-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Doesn't work on Samsung S4 I9500 with Android 5.0.1 stock ROM (LRX22C.I9500XXUHOD4) #6
Comments
I tested it on Nexus 5, several CAF devices, MTK baseline devices as well. Do you have access to kernel messages to look for audit messages? The fact that the device is still booting is already a rather good news. |
ls -lZ /system/bin/app_process* As for daemonization points, I additionaly to install-recovery used ddexe: cat /system/etc/install-recovery.sh cat /system/bin/ddexe |
Unfortunetly, I don't really know, how to see kernel messages. |
dmesg |grep audit |
its output is empty (no audit) |
But dmesg alone does give output? |
Yes |
And what is default behaviour, when apk is not installed ? Is root access granted or denied ? |
Default is denied, but if you don't even have daemon...
|
Uh, wait a minute there, definitely something funny going on with all those app_process* processes. Lemme guess... you installed chainfire supersu, and then this just right overtop of it, right? You should clean out all the chainfire mess properly before trying this. |
lbdroid, you are absolutely right. I installed this root using previously installed chainfire's one. But as for app_process-es, I renamed original firm app_process32 (it was named app_process32_original after chainfire) to app_process32.old. |
I refleshed original firmware, wiped data, cache and dalvik-cache, then flashed twrp as recovery. shell@ja3g:/ $ su shell@ja3g:/ $ ls -l /system/bin/app_process* shell@ja3g:/ $ ls -Z /system/bin/app_process* shell@ja3g:/ $ ls -l /system/bin/ddexe* shell@ja3g:/ $ ls -Z /system/bin/ddexe* shell@ja3g:/ $ cat /system/bin/ddexe shell@ja3g:/ $ ls -l /system/etc/install-recovery.sh shell@ja3g:/ $ ls -Z /system/etc/install-recovery.sh shell@ja3g:/ $ cat /system/etc/install-recovery.sh shell@ja3g:/ $ ls -l /system/xbin shell@ja3g:/ $ ls -Z /system/xbin shell@ja3g:/ $ ps | grep su shell@ja3g:/ $ dmesg | grep audit |
Perfect, now I know what to ask users for when debugging :) Can you get a root access in this configuration? (ie without Chainfire's SuperSU) |
To get root access in this configuration I can boot to twrp recovery, perform root operations there and then boot to system again. |
Meddling with boot.img is... not the easiest thing to do. You're going to need a script called "split-bootimg.pl". Just search google and you should be able to find it. You will also need the binary program mkbootimg, which is built during the process of building AOSP. On top of that, you will need gzip/gunzip and cpio to extract and rebuild the ramdisk, which is a gzip'ed cpio file. |
I have had similar issues installing on i9507 with about 4.1 or 4.2 optus Regards
|
That comment brings this patch to mind; |
That comment also brings to mind that this whole daemon hack really needs to be eliminated properly by fixing the selinux policies. This really should not be that complicated of a process. |
I'm not 100% sure it can be removed, some devices might have /system mounted as nosuid |
This was true of the galaxy rom I was playing with. The samsung apps,
|
Ok, I can now repack boot.img. Thank you. |
I just checked the stock Samsung rom for S4 and I confirm audit logs don't go to
|
I'v build your su binary with placeholder, installed them accoring to your instruction (with the help of chainfire's binary). Then rebooted.
After reboot su returns 255 and I can't see su daemon...
And another question. On what devices and ROMS do you test your root ?
The text was updated successfully, but these errors were encountered: