Amazon Fire 5th Gen 2015 Root[only hd 7 and os 5.0.1]

Status
Not open for further replies.
Search This thread

Awesomeslayerg

Senior Member
Jul 5, 2014
796
373
Los Angeles
NOTE THIS ROOT ONLY WORKS WITH FIRE OS 5.0.1 AND ONLY THE HD 7 NOT THE 10 OR 8


WE HAVE GAINED ROOT!!!
Thanks to @jkchr1s for the help and the windows bat file, @csolanol for actually finding the root, and @diegocr as well as the @Chainfire SuperSu for the root binaries!!

Heres a video for you guys who need help:
https://www.youtube.com/watch?v=ux-2b3X3BlI&feature=youtu.be

Just download the zip file from this link and remember to use a windows/linux device for now.
Mediafire Mirror #1
For windows hit install.bat and follow trough the steps
For Linux run it through the linux command prompt

2nd way to root:
1. Download supers from chain fires website https://download.chainfire.eu/696/supersu/
2. Download @ggow custom recovery or @cnsoal Twrp
http://xdaforums.com/amazon-fire/orig-development/twrp-recovery-t3242548
http://xdaforums.com/amazon-fire/orig-development/recovery-cyanogen-recovery-2015-11-04-t3240726
3. Place the recovery image in the same folder as adb and fastboot.
4. Put your fire in fastboot mode
5. Boot into the custom recovery via "fastboot boot <recoverimsgename>.img.
6. You should be in the cynogen recovery (Or twrp depending on which recovery you downloaded_
7. Then pick adb sideload, and select it and manually install drivers. If you're too lazy just place su in your SD card and flash the zip from there.
8. Adb sideload supersu and you'll get root!!

REMEMBER WE ARE NOT LIABLE IF YOUR TABLET IS BRICKED!!!

I have also left the boot.img tool as well as the modified versions of the boot.img files just incase if anyone else wants to probably dig deeper and explore more about the boot.img file
 

Attachments

  • Bootimg.zip
    8 MB · Views: 14,205
  • boot-rw-system.img
    4.2 MB · Views: 7,369
  • boot-firelauncher.img
    4.2 MB · Views: 6,984
Last edited:

amazinglarry311

Senior Member
Apr 11, 2010
506
278
Have you tried adding the su binary to /sbin in the ramdisk, and editing default.prop to ro.secure=0?
 

rbheromax

Senior Member
Jun 18, 2012
260
273
Columbia
just adding it to /sbin wont solve this. you would have to add all the selinux info for it also and then also manage to start the su daemon.
ro.secure=0 is already inside the attached boot.img above, doesn't seem to help
 

Vlasp

Senior Member
Mar 18, 2012
843
272
Plano, Texas
Lol wow! Seems to be sparked by my discovery of this new root method! Anyhow, @jkchr1s might be on to something.

---------- Post added at 11:12 AM ---------- Previous post was at 11:10 AM ----------

If we have r/w to the filesystem, take a look at the root script in this LG package: http://xdaforums.com/lg-g3/general/guide-root-method-lg-devices-t3129197

Do you think this method would work?

I'll try it!
EDIT: DON'T DO IT! IT CONTAINS LG DEVICE SPECIFIC THINGS AND IT COULD BRICK YOUR DEVICE. GOOD THING I LOOKED AT THE INSTALL.BAT BEFORE I TRIED IT!
 
Last edited:

jkchr1s

Senior Member
Dec 30, 2014
179
162
Chattanooga, TN
Lol wow! Seems to be sparked by my discovery of this new root method! Anyhow, @jkchr1s might be on to something.

---------- Post added at 11:12 AM ---------- Previous post was at 11:10 AM ----------



I'll try it!
EDIT: DON'T DO IT! IT CONTAINS LG DEVICE SPECIFIC THINGS AND IT COULD BRICK YOUR DEVICE. GOOD THING I LOOKED AT THE INSTALL.BAT BEFORE I TRIED IT!

I don't mean to run the root.bat file, look at the root script. It copies SuperSU binaries, adds a su service, and chcon's the necessary files.
 
  • Like
Reactions: diegocr

csolanol

Senior Member
Apr 18, 2010
1,753
2,626
Just for those of you that wanna root it just now:

Files needed and a boot.img to apply with fastboot boot boot.img:
https://www.dropbox.com/s/nurzm8q3pqx2v4z/root_fire.zip?dl=0

Unzip the attachment and push the files directory contents to /data/loca/tmp using adb
Example: adb push Superuser.apk /data/local/tmp/
adb push su /data/local/tmp/
...

and then do the follwing in adb shell:


mkdir /system/app/SuperSU
chmod 0755 /system/app/SuperSU
chcon u:eek:bject_r:system_file:s0 /system/app/SuperSU

cp /data/local/tmp/Superuser.apk /system/app/SuperSU/SuperSU.apk
chmod 0644 /system/app/SuperSU/SuperSU.apk
chcon u:eek:bject_r:system_file:s0 /system/app/SuperSU/SuperSU.apk

mkdir /system/bin/.ext
chmod 0755 /system/bin/.ext
chcon u:eek:bject_r:system_file:s0 /system/bin/.ext

cp /data/local/tmp/su /system/xbin/su
chmod 0755 /system/xbin/su
chcon u:eek:bject_r:system_file:s0 /system/xbin/su

cp /data/local/tmp/su /system/bin/.ext/.su
chmod 0755 /system/bin/.ext/.su
chcon u:eek:bject_r:system_file:s0 /system/bin/.ext/.su

cp /data/local/tmp/su /system/xbin/daemonsu
chmod 0755 /system/xbin/daemonsu
chcon u:eek:bject_r:system_file:s0 /system/xbin/daemonsu

cp /data/local/tmp/su /system/xbin/sugote
chmod 0755 /system/xbin/sugote
chcon u:eek:bject_r:zygote_exec:s0 /system/xbin/sugote

cp /data/local/tmp/supolicy /system/xbin/supolicy
chmod 0755 /system/xbin/supolicy
chcon u:eek:bject_r:system_file:s0 /system/xbin/supolicy

cp /data/local/tmp/libsupol.so /system/lib/libsupol.so
chmod 0644 /system/lib/libsupol.so
chcon u:eek:bject_r:system_file:s0 /system/lib/libsupol.so

cp /system/bin/sh /system/xbin/sugote-mksh
chmod 0755 /system/xbin/sugote-mksh
chcon u:eek:bject_r:system_file:s0 /system/xbin/sugote-mksh

cp /system/bin/app_process32 /system/bin/app_process32_original
chmod 0755 /system/bin/app_process32_original
chcon u:eek:bject_r:zygote_exec:s0 /system/bin/app_process32_original

cp /system/bin/app_process32 /system/bin/app_process_init
chmod 0755 /system/bin/app_process_init
chcon u:eek:bject_r:system_file:s0 /system/bin/app_process_init

rm /system/bin/app_process
rm /system/bin/app_process32

ln -s /system/xbin/daemonsu /system/bin/app_process
ln -s /system/xbin/daemonsu /system/bin/app_process32

touch /system/etc/.installed_su_daemon
chmod 0644 /system/etc/.installed_su_daemon
chcon u:eek:bject_r:system_file:s0 /system/etc/.installed_su_daemon



Once all is done you need to fastboot boot boot.img again to establish proper perms to the new files. Actually we can't change ownership of files to root from adb.

Run this command in adb shell:
/system/xbin/su --install

Then reboot and voila! you are root.

Sorry for text format by chrome doesn't allow me to format it as code...
 
Last edited:

csolanol

Senior Member
Apr 18, 2010
1,753
2,626
Proof [emoji12] uploadfromtaptalk1446403044368.png
 
Status
Not open for further replies.

Top Liked Posts

  • There are no posts matching your filters.
  • 45
    NOTE THIS ROOT ONLY WORKS WITH FIRE OS 5.0.1 AND ONLY THE HD 7 NOT THE 10 OR 8


    WE HAVE GAINED ROOT!!!
    Thanks to @jkchr1s for the help and the windows bat file, @csolanol for actually finding the root, and @diegocr as well as the @Chainfire SuperSu for the root binaries!!

    Heres a video for you guys who need help:
    https://www.youtube.com/watch?v=ux-2b3X3BlI&feature=youtu.be

    Just download the zip file from this link and remember to use a windows/linux device for now.
    Mediafire Mirror #1
    For windows hit install.bat and follow trough the steps
    For Linux run it through the linux command prompt

    2nd way to root:
    1. Download supers from chain fires website https://download.chainfire.eu/696/supersu/
    2. Download @ggow custom recovery or @cnsoal Twrp
    http://xdaforums.com/amazon-fire/orig-development/twrp-recovery-t3242548
    http://xdaforums.com/amazon-fire/orig-development/recovery-cyanogen-recovery-2015-11-04-t3240726
    3. Place the recovery image in the same folder as adb and fastboot.
    4. Put your fire in fastboot mode
    5. Boot into the custom recovery via "fastboot boot <recoverimsgename>.img.
    6. You should be in the cynogen recovery (Or twrp depending on which recovery you downloaded_
    7. Then pick adb sideload, and select it and manually install drivers. If you're too lazy just place su in your SD card and flash the zip from there.
    8. Adb sideload supersu and you'll get root!!

    REMEMBER WE ARE NOT LIABLE IF YOUR TABLET IS BRICKED!!!

    I have also left the boot.img tool as well as the modified versions of the boot.img files just incase if anyone else wants to probably dig deeper and explore more about the boot.img file
    8
    Thread closed until the OP sorts the "currently misleading" title out.

    Let me know when done....
    5
    WE HAVE GAINED ROOT!!!
    Thanks to @jkchr1s for the help and the windows bat file, @csolanol for actually finding the root, and @diegocr as well as the @Chainfire SuperSu for the root binaries!!

    Just download the zip file from this link and remember to use a windows/linux device for now.
    For windows hit install.bat and follow trough the steps
    For Linux run it through the linux command prompt

    REMEMBER WE ARE NOT LIABLE IF YOUR TABLET IS BRICKED!!!

    I have also left the boot.img tool as well as the modified versions of the boot.img files just incase if anyone else wants to probably dig deeper and explore more about the boot.img file

    made a video for you guys if you want to use it https://youtu.be/ux-2b3X3BlI enjoy and nice work
    5
    Just for those of you that wanna root it just now:

    Files needed and a boot.img to apply with fastboot boot boot.img:
    https://www.dropbox.com/s/nurzm8q3pqx2v4z/root_fire.zip?dl=0

    Unzip the attachment and push the files directory contents to /data/loca/tmp using adb
    Example: adb push Superuser.apk /data/local/tmp/
    adb push su /data/local/tmp/
    ...

    and then do the follwing in adb shell:


    mkdir /system/app/SuperSU
    chmod 0755 /system/app/SuperSU
    chcon u:eek:bject_r:system_file:s0 /system/app/SuperSU

    cp /data/local/tmp/Superuser.apk /system/app/SuperSU/SuperSU.apk
    chmod 0644 /system/app/SuperSU/SuperSU.apk
    chcon u:eek:bject_r:system_file:s0 /system/app/SuperSU/SuperSU.apk

    mkdir /system/bin/.ext
    chmod 0755 /system/bin/.ext
    chcon u:eek:bject_r:system_file:s0 /system/bin/.ext

    cp /data/local/tmp/su /system/xbin/su
    chmod 0755 /system/xbin/su
    chcon u:eek:bject_r:system_file:s0 /system/xbin/su

    cp /data/local/tmp/su /system/bin/.ext/.su
    chmod 0755 /system/bin/.ext/.su
    chcon u:eek:bject_r:system_file:s0 /system/bin/.ext/.su

    cp /data/local/tmp/su /system/xbin/daemonsu
    chmod 0755 /system/xbin/daemonsu
    chcon u:eek:bject_r:system_file:s0 /system/xbin/daemonsu

    cp /data/local/tmp/su /system/xbin/sugote
    chmod 0755 /system/xbin/sugote
    chcon u:eek:bject_r:zygote_exec:s0 /system/xbin/sugote

    cp /data/local/tmp/supolicy /system/xbin/supolicy
    chmod 0755 /system/xbin/supolicy
    chcon u:eek:bject_r:system_file:s0 /system/xbin/supolicy

    cp /data/local/tmp/libsupol.so /system/lib/libsupol.so
    chmod 0644 /system/lib/libsupol.so
    chcon u:eek:bject_r:system_file:s0 /system/lib/libsupol.so

    cp /system/bin/sh /system/xbin/sugote-mksh
    chmod 0755 /system/xbin/sugote-mksh
    chcon u:eek:bject_r:system_file:s0 /system/xbin/sugote-mksh

    cp /system/bin/app_process32 /system/bin/app_process32_original
    chmod 0755 /system/bin/app_process32_original
    chcon u:eek:bject_r:zygote_exec:s0 /system/bin/app_process32_original

    cp /system/bin/app_process32 /system/bin/app_process_init
    chmod 0755 /system/bin/app_process_init
    chcon u:eek:bject_r:system_file:s0 /system/bin/app_process_init

    rm /system/bin/app_process
    rm /system/bin/app_process32

    ln -s /system/xbin/daemonsu /system/bin/app_process
    ln -s /system/xbin/daemonsu /system/bin/app_process32

    touch /system/etc/.installed_su_daemon
    chmod 0644 /system/etc/.installed_su_daemon
    chcon u:eek:bject_r:system_file:s0 /system/etc/.installed_su_daemon



    Once all is done you need to fastboot boot boot.img again to establish proper perms to the new files. Actually we can't change ownership of files to root from adb.

    Run this command in adb shell:
    /system/xbin/su --install

    Then reboot and voila! you are root.

    Sorry for text format by chrome doesn't allow me to format it as code...