R825F Brazil 5.5 ota zip - Samsung Galaxy Watch

I have captured the ota zip file of R825FOWO1BTI8.
This zip file contains 5.5 tizen update with preinstalled samsung BP and ECG. I am not sure about sideloading update file to watch yet.
Updated my watch Brazilian firmware. Got 2 updates after that. My original csc XSA (OLB).
Samsung BP and ECG working.
Samsung Pay working.
https://mega.nz/file/zI0S0abK#E9IwvmanjmBXj3dLFadyk7MtrYPp8dcTIjwjfRveTw8

kazim.asghar said:
I have captured the ota zip file of R825FOWO1BTI8.
This zip file contains 5.5 tizen update with preinstalled samsung BP and ECG. I am not sure about sideloading update file to watch yet.
Updated my watch Brazilian firmware. Got 2 updates after that. My original csc XSA (OLB).
Samsung BP and ECG working.
Samsung Pay working.
https://mega.nz/file/zI0S0abK#E9IwvmanjmBXj3dLFadyk7MtrYPp8dcTIjwjfRveTw8
Click to expand...
Click to collapse
Thanks.Blood oxygen is in this firmware also...
Did your blood pressure synchronized with samsung health

dodo1515 said:
Thanks.Blood oxygen is in this firmware also...
Did your blood pressure synchronized with samsung health
Click to expand...
Click to collapse
No BP is not syncing maybe because SHM is modded.
How to check blood oxygen level?

kazim.asghar said:
No BP is not syncing maybe because SHM is modded.
How to check blood oxygen level?
Click to expand...
Click to collapse
Ok.still trying to understand how samsung is blocking the app wearable app or samsung health but it is here for sure..

My Plan for today...
It is Delta aka FOTA update related... for investigation/research... :cyclops:
I have only SM-R820... no LTE...
A
Downgrade from CTH8 DBT to BTF3 KOO
B
Use as Standalone... NO Phone...
Because I am toooo stupid to work with Phone... to catch FOTA package... on my not rooted SM-G920F
C
After FOTA file downloaded...
Plan to dump whle 4 GB eMMC. :angel:
Lets go...
Later more. :cyclops:
Best Regards
Edit 1.
Downgrade from CTH8 DBT to BTF3 successfull. :good:
Flashed all 3 files in netOdin...
Will just for fun check if BTF3 update in Standalone... DBT...
Edit 2.
As expected... FOTA update from BTF3 DBT...
Now I will flash my rooted BTF3 files for CSC change...
Edit 3.
Flashed successfully my rooted BTF3 in 2 rounds with netOdin...
Now enemenemu if I should change to KOO or XAR... hmmm... from DBT... hmmmmmmmmmmmmmmmmmmmm...
IMHO good idea to backup all files from CSA folder...
Edit 4.
Backup of all files from CSA partition for later analyse...
Code:
D:\SDB\SDB260>sdb root on
Switched to 'root' account mode
D:\SDB\SDB260>sdb pull /csa .\fota
pulled 00000000.authtokcont 100% 152 B
pulled skpm_FACTORY_OCF_ECC_P256 100% 1KB
pulled .mac.info 100% 20 B
pulled .bd_addr 100% 14 B
pulled .local_irk 100% 16 B
pulled sem_data 100% 42 B
pulled sem_sk.dat 100% 2KB
pulled ssp_data 100% 124 B
pulled csc-active-customer.inf 100% 3 B
pulled ecg_ac_test_5hz_zig 100% 17 B
pulled baro_cal_data 100% 1 B
pulled baro1_cal_data 100% 1 B
pulled hrm_eol_data 100% 149 B
pulled hrm_xtalk_data 100% 10 B
pulled ecg_ac_test_5hz_device 100% 11 B
pulled gyro_cal_data 100% 12 B
pulled wpa_supplicant.log.1 100% 256KB
pulled wpa_supplicant.log 100% 241KB
pulled dmesg.log.old 100% 395KB
pulled wd_log.old 100% 265KB
pulled wpa_supplicant.log.0 100% 256KB
pulled hostapd.log 100% 64KB
pulled wifi_mf.log 100% 22KB
pulled dmesg.log 100% 389KB
pulled wd_log 100% 124KB
pulled prodcode.dat 100% 14 B
pulled smsn.dat 100% 27 B
pulled serialno.dat 100% 11 B
pulled 00000000.authtokcont 100% 152 B
pulled battery_full_count 100% 4 B
pulled nad_data 100% 5 B
pulled hwver 100% 8 B
pulled default_bt_state 100% 1 B
pulled dfms_failhist_RDM 100% 43 B
pulled cal_date 100% 10 B
pulled default_wifi_state 100% 1 B
pulled battery_cycle 100% 4 B
pulled production_country 100% 4 B
pulled batt_cable_count 100% 3 B
pulled .nv_created 100% 0 B
pulled .ksb 100% 2 B
pulled mic_only_data 100% 15 B
pulled battery_cisd_data 100% 93 B
pulled dfms_conntest_backup 100% 2 B
pulled wpc_data 100% 5 B
pulled atd.log.old 100% 256KB
pulled hist_nv 100% 0 B
pulled fdata 100% 4 B
pulled .nv_ready 100% 0 B
pulled test_nv 100% 1KB
pulled motor_data 100% 17 B
pulled atd.log 100% 246KB
pulled default_nfc_state 100% 1 B
pulled dfms_failhist 100% 4 B
pulled earjack_count 100% 1 B
pulled echo_data 100% 8 B
pulled .imei_done 100% 1 B
pulled libdevkm.lock 100% 0 B
pulled issued.log 100% 294 B
pulled knox.dat 100% 3KB
pulled dcm.dat 100% 3KB
pulled .reset 100% 1 B
pulled dev_root.dat 100% 2KB
63 file(s) pulled. 0 file(s) skipped.
/csa 403 KB/s (2597847 bytes in 6.280s)
I made subfolder fota... this is why .\fota
Edit 5.
Skipped the pull part... because I have allready on my PC...
Push done:
Code:
D:\SDB\SDB260>sdb push csc-active-customer.inf /csa/csc/
pushed csc-active-customer.inf 100% 3 B
1 file(s) pushed. 0 file(s) skipped.
csc-active-customer.inf 0 KB/s (3 bytes in 0.200s)
D:\SDB\SDB260>sdb push prodcode.dat /csa/imei/
pushed prodcode.dat 100% 14 B
1 file(s) pushed. 0 file(s) skipped.
prodcode.dat 0 KB/s (14 bytes in 0.220s)
Now reboot... FUctory Reset...
I love to use the way over Recovery... in Reboot menu...
Edit 6.
Uuupsi... FOTA check with rooted Firmware...
But made mistake... now fighting with Korean language to connect SDB... i missed RSA... because stupid me placed into charger...
Edit 7.
Damn RSA... was forced to reboot to connect again...
IMHO I lost files from tmp folder...
Code:
D:\SDB\SDB260>sdb root on
Switched to 'root' account mode
D:\SDB\SDB260>sdb pull /tmp .\fota
pulled ttrace_tag 100% 8 B
error: failed to copy: '/tmp/keytone' is not a file
skipped: /tmp/keytone -> .\fota/keytone
pulled dbus_launch 100% 5 B
error: failed to copy: '/tmp/.ode_helper_server.socket' is not a file
skipped: /tmp/.ode_helper_server.socket -> .\fota/.ode_helper_server.socket
error: failed to copy: '/tmp/.knoxenrollmentservice-in.socket' is not a file
skipped: /tmp/.knoxenrollmentservice-in.socket -> .\fota/.knoxenrollmentservice-in.socket
error: failed to copy: '/tmp/.nfc-hce.sock' is not a file
skipped: /tmp/.nfc-hce.sock -> .\fota/.nfc-hce.sock
error: failed to copy: '/tmp/.ode_helper_server_secure.socket' is not a file
skipped: /tmp/.ode_helper_server_secure.socket -> .\fota/.ode_helper_server_secure.socket
error: failed to copy: '/tmp/.cert-server.socket' is not a file
skipped: /tmp/.cert-server.socket -> .\fota/.cert-server.socket
error: failed to copy: '/tmp/.central-key-manager-api-ocsp.sock' is not a file
skipped: /tmp/.central-key-manager-api-ocsp.sock -> .\fota/.central-key-manager-api-ocsp.sock
error: failed to copy: '/tmp/.csr-cs.socket' is not a file
skipped: /tmp/.csr-cs.socket -> .\fota/.csr-cs.socket
error: failed to copy: '/tmp/.central-key-manager-api-control.sock' is not a file
skipped: /tmp/.central-key-manager-api-control.sock -> .\fota/.central-key-manager-api-control.sock
error: failed to copy: '/tmp/.central-key-manager-api-storage.sock' is not a file
skipped: /tmp/.central-key-manager-api-storage.sock -> .\fota/.central-key-manager-api-storage.sock
error: failed to copy: '/tmp/.central-key-manager-api-encryption.sock' is not a file
skipped: /tmp/.central-key-manager-api-encryption.sock -> .\fota/.central-key-manager-api-encryption.sock
error: failed to copy: '/tmp/.csr-wp.socket' is not a file
skipped: /tmp/.csr-wp.socket -> .\fota/.csr-wp.socket
error: failed to copy: '/tmp/.device-policy-manager.sock' is not a file
skipped: /tmp/.device-policy-manager.sock -> .\fota/.device-policy-manager.sock
error: failed to copy: '/tmp/.download-provider.sock' is not a file
skipped: /tmp/.download-provider.sock -> .\fota/.download-provider.sock
error: failed to copy: '/tmp/.csr-admin.socket' is not a file
skipped: /tmp/.csr-admin.socket -> .\fota/.csr-admin.socket
pulled sm-cleanup-tmp-flag 100% 0 B
error: failed to copy: '/tmp/sn' is not a file
skipped: /tmp/sn -> .\fota/sn
error: failed to copy: '/tmp/ReactivationlockSocket' is not a file
skipped: /tmp/ReactivationlockSocket -> .\fota/ReactivationlockSocket
pulled .murphyd.pid 100% 4 B
pulled .sdbd.pid 100% 5 B
pulled .mobicore_ready 100% 0 B
pulled .muse-server.pid 100% 4 B
error: failed to copy: '/tmp/.ode.sock' is not a file
skipped: /tmp/.ode.sock -> .\fota/.ode.sock
pulled .muse_core.lock 100% 0 B
error: failed to copy: '/tmp/.muse_server_socket' is not a file
skipped: /tmp/.muse_server_socket -> .\fota/.muse_server_socket
error: failed to copy: '/tmp/.muse_server_data_socket' is not a file
skipped: /tmp/.muse_server_data_socket -> .\fota/.muse_server_data_socket
pulled .muse_server_ready 100% 0 B
pulled sdbd_initial_bt_setup 100% 1 B
error: failed to copy: '/tmp/sdbd_socket' is not a file
skipped: /tmp/sdbd_socket -> .\fota/sdbd_socket
pulled media-server 100% 15 B
error: failed to copy: '/tmp/.msgfw_socket' is not a file
skipped: /tmp/.msgfw_socket -> .\fota/.msgfw_socket
error: failed to copy: '/tmp/.pulse_debug' is not a file
skipped: /tmp/.pulse_debug -> .\fota/.pulse_debug
pulled .pa_ready 100% 0 B
error: failed to copy: '/tmp/.csr-popup.socket' is not a file
skipped: /tmp/.csr-popup.socket -> .\fota/.csr-popup.socket
error: failed to copy: '/tmp/.focus_server.socket' is not a file
skipped: /tmp/.focus_server.socket -> .\fota/.focus_server.socket
pulled .sound_server_ready 100% 0 B
pulled .focus_server_ready 100% 0 B
error: failed to copy: '/tmp/phlock' is not a file
skipped: /tmp/phlock -> .\fota/phlock
pulled .deviceBootCheck 100% 4 B
pulled at-spi-bus-launcher.log 100% 28 B
pulled shealth_pref_accessed 100% 1 B
pulled agent_fw_noti_omadm_fota_u 100% 12 B
error: failed to copy: '/tmp/agent_fw_event_omadm' is not a file
skipped: /tmp/agent_fw_event_omadm -> .\fota/agent_fw_event_omadm
pulled esd_ready 100% 0 B
pulled pressure_event.log 100% 120 B
pulled setting_service_bootup 100% 0 B
error: failed to copy: '/tmp/FOCUS.3604.1.wch' is not a file
skipped: /tmp/FOCUS.3604.1.wch -> .\fota/FOCUS.3604.1.wch
error: failed to copy: '/tmp/FOCUS.3604.1.wchr' is not a file
skipped: /tmp/FOCUS.3604.1.wchr -> .\fota/FOCUS.3604.1.wchr
pulled mm_session_3604 100% 4 B
pulled ip 100% 14 B
pulled proxy 100% 0 B
pulled config 100% 3 B
pulled status 100% 3 B
pulled 0_data-provider-master.2904 100% 52 B
27 file(s) pulled. 29 file(s) skipped.
/tmp 0 KB/s (283 bytes in 1.280s)
BTG1 Delta from BTF3 is on device...
Now I prepare to dump whole 4 GB eMMC.. to simplify the search for Delta...
Edit 8.
Seems to work to dump 4 GB eMMC with dd and netcat... but need 1 or 2 hours for final result over WiFi....
Edit 9.
Saw red ! in Korean...
IMHO still impossible to use heavy WiFi Action and Charger at same time... also on GWA2...
IMHO battery hot warning...
Edit 10.
Seems success... need to check with WinHex...
Faster dump as expected...
Code:
sh-3.2# dd if=/dev/mmcblk0 | /home/toybox-aarch64 netcat -6 0:0:0:0:0:myIP 1234
7634944+0 records in
7634944+0 records out
3909091328 bytes (3.9 GB) copied, 1184.56 s, 3.3 MB/s

If using FOTA update mechanism with Watch alone aka Standalone... WITHOUT Phone.
Then file(s) are stored in partition 18... aka User partition aka user.img
Code:
/data/fota
LTE maybe user partition somewhere else...
Hmmmm... maybe inject into user.img possible...
Hmmmmmmmmmmmmmmm... Question is how to set all flags to start FOTA...
Code:
/data/fota/download
delta.tar is here stored with weired Base64 encoded MD5 Hash... as it seems...
Logfiles + Direct Link to SServer... :angel:
Best Regards

adfree said:
If using FOTA update mechanism with Watch alone aka Standalone... WITHOUT Phone.
Then file(s) are stored in partition 18... aka User partition aka user.img
Code:
/data/fota
LTE maybe user partition somewhere else...
Hmmmm... maybe inject into user.img possible...
Hmmmmmmmmmmmmmmm... Question is how to set all flags to start FOTA...
Code:
/data/fota/download
delta.tar is here stored with weired Base64 encoded MD5 Hash... as it seems...
Logfiles + Direct Link to SServer... :angel:
Best Regards
Click to expand...
Click to collapse
I tried pushing OTA in /data/fota/download but it didn't work. I am trying to find way to use ota files to update watch.
I also tried the new way to capture firmware for phones but it didn't work for watch Firmwares.

@adfree hello you used your own rooted BTF3 firmware files for CSC change in gwa 2, 820,can you please share download link for it?

@adfree I also did detail analysis as much as I could of the csc dump you uploaded and the ota I got.
Samsung health monitor is not allowed to uninstall in firmware.
Code:
[csc packages]
count = 1
name_001 = "Samsung Health Monitor"
type_001 = "tpk"
description_001 = "path=/opt/system/csc/app/com_samsung_health_samd_bp.tpk:op=install:removable=false:disable=false"
Samsung health apk in ZTO also have Spo2 libraries. I found these lines but I dont know any thing about programming here.
Code:
tizen.org/system/model_name [%s] get_platform_str fail secspo2_api /sys/class/sensors/hrm_sensor/module AFE4920 AFE4930 SM-R820 SM-R825 SM-R830 SM-R835 Renaissance SM-R840 SM-R845 SM-R850 SM-R855 Noblesse [%s] fail
[%s] success
[%s] prj(%s) sen(%s) lib(%s) TD: %d
spo2_lib(%s), TD (%d), %d, %d(%.2f/%.2f(%d)), %d(%u/%.2f), %d(%d), [secspo2] %s,
__Initialize_SpO2_Algorithm_Parameters SpO2Algo_Deinit [%s] fail getModelName / %d secspo2_util [%s] read fail (%s) get_platform_str read_fs
Something in System_info_dm i found these interesting things
Code:
platform:tizen.org/feature/sensor.gyroscope.uncalibrated:bool TTTTTTTT
platform:tizen.org/feature/sensor.heart_rate_monitor.led_green:bool TTTTTTTT
platform:tizen.org/feature/sensor.heart_rate_monitor.led_ir:bool FFFFFFFF
I think we need a firmware dump with spo2 enabled so we can compare the differences.

Still no CTH8 nor CTI4 for netOdin... SM-R820... :crying:
I am old man... I can't wait soooooooooo long.
Plan for now....
A
Back to BTF3
B
Use my rooted BTF3 to prepare few things and undo ramdisk... so dd action...
To leave proper partitions for FOTA procedure...
C
then copy 2 files to eMMC
Code:
delta.tar
delta.ua
BTF3->BTG1... 11 MB
To have brick ehm result in short time...
D
If drunken enough and nothing forgotten...
Then I hope I can run:
Code:
fota_local_test.sh
E
Vodka...
Maybe also as first step.
Best Regards
Edit 1.
Need 3 files push to SM-R820...
Code:
sdb root on
sdb push ramdisk.img /tmp
sdb push delta.tar /opt/usr/media/
sdb push delta.ua /opt/usr/media/

Code:
sh-3.2# fota_local_test.sh
/opt/usr/media/delta.tar is exist
/opt/usr/media/delta.ua is exist
Setting fota update mode
method return time=1601698742.112388 sender=:1.6 -> destination=:1.187 serial=483 reply_serial=2
int32 0
This works so far...
I saw 2 times progress bar to 100 %...
Now I see funny red green yellow text...
Kernel Panic...
IMHO normal... will try to flash back RAMDISK with netOdin...
Edit 1.
Alive. :cyclops:
Flashed RAMDISK again with netOdin...
Repeated steps:
Code:
sdb root on
sdb push ramdisk.img /tmp
sdb shell dd if=/tmp/ramdisk.img of=/dev/mmcblk0p8
This time with RAMDISK from BTG1...
FOTA update to CTH8 running now...
ARGH...
This time I have no RAMDISK of CTH8...
So maybe will not try last step to CTI4...
Anyway.
If all correct done, then I have rooted Tizen 5.5 CTH8...
Without modifying the netOdin Files.... :silly:
Edit 2.
Tiny Panic, because in Korean Language tooo many text...
I was scared about incoming CTI4 FOTA....
So I changed CSC to DBT to better understand what I see and what I have to press... to avoid the last update... :cyclops:
Need some time, to backup... dump... etc... and prevent CTI4...
Best Regards

Less time...
Maybe later more...
Attached is Delta from SM-R820... from BTF3 to BTG1...
This is what I used to "jump" to rooted CTH8...
Maybe somebody can help me to "build" the RAMDISK...
Maybe then I can diffdingens CTH8 RAMDISK in this way...
Thanx in advance.
Best Regards

Lets do some research...
I am trying to share what I "know" about FOTA Delta... as example we can take the file from post
https://forum.xda-developers.com/showpost.php?p=83630995&postcount=12
A
Last "2 KB" in Delta TAR we can find Signature... Certs blabla...
Readable Text String:
Code:
signed by SignApk
We can ignore this...
B
Files inside... it is small update... so only few files. :good:
Code:
cm.bin
csc.img
delta.boot
delta.ramdisk1
delta.ramdisk2
delta.recovery
delta.ua
delta.upparam
rootfs.img
sboot.bin
unpack.sh
update.cfg
csc.img\CSC.txt
csc.img\CSC_attr.txt
csc.img\diff1_NaverMap.wgt_CSC.delta
csc.img\diff2_Spotify.tpk_CSC.delta
csc.img\diff3_TizenFontKaitiChina.wgt_CSC.delta
csc.img\diff4_com_samsung_health_samd_bp.tpk_CSC.delta
csc.img\diff5_SW_Configuration.xml_CSC.delta
rootfs.img\diff10_tizen-release_ROOTFS.delta
rootfs.img\diff11_slp-release.repo_ROOTFS.delta
rootfs.img\diff12_tizen-wearable-standard-snapshot.repo_ROOTFS.delta
rootfs.img\diff13_.restore_exception.list_ROOTFS.delta
rootfs.img\diff14_author-signature.xml_ROOTFS.delta
rootfs.img\diff15_add_viewer_wrap.edj_ROOTFS.delta
rootfs.img\diff16_apps_item.edj_ROOTFS.delta
rootfs.img\diff17_apps_layout.edj_ROOTFS.delta
rootfs.img\diff18_apps_page.edj_ROOTFS.delta
rootfs.img\diff19_apps_view_layout.edj_ROOTFS.delta
rootfs.img\diff1_memory.db-journal_ROOTFS.delta
rootfs.img\diff20_clock_contextual.edj_ROOTFS.delta
rootfs.img\diff21_clock_indicator.edj_ROOTFS.delta
rootfs.img\diff22_dashboard.edj_ROOTFS.delta
rootfs.img\diff23_edit.edj_ROOTFS.delta
rootfs.img\diff24_layout.edj_ROOTFS.delta
rootfs.img\diff25_page.edj_ROOTFS.delta
rootfs.img\diff26_page_clock.edj_ROOTFS.delta
rootfs.img\diff27_page_indicator.edj_ROOTFS.delta
rootfs.img\diff28_preview.edj_ROOTFS.delta
rootfs.img\diff29_scrollView.edj_ROOTFS.delta
rootfs.img\diff2_system.db-journal_ROOTFS.delta
rootfs.img\diff30_tutorial.edj_ROOTFS.delta
rootfs.img\diff31_tutorial_steps.edj_ROOTFS.delta
rootfs.img\diff32_signature1.xml_ROOTFS.delta
rootfs.img\diff33_author-signature.xml_ROOTFS.delta
rootfs.img\diff34_windicator.edj_ROOTFS.delta
rootfs.img\diff35_signature1.xml_ROOTFS.delta
rootfs.img\diff36_ffffffff00000000000000000000000a.tlbin_ROOTFS.delta
rootfs.img\diff37_ffffffff00000000000000000000000b.tlbin_ROOTFS.delta
rootfs.img\diff38_author-signature.xml_ROOTFS.delta
rootfs.img\diff39_wc-popup_ROOTFS.delta
rootfs.img\diff3_device-sec-policy_ROOTFS.delta
rootfs.img\diff40_signature1.xml_ROOTFS.delta
rootfs.img\diff41_sapd_ROOTFS.delta
rootfs.img\diff42_scsd_ROOTFS.delta
rootfs.img\diff43_test_scs_ROOTFS.delta
rootfs.img\diff44_weconnd_ROOTFS.delta
rootfs.img\diff45_libsap-client-stub-api.so.1.0.0_ROOTFS.delta
rootfs.img\diff46_libsap_client.so.0.0.0_ROOTFS.delta
rootfs.img\diff47_libweconn.so.4.1.7_ROOTFS.delta
rootfs.img\diff48_locale-archive_ROOTFS.delta
rootfs.img\diff49_ble.so_ROOTFS.delta
rootfs.img\diff4_info.ini_ROOTFS.delta
rootfs.img\diff50_bt.so_ROOTFS.delta
rootfs.img\diff51_scs.so_ROOTFS.delta
rootfs.img\diff52_tcp.so_ROOTFS.delta
rootfs.img\diff53_sap.service_ROOTFS.delta
rootfs.img\diff54_weconn.service_ROOTFS.delta
rootfs.img\diff55_mod_bt.so_ROOTFS.delta
rootfs.img\diff56_mod_cellular.so_ROOTFS.delta
rootfs.img\diff57_mod_p2p.so_ROOTFS.delta
rootfs.img\diff58_mod_sap.so_ROOTFS.delta
rootfs.img\diff59_mod_wifi.so_ROOTFS.delta
rootfs.img\diff5_os-release_ROOTFS.delta
rootfs.img\diff60_removed-file.lst_ROOTFS.delta
rootfs.img\diff61_privilege-mount.list_ROOTFS.delta
rootfs.img\diff62_usr_share_locale.squash_ROOTFS.delta
rootfs.img\diff63_resource_QNX.zip_ROOTFS.delta
rootfs.img\diff64_checksum.md5_ROOTFS.delta
rootfs.img\diff65_opt.zip_ROOTFS.delta
rootfs.img\diff66_smack_label.txt_ROOTFS.delta
rootfs.img\diff67_ugid_permission.txt_ROOTFS.delta
rootfs.img\diff68_libsap.so.1.12.0_ROOTFS.delta
rootfs.img\diff6_system_info_db_ROOTFS.delta
rootfs.img\diff7_kern_sec_info_ROOTFS.delta
rootfs.img\diff8_tima_measurement_info_ROOTFS.delta
rootfs.img\diff9_tizen-build.conf_ROOTFS.delta
rootfs.img\ROOTFS.txt
rootfs.img\ROOTFS_attr.txt
C
Code:
cm.bin
sboot.bin
Bootloader and Bootloader related file are ever 100 % full Image... FULL_IMG
D
Code:
update.cfg
Here we can see Partition Table Infos... MD5 Hashes...
Code:
BOOTLOADER sboot.bin [B]FULL_IMG[/B] /dev/mmcblk0p80 0 1921296 1921296 2e2f2c95b6c79f9499a6b1ecb2d8f4a5a434b505 9d4493e96538835f75e13510da6696bd102bb9b3
CM cm.bin [B]FULL_IMG[/B] /dev/mmcblk0p11 0 2597136 2597136 48041a45e24bb1d8490e0a11c00ce5e57826e0ef aa43a94670a4ea3aa13b5b514c59cf3a83e47568
ROOTFS rootfs.img/ DELTA_FS /dev/mmcblk0p19 0 58207558
CSC csc.img/ DELTA_FS /dev/mmcblk0p16 0 17828390
BOOT delta.boot DELTA_IMG /dev/mmcblk0p12 0 15524112 15524112 da8ecde6d6b4a048342f381765f552d39cfdd793 fadeb71ce42d2b727b8e5840234b01cf2d8e60c7
UP_PARAM delta.upparam DELTA_IMG /dev/mmcblk0p10 0 1085440 1085440 8f66a3a59b1685c9d043d9ad1df0627a85c475ed 043ae8dda424a2e9433471264201c8eb73390c79
RAMDISK1 delta.ramdisk1 DELTA_IMG /dev/mmcblk0p8 0 7340304 7340304 22af46f1186e2d63bc688ef6271fab634ca15ee6 ccf7859cd5ec61d849626fe9eae8b11ca7c8427f
RAMDISK2 delta.ramdisk2 EXTRA /dev/mmcblk0p7 0 19923216 19923216 5822281d04ac49dbb1f413acf150049533bcf758 c1161d9abedc468e0bb8a9dbeb014cee24c733a3
RECOVERY delta.recovery EXTRA /dev/mmcblk0p13 0
We can see the 3 types:
Code:
FULL_IMG
DELTA_IMG
DELTA_FS
IMG means files we know from Firmware packages...
FS IMHO Filesystem... affected csc.img and rootfs.img
E
Code:
delta.ua
This File is allready in Firmware... but newer Versions comes with delta.tar ...
Seems main part of FOTA procedure...
Best Regards

Attached package with Ramdisk from BTF3 and BTG1 inside...
Delta File
the Delta File extracted... with 7Zip
In Delta I see Header:
Code:
SSDIFF40
First few Bytes of file...
Search inside Firmware/delta.ua leades to
Code:
apply_patch [B]BSDIFF40[/B]
Now with Google more success... to find something...
https://wiki.tizen.org/Tizen_OS_Upgrade_Package_Generation_Guide
http://www.daemonology.net/bsdiff/
.
.
.
Tried on my SM-R760...
Code:
sh-3.2# xdelta3 -d -s ramdisk_BTF3.img delta decoded_new_file1
xdelta3: not a VCDIFF input: XD3_INVALID_INPUT
xdelta3: normally this indicates that the source file is incorrect
xdelta3: please verify the source file with sha1sum or equivalent
as test:
Code:
sh-3.2# xdelta3 -e -s ramdisk_BTF3.img ramdisk_BTG1.img delta_fileV1
sh-3.2# xdelta3 -vv -e -s ramdisk_BTF3.img ramdisk_BTG1.img delta_fileV1
xdelta3: input ramdisk_BTG1.img window size 7.00 MiB
xdelta3: source ramdisk_BTF3.img source size 7.00 MiB [7340304] blksize 64.0 MiB window 64.0 MiB #bufs 1 (FIFO)
xdelta3: to overwrite output file specify -f: delta_fileV1
Created file looks far away from this what i need...
Maybe somebody can help me to solve the riddle.
Thanx in advance.
Best Regards

I am toooooo blind to find the Binaries for:
https://wiki.tizen.org/Tizen_OS_Upgrade_Package_Generation_Guide
Code:
Tizen:~$ ss_bsdiff
ss_bsdiff: ss_bsdiff Version 5.0
Usage: ss_bsdiff oldfile newfile patchfile
Code:
Tizen:~$ ss_bspatch
ss_bspatch: ss_bspatch Version 1.0
Usage: ss_bspatch oldfile newfile patchfile
So other project...
https://doc.samsungmobile.com/SM-R820/TPH/doc.html
http://fota-cloud-dn.ospserver.net/firmware/TPH/SM-R820/version.xml
New plan for today...
Seems update possible direct from BTA1 to CTI4...
So I hope I can verify Under Armour Edition Files...
Best Regards
Edit 1.
Step 1.
"Reset" Bootloader sboot.bin...
Bypass Rollback Prevention crap... to flash older Bootloader to be able to be valid in FOTA mechanism.
Simple I will flash Combination Firmware.
Edit 2.
Meanwhile I have the 300 MB delta.tar ...
Need to flash BTA1...
Now creating the rooted rootfs.img
Then I need to flash Root...
Edit 3.
So I am soon ready to perform FOTA update manually from rooted BTA1... direct to CTI4... in "1 step"...
So the theory...
Edit 4.
Push 300 MB to SM-R820...
Code:
sdb push delta.tar /opt/usr/media/
Edit 5.
Code:
D:\SDB\SDB260>sdb push delta.tar /opt/usr/media/
pushed delta.tar 100% 292MB
1 file(s) pushed. 0 file(s) skipped.
delta.tar 467 KB/s (307160587 bytes in 641.761s)
Edit 6.
Code:
sh-3.2# fota_local_test.sh
/opt/usr/media/delta.tar is exist
/opt/usr/media/delta.ua is exist
Setting fota update mode
method return time=1601987367.697180 sender=:1.9 -> destination=:1.193 serial=733 reply_serial=2
int32 0
Edit 7.
I am now on rooted CTI4... dumping 4 GB eMMC with netcat...

https://www.file-upload.net/download-14339783/smR820_FOTAdelta_CTI4_to_CTJ5.7z.html
Delta File from SM-R820 CTI4 to CTJ5... FOTA.
For study...
Best Regards

Related

[REF] bml* partition layout

LAYOUT MAPPING COMPLETE! THANKS EVERYONE!​
based on XXJF5 stock 2.1#1
256 KB -- bml1, contain boot.bin (262144 bytes), Primary Boot Loader (low-level hardware initialization)
256 KB -- bml2, contains PIT file first 512 bytes
10240 KB -- bml3 /dev/block/stl3 /efs
1280 KB -- bml4 contain Sbl.bin (1310720 bytes) Secondary Boot Loader (loads the Linux kernel and passes the necessary arguments)
1280KB -- bml5 contains Secondary Boot Loader (for recovery, ect)
5120KB -- bml6 param.lfs /mnt/.lfs j4fs
7680KB -- bml7 contain zImage and initramfs
7680KB -- bml8 empty
293376KB -- bml9 factoryfs.rfs ( /system RFS Partition) /dev/block/stl9
137216KB -- bml10 dbdata.rfs ( /dbdata RFS Partition) /dev/block/stl10
35840KB -- bml11 cache.rfs ( /cache RFS Partition) /dev/block/stl11
12800KB -- bml12 modem.bin
Hello husq510
Thanks for this infos, i'll follow this thread closely because i'm looking for the place where ServiceMode settings are stored.
anyone tried writing to the bml directly?
husq510 said:
bash-3.2# ls -al /dev/block/bml*
1280 KB -- bml4 kernel (zImage)
293376KB -- bml9 factoryfs.rfs ( /system RFS Partition)
Click to expand...
Click to collapse
interesting. so ive dd the bml4 and bml9 of optus australia stock 19000DTJF3. now anyone want to point me in the direction of creating an odin package out of it.
i whoner .... how can bml4 be the zImage? bml4=1.2MB, zImage=5.8MB ?? also if it should just contain the kernel without initram, it's still about 2.6MB? any idea?
jodue said:
i whoner .... how can bml4 be the zImage? bml4=1.2MB, zImage=5.8MB ?? also if it should just contain the kernel without initram, it's still about 2.6MB? any idea?
Click to expand...
Click to collapse
you are right, cant be. then kernel must be in some other bml place, seems bml7.
gandalf:~/Desktop/android/bml ackie$ grep "booting the kernel" *
Binary file bml7.dump matches
gandalf:~/Desktop/android/bml ackie$ hexdump -n 128 bml7.dump | grep "e1a0 0000 e1a0"
0000000 0000 e1a0 0000 e1a0 0000 e1a0 0000 e1a0
0000020 0002 ea00 [2818 016f] [0000 0000] [a510 005b] <- zimage magic number 0x016F2818, start at 0x0, end at 0x005b10a5
0000030 7001 e1a0 8002 e1a0 2000 e10f 0003 e312
0000040 0001 1a00 0017 e3a0 3456 ef12 2000 e10f
0000050 20c0 e382 f002 e121 0000 0000 0000 0000
0000060 00d0 e28f 307e e890 0001 e050 000a 0a00
0000070 5000 e085 6000 e086 c000 e08c 2000 e082
0000080
Offset into zImage Value Description
0x24 0x016F2818 Magic number used to identify this is an ARM Linux zImage
0x28 start address The address the zImage starts at
0x2C end address The address the zImage ends at
so if you start at 0x0 of bml7 and read untill offset inside 0x2c for XXJF5 is 0x005b10a5 you have your zImage.
husq510 said:
so if you start at 0x0 of bml7 and read untill offset inside 0x2c for XXJF5 is 0x005b10a5 you have your zImage.
Click to expand...
Click to collapse
so is it safe to assume after 0x005b10a5 is the ram disk?
Hello Folks.
I found some interesting bits in bml12.
"Service Mode" datas strings are in it, like show these example :
Code:
strings ./bml12 | grep Diamond
[SND] TurnON UtaAudioModifyHf(prev_Diamond_mode:0x%x)
`[SND]DiamondVoice_GetMode : path = 0x%x, Diamond_mode = 0x%x
`[SND]DiamondVoice_GetMode : Diamond_mode = 0x%x
[SND]DiamondVoiceTXcfgMSG
`[SND] DiamondVoice_RxInit : DiamondVoice_Mode_v = 0x%x
Diamond Solution
[9] Diamond Solution
[SND]DiamondVoice_Config : DiamondVoice_Mode_v = 0x%x, Diamond_mode= 0x%x
strings ./bml12 | grep DEBUG
MN_GPS_DEBUG_INFO_CNF
GPS_DEBUG_INFO_CNF
[1] DEBUG SCREEN
[2] DEBUG INFO
DEBUG INFO
DEBUG MSG 115200
DEBUG MSG SETTING FAIL
DEBUG MSG 921600
DEBUG MSG ON
DEBUG MSG OFF
AUDIO_LIB_DSP_DEBUG_GRP1
AUDIO_LIB_DSP_DEBUG_GRP2
AUDIO_LIB_DSP_DEBUG_GRP3
AUDIO_LIB_DSP_DEBUG_GRP4
AUDIO_LIB_DSP_DEBUG_GRP5
AUD_LIB_DSP_DEBUG
IPC_MISC_PHONE_DEBUG
IPC_MISC_DEBUG_LEVEL
IPC_SVC_DEBUG_DUMP
IPC_SVC_DEBUG_STRING
And I found my IMEI number in bml3
edit :
+ some MAC hardware address too (but not the Wifi one)
+ the HW Version : MP 0.800
I guess that bml3 is device-specific.
But I don't know if it's the source of specific values or just contains copy of hardware-related data.
In the first case, modifying bml3 would allow to change IMEI or other sensitive values ^^
nonato said:
so is it safe to assume after 0x005b10a5 is the ram disk?
Click to expand...
Click to collapse
nope, to extract the ram disk, u hv to find the magic number of gz and extract the gzip image out... i was able to get the directory listing of the ramdisk but not the content..
the other problem is after u get the ramdisk and do any modifications, u hv to reverse the process.. not an easy job but if anyone found a solution, please share.
anyone try writing to the bml directly? dd doesnt seem to work
anyway, its possible to extract the image and use odin to flash after tar but if can write to bml directly, clockworkmod can effectively backup/restore the kernel.. (just a thought)
raspdeep said:
nope, to extract the ram disk, u hv to find the magic number of gz and extract the gzip image out... i was able to get the directory listing of the ramdisk but not the content..
the other problem is after u get the ramdisk and do any modifications, u hv to reverse the process.. not an easy job but if anyone found a solution, please share.
anyone try writing to the bml directly? dd doesnt seem to work
anyway, its possible to extract the image and use odin to flash after tar but if can write to bml directly, clockworkmod can effectively backup/restore the kernel.. (just a thought)
Click to expand...
Click to collapse
No, you cant write directly to bml.
Data write to a sector involves following sequence of low-level flash operations:
1. Block copy for back-up
2. Block erase
3. Copy back for non-modified pages
4. Writing the sector data to the modified page
These sequences of operations are not atomic, so a write request to this block device driver is prone to data corruption. For this reason, read-only file systems such as CRAMFS are adequate to run on top of this block device driver.
use this small script to extract your current zImage:
offset=`dd if=/dev/block/bml7 bs=1 skip=44 count=4 2>/dev/null| hexdump -e '1/4 "%d"' -e '"\n"'`
echo $offset
dd if=/dev/block/bml7 bs=1 count=$offset of=/sdcard/zImage_backup
husq510 said:
use this small script to extract your current zImage:
Click to expand...
Click to collapse
nice, thanks for sharing that!
i just extracted initramfs from bml7, file attached, unzip and cpio -i
some file differs from leshak:
modules/dpram.ko
modules/multipdp.ko
modules/dhd.ko
modules/stgloc
initramfs/init.rc
.info/rootfs.info
default.prop
init.smdkc110.sh
sbin/recovery
sbin/init
how do u extract this?
gunzip -c initrd-cpio.zip | cpio -i does not work.. gave errors
how did you dump and make the zip file you have attached?
thanks,
husq510 said:
i just extracted initramfs from bml7, file attached, unzip and cpio -i
some file differs from leshak:
modules/dpram.ko
modules/multipdp.ko
modules/dhd.ko
modules/stgloc
initramfs/init.rc
.info/rootfs.info
default.prop
init.smdkc110.sh
sbin/recovery
sbin/init
Click to expand...
Click to collapse
raspdeep said:
how do u extract this?
gunzip -c initrd-cpio.zip | cpio -i does not work.. gave errors
Click to expand...
Click to collapse
[email protected] you have to use unzip instead gzip, cuz forum dislike .gz format, so I had to use standard zip.
mkdir initramfs
mv initrd-cpio.zip initramfs
cd initramfs
unzip initrd-cpio.zio
cat initrd.cpio | cpio -i --no-absolute-filenames
Hey, did somebody already tried to dump one or some bml partitions and restore them later ?
I guess this could be the ultimate backup tool.
I took a look into this and found that
bml2 : PIT file is here
bml5 : Sbl.bin is here
I opened it with a Hexeditor and compared with things from the firmware.
My device is running on JP3, froyo, at the moment.
thanks i will update first post. layout mapping is complete now!

Your own logo.img in param.lfs

Hello,
I wanna share some information about param.lfs. As some people I tried to study this file. I tried to port j4fs driver to linux, but with no success yet.
But I have something. For those ROM-makers who want to insert their own logo right in the file for flashing it as a part of a ROM you can do the following:
1. Prepare your jpeg file, process it through jpeg optimizer (like xat.com JPEG optimizer). Size must not exceed 3FD1(HEX), or 16337Bytes. 480x800, 72dpi
2. Load this file (jpeg) in a HEX editor (WinHex) and copy it as a block
3. Load param.lfs
4. Overwrite two blocks in param.lfs by your image (just paste block in overwrite mode). First one - from offset B4000, second one - from 7F000. To double check - overwritten blocks should start with FF D8
That's all. Tar param.lfs as it used to do: tar -H ustar -с param.lfs > param.tar
and flash it via odin as PDA, or add to firmware then. You will obtain your own logo.jpg and logo_kor.jpg in /mnt/.lfs
So, you don't need to use special scripts to change splash-screen (mount .lfs and copy your logo.img into it). It will work with any kernel. Even on stock firmware you may have your own bootlogo.
Caution: Be careful. If you make something wrong, phone won't boot, because param.lfs is used by bootloader. At least /mnt/.lfs will be empty.
You may have black screen. Anyway you will be able to enter in 3-button mode to flash stock param.lfs back.
Of course that won't change bootlogo with yellow triangle because it "resides" in sbl.bin and very dangerous to be changed.
P.S. I was going to write a patch script, but decided not to do that.
Cheers
As a newbye, I found that very interesting to read
Thank you
1.
My original logo is 18.100 bytes and wonder if 3BB0(HEX) limit is accurate :/ :\ - while $B4000-$7F000=217.088 bytes
2.
On my param.lfs image, I searched for "FFD8 FFE0" and found other position for the JFIF files
Complete signature seems to be
"FFD8 FFE0"
"0010 4A46 4946 0001" for "..JFIF.."
3.
Linux support for j4fs would be great
4.
I wanted to know how to deal such a special "behaviour" into param.lfs partition: we can create files but not overwritten files...
Code:
[alpha] adb shell
$ su
# mount -o remount,rw -t j4fs /dev/block/stl6 /mnt/.lfs
# mount | grep ".lfs"
/dev/block/mmcblk0p4 on /mnt/.lfs type j4fs (rw,relatime)
#
# cd /mnt/.lfs
# rm -f logo.jpg
rm: can't remove 'logo.jpg': Operation not permitted
# echo "1. Impossible to delete logo.jpg"
1. Impossible to delete logo.jpg
#
# cp /mnt/sdcard/logo.jpg /mnt/.lfs/logo0.jpg
# ls -l /mnt/.lfs/logo0.jpg
-rwxrwxrwx 1 root root 19524 Jan 1 1970 /mnt/.lfs/logo0.jpg
# echo "2. copy onto /mnt/.lfs/ is possible"
2. copy onto /mnt/.lfs/ is possible
#
# cp -f logo0.jpg logo.jpg
cp: can't create 'logo.jpg': File exists
# echo "3. copy onto logo.jpg is impossible"
3. copy onto logo.jpg is impossible
#
# chattr -i logo.jpg
chattr: reading flags on logo.jpg: Not a typewriter
# rm -f logo.jpg
rm: can't remove 'logo.jpg': Operation not permitted
# exit
$ exit
[alpha] echo "Really strange for a file system ?"
Really strange for a file system ?
Is there a simple way to delete logo.jpg ?
Ivan_Belarus said:
Caution: Be careful. If you make something wrong, phone won't boot, because param.lfs is used by bootloader. At least /mnt/.lfs will be empty. You may have black screen. Anyway you will be able to enter in 3-button mode to flash stock param.lfs back.
Click to expand...
Click to collapse
First of all, thanks for sharing the info.
I tried it, no dice. Seems B4000 in the param.lfs I'm using (KI8) isn't the beginning of a JPEG. Tried other addresses that start with FF D8, with and w/o Exif, to no avail. All I have is an empty .lfs folder (as you said) and a boot message saying "logo.jpg" draw failed, but it boots eventually.
What am I missing?
TIA
param.lfs I'm using: http://www.mediafire.com/file/jw0x36z04fvp4eg/param.lfs
EDIT:
Wow! It took me a couple of hours, but I've finally found it in that param.lfs (XWKI8)!!!
In XWKI8 logo.jpg starts @ 7D800. Don't go beyond the length of the file you have already (in XWKI8, +/-15K), otherwise you'll get the "draw failed" boot error and an empty /mnt/.lfs - in this case, just reflash the stock param.lfs and you'll be ok.
Works great! I can sleep now!
Once more, thx a bunch Ivan_Belarus for sharing the info!
cheers!!!
geekmarc said:
1.My original logo is 18.100 bytes and wonder if 3BB0(HEX) limit is accurate :/ :\ - while $B4000-$7F000=217.088 bytes
2.On my param.lfs image, I searched for "FFD8 FFE0" and found other position for the JFIF files
Complete signature seems to be
"FFD8 FFE0"
"0010 4A46 4946 0001" for "..JFIF.."
4.I wanted to know how to deal such a special "behaviour" into param.lfs partition: we can create files but not overwritten files...
Is there a simple way to delete logo.jpg ?
Click to expand...
Click to collapse
1. Wrong operation. I have given the offsets only: for logo.jpg and logo_kor.jpg. I you want full addressing they are: B4000-B7FCF. It comes to 3FCF+2=3FD1. The second one is: 7F000-839B2. It comes to 49B2+2=49B4. (I've written 3BB0 - sorry I looked at my own block size. Fixed)
2. Yep, the jpeg header is bigger than word FF D8. You can google for jpeg header. But main two bytes are FF D8. The end is marked by FF D9. There are many jpeg files inside. I provided offsets for two ones.
4. You may look at Init.V scripts of Siyah kernel for example (/sbin/siyah/imports.sh)- there you may find all the commands for replace logo.jpg
I attached my original param.lfs (unchanged). I used it without problems on KI8
Heh, I didnt compare different param.lfs but now I see that there are different builds of param.lfs (thnx to rizdroid). So, I guess we're able to locate quickly the required offsets via block sizes and names. We need to find two blocks of size 3FD1 (starts with FF D8, ends with FF D9) and 49B4. They will be logo.jpg and logo_kor.jpg images. Before these blocks (about -7E1) you can find text 'logo.jpg' and 'logo_kor.jpg' accordingly. Don't try to locate them only by name!
someone help me out here... im trying to do this for the galaxy nexus but whenever i open my param.lfs file in a hex editor all i get is 0's theres nothing in it
Ivan_Belarus said:
1. Wrong operation. I have given the offsets only: for logo.jpg and logo_kor.jpg. I you want full addressing they are: B4000-B7FCF. It comes to 3FCF+2=3FD1. The second one is: 7F000-839B2. It comes to 49B2+2=49B4. (I've written 3BB0 - sorry I looked at my own block size. Fixed)
2. Yep, the jpeg header is bigger than word FF D8. You can google for jpeg header. But main two bytes are FF D8. The end is marked by FF D9. There are many jpeg files inside. I provided offsets for two ones.
4. You may look at Init.V scripts of Siyah kernel for example (/sbin/siyah/imports.sh)- there you may find all the commands for replace logo.jpg
I attached my original param.lfs (unchanged). I used it without problems on KI8
Heh, I didnt compare different param.lfs but now I see that there are different builds of param.lfs (thnx to rizdroid). So, I guess we're able to locate quickly the required offsets via block sizes and names. We need to find two blocks of size 3FD1 (starts with FF D8, ends with FF D9) and 49B4. They will be logo.jpg and logo_kor.jpg images. Before these blocks (about -7E1) you can find text 'logo.jpg' and 'logo_kor.jpg' accordingly. Don't try to locate them only by name!
Click to expand...
Click to collapse
WOOOOOOOOOOOOOOOOOOO !!!!! YEAH !!!!!! :good::good::good::victory::victory::victory:
@Ivan_Belarus, Thank you very much for the guide and help !!!!!
I was stack with that process of HEXing the param.lfs you provided because the image i made is SMALLER then 16337Bytes.
So I solved the "'logo.jpg' draw failed" problem I got ( becuase I changed only part of logo.jpg ) by filling "20" ( hex value ) all the cells between after my image FF D9 ( not included) and the original logo.jpg END ( FF D9 included ) as you wrote in your post: 1st jpg end is at B7FCF and the second is at 839B2.
I used the param.rar you provided.
To be clearer, for an example, let say I got this original param.lfs HEX segment:
Code:
[COLOR="red"]FFD8[/COLOR]FFE100184578EE55184D5331DA8831930800450007[COLOR="red"]FFD9[/COLOR]
But the image i want to implant is SMALLER , so it starts with "FFD8" and ends EARLIER with "FFD9" like:
Code:
[COLOR="red"]FFD8[/COLOR]FFE1008374597335734753745[COLOR="red"]FFD9[/COLOR]
So, I need to change param.lfs HEX segment so that it will include "20" after my image "FFD9":
Code:
[COLOR="red"]FFD8[/COLOR]FFE1008374597335734753745[COLOR="red"]FFD9[/COLOR][U][COLOR="Blue"]202020202020202020[/COLOR][/U]
About the need to TAR the param.lfs, because i'm on windows I used 7zip, so no need for linux of any sort.
rizdroid said:
First of all, thanks for sharing the info.
I tried it, no dice. Seems B4000 in the param.lfs I'm using (KI8) isn't the beginning of a JPEG. Tried other addresses that start with FF D8, with and w/o Exif, to no avail. All I have is an empty .lfs folder (as you said) and a boot message saying "logo.jpg" draw failed, but it boots eventually.
What am I missing?
TIA
param.lfs I'm using: http://www.mediafire.com/file/jw0x36z04fvp4eg/param.lfs
EDIT:
Wow! It took me a couple of hours, but I've finally found it in that param.lfs (XWKI8)!!!
In XWKI8 logo.jpg starts @ 7D800. Don't go beyond the length of the file you have already (in XWKI8, +/-15K), otherwise you'll get the "draw failed" boot error and an empty /mnt/.lfs - in this case, just reflash the stock param.lfs and you'll be ok.
Works great! I can sleep now!
Once more, thx a bunch Ivan_Belarus for sharing the info!
cheers!!!
Click to expand...
Click to collapse
Sorry to resurrect a REALLY old thread, but how did you manage to flash PARAM partition. It is in my .pit file from heimdall, but when I flash the partition, I simply see the old bootscreen.
hackintosh5 said:
Sorry to resurrect a REALLY old thread, but (...) .
Click to expand...
Click to collapse
It is OK to ask questions even if the thread is sooo old
But unfortunately I can't help you.
Iluvatar2000 said:
It is OK to ask questions even if the thread is sooo old
But unfortunately I can't help you.
Click to expand...
Click to collapse
Its fine! Thanks for your time!

[Q] Fastboot ``cannot load system.img''

I was flashing my yakjuxw over to yakju, when fastboot started failing to load system.img.
I have tried 4.0.2 and 4.0.1. Every image except for system.img works.
Code:
[[email protected] yakju-itl41f]# fastboot flash system system.img
error: cannot load 'system.img'
And it doesn't work using the zip either;
Code:
[[email protected] yakju-itl41f]# fastboot update *.zip
archive does not contain 'boot.sig'
archive does not contain 'recovery.sig'
failed to allocate 325426112 bytes
error: update package missing system.img
I am running Archlinux.
Somewhere in the ./flash-all.sh script my ``sdcard'' was wiped, so I've lost my nandroid(s), but I can boot CWM from my PC. Help?
Open the zip file in a explorer-window somewhere and locate the system.img file and then try the first one over again.
None of these files are magic and they are pretty easy to explore to find the components you are looking for.
Are you sure you've unpacked things correctly?
What does the output from "ls -la" run in the the same folder say?
josteink said:
Open the zip file in a explorer-window somewhere and locate the system.img file and then try the first one over again.
None of these files are magic and they are pretty easy to explore to find the components you are looking for.
Are you sure you've unpacked things correctly?
What does the output from "ls -la" run in the the same folder say?
Click to expand...
Click to collapse
I unpacked the zip, so all the images in it are in this folder, but here's the output:
Code:
[[email protected] yakju-itl41f]# ls -la
total 663156
drwxr-x--- 2 david users 4096 Jan 18 20:17 .
drwxr-xr-x 4 david users 4096 Jan 18 20:07 ..
-rw-r----- 1 david users 93 Nov 21 18:20 android-info.txt
-rw-r--r-- 1 david users 4151296 Jan 1 2009 boot.img
-rw-r----- 1 david users 2363392 Nov 24 09:44 bootloader-maguro-primekj10.img
-rwxr-x--- 1 david users 831 Nov 24 09:44 flash-all.sh
-rw-r----- 1 david users 189165717 Nov 24 09:44 image-yakju-itl41f.zip
-rw-r----- 1 david users 12583168 Nov 24 09:44 radio-maguro-i9250xxkk1.img
-rw-r--r-- 1 david users 4491264 Jan 1 2009 recovery.img
-rwxrwxrwx 1 david users 325426112 Jan 1 2009 system.img
-rw------- 1 david users 140856312 Nov 22 11:09 userdata.img
Did you actually ever unlock fast boot? Just guessing here, at this point.
Sent from my Galaxy Nexus using Tapatalk
redownload stock images?
just an update, this is solved. The solution was found in rebooting my pc, which is something I, as a Linux user, seldom do, and my laptop cannot be trusted to boot due to its buggy BIOS.
Sent from my Galaxy Nexus
Korntoff said:
just an update, this is solved. The solution was found in rebooting my pc, which is something I, as a Linux user, seldom do, and my laptop cannot be trusted to boot due to its buggy BIOS.
Sent from my Galaxy Nexus
Click to expand...
Click to collapse
Ridiculously old thread, I realize, so I feel kinda bad bumping it, but it's an early result on Google when searching for this problem, so I'll update a bit.
Rebooting will work, but isn't necessary, and is inconvenient. You just need to kill fastboot, it's hung with another process.
In linux, open up a terminal.
Code:
ps ax|grep fastboot
Note the PID(s)
Code:
kill -9 <PID1> <PID2>...<PIDn>
Another reason for this error is if you have device encryption enabled. In order to restore factory image, you first need to format /data to remove encryption.
I have no idea why this causes the error "cannot load system.img", but it definitely does.
Cerinthus said:
Ridiculously old thread, I realize, so I feel kinda bad bumping it,
In linux, open up a terminal...
Click to expand...
Click to collapse
Thanks for posting this.
In windows, I used task manager to find the ADB process and killed it, and then it worked fine.
groopk said:
Thanks for posting this.
In windows, I used task manager to find the ADB process and killed it, and then it worked fine.
Click to expand...
Click to collapse
To do this without searching thought task manager , just type "adb kill server " and then " adb start server" :thumbup:
Sent from my SCH-I605 using Tapatalk
quite an old thread again, but replying anyway.
The "failed to allocate ***** bytes" message means that it failed on memory of your computer, not on the storage of your phone.
Code:
fastboot.c
...
void *unzip_file(zipfile_t zip, const char *name, unsigned *sz)
{
...
*sz = get_zipentry_size(entry);
datasz = *sz * 1.001;
data = malloc(datasz);
if(data == 0) {
fprintf(stderr, "failed to allocate %d bytes\n", *sz);
return 0;
}
...
If it turns out that your machine has too small memory(unfortunately, which was also my case), you could unzip the file containing img files and flash system, boot and recovery images one by one. It's just the same.
great help
On the verge of flashing lolipop on my beloved n5, I got stuck with that stupid errror.
Thanks for the helpfull post.
downgrade to 4.4.4
just downgrade to 4.4.4 and then flash android 5.... mine worked....
FreakyTux said:
quite an old thread again, but replying anyway.
The "failed to allocate ***** bytes" message means that it failed on memory of your computer, not on the storage of your phone.
Code:
fastboot.c
...
void *unzip_file(zipfile_t zip, const char *name, unsigned *sz)
{
...
*sz = get_zipentry_size(entry);
datasz = *sz * 1.001;
data = malloc(datasz);
if(data == 0) {
fprintf(stderr, "failed to allocate %d bytes\n", *sz);
return 0;
}
...
If it turns out that your machine has too small memory(unfortunately, which was also my case), you could unzip the file containing img files and flash system, boot and recovery images one by one. It's just the same.
Click to expand...
Click to collapse
This was it! Thanks for posting!
Update ADB. That worked for me
same problem
i tried everything above but nothing works ..... can anyone help me out here
Alternate Way that always works..!!
1. Install TWRP recovery.
2. Mount USB Storage
3. Copy the system.img to phone storage
4. Select Install and then Select Install Image
5. Select the system.img file
6. Select partition as system
7. Confirm install
Done..
Korntoff said:
I was flashing my yakjuxw over to yakju, when fastboot started failing to load system.img.
I have tried 4.0.2 and 4.0.1. Every image except for system.img works.
Code:
[[email protected] yakju-itl41f]# fastboot flash system system.img
error: cannot load 'system.img'
And it doesn't work using the zip either;
Code:
[[email protected] yakju-itl41f]# fastboot update *.zip
archive does not contain 'boot.sig'
archive does not contain 'recovery.sig'
failed to allocate 325426112 bytes
error: update package missing system.img
I am running Archlinux.
Somewhere in the ./flash-all.sh script my ``sdcard'' was wiped, so I've lost my nandroid(s), but I can boot CWM from my PC. Help?
Click to expand...
Click to collapse
rakesh.aggarwal said:
1. Install TWRP recovery.
2. Mount USB Storage
3. Copy the system.img to phone storage
4. Select Install and then Select Install Image
5. Select the system.img file
6. Select partition as system
7. Confirm install
Done..
Click to expand...
Click to collapse
with lots of thanks and much love!! fixed my device yeeyyyy!!!!

[Q] Email Security patch removal for android 4.3 leaked ROM

Hi All ,
I have to remove the email security patch in stock leaked 4.3 ROM.
The instructions i followed are from this thread:
http://forum.xda-developers.com/showthread.php?t=1117452
But then i get the error '*** Unable to remount system partition for writing (are you root?).'.
Please find the log below.
Can some one please help if there is a .ZIP file available for the leaked version of 4.3.
Cleaning up ...
Waiting for USB connection...
Checking device...
Model: GT-N7100, build JSS15J.N7100XXUEMI6, android 4.3 (API Level 16)
/system mounted on /dev/block/mmcblk0p13, mode ro
checking root access. root uid: 0, secure: yes, busybox: no
Pulling app(s) ...
Can't find Email app. Enter the name of your Email apk or press <Enter> to exit:
secemail_j.apk
Pulling libs ...
Decompiling SecExchange.odex ...
Applying patch ...
Patching com/android/exchange/adapter/ProvisionParser.hasSupportablePolicySet()Z
Recompiling ...
Building SecExchange.apk ...
Updating device ...
*** Unable to remount system partition for writing (are you root?).
Debug log written to debug.log
Press any key to continue . . .

Problem rooting with XiaoMiTool V2

Hello everyone,
I tried to root my Mi Mix 2 with XiaoMiTool V2 but I have got a problem during the step of pushing file magisk_20.4.zip.
In the log, I can see :
[10:07:04][PSTA ][70c729f4] Start process (781): "C:\Xiaomi\XiaomiTool2\res\tools\adb.exe" "-s" "ebf1f094" "push" "C:\Xiaomi\XiaomiTool2\res\tmp\magisk_20.4.zip" "/sdcard/magisk_20.4.zip"
[10:07:05][PROC ][55e63029] Process (781) output: adb: error: failed to copy 'C:\Xiaomi\XiaomiTool2\res\tmp\magisk_20.4.zip' to '/sdcard/magisk_20.4.zip': remote couldn't create file: No such file or directory
[10:07:05][PROC ][55e63029] Process (781) output: C:\Xiaomi\XiaomiTool2\res\tmp\magisk_20.4.zip: 1 file pushed, 0 skipped. 48.9 MB/s (5942417 bytes in 0.116s)
[10:07:05][INFO ][70c729f4] Process (781) ended with exit code: 1, output len: 268
[10:07:05][ERROR ][70c729f4] Task error: exception: Failed to push file to the device: adb: error: failed to copy 'C:\Xiaomi\XiaomiTool2\res\tmp\magisk_20.4.zip' to '/sdcard/magisk_20.4.zip': remote couldn't create file: No such file or directory : AdbPushTask -> status: RUNNING
Can you help me ??
Thanks by advance !
Do you know an other way to root it easily ?
Thanks by advance.

Categories

Resources