Hovatek Forum DEVELOPMENT Android [Please help] Extracting vbmeta.img from installed stock ROM [Infinix]
Try our Online TWRP Builder..its free!
Can't login? Please, reset your password.


[Please help] Extracting vbmeta.img from installed stock ROM [Infinix]

[Please help] Extracting vbmeta.img from installed stock ROM [Infinix]

TmpCheck
TmpCheck
TmpCheck
Newbie
3
26-05-2024, 10:06 AM
#1



Hi!
I have an Infinix ZERO X NEO (X6810-H858AB-R-GL-230613V797), with bootloader unlocked only. I need to extract the vbmeta image from the stock ROM but don't know how. Can anybody help me please?
Haven't done anything except unlocking the booloader. If I run "adb pull /dev/block/by-name/vbmeta_a vbmeta_a.img", I get an error of "Permission denied". How can I extract the vbmeta image?
Further information will be provided on request. Hope to receive your assisstance.
Regards
Gargoyle
Gargoyle
Gargoyle
Contributor
504
27-05-2024, 01:40 PM
#2
(26-05-2024, 10:06 AM)TmpCheck Hi!
I have an Infinix ZERO X NEO (X6810-H858AB-R-GL-230613V797), with bootloader unlocked only. I need to extract the vbmeta image from the stock ROM but don't know how. Can anybody help me please?
Haven't done anything except unlocking the booloader. If I run "adb pull /dev/block/by-name/vbmeta_a vbmeta_a.img", I get an error of "Permission denied". How can I extract the vbmeta image?
Further information will be provided on request. Hope to receive your assisstance.
Regards
X6810-H858AB-R-GL-230613V797
kelvinchinedu
kelvinchinedu
kelvinchinedu
Contributor
1,345
28-05-2024, 09:13 AM
#3
Use wwr and bypass with spflashtools
TmpCheck
TmpCheck
TmpCheck
Newbie
3
29-05-2024, 06:21 AM
#4
(27-05-2024, 01:40 PM)Gargoyle
(26-05-2024, 10:06 AM)TmpCheck Hi!
I have an Infinix ZERO X NEO (X6810-H858AB-R-GL-230613V797), with bootloader unlocked only. I need to extract the vbmeta image from the stock ROM but don't know how. Can anybody help me please?
Haven't done anything except unlocking the booloader. If I run "adb pull /dev/block/by-name/vbmeta_a vbmeta_a.img", I get an error of "Permission denied". How can I extract the vbmeta image?
Further information will be provided on request. Hope to receive your assisstance.
Regards
X6810-H858AB-R-GL-230613V797

Thanks for the prompt reply. I got through that by downloading the stock ROM. Couldn't find it before. Did some search and finally had got it.
I have done the vbmeta disabling verity and all that but now there seems to be a bigger issue. What I was trying to do is install a GSI ROM onto the mobile, but it includes the step "flashboot erase system". The problem is, there is no "system" partition or anything. I could only find "super" image file in the downloaded ROM which was about 7 GB so I thought that might be related to the "system" partition somehow. Can anybody help me on what I need to erase and then flash the GSI ROM to? I really don't understand what I'm supposed to do next. This here is the "flashboot getvar all" list:
Code:

(bootloader) max-download-size: 0x8000000
(bootloader) variant:
(bootloader) logical-block-size: 0x1000
(bootloader) erase-block-size: 0x0
(bootloader) hw-revision: ca00
(bootloader) battery-soc-ok: yes
(bootloader) battery-voltage: 4214mV
(bootloader) partition-size:sgpt: 8000
(bootloader) partition-type:sgpt: raw data
(bootloader) partition-size:flashinfo: 1000000
(bootloader) partition-type:flashinfo: raw data
(bootloader) partition-size:userdata: 1b807f8000
(bootloader) partition-type:userdata: f2fs
(bootloader) partition-size:tranfs: 13230000
(bootloader) partition-type:tranfs: raw data
(bootloader) partition-size:super: 1eddd0000
(bootloader) partition-type:super: raw data
(bootloader) partition-size:tee_b: b00000
(bootloader) partition-type:tee_b: raw data
(bootloader) partition-size:dtbo_b: 800000
(bootloader) partition-type:dtbo_b: raw data
(bootloader) partition-size:vendor_boot_b: 4000000
(bootloader) partition-type:vendor_boot_b: raw data
(bootloader) partition-size:boot_b: 2000000
(bootloader) partition-type:boot_b: raw data
(bootloader) partition-size:logo_b: 800000
(bootloader) partition-type:logo_b: raw data
(bootloader) partition-size:lk_b: 200000
(bootloader) partition-type:lk_b: raw data
(bootloader) partition-size:gz_b: 2000000
(bootloader) partition-type:gz_b: raw data
(bootloader) partition-size:cam_vpu3_b: f00000
(bootloader) partition-type:cam_vpu3_b: raw data
(bootloader) partition-size:cam_vpu2_b: f00000
(bootloader) partition-type:cam_vpu2_b: raw data
(bootloader) partition-size:cam_vpu1_b: f00000
(bootloader) partition-type:cam_vpu1_b: raw data
(bootloader) partition-size:sspm_b: 100000
(bootloader) partition-type:sspm_b: raw data
(bootloader) partition-size:scp_b: 600000
(bootloader) partition-type:scp_b: raw data
(bootloader) partition-size:spmfw_b: 100000
(bootloader) partition-type:spmfw_b: raw data
(bootloader) partition-size:md1img_b: 9600000
(bootloader) partition-type:md1img_b: raw data
(bootloader) partition-size:nvram: 4400000
(bootloader) partition-type:nvram: raw data
(bootloader) partition-size:sec1: 200000
(bootloader) partition-type:sec1: raw data
(bootloader) partition-size:tee_a: 500000
(bootloader) partition-type:tee_a: raw data
(bootloader) partition-size:dtbo_a: 800000
(bootloader) partition-type:dtbo_a: raw data
(bootloader) partition-size:vendor_boot_a: 4000000
(bootloader) partition-type:vendor_boot_a: raw data
(bootloader) partition-size:boot_a: 2000000
(bootloader) partition-type:boot_a: raw data
(bootloader) partition-size:logo_a: 800000
(bootloader) partition-type:logo_a: raw data
(bootloader) partition-size:lk_a: 200000
(bootloader) partition-type:lk_a: raw data
(bootloader) partition-size:gz_a: 2000000
(bootloader) partition-type:gz_a: raw data
(bootloader) partition-size:cam_vpu3_a: f00000
(bootloader) partition-type:cam_vpu3_a: raw data
(bootloader) partition-size:cam_vpu2_a: f00000
(bootloader) partition-type:cam_vpu2_a: raw data
(bootloader) partition-size:cam_vpu1_a: f00000
(bootloader) partition-type:cam_vpu1_a: raw data
(bootloader) partition-size:sspm_a: 100000
(bootloader) partition-type:sspm_a: raw data
(bootloader) partition-size:scp_a: 600000
(bootloader) partition-type:scp_a: raw data
(bootloader) partition-size:spmfw_a: 100000
(bootloader) partition-type:spmfw_a: raw data
(bootloader) partition-size:md1img_a: 9600000
(bootloader) partition-type:md1img_a: raw data
(bootloader) partition-size:otp: 3000000
(bootloader) partition-type:otp: raw data
(bootloader) partition-size:seccfg: 800000
(bootloader) partition-type:seccfg: raw data
(bootloader) partition-size:protect2: 800000
(bootloader) partition-type:protect2: ext4
(bootloader) partition-size:protect1: 800000
(bootloader) partition-type:protect1: ext4
(bootloader) partition-size:persist: 365e000
(bootloader) partition-type:persist: ext4
(bootloader) partition-size:metadata: 2000000
(bootloader) partition-type:metadata: raw data
(bootloader) partition-size:md_udc: 169a000
(bootloader) partition-type:md_udc: raw data
(bootloader) partition-size:vbmeta_vendor_b: 800000
(bootloader) partition-type:vbmeta_vendor_b: raw data
(bootloader) partition-size:vbmeta_system_b: 800000
(bootloader) partition-type:vbmeta_system_b: raw data
(bootloader) partition-size:vbmeta_b: 800000
(bootloader) partition-type:vbmeta_b: raw data
(bootloader) partition-size:vbmeta_vendor_a: 800000
(bootloader) partition-type:vbmeta_vendor_a: raw data
(bootloader) partition-size:vbmeta_system_a: 800000
(bootloader) partition-type:vbmeta_system_a: raw data
(bootloader) partition-size:vbmeta_a: 800000
(bootloader) partition-type:vbmeta_a: raw data
(bootloader) partition-size:nvdata: 4000000
(bootloader) partition-type:nvdata: ext4
(bootloader) partition-size:nvcfg: 2000000
(bootloader) partition-type:nvcfg: ext4
(bootloader) partition-size:frp: 100000
(bootloader) partition-type:frp: raw data
(bootloader) partition-size:expdb: 1400000
(bootloader) partition-type:expdb: raw data
(bootloader) partition-size:para: 80000
(bootloader) partition-type:para: raw data
(bootloader) partition-size:misc: 80000
(bootloader) partition-type:misc: raw data
(bootloader) partition-size:proinfo: 300000
(bootloader) partition-type:proinfo: raw data
(bootloader) partition-size:boot_para: 1a00000
(bootloader) partition-type:boot_para: raw data
(bootloader) partition-size:pgpt: 8000
(bootloader) partition-type:pgpt: raw data
(bootloader) partition-size:preloader_b: 400000
(bootloader) partition-type:preloader_b: raw data
(bootloader) partition-size:preloader_a: 400000
(bootloader) partition-type:preloader_a: raw data
(bootloader) partition-size:preloader: 400000
(bootloader) partition-type:preloader: raw data
(bootloader) serialno: 0726325192011820
(bootloader) off-mode-charge: 1
(bootloader) warranty: no
(bootloader) unlocked: yes
(bootloader) secure: no
(bootloader) kernel: lk
(bootloader) product: x6810_h858
(bootloader) is-userspace: no
(bootloader) slot-retry-count:b: 7
(bootloader) slot-retry-count:a: 7
(bootloader) slot-unbootable:b: no
(bootloader) slot-unbootable:a: no
(bootloader) slot-successful:b: no
(bootloader) slot-successful:a: yes
(bootloader) slot-count: 2
(bootloader) current-slot: a
(bootloader) has-slot:sgpt: no
(bootloader) has-slot:flashinfo: no
(bootloader) has-slot:userdata: no
(bootloader) has-slot:tranfs: no
(bootloader) has-slot:super: no
(bootloader) has-slot:nvram: no
(bootloader) has-slot:sec1: no
(bootloader) has-slot:tee: yes
(bootloader) has-slot:dtbo: yes
(bootloader) has-slot:vendor_boot: yes
(bootloader) has-slot:boot: yes
(bootloader) has-slot:logo: yes
(bootloader) has-slot:lk: yes
(bootloader) has-slot:gz: yes
(bootloader) has-slot:cam_vpu3: yes
(bootloader) has-slot:cam_vpu2: yes
(bootloader) has-slot:cam_vpu1: yes
(bootloader) has-slot:sspm: yes
(bootloader) has-slot:scp: yes
(bootloader) has-slot:spmfw: yes
(bootloader) has-slot:md1img: yes
(bootloader) has-slot:otp: no
(bootloader) has-slot:seccfg: no
(bootloader) has-slot:protect2: no
(bootloader) has-slot:protect1: no
(bootloader) has-slot:persist: no
(bootloader) has-slot:metadata: no
(bootloader) has-slot:md_udc: no
(bootloader) has-slot:vbmeta_vendor: yes
(bootloader) has-slot:vbmeta_system: yes
(bootloader) has-slot:vbmeta: yes
(bootloader) has-slot:nvdata: no
(bootloader) has-slot:nvcfg: no
(bootloader) has-slot:frp: no
(bootloader) has-slot:expdb: no
(bootloader) has-slot:para: no
(bootloader) has-slot:misc: no
(bootloader) has-slot:proinfo: no
(bootloader) has-slot:boot_para: no
(bootloader) has-slot:pgpt: no
(bootloader) has-slot:preloader: yes
(bootloader) version-baseband: MOLY.LR13.R1.MP.V110.P52
(bootloader) version-bootloader: x6810_h858-2162d76aa-20230530104718-202
(bootloader) version-preloader:
(bootloader) version: 0.5
maxpayne
maxpayne
maxpayne
Intern
3,064
31-05-2024, 10:51 AM
#5



