Permanent root for the Samsung Epic 4g

Thank You: LeshaK for his method of hiding su in a tmpfs (worked on the moment and works on the epic). Noobnl for his modification on mounting rootfs rw. Anonymous (2 testers who wish to remain anonymous) for all their extensive testing, they have the Epic. SDX for the great support and environment to make this possible.

Disclaimer: I don't have an Epic, but after extensive testing with users who do, this process should be flawless. We are ready to tweak if any OTAs are released or production phones turn out to be slightly different than the pre-released phones we've tested with.

Background: I will be able to allow you to keep root using the same method I used on the moment, with a few tweaks for the epic.
In the mean time, after the exploit is ran and root access is gained thru the adb binary, we will need to push a few files and scripts to guarantee our root environment is properly setup, until we are able to develop custom kernels and a custom recovery with root incorporated.

Description: This is a temporary patch to guarantee permanent root. Once custom kernels are released with root incorporated, this patch won't be required anymore.
For now, this patch will execute on every boot ensuring the root environment is correctly setup

Download:
http://www.joeyconway.com/epic/root/joeykrim-root.sh
http://www.joeyconway.com/epic/root/jk-su
http://www.joeyconway.com/epic/root/rageagainstthecage-arm5.bin
http://www.joeyconway.com/epic/root/playlogo

Directions:
Please follow all directions exactly. Copy/paste the commands.

Commands for copying downloaded files to phone:
adb push c:\downloads\rageagainstthecage-arm5.bin /data/local/tmp/rageagainstthecage-arm5.bin
adb push c:\downloads\joeykrim-root.sh /sdcard/joeykrim-root.sh
adb push c:\downloads\jk-su /sdcard/jk-su
adb push c:\downloads\playlogo /sdcard/playlogo

Commands for temporary root Exploit:
adb shell
chmod 755 /data/local/tmp/rageagainstthecage-arm5.bin
cd /data/local/tmp
./rageagainstthecage-arm5.bin
exit

exit will exit out of the adb shell, and then type adb shell again. this time it should drop you to # instead of $.
if it goes back to $, run the exploit again,
cd /data/local/tmp
./rageagainstthecage-arm5.bin
and exit out of adb and then adb shell again to see if its # .
if it doesnt work the first time, repeat 4-5 times. it will work!

Commands for permanent root:
after you type adb shell and have # (because of the exploit just ran), type these commands:
adb shell
mount -t rfs -o remount,rw /dev/block/stl9 /system
cat /sdcard/joeykrim-root.sh > /system/bin/joeykrim-root.sh
cat /sdcard/jk-su > /system/bin/jk-su
mv /system/bin/playlogo /system/bin/playlogo-orig
cat /sdcard/playlogo > /system/bin/playlogo
chmod 755 /system/bin/playlogo
chmod 755 /system/bin/joeykrim-root.sh

please reboot and type adb shell and then type su, it should drop you to root by changing the prompt from $ to #.

if this process, doesnt work for you, please post back. as time goes on, we will clean it up and hopefully once we have a custom recovery, it'll be easy for me to put this all into one update.zip.

personally confirmed - 2 epics rooted with this process

source

0 comments:

Post a Comment