adb remount: operation not permitted - Hero, G2 Touch Android Development

I've been trying to fix this problem for a long while, especially since I would like to install busybox on my Hero. I currently have root access (as can be seen through root explorer), and I have no trouble flashing to custom roms and things like that, but when on the base, rooted HTC Hero it seems the only command that doesn't work in the console is 'adb remount'.
The only time I have ever had it work was when I stumbled upon a guide on how to do it (I have since lost the link), but there was something in the update.zip file included with the guide that completely disabled wifi and left GPS perpetually on, which to mean is not worth it just to have remount access.
I know mostly everyone on this forum has no trouble getting remount access, since every thread seems to use it, but how do I get access?
Thank you!

I'm having the same problem, albeit on a Sprint Hero. I'm definitely rooted. I flashed multiple ROMs before using a Nand backup to revert to stock... and since then I've used shell to uninstall some stock apps. But I get 'permission denied' anytime i try the remount command. It's frustrating.

Did you modify your boot.img file so that ro.secure is now = 0?
On GSM Hero, you need to do that if you want to use ADB in root mode. I don't know exactly what would need to be done on your CDMA phone, but on the GSM, you need to extract the boot.img ramdisk, and then edit init.rc (see http://forum.xda-developers.com/showthread.php?t=443041&page=2)
Try running this command-
Code:
getprop ro.secure
and see if you get a 1 or a 0. If it's a 1, then ADB should not see the device as rooted, so find out about editing the boot.img file. If a 0, I don't know what's going on.

Related

Why "Read-only file system" message?

this is in regards to http://forum.xda-developers.com/showthread.php?t=754020
I'm ready to kick myself, it worked for everyone else, but here is what i get:
C:\and_sdk\tools>adb push exploid /sqlite_stmt_journals
failed to copy 'exploid' to '/sqlite_stmt_journals': Read-only file system
i have tried - remount command and it didn't do a thing.
please help!
dialbat said:
this is in regards to http://forum.xda-developers.com/showthread.php?t=754020
I'm ready to kick myself, it worked for everyone else, but here is what i get:
C:\and_sdk\tools>adb push exploid /sqlite_stmt_journals
failed to copy 'exploid' to '/sqlite_stmt_journals': Read-only file system
i have tried - remount command and it didn't do a thing.
please help!
Click to expand...
Click to collapse
You're in recovery mode right? I rooted before the tmobile update so I used the original method not the one you're using. I assume that for the most part you need to have your phone in recovery mode.
The /system/ directory is read only unless you're in recovery and I believe that's were that method attempts to write. You usually only get that message when you attempt to write to the system when not in recovery.
Thank you, but there is not a single word about puting phone into recovery mode in the instructions. Unless they mean it my default
i will try though.
Yeah, some steps are left out in certain 'common' tasks like rooting. It's assumed to be common knowledge or that if you don't know to automatically do a step then maybe you shouldn't be attempting it. At least that's the feeling I get sometimes but that's why it's important to search and ask if you don't find the answer.
Recovery mode is not necessary, nor possible at this point. The phone just needs to be on and connected with adb. No steps are left out (I've used this method), you just need to make sure you follow every step exactly.
Sent from my T-Mobile myTouch 3G Slide using XDA App
If it's under/system, you need to be in recovery. I rooted with the original method though, so I can't really tell you much.
guitarist5122 said:
Recovery mode is not necessary, nor possible at this point. The phone just needs to be on and connected with adb. No steps are left out (I've used this method), you just need to make sure you follow every step exactly.
Sent from my T-Mobile myTouch 3G Slide using XDA App
Click to expand...
Click to collapse
You're kidding about recovery mode right? I really hope so or that you stated that wrong... wow...
In order to write to ./system on the mytouch 3g slide you HAVE to be in recovery. Not saying this method has to be in recovery or not because I never used it. Just thought I'd throw out the suggestion to try it just in case it needs to be.
Well, i've followed steps to the point. I have rooted my phone before, so even though i am a newbe, i do have a general idea of the process.
But i have no idea why it just won't work for me.
I have tried putting it into recovery using loop script, otherwise it just states that it's in recovery and still won't let me write to it
KCRic said:
You're kidding about recovery mode right? I really hope so or that you stated that wrong... wow...
In order to write to ./system on the mytouch 3g slide you HAVE to be in recovery. Not saying this method has to be in recovery or not because I never used it. Just thought I'd throw out the suggestion to try it just in case it needs to be.
Click to expand...
Click to collapse
Why would I be kidding? It isn't necessary to be in recovery to push files to /system. I know since I've rooted my phone twice from a fully booted state (which is necessary to toggle the wifi).
Sent from my T-Mobile myTouch 3G Slide using XDA App
guitarist5122 said:
Why would I be kidding? It isn't necessary to be in recovery to push files to /system. I know since I've rooted my phone twice from a fully booted state (which is necessary to toggle the wifi).
Sent from my T-Mobile myTouch 3G Slide using XDA App
Click to expand...
Click to collapse
Hmm... Allow me to copy and paste a few lines from that thread, written by the developer:
1:After many long hours of trying to restore my phone, I have now ported the exploid exploit to the MyTouch Slide! This means that you can gain root on any version of the Slide, INCLUDING the latest OTA! However, this isn't necessarily "easy" as in the One-Click Root program, but there are reasons for this. While Android is running we cannot write to /system and even if we force Linux to let us, the NAND protection will prevent Linux from completing the write!
2:Important: If you do nothing after step 12 then you are not "rooted." This program grants itself root permissions in a shell, that is ALL. If you want system-wide root access (what most people consider "rooted"), you MUST flash a custom ROM since the NAND protection on our device prevents us from giving global root access while inside the ROM. When following Eugene's instructions on flashing ENG, make note to NOT run the command 'su' if you already have a pound symbol (#) at your command prompt!
Basically, this 'root' method is actually a program that allows you to flash the ENG package to give you root. By itself, the program does nothing but allow you to operate inside the shell as root for a short time. Sort of like the 'sudo' command in linux - at least from what I can tell.
I'm aware of what the developer said. I'm also aware that I disregarded not having the phone booted since it would be a little tough to toggle wifi without being booted. If you don't believe it can be done, do a nandroid backup and unroot your phone and try rerooting. Pushing exploid and do the root whole process before flashing the eng-build while booted. Or just take my word. Personally I figure out for the life of me how anyone toggles the wifi (which is one of the steps) if not fully booted.
I don't argue just to be right. I just don't want people to be given incorrect info and never solve their problem. Rooting and can be frustrating on this phone if your not too familiar with rooting or using command prompt.
Sent from my T-Mobile myTouch 3G Slide using XDA App
I wan't saying the files can't be pushed while it's on, I've done that before but NAND will undo or not complete it once you reboot. It's the same reason that you can't delete a system app while the slide is booted - well you can but it will still be there, and once you reboot the delete is undone - unless you're in recovery.
All I was saying is that it's not a permanent write to the system, if that's where it's even being pushed and he still has to flash the ENG build to gain full root. I think this guy needs to just redo the steps, maybe read the old root methods to gain some insight too. It might help.
btw, I think there actually is a command to toggle wifi through adb, not sure if it does much in recovery or not. Also, not a chance in hell am I going to unroot - it was a pain in the a** catching my phone in recovery even when I used the loop.bat file
Good to know that's why my apps didn't stay deleted.
Sent from my T-Mobile myTouch 3G Slide using XDA App
I came across this thread while trying to understand why my rooted phone won't let me pull or rm from a terminal emulator. The way I rooted my phone was by flashing an update in recovery. Does anyone know of a file that would unroot by using the same method in recovery?
Thainfamous20v said:
I came across this thread while trying to understand why my rooted phone won't let me pull or rm from a terminal emulator. The way I rooted my phone was by flashing an update in recovery. Does anyone know of a file that would unroot by using the same method in recovery?
Click to expand...
Click to collapse
rm, rm -f or any other commmands will not work with terminal emulator because in order to use that program you phone has to be on, and since we can only write to the /system in recovery I'm sure you see what I'm getting at. You can still pull from the /system when the phone is on. The command isn't 'pull' though, it's:
Code:
cp <path to file> <location to copy to>
As far as the unroot thing, use the search bar [slide rom bible].
just found this thread while looking for a solution to the OP's problem (same as my own).
If my phone is ON, usb debugging ON, Charge Only, i cannot push exploid to /sqlite_stmt_journals.
this is what i did:
C:\android-sdk-windows\platform-tools>adb push exploid /sqlite_stmt_journals
failed to copy 'exploid' to '/sqlite_stmt_journals': Read-only file system
i tried to follow the directions as closely as possible. can someone please tell me where i'm going wrong here?
PunkRockJesus said:
just found this thread while looking for a solution to the OP's problem (same as my own).
If my phone is ON, usb debugging ON, Charge Only, i cannot push exploid to /sqlite_stmt_journals.
this is what i did:
C:\android-sdk-windows\platform-tools>adb push exploid /sqlite_stmt_journals
failed to copy 'exploid' to '/sqlite_stmt_journals': Read-only file system
i tried to follow the directions as closely as possible. can someone please tell me where i'm going wrong here?
Click to expand...
Click to collapse
Its been so long since i used that method and rooted i cant quite recall. But it does look like you need to change the path to c:/android-sdk-windows/platform-tools
Command prompt is picky about using / or \
Sent from my T-Mobile myTouch 3G Slide using XDA App
guitarist5122 said:
Its been so long since i used that method and rooted i cant quite recall. But it does look like you need to change the path to c:/android-sdk-windows/platform-tools
Command prompt is picky about using / or \
Sent from my T-Mobile myTouch 3G Slide using XDA App
Click to expand...
Click to collapse
No, windows uses \ for local and local network file paths, it only uses / for remote locations and networks.
I'm not sure if this would work without already having root (I received my phone already rooted, never had to do it)
In command prompt, try
adb remount
You can also try this:
adb shell mount -o rw,remount /sqlite_stmt_journals
See if any of those work. Like I said, it may not, since those might be things that need root.
Any updates on this? I cannot push the file either. And "adb shell mount -o rw,remount /sqlite_stmt_journals" does nothing.

