Friday, January 18, 2013

LOG CAT & Script in phone files INIT FILE TEXT JUST BEING PUT IN VIA REMOTE

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194

on early-init start ueventd

# create mountpoints mkdir /mnt 0775 root system

on init

sysclktz 0

loglevel 3

# setup the global environment export PATH /sbin:/vendor/bin:/system/sbin:/system/bin:/system/xbin export LD_LIBRARY_PATH /vendor/lib:/system/lib export ANDROID_BOOTLOGO 1 export ANDROID_ROOT /system export ANDROID_ASSETS /system/app export ANDROID_DATA /data

export EXTERNAL_STORAGE /mnt/sdcard export EXTERNAL_STORAGE2 /mnt/sdcard/external_sd export USBHOST_STORAGE /mnt/sdcard/usbStorage

export ASEC_MOUNTPOINT /mnt/asec export LOOP_MOUNTPOINT /mnt/obb export BOOTCLASSPATH /system/framework/core.jar:/system/framework/core-junit.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/framework2.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/apache-xml.jar:/system/framework/filterfw.jar

# Backward compatibility symlink /system/etc /etc symlink /sys/kernel/debug /d

# Right now vendor lives on the same filesystem as system, # but someday that may change. symlink /system/vendor /vendor

# create mountpoints mkdir /mnt 0775 root system mkdir /mnt/sdcard 0000 system system

# Create cgroup mount point for cpu accounting mkdir /acct mount cgroup none /acct cpuacct mkdir /acct/uid

# Backwards Compat - XXX: Going away in G* symlink /mnt/sdcard /sdcard

mkdir /system mkdir /data 0771 system system mkdir /cache 0770 system cache mkdir /config 0500 root root mkdir /efs 0771 system system

# Directory for putting things only root should see. mkdir /mnt/secure 0700 root root

# Directory for staging bindmounts mkdir /mnt/secure/staging 0700 root root

# Directory-target for where the secure container # imagefile directory will be bind-mounted mkdir /mnt/secure/asec 0700 root root

# Secure container public mount points. mkdir /mnt/asec 0700 root system mount tmpfs tmpfs /mnt/asec mode=0755,gid=1000

# Filesystem image public mount points. mkdir /mnt/obb 0700 root system mount tmpfs tmpfs /mnt/obb mode=0755,gid=1000

# usb public mount points. mkdir /mnt/usb 0700 root system mount tmpfs tmpfs /mnt/usb mode=0755,gid=1000

write /proc/sys/kernel/panic_on_oops 1 write /proc/sys/kernel/hung_task_timeout_secs 0 write /proc/cpu/alignment 4 write /proc/sys/kernel/sched_latency_ns 10000000 write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000 write /proc/sys/kernel/sched_compat_yield 1 write /proc/sys/kernel/sched_child_runs_first 0

# Create cgroup mount points for process groups mkdir /dev/cpuctl mount cgroup none /dev/cpuctl cpu chown system system /dev/cpuctl chown system system /dev/cpuctl/tasks chmod 0777 /dev/cpuctl/tasks write /dev/cpuctl/cpu.shares 1024

mkdir /dev/cpuctl/fg_boost chown system system /dev/cpuctl/fg_boost/tasks chmod 0777 /dev/cpuctl/fg_boost/tasks write /dev/cpuctl/fg_boost/cpu.shares 1024

mkdir /dev/cpuctl/bg_non_interactive chown system system /dev/cpuctl/bg_non_interactive/tasks chmod 0777 /dev/cpuctl/bg_non_interactive/tasks # 5.0 % write /dev/cpuctl/bg_non_interactive/cpu.shares 52

on fs # mount mtd partitions # Mount /system rw first to give the filesystem a chance to save a checkpoint mount yaffs2 mtd@system /system #mount yaffs2 mtd@system /system ro remount mount yaffs2 mtd@userdata /data nosuid nodev mount yaffs2 mtd@persist /persist nosuid nodev mount yaffs2 mtd@cache /cache nosuid nodev mount yaffs2 mtd@persist /persist nosuid nodev

on emmc-fs # mount mmc partitions wait /dev/block/mmcblk0p24 mount ext4 /dev/block/mmcblk0p24 /system ro barrier=1 mount ext4 /dev/block/mmcblk0p24 /system remount ro barrier=0 on boot

