Original topic:

who can read this??

(Topic created on: 10-29-2020 01:27 PM)
1425 Views
mightyweiner
Beginner Level 2
Options
Others
0 /dev/null 1 /dev/null 2 /dev/null 3 socket:[36085] 4 /dev/pmsg0 5 /sys/kernel/debug/tracing/trace_marker 6 /dev/null 7 /dev/null 8 /dev/null 9 /apex/com.android.runtime/javalib/core-oj.jar 10 /apex/com.android.runtime/javalib/core-libart.jar 11 /apex/com.android.runtime/javalib/okhttp.jar 12 /apex/com.android.runtime/javalib/bouncycastle.jar 13 /apex/com.android.runtime/javalib/apache-xml.jar 14 /system/framework/framework.jar 15 /system/framework/ext.jar 16 /system/framework/telephony-common.jar 17 /system/framework/voip-common.jar 18 /system/framework/ims-common.jar 19 /system/framework/knoxsdk.jar 20 /system/framework/knoxanalyticssdk.jar 21 /dev/null 22 /dev/null 23 /system/framework/smartbondingservice.jar 24 /system/framework/securetimersdk.jar 25 /system/framework/fipstimakeystore.jar 26 /system/framework/timakeystore.jar 27 /system/framework/sec_sdp_sdk.jar 28 /system/framework/sec_sdp_hidden_sdk.jar 29 /system/framework/drutils.jar 30 /system/framework/android.test.base.jar 31 /system/framework/ucmopensslenginehelper.jar 32 /system/framework/esecomm.jar 33 /system/framework/tcmiface.jar 34 /system/framework/QPerformance.jar 35 /system/framework/UxPerformance.jar 36 /apex/com.android.conscrypt/javalib/conscrypt.jar 37 /apex/com.android.media/javalib/updatable-media.jar 38 /system/framework/framework-res.apk 39 /vendor/overlay/GmsConfigOverlay.apk 40 /vendor/overlay/GmsGsaConfigOverlay.apk 41 /vendor/overlay/GoogleExtServicesConfigOverlay.apk 42 /vendor/overlay/GooglePermissionControllerFrameworkOverlay.apk 43 /dev/null 44 /dev/stune/foreground/tasks 45 /dev/binder 46 socket:[34303] 47 anon_inode:[eventfd] 48 anon_inode:[eventpoll] 49 socket:[35167] 50 socket:[35168] 51 anon_inode:[eventfd] 52 anon_inode:[eventpoll] 53 /dev/stune/top-app/tasks 54 anon_inode:[eventfd] 55 anon_inode:[eventpoll] 56 anon_inode:[eventfd] 57 anon_inode:[eventpoll] 58 anon_inode:[eventfd] 59 anon_inode:[eventpoll] 60 anon_inode:[eventfd] 61 anon_inode:[eventpoll] 62 anon_inode:[eventfd] 63 anon_inode:[eventpoll] 64 /dev/hwbinder 65 /dev/watchdog 66 socket:[21379] 67 anon_inode:[eventfd] 68 anon_inode:[eventpoll] 69 /dev/stune/background/tasks 70 anon_inode:[eventfd] 71 anon_inode:[eventpoll] 72 anon_inode:[eventfd] 73 anon_inode:[eventpoll] 74 anon_inode:[eventfd] 75 anon_inode:[eventpoll] 76 /dev/cpuctl/tasks 77 /dev/cpuset/top-app/tasks 78 anon_inode:[eventfd] 79 anon_inode:[eventpoll] 80 socket:[36175] 81 socket:[36553] 82 anon_inode:inotify 83 anon_inode:[eventfd] 84 anon_inode:[eventpoll] 85 anon_inode:[eventfd] 86 anon_inode:[eventpoll] 87 anon_inode:[eventfd] 88 anon_inode:[eventpoll] 89 socket:[35210] 91 anon_inode:[eventfd] 92 anon_inode:[eventpoll] 93 /dev/cpuset/system-background/tasks 94 socket:[28391] 95 anon_inode:[eventfd] 96 anon_inode:[eventpoll] 97 anon_inode:[eventfd] 98 anon_inode:[eventpoll] 100 anon_inode:[eventfd] 102 anon_inode:[eventfd] 103 anon_inode:[eventpoll] 104 anon_inode:[eventfd] 105 anon_inode:[eventpoll] 106 anon_inode:[eventfd] 107 anon_inode:[eventpoll] 108 socket:[36555] 109 anon_inode:[eventfd] 110 /data/misc/audit/sk.log 111 anon_inode:[eventpoll] 112 anon_inode:[eventpoll] 113 anon_inode:[eventfd] 114 anon_inode:[eventpoll] 115 anon_inode:[eventfd] 116 anon_inode:[eventpoll] 117 anon_inode:[eventfd] 118 anon_inode:[eventpoll] 119 anon_inode:[eventfd] 120 /vendor/overlay/NavigationBarMode3Button/NavigationBarMode3ButtonOverlay.apk 121 anon_inode:[eventfd] 122 anon_inode:[eventpoll] 123 anon_inode:[eventfd] 124 anon_inode:[eventpoll] 125 anon_inode:[eventfd] 126 anon_inode:[eventpoll] 127 socket:[38687] 128 anon_inode:[eventfd] 129 anon_inode:[eventpoll] 130 anon_inode:[eventfd] 131 anon_inode:[eventpoll] 132 anon_inode:[eventfd] 133 anon_inode:[eventpoll] 134 /data/system/enterprise.db 135 /dev/cpuset/foreground/tasks 136 socket:[38689] 137 /data/system/enterprise.db-wal 138 /data/system/enterprise.db-shm 139 /data/system/enterprise.db 140 /data/system/enterprise.db-wal 141 anon_inode:[eventfd] 142 anon_inode:[eventpoll] 143 anon_inode:[eventfd] 144 anon_inode:[eventpoll] 145 anon_inode:[eventfd] 
5 Comments
keagan
Moderator
Moderator
Options
Others

Hi mightyweiner, Welcome to the Samsung Members Community Canada. Could you please let us know the issue in detail?

0 Likes
Others
It's an error occurred... You can redirecting him to the Samsung Technical Support
0 Likes
oooOmitoOooo
Active Level 10
Others
/dev/root on / type ext4 (ro,seclabel,nodev,relatime,block_validity,discard,delalloc,barrier,user_xattr,acl,i_version)
tmpfs on /dev type tmpfs (rw,seclabel,nosuid,relatime,size=2610388k,nr_inodes=652597,mode=755)
devpts on /dev/pts type devpts (rw,seclabel,relatime,mode=600,ptmxmode=000)
none on /dev/memcg type cgroup (rw,relatime,memory)
none on /dev/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio)
none on /dev/cg2_bpf type cgroup2 (rw,nosuid,nodev,noexec,relatime)
none on /dev/cpuctl type cgroup (rw,nosuid,nodev,noexec,relatime,cpu)
none on /dev/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset,noprefix,release_agent=/sbin/cpuset_release_agent)
none on /dev/stune type cgroup (rw,nosuid,nodev,noexec,relatime,schedtune)
none on /dev/freezer type cgroup (rw,relatime,freezer)
adb on /dev/usb-ffs/adb type functionfs (rw,relatime)
proc on /proc type proc (rw,relatime,gid=3009,hidepid=2)
sysfs on /sys type sysfs (rw,seclabel,relatime)
selinuxfs on /sys/fs/selinux type selinuxfs (rw,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,seclabel,relatime)
tracefs on /sys/kernel/debug/tracing type tracefs (rw,seclabel,relatime)
bpf on /sys/fs/bpf type bpf (rw,nosuid,nodev,noexec,relatime)
pstore on /sys/fs/pstore type pstore (rw,seclabel,nosuid,nodev,noexec,relatime)
tmpfs on /mnt type tmpfs (rw,seclabel,nosuid,nodev,noexec,relatime,size=2610388k,nr_inodes=652597,mode=755,gid=1000)
tmpfs on /mnt/secure type tmpfs (rw,seclabel,relatime,size=2610388k,nr_inodes=652597,mode=700)
tmpfs on /mnt/secure/asec type tmpfs (rw,seclabel,relatime,size=2610388k,nr_inodes=652597,mode=700)
/dev/block/sda5 on /mnt/vendor/persist type ext4 (rw,seclabel,nosuid,nodev,noatime,i_version)
/dev/block/sda6 on /mnt/vendor/efs type ext4 (rw,seclabel,nosuid,nodev,noatime,journal_checksum,noauto_da_alloc,i_version)
/data/media on /mnt/runtime/default/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,derive_gid,default_normal,reserved=20MB)
/data/media on /mnt/runtime/read/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=23,derive_gid,default_normal,reserved=20MB)
/data/media on /mnt/runtime/write/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=7,derive_gid,default_normal,reserved=20MB)
/data/media on /mnt/runtime/full/emulated type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=7,derive_gid,default_normal,reserved=20MB)
/dev/block/vold/public:179,1 on /mnt/media_rw/6561-3234 type sdfat (ro,nosuid,nodev,noexec,noatime,fs=exfat,uid=1023,gid=1023,fmask=0007,dmask=0007,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,utf8,namecase=0,adj_req,symlink=0,bps=512,errors=remount-ro)
/mnt/media_rw/6561-3234 on /mnt/runtime/default/6561-3234 type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,mask=6,nocache)
/mnt/media_rw/6561-3234 on /mnt/runtime/read/6561-3234 type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,mask=18,nocache)
/mnt/media_rw/6561-3234 on /mnt/runtime/write/6561-3234 type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,mask=18,nocache)
/mnt/media_rw/6561-3234 on /mnt/runtime/full/6561-3234 type sdcardfs (rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,mask=7,nocache)
tmpfs on /apex type tmpfs (rw,seclabel,nosuid,nodev,noexec,relatime,size=2610388k,nr_inodes=652597,mode=755)
/dev/root on /apex/com.android.tzdata@290000000 type ext4 (ro,seclabel,relatime,block_validity,discard,delalloc,barrier,user_xattr,acl,i_version)
/dev/root on /apex/com.android.tzdata type ext4 (ro,seclabel,relatime,block_validity,discard,delalloc,barrier,user_xattr,acl,i_version)
/dev/root on /apex/com.android.runtime@1 type ext4 (ro,seclabel,relatime,block_validity,discard,delalloc,barrier,user_xattr,acl,i_version)
/dev/root on /apex/com.android.runtime type ext4 (ro,seclabel,relati
0 Likes
keagan
Moderator
Moderator
Options
Others

Thanks @ProximaCentoriB.

Hi mightyweiner & oooOmitoOooo, Could you please let us know the name of the application you are trying to access and generated this code.

0 Likes
3koonce
Beginner Level 2
Others

I found the same thing on my phone it was some type dump file I think but I have constant problems with my phone I always have to change passwords and sites always ask if I'm signing in from an new computer.  Oh and when I look at login details there are often identical pairs