I have Android 4.1.2 Jelly Bean official update on my smartphone, which I updated with Samsung's Kies over USB cable.
From curiosity I downloaded the rooting package http://d-h.st/ook and looked at root/META-INF/com/google/android/updater-script
In a nutshell, rooting is adding su (SuperUser) binary into /system/bin.
ui_print("***************************"); ui_print("Rooting with SuperSU 0.95 & Busybox 1.20.2"); ui_print("***************************"); show_progress(1.000000, 0); ui_print("Installing temporary busybox"); package_extract_file("system/xbin/busybox", "/tmp/busybox"); set_perm(0, 0, 0777, "/tmp/busybox"); set_progress(0.200000); ui_print("Mounting system..."); run_program("/tmp/busybox", "mount", "/system"); set_progress(0.300000); ui_print("Removing old superuser"); delete("/system/bin/su"); delete("/system/xbin/su"); delete("/system/app/superuser.apk"); delete("/system/app/superUser.apk"); delete("/system/app/Superuser.apk"); delete("/system/app/SuperUser.apk"); set_progress(0.400000); ui_print("Installing Superuser & Busybox..."); package_extract_dir("system", "/system"); set_progress(0.600000); ui_print("Setting Permission..."); set_perm(0, 0, 06755, "/system/xbin/su"); set_perm(0, 0, 0644, "/system/app/superuser.apk"); set_perm(0, 0, 04755, "/system/xbin/busybox"); set_progress(0.700000); ui_print("Installing Busybox..."); run_program("/system/xbin/busybox", "--install", "-s", "/system/xbin"); set_progress(0.900000); ui_print("Symlinking..."); symlink("/system/xbin/su", "/system/bin/su"); ui_print("Unmounting system..."); run_program("/tmp/busybox", "umount", "/system"); ui_print("Deleting temporary busybox"); delete("/tmp/busybox"); set_progress(1.000000); show_progress(1.000000, 0); ui_print("Root complete!"); ui_print("SuperSU 0.95 & Busybox 1.20.2");
After reading and playing around with adb I decided that I go for it
For strengthening my decision a checked if the MD5 matches and it matched
mike@mikembp:~/Downloads/android$ md5 root.zip MD5 (root.zip) = 3d5cc207f625a032e7ff4fe92e3e6efa
Trying su after restart
shell@android:/ $ ll data/ opendir failed, Permission denied 1|shell@android:/ $ su shell@android:/ # ll data/ -rw------- system system 4096 2014-02-09 09:45 NVM0 -rw------- system system 16384 2014-02-08 23:08 NVM1 -rw------- system system 2832 2014-02-09 09:45 NVM13 -rw------- system system 0 2013-11-14 06:33 NVM2 -rw------- system system 83724 2014-02-08 22:46 NVM3 -rw------- system system 112 2014-02-08 23:10 NVM5 -rw------- system system 0 2013-11-14 06:33 NVM6 -rw-rw-rw- root system 15032320 2014-02-08 20:35 adm.sqlite -rw-rw-rw- root system 0 2013-11-14 06:31 adm.sqlite-copy-datestamp-JB drwxrwxr-x system system 2014-02-03 13:53 anr drwxrwx--x system system 2014-02-09 07:43 app drwx------ root root 2014-02-07 12:27 app-asec drwxrwx--x system system 2014-02-07 12:26 app-private drwx------ system system 2014-02-09 09:45 backup -rw------- system system 2777 2014-02-09 09:55 cal.bin drwxrwxr-x system system 2014-02-09 07:37 clipboard -rw-rw-rw- nobody nobody 95613 2014-02-09 09:45 cops.log drwxrwx--x system system 2014-02-09 09:45 dalvik-cache drwxrwx--x system system 2014-02-09 09:44 data drwxr-x--- root log 2013-11-14 06:31 dontpanic drwxrwx--- drm drm 2013-11-14 06:31 drm -rwxr--r-- system system 8 2014-02-09 09:55 hidden_volume.txt drwxr-x--x root root 2013-11-14 06:31 local drwxrwxr-x system log 2014-02-09 09:55 log drwxrwx--- root root 1970-01-01 01:00 lost+found drwxrwxr-x media_rw media_rw 2013-11-14 06:31 media drwxrwx--t system misc 2013-12-27 09:46 misc drwxrwxrwx media system 2013-11-20 14:27 mmdsp-SIA_2013-11-20_14-27-31_1384954051 drwx------ root root 2014-02-09 09:45 property drwxrwx--x system system 2013-11-14 06:31 resource-cache drwxr-x--- root shell 2013-11-14 06:31 ssh drwxrwxr-x system system 2014-01-30 19:31 ste-debug drwxrwxr-x system system 2014-02-09 09:55 system drwxr-xr-x system system 2013-12-24 16:12 tombstones drwx--x--x system system 2013-11-14 06:31 user
No comments:
Post a Comment