Need of Verizon Software Upgrade Assistant - Verizon Galaxy Note 3 Q&A, Help & Troubleshooting

Hey guys i'm currently having an issue where i used tried updating with Kies and now im stuck in a odin screen displaying "Firmware Upgrade encountered an issue. Please use Software Repair Assistant & try again." Odin doesn't work in this case at all. I tried looking for the software online and found a link to a fellow xda member but the windows version doesn't work. I know to get the software you just plug in the phone and usually the verizon installer shows first before you have the option to go MTP. Is it possible for somebody to get me the folder with the installation files.

I had the same problem and flashing the PIT file in Odin is what fixed it. You can get the file here -
http://forum.xda-developers.com/showthread.php?t=2484064

Your the man! This worked for me!!!

thank you
snwbrdr852 said:
I had the same problem and flashing the PIT file in Odin is what fixed it. You can get the file here -
http://forum.xda-developers.com/showthread.php?t=2484064
Click to expand...
Click to collapse
Yes, you're the man! This worked for me as well. I do have a question for you though. See if you can solve this one. The reason this happened is because I had my phone rooted then stupidly installed the factory update then tried to root again once I found out that after the install my phone wasn't rooted anymore. Do you know a way around this? Thanks again for the help saving my phone!

chrishencz said:
Yes, you're the man! This worked for me as well. I do have a question for you though. See if you can solve this one. The reason this happened is because I had my phone rooted then stupidly installed the factory update then tried to root again once I found out that after the install my phone wasn't rooted anymore. Do you know a way around this? Thanks again for the help saving my phone!
Click to expand...
Click to collapse
If you took the update, the only root method is Kingo. It is controversial, but many have used it with great success.
Sent from my SM-N900V using Tapatalk HD

Don't flash anything MI9 (de la vega or stock odin) after taking the MJ7 update or this is what happens

SladeNoctis said:
Hey guys i'm currently having an issue where i used tried updating with Kies and now im stuck in a odin screen displaying "Firmware Upgrade encountered an issue. Please use Software Repair Assistant & try again." Odin doesn't work in this case at all. I tried looking for the software online and found a link to a fellow xda member but the windows version doesn't work. I know to get the software you just plug in the phone and usually the verizon installer shows first before you have the option to go MTP. Is it possible for somebody to get me the folder with the installation files.
Click to expand...
Click to collapse
I'm sure you don't need it know but here it is. http://www.mediafire.com/download/dheubs6vocnfyjp/VZW_Software_upgrade_assistant.exe

thanks
R-1 Rider said:
If you took the update, the only root method is Kingo. It is controversial, but many have used it with great success.
Sent from my SM-N900V using Tapatalk HD
Click to expand...
Click to collapse
I have been reading a little about the Kingo method and I was thinking about it but I do all of my banking and have many accounts with my credit card on the all on my phone so I have been kind of worried about it. How long do you think it will take for someone to come up with a standard odin root for the dummies like me who took the upgrade? I really appreciate all of your help with this by the way. I don't know where I'd be with out XDA in general.

chrishencz said:
I have been reading a little about the Kingo method and I was thinking about it but I do all of my banking and have many accounts with my credit card on the all on my phone so I have been kind of worried about it. How long do you think it will take for someone to come up with a standard odin root for the dummies like me who took the upgrade? I really appreciate all of your help with this by the way. I don't know where I'd be with out XDA in general.
Click to expand...
Click to collapse
You can try it this way. http://forum.xda-developers.com/showthread.php?t=2498850

No luck
scoobysnack said:
You can try it this way. http://forum.xda-developers.com/showthread.php?t=2498850
Click to expand...
Click to collapse
the new build number on my phone is now N9000VVRUBMJ7 I looked at the link you gave me and it's not on there. Thanks anyways. I love to hear any ideas that anyone has. I'm thinking that I'm either going to have to use the Kingo method or just wait for someone to come up with a root method for the new MJ7 build number but I'm afraid that might take a while since I don't even think that someone has even come up with one for the S4 updated software yet.

chrishencz said:
the new build number on my phone is now N9000VVRUBMJ7 I looked at the link you gave me and it's not on there. Thanks anyways. I love to hear any ideas that anyone has. I'm thinking that I'm either going to have to use the Kingo method or just wait for someone to come up with a root method for the new MJ7 build number but I'm afraid that might take a while since I don't even think that someone has even come up with one for the S4 updated software yet.
Click to expand...
Click to collapse
I believe this is the file. http://downloads.crackflasher.com/s...VRUBMJ7_N900VVZWMJ7_N900VVRUBMJ7_HOME.tar.md5

scoobysnack said:
I believe this is the file. (it wouldn't let me re-post the link)
Is this the root file? and if so do I just put it in the AP box of odin and let it do it's thing? I really appreciate your help with this. I have been clicking on the thank button on all of your comments because it's the least I can do.
Click to expand...
Click to collapse

chrishencz said:
scoobysnack said:
I believe this is the file. (it wouldn't let me re-post the link)
Is this the root file? and if so do I just put it in the AP box of odin and let it do it's thing? I really appreciate your help with this. I have been clicking on the thank button on all of your comments because it's the least I can do.
Click to expand...
Click to collapse
Sorry for the delay. It's the recovery for not rooted. You have to create the root file with URDLV I cant seem to get the fi le to create without
Errors. I'll play around a little more and get back to you. I think I have figured out what I was doing wrong. You cannot put your m5 file in the same folder as the URDLV.bat
Click to expand...
Click to collapse

snwbrdr852 said:
I had the same problem and flashing the PIT file in Odin is what fixed it. You can get the file here -
http://forum.xda-developers.com/showthread.php?t=2484064
Click to expand...
Click to collapse
how do you flash the pit file in odin?
YOUR THE MAN..
This was awsome!!! been on this for 3 hrs this morning looking for a fix.
WOOOOO HOOOOOO

Worked great!!!
snwbrdr852 said:
I had the same problem and flashing the PIT file in Odin is what fixed it. You can get the file here -
http://forum.xda-developers.com/showthread.php?t=2484064
Click to expand...
Click to collapse
:laugh:

Old thread, but I thought that I would add the following info in case anybody goes looking for the same stuff (Software Assistant) at some later point in time, perhaps from later releases.
It can be found inside an ISO file at /system/etc/autorun.iso on the phone
Also, even if you don't have a working phone you can dig it out of the "cache.img.ext4" file in the Odin tar.md5 tarballs (using a few mad linux skillz).
During Odin flashing, it would appear that much of the region customization (CSC) is performed in the recovery boot immediately after Odin finishes. That is, the "system.img.ext4" image is quite generic, and the CSC customizations are performed by copying them into place during the subsequent recovery boot. If you unpack the cache.img.ext4 file and mount it (details in a little bit), you will find:
./recovery/command
./recovery/sec_csc.zip
The .zip file above also contains the ISO image file. Getting the zip file though requires the skillz mentioned above, just hang on a second!
the ./recovery/command file contains (e.g. in the MJE tarball):
Code:
--update_package=CACHE:recovery/sec_csc.zip
--carry_out=csc_factory
--wipe_data
and the META-INF/com/google/android/updater-script file (inside recovery/sec_csc.zip) is also quite trival:
Code:
show_progress(0.100000, 0);
show_progress(0.500000, 0);
package_extract_dir("system", "/system");
Basically, this recovery boot process just unpacks everything in the sec_csc.zip file under "system/" to right on top of the vanilla system image that was flashed by Odin.
For example, in the MJE tarball, the contents of "sec_csc.zip" are:
Code:
signed by SignApk
Length Date Time Name
--------- ---------- ----- ----
221824 2013-11-11 20:38 META-INF/com/google/android/update-binary
98 2013-11-11 20:38 META-INF/com/google/android/updater-script
12 2013-11-11 03:38 system/CSCVersion.txt
321 2013-11-11 20:38 system/SW_Configuration.xml
0 2013-11-11 03:38 system/VODB/en_US/checked
448658 2013-11-11 20:38 system/VODB/en_US/en_US-ak-cur.lite.res
2725524 2013-11-11 20:38 system/VODB/en_US/en_US-lk-text.lite.res
3813 2013-11-11 20:38 system/VODB/en_US/en_US.lang
175 2013-11-11 20:38 system/VODB/en_US/files.txt
0 2013-11-11 03:38 system/VODB/es_US/checked
505442 2013-11-11 20:38 system/VODB/es_US/es_MX-ak-cur.lite.res
4416944 2013-11-11 20:38 system/VODB/es_US/es_MX-lk-text.lite.res
3815 2013-11-11 20:38 system/VODB/es_US/es_US.lang
175 2013-11-11 20:38 system/VODB/es_US/files.txt
0 2013-11-11 03:38 system/VODB/ko_KR/checked
188 2013-11-11 20:38 system/VODB/ko_KR/files.txt
3942 2013-11-11 20:38 system/VODB/ko_KR/ko_KR.lang
6791894 2013-11-11 20:38 system/VODB/ko_KR/ko_KR_johab-ak-cur.lite.res
7512280 2013-11-11 20:38 system/VODB/ko_KR/ko_KR_johab-lk-text.lite.res
96446 2013-11-11 20:38 system/VODB/lib/ank-standard.res
0 2013-11-11 03:38 system/VODB/lib/checked
1548158 2013-11-11 20:38 system/VODB/lib/equation-ak.lite.res
4007 2013-11-11 20:38 system/VODB/lib/equation-grm-standard.res
964 2013-11-11 20:38 system/VODB/lib/files.txt
429796 2013-11-11 20:38 system/VODB/lib/libMyScript2D.so
222740 2013-11-11 20:38 system/VODB/lib/libMyScriptAnalyzer.so
628672 2013-11-11 20:38 system/VODB/lib/libMyScriptEngine.so
230824 2013-11-11 20:38 system/VODB/lib/libMyScriptEquation.so
1726888 2013-11-11 20:38 system/VODB/lib/libMyScriptHWR.so
357768 2013-11-11 20:38 system/VODB/lib/libMyScriptInkSearch.so
288260 2013-11-11 20:38 system/VODB/lib/libMyScriptShape.so
38080 2013-11-11 20:38 system/VODB/lib/libMyScriptUserSymbols.so
124164 2013-11-11 20:38 system/VODB/lib/libMyScriptWriterAdaptation.so
2589816 2013-11-11 20:38 system/VODB/lib/libStylusCore.so
558932 2013-11-11 20:38 system/VODB/lib/libvoim.so
1578 2013-11-11 20:38 system/VODB/lib/shk-analyzer.res
1578 2013-11-11 20:38 system/VODB/lib/shk-standard.res
0 2013-11-11 03:38 system/VODB/mul/checked
868 2013-11-11 20:38 system/VODB/mul/files.txt
11592 2013-11-11 20:38 system/VODB/mul/mul-lk-email.res
512 2013-11-11 20:38 system/VODB/mul/mul-lk-gesture.res
76064 2013-11-11 20:38 system/VODB/mul/mul-lk-math.res
1260 2013-11-11 20:38 system/VODB/mul/mul-lk-number.res
1636 2013-11-11 20:38 system/VODB/mul/mul-lk-number_decimal.res
1052 2013-11-11 20:38 system/VODB/mul/mul-lk-number_integer.res
1708 2013-11-11 20:38 system/VODB/mul/mul-lk-number_signed_decimal.res
1116 2013-11-11 20:38 system/VODB/mul/mul-lk-number_signed_integer.res
436 2013-11-11 20:38 system/VODB/mul/mul-lk-ool.res
1876 2013-11-11 20:38 system/VODB/mul/mul-lk-phone_number.res
53168 2013-11-11 20:38 system/VODB/mul/mul-lk-uri.res
4503 2013-11-11 20:38 system/VODB/mul/mul-sk-email.res
4384 2013-11-11 20:38 system/VODB/mul/mul-sk-uri.res
2585 2013-11-11 20:38 system/VODB/mul/notes.res
86856 2013-11-11 20:38 system/VODB/mul/profile.res
2188 2013-11-11 20:38 system/VODB/resources.txt
0 2013-11-11 03:38 system/VODB/vi_VN/checked
175 2013-11-11 20:38 system/VODB/vi_VN/files.txt
661026 2013-11-11 20:38 system/VODB/vi_VN/vi_VN-ak-cur.lite.res
3160184 2013-11-11 20:38 system/VODB/vi_VN/vi_VN-lk-text.lite.res
3846 2013-11-11 20:38 system/VODB/vi_VN/vi_VN.lang
0 2013-11-11 03:38 system/VODB/zh_CN/checked
193 2013-11-11 20:38 system/VODB/zh_CN/files.txt
3984 2013-11-11 20:38 system/VODB/zh_CN/zh_CN.lang
10554253 2013-11-11 20:38 system/VODB/zh_CN/zh_CN_gb18030-ak-cur.lite.res
3306812 2013-11-11 20:38 system/VODB/zh_CN/zh_CN_gb18030-lk-text.lite.res
8192 2013-11-11 20:38 system/csc/contents.db
3336 2013-11-11 20:38 system/csc/customer.xml
15484 2013-11-11 20:38 system/csc/default_application_order.xml
5567 2013-11-11 20:38 system/csc/default_workspace.xml
6041 2013-11-11 20:38 system/csc/default_workspace_cp.xml
5169 2013-11-11 20:38 system/csc/easylauncher_default_workspace.xml
16185 2013-11-11 20:38 system/csc/feature.xml
182 2013-11-11 20:38 system/csc/others.xml
4 2013-11-11 03:38 system/csc/sales_code.dat
[b][color=green]13058048 2013-11-11 20:38 system/etc/autorun.iso[/color][/b]
0 2013-11-11 03:38 system/etc/csc_apks_list_VZW.txt
0 2013-11-11 03:38 system/etc/csc_ringtones_list_VZW.txt
18 2013-11-11 03:38 system/etc/enforceskippingpackages.txt
0 2013-11-11 03:38 system/etc/hidden_apks_list_VZW.txt
13563 2013-11-11 20:38 system/finder_cp/cpdata.xml
20206 2013-11-11 20:38 system/finder_cp/web_cp_logo_baidu.png
4767 2013-11-11 20:38 system/finder_cp/web_cp_logo_bing.png
16876 2013-11-11 20:38 system/finder_cp/web_cp_logo_daum.png
24938 2013-11-11 20:38 system/finder_cp/web_cp_logo_google.png
6806 2013-11-11 20:38 system/finder_cp/web_cp_logo_naver.png
5296 2013-11-11 20:38 system/finder_cp/web_cp_logo_yahoo.png
3076096 2013-11-11 20:38 system/hidden/INTERNAL_SDCARD/Samsung/Music/Over_the_horizon_2013.mp3
2311367 2013-11-11 03:38 system/sipdb/en_US.zip
2171803 2013-11-11 03:38 system/sipdb/es_US.zip
4775560 2013-11-11 03:38 system/sipdb/ko_KR.zip
2014271 2013-11-11 03:38 system/sipdb/vi_VN.zip
4893146 2013-11-11 03:38 system/sipdb/zh_CN.zip
8027223 2013-11-11 20:38 system/wallpaper/lockscreen_default_wallpaper.png
8068 2013-11-11 20:38 META-INF/MANIFEST.MF
8121 2013-11-11 20:38 META-INF/CERT.SF
1772 2013-11-11 20:38 META-INF/CERT.RSA
--------- -------
89924158 96 files
.
Here's the file listing from the (MJE) autorun.iso:
Code:
3074 1 -r-xr-xr-x 1 root root 74 May 5 2013 ./Autorun.inf
3075 1 -r-xr-xr-x 1 root root 95 Aug 27 23:23 ./ModelName.txt
3077 8366 -r-xr-xr-x 1 root root 8566096 Jun 4 2013 ./Samsung_Mobile_USB_Driver.exe
4354 2 -r-xr-xr-x 1 root root 1700 Sep 24 19:31 ./VZW\ Software\ Upgrade\ Assistant.app/Contents/Info.plist
4418 227 -r-xr-xr-x 1 root root 231896 Sep 24 19:31 ./VZW\ Software\ Upgrade\ Assistant.app/Contents/MacOS/VZW\ Software\ Upgrade\ Assistant
4357 1 -r-xr-xr-x 1 root root 8 Sep 24 19:31 ./VZW\ Software\ Upgrade\ Assistant.app/Contents/PkgInfo
4482 200 -r-xr-xr-x 1 root root 204610 Sep 24 19:31 ./VZW\ Software\ Upgrade\ Assistant.app/Contents/Resources/Bootstrap.icns
4484 66 -r-xr-xr-x 1 root root 67460 Sep 24 19:31 ./VZW\ Software\ Upgrade\ Assistant.app/Contents/Resources/MainMenu.nib
4546 1 -r-xr-xr-x 1 root root 436 Sep 24 19:31 ./VZW\ Software\ Upgrade\ Assistant.app/Contents/Resources/en.lproj/Credits.rtf
4547 1 -r-xr-xr-x 1 root root 92 Sep 24 19:31 ./VZW\ Software\ Upgrade\ Assistant.app/Contents/Resources/en.lproj/InfoPlist.strings
4550 3 -r-xr-xr-x 1 root root 2292 Sep 24 19:31 ./VZW\ Software\ Upgrade\ Assistant.app/Contents/Resources/en.lproj/Localizable.strings
4487 5 -r-xr-xr-x 1 root root 4698 Sep 24 19:31 ./VZW\ Software\ Upgrade\ Assistant.app/Contents/Resources/img_logo_samsung.png
4489 5 -r-xr-xr-x 1 root root 5061 Sep 24 19:31 ./VZW\ Software\ Upgrade\ Assistant.app/Contents/Resources/img_logo_verizon.png
4610 1 -r-xr-xr-x 1 root root 436 Sep 24 19:31 ./VZW\ Software\ Upgrade\ Assistant.app/Contents/Resources/ko.lproj/Credits.rtf
4611 1 -r-xr-xr-x 1 root root 92 Sep 24 19:31 ./VZW\ Software\ Upgrade\ Assistant.app/Contents/Resources/ko.lproj/InfoPlist.strings
4614 3 -r-xr-xr-x 1 root root 2286 Sep 24 19:31 ./VZW\ Software\ Upgrade\ Assistant.app/Contents/Resources/ko.lproj/Localizable.strings
4493 7 -r-xr-xr-x 1 root root 6844 Sep 24 19:31 ./VZW\ Software\ Upgrade\ Assistant.app/Contents/Resources/logo.png
3083 773 -r-xr-xr-x 1 root root 791408 Sep 24 20:04 ./VZW_Software_upgrade_assistant.exe
3202 11 -r-xr-xr-x 1 root root 10881 May 6 2013 ./ssuddrv.kext/Contents/Info.plist
3266 146 -r-xr-xr-x 1 root root 149376 May 6 2013 ./ssuddrv.kext/Contents/MacOS/ssuddrv
3458 3 -r-xr-xr-x 1 root root 2147 May 6 2013 ./ssuddrv.kext/Contents/PlugIns/ssudmdmcontrol.kext/Contents/Info.plist
3522 134 -r-xr-xr-x 1 root root 136200 May 6 2013 ./ssuddrv.kext/Contents/PlugIns/ssudmdmcontrol.kext/Contents/MacOS/ssudmdmcontrol
3650 4 -r-xr-xr-x 1 root root 3697 May 6 2013 ./ssuddrv.kext/Contents/PlugIns/ssudmdmdata.kext/Contents/Info.plist
3714 362 -r-xr-xr-x 1 root root 370104 May 6 2013 ./ssuddrv.kext/Contents/PlugIns/ssudmdmdata.kext/Contents/MacOS/ssudmdmdata
3842 3 -r-xr-xr-x 1 root root 2954 May 6 2013 ./ssuddrv.kext/Contents/PlugIns/ssudmtp.kext/Contents/Info.plist
3906 1896 -r-xr-xr-x 1 root root 1940568 May 6 2013 ./ssuddrv.kext/Contents/PlugIns/ssudmtp.kext/Contents/MacOS/ssudmtp
3845 1 -r-xr-xr-x 1 root root 8 May 6 2013 ./ssuddrv.kext/Contents/PlugIns/ssudmtp.kext/Contents/PkgInfo
4034 1 -r-xr-xr-x 1 root root 92 May 6 2013 ./ssuddrv.kext/Contents/PlugIns/ssudmtp.kext/Contents/Resources/English.lproj/InfoPlist.strings
4162 3 -r-xr-xr-x 1 root root 2482 May 6 2013 ./ssuddrv.kext/Contents/PlugIns/ssudserial.kext/Contents/Info.plist
4226 357 -r-xr-xr-x 1 root root 365368 May 6 2013 ./ssuddrv.kext/Contents/PlugIns/ssudserial.kext/Contents/MacOS/ssudserial
OK, finally: the mad skillz. You need to use the Android SDK "simg2img" tool (search for simg2img here on XDA) to unpack the sparse ext4 image file (cache.img.ext4) in the Odin tarball.
on your fave linux distro
Code:
$ tar xvf Odin_BLAH_BLAH_BLAH.tar.md5 cache.img.ex4
$ simg2img cache.img.ext4 cache.full_img.ext4
$ mkdir /tmp/mntcache
$ mkdir /tmp/mntiso
$ sudo losetup /dev/loop0 `pwd`/cache.full_img.ext4
$ sudo mount /dev/loop0 -o ext4 -o ro /tmp/mntcache
$ cp /tmp/mntcache/recovery/sec_csc.zip .
$ sudo umount /dev/loop0
$ sudo losetup -d /dev/loop0
$ unzip sec_csc.zip system/etc/autorun.iso
$ sudo losetup /dev/loop0 `pwd`/system/etc/autorun.iso
$ sudo mount -t iso9660 -o ro /dev/loop0 /tmp/mntiso
$ mkdir isocontents
$ cp -r /tmp/mntiso isocontents/
$ sudo umount /dev/loop0
$ sudo losetup -d /dev/loop0
$ echo 'cleaning up'
$ rmdir /tmp/mntcache /tmp/mntiso
$ rm sec_csc.zip cache.*.ext4 system/etc/autorun.iso
$ echo 'files are in folder isocontents'
as always YMMV.

omg.. after 1 hour of web searching to fix this... this thread helped.. I just flashed the PIT file and it worked! Sorry for reviving such an old thread. Just thankful that I didn't need to walk into a Verizon store or use my warranty to swap this phone out when it's in immaculate condition. cheers to the devs for their hard work!

not sure what to do... plz help
snwbrdr852 said:
I had the same problem and flashing the PIT file in Odin is what fixed it. You can get the file here -
http://forum.xda-developers.com/showthread.php?t=2484064
Click to expand...
Click to collapse
I also have the "firmware upgrade issue...please use Software Repair Assistant & try again" error on my phone and I have no clue what to do from here. I'm so sorry to be so ignorant about this. but I've searched the internet for 2 days now and I just cant live without my phone working. I rooted my phone (and never once upgraded anything) So I decided to go ahead and unroot before I f'd my phone up. But i f'd it up anyway. I just need to get it back to its normal ol self-phone in its useable state again. If there is anyway anyone could walk me through what to do and how to fix this, I would be forever in debt!

jenmabre said:
I also have the "firmware upgrade issue...please use Software Repair Assistant & try again" error on my phone and I have no clue what to do from here. I'm so sorry to be so ignorant about this. but I've searched the internet for 2 days now and I just cant live without my phone working. I rooted my phone (and never once upgraded anything) So I decided to go ahead and unroot before I f'd my phone up. But i f'd it up anyway. I just need to get it back to its normal ol self-phone in its useable state again. If there is anyway anyone could walk me through what to do and how to fix this, I would be forever in debt!
Click to expand...
Click to collapse
Did you flash the pit file???

drewcam888 said:
Did you flash the pit file???
Click to expand...
Click to collapse
i was reading on the forum and saw that this fixed it, but I have no idea how to flash the pit file or what that even means. any help would be greatly appreciated

Related

[Q] Phone does not boot after symbolic link fonts files

When I symbolic linked /system/fonts/DroidSans-Bold.ttf and /system/fonts/DroidSans.ttf to /HWUserData/fonts/simsun.ttc, the phone can reboot successfully, and I can see the default fonts are changed as expected:
Code:
# This one is still working
sh-4.2# ls -l
ls -l
total 5536
-rw-r--r-- 1 0 0 6880 Dec 3 10:11 Clockopia.ttf
lrwxrwxrwx 1 0 0 28 Dec 22 01:48 DroidSans-Bold.ttf -> /HWUserData/fonts/simsun.ttc
-rw-r--r-- 1 0 0 194488 Dec 3 10:11 DroidSans-Bold.ttf.bak
lrwxrwxrwx 1 0 0 28 Dec 22 01:43 DroidSans.ttf -> /HWUserData/fonts/simsun.ttc
-rw-r--r-- 1 0 0 190776 Dec 3 10:11 DroidSans.ttf.bak
-rw-r--r-- 1 0 0 622280 Dec 3 10:11 DroidSansArabic.ttf
-rw-r--r-- 1 0 0 3725920 Dec 3 10:11 DroidSansFallback.ttf
-rw-r--r-- 1 0 0 23076 Dec 3 10:11 DroidSansHebrew.ttf
-rw-r--r-- 1 0 0 119380 Dec 3 10:11 DroidSansMono.ttf
-rw-r--r-- 1 0 0 36028 Dec 3 10:11 DroidSansThai.ttf
-rw-r--r-- 1 0 0 185228 Dec 3 10:11 DroidSerif-Bold.ttf
-rw-r--r-- 1 0 0 190304 Dec 3 10:11 DroidSerif-BoldItalic.ttf
-rw-r--r-- 1 0 0 177560 Dec 3 10:11 DroidSerif-Italic.ttf
-rw-r--r-- 1 0 0 172916 Dec 3 10:11 DroidSerif-Regular.ttf
lrwxrwxrwx 1 0 0 26 Dec 21 10:31 msyh.ttc -> /HWUserData/fonts/msyh.ttc
lrwxrwxrwx 1 0 0 28 Dec 21 10:31 msyhbd.ttc -> /HWUserData/fonts/msyhbd.ttc
lrwxrwxrwx 1 0 0 28 Dec 21 10:31 simhei.ttf -> /HWUserData/fonts/simhei.ttf
lrwxrwxrwx 1 0 0 28 Dec 21 10:31 simsun.ttc -> /HWUserData/fonts/simsun.ttc
Then, I symbolic linked all fonts to /HWUserData/fonts/***, reboot, phone is stucked at Huawei logo screen:
Code:
sh-4.2# ls -l
# This one make the phone can't boot
ls -l
total 5536
-rw-r--r-- 1 0 0 6880 Dec 3 10:11 Clockopia.ttf
lrwxrwxrwx 1 0 0 10 Dec 22 02:16 DroidSans-Bold.ttf -> simsun.ttc
-rw-r--r-- 1 0 0 194488 Dec 3 10:11 DroidSans-Bold.ttf.bak
lrwxrwxrwx 1 0 0 10 Dec 22 02:16 DroidSans.ttf -> simsun.ttc
-rw-r--r-- 1 0 0 190776 Dec 3 10:11 DroidSans.ttf.bak
lrwxrwxrwx 1 0 0 8 Dec 22 02:17 DroidSansArabic.ttf -> msyh.ttc
-rw-r--r-- 1 0 0 622280 Dec 3 10:11 DroidSansArabic.ttf.bak
lrwxrwxrwx 1 0 0 8 Dec 22 02:19 DroidSansFallback.ttf -> msyh.ttc
-rw-r--r-- 1 0 0 3725920 Dec 3 10:11 DroidSansFallback.ttf.bak
lrwxrwxrwx 1 0 0 8 Dec 22 02:19 DroidSansHebrew.ttf -> msyh.ttc
-rw-r--r-- 1 0 0 23076 Dec 3 10:11 DroidSansHebrew.ttf.bak
lrwxrwxrwx 1 0 0 8 Dec 22 02:19 DroidSansMono.ttf -> msyh.ttc
-rw-r--r-- 1 0 0 119380 Dec 3 10:11 DroidSansMono.ttf.bak
lrwxrwxrwx 1 0 0 8 Dec 22 02:19 DroidSansThai.ttf -> msyh.ttc
-rw-r--r-- 1 0 0 36028 Dec 3 10:11 DroidSansThai.ttf.bak
lrwxrwxrwx 1 0 0 10 Dec 22 02:14 DroidSerif-Bold.ttf -> simsun.ttc
-rw-r--r-- 1 0 0 185228 Dec 3 10:11 DroidSerif-Bold.ttf.bak
lrwxrwxrwx 1 0 0 10 Dec 22 02:14 DroidSerif-BoldItalic.ttf -> simsun.ttc
-rw-r--r-- 1 0 0 190304 Dec 3 10:11 DroidSerif-BoldItalic.ttf.bak
lrwxrwxrwx 1 0 0 10 Dec 22 02:15 DroidSerif-Italic.ttf -> simsun.ttc
-rw-r--r-- 1 0 0 177560 Dec 3 10:11 DroidSerif-Italic.ttf.bak
lrwxrwxrwx 1 0 0 10 Dec 22 02:13 DroidSerif-Regular.ttf -> simsun.ttc
-rw-r--r-- 1 0 0 172916 Dec 3 10:11 DroidSerif-Regular.ttf.bak
lrwxrwxrwx 1 0 0 26 Dec 21 10:31 msyh.ttc -> /HWUserData/fonts/msyh.ttc
lrwxrwxrwx 1 0 0 28 Dec 21 10:31 msyhbd.ttc -> /HWUserData/fonts/msyhbd.ttc
lrwxrwxrwx 1 0 0 28 Dec 21 10:31 simhei.ttf -> /HWUserData/fonts/simhei.ttf
lrwxrwxrwx 1 0 0 28 Dec 21 10:31 simsun.ttc -> /HWUserData/fonts/simsun.ttc
I can use 'adb' to get shell, but 'su' command failed with "Segmentation fault", so I can't undo these symbolic links.
'adb logcat' show a lot of logs which I don't understand it: pastebin.com/a3Ar1XvK
Any chance to revive this phone?
well,i have to reupgrade ROM to bring it back, some data are lost
Sent from my U8800 using XDA App
You should make backup before you do something major to your device.
Recovery backup saves your time.

Verizon VK810 rooted and TWRP

Wheres the roms? This thing is finally rooted with recovery, are there any known working roms?
Sent from my VK810 4G using XDA Premium HD app
Chance77 said:
Wheres the roms? This thing is finally rooted with recovery, are there any known working roms?
Sent from my VK810 4G using XDA Premium HD app
Click to expand...
Click to collapse
Give it time, grasshopper. These things take time. There are just enough differences between the 500/501 and 810 and the dev's need time to mod the kernel, build and find testers.
Also, as far as I know, we don't have source for the VK810 yet so that may slow things down a bit.
Believe me, i'm also waiting on an AOSP / GPE experience to make this thing perfect.
LG already released source. https://www.lg.com/global/support/opensource/opensourceList?types=ALL&search=vk810
edgemaster191 said:
Give it time, grasshopper. These things take time. There are just enough differences between the 500/501 and 810 and the dev's need time to mod the kernel, build and find testers.
Also, as far as I know, we don't have source for the VK810 yet so that may slow things down a bit.
Believe me, i'm also waiting on an AOSP / GPE experience to make this thing perfect.
Click to expand...
Click to collapse
I wish I shared your optimism. I hope I'm wrong but it isn't looking good. The only reason we got TWRP support is because someone that has the other device helped with the 810. There seems to be next to no momentum on the 810 side. There just doesn't seem to be a lot of developers who have that device.
prana22 said:
I wish I shared your optimism. I hope I'm wrong but it isn't looking good. The only reason we got TWRP support is because someone that has the other device helped with the 810. There seems to be next to no momentum on the 810 side. There just doesn't seem to be a lot of developers who have that device.
Click to expand...
Click to collapse
I would do something but I have never even compiled CM11 let alone tweaked it to work with a new device. I can work with a developer who doesn't have one, but I don't know enough to do it on my own.
That is where I am as well. I know just enough to get myself in trouble.
Sent from my VK810 4G using XDA Free mobile app
anyone care to share a system dump of the VK810?
boot.img and system partition would be useful
my local verizon store refuses to sell it to me without a contract............ sigh
probably going to get it from amazon
Sure, how do I do that? <-- I am a noob
popezaphod said:
Sure, how do I do that? <-- I am a noob
Click to expand...
Click to collapse
http://forum.xda-developers.com/showthread.php?t=2450045
info about the various partitions,good reading: http://www.all-things-android.com/content/review-android-partition-layout
if you have the custom recovery installed, you could do a backup of the device from recovery and share the files
don't share your EFS partition because it contains your unique IMEI/ESN number, and sometimes devices break if you flash someone else's EFS partition. don't share your userdata partition obviously
(if you can't figure out which is the EFS partition from the WAY #2 image, or how to do a system dump, I just need the following partitions and partition layout)
What I need:
1) Following partitions
BOOT - contains ramdisk info necessary to compile a working boot image
RECOVERY - not that necessary, but more info is useful
SYSTEM - probably contains modem libraries not present in the v500 system partition
2) Partition Layout
needed to compile a working ROM
more info is better... so a complete system dump (minus EFS and userdata) would be great
thanks for helping...
Good Amount of Info
ro.product
Code:
[ro.product.board]: [MSM8960]
[ro.product.brand]: [lge]
[ro.product.cpu.abi2]: [armeabi]
[ro.product.cpu.abi]: [armeabi-v7a]
[ro.product.device]: [altev]
[ro.product.locale.language]: [en]
[ro.product.locale.region]: [US]
[ro.product.manufacturer]: [LGE]
[ro.product.model]: [VK810 4G]
[ro.product.name]: [altev_vzw]
[email protected]:/ # getprop | grep ro.build.
ro.build
Code:
[ro.build.characteristics]: [tablet]
[ro.build.date.utc]: [1392900914]
[ro.build.date]: [Thu Feb 20 21:55:14 KST 2014]
[ro.build.description]: [altev_vzw-user 4.2.2 JDQ39B VK81010C.1392900840 release
-keys]
[ro.build.display.id]: [JDQ39B]
[ro.build.fingerprint]: [lge/altev_vzw/altev:4.2.2/JDQ39B/VK81010C.1392900840:us
er/release-keys]
[ro.build.host]: [LGEARND9B11]
[ro.build.id]: [JDQ39B]
[ro.build.product]: [altev]
[ro.build.tags]: [release-keys]
[ro.build.target_country]: [US]
[ro.build.target_operator]: [VZW]
[ro.build.target_region]: [US]
[ro.build.type]: [user]
[ro.build.user]: [hyungjin.yoo]
[ro.build.version.codename]: [REL]
[ro.build.version.incremental]: [VK81010C.1392900840]
[ro.build.version.release]: [4.2.2]
[ro.build.version.sdk]: [17]
Stock aBoot img
https://www.dropbox.com/s/kf3fysyhvlyw8l0/aboot.img
Boot IMG w/ TWRP Installed(Not sure if that matters or not)
https://www.dropbox.com/s/egm0rp381cahbeo/boot.img
TWRP Recovory
https://www.dropbox.com/s/ypwreq1c07yj36v/VK810_twrp_2.7.0.1.zip
Recovory IMG w/ TWRP Installed
https://www.dropbox.com/s/23xy2o8qydqsunu/recovery.img
Stock build.prop
https://www.dropbox.com/s/4rqciye90mhp1cj/build.prop
Partitions
Code:
7 0 5229 loop0
7 1 22901 loop1
179 0 15388672 mmcblk0
179 1 65536 mmcblk0p1
179 2 512 mmcblk0p2
179 3 512 mmcblk0p3
179 4 2048 mmcblk0p4
179 5 2048 mmcblk0p5
179 6 512 mmcblk0p6
179 7 24576 mmcblk0p7
179 8 512 mmcblk0p8
179 9 1 mmcblk0p9
179 10 3072 mmcblk0p10
179 11 3072 mmcblk0p11
179 12 780 mmcblk0p12
179 13 780 mmcblk0p13
179 14 780 mmcblk0p14
179 15 8192 mmcblk0p15
179 16 8192 mmcblk0p16
179 17 8 mmcblk0p17
179 18 16384 mmcblk0p18
179 19 16384 mmcblk0p19
179 20 8192 mmcblk0p20
179 21 512 mmcblk0p21
179 22 512 mmcblk0p22
179 23 2195456 mmcblk0p23
179 24 1392640 mmcblk0p24
179 25 8192 mmcblk0p25
179 26 262144 mmcblk0p26
179 27 24576 mmcblk0p27
179 28 3072 mmcblk0p28
179 29 8 mmcblk0p29
179 30 32768 mmcblk0p30
179 31 512 mmcblk0p31
259 0 512 mmcblk0p32
259 1 8 mmcblk0p33
259 2 16384 mmcblk0p34
259 3 11247616 mmcblk0p35
259 4 4079 mmcblk0p36
254 0 5229 dm-0
254 1 22900 dm-1
lrwxrwxrwx root root 1970-01-13 12:13 DDR -> /dev/block/mmcblk0p29
lrwxrwxrwx root root 1970-01-13 12:13 aboot -> /dev/block/mmcblk0p5
lrwxrwxrwx root root 1970-01-13 12:13 bnr -> /dev/block/mmcblk0p20
lrwxrwxrwx root root 1970-01-13 12:13 boot -> /dev/block/mmcblk0p7
lrwxrwxrwx root root 1970-01-13 12:13 cache -> /dev/block/mmcblk0p24
lrwxrwxrwx root root 1970-01-13 12:13 drm -> /dev/block/mmcblk0p15
lrwxrwxrwx root root 1970-01-13 12:13 eksst -> /dev/block/mmcblk0p22
lrwxrwxrwx root root 1970-01-13 12:13 encrypt -> /dev/block/mmcblk0p21
lrwxrwxrwx root root 1970-01-13 12:13 factory -> /dev/block/mmcblk0p19
lrwxrwxrwx root root 1970-01-13 12:13 fota -> /dev/block/mmcblk0p30
lrwxrwxrwx root root 1970-01-13 12:13 fsg -> /dev/block/mmcblk0p28
lrwxrwxrwx root root 1970-01-13 12:13 grow -> /dev/block/mmcblk0p36
lrwxrwxrwx root root 1970-01-13 12:13 m9kefs1 -> /dev/block/mmcblk0p12
lrwxrwxrwx root root 1970-01-13 12:13 m9kefs2 -> /dev/block/mmcblk0p13
lrwxrwxrwx root root 1970-01-13 12:13 m9kefs3 -> /dev/block/mmcblk0p14
lrwxrwxrwx root root 1970-01-13 12:13 misc -> /dev/block/mmcblk0p18
lrwxrwxrwx root root 1970-01-13 12:13 modem -> /dev/block/mmcblk0p1
lrwxrwxrwx root root 1970-01-13 12:13 modemst1 -> /dev/block/mmcblk0p10
lrwxrwxrwx root root 1970-01-13 12:13 modemst2 -> /dev/block/mmcblk0p11
lrwxrwxrwx root root 1970-01-13 12:13 pad -> /dev/block/mmcblk0p9
lrwxrwxrwx root root 1970-01-13 12:13 persist -> /dev/block/mmcblk0p25
lrwxrwxrwx root root 1970-01-13 12:13 rct -> /dev/block/mmcblk0p33
lrwxrwxrwx root root 1970-01-13 12:13 recovery -> /dev/block/mmcblk0p27
lrwxrwxrwx root root 1970-01-13 12:13 reserved -> /dev/block/mmcblk0p34
lrwxrwxrwx root root 1970-01-13 12:13 rpm -> /dev/block/mmcblk0p6
lrwxrwxrwx root root 1970-01-13 12:13 rpmbak -> /dev/block/mmcblk0p32
lrwxrwxrwx root root 1970-01-13 12:13 sbl1 -> /dev/block/mmcblk0p2
lrwxrwxrwx root root 1970-01-13 12:13 sbl2 -> /dev/block/mmcblk0p3
lrwxrwxrwx root root 1970-01-13 12:13 sbl3 -> /dev/block/mmcblk0p4
lrwxrwxrwx root root 1970-01-13 12:13 sns -> /dev/block/mmcblk0p16
lrwxrwxrwx root root 1970-01-13 12:13 ssd -> /dev/block/mmcblk0p17
lrwxrwxrwx root root 1970-01-13 12:13 system -> /dev/block/mmcblk0p23
lrwxrwxrwx root root 1970-01-13 12:13 tombstones -> /dev/block/mmcblk0p26
lrwxrwxrwx root root 1970-01-13 12:13 tz -> /dev/block/mmcblk0p8
lrwxrwxrwx root root 1970-01-13 12:13 tzbak -> /dev/block/mmcblk0p31
lrwxrwxrwx root root 1970-01-13 12:13 userdata -> /dev/block/mmcblk0p35
Right now I have a lot of stuff removed from my rom but I do have a stock backup so later I will revert back and and post partition images.
As for stock recovery.img and stock boot.img, I do not have that so maybe someone else can grab that for us that didn't install TWRP yet(Didn't even think of getting it before I installed it and would be nice to have to go back to stock for warranty exchange)
Also let me know of anything else I can do to help you. Thank You
NICG said:
Right now I have a lot of stuff removed from my rom but I do have a stock backup so later I will revert back and and post partition images.
As for stock recovery.img and stock boot.img, I do not have that so maybe someone else can grab that for us that didn't install TWRP yet(Didn't even think of getting it before I installed it and would be nice to have to go back to stock for warranty exchange)
Also let me know of anything else I can do to help you. Thank You
Click to expand...
Click to collapse
Thanks for posting....
Slightly strange values...
VK810 (LTE):
Code:
BOARD_BOOTIMAGE_PARTITION_SIZE := 25165824 # 24M
BOARD_RECOVERYIMAGE_PARTITION_SIZE := 25165824 # 24M
BOARD_SYSTEMIMAGE_PARTITION_SIZE := 2248146944 # 2114M
BOARD_USERDATAIMAGE_PARTITION_SIZE := 11517558784 #10984
BOARD_FLASH_BLOCK_SIZE := 131072 # (BOARD_KERNEL_PAGESIZE * 64)
V500 (wifi):
Code:
BOARD_BOOTIMAGE_PARTITION_SIZE := 23068672 # 22M
BOARD_RECOVERYIMAGE_PARTITION_SIZE := 23068672 # 22M
BOARD_SYSTEMIMAGE_PARTITION_SIZE := 880803840 # 840M
BOARD_USERDATAIMAGE_PARTITION_SIZE := 6189744128 # 5.9G
BOARD_FLASH_BLOCK_SIZE := 131072 # (BOARD_KERNEL_PAGESIZE * 64)
can you post the output of the below command? Want to verify the BOARD_FLASH_BLOCK_SIZE settings
cat /proc/mtd
EDIT1:
Who wants to be a guinea pig for my first cm-11.0 build? (requires you to have TWRP recovery)
0) Post here saying that you are testing the ROM. If someone else posted, then wait and see what happens
1) Perform a backup in TWRP recovery
2) Did I say to perform a backup?
3) Flash the cm-11 zip file in TWRP recovery. the boot.img is already LOKI patched
<removed>
4) Reboot
See if the device starts up properly.
If it doesn't, then go back to TWRP recovery and restore your backup
Risky? Maybe. If you are afraid, then don't flash it and wait for someone else to do it.....
I tested the download and it seems there is a device name mismatch somewhere:
installing '/extenal_sd/cm-11-20140512-UNOFFICIAL-vk810_loki.zip'
checking for MD5 file...
skipping MD5 check no MD5 file found
This package is for "vk810" devices; this is a "altev"
E: Error executing updater binary in zip
error flashing zip
failed
traccdma said:
I tested the download and it seems there is a device name mismatch somewhere:
installing '/extenal_sd/cm-11-20140512-UNOFFICIAL-vk810_loki.zip'
checking for MD5 file...
skipping MD5 check no MD5 file found
This package is for "vk810" devices; this is a "altev"
E: Error executing updater binary in zip
error flashing zip
failed
Click to expand...
Click to collapse
probably.... vk810 is the device name, altev is the model/board/product name... probably a mismatch somewhere.....
I'll recompile when I get home
(v500 = awifi = wifi only version, v510 = palman = GPE version)
paperWastage said:
probably.... vk810 is the device name, altev is the model/board/product name... probably a mismatch somewhere.....
I'll recompile when I get home
(v500 = awifi = wifi only version, v510 = palman = GPE version)
Click to expand...
Click to collapse
i think we should stick with v500/v510/vk810 convention.....
http://forum.xda-developers.com/showpost.php?p=48103469&postcount=22
from this, it looks like the recovery image needs to be fixed...
http://forum.xda-developers.com/showpost.php?p=48331517&postcount=10
for now, I've manually edited the META-INF/com/google/android/updater-script to include "altev" as part of the check
0) Post here saying that you are testing the ROM. If someone else posted, then wait and see what happens
1) Perform a backup in TWRP recovery
2) Did I say to perform a backup?
3) Flash the cm-11 zip file in TWRP recovery. the boot.img will be LOKI-patched during the flash (which means don't use my previous upload where I pre-patched the boot.img)
http://d-h.st/tAq
4) Reboot
See if the device starts up properly.
If it doesn't, then go back to TWRP recovery and restore your backup
Risky? Maybe. If you are afraid, then don't flash it and wait for someone else to do it.....
with cm-11-20140513-unofficial-vk810.zip:
set_metadata_recursive: some changes failed
E: error executing updater binary in zip
error flashing zip
updating partition details...
tried booting it anyway and it brings up LG logo once, powers off/back on, and boots up to recovery (TWRP) on its own
traccdma said:
with cm-11-20140513-unofficial-vk810.zip:
set_metadata_recursive: some changes failed
E: error executing updater binary in zip
error flashing zip
updating partition details...
tried booting it anyway and it brings up LG logo once, powers off/back on, and boots up to recovery (TWRP) on its own
Click to expand...
Click to collapse
http://www.xda-developers.com/android/how-to-fix-a-broken-rom-flash-in-certain-kitkat-roms/
hmm, not sure why TWRP is complaining. need to investigate tomorrow. if the update_script failed, then the boot.img wasn't patched, so the new boot image won't boot at all.
were you able to restore from nandroid backup?
you also try replacing the update-binary in the ROM with this
http://forum.xda-developers.com/showthread.php?t=2532300
that got much further and even booted into CyanogenMod 11 with the VZW Gpad V810!!
After unzipping your file, overwriting the update-binary file in meta-inf\com\google\android with the file from the thread you posted, it said successful. Rebooted once while it said Android is updating app xxx of xxx, then Welcome to CyanogenMod
Seems to be missing drivers though. First boot seemed stable except it didn't recognize Verizon mobile data (or SIM card). I was in there at least 10 minutes. In settings, I used the slider to try and turn on wifi, but it never turned blue and a few seconds later it reverted back off. I slid bluetooth on, and it did the same thing and went into a boot loop. It gets to the android desktop for about 5 seconds then reboots. I wiped cache and dalvik cache and it got no further.
traccdma said:
with cm-11-20140513-unofficial-vk810.zip:
set_metadata_recursive: some changes failed
E: error executing updater binary in zip
error flashing zip
updating partition details...
tried booting it anyway and it brings up LG logo once, powers off/back on, and boots up to recovery (TWRP) on its own
Click to expand...
Click to collapse
whenever that happens get a recovery log, They are very helpful
traccdma said:
that got much further and even booted into CyanogenMod 11 with the VZW Gpad V810!!
After unzipping your file, overwriting the update-binary file in meta-inf\com\google\android with the file from the thread you posted, it said successful. Rebooted once while it said Android is updating app xxx of xxx, then Welcome to CyanogenMod
Seems to be missing drivers though. First boot seemed stable except it didn't recognize Verizon mobile data (or SIM card). I was in there at least 10 minutes. In settings, I used the slider to try and turn on wifi, but it never turned blue and a few seconds later it reverted back off. I slid bluetooth on, and it did the same thing and went into a boot loop. It gets to the android desktop for about 5 seconds then reboots. I wiped cache and dalvik cache and it got no further.
Click to expand...
Click to collapse
good to hear...
need two things:
system dump of stock ROM.
The proprietary libs I'm using right now is from v500 which probably doesn't have the radio libs. maybe wifi/bt driver is different too
logs
As Drgravy said, logs are helpful. Recovery log, /proc/last_kmsg from kernel boot, ...
Sorry been a little busy but here you go.
Stock Rooted System IMG
https://www.dropbox.com/s/rpxmbp1lgb5a4k9/system.img

Wifi don't work? Flash this! /Persist Repair

Well, many people have problems on the /persist partition, maybe because some bad rom, or maybe because by a mistake you formatted them on a recovery (a bad recovery without forbid partitions).
Before this zip, you have to copy the "WCNSS_qcom_wlan_factory_nv.bin" to /persist manually, but some file managers don't mount well /persist.
But now, only flashing this zip, it will copy the file to /persist and Wifi go back to work.
:highfive:
Download from:
MEDIAFIRE!
MEGA!
Boss442 said:
Well, many people have problems on the /persist partition, maybe because some bad rom, or maybe because by a mistake you formatted them on a recovery (a bad recovery without forbid partitions).
Before this zip, you have to copy the "WCNSS_qcom_wlan_factory_nv.bin" to /persist manually, but some file managers don't mount well /persist.
But now, only flashing this zip, it will copy the file to /persist and Wifi go back to work.
:highfive:
Download from:
MEDIAFIRE!
MEGA!
Click to expand...
Click to collapse
Bro how to flash it ?
I flashed with twrp v3.0
it gave an error at the end. unable to mount something.
wifi is not working on my mot g2013. I have tried 5-6 roms.
Pls help
does it work?
No it dint.
Twrp gave error. Also the file whicg have to copy in that persist folder gets deleted automatically.
This works
OK, this works but not exactly by flashing.
First of all, this file is a WLAN Qualcom driver which is somehow missing after flashing errors.
Step by step:
1. Enable root for ADB in developer settings in your phone
2. Connect your phone with USB
3.
Code:
adb root
4. Now adb will reconnect as root. Enter command above again to make sure it's done (you will receive confirmation)
5. /persist is not accessible by default (read-only) so we must mount it as writable partition
6.
Code:
adb shell
7.
Code:
mount -o rw,remount /persist
8.
Code:
exit
- we are exiting shell now
9.
Code:
adb push WCNSS_qcom_wlan_factory_nv.bin /persist/
- we are copying driver to phone
10. OK, drivers are now saved on our phone. Let's remount /persist again to be read only:
11.
Code:
adb shell
12.
Code:
mount -o ro,remount /persist
13.
Code:
exit
14. Reboot your phone
If you have unsufficient permissions or something, try
Code:
chmod 777 /persist
after point 7 and
Code:
chmod 771 /persist
after point 11
Tell me if it works, was ok for me.
zyzioziom said:
OK, this works but not exactly by flashing.
First of all, this file is a WLAN Qualcom driver which is somehow missing after flashing errors.
Step by step:
1. Enable root for ADB in developer settings in your phone
2. Connect your phone with USB
3.
Code:
adb root
4. Now adb will reconnect as root. Enter command above again to make sure it's done (you will receive confirmation)
5. /persist is not accessible by default (read-only) so we must mount it as writable partition
6.
Code:
adb shell
7.
Code:
mount -o rw,remount /persist
8.
Code:
exit
- we are exiting shell now
9.
Code:
adb push WCNSS_qcom_wlan_factory_nv.bin /persist/
- we are copying driver to phone
10. OK, drivers are now saved on our phone. Let's remount /persist again to be read only:
11.
Code:
adb shell
12.
Code:
mount -o ro,remount /persist
13.
Code:
exit
14. Reboot your phone
If you have unsufficient permissions or something, try
Code:
chmod 777 /persist
after point 7 and
Code:
chmod 771 /persist
after point 11
Tell me if it works, was ok for me.
Click to expand...
Click to collapse
Zyzoom Hello, first of all sorry for my poor English, I have a XT1032 with the same problem, after installing TWRP recovery and CM13 Nightly 3.0.0, and was unable to enable Wi-Fi.
I followed your steps, but in step 9 out "Read-only file system", so I resume the steps from 6 (adb shell), then "mount -o rw, remount / persist" I write "chmod 777 / persist" but I back out the error " Read-only file system. "
Would you help me please?
norte112 said:
Zyzoom Hello, first of all sorry for my poor English, I have a XT1032 with the same problem, after installing TWRP recovery and CM13 Nightly 3.0.0, and was unable to enable Wi-Fi.
I followed your steps, but in step 9 out "Read-only file system", so I resume the steps from 6 (adb shell), then "mount -o rw, remount / persist" I write "chmod 777 / persist" but I back out the error " Read-only file system. "
Would you help me please?
Click to expand...
Click to collapse
norte112, you need to write commands exactly like I wrote. Do not put space between "/" and "persist" and between "rw," and "remount".
The best is to copy them directly to terminal, I think it's CTRL+INSERT or SHIFT+INSERT on Windows
zyzioziom said:
norte112, you need to write commands exactly like I wrote. Do not put space between "/" and "persist" and between "rw," and "remount".
The best is to copy them directly to terminal, I think it's CTRL+INSERT or SHIFT+INSERT on Windows
Click to expand...
Click to collapse
The commands were copied and pasted as contained in the post directly to cmd, for an error when writing this query, add spaces, but just confirm again (no spaces) and still gives the same error message.
norte112 said:
The commands were copied and pasted as contained in the post directly to cmd, for an error when writing this query, add spaces, but just confirm again (no spaces) and still gives the same error message.
Click to expand...
Click to collapse
Code:
adb shell
ls -al
And paste the results here
Also, try whole process again but after each "adb shell" add another command: "su"
zyzioziom said:
Code:
adb shell
ls -al
And paste the results here
Also, try whole process again but after each "adb shell" add another command: "su"
Click to expand...
Click to collapse
Deputy results:
D:\xt1032\ABD-fastboot>adb shell
←7←[r←[999;999H←[6nls -al
←[email protected]:/ $
I also tried adding SU command after SHELL, but after giving intro but does not allow me to enter any other line or command (attached results):
D:\xt1032\ABD-fastboot>adb root
adbd is already running as root
D:\xt1032\ABD-fastboot>adb shell su
[email protected]:/ #
norte112 said:
Deputy results:
D:\xt1032\ABD-fastboot>adb shell
←7←[r←[999;999H←[6nls -al
←[email protected]:/ $
I also tried adding SU command after SHELL, but after giving intro but does not allow me to enter any other line or command (attached results):
D:\xt1032\ABD-fastboot>adb root
adbd is already running as root
D:\xt1032\ABD-fastboot>adb shell su
[email protected]:/ #
Click to expand...
Click to collapse
You have strange results here :/
Here is my console:
Code:
Patryks-MacBook-Air:platform-tools patryk$ ./adb devices
List of devices attached
TA9290KDJ1 device
Patryks-MacBook-Air:platform-tools patryk$ ./adb root
adbd is already running as root
Patryks-MacBook-Air:platform-tools patryk$ ./adb shell
[email protected]:/ # ls -al
total 2382
drwxr-xr-x 19 root root 0 1970-06-28 19:00 .
drwxr-xr-x 19 root root 0 1970-06-28 19:00 ..
drwxr-xr-x 44 root root 0 1970-06-28 19:00 acct
drwxrwx--- 6 system cache 4096 2016-03-05 03:28 cache
lrwxrwxrwx 1 root root 13 1970-01-01 01:00 charger -> /sbin/healthd
dr-x------ 2 root root 0 1970-06-28 19:00 config
lrwxrwxrwx 1 root root 17 1970-06-28 19:00 d -> /sys/kernel/debug
drwxrwx--x 35 system system 4096 2016-03-09 18:37 data
-rw-r--r-- 1 root root 555 1970-01-01 01:00 default.prop
drwxr-xr-x 15 root root 15300 1970-06-28 19:00 dev
lrwxrwxrwx 1 root root 11 1970-06-28 19:00 etc -> /system/etc
-rw-r--r-- 1 root root 53465 1970-01-01 01:00 file_contexts
drwxr-xr-x 4 root root 4096 1970-01-01 01:00 firmware
drwxr-xr-x 3 root root 1024 1970-01-01 01:00 fsg
-rw-r----- 1 root root 2468 1970-01-01 01:00 fstab.qcom
-rwxr-x--- 1 root root 639808 1970-01-01 01:00 init
-rwxr-x--- 1 root root 8581 1970-01-01 01:00 init.cm.rc
-rwxr-x--- 1 root root 983 1970-01-01 01:00 init.environ.rc
-rwxr-x--- 1 root root 3816 1970-01-01 01:00 init.mmi.boot.sh
-rwxr-x--- 1 root root 4562 1970-01-01 01:00 init.mmi.touch.sh
-rwxr-x--- 1 root root 29483 1970-01-01 01:00 init.qcom.rc
-rwxr-x--- 1 root root 4561 1970-01-01 01:00 init.qcom.ssr.sh
-rwxr-x--- 1 root root 11797 1970-01-01 01:00 init.qcom.usb.rc
-rwxr-x--- 1 root root 26983 1970-01-01 01:00 init.rc
-rwxr-x--- 1 root root 1399 1970-01-01 01:00 init.recovery.qcom.rc
-rwxr-x--- 1 root root 319 1970-01-01 01:00 init.superuser.rc
-rwxr-x--- 1 root root 2764 1970-01-01 01:00 init.target.rc
-rwxr-x--- 1 root root 1921 1970-01-01 01:00 init.trace.rc
-rwxr-x--- 1 root root 9283 1970-01-01 01:00 init.usb.configfs.rc
-rwxr-x--- 1 root root 5339 1970-01-01 01:00 init.usb.rc
-rwxr-x--- 1 root root 342 1970-01-01 01:00 init.zygote32.rc
drwxr-xr-x 9 root system 200 1970-06-28 19:00 mnt
drwxr-xr-x 2 root root 0 1970-01-01 01:00 oem
drwxr-xr-x 12 root root 1024 1970-01-01 01:01 pds
drwxrwx--x 4 system system 4096 2016-03-09 12:01 persist
dr-xr-xr-x 220 root root 0 1970-01-01 01:00 proc
-rw-r--r-- 1 root root 6049 1970-01-01 01:00 property_contexts
drwx------ 2 root root 0 2016-03-05 03:29 root
drwxr-x--- 2 root root 0 1970-01-01 01:00 sbin
lrwxrwxrwx 1 root root 21 1970-06-28 19:00 sdcard -> /storage/self/primary
-rw-r--r-- 1 root root 2182 1970-01-01 01:00 seapp_contexts
-rw-r--r-- 1 root root 69 1970-01-01 01:00 selinux_version
-rw-r--r-- 1 root root 258562 1970-01-01 01:00 sepolicy
-rw-r--r-- 1 root root 14812 1970-01-01 01:00 service_contexts
drwxr-xr-x 4 root root 80 2016-03-09 11:57 storage
dr-xr-xr-x 14 root root 0 1970-06-28 19:00 sys
drwxr-xr-x 16 root root 4096 2016-03-08 21:09 system
lrwxrwxrwx 1 root root 16 1970-06-28 19:00 tombstones -> /data/tombstones
-rw-r--r-- 1 root root 12478 1970-01-01 01:00 ueventd.qcom.rc
-rw-r--r-- 1 root root 7606 1970-01-01 01:00 ueventd.rc
lrwxrwxrwx 1 root root 14 1970-06-28 19:00 vendor -> /system/vendor
Your "ls -al" displayed nothing, am I right?
zyzioziom said:
You have strange results here :/
Here is my console:
Code:
Patryks-MacBook-Air:platform-tools patryk$ ./adb devices
List of devices attached
TA9290KDJ1 device
Patryks-MacBook-Air:platform-tools patryk$ ./adb root
adbd is already running as root
Patryks-MacBook-Air:platform-tools patryk$ ./adb shell
[email protected]:/ # ls -al
total 2382
drwxr-xr-x 19 root root 0 1970-06-28 19:00 .
drwxr-xr-x 19 root root 0 1970-06-28 19:00 ..
drwxr-xr-x 44 root root 0 1970-06-28 19:00 acct
drwxrwx--- 6 system cache 4096 2016-03-05 03:28 cache
lrwxrwxrwx 1 root root 13 1970-01-01 01:00 charger -> /sbin/healthd
dr-x------ 2 root root 0 1970-06-28 19:00 config
lrwxrwxrwx 1 root root 17 1970-06-28 19:00 d -> /sys/kernel/debug
drwxrwx--x 35 system system 4096 2016-03-09 18:37 data
-rw-r--r-- 1 root root 555 1970-01-01 01:00 default.prop
drwxr-xr-x 15 root root 15300 1970-06-28 19:00 dev
lrwxrwxrwx 1 root root 11 1970-06-28 19:00 etc -> /system/etc
-rw-r--r-- 1 root root 53465 1970-01-01 01:00 file_contexts
drwxr-xr-x 4 root root 4096 1970-01-01 01:00 firmware
drwxr-xr-x 3 root root 1024 1970-01-01 01:00 fsg
-rw-r----- 1 root root 2468 1970-01-01 01:00 fstab.qcom
-rwxr-x--- 1 root root 639808 1970-01-01 01:00 init
-rwxr-x--- 1 root root 8581 1970-01-01 01:00 init.cm.rc
-rwxr-x--- 1 root root 983 1970-01-01 01:00 init.environ.rc
-rwxr-x--- 1 root root 3816 1970-01-01 01:00 init.mmi.boot.sh
-rwxr-x--- 1 root root 4562 1970-01-01 01:00 init.mmi.touch.sh
-rwxr-x--- 1 root root 29483 1970-01-01 01:00 init.qcom.rc
-rwxr-x--- 1 root root 4561 1970-01-01 01:00 init.qcom.ssr.sh
-rwxr-x--- 1 root root 11797 1970-01-01 01:00 init.qcom.usb.rc
-rwxr-x--- 1 root root 26983 1970-01-01 01:00 init.rc
-rwxr-x--- 1 root root 1399 1970-01-01 01:00 init.recovery.qcom.rc
-rwxr-x--- 1 root root 319 1970-01-01 01:00 init.superuser.rc
-rwxr-x--- 1 root root 2764 1970-01-01 01:00 init.target.rc
-rwxr-x--- 1 root root 1921 1970-01-01 01:00 init.trace.rc
-rwxr-x--- 1 root root 9283 1970-01-01 01:00 init.usb.configfs.rc
-rwxr-x--- 1 root root 5339 1970-01-01 01:00 init.usb.rc
-rwxr-x--- 1 root root 342 1970-01-01 01:00 init.zygote32.rc
drwxr-xr-x 9 root system 200 1970-06-28 19:00 mnt
drwxr-xr-x 2 root root 0 1970-01-01 01:00 oem
drwxr-xr-x 12 root root 1024 1970-01-01 01:01 pds
drwxrwx--x 4 system system 4096 2016-03-09 12:01 persist
dr-xr-xr-x 220 root root 0 1970-01-01 01:00 proc
-rw-r--r-- 1 root root 6049 1970-01-01 01:00 property_contexts
drwx------ 2 root root 0 2016-03-05 03:29 root
drwxr-x--- 2 root root 0 1970-01-01 01:00 sbin
lrwxrwxrwx 1 root root 21 1970-06-28 19:00 sdcard -> /storage/self/primary
-rw-r--r-- 1 root root 2182 1970-01-01 01:00 seapp_contexts
-rw-r--r-- 1 root root 69 1970-01-01 01:00 selinux_version
-rw-r--r-- 1 root root 258562 1970-01-01 01:00 sepolicy
-rw-r--r-- 1 root root 14812 1970-01-01 01:00 service_contexts
drwxr-xr-x 4 root root 80 2016-03-09 11:57 storage
dr-xr-xr-x 14 root root 0 1970-06-28 19:00 sys
drwxr-xr-x 16 root root 4096 2016-03-08 21:09 system
lrwxrwxrwx 1 root root 16 1970-06-28 19:00 tombstones -> /data/tombstones
-rw-r--r-- 1 root root 12478 1970-01-01 01:00 ueventd.qcom.rc
-rw-r--r-- 1 root root 7606 1970-01-01 01:00 ueventd.rc
lrwxrwxrwx 1 root root 14 1970-06-28 19:00 vendor -> /system/vendor
Your "ls -al" displayed nothing, am I right?
Click to expand...
Click to collapse
I found the problem, after writing the adb shell command, the console brings me the following result: ← 7 ← [r ← [999; ← 999H [6n
I just click on INTRO and I recently enabled the line: ← 8root @ falcon: / #
After that, I entered the commands and could properly install the drivers !!!
Problem solved.
Thank you very much for the support, help and above all, patience.
Boss442 said:
Well, many people have problems on the /persist partition, maybe because some bad rom, or maybe because by a mistake you formatted them on a recovery (a bad recovery without forbid partitions).
Before this zip, you have to copy the "WCNSS_qcom_wlan_factory_nv.bin" to /persist manually, but some file managers don't mount well /persist.
But now, only flashing this zip, it will copy the file to /persist and Wifi go back to work.
:highfive:
Download from:
MEDIAFIRE!
MEGA!
Click to expand...
Click to collapse
Worked perfect with flashify and twrp (copy first to a safe location)
Many thanks!
Didn't work for me
I tried flashing the zip, copying manually in CM file explorer and twrp and adb.
The driver is present in /persist but my Mac is stil 02:00:00:00:00
edit:
it's working after doing this:
http://forum.xda-developers.com/showpost.php?p=64771901&postcount=6
My wifi bug is kinda weird.
When I turn on and off my wifi 2-3times,the wifi I connected previously disappear.
Solution is to wipe everything including internal storage to have it working.But still I don't know what's the problem...
I had trouble installing the file no matter how it I flash the wifi did not return to work until I found a solution that apparently functioned normally every time I performed the procedure.
1. Make a full wipe on your smartphone (System / data / cache / dalvik and internal storage) I did the procedure using TWRP 3.0.2-0 on my bike G XT1033
2. Then copy the file persist_repair.zip and some version of CM13 I used (cm 13.0-20160708-NIGHTLY-falcon)
3. After placing the files in the memory of the first flash persist_repair.zip phone and then the CM13 (You can do using the option to install multiple zips the TWRP also the right)
4. Restart your phone and its wifi should resume functioning
Note: I performed the procedure 4 times here and it worked perfectly.
Sorry for the English I used the google translator
NoobByn-tek said:
I had trouble installing the file no matter how it I flash the wifi did not return to work until I found a solution that apparently functioned normally every time I performed the procedure.
1. Make a full wipe on your smartphone (System / data / cache / dalvik and internal storage) I did the procedure using TWRP 3.0.2-0 on my bike G XT1033
2. Then copy the file persist_repair.zip and some version of CM13 I used (cm 13.0-20160708-NIGHTLY-falcon)
3. After placing the files in the memory of the first flash persist_repair.zip phone and then the CM13 (You can do using the option to install multiple zips the TWRP also the right)
4. Restart your phone and its wifi should resume functioning
Note: I performed the procedure 4 times here and it worked perfectly.
Sorry for the English I used the google translator
Click to expand...
Click to collapse
I faced same problem after flashed custom rom; searching high and low, tried many method, and finally, bumped this thread, and specifically NoobByn-tek post. I followed exactly what your have done (but with different version CM13 [cm-13.0-20160820-SNAPSHOT-ZNH5YAO0J1-falcon] because could not find the version you used), and multiple flashed with TWRP 3.0.2. With only one attempt, wifi connection is back.:victory:
Big thank you all.:good::good:
NoobByn-tek said:
I had trouble installing the file no matter how it I flash the wifi did not return to work until I found a solution that apparently functioned normally every time I performed the procedure.
1. Make a full wipe on your smartphone (System / data / cache / dalvik and internal storage) I did the procedure using TWRP 3.0.2-0 on my bike G XT1033
2. Then copy the file persist_repair.zip and some version of CM13 I used (cm 13.0-20160708-NIGHTLY-falcon)
3. After placing the files in the memory of the first flash persist_repair.zip phone and then the CM13 (You can do using the option to install multiple zips the TWRP also the right)
4. Restart your phone and its wifi should resume functioning
Note: I performed the procedure 4 times here and it worked perfectly.
Sorry for the English I used the google translator
Click to expand...
Click to collapse
tried this still no luck...:crying::crying:
Boss442 said:
Well, many people have problems on the /persist partition, maybe because some bad rom, or maybe because by a mistake you formatted them on a recovery (a bad recovery without forbid partitions).
Before this zip, you have to copy the "WCNSS_qcom_wlan_factory_nv.bin" to /persist manually, but some file managers don't mount well /persist.
But now, only flashing this zip, it will copy the file to /persist and Wifi go back to work.
:highfive:
Download from:
MEDIAFIRE!
MEGA!
Click to expand...
Click to collapse
Holy cow!!! After 2 weeks of trying everything under the sun this actually worked!!! I really really appreciate you posting this. Thank you so much!!!
My mac address was 00:00:00:00:02 or whatever it was and nothing would work. I simply flashed this and was back up and running. THANK YOU!
update link please

Lenovo Tab 4 8 Plus (aka TB-8704F/X)

It's been released in Europe for quite some time and from what I'm hearing it's about to hit the American market as well. Doen't seem to get any love yet on XDA.
Lovely little thing, from my three days with it. S625/64GB/4GB RAM/SD Slot/LTE. Comes with Android 7.1.1 stock.
Looks likes something that could finally replace the N7 2013, provided the community picks it up. I'm honestly surprised there's been little to no chatter about it whatsoever.
Did anyone manage to compile TWRP for it yet or root it otherwise?
wonderfulme said:
It's been released in Europe for quite some time and from what I'm hearing it's about to hit the American market as well. Doen't seem to get any love yet on XDA.
Lovely little thing, from my three days with it. S625/64GB/4GB RAM/SD Slot/LTE. Comes with Android 7.1.1 stock.
Looks likes something that could finally replace the N7 2013, provided the community picks it up. I'm honestly surprised there's been little to no chatter about it whatsoever.
Did anyone manage to compile TWRP for it yet or root it otherwise?
Click to expand...
Click to collapse
I don't own the device so I cannot help you there. But what you can check is if the device can be bootloader unlocked in developer settings. That's a requirement for TWRP and also what you need is a kernel/boot image to build TRWP. Since there don't seem to be factory images available for this yet it will be difficult to retrieve a boot image from the device. Also Lenovo hasn't released any source code for this yet even though they are obliged to do so. Shame on them! I suggest you complain in the Lenovo forums about it. It's clearly a GPL violation.
matshias said:
I don't own the device so I cannot help you there. But what you can check is if the device can be bootloader unlocked in developer settings. That's a requirement for TWRP and also what you need is a kernel/boot image to build TRWP. Since there don't seem to be factory images available for this yet it will be difficult to retrieve a boot image from the device. Also Lenovo hasn't released any source code for this yet even though they are obliged to do so. Shame on them! I suggest you complain in the Lenovo forums about it. It's clearly a GPL violation.
Click to expand...
Click to collapse
Thanks, I actualy did just that - asked about the kernel source on their official forum. Don't expect any major breakthroughts though (see https://forum.xda-developers.com/showthread.php?t=1555099, for instance).
As for whether the bootloader is locked or not, I have honestly no idea. Neither the "long phone number" method nor the "fastboot oem device-info" works. I have Android SDK installed and it works just fine when I plug in my N7 2003. The USB debugging is enabled and allowed for my desktop. Still, zero results. The Lenovo one doesn't even show up when running "fastboot devices".
Yet the "Lenovo Moto Smart Assistant" whatever it's supposed to do identifies the tablet when connected with USB just fine.
So I guess it's a safe bet to say that we're a long way from rooting this one. Or, more likely, I'm doing something wrong. Never had adb/fastboot issues with N7 though.
I'll just sit and wait till it hits the US market and generates some deserved interest because on the surface it's not a bad tablet at all. The battery life, the screen, the price/performance ratio, the SD slot and LTE capability all make that for a good web browser/book reader. It's not that bad looking either. Although I have yet to find a proper case unless resorting to Alibaba or something. It's even got a half-decent camera.
Overall, it's totally worth the $300 or whatever you end up paying. Comes with next to no bloatware, doesn't overheat. Even has that Dolby thing and a fingerprint scanner for some reason. Only wish it could be rooted and ran LineageOS or something.
wonderfulme said:
Thanks, I actualy did just that - asked about the kernel source on their official forum. Don't expect any major breakthroughts though (see https://forum.xda-developers.com/showthread.php?t=1555099, for instance).
As for whether the bootloader is locked or not, I have honestly no idea. Neither the "long phone number" method nor the "fastboot oem device-info" works. I have Android SDK installed and it works just fine when I plug in my N7 2003. The USB debugging is enabled and allowed for my desktop. Still, zero results. The Lenovo one doesn't even show up when running "fastboot devices".
Yet the "Lenovo Moto Smart Assistant" whatever it's supposed to do identifies the tablet when connected with USB just fine.
So I guess it's a safe bet to say that we're a long way from rooting this one. Or, more likely, I'm doing something wrong. Never had adb/fastboot issues with N7 though.
I'll just sit and wait till it hits the US market and generates some deserved interest because on the surface it's not a bad tablet at all. The battery life, the screen, the price/performance ratio, the SD slot and LTE capability all make that for a good web browser/book reader. It's not that bad looking either. Although I have yet to find a proper case unless resorting to Alibaba or something. It's even got a half-decent camera.
Overall, it's totally worth the $300 or whatever you end up paying. Comes with next to no bloatware, doesn't overheat. Even has that Dolby thing and a fingerprint scanner for some reason. Only wish it could be rooted and ran LineageOS or something.
Click to expand...
Click to collapse
Are you sure you are in fastboot mode? Can you try adb reboot bootloader and then connect with fastboot again?
Also you should check that in developer settings you have an option OEM unlock.
Well you don't need the kernel source for TWRP. What you need is the following:
* kernel image somehow extracted
* partition layout. If cat /proc/partitions works via adb then this is sufficient.
* extracted /system/build.prop and output of mount command
This should be enough to get it booting. Decrypting the data partition is another step, but for root it's not needed.
Extracting the kernel image is the hard part as long as there is no factory image available. But first check if the tablet can be unlocked otherwise it's not worth the effort.
matshias said:
Are you sure you are in fastboot mode? Can you try adb reboot bootloader and then connect with fastboot again?
Also you should check that in developer settings you have an option OEM unlock.
Well you don't need the kernel source for TWRP. What you need is the following:
* kernel image somehow extracted
* partition layout. If cat /proc/partitions works via adb then this is sufficient.
* extracted /system/build.prop and output of mount command
This should be enough to get it booting. Decrypting the data partition is another step, but for root it's not needed.
Extracting the kernel image is the hard part as long as there is no factory image available. But first check if the tablet can be unlocked otherwise it's not worth the effort.
Click to expand...
Click to collapse
There was indeed an option for "OEM unlock" in dev settings which I somehow missed. Works as intended now.
So here's the output of fastboot:
Code:
F:\AndroidSDK\platform-tools>fastboot oem device-info
...
(bootloader) Device tampered: false
(bootloader) Device unlocked: false
(bootloader) Device critical unlocked: false
(bootloader) Charger screen enabled: false
(bootloader) Display panel:
OKAY [ 0.054s]
finished. total time: 0.054s
Guess we're out of luck here?
I also did an "adb shell" and /proc/partitions as well as /system/build.prop are readable, "mount" works, however I have no idea where the kernel is stored. There's a "/firmware" dir but it's unaccessible, I'm thinking maybe that's where:
Code:
2|TB-8704X:/ $ uname -a
Linux localhost 3.18.31-perf-g40dd5c6-dirty #1 SMP PREEMPT Fri Jul 7 02:02:41 CST 2017 aarch64
TB-8704X:/ $ id
uid=2000(shell) gid=2000(shell) groups=2000(shell),1004(input),1007(log),1011(adb),1015(sdcard_rw),1028(sdcard_r),3001(net_bt_admin),3002(net_bt),3003(inet),3006(net_bw_stats),3009(readproc) context=u:r:shell:s0
TB-8704X:/ $ ls -ld firmware
dr-xr-x--- 4 system system 16384 1970-01-01 03:00 firmware
TB-8704X:/ $ cd firmware
/system/bin/sh: cd: /firmware: Permission denied
Also, FWIW, here's a list of files/dirs in / in case I missed something of note. I'm not really comfortable with Android internals.
Code:
130|TB-8704X:/ $ ls -l
total 4232
dr-xr-xr-x 61 root root 0 1970-03-08 03:34 acct
drwxr-xr-x 2 root root 40 1970-01-01 03:00 bt_firmware
drwxrwx--- 7 system cache 4096 2017-08-10 16:42 cache
lrwxrwxrwx 1 root root 13 1970-01-01 03:00 charger -> /sbin/healthd
drwxr-xr-x 2 root root 0 1970-03-08 03:34 config
lrwxrwxrwx 1 root root 17 1970-01-01 03:00 d -> /sys/kernel/debug
drwxrwx--x 43 system system 4096 1970-03-08 03:34 data
-rw-r--r-- 1 root root 995 1970-01-01 03:00 default.prop
drwxr-xr-x 15 root root 3500 1970-03-08 03:34 dev
drwxr-xr-x 3 root root 4096 1970-01-01 03:00 dsp
lrwxrwxrwx 1 root root 11 1970-01-01 03:00 etc -> /system/etc
-rw-r--r-- 1 root root 186677 1970-01-01 03:00 file_contexts.bin
dr-xr-x--- 4 system system 16384 1970-01-01 03:00 firmware
-rw-r----- 1 root root 1578 1970-01-01 03:00 fstab.qcom
-rwxr-x--- 1 root root 1246704 1970-01-01 03:00 init
-rwxr-x--- 1 root root 1846 1970-01-01 03:00 init.carrier.rc
-rwxr-x--- 1 root root 3295 1970-01-01 03:00 init.class_main.sh
-rwxr-x--- 1 root root 1156 1970-01-01 03:00 init.environ.rc
-rwxr-x--- 1 root root 1730 1970-01-01 03:00 init.mdm.sh
-rwxr-x--- 1 root root 29161 1970-01-01 03:00 init.msm.usb.configfs.rc
-rwxr-x--- 1 root root 7054 1970-01-01 03:00 init.qcom.class_core.sh
-rwxr-x--- 1 root root 12035 1970-01-01 03:00 init.qcom.early_boot.sh
-rwxr-x--- 1 root root 3775 1970-01-01 03:00 init.qcom.factory.rc
-rwxr-x--- 1 root root 37960 1970-01-01 03:00 init.qcom.rc
-rwxr-x--- 1 root root 2029 1970-01-01 03:00 init.qcom.sensors.sh
-rwxr-x--- 1 root root 12173 1970-01-01 03:00 init.qcom.sh
-rwxr-x--- 1 root root 2962 1970-01-01 03:00 init.qcom.syspart_fixup.sh
-rwxr-x--- 1 root root 97623 1970-01-01 03:00 init.qcom.usb.rc
-rwxr-x--- 1 root root 10950 1970-01-01 03:00 init.qcom.usb.sh
-rwxr-x--- 1 root root 26676 1970-01-01 03:00 init.rc
-rwxr-x--- 1 root root 9584 1970-01-01 03:00 init.target.rc
-rwxr-x--- 1 root root 12058 1970-01-01 03:00 init.usb.configfs.rc
-rwxr-x--- 1 root root 5715 1970-01-01 03:00 init.usb.rc
-rwxr-x--- 1 root root 411 1970-01-01 03:00 init.zygote32.rc
-rwxr-x--- 1 root root 684 1970-01-01 03:00 init.zygote64_32.rc
drwxr-xr-x 10 root system 220 1970-03-08 03:34 mnt
drwxr-xr-x 2 root root 40 1970-01-01 03:00 oem
drwxrwx--x 13 root system 4096 1970-01-01 03:00 persist
dr-xr-xr-x 518 root root 0 1970-01-01 03:00 proc
-rw-r--r-- 1 root root 11549 1970-01-01 03:00 property_contexts
drwxr-xr-x 3 root root 60 1970-01-01 03:00 res
drwx------ 2 root root 40 2017-07-06 21:00 root
drwxr-x--- 2 root root 160 1970-01-01 03:00 sbin
lrwxrwxrwx 1 root root 21 1970-01-01 03:00 sdcard -> /storage/self/primary
-rw-r--r-- 1 root root 1957 1970-01-01 03:00 seapp_contexts
-rw-r--r-- 1 root root 90 1970-01-01 03:00 selinux_version
-rw-r--r-- 1 root root 285602 1970-01-01 03:00 sepolicy
-rw-r--r-- 1 root root 17999 1970-01-01 03:00 service_contexts
drwxr-xr-x 4 root root 80 2017-08-12 15:57 storage
dr-xr-xr-x 16 root root 0 1970-03-08 03:34 sys
drwxr-xr-x 21 root root 4096 1970-01-01 03:00 system
lrwxrwxrwx 1 root root 16 1970-03-08 03:34 tombstones -> /data/tombstones
-rw-r--r-- 1 root root 14131 1970-01-01 03:00 ueventd.qcom.rc
-rw-r--r-- 1 root root 4857 1970-01-01 03:00 ueventd.rc
lrwxrwxrwx 1 root root 14 1970-01-01 03:00 vendor -> /system/vendor
-rw-r--r-- 1 root root 524 1970-01-01 03:00 verity_key
So are we out of options yet unless a new Linux kernel exploit eventually comes along OR Lenovo decides to release the firmware? I don't believe dirtycow would work here, considering July 2017 security updates have been applied.
That's quite sad.
Just got it and been playing with it for a couple days now. Device itself seems to be fine, but not having root is PITA.
wonderfulme said:
So are we out of options yet unless a new Linux kernel exploit eventually comes along OR Lenovo decides to release the firmware? I don't believe dirtycow would work here, considering July 2017 security updates have been applied.
Click to expand...
Click to collapse
The firmwares just showed up on the Russian Lenovo forums. So we can build TWRP if you post all the prerequisites mentioned a few posts earlier (partition layout, mount output, ...)
matshias said:
The firmwares just showed up on the Russian Lenovo forums. So we can build TWRP if you post all the prerequisites mentioned a few posts earlier (partition layout, mount output, ...)
Click to expand...
Click to collapse
Here's the output for the TB-8704X LTE version.
Mount points:
Code:
TB-8704X:/ $ mount
rootfs on / type rootfs (ro,seclabel,size=1705664k,nr_inodes=426416)
tmpfs on /dev type tmpfs (rw,seclabel,nosuid,relatime,size=1811380k,nr_inodes=452845,mode=755)
devpts on /dev/pts type devpts (rw,seclabel,relatime,mode=600)
proc on /proc type proc (rw,relatime,gid=3009,hidepid=2)
sysfs on /sys type sysfs (rw,seclabel,relatime)
selinuxfs on /sys/fs/selinux type selinuxfs (rw,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,seclabel,relatime)
none on /acct type cgroup (rw,relatime,cpuacct)
tmpfs on /mnt type tmpfs (rw,seclabel,relatime,size=1811380k,nr_inodes=452845,mode=755,gid=1000)
none on /config type configfs (rw,relatime)
none on /dev/cpuctl type cgroup (rw,relatime,cpu)
/dev/block/dm-0 on /system type ext4 (ro,seclabel,relatime,discard,data=ordered)
/dev/block/bootdevice/by-name/cache on /cache type ext4 (rw,seclabel,nosuid,nodev,relatime,data=ordered)
/dev/block/bootdevice/by-name/persist on /persist type ext4 (rw,seclabel,nosuid,nodev,relatime,data=ordered)
/dev/block/bootdevice/by-name/dsp on /dsp type ext4 (ro,seclabel,nosuid,nodev,relatime,data=ordered)
/dev/block/bootdevice/by-name/modem on /firmware type vfat (ro,context=u:object_r:firmware_file:s0,relatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
tmpfs on /storage type tmpfs (rw,seclabel,relatime,size=1811380k,nr_inodes=452845,mode=755,gid=1000)
adb on /dev/usb-ffs/adb type functionfs (rw,relatime)
/dev/block/dm-1 on /data type ext4 (rw,seclabel,nosuid,nodev,relatime,discard,noauto_da_alloc,data=ordered)
/dev/fuse on /mnt/runtime/default/emulated type fuse (rw,nosuid,nodev,noexec,noatime,user_id=1023,group_id=1023,default_permissions,allow_other)
/dev/fuse on /storage/emulated type fuse (rw,nosuid,nodev,noexec,noatime,user_id=1023,group_id=1023,default_permissions,allow_other)
/dev/fuse on /mnt/runtime/read/emulated type fuse (rw,nosuid,nodev,noexec,noatime,user_id=1023,group_id=1023,default_permissions,allow_other)
/dev/fuse on /mnt/runtime/write/emulated type fuse (rw,nosuid,nodev,noexec,noatime,user_id=1023,group_id=1023,default_permissions,allow_other)
Partitions:
Code:
TB-8704X:/etc $ df -h
Filesystem Size Used Avail Use% Mounted on
rootfs 1.6G 4.7M 1.6G 1% /
tmpfs 1.7G 652K 1.7G 1% /dev
tmpfs 1.7G 0 1.7G 0% /mnt
/dev/block/dm-0 3.6G 3.2G 336M 91% /system
/dev/block/bootdevice/by-name/cache 248M 744K 242M 1% /cache
/dev/block/bootdevice/by-name/persist 27M 512K 26M 2% /persist
/dev/block/bootdevice/by-name/dsp 12M 4.9M 6.4M 44% /dsp
/dev/block/bootdevice/by-name/modem 84M 74M 10M 88% /firmware
tmpfs 1.7G 0 1.7G 0% /storage
/dev/block/dm-1 52G 14G 38G 27% /data
/dev/fuse 52G 14G 38G 27% /storage/emulated
TB-8704X:/ $ cat /proc/partitions
major minor #blocks name
254 0 524288 zram0
179 0 61071360 mmcblk0
179 1 86016 mmcblk0p1
179 2 1 mmcblk0p2
179 3 8 mmcblk0p3
179 4 512 mmcblk0p4
179 5 512 mmcblk0p5
179 6 512 mmcblk0p6
179 7 512 mmcblk0p7
179 8 2048 mmcblk0p8
179 9 2048 mmcblk0p9
179 10 256 mmcblk0p10
179 11 256 mmcblk0p11
179 12 16384 mmcblk0p12
179 13 1536 mmcblk0p13
179 14 1536 mmcblk0p14
179 15 32 mmcblk0p15
179 16 32 mmcblk0p16
179 17 1536 mmcblk0p17
179 18 16 mmcblk0p18
179 19 15360 mmcblk0p19
179 20 1024 mmcblk0p20
179 21 1024 mmcblk0p21
179 22 65536 mmcblk0p22
179 23 65536 mmcblk0p23
179 24 1024 mmcblk0p24
179 25 3984588 mmcblk0p25
179 26 262144 mmcblk0p26
179 27 32768 mmcblk0p27
179 28 1024 mmcblk0p28
179 29 512 mmcblk0p29
179 30 32 mmcblk0p30
179 31 262144 mmcblk0p31
259 0 32 mmcblk0p32
259 1 512 mmcblk0p33
259 2 1024 mmcblk0p34
259 3 32768 mmcblk0p35
259 4 512 mmcblk0p36
259 5 4096 mmcblk0p37
259 6 128 mmcblk0p38
259 7 128 mmcblk0p39
259 8 256 mmcblk0p40
259 9 256 mmcblk0p41
259 10 256 mmcblk0p42
259 11 256 mmcblk0p43
259 12 256 mmcblk0p44
259 13 256 mmcblk0p45
259 14 256 mmcblk0p46
259 15 256 mmcblk0p47
259 16 8 mmcblk0p48
259 17 65536 mmcblk0p49
259 18 204800 mmcblk0p50
259 19 55492071 mmcblk0p51
179 32 4096 mmcblk0rpmb
253 0 3922408 dm-0
253 1 55492055 dm-1
/system/build.prop, just in case: https://pastebin.com/raw/jQn9N8nc
Kindly let me know if I missed anything.
Also, that Russian site lists the model number as TB-8704X_S000026_170707_ROW_QFIL, while my version of build.prop contains TB-8704X_S000026_170707_ROW (withot the "QFIL"). I'm not entirely up to date on Lenovo's naming conventions, but could that possibly suggest a slightly different model or should we disregard it altogether?
Edit: Nevermind, QFIL seems to be the name of the Qualcomm firmware update software.
Thanks!
I also hope that rooting or later a LineageOS will be available. I bought my one from Amazon in Germany 64GB/4GB/WiFi and it has following build number TB-8704F_S000024_170706_ROW. I came from Nexus 7 (2012).
Bought mine via Lenovo in the UK for £280 and loving it. I've been looking for a decent 8" tablet which wasn't stupidly expensive and this ticks all the boxes.
4GB /64GB + SD card
1920x1080 screen
Good audio with those front facing speakers
Decent battery life so far
Would love to be able to root and install Lineage as I use on my OPO as well, that would be perfect.
Love it so much I've ordered one for my old man as well.
wonderfulme said:
Thanks, I actualy did just that - asked about the kernel source on their official forum. Don't expect any major breakthroughts though (see https://forum.xda-developers.com/showthread.php?t=1555099, for instance).
As for whether the bootloader is locked or not, I have honestly no idea. Neither the "long phone number" method nor the "fastboot oem device-info" works. I have Android SDK installed and it works just fine when I plug in my N7 2003. The USB debugging is enabled and allowed for my desktop. Still, zero results. The Lenovo one doesn't even show up when running "fastboot devices".
Yet the "Lenovo Moto Smart Assistant" whatever it's supposed to do identifies the tablet when connected with USB just fine.
So I guess it's a safe bet to say that we're a long way from rooting this one. Or, more likely, I'm doing something wrong. Never had adb/fastboot issues with N7 though.
I'll just sit and wait till it hits the US market and generates some deserved interest because on the surface it's not a bad tablet at all. The battery life, the screen, the price/performance ratio, the SD slot and LTE capability all make that for a good web browser/book reader. It's not that bad looking either. Although I have yet to find a proper case unless resorting to Alibaba or something. It's even got a half-decent camera.
Overall, it's totally worth the $300 or whatever you end up paying. Comes with next to no bloatware, doesn't overheat. Even has that Dolby thing and a fingerprint scanner for some reason. Only wish it could be rooted and ran LineageOS or something.
Click to expand...
Click to collapse
I have the tab 4 8" and you can unlock the boooader know developer mode.
Anonwatch said:
I have the tab 4 8" and you can unlock the boooader know developer mode.
Click to expand...
Click to collapse
Already figured as much. You might want to take a look at matshias's thread at https://forum.xda-developers.com/thinkpad-tablet/general/twrp-root-tab-4-plus-tb-x704l-f-tb-t3664407
He's got TWRP working on both 8 and 10+.
Hey guys. I own Lenovo tab 3 8 plus (TB-8703F) and there are ads popping out everywhere when I open playstore or chrome etc? How to get rid of this?
Vicky khan said:
Hey guys. I own Lenovo tab 3 8 plus (TB-8703F) and there are ads popping out everywhere when I open playstore or chrome etc? How to get rid of this?
Click to expand...
Click to collapse
Wrong thread for your device - but install an ad-blocker
Many thanks for your great work. Everything has worked as described and I am super happy with this new tablet, replacing my Nexus 7.
I am surprised that there is so little activity around the Tab 4 here on XDA, but I am confident that once people understand that this is a really cool tablet and practically the only one with modern specs that comes close to the N7, there will be Custom ROMs and more. It's a beautiful piece of hardware and even without Custom ROM, the Lenovo Android is surprisingly lean and without bloatware (except for Microsoft Office).
Hi,guys!Just bought it from Amazon for $118(16GBROM)!
It's wonderful and I speak Russian, Macedonian, Bulgarian,German,a bit Serbian!
If you need help for Russian, just message me!:
Just had my memory card (128GB Samsung Pro) 'eaten' by my tablet - while on holiday with no computer access and it had my videos and music on it.
I've seen reports of this on other sites as well, and am fuming right now as this is an almighty ****-up if it's a regular occurrence, makes the tablet basically useless to me.
Edit: Took the card out of the tablet and stuck it in my Honor 9, no errors and all files work perfectly. Put it back in the Lenovo, so corrupt and won't let me do anything other than format it. Bloody Lenovo
jimmy19742 said:
Hi,guys!Just bought it from Amazon for $118(16GBROM)!
It's wonderful and I speak Russian, Macedonian, Bulgarian,German,a bit Serbian!
If you need help for Russian, just message me!:
Click to expand...
Click to collapse
Hate to say it, but sounds like you bought the Tab 4 8 and not the Tab 4 8 Plus. If it is the Plus, you got a steal!
magoo5289 said:
Hate to say it, but sounds like you bought the Tab 4 8 and not the Tab 4 8 Plus. If it is the Plus, you got a steal!
Click to expand...
Click to collapse
Yup 8504X not 8704X!
I saw this but am skeptical by nature and don't read Russian.
http://proshivkis.ru/?p=lenovo-tab-4-8-plus-wifi-lineageos-14-1

T590 boot.img clarification

Trying to get the boot image I've run into difficulties. If someone knows, I would be greatful if they point out the boot partition.
first I've found different references to pulling from the device.
They seem to pulling via linux dd command or cat
Trouble is my dev directory does not have the device they reference nor does the proc directory
Pages That ... gave me ... a little but not enough
no such directory
http://android-dls.com/wiki/index.php?title=HOWTO:_Unpack,_Edit,_and_Re-Pack_Boot_Images
not sure this really helps
https://androidforums.com/threads/where-is-my-boot-img.892350/
again...maybe just phone? still no /proc/mtd
https://forum.xda-developers.com/showthread.php?t=443994
no dump command
https://forum.xda-developers.com/showthread.php?t=2146077
maybe from the mount command... blk37 or blk38 both are vfat mounted on /firmware-modem and /firmware respectively.
no mtd and I don't want the entire rom...plus I'd rather not download a command, currently
https://www.addictivetips.com/mobil...es-boot-recovery-and-system-partition-images/
...? recovery on blk13..for this one
https://androidforums.com/threads/c...-recovery-for-the-lg-viper-4g-lgls840.566507/
Code:
gta2xlwifi:/ $ ls /dev
ls: /dev/event-log-tags: Permission denied
__properties__ coresight-stm fd i2c-2 kmsg msm_amrnb msm_multi_aac psaux ramdump_smem smd1 smem_log tzic v4l-subdev12 video0
adsprpc-smd cpu_dma_latency fscklogs i2c-3 knox_kap msm_amrnb_in msm_qcelp pta ramdump_venus smd11 snd uhid v4l-subdev13 video1
android_mbim cpuctl fsdbg i2c-4 loop-control msm_amrwb msm_qcelp_in ptmx ramdump_wcnss smd2 socket uinput v4l-subdev14 video2
android_rndis_qc cpuset full i2c-5 mdsprpc-smd msm_amrwb_in msm_rtac pts random smd21 stune uio0 v4l-subdev15 video32
apr_apps2 dbmdx-0 fuse i2c-6 mdss_rotator msm_amrwbplus msm_sps qce rfkill smd22 subsys_a506_zap uio1 v4l-subdev16 video33
ashmem dbmdx-1 graphics i2c-7 media0 msm_ape msm_thermal_query qseecom rmnet_ctrl smd3 subsys_adsp urandom v4l-subdev17 vndbinder
at_usb0 dcc_sram hbtp_input i2c-8 media1 msm_audio_cal msm_wma radio0 rmnet_ctrl1 smd36 subsys_modem usb-ffs v4l-subdev2 wcnss_ctrl
at_usb1 dek_evt hbtp_vm i2c-9 media2 msm_evrc msm_wmapro ramdump_a506_zap rmnet_ctrl2 smd4 subsys_venus usb_accessory v4l-subdev3 wcnss_wlan
avtimer dek_log hw_random icd memory_bandwidth msm_evrc_in ncm_dev ramdump_adsp rmnet_ctrl3 smd5 subsys_wcnss usb_mtp_gadget v4l-subdev4 xt_qtaguid
binder dek_req hwbinder icdr mobicore msm_g711alaw network_latency ramdump_adsp_rh rtc0 smd6 sw_sync usb_ncm v4l-subdev5 zero
block device-mapper hyst_bias icesdcc mobicore-user msm_g711alaw_in network_throughput ramdump_memshare sdp_dlp smd7 tima_uevent usf1 v4l-subdev6
ccic_misc diag i2c-0 input msm-rng msm_g711mlaw null ramdump_memshare_DIAG sdp_mm smd8 tty v4l-subdev0 v4l-subdev7
ccid_bulk dpl_ctrl i2c-1 ion msm_aac msm_g711mlaw_in pmsg0 ramdump_memshare_FTM sdsprpc-smd smd_pkt_loopback ttyGS0 v4l-subdev1 v4l-subdev8
ccid_ctrl dun i2c-10 jpeg0 msm_aac_in msm_hweffects power_on_alarm ramdump_memshare_GPS sec_misc smdcntl0 ttyHSL0 v4l-subdev10 v4l-subdev9
console ear_mic_adc i2c-11 kgsl-3d0 msm_alac msm_mp3 ppp ramdump_modem smd0 smdcntl8 tun v4l-subdev11 vga_arbiter
Code:
gta2xlwifi:/proc $ ls -d [a-z]*
asound cgroups crypto dmverity_odin_flag fs irq kpagecount meminfo mounts reset_reason self stlog_pipe sysrq-trigger tsp_cmoffset_main tty uptime vmstat
avc_msg cmdline debug driver interrupts kallsyms kpageflags meminfo_extra net reset_summary slabinfo stlog_version thread-self tsp_cmoffset_sdc uid_cputime usblog zoneinfo
boot_stat config.gz device-tree execdomains iomem key-users last_kmsg memsize pagetypeinfo reset_tzlog softirqs store_lastkmsg tima_debug_log tsp_cmoffset_sub uid_io user_fault
buddyinfo consoles devices fb ioports keys loadavg misc partitions schedstat stat swaps timer_list tsp_msg uid_procstat version
bus cpuinfo diskstats filesystems iostats kmsg locks modules reset_klog scsi stlog sys timer_stats tsp_raw_data uid_stat vmallocinfo
Code:
gta2xlwifi:/proc $ mount
rootfs on / type rootfs (ro,seclabel,size=1302672k,nr_inodes=325668)
tmpfs on /dev type tmpfs (rw,seclabel,nosuid,relatime,size=1415200k,nr_inodes=353800,mode=755)
devpts on /dev/pts type devpts (rw,seclabel,relatime,mode=600)
proc on /proc type proc (rw,relatime,gid=3009,hidepid=2)
sysfs on /sys type sysfs (rw,seclabel,relatime)
selinuxfs on /sys/fs/selinux type selinuxfs (rw,relatime)
/dev/block/dm-0 on /odm type ext4 (ro,seclabel,relatime,i_version)
/dev/block/dm-1 on /system type ext4 (ro,seclabel,relatime,i_version)
/dev/block/dm-2 on /vendor type ext4 (ro,seclabel,relatime,i_version)
none on /acct type cgroup (rw,relatime,cpuacct)
debugfs on /sys/kernel/debug type debugfs (rw,seclabel,relatime)
tmpfs on /mnt type tmpfs (rw,seclabel,relatime,size=1415200k,nr_inodes=353800,mode=755,gid=1000)
none on /config type configfs (rw,relatime)
tmpfs on /mnt/secure type tmpfs (rw,seclabel,relatime,size=1415200k,nr_inodes=353800,mode=700)
none on /dev/cpuctl type cgroup (rw,relatime,cpu)
none on /dev/cpuset type cgroup (rw,relatime,cpuset,noprefix,release_agent=/sbin/cpuset_release_agent)
pstore on /sys/fs/pstore type pstore (rw,seclabel,relatime)
/dev/block/mmcblk0p44 on /cache type ext4 (rw,seclabel,nosuid,nodev,noatime,journal_checksum,journal_async_commit,noauto_da_alloc,i_version)
/dev/block/mmcblk0p31 on /persist type ext4 (rw,seclabel,nosuid,nodev,noatime,journal_checksum,journal_async_commit,noauto_da_alloc,i_version)
/dev/block/mmcblk0p16 on /efs type ext4 (rw,seclabel,nosuid,nodev,noatime,journal_checksum,journal_async_commit,noauto_da_alloc,i_version)
/dev/block/mmcblk0p36 on /dsp type ext4 (ro,seclabel,nosuid,nodev,relatime,i_version,data=ordered)
/dev/block/mmcblk0p38 on /firmware type vfat (ro,context=u:object_r:firmware_file:s0,relatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
/dev/block/mmcblk0p37 on /firmware-modem type vfat (ro,context=u:object_r:firmware_file:s0,relatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
/dev/block/mmcblk0p46 on /omr type ext4 (rw,seclabel,nosuid,nodev,noatime,journal_checksum,noauto_da_alloc,i_version)
tmpfs on /storage type tmpfs (rw,seclabel,relatime,size=1415200k,nr_inodes=353800,mode=755,gid=1000)
tracefs on /sys/kernel/debug/tracing type tracefs (rw,seclabel,relatime)
adb on /dev/usb-ffs/adb type functionfs (rw,relatime)
/dev/block/dm-3 on /data type ext4 (rw,seclabel,nosuid,nodev,noatime,journal_checksum,journal_async_commit,noauto_da_alloc,resgid=5555,i_version)
/data/knox/secure_fs/enc_user on /data/enc_user type ecryptfs (rw,seclabel,nodev,relatime,ecryptfs_fnek_sig=696678df255664c9,ecryptfs_sig=696678df255664c9,userid=0,sdp_enabled,partition_id=0,ecryptfs_cipher=aes,ecryptfs_key_bytes=32,ecryptfs_passthrough,base=,label=)
/data/knox/secure_fs/enc_media on /data/knox/secure_fs/enc_media type ecryptfs (rw,seclabel,nodev,relatime,ecryptfs_fnek_sig=696678df255664c9,ecryptfs_sig=696678df255664c9,userid=0,sdp_enabled,partition_id=1,ecryptfs_cipher=aes,ecryptfs_key_bytes=32,ecryptfs_passthrough,base=,label=)
/data/knox/secure_fs/enc_media on /mnt/shell/enc_emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1000,fsgid=1000,gid=9997,multiuser,reserved=20MB)
/data/media on /mnt/runtime/default/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,reserved=20MB)
/data/media on /storage/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,reserved=20MB)
/data/media on /mnt/runtime/read/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=23,reserved=20MB)
/data/media on /mnt/runtime/write/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=7,reserved=20MB)
Code:
gta2xlwifi:/proc $ ls -larth /dev/block/mmc*
brw-rw---- 1 root system 179, 22 2017-12-31 18:02 /dev/block/mmcblk0p22
brw------- 1 root root 259, 11 2018-03-03 15:50 /dev/block/mmcblk0p43
brw------- 1 root root 259, 10 2018-03-03 15:50 /dev/block/mmcblk0p42
brw------- 1 root root 259, 9 2018-03-03 15:50 /dev/block/mmcblk0p41
brw------- 1 root root 179, 32 2018-03-03 15:50 /dev/block/mmcblk0rpmb
brw------- 1 root root 179, 9 2018-03-03 15:50 /dev/block/mmcblk0p9
brw------- 1 root root 179, 8 2018-03-03 15:50 /dev/block/mmcblk0p8
brw------- 1 root root 179, 7 2018-03-03 15:50 /dev/block/mmcblk0p7
brw------- 1 root root 179, 6 2018-03-03 15:50 /dev/block/mmcblk0p6
brw------- 1 root root 179, 5 2018-03-03 15:50 /dev/block/mmcblk0p5
brw------- 1 root root 259, 13 2018-03-03 15:50 /dev/block/mmcblk0p45
brw------- 1 root root 259, 8 2018-03-03 15:50 /dev/block/mmcblk0p40
brw------- 1 root root 179, 4 2018-03-03 15:50 /dev/block/mmcblk0p4
brw------- 1 root root 259, 6 2018-03-03 15:50 /dev/block/mmcblk0p38
brw------- 1 root root 259, 5 2018-03-03 15:50 /dev/block/mmcblk0p37
brw------- 1 root root 259, 4 2018-03-03 15:50 /dev/block/mmcblk0p36
brw------- 1 system system 259, 3 2018-03-03 15:50 /dev/block/mmcblk0p35
brw------- 1 root root 259, 2 2018-03-03 15:50 /dev/block/mmcblk0p34
brw-rw---- 1 system system 259, 1 2018-03-03 15:50 /dev/block/mmcblk0p33
brw------- 1 root root 179, 30 2018-03-03 15:50 /dev/block/mmcblk0p30
brw------- 1 root root 179, 3 2018-03-03 15:50 /dev/block/mmcblk0p3
brw------- 1 root root 179, 29 2018-03-03 15:50 /dev/block/mmcblk0p29
brw------- 1 root root 179, 28 2018-03-03 15:50 /dev/block/mmcblk0p28
brw------- 1 root root 179, 27 2018-03-03 15:50 /dev/block/mmcblk0p27
brw------- 1 root root 179, 26 2018-03-03 15:50 /dev/block/mmcblk0p26
brw------- 1 root root 179, 25 2018-03-03 15:50 /dev/block/mmcblk0p25
brw------- 1 root root 179, 24 2018-03-03 15:50 /dev/block/mmcblk0p24
brw------- 1 root root 179, 23 2018-03-03 15:50 /dev/block/mmcblk0p23
brw------- 1 root root 179, 21 2018-03-03 15:50 /dev/block/mmcblk0p21
brw------- 1 root root 179, 20 2018-03-03 15:50 /dev/block/mmcblk0p20
brw------- 1 root root 179, 2 2018-03-03 15:50 /dev/block/mmcblk0p2
brw------- 1 root root 179, 19 2018-03-03 15:50 /dev/block/mmcblk0p19
brw------- 1 root root 179, 18 2018-03-03 15:50 /dev/block/mmcblk0p18
brw------- 1 root root 179, 17 2018-03-03 15:50 /dev/block/mmcblk0p17
brw------- 1 root root 179, 13 2018-03-03 15:50 /dev/block/mmcblk0p13
brw------- 1 root root 179, 12 2018-03-03 15:50 /dev/block/mmcblk0p12
brw------- 1 root root 179, 11 2018-03-03 15:50 /dev/block/mmcblk0p11
brw------- 1 root root 179, 10 2018-03-03 15:50 /dev/block/mmcblk0p10
brw------- 1 root root 179, 1 2018-03-03 15:50 /dev/block/mmcblk0p1
brw------- 1 root root 179, 0 2018-03-03 15:50 /dev/block/mmcblk0
brw------- 1 root root 259, 14 2018-03-03 15:50 /dev/block/mmcblk0p46
brw------- 1 root root 259, 12 2018-03-03 15:50 /dev/block/mmcblk0p44
brw------- 1 root root 179, 31 2018-03-03 15:50 /dev/block/mmcblk0p31
brw------- 1 root root 179, 16 2018-03-03 15:50 /dev/block/mmcblk0p16
brw-rw---- 1 system system 259, 0 2018-03-24 13:20 /dev/block/mmcblk0p32
brw------- 1 root root 259, 15 2019-03-24 13:22 /dev/block/mmcblk0p47
brw------- 1 root root 179, 15 2019-03-24 13:32 /dev/block/mmcblk0p15
brw------- 1 root root 179, 14 2019-03-24 18:41 /dev/block/mmcblk0p14
brw------- 1 root root 259, 7 2019-03-25 13:31 /dev/block/mmcblk0p39
Code:
gta2xlwifi:/ $ ls /system/bin|grep dump
crash_dump32
dexdump
dumpstate
dumpsys
oatdump
tima_dump_log
I believe, I downloaded the(?) boot image from https://www.sammobile.com
but even here it wasn't completely straightforward.
it has a whole list of countries but not the U.S. and there is PDA and CSC.
I found some sites mentioning a /system/csc directory containing an xml... no such directory on T590
Seems like PDA is the last portion of the build number
https://forum.xda-developers.com/showthread.php?t=1801022
but that still leaves too many ...
so
based on
https://www.**********.com/how-to-change-csc-in-samsung-galaxy-phones
seems like the service provider sw contains the csc based on method two
This is slightly confusing because the picture has 3 numbered ..numbers but under that his 1-3 appear to refer to only the last (number 3 or portions thereof) so if I'm guessing correctly..my CSC=XAR
which... sammobile.com says is "Cellular south (XAR)"...well weird it should be a wifi only tablet but I am in the "South" ... so I dunno, I guess so?
So this should be the link
https://www.sammobile.com/firmwares/galaxy-tab-a/SM-T590/XAR/download/T590XXU2ARK2/248008/
well I'm still somewhat confused but this looks right
Model SM-T590
Model name Galaxy Tab A
Country Cellular south (XAR)
Version Android 8.1.0
Changelist 14876204
Build date Thu, 29 Nov 2018 01:48:25 +0000
Security Patch Level 2018-12-01
Product code XAR
PDA T590XXU2ARK2
CSC T590OXM2ARK2
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
I've found sites talking about enabling features by editing the csc xml...file but... that seems like either old info or just not for my tablet...
I would love if anyone has links or anything that would make this more clear... I think I fumbled enough to download the right image but..I would have rather gotten it of the phone..and I'm still not sure.
Here u go, extracted from the full rom, not the device. But it's the right one.
https://drive.google.com/file/d/1j83zhWSQkt_Rj4mK9H8yqzeZFlvT2okO/view?usp=sharing
AsItLies said:
Here u go, extracted from the full rom, not the device. But it's the right one.
https://drive.google.com/file/d/1j83zhWSQkt_Rj4mK9H8yqzeZFlvT2okO/view?usp=sharing
Click to expand...
Click to collapse
Thank You
AsItLies said:
Here u go, extracted from the full rom, not the device. But it's the right one.
https://drive.google.com/file/d/1j83zhWSQkt_Rj4mK9H8yqzeZFlvT2okO/view?usp=sharing
Click to expand...
Click to collapse
first try flashing with heimdall failed with verification failure... :crying:
So... I'm using
https://forum.xda-developers.com/galaxy-tab-a/how-to/root-samsung-galaxy-tab-10-5-2018-root-t3887848
I didn't do step 3 because I don't think heimdall see's anything but .img
I did do step 4 but I'm unsure what that is...
"Enable the "Keep AVB2.0/dm-verity" in the Magisk main screen. "
I can't do
Flash the patched boot image with Odin in the AP-slot
I don't know what the AP-slot is...I don't think heimdall has the equivalent?
I used the flash tab and selected a pid..I downloaded previously from the device selected boot and picked the patched img..
"verification failed" ... erasing
I dunno... any suggestions/help appreciated.
larrys_ said:
first try flashing with heimdall failed with verification failure... :crying:
So... I'm using
https://forum.xda-developers.com/galaxy-tab-a/how-to/root-samsung-galaxy-tab-10-5-2018-root-t3887848
<snip>
I dunno... any suggestions/help appreciated.
Click to expand...
Click to collapse
I haven't done this, yet. But, first and foremost, you can't ** skip ** any steps. They are ** all ** there for a reason. Skipping one will result in the next ones not working, it's just that simple.
I'd also suggest that if the directions you are following use Odin (on windows obviously), then find a way to boot windows and follow what it says. Yes, it's a pain, I hate windows, but I have dual boot to 8.1, just for purposes like this. Heimdall should have similar capabilities but I've never used the gui front end, only the command line, and don't know all the options available.
Again though, don't skip any steps, it's definitely not going to work if you do that.
good luck, Cheers
NVM... I guess the boot image you gave me was pre-patched... I just flashed it... and ROOT!
Thanks!
Now, I'll guess I'll have to wait for both TWRP and LineagOS to come out with T590 versions but that's a good problem!
AGAIN, THANK YOU!
root achieved!
larrys_ said:
NVM... I guess the boot image you gave me was pre-patched... I just flashed it... and ROOT!
Thanks!
Now, I'll guess I'll have to wait for both TWRP and LineagOS to come out with T590 versions but that's a good problem!
AGAIN, THANK YOU!
root achieved!
Click to expand...
Click to collapse
Well it's good that you have root, but I can guarantee you that the image you got from me was not patched. That image came right out of the stock OEM ROM. So there's something, somewhere, somehow, that you did that you ended up with a patched boot image. Cheers.
AsItLies said:
Well it's good that you have root, but I can guarantee you that the image you got from me was not patched. That image came right out of the stock OEM ROM. So there's something, somewhere, somehow, that you did that you ended up with a patched boot image. Cheers.
Click to expand...
Click to collapse
Lol quite possibly,
Anyway in-case someone else wants to extract the boot.img or recovery.img...
heimdall gave me the blocks... I don't think you can extract without root..but either way....info
Code:
--- Entry #28 ---
Binary Type: 0 (AP)
Device Type: 2 (MMC)
Identifier: 25
Attributes: 5 (Read/Write)
Update Attributes: 1 (FOTA)
Partition Block Size/Offset: 133120
Partition Block Count: 65536
File Offset (Obsolete): 0
File Size (Obsolete): 0
Partition Name: BOOT
Flash Filename: boot.img
FOTA Filename:
--- Entry #29 ---
Binary Type: 0 (AP)
Device Type: 2 (MMC)
Identifier: 26
Attributes: 5 (Read/Write)
Update Attributes: 1 (FOTA)
Partition Block Size/Offset: 198656
Partition Block Count: 65536
File Offset (Obsolete): 0
File Size (Obsolete): 0
Partition Name: RECOVERY
Flash Filename: recovery.img
FOTA Filename:

Categories

Resources