안드로이드 폰에서 사용할 수 있는 Shell Command는 /system/bin 디렉토리에서 확인할 수 있습니다.
These commands are present in /system/bin
am
app_process
applypatch
applypatch_static
bluetoothd
bmgr
bootanimation
btld
bugreport
cat
charging_mode
check_prereq
chmod
chown
cmp
cryptsetup
csview
dalvikvm
date
dbus-daemon
dd
debuggerd
dexopt
df
dhcpcd
discard_util
dmbserver
dmesg
dnsmasq
drexe
drm_android_siso_test
drm_sqlite3_test
dumpmesg
dumpstate
dumpsys
dvz
e2fsck
flash_image
fsck_msdos
gdbjithelper
getevent
getprop
gzip
hciattach
hd
id
ifconfig
iftop
ime
immvibed
input
insmod
installd
ioctl
ionice
ip
iptables
iwland
keystore
kill
linker
ln
log
logcat
logwrapper
ls
lsmod
lsof
macloader
make_ext4fs
mediaserver
mfgloader
mkdir
monkey
mount
mtpd
mv
nandread
ndc
netcfg
netd
netstat
newfs_msdos
notified_event
notify
npsmobex
omx_tests
pand
passcodemanager
ping
playlpm
pm
pppd
printenv
ps
racoon
reboot
renice
rild
rm
rmdir
rmmod
route
rtc_log.sh
run-as
samsungani
samsungpowersoundplay
schedtest
schedtop
sdcard
sdptool
sendevent
service
servicemanager
setconsole
setprop
sh
sleep
smd
start
stop
surfaceflinger
svc
sync
system_server
tc
toolbox
top
tvoutserver
umount
updater
uptime
vdc
vmstat
vold
watchprops
wipe
wlandutservice
wpa_supplicantakmd: no response, system hangs up using connectbot v1.7.1, logged in as local $ am [subcommand] [options] start an Activity: am start [-D] [-W] <INTENT> -D: enable debugging -W: wait for launch to complete start a Service: am startservice <INTENT> send a broadcast Intent: am broadcast <INTENT> start an Instrumentation: am instrument [flags] <COMPONENT> -r: print raw results (otherwise decode REPORT_KEY_STREAMRESULT) -e <NAME> <VALUE>: set argument <NAME> to <VALUE> -p <FILE>: write profiling data to <FILE> -w: wait for instrumentation to finish before returning start profiling: am profile <PROCESS> start <FILE> stop profiling: am profile <PROCESS> stop <INTENT> specifications include these flags: [-a <ACTION>] [-d <DATA_URI>] [-t <MIME_TYPE>] [-c <CATEGORY> [-c <CATEGORY>] ...] [-e|--es <EXTRA_KEY> <EXTRA_STRING_VALUE> ...] [--esn <EXTRA_KEY> ...] [--ez <EXTRA_KEY> <EXTRA_BOOLEAN_VALUE> ...] [-e|--ei <EXTRA_KEY> <EXTRA_INT_VALUE> ...] [-n <COMPONENT>] [-f <FLAGS>] [--grant-read-uri-permission] [--grant-write-uri-permission] [--debug-log-resolution] [--activity-brought-to-front] [--activity-clear-top] [--activity-clear-when-task-reset] [--activity-exclude-from-recents] [--activity-launched-from-history] [--activity-multiple-task] [--activity-no-animation] [--activity-no-history] [--activity-no-user-action] [--activity-previous-is-top] [--activity-reorder-to-front] [--activity-reset-task-if-needed] [--activity-single-top] [--receiver-registered-only] [--receiver-replace-pending] [<URI>] app_process cat $ chmod <MODE> <FILE> $ cmp Usage: cmp [-b] [-l] [-n count] file1 file2 dalvikvm $ dalvikvm Dalvik VM requires a class name date $ dbus-daemon No configuration file specified. dbus-daemon [--version] [--session] [--system] [--config-file=FILE] [--print-add ress[=DESCRIPTOR]] [--print-pid[=DESCRIPTOR]] [--fork] [--nofork] [--introspect dd debug_tool debuggerd $ dexopt Usage: don't use this $ df output /dev: 319124K total, 0K used, 319124K available (block size 4096) /system: 558668K total, 398176K used, 160492K available (block size 4096) /data: 1178068K total, 259136K used, 918932K available (block size 4096) /cache: 294628K total, 42992K used, 251636K available (block size 4096) /devlog: 21100K total, 15980K used, 5120K available (block size 4096) /mnt/asec: 319124K total, 0K used, 319124K available (block size 4096) /app-cache: 8192K total, 5540K used, 2652K available (block size 4096) /mnt/sdcard: 7763968K total, 277088K used, 7486880K available (block size 32768) /mnt/secure/asec: Permission denied /mnt/asec/com.RunnerGames.game.YooNinja_Lite-1: 6236K total, 5012K used, 1224K a vailable (block size 4096) /mnt/asec/com.glu.android.gunbros_free-1: 4164K total, 2104K used, 2060K availab le (block size 4096) dhcpcd dmesg dumpcrash dumpstate dumpsys dvz fillup flash_image getevent getprop hciattach hcid $ hd usage: hd [-b base] [-c coun] [-r delay] file hostapd hostapd_cli htclogkernel id ifconfig iftop $ input usage: input [text|keyevent] input text <string> input keyevent <event_code> id $ insmod usage: insmod <module.o> installd ioctl itr kill linker ln $ log USAGE: log [-p priorityChar] [-t tag] me ssage priorityChar should be one of: v,d,i,w,e logcat logwrapper ls lsmod mediaserver mkdir mkdosfs mount $ monkey usage: monkey [-p ALLOWED_PACKAGE [-p ALLOWED_PACKAGE] ...] [-c MAIN_CATEGORY [-c MAIN_CATEGORY] ...] [--ignore-crashes] [--ignore-timeouts] [--ignore-security-exceptions] [--monitor-native-crashes] [--ignore-native-crashes] [--kill-process-after-error] [--hprof] [--pct-touch PERCENT] [--pct-motion PERCENT] [--pct-trackball PERCENT] [--pct-syskeys PERCENT] [--pct-nav PERCENT] [--pct-majornav PERCENT] [--pct-appswitch PERCENT] [--pct-flip PERCENT] [--pct-anyevent PERCENT] [--pkg-blacklist-file PACKAGE_BLACKLIST_FILE] [--pkg-whitelist-file PACKAGE_WHITELIST_FILE] [--wait-dbg] [--dbg-no-events] [--setup scriptfile] [-f scriptfile [-f scriptfile] ...] [--port port] [-s SEED] [-v [-v] ...] [--throttle MILLISEC] [--randomize-throttle] COUNT mountd $ mv USAGE: mv <source...> <destination> netcfg netstat $ notify Usage: notify [-m eventmask] [-c count] [-p] [-v verbosity] path [path ...] ping playmp3 $ pm usage: pm [list|path|install|uninstall] pm list packages [-f] pm list permission-groups pm list permissions [-g] [-f] [-d] [-u] [GROUP] pm list instrumentation [-f] [TARGET-PACKAGE] pm list features pm path PACKAGE pm install [-l] [-r] [-t] [-i INSTALLER_PACKAGE_NAME] [-s] [-f] PATH pm uninstall [-k] PACKAGE pm enable PACKAGE_OR_COMPONENT pm disable PACKAGE_OR_COMPONENT pm setInstallLocation [0/auto] [1/internal] [2/external] The list packages command prints all packages. Options: -f: see their associated file. The list permission-groups command prints all known permission groups. The list permissions command prints all known permissions, optionally only those in GROUP. Options: -g: organize by group. -f: print all information. -s: short summary. -d: only list dangerous permissions. -u: list only the permissions users will see. The list instrumentation command prints all instrumentations, or only those that target a specified package. Options: -f: see their associated file. The list features command prints all features of the system. The path command prints the path to the .apk of a package. The install command installs a package to the system. Options: -l: install the package with FORWARD_LOCK. -r: reinstall an exisiting app, keeping its data. -t: allow test .apks to be installed. -i: specify the installer package name. -s: install package on sdcard. -f: install package on internal flash. The uninstall command removes a package from the system. Options: -k: keep the data and cache directories around. after the package removal. The enable and disable commands change the enabled state of a given package or component (written as "package/class"). The getInstallLocation command gets the current install location 0 [auto]: Let system decide the best location 1 [internal]: Install on internal device storage 2 [external]: Install on external media The setInstallLocation command changes the default install location 0 [auto]: Let system decide the best location 1 [internal]: Install on internal device storage 2 [external]: Install on external media printenv ps $ qemudqemud: permission denied $ radiooptions Usage: radiooptions [option] [extra_socket_args] 0 - RADIO_RESET, 1 - RADIO_OFF, 2 - UNSOL_NETWORK_STATE_CHANGE, 3 - QXDM_ENABLE, 4 - QXDM_DISABLE, 5 - RADIO_ON, 6 apn- SETUP_PDP apn, 7 - DEACTIVE_PDP, 8 number - DIAL_CALL number, 9 - ANSWER_CALL, 10 - END_CALL 11 rsp - FAKE_UNSOL 12 num_of_rsp rsp - FAKE_UNSOL_EXT, 13 command - UNIAT, : Unknown error: 0 reboot renice rild rm rmdir rmmod route schedtop sdptool sdutil sendevent service servicemanager setconsole setprop sh sleep smd ssltest start stop surfaceflinger svc sync system_server telnetd toolbox top umount vmstat watchprops wipe wlan_loader wpa_cli wpa_supplicant
'안드로이드 > ADB & Rooting' 카테고리의 다른 글
ADB in root mode (0) | 2011.08.14 |
---|---|
ADB Shell을 root권한으로 실행하는 방법 (0) | 2011.08.14 |
How to Use Android ADB Command Line Tool (0) | 2011.08.14 |
안드로이드 소스에서 화면캡쳐하는 방법 (0) | 2011.08.14 |
[Android] 소스에서 Shell Command, Script 실행하는 법 (0) | 2011.08.14 |