[Q] TechniPad - root ? - General Questions and Answers

Hello
Is it possible that technipad (of technisat) to root? It is built a rockchip.
Thank you
Philip

Me too
Also trying to root this device. Tried many ways but cannot get through.
ADB root does not work - adbd cannot run as root in production builds
though adb shell get similar message as uid 2000 - cannot change to 0
Cannot use psneuter either.
Going round and round in circles, anyone with some help it would be appreciated.
Thanks,

Root checker results
Root Access is not properly configured or was not granted.
Super User Application Status:
SuperSU application - version 1.51 - is installed!
System File Properties for Root Access:
Standard Location
Check Command: ls -l /system/bin/su:
Result: /system/bin/su: No such file or directory
Analysis: File /system/bin/su does not exist.
Standard Location
Check Command: ls -l /system/xbin/su:
Result: -rwsr-sr-x root root 62932 2013-05-10 12:41 su
Analysis: Setuid attribute is present and root user ownership is present. Root access is correctly configured for this file! Executing this file can grant root access!
Alternative Location
Check Command: ls -l /sbin/su:
Result: /sbin/su: Permission denied
Analysis: File system permissions restricted and denied access.
Alternative Location
Check Command: ls -l /system/xbin/sudo:
Result: /system/xbin/sudo: No such file or directory
Analysis: File /system/xbin/sudo does not exist.
Root User ID and Group ID Status:
SU binary not found or not operating properly
System Environment PATH: /sbin /vendor/bin /system/sbin /system/bin /system/xbin
ADB Shell Default User:
ADB shell setting for standard access, stored in default.prop, is configured as: shell (non root) user - ro.secure=1
Results provided on your TechniPad 8 device by Root Checker Pro version 1.3.4 from joeykrim in the Android Market

Hello,
Have you found anything?
mfG
Philip

philidinator said:
Hello,
Have you found anything?
mfG
Philip
Click to expand...
Click to collapse
Nothing yet am afraid. It's a bit confusing at the device seems to think it is already rooted, but it isn't when you check for root capability. Am going to try something today - but it might end up making it a lovely paperweight. Will keep you posted.

Nothing new?
mfG
Philip

Rooted Technipad 8
philidinator said:
Nothing new?
mfG
Philip
Click to expand...
Click to collapse
SUCCESS!!
FOLLOW THE INSTRUCTIONS HERE AND ROOT ACCESS IS GRANTED - NOW TO FIND A CUSTOM ROM AND UPGRADE TO JB 4.2
JUST ROOTED MY TECHNIPAD 8 SO IF YOU NEED ANY HELP JUST ASK BUT THE INTRSUCTIONS WERE PRETTY SIMPLE TO FOLLOW.
GOOD LUCK! :good:
http://forum.xda-developers.com/showthread.php?t=2414994

I have a Technipad 10 and the rooting instructions mentioned above did not work unfortunately. Is anybody out there who know a possibilty to root this tablet?
For a little help, I would be very grateful.

Try this one:
https://github.com/Lostech/Root_Box/tree/V1.0
https://github.com/Lostech/Root_Box/archive/V1.0.zip
I made this based on other RK30 root´s for the TechniPad 10G with Android version 4.1.1 and build version GE.Technisat.S10_g.V107.

Calibaan said:
I made this based on other RK30 root´s for the TechniPad 10G with Android version 4.1.1 and build version GE.Technisat.S10_g.V107.
Click to expand...
Click to collapse
Hello Calibaan,
I’m thrilled, your program did work really well.
Thank you very much and have a nice weekend!

Technipad 7T
Hi,
i own a Technipad 7T and try to root it with Rootbox V1.1, but it wont work.
It has Android V4.2.2.
Any ideas why it wont work?

At which point does the root process fail?

I found Version 1.6 of root_box. but still no luck.
I use WinXp. Driver installation failed inside of root_box, so I installed the seperatly.
I failed doing the root.
Su was transfered to the root-dir.
After that I got a lot of "system/bin/su: rksu: not found" and "system/bin/su: suu: not found" and the Technipad is doing a reset.
But there is still no root-access or superuser installed.
Android-Info:
================
AndroidInfo V1.1
================
build.prop Inhalt:
------------------
# begin build properties
# autogenerated by buildinfo.sh
ro.build.id=JDQ39
ro.build.display.id=GE.TechniPad.V1.07
ro.build.version.incremental=20140514
ro.build.version.sdk=17
ro.build.version.codename=REL
ro.build.version.release=4.2.2
ro.build.date=Wed May 14 10:36:07 CST 2014
ro.build.date.utc=1400034967
ro.build.type=user
ro.build.user=liuyang
ro.build.host=swubuntu
ro.build.tags=test-keys
ro.product.model=TechniPad_7T
ro.product.brand=MID
ro.product.name=TPad_7T
ro.product.device=TechniPad_7T
ro.product.board=TPad_7T
ro.product.cpu.abi=armeabi-v7a
ro.product.cpu.abi2=armeabi
ro.product.manufacturer=TechniSat
ro.product.locale.language=en
ro.product.locale.region=US
ro.wifi.channels=13
ro.board.platform=meson6
# ro.build.product is obsolete; use ro.product.device
ro.build.product=TPad_7T
# Do not try to parse ro.build.description or .fingerprint
ro.build.description=g17refm170m-user 4.2.2 JDQ39 20140514 test-keys
ro.build.fingerprint=MID/g17refm170m/g17refm170m:4.2.2/JDQ39/20140514:user/test-keys
ro.build.characteristics=tablet,nosdcard
# end build properties
ro.sf.lcd_density=160
keyguard.no_require_sim=1
#set keyguard.enable=false to disable keyguard
keyguard.enable=true
ro.statusbar.widget=true
ro.statusbar.button=true
ro.statusbar.yearmonthdayweek=true
# Time between scans in seconds. Keep it high to minimize battery drain.
# This only affects the case in which there are remembered access points,
# but none are in range.
#wifi.supplicant_scan_interval = 60
#alsa.mixer.playback.master=DAC2 Analog
#alsa.mixer.capture.master=Analog
hwui.render_dirty_regions=false
# Disable un-supported Android feature
hw.nopm=false
hw.nobattery=false
hw.nophone=false
hw.novibrate=true
hw.hasethernet=true
#hw.hasdata=true
ro.platform.has.touch=true
#set to 0 temporarily so touch works without other changes
ro.sf.hwrotation=0
# Use OSD2 mouse patch
ro.ui.cursor=osd2
ro.hardware=amlogic
sys.fb.bits=32
# Disable GPS
gps.enable=true
# Enable player buildin
media.amsuperplayer.enable=true
media.amplayer.enable-acodecs=ape,flac,dts
media.amplayer.enable=true
media.amsuperplayer.m4aplayer=STAGEFRIGHT_PLAYER
media.amsuperplayer.defplayer=PV_PLAYER
media.amplayer.thumbnail=true
#media.amplayer.widevineenable=true
media.amplayer.startmode=true
media.arm.audio.decoder=ape,ac3,eac3
# Nand write need force sync when gadget
gadget.nand.force_sync=true
# Status bar customization
ro.statusbar.widget.power=true
ro.statusbar.yearmonthdayweek=true
#support rotation btn for apk compatibility,set true btn useful
sys.rotation.settings=false
# HDMI
ro.hdmi480p.enable=false
#rw.fb.need2xscale=ok
#media.amplayer.osd2xenable=true
#Configure the dtv standard, can only be DVB,ATSC
dtv.standard=DVB
dtv.deinterlace.disable=true
dtv.transmission=3
audio.policy.digital.fixed=false
# App optimization
ro.app.optimization=true
#Dual display
ro.vout.dualdisplay3=true
ro.vout.player.exit=false
# CPU settings
ro.has.cpu.setting=true
# CPU freq customized in setting menu
# normal, performance, powersaving
ro.cpumode.maxfreq=1200000,1512000,800000
# when usbstorage, CPU mode and freq
ro.usbstorage.cpumode=performance
ro.usbstorage.maxfreq=600000
#ro.bootanimation.rotation=180
persist.service.adb.enable=0
#used to set default surface size, set 1 when hwrotation is 270, set 3 when hwrotation is 90;need set ro.bootanimation.rotation 0;
#debug.default.dimention=1
#support media poll uevent,can use sd cardread on usb port
#has.media.poll=false
has.media.poll=true
#used forward seek for libplayer
media.libplayer.seek.fwdsearch=1
#enable address bar cover issue fixing
ro.flashplayer.surfacehack=1
#fix hls sync
libplayer.livets.softdemux=1
libplayer.netts.recalcpts=1
#map volume
ro.audio.mapvalue=0,0,0,0
ro.media.partition.label=TechniPad7T
hw.has.bluetooth=true
#screenshot icon in status bar
ro.statusbar.screenshot=true
#vol + - icon in status bar
ro.statusbar.volume=true
#set HDMI ratation
#hdmi.hdmirotation=2
#systemui interval
rw.systemui.interval=40
media.libplayer.modules=vhls_mod
#for tabletui display
#ro.ui.tabletui=true
#skyworth Modify default language/country/timezone.
persist.sys.timezone=Europe/Berlin
persist.sys.language=de
persist.sys.country=De
#
# ADDITIONAL_BUILD_PROPERTIES
#
ro.com.android.dateformat=MM-dd-yyyy
ro.config.ringtone=Ring_Synth_04.ogg
ro.config.notification_sound=pixiedust.ogg
ro.carrier=unknown
ro.opengles.version=131072
ro.config.alarm_alert=Alarm_Classic.ogg
dalvik.vm.heapstartsize=8m
dalvik.vm.heapgrowthlimit=64m
dalvik.vm.heapsize=384m
dalvik.vm.heaptargetutilization=0.75
dalvik.vm.heapminfree=512k
dalvik.vm.heapmaxfree=8m
wifi.interface=wlan0
gps.enable=false
hw.cameras=2
ro.camera.orientation.front=270
ro.camera.orientation.back=90
rw.sensors.gsensor.installdir=0110
ro.app.optimization=true
drm.service.enable=true
net.bt.name=Android
dalvik.vm.stack-trace-file=/data/anr/traces.txt
/bin Verzeichnis:
------------------------
/bin//bin: No such file or directory
/sbin Verzeichnis:
-------------------------
/sbin/opendir failed, Permission denied
/xbin Verzeichnis:
------------------------
/xbin//xbin: No such file or directory
/system/bin Verzeichnis:
------------------------
/system/bin/AmlHostsTool
/system/bin/abcc
/system/bin/adb
/system/bin/am
/system/bin/app_process
/system/bin/applypatch
/system/bin/atrace
/system/bin/bmgr
/system/bin/bootanimation
/system/bin/bu
/system/bin/bugreport
/system/bin/cat
/system/bin/chat
/system/bin/chmod
/system/bin/chown
/system/bin/cmp
/system/bin/content
/system/bin/cp
/system/bin/curl
/system/bin/dalvikvm
/system/bin/date
/system/bin/dbus-daemon
/system/bin/dd
/system/bin/debuggerd
/system/bin/dexopt
/system/bin/df
/system/bin/dhcpcd
/system/bin/dhd
/system/bin/dig
/system/bin/dmesg
/system/bin/dnsmasq
/system/bin/drmserver
/system/bin/du
/system/bin/dumpstate
/system/bin/dumpsys
/system/bin/fsck.exfat
/system/bin/fsck_msdos
/system/bin/getevent
/system/bin/getprop
/system/bin/glgps
/system/bin/grep
/system/bin/gzip
/system/bin/hd
/system/bin/hostapd
/system/bin/id
/system/bin/ifconfig
/system/bin/iftop
/system/bin/ime
/system/bin/init-pppd.sh
/system/bin/input
/system/bin/insmod
/system/bin/installd
/system/bin/ioctl
/system/bin/ionice
/system/bin/ip
/system/bin/ip6tables
/system/bin/iptables
/system/bin/keystore
/system/bin/kill
/system/bin/linker
/system/bin/ln
/system/bin/log
/system/bin/logcat
/system/bin/logwrapper
/system/bin/ls
/system/bin/lsmod
/system/bin/lsof
/system/bin/make_ext4fs
/system/bin/md5
/system/bin/mdnsd
/system/bin/mediaserver
/system/bin/mkdir
/system/bin/mksh
/system/bin/monkey
/system/bin/mount
/system/bin/mount.exfat
/system/bin/mtpd
/system/bin/mv
/system/bin/nandread
/system/bin/ndc
/system/bin/netcfg
/system/bin/netd
/system/bin/netstat
/system/bin/newfs_msdos
/system/bin/notify
/system/bin/ntfs-3g
/system/bin/ping
/system/bin/pm
/system/bin/pppd
/system/bin/printenv
/system/bin/ps
/system/bin/racoon
/system/bin/reboot
/system/bin/renice
/system/bin/requestsync
/system/bin/rild
/system/bin/rm
/system/bin/rmdir
/system/bin/rmmod
/system/bin/route
/system/bin/run-as
/system/bin/schedtest
/system/bin/schedtop
/system/bin/screencap
/system/bin/screenshot
/system/bin/sdcard
/system/bin/sendevent
/system/bin/sensorcalibrate
/system/bin/sensorservice
/system/bin/service
/system/bin/servicemanager
/system/bin/set_display_mode.sh
/system/bin/setconsole
/system/bin/setprop
/system/bin/settings
/system/bin/setup_fs
/system/bin/sh
/system/bin/sky_remount
/system/bin/sky_sudo
/system/bin/sleep
/system/bin/smd
/system/bin/start
/system/bin/stop
/system/bin/surfaceflinger
/system/bin/svc
/system/bin/sync
/system/bin/system_key_server
/system/bin/system_server
/system/bin/tc
/system/bin/tinycap
/system/bin/tinymix
/system/bin/tinyplay
/system/bin/toolbox
/system/bin/top
/system/bin/touch
/system/bin/uiautomator
/system/bin/umount
/system/bin/uptime
/system/bin/usb_modeswitch
/system/bin/usbpower
/system/bin/usbtestpm
/system/bin/vdc
/system/bin/vmstat
/system/bin/vold
/system/bin/watchprops
/system/bin/wififix.sh
/system/bin/wipe
/system/bin/wl
/system/bin/wpa_supplicant
/system/sbin Verzeichnis:
-------------------------
/system/sbin//system/sbin: No such file or directory
/system/xbin Verzeichnis:
------------------------
/system/xbin/[
/system/xbin/[[
/system/xbin/adjtimex
/system/xbin/arp
/system/xbin/ash
/system/xbin/awk
/system/xbin/base64
/system/xbin/basename
/system/xbin/bbconfig
/system/xbin/blkid
/system/xbin/blockdev
/system/xbin/brctl
/system/xbin/bunzip2
/system/xbin/busybox
/system/xbin/bzcat
/system/xbin/bzip2
/system/xbin/cal
/system/xbin/cat
/system/xbin/catv
/system/xbin/chattr
/system/xbin/chgrp
/system/xbin/chmod
/system/xbin/chown
/system/xbin/chroot
/system/xbin/clear
/system/xbin/cmp
/system/xbin/comm
/system/xbin/cp
/system/xbin/cpio
/system/xbin/crond
/system/xbin/crontab
/system/xbin/cut
/system/xbin/date
/system/xbin/dc
/system/xbin/dd
/system/xbin/depmod
/system/xbin/devmem
/system/xbin/dexdump
/system/xbin/df
/system/xbin/diff
/system/xbin/dirname
/system/xbin/dmesg
/system/xbin/dnsd
/system/xbin/dos2unix
/system/xbin/du
/system/xbin/echo
/system/xbin/ed
/system/xbin/egrep
/system/xbin/env
/system/xbin/expand
/system/xbin/expr
/system/xbin/false
/system/xbin/fbset
/system/xbin/fbsplash
/system/xbin/fdisk
/system/xbin/fgrep
/system/xbin/find
/system/xbin/flash_lock
/system/xbin/flash_unlock
/system/xbin/flashcp
/system/xbin/flock
/system/xbin/fold
/system/xbin/free
/system/xbin/freeramdisk
/system/xbin/fstrim
/system/xbin/fsync
/system/xbin/ftpget
/system/xbin/ftpput
/system/xbin/fuser
/system/xbin/getopt
/system/xbin/grep
/system/xbin/groups
/system/xbin/gunzip
/system/xbin/gzip
/system/xbin/halt
/system/xbin/head
/system/xbin/hexdump
/system/xbin/id
/system/xbin/ifconfig
/system/xbin/inetd
/system/xbin/insmod
/system/xbin/install
/system/xbin/ionice
/system/xbin/iostat
/system/xbin/ip
/system/xbin/kill
/system/xbin/killall
/system/xbin/killall5
/system/xbin/less
/system/xbin/ln
/system/xbin/losetup
/system/xbin/ls
/system/xbin/lsattr
/system/xbin/lsmod
/system/xbin/lsof
/system/xbin/lsusb
/system/xbin/lzcat
/system/xbin/lzma
/system/xbin/lzop
/system/xbin/lzopcat
/system/xbin/man
/system/xbin/md5sum
/system/xbin/mesg
/system/xbin/mkdir
/system/xbin/mkdosfs
/system/xbin/mke2fs
/system/xbin/mkfifo
/system/xbin/mkfs.ext2
/system/xbin/mkfs.vfat
/system/xbin/mknod
/system/xbin/mkswap
/system/xbin/mktemp
/system/xbin/modinfo
/system/xbin/modprobe
/system/xbin/more
/system/xbin/mount
/system/xbin/mountpoint
/system/xbin/mpstat
/system/xbin/mv
/system/xbin/nanddump
/system/xbin/nandwrite
/system/xbin/nbd-client
/system/xbin/netstat
/system/xbin/nice
/system/xbin/nohup
/system/xbin/nslookup
/system/xbin/ntpd
/system/xbin/od
/system/xbin/patch
/system/xbin/pgrep
/system/xbin/pidof
/system/xbin/ping
/system/xbin/pipe_progress
/system/xbin/pkill
/system/xbin/pmap
/system/xbin/poweroff
/system/xbin/printenv
/system/xbin/printf
/system/xbin/ps
/system/xbin/pstree
/system/xbin/pwd
/system/xbin/pwdx
/system/xbin/rdev
/system/xbin/readlink
/system/xbin/realpath
/system/xbin/reboot
/system/xbin/renice
/system/xbin/reset
/system/xbin/resize
/system/xbin/rev
/system/xbin/rm
/system/xbin/rmdir
/system/xbin/rmmod
/system/xbin/route
/system/xbin/run-parts
/system/xbin/rx
/system/xbin/sed
/system/xbin/seq
/system/xbin/setconsole
/system/xbin/setserial
/system/xbin/setsid
/system/xbin/sh
/system/xbin/sha1sum
/system/xbin/sha256sum
/system/xbin/sha3sum
/system/xbin/sha512sum
/system/xbin/sleep
/system/xbin/sort
/system/xbin/split
/system/xbin/stat
/system/xbin/strings
/system/xbin/stty
/system/xbin/sum
/system/xbin/swapoff
/system/xbin/swapon
/system/xbin/sync
/system/xbin/sysctl
/system/xbin/tac
/system/xbin/tail
/system/xbin/tar
/system/xbin/taskset
/system/xbin/tee
/system/xbin/telnet
/system/xbin/telnetd
/system/xbin/test
/system/xbin/tftp
/system/xbin/tftpd
/system/xbin/time
/system/xbin/timeout
/system/xbin/top
/system/xbin/touch
/system/xbin/tr
/system/xbin/traceroute
/system/xbin/true
/system/xbin/ttysize
/system/xbin/tune2fs
/system/xbin/umount
/system/xbin/uname
/system/xbin/uncompress
/system/xbin/unexpand
/system/xbin/uniq
/system/xbin/unix2dos
/system/xbin/unlzma
/system/xbin/unlzop
/system/xbin/unxz
/system/xbin/unzip
/system/xbin/uptime
/system/xbin/usleep
/system/xbin/uudecode
/system/xbin/uuencode
/system/xbin/vi
/system/xbin/watch
/system/xbin/wc
/system/xbin/wget
/system/xbin/whoami
/system/xbin/xargs
/system/xbin/xz
/system/xbin/xzcat
/system/xbin/yes
/system/xbin/zcat
Potentielle SuperUser Dateien:
------------------------------
/system/bin/surfaceflinger -> (su)rfaceflinger
/system/xbin/sum -> (su)m

You´re using the "T" Variant of the TechniPad which is different to the regular TechniPad´s. I didn´t have one of these but it seems that the regular Rockchip root for Android 4.1/4.2 does not work on this variant like on the other TechniPads. But since you do have Android V4.2.2 installed there is still the chance that rooting is possible with the TowelRoot method (menu entry 3 within the RootBox 1.6 or take the APK from the original TowelRoot creator GeoHot @ https://towelroot.com/). So I assume to give TowelRoot a try.

