[ROM][G96xF/DS/FD/N][ALEXNDR] * UHFVB4 * DevBase v7.4 * Encryption support [Mar-25]

Search This thread

Nigcra

Member
Oct 16, 2015
19
1
Nothing has been working with Magisk 23.0 for a while now. No matter if it is the 2FA or the NFC app of my bank.
 

charsta

Senior Member
Dec 22, 2011
79
4
Hello all! I had some issues with an older version of this rom, so I decided to flash the latest release. However I noticed that Play Store says that the device is not certified and CTS profile is failing. Is there any way to fix that?
I read in previous comments that I can use Magiskhide props or/and the Universal SafetyNet Fix module.
However I'm not sure what I should use and how.
I already clean install the rom twice so I don't want to messed it up again!!
 

kost7

Senior Member
Oct 2, 2009
211
150
Google Pixel 4 XL
Hello all! I had some issues with an older version of this rom, so I decided to flash the latest release. However I noticed that Play Store says that the device is not certified and CTS profile is failing. Is there any way to fix that?
I read in previous comments that I can use Magiskhide props or/and the Universal SafetyNet Fix module.
However I'm not sure what I should use and how.
I already clean install the rom twice so I don't want to messed it up again!!
For me just USFNF v.2.1.2 (along with Riru) was sufficient to pass all Safety Net tests.
 
  • Like
Reactions: killer777

TheAKAlias

Senior Member
Mar 27, 2014
94
27
Hi guys. So I've a soft brick at my hands and have probably lost my encrypted data.

@_alexndr Can you confirm that the only way I've left - to unbrick my device - includes a complete ODIN factory reset that will include effectively wiping my external sdcard? Or is there a way around?

What happened:

1. downloaded the latest v7.4
2. moved v7.4 install file to external sd
3. booted into twrp and performed system partition backup (system image, system, recovery, boot)
4. initiated via twrp a dirty flash
4.1 received error messager after 1 second: damaged zip file
5. rebooted into sysem - WORKED
5.1 realized my SDcard was not mounted and the system tried to "encrypting sdcard 10%/11%/..."
5.2 shut down system immediately
6. repeated step 5 with same results
7. booted into twrp and tried to restore from backup (system image, system, recovery, boot)
7.1 received error message "extracttarfork() process ended with error=255"
8. rebooted into system and rebooted into twrp
9. performed full restore only "system image"
10. booted into system - same as before, in step 5; immediately shut down
11. tried to boot into twrp without success; bootloader 1 error message: "could not do normal boot. INVALID KERNEL LENGTH"

I am a bit screwed here, i think?

the funny thing is that

(a) a OS boot still required me to enter my encryption pin
(b) the OS itself had no sdcard access/mounting issues apparently, same for TWRP partially. HOWEVER, the TWRP system backup was stored on my external SD card - How was TWRP even able to perform a restore from it, if it could not read /data and the sdcard in the first place?

Don't know what exactly went wrong... thanks for any hints in advance
 

spamtrash

Senior Member
Nov 9, 2008
1,038
241
Krasnoyarsk
Hi guys. So I've a soft brick at my hands and have probably lost my encrypted data.

...

Don't know what exactly went wrong... thanks for any hints in advance
1. ALWAYS check the md sum of the downloaded/copied file. Message in your p. 4.1 suggests that the file was corrupt on some stage? Your point 11 can be a result of this as well, I think.
2. I'd personally neither use nor advice to perform a dirty flash on the encrypted device
3. The behaviour you've described is correct one, please read first post by @_alexndr :
"Regardless of the above root options, starting from DevBase v4.4+, you can also use "encrypt" option (place "encrypt" string anywhere in the ZIP file name, e.g. "G960Fxxx_DevBase_v6.x_encrypt.zip"). All your data will be encrypted "on-the-fly" at next boot after ROM update/reinstall. Wipe data is NOT necessary to use this option. You will NOT lose your data & apps but it is extremely important - do not interrupt encryption process during this "special" boot! "
You've interrupted the process, so I am almost sure that the data are gone now.
I would recommend you the spoiler: "Notes related to encrypted devices:" in the first post as well, as it contains the reply to your question: "Can you confirm that the only way I've left - to unbrick my device - includes a complete ODIN factory reset that will include effectively wiping my external sdcard?"
Anyway, how to recover back to normal?
I do not have access to your device, so actually I am unsure what is the status of it (is it visible to PC in TWRP mode if connected by USB? Can u use adb commands? etc.) so the advice must be pretty generic:
1. Yes, I'd download latest stock ROM using Frija or whatever you prefer
2. Flash with Odin
3. BOOT the device to system and (Again, a personal preference: I hide all my personal data using EDS by Sovworks, paid version because of my laziness as it is compatible with VeraCrypt, TrueCrypt and LUKS and in paid and rooted phone mode it can mount encrypted partitions as FAT, NTFS, EXT4, EXT3, EXT2 and ExFAT and IMHO is better and safer as I am mounting the encrypted partition only while needed, for example when I want to access specific data files or use the KeePass database) DO NOT input security which would trigger encryption on this stage
4. Install TWRP (read the thread and decide which version. Even in the first post you will find the interesting info about the encryption and TWRP version correlations)
5. Download the DevBase and check the checksums to confirm that the file is not damaged;
6. Flash the ROM via TWRP (you can use the "encrypt" option now if you really like it this way
7. Reboot and DO NOT interrput the sdcard encryption (again, pls refer to first post)
8. REMEMBER: before flashing ANYTHING make the BACKUP
 
  • Like
Reactions: TheAKAlias

TheAKAlias

Senior Member
Mar 27, 2014
94
27
Hi spamtrash! Thanks for the answer.

Your points regarding not interrupting encryption are helpful. Also, in the future I'll the check the md sum; but I need to figure out how to do that in android first :D

However, I've dirty flashed multiple times before to a an updated version of Alexndr's ROM - and never encountered problems. Also, not (consciously) saw the "encrypting SD card" after boot after a dirty flash.

I actually just flash twrp recovery via odin and it fixed the boot issue. I.e. now I can boot into system OS as well, normally and encrypted.

I still receive the "encrypting SD card" message which I still prevent by shutting down again immediately. I am not sure what the process actually does, and I cannot stop it from within the system. It also does only encrypt 8,5 GB (out of 400 GB SD card). Which is why I am not sure what the process is about to encrypt....

Might it be possible that the system is just encrypting my latest TWRP backup (about 8,5 bg in size) - so as you and Alexndr write,... this also happens after every SD card change in TWRP?

In any case... as far as I understand, all my data should still be on the SD card (i can read the file tree via Windows). But for some reason, TWRP and sytem just fail to mount the sd card.

Might the "encrypting sdcard..." process be about some sort of "remounting" the encrypted SD card? Technically, my not modified system ROM should be able to restore the SD card without losing data...?
 
Last edited:
  • Like
Reactions: spamtrash

TheAKAlias

Senior Member
Mar 27, 2014
94
27
So just took the risk and letthe encryption process finish. Now, the SD card works perfectly fine again.

Lessons learned for me:

(1) always check the hash sum of ROM updates
(2) changes to SD card in TWRP require a partially reencryption after reboot

Still don't know how the recovery/boot sector got corrupted...

//edit

Ok so I found the issue.... or actually the feature *wall*

If you encrypted your sd card, now wonder the recovery cannot flash from it, as the file is encrypted!! ... and twrp for 965 does not have the capability to read the encryption (as it has with other devices). So.... i need to use an unencrypted sdcard going forward to flash the ROM. :)
 
Last edited:
  • Like
Reactions: spamtrash

Qa117

New member
Dec 24, 2021
3
0
Download ROM

S9 (SM-G960F/DS/FD):

>> G960FXXSHFUJ2_DevBase_v7.4.zip << (Android 10, updated Nov-13-2021, more info HERE)

S9+ (SM-G965F/DS/FD):
>> G965FXXSHFUJ2_DevBase_v7.4.zip << (Android 10, updated Nov-13-2021, more info HERE)

SM-G96xF/DS/N repository:
>> S9/S9+ repository << [ AFH | MediaFire ]

Note:
Check MD5 sum BEFORE flash (useful TOOL), because flashing damaged or incomplete ZIP files could (soft) brick your phone! Correct MD5 sum is shown on the AndroidFileHost website while downloading.
This rom doesn't fit for 9650
 

spamtrash

Senior Member
Nov 9, 2008
1,038
241
Krasnoyarsk
So ... flash the ROM. :)
Excellent work, overall. I'd encourage you to play with phone (Samsung Galaxy S series is relatively difficult to brick ;)
One hint: I've noitced that you were struggling with checksum on the phone. My personal recommendation: use PC to download, verify checksum and then proceed. Risk of corrupting the file while copying to the phone is minor and if you'd be sure that you have a "good" file on your PC - you do not need to re-download (makes life a bit easier).
Regarding encryption of 8.5GB vs 400GB - a hint: what's the volume of data stored on SDCard?
Last but not least: it is obvious that if your SDCard is encrypted, the Recovery mode will not have access to it: the purpose of encryption is to keep the data encrypted until user boots into the system and authorises himself. Otherwise, the encryption would be pointless as all the data would be unprotected for any thief who would steal the phone and would be able to flash a recovery. It's a feature, not a bug ;)
Hope that you will not abandon XDA and while learning from your own failures, errors and faults - one day wou will be able to try to help others, sharing your experience.
What, actually, I am trying to do in my spare time.
 

spamtrash

Senior Member
Nov 9, 2008
1,038
241
Krasnoyarsk
This rom doesn't fit for 9650
Good, very good discovery.
so, you have found that ROM which is for 960F/DS/FD OR G965F/DS/FD OR G96xF/DS/N does not work for device 9650?
It indeed deserves the Nobel's prize, my young Einstein.

If I'd be you, I would complain to my math teacher in primary school that she/he was not able to tech me the difference between:
9650 and:
960F;
960DS;
960FD;
965F;
965DS;
965FD;
96xF;
96xDS;
95xN????
I'd seriously consider (if I'd be you) to request at least cost of the books to be reimbursed.
 

hotwert

Member
Feb 23, 2011
15
2
Hello all! I had some issues with an older version of this rom, so I decided to flash the latest release. However I noticed that Play Store says that the device is not certified and CTS profile is failing. Is there any way to fix that?
I read in previous comments that I can use Magiskhide props or/and the Universal SafetyNet Fix module.
However I'm not sure what I should use and how.
I already clean install the rom twice so I don't want to messed it up again!!
It seems Magiskhide doesn't work anymore because they have a new method to detect root. My banking app doesn't work either.

I tried anything, Magisk canary Version with zgisk, etc... Nothing works.

You need at least Android 11 to use Magiskhide again.
 

G_c_

Member
May 2, 2017
13
0
Kind help required, whenever I try to install this rom without root (including "noroot" in the package name), I soft brick the device (the galaxy s9 logo appears and then the device turns off and then this cycle repeats), there is an error shown in the recovery stating /odm not mounted: no such directory found, I've used the recommended recovery version (3.2.X), what am I doing wrong? I don't want root, since the banking apps don't work.
 

bilbonotry

Senior Member
Aug 21, 2008
503
164
It seems Magiskhide doesn't work anymore because they have a new method to detect root. My banking app doesn't work either.

I tried anything, Magisk canary Version with zgisk, etc... Nothing works.

You need at least Android 11 to use Magiskhide again.
I was able to use Google pay and my banking apps with this ROM. Had Magisk 23, hid Google stuff and banking apps, installed universal safety net fix and riru modules. Had to follow the procedure in another module thread (in a nutshell switch to plane mode, delete Google apps data, delete some value in dg.db of Google pay, reboot, switch off plane mode) but YMMV.
Edit : in fact I did what this module does https://forum.xda-developers.com/t/...s-17-1-22-on-pie.3929950/page-9#post-79643248
 
Last edited:

hotwert

Member
Feb 23, 2011
15
2
I have a problem with Bluetooth, I can connect to my speaker and headphone without any problem. It reconnects once I paired them.

But then I activate airplane mode, and deactivate it, it forgets all Bluetooth connections and I have to pair them again.

When I don't use airplane mode for weeks, it works perfect. But once I use it just for a second, all paired connections are lost...
 

jonsnow69

Member
Dec 21, 2010
16
2
I have a problem with Bluetooth, I can connect to my speaker and headphone without any problem. It reconnects once I paired them.

But then I activate airplane mode, and deactivate it, it forgets all Bluetooth connections and I have to pair them again.

When I don't use airplane mode for weeks, it works perfect. But once I use it just for a second, all paired connections are lost...
This is expected, it happens with rooted Samsung roms, there's a Magisk Module that fixes it: Bluetooth Library Patcher
 

Top Liked Posts

  • There are no posts matching your filters.
  • 1
    Much better than stock
  • 195
    Important notes for Developers / Chefs !!!

    This ROM is NOT based on any other custom ROM. My work contains many original ideas and innovations that I introduced as the first in the ROM development (see "Changelist" in post #2). Of course, it does not mean that I do not need to thank anyone - there are people who helped / inspired me anyhow (see "Credits").

    I will risk the statement that at this moment my "DevBase" is the most tuned and nuanced custom ROM available at XDA Forum :cool:

    I agree to use any part of my work to create other custom ROMs, but it would be great if you add me to the credits :)

    EDIT: Note related to creating "$ZIPFILE" which contains a file larger than ~4GB (e.g. system.img): the order of adding content to "$ZIPFILE" is very important! META-INF need to be added as the first dir in the archive! Example (my DevBase case):
    Code:
    zip -r -9 G96xFXXU1xxxx_DevBase.zip META-INF options.prop ALEXNDR
    It seems that misunderstanding of the above problem is the main reason why many devs give up and do not use my base as a pattern.

    Hello :)

    I have decided to create a pure base with my unified installer (should work with many other Samsung devices), which can be a pattern for ROM Chefs (not only for beginners) :D ROM is initially safe de-bloated (read below what does it exactly mean), but all features are present and works!

    ROM can be installed by normal users as well. If you like a little de-bloated ROMs, clean but with all working features - probably there is no better alternative :D

    ROM for G96xF/DS/FD contains OXM multi CSC package, list of available CSCs is as follow:

    ACR, AFG, AFR, ATO, AUT, BGL, BNG, BRI, BTC, BTU, CAC, CAM, CAU, CEL, CPW, DBT, DKR, ECT, EGY, EUR, GLB, ILO, INS, ITV, KSA, LAO, LUX, LYS, MAT, MID, MM1, MWD, MYM, NEE, NPL, NZC, OPS, ORX, PAK, PCL, PHE, PHN, PNG, PTR, ROM, SEB, SEE, SEK, SIN, SKZ, SLK, SMA, SMP, STH, TEB, TEL, THL, THR, TMC, TNZ, TPH, TUN, TUR, VAU, VFJ, VNZ, WTL, XEF, XEH, XEO, XEU, XEZ, XFA, XFE, XME, XNX, XNZ, XSA, XSG, XSP, XTC, XXV

    ROM for G96xN contains OKR multi CSC package, list of available CSCs is as follow: KOO, KTC, LUC, SKC

    NEW !!! :D I present you new, unique option: "Keep current CSC", so you can install my DevBase keeping your original CSC even if it is not listed above! Note that in such case this option has some limitations - more informations you can find in related older threads, e.g. HERE


    ALEXNDR.G96xFXXUHFVB4:

    1. Base:
    - Odexed (original stock files) + stock kernel
    - Multi CSC OXM (list of natively supported CSC as above) (*)
    - Removed KNOX related content (useless on rooted phones)
    - Removed Rlc.apk & vaultkeeperd (to avoid "OEM unlock issue")
    - Rooted systemlessly (Magisk v23.0) (*)
    - All original features are present and works (except KNOX related apps)
    - Added "App Lock" feature (Settings -> Advanced features)
    - No visual changes (100% stock look)

    2. CscFeature MOD (enabled some built-in, hidden features):
    - Added shutter sound menu in Camera app
    - Sending/receiving MMS without data on
    - Show SMS/MMS sending time instead of receiving
    - Added "Call/Message block" option in Settings
    - Added "Show network speed" toggle (Settings -> Display -> Status bar)
    - Added "LTE Only" network mode (NOTE: voice calls may not work in this mode)
    - 4G/3G network support in any CSC (master/slave SIM, applies to dual SIM variants)
    - Call Recording (via "Record" button or "Auto record calls" option)
    - Enabled "Recent App Protection" feature

    3. Xposed framework & Xposed Installer app [optional] (*)
    - NOTE: Applies to Oreo DevBase. There is no Xposed for Pie yet

    4. Virtual / physical Safe De-Bloat (more info below) (*)
    What does it mean and why is it called "safe"?

    - ONLY apps available in stores are removed / skipped in DevBase, so you can easy (re)install any of these app if you like
    - ONLY pre-installed system apps are removed / skipped, DevBase installer will never touch any updated app nor app installed manually from a store
    - By default virtual Safe De-Bloat is applied with exact same effect as physical (completely skips apps at boot). You can force to delete apps physically but it is recommended only if you really need more space in /system

    Thus, the following conclusions can be drawn:

    1. If you install my DevBase directly over stock ROM without performing "Wipe data" - in most cases almost all these apps will remain untouched, because almost all apps have been updated already (stored on /data). But then you will be able to remove any useless app using the "Application manager", like any other app. Removed manually app will not appear again until you use my DevBase while updating.

    2. If you perform "Wipe data" while installing my DevBase - then all apps listed below will be removed. If you would like to use any of these apps - just install it manually from appropriate store. Installed manually app will not be removed during the next DevBase update.

    Removed / skipped apps list:

    Excel
    Facebook
    LinkedIn
    OneDrive
    PowerPoint
    Word

    (*) - these options can be controlled by editing options.prop file (you can find such file in ZIP's root directory). Just place modified options.prop file (use e.g. Notepad++ to edit) in the root directory of internal emulated scdard (/data/media/0) or extSdCard (recommended if you plan to format internal emulated sdcard) and then start the installation. More info below:

    #
    # DevBase by ALEXNDR (_alexndr @ XDA)
    #
    # Configuration file to allow customize the installation.
    #
    # File inside the ZIP installer is just for reference - please DO NOT modify it!
    # If you want to change some options listed below - edit the copy of this file, then place
    # modified options.prop file in the root directory of internal emulated scdard (/data/media/0)
    # or in the root directory of extSdCard (recommended if you plan to format internal emulated
    # sdcard) and then start the installation.
    #
    # TIP: You do not need to repeat this step every next update I will release. As long as your
    # customized options.prop file is present in the (ext)SdCard - future DevBase installers will
    # "read in your mind" that you want to install with such options again.
    #
    # NOTE: All below variables and values are case sensitive!

    # Enable root access. Allowed values:
    # true - install Magisk as root solution (default)
    # false - do not root device

    root=true

    # Install Xposed framework matched to the ROM (there is also a possibility to detect Xposed profile
    # automatically, but auto-detection will not work if user will perform wipe /system). Allowed values:
    # auto - detect Xposed profile automatically
    # true - force Xposed framework installation
    # false - do not install Xposed framework

    xposed=auto

    # CSC Selection. Allowed values:
    # KCSC - Keep current CSC, recommended in most cases (automatic selection or keep current CSC contents).
    # You can force the use of natively supported CSC by typing (use UPPERCASE!): ACR, AFG, AFR, ATO, AUT, BGL,
    # BNG, BRI, BTC, BTU, CAC, CAM, CEL, CPW, DBT, DKR, ECT, EGY, EUR, GLB, ILO, INS, ITV, KSA, LAO, LUX, LYS,
    # MAT, MID, MM1, MWD, MYM, NEE, NPL, NZC, OPS, ORX, PAK, PCL, PHE, PHN, PNG, PTR, ROM, SEB, SEE, SEK, SIN,
    # SKZ, SLK, SMA, SMP, STH, TEB, TEL, THL, THR, TMC, TNZ, TPH, TUN, TUR, VAU, VFJ, VNZ, WTL, XEF, XEH, XEO,
    # XEU, XEZ, XFA, XFE, XME, XNX, XNZ, XSA, XSG, XSP, XTC, XXV

    CSC=KCSC

    # Custom CSC Features. Allowed value in each line: <Example_line>value</Example_line>

    <CscFeature_Common_SupportWcdmaInSlave>true</CscFeature_Common_SupportWcdmaInSlave>
    <CscFeature_VoiceCall_ConfigRecording>RecordingAllowed</CscFeature_VoiceCall_ConfigRecording>
    <CscFeature_Setting_EnableMenuBlockCallMsg>true</CscFeature_Setting_EnableMenuBlockCallMsg>
    <CscFeature_Setting_CustNetworkSelMenu4>LTEONLY</CscFeature_Setting_CustNetworkSelMenu4>
    <CscFeature_Setting_SupportRealTimeNetworkSpeed>true</CscFeature_Setting_SupportRealTimeNetworkSpeed>
    <CscFeature_SmartManager_ConfigSubFeatures>roguepopup|autoclean|autorestart|applock|trafficmanager</CscFeature_SmartManager_ConfigSubFeatures>
    <CscFeature_SmartManager_DisableAntiMalware>true</CscFeature_SmartManager_DisableAntiMalware>
    <CscFeature_SystemUI_SupportRecentAppProtection>true</CscFeature_SystemUI_SupportRecentAppProtection>
    <CscFeature_Message_DisplaySmsTimeAs>server</CscFeature_Message_DisplaySmsTimeAs>
    <CscFeature_Message_DisplayMmsTimeAs>server</CscFeature_Message_DisplayMmsTimeAs>
    <CscFeature_Camera_ShutterSoundMenu>true</CscFeature_Camera_ShutterSoundMenu>
    <CscFeature_RIL_ForceConnectMMS>true</CscFeature_RIL_ForceConnectMMS>

    # Custom physical debloat list. Allowed value in each line: path to app's directory in /system.
    # (NOTE: wildcards are allowed here)

    /system/*app/SamsungPass*
    /system/*app/SamsungPay*
    /system/*app/SecureFolder*
    /system/app/SecurityLogAgent
    /system/priv-app/Fast
    /system/priv-app/Rlc

    # Custom virtual debloat list. Allowed value in each line: exact app name with .apk extension.
    # (NOTE: without app's path/directory, wildcards are NOT allowed here!)

    Excel_SamsungStub.apk
    Facebook_stub.apk
    FBAppManager_NS.apk
    FBInstaller_NS.apk
    FBServices.apk
    FotaAgent.apk
    LinkedIn_SamsungStub.apk
    OneDrive_Samsung_v3.apk
    PowerPoint_SamsungStub.apk
    Word_SamsungStub.apk

    NEW !!! :D Starting from DevBase v3.0 there is a new customization method - you can change frequently switched root options or encrypt your device just by renaming installer's ZIP file name (instead of editing options.prop file). Currently supported "strings" in the file name: "noroot", "encrypt", "rescue", "xposed", "CSC_xxxx.zip":

    Case 1 (default) - install the ROM with Magisk & MagiskSU as root solution
    (just flash ZIP file "as it is")

    Case 2 - do not root device
    (place "noroot" string anywhere in the ZIP file name, e.g. "G96xFxxx_DevBase_v6.x_noroot.zip")

    Regardless of the above root options, starting from DevBase v4.4+, you can also use "encrypt" option (place "encrypt" string anywhere in the ZIP file name, e.g. "G960Fxxx_DevBase_v6.x_encrypt.zip"). All your data will be encrypted "on-the-fly" at next boot after ROM update/reinstall. Wipe data is NOT necessary to use this option. You will NOT lose your data & apps but it is extremely important - do not interrupt encryption process during this "special" boot! Booting can take much longer and you may think it is a bootloop, but it isn't! If you have a large amount of used data - it is recommended to connect your phone to the charger during boot (and open a beer to avoid heart attack while waiting). You do not need to use "encrypt" option again in case of another DevBase update(s) - please read carefully notes below.

    In DevBase ROM v4.5+ there is a "rescue" option, which may be especially helpful in case of encrypted device if you experienced bootloop caused by e.g. systemless mod/module/xposed stored on /data (without access to /data from TWRP). In case of bootloop just place "rescue" string anywhere in the ZIP file name, e.g. "G96xFxxx_DevBase_v6.x_rescue.zip" and then (re)install the ROM - should help in case of (probably) all possible bootloop reasons. In addition to the normal (re)installation of the ROM (thus restoring the original /system, kernel, modem, etc.) this option will also force "Core Only Mode" in Magisk and will move all SYSTEMLESS DevBase modifications to /data/devbase/system/.backup, before performing bind mounts, so original files will be used.

    In DevBase ROM v4.6+ there is a possibility to force CSC by renaming ZIP file name - this is the only case-sensitive variable which have to be put at the beginning of ZIP file name and must be folloed by "_" (due to the fact that there is a high risk that ZIP file name may contain CSC code accidentally). Example (to force CSC DBT): "DBT_G96xFxxx_DevBase_v6.x.zip".

    In DevBase ROM v5.6+ there is "xposed" option which allows you to force Xposed framework installation. It is NOT forced by default - you need to force it manually while installing ROM with Xposed first time, renaming ZIP's file name to e.g. "G96xFxxx_DevBase_v6.x_xposed.zip". Next ROM's updates will detect and apply Xposed profile automatically, unless you wipe /system - then auto detection is not possible.

    Notes related to encrypted devices:

    How to confirm that your data are encrypted:

    1. Go to TWRP and check if it is possible to mount /data. If NOT - all is ok :) "Failed to mount '/data' (invalid argument)" will be the a frequent message that you need to like in the future ;)

    How to update DevBase ROM to a newer version:

    1. Copy a newer DevBase ROM to extSdCard or OTG storage (you do NOT need to use "encrypt" option in ZIP file name again, if your device is encrypted already - it just remain encypted)
    2. Go to TWRP -> "Install" and flash ZIP file from extSdCard or OTG
    3. That's all :cool:

    The risk of data loss in case of encrypted devices, depending on the ROM scenario:

    1. DevBase only: VERY LOW RISK (*)
    2. Coming from other custom ROM with encrypted data - MEDIUM RISK (recommended backup)
    3. Installing other custom ROM over DevBase - MEDIUM RISK (recommended backup, anyway)
    4. Installing pure stock (using Odin) over DevBase (or over any other custom ROM) - VERY HIGH RISK (not recommended!)

    (*) There is still a risk to get into a bootloop if you install stuffs like: Xposed framework, incompatible Magisk or Xposed module, incompatible MOD, etc. In case of bootloop just try to use "rescue" option described above :)

    EDIT (Dec-01-2019): Very important info!!! Encryption will not be possible if you format /data using new TWRP (3.3.x-x). If you prefer encrypted device - it is highly recommended to use TWRP 3.2.3-x to format /data. If you are not sure which version you have used to format data - it is much better to perform clean install using TWRP 3.2.3-x to format /data before forcing encryption. More info HERE

    Notes related to EFS backup:

    During install, my ROM's installer always performs EFS backup to {storage}/.backup/efs (where {storage} may be /external_sd, /usb-otg, /sdcard - in the preferred order). It is recommended to copy EFS backup occasionally outside the phone and store in safe location (PC, OTG, etc). There are 2 backups - when you first time installed my ROM (efs_backup.tar.gz) and recent, created additionally, just in case (efs_recent.tar.gz). Most useful will be most probably the first one (efs_backup).

    You probably will never need these files, but sometimes s**t happens and restoring EFS backup may be the only one way to rescue your device!

    When do I need to restore EFS backup?
    - lost/invalid IMEI number
    - proper IMEI but unable to connect to the network
    - connected to the network but unable to make a call and/or transfer data
    - unrecoverable bootloop (even after clean DevBase install with default settings)

    NOTE: In contrast to many other custom ROMs - my installer uses gzip compression (*.img.gz) to store EFS backup(s). Restore command for your device is stored in txt file in the same directory with EFS backup. If you forgot command - you can read txt file containing proper command @ PC (Notepad) or even directly form TWRP using Terminal's 'cat' command, e.g.:

    Code:
    cat /external_sd/.backup/efs/efs_backup.txt

    NOTE: Do not panic, read the txt file peacefully and type command exactly as it is in TWRP's Terminal, then tap blue [enter] button. After all - please reboot device. If the problem was EFS related - your device just has been rescued :cool:

    Installation:
    TWRP recovery (KNOX 0x1): open file using "Install (Zip)" option and confirm operation. If you want to perform "clean install' - perform "wipe data/factory reset" BEFORE flashing Zip!

    Wipe data is NOT required if you are coming from stock ROM (already rooted) or a previous version of my DevBase (if you leave "Keep current CSC" option untouched in /options.prop or if you choose same CSC as you are currently using). In other cases - wipe data is highly recommended!

    I do not recommend using any additional "superwipes" or format /system before install my DevBase (my installer cleans your system well enough!).


    Credits:
    @samsung for awesome device & stock firmware base
    @Chainfire for systemless SuperSU and a lot of inspiration
    @topjohnwu for Magisk and another inspiration
    @rovo89 for Xposed framework & Xposed Installer app
    @fei-ke for omc-decoder
    @Zackptg5, @osm0sis & @jcadduono for no-verity*
    @Tkkg1994 for initial help with stock kernel's patches
    @corsicanu & @jesec for TWRP recovery
    @Duncan1982 & @bennebartsch for initial tests


    Hit Thanks button if you like my work. If you really appreciate my work - feel free buy me a coffee/beer (or flowers/wine for my wife who is patiently enduring my hobbies) :) https://www.paypal.com/donate/?business=RFGVQYRC34RVQ&currency_code=EUR

    Due to the fact, that some countries banned PayPal - I have created also Patreon site: https://www.patreon.com/_alexndr
    92
    Download ROM

    S9 (SM-G960F/DS/FD):

    >> G960FXXUHFVB4_DevBase_v7.4.zip << (Android 10, updated Mar-25-2022, more info HERE)

    S9+ (SM-G965F/DS/FD):
    >> G965FXXUHFVB4_DevBase_v7.4.zip << (Android 10, updated Mar-22-2021, more info HERE)

    SM-G96xF/DS/N repository:
    >> S9/S9+ repository << [ AFH | MediaFire ]

    Note:
    Check MD5 sum BEFORE flash (useful TOOL), because flashing damaged or incomplete ZIP files could (soft) brick your phone! Correct MD5 sum is shown on the AndroidFileHost website while downloading.
    32
    Changelog


    v7.4 (starting from G96xNKSU4FUC1 DevBase):

    - Fixed unzip issue which caused unexpected installation termination - applies to TWRP 3.5.0_9-1 and newer

    v7.3 (starting from G96xFXXS7DTB5 DevBase):

    - Fixed bootloop issue in case of Android Q and "noroot" scenario - thanks to @Zackptg5 for the up to date dm-verity disabler

    v7.2 (starting from G96xFXXU7DTB4 DevBase):

