[SOLVED] Note 3 SM-N900V DE "reboot nvbackup" Samsung's bomb - Verizon Galaxy Note 3 Q&A, Help & Troubleshooting
So far this fix has worked on several Note 3 models: SM-N900V, sprint SM-N900P SM-N900R4, N9005, N900T, and Claro Puerto Rico SM-N900W8
I lost my IMEI after sending command "reboot nvbackup" Phone rebooted into bootloops, was stuck for over 6 weeks. I was able to get everything working again after restoring "FSG", and "backup" mounts from a good SM-N900V DE phone. FSG is not an EFS copy in our Note 3's. Samsung left in a command that will brick these phones. Samsung is negligent by leaving this kill command in Note 3's.
The command "reboot nvbackup" will brick Note 3's, (and S5's). Mine is a verizon model SM-N900V Developer Device. I studied block partitions, and searched for weeks. I started looking at "FSG" and "backup" partitions since "reboot nvbackup" writes partitions modemst1 and modemst2 to Backup and FSG. In other phones this makes a backup copy. "reboot nvrestore" would restore bad modemst's mounts. In Note 3's FSG partition is a system partition. Reboot nvbackup overwrote FSG. My blocks were obviously corrupted.
A friend of mine with a DE and sent me his "FSG" and "backup" partitions, so I could compare backup-mmblk0p17 and FSG-mmblk0p18. FSG is not a "golden copy of efs in Note3', and "Backup" partition should be completely empty.
My FSG was corrupted with efs backup "IMGEFS1". The "backup" partition was filled with IMGEFS2. "reboot nvbackup" caused the toxic condition.
I simply copied and pasted both clean mounts into my /dev/block/ replacing the corrupt ones. I didn't even have to reboot, the MEID, PRL, and MIN all instantly showed up in the status screen after pasting FSG. The note 3 is Back 100%.
This is a specific problem to note 3's caused by performing "reboot nvbackup" on newer Samsung phones that use FSG in the operating system. this partition is very interesting. For those of us that entered this command, or ran efs backup software that called up this command, and then there phone immediately rebooted into endless boot loops. This procedure might work to get your IMEI / MEID back too. I am guessing that the Verizon note 3 FSG is identical in all US Qualcomm note3's. I hope someone will help me confirm this by checking their MD5 on their FSG mount. The command "reboot nvrestore" will probably corrupt modemst1 and modemst2 too. I'm not gonna try it
Clean copy of FSG (mmcblk0p18) MD5 221daabe2e089699626e4b22606ad621 (folks with working note 3's please verify this check sum and post your model and MD5, You should have a backup anyway, the latest EFS Professional is now compatible with our snapdragon note 3's.
Backup mmcblk0p18 and the MD5 can be copied (Ctrl + C) directly from EFS Professional.
These "TOXIC" commands should not be in our note 3's, or S5's, shame on you Samsung!
EFS Professional has been updated so These important partitions can be backed up very easily, link below
Important partition that could save us note 3 owners:
aboot -> /dev/block/mmcblk0p6
efs -> /dev/block/mmcblk0p11
modemst1 -> /dev/block/mmcblk0p12
modemst2 -> /dev/block/mmcblk0p13
fsg -> /dev/block/mmcblk0p18
Prior to my fix, I was able to get my phone to run for several minutes at a time after flashing AOKP T-mobile ROM. (They now have a unified build). This ROM let me get logcats, access to play store through wifi, and in the end was able to drop the clean FSG into /dev/block with root explorer. Without even rebooting I looked at the status screen to my amazement and read my MEID, PRL, ESN were all there!
Another tip, by entering safe mode (hold power down until note3 screen shows up, then hold volume down until fully booted). The Safemode watermark will be on bottom left corner of screen. Airplane mode and wireless off helped too.
Six weeks of hell and way over 300 hours learning about Android's FS, and severe hacking on my phone finally paid off.
Thanks to all that helped me, and this forum!
I will add more info later, so others hopefully will be able to recover from this. Time to play with my note 3
Please use a hex editor to confirm FSG and backup are corrupt (HxD Hex Editor is good). See attached thumbnails at the bottom of this post comparing good partitions on top and corrupt on bottom. FSG should have "IMGEFSG" in hex, not IMGEFS1x. Backup should be completely empty, all 00000, if block17 has any hex data it's been "Samsunged".
If you want help from me please do the following steps:
Using your recovery program's File Manager, copy mmcklb0p18 and 17 to your External sd, save them, change names to mmcklb0p18bak and **17bak. Then it will be easy to view the mounts in hex editor on your computer, and have backups just in case. Once you confirm they're corrupt please post your note 3 model, describe what triggered bootloops, and paste the first 4 lines of FSG hex code. This fix will only help those that had their note-3 FSG corrupted by "reboot nvbackup", or possibly while using an EFS backup program that calls the command (EFS by Boris or early versions of EFS pro).
confirm FSG is corrupt with hex editor,
post your note 3 model, what triggered your problem, and the first 4 lines of hex from your **bak's to this thread. (first line using wordpad will work too)
Then PM me for faster response.
copy & paste the clean FSG to your /dev/block (You can use several methods to do this: TWRP or CWM's File Manger, or adb).
Sip Iced Tea and enjoy your note 3
Tips on how to backup and replace FSG
(Note: I have also looked at my S5 developer edition (ET-G900V) it looks like it is susceptible to being be bricked too. I also have a clean copy of S5 FSG)
Attached is my /dev system details:
adb shell
ls -lR /dev
Code:
/dev/block/platform/msm_sdcc.1/by-name:
lrwxrwxrwx 1 root root 20 Jan 2 18:08 aboot -> /dev/block/mmcblk0p6 <-------aboot
lrwxrwxrwx 1 root root 20 Jan 2 18:08 apnhlos -> /dev/block/mmcblk0p1
lrwxrwxrwx 1 root root 21 Jan 2 18:08 backup -> /dev/block/mmcblk0p17 <-----backup
lrwxrwxrwx 1 root root 21 Jan 2 18:08 boot -> /dev/block/mmcblk0p14
lrwxrwxrwx 1 root root 21 Jan 2 18:08 cache -> /dev/block/mmcblk0p24
lrwxrwxrwx 1 root root 20 Jan 2 18:08 dbi -> /dev/block/mmcblk0p4
lrwxrwxrwx 1 root root 20 Jan 2 18:08 ddr -> /dev/block/mmcblk0p5
lrwxrwxrwx 1 root root 21 Jan 2 18:08 efs -> /dev/block/mmcblk0p11 <------EFS
lrwxrwxrwx 1 root root 21 Jan 2 18:08 fota -> /dev/block/mmcblk0p16
lrwxrwxrwx 1 root root 21 Jan 2 18:08 fsc -> /dev/block/mmcblk0p19
lrwxrwxrwx 1 root root 21 Jan 2 18:08 fsg -> /dev/block/mmcblk0p18 <-----FSG
lrwxrwxrwx 1 root root 20 Jan 2 18:08 modem -> /dev/block/mmcblk0p2
lrwxrwxrwx 1 root root 21 Jan 2 18:08 modemst1 -> /dev/block/mmcblk0p12
lrwxrwxrwx 1 root root 21 Jan 2 18:08 modemst2 -> /dev/block/mmcblk0p13
lrwxrwxrwx 1 root root 20 Jan 2 18:08 pad -> /dev/block/mmcblk0p9
lrwxrwxrwx 1 root root 21 Jan 2 18:08 param -> /dev/block/mmcblk0p10
lrwxrwxrwx 1 root root 21 Jan 2 18:08 persdata -> /dev/block/mmcblk0p22
lrwxrwxrwx 1 root root 21 Jan 2 18:08 persist -> /dev/block/mmcblk0p21
lrwxrwxrwx 1 root root 21 Jan 2 18:08 recovery -> /dev/block/mmcblk0p15
lrwxrwxrwx 1 root root 20 Jan 2 18:08 rpm -> /dev/block/mmcblk0p7
lrwxrwxrwx 1 root root 20 Jan 2 18:08 sbl1 -> /dev/block/mmcblk0p3
lrwxrwxrwx 1 root root 21 Jan 2 18:08 ssd -> /dev/block/mmcblk0p20
lrwxrwxrwx 1 root root 21 Jan 2 18:08 system -> /dev/block/mmcblk0p23
lrwxrwxrwx 1 root root 20 Jan 2 18:08 tz -> /dev/block/mmcblk0p8
lrwxrwxrwx 1 root root 21 Jan 2 18:08 userdata -> /dev/block/mmcblk0p25
#
Old stuff from my original post:
I am starting a thread here so I can document the bootloop problem with my Note 3 SM-N900V Developer Edition. I have screen captures, files and code that hopefully will reveal the problem, and maybe one of the Guru's can help fix.
The original problem was caused several months ago after a restore from TWRP openrecovery-twrp-2.6.3.0-hltetmo This version of TWRP had a problem with the efs restore. Endless bootloops, about 28 hours later I had my DE back working after searching XDA. The fix that I found was not correct for this model .it stopped the bootloops, but the efs folder that I created was from the wrong block. The fix I found had a script to rebuild efs folder from /dev/block/mmcblk0p12.This block is modemst1 in the Qualcomm model. The script created an EFS folder in root, but it was empty. Here is the thread, but it's not right for SM-N900V DE, and many others. If I knew then what I know, "confirm the EFS block before applying any script".
Last week I tried to do a efs backup so I could eventually fix the "Factory Mode" problem from blank efs folder. That's when efs folder went away again, "reboot nvbackup" and bootloops, I can't get it to stick since. Boot loops for a week.
Tried to rebuild missing efs folder using what I think is the correct adb script for SM-N900V DE using philz_touch_6.12.8-hltevzw The usb driver
Other Note 3's have efs in mmcblk0p12
Code:
mke2fs /dev/block/mmcblk0p11
mkdir /efs
~ # mount -t ext4 /dev/block/mmcblk0p11 /efs
adb shell
mke2fs /dev/block/mmcblk0p11
Code:
mke2fs /dev/block/mmcblk0p11
mke2fs 1.41.14 (22-Dec-2010)
Filesystem label=
OS type: Linux
Block size=1024 (log=0)
Fragment size=1024 (log=0)
Stride=0 blocks, Stripe width=0 blocks
3584 inodes, 14336 blocks
716 blocks (4.99%) reserved for the super user
First data block=1
Maximum filesystem blocks=14680064
2 block groups
8192 blocks per group, 8192 fragments per group
1792 inodes per group
Superblock backups stored on blocks:
8193
Writing inode tables: done
Writing superblocks and filesystem accounting information: done
This filesystem will be automatically checked every 33 mounts or
180 days, whichever comes first. Use tune2fs -c or -i to override.
~ #
I tried several other similar scripts and it would rebuild the proper /efs folder
contents of my efs folder built from mmcblk0p11 (EFS is lost on reboot)
Code:
adb shell
mkdir /efs
~ # mount -t ext4 /dev/block/mmcblk0p11 /efs
ls /efs
FactoryApp lost+found
U0BwJo4kmkmm-BgyzUZgoEY7pn8_ prov
drm prov_data
hw_offset wifi
~ #
Copy of my efs after running script, before reboot. I think some folders and files are missing.
DRM is is intact
Some of the FactoryMode files are missing too. My EFS folder is only 1.02MB
Code:
adb shell
~ # ls -lR /efs
ls -lR /efs
/efs:
drwxrwxr-x 2 system system 1024 Jan 1 2013 FactoryApp
drwxrwxr-- 4 drm system 1024 Jan 1 2013 drm
-rw------- 1 system system 3 Jan 1 2013 hw_offset
drwx------ 2 root root 12288 Jan 2 21:10 lost+found
drwxrwx--- 2 radio system 1024 Jan 2 21:11 prov
drwx------ 4 system system 1024 Jan 1 2013 prov_data
drwxrwxr-x 2 radio system 1024 Jan 2 21:11 wifi
/efs/FactoryApp:
-rwxrwxr-x 1 media system 1 Jan 1 2013 earjack_count
-rwxr--r-- 1 system system 2 Jan 1 2013 factorymode
-rwxrwxr-x 1 system radio 4 Jan 2 21:11 fdata
-rwxrwxr-x 1 system radio 0 Jan 2 21:11 hist_nv
-rwxr--r-- 1 system system 3 Jan 1 2013 keystr
-rwxrwxr-x 1 system radio 1020 Jan 2 21:11 test_nv
/efs/drm:
drwx------ 3 system system 1024 Jan 1 2013 app_ms
drwxrwxr-- 3 drm system 1024 Jan 2 21:11 sdrm
/efs/drm/app_ms:
drwx------ 2 system system 1024 Jan 1 2013 MxNw57WpMwUrwl29zlzqzCi
rAwg_
/efs/drm/app_ms/MxNw57WpMwUrwl29zlzqzCirAwg_:
-rwx------ 1 system system 1072 Jan 1 2013 -lndchIc3h7lLcBHqLCVTRw
sBQU_
-rwx------ 1 system system 1072 Jan 1 2013 2a8EC7fiuOLWZ6xkJz2qV9B
UyqY_
-rwx------ 1 system system 1072 Jan 1 2013 39j-Wt07C-dAogUK9xbr3vf
7xFY_
-rwx------ 1 system system 1072 Jan 1 2013 8oPVwf9NrhTSk5DXKuiMfak
4SQI_
-rwx------ 1 system system 1072 Jan 1 2013 AqEmxtFosQPPH-ASRTWrTN0
zFwI_
-rwx------ 1 system system 1072 Jan 1 2013 aZ532jwWSI64IZ5usuKIzxv
4BOQ_
-rwx------ 1 system system 1072 Jan 1 2013 fil8fYE2kpyD+gNF9IULyWp
JiMs_
-rwx------ 1 system system 1072 Jan 1 2013 mxrN+7RFB9miwfZrRU1xlWi
eu4M_
-rwx------ 1 system system 1072 Jan 1 2013 oUtpSCeDR40uafRBmUR7mFY
w+ik_
-rwx------ 1 system system 1072 Jan 1 2013 wHPCuFBMd5Z7-P4jMU--oBv
QDz4_
-rwx------ 1 system system 1072 Jan 1 2013 xmCXhhIu8UwnU13OCzfWzRX
OFiI_
/efs/drm/sdrm:
drwxrwxr-- 2 drm system 1024 Jan 2 21:11 data_agent
/efs/drm/sdrm/data_agent:
/efs/lost+found:
/efs/prov:
-rw-rw---- 1 radio system 0 Jan 2 21:11 libdevkm.lock
/efs/prov_data:
drwx------ 2 system system 1024 Jan 1 2013 G+8IRqTrHDIvQWyDjPjJkVB
5u6o_
drwx------ 2 system system 1024 Jan 1 2013 bG5QQZ77nDjI2757PvvQ3rP
PrVg_
/efs/prov_data/G+8IRqTrHDIvQWyDjPjJkVB5u6o_:
/efs/prov_data/bG5QQZ77nDjI2757PvvQ3rPPrVg_:
/efs/wifi:
~ #
After reboot, efs folder is gone.
Code:
>adb shell ls -a -l /efs
ls: efs: No such file or directory
~ #
efs mmcblk0p11 14336KB
MD5 c91e8d8d61148fbc73074dc460b93894
Logcat
Captured some logcats
Code:
I/ARMAssembler( 183): generated scanline__00000077:03545402_00000A01_00000000 [ 31 ipp] (52 ins) at [0xb49e12d0:0xb49e13a0] in 46146 ns
I/ARMAssembler( 183): generated scanline__00000077:03545402_00000A08_00000000 [ 31 ipp] (53 ins) at [0xb49e13b0:0xb49e1484] in 39062 ns
I/ARMAssembler( 183): generated scanline__00000077:03545402_00000000_00000000 [ 30 ipp] (44 ins) at [0xb49e1490:0xb49e1540] in 35834 ns
I/Vold ( 185): /dev/block/vold/179:65 being considered for volume sdcard1
D/Vold ( 185): Volume sdcard1 state changing 1 (Idle-Unmounted) -> 3 (Checking)
D/Vold ( 185): Trying to get filesystem type for /dev/block/vold/179:65
D/Vold ( 185): Found vfat filesystem on /dev/block/vold/179:65
I/fsck_msdos( 185): ** /dev/block/vold/179:65
I/fsck_msdos( 185): ** Phase 1 - Read and Compare FATs
I/fsck_msdos( 185): Attempting to allocate 3769 KB for FAT
I/fsck_msdos( 185): Attempting to allocate 3769 KB for FAT
I/fsck_msdos( 185): ** Phase 2 - Check Cluster Chains
I/fsck_msdos( 185): ** Phase 3 - Checking Directories
I/fsck_msdos( 185): ** Phase 4 - Checking for Lost Files
I/fsck_msdos( 185): 258 files, 2845024 free (482123 clusters)
W/Vold ( 185): blkid failed to identify /dev/block/vold/179:65
I/Vold ( 185): Filesystem check completed OK
D/Vold ( 185): Volume sdcard1 state changing 3 (Checking) -> 4 (Mounted)
I/ServiceManager( 1017): Waiting for service SurfaceFlinger...
I/ServiceManager( 1017): Waiting for service SurfaceFlinger...
I/ServiceManager( 1017): Waiting for service SurfaceFlinger...
<snip>
<snip>
I/ServiceManager( 1017): Waiting for service SurfaceFlinger...
I/ServiceManager( 1021): Waiting for service SurfaceFlinger...
D/Vold ( 185): Volume sdcard1 state changing 4 (Mounted) -> 5 (Unmounting)
I/ServiceManager( 1017): Waiting for service SurfaceFlinger...
I/ServiceManager( 1021): Waiting for service SurfaceFlinger...
I/ServiceManager( 1017): Waiting for service SurfaceFlinger...
I/ServiceManager( 1021): Waiting for service SurfaceFlinger...
I/Vold ( 185): /storage/sdcard1 sucessfully unmounted
I/Vold ( 185): /storage/sdcard1 sucessfully unmounted
I/Vold ( 185): /storage/sdcard1 unmounted successfully
D/Vold ( 185): Volume sdcard1 state changing 5 (Unmounting) -> 1 (Idle-Unmounted)
I/ServiceManager( 1017): Waiting for service SurfaceFlinger...
Code:
01-01 15:40:52.669: D/(3450): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
01-01 15:40:52.669: D/(3450): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
01-01 15:40:52.679: D/(3450): TIMA: tima-pkm--Attempting to load TZAPPS
01-01 15:40:52.679: D/QSEECOMAPI:(3450): QSEECom_get_handle sb_length = 0x104e80
01-01 15:40:52.679: E/QSEECOMAPI:(3450): Error::Failed to open /dev/qseecom device
01-01 15:40:52.679: E/(3450): TIMA: tima-pkm--Unable to start TZ app; errno = 9
01-01 15:40:52.679: D/(3450): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
01-01 15:40:52.679: D/(3450): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
01-01 15:40:52.679: D/(3450): TIMA: tima-pkm--Attempting to load TZAPPS
01-01 15:40:52.679: D/QSEECOMAPI:(3450): QSEECom_get_handle sb_length = 0x104e80
01-01 15:40:52.679: E/QSEECOMAPI:(3450): Error::Failed to open /dev/qseecom device
01-01 15:40:52.679: E/(3450): TIMA: tima-pkm--Unable to start TZ app; errno = 9
01-01 15:40:52.679: D/(3450): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
01-01 15:40:52.679: D/(3450): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
01-01 15:40:52.679: D/(3450): TIMA: tima-pkm--Attempting to load TZAPPS
01-01 15:40:52.679: D/QSEECOMAPI:(3450): QSEECom_get_handle sb_length = 0x104e80
01-01 15:40:52.679: E/QSEECOMAPI:(3450): Error::Failed to open /dev/qseecom device
01-01 15:40:52.679: E/(3450): TIMA: tima-pkm--Unable to start TZ app; errno = 9
01-01 15:40:52.679: D/(3450): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
01-01 15:40:52.679: D/(3450): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
01-01 15:40:52.679: D/(3450): TIMA: tima-pkm--Attempting to load TZAPPS
01-01 15:40:52.679: D/QSEECOMAPI:(3450): QSEECom_get_handle sb_length = 0x104e80
01-01 15:40:52.679: E/QSEECOMAPI:(3450): Error::Failed to open /dev/qseecom device
01-01 15:40:52.679: E/(3450): TIMA: tima-pkm--Unable to start TZ app; errno = 9
01-01 15:40:52.679: D/(3450): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
01-01 15:40:52.679: D/(3450): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
01-01 15:40:52.679: D/(3450): TIMA: tima-pkm--Attempting to load TZAPPS
01-01 15:40:52.679: D/QSEECOMAPI:(3450): QSEECom_get_handle sb_length = 0x104e80
01-01 15:40:52.679: E/QSEECOMAPI:(3450): Error::Failed to open /dev/qseecom device
01-01 15:40:52.679: E/(3450): TIMA: tima-pkm--Unable to start TZ app; errno = 9
01-01 15:40:52.769: E/su(3455): Getting exe path failed with 13: Permission denied
01-01 15:40:52.769: W/su(3455): request rejected (2000->0 /system/bin/sh)
01-01 15:40:53.799: E/su(3475): Getting exe path failed with 13: Permission denied
01-01 15:40:53.809: W/su(3475): request rejected (2000->0 /system/bin/sh)
01-01 15:40:53.909: E/su(3480): Getting exe path failed with 13: Permission denied
01-01 15:40:53.909: W/su(3480): request rejected (2000->0 /system/bin/sh)
01-01 15:40:55.009: E/su(3510): Getting exe path failed with 13: Permission denied
01-01 15:40:55.009: W/su(3510): request rejected (2000->0 /system/bin/sh)
01-01 15:40:55.119: E/su(3515): Getting exe path failed with 13: Permission denied
01-01 15:40:55.119: W/su(3515): request rejected (2000->0 /system/bin/sh)
01-01 15:40:55.219: E/su(3524): Getting exe path failed with 13: Permission denied
01-01 15:40:55.219: W/su(3524): request rejected (2000->0 /system/bin/sh)
01-01 15:40:55.319: E/su(3530): Getting exe path failed with 13: Permission denied
01-01 15:40:55.319: W/su(3530): request rejected (2000->0 /system/bin/sh)
01-01 15:40:55.409: E/su(3534): Getting exe path failed with 13: Permission denied
01-01 15:40:55.409: W/su(3534): request rejected (2000->0 /system/bin/sh)
01-01 15:40:55.509: E/su(3535): Getting exe path failed with 13: Permission denied
01-01 15:40:55.519: W/su(3535): request rejected (2000->0 /system/bin/sh)
01-01 15:40:55.609: E/su(3536): Getting exe path failed with 13: Permission denied
01-01 15:40:55.619: W/su(3536): request rejected (2000->0 /system/bin/sh)
01-01 15:40:55.709: E/su(3538): Getting exe path failed with 13: Permission denied
01-01 15:40:55.719: W/su(3538): request rejected (2000->0 /system/bin/sh)
01-01 15:40:55.809: E/su(3539): Getting exe path failed with 13: Permission denied
01-01 15:40:55.819: W/su(3539): request rejected (2000->0 /system/bin/sh)
01-01 15:40:56.219: E/su(3545): Getting exe path failed with 13: Permission denied
01-01 15:40:56.219: W/su(3545): request rejected (2000->0 /system/bin/sh)
01-01 15:40:56.519: I/dumpstate(3414): done
01-01 15:41:26.659: D/(4156): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
01-01 15:41:26.659: D/(4156): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
01-01 15:41:26.659: D/(4156): TIMA: tima-pkm--Attempting to load TZAPPS
01-01 15:41:26.659: D/QSEECOMAPI:(4156): QSEECom_get_handle sb_length = 0x104e80
01-01 15:41:26.659: E/QSEECOMAPI:(4156): Error::Failed to open /dev/qseecom device
01-01 15:41:26.659: E/(4156): TIMA: tima-pkm--Unable to start TZ app; errno = 9
radionerd said:
Other Note 3's have efs in mmcblk0p12
Click to expand...
Click to collapse
<threadjack>
So this isn't accidentally misinterpreted, here "other" means non-Verizon versions of the Note 3.
The partitioning between a retail Verizon SM-N900V(ZKE) and Developer Edition Verizon are identical afaik.
</threadjack>
bftb0 said:
<threadjack>
So this isn't accidentally misinterpreted, here "other" means non-Verizon versions of the Note 3.
The partitioning between a retail Verizon SM-N900V(ZKE) and Developer Edition Verizon are identical afaik.
</threadjack>
Click to expand...
Click to collapse
I agree, and probably T-mobile too. There are others that had the same problem. After my bad TWRP restore 2 months ago it was in FactoryMode, no lock screen, and a few other annoyances. The bad (mount -t ext4 /dev/block/mmcblk0p12 /efs) is modem1(blk12) into efs.
7 days ago I tried to just get a backup of dev blocks and efs from efs pro. That's when it borked hard. I hope others with Qualcomm note 3's won't just blindly apply the script that writes modem1 to efs. Ouch!
Thanks,
radionerd said:
I agree, and probably T-mobile too. There are others that had the same problem. After my bad TWRP restore 2 months ago it was in FactoryMode, no lock screen, and a few other annoyances. The bad (mount -t ext4 /dev/block/mmcblk0p12 /efs) is modem1(blk12) into efs.
7 days ago I tried to just get a backup of dev blocks and efs from efs pro. That's when it borked hard. I hope others with Qualcomm note 3's won't just blindly apply the script that writes modem1 to efs. Ouch!
Thanks,
Click to expand...
Click to collapse
Did you try to create or edit the mounts via fstab, or vold.fstab or just editing mounts to include the following?
/dev/block/platform/msm_sdcc.1/by-name/efs /efs ext4 rw,seclabel,nosuid,nodev,noatime,discard,journal_checksum,journal_async_commit,noauto_da_alloc,errors=panic 0 0
Sent from my SCH-I545 using XDA Premium 4 mobile app
Surge1223 said:
Did you try to create or edit the mounts via fstab, or vold.fstab or just editing mounts to include the following?
/dev/block/platform/msm_sdcc.1/by-name/efs /efs ext4 rw,seclabel,nosuid,nodev,noatime,discard,journal_checksum,journal_async_commit,noauto_da_alloc,errors=panic 0 0
Click to expand...
Click to collapse
I applied the script, attached logcat before reboot, and after. It cleaned up a few errors.
Thank You for the help!
logcat before reboot:
Code:
~ # mkdir /efs
mkdir /efs
~ # mount -t ext4 /dev/block/mmcblk0p11 /efs
mount -t ext4 /dev/block/mmcblk0p11 /efs
~ # /dev/block/platform/msm_sdcc.1/by-name/efs /efs ext4 rw,seclabel,nosuid,node
v,noatime,discard,journal_c hecksum,journal_async_commit,noauto_da_alloc,error s
=panic 0 0
/dev/block/platform/msm_sdcc.1/by-name/efs /efs ext4 rw,seclabel,nosuid,node
v,noatime,discard,journal_c hecksum,journal_async_commit,noauto_da_alloc,error s
=panic 0 0
/sbin/sh: /dev/block/platform/msm_sdcc.1/by-name/efs: Permission denied
~ #
--------- beginning of /dev/log/system
I/Vold ( 184): Vold 2.1 (the revenge) firing up
D/Vold ( 184): Volume sdcard1 state changing -1 (Initializing) -> 0 (No-Media)
D/Vold ( 184): Volume usbdisk state changing -1 (Initializing) -> 0 (No-Media)
D/Vold ( 184): Volume sdcard1 state changing 0 (No-Media) -> 2 (Pending)
D/DirectVolume( 184): DirectVolume::handlePartitionAdded -> MAJOR 179, MINOR 65, PARTN 1
D/Vold ( 184): Volume sdcard1 state changing 2 (Pending) -> 1 (Idle-Unmounted)
--------- beginning of /dev/log/main
I/ARMAssembler( 182): generated scanline__00000077:03545402_00000A02_00000000 [ 31 ipp] (53 ins) at [0xb49b71f0:0xb49b72c4] in 65417 ns
I/ARMAssembler( 182): generated scanline__00000077:03545402_00000A01_00000000 [ 31 ipp] (52 ins) at [0xb49b72d0:0xb49b73a0] in 46406 ns
I/ARMAssembler( 182): generated scanline__00000077:03545402_00000A08_00000000 [ 31 ipp] (53 ins) at [0xb49b73b0:0xb49b7484] in 39062 ns
I/ARMAssembler( 182): generated scanline__00000077:03545402_00000000_00000000 [ 30 ipp] (44 ins) at [0xb49b7490:0xb49b7540] in 37187 ns
I/Vold ( 184): /dev/block/vold/179:65 being considered for volume sdcard1
D/Vold ( 184): Volume sdcard1 state changing 1 (Idle-Unmounted) -> 3 (Checking)
D/Vold ( 184): Trying to get filesystem type for /dev/block/vold/179:65
I/fsck_msdos( 184): ** /dev/block/vold/179:65
D/Vold ( 184): Found vfat filesystem on /dev/block/vold/179:65
I/fsck_msdos( 184): ** Phase 1 - Read and Compare FATs
I/fsck_msdos( 184): Attempting to allocate 3769 KB for FAT
I/fsck_msdos( 184): Attempting to allocate 3769 KB for FAT
I/fsck_msdos( 184): ** Phase 2 - Check Cluster Chains
I/fsck_msdos( 184): ** Phase 3 - Checking Directories
I/fsck_msdos( 184): ** Phase 4 - Checking for Lost Files
I/fsck_msdos( 184): 267 files, 2843776 free (482084 clusters)
W/Vold ( 184): blkid failed to identify /dev/block/vold/179:65
I/Vold ( 184): Filesystem check completed OK
D/Vold ( 184): Volume sdcard1 state changing 3 (Checking) -> 4 (Mounted)
D/Vold ( 184): Volume sdcard1 state changing 4 (Mounted) -> 5 (Unmounting)
I/Vold ( 184): /storage/sdcard1 sucessfully unmounted
I/Vold ( 184): /storage/sdcard1 sucessfully unmounted
I/Vold ( 184): /storage/sdcard1 unmounted successfully
D/Vold ( 184): Volume sdcard1 state changing 5 (Unmounting) -> 1 (Idle-Unmounted)
I/Vold ( 184): /dev/block/vold/179:65 being considered for volume sdcard1
D/Vold ( 184): Volume sdcard1 state changing 1 (Idle-Unmounted) -> 3 (Checking)
D/Vold ( 184): Trying to get filesystem type for /dev/block/vold/179:65
D/Vold ( 184): Found vfat filesystem on /dev/block/vold/179:65
I/fsck_msdos( 184): ** /dev/block/vold/179:65
I/fsck_msdos( 184): ** Phase 1 - Read and Compare FATs
I/fsck_msdos( 184): Attempting to allocate 3769 KB for FAT
I/fsck_msdos( 184): Attempting to allocate 3769 KB for FAT
I/fsck_msdos( 184): ** Phase 2 - Check Cluster Chains
I/fsck_msdos( 184): ** Phase 3 - Checking Directories
I/fsck_msdos( 184): ** Phase 4 - Checking for Lost Files
I/fsck_msdos( 184): 267 files, 2843776 free (482084 clusters)
I/Vold ( 184): Filesystem check completed OK
W/Vold ( 184): blkid failed to identify /dev/block/vold/179:65
D/Vold ( 184): Volume sdcard1 state changing 3 (Checking) -> 4 (Mounted)
D/Vold ( 184): Volume sdcard1 state changing 4 (Mounted) -> 5 (Unmounting)
I/Vold ( 184): /storage/sdcard1 sucessfully unmounted
I/Vold ( 184): /storage/sdcard1 sucessfully unmounted
I/Vold ( 184): /storage/sdcard1 unmounted successfully
D/Vold ( 184): Volume sdcard1 state changing 5 (Unmounting) -> 1 (Idle-Unmounted)
After reboot
Code:
beginning of /dev/log/main
D/ ( 3502): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
D/ ( 3502): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
D/ ( 3502): TIMA: tima-pkm--Attempting to load TZAPPS
D/QSEECOMAPI: ( 3502): QSEECom_get_handle sb_length = 0x104e80
E/QSEECOMAPI: ( 3502): Error::Failed to open /dev/qseecom device
E/ ( 3502): TIMA: tima-pkm--Unable to start TZ app; errno = 9
D/ ( 3502): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
D/ ( 3502): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
D/ ( 3502): TIMA: tima-pkm--Attempting to load TZAPPS
D/QSEECOMAPI: ( 3502): QSEECom_get_handle sb_length = 0x104e80
E/QSEECOMAPI: ( 3502): Error::Failed to open /dev/qseecom device
E/ ( 3502): TIMA: tima-pkm--Unable to start TZ app; errno = 9
D/ ( 3502): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
D/ ( 3502): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
D/ ( 3502): TIMA: tima-pkm--Attempting to load TZAPPS
D/QSEECOMAPI: ( 3502): QSEECom_get_handle sb_length = 0x104e80
E/QSEECOMAPI: ( 3502): Error::Failed to open /dev/qseecom device
E/ ( 3502): TIMA: tima-pkm--Unable to start TZ app; errno = 9
D/ ( 3502): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
D/ ( 3502): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
D/ ( 3502): TIMA: tima-pkm--Attempting to load TZAPPS
D/QSEECOMAPI: ( 3502): QSEECom_get_handle sb_length = 0x104e80
E/QSEECOMAPI: ( 3502): Error::Failed to open /dev/qseecom device
E/ ( 3502): TIMA: tima-pkm--Unable to start TZ app; errno = 9
D/ ( 3502): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
D/ ( 3502): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
D/ ( 3502): TIMA: tima-pkm--Attempting to load TZAPPS
D/QSEECOMAPI: ( 3502): QSEECom_get_handle sb_length = 0x104e80
E/QSEECOMAPI: ( 3502): Error::Failed to open /dev/qseecom device
E/ ( 3502): TIMA: tima-pkm--Unable to start TZ app; errno = 9
E/su ( 3507): Getting exe path failed with 13: Permission denied
W/su ( 3507): request rejected (2000->0 /system/bin/sh)
E/su ( 3550): Getting exe path failed with 13: Permission denied
W/su ( 3550): request rejected (2000->0 /system/bin/sh)
E/su ( 3551): Getting exe path failed with 13: Permission denied
radionerd said:
I applied the script, attached logcat before reboot, and after. It cleaned up a few errors.
Thank You for the help!
Click to expand...
Click to collapse
Okay, first update busybox, I suggest installing "Busybox on Rails" from the playstore. Then make sure SuperSu is up to date and open the SuperSu app and place a check in the box that says something like "enable su at boot"
then download and unzip the create_firmware_symlinks file ive attached and connect your phone to your pc and try to replicate what I did below (I used my touchpad but the commands are still the same) make sure the id of sh is the same the output below.
dd if=/system/xbin/su of=/system/bin/.su
[email protected] ~ $ adb shell
[email protected]:/ # su
[email protected]:/ # dd if=/system/xbin/su of=/system/bin/.su
729+1 records in
729+1 records out
373584 bytes transferred in 0.099 secs (3773575 bytes/sec)
[email protected]:/ # mv /system/bin/.su /system/bin/su
[email protected]:/ # whoami
root
[email protected]:/ # id
uid=0(root) gid=0(root)
127|[email protected]:/ # id sh
uid=0(root) gid=0(root)
[email protected]:/ # exit
[email protected]:/ # exit
[email protected] ~ $ adb push create_firmware_symlinks /data/local/tmp
64 KB/s (3101 bytes in 0.047s)
[email protected]:/ # cd /data/local/tmp
[email protected]:/data/local/tmp # chmod 755 create_firmware_symlinks
[email protected]:/data/local/tmp # sh create_firmware_symlinks
.......trimmed--------
[email protected]:/data/local/tmp # reboot
Click to expand...
Click to collapse
Surge1223 said:
Okay, first update busybox, I suggest installing "Busybox on Rails" from the playstore. Then make sure SuperSu is up to date and open the SuperSu app and place a check in the box that says something like "enable su at boot"
then download and unzip the create_firmware_symlinks file ive attached and connect your phone to your pc and try to replicate what I did below (I used my touchpad but the commands are still the same) make sure the id of sh is the same the output below.
Click to expand...
Click to collapse
I am studying this. I have busybox v1.21.1-kk static. Since I can't boot (bootloops), I looked into sideloading latest binaries. Busybox doesn't have v1.22.1.bin posted yet, just source.
I normally have Super SU pro. Philz CWM gives and option to install his version.
Thank You, I'm learning
Code:
C:\Users\Alan>adb shell
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
~ # busybox
busybox
BusyBox v1.21.1-kk static (2013-11-24 11:52 +0100) multi-call binary.
~ # whoami
whoami
root
~ # id
id
uid=0(root) gid=0(root)
~ # $ su
$ su
/sbin/sh: $: not found
My latest logcat snip after spending the day with my note 3. I think I'm going to wear out 3 buttons, or get carpal tunnel
Code:
?:??: W/?(?): --------- beginning of /dev/log/main
01-01 01:10:48.599: D/(3477): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
01-01 01:10:48.599: D/(3477): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
01-01 01:10:48.609: D/(3477): TIMA: tima-pkm--Attempting to load TZAPPS
01-01 01:10:48.609: D/QSEECOMAPI:(3477): QSEECom_get_handle sb_length = 0x104e80
01-01 01:10:48.609: E/QSEECOMAPI:(3477): Error::Failed to open /dev/qseecom device
01-01 01:10:48.609: E/(3477): TIMA: tima-pkm--Unable to start TZ app; errno = 9
01-01 01:10:48.609: D/(3477): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
01-01 01:10:48.609: D/(3477): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
01-01 01:10:48.609: D/(3477): TIMA: tima-pkm--Attempting to load TZAPPS
01-01 01:10:48.609: D/QSEECOMAPI:(3477): QSEECom_get_handle sb_length = 0x104e80
01-01 01:10:48.609: E/QSEECOMAPI:(3477): Error::Failed to open /dev/qseecom device
01-01 01:10:48.609: E/(3477): TIMA: tima-pkm--Unable to start TZ app; errno = 9
01-01 01:10:48.609: D/(3477): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
01-01 01:10:48.609: D/(3477): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
01-01 01:10:48.609: D/(3477): TIMA: tima-pkm--Attempting to load TZAPPS
01-01 01:10:48.609: D/QSEECOMAPI:(3477): QSEECom_get_handle sb_length = 0x104e80
01-01 01:10:48.609: E/QSEECOMAPI:(3477): Error::Failed to open /dev/qseecom device
01-01 01:10:48.609: E/(3477): TIMA: tima-pkm--Unable to start TZ app; errno = 9
radionerd said:
My latest logcat snip after spending the day with my note 3. I think I'm going to wear out 3 buttons, or get carpal tunnel
Code:
?:??: W/?(?): --------- beginning of /dev/log/main
01-01 01:10:48.599: D/(3477): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
01-01 01:10:48.599: D/(3477): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
01-01 01:10:48.609: D/(3477): TIMA: tima-pkm--Attempting to load TZAPPS
01-01 01:10:48.609: D/QSEECOMAPI:(3477): QSEECom_get_handle sb_length = 0x104e80
01-01 01:10:48.609: E/QSEECOMAPI:(3477): Error::Failed to open /dev/qseecom device
01-01 01:10:48.609: E/(3477): TIMA: tima-pkm--Unable to start TZ app; errno = 9
01-01 01:10:48.609: D/(3477): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
01-01 01:10:48.609: D/(3477): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
01-01 01:10:48.609: D/(3477): TIMA: tima-pkm--Attempting to load TZAPPS
01-01 01:10:48.609: D/QSEECOMAPI:(3477): QSEECom_get_handle sb_length = 0x104e80
01-01 01:10:48.609: E/QSEECOMAPI:(3477): Error::Failed to open /dev/qseecom device
01-01 01:10:48.609: E/(3477): TIMA: tima-pkm--Unable to start TZ app; errno = 9
01-01 01:10:48.609: D/(3477): TAL: TIMA_backend_open--int8_t TIMA_backend_open(void**, appID, uint32_t, uint32_t)
01-01 01:10:48.609: D/(3477): TIMA: QCOM_backend_open--int8_t QCOM_backend_open(void**, appID, uint32_t, uint32_t)
01-01 01:10:48.609: D/(3477): TIMA: tima-pkm--Attempting to load TZAPPS
01-01 01:10:48.609: D/QSEECOMAPI:(3477): QSEECom_get_handle sb_length = 0x104e80
01-01 01:10:48.609: E/QSEECOMAPI:(3477): Error::Failed to open /dev/qseecom device
01-01 01:10:48.609: E/(3477): TIMA: tima-pkm--Unable to start TZ app; errno = 9
Click to expand...
Click to collapse
You don't need to upadate Busybox linux style. Just download the app I mentioned in my last post, and it will update and repair your busybox binaries without rebooting. Also SuperSu pro is a donation version, I think your problem would be solved if you just updated supersu and busybox and then mounted /dev thats why I suggested it. You can download the latest SuperSu binary from Chainfire's thread but im assuming you have wifi you can use to connect to your note 3 to update those apps right? I think your making this too hard on yourself lol. Did you run all the commands I posted above? If so what if anything is currently in the /efs folder?
Edit: there seems to be an issue with su binary are you still rooted? Check the id on su, if its anything other than 0 then under adb shell
Code:
[email protected]:/ # mount -o remount, rw /system
[email protected]:/ # chown 0.0 /system/bin/su
[email protected]:/ # chmod 06755 /system/bin/su
[email protected]:/ # ln -s /system/bin/su /system/xbin/su
After this you would still need to update/reinstall busybox and supersu in order for the "sh" issue to be fixed
Surge1223 said:
Okay, first update busybox, I suggest installing "Busybox on Rails" from the playstore. Then make sure SuperSu is up to date and open the SuperSu app and place a check in the box that says something like "enable su at boot"
then download and unzip the create_firmware_symlinks file ive attached and connect your phone to your pc and try to replicate what I did below (I used my touchpad but the commands are still the same) make sure the id of sh is the same the output below.
Click to expand...
Click to collapse
Edit: Stand-by I jumped the gun. I will update after I do the steps right
Thanks Man!
Firmware folder with many Symlink errors
Code:
~ # ls -lR /system/etc/firmware
ls -lR /system/etc/firmware
/system/etc/firmware:
-rw-r--r-- 1 root root 1156 Aug 1 2008 a225_pfp.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 a225_pm4.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 a225p5_pm4.fw
-rw-r--r-- 1 root root 1156 Aug 1 2008 a300_pfp.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 a300_pm4.fw
-rw-r--r-- 1 root root 2212 Aug 1 2008 a330_pfp.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 a330_pm4.fw
-rw-r--r-- 1 root root 16128 Aug 1 2008 cpp_firmware_v1_1_1.fw
-rw-r--r-- 1 root root 16384 Aug 1 2008 cpp_firmware_v1_1_6.fw
-rw-r--r-- 1 root root 16384 Aug 1 2008 cpp_firmware_v1_2_0.fw
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.b00 -> /firmware/image/dtcpip.b00
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.b01 -> /firmware/image/dtcpip.b01
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.b02 -> /firmware/image/dtcpip.b02
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.b03 -> /firmware/image/dtcpip.b03
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.mdt -> /firmware/image/dtcpip.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.b00 -> /firmware/image/keymaste.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.b01 -> /firmware/image/keymaste.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.b02 -> /firmware/image/keymaste.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.b03 -> /firmware/image/keymaste.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.mdt -> /firmware/image/keymaste.mdt
-rw-r--r-- 1 root root 1156 Aug 1 2008 leia_pfp_470.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 leia_pm4_470.fw
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.b00 -> /firmware/image/mc_v2.b00
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.b01 -> /firmware/image/mc_v2.b01
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.b02 -> /firmware/image/mc_v2.b02
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.b03 -> /firmware/image/mc_v2.b03
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.mdt -> /firmware/image/mc_v2.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.b00 -> /firmware/image/playread.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.b01 -> /firmware/image/playread.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.b02 -> /firmware/image/playread.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.b03 -> /firmware/image/playread.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.mdt -> /firmware/image/playread.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.b00 -> /firmware/image/sec_stor.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.b01 -> /firmware/image/sec_stor.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.b02 -> /firmware/image/sec_stor.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.b03 -> /firmware/image/sec_stor.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.mdt -> /firmware/image/sec_stor.mdt
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.b00 -> /firmware/image/skm.b00
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.b01 -> /firmware/image/skm.b01
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.b02 -> /firmware/image/skm.b02
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.b03 -> /firmware/image/skm.b03
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.mdt -> /firmware/image/skm.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.b00 -> /firmware/image/sshdcpap.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.b01 -> /firmware/image/sshdcpap.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.b02 -> /firmware/image/sshdcpap.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.b03 -> /firmware/image/sshdcpap.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.mdt -> /firmware/image/sshdcpap.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.b00 -> /firmware/image/tima_atn.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.b01 -> /firmware/image/tima_atn.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.b02 -> /firmware/image/tima_atn.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.b03 -> /firmware/image/tima_atn.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.mdt -> /firmware/image/tima_atn.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.b00 -> /firmware/image/tima_key.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.b01 -> /firmware/image/tima_key.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.b02 -> /firmware/image/tima_key.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.b03 -> /firmware/image/tima_key.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.mdt -> /firmware/image/tima_key.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.b00 -> /firmware/image/tima_lkm.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.b01 -> /firmware/image/tima_lkm.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.b02 -> /firmware/image/tima_lkm.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.b03 -> /firmware/image/tima_lkm.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.mdt -> /firmware/image/tima_lkm.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.b00 -> /firmware/image/tima_pkm.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.b01 -> /firmware/image/tima_pkm.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.b02 -> /firmware/image/tima_pkm.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.b03 -> /firmware/image/tima_pkm.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.mdt -> /firmware/image/tima_pkm.mdt
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b00 -> /firmware/image/venus.b00
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b01 -> /firmware/image/venus.b01
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b02 -> /firmware/image/venus.b02
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b03 -> /firmware/image/venus.b03
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b04 -> /firmware/image/venus.b04
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.mdt -> /firmware/image/venus.mdt
drwxr-xr-x 2 root root 4096 Jan 4 13:55 wcd9320
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.b00 -> /firmware/image/widevine.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.b01 -> /firmware/image/widevine.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.b02 -> /firmware/image/widevine.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.b03 -> /firmware/image/widevine.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.mdt -> /firmware/image/widevine.mdt
/system/etc/firmware/wcd9320:
lrwxrwxrwx 1 root root 25 Jan 4 13:55 wcd9320_mbhc.bin -> /data/misc/audio/mbhc.bin
~ #
radionerd said:
Edit: Stand-by I jumped the gun. I will update after I do the steps right
Thanks Man!
Firmware folder with many Symlink errors
Code:
~ # ls -lR /system/etc/firmware
ls -lR /system/etc/firmware
/system/etc/firmware:
-rw-r--r-- 1 root root 1156 Aug 1 2008 a225_pfp.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 a225_pm4.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 a225p5_pm4.fw
-rw-r--r-- 1 root root 1156 Aug 1 2008 a300_pfp.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 a300_pm4.fw
-rw-r--r-- 1 root root 2212 Aug 1 2008 a330_pfp.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 a330_pm4.fw
-rw-r--r-- 1 root root 16128 Aug 1 2008 cpp_firmware_v1_1_1.fw
-rw-r--r-- 1 root root 16384 Aug 1 2008 cpp_firmware_v1_1_6.fw
-rw-r--r-- 1 root root 16384 Aug 1 2008 cpp_firmware_v1_2_0.fw
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.b00 -> /firmware/image/dtcpip.b00
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.b01 -> /firmware/image/dtcpip.b01
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.b02 -> /firmware/image/dtcpip.b02
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.b03 -> /firmware/image/dtcpip.b03
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.mdt -> /firmware/image/dtcpip.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.b00 -> /firmware/image/keymaste.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.b01 -> /firmware/image/keymaste.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.b02 -> /firmware/image/keymaste.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.b03 -> /firmware/image/keymaste.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.mdt -> /firmware/image/keymaste.mdt
-rw-r--r-- 1 root root 1156 Aug 1 2008 leia_pfp_470.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 leia_pm4_470.fw
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.b00 -> /firmware/image/mc_v2.b00
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.b01 -> /firmware/image/mc_v2.b01
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.b02 -> /firmware/image/mc_v2.b02
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.b03 -> /firmware/image/mc_v2.b03
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.mdt -> /firmware/image/mc_v2.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.b00 -> /firmware/image/playread.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.b01 -> /firmware/image/playread.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.b02 -> /firmware/image/playread.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.b03 -> /firmware/image/playread.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.mdt -> /firmware/image/playread.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.b00 -> /firmware/image/sec_stor.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.b01 -> /firmware/image/sec_stor.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.b02 -> /firmware/image/sec_stor.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.b03 -> /firmware/image/sec_stor.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.mdt -> /firmware/image/sec_stor.mdt
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.b00 -> /firmware/image/skm.b00
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.b01 -> /firmware/image/skm.b01
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.b02 -> /firmware/image/skm.b02
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.b03 -> /firmware/image/skm.b03
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.mdt -> /firmware/image/skm.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.b00 -> /firmware/image/sshdcpap.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.b01 -> /firmware/image/sshdcpap.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.b02 -> /firmware/image/sshdcpap.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.b03 -> /firmware/image/sshdcpap.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.mdt -> /firmware/image/sshdcpap.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.b00 -> /firmware/image/tima_atn.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.b01 -> /firmware/image/tima_atn.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.b02 -> /firmware/image/tima_atn.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.b03 -> /firmware/image/tima_atn.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.mdt -> /firmware/image/tima_atn.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.b00 -> /firmware/image/tima_key.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.b01 -> /firmware/image/tima_key.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.b02 -> /firmware/image/tima_key.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.b03 -> /firmware/image/tima_key.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.mdt -> /firmware/image/tima_key.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.b00 -> /firmware/image/tima_lkm.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.b01 -> /firmware/image/tima_lkm.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.b02 -> /firmware/image/tima_lkm.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.b03 -> /firmware/image/tima_lkm.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.mdt -> /firmware/image/tima_lkm.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.b00 -> /firmware/image/tima_pkm.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.b01 -> /firmware/image/tima_pkm.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.b02 -> /firmware/image/tima_pkm.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.b03 -> /firmware/image/tima_pkm.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.mdt -> /firmware/image/tima_pkm.mdt
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b00 -> /firmware/image/venus.b00
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b01 -> /firmware/image/venus.b01
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b02 -> /firmware/image/venus.b02
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b03 -> /firmware/image/venus.b03
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b04 -> /firmware/image/venus.b04
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.mdt -> /firmware/image/venus.mdt
drwxr-xr-x 2 root root 4096 Jan 4 13:55 wcd9320
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.b00 -> /firmware/image/widevine.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.b01 -> /firmware/image/widevine.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.b02 -> /firmware/image/widevine.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.b03 -> /firmware/image/widevine.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.mdt -> /firmware/image/widevine.mdt
/system/etc/firmware/wcd9320:
lrwxrwxrwx 1 root root 25 Jan 4 13:55 wcd9320_mbhc.bin -> /data/misc/audio/mbhc.bin
~ #
Click to expand...
Click to collapse
Also if they arent mounting right try doing it like this and type su even if you have the #
su
mount -o remount,rw -t ext4 /dev/block/platform/msm_sdcc.1/by-name/system /system
Sent from my SCH-I545 using XDA Premium 4 mobile app
Surge1223 said:
You don't need to upadate Busybox linux style. Just download the app I mentioned in my last post, and it will update and repair your busybox binaries without rebooting. Also SuperSu pro is a donation version, I think your problem would be solved if you just updated supersu and busybox and then mounted /dev thats why I suggested it. You can download the latest SuperSu binary from Chainfire's thread but im assuming you have wifi you can use to connect to your note 3 to update those apps right? I think your making this too hard on yourself lol. Did you run all the commands I posted above? If so what if anything is currently in the /efs folder?
Edit: there seems to be an issue with su binary are you still rooted? Check the id on su, if its anything other than 0 then under adb shell
Code:
[email protected]:/ # mount -o remount, rw /system
[email protected]:/ # chown 0.0 /system/bin/su
[email protected]:/ # chmod 06755 /system/bin/su
[email protected]:/ # ln -s /system/bin/su /system/xbin/su
After this you would still need to update/reinstall busybox and supersu in order for the "sh" issue to be fixed
Click to expand...
Click to collapse
I don't have xbin folder. I have tried to reinstall Supersu from zip, and from within Philz recovery "Reroot system (SuperSU)". It's not nagging about SU on close "verify root on exit" Take a look at my sbin, superuser and busybox are in there.
Code:
ls -lR /sbin
/sbin:
lrwxrwxrwx 1 root root 7 Jan 1 00:00 [ -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 [[ -> busybox
-rwxr-x--- 1 root root 198980 Jan 1 00:00 adbd
lrwxrwxrwx 1 root root 7 Jan 1 00:00 ash -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 awk -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 basename -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 bbconfig -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 blkid -> busybox
-rwxr-x--- 1 root root 1420 Jan 1 00:00 bootscripts_mnt.sh
lrwxrwxrwx 1 root root 8 Jan 1 00:00 bu -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 bunzip2 -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 busybox -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 bzcat -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 bzip2 -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 cal -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 cat -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 catv -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 chattr -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 chgrp -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 chmod -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 chown -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 chroot -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 cksum -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 clear -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 cmp -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 cp -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 cpio -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 cut -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 date -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 dc -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 dd -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 dedupe -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 depmod -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 devmem -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 df -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 diff -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 dirname -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 dmesg -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 dos2unix -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 du -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 dump_image -> recovery
-rwxr-x--- 1 root root 289480 Jan 1 00:00 e2fsck
lrwxrwxrwx 1 root root 7 Jan 1 00:00 echo -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 edify -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 egrep -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 env -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 erase_image -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 expand -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 expr -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 false -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 fdisk -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 fgrep -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 find -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 flash_image -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 fold -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 free -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 freeramdisk -> busybox
lrwxrwxrwx 1 root root 11 Jan 1 00:00 fsck.exfat -> mount.exfat
lrwxrwxrwx 1 root root 8 Jan 1 00:00 fsck_msdos -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 fstrim -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 fuser -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 getopt -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 getprop -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 grep -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 groups -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 gunzip -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 gzip -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 head -> busybox
-rwxr-x--- 1 root root 124884 Jan 1 00:00 healthd
lrwxrwxrwx 1 root root 7 Jan 1 00:00 hexdump -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 id -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 insmod -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 install -> busybox
-rwxr-x--- 1 root root 4255 Jan 1 00:00 install-su.sh
lrwxrwxrwx 1 root root 7 Jan 1 00:00 kill -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 killall -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 killall5 -> busybox
-rwxr-x--- 1 root root 409 Jan 1 00:00 killrecovery.sh
lrwxrwxrwx 1 root root 7 Jan 1 00:00 length -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 less -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 ln -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 losetup -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 ls -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 lsattr -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 lsmod -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 lspci -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 lsusb -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 lzcat -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 lzop -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 lzopcat -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 make_ext4fs -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 makedevs -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 md5sum -> busybox
-rwxr-x--- 1 root root 324744 Jan 1 00:00 minivold
lrwxrwxrwx 1 root root 8 Jan 1 00:00 minizip -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 mkdir -> busybox
-rwxr-x--- 1 root root 201328 Jan 1 00:00 mke2fs
lrwxrwxrwx 1 root root 7 Jan 1 00:00 mkfifo -> busybox
lrwxrwxrwx 1 root root 11 Jan 1 00:00 mkfs.exfat -> mount.exfat
lrwxrwxrwx 1 root root 7 Jan 1 00:00 mkfs.ext2 -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 mknod -> busybox
-rwxr-x--- 1 root root 182084 Jan 1 00:00 mkntfs
lrwxrwxrwx 1 root root 7 Jan 1 00:00 mkswap -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 mktemp -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 mkyaffs2image -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 modinfo -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 modprobe -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 more -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 mount -> busybox
-rwxr-x--- 1 root root 212628 Jan 1 00:00 mount.exfat
lrwxrwxrwx 1 root root 7 Jan 1 00:00 mountpoint -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 mv -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 nanddump -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 nandroid -> recovery
-rwxr-x--- 1 root root 216 Jan 1 00:00 nandroid-md5.sh
lrwxrwxrwx 1 root root 7 Jan 1 00:00 nandwrite -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 newfs_msdos -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 nice -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 nohup -> busybox
-rwxr-x--- 1 root root 329984 Jan 1 00:00 ntfs-3g
lrwxrwxrwx 1 root root 7 Jan 1 00:00 od -> busybox
-rwxr-x--- 1 root root 346680 Jan 1 00:00 parted
lrwxrwxrwx 1 root root 7 Jan 1 00:00 patch -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 pgrep -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 pidof -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 pigz -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 pkill -> busybox
-rwxr-x--- 1 root root 248 Jan 1 00:00 postrecoveryboot.sh
lrwxrwxrwx 1 root root 7 Jan 1 00:00 printenv -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 printf -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 ps -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 pstree -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 pwd -> busybox
-rwxr-x--- 1 root root 1344 Jan 1 00:00 raw-backup.sh
lrwxrwxrwx 1 root root 7 Jan 1 00:00 rdev -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 readlink -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 realpath -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 reboot -> recovery
-rwxr-x--- 1 root root 1082380 Jan 1 00:00 recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 renice -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 reset -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 resize -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 rev -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 rm -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 rmdir -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 rmmod -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 run-parts -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 sdcard -> recovery
-rwxr-x--- 1 root root 16529 Jan 1 00:00 sdparted
lrwxrwxrwx 1 root root 7 Jan 1 00:00 sed -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 seq -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 setconsole -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 setprop -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 setserial -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 setsid -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 setup_adbd -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 sh -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 sha1sum -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 sha256sum -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 sha512sum -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 sleep -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 sort -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 split -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 start -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 stat -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 stop -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 strings -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 stty -> busybox
drwxr-x--- 4 root root 0 Jan 1 00:00 supersu
lrwxrwxrwx 1 root root 7 Jan 1 00:00 swapoff -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 swapon -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 sync -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 sysctl -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 tac -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 tail -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 tar -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 tee -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 test -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 time -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 top -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 touch -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 tr -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 true -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 ttysize -> busybox
-rwxr-x--- 1 root root 197364 Jan 1 00:00 tune2fs
lrwxrwxrwx 1 root root 7 Jan 1 00:00 ueventd -> ../init
lrwxrwxrwx 1 root root 7 Jan 1 00:00 umount -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 uname -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 unexpand -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 uniq -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 unix2dos -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 unlzma -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 unlzop -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 unxz -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 unyaffs -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 unzip -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 uptime -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 usleep -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 uudecode -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 uuencode -> busybox
lrwxrwxrwx 1 root root 8 Jan 1 00:00 vdc -> recovery
lrwxrwxrwx 1 root root 8 Jan 1 00:00 volume -> recovery
lrwxrwxrwx 1 root root 7 Jan 1 00:00 watch -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 watchdogd -> ../init
lrwxrwxrwx 1 root root 7 Jan 1 00:00 wc -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 which -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 whoami -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 xargs -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 xzcat -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 yes -> busybox
lrwxrwxrwx 1 root root 7 Jan 1 00:00 zcat -> busybox
-rwxr-x--- 1 root root 132839 Jan 1 00:00 zip
/sbin/supersu:
drwxr-x--- 2 root root 0 Jan 1 00:00 arm
drwxr-x--- 2 root root 0 Jan 1 00:00 common
/sbin/supersu/arm:
-rwxr-x--- 1 root root 113032 Jan 1 00:00 su
/sbin/supersu/common:
-rwxr-x--- 1 root root 55 Jan 1 00:00 99SuperSUDaemon
-rwxr-x--- 1 root root 629 Jan 1 00:00 install-recovery.sh
~ #
radionerd said:
Edit: Stand-by I jumped the gun. I will update after I do the steps right
Thanks Man!
