/system/bin/ric が状態監視をしているようで変更されてしまうと再起動がかかる模様。
道理でアプリでやってもコマンドでやっても再起動されてしまう訳だ。
root@android:/ # mount -o remount,rw -t ext4 /dev/block/mmcblk0p12 /system
しかしどう対処するんだろう。
/system 配下にいるしその /system は読み込み専用になっていて書き込みは出来ないし。
むー。
root@android:/ # ps | grep ric
root 227 1 1268 572 c00970f8 402743c4 S /sbin/ric
あー。プロセス殺してみよっと。
root@android:/ # kill 227
駄目だ。
再起動がかかってしまった。
やはりそんなに甘くないか。
もう少し調べてみるか。
んー。
となると焼く時に無害な ric にしておけばいいってことかな。
単に mount コマンドのオプションが違っているだけなのか。
次のサイトを参考にしたら出来た。
TA、ftf、root、ric・・・メモ書き。[Xperia Z1 C6903]
http://booleestreet.xii.jp/archives/7224
ただしばらくすると書き込みが出来なくなるのはなんでだろう。
2014年2月2日日曜日
2014年2月1日土曜日
OS X Mavericks で SOL21 の root を取得してみる。
[SP][ROOT] DooMLoRD Easy Rooting Toolkit (v17) {perf_event exploit}[20130717]
http://forum.xda-developers.com/showthread.php?t=2329208
お手軽に実行するだけで root 取得ができるようなのでやってみた。
$ ./runme_mac.sh
---------------------------------------------------------------
Easy Rooting toolkit (v17.0)
created by DooMLoRD
"pref_event exploit"
Credits go to all those involved in making this possible!
---------------------------------------------------------------
Special thanks to: the_laser, Bin4ry, fi01, hiikezoe, [NUT]
and to all those who are contributing to our git tree!
Sources: https://github.com/android-rooting-tools
---------------------------------------------------------------
ported to Mac OS X by ChrisBoesing
---------------------------------------------------------------
[*] This script will:
(1) root ur device using the pref_event exploit
(2) install Busybox
(3) install SU files
[*] Before u begin:
(1) make sure u have installed adb drivers for ur device
(2) enable "USB DEBUGGING"
from (Menu\Settings\Developer Options)
(3) enable "UNKNOWN SOURCES"
from (Menu\Settings\Security)
(4) connect USB cable to PHONE and then connect to PC
(5) skip "PC Companion Software" prompt on device
---------------------------------------------------------------
CONFIRM ALL THE ABOVE THEN
--- STARTING ----
--- WAITING FOR DEVICE
--- creating temporary directory
mkdir failed for tmp, File exists
--- cleaning
rm failed for *, No such file or directory
--- pushing files
26 KB/s (326 bytes in 0.011s)
507 KB/s (1578 bytes in 0.003s)
3271 KB/s (26268 bytes in 0.007s)
5412 KB/s (853044 bytes in 0.153s)
4608 KB/s (96260 bytes in 0.020s)
5407 KB/s (1858064 bytes in 0.335s)
--- DooMing device!
--- Correcting permissions
--- Running exploit
run_root_shell v6.2
Based on pref_event exploit
Modified for auto-rooting by DooMLoRD
Part of Easy Rooting Toolkit
Devices Supported:
Xperia Z (C6602/3) - 10.1.1.A.1.253/307
Xperia Z (C6602/3) - 10.3.A.0.423
Xperia Z (C6606) - 10.1.1.B.0.166
Xperia ZL (C6502/3/6) - 10.3.A.0.423
Tablet Z (SGP321) - 10.1.1.A.1.307
Tablet Z (SGP311/2) - 10.1.C.0.370
Xperia ZR (C5502/3/M36h) - 10.1.1.A.1.310
Xperia SP (C5302/3/6) - 12.0.A.1.211/257/284
Xperia L (C2104/5) - 15.0.A.1.31/36
Xperia T (LT30p) - 9.1.A.1.141/142
Xperia TX (LT29i) - 9.1.B.1.67
Xperia V (LT25i) - 9.1.A.1.140/142/145
Xperia S (LT26i) - 6.2.B.0.200/211
Xperia SL (LT26ii) - 6.2.B.0.211
Xperia Acro S (LT26w) - 6.2.B.0.200/211
Xperia Ion (LT28h) - 6.2.B.0.211
Xperia P (LT22i) - 6.2.A.1.100
Xperia Go (ST27i/a) - 6.2.A.1.100
Xperia J (ST26i/a) - 11.2.A.0.21/31
Xperia AX (SO-01E) - 10.1.D.0.343
Tablet Z (SO-03E) - 10.1.E.0.265/269
Xperia GX (SO-04D) - 7.0.D.1.137
Xperia A (SO-04E) - 10.1.1.D.0.179
Xperia A (SO-04E) - 10.1.1.D.2.26
Xperia SX (SO-05D) - 7.0.D.1.137
Xperia SX (SO-05D) - 9.1.C.0.475
Xperia VL (SOL21) - 9.0.F.0.226
Xperia VL (SOL21) - 9.1.D.0.395/401
Xperia UL (SOL22) - 10.2.F.3.43
Google Nexus 4 - JDQ39
Google Nexus - JOP40C/JZO54K
LG Optimus G E975 - v10e
Changelog is posted here: http://bit.ly/ert_log
Device detected: SOL21 (9.1.D.0.401)
Attempt perf_swevent exploit...
writing address is 8e49
Launching auto-root script!
---------------------------------------------------------------
Launching final rooting process...
---------------------------------------------------------------
--- Rooting!
--- Remounting rootfs
--- Killing RIC service (specific for new Xperia devices)
Unable to chmod /system/bin/ric: No such file or directory
--- Installing busybox
--- Remounting /system
--- copying busybox to /system/xbin/
1666+1 records in
1666+1 records out
853044 bytes transferred in 0.052 secs (16404692 bytes/sec)
--- correcting ownership
--- correcting permissions
--- installing busybox
--- pushing SU binary
rm failed for /system/xbin/su, No such file or directory
188+1 records in
188+1 records out
96260 bytes transferred in 0.008 secs (12032500 bytes/sec)
--- correcting ownership
--- correcting permissions
--- correcting symlinks
rm failed for /system/bin/su, No such file or directory
--- pushing Superuser app
3629+1 records in
3629+1 records out
1858064 bytes transferred in 0.105 secs (17695847 bytes/sec)
--- correcting permissions
--- DONE!
--- cleaning
--- Please wait device is now rebooting
ALL DONE!!!
$
このツールを知る前に adb を使えるようにしてみたけれど root 取得に必要なものは全て入っているので SOL21 で事前に以下の項目にチェックしておくだけだった。
提供元不明のアプリ
スリープモードにしない
USB デバッグ
さてここからは不要なアプリの削除をしてバックアップだ。
http://forum.xda-developers.com/showthread.php?t=2329208
お手軽に実行するだけで root 取得ができるようなのでやってみた。
$ ./runme_mac.sh
---------------------------------------------------------------
Easy Rooting toolkit (v17.0)
created by DooMLoRD
"pref_event exploit"
Credits go to all those involved in making this possible!
---------------------------------------------------------------
Special thanks to: the_laser, Bin4ry, fi01, hiikezoe, [NUT]
and to all those who are contributing to our git tree!
Sources: https://github.com/android-rooting-tools
---------------------------------------------------------------
ported to Mac OS X by ChrisBoesing
---------------------------------------------------------------
[*] This script will:
(1) root ur device using the pref_event exploit
(2) install Busybox
(3) install SU files
[*] Before u begin:
(1) make sure u have installed adb drivers for ur device
(2) enable "USB DEBUGGING"
from (Menu\Settings\Developer Options)
(3) enable "UNKNOWN SOURCES"
from (Menu\Settings\Security)
(4) connect USB cable to PHONE and then connect to PC
(5) skip "PC Companion Software" prompt on device
---------------------------------------------------------------
CONFIRM ALL THE ABOVE THEN
--- STARTING ----
--- WAITING FOR DEVICE
--- creating temporary directory
mkdir failed for tmp, File exists
--- cleaning
rm failed for *, No such file or directory
--- pushing files
26 KB/s (326 bytes in 0.011s)
507 KB/s (1578 bytes in 0.003s)
3271 KB/s (26268 bytes in 0.007s)
5412 KB/s (853044 bytes in 0.153s)
4608 KB/s (96260 bytes in 0.020s)
5407 KB/s (1858064 bytes in 0.335s)
--- DooMing device!
--- Correcting permissions
--- Running exploit
run_root_shell v6.2
Based on pref_event exploit
Modified for auto-rooting by DooMLoRD
Part of Easy Rooting Toolkit
Devices Supported:
Xperia Z (C6602/3) - 10.1.1.A.1.253/307
Xperia Z (C6602/3) - 10.3.A.0.423
Xperia Z (C6606) - 10.1.1.B.0.166
Xperia ZL (C6502/3/6) - 10.3.A.0.423
Tablet Z (SGP321) - 10.1.1.A.1.307
Tablet Z (SGP311/2) - 10.1.C.0.370
Xperia ZR (C5502/3/M36h) - 10.1.1.A.1.310
Xperia SP (C5302/3/6) - 12.0.A.1.211/257/284
Xperia L (C2104/5) - 15.0.A.1.31/36
Xperia T (LT30p) - 9.1.A.1.141/142
Xperia TX (LT29i) - 9.1.B.1.67
Xperia V (LT25i) - 9.1.A.1.140/142/145
Xperia S (LT26i) - 6.2.B.0.200/211
Xperia SL (LT26ii) - 6.2.B.0.211
Xperia Acro S (LT26w) - 6.2.B.0.200/211
Xperia Ion (LT28h) - 6.2.B.0.211
Xperia P (LT22i) - 6.2.A.1.100
Xperia Go (ST27i/a) - 6.2.A.1.100
Xperia J (ST26i/a) - 11.2.A.0.21/31
Xperia AX (SO-01E) - 10.1.D.0.343
Tablet Z (SO-03E) - 10.1.E.0.265/269
Xperia GX (SO-04D) - 7.0.D.1.137
Xperia A (SO-04E) - 10.1.1.D.0.179
Xperia A (SO-04E) - 10.1.1.D.2.26
Xperia SX (SO-05D) - 7.0.D.1.137
Xperia SX (SO-05D) - 9.1.C.0.475
Xperia VL (SOL21) - 9.0.F.0.226
Xperia VL (SOL21) - 9.1.D.0.395/401
Xperia UL (SOL22) - 10.2.F.3.43
Google Nexus 4 - JDQ39
Google Nexus - JOP40C/JZO54K
LG Optimus G E975 - v10e
Changelog is posted here: http://bit.ly/ert_log
Device detected: SOL21 (9.1.D.0.401)
Attempt perf_swevent exploit...
writing address is 8e49
Launching auto-root script!
---------------------------------------------------------------
Launching final rooting process...
---------------------------------------------------------------
--- Rooting!
--- Remounting rootfs
--- Killing RIC service (specific for new Xperia devices)
Unable to chmod /system/bin/ric: No such file or directory
--- Installing busybox
--- Remounting /system
--- copying busybox to /system/xbin/
1666+1 records in
1666+1 records out
853044 bytes transferred in 0.052 secs (16404692 bytes/sec)
--- correcting ownership
--- correcting permissions
--- installing busybox
--- pushing SU binary
rm failed for /system/xbin/su, No such file or directory
188+1 records in
188+1 records out
96260 bytes transferred in 0.008 secs (12032500 bytes/sec)
--- correcting ownership
--- correcting permissions
--- correcting symlinks
rm failed for /system/bin/su, No such file or directory
--- pushing Superuser app
3629+1 records in
3629+1 records out
1858064 bytes transferred in 0.105 secs (17695847 bytes/sec)
--- correcting permissions
--- DONE!
--- cleaning
--- Please wait device is now rebooting
ALL DONE!!!
$
SOL21 が再起動したので SuperSU を探してみるとあったあった。
このツールを知る前に adb を使えるようにしてみたけれど root 取得に必要なものは全て入っているので SOL21 で事前に以下の項目にチェックしておくだけだった。
提供元不明のアプリ
スリープモードにしない
USB デバッグ
さてここからは不要なアプリの削除をしてバックアップだ。
登録:
投稿 (Atom)
MELSECNET/HのリモートI/O局経由のMODBUS(R)通信について
http://fa-faq.mitsubishielectric.co.jp/faq/show/13661 別ネットワークの先にぶら下げるってどういうことだろう。
-
http://fa-faq.mitsubishielectric.co.jp/faq/show/19382 こういうエラーって運用開始してから発生する可能性があるんだろうな。
-
http://fa-faq.mitsubishielectric.co.jp/faq/show/19385 このシート名を変更する際に MX Sheet 側から行わないといけないのはなんとかしてほしいものだ。
-
http://fa-faq.mitsubishielectric.co.jp/faq/show/17117 設定は簡単だな。 一度使ってみたいものだ