Advertisement
Guest User

Android 4.3 SysDump IRC Chat

a guest
Jul 18th, 2013
1,773
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 26.75 KB | None | 0 0
  1. [Jeff is here as Jeffro_. Mode is +m and only ops and those with voice can talk. If you have anything urgent that needs to be relayed, pm an Op to request voice. Spamming PMs will be banned.]
  2.  
  3. [00:49] <+introspection> open the "About this mac" menu by clicking the apple in the top left
  4.  
  5. [00:49] <@Jeffro_> at security settings
  6.  
  7. [00:49] <@gravufo> okay
  8.  
  9. [00:49] <@gravufo> is the data encrypted?
  10.  
  11. [00:49] <+introspection> hit "More info..."
  12.  
  13. [00:49] <@gravufo> introspection: please wait
  14.  
  15. [00:49] <+introspection> click "System report"
  16.  
  17. [00:49] <+introspection> gravufo: Oh sorry, thought we were idling
  18.  
  19. [00:50] <@Jeffro_> no
  20.  
  21. [00:50] <@gravufo> np!
  22.  
  23. [00:50] <@gravufo> okay great jeff
  24.  
  25. [00:50] <@gravufo> okay guys, should we go back to recovery? or try to get adb working now?
  26.  
  27. [00:50] <@vividboarder> Ok. While in settings let's turn on Adb and give that another shot
  28.  
  29. [00:50] <+introspection> When you're ready, I'd like to run through and check that the device is being detected at all
  30.  
  31. [00:50] <@gravufo> ok do so!
  32.  
  33. [00:51] <@gravufo> so first
  34.  
  35. [00:51] <@gravufo> let's activate usb debugging
  36.  
  37. [00:51] <@Jeffro_> done
  38.  
  39. [00:51] <@efrant> You should be able to enabke usb debugging ans pull the ahatem
  40.  
  41. [00:51] <@gravufo> efrant: we need root before pulling through OS
  42.  
  43. [00:52] <@vividboarder> But we need adb working in generally. We can do it all through adb after twrp anyway. Just gotta get adb working first.
  44.  
  45. [00:52] <@efrant> You should have read access with no root i think
  46.  
  47. [00:52] <@gravufo> not sure
  48.  
  49. [00:52] <+introspection> Here's a check to make sure it is being recognized at system level
  50.  
  51. [00:52] <+introspection> Alright, click the apple menu in the top left corner and go to "About This Mac". Click More info, then System Report. Look in the left listview that comes up and scroll down to USB. See if there are any android devices / usb hosts at all that you do not recognize from other devices you may have connected.
  52.  
  53. [00:53] <@vividboarder> fastboot works, so I think that will show the device.
  54.  
  55. [00:53] <@efrant> Is usb debugging enabled first of all?
  56.  
  57. [00:53] <+introspection> Unless the device is in bootloader it shouldn't show in fastboot?
  58.  
  59. [00:53] <@gravufo> well, if it is like linux, i had to modify some rules.d file or so
  60.  
  61. [00:53] <@Jeffro_> says Hub > Nexus 4
  62.  
  63. [00:53] <+introspection> efrant: yep, is
  64.  
  65. [00:54] <+introspection> Jeffro_: Great
  66.  
  67. [00:54] <+introspection> do "./adb kill-server"
  68.  
  69. [00:54] <+introspection> and then "./adb devices" That should kill and restart the daemon in case we had any persistence problems
  70.  
  71. [00:54] <@Jeffro_> ok
  72.  
  73. [00:55] <+introspection> ..Did anything come up with adb devices?
  74.  
  75. [00:55] <@Jeffro_> nope
  76.  
  77. [00:55] <+Introspection> hm
  78.  
  79. [00:55] <@gravufo> if it is anything like linux, i had to modify some rules.d file
  80.  
  81. [00:56] <@gravufo> oh yeah, try running adb as root maybe
  82.  
  83. [00:56] <@vividboarder> Don't have to on Mac as far as I know. Introspection can confirm.
  84.  
  85. [00:56] <+Introspection> jeh-: just PM'd me and said try running it as su
  86.  
  87. [00:56] <@vividboarder> sudo ./adb devices
  88.  
  89. [00:56] <@gravufo> ^
  90.  
  91. [00:56] <@vividboarder> Then your computer password
  92.  
  93. [00:56] <@vividboarder> Not any phone device password.
  94.  
  95. [00:58] <+Introspection> Anything come up?
  96.  
  97. [00:58] <@Jeffro_> I tried ./adb then su using admin password and no luck
  98.  
  99. [00:58] <@gravufo> no!
  100.  
  101. [00:58] <+Introspection> nono
  102.  
  103. [00:58] <@gravufo> sudo ./adb devices
  104.  
  105. [00:58] <@gravufo> this is the command u have to try
  106.  
  107. [00:58] <+Introspection> type "sudo ./adb devices"
  108.  
  109. [00:58] <@vividboarder> ^
  110.  
  111. [00:59] <@Jeffro_> ./adb devices comes up blank
  112.  
  113. [00:59] <+Introspection> sudo ./adb devices
  114.  
