just saw this in a chinese forum
i m bad in english.. but i ve tried my best to translate it so that u guys can try it
i think it may help us to improve our display quality
download the attachment
extract zip
using root explorer
move be_photo and be_movie to /system/etc
edit the permission for both files to : r-w-e
r- -e
r- -e
"change owner" wner:0 - root
group:0 - root
(apply to both files)
open and edit the
/system/build.prop
add these on the end of it
#Bravia Engine Service
ro.service.swiqi.supported=true
persist.service.swiqi.enable=1
reboot ur device
*sry for my bad english
Does this work in tiamat rom?
i saw this for the Galaxy S2 just for stock rom
yup. I m using it with tiamat
could somebody just reiterate those instructions a little clearer, perhaps in code tags?
Any confirmation about this if it works on xoom
Sent from my MZ601 using xda premium
beepoo83 said:
Any confirmation about this if it works on xoom
Sent from my MZ601 using xda premium
Click to expand...
Click to collapse
Read above, already answered your question which is a yes it works on xoom if you read the instructions.
I'm not 100% sure exactly what it does but from the looks of the description (from what I can read from the broken English) it''s supposed to make the display better but who knows, I'll hold off until more about it and possibly see screen shots.
scsa20 said:
Read above, already answered your question which is a yes it works on xoom if you read the instructions.
I'm not 100% sure exactly what it does but from the looks of the description (from what I can read from the broken English) it''s supposed to make the display better but who knows, I'll hold off until more about it and possibly see screen shots.
Click to expand...
Click to collapse
Just one who confirmed that it work wish to see more people involve in
Sent from my MZ601 using xda premium
I can confirm that this works on my Xoom (Euro 3G running Tiamat Moray 2.2.2)
Basically the Bravia Engine boosts images and videos, read this review from GSMArena for more information: http://blog.gsmarena.com/heres-what-sony-ericsson-mobile-bravia-engine-really-does-review/
*Edited Moray
how much improvement are you noticing? Is it worth it?
I don't really see a difference. I compared it to my co-worker's tiamat xoom.
These stuffs really work. the screen has better contrast (just a little)
I took 2 picture, you can see black color become deeper
Is this hack only for images and video exclusively?
Or will it always run in the background
Sent from my ADR6350 using xda premium
beakeroo said:
could somebody just reiterate those instructions a little clearer, perhaps in code tags?
Click to expand...
Click to collapse
1) Download post#1 attached file
2) extract somewhere
3) connect XOOM via USB
4) in cmd.exe window navigate to path specified in 2)
5) execute in cmd code below
Code:
adb remount
adb push be_movie /system/etc/be_movie
adb push be_photo /system/etc/be_photo
adb shell chmod 0755 /system/etc/be_movie
adb shell chmod 0755 /system/etc/be_photo
adb shell echo -e \#Bravia Engine Service\\nro.service.swiqi.supported=true\\npersist.service.swiqi.enable=1\\n^>^>/system/build.prop
adb reboot
Thanks for that, I was a bit worried about OPs language barrier
_TB_TB_ said:
1) Download post#1 attached file
2) extract somewhere
3) connect XOOM via USB
4) in cmd.exe window navigate to path specified in 2)
5) execute in cmd code below
Code:
adb remount
adb push be_movie /system/etc/be_movie
adb push be_photo /system/etc/be_photo
adb shell chmod 0755 /system/etc/be_movie
adb shell chmod 0755 /system/etc/be_photo
adb shell echo -e \#Bravia Engine Service\\nro.service.swiqi.supported=true\\npersist.service.swiqi.enable=1\\n^>^>/system/build.prop
adb reboot
Click to expand...
Click to collapse
If we follow this method do we still need to do this part after -
open and edit the
/system/build.prop
There seemed to be extra editing steps in the OP's post and I wasn't sure if they were needed. I am also using the Tiamat ROm and the files pushed fine but I don't notice a difference really.
Isun said:
If we follow this method do we still need to do this part after -
open and edit the
/system/build.prop
There seemed to be extra editing steps in the OP's post and I wasn't sure if they were needed. I am also using the Tiamat ROm and the files pushed fine but I don't notice a difference really.
Click to expand...
Click to collapse
Nope. If you follow the adb method there's no need for opening and editing the build.prop file. The second to last command in the adb method will echo the necessary text to the build.prop file for you.
once again sry for my bad english.. i m just trying to share this with u guys so that we can make our xoom better
omnia1994 said:
once again sry for my bad english.. i m just trying to share this with u guys so that we can make our xoom better
Click to expand...
Click to collapse
Though I don't think I notice the change I do thank you for sharing the info.
Just for kix ill take a look at this. If its cool ill make a nice clean zip package
So is this going to become a zip?
Related
I've noticed that the su binary installed by superuser doesn't survive a reboot. Anyone else have this problem? Any fixes?
Sent from my SPH-D700 using XDA App
Same here. Have to re update after each reboot
Sent from my SPH-D700 using Tapatalk
same here, had to update the binary too
How do you update the su?
Launch superuser, go to settings and scroll to the bottom.
Sent from my SPH-D700 using XDA App
I've found 3 su:
/system/bin/jk-su (original from the oneclick/permanent)
/system/xbin/su (symlink to /sdx/su)
/sdx/su (superuser updates this one)
Superuser does not update /system/bin/jk-su so I decided to.
So far its working.
Sent from my SPH-D700 using XDA App
dangdang said:
I've found 3 su:
/system/bin/jk-su (original from the oneclick/permanent)
/system/xbin/su (symlink to /sdx/su)
/sdx/su (superuser updates this one)
Superuser does not update /system/bin/jk-su so I decided to.
So far its working.
Sent from my SPH-D700 using XDA App
Click to expand...
Click to collapse
How did you update it yourself?
Here's what worked for me. Keep in mind I am rooted using oneclick 2.2.4 which comes with busybox and remount scripts.
1. Update the su binary using superuser.
2. Launch a terminal (I use better terminal emulator pro)
3. Run 'su' from the terminal
4. Mount system rw with 'remount rw'
5. Remove jk-su with 'rm /system/bin/jk-su'
6. Copy the su binary superuser installed with 'cp /sdx/su /system/bin/jk-su'
7. Reboot and it should survive.
Notes:
Do not include single quotes when running the commands.
I'm paranoid about permissions so as root in terminal I ran:
chown root.shell /system/bin/jk-su
chmod 755 /system/bin/jk-su
To match the permissions of the removed jk-su. I'm not sure if this was necessary.
I haven't tested using adb yet so I don't know the steps.
Sent from my SPH-D700 using XDA App
Code:
#cp /sdx/su /system/bin/jk-su
cp: not found
the last part does not work (i have the same root method)
i have to re-root the phone when i get home today. but i will try to move the updated binary with root explorer instead of the command line.
Replace 'cp' with 'busybox cp'.
Sent from my Android using CDMA
dangdang said:
Replace 'cp' with 'busybox cp'.
Sent from my Android using CDMA
Click to expand...
Click to collapse
will try I had the same issues
dangdang said:
Here's what worked for me. Keep in mind I am rooted using oneclick 2.2.4 which comes with busybox and remount scripts.
1. Update the su binary using superuser.
2. Launch a terminal (I use better terminal emulator pro)
3. Run 'su' from the terminal
4. Mount system rw with 'remount rw'
5. Remove jk-su with 'rm /system/bin/jk-su'
6. Copy the su binary superuser installed with 'cp /sdx/su /system/bin/jk-su'
7. Reboot and it should survive.
Notes:
Do not include single quotes when running the commands.
I'm paranoid about permissions so as root in terminal I ran:
chown root.shell /system/bin/jk-su
chmod 755 /system/bin/jk-su
To match the permissions of the removed jk-su. I'm not sure if this was necessary.
I haven't tested using adb yet so I don't know the steps.
Sent from my SPH-D700 using XDA App
Click to expand...
Click to collapse
I have this exact same problem on my Samsung Moment (have to update SU every reboot).
The directory structure seem a bit different. For example, there's no /system/bin/jk-su (in fact, if I find / -name 'jk-su' I get no results at all).
I am poking around the directory structure trying to figure out where to find the source and destination su files that I'm going to have to overwrite and I can't seem to figure which is which. Does anyone have any idea how to do the functional equivalent of dangdang's post on a Moment?
Thanks!
Um... Why did you feel the need to necro this INCREDIBLY ANCIENT thread?
k0nane said:
Um... Why did you feel the need to necro this INCREDIBLY ANCIENT thread?
Click to expand...
Click to collapse
Because people like to bring out the bat again and continue to beat the remaining not decomposed guts out of the horse...
lmao
I was about to say. WTF is everyone talking about SU not surviving a reboot /noodlescratcher
davidrules7778 said:
Because people like to bring out the bat again and continue to beat the remaining not decomposed guts out of the horse...
lmao
Click to expand...
Click to collapse
k0nane said:
Um... Why did you feel the need to necro this INCREDIBLY ANCIENT thread?
Click to expand...
Click to collapse
It was the most relevant post after doing a search. Forum etiquette blows my mind. I can only imagine how much "use the search feature!" I'd have gotten if I'd have made a new post about this. Oh well, I tried.
lol. i hear ya!
DamienWind said:
It was the most relevant post after doing a search. Forum etiquette blows my mind. I can only imagine how much "use the search feature!" I'd have gotten if I'd have made a new post about this. Oh well, I tried.
Click to expand...
Click to collapse
DamienWind said:
It was the most relevant post after doing a search. Forum etiquette blows my mind. I can only imagine how much "use the search feature!" I'd have gotten if I'd have made a new post about this. Oh well, I tried.
Click to expand...
Click to collapse
most likely SU is built into your kernel and short of rebuilding or repacking your kernel you cant update it..
I have a samsung galaxy s I9000 running Gingerbread will this work for me..?
SGH-T989 System Dump (Odexed)
Here you guys go, a system dump, thanks to luckyduck69.
luckyduck69 said:
dump: http://dl.dropbox.com/u/21231693/T989odex.zip..
Click to expand...
Click to collapse
I have also mirrored this on my website, here.
I will have it deodexed here later tonight.
Reserved.
as;dflkjas;ldfkja;sldfkj
So, the dump would be useful if one needed to put the phone back to just the way it was out of the box, correct? One could use it with Odin to fix, say... a soft brick?
Ty for this!! this means what exactly? easier to root and set up for odin?????curious
movieaddict said:
Ty for this!! this means what exactly? easier to root and set up for odin?????curious
Click to expand...
Click to collapse
once it deodexed... the real def fun begins as far as modding or cooking up personalized roms.
but we really need to get a modded kernel somehow and get root. that must be our main priority cuz nothing else matters without it. maybe someone has a trick up their sleeve... i hope.
Awesome........ now the ball gets rolling
Ty sir Please remove all the ridiculous t-mobile bloat.
Ty luckyduck!
sence im at school and cant up u all my original build ill root this for u all and upload it back to my sf page
RaverX3X said:
sence im at school and cant up u all my original build ill root this for u all and upload it back to my sf page
Click to expand...
Click to collapse
Nice greatnews and good to see familiar faces from the gs4g thanks raver
Sent from my SGH-T989 using xda premium
Raver always comes thru so glad to see him here!
Sent from my SGH-T989 using XDA App
Ty to all of u guys!! cant wait
Hey fellas i was on sammy's open source site yesterday and nothing was there for the SGH-T989 and today there is an SGH-T989 open source.zip file up on the site just in case this helps in any way with getting things going with rooting this bad mutha!
https://opensource.samsung.com/
Sent from my SGH-T989 using xda premium
Was this dump made using "adb pull"? If so, it's next to worthless for the purposes of building a prerooted system image - no permissions, no symlinks.
Someone needs to dump system using tar. I have attached a binary of busybox (which includes tar) compiled using the instructions given at http://arighi.blogspot.com/2011/08/install-busybox-from-source-on-samsung.html
Extract it from the zip and install it as follows, I am assuming that whoever does the dump is comfortable with ADB:
Code:
adb push busybox /data/local/tmp/
Then start an adb shell or an Android Terminal Emulator session, and within it:
Code:
cd /system
/data/local/tmp/busybox tar czvf /sdcard/system_dump_t989.tar.gz *
Then grab /sdcard/system_dump_t989.tar.gz and upload it here.
To avoid having 308403434 different people do this, I suggest you guys name a volunteer
IMPORTANT: If the attempt to tar up /system above gives any errors about access denial or permissions, post the name of every file that was a problem.
Would love to but at work atm.
Sent from my SGH-T989 using xda premium
Entropy512 said:
Was this dump made using "adb pull"? If so, it's next to worthless for the purposes of building a prerooted system image - no permissions, no symlinks.
Someone needs to dump system using tar. I have attached a binary of busybox (which includes tar) compiled using the instructions given at http://arighi.blogspot.com/2011/08/install-busybox-from-source-on-samsung.html
Extract it from the zip and install it as follows, I am assuming that whoever does the dump is comfortable with ADB:
Code:
adb push busybox /data/local/tmp/
Then start an adb shell or an Android Terminal Emulator session, and within it:
Code:
cd /system
/data/local/tmp/busybox tar czvf /sdcard/system_dump_t989.tar.gz *
Then grab /sdcard/system_dump_t989.tar.gz and upload it here.
To avoid having 308403434 different people do this, I suggest you guys name a volunteer
Click to expand...
Click to collapse
"/data/local/tmp/busybox tar czvf /sdcard/system_dump_t989.tar.gz *" gives permission denied error
/system itself? That's VERY odd.
zaventh is working this now, talking with him on IRC
Edit: Looks like adb push didn't make busybox executable, as I mentioned in IRC:
Code:
adb shell chmod 755 /data/local/tmp/busybox
Finally the ball gets rolling
Sent from my SGH-T989 using xda premium
Entropy512 said:
Was this dump made using "adb pull"? If so, it's next to worthless for the purposes of building a prerooted system image - no permissions, no symlinks.
Someone needs to dump system using tar. I have attached a binary of busybox (which includes tar) compiled using the instructions given at http://arighi.blogspot.com/2011/08/install-busybox-from-source-on-samsung.html
Extract it from the zip and install it as follows, I am assuming that whoever does the dump is comfortable with ADB:
Code:
adb push busybox /data/local/tmp/
Then start an adb shell or an Android Terminal Emulator session, and within it:
Code:
cd /system
/data/local/tmp/busybox tar czvf /sdcard/system_dump_t989.tar.gz *
Then grab /sdcard/system_dump_t989.tar.gz and upload it here.
To avoid having 308403434 different people do this, I suggest you guys name a volunteer
IMPORTANT: If the attempt to tar up /system above gives any errors about access denial or permissions, post the name of every file that was a problem.
Click to expand...
Click to collapse
Dump using this method available here: http://www.multiupload.com/MKCNJTUTRW
zaventh said:
Dump using this method available here: http://www.multiupload.com/MKCNJTUTRW
Click to expand...
Click to collapse
Another dump ---- http://www.multiupload.com/424YLKAN90
[HOW-TO] [GSM & CDMA] Root without Unlocking Bootloader via exploit (for 4.0.1/4.0.2)
Edit: This does not works on anything newer than ICL53F (i.e., 4.0.2). It works fine on ITL41D (4.0.1), ITL41F (4.0.1) and ICL53F (4.0.2)
Once you have got root, you can now use segv11's BootUnlocker app to unlock your bootloader without wiping anything. Easy as pie!
Disclaimer: I take no credit for this exploit or the implementation of it (but I will take credit for the step-by step ). Thanks to kendong2 for pointing it out to me here.
So, it looks like zx2c4 has found a local privilege escalation exploit. See source here, and saurik has managed to package it together for Android. See here. Although this may be old news to some, I hadn't seen it before.
So what does this all mean:
If you are running a 2.6.39 kernel (or above), which all Galaxy Nexus' are, you can now root your device without having to unlock your bootloader (and without losing your data).
Moreover, you should now be able to root your device even if your hardware buttons are not working.
Additionally, this allows those who have not received an OTA update and want to apply it without having an unlocked bootloader or root to do so by copying the OTA update to /cache from /sdcard.
Notes:
1) This assumes that you have USB Debugging enable on your device (Settings > Developer Options > Enable USB Debugging) and the drivers for your device installed on your computer. For the drivers, I would recommend you remove all old drivers and install these. If you don't know how to install them, or are having issues, look here.
2) This needs to be done over ADB, as a terminal emulator on-device does not have the appropriate access. If you do not have ADB, I've attached it in the zip. Unzip all files.
3) Some users indicate that, once finished the procedure, they needed to open the Superuser app.
Step-by-step:
1) Download the attached files to your computer and unzip them in the same directory as your adb.exe file;
2) Open a command prompt in the same directory;
3) Copy the files to your device:
adb push mempodroid /data/local/tmp/mempodroid
adb push su /data/local/tmp/su
adb push Superuser.apk /data/local/tmp/Superuser.apk
4) Open a shell: adb shell
5) Change permission on mempodroid to allow it to run: chmod 777 /data/local/tmp/mempodroid
6) Run the exploit: ./data/local/tmp/mempodroid 0xd7f4 0xad4b sh
Note: Once you do step 6, your prompt should change from $ to #. If not, it did not work.
7) Mount the system partition as rw: mount -o remount,rw -t ext4 /dev/block/mmcblk0p1 /system
8) Copy su to /system: cat /data/local/tmp/su > /system/bin/su
9) Change permissions on su: chmod 06755 /system/bin/su
10) Copy Superuser.apk: cat /data/local/tmp/Superuser.apk > /system/app/Superuser.apk
11) Change permissions on Superuser.apk: chmod 0644 /system/app/Superuser.apk
12) Mount the system partition as r/o: mount -o remount,ro -t ext4 /dev/block/mmcblk0p1 /system
13) Rescind root: exit
14) Exit the ADB shell: exit
15) Done. You now should have root without having to unlock your bootloader.
Reserved
Reserved
This is the same as https://github.com/saurik/mempodroid
saurik ftw.
times_infinity said:
This is the same as https://github.com/saurik/mempodroid
saurik ftw.
Click to expand...
Click to collapse
Not sure what you are getting at? I mentioned saurik in the first post, and the link you posted is in the first post. And I mentioned that this may be old news, but I haven't seen it anywhere before today in the GN forums.
Yikes! This exploit works on any kernel from 2.6.39 and >. This could become a common root method for many devices. Linus Torvalds himself posted the fix commit! Nice work by zx2c4!
Sleuth255 said:
Yikes! This exploit works on any kernel from 2.6.39 and >. This could become a common root method for many devices. Linus Torvalds himself posted the fix commit! Nice work by zx2c4!
Click to expand...
Click to collapse
You need ics to have a vulnerable kernel version, so given the number of devices which currently have ics officially, I doubt it will be common. I'd also expect Google and vendors to correct this in next release.
Also many custom kernels don't have this flaw as they are at or over 3.0.18 or have patched it. This prevents gaining unnoticed root.
Sent from my Galaxy Nexus
Hmmm I thought 2.6.39 was found in GB builds. This exploit is almost a root fix for the Moto DX 4.5.621 fiasco. Unfortunately the kernel for that build is 2.6.32.9.
Sent from my Galaxy Nexus using xda premium
This was huge in the headlines a few weeks back. It's nice to see someone putting it to a good use!
Sent from my Galaxy Nexus using xda premium
Hi, been lurking awhile, registered to clear up somethings.
I did some research while attempting to access the /data/local/ -folder with terminal emulator and I found that it would be impossible to write or to find it while being unrooted. Rooting a phone through using an unrooted access root seems impossible.
Did I miss something or is there any other way to copy mempodroid to the data- folder? I sure would like to keep all my files.
Huxleysäl said:
Hi, been lurking awhile, registered to clear up somethings.
I did some research while attempting to access the /data/local/ -folder with terminal emulator and I found that it would be impossible to write or to find it while being unrooted. Rooting a phone through using an unrooted access root seems impossible.
Did I miss something or is there any other way to copy mempodroid to the data- folder? I sure would like to keep all my files.
Click to expand...
Click to collapse
I think you are mistaken. In a terminal emulator type: cd /data/local/tmp
Edit: Fixed a mistake made by auto correct...
Sent from my Galaxy Nexus using Tapatalk
efrant said:
I think you are mistaken. In a terminal emulator type: cd /data/local/temp
Sent from my Galaxy Nexus using Tapatalk
Click to expand...
Click to collapse
Just did. It says "No such file or directory."
Not the best source, but if you google it, people state what I state. Sorry, can't post links
try /data/local/tmp
Huxleysäl said:
Just did. It says "No such file or directory."
Not the best source, but if you google it, people state what I state. Sorry, can't post links
Click to expand...
Click to collapse
Sorry, damn auto correct. It should be: cd /data/local/tmp
Not "temp".
It works fine.
Edit: Sleuth255 beat me to it!
Sent from my Galaxy Nexus using Tapatalk
efrant said:
Sorry, damn auto correct. It should be: cd /data/local/tmp
Not "temp".
It works fine.
Edit: Sleuth255 beat me to it!
Sent from my Galaxy Nexus using Tapatalk
Click to expand...
Click to collapse
Sure, OK, it worked. But as I'm trying to replicate his instructions, copying mempodroid to data/local/tmp doesn't compute. I tried extracting the files, puting mempodroid in a new folder in ./sdcard/ (which I named Nex), and it still couldn't find it.
Wait, just had an idea. Brb
Huxleysäl said:
Sure, OK, it worked. But as I'm trying to replicate his instructions, copying mempodroid to data/local/tmp doesn't compute. I tried extracting the files, puting mempodroid in a new folder in ./sdcard/ (which I named Nex), and it still couldn't find it.
Wait, just had an idea. Brb
Click to expand...
Click to collapse
Hmm. Looks like you may be correct. In GB, we had write access to that directory, but it looks like we don't in ICS. I'll have another look tomorrow and try to figure something out.
Sent from my Galaxy Nexus using Tapatalk
OK, this is exactly what I did:
I downloaded the files, extracted them into the ./sdcard folder of my android. I opened the console, wrote exactly as stated. Reaction? Cannot create /data/local/tmp/mempodroid: Permission denied
So, what I'm thinking is this: I tried the cd ./sdcard/mempodroid, found it. So, logically, that should mean that since the permission is dennied, the problem lies not in where I put the mempodroid, but with my authority over my phone. So, here we are again. Could anybody smarter then me clarify?
efrant said:
Hmm. Looks like you may be correct. In GB, we had write access to that directory, but it looks like we don't in ICS. I'll have another look tomorrow and try to figure something out.
Sent from my Galaxy Nexus using Tapatalk
Click to expand...
Click to collapse
****, I was hoping I was wrong. I originally thought that the exploit was this. But alas.
Try finding an alternative write route to the /data/local/- folder. That should solve all problems, I guess. Big words, ey? This is for the simpletons like me, who stupidly forgot to bootload.
Might want to expand on the steps.
Like what program to use to copy the file.
How do you change permission.
How do you run the exploit.
How to mount rw.
How to copy su.
convolution said:
Might want to expand on the steps.
Like what program to use to copy the file.
How do you change permission.
How do you run the exploit.
How to mount rw.
How to copy su.
Click to expand...
Click to collapse
I hade my initial problems with that too. But as if this moment it doesn't really matter. Read above posts. Anyhow, to answer your question: you need to download a console emulator
Just search for it in the market. Also the commands go in this console
For example: cat /directory/filename > /newdirectory/samefilename means to copy or move from one place. To change permission you just write that line of code ending with 777 instead of cat and then the filename etc and etc.
I didn't know any of this 'till yesterday, so it is quite understandable.
cheers
Huxleysäl said:
F***, I was hoping I was wrong. I originally thought that the exploit was this. But alas.
Try finding an alternative write route to the /data/local/- folder. That should solve all problems, I guess. Big words, ey? This is for the simpletons like me, who stupidly forgot to bootload.
Click to expand...
Click to collapse
I've updated the first post. Give that a go and let me know how it turns out. (The guide may need some minor tweaking, but I am here to help you through it.)
It seems that ADB has rw access to /data/local/tmp but a terminal emulator on-device does not. So for now, you need to be plugged into your computer.
It may be possible to do this with ADB-over-Wi-Fi, but I haven't gotten there yet.
odex again is not so easy...for system/app i use this:
http://forum.xda-developers.com/showthread.php?t=734236
but if you want also framework odexed...?! that is tricky...(coolexe helped me and maked a odex script for me..was written for desire..changed it to work on one x...) because you must look at the boothclass order (find in the kernel init.rc....if the order is a other then in the script you get a not booting rom....
if you want booth apps and framework odexed...you must make framework first odexed ""important"" or you will get a not booting rom...
here´s the new scxript for framework
for jb version of the script..take the one attached..and remove the txt...not the sourceforge version which is for ics
https://sourceforge.net/projects/alexvhtcroms/files/odex.sh/download
steps for framework:
adb push odex.sh /data
adb push dexopt-wrapper /system/bin +xbin (can be found in system app odex link)
adb shell chmod 755 /data/odex.sh
adb shell chmod 755 /system/bin+xbin/dexopt-wrapper
adb shell /data/odex.sh
adb pull /system/framework reodex-framework-onex
now you must manual cut the classes.dex file from the jar files...(be sure you have a meta-inf in each file)
after that make a new-half odexed rom..flash and do the rest with system app...
with kind regards...Alex
how about this one?
http://forum.xda-developers.com/showthread.php?t=1514576
zerozoneice said:
how about this one?
http://forum.xda-developers.com/showthread.php?t=1514576
Click to expand...
Click to collapse
never seen...not bad.. but it seems that is only for system app..system app can also be re-odexed using titanium backup pro...main part is the framwork
with kind regards
I think this way should be the easiest. I've been using it for a few months now and it worked every time without any issues. Just need to remember that every *.jar file in framework folder needs to have it's classes.dex inside (you can drag'n'drop the one from any other .jar that has it into ones that don't using 7zip). The script itself reads your boothclasspath and removes dalvik afterwards so you ultimately boot into a fully odexed rom. As always, it's recommended to make a nandroid before attemting to do this.
PlayPetepp said:
I think this way should be the easiest. I've been using it for a few months now and it worked every time without any issues. Just need to remember that every *.jar file in framework folder needs to have it's classes.dex inside (you can drag'n'drop the one from any other .jar that has it into ones that don't using 7zip). The script itself reads your boothclasspath and removes dalvik afterwards so you ultimately boot into a fully odexed rom. As always, it's recommended to make a nandroid before attemting to do this.
Click to expand...
Click to collapse
can you look again to the link...get the site is not availeble...sounds interesting
with kind regards
big thanks to playpetepp for the site
http://themikmik.com/showthread.php?12988-Tool-App-Dexo-the-Universal-Odex-Utility
i tryed lots of scripts and other things but nothing work as good as this one (the One from the link above)
first try all is re-odex viperx 1.0.1 (take me only 10min.) to do
when it is done it wont reboot stuck with black screen (freeze)
hold the power button till the phone goes off and then bootup again
and your done
so big thanks for this
sebastiaan15 said:
big thanks to playpetepp for the site
http://themikmik.com/showthread.php?12988-Tool-App-Dexo-the-Universal-Odex-Utility
i tryed lots of scripts and other things but nothing work as good as this one
first try all is re-odex viperx 1.0.1 (take me only 10min.) to do
on when it is done it wont reboot stuck with black screen (freeze)
hold the power button till the phone goes off and then bootup again
and your done
so big thanks for this
Click to expand...
Click to collapse
Seems like very nice script..
But i can't find the files needed (dexo) on that page...
swemoza said:
Seems like very nice script..
But i can't find the files needed (dexo) on that page...
Click to expand...
Click to collapse
At the bottom of that post there's a highlighted "did you read everything". Click on it.
Btw, those scripts are the work of tommytomatoe. My part was negligible.
-. typewrited .-
PlayPetepp said:
At the bottom of that post there's a highlighted "did you read everything". Click on it.
Btw, those scripts are the work of tommytomatoe. My part was negligible.
-. typewrited .-
Click to expand...
Click to collapse
so big thanks to tommytomatoe
and also big thanks to you for posting it here
PlayPetepp said:
At the bottom of that post there's a highlighted "did you read everything". Click on it.
Btw, those scripts are the work of tommytomatoe. My part was negligible.
-. typewrited .-
Click to expand...
Click to collapse
Aha.. Thank you mate...
Tried your method in the 1st post , and it worked ! 100% .
The Mikmik method works great.Thx for the link. ARHD is a dream in odex
Sent from my HTC One X using xda premium
PlayPetepp said:
At the bottom of that post there's a highlighted "did you read everything". Click on it.
Btw, those scripts are the work of tommytomatoe. My part was negligible.
-. typewrited .-
Click to expand...
Click to collapse
Ah ha... your favorite subject mate
ckpv5 said:
Ah ha... your favorite subject mate
Click to expand...
Click to collapse
Ah ... you caught me. :highfive:
PlayPetepp said:
I think this way should be the easiest. I've been using it for a few months now and it worked every time without any issues. Just need to remember that every *.jar file in framework folder needs to have it's classes.dex inside (you can drag'n'drop the one from any other .jar that has it into ones that don't using 7zip). The script itself reads your boothclasspath and removes dalvik afterwards so you ultimately boot into a fully odexed rom. As always, it's recommended to make a nandroid before attemting to do this.
Click to expand...
Click to collapse
I used this one and I'm very happy with it. So easy to launch and the HOX is a little more reactive now.
Probs
I tried your script with bootclasspath adjusted to SGS3.
Just did bootclasspath jars.
Still no luck - bootloop.
dexo Tool worked from the get go. But - SystemUI doesn't work. No notification bar whatsover. At least I can boot. Retrying...
Alex-V said:
here´s the new scxript for framework
https://sourceforge.net/projects/alexvhtcroms/files/odex.sh/download
Click to expand...
Click to collapse
C:\fastboot>adb shell
[email protected]/# chmod 755 /system/bin/dexo /system/bin/dexopt-wrapper /system/xbin
/zip /system/xbin/zipalign /system/xbin/busybox
/system/xbin/zipalign /system/xbin/busybox <
/system/bin/sh: chmod: cannot execute - Permission denied
getting this error message when in adb shell, any ideas guys? commands were copied from site
Do "adb remount" before "adb shell".
-. typewrited .-
PlayPetepp said:
Do "adb remount" before "adb shell".
-. typewrited .-
Click to expand...
Click to collapse
thanks man, so thats use adb remount again after using the adb push commands? i have pushed the neccesary files
still getting the permission denied message : (
---------- Post added at 10:25 PM ---------- Previous post was at 10:21 PM ----------
C:\fastboot>adb remount
remount succeeded
C:\fastboot>adb shell
[email protected]/# chmod 755 /system/bin/dexo /system/bin/dexopt-wrapper /system/xbin
/zip /system/xbin/zipalign /system/xbin/busybox
/system/xbin/zipalign /system/xbin/busybox <
/system/bin/sh: chmod: cannot execute - Permission denied
126|[email protected]/#
Try "mount -o rw,remount /system" after entering "adb shell"
If you have root explorer app installed you could change permissions for folders from phone.
-. typewrited .-
Rooting your phone...from your phone (what?!)
DISCLAIMER: I do not expect anything to go wrong as I have personally tested this. However, YOU are choosing to make these modifications to your phone so I DO NOT take responsibility for any damage that may come as a result of using this. If you come back and point the finger at me, I will laugh at you.
If your phone is not an SGS3, this MAY still work for you. I take absolutely NO responsibility either way.
Prerequisites
The following files are attached to this post for convenience. Download and install the apps, download and extract the zip file somewhere convenient.
Superuser by Koush(MUST be this one. You can change it later if you so desire.)
Terminal Emulator by Jack Palevich ( MUST be this one)
Zip file, extracted somewhere convenient
Click to expand...
Click to collapse
Click to expand...
Click to collapse
THE GOODS
These generic names will be used:
/path/to/motochopperDir - This is the full path to the extracted motochopper-mobile DIRECTORY or FOLDER. Example: /sdcard/motochopper-mobile (will vary depending on where you extracted the files).
NOTE: After running the script, Motochopper may or may not print "Failed", but the exploit DOES indeed work regardless of this. Make sure you reboot for changes to take effect.
Click to expand...
Click to collapse
Click to expand...
Click to collapse
Download the attached zip file AND both apps.
Install Terminal Emulator and Superuser (use a file manager, navigate to the downloaded .apk files and click on each file to install them).
Open up Terminal Emulator and type the following commands. Press the ENTER key after each command.
Code:
cd /path/to/motochopperDir
cat setup.sh > /data/data/jackpal.androidterm/setup.sh
cd /data/data/jackpal.androidterm
chmod 755 setup.sh
./setup.sh /path/to/motochopperDir
From there, my setup.sh script will handle the rest of the process. If you are still unsure, see my sample run below.
Sample run (files were extracted to /sdcard/moto)
Code:
cd /sdcard/moto
cat setup.sh > /data/data/jackpal.androidterm/setup.sh
cd /data/data/jackpal.androidterm
chmod 755 setup.sh
./setup.sh /sdcard/moto
Credits
Motochopper exploit by djrbliss (Dan Rosenburg). Original thread here.
Jack Palevich and Koush for their apps, especially Jack Palevich. This would not be possible without the shared permissions on his app's data directory.
Click to expand...
Click to collapse
Click to expand...
Click to collapse
Links
Download the attachments!
Click to expand...
Click to collapse
Click to expand...
Click to collapse
Flash counters, etc?
Will this method increment any of the flash counters, turn on the triangle etc??
kwmike said:
Will this method increment any of the flash counters, turn on the triangle etc??
Thanks.
Click to expand...
Click to collapse
No, it will not. That's the point, there's no need to use ODIN.
The Thanks button is just to avoid "THANKS" posts in threads. Nothing more. Don't defeat the purpose of why it was introduced.
Not working on new ATT S3 I747
This tool is not working for me. I have tried several times. I always get a 'failed' msg.
I have a 2 day old brand new S3 i747 from ATT. Stock JB 4.1.1
I extracted the motochopper-mobile.zip files to /storage/sdcard0/moto/.
The setup.sh script is in the /data/data/jackpal.androidterm after it is run. The other moto related files are not there as if the script had run ok.
After the reboot superuser needs a new binary and fails when the binary update is attempted.
All other root sensitive apps fail.
_________________________________________________________________________________________________
FIXED:
I used the download/instructions on the OP on the following link:
http://forum.xda-developers.com/showthread.php?t=2252248
While it does not do all the work from the S3 and must be loaded from a Windows environment , it did the job perfectly.
Flash counter, triangle etc. not triggered!!
Try downloading the files and run it again.
I tested it by deleting my su binary and then I ran this tool and rebooted. And BAM, su was placed in /system once again and superuser was fine.
If it still doesn't work, go to the original Motochopper thread and follow the instructions there using your computer.
The Thanks button is just to avoid "THANKS" posts in threads. Nothing more. Don't defeat the purpose of why it was introduced.
Files are now attached to the OP.
CNexus said:
Rooting your phone...from your phone (what?!)
DISCLAIMER: I do not expect anything to go wrong as I have personally tested this. However, YOU are choosing to make these modifications to your phone so I DO NOT take responsibility for any damage that may come as a result of using this. If you come back and point the finger at me, I will laugh at you.
If your phone is not an SGS3, this MAY still work for you. I take absolutely NO responsibility either way.
Download the attached zip file AND both apps.
Install Terminal Emulator and Superuser (use a file manager, navigate to the downloaded .apk files and click on each file to install them).
Open up Terminal Emulator and type the following commands. Press the ENTER key after each command.
Code:
cd /path/to/motochopperDir
cat setup.sh > /data/data/jackpal.androidterm/setup.sh
cd /data/data/jackpal.androidterm
chmod 755 setup.sh
./setup.sh /path/to/motochopperDir
From there, my setup.sh script will handle the rest of the process. If you are still unsure, see my sample run below.
Sample run (files were extracted to /sdcard/moto)
Code:
cd /sdcard/moto
cat setup.sh > /data/data/jackpal.androidterm/setup.sh
cd /data/data/jackpal.androidterm
chmod 755 setup.sh
./setup.sh /sdcard/moto
Click to expand...
Click to collapse
This is too cool. Had no idea this was possible. Is it possible to post screenshots to help the really new members out? That's just a suggestion.
Sent from my SAMSUNG-SGH-I747 using Tapatalk 4 Beta
Bruce Lee said:
This is too cool. Had no idea this was possible. Is it possible to post screenshots to help the really new members out? That's just a suggestion.
Sent from my SAMSUNG-SGH-I747 using Tapatalk 4 Beta
Click to expand...
Click to collapse
It is...I'm a little busy working on other projects at the moment though, as you can see from my sig
Sent from my S3 on Sense 5
That's cool I totally understand. Just thought I would plant the seed. Lol
Sent from my SAMSUNG-SGH-I747 using Tapatalk 4 Beta
So this is suppose to allow Rooting without the use of a computer? if so, im in!
dannieloco said:
So this is suppose to allow Rooting without the use of a computer? if so, im in!
Click to expand...
Click to collapse
Yes, but so far I have only been able to confirm that it works on a couple Sprint phones...you can try it, but I can't guarantee that it will actually root your phone
It finely don't brick it though, if you're worried.
CNexus said:
Yes, but so far I have only been able to confirm that it works on a couple Sprint phones...you can try it, but I can't guarantee that it will actually root your phone
It finely don't brick it though, if you're worried.
Click to expand...
Click to collapse
Yeah Ive read about the motochopper method and its pretty safe.. wont brick the phone. I was actually going to do this to my friend's S3 on sprint. My att s3 is already rooted and rom'd
dannieloco said:
Yeah Ive read about the motochopper method and its pretty safe.. wont brick the phone. I was actually going to do this to my friend's S3 on sprint. My att s3 is already rooted and rom'd
Click to expand...
Click to collapse
Ah ok, good deal haha
CNexus said:
Ah ok, good deal haha
Click to expand...
Click to collapse
So i just tried following every single step but it wont allow for SU binaries to update. When i finished each line of code, it said FAILED and to reboot/battery pull which I did.. Not sure what to do. I was hoping it worked.. did I do something wrong? I even tried installing superuser from the app store and it wasnt updating binaries either.. TitaniumBackup didnt work...
I don't know. Just use the regular method of using ODIN to send a recovery and then flash SU :\
i install 2 apps and kept the zip motochopper on external sd no extract and then use terminal but when i put the codes and hit enter it says "no such file" what am doing wrongg?? please help i need this
Sent from my SAMSUNG-SGH-I747 using xda premium
smallyetzon said:
i install 2 apps and kept the zip motochopper on external sd no extract and then use terminal but when i put the codes and hit enter it says "no such file" what am doing wrongg?? please help i need this
Sent from my SAMSUNG-SGH-I747 using xda premium
Click to expand...
Click to collapse
You're supposed to extract the zip and then pass the path to the directory to setup.sh...
CNexus said:
You're supposed to extract the zip and then pass the path to the directory to setup.sh...
Click to expand...
Click to collapse
ok extracted to extsdcard example:
cd /storage/extsdcard/motochopperdir
???????
Sent from my SAMSUNG-SGH-I747 using xda premium
---------- Post added at 04:40 AM ---------- Previous post was at 04:22 AM ----------
CNexus said:
You're supposed to extract the zip and then pass the path to the directory to setup.sh...
Click to expand...
Click to collapse
i think i did it couse terminal acepted all codes so i restarted and now superuser ask me to update su binary ?? am i done?? please help
Sent from my SAMSUNG-SGH-I747 using xda premium
If you extracted to that directory, then the command you need to run is "./setup.sh /storage/extsdcard/motochopperdir"
But first you need to do "cd /data/data/jackpal.androidterm" if you're not already in that directory.
CNexus said:
If you extracted to that directory, then the command you need to run is "./setup.sh /storage/extsdcard/motochopperdir"
But first you need to do "cd /data/data/jackpal.androidterm" if you're not already in that directory.
Click to expand...
Click to collapse
im so lost my bad i dont want to make u waist your time but is it posible for you to send me the exact commands from top to bottom? i tried your sample and i dont know somethimes it tells me too many arguments haha its getting mad at me sorry for my ignorance on this anyway the extracted zip is on sdcard and is called motochopper-mobile thanks
Sent from my SAMSUNG-SGH-I747 using xda premium