Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
ok
as i mentioned before...
and now that the device has its USB port back to live.... is there any way i could access to the files that ARE in the memory?
fastboot erase userdata
fastboot flash userdata userdata.img
What exactly are you hoping to recover? Because we are dealing with a non-booting system, this is all in the realm of "it might work, but..." There are no guarantees.
I read back through James' posts and i didn't see and magical backup solution. I think what he was getting at was installing a custom recovery partition like TWRP the would allow you to make a nandroid backup. What this is is a complete image of your device at the time the backup is made which you can then copy to an external storage device (sd card or PC) to keep it safe. If your tablet would then flake out like it is now, you could simply restore the nandroid and it would put your tablet back to it's functioning state. Of course, any files, data or apps added or changed since the backup was made would be lost.
Honestly, nandroids are better for developers who are constantly flashing different ROM's to their devices for testing. There are better ways to safeguard your data. But, again this is all going forward. The best we could hope for at this point is anything stored to the userdata partition.
You're a saint, Luna.
Since the tablet was/is not rooted--and I'm pretty sure the OP didn't have the bootloader unlocked--in order to boot or flash a custom recovery that would allow you to use adb to perform file recovery, the OP would first have to unlock the device (bootloader), which would auto-wipe whatever data is on there.
Catch-22, I'm afraid....so data recovery is not really possible with a locked bootloader and a stock recovery (unless Android is booting, which it is not in this case).
This page contains OTA binary image files that allow you to manually update your Nexus devices. This has the same effect of flashing the corresponding factory images, but without the need of wiping the device.
Also, for the record, I own a 2012 (1st gen) Nexus 7 and have purchased three 2nd gen/2013 Nexus 7 tablets (for wife, daughter, and son) and all work flawlessly.
It's unfortunate @Kharl, that you're having issues with your particular device, but my experience w/the Nexus 7 line has been nothing but positive.
Cheers and best of luck--you're in extremely capable hands with our very good friend @lunatic59.
You might go HERE and download the latest OTA image for your device.
This just requires adb and will work even with a locked bootloader.
The instructions are in the link but it would basically just require you to put the phone into recovery mode. Then within recovery put the device in adb sideload mode and issue a command to apply the update.
It may or may not work but it might be worth a try if you have adb working and a locked bootloader.
Honestly, i have no idea. I haven't had anyone try these yet as most of the time factory images are used.
It's my (limited) understanding that these are different than the standard ota zips that actually arrive over the air that people save and sideload. These are a full package and a sort of equivalent/alternative to a factory image. Based on the information I have, I would assume that it will overwrite the same as reflashing a factory image would.
Here is the original article I had read about it: http://www.androidpolice.com/2016/0...s-for-nexus-devices-alongside-factory-images/
@Brian706 and @lunatic59, I believe these OTAs are "block-based" OTAs that do indeed act as factory images and not OTAs that patch your files--i.e., they write/overwrite the blocks of your partitions and therefore "fix" issues folks have with bootloops (where a single mucked-up file in your /system partition could indeed cause that behavior).
I've not downloaded one to double-check this (at work at the moment), but I'll download and examine one tonight when I get home.
(!less_than_int(1461018176, getprop("ro.build.date.utc"))) || abort("Can't install this package (Mon Apr 18 22:22:56 UTC 2016) over newer build (" + getprop("ro.build.date") + ").");
getprop("ro.product.device") == "flo" || abort("This package is for \"flo\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Target: google/razor/flo:6.0.1/MOB30J/2775141:user/release-keys");
show_progress(0.750000, 0);
ui_print("Patching system image unconditionally...");
block_image_update("/dev/block/platform/msm_sdcc.1/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat");
ui_print("Verifying the updated system image...");
if range_sha1("/dev/block/platform/msm_sdcc.1/by-name/system", "30,0,32770,32825,32827,33307,65535,65536,65538,66018,98303,98304,98306,98361,98363,98843,131071,131072,131074,131554,162726,163840,163842,163897,163899,164379,196607,196608,196610,197090,215039") == "abb60169fc4a41b53023f9868c381910b2537fc9" then
if range_sha1("/dev/block/platform/msm_sdcc.1/by-name/system", "32,32770,32825,32827,33307,65535,65536,65538,66018,98303,98304,98306,98361,98363,98843,131071,131072,131074,131554,162726,163238,163328,163840,163842,163897,163899,164379,196607,196608,196610,197090,215039,215040") == "00982d341164911bd1d15ef2f99df20f3a653d15" then
ui_print("Verified the updated system image.");
else
abort("system partition has unexpected non-zero contents after OTA update");
endif;
else
abort("system partition has unexpected contents after OTA update");
endif;
show_progress(0.050000, 5);
package_extract_file("boot.img", "/dev/block/platform/msm_sdcc.1/by-name/boot");
show_progress(0.200000, 10);
ui_print("Writing bootloader...");
package_extract_file("bootloader-flag.txt", "/dev/block/platform/msm_sdcc.1/by-name/misc");
package_extract_file("bootloader.sbl2.img", "/dev/block/platform/msm_sdcc.1/by-name/sbl2");
package_extract_file("bootloader.sbl3.img", "/dev/block/platform/msm_sdcc.1/by-name/sbl3");
package_extract_file("bootloader.tz.img", "/dev/block/platform/msm_sdcc.1/by-name/tz");
package_extract_file("bootloader.rpm.img", "/dev/block/platform/msm_sdcc.1/by-name/rpm");
package_extract_file("bootloader.aboot.img", "/dev/block/platform/msm_sdcc.1/by-name/aboot");
package_extract_file("bootloader-flag-clear.txt", "/dev/block/platform/msm_sdcc.1/by-name/misc");
package_extract_file("bootloader.sbl2.img", "/dev/block/platform/msm_sdcc.1/by-name/sbl2b");
package_extract_file("bootloader.sbl3.img", "/dev/block/platform/msm_sdcc.1/by-name/sbl3b");
package_extract_file("bootloader.tz.img", "/dev/block/platform/msm_sdcc.1/by-name/tzb");
package_extract_file("bootloader.rpm.img", "/dev/block/platform/msm_sdcc.1/by-name/rpmb");
package_extract_file("bootloader.aboot.img", "/dev/block/platform/msm_sdcc.1/by-name/abootb");
ui_print("Writing DDR...");
package_extract_file("DDR.bin", "/dev/block/platform/msm_sdcc.1/by-name/DDR");
set_progress(1.000000);