Question Request: Run a few "adb shell" commands on a Xiaomi 11 - Xiaomi Mi 11

Hey you lucky Mi 11 owners,
I'm trying to compile a database for Android Devices - something like the Grade Partition Table Reference started a while ago here @xda, but a lot more detailed, including:
-cat /proc/cpuinfo
- getprop
- service list
- lshal
- ps -Zef
- ls -l /dev
- ls -l /dev/block/by-name
- cat /proc/partitions
- df
- mount
- dumpsys (lots of output)
I make the results public at http://newandroidbook.com/ddb/ so other people, primarily researchers and rooters/modders, can benefit. Any help would be *greatly* appreciated. It's really simple to do this (especially on Linux, just use "script" then "adb shell", then run all these , exit from device, exit from script, and grab typescript.txt)

I have sent my debugging records, copied and saved by CMD of win10. Because my linux can't seem to load usb

G731882624 said:
I have sent my debugging records, copied and saved by CMD of win10. Because my linux can't seem to load usb
Click to expand...
Click to collapse
That's great! Thank you! But... where did you send them? I didn't get anything either here or at the [email protected] mail..
And btw, running "Adb" as root usually fixes the usb problems on Linux. Either that, or changing dev rules

morpheus______ said:
That's great! Thank you! But... where did you send them? I didn't get anything either here or at the [email protected] mail..
And btw, running "Adb" as root usually fixes the usb problems on Linux. Either that, or changing dev rules
Click to expand...
Click to collapse
Oh, I probably sent the wrong email address. I am using the Linux subsystem under win10. Run lsusb to get [email protected]:/mnt/c/Users/Ge# lsusb
unable to initialize libusb: -99

G731882624 said:
Oh, I probably sent the wrong email address. I am using the Linux subsystem under win10. Run lsusb to get [email protected]:/mnt/c/Users/Ge# lsusb
unable to initialize libusb: -99
Click to expand...
Click to collapse
Is it the address at [email protected]? . .

G731882624 said:
Is it the address at [email protected]? . .
Click to expand...
Click to collapse
Got it! Thank you so much! This is super helpful!!!

how to root ?any one can help?

feng.zh.cfo said:
how to root ?any one can help?
Click to expand...
Click to collapse
It should be as easy as unlocking the bootloader and trying magisk through Magisk Manager on the boot.img from the OTA (which I put at http://NewAndroidbook.com/ddb/Mi11/OTA). Let me know if you need help with that.

feng.zh.cfo said:
how to root ?any one can help?
Click to expand...
Click to collapse
I am rooted, very simple

G731882624 said:
I am rooted, very simple
Click to expand...
Click to collapse
I have unlocked the bootloader, what should I do?Can you give me detailed steps, thank you!

I have unlocked the bootloader, what should I do?Can you give me detailed steps, thank you!
morpheus______ said:
It should be as easy as unlocking the bootloader and trying magisk through Magisk Manager on the boot.img from the OTA (which I put at http://NewAndroidbook.com/ddb/Mi11/OTA). Let me know if you need help with that.
Click to expand...
Click to collapse
I have unlocked the bootloader, what should I do?Can you give me detailed steps, thank you!

morpheus______ said:
It should be as easy as unlocking the bootloader and trying magisk through Magisk Manager on the boot.img from the OTA (which I put at http://NewAndroidbook.com/ddb/Mi11/OTA). Let me know if you need help with that.
Click to expand...
Click to collapse
I have unlocked the bootloader, what should I do?Can you give me detailed steps, thank you!

morpheus______ said:
Got it! Thank you so much! This is super helpful!!!
Click to expand...
Click to collapse
I'm rooted, I will do the un-debugged part later

127|venus:/data/local/tmp # ./bindump
Usage: bindump [-h|-?]
bindump [ns] list
bindump [ns] check SERVICE
bindump [ns] call SERVICE [i32 N | i64 N | s16 STR ] ...
bindump [ns] users SERVICE # As per my 'bindump' tool (try 'all' for SERVICE)
bindump [ns] dump SERVICE # As per 'dumpsys' tool
Where: [ns] is optionally 'binder' (default), 'hwbinder' or 'vndbinder'
Bindump, Dumpsys, Service & more - v0.1 - By Jonathan Levin
This tool is part of the resources for 'Android Internals', Volume II
Free for non-commercial use at http://NewAndroidBook.com/
用于商业用途(和纯C活页夹库)mail://[email protected]
I don’t know how to enter next to get debugging information

127|venus:/data/local/tmp # ./bindump users all
venus:/data/local/tmp #
For example, he has no output

G731882624 said:
127|venus:/data/local/tmp # ./bindump users all
venus:/data/local/tmp #
For example, he has no output
Click to expand...
Click to collapse
That happens if debugs is not mounted
mount -t debugfs none /sys/kernel/debug
fixes problem

Related

[HACK] Busybox for HTC Tattoo - CoburnBrew Flavor! :D

This little gem of a phone is a tough little thing to custom install apps on, but that didn't stop the Coburn from being able to get busybox installed.
Therefore, introducing Busybox for your HTC Click/Tattoo!
FOLLOW THIS TUTORIAL CAREFULLY. This guide may brick or NOT brick your Tattoo (most likely the latter), however I cannot assure you that it's 100% fail proof. I have installed it successfully. IN OTHER WORDS: THIS IS NOT FOR THE FAINT HEARTED! IF YOU DO NOT KNOW WHAT 'FLASH','ADB' OR 'HACK' MEANS, PLEASE DO NOT CONTINUE.
Requirements:
1 HTC Tattoo (The Victim)
1 MS Windows Powered Computer (I used Win7 64Bit)
1 HTC Tattoo -> USB Cable (Included with phone... Well, it was in the box).
Download the package attached to this post. Extract all files to a directory like C:\BUSYCLICK . (Actually, please extract them there).
Installation
Connect your Tattoo to your phone, make sure USB Debugging is enabled (Settings -> Applications -> Development) and sit back. Windows should say "New Hardware! OMG!" and ask "What is this piece of tech?" (aka New Hardware Install Wizard). On XP, allow to search Windows Update. On Vista/7, I'm going to have to get back to you on that. The installed driver will be like "HTC Dream blah blah blah ADB Interface" or something. Odd why it says it's a HTC Dream...
Anyway, go to the folder where you extracted the files, and run the Installation.bat file. It's the one that says "Installation" With the cogs icon.
You'll get a DOS Prompt and some text, PAY ATTENTION! My installer will hold your hand and explain what's happening. Should any errors occur, you may be out of space on your Tattoo's internal memory or something. If you do get errors, please post them here! I'll try to fix them for you guys and girls.
Post-install tasks
When complete, run the TestBusybox.bat script in the same folder where you extracted the BusyBox files, and you should get some output. If not, busybox failed to install... Let me know what the error is and I'll try to fix it.
Notes:
You can use the busybox commands in /data/local/bin from "adb shell" or a terminal emulator on the phone itself... /data/local/bin/sh DOES NOT work from adb shell, I don't know why. It will work using a terminal emulator. Try "/data/local/bin/free" and such for some memory read outs, etc, etc.
Feel free to love/like/hate/kill/shoot my work, you can expect to see ROMs and the like in the near future as I love hacking devices.
Cheers,
Coburn64
Ok busybox installed normally...
Do i have root acces with busybox now? I dont see su...
C:\Busybox>adb shell /data/local/busybox ls /data
ls: can't open '/data': Permission denied
I do see /data/local and under tho... including ../bin and ../rights but dont see any use of it...
Coburn Hi, this is a step closer to being root
can be root in busybox?
chmod command does?
thx
Code:
benno.id.au/blog/2007/11/14/android-busybox
chmod command is useless without su...If only su worked
Installed and worked fine, can run busybox but:
it runs with shell privileges
setting setuid bit doesn't solve, because I can chown to root
Do I miss something?
Thanks Really appreciate your work!
Do you have to install the new RUU Click HTC WWE 1.63.405.1 WWE test signed NoDriver first?
coolbits said:
Code:
benno.id.au/blog/2007/11/14/android-busybox
chmod command is useless without su...If only su worked
Click to expand...
Click to collapse
I know friend!
I asked the chmod without adb, or if they could use the chmod as root from the busibox console
leon1984 said:
I know friend!
I asked the chmod without adb, or if they could use the chmod as root from the busibox console
Click to expand...
Click to collapse
All this does is allows you to run more commands from the shell in Android, whereas the standard shell doesn't have many commands built-in. Could be used in conjuction with a root hack.
One step more, but nothing to do with root
I'm starting to believe that Click will never have a root method working because its underused compared with other android devices
MiSSigNNo said:
One step more, but nothing to do with root
I'm starting to believe that Click will never have a root method working because its underused compared with other android devices
Click to expand...
Click to collapse
The next Linux kernel root vulnerability (which works on the Tattoo) should bring us root, as well as other Android devices such as the Eris.
coolbho3000 said:
The next Linux kernel root vulnerability (which works on the Tattoo) should bring us root, as well as other Android devices such as the Eris.
Click to expand...
Click to collapse
What's the new root vulnerability? Is it something that was just discovered?
coolbho3000 said:
The next Linux kernel root vulnerability (which works on the Tattoo) should bring us root, as well as other Android devices such as the Eris.
Click to expand...
Click to collapse
Ok, where to find more info about this? :S
coolbho3000 said:
The next Linux kernel root vulnerability (which works on the Tattoo) should bring us root, as well as other Android devices such as the Eris.
Click to expand...
Click to collapse
I was able to install Busybox on my phone successfully. But the problem is I don't know what it's for. Would anyone be kind enough to post a link or a tutorial for this? Thanks.
sheik_yerbouti said:
I was able to install Busybox on my phone successfully. But the problem is I don't know what it's for. Would anyone be kind enough to post a link or a tutorial for this? Thanks.
Click to expand...
Click to collapse
Busybox just allows you to use more features at the adb shell command line. So, yeah. Heh.
You lost me at 'adb shell command line'. Is that some command line provided by the Android SDK?
sheik_yerbouti said:
You lost me at 'adb shell command line'. Is that some command line provided by the Android SDK?
Click to expand...
Click to collapse
Sorry if I lost you. Let me sum it up: It's a 'feature pack' for Android Developers, which could be used in conjunction with rooting tools.
Coburn64 said:
What's the new root vulnerability? Is it something that was just discovered?
Click to expand...
Click to collapse
zenthought.org/content/file/android-root-2009-08-16-source
This is linked in the other thread...
ivendor said:
zenthought.org/content/file/android-root-2009-08-16-source
This is linked in the other thread...
Click to expand...
Click to collapse
That code is old, and apparently won't work. It won't compile either, Paul from Modaco tried it and it just spat the dummy and gave a make error.
Coburn64 said:
That code is old, and apparently won't work. It won't compile either, Paul from Modaco tried it and it just spat the dummy and gave a make error.
Click to expand...
Click to collapse
That's the code for the old asroot exploit (used in the Hero IIRC). It's been patched in August/09 so it won't affect the kernel in stock Tattoos.
Yeah, that's what I was getting at - the exploit is too old.
We need to either:
1) Get a S-OFF bootloader
2) Find another working root exploit
3) Dig around in the test ROM and extract the SU binary out of that sucker and put it in /data/local on the working ROM.
I think I can do the latter.

[How To] Manually enable sideloading

First of all, Linux and OS X come with sqlite3 by default. Windows users will need to download the executable. With that said, here is how you can enable sideloading the old-fashioned way.
Code:
[[email protected] ~]$ adb shell
$ su
# busybox cp /data/data/com.android.providers.settings/databases/settings.db /data/data/com.android.providers.settings/databases/settings.db.bak
# chown system.system /data/data/com.android.providers.settings/databases/settings.db
# ls -l /data/data/com.android.providers.settings/databases/settings.db*
# busybox cp /data/data/com.android.providers.settings/databases/settings.db /sdcard
# exit
$ exit
[[email protected] ~]$ adb pull /sdcard/settings.db
sqlite3 settings.db
sqlite> SELECT * FROM secure WHERE name="install_non_market_apps";
3|install_non_market_apps|0
sqlite> UPDATE secure SET value=1 WHERE name="install_non_market_apps";
sqlite> SELECT * FROM secure WHERE name="install_non_market_apps";
3|install_non_market_apps|1
sqlite> .quit
[[email protected] ~]$ adb push settings.db /sdcard/
[[email protected] ~]$ adb shell
$ su
# busybox cp /sdcard/settings.db /data/data/com.android.providers.settings/databases/settings.db
# chown system.system /data/data/com.android.providers.settings/databases/settings.db
# ls -l /data/data/com.android.providers.settings/databases/settings.db*
# exit
$ exit
[[email protected] ~]$ adb reboot
You should be all set.
thank god for super one click
Script?
Sent from my MB860 using XDA Premium App
lsxrx7 said:
thank god for super one click
Click to expand...
Click to collapse
1) Great if you use Wind'oh!s which I refuse to do.
2) I like to know how things work.
I think this work on only rooted devices. If that case we have one already which will root it and also side load apps.
You got the phone gdanko?! Cool
I'll do it this way for kicks when I get my phone lol
gdanko said:
1) Great if you use Wind'oh!s which I refuse to do.
2) I like to know how things work.
Click to expand...
Click to collapse
Yes, it's always great to know how things work.
But it looks like SuperOneClick is not just confined to Windows.
It is compatible with:
Windows Vista
Windows 7
Ubuntu Hardy (8.04 LTS)
Ubuntu Jaunty (9.04)
Ubuntu Karmic (9.10)
Ubuntu Lucid (10.04 LTS)
Ubuntu Maverick (10.10)
Debian Lenny (5.0)
Debian Squeeze (testing)
Debian Sid (unstable)
Debian Experimental
SuperOneClick uses Mono on Linux platforms, so most any of the modern ones should work. I used it on my openSUSE box and it worked just fine for allowing non-market installs.
Can anyone do this a little more nood friendly? And/or does this require root?
phro321 said:
Can anyone do this a little more nood friendly? And/or does this require root?
Click to expand...
Click to collapse
Yeah, you basically want to get out of this thread and head here:
http://forum.xda-developers.com/showthread.php?t=960336
Follow briefmobile's tutorial. And yes, it requires root.
If I am not mistaken gdanko doesnt use any of those operating systems. He uses a mac...
Maybe his old school ways will help uncover some mysterious portal into the Atrix that will allow cracking the bootloader...
I just finished running superoneclick. I wanted to double check that my phone is now allowing unknown sources, but i dont see the checkbox where it should be. Is this normal? Thanks!
__redfox__ said:
I just finished running superoneclick. I wanted to double check that my phone is now allowing unknown sources, but i dont see the checkbox where it should be. Is this normal? Thanks!
Click to expand...
Click to collapse
I guess the check box is not added, but superoneclick did do its job. The phone is communicating with the laptop as expected.
__redfox__ said:
I guess the check box is not added, but superoneclick did do its job. The phone is communicating with the laptop as expected.
Click to expand...
Click to collapse
Follow this to add the check box: http://forum.xda-developers.com/showthread.php?t=972760
agentdr8 said:
SuperOneClick uses Mono on Linux platforms, so most any of the modern ones should work. I used it on my openSUSE box and it worked just fine for allowing non-market installs.
Click to expand...
Click to collapse
Fails on Ubuntu 64. And installing mono and a host of other things for something so trivial is pointless.
Thank you, I needed this sideloading hack since I've already updated/rooted my phone and couldn't use Gladatrix or aRoot without having to reflash 1.26
------------
edit: Actually it got my phone stuck in bootloader with my configuration (1.57 update and rooted). SBF flashing now..
marlasinger said:
Thank you, I needed this sideloading hack since I've already updated/rooted my phone and couldn't use Gladatrix or aRoot without having to reflash 1.26
------------
edit: Actually it got my phone stuck in bootloader with my configuration (1.57 update and rooted). SBF flashing now..
Click to expand...
Click to collapse
Hey How did you root your 1.57?
Spoofy said:
Hey How did you root your 1.57?
Click to expand...
Click to collapse
Go to the GladRoot thread linked in my signature below. Please use the search function in the future.
Ririal said:
Go to the GladRoot thread linked in my signature below. Please use the search function in the future.
Click to expand...
Click to collapse
Lose the attitude buddy.
Don't tell me to search, as I have been googling and searching this forum for over a week and found nothing but SuperOneClick which also required me to downgrade.
I probably missed it due to "Last edited by Ririal; 23rd April 2011 at 01:40 AM. Reason: Updates"
Unfortunately this is still not what I am looking for as I am on 1.57 and am still required to downgrade.
Please have some respect.
EDIT: I'ts also not in the sticky thread
EDIT #2: I just found [HOWTO] Easy Root 1.5.7 using GingerBreak which popped up on the 23rd. WOHOOO, no need to downgrade and risk Wifi issues.
Spoofy said:
Lose the attitude buddy.
Don't tell me to search, as I have been googling and searching this forum for over a week and found nothing but SuperOneClick which also required me to downgrade.
I probably missed it due to "Last edited by Ririal; 23rd April 2011 at 01:40 AM. Reason: Updates"
Unfortunately this is still not what I am looking for as I am on 1.57 and am still required to downgrade.
Please have some respect.
EDIT: I'ts also not in the sticky thread
Click to expand...
Click to collapse
It has nothing to do with respect, and I don't have an attitude. Relax, guy.
All the information is readily available, all you need to do is look for it. There's several threads on the first page of the development forum (which you found as you're posting in it) that contain the information you need. One of the threads is even clearly labeled: "[HOWTO] Easy Root 1.5.7 using GingerBreak"
So sorry, I get a little short with people who ask questions that are already answered. Don't take it personally. Here's the breakdown:
There's currently 2 methods of root, one is GladRoot, which requires you to downgrade first. The other is GingerBreak, which formats your phone data. Pick your poison.

[DEV][TOOL] Generic SBK dumper [Source included]

Generic Nvidia Tegra Secure Boot Key Dumper, v0.4
**************************************
YOU MUST GET ROOT BEFORE PROCESSING!!!
This is a temp memory only fix, after you reboot your phone, everything will restore to it's original status. So it WILL NOT brick your phone at all!
**************************************
I am not sure it work for your devices or not, because I only get a SU660 device!
So , you must knew that P880 use a Secure Boot Key to encrypt its nflash communication, if you don't know the SBK, you can't use nvflash backup/restore your partitions.
I found that in the linux kernel, there is some protection that block the user try to read out SBK when the phone in "odm_production" status. So I designed a little software try to patch the phone RAM to bypass the protection.
This is a kernel patcher which will remove the protection when trying to read /sys/firmware/fuse/secure_boot_key
The dumper will patch the kernel in memory, and let you show the secure_boot_key.
Hope it work for all tegra devices.
Usage:
1. adb push dumpSBK /data/local/
2. adb shell
su
chmod 0777 /data/local/dumpSBK
/data/local/dumpSBK
After that, you can
4. cat /sys/firmware/fuse/secure_boot_key
dumpSBK will search the first 1MB physical address(which kernel will be there), and try to patch it.
Usage: dumpSBK [star_mem_addr in KB]
for example: dumpSBK 32
which will search the 32KB~1MB physical memory.
2012/12/31:
re-compile it with -static switch, so it can run on all android platform.
update instructions.
2013/01/01:
modify the program, and let you select which memory range to patch.
usage: dumpSBK [start_memory_addr] [end_memory_addr]
for example: dumpSBK 1 1024
which will search 1MB ~ 1024MB memory and try to patch the kernel.
2013/01/01:
v0.3 add more error detection in the file.
2013/01/06:
v0.4 wil search the first 1MB physical memory, you can specify the start_address , for example dumpSBK 32
and update the search pattern , it will fit for more compiler options.
2013/01/07:
Secure_Boot_Key Dumper for tegra2/tegra3 v0.1
1. adb push ss.ko /sdcard/
2. adb shell
su
cd /sdcard/
insmod ss.ko
dmesg
3. at the end of dmesg, you should see the secure_boot_key.....
2013/01/08:
v0.2 dump all known fuses.....
If you get a error:
Kernel patching failed! Abort....
that means your device kernel has a differnt tegra source code, or compiled with a different compiler........
Please let me know which kernel source code and compiler / compile switch it used.
marsgod said:
If you get a error:
Kernel patching failed! Abort....
that means your device kernel has a differnt tegra source code, or compiled with a different compiler........
Please let me know which kernel source code and compiler / compile switch it used.
Click to expand...
Click to collapse
will it hard brick the phone???
razerblade17 said:
will it hard brick the phone???
Click to expand...
Click to collapse
Do you want to try and find out? I certainly don't.
I like my phone and don't want to end up with an expensive paperweight instead :banghead:
SimonTS said:
Do you want to try and find out? I certainly don't.
I like my phone and don't want to end up with an expensive paperweight instead :banghead:
Click to expand...
Click to collapse
i'd have tried if i didnt sell mine
plus this wont brick the device
nothing can since bootloader's lock so u practically cant mess up anything that matters for booting up
The Troll said:
i'd have tried if i didnt sell mine
plus this wont brick the device
nothing can since bootloader's lock so u practically cant mess up anything that matters for booting up
Click to expand...
Click to collapse
Yep, i think Troll isn't trolling us i would try it out ,but i'm waitin' for my LG, factory reset via recovery bricked it.
This is a temp memory only fix, after you reboot your phone, everything will restore to it's original status. So it WILL NOT brick your phone at all!
The patcher will patch a single byte in your phone RAM, it will not modify any bit in your NAND Flash.
C:\adb>adb shell chmod 0777 /data/local/dumpSBK
Unable to chmod /data/local/dumpSBK: Operation not permitted
I got this
Here is a log of what happened, after I ran the program on my 4X with 10H F/W:
[email protected]:/data/local # /data/local/dumpSBK
/data/local/dumpSBK
[1] + Stopped (signal) /data/local/dumpSBK
[email protected]:/data/local # cat /sys/firmware/fuse/secure_boot_key
cat /sys/firmware/fuse/secure_boot_key
[1] + Segmentation fault /data/local/dumpSBK
Click to expand...
Click to collapse
^ You guys have rooted phone and debugging turned on? maybe that's why these errors.
phone rooted, recheked with root checker.
I have debuging mode one.
But i cant push files to /data/local/
C:\o4xr>adb push dumpSBK /data/local/
push: dumpSBK/Readme.txt -> /data/local/Readme.txt
failed to copy 'dumpSBK/Readme.txt' to '/data/local/Readme.txt': Permission deni
ed
Click to expand...
Click to collapse
So i put those files there with es file explorer and try to run second comand:
C:\o4xr>adb shell chmod 0777 /data/local/dumpSBK
Unable to chmod /data/local/dumpSBK: Operation not permitted
Click to expand...
Click to collapse
Who can explain why?
s7ar73r said:
phone rooted, recheked with root checker.
I have debuging mode one.
But i cant push files to /data/local/
So i put those files there with es file explorer and try to run second comand:
Who can explain why?
Click to expand...
Click to collapse
uhmm
as i seem to recall, the hello world rooting method *only known method* turns on access to that location..
thats where superuser and binaries are added
so if im correct u'd be able to push it if u follow the rooting method and adding the commands to the root.bat *or whatever its name it* that we run in pc by using notepad or anything..
so it should reroot and push ur desired file as well
*again, dun remember, been months but im sure hello world/backuptest thingy will be useful*
k1337Ultra said:
Here is a log of what happened, after I ran the program on my 4X with 10H F/W:
Click to expand...
Click to collapse
I get the this,too.
the v1 patch did not completely work.
The Troll said:
uhmm
as i seem to recall, the hello world rooting method *only known method* turns on access to that location..
thats where superuser and binaries are added
so if im correct u'd be able to push it if u follow the rooting method and adding the commands to the root.bat *or whatever its name it* that we run in pc by using notepad or anything..
so it should reroot and push ur desired file as well
*again, dun remember, been months but im sure hello world/backuptest thingy will be useful*
Click to expand...
Click to collapse
Its not the only known method... but now I don't have time, even to think... I just woke up and came to the computer.
You need to think widder
Gonna back to sleep :angel:
k1337Ultra said:
Here is a log of what happened, after I ran the program on my 4X with 10H F/W:
Click to expand...
Click to collapse
En.... I think it is due to I compiled the dumpSBK with 4.1.2 android, so it will not work on a ICS rom... I will check it later...
s7ar73r said:
C:\adb>adb shell chmod 0777 /data/local/dumpSBK
Unable to chmod /data/local/dumpSBK: Operation not permitted
I got this
Click to expand...
Click to collapse
You MUST root your device.
then type
adb root
to get the adb rooted work.
Of couse, you must have your device USB debug ON.
please do all the steps the right way , starting with the OP instruction you the right way.
OP is assuming we got a "unsecure" booted device, which we have not exactly due to the locked bootloader.
so its pointless to write "root" instruction froms adb when the device is in secure mode. OP is now told and should update the instructions, thank you.
ignore all the "adb shell" instruction and log into the device with "adb shell" once only.
in that shell which is opened execute the "su", so you get a root # prompt.
then run instructions given and skip all "adb shell" infront.
thats it, good luck.
edit:
adb remount,adb root and running root commands only work on unsecure devices , we got ro.secure=1 here and adb not allowed to run root commands
i think it's better toroot Your 4X with Dexter http://forum.xda-developers.com/showpost.php?p=30574547&postcount=85 because it doesn't have any issues, for me with 1st root method for example titanium backup wasn't working.
@marsgod, yep - we don't have 4.1.2 but 4.0.3, but u can leave this version because we'll get 4.1.2 in january
k1337Ultra said:
Here is a log of what happened, after I ran the program on my 4X with 10H F/W:
Click to expand...
Click to collapse
[email protected]:/data/local # /data/local/dumpSBK
/data/local/dumpSBK
[1] + Stopped (signal) /data/local/dumpSBK
[email protected]:/data/local # cat /sys/firmware/fuse/secure_boot_key
cat /sys/firmware/fuse/secure_boot_key
[1] + Segmentation fault /data/local/dumpSBK
i have same result . segmentation fault
whats wrong?
bullghost said:
[email protected]:/data/local # /data/local/dumpSBK
/data/local/dumpSBK
[1] + Stopped (signal) /data/local/dumpSBK
[email protected]:/data/local # cat /sys/firmware/fuse/secure_boot_key
cat /sys/firmware/fuse/secure_boot_key
[1] + Segmentation fault /data/local/dumpSBK
i have same result . segmentation fault
whats wrong?
Click to expand...
Click to collapse
after adb shell type su, u should have [email protected], not [email protected]
@edit so... anyone tested it in right way?

[Q] <<< Missing suchecker.apk ? >>>

Hi,
I followed the tutorial of ROOTING all thru to the final steps and could not download suchecker.apk from the link of dropbox.
Is it relocated somewhere else, please.
Wallace.
wclwong said:
Hi,
I followed the tutorial of ROOTING all thru to the final steps and could not download suchecker.apk from the link of dropbox.
Is it relocated somewhere else, please.
Wallace.
Click to expand...
Click to collapse
Code:
adb shell ls /system/xbin/su
The only "suchecker" you'll ever need
soupmagnet said:
Code:
adb shell ls /system/xbin/su
The only "suchecker" you'll ever need
Click to expand...
Click to collapse
thanks, but I am completely NEW
so do you mean i can ignore command "./stuff/adb install suchecker.apk" from the instruction, please.
./stuff/adb kill-server
./stuff/adb start-server
./stuff/adb devices
./stuff/adb install suchecker.apk
./stuff/adb reboot
What tutorial are you using?
soupmagnet said:
What tutorial are you using?
Click to expand...
Click to collapse
http://forum.xda-developers.com/showthread.php?t=2074565
wclwong said:
http://forum.xda-developers.com/showthread.php?t=2074565
Click to expand...
Click to collapse
linux or mac ?
Yeah, you don't really need that. Root your device and use the command posted previously to check if it worked.
persano said:
linux or mac ?
Click to expand...
Click to collapse
Mac, sir !
wclwong said:
Mac, sir !
Click to expand...
Click to collapse
well, a pc is better for make it, or linux, obiusly, mac is horrible with this, it can do it, but i dont like to make this thinks in a mac, or linux, dont know why but windows for me is the best, i use it for all love short windows commands. mac is horrible, it is great, but for me, for making things in android isnt the best, obiusly, linux is the best for developing, but some people found windows simplier to use scripts

A Complete Guide To Disable JIT Compiler??

I have heard that disabling it can make Oreo ROMs faster. Also, can someone help me with screenshots of using those commands on a computer?? I don't know if I'm doing it right.
Basically, tell me everything bout it.
Regards
@m00nlighter can help, he seems to know bout thjs
Dude, just wait for the Pie ROMs to become mature.
Oreo ROMs for Titan were simply not on par with Nougat ones, and a debloated stock Marshmallow ROM with ZRAM disabled will beat both Nougat and Oreo ROMs in terms of performance and stability.
So for now it's either stock or Pie, Oreo is history.
But I want to use Oreo, they ain't that bad for me. Could you please help me??
Detailed instructions are below. Please don't ask for further explanations, this is as simple as I can make it.
It's somewhat complicated and requires adb access and root permissions, so you have to be rooted.
Moreover, you have to have some free space on /system partition (I'd say around 300 megabytes) because ALL packages (apps) will be recompiled, including system apps. As for the data partition, it is hard to tell, depends on what apps you have. I recommend starting with minimum required apps.
First, disable the JIT compiler
adb root
adb shell stop
adb shell setprop dalvik.vm.usejit false
adb shell start
Click to expand...
Click to collapse
Second, clear profile data and remove compiled code for all packages
adb root
adb shell cmd package compile --reset -a
Click to expand...
Click to collapse
Third, force compile all packages using "speed" compiler profile (AOT-compiles all methods in app code)
adb root
adb shell cmd package compile -m speed -f -a
Click to expand...
Click to collapse
And finally, add/edit the following two properties to system.prop:
dalvik.vm.usejit=false
Click to expand...
Click to collapse
This will permanently disable the JIT compiler.
pm.dexopt.install=everything
Click to expand...
Click to collapse
This will force AOT compilation for apps, including updates and new installs.
After that, reboot and enjoy your FAST Oreo ROM
Why JIT compiler should be disabled on old devices like Titan?
Read the excellent post by Farhan on Stack Overflow here:
https://stackoverflow.com/questions/40336455/difference-between-aot-and-jit-compiler-android#
Where did I get this info from?
Official Android docs. See
https://source.android.com/devices/tech/dalvik/configure
and
https://source.android.com/devices/tech/dalvik/jit-compiler
m00nlighter said:
Detailed instructions are below. Please don't ask for further explanations, this is as simple as I can make it.
It's somewhat complicated and requires adb access and root permissions, so you have to be rooted.
Moreover, you have to have some free space on /system partition (I'd say around 300 megabytes) because ALL packages (apps) will be recompiled, including system apps. As for the data partition, it is hard to tell, depends on what apps you have. I recommend starting with minimum required apps.
First, disable the JIT compiler
Second, clear profile data and remove compiled code for all packages
Third, force compile all packages using "speed" compiler profile (AOT-compiles all methods in app code)
And finally, add/edit the following two properties to system.prop:
This will permanently disable the JIT compiler.
This will force AOT compilation for apps, including updates and new installs.
After that, reboot and enjoy your FAST Oreo ROM
Why JIT compiler should be disabled on old devices like Titan?
Read the excellent post by Farhan on Stack Overflow here:
https://stackoverflow.com/questions/40336455/difference-between-aot-and-jit-compiler-android#
Where did I get this info from?
Official Android docs. See
https://source.android.com/devices/tech/dalvik/configure
and
https://source.android.com/devices/tech/dalvik/jit-compiler
Click to expand...
Click to collapse
Dude, one last question. What is the output of cmd after you type :
adb shell stop
CMKdaGreatest said:
Dude, one last question. What is the output of cmd after you type :
adb shell stop
Click to expand...
Click to collapse
There should be NO output. This command effectively stops the shell.
@m00nlighter
This is the result I'm getting. Please tell me if it is what it is supposed to be
Please answer my question, pleaseeee
If you can't see the pic,
The output to adb shell stop is something like this
"stop:must be root"
Am i doing something wrong?
CMKdaGreatest said:
@m00nlighter
This is the result I'm getting. Please tell me if it is what it is supposed to be
Please answer my question, pleaseeee
If you can't see the pic,
The output to adb shell stop is something like this
"stop:must be root"
Am i doing something wrong?
Click to expand...
Click to collapse
Yes you are doing something wrong. Please go learn how to work with adb, enough info is available, just google it.
Unfortunately I'm not able to work with adb very well. adb root command is failing I think, so adb shell stop is also failing.
Someone help me please @m00nlighter @sapo_joe @Oshmar @thedeadfish59
I use magisk as su. Is that a problem for this?

Categories

Resources