Code:
Process Index:0
please select the XML file
Start Download
COM Port number:4
Sahara Connecting ...
Sahara Version:2
Start Sending Programmer
Sending Programmer Finished
Switch To FireHose
Max Payload Size to Target:49152 Bytes
Device Type:eMMC
Platform:8x26
Disable Ack Raw Data Every N Packets
Ack Raw Data:False
Skip Write:False
Always Validate:False
Use Verbose:False
COM Port number:4
Sending NOP
FireHose NOP sent successfully
Sending Configuration
Device Type:eMMC
Platform:8x26
Set TxBuffer 0x4000, RxBuffer 0x4000
Firehose configure packet sent successfully!
Total Bytes To Program 0x102A2A0
Download Image
PROGRAM: Partition 0, Sector: 0, Length: 33 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\gpt_backup0.bin
PROGRAM: Written Bytes 0x4200 (64)
Program Size: 0.02 MB
PROGRAM: Partition 0, Sector: 0, Length: 34 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\gpt_main0.bin
PROGRAM: Written Bytes 0x4400 (64)
Program Size: 0.02 MB
PROGRAM: Replace the partition sectors number 0xc000 to file size in sector 0x7134
PROGRAM: Partition 0, Sector: 93184, Length: 28980 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\laf.img
PROGRAM: Written Bytes 0xe26800 (64)
Program Size: 14.15 MB
PROGRAM: Replace the partition sectors number 0x1000 to file size in sector 0x7d9
PROGRAM: Partition 0, Sector: 5120, Length: 2009 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\emmc_appsboot.mbn
PROGRAM: Written Bytes 0xfb200 (64)
Program Size: 0.98 MB
PROGRAM: Replace the partition sectors number 0x400 to file size in sector 0x12f
PROGRAM: Partition 0, Sector: 4096, Length: 303 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\rpm.mbn
PROGRAM: Written Bytes 0x25e00 (64)
Program Size: 0.15 MB
PROGRAM: Replace the partition sectors number 0x400 to file size in sector 0x70
PROGRAM: Partition 0, Sector: 3072, Length: 112 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\hyp.mbn
PROGRAM: Written Bytes 0xe000 (64)
Program Size: 0.05 MB
PROGRAM: Replace the partition sectors number 0x400 to file size in sector 0x3b1
PROGRAM: Partition 0, Sector: 2048, Length: 945 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\tz.mbn
PROGRAM: Written Bytes 0x76200 (64)
Program Size: 0.46 MB
PROGRAM: Replace the partition sectors number 0x400 to file size in sector 0x2b1
PROGRAM: Partition 0, Sector: 1024, Length: 689 Sectors, Sector Size: 512 Bytes
File: C:\unbrick\sbl1.mbn
PROGRAM: Written Bytes 0x56200 (64)
Program Size: 0.34 MB
Total Size: 16.16 MB
Total Size: 1 Seconds
Throughput: 16.16 MB/Seconds
PATCH: Partition 0, Sector: 11, Offset 296 Bytes, Size: 8 Bytes, Value: NUM_DISK_SECTORS-34.
PATCH: Partition 0, Sector: 0, Offset 296 Bytes, Size: 8 Bytes, Value: NUM_DISK_SECTORS-34.
PATCH: Partition 0, Sector: 1, Offset 48 Bytes, Size: 8 Bytes, Value: NUM_DISK_SECTORS-34.
PATCH: Partition 0, Sector: 0, Offset 48 Bytes, Size: 8 Bytes, Value: NUM_DISK_SECTORS-34.
PATCH: Partition 0, Sector: 1, Offset 32 Bytes, Size: 8 Bytes, Value: NUM_DISK_SECTORS-1.
PATCH: Partition 0, Sector: 0, Offset 24 Bytes, Size: 8 Bytes, Value: NUM_DISK_SECTORS-1.
PATCH: Partition 0, Sector: 0, Offset 72 Bytes, Size: 8 Bytes, Value: NUM_DISK_SECTORS-33.
PATCH: Partition 0, Sector: 1, Offset 88 Bytes, Size: 4 Bytes, Value: CRC32(2,5120)
PATCH: Partition 0, Sector: 0, Offset 88 Bytes, Size: 4 Bytes, Value: CRC32(NUM_DISK_SECTORS-33.,5120)
PATCH: Partition 0, Sector: 1, Offset 16 Bytes, Size: 4 Bytes, Value: 0
PATCH: Partition 0, Sector: 1, Offset 16 Bytes, Size: 4 Bytes, Value: CRC32(1,92)
PATCH: Partition 0, Sector: 0, Offset 16 Bytes, Size: 4 Bytes, Value: 0
PATCH: Partition 0, Sector: 0, Offset 16 Bytes, Size: 4 Bytes, Value: CRC32(NUM_DISK_SECTORS-1.,92)
Total download file size: 16.16455MB
Throughput: 16.16455M/s
Reset Phone
Waiting for reset done...
Finish Download
Successful unbrick LG LS770 9008 mode
Use QFIL to flash the LS770 recovery file, it works on LS770 with ZV5 only. If you hard bricked at LS770ZV5, then you can unbrick it by flashing the recovery file with QFIL
emmc_appsboot.mbn
gpt_backup0.bin
gpt_both0.bin
gpt_main0.bin
hyp.mbn
laf.img
MPRG8916.mbn
New9008.zip
old_prog_emmc_firehose_8916.mbn
partition-c70n_global_com.xml
patch0.xml
prog_emmc_firehose_8916.mbn
rawprogram0.xml
rpm.mbn
sbl1.mbn
tz.mbn
validated_emmc_firehose_8916.mbn
asialove2013 said:
Hi, I am trying to find out how to unbrick a G Stylo LS770 stuck on Qualcomm HS-USB QDLoader 9008 mode.
