Help major mount/bind user error

danceswithbongs

Active Member
Joined
Nov 30, 2010
Messages
1,031
Reaction score
3
Location
A TeePee outside of Detroit
Please, anyone that has a decent depth of knowledge regarding mounting, binding, unmounting, remounting elsewhere while not destroying anything that was mounted incorrectly causing the ultimate demise of my phone. Also scripting, code and queries to find out what had been accidentally mounted and how to move it appropriately. Explanation follows:
I am in need of a little assistance.
And by a little I mean a lot.
I have been using link2sd for a long time and the ext partition would normally be mounted /dev/block/mmcblk0p2. Or vold/ 179:2.
I use the ext4 driver like Prime had recommended due to lower cpu load.
I don't know how I messed things up, but it may have been messing around with Swapper 2 and the linux swap partition. I think what ever I did screwed up all of my mount points.
I can no longer even mount the sdext in recovery to format and if I try to restore a pre mess up backup, it isn't allowing the sdext to mount so the nandroid doesn't fully restore.
I get the following error message in recovery:
E: can't mount /dev/block/mmcblk0p2 (file exists)
Error mounting SDEXT:!

So restoring the ext gets skipped. I tried.flashing new ROMs to see if that would overwrite whatever was the cause, but no luck. Flashed gb and froyo ROMs but still no luck.
Also I can't seem to find out what exactly exists on mmcblk0p2 or how to move those files to the correct location.
It won't show when running bb commands cat process mounts.
Though it shows the fs mounted to obb and asec and yaffs.
Using "Root System Tools" app, that handles a lot of root functions, terminal, file directory viewer..etc.
But now when using the directories manager to figure out what is mmcblk0p2 mounted to and what resides within. But even though all permissions fixed, when I try to access and see what is on /dev/block/mmcblk0p2 I get the following pop up:
Permission denied to open the file

I think there is an outside chance that java coding now resides there, but that its merely a guess based on what problems are now suddenly occurring for the first time ever.

My main concern is that something important indirectly was bound to mmcblk0p2. Something that if formatted before it is mounted correctly could brick the phone.

Since this mount mishap, notification sounds don't work.
Lockscreen never happens, so even on boot no lockscreen.
The home key now won't do anything, return to home, open app drawer or show recent apps when long pressed.
Nor does the search button.
They give haptic but that is it.
So frustrating and why I'm worried about what now resides incorrectly mounted and how any poorly thought up attempt could destroy the ability for the phone to function whatsoever.

I've tried flashing a bunch of different ROMs to see if they would fix it as they might have different set ups including froyo and a real old MIUI and PE.
Still same problem.

That's no way for an OG to live.

Thanks to all with offers of assistance, ideas and solutions.
I really need help on this one.

Don't let me down, please, as it is clear many previously posting in this thread possess great wealths of knowledge in this area.
This helper needs help.
Fingers crossed
Motorola Droid Rooted
SD with ext partition and linux swap partition

Rescue squad, throw me a line please!!!

walkin the walk while tappin the talk
danceswithbongs
 
Here is some info from running some commands or maybe they are queries:(my apologies for the length)
#cat /proc/devices
Character devices:
1 mem
4 ttyS
5 /dev/tty
5 /dev/console
5 /dev/ptmx
10 misc
13 input
14 sound
29 fb
81 video4linux
89 i2c
90 mtd
108 ppp
128 ptm
136 pts
180 usb
188 ttyUSB
189 usb_device
216 rfcomm
234 ts0710mux
249 hplens-omap
250 hidraw
251 DspBridge
252 hp3a-omap
253 pvrsrvkm
254 rtc

Block devices:
259 blkext
7 loop
31 mtdblock
179 mmc
254 device-mapper

#cat /proc/mounts
rootfs / rootfs rw,relatime 0 0
tmpfs /dev tmpfs rw,relatime,mode=755 0 0
devpts /dev/pts devpts rw,relatime,mode=600 0 0
proc /proc proc rw,relatime 0 0
sysfs /sys sysfs rw,relatime 0 0
tmpfs /mnt/asec tmpfs rw,relatime,mode=755,gid=1000 0 0
tmpfs /mnt/obb tmpfs rw,relatime,mode=755,gid=1000 0 0
/dev/block/mtdblock4 /system yaffs2 rw,relatime 0 0
/dev/block/mtdblock6 /data yaffs2 rw,nosuid,nodev,relatime 0 0
/dev/block/mtdblock5 /cache yaffs2 rw,nosuid,nodev,relatime 0 0
/dev/block/mtdblock0 /config yaffs2 ro,relatime 0 0
/dev/block/vold/179:1 /mnt/sdcard vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0
/dev/block/vold/179:1 /mnt/secure/asec vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0
tmpfs /mnt/sdcard/.android_secure tmpfs ro,relatime,size=0k,mode=000 0 0

#ps
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 200 192 c00c508c 0000875c S /init
root 2 0 0 0 c0068364 00000000 S kthreadd
root 3 2 0 0 c0058dfc 00000000 S ksoftirqd/0
root 4 2 0 0 c00852a4 00000000 S watchdog/0
root 5 2 0 0 c0064c10 00000000 S events/0
root 6 2 0 0 c0064c10 00000000 S khelper
root 9 2 0 0 c006e728 00000000 S async/mgr
root 12 2 0 0 c0064c10 00000000 S suspend
root 196 2 0 0 c009e1d0 00000000 S sync_supers
root 198 2 0 0 c009ea28 00000000 S bdi-default
root 200 2 0 0 c0064c10 00000000 S kblockd/0
root 204 2 0 0 c0064c10 00000000 S omap_serial
root 211 2 0 0 c0064c10 00000000 S omap2_mcspi
root 214 2 0 0 c0064c10 00000000 S cpcap_irq/0
root 273 2 0 0 c0064c10 00000000 S ksuspend_usbd
root 278 2 0 0 c01f8e78 00000000 S khubd
root 303 2 0 0 c0064c10 00000000 S kmmcd
root 310 2 0 0 c0064c10 00000000 S bluetooth
root 325 2 0 0 c0064c10 00000000 S kondemand/0
root 341 2 0 0 c009e254 00000000 D kswapd0
root 343 2 0 0 c0064c10 00000000 S aio/0
root 344 2 0 0 c0064c10 00000000 S crypto/0
root 358 2 0 0 c017eb98 00000000 D dsi
root 394 2 0 0 c0064c10 00000000 S omap_mdm_ctrl_w
root 423 2 0 0 c01d7144 00000000 S mtdblockd
root 490 2 0 0 c02266a8 00000000 S usb_mass_storag
root 497 2 0 0 c0064c10 00000000 S qtouch_obp_ts_w
root 506 2 0 0 c0064c10 00000000 S bu52014hfv_wq
root 509 2 0 0 c0064c10 00000000 S sfh7743_wq
root 537 2 0 0 c0064c10 00000000 S bridge_work-que
root 538 2 0 0 c0064c10 00000000 S bridge_recovery
root 544 2 0 0 c02863a8 00000000 S w1_bus_master1
root 555 2 0 0 c0064c10 00000000 S kstriped
root 558 2 0 0 c0064c10 00000000 S kconservative/0
root 559 2 0 0 c0064c10 00000000 S kinteractive_up
root 560 2 0 0 c0064c10 00000000 S knteractive_dow
root 561 2 0 0 c0064c10 00000000 S kbumblebee_up/0
root 562 2 0 0 c0064c10 00000000 S kbumblebee_down
root 581 2 0 0 c0064c10 00000000 S als_wq
root 599 2 0 0 c0064c10 00000000 S usbhid_resumer
root 604 2 0 0 c0064c10 00000000 S binder
root 618 2 0 0 c03ad160 00000000 S krfcommd
root 636 2 0 0 c02a59d8 00000000 S mmcqd
root 643 2 0 0 c017e1e0 00000000 D pvrflip/0
root 651 1 164 152 c00c508c 0000875c S /sbin/ueventd
system 974 1 684 112 c02b8b5c afd0b77c S /system/bin/servicemanager
root 975 1 3740 188 ffffffff afd0be2c S /system/bin/vold
root 978 1 548 68 c02cd538 afd0c16c S /system/bin/debuggerd
radio 979 1 12608 440 ffffffff afd0be2c S /system/bin/rild
bluetooth 988 1 1140 108 c00c508c afd0c63c S /system/bin/dbus-daemon
root 989 1 732 132 c0352548 afd0b4dc S /system/bin/installd
keystore 997 1 1620 96 c02cd538 afd0c16c S /system/bin/keystore
root 1011 1 1172 248 c00c508c afd0b8c4 S /system/bin/battd
root 1017 1 1708 104 ffffffff afd0b8c4 S /system/bin/mdm_panicd
shell 1024 1 3292 180 ffffffff 00008294 S /sbin/adbd
compass 1095 1 172 32 c01cab20 0001541c S /system/bin/akmd2
media 7221 1 27980 1008 ffffffff afd0b77c S /system/bin/mediaserver
root 7222 1 4076 276 ffffffff afd0be2c S /system/bin/netd
root 7223 1 76900 10796 c00c508c afd0b8c4 S zygote
system 7232 7223 205688 64220 ffffffff afd0b77c S system_server
radio 7326 7223 99912 13396 ffffffff afd0c5bc S com.android.phone
app_58 8047 1 85788 9144 c0075aa8 afd0c858 S com.bigtincan.android.adfree
app_25 13694 7223 99672 16576 ffffffff afd0c5bc S com.swype.android.inputmethod
system 13734 7223 102812 27392 ffffffff afd0c5bc S com.android.systemui
radio 14503 979 1968 220 c00c508c afd0b8c4 S /system/bin/pppd-ril
app_17 14656 7223 112364 15720 ffffffff afd0c5bc S com.google.process.gapps
app_22 14831 7223 101608 22972 ffffffff afd0c5bc S android.process.acore
root 15048 2 0 0 c00d49f8 00000000 S flush-31:0
app_49 15053 7223 93348 17628 ffffffff afd0c5bc S com.smart.taskbar
app_44 15116 7223 90560 16560 ffffffff afd0c5bc S fi.rojekti.clipper
app_51 15127 7223 96200 21836 ffffffff afd0c5bc S aws.apps.underthehood
app_34 15166 7223 87120 13232 ffffffff afd0c5bc S com.noshufou.android.su
root 15219 15127 620 344 c0056988 afd0c44c S sh
root 15220 15219 776 320 00000000 afd0b4dc R ps

walkin the walk while tappin the talk
danceswithbongs
 
Back
Top