Need help building serial cable - MDA, XDA, 1010 General

Is there a way to convert a serial cable for the IPAQ 3800 series to work with the XDA??? any shematic??? please help me guys.

ok
1 CAR_MIC_IN
2 GND
3 CAR_AUDIO_R
4 CAR_AUDIO_L
5 GND
6 RS232_DCD
7 RS232_CTS
8 RS232_TXD
9 RS232_RTS
10 RS232_RXD
11 RS232_DTR
12 NC
13 USB_VDD
14 UDC+
15 UDC-
16 GND
17 GND
18 GND
19 CAR_ON#
20 V_ADP
21 V_ADP
22 V_ADP

but how to connect the 9 pin serial points??? which point to what???

Related

[Q] rom compatibility with china tablet alps md706 mtk mt6675

anyone have the rom that compatibility with my china tablet model Alps MD706 with cpu MTK MT6577 dual core 1,2ghz with ram 512mb. MY current rom have sleep death bugs.
spec sheet at the attachment
amir5569 said:
anyone have the rom that compatibility with my china tablet model Alps MD706 with cpu MTK MT6577 dual core 1,2ghz with ram 512mb. MY current rom have sleep death bugs.
spec sheet at the attachment
Click to expand...
Click to collapse
Hi i have a very similiar tablet, in the build.prop says that is an ALPS MD706, but mine has 1.0 ghz procesor.
Are you interested?:good:
need stock room
fanáticomaniático said:
Hi i have a very similiar tablet, in the build.prop says that is an ALPS MD706, but mine has 1.0 ghz procesor.
Are you interested?:good:
Click to expand...
Click to collapse
Hi,
My china tablet (momo9 3g) bootloop as I installed unicode font apk which not compatibility with this tablet. I need your help to get stock firmware from other source. Then I can flash with livesuit. I tried to download this stock rom, but no luck all link are dead. from My tablet detail was follow:
Android version: REL 4.2.2
onandroid script version: -1.0
Device: md706 alps alps MID
Contents of: /proc/partitions
major minor #blocks name
7 0 1254 loop0
7 1 8348 loop1
7 2 43691 loop2
7 3 15624 loop3
7 4 49928 loop4
7 5 13545 loop5
7 6 39533 loop6
7 7 19782 loop7
179 0 7613440 mmcblk0
179 1 1 mmcblk0p1
179 2 5120 mmcblk0p2
179 3 786432 mmcblk0p3
179 4 524288 mmcblk0p4
179 5 1048576 mmcblk0p5
179 6 5217376 mmcblk0p6
179 64 4096 mmcblk0boot1
179 32 4096 mmcblk0boot0
179 96 994816 mmcblk1
179 97 994691 mmcblk1p1
254 0 8347 dm-0
254 1 43690 dm-1
254 2 15624 dm-2
254 3 49927 dm-3
254 4 13545 dm-4
254 5 39532 dm-5
254 6 19782 dm-6
7 8 2111 loop8
254 7 2110 dm-7
7 9 3150 loop9
254 8 3150 dm-8
7 10 43691 loop10
254 9 43690 dm-9
7 11 31217 loop11
254 10 31216 dm-10
7 12 36414 loop12
254 11 36414 dm-11
7 13 3150 loop13
254 12 3150 dm-12
Actually My friend has same model and similar tablet. Also has root access (root with rootmaster). But we don't known how to get img from his tablet. Anyway to get img from this tablet? In working tablet we install nanoid backup online apk and tried to backup nanoid. But not support for md706 model. Also tried rom manager, titanium backup pro and my backup pro, but cannot backup img.
We had read "CWM Recovery 6.0.1.2 for Allwinner A10 LY-F1/TREQ Tablets" but not dare to try. Cos some device got bootloop.
Pls share your stock rom.
sorry for my english.
I have momo93g with stock 4.1.2 jb. If i can help, i will. I am also interested in custom recovery, rom or kernel with overclock.
amir5569 said:
anyone have the rom that compatibility with my china tablet model Alps MD706 with cpu MTK MT6577 dual core 1,2ghz with ram 512mb. MY current rom have sleep death bugs.
spec sheet at the attachment
Click to expand...
Click to collapse
hello i have a smartpad mp720m mediacom is the Italian version of your tablet but according to some research I did on the internet appears to be identical to the md706 of Chinese production.
I think you can find help at this link
http://www.mediacomeurope.it/Supporto/Dettaglio.aspx?XRI=2129#googtrans(it|en)
---------- Post added at 08:53 AM ---------- Previous post was at 08:37 AM ----------
I have a question for you ... can you tell me if the mac address of your wi-fi card changes every time you activate the connection and turn it off? My tablet ...... has this problem and I do not understand what's causing it.
When active the wi fi I get a mac I can see in the status menu, after I turned off and on the wi fi and update status I can see a new mac with the last 3 pairs of different numbers.
This new mac I can see it in my router in the list of connected users.
You can check if you have the same problem on your models?
thank you!
fanáticomaniático said:
Hi i have a very similiar tablet, in the build.prop says that is an ALPS MD706, but mine has 1.0 ghz procesor.
Are you interested?:good:
Click to expand...
Click to collapse
Hi,i will be very glad if you can send this ROM to me, because i crashed mine
Hi,i will be very glad if you can send this ROM to me, because i crashed mine.my mail is [email protected]
ALPS MD706, 1.0 ghz procesor.
I need ROM (CM, AOKP, Stock) for NTT MD706 (link for firmware). Help! Please!
ROM for:
MD706B H V2 (4G + 512M + 1.0GHz Dual SIM)

BCMON injection attack not working

Hi, anyone here still using bcmon/aircrack-ng? Im grateful if someone can help me out. Thank you
im using korek chop chop attack for the injection attack.
i notice when i tried to use arpreplay attack, it would generated a lot of IVS until the 4 thousands packet then the #/s will dropped to 0
It is shown in the video at 6 minute 7 second
https://www.youtube.com/watch?v=ZFW9oSqyU3A
Code:
CH 9 ][ Elapsed: 16 s ][ 2007-02-04 11:04
BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
00:14:6C:7E:40:80 47 100 179 2689 336 9 11 WEP WEP teddy
BSSID STATION PWR Lost Packets Probes
00:14:6C:7E:40:80 00:09:5B:EC:EE:F2 29 0 2707
Code:
CH 9 ][ Elapsed: 16 s ][ 2007-02-04 11:04
BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
00:14:6C:7E:40:80 47 100 179 4689 0 9 11 WEP WEP teddy
BSSID STATION PWR Lost Packets Probes
00:14:6C:7E:40:80 00:09:5B:EC:EE:F2 29 0 2707

[GUIDE] EROFS - Mounting/ Accessing/ Creating system.img

Hiya folks! I'm trying to play with the firmware files for the P30 Pro, and have hit a roadblock. While I've gotten to extract the system.img (and all the other .img images) from update.app, I'm not able to mount or extract it using any of the usual tools because they are using EROFS file system.
I'm using Ubuntu 18.04 LTS, but haven't been able to spend much time on figuring out how to mount or access EROFS file systems yet. Has anyone gotten this figured out already? Any help will be great, thanks!
It started with that question, leading to finding the solution to mount the system.img, building mkfs.erofs and trying out a system.img etc.
I do not intend to work much on this, at least for quite a while owing to RL situations. In case anyone wants to build on this, please go ahead - everything I've used has a git that is linked appropriately
ph03n!x said:
In case anyone's looking to mount the erofs images from the stock firmware, here's what you have to do -
Download and extract UPDATE.APP from the firmware zip, and use splitupdate binary/ perl script or Huawei Update Extractor. (I have linked to the tools I have tried or used in the past)
Use simg2img to convert the system.img (or product.img or vendor.img) to raw format. simg2img is a part of android fsutils
Code:
sudo apt install android-tools-fsutils
You will need a linux box or VM with Kernel 5.x running (erofs support is added from 4.20, but I am running 5.x) - mount the raw image using
Code:
sudo mount -t erofs -o loop system.ext4.img /home/test/mnt/try2
(The "-t erofs" is optional - will work just fine with sudo mount -o loop system.ext4.img /home/test/mnt/try2)
You will get the erofs image mounted in the folder you've specified, and you can browse through it
Note that erofs images are not meant to be editable. If you want to modify the system.img, extract it's content and create a new system.img using the mkfs.erofs binary (I had linked to the source code). You'll of course need an unlocked bootloader to flash (or boot) the modified image
Click to expand...
Click to collapse
For building mkfs.erofs, here's what you need to do (mine is a Ubuntu 19.04 machine)
Code:
git clone https://kernel.googlesource.com/pub/scm/linux/kernel/git/xiang/erofs-utils.git -b dev
./autogen.sh
./configure
make
You will have the output in the mkfs/ folder.
More details from this post -
ph03n!x said:
@oslo83 I have attached the mkfs.erofs binary using this git source to the first post.
Please go through the README for this - I built this binary for the x64 architecture, and for lz4-1.9.0
The command options are -
Code:
mkfs.erofs 0.1
usage: [options] FILE DIRECTORY
Generate erofs image from DIRECTORY to FILE, and [options] are:
-zX[,Y] X=compressor (Y=compression level, optional)
-d# set output message level to # (maximum 9)
Note that the system.img that comes within UPDATE.APP is a root file system - here is a structure.
Code:
drwxr-xr-x. 2 root root 0 Aug 7 2018 3rdmodem
drwxr-xr-x. 2 root root 0 Aug 7 2018 3rdmodemnvm
drwxr-xr-x. 2 root root 0 Aug 7 2018 3rdmodemnvmbkp
drwxr-xr-x. 2 root root 0 Aug 7 2018 acct
lrw-r--r--. 1 root root 11 Aug 7 2018 bin -> /system/bin
lrw-r--r--. 1 root root 50 Aug 7 2018 bugreports -> /data/user_de/0/com.android.shell/files/bugreports
drwxrwx---. 2 ph03n1x 2001 0 Aug 7 2018 cache
lrw-r--r--. 1 root root 13 Aug 7 2018 charger -> /sbin/charger
dr-xr-xr-x. 2 root root 0 Aug 7 2018 config
drwxr-xr-x. 2 root root 0 Aug 7 2018 cust
lrw-r--r--. 1 root root 17 Aug 7 2018 d -> /sys/kernel/debug
drwxrwx--x. 2 ph03n1x ph03n1x 0 Aug 7 2018 data
drwxrwx--x. 2 ph03n1x ph03n1x 0 Aug 7 2018 data_old
lrw-------. 1 root root 23 Aug 7 2018 default.prop -> system/etc/prop.default
drwxr-xr-x. 2 root root 0 Aug 7 2018 dev
drwxr-xr-x. 2 root root 35 Aug 7 2018 dload
drwxr-xr-x. 2 root root 0 Aug 7 2018 eng
lrw-r--r--. 1 root root 11 Aug 7 2018 etc -> /system/etc
-rw-r-----. 1 root 2000 423 Aug 7 2018 fstab.zram1024m
-rw-r-----. 1 root 2000 423 Aug 7 2018 fstab.zram1280m
-rw-r-----. 1 root 2000 423 Aug 7 2018 fstab.zram1536m
-rw-r-----. 1 root 2000 422 Aug 7 2018 fstab.zram2240m
-rw-r-----. 1 root 2000 422 Aug 7 2018 fstab.zram256m
-rw-r-----. 1 root 2000 422 Aug 7 2018 fstab.zram4096m
-rw-r-----. 1 root 2000 422 Aug 7 2018 fstab.zram512m
-rw-r-----. 1 root 2000 422 Aug 7 2018 fstab.zram768m
-?????????? ? ? ? ? ? init
-rwxr-x---. 1 root 2000 1717 Aug 7 2018 init.environ.rc
-?????????? ? ? ? ? ? init.rc
-?????????? ? ? ? ? ? init.usb.configfs.rc
-?????????? ? ? ? ? ? init.usb.rc
-rwxr-x---. 1 root 2000 580 Aug 7 2018 init.zygote32.rc
-rwxr-x---. 1 root 2000 1042 Aug 7 2018 init.zygote64_32.rc
lrw-r--r--. 1 root root 8 Aug 7 2018 log -> /splash2
drwxr-xr-x. 2 root ph03n1x 0 Aug 7 2018 mnt
drwxr-xr-x. 2 root root 0 Aug 7 2018 modem_log
drwxr-xr-x. 2 root root 0 Aug 7 2018 odm
drwxr-xr-x. 2 root root 0 Aug 7 2018 oem
drwxr-xr-x. 6 root root 71 Aug 7 2018 patch
drwxr-xr-x. 2 root root 0 Aug 7 2018 patch_hw
drwxr-xr-x. 2 root root 0 Aug 7 2018 preload
drwxr-xr-x. 2 root root 0 Aug 7 2018 proc
drwxr-xr-x. 2 root root 0 Aug 7 2018 product
drwxr-xr-x. 2 root root 47 Aug 7 2018 res
-rw-r--r--. 1 root root 32 Aug 7 2018 resetFactory.cfg
drwxr-xr-x. 2 root root 0 Aug 7 2018 root
drwxr-x---. 2 root 2000 183 Aug 7 2018 sbin
lrw-r--r--. 1 root root 21 Aug 7 2018 sdcard -> /storage/self/primary
drwxr-xr-x. 2 root root 0 Aug 7 2018 sec_storage
drwxr-xr-x. 2 root root 0 Aug 7 2018 splash2
drwxr-x--x. 2 root 1028 0 Aug 7 2018 storage
drwxr-xr-x. 2 root root 0 Aug 7 2018 sys
drwxr-xr-x. 23 root root 478 Aug 7 2018 system
-?????????? ? ? ? ? ? ueventd.rc
drwxr-xr-x. 2 root 2000 0 Aug 7 2018 vendor
-rw-r--r--. 1 root root 524 Aug 7 2018 verity_key
drwxr-xr-x. 2 root root 0 Aug 7 2018 version
It would be good if you spend time with the system.img, vendor.img, product.img and understand how the structures are inter-linked. Happy hunting!
Click to expand...
Click to collapse
ph03n!x said:
Hiya folks! I'm trying to play with the firmware files for the P30 Pro, and have hit a roadblock. While I've gotten to extract the system.img (and all the other .img images) from update.app, I'm not able to mount or extract it using any of the usual tools because they are using EROFS file system.
I'm using Ubuntu 18.04 LTS, but haven't been able to spend much time on figuring out how to mount or access EROFS file systems yet. Has anyone gotten this figured out already? Any help will be great, thanks!
Click to expand...
Click to collapse
Current tools aren't working with EROFS, we will need new ones, compatible with EROFS.
Update as of today -
I have cloned erofs-utils git and have compiled mkfs for creating EROFS images. Will work on it whenever I have time to see if I can get an img to mount...
UPDATE 2 - SUCCESS!
In case anyone's looking to mount the erofs images from the stock firmware, here's what you have to do -
Download and extract UPDATE.APP from the firmware zip, and use splitupdate binary/ perl script or Huawei Update Extractor. (I have linked to the tools I have tried or used in the past)
Use simg2img to convert the system.img (or product.img or vendor.img) to raw format. simg2img is a part of android fsutils
Code:
sudo apt install android-tools-fsutils
You will need a linux box or VM with Kernel 5.x running (erofs support is added from 4.20, but I am running 5.x) - mount the raw image using
Code:
sudo mount -t erofs -o loop system.ext4.img /home/test/mnt/try2
(The "-t erofs" is optional - will work just fine with sudo mount -o loop system.ext4.img /home/test/mnt/try2)
You will get the erofs image mounted in the folder you've specified, and you can browse through it
Note that erofs images are not meant to be editable. If you want to modify the system.img, extract it's content and create a new system.img using the mkfs.erofs binary (I had linked to the source code). You'll of course need an unlocked bootloader to flash (or boot) the modified image
ph03n!x said:
Update as of today -
I have cloned erofs-utils git and have compiled mkfs for creating EROFS images. Will work on it whenever I have time to see if I can get an img to mount...
Click to expand...
Click to collapse
Have a look (read) here - > https://zhuanlan.zhihu.com/p/60617375
Pretoriano80 said:
Have a look (read) here - > https://zhuanlan.zhihu.com/p/60617375
Click to expand...
Click to collapse
I had come across that link earlier, but that is for compiling mkfs for arm/ arm64...
Got what I needed, mission accomplished
So have you actually modified system and packaged it back up as erofs and booted it?
freeza said:
So have you actually modified system and packaged it back up as erofs and booted it?
Click to expand...
Click to collapse
I do not have an unlocked bootloader yet - I have gotten as far as editing and recreating the EROFS image. One of these days I'll get the bootloader unlocked too :good:
ph03n!x said:
I do not have an unlocked bootloader yet - I have gotten as far as editing and recreating the EROFS image. One of these days I'll get the bootloader unlocked too :good:
Click to expand...
Click to collapse
Be careful with this kind of stuff after unlocking, Huawei devices are tricky as hell. Afaik Magisk already support EroFS, so it might be better to use that.
Of course,that's if you don't want to create some kind of custom rom, based on stock.
Pretoriano80 said:
Be careful with this kind of stuff after unlocking, Huawei devices are tricky as hell. Afaik Magisk already support EroFS, so it might be better to use that.
Of course,that's if you don't want to create some kind of custom rom, based on stock.
Click to expand...
Click to collapse
That is why I have two active phones, plus a few more right from the legendary HD2 to fall back on... what fun is it if you don't experiment with the flashy new hardware?!
I don't know when I will make credible progress on anything at all now though - am relocating to a different country shortly - to the home of Huawei
Hey! Congratulations and thank you for the time and effort you spent on this.
Also, It's awesome to see another LEO user! Mine died a while back, but that was the modders heaven!
I've got an unlocked device and rooted using Magisk.
Root Explorer or any other root tools available today cannot read the system partition. It shows as free space is 0 MB.
Actually, I can see the content inside /system but I cannot move anything to it - Like patching the hosts file.
Any clue on how to achieve that?
JazonX said:
Hey! Congratulations and thank you for the time and effort you spent on this.
Also, It's awesome to see another LEO user! Mine died a while back, but that was the modders heaven!
I've got an unlocked device and rooted using Magisk.
Root Explorer or any other root tools available today cannot read the system partition. It shows as free space is 0 MB.
Actually, I can see the content inside /system but I cannot move anything to it - Like patching the hosts file.
Any clue on how to achieve that?
Click to expand...
Click to collapse
You can't! You must use Magisk for that.
Pretoriano80 said:
You can't! You must use Magisk for that.
Click to expand...
Click to collapse
Hi Pretoriano,
Nice to see you on dead land. Remember those days when I was using Mate 10 Pro. Anyways let's move on and please guide us how to use magisk to push something in to system or remove / replace.
I'm rooted and looted on P30 Pro:laugh:
Thanks in advance,
goldybewon
goldybewon said:
Hi Pretoriano,
Nice to see you on dead land. Remember those days when I was using Mate 10 Pro. Anyways let's move on and please guide us how to use magisk to push something in to system or remove / replace.
I'm rooted and looted on P30 Pro:laugh:
Thanks in advance,
goldybewon
Click to expand...
Click to collapse
Just read Magisk documentation, it's easy to build yourself simple modules. Also you can get some examples from available modules.
JazonX said:
Actually, I can see the content inside /system but I cannot move anything to it - Like patching the hosts file.
Any clue on how to achieve that?
Click to expand...
Click to collapse
Pretoriano80 said:
You can't! You must use Magisk for that.
Click to expand...
Click to collapse
Yes, Pretoriano80 is right - EROFS by design is not meant to be modified. While I might take sometime later on to create a modified system.img, it'll be just an academic exercise - Magisk can easily add/ replace the contents of /system during boot, making system.img mods passe :angel:
@oslo83 I have attached the mkfs.erofs binary using this git source to the first post.
Please go through the README for this - I built this binary for the x64 architecture, and for lz4-1.9.0
The command options are -
Code:
mkfs.erofs 0.1
usage: [options] FILE DIRECTORY
Generate erofs image from DIRECTORY to FILE, and [options] are:
-zX[,Y] X=compressor (Y=compression level, optional)
-d# set output message level to # (maximum 9)
Note that the system.img that comes within UPDATE.APP is a root file system - here is a structure.
Code:
drwxr-xr-x. 2 root root 0 Aug 7 2018 3rdmodem
drwxr-xr-x. 2 root root 0 Aug 7 2018 3rdmodemnvm
drwxr-xr-x. 2 root root 0 Aug 7 2018 3rdmodemnvmbkp
drwxr-xr-x. 2 root root 0 Aug 7 2018 acct
lrw-r--r--. 1 root root 11 Aug 7 2018 bin -> /system/bin
lrw-r--r--. 1 root root 50 Aug 7 2018 bugreports -> /data/user_de/0/com.android.shell/files/bugreports
drwxrwx---. 2 ph03n1x 2001 0 Aug 7 2018 cache
lrw-r--r--. 1 root root 13 Aug 7 2018 charger -> /sbin/charger
dr-xr-xr-x. 2 root root 0 Aug 7 2018 config
drwxr-xr-x. 2 root root 0 Aug 7 2018 cust
lrw-r--r--. 1 root root 17 Aug 7 2018 d -> /sys/kernel/debug
drwxrwx--x. 2 ph03n1x ph03n1x 0 Aug 7 2018 data
drwxrwx--x. 2 ph03n1x ph03n1x 0 Aug 7 2018 data_old
lrw-------. 1 root root 23 Aug 7 2018 default.prop -> system/etc/prop.default
drwxr-xr-x. 2 root root 0 Aug 7 2018 dev
drwxr-xr-x. 2 root root 35 Aug 7 2018 dload
drwxr-xr-x. 2 root root 0 Aug 7 2018 eng
lrw-r--r--. 1 root root 11 Aug 7 2018 etc -> /system/etc
-rw-r-----. 1 root 2000 423 Aug 7 2018 fstab.zram1024m
-rw-r-----. 1 root 2000 423 Aug 7 2018 fstab.zram1280m
-rw-r-----. 1 root 2000 423 Aug 7 2018 fstab.zram1536m
-rw-r-----. 1 root 2000 422 Aug 7 2018 fstab.zram2240m
-rw-r-----. 1 root 2000 422 Aug 7 2018 fstab.zram256m
-rw-r-----. 1 root 2000 422 Aug 7 2018 fstab.zram4096m
-rw-r-----. 1 root 2000 422 Aug 7 2018 fstab.zram512m
-rw-r-----. 1 root 2000 422 Aug 7 2018 fstab.zram768m
-?????????? ? ? ? ? ? init
-rwxr-x---. 1 root 2000 1717 Aug 7 2018 init.environ.rc
-?????????? ? ? ? ? ? init.rc
-?????????? ? ? ? ? ? init.usb.configfs.rc
-?????????? ? ? ? ? ? init.usb.rc
-rwxr-x---. 1 root 2000 580 Aug 7 2018 init.zygote32.rc
-rwxr-x---. 1 root 2000 1042 Aug 7 2018 init.zygote64_32.rc
lrw-r--r--. 1 root root 8 Aug 7 2018 log -> /splash2
drwxr-xr-x. 2 root ph03n1x 0 Aug 7 2018 mnt
drwxr-xr-x. 2 root root 0 Aug 7 2018 modem_log
drwxr-xr-x. 2 root root 0 Aug 7 2018 odm
drwxr-xr-x. 2 root root 0 Aug 7 2018 oem
drwxr-xr-x. 6 root root 71 Aug 7 2018 patch
drwxr-xr-x. 2 root root 0 Aug 7 2018 patch_hw
drwxr-xr-x. 2 root root 0 Aug 7 2018 preload
drwxr-xr-x. 2 root root 0 Aug 7 2018 proc
drwxr-xr-x. 2 root root 0 Aug 7 2018 product
drwxr-xr-x. 2 root root 47 Aug 7 2018 res
-rw-r--r--. 1 root root 32 Aug 7 2018 resetFactory.cfg
drwxr-xr-x. 2 root root 0 Aug 7 2018 root
drwxr-x---. 2 root 2000 183 Aug 7 2018 sbin
lrw-r--r--. 1 root root 21 Aug 7 2018 sdcard -> /storage/self/primary
drwxr-xr-x. 2 root root 0 Aug 7 2018 sec_storage
drwxr-xr-x. 2 root root 0 Aug 7 2018 splash2
drwxr-x--x. 2 root 1028 0 Aug 7 2018 storage
drwxr-xr-x. 2 root root 0 Aug 7 2018 sys
drwxr-xr-x. 23 root root 478 Aug 7 2018 system
-?????????? ? ? ? ? ? ueventd.rc
drwxr-xr-x. 2 root 2000 0 Aug 7 2018 vendor
-rw-r--r--. 1 root root 524 Aug 7 2018 verity_key
drwxr-xr-x. 2 root root 0 Aug 7 2018 version
It would be good if you spend time with the system.img, vendor.img, product.img and understand how the structures are inter-linked. Happy hunting!
@ph03n!x
Is it possible to compile/assemble such software piece for Windows, or its unrealistical? There's millions of examples to explore ext4 images, but 0 about erofs.
I mean, we see sources. in C... i guess it should be still possible to translate it to something portable in Python or simply compile some component on Windows
dimon222 said:
@ph03n!x
Is it possible to compile/assemble such software piece for Windows, or its unrealistical? There's millions of examples to explore ext4 images, but 0 about erofs.
I mean, we see sources. in C... i guess it should be still possible to translate it to something portable in Python or simply compile some component on Windows
Click to expand...
Click to collapse
I will explore this when I find time.. relocating between countries at the moment. That said, please do not hold your breath - I'm more comfortable with Linux than with Windows. But I'll still give it a shot!
https://forum.xda-developers.com/mate-20-pro/help/emui-9-1-partition-rw-t3947916/post80059824
Thanks @ante0 for his mkfs.erofs arm build.
How do you convert system.img to raw img? System partion is erofs can you tell the trick clearly? With method... Plz
Has anyone tried this with WSL v2? Curious to see if it works.

High CPU usage from /system/bin/app_process

Something is eating up my CPU and making my tablet run hot. And I don't know how to fix it. I looked with 3C Toolbox to see what's using the CPU, and it seems to mostly be multiple instances of /system/bin/app_process, which apparently belongs to the kernel. Well, shoot. If it were an app that were using up all the CPU cycles, I could just disable it. But what do I do when it's the kernel?
I looked in Amplify to see if I could find any clues. The one thing that really seems suspicious is com.google.android.gms/.chimera.GmsIntentOperatiomService. I feel like it should not be startinging that many thousands of services. But what can I do about it?
Here are some logs from various apps that may help us get to the bottom of this. Any help is appreciated.
CPU-Z
Qualcomm Snapdragon S4
1.73 GHz
Cores
2
Architecture
Krait
Revision
r2p0
Process
28 nm
Clock Speed
384 MHz - 1.73 GHz
CPU 0
1728 MHz
CPU 1
1728 MHz
CPU Load
100 %
GPU Vendor
Qualcomm
GPU Renderer
Adreno (TM) 305 @ 500 MHz
GPU Clock Speed
320 MHz
GPU Load
0 %
Scaling Governor
interactive
Model
Samsung Galaxy Tab 3 7.0 (SM-T217S)
Distributor
Sprint
Brand
samsung
Board
MSM8960
Hardware
qcom
Screen Size
7.00 inches
Screen Resolution
600 x 1024 pixels
Screen Density
169 dpi
Dimensions
188.0 x 111.1 x 9.9 mm
Weight
304 g
Total RAM
1346 MB
Available RAM
458 MB (34%)
Internal Storage
4.86 GB
Available Storage
1.27 GB (26%)
Release Date
2013-04-04
Android Version
7.1.2
API Level
25
Security Patch Level
2017-04-05
Bootloader
T217SVPUBOH1
Build ID
lineage_lt02ltespr-userdebug 7.1.2 N2G47E 4637d31271 test-keys
Java VM
ART 2.1.0
OpenGL ES
3.0
Kernel Architecture
armv7l
Kernel Version
3.4.113-gf82f607f (4637d31271)
Root Access
Yes
Google Play Service
20.12.16 (040300-306753009)
System Uptime
06:39:59
3C Toolbox
Guide:
Process
Used CPU %
CPU
100%
Memory
904.52MB
442.32MB
SD Card
3.58GB
1.27GB
3.76GB
10.70GB
/system/bin/app_process
18.58%
/system/bin/app_process
18.14%
/system/bin/app_process
17.56%
system_server
15.30%
Gmail
11.79%
Docs
10.03%
Magisk Manager
7.34%
3C All-in-One Toolbox:ui
9.18%
Google Play services
6.65%
Google Backup Transport:com.google.android.gms.persistent
6.55%
/system/bin/surfaceflinger
5.66%
Android System WebView:sandboxed_process0
4.69%
System UI
4.91%
Sheets
3.16%
dfndr performance
/system/bin/app_process
18.58%
/system/bin/app_process
18.14%
/system/bin/app_process
17.56%
system_server
15.30%
Gmail
11.79%
Docs
10.03%
Magisk Manager
7.34%
3C All-in-One Toolbox:ui
9.18%
Google Play services
6.65%
Google Backup Transport:com.google.android.gms.persistent
6.55%
/system/bin/surfaceflinger
5.66%
Android System WebView:sandboxed_process0
4.69%
System UI
4.91%
Sheets
3.16%
dfndr performance
2.25%
cLock
1.39%
Used %
Excluded
System
Kernel
2.25%
cLock
1.39%
Amplify
Home
DEVICE STATS
DEVICE STATS
View your progress
RESET
Stats collected for
05:05:05
Wakelock time allowed
02:12:59
Wakelock time blocked
00:57
Wakelocks acquired
1452
Wakelocks blocked
265
Alarms fired
114
Alarms blocked
0
Guide
Number of Wakelocks
Type
Wakelock Time Allowed
Wakelocks
Search
New
Sort by count
Limited
Safe to limit
71
SyncLoopWakeLock
17
33
NlpWakeLock
08
28
NetworkStats
08
21
Wakeful StateMachine: GeofencerStateMachine
00
9
GCoreFlp
01
9
Icing
11:21
4
StartingAlertService
32
1
*net_scheduler*
23
Unknown
269
*gms_scheduler*:internal
03:32
163
*launch*
05:23
119
*alarm*
03:59
77
ServiceStateTracker
01
28
GnssLocationProvider
15:59
11
org.fdroid.fdroid.net.ConnectivityMonitorService:launch
00
11
org.fdroid.fdroid.net.ConnectivityMonitorService:run
03
10
*job*/com.google.android.apps.docs.editors.kix/com.google/[removed]@gmail.com:android
02:18
8
GCM_READ
01
8
com.psafe.cleaner.common.factories.NotificationFactoryImpl:run
17
8
com.psafe.cleaner.common.factories.NotificationFactoryImpl:launch
01:00
7
org.mozilla.gecko.telemetry.TelemetryUploadService:run
57
6
UlrDispSvcFastWL
16
6
NetworkTimeUpdateService
00
6
PhoneWindowManager.mPowerKeyWakeLock
01
5
*gms_scheduler*/com.google.android.gms/.auth.account.be.legacy.AuthCronService
01:37
5
IntentOp:.reminders.notification.RefreshNotificationsIntentOperation
03
5
*gms_scheduler*/com.google.android.gms/.ads.social.GcmSchedulerWakeupService
22
5
SCREEN_FROZEN
04
4
*gms_scheduler*/com.google.android.gms/.tapandpay.gcmtask.TapAndPayGcmTaskService
03
4
ActivityManager-Sleep
05
4
IntentOp:com.google.android.gms/.chimera.GmsIntentOperationService
01:02
4
WifiSuspend
01
4
JobExecutor
00
4
*job*/com.psafe.cleaner/com.evernote.android.job.v21.PlatformJobService
01
4
org.mozilla.gecko.telemetry.TelemetryUploadService:launch
44
4
*gms_scheduler*/com.google.android.gms/.udc.service.UdcContextInitService
04:50
4
*gms_scheduler*/com.google.android.gms/.gass.chimera.SchedulePeriodicTasksService
16
4
wake:CollectionChimeraSvc
09
3
*gms_scheduler*/com.google.android.gms/.ipa.base.IpaGcmTaskService
07
3
*gms_scheduler*/com.google.android.gms/.phenotype.service.sync.PhenotypeConfigurator
03:54
3
*sync*/gmail-ls/com.google/[removed]@gmail.com
03:42
3
org.mozilla.gecko.dlc.DlcStudyService:run
19
3
*gms_scheduler*/com.google.android.gms/.gcm.gmsproc.GcmInGmsTaskService
11
3
show keyguard
03
3
DozeService
01
3
org.mozilla.gecko.dlc.DlcStudyService:launch
09
3
GCM_CONN_ALARM
03
3
fiid-sync
01:01
3
startDream
03
3
wake:com.google.android.gms/.chimera.GmsIntentOperationService
03:00
3
DreamManagerService
01:41
3
*job*/gmail-ls/com.google/[removed]@gmail.com:android
03:45
3
*gms_scheduler*/com.google.android.gms/.clearcut.uploader.QosUploaderService
13
3
IntentOp:.reminders.notification.ScheduleTimeRemindersIntentOperation
00
2
ScheduleNextAlarmWakeLock
00
2
video-playing
29
2
*gms_scheduler*/com.google.android.gms/.measurement.PackageMeasurementTaskService
01
2
*gms_scheduler*/com.google.android.gms/.security.snet.SnetNormalTaskService
08
2
CryptauthEnroller
15
2
*job*/com.android.vending/com.google.android.finsky.scheduler.JobSchedulerEngine$PhoneskyJobSchedulerJobService
00
2
com.mobisystems.office.fonts.ScannerService:launch
08
2
DG:service
02
2
*gms_scheduler*/com.google.android.gms/.icing.service.IcingGcmTaskService
02
2
*job*/com.google.android.gms.chromesync/com.google/[removed]@gmail.com:android
01:24
2
*gms_scheduler*/com.google.android.gms/.checkin.EventLogService
58
2
audio-playing
25
2
*sync*/com.google.android.apps.docs.editors.kix/com.google/[removed]@gmail.com
01:59
2
*job*/com.google.android.apps.docs.editors.docs/com.google.android.apps.docs.sync.content.ContentSyncJobService
13
2
Checkin Service
02
2
IntentOp:.reminders.notification.ScheduleLocationRemindersIntentOperation
01
2
com.mobisystems.office.fonts.ScannerService:run
16
2
wake:com.google.android.gms/.auth.account.be.accountstate.LoginAccountsChangedIntentService
02:00
2
GCM_HB_ALARM
00
1
wake:com.google.firebase.iid.WakeLockHolder
00
1
CMWakeLock
02
1
org.mozilla.gecko.dlc.DlcSyncService:run
39
1
SyncManagerImpl
02:34
1
*gms_scheduler*/com.google.android.gms/.chimera.container.ConfigService
14
1
IntentOp:.mdm.services.SitrepChimeraService
09
1
GmsDownloadIntentOp
13
1
*job*/com.google.android.gms.auth.accountstate/com.google/[removed]@gmail.com:android
16
1
org.mozilla.gecko.dlc.DlcSyncService:launch
00
1
IntentOp:.auth.authzen.cryptauth.AccountChangeProcessingIntentOperation
20
1
*gms_scheduler*/com.google.android.gms/.chimera.container.ConfigService
14
1
com.mobisystems.office.chat.pending.PendingEventsIntentService:run
00
1
*gms_scheduler*/com.google.android.gms/.telephonyspam.sync.SpamListSyncTaskService
02
1
*sync*/com.google.android.gms.chromesync/com.google/[removed]@gmail.com
13
1
com.mobisystems.libfilemng.search.EnumerateFilesService:run
07
1
IntentOp:com.google.android.gms/.chimera.PersistentIntentOperationService
00
1
IntentOp:.auth.frp.FrpUpdateIntentOperation
00
1
com.mobisystems.office.chat.pending.PendingEventsIntentService:run
00
1
*gms_scheduler*/com.google.android.gms/.telephonyspam.sync.SpamListSyncTaskService
02
1
*sync*/com.google.android.gms.chromesync/com.google/[removed]@gmail.com
13
1
com.mobisystems.libfilemng.search.EnumerateFilesService:run
07
1
IntentOp:com.google.android.gms/.chimera.PersistentIntentOperationService
00
1
IntentOp:.auth.frp.FrpUpdateIntentOperation
00
1
GmsDownloadIntentOp
13
1
*job*/com.google.android.gms.auth.accountstate/com.google/[removed]@gmail.com:android
16
1
org.mozilla.gecko.dlc.DlcSyncService:launch
00
1
IntentOp:.auth.authzen.cryptauth.AccountChangeProcessingIntentOperation
20
1
*gms_scheduler*/com.google.android.gms/.chimera.container.ConfigService
14
1
com.mobisystems.office.chat.pending.PendingEventsIntentService:run
00
1
*gms_scheduler*/com.google.android.gms/.telephonyspam.sync.SpamListSyncTaskService
02
1
*sync*/com.google.android.gms.chromesync/com.google/[removed]@gmail.com
13
1
com.mobisystems.libfilemng.search.EnumerateFilesService:run
07
1
IntentOp:com.google.android.gms/.chimera.PersistentIntentOperationService
00
1
IntentOp:.auth.frp.FrpUpdateIntentOperation
00
1
com.mobisystems.office.chat.pending.PendingEventsIntentService:run
00
1
*gms_scheduler*/com.google.android.gms/.telephonyspam.sync.SpamListSyncTaskService
02
1
*sync*/com.google.android.gms.chromesync/com.google/[removed]@gmail.com
13
1
com.mobisystems.libfilemng.search.EnumerateFilesService:run
07
1
IntentOp:com.google.android.gms/.chimera.PersistentIntentOperationService
00
1
IntentOp:.auth.frp.FrpUpdateIntentOperation
00
Not safe to limit
468
RILJ
14
51
WindowManager
17:25
17
AudioMix
27:44
3
GOOGLE_C2DM
01
Alarms
Search
New
Sort by count
Limited
Safe to limit
Unknown
23
com.google.android.gms.gcm.ACTION_CHECK_QUEUE
16
com.google.android.gms.common.operation.LOG_CORE_ANALYTICS
8
com.google.android.chimera.container.NEW_MODULE_TIMEOUT
4
com.android.deskclock.ON_QUARTER_HOUR
4
com.google.android.gms.auth.authzen.cryptauth.DEVICE_STATE_CHECK_DELAY_COMPLETE
3
com.google.android.intent.action.GCM_RECONNECT
3
com.android.server.action.NETWORK_STATS_POLL
2
com.google.android.gms.gcm.HEARTBEAT_ALARM
1
com.google.android.gms/.mdm.receivers.RetryAfterAlarmReceiver
1
com.google.android.gms.common.download.START
1
ActionOnTimeLucky
1
com.google.android.gms.matchstick.register_intent_action
Not safe to limit
60
android.intent.action.TIME_TICK
Services
Search
New
Sort by count
Limited
Safe to limit
Unknown
6134
com.google.android.gms/.chimera.GmsIntentOperationService
163
com.google.android.gms/.chimera.container.FileApkIntentOperation$ExternalFileApkService
124
com.google.android.gms/.chimera.PersistentIntentOperationService
56
com.google.android.gms/.chimera.GmsBoundBrokerService
46
org.fdroid.fdroid/.net.WifiStateChangeService
40
com.google.android.gms/.chimera.container.FileApkChimeraService$FileApkService
17
com.cyanogenmod.lockclock/.weather.WeatherUpdateService
17
com.google.android.gms/.icing.service.IndexWorkerService
16
com.google.android.gms/.cast.service.CastSocketMultiplexerLifeCycleService
Services
Search
New
Sort by count
12
org.fdroid.fdroid/.net.ConnectivityMonitorService
10
in.co.pricealert.apps2sd/.Apps2SDTasker
10
com.google.android.gms/.chimera.GmsApiService
10
com.google.android.gm/com.android.mail.widget.BaseGmailWidgetProviderService
9
org.mozilla.firefox/org.mozilla.gecko.media.MediaControlService
9
com.psafe.cleaner/.common.factories.NotificationFactoryImpl
7
ch.protonvpn.android/org.strongswan.android.logic.CharonVpnService
7
org.mozilla.firefox/org.mozilla.gecko.telemetry.TelemetryUploadService
7
org.fdroid.fdroid/.localrepo.SDCardScannerService
5
com.google.android.gms/.gcm.GcmService
5
com.google.android.gm/.GmailIntentService
5
ccc71.at.free/lib3c.notifications.lib3c_notification_service
5
ccc71.at.free/lib3c.indicators.lib3c_indicators_service
4
com.google.android.gms/.nearby.sharing.ReceiveSurfaceService
4
com.android.calendar/.alerts.AlertService
Services
Search
New
Sort by count
3
org.mozilla.firefox/org.mozilla.gecko.dlc.DlcStudyService
3
com.google.android.gms/.auth.proximity.firstparty.FirstPartyDeviceRegistrationService
4
com.cyanogenmod.lockclock/.ClockWidgetService
4
com.google.android.gms/.nearby.messages.service.NearbyMessagesService
4
com.google.android.gms/.chimera.UiIntentOperationService
4
com.google.android.gms/.tron.CollectionService
3
org.mozilla.firefox/com.leanplum.LeanplumPushRegistrationService
3
com.google.android.gms/.cast.service.CastPersistentService
3
com.google.android.gms/com.google.android.contextmanager.service.ContextManagerService
3
org.mozilla.firefox/org.mozilla.gecko.dlc.DlcStudyService
3
com.google.android.gms/.auth.proximity.firstparty.FirstPartyDeviceRegistrationService
3
com.google.android.gms/com.google.android.location.reporting.service.DispatchingService
2
com.google.android.gms/.subscribedfeeds.GcmReceiverService
2
com.google.android.gms/.fido.fido2.pollux.CableAuthenticatorService
2
com.google.android.gms/.rcs.binding.RcsBindingPersistentService
2
com.android.providers.calendar/.EmptyService
2
com.google.android.gms/.common.stats.GmsCoreStatsService
2
com.google.android.gms/.magictether.host.TetherListenerService
3
com.google.android.gms/com.google.android.location.reporting.service.DispatchingService
2
com.google.android.gms/.subscribedfeeds.GcmReceiverService
2
com.google.android.gms/.fido.fido2.pollux.CableAuthenticatorService
2
com.google.android.gms/.rcs.binding.RcsBindingPersistentService
2
com.android.providers.calendar/.EmptyService
2
com.google.android.gms/.common.stats.GmsCoreStatsService
2
com.google.android.gms/.magictether.host.TetherListenerService
Services
Search
New
Sort by count
2
com.google.android.gms/com.google.location.nearby.direct.service.NearbyDirectService
2
com.google.android.gms/.thunderbird.EmergencyPersistentService
2
com.google.android.gms/.auth.setup.devicesignals.LockScreenService
2
com.google.android.gms/.auth.authzen.GcmReceiverService
2
2
com.google.android.gms/.auth.account.be.accountstate.LoginAccountsChangedIntentService
2
com.google.android.gms/.wearable.service.WearableControlService
2
com.google.android.gms/.location.persistent.LocationPersistentService
2
com.android.gallery3d/.app.PackagesMonitor$AsyncService
2
com.google.android.gms/.trustagent.api.bridge.TrustAgentBridgeService
2
com.google.android.gms/.droidguard.DroidGuardService
2
com.google.android.gms/.auth.easyunlock.authorization.InitializerIntentService
2
com.android.providers.calendar/.CalendarProviderIntentService
2
com.google.android.gms/.deviceconnection.service.DeviceConnectionWatcherService
2
com.google.android.gms/.auth.account.be.channelid.ChannelBindingStateIntentService
2
com.mobisystems.office/.fonts.ScannerService
1
com.mobisystems.office/.chat.pending.PendingEventsIntentService
1
com.google.android.gms/.checkin.CheckinService
Services
Search
New
Sort by count
1
ru.wHgVDhPg.yYjJowhiS/com.ui.PatchService
2
com.google.android.gms/.fitness.service.recording.FitRecordingBroker
2
com.google.android.gms/.lockbox.LockboxService
2
com.google.android.gms/.gcm.nts.SchedulerService
1
in.co.pricealert.apps2sd/.Apps2SDService
1
com.smartprojects.MemoryLocker/.MemoryLockerService
1
com.amazon.kindle/com.amazon.android.providers.downloads.DownloadService
1
org.mozilla.firefox/org.mozilla.gecko.dlc.DlcSyncService
1
com.google.android.gms/.auth.proximity.firstparty.SystemMemoryCacheService
1
com.android.vending/com.google.android.finsky.setup.VpaService
1
com.mobisystems.office/com.mobisystems.libfilemng.search.EnumerateFilesService
1
com.google.android.youtube/com.firebase.jobdispatcher.GooglePlayReceiver
1
com.mobisystems.office/.chat.pending.PendingEventsIntentService
1
com.google.android.gms/.checkin.CheckinService
1
ru.wHgVDhPg.yYjJowhiS/com.ui.PatchService
1
com.mobisystems.office/com.mobisystems.connect.client.push.PushListenerService
0
org.fdroid.fdroid/.data.InstalledAppProviderService
1
com.mobisystems.office/com.mobisystems.connect.client.push.PushListenerService
0
org.fdroid.fdroid/.data.InstalledAppProviderService
FYI: app_process starts the interpreted runtime, then starts up the application.

RMX2075EU 11 C23

RMX2075EU 11 C23 is out from 28 10 2021 for the RMX2075EU

Categories

Resources