This tutorial is meant for the devices: Moto G32, G42, and G52.
It is important to note that these devices are usually referenced using codenames in multiple places, it is important to know which one is yours.
- G32: devon
- G42: hawao
- G52: rhode
Any slight variation of these codenames means that it isn't the same device and it will most likely brick your device. (e.g. rhodec, rhodej)
- Android Platform Tools installed (Fedora)
- Keep the device in bootloader mode!
- Unlocked bootloader (click here if you're in a locked bootloader)
- Stable cable, not using any hubs (preferably the original cable, if it is indeed stable and not damaged)
Before downloading the firm/software for your device, you need to figure out what variant of that device you have in order to prevent a brick.
To figure this out, you'll need to run a fastboot command. Run this on your terminal:
fastboot getvar ro.carrier
This should return your device variant, in my case, it is RETBR.
We will be using an unofficial source, as Motorola does not make the firmware easily accessible officially, only via the RSA tool that's only available on Windows.
- Visit https://mirrors.lolinet.com/firmware/lenomola/.
- Find your device's codename (rhode, devon, hawao) in the list and open it.
- Open the folder "official".
- Find your device's variant (RETBR, RETAIL, RETEU, RETLA...) in the list and open it.
- Download the most recent .zip file. This is the current firmware for your device.
Warning
Do not attempt to downgrade, or use older versions of firmware. While it is possible, you won't be able to relock the bootloader, if so, it will brick your device.
Installing motoflash2sh
MotoFlash2SH is a tool created to convert the .xml files inside the .zip into .sh files that we can execute in the terminal. Motorola (for some reason?) uses .xml files, to describe the install process for their firmware. This allows us to run these on Linux.
- Install Python3 (search for instructions for your distro)
- Add /home/user/.local/bin to PATH
- Install motoflash2sh by running:
pip3 install https://github.com/dlenski/motoflash2sh/archive/master.zip
You should be able to run motoflash2sh in the terminal and it be found. (e.g. it will show an error that it won't find the file, but it shouldn't say it's not a recnognized command, if it does, then check PATH.)
Custom OSes with Verified Boot 2.0 such as Calyx use this partition in order to store their signing key so that Verified Boot with a custom key works properly. It is ideal to remove this before flashing stock.
Caution
This is unsafe on a locked bootloader, other devices should usually disallow this, but for some reason Moto allows erasing this without being on an unlocked bootloader. This can cause a hard brick if you have OEM Unlocking disabled.
Inside a terminal, run the command:
fastboot erase avb_custom_key
- Create a new empty folder
- Put the firmware .zip file inside it.
- Extract it
Now, we're going to convert the .xml into a .sh file.
- Open the terminal in the extracted firmware folder
- Run this command on the terminal
motoflash2sh flashfile.xml
You should now have a .sh file in the folder.
If you haven't already, open a terminal inside the firmware folder. Now, we'll run the .sh by running:
bash flashfile.sh
Installation should now begin. Keep the cable and device stable and let it run until it finishes. If you got an error, you can also try running it with sudo to see if it works.
Warning
If you notice any errors, failures, anything of that nature, do not continue with relocking the bootloader; as it can make the situation worse.
If everything has gone smoothly, you should be able to now relock the bootloader. This will restore Verified Boot. To do this, run this command on the terminal:
fastboot flashing lock
Now, confirm the locking on the device.
After boot, you should go into Developer Settings and check that OEM unlocking is off.
Warning
Only re-disable OEM Unlocking after at least one update from the manufacturer. This is for safety. If it is off, turn it on for now. This makes FRP (Google's stealing protection) much easier to bypass of course. It is notable that on most devices, FRP is not very well secure and bypass methods are found every now and then.
You should be all set now! You are now back in stock firmware.
Things that I'd like to improve/mention on this tutorial but they are either too complicated, too vague of an issue, or with no solution.
- Dealing with the A/B partition scheme issues (explained here)