[Q] ADK doubleshot config - T-Mobile myTouch 4G Slide

Halp!
Its time for me to dive into some development.. In the process of reading I came across the Android Development Kitchen (no longer in development, booo). This tool supports a lot of HTC devices already and seemed pretty straightforward on adding additional devices.
But, I hit a stopping point.. I can't seem to find all the mount points it asks for in the doubleshot config file.
I was able to locate the following without issue
/system
/data
/cache
But i cannot for the life of me figure out where to find the other ones (sorry, i don't have the file infront of me to tell u exactly which ones). I think its the boot mount and one other..
Can another dev point me in the right direction to get this goin?
Also, which base is a great starting point? I would assume the de-odex'd stock rom?
Thanks in advance!

nicholasb said:
...
Can another dev point me in the right direction to get this goin?
Also, which base is a great starting point? I would assume the de-odex'd stock rom?
...
Click to expand...
Click to collapse
Here's a clue to get you started:
Code:
C:\Android\platform-tools>adb ls /dev/block
000041ed 00000398 4ea62f45 .
000041ed 00000870 4ea62f47 ..
00006180 00000000 4ea62f45 mmcblk1p1
00006180 00000000 4ea62f45 mmcblk1
00006180 00000000 4ea62f45 mmcblk0p31
00006180 00000000 4ea62f45 mmcblk0p30
00006180 00000000 4ea62f45 mmcblk0p29
00006180 00000000 4ea62f45 mmcblk0p28
00006180 00000000 4ea62f45 mmcblk0p27
00006180 00000000 4ea62f4d mmcblk0p26
00006180 00000000 4ea62f45 mmcblk0p25
00006180 00000000 4ea62f45 mmcblk0p24
00006180 00000000 4ea62f45 mmcblk0p23
00006180 00000000 4ea62f45 mmcblk0p22
00006180 00000000 4ea62f45 mmcblk0p21
00006180 00000000 4ea62f45 mmcblk0p20
00006180 00000000 4ea62f45 mmcblk0p19
00006180 00000000 4ea62f45 mmcblk0p18
00006180 00000000 4ea62f45 mmcblk0p17
00006180 00000000 4ea62f45 mmcblk0p16
00006180 00000000 4ea62f45 mmcblk0p15
00006180 00000000 4ea62f45 mmcblk0p14
00006180 00000000 4ea62f45 mmcblk0p13
00006180 00000000 4ea62f45 mmcblk0p12
00006180 00000000 4ea62f45 mmcblk0p11
00006180 00000000 4ea62f45 mmcblk0p10
00006180 00000000 4ea62f45 mmcblk0p9
00006180 00000000 4ea62f45 mmcblk0p8
00006180 00000000 4ea62f45 mmcblk0p7
00006180 00000000 4ea62f45 mmcblk0p6
00006180 00000000 4ea62f45 mmcblk0p5
00006180 00000000 4ea62f45 mmcblk0p4
00006180 00000000 4ea62f45 mmcblk0p3
00006180 00000000 4ea62f45 mmcblk0p2
00006180 00000000 4ea62f45 mmcblk0p1
00006180 00000000 4ea62f45 mmcblk0
00006180 00000000 4ea62f45 loop7
00006180 00000000 4ea62f45 loop6
00006180 00000000 4ea62f45 loop5
00006180 00000000 4ea62f45 loop4
00006180 00000000 4ea62f45 loop3
00006180 00000000 4ea62f45 loop2
00006180 00000000 4ea62f45 loop1
00006180 00000000 4ea62f45 loop0
000041ed 00000050 4ea62f44 vold
000041ed 00000050 4ea62f43 platform
C:\Android\platform-tools>
Obviously done on a windows machine, and I wish I had more time to get into it deeper.
This was done on a fresh restore from my original CWM backup I made a long time ago before I did anything crazy on the device, so you can take the info how you will.
If you're getting into what you're getting into, then mapping this out is a rite of passage for you, the rest of us are awaiting your findings
ETA:
This: Doubleshot_TMOUS_1.28.531.9_Radio_10.48.9007.00U_1 0.12.9007.07_M2_release
or this: Pure Stock Doubleshot, Root/Deodex/Busybox/Opt/Zip
...would be a good place to start for a base if you haven't made a stock backup of your own device.

Getting cable.. starting VM... and FREAKIN THANKS!
Linux has been awhile, feelin like a nub again. Here goes nuttin...
(noticed ICS port in mt4g forum...)

nicholasb said:
Getting cable.. starting VM... and FREAKIN THANKS!
Linux has been awhile, feelin like a nub again. Here goes nuttin...
(noticed ICS port in mt4g forum...)
Click to expand...
Click to collapse
Its not booting. That "dev" is 14 yrs old.
Sent from my Mytouch_4G_Slide using xda premium

Undeadk9 said:
Its not booting. That "dev" is 14 yrs old.
Sent from my Mytouch_4G_Slide using xda premium
Click to expand...
Click to collapse
lol, hey.. i was modifying Gorillaz and Scorched Earth in qbasic when i was 14 and in middleschool.. I wish i had such awesome tech to play around with at that age..
Back on topic.. Here is the output from: adb ls /dev/block
Code:
000041ed 00000410 4ea63951 .
000041ed 00000870 4ea63951 ..
00006180 00000000 4ea63951 dm-5
00006180 00000000 4ea63951 dm-4
00006180 00000000 4ea63951 dm-3
00006180 00000000 4ea63950 dm-2
00006180 00000000 4ea63950 dm-1
00006180 00000000 4ea63950 dm-0
00006180 00000000 4ea636a8 mmcblk1p1
00006180 00000000 4ea636a8 mmcblk1
00006180 00000000 4ea636a8 mmcblk0p31
00006180 00000000 4ea636a8 mmcblk0p30
00006180 00000000 4ea636a8 mmcblk0p29
00006180 00000000 4ea636a8 mmcblk0p28
00006180 00000000 4ea636a8 mmcblk0p27
00006180 00000000 4ea636b0 mmcblk0p26
00006180 00000000 4ea636a8 mmcblk0p25
00006180 00000000 4ea636a8 mmcblk0p24
00006180 00000000 4ea636a8 mmcblk0p23
00006180 00000000 4ea636a8 mmcblk0p22
00006180 00000000 4ea636a8 mmcblk0p21
00006180 00000000 4ea636a8 mmcblk0p20
00006180 00000000 4ea636a8 mmcblk0p19
00006180 00000000 4ea636a8 mmcblk0p18
00006180 00000000 4ea636a8 mmcblk0p17
00006180 00000000 4ea636a8 mmcblk0p16
00006180 00000000 4ea636a8 mmcblk0p15
00006180 00000000 4ea636a8 mmcblk0p14
00006180 00000000 4ea636a8 mmcblk0p13
00006180 00000000 4ea636a8 mmcblk0p12
00006180 00000000 4ea636a8 mmcblk0p11
00006180 00000000 4ea636a8 mmcblk0p10
00006180 00000000 4ea636a8 mmcblk0p9
00006180 00000000 4ea636a8 mmcblk0p8
00006180 00000000 4ea636a8 mmcblk0p7
00006180 00000000 4ea636a8 mmcblk0p6
00006180 00000000 4ea636a8 mmcblk0p5
00006180 00000000 4ea636a8 mmcblk0p4
00006180 00000000 4ea636a8 mmcblk0p3
00006180 00000000 4ea636a8 mmcblk0p2
00006180 00000000 4ea636a8 mmcblk0p1
00006180 00000000 4ea636a8 mmcblk0
00006180 00000000 4ea636a8 loop7
00006180 00000000 4ea636a8 loop6
00006180 00000000 4ea636a8 loop5
00006180 00000000 4ea636a8 loop4
00006180 00000000 4ea636a8 loop3
00006180 00000000 4ea636a8 loop2
00006180 00000000 4ea636a8 loop1
00006180 00000000 4ea636a8 loop0
000041ed 00000050 4ea636a8 vold
000041ed 00000050 4ea636a6 platform
Here is my kitchen config now:
Code:
# HTC myTouch 4G slide
change_mnt=yes
fix_boot=yes
param1=ext3
param2=EMMC
param1_sdcard=vfat
param2_sdcard=MTD
sys_mnt=\/dev\/block\/mmcblk0p22
cache_mnt=\/dev\/block\/mmcblk0p24
boot_mnt=\/dev\/block\/mmcblk0p20
data_mnt=\/dev\/block\/mmcblk0p23
sdcard_mnt=\/dev\/block\/mmcblk1p1
The mount point i was looking for was the boot one... How'd i do?
*edit*
Finally, found em all...

Related

[Q] [Verified Android Trojan] Unknown app sends hidden sms to +493394991625

Hi,
After downloading dozens of apps from appbrain last night
I've noticed an unknown app sending a sms to +493394991625
30.7.2011 1 : 25 : 59 493394991625 1,00Stk. 1,00Stk. 0,20 EUR
from my htc wildfire S A510e in my service providers logs last night.
and looks like it's hiding and wiping traces by disabling storing sent sms messages and other notification settings.
Furthermore I noticed disabled Lookout security app update setting,
I've installed a bunch of popular malware detectors, let's see who wins...
Code:
$ ps
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 388 240 ffffffff 00000000 S /init
root 2 0 0 0 ffffffff 00000000 S kthreadd
root 3 2 0 0 ffffffff 00000000 S ksoftirqd/0
root 4 2 0 0 ffffffff 00000000 S watchdog/0
root 5 2 0 0 ffffffff 00000000 S events/0
root 6 2 0 0 ffffffff 00000000 S khelper
root 7 2 0 0 ffffffff 00000000 S async/mgr
root 8 2 0 0 ffffffff 00000000 S suspend
root 9 2 0 0 ffffffff 00000000 S sync_supers
root 10 2 0 0 ffffffff 00000000 S bdi-default
root 11 2 0 0 ffffffff 00000000 S kblockd/0
root 12 2 0 0 ffffffff 00000000 S kmmcd
root 13 2 0 0 ffffffff 00000000 S kondemand/0
root 14 2 0 0 ffffffff 00000000 S smd_tty
root 15 2 0 0 ffffffff 00000000 D rpcrouter
root 16 2 0 0 ffffffff 00000000 S krpcserversd
root 17 2 0 0 ffffffff 00000000 S qmi
root 18 2 0 0 ffffffff 00000000 S kadspd
root 19 2 0 0 ffffffff 00000000 S microp_work_q
root 20 2 0 0 ffffffff 00000000 S detect/0
root 21 2 0 0 ffffffff 00000000 S button/0
root 22 2 0 0 ffffffff 00000000 S detect/0
root 23 2 0 0 ffffffff 00000000 S button/0
root 24 2 0 0 ffffffff 00000000 S HS_GPIO_DETECT/
root 25 2 0 0 ffffffff 00000000 S HS_GPIO_BUTTON/
root 26 2 0 0 ffffffff 00000000 S khungtaskd
root 27 2 0 0 ffffffff 00000000 S kswapd0
root 28 2 0 0 ffffffff 00000000 S aio/0
root 29 2 0 0 ffffffff 00000000 S crypto/0
root 40 2 0 0 ffffffff 00000000 S panel_on/0
root 41 2 0 0 ffffffff 00000000 S diag_wq
root 42 2 0 0 ffffffff 00000000 S msm_serial_hs
root 43 2 0 0 ffffffff 00000000 S msm_serial_hs
root 44 2 0 0 ffffffff 00000000 S msm_serial_hs
root 45 2 0 0 ffffffff 00000000 S mtdblockd
root 52 2 0 0 ffffffff 00000000 S msm_hsusb
root 53 2 0 0 ffffffff 00000000 S usb_mass_storag
root 54 2 0 0 ffffffff 00000000 S gs_tty
root 55 2 0 0 ffffffff 00000000 S cypress_touch
root 56 2 0 0 ffffffff 00000000 S synaptics_wq
root 57 2 0 0 ffffffff 00000000 S ki_queue
root 58 2 0 0 ffffffff 00000000 S cm3628_wq
root 59 2 0 0 ffffffff 00000000 S kstriped
root 60 2 0 0 ffffffff 00000000 S binder
root 61 2 0 0 ffffffff 00000000 S l2cap
root 62 2 0 0 ffffffff 00000000 S krfcommd
root 63 1 300 140 ffffffff 00000000 S /sbin/ueventd
system 65 1 856 160 ffffffff 00000000 S /system/bin/servicemanager
root 66 2 0 0 ffffffff 00000000 S sd-qd
root 67 1 3940 348 ffffffff 00000000 S /system/bin/vold
root 68 1 3952 288 ffffffff 00000000 S /system/bin/netd
root 69 1 3260 216 ffffffff 00000000 S /system/bin/debuggerd
radio 70 1 14240 560 ffffffff 00000000 S /system/bin/rild
root 71 1 98644 22776 ffffffff 00000000 S zygote
media 72 1 44440 3164 ffffffff 00000000 S /system/bin/mediaserver
root 73 1 12344 780 ffffffff 00000000 S /system/bin/htcfs
bluetooth 74 1 1312 168 ffffffff 00000000 S /system/bin/dbus-daemon
root 75 1 880 268 ffffffff 00000000 S /system/bin/installd
keystore 76 1 1824 184 ffffffff 00000000 S /system/bin/keystore
root 77 1 840 148 ffffffff 00000000 S /system/bin/ipd
compass 79 1 3180 300 ffffffff 00000000 S /system/bin/akmd
root 81 1 1100 288 ffffffff 00000000 S /system/bin/htc_ebdlogd
root 87 81 2152 1664 ffffffff 00000000 S /system/bin/logcat2
root 116 2 0 0 ffffffff 00000000 D snd_rpc
system 118 71 246828 38828 ffffffff 00000000 S system_server
root 140 2 0 0 ffffffff 00000000 D audmgr_rpc
system 187 71 143140 26508 ffffffff 00000000 S com.android.systemui
app_11 209 71 131368 20700 ffffffff 00000000 S com.htc.android.htcime
radio 216 71 155760 26148 ffffffff 00000000 S com.android.phone
app_21 221 71 248620 51508 ffffffff 00000000 S android.process.acore
app_17 245 71 187440 24360 ffffffff 00000000 S com.google.process.gapps
root 431 2 0 0 ffffffff 00000000 S flush-0:17
root 552 2 0 0 ffffffff 00000000 S flush-179:0
root 803 2 0 0 ffffffff 00000000 D audmgr_rpc
app_126 981 1 5368 376 ffffffff 00000000 S ./smrsd
app_126 983 981 2140 1664 ffffffff 00000000 S /system/bin/logcat
root 1487 2 0 0 ffffffff 00000000 S flush-31:0
app_72 2482 71 113872 15820 ffffffff 00000000 S org.sipdroid.sipua
app_6 2534 71 193320 31532 ffffffff 00000000 S com.android.vending
app_101 2586 1 944 472 ffffffff 00000000 S logcat
app_86 3159 71 169616 20608 ffffffff 00000000 S com.lookout
app_101 3167 71 128972 18376 ffffffff 00000000 S com.antivirus
app_101 3203 3167 944 468 ffffffff 00000000 S logcat
app_86 3341 3159 1888 1412 ffffffff 00000000 S logcat
app_7 3404 71 147256 17180 ffffffff 00000000 S android.process.media
nobody 3635 71 146292 33480 ffffffff 00000000 S com.htc.launcher
app_21 3738 71 129612 20424 ffffffff 00000000 S com.android.htccontacts
app_52 3861 71 126588 16900 ffffffff 00000000 S com.android.mms
app_40 4468 71 127588 16696 ffffffff 00000000 S com.htc.cspeoplesync
app_121 4617 71 108112 14208 ffffffff 00000000 S com.zrgiu.antivirus
app_47 4631 71 107632 13392 ffffffff 00000000 S com.htc.wotaproviders
system 4784 71 107632 12704 ffffffff 00000000 S com.android.server.vpn:remote
app_122 4833 71 108588 14044 ffffffff 00000000 S com.netqin.antivirussc
app_130 4846 71 111336 15288 ffffffff 00000000 S com.trustmobi.MobiShield
app_12 4859 71 117108 22404 ffffffff 00000000 S com.htc.bgp
app_124 5059 71 111520 15684 ffffffff 00000000 S com.zoner.android.antivirus
app_27 5268 71 119504 15020 ffffffff 00000000 S com.google.android.googlequicksearchbox
app_58 5277 71 133176 20560 ffffffff 00000000 S com.htc.lmw
root 5317 2 0 0 ffffffff 00000000 S flush-7:8
root 5319 2 0 0 ffffffff 00000000 S loop8
root 5320 2 0 0 ffffffff 00000000 S kdmflush
root 5321 2 0 0 ffffffff 00000000 S kcryptd_io
root 5322 2 0 0 ffffffff 00000000 S kcryptd
root 5345 2 0 0 ffffffff 00000000 S flush-7:9
root 5348 2 0 0 ffffffff 00000000 S loop9
root 5349 2 0 0 ffffffff 00000000 S kdmflush
root 5350 2 0 0 ffffffff 00000000 S kcryptd_io
root 5351 2 0 0 ffffffff 00000000 S kcryptd
root 5373 2 0 0 ffffffff 00000000 S flush-7:10
root 5376 2 0 0 ffffffff 00000000 S loop10
root 5377 2 0 0 ffffffff 00000000 S kdmflush
root 5378 2 0 0 ffffffff 00000000 S kcryptd_io
root 5379 2 0 0 ffffffff 00000000 S kcryptd
root 5397 2 0 0 ffffffff 00000000 S flush-7:11
root 5401 2 0 0 ffffffff 00000000 S loop11
root 5402 2 0 0 ffffffff 00000000 S kdmflush
root 5403 2 0 0 ffffffff 00000000 S kcryptd_io
root 5404 2 0 0 ffffffff 00000000 S kcryptd
root 5421 2 0 0 ffffffff 00000000 S flush-7:12
root 5424 2 0 0 ffffffff 00000000 S loop12
root 5425 2 0 0 ffffffff 00000000 S kdmflush
root 5426 2 0 0 ffffffff 00000000 S kcryptd_io
root 5427 2 0 0 ffffffff 00000000 S kcryptd
root 5445 2 0 0 ffffffff 00000000 S flush-7:13
root 5448 2 0 0 ffffffff 00000000 S loop13
root 5449 2 0 0 ffffffff 00000000 S kdmflush
root 5450 2 0 0 ffffffff 00000000 S kcryptd_io
root 5451 2 0 0 ffffffff 00000000 S kcryptd
root 5466 2 0 0 ffffffff 00000000 S flush-7:14
root 5472 2 0 0 ffffffff 00000000 S loop14
root 5473 2 0 0 ffffffff 00000000 S kdmflush
root 5474 2 0 0 ffffffff 00000000 S kcryptd_io
root 5475 2 0 0 ffffffff 00000000 S kcryptd
app_63 5483 71 118580 20480 ffffffff 00000000 S com.google.android.gm
root 5501 2 0 0 ffffffff 00000000 S flush-7:15
root 5508 2 0 0 ffffffff 00000000 S loop15
root 5509 2 0 0 ffffffff 00000000 S kdmflush
root 5510 2 0 0 ffffffff 00000000 S kcryptd_io
root 5511 2 0 0 ffffffff 00000000 S kcryptd
root 5527 2 0 0 ffffffff 00000000 S flush-7:16
root 5539 2 0 0 ffffffff 00000000 S loop16
root 5540 2 0 0 ffffffff 00000000 S kdmflush
root 5541 2 0 0 ffffffff 00000000 S kcryptd_io
root 5542 2 0 0 ffffffff 00000000 S kcryptd
root 5550 2 0 0 ffffffff 00000000 S flush-7:17
root 5562 2 0 0 ffffffff 00000000 S loop17
root 5563 2 0 0 ffffffff 00000000 S kdmflush
root 5564 2 0 0 ffffffff 00000000 S kcryptd_io
root 5565 2 0 0 ffffffff 00000000 S kcryptd
app_56 5579 71 174784 28264 ffffffff 00000000 S com.htc.cs
root 5587 2 0 0 ffffffff 00000000 S flush-7:18
root 5603 2 0 0 ffffffff 00000000 S loop18
root 5604 2 0 0 ffffffff 00000000 S kdmflush
root 5605 2 0 0 ffffffff 00000000 S kcryptd_io
root 5606 2 0 0 ffffffff 00000000 S kcryptd
root 5650 2 0 0 ffffffff 00000000 S flush-7:19
root 5656 2 0 0 ffffffff 00000000 S loop19
root 5657 2 0 0 ffffffff 00000000 S kdmflush
root 5658 2 0 0 ffffffff 00000000 S kcryptd_io
root 5659 2 0 0 ffffffff 00000000 S kcryptd
root 5708 2 0 0 ffffffff 00000000 S flush-7:20
root 5712 2 0 0 ffffffff 00000000 S loop20
root 5713 2 0 0 ffffffff 00000000 S kdmflush
root 5714 2 0 0 ffffffff 00000000 S kcryptd_io
root 5715 2 0 0 ffffffff 00000000 S kcryptd
app_59 5856 71 109988 16604 ffffffff 00000000 S com.htc.recommend
root 5916 2 0 0 ffffffff 00000000 S flush-7:21
root 5919 2 0 0 ffffffff 00000000 S loop21
root 5920 2 0 0 ffffffff 00000000 S kdmflush
root 5921 2 0 0 ffffffff 00000000 S kcryptd_io
root 5922 2 0 0 ffffffff 00000000 S kcryptd
app_16 5993 71 107696 14992 ffffffff 00000000 S com.htc.htchubsyncprovider
app_20 6014 71 107808 16072 ffffffff 00000000 S com.htc.messagecs
app_28 6021 71 107924 16172 ffffffff 00000000 S com.htc.musicmarkeditems
app_128 6026 71 109936 15720 ffffffff 00000000 S com.opensystem.terminator
app_11 6044 71 136420 17812 ffffffff 00000000 S com.htc.android.htcime:provider
app_120 6091 71 109956 16904 ffffffff 00000000 S com.drweb:monitor
app_67 6117 71 122120 19548 ffffffff 00000000 S com.google.android.apps.maps:NetworkLocationService
app_12 6137 71 113356 18940 ffffffff 00000000 S com.htc.bg
app_138 6145 71 114012 20244 ffffffff 00000000 S com.mymobileprotection15
app_79 6164 71 109788 15888 ffffffff afd0c64c S br.com.bott.droidsshd
app_76 6177 71 121940 21804 ffffffff 00000000 S com.wefi.wefi
system 6235 71 113144 17280 ffffffff 00000000 S com.android.settings
