Android AVD SDK Root

Source: Internet
Author: User

The way the internet has failed ... The online approach is said to be used in about 2.0 versions. And we are now using more than 4.0 of the mainstream.
The http://quantoubao.blog.163.com/blog/static/2083211702013870501987/said 4.0 or more, but I still didn't succeed.

So I decided to take a look at the root principle of my own: reference: http://www.myhack58.com/Article/html/3/92/2013/36574.htm
First look at this description:

I. Overview

This article describes how and how to get root permissions in Android, so you have a deeper understanding of what Android players often say about "jailbreak."

Second, the introduction of Root

1. The purpose of Root

Can let us have control of the phone system permissions, such as delete some system/app under the useless software, replace the switch ring and animation, blocking the status bar pop-up ads.

2. Introduction to Root principle

Google's Android system administrator user is called root, the account has the supremacy of the entire system, it can access and modify almost all of your mobile phone files, only root has the highest level of administrative rights. The process of our root phone is the process of getting the highest usage rights on the phone. At the same time in order to prevent bad software also get root user permissions, when we in the process of root, will also give the system to install a program, used as a running prompt, determined by the user, whether to give the highest privileges. The name of the program is called superuser.apk. When some programs execute the SU command to obtain the highest system privilege, Superuser will automatically start, intercept the action and ask, when the user believes that the program can be used safely, then we choose to allow, otherwise, you can prevent the program to continue to get the highest privileges. Root is actually the process of putting the Su file into the/system/bin/superuser.apk  under the System/app, but also to set the/SYSTEM/BIN/SU can be run by any user, have set UID and set The permissions of the GID. That is to run the command on the Android machine: adb shell chmod 4755/system/bin/su. In general, manufacturers will not allow us to do so casually, we need to use the various operating system vulnerabilities to complete the process.

Special NOTE: The eng version of our Burn machine does not have root privileges

3. Root method

From the root principle we learned that the root process is divided into three steps:

A. ADB push Su/system/bin

B. ADB push Superuser.apk/system/app

C. adb Shell chmod 4755/system/bin/su


Come here because we are the SDK root.
Below the official Start Root SDK I am here is Android 4.0.3 arm version. x86 and the others, I'm not experimenting.
1:http://superuserdownload.com/surface after decompression inside theresuperuser.apk and Su files


2 because the SDK is read-only mount, we will first mount it as RWadb shell Mount-o Rw,remount yaffs2/system
3 su to/system/bin and/system/xbin, then upload superuser.apk to/system/app, and finally set the/SYSTEM/BIN/SU to 4755 permissionsADB push Su/system/binADB push Su/system/xbinADB push Superuser.apk/system/appADB shell chmod 4755/system/bin/su
The root is done here. Now you can run the request root app to make the request root window appear.
There's a second way. download Baidu One click Root    1adb shell mount-o rw,remount yaffs2/system    2 Run Baidu One key root click on a button root is OK.

Now the problem is that you have to repeat one of these two steps each time you start. If you want permanent root, you'll have to change system.img.
Path in: android-sdk\system-images\android-16\default\armeabi-v7a
The first step:    There's a file under this directory Build.prop    Open it, find Ro.config.nocheckin=yes, delete this line.
Second step: Then use yaffs2img this software to open system.img


The root directory also has aBuild.prop is also exported  Open it find ro.config.nocheckin=yes this line delete and then import right-click Permission to modify to 0644Import What we have just downloadedSuperUser After decompression there is asu files to/bin and/xbin Modify permissions/bin/su to 4755/xbin/su 0755Same importsuperuser.apk to/app directory under Modify permission is 0666then save the. Replace the previous system.img. This will permanently root . 


From for notes (Wiz)

Android AVD SDK Root

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.