JB Update file (for devs to verify)

jgaf

Senior Member
Aug 14, 2011
1,229
389
0
Tampa
Ok guys I managed to identify a file in /root/cache that was downloaded when downloading the firmware straight from the tablet. The file is named "dlpkgfile" and its about 230Mbs, hopefully this can help some ppl. I don't recommend you use this file if you aren't a dev, since I don't know if it can do something bad to your tablet. I have no knowledge of this type of thing, just trying to give a helping hand....

Anyways I uploaded it to my dropbox, so please only devs download it for now I don't want to get a lot of traffic in my dropbox and be shutdown or something lol :p

My dropbox public link was taken down due to excessive traffic, there are a couple of mirrors around the thread.
 
Last edited:

rumspringa9

Member
Jul 27, 2012
7
15
0
Isn't there a way to DL into my own dropbox from yours? That should (at least in my mind) not count as downloads right?

Either way I'm waiting for someone much braver than I to grab this and explain how to flash it. By that time I'm sure it'll be rehosted somewhere else
 

loganmc10

Senior Member
Feb 3, 2011
198
356
0
Just wait till it gets posted on Asus's site, that's what I'll be doing...

Sent from my Transformer Pad TF300T using xda app-developers app
 

sparky28000

Senior Member
May 30, 2008
72
12
0
Pretty sure you can just rename it to *.zip and flash it through the recovery.

All the files from the folder patch need to lose their .p suffix and go in /system before you flash it.
 
Last edited:

xaueious

Senior Member
Dec 17, 2009
981
176
0
Toronto
This should help ppl force the update coming from US firmware I think: http://forum.xda-developers.com/showthread.php?t=1803090

You need almost an intact /system to flash this.

assert(file_getprop("/system/build.prop", "ro.build.fingerprint") == "asus/US_epad/EeePad:4.0.3/IML74K/US_epad-9.4.3.30-20120604:user/release-keys" ||
file_getprop("/system/build.prop", "ro.build.fingerprint") == "asus/US_epad/EeePad:4.1.1/JRO03C/US_epad-10.4.2.9-20120809:user/release-keys");
assert(getprop("ro.product.device") == "EeePad" ||
getprop("ro.build.product") == "EeePad");
This is a diff patch update.zip.
 
  • Like
Reactions: Drgravy

sparky28000

Senior Member
May 30, 2008
72
12
0
Whatever you do DO NOT flash the blob from the dlpkgfile on a WW tf300. This will leave you with an us bootloader and for some reason I can't seem boot into the recovery after flashing. And I cannot flash any blob because it says the blob has an invalid signature.

Pretty much stuck here right now... I think I'll have to wait until jb is on the asus website.
 
Last edited:
  • Like
Reactions: untermensch

sparky28000

Senior Member
May 30, 2008
72
12
0
How did you flash the blob alone?

Which firmware did you come from?
Flashed the blob via fastboot (fastboot -i 0x0B05 flash boot blob) I didn't think it would flash a whole new bootloader. And I came from WW 9.4.3.30. I can't reflash the old bootloader because fastboot doesn't want to actually flash it even though it says everything went okay.
 

xaueious

Senior Member
Dec 17, 2009
981
176
0
Toronto
Flashed the blob via fastboot I didn't think it would flash a whole new bootloader. And I came from WW 9.4.3.30.
Well I think I'll be fine. I converted my WW to US 9.4.3.30 and am now flashing the dlpkgfile using the method I linked to.

I am not bootloader unlocked.

Quick glance at update-script seems to indicate that it shouldn't remove root from a rooted device running 9.4.3.30, but I'm not sure what's in the blob.
 

sparky28000

Senior Member
May 30, 2008
72
12
0
Well I think I'll be fine. I converted my WW to US 9.4.3.30 and am now flashing the dlpkgfile using the method I linked to.

I am not bootloader unlocked.
I hope so.

---------- Post added at 08:45 PM ---------- Previous post was at 08:43 PM ----------

Well I think I'll be fine. I converted my WW to US 9.4.3.30 and am now flashing the dlpkgfile using the method I linked to.

I am not bootloader unlocked.

Quick glance at update-script seems to indicate that it shouldn't remove root from a rooted device running 9.4.3.30, but I'm not sure what's in the blob.
The blob contains a boot.img, recovery.img and bootloader.img.