Quantcast
Channel: xda-developers - Android Software and Hacking General [Developers Only]
Viewing all articles
Browse latest Browse all 3614

How to get root on chinese Freelander PD80 Shangpin

$
0
0
Hi,
Holding in my hands this Chinese pretty well made and fast thing (maybe just border plastic looks little bit loose).
But in this post I will not tell about quality of this tablet, writing this just for other people who "googled" to solve problems :cyclops:
Device spec:
Freelander PD80 Shangpin
Exynos quadcore
Android 4.0.4

So nothing new here just flow what you need to perform.
Really this article not about rooting actually it's how to get root work here.

I'm using linux so everything below aligned to linux but with some modification you can perform everything under windows.
This flow can be applicable to any device with such problem.

And as usual - Whatever you do with your device, you do that at your own risk.

Description:

1. Executing "su" in connectbot or android terminal emulator return next:
Code:

$ su
su: uid xxxxx not allowed to su

2. By executing "su" from adb shell I'm getting the root rights:
Code:

linux$ ./adb shell
android$ su
android#

Conclusion:
So device is rooted problem just with "wrong" su binary (even busybox inside).
Let's solve it if it's really your problem.

Steps to solve:
1. Download "chainsdd superuser" (site http://androidsu.com/superuser/ direct link http://downloads.noshufou.netdna-cdn...arm-signed.zip)
2. extract archive and find inside Superuser.apk and su
3. Put Superuser.apk and su into folder with adb
4. Upload them to android device sdcard by executing from PC:
Code:

# ./adb push ./su_free /sdcard/su_free
Code:

# ./adb push ./Superuser.apk /sdcard/superuser.apk
5. Now we need to move them into system
Launch adb shell:
Code:

$ ./adb shell
$ su
#

6. Make sure that system partition writable (it was my case):
Code:

# mount|grep system
As result you will see:
Code:

/dev/block/mmcblk0p2 /system ext4 rw,relatime,barrier=1,data=ordered 0 0
In our case we don't need that. But if you see "ro" instead of "rw", you need to simply remount it:
Code:

# mount -o remount,rw /system
7. Back up old su binary by executing
Code:

# cp /system/xbin/su /system/xbin/su_ori
8. Copy su binary from sdcard to system
Code:

# cp /sdcard/su /system/xbin/su
Fix permissions:
Code:

# chmod 6755 /system/xbin/su
Check permissions:
Code:

# ls -l /system/xbin/|grep su
You'll see something like this:
Code:

-rwsr-sr-x root    root      380532 2013-11-17 01:02 su
-rwsr-sr-x root    root        64412 2013-11-17 01:18 su_ori

and link it
Code:

# ln -s /system/xbin/su /system/bin/su
9. Copy superuser.apk to system applications:
Code:

# cp /sdcard/Superuser.apk /system/app/superuser.apk
Fix permissions:
Code:

# chmod 644 /system/app/superuser.apk
Check permissions:
Code:

# ls -l /system/app|grep superuser.apk
You'll see something like this:
Code:

-rw-r--r-- root    root      1468798 2013-11-17 01:10 superuser.apk
10. Reboot. And try to execute su from connectbot or android terminal emulator.
You'll be asked about granting permission.

That's all now we can do everything.
Good luck.

Viewing all articles
Browse latest Browse all 3614

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>