Creating a System Dump for Coby Kyros MID7034-4

Discussion in 'Coby Generation 3 Development' started by popinman322, Nov 24, 2012.

  1. popinman322

    popinman322 Member

    Joined:
    Nov 24, 2012
    Messages:
    22
    Likes Received:
    4
    Trophy Points:
    62
    Tablet / Device:
    Coby Kyros MID7034-4
    Please forgive me, I'm new to Android(I just got my tablet today @_@), but I've just rooted my tablet and installed GApps via jjjacer's thread.

    How would I go about creating a system dump for my tablet at this point?
     
  2. vampirefo.

    vampirefo. Senior Member Developer

    Joined:
    Nov 8, 2011
    Messages:
    3,828
    Likes Received:
    1,389
    Trophy Points:
    655
    Location:
    Huntington WV
    Tablet / Device:
    Leagoo Lead 1 ZTE OPEN C, Coby 7065, Coby 8042, Coby 9740
    Dang, wished you would have waited and made the backup first before installing gapps.
     
  3. popinman322

    popinman322 Member

    Joined:
    Nov 24, 2012
    Messages:
    22
    Likes Received:
    4
    Trophy Points:
    62
    Tablet / Device:
    Coby Kyros MID7034-4
    Would it still be possible to make a (useful)system dump?
     
  4. vampirefo.

    vampirefo. Senior Member Developer

    Joined:
    Nov 8, 2011
    Messages:
    3,828
    Likes Received:
    1,389
    Trophy Points:
    655
    Location:
    Huntington WV
    Tablet / Device:
    Leagoo Lead 1 ZTE OPEN C, Coby 7065, Coby 8042, Coby 9740
    • Like Like x 2
  5. popinman322

    popinman322 Member

    Joined:
    Nov 24, 2012
    Messages:
    22
    Likes Received:
    4
    Trophy Points:
    62
    Tablet / Device:
    Coby Kyros MID7034-4
    shell@android:/ # mount
    rootfs / rootfs ro,relatime 0 0
    tmpfs /dev tmpfs rw,nosuid,relatime,mode=755 0 0
    devpts /dev/pts devpts rw,relatime,mode=600 0 0
    proc /proc proc rw,relatime 0 0
    sysfs /sys sysfs rw,relatime 0 0
    none /acct cgroup rw,relatime,cpuacct 0 0
    tmpfs /mnt/asec tmpfs rw,relatime,mode=755,gid=1000 0 0
    tmpfs /mnt/obb tmpfs rw,relatime,mode=755,gid=1000 0 0
    none /dev/cpuctl cgroup rw,relatime,cpu 0 0
    /dev/block/mtdblock2 /system yaffs2 rw,relatime 0 0
    /dev/block/mtdblock5 /data yaffs2 rw,nosuid,nodev,relatime 0 0
    /dev/block/mtdblock4 /cache yaffs2 rw,nosuid,nodev,relatime 0 0
    /sys/kernel/debug /sys/kernel/debug debugfs rw,relatime 0 0
    /dev/block/vold/240:1 /mnt/sdcard vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0
    /dev/block/vold/240:1 /mnt/secure/asec vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0
    tmpfs /mnt/sdcard/.android_secure tmpfs ro,relatime,size=0k,mode=000 0 0


    shell@android:/ # cat /proc/partitions
    major minor #blocks name

    31 0 10240 mtdblock0
    31 1 5120 mtdblock1
    31 2 389120 mtdblock2
    31 3 4096 mtdblock3
    31 4 524288 mtdblock4
    31 5 1572864 mtdblock5
    31 6 10240 mtdblock6
    31 7 1024 mtdblock7
    31 8 1024 mtdblock8
    240 0 1421312 ndda
    240 1 1421296 ndda1


    shell@android:/ # cat /proc/mtd
    dev: size erasesize name
    mtd0: 00a00000 00100000 "boot"
    mtd1: 00500000 00100000 "kpanic"
    mtd2: 17c00000 00100000 "system"
    mtd3: 00400000 00100000 "splash"
    mtd4: 20000000 00100000 "cache"
    mtd5: 60000000 00100000 "userdata"
    mtd6: 00a00000 00100000 "recovery"
    mtd7: 00100000 00100000 "misc"
    mtd8: 00100000 00100000 "tcc"


    shell@android:/ # busybox df -h
    Filesystem Size Used Available Use% Mounted on
    tmpfs 188.9M 32.0K 188.9M 0% /dev
    tmpfs 188.9M 0 188.9M 0% /mnt/asec
    tmpfs 188.9M 0 188.9M 0% /mnt/obb
    /dev/block/mtdblock2 380.0M 260.5M 119.5M 69% /system
    /dev/block/mtdblock5 1.5G 189.2M 1.3G 12% /data
    /dev/block/mtdblock4 512.0M 9.0M 503.0M 2% /cache
    /dev/block/vold/240:1
    1.4G 205.4M 1.2G 15% /mnt/sdcard
    /dev/block/vold/240:1
    1.4G 205.4M 1.2G 15% /mnt/secure/asec


    shell@android:/ # lsmod
    wlan 523226 0 - Live 0xbf26b000
    vpu_encoder 4955 0 - Live 0xbf266000
    vpu_decoder_ext 6938 0 - Live 0xbf261000
    vpu_decoder 6896 0 - Live 0xbf25c000
    vpu_manager 432530 3 vpu_encoder,vpu_decoder_ext,vpu_decoder, Live 0xbf1ed000
    ufsd 378330 0 - Live 0xbf17e000 (P)
    tcc_ndd 7292 2 - Live 0xbf178000 (P)
    tcc_mtd 7058 6 - Live 0xbf173000
    tcc_nand 1471169 2 tcc_ndd,tcc_mtd, Live 0xbf000000 (P)

    I'm assuming that you want the system tar pulled, so I'm doing that right now.
     
    • Like Like x 2
  6. vampirefo.

    vampirefo. Senior Member Developer

    Joined:
    Nov 8, 2011
    Messages:
    3,828
    Likes Received:
    1,389
    Trophy Points:
    655
    Location:
    Huntington WV
    Tablet / Device:
    Leagoo Lead 1 ZTE OPEN C, Coby 7065, Coby 8042, Coby 9740
    Yes, pull the system, your info looks good give me a few minutes to read it.
     
  7. vampirefo.

    vampirefo. Senior Member Developer

    Joined:
    Nov 8, 2011
    Messages:
    3,828
    Likes Received:
    1,389
    Trophy Points:
    655
    Location:
    Huntington WV
    Tablet / Device:
    Leagoo Lead 1 ZTE OPEN C, Coby 7065, Coby 8042, Coby 9740
    cat /dev/mtd/mtd6 > /sdcard/dump/recovery.img

    cat /dev/mtd/mtd0 > /sdcard/dump/boot.img

    cat /dev/mtd/mtd2 > /sdcard/dump/system.img

    cat /dev/mtd/mtd5 > /sdcard/dump/userdata.img read note below

    upload all but userdata.img

    Note#
    userdata.img is your personal information don't share with anyone, you don't even need to make a userdata.img, I just put the command there for your personal use.

    for right now just skip it, once you get files uploaded you can then make it for yourself if you want.
     
    Last edited: Nov 24, 2012
    • Like Like x 2
  8. popinman322

    popinman322 Member

    Joined:
    Nov 24, 2012
    Messages:
    22
    Likes Received:
    4
    Trophy Points:
    62
    Tablet / Device:
    Coby Kyros MID7034-4
    7034_system.tar is at 20%.
    All relevant *.img files have been generated and pulled.

    Mediafire is OK, right?
     
    • Like Like x 2
  9. vampirefo.

    vampirefo. Senior Member Developer

    Joined:
    Nov 8, 2011
    Messages:
    3,828
    Likes Received:
    1,389
    Trophy Points:
    655
    Location:
    Huntington WV
    Tablet / Device:
    Leagoo Lead 1 ZTE OPEN C, Coby 7065, Coby 8042, Coby 9740
    yes, that's what I use for my files.
     
  10. popinman322

    popinman322 Member

    Joined:
    Nov 24, 2012
    Messages:
    22
    Likes Received:
    4
    Trophy Points:
    62
    Tablet / Device:
    Coby Kyros MID7034-4
    I've put everything but system.img in the following Mediafire folder, since system.img is above my allowance as a free user. I'll try splitting it into sections.

    My Files
     
    • Like Like x 2
  11. vampirefo.

    vampirefo. Senior Member Developer

    Joined:
    Nov 8, 2011
    Messages:
    3,828
    Likes Received:
    1,389
    Trophy Points:
    655
    Location:
    Huntington WV
    Tablet / Device:
    Leagoo Lead 1 ZTE OPEN C, Coby 7065, Coby 8042, Coby 9740
    Ok your system.tar boot.img and recovery.img are good.
     
  12. vampirefo.

    vampirefo. Senior Member Developer

    Joined:
    Nov 8, 2011
    Messages:
    3,828
    Likes Received:
    1,389
    Trophy Points:
    655
    Location:
    Huntington WV
    Tablet / Device:
    Leagoo Lead 1 ZTE OPEN C, Coby 7065, Coby 8042, Coby 9740
    What hard key buttons does this version have?

    Also do you know how to fastboot?
     
    Last edited: Nov 24, 2012
  13. vampirefo.

    vampirefo. Senior Member Developer

    Joined:
    Nov 8, 2011
    Messages:
    3,828
    Likes Received:
    1,389
    Trophy Points:
    655
    Location:
    Huntington WV
    Tablet / Device:
    Leagoo Lead 1 ZTE OPEN C, Coby 7065, Coby 8042, Coby 9740
    Note if you aren't comfortable doing this, you can wait for someone else to try it.

    Here is cw recovery for you to test.

    7034_recovery.zip

    download extract to same folder as fastboot

    boot tablet into fastboot

    adb shell

    su

    reboot bootloader

    fastboot boot CW_recovery.img

    this doesn't install recovery just allows you to boot into recovery and test it out.
     
    • Like Like x 2
  14. popinman322

    popinman322 Member

    Joined:
    Nov 24, 2012
    Messages:
    22
    Likes Received:
    4
    Trophy Points:
    62
    Tablet / Device:
    Coby Kyros MID7034-4
    Volume up + down, Power + Home

    And, no, I'm afraid I don't know how to fastboot. :/
     
    Last edited: Nov 24, 2012
    • Like Like x 2
  15. vampirefo.

    vampirefo. Senior Member Developer

    Joined:
    Nov 8, 2011
    Messages:
    3,828
    Likes Received:
    1,389
    Trophy Points:
    655
    Location:
    Huntington WV
    Tablet / Device:
    Leagoo Lead 1 ZTE OPEN C, Coby 7065, Coby 8042, Coby 9740
    No problem, you have done a great job, already. This thread can be used as an example for the other coby telechips tablets owners on what to do.

    Thank you
     

Share This Page

Search tags for this page
full dump for coby kyros
,
how to backup and restore android tablet on coby kyros mid7034
,

jazz c725 root benefits