What are cmnlib32 and cmnlib64? - Google Pixel Questions & Answers

There are two images - cmnlib32.img and cmnlib64.img - not sure what they are. Anyone know?

Related

Modem Components

So in most released firmwares for the OPO these are the files:
NON-HLOS.bin - This is the modem according to most people here and controls the 2g/3g/4g signal
logo.bin - Is this the boot logo?
emmc_appsboot.mbn - Fastboot bootloader *Thanks esistente01
rpm.mbn - Resource and power manager *Thanks fmc000!
sb1.mbn - Secondary bootloader *Thanks fmc000!
sdi.mbn - No idea
static_nvbk.bin - No idea
tz.mbn - Touchscreen Firmware *Thanks chapchapon! / Trustzone *Thanks fmc000!
I have tried searching around for some information on these files but was unable to find much. I was hoping someone help teach me what these files control/do on the OPO or just point me in the right direction to find the information for myself.
mr.shme said:
So in most released firmwares for the OPO these are the files:
NON-HLOS.bin - This is the modem according to most people here and control the 2g/3g/4g signal
logo.bin - Is this the boot logo?
emmc_appsboot.mbn - No idea
rpm.mbn - No idea
sb1.mbn - No idea
sdi.mbn - No idea
static_nvbk.bin - No idea
tz.mbn - No idea
I have tried searching around for some information on these files but was unable to find much. I was hoping someone help teach me what these files control/do on the OPO or just point me in the right direction to find the information for myself.
Click to expand...
Click to collapse
tz.mbn is a touchscreen firmware.
emmc_appsboot.mbn is the bootloader (fastboot)
chapchapon said:
tz.mbn is a touchscreen firmware.
Click to expand...
Click to collapse
Not really...
rpm.bin - resource and power manager
sbl1.mbn - secondary bootloader
tz.mbn - trust zone
fmc000 said:
Not really...
rpm.bin - resource and power manager
sbl1.mbn - secondary bootloader
tz.mbn - trust zone
Click to expand...
Click to collapse
I understand the secondary bootloader but do you know what the rpm and tz actually do?

[ADB | FASTBOOT | LINUX COMMANDS] BootLoader, Kernel, Recovery, ROM, Root, Backup

NOTE:
I'm not a developer or something even near to that. All information provided here is copied from different sources and according to the best of my knowledge.
I have tested this on different devices using Windows 8.1 & 10. I'll not be responsible for any harm to you or your device. It works perfectly for me. You may try it on your own risk.
Save / backup your data before performing any actions.
WHAT IS ADB/FASTBOOT
ADB and fastboot are different protocols used through PC to perform different command line operations on device through USB in ROM/Recovery and bootloader mode respectively.
Android Debugging Bridge is basically used by developers to identify and fix bugs in OS (ROM). ADB works in ROM and recovery both.
Fastboot works in bootloader mode even when phone is not switched on in Recovery or ROM or even if Android isn't installed on phone. In later case, bootloader can be accessed by certain button combination while powering on device; usually Power + Vol. Down. See here the booting process of Android devices.
Fastboot/ADB setup is to be made on PC to use this mode. ADB mode has more flexibility than fastboot as it supports more types of flashable files to be flashed. ADB also supports backing up Apps and Data. ADB/fastboot commands can be used to flash recovery and boot images. It can also flash ROMs and mods like rooting solutions and XPOSED by booting into recovery. And above all, it is the only way to unlock bootloader without which the device functionality is too limited. Read here why we need to unlock bootloader.
In bootloader mode, usually boot logo or fastboot logo appears on device screen.
SETUP
Enable USB Debugging in Settings > Developer Options. If not available, Dev. Options can be accessed by tapping 5 (or 7) times Build Number in Settings > About Phone.
Allow ADB root access in Dev. Options or SuperSU. Some commands need root.
Allow data transfer over ADB when prompted on device screen. Otherwise you might get errors like device unauthorized etc. So keep screen unlocked at first connect.
Disable MTP, PTP, UMS etc. from USB computer connection on device to avoid any interruptions.
Install Android SDK or simply install 15 Seconds ADB Setup 1.4.2. It works up to Android Lollipop (AOSP 5). Credits to Snoop05
Windows 8.1 users who got error installing this setup should first install Windows Update KB2917929.
You will have to navigate to adb folder each time you start cmd. Or setup adb to work globally. On your PC, go to System Properties > Advanced System Settings > Environment Variables. Click on New (User Variables). Variables Name: ADB ( Or anything you want). Variables Value: ;C:\adb (if installed 15 seconds setup) or ;C:\SDK\paltform-tools.
Install ADB USB Drivers for your Android Device. To do this automatically, download and run ADB Driver Installer. Connect device through USB cable and install drivers.
NOTE: Spaces in file paths don't work in adb commands. Non-English characters and languages don't work either. Also the commands are case-sensitive.
There is a long list of adb/fastboot commands to perform numerous operations. Here are a few of those being listed keeping in view certain tasks:
COMMON COMMANDS
On PC run Command Prompt as Administrator.
To check connected devices when ROM is running on phone:
Code:
adb devices
To boot into bootloader mode:
Code:
adb reboot bootloader
To check connected devices when in bootloader mode:
Code:
fastboot devices
To boot into ROM:
Code:
fastboot reboot
To boot into recovery:
Code:
fastboot reboot recovery
There are some common Linux commands which can be used in combination with these commands to perform certain operation. However, ADB | FASTBOOT is not necessarily required for these Linux commands. These can be run directly from Terminal Emulator in ROM or Custom Recovery. Some of them are given below.
UNLOCK BOOTLOADER
NOTE: Some newer devices don't allow unlocking of bootloader directly to ensure more security. Instead an official method is provided to unlock BL using PC.
Read here to know about the risks of BL unlocking.
To check the bootloader status:
Code:
fastboot oem device-info
“True” on unlocked status.
If "false", run the following to unlock:
Code:
fastboot oem unlock
However these are OEM specific commands and may differ or not work on all devices. Fastboot's own commands (which are part of AOSP source and) that can unlock bootloader allowing flashing of partitions:
Code:
fastboot flashing unlock
Allow flashing of bootloader related partitions too:
Code:
fastboot flashing unlock_critical
FORMAT DATA PARTITION
This will erase your data.
Code:
fastboot format:ext4 userdata
It can be performed on other flash partitions as well. A general syntax is 'fastboot format:FS PARTITION'
FLASH RECOVERY
Download recovery.img (specific for your device) to adb folder.
To test the recovery without permanently flashing, run the following:
Code:
fastboot boot recovery.img
On next reboot, recovery will be overwritten by previous recovery.
Or to permanently flash recovery, run:
Code:
fastboot flash recovery recovery.img
fastboot reboot recovery
Stock ROM's often tend to replace custom recovery with stock one on first reboot. That's why, booting into recovery is recommended before booting into ROM.
FLASH KERNEL
Download boot.img (specific for your device) to adb folder and run following:
Code:
fastboot flash boot boot.img
FLASH ROM
Download ROM.zip (for your device) created for fastboot i.e. with android-info.txt and android-product.txt.
To wipe your device and then to flash .zip:
Code:
fastboot -w
fastboot update </path/to/your/Rom.zip>
PASSING FASTBOOT ARGUMENTS
Fastboot supports passing options. For example, while booting a modified kernel image with FramBuffer Console support, console device and its font can be provided as option:
Code:
fastboot boot -c "console=tty0,115200 fbcon=font:VGA8x8" boot-fbcon.img
GAIN ROOT (Not recommended method. Better flash directly through custom recovery).
Root is required to modify the contents of /system. You can read here further.
Download (flashable) supersu.zip and custom or modified recovery.img (having support to flash .zip files) to adb folder and run the following:
Code:
fastboot boot recovery.img
Now once you are in recovery, adb will work instead of fastboot.
To copy files from PC to device and then to extract files, run the following:
Code:
adb push supersu.zip /tmp
adb shell /sbin/recovery --update_package=/tmp/supersu.zip
BACKUP / RESTORE APPS & DATA (From/To PC)
To backup and restore all apps and their data:
Code:
adb backup -apk -shared -all -system -f C:\backup.ab
adb restore C:\backup.ab
Read here for details.
COPY WHOLE PARTITION IMAGE (within device)
This method can be used to backup whole device e.g. to backup /data/ including /data/media/ i.e. Internal SD Card which isn't backed up by custom recovery (TWRP). Or you can get any partition image for development purpose. This method retains complete directory structure as well as file permissions, attributes and contexts.
To jump from windows command prompt to android device shell:
Code:
adb shell
These commands can also be given from Recovery Terminal instead of ADB.
To get SuperUser access (in ROM):
Code:
su
To list all available partitions or mount points on device:
Code:
cat /proc/partitions
Or go to "/dev/block/platform/" folder on device. Search for the folder having folder "by-name" inside it. It's msm_sdcc.1 (on Nokia X2). Run the following:
Code:
ls -al /dev/block/platform/*/by-name
Or simply use DiskInfo app to get partition name you want to copy. Say you want to copy /data (userdata) partition. On Nokia X2DS, it is mmcblk0p25.
To confirm:
Code:
readlink /dev/block/bootdevice/by-name/userdata
Run the following to copy partition:
Code:
dd if=/dev/block/mmcblk0p25 of=/sdcard/data.img
or
Code:
cat /dev/block/mmcblk0p25 > /sdcard/data.img
or
Code:
dd if=/dev/block/bootdevice/by-name/userdata of=/sdcard/data.img
data.img will be copied to your SD card.
It also works inversely (restore):
Code:
dd if=/sdcard/data.img of=/dev/block/mmcblk0p25
data.img from your SD card will be written to device.
Similarly you can copy system.img, boot.img or any other partition. However boot.img and other partitions may not be copied in ROM but in recovery mode only. So better use recovery for dd except if you're​ going to dd recovery partition itself. You can read here more about android partitions.
COPY WHOLE FOLDER (within device)
This method can be used to backup folders like /data/media/ which isn't backed up by custom recovery (TWRP).
To jump from windows command prompt to android device shell:
Code:
adb shell
These commands can also be given from Recovery Terminal.
To get SuperUser access (in ROM):
Code:
su
To copy from Internal Memory to SD Card:
Code:
cp -a /data/media/0/. /external_sd/internal_backup/
Or if you don't have SU permission:
Code:
cp -a /external_sd/. /sdcard/
To copy from SD Card to Internal Memory:
Code:
cp -a /external_sd/internal_backup/. /data/media/0/
However, if you are copying to an SD card with FAT32 file system, android permissions of files won't be retained and you would have to fix permissions yourself. In this case, you can use tar command to create archive of files along with their attributes ( permissions: mode & ownership + time-stamps) and security contexts etc. But FAT32 FS has also a limitations of 4GB maximum file size. You may use "split" command along with "tar" to split the archive in smaller blocks. Or use exFat or Ext4 filesystem for larger file support. Ext4 would give higher writing speed in Android but not supported in Windows i.e. SD card can't be mounted in Windows. MTP however works.
To jump from windows command prompt to android device shell:
Code:
adb shell
To get SuperUser access (in ROM):
Code:
su
To copy from Internal Memory to SD Card:
Code:
tar cvpf /external_sd/internal_backup/media.tar /data/media/0/
To extract from SD Card to Internal Memory (along with path):
Code:
tar -xvf /external_sd/internal_backup/media.tar
To extract from SD Card to some other location, use "-C":
Code:
tar -xvf /external_sd/internal_backup/media.tar -C /data/media/0/extracted_archive/
COPY WHOLE FOLDER (From/To PC)
This method can be used to backup folders like /data/media/ which isn't backed up by custom recovery (TWRP).
To copy from PC to device:
Code:
adb push \path\to\folder\on\PC\ /path/to/folder/on/device/
To copy from device to PC:
Code:
adb pull /path/to/folder/on/device/ \path\to\folder\on\PC\
After copying from PC to device's Internal Memory (/data/media/), you might get Permission Denied error e.g. apps can't write or even read from Internal Memory. It's because Android (Linux) and Windows have different file permissions system. To FIX PERMISSIONS, boot into recovery and run following commands:
(Credits to xak944 )
Code:
adb shell
To take ownership of whole "media" directory:
Code:
chown -R media_rw:media_rw /data/media/
To fix permissions of directories:
Code:
find /data/media/ -type d -exec chmod 775 '{}' ';'
To fix permissions of files:
Code:
find /data/media/ -type f -exec chmod 664 '{}' ';'
HELP PLEASE! Fastboot is acting funny for first time, Huawei Honor 6X
Okay, so I have a Huawei Honor 6X. This device has been rooted and and had custom roms of sorts flashed fine, and bootloader has been unlocked several times only to later have me flash the stock firmware back thus locking bootloader, etc. So this isn't my first rodeo. However, have never seen this. Basically, going from the Stock ROM, I had enabled USB DEBUGGING and approved the little allow always toast popup. Then using my command line in linux, I issued
Code:
adb devices
.... saw it was seeing the device. Then issued
Code:
adb reboot bootloader
. Fine. I see
PHONE locked FRP Unlocked
Click to expand...
Click to collapse
on my fastboot screen. So I know my bootloader is locked. Also, I had previously gotten my unlock code from Huawei as well. But please see the attached image attached belowe here for the real picture of things because once in my fastboot mode, issuing
Code:
fastboot devices
shows my Device ID. However when trying to issue the
Code:
fastboot oem unlock bootloader
code, it acts then like it can find the device or either the devices doesn't find the command? It just says waiting for devices as you can see... wtf? This is all at the same instance. Please see attached and any help, suggestions, etc. are appreciated!
i also have problem trying to issue some fastboot command
bootloader have been unlock
except fastboot reboot command, the rest of fastboot cannot be execute
the error were
...
FAILED (remote: Command not allowed)
finished. total time: 0.00s
can i issue fastboot command from twrp terminal
i want to enable charge reboot
on fastboot
fastboot oem off-mode-charge disable
how to issue comand from within twrp terminal?
ahhl said:
i also have problem trying to issue some fastboot command
bootloader have been unlock
except fastboot reboot command, the rest of fastboot cannot be execute
the error were
...
FAILED (remote: Command not allowed)
finished. total time: 0.00s
can i issue fastboot command from twrp terminal
i want to enable charge reboot
on fastboot
fastboot oem off-mode-charge disable
how to issue comand from within twrp terminal?
Click to expand...
Click to collapse
All vendors don't allow all fastboot commands. Despite of unlocked bootloader, some commands might not work or work differently on certain devices.
No you can't control fastboot from TWRP. Bootloader / fastboot come at lower level in boot process. Recovery itself is loaded by bootloader. We can't control fastboot from recovery. However a few adb commands work in TWRP as well.
Hi guys!
BACKUP / RESTORE APPS & DATA (From/To PC)
Is it still possible on Android Nougat/Oreo on last Samsung devices?
Thanks!
Sent from my SM-G950F using Tapatalk
PIRATA! said:
Hi guys!
BACKUP / RESTORE APPS & DATA (From/To PC)
Is it still possible on Android Nougat/Oreo on last Samsung devices?
Thanks!
Click to expand...
Click to collapse
It's related to adb which is same on Nougat/Oreo, I think. So it should work similarly.
ahhl said:
i also have problem trying to issue some fastboot command
bootloader have been unlock
except fastboot reboot command, the rest of fastboot cannot be execute
the error were
Click to expand...
Click to collapse
FRP locked?
---------- Post added at 11:43 AM ---------- Previous post was at 10:50 AM ----------
Very nice guide with detailed information.
Thanks
struggling with fastboot
Fastboot doesn't want to write out my unlock file???
I'm trying to unlock the bootloader on an old HTC wildfire S, and have followed all the steps listed on the official htcdev.com site to get the unlock token from HTC, but when I run
./fastboot flash unlocktoken Unlock_code.bin
I get
target didn't report max-download-size
sending 'unlocktoken' (0 KB)
but then it just sits these forever
all other fastboot commands seem to work fine, just the flash unlock thats not being written
I can find lots of posts from people with same problem, but no answers that get me any nearer.
enviro here is debian with latest android dev installed from the standard repositories, and fastboot 1:7.0.0+r33-1
phone is wildfire s
Marvel pvt ship s-on rl
hboot 1.09.0099
microp 0451
radio 7.57.39.10m
feb 8 2012,10:29.31
branded for the uk three network.
any help would be appreciated!
chris w
Try this with that Huawei. This should.unlock the oem
Go into settings . Go all the way to the bottom to about phone, then go find build number press at a bunch of times rapidly that'll take you into developer mode. Once in developer mode back into the main menu of settings scroll down to developer options. You should find OEM bootloader unlock about three or four down in that section click unlock and you should be good to go. Good luck oh and I didn't have to back mine up first so you should be good to go.....
theburrus1 said:
Okay, so I have a Huawei Honor 6X. This device has been rooted and and had custom roms of sorts flashed fine, and bootloader has been unlocked several times only to later have me flash the stock firmware back thus locking bootloader, etc. So this isn't my first rodeo. However, have never seen this. Basically, going from the Stock ROM, I had enabled USB DEBUGGING and approved the little allow always toast popup. Then using my command line in linux, I issued
Code:
adb devices
.... saw it was seeing the device. Then issued
Code:
adb reboot bootloader
. Fine. I see on my fastboot screen. So I know my bootloader is locked. Also, I had previously gotten my unlock code from Huawei as well. But please see the attached image attached belowe here for the real picture of things because once in my fastboot mode, issuing
Code:
fastboot devices
shows my Device ID. However when trying to issue the
Code:
fastboot oem unlock bootloader
code, it acts then like it can find the device or either the devices doesn't find the command? It just says waiting for devices as you can see... wtf? This is all at the same instance. Please see attached and any help, suggestions, etc. are appreciated!
Click to expand...
Click to collapse
unknown command while flashing through fastboot
i keep getting unknown command while trying to flash recovery images or firmware, please help me
whitehat15 said:
i keep getting unknown command while trying to flash recovery images or firmware, please help me
Click to expand...
Click to collapse
What commands are you trying and which phone/android version as command has changed since oreo
@mirfatif Do you know what the fastboot update command is doing under the hood? It's obviously flashing the images to the correct partitions but how does it know what image goes where? fastboot flash boot boot.img makes sense to me but running a fastboot command on a bunch of image files in a zip file doesn't. Thanks.
jd1639 said:
@mirfatif Do you know what the fastboot update command is doing under the hood? It's obviously flashing the images to the correct partitions but how does it know what image goes where? fastboot flash boot boot.img makes sense to me but running a fastboot command on a bunch of image files in a zip file doesn't. Thanks.
Click to expand...
Click to collapse
Can you give me example of such zip file? Fastboot protocol is provided by application bootloader (aboot) which knows very well the exact boundaries of partitions on device. When flashing images, we are telling fastboot what image it is or where it is to be written.
mirfatif said:
Can you give me example of such zip file? Fastboot protocol is provided by application bootloader (aboot) which knows very well the exact boundaries of partitions on device. When flashing images, we are telling fastboot what image it is or where it is to be written.
Click to expand...
Click to collapse
The Nexus and pixel phones have had a batch file in the factory image zip file that runs fastboot flashes for the bootloader and radio and then runs a command fastboot update xyz.zip. The xyz.zip is another zip file within the factory image zip. This zip contains all the other image files, i.e. system, modem, etc. Also, I have a pixel 3 and there is no aboot partition. The kernel and recovery images are also both contained in the boot.img. These phones are getting more difficult to deal with.
These are the partitions:
127|:/dev/block/bootdevice/by-name # ls -all
total 0
drwxr-xr-x 2 root root 1440 1970-05-03 01:39:00.159934065 -0500 .
drwxr-xr-x 3 root root 1580 1970-05-03 01:39:00.159934065 -0500 ..
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.146602064 -0500 ALIGN_TO_128K_1 -> /dev/block/sdd1
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.143269064 -0500 ALIGN_TO_128K_2 -> /dev/block/sdf1
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.139936063 -0500 ImageFv -> /dev/block/sdf14
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.149935064 -0500 abl_a -> /dev/block/sde4
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.153268065 -0500 abl_b -> /dev/block/sde16
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.153268065 -0500 aop_a -> /dev/block/sde1
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.153268065 -0500 aop_b -> /dev/block/sde13
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.143269064 -0500 apdp_a -> /dev/block/sda15
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.156601065 -0500 apdp_b -> /dev/block/sda16
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.159934065 -0500 boot_a -> /dev/block/sda11
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.143269064 -0500 boot_b -> /dev/block/sda12
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.146602064 -0500 cdt -> /dev/block/sdd2
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.153268065 -0500 cmnlib64_a -> /dev/block/sde7
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.139936063 -0500 cmnlib64_b -> /dev/block/sde19
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.153268065 -0500 cmnlib_a -> /dev/block/sde6
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.149935064 -0500 cmnlib_b -> /dev/block/sde18
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.146602064 -0500 ddr -> /dev/block/sdd3
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.139936063 -0500 devcfg_a -> /dev/block/sde8
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.149935064 -0500 devcfg_b -> /dev/block/sde20
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.139936063 -0500 devinfo -> /dev/block/sdf7
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.139936063 -0500 dip -> /dev/block/sdf8
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.143269064 -0500 dtbo_a -> /dev/block/sde11
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.149935064 -0500 dtbo_b -> /dev/block/sde23
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.153268065 -0500 frp -> /dev/block/sda4
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.139936063 -0500 fsc -> /dev/block/sdf6
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.146602064 -0500 fsg -> /dev/block/sdf5
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.149935064 -0500 hyp_a -> /dev/block/sde3
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.149935064 -0500 hyp_b -> /dev/block/sde15
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.139936063 -0500 keymaster_a -> /dev/block/sde5
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.139936063 -0500 keymaster_b -> /dev/block/sde17
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.156601065 -0500 keystore -> /dev/block/sda3
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.159934065 -0500 klog -> /dev/block/sda19
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.146602064 -0500 limits -> /dev/block/sdf10
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.143269064 -0500 logfs -> /dev/block/sdf12
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.156601065 -0500 metadata -> /dev/block/sda20
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.153268065 -0500 misc -> /dev/block/sda2
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.156601065 -0500 modem_a -> /dev/block/sda13
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.156601065 -0500 modem_b -> /dev/block/sda14
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.139936063 -0500 modemcal -> /dev/block/sdd4
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.143269064 -0500 modemst1 -> /dev/block/sdf3
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.146602064 -0500 modemst2 -> /dev/block/sdf4
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.143269064 -0500 msadp_a -> /dev/block/sda17
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.149935064 -0500 msadp_b -> /dev/block/sda18
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.146602064 -0500 persist -> /dev/block/sdf2
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.143269064 -0500 product_a -> /dev/block/sda7
lrwxrwxrwx 1 root root** 15 1970-05-03 01:38:59.939956043 -0500 product_b -> /dev/block/sda8
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.149935064 -0500 qupfw_a -> /dev/block/sde9
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.143269064 -0500 qupfw_b -> /dev/block/sde21
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.139936063 -0500 sec -> /dev/block/sdd6
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.139936063 -0500 splash -> /dev/block/sdf15
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.136603063 -0500 spunvm -> /dev/block/sdf9
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.143269064 -0500 ssd -> /dev/block/sda1
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.143269064 -0500 sti -> /dev/block/sdf13
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.146602064 -0500 storsec_a -> /dev/block/sde12
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.149935064 -0500 storsec_b -> /dev/block/sde24
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.153268065 -0500 system_a -> /dev/block/sda5
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.159934065 -0500 system_b -> /dev/block/sda6
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.146602064 -0500 toolsfv -> /dev/block/sdf11
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.139936063 -0500 tz_a -> /dev/block/sde2
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.139936063 -0500 tz_b -> /dev/block/sde14
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.149935064 -0500 uefivar -> /dev/block/sdd5
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.153268065 -0500 userdata -> /dev/block/sda21
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.153268065 -0500 vbmeta_a -> /dev/block/sde10
lrwxrwxrwx 1 root root** 16 1970-05-03 01:39:00.139936063 -0500 vbmeta_b -> /dev/block/sde22
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.143269064 -0500 vendor_a -> /dev/block/sda9
lrwxrwxrwx 1 root root** 16 1970-05-03 01:38:59.939956043 -0500 vendor_b -> /dev/block/sda10
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.139936063 -0500 xbl_a -> /dev/block/sdb1
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.149935064 -0500 xbl_b -> /dev/block/sdc1
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.146602064 -0500 xbl_config_a -> /dev/block/sdb2
lrwxrwxrwx 1 root root** 15 1970-05-03 01:39:00.149935064 -0500 xbl_config_b -> /dev/block/s
Sent from my [device_name] using XDA-Developers Legacy app
jd1639 said:
The xyz.zip is another zip file within the factory image zip. This zip contains all the other image files, i.e. system, modem, etc.
Click to expand...
Click to collapse
And it also contains rawprogram_unsparse.xml or something similar with all partitions listed?
Also, I have a pixel 3 and there is no aboot partition.
Click to expand...
Click to collapse
I haven't used a device so far with A/B partitioning scheme, so I'm not sure what nomenclature they use for partitions but I think abl_* is the application bootloader.
The kernel and recovery images are also both contained in the boot.img.
Click to expand...
