[2017.04.06] S-OFF Firmware flashing (Fastboot) (Current: 4.28.401.3) - One (M9) Android Development

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
This thread is meant for S-OFF phones. People not having their security OFF please refer to HTC RUU methods or “Stock Backup and OTA” method.
Read from top to bottom. No skipping of stuff or you will be confused.
Notice:​Files posted in this thread, which are not added to the first 4 posts should be considered source-material for my work. Flashing them means you know what you do. I only accept some limited responsibility for the files i add to the first 4 posts, because that means they flashed fine on my phone or on trusted peoples phones. However, I encourage people to send me files to work with. I am not able to search all over the Internet for source files myself. If you want some NoWipe or FullWipe firmware package added, send me the original untouched HTC base files required.
This thread serves the purpose of providing both Firmware files and reliable information for safe flashing. The main aspect of this thread is information gathering, processing and presentation for you, the user, to learn how to work with firmware and establish a solid base knowledge, so you can act more independently.
Many custom ROM Teams cannot cope with supporting the entire firmware upgrading procedure. This is something the user usually needs to figure out himself. So, I also see my task as a Team Venom member to provide the information necessary to enable you to learn all this. Of course this is not only suitable for Venom ROM’s.. Its pretty general stuff.
The safest way is still HTC’s RUU and OTA system, yet HTC is not providing RUU’s for the international version, so my files are the best option here. Carrier Version RUU’s can be accessed via HTC’s US Support Site. Select your device and then click on “News and Alerts” at the top of your device’s site - usually, there will be a RUU for Dev/Unlocked (617), Sprint (651), AT&T (502) and T-Mobile US (531). RUU’s are superior to other flashing methods because they carry a tested combination of partition images and the method itself is also known to work well. Also, RUU’s do always reassure you that there is a guaranteed and safe way to go back (psychological advantage).
If you happen to get access to an international RUU, share it with Alex, or me please. RUU’s are hosted on androidruu.com by Alex from Androidfilehost.com within a short time after being made available to him. Hit him up on Twitter with a link and ask him to add it or send it to me and i will! I have a direct channel to AFH and can see to it quickly.
I consider this rather important because androidruu.com is only providing a plattform - it is only as good as our community based additions. There is no secret RUU leaker behind it. It has what we have and organizes that in one place and provides an archive to old stuff. So, we are in charge of looking after it.​
Other than that, we are mostly stuck with RUU components, usually OTA packages. OTA’s usually depend on a certain Firmware version to be already installed, OTA’s only update parts - they are “incremental”. If you happen to skip an update, you might not get all partitions updated correctly and end up with incompatible partitions, which might (worst case scenario) lead to a brick. I am trying to circumvent this problem with my FULL ZIP packages - with these you can safely jump from a very old firmware right up to the newest.
There are several methods to flash Firmware. The “SDCard Method” can be considered the fastest and most suitable for people without a PC. However, I mistrust it because I mistrust SDCards (much experience). Then there is the “RUU Method” which I have altered to a “FUU Method” in the past - It is simple and safe. However, it kept people from learning how to use fastboot and I don’t condone that anymore. For ROM support I need users who are capable to deal with Fastboot and ADB. So, this thread will deal with the “Fastboot Method”. The “FUU” can still be had and used from my Batch Tool in Post #4 though. I just won’t fuss around with it much.
ZIP Variants provided here:​
Full Stock WIPE ZIPs:
Nothing removed - Everything stock! This type of zip also re-flashes the /data partition with HTC’s DZDATA files (meaning you loose everything on your internal SDCARD). Also replaces the Kernel, Ramdisk, recovery and Splash1 with latest stock images! The /system partition will not be touched. (Else this would be a RUU.zip). It also includes the “Apppreload.img” with all the carrier-bloatware.
Be sure to put a ROM onto your EXTERNAL SD before proceeding with a Full WIPE ZIP! Else you can also ADB push a ROM in recovery mode after fastboot reflashing a recovery. The newer TWRP variants also support a normal MTP connection and might support USB mass storage at a later stage. Phone will NOT boot without ROM reflash after using this!
NoWipe ZIPs:
This package is modified. This type of ZIP updates basic Firmware partitions, does not touch the /data partition, leaves kernel, splash and ramdisk (in order to support custom ROM’s modifying ramdisk) alone. The “Apppreload.img is removed, the bloatware partition will remain unchanged (to remove bloat permanently flash Apppreload.img from International/WWE/401). Recovery will be replaced with the current TWRP. Phone will boot normally after using this.
And what you won’t get here (fine print):
Since this is a Firmware Update Thread and not a ROM thread, you do NOT EVER get a ROM (a.k.a “System.img” or plain: “System” here. You understand and agree that you cannot have this from me. You also acknowledge that I cannot be blamed for your non-booting phone due to you not reading or not understanding this.​
I will cover GSM PHONES ONLY - no cdma / sprint firmware except when i wish to do otherwise ​
Firmware ZIP Flash HowTo​
Prerequisites:
You need ADB and Fastboot on your PC. To get ADB and Fastboot up and running I strongly suggest you use my “Batch Tool” setup, because it contains an updated htc_fastboot, which is 100% working with the M9 . This is important: the generic Google fastboot from SDK API Level 22 (latest at time of writing) is NOT FULLY COMPATIBLE. Update December 2015: seems there still are problems with Google Fastboot from API Level 24. You’ll still need the htc_fastboot.exe.
The ZIPs provided here are also repackaged, meaning not compatible with HTC Security, meaning you need S-OFF. Like stated at the top already. However, the method itself can be applied to HTC signed zips too, those could then be flashed to S-ON phones when certain conditions are met.
Step-By-Step:​1. If device is booted into Android, reboot into download mode by running:
Code:
adb reboot download
NOTICE: adb reboot download is new on the M9 for those who come from earlier HTC devices - zips can be flashed in download mode or RUUMode, both work. The on-screen status report is more detailed in download mode. This making it the preferred flashing mode for now.
1.a Or else, if your device is in a different state or you just prefer the button method:
Press Power for 15 seconds and hold VolUP at the same time, when the screen and charging LED go dark immediately slide your finger down to VolDown until you see the bootloader screen. Notice: First VolUp, then VolDown as soon as the screen goes dark (and you hear the windows connection sound if your phone is hooked up). Then use the VolUp and VolDown buttons to navigate to “Download Mode” and then press Power to confirm.
2. Now place the Firmware_xx.zip into your adb/fastboot folder (which will be "C:Androidcom" if you use my Batch Tool).
2a. This is optional - see my notice above:
Type
Code:
fastboot oem rebootRUU
3. Followed by:
Code:
fastboot flash zip Firmware_xx.zip
(replace "Firmware_xx.zip" with the name of your zip)
4. Now check the console output. It should approximately look like this log:
NOTICE: this flash log is taken from a FULL RUU flash on my M9, when you repeat this process, there will be several images missing in your flash, like first and foremost System.img won’t turn up in your log, obviously, since we do not include System. New is also that the checking routine is way more sophisticated and Controller Firmware for e.g. the touch panel or the Infra Red Remote and the like do NOT get flashed if the checks determine that they are already up-to-date. Images that do not get flashed show “BYPASSED”.
Microsoft Windows [Version 6.3.9600]
(c) 2013 Microsoft Corporation. Alle Rechte vorbehalten.
F:WorkfolderAndroid Taskercom>htc_fastboot oem rebootRUU
... OKAY
Execution time is 34(ms)
F:WorkfolderAndroid Taskercom>htc_fastboot flash zip rom.zip
sending 'zip'... (198996 KB) OKAY
sending time = 8.892 secs
writing 'zip'... (bootloader) HOSD CL#506785
(bootloader) GPT is up-to-dated. [17408]
(bootloader) Perform pre-update
FAIL90 hboot pre-update! please flush image again immediate
FAILED (remote: FAIL90 hboot pre-update! please flush image again immediate)
For "hboot-preupdate" response, restart the same procedure for device FA539YJ06951...
sending 'zip'... (198996 KB) OKAY
sending time = 10.564 secs
writing 'zip'... (bootloader) HOSD CL#506785
(bootloader) GPT is up-to-dated. [17408]
(bootloader) Perform pre-update
(bootloader) [email protected]
(bootloader) [email protected]%
(bootloader) [email protected]
(bootloader) [email protected]
(bootloader) [email protected]
(bootloader) [email protected]
(bootloader) [email protected]
(bootloader) [email protected]
(bootloader) [email protected]
(bootloader) [email protected]
(bootloader) [email protected]
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]
(bootloader) [email protected]%
(bootloader) [email protected]
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]
(bootloader) [email protected]%
(bootloader) [email protected]
FAILFAIL90 hboot pre-update! please flush image again immediate
FAILED (remote: FAIL90 hboot pre-update! please flush image again immediate)
For "hboot-preupdate" response, restart the same procedure for device FA539YJ06951...
sending 'zip'... (198996 KB) OKAY
sending time = 10.604 secs
writing 'zip'... (bootloader) HOSD CL#506785
(bootloader) GPT is up-to-dated. [17408]
FAIL90 hboot pre-update! please flush image again immediate
FAILED (remote: FAIL90 hboot pre-update! please flush image again immediate)
For "hboot-preupdate" response, restart the same procedure for device FA539YJ06951...
sending 'zip'... (198996 KB) OKAY
sending time = 7.242 secs
writing 'zip'... (bootloader) HOSD CL#506785
(bootloader) GPT is up-to-dated. [17408]
(bootloader) [email protected]
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]
(bootloader) [email protected]
(bootloader) [email protected]
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) Update zip file OK
(bootloader) [email protected]
OKAY
sending 'zip'... (463093 KB) OKAY
sending time = 28.801 secs
writing 'zip'... (bootloader) HOSD CL#506785
(bootloader) [email protected]
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) Update zip file OK
(bootloader) [email protected]
OKAY
sending 'zip'... (431122 KB) OKAY
sending time = 26.431 secs
writing 'zip'... (bootloader) HOSD CL#506785
(bootloader) [email protected]
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) Update zip file OK
(bootloader) [email protected]
OKAY
sending 'zip'... (490966 KB) OKAY
sending time = 30.226 secs
writing 'zip'... (bootloader) HOSD CL#506785
(bootloader) [email protected]
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) Update zip file OK
(bootloader) [email protected]
OKAY
sending 'zip'... (390788 KB) OKAY
sending time = 24.510 secs
writing 'zip'... (bootloader) HOSD CL#506785
(bootloader) [email protected]
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) Update zip file OK
(bootloader) [email protected]
OKAY
sending 'zip'... (200995 KB) OKAY
sending time = 13.855 secs
writing 'zip'... (bootloader) HOSD CL#506785
(bootloader) [email protected]
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) Update zip file OK
(bootloader) [email protected]
OKAY
sending 'zip'... (10850 KB) OKAY
sending time = 1.703 secs
writing 'zip'... (bootloader) HOSD CL#506785
(bootloader) [email protected]
(bootloader) [email protected]%
(bootloader) [email protected]%
(bootloader) Update zip file OK
(bootloader) [email protected]
OKAY
Flash Zip Complete
Execution time is 398(s)
F:WorkfolderAndroid Taskercom>
Click to expand...
Click to collapse
Important: When flashing in RUUMode, the flash process halts at around 90% on phone screen! This is normal and a safety precaution! The last few percent is the reboot, which is NOT happening automatically, so you get a chance to check the console output to make sure it is safe to reboot! The bar will only fill up to 100% once you type:
Important: This is not valid for Download Mode flashes - those finish at 100% on phone screen and in console and ask you to hit Power to return to Download Mode screen.
IF you encounter any errors which are not “FAIL90”, have a look into Post #3 or ask in the thread! DO NOT REBOOT THE DEVICE!
5.
Code:
fastboot reboot-bootloader
or press Power to return to Download Mode screen - depending on the mode you used to flash the zip.​
Recent additions​I usually don't provide untested zips, still, you flash at your own risk. Not everything was tested by myself. You're writing to critical parts of your phone. If anything goes wrong along the way, your phone might be bricked.​
M9_4.28.401.3_WWE_FullStock
M9_4.28.401.3_WWE_TWRP3100_NoWipe
M9_3.35.617.31_Unlocked_FullStock
M9_3.35.617.31_Unlocked_TWRP3100_NoWipe
M9_4.27.617.2_Unlocked_FullStock
M9_4.27.617.2_Unlocked_TWRP3100_NoWipe
M9_4.27.531.6_TMUS_FullStock
M9_4.27.531.6_TMUS_TWRP3100_NoWipe
M9_4.14.617.6_Unlocked_FullStock
M9_4.14.617.6_Unlocked_TWRP3030_NoWipe
M9_4.19.617.1_Unlocked_FullStock
M9_4.19.617.1_Unlocked_TWRP3030_NoWipe
M9_3.38.502.12_ATT_NoWipe_TWRP3020
M9_3.38.502.12_ATT_FullStock
M9_3.35.111.14_TMODE_NoWipe_TWRP3002
M9_3.35.111.14_TMODE_FullStock
M9_3.36.709.3_Asia-TW_NoWipe_TWRP3002
M9_3.36.709.3_Asia-TW_FullStock
Click to expand...
Click to collapse
Credits​
Thanks @Herwegan, who has been supporting my thread on the M7 for a good year and sadly decided to withdraw from XDA short.
ly after starting here with the M9. Also i would like to express my deepest gratitude to Team Venom, who aren't only good friends but also let me use their graphical stuff as base for my own stuff. Thank you!
Lately, the biggest props go out to @nkk71 and @captainthrowback because of their fantastic script that makes running bruutveal and ruuveal so much easier. Thank you so much for saving me a ton of time and helping users do their own firmware packages! That is quite an example you set there for the community!
Disclaimer​You are aware that writing to the security protected partitions increases your risk to lose the device exponentially. You understand and agree that I cannot be held responsible for such or any other damages. The flash process is theoretically safe and tested on various phones once a file has been posted to the first page, however you are the brains behind the wheel and you are solely responsible for the execution of the process. I will not accept any responsibility. The method itself is developed by Google and HTC, I only provide access and information to it.
You understand that you should not do it if you are not willing to accept this risk.​
XDA:DevDB Information
S-OFF Firmware flashing (Fastboot), Tool/Utility for the HTC One (M9)
Contributors
Sneakyghost, nkk71
Version Information
Status: Testing
Stable Release Date: 2016-12-27
Current Beta Version: 4.28.401.3
Beta Release Date: 2017-04-06
Created 2015-04-07
Last Updated 2017-04-06

...
Google Spreadsheet with all links​
Notice:
These links are all tested by at least someone. Nothing here will be completely untested. Most stuff I flash to my own phone. Exceptions might be some carrier zips which would require me to do a full backup and conversion and then restore, which is time consuming, so, simply put: 401's are always tested by me, the others sometimes but mostly by others.​
Credits
I have long lost track of my firmware sources. I am sorry i cannot name you guys all personally. The most common source would be @LlabTooFeR, @djluisbento, @AndroidFileHost (androidruu.com) HTCDev and some occasional random sources that come and go. If you find your stuff here and want to be included in the credits please contact me. I am very grateful for everyone busy providing dumps and direct leaks.​
Disclaimer
You are aware that writing to the security protected partitions increases your risk to lose the device exponentially. You understand and agree that i cannot be held responsible for such or any other damages. The flash process is theoretically safe and tested on various phones at time of posting, however you are the brains behind the wheel and you are solely responsible for the execution of the process. I will not accept any responsibility. The method itself is developed by Google and HTC, i only provide access and information to it and you execute it.
You understand that you should not do it if you are not willing to accept this risk.​

....
Error Handling Strategies for RUUmode/Fastboot​
IF IT SAYS "FAILED" do NOT immediately reboot the device If you reboot with a FAIL your device could brick! If no flash is being accepted you have to find out what is causing the malfunction before rebooting your phone. Keep it alive while trying to figure out the error. It might be your cable, your USB ports (don’t use hubs! Always direct-mainboard connections), it might be USB 3.0 which is not good yet, it might be bad configuration of your ADB and Fastboot...
The least dangerous FAILED messages are listed below and are safe to reboot (below this section you find CRITICAL errors, please observe):
Safe to reboot / Flash didn't happen Errors (if you encounter one of them, you can just reboot. Nothing changed):
- 10 RU_MODELID_FAIL (MID in android-info.txt does not match phone’s MID)
- 12 signature fail (unknown yet but safe to reboot)
- 23 parsing image fail (means something wrong with the image in the zip)
- 24 android-info fail (means something wrong with android-info.txt in the zip)
- 32 header error (means the zip couldn't be read and unzipped properly)
- 41 Wrong Model ID (means its not the right device)
- 42 Wrong Customer ID (wrong CID means you gotta swap CID first as explained below)
- 90 pre-update FAIL (means it only flashed aboot and you have to run the process again immediately to flash all other partitions). The new M9 htc_fastboot.exe now auto-reboots on Error 90! If it tries to boot to your Android System, force it back into download mode - the flashing process will continue again by itself. If it doesn't auto-commence, restart the flashing process as in Step 3.
- 99 UNKNOWN usually indicates you are S-ON, sometimes other Security related issues.
- 130 wrong model ID (seems its the same like 41, just that it shows in the FUU as 130.
- 155 seems to indicate different things. It can mean: 1.) You need to relock bootloader (If S-ON); 2.) You cannot run the RUU/FUU because the software versions of ROM, Firmware and RUU/FUU don’t match.
- 170 Check USB - FUU won’t run because of not working ADB.​
In fact, if it aborts before the "(bootloader) start image[hboot] unzipping & flushing..." line it actually didn't write anything and you can probably just reboot. If you see it flashing stuff though (the stages after that line) and then it stops with a FAILED, chances are a little higher that something is now broken. In that case do NOT reboot but do as i said above.
For Error “10 RU_MODELID_FAIL” do:
- check that the Model ID in android-info.txt matches your phone’s Model ID.
Typically, making your phone “SuperCID” makes it ignore CID and MID mismatches alike. However, lately we have noticed HTC has changed that behavior. MID mismatches are not ignored by SuperCID anymore. You will need to unzip my firmware package, change the MID in there to your MID and rezip it. Or, alternatively, change your phone’s MID, which is a bit trickier.
To un- and re-zip, please refer to Post #5 of this thread for more information!)
For Error 12 “signature fail" do:
- might indicate that a signed firmware package is required. This would only happen with S-ON phones though.
For Error 23 "parsing image fail" do:
- change image names in the zip to stock image names like “hboot.img" or “radio.img" or whatever failed there....
For Error 24 "android-info fail" do:
- check that your ZIP isn’t some HTC OTA or anything thats got no android-info.txt - those cannot be flashed with fastboot flash zip nameof.zip command.
- check that your zip has a good MD5 and is not broken, check android-info.txt etc...
For Error 32 "header error" do:
- Sorry i haven’t found the exact cause yet and don’t know a definite solution.
- Make sure there is only one . (dot) in the filename, before the extension. fastboot reads anything after the first dot it sees as the extension. If that is not zip, it fails.
- If that doesn't help, you can also try: make the zip new with recommended settings, re-run the command, check your connections...
For Error 42 "Wrong Customer ID" and: 41 "Wrong Model ID" do:
Code:
fastboot getvar all
Read that output, take note of your CID and MID and then edit the "android-info.txt" in your firmware.zip accordingly (For Wrong MID change the MID in the text, for wrong CID add your CID to the text).
Alternative method for MID and CID errors:
go SuperCID. Do:
Code:
fastboot oem writecid 11111111
You can change back to any desired CID after a successful firmware flash. Notice: this command only works on S-OFF phones (which you have already of course or else you wouldn't be here).
For “pre-update FAIL 90 ..." do:
- Let the phone reboot itself into Download Mode. If it doesn't boot to download mode, force it back there (From Android with adb reboot download or with the button method, see "step 1").
- If the flash does not auto-resume, run the same flash command again which you just ran (press arrow up on your keyboard to get to the previous command in console)
For “Error 99 UNKNOWN" do:
- Check with other zip’s if they work!
- Check if your S-OFF is correct
- You are S-ON? Then almost definetely this means the ZIP is not signed - get an unmodified zip!
For “Error 130 wrong model ID" do:
- Please refer to Error Code 41/42.
For “Error 155 relock bootloader" do:
- Since my thread works only with S-OFF phones anyway, this error can be read as: you need to S-OFF first!
- Error 155 can mean that you need SuperCID. On a few occasions this was shown when the RUU/FUU refused to run because of a wrong region lock.
- Lately, Error 155 has occurred when a FUU was launched from within android. When encountering a FUU error 155 with the process stalling after the rebootRUU (stuck at black screen with silver HTC logo), please just restart the FUU and leave the phone in that mode, or reboot the phone, then reboot to bootloader, then do “fastboot oem rebootRUU” and then launch the FUU again (thanks @anarchychris for pointing it out).
- run the fastboot command “fastboot oem lock" - only applies to S-ON phones that want to update the firmware with a stock OTA package (not offered on this thread!!). Stock OTA files sometimes need a locked bootloader.
For “Error 170 Check USB" do:
- Sometimes shown when running a RUU or FUU. Indicates issues with drivers. One way to solve is to run the ARUWizard with the phone already in Fastboot mode. Else you will have to re-install HTC Sync manager. Also, avoid USB 3 ports (the blue ones) - they have a complete new driver stack and that doesn't work well currently.​
NOT safe to reboot / Flash (partly) happened Errors (if you encounter one of them, DON’T reboot):
- 152 Image Error - Phone Screen shows a little triangle beside a full green bar​
For “Error 152 Image Error" do:
- Error 152 is quite rare, have seen it only once with a friend’s phone and it aborted the flash nearly at the end. The flash was started by the FUU. We could resolve the matter by NOT rebooting the phone and flashing the zip again through a manual fastboot flash as outlined further up.​

Batch Tool updated to 1.3.2
The "Android_Tasker" Batch Tool - a thing i am using for myself since 2012 and which i am sharing just because i have it. It is neither good nor special, but its the way i work and people who follow the instructions here might find it easier to use the same setup as we do.
It also has the "FUU" method included - details on that method will be added at a later stage. We do not consider the FUU a good option to flash Firmware anymore because we realized that getting away from ADB and Fastboot with toolkits makes troubleshooting harder at a later stage - people relying entirely on toolkits and tools will mostly not understand what is happening and helping there is much harder.
Since everything i do basically works out of the C:\Android\com path, all my zipped-up stuff extracts to that location. The FUU and the Task-Batch-Script both work from that location. This is simply to enable easier and faster creation of new zip’s if they all use the same base structure.
If you prefer to work from a different location. you can specify a different path in the installer. However, the batch scripts do not adjust automatically, which means if you use another path, you might need to open up the scripts in an editor and adjust some paths manually.
Preview:
DOWNLOAD
MD5:b25b24a5a7f2bc03dc68a411fb41fca4​
The installer is just a simple WinRAR self extracting archive - there is NOTHING BAD in there i swear! Open it with WinRAR 5 and look inside. You will see if you don't trust me.
Changelog:
1.3.2
Fixed Dump-Script - it wouldn't run properly anymore with newer ADB 1.0.32 for some odd reason.
Updated TWRP to 3.0.3-0
Updated stock recovery to 4.19.617.1 (Developer Edition, no Nougat on WWE yet)
1.3.1
Updated TWRP to 3.0.2-0
1.3.0
Updated stock recovery to 3.35.401.12 and TWRP to 3.0.0-2
1.2.9
Updated ARUWizard to 3.0.4.2015 from HTC’s One M8 DevEd Marshmallow RUU.
Swapped out stock recovery for 3.35.401.10 (WWE Marshmallow release).
1.2.8
Splash1 converter works now. Flashing Splash1 now needs a reboot to Bootloader - it's not working in Download Mode! (limited DD support on the M9 and general flashing system changes).
Swapped out recoveries for newer versions.
Finally added the complete file set from RUU 3.0.1.2015 - the newest M9 RUU. ADB and Fastboot are identical to the previous version from Llabtoofer though.
Screenrecord removed - can’t be bothered figuring out why it doesn’t work anymore. Probably SELinux and general Android 5.x security like with the screenshot function. Not really needed either. There are other solutions.
1.2.7
Swapped out recoveries for newer versions.
Swapped out ADB and Fastboot for a newer pack (thanks @LlabTooFeR) - now this Tool is fully M9 compatible and even flashes large RUU.zips.
1.2.6
Changed everything to M9 files and methods. I HOPE I didn't oversee anything. Please test carefully!
Added stock_recovery_1.32.401.8.img
Added TWRP Recovery 2.8.6.0 fixed version from Captain_Throwback SOURCE Post #2 Beta version
Added original HIMA Splash1 - S-OFF phones only!
Previous versions:
1.2.5
Added TWRP Recovery 2.8.5.2 from Captain_Throwback (All M8 devices)
Fixed Recovery Screenshot option (20)
1.2.4
Added newer RUU structure (2.0.16.2014 - from 4.16.1540.8 Dev Edition RUU)
Added Stock Recovery 4.16.401.10.img (WWE)
Changed the License and SFX texts again (Installer) - never happy with it.
1.2.3
Fixed some serious crap nobody reported. I just found out myself.
Added Stock Recovery 4.16.1540.8 (sorry still don't have the WWE recovery, but i guess they are identical)
Added TWRP 2.8.4.0 from the M8 tree of Dees_Troy.
1.2.2
Added Stock Recovery3.28.401.7
1.2.1
Added Microsoft's vcredist_x86_2008_SP1.exe to the installer because the ARUWizard is build on the x86 Visual Studio 2008 runtime. This resolves the "side-by-side configuration" error.
Added 3.28.401.6 stock recovery and splash
Added newer RUU structure (doesn't do any difference though, just keeping it up to date)
Added TWRP 2.8.0.3 (it still has slight issues with MTP which will be fixed soon but for now, this is good enough)
Changed a few lines in the script (minor, cosmetical stuff)
Updated the INFO PDF (option 24)
Known Issues:
Kernel Flashing needs fixing - can only work in fastboot now due to SELinux and related crap.
The partition Dumper is not correctly working, probably also due to SELinux.
Anyone used to like @squabbi's fully GUI based toolkit? He's picked it up on the M9 as well - maybe you like GUI better than commandline. Then head over here: http://forum.xda-developers.com/showpost.php?p=59949972&postcount=1

Flash Process Output:
There are a few steps in the flash process which are not really straightforward but i can maybe explain some of them here,so you can better understand what is happening:
sending 'zip' means: fastboot is sending zip over to client (here referred to as “remote”)
OKAY [ 2.839s] means status of sending was good. Transfer succeeded.
writing 'zip'... means the zip is being written to some location on the phone from the /temp location.
(bootloader) zip header checking... means the zip header is being checked for validity, see if it’s a real zip file and check for HTC’s signature, which often resides in the header part.
(bootloader) zip info parsing... means most likely a check on the file hashes in the zip (integrity check - if the zip is borked, it will fail here)
(bootloader) checking model ID... The bootloader checks if the android-info.txt contains the right MID. If it fails here you gotta swap out your model ID in the android-info.txt file.
(bootloader) checking custom ID... The bootloader checks if the android-info.txt contains the right CID. If it fails here you gotta swap out your Customer ID in the android-info.txt file.
(bootloader) start image[hboot] unzipping for pre-update check... means the bootloader is now unzipping the [hboot] image. This line will be repeated before every image that is to be flashed.
(bootloader) start image[hboot] flushing... means the bootlaoder is now beginning to flash the [hboot] image.
(bootloader) [RUU]WP,hboot,0
(bootloader) [RUU]WP,hboot,99
(bootloader) [RUU]WP,hboot,100 these three lines read [RUU] for what mode fastboot is in, WP for “Write Partition” for what is currently being done in RUUmode, “hboot” is the name of the currently flashed partition, number xx is a percent stage of the write process.
(bootloader) ...... Successful means the final status is successful.
Now, before the [RUU]WP,hboot,xx line we often see another line reading [RUU]UZ,radio,50 for example. That reads RUUmode is currently unzipping the Radio.img and at stage 50 percent. UZ means UNZIP.
If you see something like this:
(bootloader) start image[sbl1-1] unzipping & flushing...
(bootloader) [RUU]UZ,sbl1-1,0
(bootloader) [RUU]UZ,sbl1-1,100
(bootloader) signature checking... means it is checking the signature of the partition if it matches the expexted signature stored in the hboot.
(bootloader) verified fail means the signature in the image did not meet expectations.
(bootloader) ..... Bypassed means the image got skipped because its got the wrong signature.
This has to be interpreted like this: there are multiple “SBL” images, to be exact: type 1 has 3 variants and type 2 has only one variant. Of type 1 (“SBL1-x”), two get skipped, one gets flashed (see my log above), of type two (“SBLx”) both get flashed. I believe, SBL 2 and 3 are device independent, but SBL1 has three variants, of which only one fits the current device. So, depending on the device you have, you will see either SBL1-1, SBL1-2 or SBL1-3 being flashed and the other two subtypes being skipped (bypassed).
The same goes for the "dzdata" images in the firmware package. They come in two or three size flavors (16, 32 and 64 GB) and resemble the file structure of the /data partition. Depending on your device and model, only the one with the right size gets flashed, the others skipped.
Important to understand: nearly all FAILED messages that do NOT occur while [RUU]WP (write partition) should be considered harmless. Only a FAIL during a write operation will most likely result in a damaged partition. All other fails will probably leave the original partition intact and thus the device can be rebooted. So far my understanding.
General hints for RUUmode zips
- Opening a zip is best done with 7zip as WinRAR and other zipping tools have lead to flash fails in the past.
- Choose low compression, higher compressions often fail. Pick "save" or "normal" to be safe, anything higher could cause the unzip in Bootloader to fail.
- Adding and Removing images is not a problem. The naming of the partition images seems flexible, yet if you encounter an “Error 23: parsing image fail” you need to rename the relevant image to something stock as not all names seem to be recognizable. The Hboot/Aboot determines the right partition from the header inside the image.
- Additional Dots in zip file names are known to have caused issues for a few people.
- Spaces in names are a no-go!
- Custom Recoveries can be added to those zips as well as custom kernels or hboots. In fact, if your phone is S-OFF, you can hex edit any partition and flash it. Be sure you know what you do though lol. I am just pointing out the possibilities. I am NOT saying it is safe!
- With S-ON, those zips only flash if everything is totally stock, from the android-info.txt being right up to all images being the correct versions for that update package and all having the right signatures. Reads: no custom messing with firmware zips for S-ON phones.
General hints for android-info.txt
- Use an Editor that doesn't mess up linebreaks like Windows Notepad does. Use Notepad++
- MID’s can be added one per line. Also supports wildcards i think e.g.: 71******, but i’m not sure.
- CID's can easily be added or removed- one per line, definetely supports wildcards (used by HTC in DevEd phone)
- Mainver line: should hold the version of the most current images, e.g if you combine older and newer files, add the MainVer from the newest. Format 2.24.401.1 (2= Base version always increases by 1 with each android base version rise, 24= Build version from HTC, 401= Regional/Customer identifier, 1= Revision of the HTC Build). This line is being written to the /misc Partition and is thought to identify the whole phone firm/soft version - its not meant to only describe firmware or base alone. Those parts always belong together. My opinion: run Firm/Soft always from the same or very close revisions (eg. 4.06.1540.2 or .3 are no issue, whereas firmware from 1.20 with a ROM from 4.06 can already cause the one or other malfunction).
- hboot pre-update line: usually says "3" but i have seen different numbers. I think they determine if hboot-preflash is required (when you get “Error 90 - please flush image again immediately” this is when the hboot/aboot needs to be flashed separately first and then the rest. If you encounter this, you need to run the flash command you just did, again.
- btype:1 not clear. [Item subject to change]
- aareport:1 Since HTC hboots/aboots, boot and recovery images come as "hboot_signedbyaa” / “aboot_signedbyaa” / “boot_signedbyaa” and “recovery_signedbyaa” i would read this as "aa" representing htc ("hboot signed by aa"). It could possibly mean check on the signature in hboot/aboot/boot/recovery - all of those also come in unsigned flavors - in HTC OTA’s, those are usually without the “_signedbyaa” but in the RUU, they are carrying a signature). So, aareport: 1 can just mean check on signature yes or no.
- Delcache means erase cache when rebooting. Simple. Some firmwares seem to need it, some don't. Line is not present in every android-info.txt. If you mess with a zip that contains the line, leave it active. This is also not referring to the Android OS cache partition. It refers to the separate Kernel and Recovery Cache. Sometimes, not deleting Kernel or Recovery Cache after flashing those leads to malfunctions. If the Kernel is launching and there is an older conflicting copy cached, the phone won’t boot past Kernel stage (before the bootanimation starts), if Recovery is conflicting with a cached copy (usually after flashing a new/different recovery), it will lead to the recovery not booting or malfunction (like aborting an ongoing ROM flash or not being able to execute other functions).
RUUmode:
is the mode used for RUU flashes by HTC. It allows a few more things than the normal fastboot. You recognize it by looking at the phone’s screen. It will be black, showing only a silver HTC logo and if a command is being active, a green progress bar. New M9 RUUMode now shows a percentage counter below the bar.
Recovery flash risk:
It's possible that the one brick i saw on the HTC Ville back in 2012 after flashing a hboot in recovery was caused by flashing it in recovery. I am rather sure that the method used by recovery zip’s to write an image file to NAND is not 100% bit correct and can cause trouble (This is the “DD” method). Due to the nature of this DD method, it can happen that single bits are flipped (no check on the written bit), which results in corruptions in the flashed partition. That can manifest in a full brick or just in faulty operation, in blocked partitions (unwriteable partitions) and many more annoying things. While a full brick isn't really that likely to happen (we had one on the Ville Forums within a year likely caused by DD writing a hboot), a corruption of some sort is a little more likely. Since all types of corruptions can lead to severe problems it is desirable to have a safer method. There is a command for recovery, “write_image”, employed by HTC but i haven’t worked out how to use it and how it actually works and whether or not it is safer. So i decided to just stay away from recovery zips for firmware flashing.
The zip flash executed in RUUmode also utilizes a different write technique and is safer (It most likely is the same as “write_image” in stock HTC OTA zips and their updater-script ).
Please be aware though that this remains an assumption.
Anyway, this is the reason why i don't offer recovery zips. Even though it is perfectly possible to flash partitions in live android (using "dd if=/somedir/yourhboot of=/dev/block/mmcblk0pXX") or recovery i prefer the fastboot method simply because i am sure it is safer.
Plus, since the advent of SELinux, Android 5.xx and up, it has become much harder to write to partitions using DD in live Android. There is much working-around-SELinux to do to actually get it working. A simple rooting of your Android doesn’t suffice anymore, besides S-OFF.
JTAG with a RIFF Box
Every device of these days has so-called jtag test-points. Basically, these are points on the mainboards, where a direct connection to the main chip can be established and then that chip can be read and written to with an external device. Sometimes, these testpoints are hidden (like they are normal contacts of the chip) and no direct visible gold points on the board. It always takes a while after a device is released until the jtag layout is fully discovered but once that is done, companies like multi-com.pl start manufacturing small boards with pins that can be pressed onto the mainboard, so no soldering to the device is required. Once such a board exists, the mainboard can be hooked to the RIFF box which can rewrite a dead chip from the outside.
As long as there is no such small board (called a "JIG") the phone can still be revived but it is necessary to solder hair-thin wires to the test-points. That is perfectly possible, Tecardo can do such a thing, but its not very good for the board and cannot be done very often. At some point the solder points will degrade so much that the board is garbage then.
In case you really brick your device, you can contact Tecardo here: http://forum.xda-developers.com/showthread.php?t=2116062
MID and CID
MID = Model Identification. It serves the purpose of identifying the Model of the phone. There usually are several different ones. The ModelID in android-info.txt is CaSeSenSiTivE!
Some limited Data is here: https://docs.google.com/spreadsheet...ShfYNFAfSe-imhhqtVfeMPVDA/edit#gid=1606643937
CID = Customer ID and describes, for which customer HTC made this phone. HTC has a few own CID's for its regional stores. Then certain carriers decide to have their own CID. Some carriers even have their own Model ID’s.
So, while the MID more like describes the hardware, the CID basically just describes the software set that comes delivered with it. Both get checked on when flashing in RUUmode. How to trick this system? Fairly easy. Just add your respective MID or CID to the android-info.txt file inside the ZIP or make your phone SuperCID (My Batch Tool can do that automatically - but remember: all this only works on S-OFF phones).
S-OFF:
S-OFF refers to the NAND’s security lock. S is for security and OFF means the security is switched off. The factory state HTC’s phones ship with is ON, except for the userdata partition, which of course is always unlocked.
The key for that lock is the most heavily guarded secret in HTC’s software vaults. It cannot be extracted, bought or otherwise obtained from them. There is no official way to unlock the NAND partitions (approximately similar to what Apple fans do when they “jailbreak” their products, although technically not quite as similar). While the HTC Dev Unlock (available through htcdev.com) just unlocks 3 partitions (Boot, Recovery, System), the “S-OFF” hack we use unlocks all partitions, thus enabling the flashing of custom, modified or other devices firmware. This is what you want for this thread and you can get it from the famous reverse engineers Jcase and Beaups over at: http://theroot.ninja/ or alternatively purchase a “Java Card” and learn how to work it, from chinese sellers on Alibaba, sometimes Ebay. Then there is a way to do it with an XTC Clip. But SunShine S-OFF is by far the safest and fairest method. You will only be charged if it works and the guys over at sunshine are really helpful.
A more detailed look at how S-OFF works
[Subject to change - not a definite explanation, just how I think it works]
In the Phones Firmware is a component that checks if certain partitions have a digital signature from HTC and deny write access if the signature is wrong or missing. The checking component is known to be the Security, which can be set to OFF. Then we say the phone is
S-OFF.
System, recovery and boot do not get signature checked at all once you “unlocked” your phone on htcdev.com. The other partitions however do get checked as long as Security flag is set to ON. Partition 3 is where the Security flag is located and maybe also the checking routine that checks the other partions digital signatures,
The S-ON state is resembled by a 3 in the fastboot command to switch security on. It is: fastboot oem writesecurflag 3. You do NOT want to do that while any custom firmware is running. Only after a full RUU that removes any modifications.
Why? For some partitions like the splash screen, it might not lead to a brick if you set security to ON while a custom splash is installed (then failing the signature check), as this partition is not vital for the boot process, it might just be skipped and give you an error message (I have never tried obviously). Other partitions however, boot critical partitions like Hboot/Aboot.... You guys have to understand that altering any of these partitions can be deadly to your phone if you happen to leave them altered when switching security back on.
Determining your “Firmware Version”
I believe there is some wrong info circulating the HTC Fora. People keep saying when running fastboot getvar all it will report the Firmware Version in the line “Version-Main”. This is not always true though. Fastboot getvar all or alternatively getvar mainver pulls a version it finds in the MISC partition and relies on that to be correctly updated. Source
So how does that version string get updated? It is being taken from the android-info.txt file in any firmware zip that you flashed. The last zip you flashed determines what will be reported by the getvar function. So if you mess around with Firmware.zip’s and RUU’s a lot, chances are, that the version reported there is not equivalent to what you are already running. Often the android-info.txt has version entries not appropriate for the actual zip contents, for compatibility reasons, because it wasn’t done properly or whatever. My zips usually have the correct MainVer though.
The "Firmware" as a concept like we use it on XDA does not exist in HTC's terms. HTC does NOT differentiate between the /System Partition (what we know as "the ROM") and the other 36 partitions. Hence, if you run getvar all or getvar mainver on a stock phone, it will report correctly. It does not go looking for a fictitious place where it would find a separate "Firmware" version. That place it is looking at is the Misc Partition and that’s correct as long as you haven’t messed with lots of different Firmware zips... So, if you happen to run a hybrid system with a ROM from one base and the other partition images from another base or multiple bases (like hboot from 1.27, radio from 4.06 and ROM from 3.62) the getvar function will report as "Version-Main" what it finds in /misc/, precisely the last zip you flashed determines the string put there.
Example: you flashed a radio with a RUUmode zip from Base X.YY but the android-info.txt is maybe still an old one because the dude who made the zip, just dropped the new radio into an old existing zip, the getvar function will later report that old version as your mainver.
To check your firmware: boot to bootloader and look at the combination of hboot version and radio version - if you didn't flash those separate, the combination will let you know what base you are on (each OTA and RUU has the radioversion in its name).
Finding out your firmware is a game of guesses and knowing what you did to your device and where you are coming from.
If totally lost, best thing is to reflash some clean stock package to be sure you are on the same level with all partitions.
Long story short: you better know what you do because finding out your firmware is going to be difficult if you don't.
Further reading​ OLD INFO REMOVED - NEEDS UPDATING
Some more useful threads with similar contents. Each has its own bits and pieces and re-wording that you don’t find here or understand here. So those threads might be helpful to you too.
Related/ “Like” stuff
-
- HTC ONE M9 Partition List

Does it work with TMOB101 CID too or only HTC xxx CID?

fearomoon said:
Does it work with TMOB101 CID too or only HTC xxx CID?
Click to expand...
Click to collapse
TMUS has had different Radio requirements on the M8. This is still open to investigation. My buddy @Behold_this is getting his M9 shortly though and he is TMUS. We will work it out in no time.
Other than that, you are aware you will need S-OFF to flash any non-TMUS firmware, right?

Ja but there is no soff yet for m9 isnt it

Sneakyghost said:
fearomoon said:
Does it work with TMOB101 CID too or only HTC xxx CID?
Click to expand...
Click to collapse
TMUS has had different Radio requirements on the M8. This is still open to investigation. My buddy @Behold_this is getting his M9 shortly though and he is TMUS. We will work it out in no time.
Other than that, you are aware you will need S-OFF to flash any non-TMUS firmware, right?
Click to expand...
Click to collapse
Hey guys, just chiming in here. That is actually not T-Mobile USA. Going by his CID, that is T-Mobile Deutschland. T-Mobile USA's CID is T-MOB010. The two CID are very similar so easy mistake to make. Unfortunately I have no access to any firmware for T-Mobile Deutschland.

fearomoon said:
Ja but there is no soff yet for m9 isnt it
Click to expand...
Click to collapse
I expect it to arrive shortly. SunShine has already tweeted they managed to find a vulnerability and create an exploit, so all they have to do now is automate the process enough for Eejits. Guess it won't be long.
Behold_this said:
Hey guys, just chiming in here. That is actually not T-Mobile USA. Going by his CID, that is T-Mobile Deutschland. T-Mobile USA's CID is T-MOB010. The two CID are very similar so easy mistake to make. Unfortunately I have no access to any firmware for T-Mobile Deutschland.
Click to expand...
Click to collapse
Oops! Thanks for the correction. Looking into my sheet reveals you are spot-on once again. Eagle Eye friend!
In this case, fearomoon, you can flash 401 (WWE) firmware no problem. TmoDE uses international frequencies for GSM, UMTS, LTE and WiFi. But you will still need S-OFF.

fearomoon said:
Ja but there is no soff yet for m9 isnt it
Click to expand...
Click to collapse
Apart from not having s-off at the moment i'd really recommend you to wait with firmware flashing until we made some testing (which also depends on when we will get s-off).

herwegan said:
Apart from not having s-off at the moment i'd really recommend you to wait with firmware flashing until we made some testing (which also depends on when we will get s-off).
Click to expand...
Click to collapse
Wise words!
@ everyone
Soon all aspects of hima development will take off. We just need to all practice a little patience and caution at the moment.

here's dev edition 1.32.617.30 firmware zip, no signature on it. was able to extract in linux from the ota and rezip
https://www.androidfilehost.com/?fid=95916177934550601

HolyAngel said:
here's dev edition 1.32.617.30 firmware zip, no signature on it. was able to extract in linux from the ota and rezip
https://www.androidfilehost.com/?fid=95916177934550601
Click to expand...
Click to collapse
thanks mate.
this is not adressed to @HolyAngel; he provides those files to us to be worked on. I just want to state it clear for all you guys right from the beginning:
Do NOT(!) post any other (modified) Firmware files in my thread meant for general public to be downloaded! Except you provide those files for me to work with them (not meant to be downloaded by public and declared like that!). Thank you.

I might need to add (because that statement wasn't entirely clear to me when i read it):
Files from the first post have undergone flash tests and can be considered reasonably safe. Files posted along the line of this thread can be anything. Only files moved to the first post and the Link Sheet can be considered safe.
Any other file - since it is public here in this thread - can of course be flashed but we do NOT take any blame for issues arising from flashing such.
There is an exception currently though: the files available for download on Post 1 at this time are "In Waiting" for being tested. There is no S-OFF yet. So, these files cannot be flashed and cannot be tested either. Once S-OFF is available to me or Herwegan or both of us, we will get on it and see if its possible and safe to flash stuff like we used to on the M7 and M8.
Things will slowly evolve.
Also, everybody scouring the forums for input is warmly invited to contribute knowledge. We all know things have changed with the M9. Stuff works slightly different now. To establish a "safe flashing" hub, we need to find out as much as possible.
I expect Error Codes to (maybe) change, methods to change, just basically anything we know from before is in question. The first page posts will be updated along the way. Up until now, most stuff has been taken from my M8 thread and is not automatically valid for the M9 just because it says it in this thread. Things WILL change. The posts WILL be altered. So come back and read occasionally.
Whenever there are important news to share about anything, we will also post about it and keep you updated. Not only change the first page
---------- Post added at 08:08 PM ---------- Previous post was at 08:02 PM ----------
HolyAngel said:
here's dev edition 1.32.617.30 firmware zip, no signature on it. was able to extract in linux from the ota and rezip
https://www.androidfilehost.com/?fid=95916177934550601
Click to expand...
Click to collapse
@HolyAngel do you by chance have the base RUU.zip that goes before this OTA firmware? Its incomplete, so in order to create our FullWipe and NoWipe stuff for Dev, we'd need a complete base that can be updated by this OTA.
HTC ROM Downloads doesn't cater for M9 yet.

@Sneakyghost
I unfortunately do not have any RUU for dev edition, I wish I did :crying:
There's a ton of RUU's on ir-files but none for dev there either.. I do have stock system.emmc.win nand from 617.6 that is confirmed to work from @Nemeth27 to ota up to .30 with and what I just used myself to ota up not 10 minutes ago, but thats about it at the moment :/

HolyAngel said:
@Sneakyghost
I unfortunately do not have any RUU for dev edition, I wish I did :crying:
There's a ton of RUU's on ir-files but none for dev there either.. I do have stock system.emmc.win nand from 617.6 that is confirmed to work to ota up to .30 with and what I just used myself to ota up not 10 minutes ago, but thats about it at the moment :/
Click to expand...
Click to collapse
Yea ok thanks mate. That'll be cool for people just wanting to update the stock way but not for creating full RUU like firmware packages unfortunately, as you might have guessed

HolyAngel said:
@Sneakyghost
I unfortunately do not have any RUU for dev edition, I wish I did :crying:
There's a ton of RUU's on ir-files but none for dev there either.. I do have stock system.emmc.win nand from 617.6 that is confirmed to work from @Nemeth27 to ota up to .30 with and what I just used myself to ota up not 10 minutes ago, but thats about it at the moment :/
Click to expand...
Click to collapse
Sneakyghost said:
Yea ok thanks mate. That'll be cool for people just wanting to update the stock way but not for creating full RUU like firmware packages unfortunately, as you might have guessed
Click to expand...
Click to collapse
Not sure where I found it but I have the Developer Edition RUU.zip here >> https://www.androidfilehost.com/?fid=95916177934550733
0PJAIMG_HIMA_UL_L50_SENSE70_ATT_NA_Gen_Unlock_1.32.617.6_R2_Radio_01.01_U11440221_59.04.50303G_2_F_release_426167_signed.zip

617 isn't De as far as I know. At least I don't even have it in my list. Can you post the CID's from the RUU? I'm mobile the next few days.
[EDIT]
DE as in dev edition sorry didn't get that... Thought you meant DE as in country code.
So that's the new dev edition SKU then?

Sneakyghost said:
617 isn't De as far as I know. At least I don't even have it in my list. Can you post the CID's from the RUU? I'm mobile the next few days.
[EDIT]
DE as in dev edition sorry didn't get that... Thought you meant DE as in country code.
So that's the new dev edition SKU then?
Click to expand...
Click to collapse
Yup.
Developer edition ROMs for previous devices, like the M8, have been built off of the generic BrightstarUS World Wide English ROM base and used region/carrier code 1540, example:
BrightstarUS_WWE_4.16.1540.8 (from HTC One M8)
The developer edition ROM for the M9 is built off of the ATT North America ROM base and use region/carrier code 617, example:
ATT_NA_Gen_Unlock_1.32.617.30 (current HTC One M9 dev/unlocked)
There are many ROMs built off of the ATT_NA base. All Canadian ROMs for example, but for Dev edition, just remember:
1540=Brightstar Unlocked/Dev Edition (pre M9)
617=ATT North America Unlocked/Dev Edition (M9)
Anyway, that is the reason behind the change, but don't ever forget, you know HTC, sometimes they just change for change sake.?
Happy Easter everyone!

Related

[ROM] [Android 2.0] [Working] AOSP Eclair JD + Market, Nav, Facebook, etc

Just posting this as requested in another thread, It's an Android 2.0 ROM for Sapphire.
This is an update from the original, now a complete working ROM.
Known issues
Camera not working - This isn't yet available to the AOSP, Until it is, it's unlikely we'll have it.
Accelerometer
Gallery
No port for 32A - Patch up - Working on this
Everything else should be working - Please report issues, comments, etc. as a reply to this post. (and add any issues here: http://code.google.com/p/android-sapphire/issues/list)
As the rom is custom built, it is rootable (ro.secure=0) but does not come rooted (with "su") - This may change in the future.
This ROM contains your standard Google stuff you expect to see, and the new Facebook application ripped from the Motorola Droid.
This ROM has been tested on the HTC Magic & Google ION handsets (32B) - We plan to support 32A very soon.
We accept no responsibility for any loss, including bricked phones. Please backup your content before trying to update.
Finally, The download location:
http://code.google.com/p/android-sapphire/downloads/list
At present, This ROM is considered stable and is available for general use
Current Build: jd02
Last update: 25/11/09
Will give it a shot
Does this have the Navigation software?
Edit: Cant download it
"This file can only be downloaded by becoming a Premium member
There are no more download slots available for free users right now. If you don't want to become a premium member, you might want to try again later."
Mirror please
This looks amazing!
I own a 32A, so I'm not flashing right now, I'm waiting for one of our gurus to provide a safe way to do so (so to avoid high risk of having a cool black brick instead of a phone)..
Anyway, I'll test this as soon as its reasonably safe to do so..
In the meanwhile, great work, please keep on working on this!
WebghostDK said:
Does this have the Navigation software?
Click to expand...
Click to collapse
Not at present, No - Does not mean it won't forever - Although I don't really want to add to much to the code, I might look at install scripts etc.
At present it's only exactly what you will find if you were to compile the code yourself.
OzJD said:
Just posting this as requested in another thread, It's the official Android 2.0 ROM for Sapphire.
I may post updates later as this is directly out of the AOSP repository
Known issues
1) Bluetooth not working.
Please report issues, comments, etc, here.
As the rom is custom built, it is rootable but does not come rooted.
Try "su" in the ADB shell.
This is a vanilla ROM, and does not contain anything you do not see in the repository (except for possible bugfixes).
Tested on HTC Magic/Google ION (32B) - Is there a reason this wouldn't work on 32A? - Please report failures/success here.
I will take no responsibility for your actions/bricked phones.
Why no update.zip?
Because that's not how I roll. You can use the fastboot utility to install this rom, just goto the directory containing the img's and type "fastboot flashall".
Note: You may require certain software on your phone to install this.
Finally, The download location: http://rapidshare.com/files/309784805/Official_Sapphire_AOSP_by_JD.zip [Mirrors Wanted - PM if you can mirror]
If there is a lot of community response/feedback (and use of these images), I may consider doing frequent updates with the newest Android versions - To keep everyone up to date.
Click to expand...
Click to collapse
I am looking into the build process myself to build the 2.0 for the 32b, I would like to have a automatic daily build if possible. maybe you could try that?
Will test Android 2.0. I own a 32a. I know how to get back if it doesn't. Will keep you guys posted.
opcode1300 said:
I am looking into the build process myself to build the 2.0 for the 32b, I would like to have a automatic daily build if possible. maybe you could try that?
Click to expand...
Click to collapse
I could do something like this (I was thinking of it earlier), with these issues:
The source code doesn't change daily - Is it worth it? (easily overcome)
It may become common for it to not work due to bugs in source code
If I were to, an automatic update feature might be nice!
I need reliable mirrors :-(
It's definately on the cards though - The repo client does all the merging, so I don't see why I can't batch it.
outcorpse said:
Will test Android 2.0. I own a 32a. I know how to get back if it doesn't. Will keep you guys posted.
Click to expand...
Click to collapse
Look forward to hearing your results!
Well Dun!
Hope to have mine compiled soon... I went out... left it going... and came back and its still goin, no errors! shocked!
Will try the old nav thing after i`ve done the initial compiling... hope gps works ok
i can't update i get the error:
E:No Signature (6 Files)
i'm on a 32b!!
Added a few mirrors (see first post), you shouldn't have any issues getting it now
niceeee..
few questions: htc sense ui? FLASH PLAYER??!?!?!?!?
i might wait to hear from outcorpse before i try this.
edding3k said:
i can't update i get the error:
E:No Signature (6 Files)
i'm on a 32b!!
Click to expand...
Click to collapse
I thought this might happen (thats why I added this line):
OzJD said:
Note: You may require certain software on your phone to install this.
Click to expand...
Click to collapse
I think you will need an engineering SPL to allow unsigned images to be used - Just like the ADP2 (Google ION), Please see here: http://forum.xda-developers.com/showthread.php?t=529019
Side note: I'm using 1.33.2005
Please let me know how you go
delete me... wrong forum!
~removed: [quotes deleted text]
Any idea what the problem could be with bluetooth? Do we just need the proprietary drivers for 32B from HTC or is this not a driver problem?
I'm creating my own.
I'll try yours.
Good....
i have 2010 spl i'm on 32a board..still confuse on how to flash this rom..
so i must enter fastboot mode right? then using adb i just do fastboot flashall?
can you give me step by step how to do this?
another question does camera work ? and what about google service?
thanks..
Firstly I recommend a full backup, If you're unsure about how to do this you probably shouldn't be flashing ROMs yet.
%FOLDER% refers to any folder of your choice.
Download the file in the original post, and extract to %FOLDER%
Download the fastboot binary for your operating system from http://developer.htc.com/google-io-device.html to to %FOLDER%
Boot your phone into "fastboot" mode
Open a terminal window (command prompt) and change directory to %FOLDER%
type: "fastboot flashall" (without the quotes)
Hopefully you should see something like this:
Code:
< waiting for device >
--------------------------------------------
Bootloader Version...: 1.33.2005
Baseband Version.....: 2.22.19.26I
Serial Number........: HT96WMG01288
--------------------------------------------
checking product... OKAY
sending 'boot' (1838 KB)... OKAY
writing 'boot'... OKAY
sending 'recovery' (2088 KB)... OKAY
writing 'recovery'... OKAY
sending 'system' (62895 KB)... OKAY
writing 'system'... OKAY
rebooting...
OzJD said:
Firstly I recommend a full backup, If you're unsure about how to do this you probably shouldn't be flashing ROMs yet.
%FOLDER% refers to any folder of your choice.
Download the file in the original post, and extract to %FOLDER%
Download the fastboot binary for your operating system from http://developer.htc.com/google-io-device.html to to %FOLDER%
Boot your phone into "fastboot" mode
Open a terminal window (command prompt) and change directory to %FOLDER%
type: "fastboot flashall" (without the quotes)
Click to expand...
Click to collapse
oke..thanks..doing nandroid backup..will report to you asap..
i'm very curious, does cam work? google service??

[UPDATED 8/26/2014]HTC 8x wp8 GDR2 UEFI Extracted From .cab update

So I was able to make a decompressed extracted dump of the UEFI cab update package. After extracting the 2_UEFI.bin file from the cab update, I ran it through some PC bios extraction tools. Just my luck it worked.
This package is only partially extracted. And readable.
MORE STUFF ON POST#2
here is picture attached here
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
PLEASE MAKE NO!!!! ATTEMPT TO FLASH ANY OF THESE FILES. UNLESS YOU KNOW WHAT YOUR DOING.
FULL DUMP CAN BE DOWNLOADED HERE
View attachment UEFI-VOL-DUMP.zip
Here are some strings from EBL module that was extracted from a Vondafone UEFI update cab.
EblCheckRefurbishResult
[FAT_ERROR] fat_get_next_cluster: allocate %d bytes for FAT table sector buffer fail!
[FAT_ERROR] fat_get_next_cluster: read FAT table sector[%d] fail!
fat_read_disk [FAT_ERROR] fat_get_skip_cluster: allocate %d bytes for FAT table sector buffer fail!
[FAT_ERROR] fat_get_skip_cluster: read FAT table sector[%d] fail!
[FAT_ERROR] fat_open_file: can not alloc heap for the file description!
[SSD-PLAT] ReadSector failed, please probe removable media first.
[SSD-PLAT] ReadSector failed, please probe removable media first.
[SSD-PLAT] WriteSector failed, please probe removable media first.
[SSD-PLAT] WriteSector failed, please probe removable media first.
EblEMMCInformation: Not found hTC Sdcc extention protocol!! (%r)
EblEMMCInformation: Not found hTC Sdcc extention protocol!! (%r)
c:\apollo_bsp\accord_u_gdr2_00_s\wp\uefi\edk2\EmbeddedPkg\Ebl\hTC\tz.c !EFI_ERROR (gBS->LocateProtocol(&gQcomPmicVregProtocolGuid, 0, (void**)&PmicVregProtocol))
c:\apollo_bsp\accord_u_gdr2_00_s\wp\uefi\edk2\EmbeddedPkg\Ebl\hTC\tz.c !EFI_ERROR (gBS->LocateProtocol(&gQcomPmicVregProtocolGuid, 0, (void**)&PmicVregProtocol))
c:\apollo_bsp\accord_u_gdr2_00_s\wp\uefi\edk2\EmbeddedPkg\Ebl\hTC\tz.c !EFI_ERROR (gBS->LocateProtocol (&gEfiCpuArchProtocolGuid, 0, (void **)&CpuArch))
c:\apollo_bsp\accord_u_gdr2_00_s\wp\uefi\edk2\EmbeddedPkg\Ebl\hTC\tz.c !EFI_ERROR (gBS->LocateProtocol (&gEfiTzeLoaderProtocolGuid, 0, (void**)&TzeLoader))
[SECURITY] TZ_HTC_SVC_READ_SIMLOCK_MASK modified ret = %d, mask = 0x%X
[SECURITY] TZ_HTC_SVC_READ_SIMLOCK_MASK modified ret = %d, mask = 0x%X
[SECURITY] TZ_HTC_SVC_UPDATE_SIMLOCK: TZ NOT return updating record index
[SECURITY] TZ_HTC_SVC_UPDATE_SIMLOCK: TZ NOT return updating record index
[SECURITY] secure_get_simlock_upgrade_magic, ret=%d (0x%x, 0x%x, 0x%x)
[SECURITY] secure_get_simlock_upgrade_magic, ret=%d (0x%x, 0x%x, 0x%x)
[SECURITY] TZ_HTC_SVC_EMMC_WRITE_PROT set magic (0x%X, %d) ret = %d
[SECURITY] TZ_HTC_SVC_EMMC_WRITE_PROT set magic (0x%X, %d) ret = %d
[SECURITY] TZ_HTC_SVC_EMMC_WRITE_PROT get magic 0x%X 0x%X ret = %d
[SECURITY] TZ_HTC_SVC_EMMC_WRITE_PROT get magic 0x%X 0x%X ret = %d
hash: %a 2 [1: sha1 | 2: sha256] [src address] [src len] [digest addr] [digest len]
hash: %a 2 [1: sha1 | 2: sha256] [src address] [src len] [digest addr] [digest len]
aes: %a 3 [0: aes128 | 1: aes256] [0: ECB | 1: CBC | 2: CTR] [0: encrypt | 1: decrypt] [iv addr] [key addr] [src addr] [len] [dest addr]
aes: %a 3 [0: aes128 | 1: aes256] [0: ECB | 1: CBC | 2: CTR] [0: encrypt | 1: decrypt] [iv addr] [key addr] [src addr] [len] [dest addr]
aes encryption with SW key: %a 8 [0: aes128 | 1: aes256] [0: ECB | 1: CBC | 2: CTR] [0: encrypt | 1: decrypt] [key id] [iv addr] [src addr] [len] [dest addr]
aes encryption with SW key: %a 8 [0: aes128 | 1: aes256] [0: ECB | 1: CBC | 2: CTR] [0: encrypt | 1: decrypt] [key id] [iv addr] [src addr] [len] [dest addr]
set ddr mpu config: %a 11 [index] [read vmid mask] [write vmid mask] [start] [end]
set ddr mpu config: %a 11 [index] [read vmid mask] [write vmid mask] [start] [end]
enable_hw_auth
disable_jtag
blow_boot_cfg
blow_sec_key
hide_hwkey
checksbl1
je board_evm
evm
EVM8960
ke board_evm2
evm2
EVM28960
board_evita
evita
EVITA board_accord_wl
accord_wl
PM2310000
board_accord_wr
accord_wr
PM2330000
board_accord_u
accord_u
PM2320000
board_accord_ul
accord_ul
PM2321000
board_accord_td
accord_td
PM2350000
[ERR] partition_update offset is not emmc sector[%d] aligment! Offset[%d]
htc_pg_sanity_check pg %a: calculated checksum 0x%x is mismatched (header checksum 0x%x)
pg %a: calculated checksum 0x%x is mismatched (header checksum 0x%x)
htc_pg_hdr_get
htc_pg_hdr_set
htc_pg_part_hdr_get
htc_pg_alloc_map
htc_pg_find_best_alloc
htc_pg_alloc
htc_pg_part_reduce_size
htc_pg_fix_part_hdr_add
htc_pg_part_hdr_set
htc_pg_part_traverse
htc_pg_link_size
htc_pg_part_update
htc_pg_part_clear
htc_pg_part_read
htc_pg_update_crc
htc_pg_part_modify
htc_pg_part_modify:
part %a,
offset %d,
len %d,
is_erase %d,
update_crc %d
htc_pg_part_modify:
part %a,
offset %d,
len %d,
is_erase %d,
update_crc %d
htc_pg_free_size
htc_pg_part_crc
check_pgfs
check_boardinfo
chipset_setting_init
chipset_reset
chipset_get_device_id
chipset_set_device_id
read_simlock
write_simlock
EMBEDDED BOOT LOADER COMMANDLINE INTERFACE
I think some of the more experienced gurus form the Windows Mobile days can input more knowledge here.
EblBoardInfoCommand
write_simlock_password
read_simlock_password
radio_init_secure_smem
ClearSimLockCode
AddSimLockCode
EnableSimLock
DisableSimLock
HTC
USB BLDR
HandleSetupPkt
HandleUSBEvent
**** Both TX and RX needs to be queued, but only one can be queued. SOMETHING MAY GO WRONG **** OnBoard_USB_Init OnBoard_USB_Write
**** Both TX and RX needs to be queued, but only one can be queued. SOMETHING MAY GO WRONG ****
OnBoard_USB_Read
detectUsbCable
0 . 0 . 0 . 0
PIKS
MSM8960
c:\apollo_bsp\accord_u_gdr2_00_s\wp\uefi\edk2\Build\Msm8960\RELEASE_RVCT31\ARM\EmbeddedPkg\Ebl\Ebl\DEBUG\AutoGen.c
c:\apollo_bsp\accord_u_gdr2_00_s\wp\uefi\edk2\Build\Msm8960\RELEASE_RVCT31\ARM\EmbeddedPkg\Ebl\Ebl\DEBUG\AutoGen.c
c:\apollo_bsp\accord_u_gdr2_00_s\wp\uefi\edk2\Build\Msm8960\RELEASE_RVCT31\ARM\EmbeddedPkg\Ebl\Ebl\DEBUG\AutoGen.c
c:\apollo_bsp\accord_u_gdr2_00_s\wp\uefi\edk2\Build\Msm8960\RELEASE_RVCT31\ARM\EmbeddedPkg\Ebl\Ebl\DEBUG\AutoGen.c
c:\apollo_bsp\accord_u_gdr2_00_s\wp\uefi\edk2\Build\Msm8960\RELEASE_RVCT31\ARM\EmbeddedPkg\Ebl\Ebl\DEBUG\AutoGen.c
c:\apollo_bsp\accord_u_gdr2_00_s\wp\uefi\edk2\Build\Msm8960\RELEASE_RVCT31\ARM\EmbeddedPkg\Ebl\Ebl\DEBUG\AutoGen.c
c:\apollo_bsp\accord_u_gdr2_00_s\wp\uefi\edk2\Build\Msm8960\RELEASE_RVCT31\ARM\EmbeddedPkg\Ebl\Ebl\DEBUG\AutoGen.c
c:\apollo_bsp\accord_u_gdr2_00_s\wp\uefi\edk2\Build\Msm8960\RELEASE_RVCT31\ARM\EmbeddedPkg\Ebl\Ebl\DEBUG\AutoGen.c
c:\apollo_bsp\accord_u_gdr2_00_s\wp\uefi\edk2\Build\Msm8960\RELEASE_RVCT31\ARM\EmbeddedPkg\Ebl\Ebl\DEBUG\AutoGen.c
No Media
Media changed
Access Denied
Write Protected
Not started
Already started
Aborted
Unsupported
Not Found
Warning
Delete
Failure
Warning
Write Failure
No Response
Bad Buffer Size
No mapping
Warning Unknown Glyph
Warning Buffer Too Small
Volume Full
Invalid Parameter
ICMP Error
TFTP Error
Load Error
Device Error
Protocol Error
Out of Resources
Success
Volume Corrupt
Time out
Not Ready
Snapdragon S4 Processor
GPT PARTITIONS
FFFFFFFF-FFFF-FFFF-FFFF-000000000010
540B4740-D799-497D-9F02-B36D2E958EB0
B7A9BDA8-368C-46BC-B2C7-67501F0E6B52
9183C552-0934-4FD6-AF26-13FE14244223
320D3B19-80D9-467A-99BC-AB2B85287574
A053AA7F-40B8-4B1C-BA08-2F68AC71A4F4
E35F99CF-0025-4252-A608-CAAA1289CAF4
69B4201F-A5AD-45EB-9F49-45B38CCDAEF5
0732095D-CD4E-4492-B229-28D4ECCEC1B6
F0B4F48B-AEBA-4ECF-9142-5DC30CDC3E77
E5C3DF3F-556D-478e-AFE3-DABA98C52897
EBD0A0A2-B9E5-4433-87C0-68B6B72699C7
ebd0a0a2-b9e5-4433-87c0-68b6b72699c7
098DF793-D712-413D-9D4E-89D711772228
400FFDCD-22E0-47E7-9A23-F16ED9382388
DEA0BA2C-CBDD-4805-B4F9-F428251C3E98
E6536BC2-6DA4-495D-A83B-79F93701E799
638FF8E2-22C9-E33B-8F5D-0E81686A68CB
0A288B1F-22C9-E33B-8F5D-0E81686A68CB
EBBEADAF-22C9-E33B-8F5D-0E81686A68CB
3A6A228E-FC35-4A46-A869-4C511F7CE5EC
6BB94537-7D1C-44D0-9DFE-6D77C011DBFC
8C6B52AD-8A9E-4398-AD09-AE916E53AE2D
2373E6C7-FCBE-42B1-B44A-10DDAF18388D
543C031A-4CB6-4897-BFFE-4B485768A8AD
530C3197-F4D2-408F-B886-778ED6CDFDAD
05E044DF-92F1-4325-B69E-374A82E97D6E
74DA3EE7-D422-487C-A573-CE03C261362F
A44D2E89-8B5A-4F42-8FE5-FD36333A3BFF
PARTITION IMAGES
%a:\hTCIMG\QC\MSM8960\%04x\rfg_0.img
%a:\hTCIMG\QC\MSM8960\%04x\rfg_1.img
%a:\hTCIMG\QC\MSM8960\%04x\modem_st1.img
%a:\hTCIMG\QC\MSM8960\%04x\rfg_2.img
%a:\hTCIMG\QC\MSM8960\%04x\modem_st2.img
%a:\hTCIMG\QC\MSM8960\%04x\rfg_3.img
%a:\hTCIMG\QC\MSM8960\%04x\rfg_4.img
%a:\hTCIMG\QC\MSM8960\%04x\rfg_5.img
%a:\hTCIMG\QC\MSM8960\%04x\rfg_6.img
%a:\hTCIMG\QC\MSM8960\%04x\rfg_7.img
%a:\hTCIMG\QC\MSM8960\%04x\disk.img
%a:\hTCIMG\QC\MSM8960\%04x\radio.img
%a:\hTCIMG\QC\MSM8960\%04x\sbl1.mbn
%a:\hTCIMG\QC\MSM8960\%04x\sbl2.mbn
%a:\hTCIMG\QC\MSM8960\%04x\sbl3.mbn
%a:\hTCIMG\QC\MSM8960\%04x\uefi.mbn
%a:\hTCIMG\QC\MSM8960\%04x\rpm.mbn
%a:\hTCIMG\QC\MSM8960\%04x\winsecapp.mbn
%a:\hTCIMG\QC\MSM8960\%04x\tz.mbn
%a:\hTCIMG\QC\MSM8960\%04x\gpt_main0.bin
%a:\hTCIMG\QC\MSM8960\%04x\fat16.bin
%a:\hTCIMG\QC\MSM8960\%04x\MainOS.bin
%a:\hTCIMG\QC\MSM8960\%04x\fat_FFU.bin
%a:\hTCIMG\QC\MSM8960\%04x\UserData.bin
%a:\hTCIMG\QC\MSM8960\%04x\sdata.bin
%a:\hTCIMG\QC\MSM8960\%04x\misc.bin
%a:\hTCIMG\QC\MSM8960\%04x\mfg.bin
%a:\hTCIMG\QC\MSM8960\%04x\modem_fsg.bin
%a:\hTCIMG\QC\MSM8960\%04x\dpp.bin
%a:\hTCIMG\QC\MSM8960\%04x\efiesp.bin
%a:\hTCIMG\QC\MSM8960\%04x\eblogs.bin
RUU CONFIGURATION
THESE VARABLES CAN BE USED TO IN THE ACDUCONF.TXT
[getvzwmid] Query VZW model ID
[getmeid] Query device MEID vzwisLTE
[getdevinfo] Return device Model ID and CID to RUU
[getimei] Return device IMEI to RUU
[blversion] Return bootloader version to RUU wdata
[readconfig ] Read i-th config data or read all config data if no i supplied getmeid getvzwmid
[task TaskNum] Executing task command
[set SetNum SetValue] Executing set command password ResetDevice
[ResetDevice] Reseting the device
[wdata Length Checksum] Writing NBH file format data to device
[ruustart] Enter RUU special command mode
[progress Percentage] Show progress bar and percentage on screen for RUU use readconfig Ask radio to start refurbish startrefurbish getimei task blversion
[password PassWord] RUU password verification getdevinfo progress set Check the refurbish result checkrefurbishresult
[vzwisLTE] Check the device is LTE or not ruustart
FixVoltageMSMC1
FixVoltageMSMC2
KitlIP DCVSParam[0]
DCVSParam[1]
DCVSParam[2]
DCVSParam[3]
DCVSParam[4]
DCVSParam[5]
DebugMethod
PowerSavingDisable
DriverDisable
FixedIdleTime
DriverLocalZone
PagingPoolSize
DebugFlag
DriverFlag
PassiveKitlDbg
HookDebug
ApSwitch
KitlNetMask
FixFreqLevel
USBFlags
RadioDebugFlags
SensorDebugFlags
BootloaderFlags
DLLLowFlags
DummyFlags
SpyFlags
DllBreakPoint
DemFatalCount
AutoFocusTest
DebugBattery
secure erase secure trim
QUALCOMM OEM
STILL NOT SURE ABOUT THESE STRINGS
Q6:
VDDCX:
Krait:
RFSKUIDField_D0
RFSKUIDField_D1
RFSKUIDField_D2
RFSKUIDField_D3
RFSKUIDField_D4
RFSKUIDField_D5
RFSKUIDField_D6
RFSKUIDField_D7
EngineerID
KEK
PK
DPP
HTC OEM SECURE KEYS
fs0:\SecureBootPolicy.p7b
db pDPP.enc
OEM_DB_CLEAR.enc
OEM_KEK_CLEAR.enc
OEM_PK_CLEAR.enc
OEM_DBX_CLEAR.enc
PCBIDField
FunctionSKUField
ssd
delfile
crwfile
fs0:\enc.img
fs0:\ori.img
SKUIDChecksum
fs0:\OEM_dbx_2011.bin
fs0:\OEM_db_2012.bin
fs0:\OEM_KEK.bin
fs0:\OEM_PK.bin
fs3:\pDPP.tmp
fs3:\OEM_DB_CLEAR.tmp
fs3:\OEM_KEK_CLEAR.tmp
fs3:\OEM_PK_CLEAR.tmp
fs3:\OEM_DBX_CLEAR.tmp
var midr
fs0:\keystore.dat
v
w
dbx
CurrentPolicy
QULCOMM SECURE
RFG_0
SBL1
MODEM_FS1
RFG_1
SBL2
MODEM_FS2
RFG_2
SBL3
RFG_3
RFG_4
RFG_5
RFG_6
RFG_7
SDATA
MISC
MODEM_FSG
UEFI
RPM
RADIO
BDP
WINSECAPP
DPP
EFIESP
EBLOGS
MainOS
PLAT
TZ
Data
X
ROM UPDATE UTILITY
HTCIMAGE
GPT_HEADER TOUCH_FW_UPDATE
ACDUIMG.nbh
ACDUNV.nbh
ACDUDIAG.nbh
ACDUCONF.txt
ACDUDIAG.nbh
HTCIMAGE
simunlock
more.
HTCIMAGE
simunlock.
spcustom
prkey
wvkey_lv1
dpkey.
tamper
prmkey
wvkey_lv3.
sbl1_update
c:\apollo_bsp\accord_u_gdr2_00_s\wp\uefi\edk2\Build\Msm8960\RELEASE_RVCT31\ARM\EmbeddedPkg\Ebl\Ebl\DEBUG\Ebl.dll....
More info on the tools used to dump the UEFI can be found here Thanks to CodeRush
I have moved on to using PhoenixTool. Many options to choose from including inserting SLIC, SLP, key and RW file. Full customization of ACPI, OEM, RSDT XSDT tables. Preserve module size andmany more features.
any use? I'm a noob.
fengsam said:
any use? I'm a noob.
Click to expand...
Click to collapse
Using RUU configuration script in the ACDUCONF.txt would probably solve some issues with not being able to flash a rom because of incorrect model number issues.
for instance i cannot flash a factory rom on my device because the text that shows up on boot loader screen is incorrect. do to some of the Microsoft developer updates. for Windows embedded compact and handheld sdk updates that have been pushed to my device.
so using this [getdevinfo] should in theory return the ruu with the correct device info. the radio, dpp. and boot partitions that are in the RUUs contain the device info that have to match for the. i just so happens that those config files can be changed without harming the signed.nbh (technically there are not signed images at all. only mostly encrypted. but still unsigned.) I have not been able to dig up any documentation for use of ACDUCONF.txt and how it should be properly used. but similar ruu config file usage has documented us since the early windows mobile all the way up until windows phone 7. its only up until yesterday that this information has been presented to the public.
I am 99% convinced that HTC 8x uefi is can be configured to dual-boot, boot-android, right now with the UEFI that i extracted modules can be altered, replaced new ones can be inserted and at the same time. be resigned. only issue is creating an nbh. I think some old windows mobile tools can sign the image and a goldcard can b used on a usb thumb drive. The HD2 USB Y Cable dongles is OEM approved to be used with the htc accord and has the code written within the uefi bios image its self.
HTC uefi is very similar to Intels edk2 which is based from Edk II DevKit(Sourceforge.net), which is based off of Tianocore. Many of the packages are compattable. [MdePkg]
Though it is not tianocore some of there packages are still based off of the tianocore edk2 platform. along with many of the other edkII development projects on http://www.sourceforge.net.
Also there is strings i found that allowed the use of using a JAVACARD dongle. Which with a JAVACARD you can achieve s-off, and security unlock. (well at least in the case of Android devices.)
Then again who has ever seen a windows phone 8 uefi broken down like this before. none. or at least that i can find. Closest i found was from forums in China, and original source was being shared for Huawei W1 and W2.
fengsam said:
any use? I'm a noob.
Click to expand...
