[Q] Nexus 5 lollipop factory image - Nexus 5 Q&A, Help & Troubleshooting

Hello all! I have a nexus 5 which has been previously rooted -- likely, poorly-- and must return to a factory state before updating to the 4.4 in my notifications.
Upon further research, it appears as though I may be able to jump straight to 5.0
This is my first rooting/flashing experience. I'm fairly tech savvy, so naturally, I've read through a few step-by-steps and now assume that I can do this.
I'm looking at Google's nexus images and attempting to follow their step-by-step and am stuck at the point of flash-all ... I don't seem to have a bat file.
This is where I am stuck:
Microsoft Windows [Version 6.3.9600]
(c) 2013 Microsoft Corporation. All rights reserved.
D:\Derrick\documents\Android\adt\sdk\platform-tools>dir
Volume in drive D is TB_Storage
Volume Serial Number is 14C9-3414
Directory of D:\Derrick\documents\Android\adt\sdk\platform-tools
11/13/2014 02:00 PM <DIR> .
11/13/2014 02:00 PM <DIR> ..
11/13/2014 01:21 PM 1,009,664 adb.exe
11/13/2014 01:21 PM 96,256 AdbWinApi.dll
11/13/2014 01:21 PM 60,928 AdbWinUsbApi.dll
11/13/2014 01:21 PM <DIR> api
11/13/2014 01:21 PM 73,728 dmtracedump.exe
11/13/2014 01:21 PM 338,944 etc1tool.exe
11/13/2014 01:21 PM 196,608 fastboot.exe
11/13/2014 01:06 PM 583,276,888 hammerhead-5.0.tgz
11/13/2014 01:21 PM 39,424 hprof-conv.exe
11/13/2014 01:21 PM 753,215 NOTICE.txt
11/13/2014 01:21 PM 16,517 source.properties
11/13/2014 01:21 PM 700,928 sqlite3.exe
11/13/2014 01:21 PM <DIR> systrace
11 File(s) 586,563,100 bytes
4 Dir(s) 116,558,458,880 bytes free
D:\Derrick\documents\Android\adt\sdk\platform-tools>adb reboot bootloader
D:\Derrick\documents\Android\adt\sdk\platform-tools>fastboot oem unlock
...
FAILED (remote: Already Unlocked)
finished. total time: -0.000s
D:\Derrick\documents\Android\adt\sdk\platform-tools>flash-all
'flash-all' is not recognized as an internal or external command,
operable program or batch file.
My nexus is waiting in fastboot-- I'm probably going to start over when I get a bit of guidance.
Thank you for your help ^-^
I did do some updates with the sdk manager
Installed are
[/]Tools>
>Android SDK tools r23.0.5
>Android SDK platform-tools r21
>Android SDK Build-tools r21.1.1 and r20
[X]Android 5.0A (API 21)
[/]Extras>
>Android Support Repository r8
>Android Support Library 21.0.1
>Google USB Driver r11
Just looking at the list, should I do the Google repository? How do I access the Flash-all bat that, from my understanding, will flash the hammerhead-5.0.tgz
Thank you again,
Salud!

questions go into the q&a section, not into the general section.

thank you-- moved

Related

[Q] [NOOB ALERT] S OFF no sucess....

