http://uploaded.to/?id=ma0u71 - HTC Diamond - stock - 1.34.831.1 - ROM - WWE
Enjoy
tupisdin said:
http://uploaded.to/?id=ma0u71 - HTC Diamond - stock - 1.34.831.1 - ROM - WWE
Enjoy
Click to expand...
Click to collapse
anyone have an rapidshare link? uploaded.to blows...
What's the core?
19585? not 19581
Core 19588.
kewl thnks PhamQuang bro
SYS: 5.2.19581.1101 -> \SYS(LANG)\Autoupdate_Lang_0409\89fc53c1-ec65-4648-9972-24afb3dcad3c.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Base_Lang_0409_DPI_192\5cad3bed-e21d-4768-a965-5e359d6d32b8.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Bluetooth_Lang_0409\ba94b89b-3bb8-4f41-bada-121dbdab1fde.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Browsing_Lang_0409\f65c1b88-2732-470a-88c8-de964e9f9ca7.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Bth_A2DP_Lang_0409\9ca8818d-8eec-479d-a9be-81305c52d303.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Bth_HID_Lang_0409\c9b03c4a-50ff-4e86-b92f-2eb3f9968eb3.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Catalog_Lang_0409\33ee5583-5698-4cc4-bc01-47743f5cc5cd.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Enterprise_Lang_0409\abf26ee8-18d2-42c7-b355-1ff0d582d792.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Enterprise_Lang_0409_DPI_192\0a50114c-65c7-4b33-b2e1-490070653abf.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Entertainment_Lang_0409\2401a89d-1c1a-448a-b204-051d1866e37f.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Entertainment_Lang_0409_DPI_192\1ff5ad39-05ff-4fed-8797-1b94b62dbd40.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Fwupdate_Lang_0409\141bf632-56d3-4f0b-a808-c2fd1f40065d.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\IPSECVPN_Lang_0409\0ebf993d-b6af-4a12-b6da-fceb49c9690b.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\MediaOS_Lang_0409\71da3033-fae4-442a-9fc6-8182fd7b974f.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Office_Lang_0409\6226602c-2ba3-40bf-83e4-ea9173088ac9.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Office_Lang_0409_DPI_192\2c656d9c-d8a3-4a5c-93b8-57d13b5dbaa6.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\OneNote_lang_0409\d83b7202-2af0-4199-af12-d073bc63732f.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Phone_Lang_0409\25f4da29-9280-48e9-8f2e-28a91294ce74.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Phone_Lang_0409_DPI_192\5e1147c6-380d-467e-a646-2f8e63d6b1a8.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\PhoneRedist_Lang_0409\70bf28e9-b87c-4b43-be51-e804d08276b1.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\PhoneRedist_Lang_0409_DPI_192\37d983b9-32ef-4b74-ad2d-4bf227434aca.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Redist_Lang_0409\12e09329-dd44-4d62-a5b7-25124bb2ef88.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Redist_Lang_0409_DPI_192\41ae8aba-7577-4c7f-bede-7ec53105498f.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\RemoteDesktopMobile_Lang_0409\b58170c7-67d4-4f57-af5b-a4134867f4d4.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\SqlCeMobile_Lang_0409\90f7cab5-db46-4341-b395-7aca3d47055c.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Transcriber_Lang_0409\5f9ca691-2a85-4db5-b6a0-ce35ef2618dc.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\Transcriber_Lang_0409_DPI_192\ed78a746-d604-478b-a359-dbbbf88fa1f8.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\WelcomeCenter_Lang_0409\37ed0d5d-7978-4dcf-b3f9-2768426fb1bf.dsm
