FORUMS

[VOLVO SCT] Volvo Sensus Connected Touch (car - navi - audio)

353 posts
Thanks Meter: 85
 
By RichieB, Senior Member on 18th September 2013, 07:51 AM
Post Reply Email Thread
5th March 2014, 08:25 AM |#1321  
Senior Member
Thanks Meter: 104
 
More
maybe I wasn't clear enough. The setpropex is working, so you need to add that command to one of the init scripts. Just pick one.
For example /etc/init.parrot.sh

at the end:
Code:
[ -f /system/etc/init.parrot.$(getprop ro.hardware).sh ] &&
. /system/etc/init.parrot.$(getprop ro.hardware).sh

#emulate post-freeze
start parrot-post
change to

Code:
[ -f /system/etc/init.parrot.$(getprop ro.hardware).sh ] &&
. /system/etc/init.parrot.$(getprop ro.hardware).sh

./system/xbin/setpropex ro.parrot.install.allow-all 1

#emulate post-freeze
start parrot-post
This assumes that you put the setprop binary in /system/xbin.
Those init scripts should be running as root, so no need to su run them. after reboot you should have apk install.
The Following User Says Thank You to gekkekoe123 For This Useful Post: [ View ] Gift gekkekoe123 Ad-Free
5th March 2014, 09:21 AM |#1322  
OP Senior Member
Thanks Meter: 85
 
More
I think you need to drop the . before /system (just in case the current directory is not /):
Code:
[ -f /system/etc/init.parrot.$(getprop ro.hardware).sh ] &&
. /system/etc/init.parrot.$(getprop ro.hardware).sh

/system/xbin/setpropex ro.parrot.install.allow-all 1

#emulate post-freeze
start parrot-post
5th March 2014, 10:09 AM |#1323  
Senior Member
Thanks Meter: 104
 
More
You could do that, but my lines should work as well (parrot assumes scripts in root as well). Doens't really matter in this case.

I probably do the upgrade to the new firmware in the coming days.
5th March 2014, 04:50 PM |#1324  
Member
Thanks Meter: 3
 
More
Quote:
Originally Posted by RichieB

I think you need to drop the . before /system (just in case the current directory is not /):

Code:
[ -f /system/etc/init.parrot.$(getprop ro.hardware).sh ] &&
. /system/etc/init.parrot.$(getprop ro.hardware).sh

/system/xbin/setpropex ro.parrot.install.allow-all 1

#emulate post-freeze
start parrot-post

I am confused. Should I try the .jar file method or this one?
5th March 2014, 06:30 PM |#1325  
Member
Thanks Meter: 3
 
More
Quote:
Originally Posted by gekkekoe123

in this order from safe to less safe

Overriding the property at boot with setpropex, replacing jar, replacing initrd

Download the attached setprop.zip

unzip, and adb push setpropex files to tmp folder.
adb shell
su to root
chmod +x the setpropex

now execute:
./setpropex ro.parrot.install.allow-all 1

check if property is set:
getprop ro.parrot.install.allow-all
should give true.

you should be able to install apks now.
If this works, we need to let this command run on boot, and problem should be solved.

[edit]
removed the .so libs in package, since it isn't required.

The value did change to true but still failed install app through app store.
5th March 2014, 06:52 PM |#1326  
donaldta's Avatar
Senior Member
Thanks Meter: 461
 
Donate to Me
More
Quote:
Originally Posted by gekkekoe123

maybe I wasn't clear enough. The setpropex is working, so you need to add that command to one of the init scripts. Just pick one.

Remember not everyone knows which one to pick. The optimal one to modify is the "init.parrot.capabilities.sh" script because that is the first one called by /init.rc which is the intial bootup script. I looked at the master_boot archive and saw that this line is the first external .sh file executed by the /init.rc file.

Quote:

Contents of the /init.rc file, line #283 is highlighted in red:

Code:
on early-init
    start ueventd

on init

sysclktz 0

loglevel 3

# setup the global environment
    export PATH /sbin:/system/sbin:/system/bin:/system/xbin
    export LD_LIBRARY_PATH /system/lib
    export ANDROID_BOOTLOGO 1
    export ANDROID_ROOT /system
    export ANDROID_ASSETS /system/app
    export ANDROID_DATA /data
    export EXTERNAL_STORAGE /mnt/sdcard
    export ASEC_MOUNTPOINT /mnt/asec
    export LOOP_MOUNTPOINT /mnt/obb
    export BOOTCLASSPATH /system/framework/core.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/core-junit.jar
    export DSP_PATH /system/lib/dsp
    export DEFAULT_BASEIMAGE /system/lib/dsp/baseimage.dof
    export QOSDYN_FILE /system/lib/dsp/qosdyn_3430.dll64P

# Location of BT firmware files
    export BT_FW_PATH /system/lib/firmware

# Backward compatibility
    symlink /system/etc /etc
    symlink /system/vendor /vendor
    symlink /sys/kernel/debug /d

# create mountpoints
    mkdir /mnt 0775 root system
    mkdir /mnt/sdcard 0000 system system


# We chown/chmod /data again so because mount is run as root + defaults
    chown system system /data
    chmod 0771 /data

# Create cgroup mount point for cpu accounting
    mkdir /acct
    mount cgroup none /acct cpuacct
    mkdir /acct/uid

# Backwards Compat - XXX: Going away in G*
    symlink /mnt/sdcard /sdcard

    mkdir /system
    mkdir /tmp 0775
    mkdir /data 0771 system system
    mkdir /cache 0771 system cache
    mkdir /config 0500 root root

# Directory for putting things only root should see.
    mkdir /mnt/secure 0700 root root

# Directory for staging bindmounts
    mkdir /mnt/secure/staging 0700 root root

# Directory-target for where the secure container
# imagefile directory will be bind-mounted
    mkdir /mnt/secure/asec  0700 root root

# Secure container public mount points.
    mkdir /mnt/asec  0700 root system
    mount tmpfs tmpfs /mnt/asec mode=0755,gid=1000

# Filesystem image public mount points.
    mkdir /mnt/obb 0700 root system
    mount tmpfs tmpfs /mnt/obb mode=0755,gid=1000

# since system is also on root - we don't want to do this
    # mount rootfs rootfs / ro remount

    write /proc/sys/kernel/panic_on_oops 1
    write /proc/sys/kernel/hung_task_timeout_secs 0
    write /proc/cpu/alignment 4
    write /proc/sys/kernel/sched_latency_ns 10000000
    write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000
    write /proc/sys/kernel/sched_compat_yield 1
    write /proc/sys/kernel/sched_child_runs_first 0

# Create cgroup mount points for process groups
    mkdir /dev/cpuctl
    mount cgroup none /dev/cpuctl cpu
    chown system system /dev/cpuctl
    chown system system /dev/cpuctl/tasks
    chmod 0777 /dev/cpuctl/tasks
    write /dev/cpuctl/cpu.shares 1024

    mkdir /dev/cpuctl/audio
    # reserve 90% cpu for audio tasks
    chown system system /dev/cpuctl/audio
    chown system system /dev/cpuctl/audio/tasks
    chmod 0777 /dev/cpuctl/audio/tasks
    write /dev/cpuctl/audio/cpu.shares 9216

    # group others
    mkdir /dev/cpuctl/others
    chown system system /dev/cpuctl/others
    chown system system /dev/cpuctl/others/tasks
    chmod 0777 /dev/cpuctl/others/tasks
    write /dev/cpuctl/others/cpu.shares 1024
        #put init in others
    write /dev/cpuctl/others/tasks 1

    mkdir /dev/cpuctl/others/fg_boost
    chown system system /dev/cpuctl/others/fg_boost
    chown system system /dev/cpuctl/others/fg_boost/tasks
    chmod 0777 /dev/cpuctl/others/fg_boost/tasks
    write /dev/cpuctl/others/fg_boost/cpu.shares 1024

    mkdir /dev/cpuctl/others/bg_non_interactive
    chown system system /dev/cpuctl/others/bg_non_interactive
    chown system system /dev/cpuctl/others/bg_non_interactive/tasks
    chmod 0777 /dev/cpuctl/others/bg_non_interactive/tasks
# 5.0 %
    write /dev/cpuctl/others/bg_non_interactive/cpu.shares 52

# mount mtd partitions
        #do not work, done in init.c
        #import /init-mount.rc

#for parrot compat
        mkdir /bin/
    symlink /system/bin/sh /bin/sh
        mkdir /lib
    symlink /system/lib/modules /lib/modules

on post-fs
# once everything is setup, no need to modify /
        mount rootfs rootfs / ro remount

    chown system system /data
    chmod 0771 /data

# Create dump dir and collect dumps.
# Do this before we mount cache so eventually we can use cache for
# storing dumps on platforms which do not have a dedicated dump partition.
    mkdir /data/dontpanic
    chown root log /data/dontpanic
    chmod 0750 /data/dontpanic

# Collect apanic data, free resources and re-arm trigger
    copy /proc/apanic_console /data/dontpanic/apanic_console
    chown root log /data/dontpanic/apanic_console
    chmod 0640 /data/dontpanic/apanic_console

    copy /proc/apanic_threads /data/dontpanic/apanic_threads
    chown root log /data/dontpanic/apanic_threads
    chmod 0640 /data/dontpanic/apanic_threads

    write /proc/apanic_console 1

# Same reason as /data above
    chown system cache /cache
    chmod 0771 /cache

# This may have been created by the recovery system with odd permissions
    chown system cache /cache/recovery
    chmod 0770 /cache/recovery

#change permissions on vmallocinfo so we can grab it from bugreports
    chown root log /proc/vmallocinfo
    chmod 0440 /proc/vmallocinfo

#change permissions on kmsg & sysrq-trigger so bugreports can grab kthread stacks
    chown root system /proc/kmsg
    chmod 0440 /proc/kmsg
    chown root system /proc/sysrq-trigger
    chmod 0220 /proc/sysrq-trigger

# create basic filesystem structure
    mkdir /data/misc 01771 system misc
    mkdir /data/misc/bluetoothd 0770 bluetooth bluetooth
    mkdir /data/misc/bluetooth 0770 system system
    mkdir /data/misc/keystore 0700 keystore keystore
    mkdir /data/misc/vpn 0770 system system
    mkdir /data/misc/systemkeys 0700 system system
    mkdir /data/misc/vpn/profiles 0770 system system
    mkdir /data/misc/dhcp 0770 dhcp dhcp
    mkdir /data/misc/udhcpd 0777 wifi wifi

# give system access to wpa_supplicant.conf for backup and restore
    mkdir /data/misc/wifi 0770 wifi wifi
    mkdir /data/misc/wifi/sockets 0770 wifi wifi
    chmod 0770 /data/misc/wifi
    chmod 0660 /data/misc/wifi/wpa_supplicant.conf
    mkdir /data/local 0771 shell shell
    mkdir /data/local/tmp 0771 shell shell
    mkdir /data/data 0771 system system
    mkdir /data/app-private 0771 system system
    mkdir /data/app 0771 system system
    # We chown/chmod /data/app again in case it was created at build-time
    chown system system /data/app
    chmod 0771 /data/app
    mkdir /data/property 0700 root root

# create dalvik-cache and double-check the perms
    mkdir /data/dalvik-cache 0771 system system
    chown system system /data/dalvik-cache
    chmod 0771 /data/dalvik-cache
# create dalvik-cache in /cache
    mkdir /cache/dalvik-cache 0771 system system
    chown system system /cache/dalvik-cache
    chmod 0771 /cache/dalvik-cache

# create the lost+found directories, so as to enforce our permissions
    mkdir /data/lost+found 0770
    mkdir /cache/lost+found 0770

# change permissions for alsa nodes
    symlink /dev/snd/pcmC0D0c /dev/pcmC0D0c
    symlink /dev/snd/pcmC0D0p /dev/pcmC0D0p
    symlink /dev/snd/controlC0 /dev/controlC0
    symlink /dev/snd/timer /dev/timer
    chown audio audio /dev/pcmC0D0c
    chown audio audio /dev/pcmC0D0p
    chown audio audio /dev/controlC0
    chown audio audio /dev/timer

# change permissions for modem
#    chmod 0660 /dev/ttyS0
#    chown radio radio /dev/ttyS0

# change permissions for bridge.  Symlink search directory
    chmod 0777 /dev/DspBridge

# change permissions for Camera
    chmod 0777 /dev/video5
    chmod 0777 /dev/video0

# change permissions for Overlay
    chmod 0777 /dev/video1
    chmod 0777 /dev/video2

# change permissions for overlay managers and display devices
    chmod 0775 /sys/devices/platform/omapdss/manager0/name
    chmod 0775 /sys/devices/platform/omapdss/manager1/name

    chmod 0775 /sys/devices/platform/omapdss/display0/name
    chmod 0775 /sys/devices/platform/omapdss/display1/name

    chmod 0775 /sys/devices/platform/omapdss/display0/enabled
    chmod 0775 /sys/devices/platform/omapdss/display1/enabled

    chmod 0775 /sys/devices/platform/omapdss/display1/timings
    chmod 0775 /sys/devices/platform/omapdss/display0/timings

    chmod 0775 /sys/devices/platform/omapdss/overlay0/manager
    chmod 0775 /sys/devices/platform/omapdss/overlay1/manager
    chmod 0775 /sys/devices/platform/omapdss/overlay2/manager

    chmod 0775 /sys/devices/platform/omapdss/overlay0/enabled
    chmod 0775 /sys/devices/platform/omapdss/overlay1/enabled
    chmod 0775 /sys/devices/platform/omapdss/overlay2/enabled

# change permissions for Previewer and Resizer
    chmod 0777 /dev/omap-previewer
    chmod 0777 /dev/omap-resizer

    chmod 0777 /dev/video6
    chmod 0777 /dev/video10
    chmod 0777 /dev/omap-prev2resz

# double check the perms, in case lost+found already exists, and set owner
    chown root root /data/lost+found
    chmod 0770 /data/lost+found
    chown root root /cache/lost+found
    chmod 0770 /cache/lost+found

#Owners, Modes for Bluetooth
    chmod 0660 /dev/ttyS1
    chown bluetooth bluetooth /dev/ttyS1
    chmod 0660 sys/class/rfkill/rfkill0/state
    chown bluetooth bluetooth /sys/class/rfkill/rfkill0/state
    write sys/class/rfkill/rfkill0/state 0

# Add HTSIPipes dir for compatibility between all asteroid line product
    mkdir /tmp/HSTIPipes 0775

#Change Capabilities
    exec /system/etc/init.parrot.capabilities.sh

on boot
# basic network init
    ifup lo
    hostname localhost
    domainname localdomain

# set RLIMIT_NICE to allow priorities from 19 to -20
    setrlimit 13 40 40

# Set timeout value for rmnet stats.
    write /sys/devices/virtual/net/rmnet0/timeout_suspend 5000000

# Define the oom_adj values for the classes of processes that can be
# killed by the kernel.  These are used in ActivityManagerService.
    setprop ro.FOREGROUND_APP_ADJ 0
    setprop ro.VISIBLE_APP_ADJ 1
    setprop ro.PERCEPTIBLE_APP_ADJ 2
    setprop ro.HEAVY_WEIGHT_APP_ADJ 3
    setprop ro.SECONDARY_SERVER_ADJ 4
    setprop ro.BACKUP_APP_ADJ 5
    setprop ro.HOME_APP_ADJ 6
    setprop ro.HIDDEN_APP_MIN_ADJ 7
    setprop ro.EMPTY_APP_ADJ 15

# Define the memory thresholds at which the above process classes will
# be killed.  These numbers are in pages (4k).
    setprop ro.FOREGROUND_APP_MEM 2048
    setprop ro.VISIBLE_APP_MEM 3072
    setprop ro.PERCEPTIBLE_APP_MEM 4096
    setprop ro.HEAVY_WEIGHT_APP_MEM 4096
    setprop ro.SECONDARY_SERVER_MEM 6144
    setprop ro.BACKUP_APP_MEM 6144
    setprop ro.HOME_APP_MEM 6144
    setprop ro.HIDDEN_APP_MEM 5120
    setprop ro.EMPTY_APP_MEM 6144

# Write value must be consistent with the above properties.
# Note that the driver only supports 6 slots, so we have HOME_APP at the
# same memory level as services.

    write /sys/module/lowmemorykiller/parameters/adj 0,1,2,4,7,15
    write /proc/sys/vm/overcommit_memory 1
    write /proc/sys/vm/min_free_order_shift 4
    write /sys/module/lowmemorykiller/parameters/minfree 2048,3072,4096,6144,7168,8192

# Set init its forked children's oom_adj.
    write /proc/1/oom_adj -16

# Tweak background writeout
    write /proc/sys/vm/dirty_expire_centisecs 200
    write /proc/sys/vm/dirty_background_ratio  5

# Copying hostapd.conf (WLAN soft AP)
    copy /system/etc/wifi/softap/hostapd.conf /data/misc/wifi/hostapd.conf
    chown wifi wifi /data/misc/wifi

# Enable Power Management

# Mount Debug file system
    mkdir /debug
    mount debugfs debugfs /debug

# Enabling sleep in idle path
    write /debug/pm_debug/sleep_while_idle 1

# Enabling Voltage OFF in idle path
    write /debug/pm_debug/voltage_off_while_idle 1

# Enabling OFF mode
    write /debug/pm_debug/enable_off_mode 1

# Enablig DVFS with ondemand governor
    write /sys/devices/system/cpu/cpu0/cpufreq/scaling_governor ondemand

# Permissions for setting the DSP Frequency
    chown media root /sys/power/dsp_freq

# Permissions for System Server and daemons.
    chown radio system /sys/android_power/state
    chown radio system /sys/android_power/request_state
    chown radio system /sys/android_power/acquire_full_wake_lock
    chown radio system /sys/android_power/acquire_partial_wake_lock
    chown radio system /sys/android_power/release_wake_lock
    chown radio system /sys/power/state
    chown radio system /sys/power/wake_lock
    chown radio system /sys/power/wake_unlock
    chmod 0660 /sys/power/state
    chmod 0660 /sys/power/wake_lock
    chmod 0660 /sys/power/wake_unlock
    chown system system /sys/class/timed_output/vibrator/enable
    chown system system /sys/class/leds/keyboard-backlight/brightness
    chown system system /sys/class/leds/lcd-backlight/brightness
    chown system system /sys/class/leds/button-backlight/brightness
    chown system system /sys/class/leds/jogball-backlight/brightness
    chown system system /sys/class/leds/red/brightness
    chown system system /sys/class/leds/green/brightness
    chown system system /sys/class/leds/blue/brightness
    chown system system /sys/class/leds/red/device/grpfreq
    chown system system /sys/class/leds/red/device/grppwm
    chown system system /sys/class/leds/red/device/blink
    chown system system /sys/class/leds/red/brightness
    chown system system /sys/class/leds/green/brightness
    chown system system /sys/class/leds/blue/brightness
    chown system system /sys/class/leds/red/device/grpfreq
    chown system system /sys/class/leds/red/device/grppwm
    chown system system /sys/class/leds/red/device/blink
    chown system system /sys/class/timed_output/vibrator/enable
    chown system system /sys/module/sco/parameters/disable_esco
    chown system system /sys/kernel/ipv4/tcp_wmem_min
    chown system system /sys/kernel/ipv4/tcp_wmem_def
    chown system system /sys/kernel/ipv4/tcp_wmem_max
    chown system system /sys/kernel/ipv4/tcp_rmem_min
    chown system system /sys/kernel/ipv4/tcp_rmem_def
    chown system system /sys/kernel/ipv4/tcp_rmem_max
    chown root radio /proc/cmdline

# Define TCP buffer sizes for various networks
# ReadMin, ReadInitial, ReadMax, WriteMin, WriteInitial, WriteMax,
    setprop net.tcp.buffersize.default 4096,87380,110208,4096,16384,110208
    setprop net.tcp.buffersize.wifi    4095,87380,110208,4096,16384,110208
    setprop net.tcp.buffersize.umts    4094,87380,110208,4096,16384,110208
    setprop net.tcp.buffersize.edge    4093,26280,35040,4096,16384,35040
    setprop net.tcp.buffersize.gprs    4092,8760,11680,4096,8760,11680

# Define modem related settings
    setprop ro.radio.use-ppp yes
    setprop keyguard.no_require_sim 1
    setprop ro.config.nocheckin yes

# SGX driver
    chmod 0666 /dev/pvrsrvkm

    class_start default

# ueventd
    service ueventd /sbin/ueventd
        critical

## Daemon processes to be run by init.
    service console /system/bin/sh
        console
        disabled

# Initialize the SGX driver
    service pvrsrvinit /system/bin/pvrsrvinit
        user root
        oneshot


# adbd is controlled by the persist.service.adb.enable system property
    service adbd /sbin/adbd
        disabled

# adbd on at boot in emulator
    on property:ro.kernel.qemu=1
        start adbd

    on property:persist.service.adb.tcp=1
        setprop service.adb.tcp.port 5555

    on property:persist.service.adb.tcp=0
        setprop service.adb.tcp.port -1

    on property:persist.service.adb.enable=1
        start adbd

    on property:persist.service.adb.enable=0
        stop adbd

    service servicemanager /system/bin/servicemanager
        user system
        critical
        onrestart restart zygote
        onrestart restart media

    service vold /system/bin/vold
        socket vold stream 0660 root mount
        ioprio be 2

    service netd /system/bin/netd
        socket netd stream 0660 root system

    service debuggerd /system/bin/debuggerd

    service datavolmd /system/bin/run-as parrot /system/bin/logwrapper /system/xbin/datavolm
        disabled

    on property:init.svc.zygote=running
        start datavolmd

    service macgyverd /system/bin/run-as parrot /system/xbin/macgyverd.sh
        disabled

    on property:persist.service.macgyverd.anon=1
        setprop service.macgyver.anon.changed 1
        restart macgyverd
        setprop service.macgyver.anon.changed 0

    on property:persist.service.macgyverd.anon=0
        setprop service.macgyver.anon.changed 1
        restart macgyverd
        setprop service.macgyver.anon.changed 0

    service reporter /system/bin/run-as parrot /system/xbin/reporter.sh
        disabled
        oneshot

    service ril-daemon /system/bin/rild
        socket rild stream 660 root radio
        socket rild-debug stream 660 radio system

    user root
    group radio cache inet misc audio

    service zygote /system/bin/app_process -Xzygote /system/bin --zygote --start-system-server
        socket zygote stream 666
        onrestart write /sys/android_power/request_state wake
        onrestart write /sys/power/state on
        onrestart restart media

    service media /system/bin/mediaserver
        user media
        group system audio camera graphics inet net_bt net_bt_admin net_raw
        ioprio rt 4

    service bootanim /system/bin/bootanimation
        user graphics
        group graphics
        disabled
        oneshot

    service installd /system/bin/installd
        socket installd stream 600 system system

    service flash_recovery /system/etc/install-recovery.sh
        oneshot

    service racoon /system/bin/racoon
        socket racoon stream 600 system system
        # racoon will setuid to vpn after getting necessary resources.
        group net_admin
        disabled
        oneshot

    service mtpd /system/bin/mtpd
        socket mtpd stream 600 system system
        user vpn
        group vpn net_admin net_raw
        disabled
        oneshot

    service keystore /system/bin/keystore /data/misc/keystore
        user keystore
        group keystore
        socket keystore stream 666

    service dumpstate /system/bin/dumpstate -s
        socket dumpstate stream 0660 shell log
        disabled
        oneshot

# OMAP specific services start here

# load DSP firmware
    service baseimage /system/bin/cexec.out /system/lib/dsp/baseimage.dof
        user root
        group audio
                disabled
        oneshot

    service bootsound /system/bin/playmp3
        user media
        group audio
        oneshot

# parrot service here
        service parrot-setup /system/etc/init.parrot.sh
                oneshot

        service parrot-post /system/etc/init.parrot-postfreeze.sh
                disabled
                oneshot

#IP renew mlan0
#common to all fc6100 based products
service iprenew_mlan0 /system/bin/logwrapper /system/bin/dhcpcd -n
                disabled
                oneshot

I propose the following modification to the "init.parrot.capabilities.sh" file :
Code:
#!/system/bin/sh
/system/xbin/setpropex ro.parrot.install.allow-all true

#capchecker come from lucie package
if [ -f /system/xbin/capchecker ] ; then

  if [ ! -f /system/capabilitiesDone ] ; then
	  mount -o remount,rw /system /system

	  chown parrot /system/lib/udev/*

	  capchecker -i /system/xbin/*
	  capchecker -i /system/bin/*
	  capchecker -i /system/lib/udev/*

	  [ -f /system/etc/init.parrot.capabilities.product.sh ] &&
	  . /system/etc/init.parrot.capabilities.product.sh
	  #validate cap changes
	  sync
	  touch /system/capabilitiesDone

	  mount -o remount,ro /system /system
  fi
fi
Quote:

Quote:
Originally Posted by RichieB

I think you need to drop the . before /system (just in case the current directory is not /):

Quote:
Originally Posted by gekkekoe123

You could do that, but my lines should work as well (parrot assumes scripts in root as well). Doens't really matter in this case.

No, it does matter. You should not specify "." in front of the path if you do not know its present working directory. The leading dot would mean "from here".

Here is an example of why:
Code:
# pwd
/system/etc
# ls -l ./default.prop
./default.prop: No such file or directory
# ls -l /default.prop
-rw-r--r-- root     root          151 1969-12-31 18:00 default.prop
#
Quote:
Originally Posted by dongwenxuan

I am confused. Should I try the .jar file method or this one?

As usual, try my method first. Replace the stock "/system/etc/init.parrot.capabilities.sh" script with my modified version attached below.

Code:
C:\{path\to\cmd-frama-menu\}bin\> adb push init.parrot.capabilities.sh /data/local/tmp/
C:\{path\to\cmd-frama-menu\}bin\> adb shell
$ su
# chmod 770 /data/local/tmp/init.parrot.capabilities.sh
# chown root.shell /data/local/tmp/init.parrot.capabilities.sh
# /system/xbin/remount.sh system-rw
# cp /data/local/tmp/init.parrot.capabilities.sh /system/etc/.
# ls -l /system/etc/init.parrot.capabilities.sh
-r-xr-x--- root     shell         {size} {date} {time} init.parrot.capabilities.sh
# rm /data/local/tmp/init.parrot.capabilities.sh
# reboot
---------- Post added at 12:49 PM ---------- Previous post was at 12:43 PM ----------
Quote:
Originally Posted by dongwenxuan

The value did change to true but still failed install app through app store.

The conjecture here is whether or not the service.jar file reads the system property for "ro.parrot.install.allow-all" once during Android's initialization. We're proposing to actuate the alteration by modifying the init scripts which are read before Android during Linux's initialization.
Attached Files
File Type: zip init.parrot.capabilities.zip - [Click for QR Code] (403 Bytes, 39 views)
5th March 2014, 07:47 PM |#1327  
Senior Member
Thanks Meter: 104
 
More
Actually it was fine (since we are in the root folder), but since I was too lazy, I used your file. I had to correct the "true" to 1.
I also changed the menu to do this. I removed the set prop option, it's not needed anymore. Setpropex should also work on older versions.

Btw, I did the upgrade manually using adb shell, and did not used the menu.bat.
So if anyone could test it or double check the menu.bat file, it should be fine. I translated the manual commands back into the menu.bat

My SCT is upgraded and I am able to install apks Let's find out if waze lost of data is fixed. Also adjusting screen dpi is still working. But we now have setpropex so we can override everything

When you finished step 5, you need to reboot in order to be able to install apks.

As allways: no guarantee and at your own risk when using the tools
Attached Files
File Type: zip menu3.zip - [Click for QR Code] (4.63 MB, 211 views)
The Following 4 Users Say Thank You to gekkekoe123 For This Useful Post: [ View ] Gift gekkekoe123 Ad-Free
5th March 2014, 07:54 PM |#1328  
OP Senior Member
Thanks Meter: 85
 
More
Great, thanks! I might do the upgrade next Friday. Or maybe not.. there is not a lot that changed, so I have little incentive.
5th March 2014, 08:08 PM |#1329  
Member
Thanks Meter: 3
 
More
Quote:
Originally Posted by donaldta

As usual, try my method first. Replace the stock "/system/etc/init.parrot.capabilities.sh" script with my modified version attached below.

Code:
C:\{path\to\cmd-frama-menu\}bin\> adb push init.parrot.capabilities.sh /data/local/tmp/
C:\{path\to\cmd-frama-menu\}bin\> adb shell
$ su
# chmod 770 /data/local/tmp/init.parrot.capabilities.sh
# chown root.shell init.parrot.capabilities.sh
# /system/xbin/remount.sh system-rw
# cp /data/local/tmp/init.parrot.capabilities.sh /system/etc/.
# ls -l /system/etc/init.parrot.capabilities.sh
-r-xr-x--- root     shell         {size} {date} {time} init.parrot.capabilities.sh
# rm /data/local/tmp/init.parrot.capabilities.sh
# reboot
---------- Post added at 12:49 PM ---------- Previous post was at 12:43 PM ----------

The conjecture here is whether or not the service.jar file reads the system property for "ro.parrot.install.allow-all" once during Android's initialization. We're proposing to actuate the alteration by modifying the init scripts which are read before Android during Linux's initialization.

I think when running your code, there is an error?
# chown root.shell init.parrot.capabilities.sh
chown root.shell init.parrot.capabilities.sh
Unable to chmod init.parrot.capabilities.sh: No such file or directory

---------- Post added at 09:08 PM ---------- Previous post was at 09:07 PM ----------

Quote:
Originally Posted by gekkekoe123

Actually it was fine (since we are in the root folder), but since I was too lazy, I used your file. I had to correct the "true" to 1.
I also changed the menu to do this. I removed the set prop option, it's not needed anymore. Setpropex should also work on older versions.

Btw, I did the upgrade manually using adb shell, and did not test the menu.bat.
So if anyone could test it or double check the menu.bat file, it should be fine. I translated the manual commands back into the menu.bat

My SCT is upgraded and I am able to install apks Let's find out if waze lost of data is fixed. Also adjusting screen dpi is still working. But we now have setpropex so we can override everything

As allways: no guarantee and at your own risk when using the tools

I tested, the bat file is not working.
5th March 2014, 08:10 PM |#1330  
Senior Member
Thanks Meter: 104
 
More
did you do all step?

you need to remount system as RW and then install the setprop and overwrite init file
run 2 and then 5 and reboot.
5th March 2014, 08:10 PM |#1331  
donaldta's Avatar
Senior Member
Thanks Meter: 461
 
Donate to Me
More
Quote:
Originally Posted by dongwenxuan

I think when running your code, there is an error?
# chown root.shell init.parrot.capabilities.sh
chown root.shell init.parrot.capabilities.sh
Unable to chmod init.parrot.capabilities.sh: No such file or directory
I tested, the bat file is not working.

Yes, sorry I slipped and did not specify the full path, the command should be "chown root.shell /data/local/tmp/init.parrot.capabilities.sh"
Post Reply Subscribe to Thread

Tags
car audio, sct, sensus connected touch, volvo

Guest Quick Reply (no urls or BBcode)
Message:
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes