Giter Club home page Giter Club logo

loaders's People

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

loaders's Issues

Please add Sunmi T2S L1562 (SDM660) loader

I would like to express my gratitude for this invaluable repository. I’ve been on the hunt for an EDL loader file for a week, unaware that this repository existed and could be of assistance.

Despite my extensive efforts, I discovered that the loader I require is not present among the current loaders.

--------------------------------
Sunmi T2S L1562 (SDM660)
--------------------------------
HWID:              0x0008c0e100000000 (MSM_ID:0x0008c0e1,OEM_ID:0x0000,MODEL_ID:0x0000)
CPU detected:      "SDM660"
PK_HASH:           0x44b1b939b9db8396050ac589ab3d0e80590841cb0a93fb9d0c9521551b22ab02
Serial:            0xc1bb7de7

sahara - [LIB]: Couldn't find a loader for given hwid and pkhash (0008c0e100000000_44b1b939b9db8396_[FHPRG/ENPRG].bin) :(

Could you kindly include the Sunmi T2S L1562 (SDM660) loader?

Possible to reupload qualcomm/factory/msm8916/007060e100000000_cc3153a802939b90_fhprg_peek.bin?

It doesn't have any certs whatsoever,

DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------
0             0x0             ELF, 32-bit LSB executable, ARM, version 1 (SYSV)
84664         0x14AB8         XML document, version: "1.0"
84948         0x14BD4         SHA256 hash constants, little endian

fhloaderparse also says its invalid, where did this file come from? Needed for my no-display SM-T560NU Samsung. APQ8016

Add 9X5X chipset new bootloaders

i have found huawei e5788 original bootloaders it is base upon qualcomm 9x5x chipset ,i try all bootloaders in your folder loaders/qualcomm/9x5x/enprg_9x55p.mbn it not work , so i have original bootloaders ,loader is attached please patch bootloaders and add in loader/qualcomm/9x5x/ folder .
bootloaderimage_e5788.zip

Sm6250

Please i need the file for xiaomi redmi note 9s

How to grab firehose fiiles from my Pixel 4a

I have a running Pixel 4a. I can't seem to find firehose files anywhere on internet, in case my phone bricks. How can I grab firehose files and from my own device? I'd like to contribute to this repo.

Thanks

Please add Sunmi T2S L1561 (SDM660) loader

I would like to express my gratitude for this invaluable repository. I’ve been on the hunt for an EDL loader file for a week, unaware that this repository existed and could be of assistance.

Despite my extensive efforts, I discovered that the loader I require is not present among the current loaders.

--------------------------------
Sunmi T2S L1561 (SDM660)
--------------------------------
HWID:              0x0008c0e100000000 (MSM_ID:0x0008c0e1,OEM_ID:0x0000,MODEL_ID:0x0000)
CPU detected:      "SDM660"
PK_HASH:           0x3720a9d9e03543ae4ad244d93d4b56ef588a499106c7d1f931f42704173a3414
Serial:            0x7679407d

sahara - [LIB]: Couldn't find a loader for given hwid and pkhash (0008c0e100000000_3720a9d9e03543ae[FHPRG/ENPRG].bin) :(
PROCESSOR
CPU Architecture: AArch64 Processor rev 2 (aarch64)
Board: sdm[660](tel:660)
Chipset: Qualcomm Technologies, Inc SDM[660](tel:660)
Cores: 8
Clock Speed: [1401](tel:1401) MHz - [2208](tel:2208) MHz
Instruction Sets: arm64-v8a
CPU Features: fp asimd evtstrm aes pmull sha1 sha2 crc32
CPU Governor: performance
Kernel Version: [4.4.153](tel:4.4.153)-perf
Kernel Architecture: aarch64

Could you kindly include the Sunmi T2S L1561 (SDM660) loader?

no auth firehose POCO M3 - Redmi 9T - Redmi 9 Power - Redmi Note 9 4G

just found this loader, kindly add unified juice (citrus,lemon,pomelo,lime)
https://forum.xda-developers.com/t/solved-i-need-help-edl-9t-lime.4385727

xubuntu@xubuntu:/media/xubuntu/18CC6C07CC6BDE0E/src/edl$ python3 edl.py --loader='/media/xubuntu/18CC6C07CC6BDE0E/Android/Backup/citrus/POCO M3 - Redmi 9T nfc - Redmi 9 Power - Redmi note 9 4G/prog_firehose_ddr.elf' --memory=UFS r recovery recovery.img
Capstone library is missing (optional).
Keystone library is missing (optional).
Qualcomm Sahara / Firehose Client V3.52 (c) B.Kerler 2018-2021.
main - Using loader /media/xubuntu/18CC6C07CC6BDE0E/Android/Backup/citrus/POCO M3 - Redmi 9T nfc - Redmi 9 Power - Redmi note 9 4G/prog_firehose_ddr.elf ...
main - Waiting for the device
main - Device detected :)
main - Mode detected: sahara
Device is in EDL mode .. continuing.
sahara - 
------------------------
HWID:              0x0014d0e100720000 (MSM_ID:0x0014d0e1,OEM_ID:0x0072,MODEL_ID:0x0000)
Unknown CPU, please send log as issue to https://github.com/bkerler/edl
PK_HASH:           0x1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46
Serial:            0x8c5d23d2

sahara - Uploading loader /media/xubuntu/18CC6C07CC6BDE0E/Android/Backup/citrus/POCO M3 - Redmi 9T nfc - Redmi 9 Power - Redmi note 9 4G/prog_firehose_ddr.elf ...
Successfully uploaded programmer :)
firehose - INFO: Chip serial num: 2354914258 (0x8c5d23d2)
firehose - Supported Functions: program,read,nop,patch,configure,setbootablestoragedrive,erase,power,firmwarewrite,getstorageinfo,benchmark,emmc,ufs,fixgpt,getsha256digest
firehose - 
firehose
firehose - [LIB]: Couldn't detect MaxPayloadSizeFromTargetinBytes
firehose
firehose - [LIB]: Couldn't detect TargetName
firehose - TargetName=Unknown
firehose - MemoryName=UFS
firehose - Version=1
firehose_client - Supported functions:
-----------------
program,read,nop,patch,configure,setbootablestoragedrive,erase,power,firmwarewrite,getstorageinfo,benchmark,emmc,ufs,fixgpt,getsha256digest
firehose - 
Reading from physical partition 0, sector 22808, sectors 32768
Progress: |██████████████████████████████████████████████████| 100.0% Complete
Dumped sector 22808 with sector count 32768 as recovery.img

loader verizon novatel 7730l

i use the loader from zte mf980 but not work
i searched in all of world wide internet but not find any firmware or loader for that

root@jalal-MacBookPro:~/edl# edl --loader=loaders/NPRG9x35p.bin printgpt
Capstone library is missing (optional).
Keystone library is missing (optional).
Qualcomm Sahara / Firehose Client V3.60 (c) B.Kerler 2018-2022.
main - Using loader loaders/NPRG9x35p.bin ...
main - Waiting for the device
main - Device detected :)
sahara - Protocol version: 2, Version supported: 1
main - Mode detected: sahara
sahara -

HWID: 0x009500e100000000 (MSM_ID:0x009500e1,OEM_ID:0x0000,MODEL_ID:0x0000)
CPU detected: "MDM9x40"
PK_HASH: 0xcc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f
Serial: 0xb7a77f9e

getstorageinfo:: AttributeError: 'dict' object has no attribute 'split'

Partial output including error:

-----------------
program,read,nop,patch,configure,setbootablestoragedrive,erase,power,firmwarewrite,getstorageinfo,benchmark,emmc,ufs,fixgpt,getsha256digest,gethwversion,getrfversion,getprjversion,setprojmodel,demacia,sha256init,sha256final,eraseuserdata
oneplus - Oneplus protection with prjid 18821 detected
firehose - GetStorageInfo:
--------------------

Traceback (most recent call last):
  File "/Users/sean/OnePlus 7 Pro/root/edl/./edl", line 391, in <module>
    base.run()
  File "/Users/sean/OnePlus 7 Pro/root/edl/./edl", line 386, in run
    fh.handle_firehose(cmd, options)
  File "/Users/sean/OnePlus 7 Pro/root/edl/edlclient/Library/firehose_client.py", line 647, in handle_firehose
    return self.firehose.cmd_getstorageinfo_string()
  File "/Users/sean/OnePlus 7 Pro/root/edl/edlclient/Library/firehose.py", line 1308, in cmd_getstorageinfo_string
    data = self.xml.getlog(val.data)
  File "/Users/sean/OnePlus 7 Pro/root/edl/edlclient/Library/xmlparser.py", line 29, in getlog
    lines = input.split(b"<?xml")
AttributeError: 'dict' object has no attribute 'split'

The issue is getstorageinfo is returnin JSON:

{'value': 'ACK', 'rawmode': 'false'}

Changing getlog() to this:

  def getlog(self, input):
        data = []
        try:
          lines = input.split(b"<?xml")
        except Exception:
            data.append(input)
            return data
   snip...