Click to collapse
No ,
@grilledcheesesandwich What PC BIOS Extraction tools did you use?
compu829 said:
@grilledcheesesandwich What PC BIOS Extraction tools did you use?
Click to expand...
Click to collapse
i forgot who made the tools. but i found them on mydigitallife.com forums. there called UEFIExtract.exe and UEFITool.exe the extractions are not perfect and the rebuilding still is not working 100% on 8x uefi .the process request files that only exist within the phones memory.
sent from the moon
grilledcheesesandwich said:
i forgot who made the tools. but i found them on mydigitallife.com forums. there called UEFIExtract.exe and UEFITool.exe the extractions are not perfect and the rebuilding still is not working 100% on 8x uefi .the process request files that only exist within the phones memory.
sent from the moon
Click to expand...
Click to collapse
http://forum.xda-developers.com/showthread.php?t=1966327
@grilledcheesesandwich What tool are you using to browse the UEFI BIOS (like you see in the screenshots?) Also, you need to use 7zip to extract the zip file to get to the tarball...it's not compatible with the built-in windows zip utility
compu829 said:
@grilledcheesesandwich What tool are you using to browse the UEFI BIOS (like you see in the screenshots?) Also, you need to use 7zip to extract the zip file to get to the tarball...it's not compatible with the built-in windows zip utility
Click to expand...
Click to collapse
i tarballed the bios after i extracted it so i could browse it in a flatview
grilledcheesesandwich said:
i tarballed the bios after i extracted it so i could browse it in a flatview
Click to expand...
Click to collapse
Problem is, even if you manage to repack the different modules, (You could Use Andys Tool for that, I got into Bios modding some time ago ) the phone will detect it and since the signature has been broken it won't flash. But I am quite interested in the volume dump since I have a HTC 8S motherboard stuck in recovery mode because I tried to flash the 8X rom on it, with the 8S signature ('t was an accident) You could try to get the offset you need to change with UIFR by Donovan http://donovan6000.blogspot.de/2014/02/universal-ifr-extractor.html
cheers, hutchinsane_
@grilledcheesesandwich I noticed lol.
From what I can gather, if one uses the Y-Cable method to flash the HTC 8x, it bypasses the signature checking done by the standard RUU. I do know that the nbh files for the HTC 8x are unencrypted. I have always wondered about hand-editing the mainOS partition to enable a developer unlock for our devices. The only issue is that I have the T-Mobile variant, which has AWS HSPA+ enabled and unlocked. This radio firmware is not in the standard RUU for the EURASIA ROMS, so I never bothered with it because I Can't lose AWS support.
hutchinsane_ said:
Problem is, even if you manage to repack the different modules, (You could Use Andys Tool for that, I got into Bios modding some time ago ) the phone will detect it and since the signature has been broken it won't flash. But I am quite interested in the volume dump since I have a HTC 8S motherboard stuck in recovery mode because I tried to flash the 8X rom on it, with the 8S signature ('t was an accident) You could try to get the offset you need to change with UIFR by Donovan http://donovan6000.blogspot.de/2014/02/universal-ifr-extractor.html
cheers, hutchinsane_
Click to expand...
Click to collapse
ok here is what i have so far. Ideas are still out there.
I need to find a tool that can extract a perfect capsule. from the uefi. even though the uegi binary partition is write protected. the capsule may be writeable. no need to worry about signatures and keys as long as the capsule is back to its origiinal size and expands as normal after being flashed to the device. also no alteratiin can been done to Security module within the capsule. thats ok because all the modules are contained within there own class and to do not require signature verification. this has worked with Intel and Amtel Uefi bios. From what i can tell Htc8x has an embedded amtel at24c128bn eeprom security chip present and if there eeprom is as easy as there tpm (trusted platform module) being used for security validation in uefi bios boot process used on pc motherboards we should in some theory be the case here too.
My overal plan is not to only expand the new development into custom roms. the plan is to fully defy microsofts most secure mobile retail device by handing them a fully customizeable device without loosing the featured security.
To my knowledge every htc 8x has the built in feature to change usb connection mode when pluged in to a pc. the only reason we cannot use this feature the same feature offered in pre android 4.3 devices is because the value in the registry is set to disableDialogmenu and the value is set to (1). i think if we can change this to (0) wen will have a popup menu present when plugging in to a pc. i found this key earlier today while searching my phones registry. i will post up this key later.
Another is Andrid. HTC One S Ville U has identical hardware. believe this the hboot for ville U is built just like the uefi for the 8x. so close in fact like you can cee the ebl module refrences the ville u. ok so heres more. when i tore apart ruu ville u i found the exact same files that exist withing the ruu accord. the files im refering to are the platform info files that check for firmware cimpatibility. the only alteration needed would be to replace the secure boot binaries in the ville u rom.zip and inject my certificates i have been holding onto.
i have 2 platform verification keys (pvk) i have found from encrypted jtag nand dumps. probably useless. itsva good refrence start on a possible challenge with DPP partition.
l
self signing certs is not a problem. i have everything to work around the issue of kek db dbx ovk and pvk keys and certificates. found a dev who put together a wpdeveloper pack that creats all needed certificates for wp soc oem ihv developemt and also remotly sets up all the needed requirements and resources to build and flash a signed ffu. i can assure hyc 8x ffu exist. but the only way to get a qualcomm accord u full flash uodate is to build it. you do not have to be an oem to build a ffu. there is a process to doing this. all you need is to create an empty zip archive labeled corrextly likr how nokia ffus look. add a specific xml soap scripts. similar to.the ones for cab update checks. mainly the cabs that are labeled emptypackage.
ive came across a few but not enough. i think a workaround would he microsoft cabinet sdk. to rebuild. whats missing. the cab that contaijes all the xml provision licenses is needed for the ffu build. as well. now the documentation on the wpoem site says you need the phone image design tool to build a ffu........o darn dead end.... nope the is another way. some confedientel ihv documents demonstrate like rhe above mentoned empty zip file correctly labeled with correct xml scemas layed out then added to the zip. you must setup your pc environment with microsoft client connextion to redmond. they validate you contoso build zip is accurate and if doen correctly you will returned with a fully built full flash update package. theres lots i didnt not mention. i should not.
so any ways. back to the topic. once i can find all the correct libraries to correctly rebuild this uefi all options will be on the table. moke like endless opportunities in customizations and features. well almost.
litsvofbwork needs done. anybody else has gots guts to conqueror with me head over to mydigitallife and sure uobthere endless threads on uedi bios hacking.
i completely sandboxied hck adk win sdk win kits wpsdk ack and vs2013. zi
ffutool.exe & ffuresources.dll
sent from the moon
compu829 said:
@grilledcheesesandwich I noticed lol.
From what I can gather, if one uses the Y-Cable method to flash the HTC 8x, it bypasses the signature checking done by the standard RUU. I do know that the nbh files for the HTC 8x are unencrypted. I have always wondered about hand-editing the mainOS partition to enable a developer unlock for our devices. The only issue is that I have the T-Mobile variant, which has AWS HSPA+ enabled and unlocked. This radio firmware is not in the standard RUU for the EURASIA ROMS, so I never bothered with it because I Can't lose AWS support.
Click to expand...
Click to collapse
i have a rom that supports aws hspa. its not directly tmobile its a wwe rom. also mine is also a tmobile usa variant. and the weird part is its not the same as the other usa versions mine has full lte and gsm support and at one time was sim unlocked. the serial number traced back to being built in germany and was sold here in the usa
I IM GOING TO HELP EVERYONE OUT HERE AND HOST MY COLLECTION OF HTC8X ROMS. AND 8S ROMS.. I keephearing that there is only 2 versions available for the 8x. im going to give everybody at least 6.
Sent from my Galaxy Nexus using XDA Free mobile app
hutchinsane_ said:
Problem is, even if you manage to repack the different modules, (You could Use Andys Tool for that, I got into Bios modding some time ago ) the phone will detect it and since the signature has been broken it won't flash. But I am quite interested in the volume dump since I have a HTC 8S motherboard stuck in recovery mode because I tried to flash the 8X rom on it, with the 8S signature ('t was an accident) You could try to get the offset you need to change with UIFR by Donovan http://donovan6000.blogspot.de/2014/02/universal-ifr-extractor.html
cheers, hutchinsane_
Click to expand...
Click to collapse
ifr extractor does not work with a htc 8x uefi binary. i got an error instantly i might be doing something wrong. i will do more ttesting with that one.
i heard there was some uefi bios devrlopement going on with the htc one. it may be possibkr to incorporate some of there knowledge into this project. the boards have some similarities minus the processor cores ram and so on. i do know that msm8960 code is compattable with msm8260a htc8x and apq8064 htc one, dna, and ny fAvorite my ifc6410 qualcomm snapdragon 600 itx motjerboard.
if you have the uefi cab update for your htc8s i could eztract a dump of it for you and send it back.
@
compu829 said:
radio software version is 1.17b.32.19.14_15.62b.32.19
Firmware revision is 3030.0.34101.531
UEFI bootloader version is 0.0.3030.0(173542)
Chipset is the 8260A
Interestingly enough, in the about page is a spot that says "IMS: Not Registered"...I wonder if they are slipped in Wi-Fi calling support and didn't tell anyone?
from the HTC screen:
PM2322002 P S WP8 I
SBL1-303.000.R15
SBL2-303.000.110
SBL3-303.000.008
RPM-303.CRC.76B
TZ-303.000.241
UEFI-0.0.3030.0(173542)
OS-3.41.531.01
eMMC SMS 14910MB F-15
CID T-MOB010
Radio-1.17b.32.19.14_15.62b.32.19
MSM8260A v3.2.1-p1 0x707910e1
Krait:Nom Q6:Fast VDDCX:SLOW 0x30400
Touch FWS1:1195017,13106,41434467
Vdd_dig - 0.5v, 0x4
Click to expand...
Click to collapse
nice only difference is mine is nom slow. I have a a rom that is almost identical too. what i have found out is that some of the nbh htc windows phone 8 roms floating around out there are incorrectly labeled even the 512kb headers are wrong too. when tearing down and dissecting some of these. it seems as though the partitions change. for instance i have 2 identical extractions and on one change all permissions to alow remote users and any nt or network admin or authority to full control. let all the ruu files give 100% internet access through your firewall. now copy run the ruu in dependency walker and find all the files that the ruu is Depends on. most are in windows active sync installer the others are in you phone. and need to be extracted to and copied to the ruu folder. why am i telling you this? you probably know this being a senior member.
on that note. Ive noticed that the 8s and 8x are obviously different than legacy windows mobile mainly due to gpt guid partition format. within system files from my phone and 8x ruu i have found references to Leo, hd2, Shubert, startrek, Hermes, and a few others. which that lead me into researching how wm, wince, wp7 and ec2013 devices were built using Microsoft sdk's. from what i can see to the best of my knowledge is that newer platforms still use the some of the same source as older designs and even though bsp kits for older builds are not one click compatible with the ec2013, shuffle a few files around and match the folder structures & alter some lines of code for embedded compact and one will just have incorporated classic features into a brand new operating system. i do not believe Qualcomm or Microsoft are hiding easter eggs. my guess is it was all htc. ok so last year i bought an evo shift. yea yea funny haha. i was bored so i got this phone, unlocked it, raw dumped every partition and hex away. in the hboot 7630 build i found strings that referenced windows ce. i never took it any further than that. but i can see now that htc has sloppy source control. or they did this on purpose to see if anybody would catch on.
ok back to wp8. i will make this part quick. the wp8.1 sdk leaked emulator dump OEMprovisioning.exe app can be executed on x64 bit win8.1 desktop pc. strange. i found some registry keys and drivers that allows my phone to run applications in win32 compatibility mode. enough said. i still do not know how it and be incorporated into apps.
about wifi calling. mine says ims not registered too. i dont care on mine. its only purpose to be hacked.
i need to do some work on file write/read app. it some what works. start tiles disappear an it broke my wifi. i need to incorporate the app into a file manager maybe GoodDayToDie's webserver app.
Sent from my Galaxy Nexus using XDA Free mobile app
The above is way above my understanding but I have a 8X that I'm more than willing to test with. Let me know if you need some testing
utopiate said:
The above is way above my understanding but I have a 8X that I'm more than willing to test with. Let me know if you need some testing
Click to expand...
Click to collapse
kind of dangerous if you ask me. if your phone is already bricked and its just lying around as DEAD WEIGHT then whats the worst that could happen. let me throw some stuff together. what is theconditin of your phone?
Sent from my Galaxy Nexus using XDA Free mobile app
Its in fine working order running the dev preview and so a but buggy. I'm just about to get a new phone so I don't mind testing with it
try the hawaei w1 rom flashing method.
i found some registry keys that refrence simpleio.efi in the tmobile variant 8x
Sent from my Galaxy Nexus using XDA Free mobile app

★ ☆ [MOD] Remove Red Text on Splash Screen | E8 hboots | ALL Variants |

Does the red development text on the splash screen bother you after unlocking your device?
If so, I have a modified hboot for you that takes care of it.
This was simply hex edited by me to remove the text from the screen, no other changes were made.
I have tested the process and it is 100% proven to work without any side effects.
I DO NOT OWN THIS DEVICE!
I originally did this for the Verizon HTC One M7 and was asked to do it for the One Max T6, Butterfly S, HTC One M8, and now the HTC One E8.
FROM THIS >>>
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
TO THIS >>>
Let's get to it!
You must be S-Off to do this!
To Install:
Download your Modified hboot:
-No Red Text hboots-
Asia: WWE
No Red Text Hboot
modelid: 0PAJ31000
cidnum: HTC__044
cidnum: HTC__059
mainver: 1.10.707.1
btype:1
aareport:1
hbootpreupdate:12
​
China: Unicom
No Red Text Hboot
modelid: 0PAJ20000
cidnum: HTCCN703
mainver: 1.19.1402.13
btype:1
aareport:1
hbootpreupdate:12
​
Ok, Now you have your hboot, proceed:
Place the zip in your fastboot/adb directory on your computer.
Put the device in fastboot mode
(Volume down and power until menu appears, select fastboot using power button)
Connect the device to the computer
Enter the following commands from terminal/command prompt in the fastboot directory, one at a time:
fastboot oem rebootRUU (this puts the device in RUU mode)
fastboot flash zip filename_hboot.zip (this flashes the modified hboot zip file)
Important: the flash process halts at around 75% to 90% on phone screen! This is normal and a safety precaution!
The last few percent is the reboot, which is NOT happening automatically, so you get a chance to check the console output before reboot to make sure it is safe to reboot!
The bar will only fill up to 100% once you type the following command:​
fastboot reboot-bootloader (this reboots the device to bootloader)
That's it, you're done. You can now reboot and not see the red text anymore.
If you have any questions or issues, let me know.
FAQ:
Hmm. I find it weird that even when I do CD from the platform-tools folder, I cannot flash the HBOOT.
I keep getting the "cannot load hboot.zip" file. (I renamed to HBOOT.ZIP)
Any suggestions?
Thank you in advance.
Click to expand...
Click to collapse
On Windows?
Windows by default, hides known file extensions. (.zip .txt .png .exe etc,..)
So you probably have the file actually named HBOOT.ZIP.zip
Try removing the visible .ZIP you have it named.
Then try the same command again.
Is there away of getting this working w/o a PC? Don't got a PC ATM and I hate the red text...
Click to expand...
Click to collapse
1.) Download your modified hboot
2.) Rename the file to 0P6BIMG.zip not sure yet of the E8 naming for this, will add when I know.
3.) Put the renamed file on your external_SD (not internal)
4.) Boot into hboot, it should see the file and prompt you to update
5.) After you have updated your hboot, make sure to remove the 0P6BIMG.zip from your external_sd.
Or else it will see the file and prompt you to update, every time you reboot to bootloader/hboot.
BIG THANKS to Scotty123 for requesting me to do this for other devices...
So Thank him too!
Now for my RED TEXT:
Disclaimer​You are aware that writing to the security protected partitions increases your risk to lose the device exponentially.
You understand and agree that i cannot be held responsible for such or any other damages.
The flash process is theoretically safe and tested, however you are the brains behind the wheel and you are solely responsible for the execution of the process.
I will not accept any responsibility. The method itself is developed by Google and HTC, i only provide access and information to it and you execute it.
You understand that you should not do it if you are not willing to accept this risk.
If you plan on reverting to stock-relocked, for any reason:
You should follow the above steps first, but use your own Stock hboot instead. (can be found in your variants current firmware)
Do this before you relock the bootloader.
​
-FAUX LOCKED HBOOTS-
(not really Locked and S-on but appear that way)
Since I initially posted this for the Vzw One:
I had a couple requests for a modified hboot that shows the device as being Locked and S-On, while being completely unlocked and S-Off.
I went ahead and made that as per request and made it for the One Max and Butterfly S as well.
The process is the same as the one I wrote above, with the exception of the filename.
These also have the red text removed, like the No Red Text hboots above.
Faux Locked hboot:
Asia: WWE
Faux Locked Hboot
modelid: 0PAJ31000
cidnum: HTC__044
cidnum: HTC__059
mainver: 1.10.707.1
btype:1
aareport:1
hbootpreupdate:12
​
China: Unicom
Faux Locked Hboot
modelid: 0PAJ20000
cidnum: HTCCN703
mainver: 1.19.1402.13
btype:1
aareport:1
hbootpreupdate:12
​
__________
Enjoy and be careful!!
My hboot thread for the Verizon HTC One (m8)
XDA:DevDB Information
[MOD] Remove Red Text on Splash screen | , Tool/Utility for the HTC One E8
Contributors
santod040
Version Information
Status: Stable
Current Stable Version: All-Carriers
Stable Release Date: 2014-11-08
Created 2014-11-09
Last Updated 2014-11-08
Reserved
I will add more hboots to the OP, as they are provided to me, along with a proper android-info.txt file, or a fastboot getvar all output.
OTApkg's and/or firmware zips are the simplest and safest way of obtaining these files for me.
Reserved
I have sent you firmware and OTA from other model could you update please. Thanks.
ian.anindya said:
I have sent you firmware and OTA from other model could you update please. Thanks.
Click to expand...
Click to collapse
Broke my arm yesterday at work...
Had to have surgery last night.
Just got home from the hospital now.
But as soon as i am able, I will do the others you have sent me.
santod040 said:
Broke my arm yesterday at work...
Had to have surgery last night.
Just got home from the hospital now.
But as soon as i am able, I will do the others you have sent me.
Click to expand...
Click to collapse
I am sorry.
I hope you get well soon.
c:\adb>fastboot flash zip NoRedText_hboot.zip
target reported max download size of 1830014976 bytes
sending 'zip' (462 KB)...
OKAY [ 0.192s]
writing 'zip'...
(bootloader) zip header checking...
(bootloader) zip info parsing...
(bootloader) checking model ID...
(bootloader) checking custom ID...
FAILED (remote: 42 custom id check fail)
finished. total time: 0.747s
Click to expand...
Click to collapse
Found the cause.
Standing Russian CID.
Changed into Chinese and ... everything happened
santod040, :good:
Thanks. i tried and didnt work gives me some error 41.
My E8 is chinese, however i modified it with the indian rom and hav changed the CID & MID to htc__38 and OPAJ40000 respectively as per the thread posted by "ian" and I even tried to use the modified boot and hboot files he recomended and got an error 24. The phone is s-off vis sunshine, rooted and has Twrp recovery 2.8
Please help and advise.
Thanks in advance.
What China E8 version you have? Modified HBoot only available for Unicom if your phone not Unicom version you should not flash it yet until Santod040 release modified HBoot from other version.
M8sw which I assume is unicom by looking at the table you posted
I have OPAJ300 SingleSim ROOTED with BinDroid 1.3 on board and I have this red text on boot screen.I don't have S-Off so no chance to get rid if it ?
Riski3Run said:
I have OPAJ300 SingleSim ROOTED with BinDroid 1.3 on board and I have this red text on boot screen.I don't have S-Off so no chance to get rid if it ?
Click to expand...
Click to collapse
Correct. You must be S-OFF to flash an unsigned HBOOT.
@santod040
Can you make one for HTC__038 0PAJ40000 indian variant too ??
Thanks in advance
HELP
Riski3Run said:
I have OPAJ300 SingleSim ROOTED with BinDroid 1.3 on board and I have this red text on boot screen.I don't have S-Off so no chance to get rid if it ?
Click to expand...
Click to collapse
Hi There,
i have the same model like yours, you wouldn't have the stock boot image or stock recovery by any chance??
Thanks
@santod040
Would be great if you could make one for the Indian version. Here is the stock HBOOT: LINK
buggerman said:
@santod040
Would be great if you could make one for the Indian version. Here is the stock HBOOT: LINK
Click to expand...
Click to collapse
Hi,
You could do by yourself.
Tool : HxD (http://mh-nexus.de/en/downloads.php?product=HxD ).
Red-Text Removed Location :
Hex number : 0x824e0 - 0x825a0
Fake S-ON :
Hex number : 0x9dbf0
Fake LOCKED :
Hex number : 0x82390 - 0x823a0
Zip file content :
Make original backup before test.
ian.anindya said:
Hi,
You could do by yourself.
Tool : HxD (http://mh-nexus.de/en/downloads.php?product=HxD ).
Red-Text Removed Location :
Hex number : 0x824e0 - 0x825a0
Fake S-ON :
Hex number : 0x9dbf0
Fake LOCKED :
Hex number : 0x82390 - 0x823a0
Zip file content :
Make original backup before test.
Click to expand...
Click to collapse
@ian.anindya
Ok, I downloaded the hboot from MEGA link in THIS thread.
The hboot is for versoin 1.26.720.X in hboot section so i guess it is for M8Sd Indians.
I found the red text at 0x82350 - 0x823F0 .
I did not know what exactly to do so i just selected the text, deleted it and saved it.
Now two files are created hboot and hboot.bak , presumably hboot.bak is the original 4MB file and new hboot is 3.99MB file.
Here is the new HBOOT of 3.99MB
I am S-OFF and i want to test it out but i fear it may brick my device since there is a difference in file size and mainly because i dont know what I did was correct
So can any brave soul from India please test it out :fingers-crossed:
iamsuperuser said:
@ian.anindya
Ok, I downloaded the hboot from MEGA link in THIS thread.
The hboot is for versoin 1.26.720.X in hboot section so i guess it is for M8Sd Indians.
I found the red text at 0x82350 - 0x823F0 .
I did not know what exactly to do so i just selected the text, deleted it and saved it.
Now two files are created hboot and hboot.bak , presumably hboot.bak is the original 4MB file and new hboot is 3.99MB file.
Here is the new HBOOT of 3.99MB
I am S-OFF and i want to test it out but i fear it may brick my device since there is a difference in file size and mainly because i dont know what I did was correct
So can any brave soul from India please test it out :fingers-crossed:
Click to expand...
Click to collapse
Hi,
You shouldn't delete but change bit code as per above picture.
Delete make wrong file.
After you change you check on hxd, analysis, compared.
Must be the same as picture different original and modified ones.
ian.anindya said:
Hi,
You shouldn't delete but change bit code as per above picture.
Delete make wrong file.
After you change you check on hxd, analysis, compared.
Must be the same as picture different original and modified ones.
Click to expand...
Click to collapse
Ok I'll do that.
I cannot make out what are in the modified pictures, did you fill that text with blank space or xxxxx ???
Hi,
HBoot india Kitkat loaction on 0x824e7 -0x825aD as shown picture on attachment .
Please check and compare both HBoot files (Original and Modified) to see location before and after modification.
Original HBoot : https://mega.co.nz/#!G4QX1KzA!yJckNwZrdlc0X-Orgtqgb3R7c1WLQszmtw4wtel2bI0
Modofied HBoot : https://mega.co.nz/#!6pIVSBpT!rpKMaJZKrZPz6VIsfHTbS1cleiJdt9EYMH0dpC8vNNQ
1.26.720.6_NoRedText_hboot.zip : https://mega.co.nz/#!n1ZwkKhZ!AhGxFf9HXJUh6vddaeFwC3q0Hw9BV7Zmu2MRRp0Xu5c
Please check bit by bit carefully to make sure file size not changed.
I presume that you know the risk before apply modified HBoot.

[Recovery][Snapdragon][R7S/r7sf] Official TWRP for Oppo R7Sf (3.1.1-0)

Team Win Recovery Project 3.1.1-0
This is for the International Oppo R7S, Snapdragon models only! Do not flash on Mediatek R7Sm models!
WHAT IS TWRP?
Team Win Recovery Project is a custom recovery for Android devices.
It allows you to back up and restore your data, flash custom ROMs to your device, repair broken file systems, and root your device.
DOWNLOAD
You can find the device page here:
https://twrp.me/devices/oppor7sf.html
For Official TWRP Changelog see Official TWRP News page:
https://twrp.me/
Old changelog listing:
CHANGELOG for 3.0.2-2:
-Fix subpartition restore bug (ex: EFS)
CHANGELOG for 3.0.2-0:
-Fix a bug with the input box that affected masked inputs (passwords).
This fixes decrypt of full device encryption on devices that support decrypt.
This bug also impacts encrypted backups. Users are highly encouraged to stop using 3.0.1 if you use encrypted backups or if you need decrypt of data in TWRP.
-Add Greek translation to some builds.
CHANGELOG for 3.0.1-0:
-support new CM 13.0 pattern encryption (sultanqasim)
-fix slow flashing issue due to modprobe (present on only some devices) (#twrp)
-libtar updated to latest upstream and fixes (jcadduono)
-fixes for loading custom themes (_that)
-TWRP will now detect and install TWRP themes automatically through the normal zip install process (Dees_Troy)
-translation updates - added Italian, Czech and Polish and significant updates to Dutch
-progress bar improvements - progress bar updates during image flashing and better tracks progress during file system backups (tar) (Dees_Troy)
-fix input box text display (Dees_Troy)
-reboot option after zip install complete (bigbiff)
-other mostly invisible bug fixes and improvements
CHANGELOG for 3.0.0-0:
-Completely new theme - Much more modern and much nicer looking (by z31s1g)
-True Terminal Emulator - Includes arrow keys, tab and tab completion, etc. (by _that)
-Language translation - It won’t be perfect and especially some languages that require large font files like Chinese & Japanese
won’t be availble on most devices. Also some languages may only be partially translated at this time. Feel free to submit more translations to OmniROM’s Gerrit. (mostly by Dees_Troy)
-Flashing of sparse images - On select devices you will be able to flash some parts of factory images via the TWRP GUI (by HashBang173)
-Adopted storage support for select devices - TWRP can now decrypt adopted storage partitions from Marshmallow
-Reworked graphics to bring us more up to date with AOSP - includes support for adf and drm graphics (by Dees_Troy)
-SuperSU prompt will no longer display if a Marshmallow ROM is installed
-Update exfat, exfat fuse, dosfstools (by mdmower)
-Update AOSP base to 6.0
-A huge laundry list of other minor fixes and tweaks
SOURCE CODE
TWRP: https://github.com/omnirom/android_bootable_recovery (android-6.0)
Device tree: https://github.com/TeamWin/android_device_oppo_r7sf (master)
Thanks! & Contributors!
My wife for her patience love you baby!
Team Win, especially Dees-Troys, MSF, Captain_Throwback
Most of all! Uberlaggydarwin , without you this would not have been possible
As promised I have created a Guide on how to install TWRP permanently on the Oppo R7S. It is attached. See below!
Update: Updated Guide to V3 due to TWRP Update and minor fixes in the Guide.
Counter:
GuideV1.pdf = ~1000 Downloads
GuideV2.pdf = 3700 Downloads
GuideV3.pdf = 2918 Downloads
Does it mean that bootloader is unlocked ?
lapocompris said:
Does it mean that bootloader is unlocked ?
Click to expand...
Click to collapse
You are able to unlock the bootloader. For me it's just not possible to enter twrp. Everytime gets overwritten by color os recovery.
OK. Just tested it on the R7 Lite. It works well. Also, as expected, it has soft keys and the hard keys dont work.
Could anyone point me to a step by step instruction on how to install twrp recovery. Sorry for the novice question. Sorry without Root as I'm on latest 5.1.1 and cannot root with oppo tools.
smokeyrider said:
Could anyone point me to a step by step instruction on how to install twrp recovery. Sorry for the novice question. Sorry without Root as I'm on latest 5.1.1 and cannot root with oppo tools.
Click to expand...
Click to collapse
Just head over to the twrp page. The is an instruction written down. Don't forget to unlock your bootloader.
Hi I have followed the instructions. I can "adb reboot bootloader" and get oppo bootloader screen. When I enter "fastboot flash recovery twrp.img" My phone just reboots to normal and the CMD prompt just hangs "waiting for device". Any assistance appreciated. I have latest 5.1.1 Color OS and Windows 10 machine. Thanks.
Ravikirancg said:
OK. Just tested it on the R7 Lite. It works well. Also, as expected, it has soft keys and the hard keys dont work.
Click to expand...
Click to collapse
if you have root and could provide me with the output of the partition details I can build a TWRP specific for the R7 Lite. if it has not been done yet.
I will need information output of:
ls -l /dev/block/bootdevice/by-name/
and
cat /proc/partitions
you will need to have root and switch to "su" in the shell before entering the commands.
celoxocis said:
if you have root and could provide me with the output of the partition details I can build a TWRP specific for the R7 Lite. if it has not been done yet.
I will need information output of:
ls -l /dev/block/bootdevice/by-name/
and
cat /proc/partitions
you will need to have root and switch to "su" in the shell before entering the commands.
Click to expand...
Click to collapse
Your alive celoxocis!
Do you have some news on twrp for ps, your cm build etc?
MacLaughlin said:
Your alive celoxocis!
Do you have some news on twrp for ps, your cm build etc?
Click to expand...
Click to collapse
CM is still work in progress. I will be leaving tomorrow for a one week getaway. After that I plan to write a PDF guide for those with PS how to install TWRP as PS fastboot allows for bootloader unlocking.
celoxocis said:
CM is still work in progress. I will be leaving tomorrow for a one week getaway. After that I plan to write a PDF guide for those with PS how to install TWRP as PS fastboot allows for bootloader unlocking.
Click to expand...
Click to collapse
I thought you need to update the twrp version? The only problem was twrp didn't get recognized and gets overwritten by color os recovery.
MacLaughlin said:
I thought you need to update the twrp version? The only problem was twrp didn't get recognized and gets overwritten by color os recovery.
Click to expand...
Click to collapse
the overwrite of the coloros recovery only happens if the bootloader is not unlocked.
celoxocis said:
the overwrite of the coloros recovery only happens if the bootloader is not unlocked.
Click to expand...
Click to collapse
But I get a success notification...? Fastboot oem unlock
MacLaughlin said:
But I get a success notification...? Fastboot oem unlock
Click to expand...
Click to collapse
if you do "fastboot OEM unlock" twice. does it show "already unlocked" the second time?
celoxocis said:
the overwrite of the coloros recovery only happens if the bootloader is not unlocked.
Click to expand...
Click to collapse
C:\Program Files (x86)\Minimal ADB and Fastboot>fastboot oem device-info
...
(bootloader) Device tampered: false
(bootloader) Device unlocked: true
(bootloader) Charger screen enabled: false
(bootloader) Display panel:
OKAY [ 0.016s]
finished. total time: 0.016s
C:\Program Files (x86)\Minimal ADB and Fastboot>fastboot oem unlock
...
(bootloader) Device already : unlocked!
OKAY [ -0.000s]
finished. total time: -0.000s
C:\Program Files (x86)\Minimal ADB and Fastboot>fastboot boot twrp.img
downloading 'boot.img'...
OKAY [ 0.811s]
booting...
FAILED (remote: dtb not found)
finished. total time: 0.874s
So the bootloader is unlocked. DTB stands for Device Tree Blob and is a mechanism to pass low level hardware information between bootloader and kernel. So I guess it's just not for PS.
---------- Post added at 07:05 PM ---------- Previous post was at 06:44 PM ----------
celoxocis said:
if you do "fastboot OEM unlock" twice. does it show "already unlocked" the second time?
Click to expand...
Click to collapse
Yes!
MacLaughlin said:
C:\Program Files (x86)\Minimal ADB and Fastboot>fastboot oem device-info
...
(bootloader) Device tampered: false
(bootloader) Device unlocked: true
(bootloader) Charger screen enabled: false
(bootloader) Display panel:
OKAY [ 0.016s]
finished. total time: 0.016s
C:\Program Files (x86)\Minimal ADB and Fastboot>fastboot oem unlock
...
(bootloader) Device already : unlocked!
OKAY [ -0.000s]
finished. total time: -0.000s
C:\Program Files (x86)\Minimal ADB and Fastboot>fastboot boot twrp.img
downloading 'boot.img'...
OKAY [ 0.811s]
booting...
FAILED (remote: dtb not found)
finished. total time: 0.874s
So the bootloader is unlocked. DTB stands for Device Tree Blob and is a mechanism to pass low level hardware information between bootloader and kernel. So I guess it's just not for PS.
---------- Post added at 07:05 PM ---------- Previous post was at 06:44 PM ----------
Yes!
Click to expand...
Click to collapse
I know what DTB stands for I can see that you are on Project Spectrum. The DTB for PS (Marshmallow) is different than that for ColorOS (Lollipop) there fore it is not working. The offical TWRP is based on ColorOS for the mainstream available. Project Spectrum is only available for beta testers. However "fastboot flash recovery TWRP. IMG" should work. To enter TWRP simply hold down volume-down + power button. When I finish CM I will release a TWRP with kernel+DTB based on Android 6.0!
celoxocis said:
I know what DTB stands for I can see that you are on Project Spectrum. The DTB for PS (Marshmallow) is different than that for ColorOS (Lollipop) there fore it is not working. The offical TWRP is based on ColorOS for the mainstream available. Project Spectrum is only available for beta testers. However "fastboot flash recovery TWRP. IMG" should work. To enter TWRP simply hold down volume-down + power button. When I finish CM I will release a TWRP with kernel+DTB based on Android 6.0!
Click to expand...
Click to collapse
Sadly this is not working. I can flash TWRP but if I try to enter TWRP the screen just stays black. At the moment I'm not able to enter recovery, with key buttons. Also Color Os recovery isn't working at the moment.
just reflash PS and you will have stock recovery back. for now CM and new TWRP for CM is not done.
celoxocis said:
just reflash PS and you will have stock recovery back. for now CM and new TWRP for CM is not done.
Click to expand...
Click to collapse
I will flash stock recovery again. Maybe later on the new version of ps.
celoxocis said:
just reflash PS and you will have stock recovery back. for now CM and new TWRP for CM is not done.
Click to expand...
Click to collapse
Okay stock recovery isn't working anymore as well. The screen just stays black. Got exactly the same error as when flashing twrp. Now I'm without a working recovery ???? maybe I can extract the recovery img. from spectrum. See if this is working.

[DEV] Huawei Honor Bee (Y541 - U02) Spreadtrum Secure Boot

Introduction
The System-On-a-Chip the device runs on is enforced with a proprietary secure-boot. Nothing but official images and binaries are accepted to be flashed.​
Background
Booting goes through three stages: bootrom, bootloader and kernel. According to documents about secure boot on these chips is that there is a root certificate existing on the hardware with a chain-of-trust security protocol. Each phase checks the binaries the other contains.
To generate a header, we need a key pair. A key pair consist of a password of exactly eight ASCII characters together with a key of not more than forty-nine characters. In the Spreadtrum document referenced below the key is treated as the product name.
The signing process needs three key pairs found in sig_keys.ini that will be read by RSAKeyGen and generate keys.db. The generated keys.db will always be referenced by the signing tools along with sig_bins.ini which contains the filename inputs and outputs.
Now the first and second key pairs are used to sign fdl1.bin and u-boot-spl-16k.bin with BscGen. Second and third key pairs are used to sign fdl2.bin and u-boot.bin with VLRSign. The last one is used alone to sign boot.img and recovery.img with VLRSign. The RSA + hash of the file is prepended and appended to the first two sets of boot files, and the rest have it only prepended.
In the Spreadtrum document, it stated that only the hash value of the first boot binary, in this case fdl1.bin should match the hash stored in the chip.
Reading through the document some more, it has come to my attention that apparently the hash of the signed boot binary is what the chip holds. It emphasized protection of the key.db because it contains randomly generated RSA for the key pair. I've compared two identical key pair sets and it does what it stated. Losing the key.db means the board is scrapped if it were in manufacturing.
That closes our brute force attack option sad to say.​
Digging Around The Binaries
Having the u-boot binaries on hand I managed to extract two oem commands:
Code:
oem get-psid
oem get-bootinfo
oem get-psid:
Code:
(bootloader) SN:Y541XXXXXXXXXXXX-XXXXX
OKAY [ 0.007s]
Finished. Total time: 0.007s
oem get-bootinfo:
Code:
(bootloader) INFO:unlocked
OKAY [ 0.015s]
Finished. Total time: 0.015s
As you can see its just information commands and yes, the bootloader is unlocked, which is bogus. There was never an unlock code given by Huawei upon contacting them. They said the device isn't supported in the database, which funny enough is true, because there was no oem unlock command to begin with.
I hope I'm wrong, though a few related documents about security itself is that companies do either allow or deny you of control to unlocking. Unless Huawei gives us the key.db we will be going nowhere with brute force method.​
Engineering Mode
One can open the engineering application to debug and show more information about the device by dialing:
Code:
*#*#83781#*#*
The documents stated something about checking if the hash is written on the chip by going to HARDWARETEST tab. My device just says hash value written. Kept our hopes up I know.
Navigating to DEBUG&LOG you will find System Info. Click on that and then click on Version Info.
My device:
Code:
Platform Version: MOCORTM_14B_TSHARK28_HUAWEI_W15.34_P5_Debug
Project Version: sc7731g_CP0_modem
BASE Version: TM_BASE_MP_II_HUAWEI_W16.06
HW Version: sc7731g_CP0_modem
Release Date: 02-18-2016 10:02:37
This might come in handy for finding source codes, and also possibly prevent flashing the wrong firmware.​
Entrypoint
Our only option right now is finding exploits on the bootloader since we do have some of the source codes to base off on. Check the relevant repository link below.​
Final Thoughts
This device is a headache to be honest. I've been scouring everything I could find about it since 2016. Much appreciated if an able body can proceed to help, or just go to Huawei Support and ask them through e-mail.
The instructions for using the signing tool is in the GitHub repository linked below and a related paper for the interested.
In any case this post will continue to be updated.​
Resources
Spreadtrum Secure Boot Tools
Spreadtrum Secure Boot Document (Chinese)
Other Spreadtrum Secure Boot Document (Chinese)
Chipram Repository
Apparently the libefuse shared library in /system/lib displays the hash:
Code:
ef9b361fa1cb9ddbece00c60c5736b8de65f2be8
This accounts for all Y541-U02 variants.

Categories

Resources