  115. [00:59] <+Introspection> not just ./adb devices
  116.  
  117. [00:59] <@Jeffro_> nothing listed
  118.  
  119. [01:00] <+Introspection> we need to run it in an elevated session in case something else is screwing with us
  120.  
  121. [01:00] <@gravufo> okay well guys, let's stop wasting time and try the recovery again
  122.  
  123. [01:00] <@Jeffro_> still blank with sudo ./adb devices
  124.  
  125. [01:00] <+Introspection> One more thing to check
  126.  
  127. [01:00] <@gravufo> okay go on
  128.  
  129. [01:00] <+Introspection> type in "sudo nano ~/.android/adb_usb.ini"
  130.  
  131. [01:01] <+Introspection> And then is anything in that file?
  132.  
  133. [01:01] <@Jeffro_> ok
  134.  
  135. [01:01] <@Jeffro_> nope
  136.  
  137. [01:01] <+Introspection> efrant: Are we trying to pull a system dump through adb?
  138.  
  139. [01:01] <+Introspection> Jeffro_: good, that means we can do one last thing for adb
  140.  
  141. [01:02] <+Introspection> open up about this mac, more info and then system report again
  142.  
  143. [01:02] <+Introspection> go to usb and then select the nexus device in there
  144.  
  145. [01:02] <@Jeffro_> ok
  146.  
  147. [01:02] <+Introspection> and then see the vendor id?
  148.  
  149. [01:02] <@Jeffro_> ok
  150.  
  151. [01:02] <+Introspection> just the 0x**** number
  152.  
  153. [01:02] <@Jeffro_> yes
  154.  
  155. [01:02] <+Introspection> type "sudo echo ***that number without the asterisks* >> ~/.android/adb_usb.ini
  156.  
  157. [01:03] <+Introspection> and then if that works do "sudo adb kill-server; sudo adb devices"
  158.  
  159. [01:03] <@efrant> Im not a mac guy, but at this point, it would seem that he should just boot cwm, and do a nandroid. He shouldn't have any issues with not being able to mount data given that he has already booted into android once
  160.  
  161. [01:04] <@gravufo> ^
  162.  
  163. [01:04] <@gravufo> this
  164.  
  165. [01:04] <+Introspection> I concur, let's just see if this works though
  166.  
  167. [01:04] <@Jeffro_> so type this while still in android/adb_usb.ini?
  168.  
  169. [01:04] <@vividboarder> We'll definitely try that. Just want to try and have a backup plan so he's not booting rebooting all night.
  170.  
  171. [01:04] <+Introspection> oh crap no, sorry
  172.  
  173. [01:04] <+Introspection> push ctrl+x to escape nano
  174.  
  175. [01:05] <+Introspection> then do "sudo echo *vendor_id_you_got* >> ~/.android/adb_usb.ini"
  176.  
  177. [01:05] <+Introspection> No asterisks please
  178.  
  179. [01:05] <+Introspection> the vendor id is a 0xsomething number
  180.  
  181. [01:05] <@gravufo> (but does he put the 0x?)
  182.  
  183. [01:06] <+Introspection> yep
  184.  
  185. [01:06] <@vividboarder> Yea
  186.  
  187. [01:06] <@gravufo> cool
  188.  
  189. [01:06] <@Jeffro_> so sudo echo 0x**** ~.android/adb_usb.ini (but with the vedor id instead of *? )
  190.  
  191. [01:06] <@gravufo> you're missing the >>
  192.  
  193. [01:06] <@Jeffro_> ok
  194.  
  195. [01:06] <@gravufo> sudo echo 0x**** >> ~.android/adb_usb.ini
  196.  
  197. [01:06] <+Introspection> for example if your code was 0x1234 then it would be
  198.  
  199. [01:06] <+Introspection> sudo echo 0x1234 >> ~/.android/adb_usb.ini
  200.  
  201. [01:07] <@vividboarder> Well, don't need sudo there actually. It's in $HOME. But should work all the same.
  202.  
  203. [01:07] <+Introspection> true, I'm just running these all through sudo to save time if something is screwed up in his permissions from anything else
  204.  
  205. [01:07] <@Jeffro_> I did it ,it asked for password, I put my admin password, then it went back to the normal prompt
  206.  
  207. [01:08] <+Introspection> excellent
  208.  
  209. [01:08] <+Introspection> alright
  210.  
  211. [01:08] <+Introspection> now run
  212.  
  213. [01:08] <+Introspection> sudo ./adb kill-server
  214.  
  215. [01:08] <+Introspection> sudo ./adb devices
  216.  
  217. [01:08] <+Introspection> and tell me if anything comes up after that
  218.  
  219. [01:08] <@Jeffro_> Still not listing the serial #
  220.  
  221. [01:08] <+Introspection> hm
  222.  
  223. [01:08] <@gravufo> LAST thing
  224.  
  225. [01:08] <+Introspection> er
  226.  
  227. [01:08] <@gravufo> just replug the phone
  228.  
  229. [01:08] <+Introspection> unplug and replug your device?
  230.  
  231. [01:08] <+Introspection> lmao
  232.  
  233. [01:09] <@gravufo> once it's replugged, make sure you give security permission and all
  234.  
  235. [01:09] <+Introspection> and then do ./adb devices again
  236.  
  237. [01:10] <+Introspection> anything coming up?
  238.  
  239. [01:10] <@Jeffro_> did that, nothing
  240.  
  241. [01:10] <@gravufo> okay then
  242.  
  243. [01:10] <@gravufo> let's just skip ahead
  244.  
  245. [01:10] <+Introspection> alright, I guess it's back to recovery then
  246.  
  247. [01:10] <@gravufo> let's reboot to recovery please
  248.  
  249. [01:10] <@gravufo> turn off and boot using VOL DOWN
  250.  
  251. [01:11] <@vividboarder> Back to recovery! Woot!
  252.  
  253. [01:11] <+Introspection> efrant and vividboarder: If the goal is to get adb working for a system dump, could we not just connect over network? (This might be a CM only feature, can't remember)
  254.  
  255. [01:11] <@vividboarder> Not built in.
  256.  
  257. [01:11] <@Jeffro_> ok
  258.  
  259. [01:11] <@vividboarder> There is an Adb Wilreless app
  260.  
  261. [01:11] <+Introspection> oh
  262.  
  263. [01:11] <@gravufo> hey guys, stop with the nick changes
  264.  
  265. [01:11] <@gravufo> please.
  266.  
  267. [01:11] <+Introspection> I'm used to pa/cm as under adb there is "ADB over network"
  268.  
  269. [01:13] <@Jeffro_> now what?
  270.  
  271. [01:13] <@vividboarder> Ok, back in recovery or fastboot?
  272.  
  273. [01:13] <+Introspection> vivid/efrant, is there a fastboot getvar for the specific nexus 4 model? That would tell us if we are working with the same device or a prototype, which would give reasons as to why flashing is failing
  274.  
  275. [01:13] <@Jeffro_> fastboot
  276.  
  277. [01:14] <@gravufo> go into recovery please
  278.  
  279. [01:14] <@vividboarder> Well, flashing has worked. So that's fine.
  280.  
  281. [01:14] <@vividboarder> Wait
  282.  
  283. [01:14] <@efrant> Fastboot getvar all
  284.  
  285. [01:14] <@Jeffro_> ok
  286.  
  287. [01:14] <@vividboarder> What recovery is installed CWM? Does that allow just backups of System?
  288.  
  289. [01:14] <+Introspection> Oh, I thought gravufo said cwm/twrp failed?
  290.  
  291. [01:14] <@vividboarder> Twrp does have an option to uncheck other backups.
  292.  
  293. [01:14] <@gravufo> oh, we could reflash twrp
  294.  
  295. [01:14] <@vividboarder> Yea.
  296.  
  297. [01:14] <@Jeffro_> CM
  298.  
  299. [01:14] <@gravufo> ok Jeffro_ are you still in fastboot?
  300.  
  301. [01:14] <@Jeffro_> CWM
  302.  
  303. [01:14] <@vividboarder> Jeffro_ you still have twrp on your computer?
  304.  
  305. [01:15] <@gravufo> do we flash the 2.6 guys?
  306.  
  307. [01:15] <@Jeffro_> I'm in recovery and yes still have twrop
  308.  
  309. [01:15] <+Introspection> So cwm is installed ?
  310.  
  311. [01:15] <@Jeffro_> twrp
  312.  
  313. [01:15] <@efrant> I would download cwm, fastboot boot cwm.img then nandroid
  314.  
  315. [01:15] <+Introspection> twrp is installed?
  316.  
  317. [01:15] <@vividboarder> Nah nah. efrant he's in CWM.
  318.  
  319. [01:15] <@gravufo> wait guys, wait.
  320.  
  321. [01:15] <+Introspection> vividboarder: He just said twrp?
  322.  
  323. [01:15] <@Jeffro_> sorry, cwm is, but I still have the twrp files
  324.  
  325. [01:15] <@vividboarder> He said he still has it.
  326.  
  327. [01:15] <+Introspection> ah
  328.  
  329. [01:15] <@vividboarder> ^^
  330.  
  331. [01:16] <@vividboarder> Ok. So. Does CWM let someone backup a single partition
  332.  
  333. [01:16] <@vividboarder> Anyone know?
  334.  
  335. [01:16] <@vividboarder> Or should we go back to twrp?
  336.  
  337. [01:16] <+Introspection> ..so adb is not working in recovery either?
  338.  
  339. [01:16] <@gravufo> no, but we can pull the system.img from it
  340.  
  341. [01:16] <@gravufo> afaik
  342.  
  343. [01:16] <+Introspection> vividboarder: I'm pretty sure cwm is the whole deal
  344.  
  345. [01:16] <@gravufo> if it's still like in the old days
  346.  
  347. [01:16] <@vividboarder> If we can get to adb.
  348.  
  349. [01:16] <@vividboarder> Which we can't.
  350.  
  351. [01:16] <+Introspection> nandroid everything
  352.  
