Could explain that in more detail please? (and also why it is a bad idea) On Sep 4, 7:23 pm, Chris Stratton <[email protected]> wrote: > You need to create a privilege escalation mechanism then. Try adding > whatever is used on the rooted rom you want to be compatible with. > > A bad idea (but hey, its an emulator) is to use adb shell to make a > copy of sh owned by root, with the setuid bit set, called something > else. Run that and then run your special commamds from within it. > > On Sep 4, 9:51 am, Earlence <[email protected]> wrote: > > > Yes. via adb shell everything works. my point is to execute privileged > > commands from within the terminal emulator or from within native/Java > > code on the emulator to simulate a rooted device. > > > Cheers, > > Earlence > > > On Sep 4, 10:40 am, Chris Palmer <[email protected]> wrote: > > > > > Then using the terminal emulator, > > > > Are you using the terminal emulator app on the emulator itself? That > > > is wrong. Use the adb command from your Android development > > > desktop/laptop.
-- You received this message because you are subscribed to the Google Groups "Android Security Discussions" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/android-security-discuss?hl=en.