app_79 6251 6465 1212 496 c00f98cc 00063324 S /data/data/br.com.bott.droidsshd/files/bin/dropbear
app_79 6252 6251 728 316 c0083920 afd0c4dc S -sh
app_79 6259 6252 876 300 00000000 afd0b58c R ps
app_79 6465 1 1212 180 c00f98cc 00063324 S /data/data/br.com.bott.droidsshd/files/bin/dropbear
root 9575 2 0 0 ffffffff 00000000 S flush-7:0
root 9581 2 0 0 ffffffff 00000000 S loop0
root 9582 2 0 0 ffffffff 00000000 S kdmflush
root 9583 2 0 0 ffffffff 00000000 S kcryptd_io
root 9584 2 0 0 ffffffff 00000000 S kcryptd
root 10019 2 0 0 ffffffff 00000000 S flush-7:1
root 10025 2 0 0 ffffffff 00000000 S loop1
root 10026 2 0 0 ffffffff 00000000 S kdmflush
root 10027 2 0 0 ffffffff 00000000 S kcryptd_io
root 10028 2 0 0 ffffffff 00000000 S kcryptd
root 10179 2 0 0 ffffffff 00000000 S flush-7:2
root 10185 2 0 0 ffffffff 00000000 S loop2
root 10186 2 0 0 ffffffff 00000000 S kdmflush
root 10187 2 0 0 ffffffff 00000000 S kcryptd_io
root 10188 2 0 0 ffffffff 00000000 S kcryptd
root 10293 2 0 0 ffffffff 00000000 S flush-7:3
root 10299 2 0 0 ffffffff 00000000 S loop3
root 10300 2 0 0 ffffffff 00000000 S kdmflush
root 10301 2 0 0 ffffffff 00000000 S kcryptd_io
root 10302 2 0 0 ffffffff 00000000 S kcryptd
root 10860 2 0 0 ffffffff 00000000 S flush-7:4
root 10867 2 0 0 ffffffff 00000000 S loop4
root 10868 2 0 0 ffffffff 00000000 S kdmflush
root 10869 2 0 0 ffffffff 00000000 S kcryptd_io
root 10870 2 0 0 ffffffff 00000000 S kcryptd
root 11330 2 0 0 ffffffff 00000000 S flush-7:5
root 11332 2 0 0 ffffffff 00000000 S loop5
root 11333 2 0 0 ffffffff 00000000 S kdmflush
root 11334 2 0 0 ffffffff 00000000 S kcryptd_io
root 11335 2 0 0 ffffffff 00000000 S kcryptd
root 11353 2 0 0 ffffffff 00000000 S flush-7:6
root 11360 2 0 0 ffffffff 00000000 S loop6
root 11361 2 0 0 ffffffff 00000000 S kdmflush
root 11362 2 0 0 ffffffff 00000000 S kcryptd_io
root 11363 2 0 0 ffffffff 00000000 S kcryptd
root 11376 2 0 0 ffffffff 00000000 S flush-7:7
root 11378 2 0 0 ffffffff 00000000 S loop7
root 11379 2 0 0 ffffffff 00000000 S kdmflush
root 11380 2 0 0 ffffffff 00000000 S kcryptd_io
root 11381 2 0 0 ffffffff 00000000 S kcryptd
app_56 13589 71 112512 17840 ffffffff 00000000 S com.htc.cs:remote
app_78 21827 71 117468 16508 ffffffff 00000000 S com.skype.raider
app_78 21917 21827 14616 10268 ffffffff 00000000 S /data/data/com.skype.raider/files/skypekit
root 22015 2 0 0 ffffffff 00000000 S iscan_sysioc
root 22016 2 0 0 ffffffff 00000000 S dhcp_sysioc
root 22017 2 0 0 ffffffff 00000000 S ap_sysioc
root 22018 2 0 0 ffffffff 00000000 S dhd_watchdog
root 22019 2 0 0 ffffffff 00000000 S dhd_dpc
root 22020 2 0 0 ffffffff 00000000 S dhd_sysioc
log 22021 1 708 152 ffffffff 00000000 S /system/bin/logwrapper
wifi 22023 22021 2480 744 ffffffff 00000000 S /system/bin/wpa_supplicant
app_101 24919 1 944 468 ffffffff 00000000 S logcat
app_101 26402 1 944 468 ffffffff 00000000 S logcat
dhcp 29044 1 900 212 ffffffff 00000000 S /system/bin/dhcpcd
app_101 29471 1 944 472 ffffffff 00000000 S logcat
app_123 29948 1 952 444 ffffffff 00000000 S /data/data/jp.ktinc.fastscan/fseng
app_125 31043 71 173488 42988 ffffffff 00000000 S com.morrison.applocklite
app_125 31056 31043 944 472 ffffffff 00000000 S logcat
app_125 31083 31043 944 468 ffffffff 00000000 S logcat
app_126 32496 71 146544 23948 ffffffff 00000000 S com.symantec.mobilesecurity
app_126 32763 32496 1588 1112 ffffffff 00000000 S logcat
$
Code:
Aug 1 15:54:12 freshclam[6026]: main.cvd is up to date (version: 53, sigs: 846214, f-level: 53, builder: sven)
Aug 1 15:54:12 freshclam[6026]: daily.cld is up to date (version: 13385, sigs: 166221, f-level: 60, builder: ccordes)
Aug 1 15:54:12 freshclam[6026]: bytecode.cld is up to date (version: 144, sigs: 41, f-level: 60, builder: edwin)
Code:
$ clamscan -r --bell --detect-pua=yes --heuristic-scan-precedence=yes sdcard16GB-virus
sdcard16GB-virus/google_*****.vcf: OK
sdcard16GB-virus/setup_3.0.5551.exe: OK
sdcard16GB-virus/pcsc_pcsc_00001.vcf: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_its.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_vts_tran_GMM.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_its_ter.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_vts_GMM.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_r.m: OK
sdcard16GB-virus/Android/data/com.google.android.apps.maps/cache/cache_vts_labl_GMM.m: OK
sdcard16GB-virus/Android/data/.nomedia: Empty file
sdcard16GB-virus/svox/en-GB_ta.bin: OK
sdcard16GB-virus/svox/en-US_lh0_sg.bin: OK
sdcard16GB-virus/svox/fr-FR_ta.bin: OK
sdcard16GB-virus/svox/es-ES_zl0_sg.bin: OK
sdcard16GB-virus/svox/fr-FR_nk0_sg.bin: OK
sdcard16GB-virus/svox/it-IT_ta.bin: OK
sdcard16GB-virus/svox/es-ES_ta.bin: OK
sdcard16GB-virus/svox/en-GB_kh0_sg.bin: OK
sdcard16GB-virus/svox/it-IT_cm0_sg.bin: OK
sdcard16GB-virus/svox/en-US_ta.bin: OK
sdcard16GB-virus/svox/de-DE_gl0_sg.bin: OK
sdcard16GB-virus/svox/de-DE_ta.bin: OK
sdcard16GB-virus/download/DroidSSHdv06.apk: OK
sdcard16GB-virus/download/Apps_Installer_0.2.1.apk: OK
sdcard16GB-virus/download/org.mozilla.firefox.apk: OK
sdcard16GB-virus/download/com.wefi.wefi.apk: OK
sdcard16GB-virus/download/com.faststring.fastappinstaller.apk: OK
sdcard16GB-virus/download/de.schildbach.oeffi.apk: OK
sdcard16GB-virus/download/org.mozilla.firefox_beta.apk: OK
sdcard16GB-virus/google_******_00002.vcf: OK
sdcard16GB-virus/Quick Start Guide/20110413_Marvel_HTC_Italian_QSG.pdf: OK
sdcard16GB-virus/Quick Start Guide/20110414_Marvel_HTC_German_QSG.pdf.pdf: OK
sdcard16GB-virus/Quick Start Guide/20110413_Marvel_HTC_French_QSG.pdf: OK
sdcard16GB-virus/*********/Sipdroid-2.3.apk: OK
sdcard16GB-virus/sim_SIM_00001.vcf: OK
sdcard16GB-virus/sim_SIM_00002.vcf: Empty file
sdcard16GB-virus/pcsc_pcsc_00002.vcf: OK
sdcard16GB-virus/Safety Guide/20110406_Marvel_HTC_Italian_Safety-regulatory_guide.pdf: OK
sdcard16GB-virus/Safety Guide/20110325_Marvel_HTC_French_Safety-regulatory_guide.pdf: OK
sdcard16GB-virus/Safety Guide/20110324_Marvel_HTC_German_Safety-regulatory_guide.pdf: OK
sdcard16GB-virus/miren_browser/.cache/CacheList: OK
sdcard16GB-virus/miren_browser/.cache/databases/ApplicationCache.db: OK
sdcard16GB-virus/miren_browser/.cache/geolocation/CachedGeoposition.db: OK
sdcard16GB-virus/miren_browser/.cache/geolocation/GeolocationPermissions.db: Empty file
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/3d87920807b05c46ee34b296fc331cdf.png: OK
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/8a1f63f02b6f44fb91bd197dd5dfdc9e.png: OK
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/a7e4cbd44379085999164a851497a8fa.png: OK
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/39fbd541589b2ec6a36d872e02514412.png: OK
sdcard16GB-virus/miren_browser/imagecaches/rssIcon/3f7f3c517a020bf4836368e24830632f.png: OK
sdcard16GB-virus/miren_browser/.persist/webview_pictures/webview_0: OK
sdcard16GB-virus/DCIM/sample01.jpg: OK
sdcard16GB-virus/DCIM/sample07.jpg: OK
sdcard16GB-virus/DCIM/sample06.jpg: OK
sdcard16GB-virus/DCIM/sample09.jpg: OK
sdcard16GB-virus/DCIM/sample03.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-712AC800-2155097-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-9683FC85-3126664-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-3C600F01-2699282-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-92F65F82-3806217-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-4D34F029-7255294-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-C1F43D8A-4013455-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-58111224-2901259-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-9683FC85-3126664-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-58111224-2901259-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-4D34F029-7255294-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-712AC800-2155097-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-D37EF1ED-4197534-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-D37EF1ED-4197534-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-92F65F82-3806217-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/4-C1F43D8A-4013455-480.jpg: OK
sdcard16GB-virus/DCIM/.thumbnails/2-13D94E9B-1919498-480.jpg: OK
sdcard16GB-virus/DCIM/sample05.jpg: OK
sdcard16GB-virus/DCIM/sample04.jpg: OK
sdcard16GB-virus/DCIM/sample02.jpg: OK
sdcard16GB-virus/DCIM/sample08.jpg: OK
sdcard16GB-virus/background.log: OK
sdcard16GB-virus/User Manual/20110413_Marvel_HTC_German_UM.pdf: OK
----------- SCAN SUMMARY -----------
Known viruses: 1012338
Engine version: 0.97
Scanned directories: 38
Scanned files: 74
Infected files: 0
Data scanned: 153.86 MB
Data read: 227.97 MB (ratio 0.67:1)
Time: 79.317 sec (1 m 19 s)
What to do now?
If that app really is a virus then it's very nasty :O
I recon you hard reset your whole phone. Backup your contacts, maybe sms, but not your apps of course, and simply reset your device =/.
This is an example of the ineffectiveness of todays antiviruses for android. They can detect, generally too late, but can't fix anything... Not much of an proper antivirus around for the time being, it's just fancy apps that don't do much and reassure people...
-Deleted Post-
my android trojan desaster recovery continued
crakeron said:
I recon you hard reset your whole phone. Backup your contacts, maybe sms, but not your apps of course, and simply reset your device
Click to expand...
Click to collapse
Not possible, the setup wizard after factory reset + reboot on this marvel HTC Wildfire S requires google + htc sense account access to have the google and htc apps configured and working correctly (there's a warning in the manual not to disable that),
and this will auto-restore all settings and apps to the desaster state far before you get the chance to disable the auto-restore and sync in settings, surely including the trojan,
You notice that behaviour first if you changed your wlan AP key for desaster recovery and a few minutes after setup wizard run your old wlan key is silently restored despite explicitly disabled sync + auto restore settings:
Code:
01.08.11 01:49:00 WLAN-Gerät Anmeldung gescheitert (2,4 GHz): ungültiger WLAN-Schlüssel. Name: htc.
01.08.11 01:48:48 WLAN-Gerät Anmeldung gescheitert (2,4 GHz): ungültiger WLAN-Schlüssel. Name: htc.
01.08.11 01:48:45 WLAN-Gerät angemeldet, WLAN wird mit voller Leistung reaktiviert (2,4 GHz).
01.08.11 01:38:52 Kein WLAN-Gerät mehr angemeldet, Stromverbrauch wird reduziert (2,4 GHz).
01.08.11 01:36:39 WLAN-Gerät Anmeldung gescheitert (2,4 GHz): ungültiger WLAN-Schlüssel. Name: htc.
01.08.11 01:36:28 WLAN-Gerät hat sich abgemeldet (2,4 GHz). Name: htc.
01.08.11 01:27:42 WLAN-Gerät angemeldet (2,4 GHz). Name: htc, Geschwindigkeit 54 Mbit/s.
01.08.11 01:27:42 WLAN-Gerät angemeldet, WLAN wird mit voller Leistung reaktiviert (2,4 GHz).
"ungültiger WLAN-Schlüssel" means invalid EAP-PSK, sorry avm.de is uncapable of english language.
The attackers possibly compromised my AVM fritzbox router, too, they tried to download a malware firmware image to it over the marvel (web management showed warning about failed firmware update yesterday morning) or the newly setup AVM VPN access is insecure , had to factory reset and reinstall the firmware for another desaster recovery,
but I don't know if they managed to have the device memory still compromised using one of the methods known by ip-phone-forum.de to debrand the product, etc.
And well, it's very hard to get a verified clean genuine firmware image file over a possibly compromised and redirecting router from a manufacturer not supporting https certificate auth or crypto signed software on his servers, had to verify sha1sums with another guy over phone before download the image to the box..
Another trojan verification evidence is that the hackers incoming phone/sms account +493394991625 where the sms was sent is no longer reachable or my provider has got wrong data in costs logs.
Code:
01.08.11 14:49:55 Internettelefonie mit [email protected] über sip.qsc.de war nicht erfolgreich. Ursache: Not Found (404)
01.08.11 14:49:41 Internettelefonie mit [email protected] über sip.12voip.com war nicht erfolgreich. Ursache: User not found (404)
Theres neither a way to remove marvel configuration data from your google account or htc sync account, this is absolutely not acceptable,
The only desaster recovery option this marvel accepts is to enable accept of official market apps only, so some apps from appbrain.com were hopefully left out from the auto-restore, is this rechecked?
OK, lets do a remote virus scan of the marvel wildfire S over WLAN (needs e.g. sshdroid app with sftp support running as ROOT ):
Code:
[email protected]:~/htc$ sshfs htc:/ /home/xxxxxxx/htc/sshfs -p xx -o ro,reconnect
[email protected]'s password:
[email protected]:~/htc$
[email protected]:~/htc$ #clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/app-cache
[email protected]:~/htc$ ls -l sshfs
insgesamt 208
drwxr-xr-x 1 root root 0 1. Aug 04:03 acct
drwxr-xr-x 1 root xxxxxxx 60 1. Aug 04:03 app-cache
-rw-r--r-- 1 root root 460 1. Jan 1970 bootcomplete.rc
drwxrwx--- 1 xxxxxxx 2001 4096 1. Aug 21:11 cache
dr-x------ 1 root root 0 1. Aug 04:03 config
-rw-r--r-- 1 root root 1398 1. Jan 1970 cwkeys
drwxrwx--x 1 xxxxxxx xxxxxxx 4096 1. Aug 01:10 data
-rw-r--r-- 1 root root 118 1. Jan 1970 default.prop
drwxr-xr-x 1 root root 1600 1. Aug 18:47 dev
drwx------ 1 root root 4096 1. Aug 15:25 devlog
lrwxrwxrwx 1 root root 11 1. Aug 04:03 etc -> /system/etc
-rwxr-x--- 1 root root 107244 1. Jan 1970 init
-rwxr-x--- 1 root root 1677 1. Jan 1970 init.goldfish.rc
-rwxr-x--- 1 root root 5396 1. Jan 1970 init.marvel.rc
-rwxr-x--- 1 root root 20294 1. Jan 1970 init.rc
-rw-r--r-- 1 root root 11336 1. Jan 1970 logo.rle
drwxrwxr-x 1 root xxxxxxx 0 1. Aug 04:03 mnt
dr-xr-xr-x 1 root root 0 1. Jan 1970 proc
drwx------ 1 root root 0 16. Apr 19:08 root
drwxr-x--- 1 root root 0 1. Jan 1970 sbin
lrwxrwxrwx 1 root root 11 1. Aug 04:03 sdcard -> /mnt/sdcard
drwxr-xr-x 1 root root 0 1. Aug 04:03 sys
drwxr-xr-x 1 root root 4096 16. Apr 20:31 system
-rw-r--r-- 1 root root 0 1. Jan 1970 ueventd.goldfish.rc
-rw-r--r-- 1 root root 4311 1. Jan 1970 ueventd.rc
lrwxrwxrwx 1 root root 14 1. Aug 04:03 vendor -> /system/vendor
[email protected]:~/htc$
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/app-cache
xxxxx[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/cache
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/data
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/mnt
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/sdcard
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes --heuristic-scan-precedence=yes sshfs/system
[email protected]:~/htc$
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/app-cache
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/cache
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/data
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/mnt
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/sdcard
[email protected]:~/htc$ clamscan -r --bell --no-summary --infected --detect-pua=yes sshfs/system
[email protected]:~/htc$ fusermount -u /home/xxxxxxx/htc/sshfs
[email protected]:~/htc$
Maybe many files left out due to permissions and ro mount:
~# chown xxxxxxx.xxxxxx /home/xxxxxxx/htc/sshfs
chown: Zugriff auf „/home/xxxxxxx/htc/sshfs“ nicht möglich: Keine Berechtigung
The 3 installed EICAR Testfiles cannot be missed by clamav.
Some more console apps on the market like iptraf were helpful to track down the trojan if we got x-permissions at all from ssh.
I'm out of options for now, HTC Europe support has taken over the case, will report.
Just wanted to let You know the trojan is still on the device and active:
Today he moved one of the EICAR virus testfiles to the sipdroid app's space (is this possible without root?), Lookout reported it.
If you're rooted, why not do terminal
su
ls -la (virus listed)
chmod +000 the apk
reboot
rm -rf
woprr said:
Just wanted to let You know the trojan is still on the device and active:
Today he moved one of the EICAR virus testfiles to the sipdroid app's space (is this possible without root?), Lookout reported it.
Click to expand...
Click to collapse
Indirect said:
If you're rooted, why not do terminal
su
ls -la (virus listed)
chmod +000 the apk
reboot
rm -rf
Click to expand...
Click to collapse
i think he isnt on root..
Still, it is a valid option.
No. Rooting voids warranty. I've bought this product for fun not for having work with it.
Then I don't know what to tell you dude.
I'm just on my 5th try to factory reset the phone and using my google account without htc sense, hopefully it does not restore the trojan again, if it does, htc support has one week to fix it or the product is sent back to the seller, I should do this anyway, there much better phones.
Does not work, google is restoring the phone now, despite explicitly disabled sync settings.
What a crap!
HTC cannot fix that, problem with google, I'll try without setting up Google account access and using only googlemail par IMAP/SMTP access to get rid of the stored android phone sync data on google account.
woprr said:
I'm just on my 5th try to factory reset the phone and using my google account without htc sense, hopefully it does not restore the trojan again, if it does, htc support has one week to fix it or the product is sent back to the seller, I should do this anyway, there much better phones.
Does not work, google is restoring the phone now, despite explicitly disabled sync settings.
What a crap!
Click to expand...
Click to collapse
Seems your trojan is re-enabling those settings somehow, and a factory reset only wipes /data, therefore, the trojan must be in /system, which would only be possible if the device is rooted, try typing "su" in terminal emulator, or check if / is r/w in root explorer, if either of those are right, then your device is rooted, and you should install a custom recovery and wipe everything except /boot. (Note: make sure to have a ROM (should be .zip) on the root of you sdcard to flash after you wipe everything, otherwise, the device will not boot)
1. I've said I do not want root. rooting voids warranty, I've paid HTC and google to manage the Product for me.
2. I do not have root:
Code:
ssh htc -p 2222
$ su
su: permission denied
$ echo test > /system/test
cannot create /system/test: read-only file system
$
If you were rooted, you would learn to fix things like this and wouldn't need a warranty unless it was accidental damage and even then, you can easily unroot your device and put s-on. It's not impossible. People unroot their devices to send in for warranty all the time.
I've said I've not yet decided to keep the phone. There're better ones for little money more around. In Germany You can revoke contracts with online sellers and return within 2 weeks.
woprr said:
I've said I've not yet decided to keep the phone. There're better ones for little money more around. In Germany You can revoke contracts with online sellers and return within 2 weeks.
Click to expand...
Click to collapse
Just return it and get something else since you don't want to root. You could root though, remove the virus, then unroot, as if you never had it touched...I don't see what use xda is if you're an unrooted user anyway, many things here require it, and i'm not trying to be rude to you.
How can a virus get the privileges on android you assume it's got without root access?
The virus itself could be running an exploit to allow root privledges also, it doesn't need root to be sending texts, only just to install itself into /system. Although it could also be hiding in dalvik
An exploit ^^. Scenario?
Ok, factory reset and not setup google +htc sense account in first run setup wizard should do the trick.
The Phone should be clean now.
I'm setting up google mail with the standard mua app, not the gmail app.
BTW, I've found the settings option to delete the sync data from google servers:
I'ts under Settings->Privacy->Backup and Restore->Uncheck Automatic restore (Msgbox popup warning: "...erase all copies on google servers?") but leave Back up my setting checked, if all is setup then setup google account in phone and sync.
Let's see if this works...
Looks like. But I dont know if the data on google servers got overwritten or merged.
I'will know when re-enabling automatic restore...

disable services at android?? nfc

Hi
I cant find the daemon for some services, can somebody explain me how to disable services with android
i have root and terminal for android
At APPS i have disabled NFC service, but after print "ps" at terminal this nfc service daemon Still working.
Here is ps of my phone
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 2668 880 c02829a0 0002a808 S /init
root 2 0 0 0 c01c59a4 00000000 S kthreadd
root 3 2 0 0 c01cd87c 00000000 S ksoftirqd/0
root 6 2 0 0 c018b6e4 00000000 S kworker/u:0
root 7 2 0 0 c0188aac 00000000 S kworker/u:0H
root 8 2 0 0 c01cd87c 00000000 S migration/0
root 9 2 0 0 c01c51b8 00000000 R migration/1
root 10 2 0 0 c01c51b8 00000000 R ksoftirqd/1
root 11 2 0 0 c01c0038 00000000 S kworker/1:0
root 12 2 0 0 c01c0038 00000000 S kworker/1:0H
root 13 2 0 0 c01c51b8 00000000 R migration/2
root 14 2 0 0 c01c51b8 00000000 R ksoftirqd/2
root 16 2 0 0 c01c0038 00000000 S kworker/2:0H
root 17 2 0 0 c01cd87c 00000000 S migration/3
root 18 2 0 0 c01cd87c 00000000 S ksoftirqd/3
root 20 2 0 0 c01c0038 00000000 S kworker/3:0H
root 21 2 0 0 c01bfa08 00000000 S khelper
root 22 2 0 0 c01bfa08 00000000 S netns
root 27 2 0 0 c01c0038 00000000 S kworker/0:1H
root 28 2 0 0 c01bfa08 00000000 S modem_notifier
root 29 2 0 0 c01bfa08 00000000 S smd_channel_clo
root 30 2 0 0 c01bfa08 00000000 S smsm_cb_wq
root 32 2 0 0 c01bfa08 00000000 S rpm-smd
root 33 2 0 0 c01c0038 00000000 S kworker/u:1H
root 34 2 0 0 c01bfa08 00000000 S mpm
root 35 2 0 0 c02510f0 00000000 S sync_supers
root 36 2 0 0 c025172c 00000000 S bdi-default
root 37 2 0 0 c01bfa08 00000000 S kblockd
root 38 2 0 0 c0443218 00000000 S system
root 39 2 0 0 c04fd304 00000000 S khubd
root 40 2 0 0 c020b6c0 00000000 S irq/99-msm_iomm
root 41 2 0 0 c020b6c0 00000000 S irq/105-msm_iom
root 42 2 0 0 c020b6c0 00000000 S irq/77-msm_iomm
root 43 2 0 0 c020b6c0 00000000 S irq/70-msm_iomm
root 44 2 0 0 c020b6c0 00000000 S irq/94-msm_iomm
root 45 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 46 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 47 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 48 2 0 0 c020b6c0 00000000 S irq/79-msm_iomm
root 49 2 0 0 c020b6c0 00000000 S irq/78-msm_iomm
root 50 2 0 0 c020b6c0 00000000 S irq/78-msm_iomm
root 51 2 0 0 c020b6c0 00000000 S irq/74-msm_iomm
root 52 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 53 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 54 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 55 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 56 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 57 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 58 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 59 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 60 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 61 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 62 2 0 0 c01bfa08 00000000 S devfreq_wq
root 63 2 0 0 c01bfa08 00000000 S l2cap
root 64 2 0 0 c01bfa08 00000000 S a2mp
root 65 2 0 0 c01bfa08 00000000 S cfg80211
root 77 2 0 0 c020b6c0 00000000 S irq/476-adsp
root 78 2 0 0 c020b6c0 00000000 S irq/412-mba
root 79 2 0 0 c020b6c0 00000000 S irq/540-wcnss
root 80 2 0 0 c01bfa08 00000000 S qmi
root 81 2 0 0 c01bfa08 00000000 S nmea
root 82 2 0 0 c01bfa08 00000000 S msm_ipc_router
root 83 2 0 0 c01bfa08 00000000 S apr_driver
root 84 2 0 0 c0248b34 00000000 S kswapd0
root 85 2 0 0 c0268c94 00000000 S ksmd
root 86 2 0 0 c02ab534 00000000 S fsnotify_mark
root 87 2 0 0 c0330260 00000000 S ecryptfs-kthrea
root 88 2 0 0 c01bfa08 00000000 S crypto
root 109 2 0 0 c01bfa08 00000000 S ad_calc_wq
root 110 2 0 0 c03f9d94 00000000 D mdss_dsi_event
root 111 2 0 0 c01bfa08 00000000 S k_hsuart
root 112 2 0 0 c01bfa08 00000000 S diag_real_time_
root 113 2 0 0 c01bfa08 00000000 S diag_modem_data
root 114 2 0 0 c01bfa08 00000000 S diag_lpass_data
root 115 2 0 0 c01bfa08 00000000 S diag_wcnss_data
root 116 2 0 0 c01bfa08 00000000 S diag_wq
root 117 2 0 0 c01bfa08 00000000 S diag_usb_wq
root 118 2 0 0 c01bfa08 00000000 S diag_cntl_wq
root 119 2 0 0 c01bfa08 00000000 S diag_dci_wq
root 120 2 0 0 c01bfa08 00000000 S kgsl-3d0
root 121 2 0 0 c01bfa08 00000000 S kgsl_devfreq_wq
root 122 2 0 0 c01bfa08 00000000 S f9966000.spi
root 123 2 0 0 c01bfa08 00000000 S f9965000.spi
root 126 2 0 0 c01bfa08 00000000 S usbnet
root 127 2 0 0 c01bfa08 00000000 S k_rmnet_mux_wor
root 128 2 0 0 c01bfa08 00000000 S f_mtp
root 129 2 0 0 c056e090 00000000 S file-storage
root 130 2 0 0 c01bfa08 00000000 S uether
root 131 2 0 0 c01c0038 00000000 S kworker/1:2
root 133 2 0 0 c01bfa08 00000000 S dsx_exp_workque
root 135 2 0 0 c01bfa08 00000000 S fwu_workqueue
root 137 2 0 0 c01bfa08 00000000 S msm_vidc_worker
root 138 2 0 0 c01bfa08 00000000 S pm_workerq_venu
root 139 2 0 0 c01bfa08 00000000 S msm_vidc_worker
root 140 2 0 0 c01bfa08 00000000 S fwu_workqueue
root 141 2 0 0 c020b6c0 00000000 S irq/344-synapti
root 142 2 0 0 c01bfa08 00000000 S msm_cpp_workque
root 143 2 0 0 c01bfa08 00000000 S dm_bufio_cache
root 144 2 0 0 c01cd87c 00000000 S dbs_sync/0
root 145 2 0 0 c01c51b8 00000000 R dbs_sync/1
root 146 2 0 0 c01c51b8 00000000 R dbs_sync/2
root 147 2 0 0 c01cd87c 00000000 S dbs_sync/3
root 148 2 0 0 c069aba0 00000000 S cfinteractive
root 149 2 0 0 c020b6c0 00000000 S irq/170-msm_sdc
root 150 2 0 0 c020b6c0 00000000 S irq/253-msm_sdc
root 169 2 0 0 c01bfa08 00000000 S binder
root 170 2 0 0 c01bfa08 00000000 S usb_bam_wq
root 171 2 0 0 c01bfa08 00000000 S bam_dmux_rx
root 172 2 0 0 c01bfa08 00000000 S bam_dmux_tx
root 173 2 0 0 c01bfa08 00000000 S rq_stats
root 174 2 0 0 c01bfa08 00000000 S deferwq
root 178 2 0 0 c01bfa08 00000000 S sb-1
root 179 2 0 0 c020b6c0 00000000 S irq/195-ngd_sli
root 180 2 0 0 c04d5af8 00000000 D ngd_rx_thread1
root 181 2 0 0 c04d37ac 00000000 D ngd_notify_sl1
root 182 2 0 0 c0b295bc 00000000 S msm_thermal:hot
root 183 2 0 0 c0b29474 00000000 S msm_thermal:fre
root 184 2 0 0 c0b28d80 00000000 S msm_thermal:the
root 185 2 0 0 c01cd87c 00000000 S boost_sync/0
root 186 2 0 0 c01c51b8 00000000 R boost_sync/1
root 187 2 0 0 c01c51b8 00000000 R boost_sync/2
root 188 2 0 0 c01cd87c 00000000 S boost_sync/3
root 189 2 0 0 c06b38b0 00000000 S mmcqd/0
root 190 2 0 0 c06b38b0 00000000 S mmcqd/0rpmb
root 191 1 2664 628 c02829a0 0002a808 S /sbin/ueventd
root 193 2 0 0 c031764c 00000000 S jbd2/mmcblk0p14
root 194 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 199 2 0 0 c031764c 00000000 S jbd2/mmcblk0p28
root 200 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 204 2 0 0 c031764c 00000000 S jbd2/mmcblk0p16
root 205 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 209 2 0 0 c031764c 00000000 S jbd2/mmcblk0p15
root 210 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 235 2 0 0 c01bfa08 00000000 S IPCRTR
root 237 2 0 0 c01bfa08 00000000 S ipc_rtr_q6_ipcr
logd 238 1 15136 3340 ffffffff b6f57580 S /system/bin/logd
root 239 1 3700 328 c02aede8 00033cd0 S /sbin/healthd
root 240 1 4392 1036 c02aede8 b6eb1bd8 S /system/bin/lmkd
system 241 1 3300 624 c070f570 b6eb7640 S /system/bin/servicemanager
root 242 1 9656 1700 ffffffff b6f22f38 S /system/bin/vold
system 243 1 132708 12564 ffffffff b6ee3bd8 S /system/bin/surfaceflinger
nobody 244 1 16700 904 ffffffff b6f7595c S /system/bin/rmt_storage
system 245 1 5984 880 ffffffff b6ec695c S /system/bin/rfs_access
system 246 1 4936 976 c01aa32c b6f6ea84 S /system/bin/qseecomd
audit 249 1 3100 568 c02829a0 b6ef8dc8 S /system/bin/auditd
root 250 1 27816 2232 ffffffff b6f73f38 S /system/bin/netd
root 251 1 3872 808 c09ad2a8 b6fa348c S /system/bin/debuggerd
radio 252 1 48472 9060 ffffffff b6fa9f38 S /system/bin/rild
drm 253 1 16576 5256 ffffffff b6ea8640 S /system/bin/drmserver
media 254 1 194600 24588 ffffffff b6f1e640 S /system/bin/mediaserver
install 255 1 3256 680 c0a6d95c b6f87f84 S /system/bin/installd
radio 257 1 27044 1376 ffffffff b6ea695c S /system/bin/qmuxd
radio 259 1 14892 1728 ffffffff b6e7319c S /system/bin/netmgrd
root 261 1 61012 1752 ffffffff b6f4c580 S /system/bin/thermal-engine
media 262 1 5132 396 ffffffff b6f22dc8 S /system/bin/adsprpcd
system 263 1 7468 1328 ffffffff b6ec0f84 S /system/bin/wcnss_service
root 264 1 1481340 64244 ffffffff b6f9f95c S zygote
root 265 2 0 0 c02001d8 00000000 S kauditd
media_rw 266 1 7200 1200 ffffffff b6f58f84 S /system/bin/sdcard
sensors 267 1 71332 1888 ffffffff b6ebe95c S /system/bin/sensors.qcom
gps 268 1 3856 936 c01b9ffc b6ee0580 S /system/bin/loc_launcher
camera 269 1 55888 5856 ffffffff b6f7f95c S /system/bin/mm-qcamera-daemon
system 270 1 13416 1268 ffffffff b6f4819c S /system/bin/time_daemon
system 271 1 14332 3164 ffffffff b6eb6640 S /system/bin/audiod
system 273 1 34888 8668 ffffffff b6ed4ed8 S /system/bin/mm-pp-daemon
gps 292 268 44980 8952 ffffffff b6cd219c S /system/vendor/bin/slim_ap_daemon
root 311 2 0 0 c01c5ac8 00000000 S msm_slim_qmi_cl
root 312 2 0 0 c01bfa08 00000000 S msm_qmi_rtx_q
root 322 2 0 0 c01c0038 00000000 S kworker/2:2
root 364 2 0 0 c020b6c0 00000000 S irq/288-wcd9xxx
root 391 2 0 0 c01c0038 00000000 S kworker/1:1H
system 428 246 9124 616 ffffffff b6f6f580 S /system/bin/qseecomd
root 589 2 0 0 c01bfa08 00000000 S IPCRTR
root 590 2 0 0 c01bfa08 00000000 S ipc_rtr_smd_ipc
root 632 1 3188 340 c09ad2a8 b6f2948c S daemonsu:mount:master
root 797 1 8308 484 ffffffff b6f2948c S daemonsu:master
system 826 264 1759212 145812 ffffffff b6f9fbd8 S system_server
keystore 930 1 6292 1728 00000000 b6f65640 R /system/bin/keystore
root 1045 2 0 0 c01bfa08 00000000 S IPCRTR
root 1046 2 0 0 c01bfa08 00000000 S ipc_rtr_wcnss_i
u0_a16 1230 264 1744444 170220 ffffffff b6f9fbd8 S com.android.systemui
root 1363 2 0 0 c087f5f8 00000000 S WD_Thread
root 1366 2 0 0 c087ef10 00000000 S MC_Thread
root 1367 2 0 0 c087ea88 00000000 S TX_Thread
root 1368 2 0 0 c087e5a0 00000000 S RX_Thread
u0_a22 1588 264 1619108 82872 ffffffff b6f9fbd8 S com.google.process.gapps
u0_a22 1657 264 1885300 148724 ffffffff b6f9fbd8 S com.google.android.gms
u0_a22 1688 264 1627276 95104 ffffffff b6f9fbd8 S com.google.process.location
root 1875 2 0 0 c0841440 00000000 S wlan_logging_th
wifi 1877 1 7340 2608 c02829a0 b6e9b95c S /system/bin/wpa_supplicant
u0_a18 1879 264 1520316 63172 ffffffff b6f9fbd8 S org.cyanogenmod.theme.chooser
u0_a28 1902 264 1561260 50792 ffffffff b6f9fbd8 S com.google.android.googlequicksearchbox:interactor
radio 1997 264 1528552 52468 ffffffff b6f9fbd8 S com.android.server.telecom
nfc 2020 264 1536744 55016 ffffffff b6f9fbd8 S com.android.nfc
radio 2044 264 1541764 74808 ffffffff b6f9fbd8 S com.android.phone
u0_a8 2060 264 1525296 45828 ffffffff b6f9fbd8 S com.android.incallui
u0_a0 2081 264 1530844 48728 ffffffff b6f9fbd8 S org.cyanogenmod.audiofx
root 2279 2 0 0 c01c0038 00000000 S kworker/3:1H
u0_a19 2328 264 1597404 103592 ffffffff b6f9fbd8 S com.cyanogenmod.trebuchet
root 2520 2 0 0 c020b6c0 00000000 S irq/33-bw_hwmon
root 2521 1 11092 892 ffffffff b6e7c19c S /system/bin/mpdecision
root 2524 2 0 0 c01c0038 00000000 S kworker/2:1H
root 2733 797 9332 628 c09ad2a8 b6f2948c S daemonsu:10080
u0_a63 2807 264 1498984 42380 ffffffff b6f9fbd8 S com.android.smspush
radio 3728 264 1501116 44012 ffffffff b6f9fbd8 S com.qualcomm.qcrilmsgtunnel
root 4337 797 9332 576 c09ad2a8 b6f2948c S daemonsu:10116
u0_a109 8679 264 1606356 79204 ffffffff b6f9fbd8 S com.viber.voip
u0_a82 8727 264 1555392 69032 ffffffff b6ef6e5e R com.menny.android.anysoftkeyboard
u0_a112 8800 264 1537336 65548 ffffffff b6f9fbd8 S de.web.mobile.android.mail
u0_a113 9608 264 1658008 127164 ffffffff b6f9fbd8 S com.whatsapp
root 10641 2 0 0 c01c0038 00000000 S kworker/3:1
root 10857 797 10356 552 c09ad2a8 b6f2948c S daemonsu:10091
u0_a22 11492 264 1581976 54116 ffffffff b6f9fbd8 S com.google.android.gms.wearable
root 15395 2 0 0 c01c0038 00000000 S kworker/u:3
root 16198 2 0 0 c01c0038 00000000 S kworker/u:2
root 17192 2 0 0 c01c0038 00000000 S kworker/u:1
u0_a75 17448 264 1664604 115456 ffffffff b6f9fbd8 S com.google.android.apps.plus
root 17703 2 0 0 c01c0038 00000000 S kworker/0:0
root 17814 2 0 0 c0296ea4 00000000 S flush-179:0
root 17880 2 0 0 c01c0038 00000000 S kworker/2:0
root 18119 2 0 0 c01c0038 00000000 S kworker/3:0
root 18298 2 0 0 c01c0038 00000000 S kworker/0:2H
u0_a28 18987 264 1575072 75424 ffffffff b6f9fbd8 S com.google.android.googlequicksearchbox:search
root 20502 2 0 0 c01c0038 00000000 S kworker/0:2
root 20512 2 0 0 c01c0038 00000000 S kworker/u:5
root 20516 2 0 0 c01c0038 00000000 S kworker/u:6
u0_a73 20828 264 1603616 68832 ffffffff b6f9fbd8 S com.google.android.music:main
root 21225 2 0 0 c01c0038 00000000 S kworker/1:1
root 22952 2 0 0 c01c0038 00000000 S kworker/3:3
root 23004 2 0 0 c01c0038 00000000 S kworker/2:1
root 23219 2 0 0 c01c0038 00000000 S kworker/u:7
root 23914 2 0 0 c01c0038 00000000 S kworker/u:8
root 23915 2 0 0 c01c0038 00000000 S kworker/u:9
root 23916 2 0 0 c01c0038 00000000 S kworker/u:10
u0_a71 24438 264 1617528 86048 ffffffff b6f9fbd8 S com.google.android.talk
u0_a26 24486 264 1553280 68824 ffffffff b6f9fbd8 S com.android.vending
u0_a45 24568 264 1506056 45420 ffffffff b6f9fbd8 S com.android.gallery3d
u0_a115 24599 264 1514576 45632 ffffffff b6f9fbd8 S org.blackmart.market
u0_a116 24624 264 1508620 47348 ffffffff b6f9fbd8 S com.android.vending.billing.InAppBillingService.LUCK
root 24664 2 0 0 c020b6c0 00000000 S irq/289-
root 24665 2 0 0 c040c424 00000000 D mdss_fb0
u0_a107 24682 264 1512332 48172 ffffffff b6f9fbd8 S com.android.chrome
u0_a80 24703 264 1535404 54780 ffffffff b6f9fbd8 S eu.chainfire.supersu
u0_a102 24741 264 1584844 83992 ffffffff b5b7846c R jackpal.androidterm
root 24772 2 0 0 c01c0038 00000000 S kworker/0:1
u0_a5 24791 264 1499564 44676 ffffffff b6f9fbd8 S com.android.cellbroadcastreceiver
u0_a95 24813 264 1558800 70464 ffffffff b6f9fbd8 S de.motain.iliga
root 24932 797 14452 672 ffffffff b6f2948c S daemonsu:10102
root 24935 24932 12404 920 c01aa32c b6f29a84 S daemonsu:10102:24929
root 24939 24935 3188 756 c041a75c b6f05f84 S tmp-mksh
u0_a96 25119 264 1539840 65068 ffffffff b6f9fbd8 S com.ghisler.android.TotalCommander
u0_a51 25150 264 1500656 45708 ffffffff b6f9fbd8 S com.cyanogenmod.lockclock
root 25176 2 0 0 c01c0038 00000000 S kworker/u:4
system 25177 264 1507908 55164 ffffffff b6f9fbd8 S system:ui
u0_a32 25217 264 1539012 65312 ffffffff b6f9fbd8 S com.cyanogenmod.filemanager
u0_a32 25237 25217 3188 700 c0279a54 b6ecef84 S /system/bin/sh
u0_a32 25246 25217 3188 700 c0279a54 b6e90f84 S /system/bin/sh
u0_a46 25344 264 1623280 95640 ffffffff b6f9fbd8 S com.android.htmlviewer
u0_a102 25449 24741 3188 744 c01b9ffc b6f67580 S /system/bin/sh
u0_a102 25483 25449 3188 356 c02829a0 b6eb495c S su
root 25486 24932 14452 1008 c02829a0 b6f2995c S daemonsu:10102:25483
root 25490 25486 3188 744 c01b9ffc b6e8b580 S tmp-mksh
root 25575 25490 4476 724 00000000 b6f31f84 R ps
uragan1987 said:
Hi
I cant find the daemon for some services, can somebody explain me how to disable services with android
i have root and terminal for android
At APPS i have disabled NFC service, but after print "ps" at terminal this nfc service daemon Still working.
Here is ps of my phone
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 2668 880 c02829a0 0002a808 S /init
root 2 0 0 0 c01c59a4 00000000 S kthreadd
root 3 2 0 0 c01cd87c 00000000 S ksoftirqd/0
root 6 2 0 0 c018b6e4 00000000 S kworker/u:0
root 7 2 0 0 c0188aac 00000000 S kworker/u:0H
root 8 2 0 0 c01cd87c 00000000 S migration/0
root 9 2 0 0 c01c51b8 00000000 R migration/1
root 10 2 0 0 c01c51b8 00000000 R ksoftirqd/1
root 11 2 0 0 c01c0038 00000000 S kworker/1:0
root 12 2 0 0 c01c0038 00000000 S kworker/1:0H
root 13 2 0 0 c01c51b8 00000000 R migration/2
root 14 2 0 0 c01c51b8 00000000 R ksoftirqd/2
root 16 2 0 0 c01c0038 00000000 S kworker/2:0H
root 17 2 0 0 c01cd87c 00000000 S migration/3
root 18 2 0 0 c01cd87c 00000000 S ksoftirqd/3
root 20 2 0 0 c01c0038 00000000 S kworker/3:0H
root 21 2 0 0 c01bfa08 00000000 S khelper
root 22 2 0 0 c01bfa08 00000000 S netns
root 27 2 0 0 c01c0038 00000000 S kworker/0:1H
root 28 2 0 0 c01bfa08 00000000 S modem_notifier
root 29 2 0 0 c01bfa08 00000000 S smd_channel_clo
root 30 2 0 0 c01bfa08 00000000 S smsm_cb_wq
root 32 2 0 0 c01bfa08 00000000 S rpm-smd
root 33 2 0 0 c01c0038 00000000 S kworker/u:1H
root 34 2 0 0 c01bfa08 00000000 S mpm
root 35 2 0 0 c02510f0 00000000 S sync_supers
root 36 2 0 0 c025172c 00000000 S bdi-default
root 37 2 0 0 c01bfa08 00000000 S kblockd
root 38 2 0 0 c0443218 00000000 S system
root 39 2 0 0 c04fd304 00000000 S khubd
root 40 2 0 0 c020b6c0 00000000 S irq/99-msm_iomm
root 41 2 0 0 c020b6c0 00000000 S irq/105-msm_iom
root 42 2 0 0 c020b6c0 00000000 S irq/77-msm_iomm
root 43 2 0 0 c020b6c0 00000000 S irq/70-msm_iomm
root 44 2 0 0 c020b6c0 00000000 S irq/94-msm_iomm
root 45 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 46 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 47 2 0 0 c020b6c0 00000000 S irq/102-msm_iom
root 48 2 0 0 c020b6c0 00000000 S irq/79-msm_iomm
root 49 2 0 0 c020b6c0 00000000 S irq/78-msm_iomm
root 50 2 0 0 c020b6c0 00000000 S irq/78-msm_iomm
root 51 2 0 0 c020b6c0 00000000 S irq/74-msm_iomm
root 52 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 53 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 54 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 55 2 0 0 c020b6c0 00000000 S irq/75-msm_iomm
root 56 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 57 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 58 2 0 0 c020b6c0 00000000 S irq/273-msm_iom
root 59 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 60 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 61 2 0 0 c020b6c0 00000000 S irq/97-msm_iomm
root 62 2 0 0 c01bfa08 00000000 S devfreq_wq
root 63 2 0 0 c01bfa08 00000000 S l2cap
root 64 2 0 0 c01bfa08 00000000 S a2mp
root 65 2 0 0 c01bfa08 00000000 S cfg80211
root 77 2 0 0 c020b6c0 00000000 S irq/476-adsp
root 78 2 0 0 c020b6c0 00000000 S irq/412-mba
root 79 2 0 0 c020b6c0 00000000 S irq/540-wcnss
root 80 2 0 0 c01bfa08 00000000 S qmi
root 81 2 0 0 c01bfa08 00000000 S nmea
root 82 2 0 0 c01bfa08 00000000 S msm_ipc_router
root 83 2 0 0 c01bfa08 00000000 S apr_driver
root 84 2 0 0 c0248b34 00000000 S kswapd0
root 85 2 0 0 c0268c94 00000000 S ksmd
root 86 2 0 0 c02ab534 00000000 S fsnotify_mark
root 87 2 0 0 c0330260 00000000 S ecryptfs-kthrea
root 88 2 0 0 c01bfa08 00000000 S crypto
root 109 2 0 0 c01bfa08 00000000 S ad_calc_wq
root 110 2 0 0 c03f9d94 00000000 D mdss_dsi_event
root 111 2 0 0 c01bfa08 00000000 S k_hsuart
root 112 2 0 0 c01bfa08 00000000 S diag_real_time_
root 113 2 0 0 c01bfa08 00000000 S diag_modem_data
root 114 2 0 0 c01bfa08 00000000 S diag_lpass_data
root 115 2 0 0 c01bfa08 00000000 S diag_wcnss_data
root 116 2 0 0 c01bfa08 00000000 S diag_wq
root 117 2 0 0 c01bfa08 00000000 S diag_usb_wq
root 118 2 0 0 c01bfa08 00000000 S diag_cntl_wq
root 119 2 0 0 c01bfa08 00000000 S diag_dci_wq
root 120 2 0 0 c01bfa08 00000000 S kgsl-3d0
root 121 2 0 0 c01bfa08 00000000 S kgsl_devfreq_wq
root 122 2 0 0 c01bfa08 00000000 S f9966000.spi
root 123 2 0 0 c01bfa08 00000000 S f9965000.spi
root 126 2 0 0 c01bfa08 00000000 S usbnet
root 127 2 0 0 c01bfa08 00000000 S k_rmnet_mux_wor
root 128 2 0 0 c01bfa08 00000000 S f_mtp
root 129 2 0 0 c056e090 00000000 S file-storage
root 130 2 0 0 c01bfa08 00000000 S uether
root 131 2 0 0 c01c0038 00000000 S kworker/1:2
root 133 2 0 0 c01bfa08 00000000 S dsx_exp_workque
root 135 2 0 0 c01bfa08 00000000 S fwu_workqueue
root 137 2 0 0 c01bfa08 00000000 S msm_vidc_worker
root 138 2 0 0 c01bfa08 00000000 S pm_workerq_venu
root 139 2 0 0 c01bfa08 00000000 S msm_vidc_worker
root 140 2 0 0 c01bfa08 00000000 S fwu_workqueue
root 141 2 0 0 c020b6c0 00000000 S irq/344-synapti
root 142 2 0 0 c01bfa08 00000000 S msm_cpp_workque
root 143 2 0 0 c01bfa08 00000000 S dm_bufio_cache
root 144 2 0 0 c01cd87c 00000000 S dbs_sync/0
root 145 2 0 0 c01c51b8 00000000 R dbs_sync/1
root 146 2 0 0 c01c51b8 00000000 R dbs_sync/2
root 147 2 0 0 c01cd87c 00000000 S dbs_sync/3
root 148 2 0 0 c069aba0 00000000 S cfinteractive
root 149 2 0 0 c020b6c0 00000000 S irq/170-msm_sdc
root 150 2 0 0 c020b6c0 00000000 S irq/253-msm_sdc
root 169 2 0 0 c01bfa08 00000000 S binder
root 170 2 0 0 c01bfa08 00000000 S usb_bam_wq
root 171 2 0 0 c01bfa08 00000000 S bam_dmux_rx
root 172 2 0 0 c01bfa08 00000000 S bam_dmux_tx
root 173 2 0 0 c01bfa08 00000000 S rq_stats
root 174 2 0 0 c01bfa08 00000000 S deferwq
root 178 2 0 0 c01bfa08 00000000 S sb-1
root 179 2 0 0 c020b6c0 00000000 S irq/195-ngd_sli
root 180 2 0 0 c04d5af8 00000000 D ngd_rx_thread1
root 181 2 0 0 c04d37ac 00000000 D ngd_notify_sl1
root 182 2 0 0 c0b295bc 00000000 S msm_thermal:hot
root 183 2 0 0 c0b29474 00000000 S msm_thermal:fre
root 184 2 0 0 c0b28d80 00000000 S msm_thermal:the
root 185 2 0 0 c01cd87c 00000000 S boost_sync/0
root 186 2 0 0 c01c51b8 00000000 R boost_sync/1
root 187 2 0 0 c01c51b8 00000000 R boost_sync/2
root 188 2 0 0 c01cd87c 00000000 S boost_sync/3
root 189 2 0 0 c06b38b0 00000000 S mmcqd/0
root 190 2 0 0 c06b38b0 00000000 S mmcqd/0rpmb
root 191 1 2664 628 c02829a0 0002a808 S /sbin/ueventd
root 193 2 0 0 c031764c 00000000 S jbd2/mmcblk0p14
root 194 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 199 2 0 0 c031764c 00000000 S jbd2/mmcblk0p28
root 200 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 204 2 0 0 c031764c 00000000 S jbd2/mmcblk0p16
root 205 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 209 2 0 0 c031764c 00000000 S jbd2/mmcblk0p15
root 210 2 0 0 c01bfa08 00000000 S ext4-dio-unwrit
root 235 2 0 0 c01bfa08 00000000 S IPCRTR
root 237 2 0 0 c01bfa08 00000000 S ipc_rtr_q6_ipcr
logd 238 1 15136 3340 ffffffff b6f57580 S /system/bin/logd
root 239 1 3700 328 c02aede8 00033cd0 S /sbin/healthd
root 240 1 4392 1036 c02aede8 b6eb1bd8 S /system/bin/lmkd
system 241 1 3300 624 c070f570 b6eb7640 S /system/bin/servicemanager
root 242 1 9656 1700 ffffffff b6f22f38 S /system/bin/vold
system 243 1 132708 12564 ffffffff b6ee3bd8 S /system/bin/surfaceflinger
nobody 244 1 16700 904 ffffffff b6f7595c S /system/bin/rmt_storage
system 245 1 5984 880 ffffffff b6ec695c S /system/bin/rfs_access
system 246 1 4936 976 c01aa32c b6f6ea84 S /system/bin/qseecomd
audit 249 1 3100 568 c02829a0 b6ef8dc8 S /system/bin/auditd
root 250 1 27816 2232 ffffffff b6f73f38 S /system/bin/netd
root 251 1 3872 808 c09ad2a8 b6fa348c S /system/bin/debuggerd
radio 252 1 48472 9060 ffffffff b6fa9f38 S /system/bin/rild
drm 253 1 16576 5256 ffffffff b6ea8640 S /system/bin/drmserver
media 254 1 194600 24588 ffffffff b6f1e640 S /system/bin/mediaserver
install 255 1 3256 680 c0a6d95c b6f87f84 S /system/bin/installd
radio 257 1 27044 1376 ffffffff b6ea695c S /system/bin/qmuxd
radio 259 1 14892 1728 ffffffff b6e7319c S /system/bin/netmgrd
root 261 1 61012 1752 ffffffff b6f4c580 S /system/bin/thermal-engine
media 262 1 5132 396 ffffffff b6f22dc8 S /system/bin/adsprpcd
system 263 1 7468 1328 ffffffff b6ec0f84 S /system/bin/wcnss_service
root 264 1 1481340 64244 ffffffff b6f9f95c S zygote
root 265 2 0 0 c02001d8 00000000 S kauditd
media_rw 266 1 7200 1200 ffffffff b6f58f84 S /system/bin/sdcard
sensors 267 1 71332 1888 ffffffff b6ebe95c S /system/bin/sensors.qcom
gps 268 1 3856 936 c01b9ffc b6ee0580 S /system/bin/loc_launcher
camera 269 1 55888 5856 ffffffff b6f7f95c S /system/bin/mm-qcamera-daemon
system 270 1 13416 1268 ffffffff b6f4819c S /system/bin/time_daemon
system 271 1 14332 3164 ffffffff b6eb6640 S /system/bin/audiod
system 273 1 34888 8668 ffffffff b6ed4ed8 S /system/bin/mm-pp-daemon
gps 292 268 44980 8952 ffffffff b6cd219c S /system/vendor/bin/slim_ap_daemon
root 311 2 0 0 c01c5ac8 00000000 S msm_slim_qmi_cl
root 312 2 0 0 c01bfa08 00000000 S msm_qmi_rtx_q
root 322 2 0 0 c01c0038 00000000 S kworker/2:2
root 364 2 0 0 c020b6c0 00000000 S irq/288-wcd9xxx
root 391 2 0 0 c01c0038 00000000 S kworker/1:1H
system 428 246 9124 616 ffffffff b6f6f580 S /system/bin/qseecomd
root 589 2 0 0 c01bfa08 00000000 S IPCRTR
root 590 2 0 0 c01bfa08 00000000 S ipc_rtr_smd_ipc
root 632 1 3188 340 c09ad2a8 b6f2948c S daemonsu:mount:master
root 797 1 8308 484 ffffffff b6f2948c S daemonsu:master
system 826 264 1759212 145812 ffffffff b6f9fbd8 S system_server
keystore 930 1 6292 1728 00000000 b6f65640 R /system/bin/keystore
root 1045 2 0 0 c01bfa08 00000000 S IPCRTR
root 1046 2 0 0 c01bfa08 00000000 S ipc_rtr_wcnss_i
u0_a16 1230 264 1744444 170220 ffffffff b6f9fbd8 S com.android.systemui
root 1363 2 0 0 c087f5f8 00000000 S WD_Thread
root 1366 2 0 0 c087ef10 00000000 S MC_Thread
root 1367 2 0 0 c087ea88 00000000 S TX_Thread
root 1368 2 0 0 c087e5a0 00000000 S RX_Thread
u0_a22 1588 264 1619108 82872 ffffffff b6f9fbd8 S com.google.process.gapps
u0_a22 1657 264 1885300 148724 ffffffff b6f9fbd8 S com.google.android.gms
u0_a22 1688 264 1627276 95104 ffffffff b6f9fbd8 S com.google.process.location
root 1875 2 0 0 c0841440 00000000 S wlan_logging_th
wifi 1877 1 7340 2608 c02829a0 b6e9b95c S /system/bin/wpa_supplicant
u0_a18 1879 264 1520316 63172 ffffffff b6f9fbd8 S org.cyanogenmod.theme.chooser
u0_a28 1902 264 1561260 50792 ffffffff b6f9fbd8 S com.google.android.googlequicksearchbox:interactor
radio 1997 264 1528552 52468 ffffffff b6f9fbd8 S com.android.server.telecom
nfc 2020 264 1536744 55016 ffffffff b6f9fbd8 S com.android.nfc
radio 2044 264 1541764 74808 ffffffff b6f9fbd8 S com.android.phone
u0_a8 2060 264 1525296 45828 ffffffff b6f9fbd8 S com.android.incallui
u0_a0 2081 264 1530844 48728 ffffffff b6f9fbd8 S org.cyanogenmod.audiofx
root 2279 2 0 0 c01c0038 00000000 S kworker/3:1H
u0_a19 2328 264 1597404 103592 ffffffff b6f9fbd8 S com.cyanogenmod.trebuchet
root 2520 2 0 0 c020b6c0 00000000 S irq/33-bw_hwmon
root 2521 1 11092 892 ffffffff b6e7c19c S /system/bin/mpdecision
root 2524 2 0 0 c01c0038 00000000 S kworker/2:1H
root 2733 797 9332 628 c09ad2a8 b6f2948c S daemonsu:10080
u0_a63 2807 264 1498984 42380 ffffffff b6f9fbd8 S com.android.smspush
radio 3728 264 1501116 44012 ffffffff b6f9fbd8 S com.qualcomm.qcrilmsgtunnel
root 4337 797 9332 576 c09ad2a8 b6f2948c S daemonsu:10116
u0_a109 8679 264 1606356 79204 ffffffff b6f9fbd8 S com.viber.voip
u0_a82 8727 264 1555392 69032 ffffffff b6ef6e5e R com.menny.android.anysoftkeyboard
u0_a112 8800 264 1537336 65548 ffffffff b6f9fbd8 S de.web.mobile.android.mail
u0_a113 9608 264 1658008 127164 ffffffff b6f9fbd8 S com.whatsapp
root 10641 2 0 0 c01c0038 00000000 S kworker/3:1
root 10857 797 10356 552 c09ad2a8 b6f2948c S daemonsu:10091
u0_a22 11492 264 1581976 54116 ffffffff b6f9fbd8 S com.google.android.gms.wearable
root 15395 2 0 0 c01c0038 00000000 S kworker/u:3
root 16198 2 0 0 c01c0038 00000000 S kworker/u:2
root 17192 2 0 0 c01c0038 00000000 S kworker/u:1
u0_a75 17448 264 1664604 115456 ffffffff b6f9fbd8 S com.google.android.apps.plus
root 17703 2 0 0 c01c0038 00000000 S kworker/0:0
root 17814 2 0 0 c0296ea4 00000000 S flush-179:0
root 17880 2 0 0 c01c0038 00000000 S kworker/2:0
root 18119 2 0 0 c01c0038 00000000 S kworker/3:0
root 18298 2 0 0 c01c0038 00000000 S kworker/0:2H
u0_a28 18987 264 1575072 75424 ffffffff b6f9fbd8 S com.google.android.googlequicksearchbox:search
root 20502 2 0 0 c01c0038 00000000 S kworker/0:2
root 20512 2 0 0 c01c0038 00000000 S kworker/u:5
root 20516 2 0 0 c01c0038 00000000 S kworker/u:6
u0_a73 20828 264 1603616 68832 ffffffff b6f9fbd8 S com.google.android.music:main
root 21225 2 0 0 c01c0038 00000000 S kworker/1:1
root 22952 2 0 0 c01c0038 00000000 S kworker/3:3
root 23004 2 0 0 c01c0038 00000000 S kworker/2:1
root 23219 2 0 0 c01c0038 00000000 S kworker/u:7
root 23914 2 0 0 c01c0038 00000000 S kworker/u:8
root 23915 2 0 0 c01c0038 00000000 S kworker/u:9
root 23916 2 0 0 c01c0038 00000000 S kworker/u:10
u0_a71 24438 264 1617528 86048 ffffffff b6f9fbd8 S com.google.android.talk
u0_a26 24486 264 1553280 68824 ffffffff b6f9fbd8 S com.android.vending
u0_a45 24568 264 1506056 45420 ffffffff b6f9fbd8 S com.android.gallery3d
u0_a115 24599 264 1514576 45632 ffffffff b6f9fbd8 S org.blackmart.market
u0_a116 24624 264 1508620 47348 ffffffff b6f9fbd8 S com.android.vending.billing.InAppBillingService.LUCK
root 24664 2 0 0 c020b6c0 00000000 S irq/289-
root 24665 2 0 0 c040c424 00000000 D mdss_fb0
u0_a107 24682 264 1512332 48172 ffffffff b6f9fbd8 S com.android.chrome
u0_a80 24703 264 1535404 54780 ffffffff b6f9fbd8 S eu.chainfire.supersu
u0_a102 24741 264 1584844 83992 ffffffff b5b7846c R jackpal.androidterm
root 24772 2 0 0 c01c0038 00000000 S kworker/0:1
u0_a5 24791 264 1499564 44676 ffffffff b6f9fbd8 S com.android.cellbroadcastreceiver
u0_a95 24813 264 1558800 70464 ffffffff b6f9fbd8 S de.motain.iliga
root 24932 797 14452 672 ffffffff b6f2948c S daemonsu:10102
root 24935 24932 12404 920 c01aa32c b6f29a84 S daemonsu:10102:24929
root 24939 24935 3188 756 c041a75c b6f05f84 S tmp-mksh
u0_a96 25119 264 1539840 65068 ffffffff b6f9fbd8 S com.ghisler.android.TotalCommander
u0_a51 25150 264 1500656 45708 ffffffff b6f9fbd8 S com.cyanogenmod.lockclock
root 25176 2 0 0 c01c0038 00000000 S kworker/u:4
system 25177 264 1507908 55164 ffffffff b6f9fbd8 S system:ui
u0_a32 25217 264 1539012 65312 ffffffff b6f9fbd8 S com.cyanogenmod.filemanager
u0_a32 25237 25217 3188 700 c0279a54 b6ecef84 S /system/bin/sh
u0_a32 25246 25217 3188 700 c0279a54 b6e90f84 S /system/bin/sh
u0_a46 25344 264 1623280 95640 ffffffff b6f9fbd8 S com.android.htmlviewer
u0_a102 25449 24741 3188 744 c01b9ffc b6f67580 S /system/bin/sh
u0_a102 25483 25449 3188 356 c02829a0 b6eb495c S su
root 25486 24932 14452 1008 c02829a0 b6f2995c S daemonsu:10102:25483
root 25490 25486 3188 744 c01b9ffc b6e8b580 S tmp-mksh
root 25575 25490 4476 724 00000000 b6f31f84 R ps
Click to expand...
Click to collapse
An app called "Disable Service" may help you, I used it to disable some of Google play services and helped my battery alot

