Rooted but ro.secure=1 - Motorola Droid and Milestone General

I have the FRG22D and it's rooted. I know because I've overclocked it. but in my Default.prop it had ro.secure=1 so none of ADB command will work. How can I fix this?

Honestly you generally want ro.secure=1 on a phone that isn't purely a dev phone. Once you adb shell into the phone, be sure the display on the phone is unlocked and then run su in your shell. You should get a prompt on the phone asking if it is OK for "Unknown" to have Superuser. Then your prompt will change to # and you're in business.

That works, but I'm still unable to remount or push and pull.

Related

Installing CIME into Hero

Guys, I just found this CIME at http://forum.xda-developers.com/showthread.php?t=512530&highlight=hero+cime
Was wondering if:
a. it will install onto a rooted Hero
b. if a rooted Hero will still be able to detect, download and install OTA updates
Advice is much appreciated, thanks!
I just rooted my Hero using this technique and confirm that it works:
http://theunlockr.com/2009/08/08/how-to-gain-root-access-on-your-htc-hero/
The new CIME is nicely installed, and that works well too. Now I'm just not sure if the phone will receive OTA updates. The only thing different is the fact that the phone is rooted.
Gulp.
Right. Thinking logically, since I rooted my phone by following these steps:
15. If the serial number and the word fastboot next to it popped up, then go back to the command prompt on the computer and type
fastboot boot cm-hero-recovery.img
16. Once the phone boots up into the recovery screen type the following in the command prompt on the computer:
adb shell mount /system
adb push su /system/bin/
adb shell chmod 4755 /system/bin/su
adb push Superuser.apk /system/app/
adb shell reboot
17. Once the phone reboots, click the Menu button and click Settings.
18. Goto Applications > Development and check the USB debugging on.
19. While the phone is still plugged in, goto the Command Prompt still up on your computer and type:
adb devices
You should see a serial number, which means the computer is seeing the device.
20. Then type:
adb shell
su
The phone should pop up an su request. Click Always Allow on the phone.
21. Type:
reboot
Logically, I haven't really changed anything else on the phone aside from:
a. copying in 2 APKs, one SU and one Superuser.
b. Setting permissions.
hmmm?
It does work, but with the IME I can only type simplified Chinese in Stroke input though (traditional Chinese is okay for Cangjie)
Now I'd be appreciated if I can get help of getting the attached "default.xml" into /system/customize/CID for displaying Chinese.
That is strange. Did you set TouchInput Chinese settings to use Pinyin?
I actually used the other method to did mine... but I think both ways works ^^
I installed the CIME on my rooted Hero with the method described in the linked thread, and it works like a charm.

Adb shell - starting in su mode, but not granting su access?

I hope I'm not just being an idiot here, but I am having a lot of trouble with adb shell right now.
When starting the shell, instead of starting in $ it defaults to #.
However, whenever I attempt to use 'su', I receive an access denied error. I am not receiving any prompt on the device as I normally would.
At first I thought this was just related to CM7, but even flashed back to rooted 1.0.1 I am getting this issue.
Can anyone offer some insight?
Thanks
Edit: Damn, forgot to add [Q] to the title. Sorry!

Possible New Rooting Method!

Well, this is interesting.
On my Revo4g, all I did was enable USB debugging in internet only mode, and i'm faced with this:
Code:
c:\tools\android\android-sdk-windows\platform-tools>adb shell
# busybox whoami
busybox whoami
whoami: unknown uid 0
#
Looks like there's no need for rageagainstthecage, or any exploits. ADB is run as superuser already! (although for some reason ro.secure is set, and it seems to be ignored, so it possibly may be a bug)
EDIT: Nope, verified. Toggle ADB debugging on and off, and you're root!
This is most definitely not what LG intended, but hey- it works!
Still no signs of fastboot without accidentally erasing recovery or something. Looks like it's left in as emergency-only.
If you're not rooted, try this:
Open ADB shell
Your command prompt should be "$"
Run
Code:
kill `busybox pidof adbd`
Re-run ADB shell, your command prompt should change to "#"
Congrats! You're root.. now you can push "su" and whatnot.
That was strangely easy...
thecubed said:
Well, this is interesting.
On my Revo4g, all I did was enable USB debugging in internet only mode, and i'm faced with this:
Code:
c:\tools\android\android-sdk-windows\platform-tools>adb shell
# busybox whoami
busybox whoami
whoami: unknown uid 0
#
Looks like there's no need for rageagainstthecage, or any exploits. ADB is run as superuser already! (although for some reason ro.secure is set, and it seems to be ignored, so it possibly may be a bug)
EDIT: Nope, verified. Toggle ADB debugging on and off, and you're root!
This is most definitely not what LG intended, but hey- it works!
Still no signs of fastboot without accidentally erasing recovery or something. Looks like it's left in as emergency-only.
If you're not rooted, try this:
Open ADB shell
Your command prompt should be "$"
Run
Code:
kill `busybox pidof adbd`
Re-run ADB shell, your command prompt should change to "#"
Congrats! You're root.. now you can push "su" and whatnot.
That was strangely easy...
Click to expand...
Click to collapse
OKAY... So, I don't need to do superoneclick? And I don't need to go through the painful process of downloading 3-4 programs?
markapowell said:
OKAY... So, I don't need to do superoneclick? And I don't need to go through the painful process of downloading 3-4 programs?
Click to expand...
Click to collapse
Well, if you've got ADB installed, then no you don't need superoneclick, but it's main claim to fame is that it's got all of the tools bundled together.
Stick with superoneclick until I get an easy method put together...
LOL... That's sweet!
Like I mentioned elsewhere... LG wants Verizon to think all is locked down and such but secretly behind its back it is giving us free candy. Like when grandpa and grandma hide money in your room before leaving...
They left in everything needed, we only had to put the pieces together.
Bravo LG bravo... now can we have the source code for this device for 2.2 and 2.3..
Now i'm for sure rooting today, as i already have adb installed. Epic.
So i ran ADB Shell and it automatically gave me "#". I then proceeded to "kill 'busybox pidof adbd' " and it said it did it. Still had "#". I don't seem to have root though. I can't delete bingsearch.apk, can't do anything in setcpu.
When i installed super user from the market, it did say there was an update, so it asked if i wanted to install it. I said yes, and it said an error occurred but it put a zip on my sd card to update the binary and that i need to reboot into recovery and install it.
Any ideas? I don't have cwm yet so i can't exactly do that. Here's how the whole thing went down:
Code:
C:\AndroidSDK\platform-tools>adb shell
*daemon not running. starting it now on port 5037 *
*daemon started successfully *
# kill 'busybox pidof adbd'
kill 'busybox pidof adbd'
[1] Terminated kill "busybox pidof adbd"
#
Nevermind, i just went with super one click and i have root now.
powder007 said:
I then proceeded to "kill 'busybox pidof adbd' " and it said it did it.
Click to expand...
Click to collapse
Those were back-ticks, like this: `` not single quotes: ' '
powder007 said:
I don't seem to have root though. I can't delete bingsearch.apk, can't do anything in setcpu.
Click to expand...
Click to collapse
setCPU will require superuser.apk and a working su. Did you mount the system partition r/w by hand before trying to delete bing? Using this method, you'd have to mount r/w, then push su, etc.
Ah, my bad. I'm semi new to adb. Thanks for pointing that out.
I had the super user app from the market. On root explorer it didn't give me a Mount r/w button, so i knew i wasn't rooted.
The problem with this rooting method is that it's incomplete.
My method gives you entry to a root shell-- it does not "root" your device.
A "rooted" device requires a file in /system/bin/ called "su", which allows normal Android apps to access root functionality on the device.
The method I detail allows you to manually remount /system as r/w and push the required file to the proper location without requiring an exploit.
Once I have some time free from working on the deodex'd rom, and porting CM7, I will make a super-super easy one click root application for windows/linux.
Until then, this thread is mostly for technical reference for devs, and something interesting that I found

Is there any way to require adb shell root?

I got the tool "galaxys2_kernel_repack" to modified the zImage which got from the official release and changed the default.prop "ro.secure=0".
Use the kTool.apk write the image to phone. after reboot, the default.prop value has changed. but the adb shell is still in normal mode, not root mode.
Is there any way to require adb shell root?
Thanks for you help.
My devices software version is N7000ZSLPM_TGY
hello,
have you tried this :
ningoune said:
hello,
have you tried this :
Click to expand...
Click to collapse
Thanks for your answer.
I used the stock ICS release by SAMSUNG, not CM release.
As your answer, there is still the normal mode, but can require root shell type the command "su".
I have resolved the problem by flash the speedmod kernel which provide adb shell root. With adb shell root you can use PC Client command like "adb root", "adb remount", "adb push to /system directly"

Aishon A19--have root, sort of, need to install SuperSU

Problem: I have an Aishon A19 tablet, which it is very hard to find information about. It is an RK3288 tablet running Android 5.1.1.
It is not really rooted in the normal sense. However, "adb root" works; I can get a root shell and mount /system as writeable, I can push any app I want to the device, etc.
Things that will not work:
-- I tried to put on a /system/xbin/su (from SuperSU 2.76), with mode 6755 (rwsr-sr-x) and it didn't work. I also made symbolic links to /system/bin/su and /system/xbin/daemonsu. Running it from a non-root shell in adb prints a 1 and doesn't give me root. Running it from a non-root shell on the tablet does the same thing. Running it from a root shell gives me no error, but that obviously isn't much use.
-- Running SuperSU as an app gives me the error message about "There is no SU binary installed, and SuperSU cannot install it. This is a problem! If you just upgraded to Android 5....." I have no idea if it actually can't see the ./system/xbin/su or if the error message just isn't that good.
-- Trying to use "adb reboot bootloader" or getting into the bootloader using buttons doesn't work. It reboots the tablet into a blank screen, with the same vendor ID and a new product ID; however, "fastboot devices" shows nothing. This happens both under Windows and Linux, and even when run as root under Linux (thus not having to worry about udev rules). This means that I cannot install TWRP unless someone can explain to me how to install TWRP without using the bootloader.
I *can* use "adb reboot recovery" and get into the recovery menu. And as I mentioned, I can get root access to the tablet and a root shell using "adb root", and push any file I want to it.
Is it possible to use this root shell and/or recovery to install SuperSU somehow, even if I have to just copy files one at a time?
Edit: Moderators., you can lock this. Someone had the same problem in http://forum.xda-developers.com/apps/supersu/how-to-manually-update-su-supersu-file-t3238991 and I was able to folloow that, manually running the commands in update-binary.

Categories

Resources