Download link for factory image: https://dl.google.com/dl/android/aosp/hammerhead-m4b30x-factory-10cfaa5c.zip
SHA-256 Checksum: 10cfaa5c8ff1753af20283f5e5f938ddebbad094c4e22aadbd925ecdc806e8b3
Download link for OTA image: https://dl.google.com/dl/android/aosp/hammerhead-ota-m4b30x-f2eb90a8.zip
SHA-256 Checksum: f2eb90a8da6bb28731dbcd72b47b2e228720cb815954614f707d421751c02881
October securety buletin: http://source.android.com/security/bulletin/2016-10-01.html
Related
I would like to share a collection of factory images. It contains the full packages, also the extracted .img files. I also included insecure boot image (adb shell gives root access) and deodexed system image for each of them.
full image packages are "tgz" files.
image files extension is .img
isecure boot images are *.unsec.img
deodexed system images are *.deodex.img
These are all to be flashed with fastboot. These all derived from STOCK (https://developers.google.com/android/nexus/images) with no changes except the insecure adb boot image and the deodexed system image.
Deodexed fs is exactly the same size as the original when mounted.
The collection contains:
occam_4.2.1-jop40d
occam_4.2.1-jop40d-factory-ca7602f0.tgz size: 343105954
occam-jop40d
image-occam-jop40d.zip size: 321902237
boot.img size: 6313984
boot.img.unsec.img size: 6313984
bootloader-mako-makoz10l.img size: 2240512
radio-mako-m9615a-cefwmazm-2.0.1700.33.img size: 55854592
recovery.img size: 6823936
system.img size: 544036848
system.img.deodex.img size: 501265144
userdata.img size: 100771284
occam_4.2.2-jdq39
occam-jdq39-factory-345dc199.tgz size: 343633354
occam-jdq39
image-occam-jdq39.zip size: 322375150
boot.img size: 6039552
boot.img.unsec.img size: 6039552
bootloader-mako-makoz10o.img size: 2240720
radio-mako-m9615a-cefwmazm-2.0.1700.48.img size: 55903744
recovery.img size: 6551552
system.img size: 535918528
system.img.deodex.img size: 496116460
userdata.img size: 100775392
The files can be downloaded from: http://web.djodjo.org/?a=download:android:ROM_images:factory_images_gn_occam
if it helps you buy me a beer
there it is another collection of factory images. It contains the full packages, also the extracted .img files. I also included insecure boot image (adb shell gives root access) and deodexed system image for each of them.
full image packages are "tgz" files.
image files extension is .img
isecure boot images are *.unsec.img
deodexed system images are *.deodex.img
These are all to be flashed with fastboot. These all derived from STOCK (https://developers.google.com/android/nexus/images) with no changes except the insecure adb boot image and the deodexed system image.
Deodexed fs is exactly the same size as the original when mounted.
The collection contains (I list just the packages as it will be too long list of files):
Nexus S(soju) factory images
soju_2.3.1-grh78
soju_2.3.1-grh78-factory-7580cb8d.tgz size: 93605723
soju_2.3.3-gri40
soju_2.3.3-gri40-factory-55ab9a15.tar.gz size: 96568452
soju_2.3.3-gri54
soju_2.3.3-gri54-factory-2a394221.tar.gz size: 96586506
soju_2.3.4-grj22
soju_2.3.4-grj22-factory-4ca09c4e.tar.gz size: 101566310
soju_2.3.6-grk39f
soju_2.3.6-grk39f-factory-5ab09c98.tgz size: 104391199
soju_4.0.4-imm76d
soju_4.0.4-imm76d-factory-ca4ae9ee.tgz size: 169898420
soju_4.1.2-jzo54k
soju_4.1.2-jzo54k-factory-36602333.tgz size: 202523043
Nexus S(sojua) factory images
sojua_2.3.6-grk39f
sojua_2.3.6-grk39f-factory-5d73a09d.tgz size: 104413296
sojua_4.0.4-imm76d
sojua_4.0.4-imm76d-factory-76ad4959.tgz size: 169914704
sojua_4.1.2-jzo54k
sojua_4.1.2-jzo54k-factory-1121b619.tgz size: 202546715
Nexus S(sojuk) factory images
sojuk_2.3.6-grk39f
sojuk_2.3.6-grk39f-factory-4d5663c0.tgz size: 96123958
sojuk_4.0.4-imm76d
sojuk_4.0.4-imm76d-factory-422adc36.tgz size: 153343506
sojuk_4.1.1-jro03e
sojuk_4.1.1-jro03e-factory-93a21b70.tgz size: 180892826
The files can be downloaded from:
http://web.djodjo.org/?a=download:android:ROM_images:factory_images_soju
and
http://web.djodjo.org/?a=download:android:ROM_images:factory_images_sojua
and
http://web.djodjo.org/?a=download:android:ROM_images:factory_images_sojuk
enjoy
Windows Phone Flashing Started
AMSS File Found:
RM823_12w30_1_prod_generic_amss.esco
ADSP File Found:
RM823_12w30_1_prod_generic_adsp.esco
WPOS File Found:
RM823_12301_prod_238_02_boot.esco
MDM AMSS File Found:
RM823_12w30_1_prod_generic_mdm_amss.esco
MDM DSP1 File Found:
RM823_12w30_1_prod_generic_mdm_dsp1.esco
MDM DSP2 File Found:
RM823_12w30_1_prod_generic_mdm_dsp2.esco
USER AREA ERASE File Found:
RM823_12w30_1_prod_generic_user_area_erase.esco
WARNING: OSBL File is not Loaded
================================================== ====
Windows Phone Lumia Flasher
================================================== ====
If the Phone is ALIVE
1. Power On the Phone and Connect it to the USB Port
If the Phone is DEAD
1. Press and Hold the VOLUME UP button
2. Connect it to the USB Port while still Pressing
the VOLUME UP button
3. Continue to Press the VOLUME UP button for 8 more
seconds
================================================== ====
Sending AMSS Certificate
HASH: 6898A268F71233A06C3082728DB725A38679C21C
Certificate Size: 449 Bytes
Status : WRITE AMSS CERTIFICATE SUCCESS
Sending AMSS Data Blocks
(Please Wait for 25 Seconds...)
Status : AMSS WRITE SUCCESS
Sending ADSP Certificate
HASH: 6898A268F71233A06C3082728DB725A38679C21C
Certificate Size: 449 Bytes
Status : WRITE ADSP CERTIFICATE SUCCESS
Sending ADSP Data Blocks
(Please Wait for 25 Seconds...)
Status : ADSP WRITE SUCCESS
Sending MDM AMSS Certificate
HASH: 6898A268F71233A06C3082728DB725A38679C21C
Certificate Size: 447 Bytes
Status : WRITE MDM AMSS CERTIFICATE SUCCESS
Sending MDM AMSS Data Blocks
(Please Wait for 25 Seconds...)
Status : MDM AMSS WRITE SUCCESS
Sending MDM DSP1 Certificate
HASH: 6898A268F71233A06C3082728DB725A38679C21C
Certificate Size: 447 Bytes
Status : WRITE MDM DSP1 CERTIFICATE SUCCESS
Sending MDM DSP1 Data Blocks
(Please Wait for 25 Seconds...)
Status : MDM DSP1 WRITE SUCCESS
Sending MDM DSP2 Certificate
HASH: 6898A268F71233A06C3082728DB725A38679C21C
Certificate Size: 447 Bytes
Status : WRITE MDM DSP2 CERTIFICATE SUCCESS
Sending MDM DSP2 Data Blocks
(Please Wait for 100 Seconds...)
Status : MDM DSP2 WRITE SUCCESS
Sending WPOS Certificate
HASH: 6898A268F71233A06C3082728DB725A38679C21C
Certificate Size: 1652 Bytes
Status : WRITE WPOS CERTIFICATE SUCCESS
Sending WPOS Data Blocks
[BLOCK 1 0x00000000~0x00FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : C8D9F6A1AF69045EC0339C2EFFC2527D
---------- : D1CAECCFCFC39F1F44C67A5AD3F6C050
Status : WPOS WRITE SUCCESS
[BLOCK 2 0x01000000~0x016573FF]
Data Size: 0x00657400 Bytes
SHA-256 : 98D712C48E828E9816D3F7E84CFDE5DB
---------- : 2C32011C24D4615234D0F613F4EF7B52
Status : WPOS WRITE SUCCESS
[BLOCK 3 0x01697400~0x01FFFFFF]
Data Size: 0x00968C00 Bytes
SHA-256 : 80EB94E3FB5AE03E9091361275A3138E
---------- : 2D0370E5C2A497C74BEA6BEAA43A9E21
Status : WPOS WRITE SUCCESS
[BLOCK 4 0x02000000~0x02FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 07BE87B2AF4D1386F4C6CA136F3E5A57
---------- : 71DC6DDB330A07AAB4493C8AA329BB58
Status : WPOS WRITE SUCCESS
[BLOCK 5 0x03000000~0x03FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 2A3DE5C7CB693B00E257A4E7FB03E834
---------- : 11FAA597F94B220E69E25BD4653BE9B5
Status : WPOS WRITE SUCCESS
[BLOCK 6 0x04000000~0x04FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 16A3B764DD2CCBE5D144B504A919A847
---------- : 2F5DDCBBE2506ACEF6A39800E4DC5124
Status : WPOS WRITE SUCCESS
[BLOCK 7 0x05000000~0x05FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 4A508131A19FC499F19529C55D5D69B8
---------- : D85FA016F8CADE240FA88FA175159699
Status : WPOS WRITE SUCCESS
[BLOCK 8 0x06000000~0x06FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 9E494B017FB7E00D9245C8AEF0F01467
---------- : F3A10341E7441CBEBDE04399AFDD8C5E
Status : WPOS WRITE SUCCESS
[BLOCK 9 0x07000000~0x07FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 2AA1C1C01BA5F8825796F134753C7651
---------- : ABAC4C024CF30CE60B624C4E6C8CD665
Status : WPOS WRITE SUCCESS
[BLOCK 10 0x08000000~0x08FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 6F6EA7A66C4AE1A05CF643378A07E1A8
---------- : 523B29D66201C2FBD4053B19E785DE14
Status : WPOS WRITE SUCCESS
[BLOCK 11 0x09000000~0x09FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 017C4DB9A69575E684BADB7515DBBF59
---------- : 67A6F0DA20F034470D6148B12A1013F4
Status : WPOS WRITE SUCCESS
[BLOCK 12 0x0A000000~0x0AFFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 1EFE884A458C910A768D6A60FF74BA8B
---------- : 58F546EB92737ACD1A59169E583CD407
Status : WPOS WRITE SUCCESS
[BLOCK 13 0x0B000000~0x0BFFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 713CF0944BA46C6820DCEB7A210C365A
---------- : 7F8A1B0C3E168DE07B46E14907F511FC
Status : WPOS WRITE SUCCESS
[BLOCK 14 0x0C000000~0x0CFFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 425A9ED14D4A78F21CDD261AB87F2CF1
---------- : 37080DD8E63F6A9BBBC4E9181AF7B9D2
Status : WPOS WRITE SUCCESS
[BLOCK 15 0x0D000000~0x0DFFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 0C09DA5584E22D2709C548F2E5CD05F5
---------- : CFB62CE93C7DAF202A4B92299072B4FB
Status : WPOS WRITE SUCCESS
[BLOCK 16 0x0E000000~0x0EFFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : CC14545EF5F62DA50EFADEC5E077FA15
---------- : FE6723E61D703468E0F2B88A3A77008E
Status : WPOS WRITE SUCCESS
[BLOCK 17 0x0F000000~0x0FFFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 75D352196D46AC4FED27B84844D89D27
---------- : A8E6C4BD07D46537FA1D66BC533BF017
Status : WPOS WRITE SUCCESS
[BLOCK 18 0x10000000~0x10FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : D6847541FEB0C828C7BE18F045FD2602
---------- : D31D627E75BAA24AD9EBE13E111DCD96
Status : WPOS WRITE SUCCESS
[BLOCK 19 0x11000000~0x11FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 3512321DD2C8349BF40BF6ACD45B82A8
---------- : 970E7902252853F1C75FD6DA3B07416C
Status : WPOS WRITE SUCCESS
[BLOCK 20 0x12000000~0x12FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 970B38B361801866AEB1F9D0E2A6E5FB
---------- : 28066FD1BCF0EF794B57E56439B29152
Status : WPOS WRITE SUCCESS
[BLOCK 21 0x13000000~0x13FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : C8E0BAEDBCFC0A13A125FF17A9DDDA0E
---------- : 91AC3DD74B6E738F3AD53D269F12CFFD
Status : WPOS WRITE SUCCESS
