Hey Folks,
My apologies if this should be in a different forum.
Read the "efffen-manual" when using the AAHK software. The unit went through about 7 minutes of scripts on option 1 (Hack Ace), then stopped in <waiting for device>. Been like this for now 20 minutes. Screen is black, unit appears to be off, Power button does nothing. Only orange charging light is blinking. Oh, and one other thing, When it got to this point, the windows system had a balloon popup about the Motorola (or did it say qualcom) device not recognized. Suggestions?
Here is the code thus far.
Ace Advanced Hack Kit [Linux/OSX/Windows] attn1 2011/2012
___________________________
MAIN MENU | |
| Only ONE Menu Step to: |
1 - Hack Ace <----------------------------+ * S-OFF |
| * SIM Unlock |
2 - DONATE (Encouraged, but optional) | * SuperCID |
http://psas.revskills.de/?q=goldcard | * Root |
http://www.eff.org/ | * Busybox |
| |
**********************************************************************
o - Options Menu (Return to Stock, Flash radios, etc)
**********************************************************************
t - Toggle Flash Method - current method is fastbootRUU
*********************************************************************
q - Quit
[Select and press Enter]1
/sdcard/PD98IMG.zip: No such file or directory
rm failed for /sdcard/PD98IMG.zip, No such file or directory
1867 KB/s (4359771 bytes in 2.279s)
pkg: /data/local/tmp/stericson.busybox-1.apk
Success
1878 KB/s (19240 bytes in 0.010s)
2596 KB/s (4564992 bytes in 1.717s)
2790 KB/s (3737600 bytes in 1.308s)
2644 KB/s (557962 bytes in 0.206s)
683 KB/s (9796 bytes in 0.014s)
2442 KB/s (572752 bytes in 0.229s)
2678 KB/s (134401 bytes in 0.049s)
909 KB/s (13968 bytes in 0.015s)
ro.build.version.release=2.3.3
Setting up for Gingerbread restore...
2554 KB/s (2801664 bytes in 1.071s)
2717 KB/s (2830336 bytes in 1.017s)
2407 KB/s (285981 bytes in 0.116s)
2685 KB/s (285981 bytes in 0.104s)
1 file(s) copied.
Linux version 2.6.35.10-gd2564fb ([email protected]) (gcc version 4.4.0 (GCC) )
#1 PREEMPT Thu Jun 9 14:33:05 CST 2011
Kernel version is Gingerbread... Using fre3vo to temproot...
fre3vo by #teamwin
Please wait...
Attempting to modify ro.secure property...
fb_fix_screeninfo:
id: msmfb
smem_start: 802160640
smem_len: 3145728
type: 0
type_aux: 0
visual: 2
xpanstep: 0
ypanstep: 1
line_length: 1920
mmio_start: 0
accel: 0
fb_var_screeninfo:
xres: 480
yres: 800
xres_virtual: 480
yres_virtual: 1600
xoffset: 0
yoffset: 0
bits_per_pixel: 32
activate: 16
height: 106
width: 62
rotate: 0
grayscale: 0
nonstd: 0
accel_flags: 0
pixclock: 0
left_margin: 0
right_margin: 0
upper_margin: 0
lower_margin: 0
hsync_len: 0
vsync_len: 0
sync: 0
vmode: 0
Buffer offset: 00000000
Buffer size: 8192
Scanning region faa90000...
Scanning region fab80000...
Scanning region fac70000...
Scanning region fad60000...
Scanning region fae50000...
Scanning region faf40000...
Scanning region fb030000...
Scanning region fb120000...
Scanning region fb210000...
Scanning region fb300000...
Scanning region fb3f0000...
Scanning region fb4e0000...
Scanning region fb5d0000...
Scanning region fb6c0000...
Scanning region fb7b0000...
Scanning region fb8a0000...
Scanning region fb990000...
Scanning region fba80000...
Scanning region fbb70000...
Potential exploit area found at address fbb80e00:200.
Exploiting device...
/dev/block/vold/179:65 /mnt/sdcard vfat rw,dirsync,nosuid,nodev,noexec,relatime,
uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharse
t=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0
tmpfs /mnt/sdcard/.android_secure tmpfs ro,relatime,size=0k,mode=000 0 0
HTC android goldcard tool Copyright (C) 2011, Wayne D. Hoxsie Jr.
Original code by B. Kerler. Special thanks to ATTN1 and the XDA team.
Donations can be made to the Electronic Frontier Foundation:
http://www.eff.org/
or to B. Kerler:
http://psas.revskills.de/
0+1 records in
0+1 records out
384 bytes transferred in 0.004 secs (96000 bytes/sec)
--set_version set. VERSION will be changed to: 1.31.405.6
Misc partition is "/dev/block/mmcblk0p17"
Patching and backing up misc partition...
Starting update process....
< waiting for device >
erasing 'cache'... OKAY [ 0.163s]
finished. total time: 0.164s
Be patient - sending update ...
sending 'zip' (18223 KB)... OKAY [ 3.071s]
writing 'zip'... INFOadopting the signature contained in this i
mage...
INFOsignature checking...
INFOzip header checking...
INFOzip info parsing...
INFOchecking model ID...
INFOchecking custom ID...
INFOchecking main version...
INFOstart image[boot] unzipping & flushing...
INFO[RUU]UZ,boot,0
INFO[RUU]UZ,boot,31
INFO[RUU]UZ,boot,68
INFO[RUU]UZ,boot,99
INFO[RUU]UZ,boot,100
INFO[RUU]WP,boot,0
INFO[RUU]WP,boot,100
INFOstart image[recovery] unzipping & flushing...
INFO[RUU]UZ,recovery,0
INFO[RUU]UZ,recovery,20
INFO[RUU]UZ,recovery,44
INFO[RUU]UZ,recovery,66
INFO[RUU]UZ,recovery,89
INFO[RUU]UZ,recovery,100
INFO[RUU]WP,recovery,0
INFO[RUU]WP,recovery,100
INFOstart image[radio] unzipping & flushing...
INFO[RUU]UZ,radio,0
INFO[RUU]UZ,radio,8
INFO[RUU]UZ,radio,13
INFO[RUU]UZ,radio,20
INFO[RUU]UZ,radio,25
INFO[RUU]UZ,radio,33
INFO[RUU]UZ,radio,41
INFO[RUU]UZ,radio,49
INFO[RUU]UZ,radio,57
INFO[RUU]UZ,radio,62
INFO[RUU]UZ,radio,70
INFO[RUU]UZ,radio,79
INFO[RUU]UZ,radio,86
INFO[RUU]UZ,radio,94
INFO[RUU]UZ,radio,99
INFO[RUU]UZ,radio,100
INFO[RUU]WP,radio,0
INFO[RUU]WP,radio,6
INFO[RUU]WP,radio,14
INFO[RUU]WP,radio,19
INFO[RUU]WP,radio,27
INFO[RUU]WP,radio,36
INFO[RUU]WP,radio,44
INFO[RUU]WP,radio,51
INFO[RUU]WP,radio,59
INFO[RUU]WP,radio,68
INFO[RUU]WP,radio,76
INFO[RUU]WP,radio,85
INFO[RUU]WP,radio,95
INFO[RUU]WP,radio,100
OKAY [108.400s]
finished. total time: 111.472s
rebooting...
finished. total time: 0.172s
Radio downgrade complete - starting next process - please be patient...
Linux version 2.6.32.21-gf3f553d ([email protected]) (gcc version 4.4.0 (GCC) )
#1 PREEMPT Thu Oct 28 13:24:11 CST 2010
major abra-cadabra going on, please be patient.....
--secu_flag off set
--cid set. CID will be changed to: 11111111
--sim_unlock. SIMLOCK will be removed
Section header entry size: 40
Number of section headers: 44
Total section header table size: 1760
Section header file offset: 0x000138b4 (80052)
Section index for section name string table: 41
String table offset: 0x000136fb (79611)
Searching for .modinfo section...
- Section[16]: .modinfo
-- offset: 0x00000a14 (2580)
-- size: 0x000000cc (204)
Kernel release: 2.6.32.21-gf3f553d
New .modinfo section size: 204
Attempting to power cycle eMMC... OK.
Searching for mmc_blk_issue_rq symbol...
- Address: c02a9e00, type: t, name: mmc_blk_issue_rq, module: N/A
Kernel map base: 0xc02a9000
Kernel memory mapped to 0x40000000
Searching for brq filter...
- Address: 0xc02a9e00 + 0x34c
- 0x2a000012 -> 0xea000012
Patching and backing up partition 7...
Error opening copy file.
Error opening copy file.
^^^^^^^^^^^^
I- NORMAL ERROR HERE -I
patience - rebooting
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
--secu_flag off set
--cid set. CID will be changed to: 11111111
--sim_unlock. SIMLOCK will be removed
Section header entry size: 40
Number of section headers: 44
Total section header table size: 1760
Section header file offset: 0x000138b4 (80052)
Section index for section name string table: 41
String table offset: 0x000136fb (79611)
Searching for .modinfo section...
- Section[16]: .modinfo
-- offset: 0x00000a14 (2580)
-- size: 0x000000cc (204)
Kernel release: 2.6.32.21
New .modinfo section size: 196
Attempting to power cycle eMMC... OK.
Searching for mmc_blk_issue_rq symbol...
- Address: c02db21c, type: t, name: mmc_blk_issue_rq, module: N/A
Kernel map base: 0xc02db000
Kernel memory mapped to 0x40009000
Searching for brq filter...
- Address: 0xc02db21c + 0x34c
- 0x2a000012 -> 0xea000012
Patching and backing up partition 7...
patching secu_flag: 0
Done.
board_spade.disable_uart2=0 board_spade.usb_h2w_sw=0 board_spade.disable_sdcard=
0 diag.enabled=0 board_spade.debug_uart=0 smisize=0 userdata_sel=0 androidboot.e
mmc=true androidboot.baseband=26.03.02.26_M androidboot.cid=CWS__001 androidboo
t.batt_poweron=good_battery androidboot.carrier=ATT androidboot.mid=PD9812000 en
able_zcharge=1 androidboot.keycaps=qwerty androidboot.mode=recovery androidboot.
serialno=HT14JT200132 androidboot.bootloader=0.85.0024 zygote_oneshot=off kmemle
ak=off no_console_suspend=1
push: tools/afr/system/app/Superuser.apk -> /system/app/Superuser.apk
push: tools/afr/system/bin/su -> /system/bin/su
2 files pushed. 0 files skipped.
2045 KB/s (609587 bytes in 0.291s)
dmagent mmcamera_test su
dmesg monkey surfaceflinger
ifconfig printenv wpa_supplicant
S-OFF, ROOT and Clockworkmod recovery complete
Be patient - installing updated radio and AAHK ENG Hboot...
Starting update process....
< waiting for device >
Greech said:
Hey Folks,
My apologies if this should be in a different forum.
Read the "efffen-manual" when using the AAHK software. The unit went through about 7 minutes of scripts on option 1 (Hack Ace), then stopped in <waiting for device>. Been like this for now 20 minutes. Screen is black, unit appears to be off, Power button does nothing. Only orange charging light is blinking. Oh, and one other thing, When it got to this point, the windows system had a balloon popup about the Motorola (or did it say qualcom) device not recognized. Suggestions?
Here is the code thus far.
Ace Advanced Hack Kit [Linux/OSX/Windows] attn1 2011/2012
___________________________
MAIN MENU | |
| Only ONE Menu Step to: |
1 - Hack Ace <----------------------------+ * S-OFF |
| * SIM Unlock |
2 - DONATE (Encouraged, but optional) | * SuperCID |
http://psas.revskills.de/?q=goldcard | * Root |
http://www.eff.org/ | * Busybox |
| |
**********************************************************************
o - Options Menu (Return to Stock, Flash radios, etc)
**********************************************************************
t - Toggle Flash Method - current method is fastbootRUU
*********************************************************************
q - Quit
[Select and press Enter]1
/sdcard/PD98IMG.zip: No such file or directory
rm failed for /sdcard/PD98IMG.zip, No such file or directory
1867 KB/s (4359771 bytes in 2.279s)
pkg: /data/local/tmp/stericson.busybox-1.apk
Success
1878 KB/s (19240 bytes in 0.010s)
2596 KB/s (4564992 bytes in 1.717s)
2790 KB/s (3737600 bytes in 1.308s)
2644 KB/s (557962 bytes in 0.206s)
683 KB/s (9796 bytes in 0.014s)
2442 KB/s (572752 bytes in 0.229s)
2678 KB/s (134401 bytes in 0.049s)
909 KB/s (13968 bytes in 0.015s)
ro.build.version.release=2.3.3
Setting up for Gingerbread restore...
2554 KB/s (2801664 bytes in 1.071s)
2717 KB/s (2830336 bytes in 1.017s)
2407 KB/s (285981 bytes in 0.116s)
2685 KB/s (285981 bytes in 0.104s)
1 file(s) copied.
Linux version 2.6.35.10-gd2564fb ([email protected]) (gcc version 4.4.0 (GCC) )
#1 PREEMPT Thu Jun 9 14:33:05 CST 2011
Kernel version is Gingerbread... Using fre3vo to temproot...
fre3vo by #teamwin
Please wait...
Attempting to modify ro.secure property...
fb_fix_screeninfo:
id: msmfb
smem_start: 802160640
smem_len: 3145728
type: 0
type_aux: 0
visual: 2
xpanstep: 0
ypanstep: 1
line_length: 1920
mmio_start: 0
accel: 0
fb_var_screeninfo:
xres: 480
yres: 800
xres_virtual: 480
yres_virtual: 1600
xoffset: 0
yoffset: 0
bits_per_pixel: 32
activate: 16
height: 106
width: 62
rotate: 0
grayscale: 0
nonstd: 0
accel_flags: 0
pixclock: 0
left_margin: 0
right_margin: 0
upper_margin: 0
lower_margin: 0
hsync_len: 0
vsync_len: 0
sync: 0
vmode: 0
Buffer offset: 00000000
Buffer size: 8192
Scanning region faa90000...
Scanning region fab80000...
Scanning region fac70000...
Scanning region fad60000...
Scanning region fae50000...
Scanning region faf40000...
Scanning region fb030000...
Scanning region fb120000...
Scanning region fb210000...
Scanning region fb300000...
Scanning region fb3f0000...
Scanning region fb4e0000...
Scanning region fb5d0000...
Scanning region fb6c0000...
Scanning region fb7b0000...
Scanning region fb8a0000...
Scanning region fb990000...
Scanning region fba80000...
Scanning region fbb70000...
Potential exploit area found at address fbb80e00:200.
Exploiting device...
/dev/block/vold/179:65 /mnt/sdcard vfat rw,dirsync,nosuid,nodev,noexec,relatime,
uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharse
t=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0
tmpfs /mnt/sdcard/.android_secure tmpfs ro,relatime,size=0k,mode=000 0 0
HTC android goldcard tool Copyright (C) 2011, Wayne D. Hoxsie Jr.
Original code by B. Kerler. Special thanks to ATTN1 and the XDA team.
Donations can be made to the Electronic Frontier Foundation:
http://www.eff.org/
or to B. Kerler:
http://psas.revskills.de/
0+1 records in
0+1 records out
384 bytes transferred in 0.004 secs (96000 bytes/sec)
--set_version set. VERSION will be changed to: 1.31.405.6
Misc partition is "/dev/block/mmcblk0p17"
Patching and backing up misc partition...
Starting update process....
< waiting for device >
erasing 'cache'... OKAY [ 0.163s]
finished. total time: 0.164s
Be patient - sending update ...
sending 'zip' (18223 KB)... OKAY [ 3.071s]
writing 'zip'... INFOadopting the signature contained in this i
mage...
INFOsignature checking...
INFOzip header checking...
INFOzip info parsing...
INFOchecking model ID...
INFOchecking custom ID...
INFOchecking main version...
INFOstart image[boot] unzipping & flushing...
INFO[RUU]UZ,boot,0
INFO[RUU]UZ,boot,31
INFO[RUU]UZ,boot,68
INFO[RUU]UZ,boot,99
INFO[RUU]UZ,boot,100
INFO[RUU]WP,boot,0
INFO[RUU]WP,boot,100
INFOstart image[recovery] unzipping & flushing...
INFO[RUU]UZ,recovery,0
INFO[RUU]UZ,recovery,20
INFO[RUU]UZ,recovery,44
INFO[RUU]UZ,recovery,66
INFO[RUU]UZ,recovery,89
INFO[RUU]UZ,recovery,100
INFO[RUU]WP,recovery,0
INFO[RUU]WP,recovery,100
INFOstart image[radio] unzipping & flushing...
INFO[RUU]UZ,radio,0
INFO[RUU]UZ,radio,8
INFO[RUU]UZ,radio,13
INFO[RUU]UZ,radio,20
INFO[RUU]UZ,radio,25
INFO[RUU]UZ,radio,33
INFO[RUU]UZ,radio,41
INFO[RUU]UZ,radio,49
INFO[RUU]UZ,radio,57
INFO[RUU]UZ,radio,62
INFO[RUU]UZ,radio,70
INFO[RUU]UZ,radio,79
INFO[RUU]UZ,radio,86
INFO[RUU]UZ,radio,94
INFO[RUU]UZ,radio,99
INFO[RUU]UZ,radio,100
INFO[RUU]WP,radio,0
INFO[RUU]WP,radio,6
INFO[RUU]WP,radio,14
INFO[RUU]WP,radio,19
INFO[RUU]WP,radio,27
INFO[RUU]WP,radio,36
INFO[RUU]WP,radio,44
INFO[RUU]WP,radio,51
INFO[RUU]WP,radio,59
INFO[RUU]WP,radio,68
INFO[RUU]WP,radio,76
INFO[RUU]WP,radio,85
INFO[RUU]WP,radio,95
INFO[RUU]WP,radio,100
OKAY [108.400s]
finished. total time: 111.472s
rebooting...
finished. total time: 0.172s
Radio downgrade complete - starting next process - please be patient...
Linux version 2.6.32.21-gf3f553d ([email protected]) (gcc version 4.4.0 (GCC) )
#1 PREEMPT Thu Oct 28 13:24:11 CST 2010
major abra-cadabra going on, please be patient.....
--secu_flag off set
--cid set. CID will be changed to: 11111111
--sim_unlock. SIMLOCK will be removed
Section header entry size: 40
Number of section headers: 44
Total section header table size: 1760
Section header file offset: 0x000138b4 (80052)
Section index for section name string table: 41
String table offset: 0x000136fb (79611)
Searching for .modinfo section...
- Section[16]: .modinfo
-- offset: 0x00000a14 (2580)
-- size: 0x000000cc (204)
Kernel release: 2.6.32.21-gf3f553d
New .modinfo section size: 204
Attempting to power cycle eMMC... OK.
Searching for mmc_blk_issue_rq symbol...
- Address: c02a9e00, type: t, name: mmc_blk_issue_rq, module: N/A
Kernel map base: 0xc02a9000
Kernel memory mapped to 0x40000000
Searching for brq filter...
- Address: 0xc02a9e00 + 0x34c
- 0x2a000012 -> 0xea000012
Patching and backing up partition 7...
Error opening copy file.
Error opening copy file.
^^^^^^^^^^^^
I- NORMAL ERROR HERE -I
patience - rebooting
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
--secu_flag off set
--cid set. CID will be changed to: 11111111
--sim_unlock. SIMLOCK will be removed
Section header entry size: 40
Number of section headers: 44
Total section header table size: 1760
Section header file offset: 0x000138b4 (80052)
Section index for section name string table: 41
String table offset: 0x000136fb (79611)
Searching for .modinfo section...
- Section[16]: .modinfo
-- offset: 0x00000a14 (2580)
-- size: 0x000000cc (204)
Kernel release: 2.6.32.21
New .modinfo section size: 196
Attempting to power cycle eMMC... OK.
Searching for mmc_blk_issue_rq symbol...
- Address: c02db21c, type: t, name: mmc_blk_issue_rq, module: N/A
Kernel map base: 0xc02db000
Kernel memory mapped to 0x40009000
Searching for brq filter...
- Address: 0xc02db21c + 0x34c
- 0x2a000012 -> 0xea000012
Patching and backing up partition 7...
patching secu_flag: 0
Done.
board_spade.disable_uart2=0 board_spade.usb_h2w_sw=0 board_spade.disable_sdcard=
0 diag.enabled=0 board_spade.debug_uart=0 smisize=0 userdata_sel=0 androidboot.e
mmc=true androidboot.baseband=26.03.02.26_M androidboot.cid=CWS__001 androidboo
t.batt_poweron=good_battery androidboot.carrier=ATT androidboot.mid=PD9812000 en
able_zcharge=1 androidboot.keycaps=qwerty androidboot.mode=recovery androidboot.
serialno=HT14JT200132 androidboot.bootloader=0.85.0024 zygote_oneshot=off kmemle
ak=off no_console_suspend=1
push: tools/afr/system/app/Superuser.apk -> /system/app/Superuser.apk
push: tools/afr/system/bin/su -> /system/bin/su
2 files pushed. 0 files skipped.
2045 KB/s (609587 bytes in 0.291s)
dmagent mmcamera_test su
dmesg monkey surfaceflinger
ifconfig printenv wpa_supplicant
S-OFF, ROOT and Clockworkmod recovery complete
Be patient - installing updated radio and AAHK ENG Hboot...
Starting update process....
< waiting for device >
Click to expand...
Click to collapse
Please come to the IRC channel in my signature. That is Hack Kit support channel
Bricked n suckss
i need help my htc inspire was in process of rooting w/t ace hackn power went out on installing radio100 and its stayed on black backround w/t rooted HTC logo and dats all it does witch 4 logos in evry corner
please help
Hi guys.
Since yesterday, I've noticed a strange issue on my Moto G: the compass does no longer work. I've tried a couple of apps from the Play Store, none works. GravityBox's "Compass" tile doesn't work either. I've also booted my phone into factory mode, opened the internal testing app (aka CQATest), and it also didn't pick up any readings from the magnetic sensor. I've flashed stock 4.4.4, GPE 4.4.4, CM11, and stock 5.0.1, but it didn't work with either firmware. Here's what the logcat shows when I try using the compass:
Code:
I/AKMD2 ( 321): Compass Opened.
D/Sensors ( 1114): AkmSensor: set enable_mag to 1
D/Sensors ( 1114): AkmSensor: set delay_mag to 200.000000 ms.
D/Sensors ( 1114): AkmSensor: mEnabled[1] = 1
D/Sensors ( 1114): AkmSensor: set delay_mag to 20.000000 ms.
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
E/AKMD2 ( 321): GetMagneticVector has failed (0x0004).
D/Sensors ( 1114): AccelerationSensor: set delay 200
D/Sensors ( 1114): AkmSensor: set enable_mag to 0
D/Sensors ( 1114): AkmSensor: set delay_mag to -0.000001 ms.
D/Sensors ( 1114): AkmSensor: mEnabled[1] = 0
I/AKMD2 ( 321): Compass Closed.
Has the magnetic sensor been definitely screwed up for some reason? If yes, I'll send my phone to a service center...
Hello, it seems my magnetic sensor has the same issue, did you figure it something out to resolve it?
i think this depends on the ROM you are in. my compass is totally bonkers ever since i've installed nougat based ROMs. it works very slow if you are able to calibrate it within the same app, but resets to its unusable state once you get out of the app
Thank you for your response, I'm using LOS 14.1 right now, but like you said all nougat roms give me problemes with compass, but in my case it doesn't give me any value on cpu-z, I tried flashing 5.1 stock rom and it gave me orientation sensor values but no magnetic field sensor values, I think sensor is broken. Maybe I'll try with other roms, I remember it was working ok with Identity Crisis with marshmallow
from what i remember it was working fine with MM ROMs i tried. happened only after flashing nougat ROMs. if you flashing an older ROM (pre-nougat) for the sake of getting compass working, and it still fails, i recommend you atleast run fastboot commands;
mfastboot erase modemst1
mfastboot erase modemst2
Click to expand...
Click to collapse
failing that, i would also reflash latest radio firmware with those commands;
mfastboot flash modem NON-HLOS.bin
mfastboot erase modemst1
mfastboot erase modemst2
Click to expand...
Click to collapse
Thank you, I tried that but it persist the same issue, on marshmallow or early orientation sensor gave me values but no magnetic field sensor values, on nougat magnetic sensor doesn't gave me values at all. Maybe sensor is broken.
koshikas said:
from what i remember it was working fine with MM ROMs i tried. happened only after flashing nougat ROMs. if you flashing an older ROM (pre-nougat) for the sake of getting compass working, and it still fails, i recommend you atleast run fastboot commands;
failing that, i would also reflash latest radio firmware with those commands;
Click to expand...
Click to collapse
Three years have passed since I wrote the original post. During that time, my (now dead) phone had its motherboard replaced due to a broken SIM card slot. Regardless of ROM and/or Android version, the magnetic sensor worked at all times (but it was slower under Nougat). So, it means that the previous board's sensor was gone for good.
(Or perhaps was it something software-related?)
Backstory:
I want to debloat my phone i connected my phone to my other device and started adb shell from otg then i opened a activity manager and uninstall system related apps then i uninstalled com.android.shell then boom package manager stopped working and always giving illegalargumentexception
I tried to reset but com.android.shell is still not installed
Also sometimes recovery just gives "no command" after i uninstalled com.android.shell
PLEASE HELP!
Kgstate said:
Backstory:
I want to debloat my phone i connected my phone to my other device and started adb shell from otg then i opened a activity manager and uninstall system related apps then i uninstalled com.android.shell then boom package manager stopped working and always giving illegalargumentexception
I tried to reset but com.android.shell is still not installed
Also sometimes recovery just gives "no command" after i uninstalled com.android.shell
PLEASE HELP!
Click to expand...
Click to collapse
Re-flash your stock firmware.
Google search for:
"Return to stock (your specific model number)"
That should find guides, tools and firmware.
Don't kill the goose that lays the golden eggs hehe
com.android.shell = adb
AFAIK com.android.shell is the "command prompt" ( CLI ) for Linux, which is the Android OS runs on. If you connect the phone to a PC that has an ADB driver for that phone installed, and type
Code:
adb shell
you'll be in the window-less phone's "command prompt" waiting for Linux commands to be input ( can be one single string or a list of commands ) to be executed. You leave this command prompt by typing
Code:
exit
aIecxs said:
Don't kill the goose that lays the golden eggs hehe
com.android.shell = adb
Click to expand...
Click to collapse
Also the bad thing is that app not stored in /system/priv-app
com.android.shell is just a dummy system package to connect shell to android framework (which is java, not linux btw)
you can enable it in /data/system/users/0/package-restrictions.xml
aIecxs said:
com.android.shell is just a dummy system package to connect shell to android framework (which is java, not linux btw)
Click to expand...
Click to collapse
I never paid attention to /system/priv-app/Shell/Shell.apk
Mmm, I just looked at it.
Like many priv-apps, they threw in practically every permission (150+).
It seems that it provides androidx.core.content.FileProvider and a bunch of stuff to do with bug reports.
I think that "Shell" means as in Windows "Shell" which has to do with file system paths and not to command line shell.
in contrast to regular shell, this packages grantes privileged shell to user 'shell' (uid 2000) used by adb
Renate said:
I never paid attention to /system/priv-app/Shell/Shell.apk
Mmm, I just looked at it.
Like many priv-apps, they threw in practically every permission (150+).
It seems that it provides androidx.core.content.FileProvider and a bunch of stuff to do with bug reports.
I think that "Shell" means as in Windows "Shell" which has to do with file system paths and not to command line shell.
Click to expand...
Click to collapse
I think shells purpose is opening , installing and managing apps
ADB Shell -> Package Manager -> Phone -> com.android.shell -> Android Applications
actually 'shell' just forwards the installation request to package manager
aIecxs said:
in contrast to regular shell, this packages grantes privileged shell to user 'shell' (uid 2000) used by adb
Click to expand...
Click to collapse
How can that be? You can stop Android. Reconnect USB and your ADB will recreate a new sh that will be the same as it was.
(My ADB is always root without su or anything so I can't test this.)
When you look at the code, there is very little that isn't androidx, support-v4 or bug report related.
androidx/core/content/FileProvider.smali is just a bit of gobbledeegook about paths.
aIecxs said:
actually 'shell' just forwards the installation request to package manager
Click to expand...
Click to collapse
So when i try to install apk shell forward request to local package manager?
OH MY GOD GUYS I FOUND THE SOLUTION:
Developer Settings > Bug report shortcut on power menu = ON
Then try to take a bug report from powr menu then it will stuck %0 for 5 - 6 mins and when progress bar start to raise check if com.android.shell is installed
Renate said:
How can that be? You can stop Android. Reconnect USB and your ADB will recreate a new sh that will be the same as it was.
(My ADB is always root without su or anything so I can't test this.)
When you look at the code, there is very little that isn't androidx, support-v4 or bug report related.
androidx/core/content/FileProvider.smali is just a bit of gobbledeegook about paths.
Click to expand...
Click to collapse
How does user 'shell' get WRITE_EXTERNAL_STORAGE permissions without system_server?
Renate said:
I think that "Shell" means as in Windows "Shell" which has to do with file system paths and not to command line shell.
Click to expand...
Click to collapse
Read here to get what Microsoft understands under "shell" in Windows OS:
Windows commands
Reference
learn.microsoft.com
aIecxs said:
How does user 'shell' get WRITE_EXTERNAL_STORAGE permissions without system_server?
Click to expand...
Click to collapse
There are Android permissions, SELinux permissions and regular file permissions.
Look at shell supplementary groups and you see:
Code:
$ id
uid=2000(shell) gid=2000(shell) groups=2000(shell),1004(input),1007(log),1011(adb),1015(sdcard_rw),1028(sdcard_r),1078(ext_data_rw),1079(ext_obb_rw),3001(net_bt_admin),3002(net_bt),3003(inet),3006(net_bw_stats),3009(readproc),3011(uhid) context=u:r:shell:s0
So 2000 belongs to a group that owns all the files (1015, 1028, 1078, 1079).
In ye olde days for the Android permissions (that you use when Android happens to be running), /system/etc/permissions/platform.xml:
Code:
<permission name="android.permission.READ_EXTERNAL_STORAGE">
<group gid="media_rw"/>
</permission>
Nowadays they use sdcardfs and mount it 4 different ways!
Code:
/data/media on /mnt/runtime/default/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,derive_gid,default_normal,unshared_obb)
/data/media on /mnt/runtime/read/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=23,derive_gid,default_normal,unshared_obb)
/data/media on /mnt/runtime/write/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=7,derive_gid,default_normal,unshared_obb)
/data/media on /mnt/runtime/full/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=7,derive_gid,default_normal,unshared_obb)
xXx yYy said:
Read here to get what Microsoft understands with "shell" in Windows OS:
Click to expand...
Click to collapse
Code:
C:\Windows\System32\shell32.dll
VS_VERSION_INFO - 52 bytes
StringFileInfo
040904B0
CompanyName Microsoft Corporation
FileDescription Windows Shell Common Dll
FileVersion 10.0.19041.964 (WinBuild.160101.0800)
InternalName SHELL32
LegalCopyright © Microsoft Corporation. All rights reserved.
OriginalFilename SHELL32.DLL.MUI
ProductName Microsoft® Windows® Operating System
ProductVersion 10.0.19041.964
VarFileInfo
Translation - 4 bytes
Spoiler: List of exports from shell32.dll
Code:
Exports from SHELL32.dll
477 exported name(s), 2000 export addresse(s). Ordinal base is 2.
Sorted by Name:
RVA Ord. Hint Name
-------- ---- ---- ----
0026F310 255 0000 AppCompat_RunDLLW
000FD400 263 0001 AssocCreateForClasses
002753D0 267 0002 AssocElemCreateForKey
001772A0 268 0003 AssocGetDetailsOfPropKey
0027AE50 701 0004 CDefFolderMenu_Create2
0027B780 83 0005 CIDLData_CreateFromIDArray
002266B0 937 0006 CStorageItem_GetValidatedStorageItemObject
0018AC70 269 0007 CallFileCopyHook
0027FFE0 272 0008 CheckEscapesW
0015A250 273 0009 CommandLineToArgvW
002825D0 274 000A Control_RunDLL
002825D0 275 000B Control_RunDLLA
00282630 276 000C Control_RunDLLAsUserW
00282670 277 000D Control_RunDLLW
002266F0 935 000E CreateStorageItemFromPath_FullTrustCaller
00226710 936 000F CreateStorageItemFromPath_FullTrustCaller_ForPackage
00226730 920 0010 CreateStorageItemFromPath_PartialTrustCaller
00226750 921 0011 CreateStorageItemFromShellItem_FullTrustCaller
00226770 925 0012 CreateStorageItemFromShellItem_FullTrustCaller_ForPackage
00226790 929 0013 CreateStorageItemFromShellItem_FullTrustCaller_ForPackage_WithProcessHandle
002267B0 931 0014 CreateStorageItemFromShellItem_FullTrustCaller_UseImplicitFlagsAndPackage
0016F1D0 129 0015 DAD_AutoScroll
00170B70 131 0016 DAD_DragEnterEx
002949E0 22 0017 DAD_DragEnterEx2
00294A80 132 0018 DAD_DragLeave
00294AB0 134 0019 DAD_DragMove
0016EE00 136 001A DAD_SetDragImage
00178350 137 001B DAD_ShowDragImage
001569E0 278 001C DllCanUnloadNow
00221270 279 001D DllGetActivationFactory
00138730 280 001E DllGetClassObject
00297AA0 281 001F DllGetVersion
00297B70 282 0020 DllInstall
0016EDF0 283 0021 DllRegisterServer
0016EDF0 284 0022 DllUnregisterServer
002129E0 285 0023 DoEnvironmentSubstA
00212A50 286 0024 DoEnvironmentSubstW
0016D020 287 0025 DragAcceptFiles
0021DFF0 288 0026 DragFinish
0021E000 289 0027 DragQueryFile
0021E000 290 0028 DragQueryFileA
0021E030 291 0029 DragQueryFileAorW
0021E240 292 002A DragQueryFileW
0021E3A0 293 002B DragQueryPoint
002987A0 64 002C DriveType
0015C870 294 002D DuplicateIcon
00212B40 295 002E ExtractAssociatedIconA
00212BE0 296 002F ExtractAssociatedIconExA
00212CA0 297 0030 ExtractAssociatedIconExW
00212E80 298 0031 ExtractAssociatedIconW
00212F20 299 0032 ExtractIconA
00212F80 300 0033 ExtractIconEx
00212F80 301 0034 ExtractIconExA
00157090 302 0035 ExtractIconExW
00212FE0 303 0036 ExtractIconW
002A4500 304 0037 FindExecutableA
002A45A0 305 0038 FindExecutableW
0016EE20 306 0039 FreeIconList
002A4EC0 307 003A GetCurrentProcessExplicitAppUserModelID
002A7E90 63 003B GetFileNameFromBrowse
002267D0 919 003C GetSystemPersistedStorageItemList
002ADE60 154 003D ILAppendID
0013B660 18 003E ILClone
001042E0 19 003F ILCloneFirst
0013F9A0 25 0040 ILCombine
002ADFE0 157 0041 ILCreateFromPath
002ADF10 189 0042 ILCreateFromPathA
002ADFE0 190 0043 ILCreateFromPathW
000EDE70 24 0044 ILFindChild
0012BB10 16 0045 ILFindLastID
00116D70 155 0046 ILFree
000EE500 153 0047 ILGetNext
0013CDE0 152 0048 ILGetSize
0013CD60 21 0049 ILIsEqual
000C4F20 23 004A ILIsParent
002AE270 846 004B ILLoadFromStreamEx
0013B620 17 004C ILRemoveLastID
002AE380 27 004D ILSaveToStream
002AE750 308 004E InitNetworkAddressControl
0016F1D0 309 004F InternalExtractIconListA
0016F1D0 310 0050 InternalExtractIconListW
0015E1A0 942 0051 IsDesktopExplorerProcess
00178350 119 0052 IsLFNDrive
00178350 41 0053 IsLFNDriveA
00178350 42 0054 IsLFNDriveW
002987C0 66 0055 IsNetDrive
00165240 941 0056 IsProcessAnExplorer
002AE8F0 680 0057 IsUserAnAdmin
00221390 311 0058 LaunchMSHelp_RunDLLW
001741B0 81 0059 OpenAs_RunDLL
001741B0 125 005A OpenAs_RunDLLA
002296D0 133 005B OpenAs_RunDLLW
0016C4E0 85 005C OpenRegStream
0046F1A0 312 005D Options_RunDLL
0046F1A0 313 005E Options_RunDLLA
0046F1E0 314 005F Options_RunDLLW
00177010 171 0060 PathCleanupSpec
002802F0 92 0061 PathGetShortPath
000CA310 43 0062 PathIsExe
00280520 240 0063 PathIsSlowA
00280570 239 0064 PathIsSlowW
00280690 47 0065 PathMakeUniqueName
00280A20 49 0066 PathQualify
00160160 51 0067 PathResolve
00280AF0 75 0068 PathYetAnotherMakeUniqueName
00214E90 62 0069 PickIconDlg
0021AE00 13 006A PifMgr_CloseProperties
0021AEB0 10 006B PifMgr_GetProperties
0021B180 9 006C PifMgr_OpenProperties
0021B700 11 006D PifMgr_SetProperties
0022D4D0 135 006E PrepareDiscForBurnRunDllW
002386C0 138 006F PrintersGetCommand_RunDLL
002386C0 139 0070 PrintersGetCommand_RunDLLA
00238740 150 0071 PrintersGetCommand_RunDLLW
000E6900 654 0072 ReadCabinetState
002B0030 524 0073 RealDriveType
0023AFE0 199 0074 RealShellExecuteA
0023AFF0 207 0075 RealShellExecuteExA
0023AFF0 208 0076 RealShellExecuteExW
0023AFE0 226 0077 RealShellExecuteW
0021EE30 315 0078 RegenerateUserEnvironment
00295530 59 0079 RestartDialog
00295550 730 007A RestartDialogEx
00222380 316 007B RunAsNewUser_RunDLLW
000E60B0 317 007C SHAddDefaultPropertiesByExt
002B81C0 167 007D SHAddFromPropSheetExtArray
0016DA20 318 007E SHAddToRecentDocs
0016C440 196 007F SHAlloc
002987E0 319 0080 SHAppBarMessage
002BE740 320 0081 SHAssocEnumHandlers
002BE7B0 321 0082 SHAssocEnumHandlersForProtocolByApplication
00168C00 322 0083 SHBindToFolderIDListParent
0013B100 323 0084 SHBindToFolderIDListParentEx
0013B720 324 0085 SHBindToObject
0013B580 325 0086 SHBindToParent
002C13F0 326 0087 SHBrowseForFolder
002C13F0 327 0088 SHBrowseForFolderA
002C15A0 328 0089 SHBrowseForFolderW
000D8A70 147 008A SHCLSIDFromString
0015DD50 644 008B SHChangeNotification_Lock
001633B0 645 008C SHChangeNotification_Unlock
00113450 329 008D SHChangeNotify
00146D40 4 008E SHChangeNotifyDeregister
00144CE0 2 008F SHChangeNotifyRegister
00146E60 330 0090 SHChangeNotifyRegisterThread
002B7AA0 331 0091 SHChangeNotifySuspendResume
0016B870 89 0092 SHCloneSpecialIDList
001610F0 102 0093 SHCoCreateInstance
002C1D30 332 0094 SHCoCreateInstanceWorker
0016D880 333 0095 SHCreateAssociationRegistration
002C6EE0 334 0096 SHCreateCategoryEnum
000B3060 335 0097 SHCreateDataObject
000FF370 336 0098 SHCreateDefaultContextMenu
00155C90 337 0099 SHCreateDefaultExtractIcon
002B7F00 338 009A SHCreateDefaultPropertiesOp
00269040 165 009B SHCreateDirectory
00269020 339 009C SHCreateDirectoryExA
0017B670 340 009D SHCreateDirectoryExW
002C8CF0 341 009E SHCreateDrvExtIcon
00277390 743 009F SHCreateFileExtractIconW
0013BCE0 342 00A0 SHCreateItemFromIDList
001138A0 343 00A1 SHCreateItemFromParsingName
002774A0 344 00A2 SHCreateItemFromRelativeName
0013B810 345 00A3 SHCreateItemInKnownFolder
001444C0 346 00A4 SHCreateItemWithParent
000F9D70 347 00A5 SHCreateLocalServerRunDll
0023C230 348 00A6 SHCreateProcessAsUserW
000F6E60 168 00A7 SHCreatePropSheetExtArray
00178310 349 00A8 SHCreateQueryCancelAutoPlayMoniker
00147BD0 256 00A9 SHCreateShellFolderView
002D3DC0 174 00AA SHCreateShellFolderViewEx
00177A70 350 00AB SHCreateShellItem
00226840 351 00AC SHCreateShellItemArray
00226860 352 00AD SHCreateShellItemArrayFromDataObject
0016C420 353 00AE SHCreateShellItemArrayFromIDLists
000F9F40 354 00AF SHCreateShellItemArrayFromShellItem
00212540 74 00B0 SHCreateStdEnumFmtEtc
002A3F10 3 00B1 SHDefExtractIconA
00121100 6 00B2 SHDefExtractIconW
000F6F40 169 00B3 SHDestroyPropSheetExtArray
00294B40 88 00B4 SHDoDragDrop
0016CF20 355 00B5 SHELL32_AddToBackIconTable
00164810 356 00B6 SHELL32_AddToFrontIconTable
0010CE80 357 00B7 SHELL32_AreAllItemsAvailable
002D6C90 358 00B8 SHELL32_CCommonPlacesFolder_CreateInstance
002D6CA0 359 00B9 SHELL32_CDBurn_CloseSession
002D6CC0 360 00BA SHELL32_CDBurn_DriveSupportedForDataBurn
002D6CE0 361 00BB SHELL32_CDBurn_Erase
002D6D00 362 00BC SHELL32_CDBurn_GetCDInfo
002D6D20 363 00BD SHELL32_CDBurn_GetLiveFSDiscInfo
0015EB50 364 00BE SHELL32_CDBurn_GetStagingPathOrNormalPath
002D6D40 365 00BF SHELL32_CDBurn_GetTaskInfo
002D6DC0 367 00C0 SHELL32_CDBurn_IsBlankDisc
002D6D70 366 00C1 SHELL32_CDBurn_IsBlankDisc2
002D6DE0 368 00C2 SHELL32_CDBurn_IsLiveFS
002D6E00 369 00C3 SHELL32_CDBurn_OnDeviceChange
002D6E20 370 00C4 SHELL32_CDBurn_OnEject
002D6E80 371 00C5 SHELL32_CDBurn_OnMediaChange
002D6EA0 372 00C6 SHELL32_CDefFolderMenu_Create2
002D6EB0 373 00C7 SHELL32_CDefFolderMenu_Create2Ex
002D6EE0 374 00C8 SHELL32_CDefFolderMenu_MergeMenu
002D6EF0 375 00C9 SHELL32_CDrivesContextMenu_Create
002D6F10 376 00CA SHELL32_CDrivesDropTarget_Create
002D6F30 377 00CB SHELL32_CDrives_CreateSFVCB
00166C60 378 00CC SHELL32_CFSDropTarget_CreateInstance
000ED780 379 00CD SHELL32_CFSFolderCallback_Create
0016F9B0 380 00CE SHELL32_CFillPropertiesTask_CreateInstance
002D6F80 381 00CF SHELL32_CLibraryDropTarget_CreateInstance
0016F290 382 00D0 SHELL32_CLocationContextMenu_Create
002D6FA0 383 00D1 SHELL32_CLocationFolderUI_CreateInstance
002D6FC0 384 00D2 SHELL32_CMountPoint_DoAutorun
002D6FE0 385 00D3 SHELL32_CMountPoint_DoAutorunPrompt
002D7000 386 00D4 SHELL32_CMountPoint_IsAutoRunDriveAndEnabledByPolicy
002D7020 387 00D5 SHELL32_CMountPoint_ProcessAutoRunFile
002D7040 388 00D6 SHELL32_CMountPoint_WantAutorunUI
002D7060 389 00D7 SHELL32_CMountPoint_WantAutorunUIGetReady
002D7080 390 00D8 SHELL32_CNetFolderUI_CreateInstance
000AED60 391 00D9 SHELL32_CPL_CategoryIdArrayFromVariant
002D70A0 392 00DA SHELL32_CPL_IsLegacyCanonicalNameListedUnderKey
002D70C0 393 00DB SHELL32_CPL_ModifyWowDisplayName
002D70E0 394 00DC SHELL32_CRecentDocsContextMenu_CreateInstance
002D70F0 395 00DD SHELL32_CTransferConfirmation_CreateInstance
002D7110 396 00DE SHELL32_CallFileCopyHooks
002D7130 397 00DF SHELL32_CanDisplayWin8CopyDialog
002D7160 398 00E0 SHELL32_CloseAutoplayPrompt
002D7180 399 00E1 SHELL32_CommandLineFromMsiDescriptor
0016EF90 400 00E2 SHELL32_CopySecondaryTiles
002D71A0 401 00E3 SHELL32_CreateConfirmationInterrupt
002D71C0 402 00E4 SHELL32_CreateConflictInterrupt
002D71F0 403 00E5 SHELL32_CreateDefaultOperationDataProvider
002D7210 404 00E6 SHELL32_CreateFileFolderContextMenu
0016AD60 405 00E7 SHELL32_CreateLinkInfoW
00170620 406 00E8 SHELL32_CreateQosRecorder
002D7240 407 00E9 SHELL32_CreateSharePointView
00290FC0 408 00EA SHELL32_Create_IEnumUICommand
0016B950 409 00EB SHELL32_DestroyLinkInfo
002D7260 410 00EC SHELL32_EncryptDirectory
002D7280 411 00ED SHELL32_EncryptedFileKeyInfo
002D72A0 412 00EE SHELL32_EnumCommonTasks
002D72B0 413 00EF SHELL32_FreeEncryptedFileKeyInfo
002D72C0 414 00F0 SHELL32_GenerateAppID
002D72E0 415 00F1 SHELL32_GetAppIDRoot
002D72F0 416 00F2 SHELL32_GetCommandProviderForFolderType
000E1710 417 00F3 SHELL32_GetDPIAdjustedLogicalSize
002D7310 418 00F4 SHELL32_GetDiskCleanupPath
002D7330 419 00F5 SHELL32_GetFileNameFromBrowse
0016B3A0 420 00F6 SHELL32_GetIconOverlayManager
002D7340 421 00F7 SHELL32_GetLinkInfoData
002D7360 422 00F8 SHELL32_GetRatingBucket
002D7390 423 00F9 SHELL32_GetSqmableFileName
002D73B0 425 00FA SHELL32_GetThumbnailAdornerFromFactory
000C58E0 424 00FB SHELL32_GetThumbnailAdornerFromFactory2
002D73D0 426 00FC SHELL32_HandleUnrecognizedFileSystem
0010FC90 427 00FD SHELL32_IconCacheCreate
0016C620 428 00FE SHELL32_IconCacheDestroy
002D73F0 429 00FF SHELL32_IconCacheHandleAssociationChanged
0010FCA0 430 0100 SHELL32_IconCacheRestore
0015F4F0 431 0101 SHELL32_IconCache_AboutToExtractIcons
0015F2E0 432 0102 SHELL32_IconCache_DoneExtractingIcons
001688F0 433 0103 SHELL32_IconCache_ExpandEnvAndSearchPath
00166A50 434 0104 SHELL32_IconCache_RememberRecentlyExtractedIconsW
00101AA0 435 0105 SHELL32_IconOverlayManagerInit
00165BA0 436 0106 SHELL32_IsGetKeyboardLayoutPresent
002D7400 437 0107 SHELL32_IsSystemUpgradeInProgress
00167620 438 0108 SHELL32_IsValidLinkInfo
002D7410 439 0109 SHELL32_LegacyEnumSpecialTasksByType
002D7420 440 010A SHELL32_LegacyEnumTasks
00120190 441 010B SHELL32_LookupBackIconIndex
0011ECC0 442 010C SHELL32_LookupFrontIconIndex
002D7430 443 010D SHELL32_NormalizeRating
002D7460 444 010E SHELL32_NotifyLinkTrackingServiceOfMove
002D7480 445 010F SHELL32_PifMgr_CloseProperties
002D7490 446 0110 SHELL32_PifMgr_GetProperties
002D74A0 447 0111 SHELL32_PifMgr_OpenProperties
002D74B0 448 0112 SHELL32_PifMgr_SetProperties
002D74C0 449 0113 SHELL32_Printers_CreateBindInfo
002D74E0 450 0114 SHELL32_Printjob_GetPidl
002D7500 451 0115 SHELL32_PurgeSystemIcon
00101A30 452 0116 SHELL32_RefreshOverlayImages
000F66F0 453 0117 SHELL32_ResolveLinkInfoW
002D7530 454 0118 SHELL32_SHAddSparseIcon
002D7550 455 0119 SHELL32_SHCreateByValueOperationInterrupt
000FF360 456 011A SHELL32_SHCreateDefaultContextMenu
002D7570 457 011B SHELL32_SHCreateLocalServer
0014B600 458 011C SHELL32_SHCreateShellFolderView
002D7580 459 011D SHELL32_SHDuplicateEncryptionInfoFile
002D75A0 460 011E SHELL32_SHEncryptFile
002D75C0 461 011F SHELL32_SHFormatDriveAsync
002D75E0 462 0120 SHELL32_SHGetThreadUndoManager
002D75F0 463 0121 SHELL32_SHGetUserNameW
002D7610 464 0122 SHELL32_SHIsVirtualDevice
002D7630 465 0123 SHELL32_SHLaunchPropSheet
002D7650 466 0124 SHELL32_SHLogILFromFSIL
002D7660 467 0125 SHELL32_SHOpenWithDialog
002D7670 468 0126 SHELL32_SHStartNetConnectionDialogW
002A3480 469 0127 SHELL32_SHUICommandFromGUID
004709D0 470 0128 SHELL32_SendToMenu_InvokeTargetedCommand
00470A10 471 0129 SHELL32_SendToMenu_VerifyTargetedCommand
002D7690 472 012A SHELL32_ShowHideIconOnlyOnDesktop
002D76B0 473 012B SHELL32_SimpleRatingToFilterCondition
002D76D0 474 012C SHELL32_StampIconForFile
00164610 475 012D SHELL32_SuspendUndo
002D7720 476 012E SHELL32_TryVirtualDiscImageDriveEject
0016A090 477 012F SHELL32_VerifySaferTrust
002D7A70 478 0130 SHEmptyRecycleBinA
002D7AE0 479 0131 SHEmptyRecycleBinW
00127030 480 0132 SHEnableServiceObject
00269230 481 0133 SHEnumerateUnreadMailAccountsW
00160450 482 0134 SHEvaluateSystemCommandTemplate
002D9770 483 0135 SHExecuteErrorMessageBox
00213100 484 0136 SHExtractIconsW
00226880 485 0137 SHFileOperation
00226880 486 0138 SHFileOperationA
002268A0 487 0139 SHFileOperationW
002694F0 90 013A SHFindFiles
002D9C60 149 013B SHFind_InitMenuPopup
002DA1D0 526 013C SHFlushSFCache
0026F670 488 013D SHFormatDrive
00116D70 195 013E SHFree
002268C0 489 013F SHFreeNameMappings
000B2EC0 750 0140 SHGetAttributesFromDataObject
002777D0 490 0141 SHGetDataFromIDListA
00165350 491 0142 SHGetDataFromIDListW
0016D320 492 0143 SHGetDesktopFolder
002778A0 493 0144 SHGetDiskFreeSpaceA
002778A0 494 0145 SHGetDiskFreeSpaceExA
00277900 495 0146 SHGetDiskFreeSpaceExW
002DFED0 496 0147 SHGetDriveMedia
00176E90 497 0148 SHGetFileInfo
00176E90 498 0149 SHGetFileInfoA
001139A0 499 014A SHGetFileInfoW
000F9D10 500 014B SHGetFolderLocation
00178260 501 014C SHGetFolderPathA
00298B60 502 014D SHGetFolderPathAndSubDirA
00178A00 503 014E SHGetFolderPathAndSubDirW
000F78B0 504 014F SHGetFolderPathEx
0015DD30 505 0150 SHGetFolderPathW
0013BB60 506 0151 SHGetIDListFromObject
002E0440 507 0152 SHGetIconOverlayIndexA
002E04A0 508 0153 SHGetIconOverlayIndexW
00152540 727 0154 SHGetImageList
000FA170 509 0155 SHGetInstanceExplorer
00160A20 510 0156 SHGetItemFromDataObject
001474B0 511 0157 SHGetItemFromObject
0016AE20 512 0158 SHGetKnownFolderIDList
000F3A40 513 0159 SHGetKnownFolderItem
00169F20 514 015A SHGetKnownFolderPath
00277920 515 015B SHGetLocalizedName
00178050 516 015C SHGetMalloc
0016D6F0 517 015D SHGetNameFromIDList
00277A80 518 015E SHGetNewLinkInfo
00277A80 179 015F SHGetNewLinkInfoA
00277B60 180 0160 SHGetNewLinkInfoW
002695B0 519 0161 SHGetPathFromIDList
002695B0 527 0162 SHGetPathFromIDListA
00165470 528 0163 SHGetPathFromIDListEx
00137730 529 0164 SHGetPathFromIDListW
000FCB00 530 0165 SHGetPropertyStoreForWindow
00277B90 531 0166 SHGetPropertyStoreFromIDList
00277C10 532 0167 SHGetPropertyStoreFromParsingName
002696C0 98 0168 SHGetRealIDL
00213370 709 0169 SHGetSetFolderCustomSettings
00111750 68 016A SHGetSetSettings
002E0A10 533 016B SHGetSettings
0016CEC0 534 016C SHGetSpecialFolderLocation
00298B80 535 016D SHGetSpecialFolderPathA
0016B3C0 536 016E SHGetSpecialFolderPathW
0015F730 537 016F SHGetStockIconInfo
00147300 538 0170 SHGetTemporaryPropertyForItem
002696E0 539 0171 SHGetUnreadMailCountW
002B7B30 193 0172 SHHandleUpdateImage
0025BCF0 228 0173 SHHelpShortcuts_RunDLL
0025BCF0 229 0174 SHHelpShortcuts_RunDLLA
0025BD50 238 0175 SHHelpShortcuts_RunDLLW
002AE410 28 0176 SHILCreateFromPath
00238FE0 540 0177 SHInvokePrinterCommandA
00239090 541 0178 SHInvokePrinterCommandW
000EE710 542 0179 SHIsFileAvailableOffline
002E16E0 747 017A SHLimitInputEdit
0016ECE0 543 017B SHLoadInProc
00269CB0 544 017C SHLoadNonloadedIconOverlayIdentifiers
000AA9B0 77 017D SHMapPIDLToSystemImageListIndex
002E1F80 716 017E SHMultiFileProperties
0025BE60 178 017F SHObjectProperties
00277CA0 545 0180 SHOpenFolderAndSelectItems
002E1FA0 80 0181 SHOpenPropSheetW
0022A260 546 0182 SHOpenWithDialog
00113EC0 547 0183 SHParseDisplayName
002268F0 548 0184 SHPathPrepareForWriteA
00226910 549 0185 SHPathPrepareForWriteW
00298BE0 685 0186 SHPropStgCreate
00298C00 688 0187 SHPropStgReadMultiple
00298C20 689 0188 SHPropStgWriteMultiple
002E2FC0 550 0189 SHQueryRecycleBinA
002E3030 551 018A SHQueryRecycleBinW
00298C40 552 018B SHQueryUserNotificationState
00278040 553 018C SHRemoveLocalizedName
002B8240 170 018D SHReplaceFromPropSheetExtArray
00298CB0 554 018E SHResolveLibrary
001121E0 100 018F SHRestricted
002B7FE0 555 0190 SHSetDefaultProperties
00298CD0 231 0191 SHSetFolderPathA
00298CF0 232 0192 SHSetFolderPathW
0016D930 176 0193 SHSetInstanceExplorer
00298D10 556 0194 SHSetKnownFolderPath
002780C0 557 0195 SHSetLocalizedName
000CB450 558 0196 SHSetTemporaryPropertyForItem
00269E00 559 0197 SHSetUnreadMailCountW
002D3E60 73 0198 SHShellFolderView_Message
0049ABE0 560 0199 SHShowManageLibraryUI
00269FA0 162 019A SHSimpleIDListFromPath
002D7670 14 019B SHStartNetConnectionDialogW
00169220 245 019C SHTestTokenMembership
002B7BD0 191 019D SHUpdateImageA
002B7C30 192 019E SHUpdateImageW
0016A030 561 019F SHUpdateRecycleBinIcon
002A48B0 173 01A0 SHValidateUNC
00178330 562 01A1 SetCurrentProcessExplicitAppUserModelID
0021D890 563 01A2 SheChangeDirA
0021D8F0 564 01A3 SheChangeDirExW
0021DD90 565 01A4 SheGetDirA
0021DF50 566 01A5 SheSetCurDrive
002F0950 567 01A6 ShellAboutA
002F0A10 568 01A7 ShellAboutW
0023C250 569 01A8 ShellExec_RunDLL
0023C250 570 01A9 ShellExec_RunDLLA
0023C2D0 571 01AA ShellExec_RunDLLW
0023C3C0 572 01AB ShellExecuteA
0023C430 573 01AC ShellExecuteEx
0023C430 574 01AD ShellExecuteExA
00154540 575 01AE ShellExecuteExW
00155580 576 01AF ShellExecuteW
0016F1D0 577 01B0 ShellHookProc
00543B7F 183 01B1 ShellMessageBoxA => shlwapi.ShellMessageBoxA
00543BA9 182 01B2 ShellMessageBoxW => shlwapi.ShellMessageBoxW
002A3F70 72 01B3 Shell_GetCachedImageIndex
002A3F80 578 01B4 Shell_GetCachedImageIndexA
0011FC30 579 01B5 Shell_GetCachedImageIndexW
0016C010 71 01B6 Shell_GetImageLists
0014ADE0 67 01B7 Shell_MergeMenus
00298D50 580 01B8 Shell_NotifyIcon
00298D50 581 01B9 Shell_NotifyIconA
00177B90 582 01BA Shell_NotifyIconGetRect
001270F0 583 01BB Shell_NotifyIconW
000F0030 103 01BC SignalFileOpen
001A5BB0 584 01BD StateRepoNewMenuCache_EnsureCacheAsync
00166D60 585 01BE StateRepoNewMenuCache_RebuildCacheAsync
002F0CA0 682 01BF StgMakeUniqueName
0017DAF0 586 01C0 StrChrA
0017DB00 587 01C1 StrChrIA
0017DB10 588 01C2 StrChrIW
0017DB20 589 01C3 StrChrW
0017DB30 590 01C4 StrCmpNA
0017DB40 591 01C5 StrCmpNIA
0017DB50 592 01C6 StrCmpNIW
0017DB60 593 01C7 StrCmpNW
00214250 594 01C8 StrNCmpA
002142C0 595 01C9 StrNCmpIA
00214330 596 01CA StrNCmpIW
002143C0 597 01CB StrNCmpW
0017DB70 598 01CC StrRChrA
0017DB80 599 01CD StrRChrIA
0017DB90 600 01CE StrRChrIW
0017DBA0 601 01CF StrRChrW
002144A0 602 01D0 StrRStrA
0017DBB0 603 01D1 StrRStrIA
0017DBC0 604 01D2 StrRStrIW
00214520 605 01D3 StrRStrW
0017DBD0 606 01D4 StrStrA
0017DBE0 607 01D5 StrStrIA
0017DBF0 608 01D6 StrStrIW
0017DC00 609 01D7 StrStrW
002F2680 610 01D8 UsersLibrariesFolderUI_CreateInstance
0023C4D0 611 01D9 WOWShellExecute
00297E20 612 01DA WaitForExplorerRestartW
00214AA0 164 01DB Win32DeleteFile
000E6840 652 01DC WriteCabinetState
I have an older Huawei device lying around where it was not possible to adb push straight to MicroSD card, so I had to push into /sdcard and move files every time. to my understanding the Android permissions are the missing link. in settings - apps - com.android.shell one can allow other permissions for example install apps from unknown source, I am pretty sure that permissions are granted to uid 2000 (adb shell) although I don't understand much how it is ongoing under the hood.
aIecxs said:
I have an older Huawei device lying around...
Click to expand...
Click to collapse
Then your 2000 was missing group 1078 (ext_data_rw)
See: https://android.googlesource.com/pl...s/include/private/android_filesystem_config.h
1077 (EXTERNAL_STORAGE) to be nitpicky...
Adb package manager still gives me illegalargument exception when i try to install apk