# insmod the modules insmod /system/lib/modules/vibrator.ko

# changed cpufreq governor exec /system/bin/sh /init.qcom.lpm_boot.sh

class_start default

service mpdecision /system/bin/mpdecision --no_sleep --avg_comp user root

service ueventd /sbin/ueventd class core critical

service console /system/bin/sh class core console

service playlpm /system/bin/playlpm user root

service immvibed /system/bin/immvibed oneshot

service lpmkey /system/bin/lpmkey user root

# Used to disable USB when switching states on property:sys.usb.config=none stop adbd write /sys/class/android_usb/android0/enable 0 write /sys/class/android_usb/android0/bDeviceClass 0 setprop sys.usb.state $sys.usb.config

# adb only USB configuration # This should only be used during device bringup # and as a fallback if the USB manager fails to set a standard configuration on property:sys.usb.config=adb write /sys/class/android_usb/android0/enable 0 write /sys/class/android_usb/android0/idVendor 04E8 write /sys/class/android_usb/android0/idProduct 685E write /sys/class/android_usb/android0/f_diag/clients diag write /sys/class/android_usb/android0/f_rmnet/instances 1 write /sys/class/android_usb/android0/functions diag,adb write /sys/class/android_usb/android0/enable 1 start adbd setprop sys.usb.state $sys.usb.config

# Used to set USB configuration at boot and to switch the configuration # when changing the default configuration on property:persist.sys.usb.config=* setprop sys.usb.config $persist.sys.usb.config # adbd is controlled via property triggers in init.<platform>.usb.rc service adbd /sbin/adbd class core disabled

# adbd on at boot in emulator on property:ro.kernel.qemu=1 start adbd

# This property trigger has added to imitiate the previous behavior of "adb root". # The adb gadget driver used to reset the USB bus when the adbd daemon exited, # and the host side adb relied on this behavior to force it to reconnect with the # new adbd instance after init relaunches it. So now we force the USB bus to reset # here when adbd sets the service.adb.root property to 1. We also restart adbd here # rather than waiting for init to notice its death and restarting it so the timing # of USB resetting and adb restarting more closely matches the previous behavior. on property:service.adb.root=1 write /sys/class/android_usb/android0/enable 0 restart adbd write /sys/class/android_usb/android0/enable 1



★★☆


Pub com.anttek.remote.providers.remoteContentProviderFree: com.anttek.remote.db.RemoteContentProvider


Previously focused view reported id 2131230814 during save, but can't be found during restore.

clipservice: android.sec.clipboard.ClipboardExManager@41935d50


at com.anttek.explorercore.util.asynctask.BaseTask.fail(BaseTask.java:59)
at com.anttek.explorercore.util.asynctask.BaseTask.fail(BaseTask.java:55)
at com.anttek.explorer.engine.task.RenameTask$Task.doInBackground(RenameTask.java:92)
at com.anttek.explorer.engine.task.RenameTask$Task.doInBackground(RenameTask.java:66)
at android.os.AsyncTask$2.call(AsyncTask.java:264)
at java.util.concurrent.FutureTask$Sync.innerRun(FutureTask.java:305)
at java.util.concurrent.FutureTask.run(FutureTask.java:137)
at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:208)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1076)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:569)
at java.lang.Thread.run(Thread.java:856)


addData..
text equals


String was copied.(FORMAT_TEXT_ID)
===================================================================true



Failed to find provider info for com.android.contacts
Failed to find provider info for com.cequint.cityid


Mini Controller text scroll : OFF
performCollapse()

Mini Controller text scroll : OFF
performCollapse()

1 comment:

  1. I have the same problem. my note 5 was being remotely controlled. Pictures files being erased/ added with out my permission. One day i see my phone doing random things so i ran upstairs caught my fiance with her phone in her hand . I took it away. I proceeded to toy around with it and sure enough it had remote access to my phone. It was a hack . She denies any knowledge of it and i really dont care . But its still on my phone how can i remove it. It slows my phone down. It is just bothersome.

    ReplyDelete