This is basically what we've been using, especially for Mikes bloatware removal.
C:\souproot\android-sdk-windows\tools>adb push c:\souproot\droidroot\rageagainst
thecage-arm5.bin /data/local/tmp
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
175 KB/s (5392 bytes in 0.030s)
C:\souproot\android-sdk-windows\tools>adb shell
cd /data/local/tmp
chmod 0755 rageagainstthecage-arm5.bin
./rageagainstthecage-arm5.bin
$ cd /data/local/tmp
chmod 0755 rageagainstthecage-arm5.bin
./rageagainstthecage-arm5.bin
$ $[*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
[*] checking NPROC limit ...
[+] RLIMIT_NPROC={2294, 2294}[*] Searching for adb ...
[+] Found adb as PID 2347[*] Spawning children. Dont type anything and wait for reset![*][*] If you like what we are doing you can send us PayPal money to[*]
7-4-3-C@web.de so we can compensate time, effort and HW costs.[*] If you are a company and feel like you profit from our work,[*] we also accept donations > 1000 USD![*][*] adb connection will be reset. restart adb server on desktop and re-login.
$
C:\souproot\android-sdk-windows\tools>adb devices
List of devices attached
R910e8d667be device
C:\souproot\android-sdk-windows\tools>adb shell
# mount -o remount,rw -t yaffs2 /dev/block/mtdblock4 /system
mount -o remount,rw -t yaffs2 /dev/block/mtdblock4 /system
# exit
exit
C:\souproot\android-sdk-windows\tools>adb push c:\souproot\droidroot\Superuser.a
pk /system/app
641 KB/s (196521 bytes in 0.299s)
C:\souproot\android-sdk-windows\tools>adb push c:\souproot\droidroot\su /system/
bin
493 KB/s (26264 bytes in 0.052s)
C:\souproot\android-sdk-windows\tools>adb push c:\souproot\droidroot\busybox /sy
stem/bin
1968 KB/s (1926944 bytes in 0.956s)
C:\souproot\android-sdk-windows\tools>adb shell
# chmod 4755 /system/bin/su
chmod 4755 /system/bin/su
# chmod 4755 /system/bin/busybox
chmod 4755 /system/bin/busybox
# mv /system/recovery-from-boot.p /system/recovery-from-boot.p.disabled
mv /system/recovery-from-boot.p /system/recovery-from-boot.p.disabled
failed on '/system/recovery-from-boot.p' - No such file or directory
# mount -o ro,remount -t yaffs2 /dev/block/mtdblock4 /system
mount -o ro,remount -t yaffs2 /dev/block/mtdblock4 /system
# rm /data/local/tmp/rageagainstthecage-arm5.bin
rm /data/local/tmp/rageagainstthecage-arm5.bin
# exit
exit
C:\souproot\android-sdk-windows\tools>echo Your Droid should now be rooted!! Pl
ease restart your Droid and close cmd.
Your Droid should now be rooted!! Please restart your Droid and close cmd.
C:\souproot\android-sdk-windows\tools>pause>nul
As you can see it does chmod 4755. So I'd be interested in altering this in order to obtain what you suggested.