Well known developer Chainfire at XDA brings root to another device today, adding Samsung’s Galaxy S II to the list of 3rd-party developer unlocked devices. This comes hot on the heels of the Gingerbreak exploit, which can be used on a wide range of Android devices, also developed in part by CF.
Superuser access is acheived by using the Samsung flashing utility “Odin” to load a custom re-packaged kernel onto the phone, then booting up. Once booted, the kernel allows root access via the “adb” program, a part of the Android SDK. Simply typing “adb root” at the command line restarts adb in root mode, and allows full system access through “adb shell”
Root access granted by this method is not permanent – it requires further steps such as the manual loading of su, busybox, and Superuser.apk to enable permanent superuser access. Notably, Chainfire was able to re-package this modified kernel by using methods effective on the Galaxy S series of devices, without an actual SGS II to develop/test with.
Thanks: Anonymous Coward