The root access on Android is referring to the root user account that is always blocked off by default. Anyone who knows Linux distributions and has set up one of them for the first time will already know all about the root user account because that account is assigned to the first person to set up the computer. Another way people refer to the root user account on Linux is the superuser.
The root user account is essential for Linux operating systems on computers because that is the account that has all of the root privileges over the operating system. The root privileges are referring to the chance to access all files and run all commands. The root user account has the power to modify the system in any way the person in control of the root privileges should desire as well as the ability to grant or revoke other accounts ability to modify, read and execute files and directories that are available on the operating system.
Nobody knows exactly why the Android developers have chosen not to let people set up the Android account as the root user, but it is widely believed to be because of malware disguised as apps. The Google Play Store is a trustworthy place in general, but there are always occasional apps that make it onto the Play Store and can be there for weeks until they are identified and removed. If a root user installs malware from the Play Store, then that malware can move out of its prison that it would’ve otherwise been trapped in if the person using the device was not in control of the root user account. In fairness, the same problem is there on Linux; the root user account should never install malware on a computer for the same reason. However, Android seem to think that either the chances are higher to install malware from the mobile version since most things you can do revolve around installing apps first or because they own the Google Play Store and don’t want to develop a bad name.
Details We Should Know
- Chainfire had the MMB29M.P555SKSU1BPF1 firmware build number on the Samsung Galaxy Tab A SM-P555S when the rooting file available in this guide was a developed. That does not mean you need to be running on the same firmware build number as him when you go to follow this guide and get root access on the tablet. However, you can use it as an indicator if you like.
- If you are flashing the version of the CF-Auto-Root tool in this guide correctly and it causes the device not to boot up afterward, you need to let Chainfire know about it because it probably means that the rooting file needs updating. Before he can do anything, he needs you to post the recovery image file from the firmware that is running on your device to the XDA-Developers web forum on the CF-Auto-Root tool thread and also leave the details of the model number that needs updating.
- You need to have the Samsung Galaxy Tab A tablet that comes with the SM-P555S model number if you are going to use this guide because any of the other model numbers will get bricked if you flash the version of the rooting file found in this guide.
- You need to have a computer that is running on a version of the Windows operating system if you are going to be using this guide because the Odin flashing tool does not run on any of the other operating systems.
Files We Need
- Download the CF-Auto-Root tool for the Samsung Galaxy Tab A SM-P555S tablet running on the Android 6.0.1 Marshmallow software updates.
- Download the Samsung USB Drivers for the computer that is running on a version of the Windows operating system.
Rooting the Samsung Galaxy Tab A SM-P555S tablet running on Android 6.0.1 Marshmallow software updates using Chainfires CF-Auto-Root
- Unlock the Developer Options menu on the Samsung Galaxy Tab A SM-P555S tablet so you can use the options that then become available to developers.
- Enable the USB Debugging Mode on the Samsung Galaxy Tab A SM-P555S tablet so the Android operating system that is running on your tablet allows for you to make the changes that are required for the rooting to work.
- Extract the CF-Auto-Root tool to the Downloads folder on the computer so you can see the rooting file that can be flashed and the Odin flashing too land run the Odin flashing tool executable file so that the flashing tool user interface opens on the computer.
- Install the Samsung USB Drivers on the computer so that the Samsung tablet can be identified by the flashing tool when you connect it to the computer with the USB cable.
- Boot the Samsung Galaxy Tab A SM-P555S tablet into the Download Mode that it comes with and then connect it to the computer with the USB cable that is used for charging the battery.
- Run the Odin flashing tool application from the Downloads folder and then check that it gives an added message and color coming from the ID: COM port.
- Do not make any changes from the default settings you get available to change from the Odin Options tab that is next to the log or else you might accidentally lose some data.
- Click on the AP button from the Odin user interface and then navigate to the Downloads folder where you extracted the rooting file in the beginning and then select the rooting file so that it uploads to the Odin application and is ready to flash.
- Click on the Start button for the rooting of the Samsung Galaxy Tab A SM-P555S to begin and then read all of the information that starts rolling dow the display of the tablet programmed by Chainfire to let you know that is happening.
- Wait until the tablet’s screen says that it is going to reboot in ten seconds and then wait until you get the pass message coming from the Odin user interface before unplugging from the computer.
In conclusion, that is how to root the Samsung Galaxy Tab A SM-P555S tablet running on the Android 6.0.1 Marshmallow software updates by flashing the CF-Auto-Root tool by Chainfire. The one-click rooting tool that Chainfire calls CF-Auto-Root has just finished installing the SuperSU on the tablet, and it is enabled and ready to start granting the root permissions to nay of the apps that request it. You can start installing the root apps that you wanted to try right away.
The SuperSU keeps your device completely safe all of the time until it hands the responsibility over to you when an app you have downloaded request the rooting permissions. Instead of the SuperSU automatically allowing everything root access it prompts you with a message letting you know what applications is asking to get the root access and then you need to be consciously aware of the root apps that you are granting the rooting permissions to because the SuperSU does do not try to detect the malware and give you a warning of what not to let through. While that sounds daunting to some, the reality is that everybody who knows apps already knows if they are downloading a trusted app or not just by looking at it, so there is no reason not be installing malware. However, the good news is that if you do install malware by accident the SuperSU blocks it automatically and then you just need to deny granting it root access when the pop up message comes up on the device’s display and then delete the app you wish that you hadn’t of installed on the device.