(29-05-2024, 06:21 AM)TmpCheck ...

If the GSI you downloaded came as a super.img then the options you have are:
1. Flash it to the super partition
2. Unpack it to get system.img then flash this to system.img

It depends on how what you downloaded was intended to be used.

Note!
We have a reply schedule for Free Support. Please upgrade to Private Support if you can't wait.
TmpCheck
TmpCheck
TmpCheck
Newbie
3
01-06-2024, 05:52 PM
#6
(31-05-2024, 10:51 AM)maxpayne
(29-05-2024, 06:21 AM)TmpCheck ...

If the GSI you downloaded came as a super.img then the options you have are:
1. Flash it to the super partition
2. Unpack it to get system.img then flash this to system.img

It depends on how what you downloaded was intended to be used.

Thanks for the reply, maxpayne.

I downloaded the GSI from Elixir. There is only one file inside the .zip and the filename is "ProjectElixir_4.2_arm64_bgN-14.0-20240427-2318-OFFICIAL.img". There is no system partition for me, so I don't know what I need to erase and to which partition should I flash the ROM's image to.
I don't want to brick the phone, so I want to be sure which partition is the system.

I am willing to provide more details, if need be, so please reply to me if somebody knows what I need to do.
Gargoyle
Gargoyle
Gargoyle
Contributor
504
02-06-2024, 11:46 AM
#7
https://www.mediafire.com/file/08hk6dur5.../super.rar

Unpack rar file and flash
fastboot flash super super.img
kelvinchinedu
kelvinchinedu
kelvinchinedu
Contributor
1,345
04-06-2024, 04:36 AM
#8
(01-06-2024, 05:52 PM)TmpCheck
(31-05-2024, 10:51 AM)maxpayne
(29-05-2024, 06:21 AM)TmpCheck ...

If the GSI you downloaded came as a super.img then the options you have are:
1. Flash it to the super partition
2. Unpack it to get system.img then flash this to system.img

It depends on how what you downloaded was intended to be used.

Thanks for the reply, maxpayne.

I downloaded the GSI from Elixir. There is only one file inside the .zip and the filename is "ProjectElixir_4.2_arm64_bgN-14.0-20240427-2318-OFFICIAL.img". There is no system partition for me, so I don't know what I need to erase and to which partition should I flash the ROM's image to.
I don't want to brick the phone, so I want to be sure which partition is the system.

I am willing to provide more details, if need be, so please reply to me if somebody knows what I need to do.


If just download it and U haven't extract it and download the 328kb product_gsi.img , pls extract to get .IMG
After that boot to fastboot and flash vbmeta and now do the following 
fastboot reboot fastboot,(pls when done this and U don't get detected anymore, go to device manager and update the android that appears to android bootloader before U continue)
fastboot delect-logical-partition product_(follow by your boot slot prefix :Eg _a or_b)
fastboot create-logical-partition product 4000
fastboot flash product (then the product_gsi.img which U download)
fastboot erase system
fastboot flash system (the gsi image)
fastboot reboot recovery 
Or U can reboot to recovery manually 
Then wipe data before rebooting to system 
kelvinchinedu
kelvinchinedu
kelvinchinedu
Contributor
1,345
04-06-2024, 04:46 AM
#9
(31-05-2024, 10:51 AM)maxpayne
(29-05-2024, 06:21 AM)TmpCheck ...

If the GSI you downloaded came as a super.img then the options you have are:
1. Flash it to the super partition
2. Unpack it to get system.img then flash this to system.img

It depends on how what you downloaded was intended to be used.

If U just need a stock system.img from your downloaded rom and U have root just flash this module  https://github.com/blackeangel/UKA/relea...k_sign.zip  using magisk or fox manager and reboot and move your super.img to /data/local/UnpackerSuper/ 
And after reboot type su in termux and follow by menu and select 3 and select 2 and choose the super.img to and U hit enter and see all the IMG of super including product,vendor and system,u also unpack system.img or payload without the tool
Users browsing this thread:
 1 Guest(s)
Users browsing this thread:
 1 Guest(s)
YtWhTl
live chat
whatsapp telegram