Click to collapse
Yes. There is no recovery partition with A/B scheme.
mirfatif said:
And it also contains rawprogram_unsparse.xml or something similar with all partitions listed?
I haven't used a device so far with A/B partitioning scheme, so I'm not sure what nomenclature they use for partitions but I think abl_* is the application bootloader.
Yes. There is no recovery partition with A/B scheme.
Click to expand...
Click to collapse
There's nothing in the zip but image files. There's one text file but it just checks for latest bootloader. There's an image, xbl_config.img. I'm not sure what that does.
Sent from my [device_name] using XDA-Developers Legacy app
jd1639 said:
There's nothing in the zip but image files. There's one text file but it just checks for latest bootloader. There's an image, xbl_config.img. I'm not sure what that does.
Click to expand...
Click to collapse
Actaully rawprogram_unsparse.xml or similar files are used by Factory Flashers such as in Download Mode or ODIN etc. If the device is booted up to the stage of application bootloader (aboot), enough detail of partitions on eMMC is already loaded, including partition names (or labels) that are assigned at the time of creating GUID partition table (GPT). When we execute fastboot update xyz.zip, it flashes all images one by one very similar to fastboot flash boot boot.img, fastboot flash system system.img and so on. Here boot and system are partition names (part_name) while boot.img and system.img are image files (img_name) that should be found in OTA update zip file. Which image file is to be written to which partition is hard-coded in fastboot command's source code:
Code:
static struct {
const char* nickname;
const char* img_name;
const char* sig_name;
const char* part_name;
bool is_optional;
bool is_secondary;
} images[] = {
{ "boot", "boot.img", "boot.sig", "boot", false, false },
{ "system", "system.img", "system.sig", "system", false, false },
...
...
}
mirfatif said:
Actaully rawprogram_unsparse.xml or similar files are used by Factory Flashers such as in Download Mode or ODIN etc. If the device is booted up to the stage of application bootloader (aboot), enough detail of partitions on eMMC is already loaded, including partition names (or labels) that are assigned at the time of creating GUID partition table (GPT). When we execute fastboot update xyz.zip, it flashes all images one by one very similar to fastboot flash boot boot.img, fastboot flash system system.img and so on. Here boot and system are partition names (part_name) while boot.img and system.img are image files (img_name) that should be found in OTA update zip file. Which image file is to be written to which partition is hard-coded in fastboot command's source code:
Code:
static struct {
const char* nickname;
const char* img_name;
const char* sig_name;
const char* part_name;
bool is_optional;
bool is_secondary;
} images[] = {
{ "boot", "boot.img", "boot.sig", "boot", false, false },
{ "system", "system.img", "system.sig", "system", false, false },
...
...
}
Click to expand...
Click to collapse
This is great, especially the source code. It tells me a lot. I learned something new for the day!
how to use unlock oem command when no Volume button is available on car GPS T98 10 inches UNIT.?

What is blankflash?

What is a blankflash file? I have seen people requesting blankflash file for their phones...
Does it help to recover device from bootloop/brick?
A good question.
I see a lot of people glibly saying, "Oh, you have to blankflash first".
I don't know and I have a suspicion that the people who use it don't know either.
I can go to EDL mode (on Qualcomm processors) and wipe every byte in flash to zero (0x00).
Presumably this mystic "blankflash" is something more.
Maybe it's some OEM enforced stupidity where it wipes everything then puts in a signature to say, "No, really, I'm erased".
So, to answer my own question:
Blankflash is a Motorola invention of throwing a bunch of partitions into a tar archive.
You can list it/extract it using 7zip or other utilities.
It's tar-"like", but not tar. Packed inside is:
Code:
programmer
gpt
aboot
rpm
tz
devcfg
cmnlib
cmnlib64
keymaster
prov
sbl1
This is the absolute minimum you need to flash to get fastboot running from aboot.
All of these (except the GPT) are either 32 or 64 bit ELF files with Qualcomm signing.
See: http://www.temblast.com/qcomview.htm
Note, none of this precludes you from using any EDL client to just write all your partitions

Firmware Flash Guide.

Hello, ALOT of people have been having tons of errors from wrong commands lying on the internet. I made a guide to fix that. Hope it works :highfive:
I am not responsible for any bricks but will help for a solution
You Must have your bootloader unlocked.
Android 10: use this link for retail firmware, will work on all device channels excluding AMX. beware.
https://mirrors.lolinet.com/firmwar...ubsidy-DEFAULT_regulatory-DEFAULT_CFC.xml.zip
After downloaded, unzip, open the folder containing all of the files and open powershell or cmd promt window here (shift + right click)
After that use
adb devices
Click to expand...
Click to collapse
to check and make sure your device is recognized. Use these commands after that.
fastboot --set-active=a
fastboot getvar max-sparse-size
fastboot oem fb_mode_set
fastboot flash partition gpt.bin
fastboot flash bootloader bootloader.img
fastboot flash vbmeta_a vbmeta.img
fastboot flash vbmeta_b vbmeta.img
fastboot flash modem_a NON-HLOS.bin
fastboot flash modem_b NON-HLOS.bin
fastboot flash fsg_a fsg.mbn
fastboot flash fsg_b fsg.mbn
fastboot erase modemst1
fastboot erase modemst2
fastboot flash bluetooth_a BTFM.bin
fastboot flash bluetooth_b BTFM.bin
fastboot flash dsp_a dspso.bin
fastboot flash dsp_b dspso.bin
fastboot flash logo_a logo.bin
fastboot flash logo_b logo.bin
fastboot flash boot_a boot.img
fastboot flash boot_b boot.img
fastboot flash dtbo_a dtbo.img
fastboot flash dtbo_b dtbo.img
fastboot flash system_a system.img_sparsechunk.0
fastboot flash system_a system.img_sparsechunk.1
fastboot flash system_a system.img_sparsechunk.2
fastboot flash system_a system.img_sparsechunk.3
fastboot flash system_a system.img_sparsechunk.4
fastboot flash system_a system.img_sparsechunk.5
fastboot flash system_b system_b.img_sparsechunk.0
fastboot flash system_b system_b.img_sparsechunk.1
fastboot flash oem_a oem.img
fastboot flash oem_b oem_other.img
fastboot flash vendor_a vendor.img_sparsechunk.0
fastboot flash vendor_a vendor.img_sparsechunk.1 fastboot flash vendor_b vendor.img_sparsechunk.0 fastboot flash vendor_b vendor.img_sparsechunk.1 fastboot erase carrier
fastboot erase userdata
fastboot erase ddr
fastboot oem fb_mode_clear
fastboot reboot
Click to expand...
Click to collapse
Android 9: Please don't use android 9.
A quick just so you know. TWRP doesn't boot on Android 10. a fix for that is coming soon.
WARNING: DO NOT DOWNGRADE FIRMWARE/ANDROID VERSIONS. IT WILL BRICK YOUR DEVICE!
Good luck all
Hi, for amx devices. How it Will work?
My code Is: amxpe.
I bought in operator from Peru. . I install android 10 soak test AND then pone started having problems with WiFi and I downgrade to android 9. And now its softbricked. I install some android 10 zip from lolinet but its stuck. I have bootloops or initial error message. Please any help
Jidnet said:
Hi, for amx devices. How it Will work?
My code Is: amxpe.
I bought in operator from Peru. . I install android 10 soak test AND then pone started having problems with WiFi and I downgrade to android 9. And now its softbricked. I install some android 10 zip from lolinet but its stuck. I have bootloops or initial error message. Please any help
Click to expand...
Click to collapse
I said in the warning don't install this specific firmware on AMX. I also said don't downgrade, wtf.
@SnowTalker these commands are not working for people same. They are also posing issues for certain users. Like i hard bricked with these commands. Stop posting half-baked stuff! harcd brick.
methuselah said:
@SnowTalker these commands are not working for people same. They are also posing issues for certain users. Like i hard bricked with these commands. Stop posting half-baked stuff! harcd brick.
Click to expand...
Click to collapse
These commands work only fro android 10 firmware and with a unlocked bootloader. I've tested them already they work.
SnowTalker said:
These commands work only fro android 10 firmware and with a unlocked bootloader. I've tested them already they work.
Click to expand...
Click to collapse
lol then again, probably i have also tried them for android 10! And then still it caused hard brick in my device case
methuselah said:
lol then again, probably i have also tried them for android 10! And then still it caused hard brick in my device case
Click to expand...
Click to collapse
What device channel.
I tested your codes in my phone : amxpe, and it works well , I recieve a message at the benning but i think is not main problem , phone now works. thanks I hope you can improve the codes
SnowTalker said:
Hello, ALOT of people have been having tons of errors from wrong commands lying on the internet.
Click to expand...
Click to collapse
The easiest way to fix the problems caused by wrong flash commands is not to post any command.
As you can see nobody cares about your warnings. But later you are the one to blame for it.
Even if you write "your device will self-destruct after using the commands", would they use them anyway.
Always refer to the flashfile.xml
Just a heads-up for anyone with the XT2019-1 version. I just successfully flashed the RETEU
https://mirrors.lolinet.com/firmwar...ubsidy-DEFAULT_regulatory-DEFAULT_CFC.xml.zip
version of Android 10 using my FlashAllPartitions.bat based on flashfile.xml
[url]https://drive.google.com/file/d/1nGl1saSSJEZkCLAucU8RHVNuFQFamP1C/view?usp=sharing
Working great.
WoKoschekk said:
The easiest way to fix the problems caused by wrong flash commands is not to post any command.
As you can see nobody cares about your warnings. But later you are the one to blame for it.
Even if you write "your device will self-destruct after using the commands", would they use them anyway.
Always refer to the flashfile.xml
Click to expand...
Click to collapse
xda has changed a lot. Now anyone with half baked info just comes here and paste something and people tries it and brick their devices. I also used these commands and had flashed ROM which snowy has posted here, even that guy didn't replied afterwards lol when i said my device is hard bricked. So just wait and see what vache says. its horrible to do stuff with this device without proper info.
i guess these threads are nothing more than thanks meter increasing stuff.
methuselah said:
xda has changed a lot. Now anyone with half baked info just comes here and paste something and people tries it and brick their devices. I also used these commands and had flashed rom which snowy has posted here, even that guy didn't replied afterwards lol when i said my device is hard bricked. So just wait and see what vache says. Its horrible to do stuff with this device without proper info.
i guess these threads are nothing more than thanks meter increasing stuff.
Click to expand...
Click to collapse
i said what is your device channel!
methuselah said:
xda has changed a lot. Now anyone with half baked info just comes here and paste something and people tries it and brick their devices. I also used these commands and had flashed ROM which snowy has posted here, even that guy didn't replied afterwards lol when i said my device is hard bricked. So just wait and see what vache says. its horrible to do stuff with this device without proper info.
i guess these threads are nothing more than thanks meter increasing stuff.
Click to expand...
Click to collapse
And when did I once ask for a thanks on this post?
SnowTalker said:
And when did I once ask for a thanks on this post?
Click to expand...
Click to collapse
I do understand the intention of your first post. But you made the same mistake as other users made. Let me explain why.
All firmware .zips for Moto devices on mirrors.lolinet.com or Telegram groups were originally downloaded from Motorola's cloud servers. They are designed to be installed with the manufacturer's flash tools (e.g. LMSA). These tools use the .xml files (flashfile and service) to execute the flash commands that are needed to install the firmware images.
So that means this is Motorola's recommended way to flash your device.
1. By flashing the complete firmware (start with gpt.bin, the GUID partition table) your device switches automatically to slot A. I would like to explain you why but I don't know it exactly.
Since fastboot always uses the active slot, there's no need to specify slot A within your commands. It's not wrong or would mess up sth, but it's not needed.
2. Just because there's a corresponding partition on slot B you don't need to flash all images on A and B. Only images named like '*_other.img' are intended for this.
You also ignored the bootloader in this context. The bootloader consists of several partitions which are also devided in A and B (example Moto G6 Plus)
mmcblk0p1 -> xbl_a
mmcblk0p2 -> xbl_b
mmcblk0p3 -> tz_a
mmcblk0p4 -> tz_b
mmcblk0p5 -> rpm_a
mmcblk0p6 -> rpm_b
mmcblk0p7 -> hyp_a
mmcblk0p8 -> hyp_b
mmcblk0p9 -> devcfg_a
mmcblk0p10 -> devcfg_b
mmcblk0p11 -> pmic_a
mmcblk0p12 -> pmic_b
mmcblk0p13 -> abl_a
mmcblk0p14 -> abl_b
mmcblk0p15 -> cmnlib_a
mmcblk0p16 -> cmnlib64_a
mmcblk0p17 -> cmnlib_b
mmcblk0p18 -> cmnlib64_b
mmcblk0p19 -> keymaster_a
mmcblk0p20 -> keymaster_b
mmcblk0p21 -> storsec_a
mmcblk0p22 -> storsec_b
mmcblk0p23 -> prov_a
mmcblk0p24 -> prov_b
The bootloader.img is structured like the firmware .zip. It contains all the images which define the 'bootloader' and it also contains the commands to flash the images. You'll find them in the header.
<flash partition="xbl" filename="xbl.elf"/>
<flash partition="prov" filename="prov64.mbn"/>
<flash partition="cmnlib" filename="cmnlib.mbn"/>
<flash partition="cmnlib64" filename="cmnlib64.mbn"/>
<flash partition="abl" filename="abl.elf"/>
<flash partition="keymaster" filename="keymaster.mbn"/>
<flash partition="storsec" filename="storsec.mbn"/>
<flash partition="rpm" filename="rpm.mbn"/>
<flash partition="pmic" filename="pmic.elf"/>
<flash partition="hyp" filename="hyp.mbn"/>
<flash partition="tz" filename="tz.mbn"/>
<flash partition="devcfg" filename="devcfg.mbn"/>
I don't know if it's possible to use 'fastboot flash bootloader_b ...' at all.
You should understand that every image of the .zip only needs to be flashed once to the correct partition. So it doesn't make sense to post or use other's flash commands. Which commands need to be used depends on which images you want to flash. This defines the correct flash commands for you.
WoKoschekk said:
I do understand the intention of your first post. But you made the same mistake as other users made. Let me explain why.
All firmware .zips for Moto devices on mirrors.lolinet.com or Telegram groups were originally downloaded from Motorola's cloud servers. They are designed to be installed with the manufacturer's flash tools (e.g. LMSA). These tools use the .xml files (flashfile and service) to execute the flash commands that are needed to install the firmware images.
So that means this is Motorola's recommended way to flash your device.
1. By flashing the complete firmware (start with gpt.bin, the GUID partition table) your device switches automatically to slot A. I would like to explain you why but I don't know it exactly.
Since fastboot always uses the active slot, there's no need to specify slot A within your commands. It's not wrong or would mess up sth, but it's not needed.
2. Just because there's a corresponding partition on slot B you don't need to flash all images on A and B. Only images named like '*_other.img' are intended for this.
You also ignored the bootloader in this context. The bootloader consists of several partitions which are also devided in A and B (example Moto G6 Plus)
mmcblk0p1 -> xbl_a
mmcblk0p2 -> xbl_b
mmcblk0p3 -> tz_a
mmcblk0p4 -> tz_b
mmcblk0p5 -> rpm_a
mmcblk0p6 -> rpm_b
mmcblk0p7 -> hyp_a
mmcblk0p8 -> hyp_b
mmcblk0p9 -> devcfg_a
mmcblk0p10 -> devcfg_b
mmcblk0p11 -> pmic_a
mmcblk0p12 -> pmic_b
mmcblk0p13 -> abl_a
mmcblk0p14 -> abl_b
mmcblk0p15 -> cmnlib_a
mmcblk0p16 -> cmnlib64_a
mmcblk0p17 -> cmnlib_b
mmcblk0p18 -> cmnlib64_b
mmcblk0p19 -> keymaster_a
mmcblk0p20 -> keymaster_b
mmcblk0p21 -> storsec_a
mmcblk0p22 -> storsec_b
mmcblk0p23 -> prov_a
mmcblk0p24 -> prov_b
The bootloader.img is structured like the firmware .zip. It contains all the images which define the 'bootloader' and it also contains the commands to flash the images. You'll find them in the header.
<flash partition="xbl" filename="xbl.elf"/>
<flash partition="prov" filename="prov64.mbn"/>
<flash partition="cmnlib" filename="cmnlib.mbn"/>
<flash partition="cmnlib64" filename="cmnlib64.mbn"/>
<flash partition="abl" filename="abl.elf"/>
<flash partition="keymaster" filename="keymaster.mbn"/>
<flash partition="storsec" filename="storsec.mbn"/>
<flash partition="rpm" filename="rpm.mbn"/>
<flash partition="pmic" filename="pmic.elf"/>
<flash partition="hyp" filename="hyp.mbn"/>
<flash partition="tz" filename="tz.mbn"/>
<flash partition="devcfg" filename="devcfg.mbn"/>
I don't know if it's possible to use 'fastboot flash bootloader_b ...' at all.
