeta_system (4.1 kB) [===========================] 100 %
system (642 MB) [============================] 100 %
oplusstanvbk (6.4 MB) [===========================] 100 %
featenabler (90 kB) [============================] 100 %
hyp (397 kB) [=============================] 100 %
rpm (254 kB) [============================] 100 %
logo (344 kB) [============================] 100 %
boot (101 MB) [===========================] 100 %
vendor_boot (101 MB) [=========================] 100 %
vendor (430 MB) [===========================] 100 %
odm (630 MB) [===========================] 100 %
dtbo (25 MB) [============================] 100 %
vbmeta (8.2 kB) [============================] 100 %
xbl (3.5 MB) [=============================] 100 %
xbl_config (74 kB) [===========================] 100 %
tz (3.4 MB) [=============================] 100 %
modem (178 MB) [==========================] 100 %
bluetooth (979 kB) [===========================] 100 %
abl (209 kB) [============================] 100 %
dsp (34 MB) [============================] 100 %
keymaster (250 kB) [===========================] 100 %
devcfg (45 kB) [============================] 100 %
qupfw (57 kB) [============================] 100 %
imagefv (537 kB) [===========================] 100 %
core_nhlos (125 MB) [==========================] 100 %
my_product (136 MB) [=========================] 100 %
uefisecapp (127 kB) [==========================] 100 %
my_engineering (348 kB) [========================] 100 %
my_stock (732 MB) [=========================] 100 %
my_company (348 kB) [========================] 100 %
my_carrier (348 kB) [==========================] 100 %
my_region (704 kB) [=========================] 100 %
my_heytap (714 MB) [========================] 100 %
my_preload (348 kB) [========================] 100 %
my_manifest (348 kB) [========================] 100 %
my_bigball (624 MB) [=======================] 100 %
Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>dir
Volume in drive Y is Y - Drivers - Software
Volume Serial Number is 32B4-C37E
Directory of Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0
07/01/2022 04:57 PM <DIR> .
07/01/2022 04:57 PM <DIR> ..
07/01/2022 04:57 PM <DIR> extracted_20220701_165705
12/09/2021 07:28 AM 154,319 liblzma-5.dll
07/01/2022 04:46 PM 22 liblzma-5.zip
10/06/2020 08:50 AM 12,354,453 payload-dumper-go.exe
01/01/2009 12:00 AM 3,777,851,373 payload.bin
07/01/2022 04:21 PM 1,765,502 PayloadDumper.zip
5 File(s) 3,792,125,669 bytes
3 Dir(s) 1,244,134,313,984 bytes free
Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>dir extracted_20220701_165705 /C
Volume in drive Y is Y - Drivers - Software
Directory of Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0\extracted_20220701_165531
07/01/2022 04:56 PM <DIR> .
07/01/2022 04:56 PM <DIR> ..
07/01/2022 04:56 PM 208,896 abl.img
07/01/2022 04:56 PM 978,944 bluetooth.img
07/01/2022 04:55 PM 100,663,296 boot.img
07/01/2022 04:56 PM 125,042,688 core_nhlos.img
07/01/2022 04:56 PM 45,056 devcfg.img
07/01/2022 04:56 PM 33,554,432 dsp.img
07/01/2022 04:55 PM 25,165,824 dtbo.img
07/01/2022 04:55 PM 90,112 featenabler.img
07/01/2022 04:55 PM 397,312 hyp.img
07/01/2022 04:56 PM 536,576 imagefv.img
07/01/2022 04:56 PM 249,856 keymaster.img
07/01/2022 04:55 PM 344,064 logo.img
07/01/2022 04:55 PM 177,459,200 modem.img
07/01/2022 04:56 PM 623,935,488 my_bigball.img
07/01/2022 04:56 PM 348,160 my_carrier.img
07/01/2022 04:56 PM 348,160 my_company.img
07/01/2022 04:56 PM 348,160 my_engineering.img
07/01/2022 04:56 PM 714,235,904 my_heytap.img
07/01/2022 04:56 PM 348,160 my_manifest.img
07/01/2022 04:56 PM 348,160 my_preload.img
07/01/2022 04:56 PM 135,450,624 my_product.img
07/01/2022 04:56 PM 704,512 my_region.img
07/01/2022 04:56 PM 731,537,408 my_stock.img
07/01/2022 04:55 PM 630,448,128 odm.img
07/01/2022 04:55 PM 6,381,568 oplusstanvbk.img
07/01/2022 04:55 PM 13,729,792 product.img
07/01/2022 04:56 PM 57,344 qupfw.img
07/01/2022 04:55 PM 253,952 rpm.img
07/01/2022 04:55 PM 642,093,056 system.img
07/01/2022 04:56 PM 966,074,368 system_ext.img
07/01/2022 04:55 PM 3,366,912 tz.img
07/01/2022 04:56 PM 126,976 uefisecapp.img
07/01/2022 04:55 PM 8,192 vbmeta.img
07/01/2022 04:55 PM 4,096 vbmeta_system.img
07/01/2022 04:55 PM 429,576,192 vendor.img
07/01/2022 04:55 PM 100,663,296 vendor_boot.img
07/01/2022 04:55 PM 3,530,752 xbl.img
07/01/2022 04:55 PM 73,728 xbl_config.img
38 File(s) 5,468,729,344 bytes
2 Dir(s) 1,244,134,313,984 bytes free
Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>
XDA won't allow me to attach the file here.
I applied just now for developer at AndroidFileHost to post it there.
In the meantime I can post it to the N200 channel at Telegram:
Nord N200 Testers
A group for discussing N200 custom software testing. All off topic discussion has been moved to this group: https://t.me/+1qZHIItf9R80MTYx Check pinned messages for important messages and shared/confirmed working files.
t.me
Click to expand...
Click to collapse
I joined the telegram channel
scanman0 said:
I have extracted the boot.img from the Android12 Tmobile payload.bin using Payload-Dumper-Go:
Code:
Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>payload-dumper-go payload.bin
payload.bin: payload.bin
Payload Version: 2
Payload Manifest Length: 151601
Payload Manifest Signature Length: 267
Found partitions:
system (642 MB), system_ext (966 MB), product (14 MB), vbmeta_system (4.1 kB), oplusstanvbk (6.4 MB), featenabler (90 kB), hyp (397 kB), rpm (254 kB), logo (344 kB), boot (101 MB), vendor_boot (101 MB), vendor (430 MB), odm (630 MB), dtbo (25 MB), vbmeta (8.2 kB), xbl (3.5 MB), xbl_config (74 kB), tz (3.4 MB), modem (178 MB), bluetooth (979 kB), abl (209 kB), dsp (34 MB), keymaster (250 kB), devcfg (45 kB), qupfw (57 kB), imagefv (537 kB), core_nhlos (125 MB), uefisecapp (127 kB), my_product (136 MB), my_engineering (348 kB), my_stock (732 MB), my_company (348 kB), my_carrier (348 kB), my_region (704 kB), my_heytap (714 MB), my_preload (348 kB), my_manifest (348 kB), my_bigball (624 MB)
system_ext (966 MB) [===========================] 100 %
product (14 MB) [===========================] 100 %
vbmeta_system (4.1 kB) [===========================] 100 %
system (642 MB) [============================] 100 %
oplusstanvbk (6.4 MB) [===========================] 100 %
featenabler (90 kB) [============================] 100 %
hyp (397 kB) [=============================] 100 %
rpm (254 kB) [============================] 100 %
logo (344 kB) [============================] 100 %
boot (101 MB) [===========================] 100 %
vendor_boot (101 MB) [=========================] 100 %
vendor (430 MB) [===========================] 100 %
odm (630 MB) [===========================] 100 %
dtbo (25 MB) [============================] 100 %
vbmeta (8.2 kB) [============================] 100 %
xbl (3.5 MB) [=============================] 100 %
xbl_config (74 kB) [===========================] 100 %
tz (3.4 MB) [=============================] 100 %
modem (178 MB) [==========================] 100 %
bluetooth (979 kB) [===========================] 100 %
abl (209 kB) [============================] 100 %
dsp (34 MB) [============================] 100 %
keymaster (250 kB) [===========================] 100 %
devcfg (45 kB) [============================] 100 %
qupfw (57 kB) [============================] 100 %
imagefv (537 kB) [===========================] 100 %
core_nhlos (125 MB) [==========================] 100 %
my_product (136 MB) [=========================] 100 %
uefisecapp (127 kB) [==========================] 100 %
my_engineering (348 kB) [========================] 100 %
my_stock (732 MB) [=========================] 100 %
my_company (348 kB) [========================] 100 %
my_carrier (348 kB) [==========================] 100 %
my_region (704 kB) [=========================] 100 %
my_heytap (714 MB) [========================] 100 %
my_preload (348 kB) [========================] 100 %
my_manifest (348 kB) [========================] 100 %
my_bigball (624 MB) [=======================] 100 %
Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>dir
Volume in drive Y is Y - Drivers - Software
Volume Serial Number is 32B4-C37E
Directory of Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0
07/01/2022 04:57 PM <DIR> .
07/01/2022 04:57 PM <DIR> ..
07/01/2022 04:57 PM <DIR> extracted_20220701_165705
12/09/2021 07:28 AM 154,319 liblzma-5.dll
07/01/2022 04:46 PM 22 liblzma-5.zip
10/06/2020 08:50 AM 12,354,453 payload-dumper-go.exe
01/01/2009 12:00 AM 3,777,851,373 payload.bin
07/01/2022 04:21 PM 1,765,502 PayloadDumper.zip
5 File(s) 3,792,125,669 bytes
3 Dir(s) 1,244,134,313,984 bytes free
Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>dir extracted_20220701_165705 /C
Volume in drive Y is Y - Drivers - Software
Directory of Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0\extracted_20220701_165531
07/01/2022 04:56 PM <DIR> .
07/01/2022 04:56 PM <DIR> ..
07/01/2022 04:56 PM 208,896 abl.img
07/01/2022 04:56 PM 978,944 bluetooth.img
07/01/2022 04:55 PM 100,663,296 boot.img
07/01/2022 04:56 PM 125,042,688 core_nhlos.img
07/01/2022 04:56 PM 45,056 devcfg.img
07/01/2022 04:56 PM 33,554,432 dsp.img
07/01/2022 04:55 PM 25,165,824 dtbo.img
07/01/2022 04:55 PM 90,112 featenabler.img
07/01/2022 04:55 PM 397,312 hyp.img
07/01/2022 04:56 PM 536,576 imagefv.img
07/01/2022 04:56 PM 249,856 keymaster.img
07/01/2022 04:55 PM 344,064 logo.img
07/01/2022 04:55 PM 177,459,200 modem.img
07/01/2022 04:56 PM 623,935,488 my_bigball.img
07/01/2022 04:56 PM 348,160 my_carrier.img
07/01/2022 04:56 PM 348,160 my_company.img
07/01/2022 04:56 PM 348,160 my_engineering.img
07/01/2022 04:56 PM 714,235,904 my_heytap.img
07/01/2022 04:56 PM 348,160 my_manifest.img
07/01/2022 04:56 PM 348,160 my_preload.img
07/01/2022 04:56 PM 135,450,624 my_product.img
07/01/2022 04:56 PM 704,512 my_region.img
07/01/2022 04:56 PM 731,537,408 my_stock.img
07/01/2022 04:55 PM 630,448,128 odm.img
07/01/2022 04:55 PM 6,381,568 oplusstanvbk.img
07/01/2022 04:55 PM 13,729,792 product.img
07/01/2022 04:56 PM 57,344 qupfw.img
07/01/2022 04:55 PM 253,952 rpm.img
07/01/2022 04:55 PM 642,093,056 system.img
07/01/2022 04:56 PM 966,074,368 system_ext.img
07/01/2022 04:55 PM 3,366,912 tz.img
07/01/2022 04:56 PM 126,976 uefisecapp.img
07/01/2022 04:55 PM 8,192 vbmeta.img
07/01/2022 04:55 PM 4,096 vbmeta_system.img
07/01/2022 04:55 PM 429,576,192 vendor.img
07/01/2022 04:55 PM 100,663,296 vendor_boot.img
07/01/2022 04:55 PM 3,530,752 xbl.img
07/01/2022 04:55 PM 73,728 xbl_config.img
38 File(s) 5,468,729,344 bytes
2 Dir(s) 1,244,134,313,984 bytes free
Y:\Phone\msmdownload tool-rom\PayloadDumperGoV1.0>
XDA won't allow me to attach the file here.
I applied just now for developer at AndroidFileHost to post it there.
In the meantime I can post it to the N200 channel at Telegram:
Nord N200 Testers
A group for discussing N200 custom software testing. All off topic discussion has been moved to this group: https://t.me/+1qZHIItf9R80MTYx Check pinned messages for important messages and shared/confirmed working files.
t.me
Click to expand...
Click to collapse
Boot.img for DE2118_11_C.15 T-Mobile/MetroPCS AOSP 12 posted here
towardsdawn said:
Boot.img for DE2118_11_C.15 T-Mobile/MetroPCS AOSP 12 posted here
Click to expand...
Click to collapse
I need the boot image for magisk for the unlocked variant (best buy version)

Question Which of these packages are making my Messenger freeze every time I click on a link sent to me?

# Preset created in ADB AppControl 1.7.9.1
# Total applications: 178
# 2023-04-08_19:45:51
# Samsung SM-S918U1 Disabled applications
com.samsung.android.service.aircommand
com.google.android.projection.gearhead
com.android.egg
com.google.android.as
android.auto_generated_rro_product__
android.auto_generated_rro_vendor__
com.samsung.android.app.updatecenter
com.samsung.android.mapsagent
com.samsung.android.app.appsedge
com.samsung.android.ardrawing
com.samsung.android.aremoji
com.samsung.android.aremojieditor
com.sec.android.mimage.avatarstickers
com.google.ar.core
com.samsung.android.authfw
com.sec.android.autodoodle.service
com.sec.mhs.smarttethering
com.samsung.android.samsungpassautofill
com.sec.android.app.DataCreate
com.android.dreams.basic
com.samsung.android.bbc.bbcagent
com.samsung.android.visionintelligence
com.samsung.android.bixby.agent
com.samsung.android.bixbyvision.framework
com.android.bluetoothmidiservice
com.android.bookmarkprovider
com.samsung.android.mdecservice
com.google.android.cellbroadcastservice
com.android.chrome
com.sec.android.app.chromecustomizations
com.samsung.android.app.clipboardedge
com.samsung.cmfa.AuthTouch
com.samsung.android.cmfa.framework
com.android.providers.partnerbookmarks
com.android.sharedstoragebackup
com.android.wallpaperbackup
com.android.wallpapercropper
com.samsung.android.knox.attestation
com.samsung.android.smartswitchassistant
com.samsung.android.mcfds
com.samsung.android.app.camera.sticker.facearavatar.preload
com.samsung.android.rubin.app
com.google.android.apps.restore
com.android.bips
com.google.android.apps.turbo
com.sec.android.app.dexonpc
com.diotek.sec.lookup.dictionary
com.samsung.android.carkey
com.samsung.android.forest
com.samsung.android.da.daagent
com.sec.android.easyonehand
com.samsung.android.app.cocktailbarservice
com.samsung.app.newtrim
com.sec.android.app.safetyassurance
com.sec.enterprise.mdm.services.simpin
com.samsung.faceservice
com.google.android.gms.supervision
com.sec.android.widgetapp.easymodecontactswidget
com.samsung.android.fmm
com.samsung.android.app.galaxyfinder
com.monotype.android.font.foundation
com.samsung.android.gru
com.samsung.android.widget.pictureframe
com.samsung.storyservice
com.samsung.android.game.gametools
com.samsung.android.game.gamehome
com.samsung.android.game.gos
com.samsung.android.service.pentastic
com.google.android.googlequicksearchbox
com.android.hotwordenrollment.xgoogle
com.android.hotwordenrollment.okgoogle
com.google.android.syncadapters.calendar
com.google.android.gms.location.history
com.google.android.onetimeinitializer
com.google.android.partnersetup
com.samsung.gpuwatchapp
com.samsung.android.mobileservice
com.samsung.android.sdk.handwriting
com.android.htmlviewer
com.sec.android.app.hwmoduletest
com.samsung.klmsagent
com.samsung.android.knox.analytics.uploader
com.sec.enterprise.knox.cloudmdm.smdms
com.samsung.android.knox.pushmanager
com.knox.vpn.proxyhandler
com.samsung.android.knox.kpecore
com.microsoft.appmanager
com.samsung.android.mdx
com.samsung.android.service.livedrawing
com.google.audio.hearing.visualization.accessibility.scribe
com.android.wallpaper.livepicker
com.sec.android.app.magnifier
com.samsung.android.app.readingglass
com.google.android.apps.maps
com.google.android.feedback
com.samsung.android.mdm
com.google.android.apps.tachyon
com.google.android.apps.messaging
com.facebook.system
com.facebook.appmanager
com.facebook.services
com.samsung.android.inputshare
com.samsung.android.easysetup
com.samsung.android.beaconmanager
com.samsung.android.allshare.service.mediashare
com.sec.vsim.ericssonnsds.webapp
com.android.internal.systemui.onehanded.gestural
com.microsoft.skydrive
com.samsung.android.service.peoplestripe
com.samsung.android.peripheral.framework
com.android.dreams.phototable
com.google.android.printservice.recommendation
com.android.printspooler
com.google.android.as.oss
com.samsung.android.privateshare
com.samsung.android.app.sharelive
com.samsung.android.aware.service
com.samsung.android.mdx.kit
com.samsung.android.app.omcagent
com.samsung.android.app.reminder
com.samsung.safetyinformation
com.sec.android.app.apex
com.samsung.android.coldwalletservice
com.sec.android.app.billing
com.samsung.android.scpm
com.sec.android.desktopmode.uiservice
com.sec.android.app.desktoplauncher
com.sec.android.dexsystemui
com.sec.android.app.ve.vebgm
com.samsung.android.kidsinstaller
com.sec.location.nsflp2
com.samsung.android.samsungpass
com.samsung.android.spayfw
com.sec.spp.push
com.samsung.SMT
com.samsung.android.ipsgeofence
com.samsung.android.dkey
com.samsung.android.samsungpositioning
com.samsung.knox.securefolder
com.samsung.android.fast
com.samsung.android.appseparation
com.sec.android.RilServiceModeApp
com.sec.location.nfwlocationprivacy
com.samsung.android.app.settings.bixby
com.samsung.android.shortcutbackupservice
com.sec.modem.settings
com.android.simappdialog
com.android.stk
com.android.stk2
com.skms.android.agent
com.samsung.android.location
com.samsung.android.smartsuggestions
com.sec.android.easyMover.Agent
com.samsung.android.visualars
com.samsung.android.smartmirroring
com.samsung.android.service.stplatform
com.google.android.tts
com.samsung.android.stickercenter
com.google.mainline.telemetry
com.samsung.android.svcagent
com.android.apps.tag
com.samsung.android.service.tagservice
com.samsung.android.accessibility.talkback
com.samsung.android.app.taskedge
com.sec.android.app.quicktool
com.samsung.android.service.airviewdictionary
com.android.providers.userdictionary
com.samsung.android.vtcamerasettings
com.sec.android.app.vepreload
com.google.android.apps.accessibility.voiceaccess
com.samsung.android.bixby.wakeup
com.android.vpndialogs
com.samsung.android.dynamiclock
com.samsung.android.app.watchmanagerstub
com.samsung.android.net.wifi.wifiguider
com.sec.android.app.wlantest
com.samsung.android.knox.containercore
com.google.android.youtube
I found out it is the latest messenger update with the glitches. I downgraded to the update before it and it works now

[Tutorial] MIUI 14 Bloatware Removal List

I have compiled a list of unnecessary apps that can be safely removed on MIUI 14.0.3. It was tested on Redmi Note 9s.​
com.amazon.mShop.android.shopping
com.booking
com.miui.analytics
com.google.android.marvin.talkback
com.google.android.projection.gearhead
com.android.egg
com.google.android.setupwizard
com.mi.globalminusscreen
com.longcheertel.midtest
com.google.android.apps.googleassistant
com.longcheertel.AutoTest
com.miui.backup
com.android.dreams.basic
com.android.providers.blockednumber
com.android.bookmarkprovider
com.xiaomi.barrage
com.android.calllogbackup
com.qualcomm.qti.callfeaturessetting
com.google.android.ims
com.android.chrome
com.longcheertel.cit
com.miui.cloudbackup
com.android.backupconfirm
com.android.cts.ctsshim
com.android.cts.priv.ctsshim
com.android.localtransport
com.android.ons
com.android.providers.partnerbookmarks
com.android.sharedstoragebackup
com.android.wallpaperbackup
com.miui.face.overlay.miui
com.miui.rom
com.qualcomm.qti.remoteSimlockAuth
com.qualcomm.timeservice
com.android.companiondevicemanager
com.miui.compass
com.qualcomm.qti.confdialer
com.qti.confuridialer
com.google.android.apps.restore
com.google.android.apps.turbo
com.qti.qualcomm.deviceinfo
com.google.android.apps.wellbeing
com.android.dynsystem
com.android.emergency
com.facebook.katana
com.facebook.system
com.facebook.appmanager
com.facebook.services
com.miui.bugreport
com.fido.asm
com.fido.xiaomi.uafclient
com.goodix.gftest
com.fingerprints.extension.service
com.miui.freeform
com.caf.fmradio
com.miui.fm
com.miui.fmservice
com.miui.phrase
com.xiaomi.glgm
com.android.internal.systemui.navbar.gestural_narrow_back
com.android.internal.systemui.navbar.gestural_extra_wide_back
com.android.internal.systemui.navbar.gestural_wide_back
com.android.internal.systemui.navbar.gestural
com.xiaomi.mipicks
com.goodix.fingerprint
com.google.android.gm
com.google.android.googlequicksearchbox
com.android.hotwordenrollment.xgoogle
com.android.hotwordenrollment.okgoogle
com.google.android.syncadapters.contacts
com.google.android.gms.location.history
com.google.android.apps.subscriptions.red
com.google.android.onetimeinitializer
com.google.android.partnersetup
com.google.android.apps.walletnfcrel
com.android.vending
com.mi.healthglobal
org.ifaa.aidl.manager
com.xiaomi.joyose
com.android.keychain
com.android.wallpaper.livepicker
com.google.android.apps.maps
com.google.android.feedback
com.xiaomi.payment
com.xiaomi.mi_connect_service
cn.wps.xiaomi.abroad.lite
com.xiaomi.mircs
com.duokan.phone.remotecontroller
com.miui.mishare.connectivity
com.miui.videoplayer
com.miui.micloudsync
org.mipay.android.manager
com.miui.daemon
com.miui.face
com.android.mms.service
com.amazon.appmanager
com.miui.msa.global
com.miui.player
com.netflix.mediaclient
com.android.nfc
com.android.internal.systemui.onehanded.gestural
com.wdstechnology.android.kryten
android.autoinstalls.config.Xiaomi.qssi
com.android.dreams.phototable
com.google.android.printservice.recommendation
com.android.printspooler
com.android.provision
com.qualcomm.qti.qdma
com.miui.hybrid
com.miui.touchassistant
com.longcheertel.sarauth
com.fingerprints.sensortesttool
com.miui.miservice
com.xiaomi.midrop
com.android.stk
com.miui.hybrid.accessory
com.tencent.soter.soterserver
com.google.android.tts
com.google.mainline.telemetry
com.xiaomi.discover
com.android.bips
com.android.apps.tag
com.android.updater
com.android.providers.userdictionary
com.miui.weather2
com.android.managedprovisioning
com.xiaomi.account
com.miui.cloudservice
com.xiaomi.xmsfkeeper
com.xiaomi.simactivate.service
com.miui.yellowpage
com.google.android.youtube
com.android.systemui.gesture.line.overlay
com.qti.diagservices
com.qti.dpmserviceapp
com.qualcomm.embms
com.google.android.configupdater
com.miui.wmsvc
com.miui.phone.carriers.overlay.h3g
com.miui.phone.carriers.overlay.vodafone
com.qti.xdivert
com.android.traceur
com.android.theme.font.notoserifsource
com.android.thememanager.gliobal_config.config.overlay
com.android.wallpapercropper
com.miui.miwallpaper.overlay
com.miui.miwallpaper.overlay.customize
com.mi.globallayout
com.miui.systemui.carriers.overlay
com.qti.qualcomm.datastatusnotification
com.google.android.overlay.modules.permissioncontroller
com.google.android.overlay.modules.permissioncontroller.forframework
com.miui.core.internal.services
com.miui.system
com.qualcomm.qti.poweroffalarm
com.qti.service.colorservice
com.alibaba.aliexpresshd
com.block.puzzle.game.hippo.mi
com.sukhavati.gotoplaying.bubble.BubbleShooter.mint
com.crazy.juicer.xm
com.google.android.apps.tachyon
com.google.android.apps.docs
com.logame.eliminateintruder3d
com.google.android.apps.magazines
com.google.android.apps.podcasts
com.google.android.videos
com.jewelsblast.ivygames.Adventure.free
com.google.android.apps.photos
com.spotify.music
com.mintgames.triplecrush.tile.fun
com.mi.global.bbs
com.google.android.apps.youtube.music
com.amazon.mp3
com.zhiliaoapp.musically
com.miui.wallpaper.overlay
com.miui.wallpaper.overlay.customize
com.kingsgroup.ss.xiaomi
com.ss.android.ugc.trill
com.miui.android.fashiongallery
com.miui.securityadd
com.android.thememanager
com.miui.securitycore
com.google.android.overlay.gmsconfig.common
com.google.android.overlay.gmsconfig.geotz
com.google.android.overlay.gmsconfig.gsa
com.miui.notification
com.google.android.ext.shared
com.android.smspush
com.qualcomm.qti.qccauthmgr
com.android.se
com.android.musicfx
com.miui.global.packageinstaller
com.android.proxyhandler
com.qti.snapdragon.qcdm_ff
com.qualcomm.qti.ridemodeaudio
com.android.soundpicker
com.miui.misound
com.qualcomm.qti.xrcb
com.qualcomm.qti.xrvd.service
Click to expand...
Click to collapse
To uninstall apps using ADB use this code:​
adb shell pm uninstall --user 0
Click to expand...
Click to collapse

Categories

Resources