First, I need to get the rawprogram0.xml for G Stylo LS770..
from a rooted working LS770 model:
Code:
adb shell su -c 'dd if=/dev/block/mmcblk0 of=/cache/partition0.bin bs=512 count=20480'
Get partition0.bin
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
00 04 00 is sbl1 -Start LBA
00 07 FF is sbl1 - end LBA
In the original Boarddiag tool, there are rawprogram0.xml file for other LG models.
I have to edit it based on the information from partition file i just got.
below entry is what i create based on partition table
<program SECTOR_SIZE_IN_BYTES="512" file_sector_offset="0" filename="sbl1.mbn" label="sbl1" num_partition_sectors="1024" physical_partition_number="0" size_in_KB="512.0" sparse="false" start_byte_hex="0x80000" start_sector="1024" />
num_partition_sectors: End LBA- start LBA+1 = 400, Convert it to HEX, that is 1024
start_sector = Start LBA, and convert it to HEX, that is 1024.
start_byte_hex : 1024*512= 524288 convert to hex, it is 80000
Now we have the rawprogram0.xml
---
Forgive my bad English,..(
Click to expand...
Click to collapse
wheres the rawprogram can you share it with me ?
---------- Post added at 03:13 PM ---------- Previous post was at 03:01 PM ----------
jcsaclolo said:
wheres the rawprogram can you share it with me ?
Click to expand...
Click to collapse
hello i got bricked LG LS770 ZV7 it is hard bricked and stuck on QDLoader 9008 i need tot firmware DLL and xml files if you can help me unbrick it im willing to pay just give me step by step instructions. Im not tech savvy willing to pay 100$ to 150$ depend on situation i am very upset about this so i would thank you a lot and pay you if you could really help me please email me at [email protected].com
No need DLL
jcsaclolo said:
wheres the rawprogram can you share it with me ?
---------- Post added at 03:13 PM ---------- Previous post was at 03:01 PM ----------
hello i got bricked LG LS770 ZV7 it is hard bricked and stuck on QDLoader 9008 i need tot firmware DLL and xml files if you can help me unbrick it im willing to pay just give me step by step instructions. Im not tech savvy willing to pay 100$ to 150$ depend on situation i am very upset about this so i would thank you a lot and pay you if you could really help me please email me at [email protected]
Click to expand...
Click to collapse
Just start working on this. I know you! We have been talking about the LS770 QDLoader 9008 issue for almost 30 days.
No need DLL, I am just trying to use LG's official smart boot diag tool to solve this, I will let you know when i got further information.
Successful GOT My LS770 back from Qualcomm HS-USB QDLoader 9008 mode.
now in download mode,
ZV5 is fine,
But ZV7 has Qufse check fail error,
asialove2013 said:
Successful GOT My LS770 back from Qualcomm HS-USB QDLoader 9008 mode.
now in download mode,
ZV5 is fine,
But ZV7 has Qufse check fail error,
Click to expand...
Click to collapse
Could you please post the files you used to do so?
jcsaclolo said:
wheres the rawprogram can you share it with me ?
---------- Post added at 03:13 PM ---------- Previous post was at 03:01 PM ----------
hello i got bricked LG LS770 ZV7 it is hard bricked and stuck on QDLoader 9008 i need tot firmware DLL and xml files if you can help me unbrick it im willing to pay just give me step by step instructions. Im not tech savvy willing to pay 100$ to 150$ depend on situation i am very upset about this so i would thank you a lot and pay you if you could really help me please email me at [email protected]
Click to expand...
Click to collapse
Do you have the ZV5 tot file? What was the final outcome of flashing back to ZV5 from ZV7?
I would like to get a copy of zv5, so how can I get that? Thank you
another try
All LG G Stylo use 8X26, SEE Screen shot below
no way
Sorry, can not share the file!
I am working on it.
I will share as I success
Sent from my XT1093 using XDA-Developers mobile app
asialove2013 said:
Not free! It is no shame to share free kdz firmware, I have share lots of G5, V10, G4, G3, K10, firmware.
I do not share LG G5 H850 TOT firmware because it was build by some developers at xda.
I do not share LG LS770 tot because it was build by others too.
Some one said that it should be free, but you can never get it from AT & T or Sprint,
I noticed you (Wired66) shared other developers ls770 firmware and making profit from it?
So I will never share files to unbrick Quancomm 9008 mode, SORRY
Click to expand...
Click to collapse
Are you okay, really? You know the code in those .TOT files is owned by LG right. Making a tot file is just copy and pasting someone else's work. It does not make it yours no matter how much you want it to be.
And no i'm not in the business of selling big corporations code, where the heck did you pull that out of.
This is your thread you can argue with whoever unwittingly post in it, but I'm out.
sorry
Wired66 said:
Are you okay, really? You know the code in those .TOT files is owned by LG right. Making a tot file is just copy and pasting someone else's work. It does not make it yours no matter how much you want it to be.
And no i'm not in the business of selling big corporations code, where the heck did you pull that out of.
This is your thread you can argue with whoever unwittingly post in it, but I'm out.
Click to expand...
Click to collapse
Sorry, It is my mistake, I mistake you with some one else
you are right
I am trying to edit my previous post,,
asialove2013 said:
Sorry, It is my mistake, I mistake you with some one else
Click to expand...
Click to collapse
No hard feelings, on my part.
I'm taking a stab at throwing together some .TOT files on my own. I should have at least one that I'm throwing together for the LS-770 here later today. I'll post them here on XDA as the community really could use them. If you change your mind about posting those files I would have three other phones to test them out on that I bricked poking at this locked bootloader.
Please do a tot file for for boost stylo zv5 (5.11).Thanks!!
Sent from my N9521 using Tapatalk
please help me for how repair LG G Stylo LS770 Unbrick MSM8916 fast
thank you
After researching, and waiting months for a .tot file to come out, I have successfully fixed my LS770 Boost Mobile Stylo. I kinda missed this thing. I'll help anyone who needs it. I WILL NOT charge, either. Ain't Android suppose to be Open Source? Then lets keep it 'Open'
mabry said:
After researching, and waiting months for a .tot file to come out, I have successfully fixed my LS770 Boost Mobile Stylo. I kinda missed this thing. I'll help anyone who needs it. I WILL NOT charge, either. Ain't Android suppose to be Open Source? Then lets keep it 'Open'
Click to expand...
Click to collapse
I am trying to find a ZV5 tot, if you can help, thanks. Also if you understand quse, how can I understand flashing and qfuse, thanks
mabry said:
After researching, and waiting months for a .tot file to come out, I have successfully fixed my LS770 Boost Mobile Stylo. I kinda missed this thing. I'll help anyone who needs it. I WILL NOT charge, either. Ain't Android suppose to be Open Source? Then lets keep it 'Open'
Click to expand...
Click to collapse
You were in QDLoader Mode? I could really use the files to debrick some phones. I got as far as getting to a download mode with a black screen and a battery symbol before I put the battery back in but nothing flashes and then upon reboot I'm back to QDloader mode. I must have one of the files off.
jcsaclolo said:
wheres the rawprogram can you share it with me ?
---------- Post added at 03:13 PM ---------- Previous post was at 03:01 PM ----------
hello i got bricked LG LS770 ZV7 it is hard bricked and stuck on QDLoader 9008 i need tot firmware DLL and xml files if you can help me unbrick it im willing to pay just give me step by step instructions. Im not tech savvy willing to pay 100$ to 150$ depend on situation i am very upset about this so i would thank you a lot and pay you if you could really help me please email me at [email protected]
Click to expand...
Click to collapse
can u help my lg ls770zv7 don't pass from lg screen it's on 6.0 android
mabry said:
After researching, and waiting months for a .tot file to come out, I have successfully fixed my LS770 Boost Mobile Stylo. I kinda missed this thing. I'll help anyone who needs it. I WILL NOT charge, either. Ain't Android suppose to be Open Source? Then lets keep it 'Open'
Click to expand...
Click to collapse
would like help in fixing my lg g stylo I'm stuck in QUALCOMM hs-usb qdloader 9008 after using the lg up tool to flash zv7 tot I had forgothen the bloody device updated itself to zv8, so I was playing around with kingoroot managed to delete the recovery wihich in part enables fastboot mode. after failing to input commads I decided to flash back and now qfuse screws me over. help would be appreciated.
Hello,
Does anyone know how I can install the security update for December on Android One EU device?
My Software is 1.06.401.14.
I received an update.zip but installation aborted. My System is rooted with Magisk.
I had a look into the zip and found a META-INF Folder; compatibility.zip; payload.bin
payload_properties.txt
Code:
FILE_HASH=Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=
FILE_SIZE=88714324
METADATA_HASH=Kleu845IDwsBg9YKK9sxRLgzsV6kQcw0Qu2aikz/UuA=
METADATA_SIZE=466479
HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002
HTC_MID=2Q3F20000
HTC_DEVICE=htc_ocla1_sprout
PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys
PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
PRE_TASKID=515519
care_map.txt
Code:
system
90,0,32767,32768,32770,32945,32947,33452,65534,65536,65538,66043,71519,98304,98306,98481,98483,98988,131071,131072,131074,131579,133736,163840,163842,164017,164019,164524,196607,196608,196610,197115,198114,229376,229378,229553,229555,230060,262142,262144,262146,262651,263103,294912,294914,295089,295091,295596,327678,327680,327682,328187,328209,360448,360450,360955,393214,393216,393218,393723,425982,425984,425986,426491,458750,458752,458754,459259,491518,491520,491522,492027,524286,524288,524290,524795,557054,557056,557058,557563,564954,589824,589826,622592,622594,655360,655362,688128,688130,688635,709641
The data seem to be inside payload.bin. Does anybody know how to extract the payload.bin? Maybe then I can install the *.img manually.
MC_Ohr said:
Hello,
Does anyone know how I can install the security update for December on Android One EU device?
My Software is 1.06.401.14.
I received an update.zip but installation aborted. My System is rooted with Magisk.
I had a look into the zip and found a META-INF Folder; compatibility.zip; payload.bin
payload_properties.txt
Code:
FILE_HASH=Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=
FILE_SIZE=88714324
METADATA_HASH=Kleu845IDwsBg9YKK9sxRLgzsV6kQcw0Qu2aikz/UuA=
METADATA_SIZE=466479
HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002
HTC_MID=2Q3F20000
HTC_DEVICE=htc_ocla1_sprout
PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys
PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
PRE_TASKID=515519
care_map.txt
Code:
system
90,0,32767,32768,32770,32945,32947,33452,65534,65536,65538,66043,71519,98304,98306,98481,98483,98988,131071,131072,131074,131579,133736,163840,163842,164017,164019,164524,196607,196608,196610,197115,198114,229376,229378,229553,229555,230060,262142,262144,262146,262651,263103,294912,294914,295089,295091,295596,327678,327680,327682,328187,328209,360448,360450,360955,393214,393216,393218,393723,425982,425984,425986,426491,458750,458752,458754,459259,491518,491520,491522,492027,524286,524288,524290,524795,557054,557056,557058,557563,564954,589824,589826,622592,622594,655360,655362,688128,688130,688635,709641
The data seem to be inside payload.bin. Does anybody know how to extract the payload.bin? Maybe then I can install the *.img manually.
Click to expand...
Click to collapse
Check this out
https://github.com/erfanoabdi/imgpatchtools
MC_Ohr said:
Hello,
Does anyone know how I can install the security update for December on Android One EU device?
My Software is 1.06.401.14.
I received an update.zip but installation aborted. My System is rooted with Magisk.
I had a look into the zip and found a META-INF Folder; compatibility.zip; payload.bin
payload_properties.txt
Code:
FILE_HASH=Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=
FILE_SIZE=88714324
METADATA_HASH=Kleu845IDwsBg9YKK9sxRLgzsV6kQcw0Qu2aikz/UuA=
METADATA_SIZE=466479
HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002
HTC_MID=2Q3F20000
HTC_DEVICE=htc_ocla1_sprout
PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys
PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
PRE_TASKID=515519
care_map.txt
Code:
system
90,0,32767,32768,32770,32945,32947,33452,65534,65536,65538,66043,71519,98304,98306,98481,98483,98988,131071,131072,131074,131579,133736,163840,163842,164017,164019,164524,196607,196608,196610,197115,198114,229376,229378,229553,229555,230060,262142,262144,262146,262651,263103,294912,294914,295089,295091,295596,327678,327680,327682,328187,328209,360448,360450,360955,393214,393216,393218,393723,425982,425984,425986,426491,458750,458752,458754,459259,491518,491520,491522,492027,524286,524288,524290,524795,557054,557056,557058,557563,564954,589824,589826,622592,622594,655360,655362,688128,688130,688635,709641
The data seem to be inside payload.bin. Does anybody know how to extract the payload.bin? Maybe then I can install the *.img manually.
Click to expand...
Click to collapse
Send me the ota zip and I will decrypt it withhtc ruu decrypt tool and pull the boot.img and we can patch it and upload it for others.
twinnfamous said:
Send me the ota zip and I will decrypt it withhtc ruu decrypt tool and pull the boot.img and we can patch it and upload it for others.
Click to expand...
Click to collapse
I tried with htc decrypt tool by @nkk71 and @Captain_Throwback but the payload.bin stays untouched. Is there any other way to extract?
I tried out to boot from slot_b but it did not work. I`m afraid that I have to restore to stock and start from the beginning again...
Did anyone with android one device installed the security update successfully? What softwarenumber abe youon now?
So I found the log of update_engine. There is a hash check of the boot partition.
Code:
[1231/141321:INFO:main.cc(115)] Chrome OS Update Engine starting
[1231/141321:INFO:boot_control_android.cc(65)] Loaded boot control hidl hal.
[1231/142402:INFO:update_attempter_android.cc(201)] Using this install plan:
[1231/142402:INFO:install_plan.cc(71)] InstallPlan: new_update, payload type: unknown, source_slot: A, target_slot: B, url: file:///data/ota_package/update.zip, payload size: 88714324, payload hash: Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=, metadata size: 466479, metadata signature: , hash_checks_mandatory: true, powerwash_required: false
[1231/142402:WARNING:htc_utils.cc(151)] HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
[1231/142402:WARNING:htc_utils.cc(152)] POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
[1231/142402:WARNING:htc_utils.cc(153)] POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
[1231/142402:WARNING:htc_utils.cc(105)] HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002; ro.cid=HTC__034
[1231/142402:WARNING:htc_utils.cc(82)] HTC__034 matches...
[1231/142402:WARNING:htc_utils.cc(116)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] HTC_MID=2Q3F20000; ro.mid=2Q3F20000
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] HTC_DEVICE=htc_ocla1_sprout; ro.product.device=htc_ocla1_sprout
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys; ro.build.description=1.06.401.14 9.0_g CL990708 release-keys
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys; ro.build.fingerprint=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_TASKID=515519; ro.aa.taskid=515519
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:INFO:cpu_limiter.cc(71)] Setting cgroup cpu shares to 2
[1231/142402:ERROR:utils.cc(193)] fd >= 0 failed: No such file or directory
[1231/142402:ERROR:cpu_limiter.cc(74)] Failed to change cgroup cpu shares to 2 using /sys/fs/cgroup/cpu/update-engine/cpu.shares
[1231/142402:INFO:update_attempter_android.cc(393)] Marking booted slot as good.
[1231/142402:INFO:update_attempter_android.cc(408)] Scheduling an action processor start.
[1231/142402:INFO:action_processor.cc(46)] ActionProcessor: starting InstallPlanAction
[1231/142402:INFO:action_processor.cc(116)] ActionProcessor: finished InstallPlanAction with code ErrorCode::kSuccess
[1231/142402:INFO:action_processor.cc(143)] ActionProcessor: starting DownloadAction
[1231/142402:INFO:install_plan.cc(71)] InstallPlan: new_update, payload type: unknown, source_slot: A, target_slot: B, url: file:///data/ota_package/update.zip, payload size: 88714324, payload hash: Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=, metadata size: 466479, metadata signature: , hash_checks_mandatory: true, powerwash_required: false
[1231/142402:INFO:download_action.cc(179)] Marking new slot as unbootable
[1231/142402:INFO:multi_range_http_fetcher.cc(45)] starting first transfer
[1231/142402:INFO:multi_range_http_fetcher.cc(74)] starting transfer of range 3946+88714324
[1231/142402:INFO:delta_performer.cc(202)] Completed 0/? operations, 16384/88714324 bytes downloaded (0%), overall progress 0%
[1231/142402:INFO:delta_performer.cc(542)] Manifest size in payload matches expected value from Omaha
[1231/142402:INFO:delta_performer.cc(1412)] Verifying metadata hash signature using public key: /etc/update_engine/update-payload-key.pub.pem
[1231/142402:INFO:payload_verifier.cc(93)] signature blob size = 264
[1231/142402:INFO:payload_verifier.cc(112)] Verified correct signature 1 out of 1 signatures.
[1231/142402:INFO:delta_performer.cc(1455)] Metadata hash signature matches value in Omaha response.
[1231/142403:INFO:delta_performer.cc(1475)] Detected a 'delta' payload.
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old system sha256: SzmK3XVHUFtJDoc+dX9vaiAGZOf4LQLkVANqfoX8aYM= size: 2952790016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new system sha256: rEbITUaIVARqP7NyPwGdYise+S1bgUH6i/8tJe281sY= size: 2952790016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old vendor sha256: pN048+oMXhrsVEpgo9XEJD5P3RPItj9tCaugByFMsdc= size: 838860800
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new vendor sha256: MLf9+C36UzOJlYvtrMj5KFgX5qwTNwJpckDDzzJbW9Q= size: 838860800
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old xbl sha256: 7ZOdUYruCVjIfkRCghobVnVbkfa0qSxMWn2HIekTYaE= size: 3080192
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new xbl sha256: 5+SV0zuYEE3AEu/OudE+hfEcs5bdIKPMazgW/T8mXVI= size: 3084288
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old hosd sha256: IRSk31oyN/2qIFspIkdZT7GM5LxCNyz6tfT3mDNBUEg= size: 55889920
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new hosd sha256: q/svW0eAUbGBCj4++K+i26iR2HMqTn9Y+BJu69ULVtg= size: 55894016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old abl sha256: EJVxhBLKjjxEaTcTCIguE0pR+XMnMRkjHDskCBcSKmo= size: 143360
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new abl sha256: JBPuhtgk7UQ2nEYIb6e9el416xA5UA3IjZ1hOshwdmM= size: 147456
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old rpm sha256: c3WMA2MpUBxJOTzyX/wQQH7Z9COQtVQgY4hGpv1+waA= size: 221184
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new rpm sha256: qifOkTY4PUUjDLHuJYbDDFU1EevI33a5JNBS0EYrnDU= size: 225280
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old pmic sha256: emQfsgD2M2NqhDR/05h+eG0s/bx2vXp0gRSZd5S6gIE= size: 36864
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new pmic sha256: pmM/rwlD9WdyVBFSRvTzo+QYKPeAcopyg4kOcxfnYsU= size: 40960
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old boot sha256: Nj8nwvZ8vEWKwTESh6U+VsN1TuKUmwzYYtwUTcGjvPg= size: 55943168
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new boot sha256: LZwSja8jFa2XwgTfVsOx4r5zMUBT2pv7o6GCvt9uCpU= size: 55947264
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old dsp sha256: cbh7/JbA4pEzDeKqfxf88C3kmR29Rm9t/bS8UINoDcg= size: 16777216
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new dsp sha256: cbh7/JbA4pEzDeKqfxf88C3kmR29Rm9t/bS8UINoDcg= size: 16777216
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old radio sha256: VcolpgB2otdbuQKsZsm43XxtF+wcu8oJS9HkQIY/WWw= size: 62337024
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new radio sha256: 27kNwK+qLEi0MdrM7/hFhlahRzg70it5h9kh6LAMMeY= size: 62337024
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old tz sha256: yWyBuoTv2M+tQSxDTfMmJM2n2q6nIhulMrB3sZ+jsVA= size: 1953792
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new tz sha256: HW1NRgU5N1to4CAeZR1e3irSHkYH8RLD1r/r4Xu5OiI= size: 1957888
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old hyp sha256: Hn0RBVarof+yc5EyaH9zNtDHkG8Ode96TfRmfKt0VEQ= size: 266240
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new hyp sha256: 2J68uFWVRIK0zhkEmek3NmGIRmjk1VuXBmF1Yl5u/fY= size: 270336
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old devcfg sha256: sJa43eqyYdFwno2Ybp5I5g8zjKyYphi+J5L53+WeCUI= size: 45056
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new devcfg sha256: glQk7DOZxJbhP6UJA/j1+BUhw0KBQcQddjNhwhoEdDg= size: 49152
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old cmnlib sha256: KGyqdUERnMSlmFMP50PnDA1uvjWvjOOpp7ZKjaqJJk0= size: 217088
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new cmnlib sha256: 4qjItJNTjy5szo8SFXkbNSSdmm5NarEOjIB26q3dOJA= size: 221184
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old cmnlib64 sha256: mqbqjxPFSfYrKJujRULExhM/No+utcO3QqkPTf5d1Ws= size: 262144
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new cmnlib64 sha256: lRNo5nuiENQZXkX1c3hJhz/oc9Whh8nHI+tiuQLAzXw= size: 266240
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old keymaster sha256: KEcfQcnCfsZ6qFfiWTHYSKfT9cpin9CTtIU+5mgcF9s= size: 278528
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new keymaster sha256: 4bprlshY7JPC5LUsRhoxCLjDg9gl5w6sfCZqFkfHx60= size: 282624
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old lockbooter sha256: VtbPjUhr3SClK5ThAby5q8vJs8cGctJ4d+3/m9hnIG4= size: 86016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new lockbooter sha256: 1sl80Aby2MFL9JElaFezl0KWT4mm8w9n7p7JzPWEOIE= size: 90112
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old bluetooth sha256: HmhjTBICwVt0g2tSOedZXEbv4RKk6brzSmBDJKZgNQ0= size: 503808
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new bluetooth sha256: b4bYyd+Ff4w896RlM4SD24/kuxdSKdj3cOKyRg44U9w= size: 503808
[1231/142403:INFO:delta_performer.cc(365)] Applying 3445 operations to partition "system"
[1231/142403:INFO:delta_performer.cc(653)] Starting to apply update payload operations
[1231/142428:INFO:delta_performer.cc(202)] Completed 890/6357 operations (14%), 5488640/88714324 bytes downloaded (6%), overall progress 10%
[1231/142438:INFO:delta_performer.cc(202)] Completed 2035/6357 operations (32%), 7372800/88714324 bytes downloaded (8%), overall progress 20%
[1231/142501:INFO:delta_performer.cc(202)] Completed 2798/6357 operations (44%), 15613952/88714324 bytes downloaded (17%), overall progress 30%
[1231/142523:INFO:delta_performer.cc(202)] Completed 3406/6357 operations (53%), 24854528/88714324 bytes downloaded (28%), overall progress 40%
[1231/142524:INFO:delta_performer.cc(202)] Completed 3437/6357 operations (54%), 40812544/88714324 bytes downloaded (46%), overall progress 50%
[1231/142525:INFO:delta_performer.cc(365)] Applying 2278 operations to partition "vendor"
[1231/142525:INFO:delta_performer.cc(202)] Completed 3815/6357 operations (60%), 54706176/88714324 bytes downloaded (61%), overall progress 60%
[1231/142529:INFO:delta_performer.cc(202)] Completed 4959/6357 operations (78%), 55050240/88714324 bytes downloaded (62%), overall progress 70%
[1231/142545:INFO:delta_performer.cc(202)] Completed 5722/6357 operations (90%), 63242240/88714324 bytes downloaded (71%), overall progress 80%
[1231/142546:INFO:delta_performer.cc(365)] Applying 7 operations to partition "xbl"
[1231/142546:INFO:delta_performer.cc(365)] Applying 12 operations to partition "hosd"
[1231/142559:INFO:delta_performer.cc(365)] Applying 2 operations to partition "abl"
[1231/142559:INFO:delta_performer.cc(365)] Applying 4 operations to partition "rpm"
[1231/142559:INFO:delta_performer.cc(365)] Applying 2 operations to partition "pmic"
[1231/142559:INFO:delta_performer.cc(365)] Applying 12 operations to partition "boot"
[1231/142600:ERROR:delta_performer.cc(1057)] The hash of the source data on disk for this operation doesn't match the expected value. This could mean that the delta update payload was targeted for another version, or that the source partition was modified after it was installed, for example, by mounting a filesystem.
[1231/142600:ERROR:delta_performer.cc(1062)] Expected: sha256|hex = 56364358B930F09705B1DA54779402C9B59A5DA333F9B860B3AB401EF5BDD9EE
[1231/142600:ERROR:delta_performer.cc(1065)] Calculated: sha256|hex = 42AB021164B5015BFD12278AE756BC5FD599C982B3944303745F748905BB944C
[1231/142600:ERROR:delta_performer.cc(1076)] Operation source (offset:size) in blocks: 0:4312,4313:1270,5584:8,5597:2188,7786:1042,8833:64,8900:1183,10088:79,10168:2,10175:1,10177:1170,11348:2310
[1231/142600:ERROR:delta_performer.cc(1242)] ValidateSourceHash(source_hasher.raw_hash(), operation, error) failed.
[1231/142600:ERROR:delta_performer.cc(289)] Failed to perform SOURCE_BSDIFF operation 5750, which is the operation 0 in partition "boot"
[1231/142600:ERROR:download_action.cc(274)] Error ErrorCode::kDownloadStateInitializationError (20) in DeltaPerformer's Write method when processing the received payload -- Terminating processing
[1231/142600:INFO:delta_performer.cc(305)] Discarding 6446230 unused downloaded bytes
[1231/142600:INFO:multi_range_http_fetcher.cc(172)] Received transfer terminated.
[1231/142600:INFO:multi_range_http_fetcher.cc
Gesendet von meinem HTC U11 life mit Tapatalk
MC_Ohr said:
So I found the log of update_engine. There is a hash check of the boot partition.
Code:
[1231/141321:INFO:main.cc(115)] Chrome OS Update Engine starting
[1231/141321:INFO:boot_control_android.cc(65)] Loaded boot control hidl hal.
[1231/142402:INFO:update_attempter_android.cc(201)] Using this install plan:
[1231/142402:INFO:install_plan.cc(71)] InstallPlan: new_update, payload type: unknown, source_slot: A, target_slot: B, url: file:///data/ota_package/update.zip, payload size: 88714324, payload hash: Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=, metadata size: 466479, metadata signature: , hash_checks_mandatory: true, powerwash_required: false
[1231/142402:WARNING:htc_utils.cc(151)] HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
[1231/142402:WARNING:htc_utils.cc(152)] POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
[1231/142402:WARNING:htc_utils.cc(153)] POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
[1231/142402:WARNING:htc_utils.cc(105)] HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002; ro.cid=HTC__034
[1231/142402:WARNING:htc_utils.cc(82)] HTC__034 matches...
[1231/142402:WARNING:htc_utils.cc(116)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] HTC_MID=2Q3F20000; ro.mid=2Q3F20000
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] HTC_DEVICE=htc_ocla1_sprout; ro.product.device=htc_ocla1_sprout
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys; ro.build.description=1.06.401.14 9.0_g CL990708 release-keys
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys; ro.build.fingerprint=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_TASKID=515519; ro.aa.taskid=515519
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:INFO:cpu_limiter.cc(71)] Setting cgroup cpu shares to 2
[1231/142402:ERROR:utils.cc(193)] fd >= 0 failed: No such file or directory
[1231/142402:ERROR:cpu_limiter.cc(74)] Failed to change cgroup cpu shares to 2 using /sys/fs/cgroup/cpu/update-engine/cpu.shares
[1231/142402:INFO:update_attempter_android.cc(393)] Marking booted slot as good.
[1231/142402:INFO:update_attempter_android.cc(408)] Scheduling an action processor start.
[1231/142402:INFO:action_processor.cc(46)] ActionProcessor: starting InstallPlanAction
[1231/142402:INFO:action_processor.cc(116)] ActionProcessor: finished InstallPlanAction with code ErrorCode::kSuccess
[1231/142402:INFO:action_processor.cc(143)] ActionProcessor: starting DownloadAction
[1231/142402:INFO:install_plan.cc(71)] InstallPlan: new_update, payload type: unknown, source_slot: A, target_slot: B, url: file:///data/ota_package/update.zip, payload size: 88714324, payload hash: Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=, metadata size: 466479, metadata signature: , hash_checks_mandatory: true, powerwash_required: false
[1231/142402:INFO:download_action.cc(179)] Marking new slot as unbootable
[1231/142402:INFO:multi_range_http_fetcher.cc(45)] starting first transfer
[1231/142402:INFO:multi_range_http_fetcher.cc(74)] starting transfer of range 3946+88714324
[1231/142402:INFO:delta_performer.cc(202)] Completed 0/? operations, 16384/88714324 bytes downloaded (0%), overall progress 0%
[1231/142402:INFO:delta_performer.cc(542)] Manifest size in payload matches expected value from Omaha
[1231/142402:INFO:delta_performer.cc(1412)] Verifying metadata hash signature using public key: /etc/update_engine/update-payload-key.pub.pem
[1231/142402:INFO:payload_verifier.cc(93)] signature blob size = 264
[1231/142402:INFO:payload_verifier.cc(112)] Verified correct signature 1 out of 1 signatures.
[1231/142402:INFO:delta_performer.cc(1455)] Metadata hash signature matches value in Omaha response.
[1231/142403:INFO:delta_performer.cc(1475)] Detected a 'delta' payload.
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old system sha256: SzmK3XVHUFtJDoc+dX9vaiAGZOf4LQLkVANqfoX8aYM= size: 2952790016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new system sha256: rEbITUaIVARqP7NyPwGdYise+S1bgUH6i/8tJe281sY= size: 2952790016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old vendor sha256: pN048+oMXhrsVEpgo9XEJD5P3RPItj9tCaugByFMsdc= size: 838860800
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new vendor sha256: MLf9+C36UzOJlYvtrMj5KFgX5qwTNwJpckDDzzJbW9Q= size: 838860800
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old xbl sha256: 7ZOdUYruCVjIfkRCghobVnVbkfa0qSxMWn2HIekTYaE= size: 3080192
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new xbl sha256: 5+SV0zuYEE3AEu/OudE+hfEcs5bdIKPMazgW/T8mXVI= size: 3084288
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old hosd sha256: IRSk31oyN/2qIFspIkdZT7GM5LxCNyz6tfT3mDNBUEg= size: 55889920
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new hosd sha256: q/svW0eAUbGBCj4++K+i26iR2HMqTn9Y+BJu69ULVtg= size: 55894016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old abl sha256: EJVxhBLKjjxEaTcTCIguE0pR+XMnMRkjHDskCBcSKmo= size: 143360
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new abl sha256: JBPuhtgk7UQ2nEYIb6e9el416xA5UA3IjZ1hOshwdmM= size: 147456
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old rpm sha256: c3WMA2MpUBxJOTzyX/wQQH7Z9COQtVQgY4hGpv1+waA= size: 221184
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new rpm sha256: qifOkTY4PUUjDLHuJYbDDFU1EevI33a5JNBS0EYrnDU= size: 225280
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old pmic sha256: emQfsgD2M2NqhDR/05h+eG0s/bx2vXp0gRSZd5S6gIE= size: 36864
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new pmic sha256: pmM/rwlD9WdyVBFSRvTzo+QYKPeAcopyg4kOcxfnYsU= size: 40960
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old boot sha256: Nj8nwvZ8vEWKwTESh6U+VsN1TuKUmwzYYtwUTcGjvPg= size: 55943168
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new boot sha256: LZwSja8jFa2XwgTfVsOx4r5zMUBT2pv7o6GCvt9uCpU= size: 55947264
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old dsp sha256: cbh7/JbA4pEzDeKqfxf88C3kmR29Rm9t/bS8UINoDcg= size: 16777216
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new dsp sha256: cbh7/JbA4pEzDeKqfxf88C3kmR29Rm9t/bS8UINoDcg= size: 16777216
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old radio sha256: VcolpgB2otdbuQKsZsm43XxtF+wcu8oJS9HkQIY/WWw= size: 62337024
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new radio sha256: 27kNwK+qLEi0MdrM7/hFhlahRzg70it5h9kh6LAMMeY= size: 62337024
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old tz sha256: yWyBuoTv2M+tQSxDTfMmJM2n2q6nIhulMrB3sZ+jsVA= size: 1953792
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new tz sha256: HW1NRgU5N1to4CAeZR1e3irSHkYH8RLD1r/r4Xu5OiI= size: 1957888
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old hyp sha256: Hn0RBVarof+yc5EyaH9zNtDHkG8Ode96TfRmfKt0VEQ= size: 266240
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new hyp sha256: 2J68uFWVRIK0zhkEmek3NmGIRmjk1VuXBmF1Yl5u/fY= size: 270336
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old devcfg sha256: sJa43eqyYdFwno2Ybp5I5g8zjKyYphi+J5L53+WeCUI= size: 45056
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new devcfg sha256: glQk7DOZxJbhP6UJA/j1+BUhw0KBQcQddjNhwhoEdDg= size: 49152
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old cmnlib sha256: KGyqdUERnMSlmFMP50PnDA1uvjWvjOOpp7ZKjaqJJk0= size: 217088
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new cmnlib sha256: 4qjItJNTjy5szo8SFXkbNSSdmm5NarEOjIB26q3dOJA= size: 221184
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old cmnlib64 sha256: mqbqjxPFSfYrKJujRULExhM/No+utcO3QqkPTf5d1Ws= size: 262144
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new cmnlib64 sha256: lRNo5nuiENQZXkX1c3hJhz/oc9Whh8nHI+tiuQLAzXw= size: 266240
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old keymaster sha256: KEcfQcnCfsZ6qFfiWTHYSKfT9cpin9CTtIU+5mgcF9s= size: 278528
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new keymaster sha256: 4bprlshY7JPC5LUsRhoxCLjDg9gl5w6sfCZqFkfHx60= size: 282624
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old lockbooter sha256: VtbPjUhr3SClK5ThAby5q8vJs8cGctJ4d+3/m9hnIG4= size: 86016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new lockbooter sha256: 1sl80Aby2MFL9JElaFezl0KWT4mm8w9n7p7JzPWEOIE= size: 90112
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old bluetooth sha256: HmhjTBICwVt0g2tSOedZXEbv4RKk6brzSmBDJKZgNQ0= size: 503808
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new bluetooth sha256: b4bYyd+Ff4w896RlM4SD24/kuxdSKdj3cOKyRg44U9w= size: 503808
[1231/142403:INFO:delta_performer.cc(365)] Applying 3445 operations to partition "system"
[1231/142403:INFO:delta_performer.cc(653)] Starting to apply update payload operations
[1231/142428:INFO:delta_performer.cc(202)] Completed 890/6357 operations (14%), 5488640/88714324 bytes downloaded (6%), overall progress 10%
[1231/142438:INFO:delta_performer.cc(202)] Completed 2035/6357 operations (32%), 7372800/88714324 bytes downloaded (8%), overall progress 20%
[1231/142501:INFO:delta_performer.cc(202)] Completed 2798/6357 operations (44%), 15613952/88714324 bytes downloaded (17%), overall progress 30%
[1231/142523:INFO:delta_performer.cc(202)] Completed 3406/6357 operations (53%), 24854528/88714324 bytes downloaded (28%), overall progress 40%
[1231/142524:INFO:delta_performer.cc(202)] Completed 3437/6357 operations (54%), 40812544/88714324 bytes downloaded (46%), overall progress 50%
[1231/142525:INFO:delta_performer.cc(365)] Applying 2278 operations to partition "vendor"
[1231/142525:INFO:delta_performer.cc(202)] Completed 3815/6357 operations (60%), 54706176/88714324 bytes downloaded (61%), overall progress 60%
[1231/142529:INFO:delta_performer.cc(202)] Completed 4959/6357 operations (78%), 55050240/88714324 bytes downloaded (62%), overall progress 70%
[1231/142545:INFO:delta_performer.cc(202)] Completed 5722/6357 operations (90%), 63242240/88714324 bytes downloaded (71%), overall progress 80%
[1231/142546:INFO:delta_performer.cc(365)] Applying 7 operations to partition "xbl"
[1231/142546:INFO:delta_performer.cc(365)] Applying 12 operations to partition "hosd"
[1231/142559:INFO:delta_performer.cc(365)] Applying 2 operations to partition "abl"
[1231/142559:INFO:delta_performer.cc(365)] Applying 4 operations to partition "rpm"
[1231/142559:INFO:delta_performer.cc(365)] Applying 2 operations to partition "pmic"
[1231/142559:INFO:delta_performer.cc(365)] Applying 12 operations to partition "boot"
[1231/142600:ERROR:delta_performer.cc(1057)] The hash of the source data on disk for this operation doesn't match the expected value. This could mean that the delta update payload was targeted for another version, or that the source partition was modified after it was installed, for example, by mounting a filesystem.
[1231/142600:ERROR:delta_performer.cc(1062)] Expected: sha256|hex = 56364358B930F09705B1DA54779402C9B59A5DA333F9B860B3AB401EF5BDD9EE
[1231/142600:ERROR:delta_performer.cc(1065)] Calculated: sha256|hex = 42AB021164B5015BFD12278AE756BC5FD599C982B3944303745F748905BB944C
[1231/142600:ERROR:delta_performer.cc(1076)] Operation source (offset:size) in blocks: 0:4312,4313:1270,5584:8,5597:2188,7786:1042,8833:64,8900:1183,10088:79,10168:2,10175:1,10177:1170,11348:2310
[1231/142600:ERROR:delta_performer.cc(1242)] ValidateSourceHash(source_hasher.raw_hash(), operation, error) failed.
[1231/142600:ERROR:delta_performer.cc(289)] Failed to perform SOURCE_BSDIFF operation 5750, which is the operation 0 in partition "boot"
[1231/142600:ERROR:download_action.cc(274)] Error ErrorCode::kDownloadStateInitializationError (20) in DeltaPerformer's Write method when processing the received payload -- Terminating processing
[1231/142600:INFO:delta_performer.cc(305)] Discarding 6446230 unused downloaded bytes
[1231/142600:INFO:multi_range_http_fetcher.cc(172)] Received transfer terminated.
[1231/142600:INFO:multi_range_http_fetcher.cc
Gesendet von meinem HTC U11 life mit Tapatalk
Click to expand...
Click to collapse
I've noticed on Oreo firmware for u11 and u11 life if bootloader is unlocked the system will show modified even if nothing was altered. That means the only way would be to lock bootloader and ruu back to stock. It sucks because if we can't get boot.img to patch then there will be no root on the new update you are trying to update to.
twinnfamous said:
I've noticed on Oreo firmware for u11 and u11 life if bootloader is unlocked the system will show modified even if nothing was altered. That means the only way would be to lock bootloader and ruu back to stock. It sucks because if we can't get boot.img to patch then there will be no root on the new update you are trying to update to.
Click to expand...
Click to collapse
I have now flashed the boot_signed.img and was able to take the update. The new factory Image is also online on easy firmware, so I'm downloading. When it´s finished I will patch and upload again.
MC_Ohr said:
I have now flashed the boot_signed.img and was able to take the update. The new factory Image is also online on easy firmware, so I'm downloading. When it´s finished I will patch and upload again.
Click to expand...
Click to collapse
Ok cool