User Tools

Site Tools


doc:appunti:hardware:xiaomi_redmi_6

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
doc:appunti:hardware:xiaomi_redmi_6 [2019/05/19 10:18] – [Web References] niccolodoc:appunti:hardware:xiaomi_redmi_6 [2019/05/21 09:29] – [Xiaomi Redmi 6 Android Phone] niccolo
Line 6: Line 6:
 {{:img:star_empty.png?nolink&28|}} {{:img:star_empty.png?nolink&28|}}
 {{:img:star_empty.png?nolink&28|}} {{:img:star_empty.png?nolink&28|}}
 +
 +A brief review focused on **obtaining root privileges** and software de-bloating.
 +
 +| {{:img:pros_icon.png?nolink&36|}}  | Good **quality/price** ratio\\ 3 Gb **RAM**\\ Android **Oreo 8.1**  |
 +| {{:img:cons_icon.png?nolink&36|}}  | Unfriendly **rooting** procedure, with some issues\\ Bootloader **unlock requires MS-Windows** software\\ MIUI O.S. filled with **bloatware**\\ Double **privacy leak**: Google and Xiaomi apps\\ Non replaceable **battery**  |
  
 ^ Model            | Redmi 6  | ^ Model            | Redmi 6  |
Line 101: Line 106:
 When you run the TWRP Recovery for the first time, you can install **Magisk**. It provides the **su** program, the actual super-user command, and the **Magisk Manager**, the app which manages root permissions. We downloaded the **Magisk-v19.1.zip** file from the **[[https://github.com/topjohnwu/Magisk/releases|GitHub releases page]]** (4.7 Mb, md5sum 1205486d9302e2e8ea03d67bd1f67aa3). We copied the file to the **/sdcard** directory of the phone. When you run the TWRP Recovery for the first time, you can install **Magisk**. It provides the **su** program, the actual super-user command, and the **Magisk Manager**, the app which manages root permissions. We downloaded the **Magisk-v19.1.zip** file from the **[[https://github.com/topjohnwu/Magisk/releases|GitHub releases page]]** (4.7 Mb, md5sum 1205486d9302e2e8ea03d67bd1f67aa3). We copied the file to the **/sdcard** directory of the phone.
  
 +**NOTICE**: Does not know if it matters: **I don't have cryptography enabled on the phone**. I think that this will easy any action performed from recovery. From phone settings: **Impostazioni** => //Impostazioni aggiuntive// => //Privacy// => //Crittografia e credenziali// => **Crittografa il dispositivo usando la password della schermata di blocco** (disabled).
 ==== 1st method: failed ==== ==== 1st method: failed ====
  
Line 134: Line 140:
   - Start **TWRP** as seen above.   - Start **TWRP** as seen above.
   - Mount **system** and **vendor** partitions. From TWRP //Main menu//, //Mount//, tap //System// and //Vendor//. Then tap back.   - Mount **system** and **vendor** partitions. From TWRP //Main menu//, //Mount//, tap //System// and //Vendor//. Then tap back.
 +  - Execute **Install Root**. From TWRP //Main Menu//, //Advanced//. This option installs Magisk 19.0.
   - Execute **Sign Boot**. From TWRP //Main Menu//, //Advanced//, //Sign Boot//, //Swipe to Confirm//. Then tap back.   - Execute **Sign Boot**. From TWRP //Main Menu//, //Advanced//, //Sign Boot//, //Swipe to Confirm//. Then tap back.
-  - Install **Magisk**. From TWRP //Main Menu//, //Install//, tap on //Magisk-v19.1.zip// file, (do not verify signature, do not reboot) //Swipe to confirm Flash//. After flashing tap the **Wipe Cache/Dalvik** button.+  - Optional: install **Magisk 19.1**. From TWRP //Main Menu//, //Install//, tap on //Magisk-v19.1.zip// file, (do not verify signature, do not reboot) //Swipe to confirm Flash//. After flashing tap the **Wipe Cache/Dalvik** button.
   - **Reboot to System**.   - **Reboot to System**.
 +
 +**NOTICE**: The LR.Team TWRP 3.3.0-0423 image **contains Magisk 19.0** (unpack the img file and extract the ramdisk content, you will find a ''/supersu/SuperSU_installer.zip'' file, which actually is Magisk). This is the **default root method**, and it is executed inside TWRP with the **Install Root** title.
 +
 +**NOTICE**: Some recipes on the net say to flash also **LazyFlash** or some other **DM Verity Disabler** tool. It seems that it is not longer require with Magisk 19. Infact, during Magisk installation, we read a log line stating **Removing dm(avb)-verity in dtb** (see ''/common/boot_patch.sh'' of the SuperSU_installer.zip file). By the way, the LR.Team TWRP image contains also the ''/supersu/no-verity-opt-encrypt.zip'' file into the ramdisk image, which actually is the LazyFlasher installer.
 +
 +**NOTICE**: It seems that flashing the **para** partition is a non-permanent action. If you want to boot into another recovery from the fastboot mode, you have to flash it again witht the dummy **misc.bin**.
  
 FIXME Sometimes the **/sbin/su** command **disappears**. It happened after a **system crash** (trying to remove one system app via //Titanium Backup//) or after a simple **system reboot**, or doing a **reboot from TWRP menu**. Fortunately enough, it was sufficient to reboot into TWRP Recovery and reinstall **Magisk-v19.1.zip**. FIXME Sometimes the **/sbin/su** command **disappears**. It happened after a **system crash** (trying to remove one system app via //Titanium Backup//) or after a simple **system reboot**, or doing a **reboot from TWRP menu**. Fortunately enough, it was sufficient to reboot into TWRP Recovery and reinstall **Magisk-v19.1.zip**.
doc/appunti/hardware/xiaomi_redmi_6.txt · Last modified: 2019/08/02 18:36 by niccolo