SYS: 5.2.19581.1101 -> \SYS(LANG)\WindowsLive_Lang_0409\6949fb3f-d582-4e5d-9d11-15f960afc045.dsm
SYS: 5.2.19581.1101 -> \SYS\AUTOUPDATE\8be73c02-3437-4c06-88c9-0a2e25bfaf2c.dsm
SYS: 5.2.19581.1101 -> \SYS\base_dpi_192_resh_480_resv_640\4e453988-2990-4f66-8d21-b1e375182c7e.dsm
SYS: 5.2.19581.1101 -> \SYS\Browsing_DPI_192\31851e81-cb8e-4508-b36b-64706380c16a.dsm
SYS: 5.2.19581.1101 -> \SYS\Bth_HID\a492bb92-210b-4933-9a65-272cc8ad9a5b.dsm
SYS: 5.2.19581.1101 -> \SYS\CommonNonEA\7bb5f499-6b7f-4ee0-bcb9-a89ae3fc3e2c.dsm
SYS: 5.2.19581.1101 -> \SYS\DRM\29306538-2ad1-42a5-8414-502a65277eb5.dsm
SYS: 5.2.19581.1101 -> \SYS\Enterprise\fd7ec796-412f-4352-9a71-04da841dc265.dsm
SYS: 5.2.19581.1101 -> \SYS\Enterprise_DPI_192\297557a9-7937-47c0-a5dc-ca70ac0d3492.dsm
SYS: 5.2.19581.1101 -> \SYS\Entertainment\0cfc3dc0-5fbc-4153-9ce9-72df4d8c2922.dsm
SYS: 5.2.19581.1101 -> \SYS\Entertainment_DPI_192\1f037daf-1ebb-49ff-b6b8-9e3bda1bcbb7.dsm
SYS: 5.2.19581.1101 -> \SYS\FWUPDATE\23ba5346-78b8-4436-b7d2-f30712c3cef4.dsm
SYS: 5.2.19581.1101 -> \SYS\GPSID\d13b7447-0248-462a-bba4-d868f31642ed.dsm
SYS: 5.2.19581.1101 -> \SYS\INTERNETSHARING\ed0ab1a4-a456-4fb0-ad9d-93feccf351a3.dsm
SYS: 5.2.19581.1101 -> \SYS\IPSECVPN\429b237a-cc04-4166-a65b-5cd54a4f1b7d.dsm
SYS: 5.2.19581.1101 -> \SYS\IPSECVPN_DPI_192\4a84adf3-cb38-4e3d-9ee9-19efad6958e5.dsm
SYS: 5.2.19581.1101 -> \SYS\MediaOS_dpi_192_resh_480_resv_640\59340c3c-b30c-438d-8128-0c0e14c18866.dsm
SYS: 5.2.19581.1101 -> \SYS\Office_DPI_192\9510f529-0d35-4218-8d8d-a5fb34b6ab25.dsm
SYS: 5.2.19581.1101 -> \SYS\OneNote\2f863e61-941d-4fb6-bcdf-35bf606e613a.dsm
SYS: 5.2.19581.1101 -> \SYS\Phone_DPI_192\9e13ae76-4e06-4a04-8d8a-42ac632cab1c.dsm
SYS: 5.2.19581.1101 -> \SYS\Phone_dpi_192_resh_480_resv_640\77eb8dac-ca45-480e-aca3-bb6db056ea56.dsm
SYS: 5.2.19581.1101 -> \SYS\PhoneRedist_DPI_192\2a9e3618-ebed-4b3d-b501-a0baa6742283.dsm
SYS: 5.2.19581.1101 -> \SYS\ppgprov\7562ae5a-418d-4b4b-ae27-5bd29dfd9393.dsm
SYS: 5.2.19581.1101 -> \SYS\Redist_dpi_192_resh_480_resv_640\9b1b925a-6f1f-47d2-92d0-140632d19135.dsm
SYS: 5.2.19581.1101 -> \SYS\SampleMusic\7949cb6e-e0ad-41ec-b61f-f1aa4f6b122e.dsm
SYS: 5.2.19581.1101 -> \SYS\SIM_TKit\1dc3da02-499f-4547-9fd2-78cddfda9c62.dsm
SYS: 5.2.19581.1101 -> \SYS\SMIME\8cb4ac12-6bc5-4bda-ab45-539988c36a95.dsm
SYS: 5.2.19581.1101 -> \SYS\SMS_Providers\582f7a58-3c50-4301-970a-ed5ec8947692.dsm
SYS: 5.2.19581.1101 -> \SYS\SQLCE\8a1287c3-da0a-4eb8-8ba7-b70019890abb.dsm
SYS: 5.2.19581.1101 -> \SYS\SqlCeMobile\29356830-10de-437d-ad6a-6c7d60a7dea4.dsm
SYS: 5.2.19581.1101 -> \SYS\SQM\76bd787c-86b5-4b63-a1d8-1a910f86c8e1.dsm
SYS: 5.2.19581.1101 -> \SYS\Transcriber\60fa7e75-fb9b-45c0-b99c-16d9182e9f72.dsm
SYS: 5.2.19581.1101 -> \SYS\WindowsLive_DPI_192\f0326319-2644-4c54-8e69-2c1d84d767b7.dsm
SYS: 5.2.19581.1101 -> \SYS\WWAN\77f38251-db87-4e5d-96d9-9e8e35b6dc1d.dsm
SYS: 5.2.19588.1104 -> \SYS(LANG)\Base_Lang_0409\813fd1d1-ca6f-4b6d-96d2-c97fb99bd535.dsm
SYS: 5.2.19588.1104 -> \SYS(LANG)\Base_Lang_0409_DPI_192_RESH_480_RESV_640\e3f1876e-2ebd-4a41-bcc1-0fbfadb15c44.dsm
SYS: 5.2.19588.1104 -> \SYS\Base_DPI_192\86311d83-c59a-4fa7-9eec-c19dd059f21b.dsm
SYS: 5.2.19588.1104 -> \SYS\BaseApps\f50e9a40-aed9-497a-bdea-84451210e960.dsm
SYS: 5.2.19588.1104 -> \SYS\BaseAppsFiles\b04e8c7f-f0f6-4201-83c6-4876404128c9.dsm
SYS: 5.2.19588.1104 -> \SYS\Bluetooth\25c125d4-0a18-487d-a709-9b4242bbf4c3.dsm
SYS: 5.2.19588.1104 -> \SYS\BROWSING\b183f2a7-06c3-4f27-9679-7baf97e94efa.dsm
SYS: 5.2.19588.1104 -> \SYS\BROWSINGCORE\d81b11e0-3299-4b65-8305-78f1fa03dc07.dsm
SYS: 5.2.19588.1104 -> \SYS\BTDUN\d7904a7e-6226-443b-8c8c-439683b0b55a.dsm
SYS: 5.2.19588.1104 -> \SYS\Bth_A2DP\6b4ed31c-5ced-41b2-b917-2c006f046a5e.dsm
SYS: 5.2.19588.1104 -> \SYS\Catalog\e4200be3-87fc-4415-9a57-d96456c4ba10.dsm
SYS: 5.2.19588.1104 -> \SYS\MediaOS\ae879543-c73e-4888-812b-d8177c404612.dsm
SYS: 5.2.19588.1104 -> \SYS\MediaOSFiles\da5e9e89-c2c4-4ff9-ae88-c90a50ec09c9.dsm
SYS: 5.2.19588.1104 -> \SYS\Office\331439cf-a636-4243-8424-e501be3a39d2.dsm
SYS: 5.2.19588.1104 -> \SYS\OS\d0b41563-b345-4444-aa15-986e7c7fff99.dsm
SYS: 5.2.19588.1104 -> \SYS\OSFiles\b51fcecc-a738-463b-93a4-7b44d03c30b7.dsm
SYS: 5.2.19588.1104 -> \SYS\Phone\2a6583ff-6047-46cc-b9be-b7deca1152c3.dsm
SYS: 5.2.19588.1104 -> \SYS\PhoneRedist\d9d7d86d-3f83-4289-bd32-aa1972a1447e.dsm
SYS: 5.2.19588.1104 -> \SYS\Redist\208f8be6-1362-45b3-ae17-95d4ab426c11.dsm
SYS: 5.2.19588.1104 -> \SYS\Redist_DPI_192\7815d5a3-2281-4eec-911d-1a924ebf48d5.dsm
SYS: 5.2.19588.1104 -> \SYS\RemoteDesktopMobile\adc19413-37b2-4018-af8a-148b50f6ea13.dsm
SYS: 5.2.19588.1104 -> \SYS\RUNTIMES\e658c544-26bf-45ac-a458-2044a5d1e698.dsm
SYS: 5.2.19588.1104 -> \SYS\Shell\1f1aca24-d942-464a-9281-10567741499c.dsm
SYS: 5.2.19588.1104 -> \SYS\WelcomeCenter\40723732-841f-40d3-8dd0-af7d0d6156de.dsm
SYS: 5.2.19588.1104 -> \SYS\WindowsLive\27790533-c966-4097-8a93-c1a83969c574.dsm
[Language]
0409 - English (United States) -> \SYS(LANG)\Base_Lang_0409\813fd1d1-ca6f-4b6d-96d2-c97fb99bd535.dsm
[DPI]
192 -> \SYS\Base_DPI_192\86311d83-c59a-4fa7-9eec-c19dd059f21b.dsm
can anyone help in guiding on how to port this build SYS to other ppc, like elfin or touch? i tried my hand and it did flash well, but screwed up a few control panel applets and contacts.. got something to do with the MyCPL.cpl and few entries.. hope someone can guide me
How to download
yanghw said:
How to download
Click to expand...
Click to collapse
you dont download it
tupisdin said:
http://uploaded.to/?id=ma0u71 - HTC Diamond - stock - 1.34.831.1 - ROM - WWE
Enjoy
Click to expand...
Click to collapse
thanks bro, already ported this XIP n SYS to Elfin
thanks a lot
2 weeks back, this would have made my day. I wanted to cook my own rom based on diamond. but i got stuck and gave up when my bootloader got screwed
Mirrored this for ya ppls.
Clickety.
Mirror
This is a direct download link: http://rapidshare.com/files/1177086...K_WWE_1.34.831.1_52.24.25.08_0.93.25_Ship.exe
Does it work on HTC Prophet?
German_LuTz said:
Does it work on HTC Prophet?
Click to expand...
Click to collapse
it will.. you will have to port it first
Lot Of Fun!!!!
Thanks now we have a lot of FUN !!! trying to port some of the apps inside this ROM to other devices... I will try to do for trinity... also manila, donĀ“t have so much hope for it to work... but I will try...
Others, like new Camera app, think may work fine... i will try ALL!!! packages!!!
Thanks a lot for sharing.
Thanks tupisdin !
ababrekar said:
can anyone help in guiding on how to port this build SYS to other ppc, like elfin or touch? i tried my hand and it did flash well, but screwed up a few control panel applets and contacts.. got something to do with the MyCPL.cpl and few entries.. hope someone can guide me
Click to expand...
Click to collapse
guys, experts any help here?
Nice release bro
Do you think anyone make an release for htc prophet?
Because I was struggling to find them, I create a thread to offer the information I gathered.
So, here is a small list of the builds number and their equivalent OS version:
10.0.10586.0 -> 10.0.13052.0
10.0.10586.11 -> 10.0.13058.11
10.0.10586.29 -> 10.0.13065.29
10.0.10586.36 -> 10.0.13067.36
10.0.10586.63 -> 10.0.13070.63
10.0.10586.71 -> 10.0.13073.71
10.0.10586.107 -> 10.0.13080.107
10.0.10586.122 -> 10.0.13086.122
10.0.10586.164 -> 10.0.13090.164
10.0.10586.218 -> 10.0.13111.218
10.0.10586.242 -> 10.0.13125.242
10.0.10586.318 -> 10.0.13169.318
Hello i tought it share my findings here
Huawei P20 Partitions
Code:
HWEML:/dev/block/platform/ff3c0000.ufs/by-name $ ls -la
total 0
drwxr-xr-x 2 root root 1300 2018-03-28 14:54 .
drwxr-xr-x 4 root root 1420 2018-03-28 14:54 ..
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 bootfail_info -> /dev/block/sdd18
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 cache -> /dev/block/sdd58
lrwxrwxrwx 1 root root 15 2018-03-28 14:54 certification -> /dev/block/sdd5
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 cust_a -> /dev/block/sdd56
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 ddr_para -> /dev/block/sdd15
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 dfx -> /dev/block/sdd20
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 dto_a -> /dev/block/sdd43
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 dts_a -> /dev/block/sdd42
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 erecovery_kernel_a -> /dev/block/sdd35
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 erecovery_ramdisk_a -> /dev/block/sdd36
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 erecovery_vbmeta_a -> /dev/block/sdd48
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 erecovery_vendor_a -> /dev/block/sdd37
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 fastboot_a -> /dev/block/sdd28
lrwxrwxrwx 1 root root 15 2018-03-28 14:54 frp -> /dev/block/sdc1
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 fw_hifi_a -> /dev/block/sdd32
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 fw_lpm3_a -> /dev/block/sdd22
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 hdcp_a -> /dev/block/sdd24
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 hhee_a -> /dev/block/sdd26
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 hisee_encos -> /dev/block/sdd13
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 hisee_fs_a -> /dev/block/sdd27
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 hisee_img_a -> /dev/block/sdd25
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 isp_boot_a -> /dev/block/sdd30
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 isp_firmware_a -> /dev/block/sdd31
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 kernel_a -> /dev/block/sdd38
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 misc -> /dev/block/sdd19
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 modem_fw_a -> /dev/block/sdd45
lrwxrwxrwx 1 root root 15 2018-03-28 14:54 modem_om -> /dev/block/sdd8
lrwxrwxrwx 1 root root 15 2018-03-28 14:54 modem_secure -> /dev/block/sdd3
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 modemnvm_backup -> /dev/block/sdd10
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 modemnvm_cust_a -> /dev/block/sdd51
lrwxrwxrwx 1 root root 15 2018-03-28 14:54 modemnvm_factory -> /dev/block/sdd9
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 modemnvm_img -> /dev/block/sdd11
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 modemnvm_system -> /dev/block/sdd12
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 modemnvm_update_a -> /dev/block/sdd50
lrwxrwxrwx 1 root root 15 2018-03-28 14:54 nvme -> /dev/block/sdd4
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 odm_a -> /dev/block/sdd57
lrwxrwxrwx 1 root root 15 2018-03-28 14:54 oeminfo -> /dev/block/sdd6
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 patch_a -> /dev/block/sdd52
lrwxrwxrwx 1 root root 15 2018-03-28 14:54 persist -> /dev/block/sdc2
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 product_a -> /dev/block/sdd55
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 ramdisk_a -> /dev/block/sdd39
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 recovery_ramdisk_a -> /dev/block/sdd40
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 recovery_vbmeta_a -> /dev/block/sdd47
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 recovery_vendor_a -> /dev/block/sdd41
lrwxrwxrwx 1 root root 15 2018-03-28 14:54 reserved1 -> /dev/block/sdc3
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 reserved2 -> /dev/block/sdd16
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 reserved3_a -> /dev/block/sdd23
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 reserved4_a -> /dev/block/sdd46
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 rrecord -> /dev/block/sdd21
lrwxrwxrwx 1 root root 15 2018-03-28 14:54 secure_storage -> /dev/block/sdd7
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 sensorhub_a -> /dev/block/sdd34
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 splash2 -> /dev/block/sdd17
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 system_a -> /dev/block/sdd59
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 teeos_a -> /dev/block/sdd33
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 trustfirmware_a -> /dev/block/sdd44
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 userdata -> /dev/block/sdd60
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 vbmeta_a -> /dev/block/sdd49
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 vector_a -> /dev/block/sdd29
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 vendor_a -> /dev/block/sdd54
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 veritykey -> /dev/block/sdd14
lrwxrwxrwx 1 root root 16 2018-03-28 14:54 version_a -> /dev/block/sdd53
lrwxrwxrwx 1 root root 15 2018-03-28 14:54 vrl -> /dev/block/sdd1
lrwxrwxrwx 1 root root 15 2018-03-28 14:54 vrl_backup -> /dev/block/sdd2
Code:
HWEML:/system $ df -h
Filesystem Size Used Avail Use% Mounted on
rootfs 1.4G 12M 1.4G 1% /
tmpfs 1.7G 684K 1.7G 1% /dev
/dev/block/dm-0 4.3G 3.2G 1.1G 75% /system
/dev/block/dm-1 747M 688M 44M 94% /vendor
/dev/block/dm-2 120M 110M 7.2M 94% /odm
/dev/block/dm-3 27M 516K 26M 2% /version
/dev/block/dm-4 182M 114M 64M 65% /product
/dev/block/dm-5 182M 44M 134M 25% /cust
tmpfs 1.7G 0 1.7G 0% /mnt
none 1.7G 0 1.7G 0% /sys/fs/cgroup
/dev/block/sdd60 111G 3.6G 106G 4% /data
/dev/block/sdd58 122M 60K 119M 1% /cache
/data/media 111G 4.9G 106G 5% /storage/emulated
Hope it helps some one
Can you check for this? https://www.xda-developers.com/how-to-check-android-device-supports-seamless-updates/
Here we go
Cant get the unlock code from the huawei site then i would try phh AOSP
Yes the P20 Lite ANE-LX1 is also Treble enabled but is A only
crucky said:
Here we go
Cant get the unlock code from the huawei site then i would try phh AOSP
Click to expand...
