Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save Vishukani/5e5fe5828a060a2e026ead76c22f1bf5 to your computer and use it in GitHub Desktop.
Save Vishukani/5e5fe5828a060a2e026ead76c22f1bf5 to your computer and use it in GitHub Desktop.
spreadtrum system.img mounting on linux and manual root injection
sudo mount -t ext4 -o loop,rw system.img /home/username/temp
mkdir /home/username/temp/bin/.ext
cp su /home/username/temp/xbin/daemonsu
cp su /home/username/temp/xbin/su
cp su /home/username/temp/bin/.ext/.su
cp Superuser.apk /home/username/temp/app/Superuser.apk
cp ./install-recovery.sh /home/username/temp/etc/install-recovery.sh
mkdir /home/username/temp/etc/init.d
cp ./99SuperSUDaemon /home/username/temp/etc/init.d/99SuperSUDaemon
echo 1 > /home/username/temp/etc/.installed_su_daemon
chmod 0777 /home/username/temp/bin/.ext
chmod 06755 /home/username/temp/bin/.ext/.su
chmod 06755 /home/username/temp/xbin/su
chmod 06755 /home/username/temp/xbin/daemonsu
chmod 0755 /home/username/temp/etc/install-recovery.sh
chmod 0755 /home/username/temp/etc/init.d/99SuperSUDaemon
chmod 0644 /home/username/temp/etc/.installed_su_daemon
chmod 0644 /home/username/temp/app/Superuser.apk
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment