(WIP) ZTE Blade X Max Z983 R&D Root Research - Blade General

Well like the rest of you I want to unlock and root this device.
I'm sure this is going to be a long road for all of us but I really like this device so personally I will do what i can to help figure out how to unlock and root this thing.
As a single soul this could take months or even a year but with combined efforts of this community I think we can pull it off. We all have our strengths and if we combine them with your help and the help of others it might turn out to be quite easy.
Don't be fooled and believe that fastboot is removed from the bootloader. It is there im sure we just need to figure out how to access it.
On a good note I already have a method to overcome update.zip signing that I developed for the alcatel one touch fierce 2. When using the recovery to flash the phone things actually become simpler. I would expect though that the recovery image is signed as well meaning we dont simply have the ability to flash the recovery. Unless we can unlock the boot loader first.
In reality to do any of this we are going to need temp root. At this time i have no idea how were going to get that but if you can get temp root even just enough to pull a backup from the device that will be a huge step forward.
To do anything useful we need a device backup. Or a update.zip.
If you can find a way to copy the update from this device before it is installed that would be wonderful.
My device already updated so if you have a brand new device that is not updated let us know so we can get our hands on the update.
In the meantime ( Until we get some firmware to reverse engineer ) I will document all the data I can get and how to get it.
The very first thing we need is to know all of the partitions on the device. If I can get the full GPT Partition Table that would be best.
So without further adieu I will start this journey.
Some of my post will be fairly basic to some and very complex to others.
I'm going to start by seeing what all boot modes i can get into.
Then see what I can get with ADB without root permissions.
Map out the partition scheme, and see how much of the security scheme I can determine is in place. All the fun stuff like what files are signed, how the boot chain is verified. I have seen it before where overcoming the initial security mechanism opens up a whole world of possibilities.
Programmers get lazy and to save money if they think your blocked out of a vulnerable area period they may lax on harder to bypass security.

Ok after a day of research and some gleaning of info from my blade x max I have a direction to move in anyway.
The closest device and one of the only devices zte allowed unlocked is the ZTE axom7.
We can study the Axom7 and get some Ideas on what will work on the BladeXMax.
First fastboot is crippled initially.
But this is easily overcome by swapping a few bytes on the right partition.
Thats my theory anyway. I'm in the process of proving it.
After Fastboot receives its prosthetic Limb oem unlock is as simple as 1 command.
Once the bootloader is unlocked the device will allow for a unsigned TWRP to run.
Now of course we need to compile our own TWRP. And then we can root.
Obviously we need the ability to write to this fastboot partition.
And we need to be able to flash TWRP.
Without Root how???
Just like the axon 7. EDL mode.
ZTE seems EDL Mode Friendly.
And the flash programmer (Firehose) is not signed.
Miflash can write partitions on the zte devices.
The only issue right now is we need the files of of the Blade x max.
And the GPT partition table.
Seeing that axom7tool can backup partitions from the axon7 in edl mode.......
Knowing that miflash works.
One of us that knows the protocol of miflash ( saraha ??? )
Can write a tool for linux that uses the same protocol.
Once this tool exists we can backup all the partitions and the GPT without root.
Once i have the files from the blade it should be possible to edit the fastboot partition and un-cripple the Fastboot.
So if any of you know the guys that wrote the axon 7 tool he can help us with a tool.
Other than that were stuck writing the tool ourself.
On a good not the sahara protocol and other edl protocols are very well documented.
If you seriously want in this Blade this is the way to go.

Well my theory about fastboot is correct.
I guess its obvious that versions of the axon 7 fastboot would be different.
The unlocked and the locked fastboot.
I'm going to hexdump and diff all the fastboot images i can find but so far it looks like this.
It seems that ZTE has used the same fastboot partition for a while.
If you boot into recovery on the blade x max and view the recovery log. Last log
You will find a list of all the parttion names on our device.
system
cache
persist
data
sdcard
boot
recovery
misc
aboot
apdp
bluetooth
carrier
cdt
cmnlib
cmnlib64
cryptkey
DDR
devcfg
devcfgbak
devinfo
dip
dpo
dsp
echarge
fastboot
fbop
fingerid
fsc
fsg
hyp
keymaster
keystore
lksecapp
mdtp
modem
msadp
persistent
pmic
reserve
rpm
sbl1
sec
splash
ssd
sti
tz
xbl
xblbak
ztecfg
tmp
Yep you can see we have the fastboot partition.
But the fbop partition is an important important one.
If we look at the updater scripts of the firmware upgrade packages we see.
FROM Partition.xml
<data><program SECTOR_SIZE_IN_BYTES="4096" file_sector_offset="0" filename="fastboot.img" label="fbop" num_partition_sectors="32" partofsingleimage="false" physical_partition_number="0" readbackverify="false" size_in_KB="128.0" sparse="false" start_byte_hex="0x321a8000" start_sector="205224"/></data>
FROM Update Zip
getprop("ro.product.device") == "ailsa_ii" || abort("E3004: This package is for "ailsa_ii" devices; this is a "" + getprop("ro.product.device") + "".");
assert(getprop("ro.product.name") == "P996A01_N");
ui_print("Target: ZTE/P996A01_N/ailsa_ii:7.1.1/NMF26F/20170301.161705:user/release-keys");
show_progress(0.650000, 0);
ui_print("Patching system image unconditionally...");
block_image_update("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
abort("E1001: Failed to update system image.");
show_progress(0.050000, 5);
package_extract_file("boot.img", "/dev/block/bootdevice/by-name/boot");
package_extract_file("ddr.img", "/dev/block/bootdevice/by-name/ddr");
package_extract_file("keymaster.mbn", "/dev/block/bootdevice/by-name/xblbak");
package_extract_file("lksecapp.mbn", "/dev/block/bootdevice/by-name/lksecapp");
package_extract_file("rpm.mbn", "/dev/block/bootdevice/by-name/rpm");
package_extract_file("tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("echarge.img", "/dev/block/bootdevice/by-name/echarge");
package_extract_file("mdtp.img", "/dev/block/bootdevice/by-name/mdtp");
package_extract_file("xbl.elf", "/dev/block/bootdevice/by-name/xbl");
package_extract_file("cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("adspso.bin", "/dev/block/bootdevice/by-name/dsp");
package_extract_file("recovery.img", "/dev/block/bootdevice/by-name/recovery");
package_extract_file("sec.dat", "/dev/block/bootdevice/by-name/sec");
package_extract_file("NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
package_extract_file("pmic.elf", "/dev/block/bootdevice/by-name/pmic");
package_extract_file("devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
package_extract_file("emmc_appsboot.mbn", "/dev/block/bootdevice/by-name/aboot");
package_extract_file("fastboot.img", "/dev/block/bootdevice/by-name/fbop");
package_extract_file("splash.img", "/dev/block/bootdevice/by-name/splash");
package_extract_file("hyp.mbn", "/dev/block/bootdevice/by-name/hyp");
package_extract_file("BTFM.bin", "/dev/block/bootdevice/by-name/bluetooth");
package_extract_file("cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlib");
show_progress(0.200000, 10);
show_progress(0.100000, 10);
format("ext4", "EMMC", "/dev/block/bootdevice/by-name/userdata", "0", "/data");
set_progress(1.000000);
Here we can conclude that the fastboot.img is flashed to the fob partition which is where the flags to enable the full fastboot commands. It's basically a security partition.
Is the Whole Partition different??
Is it just a few bytes difference??
Its actually not much and seeing that this identical partition has been used for several years
We can hope our fastboot image is the same or very similar. But remember it is the fob partition.
Here is the difference.
[email protected]:~$ hexdump -C -v /home/bigcountry907/Desktop/ZTE/FB-UL-EDL/A2017U_FASTBOOT_UNLOCK_EDL/fastboot.img > /home/bigcountry907/Desktop/ZTE/FB-UL-EDL/fbunlck.txt
[email protected]:~$ diff home/bigcountry907/Desktop/ZTE/FB-UL-EDL/fbunlck.txt /home/bigcountry907/Desktop/ZTE/stock/fbstock.txt
diff: home/bigcountry907/Desktop/ZTE/FB-UL-EDL/fbunlck.txt: No such file or directory
[email protected]:~$ hexdump -C -v /home/bigcountry907/Desktop/ZTE/FB-UL-EDL/A2017U_FASTBOOT_UNLOCK_EDL/fastboot.img > /home/bigcountry907/Desktop/ZTE/FB-UL-EDL/fbunlck.txt
[email protected]:~$ diff /home/bigcountry907/Desktop/ZTE/FB-UL-EDL/fbunlck.txt /home/bigcountry907/Desktop/ZTE/stock/fbstock.txt
257c257
< 00001000 01 00 00 00 78 56 34 12 00 00 00 00 01 00 00 00 |....xV4.........|
---
> 00001000 00 00 00 00 78 56 34 12 00 00 00 00 00 00 00 00 |....xV4.........|
579,595c579,595
< 00002420 62 6f 6f 74 02 02 20 00 04 82 01 00 04 e0 4f a3 |boot.. .......O.|
< 00002430 b8 c0 79 df 98 9a ce 8b 47 ed f6 23 61 e8 3e 4d |..y.....G..#a.>M|
< 00002440 7a 43 fc 4b d4 39 60 c5 5a a6 96 ea c0 4d e2 52 |zC.K.9`.Z....M.R|
< 00002450 27 3e b6 d0 21 72 72 c8 59 03 44 90 ff 4a 86 3b |'>..!rr.Y.D..J.;|
< 00002460 29 2c 16 7a 04 2b 36 07 6f 8f 04 8e 35 7c f2 9f |),.z.+6.o...5|..|
< 00002470 cc 29 e5 0b 74 30 e9 0c ec cd 23 4b 19 84 c7 d1 |.)..t0....#K....|
< 00002480 f7 46 9b 7d dc 8b 6b bb 01 d3 f0 0a ab 96 ca 7e |.F.}..k........~|
< 00002490 a2 6e 91 6b d9 38 d6 d6 2e 4f 50 3e 2d 17 55 e3 |.n.k.8...OP>-.U.|
< 000024a0 e5 50 e4 1f dc 03 26 9e e9 22 19 dc 60 e1 0b a0 |.P....&.."..`...|
< 000024b0 b5 06 25 bd e4 08 24 4f 7b dd 42 29 82 55 06 84 |..%...$O{.B).U..|
< 000024c0 a1 5f d7 c1 99 3f 83 30 5d 10 59 5e 9d 2a 31 3f |._...?.0].Y^.*1?|
< 000024d0 f9 87 54 55 1e 82 40 68 5b c8 e4 18 98 80 d1 ec |[email protected][.......|
< 000024e0 df d7 01 d1 ec a5 a2 e4 c1 86 76 63 e0 82 13 35 |..........vc...5|
< 000024f0 61 30 63 d7 cd e8 21 33 73 e9 c4 93 ad 65 68 77 |a0c...!3s....ehw|
< 00002500 3e eb 3e 90 8a bb 8b 07 1b 26 ff d5 0d 37 a4 6c |>.>......&...7.l|
< 00002510 ec c6 69 30 dd 22 1b 9f 69 79 47 69 22 ba 9e c8 |..i0."..iyGi"...|
< 00002520 0c 23 96 f8 cf 66 74 74 11 98 d6 e4 |.#...ftt....|
---
> 00002420 62 6f 6f 74 02 02 20 00 04 82 01 00 a8 e0 dd 69 |boot.. ........i|
> 00002430 5b b2 47 12 bf 74 41 7a 00 37 a0 b8 10 15 d4 4e |[.G..tAz.7.....N|
> 00002440 a6 59 74 9b 7d a4 df 95 eb 3f 1a 29 1c 60 23 7c |.Yt.}....?.).`#||
> 00002450 91 37 2a 07 d3 e9 45 17 ac ac ab a9 ba b4 42 70 |.7*...E.......Bp|
> 00002460 46 5f 67 22 f7 37 1f de 46 f9 67 44 74 d7 26 42 |F_g".7..F.gDt.&B|
> 00002470 49 9c e8 ee 98 78 89 2b b2 1e c3 58 a8 d2 3a 7f |I....x.+...X..:.|
> 00002480 39 7d 22 09 c6 01 c5 0f 95 65 57 1e af 79 d9 d6 |9}"......eW..y..|
> 00002490 8d 99 84 4f 24 ff 55 b2 b0 20 07 00 39 e6 9a 27 |...O$.U.. ..9..'|
> 000024a0 a0 bc 97 dd 27 7d f2 a2 88 b6 b5 53 4a ba 7a 8e |....'}.....SJ.z.|
> 000024b0 65 98 f6 ef 4d 7e 2e 91 01 66 35 9e e1 da 15 c4 |e...M~...f5.....|
> 000024c0 fe a4 d2 26 a1 99 88 a3 55 2f ac 65 71 f8 5f 86 |...&....U/.eq._.|
> 000024d0 a7 79 f8 b5 61 b5 da 2c 7b 89 39 3b ff 45 a3 7f |.y..a..,{.9;.E..|
> 000024e0 dc 92 d5 4e 8b df 68 c0 e9 43 18 7b 60 5a 03 60 |...N..h..C.{`Z.`|
> 000024f0 18 da 96 84 e7 97 a7 09 a9 1a 2d b6 5b d3 d2 f6 |..........-.[...|
> 00002500 c8 33 a2 8f ef 32 5e 6a 45 39 66 b5 a6 a4 35 0f |.3...2^jE9f...5.|
> 00002510 03 0c 9d 57 79 28 43 09 9a 3e 7b 01 8c 6e 66 b2 |...Wy(C..>{..nf.|
> 00002520 1a f3 3d 92 d1 66 91 04 4a 3e 79 69 |..=..f..J>yi|
[email protected]:~$ hexdump -C -v /home/bigcountry907/Desktop/ZTE/Fastboot-UL/fastboot.img > /home/bigcountry907/Desktop/ZTE/Fastboot-UL/fbul2.txt
[email protected]:~$ diff /home/bigcountry907/Desktop/ZTE/FB-UL-EDL/fbunlck.txt /home/bigcountry907/Desktop/ZTE/Fastboot-UL/fbul2.txt
[email protected]:~$
There's definitely more to come but this is enough to think about for now.
Here are all the partition block sizes and labels for the blade x max
30535680 mmcblk0 EMMC CHIP
4096 mmcblk0p1
4096 mmcblk0p2
4096 mmcblk0p3
4096 mmcblk0p4
4096 mmcblk0p5
4096 mmcblk0p6
4096 mmcblk0p7
16384 mmcblk0p8
16384 mmcblk0p9
16384 mmcblk0p10
4096 mmcblk0p11
4096 mmcblk0p12
4096 mmcblk0p13
4096 mmcblk0p14
4096 mmcblk0p15
4096 mmcblk0p16
4096 mmcblk0p17
4096 mmcblk0p18
32768 mmcblk0p19
4096 mmcblk0p20
94208 mmcblk0p21
65536 mmcblk0p22
65536 mmcblk0p23
4096 mmcblk0p24
4096 mmcblk0p25
4096 mmcblk0p26
4096 mmcblk0p27
4096 mmcblk0p28
4096 mmcblk0p29
4096 mmcblk0p30
4096 mmcblk0p31
4096 mmcblk0p32
4096 mmcblk0p33
32768 mmcblk0p34
4096 mmcblk0p35
4096 mmcblk0p36
4096 mmcblk0p37
4096 mmcblk0p38
65536 mmcblk0p39
4096 mmcblk0p40
4096 mmcblk0p41
4096 mmcblk0p42
4096 mmcblk0p43
65536 mmcblk0p44
1048576 mmcblk0p45 cache
5242880 mmcblk0p46 system
23629807 mmcblk0p47 data
4096 mmcblk0rpmb
31166976 mmcblk1 SD CARD
31165935 mmcblk1p1 SD CARD Storage

Old codehead (emphasis on the "old"), and I have this device... unfortunately, it's been updated, so there's not a whole lot I could offer...
With an at least rudimentary how-to provided, though... as long as I can get the device back to square-one, if things go tits-up and it's necessary... bitter experience... not a few Cricket LG G Stylo paperweights at hand... I'l like to offer myself as an alpha-tester for whatever you find out...
Just bought this lovely new home in Albuquerque, and, until a few things settle down, don't have a lot of cash... but I'll offer mine as a test-bed of sorts...
I'm fascinated with the work you are doing, and I really dig this phone for pretty much every reason except Cricket's bullheadedness, and am looking forward to watching you work...
I'm also kinda horrified that, seeing your log dumps upthread, I could actually understand it... can take the boy out of the tech, but some things seem to be stuck in the little grey cells forever.... *chuckle*
My tech chops tended more towards xBASE and Delphi, and still do... was what I learned, along with COBOL and RPig...
Have been trying, over the past few years, to get some C++ and Java under my belt, but it's more important to me to finish my BA in the up coming spring semester, and do UNM School of Law... Renaissance man wanna-be here... *grin*

Just wondering, good madam or sir, what progress you've been able to do... I don't mean to push, as we all have lives away from this forum (at least I do hope so.. *smile*), but, as I love to learn, and now in my 60's, found my Java, C and C++ texts, have downloaded and installed all my preferred tools, and would just really dig seeing some journaling of your progress on this rather fascinating device... more internal RAM than I would have ever expected on a smart phone, and, as such, space is not at such a premium that I'm required to use Apps2SD Pro (although I paid for it), Titanium (although I paid for it), but just damn...
I'm disgusted that Cricket would be so paranoid against their paying customers that they insist on absolute control... just damn...
Sorry... woolgathering on a Friday afternoon, while installing other dev tools... <smile>

Firmware update downloaded
My phone has the firmware downloaded please let me know if there is a way to pull it for R&D
---------- Post added at 03:31 AM ---------- Previous post was at 02:55 AM ----------
This phone just force installed nevermind

Update not installed
I have the update downloaded but not installed. The phone is trying to force update but it can't because my battery is too low, I'll try and leave it that way. Do we have a way to find and extract the update?

Scratch that. Force install starts at 20% battery or so. Accidently over charged haha.

We need to post the way to pull the update
We need to post a way to extract the update so that the next person who has it but it is not installed can pull it for us any help from more experienced individuals would be greatly appreciated

Update ready to dl
Any ideas how to pull it from the phone

If you have an update.zip signing bypass, I could leverage that to get a dump of the partition table.

Z983 Root Method Development
Hello world of XDA,
We want to root this device. Yes? Well, as of right now, 01-27-2018, there is no working method available on the internet. We have to do this ourselves. Ive rooted literally hundereds of phones, but this one, Crickets down played version of the Blade Zmax, re-dubbed Blade XMax Z983..
First, we need the boot loader. I am willing to team up with some people, to make this happen. Any takers?

Has anyone been able to get the last update files, about a week ago i think, off the phone before applying the update. If anyone has those we may be in business, at least further along than we were. That last update was a decent size update, and if it had anything to do with the spectre/meldown patch, that update would have had the partition layout, how the bootloader has been hidden and so on and so fourth. So if anyone was able to grab the update please post here, as the thread creator and a few others seem to know what to do from there.

Can I start by modifying tye system UI apk?

Hey so I've got this device and it's FRP locked. If anybody is willing to work on this still these days (for root, frp, various unlocks, etc) then let's make it happen. Can't say for sure if I'll have the device for very long, but I'm definitely down to try while I have it. Lmk if there's anything I can do to help the progress.

dammi.forza0910 said:
Hello world of XDA,
We want to root this device. Yes? Well, as of right now, 01-27-2018, there is no working method available on the internet. We have to do this ourselves. Ive rooted literally hundereds of phones, but this one, Crickets down played version of the Blade Zmax, re-dubbed Blade XMax Z983..
First, we need the boot loader. I am willing to team up with some people, to make this happen. Any takers?
Click to expand...
Click to collapse
You know how bad I wish I could take you up on this? I just don't have the experience or the knowledge. I'd love to learn but I don't even know where to start.

Okay, so I have successfully copied the boot animation.zip and have attatched it as proof. I believe, i can actuall copy the firmware because I found the file locatiom after an exhausting amount of trial and error with different approaches. Usong Debian (wheezy) ,and a combination of file explores, and modifying apk's through luck patcher, I was able to view the device tree and so on. Anybody willing to guide me to the next step?

Z983 Firmware .img files found and uploaded
Okay, I found the firmware files and when I moved them to my external SD card, they combined automatically and was labled update.zip. This is it guys, help me!

Device Tree
Can anyone let me know if this is helping, or if everyone gave up....?

dammi.forza0910 said:
Okay, I found the firmware files and when I moved them to my external SD card, they combined automatically and was labled update.zip. This is it guys, help me!
Click to expand...
Click to collapse
Downloading the files when I get off work and will look at them as best I can, maybe we can get the bootloader to show up in the recovery, Cricket did something to the flags that bypasses the bootloader, maybe we can reflag and get it to show up again. Good work, hopefully some progress can be made now.

Related

[NEED HELP!!!]Debranding method by replacing two files is no longer working for x10

SEUS has just updated their program so instead of seeing a long file like this "FILE_277344675_1271909822000_1271909822000_277398125_114906833_INFILE_LONGTERM" , instead of that, it is shortened like this "FILE_277398125".
After overwriting the two files according to the tutorial, the SEUS keeps downloading the firmware files over the ones which have been overwritten.
I thought the SEUS is OK last weekend, but now, they changed their program. Anyone tried and find a solution for this issue?
Man im stuck with the same problem...someone pls help !!
Use Omnius instead? Quick and easy to use.
Download
Set up account online
Enter account details in Omnius
Then follow instructions below on how to flash
http://forum.xda-developers.com/showpost.php?p=6789689&postcount=324
Hope this helps.
wingz85 said:
Use Omnius instead? Quick and easy to use.
Download
Set up account online
Enter account details in Omnius
Then follow instructions below on how to flash
http://forum.xda-developers.com/showpost.php?p=6789689&postcount=324
Hope this helps.
Click to expand...
Click to collapse
yea ur intrustions are for the the SIn reconstructions, what if i want to reinstal using my bak ups from the seus dump (blog.fs) before i debranded??
exekias said:
yea ur intrustions are for the the SIn reconstructions, what if i want to reinstal using my bak ups from the seus dump (blog.fs) before i debranded??
Click to expand...
Click to collapse
i have the same problem . i want brand to my original A1(Austria) branded files.
now i have R2BA023 root + market fix.
and i have the 2 original A1 files ( File_ xxxxxxxxxxxxxxx_infile_longterm).
but how does omnius work with those files?
what is the application file and what the customize file?
kind regards DauL
can someone help me`` how to flash rooted phone back to A1 ( Austria) branded witfh omnius ? i have the two original files, but i dont know which file i should take for the application and the customize file
kind regards
wingz85 said:
Use Omnius instead? Quick and easy to use.
Download
Set up account online
Enter account details in Omnius
Then follow instructions below on how to flash
http://forum.xda-developers.com/showpost.php?p=6789689&postcount=324
Hope this helps.
Click to expand...
Click to collapse
Hi,Thank you for your sugestion. However, I am still failed to flash by Omnius.
Finally got error and Yellow exclamation mark on my phone after reboot it.
Here is the result after I flash the x10 with Omnious.
Code:
Action journal
22:29:08 Flash
22:29:08 Allows to change languages supported by the phone and upgrade its firmware.
22:29:08 Operating system: Microsoft Windows XP Professional Service Pack 3 (build 2600)
22:29:08 Application version: 0.07.2279 (beta)
22:29:08 . The action name is 'Flash'
22:29:08 Selected phone type: Xperia™ X10
22:29:08 i Instructions
22:29:08 i 1. Make sure the phone battery is charged to at least 50%.
22:29:08 i 2. Switch off the phone!
22:29:08 i 3. Remove the phone battery and wait at least 5 seconds before reinserting it!
22:29:08 i 4. Press and hold the return back button, then connect the cable to the phone!
22:29:08 . The action started waiting for the user
22:29:25 . The action finished waiting for the user
22:29:25 Connecting via SEMC USB Flash Device (USB3)...
22:29:25 Device driver version: 2.2.0.5
22:29:25 Detected chipset: QSD8250
22:29:25 Boot mode: EROM
22:29:25 IMEI: [email protected]@@
22:29:25 Sending loader...
22:29:26 Establishing connection to the server...
22:29:29 Receiving news...
22:29:34 i No news
22:29:34 Actual credit: 0.00
22:29:40 Writing file phone.zip...
22:30:18 Writing file X10i_GENERIC_1234_8465R8A_R1FB001.zip...
22:33:38 e Failed!
22:33:38 . The action entered shutdown phase
22:33:38 . The action reported failure
Error code
# E39CDD9F86C3082E
Error details
---
61 C6 C0 A4 65 CB CD 00 FF 08 E1 72 F3 9F B5 AE
13 9B E7 8D E5 86 63 FA 78 BD E4 7E ED 5F 85 68
09 52 D0 4B 3E 18 6D E0 61 94 3A D6 3F 7D 06 ED
11 DB BB C5 11 03 FE 12 A2 17 E5 DB 4F B0 1E 0D
C5 5C E6 DF 47 8B A0 93 02 E4 6C 19 80 4D 59 91
46 C1 3B 15 F6 69 01 6B CA 64 A3 13 2E 26 7A 7C
7E AD 9A 9E 1D EB 00 E8 80 F0 7A 96 0F 25 D0 BA
D5 FD 93 6D 4B 5B 30 D9 6C D7 4D 92 B4 C0 04 64
F7 56 66 50 2A AA 3B E5 F3 13 07 8D EE A3 41 61
48 50 E9 72 04 6F 71 F5 55 D4 0A 0C 6D 2F 05 E8
77 58 E8 34 2A 17 BD A1 E1 9A FF 0A ED 48 D5 09
C7 38 25 15 95 C7 43 B0 6F 20 0C E7 BD 5C 0B 29
17 8E 39 EE F3 F9 7F 69 EF 5B A1 DC B3 74 21 FF
19 DE A7 ED 25 46 5D DE 0F B6 8F 34 FD F2 BB 58
E7 3F D9 C4 D5 24 2D E1 A1 DA BF 44 5B 79 BB 34
F9 22 57 42 85 66 03 14 99 C1 7C 7F
---
It still works via SEUS but some steps have changed due to the new SESU release.
Follow THIS revised tutorial and all will work again.
I know it works as I have been doing it and even used this yesterday.
Candy[MAN] said:
It still works via SEUS but some steps have changed due to the new SESU release.
Follow THIS revised tutorial and all will work again.
I know it works as I have been doing it and even used this yesterday.
Click to expand...
Click to collapse
Yes, I know the new method. however, I have already bricked my x10 and now it show me a Yellow exclamation mark after rebooting.
I have tried the new method, it did not work for my case.

Can't boot. Bricked?

Hi guys,
I have a major problem with my X10. Everything worked fine til I tried to update...
I wanted to update from 024 to 026. Battery seemed to be full enough. My PC crashed during update. Ever since then I can't turn on my phone.
I reloaded the battery with an extra charger.
Tried to repair with SEUS and PC Companion. Fails every time.
Tried to falsh the 016 with the flashtool. Said ist was successful, but still can't turn the phone on.
Then tried to falsh with Omnius and got the following error
Code:
Action journal
20:55:32 Flash
20:55:32 Allows to change languages supported by the phone and upgrade its firmware.
20:55:32 Operating system: Microsoft Windows XP Home Edition Service Pack 3 (build 2600)
20:55:32 Application version: 0.06.2254 (beta)
20:55:32 . The action name is 'Flash'
20:55:32 Selected phone type: Xperia™ X10
20:55:32 i Instructions
20:55:32 i 1. Make sure the phone battery is charged to at least 50%.
20:55:32 i 2. Switch off the phone!
20:55:32 i 3. Remove the phone battery and wait at least 5 seconds before reinserting it!
20:55:32 i 4. Press and hold the return back button, then connect the cable to the phone!
20:55:32 . The action started waiting for the user
20:55:45 . The action finished waiting for the user
20:55:45 Connecting via SEMC USB Flash Device (USB2)...
20:55:45 Device driver version: 2.2.0.5
20:55:45 Detected chipset: QSD8250
20:55:45 Boot mode: EROM
20:55:45 IMEI: 35941903598910
20:55:45 Sending loader...
20:55:46 Establishing connection to the server...
20:55:52 Receiving news...
20:55:55 i No news
20:55:56 Actual credit: 0.00
20:56:04 Writing file R6A_R1FA016_FSP_X10i_CUST_DE_GENERIC_1235_7836_S1_SW_LIVE_AC12_0001_S1_PARTITION_WITH_SPARE.zip...
20:59:04 Writing file R1FA016_APP_SW_RACHAEL_GENERIC_1227_4612_S1_SW_LIVE_AC12_0001_S1_PARTITION.zip...
20:59:18 e Failed!
20:59:18 . The action entered shutdown phase
20:59:18 . The action reported failure
Error code
# E39CDD9F86C3082E
Error details
---
72 3A 36 32 AB 29 89 AE 99 F2 EB 82 13 5B 1F 88
EF E5 43 43 D5 28 39 14 A0 C3 90 D4 13 71 91 2A
2F 1A 9D FA A5 F3 E9 9C D6 52 25 A7 73 40 BF C6
96 EB 18 70 75 B8 67 70 4C 86 89 19 0E 95 A7 0F
23 85 57 AB 78 7A 04 2F 6D 73 79 08 E8 A5 F3 88
1E FF 1F DF B8 CB C4 FC 1A 09 C8 D5 AF A9 0E D5
A3 ED F0 7D C7 43 12 1C D5 03 98 A2 8C 54 48 B9
22 46 45 FF 18 30 F8 E8 0C C6 39 BD D8 A2 E3 D5
F5 D5 0D F3 36 D1 4A EF C5 C2 FC 84 F2 8C BF 7E
1E 08 F2 02 23 CD 35 F7 8F E5 D8 C7 49 59 7E 38
71 0A 82 FB 49 2D 0D 2C 7C 64 5B 2B F3 C0 3F 30
50 6C 0C 7F 5B F9 E7 82 77 5A A5 D2 DD 6B 8F 24
E0 D9 2D 93 C5 D8 37 E4 7A B7 75 E4 FD 41 21 5A
C1 36 AB AD 67 B1 D7 BF 29 CC FB 10 D7 37 AF CA
C1 ED 23 52 65 F6 29 CE F9 DC B5 8A B3 80 2F 2B
9F 1C 73 CC CB 09 D9 3E C9 14 6D 34 B3 DC 31 0A
31 02 C3 32 FB 1C 41 05 F4 D7
---
Still can't turn the phone on.
Do you have any idea what happened and how I can fix that?
By the way, I do not get the yellow exclamation mark, I get nothing...
Phone vibrates and the greed LED goes on shortly and then: nothing!
Anybody who had that problem and solved it somehow?
Your PC crashed during the update? Good lord...
If the bootloader is corrupt you're out of luck.
How can I find out, if the bootloader is ok?
I can get it into flashmode, but after flashing it won't turn on.
Hi.
You could try one of the methods to root your phone which will also update it to 026. - forum.xda-developers.com

[TOOL] Deodex ICS

Hi
I have slightly modified Daneshm90's deodexer script to be able to deodex honeycomb and ICS roms. this only works for honecomb and ICS.
just place the contents of system/app in the app folder and the contents of the system/framework in the framework folder and run deoall.bat and choose option 1.
i dont know if this works as i dont have ICS and i need tester with ICS rooted and if anything happens to your phone or tablet it is not my responsibility.
please give any feedback.
if you can help then please dont hesitate.
please, i didnt do much its Daneshm90 that made the effort.
http://www.multiupload.com/B5OAAPD9JZ
i have an isc beta running on my sgs i9000
ill give it a go and report back
any one confirm this works with a honeycomb ROM? thanks for this script/tool.
Does not work on ICS
api level
for smali/baksmali 1.3.0 you must set api level see list
suc6
Android 4.0.3 =====> 15 <==== ICE_CREAM_SANDWICH_MR1 Platform Highlights
Android 4.0, 4.0.1, 4.0.2 =====> 14 <===== ICE_CREAM_SANDWICH
Android 3.2 =====> 13 <==== HONEYCOMB_MR2
Android 3.1.x =====> 12 <===== HONEYCOMB_MR1 Platform Highlights
Android 3.0.x =====> 11 <===== HONEYCOMB Platform Highlights
java -Xmx512m -jar baksmali-1.3.0.jar -a 15 -d framework -d app -d deodexed_APK -d deodexed_JAR -x "%~dp0app\%~n1.odex"
java -jar smali-1.3.0.jar -a 15 out -o "%~dp0temp_%~n1\classes.dex"
When deodexing a Honeycomb or earlier odex file, you must specify an api level. Quoted from JesusFreke
You shouldn't have to use the api option on ICS however it shouldn't hurt anything.
So this is working for 4.0.3?
==>So this is working for 4.0.3?<==
It worked for me in dsixda's kitchen when I specified api level 15, no errors occured
sparkienl said:
==>So this is working for 4.0.3?<==
It worked for me in dsixda's kitchen when I specified api level 15, no errors occured
Click to expand...
Click to collapse
Not working with samsung galaxy s2 XXKP8 ics
do it through hex editor
m!k3 said:
Not working with samsung galaxy s2 XXKP8 ics
Click to expand...
Click to collapse
ur wright it's not working with a lot of versions of the smali/baksmali,
but you can always do it by hand with a hex editor, remove the head and tail of the .odex file and rename it to classes.dex file
sparkienl said:
ur wright it's not working with a lot of versions of the smali/baksmali,
but you can always do it by hand with a hex editor, remove the head and tail of the .odex file and rename it to classes.dex file
Click to expand...
Click to collapse
Thanks for that handy tidbit, I didn't know about that.
tidbit
Delgoth said:
Thanks for that handy tidbit, I didn't know about that.
Click to expand...
Click to collapse
Here is an howto for manipulating .odex files with an hex editor.
Open the .odex file with an hex editor like HxD.exe
Search for this: "64 65 78 0A 30 33 35" or "dex.035"
You will find something like this:
"64 65 79 0A 30 33 36 00 28 00 00 00 AC 56 00 00 D8 56 00 00 0E 02 00 00 E8 58 00 00 A8 05 00 00 00 00 00 00 50 66 70 E9 64 65 78 0A 30 33 35"
All before "64 65 78 0A 30 33 35" or "dex.035" you must also delete.
The new head starts also here :"64 65 78 0A 30 33 35 00 D9 31 66 0D D8 BC DE 57 94 07 9C DA C5 1D F3 AD" or "dex.035.Ù1f.ؼÞW”.œÚÅ.ó."
Search for the tail with this:"2F 73 79 73 74 65 6D 2F 66 72 61 6D 65 77 6F 72 6B 2F 63 6F 72 65 2E 6F 64 65 78 00" or "/system/framework/core."
Count an extra 24 hex for your find and now remove the tail from that point on
You will then find something like this:
"1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24" extra 24 hex
"00 00 00 00 76 B7 77 3F 49 0E 2A 24 1B 00 00 00 09 00 00 00 1C 00 00 00 2F 73 79 73 74 65 6D 2F 66 72 61 6D 65 77 6F 72 6B 2F 63 6F 72 65 2E 6F 64 65 78 00"
^ delete the tail from here and rename the rest of the .odex file classes.dex
sparkienl said:
ur wright it's not working with a lot of versions of the smali/baksmali,
but you can always do it by hand with a hex editor, remove the head and tail of the .odex file and rename it to classes.dex file
Click to expand...
Click to collapse
which version of smali/baksmali are you using?
version
m!k3 said:
which version of smali/baksmali are you using?
Click to expand...
Click to collapse
I tried version 1.2.3/1.26/1.2.8 and 1.3.0 on your file "Not working with samsung galaxy s2 XXKP8 ics" but they didn't work for me.
USE THE UPDATED SMALI/BAKSMALI 1.3.2 WITH -a 15 and it will deodex your file
Trying to deodex some honeycomb...how do I change the api. I tried what was listed above, but did not work for me.
Thanks for any help.
pashinator said:
Hi
I have slightly modified Daneshm90's deodexer script to be able to deodex honeycomb and ICS roms. this only works for honecomb and ICS.
just place the contents of system/app in the app folder and the contents of the system/framework in the framework folder and run deoall.bat and choose option 1.
i dont know if this works as i dont have ICS and i need tester with ICS rooted and if anything happens to your phone or tablet it is not my responsibility.
please give any feedback.
if you can help then please dont hesitate.
please, i didnt do much its Daneshm90 that made the effort.
http://www.multiupload.com/B5OAAPD9JZ
Click to expand...
Click to collapse
not working in N7000
Please help me
Thanks
could you reupload the file? I can't download it..
Use dsixda kitchen and set the API level to 15 it will deodex without any problem. I done it successfully with my ICS ROM.

[Q] compressed XPRS image and WinCE 6.0 in qemu/emulator ?

Hi,
from the firmware upgrade of an ARM9 Windows Embedded CE 6.0 Device, I was able to extract a number of files, including the kernel image (NK.BIN.COMP).
However, with tools such as osnbtool, ImgfsToDump or ImgFsTools I was unable to decompress the image.
The image starts with:
Code:
00000000 58 50 52 53 e7 8b 26 01 16 89 00 00 05 00 01 00 |XPRS..&.........|
00000010 42 30 30 30 46 46 0a 00 10 36 80 50 10 2b 01 39 |B000FF...6.P.+.9|
00000020 00 04 00 00 00 eb 01 00 00 fe 03 00 ea 40 78 00 |[email protected]|
00000030 08 78 00 00 00 05 00 63 03 00 00 45 43 45 43 7c |.x.....c...ECEC||
00000040 f6 60 81 48 1c 01 8d 18 01 7c e6 2a 01 00 20 36 |.`.H.....|.*.. 6|
00000050 80 64 de 00 00 11 c5 47 00 02 04 00 00 d3 00 a0 |.d.....G........|
00000060 e3 00 f0 21 e1 0c 00 9f e5 10 0f 01 ee 87 15 00 |...!............|
00000070 eb 83 18 00 f8 37 00 ea 78 10 00 c0 b0 01 00 10 |.....7..x.......|
00000080 80 97 0a 7c 75 97 4e 39 00 02 18 00 20 18 00 08 |...|u.N9.... ...|
00000090 66 18 00 5a b8 00 d8 02 b9 00 07 00 0f 0f 6b 65 |f..Z..........ke|
000000a0 72 6e 65 6c 2e 64 6c 6c 7b 00 33 40 00 00 c4 04 |rnel.dll{[email protected]|
000000b0 4b 00 01 41 44 00 50 10 40 09 05 59 00 4c 53 5a |[email protected]|
000000c0 00 78 20 03 59 00 ec 10 29 80 f0 08 04 01 4b 5a |.x .Y...).....KZ|
000000d0 00 5a 03 04 52 54 58 00 39 81 00 00 81 24 0b 90 |.Z..RTX.9....$..|
000000e0 5f 00 c9 d0 5f 00 30 4c e0 5b 00 86 11 00 13 ba |_..._.0L.[......|
000000f0 50 58 00 44 4c 00 0b 10 20 00 cc a0 00 00 05 4e |PX.DL... ......N|
I suppose this is the Xpress compression format that is used in Win CE 6.0 ?
Are there any tools available that can decompress this image ?
Also, I would like to know which emulators you use to test out Win CE images.
I tried qemu-system-arm with the ARM926EJ-S core emulation, but it didn't work so far.
Ultimately, I would like to be able to boot into the image I extracted from the firmware upgrade and start a remote debugger inside the image, so that I can step through the code.
cheers,
knossos2
Hi,
as I already knew that the image was a Windows Embedded CE 6.0 image, I installed Platform Builder and other required development components.
My plan was to find out how the NK.BIN.COMP image is decompressed by the WinCE 6.0 loader.
It turned out, that the file had just been compressed with the WinCE 6.0 bincompress.exe tool (PUBLIC/COMMON/OAK/BIN/I386/bincompress.exe).
Although at least some of the tools I tried previously had compression support by using the WinCE libraries, it didn't work.
My best guess is that the libraries were for older versions of WinCE and thus it didn't work.
So, if you ever see "XPRS" at the start of a WinCE file, it has been compressed with bincompress.exe
I'm now trying to run the decompressed image either in qemu or in the MS Device Emulator.
I guess the Device Emulator will be the easier way.
Cheers,
knossos2

[WIP]Boot Logo Modification

The Boot logo is in the sboot.bin
from 5960D0 where the FF D8 part come and it ends at 59E80 where the FF D9 part comes.
The Images where generated with Photoshop 3.0.
This can be replaced carefully to replace the boot logo.
Try pasting this in a hex editor to see the image.
FF D8 FF E0 00 10 4A 46 49 46 00 01 01 01 00 48 00 48 00 00 FF E1 07 A0 45 78 69 66 00 00 4D 4D 00 2A 00 00 00 08 00 0C 01 00 00 03 00 00 00 01 02 D0 00 00 01 01 00 03 00 00 00 01 05 00 00 00 01 02 00 03 00 00 00 03 00 00 00 9E 01 06 00 03 00 00 00 01 00 02 00 00 01 12 00 03 00 00 00 01 00 01 00 00 01 15 00 03 00 00 00 01 00 03 00 00 01 1A 00 05 00 00 00 01 00 00 00 A4 01 1B 00 05 00 00 00 01 00 00 00 AC 01 28 00 03 00 00 00 01 00 02 00 00 01 31 00 02 00 00 00 1C 00 00 00 B4 01 32 00 02 00 00 00 14 00 00 00 D0 87 69 00 04 00 00 00 01 00 00 00 E4 00 00 01 1C 00 08 00 08 00 08 00 0A FC 80 00 00 27 10 00 0A FC 80 00 00 27 10 41 64 6F 62 65 20 50 68 6F 74 6F 73 68 6F 70 20 43 53 35 20 57 69 6E 64 6F 77 73 00 32 30 31 32 3A 30 39 3A 30 35 20 31 36 3A 31 34 3A 31 35 00 00 04 90 00 00 07 00 00 00 04 30 32 32 31 A0 01 00 03 00 00 00 01 FF FF 00 00 A0 02 00 04 00 00 00 01 00 00 02 D0 A0 03 00 04 00 00 00 01 00 00 05 00 00 00 00 00 00 00 00 06 01 03 00 03 00 00 00 01 00 06 00 00 01 1A 00 05 00 00 00 01 00 00 01 6A 01 1B 00 05 00 00 00 01 00 00 01 72 01 28 00 03 00 00 00 01 00 02 00 00 02 01 00 04 00 00 00 01 00 00 01 7A 02 02 00 04 00 00 00 01 00 00 06 1E 00 00 00 00 00 00 00 48 00 00 00 01 00 00 00 48 00 00 00 01 FF D8 FF DB 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0A 0C 14 0D 0C 0B 0B 0C 19 12 13 0F 14 1D 1A 1F 1E 1D 1A 1C 1C 20 24 2E 27 20 22 2C 23 1C 1C 28 37 29 2C 30 31 34 34 34 1F 27 39 3D 38 32 3C 2E 33 34 32 FF DB 00 43 01 09 09 09 0C 0B 0C 18 0D 0D 18 32 21 1C 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 FF C0 00 11 08 00 78 00 43 03 01 21 00 02 11 01 03 11 01 FF C4 00 1F 00 00 01 05 01 01 01 01 01 01 00 00 00 00 00 00 00 00 01 02 03 04 05 06 07 08 09 0A 0B FF C4 00 B5 10 00 02 01 03 03 02 04 03 05 05 04 04 00 00 01 7D 01 02 03 00 04 11 05 12 21 31 41 06 13 51 61 07 22 71 14 32 81 91 A1 08 23 42 B1 C1 15 52 D1 F0 24 33 62 72 82 09 0A 16 17 18 19 1A 25 26 27 28 29 2A 34 35 36 37 38 39 3A 43 44 45 46 47 48 49 4A 53 54 55 56 57 58 59 5A 63 64 65 66 67 68 69 6A 73 74 75 76 77 78 79 7A 83 84 85 86 87 88 89 8A 92 93 94 95 96 97 98 99 9A A2 A3 A4 A5 A6 A7 A8 A9 AA B2 B3 B4 B5 B6 B7 B8 B9 BA C2 C3 C4 C5 C6 C7 C8 C9 CA D2 D3 D4 D5 D6 D7 D8 D9 DA E1 E2 E3 E4 E5 E6 E7 E8 E9 EA F1 F2 F3 F4 F5 F6 F7 F8 F9 FA FF C4 00 1F 01 00 03 01 01 01 01 01 01 01 01 01 00 00 00 00 00 00 01 02 03 04 05 06 07 08 09 0A 0B FF C4 00 B5 11 00 02 01 02 04 04 03 04 07 05 04 04 00 01 02 77 00 01 02 03 11 04 05 21 31 06 12 41 51 07 61 71 13 22 32 81 08 14 42 91 A1 B1 C1 09 23 33 52 F0 15 62 72 D1 0A 16 24 34 E1 25 F1 17 18 19 1A 26 27 28 29 2A 35 36 37 38 39 3A 43 44 45 46 47 48 49 4A 53 54 55 56 57 58 59 5A 63 64 65 66 67 68 69 6A 73 74 75 76 77 78 79 7A 82 83 84 85 86 87 88 89 8A 92 93 94 95 96 97 98 99 9A A2 A3 A4 A5 A6 A7 A8 A9 AA B2 B3 B4 B5 B6 B7 B8 B9 BA C2 C3 C4 C5 C6 C7 C8 C9 CA D2 D3 D4 D5 D6 D7 D8 D9 DA E2 E3 E4 E5 E6 E7 E8 E9 EA F2 F3 F4 F5 F6 F7 F8 F9 FA FF DA 00 0C 03 01 00 02 11 03 11 00 3F 00 F9 FE 8A 00 28 A0 02 8A 00 28 A0 02 8A 00 28 A0 02 8A 00 28 A0 02 8A 00 28 A0 02 8A 00 28 A0 02 8A 00 28 A0 02 8A 00 28 A0 02 8A 00 28 A0 02 8A 00 28 A0 09 AD 6D 67 BD B9 8E DA DA 33 2C F2 1C 24 6B D5 CF 60 07 72 7A 00 39 27 00 64 9A 96 5D 32 F2 25 95 FE CE CF 14 53 FD 99 A6 8B 12 45 E6 73 85 0E B9 56 27 69 23 04 E4 0C 8C 8A 00 82 78 26 B5 B8 96 DE E2 29 21 9E 27 29 24 72 29 56 46 07 04 10 79 04 1E 31 4C 20 8E A0 8A 00 4A 28 00 A2 80 0A 28 03 43 46 B3 B8 BE BF 68 ED 8C 22 48 ED E7 B8 3E 72 06 5D B1 44 F2 30 C1 04 13 B5 0E 38 EB 8E 9D 6B AC 8B 51 F1 97 89 2D 35 2D 42 6B 89 E4 96 CE 68 B5 36 0B 60 83 74 88 8F 22 CA EF B4 2A AA C5 BC 8C 93 9C C6 A1 48 E5 40 19 26 8F 7D AD F8 EB 52 F0 D5 ED CB C9 05 9D EC AB 71 7D 67 A3 AC B2 C6 B1 7E E5 58 24 63 78 8F 84 51 1A 9D AB 9E 07 15 9D 75 A3 34 9A 34 3A A6 A8 D3 DA 43 69 32 E9 77 09 16 96 B1 BC 73 2B 12 55 B9 45 76 F2 C3 12 49 DF B9 42 B0 00 87 20 0D B0 F0 87 DB 3C 4D 6B A0 CB A9 DA DB 5C 4B 6B 24 D3 4E EE 8F 04 0C B1 BC 8B 99 51 8A B2 14 54 25 C1 F9 77 9E 0E DE 75 53 E1 8D D8 D4 F4 FB 2B 8D 4E 0B 59 6E EE 2D ED FC 89 A1 91 6E 15 DE 2B 79 25 F9 36 ED FD D8 B9 5C 86 75 27 69 C0 CF 14 01 9B 79 E0 3D 4A DB C3 53 78 86 1B 9B 6B BD 2E 30 1D 6E 21 8E 70 92 21 90 47 B9 59 E3 55 E2 42 57 69 21 F8 2D B4 AE 18 D6 F1 1F 86 3F E1 1F F3 BF D3 3C FF 00 2B 55 BD D3 7F D5 6C CF D9 FC AF 9F A9 FB DE 6F 4E D8 EA 73 C0 07 3F 45 00 4D 69 77 35 8D D4 77 36 EC 16 58 CE 46 E5 0C A4 74 21 94 82 19 48 C8 20 82 08 24 10 41 AB 97 7A FE A3 7D 7B 15 D5 CC B1 C8 D1 48 25 8E 1F 22 31 0A B0 54 5E 22 0B E5 E3 6C 68 08 DB 82 14 02 0D 00 2E A3 E2 0D 43 56 89 52 F1 ED DD 81 CB CA 96 B1 47 2C A7 B9 92 45 50 F2 12 46 49 72 49 3C 9E 79 A8 2E 35 6B FB A3 21 9A EE 57 69 50 A4 CF BB 0D 30 32 79 A7 CC 3D 5C EF F9 B2 D9 39 03 D0 60 01 FA 32 EA 0F A9 2C 5A 67 FC 7C CB 14 B1 1C ED 00 46 D1 B2 C8 58 B7 0A A1 0B 12 C7 01 46 4E 46 32 35 A1 F1 0F 8B 35 8D 4A 2B 08 B5 1B 99 6F AF 67 82 24 F9 D5 24 32 A7 96 91 FC E7 05 4E 63 8B 27 23 71 8D 0B 12 54 10 00 FB 97 F1 35 E0 B7 49 AC ED 9C 33 C7 2D AC 62 CA DF E6 27 63 2C 50 A8 5E 41 F3 D1 8C 29 C7 EF 0B 32 F2 4D 37 C5 97 FE 25 BC 8B 4F 7F 10 A4 48 B7 6A FA 8D BE CB 68 61 32 89 88 0D 2B 08 D4 12 5B CB 1C B7 24 01 DA 80 39 9A 28 00 A2 80 0A 28 02 C5 8D F5 C6 9D 79 1D D5 AC 9E 5C C9 90 09 50 C0 82 08 65 65 39 0C A4 12 0A 90 41 04 82 08 34 FB 7D 4E EE D3 58 8B 55 B6 74 86 F2 1B 81 73 1B 24 4A AA 92 06 DC 08 40 36 80 0F 6C 63 B6 31 40 12 5D EB 7A 9D F6 A8 9A A5 C5 EC CF A8 26 C2 B7 41 B6 CB B9 00 0A C5 87 25 86 07 CC 79 E3 AD 49 AB 78 83 53 D7 22 B4 8F 51 9D 26 5B 34 68 E0 22 14 42 88 5B 76 C0 54 03 B0 12 76 AF 45 1C 28 03 8A 00 CC A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 00 A2 80 0A 28 03 FF D9
Click to expand...
Click to collapse
A similar image was found at 5A6F0-5AE70.
JPEGs start with FF D8 and end with FF D9.
The files I used/generated are attached bellow.
I will update the thread if I make any progress.
Nice,maybe its a stupid question,but will this work without root? Is there a way to replace the actual sboot on my non rooted phone?
Sent from my GT-N7100 using XDA Free mobile app
note2nooby said:
Nice,maybe its a stupid question,but will this work without root? Is there a way to replace the actual sboot on my non rooted phone?
Sent from my GT-N7100 using XDA Free mobile app
Click to expand...
Click to collapse
I have found something in /dev/block/param. Replacing sboot.bin is risky. I will update the thread as soon as things start getting clear. Replacing Param will not work without root.

Categories

Resources