This is an old revision of the document!
This page is a work in process.
Softbank Phones by Panasonic
Check the dumping hardware overview for a list of known preservation hardware.
If you need help, please come chat with us on the VGPC or No-Intro discord servers.
Introduction
Softbank Panasonic phones fall into two categories. The later, higher end devices are very similar to Docomo Panasonic phones, and are compatible with the same tools. These phones run on a customized form of Linux, and they use the UniPhier set of CPUs.
The earlier models, along with some of the later budget models, run on the APOXI operating system. These phones use CPUs similar to those in Sony Ericsson phones. The APOXI phones are closely related to international Panasonic phones that were released concurrently, such as the Panasonic EB-VS3 and EB-VS7.
Note that many of the APOXI phones that don't have a USB exploit can be extracted with a direct chip dump.
| Phone Model | Extractable? | File System/FTL | Tools |
|---|---|---|---|
| 705P | No | ||
| 705Px | No | ||
| 706P | No | ||
| 810P | No | ||
| 920P | Yes | Samsung RFS + Cramfs + XSR 2 | fs-tools (XSR2) |
| 820P | No | ||
| 921P | Yes | Samsung RFS + Cramfs + XSR 2 | fs-tools (XSR2) |
| 821P | No | ||
| 822P | No | ||
| 823P | Yes | Samsung RFS + Cramfs + XSR 2 | fs-tools (XSR2) |
| 824P | Yes | Samsung RFS + Cramfs + XSR 2 | fs-tools (XSR2) |
| 930P | Yes | Samsung RFS + Cramfs + XSR 2 | fs-tools (XSR2) |
| 830P | No | ||
| 931P | Yes | Samsung RFS + Cramfs + XSR 2 | fs-tools (XSR2) |
| 831P | No | ||
| 832P | Yes | Samsung RFS + Cramfs + XSR 2 | fs-tools (XSR2) |
| 940P | Yes | Samsung RFS + Cramfs + XSR 2 | fs-tools (XSR2) |
| 840P | No | ||
| 840P for Biz | No | ||
| 941P | Yes | Samsung RFS + Cramfs + XSR 2 | fs-tools (XSR2) |
| 841P | No | ||
| 842P | Yes | Samsung RFS + Cramfs + XSR 2 | fs-tools (XSR2) |
| 942P | Yes | Samsung RFS + Cramfs + XSR 2 | fs-tools (XSR2) |
| 001P | Yes | Samsung RFS + Cramfs + XSR 2 | fs-tools (XSR2) |
| 002P | No | ||
| 103P | Yes | Samsung RFS + Cramfs + XSR 2 | fs-tools (XSR2) |
| 301P | Yes | ext3 | |
| 401PM | Yes | ext3 |
Methods
Ktdumper
Ktdumper is a tool for extracting data from feature phones that are compatible with the Foma debug adapter, which includes all Docomo phones and select SoftBank phones. Please note that ktdumper will not work unless you have the Foma debug adapter.
Ktdumper is compatible with Linux and WSL (Windows System on Linux). It can be used as a command line tool or as a live Linux iso with a GUI.
Ktdumper Command Line
- Make sure your phone is connected to the PC with a debug cable. If using WSL, you will need to bind your USB device. The easiest way to do this is with wsl-usb-gui.
- Download the ktdumper repository from Github
- Navigate to the main ktdumper folder, where the code will be executed.
- You can execute the following commands
- NAND (contains user data, downloads, etc.)
sudo ./ktdumper.sh [insert phone model] dump_nand
- NOR (usually default data, sometimes user data if the phone does not have nand)
sudo ./ktdumper.sh [insert phone model] dump_nor
- JAVA Folder (only works on select Mitsubishi/Fujitsu phones)
sudo ./ktdumper.sh [insert phone model] dump_java
Sample For D904i
sudo ./ktdumper.sh d904i dump_nand
Reading Data
fs-tools (XSR2)
- Download assemble_xsr2.py from Github
- IF onenand is split into onenand_a and onenand_b, combine the bin files and the oob files
- Use the following command
python .\assemble_xsr2.py onenand.bin output_dir
- In the output directory, select the largest partition and use TestDisk
NOTE: If TestDisk says that the partition(s) can't be recovered, try [UNDELETE] instead of Analyze.