  353. [01:16] <@efrant> Whole deal is fine
  354.  
  355. [01:16] <@gravufo> yeah
  356.  
  357. [01:16] <@gravufo> ok Jeffro_
  358.  
  359. [01:16] <@gravufo> just backup
  360.  
  361. [01:16] <+Introspection> But q: If adb does not work in recovery how are we going to pull the dump?
  362.  
  363. [01:16] <@vividboarder> Possibly. Except he had errors about mounting /cache
  364.  
  365. [01:16] <@gravufo> the whole thing
  366.  
  367. [01:16] <@vividboarder> Boot and pull it with MTP
  368.  
  369. [01:17] <@gravufo> ^
  370.  
  371. [01:17] <@efrant> Yes
  372.  
  373. [01:17] <@Jeffro_> ok, it's going
  374.  
  375. [01:17] <+Introspection> ah
  376.  
  377. [01:17] <@gravufo> great, no errors
  378.  
  379. [01:17] <@vividboarder> The backup is going?
  380.  
  381. [01:17] <@gravufo> seems like it's gonna work
  382.  
  383. [01:18] <@Jeffro_> backup complete
  384.  
  385. [01:18] <@gravufo> what? already?
  386.  
  387. [01:18] <+Introspection> quick
  388.  
  389. [01:18] <+Introspection> too quick?
  390.  
  391. [01:18] <@gravufo> dunno, maybe, maybe not lol, he does have no data to back up
  392.  
  393. [01:18] <@efrant> No data, thats prob why
  394.  
  395. [01:18] <@vividboarder> Boom. Ok, let's reboot to Android
  396.  
  397. [01:18] <@gravufo> okay then Jeffro_ reboot to android
  398.  
  399. [01:18] <@gravufo> then we will copy the files to your computer
  400.  
  401. [01:18] <+Introspection> hm
  402.  
  403. [01:19] <@Jeffro_> select "yes - disable recovery flash" ?
  404.  
  405. [01:19] <@gravufo> where do you see that exactly? Still in the recovery?
  406.  
  407. [01:19] <@Jeffro_> yes, when i select reboot
  408.  
  409. [01:20] <+Introspection> oh
  410.  
  411. [01:20] <@gravufo> okay click yes
  412.  
  413. [01:20] <+Introspection> yeah, just hit yeah
  414.  
  415. [01:20] <@Jeffro_> top says flash stock recovery on on boot?
  416.  
  417. [01:20] <@gravufo> select "yes - disable recovery flash"
  418.  
  419. [01:20] <@efrant> Doesn't matter
  420.  
  421. [01:20] <@gravufo> ^
  422.  
  423. [01:21] <@Jeffro_> ok rebooting
  424.  
  425. [01:21] <@Jeffro_> ok
  426.  
  427. [01:21] <@gravufo> Almost done, keep it up!
  428.  
  429. [01:21] <@gravufo> thanks for your time by the way
  430.  
  431. [01:21] <@Jeffro_> rebooted
  432.  
  433. [01:21] <@gravufo> on behalf of all the community ;)
  434.  
  435. [01:21] <+Introspection> skip setup again
  436.  
  437. [01:21] <@Jeffro_> Yeah, my wife is pissed
  438.  
  439. [01:21] <@Jeffro_> oh well
  440.  
  441. [01:21] <@gravufo> lol sorry!
  442.  
  443. [01:22] <@gravufo> okay well almost done
  444.  
  445. [01:22] <@Jeffro_> didn't ask for setup
  446.  
  447. [01:22] <@gravufo> so just open up the phone as if u want to transfer files
  448.  
  449. [01:22] <@gravufo> from your computer
  450.  
  451. [01:22] <@gravufo> and find the folder called clockworkmod
  452.  
  453. [01:22] <@gravufo> copy it to your computer
  454.  
  455. [01:22] <+Introspection> It's in
  456.  
  457. [01:22] <+Introspection> It is in /data/media/clockworkmod/backups
  458.  
  459. [01:23] <@gravufo> oh wow they moved it? meh
  460.  
  461. [01:23] <@vividboarder> Jeffro_ my wife is about to be too, haha. We're at the final stretch.
  462.  
  463. [01:23] <@gravufo> nvm they didnt move it lel
  464.  
  465. [01:23] <@vividboarder> When plugged in, Android File Transfer should only show contents of /data/media
  466.  
  467. [01:23] <+Introspection> gravufo: I thought it was always there? ;P
  468.  
  469. [01:23] <@Jeffro_> OK
  470.  
  471. [01:23] <@gravufo> Introspection: yeah i just assumed we're already in /data/media
  472.  
  473. [01:23] <@Jeffro_> I see .recovery_version
  474.  
  475. [01:24] <+Introspection> anything else?
  476.  
  477. [01:24] <@gravufo> nothing else?
  478.  
  479. [01:24] <@vividboarder> You find the any folders in the clockworkmod directory?
  480.  
  481. [01:24] <@vividboarder> One should be nandroid or backup.
  482.  
  483. [01:24] <+Introspection> gravufo: Sorry yeah :P
  484.  
  485. [01:24] <@Jeffro_> there's .nomedia
  486.  
  487. [01:24] <@Jeffro_> under datea
  488.  
  489. [01:25] <@gravufo> nono
  490.  
  491. [01:25] <@gravufo> just open up your phone
  492.  
  493. [01:25] <@gravufo> from your computer
  494.  
  495. [01:25] <@gravufo> and then go into clockwormod
  496.  
  497. [01:25] <+Introspection> go into media
  498.  
  499. [01:25] <@efrant> It should be in:
  500.  
  501. [01:25] <+Introspection> and then clockworkmod
  502.  
  503. [01:25] <+Introspection> and then backups
  504.  
  505. [01:25] <+Introspection> they are each folders within /data
  506.  
  507. [01:26] <@efrant> Nexus 4, internal storage, clockworkmod, backup
  508.  
  509. [01:26] <@Jeffro_> through android file transfer ? Cause that's what I'm doing
  510.  
  511. [01:26] <@gravufo> okay Jeffro_ did you find the clockworkmod folder?
  512.  
  513. [01:27] <@vividboarder> So there is no backup folder in there?
  514.  
  515. [01:27] *gravufo* It might be easier to just upload the file to dropbox instead of fishing around in AndroidFileTransfer
  516.  
  517. [01:27] <@Jeffro_> yes, and it has the .recovery_version
  518.  
  519. [01:27] <@Jeffro_> that's it
  520.  
  521. [01:27] <@vividboarder> Just .nomedia and .recovery_version?
  522.  
  523. [01:27] <@gravufo> then the backup failed.
  524.  
  525. [01:27] <@Jeffro_> yup
  526.  
  527. [01:27] <@vividboarder> Shitballs
  528.  
  529. [01:27] <+Introspection> uh
  530.  
  531. [01:27] <+Introspection> efrant, maybe see if you could get a teamviewer session up
  532.  
  533. [01:27] <@vividboarder> Won't help.
  534.  
  535. [01:27] <@vividboarder> What we need is on the device, hah.
  536.  
  537. [01:28] <@vividboarder> So.
  538.  
  539. [01:28] <@vividboarder> Let's do this once and for all.
  540.  
  541. [01:28] <@gravufo> twrp time.
  542.  
  543. [01:28] <@vividboarder> Reboot to fastboot.
  544.  
  545. [01:28] <@vividboarder> fastboot flash recovery path_to_twrp
  546.  
  547. [01:28] <@vividboarder> From there we can try to backup just system and then flash SuperSu.
  548.  
  549. [01:28] <@vividboarder> Worst case, we end up rooted in the rom and can do a dump from Android.
  550.  
  551. [01:28] <@vividboarder> Everyone with me? If so we can walk him through.
  552.  
  553. [01:29] <@gravufo> yes
  554.  
  555. [01:29] <@Jeffro_> ok, back to fastboot
  556.  
  557. [01:29] <@efrant> Ok guys, i need to sign off and go to sleep. Need to be awake in 5 hours for work. Good luck
  558.  
  559. [01:29] <@gravufo> fastboot flash PATH_TO_RECOVERY_FILE
  560.  
  561. [01:29] <+Introspection> These google guys are crafty :P
  562.  
  563. [01:29] <@Jeffro_> which version of twrp
  564.  
  565. [01:29] <@gravufo> cya efrant
  566.  
  567. [01:29] <@gravufo> uhhh
  568.  
  569. [01:29] <@gravufo> guys which one do we use?
  570.  
  571. [01:30] <@gravufo> 2.6? 2.3?
  572.  
  573. [01:30] <@vividboarder> So did you say you could click cancel on the password thing?
  574.  
  575. [01:30] <@Jeffro_> yes
  576.  
  577. [01:30] <@vividboarder> Ok. So we can do 2.6 then.
  578.  
  579. [01:30] <@gravufo> ok Jeffro_ let's go with 2.5 if u have it
  580.  
  581. [01:30] <@gravufo> else 2.6
  582.  
  583. [01:30] <@gravufo> since we need the su
  584.  
  585. [01:30] <@vividboarder> ^^
  586.  
  587. [01:31] <@Jeffro_> ok
  588.  
  589. [01:31] <@Jeffro_> 2.5
  590.  
  591. [01:31] <@Jeffro_> flashed
  592.  
  593. [01:32] <@gravufo> great, go into recovery
  594.  
  595. [01:32] <@vividboarder> Ok.
  596.  
  597. [01:32] <@vividboarder> Let us know when in recovery.
  598.  
  599. [01:32] <@Jeffro_> It didn't ask for a password this time
  600.  
  601. [01:32] <@gravufo> GREAT
  602.  
  603. [01:32] <@gravufo> now go into backup
  604.  
  605. [01:32] <@Jeffro_> ok
  606.  
  607. [01:32] <@gravufo> select ONLY system and boot
  608.  
  609. [01:32] <@gravufo> and swipe to back up!
  610.  
  611. [01:33] <@vividboarder> Perfect.
  612.  
  613. [01:33] <@vividboarder> Yea.
  614.  
  615. [01:33] <@vividboarder> Uncheck all but system.