[Q] ADB Shell Won't Allow me to run as SU

So I'm trying to get into su to run gfree_verify to make sure my permaroot S-off/SIM card unlock/SuperCID was successful, but I'm getting a permission denied error.
What happens is, I type adb shell, then I type su, there's a really long delay, then it tells me Permission Denied. However, when I run the Terminal Emulator from my phone and type in the su command, I get root access just fine.
I used the "official" method that is on the HTC Vision Wiki that is located here. The only thing, however, is that my Android SDK install wasn't installed using any type of installer. I just extracted a zip file and shoved it in a random folder. I did make sure to run the Command Prompt as Administrator before issuing the adb shell command, but I'm still unable to get superuser access through the PC. Trying to use the adb root command gives me an "adbd cannot run as root in production builds" error.
Did I do something incorrectly?
adb kill-server
adb start-server
See if that works. If not, try rebooting your computer.
Sent from a Western Union telegram.
Does the Superuser app seem to be installed correctly on your phone ?
Do you have the output from gfree ? I wonder if it didn't work correctly with your kernel, it doesn't work with all kernels. What ROM/kernel do you have ?
Which procedure did you use, the one in the Wiki, or one involving dd'ing the eng hboot ?
steviewevie said:
Does the Superuser app seem to be installed correctly on your phone ?
Do you have the output from gfree ? I wonder if it didn't work correctly with your kernel, it doesn't work with all kernels. What ROM/kernel do you have ?
Which procedure did you use, the one in the Wiki, or one involving dd'ing the eng hboot ?
Click to expand...
Click to collapse
I rebooted the daemeon, computer, and also the phone. No dice.
The Superuser app is correctly installed. When I ran Adfree and attempted to go into SU in Terminal, I got the usual Allow Superuser access dialog. Both worked without any problems; like I said, I can get root access from the on-the-phone terminal, it's when I attempted to get root access from the adb shell command on my computer where I have problems.
No special ROMs, completely stock post-November OTA update. The only thing I flashed after permarooting was the Clockwork Recovery mod, but adb shell SU wasn't working before this. I initially used some outdated instructions (involving the use of the dd command, and the wpathis.ko or something). I read some more and learned these were out of dated, so I unrooted. I then used the instructions that are on the wiki using gfree to permroot.
gfree_verify works without any problems if I run it from the Terminal Emulator on my phone. Returns the proper values to indicate I'm SIM Unlocked, SuperCID, and S-off. I'm glad it works, but I still don't like the fact I can't use the adb shell. Typing characters on the G2 is a pain in the ass.
I still want to know why I can't enter superuser from the PC adb shell. Am I doing something incorrectly?
Thanks a lot for your help!
Try clearing data for the SuperUser app?
go in your recovery screen from boot, select your mount options, and mount everything lol. Not sure if it'll fix it but everytime I have adb permission issues that seems to fix it and I don't think it could hurt.
dietotherhythm said:
go in your recovery screen from boot, select your mount options, and mount everything lol. Not sure if it'll fix it but everytime I have adb permission issues that seems to fix it and I don't think it could hurt.
Click to expand...
Click to collapse
This worked perfectly! When I entered su from the command prompt, the SuperUser app popped up on the phone's side and I hit allow. It then let me through.
What exactly was broken though? Why did mounting everything from the Clockwork Recovery menu fix this?

[Q] rooted G2 adb shell defaults to user, not root with eng boot

I have a rooted G2 with ENG S-OFF and when I log into shell via "adb shell", it starts as user ($) as opposed to root user (#). Once I'm running in adb shell, su won't work until phone is fully booted and permission is granted from superuser app. This seems like I don't have eng boot and/or S-OFF, but I do according to HBOOT and gfree_verify.
I did perm root a while back and I think S-OFF at the same time, and then later on I used gfree to do the other options (sim unlock and super CID). Doing some searching I came accross the command getprop ro.secure ... if I run this from adb shell as user ($), it returns 1, as (#), it returns 1, and from terminal on phone as root (#) it also returns 1. From my light understanding, this should be 0.
Does anyone have any thoughts as to what is going on? A potential fix is to redo everything with gfree (?) ... not sure what else to try. Any help/advice would be appreciated. Thanks much.
Are you running a custom rom.... because I know the stock rom doesn't stick root very good....
I am running stock rom...sorry I forgot to mention that. Since root doesn't stick well with stock, does that mean I should try process again? Thanks.
It seems that what I described as my problem is actually expected behavior since I am running stock rom. The ro.secure flag located in the default.prop file at / is typically 1 for stock roms where as if someone were to customize a rom, they would set that flag to 0 most likely. Changing it from the OS won't do anything since it gets loaded from the boot.img image at startup. One could extract boot.img, modify, and re-flash, but I'm OK with it for now.
I wanted to give an update on my findings in case anyone else was curious about this. I had recently rooted a Thunderbolt and as a result of that method, ro.secure = 0, so I was confusing myself as to why it was 1 on my G2...but now I know.
Thanks needs to go to Guhl over at #G2Root on Freenode for helping explain this to me.

[HOW-TO] [GSM & CDMA] How to root without unlocking bootloader (for ITL41D to JRO03O)

[HOW-TO] [GSM & CDMA] How to root without unlocking bootloader (for ITL41D to JRO03O)
As of Oct 10, 2012: Google has patched this vulnerability starting with JRO03U. That is to say, this works on versions of ICS and JB from ITL41D to JRO03O inclusive. It will not work for JRO03U or newer. (My previous guide found here only worked on Android versions 4.0.1 and 4.0.2, i.e., ITL41D/F and ICL53F.
Once you have root, you can use segv11's BootUnlocker app to unlock your bootloader without wiping anything. Easy as pie!
Disclaimer: I take no credit for this exploit or the implementation of it. All credit goes to Bin4ry and his team. I just isolated the parts required for the GNex, modified it slightly and eliminated the script.
So, it looks like Bin4ry (with the help of a couple of others) has managed to find a way to exploit a timing difference in the "adb restore" command. See source here. (Although this may be old news to some, I hadn't seen it before a few days ago.) This is more for informational purposes, as having a Nexus device, we are able to backup our data, unlock the bootloader and restore the backup, so this is guide is not really that useful for most, but you still have those users who are scared to unlock their bootloader. It is useful however, for those with a broken power button, as it allows them to unlock their bootloader without the power button.
How this works
The way this works is as follows: the "adb restore" command needs to be able to write to /data to restore a backup. Because of this, we can find a way to write something to /data while this is being done. Now, Android parses a file called /data/local.prop on boot. If the following line exists in local.prop, it will boot your device in emulator mode with root shell access: ro.kernel.qemu=1. So, if we can place a file called local.prop with the aforementioned line in /data, once your device boots, it will boot in emulator mode and the shell user has root access, so we now can mount the system partition as r/w.
So what does this all mean:
You can now root any version of ICS and JB released to-date without having to unlock your bootloader (and without losing your data).
Moreover, you should now be able to root your device even if your hardware buttons are not working.
Additionally, this allows those who have not received an OTA update and want to apply it without having an unlocked bootloader or root to do so by copying the OTA update to /cache from /sdcard.
Notes:
1) Please read the entire post before attempting this.
2) This does not wipe any of your data, but I take no responsibility if something happens and you lose your data. Maybe consider doing a backup as per this thread before attempting this.
3) This assumes that you have USB Debugging enable on your device (Settings > Developer Options > Enable USB Debugging) and the drivers for your device installed on your computer. For the drivers, I would recommend you remove all old drivers and install these. If you don't know how to install them, or are having issues, look here.
4) This obviously needs to be done over ADB, as you cannot run adb in a terminal emulator on-device. If you do not have ADB, I've attached it in the zip (Windows and Linux versions). Unzip all files.
Step-by-step:
1) Download the attached files to your computer and unzip them;
2) Open a command prompt in that same directory;
3) Copy the root files to your device:
adb push su /data/local/tmp/su
adb push Superuser.apk /data/local/tmp/Superuser.apk
4) Restore the fake "backup": adb restore fakebackup.ab Note: do not click restore on your device. Just enter the command into the command prompt on your PC and press the enter key.
5) Run the "exploit": adb shell "while ! ln -s /data/local.prop /data/data/com.android.settings/a/file99; do :; done" Note: when you enter this command, you should see your adb window flooded with errors -- this is what is supposed to happen.
6) Now that the "exploit" is running, click restore on your device.
7) Once it finishes, reboot your device: adb reboot Note: Do not try and use your device when it reboots. Running this exploit will reboot your device into emulator mode, so it will be laggy and the screen will flicker -- this is normal.
8) Once it is rebooted, open a shell: adb shell
Note: Once you do step 8, your should have a root shell, i.e., your prompt should be #, not $. If not, it did not work. Start again from step 4. (It may take a few tries for it to work. Thanks segv11.)
Now we can copy su and Superuser.apk to the correct spots to give us root.
9) Mount the system partition as r/w: mount -o remount,rw -t ext4 /dev/block/mmcblk0p1 /system
10) Copy su to /system: cat /data/local/tmp/su > /system/bin/su
11) Change permissions on su: chmod 06755 /system/bin/su
12) Symlink su to /xbin/su: ln -s /system/bin/su /system/xbin/su
13) Copy Superuser.apk to /system: cat /data/local/tmp/Superuser.apk > /system/app/Superuser.apk
14) Change permissions on Superuser.apk: chmod 0644 /system/app/Superuser.apk
15) Delete the file that the exploit created: rm /data/local.prop
16) Exit the ADB shell: exit (May have to type exit twice to get back to your command prompt.)
17) Type the following (not sure if this is needed for the GNex, but it shouldn't matter): adb shell "sync; sync; sync;"
18) Reboot: adb reboot
19) Done. You now should have root without having to unlock your bootloader. If you want to unlock now, you can without wiping anything. See segv11's app linked at the beginning of this post.
Note: If you still do not have root access after doing these steps, redo them and add this step between 10 and 11:
10b) Change the owner of su: chown 0.0 /system/bin/su (Thanks maxrfon.)
I've done all. It installs supersuser app but the phone is not really rooted and apps that requires it doesn't work
Lorenzo_9 said:
I've done all. It installs supersuser app but the phone is not really rooted and apps that requires it doesn't work
Click to expand...
Click to collapse
Did you try opening the Superuser app?
What happens when you open an app that requires root? Do you get the request for su access?
You can open the app but whith apps that requires root there are no requestes and they don't... Even using root checker you see that you're not rooted
Lorenzo_9 said:
You can open the app but whith apps that requires root there are no requestes and they don't... Even using root checker you see that you're not rooted
Click to expand...
Click to collapse
Re-run the entire procedure again (including pushing the su and Superuser.apk files). When I had done it, I used the latest version of su and Superuser.apk, but when I uploaded the files in the attachment in post #1, I used the files that Bin4ry had in his package, which I assume are older. Regardless, re-download the attachment in the first post and try it again.
efrant said:
Re-run the entire procedure again (including pushing the su and Superuser.apk files). When I had done it, I used the latest version of su and Superuser.apk, but when I uploaded the files in the attachment in post #1, I used the files that Bin4ry had in his package, which I assume are older. Regardless, re-download the attachment in the first post and try it again.
Click to expand...
Click to collapse
Ok I'll do it and then I'll report you what happens. So now have you updated su and superuser.apk?
Lorenzo_9 said:
Ok I'll do it and then I'll report you what happens. So now have you updated su and superuser.apk?
Click to expand...
Click to collapse
Yes, I put the latest versions in the zip in the first post.
I can confirm that this works, and also that step 10b was not needed for me. This is the first time I have not used a toolkit so if I can do it, anyone can.
Running a Verizon Galaxy Nexus, this allowed me to update to the leaked Jelly Bean OTA with a locked bootloader. I first flashed stock 4.0.4 and locked the bootloader. I then used the exploit to gain root access, allowing me to apply IMM76Q and JRO03O OTA updates via stock recovery. (Rebooting between updates.) Thank you for creating a guide that this newb could easily understand and follow.
serty4011 said:
I can confirm that this works, and also that step 10b was not needed for me. This is the first time I have not used a toolkit so if I can do it, anyone can.
Running a Verizon Galaxy Nexus, this allowed me to update to the leaked Jelly Bean OTA with a locked bootloader. I first flashed stock 4.0.4 and locked the bootloader. I then used the exploit to gain root access, allowing me to apply IMM76Q and JRO03O OTA updates via stock recovery. (Rebooting between updates.) Thank you for creating a guide that this newb could easily understand and follow.
Click to expand...
Click to collapse
Thanks for confirming that step was not needed.
Thanks!
Bookmarked for future reference :good:
does it work on nexus 7 ?
dacc said:
does it work on nexus 7 ?
Click to expand...
Click to collapse
Yes, it should.
thans for quick response
Works fine for my GNex, big thanks! How about putting it into a script for non-advanced users here?
wictor1992 said:
Works fine for my GNex, big thanks! How about putting it into a script for non-advanced users here?
Click to expand...
Click to collapse
Glad you got it working!
As for putting it into a script, I could but I'd rather not. As with most of the guides that I have written up, I purposely do not put things into a script so that people would actually go through all the steps and, by doing so, maybe get an understanding of what they are actually doing, and hopefully learn something in the process. If I would have packaged it up into a script, a lot of the less experienced users would not even try to go through the steps -- they would just use the script, and no one learns anything yet again. See here for some discussion on one-click scripts. Granted, blindly following a step-by-step is not much better, but I have tried to put comments and explanations throughout to facilitate learning. It's about the journey...
P.S.: I would appreciate it if no one else posts a script in this thread.
efrant said:
P.S.: I would appreciate it if no one else posts a script in this thread.
Click to expand...
Click to collapse
can i make a script that just puts in big text "STOP USING TOOLKITS AND 1 CLICKS"
Zepius said:
can i make a script that just puts in big text "STOP USING TOOLKITS AND 1 CLICKS"
Click to expand...
Click to collapse
LOL! Yes, sure, that's one script I don't mind being posted. LOL!
Heh, fair enough. I think I'm learning a bit about adb
One question: I can't replace system APKs by installing them, it tells me that there is a signature conflict. How can I fix that? I thought it shouldn't happen after rooting. (I'm trying to install the "international" velvet.apk).
wictor1992 said:
Heh, fair enough. I think I'm learning a bit about adb
One question: I can't replace system APKs by installing them, it tells me that there is a signature conflict. How can I fix that? I thought it shouldn't happen after rooting. (I'm trying to install the "international" velvet.apk).
Click to expand...
Click to collapse
Let's try to keep this thread on-topic please.
But to answer your question, don't install the apk. Using a file explorer that has root access, copy it to /system/app (after making sure that system is r/w) and make sure the permissions are set to match the other apks in that directory.
when running adb after running the command where i tell it to restore fake restore and then while the "exploit" is running ikeep getting , in cmd, link failed, no such file or directory, and it just keep doing that. is this normal or did i do something wrong.
efrant said:
Let's try to keep this thread on-topic please.
But to answer your question, don't install the apk. Using a file explorer that has root access, copy it to /system/app (after making sure that system is r/w) and make sure the permissions are set to match the other apks in that directory.
Click to expand...
Click to collapse

[advice needed] ADB ROOT

Let me start by first saying that "adb root" is not related to or the same thing as running adb shell then su. adb root is a way to run adb directly in root mode enabling to be able to push/pull files directly to /system, or other write protected directories. So please, lets not get into the whole "just copy to sdcard, mount system and cp file with adb shell." This is not what I am trying to accomplish. Now that that's out of the way, here is my situation. HTC10 Viper 4.4.0 US unlocked firmware. Generally speaking, in the past you could modify the boot.img and edit default.prop and set ro.debuggable=1 and/or ro.secure=0 and repack and flash. Problem solved. This does not seem to be the case now, with this device. I also tried compiling from source adbd from aosp, modified to ignore ro.secure etc... Packed it in the boot.img and reflashed. I get the same results. I get a message on boot about slow charging, and debugging mode is not running on the phone. Tried stopping and starting it, same thing. Can anyone please help me figure out what is going on? I assume HTC has some built in security check that disallows this modification, but im not sure. Thank you in advance.

Categories

Resources