Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
spreadtrum system.img mounting on linux and manual root injection
sudo mount -t ext4 -o loop,rw system.img /home/username/temp
mkdir /home/username/temp/bin/.ext
cp su /home/username/temp/xbin/daemonsu
cp su /home/username/temp/xbin/su
cp su /home/username/temp/bin/.ext/.su
cp Superuser.apk /home/username/temp/app/Superuser.apk
cp ./install-recovery.sh /home/username/temp/etc/install-recovery.sh
mkdir /home/username/temp/etc/init.d
cp ./99SuperSUDaemon /home/username/temp/etc/init.d/99SuperSUDaemon
echo 1 > /home/username/temp/etc/.installed_su_daemon
chmod 0777 /home/username/temp/bin/.ext
chmod 06755 /home/username/temp/bin/.ext/.su
chmod 06755 /home/username/temp/xbin/su
chmod 06755 /home/username/temp/xbin/daemonsu
chmod 0755 /home/username/temp/etc/install-recovery.sh
chmod 0755 /home/username/temp/etc/init.d/99SuperSUDaemon
chmod 0644 /home/username/temp/etc/.installed_su_daemon
chmod 0644 /home/username/temp/app/Superuser.apk
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.