[BLOCK 22 0x14000000~0x14FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : D786A1406E5AF5D0B5354003197BCE87
---------- : F34053A66DF8375001E2DB59D528B21D
Status : WPOS WRITE SUCCESS
[BLOCK 23 0x15000000~0x15FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 47A2B984B6D9C39AF4131C9ED8DB949A
---------- : 82CBC84E0019ECB0E1BABB61E0F47790
Status : WPOS WRITE SUCCESS
[BLOCK 24 0x16000000~0x16FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : D4CEA61B44087F662387735C6AF3F626
---------- : D0A782BCFC893D7CD19A1895A2503AE8
Status : WPOS WRITE SUCCESS
[BLOCK 25 0x17000000~0x17FFFFFF]
Data Size: 0x01000000 Bytes
SHA-256 : 93D0DB4DA824CE4660B96A99A1F65989
---------- : CA45F500E83FC9A53D1D8330B150A80E
Status : WPOS WRITE SUCCESS
[BLOCK 26 0x18000000~0x184A17FF]
Data Size: 0x004A1800 Bytes
SHA-256 : 0CE0CCDE41E4E40B170207CABCE6AA18
---------- : 8FD44C00E21833E6B5926A1F0CDFA40A
Status : WPOS WRITE SUCCESS
Sending USER AREA ERASE Certificate
HASH: 6898A268F71233A06C3082728DB725A38679C21C
Certificate Size: 396 Bytes
Status : WRITE ERASE CERTIFICATE SUCCESS
Erasing USER AREA
Status : ERASE SUCCESS
Flashing Done!
Total Flashing Time (Erase + Flashing) : 00:06:17
plz i have one the same problem.
it was work good only whatsapp app was not working
after i flashed it hang on nokia logo
otchere said:
Windows Phone Flashing Started
AMSS File Found:
RM823_12w30_1_prod_generic_amss.esco
ADSP File Found:
RM823_12w30_1_prod_generic_adsp.esco
WPOS File Found:
RM823_12301_prod_238_02_boot.esco
MDM AMSS File Found:
RM823_12w30_1_prod_generic_mdm_amss.esco
MDM DSP1 File Found:
RM823_12w30_1_prod_generic_mdm_dsp1.esco
MDM DSP2 File Found:
RM823_12w30_1_prod_generic_mdm_dsp2.esco
USER AREA ERASE File Found:
RM823_12w30_1_prod_generic_user_area_erase.esco
WARNING: OSBL File is not Loaded
================================================== ====
Windows Phone Lumia Flasher
================================================== ====
If the Phone is ALIVE
1. Power On the Phone and Connect it to the USB Port
If the Phone is DEAD
1. Press and Hold the VOLUME UP button
2. Connect it to the USB Port while still Pressing
the VOLUME UP button
3. Continue to Press the VOLUME UP button for 8 more
seconds
Sending USER AREA ERASE Certificate
HASH: 6898A268F71233A06C3082728DB725A38679C21C
Certificate Size: 396 Bytes
Status : WRITE ERASE CERTIFICATE SUCCESS
Erasing USER AREA
Status : ERASE SUCCESS
Flashing Done!
Total Flashing Time (Erase + Flashing) : 00:06:17
plz i have one the same problem.
it was work good only whatsapp app was not working
after i flashed it hang on nokia logo
Click to expand...
Click to collapse
Well, RM823 is a Lumia 900. What was your purpose for flashing your phone? To debrand it? Usually the rom thats on it is just fine.
thals1992 said:
Well, RM823 is a Lumia 900. What was your purpose for flashing your phone? To debrand it? Usually the rom thats on it is just fine.
Click to expand...
Click to collapse
plz i want to know if the the boot is destroyed or what because the phone powered on.....but hang on nokia logo
otchere said:
plz i want to know if the the boot is destroyed or what because the phone powered on.....but hang on nokia logo
Click to expand...
Click to collapse
Did you first try the hard reset method with the VolDown + Power first? The only other method I'd recommend is using the Nokia Care Suite instead of what you are using. Its much simpler. Just remember to download the latest edition with the CareSuite External cfg file.
One other thing: what phone are you flashing this *onto*? If you tried flashing a Lumia 900 ROM onto a Lumia 920, for example, there is no possible way it will work (although the flashing tool should detect the discrepancy).
By the way, to get to appropriate forums for the Lumia 900, you should go to the WP7 forums (not WP8, such as this) or possibly to a device-specific forum
Oh, and title your thread properly! Seriously, people... if somebody posts a thread with a title like "plz help me" my default response is "No. Go read the forum rules and come back when you can make posts distinguishable from spam."
