Attend XDA's Second Annual Developer Conference, XDA:DevCon 2014!
5,731,360 Members 53,375 Now Online
XDA Developers Android and Mobile Development Forum

Anyone on stock unrooted MJ7 (Android 4.3) build willing to test new root method?

Tip us?
TheJumpingBean Old
#31  
Guest
Thanks Meter
Posts: n/a
Quote:
Originally Posted by jpolzner View Post
You were able to update the SuperSU binaries? Or you were simply able to achieve root?

Sent from my SCH-I545 using Tapatalk
I can't update the SU binaries, but am fully rooted. I wonder if haxxor had better luck... ill txt him and ask
 
kdo23
Old
#32  
Senior Member
Thanks Meter 40
Posts: 211
Join Date: Dec 2010
I wonder if we'll in general get the updates through app on mj7. I updated from mi1 but updated the binary before. Don't know enough about this knox and selinux enforcing.

Sent from my SCH-I545 using Tapatalk
 
LilTechPrincess
Old
#33  
Senior Member
Thanks Meter 63
Posts: 145
Join Date: Sep 2012
Location: Southwest, MO
Default More...

Quote:
Originally Posted by kdo23 View Post
I wonder if we'll in general get the updates through app on mj7. I updated from mi1 but updated the binary before. Don't know enough about this knox and selinux enforcing.

Sent from my SCH-I545 using Tapatalk
I actually suspect that the SE Linux kernel is as much to blame for not being able to update the su binary as the actual app itself. I am able to fully modify my system partition via root shell, but a lot of GUI based apps cannot.
 
Surge1223
Old
(Last edited by Surge1223; 4th November 2013 at 11:00 PM.)
#34  
Surge1223's Avatar
Recognized Contributor
Thanks Meter 3367
Posts: 1,644
Join Date: Nov 2012
Location: Iowa

 
DONATE TO ME
Quote:
Originally Posted by kdo23 View Post
I wonder if we'll in general get the updates through app on mj7. I updated from mi1 but updated the binary before. Don't know enough about this knox and selinux enforcing.

Sent from my SCH-I545 using Tapatalk
I haven't got done looking through the logs yet but this sticks out so far

Code:
11924/system/bin/app_process/system/app/Superuser.apk
11924/system/bin/app_process/data/data/com.mgyun.shua.su/databases/download_status.db
11924/system/bin/app_process/data/data/com.mgyun.shua.su/databases/app_info.db
11924/system/bin/app_processanon_inode:inotify
11924/system/bin/app_process/dev/ptmx
11924/system/bin/app_processpipe:[29717]
11924/system/bin/app_processpipe:[29717]
11924/system/bin/app_processanon_inode:
11942/system/bin/mksh/system/framework/framework-res.apk
11942/system/bin/mksh/system/framework/core.jar
11942/system/bin/mksh/dev/urandom
11942/system/bin/mkshpipe:[28435]
11942/system/bin/mkshpipe:[28435]
11942/system/bin/mkshanon_inode:[eventpoll]
11942/system/bin/mksh/system/app/Superuser.apk
11942/system/bin/mkshanon_inode:inotify
11942/system/bin/mksh/dev/pts/0
11949/system/bin/.suv/dev/pts/0
11949/system/bin/.suv/dev/pts/0
11949/system/bin/.suv/dev/pts/0
11949/system/bin/.suvsocket:[29724]
11949/system/bin/.suv/dev/com.mgyun.shua.su.daemon/11949.stdout
11949/system/bin/.suv/dev/com.mgyun.shua.su.daemon/11949.stderr
11949/system/bin/.suv/dev/com.mgyun.shua.su.daemon/11949.stdin
11949/system/bin/.suv/dev/__properties__
11949/system/bin/.suv/sys/kernel/debug/tracing/trace_marker
11949/system/bin/.suv/system/framework/framework.jar
11949/system/bin/.suv/system/framework/twframework-res.apk
11949/system/bin/.suv/system/framework/framework-res.apk
11949/system/bin/.suv/system/framework/core.jar
11949/system/bin/.suv/dev/urandom
11949/system/bin/.suvpipe:[28435]
11949/system/bin/.suvpipe:[28435]
11949/system/bin/.suvanon_inode:[eventpoll]
11949/system/bin/.suv/system/app/Superuser.apk
11949/system/bin/.suvanon_inode:inotify
11949/system/bin/.suv/dev/pts/0
11953/system/bin/su/dev/null
11953/system/bin/su/dev/null
11953/system/bin/su/dev/null
11953/system/bin/su/dev/ptmx
11953/system/bin/susocket:[24427]
11953/system/bin/su/dev/com.mgyun.shua.su.daemon/11949.stdout
11953/system/bin/su/dev/com.mgyun.shua.su.daemon/11949.stderr
11953/system/bin/su/dev/com.mgyun.shua.su.daemon/11949.stdin
11953/system/bin/su/dev/__properties__
11960/system/bin/su/dev/pts/2
11960/system/bin/su/dev/pts/2
11960/system/bin/su/dev/pts/2
11960/system/bin/su/dev/__properties__
11969/dev/com.mgyun.shua.su.daemon/sh/dev/pts/2
11969/dev/com.mgyun.shua.su.daemon/sh/dev/pts/2
11969/dev/com.mgyun.shua.su.daemon/sh/dev/pts/2
11969/dev/com.mgyun.shua.su.daemon/sh/dev/__properties__
11969/dev/com.mgyun.shua.su.daemon/sh/dev/tty
12091/system/bin/app_process/dev/null
12091/system/bin/app_process/dev/null
12091/system/bin/app_process/dev/null
12091/system/bin/app_process/dev/log/main
12091/system/bin/app_process/dev/log/radio
12091/system/bin/app_process/dev/log/events
12091/system/bin/app_process/dev/log/system
Sent from my SCH-I535 using xda app-developers app
TheJumpingBean Old
#35  
Guest
Thanks Meter
Posts: n/a
Later on a friend of mine is going to decompile the su file and see what's in it

Sent from my SCH-I545 using Tapatalk
The Following User Says Thank You to For This Useful Post: [ Click to Expand ]
 
open1your1eyes0
Old
#36  
open1your1eyes0's Avatar
Senior Member - OP
Thanks Meter 3245
Posts: 2,144
Join Date: Dec 2010
Location: New York City

 
DONATE TO ME
I have a few high level devs looking into these root exploits to see exactly what is going. Don't worry guys, we'll get to the bottom of these odd and sketchy methods. Whatever it is, the exploits themselves for actually gaining root are working so we're trying to see if we can recreate them into our own guaranteed safe method.




The Following 10 Users Say Thank You to open1your1eyes0 For This Useful Post: [ Click to Expand ]
 
joeyx2
Old
#37  
Senior Member
Thanks Meter 55
Posts: 271
Join Date: Sep 2010
You think maybe they don't want it open source so that Verizon will have trouble trying to patch it? Just a thought.

Sent from my SCH-I545 using xda app-developers app
 
jwendt79
Old
#38  
Member
Thanks Meter 20
Posts: 71
Join Date: Feb 2011
Location: Goldsboro
Quote:
Originally Posted by open1your1eyes0 View Post
I have a few high level devs looking into these root exploits to see exactly what is going. Don't worry guys, we'll get to the bottom of these odd and sketchy methods. Whatever it is, the exploits themselves for actually gaining root are working so we're trying to see if we can recreate them into our own guaranteed safe method.
Thanks for looking into this! I was debating using one of these methods for the last couple hours. But the more I read the more hesitant I got. Think I'll hold of to see what you guys come up with.

Sent from my SCH-I545 using xda app-developers app
 
jpolzner
Old
#39  
Member
Thanks Meter 3
Posts: 48
Join Date: Oct 2010
Location: Cleveland, OH
Quote:
Originally Posted by joeyx2 View Post
You think maybe they don't want it open source so that Verizon will have trouble trying to patch it? Just a thought.

Sent from my SCH-I545 using xda app-developers app
This is a exploit that covers a lage range of devices written by Chinese devs...... I seriously doubt they care about what Verizon will do.

Sent from my SCH-I545 using Tapatalk
 
joeyx2
Old
#40  
Senior Member
Thanks Meter 55
Posts: 271
Join Date: Sep 2010
Quote:
Originally Posted by jwendt79 View Post
Thanks for looking into this! I was debating using one of these methods for the last couple hours. But the more I read the more hesitant I got. Think I'll hold of to see what you guys come up with.

Sent from my SCH-I545 using xda app-developers app
I see your point but let me reword that. So ANYBODY can't patch the exploit. Though I will say of I was on stock mj7 I wouldn't do it. Long time ago I had some transactions from my account in China or Japan (long time ago so I can't remember) and luckily my bank realized I can't make transactions over seas and in the US on the same day. I think it was when using apps to root was popular and that's how they got my info. Be careful everybody!

Sent from my SCH-I545 using xda app-developers app

Tags
mj7, root, vruemj7
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes