Created
June 9, 2017 00:44
-
-
Save Vishukani/5e5fe5828a060a2e026ead76c22f1bf5 to your computer and use it in GitHub Desktop.
spreadtrum system.img mounting on linux and manual root injection
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
sudo mount -t ext4 -o loop,rw system.img /home/username/temp | |
mkdir /home/username/temp/bin/.ext | |
cp su /home/username/temp/xbin/daemonsu | |
cp su /home/username/temp/xbin/su | |
cp su /home/username/temp/bin/.ext/.su | |
cp Superuser.apk /home/username/temp/app/Superuser.apk | |
cp ./install-recovery.sh /home/username/temp/etc/install-recovery.sh | |
mkdir /home/username/temp/etc/init.d | |
cp ./99SuperSUDaemon /home/username/temp/etc/init.d/99SuperSUDaemon | |
echo 1 > /home/username/temp/etc/.installed_su_daemon | |
chmod 0777 /home/username/temp/bin/.ext | |
chmod 06755 /home/username/temp/bin/.ext/.su | |
chmod 06755 /home/username/temp/xbin/su | |
chmod 06755 /home/username/temp/xbin/daemonsu | |
chmod 0755 /home/username/temp/etc/install-recovery.sh | |
chmod 0755 /home/username/temp/etc/init.d/99SuperSUDaemon | |
chmod 0644 /home/username/temp/etc/.installed_su_daemon | |
chmod 0644 /home/username/temp/app/Superuser.apk |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment