Android app push to device system directory

Source: Internet
Author: User
Tags ranges

The command prompt adb shell can install Android apps under System on a device that has already been rooted.

Here's how to push the app directly to the/system/app folder

The main steps are as follows:

1. ADB devices

2, ADB remount//re-installed in the system file, the device to read and writable

3. ADB push .... apk/system/app/

Because the ADB remount often appears remount failed:operation not permitted, the steps for Remount success are as follows 3-11.

The detailed steps are as follows:

1, ADB devices//First connect the device to the computer

2. ADB shell//Enter Shell mode

3. Mount//Get the mount point of the system, such as/dev/block/mmcblk0p22/system

4, SU//due to mount system partition read and write operation must be under root authority, so the device must obtain root

5. Mount-o Remount,rw/dev/block/mmcblk0p22/system (mount point of System)//Reinstall root directory by Mount command modify read and write rights

6, chmod 777/system//Modify the permissions of the system, become readable and writable

7. CD System//Enter system

8. chmod 777 App//This is the right to modify the app folder under System

9. CD app//Enter app

10. Exit

11. Exit

12. ADB push .... apk/system/app/

Detailed Step Analysis:

One, Mount command: Mount [-R] [-W] [-O options] [-t type] Device directory

0) Mount-o remount: Re-mount the root directory

1)-R/w: Installs the file system as read-only/writable mode

2)-O options: Describes how devices or files are hooked up

Loop: Attach a file as a hard disk partition hook up system

RO: Hook device with read-only method

RW: Mount device with read-write mode

Iocharset: Specifies the character set used to access the file system

3)-T type: Specifies the file system type (usually without specifying, mount will automatically select the correct type)

4) Device: devices to mount Mount

5) Directory: The device hangs on the system node

Second, chmod 777:chmod ABC file

Under the UNIX operating system, file or directory permission control is distinguished by reading, writing, and executing 3 of the general permissions.

The permission ranges are as follows:

U:user----file or directory owner

G:group----file or directory belongs to a group

O:other----A file or directory owner or other user range other than the owning group

A:all---All Users

The permission code is indicated as follows:

R:read----Read permission/number code "4"

W:write----Write permission/number code "2"

X:execute----Execute Permissions/number code "1"

-: No permission/number code "0"

S:special----Special permissions (change permissions)

Permission statements consisting of permission ranges and permission codes are represented as follows:

-ABCABCABC (e.g.-rwxrwxrwx)

Where: The first "-" represents the type, ABC is represented as a permission range of three classes (A=user b=group c=other/corresponding permissions r=4 w=2 x=1)

such as chmod 777./indicates that this directory is set to anyone readable writable executable

Android app push to device system directory

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.