Samsung Galaxy A715F

Please add Samsung A715F Binary 8 firehose loader
My device is hard-bricked
Please help me

Please add Redmi note 9s loader

device info

main - Device detected :)
main - Mode detected: sahara
Device is in EDL mode .. continuing.
sahara -
------------------------
HWID:              0x001490e100720000 (MSM_ID:0x001490e1,OEM_ID:0x0072,MODEL_ID:0x0000)
CPU detected:      "rennell_v1.1"
PK_HASH:           0x1bebe3863a6781db4b01086063007334de9e5ca14971c7c4f4358ec9d79cda46
Serial:            0xXXXXXXXX

sahara
sahara - [LIB]: Couldn't find a loader for given hwid and pkhash (001490e100720000_1bebe3863a6781db_[FHPRG/ENPRG].bin) :(
Device is in an unknown sahara state, resetting
resp={'cmd': 1, 'len': 48, 'version': 2, 'version_min': 1, 'max_cmd_len': 1024, 'mode': 0, 'res1': 0, 'res2': 0, 'res3': 0, 'res4': 0, 'res5': 0, 'res6': 0, 'object_size': 48, 'raw_data': bytearray(b'\x01\x00\x00\x000\x00\x00\x00\x02\x00\x00\x00\x01\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00')}

TypeError: 'response' object is not subscriptable

What is it that I'm doing wrong?

This was edl 3.1's response but the latest one also spits out the same thing. Thanks!!

feitlimit@pop-os:~/Desktop/edl$ edl printgpt --memory=UFS
Qualcomm Sahara / Firehose Client V3.60 (c) B.Kerler 2018-2022.
main - Trying with no loader given ...
main - Waiting for the device
main - Device detected :)
sahara - Protocol version: 2, Version supported: 1
main - Mode detected: sahara
sahara -
------------------------
HWID: 0x000460e100000000 (MSM_ID:0x000460e1,OEM_ID:0x0000,MODEL_ID:0x0000)
CPU detected: "MSM8953"
PK_HASH: 0x57158eaf1814d78fd2b3105ece4db18a817a08ac664a5782a925f3ff8403d39a
Serial: 0xb94b1788

sahara - Detected loader: /usr/local/lib/python3.10/dist-packages/edlclient-3.60-py3.10.egg/edlclient/../Loaders/xiaomi/EDLAuth/000460e100000000_57158eaf1814d78f_fhprg_edlauth_peek.bin
sahara - Protocol version: 2, Version supported: 1
sahara - Uploading loader /usr/local/lib/python3.10/dist-packages/edlclient-3.60-py3.10.egg/edlclient/../Loaders/xiaomi/EDLAuth/000460e100000000_57158eaf1814d78f_fhprg_edlauth_peek.bin ...
sahara - 32-Bit mode detected.
sahara - Firehose mode detected, uploading...
sahara - Loader successfully uploaded.
main - Trying to connect to firehose loader ...
firehose - Xiaomi EDL Auth detected.
Traceback (most recent call last):
File "/usr/local/bin/edl", line 4, in <module>
__import__('pkg_resources').run_script('edlclient==3.60', 'edl')
File "/usr/lib/python3/dist-packages/pkg_resources/__init__.py", line 656, in run_script
self.require(requires)[0].run_script(script_name, ns)
File "/usr/lib/python3/dist-packages/pkg_resources/__init__.py", line 1453, in run_script
exec(code, namespace, namespace)
File "/usr/local/lib/python3.10/dist-packages/edlclient-3.60-py3.10.egg/EGG-INFO/scripts/edl", line 393, in <module>
base.run()
File "/usr/local/lib/python3.10/dist-packages/edlclient-3.60-py3.10.egg/EGG-INFO/scripts/edl", line 387, in run
if fh.connect(sahara):
File "/usr/local/lib/python3.10/dist-packages/edlclient-3.60-py3.10.egg/edlclient/Library/firehose_client.py", line 109, in connect
if self.firehose.configure(0):
File "/usr/local/lib/python3.10/dist-packages/edlclient-3.60-py3.10.egg/edlclient/Library/firehose.py", line 907, in configure
if self.modules.edlauth():
File "/usr/local/lib/python3.10/dist-packages/edlclient-3.60-py3.10.egg/edlclient/Library/Modules/init.py", line 71, in edlauth
return self.xiaomi.edl_auth()
File "/usr/local/lib/python3.10/dist-packages/edlclient-3.60-py3.10.egg/edlclient/Library/Modules/xiaomi.py", line 38, in edl_auth
if rsp[0]:
TypeError: 'response' object is not subscriptable

Decrypting UnlockTool UFI firehoses

Hi, i was wondering if someone here managed to get a firehose out of the paid unlocktool in elf format for usage with bkerler/edl for example?

Wrong hashes on four loaders

This loader has an incorrect SHA384 on program 15

  • oneplus/broken/0000000000515152_07b00c8737956b3d_fhprg_dre8t.bin

These three loaders were re-signed with SHA256 despite originally being signed SHA384

  • qualcomm/patched/mdm9x6x/0007d0e100000000_cc3153a80293939b_enprg9x60p.mbn
  • qualcomm/patched/mdm9x6x/0007f0e100000000_959b8d0549ef41be__enprg9x65p_sdx20.bin
  • qualcomm/patched/mdm9x6x/nprg9x65p.bin

10T (support)

will the 10t cph2417 be supported there are no msm tools what so ever for the 10t.

oppo watch OW19W8 bootloop

Hi i've my OW19W8 stock in bootloop. Can help me for repair it? I can make donation if it will works. Thanks

ZTE has duplicate loader, also ambiguous loader

In ZTE there is both
Loaders-main\zte\009600E100040000_86c4f630cbc412fd_FHPRG_peek.bin
Loaders-main\zte\009600e100040000_86c4f630cbc412fd_fhprg_peek.bin
Which are identical.

In ZTE there is both
Loaders-main\zte\009720E100040000_4673478f4dd4d43c_FHPRG_peek.bin
Loaders-main\zte\009720e100040000_4673478f4dd4d43c_fhprg_peek.bin
Which are different. This causes problem with case-insensitive file systems.

There are 3 other loaders that have FHPRG instead of fhprg.

NotImplementedError: Operation not supported or unimplemented on this platform

$ ./edl reset
Qualcomm Sahara / Firehose Client V3.60 (c) B.Kerler 2018-2022.
main - Trying with no loader given ...
main - Waiting for the device
Traceback (most recent call last):
File "C:\Users\Llamar\Downloads\edl\edl", line 391, in
base.run()
File "C:\Users\Llamar\Downloads\edl\edl", line 299, in run
conninfo = self.doconnect(loop)
File "C:\Users\Llamar\Downloads\edl\edl", line 193, in doconnect
self.cdc.connected = self.cdc.connect(portname=self.portname)
File "C:\Users\Llamar\Downloads\edl\edlclient\Library\Connection\usblib.py", line 226, in connect
self.configuration = self.device.get_active_configuration()
File "C:\Users\Llamar\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\core.py", line 921, in get_active_configuration
return self._ctx.get_active_configuration(self)
File "C:\Users\Llamar\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\core.py", line 113, in wrapper
return f(self, *args, **kwargs)
File "C:\Users\Llamar\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\core.py", line 249, in get_active_configuration
self.managed_open()
File "C:\Users\Llamar\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\core.py", line 113, in wrapper
return f(self, *args, **kwargs)
File "C:\Users\Llamar\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\core.py", line 131, in managed_open
self.handle = self.backend.open_device(self.dev)
File "C:\Users\Llamar\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\backend\libusb1.py", line 804, in open_device
return _DeviceHandle(dev)
File "C:\Users\Llamar\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\backend\libusb1.py", line 652, in init
_check(_lib.libusb_open(self.devid, byref(self.handle)))
File "C:\Users\Llamar\AppData\Local\Programs\Python\Python39\lib\site-packages\usb\backend\libusb1.py", line 600, in _check
raise NotImplementedError(_strerror(ret))
NotImplementedError: Operation not supported or unimplemented on this platform

Bad file

This file is a disk image with a GPT and 4 ELF images, none of them a Firehose.
qualcomm/model_generic/apq8016/0000000000000000_d58522cd602a501c_fhprg.bin

new device

............main - Device detected :)
sahara - Protocol version: 2, Version supported: 1
main - Mode detected: sahara
sahara -
------------------------
HWID:              0x0013d0e100000000 (MSM_ID:0x0013d0e1,OEM_ID:0x0000,MODEL_ID:0x0000)
CPU detected:      "qcm2150"
PK_HASH:           0xcc3153a80293939b90d02d3bf8b23e0292e452fef662c74998421adad42a380f
Serial:            0xc6457f44


Duplicate loaders

Loaders/t2mobile/000940e100420050_1357fdaeabb7becb_fhprg.bin and Loaders/hmd/000940e100420050_1357fdaeabb7becb_fhprg.bin are the same file.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.