My latest attempt at a capture...
I boot into recovery, do a factory wipe, push and run the root exploit, mount the internal SD card to /tmp/sd when I boot recovery and created a folder CleanDump, then I push this script and run it:
I've sanitized the script by commenting out the non-working stl devices. (They throw an Invalid Argument error) I'd be interested to see what files you captured off of what devices (bml vs stl).
After that completed I adb pull'd the files and use an Ubuntu VM to mount up the rfs files, they seem to mount okay, I was able to browse them and open a few .ogg files and read some text files.
Are you capturing yours in a fully booted state or in recovery?
Edit: btw, the ones that would only capture with bml make sense, they aren't filesystem images, but rather binaries from what I can tell.
Edit 2: Assuming all of those captures are correct, I assembled a tar following what you did for the T-Mobile dump using:
I'm still weary on trying it on my own Tab... anyone interested in trying it once it is posted? (I do not want to go into an AT&T store again with a broken Tab...)
I boot into recovery, do a factory wipe, push and run the root exploit, mount the internal SD card to /tmp/sd when I boot recovery and created a folder CleanDump, then I push this script and run it:
Code:
#Capture known devices
dd if=/dev/block/bml1 of=/tmp/sd/CleanDump/boot.bin bs=4096
dd if=/dev/block/bml2 of=/tmp/sd/CleanDump/pit.pit bs=4096
dd if=/dev/block/bml4 of=/tmp/sd/CleanDump/Sbl.bin bs=4096
dd if=/dev/block/stl6 of=/tmp/sd/CleanDump/param.lfs bs=4096
dd if=/dev/block/bml7 of=/tmp/sd/CleanDump/zImage bs=4096
dd if=/dev/block/stl9 of=/tmp/sd/CleanDump/factoryfs.rfs bs=4096
dd if=/dev/block/stl10 of=/tmp/sd/CleanDump/dbdata.rfs bs=4096
dd if=/dev/block/stl11 of=/tmp/sd/CleanDump/cache.rfs bs=4096
dd if=/dev/block/bml12 of=/tmp/sd/CleanDump/modem.bin bs=4096
#Non-working stl captures of known devices
#dd if=/dev/block/stl1 of=/tmp/sd/CleanDump/boot.stl.bin bs=4096 #INVALID ARGUMENT
#dd if=/dev/block/stl2 of=/tmp/sd/CleanDump/pit..stl.pit bs=4096 #INVALID ARGUMENT
#dd if=/dev/block/stl4 of=/tmp/sd/CleanDump/Sbl.bin bs=4096 #INVALID ARGUMENT
#dd if=/dev/block/stl12 of=/tmp/sd/CleanDump/modem.bin bs=4096 #INVALID ARGUMENT
#dd if=/dev/block/stl7 of=/tmp/sd/CleanDump/zImage bs=4096 #INVALID ARGUMENT
#Capture unknown devices
dd if=/dev/block/stl3 of=/tmp/sd/CleanDump/stl3.dump bs=4096
dd if=/dev/block/bml8 of=/tmp/sd/CleanDump/bml8.dump bs=4096
dd if=/dev/block/bml5 of=/tmp/sd/CleanDump/bml5.dump bs=4096
#Non-working stl captures of known devices
#dd if=/dev/block/stl8 of=/tmp/sd/CleanDump/stl8.dump bs=4096 #INVALID ARGUMENT
#dd if=/dev/block/stl5 of=/tmp/sd/CleanDump/stl5.dump bs=4096 #INVALID ARGUMENT
I've sanitized the script by commenting out the non-working stl devices. (They throw an Invalid Argument error) I'd be interested to see what files you captured off of what devices (bml vs stl).
After that completed I adb pull'd the files and use an Ubuntu VM to mount up the rfs files, they seem to mount okay, I was able to browse them and open a few .ogg files and read some text files.
Are you capturing yours in a fully booted state or in recovery?
Edit: btw, the ones that would only capture with bml make sense, they aren't filesystem images, but rather binaries from what I can tell.
Edit 2: Assuming all of those captures are correct, I assembled a tar following what you did for the T-Mobile dump using:
Code:
tar --format=ustar -cf ATT_STOCK.tar cache.rfs dbdata.rfs factoryfs.rfs modem.bin param.lfs zImage
Last edited: