[STOCK][DUMP] Storage/Catalog for files related to the G7

LameMonster82

Senior Member
Apr 15, 2017
584
319
73
3257840388504953787
localhost
Hello, I've been making a catalog with a lot of files related to the G7.
That includes boot, system and vendor images as well as some KDZ files that i need.

You can probably find most of the stuff you need here.​

Folder content and how to navigate:
  • Boot images
This folder contains some boot images for the g7 (specifically G710EM)

If the image has _patched in its name it means that it has Magisk included.
If the image has twrp_ in its name it means that it has TWRP included.
If it has both then it means that it has TWRP and Magisk included.

"TWRP_Pie.img" is for phones that run custom ROMs (9.0 + 8.1) with 8.0 vendor (old guide) (10b-10f)
"TWRP_RealPie.img" is for phones that run custom ROMs (9.0 + 8.1) with 9.0 vendor (new guide) (20c)
  • KDZs
This folder mostly contains KDZs for the G710EM but it also contains some KDZs from G710N and V405/409 (LG v40)
Still that doesn't mean that its finished because KDZ files take a lot of storage and i don't have terabytes of it.

Theres also LGUP installers and a LGUP dll for the G7 in "LGUP" folder.
ANd of course a lonely driver installer in the "Drivers" folder.
  • Other files
Nothing to care about. Move on.
  • Stock images
It contains plenty of images for different firmware versions (Mostly for the G710EM but its specified when its not from it).
It has System images, Vendor images, Boot images, apple images and some other not specified.
Everything completly pulled from stock.
  • Vendors
This folder contains patched vendor images for the G7.
"vendor_10b_securityoff.img" was the first vendor to be used for AOSP now we have a new guide with new files.
"vendor_10k_securityoff.img" same as above but for v10k firmware.
"vendor_gsi.img" this vendor is based on 20c G710N and its used for AOSP (new guide)
If you have any questions please ask them here!
 
Last edited:

Michiel0912

Senior Member
Apr 27, 2012
281
75
58
Tried it. Did a data format to have access to data in TWRP but after booting I get a decryption unsuccessful message and keeps looping.
 

delpere

New member
Apr 11, 2019
4
0
0
I can't understand the steps that I have to do in order to get root on stock Korean Pie.

Do I have to follow this ones?

1. Download the patched Boot.img
2. Reboot to fastboot (and unlock bootloader????)
3. Flash the new boot.img with the commands fastboot flash boot_a pathtoboot.imghere and then fastboot flash boot_b pathtoboot.imghere
4. Reboot and install Magisk Manager Apk
 

LameMonster82

Senior Member
Apr 15, 2017
584
319
73
3257840388504953787
localhost
I can't understand the steps that I have to do in order to get root on stock Korean Pie.

Do I have to follow this ones?

1. Download the patched Boot.img
2. Reboot to fastboot (and unlock bootloader????)
3. Flash the new boot.img with the commands fastboot flash boot_a pathtoboot.imghere and then fastboot flash boot_b pathtoboot.imghere
4. Reboot and install Magisk Manager Apk
Yes that's correct
Edit: right now there's no magisk patched Korean pie boot image on my gdrive so I will make one later. Don't install any other one. It will not work
 

delpere

New member
Apr 11, 2019
4
0
0
What about installing only the TWRP on Korean Pie?

Do I need only to use this command?

HTML:
fastboot --set-active=a flash boot_a [TWRP_RealPie.img full path]
Thank you so much.