[Q] [Verified Android Trojan] Unknown app sends hidden sms to +493394991625 - General Questions and Answers

Hi,
After downloading dozens of apps from appbrain last night
I've noticed an unknown app sending a sms to +493394991625
30.7.2011 1 : 25 : 59 493394991625 1,00Stk. 1,00Stk. 0,20 EUR
from my htc wildfire S A510e in my service providers logs last night.
and looks like it's hiding and wiping traces by disabling storing sent sms messages and other notification settings.
Furthermore I noticed disabled Lookout security app update setting,
I've installed a bunch of popular malware detectors, let's see who wins...
Code:
$ ps
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 388 240 ffffffff 00000000 S /init
root 2 0 0 0 ffffffff 00000000 S kthreadd
root 3 2 0 0 ffffffff 00000000 S ksoftirqd/0
root 4 2 0 0 ffffffff 00000000 S watchdog/0
root 5 2 0 0 ffffffff 00000000 S events/0
root 6 2 0 0 ffffffff 00000000 S khelper
root 7 2 0 0 ffffffff 00000000 S async/mgr
root 8 2 0 0 ffffffff 00000000 S suspend
root 9 2 0 0 ffffffff 00000000 S sync_supers
root 10 2 0 0 ffffffff 00000000 S bdi-default
root 11 2 0 0 ffffffff 00000000 S kblockd/0
root 12 2 0 0 ffffffff 00000000 S kmmcd
root 13 2 0 0 ffffffff 00000000 S kondemand/0
root 14 2 0 0 ffffffff 00000000 S smd_tty
root 15 2 0 0 ffffffff 00000000 D rpcrouter
root 16 2 0 0 ffffffff 00000000 S krpcserversd
root 17 2 0 0 ffffffff 00000000 S qmi
root 18 2 0 0 ffffffff 00000000 S kadspd
root 19 2 0 0 ffffffff 00000000 S microp_work_q
root 20 2 0 0 ffffffff 00000000 S detect/0
root 21 2 0 0 ffffffff 00000000 S button/0
root 22 2 0 0 ffffffff 00000000 S detect/0
root 23 2 0 0 ffffffff 00000000 S button/0
root 24 2 0 0 ffffffff 00000000 S HS_GPIO_DETECT/
root 25 2 0 0 ffffffff 00000000 S HS_GPIO_BUTTON/
root 26 2 0 0 ffffffff 00000000 S khungtaskd
root 27 2 0 0 ffffffff 00000000 S kswapd0
root 28 2 0 0 ffffffff 00000000 S aio/0
root 29 2 0 0 ffffffff 00000000 S crypto/0
root 40 2 0 0 ffffffff 00000000 S panel_on/0
root 41 2 0 0 ffffffff 00000000 S diag_wq
root 42 2 0 0 ffffffff 00000000 S msm_serial_hs
root 43 2 0 0 ffffffff 00000000 S msm_serial_hs
root 44 2 0 0 ffffffff 00000000 S msm_serial_hs
root 45 2 0 0 ffffffff 00000000 S mtdblockd
root 52 2 0 0 ffffffff 00000000 S msm_hsusb
root 53 2 0 0 ffffffff 00000000 S usb_mass_storag
root 54 2 0 0 ffffffff 00000000 S gs_tty
root 55 2 0 0 ffffffff 00000000 S cypress_touch
root 56 2 0 0 ffffffff 00000000 S synaptics_wq
root 57 2 0 0 ffffffff 00000000 S ki_queue
root 58 2 0 0 ffffffff 00000000 S cm3628_wq
root 59 2 0 0 ffffffff 00000000 S kstriped
root 60 2 0 0 ffffffff 00000000 S binder
root 61 2 0 0 ffffffff 00000000 S l2cap
root 62 2 0 0 ffffffff 00000000 S krfcommd
root 63 1 300 140 ffffffff 00000000 S /sbin/ueventd
system 65 1 856 160 ffffffff 00000000 S /system/bin/servicemanager
root 66 2 0 0 ffffffff 00000000 S sd-qd
root 67 1 3940 348 ffffffff 00000000 S /system/bin/vold
root 68 1 3952 288 ffffffff 00000000 S /system/bin/netd
root 69 1 3260 216 ffffffff 00000000 S /system/bin/debuggerd
radio 70 1 14240 560 ffffffff 00000000 S /system/bin/rild
root 71 1 98644 22776 ffffffff 00000000 S zygote
media 72 1 44440 3164 ffffffff 00000000 S /system/bin/mediaserver
root 73 1 12344 780 ffffffff 00000000 S /system/bin/htcfs
bluetooth 74 1 1312 168 ffffffff 00000000 S /system/bin/dbus-daemon
root 75 1 880 268 ffffffff 00000000 S /system/bin/installd
keystore 76 1 1824 184 ffffffff 00000000 S /system/bin/keystore
root 77 1 840 148 ffffffff 00000000 S /system/bin/ipd
compass 79 1 3180 300 ffffffff 00000000 S /system/bin/akmd
root 81 1 1100 288 ffffffff 00000000 S /system/bin/htc_ebdlogd
root 87 81 2152 1664 ffffffff 00000000 S /system/bin/logcat2
root 116 2 0 0 ffffffff 00000000 D snd_rpc
system 118 71 246828 38828 ffffffff 00000000 S system_server
root 140 2 0 0 ffffffff 00000000 D audmgr_rpc
system 187 71 143140 26508 ffffffff 00000000 S com.android.systemui
app_11 209 71 131368 20700 ffffffff 00000000 S com.htc.android.htcime
radio 216 71 155760 26148 ffffffff 00000000 S com.android.phone
app_21 221 71 248620 51508 ffffffff 00000000 S android.process.acore
app_17 245 71 187440 24360 ffffffff 00000000 S com.google.process.gapps
root 431 2 0 0 ffffffff 00000000 S flush-0:17
root 552 2 0 0 ffffffff 00000000 S flush-179:0
root 803 2 0 0 ffffffff 00000000 D audmgr_rpc
app_126 981 1 5368 376 ffffffff 00000000 S ./smrsd
app_126 983 981 2140 1664 ffffffff 00000000 S /system/bin/logcat
root 1487 2 0 0 ffffffff 00000000 S flush-31:0
app_72 2482 71 113872 15820 ffffffff 00000000 S org.sipdroid.sipua
app_6 2534 71 193320 31532 ffffffff 00000000 S com.android.vending
app_101 2586 1 944 472 ffffffff 00000000 S logcat
app_86 3159 71 169616 20608 ffffffff 00000000 S com.lookout
app_101 3167 71 128972 18376 ffffffff 00000000 S com.antivirus
app_101 3203 3167 944 468 ffffffff 00000000 S logcat
app_86 3341 3159 1888 1412 ffffffff 00000000 S logcat
app_7 3404 71 147256 17180 ffffffff 00000000 S android.process.media
nobody 3635 71 146292 33480 ffffffff 00000000 S com.htc.launcher
app_21 3738 71 129612 20424 ffffffff 00000000 S com.android.htccontacts
app_52 3861 71 126588 16900 ffffffff 00000000 S com.android.mms
app_40 4468 71 127588 16696 ffffffff 00000000 S com.htc.cspeoplesync
app_121 4617 71 108112 14208 ffffffff 00000000 S com.zrgiu.antivirus
app_47 4631 71 107632 13392 ffffffff 00000000 S com.htc.wotaproviders
system 4784 71 107632 12704 ffffffff 00000000 S com.android.server.vpn:remote
app_122 4833 71 108588 14044 ffffffff 00000000 S com.netqin.antivirussc
app_130 4846 71 111336 15288 ffffffff 00000000 S com.trustmobi.MobiShield
app_12 4859 71 117108 22404 ffffffff 00000000 S com.htc.bgp
app_124 5059 71 111520 15684 ffffffff 00000000 S com.zoner.android.antivirus
app_27 5268 71 119504 15020 ffffffff 00000000 S com.google.android.googlequicksearchbox
app_58 5277 71 133176 20560 ffffffff 00000000 S com.htc.lmw
root 5317 2 0 0 ffffffff 00000000 S flush-7:8
root 5319 2 0 0 ffffffff 00000000 S loop8
root 5320 2 0 0 ffffffff 00000000 S kdmflush
root 5321 2 0 0 ffffffff 00000000 S kcryptd_io
root 5322 2 0 0 ffffffff 00000000 S kcryptd
root 5345 2 0 0 ffffffff 00000000 S flush-7:9
root 5348 2 0 0 ffffffff 00000000 S loop9
root 5349 2 0 0 ffffffff 00000000 S kdmflush
root 5350 2 0 0 ffffffff 00000000 S kcryptd_io
root 5351 2 0 0 ffffffff 00000000 S kcryptd
root 5373 2 0 0 ffffffff 00000000 S flush-7:10
root 5376 2 0 0 ffffffff 00000000 S loop10
root 5377 2 0 0 ffffffff 00000000 S kdmflush
root 5378 2 0 0 ffffffff 00000000 S kcryptd_io
root 5379 2 0 0 ffffffff 00000000 S kcryptd
root 5397 2 0 0 ffffffff 00000000 S flush-7:11
root 5401 2 0 0 ffffffff 00000000 S loop11
root 5402 2 0 0 ffffffff 00000000 S kdmflush
root 5403 2 0 0 ffffffff 00000000 S kcryptd_io
root 5404 2 0 0 ffffffff 00000000 S kcryptd
root 5421 2 0 0 ffffffff 00000000 S flush-7:12
root 5424 2 0 0 ffffffff 00000000 S loop12
root 5425 2 0 0 ffffffff 00000000 S kdmflush
root 5426 2 0 0 ffffffff 00000000 S kcryptd_io
root 5427 2 0 0 ffffffff 00000000 S kcryptd
root 5445 2 0 0 ffffffff 00000000 S flush-7:13
root 5448 2 0 0 ffffffff 00000000 S loop13
root 5449 2 0 0 ffffffff 00000000 S kdmflush
root 5450 2 0 0 ffffffff 00000000 S kcryptd_io
root 5451 2 0 0 ffffffff 00000000 S kcryptd
root 5466 2 0 0 ffffffff 00000000 S flush-7:14
root 5472 2 0 0 ffffffff 00000000 S loop14
root 5473 2 0 0 ffffffff 00000000 S kdmflush
root 5474 2 0 0 ffffffff 00000000 S kcryptd_io
root 5475 2 0 0 ffffffff 00000000 S kcryptd
app_63 5483 71 118580 20480 ffffffff 00000000 S com.google.android.gm
root 5501 2 0 0 ffffffff 00000000 S flush-7:15
root 5508 2 0 0 ffffffff 00000000 S loop15
root 5509 2 0 0 ffffffff 00000000 S kdmflush
root 5510 2 0 0 ffffffff 00000000 S kcryptd_io
root 5511 2 0 0 ffffffff 00000000 S kcryptd
root 5527 2 0 0 ffffffff 00000000 S flush-7:16
root 5539 2 0 0 ffffffff 00000000 S loop16
root 5540 2 0 0 ffffffff 00000000 S kdmflush
root 5541 2 0 0 ffffffff 00000000 S kcryptd_io
root 5542 2 0 0 ffffffff 00000000 S kcryptd
root 5550 2 0 0 ffffffff 00000000 S flush-7:17
root 5562 2 0 0 ffffffff 00000000 S loop17
root 5563 2 0 0 ffffffff 00000000 S kdmflush
root 5564 2 0 0 ffffffff 00000000 S kcryptd_io
root 5565 2 0 0 ffffffff 00000000 S kcryptd
app_56 5579 71 174784 28264 ffffffff 00000000 S com.htc.cs
root 5587 2 0 0 ffffffff 00000000 S flush-7:18
root 5603 2 0 0 ffffffff 00000000 S loop18
root 5604 2 0 0 ffffffff 00000000 S kdmflush
root 5605 2 0 0 ffffffff 00000000 S kcryptd_io
root 5606 2 0 0 ffffffff 00000000 S kcryptd
root 5650 2 0 0 ffffffff 00000000 S flush-7:19
root 5656 2 0 0 ffffffff 00000000 S loop19
root 5657 2 0 0 ffffffff 00000000 S kdmflush
root 5658 2 0 0 ffffffff 00000000 S kcryptd_io
root 5659 2 0 0 ffffffff 00000000 S kcryptd
root 5708 2 0 0 ffffffff 00000000 S flush-7:20
root 5712 2 0 0 ffffffff 00000000 S loop20
root 5713 2 0 0 ffffffff 00000000 S kdmflush
root 5714 2 0 0 ffffffff 00000000 S kcryptd_io
root 5715 2 0 0 ffffffff 00000000 S kcryptd
app_59 5856 71 109988 16604 ffffffff 00000000 S com.htc.recommend
root 5916 2 0 0 ffffffff 00000000 S flush-7:21
root 5919 2 0 0 ffffffff 00000000 S loop21
root 5920 2 0 0 ffffffff 00000000 S kdmflush
root 5921 2 0 0 ffffffff 00000000 S kcryptd_io
root 5922 2 0 0 ffffffff 00000000 S kcryptd
app_16 5993 71 107696 14992 ffffffff 00000000 S com.htc.htchubsyncprovider
app_20 6014 71 107808 16072 ffffffff 00000000 S com.htc.messagecs
app_28 6021 71 107924 16172 ffffffff 00000000 S com.htc.musicmarkeditems
app_128 6026 71 109936 15720 ffffffff 00000000 S com.opensystem.terminator
app_11 6044 71 136420 17812 ffffffff 00000000 S com.htc.android.htcime:provider
app_120 6091 71 109956 16904 ffffffff 00000000 S com.drweb:monitor
app_67 6117 71 122120 19548 ffffffff 00000000 S com.google.android.apps.maps:NetworkLocationService
app_12 6137 71 113356 18940 ffffffff 00000000 S com.htc.bg
app_138 6145 71 114012 20244 ffffffff 00000000 S com.mymobileprotection15
app_79 6164 71 109788 15888 ffffffff afd0c64c S br.com.bott.droidsshd
app_76 6177 71 121940 21804 ffffffff 00000000 S com.wefi.wefi
system 6235 71 113144 17280 ffffffff 00000000 S com.android.settings
app_79 6251 6465 1212 496 c00f98cc 00063324 S /data/data/br.com.bott.droidsshd/files/bin/dropbear
app_79 6252 6251 728 316 c0083920 afd0c4dc S -sh
app_79 6259 6252 876 300 00000000 afd0b58c R ps
app_79 6465 1 1212 180 c00f98cc 00063324 S /data/data/br.com.bott.droidsshd/files/bin/dropbear
root 9575 2 0 0 ffffffff 00000000 S flush-7:0
root 9581 2 0 0 ffffffff 00000000 S loop0
root 9582 2 0 0 ffffffff 00000000 S kdmflush
root 9583 2 0 0 ffffffff 00000000 S kcryptd_io
root 9584 2 0 0 ffffffff 00000000 S kcryptd
root 10019 2 0 0 ffffffff 00000000 S flush-7:1
root 10025 2 0 0 ffffffff 00000000 S loop1
root 10026 2 0 0 ffffffff 00000000 S kdmflush
root 10027 2 0 0 ffffffff 00000000 S kcryptd_io
root 10028 2 0 0 ffffffff 00000000 S kcryptd
root 10179 2 0 0 ffffffff 00000000 S flush-7:2
root 10185 2 0 0 ffffffff 00000000 S loop2
root 10186 2 0 0 ffffffff 00000000 S kdmflush
root 10187 2 0 0 ffffffff 00000000 S kcryptd_io
root 10188 2 0 0 ffffffff 00000000 S kcryptd
root 10293 2 0 0 ffffffff 00000000 S flush-7:3
root 10299 2 0 0 ffffffff 00000000 S loop3
root 10300 2 0 0 ffffffff 00000000 S kdmflush
root 10301 2 0 0 ffffffff 00000000 S kcryptd_io
root 10302 2 0 0 ffffffff 00000000 S kcryptd
root 10860 2 0 0 ffffffff 00000000 S flush-7:4
root 10867 2 0 0 ffffffff 00000000 S loop4
root 10868 2 0 0 ffffffff 00000000 S kdmflush
root 10869 2 0 0 ffffffff 00000000 S kcryptd_io
root 10870 2 0 0 ffffffff 00000000 S kcryptd
root 11330 2 0 0 ffffffff 00000000 S flush-7:5
root 11332 2 0 0 ffffffff 00000000 S loop5
root 11333 2 0 0 ffffffff 00000000 S kdmflush
root 11334 2 0 0 ffffffff 00000000 S kcryptd_io
root 11335 2 0 0 ffffffff 00000000 S kcryptd
root 11353 2 0 0 ffffffff 00000000 S flush-7:6
root 11360 2 0 0 ffffffff 00000000 S loop6
root 11361 2 0 0 ffffffff 00000000 S kdmflush
root 11362 2 0 0 ffffffff 00000000 S kcryptd_io
root 11363 2 0 0 ffffffff 00000000 S kcryptd
root 11376 2 0 0 ffffffff 00000000 S flush-7:7
root 11378 2 0 0 ffffffff 00000000 S loop7
root 11379 2 0 0 ffffffff 00000000 S kdmflush
root 11380 2 0 0 ffffffff 00000000 S kcryptd_io
root 11381 2 0 0 ffffffff 00000000 S kcryptd
app_56 13589 71 112512 17840 ffffffff 00000000 S com.htc.cs:remote
app_78 21827 71 117468 16508 ffffffff 00000000 S com.skype.raider
app_78 21917 21827 14616 10268 ffffffff 00000000 S /data/data/com.skype.raider/files/skypekit
root 22015 2 0 0 ffffffff 00000000 S iscan_sysioc
root 22016 2 0 0 ffffffff 00000000 S dhcp_sysioc
root 22017 2 0 0 ffffffff 00000000 S ap_sysioc
root 22018 2 0 0 ffffffff 00000000 S dhd_watchdog
root 22019 2 0 0 ffffffff 00000000 S dhd_dpc
root 22020 2 0 0 ffffffff 00000000 S dhd_sysioc
log 22021 1 708 152 ffffffff 00000000 S /system/bin/logwrapper
wifi 22023 22021 2480 744 ffffffff 00000000 S /system/bin/wpa_supplicant
app_101 24919 1 944 468 ffffffff 00000000 S logcat
app_101 26402 1 944 468 ffffffff 00000000 S logcat
dhcp 29044 1 900 212 ffffffff 00000000 S /system/bin/dhcpcd
app_101 29471 1 944 472 ffffffff 00000000 S logcat
app_123 29948 1 952 444 ffffffff 00000000 S /data/data/jp.ktinc.fastscan/fseng
app_125 31043 71 173488 42988 ffffffff 00000000 S com.morrison.applocklite
app_125 31056 31043 944 472 ffffffff 00000000 S logcat
app_125 31083 31043 944 468 ffffffff 00000000 S logcat
app_126 32496 71 146544 23948 ffffffff 00000000 S com.symantec.mobilesecurity
app_126 32763 32496 1588 1112 ffffffff 00000000 S logcat
$
Code:
Aug 1 15:54:12 freshclam[6026]: main.cvd is up to date (version: 53, sigs: 846214, f-level: 53, builder: sven)
Aug 1 15:54:12 freshclam[6026]: daily.cld is up to date (version: 13385, sigs: 166221, f-level: 60, builder: ccordes)
Aug 1 15:54:12 freshclam[6026]: bytecode.cld is up to date (version: 144, sigs: 41, f-level: 60, builder: edwin)
Code:
$ clamscan -r --bell --detect-pua=yes --heuristic-scan-precedence=yes sdcard16GB-virus
sdcard16GB-virus/google_*****.vcf: OK
sdcard16GB-virus/setup_3.0.5551.exe: OK
sdcard16GB-virus/pcsc_pcsc_00001.vcf: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_its.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_vts_tran_GMM.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_its_ter.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_vts_GMM.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_r.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_vts_labl_GMM.m: OK
sdcard16GB-virus/Android/data/.nomedia: Empty file
sdcard16GB-virus/svox/en-GB_ta.bin: OK
sdcard16GB-virus/svox/en-US_lh0_sg.bin: OK
sdcard16GB-virus/svox/fr-FR_ta.bin: OK
sdcard16GB-virus/svox/es-ES_zl0_sg.bin: OK
sdcard16GB-virus/svox/fr-FR_nk0_sg.bin: OK
sdcard16GB-virus/svox/it-IT_ta.bin: OK
sdcard16GB-virus/svox/es-ES_ta.bin: OK
sdcard16GB-virus/svox/en-GB_kh0_sg.bin: OK
sdcard16GB-virus/svox/it-IT_cm0_sg.bin: OK
sdcard16GB-virus/svox/en-US_ta.bin: OK
sdcard16GB-virus/svox/de-DE_gl0_sg.bin: OK
sdcard16GB-virus/svox/de-DE_ta.bin: OK
sdcard16GB-virus/download/DroidSSHdv06.apk: OK
sdcard16GB-virus/download/Apps_Installer_0.2.1.apk: OK
sdcard16GB-virus/download/org.mozilla.firefox.apk: OK
sdcard16GB-virus/download/com.wefi.wefi.apk: OK
sdcard16GB-virus/download/com.faststring.fastappinstaller.apk: OK
sdcard16GB-virus/download/de.schildbach.oeffi.apk: OK
sdcard16GB-virus/download/org.mozilla.firefox_beta.apk: OK
sdcard16GB-virus/google_******_00002.vcf: OK
sdcard16GB-virus/Quick Start Guide/20110413_Marvel_HTC_Italian_QSG.pdf: OK
sdcard16GB-virus/Quick Start Guide/20110414_Marvel_HTC_German_QSG.pdf.pdf: OK
sdcard16GB-virus/Quick Start Guide/20110413_Marvel_HTC_French_QSG.pdf: OK
sdcard16GB-virus/*********/Sipdroid-2.3.apk: OK
sdcard16GB-virus/sim_SIM_00001.vcf: OK
sdcard16GB-virus/sim_SIM_00002.vcf: Empty file
sdcard16GB-virus/pcsc_pcsc_00002.vcf: OK
sdcard16GB-virus/Safety Guide/20110406_Marvel_HTC_Italian_Safety-regulatory_guide.pdf: OK
sdcard16GB-virus/Safety Guide/20110325_Marvel_HTC_French_Safety-regulatory_guide.pdf: OK
sdcard16GB-virus/Safety Guide/20110324_Marvel_HTC_German_Safety-regulatory_guide.pdf: OK
sdcard16GB-virus/miren_browser/.cache/CacheList: OK
sdcard16GB-virus/miren_browser/.cache/databases/ApplicationCache.db: OK
sdcard16GB-virus/miren_browser/.cache/geolocation/CachedGeoposition.db: OK
sdcard16GB-virus/miren_browser/.cache/geolocation/GeolocationPermissions.db: Empty file
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/3d87920807b05c46ee34b296fc331cdf.png: OK
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/8a1f63f02b6f44fb91bd197dd5dfdc9e.png: OK
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/a7e4cbd44379085999164a851497a8fa.png: OK
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/39fbd541589b2ec6a36d872e02514412.png: OK
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/3f7f3c517a020bf4836368e24830632f.png: OK
sdcard16GB-virus/miren_browser/.persist/webview_pictures/webview_0: OK
sdcard16GB-virus/DCIM/sample01.jpg: OK
sdcard16GB-virus/DCIM/sample07.jpg: OK
sdcard16GB-virus/DCIM/sample06.jpg: OK
sdcard16GB-virus/DCIM/sample09.jpg: OK
sdcard16GB-virus/DCIM/sample03.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-712AC800-2155097-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-9683FC85-3126664-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-3C600F01-2699282-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-92F65F82-3806217-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-4D34F029-7255294-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-C1F43D8A-4013455-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-58111224-2901259-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-9683FC85-3126664-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-58111224-2901259-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-4D34F029-7255294-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-712AC800-2155097-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-D37EF1ED-4197534-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-D37EF1ED-4197534-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-92F65F82-3806217-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-C1F43D8A-4013455-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-13D94E9B-1919498-480.jpg: OK
sdcard16GB-virus/DCIM/sample05.jpg: OK
sdcard16GB-virus/DCIM/sample04.jpg: OK
sdcard16GB-virus/DCIM/sample02.jpg: OK
sdcard16GB-virus/DCIM/sample08.jpg: OK
sdcard16GB-virus/background.log: OK
sdcard16GB-virus/User Manual/20110413_Marvel_HTC_German_UM.pdf: OK
----------- SCAN SUMMARY -----------
Known viruses: 1012338
Engine version: 0.97
Scanned directories: 38
Scanned files: 74
Infected files: 0
Data scanned: 153.86 MB
Data read: 227.97 MB (ratio 0.67:1)
Time: 79.317 sec (1 m 19 s)
What to do now?

If that app really is a virus then it's very nasty :O
I recon you hard reset your whole phone. Backup your contacts, maybe sms, but not your apps of course, and simply reset your device =/.
This is an example of the ineffectiveness of todays antiviruses for android. They can detect, generally too late, but can't fix anything... Not much of an proper antivirus around for the time being, it's just fancy apps that don't do much and reassure people...

-Deleted Post-

my android trojan desaster recovery continued
crakeron said:
I recon you hard reset your whole phone. Backup your contacts, maybe sms, but not your apps of course, and simply reset your device
Click to expand...
Click to collapse
Not possible, the setup wizard after factory reset + reboot on this marvel HTC Wildfire S requires google + htc sense account access to have the google and htc apps configured and working correctly (there's a warning in the manual not to disable that),
and this will auto-restore all settings and apps to the desaster state far before you get the chance to disable the auto-restore and sync in settings, surely including the trojan,
You notice that behaviour first if you changed your wlan AP key for desaster recovery and a few minutes after setup wizard run your old wlan key is silently restored despite explicitly disabled sync + auto restore settings:
Code:
01.08.11 01:49:00 WLAN-Gerät Anmeldung gescheitert (2,4 GHz): ungültiger WLAN-Schlüssel. Name: htc.
01.08.11 01:48:48 WLAN-Gerät Anmeldung gescheitert (2,4 GHz): ungültiger WLAN-Schlüssel. Name: htc.
01.08.11 01:48:45 WLAN-Gerät angemeldet, WLAN wird mit voller Leistung reaktiviert (2,4 GHz).
01.08.11 01:38:52 Kein WLAN-Gerät mehr angemeldet, Stromverbrauch wird reduziert (2,4 GHz).
01.08.11 01:36:39 WLAN-Gerät Anmeldung gescheitert (2,4 GHz): ungültiger WLAN-Schlüssel. Name: htc.
01.08.11 01:36:28 WLAN-Gerät hat sich abgemeldet (2,4 GHz). Name: htc.
01.08.11 01:27:42 WLAN-Gerät angemeldet (2,4 GHz). Name: htc, Geschwindigkeit 54 Mbit/s.
01.08.11 01:27:42 WLAN-Gerät angemeldet, WLAN wird mit voller Leistung reaktiviert (2,4 GHz).
"ungültiger WLAN-Schlüssel" means invalid EAP-PSK, sorry avm.de is uncapable of english language.
The attackers possibly compromised my AVM fritzbox router, too, they tried to download a malware firmware image to it over the marvel (web management showed warning about failed firmware update yesterday morning) or the newly setup AVM VPN access is insecure , had to factory reset and reinstall the firmware for another desaster recovery,
but I don't know if they managed to have the device memory still compromised using one of the methods known by ip-phone-forum.de to debrand the product, etc.
And well, it's very hard to get a verified clean genuine firmware image file over a possibly compromised and redirecting router from a manufacturer not supporting https certificate auth or crypto signed software on his servers, had to verify sha1sums with another guy over phone before download the image to the box..
Another trojan verification evidence is that the hackers incoming phone/sms account +493394991625 where the sms was sent is no longer reachable or my provider has got wrong data in costs logs.
Code:
01.08.11 14:49:55 Internettelefonie mit [email protected] über sip.qsc.de war nicht erfolgreich. Ursache: Not Found (404)
01.08.11 14:49:41 Internettelefonie mit [email protected] über sip.12voip.com war nicht erfolgreich. Ursache: User not found (404)
Theres neither a way to remove marvel configuration data from your google account or htc sync account, this is absolutely not acceptable,
The only desaster recovery option this marvel accepts is to enable accept of official market apps only, so some apps from appbrain.com were hopefully left out from the auto-restore, is this rechecked?

OK, lets do a remote virus scan of the marvel wildfire S over WLAN (needs e.g. sshdroid app with sftp support running as ROOT ):
Code:
[email protected]:~/htc$ sshfs htc:/ /home/xxxxxxx/htc/sshfs -p xx -o ro,reconnect
[email protected]'s password:
[email protected]:~/htc$
[email protected]:~/htc$ #clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/app-cache
[email protected]:~/htc$ ls -l sshfs
insgesamt 208
drwxr-xr-x 1 root root 0 1. Aug 04:03 acct
drwxr-xr-x 1 root xxxxxxx 60 1. Aug 04:03 app-cache
-rw-r--r-- 1 root root 460 1. Jan 1970 bootcomplete.rc
drwxrwx--- 1 xxxxxxx 2001 4096 1. Aug 21:11 cache
dr-x------ 1 root root 0 1. Aug 04:03 config
-rw-r--r-- 1 root root 1398 1. Jan 1970 cwkeys
drwxrwx--x 1 xxxxxxx xxxxxxx 4096 1. Aug 01:10 data
-rw-r--r-- 1 root root 118 1. Jan 1970 default.prop
drwxr-xr-x 1 root root 1600 1. Aug 18:47 dev
drwx------ 1 root root 4096 1. Aug 15:25 devlog
lrwxrwxrwx 1 root root 11 1. Aug 04:03 etc -> /system/etc
-rwxr-x--- 1 root root 107244 1. Jan 1970 init
-rwxr-x--- 1 root root 1677 1. Jan 1970 init.goldfish.rc
-rwxr-x--- 1 root root 5396 1. Jan 1970 init.marvel.rc
-rwxr-x--- 1 root root 20294 1. Jan 1970 init.rc
-rw-r--r-- 1 root root 11336 1. Jan 1970 logo.rle
drwxrwxr-x 1 root xxxxxxx 0 1. Aug 04:03 mnt
dr-xr-xr-x 1 root root 0 1. Jan 1970 proc
drwx------ 1 root root 0 16. Apr 19:08 root
drwxr-x--- 1 root root 0 1. Jan 1970 sbin
lrwxrwxrwx 1 root root 11 1. Aug 04:03 sdcard -> /mnt/sdcard
drwxr-xr-x 1 root root 0 1. Aug 04:03 sys
drwxr-xr-x 1 root root 4096 16. Apr 20:31 system
-rw-r--r-- 1 root root 0 1. Jan 1970 ueventd.goldfish.rc
-rw-r--r-- 1 root root 4311 1. Jan 1970 ueventd.rc
lrwxrwxrwx 1 root root 14 1. Aug 04:03 vendor -> /system/vendor
[email protected]:~/htc$
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/app-cache
xxxxx[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/cache
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/data
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/mnt
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/sdcard
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/system
[email protected]:~/htc$
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/app-cache
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/cache
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/data
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/mnt
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/sdcard
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/system
[email protected]:~/htc$ fusermount -u /home/xxxxxxx/htc/sshfs
[email protected]:~/htc$
Maybe many files left out due to permissions and ro mount:
~# chown xxxxxxx.xxxxxx /home/xxxxxxx/htc/sshfs
chown: Zugriff auf „/home/xxxxxxx/htc/sshfs“ nicht möglich: Keine Berechtigung
The 3 installed EICAR Testfiles cannot be missed by clamav.
Some more console apps on the market like iptraf were helpful to track down the trojan if we got x-permissions at all from ssh.
I'm out of options for now, HTC Europe support has taken over the case, will report.

Just wanted to let You know the trojan is still on the device and active:
Today he moved one of the EICAR virus testfiles to the sipdroid app's space (is this possible without root?), Lookout reported it.

If you're rooted, why not do terminal
su
ls -la (virus listed)
chmod +000 the apk
reboot
rm -rf

woprr said:
Just wanted to let You know the trojan is still on the device and active:
Today he moved one of the EICAR virus testfiles to the sipdroid app's space (is this possible without root?), Lookout reported it.
Click to expand...
Click to collapse
Indirect said:
If you're rooted, why not do terminal
su
ls -la (virus listed)
chmod +000 the apk
reboot
rm -rf
Click to expand...
Click to collapse
i think he isnt on root..

Still, it is a valid option.

No. Rooting voids warranty. I've bought this product for fun not for having work with it.

Then I don't know what to tell you dude.

I'm just on my 5th try to factory reset the phone and using my google account without htc sense, hopefully it does not restore the trojan again, if it does, htc support has one week to fix it or the product is sent back to the seller, I should do this anyway, there much better phones.
Does not work, google is restoring the phone now, despite explicitly disabled sync settings.
What a crap!
HTC cannot fix that, problem with google, I'll try without setting up Google account access and using only googlemail par IMAP/SMTP access to get rid of the stored android phone sync data on google account.

woprr said:
I'm just on my 5th try to factory reset the phone and using my google account without htc sense, hopefully it does not restore the trojan again, if it does, htc support has one week to fix it or the product is sent back to the seller, I should do this anyway, there much better phones.
Does not work, google is restoring the phone now, despite explicitly disabled sync settings.
What a crap!
Click to expand...
Click to collapse
Seems your trojan is re-enabling those settings somehow, and a factory reset only wipes /data, therefore, the trojan must be in /system, which would only be possible if the device is rooted, try typing "su" in terminal emulator, or check if / is r/w in root explorer, if either of those are right, then your device is rooted, and you should install a custom recovery and wipe everything except /boot. (Note: make sure to have a ROM (should be .zip) on the root of you sdcard to flash after you wipe everything, otherwise, the device will not boot)

1. I've said I do not want root. rooting voids warranty, I've paid HTC and google to manage the Product for me.
2. I do not have root:
Code:
ssh htc -p 2222
$ su
su: permission denied
$ echo test > /system/test
cannot create /system/test: read-only file system
$

If you were rooted, you would learn to fix things like this and wouldn't need a warranty unless it was accidental damage and even then, you can easily unroot your device and put s-on. It's not impossible. People unroot their devices to send in for warranty all the time.

I've said I've not yet decided to keep the phone. There're better ones for little money more around. In Germany You can revoke contracts with online sellers and return within 2 weeks.

woprr said:
I've said I've not yet decided to keep the phone. There're better ones for little money more around. In Germany You can revoke contracts with online sellers and return within 2 weeks.
Click to expand...
Click to collapse
Just return it and get something else since you don't want to root. You could root though, remove the virus, then unroot, as if you never had it touched...I don't see what use xda is if you're an unrooted user anyway, many things here require it, and i'm not trying to be rude to you.

How can a virus get the privileges on android you assume it's got without root access?

The virus itself could be running an exploit to allow root privledges also, it doesn't need root to be sending texts, only just to install itself into /system. Although it could also be hiding in dalvik

An exploit ^^. Scenario?
Ok, factory reset and not setup google +htc sense account in first run setup wizard should do the trick.
The Phone should be clean now.
I'm setting up google mail with the standard mua app, not the gmail app.
BTW, I've found the settings option to delete the sync data from google servers:
I'ts under Settings->Privacy->Backup and Restore->Uncheck Automatic restore (Msgbox popup warning: "...erase all copies on google servers?") but leave Back up my setting checked, if all is setup then setup google account in phone and sync.
Let's see if this works...
Looks like. But I dont know if the data on google servers got overwritten or merged.
I'will know when re-enabling automatic restore...

Related

NeedHelp:screwed up my g1,cant finished boot

It just loop on the green sparkling robot.
What I did is just modifying TC5-RC8 update.zip with test key, and do the update as normal.
I've been using RC8 for couple days since it's been released and no problem.
After this problem occurd, I've tried to re-flash it to the origianl TC5-RC8 update.zip which released by JesusFreke. BUT the problem still.
My guess is flash recovery.img when booting due to some hardware issues.
Need Your Help.
I finally do a update to and old version of my modified TC5-RC8, the phone booted.
The bad news is I do recovered it to factory mode, so I need to login to Google account again.
Unfortunately, when I finished the Login, and ready to press "Finish setup" and move(dont know how to express in English that movement, the screen is open, what I do is close it so it covers the keyboard) the the screen, and exception occured: "com.google.process.gapps has stopped..."
Don't know whether google will check its own sign or not, im using the test key.
And, I can do adb shell, this is the ps:
# ps
ps
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 264 176 c00a5cd0 0000c36c S /init
root 2 0 0 0 c005bd28 00000000 S kthreadd
root 3 2 0 0 c004c12c 00000000 S ksoftirqd/0
root 4 2 0 0 c006e978 00000000 S watchdog/0
root 5 2 0 0 c0058b40 00000000 S events/0
root 6 2 0 0 c0058b40 00000000 S khelper
root 7 2 0 0 c0182558 00000000 S suspend/0
root 8 2 0 0 c0058b40 00000000 S kblockd/0
root 9 2 0 0 c0058b40 00000000 S kmmcd
root 10 2 0 0 c0058b40 00000000 S btaddconn
root 11 2 0 0 c0058b40 00000000 S btdelconn
root 12 2 0 0 c0058b40 00000000 S qmi
root 13 2 0 0 c003263c 00000000 D rpcrouter
root 14 2 0 0 c0058b40 00000000 S detection/0
root 15 2 0 0 c0032fb4 00000000 S krpcserversd
root 16 2 0 0 c007a964 00000000 S pdflush
root 17 2 0 0 c007a964 00000000 S pdflush
root 18 2 0 0 c007e8b4 00000000 S kswapd0
root 19 2 0 0 c0058b40 00000000 S aio/0
root 20 2 0 0 c0032fb4 00000000 S kadspd
root 21 2 0 0 c0058b40 00000000 S panel_on/0
root 22 2 0 0 c0151ff8 00000000 S mtdblockd
root 23 2 0 0 c0157d84 00000000 S USB mass_storag
root 24 2 0 0 c0058b40 00000000 S synaptics_wq
root 25 2 0 0 c020dfc0 00000000 S krfcommd
system 26 1 796 276 c0189f10 afe0b74c S /system/bin/servicemanager
root 27 1 1828 336 ffffffff afe0b50c S /system/bin/mountd
root 28 1 652 252 c0196e68 afe0c0bc S /system/bin/debuggerd
radio 29 1 7720 936 ffffffff afe0bdbc S /system/bin/rild
media 31 1 17304 3420 ffffffff afe0b74c S /system/bin/mediaserver
bluetooth 33 1 1164 716 c00a5cd0 afe0c69c S /system/bin/dbus-daemon
root 34 1 788 292 c01fb090 afe0b50c S /system/bin/installd
compass 36 1 1304 572 c0169014 afe0b74c S /system/bin/akmd
root 37 1 3324 148 ffffffff 0000e664 S /sbin/adbd
root 43 2 0 0 c01751d0 00000000 S mmcqd
root 359 1 66044 19428 c00a62ec afe0b874 S zygote
system 360 359 183032 25080 ffffffff afe0b74c S system_server
radio 392 359 106732 18708 ffffffff afe0c824 S com.android.phone
app_11 409 359 88092 12244 ffffffff afe0c824 S com.android.mms
app_4 430 359 87436 10576 ffffffff afe0c824 S com.google.android.talk
app_12 441 359 87988 11940 ffffffff afe0c824 S android.process.media
app_14 444 359 90068 11992 ffffffff afe0c824 S android.process.acore
app_18 463 359 93428 14788 ffffffff afe0c824 S com.android.calendar
app_22 475 359 87120 11456 ffffffff afe0c824 S com.android.alarmclock
app_16 487 359 87472 11300 ffffffff afe0c824 S com.google.android.gm
app_8 582 359 106360 15604 ffffffff afe0c824 S com.android.setupwizard
app_0 608 359 94940 15916 ffffffff afe0c824 S com.google.process.gapps
root 645 2 0 0 c0032dc8 00000000 D audmgr_rpc
root 687 37 724 320 c0049a2c afe0c4cc S /system/bin/sh
root 689 687 868 328 00000000 afe0b50c R ps
#
Click to expand...
Click to collapse
I do it again, said "The setup wizzard stopped unexpectly"

[Q] ADK doubleshot config

Halp!
Its time for me to dive into some development.. In the process of reading I came across the Android Development Kitchen (no longer in development, booo). This tool supports a lot of HTC devices already and seemed pretty straightforward on adding additional devices.
But, I hit a stopping point.. I can't seem to find all the mount points it asks for in the doubleshot config file.
I was able to locate the following without issue
/system
/data
/cache
But i cannot for the life of me figure out where to find the other ones (sorry, i don't have the file infront of me to tell u exactly which ones). I think its the boot mount and one other..
Can another dev point me in the right direction to get this goin?
Also, which base is a great starting point? I would assume the de-odex'd stock rom?
Thanks in advance!
nicholasb said:
...
Can another dev point me in the right direction to get this goin?
Also, which base is a great starting point? I would assume the de-odex'd stock rom?
...
Click to expand...
Click to collapse
Here's a clue to get you started:
Code:
C:\Android\platform-tools>adb ls /dev/block
000041ed 00000398 4ea62f45 .
000041ed 00000870 4ea62f47 ..
00006180 00000000 4ea62f45 mmcblk1p1
00006180 00000000 4ea62f45 mmcblk1
00006180 00000000 4ea62f45 mmcblk0p31
00006180 00000000 4ea62f45 mmcblk0p30
00006180 00000000 4ea62f45 mmcblk0p29
00006180 00000000 4ea62f45 mmcblk0p28
00006180 00000000 4ea62f45 mmcblk0p27
00006180 00000000 4ea62f4d mmcblk0p26
00006180 00000000 4ea62f45 mmcblk0p25
00006180 00000000 4ea62f45 mmcblk0p24
00006180 00000000 4ea62f45 mmcblk0p23
00006180 00000000 4ea62f45 mmcblk0p22
00006180 00000000 4ea62f45 mmcblk0p21
00006180 00000000 4ea62f45 mmcblk0p20
00006180 00000000 4ea62f45 mmcblk0p19
00006180 00000000 4ea62f45 mmcblk0p18
00006180 00000000 4ea62f45 mmcblk0p17
00006180 00000000 4ea62f45 mmcblk0p16
00006180 00000000 4ea62f45 mmcblk0p15
00006180 00000000 4ea62f45 mmcblk0p14
00006180 00000000 4ea62f45 mmcblk0p13
00006180 00000000 4ea62f45 mmcblk0p12
00006180 00000000 4ea62f45 mmcblk0p11
00006180 00000000 4ea62f45 mmcblk0p10
00006180 00000000 4ea62f45 mmcblk0p9
00006180 00000000 4ea62f45 mmcblk0p8
00006180 00000000 4ea62f45 mmcblk0p7
00006180 00000000 4ea62f45 mmcblk0p6
00006180 00000000 4ea62f45 mmcblk0p5
00006180 00000000 4ea62f45 mmcblk0p4
00006180 00000000 4ea62f45 mmcblk0p3
00006180 00000000 4ea62f45 mmcblk0p2
00006180 00000000 4ea62f45 mmcblk0p1
00006180 00000000 4ea62f45 mmcblk0
00006180 00000000 4ea62f45 loop7
00006180 00000000 4ea62f45 loop6
00006180 00000000 4ea62f45 loop5
00006180 00000000 4ea62f45 loop4
00006180 00000000 4ea62f45 loop3
00006180 00000000 4ea62f45 loop2
00006180 00000000 4ea62f45 loop1
00006180 00000000 4ea62f45 loop0
000041ed 00000050 4ea62f44 vold
000041ed 00000050 4ea62f43 platform
C:\Android\platform-tools>
Obviously done on a windows machine, and I wish I had more time to get into it deeper.
This was done on a fresh restore from my original CWM backup I made a long time ago before I did anything crazy on the device, so you can take the info how you will.
If you're getting into what you're getting into, then mapping this out is a rite of passage for you, the rest of us are awaiting your findings
ETA:
This: Doubleshot_TMOUS_1.28.531.9_Radio_10.48.9007.00U_1 0.12.9007.07_M2_release
or this: Pure Stock Doubleshot, Root/Deodex/Busybox/Opt/Zip
...would be a good place to start for a base if you haven't made a stock backup of your own device.
Getting cable.. starting VM... and FREAKIN THANKS!
Linux has been awhile, feelin like a nub again. Here goes nuttin...
(noticed ICS port in mt4g forum...)
nicholasb said:
Getting cable.. starting VM... and FREAKIN THANKS!
Linux has been awhile, feelin like a nub again. Here goes nuttin...
(noticed ICS port in mt4g forum...)
Click to expand...
Click to collapse
Its not booting. That "dev" is 14 yrs old.
Sent from my Mytouch_4G_Slide using xda premium
Undeadk9 said:
Its not booting. That "dev" is 14 yrs old.
Sent from my Mytouch_4G_Slide using xda premium
Click to expand...
Click to collapse
lol, hey.. i was modifying Gorillaz and Scorched Earth in qbasic when i was 14 and in middleschool.. I wish i had such awesome tech to play around with at that age..
Back on topic.. Here is the output from: adb ls /dev/block
Code:
000041ed 00000410 4ea63951 .
000041ed 00000870 4ea63951 ..
00006180 00000000 4ea63951 dm-5
00006180 00000000 4ea63951 dm-4
00006180 00000000 4ea63951 dm-3
00006180 00000000 4ea63950 dm-2
00006180 00000000 4ea63950 dm-1
00006180 00000000 4ea63950 dm-0
00006180 00000000 4ea636a8 mmcblk1p1
00006180 00000000 4ea636a8 mmcblk1
00006180 00000000 4ea636a8 mmcblk0p31
00006180 00000000 4ea636a8 mmcblk0p30
00006180 00000000 4ea636a8 mmcblk0p29
00006180 00000000 4ea636a8 mmcblk0p28
00006180 00000000 4ea636a8 mmcblk0p27
00006180 00000000 4ea636b0 mmcblk0p26
00006180 00000000 4ea636a8 mmcblk0p25
00006180 00000000 4ea636a8 mmcblk0p24
00006180 00000000 4ea636a8 mmcblk0p23
00006180 00000000 4ea636a8 mmcblk0p22
00006180 00000000 4ea636a8 mmcblk0p21
00006180 00000000 4ea636a8 mmcblk0p20
00006180 00000000 4ea636a8 mmcblk0p19
00006180 00000000 4ea636a8 mmcblk0p18
00006180 00000000 4ea636a8 mmcblk0p17
00006180 00000000 4ea636a8 mmcblk0p16
00006180 00000000 4ea636a8 mmcblk0p15
00006180 00000000 4ea636a8 mmcblk0p14
00006180 00000000 4ea636a8 mmcblk0p13
00006180 00000000 4ea636a8 mmcblk0p12
00006180 00000000 4ea636a8 mmcblk0p11
00006180 00000000 4ea636a8 mmcblk0p10
00006180 00000000 4ea636a8 mmcblk0p9
00006180 00000000 4ea636a8 mmcblk0p8
00006180 00000000 4ea636a8 mmcblk0p7
00006180 00000000 4ea636a8 mmcblk0p6
00006180 00000000 4ea636a8 mmcblk0p5
00006180 00000000 4ea636a8 mmcblk0p4
00006180 00000000 4ea636a8 mmcblk0p3
00006180 00000000 4ea636a8 mmcblk0p2
00006180 00000000 4ea636a8 mmcblk0p1
00006180 00000000 4ea636a8 mmcblk0
00006180 00000000 4ea636a8 loop7
00006180 00000000 4ea636a8 loop6
00006180 00000000 4ea636a8 loop5
00006180 00000000 4ea636a8 loop4
00006180 00000000 4ea636a8 loop3
00006180 00000000 4ea636a8 loop2
00006180 00000000 4ea636a8 loop1
00006180 00000000 4ea636a8 loop0
000041ed 00000050 4ea636a8 vold
000041ed 00000050 4ea636a6 platform
Here is my kitchen config now:
Code:
# HTC myTouch 4G slide
change_mnt=yes
fix_boot=yes
param1=ext3
param2=EMMC
param1_sdcard=vfat
param2_sdcard=MTD
sys_mnt=\/dev\/block\/mmcblk0p22
cache_mnt=\/dev\/block\/mmcblk0p24
boot_mnt=\/dev\/block\/mmcblk0p20
data_mnt=\/dev\/block\/mmcblk0p23
sdcard_mnt=\/dev\/block\/mmcblk1p1
The mount point i was looking for was the boot one... How'd i do?
*edit*
Finally, found em all...

[Q] Android rot, gemilins, kernel segfaults etc...

Hi, I have a transformer infinity, rooted (via copy su over debug) and bootloader unlocked, but running stock kernel plus one update jelly bean (I've never installed any new kernel etc..)
The only reason I updated to jellybean was because apps kept crashing due to a memory allocation error with opengl, a known fault on the transformer. other than that things seemed pretty fast and stable, even if multitasking was non existant.
anyhow, now around 700-800mb of memory is used at startup, background apps get closed even if there is still free memory and usually only if switching between one or two apps and doing very little, the touch screen has stoped responsing (even though evtest on the correct /dev/input (event3) shows that the input device is actually working, when I copy and paste into the browser 99% of the time it pastes at the begning of the text box not the cursor position, frequent pauses, the launcher (homescreen etc..) seem to do nothing for ages (tens of seconds0, even though it's using loads of ram (presumably for caching the graphics... or just for a laugh), staart up time is well over a minute (longer than my wildfire phone from years ago) and I'm getting segfaults fro time to time: wtf is going on, I'm thinkig of wiping and just runniing gnu/linux on the device as android is seriously borked and the few feature rich apps that are on android, well, I'll just have to use my phone for that, at least I get pro apps on gnu/linux not very poor substitutes, if you could even call them that... that's a short list, including the 'mysterious' transformer screen crack that happened overnight with no one around, anyhow here's the segv (yes I had to cut and paste what I'd written so it came in above the segv I'd cut and pasted).
[ [114440.417747] [VIB]: vibrator_enable: 40
[114440.639822] cpu_up(1)+
[114440.647251] CPU1: Booted secondary processor
[114440.649618] Switched to NOHz mode on CPU #1
[114440.652067] tegra_cpu_init : emc_clk->min_rate to 204M
[114440.652283] cpu_up(1)-
[114440.739873] cpu_up(2)+
[114440.743553] CPU2: Booted secondary processor
[114440.744427] tegra_cpu_init : emc_clk->min_rate to 204M
[114440.744869] cpu_up(2)-
[114440.749407] Switched to NOHz mode on CPU #2
[114441.639826] cpu_up(3)+
[114441.644556] CPU3: Booted secondary processor
[114441.645097] tegra_cpu_init : emc_clk->min_rate to 204M
[114441.645415] cpu_up(3)-
[114441.649444] Switched to NOHz mode on CPU #3
[114443.639911] cpu_down(1)+
[114443.642338] CPU1: shutdown
[114443.644451] cpu_down(1)-
[114443.749829] Internal error: Oops - undefined instruction: 0 [#1] PREEMPT SMP
[114443.750090] Modules linked in: bcmdhd cfg80211 texfat(P) tntfs(P)
[114443.750829] CPU: 0 Tainted: P W (3.1.10-00001-gdc9b6cf #1)
[114443.751070] PC is at 0xc0b1d00c
[114443.751215] LR is at call_timer_fn+0x50/0x190
[114443.751460] pc : [<c0b1d00c>] lr : [<c00835e0>] psr: 60000113
[114443.751470] sp : c0a31dc0 ip : c0a31dc0 fp : c0a31dfc
[114443.751828] r10: c1711060 r9 : c0b1cb7c r8 : c0a30000
[114443.751965] r7 : c0a32080 r6 : c0b1cb6c r5 : 00000102 r4 : c0a30000
[114443.752205] r3 : c0b1cb7c r2 : 00000000 r1 : c0b1cb7c r0 : c0b1cb7c
[114443.752345] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment kernel
[114443.752584] Control: 10c5387d Table: 9749004a DAC: 00000015
[114443.752820]
[114443.752825] PC: 0xc0b1cf8c:
[114443.753066] cf8c c0b1cf8c c0b1cf8c c0b1cf94 c0b1cf94 c0b1cf9c c0b1cf9c c0b1cfa4 c0b1cfa4
[114443.754355] cfac c0b1cfac c0b1cfac c0b1cfb4 c0b1cfb4 c0b1cfbc c0b1cfbc c0b1cfc4 c0b1cfc4
[114443.755543] cfcc c0b1cfcc c0b1cfcc c0b1cfd4 c0b1cfd4 c0b1cfdc c0b1cfdc c0b1cfe4 c0b1cfe4
[114443.756862] cfec c0b1cfec c0b1cfec c0b1cff4 c0b1cff4 c0b1cffc c0b1cffc c0b1d004 c0b1d004
[114443.758176] d00c d6c91d30 d6c91d30 c0b1d014 c0b1d014 c0b1d01c c0b1d01c c0b1d024 c0b1d024
[114443.759483] d02c c0b1d02c c0b1d02c c0b1d034 c0b1d034 c0b1d03c c0b1d03c c0b1d044 c0b1d044
[114443.760691] d04c c0b1d04c c0b1d04c c0b1d054 c0b1d054 c0b1d05c c0b1d05c c0b1d064 c0b1d064
[114443.762004] d06c c0b1d06c c0b1d06c c0b1d074 c0b1d074 c0b1d07c c0b1d07c c0b1d084 c0b1d084
[114443.763317]
[114443.763322] LR: 0xc0083560:
[114443.763566] 3560 e592e00c e0010193 e24b0014 e3a03002 e3a02001 e58e3000 e3a03000 e50bc014
[114443.764870] 3580 e50b3010 eb196054 e24bd00c e89da800 e1a0c00d e92ddff0 e24cb004 e24dd014
[114443.766185] 35a0 e92d4000 e8bd4000 e59f3160 e1a09002 e1a0c00d e3cc4d7f e1a06000 e5932018
[114443.767391] 35c0 e3c4403f e50b1030 e3520000 e5945004 1a000035 e51b3030 e1a00009 e12fff33
[114443.768698] 35e0 e59f3128 e593202c e3520000 1a000014 e5943004 e1530005 0a000004 e59f6110
[114443.770011] 3600 e5563fb7 e3530001 1a000002 e5845004 e24bd028 e89daff0 e58d5000 e3a01e43
[114443.771287] 3620 e594c004 e51b3030 e59f00e8 e59f20e8 e58dc004 ebffc523 e3a03001 e5463fb7
[114443.772498] 3640 eafffff1 e5942004 e2822001 e5842004 e5938038 e3580000 0a00000b e5983000
[114443.773816]
[114443.773821] SP: 0xc0a31d40:
[114443.774061] 1d40 00cfd000 a560e39a 18109375 0000021b c0a31dbc c0a31d60 c0b1d010 60000113
[114443.775365] 1d60 c000f094 00000000 c0a31dfc c0a31d78 c000edc8 c00081a8 c0b1cb7c c0b1cb7c
[114443.776666] 1d80 00000000 c0b1cb7c c0a30000 00000102 c0b1cb6c c0a32080 c0a30000 c0b1cb7c
[114443.777973] 1da0 c1711060 c0a31dfc c0a31dc0 c0a31dc0 c00835e0 c0b1d00c 60000113 ffffffff
[114443.779175] 1dc0 2c1bea79 c00a6608 c0a31e20 c0b1cb7c c0a31dec c0a31e20 c0b1c820 c0b1cb6c
[114443.780483] 1de0 c0a32080 c0a30000 00ce5000 c1711060 c0a31e54 c0a31e00 c0084348 c008359c
[114443.781792] 1e00 c0b1cb90 00000000 02789879 c0a31e20 c0b1cb7c c0b1cb7c 00200200 c0b1d034
[114443.783091] 1e20 e63923f4 e61215f4 c0a31e54 00000101 c0a32044 c0a30000 00000000 00000001
[114443.784285]
[114443.784290] IP: 0xc0a31d40:
[114443.784639] 1d40 00cfd000 a560e39a 18109375 0000021b c0a31dbc c0a31d60 c0b1d010 60000113
[114443.785845] 1d60 c000f094 00000000 c0a31dfc c0a31d78 c000edc8 c00081a8 c0b1cb7c c0b1cb7c
[114443.787143] 1d80 00000000 c0b1cb7c c0a30000 00000102 c0b1cb6c c0a32080 c0a30000 c0b1cb7c
[114443.788425] 1da0 c1711060 c0a31dfc c0a31dc0 c0a31dc0 c00835e0 c0b1d00c 60000113 ffffffff
[114443.789746] 1dc0 2c1bea79 c00a6608 c0a31e20 c0b1cb7c c0a31dec c0a31e20 c0b1c820 c0b1cb6c
[114443.790955] 1de0 c0a32080 c0a30000 00ce5000 c1711060 c0a31e54 c0a31e00 c0084348 c008359c
[114443.792263] 1e00 c0b1cb90 00000000 02789879 c0a31e20 c0b1cb7c c0b1cb7c 00200200 c0b1d034
[114443.793567] 1e20 e63923f4 e61215f4 c0a31e54 00000101 c0a32044 c0a30000 00000000 00000001
[114443.794863]
[114443.794868] FP: 0xc0a31d7c:
[114443.795108] 1d7c c0b1cb7c 00000000 c0b1cb7c c0a30000 00000102 c0b1cb6c c0a32080 c0a30000
[114443.796422] 1d9c c0b1cb7c c1711060 c0a31dfc c0a31dc0 c0a31dc0 c00835e0 c0b1d00c 60000113
[114443.797625] 1dbc ffffffff 2c1bea79 c00a6608 c0a31e20 c0b1cb7c c0a31dec c0a31e20 c0b1c820
[114443.798930] 1ddc c0b1cb6c c0a32080 c0a30000 00ce5000 c1711060 c0a31e54 c0a31e00 c0084348
[114443.800228] 1dfc c008359c c0b1cb90 00000000 02789879 c0a31e20 c0b1cb7c c0b1cb7c 00200200
[114443.801530] 1e1c c0b1d034 e63923f4 e61215f4 c0a31e54 00000101 c0a32044 c0a30000 00000000
[114443.802741] 1e3c 00000001 00ce5000 c1711060 c0a31e9c c0a31e58 c007c010 c0084204 027859f9
[114443.803938] 1e5c 00006816 027859f9 0000000a 00000000 00000102 0310c580 c0a30000 c0a53018
[114443.805232]
[114443.805237] R0: 0xc0b1cafc:
[114443.805476] cafc c0b1cafc c0b1cafc c0b1cb04 c0b1cb04 c0b1cb0c c0b1cb0c c0b1cb14 c0b1cb14
[114443.806783] cb1c c0b1cb1c c0b1cb1c c0b1cb24 c0b1cb24 c0b1cb2c c0b1cb2c c0b1cb34 c0b1cb34
[114443.808090] cb3c c0b1cb3c c0b1cb3c c0b1cb44 c0b1cb44 c0b1cb4c c0b1cb4c c0b1cb54 c0b1cb54
[114443.809299] cb5c c0b1cb5c c0b1cb5c c0b1cb64 c0b1cb64 00000000 00200200 e605c558 e605c558
[114443.810610] cb7c c0b1cb7c c0b1cb7c c0b1cb84 c0b1cb84 c0b1cb8c c0b1cb8c c0b1cb94 c0b1cb94
[114443.811809] cb9c c0b1cb9c c0b1cb9c c0b1cba4 c0b1cba4 c0b1cbac c0b1cbac c0b1cbb4 c0b1cbb4
[114443.813103] cbbc c0b1cbbc c0b1cbbc c0b1cbc4 c0b1cbc4 c0b1cbcc c0b1cbcc c0b1cbd4 c0b1cbd4
[114443.814301] cbdc c0b1cbdc c0b1cbdc c0b1cbe4 c0b1cbe4 c0b1cbec c0b1cbec c0b1cbf4 c0b1cbf4
[114443.815612]
[114443.815617] R1: 0xc0b1cafc:
[114443.815862] cafc c0b1cafc c0b1cafc c0b1cb04 c0b1cb04 c0b1cb0c c0b1cb0c c0b1cb14 c0b1cb14
[114443.817172] cb1c c0b1cb1c c0b1cb1c c0b1cb24 c0b1cb24 c0b1cb2c c0b1cb2c c0b1cb34 c0b1cb34
[114443.818484] cb3c c0b1cb3c c0b1cb3c c0b1cb44 c0b1cb44 c0b1cb4c c0b1cb4c c0b1cb54 c0b1cb54
[114443.819689] cb5c c0b1cb5c c0b1cb5c c0b1cb64 c0b1cb64 00000000 00200200 e605c558 e605c558
[114443.820984] cb7c c0b1cb7c c0b1cb7c c0b1cb84 c0b1cb84 c0b1cb8c c0b1cb8c c0b1cb94 c0b1cb94
[114443.822258] cb9c c0b1cb9c c0b1cb9c c0b1cba4 c0b1cba4 c0b1cbac c0b1cbac c0b1cbb4 c0b1cbb4
[114443.823546] cbbc c0b1cbbc c0b1cbbc c0b1cbc4 c0b1cbc4 c0b1cbcc c0b1cbcc c0b1cbd4 c0b1cbd4
[114443.824842] cbdc c0b1cbdc c0b1cbdc c0b1cbe4 c0b1cbe4 c0b1cbec c0b1cbec c0b1cbf4 c0b1cbf4
[114443.826046]
[114443.826051] R3: 0xc0b1cafc:
[114443.826399] cafc c0b1cafc c0b1cafc c0b1cb04 c0b1cb04 c0b1cb0c c0b1cb0c c0b1cb14 c0b1cb14
[114443.827603] cb1c c0b1cb1c c0b1cb1c c0b1cb24 c0b1cb24 c0b1cb2c c0b1cb2c c0b1cb34 c0b1cb34
[114443.828912] cb3c c0b1cb3c c0b1cb3c c0b1cb44 c0b1cb44 c0b1cb4c c0b1cb4c c0b1cb54 c0b1cb54
[114443.830223] cb5c c0b1cb5c c0b1cb5c c0b1cb64 c0b1cb64 00000000 00200200 e605c558 e605c558
[114443.831525] cb7c c0b1cb7c c0b1cb7c c0b1cb84 c0b1cb84 c0b1cb8c c0b1cb8c c0b1cb94 c0b1cb94
[114443.832719] cb9c c0b1cb9c c0b1cb9c c0b1cba4 c0b1cba4 c0b1cbac c0b1cbac c0b1cbb4 c0b1cbb4
[114443.834036] cbbc c0b1cbbc c0b1cbbc c0b1cbc4 c0b1cbc4 c0b1cbcc c0b1cbcc c0b1cbd4 c0b1cbd4
[114443.835355] cbdc c0b1cbdc c0b1cbdc c0b1cbe4 c0b1cbe4 c0b1cbec c0b1cbec c0b1cbf4 c0b1cbf4
[114443.836557]
[114443.836562] R4: 0xc0a2ff80:
[114443.836803] ff80 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.838080] ffa0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.839275] ffc0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.840577] ffe0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.841881] 0000 00000002 00000104 00000000 c0a5a598 c0a8fd30 00000000 00000015 c0a5a598
[114443.843177] 0020 c17134c0 e5c9b240 c0a30000 00000000 e6102380 d5ac1140 c0a31f7c c0a31ee0
[114443.844386] 0040 c06d9cec 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.845693] 0060 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.846991]
[114443.846996] R6: 0xc0b1caec:
[114443.847235] caec c0b1caec c0b1caec c0b1caf4 c0b1caf4 c0b1cafc c0b1cafc c0b1cb04 c0b1cb04
[114443.848543] cb0c c0b1cb0c c0b1cb0c c0b1cb14 c0b1cb14 c0b1cb1c c0b1cb1c c0b1cb24 c0b1cb24
[114443.849863] cb2c c0b1cb2c c0b1cb2c c0b1cb34 c0b1cb34 c0b1cb3c c0b1cb3c c0b1cb44 c0b1cb44
[114443.851070] cb4c c0b1cb4c c0b1cb4c c0b1cb54 c0b1cb54 c0b1cb5c c0b1cb5c c0b1cb64 c0b1cb64
[114443.852379] cb6c 00000000 00200200 e605c558 e605c558 c0b1cb7c c0b1cb7c c0b1cb84 c0b1cb84
[114443.853688] cb8c c0b1cb8c c0b1cb8c c0b1cb94 c0b1cb94 c0b1cb9c c0b1cb9c c0b1cba4 c0b1cba4
[114443.854972] cbac c0b1cbac c0b1cbac c0b1cbb4 c0b1cbb4 c0b1cbbc c0b1cbbc c0b1cbc4 c0b1cbc4
[114443.856177] cbcc c0b1cbcc c0b1cbcc c0b1cbd4 c0b1cbd4 c0b1cbdc c0b1cbdc c0b1cbe4 c0b1cbe4
[114443.857495]
[114443.857500] R7: 0xc0a32000:
[114443.857743] 2000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.859047] 2020 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.860347] 2040 c007b700 c00841f8 c0550b28 c05559f4 c0275acc c02762f0 c007b8c0 c006f8ec
[114443.861658] 2060 c009bc9c c00c7214 00000000 00000000 00000000 00000000 00000000 00000000
[114443.862859] 2080 00ae2b71 00000001 00000000 00000000 00000000 00000000 00000000 00000000
[114443.864159] 20a0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.865456] 20c0 014a62ba 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.866760] 20e0 c0a320e0 c0a320e0 00000000 00000000 00000000 00000000 00000000 00000000
[114443.867954]
[114443.867959] R8: 0xc0a2ff80:
[114443.868302] ff80 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.869501] ffa0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.870786] ffc0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.872071] ffe0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.873376] 0000 00000002 00000104 00000000 c0a5a598 c0a8fd30 00000000 00000015 c0a5a598
[114443.874580] 0020 c17134c0 e5c9b240 c0a30000 00000000 e6102380 d5ac1140 c0a31f7c c0a31ee0
[114443.875891] 0040 c06d9cec 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.877203] 0060 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.878504]
[114443.878510] R9: 0xc0b1cafc:
[114443.878750] cafc c0b1cafc c0b1cafc c0b1cb04 c0b1cb04 c0b1cb0c c0b1cb0c c0b1cb14 c0b1cb14
[114443.880059] cb1c c0b1cb1c c0b1cb1c c0b1cb24 c0b1cb24 c0b1cb2c c0b1cb2c c0b1cb34 c0b1cb34
[114443.881250] cb3c c0b1cb3c c0b1cb3c c0b1cb44 c0b1cb44 c0b1cb4c c0b1cb4c c0b1cb54 c0b1cb54
[114443.882557] cb5c c0b1cb5c c0b1cb5c c0b1cb64 c0b1cb64 00000000 00200200 e605c558 e605c558
[114443.883762] cb7c c0b1cb7c c0b1cb7c c0b1cb84 c0b1cb84 c0b1cb8c c0b1cb8c c0b1cb94 c0b1cb94
[114443.885076] cb9c c0b1cb9c c0b1cb9c c0b1cba4 c0b1cba4 c0b1cbac c0b1cbac c0b1cbb4 c0b1cbb4
[114443.886295] cbbc c0b1cbbc c0b1cbbc c0b1cbc4 c0b1cbc4 c0b1cbcc c0b1cbcc c0b1cbd4 c0b1cbd4
[114443.887580] cbdc c0b1cbdc c0b1cbdc c0b1cbe4 c0b1cbe4 c0b1cbec c0b1cbec c0b1cbf4 c0b1cbf4
[114443.888871]
[114443.888876] R10: 0xc1710fe0:
[114443.889121] 0fe0 57f9e4b2 85e3a3dc 03486f79 578fdfc2 cb36c3b4 0fb16f75 4e279d4c 511b46be
[114443.890431] 1000 004c0000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.891736] 1020 00000000 00000001 00000000 c0aa8bc8 ef939a40 c1719034 c0aa8bd8 c0aa8be8
[114443.892944] 1040 c0aa8bd8 c0aa8900 ef9369f8 00000003 00000007 c0a5a598 004c0000 00000000
[114443.894261] 1060 c009b940 c001589c 0310c580 00006816 35e50d83 00000004 000003e8 00000000
[114443.895465] 1080 1e666666 0000001f 00000003 00000007 0000072b c0014aac c0015834 0000000f
[114443.896775] 10a0 ffffffff c0855460 0000015e 0000001d c06f68ec c0a92610 c0a5c8b4 00000000
[114443.897984] 10c0 c1711060 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[114443.899304] Process swapper (pid: 0, stack limit = 0xc0a302f0)
[114443.899544] Stack: (0xc0a31dc0 to 0xc0a32000)
[114443.899688] 1dc0: 2c1bea79 c00a6608 c0a31e20 c0b1cb7c c0a31dec c0a31e20 c0b1c820 c0b1cb6c
[114443.899939] 1de0: c0a32080 c0a30000 00ce5000 c1711060 c0a31e54 c0a31e00 c0084348 c008359c
[114443.900190] 1e00: c0b1cb90 00000000 02789879 c0a31e20 c0b1cb7c c0b1cb7c 00200200 c0b1d034
[114443.900335] 1e20: e63923f4 e61215f4 c0a31e54 00000101 c0a32044 c0a30000 00000000 00000001
[114443.900583] 1e40: 00ce5000 c1711060 c0a31e9c c0a31e58 c007c010 c0084204 027859f9 00006816
[114443.900836] 1e60: 027859f9 0000000a 00000000 00000102 0310c580 c0a30000 c0a53018 c0a2ddf8
[114443.900981] 1e80: 00000000 c0a2c060 00ce5000 c1711060 c0a31eb4 c0a31ea0 c007c6d4 c007bf40
[114443.901227] 1ea0: 00000000 c0a30000 c0a31ee4 c0a31eb8 c000838c c007c638 c028ee48 c004c334
[114443.901473] 1ec0: 20000013 fe040100 c0a31f1c e66fe400 412fc099 00000000 c0a31f54 c0a31ee8
[114443.901722] 1ee0: c000ecb8 c0008314 00001a9b 00000000 00000000 000f4240 02104571 00006816
[114443.901867] 1f00: 00000000 e66fe410 e66fe400 412fc099 00000000 c0a31f54 3b9ac9ff c0a31f30
[114443.902114] 1f20: c028ee48 c004c334 20000013 ffffffff 027832e9 00006816 00000000 00001a9b
[114443.902359] 1f40: c0a30000 c0a30000 c0a31f8c c0a31f58 c049a130 c004c2d4 02102631 00006816
[114443.902604] 1f60: c009ce58 c0a30000 c0af4d04 c06f6974 c0a5b7b4 8000406a 412fc099 00000000
[114443.902749] 1f80: c0a31fac c0a31f90 c0010278 c049a058 c0a30000 00000000 c0a07f7c c170e2a0
[114443.902997] 1fa0: c0a31fc4 c0a31fb0 c06ae798 c00101bc c0a0c150 c0a52e2c c0a31ff4 c0a31fc8
[114443.903245] 1fc0: c09d1864 c06ae710 c09d12c4 00000000 00000000 c0a07f7c 10c5387d c0a51650
[114443.903493] 1fe0: c0a07f74 c0a5b7ac 00000000 c0a31ff8 80008040 c09d15a0 00000000 00000000
[114443.903654] [<c00835e0>] (call_timer_fn+0x50/0x190) from [<c0084348>] (run_timer_softirq+0x150/0x2a8)
[114443.903915] [<c0084348>] (run_timer_softirq+0x150/0x2a8) from [<c007c010>] (__do_softirq+0xdc/0x278)
[114443.904168] [<c007c010>] (__do_softirq+0xdc/0x278) from [<c007c6d4>] (irq_exit+0xa8/0xb0)
[114443.904420] [<c007c6d4>] (irq_exit+0xa8/0xb0) from [<c000838c>] (do_local_timer+0x84/0xa4)
[114443.904571] [<c000838c>] (do_local_timer+0x84/0xa4) from [<c000ecb8>] (__irq_svc+0x38/0xd0)
[114443.904806] Exception stack(0xc0a31ee8 to 0xc0a31f30)
[114443.905045] 1ee0: 00001a9b 00000000 00000000 000f4240 02104571 00006816
[114443.905189] 1f00: 00000000 e66fe410 e66fe400 412fc099 00000000 c0a31f54 3b9ac9ff c0a31f30
[114443.905434] 1f20: c028ee48 c004c334 20000013 ffffffff
[114443.905685] [<c000ecb8>] (__irq_svc+0x38/0xd0) from [<c004c334>] (tegra_idle_enter_lp3+0x6c/0x74)
[114443.905847] [<c004c334>] (tegra_idle_enter_lp3+0x6c/0x74) from [<c049a130>] (cpuidle_idle_call+0xe4/0x290)
[114443.906112] [<c049a130>] (cpuidle_idle_call+0xe4/0x290) from [<c0010278>] (cpu_idle+0xc8/0x11c)
[114443.906375] [<c0010278>] (cpu_idle+0xc8/0x11c) from [<c06ae798>] (rest_init+0x94/0xac)
[114443.906641] [<c06ae798>] (rest_init+0x94/0xac) from [<c09d1864>] (start_kernel+0x2d0/0x324)
[114443.906786] Code: c0b1cffc c0b1cffc c0b1d004 c0b1d004 (d6c91d30)
[114443.907123] ---[ end trace e6a0be6a6a3309db ]---
[114443.907263] Kernel panic - not syncing: Fatal exception in interrupt
[114443.907529] [<c0016410>] (unwind_backtrace+0x0/0x144) from [<c06c47e0>] (dump_stack+0x20/0x24)
[114443.907784] [<c06c47e0>] (dump_stack+0x20/0x24) from [<c06c6574>] (panic+0x88/0x1b4)
[114443.907931] [<c06c6574>] (panic+0x88/0x1b4) from [<c001347c>] (die+0xd0/0xe4)
[114443.908184] [<c001347c>] (die+0xd0/0xe4) from [<c00134b8>] (arm_notify_die+0x28/0x60)
[114443.908437] [<c00134b8>] (arm_notify_die+0x28/0x60) from [<c00082e4>] (do_undefinstr+0x148/0x16c)
[114443.908695] [<c00082e4>] (do_undefinstr+0x148/0x16c) from [<c000edc8>] (__und_svc+0x48/0x60)
[114443.908831] Exception stack(0xc0a31d78 to 0xc0a31dc0)
[114443.909067] 1d60: c0b1cb7c c0b1cb7c
[114443.909315] 1d80: 00000000 c0b1cb7c c0a30000 00000102 c0b1cb6c c0a32080 c0a30000 c0b1cb7c
[114443.909458] 1da0: c1711060 c0a31dfc c0a31dc0 c0a31dc0 c00835e0 c0b1d00c 60000113 ffffffff
[114443.909713] [<c000edc8>] (__und_svc+0x48/0x60) from [<c0b1d00c>] (0xc0b1d00c)
[114443.909985] CPU3: stopping
[114443.910149] [<c0016410>] (unwind_backtrace+0x0/0x144) from [<c06c47e0>] (dump_stack+0x20/0x24)
[114443.910403] [<c06c47e0>] (dump_stack+0x20/0x24) from [<c0008590>] (do_IPI+0x1e4/0x218)
[114443.910554] [<c0008590>] (do_IPI+0x1e4/0x218) from [<c000ecb8>] (__irq_svc+0x38/0xd0)
[114443.910797] Exception stack(0xef8d7f18 to 0xef8d7f60)
[114443.910933] 7f00: 0000c404 00000000
[114443.911078] 7f20: 00000000 000f4240 090790e1 00006816 00000000 e67da810 e67da800 412fc099
[114443.911324] 7f40: 00000003 ef8d7f84 3b9ac9ff ef8d7f60 c028ee48 c004c334 20000013 ffffffff
[114443.911578] [<c000ecb8>] (__irq_svc+0x38/0xd0) from [<c004c334>] (tegra_idle_enter_lp3+0x6c/0x74)
[114443.911734] [<c004c334>] (tegra_idle_enter_lp3+0x6c/0x74) from [<c049a130>] (cpuidle_idle_call+0xe4/0x290)
[114443.911890] [<c049a130>] (cpuidle_idle_call+0xe4/0x290) from [<c0010278>] (cpu_idle+0xc8/0x11c)
[114443.912158] [<c0010278>] (cpu_idle+0xc8/0x11c) from [<c06c16c8>] (secondary_start_kernel+0x138/0x158)
[114443.912413] [<c06c16c8>] (secondary_start_kernel+0x138/0x158) from [<806c0fd4>] (0x806c0fd4)
[114443.912663] CPU2: stopping
[114443.912825] [<c0016410>] (unwind_backtrace+0x0/0x144) from [<c06c47e0>] (dump_stack+0x20/0x24)
[114443.913079] [<c06c47e0>] (dump_stack+0x20/0x24) from [<c0008590>] (do_IPI+0x1e4/0x218)
[114443.913232] [<c0008590>] (do_IPI+0x1e4/0x218) from [<c000ecb8>] (__irq_svc+0x38/0xd0)
[114443.913475] Exception stack(0xef8cbf18 to 0xef8cbf60)
[114443.913717] bf00: 0001d570 00000000
[114443.913861] bf20: 00000000 000f4240 04db8301 00006816 00000000 e67dac10 e67dac00 412fc099
[114443.914107] bf40: 00000002 ef8cbf84 3b9ac9ff ef8cbf60 c028ee48 c004c334 20000013 ffffffff
[114443.914359] [<c000ecb8>] (__irq_svc+0x38/0xd0) from [<c004c334>] (tegra_idle_enter_lp3+0x6c/0x74)
[114443.914612] [<c004c334>] (tegra_idle_enter_lp3+0x6c/0x74) from [<c049a130>] (cpuidle_idle_call+0xe4/0x290)
[114443.914764] [<c049a130>] (cpuidle_idle_call+0xe4/0x290) from [<c0010278>] (cpu_idle+0xc8/0x11c)
[114443.915022] [<c0010278>] (cpu_idle+0xc8/0x11c) from [<c06c16c8>] (secondary_start_kernel+0x138/0x158)
[114443.915276] [<c06c16c8>] (secondary_start_kernel+0x138/0x158) from [<806c0fd4>] (0x806c0fd4)
[114443.915528] Rebooting in 10 seconds..
[114453.925853] Restarting Linux version 3.1.10-00001-gdc9b6cf ([email protected]) (gcc version 4.6.x-google 20120106 (prerelease) (GCC) ) #1 SMP PREEMPT Fri Dec 28 19:02:52 CST 2012
[114453.925877]
No errors detected
I should add that there also seems to be some major 2d graphics performance issues, for instance GMIP, over tightvncserver, over xrdp, over and xrdp client is about as laggy as a native android painting app which drawing some simple airbrush lines. using top etc.. the xrdp client is CPU limiting the whole lot, using say, 150% CPU, where as tightvncserver and xrdp are using under 30% each (that should be doing harder graphics processing work) and gimp about 10%
there are also lots of other random bugs, for instance if i have the charger plugged in, from time to time, the black and white image you get when the charger plugs in appears on the screen.. sometimes it seems like external storage unmounts too, sometimes the pointer clickins on the screen when I am typing (though this may be the trackpad being annoyingly over sensitive), filemanager wont open flv files, files don't show up when apps try to open pictures or videos (presumably using some built in android cache) though if I use an app that just looks at the files (like vnc or a filebrowser) the files are there and open just fine.
oliverthered said:
anyhow, now around 700-800mb of memory is used at startup, background apps get closed even if there is still free memory and usually only if switching between one or two apps and doing very little
Click to expand...
Click to collapse
Seems to be typical behavior, unfortunately. Different application types get different kill priorities as far as the lowmemorykiller is concerned. It might just be that it's being a bit aggressive with those apps it thinks it can get away with it on.
when I copy and paste into the browser 99% of the time it pastes at the begning of the text box not the cursor position
Click to expand...
Click to collapse
I think I've had this experience too, although I don't know if as often. Text selection and cursor positioning do seem buggy and unrefined at times.
staart up time is well over a minute (longer than my wildfire phone from years ago)
Click to expand...
Click to collapse
Also typical for this device.
and I'm getting segfaults fro time to time
Click to expand...
Click to collapse
If you're using the stock kernel and getting kernel panics, it might be a hardware issue. CPU overheating or memory gone bad. I wonder if there's a port of, or equivalent to, memtest86 for Android/ARM...
oliverthered said:
there are also lots of other random bugs, for instance if i have the charger plugged in, from time to time, the black and white image you get when the charger plugs in appears on the screen.. sometimes it seems like external storage unmounts too,
Click to expand...
Click to collapse
If you mean the little "toast" message gets stuck on the screen, I get this too. Usually when turning on/off Wi-Fi.
filemanager wont open flv files
Click to expand...
Click to collapse
This has never worked for me either. I don't know offhand if there's a way to associate files with apps using the stock filemanager.
My wildfire seems to do a better job at keeping backgroup processes running and it even happens with 1gb of swap space enabled, I may try to get a kernel with the feature disabled since even something like catlog get's killed if I'm running another process, all too regurlally.
The kernel panicks seem to be all too consistent for a hardware memory issue, I found that if I start up the device then start doing a lot of typing it seems to trip the segfault. I'll capture a few more last_kmsg tails too see how consistant they are.
It's not the toast message getting 'stuck' it's that it keeps popping up from time to time, say every ten minutes or so if I'm watching a movie on hdmi out and doing nothing else with the device plugged into the charger all that time.
becomingx said:
Seems to be typical behavior, unfortunately. Different application types get different kill priorities as far as the lowmemorykiller is concerned. It might just be that it's being a bit aggressive with those apps it thinks it can get away with it on.
If you're using the stock kernel and getting kernel panics, it might be a hardware issue. CPU overheating or memory gone bad. I wonder if there's a port of, or equivalent to, memtest86 for Android/ARM...
If you mean the little "toast" message gets stuck on the screen, I get this too. Usually when turning on/off Wi-Fi.
Click to expand...
Click to collapse
oliverthered said:
My wildfire seems to do a better job at keeping backgroup processes running and it even happens with 1gb of swap space enabled, I may try to get a kernel with the feature disabled since even something like catlog get's killed if I'm running another process, all too regurlally.
Click to expand...
Click to collapse
That would be interesting (I'm assuming you mean the lowmemorykiller as the feature?). I can imagine how the system would act without it.
The kernel panicks seem to be all too consistent for a hardware memory issue, I found that if I start up the device then start doing a lot of typing it seems to trip the segfault. I'll capture a few more last_kmsg tails too see how consistant they are.
Click to expand...
Click to collapse
Hmm, virtual keyboard or hardware keyboard, or does it not matter? Either way, let me know about the faults. I used to be pretty good at reading kernel panics, but I'm a few years out of practice. I'd still like to see what the differences are, if any.
It's not the toast message getting 'stuck' it's that it keeps popping up from time to time, say every ten minutes or so if I'm watching a movie on hdmi out and doing nothing else with the device plugged into the charger all that time.
Click to expand...
Click to collapse
Ah! When the screen got cracked, do you think it might have damaged more than that? Maybe the mainboard or the dock connector?

disable services at android?? nfc

Hi
I cant find the daemon for some services, can somebody explain me how to disable services with android
i have root and terminal for android
At APPS i have disabled NFC service, but after print "ps" at terminal this nfc service daemon Still working.
Here is ps of my phone
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 2668 880 c02829a0 0002a808 S /init
root 2 0 0 0 c01c59a4 00000000 S kthreadd
root 3 2 0 0 c01cd87c 00000000 S ksoftirqd/0
root 6 2 0 0 c018b6e4 00000000 S kworker/u:0
root 7 2 0 0 c0188aac 00000000 S kworker/u:0H
root 8 2 0 0 c01cd87c 00000000 S migration/0
root 9 2 0 0 c01c51b8 00000000 R migration/1
root 10 2 0 0 c01c51b8 00000000 R ksoftirqd/1
root 11 2 0 0 c01c0038 00000000 S kworker/1:0
root 12 2 0 0 c01c0038 00000000 S kworker/1:0H
root 13 2 0 0 c01c51b8 00000000 R migration/2
root 14 2 0 0 c01c51b8 00000000 R ksoftirqd/2
root 16 2 0 0 c01c0038 00000000 S kworker/2:0H
root 17 2 0 0 c01cd87c 00000000 S migration/3
root 18 2 0 0 c01cd87c 00000000 S ksoftirqd/3
root 20 2 0 0 c01c0038 00000000 S kworker/3:0H
root 21 2 0 0 c01bfa08 00000000 S khelper
root 22 2 0 0 c01bfa08 00000000 S netns
root 27 2 0 0 c01c0038 00000000 S kworker/0:1H
root 28 2 0 0 c01bfa08 00000000 S modem_notifier
root 29 2 0 0 c01bfa08 00000000 S smd_channel_clo
root 30 2 0 0 c01bfa08 00000000 S smsm_cb_wq
root 32 2 0 0 c01bfa08 00000000 S rpm-smd
root 33 2 0 0 c01c0038 00000000 S kworker/u:1H
root 34 2 0 0 c01bfa08 00000000 S mpm
root 35 2 0 0 c02510f0 00000000 S sync_supers
root 36 2 0 0 c025172c 00000000 S bdi-default
root 37 2 0 0 c01bfa08 00000000 S kblockd
root 38 2 0 0 c0443218 00000000 S system
root 39 2 0 0 c04fd304 00000000 S khubd
root 40 2 0 0 c020b6c0 00000000 S irq/99-msm_iomm
root 41 2 0 0 c020b6c0 00000000 S irq/105-msm_iom
root 42 2 0 0 c020b6c0 00000000 S irq/77-msm_iomm
root 43 2 0 0 c020b6c0 00000000 S irq/70-msm_iomm
root 44 2 0 0 c020b6c0 00000000 S irq/94-msm_iomm
root 45 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 46 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 47 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 48 2 0 0 c020b6c0 00000000 S irq/79-msm_iomm
root 49 2 0 0 c020b6c0 00000000 S irq/78-msm_iomm
root 50 2 0 0 c020b6c0 00000000 S irq/78-msm_iomm
root 51 2 0 0 c020b6c0 00000000 S irq/74-msm_iomm
root 52 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 53 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 54 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 55 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 56 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 57 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 58 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 59 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 60 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 61 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 62 2 0 0 c01bfa08 00000000 S devfreq_wq
root 63 2 0 0 c01bfa08 00000000 S l2cap
root 64 2 0 0 c01bfa08 00000000 S a2mp
root 65 2 0 0 c01bfa08 00000000 S cfg80211
root 77 2 0 0 c020b6c0 00000000 S irq/476-adsp
root 78 2 0 0 c020b6c0 00000000 S irq/412-mba
root 79 2 0 0 c020b6c0 00000000 S irq/540-wcnss
root 80 2 0 0 c01bfa08 00000000 S qmi
root 81 2 0 0 c01bfa08 00000000 S nmea
root 82 2 0 0 c01bfa08 00000000 S msm_ipc_router
root 83 2 0 0 c01bfa08 00000000 S apr_driver
root 84 2 0 0 c0248b34 00000000 S kswapd0
root 85 2 0 0 c0268c94 00000000 S ksmd
root 86 2 0 0 c02ab534 00000000 S fsnotify_mark
root 87 2 0 0 c0330260 00000000 S ecryptfs-kthrea
root 88 2 0 0 c01bfa08 00000000 S crypto
root 109 2 0 0 c01bfa08 00000000 S ad_calc_wq
root 110 2 0 0 c03f9d94 00000000 D mdss_dsi_event
root 111 2 0 0 c01bfa08 00000000 S k_hsuart
root 112 2 0 0 c01bfa08 00000000 S diag_real_time_
root 113 2 0 0 c01bfa08 00000000 S diag_modem_data
root 114 2 0 0 c01bfa08 00000000 S diag_lpass_data
root 115 2 0 0 c01bfa08 00000000 S diag_wcnss_data
root 116 2 0 0 c01bfa08 00000000 S diag_wq
root 117 2 0 0 c01bfa08 00000000 S diag_usb_wq
root 118 2 0 0 c01bfa08 00000000 S diag_cntl_wq
root 119 2 0 0 c01bfa08 00000000 S diag_dci_wq
root 120 2 0 0 c01bfa08 00000000 S kgsl-3d0
root 121 2 0 0 c01bfa08 00000000 S kgsl_devfreq_wq
root 122 2 0 0 c01bfa08 00000000 S f9966000.spi
root 123 2 0 0 c01bfa08 00000000 S f9965000.spi
root 126 2 0 0 c01bfa08 00000000 S usbnet
root 127 2 0 0 c01bfa08 00000000 S k_rmnet_mux_wor
root 128 2 0 0 c01bfa08 00000000 S f_mtp
root 129 2 0 0 c056e090 00000000 S file-storage
root 130 2 0 0 c01bfa08 00000000 S uether
root 131 2 0 0 c01c0038 00000000 S kworker/1:2
root 133 2 0 0 c01bfa08 00000000 S dsx_exp_workque
root 135 2 0 0 c01bfa08 00000000 S fwu_workqueue
root 137 2 0 0 c01bfa08 00000000 S msm_vidc_worker
root 138 2 0 0 c01bfa08 00000000 S pm_workerq_venu
root 139 2 0 0 c01bfa08 00000000 S msm_vidc_worker
root 140 2 0 0 c01bfa08 00000000 S fwu_workqueue
root 141 2 0 0 c020b6c0 00000000 S irq/344-synapti
root 142 2 0 0 c01bfa08 00000000 S msm_cpp_workque
root 143 2 0 0 c01bfa08 00000000 S dm_bufio_cache
root 144 2 0 0 c01cd87c 00000000 S dbs_sync/0
root 145 2 0 0 c01c51b8 00000000 R dbs_sync/1
root 146 2 0 0 c01c51b8 00000000 R dbs_sync/2
root 147 2 0 0 c01cd87c 00000000 S dbs_sync/3
root 148 2 0 0 c069aba0 00000000 S cfinteractive
root 149 2 0 0 c020b6c0 00000000 S irq/170-msm_sdc
root 150 2 0 0 c020b6c0 00000000 S irq/253-msm_sdc
root 169 2 0 0 c01bfa08 00000000 S binder
root 170 2 0 0 c01bfa08 00000000 S usb_bam_wq
root 171 2 0 0 c01bfa08 00000000 S bam_dmux_rx
root 172 2 0 0 c01bfa08 00000000 S bam_dmux_tx
root 173 2 0 0 c01bfa08 00000000 S rq_stats
root 174 2 0 0 c01bfa08 00000000 S deferwq
root 178 2 0 0 c01bfa08 00000000 S sb-1
root 179 2 0 0 c020b6c0 00000000 S irq/195-ngd_sli
root 180 2 0 0 c04d5af8 00000000 D ngd_rx_thread1
root 181 2 0 0 c04d37ac 00000000 D ngd_notify_sl1
root 182 2 0 0 c0b295bc 00000000 S msm_thermal:hot
root 183 2 0 0 c0b29474 00000000 S msm_thermal:fre
root 184 2 0 0 c0b28d80 00000000 S msm_thermal:the
root 185 2 0 0 c01cd87c 00000000 S boost_sync/0
root 186 2 0 0 c01c51b8 00000000 R boost_sync/1
root 187 2 0 0 c01c51b8 00000000 R boost_sync/2
root 188 2 0 0 c01cd87c 00000000 S boost_sync/3
root 189 2 0 0 c06b38b0 00000000 S mmcqd/0
root 190 2 0 0 c06b38b0 00000000 S mmcqd/0rpmb
root 191 1 2664 628 c02829a0 0002a808 S /sbin/ueventd
root 193 2 0 0 c031764c 00000000 S jbd2/mmcblk0p14
root 194 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 199 2 0 0 c031764c 00000000 S jbd2/mmcblk0p28
root 200 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 204 2 0 0 c031764c 00000000 S jbd2/mmcblk0p16
root 205 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 209 2 0 0 c031764c 00000000 S jbd2/mmcblk0p15
root 210 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 235 2 0 0 c01bfa08 00000000 S IPCRTR
root 237 2 0 0 c01bfa08 00000000 S ipc_rtr_q6_ipcr
logd 238 1 15136 3340 ffffffff b6f57580 S /system/bin/logd
root 239 1 3700 328 c02aede8 00033cd0 S /sbin/healthd
root 240 1 4392 1036 c02aede8 b6eb1bd8 S /system/bin/lmkd
system 241 1 3300 624 c070f570 b6eb7640 S /system/bin/servicemanager
root 242 1 9656 1700 ffffffff b6f22f38 S /system/bin/vold
system 243 1 132708 12564 ffffffff b6ee3bd8 S /system/bin/surfaceflinger
nobody 244 1 16700 904 ffffffff b6f7595c S /system/bin/rmt_storage
system 245 1 5984 880 ffffffff b6ec695c S /system/bin/rfs_access
system 246 1 4936 976 c01aa32c b6f6ea84 S /system/bin/qseecomd
audit 249 1 3100 568 c02829a0 b6ef8dc8 S /system/bin/auditd
root 250 1 27816 2232 ffffffff b6f73f38 S /system/bin/netd
root 251 1 3872 808 c09ad2a8 b6fa348c S /system/bin/debuggerd
radio 252 1 48472 9060 ffffffff b6fa9f38 S /system/bin/rild
drm 253 1 16576 5256 ffffffff b6ea8640 S /system/bin/drmserver
media 254 1 194600 24588 ffffffff b6f1e640 S /system/bin/mediaserver
install 255 1 3256 680 c0a6d95c b6f87f84 S /system/bin/installd
radio 257 1 27044 1376 ffffffff b6ea695c S /system/bin/qmuxd
radio 259 1 14892 1728 ffffffff b6e7319c S /system/bin/netmgrd
root 261 1 61012 1752 ffffffff b6f4c580 S /system/bin/thermal-engine
media 262 1 5132 396 ffffffff b6f22dc8 S /system/bin/adsprpcd
system 263 1 7468 1328 ffffffff b6ec0f84 S /system/bin/wcnss_service
root 264 1 1481340 64244 ffffffff b6f9f95c S zygote
root 265 2 0 0 c02001d8 00000000 S kauditd
media_rw 266 1 7200 1200 ffffffff b6f58f84 S /system/bin/sdcard
sensors 267 1 71332 1888 ffffffff b6ebe95c S /system/bin/sensors.qcom
gps 268 1 3856 936 c01b9ffc b6ee0580 S /system/bin/loc_launcher
camera 269 1 55888 5856 ffffffff b6f7f95c S /system/bin/mm-qcamera-daemon
system 270 1 13416 1268 ffffffff b6f4819c S /system/bin/time_daemon
system 271 1 14332 3164 ffffffff b6eb6640 S /system/bin/audiod
system 273 1 34888 8668 ffffffff b6ed4ed8 S /system/bin/mm-pp-daemon
gps 292 268 44980 8952 ffffffff b6cd219c S /system/vendor/bin/slim_ap_daemon
root 311 2 0 0 c01c5ac8 00000000 S msm_slim_qmi_cl
root 312 2 0 0 c01bfa08 00000000 S msm_qmi_rtx_q
root 322 2 0 0 c01c0038 00000000 S kworker/2:2
root 364 2 0 0 c020b6c0 00000000 S irq/288-wcd9xxx
root 391 2 0 0 c01c0038 00000000 S kworker/1:1H
system 428 246 9124 616 ffffffff b6f6f580 S /system/bin/qseecomd
root 589 2 0 0 c01bfa08 00000000 S IPCRTR
root 590 2 0 0 c01bfa08 00000000 S ipc_rtr_smd_ipc
root 632 1 3188 340 c09ad2a8 b6f2948c S daemonsu:mount:master
root 797 1 8308 484 ffffffff b6f2948c S daemonsu:master
system 826 264 1759212 145812 ffffffff b6f9fbd8 S system_server
keystore 930 1 6292 1728 00000000 b6f65640 R /system/bin/keystore
root 1045 2 0 0 c01bfa08 00000000 S IPCRTR
root 1046 2 0 0 c01bfa08 00000000 S ipc_rtr_wcnss_i
u0_a16 1230 264 1744444 170220 ffffffff b6f9fbd8 S com.android.systemui
root 1363 2 0 0 c087f5f8 00000000 S WD_Thread
root 1366 2 0 0 c087ef10 00000000 S MC_Thread
root 1367 2 0 0 c087ea88 00000000 S TX_Thread
root 1368 2 0 0 c087e5a0 00000000 S RX_Thread
u0_a22 1588 264 1619108 82872 ffffffff b6f9fbd8 S com.google.process.gapps
u0_a22 1657 264 1885300 148724 ffffffff b6f9fbd8 S com.google.android.gms
u0_a22 1688 264 1627276 95104 ffffffff b6f9fbd8 S com.google.process.location
root 1875 2 0 0 c0841440 00000000 S wlan_logging_th
wifi 1877 1 7340 2608 c02829a0 b6e9b95c S /system/bin/wpa_supplicant
u0_a18 1879 264 1520316 63172 ffffffff b6f9fbd8 S org.cyanogenmod.theme.chooser
u0_a28 1902 264 1561260 50792 ffffffff b6f9fbd8 S com.google.android.googlequicksearchbox:interactor
radio 1997 264 1528552 52468 ffffffff b6f9fbd8 S com.android.server.telecom
nfc 2020 264 1536744 55016 ffffffff b6f9fbd8 S com.android.nfc
radio 2044 264 1541764 74808 ffffffff b6f9fbd8 S com.android.phone
u0_a8 2060 264 1525296 45828 ffffffff b6f9fbd8 S com.android.incallui
u0_a0 2081 264 1530844 48728 ffffffff b6f9fbd8 S org.cyanogenmod.audiofx
root 2279 2 0 0 c01c0038 00000000 S kworker/3:1H
u0_a19 2328 264 1597404 103592 ffffffff b6f9fbd8 S com.cyanogenmod.trebuchet
root 2520 2 0 0 c020b6c0 00000000 S irq/33-bw_hwmon
root 2521 1 11092 892 ffffffff b6e7c19c S /system/bin/mpdecision
root 2524 2 0 0 c01c0038 00000000 S kworker/2:1H
root 2733 797 9332 628 c09ad2a8 b6f2948c S daemonsu:10080
u0_a63 2807 264 1498984 42380 ffffffff b6f9fbd8 S com.android.smspush
radio 3728 264 1501116 44012 ffffffff b6f9fbd8 S com.qualcomm.qcrilmsgtunnel
root 4337 797 9332 576 c09ad2a8 b6f2948c S daemonsu:10116
u0_a109 8679 264 1606356 79204 ffffffff b6f9fbd8 S com.viber.voip
u0_a82 8727 264 1555392 69032 ffffffff b6ef6e5e R com.menny.android.anysoftkeyboard
u0_a112 8800 264 1537336 65548 ffffffff b6f9fbd8 S de.web.mobile.android.mail
u0_a113 9608 264 1658008 127164 ffffffff b6f9fbd8 S com.whatsapp
root 10641 2 0 0 c01c0038 00000000 S kworker/3:1
root 10857 797 10356 552 c09ad2a8 b6f2948c S daemonsu:10091
u0_a22 11492 264 1581976 54116 ffffffff b6f9fbd8 S com.google.android.gms.wearable
root 15395 2 0 0 c01c0038 00000000 S kworker/u:3
root 16198 2 0 0 c01c0038 00000000 S kworker/u:2
root 17192 2 0 0 c01c0038 00000000 S kworker/u:1
u0_a75 17448 264 1664604 115456 ffffffff b6f9fbd8 S com.google.android.apps.plus
root 17703 2 0 0 c01c0038 00000000 S kworker/0:0
root 17814 2 0 0 c0296ea4 00000000 S flush-179:0
root 17880 2 0 0 c01c0038 00000000 S kworker/2:0
root 18119 2 0 0 c01c0038 00000000 S kworker/3:0
root 18298 2 0 0 c01c0038 00000000 S kworker/0:2H
u0_a28 18987 264 1575072 75424 ffffffff b6f9fbd8 S com.google.android.googlequicksearchbox:search
root 20502 2 0 0 c01c0038 00000000 S kworker/0:2
root 20512 2 0 0 c01c0038 00000000 S kworker/u:5
root 20516 2 0 0 c01c0038 00000000 S kworker/u:6
u0_a73 20828 264 1603616 68832 ffffffff b6f9fbd8 S com.google.android.music:main
root 21225 2 0 0 c01c0038 00000000 S kworker/1:1
root 22952 2 0 0 c01c0038 00000000 S kworker/3:3
root 23004 2 0 0 c01c0038 00000000 S kworker/2:1
root 23219 2 0 0 c01c0038 00000000 S kworker/u:7
root 23914 2 0 0 c01c0038 00000000 S kworker/u:8
root 23915 2 0 0 c01c0038 00000000 S kworker/u:9
root 23916 2 0 0 c01c0038 00000000 S kworker/u:10
u0_a71 24438 264 1617528 86048 ffffffff b6f9fbd8 S com.google.android.talk
u0_a26 24486 264 1553280 68824 ffffffff b6f9fbd8 S com.android.vending
u0_a45 24568 264 1506056 45420 ffffffff b6f9fbd8 S com.android.gallery3d
u0_a115 24599 264 1514576 45632 ffffffff b6f9fbd8 S org.blackmart.market
u0_a116 24624 264 1508620 47348 ffffffff b6f9fbd8 S com.android.vending.billing.InAppBillingService.LUCK
root 24664 2 0 0 c020b6c0 00000000 S irq/289-
root 24665 2 0 0 c040c424 00000000 D mdss_fb0
u0_a107 24682 264 1512332 48172 ffffffff b6f9fbd8 S com.android.chrome
u0_a80 24703 264 1535404 54780 ffffffff b6f9fbd8 S eu.chainfire.supersu
u0_a102 24741 264 1584844 83992 ffffffff b5b7846c R jackpal.androidterm
root 24772 2 0 0 c01c0038 00000000 S kworker/0:1
u0_a5 24791 264 1499564 44676 ffffffff b6f9fbd8 S com.android.cellbroadcastreceiver
u0_a95 24813 264 1558800 70464 ffffffff b6f9fbd8 S de.motain.iliga
root 24932 797 14452 672 ffffffff b6f2948c S daemonsu:10102
root 24935 24932 12404 920 c01aa32c b6f29a84 S daemonsu:10102:24929
root 24939 24935 3188 756 c041a75c b6f05f84 S tmp-mksh
u0_a96 25119 264 1539840 65068 ffffffff b6f9fbd8 S com.ghisler.android.TotalCommander
u0_a51 25150 264 1500656 45708 ffffffff b6f9fbd8 S com.cyanogenmod.lockclock
root 25176 2 0 0 c01c0038 00000000 S kworker/u:4
system 25177 264 1507908 55164 ffffffff b6f9fbd8 S system:ui
u0_a32 25217 264 1539012 65312 ffffffff b6f9fbd8 S com.cyanogenmod.filemanager
u0_a32 25237 25217 3188 700 c0279a54 b6ecef84 S /system/bin/sh
u0_a32 25246 25217 3188 700 c0279a54 b6e90f84 S /system/bin/sh
u0_a46 25344 264 1623280 95640 ffffffff b6f9fbd8 S com.android.htmlviewer
u0_a102 25449 24741 3188 744 c01b9ffc b6f67580 S /system/bin/sh
u0_a102 25483 25449 3188 356 c02829a0 b6eb495c S su
root 25486 24932 14452 1008 c02829a0 b6f2995c S daemonsu:10102:25483
root 25490 25486 3188 744 c01b9ffc b6e8b580 S tmp-mksh
root 25575 25490 4476 724 00000000 b6f31f84 R ps
uragan1987 said:
Hi
I cant find the daemon for some services, can somebody explain me how to disable services with android
i have root and terminal for android
At APPS i have disabled NFC service, but after print "ps" at terminal this nfc service daemon Still working.
Here is ps of my phone
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 2668 880 c02829a0 0002a808 S /init
root 2 0 0 0 c01c59a4 00000000 S kthreadd
root 3 2 0 0 c01cd87c 00000000 S ksoftirqd/0
root 6 2 0 0 c018b6e4 00000000 S kworker/u:0
root 7 2 0 0 c0188aac 00000000 S kworker/u:0H
root 8 2 0 0 c01cd87c 00000000 S migration/0
root 9 2 0 0 c01c51b8 00000000 R migration/1
root 10 2 0 0 c01c51b8 00000000 R ksoftirqd/1
root 11 2 0 0 c01c0038 00000000 S kworker/1:0
root 12 2 0 0 c01c0038 00000000 S kworker/1:0H
root 13 2 0 0 c01c51b8 00000000 R migration/2
root 14 2 0 0 c01c51b8 00000000 R ksoftirqd/2
root 16 2 0 0 c01c0038 00000000 S kworker/2:0H
root 17 2 0 0 c01cd87c 00000000 S migration/3
root 18 2 0 0 c01cd87c 00000000 S ksoftirqd/3
root 20 2 0 0 c01c0038 00000000 S kworker/3:0H
root 21 2 0 0 c01bfa08 00000000 S khelper
root 22 2 0 0 c01bfa08 00000000 S netns
root 27 2 0 0 c01c0038 00000000 S kworker/0:1H
root 28 2 0 0 c01bfa08 00000000 S modem_notifier
root 29 2 0 0 c01bfa08 00000000 S smd_channel_clo
root 30 2 0 0 c01bfa08 00000000 S smsm_cb_wq
root 32 2 0 0 c01bfa08 00000000 S rpm-smd
root 33 2 0 0 c01c0038 00000000 S kworker/u:1H
root 34 2 0 0 c01bfa08 00000000 S mpm
root 35 2 0 0 c02510f0 00000000 S sync_supers
root 36 2 0 0 c025172c 00000000 S bdi-default
root 37 2 0 0 c01bfa08 00000000 S kblockd
root 38 2 0 0 c0443218 00000000 S system
root 39 2 0 0 c04fd304 00000000 S khubd
root 40 2 0 0 c020b6c0 00000000 S irq/99-msm_iomm
root 41 2 0 0 c020b6c0 00000000 S irq/105-msm_iom
root 42 2 0 0 c020b6c0 00000000 S irq/77-msm_iomm
root 43 2 0 0 c020b6c0 00000000 S irq/70-msm_iomm
root 44 2 0 0 c020b6c0 00000000 S irq/94-msm_iomm
root 45 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 46 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 47 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 48 2 0 0 c020b6c0 00000000 S irq/79-msm_iomm
root 49 2 0 0 c020b6c0 00000000 S irq/78-msm_iomm
root 50 2 0 0 c020b6c0 00000000 S irq/78-msm_iomm
root 51 2 0 0 c020b6c0 00000000 S irq/74-msm_iomm
root 52 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 53 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 54 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 55 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 56 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 57 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 58 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 59 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 60 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 61 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 62 2 0 0 c01bfa08 00000000 S devfreq_wq
root 63 2 0 0 c01bfa08 00000000 S l2cap
root 64 2 0 0 c01bfa08 00000000 S a2mp
root 65 2 0 0 c01bfa08 00000000 S cfg80211
root 77 2 0 0 c020b6c0 00000000 S irq/476-adsp
root 78 2 0 0 c020b6c0 00000000 S irq/412-mba
root 79 2 0 0 c020b6c0 00000000 S irq/540-wcnss
root 80 2 0 0 c01bfa08 00000000 S qmi
root 81 2 0 0 c01bfa08 00000000 S nmea
root 82 2 0 0 c01bfa08 00000000 S msm_ipc_router
root 83 2 0 0 c01bfa08 00000000 S apr_driver
root 84 2 0 0 c0248b34 00000000 S kswapd0
root 85 2 0 0 c0268c94 00000000 S ksmd
root 86 2 0 0 c02ab534 00000000 S fsnotify_mark
root 87 2 0 0 c0330260 00000000 S ecryptfs-kthrea
root 88 2 0 0 c01bfa08 00000000 S crypto
root 109 2 0 0 c01bfa08 00000000 S ad_calc_wq
root 110 2 0 0 c03f9d94 00000000 D mdss_dsi_event
root 111 2 0 0 c01bfa08 00000000 S k_hsuart
root 112 2 0 0 c01bfa08 00000000 S diag_real_time_
root 113 2 0 0 c01bfa08 00000000 S diag_modem_data
root 114 2 0 0 c01bfa08 00000000 S diag_lpass_data
root 115 2 0 0 c01bfa08 00000000 S diag_wcnss_data
root 116 2 0 0 c01bfa08 00000000 S diag_wq
root 117 2 0 0 c01bfa08 00000000 S diag_usb_wq
root 118 2 0 0 c01bfa08 00000000 S diag_cntl_wq
root 119 2 0 0 c01bfa08 00000000 S diag_dci_wq
root 120 2 0 0 c01bfa08 00000000 S kgsl-3d0
root 121 2 0 0 c01bfa08 00000000 S kgsl_devfreq_wq
root 122 2 0 0 c01bfa08 00000000 S f9966000.spi
root 123 2 0 0 c01bfa08 00000000 S f9965000.spi
root 126 2 0 0 c01bfa08 00000000 S usbnet
root 127 2 0 0 c01bfa08 00000000 S k_rmnet_mux_wor
root 128 2 0 0 c01bfa08 00000000 S f_mtp
root 129 2 0 0 c056e090 00000000 S file-storage
root 130 2 0 0 c01bfa08 00000000 S uether
root 131 2 0 0 c01c0038 00000000 S kworker/1:2
root 133 2 0 0 c01bfa08 00000000 S dsx_exp_workque
root 135 2 0 0 c01bfa08 00000000 S fwu_workqueue
root 137 2 0 0 c01bfa08 00000000 S msm_vidc_worker
root 138 2 0 0 c01bfa08 00000000 S pm_workerq_venu
root 139 2 0 0 c01bfa08 00000000 S msm_vidc_worker
root 140 2 0 0 c01bfa08 00000000 S fwu_workqueue
root 141 2 0 0 c020b6c0 00000000 S irq/344-synapti
root 142 2 0 0 c01bfa08 00000000 S msm_cpp_workque
root 143 2 0 0 c01bfa08 00000000 S dm_bufio_cache
root 144 2 0 0 c01cd87c 00000000 S dbs_sync/0
root 145 2 0 0 c01c51b8 00000000 R dbs_sync/1
root 146 2 0 0 c01c51b8 00000000 R dbs_sync/2
root 147 2 0 0 c01cd87c 00000000 S dbs_sync/3
root 148 2 0 0 c069aba0 00000000 S cfinteractive
root 149 2 0 0 c020b6c0 00000000 S irq/170-msm_sdc
root 150 2 0 0 c020b6c0 00000000 S irq/253-msm_sdc
root 169 2 0 0 c01bfa08 00000000 S binder
root 170 2 0 0 c01bfa08 00000000 S usb_bam_wq
root 171 2 0 0 c01bfa08 00000000 S bam_dmux_rx
root 172 2 0 0 c01bfa08 00000000 S bam_dmux_tx
root 173 2 0 0 c01bfa08 00000000 S rq_stats
root 174 2 0 0 c01bfa08 00000000 S deferwq
root 178 2 0 0 c01bfa08 00000000 S sb-1
root 179 2 0 0 c020b6c0 00000000 S irq/195-ngd_sli
root 180 2 0 0 c04d5af8 00000000 D ngd_rx_thread1
root 181 2 0 0 c04d37ac 00000000 D ngd_notify_sl1
root 182 2 0 0 c0b295bc 00000000 S msm_thermal:hot
root 183 2 0 0 c0b29474 00000000 S msm_thermal:fre
root 184 2 0 0 c0b28d80 00000000 S msm_thermal:the
root 185 2 0 0 c01cd87c 00000000 S boost_sync/0
root 186 2 0 0 c01c51b8 00000000 R boost_sync/1
root 187 2 0 0 c01c51b8 00000000 R boost_sync/2
root 188 2 0 0 c01cd87c 00000000 S boost_sync/3
root 189 2 0 0 c06b38b0 00000000 S mmcqd/0
root 190 2 0 0 c06b38b0 00000000 S mmcqd/0rpmb
root 191 1 2664 628 c02829a0 0002a808 S /sbin/ueventd
root 193 2 0 0 c031764c 00000000 S jbd2/mmcblk0p14
root 194 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 199 2 0 0 c031764c 00000000 S jbd2/mmcblk0p28
root 200 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 204 2 0 0 c031764c 00000000 S jbd2/mmcblk0p16
root 205 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 209 2 0 0 c031764c 00000000 S jbd2/mmcblk0p15
root 210 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 235 2 0 0 c01bfa08 00000000 S IPCRTR
root 237 2 0 0 c01bfa08 00000000 S ipc_rtr_q6_ipcr
logd 238 1 15136 3340 ffffffff b6f57580 S /system/bin/logd
root 239 1 3700 328 c02aede8 00033cd0 S /sbin/healthd
root 240 1 4392 1036 c02aede8 b6eb1bd8 S /system/bin/lmkd
system 241 1 3300 624 c070f570 b6eb7640 S /system/bin/servicemanager
root 242 1 9656 1700 ffffffff b6f22f38 S /system/bin/vold
system 243 1 132708 12564 ffffffff b6ee3bd8 S /system/bin/surfaceflinger
nobody 244 1 16700 904 ffffffff b6f7595c S /system/bin/rmt_storage
system 245 1 5984 880 ffffffff b6ec695c S /system/bin/rfs_access
system 246 1 4936 976 c01aa32c b6f6ea84 S /system/bin/qseecomd
audit 249 1 3100 568 c02829a0 b6ef8dc8 S /system/bin/auditd
root 250 1 27816 2232 ffffffff b6f73f38 S /system/bin/netd
root 251 1 3872 808 c09ad2a8 b6fa348c S /system/bin/debuggerd
radio 252 1 48472 9060 ffffffff b6fa9f38 S /system/bin/rild
drm 253 1 16576 5256 ffffffff b6ea8640 S /system/bin/drmserver
media 254 1 194600 24588 ffffffff b6f1e640 S /system/bin/mediaserver
install 255 1 3256 680 c0a6d95c b6f87f84 S /system/bin/installd
radio 257 1 27044 1376 ffffffff b6ea695c S /system/bin/qmuxd
radio 259 1 14892 1728 ffffffff b6e7319c S /system/bin/netmgrd
root 261 1 61012 1752 ffffffff b6f4c580 S /system/bin/thermal-engine
media 262 1 5132 396 ffffffff b6f22dc8 S /system/bin/adsprpcd
system 263 1 7468 1328 ffffffff b6ec0f84 S /system/bin/wcnss_service
root 264 1 1481340 64244 ffffffff b6f9f95c S zygote
root 265 2 0 0 c02001d8 00000000 S kauditd
media_rw 266 1 7200 1200 ffffffff b6f58f84 S /system/bin/sdcard
sensors 267 1 71332 1888 ffffffff b6ebe95c S /system/bin/sensors.qcom
gps 268 1 3856 936 c01b9ffc b6ee0580 S /system/bin/loc_launcher
camera 269 1 55888 5856 ffffffff b6f7f95c S /system/bin/mm-qcamera-daemon
system 270 1 13416 1268 ffffffff b6f4819c S /system/bin/time_daemon
system 271 1 14332 3164 ffffffff b6eb6640 S /system/bin/audiod
system 273 1 34888 8668 ffffffff b6ed4ed8 S /system/bin/mm-pp-daemon
gps 292 268 44980 8952 ffffffff b6cd219c S /system/vendor/bin/slim_ap_daemon
root 311 2 0 0 c01c5ac8 00000000 S msm_slim_qmi_cl
root 312 2 0 0 c01bfa08 00000000 S msm_qmi_rtx_q
root 322 2 0 0 c01c0038 00000000 S kworker/2:2
root 364 2 0 0 c020b6c0 00000000 S irq/288-wcd9xxx
root 391 2 0 0 c01c0038 00000000 S kworker/1:1H
system 428 246 9124 616 ffffffff b6f6f580 S /system/bin/qseecomd
root 589 2 0 0 c01bfa08 00000000 S IPCRTR
root 590 2 0 0 c01bfa08 00000000 S ipc_rtr_smd_ipc
root 632 1 3188 340 c09ad2a8 b6f2948c S daemonsu:mount:master
root 797 1 8308 484 ffffffff b6f2948c S daemonsu:master
system 826 264 1759212 145812 ffffffff b6f9fbd8 S system_server
keystore 930 1 6292 1728 00000000 b6f65640 R /system/bin/keystore
root 1045 2 0 0 c01bfa08 00000000 S IPCRTR
root 1046 2 0 0 c01bfa08 00000000 S ipc_rtr_wcnss_i
u0_a16 1230 264 1744444 170220 ffffffff b6f9fbd8 S com.android.systemui
root 1363 2 0 0 c087f5f8 00000000 S WD_Thread
root 1366 2 0 0 c087ef10 00000000 S MC_Thread
root 1367 2 0 0 c087ea88 00000000 S TX_Thread
root 1368 2 0 0 c087e5a0 00000000 S RX_Thread
u0_a22 1588 264 1619108 82872 ffffffff b6f9fbd8 S com.google.process.gapps
u0_a22 1657 264 1885300 148724 ffffffff b6f9fbd8 S com.google.android.gms
u0_a22 1688 264 1627276 95104 ffffffff b6f9fbd8 S com.google.process.location
root 1875 2 0 0 c0841440 00000000 S wlan_logging_th
wifi 1877 1 7340 2608 c02829a0 b6e9b95c S /system/bin/wpa_supplicant
u0_a18 1879 264 1520316 63172 ffffffff b6f9fbd8 S org.cyanogenmod.theme.chooser
u0_a28 1902 264 1561260 50792 ffffffff b6f9fbd8 S com.google.android.googlequicksearchbox:interactor
radio 1997 264 1528552 52468 ffffffff b6f9fbd8 S com.android.server.telecom
nfc 2020 264 1536744 55016 ffffffff b6f9fbd8 S com.android.nfc
radio 2044 264 1541764 74808 ffffffff b6f9fbd8 S com.android.phone
u0_a8 2060 264 1525296 45828 ffffffff b6f9fbd8 S com.android.incallui
u0_a0 2081 264 1530844 48728 ffffffff b6f9fbd8 S org.cyanogenmod.audiofx
root 2279 2 0 0 c01c0038 00000000 S kworker/3:1H
u0_a19 2328 264 1597404 103592 ffffffff b6f9fbd8 S com.cyanogenmod.trebuchet
root 2520 2 0 0 c020b6c0 00000000 S irq/33-bw_hwmon
root 2521 1 11092 892 ffffffff b6e7c19c S /system/bin/mpdecision
root 2524 2 0 0 c01c0038 00000000 S kworker/2:1H
root 2733 797 9332 628 c09ad2a8 b6f2948c S daemonsu:10080
u0_a63 2807 264 1498984 42380 ffffffff b6f9fbd8 S com.android.smspush
radio 3728 264 1501116 44012 ffffffff b6f9fbd8 S com.qualcomm.qcrilmsgtunnel
root 4337 797 9332 576 c09ad2a8 b6f2948c S daemonsu:10116
u0_a109 8679 264 1606356 79204 ffffffff b6f9fbd8 S com.viber.voip
u0_a82 8727 264 1555392 69032 ffffffff b6ef6e5e R com.menny.android.anysoftkeyboard
u0_a112 8800 264 1537336 65548 ffffffff b6f9fbd8 S de.web.mobile.android.mail
u0_a113 9608 264 1658008 127164 ffffffff b6f9fbd8 S com.whatsapp
root 10641 2 0 0 c01c0038 00000000 S kworker/3:1
root 10857 797 10356 552 c09ad2a8 b6f2948c S daemonsu:10091
u0_a22 11492 264 1581976 54116 ffffffff b6f9fbd8 S com.google.android.gms.wearable
root 15395 2 0 0 c01c0038 00000000 S kworker/u:3
root 16198 2 0 0 c01c0038 00000000 S kworker/u:2
root 17192 2 0 0 c01c0038 00000000 S kworker/u:1
u0_a75 17448 264 1664604 115456 ffffffff b6f9fbd8 S com.google.android.apps.plus
root 17703 2 0 0 c01c0038 00000000 S kworker/0:0
root 17814 2 0 0 c0296ea4 00000000 S flush-179:0
root 17880 2 0 0 c01c0038 00000000 S kworker/2:0
root 18119 2 0 0 c01c0038 00000000 S kworker/3:0
root 18298 2 0 0 c01c0038 00000000 S kworker/0:2H
u0_a28 18987 264 1575072 75424 ffffffff b6f9fbd8 S com.google.android.googlequicksearchbox:search
root 20502 2 0 0 c01c0038 00000000 S kworker/0:2
root 20512 2 0 0 c01c0038 00000000 S kworker/u:5
root 20516 2 0 0 c01c0038 00000000 S kworker/u:6
u0_a73 20828 264 1603616 68832 ffffffff b6f9fbd8 S com.google.android.music:main
root 21225 2 0 0 c01c0038 00000000 S kworker/1:1
root 22952 2 0 0 c01c0038 00000000 S kworker/3:3
root 23004 2 0 0 c01c0038 00000000 S kworker/2:1
root 23219 2 0 0 c01c0038 00000000 S kworker/u:7
root 23914 2 0 0 c01c0038 00000000 S kworker/u:8
root 23915 2 0 0 c01c0038 00000000 S kworker/u:9
root 23916 2 0 0 c01c0038 00000000 S kworker/u:10
u0_a71 24438 264 1617528 86048 ffffffff b6f9fbd8 S com.google.android.talk
u0_a26 24486 264 1553280 68824 ffffffff b6f9fbd8 S com.android.vending
u0_a45 24568 264 1506056 45420 ffffffff b6f9fbd8 S com.android.gallery3d
u0_a115 24599 264 1514576 45632 ffffffff b6f9fbd8 S org.blackmart.market
u0_a116 24624 264 1508620 47348 ffffffff b6f9fbd8 S com.android.vending.billing.InAppBillingService.LUCK
root 24664 2 0 0 c020b6c0 00000000 S irq/289-
root 24665 2 0 0 c040c424 00000000 D mdss_fb0
u0_a107 24682 264 1512332 48172 ffffffff b6f9fbd8 S com.android.chrome
u0_a80 24703 264 1535404 54780 ffffffff b6f9fbd8 S eu.chainfire.supersu
u0_a102 24741 264 1584844 83992 ffffffff b5b7846c R jackpal.androidterm
root 24772 2 0 0 c01c0038 00000000 S kworker/0:1
u0_a5 24791 264 1499564 44676 ffffffff b6f9fbd8 S com.android.cellbroadcastreceiver
u0_a95 24813 264 1558800 70464 ffffffff b6f9fbd8 S de.motain.iliga
root 24932 797 14452 672 ffffffff b6f2948c S daemonsu:10102
root 24935 24932 12404 920 c01aa32c b6f29a84 S daemonsu:10102:24929
root 24939 24935 3188 756 c041a75c b6f05f84 S tmp-mksh
u0_a96 25119 264 1539840 65068 ffffffff b6f9fbd8 S com.ghisler.android.TotalCommander
u0_a51 25150 264 1500656 45708 ffffffff b6f9fbd8 S com.cyanogenmod.lockclock
root 25176 2 0 0 c01c0038 00000000 S kworker/u:4
system 25177 264 1507908 55164 ffffffff b6f9fbd8 S system:ui
u0_a32 25217 264 1539012 65312 ffffffff b6f9fbd8 S com.cyanogenmod.filemanager
u0_a32 25237 25217 3188 700 c0279a54 b6ecef84 S /system/bin/sh
u0_a32 25246 25217 3188 700 c0279a54 b6e90f84 S /system/bin/sh
u0_a46 25344 264 1623280 95640 ffffffff b6f9fbd8 S com.android.htmlviewer
u0_a102 25449 24741 3188 744 c01b9ffc b6f67580 S /system/bin/sh
u0_a102 25483 25449 3188 356 c02829a0 b6eb495c S su
root 25486 24932 14452 1008 c02829a0 b6f2995c S daemonsu:10102:25483
root 25490 25486 3188 744 c01b9ffc b6e8b580 S tmp-mksh
root 25575 25490 4476 724 00000000 b6f31f84 R ps
Click to expand...
Click to collapse
An app called "Disable Service" may help you, I used it to disable some of Google play services and helped my battery alot

MTCD_XRC sofia3gr 1Gb RAM 6.0.1 apps being killed?

Hi all,
I've purchased the above head unit (Will post specs below) and thought I'd give the 1Gb RAM unit a try, I've played about with android for a long time so already knew 1Gb was light, but I got it cheap (Always the problem!).
So I've got a Hizpo (I know that's a bundler) unit, so actual specs are:
Android 6.0.1
A-MEDIA AUTO (1024x600)
Baseband: SF3GR_M-26.3
Kernel: 3.14.0+ [email protected] #55
Build number: sofia3gr_car_64-userdebug
MCU: MTCD_XRC_V2.58_1
Memory: 918MB
Now this seems to be quite up to date, new Android, new MCU version and kernel. It boots pretty quickly and also apps do load quite quickly too, even google maps.
The problem I have is that apps suddenly close without warning and without error. So for example I open google maps, choose directions, and go to start navigation and suddenly it closes. No normal app has crashed message or anything like that.
So my suspicion is this is some kind of task killer running, killing apps that are trying to consume too much memory or CPU. I know the stock rom has something like this as I have a 'rocket' icon I can click and it shows how much ram it has managed to free up. I'm suspecting there is a background service doing this periodically and killing things, but being a bit over-ambitious! So far I'm not consuming anywhere near the full RAM, whenever I've checked I've had around 600MB free at any one time and the unit isn't going really laggy or anything I'd expect, so I think it's just the task killer getting in the way.
Does anyone have anything similar, or have found what is killing tasks off like this?
I'm trying to get adb over wireless working, initially this hasn't worked but I've got another couple of ways to try first to get adb debugging.
Any suggestions please?
(And yes I know, moving to a 2Gb board would be simplest option, but cost is an issue!)
Hi Andy,
I recently bought exactly the same unit off an eBay seller 'stereo_eu'.
My unit behaves exactly the same a yours - BADLY!
First problem occured when the apparent UK stock unit took 3 weeks to arrive from China, and eBay removed the sellers items for an unspecified infringement.
After fitting, it does exactly as you described, and other nonsense.
I found a MCU version V2.60 which installed correctly but made no difference.
I then contacted the seller who sent me a link to an update.zip package, which turned out to be a
corrupt .zip file, (new4_sofia_6.0_wifi(20170915).zip) and put my unit into a V6.1.2 recovery mode loop.
I managed to recover it with a V5.1.1 Lolipop version found on here, and it's better than the stock 6.0.1
software, but still has it's problems.
They seem totally unwilling to link to a 'non corrupt' update file, and have asked me to send the unit back (to China) for replacement, which I have declined, and requested a return to their UK address, and a refund.
Not impressed at all so far . . . . . . . .
Well, I'm not saying the units are junk, I'm relatively happy as I can still use my phone for navigation, so not a total loss, but I like tinkering with android (I'm a former android dev) so figuring out what's going on is what I'm aiming to do.
I've now installed root (SuperSu) and doing adb shell I can gain root and get through the filesystem to see what's going on. adb logcat didn't show anything interesting as I thought it might, I've also confirmed that "Sofia-1-C9-Server-V1.0.apk" does not exist on this head unit, however when you turn the ignition off it shows "Shutting Down" and goes into a sleep mode which does a similar thing and kills all background services, etc which again don't get restarted after powering back on.
I've got a bit of logcat output when I launched maps, and in the process of launching maps the music playing in the background stopped, but noting in the log seems to indicate why:
11-23 19:27:37.209 1417 4469 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:37.217 1417 4469 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:37.227 1417 4469 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:37.231 1417 4469 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:37.239 1417 4469 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:37.243 1417 4469 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:37.244 1417 4469 I GCoreUlr: Successfully inserted 1 locations
11-23 19:27:37.254 1417 4469 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:37.257 1417 4469 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:38.190 1417 1417 I GeofencerStateMachine: sendTransitions: location=Location[fused 0.0,-1.1 acc=6 et=+20m47s600ms alt=82.6459732055664 vel=0.0 bear=171.0 {Bundle[mParcelledData.dataSize=356]}]
11-23 19:27:39.284 575 731 I ActivityManager: START u0 {act=android.intent.action.MAIN cat=[android.intent.category.HOME] flg=0x10200000 cmp=com.android.launcher/com.android.launcher2.Launcher (has extras)} from uid 1000 on display 0
11-23 19:27:39.484 575 743 E WifiConfigStore: makeChannelList age=3600000 for "MYWIFIHERE"WPA_PSK max=6 bssids=1
11-23 19:27:39.485 575 743 E WifiConfigStore: has my:mac:adress:here freq=2412 age=2902 ?=true
11-23 19:27:39.487 575 743 D WifiStateMachine: starting scan for "MYWIFIHERE"WPA_PSK with 2412
11-23 19:27:39.534 831 1054 I OpenGLRenderer: Initialized EGL, version 1.4
11-23 19:27:39.588 575 743 E WifiConfigStore: updateConfiguration freq=2412 BSSID=my:mac:adress:here RSSI=-73 "MYWIFIHERE"WPA_PSK
11-23 19:27:39.663 831 1054 V RenderScript: 0xde54d000 Launching thread(s), CPUs 4
11-23 19:27:39.701 575 743 E WifiConfigStore: updateSavedNetworkHistory(): try "MYWIFIHERE"WPA_PSK SSID="MYWIFIHERE" MYWIFIHERE [WPA2-PSK-CCMP][ESS] ajst=0
11-23 19:27:39.702 575 743 E WifiConfigStore: got known scan result my:mac:adress:here key : "MYWIFIHERE"WPA_PSK num: 1 rssi=-72 freq=2412
11-23 19:27:39.706 575 743 E WifiConfigStore: writeKnownNetworkHistory() num networks:3 needWrite=false
11-23 19:27:40.140 831 1054 W OpenGLRenderer: Incorrectly called buildLayer on View: ShortcutAndWidgetContainer, destroying layer...
11-23 19:27:40.140 831 1054 W OpenGLRenderer: Incorrectly called buildLayer on View: ShortcutAndWidgetContainer, destroying layer...
11-23 19:27:42.594 575 743 E WifiConfigStore: updateConfiguration freq=2412 BSSID=my:mac:adress:here RSSI=-72 "MYWIFIHERE"WPA_PSK
11-23 19:27:43.938 1417 1417 I GeofencerStateMachine: sendTransitions: location=Location[fused 0.0,-1.1 acc=6 et=+20m52s603ms alt=82.55806732177734 vel=0.0 bear=171.0 {Bundle[mParcelledData.dataSize=356]}]
11-23 19:27:44.607 4505 4514 W CursorWrapperInner: Cursor finalized without prior close()
11-23 19:27:45.602 575 743 E WifiConfigStore: updateConfiguration freq=2412 BSSID=my:mac:adress:here RSSI=-73 "MYWIFIHERE"WPA_PSK
11-23 19:27:48.240 1417 1417 I GeofencerStateMachine: sendTransitions: location=Location[fused acc=6 et=+20m57s609ms alt=82.54087829589844 vel=0.0 bear=171.0 {Bundle[mParcelledData.dataSize=356]}]
11-23 19:27:48.609 575 743 E WifiConfigStore: updateConfiguration freq=2412 BSSID=my:mac:adress:here RSSI=-73 "MYWIFIHERE"WPA_PSK
11-23 19:27:51.616 575 743 E WifiConfigStore: updateConfiguration freq=2412 BSSID=my:mac:adress:here RSSI=-73 "MYWIFIHERE"WPA_PSK
11-23 19:27:52.231 1417 4564 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:52.234 1417 4564 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:52.242 1417 4564 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:52.246 1417 4564 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:52.251 1417 4564 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:52.257 1417 4564 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:52.258 1417 4564 I GCoreUlr: Successfully inserted 1 locations
11-23 19:27:52.266 1417 4564 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:52.268 1417 4564 E Settings: getIntForUser name:location_mode value:3
11-23 19:27:53.206 1417 1417 I GeofencerStateMachine: sendTransitions: location=Location[fused acc=6 et=+21m2s613ms alt=82.54087829589844 vel=0.0 bear=171.0 {Bundle[mParcelledData.dataSize=356]}]
11-23 19:27:53.506 575 840 I ActivityManager: START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 cmp=com.microntek.navisettings/.MainActivity bnds=[315,104][450,277] (has extras)} from uid 10013 on display 0
11-23 19:27:53.586 4576 4576 E art : setrlimit(RLIMIT_CORE) failed for pid 4576: Operation not permitted
11-23 19:27:53.596 575 2496 I ActivityManager: Start proc 4576:com.microntek.navisettings/u0a59 for activity com.microntek.navisettings/.MainActivity
11-23 19:27:53.764 4576 4576 W System : ClassLoader referenced unknown path: /system/app/MTCNaviSettings/lib/x86
11-23 19:27:53.883 575 2263 I ActivityManager: START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x30220000 pkg=com.google.android.apps.maps cmp=com.google.android.apps.maps/com.google.android.maps.MapsActivity} from uid 10059 on display 0
11-23 19:27:54.050 575 587 I art : Background partial concurrent mark sweep GC freed 13790(926KB) AllocSpace objects, 2(40KB) LOS objects, 27% free, 10MB/14MB, paused 3.709ms total 112.505ms
11-23 19:27:54.071 185 185 W hwcomposer: zone is small ,LCDC can not support
11-23 19:27:54.159 4214 4225 I art : Background sticky concurrent mark sweep GC freed 5640(458KB) AllocSpace objects, 9(744KB) LOS objects, 4% free, 38MB/40MB, paused 6.416ms total 63.265ms
11-23 19:27:54.309 4214 4214 I System.out: DEBUG getting preferred mode DRIVE
11-23 19:27:54.338 4590 4590 E art : setrlimit(RLIMIT_CORE) failed for pid 4590: Operation not permitted
11-23 19:27:54.345 575 813 I ActivityManager: Start proc 4590:com.google.process.gapps/u0a10 for content provider com.google.android.gsf/.settings.GoogleSettingsProvider
11-23 19:27:54.348 4214 4214 I System.out: DEBUG getting preferred mode DRIVE
11-23 19:27:54.432 575 2495 D Sensors : activate handle=5,enabled=1
11-23 19:27:54.432 575 2495 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.432 575 2495 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.433 575 2495 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.433 575 2495 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.433 575 2495 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.433 575 2495 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.433 575 2495 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.433 575 2495 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.433 575 2495 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.433 575 2495 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.433 575 2495 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.447 575 853 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.447 575 853 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.447 575 853 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.468 575 2453 D Sensors : activate handle=3,enabled=1
11-23 19:27:54.468 575 2453 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.468 575 2453 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.468 575 2453 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.554 4590 4590 W System : ClassLoader referenced unknown path: /system/priv-app/GoogleServicesFramework/lib/x86
11-23 19:27:54.582 4214 4232 I System.out: DEBUG getting preferred mode DRIVE
11-23 19:27:54.590 4590 4590 I GservicesProvider: Gservices pushing to system: true; secure/global: true
11-23 19:27:54.609 4214 4214 I Choreographer: Skipped 36 frames! The application may be doing too much work on its main thread.
11-23 19:27:54.626 575 743 E WifiConfigStore: updateConfiguration freq=2412 BSSID=my:mac:adress:here RSSI=-74 "MYWIFIHERE"WPA_PSK
11-23 19:27:54.872 4590 4590 I GoogleHttpClient: GMS http client unavailable, use old client
11-23 19:27:54.933 575 2495 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.933 575 2495 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.933 575 2495 E Sensors : HALpen of failed with 'No such file or directory' (2)
11-23 19:27:54.977 1417 1417 I GeofencerStateMachine: sendNewLocationAvailability: availability=LocationAvailability[isLocationAvailable: true]
11-23 19:27:54.994 1417 1417 I GeofencerStateMachine: sendNewLocationAvailability: availability=LocationAvailability[isLocationAvailable: true]
Click to expand...
Click to collapse
List of apps in /system/app
[email protected]_car:/system/app # ls
Bluetooth
BluetoothMidiService
Browser
Calendar
CaptivePortalLogin
CertInstaller
DeskClock
DocumentsUI
ExactCalculator
Galaxy4
Gallery2
Gmail2
GooglePinyinIME
HCTBlueTooth4
HCTBtMusic4
HCTCarTouch
HCTUpdateService
HTMLViewer
HoloSpiralWallpaper
KeyChain
LatinIME
LiveWallpapers
LiveWallpapersPicker
MTCAPKInstall
MTCAVIN
MTCAmpSetup
MTCBackView
MTCCarCD
MTCCivicUSBIPOD
MTCControlInfo
MTCControlSettings
MTCDVD4
MTCFactorySettings
MTCFileBrowser4
MTCIpod4
MTCMovie4
MTCMusic4
MTCNaviSettings
MTCRadio4HCT
MTCSYNC
MTCScreenClock
MTCTV
MTCTpms
MTCTravel4
MTCWheelStudy
Maps
Music
NoiseField
OpenWnn
PacProcessor
PhaseBeam
PicoTts
PrintSpooler
Provision
RFTest
Stk
SuperSU
UserDictionaryProvider
WAPPushManager
webview
Click to expand...
Click to collapse
So I'm now onto debugging a bit closer, any extra info anyone can provide would be welcome!
Oh and process listing
[email protected]_car:/system/app # ps
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 3060 528 SyS_epoll_ f7795b80 S /init
root 2 0 0 0 kthreadd 00000000 S kthreadd
root 3 2 0 0 smpboot_th 00000000 S ksoftirqd/0
root 5 2 0 0 worker_thr 00000000 S kworker/0:0H
root 6 2 0 0 worker_thr 00000000 S kworker/u8:0
root 7 2 0 0 rcu_gp_kth 00000000 S rcu_preempt
root 8 2 0 0 rcu_gp_kth 00000000 S rcu_sched
root 9 2 0 0 rcu_gp_kth 00000000 S rcu_bh
root 10 2 0 0 smpboot_th 00000000 S migration/0
root 11 2 0 0 worker_thr 00000000 S kworker/0:1
root 12 2 0 0 smpboot_th 00000000 S watchdog/0
root 13 2 0 0 smpboot_th 00000000 S watchdog/1
root 14 2 0 0 smpboot_th 00000000 S migration/1
root 15 2 0 0 smpboot_th 00000000 S ksoftirqd/1
root 17 2 0 0 worker_thr 00000000 S kworker/1:0H
root 18 2 0 0 worker_thr 00000000 S kworker/1:1
root 19 2 0 0 smpboot_th 00000000 S watchdog/2
root 20 2 0 0 smpboot_th 00000000 S migration/2
root 21 2 0 0 smpboot_th 00000000 S ksoftirqd/2
root 23 2 0 0 worker_thr 00000000 S kworker/2:0H
root 24 2 0 0 worker_thr 00000000 S kworker/2:1
root 25 2 0 0 smpboot_th 00000000 S watchdog/3
root 26 2 0 0 smpboot_th 00000000 S migration/3
root 27 2 0 0 smpboot_th 00000000 S ksoftirqd/3
root 28 2 0 0 worker_thr 00000000 S kworker/3:0
root 29 2 0 0 worker_thr 00000000 S kworker/3:0H
root 31 2 0 0 rescuer_th 00000000 S khelper
root 32 2 0 0 vdump_thre 00000000 S vdump Thread
root 33 2 0 0 console_th 00000000 S kconsole
root 34 2 0 0 rescuer_th 00000000 S writeback
root 35 2 0 0 ksm_scan_t 00000000 S ksmd
root 36 2 0 0 rescuer_th 00000000 S bioset
root 37 2 0 0 rescuer_th 00000000 S kblockd
root 38 2 0 0 hub_thread 00000000 S khubd
root 54 2 0 0 fmdev_fifo 00000000 S iui_fm
root 55 2 0 0 ion_heap_d 00000000 S system-heap
root 56 2 0 0 mvpipe_dev 00000000 S ion_secvm_handl
root 57 2 0 0 irq_thread 00000000 S irq/303-rk818
root 58 2 0 0 rescuer_th 00000000 S rk81x_otg_work
root 59 2 0 0 rev_thread 00000000 D rev_thread
root 60 2 0 0 rockchip_f 00000000 S fb-vsync
root 61 2 0 0 kthread_wo 00000000 S rockchip-fb
root 62 2 0 0 cpufreq_in 00000000 S cfinteractive
root 63 2 0 0 irq_thread 00000000 S irq/320-car-rev
root 64 2 0 0 irq_thread 00000000 S irq/321-car-acc
root 65 2 0 0 rescuer_th 00000000 S rk81x-battery-w
root 66 2 0 0 rescuer_th 00000000 S car_wq
root 67 2 0 0 rescuer_th 00000000 S goodix_wq
root 89 2 0 0 kswapd 00000000 S kswapd0
root 90 2 0 0 fsnotify_m 00000000 S fsnotify_mark
root 91 2 0 0 rescuer_th 00000000 S crypto
root 105 2 0 0 rescuer_th 00000000 S bl_wq
root 106 2 0 0 irq_thread 00000000 S irq/40-rga
root 107 2 0 0 vnvm_serve 00000000 S vnvm
root 108 2 0 0 mvpipe_dev 00000000 S VUSB_SE_FE_MEX_
root 109 2 0 0 worker_thr 00000000 S kworker/u9:0
root 110 2 0 0 down_inter 00000000 S vsec
root 111 2 0 0 rescuer_th 00000000 S idi_error_work_
root 112 2 0 0 irq_thread 00000000 S irq/110-vpu.177
root 113 2 0 0 irq_thread 00000000 S irq/111-vpu.177
root 114 2 0 0 irq_thread 00000000 S irq/38-hevc.178
root 115 2 0 0 rescuer_th 00000000 S dwc2
root 116 2 0 0 rescuer_th 00000000 S uether
root 117 2 0 0 rescuer_th 00000000 S adv_wq
root 118 2 0 0 rescuer_th 00000000 S dm_bufio_cache
root 120 2 0 0 mmc_queue_ 00000000 S mmcqd/0
root 121 2 0 0 mmc_queue_ 00000000 S mmcqd/0boot0
root 122 2 0 0 mmc_queue_ 00000000 S mmcqd/0boot1
root 123 2 0 0 mmc_queue_ 00000000 S mmcqd/0rpmb
root 124 2 0 0 worker_thr 00000000 S kworker/2:2
root 125 2 0 0 rescuer_th 00000000 S binder
root 126 2 0 0 intel_adc_ 00000000 S adc-thread
root 127 2 0 0 oct_thread 00000000 S OCT Thread
root 128 2 0 0 rescuer_th 00000000 S dvd_wq
root 129 2 0 0 irq_thread 00000000 S irq/108-dsp_int
root 130 2 0 0 irq_thread 00000000 S irq/107-dsp_int
root 131 2 0 0 irq_thread 00000000 S irq/99-dsp_int3
root 132 2 0 0 rescuer_th 00000000 S ipv6_addrconf
root 133 2 0 0 rescuer_th 00000000 S fuel_gauge.187
root 134 2 0 0 mmc_queue_ 00000000 S mmcqd/1
root 136 2 0 0 rescuer_th 00000000 S deferwq
root 139 2 0 0 worker_thr 00000000 S kworker/u8:4
root 140 2 0 0 irq_thread 00000000 S irq/283-jack_ir
root 141 2 0 0 irq_thread 00000000 S irq/284-button_
root 142 2 0 0 rescuer_th 00000000 S f_mtp
root 143 2 0 0 rescuer_th 00000000 S setExposure_que
root 144 2 0 0 rescuer_th 00000000 S measurement_que
root 145 2 0 0 rescuer_th 00000000 S bat_hal-0
root 148 1 2540 124 poll_sched f7712b80 S /sbin/ueventd
root 151 2 0 0 worker_thr 00000000 S kworker/0:1H
root 152 2 0 0 worker_thr 00000000 S kworker/1:1H
root 153 2 0 0 kjournald2 00000000 S jbd2/mmcblk0p14
root 154 2 0 0 rescuer_th 00000000 S ext4-rsv-conver
root 157 2 0 0 worker_thr 00000000 S kworker/2:1H
root 159 2 0 0 kjournald2 00000000 S jbd2/mmcblk0p15
root 160 2 0 0 rescuer_th 00000000 S ext4-rsv-conver
root 164 2 0 0 kjournald2 00000000 S jbd2/mmcblk0p13
root 165 2 0 0 rescuer_th 00000000 S ext4-rsv-conver
logd 166 1 14856 2436 sigsuspend f76e3b80 S /system/bin/logd
root 167 1 11644 912 hrtimer_na f7675b80 S /system/bin/vold
root 172 2 0 0 kauditd_th 00000000 S kauditd
root 182 1 2932 304 SyS_epoll_ f7758b80 S /sbin/healthd
root 183 1 4308 708 SyS_epoll_ f772ab80 S /system/bin/lmkd
system 184 1 4116 660 binder_thr f7744b80 S /system/bin/servicemanager
system 185 1 61108 3840 SyS_epoll_ f770fb80 S /system/bin/surfaceflinger
root 186 1 2284 0 hrtimer_na f77dfb80 S /sbin/watchdogd
radio 187 1 5648 660 SyS_epoll_ f779cb80 S /system/bin/rpcServer
shell 193 1 4328 672 n_tty_read f7731b80 S /system/bin/sh
radio 194 1 16412 940 hrtimer_na f775bb80 S /system/bin/rild
radio 195 1 16156 800 hrtimer_na f76cbb80 S /system/bin/rild
root 196 1 17884 1468 hrtimer_na f773fb80 S /system/bin/netd
root 198 1 4936 968 __skb_recv f773bb80 S /system/bin/debuggerd
drm 199 1 25160 1428 binder_thr f773bb80 S /system/bin/drmserver
media 200 1 139544 3632 binder_thr f7705b80 S /system/bin/mediaserver
root 201 1 4216 1028 unix_strea f76afb80 S /system/bin/installd
keystore 204 1 7692 1144 binder_thr f7766b80 S /system/bin/keystore
system 205 1 7960 780 binder_thr f76fbb80 S /system/bin/pluginservice
system 206 1 4276 684 atdev_ioct f7768b80 S /system/bin/startIpcsd
radio 207 1 6536 632 fmdev_fifo f76ecb80 S /system/bin/fmd
gps 208 1 4328 724 sigsuspend f7678b80 S /system/bin/sh
root 209 1 827376 32696 poll_sched f772eb80 S zygote
system 210 1 7364 1056 binder_thr f775cb80 S /system/bin/gatekeeperd
root 211 1 4240 616 hrtimer_na f7738b80 S /system/xbin/perfprofd
root 214 1 8100 1076 poll_sched f76fdb80 S /system/vendor/bin/crashlogd
root 215 1 6560 944 devkmsg_re f773bb80 S /vendor/bin/log-watch
root 218 2 0 0 worker_thr 00000000 S kworker/3:1H
root 221 1 3876 212 __skb_recv f76dab80 S daemonsu:mount:master
root 229 2 0 0 kjournald2 00000000 S jbd2/mmcblk0p5-
root 230 2 0 0 rescuer_th 00000000 S ext4-rsv-conver
root 247 1 7228 416 __skb_recv f76dab80 S daemonsu:master
root 252 2 0 0 rescuer_th 00000000 S cfg80211
gps 256 208 21528 2016 futex_wait f731fb80 S /system/bin/lbsd
radio 259 1 8300 732 nvmdev_ioc f76e9b80 S /system/bin/nvm_useragent
radio 262 1 15060 628 hrtimer_na f7783b80 S /system/bin/rpc-daemon
shell 263 1 10392 352 poll_sched f7761b80 S /sbin/adbd
root 327 2 0 0 irq_thread 00000000 S irq/289-gnss_wa
root 329 2 0 0 irq_thread 00000000 S irq/291-gnss_er
root 395 2 0 0 irq_thread 00000000 S irq/293-wlan_ir
root 532 1 4328 716 sigsuspend f7675b80 S /system/bin/sh
root 541 532 5316 860 __skb_recv f76dab80 S /system/vendor/bin/logcatext
system 575 209 898040 83068 SyS_epoll_ f772eb80 S system_server
root 701 2 0 0 mvpipe_dev 00000000 S VUSB_SE_FE_LINK
root 702 2 0 0 n_tty_read 00000000 S VUSB_SE_FE_LINK
root 703 2 0 0 msleep 00000000 D VUSB_SE_FE_MODE
root 736 2 0 0 rescuer_th 00000000 S vs-2
wifi 765 1 8788 2172 poll_sched f7509b80 S /system/bin/wpa_supplicant
media_rw 787 167 7896 912 inotify_re f7747b80 S /system/bin/sdcard
radio 800 209 696084 36216 SyS_epoll_ f772eb80 S com.android.phone
u0_a21 817 209 733912 46884 SyS_epoll_ f772eb80 S com.android.systemui
u0_a13 831 209 706448 53000 SyS_epoll_ f772eb80 S com.android.launcher
root 851 2 0 0 worker_thr 00000000 S kworker/3:2
media_rw 987 167 8156 716 inotify_re f778db80 S /system/bin/sdcard
u0_a76 1081 209 668624 25904 SyS_epoll_ f772eb80 S com.android.smspush
root 1123 2 0 0 worker_thr 00000000 S kworker/u9:2
u0_a9 1190 209 668636 26560 SyS_epoll_ f772eb80 S com.android.externalstorage
u0_a22 1336 209 953040 30864 SyS_epoll_ f772eb80 S com.google.android.googlequicksearchbox:interactor
u0_a43 1350 209 703316 48884 SyS_epoll_ f772eb80 S com.android.inputmethod.latin
system 1385 209 672148 28020 SyS_epoll_ f772eb80 S android.microntek.canbus
u0_a10 1417 209 845516 74952 SyS_epoll_ f772eb80 S com.google.android.gms.persistent
root 1431 1 4328 560 sigsuspend f772eb80 S /system/bin/sh
u0_a8 1438 209 681944 38376 SyS_epoll_ f772eb80 S android.process.media
u0_a10 1492 209 685848 32932 SyS_epoll_ f772eb80 S com.google.process.gapps
root 1497 1431 85112 360 poll_sched 40190422 S /system/bin/adb-ec
root 1503 2 0 0 rescuer_th 00000000 S vs-0
root 1530 1 4328 712 poll_sched f76adb80 S /system/bin/sh
u0_a10 1619 209 1046992 102860 SyS_epoll_ f772eb80 S com.google.android.gms
u0_a10 1708 209 825364 50108 SyS_epoll_ f772eb80 S com.google.android.gms.unstable
bluetooth 1752 209 719936 30080 SyS_epoll_ f772eb80 S com.android.bluetooth
root 1777 2 0 0 irq_thread 00000000 S irq/286-btif_mu
root 1778 2 0 0 irq_thread 00000000 S irq/288-btip_wa
root 1846 247 6196 416 __skb_recv f76dab80 S daemonsu:10087
u0_a60 2067 209 671340 30384 SyS_epoll_ f772eb80 S com.microntek.radio
system 2120 209 668872 29716 SyS_epoll_ f772eb80 S com.intel.soundprofile
u0_a39 2171 209 674544 31632 SyS_epoll_ f772eb80 S com.hct.screenbutton
u0_a40 2188 209 670856 27088 SyS_epoll_ f772eb80 S android.rockchip.update.service
u0_a37 2393 209 668748 25720 SyS_epoll_ f772eb80 S com.microntek.bluetooth
root 2893 247 7228 388 __skb_recv f76dab80 S daemonsu:10086
root 3090 1 649972 19408 futex_wait f76ceb80 S app_process
shell 3349 263 4328 1348 sigsuspend f7736b80 S /system/bin/sh
shell 3437 3349 3876 1164 poll_sched f778eb80 R su
root 3441 247 9292 484 __skb_recv f76dab80 S daemonsu:0
root 3443 3441 9548 944 poll_sched f76dab80 S daemonsu:0:3437
root 3549 3443 4328 1576 sigsuspend f7653b80 S tmp-mksh
root 3772 2 0 0 worker_thr 00000000 S kworker/1:0
root 3776 2 0 0 worker_thr 00000000 S kworker/0:0
u0_a85 3782 209 835136 72712 SyS_epoll_ f772eb80 S info.kfsoft.android.MemoryIndicator
shell 3913 263 4148 1364 __skb_recv f76e6b80 S logcat
root 3933 2 0 0 worker_thr 00000000 S kworker/u8:1
system 3972 209 726988 64328 SyS_epoll_ f772eb80 S com.android.settings
root 4013 2 0 0 worker_thr 00000000 S kworker/1:2
root 4014 2 0 0 worker_thr 00000000 S kworker/0:2
u0_a7 4019 209 669884 27748 SyS_epoll_ f772eb80 S com.android.defcontainer
root 4065 2 0 0 worker_thr 00000000 S kworker/u9:1
u0_a17 4069 209 934572 110068 SyS_epoll_ f772eb80 S com.android.vending
root 4115 2 0 0 worker_thr 00000000 S kworker/2:0
root 4136 2 0 0 worker_thr 00000000 S kworker/3:1
root 4180 3549 4224 1140 0 f776cb80 R ps
Click to expand...
Click to collapse
That's way over my head!
V5.11 is much better, but it wont play music, or nav sounds randomly, but the radio sounds always work?
I've put it back on V6.0.1 to get the music back, but nav randomly shuts down again.
I'm back to square one.
The seller has agreed to shipping back to Germany for full refund though.
It might be a good option!
OK, next steps now I've not identified a specific task killer is looking into Dalvik cache and VM settings, as perhaps these are too lean and causing the apps to run out and die like that (Still no message seeming to indicate this though).
Anyone any thoughts on tweaking these settings on a head unit? I'll grab my current values and my suggested ones for reference shortly.
--EDIT--
Ah, Dalvik was pre-4.0 and these are 6.0 Marshmallow so do the dalvik cache tweaks still do anything or do I need to look for ART tweaks instead?
still on 5.11 here, looks like disabling 'media audio' under bluetooth settings on my phone allows the head unit to route the music player to the speakers again, not sure why it was letting the radio audio through and not the music audio?
Am trying to get the Marshmallow release working so unfortunately not wanting to revert back to 5 or earlier.
However I'm making progress on 6.x
I believe it's the lowmemorykiller/ART that's getting in the way here, perhaps being set to be too aggressive at larger memory sizes.
I've installed a minfree memory kernel lowmemorykiller (it's easier than tweaking the params from adb shell) - App is "AutoKiller Memory Optimizer". I've not used any of it's other functions as this was the main one I wanted.
So after tweaks I'm running with:
Code:
cat /sys/module/lowmemorykiller/parameters/minfree
2754,5508,7344,13770,16065,18360
So far, running navigation (Google Maps) and then swapping back and forward to music and back, maps didn't close itself at all.
For some reason, music was stopping when switching to maps but I think that's more of an audio routing issue to look into, but so far it doesn't appear to be aggressively killing applications that have focus.
Some more logs that are interesting:
Code:
11-27 18:52:28.530 598 611 I art : Background partial concurrent mark sweep GC freed 21273(1447KB) AllocSpace objects, 3(60KB) LOS objects, 26% free, 11MB/15MB, paused 5.265ms total 141.023ms
11-27 18:52:31.112 6084 6095 I art : Background sticky concurrent mark sweep GC freed 2542(492KB) AllocSpace objects, 0(0B) LOS objects, 0% free, 11MB/11MB, paused 25.845ms total 89.939ms
11-27 18:52:31.185 6084 6095 I art : Background partial concurrent mark sweep GC freed 2011(210KB) AllocSpace objects, 0(0B) LOS objects, 24% free, 12MB/16MB, paused 11.725ms total 71.330ms
-- then after also launching music --
11-27 18:57:16.780 6235 6246 I art : Background sticky concurrent mark sweep GC freed 24160(1164KB) AllocSpace objects, 9(1440KB) LOS objects, 18% free, 12MB/15MB, paused 1.401ms total 112.708ms
11-27 18:57:16.833 6084 6095 I art : Background partial concurrent mark sweep GC freed 27088(1805KB) AllocSpace objects, 30(1196KB) LOS objects, 7% free, 49MB/53MB, paused 3.415ms total 310.197ms
I've also discovered some additional items when debugging, relating to standby, memory and the microntek applications but I'll post to a separate thread as will try and keep this thread on-track.
I'll report back after more extensive testing.
FIX/SOLVED
OK, after 30 minute drive this morning, I've had no app crashes or exits at all, ran maps with navigation and had FM radio on all the way, switched between apps using hard and soft back/keys, no problems, so I'm going to call this one the fix!
So the steps:
Root it
Install "AutoKiller Memory Optimizer" by MobiWIA Kft.
In AutoKiller switch everything OFF but then use the CHANGE button on main screen, set it to MODERATE (Or experiment with different ones)
Remember that needs set after full reboot (standby is fine) unless you add it to autostart at boot.
@Qwertyco I'd go back up to 6 and try the above, might solve the issues for you!
Cheers Andy.
After playing with 5.11 for a few days, it's become apparent that It has sound routing problems whenever
there's a Bluetooth connection to my phone. (Moto G5 on Android 7). The only way I can get music or nav
sound (radio is always Ok!) is to have the connection as 'Internet sharing only', no phone or contacts or A2DP.
It also needs regular rebooting to achieve this, as returning from sleep sometimes messes with the sound routing as well.
I'm going to try going back to 6.0.1, and try the new HIZPO 2017.09.15 update file first before I try your fix.
I updated back to 6.0.1, and tried the HIZPO 2017.09.15 update file, and it just aborted the update after 5 seconds.
I'll have a look at it and try again another time.
I'm back, not used the car for a while, so not had a chance to play.
Andy, what's the rooting procedure, if you don't mind?
Hi, no problem same here as the car has been dead for a while here unfortunately!
I've written a lot of the info up at my blog http://www.thebmwz3.co.uk/2017/11/hizpo-android-car-head-unit-mtcdxrc.html
But rooting is:
* Go into factory settings in Settings menu
* type adbon into the password box and click OK
Try at that point, you should be able to get adb working over wifi. If not, install a terminal app to the head unit and then type "setprop persist.adb.tcp.port 5555" and then reboot the unit. You should then be able to adb over wifi.
Then you can root it using the root procedure at https://hvdwolf.github.io/Joying-RootAssistant/rooting.html and I used the file SuperSU-Joying-Intel-v2.82SR1-patch2.zip which worked first time.
Thanks to Andy and others, I've gone back to Android 6.01 and rooted the thing, followed Andy's tips and it seems to be running fairly smoothly for the first time ever.
I've done all this with the unit on the workbench (coffee table) as it's cold outside!
I can't test the sat nav indoors, but it seems to start up and keep running now.
My mission is to get it to do everything I want it to do before it goes back in the car.
Currently struggling with getting it to auto-tether to my phone Bluetooth, and getting apps to autostart at boot.
I can't seem to find any mention of autorun in the software, and the many autorun apps I've tried don't autorun at boot!
Hey m8, glad you're getting there. It's been in my car for quite a few months now, running smoothly!
So, for the auto-tethering bluetooth I've done this:
Get BluetoothTethering.apk from 'doitright' at https://forum.xda-developers.com/an...elopment/bluetooth-settings-launcher-t3504526 (Don't get blueballs, we don't need it) and follow the instructions to install it onto our headunits (i.e. the bit in the terminal/code block where you write it to /system/priv-app/). I've followed those instructions and my phone (HTC One M8) and car bring their bluetooth up and tether perfectly each time now.
Autorun at boot/wake-up is still a little challenging, however the trick is the one that BluetoothTethering.apk uses above, installing the app into priv-app lets it keep running in the background/at wakeup so the key is there, I've just never bothered to really go further into it.
To do the low-mem-killer settings, since our units don't reboot often I just do that manually, as there isn't an rc.local or bootup script that I've located that I can chain those commands into, but then again I've not tried very hard as it's working for me now!
I use Waze, Google Maps, Music, Radio all swapping between them without crashes. Sure it's not the fastest thing in the world but it works
Thanks Andy, I'll have a go at the tethering app.
The two apps I want to autostart are a night screen dimmer and a speed sensitive volume controller. The priv-app location may well solve that.!
I'll report back.....
Those sound interesting apps, which ones are you using as I'm always on the lookout for decent addons!
Also just be careful having more and more apps running in the background, we've not got a huge amount of RAM/Processor to play with!
well the Bluetooth is now auto connecting, many thanks again to Andy.
After an abortive attempt on my windows 10 laptop, I finally got the ADB to work from my old windows 7 PC over WiFi.
Playing about with these two at the moment:
This:
https://play.google.com/store/apps/details?id=net.codechunk.speedofsound&hl=en
and this:
https://play.google.com/store/apps/details?id=com.urbandroid.lux&hl=en
I just realised I seem to be working without using the "AutoKiller Memory Optimizer", as if it doesn't autostart on boot, I've not been manually starting it?
Thanks @Qwertyco I'll take a look at those two apps.
The autokiller optimizer, once it's ran once, those settings will stick until a full hard reboot/power disconnect not just standby when you turn ignition off, so chances are that's why it's kept working for you so far.
Update:
After doing all the stuff Andy sugested, it's running much better now, and rarely does anything random or unexpected anymore.
I's still anoying me in various ways though, the main thing being that everytime it starts up the music palyer plays the first track of the first album EVERYTIME! This happens to be AC/DC - Hells Bells, which is wearing a bit thin now. It rarely does an 'quick resume' and almost always takes a full boot time to start playing music.
Any Ideas out there?

Categories

Resources