[BETA][2017.10.01] SuperSU v2.82 SR5

Search This thread

tetakpatak

Senior Member
Jan 6, 2013
4,663
2,331
Lucerne
@Chainfire SuperSU v2.06 works very fine with Android L test version on my Nexus 7 flo.

The only root apps that aren't working are Quick Boot and Titanium Backup. Quick Boot gets granted permission for an interactive shell, but nothing happens. TB can't recognize root access (it prompts in SuperSU window and I confirmed).

Would some logs be useful? I think my BusyBox might be the problem, it isn't working.

tetakpatalked from Nexus 7 flo / Android "L" test version
 
Last edited:
  • Like
Reactions: ST Dog

Chainfire

Moderator Emeritus / Senior Recognized Developer
Oct 2, 2007
11,452
87,862
www.chainfire.eu
Hi.

I'm sorry for sending last miss-match log.

This time I did as..

adb logcat > logcat.txt

Regards.

Slowly but surely zoning in on the issue.

- Install attached version
- Update binaries
- Reboot
- Open SuperSU
- Create a new logcat: adb logcat > logcat.txt
- Before posting, make sure it contains a line saying "[SuperSU][APK][Installer] su --> 207"
- Post the output of (copy/paste): adb shell su --context u:r:system_app:s0 -c id
 

Attachments

  • SuperSU-v2.07-installdebug.apk
    2.3 MB · Views: 804
  • Like
Reactions: Pkt_Lnt

dhampire

Senior Member
Jan 26, 2013
202
58
Thailand
Realme Narzo 30 5G
Hi.

Q:
Post the output of (copy/paste): adb shell su --context u:r:system_app:s0 -c id

What kind of file(where) ? Please inform me.
 

Attachments

  • cmd.jpg
    cmd.jpg
    19.9 KB · Views: 2,133
Last edited:
  • Like
Reactions: Ray_Green

dhampire

Senior Member
Jan 26, 2013
202
58
Thailand
Realme Narzo 30 5G
Hi.

I did as your order.

1) Install attached version
2) Update binaries
3) Reboot
4) Open SuperSU
5) Create a new logcat: adb logcat > logcat.txt


- Before posting, make sure it contains a line saying "[SuperSU][APK][Installer] su --> 207"

=> Sure. I checked it in logcat.txt.

Cheers.
 

Attachments

  • logcat2.zip
    135.3 KB · Views: 125

Chainfire

Moderator Emeritus / Senior Recognized Developer
Oct 2, 2007
11,452
87,862
www.chainfire.eu
Hi.

Q:
Post the output of (copy/paste): adb shell su --context u:r:system_app:s0 -c id

What kind of file(where) ? Please inform me.

Actually the output should be something like this:

Code:
C:\>adb shell su --context u:r:system_app:s0 -c id
uid=0(root) gid=0(root) context=u:r:system_app:s0

C:\>

Please try again.

Once that works, try this and see what the output is:

Code:
adb shell su --self-test

And the output of:

Code:
adb shell ls -lZ /system/xbin
 

dhampire

Senior Member
Jan 26, 2013
202
58
Thailand
Realme Narzo 30 5G
Hi.

1:
Code:
C:\>adb shell su --context u:r:system_app:s0 -c id
uid=0(root) gid=0(root) context=u:r:system_app:s0

=> see 01.jpg

2:[code]
adb shell su --self-test

=> see 02.jpg

3:[code]
adb shell ls -lZ /system/xbin

=> too big... can't catch all.
 

Attachments

  • 01.jpg
    01.jpg
    7.8 KB · Views: 2,123
  • 02.jpg
    02.jpg
    254.5 KB · Views: 2,037

dhampire

Senior Member
Jan 26, 2013
202
58
Thailand
Realme Narzo 30 5G
use vRoot (because of no other tool - inclusive towelroot / kingoroot / Framaroot etc.,- can root my device, I try a lot), and flash supersu 1.9.4, then delete vRoot.
 
Last edited:

r25txe

Senior Member
Mar 3, 2011
481
165
@Chainfire SuperSU v2.06 works very fine with Android L test version on my Nexus 7 flo.

The only root apps that aren't working are Quick Boot and Titanium Backup. Quick Boot gets granted permission for an interactive shell, but nothing happens. TB can't recognize root access (it prompts in SuperSU window and I confirmed).

Would some logs be useful? I think my BusyBox might be the problem, it isn't working.

tetakpatalked from Nexus 7 flo / Android "L" test version

I believe that Titanium is not yet Android L compatible.

How do you install Busybox? Try using Busybox X (Play Store) after uninstalling all traces of Busybox first.
 
Last edited:
  • Like
Reactions: tetakpatak

dhampire

Senior Member
Jan 26, 2013
202
58
Thailand
Realme Narzo 30 5G
WoW !

Hi, Big Thanks for your strong support!

WoW ! Now no notification "need su binary update" in nortification area.

I attached Logcat3 & self test here.

Regards.
 

Attachments

  • logcat3.zip
    141.5 KB · Views: 128
  • --self-test.png
    --self-test.png
    147.4 KB · Views: 2,329
  • Like
Reactions: joluke

dhampire

Senior Member
Jan 26, 2013
202
58
Thailand
Realme Narzo 30 5G
Success !

Hi.

I got success to move SuperSU 2.0.8 to system folder by normal way without problem.

I feel that the stable means happy.

Anyway, Thank you so much for your strongest support!
 
Last edited:
  • Like
Reactions: Pkt_Lnt

jurben

Senior Member
Sep 10, 2012
155
51
@Chainfire : i waited for days hoping that someone else with the same case as mine would post here, but it seems noone posted yet.

My device is msm8610 based and previously it's system is JB 4.3. I got ota update to kk 4.4.2 then I install it, but first i changed the updater-script to not delete my PhilZ-CWM. My KK runs well, but i cannot get root access for my apps. With cwm and also with towelroot or other rooting tools I can put su binary and other root 'components' (daemonsu, changing install-recovery.sh, etc) but su command takes forever to finish.

(this outputs is after 'rooted' by towelroot, but i got similar output after installing update-supersu whatever version i used):

'su -v' gave output
1.99:SUPERSU

but
'su' and 'su --context u:r:system_app:s0 -c id' and 'su --self-test'
(stuck / takes forever to finish)

if i use / install update-supersu version 2.02 or higher beta version, 'su --self-test' outputs some lines before stuck:
version_code: 202
version_name: 2.02:SUPERSU
sdk: 19
daemon_sdk: 1
multiuser_sdk: 1
multiuser_userid: 0
multiuser_username: (null)
selinux_present: 1
selinux_enforcing: 1
context[base]: (stuck here)

Some output of 'ls -lZ /system/xbin'

-rwxr-xr-x root root u:eek:bject_r:system_file:s0 daemonsu
-rwxr-xr-x root root u:eek:bject_r:system_file:s0 su

I don't know whether this info is relevant or not: These lines exist in kernel's log:
Code:
<5>[  187.801792] (09-11 11:36:02.538477353) type=1400 audit(1410406562.527:31): avc:  denied  { search } for  pid=6242 comm="ainfire.supersu" name="/" dev="selinuxfs" ino=1 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir
<5>[  187.802063] (09-11 11:36:02.538747925) type=1400 audit(1410406562.527:32): avc:  denied  { read } for  pid=6242 comm="ainfire.supersu" name="enforce" dev="selinuxfs" ino=4 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file
<5>[  187.802796] (09-11 11:36:02.539480946) type=1400 audit(1410406562.527:33): avc:  denied  { open } for  pid=6242 comm="ainfire.supersu" name="enforce" dev="selinuxfs" ino=4 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file
<5>[  187.803050] (09-11 11:36:02.539734644) type=1400 audit(1410406562.527:34): avc:  denied  { getattr } for  pid=6242 comm="ainfire.supersu" path="/sys/fs/selinux/enforce" dev="selinuxfs" ino=4 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file
<5>[  193.536107] (09-11 11:36:08.272792195) type=1400 audit(1410406568.267:35): avc:  denied  { read } for  pid=6372 comm="su" name="/" dev="selinuxfs" ino=1 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir
 
Last edited:

Chainfire

Moderator Emeritus / Senior Recognized Developer
Oct 2, 2007
11,452
87,862
www.chainfire.eu
Hi.

I got success to move SuperSU 2.0.8 to system folder by normal way without problem.

I feel that the stable means happy.

Anyway, Thank you so much for your strongest support!

Thank you as well for testing and getting back logs. You're probably not the only person who had this problem, but without you, it would not have been solved today.

@Chainfire : i waited for days hoping that someone else with the same case as mine would post here, but it seems noone posted yet.

My device is msm8610 based and previously it's system is JB 4.3. I got ota update to kk 4.4.2 then I install it, but first i changed the updater-script to not delete my PhilZ-CWM. My KK runs well, but i cannot get root access for my apps. With cwm and also with towelroot or other rooting tools I can put su binary and other root 'components' (daemonsu, changing install-recovery.sh, etc) but su command takes forever to finish.

(this outputs is after 'rooted' by towelroot, but i got similar output after installing update-supersu whatever version i used):

'su -v' gave output
1.99:SUPERSU

but
'su' and 'su --context u:r:system_app:s0 -c id' and 'su --self-test'
(stuck / takes forever to finish)

if i use / install update-supersu version 2.02 or higher beta version, 'su --self-test' outputs some lines before stuck:
version_code: 202
version_name: 2.02:SUPERSU
sdk: 19
daemon_sdk: 1
multiuser_sdk: 1
multiuser_userid: 0
multiuser_username: (null)
selinux_present: 1
selinux_enforcing: 1
context[base]: (stuck here)

Some output of 'ls -lZ /system/xbin'

-rwxr-xr-x root root u:eek:bject_r:system_file:s0 daemonsu
-rwxr-xr-x root root u:eek:bject_r:system_file:s0 su

I don't know whether this info is relevant or not: These lines exist in kernel's log:
Code:
<5>[  187.801792] (09-11 11:36:02.538477353) type=1400 audit(1410406562.527:31): avc:  denied  { search } for  pid=6242 comm="ainfire.supersu" name="/" dev="selinuxfs" ino=1 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir
<5>[  187.802063] (09-11 11:36:02.538747925) type=1400 audit(1410406562.527:32): avc:  denied  { read } for  pid=6242 comm="ainfire.supersu" name="enforce" dev="selinuxfs" ino=4 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file
<5>[  187.802796] (09-11 11:36:02.539480946) type=1400 audit(1410406562.527:33): avc:  denied  { open } for  pid=6242 comm="ainfire.supersu" name="enforce" dev="selinuxfs" ino=4 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file
<5>[  187.803050] (09-11 11:36:02.539734644) type=1400 audit(1410406562.527:34): avc:  denied  { getattr } for  pid=6242 comm="ainfire.supersu" path="/sys/fs/selinux/enforce" dev="selinuxfs" ino=4 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file
<5>[  193.536107] (09-11 11:36:08.272792195) type=1400 audit(1410406568.267:35): avc:  denied  { read } for  pid=6372 comm="su" name="/" dev="selinuxfs" ino=1 scontext=u:r:untrusted_app:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir

Is there no /system/xbin/sugote and /system/xbin/sugote-mksh ?

Those avc lines do not seem to be problematic (SuperSU always generates a number of these)
 

Chainfire

Moderator Emeritus / Senior Recognized Developer
Oct 2, 2007
11,452
87,862
www.chainfire.eu
Thanks for your respon.

They are there.

Some fellow thought there may be scripts or app that blocks/prevent su from getting root so the problem is not from su binary or SuperSU. What do you think?

I think I don't have enough information to make any assumptions about this. Plainly speaking: absolutely on idea what is going on here, and no idea how to start debugging. Can you give me more specifics about the device ?
 

jurben

Senior Member
Sep 10, 2012
155
51
I think I don't have enough information to make any assumptions about this. Plainly speaking: absolutely on idea what is going on here, and no idea how to start debugging. Can you give me more specifics about the device ?
Don't be too bothered. It's ok for me without root access. I just curious.

My device is hisense AD689G / EG668 bundled (locked) with local operator Smartfren.
1e17aa86e12c029b5a6d61fce4d3da49.jpg
 

Top Liked Posts

  • There are no posts matching your filters.
  • 2533
    This thread is for SuperSU releases that are still in testing, and are not yet available through the Play store. The main thread for stable SuperSU releases is located here: https://xdaforums.com/apps/supersu/stable-2016-09-01supersu-v2-78-release-t3452703. The changelogs are in the old release thread.

    Please keep track of the version numbers in the thread titles, as the latest test release may not always be newer than the latest stable release.

    The latest test release is:
    SR5-SuperSU-v2.82-SR5-20171001224502.zip
    RELEASE NOTES
    That is a recovery flashable ZIP (I recommend FlashFire or TWRP). If you want to install via APK, it is also present inside the ZIP, in the common folder.
    617
    unSU Script zip -- Unroot with ease!

    Originally this was a little zip to help with uninstalling the old system-modifying version of SuperSU. It properly restores all the original files the SuperSU installer backed up (so, file-based OTA friendly!) and removes any files added by the installer/app. I figured other people might find it handy as well so it's attached below. Be aware, if you flashed SuperSU twice mistakenly, the SuperSU installer wasn't written to recognize that and so you've lost your originals; a system.img flash WILL be necessary in your case.

    Due to popular demand by the custom ROM community using this to unroot and pass SafetyNet checks/use Android Pay, etc., the script has been expanded to unroot Koush's SuperUser, ROM su binaries, as well as SuperSU Systemless (su.img and BINDSBIN), phh's Superuser (which is also systemless), and now Magisk and LineageOS addonsu.

    Note: To completely remove all traces of the systemless roots, you still need to flash a different, unrooted boot.img, likely the default one that came with the ROM. You can extract it from the ROM zip (or a /data/stock*.gz backup from your root solution before flashing unSU) and flash it using TWRP's awesome "Flash Image" functionality, or, "dirty flashing" the ROM zip should also work.

    My development work on my many projects comes out of my free time, so if you enjoy this project or anything else I've done on xda, please consider sponsoring my ongoing work using my GitHub Sponsors profile. For a one-time donation you can hit the donate link from my profile. Thank you for your support!

    P.S. If you found this handy then please check out my Odds and Ends thread for more flashable goodness. :D

    Previous download counts: 58944; 158506; 59850; 226692
    578
    f2fs with Android story is always complicated.

    So why is SuperSU broken with many custom ROMs:
    systemless SuperSU saves a raw ext4 image in /data/su.img and mounts it as a loopback device and to various locations upon boot.
    The problem with f2fs, is that most kernels included in custom ROMs have issues with managing loopback devices.
    This is not SuperSU issue, rather, kernel developers has to incorporate the necessary fix for f2fs.

    This “fix” is rather dumb :
    https://git.kernel.org/cgit/linux/k...y&id=0d5ed69805ee57d7b416c4a6b47c3b67284db105

    The f2fs head, Kim Jaegeuk forgot to add those pointer to post-4.10 versions of f2fs backports.
    (The stock OnePlus 3T’s kernel source code seems to already have this fix. This explains why OxygenOS didn’t have any issues with SuperSU.)
    So you have 2 choices :
    A. Cherry-pick that fix separately
    B. Merge f2fs version all the way up to 4.10(latest f2fs-stable.git is updated to 4.10)


    But there are more stories to be told, unfortunately.
    Both 2 methods introduce a new problem : breaks all previous f2fs versions to read the data.
    There is no on-disk-format change introduced by the new “fix”, but it turns out that older versions of f2fs has an issue which is exploited only when newer version of f2fs is used to write data.

    You need this additional fix, if you have no intention to update f2fs to the latest 4.10 version :
    https://git.kernel.org/cgit/linux/k...y&id=7a895023cc2c06c08a6cccb71e112255eb0837ee

    Without this fix, the kernel will panic upon reading any data.


    So we took care of the method A.
    However, there is still an issue with method B : deadlock.

    As noted in https://review.lineageos.org/#/c/95316/ , there are deadlocks present on the latest version of f2fs(from 4.8, iirc).
    It took about a month to bisect it, and I got the culprit commit :
    https://git.kernel.org/cgit/linux/k...y&id=de62dad6f502c67fd01b5c0b1f7f242836ce90d0

    I’m still yet to hear from the upstream developers, but I can confirm that reverting that commit fixes the deadlock.
    Our internal AOSPA builds are running on 4.10 f2fs with that commit reverted.


    TL;DR
    It’s not @Chainfire 's fault.
    You have to ask the kernel developer to fix the issue.
    2 methods for the kernel developers

    A. Incorporate only the necessary 2 fixes to fix loopback images :
    https://git.kernel.org/cgit/linux/k...y&id=0d5ed69805ee57d7b416c4a6b47c3b67284db105
    https://git.kernel.org/cgit/linux/k...y&id=7a895023cc2c06c08a6cccb71e112255eb0837ee

    B. If you want to upstream f2fs to the latest 4.10, revert this to avoid deadlock :
    https://git.kernel.org/cgit/linux/k...y&id=de62dad6f502c67fd01b5c0b1f7f242836ce90d0
    (A little credit would be appreciated, as it took me a frustrating month to bisect this)

    Thanks.
    348
    --- reserved ---
    189
    @ everyone

    This post is likely an important one going forward, it could be the answer to various issues people have on 6.0 related to /system.

    The conversation below pertains specifically to Nexus 6 @ 6.0.1, which has an almost full /system, but I'll bet the issue exists on all Nexus devices.

    Do you mean that there's even less space than on 6.0?
    Titanium Backup reports that there 15.6 MB free. Shouldn't this be enough for a very small mod such as an edit to build. prop?

    So after some further investigation, something pretty odd is going on.

    ext4 (the filesystem) has various types of reserved blocks.

    I suspect the tools on booted Android do not count one type of reserved block. Indeed, when you use "df" utility (both toolbox and toybox), it shows 15mb or so free. Using the same "df" utility in recovery (busybox) shows 0b free. It does show that not all blocks are in use, but the remainder is likely reserved.

    If you use a root shell on either booted Android or in recovery, trying to write contents to a new file in /system will fail. To make matters worse, file creation succeeds, but writing content does not, so you end up with a 0 byte file. You need to delete a few extra megabytes of files, before you are able to write even 1 byte to a new file!

    Many editing tools remove the old file and write a new file at the same spot rather than truly editing a file. I'm not sure if the latter has any chance of succeeding, but the former would definitely fail in this scenario.

    While the issue is understandable technically, it is likely to trip up a lot of tools, as the error is generated at the least expected moment.

    This issue is a magnet for file corruption and bootloops. Beware this issue when modifying anything on /system!

    DEVS Immediate hunch is that the difference is explained by usage of struct statfs's bfree vs bavail member.

    TL;DR Yes, even though TiBu and whatever other tool are showing you megabytes free, adding/modifying files is likely to give unexpected results on a (near-)full /system partition, and an unlucky edit can definitely prevent the device from booting! Can't give you exact numbers right now, but before modifying files or adding files to /system, I would recommend deleting files until you have at least 30-ish mb free.