Android
command 1
Press shift + right click in
adb.exe or fastboot.exe containing
folder comment here for problems
fastboot
command collectionsFastboot command made easyßsee this , guide by mrkosu
@echo off
cls
title: susutun tool
color 0a
echo fastboot options
echo.
fastboot shell
echo.
pause
---------------------------------------------------------------------------------------------------------------------
Fastboot ကေန insecure boot ေတြကို flash တဲ့အခါ Build number မကိုက္ရင္ hardware ပိုင္းေတြမွာ error ေတြ တက္ တတ္ပါတယ္ ဟိုးအရင္ y220t ေတြ ကင္မရာ ေဇာက္ထိုးျဖစ္တာ y210 ေတြမွာ wifi မရတာ အဲ့လိုမ်ဳိးေတြပါ အဲ့ဒီ့လို error မ်ိဳးမတက္ရေအာင္ ေအာက္က command သံုးပါ fastboot boot boot.img ပါဝါပြင့္လာပါ လိမ့္မယ္ Power ပိတ္ၿပီး ျပန္ဖြင့္လိုက္တာနဲ႔ insecure လုပ္ထားတာ ေပ်ာက္သြားမွာပါ Error တက္ေနမယ္ဆိုလဲ ပိတ္ၿပီးဖြင့္လိုက္တာနဲ႔ အေကာင္းအတိုင္းျပန္ျဖစ္မွာပါ
လုိအပ္ရင္ လို အပ္သလို အသံုးခ်လို ့ရေအာင္ ဖန္လံုးတင္တဲ့
fastboot command ေလးေတြပါ
အမ်ားၾကီးရိွပါတယ္
ဒါကနည္းနည္းေလးပါ ထပ္ျပီးေတာ့စုေနတယ္
Eg ;
fastboot boot boot.img
fastboot flash bootloader bootloader.img
fastboot reboot-bootloader
ping -n 5 127.0.0.1 >nul
fastboot flash radio radio.img
fastboot reboot-bootloader
ping -n 5 127.0.0.1 >nul
fastboot -w update image.zip
fastboot update update.zip
fastboot flashall boot.img recovery.img system.img (flash boot+recovery+system)
fastboot flash boot boot.img (fastboot flash partition named to be flash eg,boot or recovery or system or radio or bootloader+flash file name eg boot or recovery or system or radio or bootloader.img)
eg;
fastboot flash logo logo.bin
fastboot flash boot boot.img
fastboot flash recovery recovery.img
fastboot flash radio radio.img
fastboot flash radio-cdma radiocdma.img
fastboot flash bootloader bootloader.img
fastboot flash system system.img
fastboot flash -S 16M system system.img
fastboot flash -S 32M system system.img
fastboot -S 200M flash system system.img
fastboot
flash misc misc.img
fastboot
flash misc misc.img
fastboot %* getvar product 2>&1 |
findstr /r /c:"^product: *MSM8226" || echo Missmatching image and
device
fastboot %* getvar product 2>&1 |
findstr /r /c:"^product: *MSM8226" || exit /B 1
fastboot flash cust cust.imgfastboot flash modem NON-HLOS.bin
fastboot flash sbl1 sbl1.mbn
fastboot
flash sbl1bak sbl1.mbn
fastboot flash rpm rpm.mbn
fastboot
flash rpmbak rpm.mbn
fastboot flash tz tz.mbn
fastboot
flash tzbak tz.mbn
fastboot flash sdi sdi.mbnfastboot flash aboot emmc_appsboot.mbn
fastboot
flash abootbak emmc_appsboot.mbn
fastboot flash splash
splash.imgfastboot flash userdata userdata.img
fastboot -S 200M flash userdata userdata.img
fastboot flash cache cache.imgfastboot flash persist persist.img
fastboot flash efi efi.img
fastboot flash crc crc.img
fastboot flash curver curver.img
fastboot flash md5rsa md5rsa.img
fastboot flash verlist verlist.img
fastboot flash batt batt.img
fastboot flash modemimage modemimage.img
fastboot bbk unlock_vivo (unlock bootloader for vivo phone)
fastboot bbk lock_vivo (lock bootloader for vivo phone)
fastboot flash partition gpt_both0.bin
fastboot flash modemst1 modemst.mbn
fastboot flash modemst2 modemst.mbn
fastboot flash fsg PD1303_fs_image.tar.gz.mbn.img
fastboot flash persist persist.img
fastboot flash modem NON-HLOS.bin
fastboot
flash hyp hyp.mbn
fastboot
flash hypbak hyp.mbn
fastboot
flash sec sec.dat
fastboot
erase reserved
fastboot flash dbi sdi.mbn
fastboot flash sbl1 sbl1.mbn
fastboot flash aboot emmc_appsboot.mbn
fastboot flash rpm rpm.mbn
fastboot flash tz tz.mbn
fastboot flash udisk fat.img
fastboot -S 200M flash apps apps.img
---------------------------------------------------------------------------------------------------------------------fastboot oem get-bootinfo (to see boot loader version)
---------------------------------------------------------------------------------------------------------------------
Fastboot ကေန build number စစ္နည္း။ Firmware က်သြားလုိ႔ build_number စစ္လုိ႔မရေတာ့ရင္.
Vol down နဲ႔ Power key ကုိနွိပ္ၿပီး fastboot ေခၚပါ။ၿပီးတာနဲ႔
fastboot oem get-build-number ဆုိၿပီး ရုိက္ build number သိေတာ့ တင္ရတာအဆင္ေျပတာေပါ့။ Credit
---------------------------------------------------------------------------------------------------------------------
fastboot erase recovery(fastboot erase partition name eg recovery,boot,system,radio,bootloader)
---------------------------------------------------------------------------------------------------------------------
fastboot getvar (display boot loader version eg hboot version)
fastboot getvar product
---------------------------------------------------------------------------------------------------------------------
fastboot is flashing to boot partition with kernel and edited ramdisk directory
fastboot boot kernel ramdisk folder (drag and drop kernel file and ramdisk folder)
---------------------------------------------------------------------------------------------------------------------
create boot.img and then flashing from fastboot
fastboot flash:raw boot kernel file ramdisk folder
---------------------------------------------------------------------------------------------------------------------
checking your devices connection with computer
fastboot devices
---------------------------------------------------------------------------------------------------------------------
fastboot factory reset (erasing userdata and cache)
fastboot -w
eg ; fastboot is erasing userdata and cache ,then updating update.zip file
fastboot -w update image.zip
---------------------------------------------------------------------------------------------------------------------
device serial no checking
fastboot -s
---------------------------------------------------------------------------------------------------------------------
product name checking of your device
fastboot -p
---------------------------------------------------------------------------------------------------------------------
override kernel commandline
fastboot -c
checking usb vendor id
fastboot -i
---------------------------------------------------------------------------------------------------------------------
adb reboot download going into downloading mode or VolDown+(Home)+Power.
adb reboot oem-1 going into fastboot mode
adb reboot bootloader နဲ႔ အတူတူပါ
---------------------------------------------------------------------------------------------------------------------
ZTE-C
N600+
Call
Key + End Key + Vol. Down + Power On to enter Fastboot Mode
how to remove pattern lock without usb debugging on and if
your phone support fastboot then u can do with the following
fastboot
devices ( check fastboot driver )
fastboot
erase cache
fastboot
erase userdata
fastboot
reboot
Pattern Lock Removed !
To be use in case of forgetting to
tick on USB Debugging Option & Non-Root Access.
---------------------------------------------------------------------------------------------------------------------
::Guide::-
Requirement::- root or enable Debug mode or fast boot mode.and device
drivers must installed properly
Option
1-5, work with Debug Mode only. ,,,Option 6-7,a-b-d work with
Fastboot Mode only.
-::Option details::-
1.Check Device connection to PC.
adb
devices
2.Reset Face/PIN Lock without lost data.
adb
devices
adb
shell rm /data/system/password.key
adb
reboot
3.Reset Face/Gesture Lock without lost data.
adb
shell rm /data/system/gesture.key
adb
reboot
4.Reset GMail
adb
shell rm /data/data/com.android.providers.settings/databases/settings.db
adb
shell rm /data/data/com.android.providers.settings/databases/settings.db-shm
adb
shell rm /data/data/com.android.providers.settings/databases/settings.db-wal
adb
reboot
5.Wipe Data for reset all data to factory setting.
adb shell su -c "echo >'--wipe_data' >
/cache/recovery/command"
adb shell su -c "wipe data"
adb
shell wipe data
adb
reboot
6.Check Device On Fastboot Mode for check connection of
device to on FastBoot mode.
fastboot
devices
7.Wipe Data / Cache On Fastboot Mode for erase user data and
cache on Fastboot Mode.
fastboot
erase cache
fastboot
erase userdata
fastboot
reboot
8.Exit FastBoot.
fastboot
reboot
9.Reboot for reboot device to normal mode or exit from adb
shell.
adb
reboot
a:Hard rest sped/qualcom phone in fastboot mode.
fastboot
erase cache
fastboot
erase userdata
b:Reboot phone
fastboot
reboot
c:Hard reset/Unlock/wipe data on Allwinner platform
Phone/tablets.
echo
Waiting for device.
adb.exe
wait-for-device
echo please wait.
adb
devices
adb
remount
echo.
echo.
echo.
echo.
echo.
adb
shell rm /data/data/com.android.providers.settings/databases/settings.db
adb
shell rm /data/data/com.android.providers.settings/databases/settings.db-shm
adb
shell rm /data/data/com.android.providers.settings/databases/settings.db-wal
echo Please wait...
echo.
echo remove Gmail
Completed reboot device.
echo.
pause
adb
reboot
d:Hang/patternlock/Wipe data/Unlock of Rockchip platform
Phone/tablets.
---------------------------------------------------------------------------------------------------------------------
CWM
command
explanation for you as much as i know after i have learnt a
lot of roms .updater-script. Comment
here for problems
The
update-binary is universal and does not need to be changed.you only need to
change in updater-script.
But only
Chain fire reverses this process.
I am merely posting this here as a reference for you all.
I had
to dig around a lot for this information and piece it together from several
different threads as well as pull examples from updater-scripts in several
different roms.
Everyone
else put in the work, I am just trying to make it easier for the rest of us .
DO
NOT USE NOTEPAD OR SOMETHING LIKE THAT SOFTWARE FOR MAKING
UPDATER-SCRIPT, THEREFOR ERROR 6
RECOMMEND SOFTWARE FOR EDITING UPDATER-SCRIPT.
---------------------------------------------------------------------------------------------------------------------
META-INF(put following file in this folder)
META-INF/com/google/android/update-binary
META-INF/com/google/android/updater-script
META-INF/CERT.RSA
META-INF/CERT.SF
META-INF/MANIFEST.MF
---------------------------------------------------------------------------------------------------------------------
to put the file to system.img ,you must need busybox.(car)
with
the help of busybox ,you can manage the system.img as you like.
you need
META-INF/com/google/android/updater-script (as a car driver)
without car and car driver,you cannot reach your products to
your desire place.
car
driver command,drive left,right,around,sometime you may face car
accident (boot loop) for
wrong driving(wrong permissions).
---------------------------------------------------------------------------------------------------------------------
there are a lot of step ,here is general steps
step1- ui_print(" ");
descriptions
step2-format and mount("MTD", "system",
"/system");
step3-package_extract_dir("system", "/system");
step4-give
Permissions eg; set_perm_recursive(0, 0, 0755, 0644, "/system");
step5-unmount the partitions and delete in /tmp,end with
ui_print(" ");
----------------------------------------------------
ui_print(" ");=descriptions and advertising
of your moblie school or phone no: or your name or your actions of
doing........etc
ui_print("add your Descriptions ");
ui_print("your Text Here");
ui_print("message");
-----------------
you have to start with mount and end with unmount
(partitions)
mount("kind", "what", "path");
mount("MTD",
"system", "/system");
mount("yaffs2",
"MTD", "system", "/system");
format("ext4",
"EMMC", "/dev/block/mmcblk0p17", "0");
mount("MTD",
"userdata", "/data");
mount("MTD",
"cache", "/cache");
mount("MTD",
"sdcard", "/sdcard");
-----------------
unmount
code
unmount("/system");
unmount("/data");
OR unmount("/userdata");
unmount("/cache");
unmount("/sdcard");
---------------
Format and entire partition and start with a clean slate
format("MTD",
"partition");
format("MTD",
"system");
format("yaffs2",
"MTD", "system");
format("MTD",
"cache");
format("MTD",
"data");
format("yaffs2",
"MTD", "userdata");
format("MTD",
"boot");
---------------
Copy
files from your update.zip to phone partitions or sdcard.
from package location to partition location or
extract package to android phone system.
package_extract_dir("Source=file in update.zip",
"Destination=android phone partitions eg data
,system,cust,boot,cache");
package_extract_dir("system",
"/system");
package_extract_dir("data",
"/data");
mount("vfat","/dev/block/mmcblk0p1","/sdcard");
package_extract_dir("sdcard",
"/sdcard");
mount("ext4","/dev/block/mmcblk0p2","/sd-ext");
package_extract_dir("sdext",
"/sd-ext");
-------------------
boot
image flashing to android partitions
assert(package_extract_file("partition.img",
"/tmp/partition.img");
write_raw_image("/tmp/partition.img",
"partition"),
delete("/tmp/partition.img"));
eg for boot.img
package_extract_file("boot.img",
"/tmp/boot.img");
write_raw_image("/tmp/boot.img",
"boot");
delete("/tmp/boot.img");
eg;2
assert(package_extract_file("firmware.bin",
"/tmp/firmware.bin"),
write_firmware_image("/tmp/firmware.bin",
"firmware.bin"),
delete("/tmp/firmware.bin"));
-----------
The
first command will delete and continue to delete if the previous delete failed.
The second command (recursive) will stop if it fails to delete.
use
"delete" for a single file and "recursive" for a directory.
meaning of recursive=repeating actions
delete("file/path");
delete_recursive("file/path");
eg ;
delete("/system/app/Email.apk");
delete_recursive("/data/dalvik-cache");
Deleting Folder:-
delete_recursive("/path/to/delete");
delete_recursive("/data/app");
Deleting Files:-
delete("/data/etc/hosts");
delete("pathToFile1", "pathToFile2",
"pathToFile3");
----------------
folder
permission
meaning of recursive=repeating actions
Recursive: set_perm_recursive(0, 2000, 0755, 0755, "/system/xbin");
set_perm_recursive(uid, gid, dmode, fmode,
"path");
set_perm_recursive(1000,
1000, 0771, 0644, "/data/app");
File
Permission
Single file: set_perm(0, 0, 06755, "/system/xbin/su");
set_perm(uid, gid, mode, "pathtofile");
set_perm(2000,
2000, 0771, "/data/etc");
--------------------
Symlink Setup
symlink("from","to");
symlink("destination", "pathToLink1",
"pathToLink2", "pathToLink3");
symlink("/data/app/apps.apk",
"/system/app/apps.apk");
symlink("/data/etc/hosts",
"/system/etc/hosts");
------------------------
ToolBox Setup
symlink("toolbox",
"/system/bin/date");
---------------------------
Busybox Setup
run_program("filetorun", "option1",
"option 2", "option 3");
run_program("installbusybox");
set_perm(0,
1000, 0755, "/system/xbin/busybox");
------------------------------
# Script Version: 1.0
ui_print("
");
ui_print("-Testing
EXT 4 File System With Busybox");
run_program("/sbin/busybox",
"mount", "-t", "auto",
"/dev/block/mmcblk0p2", "/sd-ext");
package_extract_dir("ext4_Busybox",
"/sd-ext");
unmount("/sd-ext");
ui_print("
");
ui_print("-Testing
EXT 4 File System");
mount("ext4","/dev/block/mmcblk0p2","/sd-ext");
package_extract_dir("ext4",
"/sd-ext");
unmount("/sd-ext");
ui_print("
");
ui_print("-Testing
EXT 3 File System");
mount("ext3","/dev/block/mmcblk0p2","/sd-ext");
package_extract_dir("ext3",
"/sd-ext");
unmount("/sd-ext");
ui_print("
");
ui_print("-Testing
EXT 2 File System");
mount("ext2","/dev/block/mmcblk0p2","/sd-ext");
package_extract_dir("ext2",
"/sd-ext");
unmount("/sd-ext");
ui_print("
");
ui_print("-Testing
Completed");
----------------------
installing busybox:
set_perm(0,
1000, 0755, "/system/xbin/busybox");
run_program("/sbin/sh","-c",
concat("(
cd /system/xbin ; ",
"
./busybox --install -s /system/xbin )"));
--------------------------
Assert
that the current system build fingerprint is one of the given strings.
assert(file_getprop("/system/build.prop",
"ro.build.fingerprint") == "string" ||
file_getprop("/system/build.prop",
"ro.build.fingerprint") == "string");
eg;
assert(!less_than_int(1357705085,
getprop("ro.build.date.utc")));
assert(getprop("ro.product.device") ==
"hwy310-5000" ||
getprop("ro.build.product") ==
"hwy310-5000");
assert(getprop("ro.product.board") == "13310");
assert(getprop("ro.msms.phone_count") ==
"1sim");
----------------
Assert that the build on the device is older (or the same
as) the given timestamp.
assert(!less_than_int(timestamp,
getprop("ro.build.date.utc")));
------------
Assert that the device identifier is the given string.
assert(getprop("ro.product.device") ==
"string1" ||
getprop("ro.build.product") ==
"string2");
-----------------
Asert that the bootloader version is one of the given
strings.
assert(getprop("ro.bootloader") ==
"string1" ||
getprop("ro.bootloader") == "string2");
----------------------
Update the progress bar, advancing it over 'frac' over the
next 'dur' seconds. 'dur' may be zero to advance it via SetProgress commands
instead of by time.
show_progress(frac, dur);
----------------------
Set the position of the progress bar within the chunk
defined by the most recent ShowProgress call. 'frac' should be in [0,1] format.
set_progress(frac);
----------------------
Check that the given file (or MTD reference) has one of the given
sha1 hashes.
assert(apply_patch_check("filepath",
"sha1Hash", "sha1Hash"));
-----------------------
Check that there's at least 'amount' space that can be made
available on /cache.
assert(apply_patch_space(amount));
-----------------------
CONTINUE LEARNING AT OTHER SITES AS WELL
--Linux
Commands on Android ßSEE
adb
logcat
fastboot
oem unlock
adb install
There is also a -s switch which tries to install on the SD card if your ROM
supports it, and the -l
switch will forward lock the app (install it to /data/app-private).
adb sideload
xxxxxxxx.zip
adb shell ls cat proc -al
adb shell cat proc/audio
adb shell cat proc/battery_debug
adb shell cat
proc/boot_mode
adb shell cat proc/bootprof
adb shell cat proc/buddyinfo
adb shell cat proc/cgroups
adb shell cat proc/charge_protect
adb shell cat proc/cmdline
adb shell cat proc/consoles
adb shell cat
proc/cpuinfo
adb shell cat proc/crypto
adb shell cat proc/devices
adb shell cat proc/diskstats
adb shell cat proc/dma-mappings
adb shell cat
proc/dumchar_info
adb shell cat proc/emmc
adb shell cat proc/execdomains linux kernel platforms
adb shell cat proc/fb
adb shell cat proc/filesystems
adb shell cat proc/fm
adb shell cat proc/gpt_stat huawei timer
adb shell cat proc/interrupts
adb shell cat proc/iomem
adb shell cat proc/kallsyms
adb shell cat proc/kmsg headache cmd
adb shell cat proc/kpagecount headache cmd plus not responding
adb shell cat proc/kpageflags headache cmd plus not responding
adb shell cat proc/last_kmsg
adb shell cat proc/lk_env
adb shell cat proc/loadavg
adb shell cat proc/locks
adb shell cat proc/log_ts
adb shell cat
proc/meminfo memory information
adb shell cat proc/memory_debug
adb shell cat
proc/misc miscellaneous
partition view
adb shell cat proc/modules
adb shell cat proc/msdc_FT
adb shell cat proc/msdc_debug
adb shell cat proc/msdc_help
adb shell cat proc/msdc_tune
adb shell cat proc/msdc_tune_flag
adb shell cat
proc/mtd
adb shell cat proc/mtkfb_size
adb shell cat
proc/pagetypeinfo block
size info
adb shell cat
proc/partitions
adb shell cat proc/rid
adb shell cat proc/sched_debug cpu runtime info viewer
adb shell cat proc/schedstat
adb shell cat
proc/softirqs cpu core
info viewer
adb shell cat proc/stat
adb shell cat proc/swaps
adb shell cat proc/sysram
adb shell cat proc/sysram_flag
adb shell cat proc/timer_list
adb shell cat proc/uptime
adb shell cat proc/version linux version
adb shell cat proc/vmallocinfo
adb shell cat proc/vmallocinfo -> /sdcard/vmallocinfo.txt
adb shell cat proc/vmstat
adb shell cat proc/wdk
adb shell cat proc/yaffs
adb shell cat proc/zoneinfo
digging out form (adb shell dumpsys) there are alot of
command of dumpsys.
some are unknown and some are useful.
adb shell dumpsys
iphonesubinfo ---imei
adb shell dumpsys
battery ---battery status
adb shell dumpsys batteryinfo
adb shell dumpsys
power ---power status
adb shell dumpsys appwidget
adb shell dumpsys anrmanager
adb shell dumpsys
alarm
adb shell dumpsys
cpuinfo ---cpu usage
adb shell dumpsys cpuinfo system
adb shell dumpsys
meminfo ---memory usage
adb shell dumpsys
audio ---audio
usage
adb shell dumpsys audioprofile
adb shell dumpsys
diskstats ---system
data cache usage
adb shell dumpsys
meminfo system -- system app
memory usage
adb shell dumpsys
media.player
adb shell dumpsys
dreams
adb shell dumpsys
dbinfo
--checking database info eg which application is carrying password
database ,/data/system/accounts.db
is gmail password,
and data/data/com.facebook.katana/databases/prefs_db.db
is facebook password ,so if you know
this ,you can easily backup your phone account password via adb command .eg adb
pull ...../account.db
adb shell dumpsys
audio policy --seeing
audio info
adb shell dumpsys audio flinger
adb shell dumpsys mount -seeing vol disk state eg
sharing or not and sdcard internal 0 and external 1 check
adb shell dumpsys
media.camera --camera info
and action info
adb shell dumpsys
notification -checking
sim and sound ,viberate
adb shell dumpsys
package -seeing
application permissions
adb shell dumpsys
telephony.registry
-phone in out info
adb shell dumpsys permission
adb shell dumpsys phone
adb shell dumpsys samplingprofiler -seeing data/snapshots
adb shell dumpsys scheduling_policy
adb shell dumpsys search -seeing searchable authorities
adb shell dumpsys search_engine
adb shell dumpsys
sensorservice -seeing sensor
information in your phone eg; proximity senser,accelerometer,light sensor etc
adb shell dumpsys serial
adb shell dumpsys servicediscovery
adb shell dumpsys simphonebook
adb shell dumpsys simphonebook2
adb shell dumpsys
statusbar -seeing data on
off,speaker status on off,notibar info checking etc...
adb shell dumpsys wifip2p
adb shell dumpsys window
adb shell dumpsys window windows
adb shell dumpsys
window policy -seeing safe
mode ,screen info etc
adb shell dumpsys window animator -seeing app animation,wallpaper
live,animating applications etc
adb shell dumpsys window lastanr -seeing date time
adb shell dumpsys window sessions
adb shell dumpsys window tokens
-----------------------------------------------------------
source code encrypted with digital lock ,decrypted
by mr ko su to study easy for you all.
-----------------------------------------------------------
https://www.facebook.com/mrko.su (learning new things from Google and
YouTube)I am just a learner and distributing and helping others without getting
any money. And I enjoy helping……..
-----------------------------------------------------------
If my learning guide useful for you, just like my
page https://www.facebook.com/MusicSoftwareMedical
(free education like page for new update Korea, japan, china, English musics
and updated software, and updated medical news for international)
Thank you in advance
-----------------------------------------------------------
No comments:
Post a Comment