    - Fixed bootloop issue in case of Android Q and encrypted devices (applies to dirty update)

    v7.1 (starting from G96xFXXU7ZTA2 DevBase):

    - Potential fix for "make_ext4fs: not found" error in newer TWRP versions and in result "Failed! Not enough space..." message appears while applying CSC during install (applies to N960x devices)

    v7.0 (starting from G96xFXXU7ZSLC DevBase):

    - Initial support for Android Q / system-as-root devices

    v6.0 (starting from G96xFXXU2ZRKN DevBase):

    - Introduced logging entire installation process (to devbase_install.log file, placed in /data or /cache in case of encrypted devices). These logs may significantly increase the possibility of my help in case of problems with/after installation
    - Major imrovements/bugfixes/optimizations related to Android Pie support (e.g. takes care about special SELinux contexts for /odm content, introduced in Pie)
    - Removed SuperSU support. Changed allowed "root" variable value in options.prop to true/false (backward compatible with old options.prop)
    - Removed "skipblcp" option - baseband/modem will be always updated, bootloader need to be flashed separately (update is usually not mandatory)

    v5.9 (starting from G96xFXXU2BRG6 DevBase):

    - Changed device detection method to bootloader's prefix (instead of ro.product.*)
    - Improved support for applying custom mods automatically at each ROM's install/update, introduced in v5.6 (added support for etc, fonts, media & usr directories in {storage}/devbase/system)
    - Added support for custom {storage}/devbase/post-installation.sh script

    v5.8 (starting from G96xFXXU1BRE6 DevBase):

    - Improved unzip_flash function in the installer to detect properly more flashing errors (e.g. EXT4 partition mismatch)
    - Changed /odm flashing method to file based due to potential /odm partition mismatch (applies to carrier branded treble devices)
    - Minor optimizations/improvements in the installer (this time mainly to improve installation speed)
    - Busybox has been removed from /system/xbin to run properly some banking apps

    v5.7 (starting from G96xFXXU1ARD2 DevBase):

    - Improved/expanded built-in RMM lock prevention (thanks to @jesec for idea of overriding properties via factory.prop)
    - OEM unlock status will always be displayed correctly in Developer options (to avoid confusion) with stock kernel included in the DevBase ROM

    v5.6 (starting from G96xFXXU1ARCC DevBase):

    - Added "App Lock" feature (Settings -> Advanced features)
    - Added Xposed framework as installation option (it is NOT forced by default - you need to force it manually while installing with Xposed first time, e.g. by "xposed" string in ZIP's file name, but next ROM's updates will detect and apply Xposed profile automatically, unless you wipe /system - then auto detection is not possible)
    - Added support for applying custom mods automatically at each ROM's install/update by placing modded apps in {storage}/devbase/system/(priv-)app or placing modded framework files in {storage}/devbase/system/framework (where {storage} may be: /sdcard, /external_sd or /usb-otg)

    v5.5 (starting from G96xFXXU1ARCC DevBase):

    - Added support for flashing optional, CSC related partitions ($OMR, $PRELOAD)
    - Added possibility to update recovery (optional, performs update if exists $NAME/images/recovery.img)
    - Return to using only the original XML files in the CSC package (thanks to @fei-ke for omc-decoder)
    - Partition(s) may be wiped only by writing new block's image
    - Minor optimizations / improvements in the installer

    v5.4 (starting from G96xFXXU1ARC5 DevBase):

    - Big step forward in DevBase ROM customization ability - almost all current ROM features (hidden up to v5.3) have been moved to options.prop (you will be able to easy add new or remove current feature)
    - Return to dm-verity-opt-encrypt boot patcher if necessary (wherever it works well, there are still devices which need "no_verity" function introduced in v5.1)
    - Initial support for forcing (changing) CSC in case of devices with /odm as CSC location (NOTE: take care of EFS backup in case something will go wrong)
    - Initial support for encryption in case of G96xF/DS/FD (it is optional of course, not default)
    - Minor optimizations / improvements in the installer

    v5.3 (starting from G96xFXXU1ARC5 DevBase):

    - Improved algorithm of search & change "ro.security.vaultkeeper.feature" property to 0 (/system & /vendor)
    - Possibility to change CSC in case of S9/S9+ has been temporarily disabled for safety reasons (needs more research)

    v5.2 (starting from G96xFXXU1ARC5 DevBase):

    - Added support for devices with /odm as CSC location
    - Added support for flashing $ODM, $VENDOR, $KEYSTORAGE, $DQMDBG images
    - Added support for custom debloat list and custom CscFeature list in options.prop
    - options.prop file format has been changed to CR/LF (Windows) - more noob-proof solution, user can edit a copy of options.prop file even in Windows Notepad (the installer still supports ANY text format of options.prop file - Win/Unix/MAC)

    v5.1 (not released for G96xF):

    - Created new "no_verity" function in the installer, compatible with Samsung's Oreo, based on @Chainfire's patch tool (no-verity-opt-encrypt has been removed).

    v5.0 (not released for G96xF):

    - SYSTEMLESS DevBase has been removed due to the fact, that in case of modern devices/firmwares we need to perform many changes physically in /system anyway, so it loses the sense of use here. If you liked it - you can still install it separately from HERE (it does not need to be re-installed after ROM update as it is installed in /data)
    - Added "skipblcp" option to let users skip BL/CP update (additionally it disables auto-reboot when the installer finished work as it is just not necessary then)
    - Added "phydebloat" option to let users choose beetween virtual and physical debloat (to get more space in /system)
    - Other (minor) optimizations & improvements


    v4.6 (not released for G96xF):

    - Initial support for devices with /system/omc as CSC location
    - SYSTEMLESS DevBase updated to v2.0 (see changelog HERE)
    - Added possibility to force CSC by renamig ZIP filename. Due to the fact that trere are many different CSC and it is possible that $ZIPNAME may contain a CSC accidentally - to force CSC you need to put CSC in $ZIPNAME at the beginning and CSC must be followed by "_". Example $ZIPNAME (to force CSC DBT): "DBT_G96xFXXU3xxxx_DevBase.zip"
    - Added auto efs-backup during install. Installer will create first backup (efs_backup.img.gz) and recent backup (efs_recent.img.gz). The installer will prefer external storage as default backup location (/external_sd or /usb-otg) due to encryption support. MD5 sum and restore command will be stored in efs_backup.txt or efs_recent.txt file
    - Other (minor) optimizations & improvements, e.g. added more error messages in case of something went wrong during install

    v4.5 (not released for G96xF):

    - Added new "rescue" option (readable only as string in ZIP file name due to the fact, that we will need this option rarely). It can be a potentially very helpful option in case of bootloop @ encrypted device, caused by a systemless mod/module/xposed stored on /data (without access to /data from TWRP) - more info in post #1
    - SYSTEMLESS DevBase updated to v1.14 (see changelog HERE)

    v4.4 (not released for G96xF):

    - Added new "encrypt" option (readable only as string in ZIP file name due to the fact, that we need to do it only once). Now you can easy encrypt all data in your device, just during the ROM upgrade (without data loss).
    - SYSTEMLESS DevBase updated to v1.13 (see changelog HERE)

    v4.3 (not released for G96xF):

    - "root.supersu" & "root.magisk" variables in the options.prop file have been replaced by one "root" variable (dropped possibility to install both - SuperSU & Magisk - due to the fact that Magisk v13+ does not support SuperSU as root solution)
    - SYSTEMLESS DevBase updated to v1.9 v1.12 (see changelog HERE)

    v4.2 (not released for G96xF):

    - Added possibility to add systemlessly NEW apps to /data/devbase/system/(priv-)app (up to 5 apps in "app" & 5 apps in "priv-app"). The only condition is that you need to rename its directories to CustomApp[1...5] (e.g. CustomApp1, CustomApp2, etc..). These apps will remain even if you flash a new DevBase as corresponding dummy directories will exist in future DevBase updates
    - In case of DevBase update or re-installation - installer will not remove your custom entries in /data/devbase/system/build.prop and in *.xml files placed in /data/devbase/system/csc
    - SYSTEMLESS DevBase updated to v1.6 v1.8 (see changelog HERE)

    v4.1 (not released for G96xF):

    - Added full Magisk support - MagiskSU is now default root solution (ROM should pass SafetyNet with Magisk Hide enabled in settings)
    - Since systemless Xposed does not need to be re-installed every new DevBase I will release (in case of using the same root solution) - it makes no sense to keep it anymore as installation option
    - SYSTEMLESS DevBase updated to v1.5 (see changelog HERE)

    v4.0 (not released for G96xF):

    - A huge step in the systemless direction! DevBase installer now installs pure odexed stock ROM (just slightly debloated), then systemless SuperSU, then systemless DevBase, then (optionally) systemless Xposed
    - All Knox related applications are available again (except SecurityLogAgent, to prevent annoying security alerts)
    - Fake KNOX 0x0 status (check it in PhoneINFO app) - most of Knox related apps should work again, like in case of untouched KNOX flag
    - All mods known from previous DevBase versions (up to v3.x) now are applied systemlessly - all modified files (including modded apps) are placed in /data/devbase/system instead of physical /system partition. Mods section (#4) has been updated to install mods to /data/devbase/system/(priv-)app if systemless DevBase has been detected (otherwise will be installed as usual, to /system)
    - Deodex on-the-fly feature has been removed. If you really need deodexed ROM - you can install someone else's deodexed ROM, then systemless DevBase as an overlay
    - Init.d support has been removed as it is deprecated (use su.d instead)

    v3.8 (not released for G96xF):

    - Added hexpatch to root_from function (support for SM-N930x, thanks to @Chainfire)

    v3.7 (not released for G96xF):

    - Another major improvement/bugfix in deodex_from function (full support for 64 bit OS)

    v3.6 (not released for G96xF):

    - Major improvement/bugfix in deodex_from function (added "-g" switch to zip command - finally no issues in case of deodexed Android 6.0.1)

    v3.5 (not released for G96xF):

    - Improved root_from function (Android 5.1+) - added "setprop selinux.reload_policy 1" removal from init.rc (thanks to @Chainfire)
    - Fixed bug in new alghoritm for checking whether stock recovery should be installed or not (introduced in v3.4)
    - Added new functionality - installer will store a copy of patched stock kernel in /data for those who flashed custom kernel but for some reasons want to revert to the stock kernel (Android 5.1+)

    v3.4 (not released for G96xF):

    - Completely changed alghoritm for checking whether stock recovery should be installed or not (it applies to FlashFire users). Now it depends on previously used recovery (instead of checking KNOX flag which was not 100% reliable across devices/recoveries)

    v3.32 (not released for G96xF):

    - Updated set_csc, kcsc_backup, kcsc_restore functions to support more devices
    - Updated partition detection algorithm to support more devices
    - Fixed path to options.prop file placed in external sdcard in case of updating Marshmallow while using FlashFire
    - Minor intaller's optimizations/bugfixes

    v3.31 (not released for G96xF):

    - Potential fix for reported problems with root (rare cases)

    v3.3 (not released for G96xF):

    - Improved method of reading options from ZIP file name (previous was directory/path sensitive also)
    - Added support to mod_csc function for other than UNIX text format (it's a little ridiculous, but in case of some CSCs - original /system/csc/other.xml file has Windows or MAC text format!)
    - Initial support for options.prop file in CRLF text format (DOS/Windows)

    v3.21 (not released for G96xF):

    - Fixed installer's issue if there is a [space] present in ZIP filename or a directory containing DevBase (see #1728)

    v3.2 (not released for G96xF):

    - Another improvements in add_initd function (details - see v1.3)
    - Improvements in set_perm, set_perm_rec and root_from functions (recovery-independent structure)
    - Improvements in deodex_from function related to Android MM
    - New get_con function in the main sh script (useful for devs)
    - BusyBox updated to 1.22.1 (bionic) [no, this is NOT a mistake!]
    - Minor intaller's optimizations/bugfixes

    v3.1 (not released for G96xF):

    - Significantly improved "add_initd" function in the update-binary shell script. Added support for (probably) all available Samsung's platforms (e.g. Exynos) and all available firmwares (based on Android 4.4+)
    - In case of installation with Xposed framework installer checks if Xposed Installer app is present in /data/app and installs it automatically if necessary
    - Minor intaller's optimizations/improvements

    v3.0 (not released for G96xF):

    - Entire installer has been re-written from the scratch! All "magic" moved to update-binary which is a shell script. It opens up new possibilities never possible before!
    - Introduced new customization method - you can change most frequently switched options just by renaming installer's ZIP file name. Currently supported "strings" in the file name:
    "noroot" (means "do not root"), "deodex", "xposed", "initd" (no other comments are required, I hope..)
    - Starting from v3.0 init.d support is disabled by default

    v2.3 (not released for G96xF):

    - Added option to install suitable Xposed framework in one step while installing DevBase (for maximum comfort). There is a new xframework.sh script - device independent structure and full Android 5.1+/6.0+ support. Backup method is compatible with well known Xposed uninstallers (tested with @wanam's)

    v2.2 (not released for G96xF):

    - Significantly improved root_supersu.sh script - device independent structure and full Android 5.1+/6.0+ suport including on the fly kernel/ramdisk/sepolicy patching if necessary. SU binaries are still copied to /system as it is the best choice in case of custom ROMs
    - Changed order of performed operations in the updater-script due to new root_supersu.sh script advantages
    - Installer wipes partitions designated for RAW content (e.g. kernel / recovery image) before writing to them
    - Minor additions in dex_injector.sh script related to Android 6.0+

    v2.11 (not released for G96xF):

    - Fixed some minor installer's issues ("set_perm" function in set_csc.sh did not work correctly while using wildcards in the path (it was exclusively FlashFire issue! no problem with TWRP / CWM). Fortunately - only /system/etc/csc_*.txt were really "affected" - it didn't cause real issues as these files are empty)

    v2.1 (not released for G96xF):

    - As some people felt a bit disapointed / worried about DevBase v2.0 ROM file size - finally I have decided to debloat stock system.img (in same way as in v1.x => "Safe De-Bloat") and remove option to install all available bloatware. ROM file size has been reduced from about ~2GB to about ~1.6GB. Note for Devs / Chefs: Do not use Windows tools - you need Linux with "selinux" package installed (to handle SELinux contexts) to mount (rw) system.img safely. If you want to add / change any system content this way - remember about proper chown/chmod/chcon
    - Added device check during install as flashing directly to EMMC block is potentially more risky for "other" devices. Installer will abort installation if device is not N910F (trlte(xx)). If you want to try this ROM on other N4 devices - you need to remove this check manually from updater-script (it is more conscious procedure)

    v2.0 (not released for G96xF):

    - Completely new concept of ROM development that makes it easy to build most tuned and nuanced custom ROMs. No more arduous manual analysis or (often) invalid permissions / SELinux contexts taken from a kitchen. The main idea is to flash original, stock /system image as EMMC block (in same way as PC Odin does) instead of extracting ZIP's contents to mounted partition, then setting permissions, then creating symlinks, etc. However, it requires more knowledge related to sh scripts as ALL necessary changes need to be done on the fly, while installing (e.g. by injecting modified classes.dex and/or modified images/xmls to /res/../* into an apk). There are no limits, all depends on your creativity!
    - One common ZIP installer for Odexed and Deodexed ROM - you can control it by new "deodexed.rom" entry in options.prop (there is new dex_injector.sh script which can deodex on the fly the whole ROM using previously processed classes.dex files)
    - ROM is still Safe De-Bloated by default but removing bloatware during install is not mandatory - you can control it by new "safe.debloat" entry in options.prop (there is new protection included to avoid overfilling /system in case of large size of additional MODs and/or large multi CSC package)
    - Major improvements in csc_detect.sh script - it is able to detect previous CSC even in cases of flashing over e.g. CM based ROM and/or previously formatted system partition. However, if detected CSC is NOT included in my multi CSC package, in both mentioned cases it is still not possible to keep detected CSC (as there is no CSC related content to backup / restore)
    - Improvements in all sh scripts - additional "metadata" entries in updater-script (related to processed contents) are not required
    - Improvements in root_supersu.sh script - it is suitable for 32 and 64 bit OS
    - Added full zip support from the command line

    v1.x (initial version, further improvements, not released for G96xF):

    - Built without using a kitchen. All set_metadata* / symlink entries are result of arduous manual analysis. For more info about the method - see hidden content for Devs / Chefs in THIS thread.
    - New customization method without using Aroma (options.prop)
    - Many useful scripts for easy installation: CSC applying/autodetection, backup/restore of security files, backup/restore of existing CSC package, XML modding on the fly, root, init.d support
    - Many small changes and improvements "in the meantime" which I simply do not remember...
    - Safe De-Bloated (see post #1 for details)
    29
    Optional MODs


    [WORK IN PROGRESS, MODDING HAS LOW PRIORITY]

    These modifications I have done personally using (bak)smali tools - these are NOT "borrowed" from other custom ROM, nor from someone else's thread (thanks to @BlackMesa123, @corsicanu, @Grouxho & @yash92duster for their excellent modding guides). All ZIP files are TWRP flashable:

    >> MODs for SM-G96xF/DS/FD << (updated Aug-12-2018, more info HERE)

    TIP: Are you tired with re-installing your favorite MODs every time you update this ROM? Just take advantage of the new DevBase feature, intruduced in v5.6 (see "Changelog"). It is enough to put your favorite apks and/or jars in /sdcard/devbase/system/(priv-)app (or ../framework) and these MODs will be detected & applied automatically every time you update this ROM. You can also use your /external_sd to store your favorite MODs (it is mandatory if you are using encryption).

    Example for "G96xFXXU2BRxx_DisableHighVolumeWarning.zip" (modded SystemUI.apk):

    - unzip SystemUI.apk file from my flashable MOD
    - create /sdcard/devbase/system/priv-app/SystemUI directory
    - place modded SystemUI.apk in above directory

    Next time you will update my ROM - my installer will use modded SystemUI.apk instead of stock app included in my ROM :cool:

    NOTE: Use this feature consciously and carefully! It may happen that your MOD is not compatible with a newer Samsung's base (especially in case of major Android update)! I will warn you about it, but only in case of MY MODs, I am not able to predict what kind of mods you are using.
    28
    O think alex is busy

    Yes... I'm really busy in real life recently due to big changes in my life (I'm trying to start my own business instead of being employed). I will try to maintain already started threads - mainly for sentimental/honour reasons... Updates will come rather only monthly and one week delay after Sammy's update will be rather normal. Thank you for your understanding :good: