Samsung Transform (sph-m920) - Android General

I just wanted to get a discussion going about the transform since i've been searching and haven't been able to find another. So feel free to post anything you think people should know about the Samsung Transform. Oh and please ask questions too!
Sent from my SPH-M920 using xda premium

I guess I'll start by asking does any other transform user have problems with their phone like...
1. Very short battery time?
2. Incredibly slow performance?
3. Bad quality front facing camera?
4. Not being able to use the front camera as a webcam? (Skype, Tango, ooVoo)
5. Low range of compatible apps and games?
These are just a few of the problems with my samsung transform. I want to hear from you guys to see if you have any problems or questions. (I'm no expert but i'd like to try to help.
Sent from my SPH-M920 using xda premium

Sdx-developers.com
Sent from my HTC Glacier using Tapatalk

I suffered long and hard under the m920 and lemme tell ya it was bad enough to send me to T-Mobile. And cancel my contract mid year. Anyway xda doesn't have a forum for that phone nor will they due to its low level specs and God awful nature but sdx has a great group for the device. Good luck from a former victim!
Sent from my HTC Glacier using Tapatalk

Thanks i'll check it out
Sent from my SPH-M920 using xda premium

Rooting Transform M920 EB28 Sprint/CDMA
Rooting of Samsung Transform M920 (EB28 Sprint/CDMA 2.2.2 Froyo), by using below tool, was very easy:
"Intercept Root" (V1-35)
https://code.google.com/p/intercept-root/
SHA1 Checksum: 17b7c66cbf5ecb18cdab6890063e903db6091150, Filesize: 7,095,583 bytes (7.1 MB on disk).
or get from here
I previously tried SOC (SuperOneClick), Framaroot, Z4root, etc, but none of them worked, in above mentioned phone.
Anyone still has a working LINK to a CM7 ROM for Transform ? and a working link to a CWM Recovery for Transform ? then, please help+share :highfive:
Transform (M920), and Transform Ultra (M930), are two different phone.
Thanks in advance

ROM files for Transform M920
The [SIZE="+1"]Samsung Transform M920[/SIZE] Sprint/CDMA phone, initially was released in Oct-2010 with Android 2.1 Eclair (firmware: M920.06 Eclair.DI11), then Sprint in Mar-2011 OTA-updated their M920 subscribers into Android 2.2.2 Froyo (firmware M920.06 EB28), then M920 was again OTA updated in July-2011 into Android 2.2.? (firmware: M920.06 EF09). EB28 was a stable update, but EF09 caused problems for some M920 phones.
More info: https://en.wikipedia.org/wiki/Samsung_Transform
http://www.samsung.com/us/mobile/cell-phones/SPH-M920ZKASPR-specs
http://www.gsmarena.com/samsung_m920_transform-3581.php
I was able to locate back these below files, in one of my older MacBook OS X computer. When i got the M920 phone, then i or my brother or my friend downloaded them, we were attempting to update it with newer or better Android or CM OS, but lack of Mac OS X compatible proper drivers & related tools, caused our attempts to fail, and these files remained there. But when we attempted again, we found out, source webpages on source website SDX-Developers.com servers are now (Dec-2015) empty/down! So i'm sharing these with others, these should+might be helpful:
Some [SIZE="+1"]ROM[/SIZE] updates require an existing stock/build (initial build at initial released-time), some ROM updates required a Froyo.EB28 build, and some ROM updates required EF09 build.
In below:
"sdx" means = it was obtained from sdx-developers.com forum webpages, and the previous word before "_sdx", is the username in that website.
"xda" = it was obtained from xda-developers.com webpages.
http://www.mediafire.com/download/br9gs8w90iwhbmi/
cm-7-20120701-UNOFFICIAL-transform-wGApps_Andro-2.3.7_rel-Jul-1-2012_rom_by_qnhoang81_(wwjoshdew_sdx).zip
SHA1 checksum: eff7286f9da8c6702d2233230377db1825e9a6f4.
Size: 86,881,680 bytes (86.9 MB on disk).
http://www.mediafire.com/download/1kv818wijtw56ao/
CM7-270_(unofc-CM7_tranform)_rom_(xbooow59_sdx).zip
SHA1 checksum: 026eb4ecbc535a7d0adb8759f2464b43584ce958.
Size: 72,959,078 bytes (73 MB on disk).
http://www.mediafire.com/download/xbb3o8gyclm7cm0/
CM9-122_rel-Mar-26-2012_rom_(by_qnhoang81_sdx).zip
SHA1 checksum: 32cd4563bbd37c5c2da18b3b9df2c494f336116f.
Size: 83,155,515 bytes (83.2 MB on disk).
http://www.mediafire.com/download/bb300verjsr9j7n/
CM9-122_rel-Mar-26-2012_GAPPS-ics-20120317-signed_edited_Transform_(by_qnhoang81).zip
SHA1 checksum: f3173b7adfdfc15b58d5ba3a30bf4c8a561a80f7.
Size: 22,270,968 bytes (22.3 MB on disk).
http://www.mediafire.com/download/4n0g308t5062j5h/
SpeedM7.1-V1.1_(CM7-Speedier_Andro_2.3.7_Transform)_rel-Sep-19-2012_rom_(by_xbooow59_sdx).zip
SHA1 checksum: 1da667e0e719dbbb59b5b75f4f6d81de85a85f35.
Size: 73,818,117 bytes (73.8 MB on disk).
http://www.mediafire.com/download/da1rckuf223n4wg/
TransGingerOnCrack_EF09-2.2.2_(1.3.5_Vampirefo)-SDX_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 32c525fe17d51f0ab90c282de4b2ff33bbaf495e.
Size: 63,826,308 bytes (63.8 MB on disk).
http://www.mediafire.com/download/tunoa1nsb55lz8r/
Andro_2.2.2_EB28_stock_froyo_rom_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: d6cf0135d50f449a0ab93e245ad4add131a3374b.
Size: 74,149,790 bytes (74.2 MB on disk).
http://www.mediafire.com/download/q328rrc7pt5jhjy/
Andro_EF09_Stock_Rom_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 0605e1a4d15b83b1cd398397de33a21d8c531b4f.
Size: 70,085,916 bytes (70.1 MB on disk).
If anyone else posts further related items, i will post here & add a link here to that post.

Recovery Tools for Transform M920
Recovery Tools for Transform M920:
http://www.mediafire.com/download/pjbmfwernp4ty6r/
CWM_transform_EB28-EF09_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 8ed722eb9151fff5301a32f845d89e84eefc6421.
Size: 5,445,520 bytes (5.5 MB on disk).
http://www.mediafire.com/download/yt3l0clm1qwhohy/
Odin_v3.07_v3.06_v3.04_v1.85_v1.83.zip
SHA1 checksum: 3ff4297890ca7392d6da3bc509aec0753d7b7842.
Size: 1,749,547 bytes (1.8 MB on disk).
http://www.mediafire.com/download/7mdj2r4llb1atp4/
SPH-M920_vampirefo_ext_Recovery_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 00060345b7b1ba78268c54fb76add95fa0591781.
Size: 6,133,326 bytes (6.1 MB on disk).
http://www.mediafire.com/download/1m5l64gd0bdpka1/
SPH-M920_vampirefo_RFS_Recovery_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 8ad0cae4833d6554b6f096ca0c47e0287ac3305e.
Size: 5,984,112 bytes (6 MB on disk).
http://www.mediafire.com/download/bxoh5fbxjcbj6a9/
recovery_(Froyo_Transform)_(vampirefo_sdx).rfs
SHA1 checksum: 46e6581fa06009e491cc91000a73b0fc0ff90546.
Size: 6,395,792 bytes (6.4 MB on disk).

Drivers, ADB, Fastboot, Rom Update Utilities for Transform M920
Drivers, ADB, Fastboot, Rom Update Utilities for Transform M920:
Windows platform/os:
http://www.mediafire.com/download/s7vc5295ncsm291/
SAMSUNG_USB_Driver_for_Mobile_Phones_1.5.27.0_(Droid_Dustin_xda_zippyshare).zip
SHA1 checksum: 5650076fc99bfb55f2957ee8425fe13fcb13a0a8.
Size: 8,344,834 bytes (8.4 MB on disk).
http://www.mediafire.com/download/hc99a61491no149/
Samsung_USB_Driver_for_Mobile_Phones_v1.5.14.0_Win-Xp-V-7-8.exe
SHA1 checksum: 3f3d710db181cb655c8ba17275a298228960aac0.
Size: 24,178,176 bytes (24.2 MB on disk).
http://www.mediafire.com/download/sqg4abv723567mh/
SAMSUNG_USB_Driver_for_Mobile_Phones_v1.5.25.0-retail_official_(srinivasmv419_xda).exe
SHA1 checksum: 4f32a42c730184e15f023892fac0fc9670c4a4db.
Size: 15,364,480 bytes (15.4 MB on disk).
http://www.mediafire.com/download/r8zln40ox7jgcj4/
M920-Transform_ADB_Drivers_(AquilaChill_sdx).zip
SHA1 checksum: cae8f06892ad88444801f7f50d34785880b0b5ca.
Size: 3,886,289 bytes (3.9 MB on disk).
http://www.mediafire.com/download/3v5ngmsfihccr6t/
ADB_Fastboot_13-03-2013.zip
SHA1 checksum: 6473957c884775e1371ce04070de9a0e8e42b83e.
Size: 538,460 bytes (541 KB on disk).
http://www.mediafire.com/download/i0m2wav23oo565k/
Universal_Naked_Driver_0.73_(adb).zip
SHA1 checksum: ce1c6a8e8052c2638560767ae5a3574e4b1f3edc.
Size: 8,683,455 bytes (8.7 MB on disk).
http://www.mediafire.com/download/m256hfve5bqxa85/
UniversalAdbDriverSetup.msi
SHA1 checksum: 745bb99063748a2f309888467aac70c3c7ef6a2e.
Size: 17,060,864 bytes (17.1 MB on disk).
http://www.mediafire.com/download/5scfqfsfiaxa63w/
FastbootCommanderV.1.51.zip
SHA1 checksum: 9cb12ae39b38a154425e90214877f7fc8388a50c.
Size: 357,339 bytes (360 KB on disk).
http://www.mediafire.com/download/ph2nxd22mf4o5mx/
heimdall-suite-1.4.0-win32_JOdin.zip
SHA1 checksum: 87ba63c9917fe50b5c1d4305585ff65213e99ad5.
Size: 10,013,808 bytes (10 MB on disk).
http://www.mediafire.com/download/141twbr9x0dxare/
JOdin3CASUAL-r1035-dist.jar (for any platform/os with Java SE SDK).
SHA1 checksum: d6e331eecc3e149e779b888dedd59c4258c5cbf1.
Size: 19,747,175 bytes (19.8 MB on disk).
http://www.mediafire.com/download/u7nsns0ch1se69f/
libusb-win32-bin-1.2.6.0.zip
SHA1 checksum: e1362d9ba4a9c9b30394691e7acdee05631fd54e.
Size: 913,186 bytes (913 KB on disk).
http://www.mediafire.com/download/joaq4oji7r8a5bu/
msvcp110.dll
SHA1 checksum: 557b67e372e85eb39989cb53cffd3ef1adabb9fe.
Size: 535,008 bytes (537 KB on disk).
http://www.mediafire.com/download/qq8kcfkvk4b79jw/
Visual_C++_Redist_for_VS2012Upd4_en-au_vcredist_x64.exe
SHA1 checksum: 1a5d93dddbc431ab27b1da711cd3370891542797.
Size: 7,186,992 bytes (7.2 MB on disk).
http://www.mediafire.com/download/8kxa2m5rkc32s7h/
Super-One-Click_v2-3-3_Team-M-metropolis_(pass-1234)_(by_mercado79_sdx-dev).zip
SHA1 checksum: 7cd3f54eea5a2af07150501150be0146a7de82af.
Size: 10,550,007 bytes (10.6 MB on disk).
Note: above zip-file has utility software, which can flash/write into phone's firmware/rom components (this process is also known as "rooting" or "jail-breaking"), so your (anti-virus) security software will give you warning (if you decompress the zip file), that Android rooting related malware exists in 2 files: psneuter (Andr/Droid-Rt-A), zergRush (Andr/Droid-Rt-C). You need to create exception rules inside your security software and allow those 2 files to remain intact, if you want to utilize functionality from those 2 files, or, try other alternatives shown here, or, search further in xda/sdx forum.
http://www.mediafire.com/download/48m2m09ik598v0j/
SW_Updater_CL14_v1.0.001_Transform_EB28-EF09_(Mpgrimm2_sdx).exe
SHA1 checksum: 46e79cfb5ecd55aa8f3edc51355cf426b067f309.
Size: 88,321,715 bytes (88.3 MB on disk).
http://www.mediafire.com/download/80xxrj51c4pv9a7/
OneClickRootCWM3.1.0.1-EC05.zip
SHA1 checksum: 35589f673e71ef4d3fd47abd57e402c44fb80153.
Size: 8,593,920 bytes (8.6 MB on disk).
http://www.mediafire.com/download/olm3a38557u7g5d/
Odin_Multi_Downloader_v4.42.exe
SHA1 checksum: 0ff061097c976bce75c97baa51df8c71f2da0c81.
Size: 455,680 bytes (459 KB on disk).
-_-_-_-_-_-_-​
Mac OS X platform/os:
(some core tools are compatible with BSD / FreeBSD unix)
http://www.mediafire.com/download/l502b9e8s72vy20/
heimdall-suite-1.4.0-mac_JOdin.dmg
SHA1 checksum: 133466e39b96062a253d6c325c7a79cf1b16f421.
Size: 7,301,742 bytes (7.3 MB on disk).
http://www.mediafire.com/download/ycqi8j78w2chsc7/
Heimdall-1.4.1-Unofficial-Signed-macosx.dmg
SHA1 checksum: 45a879fcea817e4f00ce1250725c2e4231e08ef4.
Size: 120,279 bytes (123 KB on disk).
http://www.mediafire.com/download/h2fazmndr79533r/
heimdall.kext.tar.gz
SHA1 checksum: b0668faf76ec27899093079e786127ae7365f3a5.
Size: 6,167 bytes (8 KB on disk).
http://www.mediafire.com/download/141twbr9x0dxare/
JOdin3CASUAL-r1035-dist.jar (for any platform/os with Java SE SDK).
SHA1 checksum: d6e331eecc3e149e779b888dedd59c4258c5cbf1.
Size: 19,747,175 bytes (19.8 MB on disk).
http://www.mediafire.com/download/cwcc7wlkh4ayotm/
adb-fastboot-mac.zip
SHA1 checksum: 3596bcea4088ef888536a21fc6d0a0b81eab59d1.
Size: 158,466 bytes (160 KB on disk).
http://www.mediafire.com/download/80xxrj51c4pv9a7/
OneClickRootCWM3.1.0.1-EC05.zip
SHA1 checksum: 35589f673e71ef4d3fd47abd57e402c44fb80153.
Size: 8,593,920 bytes (8.6 MB on disk).
-_-_-_-_-_-_-​
Linux/Unix platform/os:
http://www.mediafire.com/download/6a5didlt45jgnae/
libusb-1.0.20.tar.bz2
SHA1 checksum: 9537243f165927bde74ad742e6b3effb0bd50cd2.
Size: 795,247 bytes (799 KB on disk).
http://www.mediafire.com/download/3lkrtbf18v2sfck/
libusb-compat-0.1.5.tar.bz2
SHA1 checksum: 062319276d913c753a4b1341036e6a2e42abccc9.
Size: 276,769 bytes (279 KB on disk).
http://www.mediafire.com/download/141twbr9x0dxare/
JOdin3CASUAL-r1035-dist.jar (for any platform/os with Java SE SDK).
SHA1 checksum: d6e331eecc3e149e779b888dedd59c4258c5cbf1.
Size: 19,747,175 bytes (19.8 MB on disk).
-_-_-_-_-_-_-​
Looking for file Hash/Checksum calculator tools ? visit:
http://forum.xda-developers.com/showpost.php?p=64447183&postcount=2
Looking for file (and folder) compression (aka, zip/archive) or decompression (aka, unzip/unarchive) tools ? visit:
http://forum.xda-developers.com/showpost.php?p=64447381&postcount=3

reserved it here, to add more related info in sequence.

Can anyone tell me how i can use any of these to install custom recovery, back up my rom, and install one of the custom roms? there are a ton of files, I'm presuming CWM is clockworkmod, but my phone is EB28 and the file says EB28-EF09. is this something I can use, if so how?
thanks.

Related

[ROM] [STOCK] + insecure boot image (adb root) + deodexed system

I would like to share a collection of factory images. It contains the full packages, also the extracted .img files. I also included insecure boot image (adb shell gives root access) and deodexed system image for each of them.
full image packages are "tgz" files.
image files extension is .img
isecure boot images are *.unsec.img
deodexed system images are *.deodex.img
These are all to be flashed with fastboot. These all derived from STOCK (https://developers.google.com/android/nexus/images) with no changes except the insecure adb boot image and the deodexed system image.
Deodexed fs is exactly the same size as the original when mounted.
The collection contains:
Nexus 7 (Wi-Fi)(nakasi) factory images
nakasi_4.1.2-jzo54k
nakasi_4.1.2-jzo54k-factory-973f190e.tgz size: 268416146
nakasi-jzo54k
image-nakasi-jzo54k.zip size: 270068592
bootloader-grouper-3.41.img size: 2142784
image-nakasi-jzo54k
boot.img size: 5013504
boot.img.unsec.img size: 5013504
recovery.img size: 5365760
system.img size: 456978628
system.img.deodex.img size: 419478656
userdata.img size: 106788356
nakasi_4.2.1-jop40d
nakasi_4.2.1-jop40d-factory-6ac58a1a.tgz size: 285374508
nakasi-jop40d
image-nakasi-jop40d.zip size: 287257464
bootloader-grouper-4.13.img size: 2146892
image-nakasi-jop40d
boot.img size: 5060608
boot.img.unsec.img size: 5060608
recovery.img size: 5574656
system.img size: 488587640
system.img.deodex.img size: 446971116
userdata.img size: 106788356
nakasi_4.2.2-jdq39
nakasi-jdq39-factory-c317339e.tgz size: 287674300
nakasi-jdq39
image-nakasi-jdq39.zip size: 289524899
bootloader-grouper-4.18.img size: 2146892
image-nakasi-jdq39
boot.img size: 5062656
boot.img.unsec.img size: 5062656
recovery.img size: 5576704
system.img size: 483127648
system.img.deodex.img size: 444480760
userdata.img size: 106792464
Nexus 7 GSM (nakasig) factory images
nakasig_4.2.1-jop40d
nakasig_4.2.1-jop40d-factory-efcec044.tgz size: 291197311
nakasig-jop40d
image-nakasig-jop40d.zip size: 287381774
boot.img size: 5060608
boot.img.unsec.img size: 5060608
bootloader-tilapia-4.13.img size: 2146892
radio-tilapia-1231_0.10.0_1021.img size: 16777216
recovery.img size: 5574656
system.img size: 488804800
system.img.deodex.img size: 447044892
userdata.img size: 106788356
nakasig_4.2.2-jdq39
nakasig-jdq39-factory-0798439d.tgz size: 293527315
nakasig-jdq39
image-nakasig-jdq39.zip size: 289688547
boot.img size: 5062656
boot.img.unsec.img size: 5062656
bootloader-tilapia-4.18.img size: 2146892
radio-tilapia-1231_0.17.0_1205.img size: 16777216
recovery.img size: 5576704
system.img size: 483299752
system.img.deodex.img size: 444509480
userdata.img size: 106792464
The files can be downloaded from:
http://web.djodjo.org/?a=download:android:ROM_images:factory_images_gn_nakasi
http://web.djodjo.org/?a=download:android:ROM_images:factory_images_gn_nakasig
if it helps you buy me a beer

Unbrick G Stylo LS770 Qualcomm HS-USB QDLoader 9008 mode

Code:
Process Index:0
please select the XML file
Start Download
COM Port number:4
Sahara Connecting ...
Sahara Version:2
Start Sending Programmer
Sending Programmer Finished
Switch To FireHose
Max Payload Size to Target:49152 Bytes
Device Type:eMMC
Platform:8x26
Disable Ack Raw Data Every N Packets
Ack Raw Data:False
Skip Write:False
Always Validate:False
Use Verbose:False
COM Port number:4
Sending NOP
FireHose NOP sent successfully
Sending Configuration
Device Type:eMMC
Platform:8x26
Set TxBuffer 0x4000, RxBuffer 0x4000
Firehose configure packet sent successfully!
Total Bytes To Program 0x102A2A0
Download Image
PROGRAM: Partition 0, Sector: 0, Length: 33 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\gpt_backup0.bin
PROGRAM: Written Bytes 0x4200 (64)
Program Size: 0.02 MB
PROGRAM: Partition 0, Sector: 0, Length: 34 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\gpt_main0.bin
PROGRAM: Written Bytes 0x4400 (64)
Program Size: 0.02 MB
PROGRAM: Replace the partition sectors number 0xc000 to file size in sector 0x7134
PROGRAM: Partition 0, Sector: 93184, Length: 28980 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\laf.img
PROGRAM: Written Bytes 0xe26800 (64)
Program Size: 14.15 MB
PROGRAM: Replace the partition sectors number 0x1000 to file size in sector 0x7d9
PROGRAM: Partition 0, Sector: 5120, Length: 2009 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\emmc_appsboot.mbn
PROGRAM: Written Bytes 0xfb200 (64)
Program Size: 0.98 MB
PROGRAM: Replace the partition sectors number 0x400 to file size in sector 0x12f
PROGRAM: Partition 0, Sector: 4096, Length: 303 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\rpm.mbn
PROGRAM: Written Bytes 0x25e00 (64)
Program Size: 0.15 MB
PROGRAM: Replace the partition sectors number 0x400 to file size in sector 0x70
PROGRAM: Partition 0, Sector: 3072, Length: 112 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\hyp.mbn
PROGRAM: Written Bytes 0xe000 (64)
Program Size: 0.05 MB
PROGRAM: Replace the partition sectors number 0x400 to file size in sector 0x3b1
PROGRAM: Partition 0, Sector: 2048, Length: 945 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\tz.mbn
PROGRAM: Written Bytes 0x76200 (64)
Program Size: 0.46 MB
PROGRAM: Replace the partition sectors number 0x400 to file size in sector 0x2b1
PROGRAM: Partition 0, Sector: 1024, Length: 689 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\sbl1.mbn
PROGRAM: Written Bytes 0x56200 (64)
Program Size: 0.34 MB
Total Size: 16.16 MB
Total Size: 1 Seconds
Throughput: 16.16 MB/Seconds
PATCH: Partition 0, Sector: 11, Offset 296 Bytes, Size: 8 Bytes, Value: NUM_DISK_SECTORS-34.
PATCH: Partition 0, Sector: 0, Offset 296 Bytes, Size: 8 Bytes, Value: NUM_DISK_SECTORS-34.
PATCH: Partition 0, Sector: 1, Offset 48 Bytes, Size: 8 Bytes, Value: NUM_DISK_SECTORS-34.
PATCH: Partition 0, Sector: 0, Offset 48 Bytes, Size: 8 Bytes, Value: NUM_DISK_SECTORS-34.
PATCH: Partition 0, Sector: 1, Offset 32 Bytes, Size: 8 Bytes, Value: NUM_DISK_SECTORS-1.
PATCH: Partition 0, Sector: 0, Offset 24 Bytes, Size: 8 Bytes, Value: NUM_DISK_SECTORS-1.
PATCH: Partition 0, Sector: 0, Offset 72 Bytes, Size: 8 Bytes, Value: NUM_DISK_SECTORS-33.
PATCH: Partition 0, Sector: 1, Offset 88 Bytes, Size: 4 Bytes, Value: CRC32(2,5120)
PATCH: Partition 0, Sector: 0, Offset 88 Bytes, Size: 4 Bytes, Value: CRC32(NUM_DISK_SECTORS-33.,5120)
PATCH: Partition 0, Sector: 1, Offset 16 Bytes, Size: 4 Bytes, Value: 0
PATCH: Partition 0, Sector: 1, Offset 16 Bytes, Size: 4 Bytes, Value: CRC32(1,92)
PATCH: Partition 0, Sector: 0, Offset 16 Bytes, Size: 4 Bytes, Value: 0
PATCH: Partition 0, Sector: 0, Offset 16 Bytes, Size: 4 Bytes, Value: CRC32(NUM_DISK_SECTORS-1.,92)
Total download file size: 16.16455MB
Throughput: 16.16455M/s
Reset Phone
Waiting for reset done...
Finish Download
Successful unbrick LG LS770 9008 mode
Use QFIL to flash the LS770 recovery file, it works on LS770 with ZV5 only. If you hard bricked at LS770ZV5, then you can unbrick it by flashing the recovery file with QFIL
emmc_appsboot.mbn
gpt_backup0.bin
gpt_both0.bin
gpt_main0.bin
hyp.mbn
laf.img
MPRG8916.mbn
New9008.zip
old_prog_emmc_firehose_8916.mbn
partition-c70n_global_com.xml
patch0.xml
prog_emmc_firehose_8916.mbn
rawprogram0.xml
rpm.mbn
sbl1.mbn
tz.mbn
validated_emmc_firehose_8916.mbn
asialove2013 said:
Hi, I am trying to find out how to unbrick a G Stylo LS770 stuck on Qualcomm HS-USB QDLoader 9008 mode.
First, I need to get the rawprogram0.xml for G Stylo LS770..
from a rooted working LS770 model:
Code:
adb shell su -c 'dd if=/dev/block/mmcblk0 of=/cache/partition0.bin bs=512 count=20480'
Get partition0.bin
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
00 04 00 is sbl1 -Start LBA
00 07 FF is sbl1 - end LBA
In the original Boarddiag tool, there are rawprogram0.xml file for other LG models.
I have to edit it based on the information from partition file i just got.
below entry is what i create based on partition table
<program SECTOR_SIZE_IN_BYTES="512" file_sector_offset="0" filename="sbl1.mbn" label="sbl1" num_partition_sectors="1024" physical_partition_number="0" size_in_KB="512.0" sparse="false" start_byte_hex="0x80000" start_sector="1024" />
num_partition_sectors: End LBA- start LBA+1 = 400, Convert it to HEX, that is 1024
start_sector = Start LBA, and convert it to HEX, that is 1024.
start_byte_hex : 1024*512= 524288 convert to hex, it is 80000
Now we have the rawprogram0.xml
---
Forgive my bad English,..(
Click to expand...
Click to collapse
wheres the rawprogram can you share it with me ?
---------- Post added at 03:13 PM ---------- Previous post was at 03:01 PM ----------
jcsaclolo said:
wheres the rawprogram can you share it with me ?
Click to expand...
Click to collapse
hello i got bricked LG LS770 ZV7 it is hard bricked and stuck on QDLoader 9008 i need tot firmware DLL and xml files if you can help me unbrick it im willing to pay just give me step by step instructions. Im not tech savvy willing to pay 100$ to 150$ depend on situation i am very upset about this so i would thank you a lot and pay you if you could really help me please email me at [email protected].com
No need DLL
jcsaclolo said:
wheres the rawprogram can you share it with me ?
---------- Post added at 03:13 PM ---------- Previous post was at 03:01 PM ----------
hello i got bricked LG LS770 ZV7 it is hard bricked and stuck on QDLoader 9008 i need tot firmware DLL and xml files if you can help me unbrick it im willing to pay just give me step by step instructions. Im not tech savvy willing to pay 100$ to 150$ depend on situation i am very upset about this so i would thank you a lot and pay you if you could really help me please email me at [email protected]
Click to expand...
Click to collapse
Just start working on this. I know you! We have been talking about the LS770 QDLoader 9008 issue for almost 30 days.
No need DLL, I am just trying to use LG's official smart boot diag tool to solve this, I will let you know when i got further information.
Successful GOT My LS770 back from Qualcomm HS-USB QDLoader 9008 mode.
now in download mode,
ZV5 is fine,
But ZV7 has Qufse check fail error,
asialove2013 said:
Successful GOT My LS770 back from Qualcomm HS-USB QDLoader 9008 mode.
now in download mode,
ZV5 is fine,
But ZV7 has Qufse check fail error,
Click to expand...
Click to collapse
Could you please post the files you used to do so?
jcsaclolo said:
wheres the rawprogram can you share it with me ?
---------- Post added at 03:13 PM ---------- Previous post was at 03:01 PM ----------
hello i got bricked LG LS770 ZV7 it is hard bricked and stuck on QDLoader 9008 i need tot firmware DLL and xml files if you can help me unbrick it im willing to pay just give me step by step instructions. Im not tech savvy willing to pay 100$ to 150$ depend on situation i am very upset about this so i would thank you a lot and pay you if you could really help me please email me at [email protected]
Click to expand...
Click to collapse
Do you have the ZV5 tot file? What was the final outcome of flashing back to ZV5 from ZV7?
I would like to get a copy of zv5, so how can I get that? Thank you
another try
All LG G Stylo use 8X26, SEE Screen shot below
no way
Sorry, can not share the file!
I am working on it.
I will share as I success
Sent from my XT1093 using XDA-Developers mobile app
asialove2013 said:
Not free! It is no shame to share free kdz firmware, I have share lots of G5, V10, G4, G3, K10, firmware.
I do not share LG G5 H850 TOT firmware because it was build by some developers at xda.
I do not share LG LS770 tot because it was build by others too.
Some one said that it should be free, but you can never get it from AT & T or Sprint,
I noticed you (Wired66) shared other developers ls770 firmware and making profit from it?
So I will never share files to unbrick Quancomm 9008 mode, SORRY
Click to expand...
Click to collapse
Are you okay, really? You know the code in those .TOT files is owned by LG right. Making a tot file is just copy and pasting someone else's work. It does not make it yours no matter how much you want it to be.
And no i'm not in the business of selling big corporations code, where the heck did you pull that out of.
This is your thread you can argue with whoever unwittingly post in it, but I'm out.
sorry
Wired66 said:
Are you okay, really? You know the code in those .TOT files is owned by LG right. Making a tot file is just copy and pasting someone else's work. It does not make it yours no matter how much you want it to be.
And no i'm not in the business of selling big corporations code, where the heck did you pull that out of.
This is your thread you can argue with whoever unwittingly post in it, but I'm out.
Click to expand...
Click to collapse
Sorry, It is my mistake, I mistake you with some one else
you are right
I am trying to edit my previous post,,
asialove2013 said:
Sorry, It is my mistake, I mistake you with some one else
Click to expand...
Click to collapse
No hard feelings, on my part.
I'm taking a stab at throwing together some .TOT files on my own. I should have at least one that I'm throwing together for the LS-770 here later today. I'll post them here on XDA as the community really could use them. If you change your mind about posting those files I would have three other phones to test them out on that I bricked poking at this locked bootloader.
Please do a tot file for for boost stylo zv5 (5.11).Thanks!!
Sent from my N9521 using Tapatalk
please help me for how repair LG G Stylo LS770 Unbrick MSM8916 fast
thank you
After researching, and waiting months for a .tot file to come out, I have successfully fixed my LS770 Boost Mobile Stylo. I kinda missed this thing. I'll help anyone who needs it. I WILL NOT charge, either. Ain't Android suppose to be Open Source? Then lets keep it 'Open'
mabry said:
After researching, and waiting months for a .tot file to come out, I have successfully fixed my LS770 Boost Mobile Stylo. I kinda missed this thing. I'll help anyone who needs it. I WILL NOT charge, either. Ain't Android suppose to be Open Source? Then lets keep it 'Open'
Click to expand...
Click to collapse
I am trying to find a ZV5 tot, if you can help, thanks. Also if you understand quse, how can I understand flashing and qfuse, thanks
mabry said:
After researching, and waiting months for a .tot file to come out, I have successfully fixed my LS770 Boost Mobile Stylo. I kinda missed this thing. I'll help anyone who needs it. I WILL NOT charge, either. Ain't Android suppose to be Open Source? Then lets keep it 'Open'
Click to expand...
Click to collapse
You were in QDLoader Mode? I could really use the files to debrick some phones. I got as far as getting to a download mode with a black screen and a battery symbol before I put the battery back in but nothing flashes and then upon reboot I'm back to QDloader mode. I must have one of the files off.
jcsaclolo said:
wheres the rawprogram can you share it with me ?
---------- Post added at 03:13 PM ---------- Previous post was at 03:01 PM ----------
hello i got bricked LG LS770 ZV7 it is hard bricked and stuck on QDLoader 9008 i need tot firmware DLL and xml files if you can help me unbrick it im willing to pay just give me step by step instructions. Im not tech savvy willing to pay 100$ to 150$ depend on situation i am very upset about this so i would thank you a lot and pay you if you could really help me please email me at [email protected]
Click to expand...
Click to collapse
can u help my lg ls770zv7 don't pass from lg screen it's on 6.0 android
mabry said:
After researching, and waiting months for a .tot file to come out, I have successfully fixed my LS770 Boost Mobile Stylo. I kinda missed this thing. I'll help anyone who needs it. I WILL NOT charge, either. Ain't Android suppose to be Open Source? Then lets keep it 'Open'
Click to expand...
Click to collapse
would like help in fixing my lg g stylo I'm stuck in QUALCOMM hs-usb qdloader 9008 after using the lg up tool to flash zv7 tot I had forgothen the bloody device updated itself to zv8, so I was playing around with kingoroot managed to delete the recovery wihich in part enables fastboot mode. after failing to input commads I decided to flash back and now qfuse screws me over. help would be appreciated.

Security update while root via Magisk

Hello,
Does anyone know how I can install the security update for December on Android One EU device?
My Software is 1.06.401.14.
I received an update.zip but installation aborted. My System is rooted with Magisk.
I had a look into the zip and found a META-INF Folder; compatibility.zip; payload.bin
payload_properties.txt
Code:
FILE_HASH=Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=
FILE_SIZE=88714324
METADATA_HASH=Kleu845IDwsBg9YKK9sxRLgzsV6kQcw0Qu2aikz/UuA=
METADATA_SIZE=466479
HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002
HTC_MID=2Q3F20000
HTC_DEVICE=htc_ocla1_sprout
PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys
PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
PRE_TASKID=515519
care_map.txt
Code:
system
90,0,32767,32768,32770,32945,32947,33452,65534,65536,65538,66043,71519,98304,98306,98481,98483,98988,131071,131072,131074,131579,133736,163840,163842,164017,164019,164524,196607,196608,196610,197115,198114,229376,229378,229553,229555,230060,262142,262144,262146,262651,263103,294912,294914,295089,295091,295596,327678,327680,327682,328187,328209,360448,360450,360955,393214,393216,393218,393723,425982,425984,425986,426491,458750,458752,458754,459259,491518,491520,491522,492027,524286,524288,524290,524795,557054,557056,557058,557563,564954,589824,589826,622592,622594,655360,655362,688128,688130,688635,709641
The data seem to be inside payload.bin. Does anybody know how to extract the payload.bin? Maybe then I can install the *.img manually.
MC_Ohr said:
Hello,
Does anyone know how I can install the security update for December on Android One EU device?
My Software is 1.06.401.14.
I received an update.zip but installation aborted. My System is rooted with Magisk.
I had a look into the zip and found a META-INF Folder; compatibility.zip; payload.bin
payload_properties.txt
Code:
FILE_HASH=Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=
FILE_SIZE=88714324
METADATA_HASH=Kleu845IDwsBg9YKK9sxRLgzsV6kQcw0Qu2aikz/UuA=
METADATA_SIZE=466479
HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002
HTC_MID=2Q3F20000
HTC_DEVICE=htc_ocla1_sprout
PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys
PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
PRE_TASKID=515519
care_map.txt
Code:
system
90,0,32767,32768,32770,32945,32947,33452,65534,65536,65538,66043,71519,98304,98306,98481,98483,98988,131071,131072,131074,131579,133736,163840,163842,164017,164019,164524,196607,196608,196610,197115,198114,229376,229378,229553,229555,230060,262142,262144,262146,262651,263103,294912,294914,295089,295091,295596,327678,327680,327682,328187,328209,360448,360450,360955,393214,393216,393218,393723,425982,425984,425986,426491,458750,458752,458754,459259,491518,491520,491522,492027,524286,524288,524290,524795,557054,557056,557058,557563,564954,589824,589826,622592,622594,655360,655362,688128,688130,688635,709641
The data seem to be inside payload.bin. Does anybody know how to extract the payload.bin? Maybe then I can install the *.img manually.
Click to expand...
Click to collapse
Check this out
https://github.com/erfanoabdi/imgpatchtools
MC_Ohr said:
Hello,
Does anyone know how I can install the security update for December on Android One EU device?
My Software is 1.06.401.14.
I received an update.zip but installation aborted. My System is rooted with Magisk.
I had a look into the zip and found a META-INF Folder; compatibility.zip; payload.bin
payload_properties.txt
Code:
FILE_HASH=Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=
FILE_SIZE=88714324
METADATA_HASH=Kleu845IDwsBg9YKK9sxRLgzsV6kQcw0Qu2aikz/UuA=
METADATA_SIZE=466479
HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002
HTC_MID=2Q3F20000
HTC_DEVICE=htc_ocla1_sprout
PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys
PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
PRE_TASKID=515519
care_map.txt
Code:
system
90,0,32767,32768,32770,32945,32947,33452,65534,65536,65538,66043,71519,98304,98306,98481,98483,98988,131071,131072,131074,131579,133736,163840,163842,164017,164019,164524,196607,196608,196610,197115,198114,229376,229378,229553,229555,230060,262142,262144,262146,262651,263103,294912,294914,295089,295091,295596,327678,327680,327682,328187,328209,360448,360450,360955,393214,393216,393218,393723,425982,425984,425986,426491,458750,458752,458754,459259,491518,491520,491522,492027,524286,524288,524290,524795,557054,557056,557058,557563,564954,589824,589826,622592,622594,655360,655362,688128,688130,688635,709641
The data seem to be inside payload.bin. Does anybody know how to extract the payload.bin? Maybe then I can install the *.img manually.
Click to expand...
Click to collapse
Send me the ota zip and I will decrypt it withhtc ruu decrypt tool and pull the boot.img and we can patch it and upload it for others.
twinnfamous said:
Send me the ota zip and I will decrypt it withhtc ruu decrypt tool and pull the boot.img and we can patch it and upload it for others.
Click to expand...
Click to collapse
I tried with htc decrypt tool by @nkk71 and @Captain_Throwback but the payload.bin stays untouched. Is there any other way to extract?
I tried out to boot from slot_b but it did not work. I`m afraid that I have to restore to stock and start from the beginning again...
Did anyone with android one device installed the security update successfully? What softwarenumber abe youon now?
So I found the log of update_engine. There is a hash check of the boot partition.
Code:
[1231/141321:INFO:main.cc(115)] Chrome OS Update Engine starting
[1231/141321:INFO:boot_control_android.cc(65)] Loaded boot control hidl hal.
[1231/142402:INFO:update_attempter_android.cc(201)] Using this install plan:
[1231/142402:INFO:install_plan.cc(71)] InstallPlan: new_update, payload type: unknown, source_slot: A, target_slot: B, url: file:///data/ota_package/update.zip, payload size: 88714324, payload hash: Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=, metadata size: 466479, metadata signature: , hash_checks_mandatory: true, powerwash_required: false
[1231/142402:WARNING:htc_utils.cc(151)] HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
[1231/142402:WARNING:htc_utils.cc(152)] POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
[1231/142402:WARNING:htc_utils.cc(153)] POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
[1231/142402:WARNING:htc_utils.cc(105)] HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002; ro.cid=HTC__034
[1231/142402:WARNING:htc_utils.cc(82)] HTC__034 matches...
[1231/142402:WARNING:htc_utils.cc(116)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] HTC_MID=2Q3F20000; ro.mid=2Q3F20000
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] HTC_DEVICE=htc_ocla1_sprout; ro.product.device=htc_ocla1_sprout
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys; ro.build.description=1.06.401.14 9.0_g CL990708 release-keys
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys; ro.build.fingerprint=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_TASKID=515519; ro.aa.taskid=515519
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:INFO:cpu_limiter.cc(71)] Setting cgroup cpu shares to 2
[1231/142402:ERROR:utils.cc(193)] fd >= 0 failed: No such file or directory
[1231/142402:ERROR:cpu_limiter.cc(74)] Failed to change cgroup cpu shares to 2 using /sys/fs/cgroup/cpu/update-engine/cpu.shares
[1231/142402:INFO:update_attempter_android.cc(393)] Marking booted slot as good.
[1231/142402:INFO:update_attempter_android.cc(408)] Scheduling an action processor start.
[1231/142402:INFO:action_processor.cc(46)] ActionProcessor: starting InstallPlanAction
[1231/142402:INFO:action_processor.cc(116)] ActionProcessor: finished InstallPlanAction with code ErrorCode::kSuccess
[1231/142402:INFO:action_processor.cc(143)] ActionProcessor: starting DownloadAction
[1231/142402:INFO:install_plan.cc(71)] InstallPlan: new_update, payload type: unknown, source_slot: A, target_slot: B, url: file:///data/ota_package/update.zip, payload size: 88714324, payload hash: Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=, metadata size: 466479, metadata signature: , hash_checks_mandatory: true, powerwash_required: false
[1231/142402:INFO:download_action.cc(179)] Marking new slot as unbootable
[1231/142402:INFO:multi_range_http_fetcher.cc(45)] starting first transfer
[1231/142402:INFO:multi_range_http_fetcher.cc(74)] starting transfer of range 3946+88714324
[1231/142402:INFO:delta_performer.cc(202)] Completed 0/? operations, 16384/88714324 bytes downloaded (0%), overall progress 0%
[1231/142402:INFO:delta_performer.cc(542)] Manifest size in payload matches expected value from Omaha
[1231/142402:INFO:delta_performer.cc(1412)] Verifying metadata hash signature using public key: /etc/update_engine/update-payload-key.pub.pem
[1231/142402:INFO:payload_verifier.cc(93)] signature blob size = 264
[1231/142402:INFO:payload_verifier.cc(112)] Verified correct signature 1 out of 1 signatures.
[1231/142402:INFO:delta_performer.cc(1455)] Metadata hash signature matches value in Omaha response.
[1231/142403:INFO:delta_performer.cc(1475)] Detected a 'delta' payload.
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old system sha256: SzmK3XVHUFtJDoc+dX9vaiAGZOf4LQLkVANqfoX8aYM= size: 2952790016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new system sha256: rEbITUaIVARqP7NyPwGdYise+S1bgUH6i/8tJe281sY= size: 2952790016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old vendor sha256: pN048+oMXhrsVEpgo9XEJD5P3RPItj9tCaugByFMsdc= size: 838860800
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new vendor sha256: MLf9+C36UzOJlYvtrMj5KFgX5qwTNwJpckDDzzJbW9Q= size: 838860800
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old xbl sha256: 7ZOdUYruCVjIfkRCghobVnVbkfa0qSxMWn2HIekTYaE= size: 3080192
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new xbl sha256: 5+SV0zuYEE3AEu/OudE+hfEcs5bdIKPMazgW/T8mXVI= size: 3084288
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old hosd sha256: IRSk31oyN/2qIFspIkdZT7GM5LxCNyz6tfT3mDNBUEg= size: 55889920
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new hosd sha256: q/svW0eAUbGBCj4++K+i26iR2HMqTn9Y+BJu69ULVtg= size: 55894016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old abl sha256: EJVxhBLKjjxEaTcTCIguE0pR+XMnMRkjHDskCBcSKmo= size: 143360
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new abl sha256: JBPuhtgk7UQ2nEYIb6e9el416xA5UA3IjZ1hOshwdmM= size: 147456
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old rpm sha256: c3WMA2MpUBxJOTzyX/wQQH7Z9COQtVQgY4hGpv1+waA= size: 221184
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new rpm sha256: qifOkTY4PUUjDLHuJYbDDFU1EevI33a5JNBS0EYrnDU= size: 225280
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old pmic sha256: emQfsgD2M2NqhDR/05h+eG0s/bx2vXp0gRSZd5S6gIE= size: 36864
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new pmic sha256: pmM/rwlD9WdyVBFSRvTzo+QYKPeAcopyg4kOcxfnYsU= size: 40960
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old boot sha256: Nj8nwvZ8vEWKwTESh6U+VsN1TuKUmwzYYtwUTcGjvPg= size: 55943168
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new boot sha256: LZwSja8jFa2XwgTfVsOx4r5zMUBT2pv7o6GCvt9uCpU= size: 55947264
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old dsp sha256: cbh7/JbA4pEzDeKqfxf88C3kmR29Rm9t/bS8UINoDcg= size: 16777216
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new dsp sha256: cbh7/JbA4pEzDeKqfxf88C3kmR29Rm9t/bS8UINoDcg= size: 16777216
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old radio sha256: VcolpgB2otdbuQKsZsm43XxtF+wcu8oJS9HkQIY/WWw= size: 62337024
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new radio sha256: 27kNwK+qLEi0MdrM7/hFhlahRzg70it5h9kh6LAMMeY= size: 62337024
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old tz sha256: yWyBuoTv2M+tQSxDTfMmJM2n2q6nIhulMrB3sZ+jsVA= size: 1953792
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new tz sha256: HW1NRgU5N1to4CAeZR1e3irSHkYH8RLD1r/r4Xu5OiI= size: 1957888
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old hyp sha256: Hn0RBVarof+yc5EyaH9zNtDHkG8Ode96TfRmfKt0VEQ= size: 266240
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new hyp sha256: 2J68uFWVRIK0zhkEmek3NmGIRmjk1VuXBmF1Yl5u/fY= size: 270336
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old devcfg sha256: sJa43eqyYdFwno2Ybp5I5g8zjKyYphi+J5L53+WeCUI= size: 45056
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new devcfg sha256: glQk7DOZxJbhP6UJA/j1+BUhw0KBQcQddjNhwhoEdDg= size: 49152
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old cmnlib sha256: KGyqdUERnMSlmFMP50PnDA1uvjWvjOOpp7ZKjaqJJk0= size: 217088
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new cmnlib sha256: 4qjItJNTjy5szo8SFXkbNSSdmm5NarEOjIB26q3dOJA= size: 221184
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old cmnlib64 sha256: mqbqjxPFSfYrKJujRULExhM/No+utcO3QqkPTf5d1Ws= size: 262144
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new cmnlib64 sha256: lRNo5nuiENQZXkX1c3hJhz/oc9Whh8nHI+tiuQLAzXw= size: 266240
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old keymaster sha256: KEcfQcnCfsZ6qFfiWTHYSKfT9cpin9CTtIU+5mgcF9s= size: 278528
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new keymaster sha256: 4bprlshY7JPC5LUsRhoxCLjDg9gl5w6sfCZqFkfHx60= size: 282624
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old lockbooter sha256: VtbPjUhr3SClK5ThAby5q8vJs8cGctJ4d+3/m9hnIG4= size: 86016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new lockbooter sha256: 1sl80Aby2MFL9JElaFezl0KWT4mm8w9n7p7JzPWEOIE= size: 90112
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old bluetooth sha256: HmhjTBICwVt0g2tSOedZXEbv4RKk6brzSmBDJKZgNQ0= size: 503808
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new bluetooth sha256: b4bYyd+Ff4w896RlM4SD24/kuxdSKdj3cOKyRg44U9w= size: 503808
[1231/142403:INFO:delta_performer.cc(365)] Applying 3445 operations to partition "system"
[1231/142403:INFO:delta_performer.cc(653)] Starting to apply update payload operations
[1231/142428:INFO:delta_performer.cc(202)] Completed 890/6357 operations (14%), 5488640/88714324 bytes downloaded (6%), overall progress 10%
[1231/142438:INFO:delta_performer.cc(202)] Completed 2035/6357 operations (32%), 7372800/88714324 bytes downloaded (8%), overall progress 20%
[1231/142501:INFO:delta_performer.cc(202)] Completed 2798/6357 operations (44%), 15613952/88714324 bytes downloaded (17%), overall progress 30%
[1231/142523:INFO:delta_performer.cc(202)] Completed 3406/6357 operations (53%), 24854528/88714324 bytes downloaded (28%), overall progress 40%
[1231/142524:INFO:delta_performer.cc(202)] Completed 3437/6357 operations (54%), 40812544/88714324 bytes downloaded (46%), overall progress 50%
[1231/142525:INFO:delta_performer.cc(365)] Applying 2278 operations to partition "vendor"
[1231/142525:INFO:delta_performer.cc(202)] Completed 3815/6357 operations (60%), 54706176/88714324 bytes downloaded (61%), overall progress 60%
[1231/142529:INFO:delta_performer.cc(202)] Completed 4959/6357 operations (78%), 55050240/88714324 bytes downloaded (62%), overall progress 70%
[1231/142545:INFO:delta_performer.cc(202)] Completed 5722/6357 operations (90%), 63242240/88714324 bytes downloaded (71%), overall progress 80%
[1231/142546:INFO:delta_performer.cc(365)] Applying 7 operations to partition "xbl"
[1231/142546:INFO:delta_performer.cc(365)] Applying 12 operations to partition "hosd"
[1231/142559:INFO:delta_performer.cc(365)] Applying 2 operations to partition "abl"
[1231/142559:INFO:delta_performer.cc(365)] Applying 4 operations to partition "rpm"
[1231/142559:INFO:delta_performer.cc(365)] Applying 2 operations to partition "pmic"
[1231/142559:INFO:delta_performer.cc(365)] Applying 12 operations to partition "boot"
[1231/142600:ERROR:delta_performer.cc(1057)] The hash of the source data on disk for this operation doesn't match the expected value. This could mean that the delta update payload was targeted for another version, or that the source partition was modified after it was installed, for example, by mounting a filesystem.
[1231/142600:ERROR:delta_performer.cc(1062)] Expected: sha256|hex = 56364358B930F09705B1DA54779402C9B59A5DA333F9B860B3AB401EF5BDD9EE
[1231/142600:ERROR:delta_performer.cc(1065)] Calculated: sha256|hex = 42AB021164B5015BFD12278AE756BC5FD599C982B3944303745F748905BB944C
[1231/142600:ERROR:delta_performer.cc(1076)] Operation source (offset:size) in blocks: 0:4312,4313:1270,5584:8,5597:2188,7786:1042,8833:64,8900:1183,10088:79,10168:2,10175:1,10177:1170,11348:2310
[1231/142600:ERROR:delta_performer.cc(1242)] ValidateSourceHash(source_hasher.raw_hash(), operation, error) failed.
[1231/142600:ERROR:delta_performer.cc(289)] Failed to perform SOURCE_BSDIFF operation 5750, which is the operation 0 in partition "boot"
[1231/142600:ERROR:download_action.cc(274)] Error ErrorCode::kDownloadStateInitializationError (20) in DeltaPerformer's Write method when processing the received payload -- Terminating processing
[1231/142600:INFO:delta_performer.cc(305)] Discarding 6446230 unused downloaded bytes
[1231/142600:INFO:multi_range_http_fetcher.cc(172)] Received transfer terminated.
[1231/142600:INFO:multi_range_http_fetcher.cc
Gesendet von meinem HTC U11 life mit Tapatalk
MC_Ohr said:
So I found the log of update_engine. There is a hash check of the boot partition.
Code:
[1231/141321:INFO:main.cc(115)] Chrome OS Update Engine starting
[1231/141321:INFO:boot_control_android.cc(65)] Loaded boot control hidl hal.
[1231/142402:INFO:update_attempter_android.cc(201)] Using this install plan:
[1231/142402:INFO:install_plan.cc(71)] InstallPlan: new_update, payload type: unknown, source_slot: A, target_slot: B, url: file:///data/ota_package/update.zip, payload size: 88714324, payload hash: Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=, metadata size: 466479, metadata signature: , hash_checks_mandatory: true, powerwash_required: false
[1231/142402:WARNING:htc_utils.cc(151)] HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
[1231/142402:WARNING:htc_utils.cc(152)] POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
[1231/142402:WARNING:htc_utils.cc(153)] POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
[1231/142402:WARNING:htc_utils.cc(105)] HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002; ro.cid=HTC__034
[1231/142402:WARNING:htc_utils.cc(82)] HTC__034 matches...
[1231/142402:WARNING:htc_utils.cc(116)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] HTC_MID=2Q3F20000; ro.mid=2Q3F20000
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] HTC_DEVICE=htc_ocla1_sprout; ro.product.device=htc_ocla1_sprout
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys; ro.build.description=1.06.401.14 9.0_g CL990708 release-keys
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys; ro.build.fingerprint=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_TASKID=515519; ro.aa.taskid=515519
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:INFO:cpu_limiter.cc(71)] Setting cgroup cpu shares to 2
[1231/142402:ERROR:utils.cc(193)] fd >= 0 failed: No such file or directory
[1231/142402:ERROR:cpu_limiter.cc(74)] Failed to change cgroup cpu shares to 2 using /sys/fs/cgroup/cpu/update-engine/cpu.shares
[1231/142402:INFO:update_attempter_android.cc(393)] Marking booted slot as good.
[1231/142402:INFO:update_attempter_android.cc(408)] Scheduling an action processor start.
[1231/142402:INFO:action_processor.cc(46)] ActionProcessor: starting InstallPlanAction
[1231/142402:INFO:action_processor.cc(116)] ActionProcessor: finished InstallPlanAction with code ErrorCode::kSuccess
[1231/142402:INFO:action_processor.cc(143)] ActionProcessor: starting DownloadAction
[1231/142402:INFO:install_plan.cc(71)] InstallPlan: new_update, payload type: unknown, source_slot: A, target_slot: B, url: file:///data/ota_package/update.zip, payload size: 88714324, payload hash: Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=, metadata size: 466479, metadata signature: , hash_checks_mandatory: true, powerwash_required: false
[1231/142402:INFO:download_action.cc(179)] Marking new slot as unbootable
[1231/142402:INFO:multi_range_http_fetcher.cc(45)] starting first transfer
[1231/142402:INFO:multi_range_http_fetcher.cc(74)] starting transfer of range 3946+88714324
[1231/142402:INFO:delta_performer.cc(202)] Completed 0/? operations, 16384/88714324 bytes downloaded (0%), overall progress 0%
[1231/142402:INFO:delta_performer.cc(542)] Manifest size in payload matches expected value from Omaha
[1231/142402:INFO:delta_performer.cc(1412)] Verifying metadata hash signature using public key: /etc/update_engine/update-payload-key.pub.pem
[1231/142402:INFO:payload_verifier.cc(93)] signature blob size = 264
[1231/142402:INFO:payload_verifier.cc(112)] Verified correct signature 1 out of 1 signatures.
[1231/142402:INFO:delta_performer.cc(1455)] Metadata hash signature matches value in Omaha response.
[1231/142403:INFO:delta_performer.cc(1475)] Detected a 'delta' payload.
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old system sha256: SzmK3XVHUFtJDoc+dX9vaiAGZOf4LQLkVANqfoX8aYM= size: 2952790016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new system sha256: rEbITUaIVARqP7NyPwGdYise+S1bgUH6i/8tJe281sY= size: 2952790016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old vendor sha256: pN048+oMXhrsVEpgo9XEJD5P3RPItj9tCaugByFMsdc= size: 838860800
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new vendor sha256: MLf9+C36UzOJlYvtrMj5KFgX5qwTNwJpckDDzzJbW9Q= size: 838860800
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old xbl sha256: 7ZOdUYruCVjIfkRCghobVnVbkfa0qSxMWn2HIekTYaE= size: 3080192
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new xbl sha256: 5+SV0zuYEE3AEu/OudE+hfEcs5bdIKPMazgW/T8mXVI= size: 3084288
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old hosd sha256: IRSk31oyN/2qIFspIkdZT7GM5LxCNyz6tfT3mDNBUEg= size: 55889920
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new hosd sha256: q/svW0eAUbGBCj4++K+i26iR2HMqTn9Y+BJu69ULVtg= size: 55894016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old abl sha256: EJVxhBLKjjxEaTcTCIguE0pR+XMnMRkjHDskCBcSKmo= size: 143360
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new abl sha256: JBPuhtgk7UQ2nEYIb6e9el416xA5UA3IjZ1hOshwdmM= size: 147456
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old rpm sha256: c3WMA2MpUBxJOTzyX/wQQH7Z9COQtVQgY4hGpv1+waA= size: 221184
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new rpm sha256: qifOkTY4PUUjDLHuJYbDDFU1EevI33a5JNBS0EYrnDU= size: 225280
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old pmic sha256: emQfsgD2M2NqhDR/05h+eG0s/bx2vXp0gRSZd5S6gIE= size: 36864
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new pmic sha256: pmM/rwlD9WdyVBFSRvTzo+QYKPeAcopyg4kOcxfnYsU= size: 40960
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old boot sha256: Nj8nwvZ8vEWKwTESh6U+VsN1TuKUmwzYYtwUTcGjvPg= size: 55943168
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new boot sha256: LZwSja8jFa2XwgTfVsOx4r5zMUBT2pv7o6GCvt9uCpU= size: 55947264
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old dsp sha256: cbh7/JbA4pEzDeKqfxf88C3kmR29Rm9t/bS8UINoDcg= size: 16777216
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new dsp sha256: cbh7/JbA4pEzDeKqfxf88C3kmR29Rm9t/bS8UINoDcg= size: 16777216
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old radio sha256: VcolpgB2otdbuQKsZsm43XxtF+wcu8oJS9HkQIY/WWw= size: 62337024
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new radio sha256: 27kNwK+qLEi0MdrM7/hFhlahRzg70it5h9kh6LAMMeY= size: 62337024
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old tz sha256: yWyBuoTv2M+tQSxDTfMmJM2n2q6nIhulMrB3sZ+jsVA= size: 1953792
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new tz sha256: HW1NRgU5N1to4CAeZR1e3irSHkYH8RLD1r/r4Xu5OiI= size: 1957888
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old hyp sha256: Hn0RBVarof+yc5EyaH9zNtDHkG8Ode96TfRmfKt0VEQ= size: 266240
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new hyp sha256: 2J68uFWVRIK0zhkEmek3NmGIRmjk1VuXBmF1Yl5u/fY= size: 270336
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old devcfg sha256: sJa43eqyYdFwno2Ybp5I5g8zjKyYphi+J5L53+WeCUI= size: 45056
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new devcfg sha256: glQk7DOZxJbhP6UJA/j1+BUhw0KBQcQddjNhwhoEdDg= size: 49152
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old cmnlib sha256: KGyqdUERnMSlmFMP50PnDA1uvjWvjOOpp7ZKjaqJJk0= size: 217088
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new cmnlib sha256: 4qjItJNTjy5szo8SFXkbNSSdmm5NarEOjIB26q3dOJA= size: 221184
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old cmnlib64 sha256: mqbqjxPFSfYrKJujRULExhM/No+utcO3QqkPTf5d1Ws= size: 262144
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new cmnlib64 sha256: lRNo5nuiENQZXkX1c3hJhz/oc9Whh8nHI+tiuQLAzXw= size: 266240
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old keymaster sha256: KEcfQcnCfsZ6qFfiWTHYSKfT9cpin9CTtIU+5mgcF9s= size: 278528
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new keymaster sha256: 4bprlshY7JPC5LUsRhoxCLjDg9gl5w6sfCZqFkfHx60= size: 282624
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old lockbooter sha256: VtbPjUhr3SClK5ThAby5q8vJs8cGctJ4d+3/m9hnIG4= size: 86016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new lockbooter sha256: 1sl80Aby2MFL9JElaFezl0KWT4mm8w9n7p7JzPWEOIE= size: 90112
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old bluetooth sha256: HmhjTBICwVt0g2tSOedZXEbv4RKk6brzSmBDJKZgNQ0= size: 503808
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new bluetooth sha256: b4bYyd+Ff4w896RlM4SD24/kuxdSKdj3cOKyRg44U9w= size: 503808
[1231/142403:INFO:delta_performer.cc(365)] Applying 3445 operations to partition "system"
[1231/142403:INFO:delta_performer.cc(653)] Starting to apply update payload operations
[1231/142428:INFO:delta_performer.cc(202)] Completed 890/6357 operations (14%), 5488640/88714324 bytes downloaded (6%), overall progress 10%
[1231/142438:INFO:delta_performer.cc(202)] Completed 2035/6357 operations (32%), 7372800/88714324 bytes downloaded (8%), overall progress 20%
[1231/142501:INFO:delta_performer.cc(202)] Completed 2798/6357 operations (44%), 15613952/88714324 bytes downloaded (17%), overall progress 30%
[1231/142523:INFO:delta_performer.cc(202)] Completed 3406/6357 operations (53%), 24854528/88714324 bytes downloaded (28%), overall progress 40%
[1231/142524:INFO:delta_performer.cc(202)] Completed 3437/6357 operations (54%), 40812544/88714324 bytes downloaded (46%), overall progress 50%
[1231/142525:INFO:delta_performer.cc(365)] Applying 2278 operations to partition "vendor"
[1231/142525:INFO:delta_performer.cc(202)] Completed 3815/6357 operations (60%), 54706176/88714324 bytes downloaded (61%), overall progress 60%
[1231/142529:INFO:delta_performer.cc(202)] Completed 4959/6357 operations (78%), 55050240/88714324 bytes downloaded (62%), overall progress 70%
[1231/142545:INFO:delta_performer.cc(202)] Completed 5722/6357 operations (90%), 63242240/88714324 bytes downloaded (71%), overall progress 80%
[1231/142546:INFO:delta_performer.cc(365)] Applying 7 operations to partition "xbl"
[1231/142546:INFO:delta_performer.cc(365)] Applying 12 operations to partition "hosd"
[1231/142559:INFO:delta_performer.cc(365)] Applying 2 operations to partition "abl"
[1231/142559:INFO:delta_performer.cc(365)] Applying 4 operations to partition "rpm"
[1231/142559:INFO:delta_performer.cc(365)] Applying 2 operations to partition "pmic"
[1231/142559:INFO:delta_performer.cc(365)] Applying 12 operations to partition "boot"
[1231/142600:ERROR:delta_performer.cc(1057)] The hash of the source data on disk for this operation doesn't match the expected value. This could mean that the delta update payload was targeted for another version, or that the source partition was modified after it was installed, for example, by mounting a filesystem.
[1231/142600:ERROR:delta_performer.cc(1062)] Expected: sha256|hex = 56364358B930F09705B1DA54779402C9B59A5DA333F9B860B3AB401EF5BDD9EE
[1231/142600:ERROR:delta_performer.cc(1065)] Calculated: sha256|hex = 42AB021164B5015BFD12278AE756BC5FD599C982B3944303745F748905BB944C
[1231/142600:ERROR:delta_performer.cc(1076)] Operation source (offset:size) in blocks: 0:4312,4313:1270,5584:8,5597:2188,7786:1042,8833:64,8900:1183,10088:79,10168:2,10175:1,10177:1170,11348:2310
[1231/142600:ERROR:delta_performer.cc(1242)] ValidateSourceHash(source_hasher.raw_hash(), operation, error) failed.
[1231/142600:ERROR:delta_performer.cc(289)] Failed to perform SOURCE_BSDIFF operation 5750, which is the operation 0 in partition "boot"
[1231/142600:ERROR:download_action.cc(274)] Error ErrorCode::kDownloadStateInitializationError (20) in DeltaPerformer's Write method when processing the received payload -- Terminating processing
[1231/142600:INFO:delta_performer.cc(305)] Discarding 6446230 unused downloaded bytes
[1231/142600:INFO:multi_range_http_fetcher.cc(172)] Received transfer terminated.
[1231/142600:INFO:multi_range_http_fetcher.cc
Gesendet von meinem HTC U11 life mit Tapatalk
Click to expand...
Click to collapse
I've noticed on Oreo firmware for u11 and u11 life if bootloader is unlocked the system will show modified even if nothing was altered. That means the only way would be to lock bootloader and ruu back to stock. It sucks because if we can't get boot.img to patch then there will be no root on the new update you are trying to update to.
twinnfamous said:
I've noticed on Oreo firmware for u11 and u11 life if bootloader is unlocked the system will show modified even if nothing was altered. That means the only way would be to lock bootloader and ruu back to stock. It sucks because if we can't get boot.img to patch then there will be no root on the new update you are trying to update to.
Click to expand...
Click to collapse
I have now flashed the boot_signed.img and was able to take the update. The new factory Image is also online on easy firmware, so I'm downloading. When it´s finished I will patch and upload again.
MC_Ohr said:
I have now flashed the boot_signed.img and was able to take the update. The new factory Image is also online on easy firmware, so I'm downloading. When it´s finished I will patch and upload again.
Click to expand...
Click to collapse
Ok cool

sch-I535 do you have this files: 8960_msimage.mbn MPRG8960.hex

hi everyone. i have bricked i535. i am working on it for about 3 days. sd card method, qfil method and others did not worked. so i am looking for this files for flashing it with unbrick.sh script on ubuntu.
unbrick.sh came with this files but i think they are not for i535. hex is working but at the end:
:
:
:
Writing 1024 bytes to 0x2a02ec00; 1180 bytes left.
Writing 1024 bytes to 0x2a02f000; 156 bytes left.
Writing 156 bytes to 0x2a02f400; 0 bytes left.
Executing file...
Failed to get response.
Sending MAGIC...
Invalid MAGIC response.
i think the hex and mbn are for 8960 cpu but not for i535. Can you help

Recover corrupt SD card partitions

Hi,
After a botched attempt to install LineageOS 17 on my Samsung Galaxy S5, I decided to revert to LOS16. the problem is that I had completely wiped my device in order to install LOS 17, and my only available 16.x ROM was gone, so I found another ROM on a backup site (October 2020 version).
Once installed, this version did not recognize my SD card where I had stored all my user data. Therefore I dumped the partitions on my Linux PC using dd, and let Android reformat the card.
I dumped 2 individual partitions (not the whole device with the partition table), one of 16Mb, and the other about 29Gb (it's a 32Gb SD card).
Now I want to browse my old data on the backup, but I cannot mount or fsck the partition dumps. the superblock is not recognized as ext*, fat, or even f2fs.
This is all the info I have on the 2 partitions:
Bash:
$ sudo fdisk -l klte-sdc1.img
Disk klte-sdc1.img: 16 MiB, 16777216 bytes, 32768 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
$ sudo fdisk -l klte-sdc2.img
Disk klte-sdc2.img: 29.71 GiB, 31897140736 bytes, 62299103 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Also, for comparison, I dumped the partition table of the currently working SD card:
Bash:
$ sudo fdisk -l /dev/sdc
Disk /dev/sdc: 29.72 GiB, 31914983424 bytes, 62333952 sectors
Disk model: MicroSD/M2
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disklabel type: gpt
Disk identifier: 35D0FC04-06BD-4578-87FB-D6ED991C03A5
Device Start End Sectors Size Type
/dev/sdc1 2048 34815 32768 16M unknown
/dev/sdc2 34816 62333918 62299103 29.7G unknown
As you see, the partition sizes are identical. I can chance it and dd the original partitions into the new ones, but I don't want to lose recent data on the current partition. I could also corrupt the partition headers if the ones in the backups are corrupt, and be back to square 1.
Can anybody help? Which kind of partition or specialized tools shall I look for?
Thanks,
gm

Categories

Resources