[NOUGAT][RECOVERY] TWRP mod (COMPLETE BACKUP) - Honor 7X ROMs, Kernels, Recoveries, & Other Devel
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Requirements:
Unlocked Honor 7x : See this [But don't flash twrp from anywhere else before backing up your device. Use twrpimgmount for backing it up first.]
Download:
TWRP Complete Backup
TWRP Img mount
Instructions:
Flash twrpimgmount.img through fastboot
Code:
fastboot flash recovery twrpimgmount.img
fastboot flash recovery2 twrpimgmount.img
Backup/restore and flash image functions are tested for system/vendor/product/version/cust/oeminfo/recovery/recovery2/boot rest of them are not tested by me but should work.
Note: It is suggested to make a complete backup in memory card before rooting your Honor 7x.
After backing up, flash TWRP Complete Backup
Join Telegram group if you are willing to test latest stuff
Credits:
Ported form Honor 6x : OP
Follow next:
1. Make Complete Backup using TWRP Img mount
2. Make Complete Backup using PC
XDA:DevDB Information
[NOUGAT]TWRP COMPLETE BACKUP, Tool/Utility for the Honor 7X
Contributors
Sudeep Duhoon, OldDroid, surdu_petru, xepeleato
Source Code: https://github.com/OpenKirin/android_device_honor_berlin
Version Information
Status: Testing
Created 2017-12-31
Last Updated 2018-03-17
For oreo : Go here
This work for BND-L24 US version?
crayonicle said:
This work for BND-L24 US version?
Click to expand...
Click to collapse
It should
Sent from my BND-AL10 using Tapatalk
Sudeep Duhoon said:
It should
Sent from my BND-AL10 using Tapatalk
Click to expand...
Click to collapse
Confirmed working for BND-L24
It works!!
How can i restore the original Recovery? (so I can update the phone)
Thanks!
lowspeed said:
How can i restore the original Recovery? (so I can update the phone)
Thanks!
Click to expand...
Click to collapse
Here is the OPs reply to me in another thread.
Sudeep Duhoon said:
No it won't, it'll backup twrp recovery instead
But you can get stock recoveries from here
https://forum.xda-developers.com/devdb/project/?id=23956#downloads
Click to expand...
Click to collapse
update fails after restoring stock recovery. Weird.
Also the directories still seems to be encrypted after flashing this TWRP. Any trick i'm missing?
lowspeed said:
update fails after restoring stock recovery. Weird.
Also the directories still seems to be encrypted after flashing this TWRP. Any trick i'm missing?
Click to expand...
Click to collapse
Flash system and boot through fastboot to update.
This recovery don't auto decrypt data.
Sent from my BND-AL10 using Tapatalk
Sudeep Duhoon said:
Flash system and boot through fastboot to update.
This recovery don't auto decrypt data.
Sent from my BND-AL10 using Tapatalk
Click to expand...
Click to collapse
Got directions? The update.zip I know where to get but what do I do with it? (I only know how to use recovery to flash it)
Sudeep Duhoon said:
Flash system and boot through fastboot to update.
This recovery don't auto decrypt data.
Sent from my BND-AL10 using Tapatalk
Click to expand...
Click to collapse
only available files in the update.zip is this: No system.img
-a---- 12/5/2017 6:32 PM 15519744 BOOT.img
-a---- 1/3/2018 10:53 AM 98 BOOT.img.header
-a---- 12/5/2017 6:32 PM 13666 CRC.img
-a---- 1/3/2018 10:53 AM 98 CRC.img.header
-a---- 12/5/2017 6:32 PM 15 CURVER.img
-a---- 1/3/2018 10:53 AM 98 CURVER.img.header
-a---- 12/5/2017 6:32 PM 16035840 DTS.img
-a---- 1/3/2018 10:53 AM 98 DTS.img.header
-a---- 12/5/2017 6:32 PM 17408 EFI.img
-a---- 1/3/2018 10:53 AM 98 EFI.img.header
-a---- 12/5/2017 6:32 PM 2702912 FASTBOOT.img
-a---- 1/3/2018 10:53 AM 98 FASTBOOT.img.header
-a---- 12/5/2017 6:32 PM 3346688 FW_HIFI.img
-a---- 1/3/2018 10:53 AM 98 FW_HIFI.img.header
-a---- 12/5/2017 6:32 PM 168064 FW_LPM3.img
-a---- 1/3/2018 10:53 AM 98 FW_LPM3.img.header
-a---- 12/5/2017 6:32 PM 6688492 MODEMNVM_UPDATE.img
-a---- 1/3/2018 10:53 AM 98 MODEMNVM_UPDATE.img.header
-a---- 12/5/2017 6:32 PM 100663296 MODEM_FW.img
-a---- 1/3/2018 10:53 AM 98 MODEM_FW.img.header
-a---- 12/5/2017 6:32 PM 14 PACKAGE_TYPE.img
-a---- 1/3/2018 10:53 AM 98 PACKAGE_TYPE.img.header
-a---- 12/5/2017 6:32 PM 37165056 RECOVERY.img
-a---- 1/3/2018 10:53 AM 98 RECOVERY.img.header
-a---- 12/5/2017 6:32 PM 37165056 RECOVERY2.img
-a---- 1/3/2018 10:53 AM 98 RECOVERY2.img.header
-a---- 12/5/2017 6:32 PM 778304 SENSORHUB.img
-a---- 1/3/2018 10:53 AM 98 SENSORHUB.img.header
-a---- 12/5/2017 6:32 PM 256 SHA256RSA.img
-a---- 1/3/2018 10:53 AM 98 SHA256RSA.img.header
-a---- 12/5/2017 6:32 PM 3085696 TEEOS.img
-a---- 1/3/2018 10:53 AM 98 TEEOS.img.header
-a---- 12/5/2017 6:32 PM 109568 TRUSTFIRMWARE.img
-a---- 1/3/2018 10:53 AM 98 TRUSTFIRMWARE.img.header
-a---- 12/5/2017 6:32 PM 1136 VERLIST.img
-a---- 1/3/2018 10:53 AM 98 VERLIST.img.header
-a---- 12/5/2017 6:32 PM 69184 XLOADER.img
-a---- 1/3/2018 10:53 AM 98 XLOADER.img.header
lowspeed said:
only available files in the update.zip is this: No system.img
-a---- 12/5/2017 6:32 PM 15519744 BOOT.img
-a---- 1/3/2018 10:53 AM 98 BOOT.img.header
-a---- 12/5/2017 6:32 PM 13666 CRC.img
-a---- 1/3/2018 10:53 AM 98 CRC.img.header
-a---- 12/5/2017 6:32 PM 15 CURVER.img
-a---- 1/3/2018 10:53 AM 98 CURVER.img.header
-a---- 12/5/2017 6:32 PM 16035840 DTS.img
-a---- 1/3/2018 10:53 AM 98 DTS.img.header
-a---- 12/5/2017 6:32 PM 17408 EFI.img
-a---- 1/3/2018 10:53 AM 98 EFI.img.header
-a---- 12/5/2017 6:32 PM 2702912 FASTBOOT.img
-a---- 1/3/2018 10:53 AM 98 FASTBOOT.img.header
-a---- 12/5/2017 6:32 PM 3346688 FW_HIFI.img
-a---- 1/3/2018 10:53 AM 98 FW_HIFI.img.header
-a---- 12/5/2017 6:32 PM 168064 FW_LPM3.img
-a---- 1/3/2018 10:53 AM 98 FW_LPM3.img.header
-a---- 12/5/2017 6:32 PM 6688492 MODEMNVM_UPDATE.img
-a---- 1/3/2018 10:53 AM 98 MODEMNVM_UPDATE.img.header
-a---- 12/5/2017 6:32 PM 100663296 MODEM_FW.img
-a---- 1/3/2018 10:53 AM 98 MODEM_FW.img.header
-a---- 12/5/2017 6:32 PM 14 PACKAGE_TYPE.img
-a---- 1/3/2018 10:53 AM 98 PACKAGE_TYPE.img.header
-a---- 12/5/2017 6:32 PM 37165056 RECOVERY.img
-a---- 1/3/2018 10:53 AM 98 RECOVERY.img.header
-a---- 12/5/2017 6:32 PM 37165056 RECOVERY2.img
-a---- 1/3/2018 10:53 AM 98 RECOVERY2.img.header
-a---- 12/5/2017 6:32 PM 778304 SENSORHUB.img
-a---- 1/3/2018 10:53 AM 98 SENSORHUB.img.header
-a---- 12/5/2017 6:32 PM 256 SHA256RSA.img
-a---- 1/3/2018 10:53 AM 98 SHA256RSA.img.header
-a---- 12/5/2017 6:32 PM 3085696 TEEOS.img
-a---- 1/3/2018 10:53 AM 98 TEEOS.img.header
-a---- 12/5/2017 6:32 PM 109568 TRUSTFIRMWARE.img
-a---- 1/3/2018 10:53 AM 98 TRUSTFIRMWARE.img.header
-a---- 12/5/2017 6:32 PM 1136 VERLIST.img
-a---- 1/3/2018 10:53 AM 98 VERLIST.img.header
-a---- 12/5/2017 6:32 PM 69184 XLOADER.img
-a---- 1/3/2018 10:53 AM 98 XLOADER.img.header
Click to expand...
Click to collapse
You need a Full Firmware Package.
But there is no for L21 and L24,must wait until there is one
skippotter said:
Confirmed working for BND-L24
Click to expand...
Click to collapse
I updated to the latest version "BND-L24C567B130" do you think I can still continue with this method?
Sudeep Duhoon said:
Flash system and boot through fastboot to update.
This recovery don't auto decrypt data.
Click to expand...
Click to collapse
Can you please explain on video or YouTube
I am a new users of Android
tootysa said:
Can you please explain on video or YouTube
I am a new users of Android
Click to expand...
Click to collapse
You shouldn't be doing this if you're a new user then
Cringing said:
I updated to the latest version "BND-L24C567B130" do you think I can still continue with this method?
Click to expand...
Click to collapse
Yes. You can.
Sent from my iPhone using Tapatalk
ahmad.o said:
You shouldn't be doing this if you're a new user then
Click to expand...
Click to collapse
Really ?
Would someone with a working BND-L21 be kind enough to upload a twrp backup?
With no full ota being out, it'd help alot with the unbricking, gapps, etc. situation.... thanks
Is anyone can help me
How to mount back internal storage in honor 7x I lost it something I do wrong ??
I m not able to install zip files from internal and external storage
Or tell me about full stock flash
Please please help me devs
Related
I Need a BIG help to root my device
So I tried EVERYTHING to root my Sony Tablet and nothing! When I type "adb devices" in ADB Command Prompt it just says List of Devices Attached and nothing more! It doesn't show my tablet. The Windows is not recognizing the Sony_Tablet (debug mode) but just the MTP I tried to install de .inf file (Android Composite ADB Interface) to make it work but the Windows simply didn't let me! It says "The hash for the file is not present in the specified catalog file" Please help me I'm going nuts here!!!
same here -- hash file not present/tampered What version of Android and what version of Windows are you running? I am running Win8 RP. I just loaded the Android ADK (4.1). Trying to connect to a kindle fire: For "Android Composite ADB Interface" I get and error: "the hash for the file is not present in the specified catalog file. The file is likely corrupt or the victim of tampering." I am running X64 cat file signature: from 6/23 C:\Program Files (x86)\Android\android-sdk\extras\google\usb_driver Thumbprint from androidwinusb86.cat 06 c9 2b ec 3b bf 32 06 8c b9 20 85 63 d0 04 16 94 48 ee 21 androidwinusba64.cat 8f d9 9d 63 fb 3a fb d5 34 a4 f6 e3 1d ac d2 7f 59 50 40 21 Files: Directory of C:\Program Files (x86)\Android\android-sdk\extras\google\usb_driver 06/30/2012 11:11 AM <DIR> . 06/30/2012 11:11 AM <DIR> .. 06/30/2012 10:42 AM <DIR> amd64 06/30/2012 10:42 AM 9,239 androidwinusb86.cat 06/30/2012 10:42 AM 9,275 androidwinusba64.cat 06/30/2012 11:11 AM 4,540 android_winusb.inf 06/30/2012 10:42 AM <DIR> i386 06/30/2012 10:42 AM 16,514 source.properties 4 File(s) 39,568 bytes Directory of C:\Program Files (x86)\Android\android-sdk\extras\google\usb_drive r\amd64 06/30/2012 10:42 AM <DIR> . 06/30/2012 10:42 AM <DIR> .. 06/30/2012 10:42 AM 236 NOTICE.txt 06/30/2012 10:42 AM 1,721,576 WdfCoInstaller01009.dll 06/30/2012 10:42 AM 1,002,728 winusbcoinstaller2.dll 06/30/2012 10:42 AM 2,152,176 WUDFUpdate_01009.dll 4 File(s) 4,876,716 bytes Directory of C:\Program Files (x86)\Android\android-sdk\extras\google\usb_driver\i386 06/30/2012 10:42 AM <DIR> . 06/30/2012 10:42 AM <DIR> .. 06/30/2012 10:42 AM 236 NOTICE.txt 06/30/2012 10:42 AM 1,461,992 WdfCoInstaller01009.dll 06/30/2012 10:42 AM 851,176 winusbcoinstaller2.dll 06/30/2012 10:42 AM 1,837,296 WUDFUpdate_01009.dll 4 File(s) 4,150,700 bytes Total Files Listed: 12 File(s) 9,066,984 bytes 8 Dir(s) 9,815,154,688 bytes free
Dont use windows 8. Use Win XP only! Use the driver found here: http://forum.xda-developers.com/showthread.php?t=1488822. (credits to BlueChipJ). Open the file android_winusb.inf. Look for the two sections called ";SONY Sony Tablet S" and remove " " from "%CompositeAdbInterface%". It should now look like this: ;SONY Sony Tablet S %CompositeAdbInterface% = USB_Install, USB\VID_054C&PID_05B4&MI_01 Save the file. Use the driver installer provided. Connect the device and try the adb which is provided with the driver. It's best to try this on a fresh computer which doesnt have the adb drivers. If i have helped you, click the thanks button!
[Q] 1.0.1-4ubuntu5.3 for lib was not found error
Guys am getting this error.. i was trying to set up build environment on Ubuntu 12.04 LTS using this guide http://forum.xda-developers.com/showpost.php?p=30958867&postcount=1 screenshot: https://www.dropbox.com/s/wiz9al02oyxx4xm/ubuntu_tes.png
When i install OpenSSL I just type Code: sudo apt-get install openssl ---------- Post added at 10:22 AM ---------- Previous post was at 10:20 AM ---------- By the way, if you want something much more in depth, check this link
matt95 said: When i install OpenSSL I just type Code: sudo apt-get install openssl ---------- Post added at 10:22 AM ---------- Previous post was at 10:20 AM ---------- By the way, if you want something much more in depth, check this link Click to expand... Click to collapse Sorry mate. Getting the same error. I did what u said..it has been installed. Even I installed openssl from source. But when I type that command stated in the guide I get the same error @matt95 Am going to try your method tomorrow. . Sent from my GT-I9100 using Tapatalk 2
How to unpack and repack Oreo ROM?
I am trying to add a few things into system.img for a Chuwi H9Air. It is an MTK MT6797 chip. I download the firmware and it has the following files: 04/08/2018 04:45 PM 146,026 APDB_MT6797_S01_alps-trunk-o0.tk_W17.45 06/04/2018 11:43 AM 10,298,256 boot.img 06/02/2018 08:23 PM 9,044,272 cache.img 04/02/2018 10:37 AM 2,333,509 DbgInfo_DSP_MT6797_MOLY_LR11_W1630_MD_MP_V67_2_2018_03_06_16_40_1_ulwctg_n 04/08/2018 04:09 PM 3,078,862 DbgInfo_LR11.W1630.MD.MP_TK_MD_BASIC_MOLY_LR11_W1630_MD_MP_V67_2_2018_04_02_17_52_1_ulwctg_n 06/02/2018 01:49 PM 418,240 lk.img 06/02/2018 01:49 PM 2,762,896 logo.bin 06/02/2018 01:53 PM 528 md1arm7.img 06/02/2018 01:53 PM 1,015,120 md1dsp.img 06/02/2018 01:53 PM 18,196,000 md1img.img 06/02/2018 01:53 PM 4,255,344 md3img.img 04/02/2018 10:37 AM 1,271,188 MDDB.C2K.META_MT6797_S00_SIXTH_CBP_MD_MP5_V72_2_3_3g_n.EDB 04/08/2018 04:09 PM 788,954 MDDB.META_MT6797_S00_MOLY_LR11_W1630_MD_MP_V67_2_1_ulwctg_n.EDB 04/08/2018 04:09 PM 61,806,498 MDDB_InfoCustomAppSrcP_MT6797_S00_MOLY_LR11_W1630_MD_MP_V67_2_1_ulwctg_n.EDB 06/02/2018 01:50 PM 14,119 MT6797_Android_scatter.txt 06/02/2018 03:20 PM 71,440 odmdtbo.img 06/02/2018 01:50 PM 189,528 preloader_x970_t10.bin 06/04/2018 11:43 AM 12,082,064 recovery.img 06/04/2018 11:40 AM 42,688 scp.img 06/27/2018 08:24 AM 1,846,269,976 system.img 06/04/2018 11:40 AM 90,112 tee.img 06/04/2018 11:44 AM 53,470,064 userdata.img 06/04/2018 11:44 AM 381,834,204 vendor.img I tried to use MTK_Extractor_V2.6.3 to unpack and repack system.img. Then I use SP_Flash_Tool_v5.1804_Win to flash it back. However, I got stuck at fast boot. It appears that Oreo and earlier has dm-verify. So I tried: Remove verified tag in the vendor.img at etc\fstab.mt6797 and remove the verity_key file in initrd of boot.img. This go into fastboot. Just remove verified tag in the vendor.img at etc\fstab.mt6797. This go into a boot loop. But I still see the same problem. Is there any suggestion on how to proceed? Thanks.
Do you have Oreo on your MTK6797 ? I just purchased a generic tablet said to have v8 on it, when it arrived it was 4.4 spoofed to show 8.0 now I need to upgrade at least to 5 to get my apps to run on it. I'm not familiar with the limitations can the MTK6797 run v8? is this rom specific to the MTK6797 or to the tablet hardware?
HD1925 OnePlus 7t Pro McLaren 5g - Crowdsourced Data Request.
ntzrmtthihu777 said: So, I've been doing some work on getting LineageOS to work on this device. No idea as of right now if it will work on any other carrier variants (I think they don't allow for bootloader unlocking?). Currently everything 'works' (some is buggy but that may be more to do with the fact that 17.1 is not currently finished) with the exception of two things I've tested/noticed (other stuff may be broken but I've not seen them yet): audio in calls (I can make/take calls but I can't hear or be heard. Audio works as I can play music in the LineageOS music app and record/playback the recording in the app) and the fingerprint sensor (pretty sure I'm just missing some part from the stock ROM). What I'm asking is that all owners of stock (unlocked/rooted is probably fine, custom kernels prob not) collect some logs for me during specific activities so I can determine what is missing and maybe produce a rom for you guys to test out without losing some features. I'd like three things: 1. Follow the instructions here and upload the oem_log folder to somewhere and share it. 2. A logcat of boot up through making a phone call and hang up. To take this, you'll need developer mode and adb debugging enabled on the phone and the platform tools (adb primarily) set up for your operating system. From either cmd.exe (windows) or Terminal.app (OSX) or your preferred terminal emulator (Linux, too many options to list them all), enter this command: Code: adb logcat > logcat.call.log Then, power your phone off, hook it up via USB to the machine, power it on, place the call, say a few words, hang up. Then press ctrl+c in the cmd/terminal/whatever window to end the logging session. 3. A logcat of boot up through enrolling a fingerprint in the phone and unlocking via the fingerprint. Same procedure, but the command is: Code: adb logcat > logcat.finger.log Optionally, for those with rooted phones, I'd like these logs as well: 4. A dmesg during boot up through making a call and hangup. Same procedure as #2, but the command is Code: adb shell su -c dmesg > dmesg.call.log 5. A dmesg during boot up through enrolling a fingerprint in the phone and unlocking via the fingerprint. Same procedure as #3 but the command is Code: adb shell su -c dmesg > dmesg.finger.log The files gathered from #2-5 will be in the current directory you executed the logcat command from. On windows it will say this right before where you type the command, and on OSX/Linux this will probably be in your home directory, unless you changed the directory first. I expect OSX or Linux users to be a bit more savvy about this already. The files may contain unique data to your phone (serial number, IMEI, other things) but android filters out all but the last two numbers of the phone you are calling, so its generally ok. However, I do not suggest posting links to these files here, but you can message me them directly here. If/when you do this, please make note of the exact model number of your phone (not sure if all 5g phones are HD1925 or not), current firmware version, and baseband version. These can all be found in settings->about phone or so. Click to expand... Click to collapse Hopefully we can get all this sorted out before too long and have working lineage builds quickly. Thanks in advance and happy hacking!
ntzrmtthihu777 said: So, I've been doing some work on getting LineageOS to work on this device. No idea as of right now if it will work on any other carrier variants (I think they don't allow for bootloader unlocking?). Currently everything 'works' (some is buggy but that may be more to do with the fact that 17.1 is not currently finished) with the exception of two things I've tested/noticed (other stuff may be broken but I've not seen them yet): audio in calls (I can make/take calls but I can't hear or be heard. Audio works as I can play music in the LineageOS music app and record/playback the recording in the app) and the fingerprint sensor (pretty sure I'm just missing some part from the stock ROM). What I'm asking is that all owners of stock (unlocked/rooted is probably fine, custom kernels prob not) collect some logs for me during specific activities so I can determine what is missing and maybe produce a rom for you guys to test out without losing some features. I'd like three things: 1. Follow the instructions here and upload the oem_log folder to somewhere and share it. 2. A logcat of boot up through making a phone call and hang up. To take this, you'll need developer mode and adb debugging enabled on the phone and the platform tools (adb primarily) set up for your operating system. From either cmd.exe (windows) or Terminal.app (OSX) or your preferred terminal emulator (Linux, too many options to list them all), enter this command: Then, power your phone off, hook it up via USB to the machine, power it on, place the call, say a few words, hang up. Then press ctrl+c in the cmd/terminal/whatever window to end the logging session. 3. A logcat of boot up through enrolling a fingerprint in the phone and unlocking via the fingerprint. Same procedure, but the command is: Optionally, for those with rooted phones, I'd like these logs as well: 4. A dmesg during boot up through making a call and hangup. Same procedure as #2, but the command is 5. A dmesg during boot up through enrolling a fingerprint in the phone and unlocking via the fingerprint. Same procedure as #3 but the command is The files gathered from #2-5 will be in the current directory you executed the logcat command from. On windows it will say this right before where you type the command, and on OSX/Linux this will probably be in your home directory, unless you changed the directory first. I expect OSX or Linux users to be a bit more savvy about this already. The files may contain unique data to your phone (serial number, IMEI, other things) but android filters out all but the last two numbers of the phone you are calling, so its generally ok. However, I do not suggest posting links to these files here, but you can message me them directly here. If/when you do this, please make note of the exact model number of your phone (not sure if all 5g phones are HD1925 or not), current firmware version, and baseband version. These can all be found in settings->about phone or so. Hopefully we can get all this sorted out before too long and have official lineage builds quickly. Thanks in advance and happy hacking! Click to expand... Click to collapse If I can get my hands on my laptop, I'll see if I can help out with this. Will PM you if I can manage it!
champ784 said: If I can get my hands on my laptop, I'll see if I can help out with this. Will PM you if I can manage it! Click to expand... Click to collapse Thanks much, would be quite helpful I think. its soo frikken close to being done and usable as a phone.
ntzrmtthihu777 said: Thanks much, would be quite helpful I think. its soo frikken close to being done and usable as a phone. Click to expand... Click to collapse Super excited but also worried as there is no proven way to restore to stock??
kirschdog1 said: Super excited but also worried as there is no proven way to restore to stock?? Click to expand... Click to collapse I don't know, as far as I can tell using the flash.zip in one of these threads did the trick for me, but as there is no ota to be taken I can't tell if that works or not.
kirschdog1 said: Super excited but also worried as there is no proven way to restore to stock?? Click to expand... Click to collapse You can use the msm tool to read back all partitions U will get the boot system vendor dtbo vbmeta,etc plus all bin files . just in case you screw up your 5g modem or lose your IMEI
twinnfamous said: You can use the msm tool to read back all partitions U will get the boot system vendor dtbo vbmeta,etc plus all bin files . just in case you screw up your 5g modem or lose your IMEI Click to expand... Click to collapse Explain.
ntzrmtthihu777 said: Explain. Click to expand... Click to collapse Open up msm tool and press f8 when the screen pops up use crtl+a to select all partitions the PW is oneplus then ok . Then press readback button .Power off phone and connect phone while holding both volume buttons to USB keep holding the buttons till it shows it's connected and readback will start and you should have all img files and bin files in C/
twinnfamous said: Open up msm tool and press f8 when the screen pops up use crtl+a to select all partitions the PW is oneplus then ok . Then press readback button .Power off phone and connect phone while holding both volume buttons to USB keep holding the buttons till it shows it's connected and readback will start and you should have all img files and bin files in C/ Click to expand... Click to collapse This would require the MSM tool specific to this device, would it not? If it doesn't, man, I need to get some folks to do this.
ntzrmtthihu777 said: This would require the MSM tool specific to this device, would it not? If it doesn't, man, I need to get some folks to do this. Click to expand... Click to collapse I've done it. But my bootloader is not unlocked and the OnePlus website says my IMEI is invalid. Use msm tool found in this forum. I used the one from my op7pro. This is something alot should have tried just from owning previous oneplus devices
ntzrmtthihu777 said: This would require the MSM tool specific to this device, would it not? If it doesn't, man, I need to get some folks to do this. Click to expand... Click to collapse I did mine already but my bootloader is still locked too invalid imei
twinnfamous said: Open up msm tool and press f8 when the screen pops up use crtl+a to select all partitions the PW is oneplus then ok . Then press readback button .Power off phone and connect phone while holding both volume buttons to USB keep holding the buttons till it shows it's connected and readback will start and you should have all img files and bin files in C/ Click to expand... Click to collapse There is no msm tool for the 5g McLaren... ?
kirschdog1 said: There is no msm tool for the 5g McLaren... ? Click to expand... Click to collapse Read a couple Posts before. There is msm tool in this forum that will work to read back from phone. https://forum-xda--developers-com.c...3A%2F%2Fwww.google.com&_tf=From%20%251%24s
@ntzrmtthihu777 Thank you very much for continuing to work on developing for this phone! Just sent you a PM with the logcats for the calls and fingerprint, oem_log, and screenshots of phone information. Please let me know if there is more I can help with
a63548 said: @ntzrmtthihu777 Thank you very much for continuing to work on developing for this phone! Just sent you a PM with the logcats for the calls and fingerprint, oem_log, and screenshots of phone information. Please let me know if there is more I can help with Click to expand... Click to collapse Is it within your wheelhouse to try the readback the previous poster in this thread mentioned? Shouldn't require the bootloader unlock, and you'd have the most virgin dump to provide to the rest of us for the moment.
twinnfamous said: Open up msm tool and press f8 when the screen pops up use crtl+a to select all partitions the PW is oneplus then ok . Then press readback button .Power off phone and connect phone while holding both volume buttons to USB keep holding the buttons till it shows it's connected and readback will start and you should have all img files and bin files in C/ Click to expand... Click to collapse The MSM tool is asking for a password? Edit: Nevermind the password is oneplus
ntzrmtthihu777 said: Is it within your wheelhouse to try the readback the previous poster in this thread mentioned? Shouldn't require the bootloader unlock, and you'd have the most virgin dump to provide to the rest of us for the moment. Click to expand... Click to collapse Reading back the files as I type Are there any files/partitions I should keep out of the archive I will be uploading for here? I selected all of them, but for safety would prefer to leave out any that might not be good to put online. Edit: Completed! Total uncompressed size 19GB (mainly due to super.img) Compressed size is 3.9GB. Sending you a link through PM. { "lightbox_close": "Close", "lightbox_next": "Next", "lightbox_previous": "Previous", "lightbox_error": "The requested content cannot be loaded. Please try again later.", "lightbox_start_slideshow": "Start slideshow", "lightbox_stop_slideshow": "Stop slideshow", "lightbox_full_screen": "Full screen", "lightbox_thumbnails": "Thumbnails", "lightbox_download": "Download", "lightbox_share": "Share", "lightbox_zoom": "Zoom", "lightbox_new_window": "New window", "lightbox_toggle_sidebar": "Toggle sidebar" } Code: 01/16/2020 03:43 AM <DIR> . 01/16/2020 03:43 AM <DIR> .. 01/16/2020 03:38 AM 8,388,608 abl.elf 01/16/2020 03:38 AM 67,108,864 aging.bin 01/16/2020 03:38 AM 33,554,432 aging_mod.bin 01/16/2020 03:38 AM 106,496 ALIGN_TO_128K_1.bin 01/16/2020 03:39 AM 106,496 ALIGN_TO_128K_2.bin 01/16/2020 03:38 AM 524,288 aop.mbn 01/16/2020 03:39 AM 262,144 apdp.mbn 01/16/2020 03:38 AM 100,663,296 boot.img 01/16/2020 03:38 AM 1,048,576 BTFM.bin 01/16/2020 03:39 AM 1,048,576 catecontentfv.bin 01/16/2020 03:39 AM 524,288 catefv.bin 01/16/2020 03:39 AM 2,097,152 cateloader.bin 01/16/2020 03:38 AM 131,072 cdt.bin 01/16/2020 03:38 AM 524,288 cmnlib.mbn 01/16/2020 03:38 AM 524,288 cmnlib64.mbn 01/16/2020 03:30 AM 524,288 config.bin 01/16/2020 03:38 AM 178,257,920 core_nhlos.bin 01/16/2020 03:38 AM 1,048,576 ddr.bin 01/16/2020 03:38 AM 131,072 devcfg.mbn 01/16/2020 03:39 AM 4,096 devinfo.bin 01/16/2020 03:39 AM 1,048,576 dip.bin 01/16/2020 03:38 AM 67,108,864 dspso.bin 01/16/2020 03:38 AM 25,165,824 dtbo.img 01/16/2020 03:30 AM 10,485,760 dynamic_nvbk.bin 01/16/2020 03:29 AM 524,288 frp.bin 01/16/2020 03:39 AM 131,072 fsc.bin 01/16/2020 03:39 AM 2,097,152 fsg.bin 01/16/2020 03:38 AM 2,097,152 fw_ufs1.bin 01/16/2020 03:38 AM 2,097,152 fw_ufs2.bin 01/16/2020 03:38 AM 2,097,152 fw_ufs3_a.bin 01/16/2020 03:38 AM 2,097,152 fw_ufs3_b.bin 01/16/2020 03:38 AM 2,097,152 fw_ufs4_a.bin 01/16/2020 03:38 AM 2,097,152 fw_ufs4_b.bin 01/16/2020 03:38 AM 2,097,152 fw_ufs5_a.bin 01/16/2020 03:38 AM 2,097,152 fw_ufs5_b.bin 01/16/2020 03:38 AM 20,480 gpt_backup0.bin 01/16/2020 03:38 AM 20,480 gpt_backup1.bin 01/16/2020 03:38 AM 20,480 gpt_backup2.bin 01/16/2020 03:38 AM 20,480 gpt_backup3.bin 01/16/2020 03:39 AM 20,480 gpt_backup4.bin 01/16/2020 03:39 AM 20,480 gpt_backup5.bin 01/16/2020 03:38 AM 24,576 gpt_main0.bin 01/16/2020 03:38 AM 24,576 gpt_main1.bin 01/16/2020 03:38 AM 24,576 gpt_main2.bin 01/16/2020 03:38 AM 24,576 gpt_main3.bin 01/16/2020 03:39 AM 24,576 gpt_main4.bin 01/16/2020 03:39 AM 24,576 gpt_main5.bin 01/16/2020 03:38 AM 8,388,608 hyp.mbn 01/16/2020 03:38 AM 2,097,152 imagefv.elf 01/16/2020 03:29 AM 524,288 keystore.bin 01/16/2020 03:38 AM 524,288 km4.mbn 01/16/2020 03:39 AM 4,096 limits.bin 01/16/2020 03:39 AM 67,108,864 logdump.bin 01/16/2020 03:39 AM 8,388,608 logfs_ufs_8mb.bin 01/16/2020 03:38 AM 16,777,216 logo.bin 01/16/2020 03:39 AM 1,048,576 mdm1m9kefs1.bin 01/16/2020 03:39 AM 1,048,576 mdm1m9kefs2.bin 01/16/2020 03:39 AM 1,048,576 mdm1m9kefs3.bin 01/16/2020 03:39 AM 4,096 mdm1m9kefsc.bin 01/16/2020 03:39 AM 1,048,576 mdm1oemnvbktmp.bin 01/16/2020 03:38 AM 1,048,576 mdmddr.bin 01/16/2020 03:30 AM 1,048,576 mdm_oem_dycnvbk.bin 01/16/2020 03:30 AM 1,048,576 mdm_oem_stanvbk.bin 01/16/2020 03:38 AM 4,194,304 mdtpsecapp_a.bin 01/16/2020 03:38 AM 4,194,304 mdtpsecapp_b.bin 01/16/2020 03:38 AM 33,554,432 mdtp_a.bin 01/16/2020 03:38 AM 33,554,432 mdtp_b.bin 01/16/2020 03:38 AM 16,777,216 metadata.img 01/16/2020 03:29 AM 1,048,576 misc.bin 01/16/2020 03:39 AM 2,097,152 modemst1.bin 01/16/2020 03:39 AM 2,097,152 modemst2.bin 01/16/2020 03:39 AM 262,144 msadp.mbn 01/16/2020 03:38 AM 32,768 multi_image.mbn 01/16/2020 03:38 AM 314,572,800 NON-HLOS.bin 01/16/2020 03:39 AM 314,572,800 op1.img 01/16/2020 03:30 AM 268,435,456 op2.img 01/16/2020 03:30 AM 1,717,989,376 opproduct_a.bin 01/16/2020 03:31 AM 1,717,989,376 opproduct_b.bin 01/16/2020 03:29 AM 1,048,576 param.bin 01/16/2020 03:29 AM 33,554,432 persist.img 01/16/2020 03:38 AM 81,920 qupv3fw.elf 01/16/2020 03:38 AM 134,217,728 rawdump.bin 01/16/2020 03:38 AM 100,663,296 recovery.img 01/16/2020 03:39 AM 8,290,304 reserve1.bin 01/16/2020 03:39 AM 16,580,608 reserve2.bin 01/16/2020 03:39 AM 16,580,608 reserve3.bin 01/16/2020 03:39 AM 16,580,608 reserve4.bin 01/16/2020 03:39 AM 28,672 sec.elf 01/16/2020 03:39 AM 34,226,176 splash.bin 01/16/2020 03:39 AM 8,388,608 spunvm.bin 01/16/2020 03:29 AM 8,192 ssd.bin 01/16/2020 03:30 AM 10,485,760 static_nvbk.bin 01/16/2020 03:39 AM 131,072 storsec.mbn 01/16/2020 03:37 AM 15,032,385,536 super.img 01/16/2020 03:39 AM 2,759 ToolLog.txt 01/16/2020 03:39 AM 1,048,576 toolsfv.bin 01/16/2020 03:38 AM 4,194,304 tz.mbn 01/16/2020 03:39 AM 524,288 uefivarstore.bin 01/16/2020 03:38 AM 2,097,152 uefi_sec.mbn 01/16/2020 03:38 AM 65,536 vbmeta.img 01/16/2020 03:38 AM 65,536 vbmeta_system.img 01/16/2020 03:38 AM 3,670,016 xbl.elf 01/16/2020 03:38 AM 131,072 xbl_config.elf
twinnfamous said: Read a couple Posts before. There is msm tool in this forum that will work to read back from phone. https://forum-xda--developers-com.c...3A%2F%2Fwww.google.com&_tf=From%20%251%24s Click to expand... Click to collapse I'm pretty sure that this will not work on the McLaren 5g edition but maybe Im wrong?? Has anyone with the McLaren edition 5g used this to restore?? Dan?
