• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Help Recovery Boot loops

Hi there,
Thank you all for your advice. I am a bit new to this, as you can tell.

On the download screen of the Tablet it had SM-T813 as the model number.
The friends bought the Tab from Noel Leeming in New Zealand, so when looking for the right PDA file the one that looked like it might be the correct one, was the one I downloaded. The other one it might be is the Australian version. Have approached Noel Leeming to see if they know of the country of origin if that helps.
I installed T813XXS2BTK3_T813XNZ2BTK1_HOME.tar.md5 from SamMobile (see attached screenshot for details).
When using Odin, I thought I was only installing the PDA file as this was the only box that was ticked.
Could it be possible the CSC file was accidentally downloaded too?

Regards

Matt

Attachments

  • PDA file details.png
    PDA file details.png
    55.7 KB · Views: 273

Dark Born, Big update v0.2.4 is out!

Hi everybody,
Im an indie developer, Ive been developing this game for a while now, and i wish to share it with you and get feedback.


J2bw6NT.png


CIluLoJ.png


To Download the game:
https://play.google.com/store/apps/details?id=com.SaudAlomari.DarkBorn

For feedback:
you can reply here.
or contact me on https://discord.gg/xpjMveUH
or email me to dark.born.feedback@gmail.com

Quality:
i believe the game runs on medium to high end mobile devices, i wish you guys try it and tell how it performs on your device.
the game has 3 quality presets that might improve performance.
the game runs at 60fps, if you want to decrease battery consumption you can change it to 30fps in games settings.

This is a duplicate, but I cannot find a way to delete it.

For my LG G4 I have to take the back off to access the SD card. I have critter cams outside that take pictures of all kinds of animals that come by during the night, and it would be nice just to be able to pop the SD card out of the cam and put it in my phone just by popping out the SD card that contains my music. I don't want to have to take the back off of the phone to do so.

I also tried restoring using the LG restore function. That was a bit of a waste of time. It took about an hour and when it was finished it actually said that it was incomplete and wanted to know if I wanted to do it again. I said no. But I still had to reboot my phone afterwards and it still managed to delete those normal apps so that the backup hadn't really accomplished anything. I still had to restore the four apps that were deleted the way I have been doing.

ML Audioserver and Audioclient in devices directory

Hi Guys

Quick question, running rooted SM-G925 (Samsung Galaxy 6) with Version 7.0

IS anyone familar with audioserver and audioclient in /dev/socket/mlaudio ?

This appears to be comms for hardware bus via IPC unix socket streaming to audioserver in /system/bin


__
netstat -aWep

SEQPACKET LISTENING 15518 3182/audioserver /dev/socket/mlaudio/audio_server
SEQPACKET LISTENING 9022 3182/audioserver /dev/socket/mlaudio/audio_client
STREAM CONNECTED 43024 3182/audioserver
DGRAM 13491 3182/audioserver

Unsure best way to analyze pipes on android [43025], not unix socket like others on netstat

lsof

3182/system/bin/audioserversocket:[15518]
3182/system/bin/audioserversocket:[9022]
3182/system/bin/audioserversocket:[43024]
3182/system/bin/audioserversocket:[13491]

3182/system/bin/audioserverpipe:[43025]
3182/system/bin/audioserverpipe:[43025]

3182/system/bin/audioserver/dev/null
3182/system/bin/audioserver/dev/null
3182/system/bin/audioserver/dev/null

3182/system/bin/audioserver/dev/pmsg0
3182/system/bin/audioserver/dev/binder
3182/system/bin/audioserver/dev/snd/controlC0
3182/system/bin/audioserver/dev/cpuctl/tasks
3182/system/bin/audioserver/sys/kernel/debug/tracing/trace_marker
3182/system/bin/audioserver/dev/ashmem

MediaTek - Bypass SPFT Auth FIle

A contact of mine just sent me the following link to XDA News about someone that found a way to bypass SPFT authentication on a lot of MTK chipsets

https://www.xda-developers.com/bypass-mediatek-sp-flash-tool-authentication-requirement/

I had to repost this here because this is pretty important. Anyone that has a compatible phone/chipset can now read and write partitions with SPFT like the good old days. No authentication file? No problem. Just run this python script before connecting and in a few short minutes you'll have full read/write access to the phone's partitions just like you wanted to have. Full instructions for how to use the exploit are on the XDA post linked above

Here's a list of compatible chipsets copied from the XDA post. I assume there MIGHT be others that will work, perhaps they just didn't try all of them yet. But if you have one in this list it should DEFINITELY work according to the XDA post
  • mt6261
  • mt6572
  • mt6580
  • mt6582
  • mt6735
  • mt6737
  • mt6739
  • mt6755
  • mt6757
  • mt6761
  • mt6763
  • mt6765
  • mt6768
  • mt6771
  • mt6785
  • mt6799
  • mt6873
  • mt8127
  • mt8163
  • mt8173
  • mt8695

Filter

Back
Top Bottom