Related
Hi All,
I'm developing an application that uses su (needs root access) and I'm trying to use Android Emulator but su isn't really working on it.
For example:
# su id
# id
uid=0(root) gid=0(root)
I need to use root's shell for moving files and emulator doesn't work as should
Many Thanks In Advance,
Perdita2000.
The # means you have root.
I think you didn't understand the question?¿?¿?¿
There seems to be some good information here
http://stackoverflow.com/questions/5095234/how-to-root-getroot-access-on-android-emulator
From something awesome
I can't post this on the original thread because of The Rules about new users being blocked from developer forums(feh), but I wanted to share the script I used to automatically update the telephony database instead of buying the Root Explorer and SQLite Editor apps. Tested on my AT&T Atrix with stock builds 1.8.3 (Android 2.2.2 Froyo) and 4.5.91 (Android 2.3.4 Gingerbread).
Install the Android SDK and the Android Debug Bridge if you haven't already.
Get a copy of the sqlite3 binary for Android (I found one in the SuperOneClick zip file)
Root your phone (one method is here). The important part is to be able to su to root in an ADB shell.
Download the attached shell script, chmod it +x (and change the extension to .sh if you fee like it)
Push the sqlite3 binary and the shell script to a temp dir on the device:
Code:
$ adb push sqlite3 /data/local/tmp
$ adb push telephony.sh /data/local/tmp
Shell into the phone (make sure USB debugging is enabled):
Code:
$ adb shell
su to root:
Code:
$ su root
cd to /data/local/tmp:
Code:
# cd /data/local/tmp
make sure the script is executable:
Code:
# chmod 755 telephony.sh
run it:
Code:
# ./telephony.sh
Select AT&T Tether APN from list (Settings->Wireless & networking->Mobile Networks->Access point names)
Reboot device
Enable WiFi Hotspot
(Optional) Raise your fist in the air as you triumph over bloodsucking corporate greed.
If things get fouled for any reason, the script makes a backup of the files it modifies in the same directory with a "_backup" extension. You can restore the original databases by running the following commands in a root shell on the phone:
Code:
# cp -p /data/data/com.android.providers.telephony/databases/telephony.db_backup /data/data/com.android.providers.telephony/databases/telephony.db
# cp -p /data/data/com.motorola.android.providers.settings/databases/settings.db_backup /data/data/com.motorola.android.providers.settings/databases/settings.db
Make sure to include the -p switch, otherwise the file permissions won't be correct. It doesn't seem to be possible to set file permissions/ownership manually ("chgrp radio" gives an error).
Okay I need help......... I've rooted and I've completely lost the ability to have free wifi tethering.!!! I've been trying to do this procedure all day long and when I try and run the script from a cmd prompt (just like this........ ./telephony.sh) it tell me I do not have permission to do that even though I've already CHMOD'd the file to give SU permission........ GRRRRRRrrrrrrrrrrrrrrrrrrr please help.
Changing the permissions on the script with chmod is just the first step.
Make sure you've shelled into the phone ('adb shell'), and then logged in as root ('su root'). The command prompt should change from a '$' to a '#' when you're logged in as root.
If you're having problems getting the script to work for you, try this method for Wifi/tether enabling, it worked perfect for me on Stock 2.3.4, as well as Ninja Speed Freak
http://forum.xda-developers.com/showthread.php?t=1160452
yes sir
Malibee said:
Changing the permissions on the script with chmod is just the first step.
Make sure you've shelled into the phone ('adb shell'), and then logged in as root ('su root'). The command prompt should change from a '$' to a '#' when you're logged in as root.
Click to expand...
Click to collapse
Iam ssomewhat familiar with linux redhat enterprise. I will try the thread below.
BRILLIANT
Brilliant now that was easy as hell thank very much! I'm posting on the newly enabled Atrix hotspot using my Xoom! THANK YOU AL!
Awesome!
Agreed, worked perfect. Immediately. Now, I'm just having trouble getting my Xoom to connect. Everything else can, except the Xoom.
Hey guys,
I have been trying to figure out how to root the RAZR M but I can't find any good instructions. I'm on the latest update. Thanks in advance!
Sent from my XT907 using xda app-developers app
http://www.droidrzr.com/index.php?/topic/5151-Root-For-Droid-Razr-M-(JellyBean-and-ICS)
Sent from my SCH-I535 using Tapatalk 2
I followed the instructions here:
http://forum.xda-developers.com/showthread.php?t=1940630
but needed to replace the SU & Superuser.apk from the rootzipfile link at http://aosp.us/?p=294 before running it.
justaq said:
I followed the instructions here:
http://forum.xda-developers.com/showthread.php?t=1940630
but needed to replace the SU & Superuser.apk from the rootzipfile link at http://aosp.us/?p=294 before running it.
Click to expand...
Click to collapse
Will it work on Verizon RAZR M with JB Update.
I rooted, after being updated to JB, using the method posted DroidRzr.
just a test:laugh:
rooted, if not for stupid apps
Or, I think so anyway. I ran the exploit on my xt907 and can su from an adb shell, but superuser never asks me for perms when I try using root apps (which all fail, btw). Also replacing/updating the su binary from superuser doesn't work; it fails trying to get root access. So off to a root shell I go...
# cd /system/xbin
# cp su su2
# rm su
# touch su;ed su
: i
#!/system/bin/sh
export SHELL=/system/bin/sh
echo [email protected] >> /storage/sdcard0/su_args
script -qa /storage/sdcard0/su_script -c "/system/xbin/su2 [email protected]"
.
w
q
y
# #damn custom thing doesn't like wq
# chmod 755 su
Not the best logging, perhaps, but it does work. Well, almost. After checking the version of su a couple times, superuser opens a root shell and runs:
/system/bin/busybox touch /data/sutest && /system/bin/busybox echo YEAH
This is where it fails. Not only is there no YEAH, but no errors are printed, either. Some googling later, I found logcat--the results of that are here, and don't change if I replace su with su2. Google isn't being too much help concerning that crash. Anyone know what's up/how to fix? I find it really weird that I can get root from an adb shell, but not from apps.
Thanks.
So I'll update randomly...
boot.img and recovery.img -> https://drive.google.com/file/d/0B5QYBzdG6RuyZy1TSHc2VDVhY2M/view?usp=sharing
temp root:
Code:
adb push root /data/local/tmp
adb push wpoff /data/local/tmp
adb push fbunlock /data/local/tmp
adb push recovery.img /data/local/tmp
adb push boot.img /data/local/tmp
adb shell
$ [COLOR="Red"]chmod 755 /data/local/tmp/root[/COLOR]
$ [COLOR="Red"]chmod 755 /data/local/tmp/wpoff[/COLOR]
$ [COLOR="Red"]chmod 755 /data/local/tmp/fbunlock[/COLOR]
$ /data/local/tmp/root
...
#
defeat WP:
Code:
# /data/local/tmp/wpoff --unprotect-all
check WP status(optional):
Code:
# /data/local/tmp/wpoff --dump
If you see it's all zeroes there it means good, or if there are many 5555 it means NG.
unlock bootloader:
Code:
# /data/local/tmp/fbunlock
install TWRP and patched boot:
Code:
# dd if=/data/local/tmp/recovery.img of=/dev/block/platform/msm_sdcc.1/by-name/recovery
# dd if=/data/local/tmp/boot.img of=/dev/block/platform/msm_sdcc.1/by-name/boot
install SuperSU:
Code:
FLASH SUPERSU LIKE OLD DAYS
Why patch boot?
Cos MIYABI stops ptrace, some apps depends on it won't work properly.
Chinese here:
禁止转载到国内论坛,禁止用于商业用途。日版不会有的。
Note:
a. Remember to rename recovery.00X.zip to recovery.zip.00X before unzipping!
b. If you don't flash boot.img before install SuperSU, you will end up in boot loop. To restore, delete /system/xbin/daemonsu.
Attachments will be uploaded soon.
Hi tewilove, many thanks for publishing this. Amazing work! And a big time saver
tewilove tnx allot !!
hey some one know how can i put su inside in system and then to use SuperSU ?
thank you a lot
thanks but i can not use root app and super su can not install bin su
thank you for your help
tewilove said:
Tested with a 306SH with SW version S4081.
How to:
https://youtu.be/UJs7ruckGgc
This is v1, since the shell code has to be improved yet(WIP).
It only obtains temp root with kernel context. The left things are changing to init context, disable mmc_protect_part, disable miyabi LSM.
There might be v2, which solves all above, if I have time.
And it also works with many other devices.
For example, 305SH, MI4C, SH-01G.
If it keeps crashing, it should be my hard coded offsets.
PS: Please don't reshare this thread.
PS: Chinese: 请不要转载到贴吧,论坛,谢谢。
Click to expand...
Click to collapse
thank you for your help 谢谢某因幡分享
Please I'd like to know how you did that.could you be more clear, a step by step maybe?
Sent from my D6616 using XDA Free mobile app
salmanaman said:
Please I'd like to know how you did that.could you be more clear, a step by step maybe?
Sent from my D6616 using XDA Free mobile app
Click to expand...
Click to collapse
you can watch the video that tewilove make for us .. but we need to wait when some one unlock protect bcs after you restart phone root will disappear..
tewilove said:
Tested with a 306SH with SW version S4081.
Click to expand...
Click to collapse
How can I know that I got the temporary root? Is this step in the input ID?
all step working on my 305sh like youtube video but supersu not working and root checker say me no rooted
soudara said:
all step working on my 305sh like youtube video but supersu not working and root checker say me no rooted
Click to expand...
Click to collapse
yes we know about this .. i try to remount system ( with this command : busybox mount -o remount,rw /system) to get permission but my device is restart when i try .. maybe its from this write protection that @tewilove tell us .. if he can tell us how we can install su in system if its possible for now .. ?
ok so for the moment is useless ?
soudara said:
all step working on my 305sh like youtube video but supersu not working and root checker say me no rooted
Click to expand...
Click to collapse
me too?maybe just kernel root??
---------- Post added at 12:48 PM ---------- Previous post was at 12:31 PM ----------
loonbg said:
yes we know about this .. i try to remount system ( with this command : busybox mount -o remount,rw /system) to get permission but my device is restart when i try .. maybe its from this write protection that tewilove tell us .. if he can tell us how we can install su in system if its possible for now .. ?
Click to expand...
Click to collapse
yea?rootxplore and xposed said no root?
I don't think that folks are understanding what "temp" root means. This solution allows you to achieve root for the current shell session. This does not install the additional binaries to allow other applications to use root access.
With that being said, I am wondering if we can use this temporary elevated access to correct the vulnerability outlined in CVE-2015-1474 affecting /system/lib/libui.so that Sharp has neglected to address in previous OTA updates. The only "corrected" libui.so that I have been able to locate was compiled for v5.0.1 so I am afraid that file would not be compatible with this earlier version of Android on the 306SH. I am not really savvy with in depth programming to be able to fully investigate this and develop a viable solution... anyone who would be able to point me in the right direction would receive many thanks. :banghead:
My apologies if this should have been posted in a separate thread.
awesom! it worked in my 306sh with root permission acquired in shell.
can you use root app and install super su ?
Write protection is keeping us from remounting /system as rw. This prevents us from doing anything that would have any type of impact on the current situation. I want to experiment with attempting to mount partitions with the device powered off... but my device is encrypted so I am unable to access the shell with device off until I perform a factory reset. I am planning on doing that tonight so hopefully I will be able to report back with more information soon.
Sent from my 306SH
soudara said:
can you use root app and install super su ?
Click to expand...
Click to collapse
No. We are working on it though.
On another note, I can't get this temp root to work.
Video of what happens is linked. (too large to attach)
https://mega.co.nz/#!blNTjbhS!p2ljioY_43xlWkpu3EWpj8LvfMVP5eushZT23KLPASk
TechInMD said:
Write protection is keeping us from remounting /system as rw.
Click to expand...
Click to collapse
So I assume, from the quoted text, you have tried mounting /system as rw while in the temp root shell session?
Yes. I tried using the mount command both directly from the root shell prompt plus I tried using busybox to mount also. There seem to be slight variations between them. Also, not sure if it is relevant but I attempted it both through adb and in terminal on the device. I can get to the root prompt but not further.
Sent from my 306SH
Hello brothers .
exuse me I have Sharp Aquos Crystal 306sh 4.4.2 version s4081
but how to root ? i try root but not work ....
thanks .
What software version is your sharp
Sent from my SPH-L720 using Tapatalk
i try but not find ........................you know or anyone help me
thanks
Settings about device
Sent from my SPH-L720 using Tapatalk
Thanks...i find it
After ..... .
adb push pwn /data/local/tmp/pwn
adb shell chmod 755 /data/local/tmp/pwn
adb push su /data/local/tmp/su
adb push busybox /data/local/tmp/busybox
Install instructions
- download latest supersu-install from here https://download.chainfire.eu/696/Su...etrieve_file=1
- download the attached "A3UL_4.4.2-wp_mod.zip"
- reboot to recovery (TWRP)
- Install Supersu-install.zip (a current supersu install is required as one of it's scripts will load the module)
- Install A3UL_4.4.2-wp_mod.zip
- Reboot
To test if the module is loaded you can open Terminal Emulator and type "lsmod" and wp_mod.ko should be in the list of loaded modules.
For a further test you can run the following in Terminal emulator.
su
mount -o remount rw /system
echo "this is a wp_mod test" > /system/wp_mod_test.txt
sync
reboot
Its good thanks for the Mr MiniBlu
The orginal post :::
http://forum.xda-developers.com/desire-610/development/mod-wpmod-disable-write-protection-t3149168
Sent from my 306SH using XDA-Developers mobile app
srmd said:
Thanks...i find it
After ..... .
adb push pwn /data/local/tmp/pwn
adb shell chmod 755 /data/local/tmp/pwn
adb push su /data/local/tmp/su
adb push busybox /data/local/tmp/busybox
Install instructions
- download latest supersu-install from here https://download.chainfire.eu/696/Su...etrieve_file=1
- download the attached "A3UL_4.4.2-wp_mod.zip"
- reboot to recovery (TWRP)
- Install Supersu-install.zip (a current supersu install is required as one of it's scripts will load the module)
- Install A3UL_4.4.2-wp_mod.zip
- Reboot
To test if the module is loaded you can open Terminal Emulator and type "lsmod" and wp_mod.ko should be in the list of loaded modules.
For a further test you can run the following in Terminal emulator.
su
mount -o remount rw /system
echo "this is a wp_mod test" > /system/wp_mod_test.txt
sync
reboot
Its good thanks for the Mr MiniBlu
The orginal post :::
http://forum.xda-developers.com/desire-610/development/mod-wpmod-disable-write-protection-t3149168
Sent from my 306SH using XDA-Developers mobile app
Click to expand...
Click to collapse
This doesn't work on the latest software (S7232) from what I recall from that thread.
How to root sharp zeta sh-01f? Please help me
How to root sharp 206 sh build 0022