Again as I said there should be a way to flash whatever we wanted without a signature check. Unfortunately we don't know the protocol.ah I really forget it , sorry .
QHSUSB_DLOAD is different . I don't know about that .
Again as I said there should be a way to flash whatever we wanted without a signature check. Unfortunately we don't know the protocol.ah I really forget it , sorry .
QHSUSB_DLOAD is different . I don't know about that .
We know.Again as I said there should be a way to flash whatever we wanted without a signature check. Unfortunately we don't know the protocol.
That's pretty good... Hmmm... If we knew how to extract the partitions from the .ffu file... Is that known?
yes, ffu extracting is possible too.That's pretty good... Hmmm... If we knew how to extract the partitions from the .ffu file... Is that known?
We could just flash a modified version of the ROM... We should get serious about this. It's a good start.
So what is stopping us?yes, ffu extracting is possible too.
took some time to search around again...
hmm, the file MMOS.WIM\Windows\ImageUpdate\DeviceLayout.xmlYou can create your own MBN and HEX file ... can not remember if the HEX file containing the boot or partition ... but one of the two must be ... you can create bootable taking the files, I have them all I posted this link, and is a tutorial to create , try if you can do, my knowledge does not allow me do it and I need help finding good people like you, thanks
http://m.blog.csdn.net/blog/ziyouwa/16331751
the problem is ... '' size '', '' type '' ... these values should be according to our team .. and i don't understand, should investigate further
Edit: the .mbn containing the boot files
''8xxx_msimage.mbn is released in SW by default, actually, it includes the all the boot images and partition table there. MPRGxxxx.hex will download this image and reset to mass-storage mode.''
![]()
Let's go ... infinity box with dongle makes this next procedure to recover the boot and turn the phone on red screen:
Write [GPT]: Ok
Write [SBL1]: Ok
Write [SBL2]: Ok
Write [SBL3]: Ok
Write [UEFI]: Ok
Write [RPM]: Ok
Write [TZ]: Ok
Write [WINSECAPP]: Ok
you have to use bin2hex, but it's not just that simpleI can't get a correct format of the hex file with this tool
(:[0-9A-F].)([0-9A-F]{4})([0-9A-F].)([0-9A-F]*)([0-9A-F].)
replace with
$1 $2 $3 $4 $5
you have to use bin2hex, but it's not just that simple
Qcomm hex files are 10 bytes per line, bin2hex outputs 20 bytes
qcomm hex structure:
"Extended Linear Address Record" position in RAM (I guess) where to write program
~4000 lines of "Data Record" the actual data to write
"Start Linear Address Record" executes the program after it's loaded
"End Of File (EOF) Record" indicates end of hex file
Notepad++ regex for adding spaces (better readability)
Code:(:[0-9A-F].)([0-9A-F]{4})([0-9A-F].)([0-9A-F]*)([0-9A-F].) replace with $1 $2 $3 $4 $5
no, the spaces are not necessary, they are just for asier human reading and comprehension.Can't manage bin->hex conversion
can someone post tools and steps to do it?
---------- Post added at 11:47 PM ---------- Previous post was at 11:36 PM ----------
i think it is not that simple, take a look at MPRG8960.hex ... i have put spaces just like the example in http://forum.xda-developers.com/showpost.php?p=33813888&postcount=2 so there are several parts we need to put "around" the raw bytes... like CRC which I can't put by hand...
:20 0080 00 [COLOR="DarkOrange"]7847C046640051E3202B000A0000B0E31EFF2FE130B48E4A08290FD38D4C0578[/COLOR] C9
:10 0090 00 [COLOR="DarkOrange"]1EFF2FE130B48E4A08290FD38D4C0578[/COLOR] 0E
Initiating emergency download
Using default emergency protocol
ALPHA EMERGENCY FLASH START
Emergency Programmer V1 version 2014.10.31.001
Hex download selected
Check if device in Dload
Connection to DLOAD mode succeeded
Get Dload parameters
Sending HEX flasher to the device
Sending GO command if HEX flasher successfully uploaded.
Emergency Programmer V1 version 2014.10.31.001
Mbn download selected
Waiting for connection to flash programmer
Connecting to flash programmer
Received valid HELLO_RSP
Safe version=true, transfer size=15360
Received valid SECURITY_RSP
Successfully connected to flash programmer
Connection to flash programmer succeeded
Uploading bootloader(s), UEFI, etc from MBN image to the eMMC. This will take up
to 20 seconds
Reading GPT from binary
Invalid GPT Wrong signature of GPT header.
Cannot read the GPT from mbn file.
ALPHA EMERGENCY FLASH END
Emergency messaging closed successfully
Operation took about 9.00 seconds.
Unknown error code.
THOR2 1.8.2.15 exited with error code 85045 (0x14C35)
name / startLBA / endLBA / size
DPP/4096/20479/0x0000000000800000 bytes
MODEM_FSG/20480/26623/0x0000000000300000 bytes
SSD/28672/28703/0x0000000000004000 bytes
SBL1/32768/35767/0x0000000000177000 bytes
SBL2/36864/39863/0x0000000000177000 bytes
SBL3/40960/45055/0x0000000000200000 bytes
UEFI/45056/50055/0x0000000000271000 bytes
RPM/53248/54247/0x000000000007d000 bytes
TZ/57344/58343/0x000000000007d000 bytes
WINSECAPP/61440/62463/0x0000000000080000 bytes
BACKUP_SBL1/65536/68535/0x0000000000177000 bytes
BACKUP_SBL2/69632/72631/0x0000000000177000 bytes
BACKUP_SBL3/73728/77823/0x0000000000200000 bytes
BACKUP_UEFI/77824/82823/0x0000000000271000 bytes
BACKUP_RPM/86016/87015/0x000000000007d000 bytes
BACKUP_TZ/90112/91111/0x000000000007d000 bytes
BACKUP_WINSECAPP/94208/95231/0x0000000000080000 bytes
UEFI_BS_NV/98304/98815/0x0000000000040000 bytes
UEFI_NV/102400/102911/0x0000000000040000 bytes
PLAT/106496/122879/0x0000000000800000 bytes
EFIESP/131072/262143/0x0000000004000000 bytes
MODEM_FS1/262144/268287/0x0000000000300000 bytes
MODEM_FS2/270336/276479/0x0000000000300000 bytes
UEFI_RT_NV/278528/279039/0x0000000000040000 bytes
UEFI_RT_NV_RPMB/282624/282879/0x0000000000020000 bytes
MMOS/286720/450399/0x0000000004fec000 bytes
MainOS/458752/5016799/0x000000008b19c000 bytes
Data/5029888/15151103/0x0000000134e00000 bytes
... at the end ...
Sending OPEN_MULTI_REQ
Received valid response to OPEN_MULTI_REQ
Checking eMMC read / write test results...
eMMC Read test passed. eMMC Write test passed!
Programming image G
Image opened successfully for reading
SAFE hex file was used and unallowed memory address was being written.
Reset the device and use the correct HEX file.
ALPHA EMERGENCY FLASH END
Emergency messaging closed successfully
Operation took about 13.00 seconds.
Unknown error code.
THOR2 1.8.2.15 exited with error code 85034 (0x14C2A)
thor2 -mode ffureader -dump_partitions -ffufile "RM9xx*.ffu" -filedir "c:\dump"
Number of partitions found 28
RKH of SBL1: F771E62AF89994064F77CD3BC16829503BDF9A3D506D3FACECAEF3F808C868FD
RKH of UEFI: F771E62AF89994064F77CD3BC16829503BDF9A3D506D3FACECAEF3F808C868FD
thor2 -mode emergency -hexfile bin.hex -mbnfile gpt.bin -orig_gpt
thor2 -mode vpl -maxtransfersizekb 1 -vplfile "C:\ProgramData\Microsoft\Packages\Products\RM .... \* .vpl"
My RKH file is not included in the zip archive you created. It is:STEP 1 - find RootKeyHash and GPT.bin
STEP 2. find the HEX file in the archive attached here
it is named with name starting as the RKH from previous step.