Saturday, April 5, 2014

Android command 1

Android command 1
Press shift + right click in adb.exe  or fastboot.exe containing folder   comment here for problems
fastboot command  collections
Fastboot command made easyßsee this , guide by mrkosu
@echo off
cls
title: susutun tool
color 0a
echo  fastboot options
echo.
fastboot shell
echo.
pause
---------------------------------------------------------------------------------------------------------------------
Fastboot ကေန insecure boot ေတြကို flash တဲ့အခါ Build number မကိုက္ရင္ hardware ပိုင္းေတြမွာ error ေတြ တက္ တတ္ပါတယ္  ဟိုးအရင္ y220t ေတြ ကင္မရာ ေဇာက္ထိုးျဖစ္တာ y210 ေတြမွာ wifi မရတာ အဲ့လိုမ်ဳိးေတြပါ အဲ့ဒီ့လို error မ်ိဳးမတက္ရေအာင္ ေအာက္က command သံုးပါ   fastboot boot boot.img ပါဝါပြင့္လာပါ လိမ့္မယ္ Power ပိတ္ၿပီး ျပန္ဖြင့္လိုက္တာနဲ႔ insecure လုပ္ထားတာ ေပ်ာက္သြားမွာပါ Error တက္ေနမယ္ဆိုလဲ ပိတ္ၿပီးဖြင့္လိုက္တာနဲ႔ အေကာင္းအတိုင္းျပန္ျဖစ္မွာပါ
လုိအပ္ရင္ လို အပ္သလို အသံုးခ်လို ့ရေအာင္ ဖန္လံုးတင္တဲ့
fastboot command ေလးေတြပါ 
အမ်ားၾကီးရိွပါတယ္ 
ဒါကနည္းနည္းေလးပါ   ထပ္ျပီးေတာ့စုေနတယ္
Eg ;
fastboot boot boot.img
fastboot flash bootloader bootloader.img
fastboot reboot-bootloader
ping -n 5 127.0.0.1 >nul
fastboot flash radio radio.img
fastboot reboot-bootloader
ping -n 5 127.0.0.1 >nul
fastboot -w update image.zip
fastboot update update.zip
fastboot flashall boot.img recovery.img system.img (flash boot+recovery+system)
fastboot flash boot boot.img (fastboot flash partition named to be flash eg,boot or recovery or system or radio or bootloader+flash file name eg boot or recovery or system or radio or bootloader.img)
eg;
fastboot flash logo logo.bin
fastboot flash boot boot.img
fastboot flash recovery recovery.img
fastboot flash radio radio.img
fastboot flash radio-cdma radiocdma.img
fastboot flash bootloader bootloader.img
fastboot flash system system.img
fastboot flash -S 16M system system.img
fastboot flash -S 32M system system.img
fastboot -S 200M flash system system.img
fastboot  flash misc misc.img
fastboot  flash misc misc.img
fastboot %* getvar product 2>&1 | findstr /r /c:"^product: *MSM8226" || echo Missmatching image and device
fastboot %* getvar product 2>&1 | findstr /r /c:"^product: *MSM8226" || exit /B 1
fastboot flash cust cust.img
fastboot flash modem NON-HLOS.bin
fastboot flash sbl1 sbl1.mbn
fastboot flash sbl1bak sbl1.mbn
fastboot flash rpm rpm.mbn
fastboot flash rpmbak rpm.mbn
fastboot flash tz tz.mbn
fastboot flash tzbak tz.mbn
fastboot flash sdi sdi.mbn
fastboot flash aboot emmc_appsboot.mbn
fastboot flash abootbak emmc_appsboot.mbn
fastboot flash splash splash.img
fastboot flash userdata userdata.img
fastboot -S 200M flash userdata userdata.img
fastboot flash cache cache.img
fastboot flash persist persist.img
fastboot flash efi efi.img
fastboot flash crc crc.img
fastboot flash curver curver.img
fastboot flash md5rsa md5rsa.img
fastboot flash verlist verlist.img
fastboot flash batt batt.img
fastboot flash modemimage modemimage.img
fastboot bbk unlock_vivo    (unlock bootloader for vivo phone)
fastboot bbk lock_vivo    (lock bootloader for vivo phone)
fastboot flash partition gpt_both0.bin
fastboot flash modemst1 modemst.mbn
fastboot flash modemst2 modemst.mbn
fastboot flash fsg PD1303_fs_image.tar.gz.mbn.img
fastboot flash persist persist.img
fastboot flash modem NON-HLOS.bin
fastboot flash hyp hyp.mbn
fastboot flash hypbak hyp.mbn
fastboot flash sec sec.dat
fastboot erase reserved
fastboot flash dbi sdi.mbn
fastboot flash sbl1 sbl1.mbn
fastboot flash aboot emmc_appsboot.mbn
fastboot flash rpm rpm.mbn
fastboot flash tz tz.mbn
fastboot flash udisk fat.img
fastboot -S 200M flash apps apps.img
---------------------------------------------------------------------------------------------------------------------
fastboot oem get-bootinfo  (to see boot loader version)
---------------------------------------------------------------------------------------------------------------------
Fastboot ကေန build number စစ္နည္း။  Firmware က်သြားလုိ႔ build_number စစ္လုိ႔မရေတာ့ရင္.
Vol down နဲ႔ Power key ကုိနွိပ္ၿပီး fastboot ေခၚပါ။ၿပီးတာနဲ႔
fastboot oem get-build-number ဆုိၿပီး ရုိက္  build number သိေတာ့ တင္ရတာအဆင္ေျပတာေပါ့။  Credit
---------------------------------------------------------------------------------------------------------------------
fastboot erase recovery(fastboot erase partition name eg recovery,boot,system,radio,bootloader)
---------------------------------------------------------------------------------------------------------------------
fastboot getvar (display boot loader version eg hboot version)
fastboot getvar product
---------------------------------------------------------------------------------------------------------------------
fastboot is flashing to boot partition with kernel and edited ramdisk directory
fastboot boot kernel ramdisk folder (drag and drop kernel file and ramdisk folder)
---------------------------------------------------------------------------------------------------------------------
create boot.img and then flashing from fastboot
fastboot flash:raw boot kernel file ramdisk folder
---------------------------------------------------------------------------------------------------------------------
checking your devices connection with computer
fastboot devices
---------------------------------------------------------------------------------------------------------------------
fastboot factory reset (erasing userdata and cache)
fastboot -w
eg ; fastboot is erasing userdata and cache ,then updating update.zip file
fastboot -w update image.zip
---------------------------------------------------------------------------------------------------------------------
device serial no checking
fastboot -s
---------------------------------------------------------------------------------------------------------------------
product name checking of your device
fastboot -p
---------------------------------------------------------------------------------------------------------------------
override kernel commandline
fastboot -c
checking usb vendor id
fastboot -i
---------------------------------------------------------------------------------------------------------------------
adb reboot download     going into downloading mode or  VolDown+(Home)+Power.
adb reboot oem-1         going into fastboot mode
adb reboot bootloader နဲ႔ အတူတူပါ
---------------------------------------------------------------------------------------------------------------------
ZTE-C N600+
Call Key + End Key + Vol. Down + Power On to enter Fastboot Mode
how to remove pattern lock without usb debugging on and if your phone support fastboot then u can do with the following
fastboot devices ( check fastboot driver )
fastboot erase cache
fastboot erase userdata
fastboot reboot
Pattern Lock Removed !
To be use in case of forgetting to tick on USB Debugging Option & Non-Root Access.
---------------------------------------------------------------------------------------------------------------------
::Guide::-
Requirement::- root or enable Debug mode or fast boot mode.and device drivers must installed properly
Option 1-5, work with Debug Mode only. ,,,Option 6-7,a-b-d work with Fastboot Mode only.
-::Option details::-
1.Check Device connection to PC.
adb devices
2.Reset Face/PIN Lock without lost data.
adb devices
adb shell rm /data/system/password.key
adb reboot
3.Reset Face/Gesture Lock without lost data.
adb shell rm /data/system/gesture.key
adb reboot
4.Reset GMail
adb shell rm /data/data/com.android.providers.settings/databases/settings.db
adb shell rm /data/data/com.android.providers.settings/databases/settings.db-shm
adb shell rm /data/data/com.android.providers.settings/databases/settings.db-wal
adb reboot
5.Wipe Data for reset all data to factory setting.
adb shell su -c "echo >'--wipe_data' > /cache/recovery/command"
adb shell su -c "wipe data"
adb shell wipe data
adb reboot
6.Check Device On Fastboot Mode for check connection of device to on FastBoot mode.
fastboot devices
7.Wipe Data / Cache On Fastboot Mode for erase user data and cache on Fastboot Mode.
fastboot erase cache
fastboot erase userdata
fastboot reboot
8.Exit FastBoot.
fastboot reboot
9.Reboot for reboot device to normal mode or exit from adb shell.
adb reboot
a:Hard rest sped/qualcom phone in fastboot mode.
fastboot erase cache
fastboot erase userdata
b:Reboot phone
fastboot reboot
c:Hard reset/Unlock/wipe data on Allwinner platform Phone/tablets.
echo Waiting for device.
adb.exe wait-for-device
echo     please wait.
adb devices
adb remount
echo.
echo.
echo.
echo.
echo.
adb shell rm /data/data/com.android.providers.settings/databases/settings.db
adb shell rm /data/data/com.android.providers.settings/databases/settings.db-shm
adb shell rm /data/data/com.android.providers.settings/databases/settings.db-wal
echo                              Please wait...
echo.
echo  remove Gmail  Completed reboot device.
echo.
pause
adb reboot
d:Hang/patternlock/Wipe data/Unlock of Rockchip platform Phone/tablets.
---------------------------------------------------------------------------------------------------------------------
CWM command
explanation for you as much as i know after i have learnt a lot of roms .updater-script.   Comment here for problems
The update-binary is universal and does not need to be changed.you only need to change in  updater-script.   But only Chain fire reverses this process.
I am merely posting this here as a reference for you all.
I had to dig around a lot for this information and piece it together from several different threads as well as pull examples from updater-scripts in several different roms.
Everyone else put in the work, I am just trying to make it easier for the rest of us .
DO NOT USE NOTEPAD OR SOMETHING LIKE THAT SOFTWARE FOR MAKING UPDATER-SCRIPT, THEREFOR ERROR 6
RECOMMEND SOFTWARE FOR EDITING UPDATER-SCRIPT.
---------------------------------------------------------------------------------------------------------------------
META-INF(put following file in this folder)
META-INF/com/google/android/update-binary
META-INF/com/google/android/updater-script
META-INF/CERT.RSA
META-INF/CERT.SF
META-INF/MANIFEST.MF
---------------------------------------------------------------------------------------------------------------------
to put the file to system.img ,you must need busybox.(car)
with the help of busybox ,you can manage the system.img as you like.
you need  META-INF/com/google/android/updater-script (as a car driver)
without car and car driver,you cannot reach your products to your desire place.
car driver command,drive left,right,around,sometime you may face car accident (boot loop) for wrong driving(wrong permissions).
---------------------------------------------------------------------------------------------------------------------
there are a lot of step ,here is general steps
step1- ui_print("  "); descriptions
step2-format and mount("MTD", "system", "/system");
step3-package_extract_dir("system", "/system");
step4-give  Permissions eg; set_perm_recursive(0, 0, 0755, 0644, "/system");
step5-unmount the partitions and delete in /tmp,end with ui_print("  ");
----------------------------------------------------
ui_print("  ");=descriptions and advertising of your moblie school or phone no: or your name or your actions of doing........etc
ui_print("add your Descriptions ");
ui_print("your Text Here");
ui_print("message");
-----------------
you have to start with mount and end with unmount (partitions)
mount("kind", "what", "path");
mount("MTD", "system", "/system");
mount("yaffs2", "MTD", "system", "/system");
format("ext4", "EMMC", "/dev/block/mmcblk0p17", "0");
mount("MTD", "userdata", "/data");
mount("MTD", "cache", "/cache");
mount("MTD", "sdcard", "/sdcard");
-----------------
unmount code
unmount("/system");
unmount("/data"); OR unmount("/userdata");
unmount("/cache");
unmount("/sdcard");
---------------
Format and entire partition and start with a clean slate
format("MTD", "partition");
format("MTD", "system");
format("yaffs2", "MTD", "system");
format("MTD", "cache");
format("MTD", "data");
format("yaffs2", "MTD", "userdata");
format("MTD", "boot");
---------------
Copy files from your update.zip to phone partitions or sdcard.
from package location to partition location or
extract package to android phone system.
package_extract_dir("Source=file in update.zip", "Destination=android phone partitions eg data ,system,cust,boot,cache");
package_extract_dir("system", "/system");
package_extract_dir("data", "/data");
mount("vfat","/dev/block/mmcblk0p1","/sdcard");
package_extract_dir("sdcard", "/sdcard");
mount("ext4","/dev/block/mmcblk0p2","/sd-ext");
package_extract_dir("sdext", "/sd-ext");
-------------------
boot image flashing to android partitions
assert(package_extract_file("partition.img", "/tmp/partition.img");
write_raw_image("/tmp/partition.img", "partition"),
delete("/tmp/partition.img"));
eg for boot.img
package_extract_file("boot.img", "/tmp/boot.img");
write_raw_image("/tmp/boot.img", "boot");
delete("/tmp/boot.img");
eg;2
assert(package_extract_file("firmware.bin", "/tmp/firmware.bin"),
write_firmware_image("/tmp/firmware.bin", "firmware.bin"),
delete("/tmp/firmware.bin"));
-----------
The first command will delete and continue to delete if the previous delete failed. The second command (recursive) will stop if it fails to delete.
use "delete" for a single file and "recursive" for a directory.
meaning of recursive=repeating actions
delete("file/path");
delete_recursive("file/path");
eg ;
delete("/system/app/Email.apk");
delete_recursive("/data/dalvik-cache");
Deleting Folder:-
delete_recursive("/path/to/delete");
delete_recursive("/data/app");
Deleting Files:-
delete("/data/etc/hosts");
delete("pathToFile1", "pathToFile2", "pathToFile3");
 ----------------
folder permission
meaning of recursive=repeating actions
Recursive: set_perm_recursive(0, 2000, 0755, 0755, "/system/xbin");
set_perm_recursive(uid, gid, dmode, fmode, "path");
set_perm_recursive(1000, 1000, 0771, 0644, "/data/app");
File Permission
Single file: set_perm(0, 0, 06755, "/system/xbin/su");
set_perm(uid, gid, mode, "pathtofile");
set_perm(2000, 2000, 0771, "/data/etc");
--------------------
Symlink Setup
symlink("from","to");
symlink("destination", "pathToLink1", "pathToLink2", "pathToLink3");
symlink("/data/app/apps.apk", "/system/app/apps.apk");
symlink("/data/etc/hosts", "/system/etc/hosts");
------------------------
ToolBox Setup
 symlink("toolbox", "/system/bin/date");
---------------------------
Busybox Setup
run_program("filetorun", "option1", "option 2", "option 3");
run_program("installbusybox");
set_perm(0, 1000, 0755, "/system/xbin/busybox");
------------------------------
# Script Version: 1.0
ui_print(" ");
ui_print("-Testing EXT 4 File System With Busybox");
run_program("/sbin/busybox", "mount", "-t", "auto", "/dev/block/mmcblk0p2", "/sd-ext");
package_extract_dir("ext4_Busybox", "/sd-ext");
unmount("/sd-ext");

ui_print(" ");
ui_print("-Testing EXT 4 File System");
mount("ext4","/dev/block/mmcblk0p2","/sd-ext");
package_extract_dir("ext4", "/sd-ext");
unmount("/sd-ext");
ui_print(" ");
ui_print("-Testing EXT 3 File System");
mount("ext3","/dev/block/mmcblk0p2","/sd-ext");
package_extract_dir("ext3", "/sd-ext");
unmount("/sd-ext");

ui_print(" ");
ui_print("-Testing EXT 2 File System");
mount("ext2","/dev/block/mmcblk0p2","/sd-ext");
package_extract_dir("ext2", "/sd-ext");
unmount("/sd-ext");
ui_print(" ");
ui_print("-Testing Completed");
----------------------
installing busybox:
set_perm(0, 1000, 0755, "/system/xbin/busybox");
run_program("/sbin/sh","-c",
concat("( cd /system/xbin ; ",
" ./busybox --install -s /system/xbin )"));
--------------------------
Assert that the current system build fingerprint is one of the given strings.
assert(file_getprop("/system/build.prop", "ro.build.fingerprint") == "string" ||
file_getprop("/system/build.prop", "ro.build.fingerprint") == "string");
eg;
assert(!less_than_int(1357705085, getprop("ro.build.date.utc")));
assert(getprop("ro.product.device") == "hwy310-5000" ||
getprop("ro.build.product") == "hwy310-5000");
assert(getprop("ro.product.board") == "13310");
assert(getprop("ro.msms.phone_count") == "1sim");
----------------
Assert that the build on the device is older (or the same as) the given timestamp.
assert(!less_than_int(timestamp, getprop("ro.build.date.utc")));
------------
Assert that the device identifier is the given string.
assert(getprop("ro.product.device") == "string1" ||
getprop("ro.build.product") == "string2");
-----------------
Asert that the bootloader version is one of the given strings.
assert(getprop("ro.bootloader") == "string1" ||
getprop("ro.bootloader") == "string2");
----------------------
Update the progress bar, advancing it over 'frac' over the next 'dur' seconds. 'dur' may be zero to advance it via SetProgress commands instead of by time.
show_progress(frac, dur);
----------------------
Set the position of the progress bar within the chunk defined by the most recent ShowProgress call. 'frac' should be in [0,1] format.
set_progress(frac);
----------------------
Check that the given file (or MTD reference) has one of the given sha1 hashes.
assert(apply_patch_check("filepath", "sha1Hash", "sha1Hash"));
-----------------------
Check that there's at least 'amount' space that can be made available on /cache.
assert(apply_patch_space(amount));
-----------------------
BatFileProgramming.rar 267 KB   written by zin ko oo user or media
CONTINUE LEARNING AT OTHER SITES AS WELL
adb logcat
fastboot oem unlock
 adb install
There is also a -s switch which tries to install on the SD card if your ROM supports it, and the -l switch will forward lock the app (install it to /data/app-private).
adb sideload xxxxxxxx.zip
adb shell ls cat proc -al
adb shell cat proc/audio
adb shell cat proc/battery_debug
adb shell cat proc/boot_mode
adb shell cat proc/bootprof
adb shell cat proc/buddyinfo
adb shell cat proc/cgroups
adb shell cat proc/charge_protect
adb shell cat proc/cmdline
adb shell cat proc/consoles
adb shell cat proc/cpuinfo
adb shell cat proc/crypto
adb shell cat proc/devices
adb shell cat proc/diskstats
adb shell cat proc/dma-mappings
adb shell cat proc/dumchar_info
adb shell cat proc/emmc
adb shell cat proc/execdomains        linux kernel platforms
adb shell cat proc/fb
adb shell cat proc/filesystems
adb shell cat proc/fm
adb shell cat proc/gpt_stat          huawei timer
adb shell cat proc/interrupts
adb shell cat proc/iomem
adb shell cat proc/kallsyms
adb shell cat proc/kmsg             headache cmd
adb shell cat proc/kpagecount        headache cmd plus not responding
adb shell cat proc/kpageflags       headache cmd plus not responding
adb shell cat proc/last_kmsg     
adb shell cat proc/lk_env
adb shell cat proc/loadavg
adb shell cat proc/locks
adb shell cat proc/log_ts
adb shell cat proc/meminfo       memory  information
adb shell cat proc/memory_debug
adb shell cat proc/misc            miscellaneous partition view
adb shell cat proc/modules
adb shell cat proc/msdc_FT
adb shell cat proc/msdc_debug
adb shell cat proc/msdc_help
adb shell cat proc/msdc_tune
adb shell cat proc/msdc_tune_flag
adb shell cat proc/mtd
adb shell cat proc/mtkfb_size
adb shell cat proc/pagetypeinfo            block size info
adb shell cat proc/partitions
adb shell cat proc/rid
adb shell cat proc/sched_debug         cpu runtime info viewer
adb shell cat proc/schedstat       
adb shell cat proc/softirqs         cpu core info viewer
adb shell cat proc/stat
adb shell cat proc/swaps
adb shell cat proc/sysram
adb shell cat proc/sysram_flag
adb shell cat proc/timer_list
adb shell cat proc/uptime 
adb shell cat proc/version        linux version
adb shell cat proc/vmallocinfo
adb shell cat proc/vmallocinfo -> /sdcard/vmallocinfo.txt
adb shell cat proc/vmstat
adb shell cat proc/wdk
adb shell cat proc/yaffs
adb shell cat proc/zoneinfo
digging out form (adb shell dumpsys) there are alot of command of dumpsys.
some are unknown and some are useful.
adb shell dumpsys iphonesubinfo    ---imei
adb shell dumpsys battery             ---battery status
adb shell  dumpsys batteryinfo
adb shell dumpsys power              ---power status
adb shell dumpsys appwidget
adb shell dumpsys anrmanager
adb shell dumpsys alarm
adb shell dumpsys cpuinfo            ---cpu usage
adb shell dumpsys cpuinfo system
adb shell dumpsys meminfo          ---memory usage
adb shell dumpsys audio                 ---audio usage
adb shell dumpsys audioprofile
adb shell dumpsys diskstats             ---system data cache  usage
adb shell dumpsys meminfo system   -- system app memory usage
adb shell dumpsys media.player
adb shell dumpsys dreams
adb shell dumpsys dbinfo                   --checking database info eg which application is carrying password database ,/data/system/accounts.db is gmail password,
and data/data/com.facebook.katana/databases/prefs_db.db is facebook password  ,so if you know this ,you can easily backup your phone account password via adb command .eg adb pull ...../account.db
adb shell dumpsys audio policy         --seeing audio info
adb shell dumpsys audio flinger
adb shell dumpsys mount                   -seeing vol disk state eg sharing or not and sdcard internal 0 and external 1 check
adb shell dumpsys media.camera        --camera info and action info
adb shell dumpsys notification            -checking sim and sound ,viberate
adb shell dumpsys package                   -seeing application permissions
adb shell dumpsys telephony.registry           -phone in out info
adb shell dumpsys permission
adb shell dumpsys phone
adb shell dumpsys samplingprofiler         -seeing data/snapshots
adb shell dumpsys scheduling_policy
adb shell dumpsys search               -seeing searchable authorities
adb shell dumpsys search_engine
adb shell dumpsys sensorservice       -seeing sensor information in your phone eg; proximity senser,accelerometer,light sensor etc
adb shell dumpsys serial
adb shell dumpsys servicediscovery
adb shell dumpsys simphonebook
adb shell dumpsys simphonebook2
adb shell dumpsys statusbar     -seeing data on off,speaker status on off,notibar info checking etc...
adb shell dumpsys wifip2p
adb shell dumpsys window
adb shell dumpsys window windows
adb shell dumpsys window policy     -seeing safe mode ,screen info etc
adb shell dumpsys window animator       -seeing app animation,wallpaper live,animating applications etc
adb shell dumpsys window lastanr            -seeing date time
adb shell dumpsys window sessions
adb shell dumpsys window tokens
 -----------------------------------------------------------
Uni-Android Tool V-4.0.rar 4.2 MB  (original link from gsm forum) down
source code encrypted with digital lock ,decrypted by mr ko su to study easy for you all.
 -----------------------------------------------------------
https://www.facebook.com/mrko.su  (learning new things from Google and YouTube)I am just a learner and distributing and helping others without getting any money. And I enjoy helping……..
 -----------------------------------------------------------
If my learning guide useful for you, just like my page https://www.facebook.com/MusicSoftwareMedical (free education like page for new update Korea, japan, china, English musics and updated software, and updated medical news for international)
Thank you in advance
 -----------------------------------------------------------

No comments:

Post a Comment

300 250