Is it possible to emulate an android ROM on a computer?
If you grab the SDK, you can run any version of Android in the emulator. If you want to run an actual ROM you will need to create an image of /system (as system.img) and replace that with those in the SDK folder.
thanks alot! that helped me alot
and yes, i want to run an actual ROM. what filesystem does it have to be?
was thinking about something like...
(cd PATH)
dd if=/dev/zero of=system bs=1024 count=#KB_needed
losetup /dev/loop0 system
mkfs -f FS /dev/loop0
(mkdir /mnt/system)
mount /dev/loop0 /mnt/system/
cp -a system /mnt/system/
umount /mnt/system/
losetup -d /dev/loop0
do you know any good tools for this exept for dd?
Never tried so I honestly don't know, you sound like you know a lot more than me about creating/mounting images than me, so it's probably best to use your judement. The easiest way is just to make a nadroid back backup, flash the ROM you want to test, nadroid that and grab system.img, revert to your old nandroid backup. It's tedious, and it doesn't help if you want to test a ROM before flashing, but that's the only method I've heard people use.
okay. thanks
HTC Sense UI system.img
Does anybody know where I can download a system.img for a HTC with Sense UI (Hero for example)? I have been looking for ages with no luck.
My app is not working on a customers Hero and I am trying to find a Hero system.img to run in the emulator so I can work out why it fails on this phone.
I dont own a Hero, so am unable to extract my own system.img.
You can get HTC official ROMs here:
http://forum.xda-developers.com/showthread.php?t=559622
if you've got a windows computer you probably could extract the content of this exe file and then try to follow my previous instructions to make the system.img.
And if you don't have an unix/linux box.. You could send the content of the exe file to me, if you are able to extract the data in it. (I'm in China with a netbook atm and not able to extract the exe file with my limited tools). Then I could try to make you a system.img
I tried that, but without an HTC phone connected to the PC USB the exe wont extract.
I take that back. I found the files in my temp folder. I have extracted ROM.zip including the system.img into the avd folder, but the emulator is failing to bring it up.
could you upload that zip file here or on rapidshare? then i could have a look at it
Here is the rom.zip file from RUU_Hero_HTC_WWE_2.73.405.38_WWE_release_signed_NoDriver.exe:
rom.zip
Other people must be doing this kindof thing to test their apps?
Here is the logcat. It looks like the sytem process is starting to come up, then fails. This repeats over and over.
12-16 18:34:20.945: INFO/SystemServer(113): Starting telephony registry
12-16 18:34:20.975: INFO/SystemServer(113): Starting Package Manager.
12-16 18:34:21.056: INFO/Installer(113): connecting...
12-16 18:34:21.075: INFO/installd(33): new connection
12-16 18:34:21.205: INFO/PackageManager(113): Got library com.google.android.maps in /system/framework/com.google.android.maps.jar
12-16 18:34:21.225: INFO/PackageManager(113): Got library com.google.android.gtalkservice in /system/framework/com.google.android.gtalkservice.jar
12-16 18:34:21.265: INFO/PackageManager(113): Got library com.htc.framework in /system/framework/com.htc.framework.jar
12-16 18:34:21.515: INFO/PackageManager(113): Got library android.awt in /system/framework/android.awt.jar
12-16 18:34:21.535: INFO/PackageManager(113): Got library android.test.runner in /system/framework/android.test.runner.jar
12-16 18:34:21.535: INFO/PackageManager(113): Got library com.android.im.plugin in /system/framework/com.android.im.plugin.jar
12-16 18:34:21.545: INFO/PackageManager(113): Got library com.htc.android.pimlib in /system/framework/com.htc.android.pimlib.jar
12-16 18:34:21.565: INFO/PackageManager(113): Got library com.htc.android.easopen in /system/framework/com.htc.android.easopen.jar
12-16 18:34:21.565: INFO/PackageManager(113): Got library com.scalado.util.ScaladoUtil in /system/framework/com.scalado.util.ScaladoUtil.jar
12-16 18:34:22.596: DEBUG/dalvikvm(113): GC freed 4273 objects / 216216 bytes in 302ms
12-16 18:34:23.476: ERROR/PackageManager(113): Adding duplicate shared user, keeping first: android.uid.shared
12-16 18:34:23.526: ERROR/PackageManager(113): Occurred while parsing settings at line -1, column -1
12-16 18:34:23.546: ERROR/PackageManager(113): Adding duplicate shared user, keeping first: com.htc.rosie.uid.shared
12-16 18:34:23.596: ERROR/PackageManager(113): Occurred while parsing settings at line -1, column -1
12-16 18:34:23.746: ERROR/PackageManager(113): Bad package setting: package com.android.providers.contacts has shared uid 10008 that is not defined
12-16 18:34:23.746: ERROR/PackageManager(113): Bad package setting: package com.android.launcher has shared uid 10008 that is not defined
12-16 18:34:23.756: ERROR/PackageManager(113): Bad package setting: package com.android.googlesearch has shared uid 10008 that is not defined
12-16 18:34:23.766: ERROR/PackageManager(113): Bad package setting: package com.android.inputmethod.latin has shared uid 10008 that is not defined
12-16 18:34:23.786: ERROR/PackageManager(113): Bad package setting: package com.htc.MusicWidget has shared uid 10047 that is not defined
12-16 18:34:23.816: ERROR/PackageManager(113): Bad package setting: package com.android.contacts has shared uid 10008 that is not defined
12-16 18:34:23.836: ERROR/PackageManager(113): Bad package setting: package com.android.providers.userdictionary has shared uid 10008 that is not defined
12-16 18:34:23.846: ERROR/PackageManager(113): Bad package setting: package com.android.providers.im has shared uid 10008 that is not defined
12-16 18:34:23.896: INFO/dalvikvm(113): DexOpt: Some deps went away
12-16 18:34:23.926: ERROR/dalvikvm(113): /system/framework/com.scalado.util.ScaladoUtil.jar odex has stale dependencies
12-16 18:34:23.926: ERROR/dalvikvm(113): odex source not available -- failing
12-16 18:34:23.926: WARN/dalvikvm(113): threadid=15: thread exiting with uncaught exception (group=0x40013140)
12-16 18:34:23.936: ERROR/AndroidRuntime(113): Uncaught handler: thread android.server.ServerThread exiting due to uncaught exception
12-16 18:34:23.956: ERROR/AndroidRuntime(113): *** EXCEPTION IN SYSTEM PROCESS. System will crash.
12-16 18:34:23.966: ERROR/AndroidRuntime(113): dalvik.system.StaleDexCacheError: /system/framework/com.scalado.util.ScaladoUtil.jar
12-16 18:34:23.966: ERROR/AndroidRuntime(113): at dalvik.system.DexFile.isDexOptNeeded(Native Method)
12-16 18:34:23.966: ERROR/AndroidRuntime(113): at com.android.server.PackageManagerService.<init>(PackageManagerService.java:419)
12-16 18:34:23.966: ERROR/AndroidRuntime(113): at com.android.server.PackageManagerService.main(PackageManagerService.java:261)
12-16 18:34:23.966: ERROR/AndroidRuntime(113): at com.android.server.ServerThread.run(SystemServer.java:126)
12-16 18:34:24.006: ERROR/AndroidRuntime(113): Crash logging skipped, no checkin service
12-16 18:34:24.006: ERROR/AndroidRuntime(113): Crash logging skipped, no htc checkin service
12-16 18:34:24.036: INFO/Process(113): Sending signal. PID: 113 SIG: 9
12-16 18:34:24.066: INFO/Zygote(102): Exit zygote because system server (113) has terminated
12-16 18:34:24.086: INFO/ServiceManager(26): service 'usagestats' died
12-16 18:34:24.086: INFO/ServiceManager(26): service 'SurfaceFlinger' died
12-16 18:34:24.086: INFO/ServiceManager(26): service 'power' died
12-16 18:34:24.086: INFO/ServiceManager(26): service 'batteryinfo' died
12-16 18:34:24.086: INFO/ServiceManager(26): service 'telephony.registry' died
12-16 18:34:24.106: ERROR/installd(33): eof
12-16 18:34:24.106: ERROR/installd(33): failed to read size
12-16 18:34:24.106: INFO/installd(33): closing connection
12-16 18:34:24.146: INFO/ServiceManager(26): service 'media.audio_flinger' died
12-16 18:34:24.146: INFO/ServiceManager(26): service 'media.player' died
12-16 18:34:24.146: INFO/ServiceManager(26): service 'media.camera' died
12-16 18:34:25.096: DEBUG/AndroidRuntime(130): >>>>>>>>>>>>>> AndroidRuntime START <<<<<<<<<<<<<<
12-16 18:34:25.116: DEBUG/AndroidRuntime(130): CheckJNI is ON
12-16 18:34:25.686: DEBUG/AndroidRuntime(130): --- registering native functions ---
12-16 18:34:25.956: INFO/(129): ServiceManager: 0xac38
12-16 18:34:25.956: DEBUG/AudioHardwareInterface(129): Running in emulation - using generic audio driver
12-16 18:34:25.956: INFO/AudioFlinger(129): Create BTIPSA2dpInterface
12-16 18:34:25.966: DEBUG/BTIPSA2dpInterface(129): BTIPSA2dpInterface 1.0.0.0.
12-16 18:34:25.966: DEBUG/BTIPSA2dpInterface(129): BTIPSA2dpInterface:penOutputStream 1, 0, 0
12-16 18:34:25.966: INFO/(129): Creating ashmem region names /data/btips/btips_mm_shm size 20480
12-16 18:34:25.966: INFO/AudioFlinger(129): AudioFlinger's thread ready to run for output 0
12-16 18:34:25.986: DEBUG/BTIPSA2dpInterface(129): BTIPSA2dpStreamOut::set 1, 0, 0
12-16 18:34:25.986: DEBUG/AudioFlinger(129): setRouting 0 2 -1, tid 129, calling tid 129
12-16 18:34:25.986: DEBUG/AudioFlinger(129): setRouting 1 2 -1, tid 129, calling tid 129
12-16 18:34:25.986: DEBUG/AudioFlinger(129): setRouting 2 1 -1, tid 129, calling tid 129
12-16 18:34:25.986: DEBUG/AudioFlinger(129): setMode to mode 0
12-16 18:34:25.996: INFO/AudioFlinger(129): AudioFlinger's thread ready to run for output 1
12-16 18:34:26.006: INFO/CameraService(129): CameraService started: pid=129
12-16 18:34:26.086: DEBUG/(130): ======================== register_android_graphics_Canvas, g_haveProfilerFile=0
12-16 18:34:26.476: INFO/Zygote(130): Preloading classes...
12-16 18:34:26.486: DEBUG/dalvikvm(130): GC freed 786 objects / 43096 bytes in 9ms
12-16 18:34:26.746: DEBUG/dalvikvm(130): GC freed 275 objects / 17264 bytes in 6ms
12-16 18:34:26.956: DEBUG/dalvikvm(130): GC freed 200 objects / 12200 bytes in 8ms
12-16 18:34:27.096: DEBUG/dalvikvm(130): Trying to load lib /system/lib/libmedia_jni.so 0x0
12-16 18:34:27.346: DEBUG/dalvikvm(130): Added shared lib /system/lib/libmedia_jni.so 0x0
12-16 18:34:27.356: DEBUG/dalvikvm(130): Trying to load lib /system/lib/libmedia_jni.so 0x0
12-16 18:34:27.356: DEBUG/dalvikvm(130): Shared lib '/system/lib/libmedia_jni.so' already loaded in same CL 0x0
12-16 18:34:27.366: DEBUG/dalvikvm(130): Trying to load lib /system/lib/libmedia_jni.so 0x0
12-16 18:34:27.366: DEBUG/dalvikvm(130): Shared lib '/system/lib/libmedia_jni.so' already loaded in same CL 0x0
12-16 18:34:27.386: DEBUG/dalvikvm(130): Trying to load lib /system/lib/libmedia_jni.so 0x0
12-16 18:34:27.386: DEBUG/dalvikvm(130): Shared lib '/system/lib/libmedia_jni.so' already loaded in same CL 0x0
12-16 18:34:27.396: DEBUG/dalvikvm(130): Trying to load lib /system/lib/libmedia_jni.so 0x0
12-16 18:34:27.396: DEBUG/dalvikvm(130): Shared lib '/system/lib/libmedia_jni.so' already loaded in same CL 0x0
12-16 18:34:27.426: DEBUG/dalvikvm(130): GC freed 467 objects / 29272 bytes in 10ms
Click to expand...
Click to collapse
Anybody?
Someone must have emulated HTC Touch / Sense UI?!
Okay... After unzipping and manipulating a 2.1 ROM to my liking; I have now resigned it...
Can someone please explain to me how I would go about testing it with the Android SDK Emulator?
I have already created a 2.1 AVD and the emulator loads to the "ANDROID" screen...
What must I do to test out this newly packaged ROM file?
Hi,
I recently updated my Galaxy S4 (GT-I9505) to the latest firmware (I9505XXUHOA7 (OXA) - Android 5.0.1).
Since, I cannot connect the phone to the car.
Actually, the pairing is ok, but when the car tries to sync phonebook (automatically), the bluetooth service crash and restart.
I can say that because I made a test. Immediately after the connection I started a call manually and the call was made without any problem, but when I ended the call, the bluetooth service crashed...
(There was no problems with the 4.4.2)
My receiver is the Alpine CDE-125BT
Some logs here :
Code:
I/ActivityManager( 995): Force stopping com.android.bluetooth appid=1002 user=0: clear data
I/ActivityManager( 995): Killing 1524:com.android.bluetooth/1002 (adj -11): stop com.android.bluetooth
W/ActivityManager( 995): Scheduling restart of crashed service com.android.bluetooth/.gatt.GattService in 1000ms
W/ActivityManager( 995): Scheduling restart of crashed service com.android.bluetooth/.btservice.AdapterService in 11000ms
D/PackageManager( 995): remove MCS_UNBIND message and Posting MCS_UNBIND 10 secs later
I/ActivityManager( 995): Force stopping service ServiceRecord{c65127b u0 com.android.bluetooth/.btservice.AdapterService}
I/ActivityManager( 995): Force stopping service ServiceRecord{1e18793f u0 com.android.bluetooth/.gatt.GattService}
I/ActivityManager( 995): Force stopping com.android.bluetooth appid=1002 user=0: clear data
W/ResourcesManager(12103): Asset path '/system/framework/com.android.media.remotedisplay.jar' does not exist or contains no resources.
W/ResourcesManager(12103): Asset path '/system/framework/com.android.location.provider.jar' does not exist or contains no resources.
I/ActivityManager( 995): Start proc com.android.bluetooth for service com.android.bluetooth/.btservice.AdapterService: pid=12125 uid=1002 gids={41002, 9997, 3003, 3002, 3001, 1028, 1015, 1023, 3005, 1016, 3008} abi=armeabi-v7a
D/SSRM:n ( 995): SIOP:: AP = 420, CUR = 460
W/ResourcesManager(12125): Asset path '/system/framework/javax.obex.jar' does not exist or contains no resources.
W/ResourcesManager(12125): Asset path '/system/framework/com.broadcom.bt.jar' does not exist or contains no resources.
W/ResourcesManager(12119): Asset path '/system/framework/secsmartcard.jar' does not exist or contains no resources.
W/ContextImpl( 1465): Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:1699 android.content.ContextWrapper.sendBroadcast:391 com.android.settings.nfc.SBeamEnabler.updateState:878 com.android.settings.nfc.SBeamEnabler.saveSbeamOn:869 com.android.settings.nfc.SBeamEnabler.procOnResume:196
W/ContextImpl( 1465): Calling a method in the system process without a qualified user: android.app.ContextImpl.startService:2064 android.content.ContextWrapper.startService:533 com.android.settings.nearby.NearbyEnabler.startDmsService:551 com.android.settings.nearby.NearbyEnabler.resume:318 com.android.settings.Settings$HeaderAdapter.resume:5054
W/ContextImpl( 1465): Calling a method in the system process without a qualified user: android.app.ContextImpl.bindService:2137 android.content.ContextWrapper.bindService:559 com.android.settings.nearby.NearbyEnabler.startDmsService:553 com.android.settings.nearby.NearbyEnabler.resume:318 com.android.settings.Settings$HeaderAdapter.resume:5054
W/ContextImpl( 995): Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:1699 com.android.server.InputMethodManagerService$6.run:2733 java.lang.Thread.run:818 <bottom of call stack> <bottom of call stack>
W/ContextImpl( 995): Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:1699 com.android.server.SEDenialService$AuditFileObserver.onEvent:76 android.os.FileObserver$ObserverThread.onEvent:122 android.os.FileObserver$ObserverThread.observe:-2 android.os.FileObserver$ObserverThread.run:85
W/ResourcesManager(12278): Asset path '/system/framework/com.google.android.media.effects.jar' does not exist or contains no resources.
W/ResourcesManager(12278): Asset path '/system/framework/com.google.android.maps.jar' does not exist or contains no resources.
W/ResourcesManager(12278): Asset path '/system/framework/com.broadcom.nfc.jar' does not exist or contains no resources.
W/ResourcesManager(12278): Asset path '/system/framework/org.simalliance.openmobileapi.jar' does not exist or contains no resources.
W/ResourcesManager(24168): Asset path '/system/framework/com.google.android.media.effects.jar' does not exist or contains no resources.
W/ContextImpl( 995): Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:1699 com.android.server.SEDenialService$AuditFileObserver.onEvent:76 android.os.FileObserver$ObserverThread.onEvent:122 android.os.FileObserver$ObserverThread.observe:-2 android.os.FileObserver$ObserverThread.run:85
E/auditd ( 2330): In denial and Property audit_ondenial is set to 1
I/ActivityManager( 995): Killing 4018:com.android.providers.calendar/u0a48 (adj 15): BG, 5562K, hotnessAdj=0, XmlFlag=false, oom_adj=15
I/ActivityManager( 995): Killing 4360:com.sec.android.app.controlpanel/u0a122 (adj 15): BG, 2871K, hotnessAdj=0, XmlFlag=false, oom_adj=15
I/ActivityManager( 995): Killing 12088:com.android.externalstorage/u0a10 (adj 15): BG, 10156K, hotnessAdj=0, XmlFlag=false, oom_adj=15
I/ActivityManager( 995): Killing 12103:com.google.android.gms.ui/u0a13 (adj 15): BG, 36140K, hotnessAdj=0, XmlFlag=false, oom_adj=15
I/ActivityManager_SDHA( 995): F:027M, C:194M, ProcCnt:055, avgU:-----K, mgn:073M, nF:52684K, fd:54729K, thd:143M, wm:05M, c:01, e:14, lmkIdx:15, emS:00, rsmd:T_, lstCrt:twitter.android, TOP:keramidas.TitaniumBackup, ear:0, car:0
I/ActivityManager( 995): Force stopping com.android.bluetooth appid=1002 user=0: from pid 12574
I/ActivityManager( 995): Killing 12125:com.android.bluetooth/1002 (adj -11): stop com.android.bluetooth
W/ActivityManager( 995): Scheduling restart of crashed service com.android.bluetooth/.btservice.AdapterService in 1000ms
W/ActivityManager( 995): Scheduling restart of crashed service com.android.bluetooth/.gatt.GattService in 11000ms
I/ActivityManager( 995): Force stopping service ServiceRecord{10fc555e u0 com.android.bluetooth/.btservice.AdapterService}
I/ActivityManager( 995): Force stopping service ServiceRecord{33f1dd5b u0 com.android.bluetooth/.a2dp.A2dpService}
Same problem
Hi.
I have the same problem with kenwood kdc-bt8041u receiver. I have tested with stock 5.0.1, LolliROM 3.1 and GPE edition by Danvdh. I think on GPE edition worked fine but it is 2 months since I installed LolliROM or stock in which doesn't work. I am looking for a solution too...
Any help?
I solved the problem with a factory reset.
Hi, I'm concerned that several of my devices are being accessed remotely. Yes, I'm paranoid and probably delusional so, but I'd appreciate it if anyone could take a look at this list of processes and tell me if some such as rctd don't belong. Thanks!
Total PSS by process:
149,558K: com.android.systemui (pid 4137)
140,879K: system (pid 3297)
137,282K: surfaceflinger (pid 630)
70,696K: com.lge.launcher3 (pid 4965 / activities)
66,970K: com.google.android.gms.persistent (pid 4639)
64,824K: com.google.android.googlequicksearchbox:search (pid 4944)
60,436K: com.verizon.messaging.vzmsgs (pid 5868)
55,909K: com.android.settings (pid 4323 / activities)
52,114K: com.android.phone (pid 4899)
49,215K: com.asurion.android.verizon.vms (pid 5054)
48,050K: com.google.android.gms (pid 5368)
43,508K: com.google.android.apps.maps (pid 8753)
40,997K: com.lge.signboard (pid 4922)
34,278K: com.lge.ims (pid 4868)
32,675K: com.google.android.gms.unstable (pid 8656)
30,481K: com.lge.lgdmsclient (pid 8735)
28,984K: com.android.vending (pid 9010)
28,512K: com.vcast.mediamanager (pid 5789)
27,045K: com.google.android.gm (pid 8829)
26,491K: com.android.nfc (pid 4775)
24,158K: clatd-rmnet_data0 (pid 9209)
22,452K: com.vzw.hss.myverizon (pid 7732)
21,666K: com.lastpass.lpandroid (pid 5065)
21,340K: com.lge.sizechangable.weather (pid 5517)
21,335K: android.process.acore (pid 4658)
21,335K: com.lge.systemserver (pid 4390)
20,589K: mm-qcamera-daemon (pid 2799)
18,598K: zygote64 (pid 2770)
18,486K: com.android.server.telecom (pid 4825)
18,100K: zygote (pid 2771)
17,818K: com.cequint.ecid (pid 6287)
17,378K: com.google.android.videos (pid 9312)
15,139K: com.lge.leccp (pid 5160)
14,819K: com.google.android.apps.walletnfcrel (pid 8802)
14,364K: rild (pid 2791)
13,733K: com.android.calendar (pid 6109)
12,059K: com.android.bluetooth (pid 6904)
11,514K: com.android.mms (pid 5037)
11,395K: com.google.android.gms:car (pid 9108)
10,962K: audioserver (pid 2773)
10,505K: android.process.media (pid 5504)
10,271K: com.google.android.instantapps.supervisor (pid 9136)
10,180K: com.lge.ime (pid 4126)
9,381K: com.google.android.googlequicksearchbox:interactor (pid 4703)
9,372K: com.telecomsys.directedsms.android.SCG (pid 7674)
9,145K: com.verizon.mips.services (pid 8544)
8,560K: com.google.android.gms.ui (pid 8874)
8,327K: com.lge.launcher2 (pid 7936)
8,293K: com.google.process.gapps (pid 4971)
8,276K: com.android.incallui (pid 5330)
7,722K: com.lge.camera (pid 7050)
6,476K: com.lge.gametuner (pid 4678)
6,287K: com.lge.wifi.p2p (pid 4837)
6,259K: mm-pp-dpps (pid 3111)
6,185K: cameraserver (pid 2774)
6,129K: qseeproxydaemon (pid 2798)
6,126K: com.lge.mlt (pid 4875)
6,033K: fpc_early_loader (pid 2806)
5,933K: com.android.providers.calendar (pid 6130)
5,902K: com.uei.lg.quicksetsdk.irblaster (pid 9254)
5,635K: atd (pid 2769)
5,546K: com.lge.sizechangable.weather.platform (pid 5299)
5,109K: org.simalliance.openmobileapi.service:remote (pid 5805)
5,078K: com.lge.cmas (pid 7280)
4,945K: media.codec (pid 2786)
4,941K: com.lge.wifisettings (pid 8528)
4,915K: com.lge.intelligent (pid 5563)
4,837K: .dataservices (pid 4855)
4,824K: netmgrd (pid 3031)
4,743K: mediaserver (pid 2789)
4,688K: com.lge.task (pid 7571)
4,534K: com.lge.quicktools (pid 5466)
4,393K: com.lge.atservice (pid 4587)
4,335K: com.qualcomm.qcrilmsgtunnel (pid 4521)
4,304K: com.lge.activation (pid 4720)
4,267K: com.lge.imsvt (pid 4910)
4,197K: com.android.shell (pid 9286)
4,139K: com.lge.provider.signboard (pid 5116)
4,067K: com.lge.coneshortcut (pid 8621)
4,026K: com.lge.musiccontroller (pid 4743)
3,944K: com.lge.embms.mmwservice (pid 7343)
3,926K: mediadrmserver (pid 2787)
3,910K: com.lge.ime:setting (pid 4195)
3,907K: com.qualcomm.telephony (pid 7633)
3,840K: com.android.printspooler (pid 8985)
3,829K: com.lge.vzwpoa (pid 4750)
3,815K: com.google.android.ext.services (pid 4526)
3,648K: xtwifi-client (pid 3211)
3,559K: com.lge.springcleaning:AppCleanupService (pid 7557)
3,469K: com.lge.wfcservice (pid 4402)
3,335K: media.extractor (pid 2788)
3,257K: com.lge.verizonsettings (pid 4805)
3,165K: com.lge.wfds.service.v3 (pid 4784)
3,161K: com.vzw.qualitydatalog (pid 8676)
2,952K: logd (pid 467)
2,823K: thermal-engine (pid 2762)
2,793K: netd (pid 2790)
2,761K: audiod (pid 2802)
2,600K: vold (pid 562)
2,498K: slim_daemon (pid 3212)
2,385K: sensors.qcom (pid 719)
2,270K: /init (pid 1)
1,989K: drmserver (pid 2775)
1,961K: keystore (pid 2785)
1,617K: lowi-server (pid 3209)
1,479K: ipacm (pid 3007)
1,298K: lgdrmserver (pid 2760)
1,246K: ueventd (pid 428)
1,199K: time_daemon (pid 2801)
1,196K: qti (pid 3023)
1,074K: brcm-uim-sysfs (pid 2804)
1,042K: ccmd (pid 627)
1,039K: pm-service (pid 623)
1,006K: fingerprintd (pid 2800)
995K: xtwifi-inet-agent (pid 3210)
961K: gatekeeperd (pid 2905)
960K: ATFWD-daemon (pid 2794)
946K: dumpstate (pid 9252)
833K: imswmsproxy (pid 2767)
829K: fidod (pid 2903)
806K: perfd (pid 4576)
802K: loc_launcher (pid 2792)
797K: lmkd (pid 628)
776K: pm-proxy (pid 658)
766K: pkmd (pid 3107)
751K: esepmdaemon (pid 622)
724K: installd (pid 2784)
719K: lgsecclkserver (pid 2759)
713K: lghashstorageserver (pid 2772)
710K: servicemanager (pid 629)
701K: ipsecd (pid 2805)
692K: dumpsys (pid 9302)
677K: qseecomd (pid 647)
672K: rmt_storage (pid 619)
656K: ipacm-diag (pid 2997)
628K: adsprpcd (pid 2763)
603K: tftp_server (pid 2761)
582K: prmd (pid 2766)
581K: gbmd (pid 2765)
552K: healthd (pid 616)
547K: hvdcp_opti (pid 2764)
504K: mcDriverDaemon (pid 999)
496K: lgvrhid (pid 2266)
489K: rctd (pid 2904)
476K: bnrd (pid 7576)
428K: triton (pid 4542)
404K: qseecomd (pid 625)
369K: debuggerd64 (pid 561)
363K: ipsecstarter (pid 2768)
332K: debuggerd64:signaller (pid 563)
308K: debuggerd (pid 560)
273K: sdcard (pid 4160)
267K: sdcard (pid 4154)
261K: debuggerd:signaller (pid 564)
Total PSS by OOM adjustment:
379,270K: Native
137,282K: surfaceflinger (pid 630)
24,158K: clatd-rmnet_data0 (pid 9209)
20,589K: mm-qcamera-daemon (pid 2799)
18,598K: zygote64 (pid 2770)
18,100K: zygote (pid 2771)
17,378K: com.google.android.videos (pid 9312)
14,364K: rild (pid 2791)
10,962K: audioserver (pid 2773)
6,259K: mm-pp-dpps (pid 3111)
6,185K: cameraserver (pid 2774)
6,129K: qseeproxydaemon (pid 2798)
6,033K: fpc_early_loader (pid 2806)
5,635K: atd (pid 2769)
4,945K: media.codec (pid 2786)
4,824K: netmgrd (pid 3031)
4,743K: mediaserver (pid 2789)
3,926K: mediadrmserver (pid 2787)
3,648K: xtwifi-client (pid 3211)
3,335K: media.extractor (pid 2788)
2,952K: logd (pid 467)
2,823K: thermal-engine (pid 2762)
2,793K: netd (pid 2790)
2,761K: audiod (pid 2802)
2,600K: vold (pid 562)
2,498K: slim_daemon (pid 3212)
2,385K: sensors.qcom (pid 719)
2,270K: /init (pid 1)
1,989K: drmserver (pid 2775)
1,961K: keystore (pid 2785)
1,617K: lowi-server (pid 3209)
1,479K: ipacm (pid 3007)
1,298K: lgdrmserver (pid 2760)
1,246K: ueventd (pid 428)
1,199K: time_daemon (pid 2801)
1,196K: qti (pid 3023)
1,074K: brcm-uim-sysfs (pid 2804)
1,042K: ccmd (pid 627)
1,039K: pm-service (pid 623)
1,006K: fingerprintd (pid 2800)
995K: xtwifi-inet-agent (pid 3210)
961K: gatekeeperd (pid 2905)
960K: ATFWD-daemon (pid 2794)
946K: dumpstate (pid 9252)
833K: imswmsproxy (pid 2767)
829K: fidod (pid 2903)
806K: perfd (pid 4576)
802K: loc_launcher (pid 2792)
797K: lmkd (pid 628)
776K: pm-proxy (pid 658)
766K: pkmd (pid 3107)
751K: esepmdaemon (pid 622)
724K: installd (pid 2784)
719K: lgsecclkserver (pid 2759)
713K: lghashstorageserver (pid 2772)
710K: servicemanager (pid 629)
701K: ipsecd (pid 2805)
692K: dumpsys (pid 9302)
677K: qseecomd (pid 647)
672K: rmt_storage (pid 619)
656K: ipacm-diag (pid 2997)
628K: adsprpcd (pid 2763)
603K: tftp_server (pid 2761)
582K: prmd (pid 2766)
581K: gbmd (pid 2765)
552K: healthd (pid 616)
547K: hvdcp_opti (pid 2764)
504K: mcDriverDaemon (pid 999)
496K: lgvrhid (pid 2266)
489K: rctd (pid 2904)
476K: bnrd (pid 7576)
428K: triton (pid 4542)
404K: qseecomd (pid 625)
369K: debuggerd64 (pid 561)
363K: ipsecstarter (pid 2768)
332K: debuggerd64:signaller (pid 563)
308K: debuggerd (pid 560)
273K: sdcard (pid 4160)
267K: sdcard (pid 4154)
261K: debuggerd:signaller (pid 564)
207,350K: System
140,879K: system (pid 3297)
40,997K: com.lge.signboard (pid 4922)
21,335K: com.lge.systemserver (pid 4390)
4,139K: com.lge.provider.signboard (pid 5116)
328,887K: Persistent
149,558K: com.android.systemui (pid 4137)
52,114K: com.android.phone (pid 4899)
34,278K: com.lge.ims (pid 4868)
26,491K: com.android.nfc (pid 4775)
18,486K: com.android.server.telecom (pid 4825)
6,287K: com.lge.wifi.p2p (pid 4837)
6,126K: com.lge.mlt (pid 4875)
4,837K: .dataservices (pid 4855)
4,393K: com.lge.atservice (pid 4587)
4,304K: com.lge.activation (pid 4720)
4,267K: com.lge.imsvt (pid 4910)
4,026K: com.lge.musiccontroller (pid 4743)
3,829K: com.lge.vzwpoa (pid 4750)
3,469K: com.lge.wfcservice (pid 4402)
3,257K: com.lge.verizonsettings (pid 4805)
3,165K: com.lge.wfds.service.v3 (pid 4784)
12,059K: Persistent Service
12,059K: com.android.bluetooth (pid 6904)
83,720K: Foreground
55,909K: com.android.settings (pid 4323 / activities)
21,335K: android.process.acore (pid 4658)
6,476K: com.lge.gametuner (pid 4678)
183,906K: Visible
66,970K: com.google.android.gms.persistent (pid 4639)
49,215K: com.asurion.android.verizon.vms (pid 5054)
21,666K: com.lastpass.lpandroid (pid 5065)
15,139K: com.lge.leccp (pid 5160)
9,381K: com.google.android.googlequicksearchbox:interactor (pid 4703)
8,276K: com.android.incallui (pid 5330)
5,109K: org.simalliance.openmobileapi.service:remote (pid 5805)
4,335K: com.qualcomm.qcrilmsgtunnel (pid 4521)
3,815K: com.google.android.ext.services (pid 4526)
18,287K: Perceptible
10,180K: com.lge.ime (pid 4126)
4,197K: com.android.shell (pid 9286)
3,910K: com.lge.ime:setting (pid 4195)
221,762K: A Services
60,436K: com.verizon.messaging.vzmsgs (pid 5868)
48,050K: com.google.android.gms (pid 5368)
32,675K: com.google.android.gms.unstable (pid 8656)
28,984K: com.android.vending (pid 9010)
28,512K: com.vcast.mediamanager (pid 5789)
13,733K: com.android.calendar (pid 6109)
9,372K: com.telecomsys.directedsms.android.SCG (pid 7674)
135,520K: Home
70,696K: com.lge.launcher3 (pid 4965 / activities)
64,824K: com.google.android.googlequicksearchbox:search (pid 4944)
66,513K: B Services
21,340K: com.lge.sizechangable.weather (pid 5517)
11,514K: com.android.mms (pid 5037)
7,722K: com.lge.camera (pid 7050)
5,078K: com.lge.cmas (pid 7280)
4,915K: com.lge.intelligent (pid 5563)
4,534K: com.lge.quicktools (pid 5466)
3,944K: com.lge.embms.mmwservice (pid 7343)
3,907K: com.qualcomm.telephony (pid 7633)
3,559K: com.lge.springcleaning:AppCleanupService (pid 7557)
260,697K: Cached
43,508K: com.google.android.apps.maps (pid 8753)
30,481K: com.lge.lgdmsclient (pid 8735)
27,045K: com.google.android.gm (pid 8829)
22,452K: com.vzw.hss.myverizon (pid 7732)
17,818K: com.cequint.ecid (pid 6287)
14,819K: com.google.android.apps.walletnfcrel (pid 8802)
11,395K: com.google.android.gms:car (pid 9108)
10,505K: android.process.media (pid 5504)
10,271K: com.google.android.instantapps.supervisor (pid 9136)
9,145K: com.verizon.mips.services (pid 8544)
8,560K: com.google.android.gms.ui (pid 8874)
8,327K: com.lge.launcher2 (pid 7936)
8,293K: com.google.process.gapps (pid 4971)
5,933K: com.android.providers.calendar (pid 6130)
5,902K: com.uei.lg.quicksetsdk.irblaster (pid 9254)
5,546K: com.lge.sizechangable.weather.platform (pid 5299)
4,941K: com.lge.wifisettings (pid 8528)
4,688K: com.lge.task (pid 7571)
4,067K: com.lge.coneshortcut (pid 8621)
3,840K: com.android.printspooler (pid 8985)
3,161K: com.vzw.qualitydatalog (pid 8676)
Several? WTF are you doing? If you think several of your devices are being accessed remotely it is time to wipe everything and change passwords. What do you want? Somebody to remotely check?
Oh and the obligatory quit watching porn.
Remember to wear tinfoil, they might be able to hack your phone but they will never get to your brain ??
The com.im.watching.you is a bit suspicious!
Lol. These guys are messing with you. I didnt see anything worng with the list.
me2151 said:
Lol. These guys are messing with you. I didnt see anything worng with the list.
Click to expand...
Click to collapse
Thanks for your help! Regarding all the other comments, they were expected. The tin foil hat thing doesn't work unfortunately. They still get to my brain.
@rbiter said:
Several? WTF are you doing? If you think several of your devices are being accessed remotely it is time to wipe everything and change passwords. What do you want? Somebody to remotely check?
Oh and the obligatory quit watching porn.
Click to expand...
Click to collapse
Just need to stick to good, wholesome sites like brazzers or porn hub. Those German scat porn sites will get you every time! At least that's what a friend told me ?
Sent from my VS995 using Tapatalk
I think you're being overly paranoid and there's nothing to worry about. Unless your guarding the Krabby Patty formula on those devices, No ones hacking you.
what did you use to get that process listing?
honestly i didn't even look at your list because I know exactly what you mean. I'm dealing with the same thing. my MacBook pro , pc , android , and iPhone are being hacked remotely. I posted something not to long ago. got the same responses from ignorant ****ing pricks just like these above. more than likely you are being hacked remotely. what ever it is a very very persistent. and no wiping your device, i would bet , does nothing except load more unwanted ****. if your rooted might be different. as for me , I am not , so can't do much. though it is in my macbooks firmwares. or it is my firmware. from my research on my own since no one takes a second to actual thinks its legit. it is a hypervisor/virtual boot kit. my MacBook and pc both boot as a virtual Machines. any CD / DVD i put in drive instantly is mounted with files i know are not supposed to be there all what looks like to be a legit installer only to load all malicious **** with it. if i didnt know what I was doing , i would never know. at this point im sure I need to ditch all electronics , possibly even keyboards, mice im pretty sure even my PlayStation. honestly god knows what else its in. beleive me or not i dont care. it only reassures me how ****ing stupid humanity has really become.
---------- Post added at 06:35 AM ---------- Previous post was at 06:24 AM ----------
i did get a notice, today actually, when I clicked on lookout as it was scanning apps, trying to get a look at the actually process of it.. but it wouldn't pull up. only to display a notice say "malware has been removed from this device" which I doubt is legit. since I still see apps that i find suspecious in the system directory.
wAFFLES017 said:
honestly i didn't even look at your list because I know exactly what you mean. I'm dealing with the same thing. my MacBook pro , pc , android , and iPhone are being hacked remotely. I posted something not to long ago. got the same responses from ignorant ****ing pricks just like these above. more than likely you are being hacked remotely. what ever it is a very very persistent. and no wiping your device, i would bet , does nothing except load more unwanted ****. if your rooted might be different. as for me , I am not , so can't do much. though it is in my macbooks firmwares. or it is my firmware. from my research on my own since no one takes a second to actual thinks its legit. it is a hypervisor/virtual boot kit. my MacBook and pc both boot as a virtual Machines. any CD / DVD i put in drive instantly is mounted with files i know are not supposed to be there all what looks like to be a legit installer only to load all malicious **** with it. if i didnt know what I was doing , i would never know. at this point im sure I need to ditch all electronics , possibly even keyboards, mice im pretty sure even my PlayStation. honestly god knows what else its in. beleive me or not i dont care. it only reassures me how ****ing stupid humanity has really become.
---------- Post added at 06:35 AM ---------- Previous post was at 06:24 AM ----------
i did get a notice, today actually, when I clicked on lookout as it was scanning apps, trying to get a look at the actually process of it.. but it wouldn't pull up. only to display a notice say "malware has been removed from this device" which I doubt is legit. since I still see apps that i find suspecious in the system directory.
Click to expand...
Click to collapse
That's because you are a nut job
Sent from my LG V20 using XDA Labs
Skygofree check it out
****ing priceless!!
wAFFLES017 said:
at this point im sure I need to ditch all electronics , possibly even keyboards, mice im pretty sure even my PlayStation.
Click to expand...
Click to collapse
Tell you what, I'm gonna do you a BIG favor and let you send all your stuff to me. It's the only way you can be sure.
I'll PM you the address. (UPS shipping preferred) :good:
I can't believe how oblivious some people are. Any phone manufacturered after 2015 is or has been hacked at one point or another. It shows the mass ignorance when I see people call another person paranoid for speaking out on it. Educate yourselves people! Damn!
ecgranado said:
I can't believe how oblivious some people are. Any phone manufacturered after 2015 is or has been hacked at one point or another. It shows the mass ignorance when I see people call another person paranoid for speaking out on it. Educate yourselves people! Damn!
Click to expand...
Click to collapse
The poster I responded to claimed that it wasn't just his phone that had been compromised - it was ALL his electronics (including mice and keyboards lol).
So now you claim "Any phone manufacturered after 2015 is or has been hacked", and then admonish us all to educate ourselves on the matter. Well, I am ready to be educated. Care to provide any links supporting your claim to get me started? Thanks in advance!
Yeah, well, my Sony Walkman got hacked.
It's okay though, I have a tool to restore the tape back to stock.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
I'm going through the same thing with Ex's (several of them *ACTUALLY*)....
It's REALLY "A-MUTHA-FKING-SHAME", these senseless-retarded computer bimbos are THE ABSOLUTE WORSE. They "play-stupid", yet are very VERY "fundamentally-smart".
Rather we "WANT" 2 admit it or NOT, THESE "Loser ****-Skillets" are pretty freakin smart. It takes a kind of person that can quickly (depending on how fast they've learned this *type-of* skillset), "acquire-intellect", by "knowledge-retention". LOL, In MY CASE, THE RING-LEADER ([email protected]#$L.COM) HAA WENT ABOVE and BEYOND just to learn this networking stuff VERY VERY FAST!!!! Just to Cyber-Bully ME!!!! The "EXTRA-SAD" part is, what was suppose to most-likely be a One-Time Situation, turned into Her "New-Found ADDICTION" for "BRUTE-POWER" That she has NEVER EVER HAD over a Man....
Shame
I really hope that no one reports the previous post, and mods somehow overlook it.
Ya got to have some humor sometimes, and that is just hilarious.
Before(if?) it gets removed, anyone want to try and give their translation / interpretation?
-- Brian
I laughed at loser d... skillet. Sounds like an ex that turned into a cyber bully he is super pissed about. Better days are ahead bro bro!