I tried Towelroot but still no luck. Startet it, make it rain and it shows "this phone isnt currently supported".

It seems that this TechniPad model is very different to the other models and I have no clue what could work for it. So in this case I can´t help you any further, sorry.

Thanx for your help.

Related

Cube U9GT2 / Easypad 970 ROMs --- Jellybean mods

RK2918: Easypix Easypad 970 / Magic Cube U9GT2 >>> ROM and More <<<
4----------------------------------------
Easypad970/CubeU9GT2 Jellybean 1.2
Download new link
new features:
-wallpaper and voice search included
-camera updated to 4.2
known issue:
- no video recording
3----------------------------------------
Easypad970/CubeU9GT2 Jellybean 1.1
new features:
-increasing userdata for app installation from 1 to 2 GB, special thanks to 900supersporter for the help
- supercharged(patched) services. jar for speed improvements
- and the scripts from zeppelinrox supercharger for an extra speed kick(only for user, who likes to play with options, details below)
Special thanks to zeppelinrox for the supercharger from xda
How to use zeppelinrox supercharger script for a extra speed kick:
1.) unpack Download ,copy zeppelinrox supercharger scripts with with the busybox directory to microSD
2.) After installation of the ROM, you can beginn any time to run the supercharger scripts either Testversion 6 or 9.
3.) with Scriptmanager app you can run as superuser(su) on of the two alternative scripts
4.) but first run with scriptmanager as superuser the busybox script busybox_v1.19.4_wraithdu_installer_v14.sh
5.) Then run supercharger script, first time you need not much to decide,
6.) Very important: When the Script is ready, you have to reboot into cwm
7.) wipe cache, dalvik and fix permissions
8.) reboot and ready, you rom will be 100% supercharged
If you run it second time or more, than you have manual to decide, what you want to do, you can try everything, but sometimes the result could be a bit unstable. Then you have to try it again.
ROM Installation:
Here comes the how to install an unpacked ROM, means 5 img files flashing with the RKtool on your tablet. (Standard stock rom is only one img flashed with the RKbatchtool)
1. unzip the 7zip file, inside you find the unpacked rom deeper in the ROM directory and the MoageRktool in \u9gt2 Jellybean ROM 1.0 directory
2. Set your tablet with pressing the volume- and the power button into flash mode
3. Connect your tablet to pc, if your battery was before under 50% better plug the power supply cable too.
4. If you have never flashed a stock rom, you need to install at first the rk29xx device driver for your windows version 32 or 64 bit. You get them here on freaktab with the finless u9gt2 roms, from your tablets homepage or from many other sites in the internet with instructions to install
5. With installed drivers start the MoageRktool, in the bottom line you read 'Found RKandroid Loader Rock Usb', if not go back to step 2.
6. Press Erease IDB, you must wait on the positive message that the job is done
7. Check all boxes except of backup: Loader, Parameter, Misc, Kernel, Boot, Recovery and System have to be checked
8. Then flash the ROM into nand with the Run button
9. Finally you got a done message, hopefully without failure and
10. The ROM starts in the CWM (clockwordmod)
11. Press only power button to reboot
12. First start of the ROM on your tablet will begin, takes about 5 minutes and not more than 10
13. Ready - make your first step into androids world of the Custom ROMs
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Hopefully I forgot nothing.
JDfense
2---------------------------------
Easypad970/Cube09GT2 Jellybean 1.0
changedfeatures:
--- finally ext4 system rw possible
--- and changed some apps
special thanks to Oma's Jellybean and moage Jeallybean ROMs and for the help of 900supersport from freaktab
stevemp&JDfense
1----------------------------------------------------------------------
Moage.com had released the first Jellybean for our tablet. It is fast and stable chinese ROM.
We decide to change some things to improve that ROM.
Here comes the first Version as a result of our cooperation:
Moage-ext4-cwm Jellybean 0.9
http://www.mediafire.com/?2btmml3aacppuq2
Features:
---fast rom, better fasten your seatbelts
---ext4
---cwm5.5.04(thanks to http://www.slatedroid.com/topic/3351...or-cube-u9gt2/ )
---built.prop with some tweaks for speed and changed for western europe
---with Google Play, jetaudio basic, ebookdroid, TuneIn radio and the awesome hackers keyboard with english and german Dictionary
---took out most of the chinese apps and not useful things
recommended:
Before flashing take out external sd.
known issues:
---After the first boot you maybe have to format Nand-flash once. After that it works all fine- hopefully.
Now have fun.
stevemp & JDfense
free place
Sent from my RubiX NonSense FINAL using Tapatalk 2
I want a new tablet!
I need to find an rk2918 tablet to try it.
steemp
good luck in the new thread for the fantastic couple.
I'm really interested in contribute
Sent from Master-G M900HC mentally push.
DaremoS said:
good luck in the new thread for the fantastic couple.
I'm really interested in contribute
Sent from Master-G M900HC mentally push.
Click to expand...
Click to collapse
Check in DaremoS. It will be like old times.
First change your master rk2918 kernel into our moage rom and lets see how this jellybean works. After that we are waiting for your tweaks.:highfive:
JDfense:angel:
USB Modem Or Data Card support
I was trying with 3g usb dongle but it is crashing at 'mobile network'..
kavena78 said:
I was trying with 3g usb dongle but it is crashing at 'mobile network'..
Click to expand...
Click to collapse
Sorry, I don't know which 3g stick would work. All I know is, that you should plug it in otg-usb port.
Edit:
I forgot to mention, that I have taken out the phone.apk, because of the extra battery consumption.
Try first the original moage rom, here
http://www.ex.ua/view_storage/121970404347
If your 3g then work, we find a way to add the phone.apk.
JDfense
Could you please tell me the difference between this one and Renegade?
sw6lee said:
Could you please tell me the difference between this one and Renegade?
Click to expand...
Click to collapse
I had no look inside the renegade rom so far, but afaik it is a nice and responsive rom. You have to compare for yourself or is there a special question?
JDfense
i have trouble with youtube, it's always FC.
and some app i move to nand flash, when i reboot, it's not show in home. Can you help me, please....
Sorry my bad English
JDfense said:
I had no look inside the renegade rom so far, but afaik it is a nice and responsive rom. You have to compare for yourself or is there a special question?
JDfense
Click to expand...
Click to collapse
Nope, I was just too lazy to try, because then I have to restore everything, and takes a lot of time..haha
I'll try some time this weekend.
Thanks
ducanh2992 said:
i have trouble with youtube, it's always FC.
and some app i move to nand flash, when i reboot, it's not show in home. Can you help me, please....
Sorry my bad English
Click to expand...
Click to collapse
Sorry ducan, I have no problem with youtube. I suggest, you uninstall youtube and install again.
Pushing apps on sdcard works not with all apps. Some apps don't like it.:angel:
JDfense
JDfense said:
Sorry ducan, I have no problem with youtube. I suggest, you uninstall youtube and install again.
Pushing apps on sdcard works not with all apps. Some apps don't like it.:angel:
JDfense
Click to expand...
Click to collapse
Can you teach me to mod the rom? I want to mod the moage new rom. Thank you so much!
modding rk2918
ducanh2992 said:
Can you teach me to mod the rom? I want to mod the moage new rom. Thank you so much!
Click to expand...
Click to collapse
Ok, you have to work in Linux.
boot.img is a compressed file with a header(8 bytes) and footer(crc)
mkdir boot and copy boot.img to boot directory.
dd if=boot.img of=bootimg.gz skip=8 bs=1 count=30000000
This strips the header off.
gunzip bootimg.gz
This unpacks the bootimg.gz, make your mods now. Delete boot.img and bootimg.gz.
You need to reset dates after mods.
sudo find . -exec touch -d "1970-01-01 01:00" {} \;
Pack files back into newboot.gz.
sudo find . ! -name "."|sort|cpio -oa -H newc|gzip -n >../newboot.gz
Add crc so it will boot.
sudo ./rkcrc -k newboot.gz newboot.img
recovery.img is done the same way.
System image can be an ext3 or ext4. Mount image to modify files.
mkdir tmp and mount system.img to tmp.
sudo mount -t ext4 -o loop system.img tmp
Change to tmp directory and make your mods. Then unmount system.img
sudo umount tmp
This should get you started on modding.
stevemp
Hey guyssss I just ordered Note II !
Felt like letting you know that I bought a phone+tablet(phablet)
Can't wait to get it, sandy kinda slowed down my order... Let's see when I get it.
Very exited and broke hahah
Sent from my myTouch_4G_Slide using Tapatalk 2
ducanh2992 said:
Can you teach me to mod the rom? I want to mod the moage new rom. Thank you so much!
Click to expand...
Click to collapse
I want to add something to steves tutorial start.
If you have no experiences with linux, then you need some time to fight with the right system in linux.
On some days you would like to push your linux system out of the window.:cyclops:
That was my experience, when I try to start with modding in linux. Last time I checked, I have still trouble with working in linux, but it will be day by day more fun.
JDfense
ducanh2992 said:
Can you teach me to mod the rom? I want to mod the moage new rom. Thank you so much!
Click to expand...
Click to collapse
heart_crafter said:
Hey guyssss I just ordered Note II !
Felt like letting you know that I bought a phone+tablet(phablet)
Can't wait to get it, sandy kinda slowed down my order... Let's see when I get it.
Very exited and broke hahah
Sent from my myTouch_4G_Slide using Tapatalk 2
Click to expand...
Click to collapse
Our original testpilot seems to talk in riddles again. Could someone call the doctor?:angel:
JDfense
heart_crafter said:
Hey guyssss I just ordered Note II !
Felt like letting you know that I bought a phone+tablet(phablet)
Can't wait to get it, sandy kinda slowed down my order... Let's see when I get it.
Very exited and broke hahah
Sent from my myTouch_4G_Slide using Tapatalk 2
Click to expand...
Click to collapse
Nice, enjoy your new phablet. :highfive:
stevemp
init.rc
Explanation of init.rc in boot.img and recovery.img
Android Init Language
The Android Init Language consists of four broad classes of statements:
Actionn
Commands
Services
Options
The language syntax includes the following conventions:
All classes are line-oriented and consist of tokens separated by whitespace. c-style backslash escapes may be used to insert whitespace into a token. Double quotes may also be used to prevent whitespace from breaking text into multiple tokens. A backslash
appearing as the last character on a line is used for line-folding.
Lines that start with a # (leading whitespace allowed) are comments.
Actions and Services implicitly declare new sections. All commands or options belong to the section most recently declared. Commands or options before the first section are ignored.
Actions and Services have unique names. If a second Action or Service is declared with the same name as an existing one, it is ignored as an error.
Actions
Actions are named sequences of commands. Actions have a trigger used to determine when the action should occur. When an event occurs which matches an action's trigger, that action is added to the tail of a to-be-executed queue (unless it is already on the queue).
Each action in the queue is dequeued in sequence. Each command in an action is executed in sequence. Init handles other activities (such as, device creation/destruction, property setting, process restarting) "between" the execution of the commands in activities.
Actions take the form of:
on <trigger>
<command>
<command>
<command>
Services
Services are programs that init launches and (optionally) restarts when they exit.
Services take the form of:
service <name> <pathname> [ <argument> ]*
<option>
<option>
...
Options
Options are modifiers to services that affect how and when init runs a service. Options are described in the table below:
Option Description
disabled This service will not automatically start with its class. It must be explicitly started by name.
socket <type> <name> <perm> [ <user> [ <group> ] ] Create a unix domain socket named /dev/socket/<name> and pass its fd to the launched process. Valid <type> values include dgram and stream. user and group default to 0.
user <username> Change to username before exec'ing this service. Currently defaults to root.
group <groupname> [ <groupname> ]* Change to groupname before exec'ing this service. Additional groupnames beyond the first, which is required, are used to set additional groups of the process (with setgroups()). Currently defaults to root.
capability [ <capability> ]+ Set linux capability before exec'ing this service
oneshot Do not restart the service when it exits.
class <name> Specify a class name for the service. All services in a named class must start and stop together. A service is considered of class "default" if one is not specified via the class option.
Triggers
Triggers are strings used to match certain kinds of events that cause an action to occur.
Trigger Description
boot This is the first trigger that occurs when init starts (after /init.conf is loaded).
<name>=<value> Triggers of this form occur when the property <name> is set to the specific value <value>.
device-added-<path>
device-removed-<path> Triggers of these forms occur when a device node is added or removed.
service-exited-<name> Triggers of this form occur when the specified service exits.
Commands
Command Description
exec <path> [ <argument> ]* Fork and execute a program (<path>). This will block until the program completes execution. Try to avoid exec. Unlike the builtin commands, it runs the risk of getting init "stuck".
export <name> <value> Set the environment variable <name> equal to <value> in the global environment (which will be inherited by all processes started after this command is executed).
ifup <interface> Bring the network interface <interface> online.
import <filename> Parse an init config file, extending the current configuration.
hostname <name> Set the host name.
class_start <serviceclass> Start all services of the specified class if they are not already running.
class_stop <serviceclass> Stop all services of the specified class if they are currently running.
domainname <name> Set the domain name.
insmod <path> Install the module at <path>.
mkdir <path> Make a directory at <path>.
mount <type> <device> <dir> [ <mountoption> ]* Attempt to mount the named device at the directory <dir> <device>. This may be of the form [email protected] to specify a mtd block device by name.
setkey - currenlty undefined -
setprop <name> <value> Set system property <name> to <value>.
setrlimit <resource> <cur> <max> Set the rlimit for a resource.
start <service> Start a service running if it is not already running.
stop <service> Stop a service from running if it is currently running.
symlink <target> <path> Create a symbolic link at <path> with the value <target>.
write <path> <string> [ <string> ]* Open the file at <path> and write one or more strings to it with write(2).
Properties
Init updates some system properties to provide some insight into
what it's doing:
Property Description
init.action Equal to the name of the action currently being executed or "" if none.
init.command Equal to the command being executed or "" if none.
init.svc.<name> State of a named service ("stopped", "running", or "restarting").
---------- Post added at 12:12 PM ---------- Previous post was at 12:08 PM ----------
JDfense_Moage_ext4_CWM boot.img init.rc
Code:
# Copyright (C) 2012 The Android Open Source Project
#
# IMPORTANT: Do not create world writable files or directories.
# This is a common source of Android security bugs.
#
import /init.${ro.hardware}.rc
import /init.trace.rc
on early-init
# Set init and its forked children's oom_adj.
write /proc/1/oom_adj -16
start ueventd
# create mountpoints
mkdir /mnt 0775 root system
on init
sysclktz 0
loglevel 3
# setup the global environment
export PATH /sbin:/vendor/bin:/system/sbin:/system/bin:/system/xbin
export LD_LIBRARY_PATH /vendor/lib:/system/lib
export ANDROID_BOOTLOGO 1
export ANDROID_ROOT /system
export ANDROID_ASSETS /system/app
export ANDROID_DATA /data
export ASEC_MOUNTPOINT /mnt/asec
export LOOP_MOUNTPOINT /mnt/obb
export BOOTCLASSPATH /system/framework/core.jar:/system/framework/core-junit.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/apache-xml.jar
# Backward compatibility
symlink /system/etc /etc
symlink /sys/kernel/debug /d
# Right now vendor lives on the same filesystem as system,
# but someday that may change.
symlink /system/vendor /vendor
# create mountpoints
mkdir /mnt/sdcard 0000 system system
# Create cgroup mount point for cpu accounting
mkdir /acct
mount cgroup none /acct cpuacct
mkdir /acct/uid
mkdir /system
mkdir /data 0771 system system
mkdir /cache 0770 system cache
mkdir /config 0500 root root
# Directory for putting things only root should see.
mkdir /mnt/secure 0700 root root
# Directory for staging bindmounts
mkdir /mnt/secure/staging 0700 root root
# Directory-target for where the secure container
# imagefile directory will be bind-mounted
mkdir /mnt/secure/asec 0700 root root
# Secure container public mount points.
mkdir /mnt/asec 0700 root system
mount tmpfs tmpfs /mnt/asec mode=0755,gid=1000
# Filesystem image public mount points.
mkdir /mnt/obb 0700 root system
mount tmpfs tmpfs /mnt/obb mode=0755,gid=1000
write /proc/sys/kernel/panic_on_oops 1
write /proc/sys/kernel/hung_task_timeout_secs 0
write /proc/cpu/alignment 4
write /proc/sys/kernel/sched_latency_ns 10000000
write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000
write /proc/sys/kernel/sched_compat_yield 1
write /proc/sys/kernel/sched_child_runs_first 0
write /proc/sys/kernel/randomize_va_space 2
write /proc/sys/kernel/kptr_restrict 2
write /proc/sys/kernel/dmesg_restrict 1
write /proc/sys/vm/mmap_min_addr 32768
write /proc/sys/kernel/sched_rt_runtime_us 950000
write /proc/sys/kernel/sched_rt_period_us 1000000
# Create cgroup mount points for process groups
mkdir /dev/cpuctl
mount cgroup none /dev/cpuctl cpu
chown system system /dev/cpuctl
chown system system /dev/cpuctl/tasks
chmod 0660 /dev/cpuctl/tasks
write /dev/cpuctl/cpu.shares 1024
write /dev/cpuctl/cpu.rt_runtime_us 950000
write /dev/cpuctl/cpu.rt_period_us 1000000
mkdir /dev/cpuctl/apps
chown system system /dev/cpuctl/apps/tasks
chmod 0666 /dev/cpuctl/apps/tasks
write /dev/cpuctl/apps/cpu.shares 1024
write /dev/cpuctl/apps/cpu.rt_runtime_us 800000
write /dev/cpuctl/apps/cpu.rt_period_us 1000000
mkdir /dev/cpuctl/apps/bg_non_interactive
chown system system /dev/cpuctl/apps/bg_non_interactive/tasks
chmod 0666 /dev/cpuctl/apps/bg_non_interactive/tasks
# 5.0 %
write /dev/cpuctl/apps/bg_non_interactive/cpu.shares 52
write /dev/cpuctl/apps/bg_non_interactive/cpu.rt_runtime_us 700000
write /dev/cpuctl/apps/bg_non_interactive/cpu.rt_period_us 1000000
# Allow everybody to read the xt_qtaguid resource tracking misc dev.
# This is needed by any process that uses socket tagging.
chmod 0644 /dev/xt_qtaguid
on fs
insmod /rk29xxnand_ko.ko
# mount mtd partitions
mount ext4 [email protected] /system ro noatime nodiratime
mount ext4 [email protected] /data noatime nodiratime nosuid nodev
mount ext4 [email protected] /cache noatime nodiratime nosuid nodev
on post-fs
# once everything is setup, no need to modify /
mount rootfs rootfs / ro remount
# We chown/chmod /cache again so because mount is run as root + defaults
chown system cache /cache
chmod 0770 /cache
# This may have been created by the recovery system with odd permissions
chown system cache /cache/recovery
chmod 0770 /cache/recovery
#change permissions on vmallocinfo so we can grab it from bugreports
chown root log /proc/vmallocinfo
chmod 0440 /proc/vmallocinfo
#change permissions on kmsg & sysrq-trigger so bugreports can grab kthread stacks
chown root system /proc/kmsg
chmod 0440 /proc/kmsg
chown root system /proc/sysrq-trigger
chmod 0220 /proc/sysrq-trigger
# create the lost+found directories, so as to enforce our permissions
mkdir /cache/lost+found 0770 root root
on post-fs-data
# We chown/chmod /data again so because mount is run as root + defaults
chown system system /data
chmod 0771 /data
# Create dump dir and collect dumps.
# Do this before we mount cache so eventually we can use cache for
# storing dumps on platforms which do not have a dedicated dump partition.
mkdir /data/dontpanic 0750 root log
# Collect apanic data, free resources and re-arm trigger
copy /proc/apanic_console /data/dontpanic/apanic_console
chown root log /data/dontpanic/apanic_console
chmod 0640 /data/dontpanic/apanic_console
copy /proc/apanic_threads /data/dontpanic/apanic_threads
chown root log /data/dontpanic/apanic_threads
chmod 0640 /data/dontpanic/apanic_threads
write /proc/apanic_console 1
# create basic filesystem structure
mkdir /data/misc 01771 system misc
mkdir /data/misc/bluetoothd 0770 bluetooth bluetooth
mkdir /data/misc/bluetooth 0770 system system
mkdir /data/misc/keystore 0700 keystore keystore
mkdir /data/misc/keychain 0771 system system
mkdir /data/misc/vpn 0770 system vpn
mkdir /data/misc/systemkeys 0700 system system
# give system access to wpa_supplicant.conf for backup and restore
mkdir /data/misc/wifi 0770 wifi wifi
chmod 0660 /data/misc/wifi/wpa_supplicant.conf
mkdir /data/local 0751 root root
# For security reasons, /data/local/tmp should always be empty.
# Do not place files or directories in /data/local/tmp
mkdir /data/local/tmp 0771 shell shell
mkdir /data/data 0771 system system
mkdir /data/app-private 0771 system system
mkdir /data/app-asec 0700 root root
mkdir /data/app 0771 system system
mkdir /data/property 0700 root root
mkdir /data/ssh 0750 root shell
mkdir /data/ssh/empty 0700 root root
# create dalvik-cache, so as to enforce our permissions
mkdir /data/dalvik-cache 0771 system system
# create resource-cache and double-check the perms
mkdir /data/resource-cache 0771 system system
chown system system /data/resource-cache
chmod 0771 /data/resource-cache
# create the lost+found directories, so as to enforce our permissions
mkdir /data/lost+found 0770 root root
# create directory for DRM plug-ins - give drm the read/write access to
# the following directory.
mkdir /data/drm 0770 drm drm
# If there is no fs-post-data action in the init.<device>.rc file, you
# must uncomment this line, otherwise encrypted filesystems
# won't work.
# Set indication (checked by vold) that we have finished this action
#setprop vold.post_fs_data_done 1
chown system system /sys/class/android_usb/android0/f_mass_storage/lun/file
chmod 0660 /sys/class/android_usb/android0/f_mass_storage/lun/file
chown system system /sys/class/android_usb/android0/f_rndis/ethaddr
chmod 0660 /sys/class/android_usb/android0/f_rndis/ethaddr
chmod 0777 /sys/module/gt801_ts/parameters/debug1
chmod 0777 /sys/module/ft5306_ts/parameters/debug1
chmod 0777 /sys/module/ct360_ts/parameters/debug1
chmod 0777 /sys/module/goodix_touch_82x/parameters/debug1
on boot
# basic network init
ifup lo
hostname localhost
domainname localdomain
setprop UserVolumeLabel "U9GT2"
# set RLIMIT_NICE to allow priorities from 19 to -20
setrlimit 13 40 40
# Memory management. Basic kernel parameters, and allow the high
# level system server to be able to adjust the kernel OOM driver
# parameters to match how it is managing things.
write /proc/sys/vm/overcommit_memory 1
write /proc/sys/vm/min_free_order_shift 4
chown root system /sys/module/lowmemorykiller/parameters/adj
chmod 0664 /sys/module/lowmemorykiller/parameters/adj
chown root system /sys/module/lowmemorykiller/parameters/minfree
chmod 0664 /sys/module/lowmemorykiller/parameters/minfree
# Tweak background writeout
write /proc/sys/vm/dirty_expire_centisecs 200
write /proc/sys/vm/dirty_background_ratio 5
# Permissions for System Server and daemons.
chown radio system /sys/android_power/state
chown radio system /sys/android_power/request_state
chown radio system /sys/android_power/acquire_full_wake_lock
chown radio system /sys/android_power/acquire_partial_wake_lock
chown radio system /sys/android_power/release_wake_lock
chown system system /sys/power/state
chown system system /sys/power/wakeup_count
chown radio system /sys/power/wake_lock
chown radio system /sys/power/wake_unlock
chmod 0660 /sys/power/state
chmod 0660 /sys/power/wake_lock
chmod 0660 /sys/power/wake_unlock
chown system system /sys/devices/system/cpu/cpufreq/interactive/timer_rate
chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/timer_rate
chown system system /sys/devices/system/cpu/cpufreq/interactive/min_sample_time
chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/min_sample_time
chown system system /sys/devices/system/cpu/cpufreq/interactive/hispeed_freq
chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/hispeed_freq
chown system system /sys/devices/system/cpu/cpufreq/interactive/go_hispeed_load
chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/go_hispeed_load
chown system system /sys/devices/system/cpu/cpufreq/interactive/above_hispeed_delay
chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/above_hispeed_delay
chown system system /sys/devices/system/cpu/cpufreq/interactive/boost
chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/boost
chown system system /sys/devices/system/cpu/cpufreq/interactive/boostpulse
chown system system /sys/devices/system/cpu/cpufreq/interactive/input_boost
chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/input_boost
# Assume SMP uses shared cpufreq policy for all CPUs
chown system system /sys/devices/system/cpu/cpu0/cpufreq/scaling_max_freq
chmod 0660 /sys/devices/system/cpu/cpu0/cpufreq/scaling_max_freq
chown system system /sys/class/timed_output/vibrator/enable
chown system system /sys/class/leds/keyboard-backlight/brightness
chown system system /sys/class/leds/lcd-backlight/brightness
chown system system /sys/class/leds/button-backlight/brightness
chown system system /sys/class/leds/jogball-backlight/brightness
chown system system /sys/class/leds/red/brightness
chown system system /sys/class/leds/green/brightness
chown system system /sys/class/leds/blue/brightness
chown system system /sys/class/leds/red/device/grpfreq
chown system system /sys/class/leds/red/device/grppwm
chown system system /sys/class/leds/red/device/blink
chown system system /sys/class/leds/red/brightness
chown system system /sys/class/leds/green/brightness
chown system system /sys/class/leds/blue/brightness
chown system system /sys/class/leds/red/device/grpfreq
chown system system /sys/class/leds/red/device/grppwm
chown system system /sys/class/leds/red/device/blink
chown system system /sys/class/timed_output/vibrator/enable
chown system system /sys/module/sco/parameters/disable_esco
chown system system /sys/kernel/ipv4/tcp_wmem_min
chown system system /sys/kernel/ipv4/tcp_wmem_def
chown system system /sys/kernel/ipv4/tcp_wmem_max
chown system system /sys/kernel/ipv4/tcp_rmem_min
chown system system /sys/kernel/ipv4/tcp_rmem_def
chown system system /sys/kernel/ipv4/tcp_rmem_max
chown root radio /proc/cmdline
# Define TCP buffer sizes for various networks
# ReadMin, ReadInitial, ReadMax, WriteMin, WriteInitial, WriteMax,
setprop net.tcp.buffersize.default 4096,87380,110208,4096,16384,110208
setprop net.tcp.buffersize.wifi 524288,1048576,2097152,262144,524288,1048576
setprop net.tcp.buffersize.lte 524288,1048576,2097152,262144,524288,1048576
setprop net.tcp.buffersize.umts 4094,87380,110208,4096,16384,110208
setprop net.tcp.buffersize.hspa 4094,87380,262144,4096,16384,262144
setprop net.tcp.buffersize.edge 4093,26280,35040,4096,16384,35040
setprop net.tcp.buffersize.gprs 4092,8760,11680,4096,8760,11680
# Set this property so surfaceflinger is not started by system_init
setprop system_init.startsurfaceflinger 0
class_start core
class_start main
on nonencrypted
class_start late_start
on charger
class_start charger
on property:vold.decrypt=trigger_reset_main
class_reset main
on property:vold.decrypt=trigger_load_persist_props
load_persist_props
on property:vold.decrypt=trigger_post_fs_data
trigger post-fs-data
on property:vold.decrypt=trigger_restart_min_framework
class_start main
on property:vold.decrypt=trigger_restart_framework
class_start main
class_start late_start
on property:vold.decrypt=trigger_shutdown_framework
class_reset late_start
class_reset main
# Used to disable USB when switching states
on property:sys.usb.config=none
stop adbd
write /sys/class/android_usb/android0/enable 0
write /sys/class/android_usb/android0/bDeviceClass 0
setprop sys.usb.state ${sys.usb.config}
# adb only USB configuration
# This should only be used during device bringup
# and as a fallback if the USB manager fails to set a standard configuration
on property:sys.usb.config=adb
write /sys/class/android_usb/android0/enable 0
write /sys/class/android_usb/android0/idVendor 0bb4
write /sys/class/android_usb/android0/idProduct 0c01
write /sys/class/android_usb/android0/functions ${sys.usb.config}
write /sys/class/android_usb/android0/enable 1
start adbd
setprop sys.usb.state ${sys.usb.config}
# USB accessory configuration
on property:sys.usb.config=accessory
write /sys/class/android_usb/android0/enable 0
write /sys/class/android_usb/android0/idVendor 18d1
write /sys/class/android_usb/android0/idProduct 2d00
write /sys/class/android_usb/android0/functions ${sys.usb.config}
write /sys/class/android_usb/android0/enable 1
setprop sys.usb.state ${sys.usb.config}
# USB accessory configuration, with adb
on property:sys.usb.config=accessory,adb
write /sys/class/android_usb/android0/enable 0
write /sys/class/android_usb/android0/idVendor 18d1
write /sys/class/android_usb/android0/idProduct 2d01
write /sys/class/android_usb/android0/functions ${sys.usb.config}
write /sys/class/android_usb/android0/enable 1
start adbd
setprop sys.usb.state ${sys.usb.config}
# Used to set USB configuration at boot and to switch the configuration
# when changing the default configuration
on property:persist.sys.usb.config=*
setprop sys.usb.config ${persist.sys.usb.config}
## Daemon processes to be run by init.
##
#enable init.d
service sysinit /system/bin/sysinit
class core
oneshot
service ueventd /sbin/ueventd
class core
critical
service console /system/bin/sh
class core
console
disabled
user shell
group log
on property:ro.debuggable=1
start console
# adbd is controlled via property triggers in init.<platform>.usb.rc
service adbd /sbin/adbd
class core
disabled
# adbd on at boot in emulator
on property:ro.kernel.qemu=1
start adbd
# This property trigger has added to imitiate the previous behavior of "adb root".
# The adb gadget driver used to reset the USB bus when the adbd daemon exited,
# and the host side adb relied on this behavior to force it to reconnect with the
# new adbd instance after init relaunches it. So now we force the USB bus to reset
# here when adbd sets the service.adb.root property to 1. We also restart adbd here
# rather than waiting for init to notice its death and restarting it so the timing
# of USB resetting and adb restarting more closely matches the previous behavior.
on property:service.adb.root=1
write /sys/class/android_usb/android0/enable 0
restart adbd
write /sys/class/android_usb/android0/enable 1
service servicemanager /system/bin/servicemanager
class core
user system
group system
critical
onrestart restart zygote
onrestart restart media
onrestart restart surfaceflinger
onrestart restart drm
service vold /system/bin/vold
class core
socket vold stream 0660 root mount
ioprio be 2
service netd /system/bin/netd
class main
socket netd stream 0660 root system
socket dnsproxyd stream 0660 root inet
socket mdns stream 0660 root system
service debuggerd /system/bin/debuggerd
class main
service ril-daemon /system/bin/rild
class main
socket rild stream 660 root radio
socket rild-debug stream 660 radio system
user root
group radio cache inet misc audio sdcard_rw log
service surfaceflinger /system/bin/surfaceflinger
class main
user system
group graphics
onrestart restart zygote
service zygote /system/bin/app_process -Xzygote /system/bin --zygote --start-system-server
class main
socket zygote stream 660 root system
onrestart write /sys/android_power/request_state wake
onrestart write /sys/power/state on
onrestart restart media
onrestart restart netd
service drm /system/bin/drmserver
class main
user drm
group drm system inet drmrpc sdcard_r
service media /system/bin/mediaserver
class main
user media
group audio camera inet net_bt net_bt_admin net_bw_acct drmrpc
ioprio rt 4
service bootanim /system/bin/bootanimation
class main
user graphics
group graphics
disabled
oneshot
service dbus /system/bin/dbus-daemon --system --nofork
class main
socket dbus stream 660 bluetooth bluetooth
user bluetooth
group bluetooth net_bt_admin
service bluetoothd /system/bin/bluetoothd -n
class main
socket bluetooth stream 660 bluetooth bluetooth
socket dbus_bluetooth stream 660 bluetooth bluetooth
# init.rc does not yet support applying capabilities, so run as root and
# let bluetoothd drop uid to bluetooth with the right linux capabilities
group bluetooth net_bt_admin misc
disabled
service installd /system/bin/installd
class main
socket installd stream 600 system system
service flash_recovery /system/etc/install-recovery.sh
class main
oneshot
service racoon /system/bin/racoon
class main
socket racoon stream 600 system system
# IKE uses UDP port 500. Racoon will setuid to vpn after binding the port.
group vpn net_admin inet
disabled
oneshot
service mtpd /system/bin/mtpd
class main
socket mtpd stream 600 system system
user vpn
group vpn net_admin inet net_raw
disabled
oneshot
service keystore /system/bin/keystore /data/misc/keystore
class main
user keystore
group keystore drmrpc
socket keystore stream 666
service dumpstate /system/bin/dumpstate -s
class main
socket dumpstate stream 0660 shell log
disabled
oneshot
service sshd /system/bin/start-ssh
class main
disabled
service mdnsd /system/bin/mdnsd
class main
user mdnsr
group inet net_raw
socket mdnsd stream 0660 mdnsr inet
disabled
oneshot
service whtest /system/bin/whtest.sh
disabled
oneshot
Mount system.img to modify
mkdir tmp
mount -t ext4 system.img tmp
apps are in /system/app -> add or remove apps here
boot animation is /system/media bootanimation.zip can be changed to whatever you want.
After you finish unmount system.img and flash to your tablet.
umount tmp
Any questions about modding, feel free to ask!
stevemp

[MOD-AKURO] Akuro mod to save your internal memory

EDIT: it's my fault that I didn't test this mod before releasing it to public. after rechecked my init.rc file this afternoon I found that this mod doesn't go along with tipo's current init.d implementation. common install-recovery.sh trick won't work. this mod need init.d implementation which support a2sd scripts execution at boot.
my deep apologize for giving giving you this 'half baked' product and create this 'useless thread' without proper test before release it to public. I'll ask mod to close this thread immediately. the content of 1st thread will be still here. I won't delete it in case if someone want to learn about this mod so that they could use or port it to another device. if you have any question regarding the details about this mod, you can send me a PM or send an email to [email protected].
Tipo has 750 mb /data/partition. enough to install plethora app in your system. however, some of you might thinks that 750mb won't be enough for your apps, especially if you want to install a lot of games which usually more than 20mb. there are already similar method to save our internal memory such as: link2sd, a2sd darktremor, amarullz, and my previous data2sd method. those method is quite popular and I believe you're using one of them now. some of you might also already use my data2sd method which used a script in init.d to mount sdcard ext partition to /data or use my data2sd kernel. however, both that methods have several bugs. in my data2sd kernel, script manager doesnt work. while if you use script in init.d, some 3rd party gps app like ndrive won't work. thats not a big deal if you're using gmaps, but its a lil bit frustrating for me since I hate to use gmaps app. so, I was experimenting with some other script several days ago and find a new method to overcome the bug from my previous method.
in this method, we use similar method with a2sd darktremor and amarullz but its a lot simpler. my method will mount sdcard ext partition on /system/sd then replace the partition on /data/app, /data/dalvik-cache, and /data/data with the one in /system/sd.
PRE-REQUIREMENT
1. a second ext partition on your sdcard. you can choose between ext2/3/4.
2. rooted device. needed to install the mod to your system
3. busybox with symlink installed on your device
4. system with init.d support
first of all, you need to download the file from here
v1.1: http://d-h.st/ski
HOW-TO
1. extract the file into your sdcard
2. copy the file into /system/etc/init.d/
3. create /system/sd directory.
4. reboot.
5. check the log file in /data to check the installation.
in default setting your /data/app and /data/dalvik-cache will be moved into /system/sd. you can also use /system/sd as your /data/data by copy the /data/data content to /system/sd. I highly recommend this tweak installed on a fresh installed rom to efficiently save your internal memory
TERM OF USE AND SHARING:
this thread intent is for sharing. feel free to use, edit, distribute all material inside this thread which came from me. if there any parts of this mod which comes not from me please refer to the original dev I've mentioned in this thread. if want to share it to another forum or modify it you don't have to ask my permission. no need to credits, put links or whatsoever. you'll only need to remember that you should held all the responsibility by using this mod, modify it or distribute it. DO IT WITH YOUR OWN RISK
Click to expand...
Click to collapse
old habbit of reserved stuff...
akuro mod
first, thanks for all your efforts and your willingness to make your expertise available to others. it is much appreciated.
i am attempting to run your mod on a galaxy y duos running technoduos 1.5 with bdsky kernel and stericson busybox. i have fat32 and ext3 partitions on a 32 GB sd card. it is a clean install. I do not have akuro_tweak installed but there is no reference to that in your post.
i have followed your instructions closely but no files are being transferred to either of the external partitions on the insstallation of apps. it looks like the mounting procedure is not working.
i would be grateful for your guidance.
many thanks
This tweak is specified on xperia phones. For duos youll need the one in sgy forum.
Peace be upon you and Allah's mercy and blessings
Does this tweak work on Arc S ?
I tried it , and the log had a note :"you don't have kuro tweak ! please install it to get the best result"
I do have an empty EXT4 partition and a custom kernel that supports init.d , busybox , and EXT4
can you show me the log file? it'll be easier for me if I could see it. theotically it will work on every rom with init.d support. however, there are a lot of method used to implement init.d script and this script might doesn't work as good as we expected in several devices.
This is the log file
==========================
# TWEAK AKURO-LOG FILE #
==========================
in the name of Allah,
the most beneficent,
the most mercifull
==========================
system information:
vendor : SEMC
model : LT18i
ROM : Xperia Ultimate HD™ 3.0.2
running the script...
start at:
03-10-2013 09:09:40
==========================
==========================
# additional notes #
==========================
you don't have kuro tweak!
please install it to get
the best result
==========================
By the way I have 2 files in my init.d folder one of them is yours that start by the same no.
Sent from my LT18i using xda app-developers app
the script isn't executed at boot. it's mostly related with the boot sequence defined in init.rc file. the file is only readable on unlocked bootloader. if you have unlocked bootloader can you give me that file? it's on your root. anyway, the second file is used to check whether if you have kuro tweak installed in your system. you can ignore the message if you doesn't want to use kuro tweak.
on early-init
# Set init and its forked children's oom_adj.
write /proc/1/oom_adj -16
start ueventd
# create mountpoints
mkdir /mnt 0775 root system
on init
sysclktz 0
loglevel 3
# setup the global environment
export PATH /sbin:/vendor/bin:/system/sbin:/system/bin:/system/xbin
export LD_LIBRARY_PATH /vendor/lib:/system/lib
export ANDROID_BOOTLOGO 1
export ANDROID_ROOT /system
export ANDROID_ASSETS /system/app
export ANDROID_DATA /data
export ASEC_MOUNTPOINT /mnt/asec
export LOOP_MOUNTPOINT /mnt/obb
export SD_EXT_DIRECTORY /sd-ext
export BOOTCLASSPATH /system/framework/core.jar:/system/framework/core-junit.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/apache-xml.jar:/system/framework/filterfw.jar
# Backward compatibility
symlink /system/etc /etc
symlink /sys/kernel/debug /d
# Right now vendor lives on the same filesystem as system,
# but someday that may change.
symlink /system/vendor /vendor
# Create cgroup mount point for cpu accounting
mkdir /acct
mount cgroup none /acct cpuacct
mkdir /acct/uid
mkdir /system
mkdir /data 0771 system system
mkdir /cache 0770 system cache
mkdir /config 0500 root root
# Directory for putting things only root should see.
mkdir /mnt/secure 0700 root root
# Directory for staging bindmounts
mkdir /mnt/secure/staging 0700 root root
# Directory-target for where the secure container
# imagefile directory will be bind-mounted
mkdir /mnt/secure/asec 0700 root root
# Secure container public mount points.
mkdir /mnt/asec 0700 root system
mount tmpfs tmpfs /mnt/asec mode=0755,gid=1000
# Filesystem image public mount points.
mkdir /mnt/obb 0700 root system
mount tmpfs tmpfs /mnt/obb mode=0755,gid=1000
# SD-EXT
mkdir /sd-ext 0771 system system
symlink /sd-ext /mnt/sd-ext
write /proc/sys/kernel/panic_on_oops 1
write /proc/sys/kernel/hung_task_timeout_secs 0
write /proc/cpu/alignment 4
write /proc/sys/kernel/sched_latency_ns 10000000
write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000
write /proc/sys/kernel/sched_compat_yield 1
write /proc/sys/kernel/sched_child_runs_first 0
write /proc/sys/kernel/randomize_va_space 2
# Create cgroup mount points for process groups
mkdir /dev/cpuctl
mount cgroup none /dev/cpuctl cpu
chown system system /dev/cpuctl
chown system system /dev/cpuctl/tasks
chmod 0777 /dev/cpuctl/tasks
write /dev/cpuctl/cpu.shares 1024
mkdir /dev/cpuctl/fg_boost
chown system system /dev/cpuctl/fg_boost/tasks
chmod 0777 /dev/cpuctl/fg_boost/tasks
write /dev/cpuctl/fg_boost/cpu.shares 1024
mkdir /dev/cpuctl/bg_non_interactive
chown system system /dev/cpuctl/bg_non_interactive/tasks
chmod 0777 /dev/cpuctl/bg_non_interactive/tasks
# 5.0 %
write /dev/cpuctl/bg_non_interactive/cpu.shares 52
# Allow everybody to read the xt_qtaguid resource tracking misc dev.
# This is needed by any process that uses socket tagging.
chmod 0644 /dev/xt_qtaguid
on post-fs
# once everything is setup, no need to modify /
mount rootfs rootfs / ro remount
# We chown/chmod /cache again so because mount is run as root + defaults
chown system cache /cache
chmod 0770 /cache
# This may have been created by the recovery system with odd permissions
mkdir /cache/recovery
chown system cache /cache/recovery
chmod 0770 /cache/recovery
#change permissions on vmallocinfo so we can grab it from bugreports
chown root log /proc/vmallocinfo
chmod 0440 /proc/vmallocinfo
#change permissions on kmsg & sysrq-trigger so bugreports can grab kthread stacks
chown root system /proc/kmsg
chmod 0440 /proc/kmsg
chown root system /proc/sysrq-trigger
chmod 0220 /proc/sysrq-trigger
# create the lost+found directories, so as to enforce our permissions
mkdir /cache/lost+found 0770 root root
on post-fs-data
# We chown/chmod /data again so because mount is run as root + defaults
chown system system /data
chmod 0771 /data
# Create dump dir and collect dumps.
# Do this before we mount cache so eventually we can use cache for
# storing dumps on platforms which do not have a dedicated dump partition.
mkdir /data/dontpanic 0750 root log
# Collect apanic data, free resources and re-arm trigger
copy /proc/apanic_console /data/dontpanic/apanic_console
chown root log /data/dontpanic/apanic_console
chmod 0640 /data/dontpanic/apanic_console
copy /proc/apanic_threads /data/dontpanic/apanic_threads
chown root log /data/dontpanic/apanic_threads
chmod 0640 /data/dontpanic/apanic_threads
write /proc/apanic_console 1
# create basic filesystem structure
mkdir /data/misc 01771 system misc
mkdir /data/misc/bluetoothd 0770 bluetooth bluetooth
mkdir /data/misc/bluetooth 0770 system system
mkdir /data/misc/keystore 0700 keystore keystore
mkdir /data/misc/keychain 0771 system system
mkdir /data/misc/vpn 0770 system vpn
mkdir /data/misc/systemkeys 0700 system system
# give system access to wpa_supplicant.conf for backup and restore
mkdir /data/misc/wifi 0770 wifi wifi
chmod 0660 /data/misc/wifi/wpa_supplicant.conf
mkdir /data/local 0751 root root
mkdir /data/local/tmp 0771 shell shell
mkdir /data/data 0771 system system
mkdir /data/app-private 0771 system system
mkdir /data/app 0771 system system
mkdir /data/property 0700 root root
# create dalvik-cache, so as to enforce our permissions
mkdir /data/dalvik-cache 0771 system system
# create resource-cache and double-check the perms
mkdir /data/resource-cache 0771 system system
chown system system /data/resource-cache
chmod 0771 /data/resource-cache
# create the lost+found directories, so as to enforce our permissions
mkdir /data/lost+found 0770 root root
# create directory for DRM plug-ins - give drm the read/write access to
# the following directory.
mkdir /data/drm 0770 drm drm
# If there is no fs-post-data action in the init.<device>.rc file, you
# must uncomment this line, otherwise encrypted filesystems
# won't work.
# Set indication (checked by vold) that we have finished this action
#setprop vold.post_fs_data_done 1
chown system system /sys/class/android_usb/android0/f_mass_storage/lun/file
chmod 0660 /sys/class/android_usb/android0/f_mass_storage/lun/file
chown system system /sys/class/android_usb/android0/f_rndis/ethaddr
chmod 0660 /sys/class/android_usb/android0/f_rndis/ethaddr
on boot
# basic network init
ifup lo
hostname localhost
domainname localdomain
# set RLIMIT_NICE to allow priorities from 19 to -20
setrlimit 13 40 40
# Memory management. Basic kernel parameters, and allow the high
# level system server to be able to adjust the kernel OOM driver
# paramters to match how it is managing things.
write /proc/sys/vm/overcommit_memory 1
write /proc/sys/vm/min_free_order_shift 4
chown root system /sys/module/lowmemorykiller/parameters/adj
chmod 0664 /sys/module/lowmemorykiller/parameters/adj
chown root system /sys/module/lowmemorykiller/parameters/minfree
chmod 0664 /sys/module/lowmemorykiller/parameters/minfree
# Tweak background writeout
write /proc/sys/vm/dirty_expire_centisecs 200
write /proc/sys/vm/dirty_background_ratio 5
# Permissions for System Server and daemons.
chown radio system /sys/android_power/state
chown radio system /sys/android_power/request_state
chown radio system /sys/android_power/acquire_full_wake_lock
chown radio system /sys/android_power/acquire_partial_wake_lock
chown radio system /sys/android_power/release_wake_lock
chown radio system /sys/power/state
chown radio system /sys/power/wake_lock
chown radio system /sys/power/wake_unlock
chmod 0660 /sys/power/state
chmod 0660 /sys/power/wake_lock
chmod 0660 /sys/power/wake_unlock
chown system system /sys/class/timed_output/vibrator/enable
chown system system /sys/class/leds/keyboard-backlight/brightness
chown system system /sys/class/leds/lcd-backlight/brightness
chown system system /sys/class/leds/button-backlight/brightness
chown system system /sys/class/leds/jogball-backlight/brightness
chown system system /sys/class/leds/red/brightness
chown system system /sys/class/leds/green/brightness
chown system system /sys/class/leds/blue/brightness
chown system system /sys/class/leds/red/device/grpfreq
chown system system /sys/class/leds/red/device/grppwm
chown system system /sys/class/leds/red/device/blink
chown system system /sys/class/leds/red/brightness
chown system system /sys/class/leds/green/brightness
chown system system /sys/class/leds/blue/brightness
chown system system /sys/class/leds/red/device/grpfreq
chown system system /sys/class/leds/red/device/grppwm
chown system system /sys/class/leds/red/device/blink
chown system system /sys/class/timed_output/vibrator/enable
chown system system /sys/module/sco/parameters/disable_esco
chown system system /sys/kernel/ipv4/tcp_wmem_min
chown system system /sys/kernel/ipv4/tcp_wmem_def
chown system system /sys/kernel/ipv4/tcp_wmem_max
chown system system /sys/kernel/ipv4/tcp_rmem_min
chown system system /sys/kernel/ipv4/tcp_rmem_def
chown system system /sys/kernel/ipv4/tcp_rmem_max
chown root radio /proc/cmdline
# Define TCP buffer sizes for various networks
# ReadMin, ReadInitial, ReadMax, WriteMin, WriteInitial, WriteMax,
setprop net.tcp.buffersize.default 4096,87380,110208,4096,16384,110208
setprop net.tcp.buffersize.wifi 524288,1048576,2097152,262144,524288,1048576
setprop net.tcp.buffersize.lte 524288,1048576,2097152,262144,524288,1048576
setprop net.tcp.buffersize.umts 4094,87380,110208,4096,16384,110208
setprop net.tcp.buffersize.hspa 4094,87380,262144,4096,16384,262144
setprop net.tcp.buffersize.edge 4093,26280,35040,4096,16384,35040
setprop net.tcp.buffersize.gprs 4092,8760,11680,4096,8760,11680
# Set this property so surfaceflinger is not started by system_init
setprop system_init.startsurfaceflinger 0
exec /system/bin/sysinit
class_start core
class_start main
on nonencrypted
class_start late_start
on charger
class_start charger
on property:vold.decrypt=trigger_reset_main
class_reset main
on property:vold.decrypt=trigger_load_persist_props
load_persist_props
on property:vold.decrypt=trigger_post_fs_data
trigger post-fs-data
on property:vold.decrypt=trigger_restart_min_framework
class_start main
on property:vold.decrypt=trigger_restart_framework
class_start main
class_start late_start
on property:vold.decrypt=trigger_shutdown_framework
class_reset late_start
class_reset main
# Used to disable USB when switching states
on property:sys.usb.config=none
stop adbd
write /sys/class/android_usb/android0/enable 0
write /sys/class/android_usb/android0/bDeviceClass 0
setprop sys.usb.state $sys.usb.config
# adb only USB configuration
# This should only be used during device bringup
# and as a fallback if the USB manager fails to set a standard configuration
on property:sys.usb.config=adb
write /sys/class/android_usb/android0/enable 0
write /sys/class/android_usb/android0/idVendor 18d1
write /sys/class/android_usb/android0/idProduct D002
write /sys/class/android_usb/android0/functions $sys.usb.config
write /sys/class/android_usb/android0/enable 1
start adbd
setprop sys.usb.state $sys.usb.config
# USB accessory configuration
on property:sys.usb.config=accessory
write /sys/class/android_usb/android0/enable 0
write /sys/class/android_usb/android0/idVendor 18d1
write /sys/class/android_usb/android0/idProduct 2d00
write /sys/class/android_usb/android0/functions $sys.usb.config
write /sys/class/android_usb/android0/enable 1
setprop sys.usb.state $sys.usb.config
# USB accessory configuration, with adb
on property:sys.usb.config=accessory,adb
write /sys/class/android_usb/android0/enable 0
write /sys/class/android_usb/android0/idVendor 18d1
write /sys/class/android_usb/android0/idProduct 2d01
write /sys/class/android_usb/android0/functions $sys.usb.config
write /sys/class/android_usb/android0/enable 1
start adbd
setprop sys.usb.state $sys.usb.config
# Used to set USB configuration at boot and to switch the configuration
# when changing the default configuration
on propertyersist.sys.usb.config=*
setprop sys.usb.config $persist.sys.usb.config
## Daemon processes to be run by init.
##
service ueventd /sbin/ueventd
class core
critical
service console /system/bin/sh
class core
console
disabled
user shell
group log
on property:ro.debuggable=1
start console
# adbd is controlled via property triggers in init.<platform>.usb.rc
service adbd /sbin/adbd
class core
disabled
# adbd on at boot in emulator
on property:ro.kernel.qemu=1
start adbd
# This property trigger has added to imitiate the previous behavior of "adb root".
# The adb gadget driver used to reset the USB bus when the adbd daemon exited,
# and the host side adb relied on this behavior to force it to reconnect with the
# new adbd instance after init relaunches it. So now we force the USB bus to reset
# here when adbd sets the service.adb.root property to 1. We also restart adbd here
# rather than waiting for init to notice its death and restarting it so the timing
# of USB resetting and adb restarting more closely matches the previous behavior.
on property:service.adb.root=1
write /sys/class/android_usb/android0/enable 0
restart adbd
write /sys/class/android_usb/android0/enable 1
service servicemanager /system/bin/servicemanager
class core
user system
group system
critical
onrestart restart zygote
onrestart restart media
onrestart restart surfaceflinger
onrestart restart drm
service vold /system/bin/vold
class core
socket vold stream 0660 root mount
ioprio be 2
service netd /system/bin/netd
class main
socket netd stream 0660 root system dbus_access
socket dnsproxyd stream 0660 root inet
service debuggerd /system/bin/debuggerd
class main
service ril-daemon /system/bin/rild
class main
socket rild stream 660 root radio
socket rild-debug stream 660 radio system
user root
group radio cache inet misc audio sdcard_rw log dbus_access
service surfaceflinger /system/bin/surfaceflinger
class main
user system
group graphics
onrestart restart zygote
rlimit MEMLOCK 33554432 33554432
service zygote /system/bin/app_process -Xzygote /system/bin --zygote --start-system-server
class main
socket zygote stream 660 root system
onrestart write /proc/sysrq-trigger c
service drm /system/bin/drmserver
class main
user drm
group system inet drmrpc
service bootanim /system/bin/bootanimation
class main
user graphics
group graphics
disabled
oneshot
service dbus /system/bin/dbus-daemon --system --nofork
class main
socket dbus stream 660 bluetooth bluetooth
socket dbus_ste stream 660 bluetooth dbus_access
user bluetooth
group bluetooth net_bt_admin dbus_access
service bluetoothd /system/bin/bluetoothd -n
class main
socket bluetooth stream 660 bluetooth bluetooth
socket dbus_bluetooth stream 660 bluetooth bluetooth
# init.rc does not yet support applying capabilities, so run as root and
# let bluetoothd drop uid to bluetooth with the right linux capabilities
group bluetooth net_bt_admin misc
disabled
service installd /system/bin/installd
class main
socket installd stream 600 system system
service flash_recovery /system/etc/install-recovery.sh
class main
oneshot
service racoon /system/bin/racoon
class main
socket racoon stream 600 system system
# IKE uses UDP port 500. Racoon will setuid to vpn after binding the port.
group vpn net_admin inet
disabled
oneshot
service mtpd /system/bin/mtpd
class main
socket mtpd stream 600 system system
user vpn
group vpn net_admin inet net_raw
disabled
oneshot
service keystore /system/bin/keystore /data/misc/keystore
class main
user keystore
group keystore
socket keystore stream 666
service dumpstate /system/bin/dumpstate -s
class main
socket dumpstate stream 0660 shell log
disabled
oneshot
service veng /sbin/veng.sh
class main
user root
group root
oneshot
Sent from my LT18i using xda app-developers app
these step are quite risky. I hope you have a backup of your system and know how to revive your device in case if it soft bricked. first of all, create sd folder under /system. in your /system/bin/ you can find a file 'sysinit'. please try to open it with root explorer (or something equivalent with it). if it can be opened and all the fonts are showed correctly, add 'busybox run-parts /system/etc/init.d/'. if the file didn't exist you can safely create a file, named it sysinit, and put these code
Code:
#!/system/bin/sh
busybox run-parts /system/etc/init.d/
give that file 777 (rwxrwxrwx) permission then reboot. please make sure that you didn't have install-recovery.sh in /system/etc/ or if you have it, make sure that it doesn't have a line similar with 'run-parts /system/etc/init.d/'. to check whether if the this mod working you can open the log file or check the size. you can also check in /system/sd and check inside it. it should contain app, dalvik-cache folder. check your /data partition usage then install a file. if this mod working the /data partition usage should not increased.
I do have that file and it has the next lines
#!/system/bin/sh
export PATH=/sbin:/system/sbin:/system/bin:/system/xbin
/system/bin/logwrapper /sbin/busybox run-parts /system/etc/init.d
And about the other file I didn't find it
Thanks a lot
Sent from my LT18i using xda app-developers app
it's a lil bit ironic but I recheck my init.rc this afternoon and found that tipo's init.d implementation doesn't work with this mod. I've checked your init.rc and after you modify your files as i've told you before, it should be working fine. anyway, in your sysnit file.
Code:
#!/system/bin/sh
export PATH=/sbin:/system/sbin:/system/bin:/system/xbin
/system/bin/logwrapper /sbin/busybox run-parts /system/etc/init.d
please check your busybox installation. it usually installed on /system/bin or /system/xbin, not in /sbin. in case if it installed on /system/bin or /system/xbin you need to change your sysinit content into
Code:
#!/system/bin/sh
export PATH=/sbin:/system/sbin:/system/bin:/system/xbin
/system/bin/logwrapper /system/xbin/busybox run-parts /system/etc/init.d
since it doesn't work on tipo I'll ask mod to close this thread. it's my fault that I didn't fully check my init.rc on first place. if you have anything to discuss you can contact me via PM or send me email at [email protected]. good luck, bro.
Thread Closed as requested by OP.

[Q] Help me unpack/re-pack my boot.img (Please =) )

Hi,
I'd like to un-pack my boot.img, but I've never done something like this before. Wishing to fix my Android device from 2010, a Creative ZEN Touch 2. It was my first Android device, and I'd like to fix it for knowledge and challenge, even thought it's old.
You can skip the part in blue to jump straight to the problem, but you would skip information about the actual device.
The device does not have any custom ROM developped for it, and no custom recoveries either - nothing exists. You would have to compile these yourself, something that I would wish to try eventually (Too hard). No flashing tools for this device exists either (Odin, or anything). So actually, if something goes wrong and you soft-brick/bootloop, you're screwed (Actually it does bootloop sometimes, randomly. But it's still booting sometimes). There is Android Recovery 3e, but it's useless. You could wipe /Data or /Cache, but you can't flash anything, unless it's signed (Tried to sign my update.zip with AndroidKitchen. Seems like it did worked, but Android Recovery 3e still reject it somehow).
So I would love to install Clockworkmod on it, so that way I would have a effective recovery method if something goes wrong. But before attempting to compile CWM (Look hard...), I thought I could get ADB to work. Since the manufacturer, Creative, does not encourage self-repair, it seems like they intentionally blocked ADB from default.prop (OMG... >__< ). I'd like to re-enable it first so I could get an extra repair tool (And typing all the commands on the terminal emulator on the small screen, horrible).
Yes, the device is rooted, since 2010, using Z4Root for Froyo.
GameX2 said:
USB debugging is definitely enabled, and the device driver is also installed (Not even sure if I had to install a driver for this 2011 device in first place. Device is detected by computer without a problem).
If I type:
Code:
adb devices
The output is just: "List of devices attached" with a blank line.
If I try:
Code:
adb shell
This show up:
Code:
error: device not found
I can tell that ADB is working with 2 more devices.
Click to expand...
Click to collapse
Here is the content of default.prop:
Code:
#
# ADDITIONAL_DEFAULT_PROPERTIES
#
ro.secure=1
ro.allow.mock.location=0
ro.debuggable=0
persist.service.adb.enable=0
I was told that to fix ADB, I should edit default.prop like this, but to properly edit it, I should unpack and repack boot.img:
Code:
ro.secure=1
ro.allow.mock.location=0
ro.debuggable=1
persist.sys.usb.config=mass_storage,adb
persist.service.adb.enable=1
Here's also the content of my init.rc file:
Code:
on init
sysclktz 0
loglevel 3
# setup the global environment
export PATH /sbin:/system/sbin:/system/bin:/system/xbin
export LD_LIBRARY_PATH /system/lib
export ANDROID_BOOTLOGO 1
export ANDROID_ROOT /system
export ANDROID_ASSETS /system/app
export ANDROID_DATA /data
export EXTERNAL_STORAGE /mnt/sdcard
export EXTERNAL_STORAGE_SD /mnt/sdcard
export EXTERNAL_STORAGE_UDISK /mnt/udisk
export EXTERNAL_STORAGE_EXTSD /mnt/extsd
export ASEC_MOUNTPOINT /mnt/asec
export SHM_MOUNTPOINT /mnt/shm
export BOOTCLASSPATH /system/framework/core.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/android.policy.jar:/system/framework/services.jar
export BACKLIGHT_PATH /sys/class/backlight/tps60250/brightness
export MAX_BACKLIGHT_PATH /sys/class/backlight/tps60250/max_brightness
export VPU_FW_PATH /system/lib/firmware/vpu
export CODEC_SHM_PATH /mnt/shm
export GST_PLUGIN_PATH /system/lib/gst_plugins
export CORE_REGISTER_FILE /system/etc/core_register
export COMPONENT_REGISTER_FILE /system/etc/component_register
export CONTENTPIPE_REGISTER_FILE /system/etc/contentpipe_register
export BUILD_TARGET earlgrey
export LOG_LEVEL 0
# Backward compatibility
symlink /system/etc /etc
symlink /sys/kernel/debug /d
# create mountpoints
# mkdir /mnt 0775 root system
# mkdir /mnt/sdcard 0000 system system
# mkdir /mnt/udisk 0000 system system
# mkdir /mnt/extsd 0000 system system
# Create cgroup mount point for cpu accounting
mkdir /acct
mount cgroup none /acct cpuacct
mkdir /acct/uid
# Backwards Compat - XXX: Going away in G*
symlink /mnt/sdcard /sdcard
symlink /mnt/extsd /extsd
symlink /mnt/udisk /udisk
# mkdir /system
# mkdir /data 0771 system system
mkdir /cache 0770 system cache
mkdir /config 0500 root root
# Directory for putting things only root should see.
mkdir /mnt/secure 0700 root root
# Directory for staging bindmounts
mkdir /mnt/secure/staging 0700 root root
# Directory-target for where the secure container
# imagefile directory will be bind-mounted
mkdir /mnt/secure/asec 0700 root root
# Secure container public mount points.
mkdir /mnt/asec 0700 root system
mount tmpfs tmpfs /mnt/asec mode=0755,gid=1000
# shared memory used by middleware
mkdir /mnt/shm 0777 system graphics
mount tmpfs tmpfs /mnt/shm mode=0777,uid=1000,gid=1003,size=1m
#mount rootfs rootfs / ro remount
#mkdir /factory 0751 system system
mount tmpfs tmpfs /factory size=131072
write /proc/sys/kernel/panic_on_oops 1
write /proc/sys/kernel/hung_task_timeout_secs 0
write /proc/cpu/alignment 4
write /proc/sys/kernel/sched_latency_ns 10000000
write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000
write /proc/sys/kernel/sched_compat_yield 1
write /proc/sys/kernel/sched_child_runs_first 0
# Create cgroup mount points for process groups
mkdir /dev/cpuctl
mount cgroup none /dev/cpuctl cpu
chown system system /dev/cpuctl
chown system system /dev/cpuctl/tasks
chmod 0777 /dev/cpuctl/tasks
write /dev/cpuctl/cpu.shares 1024
mkdir /dev/cpuctl/fg_boost
chown system system /dev/cpuctl/fg_boost/tasks
chmod 0777 /dev/cpuctl/fg_boost/tasks
write /dev/cpuctl/fg_boost/cpu.shares 1024
mkdir /dev/cpuctl/bg_non_interactive
chown system system /dev/cpuctl/bg_non_interactive/tasks
chmod 0777 /dev/cpuctl/bg_non_interactive/tasks
# 5.0 %
write /dev/cpuctl/bg_non_interactive/cpu.shares 52
# Set permission for FSL device node
chmod 0777 /dev/mxc_vpu
# allow access to uart port for gps module
chmod 0777 /dev/ttymxc0
chmod 0777 /dev/ttymxc1
chmod 0777 /dev/ttymxc2
# for lcd driver work mode control
chown system system /dev/ili9481
chmod 0771 /dev/ili9481
# mount ext4 partitions
# Mount /system rw first to give the filesystem a chance to save a checkpoint
mount ext4 /dev/block/mmcblk0p2 /system
mount ext4 /dev/block/mmcblk0p2 /system rw remount
chmod 0555 /system/etc/install-recovery.sh
mount ext4 /dev/block/mmcblk0p5 /data nosuid nodev
chown system system /data
chmod 0771 /data
exec /system/etc/init.first_time.sh
mount ext4 /dev/block/mmcblk0p2 /system ro remount
# We chown/chmod /data again so because mount is run as root + defaults
mount ext4 /dev/block/mmcblk0p5 /data nosuid nodev
chown system system /data
chmod 0771 /data
# Create dump dir and collect dumps.
# Do this before we mount cache so eventually we can use cache for
# storing dumps on platforms which do not have a dedicated dump partition.
mkdir /data/dontpanic
chown root log /data/dontpanic
chmod 0750 /data/dontpanic
mkdir /data/synergy
chown root log /data/synergy
chmod 0777 /data/synergy
# Collect apanic data, free resources and re-arm trigger
copy /proc/apanic_console /data/dontpanic/apanic_console
chown root log /data/dontpanic/apanic_console
chmod 0640 /data/dontpanic/apanic_console
copy /proc/apanic_threads /data/dontpanic/apanic_threads
chown root log /data/dontpanic/apanic_threads
chmod 0640 /data/dontpanic/apanic_threads
write /proc/apanic_console 1
# Same reason as /data above
mount ext4 /dev/block/mmcblk0p6 /cache nosuid nodev
chown system cache /cache
chmod 0770 /cache
# This may have been created by the recovery system with odd permissions
chown system cache /cache/recovery
chmod 0770 /cache/recovery
#change permissions on vmallocinfo so we can grab it from bugreports
chown root log /proc/vmallocinfo
chmod 0440 /proc/vmallocinfo
#change permissions on kmsg & sysrq-trigger so bugreports can grab kthread stacks
chown root system /proc/kmsg
chmod 0400 /proc/kmsg
chown root system /proc/sysrq-trigger
chmod 0220 /proc/sysrq-trigger
# create basic filesystem structure
mkdir /data/misc 01771 system misc
mkdir /data/misc/bluetoothd 0770 bluetooth bluetooth
mkdir /data/misc/bluetooth 0770 system system
mkdir /data/misc/keystore 0700 keystore keystore
mkdir /data/misc/vpn 0770 system system
mkdir /data/misc/systemkeys 0700 system system
mkdir /data/misc/vpn/profiles 0770 system system
# give system access to wpa_supplicant.conf for backup and restore
mkdir /data/misc/wifi 0770 wifi wifi
chmod 0770 /data/misc/wifi
chmod 0660 /data/misc/wifi/wpa_supplicant.conf
mkdir /data/local 0771 shell shell
mkdir /data/local/tmp 0771 shell shell
mkdir /data/data 0771 system system
mkdir /data/app-private 0771 system system
mkdir /data/app 0771 system system
mkdir /data/property 0700 root root
mkdir /data/version 0770 root root
# create dalvik-cache and double-check the perms
mkdir /data/dalvik-cache 0771 system system
chown system system /data/dalvik-cache
chmod 0771 /data/dalvik-cache
# create the lost+found directories, so as to enforce our permissions
mkdir /data/lost+found 0770
mkdir /cache/lost+found 0770
# double check the perms, in case lost+found already exists, and set owner
chown root root /data/lost+found
chmod 0770 /data/lost+found
chown root root /cache/lost+found
chmod 0770 /cache/lost+found
# change permission for keymap file temporarily
# should be removed when working out keymap later
chmod 0777 /system/usr/keychars/qwerty.kcm.bin
chmod 0777 /system/usr/keychars/Dell_Dell_USB_Keyboard.kcm.bin
chmod 0777 /system/usr/keychars/mxckpd.kcm.bin
chmod 0777 /system/usr/keychars/gpio-keys.kcm.bin
chmod 0777 /system/usr/keychars/mxc_ts-keypad.kcm.bin
chmod 0777 /system/usr/keychars/mxc_power_key.kcm.bin
chmod 0777 /system/usr/keychars/AVRCP.kcm.bin
chmod 0777 /sys/class/graphics/fb0/fsl_disp_property
chmod 0777 /sys/class/graphics/fb1/fsl_disp_property
on boot
# basic network init
ifup lo
hostname localhost
domainname localdomain
mkdir /data/system 0775 system system
#exec /sbin/ts_calibrator
exec system/xbin/flash.dump.sh
# set RLIMIT_NICE to allow priorities from 19 to -20
setrlimit 13 40 40
# Define the oom_adj values for the classes of processes that can be
# killed by the kernel. These are used in ActivityManagerService.
setprop ro.FOREGROUND_APP_ADJ 0
setprop ro.VISIBLE_APP_ADJ 1
setprop ro.SECONDARY_SERVER_ADJ 2
setprop ro.BACKUP_APP_ADJ 2
setprop ro.HOME_APP_ADJ 4
setprop ro.HIDDEN_APP_MIN_ADJ 7
setprop ro.CONTENT_PROVIDER_ADJ 14
setprop ro.EMPTY_APP_ADJ 15
# Define the memory thresholds at which the above process classes will
# be killed. These numbers are in pages (4k).
setprop ro.FOREGROUND_APP_MEM 1536
setprop ro.VISIBLE_APP_MEM 2048
setprop ro.SECONDARY_SERVER_MEM 4096
setprop ro.BACKUP_APP_MEM 4096
setprop ro.HOME_APP_MEM 4096
setprop ro.HIDDEN_APP_MEM 5120
setprop ro.CONTENT_PROVIDER_MEM 5632
setprop ro.EMPTY_APP_MEM 6144
# Write value must be consistent with the above properties.
# Note that the driver only supports 6 slots, so we have HOME_APP at the
# same memory level as services.
write /sys/module/lowmemorykiller/parameters/adj 0,1,2,7,14,15
write /proc/sys/vm/lowmem_reserve_ratio 1
write /proc/sys/vm/overcommit_memory 1
write /proc/sys/vm/min_free_order_shift 4
write /sys/module/lowmemorykiller/parameters/minfree 1536,2048,4096,5120,5632,6144
# Set init its forked children's oom_adj.
write /proc/1/oom_adj -16
# Tweak background writeout
write /proc/sys/vm/dirty_expire_centisecs 200
write /proc/sys/vm/dirty_background_ratio 5
# Permissions for System Server and daemons.
chown radio system /sys/android_power/state
chown radio system /sys/android_power/request_state
chown radio system /sys/android_power/acquire_full_wake_lock
chown radio system /sys/android_power/acquire_partial_wake_lock
chown radio system /sys/android_power/release_wake_lock
chown radio system /sys/power/state
chown radio system /sys/power/wake_lock
chown radio system /sys/power/wake_unlock
chmod 0660 /sys/power/state
chmod 0660 /sys/power/wake_lock
chmod 0660 /sys/power/wake_unlock
#chown system system /sys/class/timed_output/vibrator/enable
chown system system /sys/class/leds/keyboard-backlight/brightness
chown system system /sys/class/leds/lcd-backlight/brightness
chown system system /sys/class/leds/button-backlight/brightness
chown system system /sys/class/leds/jogball-backlight/brightness
chown system system /sys/class/leds/red/brightness
chown system system /sys/class/leds/green/brightness
chown system system /sys/class/leds/blue/brightness
chown system system /sys/class/leds/red/device/grpfreq
chown system system /sys/class/leds/red/device/grppwm
chown system system /sys/class/leds/red/device/blink
chown system system /sys/class/leds/red/brightness
chown system system /sys/class/leds/green/brightness
chown system system /sys/class/leds/blue/brightness
chown system system /sys/class/leds/red/device/grpfreq
chown system system /sys/class/leds/red/device/grppwm
chown system system /sys/class/leds/red/device/blink
#chown system system /sys/class/timed_output/vibrator/enable
chown system system /sys/class/haptic/oneshot
chown system system /sys/module/sco/parameters/disable_esco
chown system system /sys/kernel/ipv4/tcp_wmem_min
chown system system /sys/kernel/ipv4/tcp_wmem_def
chown system system /sys/kernel/ipv4/tcp_wmem_max
chown system system /sys/kernel/ipv4/tcp_rmem_min
chown system system /sys/kernel/ipv4/tcp_rmem_def
chown system system /sys/kernel/ipv4/tcp_rmem_max
chown root radio /proc/cmdline
# Chmod/chown FSL specific sys entry
chown radio system /sys/devices/platform/mxc_dvfs_core.0/enable
chown radio system /sys/devices/platform/busfreq.0/enable
chown system system /sys/class/backlight/tps60250/brightness
chmod 0660 /sys/devices/platform/mxc_dvfs_core.0/enable
chmod 0660 /sys/devices/platform/busfreq.0/enable
chmod 0660 /sys/class/backlight/tps60250/brightness
write /sys/devices/platform/busfreq.0/enable 1
write /sys/devices/platform/mxc_dvfs_core.0/enable 1
# allow control power for ecompass and gsensor
chown system system /sys/class/i2c-adapter/i2c-0/0-001c/akm8973_ctl
chmod 0777 /sys/class/i2c-adapter/i2c-0/0-001c/akm8973_ctl
#chown system system /sys/class/i2c-adapter/i2c-0/0-001d/power_ctl
#chmod 0777 /sys/class/i2c-adapter/i2c-0/0-001d/power_ctl
# for GPS gpio driver for gps power and bootmode control
chown system system /dev/gps_gpio
chown system system /sys/devices/virtual/gps/gps_gpio/gps_power
chown system system /sys/devices/virtual/gps/gps_gpio/gps_bootmode
chmod 0771 /dev/gps_gpio
chmod 0660 /sys/devices/virtual/gps/gps_gpio/gps_power
chmod 0771 /sys/devices/virtual/gps/gps_gpio/gps_bootmode
# for Sensor HAL
chown system system /dev/accel
chown system system /dev/akm8973_dev
chown system system /dev/akm8973_aot
chmod 0777 /dev/accel
chmod 0777 /dev/akm8973_dev
chmod 0777 /dev/akm8973_aot
# Define TCP buffer sizes for various networks
# ReadMin, ReadInitial, ReadMax, WriteMin, WriteInitial, WriteMax,
setprop net.tcp.buffersize.default 4096,87380,110208,4096,16384,110208
setprop net.tcp.buffersize.wifi 4095,87380,110208,4096,16384,110208
setprop net.tcp.buffersize.umts 4094,87380,110208,4096,16384,110208
setprop net.tcp.buffersize.edge 4093,26280,35040,4096,16384,35040
setprop net.tcp.buffersize.gprs 4092,8760,11680,4096,8760,11680
# Set property for FSL specific feature
# Init second display connection state
setprop rw.SECOND_DISPLAY_CONNECTED 0
# Define gst player property
setprop media.gstreamer.enable-player 0
# Comment the usage of stageflight media framework
setprop media.stagefright.enable-scan 0
setprop media.stagefright.enable-player 0
setprop media.stagefright.enable-record 0
setprop media.stagefright.enable-http 0
setprop media.stagefright.enable-meta 0
# Define fsl avi/aac/asf/mkv/flv/flac format support
setprop ro.FSL_AVI_PARSER 1
setprop ro.FSL_AAC_PARSER 1
setprop ro.FSL_ASF_PARSER 1
setprop ro.FSL_FLV_PARSER 1
setprop ro.FSL_MKV_PARSER 1
setprop ro.FSL_FLAC_PARSER 1
# Define fsl display init mode
setprop ro.FSL_LANDSCAPE_MODE 1
# Define fsl xec mode
setprop xec.dls.enabled 1
setprop xec.aa.enabled 1
setprop xec.dls.rate 0
setprop xec.aa.rate 100
# Define fsl dvfs property
setprop ro.dvfs.enabled 1
# Define UI to TVOUT,change this setting to 1 and uncomment below write commands
setprop ro.UI_TVOUT_DISPLAY 0
#write /sys/class/graphics/fb0/blank 1
#write /sys/class/graphics/fb1/blank 1
#write /sys/class/graphics/fb2/blank 1
#write /sys/class/graphics/fb0/fsl_disp_property 1-layer-fb
#write /sys/class/graphics/fb1/mode U:720x480i-60\n
#write /sys/class/graphics/fb1/blank 0
chown system system /sys/class/graphics/fb1/blank
chmod 0644 /sys/class/graphics/fb1/blank
chown system system /sys/class/graphics/fb1/mode
chmod 0644 /sys/class/graphics/fb1/mode
#chown system system /sys/devices/platform/mxc_sdc_fb.0/graphics/fb0/blank
#chmod 0644 /sys/devices/platform/mxc_sdc_fb.0/graphics/fb0/blank
# Define default notification_sound
setprop ro.config.notification_sound OnTheHunt.ogg
# for switch on/off framebuffer
chown system system /sys/devices/platform/mxc_sdc_fb.0/graphics/fb0/blank
chown system system /sys/devices/platform/mxc_sdc_fb.1/graphics/fb1/blank
chown system system /sys/devices/platform/mxc_sdc_fb.2/graphics/fb2/blank
chmod 0644 /sys/devices/platform/mxc_sdc_fb.0/graphics/fb0/blank
chmod 0644 /sys/devices/platform/mxc_sdc_fb.1/graphics/fb1/blank
chmod 0644 /sys/devices/platform/mxc_sdc_fb.2/graphics/fb2/blank
# ALSA mixer naming define
setprop alsa.mixer.playback.master Playback
setprop alsa.mixer.capture.master Capture
setprop alsa.mixer.playback.speaker Playback
setprop alsa.mixer.playback.headset Headphone
setprop alsa.mixer.capture.headset Capture
# Prepare for wifi
setprop wifi.interface wlan0
mkdir /data/misc/wifi/sockets 0770 wifi wifi
mkdir /data/misc/dhcp 0770 dhcp dhcp
chown dhcp dhcp /data/misc/dhcp
# DD partitions for diversity and ECD key region for access
chmod 0751 /factory
chown system system /factory
chmod 0777 /dev/block/mmcblk0
chmod 6777 /system/bin/dd
chown system system /system/bin/toolbox
exec /system/xbin/init.diversity.ecd.sh
# mount calibration data region
chown system system /dev/block/mmcblk0
chmod 0777 /dev/block/mmcblk0
chmod 0777 /sys/module/pd_ts13892/parameters/calibration
exec /system/xbin/init.calibration.sh
exec /system/bin/ts13892_calibrator
chmod 751 /system/xbin/flash_sync
# Prepare for bluetooth
# chown bluetooth bluetooth /sys/class/rfkill/rfkill0/type
# chmod 666 /sys/class/rfkill/rfkill0/state
# chown bluetooth bluetooth /sys/class/rfkill/rfkill0/state
# write /sys/class/rfkill/rfkill0/state 0
# Enable USB host1'remote wakeup event wakeup android system
# write /sys/bus/platform/drivers/fsl-ehci/fsl-ehci.1/power/wakeup enabled
# Prepare for RIL
setprop gsm.ril.delay 15
#change file permission for synergy
chown root shell /system/etc/synergy_fts.sh
chmod 0550 /system/etc/synergy_fts.sh
class_start default
## Daemon processes to be run by init.
##
service console /system/bin/sh
console
# adbd is controlled by the persist.service.adb.enable system property
service adbd /sbin/adbd
user root
group root
disabled
# adbd on at boot in emulator
#on property:ro.kernel.qemu=1
# start adbd
on property:persist.service.adb.enable=1
start adbd
on property:persist.service.adb.enable=0
stop adbd
service servicemanager /system/bin/servicemanager
user system
critical
onrestart restart zygote
onrestart restart media
service vold /system/bin/vold
socket vold stream 0660 root mount
ioprio be 2
service netd /system/bin/netd
socket netd stream 0660 root system
service dispd /system/bin/dispd
socket dispd stream 0660 root system
service debuggerd /system/bin/debuggerd
service ril-daemon /system/bin/rild -l /system/lib/libreference-ril.so -- -d /dev/ttyUSB3 -u /dev/ttyUSB0
socket rild stream 660 root radio
socket rild-debug stream 660 radio system
user root
group radio cache inet misc audio
service zygote /system/bin/app_process -Xzygote /system/bin --zygote --start-system-server
socket zygote stream 666
onrestart write /sys/android_power/request_state wake
onrestart write /sys/power/state on
onrestart restart media
service media /system/bin/mediaserver
user media
group system audio camera graphics inet net_bt net_bt_admin net_raw
ioprio rt 4
service bootanim /system/bin/bootanimation
user graphics
group graphics
disabled
oneshot
service dbus /system/bin/dbus-daemon --system --nofork
socket dbus stream 666 bluetooth bluetooth
user bluetooth
group bluetooth net_bt_admin
service bluetoothd /system/bin/bluetoothd -n
socket bluetooth stream 660 bluetooth bluetooth
socket dbus_bluetooth stream 660 bluetooth bluetooth
# init.rc does not yet support applying capabilities, so run as root and
# let bluetoothd drop uid to bluetooth with the right linux capabilities
group bluetooth net_bt_admin misc
disabled
service hcid /system/bin/hcid -s -n -f /etc/bluez/hcid.conf
socket bluetooth stream 660 bluetooth bluetooth
socket dbus_bluetooth stream 660 bluetooth bluetooth
# init.rc does not yet support applying capabilities, so run as root and
# let hcid drop uid to bluetooth with the right linux capabilities
group bluetooth net_bt_admin misc
disabled
service hciattach /system/bin/logwrapper /system/bin/sh /system/etc/mxc_bt.sh
user bluetooth
group bluetooth net_bt_admin
disabled
oneshot
service hfag /system/bin/sdptool add --channel=10 HFAG
user bluetooth
group bluetooth net_bt_admin
disabled
oneshot
service hsag /system/bin/sdptool add --channel=11 HSAG
user bluetooth
group bluetooth net_bt_admin
disabled
oneshot
service opush /system/bin/sdptool add --channel=12 OPUSH
user bluetooth
group bluetooth net_bt_admin
disabled
oneshot
service pbap /system/bin/sdptool add --channel=19 PBAP
user bluetooth
group bluetooth net_bt_admin
disabled
oneshot
service synergy_fts_init /system/etc/synergy_fts.sh
user root
group sdcard_rw
oneshot
service synergysdpops /system/etc/synergy_sdptool.sh 12 0x1105 ReservedOPPS
user root
disabled
oneshot
#service hidloopback /system/etc/insert-hiddrv.sh
# user root
# oneshot
service installd /system/bin/installd
socket installd stream 600 system system
service flash_recovery /system/etc/install-recovery.sh
oneshot
service racoon /system/bin/racoon
socket racoon stream 600 system system
# racoon will setuid to vpn after getting necessary resources.
group net_admin
disabled
oneshot
service mtpd /system/bin/mtpd
socket mtpd stream 600 system system
user vpn
group vpn net_admin net_raw
disabled
oneshot
service keystore /system/bin/keystore /data/misc/keystore
user keystore
group keystore
socket keystore stream 666
service dumpstate /system/bin/dumpstate -s
socket dumpstate stream 0660 shell log
disabled
oneshot
#service dhcpcd /system/bin/logwrapper /system/bin/dhcpcd -d -B wlan0
service dhcpcd /system/bin/dhcpcd -d -B wlan0
disabled
oneshot
service wpa_supplicant /system/bin/logwrapper /system/bin/wpa_supplicant \
-Dwext -iwlan0 -c/data/misc/wifi/wpa_supplicant.conf
user root
group wifi inet
socket wpa_wlan0 dgram 660 wifi wifi
oneshot
#service pppd_gprs /etc/init.gprs-pppd
#user root
#group radio cache inet misc
#disabled
#oneshot
service akmd2 /system/bin/akmd2
user system
group system
oneshot
# save diversity.bin from memory to emmc
service div_restore_m /system/bin/dd if=/factory/diversity.bin of=/dev/block/mmcblk0 obs=512 seek=14337 count=1
user root
group system
disabled
oneshot
# restore diversity.bin from diversity data
service div_restore_w /system/bin/dd if=/factory/diversity.master of=/dev/block/mmcblk0 obs=512 seek=14336 count=1
user root
group system
disabled
oneshot
# flash sync
service flash_sync /system/xbin/flash_sync
user root
group system
service synergy_exe /system/xbin/synergy_exe
user root
service a2dp_adapter /system/bin/csr_liba2dp_process
user root
group system audio camera graphics inet net_bt net_bt_admin
service flash_wifi /system/xbin/flash_wifi
disabled
oneshot
service wlan0_check /system/xbin/wlan0_check
disabled
oneshot
I've dumped several partitions, including /boot with romdump and dd:
Code:
dd if=/dev/bootimg of=/mnt/sdcard/boot.img bs=<your boot size> count=1
But I've never figured out the boot size correcly. Is this dangerous if I didn't entered the boot size, because I didn't knew was it is? As far as I know, my re-packed boot.img should be the same size, because I only have to edit default.prop, correct?
Then I've listed the partitions:
Code:
$cat /proc/mtd
dev: size erasesize name
$cat /proc/partitions
major minor #blocks name
179 0 7815168 mmcblk0
179 1 4309200 mmcblk0p1
179 2 154035 mmcblk0p2
179 3 1 mmcblk0p3
179 4 10395 mmcblk0p4
179 5 3145873 mmcblk0p5
179 6 41076 mmcblk0p6
$
Using the app "DiskInfo", I believe I've found which partition was /Boot. Here's what I see:
SD Card:
Mount points: /mnt/sdcard, /mnt/secure/asec (This is an INTERNAL SD card)
Partition name: mmcblk0p1
Total Space: 4.1GB
System:
Mount point: /system (ext4)
Partition Name: mmcblk0p2
Total Space: 128MB
???
Not mounted;
Partition name: mmcblk0p3
Total space: 1KB (What the hell? What is that partition??)
??? (Sound like Boot. But it does actually contain the JPEG files from Android Recovery 3e, so it does look like the /Recovery partition instead. While it DOES contain the default.prop file I'm looking for. But if this is /Recovery, where is /Boot ??? Just, not there, or the boot files are in the recovery partition as well?)
Not mounted;
Partition name: mmcblk0p4
Total space: 10,2MB
Data:
Mount point: /data (ext4)
Partition name: mmcblk0p5
Total space: 3GB (2,6GB free)
Cache:
Mount point: /cache (ext4)
Partition name: mmcblk0p6
Total space: 38,7MB (32,3 MB free)
TMPFS MOUNT POINTS:
/dev: Total space: 91,6MB, 12KB used
/mnt/asec: Total space: 91,6MB, 0KB used
/mnt/shm: Total space: 1MB, used: 20KB
/factory: Total space: 128KB, used: 64KB
/mnt/sdcard/.android_secure: Unknow size
***
POST TOO LONG - Next part in the next post
I've attached Boot (Or Recovery) .img to this post. Zipped the IMG in a ZIP file.
Part 2:
So I've dumped mmcblk0p4 using dd (Obviously, this device use non-standard NAND partitioning, huh). Note, I did not specified the boot size. I don't know if it's really important in that case, because I will only change a few lines from default.prop:
Code:
dd if=/dev/block/mmcblk0p4 /sdcard/boot.img
Worked.
But now, how do I unpack/repack this?
First, I've tried using this tool (Boot/Recovery Repack utils for Windows): http://forum.xda-developers.com/showthread.php?t=2036528
But dragging the boot.img file on MTK_unpack.bat returned:
Code:
[total hits/matching patterns/non-matching patterns]
warn : empty file: bin\off2.txt - skipping
0 files checked, 0 changed.
1 warnings occurred.
- size of "D:\DATA\ZEN Touch 2 [13-02-14]\BootRecoveryRepack\boot.img" 10644480 byte
- kernel offset -
- ram_header offset -
- ram_disk offset -
- extracting kernel_header...
- extracting kernel...
- extracting ram_header...
- extracting ram_disk...
error: end offset is lower than start offset
1 errors occurred.
- unpack ram_disk.gz...
- unpack ram_disk.cpio...
File not found
Unknown/Unrecognized command
Press any key to continue..
I then tried to drag boot.img on STD_unpack.bat instead:
Code:
[total hits/matching patterns/non-matching patterns]
warn : empty file: bin\off2.txt - skipping
0 files checked, 0 changed.
1 warnings occurred.
- pagesize - 4
ECHO command disabled
- size of image - 10644480 byte
- ram_disk offset - 4
- split kernel...
- extract ram_disk.gz...
10644476 bytes copied.
- unpack ram_disk.gz...
- unpack ram_disk.cpio...
File not found.
- copy source boot.img to unpacked folder (to keep source image)...
- done.
Press any key to continue...
Almost nothing was actually extracted. Boot.img remained compressed as IMG file.
And then I tried again, using AndroidKitchen this time, using the option to unpack Boot.img:
Code:
Creating folder /home/Carl/kitchen/bootimg_051515_193037 ...
---> Place boot.img/recovery.img into the folder mentioned above <--
Press Enter to continue
Code:
Android 'magic' header not found at start of boot.img
Checking if it exists elsewhere ...
[B][COLOR="Red"]Warning: Android header not found in boot.img (unsupported format)[/COLOR][/B]
Error: kernel offset (page size) is 0
Press Enter to continue
Now, what do I attempt next?
I don't have the skills to do all that on my own at this point. :/
Considering also that if we do a critical mistake, there is no possibility to recover from a soft-brick without Clockworkmod installed. I would first like to have at least ADB working.
Thank you very much!
EDIT: Is the bootloader locked? I honnestly have no idea, I've read that to check, you have to boot in Fastboot mode, and it's impossible to boot into Fastboot (Maybe it is on the phone somewhere, but I don't know. Just what I know for sure, is that the only key-combo access Recovery mode. Besides, the device have so few partititons, doubt Fastboot is there).
Considering the device is from 2010, do locked-bootloaders were THAT common, back then (I would say no, but just a guess) ?
Can someone help me with that, or point me to the right direction please?
Using AndroidKitchen, I sucessfully unpacked the Boot.img of my LG P500 phone, while I'm having a harder time unpacking the Boot.img of my Samsung Galaxy S4 for testing. Did worked for my LG P500, but I can't do it for this device, ZEN Touch 2, absolutely not on my own right now. Is this even possible, since the NAND partitioning is not standard? There has to be a way, huh?
Thank you very much - I can't seem to do that all on my own :/
I appreciate

(Solved) How to remove Android.Downloader.4930 and Android/Syringe.AD System Application on Evercoss Genpro X Pro S50 (MT6735)

Please help me to remove com.android.sc (known as Android/Syringe.AD System Application) on Evercoss Genpro X Pro S50 MT6735. This Trojan exisit in the officeal firmware http://evercoss.com/img/software/EVERCOSS_S50_7_0_021_P1_180314_OE_CPB.zip
I use mtk-su to gain access to remove this trojan.
EVERCOSS_S50:/ $ cd /data/local/tmp
EVERCOSS_S50:/data/local/tmp $ ./mtk-su -v
armv7l machine
param1: 0x1000, param2: 0x8040, type: 4
Building symbol table
kallsyms_addresses pa 0x40bc2460
kallsyms_num_syms 54191, addr_count 54191
kallsyms_names pa 0x40bf7330, size 646794
kallsyms_markers pa 0x40c951c0
kallsyms_token_table pa 0x40c95510
kallsyms_token_index pa 0x40c95890
Patching credentials
Parsing current_is_single_threaded
c0362760: MOVW R0, #0x8d50
c0362764: MOVT R0, #0xc102
Possible list_head tasks at offset 0x290
comm swapper/0 at offset 0x400
Found own task_struct at node 1
cred VA: 0xc667e500
init_task VA: 0xc1028d50
Parsing avc_denied
c0aeca70: MOVW R12, #0x1278
c0aeca74: MOVT R12, #0xc113
selinux_enforcing VA: 0xc1131278
Setting selinux_enforcing
Selinux is already permissive
starting /system/bin/sh
UID: 0 cap: 3fffffffff selinux: permissive
EVERCOSS_S50:/data/local/tmp # pm list package com.android.sc
package:com.android.screenrecord
package:com.android.sc -> bloatware Android/Trojan.Syringe.AD (System Application)
EVERCOSS_S50:/data/local/tmp # pm uninstall com.android.sc
Failure [DELETE_FAILED_INTERNAL_ERROR]
EVERCOSS_S50:/data/local/tmp # pm uninstall -k --user 0 com.android.sc
Success
It still exists when I query list package
EVERCOSS_S50:/data/local/tmp # pm list package com.android.sc
package:com.android.screenrecord
package:com.android.sc -> bloatware Android/Trojan.Syringe.AD (System Application)
After I reboot the device, com.android.sc will installed its self.
Any suggestion?
Thank you
Sincerey, Dedetok
build.prop
# begin build properties
# autogenerated by buildinfo.sh
ro.build.id=NRD90M
ro.build.display.id=EVERCOSS_S50_V13_7.0_09022018
ro.build.version.incremental=1521000161
ro.build.version.sdk=24
ro.build.version.preview_sdk=0
ro.build.version.codename=REL
ro.build.version.all_codenames=REL
ro.build.version.release=7.0
ro.build.version.security_patch=2018-03-05
ro.build.version.base_os=
ro.build.date=Wed Mar 14 12:02:39 CST 2018
ro.build.date.utc=1521000159
ro.build.type=user
ro.build.user=zhuangsf
ro.build.host=freecom8
ro.build.tags=release-keys
ro.build.flavor=full_len6737m_35_n-user
ro.product.model=S50
ro.product.brand=EVERCOSS
ro.product.name=EVERCOSS_S50
ro.product.device=EVERCOSS_S50
ro.product.board=EVERCOSS_S50
# ro.product.cpu.abi and ro.product.cpu.abi2 are obsolete,
# use ro.product.cpu.abilist instead.
ro.product.cpu.abi=armeabi-v7a
ro.product.cpu.abi2=armeabi
ro.product.cpu.abilist=armeabi-v7a,armeabi
ro.product.cpu.abilist32=armeabi-v7a,armeabi
ro.product.cpu.abilist64=
ro.product.manufacturer=EVERCOSS_S50
ro.product.locale=en-US
ro.wifi.channels=
ro.board.platform=mt6737m
# ro.build.product is obsolete; use ro.product.device
ro.build.product=len6737m_35_n
# Do not try to parse description, fingerprint, or thumbprint
ro.build.description=full_len6737m_35_n-user 7.0 NRD90M 1521000161 release-keys
ro.build.fingerprint=EVERCOSS/EVERCOSS_S50/EVERCOSS_S50:7.0/NRD90M/1517820838:user/release-keys
ro.build.characteristics=default
# end build properties
ro.product.sub_flash=yes
ro.product.alsps=stk3x1x-new
ro.product.fingerprint=yes
ro.product.tp_ges=true
ro.product.gyroscope_support=yes
ro.product.aecamera_support=yes
ro.product.doujia=yes
ro.custom.build.version=EVERCOSS_S50_V13_7.0_09022018
ro.build.realversion=ZH096_TRX_L5032_360OS_N23112_C99ba_20180314_37m35_32G3G_DDR3_HD_G4W18L135840K_GpsS_ALS_FP_
ro.build.realversion2=OTG_GYRO_120051
ro.antos.model=wt-6-ZH096-TRX-0-EVERCOSS-S50
#
# from device/lentek/len6737m_35_n/system.prop
#
#
# system.prop for generic sdk
#
rild.libpath=mtk-ril.so
rild.libargs=-d /dev/ttyC0
# MTK, Infinity, 20090720 {
wifi.interface=wlan0
# MTK, Infinity, 20090720 }
# MTK, mtk03034, 20101210 {
ro.mediatek.wlan.wsc=1
# MTK, mtk03034 20101210}
# MTK, mtk03034, 20110318 {
ro.mediatek.wlan.p2p=1
# MTK, mtk03034 20110318}
# MTK, mtk03034, 20101213 {
mediatek.wlan.ctia=0
# MTK, mtk03034 20101213}
#
wifi.tethering.interface=ap0
#
ro.opengles.version=196609
#ro.kernel.qemu=1
#ro.kernel.qemu.gles=0
wifi.direct.interface=p2p0
#dalvik.vm.heapgrowthlimit=128m
#dalvik.vm.heapsize=256m
# USB MTP WHQL
ro.sys.usb.mtp.whql.enable=0
# Power off opt in IPO
sys.ipo.pwrdncap=2
ro.sys.usb.storage.type=mtp
# USB BICR function
ro.sys.usb.bicr=no
# USB Charge only function
ro.sys.usb.charging.only=yes
# audio
ro.camera.sound.forced=0
ro.audio.silent=0
ro.zygote.preload.enable=0
# temporary enables NAV bar (soft keys)
qemu.hw.mainkeys=1
#=0
ro.kernel.zio=38,108,105,16
#ro.kernel.qemu=1
#ro.kernel.qemu.gles=0
#ro.boot.selinux=disable
ro.sf.lcd_density=320
#240
# performance
ro.mtk_perf_simple_start_win=1
ro.mtk_perf_fast_start_win=1
ro.mtk_perf_response_time=1
ro.setupwizard.suppress_d2d_nfc=true
ro.product.otg_support=yes
#
# ADDITIONAL_BUILD_PROPERTIES
#
ro.qiku.version.hardware=P1
ro.qiku.version.date=180314
ro.qiku.version.kernel=3.18.35+.P1.180314.NRD90M
ro.qiku.version.software=7.0.001.P1.180314.WW6_TRX_TRXZH096L5032_OE
ro.qiku.version.release=7.0.021.P1.180314.TRXZH096L5032.WW6_TRX_TRXZH096L5032_OE
ro.qiku.globality=0
ro.qiku.efuse.type=0
persist.qiku.ctstest=1
ro.qiku.gms=1
persist.sys.sw.vdd=2.8
persist.sys.sw.touch.para.r=0x06
persist.sys.sw.touch.para.c=0x0c
persist.sys.sw.touch.level=0x18
persist.sys.sw.speed.max=6000
persist.sys.sw.pix.area=60
persist.sys.sw.enroll.double=1
persist.sys.sw.enroll.frm.num=0
persist.sys.sw.enroll.quality=30
persist.sys.sw.key.mod=1
persist.sys.sw.key.nav_dir=UDLR
persist.sys.sw.key.screenoff=1
persist.sys.sw.verify.retry=1
persist.sys.sw.light.mod=0
persist.sys.sw.light.devs=/dev/input/event2
persist.sys.sw.light.uevet=leds-mt65xx/leds/lcd-backlight
persist.sys.sw.idh.nums=0
persist.sys.sw.transsion.f14=0
ro.carrier=unknown
ro.mediatek.chip_ver=S01
ro.mediatek.platform=MT6737M
ro.telephony.sim.count=2
persist.radio.default.sim=0
ril.specific.sm_cause=0
bgw.current3gband=0
ril.external.md=0
ro.sf.hwrotation=0
persist.radio.fd.counter=150
persist.radio.fd.off.counter=50
persist.radio.fd.r8.counter=150
persist.radio.fd.off.r8.counter=50
drm.service.enabled=true
fmradio.driver.enable=1
ril.first.md=1
ril.flightmode.poweroffMD=1
ril.telephony.mode=0
dalvik.vm.mtk-stack-trace-file=/data/anr/mtk_traces.txt
mediatek.wlan.chip=CONSYS_MT6735
mediatek.wlan.module.postfix=_consys_mt6735
ril.read.imsi=1
ril.radiooff.poweroffMD=0
ro.frp.pst=/dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/frp
ro.mtk_protocol1_rat_config=Lf/Lt/W/G
ro.mediatek.version.branch=alps-mp-n0.mp1
ro.mediatek.version.release=alps-mp-n0.mp1-V1.0.2_len6737m.35.n_P192
ro.mediatek.version.sdk=4
ro.setupwizard.mode=OPTIONAL
ro.com.google.gmsversion=7.0_r13
ro.num_md_protocol=2
persist.radio.multisim.config=dsds
ro.mtk_besloudness_support=1
ro.mtk_wapi_support=1
ro.mtk_bt_support=1
ro.mtk_wappush_support=1
ro.mtk_agps_app=1
ro.mtk_audio_tuning_tool_ver=V1
ro.mtk_wlan_support=1
ro.mtk_gps_support=1
ro.mtk_omacp_support=1
ro.mtk_search_db_support=1
ro.mtk_dialer_search_support=1
ro.mtk_dhcpv6c_wifi=1
ro.have_aacencode_feature=1
ro.mtk_fd_support=1
ro.mtk_oma_drm_support=1
ro.mtk_widevine_drm_l3_support=1
ro.mtk_eap_sim_aka=1
ro.mtk_fm_recording_support=1
ro.mtk_send_rr_support=1
ro.mtk_emmc_support=1
ro.mtk_tetheringipv6_support=1
ro.telephony.default_network=9,9
ro.mtk_shared_sdcard=1
ro.mtk_enable_md1=1
ro.mtk_flight_mode_power_off_md=1
ro.mtk_pq_support=2
ro.mtk_pq_color_mode=1
ro.mtk_miravision_support=1
ro.mtk_wifi_mcc_support=1
ro.mtk_sim_hot_swap=1
ro.mtk_bip_scws=1
ro.mtk_world_phone_policy=0
ro.mtk_perfservice_support=1
ro.mtk_sim_hot_swap_common_slot=1
ro.mtk_cam_mfb_support=0
ro.mtk_lte_support=1
ro.mtk_cam_cfb=1
ro.mtk_rild_read_imsi=1
ro.sim_refresh_reset_by_modem=1
ro.mtk_external_sim_only_slots=0
ro.mtk_bg_power_saving_support=1
ro.mtk_bg_power_saving_ui=1
ro.have_aee_feature=1
ro.sim_me_lock_mode=0
ro.mtk_dual_mic_support=0
ro.mtk_is_tablet=0
persist.mtk_nlp_switch_support=1
persist.mtk_ims_support=1
ro.mtk_multiple_ims_support=1
persist.mtk_volte_support=1
persist.mtk.volte.enable=1
persist.mtk_vilte_support=1
ro.mtk_vilte_ut_support=0
wfd.dummy.enable=1
wfd.iframesize.level=0
ro.mediatek.project.path=device/lentek/len6737m_35_n
ro.mtk_microtrust_tee_support=1
persist.mtk.wcn.combo.chipid=-1
persist.mtk.wcn.patch.version=-1
persist.mtk.wcn.dynamic.dump=0
service.wcn.driver.ready=no
service.wcn.coredump.mode=0
persist.mtk.connsys.poweron.ctl=0
ro.com.android.mobiledata=true
persist.radio.mobile.data=0,0
persist.meta.dumpdata=0
ro.mtk_md_sbp_custom_value=0
dalvik.vm.heapgrowthlimit=128m
dalvik.vm.heapsize=256m
persist.radio.mtk_dsbp_support=1
persist.mtk_dynamic_ims_switch=0
persist.radio.mtk_ps3_rat=G
ro.boot.opt_c2k_lte_mode=0
ro.boot.opt_md1_support=5
ro.boot.opt_lte_support=1
persist.log.tag.AT=I
persist.log.tag.RILMUXD=I
persist.log.tag.RILC-MTK=I
persist.log.tag.RILC=I
persist.log.tag.RfxMainThread=I
persist.log.tag.RfxRoot=I
persist.log.tag.RfxRilAdapter=I
persist.log.tag.RfxController=I
persist.log.tag.RILC-RP=I
persist.log.tag.RIL-DATA=I
ro.boot.opt_using_default=1
mtk.vdec.waitkeyframeforplay=1
ro.sys.sdcardfs=1
persist.mtk.datashaping.support=1
persist.datashaping.alarmgroup=1
persist.runningbooster.support=1
persist.runningbooster.upgrade=1
ro.media.maxmem=500000000
ro.mtk_disable_navigation_bar=1
persist.sys.timezone=Asia/Jakarta
ro.com.google.clientidbase.am=android-evercoss
ro.com.google.clientidbase.ms=android-evercoss
ro.com.google.clientidbase=android-evercoss
persist.mtk_ussi_support=1
ro.qiku.xlocker.capture=1
persist.qiku.fingerprint=0
persist.sys.st.value=0
ro.com.android.dateformat=dd-MM-yyyy
ro.config.agenda_alert=Schedule.ogg
ro.config.alarm_alert=Feeling.ogg
ro.config.notification_sound=Evercoss_Message.wav
ro.config.ringtone=Evercoss_Ringtone.mp3
ro.config.ringtone_2=Evercoss_Ringtone.mp3
ro.config.smstone=Evercoss_Message.wav
ro.config.smstone_2=Evercoss_Message.wav
ro.qiku.bt.voicerecord=0
ro.qiku.version.tag=LC
ro.qiku.sales.channel=2
ro.qiku.display.360logo=0
ro.vendor.channel.number=WW6_TRX_TRXZH096L5032_OE
ro.vendor.name=WTWD6
ro.product.model=S50
ro.product.brand=EVERCOSS
ro.product.manufacturer=EVERCOSS
persist.sys.language=en
persist.sys.country=US
persist.qiku.allmode.operator=0
persist.qiku.version.bm=0
ro.qiku.product.devicename=EVERCOSS_S50
ro.qiku.app.safetydialog=0
ro.build.uiversion=360UI:V2.0
ro.build.ota.type=stable
ro.qiku.oldman.phone=0
persist.qiku.oldman.mode=0
persist.qiku.children.mode=0
ro.qiku.hotknot=0
ro.qiku.product.type=LE
ro.qiku.privacyspace.support=0
persist.qiku.operators.mode=0
persist.qiku.cmcc.mode=0x00
persist.qiku.defaultmode=0
persist.qiku.comm.runmode=0000
persist.qiku.cmcc.brand=0x00
persist.sys.dm=0
persist.qiku.perf_opt=0
persist.qiku.log.level=YWW4
persist.qiku.operators.isabroad=1
ro.qiku.lucky.money.alert=0
persist.sys.dalvik.vm.lib.2=libart.so
dalvik.vm.isa.arm.variant=cortex-a53
dalvik.vm.isa.arm.features=default
net.bt.name=Android
dalvik.vm.stack-trace-file=/data/anr/traces.txt
# begin fota properties
ro.fota.platform=MTK6737_7.0
ro.fota.type=phone
ro.fota.app=5
ro.fota.oem=qiku_sz6737_7.0
ro.fota.device=S50
S50
ro.fota.version=7.0.021.P1.180314.TRXZH096L5032.WW6_TRX_TRXZH096L5032_OE
ro.fota.token=a42e45927e8210def34b83a3ef65477b
# end fota properties
ro.expect.recovery_id=0x4a993bb2198cac1fe86bb34af8da1aff28888304000000000000000000000000
dedetok said:
Please help me to remove com.android.sc (known as Android/Syringe.AD System Application) on Evercoss Genpro X Pro S50 MT6735. This Trojan exisit in the officeal firmware http://evercoss.com/img/software/EVERCOSS_S50_7_0_021_P1_180314_OE_CPB.zip
I use mtk-su to gain access to remove this trojan.
Android/Trojan.Syringe.AD (System Application)
After I reboot the device, com.android.sc will installed its self.
Any suggestion?
Thank you
Sincerey, Dedetok
Click to expand...
Click to collapse
It use this to achieve its permanency.
GitHub - DroidPluginTeam/DroidPlugin: A plugin framework on android,Run any third-party apk without installation, modification or repackage
A plugin framework on android,Run any third-party apk without installation, modification or repackage - GitHub - DroidPluginTeam/DroidPlugin: A plugin framework on android,Run any third-party apk w...
github.com
Sure, it does look suspicious, but is it a trojan?
Does it show ads? Or do some other weird stuff?
System apps do not uninstall. Just remove its folder to do it, i.e. "/system/priv-app/SystemClean". This might cause boot problems though. Depends...
What you could do is install a firewall at least to disable it receiving data from qiku.com or whatever...
CXZa said:
It use this to achieve its permanency.
GitHub - DroidPluginTeam/DroidPlugin: A plugin framework on android,Run any third-party apk without installation, modification or repackage
A plugin framework on android,Run any third-party apk without installation, modification or repackage - GitHub - DroidPluginTeam/DroidPlugin: A plugin framework on android,Run any third-party apk w...
github.com
Sure, it does look suspicious, but is it a trojan?
Does it show ads? Or do some other weird stuff?
System apps do not uninstall. Just remove its folder to do it, i.e. "/system/priv-app/SystemClean". This might cause boot problems though. Depends...
What you could do is install a firewall at least to disable it receiving data from qiku.com or whatever...
Click to expand...
Click to collapse
I used Malware Bytes to scan my device, and it's reported as Syringe.AD. in apk decompile "com.android.com", it has has url string: http:// api <dot> os <dot> qiku <dot> com. I decompile the APK using JavaDecompiler online, and can be download from https://garasiku.my.id/android_malware_source/com.android.sc-1.3.3-1033_source_from_JADX.zip. But I have no skill to read the code.
"application inspector" by uniquesoft report unknown applications was installed, they are:
1. "App Settings" source code by JavaDecompiler online (APK Decompile) , and can be download from https://garasiku.my.id/android_malware_source/com.app.settings.amtapp-2.66-266_source_from_JADX.zip
2. "com.viysr.wkcx" source code by JavaDecompiler online (APK Decompile) , and can be download from https://garasiku.my.id/android_malware_source/com.viysr.wkcx-1.0-1_source_from_JADX.zip
I just looked the system.img file through the hex editor, so not that deep. It looked like it or some other app might try to hook some of the browsers. Then that firewall could be useless. Block at least https://api.os.qiku.com and https://api-en.os.qiku.com if you can. Although that qiku firm seems to be okay...
Odd that the stock firmware would contain a trojan...
But if so, it has planted there on purpose...
It's maybe included in some other stocks too...
English Community-Lenovo Community
https://community.umidigi.com/forum.php?mod=redirect&goto=findpost&ptid=16559&pid=92962
command verbose to block api.os.qiku.com and api-en.os.qiku.com:
$ adb pull /system/etc/hosts ./
edit hosts
127.0.0.1 localhost
127.0.0.1 api.os.qiku.com
127.0.0.1 api-en.os.qiku.com
::1 ip6-localhost
::1 api.os.qiku.com
::1 api-en.os.qiku.com
$ adb push ./hosts /data/local/tmp/
$ adb shell
EVERCOSS_S50:/ $ cd /data/local/tmp
EVERCOSS_S50:/data/local/tmp $ ./mtk-su
UID: 0 cap: 3fffffffff selinux: permissive
EVERCOSS_S50:/data/local/tmp # mount -o rw,remount /system
EVERCOSS_S50:/data/local/tmp # cat hosts
127.0.0.1 localhost
127.0.0.1 api.os.qiku.com
127.0.0.1 api-en.os.qiku.com
::1 ip6-localhost
::1 api.os.qiku.com
::1 api-en.os.qiku.com
EVERCOSS_S50:/data/local/tmp # cp hosts /system/etc/
EVERCOSS_S50:/data/local/tmp # cat /system/etc/hosts
127.0.0.1 localhost
127.0.0.1 api.os.qiku.com
127.0.0.1 api-en.os.qiku.com
::1 ip6-localhost
::1 api.os.qiku.com
::1 api-en.os.qiku.com
EVERCOSS_S50:/data/local/tmp # mount -o ro,remount /system
dedetok said:
command verbose to block api.os.qiku.com and api-en.os.qiku.com:
$ adb pull /system/etc/hosts ./
edit hosts
Click to expand...
Click to collapse
Yes, that does that does the trick - blocks those urls....
But I think that it's just a false alarm.
You seem to have this in it...
360os - 概述 - 360手机
360 OS基于Android 5.1深度定制,以多种出色而自然的方式,让你的Android系统变得更加好用。
www.qiku.com
360OS - 全球领先OS智能生态服务提供商
360OS是全球领先的OS智能产品及生态服务提供商,致力于驱动以OS+为核心的智能互联。以OS+安全产业互联网、OS+AI、OS+UI的商业闭环模式,覆盖全球多个地区市场生态。
www.360os.com
360 OS - All you need to Know about Android based 360 OS
Here is all you need to about 360 OS. 360 OS is new Android based OS. Have a look at unique features in 360 OS.
www.digitalstacks.org
was a double post because of the error message while posting..
Oops! We ran into some problems. Please try again later. More error details may be in the browser console.
Click to expand...
Click to collapse
CXZa said:
Yes, that does that does the trick - blocks those urls....
But I think that it's just a false alarm.
You seem to have this in it...
360os - 概述 - 360手机
360 OS基于Android 5.1深度定制,以多种出色而自然的方式,让你的Android系统变得更加好用。
www.qiku.com
360OS - 全球领先OS智能生态服务提供商
360OS是全球领先的OS智能产品及生态服务提供商,致力于驱动以OS+为核心的智能互联。以OS+安全产业互联网、OS+AI、OS+UI的商业闭环模式,覆盖全球多个地区市场生态。
www.360os.com
360 OS - All you need to Know about Android based 360 OS
Here is all you need to about 360 OS. 360 OS is new Android based OS. Have a look at unique features in 360 OS.
www.digitalstacks.org
Click to expand...
Click to collapse
No ...... It is Not False alarm....
I use App Inspector to monitor any change on my Evercoss S50 ( I have 3 similar devices ). I know exactly what happened to those handsets.
These 2 apks were installed before I changed /system/etc/hosts.
Maybe S50 using 360 OS..... You can download the firmware http://evercoss.com/download/detail/s50 and help me where those 2 files came from.
Please share the patch for the rest of S50 users.
Ops, blocking via /system/etc/hosts did very effective. I still got the "malware" dropped in my device with name "App UI" (Screen shoot)
The easiest way is to use NoRoot Firewall created by Grey Shirts.
In Home Screen there is option to checked "Auto start on boot"
You need to enable VPN, NoRoot Firewall will create local VPN on your phone to filter any application connected to internet.
in Apps, you need to set which application allow or not to connect to internet
For my device I blocked (sign with red X)
1. 360 security
2. Aging Test, Android SYstem, BT Tool,......
3. Anti-Theft
4. CaptivePortalLogin
5. com.mediatek.ims, ....
6. ConfigCenter
7. ConfigUpdater
8. Initiator
9. Intent Filter Verification Service
10. Market Feedback Agent
11. Power Master
12. System
13. System-UI
14. Work profile setup
May be the list is to much.... LOL.... but you won't get "App UI" dropped into your phone anymore....
The other way is to use /system/bin/iptables......
These are backgroud connections capture in NoRoot Firewall by Grey Shirts
Anti Theft
ip 36.110.234.87 port 80 whois: CHINANET-BJ 36.110.0.0 - 36.110.255.255 CIDR 36.110.0.0/16
ip 104.192.109.67 port 5227 whois: CHINANET-LAX-IDC-2014 104.192.108.0 - 104.192.111.255 CIDR 104.192.108.0/22
ip 211.151.195.194 port 80 whois: CHINA-21VIANET 211.151.0.0 - 211.151.255.255 CIDR 211.151.0.0/16
com.android.sc
ip 47.90.110.234 port 80 whois: AL-3 47.88.0.0 - 47.91.255.255 CIDR 47.88.0.0/14
ip 104.192.110.206 port 80 whois: CHINANET-LAX-IDC-2014 104.192.108.0 - 104.192.111.255 CIDR 104.192.108.0/22
ip 104.192.110.243 port 80 whois: CHINANET-LAX-IDC-2014 104.192.108.0 - 104.192.111.255 CIDR 104.192.108.0/22
ip 124.156.123.59 port 443 whois: ACEVILLEPTELTD-SG 124.156.96.0 - 124.156.191.255 CIDR 124.156.96.0/19 124.156.128.0/18
ip 180.163.251.181 port 80 whois:CHINANET-SH 180.160.0.0 - 180.175.255.255 CIDR 180.160.0.0/12
Config Center
ip 104.182.110.205 port 443 whois: SIS-80-7-29-2014 104.176.0.0 - 104.191.255.255 CIDR 104.176.0.0/12
Initiator
ip 101.198.192.187 port 80 whois: QIHOO 101.198.196.0 - 101.198.199.255 CIDR 101.198.196.0/22
ip 101.198.192.189 port 80 whois: QIHOO 101.198.196.0 - 101.198.199.255 CIDR 101.198.196.0/22
Create script s50_iptables.sh
#!/bin/sh
echo "Inserting iptables"
if [ "$(/system/bin/iptables -S INPUT | grep -ce '36.110.0.0/16 -j DROP')" != 0 ]
then
echo "Skiped 36.110.0.0/16 -j DROP"
else
/system/bin/iptables -I INPUT -s 36.110.0.0/16 -j DROP
echo "Added 36.110.0.0/16 -j DROP"
fi
if [ "$(/system/bin/iptables -S INPUT | grep -ce '104.192.108.0/22 -j DROP')" != 0 ]
then
echo "Skiped 104.192.108.0/22 -j DROP"
else
/system/bin/iptables -I INPUT -s 104.192.108.0/22 -j DROP
echo "Added 104.192.108.0/22 -j DROP"
fi
if [ "$(/system/bin/iptables -S INPUT | grep -ce '211.151.0.0/16 -j DROP')" != 0 ]
then
echo "Skiped 211.151.0.0/16 -j DROP"
else
/system/bin/iptables -I INPUT -s 211.151.0.0/16 -j DROP
echo "Added 211.151.0.0/16 -j DROP"
fi
if [ "$(/system/bin/iptables -S INPUT | grep -ce '47.88.0.0/14 -j DROP')" != 0 ]
then
echo "Skiped 47.88.0.0/14 -j DROP"
else
/system/bin/iptables -I INPUT -s 47.88.0.0/14 -j DROP
echo "Added 47.88.0.0/14 -j DROP"
fi
if [ "$(/system/bin/iptables -S INPUT | grep -ce '124.156.96.0/19 -j DROP')" != 0 ]
then
echo "Skiped 124.156.96.0/19 -j DROP"
else
/system/bin/iptables -I INPUT -s 124.156.96.0/19 -j DROP
echo "Added 124.156.96.0/19 -j DROP"
fi
if [ "$(/system/bin/iptables -S INPUT | grep -ce '124.156.128.0/18 -j DROP')" != 0 ]
then
echo "Skiped 124.156.128.0/18 -j DROP"
else
/system/bin/iptables -I INPUT -s 124.156.128.0/18 -j DROP
echo "Added 124.156.128.0/18 -j DROP"
fi
if [ "$(/system/bin/iptables -S INPUT | grep -ce '180.160.0.0/12 -j DROP')" != 0 ]
then
echo "Skiped 180.160.0.0/12 -j DROP"
else
/system/bin/iptables -I INPUT -s 180.160.0.0/12 -j DROP
echo "Added 180.160.0.0/12 -j DROP"
fi
if [ "$(/system/bin/iptables -S INPUT | grep -ce '104.176.0.0/12 -j DROP')" != 0 ]
then
echo "Skiped 104.176.0.0/12 -j DROP"
else
/system/bin/iptables -I INPUT -s 104.176.0.0/12 -j DROP
echo "Added 104.176.0.0/12 -j DROP"
fi
if [ "$(/system/bin/iptables -S INPUT | grep -ce '101.198.196.0/22 -j DROP')" != 0 ]
then
echo "Skiped 101.198.196.0/22 -j DROP"
else
/system/bin/iptables -I INPUT -s 101.198.196.0/22 -j DROP
echo "Added 101.198.196.0/22 -j DROP"
fi
echo "Done"
To run the script, open Termux and run mtk-su to gain root
Download the script
# wget http://garasiku.my.id/folder/s50_iptables.sh.txt
Rename and change permission
# mv ./s50_iptables.sh.txt ./s50_iptables.sh
# chmod 744 ./s50_iptables.sh
Run it
# ./s50_iptables.sh
To check it run
# /system/bin/iptables-save | grep INPUT
Or
# /system/bin/iptables -S INPUT
Known Problem: After restarting or boot the device, the firewall rules will be flush! In the future, I will fix to to put it in /system/etc/init and run it when the device finish booting.
To run on ADB, replace #!/bin/sh to #!/system/bin/sh.
Credit:
MTK-SU by Diplomatic
NoRoot Firewall by Grey Shirts
Application Inspector by UBQSoft
I put my work on garasiku.my.id
Okay. this is weird. Viruses from the factory.
Tried searching that app file name from all files. Got stuck because anti-virus. Trojan in /system/lib/libcheckperlib.so
File name search finds that you're not the only one.
Might be that you cannot make it clean if it's deep in the system.
Yet another [almost] non-removable trojan for Android
At the end of 2019, system-monitoring routines on some of our customers' smart phones detected changes in the file /system/lib/libc.so.
news.drweb.com
Fortunately evercoss has a solution... LOL
Cara Jitu Menghapus Virus Trojan di Smartphone Android
Banyak kerugian dari virus Trojan yang tidak segera ditangani, termasuk bocornya data personal. Inilah solusi menghapus virus trojan di smartphone EVers!
blog.evercoss.com
Have you re-flashed it? Does the same start again even if those urls are blocked?
CXZa said:
Okay. this is weird. Viruses from the factory.
Tried searching that app file name from all files. Got stuck because anti-virus. Trojan in /system/lib/libcheckperlib.so
File name search finds that you're not the only one.
Might be that you cannot make it clean if it's deep in the system.
Yet another [almost] non-removable trojan for Android
At the end of 2019, system-monitoring routines on some of our customers' smart phones detected changes in the file /system/lib/libc.so.
news.drweb.com
Fortunately evercoss has a solution... LOL
Cara Jitu Menghapus Virus Trojan di Smartphone Android
Banyak kerugian dari virus Trojan yang tidak segera ditangani, termasuk bocornya data personal. Inilah solusi menghapus virus trojan di smartphone EVers!
blog.evercoss.com
Have you re-flashed it? Does the same start again even if those urls are blocked?
Click to expand...
Click to collapse
thank you for your help.
flashing device does not help. after it connect to internet, it starts pull some apk from internet.
I'll try to search /system/lib/libcheckperlib.so as your sugestion.
CXZa said:
Okay. this is weird. Viruses from the factory.
Tried searching that app file name from all files. Got stuck because anti-virus. Trojan in /system/lib/libcheckperlib.so
File name search finds that you're not the only one.
Might be that you cannot make it clean if it's deep in the system.
Yet another [almost] non-removable trojan for Android
At the end of 2019, system-monitoring routines on some of our customers' smart phones detected changes in the file /system/lib/libc.so.
news.drweb.com
Fortunately evercoss has a solution... LOL
Cara Jitu Menghapus Virus Trojan di Smartphone Android
Banyak kerugian dari virus Trojan yang tidak segera ditangani, termasuk bocornya data personal. Inilah solusi menghapus virus trojan di smartphone EVers!
blog.evercoss.com
Have you re-flashed it? Does the same start again even if those urls are blocked?
Click to expand...
Click to collapse
Yes, /system/lib/libcheckperlib.so contains Android.DownLoader.4930 trojan.
I deleted it and let device without net filtering to monitor any change in android system.
Thank you for your clue.
After removing /system/lib/libcheckperlib.so that contains Android.DownLoader.4930 trojan, and monitor the device for two months, there is no more unwanted installed on device.
Here is step to remove /system/lib/libcheckperlib.so that contains Android.DownLoader.4930 trojan:
Requirement:
rooted android or temporary root using mtk-su create by Diplomatic
pc with adb or Termux
This are steps to remove malware Android.Downloader.4930 /system/lib/libcheckperlib.so using Termux created by Grey Tshirts:
Create these bash script and save it as s50_patch2021.sh
#!/system/bin/sh
FILE="/system/lib/libcheckperlib.so"
echo "checking $FILE"
if [ -f $FILE ]; then
echo "File $FILE exists."
echo "Try remount system rw."
/system/bin/mount -o rw,remount /system
echo "Backing up $FILE."
/system/bin/mkdir /sdcard/dedetok
/system/bin/cp $FILE /sdcard/dedetok
echo "Removing $FILE"
/system/bin/rm $FILE
echo "Remount system ro"
/system/bin/mount -o ro,remount /system
echo "Done, reboot your Evercoss S50"
else
echo "File $FILE does not exist."
fi
Or you can download it from this site. Open Termux and type
$ wget http://garasiku.my.id/folder/S50_patch2021.sh.txt
rename it
$ mv ./S50_patch2021.sh.txt ./S50_patch2021.sh
change permission
$ chmod 744 ./S50_patch2021.sh
run mtk-su and run the cript
# ./S50_patch2021.sh
reboot your phone
Don't forget to run your antivirus after reboot your phone. android is not save operating system. Use application inspector to inspect unwanted application and remove it.
Garasiku - Evercoss Genpro X Pro S50 removing malware Android.Downloader.4930 /system/lib/libcheckperlib.so
Garasiku
garasiku.my.id

need help about rooting

i can't root Samsung galaxy a02 -- SM-A022F/DS Build No: A022FXXU2BUI3 , android 11 , i dont know what to do for rooting and i dont have firmware file (bootloader unlocked)
To get the superuser access ( AKA root ) to be able to control various aspects of Android OS means you need to perform a certain modification that will root your phone's Android. An unlocked bootloader isn't needed to root Android.
Here is what you have to do to root your device's Android:
Replace Android's Toybox binary - what is a restricted version by default - by unrestricted Toybox v0.8.5.
This e.g. can get achieved by means of a Windows command script making use of ADB coomands.
jwoegerbauer said:
To get the superuser access ( AKA root ) to be able to control various aspects of Android OS means you need to perform a certain modification that will root your phone's Android. An unlocked bootloader isn't needed to root Android.
Here is what you have to do to root your device's Android:
Replace Android's Toybox binary - what is a restricted version by default - by unrestricted Toybox v0.8.5.
This e.g. can get achieved by means of a Windows command script making use of ADB coomands.
Click to expand...
Click to collapse
hi , i dont know what is toybox or i dont know really what to do can you tell me step by step please? i have ADB already
dleaderp said:
hi , i dont know what is toybox or i dont know really what to do
Click to expand...
Click to collapse
Typically people do a Google search like "Android Toybox" ...
To save you this search: Toybox is a suite of Linux commands ported to Android.
The commands supported are
Code:
acpi arch ascii base64 basename blkid blockdev bunzip2 bzcat cal cat
catv chattr chgrp chmod chown chroot chrt chvt cksum clear cmp comm
count cp cpio crc32 cut date devmem df dirname dmesg dnsdomainname
dos2unix du echo egrep eject env expand factor fallocate false fgrep
file find flock fmt free freeramdisk fsfreeze fstype fsync ftpget
ftpput getconf grep groups gunzip halt head help hexedit hostname
hwclock i2cdetect i2cdump i2cget i2cset iconv id ifconfig inotifyd
insmod install ionice iorenice iotop kill killall killall5 link ln
logger login logname losetup ls lsattr lsmod lspci lsusb makedevs
mcookie md5sum microcom mix mkdir mkfifo mknod mkpasswd mkswap mktemp
modinfo mount mountpoint mv nbd-client nc netcat netstat nice nl nohup
nproc nsenter od oneit partprobe passwd paste patch pgrep pidof ping
ping6 pivot_root pkill pmap poweroff printenv printf prlimit ps pwd
pwdx readahead readlink realpath reboot renice reset rev rfkill rm
rmdir rmmod sed seq setfattr setsid sha1sum shred sleep sntp sort
split stat strings su swapoff swapon switch_root sync sysctl tac tail
tar taskset tee test time timeout top touch true truncate tty tunctl
ulimit umount uname uniq unix2dos unlink unshare uptime usleep uudecode
uuencode uuidgen vconfig vmstat w watch wc which who whoami xargs
xxd yes zcat
As you might see su is the ROOT functionality.
dleaderp said:
can you tell me step by step please? i have ADB already
Click to expand...
Click to collapse
Actually I'm working on a Windows command script that makes use of ADB what does the job. I'll publish it here when finished:
[TOOL][ADB]][Windows] A 100% Safe Non-systemless Root Tool - No Soft-bricked Adroid Guaranteed
Grant Root Privileges to Regular Users Using Devices With Android 6 and up by Simply Upgrading Android's Multi-command Applet Toybox.
forum.xda-developers.com
jwoegerbauer said:
Actually I'm working on a Windows command script that makes use of ADB what does the job. I'll publish it here when finished:
Click to expand...
Click to collapse
happy to hear that xd
i got a last question, i think my phone's storage is shrunked after i used firmware is it possible ? if yes how can i fix it. it was 32 gb now its 8gb
i fixed i used another firmware i'll be wait for your ADB

Categories

Resources