Related
Okay I posted this also in the Themes forum for Nexus but I wanted to see if anyone could assist. Someone in the theme forum asked about the bootanimation.zip that shows us the cool animation during boot, while reading this it reminded me of the behold 2. See below
What are the permissions for bootanimation.zip if they were left open to non root then this may-b a way to get root with unlocking the bootloader. This would be the same approach that was used to root the behold 2 where the "try3" file was renamed to play_logo . play_logo then was used to root and after root was opened it would make play_logo_real play which was the boot animation. I may be wrong but couldnt this be a possibility. Thanks, any help is appreciated. Im wondering if Zinx could chime in...
How are you going to write to the bootanimation.zip without root? Further, do you intend to replace the recovery or update custom roms? I am just trying to figure out the purpose of root and flashing other customized images.
seraph1024 said:
How are you going to write to the bootanimation.zip without root? Further, do you intend to replace the recovery or update custom roms? I am just trying to figure out the purpose of root and flashing other customized images.
Click to expand...
Click to collapse
You can always write if I am not mistaken using the low-level write dd if/of command. We would use the bootanimation.zip to run the root command. An example is in the Samsung Behold 2 it was done as follows:
Example
echo "#!/system/bin/sh
/data/local/try3 /system/bin/sh
mount -o rw,remount /dev/st9 /system
cat /system/bin/sh > /system/bin/su
chmod 04755 /system/bin/su
/system/bin/playlogo_real" > /system/bin/playlogo
Click to expand...
Click to collapse
This is how it was done. I am wondering if the same can be done on the nexus using bootanimation.zip as it executed at startup. We would basically modify the bootanimation.zip to the above and add a line for it to execute the boot image. By gaining root this way we would still be able to put on a custom recovery and roms without unlocking the bootloader in theroy. The try3 file was created by Zinx and used by Maxisma to bring root to the behold 2. I am pretty sure this may work on the Nexus 1. I hope this helps.
Ok. I don't have a locked phone that I can play with at the moment. I'll make up a package for you tomorrow. Can you test it for me?
seraph1024 said:
Ok. I don't have a locked phone that I can play with at the moment. I'll make up a package for you tomorrow. Can you test it for me?
Click to expand...
Click to collapse
Okay XDA is back up. Yes I can test. Oh man if this works there will be absolutely no need to unlock the boot loader... Thanks
seraph1024 said:
Ok. I don't have a locked phone that I can play with at the moment. I'll make up a package for you tomorrow. Can you test it for me?
Click to expand...
Click to collapse
Hey Seraph1024 take a look at this. Its too big for XDA so I put it up on pastebin. http://pastebin.com/f62780d32 Its what is contained in the try3 file. Zinx used it in flashrec
No joy.
Code:
$ getprop | grep product.model
[ro.product.model]: [Nexus One]
$ pwd
/data/local
$ ls -al try3
-rwxrwxrwx 1 0 0 74512 Jan 25 13:26 try3
$ id
uid=2000(shell) gid=2000(shell)
$ ./try3 /system/bin/sh
[1] Killed ./try3 /system/bin/sh
$ id
uid=2000(shell) gid=2000(shell)
Exploit does not work.
I was that close to rooting today until i saw this now its made me double think again lol I've been waitin for a custom rom by cyanogen until i rooted, and since its pretty much almost here i was going to root. bah guess i'll wait until CM gets released!
flak0 said:
You can always write if I am not mistaken using the low-level write dd if/of command.
Click to expand...
Click to collapse
You can't on this phone. There are two ARM cores - one running the low-level stuff (bootloader, radio) and the other running Linux.
Without the engineering bootloader (or some exploit) we don't have access to the baseband ARM core, and therefore don't have access to its MMU, which is programmed to deny read/write access to protected areas of the flash - such as the bootloader and splash screens. Even with root, Linux can't access that stuff.
It's going to be really hard to find a kernel exploit for the N1 to get root. Most exploits involve mapping memory to the zero page and then triggering a null pointer de-reference bug in the kernel. But the N1's kernel won't allow such mappings.... I believe the minimum address for mmap on the N1 is around 64k. (It's in the kernel config.)
This is a tough nut to crack.
The behold root was done that way because there's no way to flash the partitons on it.
You still need root in the first place to write to that file. The droid guys have been looking a while for a new root exploit but didnt find one. The problem is that all known exploits have been closed in 2.1.
We need to wait for someone to find a new one that works. Then this would be a real posibility, and there' no need to hijack playlogo.
for what its worth, if you need a lab rat i do not have my phone rooted yet and i am willing to test some things if anyone needs...
i dont plan on rooting it until the ball really gets rolling with everything and until I am 100% satisified with the phones performance
kam187 said:
You still need root in the first place to write to that file.
Click to expand...
Click to collapse
That's what I though. And like it was posted earlier, I don't think there is a exploit since this phone is done differently. I am busy for the next couple of days but if anyone want to "try", I'll make up something but I really doubt any of the old stuff will work on this phone.
Here's a new method that was exploited for the Droid 3. I tried it and it works for the Photon as well.
Instructions:
Log in to the device using “adb shell” and type the following commands:
Code:
mv /data/local/12m /data/local/12m.bak
ln -s /data /data/local/12m
Next, physically reboot the device by pressing the power button. When it wakes up, log in using “adb shell” again, and type the following:
Code:
rm /data/local/12m
mv /data/local/12m.bak /data/local/12m
mv /data/local.prop /data/local.prop.bak
echo "ro.sys.atvc_allow_netmon_usb=0" > /data/local.prop
echo "ro.sys.atvc_allow_netmon_ih=0" >> /data/local.prop
echo "ro.sys.atvc_allow_res_core=0" >> /data/local.prop
echo "ro.sys.atvc_allow_res_panic=0" >> /data/local.prop
echo "ro.sys.atvc_allow_all_adb=1" >> /data/local.prop
echo "ro.sys.atvc_allow_all_core=0" >> /data/local.prop
echo "ro.sys.atvc_allow_efem=0" >> /data/local.prop
echo "ro.sys.atvc_allow_bp_log=0" >> /data/local.prop
echo "ro.sys.atvc_allow_ap_mot_log=0" >> /data/local.prop
echo "ro.sys.atvc_allow_gki_log=0" >> /data/local.prop
Reboot the device one final time, and on logging in with “adb shell”, you should be presented with a root prompt. Enjoy!
Now that we have shell root, we can complete the rooting by issuing the following commands:
Code:
adb remount
adb push busybox /system/xbin/busybox
adb push su /system/xbin/su
adb push Superuser.apk /system/app/Superuser.apk
adb shell chmod 4755 /system/xbin/su
adb shell chmod 755 /system/xbin/busybox
adb shell chown system.system /data
Original article here: Droid 3 Shell Root
There's a one-click method but it was giving me errors on my machine...
One-click files here: One-click Root Files
Thanks!
dangit i was in teh irc testing this with a hybrid of my ocr was hoping to spring it on people
all set, got new ocr working, cleaning up code and will release confirmed to work
Good to hear!
The original One-click root they posted for this was giving me all sorts of adb errors on Windows...
BTW, you wouldn't happen to have busybox 1.19.0 would you?
shabbypenguin said:
all set, got new ocr working, cleaning up code and will release confirmed to work
Click to expand...
Click to collapse
i do, but im lazy the version in there is more then enough to get people started and going for just root
I'm give this a shot when I get home in. the morning.
Sent from my MB855 using xda premium
Haha! Roger that. I 'm too lazy to compile it too...
Anyway, back on topic...
shabbypenguin said:
i do, but im lazy the version in there is more then enough to get people started and going for just root
Click to expand...
Click to collapse
newalker91 said:
This seems like it will offer more functionality as a root instead of using nvidia exploits. Tempted to flash back to CM5 and re-root using this to see the difference.
Click to expand...
Click to collapse
What do you mean by this? Why would it matter how we aquire root? Is there benefits to rooting another way?
Sent from my MB855 using xda premium
I guess what he's trying to say is that via this new root method, no files have to be transferred onto the phone that could potentially cause problems in the future.
It's a matter of what you're comfortable doing to your device...
Djspinister said:
What do you mean by this? Why would it matter how we aquire root? Is there benefits to rooting another way?
Sent from my MB855 using xda premium
Click to expand...
Click to collapse
Beach_Head said:
I guess what he's trying to say is that via this new root method, no files have to be transferred onto the phone that could potentially cause problems in the future.
It's a matter of what you're comfortable doing to your device...
Click to expand...
Click to collapse
I see, that makes sense, thanks!
-DJ
this would be great if it works on the photon.
can anyone else confirm this working?
dtr145r said:
this would be great if it works on the photon.
can anyone else confirm this working?
Click to expand...
Click to collapse
Go to shabbys auto root thread
Sent from my MB855 using XDA App
How is this method versus the autoroot method?
And do you need a "dock" for this *** or do we enter everything manually from the phone's keyboard instead?
Would like to hear how this holds up - thank you
amlodipine said:
How is this method versus the autoroot method?
And do you need a "dock" for this *** or do we enter everything manually from the phone's keyboard instead?
Would like to hear how this holds up - thank you
Click to expand...
Click to collapse
No dock needed, just enable USB debugging and use adb.
Does this method bork 4G like some other methods do?
ronnienyc said:
Does this method bork 4G like some other methods do?
Click to expand...
Click to collapse
your confusing root and unlock. root never borked 4g.
OK, but you need to unlock before rooting? or root before the unlock?
Either way I am not interested in any of this if my 4G stops working.
Thanks.
no, you can just enable usb debugging, install the drivers if you havent already. run my script.. tada
Confirmed working on PHOTON
I did the one click method in the first post and it worked perfectely.
Used one click and I appear to be rooted now. Thanks.
I have your ICS root ready, how about we call it TPSparkyRoot. I based my research on code written by Dan Rosenberg (similar to what jchase did with NachoRoot in the fact that chown/chmod follows symlinks even when set during startup), here is a link to that research http://vulnfactory.org/blog/2011/08/25/rooting-the-droid-3/
**UPDATE**
Android's source has been patched so that future OEMs can not leave this hole open by accident.
https://android-review.googlesource.com/#/c/36035/
**UPDATE**
This method has been shown to work on the HTC One X see forum
http://forum.xda-developers.com/showthread.php?t=1644167
Theoretically this should work on Honeycomb versions of the Prime as well, since the Honeycomb update is where I found the flaw that is being exploited. I have confirmed this works on my Prime.
**UPDATE**
This exploit does not currently work for the latest ICS update released (v9.4.2.11 on 1/18/2012). You can use OTA Rootkeeper to backup your root prior to updating using OTA, which I have confirmed to work on my device, (this may not work if you push the update manually).
https://market.android.com/details?id=org.projectvoodoo.otarootkeeper
For the devs out there, it does not to honor the ro.kernel.qemu=1 setting within the local.prop because it is already set to blank by that point by the build.prop
You must have your Prime set up to use adb and your adb location contained in your path variable (windows) or unzip the files from my zip into that directory before running.
**UPDATED**
If you are have issues getting adb working, make sure asus sync is not running, if it is then kill it.
adb shell mv /data/local/tmp /data/local/tmp.bak
adb shell ln -s /data /data/local/tmp
adb reboot
adb shell rm /data/local.prop > nul
adb shell "echo \"ro.kernel.qemu=1\" > /data/local.prop"
adb reboot
adb shell id
//IF ID IS 0/root THEN CONTINUE, ELSE START OVER>
adb remount
adb push su /system/xbin/su
adb shell chown 0.0 /system/xbin/su
adb shell chmod 06755 /system/xbin/su
//UNDO EVERYTHING EXCEPT su
adb shell rm /data/local.prop
adb shell rm /data/local/tmp
adb shell mv /data/local/tmp.bak /data/local/tmp
adb reboot
**UPDATE** As jchase stated "If your device "bootloops" don't stress, just follow through with the commands as it "loops" ro.kernel.qemu can do funky stuff." I did notice this in my rooting but just assumed it was normal as this is my first use of adb.
**UPDATE2**
If you get a permissions error on the call
adb shell "echo \"ro.kernel.qemu=1\" > /data/local.prop"
then you may try
adb shell rm /data/local.prop
And then try the echo command again. This may be due to having rooted prior without cleaning up properly. Thanks to Franky_402 for this piece of info.
I have updated the batch file to include this step, it should still be fine for those who are not having the issue as well.
I have attached a zip file containing the su and a bat file for a more automated process (just pauses when during reboots, don’t hit go until it’s done rebooting). Or, you can run the commands manually and get the su file from the origin http://downloads.androidsu.com/superuser/su-bin-3.0.3.2-efghi-signed.zip
Finally, install Superuser to make it all work https://market.android.com/details?id=com.noshufou.android.su
**UPDATE** UNROOT
There are multiple was to unroot now that you have root access already (all you need to do is remove the su file; so you could potential skip all the steps before the remount and just add the local.prop manually using a file manager and then reboot).
The one most similar way to how you rooted would be to follow all of the steps above, but replace these 3 lines
adb push su /system/xbin/su
adb shell chown 0.0 /system/xbin/su
adb shell chmod 06755 /system/xbin/su
with this line
adb shell rm /system/xbin/su
This will remove the actual root, but it would leave behind any apps that you have given root access to or any files that those apps changed themselves (i.e. RootKeeper backs up the su file and the backup would need to be removed). If you had anything like this you would need to clean up that first before unrooting because it is a dead giveaway that it was rooted.
Viperboy should be releasing his tool shortly that utilizes this method, if you would like a one click process that installs apps along with it (superuser, busybox). I’m guessing it installed them to the root apps directory so these also would need to be removed when unrooting as well (i.e. if you root using his new tool you should unroot using it as well).
**UPDATED** Remove PayPal link in favor of link over there <-
Yes, as it says, I went from the same base exploit that was shown by Dan and was the base for jchase as well.
The commands more than likely are but the exploit must be different or Jcases rot would still be working... Thanks OP!!!
EDIT: He didn't "ask" for donations just gave a link since he doesn't have the donate button <<over there
Not mine at all, props to this guy! Send him some bones.
Yes, thanks, I did not realize that there was a donate button as I am still learning this forum.
This root is confirmed!
If your device "bootloops" don't stress, just follow through with the commands as it "loops" ro.kernel.qemu can do funky stuff.
Good ****.
sparkym3 said:
Yes, thanks, I did not realize that there was a donate button as I am still learning this forum.
Click to expand...
Click to collapse
Yeah it's in the User Control Panel on the top of the forum
"Reported" your thread to a mod, so he can move it to the dev section
And welcome to XDA Don't let the trolls take your love for android
jcase said:
This root is confirmed!
If your device "bootloops" don't stress, just follow through with the commands as it "loops" ro.kernel.qemu can do funky stuff.
Good ****.
Click to expand...
Click to collapse
OP, maybe put that in the OP, so users don't panic
Moved to development.
Holly smoke, it works....
jcase said:
Not mine at all, props to this guy! Send him some bones.
Click to expand...
Click to collapse
As the main man says. Give credit when due. It's not his. and give the guy props and if you wish to donate donate.
This is why this android community is crap. because everyone trolls. If it was jcases he'd release it. not someone else. and im sure as hell he wouldnt be saying these things 'like give the guy some bones'
rhcp0112345 said:
As the main man says. Give credit when due. It's not his. and give the guy props and if you wish to donate donate.
This is why this android community is crap. because everyone trolls. If it was jcases he'd release it. not someone else. and im sure as hell he wouldnt be saying these things 'like give the guy some bones'
Click to expand...
Click to collapse
Biggem isnt really a troll, he's obv just got out of the wrong side of the bed ... i'm sure he'll take that back.
Danny-B- said:
Biggem isnt really a troll, he's obv just got out of the wrong side of the bed ... i'm sure he'll take that back.
Click to expand...
Click to collapse
Also nothing wrong with asking for donations.
YOU ROCK. donations to you and jcase after payday
You would all post this WHILE I'm at work, have my prime with me, but not my charger! lol. I'll DEFINITELY check it out when I get home.
disturb3d1 said:
You would all post this WHILE I'm at work, have my prime with me, but not my charger! lol. I'll DEFINITELY check it out when I get home.
Click to expand...
Click to collapse
Dude mine should be here in 9 hrs
I might do an unboxing vid using my photon
Wait a minute, chainfire is paying attention to the thread, that only means good things. Please tell me your gonna dev some for this device
Sent from my SGH-T959 using XDA App
not going good for me I'm on ubuntu with working adb. copied su to home directory and running all commands from there. when i get to, adb shell "echo \"ro.kernel.qemu=1\" > /data/local.prop", i get, /system/bin/sh: cannot create /data/local.prop: Permission denied. So i never get the right id to continue. Anyways please help. thankx
Any chance in the future this can be converted to an apk to install on Prime or a One-click method, per se?
[ROOT][ICS] Root Razr ICS 4.0.3 and 4.0.4 [NEW]
[UPDATED] Jun 14 2012
Tested on my Razr xt910 no errors...
This method run in CDMA and GSM Razr...
This method run in all versions ICS 4.0.4 for Razr
This method run in all versions ICS BRAZIL and ICS Leaks
This method run in all versions ICS CHINA / 4.0.3 and 4.0.4
Credit to Rick#2 for this great post and Exploit
Credit to miloj for this new technique
Only Run the script and wait end process
Remenber this method has been fully tested on my Razr and i succeeded
[REQUIREMENTS]
Check if your USB computer connection is "Mass Storage".
It shouldn't be. Change it to "media device".
Check if your configuration of android is set to "debug mode".
[AUTOMATIC]
1. Download exploits or scripts
2. Unpack files on any folder
3. Install motorola drivers
4. Connect your Razr with USB cable
5. Check if your configuration of android is set to "debug mode".
6. Check your Usb connection and change to "media device"
7. Run the exploit in the bottom of the page
[ROOT] Your Razr
[SCRIPT] Fully tested and only run in prompt and wait process
http://www.mediafire.com/download.php?p1dks81hu3dtiw7
http://www.4shared.com/rar/iqgref86/ROOT.html
[POST ORIGINAL]
http://forum.xda-developers.com/showthread.php?t=1707431
I'm here to help people around the world
is not what you do that makes you extraordinary
but it is the way that we give that says who we are
it can not be measured with thanks or views
Jesus is the Lord
About this Root method - Thank You XDA for this page
http://www.xda-developers.com/androi...razr/#comments
About this Root method - Thank You Droid Life for this page
http://www.droid-life.com/2012/06/14...icial-release/
hacker812c said:
[ROOT][ICS] Root Razr ICS 4.0.3 and 4.0.4 [NEW] [UPDATED] Jun 14 2012
Tested on my Razr xt910 no errors...
This method run in CDMA and GSM Razr...
This method run in all versions ICS 4.0.4 for Razr
This method run in all versions ICS BRAZIL and ICS Leaks
This method run in all versions ICS CHINA / 4.0.3 and 4.0.4
Only Run the script and wait end process
Remenber this method has been fully tested on my Razr and i succeeded
[SCRIPT] Fully tested and only run in prompt and wait process
http://www.mediafire.com/download.php?p1dks81hu3dtiw7
http://www.4shared.com/rar/iqgref86/ROOT.html
[POST ORIGINAL]
http://forum.xda-developers.com/showthread.php?t=1707431
Click to expand...
Click to collapse
Fantastic ... sinceraly ... excelent...thanks...
It doesnt seem to be working on my racr maxx says it is unable to see super user etc
mgault said:
It doesnt seem to be working on my racr maxx says it is unable to see super user etc
Click to expand...
Click to collapse
simply the best... thanks
in first test i rooted... thanks thanks thanks...
kelcastro said:
simply the best... thanks
in first test i rooted... thanks thanks thanks...
Click to expand...
Click to collapse
thanks
Check this out http://forum.xda-developers.com/showthread.php?t=1710871
it works, and it's here...
no complaints. THANKS
Do I need to switch my Rogers rom for the Brazil one, or can this be done with the one I already have?
Skeleton73 said:
Do I need to switch my Rogers rom for the Brazil one, or can this be done with the one I already have?
Click to expand...
Click to collapse
any version run perfect
Thanks
farhanito said:
it works, and it's here...
no complaints. THANKS
Click to expand...
Click to collapse
Thanks for reply
Thanks for participate this post...
hacker812c said:
Thanks for reply
Thanks for participate this post...
Click to expand...
Click to collapse
my root is perfect.
kelcastro said:
my root is perfect.
Click to expand...
Click to collapse
thank you for reply this post...
farhanito said:
it works, and it's here...
no complaints. THANKS
Click to expand...
Click to collapse
its two methods... manually and script...
hacker812c said:
its two methods... manually and script...
Click to expand...
Click to collapse
as i said.. no complaint
your script works fine on EN.EU leak
just remember to install superuser app from the playstore
thanks again
farhanito said:
as i said.. no complaint
your script works fine on EN.EU leak
just remember to install superuser app from the playstore
thanks again
Click to expand...
Click to collapse
Farhanito thanks my big friend...
[UnROOT] You need? Manually Method
@UnRoot For Droid Razr ICS
@echo off
adb start-server
adb remount
adb shell chmod 0777 /system/xbin/su
adb shell chmod 0777 /system/bin/su
adb shell chmod 0777 /system/app/Superuser.apk
adb shell chmod 0777 /system/xbin/busybox
adb shell rm -r /system/app/Superuser.apk
adb shell rm -r /system/xbin/su
adb shell rm -r /system/bin/su
adb shell rm -r /system/xbin/busybox
adb reboot
exit
I'm here to help people around the world
is not what you do that makes you extraordinary
but it is the way that we give that says who we are
it can not be measured with thanks or views
Jesus is the Lord
About this Root method - Thank You XDA for this page
http://www.xda-developers.com/android/root-achieved-for-ics-on-gsm-and-cdma-moto-razr/#comments
About this Root method - Thank You Droid Life for this page
http://www.droid-life.com/2012/06/14/razr-ice-cream-sandwich-builds-rooted-before-official-release/
So I bricked my Kinde Fire HDX by changing the build.prop and not fixing permissions. I have adb access but no root (I don't know why :S). Would a factory reset work? If not, how can I get to fix the build.prop or replace it with the old one? thank very much, I've been a couple hours looking for solution but I couldn't find any.
No, a factory reset would only break it further. It would remove your adb access and not fix anything. What makes you think you lost root? Have you tried "adb shell" then "su"?
Sent from my Amazon Tate using Tapatalk
r3pwn said:
No, a factory reset would only break it further. It would remove your adb access and not fix anything. What makes you think you lost root? Have you tried "adb shell" then "su"?
Sent from my Amazon Tate using Tapatalk
Click to expand...
Click to collapse
I used the HDX ToolKit v0.92 to check the root access, and it said "Please grant root on your device"
I've also tried "adb shell", and then "su", but it just returns "su" again. I am new with adb commands so I don't really know what it should show.
Thank you very much for your help
May I ask what version you were on before you bricked?
Sent from my Amazon Tate using Tapatalk
14.3.2.3.2, last update I think.
?
peter_b93 said:
14.3.2.3.2, last update I think.
Click to expand...
Click to collapse
Fixed?
jimyv said:
Fixed?
Click to expand...
Click to collapse
Nope, I couldn't find any way to get root acces again. But nevermind, my new kindle fire will be here in two days. I am surprised how well amazon costumer service works. Even though I bought my kindle in the US and now I am in Spain (not going back), they called me from the US for free, and they are paying all the shipping costs and sending it by priority shipping.
I am still interested if anyone knows how to fix it, just for fun
well
peter_b93 said:
Nope, I couldn't find any way to get root acces again. But nevermind, my new kindle fire will be here in two days. I am surprised how well amazon costumer service works. Even though I bought my kindle in the US and now I am in Spain (not going back), they called me from the US for free, and they are paying all the shipping costs and sending it by priority shipping.
I am still interested if anyone knows how to fix it, just for fun
Click to expand...
Click to collapse
It sounds like to me that you still root access you just were not mounted RW in other words it would not boot up completely so you could hit allow to the adb Shell. So you will have to mount system rw manually Try last 3 pages of this thread http://forum.xda-developers.com/showthread.php?t=2588608. He can fix you most likely if you can comprehend and follow directions.. or if ur understanding adb is fair you'll be able to probably extract your repair from the thread as is.
jimyv said:
It sounds like to me that you still root access you just were not mounted RW in other words it would not boot up completely so you could hit allow to the adb Shell. So you will have to mount system rw manually Try last 3 pages of this thread http://forum.xda-developers.com/showthread.php?t=2588608. He can fix you most likely if you can comprehend and follow directions.. or if ur understanding adb is fair you'll be able to probably extract your repair from the thread as is.
Click to expand...
Click to collapse
I've tried what it is said in the other thread. However, the problem there is that the guy cannot get his device to be recognized.
I've tried this:
adb root
adb shell
su
mount -o rw,remount /system *****- if this fails, try: mount -o remount /system
chmod 644 /system/build.prop
chown root.root /system/build.prop
reboot
But adb root gives me this error:
adbd cannot run as root in production builds
On the other hand if I skip the "adb root" step I cannot go further than "su" since I don't get the "[email protected]:/ #" line.
well
peter_b93 said:
I've tried what it is said in the other thread. However, the problem there is that the guy cannot get his device to be recognized.
I've tried this:
adb root
adb shell
su
mount -o rw,remount /system *****- if this fails, try: mount -o remount /system
chmod 644 /system/build.prop
chown root.root /system/build.prop
reboot
But adb root gives me this error:
adbd cannot run as root in production builds
On the other hand if I skip the "adb root" step I cannot go further than "su" since I don't get the "[email protected]:/ #" line.
Click to expand...
Click to collapse
Well since you do have ADB connectivity why can't you hook a bruting utility and push root ? Romaster_3.4.3.7593_Setup use as describe back in the roll back thread and the rooting thread 4 the new yes I kno wat is in chinese but this is the 1 that you must use sent you cannot install the apk install software plugin your tablet look at the upper right corner you will see an gear icon tap that then second row down second icon over "root"
jimyv said:
Well since you do have ADB connectivity why can't you hook a bruting utility and push root ? Romaster_3.4.3.7593_Setup use as describe back in the roll back thread and the rooting thread 4 the new yes I kno wat is in chinese but this is the 1 that you must use sent you cannot install the apk install software plugin your tablet look at the upper right corner you will see an gear icon tap that then second row down second icon over "root"
Click to expand...
Click to collapse
FIXED!!!!!
The chinese software worked! Thank you very much! As I first rooted with towelroot I wasn't aware that it was possible to root without booting into android! I think I won't edit the build.prop again lol.
peter_b93 said:
FIXED!!!!!
The chinese software worked! Thank you very much! As I first rooted with towelroot I wasn't aware that it was possible to root without booting into android! I think I won't edit the build.prop again lol.
Click to expand...
Click to collapse
Ok now use this http://forum.xda-developers.com/showthread.php?t=2532818 and uninstall romanager from pc...and reboot... And BTW modifying your build prop is alot easier useing build prop editing app. It takes care of permissions anyway as long as you entrys are correct..
jimyv said:
Ok now use this http://forum.xda-developers.com/showthread.php?t=2532818 and uninstall romanager from pc...and reboot... And BTW modifying your build prop is alot easier useing build prop editing app. It takes care of permissions anyway as long as you entrys are correct..
Click to expand...
Click to collapse
Good call on RomMaster. I have no idea what it is doing since I haven't had any time to look at it, but I'd figured it was an app like TR. At any rate, nicely done. :good:
sweet
GSLEON3 said:
Good call on RomMaster. I have no idea what it is doing since I haven't had any time to look at it, but I'd figured it was an app like TR. At any rate, nicely done. :good:
Click to expand...
Click to collapse
I'm not sure either that's why when I used it I was on a blacklisted unit and I kept the PC and the tablet and airplane mode at all times. Until I was certain I got all the files off of both before I let them go to Wi-Fi Chinese files that is.. But one thing I was very curious about is if you open that tool up the Chinese tool that is an you go to the same page you would hit the anchor to root to your device just below that it says fastboot I'm wondering if they have a fastboot working for also too bad nobody here know Chinese..