Firmware folder with many Symlink errors
Code:
~ # ls -lR /system/etc/firmware
ls -lR /system/etc/firmware
/system/etc/firmware:
-rw-r--r-- 1 root root 1156 Aug 1 2008 a225_pfp.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 a225_pm4.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 a225p5_pm4.fw
-rw-r--r-- 1 root root 1156 Aug 1 2008 a300_pfp.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 a300_pm4.fw
-rw-r--r-- 1 root root 2212 Aug 1 2008 a330_pfp.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 a330_pm4.fw
-rw-r--r-- 1 root root 16128 Aug 1 2008 cpp_firmware_v1_1_1.fw
-rw-r--r-- 1 root root 16384 Aug 1 2008 cpp_firmware_v1_1_6.fw
-rw-r--r-- 1 root root 16384 Aug 1 2008 cpp_firmware_v1_2_0.fw
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.b00 -> /firmware/image/dtcpip.b00
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.b01 -> /firmware/image/dtcpip.b01
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.b02 -> /firmware/image/dtcpip.b02
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.b03 -> /firmware/image/dtcpip.b03
lrwxrwxrwx 1 root root 26 Jan 4 13:55 dtcpip.mdt -> /firmware/image/dtcpip.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.b00 -> /firmware/image/keymaste.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.b01 -> /firmware/image/keymaste.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.b02 -> /firmware/image/keymaste.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.b03 -> /firmware/image/keymaste.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 keymaste.mdt -> /firmware/image/keymaste.mdt
-rw-r--r-- 1 root root 1156 Aug 1 2008 leia_pfp_470.fw
-rw-r--r-- 1 root root 9220 Aug 1 2008 leia_pm4_470.fw
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.b00 -> /firmware/image/mc_v2.b00
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.b01 -> /firmware/image/mc_v2.b01
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.b02 -> /firmware/image/mc_v2.b02
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.b03 -> /firmware/image/mc_v2.b03
lrwxrwxrwx 1 root root 25 Jan 4 13:55 mc_v2.mdt -> /firmware/image/mc_v2.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.b00 -> /firmware/image/playread.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.b01 -> /firmware/image/playread.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.b02 -> /firmware/image/playread.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.b03 -> /firmware/image/playread.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 playread.mdt -> /firmware/image/playread.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.b00 -> /firmware/image/sec_stor.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.b01 -> /firmware/image/sec_stor.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.b02 -> /firmware/image/sec_stor.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.b03 -> /firmware/image/sec_stor.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sec_stor.mdt -> /firmware/image/sec_stor.mdt
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.b00 -> /firmware/image/skm.b00
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.b01 -> /firmware/image/skm.b01
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.b02 -> /firmware/image/skm.b02
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.b03 -> /firmware/image/skm.b03
lrwxrwxrwx 1 root root 23 Jan 4 13:55 skm.mdt -> /firmware/image/skm.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.b00 -> /firmware/image/sshdcpap.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.b01 -> /firmware/image/sshdcpap.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.b02 -> /firmware/image/sshdcpap.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.b03 -> /firmware/image/sshdcpap.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 sshdcpap.mdt -> /firmware/image/sshdcpap.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.b00 -> /firmware/image/tima_atn.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.b01 -> /firmware/image/tima_atn.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.b02 -> /firmware/image/tima_atn.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.b03 -> /firmware/image/tima_atn.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_atn.mdt -> /firmware/image/tima_atn.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.b00 -> /firmware/image/tima_key.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.b01 -> /firmware/image/tima_key.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.b02 -> /firmware/image/tima_key.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.b03 -> /firmware/image/tima_key.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_key.mdt -> /firmware/image/tima_key.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.b00 -> /firmware/image/tima_lkm.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.b01 -> /firmware/image/tima_lkm.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.b02 -> /firmware/image/tima_lkm.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.b03 -> /firmware/image/tima_lkm.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_lkm.mdt -> /firmware/image/tima_lkm.mdt
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.b00 -> /firmware/image/tima_pkm.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.b01 -> /firmware/image/tima_pkm.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.b02 -> /firmware/image/tima_pkm.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.b03 -> /firmware/image/tima_pkm.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 tima_pkm.mdt -> /firmware/image/tima_pkm.mdt
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b00 -> /firmware/image/venus.b00
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b01 -> /firmware/image/venus.b01
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b02 -> /firmware/image/venus.b02
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b03 -> /firmware/image/venus.b03
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.b04 -> /firmware/image/venus.b04
lrwxrwxrwx 1 root root 25 Jan 4 13:55 venus.mdt -> /firmware/image/venus.mdt
drwxr-xr-x 2 root root 4096 Jan 4 13:55 wcd9320
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.b00 -> /firmware/image/widevine.b00
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.b01 -> /firmware/image/widevine.b01
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.b02 -> /firmware/image/widevine.b02
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.b03 -> /firmware/image/widevine.b03
lrwxrwxrwx 1 root root 28 Jan 4 13:55 widevine.mdt -> /firmware/image/widevine.mdt
/system/etc/firmware/wcd9320:
lrwxrwxrwx 1 root root 25 Jan 4 13:55 wcd9320_mbhc.bin -> /data/misc/audio/mbhc.bin
~ #
Click to expand...
Click to collapse
These are HLOS applications from your NON-HLOS image. What's really interesting is the dates on these files. Can you do a dd backup of your NON-HLOS partition? I haven't seen a release from JAN 28 yet...
I know su and busybox are present in sbin. However whether or not busybox is properly linked to /system upon boot remains to be seen. Is there a particular reason your adverse to following my recommendations on usinf the playstore etc? Just wondering...regardless of what sbin shows the fact is that sh and su dont have the proper permissions.
Sent from my SCH-I545 using XDA Premium 4 mobile app
Surge1223 said:
I know su and busybox are present in sbin. However whether or not busybox is properly linked to /system upon boot remains to be seen. Is there a particular reason your adverse to following my recommendations on usinf the playstore etc? Just wondering...regardless of what sbin shows the fact is that sh and su dont have the proper permissions.
Sent from my SCH-I545 using XDA Premium 4 mobile app
Click to expand...
Click to collapse
Surge,
Not at all, I totally appreciate your help, I'm stuck without it. I just don't know how I can install it, or run it for that matter all I have is recovery mode. I have SDK. Can it run in recovery mode?
Thanks Man!
radionerd said:
Surge,
Not at all, I totally appreciate your help, I'm stuck without it. I just don't know how I can install it, or run it for that matter all I have is recovery mode. I have SDK. Can it run in recovery mode?
Thanks Man!
Click to expand...
Click to collapse
What happens if you open the google playstore then search for Supersu, select it and select update? Then search for busybox and try install a busybox app?
Sent from my SCH-I545 using XDA Premium 4 mobile app
Surge1223 said:
What happens if you open the google playstore then search for Supersu, select it and select update? Then search for busybox and try install a busybox app?
Sent from my SCH-I545 using XDA Premium 4 mobile app
Click to expand...
Click to collapse
I don't know how to get the apk into my bricked phone.???
I have installed supersu ver193.zip from Philz CWM recovery (It's in my external SD). Also tried the cwm superSU that is imbedded in Philz recovery. Neither allow me to run su. I get" /sbin/sh: $: not found". I must be missing something on googleplay. Can I download the apk to my computer, then sideload it?
~ # $ su
$ su
/sbin/sh: $: not found
Click to expand...
Click to collapse
When I get home from work I will try again.
Thanks for you patience.
It boots
Surge1223,
I decided to throw the latest AOKP T-mobile Rom at my Note 3. It has the latest busybox, and fresh superSU. So I wiped and dropped it in. My phone is now booting up completely. I have lost my MEID, but it's up and running! I think I'm out of the woods
I get FC reboot after a a few minutes when not in airplane mode.
Full backup done, gonna try to put my partial /efs folder in and see what happens.
Thank You for helping me!
AOKP cleaned up, partial logcat attached.
Code:
I/start ( 329): A wise man never plays leapfrog with a unicorn
I/irsc_util( 354): irsc tool created:0x2a003020
I/irsc_util( 354): Starting irsc tool
I/irsc_util( 354): Trying to open sec config file
I/installd( 348): installd firing up
I/DEBUG ( 341): debuggerd: Feb 16 2014 01:28:06
I/irsc_util( 354): file_parser Number of element :0
I/irsc_util( 354): file_parser Invalid Format or Comment - '/* IPC Security Config */
I/irsc_util( 354): '
I/irsc_util( 354): file_parser Number of element :0
I/irsc_util( 354): file_parser Invalid Format or Comment - '/* <GPS QMI Service ID - 16>:<GPS QMI Instance ID - all instances>:<Client Group ID> */
I/irsc_util( 354): '
I/irsc_util( 354): file_parser Number of element :4
I/irsc_util( 354): file_parser Number of element :0
I/irsc_util( 354): file_parser Invalid Format or Comment - '/* IPC Security Config */
I/irsc_util( 354): '
I/irsc_util( 354): file_parser Number of element :0
I/irsc_util( 354): file_parser Invalid Format or Comment - '/* <GPS QMI Service ID - 16>:<GPS QMI Instance ID - all instances>:<Client Group ID> */
I/irsc_util( 354): '
I/irsc_util( 354): file_parser Number of element :4
I/irsc_util( 354): Feed the sec config info to the router
I/irsc_util( 354): Num of entries:1
I/run-parts( 325): vm.dirty_ratio = 90
I/run-parts( 325): vm.oom_kill_allocating_task = 0
I/run-parts( 325): vm.swappiness = 0
I/run-parts( 325): vm.vfs_cache_pressure = 20
I/macloader( 356): Writing murata to /data/.cid.info
D/macloader( 356): Setting permissions on /data/.cid.info
--------- beginning of /dev/log/system
I/Vold ( 334): Vold 2.1 (the revenge) firing up
D/Vold ( 334): Volume sdcard1 state changing -1 (Initializing) -> 0 (No-Media)
D/Vold ( 334): Volume usbdisk state changing -1 (Initializing) -> 0 (No-Media)
I/rmt_storage( 367): SoC HW id is 126
I/rmt_storage( 367): No EBR found
I/rmt_storage( 367): Error (-1) parsing MBR partitions
I/rmt_storage( 367): Registering modemst1: 0x4a /boot/modem_fs1
I/rmt_storage( 367): Registering modemst2: 0x4b /boot/modem_fs2
I/rmt_storage( 367): Registering fsg: 0x58 /boot/modem_fsg
I/rmt_storage( 367): Registering ssd: 0x5d ssd
D/Vold ( 334): Volume sdcard1 state changing 0 (No-Media) -> 2 (Pending)
D/DirectVolume( 334): DirectVolume::handlePartitionAdded -> MAJOR 179, MINOR 65, PARTN 1
D/Vold ( 334): Volume sdcard1 state changing 2 (Pending) -> 1 (Idle-Unmounted)
I/rmt_storage( 367): Registering fsc: 0xff /boot/modem_fsc
I/rmt_storage( 367): 5 GPT partitions found
I/run-parts( 325): /data/misc/wifi/wpa_supplicant.conf: No such file or directory
D/QSEECOMD: ( 337): qseecom listener services process entry PPID = 1
E/QSEECOMD: ( 337): Listener: index = 0, hierarchy = 0
E/QSEECOMD: ( 337): Listener: index = 1, hierarchy = 0
D/QSEECOMD: ( 337): Parent qseecom daemon process paused!!
D/QSEECOMD: ( 416): qseecom listener service threads starting!!!
D/QSEECOMD: ( 416): Total listener services to start = 4
E/QSEECOMD: ( 416): Listener: index = 0, hierarchy = 1
E/QSEECOMD: ( 416): Listener: index = 1, hierarchy = 1
E/QSEECOMD: ( 416): Listener: index = 2, hierarchy = 1
I/SELinuxLabel( 415): data is mis-labeled, fixing...
D/QSEECOMD: ( 416): Init dlopen(libdrmtime.so, RTLD_NOW) succeeds
D/QSEECOMD: ( 416): Init::Init dlsym(g_FSHandle atime_start) succeeds
D/QSEECOMAPI: ( 416): QSEECom_register_listener 11 sb_length = 0x5000
D/QSEECOMD: ( 416): Init atime_start ret = 0
D/QSEECOMD: ( 416): time services: Started (Listener ID = 11)
E/QSEECOMD: ( 416): Listener: index = 3, hierarchy = 1
D/QSEECOMD: ( 416): Init dlopen(libdrmfs.so, RTLD_NOW) succeeds
D/QSEECOMD: ( 416): Init::Init dlsym(g_FSHandle fs_start) succeeds
D/QSEECOMAPI: ( 416): QSEECom_register_listener 10 sb_length = 0x5000
D/QSEECOMD: ( 416): Init fs_start ret = 0
D/QSEECOMD: ( 416): file system services: Started (Listener ID = 10)
D/QSEECOMD: ( 416): QSEECOM DAEMON RUNNING
I/Netd ( 340): Netd 1.0 starting
I/SELinuxLabel( 428): /data relabel starting...
E/ThermalEngine( 338): Thermal daemon started
E/ThermalEngine( 338): devices_manager_init: Init
D/QC-time-services( 364): Daemon:genoff_pre_init::Base = 0
D/QC-time-services( 364): Daemon:ats_rtc_init: Time read from RTC -- year = 70, month = 0,day = 5
E/ThermalEngine( 338): Number of gpus :1
E/ThermalEngine( 338): Number of cpus :4
I/ThermalEngine( 338): vdd_rstr_init: Init KTM VDD RSTR enabled: 0
E/ThermalEngine( 338): sensors_manager_init: Init
E/ThermalEngine( 338): BCL sensors setup done.
E/ThermalEngine( 338): Loading config file for virtual sensor
E/ThermalEngine( 338): Algo Type 'monitor'
E/ThermalEngine( 338): Threshold 0 Action[0] : shutdown
E/ThermalEngine( 338): Threshold 0 Action Info[0] : 70
E/ThermalEngine( 338): Algo Type 'monitor'
E/ThermalEngine( 338): Threshold 0 Action[0] : shutdown
E/ThermalEngine( 338): Threshold 0 Action Info[0] : 70
E/ThermalEngine( 338): Algo Type 'monitor'
E/ThermalEngine( 338): Threshold 0 Action[0] : shutdown
E/ThermalEngine( 338): Threshold 0 Action Info[0] : 70
E/ThermalEngine( 338): Algo Type 'monitor'
E/ThermalEngine( 338): Threshold 0 Action[0] : shutdown
E/ThermalEngine( 338): Threshold 0 Action Info[0] : 70
E/ThermalEngine( 338): parse_section: algo_type field not first field in section
E/ThermalEngine( 338): parse_section: algo_type field not first field in section
E/ThermalEngine( 338): Algo Type 'ss'
E/ThermalEngine( 338): Algo Type 'ss'
E/ThermalEngine( 338): Algo Type 'ss'
E/ThermalEngine( 338): Algo Type 'ss'
E/ThermalEngine( 338): Algo Type 'ss'
E/ThermalEngine( 338): virtual_sensors_init: Error getting virtual sensors set
E/ThermalEngine( 338): Algo Type 'monitor'
E/ThermalEngine( 338): Threshold 0 Action[0] : shutdown
E/ThermalEngine( 338): Threshold 0 Action Info[0] : 70
E/ThermalEngine( 338): Algo Type 'monitor'
E/ThermalEngine( 338): Threshold 0 Action[0] : shutdown
E/ThermalEngine( 338): Threshold 0 Action Info[0] : 70
E/ThermalEngine( 338): Algo Type 'monitor'
E/ThermalEngine( 338): Threshold 0 Action[0] : shutdown
E/ThermalEngine( 338): Threshold 0 Action Info[0] : 70
E/ThermalEngine( 338): Algo Type 'monitor'
E/ThermalEngine( 338): Threshold 0 Action[0] : shutdown
E/ThermalEngine( 338): Threshold 0 Action Info[0] : 70
E/ThermalEngine( 338): Disable section PID-CPU0
E/ThermalEngine( 338): Ignoring unknown field '1'
E/ThermalEngine( 338): Disable section PID-CPU1
E/ThermalEngine( 338): Ignoring unknown field '1'
E/ThermalEngine( 338): Disable section PID-CPU2
E/ThermalEngine( 338): Ignoring unknown field '1'
E/ThermalEngine( 338): Disable section PID-CPU3
E/ThermalEngine( 338): Ignoring unknown field '1'
E/ThermalEngine( 338): Disable section PID-POPMEM
E/ThermalEngine( 338): Ignoring unknown field '1'
E/ThermalEngine( 338): Algo Type 'ss'
E/ThermalEngine( 338): Algo Type 'ss'
E/ThermalEngine( 338): Algo Type 'ss'
E/ThermalEngine( 338): Algo Type 'ss'
E/ThermalEngine( 338): Algo Type 'ss'
E/ThermalEngine( 338): pid_algo_init: Entry Disabled PID-POPMEM.
E/ThermalEngine( 338): pid_algo_init: Entry Disabled PID-CPU3.
E/ThermalEngine( 338): pid_algo_init: Entry Disabled PID-CPU2.
E/ThermalEngine( 338): pid_algo_init: Entry Disabled PID-CPU1.
E/ThermalEngine( 338): pid_algo_init: Entry Disabled PID-CPU0.
E/ThermalEngine( 338): pid_algo_init: No PID's to configured.
E/ThermalEngine( 338): sensors_setup: tm_cnt 29
E/ThermalEngine( 338): sensors_setup: TM Id VDD_DIG_SWMODE_MONITOR-TSENS10 Sensor tsens_tz_sensor10 num_thresholds 1
E/ThermalEngine( 338): sensors_setup: TM Id VDD_DIG_SWMODE_MONITOR-TSENS9 Sensor tsens_tz_sensor9 num_thresholds 1
E/ThermalEngine( 338): sensors_setup: TM Id CPU1_MONITOR Sensor cpu1 num_thresholds 1
E/ThermalEngine( 338): sensors_setup: TM Id CPU0_MONITOR Sensor cpu0 num_thresholds 1
E/ThermalEngine( 338): enable_threshold: tsens_tz_sensor10 (/sys/devices/virtual/thermal/thermal_zone10/trip_point_0_type)
E/ThermalEngine( 338): enable_threshold: tsens_tz_sensor8 (/sys/devices/virtual/thermal/thermal_zone8/trip_point_0_type)
I/ThermalEngine( 338): vdd_restrict_qmi_request: MODEM req level(0) is recorded and waiting for completing QMI registration
I/ThermalEngine( 338): vdd_restrict_qmi_request: ADSP req level(0) is recorded and waiting for completing QMI registration
I/ThermalEngine( 338): vdd_dig_sw_mode_ktm_disable_cb: write out 0
I/ThermalEngine( 338): hotplug_ktm_disable_cb: write out 0
E/ThermalEngine( 338): hotplug_ktm_disable_cb: CPU 1 Failed attempt to sync up with MP Desc.
E/ThermalEngine( 338): hotplug_ktm_disable_cb: CPU 2 Failed attempt to sync up with MP Desc.
E/ThermalEngine( 338): hotplug_ktm_disable_cb: CPU 3 Failed attempt to sync up with MP Desc.
D/QC-time-services( 364): Daemon:Value read from RTC seconds = 412594000
D/QC-time-services( 364): Daemon:genoff_modem_qmi_init: Initiallizing QMI
I/SurfaceFlinger( 343): SurfaceFlinger is starting
I/SurfaceFlinger( 343): SurfaceFlinger's main thread ready to run. Initializing graphics H/W...
D/libEGL ( 343): loaded /vendor/lib/egl/libEGL_adreno.so
D/AudioDaemon( 366): Opening sound card state : /proc/asound/card0/state
D/AudioDaemon( 366): read for sound card state change before while
D/AudioDaemon( 366): sound card state file content: ONLINE
D/AudioDaemon( 366): * before while
E/AudioDaemon( 366): put cur_state to online
D/AudioDaemon( 366): cur_state=0, bootup_complete=0
E/AudioDaemon( 366): sound card up is deteced before while
E/AudioDaemon( 366): bootup_complete set to 1
D/AudioDaemon( 366): poll() for sound card state change
D/libEGL ( 343): loaded /vendor/lib/egl/libGLESv1_CM_adreno.so
I/mediaserver( 347): ServiceManager: 0x2a00b460
I/AudioFlinger( 347): Using default 3000 mSec as standby time.
E/MediaPlayerFactory( 347): calling dlopen on FACTORY_LIB
E/MediaPlayerFactory( 347): Failed to open FACTORY_LIB Error : dlopen failed: library "libdashplayer.so" not found
I/CameraService( 347): CameraService started (pid=347)
D/libEGL ( 343): loaded /vendor/lib/egl/libGLESv2_adreno.so
I/SELinuxLabel( 530): /data relabel complete
I/SELinuxLabel( 533): /cache relabel starting...
I/Adreno-EGL( 343): <qeglDrvAPI_eglInitialize:385>: EGL 1.4 QUALCOMM build: AU_LINUX_ANDROID_KK_3.5_RB1.04.04.00.006.055_msm8974_KK_3.5_RB1__release_AU ()
I/Adreno-EGL( 343): OpenGL ES Shader Compiler Version: E031.24.00.02
I/Adreno-EGL( 343): Build Date: 12/11/13 Wed
I/Adreno-EGL( 343): Local Branch: mybranch2105762
I/Adreno-EGL( 343): Remote Branch: quic/kk_3.5_rb1.15
I/Adreno-EGL( 343): Local Patches: NONE
I/Adreno-EGL( 343): Reconstruct Branch: AU_LINUX_ANDROID_KK_3.5_RB1.04.04.00.006.055 + NOTHING
I/SELinuxLabel( 549): /cache relabel complete
I/qdutils ( 343): Right Split=0
W/qdcopybit( 343): open_copybit i = 0 surface_id=704702740
W/qdcopybit( 343): open_copybit i = 1 surface_id=704703032
W/qdcopybit( 343): open_copybit i = 2 surface_id=704703324
W/qdcopybit( 343): open_copybit i = 31 surface_id=704712048
W/qdcopybit( 343): open_copybit: 2 Plane YUV i=0 surface_id=704712640
W/qdcopybit( 343): open_copybit: 2 Plane YUV i=1 surface_id=704712936
W/qdcopybit( 343): open_copybit: 2 Plane YUV i=2 surface_id=704713232
W/qdcopybit( 343): open_copybit: 2 Plane YUV i=3 surface_id=704713528
W/qdcopybit( 343): open_copybit: 3 Plane YUV i=0 surface_id=704714120
D/qdhwcomposer( 343): int qhwc::adRead(): /sys/class/graphics/fb2/ad could not be opened : No such file or directory
I/qdhwcomposer( 343): Initializing Qualcomm Hardware Composer
I/qdhwcomposer( 343): MDP version: 500
I/SurfaceFlinger( 343): Using composer version 1.3
I/qdhwcomposer( 343): hwc_registerProcs
I/qdhwcomposer( 343): Initializing UEVENT Thread
I/qdhwcomposer( 343): Initializing VSYNC Thread
D/qdhwcomposer( 343): hwc_getDisplayAttributes disp = 0, width = 1080
D/qdhwcomposer( 343): hwc_getDisplayAttributes disp = 0, height = 1920
I/SurfaceFlinger( 343): EGL informations:
I/SurfaceFlinger( 343): vendor : Android
I/SurfaceFlinger( 343): version : 1.4 Android META-EGL
I/SurfaceFlinger( 343): extensions: EGL_KHR_get_all_proc_addresses EGL_ANDROID_presentation_time EGL_KHR_image EGL_KHR_image_base EGL_KHR_lock_surface EGL_KHR_gl_texture_2D_image EGL_KHR_gl_texture_cubemap_image EGL_KHR_gl_renderbuffer_image EGL_KHR_fence_sync EGL_KHR_create_context EGL_EXT_create_context_robustness EGL_ANDROID_image_native_buffer EGL_KHR_wait_sync EGL_ANDROID_recordable
I/SurfaceFlinger( 343): Client API: OpenGL_ES
I/SurfaceFlinger( 343): EGLSurface: 8-8-8-8, config=0x5
I/qdhwcomposer( 343): vsync_loop: Reading vsync for dpy=0 from /sys/class/graphics/fb0/vsync_event
I/qdhwcomposer( 343): vsync_loop: Reading vsync for dpy=1 from /sys/class/graphics/fb1/vsync_event
E/mm-camera( 357): server_process_module_init:59, int mods
E/mm-camera-sensor( 357): module_sensor_init:4420 Enter
E/mm-camera-sensor( 357): sensor_init_probe:299 Done enumerating media entities
E/mm-camera-sensor( 357): sensor_init_probe:276 Done enumerating media devices
E/mm-camera-sensor( 357): [mm]read_EEPROM_header_version:385 EEPROM HEADER: core_version(0x44) resolution(0x31 0x33) isp(0x51) sensor_maker(0x53)
E/mm-camera-sensor( 357): [mm]read_EEPROM_header_version:387 EEPROM HEADER: year(0x47) month(0x46) iter(0x30 0x31)
E/mm-camera-sensor( 357): [mm]read_EEPROM_header_version:393 [FW_DBG] EEPROM HEADER: D 13 Q S G F 01 O A
E/mm-camera( 357): isp_util_gen_hws_caps: integrating kernel vfe is pending
I/SurfaceFlinger( 343): OpenGL ES informations:
I/SurfaceFlinger( 343): vendor : Qualcomm
I/SurfaceFlinger( 343): renderer : Adreno (TM) 330
I/SurfaceFlinger( 343): version : OpenGL ES 3.0 [email protected] [email protected] ([email protected])
I/SurfaceFlinger( 343): extensions: GL_AMD_compressed_ATC_texture GL_AMD_performance_monitor GL_AMD_program_binary_Z400 GL_EXT_debug_label GL_EXT_debug_marker GL_EXT_discard_framebuffer GL_EXT_robustness GL_EXT_texture_format_BGRA8888 GL_EXT_texture_type_2_10_10_10_REV GL_NV_fence GL_OES_compressed_ETC1_RGB8_texture GL_OES_depth_texture GL_OES_depth24 GL_OES_EGL_image GL_OES_EGL_image_external GL_OES_element_index_uint GL_OES_fbo_render_mipmap GL_OES_fragment_precision_high GL_OES_get_program_binary GL_OES_packed_depth_stencil GL_OES_depth_texture_cube_map GL_OES_rgb8_rgba8 GL_OES_standard_derivatives GL_OES_texture_3D GL_OES_texture_float GL_OES_texture_half_float GL_OES_texture_half_float_linear GL_OES_texture_npot GL_OES_vertex_half_float GL_OES_vertex_type_10_10_10_2 GL_OES_vertex_array_object GL_QCOM_alpha_test GL_QCOM_binning_control GL_QCOM_driver_control GL_QCOM_perfmon_global_mode GL_QCOM_extended_get GL_QCOM_extended_get2 GL_QCOM_tiled_rendering GL_QCOM_writeonly_rendering GL_EXT_sRGB GL_EXT_sRGB_write_control GL_EXT_text
I/SurfaceFlinger( 343): GL_MAX_TEXTURE_SIZE = 4096
I/SurfaceFlinger( 343): GL_MAX_VIEWPORT_DIMS = 4096
E/mm-camera( 357): isp_resource_mgr_init: IN num_isps = 2
E/mm-camera( 357): isp_set_info: num_isps = 2
E/mm-camera( 357): cpp_module_init:49 name=cpp
D/SurfaceFlinger( 343): Screen acquired, type=0 flinger=0x2a007450
D/qdhwcomposer( 343): hwc_blank: Unblanking display: 0
D/qdhwcomposer( 343): hwc_blank: Done unblanking display: 0
E/qdhwcomposer( 343): hwc_vsync_control: vsync control failed. Dpy=0, enable=1 : Operation not supported on transport endpoint
E/SurfaceFlinger( 343): eventControl(0, 1) failed Operation not supported on transport endpoint
E/mm-camera( 357): cpp_hardware_load_firmware:359, cpphw->hwinfo.version = 0x10010000
D/qdutils ( 343): DEBUG_CALC_FPS: 0
D/qdutils ( 343): period: 10
D/qdutils ( 343): ignorethresh_us: 500000
D/libEGL ( 605): loaded /vendor/lib/egl/libEGL_adreno.so
D/libEGL ( 605): loaded /vendor/lib/egl/libGLESv1_CM_adreno.so
D/AndroidRuntime( 344):
D/AndroidRuntime( 344): >>>>>> AndroidRuntime START com.android.internal.os.ZygoteInit <<<<<<
D/libEGL ( 605): loaded /vendor/lib/egl/libGLESv2_adreno.so
D/AndroidRuntime( 344): CheckJNI is OFF
I/Adreno-EGL( 605): <qeglDrvAPI_eglInitialize:385>: EGL 1.4 QUALCOMM build: AU_LINUX_ANDROID_KK_3.5_RB1.04.04.00.006.055_msm8974_KK_3.5_RB1__release_AU ()
I/Adreno-EGL( 605): OpenGL ES Shader Compiler Version: E031.24.00.02
I/Adreno-EGL( 605): Build Date: 12/11/13 Wed
I/Adreno-EGL( 605): Local Branch: mybranch2105762
I/Adreno-EGL( 605): Remote Branch: quic/kk_3.5_rb1.15
I/Adreno-EGL( 605): Local Patches: NONE
I/Adreno-EGL( 605): Reconstruct Branch: AU_LINUX_ANDROID_KK_3.5_RB1.04.04.00.006.055 + NOTHING
E/mm-camera( 357): cpp_module_init:90: info: CPP module_init successful
E/mm-camera( 357): c2d_module_init:28 name=c2d
I/CameraService( 347): Loaded "QCamera Module" camera module
I/AudioPolicyManagerBase( 347): loadAudioPolicyConfig() loaded /system/etc/audio_policy.conf
D/audio_hw_primary( 347): adev_open: enter
D/dalvikvm( 344): Unable to stat classpath element '/system/framework/qcom.fmradio.jar'
D/dalvikvm( 344): Trying to load lib libjavacore.so 0x0
D/dalvikvm( 344): Added shared lib libjavacore.so 0x0
D/dalvikvm( 344): Trying to load lib libnativehelper.so 0x0
D/dalvikvm( 344): Added shared lib libnativehelper.so 0x0
D/dalvikvm( 344): No JNI_OnLoad found in libnativehelper.so 0x0, skipping init
D/dalvikvm( 344): Note: class Landroid/app/ActivityManagerNative; has 179 unimplemented (abstract) methods
E/audio_route( 347): value id out of range for mixer ctl 'Voice Tx Mute'
E/audio_route( 347): Control 'SLIMBUS_0_RX Port Mixer INT_BT_SCO_TX' doesn't exist - skipping
E
E/audio_route( 347): Control 'QCHAT_Tx Mixer SLIM_0_TX_QCHAT' doesn't exist - skipping
E/QMI_FW ( 364): QMUXD: WARNING qmi_qmux_if_pwr_up_init failed! rc=-1
E/QMI_FW ( 364): QMUXD: WARNING qmi_qmux_if_pwr_up_init failed! rc=-1
E/QMI_FW ( 364): QMUXD: WARNING qmi_qmux_if_pwr_up_init failed! rc=-1
E/QMI_FW ( 364): QMUXD: WARNING qmi_qmux_if_pwr_up_init failed! rc=-1
E/QMI_FW ( 364): QMUXD: WARNING qmi_qmux_if_pwr_up_init failed! rc=-1
E/QMI_FW ( 364): QMUXD: WARNING qmi_qmux_if_pwr_up_init failed! rc=-1
E/QC-time-services( 364): Daemon:genoff_modem_qmi_init: qmi_client_get_service_list returned -2num_services 0
E/audio_route( 347): Control 'RX4 DSM MUX' doesn't exist - skipping
E/audio_route( 347): Control 'RX6 DSM MUX' doesn't exist - skipping
E/audio_route( 347): Control 'MAD Input' doesn't exist - skipping
D/msm8974_platform( 347): platform_init: Opened sound card:0
E/msm8974_platform( 347): platform_init: Could not find the symbol acdb_loader_reload_vocvoltable from libacdbloader.so
D/ACDB-LOADER( 347): ACDB -> ACDB_CMD_INITIALIZE_V2
D/ ( 347): [ACDB Command]->SW Minor/Major version mismatch warning /etc/Bluetooth_cal.acdb
D/ ( 347): [ACDB Command]->ACDB Sw Major = 2, ACDB Sw Minor = 1
D/ ( 347): [ACDB Command]->ACDB File Major = 1, ACDB File Minor = 2
D/ ( 347): [ACDB Command]->SW Minor/Major version mismatch warning /etc/General_cal.acdb
D/ ( 347): [ACDB Command]->ACDB Sw Major = 2, ACDB Sw Minor = 1
D/ ( 347): [ACDB Command]->ACDB File Major = 1, ACDB File Minor = 2
D/ ( 347): [ACDB Command]->SW Minor/Major version mismatch warning /etc/Global_cal.acdb
D/ ( 347): [ACDB Command]->ACDB Sw Major = 2, ACDB Sw Minor = 1
D/ ( 347): [ACDB Command]->ACDB File Major = 1, ACDB File Minor = 2
D/ ( 347): [ACDB Command]->SW Minor/Major version mismatch warning /etc/Handset_cal.acdb
D/ ( 347): [ACDB Command]->ACDB Sw Major = 2, ACDB Sw Minor = 1
D/ ( 347): [ACDB Command]->ACDB File Major = 1, ACDB File Minor = 2
D/ ( 347): [ACDB Command]->SW Minor/Major version mismatch warning /etc/Hdmi_cal.acdb
D/ ( 347): [ACDB Command]->ACDB Sw Major = 2, ACDB Sw Minor = 1
D/ ( 347): [ACDB Command]->ACDB File Major = 1, ACDB File Minor = 2
D/ ( 347): [ACDB Command]->SW Minor/Major version mismatch warning /etc/Headset_cal.acdb
D/ ( 347): [ACDB Command]->ACDB Sw Major = 2, ACDB Sw Minor = 1
D/ ( 347): [ACDB Command]->ACDB File Major = 1, ACDB File Minor = 2
D/ ( 347): [ACDB Command]->SW Minor/Major version mismatch warning /etc/Speaker_cal.acdb
D/ ( 347): [ACDB Command]->ACDB Sw Major = 2, ACDB Sw Minor = 1
D/ ( 347): [ACDB Command]->ACDB File Major = 1, ACDB File Minor = 2
D/ACDB-LOADER( 347): ACDB -> ACPH INIT
D/ ( 347): [ACPH]->Online service registered with ACPH
D/ ( 347): [ACPH]->ACPH init success
D/ACDB-LOADER( 347): ACDB -> RTAC INIT
D/ ( 347): [ACPH]->DSP RTC service registered with ACPH
D/ACDB-LOADER( 347): ACDB -> ADIE RTAC INIT
D/ ( 347): [ACPH]->ADIE RTC service registered with ACPH
D/ACDB-LOADER( 347): No existing ION info in ACDB driver
D/ACDB-LOADER( 347): ACDB -> ION_IOC_ALLOC
D/ACDB-LOADER( 347): ACDB -> ION_IOC_SHARE
D/ACDB-LOADER( 347): ACDB -> MMAP ADDR
D/ACDB-LOADER( 347): ACDB -> register MEM to ACDB driver: 0xb4f93000
I/rmt_storage( 367): rmt_storage_connect_cb: clnt_h=0x1 conn_h=0x2a006fd8
I/rmt_storage( 367): rmt_storage_open_cb: /boot/modem_fs1: clnt_h=0x1: req_h=0x1 msg_id=1: Client found
D/ACDB-LOADER( 347): ACDB -> send_asm_topology
D/ACDB-LOADER( 347): ACDB -> ACDB_CMD_GET_AUDPROC_STREAM_TOPOLOGY_ID
I/rmt_storage( 367): rmt_storage_open_cb: /boot/modem_fs1: clnt_h=0x1: req_h=0x1 msg_id=1: Send response: res=0 err=0
I/rmt_storage( 367): rmt_storage_client_thread: /boot/modem_fs1: clnt_h=0x1 Worker thread started
I/rmt_storage( 367): wake lock name: rmt_storage_704672024, name creation success: 21
D/ACDB-LOADER( 347): ACDB -> send_adm_custom_topology
D/ACDB-LOADER( 347): ACDB -> ACDB_CMD_GET_AUDIO_COPP_TOPOLOGIES
D/ACDB-LOADER( 347): ACDB -> AUDIO_SET_ADM_CUSTOM_TOPOLOGY
D/ACDB-LOADER( 347): ACDB -> send_asm_custom_topology
D/ACDB-LOADER( 347): ACDB -> ACDB_CMD_GET_AUDIO_POPP_TOPOLOGIES
D/ ( 347): ACDBFILE_MGR: Property for the pid 00012E48 not found
D/ ( 347): ACDB_COMMAND: Failed to fetch the property info for pid 00012E48
E/ACDB-LOADER( 347): Error: ACDB get asm topologies returned = -18
D/ACDB-LOADER( 347): ACDB -> AUDIO_SET_ASM_CUSTOM_TOPOLOGY
D/ACDB-LOADER( 347): send mbhc data
I/rmt_storage( 367): rmt_storage_connect_cb: clnt_h=0x2 conn_h=0x2a007030
I/rmt_storage( 367): rmt_storage_open_cb: /boot/modem_fs2: clnt_h=0x2: req_h=0x2 msg_id=1: Client found
I/rmt_storage( 367): rmt_storage_open_cb: /boot/modem_fs2: clnt_h=0x2: req_h=0x2 msg_id=1: Send response: res=0 err=0
I/rmt_storage( 367): rmt_storage_client_thread: /boot/modem_fs2: clnt_h=0x2 Worker thread started
I/rmt_storage( 367): wake lock name: rmt_storage_704672872, name creation success: 21
I/rmt_storage( 367): rmt_storage_connect_cb: clnt_h=0x3 conn_h=0x2a007088
I/rmt_storage( 367): rmt_storage_open_cb: /boot/modem_fsg: clnt_h=0x3: req_h=0x3 msg_id=1: Client found
I/rmt_storage( 367): rmt_storage_open_cb: /boot/modem_fsg: clnt_h=0x3: req_h=0x3 msg_id=1: Send response: res=0 err=0
I/rmt_storage( 367): rmt_storage_client_thread: /boot/modem_fsg: clnt_h=0x3 Worker thread started
I/rmt_storage( 367): wake lock name: rmt_storage_704673456, name creation success: 21
I/rmt_storage( 367): rmt_storage_connect_cb: clnt_h=0x4 conn_h=0x2a0070e0
I/rmt_storage( 367): rmt_storage_open_cb: /boot/modem_fsc: clnt_h=0x4: req_h=0x4 msg_id=1: Client found
I/rmt_storage( 367): rmt_storage_open_cb: /boot/modem_fsc: clnt_h=0x4: req_h=0x4 msg_id=1: Send response: res=0 err=0
I/rmt_storage( 367): rmt_storage_client_thread: /boot/modem_fsc: clnt_h=0x4 Worker thread started
I/rmt_storage( 367): wake lock name: rmt_storage_704674040, name creation success: 21
I/rmt_storage( 367): rmt_storage_alloc_buff_cb: /boot/modem_fs1: clnt_h=0x1: req_h=0x5 msg_id=4: Alloc request received: Size: 1572864
I/rmt_storage( 367): rmt_storage_alloc_buff_cb: /boot/modem_fs1: clnt_h=0x1: req_h=0x5 msg_id=4: Send response: res=0 err=0
I/rmt_storage( 367): rmt_storage_rw_iovec_cb: /boot/modem_fsg: clnt_h=0x3: req_h=0x6 msg_id=3: R/W request received
I/rmt_storage( 367): Shared mem address set to 0xb688d000
I/rmt_storage( 367): wakelock acquired: 1, error no: 2
I/rmt_storage( 367): rmt_storage_client_thread: /boot/modem_fsg: clnt_h=0x3 Unblock worker thread (th_id: 704673456)
I/rmt_storage( 367): rmt_storage_client_thread: /boot/modem_fsg: clnt_h=0x3: req_h=0x6 msg_id=3: Bytes read = 512
I/rmt_storage( 367): rmt_storage_client_thread: /boot/modem_fsg: clnt_h=0x3: req_h=0x6 msg_id=3: Send response: res=0 err=0
I/rmt_storage( 367): rmt_storage_client_thread: /boot/modem_fsg: clnt_h=0x3 About to block rmt_storage client thread (th_id: 704673456) wakelock released: 1, error no: 0
I/rmt_storage( 367):
D/ACDB-LOADER( 347): ACDB -> ACDB_CMD_GET_ANC_SETTING
D/ ( 347): Failed to fetch the lookup information of the device 0000001A
E/ACDB-LOADER( 347): Error: ACDB ANC returned = -1
D/ACDB-LOADER( 347): ACDB -> ACDB_CMD_GET_ANC_SETTING
D/ ( 347): Failed to fetch the lookup information of the device 0000001B
E/ACDB-LOADER( 347): Error: ACDB ANC returned = -1
D/ACDB-LOADER( 347): ACDB -> ACDB_CMD_GET_ANC_SETTING
D/ ( 347): Failed to fetch the lookup information of the device 0000001C
E/ACDB-LOADER( 347): Error: ACDB ANC returned = -1
D/ACDB-LOADER( 347): ACDB -> ACDB_CMD_GET_ANC_SETTING
D/ ( 347): Failed to fetch the lookup information of the device 0000001D
E/ACDB-LOADER( 347): Error: ACDB ANC returned = -1
D/ACDB-LOADER( 347): ACDB -> ACDB_CMD_GET_ANC_SETTING
D/ ( 347): Failed to fetch the lookup information of the device 0000001E
E/ACDB-LOADER( 347): Error: ACDB ANC returned = -1
D/ACDB-LOADER( 347): ACDB -> ACDB_CMD_GET_ANC_SETTING
D/ ( 347): Failed to fetch the lookup information of the device 0000001F
E/ACDB-LOADER( 347): Error: ACDB ANC returned = -1
D/ACDB-LOADER( 347): ACDB -> ACDB_CMD_GET_ANC_SETTING
D/ ( 347): Failed to fetch the lookup information of the device 00000067
E/ACDB-LOADER( 347): Error: ACDB ANC returned = -1
D/ACDB-LOADER( 347): ACDB -> init done!
D/platform_info( 347): platform_info_init: Failed to open /system/etc/audio_platform_info.xml, using defaults.
D/audio_hw_spkr_prot( 347): audio_extn_spkr_prot_init: Initialize speaker protection module
D/audio_hw_spkr_prot( 347): audio_extn_spkr_prot_init: Speaker protection disabled
I/AudioFlinger( 347): loadHwModule() Loaded primary audio interface from QCOM Audio HAL (audio) handle 1
I/AudioFlinger( 347): HAL output buffer size 960 frames, normal mix buffer size 960 frames
I/AudioMixer( 347): found effect "Multichannel Downmix To Stereo" from The Android Open Source Project
I/AudioFlinger( 347): Using module 1 has the primary audio interface
I/AudioFlinger( 347): AudioFlinger's thread 0xb4f52008 ready to run
W/AudioFlinger( 347): Thread AudioOut_2 cannot connect to the power manager service
D/audio_hw_primary( 347): out_set_parameters: enter: usecase(0: deep-buffer-playback) kvpairs: routing=2
D/audio_hw_extn( 347): audio_extn_set_anc_parameters: anc_enabled:0
W/AudioFlinger( 347): Thread AudioOut_2 cannot connect to the power manager service
W/AudioFlinger( 347): Thread AudioOut_2 cannot connect to the power manager service
E/AudioFlinger( 347): no wake lock to update!
I/AudioFlinger( 347): HAL output buffer size 240 frames, normal mix buffer size 960 frames
I/AudioMixer( 347): found effect "Multichannel Downmix To Stereo" from The Android Open Source Project
E/MonoPipe( 347): Failed to fetch local time frequency when constructing a MonoPipe (res = -32). getNextWriteTimestamp calls will be non-functional
I/SamplingProfilerIntegration( 344): Profiling disabled.
I/Zygote ( 344): Preloading classes...
I/rmt_storage( 367): rmt_storage_disconnect_cb: clnt_h=0x0x1 conn_h=0x0x2a006fd8
I/rmt_storage( 367): rmt_storage_disconnect_cb: clnt_h=0x0x2 conn_h=0x0x2a007030
I/rmt_storage( 367): rmt_storage_disconnect_cb: clnt_h=0x0x3 conn_h=0x0x2a007088
I/rmt_storage( 367): rmt_storage_disconnect_cb: clnt_h=0x0x4 conn_h=0x0x2a0070e0
D/TextLayoutCache( 344): Using debug level = 0 - Debug Enabled = 0
I/dalvikvm( 344): threadid=1: recursive native library load attempt (/system/lib/libmedia_jni.so)
D/MtpDeviceJNI( 344): register_android_mtp_MtpDevice
I/dalvikvm( 344): threadid=1: recursive native library load attempt (/system/lib/libmedia_jni.so)
I/dalvikvm( 344): threadid=1: recursive native library load attempt (/system/lib/libmedia_jni.so)
I/dalvikvm( 344): threadid=1: recursive native library load attempt (/system/lib/libmedia_jni.so)
D/MDnsDS ( 340): MDnsSdListener::Hander starting up
D/MDnsDS ( 340): MDnsSdListener starting to monitor
D/MDnsDS ( 340): Going to poll with pollCount 1
I/LibraryLoader( 344): loading: webviewchromium
I/LibraryLoader( 344): loaded: webviewchromium
Related
partition names and partition dump
Hi, i extracted the partition names for you and made a parition dump after unlocking and rooting. I hope you find this helpful. I skipped partition 28 since that is userdata. Where should I host the dumped files? Code: /dev/block/platform/msm_sdcc.1/by-name # ls -al ls -al __bionic_open_tzdata: couldn't find any tzdata when looking for localtime! __bionic_open_tzdata: couldn't find any tzdata when looking for GMT! __bionic_open_tzdata: couldn't find any tzdata when looking for posixrules! drwxr-xr-x 2 root root 620 Jan 22 00:29 . drwxr-xr-x 4 root root 700 Jan 22 00:29 .. lrwxrwxrwx 1 root root 20 Jan 22 00:29 DDR -> /dev/block/mmcblk0p4 lrwxrwxrwx 1 root root 21 Jan 22 00:29 DRIVER -> /dev/block/mmcblk0p23 lrwxrwxrwx 1 root root 21 Jan 22 00:29 LOGO -> /dev/block/mmcblk0p22 lrwxrwxrwx 1 root root 20 Jan 22 00:29 aboot -> /dev/block/mmcblk0p5 lrwxrwxrwx 1 root root 20 Jan 22 00:29 boot -> /dev/block/mmcblk0p7 lrwxrwxrwx 1 root root 21 Jan 22 00:29 cache -> /dev/block/mmcblk0p16 lrwxrwxrwx 1 root root 20 Jan 22 00:29 dbi -> /dev/block/mmcblk0p3 lrwxrwxrwx 1 root root 21 Jan 22 00:29 fsc -> /dev/block/mmcblk0p19 lrwxrwxrwx 1 root root 21 Jan 22 00:29 fsg -> /dev/block/mmcblk0p18 lrwxrwxrwx 1 root root 21 Jan 22 00:29 grow -> /dev/block/mmcblk0p29 lrwxrwxrwx 1 root root 21 Jan 22 00:29 misc -> /dev/block/mmcblk0p21 lrwxrwxrwx 1 root root 20 Jan 22 00:29 modem -> /dev/block/mmcblk0p1 lrwxrwxrwx 1 root root 21 Jan 22 00:29 modemst1 -> /dev/block/mmcblk0p10 lrwxrwxrwx 1 root root 21 Jan 22 00:29 modemst2 -> /dev/block/mmcblk0p11 lrwxrwxrwx 1 root root 21 Jan 22 00:29 oppodycnvbk -> /dev/block/mmcblk0p12 lrwxrwxrwx 1 root root 21 Jan 22 00:29 oppostanvbk -> /dev/block/mmcblk0p13 lrwxrwxrwx 1 root root 20 Jan 22 00:29 pad -> /dev/block/mmcblk0p9 lrwxrwxrwx 1 root root 21 Jan 22 00:29 persist -> /dev/block/mmcblk0p15 lrwxrwxrwx 1 root root 21 Jan 22 00:29 recovery -> /dev/block/mmcblk0p17 lrwxrwxrwx 1 root root 21 Jan 22 00:29 reserve1 -> /dev/block/mmcblk0p24 lrwxrwxrwx 1 root root 21 Jan 22 00:29 reserve2 -> /dev/block/mmcblk0p25 lrwxrwxrwx 1 root root 21 Jan 22 00:29 reserve3 -> /dev/block/mmcblk0p26 lrwxrwxrwx 1 root root 21 Jan 22 00:29 reserve4 -> /dev/block/mmcblk0p27 lrwxrwxrwx 1 root root 20 Jan 22 00:29 rpm -> /dev/block/mmcblk0p6 lrwxrwxrwx 1 root root 20 Jan 22 00:29 sbl1 -> /dev/block/mmcblk0p2 lrwxrwxrwx 1 root root 21 Jan 22 00:29 ssd -> /dev/block/mmcblk0p20 lrwxrwxrwx 1 root root 21 Jan 22 00:29 system -> /dev/block/mmcblk0p14 lrwxrwxrwx 1 root root 20 Jan 22 00:29 tz -> /dev/block/mmcblk0p8 lrwxrwxrwx 1 root root 21 Jan 22 00:29 userdata -> /dev/block/mmcblk0p28 /dev/block/platform/msm_sdcc.1/by-name #
Polarfuchs said: Hi, i extracted the partition names for you and made a parition dump after unlocking and rooting. I hope you find this helpful. I skipped partition 28 since that is userdata. Where should I host the dumped files? Code: /dev/block/platform/msm_sdcc.1/by-name # ls -al ls -al __bionic_open_tzdata: couldn't find any tzdata when looking for localtime! __bionic_open_tzdata: couldn't find any tzdata when looking for GMT! __bionic_open_tzdata: couldn't find any tzdata when looking for posixrules! drwxr-xr-x 2 root root 620 Jan 22 00:29 . drwxr-xr-x 4 root root 700 Jan 22 00:29 .. lrwxrwxrwx 1 root root 20 Jan 22 00:29 DDR -> /dev/block/mmcblk0p4 lrwxrwxrwx 1 root root 21 Jan 22 00:29 DRIVER -> /dev/block/mmcblk0p23 lrwxrwxrwx 1 root root 21 Jan 22 00:29 LOGO -> /dev/block/mmcblk0p22 lrwxrwxrwx 1 root root 20 Jan 22 00:29 aboot -> /dev/block/mmcblk0p5 lrwxrwxrwx 1 root root 20 Jan 22 00:29 boot -> /dev/block/mmcblk0p7 lrwxrwxrwx 1 root root 21 Jan 22 00:29 cache -> /dev/block/mmcblk0p16 lrwxrwxrwx 1 root root 20 Jan 22 00:29 dbi -> /dev/block/mmcblk0p3 lrwxrwxrwx 1 root root 21 Jan 22 00:29 fsc -> /dev/block/mmcblk0p19 lrwxrwxrwx 1 root root 21 Jan 22 00:29 fsg -> /dev/block/mmcblk0p18 lrwxrwxrwx 1 root root 21 Jan 22 00:29 grow -> /dev/block/mmcblk0p29 lrwxrwxrwx 1 root root 21 Jan 22 00:29 misc -> /dev/block/mmcblk0p21 lrwxrwxrwx 1 root root 20 Jan 22 00:29 modem -> /dev/block/mmcblk0p1 lrwxrwxrwx 1 root root 21 Jan 22 00:29 modemst1 -> /dev/block/mmcblk0p10 lrwxrwxrwx 1 root root 21 Jan 22 00:29 modemst2 -> /dev/block/mmcblk0p11 lrwxrwxrwx 1 root root 21 Jan 22 00:29 oppodycnvbk -> /dev/block/mmcblk0p12 lrwxrwxrwx 1 root root 21 Jan 22 00:29 oppostanvbk -> /dev/block/mmcblk0p13 lrwxrwxrwx 1 root root 20 Jan 22 00:29 pad -> /dev/block/mmcblk0p9 lrwxrwxrwx 1 root root 21 Jan 22 00:29 persist -> /dev/block/mmcblk0p15 lrwxrwxrwx 1 root root 21 Jan 22 00:29 recovery -> /dev/block/mmcblk0p17 lrwxrwxrwx 1 root root 21 Jan 22 00:29 reserve1 -> /dev/block/mmcblk0p24 lrwxrwxrwx 1 root root 21 Jan 22 00:29 reserve2 -> /dev/block/mmcblk0p25 lrwxrwxrwx 1 root root 21 Jan 22 00:29 reserve3 -> /dev/block/mmcblk0p26 lrwxrwxrwx 1 root root 21 Jan 22 00:29 reserve4 -> /dev/block/mmcblk0p27 lrwxrwxrwx 1 root root 20 Jan 22 00:29 rpm -> /dev/block/mmcblk0p6 lrwxrwxrwx 1 root root 20 Jan 22 00:29 sbl1 -> /dev/block/mmcblk0p2 lrwxrwxrwx 1 root root 21 Jan 22 00:29 ssd -> /dev/block/mmcblk0p20 lrwxrwxrwx 1 root root 21 Jan 22 00:29 system -> /dev/block/mmcblk0p14 lrwxrwxrwx 1 root root 20 Jan 22 00:29 tz -> /dev/block/mmcblk0p8 lrwxrwxrwx 1 root root 21 Jan 22 00:29 userdata -> /dev/block/mmcblk0p28 /dev/block/platform/msm_sdcc.1/by-name # Click to expand... Click to collapse Duplicate post... See.... http://forum.xda-developers.com/showthread.php?t=2751530
[DEV] Galaxy S6 Partition Layout
Finally got my SIM unlocked S6 (SM-G920I). Here's some useful information for developers. Code: [email protected]:/ $ cat /proc/partitions major minor #blocks name 8 0 31240192 sda 8 1 4096 sda1 8 2 4096 sda2 8 3 20480 sda3 8 4 8192 sda4 8 5 28672 sda5 8 6 34816 sda6 8 7 8192 sda7 8 8 43008 sda8 8 9 1024 sda9 8 10 1024 sda10 8 11 768 sda11 8 12 256 sda12 8 13 9216 sda13 8 14 15360 sda14 8 15 3788800 sda15 259 0 204800 sda16 259 1 66560 sda17 259 2 26992640 sda18 8 16 4096 sdb 8 32 4096 sdc 253 0 1048576 vnswap0 Code: 1|[email protected]:/ $ ls -al dev/block/platform/15570000.ufs/by-name lrwxrwxrwx root root 2015-04-13 15:12 BOOT -> /dev/block/sda5 lrwxrwxrwx root root 2015-04-13 15:12 BOTA0 -> /dev/block/sda1 lrwxrwxrwx root root 2015-04-13 15:12 BOTA1 -> /dev/block/sda2 lrwxrwxrwx root root 2015-04-13 15:12 CACHE -> /dev/block/sda16 lrwxrwxrwx root root 2015-04-13 15:12 DNT -> /dev/block/sda10 lrwxrwxrwx root root 2015-04-13 15:12 EFS -> /dev/block/sda3 lrwxrwxrwx root root 2015-04-13 15:12 HIDDEN -> /dev/block/sda17 lrwxrwxrwx root root 2015-04-13 15:12 OTA -> /dev/block/sda7 lrwxrwxrwx root root 2015-04-13 15:12 PARAM -> /dev/block/sda4 lrwxrwxrwx root root 2015-04-13 15:12 PERSDATA -> /dev/block/sda13 lrwxrwxrwx root root 2015-04-13 15:12 PERSISTENT -> /dev/block/sda11 lrwxrwxrwx root root 2015-04-13 15:12 RADIO -> /dev/block/sda8 lrwxrwxrwx root root 2015-04-13 15:12 RECOVERY -> /dev/block/sda6 lrwxrwxrwx root root 2015-04-13 15:12 SBFS -> /dev/block/sda14 lrwxrwxrwx root root 2015-04-13 15:12 STEADY -> /dev/block/sda12 lrwxrwxrwx root root 2015-04-13 15:12 SYSTEM -> /dev/block/sda15 lrwxrwxrwx root root 2015-04-13 15:12 TOMBSTONES -> /dev/block/sda9 lrwxrwxrwx root root 2015-04-13 15:12 USERDATA -> /dev/block/sda18 Hopefully this helps some of you guys
Great :good:
Hero said: Finally got my SIM unlocked S6 (SM-G920I). Here's some useful information for developers. Code: [email protected]:/ $ cat /proc/partitions major minor #blocks name 8 0 31240192 sda 8 1 4096 sda1 8 2 4096 sda2 8 3 20480 sda3 8 4 8192 sda4 8 5 28672 sda5 8 6 34816 sda6 8 7 8192 sda7 8 8 43008 sda8 8 9 1024 sda9 8 10 1024 sda10 8 11 768 sda11 8 12 256 sda12 8 13 9216 sda13 8 14 15360 sda14 8 15 3788800 sda15 259 0 204800 sda16 259 1 66560 sda17 259 2 26992640 sda18 8 16 4096 sdb 8 32 4096 sdc 253 0 1048576 vnswap0 Code: 1|[email protected]:/ $ ls -al dev/block/platform/15570000.ufs/by-name lrwxrwxrwx root root 2015-04-13 15:12 BOOT -> /dev/block/sda5 lrwxrwxrwx root root 2015-04-13 15:12 BOTA0 -> /dev/block/sda1 lrwxrwxrwx root root 2015-04-13 15:12 BOTA1 -> /dev/block/sda2 lrwxrwxrwx root root 2015-04-13 15:12 CACHE -> /dev/block/sda16 lrwxrwxrwx root root 2015-04-13 15:12 DNT -> /dev/block/sda10 lrwxrwxrwx root root 2015-04-13 15:12 EFS -> /dev/block/sda3 lrwxrwxrwx root root 2015-04-13 15:12 HIDDEN -> /dev/block/sda17 lrwxrwxrwx root root 2015-04-13 15:12 OTA -> /dev/block/sda7 lrwxrwxrwx root root 2015-04-13 15:12 PARAM -> /dev/block/sda4 lrwxrwxrwx root root 2015-04-13 15:12 PERSDATA -> /dev/block/sda13 lrwxrwxrwx root root 2015-04-13 15:12 PERSISTENT -> /dev/block/sda11 lrwxrwxrwx root root 2015-04-13 15:12 RADIO -> /dev/block/sda8 lrwxrwxrwx root root 2015-04-13 15:12 RECOVERY -> /dev/block/sda6 lrwxrwxrwx root root 2015-04-13 15:12 SBFS -> /dev/block/sda14 lrwxrwxrwx root root 2015-04-13 15:12 STEADY -> /dev/block/sda12 lrwxrwxrwx root root 2015-04-13 15:12 SYSTEM -> /dev/block/sda15 lrwxrwxrwx root root 2015-04-13 15:12 TOMBSTONES -> /dev/block/sda9 lrwxrwxrwx root root 2015-04-13 15:12 USERDATA -> /dev/block/sda18 Hopefully this helps some of you guys Click to expand... Click to collapse Have you figured out where trustzone lives?
LG G5 partition scheme
look at the txt file below for the info. i tried putting in on the main post, but it didn't edit right. it is the complete partition scheme for the LGLS922, but i am pretty sure it applies to other G5s.
Nice one! Thanks for sharing! How did You get the List? I can provide a H850 one for comparsion if You want. Just want to make sure that there are no diffrences :angel:
used adb shell and inputed "cat /proc/partitions" and installed this app and went into settings on the app and enables everything in it
schizoidd said: used adb shell and inputed "cat /proc/partitions" and installed this app and went into settings on the app and enables everything in it Click to expand... Click to collapse Perfect, i will share it here asap Thanks again!
Miustone said: Perfect, i will share it here asap Thanks again! Click to expand... Click to collapse not a problem, i am kinda curious about the partition scheme on these devices
can anyone else plz put in their input on their G5. I'd like to know.
Here is the H850 scheme: Code: [email protected]:/ # ls -al /dev/block/platform/soc/624000.ufshc/by-name total 0 drwxr-xr-x 2 0 0 1400 Jan 1 17:33 . drwxr-xr-x 4 0 0 1580 Jan 1 17:33 .. lrwxrwxrwx 1 0 0 16 Jan 1 17:33 OP -> /dev/block/sda16 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 aboot -> /dev/block/sde6 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 abootbak -> /dev/block/sde7 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 apdp -> /dev/block/sde26 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 boot -> /dev/block/sde1 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 cache -> /dev/block/sda14 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 cdt -> /dev/block/sdd3 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 cmnlib -> /dev/block/sde22 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 cmnlib64 -> /dev/block/sde24 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 cmnlib64bak -> /dev/block/sde25 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 cmnlibbak -> /dev/block/sde23 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 cust -> /dev/block/sda15 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 ddr -> /dev/block/sdd1 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 devcfg -> /dev/block/sde16 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 devcfgbak -> /dev/block/sde17 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 devinfo -> /dev/block/sdb7 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 dip -> /dev/block/sdb6 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 dpo -> /dev/block/sde28 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 drm -> /dev/block/sda3 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 eksst -> /dev/block/sda8 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 encrypt -> /dev/block/sda7 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 factory -> /dev/block/sda6 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 fota -> /dev/block/sdb3 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 fsc -> /dev/block/sdf3 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 fsg -> /dev/block/sdb5 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 grow -> /dev/block/sda18 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 grow2 -> /dev/block/sdb8 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 grow3 -> /dev/block/sdc3 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 grow4 -> /dev/block/sdd4 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 grow5 -> /dev/block/sde29 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 grow6 -> /dev/block/sdf4 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 grow7 -> /dev/block/sdg2 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 hyp -> /dev/block/sde12 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 hypbak -> /dev/block/sde13 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 keymaster -> /dev/block/sde20 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 keymasterbak -> /dev/block/sde21 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 keystore -> /dev/block/sda11 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 laf -> /dev/block/sda1 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 misc -> /dev/block/sda5 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 modem -> /dev/block/sde18 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 modemst1 -> /dev/block/sdf1 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 modemst2 -> /dev/block/sdf2 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 mpt -> /dev/block/sda2 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 msadp -> /dev/block/sde27 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 persist -> /dev/block/sda12 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 persistent -> /dev/block/sdg1 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 pmic -> /dev/block/sde14 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 pmicbak -> /dev/block/sde15 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 raw_resources -> /dev/block/sde8 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 raw_resourcesbak -> /dev/block/sde9 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 rct -> /dev/block/sda9 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 recovery -> /dev/block/sde2 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 recoverybak -> /dev/block/sde3 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 reserve -> /dev/block/sdd2 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 rpm -> /dev/block/sde10 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 rpmbak -> /dev/block/sde11 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 sec -> /dev/block/sde19 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 sns -> /dev/block/sda4 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 spare1 -> /dev/block/sdb4 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 ssd -> /dev/block/sda10 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 system -> /dev/block/sda13 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 tz -> /dev/block/sde4 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 tzbak -> /dev/block/sde5 lrwxrwxrwx 1 0 0 16 Jan 1 17:33 userdata -> /dev/block/sda17 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 xbl -> /dev/block/sdb1 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 xbl2 -> /dev/block/sdc1 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 xbl2bak -> /dev/block/sdc2 lrwxrwxrwx 1 0 0 15 Jan 1 17:33 xblbak -> /dev/block/sdb2
any have file PrimaryGPT.bin G5 correctly for QPST ?
T590 boot.img clarification
Trying to get the boot image I've run into difficulties. If someone knows, I would be greatful if they point out the boot partition. first I've found different references to pulling from the device. They seem to pulling via linux dd command or cat Trouble is my dev directory does not have the device they reference nor does the proc directory Pages That ... gave me ... a little but not enough no such directory http://android-dls.com/wiki/index.php?title=HOWTO:_Unpack,_Edit,_and_Re-Pack_Boot_Images not sure this really helps https://androidforums.com/threads/where-is-my-boot-img.892350/ again...maybe just phone? still no /proc/mtd https://forum.xda-developers.com/showthread.php?t=443994 no dump command https://forum.xda-developers.com/showthread.php?t=2146077 maybe from the mount command... blk37 or blk38 both are vfat mounted on /firmware-modem and /firmware respectively. no mtd and I don't want the entire rom...plus I'd rather not download a command, currently https://www.addictivetips.com/mobil...es-boot-recovery-and-system-partition-images/ ...? recovery on blk13..for this one https://androidforums.com/threads/c...-recovery-for-the-lg-viper-4g-lgls840.566507/ Code: gta2xlwifi:/ $ ls /dev ls: /dev/event-log-tags: Permission denied __properties__ coresight-stm fd i2c-2 kmsg msm_amrnb msm_multi_aac psaux ramdump_smem smd1 smem_log tzic v4l-subdev12 video0 adsprpc-smd cpu_dma_latency fscklogs i2c-3 knox_kap msm_amrnb_in msm_qcelp pta ramdump_venus smd11 snd uhid v4l-subdev13 video1 android_mbim cpuctl fsdbg i2c-4 loop-control msm_amrwb msm_qcelp_in ptmx ramdump_wcnss smd2 socket uinput v4l-subdev14 video2 android_rndis_qc cpuset full i2c-5 mdsprpc-smd msm_amrwb_in msm_rtac pts random smd21 stune uio0 v4l-subdev15 video32 apr_apps2 dbmdx-0 fuse i2c-6 mdss_rotator msm_amrwbplus msm_sps qce rfkill smd22 subsys_a506_zap uio1 v4l-subdev16 video33 ashmem dbmdx-1 graphics i2c-7 media0 msm_ape msm_thermal_query qseecom rmnet_ctrl smd3 subsys_adsp urandom v4l-subdev17 vndbinder at_usb0 dcc_sram hbtp_input i2c-8 media1 msm_audio_cal msm_wma radio0 rmnet_ctrl1 smd36 subsys_modem usb-ffs v4l-subdev2 wcnss_ctrl at_usb1 dek_evt hbtp_vm i2c-9 media2 msm_evrc msm_wmapro ramdump_a506_zap rmnet_ctrl2 smd4 subsys_venus usb_accessory v4l-subdev3 wcnss_wlan avtimer dek_log hw_random icd memory_bandwidth msm_evrc_in ncm_dev ramdump_adsp rmnet_ctrl3 smd5 subsys_wcnss usb_mtp_gadget v4l-subdev4 xt_qtaguid binder dek_req hwbinder icdr mobicore msm_g711alaw network_latency ramdump_adsp_rh rtc0 smd6 sw_sync usb_ncm v4l-subdev5 zero block device-mapper hyst_bias icesdcc mobicore-user msm_g711alaw_in network_throughput ramdump_memshare sdp_dlp smd7 tima_uevent usf1 v4l-subdev6 ccic_misc diag i2c-0 input msm-rng msm_g711mlaw null ramdump_memshare_DIAG sdp_mm smd8 tty v4l-subdev0 v4l-subdev7 ccid_bulk dpl_ctrl i2c-1 ion msm_aac msm_g711mlaw_in pmsg0 ramdump_memshare_FTM sdsprpc-smd smd_pkt_loopback ttyGS0 v4l-subdev1 v4l-subdev8 ccid_ctrl dun i2c-10 jpeg0 msm_aac_in msm_hweffects power_on_alarm ramdump_memshare_GPS sec_misc smdcntl0 ttyHSL0 v4l-subdev10 v4l-subdev9 console ear_mic_adc i2c-11 kgsl-3d0 msm_alac msm_mp3 ppp ramdump_modem smd0 smdcntl8 tun v4l-subdev11 vga_arbiter Code: gta2xlwifi:/proc $ ls -d [a-z]* asound cgroups crypto dmverity_odin_flag fs irq kpagecount meminfo mounts reset_reason self stlog_pipe sysrq-trigger tsp_cmoffset_main tty uptime vmstat avc_msg cmdline debug driver interrupts kallsyms kpageflags meminfo_extra net reset_summary slabinfo stlog_version thread-self tsp_cmoffset_sdc uid_cputime usblog zoneinfo boot_stat config.gz device-tree execdomains iomem key-users last_kmsg memsize pagetypeinfo reset_tzlog softirqs store_lastkmsg tima_debug_log tsp_cmoffset_sub uid_io user_fault buddyinfo consoles devices fb ioports keys loadavg misc partitions schedstat stat swaps timer_list tsp_msg uid_procstat version bus cpuinfo diskstats filesystems iostats kmsg locks modules reset_klog scsi stlog sys timer_stats tsp_raw_data uid_stat vmallocinfo Code: gta2xlwifi:/proc $ mount rootfs on / type rootfs (ro,seclabel,size=1302672k,nr_inodes=325668) tmpfs on /dev type tmpfs (rw,seclabel,nosuid,relatime,size=1415200k,nr_inodes=353800,mode=755) devpts on /dev/pts type devpts (rw,seclabel,relatime,mode=600) proc on /proc type proc (rw,relatime,gid=3009,hidepid=2) sysfs on /sys type sysfs (rw,seclabel,relatime) selinuxfs on /sys/fs/selinux type selinuxfs (rw,relatime) /dev/block/dm-0 on /odm type ext4 (ro,seclabel,relatime,i_version) /dev/block/dm-1 on /system type ext4 (ro,seclabel,relatime,i_version) /dev/block/dm-2 on /vendor type ext4 (ro,seclabel,relatime,i_version) none on /acct type cgroup (rw,relatime,cpuacct) debugfs on /sys/kernel/debug type debugfs (rw,seclabel,relatime) tmpfs on /mnt type tmpfs (rw,seclabel,relatime,size=1415200k,nr_inodes=353800,mode=755,gid=1000) none on /config type configfs (rw,relatime) tmpfs on /mnt/secure type tmpfs (rw,seclabel,relatime,size=1415200k,nr_inodes=353800,mode=700) none on /dev/cpuctl type cgroup (rw,relatime,cpu) none on /dev/cpuset type cgroup (rw,relatime,cpuset,noprefix,release_agent=/sbin/cpuset_release_agent) pstore on /sys/fs/pstore type pstore (rw,seclabel,relatime) /dev/block/mmcblk0p44 on /cache type ext4 (rw,seclabel,nosuid,nodev,noatime,journal_checksum,journal_async_commit,noauto_da_alloc,i_version) /dev/block/mmcblk0p31 on /persist type ext4 (rw,seclabel,nosuid,nodev,noatime,journal_checksum,journal_async_commit,noauto_da_alloc,i_version) /dev/block/mmcblk0p16 on /efs type ext4 (rw,seclabel,nosuid,nodev,noatime,journal_checksum,journal_async_commit,noauto_da_alloc,i_version) /dev/block/mmcblk0p36 on /dsp type ext4 (ro,seclabel,nosuid,nodev,relatime,i_version,data=ordered) /dev/block/mmcblk0p38 on /firmware type vfat (ro,context=u:object_r:firmware_file:s0,relatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro) /dev/block/mmcblk0p37 on /firmware-modem type vfat (ro,context=u:object_r:firmware_file:s0,relatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro) /dev/block/mmcblk0p46 on /omr type ext4 (rw,seclabel,nosuid,nodev,noatime,journal_checksum,noauto_da_alloc,i_version) tmpfs on /storage type tmpfs (rw,seclabel,relatime,size=1415200k,nr_inodes=353800,mode=755,gid=1000) tracefs on /sys/kernel/debug/tracing type tracefs (rw,seclabel,relatime) adb on /dev/usb-ffs/adb type functionfs (rw,relatime) /dev/block/dm-3 on /data type ext4 (rw,seclabel,nosuid,nodev,noatime,journal_checksum,journal_async_commit,noauto_da_alloc,resgid=5555,i_version) /data/knox/secure_fs/enc_user on /data/enc_user type ecryptfs (rw,seclabel,nodev,relatime,ecryptfs_fnek_sig=696678df255664c9,ecryptfs_sig=696678df255664c9,userid=0,sdp_enabled,partition_id=0,ecryptfs_cipher=aes,ecryptfs_key_bytes=32,ecryptfs_passthrough,base=,label=) /data/knox/secure_fs/enc_media on /data/knox/secure_fs/enc_media type ecryptfs (rw,seclabel,nodev,relatime,ecryptfs_fnek_sig=696678df255664c9,ecryptfs_sig=696678df255664c9,userid=0,sdp_enabled,partition_id=1,ecryptfs_cipher=aes,ecryptfs_key_bytes=32,ecryptfs_passthrough,base=,label=) /data/knox/secure_fs/enc_media on /mnt/shell/enc_emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1000,fsgid=1000,gid=9997,multiuser,reserved=20MB) /data/media on /mnt/runtime/default/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,reserved=20MB) /data/media on /storage/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,reserved=20MB) /data/media on /mnt/runtime/read/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=23,reserved=20MB) /data/media on /mnt/runtime/write/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=7,reserved=20MB) Code: gta2xlwifi:/proc $ ls -larth /dev/block/mmc* brw-rw---- 1 root system 179, 22 2017-12-31 18:02 /dev/block/mmcblk0p22 brw------- 1 root root 259, 11 2018-03-03 15:50 /dev/block/mmcblk0p43 brw------- 1 root root 259, 10 2018-03-03 15:50 /dev/block/mmcblk0p42 brw------- 1 root root 259, 9 2018-03-03 15:50 /dev/block/mmcblk0p41 brw------- 1 root root 179, 32 2018-03-03 15:50 /dev/block/mmcblk0rpmb brw------- 1 root root 179, 9 2018-03-03 15:50 /dev/block/mmcblk0p9 brw------- 1 root root 179, 8 2018-03-03 15:50 /dev/block/mmcblk0p8 brw------- 1 root root 179, 7 2018-03-03 15:50 /dev/block/mmcblk0p7 brw------- 1 root root 179, 6 2018-03-03 15:50 /dev/block/mmcblk0p6 brw------- 1 root root 179, 5 2018-03-03 15:50 /dev/block/mmcblk0p5 brw------- 1 root root 259, 13 2018-03-03 15:50 /dev/block/mmcblk0p45 brw------- 1 root root 259, 8 2018-03-03 15:50 /dev/block/mmcblk0p40 brw------- 1 root root 179, 4 2018-03-03 15:50 /dev/block/mmcblk0p4 brw------- 1 root root 259, 6 2018-03-03 15:50 /dev/block/mmcblk0p38 brw------- 1 root root 259, 5 2018-03-03 15:50 /dev/block/mmcblk0p37 brw------- 1 root root 259, 4 2018-03-03 15:50 /dev/block/mmcblk0p36 brw------- 1 system system 259, 3 2018-03-03 15:50 /dev/block/mmcblk0p35 brw------- 1 root root 259, 2 2018-03-03 15:50 /dev/block/mmcblk0p34 brw-rw---- 1 system system 259, 1 2018-03-03 15:50 /dev/block/mmcblk0p33 brw------- 1 root root 179, 30 2018-03-03 15:50 /dev/block/mmcblk0p30 brw------- 1 root root 179, 3 2018-03-03 15:50 /dev/block/mmcblk0p3 brw------- 1 root root 179, 29 2018-03-03 15:50 /dev/block/mmcblk0p29 brw------- 1 root root 179, 28 2018-03-03 15:50 /dev/block/mmcblk0p28 brw------- 1 root root 179, 27 2018-03-03 15:50 /dev/block/mmcblk0p27 brw------- 1 root root 179, 26 2018-03-03 15:50 /dev/block/mmcblk0p26 brw------- 1 root root 179, 25 2018-03-03 15:50 /dev/block/mmcblk0p25 brw------- 1 root root 179, 24 2018-03-03 15:50 /dev/block/mmcblk0p24 brw------- 1 root root 179, 23 2018-03-03 15:50 /dev/block/mmcblk0p23 brw------- 1 root root 179, 21 2018-03-03 15:50 /dev/block/mmcblk0p21 brw------- 1 root root 179, 20 2018-03-03 15:50 /dev/block/mmcblk0p20 brw------- 1 root root 179, 2 2018-03-03 15:50 /dev/block/mmcblk0p2 brw------- 1 root root 179, 19 2018-03-03 15:50 /dev/block/mmcblk0p19 brw------- 1 root root 179, 18 2018-03-03 15:50 /dev/block/mmcblk0p18 brw------- 1 root root 179, 17 2018-03-03 15:50 /dev/block/mmcblk0p17 brw------- 1 root root 179, 13 2018-03-03 15:50 /dev/block/mmcblk0p13 brw------- 1 root root 179, 12 2018-03-03 15:50 /dev/block/mmcblk0p12 brw------- 1 root root 179, 11 2018-03-03 15:50 /dev/block/mmcblk0p11 brw------- 1 root root 179, 10 2018-03-03 15:50 /dev/block/mmcblk0p10 brw------- 1 root root 179, 1 2018-03-03 15:50 /dev/block/mmcblk0p1 brw------- 1 root root 179, 0 2018-03-03 15:50 /dev/block/mmcblk0 brw------- 1 root root 259, 14 2018-03-03 15:50 /dev/block/mmcblk0p46 brw------- 1 root root 259, 12 2018-03-03 15:50 /dev/block/mmcblk0p44 brw------- 1 root root 179, 31 2018-03-03 15:50 /dev/block/mmcblk0p31 brw------- 1 root root 179, 16 2018-03-03 15:50 /dev/block/mmcblk0p16 brw-rw---- 1 system system 259, 0 2018-03-24 13:20 /dev/block/mmcblk0p32 brw------- 1 root root 259, 15 2019-03-24 13:22 /dev/block/mmcblk0p47 brw------- 1 root root 179, 15 2019-03-24 13:32 /dev/block/mmcblk0p15 brw------- 1 root root 179, 14 2019-03-24 18:41 /dev/block/mmcblk0p14 brw------- 1 root root 259, 7 2019-03-25 13:31 /dev/block/mmcblk0p39 Code: gta2xlwifi:/ $ ls /system/bin|grep dump crash_dump32 dexdump dumpstate dumpsys oatdump tima_dump_log
I believe, I downloaded the(?) boot image from https://www.sammobile.com but even here it wasn't completely straightforward. it has a whole list of countries but not the U.S. and there is PDA and CSC. I found some sites mentioning a /system/csc directory containing an xml... no such directory on T590 Seems like PDA is the last portion of the build number https://forum.xda-developers.com/showthread.php?t=1801022 but that still leaves too many ... so based on https://www.**********.com/how-to-change-csc-in-samsung-galaxy-phones seems like the service provider sw contains the csc based on method two This is slightly confusing because the picture has 3 numbered ..numbers but under that his 1-3 appear to refer to only the last (number 3 or portions thereof) so if I'm guessing correctly..my CSC=XAR which... sammobile.com says is "Cellular south (XAR)"...well weird it should be a wifi only tablet but I am in the "South" ... so I dunno, I guess so? So this should be the link https://www.sammobile.com/firmwares/galaxy-tab-a/SM-T590/XAR/download/T590XXU2ARK2/248008/ well I'm still somewhat confused but this looks right Model SM-T590 Model name Galaxy Tab A Country Cellular south (XAR) Version Android 8.1.0 Changelist 14876204 Build date Thu, 29 Nov 2018 01:48:25 +0000 Security Patch Level 2018-12-01 Product code XAR PDA T590XXU2ARK2 CSC T590OXM2ARK2 { "lightbox_close": "Close", "lightbox_next": "Next", "lightbox_previous": "Previous", "lightbox_error": "The requested content cannot be loaded. Please try again later.", "lightbox_start_slideshow": "Start slideshow", "lightbox_stop_slideshow": "Stop slideshow", "lightbox_full_screen": "Full screen", "lightbox_thumbnails": "Thumbnails", "lightbox_download": "Download", "lightbox_share": "Share", "lightbox_zoom": "Zoom", "lightbox_new_window": "New window", "lightbox_toggle_sidebar": "Toggle sidebar" } I've found sites talking about enabling features by editing the csc xml...file but... that seems like either old info or just not for my tablet... I would love if anyone has links or anything that would make this more clear... I think I fumbled enough to download the right image but..I would have rather gotten it of the phone..and I'm still not sure.
Here u go, extracted from the full rom, not the device. But it's the right one. https://drive.google.com/file/d/1j83zhWSQkt_Rj4mK9H8yqzeZFlvT2okO/view?usp=sharing
AsItLies said: Here u go, extracted from the full rom, not the device. But it's the right one. https://drive.google.com/file/d/1j83zhWSQkt_Rj4mK9H8yqzeZFlvT2okO/view?usp=sharing Click to expand... Click to collapse Thank You
AsItLies said: Here u go, extracted from the full rom, not the device. But it's the right one. https://drive.google.com/file/d/1j83zhWSQkt_Rj4mK9H8yqzeZFlvT2okO/view?usp=sharing Click to expand... Click to collapse first try flashing with heimdall failed with verification failure... :crying: So... I'm using https://forum.xda-developers.com/galaxy-tab-a/how-to/root-samsung-galaxy-tab-10-5-2018-root-t3887848 I didn't do step 3 because I don't think heimdall see's anything but .img I did do step 4 but I'm unsure what that is... "Enable the "Keep AVB2.0/dm-verity" in the Magisk main screen. " I can't do Flash the patched boot image with Odin in the AP-slot I don't know what the AP-slot is...I don't think heimdall has the equivalent? I used the flash tab and selected a pid..I downloaded previously from the device selected boot and picked the patched img.. "verification failed" ... erasing I dunno... any suggestions/help appreciated.
larrys_ said: first try flashing with heimdall failed with verification failure... :crying: So... I'm using https://forum.xda-developers.com/galaxy-tab-a/how-to/root-samsung-galaxy-tab-10-5-2018-root-t3887848 <snip> I dunno... any suggestions/help appreciated. Click to expand... Click to collapse I haven't done this, yet. But, first and foremost, you can't ** skip ** any steps. They are ** all ** there for a reason. Skipping one will result in the next ones not working, it's just that simple. I'd also suggest that if the directions you are following use Odin (on windows obviously), then find a way to boot windows and follow what it says. Yes, it's a pain, I hate windows, but I have dual boot to 8.1, just for purposes like this. Heimdall should have similar capabilities but I've never used the gui front end, only the command line, and don't know all the options available. Again though, don't skip any steps, it's definitely not going to work if you do that. good luck, Cheers
NVM... I guess the boot image you gave me was pre-patched... I just flashed it... and ROOT! Thanks! Now, I'll guess I'll have to wait for both TWRP and LineagOS to come out with T590 versions but that's a good problem! AGAIN, THANK YOU! root achieved!
larrys_ said: NVM... I guess the boot image you gave me was pre-patched... I just flashed it... and ROOT! Thanks! Now, I'll guess I'll have to wait for both TWRP and LineagOS to come out with T590 versions but that's a good problem! AGAIN, THANK YOU! root achieved! Click to expand... Click to collapse Well it's good that you have root, but I can guarantee you that the image you got from me was not patched. That image came right out of the stock OEM ROM. So there's something, somewhere, somehow, that you did that you ended up with a patched boot image. Cheers.
AsItLies said: Well it's good that you have root, but I can guarantee you that the image you got from me was not patched. That image came right out of the stock OEM ROM. So there's something, somewhere, somehow, that you did that you ended up with a patched boot image. Cheers. Click to expand... Click to collapse Lol quite possibly, Anyway in-case someone else wants to extract the boot.img or recovery.img... heimdall gave me the blocks... I don't think you can extract without root..but either way....info Code: --- Entry #28 --- Binary Type: 0 (AP) Device Type: 2 (MMC) Identifier: 25 Attributes: 5 (Read/Write) Update Attributes: 1 (FOTA) Partition Block Size/Offset: 133120 Partition Block Count: 65536 File Offset (Obsolete): 0 File Size (Obsolete): 0 Partition Name: BOOT Flash Filename: boot.img FOTA Filename: --- Entry #29 --- Binary Type: 0 (AP) Device Type: 2 (MMC) Identifier: 26 Attributes: 5 (Read/Write) Update Attributes: 1 (FOTA) Partition Block Size/Offset: 198656 Partition Block Count: 65536 File Offset (Obsolete): 0 File Size (Obsolete): 0 Partition Name: RECOVERY Flash Filename: recovery.img FOTA Filename:
ZTE Blade A6(A0620) [PF840F12] Device Tree
Hello everyone! I wonder where can I get/how can I create Device Tree for subject device? I want to try porting LOS firware from Redmi 4X to ZTE Blade A6 . Is it ever possible to do? GPT layout is shown below Code: lrwxrwxrwx 1 root root 20 Jan 13 1970 DDR -> /dev/block/mmcblk0p3 lrwxrwxrwx 1 root root 21 Jan 13 1970 aboot -> /dev/block/mmcblk0p14 lrwxrwxrwx 1 root root 21 Jan 13 1970 abootbak -> /dev/block/mmcblk0p15 lrwxrwxrwx 1 root root 21 Jan 13 1970 apdp -> /dev/block/mmcblk0p45 lrwxrwxrwx 1 root root 21 Jan 13 1970 batweak -> /dev/block/mmcblk0p18 lrwxrwxrwx 1 root root 21 Jan 13 1970 boot -> /dev/block/mmcblk0p19 lrwxrwxrwx 1 root root 21 Jan 13 1970 cache -> /dev/block/mmcblk0p20 lrwxrwxrwx 1 root root 21 Jan 13 1970 cmnlib -> /dev/block/mmcblk0p39 lrwxrwxrwx 1 root root 21 Jan 13 1970 cmnlib64 -> /dev/block/mmcblk0p41 lrwxrwxrwx 1 root root 21 Jan 13 1970 cmnlib64bak -> /dev/block/mmcblk0p42 lrwxrwxrwx 1 root root 21 Jan 13 1970 cmnlibbak -> /dev/block/mmcblk0p40 lrwxrwxrwx 1 root root 21 Jan 13 1970 config -> /dev/block/mmcblk0p31 lrwxrwxrwx 1 root root 21 Jan 13 1970 devcfg -> /dev/block/mmcblk0p26 lrwxrwxrwx 1 root root 21 Jan 13 1970 devcfgbak -> /dev/block/mmcblk0p27 lrwxrwxrwx 1 root root 21 Jan 13 1970 devinfo -> /dev/block/mmcblk0p29 lrwxrwxrwx 1 root root 21 Jan 13 1970 dip -> /dev/block/mmcblk0p35 lrwxrwxrwx 1 root root 21 Jan 13 1970 dpo -> /dev/block/mmcblk0p47 lrwxrwxrwx 1 root root 21 Jan 13 1970 dsp -> /dev/block/mmcblk0p28 lrwxrwxrwx 1 root root 20 Jan 13 1970 factory -> /dev/block/mmcblk0p8 lrwxrwxrwx 1 root root 21 Jan 13 1970 fsc -> /dev/block/mmcblk0p10 lrwxrwxrwx 1 root root 21 Jan 13 1970 fsg -> /dev/block/mmcblk0p11 lrwxrwxrwx 1 root root 21 Jan 13 1970 keymaster -> /dev/block/mmcblk0p43 lrwxrwxrwx 1 root root 21 Jan 13 1970 keymasterbak -> /dev/block/mmcblk0p44 lrwxrwxrwx 1 root root 21 Jan 13 1970 keystore -> /dev/block/mmcblk0p30 lrwxrwxrwx 1 root root 21 Jan 13 1970 limits -> /dev/block/mmcblk0p33 lrwxrwxrwx 1 root root 21 Jan 13 1970 logdump -> /dev/block/mmcblk0p48 lrwxrwxrwx 1 root root 21 Jan 13 1970 mcfg -> /dev/block/mmcblk0p38 lrwxrwxrwx 1 root root 21 Jan 13 1970 mdtp -> /dev/block/mmcblk0p36 lrwxrwxrwx 1 root root 21 Jan 13 1970 misc -> /dev/block/mmcblk0p16 lrwxrwxrwx 1 root root 21 Jan 13 1970 modem -> /dev/block/mmcblk0p25 lrwxrwxrwx 1 root root 21 Jan 13 1970 modemst1 -> /dev/block/mmcblk0p12 lrwxrwxrwx 1 root root 21 Jan 13 1970 modemst2 -> /dev/block/mmcblk0p13 lrwxrwxrwx 1 root root 21 Jan 13 1970 mota -> /dev/block/mmcblk0p34 lrwxrwxrwx 1 root root 21 Jan 13 1970 msadp -> /dev/block/mmcblk0p46 lrwxrwxrwx 1 root root 21 Jan 13 1970 oem -> /dev/block/mmcblk0p32 lrwxrwxrwx 1 root root 21 Jan 13 1970 persist -> /dev/block/mmcblk0p22 lrwxrwxrwx 1 root root 21 Jan 13 1970 recovery -> /dev/block/mmcblk0p21 lrwxrwxrwx 1 root root 20 Jan 13 1970 rpm -> /dev/block/mmcblk0p4 lrwxrwxrwx 1 root root 20 Jan 13 1970 rpmbak -> /dev/block/mmcblk0p5 lrwxrwxrwx 1 root root 20 Jan 13 1970 sbl1 -> /dev/block/mmcblk0p1 lrwxrwxrwx 1 root root 20 Jan 13 1970 sbl1bak -> /dev/block/mmcblk0p2 lrwxrwxrwx 1 root root 21 Jan 13 1970 sec -> /dev/block/mmcblk0p24 lrwxrwxrwx 1 root root 21 Jan 13 1970 splash -> /dev/block/mmcblk0p17 lrwxrwxrwx 1 root root 20 Jan 13 1970 ssd -> /dev/block/mmcblk0p9 lrwxrwxrwx 1 root root 21 Jan 13 1970 syscfg -> /dev/block/mmcblk0p37 lrwxrwxrwx 1 root root 21 Jan 13 1970 system -> /dev/block/mmcblk0p49 lrwxrwxrwx 1 root root 20 Jan 13 1970 tz -> /dev/block/mmcblk0p6 lrwxrwxrwx 1 root root 20 Jan 13 1970 tzbak -> /dev/block/mmcblk0p7 lrwxrwxrwx 1 root root 21 Jan 13 1970 userdata -> /dev/block/mmcblk0p50 lrwxrwxrwx 1 root root 21 Jan 13 1970 ztecfg -> /dev/block/mmcblk0p23
I'm interesting in building device tree from scratch if it's possible to do using "software tools" only.
MIUI10