I read atleast twenty threads in and out of xda but couldnt get s off
My Phone
_______________________________________________________
****UNLOCKED****
PYRAMID PVT SHIP S-ON RL
HBOOT-1.18.0000
eMMC-boot
Aug 2 2011, 22:35:52
ClockworkMod Recovery v5.0.2.0
Android 2.3.4
HTC sense 3.0
Firmware 1.52.720.3
Kernel 2.6.35.13-gbf669cc [email protected]#1 SMP PREEMPT Tue Dec 20 22:35:29 CST 2011
Baseband version 10.56.9035.00U_10.14.9035.01_m
Build 1.52.720.3
CL239628 release-keys
Browser Webkit/533.1
cid HTC_038
_________________________________________________________
My PC... uninstalled htc sync and two other htc packages from windows 7 x64 ultimate updated .... ran ccleaner and installed drivers on revolution site.... ran revolution crack cannot get root...
unlocked htcdev sucess
tried tacoroot getting following output
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Windows\system32>cd\
C:\>cd Users\Rishu\android-sdk\platform-tools
C:\Users\Rishu\android-sdk\platform-tools>dir
Volume in drive C is MEGHDOOT
Volume Serial Number is CAC4-2B1C
Directory of C:\Users\Rishu\android-sdk\platform-tools
10-05-2012 10:30 <DIR> .
10-05-2012 10:30 <DIR> ..
08-05-2012 23:42 824,832 aapt.exe
08-05-2012 23:42 162,816 adb.exe
08-05-2012 23:42 96,256 AdbWinApi.dll
08-05-2012 23:42 60,928 AdbWinUsbApi.dll
08-05-2012 23:42 220,672 aidl.exe
08-05-2012 23:42 <DIR> api
08-05-2012 23:42 132,608 dexdump.exe
08-05-2012 23:42 2,618 dx.bat
08-05-2012 23:42 70,144 fastboot.exe
08-05-2012 23:42 <DIR> lib
08-05-2012 23:42 19,318,784 llvm-rs-cc.exe
08-05-2012 23:42 377,618 NOTICE.txt
08-05-2012 23:42 <DIR> renderscript
08-05-2012 23:42 207 source.properties
10-05-2012 10:28 14,475 tacoroot.bin
09-05-2012 20:13 256 Unlock_code.bin
13 File(s) 21,282,214 bytes
5 Dir(s) 32,782,921,728 bytes free
C:\Users\Rishu\android-sdk\platform-tools>adb push tacoroot.bin /data/local
906 KB/s (14475 bytes in 0.015s)
C:\Users\Rishu\android-sdk\platform-tools>adb shell chmod 777 /data/local/tacoro
ot.bin
C:\Users\Rishu\android-sdk\platform-tools>adb shell /data/local/tacoroot.bin --s
etup
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by
both Justin Case and Dan Rosenberg (Rosenberg fist). I believe unrevoked and
AlpahRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least on
ce after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Rebooting into recovery, please press Volume+, Volume- and Power at the same tim
e, and reboot the system.
rm failed for /data/data/recovery/log, No such file or directory
link failed No such file or directory
C:\Users\Rishu\android-sdk\platform-tools>adb shell /data/local/tacoroot.bin --r
oot
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by
both Justin Case and Dan Rosenberg (Rosenberg fist). I believe unrevoked and
AlpahRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least on
ce after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Rebooting into root.
cannot create /data/local.prop: permission denied
C:\Users\Rishu\android-sdk\platform-tools>adb shell
$ su
su
su: permission denied
$
C:\Users\Rishu\android-sdk\platform-tools>
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
I dont have an coount of which all threads i read but dnt know if my software is too new..... ICS is not yet released in india so I guess I am not that uptodate....
used supetools, hanoos kit etc.... I am actually attaching a snapshot of my recent downloads too so you know what all I have done...
Please guide me..... my proficiency level....
Using Windows Mobile for last six years Last two mobiles P3450(elf) and T5353(touch diamond 2) now gracefully retired and shifted to android with z710e(sensation).... used linux at intermediate level and comfortable with command line..... I can setup a linux system if its worth the time(I am on a slow net ie 512 kbps)
its easy
Hey buddy...I strongly recommend you to use taco root method available on xda...
I have the same soft and similar phone, and I worked for me...

[Q] Rooting LG KU-5400

Purchased an LG KU-5400 (Korean ver. of the LG Prada 3.0 P940), and many sites indicate that Korean firmware limit SMS characters to 90 before turning into MMS, and in order to amend this, the phone has to be rooted.
Tried rooting the phone with SRS Root and got this:
---= SRS One-Click-Root v4.6 =---
8:28:53 PM - Starting ADB Server..
8:28:58 PM - Manufacturer: LGE
8:28:58 PM - Model: LG-KU5400
8:28:58 PM - Android Version: 4.0.4
8:28:59 PM - Build ID: IMM76D
8:28:59 PM - Board ID: p2
8:28:59 PM - Chipset Platform: omap4
8:28:59 PM - Getting OffSets.. : 0x8003 0xae5f (False)
8:28:59 PM - Query Server for Best Method.. Found Rootkit: 5
----= Start Rooting Process.. Please Wait =----
8:29:00 PM [+] Testing exploit: root5 (please wait..)
8:29:01 PM [+] Unlock your device screen, it should bring up restore mode.
8:29:08 PM [+] Press RESTORE button on device NOW! then wait...
8:29:35 PM [+] Device Reboot #1 (Wait till it's started)
8:30:23 PM [+] Executing root5 exploit Failed.
8:30:23 PM Auto Root Failed on this device.
8:30:23 PM Rebooting Device and try again...
Tried this without the SD card in, and the same result.
Software version is V20i. Is there another way of rooting this phone without the method of installing the European firmware?

[OPENSOURCE TOOL][Android 5.0] cross-platform deodex tool; create GApps zip yourself

make-gapps-zip is an opensource project that allows you to create your own flashable GApps zip from existing firmware (e.g., Nexus factory images) on Linux/OS X/Windows. AFAIK there is only a Windows-only tool. Some other "devs" only publish GApps packages and are not transparent about the origin/methodology. For this reason, the project was started to document GApps files (Android >= 5.0) and create tooling for it.
The main tools that is part of this project are odex2apk.py and make-update-zip.py. Since these are Python scripts, these run on Linux, OS X and Windows. The only other dependency is Java 7 or newer.
odex2apk.py uses oat2dex.jar by Riddle Hsu. Given an OAT-optimized .odex file, it will add classes.dex to the APK file if missing. This process reproducible such that the resulting file contents are byte-for-byte identical given the same source files.
make-update-zip.py uses the above odex2apk.py script to create deodexed APK files, then creates a flashable .zip file that can be installed from recovery.
Links:
Project site: https://github.com/Lekensteyn/make-gapps-zip
GApps Documentation
Please report issues at https://github.com/Lekensteyn/make-gapps-zip/issues
Example invocation and output:
[[email protected] make-gapps-zip] $ ls -F /tmp/pfiles/
app/ bin/ build.prop etc/ fonts/ framework/ lib/ media/ priv-app/ recovery-from-boot.p usr/ vendor/ xbin/
[[email protected] make-gapps-zip] $ ./make-update-zip.py -o update.zip -c keys/testkey.x509.pem -k keys/testkey.pk8 -r /tmp/pfiles GoogleLoginService GoogleServicesFramework Phonesky PrebuiltGmsCore GoogleContactsSyncAdapter CalendarProvider -f lib/libjni_latinimegoogle.so
Code:
odex2apk: Processing boot directory, may take a minute...
odex2apk: Added /tmp/pfiles/priv-app/GoogleLoginService/arm/GoogleLoginService.dex to /tmp/pfiles/priv-app/GoogleLoginService/GoogleLoginService.apk as classes.dex
odex2apk: /tmp/pfiles/priv-app/GoogleLoginService/GoogleLoginService.apk is ready!
odex2apk: Added /tmp/pfiles/priv-app/GoogleServicesFramework/arm/GoogleServicesFramework.dex to /tmp/pfiles/priv-app/GoogleServicesFramework/GoogleServicesFramework.apk as classes.dex
odex2apk: /tmp/pfiles/priv-app/GoogleServicesFramework/GoogleServicesFramework.apk is ready!
odex2apk: /tmp/pfiles/priv-app/Phonesky/Phonesky.apk is ready!
odex2apk: /tmp/pfiles/priv-app/PrebuiltGmsCore/PrebuiltGmsCore.apk is ready!
odex2apk: Added /tmp/pfiles/app/GoogleContactsSyncAdapter/arm/GoogleContactsSyncAdapter.dex to /tmp/pfiles/app/GoogleContactsSyncAdapter/GoogleContactsSyncAdapter.apk as classes.dex
odex2apk: /tmp/pfiles/app/GoogleContactsSyncAdapter/GoogleContactsSyncAdapter.apk is ready!
odex2apk: Added /tmp/pfiles/priv-app/CalendarProvider/arm/CalendarProvider.dex to /tmp/pfiles/priv-app/CalendarProvider/CalendarProvider.apk as classes.dex
odex2apk: /tmp/pfiles/priv-app/CalendarProvider/CalendarProvider.apk is ready!
make-update-zip: Adding system/priv-app/GoogleLoginService/GoogleLoginService.apk
make-update-zip: Adding system/priv-app/GoogleServicesFramework/GoogleServicesFramework.apk
make-update-zip: Adding system/priv-app/Phonesky/Phonesky.apk
make-update-zip: Adding system/priv-app/PrebuiltGmsCore/lib/arm/libsslwrapper_jni.so
make-update-zip: Adding system/priv-app/PrebuiltGmsCore/lib/arm/libjgcastservice.so
make-update-zip: Adding system/priv-app/PrebuiltGmsCore/lib/arm/libgmscore.so
make-update-zip: Adding system/priv-app/PrebuiltGmsCore/lib/arm/libgms-ocrclient.so
make-update-zip: Adding system/priv-app/PrebuiltGmsCore/lib/arm/libgcastv2_support.so
make-update-zip: Adding system/priv-app/PrebuiltGmsCore/lib/arm/libgcastv2_base.so
make-update-zip: Adding system/priv-app/PrebuiltGmsCore/lib/arm/libgames_rtmp_jni.so
make-update-zip: Adding system/priv-app/PrebuiltGmsCore/lib/arm/libconscrypt_gmscore_jni.so
make-update-zip: Adding system/priv-app/PrebuiltGmsCore/lib/arm/libWhisper.so
make-update-zip: Adding system/priv-app/PrebuiltGmsCore/lib/arm/libAppDataSearch.so
make-update-zip: Adding system/priv-app/PrebuiltGmsCore/PrebuiltGmsCore.apk
make-update-zip: Adding system/app/GoogleContactsSyncAdapter/GoogleContactsSyncAdapter.apk
make-update-zip: Adding system/priv-app/CalendarProvider/CalendarProvider.apk
make-update-zip: Adding system/lib/libjni_latinimegoogle.so
make-update-zip: Created zip update.zip, trying to sign it...
make-update-zip: Update zip update.zip is ready!
[[email protected] make-gapps-zip] $ unzip -l update.zip
Code:
Archive: update.zip
signed by SignApk
Length Date Time Name
--------- ---------- ----- ----
1675 2008-02-29 03:33 META-INF/com/google/android/update-binary
36483 2008-02-29 03:33 system/app/GoogleContactsSyncAdapter/GoogleContactsSyncAdapter.apk
677372 2008-02-29 03:33 system/lib/libjni_latinimegoogle.so
136107 2008-02-29 03:33 system/priv-app/CalendarProvider/CalendarProvider.apk
4473468 2008-02-29 03:33 system/priv-app/GoogleLoginService/GoogleLoginService.apk
3388642 2008-02-29 03:33 system/priv-app/GoogleServicesFramework/GoogleServicesFramework.apk
11703391 2008-02-29 03:33 system/priv-app/Phonesky/Phonesky.apk
28516157 2008-02-29 03:33 system/priv-app/PrebuiltGmsCore/PrebuiltGmsCore.apk
517592 2008-02-29 03:33 system/priv-app/PrebuiltGmsCore/lib/arm/libAppDataSearch.so
452308 2008-02-29 03:33 system/priv-app/PrebuiltGmsCore/lib/arm/libWhisper.so
13500 2008-02-29 03:33 system/priv-app/PrebuiltGmsCore/lib/arm/libconscrypt_gmscore_jni.so
13496 2008-02-29 03:33 system/priv-app/PrebuiltGmsCore/lib/arm/libgames_rtmp_jni.so
177520 2008-02-29 03:33 system/priv-app/PrebuiltGmsCore/lib/arm/libgcastv2_base.so
194000 2008-02-29 03:33 system/priv-app/PrebuiltGmsCore/lib/arm/libgcastv2_support.so
304752 2008-02-29 03:33 system/priv-app/PrebuiltGmsCore/lib/arm/libgms-ocrclient.so
1630700 2008-02-29 03:33 system/priv-app/PrebuiltGmsCore/lib/arm/libgmscore.so
30092 2008-02-29 03:33 system/priv-app/PrebuiltGmsCore/lib/arm/libjgcastservice.so
1243632 2008-02-29 03:33 system/priv-app/PrebuiltGmsCore/lib/arm/libsslwrapper_jni.so
4995 2008-02-29 03:33 META-INF/com/android/otacert
2100 2008-02-29 03:33 META-INF/MANIFEST.MF
2324 2008-02-29 03:33 META-INF/CERT.SF
1714 2008-02-29 03:33 META-INF/CERT.RSA
--------- -------
53522020 22 files
[[email protected] make-gapps-zip] $ sha1sum update.zip
87986ca452217658c6e3d72b91b631f40fe6dd2f update.zip
[[email protected] make-gapps-zip] $ du -b update.zip # size in bytes
30224904 update.zip
[[email protected] make-gapps-zip] $ grep ro.build.description /tmp/pfiles/build.prop
ro.build.description=hammerhead-user 5.1.1 LMY48I 2074855 release-keys
[[email protected] make-gapps-zip] $ java -version
java version "1.7.0_79"
OpenJDK Runtime Environment (IcedTea 2.5.6) (7u79-2.5.6-0ubuntu1.14.04.1)
OpenJDK 64-Bit Server VM (build 24.79-b02, mixed mode)
Click to expand...
Click to collapse
Note: the tool is designed for Android 5.0 or newer. It can be adapted for Android 4.4 by using baksmali and adjusting the paths, but meh, it is outdated stuff... Have fun with these docs and tools!
Reserved.
Cool ma.. thanks a lot
Sent from my SM-T231 using XDA Free mobile app
Thank you for your work @Lekensteyn. I am very interested in your work for our Open Gapps package (but you already noticed that on GitHub) but personally I can't believe this thread gets so little attention.
One moment everybody cares about stagefright and their safety and security, but when it comes to GApps packages, no one seems to care. Also the comment and general lack of response you got from cgapps is sort of unbelievable :-/

