Since the final version of the Android 5.0 Lollipop has been announced last Friday many developers are already busy in finding the weak spots in this latest version of the Android. The main teams like Chainfire and others are working their best to overlap the strict measures taken by developers at Google with the most promising enforcement of the SELinux. The main pundits at Rooting factories seems ineffective as they have used all their standard methods to initialize the SuperSU tool at the boot time of any Android device. This latest version of Android, The Android 5.o L Root seems to be more proactive then the ones released earlier.
The main known sources Chainfire updated the root with the Custom kernels for the Nexus 7, Nexus 5 but the main features of the SuperSU could not boot up properly. He stated in his Google+ page post that that it may be possible to automatically patch kernels as part of the installation process, so many devices may not require custom support, but he’s still working on this method. However, while flashing a modified kernel usually isn’t a deal breaker on any device with an unlocakable bootloader (e.g. a Nexus), it may not be possible to root handsets coming from carriers that don’t permit unlocking without some difficult hacks.
He further added that some more by saying, ” Unsurprisingly, with a new major Android release, apps will need updates. None more so than apps that go beyond the Android API, as root apps do, but even some non-root apps will be affected by the security changes.”
We hope that the Android rooting team tackles the issue well. You can read further details on Chainfire’s Google + Page. He has written each and every thing in detail.