twinnfamous said: Read a couple Posts before. There is msm tool in this forum that will work to read back from phone. https://forum-xda--developers-com.c...3A%2F%2Fwww.google.com&_tf=From%20%251%24s Click to expand... Click to collapse Not for McLaren 5g!!
kirschdog1 said: Not for McLaren 5g!! Click to expand... Click to collapse Pretty sure in this case we are just using the MSM tool to make a backup/dump all of the partitions using the readback mode. I just did this successfully, and the phone is fine. Not sure, but I think using the MSM tool to restore/write anything would be where issues such as bricking would arise.
CPH1979 ROM Nuker
Just a simple batch script to go through and remove a list of useless or bloatware packages, and make sure to read "INSTRUCTIONS.txt" NOTE: THIS WILL ALSO REMOVE THE STOCK PHONE AND MESSAGING APPLICATIONS, THIS MEANS YOU WILL HAVE TO DOWNLOAD GOOGLES, OR A THIRD PARTIES MESSAGING AND PHONE APP! List of useless crap: com.coloros.backuprestore com.google.android.youtube com.coloros.phonenoareainquire com.coloros.gamespace com.oppo.operationManual com.oppo.partnerbrowsercustomizations com.android.htmlviewer com.coloros.weather.service com.google.ar.core com.coloros.oshare com.android.contacts com.android.mms com.dropboxchmod com.coloros.assistantscreen com.google.android.apps.tachyon com.mediatek.mdmlsample com.facebook.services com.google.android.music com.coloros.smartdriving com.google.android.apps.docs com.google.android.apps.maps com.coloros.wallpapers com.opera.browser com.coloros.weather2 com.android.chrome com.coloros.compass2 com.coloros.colorfilestand com.google.android.videos com.coloros.pictorial com.coloros.widget.smallweather com.coloros.calculator com.google.android.feedback com.google.android.apps.photos com.google.android.calendar com.facebook.katana com.coloros.alarmclock com.oppo.logkit com.facebook.system com.oppo.atlas com.oppo.music com.oppo.criticallog com.coloros.video com.google.android.keep com.coloros.soundrecorder com.oppo.quicksearchbox com.opera.preinstall com.facebook.appmanager com.coloros.floatassistant com.coloros.childrenspace com.mediatek.mtklogger com.google.android.apps.magazines com.coloros.musiclink com.nearme.atlas com.nearme.themestore com.google.android.gm com.coloros.phonemanager RELEASES: Version 2.7: https://drive.google.com/open?id=1DEPuKn85V-dCjHKdWMHRCuCn9wjBI8kV Version 2.8: https://drive.google.com/open?id=1Ork7Dvf6JaVP-JxvdqgzOaTrk-SNBvrv Version 2.9 https://drive.google.com/file/d/1PtbzD0ppUEqQ9_PEPjAZYxtlJ-yKDsSJ/view?usp=sharing
********
Why is gamespace useless? Also possible to delete some of them and not the list? ---------- Post added at 09:10 AM ---------- Previous post was at 08:23 AM ---------- Castorite said: <Mod edit: Quoted OP deleted> Click to expand... Click to collapse maybe you do know how downgrade firmware?
Predatorhaze said: Why is gamespace useless? Also possible to delete some of them and not the list? ---------- Post added at 09:10 AM ---------- Previous post was at 08:23 AM ---------- maybe you do know how downgrade firmware? Click to expand... Click to collapse I classified OPPO's Gamespace as "useless" because it was apart of the ColorOS Operating System, you can change what packages are removed by editing "CPH1979 ROM Nuker.bat" and changing the package list below line 32, to keep the Gamespace application simply remove line 36, you can add and remove packages to process there, as for downgrading the firmware I'm afraid there isn't a way as of yet, OPPO is very restrictive when it comes to firmware.
How to remove the OPPO launcher ? I get an error when trying to remove it with ADB
works a treat