Hello,
Recently I changed my device. I had a Xperia S with Root and BusyBox installed, running with JB. Now I have a Xperia Z3 Dual without Root and BusyBox, running with KK.
Before I performed two commands Shell by Tasker and after the exchange I can no longer run them:
cat / proc // $ (pidof com.plexapp.android) / oom_adj
and
awk '! x [$ 0] ++' sdcard / Tasker / Torres / torre.txt> sdcard / Tasker / Torres / torreclean.txt
I believe the cat / proc, no longer work due to lack of Root and the AWK due to lack of Root and BusyBox.
Could someone confirm this information?
Or this is happening because of KK?
Is there any workaround?
I'm sorry for my English.
Related
Hey guys,
My uncle works for Motorola and gave me a prototype phone (which I believe will be called the Motorola Sage, and it's model number is MB508. This thread isn't really about that, I can't post pictures because I don't want to get anyone in trouble). This phone is an AT&T phone, complete with AT&T startup screen, uninstallable AT&T apps and of course the inability to install non-market apps. Also it's running Android 2.1.
Now, I seem to have default root access to this phone. I'm assuming the file system is very similar to that of the Backflip (which I was previously using until I received this one). From what I've read and learned from poking around in /system/etc, non-market apps are blocked by two config files. These are:
/system/etc/motorola/com.android.providers.settings/secure.mkitso
Code:
# cat secure.mkitso
cat secure.mkitso
location_providers_allowed=network,gps
wifi_on=0
data_roaming=1
bluetooth_on=0
install_non_market_apps=0
usb_mass_storage_enabled=1
and
/system/etc/motorola/com.motorola.android.providers.settings/settings.mkitso
Code:
# cat settings.mkitso
cat settings.mkitso
mms_maximum_message_size=614400
auto_scan_on_flip=true
sms_pref_key_emailgateway_num=121
Single_Digit_Dial_Enabled=True
roaming_icon=0
dun_enable=1
force_only_market_apps=1
Bluetooth_Dun_Enabled=true
mms_x_wap_profile_url=http://uaprof.motorola.com/phoneconfi/MotoMB51/profile/MotoMB511.rdf
sms_pref_key_to_email=1
Okay, now it would seem that it's a simple matter of changing the values for "force_only_market_apps" to 0, and "install_non_market_apps" to 1. I did this, and let me quickly tell you how I did it.
- Make /system writable: mount -o remount,rw -t yaffs2 /dev/block/mtdblock4 /system
- Copy mkitso files to sdcard
- Edit mkitso files using Notepad++, changing the values as stated above
- Copy mkitso files back to their original directories
- chmod 644 to the files in order to keep their original permissions
- Make /system read only again: mount -o remount,ro -t yaffs2 /dev/block/mtdblock4 /system
- Restart the phone
However, this did not work, as I still get the warning when I try to install a non-market app.
I was wondering if anyone had any ideas on this, as when the Backflip gets rooted this is one thing that I'm sure we would like to know.
Have you tried adb install? I've heard that works on Backflops. You could download the app to your PC,and install it using "adb install PATH/TO/APP.APK"
Thanks, I know that I can use adb to install non market apps, but I was looking at how to change this setting on the phone. Since I have root on my phone, I figured it was possible.
Check out some of these terminal apps found in /system/bin/ directory of the backflip.Maybe they will help you.
Code:
modemlog
chown
check_prereq
dumpsys
qmuxd
rild
dd
port_bridge
installd
minipadut
vmstat
vold
ioctl
mm-audio-native-test
lsmod
id
mm-adec-omxamr-test
notify
getevent
hciattach
dhcpcd
service
cat
system_server
linker
mm-vdec-omxh264-test
mm-adec-omxevrc-test
wpa_supplicant
netstat
mm-adec-omxmp3-test
ls
wipe
iwpriv
stop
log
mm-vdec-omxmp4-test
top
bt_init
app_process
kill
dumpcrash
iwspy
tcmd_engine
sleep
port-bridge
input
chmod
flash_image
wfa_dut
monkey
dmesg
umount
dalvikvm
sh
sync
ptf
mm-jpeg-dec-test
ime
diag_klog
route
ln
batch
fuel_gauge
iwlist
bugreport
insmod
hcid
svc
rmmod
servicemanager
iwgetid
debuggerd
test_diag
am
renice
applypatch
ps
watchprops
sendevent
reboot
mount
mm-adec-omxQcelp13-test
pm
start
ping
busybox
toolbox
df
touchpad
mediaserver
setconsole
loc_api_app
setprop
logwrapper
rm
dvz
hd
ifconfig
rmdir
printenv
getprop
mm-venc-omx-test
fsck_msdos
iwconfig
iftop
bt_downloader
akmd2
sdptool
disp_util
mm-aenc-omxamr-test
newfs_msdos
gzip
cmp
iwevent
mv
smd
mmclog
mknod
mm-adspsvc-test
bt_test_exec
dexopt
date
set_grp_id
i2c
tcmd_sql
recovery
dumpstate
netcfg
surfaceflinger
mkdir
dbus-daemon
mm-adec-omxaac-test
schedtest
mm-jpeg-enc-test
logcat
mm-aenc-omxaac-test
schedtop
fmradio
EDIT:Also there does not seem to be a com.android.providers.settings in /system/etc/motorola/ only com.motorola.android.providers.settings and the file located in that directory is named secure.mkitso and the market app setting is set up like this:install_non_market_apps=0
So there is a slight difference in how the devices are set up and maybe a bit less security on the backflip =)
Thanks for your suggestion, but if you read above I changed the mkitso files without any changes in the behavior of the phone .
I was thinking that since I changed the settings files and they didn't do anything, maybe they will be applied during a hard reset. I'll try that sometime this weekend and report on the results.
The reason I'm asking for help is because I believe that once the Backflip gets rooted, we will need to know how to disable this setting.
I doubt you have root unless it came already rooted (you did make up some **** about a prototype) I honestly think this wont be a hard issue to tackle or work around when root is achieved on the Lackflip...yes I did Lackflip on purpose because of how crippled it is..so spend your time ANNONYMOUSLY sending www.endgadget.com some nice shiney pics of your supposed prototype codnamed:
"Motorola Sage"
I'm not sure why you're so aggressive, Honestly77. I'm able to "su" in shell and I'm able to modify files in the /system folder, so unless I'm mistaken (which I very well might be), then I believe I have root on the phone.
It is a prototype phone for testing, so it coming rooted isn't too farfetched at all.
When the Backflip does get rooted yes, this will be an easier issue to solve, but I'm trying now. If we're able to figure it out now then no time will have to be devoted to it when the Backflip is rooted.
Alright, I just did a hard reset and it activated a menu toggle under Settings -> Applications -> "Unknown Sources: Allow install of non-Market applications" which can be checked or unchecked.
To summarize, if you have root on your phone, edit secure.mkitso and settings.mkitso and change the variables, then you need to hard reset the phone.
hey met3ora, I too have a backflop, I am currently trying to sell my soul to obtain some sort of root or even simple control over the device, I have 2 questions for you...
1: using the config files and other software availible on this forum, would it be possible to obtain a workaround to be able to install apps from sd? I'm sure you are well aware that the backflip has no memory and won't even allow market apps to be installed via sd.
my second question (its ok if you don't want to answer as we will find out soon enough)
is: the moto sage, how does it compare to the backflip? no specifics needed just, is it better?
Iv'e seen the photos of the sage that appeared a couple weeks ago and it looks good, just incase we need it you should copy the system files as I'm sure the one AT&T will give us will be on lockdown as well. Thanks!
Honestly77 said:
I doubt you have root unless it came already rooted (you did make up some **** about a prototype) I honestly think this wont be a hard issue to tackle or work around when root is achieved on the Lackflip...yes I did Lackflip on purpose because of how crippled it is..so spend your time ANNONYMOUSLY sending www.endgadget.com some nice shiney pics of your supposed prototype codnamed:
"Motorola Sage"
Click to expand...
Click to collapse
THis thread is old but it still helped me with a bravo. Thanks OP.
And to this guy above, wtf, why be such a douche? You are also clearly an idiot or you would know that engineering models always have root.
Calling the OP a liar was way out of line and you should apologize.
I have finally received my OTA froyo 2.2 update. I am considering rooting to be able to use custom themes and such. I have a few questions.
What is the best and easiest method to root/unroot my 2.2 droid X?
What all do I need to download in order to successfully root?
What is deodexed? ( I keep seeing this as necessary for certain themes.)
What do I need to download to deodex my droid X?
Thanks in advance.
aplechaty said:
I have finally received my OTA froyo 2.2 update. I am considering rooting to be able to use custom themes and such. I have a few questions.
What is the best and easiest method to root/unroot my 2.2 droid X?
What all do I need to download in order to successfully root?
What is deodexed? ( I keep seeing this as necessary for certain themes.)
What do I need to download to deodex my droid X?
Thanks in advance.
Click to expand...
Click to collapse
Best way to root/unroot:
Answer: EE THIS LINK: http://www.droidforums.net/forum/droid-x-hacks/82584-droid-2-root-dx-ota-2-2-a.html
or Rootz wiki has some links if you search for it on google. I'm not sure that links are allowed here, or I would provide it.
ANSWER: There is a one click root/unroot made by Sil3ntkill (could have spelled wrong) over on alldroid.org. I have not used this method tho. I used the step by step process.
This also has the link for what you need to download as well! =)
DEODEXING:
Deodexing your phone modifies the .apk files on your phone (for the framework and services) I believe, which allows developers to then make custom themes, as these "deodexed" files can be easily modified and replaced.
How to Deodex:
I recommend just doing some searching. I think if you look in the themes/app sections of the Droid X forum here you can find an update.zip such as the following:
http://forum.xda-developers.com/showthread.php?t=793664
This is the black glass deodex method. You use the update.zip with koush's recovery and then use his back to stock method to remove the theme (black glass) that comes with the deodex process.
There are a lot of links out there that will tell you how to do the manual process. I did it manually myself, but have had a decent amount of experience with linux/command line. If you don't have a lot of experience, I might recommend using a method such as the black glass method I mentioned above.
If you are confident you can do a manual process, go for it! I think it's always more gratifying to try things the manual way... but that's just me! Hope this all helps =)
aplechaty said:
I have finally received my OTA froyo 2.2 update. I am considering rooting to be able to use custom themes and such. I have a few questions.
What is the best and easiest method to root/unroot my 2.2 droid X?
What all do I need to download in order to successfully root?
What is deodexed? ( I keep seeing this as necessary for certain themes.)
What do I need to download to deodex my droid X?
Thanks in advance.
Click to expand...
Click to collapse
Once you get rooted, check my thread out for easy deodexing... {Deodex OTA 2.2}
EASY ROOT WITHOUT ADB
you will need:
*rageagainstthecage-arm5.bin
*su
*Superuser.apk
*Some sort of terminal emulator in the market.
*enable USB debugging.
Settiings -> applications -> development -> USB debugging.
* EDIT: any line below that starts with a * is optional
- open up your favorite terminal emulator program
- cd /tmp
- cp /sdcard/rage*.bin /tmp/ (without "/tmp/" worked for me)
- chmod 777 rage*.bin
- ./rage*.bin
- ignore it's output, we are thinking outside of the box here, just wait for it to finish and return a $
- now go to settings -> applications -> manage applications -> running -> terminal and force close
- relaunch the terminal app and you should be greeted with the # symbol. you now have a root shell
- the rest is pretty much the same.
- mount -o rw,remount -t ext3 /dev/block/mmcblk1p21 /system
- cp /sdcard/Superuser.apk /system/app/Superuser.apk
- cp /sdcard/su /system/bin/su
* cp /sdcard/busybox /system/bin/busybox
- chmod 4755 /system/bin/su
* chmod 4755 /system/bin/busybox
- mount -o ro,remount -t ext3 /dev/block/mmcblk1p21 /system
- exit
Once your all done, go ahead and reboot your phone.
*if you decide to unroot.
- open your terminal app
- you should see a $ symbol, now do the following
- su
- now you should see a # symbol
- mount -o rw,remount -t ext3 /dev/block/mmcblk1p21 /system
- rm /system/app/Superuser.apk
- rm /system/bin/su
* rm /system/bin/busybox
- mount -o ro,remount -t ext3 /dev/block/mmcblk1p21 /system
- reboot your phone.
Howdy,
Can someone tell me what exactly rage.bin is/does to the phone?
I understand that busybox is essentially a list of UNIX commands made available on the Android system and that SU elevates the ability to issue commands but I cannot figure out what rage.bin actually is.
Why would I need to use it to root my phone? Why wouldn't I just ADB su and busybox to /system/xbin and CHMOD and CAT them?
Thanks,
Z
Someone can help me how to root aigopad m60?.. im already searching all over the net...
Thanks.
kickhopperX said:
Someone can help me how to root aigopad m60?.. im already searching all over the net...
Thanks.
Click to expand...
Click to collapse
There are two apps aimed at rooting Android devices: 'z4root' and 'superoneclick' but success with these is hit or miss. It's worth a shot
Sent from my SCH-R880 using xda app-developers app
kickhopperX said:
Someone can help me how to root aigopad m60?.. im already searching all over the net...
Thanks.
Click to expand...
Click to collapse
Hello kickhopperX
I also have a tablet aigopad m60 like you. this tablet is already rooter, you need just one application as ES Explorer which will allow you access to the tree (/).
I needed time to mount my sd card external sd card to the system.
One question: your tablet restarts all the time?
Good Day
Escuse me if I speak a little sore I use google translate to translate.
aigoPad m60
fariik said:
Hello kickhopperX
I also have a tablet aigopad m60 like you. this tablet is already rooter, you need just one application as ES Explorer which will allow you access to the tree (/).
I needed time to mount my sd card external sd card to the system.
One question: your tablet restarts all the time?
Good Day
Escuse me if I speak a little sore I use google translate to translate.
Click to expand...
Click to collapse
do you mean that it's already rooted ?
have you tried Directory Bind or SwapSD ?
i already tried z4root & super one click to root this device..both option won't work..please help us
I already found the solution guys!
Search 4Shared this apps :
DamNxQQr/doomlord_v1_xperia-2011-ics-ro
hoho.. thanks dude.. its working!!..
well... got custom rom for this tablet?..
its working ? how u do it ?
kickhopperX said:
hoho.. thanks dude.. its working!!..
well... got custom rom for this tablet?..
Click to expand...
Click to collapse
Not working with my aigopad m60 need help here cause Im dont know where to start
already have DamNxQQr/doomlord_v1_xperia-2011-ics-ro download to my PC and i have not install anything yet on aigopad m60
follow the instruction on runme(windows batch file) and when i run the batch it say " adb server is out of date " and " more the 1 device and emulator " then its say "complete
YAY!!!!! nothing happen
arerain86 said:
I already found the solution guys!
Search 4Shared this apps :
DamNxQQr/doomlord_v1_xperia-2011-ics-ro
Click to expand...
Click to collapse
I'm trying on my AigoPad M60, but not working
Here's how i did it.
Download and install moborobo.Launch the app and let it download the driver for m60.
once stabilize, unplug your tablet and reboot. on your dektop exit moborobo and kill the process. Reconnect tablet and execute runme.bat.
Let me know.
Thanks
[ROOT] [HOWTO] aigoPad M60 rooting script + generic su + generic usb driver
Hi.
I owned several aigoPad M60 bought from all over (to say it have slightly different ICS 4.0.3 revisions) and some I actually got them revisions by sending to service centre and flashed to a newer firmware.
Nevertheless, all of them can be rooted using this script (for Windows, 380 KB).
I actually rooted a Kindle Fire HD first using this script found on some chinese site (sorry I already forgot where I did so please pardon me for lack of credits). I cleaned up and englicised the whole thing, and updated the ADB tools to greater (and more compatible) version. Actually most ICS root scripts found everywhere are more or less the same.
So far, devices tested and succeded:
- Amazon Kindle Fire HD (ICS version)
- aigoPad M60 (ICS)
- Samsung Galaxy SII (GT-I9100 & GT-I9100G) ICS and Jellybean (works on mine, both phones and both 4.0.3 and 4.1.2)
- Chinese Samsung Galaxy SIII clone (can't explain much since it's a bootleg, it has MTK board) (ICS)
- Several other chinese tablets which somehow lose it's root or not rooted (ICS): Momo.cn 3G, AMPE, MaPaN. Sorry didn't remember it's exact models anymore.
This script contains a batch file, ADB exe file and two API libraries, and a generic su found in chinese tablets. The su works up to certain level but it is preferred to replace that with SuperSU from chainfire (Superuser from chainsdd didn't work well on these ICS chinese tablets, for me. Not sure about koushik's). Just install and when it asks to replace binary, choose normal and tap yes.
You have to have installed USB driver first. I have uploaded the compatible USB ADB driver for most chinese phones and tablets (8.5 MB, have to be split into x32 and x64 since the forum doesn't allow 8MB+ attachments, if you're not sure, download both and merge the folders, overwriting duplicate files).
Note: The driver works on Windows XP, 7 and 8. On Win 7 and 8 you will have to disable driver signature verify in order to install. (Win 7: Boot, F8, Disable signature. Win 8: Setting, Change PC Settings, General, Advanced Startup, look for Disable signature)
Those who already have ADB and drivers installed, here it is (simplified form of the actual script):
Windows (no need admin for ADB, just for driver installation):
Code:
adb wait-for-device
adb shell mv /data/local/tmp /data/local/tmp.bak
adb shell ln -s /data /data/local/tmp
adb reboot
adb wait-for-device
adb shell rm /data/local.prop
adb shell "echo \"ro.kernel.qemu=1\" > /data/local.prop"
adb reboot
adb wait-for-device
adb remount
adb push su /system/xbin/su
adb shell chown 0.0 /system/xbin/su
adb shell chmod 06755 /system/xbin/su
adb shell rm /data/local.prop
adb shell rm /data/local/tmp
adb shell mv /data/local/tmp.bak /data/local/tmp
adb reboot
adb kill-server
Linux:
Same
Tip: If you want to, you don't have to download anything. Just copy+paste the script. But make sure you have su in current directory. You can get chainfire's su from SuperSU.apk (assets\supersu.arm.png, rename it to su).
Careful though, this copy+paste script lacks safety measures compared to the one in the archive, such as it doesn't check if the rooting is a success or not, but the script inside archive will prompt you first before wiping /data/local/tmp ...
Note: What I mean by the su works 'up to certain level' is, it doesn't accept command lines such as su -c command. Also you will have to replace it with a proper superuser app (SuperSU, Superuser) if you want to use Titanium Backup, Lucky Patcher and so on...
i juz purchase one for my kids to play games and i google on how to root the aigopad m60, it took me here.
Many thanks for the guide, i succesfully root it.
Had Enough of these ads....So
Finally killed the KingRoot Random Pop Up Screen Lock Ads!
With /system mounted RW, BusyBox and KingRoot (kingroot-pc-3-2-0-1129.exe
as rooter installed on my Android 5.1 tablet and with a Screen Lock Ad present, I adb'd in and su'd to root. Did a #ps | grep "locker" and found "com.kingroot.kinguser:locker". Then using its PID I did a #kill -9 PID killing the ad. So at / did a #find . -name "com.kingroot.kinguser.locker". Found it at "/data/data/com.kingroot.kinguser/files/plugin/5001/work"
Did a
#ls
com.kingroot.kinguser
com.kingroot.kinguser_cc
com.kingroot.kinguser_locker
com.kingroot.kinguser_service
com.kingroot.kinguser_task
com.kingroot.kinguser_work
Then did #mv com.kingroot.kinguser_locker com.kingroot.kinguser_locker.crap
Verified
#ls
com.kingroot.kinguser
com.kingroot.kinguser_cc
com.kingroot.kinguser_locker.crap
com.kingroot.kinguser_service
com.kingroot.kinguser_task
com.kingroot.kinguser_work
No KingRoot more ads
Hope this works for you!
Hi
I'd like to get rid of those ads but i don't understand exactly how to do it nor the language you are using to do this process, what are you using to put those commands? I would appreciate if you can make a detailed tutorial for amateurs like me
I've already downloaded busybox
I've /system mounted RW with ES File Explorer (not sure if it is the correct process, I have found that option (/system mounted RW) like 20 min before I found this post so idk if it is ok)
I've already installed KingRoot and rooted my LG L50
I got lost from here:
"I adb'd in and su'd to root. Did a #ps | grep "locker" "
I am not a native english speaker so I apologize if I misspelled something wrong
Have a nice day :fingers-crossed:
Hope this helps you understand better...
zaam94 said:
I got lost from here:
"I adb'd in and su'd to root. Did a #ps | grep "locker" "
Click to expand...
Click to collapse
They meant that they used the Android Debug Bridge terminal/the Android's system shell (adb'd in) and then they changed to superuser by executing su root (su'd to root). After that they checked all the processes that contained the word 'locker' ('ps' shows the processes currently running and 'ps | grep "locker"' means check for the word locker from the output of 'ps').
I hope this helps.
PocketNES