piccolo08 {L_WROTE}:DSP_BL ha 24-25K e tutti gli octet sono "0"( zero)...alex...help :)
e infatti ... questo sospettavo ...
Sostituisci il DSP_BL con quello originale (o anche con quello di un altro cell, sono tutti uguali)
piccolo08 {L_WROTE}:DSP_BL ha 24-25K e tutti gli octet sono "0"( zero)...alex...help :)
ghost76 {L_WROTE}:Scusate. io sto provando a farlo con un nuovo s9300 con un vero jb 4.1.1 installato
2288 KB/s (138288 bytes in 0.059s)
Sbloccare (subito) il telefono e confermare il RIPRISTINO ...
do\adb restore do\localprop.ab
do\adb shell "while ! ln -s /data/local.prop
Impossibile trovare C:\ROOT_DEFLASH\tmp\local.prop <<<<<<<<================================================================================================
3630 KB/s (524288 bytes in 0.141s)
Reboot in corso ...
do\adb shell rm /data/local.prop
do\adb shell rm /data/data/com.android.settings/a/*
Attendiamo che il telefono abbia riconosciuto la SDCARD ("/storage/sdcard0") ...
Filesystem Size Used Free Blksize
/storage/sdcard0 29G 1G 27G 32768
<<<<<<<<<<<<<<<=============MI SEMBRA CHE STAVANO QUA....
/* MTK sparseImage Tool v1.0ß */
/* COPYRIGHT @2012 - by AlexIT - http://forum.chinafonini.it */
PMT @ 00008000 (this seems to be an EMMCDUMP
Extracting ... RAW @00000800 +0001D014 (BOOT) /storage/sdcard0/DEFLASH/PRELOA
DER.BIN
Extracting ... RAW @00020800 +00006024 (BOOT) /storage/sdcard0/DEFLASH/DSP_BL
Extracting ... RAW @00000000 +00000200 (MAIN) /storage/sdcard0/DEFLASH/MBR
Extracting ... RAW @00004000 +00000200 (MAIN) /storage/sdcard0/DEFLASH/EBR1
Extracting ... RAW @00008000 +00001000 (MAIN) /storage/sdcard0/DEFLASH/__NODL
_PMT
Extracting ... RAW @00408000 +00500000 (MAIN) /storage/sdcard0/DEFLASH/__NODL
_NVRAM
Extracting ... RAW @00908000 +00020000 (MAIN) /storage/sdcard0/DEFLASH/__NODL
_SECCFG
Extracting ... RAW @00928000 +000319C0 (MAIN) /storage/sdcard0/DEFLASH/UBOOT.
BIN
Extracting ... RAW @00988000 +003B1000 (MAIN) /storage/sdcard0/DEFLASH/BOOT.I
MG
Extracting ... RAW @00F88000 +00408000 (MAIN) /storage/sdcard0/DEFLASH/RECOVE
RY.IMG
Extracting ... SPARSE @01588000 +00600000 (MAIN) /storage/sdcard0/DEFLASH/SECRO.
IMG
Extracting ... RAW @01B88000 +00060000 (MAIN) /storage/sdcard0/DEFLASH/__NODL
_MISC
Extracting ... RAW @01BE8000 +00036D50 (MAIN) /storage/sdcard0/DEFLASH/LOGO.B
IN
Extracting ... RAW @01EE8000 +00200000 (MAIN) /storage/sdcard0/DEFLASH/__NODL
_EXPDB
Extracting ... SPARSE @020E8000 +20100000 (MAIN) /storage/sdcard0/DEFLASH/SYSTEM
.IMG
Extracting ... SPARSE @221E8000 +20100000 (MAIN) /storage/sdcard0/DEFLASH/CACHE.
IMG
Extracting ... SPARSE @422E8000 +20100000 (MAIN) /storage/sdcard0/DEFLASH/USERDA
TA.IMG
Extracting ... RAW @623E8000 +003EE000 (MAIN) /storage/sdcard0/DEFLASH/FAT.IM
G
Sto copiando su qeusto PC i file estratti ...
pull: building file list...
pull: /storage/sdcard0/DEFLASH/FAT.IMG -> DEFLASH/FAT.IMG
pull: /storage/sdcard0/DEFLASH/USERDATA.IMG -> DEFLASH/USERDATA.IMG
pull: /storage/sdcard0/DEFLASH/CACHE.IMG -> DEFLASH/CACHE.IMG
pull: /storage/sdcard0/DEFLASH/SYSTEM.IMG -> DEFLASH/SYSTEM.IMG
pull: /storage/sdcard0/DEFLASH/__NODL_EXPDB -> DEFLASH/__NODL_EXPDB
pull: /storage/sdcard0/DEFLASH/LOGO.BIN -> DEFLASH/LOGO.BIN
pull: /storage/sdcard0/DEFLASH/__NODL_MISC -> DEFLASH/__NODL_MISC
pull: /storage/sdcard0/DEFLASH/SECRO.IMG -> DEFLASH/SECRO.IMG
pull: /storage/sdcard0/DEFLASH/RECOVERY.IMG -> DEFLASH/RECOVERY.IMG
pull: /storage/sdcard0/DEFLASH/BOOT.IMG -> DEFLASH/BOOT.IMG
pull: /storage/sdcard0/DEFLASH/UBOOT.BIN -> DEFLASH/UBOOT.BIN
pull: /storage/sdcard0/DEFLASH/__NODL_SECCFG -> DEFLASH/__NODL_SECCFG
pull: /storage/sdcard0/DEFLASH/__NODL_NVRAM -> DEFLASH/__NODL_NVRAM
pull: /storage/sdcard0/DEFLASH/__NODL_PMT -> DEFLASH/__NODL_PMT
pull: /storage/sdcard0/DEFLASH/EBR1 -> DEFLASH/EBR1
pull: /storage/sdcard0/DEFLASH/MBR -> DEFLASH/MBR
pull: /storage/sdcard0/DEFLASH/DSP_BL -> DEFLASH/DSP_BL
pull: /storage/sdcard0/DEFLASH/PRELOADER.BIN -> DEFLASH/PRELOADER.BIN
pull: /storage/sdcard0/DEFLASH/MT6577_Android_scatter_emmc.txt -> DEFLASH/MT6577
_Android_scatter_emmc.txt
19 files pulled. 0 files skipped.
4621 KB/s (792207558 bytes in 167.406s)
Reboot in corso ...
Fatto ...
by Alexit - http://forum.chinafonini.it
.
Thanks to Bin4ry for fakerestore hack ... :)
Microsoft Windows [Versione 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. Tutti i diritti riservati.
C:\Windows\system32>cd C:\dump\adb
C:\dump\adb>adb shell
* daemon not running. starting it now *
* daemon started successfully *
shell@android:/ $ cat /proc/dumchar_info
cat /proc/dumchar_info
Part_Name Size StartAddr Type MapTo
preloader 0x0000000000040000 0x0000000000000000 2 /dev/misc-sd
dsp_bl 0x00000000005c0000 0x0000000000040000 2 /dev/misc-sd
mbr 0x0000000000004000 0x0000000000000000 2 /dev/block/mmcblk0
ebr1 0x0000000000004000 0x0000000000004000 2 /dev/block/mmcblk0p1
pmt 0x0000000000400000 0x0000000000008000 2 /dev/block/mmcblk0
nvram 0x0000000000500000 0x0000000000408000 2 /dev/block/mmcblk0
seccfg 0x0000000000020000 0x0000000000908000 2 /dev/block/mmcblk0
uboot 0x0000000000060000 0x0000000000928000 2 /dev/block/mmcblk0
bootimg 0x0000000000600000 0x0000000000988000 2 /dev/block/mmcblk0
recovery 0x0000000000600000 0x0000000000f88000 2 /dev/block/mmcblk0
sec_ro 0x0000000000600000 0x0000000001588000 2 /dev/block/mmcblk0p2
misc 0x0000000000060000 0x0000000001b88000 2 /dev/block/mmcblk0
logo 0x0000000000300000 0x0000000001be8000 2 /dev/block/mmcblk0
expdb 0x0000000000200000 0x0000000001ee8000 2 /dev/block/mmcblk0
android 0x0000000020100000 0x00000000020e8000 2 /dev/block/mmcblk0p3
cache 0x0000000020100000 0x00000000221e8000 2 /dev/block/mmcblk0p4
usrdata 0x0000000020100000 0x00000000422e8000 2 /dev/block/mmcblk0p5
fat 0x0000000085338000 0x00000000623e8000 2 /dev/block/mmcblk0p6
bmtpool 0x0000000001500000 0x00000000ff9f00a8 2 /dev/block/mmcblk0
Part_Name:Partition name you should open;
Size:size of partition
StartAddr:Start Address of partition;
Type:Type of partition(MTD=1,EMMC=2)
MapTo:actual device you operate
shell@android:/ $ cat /proc/dumchar_info > /mnt/sdcard/firmware.info
cat /proc/dumchar_info > /mnt/sdcard/firmware.info
shell@android:/ $ ps
ps
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 644 496 ffffffff 00000000 S /init
root 2 0 0 0 ffffffff 00000000 S kthreadd
root 3 2 0 0 ffffffff 00000000 S ksoftirqd/0
root 5 2 0 0 ffffffff 00000000 S kworker/u:0
root 6 2 0 0 ffffffff 00000000 S migration/0
root 10 2 0 0 ffffffff 00000000 S khelper
root 11 2 0 0 ffffffff 00000000 S fs_sync
root 12 2 0 0 ffffffff 00000000 S suspend
root 13 2 0 0 ffffffff 00000000 S sync_supers
root 14 2 0 0 ffffffff 00000000 S bdi-default
root 15 2 0 0 ffffffff 00000000 S kblockd
root 16 2 0 0 ffffffff 00000000 S khubd
root 17 2 0 0 ffffffff 00000000 S kswapd0
root 18 2 0 0 ffffffff 00000000 S fsnotify_mark
root 19 2 0 0 ffffffff 00000000 S crypto
root 39 2 0 0 ffffffff 00000000 S binder
root 40 2 0 0 ffffffff 00000000 D binder_watchdog
root 41 2 0 0 ffffffff 00000000 S g2d_workqueue
root 43 2 0 0 ffffffff 00000000 S mtk_vibrator
root 44 2 0 0 ffffffff 00000000 D pmic_thread_kth
root 45 2 0 0 ffffffff 00000000 D bat_thread_kthr
root 46 2 0 0 ffffffff 00000000 S mtk charger_hv_
root 47 2 0 0 ffffffff 00000000 S mtk pmic therma
root 48 2 0 0 ffffffff 00000000 S screen_update_k
root 49 2 0 0 ffffffff 00000000 S accdet
root 50 2 0 0 ffffffff 00000000 S accdet_eint
root 51 2 0 0 ffffffff 00000000 S keyEvent_send
root 53 2 0 0 ffffffff 00000000 S mmcqd/0
root 54 2 0 0 ffffffff 00000000 S mmcqd/0boot0
root 55 2 0 0 ffffffff 00000000 S mmcqd/0boot1
root 56 2 0 0 ffffffff 00000000 S mmcqd/1
root 57 2 0 0 ffffffff 00000000 S mtk-tpd
root 58 2 0 0 ffffffff 00000000 S f_mtp
root 59 2 0 0 ffffffff 00000000 S file-storage
root 60 2 0 0 ffffffff 00000000 D wdtk-0
root 61 2 0 0 ffffffff 00000000 D wdtk-1
root 63 1 360 200 ffffffff 00000000 S /sbin/ueventd
root 65 2 0 0 ffffffff 00000000 S jbd2/mmcblk0p3-
root 66 2 0 0 ffffffff 00000000 S ext4-dio-unwrit
root 67 2 0 0 ffffffff 00000000 S flush-179:0
root 70 2 0 0 ffffffff 00000000 S jbd2/mmcblk0p5-
root 71 2 0 0 ffffffff 00000000 S ext4-dio-unwrit
root 76 2 0 0 ffffffff 00000000 S jbd2/mmcblk0p4-
root 77 2 0 0 ffffffff 00000000 S ext4-dio-unwrit
root 80 2 0 0 ffffffff 00000000 S pvr_timer
root 81 2 0 0 ffffffff 00000000 S mtk_stp_psm
root 82 2 0 0 ffffffff 00000000 S mtk_stp_btm
root 83 2 0 0 ffffffff 00000000 S mtk_wmtd
root 84 2 0 0 ffffffff 00000000 S fm_workqueue
root 85 2 0 0 ffffffff 00000000 S fm_timer_workqu
root 86 2 0 0 ffffffff 00000000 S cfg80211
system 88 1 1000 292 ffffffff 00000000 S /system/bin/servicemanage
r
root 89 1 4336 956 ffffffff 00000000 S /system/bin/vold
ccci 90 1 1272 440 ffffffff 00000000 S /system/bin/ccci_fsd
system 91 1 856 308 ffffffff 00000000 S /system/bin/ccci_mdinit
system 92 1 860 332 ffffffff 00000000 S /system/bin/6620_launcher
root 93 1 1992 488 ffffffff 00000000 S /system/bin/debuggerd
shell 94 1 2284 476 ffffffff 00000000 S /system/bin/mobile_log_d
root 96 1 8076 1240 ffffffff 00000000 S /system/bin/netd
radio 97 1 4412 704 ffffffff 00000000 S /system/bin/netdiag
system 99 1 99912 70992 ffffffff 00000000 S /system/bin/surfaceflinge
r
root 100 1 271600 47044 ffffffff 00000000 S zygote
system 101 1 3184 472 ffffffff 00000000 S /system/bin/hald
drm 102 1 20892 6912 ffffffff 00000000 S /system/bin/drmserver
media 103 1 53380 11448 ffffffff 00000000 S /system/bin/mediaserver
system 104 1 1080 424 ffffffff 00000000 S /system/bin/mtkGD
bluetooth 105 1 1528 636 ffffffff 00000000 S /system/bin/dbus-daemon
root 106 1 1052 428 ffffffff 00000000 S /system/bin/installd
keystore 107 1 1928 568 ffffffff 00000000 S /system/bin/keystore
gps 108 1 6292 1268 ffffffff 00000000 S /system/bin/mtk_agpsd
root 109 1 1012 288 ffffffff 00000000 S /system/bin/upgraded
system 111 1 4708 796 ffffffff 00000000 S /system/bin/dm_agent_bind
er
bluetooth 112 1 4380 972 ffffffff 00000000 S /system/bin/mtkbt
system 113 1 7184 2192 ffffffff 00000000 S /system/bin/mdpd
system 115 1 4708 788 ffffffff 00000000 S /system/bin/GoogleOtaBind
er
root 117 1 4692 772 ffffffff 00000000 S /system/bin/nvram_backup_
binder
system 118 1 4656 800 ffffffff 00000000 S /system/bin/nvram_agent_b
inder
shell 121 1 4544 252 ffffffff 00000000 S /sbin/adbd
root 131 1 860 348 ffffffff 00000000 S /system/bin/memsicd
root 141 2 0 0 ffffffff 00000000 S pvr_workqueue
root 172 2 0 0 ffffffff 00000000 S mtklfb
radio 188 1 14384 524 ffffffff 00000000 S /system/bin/gsm0710muxd
shell 189 1 1416 552 c011e6bc 400a6708 S /system/bin/mdlogger
radio 231 1 22344 1144 ffffffff 00000000 S /system/bin/rild
system 250 100 414796 111672 ffffffff 00000000 S system_server
system 330 100 328148 75400 ffffffff 00000000 S com.android.systemui
app_23 383 100 286396 43616 ffffffff 00000000 S android.process.media
app_34 412 100 320364 48620 ffffffff 00000000 S com.google.process.gapps
app_40 427 100 284620 46912 ffffffff 00000000 S com.android.inputmethod.l
atin
radio 453 100 338092 65196 ffffffff 00000000 S com.android.phone
app_53 461 100 282180 40708 ffffffff 00000000 S com.mediatek.bluetooth
system 478 100 280900 38324 ffffffff 00000000 S com.mediatek.thermalmanag
er
app_48 496 100 280096 39248 ffffffff 00000000 S com.mediatek.dataservice
app_47 520 100 279820 38300 ffffffff 00000000 S com.mediatek.backupservic
e
app_41 540 100 353504 108912 ffffffff 00000000 S com.android.launcher
system 565 100 315708 75864 ffffffff 00000000 S com.android.settings
app_12 800 100 283184 39868 ffffffff 00000000 S com.kindroid.otaupdate
root 899 2 0 0 ffffffff 00000000 S loop0
root 900 2 0 0 ffffffff 00000000 S kdmflush
root 912 2 0 0 ffffffff 00000000 S kcryptd_io
root 913 2 0 0 ffffffff 00000000 S kcryptd
app_21 1205 100 281060 41188 ffffffff 00000000 S com.google.hfapservice
app_1 1412 100 294840 45464 ffffffff 00000000 S android.process.acore
app_0 1567 100 280160 38556 ffffffff 00000000 S com.adups.fota
app_34 2241 100 286020 39672 ffffffff 00000000 S com.google.android.gsf.lo
gin
app_103 2452 100 298264 54876 ffffffff 00000000 S com.facebook.katana
app_11 3012 100 306708 46360 ffffffff 00000000 S com.google.android.apps.m
aps
app_95 3190 100 322208 55760 ffffffff 00000000 S factory.widgets.ThreeDDig
italWeatherClock
app_17 3579 100 280368 39204 ffffffff 00000000 S com.sec.android.daemonapp
.ap.yahoostock.stockclock
app_36 3604 100 280148 38248 ffffffff 00000000 S com.mediatek.GoogleOta
root 3629 2 0 0 ffffffff 00000000 S ksdioirqd/mmc2
root 3633 2 0 0 ffffffff 00000000 S tx_thread
log 3634 1 848 316 ffffffff 00000000 S /system/bin/logwrapper
wifi 3637 3634 2480 1304 ffffffff 00000000 S /system/bin/wpa_supplican
t
log 3641 1 852 328 ffffffff 00000000 S /system/bin/logwrapper
dhcp 3642 3641 1112 540 ffffffff 00000000 S /system/bin/dhcpcd
app_50 3702 100 282980 38992 ffffffff 00000000 S com.google.android.apps.u
ploader
app_70 3749 100 289124 41336 ffffffff 00000000 S com.google.android.talk
app_51 3850 100 310732 58264 ffffffff 00000000 S com.android.mms
app_1 4003 100 295560 45624 ffffffff 00000000 S com.android.contacts
radio 4062 100 280072 37996 ffffffff 00000000 S com.mediatek.mdlogger
system 4075 100 281116 38132 ffffffff 00000000 S com.mediatek.atci.service
radio 4088 100 281096 37756 ffffffff 00000000 S com.android.ActivityNetwo
rk
app_10 4101 100 283064 40512 ffffffff 00000000 S com.android.caivs.app
system 4116 100 280444 37920 ffffffff 00000000 S com.mediatek.dm
root 4130 2 0 0 ffffffff 00000000 S kworker/0:2
root 4145 2 0 0 ffffffff 00000000 S kworker/u:3
root 4235 2 0 0 ffffffff 00000000 D kworker/0:3
root 4267 2 0 0 ffffffff 00000000 S flush-179:96
shell 4285 121 936 476 c0043fd4 400ed124 S /system/bin/sh
root 4311 2 0 0 ffffffff 00000000 S kworker/0:0
root 4314 2 0 0 ffffffff 00000000 S kworker/u:1
root 4317 2 0 0 ffffffff 00000000 S kworker/u:2
app_94 4343 100 301592 58084 ffffffff 00000000 S com.speedsoftware.rootexp
lorer
app_94 4362 4343 928 436 ffffffff 00000000 S /system/bin/sh
root 4364 4362 936 452 ffffffff 00000000 S sh
app_91 4399 100 281272 40080 ffffffff 00000000 S eu.chainfire.supersu
root 4501 2 0 0 ffffffff 00000000 S kworker/u:4
shell 4502 4285 1144 392 00000000 40107708 R ps
shell@android:/ $ exit
exit
AlexIT {L_WROTE}:ghost76 {L_WROTE}:Scusate. io sto provando a farlo con un nuovo s9300 con un vero jb 4.1.1 installato
Scusa, ma ho qualche dubbio sul 4.1.1 VERO ... l'unico che ho visto è sul AMOI ...
La procedure funziona solo se è presente il bug del recovery, altrimenti l'unica altra strada è modificare il (proprio) boot.img disabilitando la security...
Visitano il forum: Nessuno e 2 ospiti