Rooting[1] is the process by which users ofAndroid devices can attainprivileged control (known asroot access) over various subsystems of the device, usually smartphones andtablets. Because Android is based on a modified version of theLinux kernel,rooting anAndroid device gives access to administrative (superuser) permissions similar to those onLinux or any otherUnix-likeoperating system such asFreeBSD ormacOS.
Rooting is often performed to overcome limitations thatcarriers andhardware manufacturers put on some devices. Thus, rooting allows the users to alter or replacesystem applications and settings, run specializedapplications ("apps") that require administrator-level permissions, or perform other operations that are otherwise inaccessible to a normalAndroid user. On some devices, rooting can also facilitate the complete removal and replacement of the device's operating system, usually with a more recent release of its current operating system.
Root access is sometimes compared tojailbreaking on devices running the AppleiOS operating system. However, these are different concepts: jailbreaking is the bypass of several types of Apple prohibitions for theend user, including modifying the operating system (enforced by a "lockedbootloader"), installing non-officially approved (not available on theApp Store) applications viasideloading, and granting the user elevated administration-level privileges (rooting). Some vendors, such asHTC,Sony (except Japan and US region devices), Samsung (untilOne UI 8),OnePlus,Asus,Xiaomi, andGoogle, have provided the ability to unlock the bootloaders of some devices, thus enabling advanced users to make operating system modifications.[1][2][3] Similarly, the ability to sideload applications is typically permissible on Android devices without root permissions. Thus, it is primarily the third aspect of iOS jailbreaking (giving users administrative privileges) that most directly correlates withAndroid rooting.
Rooting is distinct fromSIM unlocking andbootloader unlocking. The former allows for the removal of theSIM card lock on a phone, while the latter allows rewriting thephone's boot partition (for example, to install or replace the operating system).[4]
Rooting lets all user-installed applications run privileged commands typically unavailable to the devices in the stock configuration. Rooting is required for more advanced and potentially dangerous operations including modifying or deleting system files, removingpre-installed applications, and low-level access to the hardware itself (rebooting, controlling status lights, or recalibrating touch inputs.) A typical rooting installation also installs aSuperuser application, which supervises applications that are granted root or superuser rights by requesting approval from the user before granting said permissions. A secondary operation, unlocking the device'sbootloader verification, is required to remove or replace the installed operating system.
In contrast toiOS jailbreaking, rooting is not needed to run applications distributed outside of the Google Play Store, known assideloading. The Android OS supports this feature natively in two ways: through the "Unknown sources" option in the Settings menu and through theAndroid Debug Bridge. However, some UScarriers, includingAT&T, have prevented the installation of applications not on the Play Store infirmware,[5] although several devices are not subject to this rule, including theSamsung Infuse 4G;[6] AT&T lifted the restriction on most devices by the middle of 2011.[7]
As of 2011[update], the AmazonKindle Fire defaults to using theAmazon Appstore instead ofGoogle Play, though like other Android devices, Kindle Fire allowssideloading of applications not from an approved store,[8] and the "easy installer" application on the Amazon Appstore makes this easy. Other vendors of Android devices may look to other sources in the future.
Some devices, including those byHuawei[9] and any brand sold byVerizon[10] cannot easily be rooted, unless aprivilege escalation exploit is found in the device's operating system version.

Advantages of rooting include the possibility for complete control over the appearance, feel, and behaviour of the device. As a superuser has access to the device's system files, all aspects of the operating system can be customized with the only real limitation being the level of coding expertise.[11] Immediately expectable advantages of rooted devices include the following:[12][13]
/data directory. This allowsbackups and restorations of the entire system, and duplication of user data and preferences to a different rooted device.[11]/sys/devices/platform/sec-battery/power_supply/battery/siop_levelsystem file, where 100 represents the highest technically supported charging rate.[21][a]Disadvantages of rooting include:
Rooting allows the user to obtain privileged access to a phone. It does not allow a user to install a new OS (custom firmware or customROM) or recovery image, and it doesn't allow a phone that is locked to a certain carrier to be used on another one. Related operations allow these.
Bootloader unlocking is sometimes a first step used to root the device; however, it is not the same as rooting the device.[26] Most devices come with a locked bootloader, which prevents users from installing a new boot image, which is often flashed when rooting a device or using a custom ROM.[27] The bootloader runs on device start-up and is in charge of loading the operating system on the phone.[28] It is generally in charge of verifying that phone system information hasn't been tampered with and is genuine. Nonetheless, people still perform this operation, as unlocking the bootloader allows users to install custom ROMs.[29]
The first step to do this is generally to set up OEM unlocking,[30] and then to follow manufacturer specific instructions.[26] Not all devices can be bootloader unlocked, and some can only be unlocked with an exploit which usually needs aprivilege escalation bug in order to remove software locks, which includes mostLG V20 models andVerizon-soldGoogle Pixel devices.[31][32]
The process of unlocking the bootloader might involve a factory reset, erasing all user data, third-party applications, and configuration.[33][34]
SIM unlocking allows a phone that is locked to a certain carrier to be used on a different carrier. The instructions vary per device and carrier, but this might be done by first requesting the carrier to unlock the phone or purchasing an unlock code online.[35]
Some rooting methods involve the use of acommand prompt and a development interface called theAndroid Debug Bridge (also known as ADB), while other methods may use existing vulnerabilities in devices. Due to similarly modeled devices often having a multitude of changes, rooting methods for one device when used for a different variant can result inbricking the device.
"Systemless root" is a variant of rooting in which the underlying device file system is not modified. Systemless root uses various techniques to gain root access without modifying the systempartition of a device. Some root applications may include a "hiding" function, which makes attempts to mask the effects and results of rooting, often by whitelisting certain applications for the root or blocking access to affected files.[36] Systemless rooting has the advantage of not triggering the software-based version ofSafetyNet, an Android feature that works by monitoring changes to system files and is used by applications such as Google Pay to detect whether a device has been tampered with such as by rooting. However, hardware-backed SafetyNet versions may be triggered by systemless rooting, as well as in unrooted devices shipped withoutGoogle Mobile Services (GMS).[37][38][39][40][41]
The distinction between "soft rooting" through a security vulnerability and "hard-rooting" byflashing asubinary executable varies from exploit to exploit, and manufacturer to manufacturer. Soft-rooting requires that a device be vulnerable toprivilege escalation, or replacing executable binaries. Hard-rooting is supported by the manufacturer, and it is generally only exposed for devices the manufacturer allows.[42] If a phone can be soft-rooted, it is also inherently vulnerable to malware.[42]
The process of rooting varies widely by manufacturer and device but sometimes includesexploiting one or more security bugs in the firmware (i.e., in the version of the Android OS installed on) of the device.[42] Once an exploit is discovered, a custom recovery image that will skip thedigital signature check of firmware updates can be flashed. Then a modified firmware update that typically includes the utilities needed to run apps as root can be installed. For example, thesu binary (such as an open-source one paired with the Superuser[43] or SuperSU application[44]) can be copied to a location in the current process'PATH (e.g.,/system/xbin/) and granted executable permissions with thechmod command. A third-party supervisor application, like Superuser or SuperSU, can then regulate and log elevated permission requests from other applications. Many guides, tutorials, and automatic processes exist for popular Android devices facilitating a fast and easy rooting process.
The process of rooting a device may be simple or complex, and it even may depend upon serendipity. For example, shortly after the release of the HTC Dream (HTC G1), it was discovered that anything typed using the keyboard was being interpreted as a command in a privileged (root) shell. Although Google quickly released a patch to fix this, a signed image of the old firmware leaked, which gave users the ability to downgrade and use the original exploit to gain root access. Installable apps have managed to unlock immediate root access on some early 2010s Samsung smartphones. This has also been referred to as "one-click rooting".[45]
A security researcher, Grant Hernandez, demonstrated a use-after-free exploit in Binder, Android's IPC framework, to gainroot privileges.[46] This exploit, tagged CVE-2019-2215, was alleged to be sold by theNSO Group.[47]
Some manufacturers, includingOnePlus andMotorola, provide official support for unlocking the bootloader, allowing for rooting without exploiting a vulnerability.[48] However, the support may be limited only to certain phones – for example,LG released its bootloader unlock tool only for certain models of its phones.[49] Also, a manufacturer could discontinue bootloader unlocking support, as was the case with LG[50] andHuawei.[51]
TheGoogle Nexus andPixel line of devices can have their bootloader unlocked by simply connecting the device to a computer while in bootloader mode and running theFastboot protocol with the commandfastboot oem unlock on older devices,[52] orfastboot flashing unlock on newer devices.[53] After a warning is accepted, the bootloader is unlocked, so a new system image can be written directly to flash without the need for an exploit. Additionally, Pixel phones sold via certain carriers likeVerizon disallow bootloader unlocking,[54] while others such asT-Mobile require a phone to be paid off and SIM unlocked before the bootloader can be unlocked.[citation needed]
There may be no root exploit available for new, or outdated phones.[55]
Until 2010, tablet and smartphone manufacturers, as well as mobile carriers, were mainly unsupportive of third-party firmware development. Manufacturers had expressed concern about improper functioning of devices running unofficial software[56] and related support costs. Moreover, firmware such asOmniROM andCyanogenMod sometimes offer features for which carriers would otherwise charge a premium, such astethering. Due to that, technical obstacles such as locked bootloaders and restricted access to root permissions have commonly been introduced in many devices. For example, in late December 2011,Barnes & Noble andAmazon.com, Inc. began pushing automatic,over-the-air firmware updates, 1.4.1 toNook Tablets and 6.2.1 to Kindle Fires, that removed one method to gain root access to the devices. The Nook Tablet 1.4.1 update also removed users' ability tosideload apps from sources other than the official Barnes & Noble app store (withoutmodding).[57][58]
However, as community-developed software began to grow popular in the late 2009 to early 2010,[59][60] and following a statement by the Copyright Office and Librarian of Congress (US) allowing the use of "jailbroken" mobile devices,[61][62] manufacturers and carriers have softened their position regarding CyanogenMod and other unofficial firmware distributions. Some manufacturers, including HTC,[63]Samsung,[64]Motorola[65] andSony,[66] actively provide support and encourage development.
In 2011, the need to circumvent hardware restrictions to install unofficial firmware lessened as an increasing number of devices shipped with unlocked or unlockable bootloaders, similar to the Nexus and Pixel series of phones. Device manufacturer HTC has announced that it will support aftermarket software developers by making the bootloaders of all new devices unlockable.[56]
In 2014, Samsung released a security feature calledKnox, which verifies whether system and boot files were modified. If custom firmware was flashed, the eFuse is set to 0x1, permanently voiding the warranty and disabling Knox-enabled features such asSamsung Pay.[67] Additionally, certain Samsung devices lack the ability to flash custom software, namely Samsung phones and tablets released in North America after 2015, with an exception for devices lacking a cellular modem,[68] although there are exploits that can unlock the bootloader on some affected devices running olderOne UI versions.[69]
International treaties have influenced the development of laws affecting rooting. The 1996World Intellectual Property Organization (WIPO) Copyright Treaty requires nations party to the treaties to enact laws againstdigital rights management (DRM) circumvention. The American implementation is theDigital Millennium Copyright Act (DMCA), which includes a process for establishing exemptions for non-copyright-infringing purposes such as rooting. The 2001European Copyright Directive implemented the treaty in Europe, requiring member states of theEuropean Union to implement legal protections for technological protection measures. The Copyright Directive includes exceptions to allow breaking those measures for non-copyright-infringing purposes, such as to run alternative software,[70] but member states vary on the implementation of the directive.
In 2010,Electronic Frontiers Australia said that it is unclear whether rooting is legal in Australia, and that anti-circumvention laws may apply.[71] These laws were strengthened by theCopyright Amendment Act 2006.
In November 2012, Canadaamended its Copyright Act with new provisions prohibiting tampering with digital locks, with exceptions including software interoperability.[72] Rooting a device to run alternative software is a form of circumventing digital locks for the purpose of software interoperability.
There had been several efforts from 2008 to 2011 to amend the Copyright Act (Bill C-60,Bill C-61, andBill C-32) to prohibit tampering with digital locks, along with initial proposals for C-11 that were more restrictive,[73] but those bills were set aside. In 2011,Michael Geist, a Canadian copyright scholar, cited iPhone jailbreaking as a non-copyright-related activity that overly broad Copyright Act amendments could prohibit.[74]
TheFree Software Foundation Europe argues that it is legal to root or flash any device. According to the European Directive 1999/44/EC, replacing the original operating system with another does not void the statutory warranty that covers the hardware of the device for two years unless the seller can prove that the modification caused the defect.[75]
The lawCopyright and Related Rights Regulations 2003 makes circumventing DRM protection measures legal for the purpose of interoperability but not copyright infringement. Rooting may be a form of circumvention covered by that law, but this has not been tested in court.[70][76] Competition laws may also be relevant.[77]
India's copyright law permits circumventing DRM for non-copyright-infringing purposes.[78][79]Indian Parliament introduced a bill including this DRM provision in 2010 and passed it in 2012 as Copyright (Amendment) Bill 2012.[80] India is not a signatory to the WIPO Copyright Treaty that requires laws against DRM circumvention, but being listed on the USSpecial 301 Report "Priority Watch List" applied pressure to develop stricter copyright laws in line with the WIPO treaty.[78][79]
New Zealand's copyright law allows the circumvention of technological protection measure (TPM) as long as the use is for legal, non-copyright-infringing purposes.[81][82] This law was added to theCopyright Act 1994 as part of theCopyright (New Technologies) Amendment Act 2008.
Rooting might be legal in Singapore if done to provide interoperability and not circumvent copyright, but that has not been tested in court.[83]
TheUnlocking Consumer Choice and Wireless Competition Act guarantees that consumers can unlock or let others unlock their phones. Under the Digital Millennium Copyright Act (DMCA) rooting was illegal in the United States except by exemption. TheU.S. Copyright Office granted an exemption to this law "at least through 2015".[84]
In 2010, in response to a request by theElectronic Frontier Foundation, the U.S. Copyright Office explicitly recognized an exemption to the DMCA to permit rooting.[85][86] In their ruling, the Library of Congress affirmed on July 26, 2010, that rooting is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.
On October 28, 2012, the US Copyright Office updated their exemption policies. The rooting of smartphones continues to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset". However, the U.S. Copyright office refused to extend this exemption to tablets, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects.[87][88][89] The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013.[88]
Tim Wu, a professor atColumbia Law School, argued in 2007 that jailbreaking is "legal, ethical, and just plain fun".[90] Wu cited an explicit exemption issued by theLibrary of Congress in 2006 for personal unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA.[91] Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so.[90] In 2010 and 2012, the U.S. Copyright Office approved exemptions to the DMCA that allow users to root their devices legally.[92] It is still possible to employ technical countermeasures to prevent rooting or prevent rooted phones from functioning.[93] It is also unclear whether it is legal to traffic in the tools used to make rooting easy.[93]
/sys/class/power_supply/battery/siop_level is a shorthandsymbolic link to that system file.