Click to collapse
Hey please tell me what you did?
I just remote helped a guy to bootloader unlock his demo unit
Sent from my DUK-L09 using Tapatalk
IMEI SN Missmatch always the same on the P20 Lite Demo Unit it worked
EDIT:I Saw you posted a tutorial for unlock will try it now with my demo unit
LastStandingDroid said:
Hey please tell me what you did?
I just remote helped a guy to bootloader unlock his demo unit
Click to expand...
Click to collapse
How did you unlock the Demo Unit? Mine has OEM lock and I can't unlock it in the developer options.
Nogorka said:
How did you unlock the Demo Unit? Mine has OEM lock and I can't unlock it in the developer options.
Click to expand...
Click to collapse
Simply by enable developer options and tick oem unlock? You'd have to ask the guy who owns it
Sent from my DUK-L09 using Tapatalk
LastStandingDroid said:
Simply by enable developer options and tick oem unlock? You'd have to ask the guy who owns it
Click to expand...
Click to collapse
The owner is a Provider because it's a Demo unit from "my" shop. And i can't enable the OEM unlock option, it's grayed out. I thought you could help me with unlocking it, sorry!
Nogorka said:
The owner is a Provider because it's a Demo unit from "my" shop. And i can't enable the OEM unlock option, it's grayed out. I thought you could help me with unlocking it, sorry!
Click to expand...
Click to collapse
Greyed out? Sounds like they disabled it.
Is it the demo version which has the demo app? Because on the p20 pro it was possible to unlock. And it was demo store unit
Sent from my DUK-L09 using Tapatalk
LastStandingDroid said:
Greyed out? Sounds like they disabled it.
Is it the demo version which has the demo app? Because on the p20 pro it was possible to unlock. And it was demo store unit
Click to expand...
Click to collapse
Yeah, there ist the retail Demo on it, and a "explore P20" app too. Okay.. than ill have to wait till somebody know how to enable the OEM unlock. Thanks a lot!
Nogorka said:
Yeah, there ist the retail Demo on it, and a "explore P20" app too. Okay.. than ill have to wait till somebody know how to enable the OEM unlock. Thanks a lot!
Click to expand...
Click to collapse
Hello i own a Demo phone to EML-L29 non-pro you can enable oem unlock by factory reseting and connecting wifi also turn on developer options then and connect and disconnect the type c usb.After a while i could enable it and unlocked the bootloader of the demo unit running phh treble aosp rom
crucky said:
Hello i own a Demo phone to EML-L29 non-pro you can enable oem unlock by factory reseting and connecting wifi also turn on developer options then and connect and disconnect the type c usb.After a while i could enable it and unlocked the bootloader of the demo unit running phh treble aosp rom
Click to expand...
Click to collapse
Could you try
https://mega.nz/#!xGYSiSCS!cgkEfytbI_D8BUl2HjQB1qtGuTPc7Rw2630HIHXxGKE
Eml patched
Sent from my DUK-L09 using Tapatalk
LastStandingDroid said:
Could you try
https://mega.nz/#!xGYSiSCS!cgkEfytbI_D8BUl2HjQB1qtGuTPc7Rw2630HIHXxGKE
Eml patched
Sent from my DUK-L09 using Tapatalk
Click to expand...
Click to collapse
Yes will try it tomorrow because today i need my phone and iam currently running phh AOSP not Demo Stock
crucky said:
Yes will try it tomorrow because today i need my phone and iam currently running phh AOSP not Demo Stock
Click to expand...
Click to collapse
That shouldn't matter should work on both stock and phh
Sent from my DUK-L09 using Tapatalk
Can confirm works great Deinstalled the Demo APK
crucky said:
Can confirm works great Deinstalled the Demo APK
Click to expand...
Click to collapse
Do you mean that you're running AOSP with magisk patched boot image on Huawei P20 (EML)?
No switched back to stock. but will try it now again with phh AOSP somone here with a C432 P20 EML-L29 ? maybe you can give me a dump of CUST ? then i would try to rebrand from my demo C652. @LastStandingDroid maybe we can find a solution for rebrand ? because i modded CUST partition the only problem i have now i cant set fingerprint or faceunlock because of that its very annoying. @ectroplasma22 do you have it ? Maybe you could grab the full package firmware ? Still isnt avaible @ FF only funkyhuawei
Great news guys.
There a working twrp for you guys
Bad news I can't share since user who created it is banned.
Also decryption won't work. So it's basically useless for mate P20 pro users.
Good thing lite/regular should be good to go. If having a external Sd!
Edit it did not
Picture tells u what to Google for. Please do not ask for link!
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Sent from my DUK-L09 using Tapatalk
Ok the patched ramdisk isnt working with RROS
xiaomi A3 laurel_sprout partitions table
Code:
18:29 ALIGN_TO_128K_1 -> /dev/block/sdd1
18:29 ALIGN_TO_128K_2 -> /dev/block/sdf1
18:29 abl_a -> /dev/block/sde8
18:29 abl_b -> /dev/block/sde29
18:29 apdp -> /dev/block/sde45
18:29 bk03 -> /dev/block/sde54
18:29 bluetooth_a -> /dev/block/sde5
18:29 bluetooth_b -> /dev/block/sde26
18:29 boot_a -> /dev/block/sde11
18:29 boot_b -> /dev/block/sde32
18:29 catecontentfv -> /dev/block/sde61
18:29 catefv -> /dev/block/sde60
18:29 cateloader -> /dev/block/sde51
18:29 cdt -> /dev/block/sdd2
18:29 cmnlib64_a -> /dev/block/sde13
18:29 cmnlib64_b -> /dev/block/sde34
18:29 cmnlib_a -> /dev/block/sde12
18:29 cmnlib_b -> /dev/block/sde33
18:29 ddr -> /dev/block/sdd3
18:29 devcfg_a -> /dev/block/sde14
18:29 devcfg_b -> /dev/block/sde35
18:29 devinfo -> /dev/block/sde43
18:29 dip -> /dev/block/sde44
18:29 dsp_a -> /dev/block/sde9
18:29 dsp_b -> /dev/block/sde30
18:29 dtbo_a -> /dev/block/sde18
18:29 dtbo_b -> /dev/block/sde39
18:29 frp -> /dev/block/sda5
18:29 fsc -> /dev/block/sdf5
18:29 fsg -> /dev/block/sdf4
18:29 gsort -> /dev/block/sde62
18:29 hyp_a -> /dev/block/sde3
18:29 hyp_b -> /dev/block/sde24
18:29 imagefv_a -> /dev/block/sde19
18:29 imagefv_b -> /dev/block/sde40
18:29 keymaster_a -> /dev/block/sde10
18:29 keymaster_b -> /dev/block/sde31
18:29 keystore -> /dev/block/sda4
18:29 limits -> /dev/block/sde48
18:29 logdump -> /dev/block/sde53
18:29 logfs -> /dev/block/sde50
18:29 mdtp_a -> /dev/block/sde7
18:29 mdtp_b -> /dev/block/sde28
18:29 mdtpsecapp_a -> /dev/block/sde6
18:29 mdtpsecapp_b -> /dev/block/sde27
18:29 metadata -> /dev/block/sda14
18:29 minidump -> /dev/block/sda11
18:29 misc -> /dev/block/sda3
18:29 modem_a -> /dev/block/sde4
18:29 modem_b -> /dev/block/sde25
18:29 modemst1 -> /dev/block/sdf2
18:29 modemst2 -> /dev/block/sdf3
18:29 multiimgoem -> /dev/block/sde56
18:29 multiimgqti -> /dev/block/sde57
18:29 odm_a -> /dev/block/sda8
18:29 odm_b -> /dev/block/sda9
18:29 oem -> /dev/block/sda10
18:29 persist -> /dev/block/sda2
18:29 product_a -> /dev/block/sda6
18:29 product_b -> /dev/block/sda7
18:29 qupfw_a -> /dev/block/sde15
18:29 qupfw_b -> /dev/block/sde36
18:29 rawdump -> /dev/block/sde52
18:29 rpm_a -> /dev/block/sde1
18:29 rpm_b -> /dev/block/sde22
18:29 secdata -> /dev/block/sde59
18:29 splash -> /dev/block/sde47
18:29 spunvm -> /dev/block/sde46
18:29 ssd -> /dev/block/sda1
18:29 storsec -> /dev/block/sde55
18:29 storsec_a -> /dev/block/sde21
18:29 storsec_b -> /dev/block/sde42
18:29 system_a -> /dev/block/sda12
18:29 system_b -> /dev/block/sda13
18:29 toolsfv -> /dev/block/sde49
18:29 tz_a -> /dev/block/sde2
18:29 tz_b -> /dev/block/sde23
18:29 uefisecapp_a -> /dev/block/sde20
18:29 uefisecapp_b -> /dev/block/sde41
18:29 uefivarstore -> /dev/block/sde58
18:29 userdata -> /dev/block/sda15
18:29 vbmeta_a -> /dev/block/sde17
18:29 vbmeta_b -> /dev/block/sde38
18:29 vendor_a -> /dev/block/sde16
18:29 vendor_b -> /dev/block/sde37
18:29 xbl_a -> /dev/block/sdb1
18:29 xbl_b -> /dev/block/sdc1
18:29 xbl_config_a -> /dev/block/sdb2
18:29 xbl_config_b -> /dev/block/sdc2
Works with:
- Xiaomi Redmi Note 9
- Xiaomi Redmi 10X 4G
Build Date:
2020/09/20
Android Version:
QP1A.190711.020
Display ID:
AL2522-Merlin-V044-Q-0920
Build Fingerprint:
Redmi/merlin/merlin:10/QP1A.190711.020/17:userdebug/test-keys
Security Patch:
2019-12-05
Radio/Modem/Baseband Version:
MOLY.LR12A.R3.MP.V94.3
Download:
https://www.mediafire.com/file/4nky...V044-Q-0920_QP1A.190711.020_by-VD171.zip/file
Password:
Pass is in the attached file: PASSWORD_by_VD171.txt
How to flash it?
Use the attached scatter file.
Radio/Modem/Baseband properties:
Code:
md1_dbginfodsp=DbgInfo_DSP_MT6768_MOLY_LR12A_R3_MP_V94_3_2019_12_31_16_23.xz
md1_dbginfo=DbgInfo_LR12A.R3.MP_HUAQIN_Q0MP1_MT6769_SP_MOLY_LR12A_R3_MP_V94_3_2020_08_12_17_38.xz
md1_mddbmeta=MDDB.META_MT6768_S00_MOLY_LR12A_R3_MP_V94_3.EDB
md1_mddbmetaodb=MDDB.META.ODB_MT6768_S00_MOLY_LR12A_R3_MP_V94_3.XML.GZ
md1_mddb=MDDB_InfoCustomAppSrcP_MT6768_S00_MOLY_LR12A_R3_MP_V94_3.EDB
Prop.default:
Code:
ro.build.version.incremental=17
ro.vendor.build.version.incremental=17
ro.odm.build.version.incremental=17
ro.build.version.security_patch=2019-12-05
ro.vendor.build.security_patch=2019-12-05
ro.build.display.id=AL2522-Merlin-V044-Q-0920
ro.vendor.mediatek.version.release=alps-mp-q0.mp1.tc8sp2-V1.4_huaqin.q0mp1.k69v1.64_P1
ro.product.system.device=merlin
ro.product.system.model=merlin
ro.product.system.name=merlin
ro.build.product=merlin
ro.product.board=merlin
ro.product.vendor.device=merlin
ro.product.vendor.model=merlin
ro.product.vendor.name=merlin
ro.product.odm.device=merlin
ro.product.odm.model=merlin
ro.product.odm.name=merlin
ro.product.product.device=merlin
ro.product.product.model=merlin
ro.product.product.name=merlin
ro.build.flavor=merlin-userdebug
ro.build.description=merlin-userdebug 10 QP1A.190711.020 17 test-keys
ro.board.platform=mt6768
ro.system.build.id=QP1A.190711.020
ro.build.id=QP1A.190711.020
ro.vendor.build.id=QP1A.190711.020
ro.odm.build.id=QP1A.190711.020
ro.product.build.id=QP1A.190711.020
ro.system.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/17:userdebug/test-keys
ro.vendor.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/17:userdebug/test-keys
ro.bootimage.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/17:userdebug/test-keys
ro.odm.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/17:userdebug/test-keys
ro.product.build.fingerprint=Redmi/merlin/merlin:10/QP1A.190711.020/17:userdebug/test-keys
ro.system.build.tags=test-keys
ro.build.tags=test-keys
ro.vendor.build.tags=test-keys
ro.odm.build.tags=test-keys
ro.system.build.type=userdebug
ro.build.type=userdebug
ro.vendor.build.type=userdebug
ro.odm.build.type=userdebug
ro.system.build.date=Sun Sep 20 21:42:19 CST 2020
ro.build.date=Sun Sep 20 21:42:19 CST 2020
ro.vendor.build.date=Sun Sep 20 21:42:19 CST 2020
ro.bootimage.build.date=Sun Sep 20 21:42:19 CST 2020
ro.odm.build.date=Sun Sep 20 21:42:19 CST 2020
ro.product.build.date=Sun Sep 20 21:42:19 CST 2020
MD5 hashes:
Code:
APDB_MT6768_S01__W1953 -> 3adfe0c4e41828cd51ed783da774bd08
boot-debug.img -> d83c79ff64413cee79261a019598843b
boot.img -> cf47a73562cfd84a7337b37637eb8cef
cache.img -> 3cf2afe595f5bce984fe128b0c7ffad7
Checksum.ini -> d7d0d34a198008b9e6fb0c05ae541473
crclist.txt -> 92dd74d56feaecf23e79df4f48f84d5b
cust.img -> e8c4e9f4ee0fe5052cf0dc356aedd8de
DbgInfo_LR12A.R3.MP_HUAQIN_Q0MP1_MT6769_SP_MOLY_LR12A_R3_MP_V94_3_2020_08_12_17_38_1_ulwctg_n -> e0403cc778e00cb658cd02b609ab07c2
dtb.img -> ec4b37b164f1bd9ce6f2b1b911ac0872
dtbo-verified.img -> 5ca7b2b8dbbcd5e8239fc86b9e7b5d19
dtbo.img -> 5ca7b2b8dbbcd5e8239fc86b9e7b5d19
efuse.img -> 421f2cead0fbea555680b96136555941
exaid.img -> e8c4e9f4ee0fe5052cf0dc356aedd8de
flash_all.bat -> a4c24e0551a1386f6e51f36d2d6bdc59
flash_all.sh -> dc8d312852f0a8ac1eb19bbf1aa548b4
flash_all_except_data_storage.bat -> b87fa122acd47a2c56f395d827279e85
flash_all_except_data_storage.sh -> 31d39c3cca6c4cc9d1faada57df05631
flash_all_lock.bat -> 4f72649c336b7851456dd195b054553d
flash_all_lock.sh -> ddc1c485c8ae8bdd3b7aa6c25f4aec68
flash_gen_md5_list.py -> dd670ee88280d308473a7aff355b975d
hat_extract.py -> cbf07a5e8389476f4ed71e34dcbd7591
hat_flash.sh -> fa3bdd091388cdb3fff69421cf4187cd
lk-verified.img -> fb9cf4a240ebca771322c8c8b1cbee0f
lk.img -> fb9cf4a240ebca771322c8c8b1cbee0f
logo.bin -> e5d5093b5d3c4a194717d286ae40b440
md1arm7.img -> a0453e723dc84255940d7791740d06db
md1img-verified.img -> 5d366d0581c6b7b6cee7c571994a9ed3
md1img.img -> 5d366d0581c6b7b6cee7c571994a9ed3
md3img.img -> 9a9c185e3f6234103e5949716b9962d2
MDDB.META.ODB_MT6768_S00_MOLY_LR12A_R3_MP_V94_3_1_ulwctg_n.XML.GZ -> e6a7041c231f66869b7f99e4cb059047
MDDB.META_MT6768_S00_MOLY_LR12A_R3_MP_V94_3_1_ulwctg_n.EDB -> 90f2b755306720c9a027f847940aadab
MDDB_InfoCustomAppSrcP_MT6768_S00_MOLY_LR12A_R3_MP_V94_3_1_ulwctg_n.EDB -> c70b510b9b27f5cce9d26c7e8330fe01
MT6768_Android_scatter.txt -> 0a8f16b2276ee9c37337a3937f71a7c8
preloader.img -> ff20fc3953e5118120a86453e7ae8f94
preloader_emmc.img -> ff20fc3953e5118120a86453e7ae8f94
preloader_merlin.bin -> d2c78e614adf75b98b2b6de74dfb4675
preloader_ufs.img -> 75476892bff904450c5ae508b2eb77f7
product.img -> 70caf1a9a02a51c7d9ab82da995179b3
ramdisk-debug.img -> b6048055b240d3c9f6933544b86416b5
ramdisk-recovery.img -> 2b548447b982a6479c337248cb107923
ramdisk.img -> 545ec84cf25662d1e4f4cf7e496fa56e
recovery.img -> f3d00ee3de8ba4598318c3a80fdbad63
scp-verified.img -> 59c5f50b8c122a4ee24d02a24aa61c24
scp.img -> 59c5f50b8c122a4ee24d02a24aa61c24
secro.img -> 096587b863e1252d67b1b8307291db09
sparsecrclist.txt -> f86c5c6014c64c10f2dc46e5c83cab8e
spmfw-verified.img -> e35bd811230ff7766be8eb25e6c5be75
spmfw.img -> e35bd811230ff7766be8eb25e6c5be75
sspm-verified.img -> 92c771de8cf02d3f0b9f43ae53518218
sspm.img -> 92c771de8cf02d3f0b9f43ae53518218
super.img -> 6afd5e925807b8a2c42c9cbc731972ff
super_empty.img -> a6d56d7a12d989bf31511d866449291d
system.img -> 08c18ce6844b539e4ac3317195c0485b
tee-verified.img -> 56721dfff0af3f502b5bbb8d9d0006c1
tee.img -> 56721dfff0af3f502b5bbb8d9d0006c1
userdata.img -> 0a3dc9f623c1206749ad1093bfa44081
vbmeta.img -> 5003b40cb64cfcd77b9f85fc2cc8f478
vbmeta_system.img -> f67c111ba47702b2e81cd366fa169bec
vbmeta_vendor.img -> 69e70abba51250749258e53e3f6d681d
vendor.img -> 39af156489f31da6b1d2243e5daa6973
Please can someone help me because I flashed this eng rom on my bootloader unlocked redmi Merlin with IMEI null issue, after flashing the phone stays in miui logo for ever. I have tried the versions of engineering rom available both here and halabtech site. The version of the current stock firmware on my device was V12.5.4. Please any help as to get the IMEI number of the phone back.
What is the difference between v1, v2 and v3?
Is there anything that specific one should be used?