Hello all. Long time lurker, occasional poster - hope you can help me out here.
So, I came from a stock rooted Pixel running the June security update, and recently moved everything over to a combo of Stock ROM + ElementalX kernel + Magisk v12 with some help from a handy guide here on the forums.
To my chagrin, I noticed that StickMount Pro no longer functioned with MagiskSU. Not that big of a deal - I learned to live without.
*However*
Now I seem to be unable to delete the sdcard directory tree starting at /sdcard/usbStorage/, regardless of what all I've thrown at it.
In the terminal, each folder/subfolder looks like this: (ls -al)
Code:
. . .
drwxrwx--x 2 root sdcard_rw 4096 2017-06-15 21:14 sda4
. . .
There's notably just sda4 - sda36, skipping a few between, then sdb1, sdc1, sdd2 - sdd 13.
There's these folders under /sdcard/usbStorage/ : (ls -al)
Code:
.
. .
drwxrwx--x 2 root sdcard_rw 4096 2017-06-15 21:13 00BC-614E
drwxrwx--x 2 root sdcard_rw 4096 2017-06-15 21:14 57f8f4bc-abf4-655f-bf67-946fc0f9f25b
drwxrwx--x 2 root sdcard_rw 4096 2017-06-15 21:14 _
. . .
One of those looks like a device's UUID.
I've tried:
- Removing with SolidExplorer, and as root.
- su rm -rf /sdcard/usbStorage (received permission denied errors)
- su; busybox rm -rf /sdcard/usbStorage (just for completeness)
- Reinstalling StickMount and trying the various unmount options, as well as unticking the "create /sdcard/ directories" option
Since these failed me, I began trying to change the folder/group permissions across adb:
- chown -R 777 /sdcard/usbStorage , then rm -rf (still permission denied)
- addgroup $(whoami) sdcard_rw (unknown user "root")
- addgroup root sdcard_rw (unknown user "root")
The `mount` command lists nothing related. Only the following:
Code:
rootfs on / type rootfs (rw,seclabel)
/dev/root on / type ext4 (ro,seclabel,relatime,data=ordered)
tmpfs on /dev type tmpfs (rw,seclabel,nosuid,relatime,size=1896652k,nr_inodes=474163,mode=755)
devpts on /dev/pts type devpts (rw,seclabel,relatime,mode=600)
proc on /proc type proc (rw,relatime,gid=3009,hidepid=2)
sysfs on /sys type sysfs (rw,seclabel,relatime)
selinuxfs on /sys/fs/selinux type selinuxfs (rw,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,seclabel,relatime)
none on /acct type cgroup (rw,relatime,cpuacct)
none on /dev/stune type cgroup (rw,relatime,schedtune)
tmpfs on /mnt type tmpfs (rw,seclabel,relatime,size=1896652k,nr_inodes=474163,mode=755,gid=1000)
none on /config type configfs (rw,relatime)
none on /dev/cpuctl type cgroup (rw,relatime,cpu)
none on /dev/cpuset type cgroup (rw,relatime,cpuset,noprefix,release_agent=/sbin/cpuset_release_agent)
pstore on /sys/fs/pstore type pstore (rw,seclabel,relatime)
/dev/block/dm-1 on /vendor type ext4 (ro,seclabel,relatime,discard,data=ordered)
/dev/block/sda25 on /firmware/radio type vfat (ro,context=u:object_r:firmware_file:s0,relatime,uid=1000,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
/dev/block/sdd3 on /persist type ext4 (rw,seclabel,nosuid,nodev,relatime,data=ordered)
tmpfs on /storage type tmpfs (rw,seclabel,relatime,size=1896652k,nr_inodes=474163,mode=755,gid=1000)
adb on /dev/usb-ffs/adb type functionfs (rw,relatime)
/dev/block/sda35 on /data type ext4 (rw,seclabel,nosuid,nodev,noatime,noauto_da_alloc,data=ordered)
/dev/block/loop0 on /magisk type ext4 (rw,seclabel,noatime,data=ordered)
/dev/block/loop0 on /system/etc/hosts type ext4 (rw,seclabel,noatime,data=ordered)
tmpfs on /system/xbin type tmpfs (rw,seclabel,nosuid,relatime,size=1896652k,nr_inodes=474163,mode=755)
tmpfs on /sbin type tmpfs (rw,seclabel,nosuid,relatime,size=1896652k,nr_inodes=474163,mode=755)
/dev/fuse on /mnt/runtime/default/emulated type fuse (rw,nosuid,nodev,noexec,noatime,user_id=1023,group_id=1023,default_permissions,allow_other)
/dev/fuse on /storage/emulated type fuse (rw,nosuid,nodev,noexec,noatime,user_id=1023,group_id=1023,default_permissions,allow_other)
/dev/fuse on /mnt/runtime/read/emulated type fuse (rw,nosuid,nodev,noexec,noatime,user_id=1023,group_id=1023,default_permissions,allow_other)
/dev/fuse on /mnt/runtime/write/emulated type fuse (rw,nosuid,nodev,noexec,noatime,user_id=1023,group_id=1023,default_permissions,allow_other)
Also, any attempt to mount/umount things throws the error:
Code:
mount: bad /etc/fstab: No such file or directory
etc...
I'm just hesitant to re-install SuperSU for fear of how it will clash with TWRP and Magisk *and* break SafetyNet just to try to remove this dir.
Could these somehow be related to the /dev/fuse filesystems?
Any help at all would be appreciated.
If I can't effectively chown / chmod them, I don't quite know how to proceed.
Related
Hey everyone, I'm new to the forum, and am in need of great help
A few days ago, I bought a new tablet, the Prestigio PMP5080C Pro. It's actually a very good tablet for the price you're paying. I've only had 2 problems:
1)They don't have any settings to enable proxy (Can't connect to internet at campus).
2)Many of the 3D games show only white textures (Apparently Chainfire 3D fixes this issue).
Now to fix both of them, I need root access. And that's the biggest problem I've been having.
The device uses Android ICS (4.0.3). At first I had many problems trying to get the device recognised as anything other than a USB Mass Storage Device, but eventually got it working. After that, I tried using SuperOneClick 2.3.3, it got past step 2, but then froze on step 7. No matter what I tried, it froze there everytime. After that, I tried using UnlockRoot, and it just showed the steps (completed in like 15 seconds) and didn't give me any completed messages. After that failed, I tried using RootThat, and got this log:
Code:
adbd cannot run as root in production builds
List of devices attached
ASBSM805HCZ01234 device
adbd cannot run as root in production builds
remount failed: Operation not permitted
failed to copy 'C:\RootThat\su' to '/system/xbin/su': Read-only file system
Unable to chmod /system/xbin/su: No such file or directory
failed to copy 'C:\RootThat\Superuser.apk' to '/system/app/Superuser.apk': Read-only file system
Unable to chmod /system/app/Superuser.apk: No such file or directory
::Success!!::
After that failed, I read up about using Wendal's RK29xxImageTools_v2.1 to unpack and repack the firmware with superuser access. It managed to unpack the firmware file (Can see the system.img, etc) but when it tries to add the root, it gives the following error towards the end:
Code:
cramfsck: superblock magic not found
Enable root permission
The system cannot find the path specified.
The system cannot find the path specified.
chmod: cannot access `system/*': No such file or directory
chmod: cannot access `system/bin/su': No such file or directory
chmod: cannot access `system/app/Superuser.apk': No such file or directory
Unpack -- All Done
Pls input: 1-Unpack 2-Pack 3-Exit
Okay, so my first question. How do I know what filesystem /system is using? I typed in "mount" in adb shell, and I get the following:
Code:
C:\Users\Xenonification>adb shell
[email protected]:/ $ mount
mount
rootfs / rootfs ro,relatime 0 0
tmpfs /dev tmpfs rw,nosuid,relatime,mode=755 0 0
devpts /dev/pts devpts rw,relatime,mode=600 0 0
proc /proc proc rw,relatime 0 0
sysfs /sys sysfs rw,relatime 0 0
none /acct cgroup rw,relatime,cpuacct 0 0
tmpfs /mnt/asec tmpfs rw,relatime,mode=755,gid=1000 0 0
tmpfs /mnt/obb tmpfs rw,relatime,mode=755,gid=1000 0 0
none /dev/cpuctl cgroup rw,relatime,cpu 0 0
/dev/block/mtdblock8 /system ext3 ro,noatime,nodiratime,barrier=0,data=ordered 0
0
/dev/block/mtdblock6 /data ext3 rw,nosuid,nodev,noatime,nodiratime,errors=contin
ue,barrier=0,data=ordered 0 0
/dev/block/mtdblock5 /cache ext3 rw,nosuid,nodev,noatime,nodiratime,errors=conti
nue,barrier=0,data=ordered 0 0
/sys/kernel/debug /sys/kernel/debug debugfs rw,relatime 0 0
/dev/block/vold/31:9 /mnt/sdcard vfat rw,dirsync,nosuid,nodev,noexec,relatime,ui
d=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,ioch****t=
iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0
/dev/block/vold/31:9 /mnt/secure/asec vfat rw,dirsync,nosuid,nodev,noexec,relati
me,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocha
rset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0
tmpfs /mnt/sdcard/.android_secure tmpfs ro,relatime,size=0k,mode=000 0 0
/dev/block/dm-0 /mnt/asec/com.polarbit.rthunderlite-1 vfat ro,dirsync,nosuid,nod
ev,relatime,uid=1000,fmask=0222,dmask=0222,codepage=cp437,ioch****t=iso8859-1,sh
ortname=mixed,utf8,errors=remount-ro 0 0
/dev/block/dm-1 /mnt/asec/org.vudroid-1 vfat ro,dirsync,nosuid,nodev,relatime,ui
d=1000,fmask=0222,dmask=0222,codepage=cp437,ioch****t=iso8859-1,shortname=mixed,
utf8,errors=remount-ro 0 0
[email protected]:/ $ mount
C:\Users\Xenonification>
"/dev/block/mtdblock8 /system ext3 ro,noatime,nodiratime,barrier=0,data=ordered 0 0" Does that mean it's using the ext3? Because elsewhere I've heard that it uses cramfs, so i'm not sure
And secondly, does anyone know any other methods to root this device? I was thinking about mounting the system.img, adding the files needed for root, and then repacking the firmware. But I have no idea how to do this.
Thanks guys!
Rooted roms there: http://forum.xda-developers.com/showthread.php?t=1796067
yes it's using ext3 mount output is "device mountpoint filesystem options", you can mount it in any standard (or user-friendly if you want) linux distribution by "mount image mountpoint -o loop" as root
Btw I've tried chainfire and device didn't boot, it's very probable I did something wrong but do chainfire support opengl1.1-only devices?
I have looked everywhere for help with this... I see others have rooted their Zte x500's and wonder why mine is so difficult.. I follow the directions no matter which way I go and this is the end result everytime..
/dev/block/mtdblock2 /system
mount: permission denied (are you root?)
END:10255export PS1=""
export TEMPRANDOM=85753;export PS1=END:$TEMPRANDOM;/data/local/tmp/busybox mount
rootfs on / type rootfs (ro,relatime)
tmpfs on /dev type tmpfs (rw,relatime,mode=755)
devpts on /dev/pts type devpts (rw,relatime,mode=600)
proc on /proc type proc (rw,relatime)
sysfs on /sys type sysfs (rw,relatime)
none on /acct type cgroup (rw,relatime,cpuacct)
tmpfs on /mnt/asec type tmpfs (rw,relatime,mode=755,gid=1000)
tmpfs on /mnt/obb type tmpfs (rw,relatime,mode=755,gid=1000)
none on /dev/cpuctl type cgroup (rw,relatime,cpu)
/dev/block/mtdblock2 on /system type yaffs2 (ro,relatime)
/dev/block/mtdblock6 on /data type yaffs2 (rw,nosuid,nodev,relatime)
/dev/block/mtdblock7 on /persist type yaffs2 (rw,nosuid,nodev,relatime)
/dev/block/mtdblock3 on /cache type yaffs2 (rw,nosuid,nodev,relatime)
END:85753export PS1=""
export TEMPRANDOM=15190;export PS1=END:$TEMPRANDOM;mount -o rw,remount /dev/block/mtdblock2 /system
mount: Operation not permitted
END:15190export PS1=""
Please help me!!! I am a noobie at this so I don't know much but I know something isn't right .. right???
Does anyone know which file system the Mate 9 uses?
F2FS?
EXT?
Some new Chinese thing?
Sorry for answering my own question here. I had searched this on Google but decided to actually look at the Huawei page. If you piece through it and go through all the little slides, you'll find the one that says "The F2FS file system improves the I/O storage performance."
It's hidden. But it's there.
Output after mount:
System ext4
Data f2fs
Code:
rootfs on / type rootfs (ro,seclabel,size=1787504k,nr_inodes=446876)
tmpfs on /dev type tmpfs (rw,seclabel,nosuid,relatime,size=1874928k,nr_inodes=468732,mode=755)
devpts on /dev/pts type devpts (rw,seclabel,relatime,mode=600)
proc on /proc type proc (rw,relatime,gid=3009,hidepid=2)
sysfs on /sys type sysfs (rw,seclabel,relatime)
selinuxfs on /sys/fs/selinux type selinuxfs (rw,relatime)
none on /acct type cgroup (rw,relatime,cpuacct)
tmpfs on /mnt type tmpfs (rw,seclabel,relatime,size=1874928k,nr_inodes=468732,mode=755,gid=1000)
none on /config type configfs (rw,relatime)
none on /dev/cpuctl type cgroup (rw,relatime,cpu)
none on /dev/cpuset type cgroup (rw,relatime,cpuset,blkio,cpuset_noprefix)
pstore on /sys/fs/pstore type pstore (rw,seclabel,relatime)
/dev/block/bootdevice/by-name/secure_storage on /sec_storage type ext4 (rw,context=u:object_r:teecd_data_file:s0,nosuid,nodev,noatime,discard,noauto_da_alloc,data=ordered)
none on /dev/frz type cgroup (rw,relatime,freezer)
none on /sys/fs/cgroup type tmpfs (rw,seclabel,relatime,size=1874928k,nr_inodes=468732,mode=750,gid=1000)
none on /sys/fs/cgroup/pids type cgroup (rw,relatime,pids)
adb on /dev/usb-ffs/adb type functionfs (rw,relatime)
hdb on /dev/usb-ffs/hdb type functionfs (rw,relatime)
/dev/block/dm-0 on /system type ext4 (ro,seclabel,relatime,data=ordered)
/dev/block/bootdevice/by-name/splash2 on /splash2 type ext4 (rw,context=u:object_r:splash2_data_file:s0,nosuid,nodev,noatime,data=ordered)
/dev/block/dm-1 on /vendor type ext4 (ro,seclabel,relatime,data=ordered)
/dev/block/dm-2 on /product type ext4 (ro,seclabel,relatime,data=ordered)
/dev/block/dm-3 on /version type ext4 (ro,seclabel,relatime,data=ordered)
/dev/block/dm-4 on /cust type ext4 (ro,seclabel,relatime,data=ordered)
/dev/block/bootdevice/by-name/userdata on /data type f2fs (rw,seclabel,nosuid,nodev,noatime,background_gc=on,discard,user_xattr,inline_xattr,acl,inline_data,extent_cache,inline_encrypt,active_logs=6)
/dev/block/bootdevice/by-name/cache on /cache type ext4 (rw,seclabel,nosuid,nodev,noatime,data=ordered)
/dev/block/bootdevice/by-name/hisee_fs on /hisee_fs type ext4 (ro,context=u:object_r:hisee_data_file:s0,relatime,data=ordered)
/dev/block/bootdevice/by-name/modem_secure on /modem_secure type ext4 (rw,context=u:object_r:modem_secure_file:s0,relatime,noauto_da_alloc,data=ordered)
/dev/block/bootdevice/by-name/modem_fw on /modem_fw type ext4 (ro,context=u:object_r:modem_fw_file:s0,relatime,data=ordered)
/dev/block/bootdevice/by-name/modemnvm_img on /mnvm2:0 type ext4 (rw,context=u:object_r:modem_nv_file:s0,nosuid,nodev,noatime,noauto_da_alloc,data=ordered)
/dev/block/bootdevice/by-name/modem_om on /modem_log type ext4 (rw,context=u:object_r:modem_log_file:s0,nosuid,nodev,noatime,noauto_da_alloc,data=ordered)
tmpfs on /storage type tmpfs (rw,seclabel,relatime,size=1874928k,nr_inodes=468732,mode=755,gid=1000)
/sys/kernel/debug on /sys/kernel/debug type debugfs (rw,seclabel,relatime,gid=1000,mode=775)
tracefs on /sys/kernel/debug/tracing type tracefs (rw,relatime)
/data/media on /mnt/runtime/default/emulated type sdcardfs (rw,nosuid,nodev,relatime,uid=1023,gid=1023,derive=legacy,reserved=20MB)
/data/media on /storage/emulated type sdcardfs (rw,nosuid,nodev,relatime,uid=1023,gid=1023,derive=legacy,reserved=20MB)
/data/media on /mnt/runtime/read/emulated type sdcardfs (rw,nosuid,nodev,relatime,uid=1023,gid=1023,derive=legacy,reserved=20MB)
/data/media on /mnt/runtime/write/emulated type sdcardfs (rw,nosuid,nodev,relatime,uid=1023,gid=1023,derive=legacy,reserved=20MB)
PaulQ602 said:
Sorry for answering my own question here. I had searched this on Google but decided to actually look at the Huawei page. If you piece through it and go through all the little slides, you'll find the one that says "The F2FS file system improves the I/O storage performance."
It's hidden. But it's there.
Click to expand...
Click to collapse
I think they were one of the first using the F2FS on the Mate 8
I have a Xiaomi 4c and TWRP without rooting. The 4c only has internal memory. The twrp when it opens always asks me to put the memory as read only and I think the last time I opened it was applied. The problem is that now It dont load the twrp and several applications can not save files in memory (I get error that does not have permission) it does not let me install the TWRP again, also using adb (error that I do not have permission). Trying to install it otherwise gives error. I tried to change write permissions but either I do not do it right or I continue without permission. Also it do not let me do hard reset or install another recovery. suggestions?
(This is the result of mount)
libra:/ $ mount
rootfs on / type rootfs (ro,seclabel)
tmpfs on /dev type tmpfs (rw,seclabel,nosuid,relatime,size=908932k,nr_inodes=227233,mode=755)
devpts on /dev/pts type devpts (rw,seclabel,relatime,mode=600)
none on /dev/memcg type cgroup (rw,relatime,memory)
none on /dev/cpuctl type cgroup (rw,relatime,cpu)
none on /dev/cpuset type cgroup (rw,relatime,cpuset,noprefix,release_agent=/sbin/cpuset_release_agent)
adb on /dev/usb-ffs/adb type functionfs (rw,relatime)
proc on /proc type proc (rw,relatime,gid=3009,hidepid=2)
sysfs on /sys type sysfs (rw,seclabel,relatime)
selinuxfs on /sys/fs/selinux type selinuxfs (rw,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,seclabel,relatime)
pstore on /sys/fs/pstore type pstore (rw,seclabel,relatime)
none on /sys/fs/cgroup type tmpfs (rw,seclabel,relatime,size=908932k,nr_inodes=227233,mode=750,gid=1000)
none on /sys/fs/cgroup/memory type cgroup (rw,relatime,memory)
none on /sys/fs/cgroup/freezer type cgroup (rw,relatime,freezer)
none on /var type tmpfs (rw,seclabel,relatime,size=908932k,nr_inodes=227233,mode=770,gid=1000)
none on /acct type cgroup (rw,relatime,cpuacct)
tmpfs on /mnt type tmpfs (rw,seclabel,relatime,size=908932k,nr_inodes=227233,mode=755,gid=1000)
/dev/fuse on /mnt/runtime/default/emulated type fuse
(rw,nosuid,nodev,noexec,noatime,user_id=1023,group_id=1023,default_permissions,allow_other)
/dev/fuse on /mnt/runtime/read/emulated type fuse
(rw,nosuid,nodev,noexec,noatime,user_id=1023,group_id=1023,default_permissions,allow_other)
/dev/fuse on /mnt/runtime/write/emulated type fuse
(rw,nosuid,nodev,noexec,noatime,user_id=1023,group_id=1023,default_permissions,allow_other)
none on /config type configfs (rw,relatime)
/dev/block/bootdevice/by-name/system on /system type ext4 (ro,seclabel,noatime,data=ordered)
/dev/block/bootdevice/by-name/userdata on /data type ext4
(rw,seclabel,nosuid,nodev,relatime,discard,noauto_da_alloc,data=ordered)
/dev/block/bootdevice/by-name/cust on /cust type ext4 (rw,seclabel,nosuid,nodev,relatime,data=ordered)
/dev/block/bootdevice/by-name/cache on /cache type ext4 (rw,seclabel,nosuid,nodev,relatime,data=ordered)
/dev/block/bootdevice/by-name/persist on /persist type ext4 (rw,seclabel,nosuid,nodev,relatime,data=ordered)
/dev/block/bootdevice/by-name/modem on /firmware type vfat
(ro,context=ubject_r:firmware_file:s0,relatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=437,iocharset=i
so8859-1,shortname=lower,errors=remount-ro)
/dev/block/bootdevice/by-name/bluetooth on /bt_firmware type vfat
(ro,context=ubject_r:bt_firmware_file:s0,relatime,uid=1002,gid=3002,fmask=0337,dmask=0227,codepage=437,iocharse
t=iso8859-1,shortname=lower,errors=remount-ro)
tmpfs on /storage type tmpfs (rw,seclabel,relatime,size=908932k,nr_inodes=227233,mode=755,gid=1000)
/dev/fuse on /storage/emulated type fuse
(rw,nosuid,nodev,noexec,noatime,user_id=1023,group_id=1023,default_permissions,allow_other)
tmpfs on /storage/self type tmpfs (rw,seclabel,relatime,size=908932k,nr_inodes=227233,mode=755,gid=1000)
libra:/ $
Hi guys,
I've searched and found quite a few adb and terminal emulator commands to view my phone's partitions, but being completely new to all of this (this project is my second time even really using command prompt) it took me a LOT of trial and error on my own before I posted this and I apologize for the n00biness in advance.
My phone setup is an HTC 10 Perfume running 7.0 Nougat (I flashed my phone with some image which allowed it to be rooted), and using the fdisk command on the phone's terminal emulator yielded this:
rootfs on / type rootfs (ro,seclabel,size=1752604k,nr_inodes=438151)
tmpfs on /dev type tmpfs (rw,seclabel,nosuid,relatime,mode=755)
devpts on /dev/pts type devpts (rw,seclabel,relatime,mode=600)
none on /dev/cpuctl type cgroup (rw,relatime,cpu)
none on /dev/cpuset type cgroup (rw,relatime,cpuset,noprefix,release_agent=/sbin/cpuset_release_agent)
adb on /dev/usb-ffs/adb type functionfs (rw,relatime)
proc on /proc type proc (rw,relatime,gid=3009,hidepid=2)
sysfs on /sys type sysfs (rw,seclabel,relatime)
selinuxfs on /sys/fs/selinux type selinuxfs (rw,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,seclabel,relatime)
pstore on /sys/fs/pstore type pstore (rw,seclabel,relatime)
none on /acct type cgroup (rw,relatime,cpuacct)
tmpfs on /mnt type tmpfs (rw,seclabel,relatime,mode=755,gid=1000)
/data/media on /mnt/runtime/default/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,multiuser,mask=6,gid=1015)
/data/media on /mnt/runtime/read/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,multiuser,mask=23,gid=9997)
/data/media on /mnt/runtime/write/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,multiuser,mask=7,gid=9997)
/dev/block/vold/public:179,65 on /mnt/media_rw/4C55-DB29 type texfat (rw,dirsync,nosuid,nodev,noexec,relatime,uid=1023,gid=1023,umask=0007,allow_utime=0020,codepage=437,iocharset=utf8,min_prealloc_size=64k,max_prealloc_size=65532800,writeback_boundary=4M,readahead=4M,fail_safe,discard,hidden=show,errors=continue)
/dev/block/vold/public:179,65 on /mnt/secure/asec type texfat (rw,dirsync,nosuid,nodev,noexec,relatime,uid=1023,gid=1023,umask=0007,allow_utime=0020,codepage=437,iocharset=utf8,min_prealloc_size=64k,max_prealloc_size=65532800,writeback_boundary=4M,readahead=4M,fail_safe,discard,hidden=show,errors=continue)
/mnt/media_rw/4C55-DB29 on /mnt/runtime/default/4C55-DB29 type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,mask=6,gid=1015)
/mnt/media_rw/4C55-DB29 on /mnt/runtime/read/4C55-DB29 type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,mask=18,gid=9997)
/mnt/media_rw/4C55-DB29 on /mnt/runtime/write/4C55-DB29 type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,mask=18,gid=9997)
none on /config type configfs (rw,relatime)
/dev/block/bootdevice/by-name/slpi on /firmware/slpi type vfat (ro,relatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
/dev/block/bootdevice/by-name/system on /system type ext4 (ro,seclabel,noatime,discard,data=ordered)
/dev/block/bootdevice/by-name/devlog on /devlog type ext4 (rw,seclabel,nosuid,nodev,relatime,errors=continue,data=ordered)
/dev/block/bootdevice/by-name/fataldevlog on /fataldevlog type ext4 (rw,seclabel,nosuid,nodev,relatime,errors=continue,data=ordered)
/dev/block/bootdevice/by-name/carrier on /carrier type ext4 (rw,seclabel,nosuid,nodev,noatime,grpid,data=ordered)
/dev/block/bootdevice/by-name/cota on /cota type ext4 (rw,seclabel,nosuid,nodev,noatime,grpid,data=ordered)
/dev/block/bootdevice/by-name/apppreload on /preload type ext4 (rw,seclabel,nosuid,nodev,noatime,grpid,data=ordered)
/dev/block/bootdevice/by-name/cache on /cache type ext4 (rw,seclabel,nosuid,nodev,relatime,errors=continue,data=ordered)/dev/block/bootdevice/by-name/persist on /persist type ext4 (rw,seclabel,nosuid,nodev,relatime,errors=panic,data=ordered)
/dev/block/bootdevice/by-name/dsp on /dsp type ext4 (rw,seclabel,nosuid,nodev,relatime,errors=panic,data=ordered)
/dev/block/bootdevice/by-name/venus on /firmware/venus type vfat (ro,relatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
/dev/block/bootdevice/by-name/rfg_3 on /firmware/wsd type vfat (ro,relatime,uid=3012,gid=3012,fmask=0377,dmask=0277,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
/dev/block/bootdevice/by-name/radio on /firmware/radio type vfat (ro,relatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
/dev/block/bootdevice/by-name/adsp on /firmware/adsp type vfat (ro,relatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro)
/dev/block/dm-0 on /data type ext4 (rw,seclabel,nosuid,nodev,relatime,discard,noauto_da_alloc,errors=panic,data=ordered)/dev/block/loop0 on /su type ext4 (rw,seclabel,noatime,data=ordered)
tmpfs on /storage type tmpfs (rw,seclabel,relatime,mode=755,gid=1000)
/data/media on /storage/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,multiuser,mask=7,gid=9997)
/mnt/media_rw/4C55-DB29 on /storage/4C55-DB29 type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,mask=18,gid=9997)
tmpfs on /storage/self type tmpfs (rw,seclabel,relatime,mode=755,gid=1000)
Click to expand...
Click to collapse
...Could someone please tell me which one is my userdata partition, or if that's even included in this list? BTW my endgame is to image the partition and open it in some forensics software so I can attempt to recover some deleted data (I believe I actually already copied over the android's entire file system, but none of my forensics software can open that dd file. That's a whole other interesting topic, but I'm not sure if it's too relevant to this forum as much as the forensics ones lol.. maybe I'll make another thread inquiring whether the command I used to do so is valid or not for my goal).