[Completed] Problem with TR976 tablet - loop boot

Hello everyone,
I have a typical problem - my device does not load, because it loops with android logo. It does that because i edited vold.fstab incorrectly, but have the correct lines copy in comments within the file. Problem is i don't have any idea how to enter recovery mode ( if one exist at all ) on the device! I tried most of popular combinations and nothing worked - the device always start to load normally, and loops. Most solutions to this situation is via abd, but abd does not see the device ( i guess because it's not started/not in recovery mode ).
Is there a way to access root or force the recovery ?
All i can say about the device is that there is mt97002_V4 on the digitalizer and TR976V12 on the board. I could use any help with making this work again.
Edit:
Device is running Android 4.2
ABD see the device as 0123456789ABCDEF
I managed to get the device to recovery mode by holding VOL+ and plugging in power supply.
Device does not have shell command.
I managed to get list of some files on it :
adb.exe ls /
000041ed 00000000 569d35a2 .
000041ed 00000000 569d35a2 ..
000041ed 00000000 569d35a2 cache
000041ed 00000000 569d35a2 mnt
000081a4 00000888 00000000 ueventd.rk30board.rc
000081a4 00000fa7 00000000 ueventd.rc
000081a4 00000110 00000000 ueventd.goldfish.rc
000041fd 00000000 569d35a6 tmp
000041ed 00000000 00000000 system
000041ed 00000000 569d35a2 sys
000041e8 00000000 00000000 sbin
000081a4 00021b50 00000000 rk30xxnand_ko.ko.3.0.8+
000081a4 000242df 00000000 rk30xxnand_ko.ko.3.0.36+
000041ed 00000000 00000000 res
000081a4 000040e2 00000000 readahead_list.txt
0000416d 00000000 00000000 proc
000081e8 00000655 00000000 init.rc
000081e8 0001ab34 00000000 init
000041ed 00000000 00000000 etc
000081a4 00000b12 00000000 default.prop
000041ed 00000000 569d35c5 data
000081e8 0003a930 00000000 charger
000081a4 00000c17 00000000 at18.ko
000041c0 00000000 503c74fb root
000041ed 000009c4 569d35a6 dev
adb.exe ls /system
000041ed 00000000 00000000 .
000041ed 00000000 569d35a2 ..
adb.exe ls /etc
000041ed 00000000 00000000 .
000041ed 00000000 569d35a2 ..
000081a4 00000199 00000000 recovery.fstab
adb.exe ls /sys
000041ed 00000000 569d35a2 .
000041ed 00000000 569d35a2 ..
000041ed 00000000 569d3614 fs
000041ed 00000000 569d35a2 devices
000041ed 00000000 569d3614 dev
000041ed 00000000 569d3614 bus
000041ed 00000000 569d35a2 class
000041ed 00000000 569d3614 firmware
000041ed 00000000 569d3614 kernel
000041ed 00000000 569d3614 power
000041ed 00000000 569d3614 module
000041ed 00000000 569d35a2 block
000041ed 00000000 569d3614 android_gsensor
000041ed 00000000 569d3614 sd-sdio
Any help in finding vold.fstab to edit it back to the original is more than welcome !
Barton69 said:
Hello everyone,
I have a typical problem - my device does not load, because it loops with android logo. It does that because i edited vold.fstab incorrectly, but have the correct lines copy in comments within the file. Problem is i don't have any idea how to enter recovery mode ( if one exist at all ) on the device! I tried most of popular combinations and nothing worked - the device always start to load normally, and loops. Most solutions to this situation is via abd, but abd does not see the device ( i guess because it's not started/not in recovery mode ).
Is there a way to access root or force the recovery ?
All i can say about the device is that there is mt97002_V4 on the digitalizer and TR976V12 on the board. I could use any help with making this work again.
Edit:
Device is running Android 4.2
ABD see the device as 0123456789ABCDEF
I managed to get the device to recovery mode by holding VOL+ and plugging in power supply.
Device does not have shell command.
I managed to get list of some files on it :
adb.exe ls /
000041ed 00000000 569d35a2 .
000041ed 00000000 569d35a2 ..
000041ed 00000000 569d35a2 cache
000041ed 00000000 569d35a2 mnt
000081a4 00000888 00000000 ueventd.rk30board.rc
000081a4 00000fa7 00000000 ueventd.rc
000081a4 00000110 00000000 ueventd.goldfish.rc
000041fd 00000000 569d35a6 tmp
000041ed 00000000 00000000 system
000041ed 00000000 569d35a2 sys
000041e8 00000000 00000000 sbin
000081a4 00021b50 00000000 rk30xxnand_ko.ko.3.0.8+
000081a4 000242df 00000000 rk30xxnand_ko.ko.3.0.36+
000041ed 00000000 00000000 res
000081a4 000040e2 00000000 readahead_list.txt
0000416d 00000000 00000000 proc
000081e8 00000655 00000000 init.rc
000081e8 0001ab34 00000000 init
000041ed 00000000 00000000 etc
000081a4 00000b12 00000000 default.prop
000041ed 00000000 569d35c5 data
000081e8 0003a930 00000000 charger
000081a4 00000c17 00000000 at18.ko
000041c0 00000000 503c74fb root
000041ed 000009c4 569d35a6 dev
adb.exe ls /system
000041ed 00000000 00000000 .
000041ed 00000000 569d35a2 ..
adb.exe ls /etc
000041ed 00000000 00000000 .
000041ed 00000000 569d35a2 ..
000081a4 00000199 00000000 recovery.fstab
adb.exe ls /sys
000041ed 00000000 569d35a2 .
000041ed 00000000 569d35a2 ..
000041ed 00000000 569d3614 fs
000041ed 00000000 569d35a2 devices
000041ed 00000000 569d3614 dev
000041ed 00000000 569d3614 bus
000041ed 00000000 569d35a2 class
000041ed 00000000 569d3614 firmware
000041ed 00000000 569d3614 kernel
000041ed 00000000 569d3614 power
000041ed 00000000 569d3614 module
000041ed 00000000 569d35a2 block
000041ed 00000000 569d3614 android_gsensor
000041ed 00000000 569d3614 sd-sdio
Any help in finding vold.fstab to edit it back to the original is more than welcome !
Click to expand...
Click to collapse
Hi
Thanks for using XDA Assist.
There's no dedicated forum for your device here in XDA. Try posting your query in Android Q&A,Help and Troubleshooting or in the friendly Q&A thread here->[Ask Any Question][Newbie Friendly]. Experts there may be able to help you.
Good luck

[Completed] ZTE ZMAX Z970 stuck on loading screen and Recovery mode

I've tried everything, I wanted to revert from BrokenOS back to the stock ROM, I created a backup but I factory resetted because I thought it would revert back to stock ROM.
The only thing I have access to is the splash loading screen, and recovery mode, resetting wont do anything and whenever I try to flash a rom, it fails, I can't access my SD Card anymore.
I also tried installing a stock rom from the recovery mode, but had so success.
Please help me, I've been trying to fix my phone since yesterday, probably about 7 hours in total.
Code:
adb shell
- exec '/system/bin/sh' failed: No such file or directory (2) -
When I do adb ls /, I get this:
Code:
adb ls /
000041ed 00000000 0000abd4 .
000041ed 00000000 0000abd4 ..
000041f9 00001000 02ad81b3 persist
0000a1ff 00000015 0000abd4 sdcard
000041ed 0000003c 0000abd4 storage
000041ed 000000c8 0000abd4 mnt
00004140 00000000 0000abd4 config
000041f8 00001000 0000a47e cache
000041ed 00000000 0000abd4 acct
0000a1ff 0000000e 0000abd4 vendor
0000a1ff 00000011 0000abd4 d
0000a1ff 0000000b 0000abd4 etc
0000a1ff 00000010 0000abd3 tombstones
000041ed 00000000 0000abd3 fsg
000041ed 00000000 0000abd3 pds
00004168 00004000 00000000 firmware
000081a4 000011ef 00000000 ueventd.rc
000081a4 000023c5 00000000 ueventd.qcom.rc
000041ed 00000000 00000000 system
0000416d 00000000 0000abd2 sys
000081a4 00003949 00000000 service_contexts
000081a4 0003d1bb 00000000 sepolicy
000081a4 00000048 00000000 selinux_version
000081a4 00000886 00000000 seapp_contexts
000041e8 00000000 00000000 sbin
000041ed 00000000 00000000 res
000081a4 0000170f 00000000 property_contexts
0000416d 00000000 00000000 proc
000041ed 00000000 00000000 oem
000081e8 00000156 00000000 init.zygote32.rc
000081e8 000014db 00000000 init.usb.rc
000081e8 00002443 00000000 init.usb.configfs.rc
000081e8 0000082b 00000000 init.trace.rc
000081e8 00000ae4 00000000 init.target.rc
000081e8 0000012d 00000000 init.superuser.rc
000081e8 000000b2 00000000 init.recovery.qcom.rc
000081e8 00006b90 00000000 init.rc
000081e8 00002196 00000000 init.qcom.usb.sh
000081e8 00000b92 00000000 init.qcom.syspart_fixup.sh
000081e8 000011d1 00000000 init.qcom.ssr.sh
000081e8 000017d3 00000000 init.qcom.sh
000081e8 00000a88 00000000 init.qcom.ril.sh
000081e8 0000aeb6 00000000 init.qcom.rc
000081e8 0000309f 00000000 init.qcom.factory.sh
000081e8 000019ff 00000000 init.qcom.early_boot.sh
000081e8 00001b98 00000000 init.qcom.class_core.sh
000081e8 000026c0 00000000 init.qcom.bt.sh
000081e8 000006a6 00000000 init.mdm.sh
000081e8 00000383 00000000 init.environ.rc
000081e8 00002d93 00000000 init.draconis.usb.rc
000081e8 0000082b 00000000 init.draconis.sh
000081e8 00001fe8 00000000 init.broken.rc
000081e8 0009b340 00000000 init
000081a0 00000883 00000000 fstab.qcom
000081a4 0000c1a9 00000000 file_contexts
000081a4 0000022e 00000000 default.prop
000041f9 00001000 00009b00 data
0000a1ff 0000000d 00000000 charger
000041c0 00000000 5711aee7 root
000041ed 00003b38 0000abdf dev
ic3w0lf said:
I've tried everything, I wanted to revert from BrokenOS back to the stock ROM, I created a backup but I factory resetted because I thought it would revert back to stock ROM.
The only thing I have access to is the splash loading screen, and recovery mode, resetting wont do anything and whenever I try to flash a rom, it fails, I can't access my SD Card anymore.
I also tried installing a stock rom from the recovery mode, but had so success.
Please help me, I've been trying to fix my phone since yesterday, probably about 7 hours in total.
Code:
adb shell
- exec '/system/bin/sh' failed: No such file or directory (2) -
When I do adb ls /, I get this:
Code:
adb ls /
000041ed 00000000 0000abd4 .
000041ed 00000000 0000abd4 ..
000041f9 00001000 02ad81b3 persist
0000a1ff 00000015 0000abd4 sdcard
000041ed 0000003c 0000abd4 storage
000041ed 000000c8 0000abd4 mnt
00004140 00000000 0000abd4 config
000041f8 00001000 0000a47e cache
000041ed 00000000 0000abd4 acct
0000a1ff 0000000e 0000abd4 vendor
0000a1ff 00000011 0000abd4 d
0000a1ff 0000000b 0000abd4 etc
0000a1ff 00000010 0000abd3 tombstones
000041ed 00000000 0000abd3 fsg
000041ed 00000000 0000abd3 pds
00004168 00004000 00000000 firmware
000081a4 000011ef 00000000 ueventd.rc
000081a4 000023c5 00000000 ueventd.qcom.rc
000041ed 00000000 00000000 system
0000416d 00000000 0000abd2 sys
000081a4 00003949 00000000 service_contexts
000081a4 0003d1bb 00000000 sepolicy
000081a4 00000048 00000000 selinux_version
000081a4 00000886 00000000 seapp_contexts
000041e8 00000000 00000000 sbin
000041ed 00000000 00000000 res
000081a4 0000170f 00000000 property_contexts
0000416d 00000000 00000000 proc
000041ed 00000000 00000000 oem
000081e8 00000156 00000000 init.zygote32.rc
000081e8 000014db 00000000 init.usb.rc
000081e8 00002443 00000000 init.usb.configfs.rc
000081e8 0000082b 00000000 init.trace.rc
000081e8 00000ae4 00000000 init.target.rc
000081e8 0000012d 00000000 init.superuser.rc
000081e8 000000b2 00000000 init.recovery.qcom.rc
000081e8 00006b90 00000000 init.rc
000081e8 00002196 00000000 init.qcom.usb.sh
000081e8 00000b92 00000000 init.qcom.syspart_fixup.sh
000081e8 000011d1 00000000 init.qcom.ssr.sh
000081e8 000017d3 00000000 init.qcom.sh
000081e8 00000a88 00000000 init.qcom.ril.sh
000081e8 0000aeb6 00000000 init.qcom.rc
000081e8 0000309f 00000000 init.qcom.factory.sh
000081e8 000019ff 00000000 init.qcom.early_boot.sh
000081e8 00001b98 00000000 init.qcom.class_core.sh
000081e8 000026c0 00000000 init.qcom.bt.sh
000081e8 000006a6 00000000 init.mdm.sh
000081e8 00000383 00000000 init.environ.rc
000081e8 00002d93 00000000 init.draconis.usb.rc
000081e8 0000082b 00000000 init.draconis.sh
000081e8 00001fe8 00000000 init.broken.rc
000081e8 0009b340 00000000 init
000081a0 00000883 00000000 fstab.qcom
000081a4 0000c1a9 00000000 file_contexts
000081a4 0000022e 00000000 default.prop
000041f9 00001000 00009b00 data
0000a1ff 0000000d 00000000 charger
000041c0 00000000 5711aee7 root
000041ed 00003b38 0000abdf dev
Click to expand...
Click to collapse
Hello,
Try posting your query here Android Q&A Forum with all relevant details, the experts there maybe able to assist you.
-Vatsal

[Q] NAND flash error, cant mount EMMC but my phone work nice

Hi guys I've had some problems with my lollipop 5.1 android, mtk 6582.
something happen, now when I try do a test in spflash tools, it says ERROR: NAND Flash was not detected, y cant mount emmc in my twrp... I can flash all and my phone load the lollipop, but says "the internal storage has error" then ask me if i want format the internal partition....
the Titanium backup can recognize the storage and says that the internal storage have 2.07GB (wtf?) and ROM system have 914MB (nice)... But my phone have 8 GB...
Can someone help me, What should i do?
Thank you very much
Code:
cat /proc/emmc
partno: start_sect nr_sects partition_name
emmc_p1: 00000400 00000002 "ebr1"
emmc_p2: 00004800 00005000 "protect_f"
emmc_p3: 00009800 00005000 "protect_s"
emmc_p4: 0001ec00 00003000 "sec_ro"
emmc_p5: 00028c00 001c2000 "android"
emmc_p6: 001eac00 0003f000 "cache"
emmc_p7: 00229c00 00400000 "usrdata"
emmc_p8: 00629c00 0085a000 "fat"
~ # cat /proc/partitions
major minor #blocks name
179 0 7609856 mmcblk0
179 1 1 mmcblk0p1
179 2 10240 mmcblk0p2
179 3 10240 mmcblk0p3
179 4 6144 mmcblk0p4
179 5 921600 mmcblk0p5
179 6 129024 mmcblk0p6
179 7 2097152 mmcblk0p7
179 8 4378624 mmcblk0p8
179 96 512 mmcblk0rpmb
179 64 4096 mmcblk0boot1
179 32 4096 mmcblk0boot0
179 128 15114240 mmcblk1
179 129 15113216 mmcblk1p1

Categories

Resources