You should understand that every image of the .zip only needs to be flashed once to the correct partition. So it doesn't make sense to post or use other's flash commands. Which commands need to be used depends on which images you want to flash. This defines the correct flash commands for you.
Click to expand...
Click to collapse
The thing is I have no intention of just jumping inside the threads. Whenever I read the things that i did wrong and the half baked stuff what comes from unreliable sources, I just try people not to make same mistakes that i did.
methuselah said:
The thing is I have no intention of just jumping inside the threads. Whenever I read the things that i did wrong and the half baked stuff what comes from unreliable sources, I just try people not to make same mistakes that i did.
Click to expand...
Click to collapse
ok sir. Whatever you say
Thanks Lollyjay, works a treat & got me out of trouble.

[TOOL] Oppo/Realme Flash .OFP File on Bootloader

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
A tool to flash .ofp files in bootloader mode without needing MSM Tool, an alternative to official realme tool.
THE DEVICE MUST HAVE THE BOOTLOADER UNLOCKED​Features​
soft unbrick
install stock firmware
switch device region
Credits​
italorecife
bkerler oppo_decrypt
All contributors
Installation​Install​Linux (in the example below I will use ubuntu)​Install adb & fastboot and simg2img​
Code:
sudo apt-get install android-tools-adb android-tools-fastboot simg2img
Install python >=3.8, git and other deps​
Code:
sudo apt install python3 git python3-pip
Grab files​
Code:
git clone https://github.com/italorecife/OppoRealme-OFP-Flash
cd OppoRealme-OFP-Flash
pip3 install -r requirements.txt
Windows​Install the adb & fastboot drivers.
Install python + git​
Install python 3.9 and git
WIN+R
Code:
cmd
Grab files and install​
Code:
git clone https://github.com/italorecife/OppoRealme-OFP-Flash
cd OppoRealme-OFP-Flash
pip3 install -r requirements.txt
Usage​Put the .ofp file in the same folder as the program, then put your device in mode fastboot to start flash.
Run:
Code:
python3 flash.py
if you have windows OS you can run normally by double clicking, and you have linux use terminal.
DOWNLOAD
Source Code​
Searching for .ofp files
File found: RMX2151export_11_C.16_2022021018190000.ofp
Traceback (most recent call last):
File "C:\Users\cumbr\OppoRealme-OFP-Flash\flash.py", line 515, in <module>
main()
File "C:\Users\cumbr\OppoRealme-OFP-Flash\flash.py", line 316, in main
pagesize,key,iv,data=generatekey(ofpfile)
File "C:\Users\cumbr\OppoRealme-OFP-Flash\flash.py", line 109, in generatekey
pagesize,data=extract_xml(filename,key,iv)
File "C:\Users\cumbr\OppoRealme-OFP-Flash\flash.py", line 127, in extract_xml
offset=unpack("<I",rf.read(4))[0]*pagesize
struct.error: unpack requires a buffer of 4 bytes
[proceso terminado con el código 1]
Trying to flash fastboot mode, stock ROM, Realme 7.
Dude are you sure this tool works on all devices, I mean In my Realme 6 pro it seems to be doesnt work. I can help you with testing if you willing it fix it, You can PM on Teleram @neel0210
and good work btw if this works for realme the way it shows then it will be very helpful to others
Trying to flash realme 5i. It doesn't work. It says it's done flashing as soon as you press the button.
Code:
[[email protected] OppoRealme-OFP-Flash]$ python3 flash.py
Oppo/Realme Flash .OFP File on Bootloader | 1.0 (c) 2022 | Italo Almeida (@SirCDA) - GPL-3.0 License
Usage: Put the .ofp file in the same folder as the program,
then put your device in mode fastboot to start flash.
Note: if your device was not recognized in fastboot
mode by the computer, try to install the adb drivers.
=======================
Searching for .ofp files
File found: RMX2030EX_11_C.65_210223_6a6318eb.ofp
OK: Ofp Compatible
>> Can keep some partitions without changing <<
0 - Start Flash
1 - USERDATA(app, settings, internal memory) | STATUS: NEW
2 - BOOT | STATUS: NEW
3 - RECOVERY | STATUS: NEW
Choose to toggle status or start flash: 0
=================DISCLAIMER=================
We are not responsible for bricked devices, dead SD cards,
thermonuclear war, or you getting fired because the alarm app failed. Please
do some research if you have any concerns about features included in this ROM
before flashing it! YOU are choosing to make these modifications, and if
you point the finger at us for messing up your device, we will laugh at you.
=================DISCLAIMER=================
1 - I understand and wish to continue
0 - Exit
Choice: 1
>> Waiting for device in fastboot mode to start <<
OK: Device unlocked
Starting process....
Note: this may take a while, it will make some popcorn for now.
Done. ofp file flashed with success!
Press Enter to continue...
worked perfectly, however due to persist.img that ofp have, acceleronometer, proximity and gyro are dead and unuseable. but hey, it recovers my phone
Device: RMX1971 (Realme 5 Pro)
UI Version: F03 (based on Android 11)
SubwayChamp said:
Searching for .ofp files
File found: RMX2151export_11_C.16_2022021018190000.ofp
Traceback (most recent call last):
File "C:\Users\cumbr\OppoRealme-OFP-Flash\flash.py", line 515, in <module>
main()
File "C:\Users\cumbr\OppoRealme-OFP-Flash\flash.py", line 316, in main
pagesize,key,iv,data=generatekey(ofpfile)
File "C:\Users\cumbr\OppoRealme-OFP-Flash\flash.py", line 109, in generatekey
pagesize,data=extract_xml(filename,key,iv)
File "C:\Users\cumbr\OppoRealme-OFP-Flash\flash.py", line 127, in extract_xml
offset=unpack("<I",rf.read(4))[0]*pagesize
struct.error: unpack requires a buffer of 4 bytes
[proceso terminado con el código 1]
Trying to flash fastboot mode, stock ROM, Realme 7.
Click to expand...
Click to collapse
try again, i have this error earlier but its fixed now
gianonceu said:
try again, i have this error earlier but its fixed now
Click to expand...
Click to collapse
I didn't try it in Linux but in Windows still the same error, my folder looks like this, if I grab the files through git, the exe file is not present, but if I download the zip, running the exe file is the same.
SubwayChamp said:
I didn't try it in Linux but in Windows still the same error, my folder looks like this, if I grab the files through git, the exe file is not present, but if I download the zip, running the exe file is the same.
View attachment 5574235
Click to expand...
Click to collapse
i also use in windows, but it flashed after 2nd time
can anyone save my phone i went to flash ofp file using this tool for my realme gt 2 pro and after the flash is complete i try to restart my phone but it's in total black screen and no responses no matter what button i try to press (fastboot and recovery mode not working too). I've try to plug in to my PC to check if there's any Qualcomm driver detected in case it's hard bricked but it's not able to detect. I've installed the Qualcomm HS-USB QDLoader 9008 Driver on my PC too. now my phone just can't power up. Can any kind soul help me out thanks
kskan24 said:
can anyone save my phone i went to flash ofp file using this tool for my realme gt 2 pro and after the flash is complete i try to restart my phone but it's in total black screen and no responses no matter what button i try to press (fastboot and recovery mode not working too). I've try to plug in to my PC to check if there's any Qualcomm driver detected in case it's hard bricked but it's not able to detect. I've installed the Qualcomm HS-USB QDLoader 9008 Driver on my PC too. now my phone just can't power up. Can any kind soul help me out thanks
Click to expand...
Click to collapse
It could be a kernel panic, so firstly, you should try the commands (no matter screen is off) either, pretending the device is in ADB or fastboot mode.
If none of them is really available, and you have the bootloader unlocked, you should try to boot to EDL using a combination button, in some devices work pressing both volume buttons at the same time you connect to PC.
If still doesn't work, then you have to make your way opening the back cover and doing a test point, to flash it through some Qualcomm flasher tool.
SubwayChamp said:
Pesquisando arquivos .ofp
Arquivo encontrado: RMX2151export_11_C.16_2022021018190000.ofp
Traceback (última chamada mais recente):
Arquivo "C:\Users\cumbr\OppoRealme-OFP-Flash\flash.py", linha 515, em <module>
a Principal()
Arquivo "C:\Users\cumbr\OppoRealme-OFP-Flash\flash.py", linha 316, em main
pagesize,key,iv,data=generatekey(ofpfile)
Arquivo "C:\Users\cumbr\OppoRealme-OFP-Flash\flash.py", linha 109, em generatekey
pagesize,data=extract_xml(nome do arquivo,chave,iv)
Arquivo "C:\Users\cumbr\OppoRealme-OFP-Flash\flash.py", linha 127, em extract_xml
offset=unpack("<I",rf.read(4))[0]*pagesize
struct.error: unpack requer um buffer de 4 bytes
[processo finalizado com o código 1]
Tentando flashear o modo fastboot, ROM de estoque, Realme 7.
Click to expand...
Click to collapse
Need 64bits pc
SrCDA said:
Need 64bits pc
Click to expand...
Click to collapse
Thanks, I already have a 64 bits PC, tried both on my dual (triple) boot, Windows 11, Zorin and Ubuntu Budgie.
Not working on realme5i. Notifies success without even flashing.
>> Waiting for device in fastboot mode to start <<
OK: Device unlocked
Starting process....
Note: this may take a while, it will make some popcorn for now.
Done. ofp file flashed with success!
Press Enter to continue...
Today I have flashed downgraded version firmware to realme 7 pro, it completed successfully. Everything works well until I decide to upgrade latest version of realme UI. I flashed new ofp file with this tool, it said successfully completed. When I restart one, it never start again. Volume Up Down, Power, none of them works. I also connect phone to pc, nothing detects on com ports. Is there any way to solve problem on home? I can not find way to enter EDL mod.
My log:
Markdown (GitHub flavored):
Searching for .ofp files
File found: RMX2170export_11_C.22_2022030317200000.ofp
OK: Ofp Compatible
Region: BD
>> Can keep some partitions without changing <<
0 - Start Flash
1 - USERDATA(app, settings, internal memory) | STATUS: NEW
2 - BOOT | STATUS: NEW
3 - RECOVERY | STATUS: NEW
Choose to toggle status or start flash: 0
=================DISCLAIMER=================
We are not responsible for bricked devices, dead SD cards,
thermonuclear war, or you getting fired because the alarm app failed. Please
do some research if you have any concerns about features included in this ROM
before flashing it! YOU are choosing to make these modifications, and if
you point the finger at us for messing up your device, we will laugh at you.
=================DISCLAIMER=================
1 - I understand and wish to continue
0 - Exit
Choice: 1
>> Waiting for device in fastboot mode to start <<
OK: Device unlocked
Starting process....
Note: this may take a while, it will make some popcorn for now.
EXTRACTING: persist
FLASHING: persist
FLASH SUCCESS!
EXTRACTING: cache
FLASHING: cache
FLASH FAILED!
EXTRACTING: recovery
FLASHING: recovery
FLASH SUCCESS!
EXTRACTING: vbmeta_system
FLASHING: vbmeta_system
FLASH SUCCESS!
EXTRACTING: vbmeta_vendor
FLASHING: vbmeta_vendor
FLASH SUCCESS!
EXTRACTING: metadata
FLASHING: metadata
FLASH SUCCESS!
EXTRACTING: userdata
FLASHING: userdata
FLASH SUCCESS!
EXTRACTING: xbl
FLASHING: xbl
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: xbl_config
FLASHING: xbl_config
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: tz
FLASHING: tz
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: hyp
FLASHING: hyp
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: bluetooth
FLASHING: bluetooth
FLASH SUCCESS!
EXTRACTING: abl
FLASHING: abl
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: dsp
FLASHING: dsp
FLASH SUCCESS!
EXTRACTING: keymaster
FLASHING: keymaster
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: boot
FLASHING: boot
FLASH FAILED!
EXTRACTING: devcfg
FLASHING: devcfg
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: qupfw
FLASHING: qupfw
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: vbmeta
FLASHING: vbmeta
FLASH SUCCESS!
EXTRACTING: dtbo
FLASHING: dtbo
FLASH SUCCESS!
EXTRACTING: imagefv
FLASHING: imagefv
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: uefisecapp
FLASHING: uefisecapp
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: featenabler
FLASHING: featenabler
FLASH SUCCESS!
EXTRACTING: apdp
FLASHING: apdp
FLASH SUCCESS!
EXTRACTING: splash
FLASHING: splash
FLASH SUCCESS!
EXTRACTING: logfs
FLASHING: logfs
FLASH SUCCESS!
EXTRACTING: storsec
FLASHING: storsec
FLASH SUCCESS!
EXTRACTING: secdata
FLASHING: secdata
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: oppo_sec
FLASHING: oppo_sec
FLASH SUCCESS!
EXTRACTING: opporeserve2
FLASHING: opporeserve2
FLASH FAILED!
EXTRACTING: DRIVER
FLASHING: DRIVER
FLASH SUCCESS!
EXTRACTING: super
FLASHING: super
FLASH FAILED!
Done. ofp file flashed with success!
Press Enter to continue...
nobat said:
Today I have flashed downgraded version firmware to realme 7 pro, it completed successfully. Everything works well until I decide to upgrade latest version of realme UI. I flashed new ofp file with this tool, it said successfully completed. When I restart one, it never start again. Volume Up Down, Power, none of them works. I also connect phone to pc, nothing detects on com ports. Is there any way to solve problem on home? I can not find way to enter EDL mod.
My log:
Markdown (GitHub flavored):
Searching for .ofp files
File found: RMX2170export_11_C.22_2022030317200000.ofp
OK: Ofp Compatible
Region: BD
>> Can keep some partitions without changing <<
0 - Start Flash
1 - USERDATA(app, settings, internal memory) | STATUS: NEW
2 - BOOT | STATUS: NEW
3 - RECOVERY | STATUS: NEW
Choose to toggle status or start flash: 0
=================DISCLAIMER=================
We are not responsible for bricked devices, dead SD cards,
thermonuclear war, or you getting fired because the alarm app failed. Please
do some research if you have any concerns about features included in this ROM
before flashing it! YOU are choosing to make these modifications, and if
you point the finger at us for messing up your device, we will laugh at you.
=================DISCLAIMER=================
1 - I understand and wish to continue
0 - Exit
Choice: 1
>> Waiting for device in fastboot mode to start <<
OK: Device unlocked
Starting process....
Note: this may take a while, it will make some popcorn for now.
EXTRACTING: persist
FLASHING: persist
FLASH SUCCESS!
EXTRACTING: cache
FLASHING: cache
FLASH FAILED!
EXTRACTING: recovery
FLASHING: recovery
FLASH SUCCESS!
EXTRACTING: vbmeta_system
FLASHING: vbmeta_system
FLASH SUCCESS!
EXTRACTING: vbmeta_vendor
FLASHING: vbmeta_vendor
FLASH SUCCESS!
EXTRACTING: metadata
FLASHING: metadata
FLASH SUCCESS!
EXTRACTING: userdata
FLASHING: userdata
FLASH SUCCESS!
EXTRACTING: xbl
FLASHING: xbl
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: xbl_config
FLASHING: xbl_config
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: tz
FLASHING: tz
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: hyp
FLASHING: hyp
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: bluetooth
FLASHING: bluetooth
FLASH SUCCESS!
EXTRACTING: abl
FLASHING: abl
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: dsp
FLASHING: dsp
FLASH SUCCESS!
EXTRACTING: keymaster
FLASHING: keymaster
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: boot
FLASHING: boot
FLASH FAILED!
EXTRACTING: devcfg
FLASHING: devcfg
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: qupfw
FLASHING: qupfw
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: vbmeta
FLASHING: vbmeta
FLASH SUCCESS!
EXTRACTING: dtbo
FLASHING: dtbo
FLASH SUCCESS!
EXTRACTING: imagefv
FLASHING: imagefv
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: uefisecapp
FLASHING: uefisecapp
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: featenabler
FLASHING: featenabler
FLASH SUCCESS!
EXTRACTING: apdp
FLASHING: apdp
FLASH SUCCESS!
EXTRACTING: splash
FLASHING: splash
FLASH SUCCESS!
EXTRACTING: logfs
FLASHING: logfs
FLASH SUCCESS!
EXTRACTING: storsec
FLASHING: storsec
FLASH SUCCESS!
EXTRACTING: secdata
FLASHING: secdata
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: oppo_sec
FLASHING: oppo_sec
FLASH SUCCESS!
EXTRACTING: opporeserve2
FLASHING: opporeserve2
FLASH FAILED!
EXTRACTING: DRIVER
FLASHING: DRIVER
FLASH SUCCESS!
EXTRACTING: super
FLASHING: super
FLASH FAILED!
Done. ofp file flashed with success!
Press Enter to continue..
[/QUOTE]
brother you should push the volume buttons while the devices is turned off and then plug the cable in, phone will be in edl mode but nothing will appear on screen. If this doesn't work, get the mct mtk bypass tool and select your mtk chipset on right-top, then click bypass and psuh volume buttons and plug the cable in. maybe one of these works. If still not, then you can search for libusb on google. I'll be around here
Click to expand...
Click to collapse
Does it erase all the data in phone?
I send my phone to service and they replaced motherboard, so all data removed . But I always backup my data, no problem.
nobat said:
Today I have flashed downgraded version firmware to realme 7 pro, it completed successfully. Everything works well until I decide to upgrade latest version of realme UI. I flashed new ofp file with this tool, it said successfully completed. When I restart one, it never start again. Volume Up Down, Power, none of them works. I also connect phone to pc, nothing detects on com ports. Is there any way to solve problem on home? I can not find way to enter EDL mod.
My log:
Markdown (GitHub flavored):
Searching for .ofp files
File found: RMX2170export_11_C.22_2022030317200000.ofp
OK: Ofp Compatible
Region: BD
>> Can keep some partitions without changing <<
0 - Start Flash
1 - USERDATA(app, settings, internal memory) | STATUS: NEW
2 - BOOT | STATUS: NEW
3 - RECOVERY | STATUS: NEW
Choose to toggle status or start flash: 0
=================DISCLAIMER=================
We are not responsible for bricked devices, dead SD cards,
thermonuclear war, or you getting fired because the alarm app failed. Please
do some research if you have any concerns about features included in this ROM
before flashing it! YOU are choosing to make these modifications, and if
you point the finger at us for messing up your device, we will laugh at you.
=================DISCLAIMER=================
1 - I understand and wish to continue
0 - Exit
Choice: 1
>> Waiting for device in fastboot mode to start <<
OK: Device unlocked
Starting process....
Note: this may take a while, it will make some popcorn for now.
EXTRACTING: persist
FLASHING: persist
FLASH SUCCESS!
EXTRACTING: cache
FLASHING: cache
FLASH FAILED!
EXTRACTING: recovery
FLASHING: recovery
FLASH SUCCESS!
EXTRACTING: vbmeta_system
FLASHING: vbmeta_system
FLASH SUCCESS!
EXTRACTING: vbmeta_vendor
FLASHING: vbmeta_vendor
FLASH SUCCESS!
EXTRACTING: metadata
FLASHING: metadata
FLASH SUCCESS!
EXTRACTING: userdata
FLASHING: userdata
FLASH SUCCESS!
EXTRACTING: xbl
FLASHING: xbl
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: xbl_config
FLASHING: xbl_config
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: tz
FLASHING: tz
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: hyp
FLASHING: hyp
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: bluetooth
FLASHING: bluetooth
FLASH SUCCESS!
EXTRACTING: abl
FLASHING: abl
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: dsp
FLASHING: dsp
FLASH SUCCESS!
EXTRACTING: keymaster
FLASHING: keymaster
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: boot
FLASHING: boot
FLASH FAILED!
EXTRACTING: devcfg
FLASHING: devcfg
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: qupfw
FLASHING: qupfw
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: vbmeta
FLASHING: vbmeta
FLASH SUCCESS!
EXTRACTING: dtbo
FLASHING: dtbo
FLASH SUCCESS!
EXTRACTING: imagefv
FLASHING: imagefv
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: uefisecapp
FLASHING: uefisecapp
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: featenabler
FLASHING: featenabler
FLASH SUCCESS!
EXTRACTING: apdp
FLASHING: apdp
FLASH SUCCESS!
EXTRACTING: splash
FLASHING: splash
FLASH SUCCESS!
EXTRACTING: logfs
FLASHING: logfs
FLASH SUCCESS!
EXTRACTING: storsec
FLASHING: storsec
FLASH SUCCESS!
EXTRACTING: secdata
FLASHING: secdata
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: oppo_sec
FLASHING: oppo_sec
FLASH SUCCESS!
EXTRACTING: opporeserve2
FLASHING: opporeserve2
FLASH FAILED!
EXTRACTING: DRIVER
FLASHING: DRIVER
FLASH SUCCESS!
EXTRACTING: super
FLASHING: super
FLASH FAILED!
Done. ofp file flashed with success!
Press Enter to continue...
Click to expand...
Click to collapse
Does anyone know why there's that "Changing this partition is not allowed for security reasons (Critical Partition)"?
maskalicz said:
Does anyone know why there's that "Changing this partition is not allowed for security reasons (Critical Partition)"?
Click to expand...
Click to collapse
This is in locked devices.
nobat said:
Today I have flashed downgraded version firmware to realme 7 pro, it completed successfully. Everything works well until I decide to upgrade latest version of realme UI. I flashed new ofp file with this tool, it said successfully completed. When I restart one, it never start again. Volume Up Down, Power, none of them works. I also connect phone to pc, nothing detects on com ports. Is there any way to solve problem on home? I can not find way to enter EDL mod.
My log:
Markdown (GitHub flavored):
Searching for .ofp files
File found: RMX2170export_11_C.22_2022030317200000.ofp
OK: Ofp Compatible
Region: BD
>> Can keep some partitions without changing <<
0 - Start Flash
1 - USERDATA(app, settings, internal memory) | STATUS: NEW
2 - BOOT | STATUS: NEW
3 - RECOVERY | STATUS: NEW
Choose to toggle status or start flash: 0
=================DISCLAIMER=================
We are not responsible for bricked devices, dead SD cards,
thermonuclear war, or you getting fired because the alarm app failed. Please
do some research if you have any concerns about features included in this ROM
before flashing it! YOU are choosing to make these modifications, and if
you point the finger at us for messing up your device, we will laugh at you.
=================DISCLAIMER=================
1 - I understand and wish to continue
0 - Exit
Choice: 1
>> Waiting for device in fastboot mode to start <<
OK: Device unlocked
Starting process....
Note: this may take a while, it will make some popcorn for now.
EXTRACTING: persist
FLASHING: persist
FLASH SUCCESS!
EXTRACTING: cache
FLASHING: cache
FLASH FAILED!
EXTRACTING: recovery
FLASHING: recovery
FLASH SUCCESS!
EXTRACTING: vbmeta_system
FLASHING: vbmeta_system
FLASH SUCCESS!
EXTRACTING: vbmeta_vendor
FLASHING: vbmeta_vendor
FLASH SUCCESS!
EXTRACTING: metadata
FLASHING: metadata
FLASH SUCCESS!
EXTRACTING: userdata
FLASHING: userdata
FLASH SUCCESS!
EXTRACTING: xbl
FLASHING: xbl
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: xbl_config
FLASHING: xbl_config
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: tz
FLASHING: tz
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: hyp
FLASHING: hyp
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: bluetooth
FLASHING: bluetooth
FLASH SUCCESS!
EXTRACTING: abl
FLASHING: abl
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: dsp
FLASHING: dsp
FLASH SUCCESS!
EXTRACTING: keymaster
FLASHING: keymaster
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: boot
FLASHING: boot
FLASH FAILED!
EXTRACTING: devcfg
FLASHING: devcfg
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: qupfw
FLASHING: qupfw
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: vbmeta
FLASHING: vbmeta
FLASH SUCCESS!
EXTRACTING: dtbo
FLASHING: dtbo
FLASH SUCCESS!
EXTRACTING: imagefv
FLASHING: imagefv
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: uefisecapp
FLASHING: uefisecapp
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: featenabler
FLASHING: featenabler
FLASH SUCCESS!
EXTRACTING: apdp
FLASHING: apdp
FLASH SUCCESS!
EXTRACTING: splash
FLASHING: splash
FLASH SUCCESS!
EXTRACTING: logfs
FLASHING: logfs
FLASH SUCCESS!
EXTRACTING: storsec
FLASHING: storsec
FLASH SUCCESS!
EXTRACTING: secdata
FLASHING: secdata
FLASH FAIL: Changing this partition is not allowed for security reasons (Critical Partition)
EXTRACTING: oppo_sec
FLASHING: oppo_sec
FLASH SUCCESS!
EXTRACTING: opporeserve2
FLASHING: opporeserve2
FLASH FAILED!
EXTRACTING: DRIVER
FLASHING: DRIVER
FLASH SUCCESS!
EXTRACTING: super
FLASHING: super
FLASH FAILED!
Done. ofp file flashed with success!
Press Enter to continue...
Click to expand...
Click to collapse
Do you have latest Realme7Pro RUI3 fw?
if yes send me

Categories

Resources