https://github.com/evdenis/adb_root
Magisk Module that allows you to run "adb root". Android 10 only. Probably will work with Android 9. Definitely not with Android 11/12.
https://github.com/evdenis/adb_root
adb adbd android magisk magisk-module root
Last synced: 11 days ago
JSON representation
Magisk Module that allows you to run "adb root". Android 10 only. Probably will work with Android 9. Definitely not with Android 11/12.
- Host: GitHub
- URL: https://github.com/evdenis/adb_root
- Owner: evdenis
- License: gpl-2.0
- Created: 2020-01-13T14:29:03.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2026-02-15T21:53:55.000Z (22 days ago)
- Last Synced: 2026-02-16T04:39:30.995Z (22 days ago)
- Topics: adb, adbd, android, magisk, magisk-module, root
- Language: Makefile
- Homepage:
- Size: 668 KB
- Stars: 489
- Watchers: 15
- Forks: 79
- Open Issues: 19
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# ADB Root
A Magisk module that runs the `adbd` daemon as root and skips USB authentication.
This module only supports **Android 9/10** on **aarch64** devices.
## Compatibility
| Android Version | Architecture | Status |
|-----------------|-------------|--------|
| 9 (Pie) | arm64/aarch64 | Supported |
| 10 (Q) | arm64/aarch64 | Supported |
| 9/10 | arm/x86/x86_64 | Not supported (arm64 binary only) |
| 8 (Oreo) and below | any | Not supported |
| 11+ | any | Not supported |
## What this does
You don't need this module if you don't know what is "adb root". It's not an
ordinary root (su), it's the adbd daemon running on your phone with root rights.
adb root allows you to "adb push/pull" to system directories and run such commands
as "adb remount" or "adb disable-verify".
**This is a highly insecure magisk module.**
Don't forget to disable it once you've done all the things you need.
Don't use it constantly.
This module provides a patched adbd binary obtained from AOSP sources that disables
props checks and USB auth. The binary is required because "adb root" can be disabled
at compile time by some vendors.
Patch:
```diff
diff --git a/adb/daemon/main.cpp b/adb/daemon/main.cpp
index d064d0d..a520bfd 100644
--- a/adb/daemon/main.cpp
+++ b/adb/daemon/main.cpp
@@ -51,48 +51,11 @@
static const char* root_seclabel = nullptr;
static bool should_drop_capabilities_bounding_set() {
-#if defined(ALLOW_ADBD_ROOT)
- if (__android_log_is_debuggable()) {
- return false;
- }
-#endif
- return true;
+ return false;
}
static bool should_drop_privileges() {
-#if defined(ALLOW_ADBD_ROOT)
- // The properties that affect `adb root` and `adb unroot` are ro.secure and
- // ro.debuggable. In this context the names don't make the expected behavior
- // particularly obvious.
- //
- // ro.debuggable:
- // Allowed to become root, but not necessarily the default. Set to 1 on
- // eng and userdebug builds.
- //
- // ro.secure:
- // Drop privileges by default. Set to 1 on userdebug and user builds.
- bool ro_secure = android::base::GetBoolProperty("ro.secure", true);
- bool ro_debuggable = __android_log_is_debuggable();
-
- // Drop privileges if ro.secure is set...
- bool drop = ro_secure;
-
- // ... except "adb root" lets you keep privileges in a debuggable build.
- std::string prop = android::base::GetProperty("service.adb.root", "");
- bool adb_root = (prop == "1");
- bool adb_unroot = (prop == "0");
- if (ro_debuggable && adb_root) {
- drop = false;
- }
- // ... and "adb unroot" lets you explicitly drop privileges.
- if (adb_unroot) {
- drop = true;
- }
-
- return drop;
-#else
- return true; // "adb root" not allowed, always drop privileges.
-#endif // ALLOW_ADBD_ROOT
+ return false;
}
static void drop_privileges(int server_port) {
@@ -183,9 +146,7 @@ int adbd_main(int server_port) {
// descriptor will always be open.
adbd_cloexec_auth_socket();
- if (ALLOW_ADBD_NO_AUTH && !android::base::GetBoolProperty("ro.adb.secure", false)) {
- auth_required = false;
- }
+ auth_required = false;
adbd_auth_init();
diff --git a/adb/services.cpp b/adb/services.cpp
index 8518f2e..24f9def 100644
--- a/adb/services.cpp
+++ b/adb/services.cpp
@@ -78,12 +78,6 @@ void restart_root_service(int fd, void *cookie) {
WriteFdExactly(fd, "adbd is already running as root\n");
adb_close(fd);
} else {
- if (!__android_log_is_debuggable()) {
- WriteFdExactly(fd, "adbd cannot run as root in production builds\n");
- adb_close(fd);
- return;
- }
-
android::base::SetProperty("service.adb.root", "1");
WriteFdExactly(fd, "restarting adbd as root\n");
adb_close(fd);
```
## How to install
**Requirements:** Android 9/10, aarch64 device, Magisk v20.4+
Stable release:
1. Download latest adb_root.zip from releases page
https://github.com/evdenis/adb_root/releases
2. MagiskManager -> Modules + Downloads/adb_root.zip -> Reboot
Master branch:
1. git clone https://github.com/evdenis/adb_root
2. cd adb_root
3. make install
## Troubleshooting
**Device disappears / goes offline after reboot:**
Some vendors (Samsung DEFEX, Huawei, etc.) have kernel-level security that kills
modified system binaries. The v2 module includes a `service.sh` script that
automatically restarts adbd after boot. If the device still disappears, the module
will auto-disable itself on the next boot — simply reboot again to recover.
**`adb install` or `adb pull` fails with permission errors:**
This is caused by missing SELinux permissions. v2 includes expanded sepolicy rules
that should fix this. If you still see denials, check `adb logcat | grep avc` for
the specific denial and report it.
**`adb root` says "already running as root" but shell is not root:**
Make sure `adb shell id` shows `uid=0(root)`. If not, try `adb kill-server && adb root`.
The v2 module sets `service.adb.root=1` via `system.prop` which helps with this.
**Module doesn't work on Android 11+:**
This module's patched binary only works on Android 9/10.
**Module doesn't work on 32-bit devices:**
The patched adbd binary is compiled for aarch64 (arm64) only. There are no plans to
support 32-bit architectures.
## Support
- [Telegram](https://t.me/joinchat/GsJfBBaxozXvVkSJhm0IOQ)
- [XDA Thread](https://forum.xda-developers.com/apps/magisk/module-debugging-modules-adb-root-t4050041)