[ROM] [STOCK] + insecure boot image (adb root) + deodexed system - Nexus 7 Android Development

I would like to share a collection of factory images. It contains the full packages, also the extracted .img files. I also included insecure boot image (adb shell gives root access) and deodexed system image for each of them.
full image packages are "tgz" files.
image files extension is .img
isecure boot images are *.unsec.img
deodexed system images are *.deodex.img
These are all to be flashed with fastboot. These all derived from STOCK (https://developers.google.com/android/nexus/images) with no changes except the insecure adb boot image and the deodexed system image.
Deodexed fs is exactly the same size as the original when mounted.
The collection contains:
Nexus 7 (Wi-Fi)(nakasi) factory images
nakasi_4.1.2-jzo54k
nakasi_4.1.2-jzo54k-factory-973f190e.tgz size: 268416146
nakasi-jzo54k
image-nakasi-jzo54k.zip size: 270068592
bootloader-grouper-3.41.img size: 2142784
image-nakasi-jzo54k
boot.img size: 5013504
boot.img.unsec.img size: 5013504
recovery.img size: 5365760
system.img size: 456978628
system.img.deodex.img size: 419478656
userdata.img size: 106788356
nakasi_4.2.1-jop40d
nakasi_4.2.1-jop40d-factory-6ac58a1a.tgz size: 285374508
nakasi-jop40d
image-nakasi-jop40d.zip size: 287257464
bootloader-grouper-4.13.img size: 2146892
image-nakasi-jop40d
boot.img size: 5060608
boot.img.unsec.img size: 5060608
recovery.img size: 5574656
system.img size: 488587640
system.img.deodex.img size: 446971116
userdata.img size: 106788356
nakasi_4.2.2-jdq39
nakasi-jdq39-factory-c317339e.tgz size: 287674300
nakasi-jdq39
image-nakasi-jdq39.zip size: 289524899
bootloader-grouper-4.18.img size: 2146892
image-nakasi-jdq39
boot.img size: 5062656
boot.img.unsec.img size: 5062656
recovery.img size: 5576704
system.img size: 483127648
system.img.deodex.img size: 444480760
userdata.img size: 106792464
Nexus 7 GSM (nakasig) factory images
nakasig_4.2.1-jop40d
nakasig_4.2.1-jop40d-factory-efcec044.tgz size: 291197311
nakasig-jop40d
image-nakasig-jop40d.zip size: 287381774
boot.img size: 5060608
boot.img.unsec.img size: 5060608
bootloader-tilapia-4.13.img size: 2146892
radio-tilapia-1231_0.10.0_1021.img size: 16777216
recovery.img size: 5574656
system.img size: 488804800
system.img.deodex.img size: 447044892
userdata.img size: 106788356
nakasig_4.2.2-jdq39
nakasig-jdq39-factory-0798439d.tgz size: 293527315
nakasig-jdq39
image-nakasig-jdq39.zip size: 289688547
boot.img size: 5062656
boot.img.unsec.img size: 5062656
bootloader-tilapia-4.18.img size: 2146892
radio-tilapia-1231_0.17.0_1205.img size: 16777216
recovery.img size: 5576704
system.img size: 483299752
system.img.deodex.img size: 444509480
userdata.img size: 106792464
The files can be downloaded from:
http://web.djodjo.org/?a=download:android:ROM_images:factory_images_gn_nakasi
http://web.djodjo.org/?a=download:android:ROM_images:factory_images_gn_nakasig
if it helps you buy me a beer

Related

Samsung Transform (sph-m920)

I just wanted to get a discussion going about the transform since i've been searching and haven't been able to find another. So feel free to post anything you think people should know about the Samsung Transform. Oh and please ask questions too!
Sent from my SPH-M920 using xda premium
I guess I'll start by asking does any other transform user have problems with their phone like...
1. Very short battery time?
2. Incredibly slow performance?
3. Bad quality front facing camera?
4. Not being able to use the front camera as a webcam? (Skype, Tango, ooVoo)
5. Low range of compatible apps and games?
These are just a few of the problems with my samsung transform. I want to hear from you guys to see if you have any problems or questions. (I'm no expert but i'd like to try to help.
Sent from my SPH-M920 using xda premium
Sdx-developers.com
Sent from my HTC Glacier using Tapatalk
I suffered long and hard under the m920 and lemme tell ya it was bad enough to send me to T-Mobile. And cancel my contract mid year. Anyway xda doesn't have a forum for that phone nor will they due to its low level specs and God awful nature but sdx has a great group for the device. Good luck from a former victim!
Sent from my HTC Glacier using Tapatalk
Thanks i'll check it out
Sent from my SPH-M920 using xda premium
Rooting Transform M920 EB28 Sprint/CDMA
Rooting of Samsung Transform M920 (EB28 Sprint/CDMA 2.2.2 Froyo), by using below tool, was very easy:
"Intercept Root" (V1-35)
https://code.google.com/p/intercept-root/
SHA1 Checksum: 17b7c66cbf5ecb18cdab6890063e903db6091150, Filesize: 7,095,583 bytes (7.1 MB on disk).
or get from here
I previously tried SOC (SuperOneClick), Framaroot, Z4root, etc, but none of them worked, in above mentioned phone.
Anyone still has a working LINK to a CM7 ROM for Transform ? and a working link to a CWM Recovery for Transform ? then, please help+share :highfive:
Transform (M920), and Transform Ultra (M930), are two different phone.
Thanks in advance
ROM files for Transform M920
The [SIZE="+1"]Samsung Transform M920[/SIZE] Sprint/CDMA phone, initially was released in Oct-2010 with Android 2.1 Eclair (firmware: M920.06 Eclair.DI11), then Sprint in Mar-2011 OTA-updated their M920 subscribers into Android 2.2.2 Froyo (firmware M920.06 EB28), then M920 was again OTA updated in July-2011 into Android 2.2.? (firmware: M920.06 EF09). EB28 was a stable update, but EF09 caused problems for some M920 phones.
More info: https://en.wikipedia.org/wiki/Samsung_Transform
http://www.samsung.com/us/mobile/cell-phones/SPH-M920ZKASPR-specs
http://www.gsmarena.com/samsung_m920_transform-3581.php
I was able to locate back these below files, in one of my older MacBook OS X computer. When i got the M920 phone, then i or my brother or my friend downloaded them, we were attempting to update it with newer or better Android or CM OS, but lack of Mac OS X compatible proper drivers & related tools, caused our attempts to fail, and these files remained there. But when we attempted again, we found out, source webpages on source website SDX-Developers.com servers are now (Dec-2015) empty/down! So i'm sharing these with others, these should+might be helpful:
Some [SIZE="+1"]ROM[/SIZE] updates require an existing stock/build (initial build at initial released-time), some ROM updates required a Froyo.EB28 build, and some ROM updates required EF09 build.
In below:
"sdx" means = it was obtained from sdx-developers.com forum webpages, and the previous word before "_sdx", is the username in that website.
"xda" = it was obtained from xda-developers.com webpages.
http://www.mediafire.com/download/br9gs8w90iwhbmi/
cm-7-20120701-UNOFFICIAL-transform-wGApps_Andro-2.3.7_rel-Jul-1-2012_rom_by_qnhoang81_(wwjoshdew_sdx).zip
SHA1 checksum: eff7286f9da8c6702d2233230377db1825e9a6f4.
Size: 86,881,680 bytes (86.9 MB on disk).
http://www.mediafire.com/download/1kv818wijtw56ao/
CM7-270_(unofc-CM7_tranform)_rom_(xbooow59_sdx).zip
SHA1 checksum: 026eb4ecbc535a7d0adb8759f2464b43584ce958.
Size: 72,959,078 bytes (73 MB on disk).
http://www.mediafire.com/download/xbb3o8gyclm7cm0/
CM9-122_rel-Mar-26-2012_rom_(by_qnhoang81_sdx).zip
SHA1 checksum: 32cd4563bbd37c5c2da18b3b9df2c494f336116f.
Size: 83,155,515 bytes (83.2 MB on disk).
http://www.mediafire.com/download/bb300verjsr9j7n/
CM9-122_rel-Mar-26-2012_GAPPS-ics-20120317-signed_edited_Transform_(by_qnhoang81).zip
SHA1 checksum: f3173b7adfdfc15b58d5ba3a30bf4c8a561a80f7.
Size: 22,270,968 bytes (22.3 MB on disk).
http://www.mediafire.com/download/4n0g308t5062j5h/
SpeedM7.1-V1.1_(CM7-Speedier_Andro_2.3.7_Transform)_rel-Sep-19-2012_rom_(by_xbooow59_sdx).zip
SHA1 checksum: 1da667e0e719dbbb59b5b75f4f6d81de85a85f35.
Size: 73,818,117 bytes (73.8 MB on disk).
http://www.mediafire.com/download/da1rckuf223n4wg/
TransGingerOnCrack_EF09-2.2.2_(1.3.5_Vampirefo)-SDX_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 32c525fe17d51f0ab90c282de4b2ff33bbaf495e.
Size: 63,826,308 bytes (63.8 MB on disk).
http://www.mediafire.com/download/tunoa1nsb55lz8r/
Andro_2.2.2_EB28_stock_froyo_rom_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: d6cf0135d50f449a0ab93e245ad4add131a3374b.
Size: 74,149,790 bytes (74.2 MB on disk).
http://www.mediafire.com/download/q328rrc7pt5jhjy/
Andro_EF09_Stock_Rom_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 0605e1a4d15b83b1cd398397de33a21d8c531b4f.
Size: 70,085,916 bytes (70.1 MB on disk).
If anyone else posts further related items, i will post here & add a link here to that post.
Recovery Tools for Transform M920
Recovery Tools for Transform M920:
http://www.mediafire.com/download/pjbmfwernp4ty6r/
CWM_transform_EB28-EF09_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 8ed722eb9151fff5301a32f845d89e84eefc6421.
Size: 5,445,520 bytes (5.5 MB on disk).
http://www.mediafire.com/download/yt3l0clm1qwhohy/
Odin_v3.07_v3.06_v3.04_v1.85_v1.83.zip
SHA1 checksum: 3ff4297890ca7392d6da3bc509aec0753d7b7842.
Size: 1,749,547 bytes (1.8 MB on disk).
http://www.mediafire.com/download/7mdj2r4llb1atp4/
SPH-M920_vampirefo_ext_Recovery_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 00060345b7b1ba78268c54fb76add95fa0591781.
Size: 6,133,326 bytes (6.1 MB on disk).
http://www.mediafire.com/download/1m5l64gd0bdpka1/
SPH-M920_vampirefo_RFS_Recovery_(Mpgrimm2-mediafire-c7kxphqllfdk9).zip
SHA1 checksum: 8ad0cae4833d6554b6f096ca0c47e0287ac3305e.
Size: 5,984,112 bytes (6 MB on disk).
http://www.mediafire.com/download/bxoh5fbxjcbj6a9/
recovery_(Froyo_Transform)_(vampirefo_sdx).rfs
SHA1 checksum: 46e6581fa06009e491cc91000a73b0fc0ff90546.
Size: 6,395,792 bytes (6.4 MB on disk).
Drivers, ADB, Fastboot, Rom Update Utilities for Transform M920
Drivers, ADB, Fastboot, Rom Update Utilities for Transform M920:
Windows platform/os:
http://www.mediafire.com/download/s7vc5295ncsm291/
SAMSUNG_USB_Driver_for_Mobile_Phones_1.5.27.0_(Droid_Dustin_xda_zippyshare).zip
SHA1 checksum: 5650076fc99bfb55f2957ee8425fe13fcb13a0a8.
Size: 8,344,834 bytes (8.4 MB on disk).
http://www.mediafire.com/download/hc99a61491no149/
Samsung_USB_Driver_for_Mobile_Phones_v1.5.14.0_Win-Xp-V-7-8.exe
SHA1 checksum: 3f3d710db181cb655c8ba17275a298228960aac0.
Size: 24,178,176 bytes (24.2 MB on disk).
http://www.mediafire.com/download/sqg4abv723567mh/
SAMSUNG_USB_Driver_for_Mobile_Phones_v1.5.25.0-retail_official_(srinivasmv419_xda).exe
SHA1 checksum: 4f32a42c730184e15f023892fac0fc9670c4a4db.
Size: 15,364,480 bytes (15.4 MB on disk).
http://www.mediafire.com/download/r8zln40ox7jgcj4/
M920-Transform_ADB_Drivers_(AquilaChill_sdx).zip
SHA1 checksum: cae8f06892ad88444801f7f50d34785880b0b5ca.
Size: 3,886,289 bytes (3.9 MB on disk).
http://www.mediafire.com/download/3v5ngmsfihccr6t/
ADB_Fastboot_13-03-2013.zip
SHA1 checksum: 6473957c884775e1371ce04070de9a0e8e42b83e.
Size: 538,460 bytes (541 KB on disk).
http://www.mediafire.com/download/i0m2wav23oo565k/
Universal_Naked_Driver_0.73_(adb).zip
SHA1 checksum: ce1c6a8e8052c2638560767ae5a3574e4b1f3edc.
Size: 8,683,455 bytes (8.7 MB on disk).
http://www.mediafire.com/download/m256hfve5bqxa85/
UniversalAdbDriverSetup.msi
SHA1 checksum: 745bb99063748a2f309888467aac70c3c7ef6a2e.
Size: 17,060,864 bytes (17.1 MB on disk).
http://www.mediafire.com/download/5scfqfsfiaxa63w/
FastbootCommanderV.1.51.zip
SHA1 checksum: 9cb12ae39b38a154425e90214877f7fc8388a50c.
Size: 357,339 bytes (360 KB on disk).
http://www.mediafire.com/download/ph2nxd22mf4o5mx/
heimdall-suite-1.4.0-win32_JOdin.zip
SHA1 checksum: 87ba63c9917fe50b5c1d4305585ff65213e99ad5.
Size: 10,013,808 bytes (10 MB on disk).
http://www.mediafire.com/download/141twbr9x0dxare/
JOdin3CASUAL-r1035-dist.jar (for any platform/os with Java SE SDK).
SHA1 checksum: d6e331eecc3e149e779b888dedd59c4258c5cbf1.
Size: 19,747,175 bytes (19.8 MB on disk).
http://www.mediafire.com/download/u7nsns0ch1se69f/
libusb-win32-bin-1.2.6.0.zip
SHA1 checksum: e1362d9ba4a9c9b30394691e7acdee05631fd54e.
Size: 913,186 bytes (913 KB on disk).
http://www.mediafire.com/download/joaq4oji7r8a5bu/
msvcp110.dll
SHA1 checksum: 557b67e372e85eb39989cb53cffd3ef1adabb9fe.
Size: 535,008 bytes (537 KB on disk).
http://www.mediafire.com/download/qq8kcfkvk4b79jw/
Visual_C++_Redist_for_VS2012Upd4_en-au_vcredist_x64.exe
SHA1 checksum: 1a5d93dddbc431ab27b1da711cd3370891542797.
Size: 7,186,992 bytes (7.2 MB on disk).
http://www.mediafire.com/download/8kxa2m5rkc32s7h/
Super-One-Click_v2-3-3_Team-M-metropolis_(pass-1234)_(by_mercado79_sdx-dev).zip
SHA1 checksum: 7cd3f54eea5a2af07150501150be0146a7de82af.
Size: 10,550,007 bytes (10.6 MB on disk).
Note: above zip-file has utility software, which can flash/write into phone's firmware/rom components (this process is also known as "rooting" or "jail-breaking"), so your (anti-virus) security software will give you warning (if you decompress the zip file), that Android rooting related malware exists in 2 files: psneuter (Andr/Droid-Rt-A), zergRush (Andr/Droid-Rt-C). You need to create exception rules inside your security software and allow those 2 files to remain intact, if you want to utilize functionality from those 2 files, or, try other alternatives shown here, or, search further in xda/sdx forum.
http://www.mediafire.com/download/48m2m09ik598v0j/
SW_Updater_CL14_v1.0.001_Transform_EB28-EF09_(Mpgrimm2_sdx).exe
SHA1 checksum: 46e79cfb5ecd55aa8f3edc51355cf426b067f309.
Size: 88,321,715 bytes (88.3 MB on disk).
http://www.mediafire.com/download/80xxrj51c4pv9a7/
OneClickRootCWM3.1.0.1-EC05.zip
SHA1 checksum: 35589f673e71ef4d3fd47abd57e402c44fb80153.
Size: 8,593,920 bytes (8.6 MB on disk).
http://www.mediafire.com/download/olm3a38557u7g5d/
Odin_Multi_Downloader_v4.42.exe
SHA1 checksum: 0ff061097c976bce75c97baa51df8c71f2da0c81.
Size: 455,680 bytes (459 KB on disk).
-_-_-_-_-_-_-​
Mac OS X platform/os:
(some core tools are compatible with BSD / FreeBSD unix)
http://www.mediafire.com/download/l502b9e8s72vy20/
heimdall-suite-1.4.0-mac_JOdin.dmg
SHA1 checksum: 133466e39b96062a253d6c325c7a79cf1b16f421.
Size: 7,301,742 bytes (7.3 MB on disk).
http://www.mediafire.com/download/ycqi8j78w2chsc7/
Heimdall-1.4.1-Unofficial-Signed-macosx.dmg
SHA1 checksum: 45a879fcea817e4f00ce1250725c2e4231e08ef4.
Size: 120,279 bytes (123 KB on disk).
http://www.mediafire.com/download/h2fazmndr79533r/
heimdall.kext.tar.gz
SHA1 checksum: b0668faf76ec27899093079e786127ae7365f3a5.
Size: 6,167 bytes (8 KB on disk).
http://www.mediafire.com/download/141twbr9x0dxare/
JOdin3CASUAL-r1035-dist.jar (for any platform/os with Java SE SDK).
SHA1 checksum: d6e331eecc3e149e779b888dedd59c4258c5cbf1.
Size: 19,747,175 bytes (19.8 MB on disk).
http://www.mediafire.com/download/cwcc7wlkh4ayotm/
adb-fastboot-mac.zip
SHA1 checksum: 3596bcea4088ef888536a21fc6d0a0b81eab59d1.
Size: 158,466 bytes (160 KB on disk).
http://www.mediafire.com/download/80xxrj51c4pv9a7/
OneClickRootCWM3.1.0.1-EC05.zip
SHA1 checksum: 35589f673e71ef4d3fd47abd57e402c44fb80153.
Size: 8,593,920 bytes (8.6 MB on disk).
-_-_-_-_-_-_-​
Linux/Unix platform/os:
http://www.mediafire.com/download/6a5didlt45jgnae/
libusb-1.0.20.tar.bz2
SHA1 checksum: 9537243f165927bde74ad742e6b3effb0bd50cd2.
Size: 795,247 bytes (799 KB on disk).
http://www.mediafire.com/download/3lkrtbf18v2sfck/
libusb-compat-0.1.5.tar.bz2
SHA1 checksum: 062319276d913c753a4b1341036e6a2e42abccc9.
Size: 276,769 bytes (279 KB on disk).
http://www.mediafire.com/download/141twbr9x0dxare/
JOdin3CASUAL-r1035-dist.jar (for any platform/os with Java SE SDK).
SHA1 checksum: d6e331eecc3e149e779b888dedd59c4258c5cbf1.
Size: 19,747,175 bytes (19.8 MB on disk).
-_-_-_-_-_-_-​
Looking for file Hash/Checksum calculator tools ? visit:
http://forum.xda-developers.com/showpost.php?p=64447183&postcount=2
Looking for file (and folder) compression (aka, zip/archive) or decompression (aka, unzip/unarchive) tools ? visit:
http://forum.xda-developers.com/showpost.php?p=64447381&postcount=3
reserved it here, to add more related info in sequence.
Can anyone tell me how i can use any of these to install custom recovery, back up my rom, and install one of the custom roms? there are a ton of files, I'm presuming CWM is clockworkmod, but my phone is EB28 and the file says EB28-EF09. is this something I can use, if so how?
thanks.

[ROM] [STOCK] + insecure boot image (adb root) + deodexed system

I would like to share a collection of factory images. It contains the full packages, also the extracted .img files. I also included insecure boot image (adb shell gives root access) and deodexed system image for each of them.
full image packages are "tgz" files.
image files extension is .img
isecure boot images are *.unsec.img
deodexed system images are *.deodex.img
These are all to be flashed with fastboot. These all derived from STOCK (https://developers.google.com/android/nexus/images) with no changes except the insecure adb boot image and the deodexed system image.
Deodexed fs is exactly the same size as the original when mounted.
The collection contains:
tungsten_4.0.4-ian67k
tungsten_4.0.4-ian67k-factory-468d9865.tgz size: 81838722
tungsten-ian67k
image-tungsten-ian67k.zip size: 82233692
boot.img size: 3897344
boot.img.unsec.img size: 3897344
bootloader-phantasm-steelheadb4h0j.img size: 199124
recovery.img size: 4173824
system.img size: 157315296
system.img.deodex.img size: 133021224
userdata.img size: 4640904
xloader-phantasm-ian67k.img size: 47984
The files can be downloaded from: http://web.djodjo.org/?a=download:android:ROM_images:factory_images_gn_tungsten
if it helps you buy me a beer

How to fix brocken or missing efs partition [SOLUTION]

Hello i erased my efs partition and i didnt have a back up, so after one week i found the ****in solution.
First you need a twrp recovery maybe it will work and with others but i used that.
Second you need to download coloros (version COS_2.0.1i_11.zip) : http://forum.xda-developers.com/oneplus-one/general/rom-4-4-2-coloros-2-0-36beta-t2955853
download oxygenos (version 1.0.3) : https://forums.oneplus.net/threads/update-oxygenos-1-0-3-with-the-latest-stagefright-patches.354409/
download pesist.img : http://forum.xda-developers.com/oneplus-one/help/fix-brickloop-audio-fx-fc-efs-corrupt-t2879061
Now we have everything.
1. Go to recovery mode.
2. Wipe factory reset.
3. Flash coloros (dont worry wont mess anything)
4. Wipe
5. Flash oxygenos (boot it and now you will have a wi-fi bluethooth and sim-card)
6. Go to recovery again.
7. Wipe
8 Go to fastboot mode
9. fastboot erase persist
10. fastboot flash persist persist.img
11. Go to recovery mode againd
12. Advanced -> terminal command -> select (right bottom corner)
13. type: su
14: type: make_ext4fs /dev/block/mmcblk0p15
You will see:
Creating filesystem with parameters:
Size: 33554432
Block size: 4096
Blocks per group: 32768
Inodes per group: 2048
Inode size: 256
Journal blocks: 1024
Label:
Blocks: 8192
Block groups: 1
Reserved block group size: 7
Created filesystem with 11/2048 inodes and 1166/8192 blocks
And after that you are good to go.
Big thanks to all guys and their articles.
And again you will be able to flash others roms and to have wi-fi, audiofx and etc...
Took you long enough... lol
Glad you solved it my friend.
Tom 2.0

Security update while root via Magisk

Hello,
Does anyone know how I can install the security update for December on Android One EU device?
My Software is 1.06.401.14.
I received an update.zip but installation aborted. My System is rooted with Magisk.
I had a look into the zip and found a META-INF Folder; compatibility.zip; payload.bin
payload_properties.txt
Code:
FILE_HASH=Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=
FILE_SIZE=88714324
METADATA_HASH=Kleu845IDwsBg9YKK9sxRLgzsV6kQcw0Qu2aikz/UuA=
METADATA_SIZE=466479
HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002
HTC_MID=2Q3F20000
HTC_DEVICE=htc_ocla1_sprout
PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys
PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
PRE_TASKID=515519
care_map.txt
Code:
system
90,0,32767,32768,32770,32945,32947,33452,65534,65536,65538,66043,71519,98304,98306,98481,98483,98988,131071,131072,131074,131579,133736,163840,163842,164017,164019,164524,196607,196608,196610,197115,198114,229376,229378,229553,229555,230060,262142,262144,262146,262651,263103,294912,294914,295089,295091,295596,327678,327680,327682,328187,328209,360448,360450,360955,393214,393216,393218,393723,425982,425984,425986,426491,458750,458752,458754,459259,491518,491520,491522,492027,524286,524288,524290,524795,557054,557056,557058,557563,564954,589824,589826,622592,622594,655360,655362,688128,688130,688635,709641
The data seem to be inside payload.bin. Does anybody know how to extract the payload.bin? Maybe then I can install the *.img manually.
MC_Ohr said:
Hello,
Does anyone know how I can install the security update for December on Android One EU device?
My Software is 1.06.401.14.
I received an update.zip but installation aborted. My System is rooted with Magisk.
I had a look into the zip and found a META-INF Folder; compatibility.zip; payload.bin
payload_properties.txt
Code:
FILE_HASH=Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=
FILE_SIZE=88714324
METADATA_HASH=Kleu845IDwsBg9YKK9sxRLgzsV6kQcw0Qu2aikz/UuA=
METADATA_SIZE=466479
HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002
HTC_MID=2Q3F20000
HTC_DEVICE=htc_ocla1_sprout
PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys
PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
PRE_TASKID=515519
care_map.txt
Code:
system
90,0,32767,32768,32770,32945,32947,33452,65534,65536,65538,66043,71519,98304,98306,98481,98483,98988,131071,131072,131074,131579,133736,163840,163842,164017,164019,164524,196607,196608,196610,197115,198114,229376,229378,229553,229555,230060,262142,262144,262146,262651,263103,294912,294914,295089,295091,295596,327678,327680,327682,328187,328209,360448,360450,360955,393214,393216,393218,393723,425982,425984,425986,426491,458750,458752,458754,459259,491518,491520,491522,492027,524286,524288,524290,524795,557054,557056,557058,557563,564954,589824,589826,622592,622594,655360,655362,688128,688130,688635,709641
The data seem to be inside payload.bin. Does anybody know how to extract the payload.bin? Maybe then I can install the *.img manually.
Click to expand...
Click to collapse
Check this out
https://github.com/erfanoabdi/imgpatchtools
MC_Ohr said:
Hello,
Does anyone know how I can install the security update for December on Android One EU device?
My Software is 1.06.401.14.
I received an update.zip but installation aborted. My System is rooted with Magisk.
I had a look into the zip and found a META-INF Folder; compatibility.zip; payload.bin
payload_properties.txt
Code:
FILE_HASH=Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=
FILE_SIZE=88714324
METADATA_HASH=Kleu845IDwsBg9YKK9sxRLgzsV6kQcw0Qu2aikz/UuA=
METADATA_SIZE=466479
HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002
HTC_MID=2Q3F20000
HTC_DEVICE=htc_ocla1_sprout
PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys
PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
PRE_TASKID=515519
care_map.txt
Code:
system
90,0,32767,32768,32770,32945,32947,33452,65534,65536,65538,66043,71519,98304,98306,98481,98483,98988,131071,131072,131074,131579,133736,163840,163842,164017,164019,164524,196607,196608,196610,197115,198114,229376,229378,229553,229555,230060,262142,262144,262146,262651,263103,294912,294914,295089,295091,295596,327678,327680,327682,328187,328209,360448,360450,360955,393214,393216,393218,393723,425982,425984,425986,426491,458750,458752,458754,459259,491518,491520,491522,492027,524286,524288,524290,524795,557054,557056,557058,557563,564954,589824,589826,622592,622594,655360,655362,688128,688130,688635,709641
The data seem to be inside payload.bin. Does anybody know how to extract the payload.bin? Maybe then I can install the *.img manually.
Click to expand...
Click to collapse
Send me the ota zip and I will decrypt it withhtc ruu decrypt tool and pull the boot.img and we can patch it and upload it for others.
twinnfamous said:
Send me the ota zip and I will decrypt it withhtc ruu decrypt tool and pull the boot.img and we can patch it and upload it for others.
Click to expand...
Click to collapse
I tried with htc decrypt tool by @nkk71 and @Captain_Throwback but the payload.bin stays untouched. Is there any other way to extract?
I tried out to boot from slot_b but it did not work. I`m afraid that I have to restore to stock and start from the beginning again...
Did anyone with android one device installed the security update successfully? What softwarenumber abe youon now?
So I found the log of update_engine. There is a hash check of the boot partition.
Code:
[1231/141321:INFO:main.cc(115)] Chrome OS Update Engine starting
[1231/141321:INFO:boot_control_android.cc(65)] Loaded boot control hidl hal.
[1231/142402:INFO:update_attempter_android.cc(201)] Using this install plan:
[1231/142402:INFO:install_plan.cc(71)] InstallPlan: new_update, payload type: unknown, source_slot: A, target_slot: B, url: file:///data/ota_package/update.zip, payload size: 88714324, payload hash: Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=, metadata size: 466479, metadata signature: , hash_checks_mandatory: true, powerwash_required: false
[1231/142402:WARNING:htc_utils.cc(151)] HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
[1231/142402:WARNING:htc_utils.cc(152)] POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
[1231/142402:WARNING:htc_utils.cc(153)] POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
[1231/142402:WARNING:htc_utils.cc(105)] HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002; ro.cid=HTC__034
[1231/142402:WARNING:htc_utils.cc(82)] HTC__034 matches...
[1231/142402:WARNING:htc_utils.cc(116)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] HTC_MID=2Q3F20000; ro.mid=2Q3F20000
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] HTC_DEVICE=htc_ocla1_sprout; ro.product.device=htc_ocla1_sprout
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys; ro.build.description=1.06.401.14 9.0_g CL990708 release-keys
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys; ro.build.fingerprint=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_TASKID=515519; ro.aa.taskid=515519
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:INFO:cpu_limiter.cc(71)] Setting cgroup cpu shares to 2
[1231/142402:ERROR:utils.cc(193)] fd >= 0 failed: No such file or directory
[1231/142402:ERROR:cpu_limiter.cc(74)] Failed to change cgroup cpu shares to 2 using /sys/fs/cgroup/cpu/update-engine/cpu.shares
[1231/142402:INFO:update_attempter_android.cc(393)] Marking booted slot as good.
[1231/142402:INFO:update_attempter_android.cc(408)] Scheduling an action processor start.
[1231/142402:INFO:action_processor.cc(46)] ActionProcessor: starting InstallPlanAction
[1231/142402:INFO:action_processor.cc(116)] ActionProcessor: finished InstallPlanAction with code ErrorCode::kSuccess
[1231/142402:INFO:action_processor.cc(143)] ActionProcessor: starting DownloadAction
[1231/142402:INFO:install_plan.cc(71)] InstallPlan: new_update, payload type: unknown, source_slot: A, target_slot: B, url: file:///data/ota_package/update.zip, payload size: 88714324, payload hash: Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=, metadata size: 466479, metadata signature: , hash_checks_mandatory: true, powerwash_required: false
[1231/142402:INFO:download_action.cc(179)] Marking new slot as unbootable
[1231/142402:INFO:multi_range_http_fetcher.cc(45)] starting first transfer
[1231/142402:INFO:multi_range_http_fetcher.cc(74)] starting transfer of range 3946+88714324
[1231/142402:INFO:delta_performer.cc(202)] Completed 0/? operations, 16384/88714324 bytes downloaded (0%), overall progress 0%
[1231/142402:INFO:delta_performer.cc(542)] Manifest size in payload matches expected value from Omaha
[1231/142402:INFO:delta_performer.cc(1412)] Verifying metadata hash signature using public key: /etc/update_engine/update-payload-key.pub.pem
[1231/142402:INFO:payload_verifier.cc(93)] signature blob size = 264
[1231/142402:INFO:payload_verifier.cc(112)] Verified correct signature 1 out of 1 signatures.
[1231/142402:INFO:delta_performer.cc(1455)] Metadata hash signature matches value in Omaha response.
[1231/142403:INFO:delta_performer.cc(1475)] Detected a 'delta' payload.
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old system sha256: SzmK3XVHUFtJDoc+dX9vaiAGZOf4LQLkVANqfoX8aYM= size: 2952790016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new system sha256: rEbITUaIVARqP7NyPwGdYise+S1bgUH6i/8tJe281sY= size: 2952790016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old vendor sha256: pN048+oMXhrsVEpgo9XEJD5P3RPItj9tCaugByFMsdc= size: 838860800
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new vendor sha256: MLf9+C36UzOJlYvtrMj5KFgX5qwTNwJpckDDzzJbW9Q= size: 838860800
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old xbl sha256: 7ZOdUYruCVjIfkRCghobVnVbkfa0qSxMWn2HIekTYaE= size: 3080192
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new xbl sha256: 5+SV0zuYEE3AEu/OudE+hfEcs5bdIKPMazgW/T8mXVI= size: 3084288
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old hosd sha256: IRSk31oyN/2qIFspIkdZT7GM5LxCNyz6tfT3mDNBUEg= size: 55889920
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new hosd sha256: q/svW0eAUbGBCj4++K+i26iR2HMqTn9Y+BJu69ULVtg= size: 55894016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old abl sha256: EJVxhBLKjjxEaTcTCIguE0pR+XMnMRkjHDskCBcSKmo= size: 143360
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new abl sha256: JBPuhtgk7UQ2nEYIb6e9el416xA5UA3IjZ1hOshwdmM= size: 147456
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old rpm sha256: c3WMA2MpUBxJOTzyX/wQQH7Z9COQtVQgY4hGpv1+waA= size: 221184
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new rpm sha256: qifOkTY4PUUjDLHuJYbDDFU1EevI33a5JNBS0EYrnDU= size: 225280
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old pmic sha256: emQfsgD2M2NqhDR/05h+eG0s/bx2vXp0gRSZd5S6gIE= size: 36864
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new pmic sha256: pmM/rwlD9WdyVBFSRvTzo+QYKPeAcopyg4kOcxfnYsU= size: 40960
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old boot sha256: Nj8nwvZ8vEWKwTESh6U+VsN1TuKUmwzYYtwUTcGjvPg= size: 55943168
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new boot sha256: LZwSja8jFa2XwgTfVsOx4r5zMUBT2pv7o6GCvt9uCpU= size: 55947264
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old dsp sha256: cbh7/JbA4pEzDeKqfxf88C3kmR29Rm9t/bS8UINoDcg= size: 16777216
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new dsp sha256: cbh7/JbA4pEzDeKqfxf88C3kmR29Rm9t/bS8UINoDcg= size: 16777216
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old radio sha256: VcolpgB2otdbuQKsZsm43XxtF+wcu8oJS9HkQIY/WWw= size: 62337024
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new radio sha256: 27kNwK+qLEi0MdrM7/hFhlahRzg70it5h9kh6LAMMeY= size: 62337024
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old tz sha256: yWyBuoTv2M+tQSxDTfMmJM2n2q6nIhulMrB3sZ+jsVA= size: 1953792
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new tz sha256: HW1NRgU5N1to4CAeZR1e3irSHkYH8RLD1r/r4Xu5OiI= size: 1957888
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old hyp sha256: Hn0RBVarof+yc5EyaH9zNtDHkG8Ode96TfRmfKt0VEQ= size: 266240
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new hyp sha256: 2J68uFWVRIK0zhkEmek3NmGIRmjk1VuXBmF1Yl5u/fY= size: 270336
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old devcfg sha256: sJa43eqyYdFwno2Ybp5I5g8zjKyYphi+J5L53+WeCUI= size: 45056
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new devcfg sha256: glQk7DOZxJbhP6UJA/j1+BUhw0KBQcQddjNhwhoEdDg= size: 49152
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old cmnlib sha256: KGyqdUERnMSlmFMP50PnDA1uvjWvjOOpp7ZKjaqJJk0= size: 217088
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new cmnlib sha256: 4qjItJNTjy5szo8SFXkbNSSdmm5NarEOjIB26q3dOJA= size: 221184
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old cmnlib64 sha256: mqbqjxPFSfYrKJujRULExhM/No+utcO3QqkPTf5d1Ws= size: 262144
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new cmnlib64 sha256: lRNo5nuiENQZXkX1c3hJhz/oc9Whh8nHI+tiuQLAzXw= size: 266240
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old keymaster sha256: KEcfQcnCfsZ6qFfiWTHYSKfT9cpin9CTtIU+5mgcF9s= size: 278528
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new keymaster sha256: 4bprlshY7JPC5LUsRhoxCLjDg9gl5w6sfCZqFkfHx60= size: 282624
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old lockbooter sha256: VtbPjUhr3SClK5ThAby5q8vJs8cGctJ4d+3/m9hnIG4= size: 86016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new lockbooter sha256: 1sl80Aby2MFL9JElaFezl0KWT4mm8w9n7p7JzPWEOIE= size: 90112
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old bluetooth sha256: HmhjTBICwVt0g2tSOedZXEbv4RKk6brzSmBDJKZgNQ0= size: 503808
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new bluetooth sha256: b4bYyd+Ff4w896RlM4SD24/kuxdSKdj3cOKyRg44U9w= size: 503808
[1231/142403:INFO:delta_performer.cc(365)] Applying 3445 operations to partition "system"
[1231/142403:INFO:delta_performer.cc(653)] Starting to apply update payload operations
[1231/142428:INFO:delta_performer.cc(202)] Completed 890/6357 operations (14%), 5488640/88714324 bytes downloaded (6%), overall progress 10%
[1231/142438:INFO:delta_performer.cc(202)] Completed 2035/6357 operations (32%), 7372800/88714324 bytes downloaded (8%), overall progress 20%
[1231/142501:INFO:delta_performer.cc(202)] Completed 2798/6357 operations (44%), 15613952/88714324 bytes downloaded (17%), overall progress 30%
[1231/142523:INFO:delta_performer.cc(202)] Completed 3406/6357 operations (53%), 24854528/88714324 bytes downloaded (28%), overall progress 40%
[1231/142524:INFO:delta_performer.cc(202)] Completed 3437/6357 operations (54%), 40812544/88714324 bytes downloaded (46%), overall progress 50%
[1231/142525:INFO:delta_performer.cc(365)] Applying 2278 operations to partition "vendor"
[1231/142525:INFO:delta_performer.cc(202)] Completed 3815/6357 operations (60%), 54706176/88714324 bytes downloaded (61%), overall progress 60%
[1231/142529:INFO:delta_performer.cc(202)] Completed 4959/6357 operations (78%), 55050240/88714324 bytes downloaded (62%), overall progress 70%
[1231/142545:INFO:delta_performer.cc(202)] Completed 5722/6357 operations (90%), 63242240/88714324 bytes downloaded (71%), overall progress 80%
[1231/142546:INFO:delta_performer.cc(365)] Applying 7 operations to partition "xbl"
[1231/142546:INFO:delta_performer.cc(365)] Applying 12 operations to partition "hosd"
[1231/142559:INFO:delta_performer.cc(365)] Applying 2 operations to partition "abl"
[1231/142559:INFO:delta_performer.cc(365)] Applying 4 operations to partition "rpm"
[1231/142559:INFO:delta_performer.cc(365)] Applying 2 operations to partition "pmic"
[1231/142559:INFO:delta_performer.cc(365)] Applying 12 operations to partition "boot"
[1231/142600:ERROR:delta_performer.cc(1057)] The hash of the source data on disk for this operation doesn't match the expected value. This could mean that the delta update payload was targeted for another version, or that the source partition was modified after it was installed, for example, by mounting a filesystem.
[1231/142600:ERROR:delta_performer.cc(1062)] Expected: sha256|hex = 56364358B930F09705B1DA54779402C9B59A5DA333F9B860B3AB401EF5BDD9EE
[1231/142600:ERROR:delta_performer.cc(1065)] Calculated: sha256|hex = 42AB021164B5015BFD12278AE756BC5FD599C982B3944303745F748905BB944C
[1231/142600:ERROR:delta_performer.cc(1076)] Operation source (offset:size) in blocks: 0:4312,4313:1270,5584:8,5597:2188,7786:1042,8833:64,8900:1183,10088:79,10168:2,10175:1,10177:1170,11348:2310
[1231/142600:ERROR:delta_performer.cc(1242)] ValidateSourceHash(source_hasher.raw_hash(), operation, error) failed.
[1231/142600:ERROR:delta_performer.cc(289)] Failed to perform SOURCE_BSDIFF operation 5750, which is the operation 0 in partition "boot"
[1231/142600:ERROR:download_action.cc(274)] Error ErrorCode::kDownloadStateInitializationError (20) in DeltaPerformer's Write method when processing the received payload -- Terminating processing
[1231/142600:INFO:delta_performer.cc(305)] Discarding 6446230 unused downloaded bytes
[1231/142600:INFO:multi_range_http_fetcher.cc(172)] Received transfer terminated.
[1231/142600:INFO:multi_range_http_fetcher.cc
Gesendet von meinem HTC U11 life mit Tapatalk
MC_Ohr said:
So I found the log of update_engine. There is a hash check of the boot partition.
Code:
[1231/141321:INFO:main.cc(115)] Chrome OS Update Engine starting
[1231/141321:INFO:boot_control_android.cc(65)] Loaded boot control hidl hal.
[1231/142402:INFO:update_attempter_android.cc(201)] Using this install plan:
[1231/142402:INFO:install_plan.cc(71)] InstallPlan: new_update, payload type: unknown, source_slot: A, target_slot: B, url: file:///data/ota_package/update.zip, payload size: 88714324, payload hash: Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=, metadata size: 466479, metadata signature: , hash_checks_mandatory: true, powerwash_required: false
[1231/142402:WARNING:htc_utils.cc(151)] HTC_SCRIPT_VERSION=AB_O80QCT.00.000.007
[1231/142402:WARNING:htc_utils.cc(152)] POST_DESCRIPTION=1.09.401.2 9.0_g CL1008231 release-keys
[1231/142402:WARNING:htc_utils.cc(153)] POST_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/1008231.2:user/release-keys
[1231/142402:WARNING:htc_utils.cc(105)] HTC_CID=HTC__001,HTC__034,HTC__M27,HTC__002; ro.cid=HTC__034
[1231/142402:WARNING:htc_utils.cc(82)] HTC__034 matches...
[1231/142402:WARNING:htc_utils.cc(116)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] HTC_MID=2Q3F20000; ro.mid=2Q3F20000
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] HTC_DEVICE=htc_ocla1_sprout; ro.product.device=htc_ocla1_sprout
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_DESCRIPTION=1.06.401.14 9.0_g CL990708 release-keys; ro.build.description=1.06.401.14 9.0_g CL990708 release-keys
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_FINGERPRINT=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys; ro.build.fingerprint=htc/ocla1_sprout_00401/htc_ocla1_sprout:8.0.0/OPR6.170623.013/990708.14:user/release-keys
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:WARNING:htc_utils.cc(105)] PRE_TASKID=515519; ro.aa.taskid=515519
[1231/142402:WARNING:htc_utils.cc(111)] Pass checking...
[1231/142402:INFO:cpu_limiter.cc(71)] Setting cgroup cpu shares to 2
[1231/142402:ERROR:utils.cc(193)] fd >= 0 failed: No such file or directory
[1231/142402:ERROR:cpu_limiter.cc(74)] Failed to change cgroup cpu shares to 2 using /sys/fs/cgroup/cpu/update-engine/cpu.shares
[1231/142402:INFO:update_attempter_android.cc(393)] Marking booted slot as good.
[1231/142402:INFO:update_attempter_android.cc(408)] Scheduling an action processor start.
[1231/142402:INFO:action_processor.cc(46)] ActionProcessor: starting InstallPlanAction
[1231/142402:INFO:action_processor.cc(116)] ActionProcessor: finished InstallPlanAction with code ErrorCode::kSuccess
[1231/142402:INFO:action_processor.cc(143)] ActionProcessor: starting DownloadAction
[1231/142402:INFO:install_plan.cc(71)] InstallPlan: new_update, payload type: unknown, source_slot: A, target_slot: B, url: file:///data/ota_package/update.zip, payload size: 88714324, payload hash: Pcz1Sw3IChOxEJWNniwpI8pSS0aN3nP+KlZMHKn5Z4E=, metadata size: 466479, metadata signature: , hash_checks_mandatory: true, powerwash_required: false
[1231/142402:INFO:download_action.cc(179)] Marking new slot as unbootable
[1231/142402:INFO:multi_range_http_fetcher.cc(45)] starting first transfer
[1231/142402:INFO:multi_range_http_fetcher.cc(74)] starting transfer of range 3946+88714324
[1231/142402:INFO:delta_performer.cc(202)] Completed 0/? operations, 16384/88714324 bytes downloaded (0%), overall progress 0%
[1231/142402:INFO:delta_performer.cc(542)] Manifest size in payload matches expected value from Omaha
[1231/142402:INFO:delta_performer.cc(1412)] Verifying metadata hash signature using public key: /etc/update_engine/update-payload-key.pub.pem
[1231/142402:INFO:payload_verifier.cc(93)] signature blob size = 264
[1231/142402:INFO:payload_verifier.cc(112)] Verified correct signature 1 out of 1 signatures.
[1231/142402:INFO:delta_performer.cc(1455)] Metadata hash signature matches value in Omaha response.
[1231/142403:INFO:delta_performer.cc(1475)] Detected a 'delta' payload.
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old system sha256: SzmK3XVHUFtJDoc+dX9vaiAGZOf4LQLkVANqfoX8aYM= size: 2952790016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new system sha256: rEbITUaIVARqP7NyPwGdYise+S1bgUH6i/8tJe281sY= size: 2952790016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old vendor sha256: pN048+oMXhrsVEpgo9XEJD5P3RPItj9tCaugByFMsdc= size: 838860800
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new vendor sha256: MLf9+C36UzOJlYvtrMj5KFgX5qwTNwJpckDDzzJbW9Q= size: 838860800
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old xbl sha256: 7ZOdUYruCVjIfkRCghobVnVbkfa0qSxMWn2HIekTYaE= size: 3080192
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new xbl sha256: 5+SV0zuYEE3AEu/OudE+hfEcs5bdIKPMazgW/T8mXVI= size: 3084288
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old hosd sha256: IRSk31oyN/2qIFspIkdZT7GM5LxCNyz6tfT3mDNBUEg= size: 55889920
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new hosd sha256: q/svW0eAUbGBCj4++K+i26iR2HMqTn9Y+BJu69ULVtg= size: 55894016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old abl sha256: EJVxhBLKjjxEaTcTCIguE0pR+XMnMRkjHDskCBcSKmo= size: 143360
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new abl sha256: JBPuhtgk7UQ2nEYIb6e9el416xA5UA3IjZ1hOshwdmM= size: 147456
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old rpm sha256: c3WMA2MpUBxJOTzyX/wQQH7Z9COQtVQgY4hGpv1+waA= size: 221184
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new rpm sha256: qifOkTY4PUUjDLHuJYbDDFU1EevI33a5JNBS0EYrnDU= size: 225280
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old pmic sha256: emQfsgD2M2NqhDR/05h+eG0s/bx2vXp0gRSZd5S6gIE= size: 36864
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new pmic sha256: pmM/rwlD9WdyVBFSRvTzo+QYKPeAcopyg4kOcxfnYsU= size: 40960
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old boot sha256: Nj8nwvZ8vEWKwTESh6U+VsN1TuKUmwzYYtwUTcGjvPg= size: 55943168
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new boot sha256: LZwSja8jFa2XwgTfVsOx4r5zMUBT2pv7o6GCvt9uCpU= size: 55947264
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old dsp sha256: cbh7/JbA4pEzDeKqfxf88C3kmR29Rm9t/bS8UINoDcg= size: 16777216
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new dsp sha256: cbh7/JbA4pEzDeKqfxf88C3kmR29Rm9t/bS8UINoDcg= size: 16777216
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old radio sha256: VcolpgB2otdbuQKsZsm43XxtF+wcu8oJS9HkQIY/WWw= size: 62337024
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new radio sha256: 27kNwK+qLEi0MdrM7/hFhlahRzg70it5h9kh6LAMMeY= size: 62337024
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old tz sha256: yWyBuoTv2M+tQSxDTfMmJM2n2q6nIhulMrB3sZ+jsVA= size: 1953792
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new tz sha256: HW1NRgU5N1to4CAeZR1e3irSHkYH8RLD1r/r4Xu5OiI= size: 1957888
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old hyp sha256: Hn0RBVarof+yc5EyaH9zNtDHkG8Ode96TfRmfKt0VEQ= size: 266240
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new hyp sha256: 2J68uFWVRIK0zhkEmek3NmGIRmjk1VuXBmF1Yl5u/fY= size: 270336
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old devcfg sha256: sJa43eqyYdFwno2Ybp5I5g8zjKyYphi+J5L53+WeCUI= size: 45056
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new devcfg sha256: glQk7DOZxJbhP6UJA/j1+BUhw0KBQcQddjNhwhoEdDg= size: 49152
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old cmnlib sha256: KGyqdUERnMSlmFMP50PnDA1uvjWvjOOpp7ZKjaqJJk0= size: 217088
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new cmnlib sha256: 4qjItJNTjy5szo8SFXkbNSSdmm5NarEOjIB26q3dOJA= size: 221184
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old cmnlib64 sha256: mqbqjxPFSfYrKJujRULExhM/No+utcO3QqkPTf5d1Ws= size: 262144
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new cmnlib64 sha256: lRNo5nuiENQZXkX1c3hJhz/oc9Whh8nHI+tiuQLAzXw= size: 266240
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old keymaster sha256: KEcfQcnCfsZ6qFfiWTHYSKfT9cpin9CTtIU+5mgcF9s= size: 278528
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new keymaster sha256: 4bprlshY7JPC5LUsRhoxCLjDg9gl5w6sfCZqFkfHx60= size: 282624
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old lockbooter sha256: VtbPjUhr3SClK5ThAby5q8vJs8cGctJ4d+3/m9hnIG4= size: 86016
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new lockbooter sha256: 1sl80Aby2MFL9JElaFezl0KWT4mm8w9n7p7JzPWEOIE= size: 90112
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo old bluetooth sha256: HmhjTBICwVt0g2tSOedZXEbv4RKk6brzSmBDJKZgNQ0= size: 503808
[1231/142403:INFO:delta_performer.cc(380)] PartitionInfo new bluetooth sha256: b4bYyd+Ff4w896RlM4SD24/kuxdSKdj3cOKyRg44U9w= size: 503808
[1231/142403:INFO:delta_performer.cc(365)] Applying 3445 operations to partition "system"
[1231/142403:INFO:delta_performer.cc(653)] Starting to apply update payload operations
[1231/142428:INFO:delta_performer.cc(202)] Completed 890/6357 operations (14%), 5488640/88714324 bytes downloaded (6%), overall progress 10%
[1231/142438:INFO:delta_performer.cc(202)] Completed 2035/6357 operations (32%), 7372800/88714324 bytes downloaded (8%), overall progress 20%
[1231/142501:INFO:delta_performer.cc(202)] Completed 2798/6357 operations (44%), 15613952/88714324 bytes downloaded (17%), overall progress 30%
[1231/142523:INFO:delta_performer.cc(202)] Completed 3406/6357 operations (53%), 24854528/88714324 bytes downloaded (28%), overall progress 40%
[1231/142524:INFO:delta_performer.cc(202)] Completed 3437/6357 operations (54%), 40812544/88714324 bytes downloaded (46%), overall progress 50%
[1231/142525:INFO:delta_performer.cc(365)] Applying 2278 operations to partition "vendor"
[1231/142525:INFO:delta_performer.cc(202)] Completed 3815/6357 operations (60%), 54706176/88714324 bytes downloaded (61%), overall progress 60%
[1231/142529:INFO:delta_performer.cc(202)] Completed 4959/6357 operations (78%), 55050240/88714324 bytes downloaded (62%), overall progress 70%
[1231/142545:INFO:delta_performer.cc(202)] Completed 5722/6357 operations (90%), 63242240/88714324 bytes downloaded (71%), overall progress 80%
[1231/142546:INFO:delta_performer.cc(365)] Applying 7 operations to partition "xbl"
[1231/142546:INFO:delta_performer.cc(365)] Applying 12 operations to partition "hosd"
[1231/142559:INFO:delta_performer.cc(365)] Applying 2 operations to partition "abl"
[1231/142559:INFO:delta_performer.cc(365)] Applying 4 operations to partition "rpm"
[1231/142559:INFO:delta_performer.cc(365)] Applying 2 operations to partition "pmic"
[1231/142559:INFO:delta_performer.cc(365)] Applying 12 operations to partition "boot"
[1231/142600:ERROR:delta_performer.cc(1057)] The hash of the source data on disk for this operation doesn't match the expected value. This could mean that the delta update payload was targeted for another version, or that the source partition was modified after it was installed, for example, by mounting a filesystem.
[1231/142600:ERROR:delta_performer.cc(1062)] Expected: sha256|hex = 56364358B930F09705B1DA54779402C9B59A5DA333F9B860B3AB401EF5BDD9EE
[1231/142600:ERROR:delta_performer.cc(1065)] Calculated: sha256|hex = 42AB021164B5015BFD12278AE756BC5FD599C982B3944303745F748905BB944C
[1231/142600:ERROR:delta_performer.cc(1076)] Operation source (offset:size) in blocks: 0:4312,4313:1270,5584:8,5597:2188,7786:1042,8833:64,8900:1183,10088:79,10168:2,10175:1,10177:1170,11348:2310
[1231/142600:ERROR:delta_performer.cc(1242)] ValidateSourceHash(source_hasher.raw_hash(), operation, error) failed.
[1231/142600:ERROR:delta_performer.cc(289)] Failed to perform SOURCE_BSDIFF operation 5750, which is the operation 0 in partition "boot"
[1231/142600:ERROR:download_action.cc(274)] Error ErrorCode::kDownloadStateInitializationError (20) in DeltaPerformer's Write method when processing the received payload -- Terminating processing
[1231/142600:INFO:delta_performer.cc(305)] Discarding 6446230 unused downloaded bytes
[1231/142600:INFO:multi_range_http_fetcher.cc(172)] Received transfer terminated.
[1231/142600:INFO:multi_range_http_fetcher.cc
Gesendet von meinem HTC U11 life mit Tapatalk
Click to expand...
Click to collapse
I've noticed on Oreo firmware for u11 and u11 life if bootloader is unlocked the system will show modified even if nothing was altered. That means the only way would be to lock bootloader and ruu back to stock. It sucks because if we can't get boot.img to patch then there will be no root on the new update you are trying to update to.
twinnfamous said:
I've noticed on Oreo firmware for u11 and u11 life if bootloader is unlocked the system will show modified even if nothing was altered. That means the only way would be to lock bootloader and ruu back to stock. It sucks because if we can't get boot.img to patch then there will be no root on the new update you are trying to update to.
Click to expand...
Click to collapse
I have now flashed the boot_signed.img and was able to take the update. The new factory Image is also online on easy firmware, so I'm downloading. When it´s finished I will patch and upload again.
MC_Ohr said:
I have now flashed the boot_signed.img and was able to take the update. The new factory Image is also online on easy firmware, so I'm downloading. When it´s finished I will patch and upload again.
Click to expand...
Click to collapse
Ok cool

[newbie] Cryptfs : Unexpected value for crypto key location (lineage os, 17.1, Samsung S9+)

- Samsung S9+, 256 Gb
- Lineage OS 17.1
- TWRP 3.5
I've successfully installed Lineage OS 17.1 on my Samsung S9+. It's been working fine so far. However, when I encrypt the OS from the security menu, right after the screen goes black with the green android-like logo, the phone quickly reboots back to the non encrypted OS. Going again through the process does not help. I'm not sure this issue is related to Lineage OS, so that's why I did not open this thread under Lineage.
I've checked forums on the web, and some of them are indicating a filesystem issue – wrong block size – after looking at the logs. The issue here is that logcat isn't showing anything related to that (recovery.log and dmesg.log). Where should I look for the logs related to the encryption failing?
Also, is there a way to run the encryption manually, from command like, at TWRP?
These are actual the partitions:
/boot | /dev/block/sda10 | Size: 55MB
/recovery | /dev/block/sda11 | Size: 64MB
/cache | /dev/block/sda21 | Size: 574MB Used: 0MB Free: 574MB Backup Size: 0MB
/system_root | /dev/block/sda18 | Size: 4281MB Used: 1574MB Free: 2707MB Backup Size: 1574MB
/vendor | /dev/block/sda19 | Size: 617MB Used: 511MB Free: 106MB Backup Size: 511MB
/data | /dev/block/sda25 | Size: 232658MB Used: 1544MB Free: 231020MB Backup Size: 1544MB
/system_image | /dev/block/sda18 | Size: 4400MB
/vendor_image | /dev/block/sda19 | Size: 650MB
/odm_image | /dev/block/sda20 | Size: 616MB
/modem | /dev/block/sda12 | Size: 50MB
/efs | /dev/block/sda3 | Size: 15MB Used: 2MB Free: 13MB Backup Size: 2MB
/misc | /dev/block/sda15 | Size: 1MB
/odm | /dev/block/sda20 | Size: 592MB Used: 102MB Free: 490MB Backup Size: 102MB
/preload | /dev/block/sda22 | Size: 40MB Used: 7MB Free: 32MB Backup Size: 7MB
/external_sd | /dev/block/mmcblk0p1 | Size: 30432MB Used: 642MB Free: 29789MB Backup Size: 642MB
/usb-otg | | Size: 0MB Used: 0MB Free: 0MB Backup Size: 0MB
Which partitions should be encrypted? Are there /boot, /recovery, /system_root, and /data?
I should just mention that I've tried the steps given here on /data (/dev/block/sda25), but it did not work for me.
I tried this too:
Boot into recovery
Select ‘Wipe’
Select ‘Advanced Wipe’
Select data partition
Select ‘Resize’
Not working, i.e., same result.
I finally got the logs via logcat. This is what comes out during the encryption through the Settings menu:
--------- beginning of main
01-20 19:17:52.959 4019 4129 D vold : fdeEnable(3, *, 0)
01-20 19:17:52.960 4019 4129 D vold : !fscrypt_is_native, spawning fdeEnableInternal
01-20 19:17:52.960 4019 403 E Cryptfs : Unexpected value for crypto key location
01-20 19:17:52.961 4019 403 E Cryptfs : Cannot get size of block device
01-20 19:17:53.067 4019 403 W vold : Found symlink /proc/29802/cwd referencing /data/misc/keystore
01-20 19:17:53.067 4019 403 W vold : Found symlink /proc/29803/fd/7 referencing /data/vendor/gps/.lhd.lock
01-20 19:17:53.068 4019 403 W vold : Found symlink /proc/29803/fd/12 referencing /data/vendor/gps/.pipe.gpsd_to_lhd.to_server
01-20 19:17:53.068 4019 403 W vold : Found symlink /proc/29803/fd/14 referencing /data/vendor/gps/.pipe.gpsd_to_lhd.to_client
01-20 19:17:53.069 4019 403 W vold : Found symlink /proc/29804/fd/7 referencing /data/vendor/gps/.gpsd.lock
...
...
01-20 19:17:53.217 4019 403 W vold : Sending Killed to 32740
01-20 19:17:53.218 4019 403 W vold : Sending Killed to 32509
01-20 19:17:53.218 4019 403 W vold : Sending Killed to 32383
...
...
01-20 19:17:53.221 4019 403 E Cryptfs : Unexpected value for crypto key location
01-20 19:17:53.221 4019 403 E Cryptfs : Cannot get size of block device
--------- beginning of crash
Is it because there are symlinks pointing to /data/? Newbie question: should I perhaps format /data/ and try again?
Needless to say that any help would be greatly appreciated!
Al right, I got it to work (finally!) by following Alecxs's advice on StackExchange, then Simuroc's script on Gitlab.
When the phone boots up, now, it asks for the PIN. The only remaining issue is TWRP not being able to decrypt /data as it asks for a password, which I do not know – the PIN does not work. This isn't really an issue for me at this point, but if anybody has a suggestion, I'd be happy to hear it.

Categories

Resources