Magic-Image M1 Projector, running Allwinner H3 via a custom Levision Android 4.4.2

Hi Guys,
I have a Chinese Projector called a Magic-Image M1 with Android 4.4.2. I tried to install bootrecovery onto the device and it bricked it! It uses a H3 Allwinner hardware board running a flavor of Android they made them self's called Levision on 4.4.2. I managed to contact them and after a HUGH struggle to send me the firmware, they eventually did! But here is the problem, they send it in ZIP format with these files listed,
2008/02/29 10:33 12 083 200 boot.img
2008/02/29 10:33 32 768 boot0_nand.fex
2008/02/29 10:33 32 768 boot0_sdcard.fex
2008/02/29 10:33 7 209 984 bootloader.fex
2008/02/29 10:33 131 072 env.fex
2008/02/29 10:33 9 075 file_contexts
2019/03/17 17:22 <DIR> META-INF
2019/03/17 14:01 <DIR> recovery
2019/03/15 18:57 13 012 992 recovery.img
2019/03/17 14:01 <DIR> system
2008/02/29 10:33 933 888 uboot_nand.fex
2008/02/29 10:33 933 888 uboot_sdcard.fex
I tried flashing it with PhoenixPro but it does not work. I am a NOOB with this. Can someone please help to get it working to be flashed via PhoenixPro? The image is here h**ps://drive.google.com/drive/u/0/folders/1wHtjVri9m-wxC8ibQBQ-2hZX02sqFpTm
I will pay someone $50 in BTC just to help me to get this firmware flushable via PhoenixPro, PLEASE!

[GUIDE] Extract OTA links & update file from Realme/OPPO devices

So people were asking about how to capture OTA link in Realme devices. Unlike other devices Realme/OPPO devices won't log OTA update link, maybe because colorOS engineers are too smart that they don't want users to have it & update manually or whatever the reasons are. Below is the process to extract OTA link & OTA Package if downloaded.
Prerequisite:
1. Bootloader unlocked device
2. Rooted or custom recovery
Process:
For only extracting OTA link
1. This is the database file where links & other info is stored.
Code:
/data/data/com.oppo.ota/databases/ota.db-wal
Copy it to laptop/PC or whatever so you can be able to read it.
2. Now use Notepad or any other text reader open the ota.db file, you will find random characters which aren't readable by Humans. Scroll until you find https://otafsg.realmemobile.com/* & few other lines which includes MD5 hash, full changelog link which is html webpage & version name etc., Use brain & figure out which is which.
3. Now you got what you want. Mission Accomplished
For extracting OTA Package (OZIP):
This hidden directory contains downloaded OTA Package
Code:
/data/oppo/coloros/OTA/.otaPackage/
. Pull it via ADB or anything whichever you are comfortable with.
Unable to find ota package
Hi I followed the path mentioned to locate the ota package that I had downloaded which is close to 3 GB in size, however, what I got is just a 1000b ozip file. Could you please help?
Yes your file manager is not able to read the size correctly. Try to copy it to your internal storage(with ES file explorer {process will be invisible wait for a minute or two}) and then check the size it will be of 3 gb....hope it helped
thanks! it's help a lot to me
so smart. thanks man
any way without root?
4j17h said:
So people were asking about how to capture OTA link in Realme devices. Unlike other devices Realme/OPPO devices won't log OTA update link, maybe because colorOS engineers are too smart that they don't want users to have it & update manually or whatever the reasons are. Below is the process to extract OTA link & OTA Package if downloaded.
Prerequisite:
1. Bootloader unlocked device
2. Rooted or custom recovery
Process:
For only extracting OTA link
1. This is the database file where links & other info is stored.
Code:
/data/data/com.oppo.ota/databases/ota.db-wal
Copy it to laptop/PC or whatever so you can be able to read it.
2. Now use Notepad or any other text reader open the ota.db file, you will find random characters which aren't readable by Humans. Scroll until you find https://otafsg.realmemobile.com/* & few other lines which includes MD5 hash, full changelog link which is html webpage & version name etc., Use brain & figure out which is which.
3. Now you got what you want. Mission Accomplished
For extracting OTA Package (OZIP):
This hidden directory contains downloaded OTA Package
Code:
/data/oppo/coloros/OTA/.otaPackage/
. Pull it via ADB or anything whichever you are comfortable with.
Click to expand...
Click to collapse
This aint working anymore with ColorOS 11/realmeUI2.0 Update. Also Update Server has been changed to http://ota-manual-in.allawnofs.com/ota/* , followed by some md5 hashes . Any Comments @4j17h
4j17h said:
So people were asking about how to capture OTA link in Realme devices. Unlike other devices Realme/OPPO devices won't log OTA update link, maybe because colorOS engineers are too smart that they don't want users to have it & update manually or whatever the reasons are. Below is the process to extract OTA link & OTA Package if downloaded.
Prerequisite:
1. Bootloader unlocked device
2. Rooted or custom recovery
Process:
For only extracting OTA link
1. This is the database file where links & other info is stored.
Code:
/data/data/com.oppo.ota/databases/ota.db-wal
Copy it to laptop/PC or whatever so you can be able to read it.
2. Now use Notepad or any other text reader open the ota.db file, you will find random characters which aren't readable by Humans. Scroll until you find https://otafsg.realmemobile.com/* & few other lines which includes MD5 hash, full changelog link which is html webpage & version name etc., Use brain & figure out which is which.
3. Now you got what you want. Mission Accomplished
For extracting OTA Package (OZIP):
This hidden directory contains downloaded OTA Package
Code:
/data/oppo/coloros/OTA/.otaPackage/
. Pull it via ADB or anything whichever you are comfortable with.
Click to expand...
Click to collapse
Any way without unlocking device ..??
As once unlocked then it's easy but with locked bootloader any steps ..??
I've tried to follow your guide but unfortunately on RMX3241 it doesn't seem to be stored at this location. The folder only has an sqlite db and it contains no links
RMX3241:/data # find . -path "*ota*database*"
./data/com.oppo.ota/databases
./data/com.oppo.ota/databases/enterprise_ota.db
./data/com.oppo.ota/databases/enterprise_ota.db-journal
and
RMX3241:/data # ls /data/oppo/coloros/ -lah
total 41K
drwxrwxrwx 27 system system 3.4K 2021-11-21 10:59 .
drwxrwxr-x 15 system system 3.4K 2021-11-21 10:49 ..
drwx------ 2 system system 3.4K 2021-11-21 10:49 animation
drwx------ 2 system system 3.4K 2021-11-21 10:52 appswitch
drwx------ 2 system system 3.4K 2021-11-21 11:01 bpm
drwx------ 2 system system 3.4K 2021-11-21 10:52 colordirect
drwx------ 2 system system 3.4K 2021-11-21 10:52 config
drwx------ 2 system system 3.4K 2021-11-21 10:49 darkmode
drwx------ 2 system system 3.4K 2021-11-26 01:33 dataupdate
drwx------ 2 system system 3.4K 2021-11-21 10:52 displaycompat
drwxrwxrwx 2 system system 3.4K 2021-11-21 10:49 eap
drwxrwxrwx 4 system system 3.4K 2021-11-21 10:49 eap_moa
drwx------ 2 system system 3.4K 2021-11-21 10:52 freeform
drwx------ 2 system system 3.4K 2021-11-21 10:52 gamespace
drwxrwxrwx 2 u0_a111 u0_a111 3.4K 2021-11-21 10:52 keylayout
drwx------ 2 system system 3.4K 2021-11-21 10:52 notification
drwx------ 2 system system 3.4K 2021-11-25 11:41 oppoguardelf
drwxrwxrwx 2 system system 3.4K 2021-11-21 10:52 permission
drwx------ 2 system system 3.4K 2021-11-21 10:52 recenttask
drwx------ 2 system system 3.4K 2021-11-23 14:12 removableapp
drwx------ 2 system system 3.4K 2021-11-21 10:52 repairmode
drwx------ 2 system system 3.4K 2021-11-21 10:59 safecenter
drwx------ 2 system system 3.4K 2021-11-21 10:53 securepay
drwx------ 2 system system 3.4K 2021-11-21 22:09 startup
drwx------ 2 system system 3.4K 2021-11-21 10:49 toast
drwx------ 2 system system 3.4K 2021-11-21 10:52 trafficProtect
drwx------ 2 system system 3.4K 2021-11-21 10:52 zoom
Any ideas where else to extract the link to the download for the OTA image?
aryankaran said:
Any way without unlocking device ..??
As once unlocked then it's easy but with locked bootloader any steps ..??
Click to expand...
Click to collapse
No you can't
maintanosgr said:
I've tried to follow your guide but unfortunately on RMX3241 it doesn't seem to be stored at this location. The folder only has an sqlite db and it contains no links
RMX3241:/data # find . -path "*ota*database*"
./data/com.oppo.ota/databases
./data/com.oppo.ota/databases/enterprise_ota.db
./data/com.oppo.ota/databases/enterprise_ota.db-journal
and
RMX3241:/data # ls /data/oppo/coloros/ -lah
total 41K
drwxrwxrwx 27 system system 3.4K 2021-11-21 10:59 .
drwxrwxr-x 15 system system 3.4K 2021-11-21 10:49 ..
drwx------ 2 system system 3.4K 2021-11-21 10:49 animation
drwx------ 2 system system 3.4K 2021-11-21 10:52 appswitch
drwx------ 2 system system 3.4K 2021-11-21 11:01 bpm
drwx------ 2 system system 3.4K 2021-11-21 10:52 colordirect
drwx------ 2 system system 3.4K 2021-11-21 10:52 config
drwx------ 2 system system 3.4K 2021-11-21 10:49 darkmode
drwx------ 2 system system 3.4K 2021-11-26 01:33 dataupdate
drwx------ 2 system system 3.4K 2021-11-21 10:52 displaycompat
drwxrwxrwx 2 system system 3.4K 2021-11-21 10:49 eap
drwxrwxrwx 4 system system 3.4K 2021-11-21 10:49 eap_moa
drwx------ 2 system system 3.4K 2021-11-21 10:52 freeform
drwx------ 2 system system 3.4K 2021-11-21 10:52 gamespace
drwxrwxrwx 2 u0_a111 u0_a111 3.4K 2021-11-21 10:52 keylayout
drwx------ 2 system system 3.4K 2021-11-21 10:52 notification
drwx------ 2 system system 3.4K 2021-11-25 11:41 oppoguardelf
drwxrwxrwx 2 system system 3.4K 2021-11-21 10:52 permission
drwx------ 2 system system 3.4K 2021-11-21 10:52 recenttask
drwx------ 2 system system 3.4K 2021-11-23 14:12 removableapp
drwx------ 2 system system 3.4K 2021-11-21 10:52 repairmode
drwx------ 2 system system 3.4K 2021-11-21 10:59 safecenter
drwx------ 2 system system 3.4K 2021-11-21 10:53 securepay
drwx------ 2 system system 3.4K 2021-11-21 22:09 startup
drwx------ 2 system system 3.4K 2021-11-21 10:49 toast
drwx------ 2 system system 3.4K 2021-11-21 10:52 trafficProtect
drwx------ 2 system system 3.4K 2021-11-21 10:52 zoom
Any ideas where else to extract the link to the download for the OTA image?
Click to expand...
Click to collapse
For the new update it's located
/data/ota_package/OTA/.otaPackage
TechyMinati said:
This aint working anymore with ColorOS 11/realmeUI2.0 Update. Also Update Server has been changed to http://ota-manual-in.allawnofs.com/ota/* , followed by some md5 hashes . Any Comments @4j17h
Click to expand...
Click to collapse
It now located in
/data/ota_package/OTA/.otaPackage
Engrudhy said:
It now located in
/data/ota_package/OTA/.otaPackage
Click to expand...
Click to collapse
at realme UI 3.0 cant find anything now
Does anyone know the location of ota after ui 3.0

Categories

Resources