Model : LMV409N
Software Version : V409N20c_00
SDK Version : 28 (Android P)
File Name : V409N20c_00_LGU_KR_OP_0527.kdz
KDZ File size : 4,628,739,291 bytes
MD5 Hash : 7ed81ea9426cce448177af1ad31b4360
SHA-256 Hash : 116be60061d132078e4852f2e4f848f8e676f6d758ebf48780ee34bc7176d88d
http://pkg02.lime.gdms.lge.com/dn/downloader.dev?fileKey=FW1BQFY5C24EAH1B0C6CBBI/V409N20c_00_LGU_KR_OP_0527.kdz&e=1560703731&h=a5073ac963721c206dc85f22fb56537a
how to kdz this file when do not use the LG Up?
nguyenvantuc said:
how to kdz this file when do not use the LG Up?
Click to expand...
Click to collapse
Sorry, I can't understand what you mean.
heres a log
Installing zip file '/sdcard/Havoc-OS-v2.6-20190611-jasmine_sprout-Official.zip'
Checking for Digest file...
Skipping Digest check: no Digest file found
I:AB zip
I:has_legacy_properties: Could not open /tmp/updater: No such file or directory!
I:Legacy property environment not used in updater.
Failed to parse build number in post-build-incremental=eng.rcstar.20190611.020532.
__bionic_open_tzdata: couldn't find any tzdata when looking for PAKST-5:30!
__bionic_open_tzdata: couldn't find any tzdata when looking for posixrules!
[0617/224002:INFO:sideload_main.cc(207)] Update Engine Sideloading starting
[0617/224002:INFO:boot_control_recovery.cc(77)] Loaded boot_control HAL 'Boot control HAL' version 0.1 authored by 'Code Aurora Forum'.
[0617/224002:INFO:update_attempter_android.cc(207)] Using this install plan:
[0617/224002:INFO:install_plan.cc(77)] InstallPlan: new_update, source_slot: B, target_slot: A, url: file:///sdcard/Havoc-OS-v2.6-20190611-jasmine_sprout-Official.zip, payload: (size: 730303102, metadata_size: 143458, metadata signature: , hash: B3621E6FF72FDADC09D057ABA4C33A710920E6009EC948044D95B047F1C524B3, payload type: unknown), hash_checks_mandatory: false, powerwash_required: false
[0617/224002:INFO:update_attempter_android.cc(391)] Marking booted slot as good.
[0617/224002:ERROR:boot_control_recovery.cc(175)] Unable to mark boot successful: Operation not permitted
[0617/224002:INFO:update_attempter_android.cc(406)] Scheduling an action processor start.
[0617/224002:INFO:action_processor.cc(46)] ActionProcessor: starting InstallPlanAction
[0617/224002:INFO:action_processor.cc(116)] ActionProcessor: finished InstallPlanAction with code ErrorCode::kSuccess
[0617/224002:INFO:action_processor.cc(143)] ActionProcessor: starting DownloadAction
[0617/224002:INFO:install_plan.cc(77)] InstallPlan: new_update, source_slot: B, target_slot: A, url: file:///sdcard/Havoc-OS-v2.6-20190611-jasmine_sprout-Official.zip, payload: (size: 730303102, metadata_size: 143458, metadata signature: , hash: B3621E6FF72FDADC09D057ABA4C33A710920E6009EC948044D95B047F1C524B3, payload type: unknown), hash_checks_mandatory: false, powerwash_required: false
[0617/224002:INFO:download_action.cc(195)] Marking new slot as unbootable
[0617/224002:ERROR:boot_control_recovery.cc(155)] Unable to mark slot A as bootable: Operation not permitted
[0617/224002:WARNING:download_action.cc(197)] Unable to mark new slot A. Proceeding with the update anyway.
[0617/224002:INFO:multi_range_http_fetcher.cc(45)] starting first transfer
[0617/224002:INFO:multi_range_http_fetcher.cc(74)] starting transfer of range 1106+730303102
Step 1/2[0617/224002:INFO:delta_performer.cc(201)] Completed 0/? operations, 16384/730303102 bytes downloaded (0%), overall progress 0%
[0617/224002:INFO:delta_performer.cc(544)] Manifest size in payload matches expected value from Omaha
[0617/224002:INFO:delta_performer.cc(1369)] Verifying metadata hash signature using public key: /etc/update_engine/update-payload-key.pub.pem
[0617/224002:INFO:delta_performer.cc(1411)] Metadata hash signature matches value in Omaha response.
[0617/224002:INFO:delta_performer.cc(1431)] Detected a 'full' payload.
[0617/224002:INFO:delta_performer.cc(382)] PartitionInfo old boot sha256: size: 0
[0617/224002:INFO:delta_performer.cc(382)] PartitionInfo new boot sha256: 7sseQdNxPzpof5gw06pO3kxbGAgrRWt0fLhFTqW1di4= size: 39817216
[0617/224002:INFO:delta_performer.cc(382)] PartitionInfo old system sha256: size: 0
[0617/224002:INFO:delta_performer.cc(382)] PartitionInfo new system sha256: oLanZrAGfJ7MqFRrqbwKe4Z1mCaK46v/ezPPJSp1Fi8= size: 3221225472
[0617/224002:INFO:delta_performer.cc(382)] PartitionInfo old vendor sha256: size: 0
[0617/224002:INFO:delta_performer.cc(382)] PartitionInfo new vendor sha256: gS4RsefgJ3Qh1ZSLK5t0ctCDRdVZHLSynExBqW/Iq7g= size: 2147483648
[0617/224002:INFO:delta_performer.cc(368)] Applying 19 operations to partition "boot"
[0617/224002:INFO:delta_performer.cc(661)] Starting to apply update payload operations
[0617/224004:INFO:delta_performer.cc(368)] Applying 1536 operations to partition "system"
[0617/224017:INFO:delta_performer.cc(201)] Completed 136/2579 operations (5%), 116850688/730303102 bytes downloaded (16%), overall progress 10%
[0617/224030:INFO:delta_performer.cc(201)] Completed 289/2579 operations (11%), 219103232/730303102 bytes downloaded (30%), overall progress 20%
[0617/224043:INFO:delta_performer.cc(201)] Completed 421/2579 operations (16%), 321339392/730303102 bytes downloaded (44%), overall progress 30%
[0617/224046:ERROR:xz_extent_writer.cc(89)] xz_dec_run returned XZ_DATA_ERROR
[0617/224046:ERROR:delta_performer.cc(937)] writer->Write(buffer_.data(), operation.data_length()) failed.
[0617/224046:ERROR:extent_writer.h(38)] End() not called on ExtentWriter.
[0617/224046:ERROR:extent_writer.h(38)] End() not called on ExtentWriter.
[0617/224046:ERROR:extent_writer.h(38)] End() not called on ExtentWriter.
[0617/224046:ERROR:delta_performer.cc(288)] Failed to perform REPLACE_XZ operation 452, which is the operation 433 in partition "system"
[0617/224046:ERROR:download_action.cc(325)] Error ErrorCode::kDownloadOperationExecutionError (28) in DeltaPerformer's Write method when processing the received payload -- Terminating processing
[0617/224046:INFO:delta_performer.cc(304)] Discarding 832792 unused downloaded bytes
[0617/224046:INFO:multi_range_http_fetcher.cc(172)] Received transfer terminated.
[0617/224046:INFO:multi_range_http_fetcher.cc(124)] TransferEnded w/ code 200
[0617/224046:INFO:multi_range_http_fetcher.cc(126)] Terminating.
[0617/224046:INFO:action_processor.cc(116)] ActionProcessor: finished DownloadAction with code ErrorCode::kDownloadOperationExecutionError
[0617/224046:INFO:action_processor.cc(121)] ActionProcessor: Aborting processing due to failure.
[0617/224046:INFO:update_attempter_android.cc(294)] Processing Done.
Error applying update: 28 (ErrorCode::kDownloadOperationExecutionError)Updater process ended with ERROR: 1
I:Install took 44 second(s).
Error installing zip file '/sdcard/Havoc-OS-v2.6-20190611-jasmine_sprout-Official.zip'
Updating partition details...
Iata backup size is 0MB, free: 46234MB.
I:Unable to mount '/usb-otg'
I:Actual block device: '', current file system: 'auto'
...done
always shows me this error
"Error applying update: 28 (ErrorCode::kDownloadOperationExecutionError)Updater process ended with ERROR: 1"
ive tried installing this on stock pie as well as stock oreo always get this error
ps i can install stock rom via xiaomi flash
i have tried installing rom from different versions of twrp as well