  616.  
  617. [01:33] <@Jeffro_> It's seems to be going
  618.  
  619. [01:33] <@gravufo> good
  620.  
  621. [01:33] <@vividboarder> Ok, what does the message say?
  622.  
  623. [01:33] <@vividboarder> Does it show the size?
  624.  
  625. [01:34] <@Jeffro_> backup completed
  626.  
  627. [01:34] <@vividboarder> What does the log say there?
  628.  
  629. [01:34] <@Jeffro_> 562mb
  630.  
  631. [01:34] <@vividboarder> Nice.
  632.  
  633. [01:34] <@vividboarder> Wow.
  634.  
  635. [01:34] <+Introspection> That was still very, very quick
  636.  
  637. [01:34] <@vividboarder> Cool.
  638.  
  639. [01:34] <+Introspection> ah, good size though
  640.  
  641. [01:34] <@vividboarder> Let's make sure though.
  642.  
  643. [01:34] <@vividboarder> And...
  644.  
  645. [01:34] <@vividboarder> thats what she said
  646.  
  647. [01:34] <@vividboarder> ...
  648.  
  649. [01:34] <@gravufo> alright, let's try transfering directly from the recovery
  650.  
  651. [01:34] <@vividboarder> So, in twrp, go home.
  652.  
  653. [01:34] <@vividboarder> Hang on.
  654.  
  655. [01:34] <@vividboarder> Can't transfer from twrp.
  656.  
  657. [01:34] <@Jeffro_> ok
  658.  
  659. [01:35] <@vividboarder> MTP doesn't work in any recovery.
  660.  
  661. [01:35] <@gravufo> okay
  662.  
  663. [01:35] <@gravufo> go on
  664.  
  665. [01:35] <@vividboarder> From home go to advanced.
  666.  
  667. [01:35] <@vividboarder> Then File Manager.
  668.  
  669. [01:35] <@vividboarder> We're going to make sure it backed up.
  670.  
  671. [01:35] <+spaceman860> Adb pull in recovery
  672.  
  673. [01:35] <@vividboarder> Still no adb.
  674.  
  675. [01:35] <@Jeffro_> ok
  676.  
  677. [01:35] <@vividboarder> You in file manager?
  678.  
  679. [01:35] <@Jeffro_> yes
  680.  
  681. [01:35] <+Introspection> spaceman860: ADB is dead, both in recovery and in system
  682.  
  683. [01:35] <@vividboarder> Ok, you see sdcard in there or does it look like you're on the sdcard?
  684.  
  685. [01:36] <@Jeffro_> yes
  686.  
  687. [01:36] <@gravufo> so look for the folder TWRP
  688.  
  689. [01:36] <@Jeffro_> see it
  690.  
  691. [01:36] <@Jeffro_> has a back up
  692.  
  693. [01:36] <@vividboarder> Ok, In that folder.
  694.  
  695. [01:37] <@vividboarder> Is there a folder in there called backup?
  696.  
  697. [01:37] <+Introspection> good
  698.  
  699. [01:37] <@gravufo> there should be two files inside the backup
  700.  
  701. [01:37] <@Jeffro_> backups folder has a file
  702.  
  703. [01:37] <@Jeffro_> in it
  704.  
  705. [01:37] <@gravufo> what's the name?
  706.  
  707. [01:37] <@vividboarder> Called?
  708.  
  709. [01:37] <@Jeffro_> 00475*******
  710.  
  711. [01:38] <@Jeffro_> then select that and it has the date
  712.  
  713. [01:38] <@vividboarder> Ok.
  714.  
  715. [01:38] <@vividboarder> Go in there.
  716.  
  717. [01:38] <@Jeffro_> then in that has boot.emmc.win; boot.emmc.win.md5
  718.  
  719. [01:38] <@vividboarder> Ok.
  720.  
  721. [01:38] <@vividboarder> Just boot?
  722.  
  723. [01:38] <@vividboarder> No System?
  724.  
  725. [01:38] <@Jeffro_> system.et4.win
  726.  
  727. [01:38] <@Jeffro_> recovery.log
  728.  
  729. [01:38] <@vividboarder> Ok.
  730.  
  731. [01:38] <+Introspection> Guys, stop with the nick changes. If you have something to tell us PM one of the +v/o's
  732.  
  733. [01:38] <@vividboarder> Great.
  734.  
  735. [01:38] <@Jeffro_> system.ext.win.md5
  736.  
  737. [01:39] <@vividboarder> Pefect.
  738.  
  739. [01:39] <@vividboarder> Ok.
  740.  
  741. [01:39] <@vividboarder> So now press home to go to twrp home.
  742.  
  743. [01:39] <+Introspection> Good
  744.  
  745. [01:39] <@vividboarder> Then Reboot
  746.  
  747. [01:39] <+Introspection> Home run
  748.  
  749. [01:39] <@vividboarder> Then System.
  750.  
  751. [01:39] <@vividboarder> It should ask if you want to root. Say yes.
  752.  
  753. [01:39] <@vividboarder> Just in case.
  754.  
  755. [01:40] <@Jeffro_> ok rebooting now
  756.  
  757. [01:40] <@Jeffro_> says android is upgrading
  758.  
  759. [01:40] <+Introspection> That is the root
  760.  
  761. [01:40] <@Jeffro_> ok rebooted
  762.  
  763. [01:40] <+Introspection> well, a system change (root installed)
  764.  
  765. [01:40] <@gravufo> okay
  766.  
  767. [01:40] <@gravufo> now.
  768.  
  769. [01:40] <@gravufo> open the mac file transfer thing
  770.  
  771. [01:40] <@gravufo> and find the TWRP folder
  772.  
  773. [01:40] <@gravufo> copy it over to your computer
  774.  
  775. [01:40] <@Jeffro_> there
  776.  
  777. [01:41] <@Jason__> whats up guys?
  778.  
  779. [01:41] <@vividboarder> Yea, So Android FIle Transfer agian. See if it works.
  780.  
  781. [01:41] <+Introspection> jasq
  782.  
  783. [01:41] <+Introspection> Jason__: CWM failed, we have made a twrp backup and are trying to use mtp to get it on jeff's mac
  784.  
  785. [01:41] <@Jeffro_> transferring now
  786.  
  787. [01:41] <@Jason__> what was the error with cwm?
  788.  
  789. [01:41] <@Jeffro_> done
  790.  
  791. [01:41] <@gravufo> okay now
  792.  
  793. [01:42] <@gravufo> it would be cool if you could simply zip that folder and upload it to dropbox or something
  794.  
  795. [01:42] <+Introspection> Jason__: Backup was near instant, and nothing saved (nothing in dir in the backups folder)
  796.  
  797. [01:42] <@vividboarder> Ok. Transfer system and boot files.
  798.  
  799. [01:42] <@vividboarder> You get them all?
  800.  
  801. [01:42] <@Jeffro_> yup
  802.  
  803. [01:42] <@gravufo> nice
  804.  
  805. [01:42] <@vividboarder> Pefect.
  806.  
  807. [01:42] <+Introspection> excellent
  808.  
  809. [01:43] <@Jason__> it seems like vivid is on to something
  810.  
  811. [01:43] <@vividboarder> Zip a folder up with the 5 files then. 2 boot, 2 system and recovery.log
  812.  
  813. [01:43] <@Jeffro_> yes
  814.  
  815. [01:43] <@vividboarder> Then do you have dropbox or google drive?
  816.  
  817. [01:43] <@Jeffro_> it's in dropbox
  818.  
  819. [01:43] <@vividboarder> Sweet.
  820.  
  821. [01:44] <+Introspection> awesome, any progress log for the upload?
  822.  
  823. [01:44] <@vividboarder> So in dropbox you can do share and get a link when it's uploaded
  824.  
  825. [01:44] <@Jeffro_> it's there
  826.  
  827. [01:44] <+Introspection> ..eh
  828.  
  829. [01:44] <@vividboarder> Then I can try to put it up on Goo.im or techerrata. If I can remember my logins.
  830.  
  831. [01:44] <@gravufo> yeah so just copy paste the public link
  832.  
  833. [01:44] <+Introspection> that was … a bit fast for a 500mb file, even compressed
  834.  
  835. [01:44] <@gravufo> it's probably syncing as we speak
  836.  
  837. [01:44] <@vividboarder> Introspection agreed. What is the file size of the 4 files unzipped?
  838.  
  839. [01:44] <@Jeffro_> https://www.dropbox.com/sh/c8ddc9ch24mvmct/qVYzlwu6TM
  840.  
  841. [01:44] <@vividboarder> Jeffro_ ^
  842.  
  843. [01:45] <@vividboarder> Ok, we got system.md5
  844.  
  845. [01:45] <+Introspection> Are you like sitting on the upload server? lol
  846.  
  847. [01:45] <@vividboarder> not system.win yet
  848.  
  849. [01:45] <@gravufo> it's syncing guys
  850.  
  851. [01:45] <@gravufo> wait it out
  852.  
  853. [01:45] <@vividboarder> ^
  854.  
  855. [01:45] <+Introspection> yep
  856.  
  857. [01:45] <+Introspection> home run!
  858.  
  859. [01:45] <@vividboarder> Kernel lookedl ike it dumped though
  860.  
  861. [01:45] <@Jeffro_> I hope this gets you guys what you want.
  862.  
  863. [01:45] <@gravufo> yeah hopefully!
  864.  
  865. [01:45] <@gravufo> THANKS A LOT
  866.  
  867. [01:45] <@gravufo> really.
  868.  
  869. [01:46] <+Introspection> Next step for us: Download, proceed to party hard.
  870.  
  871. [01:46] <@gravufo> it's super appreciated
  872.  
  873. [01:46] <+Introspection> Jeffro_: This is perfect, thank you incredibly much.
  874.  
  875. [01:46] <@Jeffro_> Let me know on google + if this works or not. I'm going to bed
  876.  
  877. [01:46] <@Jason__> I got the download, now, lets have a look at this zip
  878.  
  879. [01:46] <@Jason__> Jeff, you sir, are a hero
  880.  
  881. [01:46] <@gravufo> _defcon: radio will come another time, everyone is exhausted
  882.  
  883. [01:47] <@vividboarder> recovery.log looks like it backed up system just fine.
  884.  
  885. [01:47] <@vividboarder> 520MB
  886.  
  887. [01:47] <@vividboarder> Thanks Jeffro_
  888.  
  889. [01:47] <@vividboarder> Don't flash anything crazy tonight or tomorrow.
  890.  
  891. [01:47] <@vividboarder> We can try to pull the baseband too then.
  892.  
  893. [01:47] <@gravufo> hey Jeffro_
  894.  
  895. [01:47] <@Jeffro_> yea
  896.  
  897. [01:47] <@gravufo> can you wait before shutting your computer off?
  898.  
  899. [01:47] <@Jason__> yea, looks like we still need some stuff
  900.  
  901. [01:47] <@Jeffro_> I will, I see it's still uploading
  902.  
  903. [01:47] <@gravufo> great
  904.  
  905. [01:47] <@gravufo> thanks :P
  906.  
  907. [01:48] <@Jason__> hey jeff, how much of it is up?
  908.  
  909. [01:48] <+Introspection> Jeff, would you mind going over the story of how you got the device?
  910.  
  911. [01:49] <@vividboarder> Introspection he said (on G+) he got it on craigslist from someone who worked there.
  912.  
  913. [01:49] <+Introspection> Yeah, I read that, just wondering how that transaction went heh
  914.  
  915. [01:50] <@Jason__> vivid, what did you end up doing to pull the system?
  916.  
  917. [01:50] <@gravufo> nandroid backup
  918.  
  919. [01:50] <@gravufo> through twrp
  920.  
  921. [01:50] <@gravufo> after having manually formatted cache and userdata through fastboot
  922.  
  923. [01:50] <+Introspection> Jason__: TWRP to get the system, used MTP to get it to Jeff's pc
  924.  
  925. [01:50] <@vividboarder> Jason__ twrp
  926.  
  927. [01:50] <@Jason__> how did you get through the password on twrp?
  928.  
  929. [01:51] <@vividboarder> Just rebooted to android first
  930.  
  931. [01:51] <@gravufo> it was just corruption
  932.  
  933. [01:51] <@vividboarder> Then tried again.
  934.  
  935. [01:51] <+Introspection> (android file transfer on mac)
  936.  
  937. [01:51] <@gravufo> there was no password needed
  938.  
  939. [01:51] <@Jason__> nice!
  940.  
  941. [01:51] <@vividboarder> I think adb unlock wipes it
  942.  
  943. [01:51] <@vividboarder> Reboot probably cleans up the partition
  944.  
  945. [01:51] <@vividboarder> Creates /data/media and so on.
  946.  
  947. [01:51] <@Jason__> so whats left? Radio and baseband
  948.  
  949. [01:51] <@vividboarder> Not certain, but sounds plausible.
  950.  
  951. [01:51] <@vividboarder> Yea
  952.  
  953. [01:51] <@vividboarder> But he's gone to bed.
  954.  
  955. [01:51] <@vividboarder> We can try that tomorrow I suppose.
  956.  
  957. [01:51] <@vividboarder> LTE doesn't work on new basebands anyway.
  958.  
  959. [01:52] <@Jason__> He's been a hell of a guy to work at it this long to help us all out
  960.  
  961. [01:52] <@gravufo> agreed
  962.  
  963. [01:52] <@vividboarder> So who cares!? ;)
  964.  
  965. [01:52] <@gravufo> yeah
  966.  
  967. [01:52] <@vividboarder> Yea. Thanks Jeffro_!!!!
  968.  
  969. [01:52] <@vividboarder> Should I open the floodgates? I guess he's gone.
  970.  
  971. [01:52] <@gravufo> uhhhhhhh
  972.  
  973. [01:52] <@Jason__> lol
  974.  
  975. [01:52] <@gravufo> wait a second
  976.  
  977. [01:52] <@gravufo> til the upload is over?
  978.  
  979. [01:52] <@Jason__> nah, let em cringe
  980.  
  981. [01:52] <+Introspection> pulled from recovery.log
  982.  
  983. [01:52] <@Jason__> lo
  984. l
  985. [01:52] <@vividboarder> It looks like it backed up fine in the log
  986.  
  987. [01:53] <+Introspection> ro.build.id=JZO54K ro.build.display.id=cm_mako-eng 4.1.2 JZO54K eng.dees_troy.20130408.210013 test-keys ro.build.version.incremental=eng.dees_troy.20130408.210013 ro.build.version.sdk=16 ro.build.version.codename=REL ro.build.version.release=4.1.2 ro.build.date=Mon Apr 8 21:00:28 UTC 2013
  988.  
  989. [01:53] <+Introspection> credit to irc user "adb", thanks
  990.  
  991. [01:53] <@gravufo> okay haha
  992.  
  993. [01:53] <@gravufo> question for you guys
  994.  
  995. [01:53] <@vividboarder> Fuck it. Power to the people!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement