This 'tutorial' is a quicky for those yet to figure this fone out.
Well it took a bit time for sure, but this is how it went...
No matter what recovery or magisk I tried, nothing worked, all ulefone images with twrp were 64mb in size, where-as mine was 32mb. Betting the 64mb is a/b partioned like the old ambit 250 modems, where half the non-vol was the first boot, the second half a clone of the first half.
No file for the mt6765 worked. In other words, no twrp. instant bootloop every time.
But then I found the ulefone note9 mt6762 recovery, flashed it, booted into recovery, and had root!
Until I rebooted at least. There was no access to the actual fone system however, for in recovery, system, or / has not been mounted, and if it was, it cold not be written to..
Then I had an idea. I tested the root.img from android kitchen by flashing just that direct to the recovery of the fone, and it not only stuck, I could switch off fone, reboot, and what I call an overlaid file system with root presented itself, and before I knew it I had a fake root that worked.
The problem with this fone is that it actually uses mt6762 for booting, booting into mt6765 style, vice versa does not work. The note9 is a 6762 chipset. 32mb in size.
The root.img from android kitchen, flashed to recovery gives the head start, having magisk installed, but sadley, twrp did not show in recovery using the note9 recovery that has a working twrp, and the android kitchen root.img shows no twrp, being magisk'd!
Unlocked bootloader required.
Boot into fastboot.
fastboot flash vbmeta vblankmeta.img
fastboot flash recovery root.img
boot fone, install magisk manager, superuser and busybox apk's, then root checker pro, test and see, by rebooting, it should keep root if you set su to boot via busybox, AND superuser.
Now if someone wants to make this for this actual fone, with the correct file versions for this fone, I'll post my latest stock recovery, along with the files I used. All files as far as I know came from here, I have done nothing to them.
The actual Files are: Armor x5 Android 10_Q root.zip is actually a 7z file renamed to zip to upload here, i use 7z, and dont install winzip, and the password for both is Re-Kr8, used in order to prevent google tampering.
The zip contains vblankmeta.img and root.img taken from android kitchen, hope they dont mind auld folks like me helping this way...
The origional is recovery from unrooted fone taken from stock firmware, android 10 Q for ulefone armor x5.
Have a nice day.
And I found this somewhere so will leave it here for those who want true root on the ulefone device, I'm too sore with slow paralysis to keep working at this...
Android Q system_app writes persist.sys by default. The system property SEliux permission
When debugging Settings.apk by myself.
It was discovered that as a platform system signature application, there was no permission to sign a custom persist.st_nfc_debug system property.
It can be modified to the name beginning with persist.sys.
Although in the end, I said:
persist.st_nfc_debug ubject_r:system_prop:s0
Get it done.
why is that?
This step by step tracks SeLinux permission protection in Android.
The same is because the system authorizes persist.sys. by default and classifies it into system_prop.
alps/system/sepolicy/private/property_contexts
persist.log.tag ubject_r:log_tag_prop:s0
persist.mmc. ubject_r:mmc_prop:s0
persist.netd.stable_secret ubject_r:netd_stable_secret_prop:s0
persist.sys. ubject_r:system_prop:s0
persist.sys.safemode ubject_r:safemode_prop:s0
persist.sys.fflag.override.settings_dynamic_system ubject_r:dynamic_system_prop:s0
So where is system_prop defined?
It belongs to property_type and core_property_type.
alps/system/sepolicy/public/property.te
79 type shell_prop, property_type, core_property_type;
80 type system_boot_reason_prop, property_type;
81 type system_prop, property_type, core_property_type;
82 type system_radio_prop, property_type, core_property_type;
83 type system_trace_prop, property_type;
84 type test_boot_reason_prop, property_type;
Authorization, the last line below, set_prop(system_app, system_prop).
alps/system/sepolicy/private/system_app.te
7 typeattribute system_app coredomain;
8
9 app_domain(system_app)
10 net_domain(system_app)
11 binder_service(system_app)
12
13 # android.ui and system.ui
14 allow system_app rootfs:dir getattr;
15
16 # Read and write /data/data subdirectory.
17 allow system_app system_app_data_file:dir create_dir_perms;
18 allow system_app system_app_data_file:{ file lnk_file } create_file_perms;
33 # Write to properties
34 set_prop(system_app, bluetooth_a2dp_offload_prop)
35 set_prop(system_app, bluetooth_audio_hal_prop)
36 set_prop(system_app, bluetooth_prop)
37 set_prop(system_app, debug_prop)
38 set_prop(system_app, system_prop)
So where is this set_prop sacred?
alps/system/sepolicy/public/te_macros
305 #####################################
306 # set_prop(sourcedomain, targetproperty)
307 # Allows source domain to set the
308 # targetproperty.
309 #
310 define(`set_prop', `
311 unix_socket_connect($1, property, init)
312 allow $1 $2roperty_service set;
313 get_prop($1, $2)
314 ')
315
316 #####################################
317 # get_prop(sourcedomain, targetproperty)
318 # Allows source domain to read the
319 # targetproperty.
320 #
321 define(`get_prop', `
322 allow $1 $2:file { getattr open read map };
323 ')
It is a general method of declaration.
So according to this meaning, you can piece together the following permission statement:
allow system_app system_proproperty_service set;
Use the real phone to enter the mobile phone directory to find and verify is the king:
5032E:/system/etc/selinux # grep -rni "allow system_app system_prop".
./Plat_sepolicy.cil:19108allow system_app system_prop (property_service (set)))
./plat_sepolicy.cil:19109allow system_app system_prop ( file (read getattr map open)))
5032E:/system/etc/selinux #
summary:
Just because the Android compilation system has assigned relevant permissions by default, it can be used directly, and custom ones require additional authorization.
Additional tips:
Before adding the compilation in the alps project, the .te file will be compiled and imported into the cil file.
Android Q currently has cil files:
./vendor/etc/selinux/vendor_sepolicy.cil
./vendor/etc/selinux/plat_pub_versioned.cil
./system/etc/selinux/mapping/27.0.cil
./system/etc/selinux/mapping/29.0.cil
./system/etc/selinux/mapping/26.0.cil
./system/etc/selinux/mapping/28.0.cil
./system/etc/selinux/plat_sepolicy.cil
The property_contexts file will be imported into the plat_property_contexts file.
./system/etc/selinux/plat_property_contexts:61ersist.sys. ubject_r:system_prop:s0
./system/etc/selinux/plat_property_contexts:62ersist.sys.safemode ubject_r:safemode_prop:s0
./system/etc/selinux/plat_property_contexts:63ersist.sys.theme ubject_r:theme_prop:s0
./system/etc/selinux/plat_property_contexts:64ersist.sys.fflag.override.settings_dynamic_system ubject_r:dynamic_system_prop:s0
./system/etc/selinux/plat_property_contexts:66ersist.sys.audit_safemode ubject_r:safemode_prop:s0
./system/etc/selinux/plat_property_contexts:81ersist.sys.boot.reason ubject_r:last_boot_reason_prop:s0
./system/etc/selinux/plat_property_contexts:346ersist.sys.dalvik.vm.lib.2 ubject_r:exported2_system_prop:s0 exact string
./system/etc/selinux/plat_property_contexts:347ersist.sys.media.avsync ubject_r:exported2_system_prop:s0 exact bool
And all the files ending with _contexts in Android Q are:
./vendor/etc/selinux/vndservice_contexts
./vendor/etc/selinux/vendor_file_contexts
./vendor/etc/selinux/vendor_hwservice_contexts
./vendor/etc/selinux/vendor_property_contexts
./vendor/etc/selinux/vendor_seapp_contexts
./system/etc/selinux/plat_file_contexts
./system/etc/selinux/plat_service_contexts
./system/etc/selinux/plat_hwservice_contexts
./system/etc/selinux/plat_seapp_contexts
./system/etc/selinux/plat_property_contexts
./sys/fs/selinux/initial_contexts
The service corresponding to the NFC module is in ./vendor/etc/selinux/vendor_file_contexts:
5032E:/ # cat ./vendor/etc/selinux/vendor_file_contexts | grep nfc
/(vendor|system/vendor)/bin/hw/android\.hardware\[email protected]\.1-service ubject_r:hal_nfc_default_exec:s0
/(vendor|system/vendor)/bin/hw/android\.hardware\[email protected]\.2-service ubject_r:hal_nfc_default_exec:s0
/(vendor|system/vendor)/bin/hw/android\.hardware\[email protected]\.0-service ubject_r:hal_nfc_default_exec:s0
/(system\/vendor|vendor)/bin/hw/android\.hardware\[email protected]\.1-service-st ubject_r:hal_nfc_default_exec:s0
/data/nfc_socket(/.*)? ubject_r:nfc_socket:s0
/data/vendor/nfc_socket(/.*)? ubject_r:vendor_nfc_socket:s0
/dev/st21nfc ubject_r:st21nfc_device:s0
5032E:/ #
My journey continues taking the untrodden path's...
I have found how to write to /
But I dont know how it's working.
So please read, and help me root this fone properly so I can keep what I found permanent in my fone.
I know some of you will 'see' with eye's to hear...
I need a twrp for my fone.
So I finally managed to get a working boot image created for my fone, with magisk, this is how I did it:
fastboot flashing unlock_critical
pressed + vol
fastboot flash vbmeta vblankmeta.img
fastboot flash recovery note9recovery.img <-for mt6762
fastboot reboot
As soon as the screen turns off. I have to hold + vol to NOT show recovery/fastboot/normal, choose recovery, but by taking this step, the recovery with magisk is already wiped somehow, depends on the version of android 10-Q, Pro, Latest, boots are slightly different.
The Pro variant is the best to work with.
So I rinse and repeat and flash the note9.img, boot into recovery, keeping + vol pressed until AFTER the point where the stock android recovery menu would kick in.
This boots the fone using the note9.img from recovery!
Voila, so I know I'm in, but I know a wonderfull trick most devs dont know.
This fone is unlocked from shop. It is system-as-root, meaning, root is actually pointless!
To prove it, I'll use root commands WITHOUT magisk, or twrp, or su, by giving this example:
adb shell echo "persist.service.adb.enable=1" >> default.prop
'Read only' bull**** pops up, but when doing:
adb -s *************** shell echo "persist.service.adb.enable=1" >> default.prop (* = your device serial number)
Command completes! WITHOUT MOUNTING ANY SYSTEM!
HOwever, attempting to write with magisk, su etc wont ever work, yeah, in an overlay file system, they will, but what of this? Like I've said in other posts, it's all a mirror image, or in todays speak, overlaid, I wrote of this on surfboard hacker, and a few other sites back in docsis 2 days as a security measure to stop us
uncapping lol...
So I initially do:
adb -s *************** shell echo "persist.service.adb.enable=1" >> default.prop
adb -s *************** shell echo "persist.service.debuggable=1" >> default.prop
adb -s *************** shell echo "persist.sys.usb.config=mtp,adb" >> default.prop
adb -s *************** shell echo "persist.service.adb.enable=1" >> /system/build.prop
adb -s *************** shell echo "persist.service.debuggable=1" >> /system/build.prop
adb -s *************** shell echo "persist.sys.usb.config=mtp,adb" >> /system/build.prop
adb -s *************** shell settings put secure install_non_market_apps 1
adb -s *************** shell settings put global adb_enabled 1
adb -s *************** shell settings put global setup_wizard_has_run 1
adb -s *************** shell settings put secure user_setup_complete 1
adb -s *************** shell settings put global activity_starts_logging_enabled 1
adb -s *************** shell settings put global development_settings_enabled 1
adb -s *************** shell settings put secure location_providers_allowed +gps,network
Works wonders huh?
Nah... of course my above commands work, lots of research...
I tried systemrw_1.32 to use any apps etc wanting to write to system, but I noticed while using magisk, some MMblock29 was read only, whereas systemrw_1.32 locked another, making me believe this is actually a pie script, because after testing this, when I rebooted, system was dm-1, not the dm-3 I normally see, and when attempting to system write, No joy, so these two are clashing.
But here's what to watch for: How TO write system is at this point:
I flashed the first mentioned files. Clean slate.
I boot the fone PAST recovery as mentioned, dont go INTO recovery, go PASSED it so fone boots from recovery without reflashing itself with stock, fone starts with a magisk icon on the desktop. kool.
adb shell
su
mount -o remount,rw /
Voila!
Now reboot...
All gone...
Rinse n repeat. Now how to keep this read write access?
1: Magisk in the bootloader will not work will not enable "mount -o remount,rw / " because it's symlinked it's own overlay system.
2: Magisk in the recovery is great to get magisk canary to do your bootloader for you, but the bootloader root will NOT write "mount -o remount,rw / " - only the note9 recovery allows me to "mount -o remount,rw / "
3: The note9 recovery is doing something no other magiskd bootloader or twrp'd recovery can!
4: If you get this, you get me.
Notice none of this is actually about what I need the most?
A twrp recovery 32mb in size, mt6762 or mt6765
Not a magisked boot.img thats supposed to be flashed to recovery..???
Oh and magisk has not done my fone yet, I need to load the note9 recovery just to get what you just read.
When I try magisk on a clean slate, it does nothing.
Sussed it... when the fone booted, I had the note9 magisk appear dulled out on my screen.
adb shell
$
su
sits and waits...
update magisk using canary 23 apk, but do nothing else.
adb shell
$
su
mount -o remount,rw /
do whatever.
Let magisk do it's stuff n reboot
mount -o remount,rw / is now impossible.
Get it?
Recovery can access / with rw access! <- VOILA!
Edit:
Oh, and flashing magisk to recovery is causing the bootloops, as is the confusion over why we'd flash a boot to recovery or recovery to boot, me I try anything, and I bet the note9 is the key to the read only fs, in that it still contains everything in 'A' bootloader, not several...
I propose a new root tool, called ****root.
Input your serial, in your adb -s *************** then the rooting commands no?
the app will run a script to do what I wrote above I can do.
Only with root commands.
Get to it.
Oh, please forgive my serial numbers, but here's the logs:
Rebooting OKAY [ 0.001s]
Finished. Total time: 0.005s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash vbmeta vblankmeta.
img
Sending 'vbmeta' (4 KB) OKAY [ 0.022s]
Writing 'vbmeta' OKAY [ 0.008s]
Finished. Total time: 0.053s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash recovery TWRP-3.4.
0-10-full.img
Sending 'recovery' (32768 KB) OKAY [ 0.807s]
Writing 'recovery' OKAY [ 0.517s]
Finished. Total time: 1.350s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot boot recovery
fastboot: error: cannot load 'recovery': No such file or directory
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot boot TWRP-3.4.0-10-full.
img
Sending 'boot.img' (32768 KB) OKAY [ 0.799s]
Booting OKAY [ 0.213s]
Finished. Total time: 1.073s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>adb shell
adb.exe: no devices/emulators found
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash vbmeta vblankmeta.
img
Sending 'vbmeta' (4 KB) OKAY [ 0.022s]
Writing 'vbmeta' OKAY [ 0.008s]
Finished. Total time: 0.058s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash boot MyBoot0.img
Sending 'boot' (32768 KB) OKAY [ 0.805s]
Writing 'boot' OKAY [ 0.513s]
Finished. Total time: 1.347s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash recovery MyRecover
y0.img
Sending 'recovery' (32768 KB) OKAY [ 0.803s]
Writing 'recovery' OKAY [ 0.519s]
Finished. Total time: 1.351s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot reboot
Rebooting OKAY [ 0.003s]
Finished. Total time: 0.008s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash boot MyBoot0.img
< waiting for any device >
^C
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>adb kill-server
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot devices
3082SH1001004262 fastboot
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash super super.img
fastboot: error: cannot load 'super.img': No such file or directory
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash super super.bin
fastboot: error: cannot load 'super.bin': No such file or directory
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash super super.bin
Sending sparse 'super' 1/23 (131068 KB) OKAY [ 4.468s]
Writing 'super' OKAY [ 2.133s]
Sending sparse 'super' 2/23 (130832 KB) OKAY [ 4.300s]
Writing 'super' OKAY [ 2.132s]
Sending sparse 'super' 3/23 (130841 KB) OKAY [ 4.602s]
Writing 'super' OKAY [ 2.251s]
Sending sparse 'super' 4/23 (130572 KB) OKAY [ 4.410s]
Writing 'super' OKAY [ 2.184s]
Sending sparse 'super' 5/23 (131060 KB) OKAY [ 4.109s]
Writing 'super' OKAY [ 2.068s]
Sending sparse 'super' 6/23 (130700 KB) OKAY [ 4.157s]
Writing 'super' OKAY [ 2.053s]
Sending sparse 'super' 7/23 (130881 KB) OKAY [ 4.182s]
Writing 'super' OKAY [ 2.248s]
Sending sparse 'super' 8/23 (130489 KB) OKAY [ 3.941s]
Writing 'super' OKAY [ 2.277s]
Sending sparse 'super' 9/23 (129252 KB) OKAY [ 4.187s]
Writing 'super' OKAY [ 2.855s]
Sending sparse 'super' 10/23 (128853 KB) OKAY [ 4.071s]
Writing 'super' OKAY [ 3.008s]
Sending sparse 'super' 11/23 (131020 KB) OKAY [ 4.032s]
Writing 'super' OKAY [ 2.070s]
Sending sparse 'super' 12/23 (131068 KB) OKAY [ 4.108s]
Writing 'super' OKAY [ 2.069s]
Sending sparse 'super' 13/23 (131068 KB) OKAY [ 4.073s]
Writing 'super' OKAY [ 2.080s]
Sending sparse 'super' 14/23 (131068 KB) OKAY [ 4.066s]
Writing 'super' OKAY [ 2.053s]
Sending sparse 'super' 15/23 (130348 KB) OKAY [ 4.274s]
Writing 'super' OKAY [ 4.725s]
Sending sparse 'super' 16/23 (131032 KB) OKAY [ 4.043s]
Writing 'super' OKAY [ 2.085s]
Sending sparse 'super' 17/23 (130560 KB) OKAY [ 4.186s]
Writing 'super' OKAY [ 2.126s]
Sending sparse 'super' 18/23 (130900 KB) OKAY [ 4.065s]
Writing 'super' OKAY [ 2.107s]
Sending sparse 'super' 19/23 (130493 KB) OKAY [ 4.069s]
Writing 'super' OKAY [ 2.340s]
Sending sparse 'super' 20/23 (121428 KB) OKAY [ 3.900s]
Writing 'super' OKAY [ 1.933s]
Sending sparse 'super' 21/23 (131068 KB) OKAY [ 4.082s]
Writing 'super' OKAY [ 2.164s]
Sending sparse 'super' 22/23 (131068 KB) OKAY [ 4.102s]
Writing 'super' OKAY [ 2.109s]
Sending sparse 'super' 23/23 (40268 KB) OKAY [ 1.320s]
Writing 'super' OKAY [ 0.649s]
Finished. Total time: 145.206s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot reboot
Rebooting OKAY [ 0.000s]
Finished. Total time: 0.005s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot reboot
Rebooting OKAY [ 0.001s]
Finished. Total time: 0.005s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash vbmeta vblankmeta.
img
< waiting for any device >
^C
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>adb kill-server
cannot connect to daemon at tcp:5037: cannot connect to 127.0.0.1:5037: No conne
ction could be made because the target machine actively refused it. (10061)
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash boot TWRP-3.4.0-10
-full.img
Sending 'boot' (32768 KB) OKAY [ 0.795s]
Writing 'boot' OKAY [ 0.517s]
Finished. Total time: 1.336s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot reboot TWRP-3.4.0-10-ful
l.img
fastboot: usage: unknown reboot target TWRP-3.4.0-10-full.img
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot boot TWRP-3.4.0-10-full.
img
Sending 'boot.img' (32768 KB) OKAY [ 0.784s]
Booting OKAY [ 0.067s]
Finished. Total time: 0.904s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash vbmeta vblankmeta.
img
Sending 'vbmeta' (4 KB) OKAY [ 0.007s]
Writing 'vbmeta' OKAY [ 0.001s]
Finished. Total time: 0.022s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash boot boot.img
Sending 'boot' (32768 KB) OKAY [ 0.791s]
Writing 'boot' OKAY [ 0.514s]
Finished. Total time: 1.321s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash recovery TWRP-3.4.
0-10-full.img
Sending 'recovery' (32768 KB) OKAY [ 0.795s]
Writing 'recovery' OKAY [ 0.510s]
Finished. Total time: 1.322s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot reboot
Rebooting OKAY [ 0.000s]
Finished. Total time: 0.004s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>adb shell
* daemon not running; starting now at tcp:5037
* daemon started successfully
Armor_X5_Q:/ $ su
/system/bin/sh: su: inaccessible or not found
3082SH1001004262 shell echo "persist.service.adb.enable=1" >> default.prop <
/system/bin/sh: can't create default.prop: Read-only file system
082SH1001004262 shell echo "persist.service.debuggable=1" >> default.prop <
/system/bin/sh: can't create default.prop: Read-only file system
082SH1001004262 shell echo "persist.sys.usb.config=mtp,adb" >> default.prop <
/system/bin/sh: can't create default.prop: Read-only file system
o "persist.service.adb.enable=1" >> /system/build.prop <
/system/bin/sh: can't create /system/build.prop: Read-only file system
o "persist.service.debuggable=1" >> /system/build.prop <
001004/system/bin/sh: can't create /system/build.prop: Read-only file system
262 s1|Armor_X5_Q:/ $ adb -s 3082SH1001004262 shell echo "persist.sys.usb.config
o "persist.sys.usb.config=mtp,adb" >> /system/build.prop <
/system/bin/sh: can't create /system/build.prop: Read-only file system
1|Armor_X5_Q:/ $
1|Armor_X5_Q:/ $
082SH1001004262 shell settings put secure install_non_market_apps 1 <
adb -s 3082SH1001004262 shell settings put global setup_wiz/system/bin/sh: adb:
inaccessible or not found
ard_has_run 1
adb -s 3082SH1001004262 shell settings put secure user_setup_complete 1
adb -s 3082SH10010127|Armor_X5_Q:/ $ adb -s 3082SH1001004262 shell settings put
3082SH1001004262 shell settings put global adb_enabled 1 <
s/system/bin/sh: adb: inaccessible or not found
3082SH1001004262 shell settings put global setup_wizard_has_run 1 <
rt/system/bin/sh: adb: inaccessible or not found
s_logg127|Armor_X5_Q:/ $ adb -s 3082SH1001004262 shell settings put secure user_
3082SH1001004262 shell settings put secure user_setup_complete 1 <
/system/bin/sh: adb: inaccessible or not found
ed 1
adb127|Armor_X5_Q:/ $ adb -s 3082SH1001004262 shell settings put global activity
3082SH1001004262 shell settings put global activity_starts_logging_enabled 1 <
-s 3082SH1001004262 shell settings put sec/system/bin/sh: adb: inaccessible or n
ot found
ure location_providers_allowed +gps,network127|Armor_X5_Q:/ $ adb -s 3082SH10010
3082SH1001004262 shell settings put global development_settings_enabled 1 <
/system/bin/sh: adb: inaccessible or not found
ettings put secure location_providers_allowed +gps,network <
/system/bin/sh: adb: inaccessible or not found
127|Armor_X5_Q:/ $ exit
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>adb reboot bootloader
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash vbmeta vblankmeta.
img
Sending 'vbmeta' (4 KB) OKAY [ 0.007s]
Writing 'vbmeta' OKAY [ 0.001s]
Finished. Total time: 0.026s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash boot MyBoot0.img
Sending 'boot' (32768 KB) OKAY [ 0.794s]
Writing 'boot' OKAY [ 0.510s]
Finished. Total time: 1.320s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot flash recovery MyRecover
y0.img
Sending 'recovery' (32768 KB) OKAY [ 0.794s]
Writing 'recovery' OKAY [ 0.508s]
Finished. Total time: 1.319s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>fastboot reboot
Rebooting OKAY [ 0.001s]
Finished. Total time: 0.007s
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>adadb shell
'adadb' is not recognized as an internal or external command,
operable program or batch file.
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>adb shell
Armor_X5_Q:/ $ su
^C
130|Armor_X5_Q:/ $ mount -o remount,rw /
mount: '/dev/block/dm-1' not user mountable in fstab
1|Armor_X5_Q:/ $ exit
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>adb -s 3082SH1001004262 shell ech
o "persist.service.adb.enable=1" >> default.prop
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>adb -s 3082SH1001004262 shell ech
o "persist.service.debuggable=1" >> default.prop
adb -s 3082SH1001004262 shell echo "persist.sys.usb.config=mtp,adb" >> default.p
rop
adb -s 3082SH1001004262 shell echo "persist.service.adb.enable=1" >> /system/bui
ld.prop
adb -s 3082SH1001004262 shell echo "persist.service.debuggable=1" >> /system/bui
ld.prop
adb -s 3082SH1001004262 shell echo "persist.sys.usb.config=mtp,adb" >> /system/b
uild.prop
adb -s 3082SH1001004262 shell settings put secure install_non_market_apps 1
adb -s 3082SH1001004262 shell settings put global adb_enabled 1
adb -s 3082SH1001004262 shell settings put global setup_wizard_has_run 1
adb -s 3082SH1001004262 shell settings put secure user_setup_complete 1
adb -s 3082SH1001004262 shell settings put global activity_starts_logging_enable
d 1
adb -s 3082SH1001004262 shell settings put global development_settings_enabled 1
adb -s 3082SH1001004262 shell settings put secure location_providers_allowed +gp
s,network
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>adb install MagiskCanary23.0.apk
Performing Streamed Install
Success
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>for x in / /product /vendor; do m
ount -o remount,rw $x; echo "it works! @ $x">$x/test.txt; cat $x/test.txt; rm $x
/test.txt; done
x was unexpected at this time.
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>adb shell
Armor_X5_Q:/ $ su
"it works! @ $x">$x/test.txt; cat $x/test.txt; rm $x/test.txt; done <
'/dev/block/dm-1' is read-only
/system/bin/sh: can't create //test.txt: Read-only file system
cat: //test.txt: No such file or directory
rm: //test.txt: No such file or directory
'/dev/block/dm-0' is read-only
/system/bin/sh: can't create /product/test.txt: Read-only file system
cat: /product/test.txt: No such file or directory
rm: /product/test.txt: No such file or directory
'/dev/block/dm-2' is read-only
/system/bin/sh: can't create /vendor/test.txt: Read-only file system
cat: /vendor/test.txt: No such file or directory
rm: /vendor/test.txt: No such file or directory
1|Armor_X5_Q:/ #
1|Armor_X5_Q:/ # mount -o remount,rw /
'/dev/block/dm-1' is read-only
Armor_X5_Q:/ #
D:\2022 x86\Adb\platform-tools_r31.0.1-windows>
Notice the commands being accepted BEFORE I updated magisk, then what happens?
mount -o remount,rw /
mount: '/dev/block/dm-1' not user mountable in fstab
In effect I need the note9 fstab to enable rw to /
!!!
One last thing I forgot to mention, without twrp, forget twrp.
I made a proper boot image for this fone, that also works when booting it from recovery, when booting from recovery, if in select recovery menu, continuing to press + VOL button, while choosing recovery lol...
And the boot image works with stock recovery!
Sadley, no twrp flashing
So how to get the twrp flashables flashable again?
The above MyBoot.img gives magisked root access flashed to boot.
fastboot flash vbmeta vblankmeta.img
fastboot flash boot MyBoot1.img
fastboot reboot
As for
mount -o remount,rw /
I gave y'all the answer.
Pachacouti said:
One last thing I forgot to mention, without twrp, forget twrp.
I made a proper boot image for this fone, that also works when booting it from recovery, when booting from recovery, if in select recovery menu, continuing to press + VOL button, while choosing recovery lol...
And the boot image works with stock recovery!
Sadley, no twrp flashing
So how to get the twrp flashables flashable again?
Click to expand...
Click to collapse
Sorry for the doubt but is the TWRP Ulefone Note 9 you wrote from this thread?https://forum.xda-developers.com/t/twrp-3-4-0-twrp-for-ulefone-note-9p-helio-p22-mt6762-5.4171433/
You PORTed TWRP img or only flash that img file directly in your device?
If you want I'll compile the TWRP 3.5.2_10 to you. Only send me stock recovery.img & super.img same version from your device.
I'll post the ULEFONE note9.img I used to gain access. The thing is, when I use this, system is writable, but obviously I update magisk, and while rebooting after doing the 'live install' of magisk (works fine to patch a boot that fails... )
My process is this, I can patch an origional boot with magisk after flashing note9 to recovery,
I can then flash the patched boot and it works when flashed to boot, and can use origional recovery, but cant flash magisk'd boot from origional un rooted fone, patched by magisk, so the note9 was my 'backdoor' so to speak...
and the systems all over the place lol.. dynamic is a pain, cant even find my sdcard and kali nethunter magisk modules need zips not git lol...
The note9recovery has something to watch for.. using clean slate, when booting the note9recovery, as fone goes into loading (past recovery) and just before fone goes into gui,
when doing "mount -o remount,rw / " system is actually writable, but cuts off adb when gui gives access!
Magisk somehow wrecks the actual mount -o remount,rw / I have when I first boot, afterwards saying dm-1 or 3 is read only.
Anyway, I'v posted my stock boot and recovery too, if I can see twrp in recovery, I'd be delighted, I lost the plot with all this where's my f'n sdcard, damn dynamic partitioning'!
Oh, and I have a problem, 128gig sdcard, fone says not enough space!
MyBoot1.img posted above is the clean slate magisk'd origional boot WITHOUT twrp, and I can use this to flash to recovery afterwards, in order to boot recovery, but have no twrp... so useless really as recovery, so I flash boot MyBoot1.img just to get a magisk to test lol...
Thanks for your time
lopestom said:
Sorry for the doubt but is the TWRP Ulefone Note 9 you wrote from this thread?https://forum.xda-developers.com/t/twrp-3-4-0-twrp-for-ulefone-note-9p-helio-p22-mt6762-5.4171433/
You PORTed TWRP img or only flash that img file directly in your device?
If you want I'll compile the TWRP 3.5.2_10 to you. Only send me stock recovery.img & super.img same version from your device.
Click to expand...
Click to collapse
Yes it was this I flashed to recovery, it says mt6762, and this was the key, because up until I flashed this, I was flashing mt6765 as per fones claims it is, and getting nowhere, i'm a only...
Soz, posting superimage once zipped...
I may get cut off by my isp, so if its easier for you my firmware is:
P2N2V23A.GQU.Ulefone.EEA.HB.HJ.S8AMABHUYB.0509.V3.01
In the meantime, I noticed when testing twrp ports, a green line flashed just before I get black screen where twrp WOULD show, adb/su works, but no twrp flashing commands, and it crossed my mind I've seen this with the firestick lol, where firesticks were being overlaid with a screen blocking twrp..? No?
Pachacouti said:
Yes it was this I flashed to recovery, it says mt6762, and this was the key, because up until I flashed this, I was flashing mt6765 as per fones claims it is, and getting nowhere, i'm a only...
Click to expand...
Click to collapse
Keep calm and let me time to do correct TWRP to you test after. Time now.
Thank you...
I think uppin the super mite not go down too well with the ee unlimited broadband business class lol, isp, so if I disappear for a while lol...
Ps, origional super.7z.001 was renamed to zip for my ease
Pachacouti said:
Thank you...
I think uppin the super mite not go down too well with the ee unlimited broadband business class lol, isp, so if I disappear for a while lol...
Ps, origional super.7z.001 was renamed to zip for my ease
Click to expand...
Click to collapse
Downloaded recovery.img & super.zip files.
Now I'm creating file test. Maybe 2h after this message.
SYL
Update: Try install recovery.img (TWRP) and if not good so install vbmeta modified.
Spoiler: Install Custom recovery
stock recovery - bootloader => fastboot (not fastbootd)
cmd command:
Code:
fastboot --disable-verity --disable-verification flash vbmeta vbmetaAndroidSC_mod.img
cmd command:
Code:
fastboot flash recovery recovery.img
cmd command:
Code:
fastboot reboot-recovery
Let me know about.
Super! No rush, it's pickled my head enough as it is lol, reading time..
Am impressed... I see twrp in recovery at last.. you are a god send for all those armor x5 punters with the 'a' only partition, next time I see you in the street, i'll buy you a pint, but until then a lucky find will seek you out, respect!!
You should post this as a working twrp, since it's not my work, as twrp was what I actually needed to get stuff done, well appreciated, I'll away test it now
Pachacouti said:
Am impressed... I see twrp in recovery at last.. you are a god send for all those armor x5 punters with the 'a' only partition, next time I see you in the street, i'll buy you a pint, but until then a lucky find will seek you out, respect!!
You should post this as a working twrp, since it's not my work, as twrp was what I actually needed to get stuff done, well appreciated, I'll away test it now
Click to expand...
Click to collapse
Thanks. Not need more than respect.
I just chose you for the attitude of sharing information and the fact that you needed help to progress. Courage is for the few.
I prefer that you share the TWRP file and instructions yourself. So fastboot/fastbootD; encryption and decryption; installation of zips; backup and restore; internal and external storage; anything else is working??
Yes: Enjoy! No: let me know.
lopestom said:
Thanks. Not need more than respect.
I just chose you for the attitude of sharing information and the fact that you needed help to progress. Courage is for the few.
I prefer that you share the TWRP file and instructions yourself. So fastboot/fastbootD; encryption and decryption; installation of zips; backup and restore; internal and external storage; anything else is working??
Yes: Enjoy! No: let me know.
Click to expand...
Click to collapse
Hmm, I learn sumat new every day, thank god aquarius is here lol, anyway, so far, I'm still at some pernikity when it comes to writing system, dm-1 or dm-3 locked, but from what I see and have tested so far, all possibilities using fone before it boot's into gui, system and mnt points work, , my sdcard is very visible at last, and writable, using stock the crappy google file manager would not let me write to sdcard, so you've solved so many headache's in one swoop. I'll write a final tut to show my alternative route's lol, thanks again
Armor x5 Android 10_Q Mt6765 aka Mt6762 ROOT AT LAST!
This 'tutorial' is a quicky for those yet to figure this fone out. Well it took a bit time for sure, but this is how it went... No matter what recovery or magisk I tried, nothing worked, all ulefone images with twrp were 64mb in size, where-as...
forum.xda-developers.com
Related
I haven't flashed any recovery yet. Actually I've just unlocked my bootloader. I'm kinda a noob so I just wondering how to flash this recovery the easiest way...
Anyone care to post a noob guide? (Plz!)
saiftheboss7 said:
I haven't flashed any recovery yet. Actually I've just unlocked my bootloader. I'm kinda a noob so I just wondering how to flash this recovery the easiest way...
Anyone care to post a noob guide? (Plz!)
Click to expand...
Click to collapse
Place the twrp-olympus-2.0.0RC0.img in the same directory as your fastboot.
Open a command prompt window and make sure you change the directory to your fastboot folder. Mine is C:\Atrix so the commands I used (in bold) are:
Code:
$[B]fastboot devices[/B]
TA2070AKYL fastboot
$ [B]fastboot erase recovery[/B]
erasing 'recovery'...
OKAY [ 0.734s]
finished. total time: 0.734s
$ [B]fastboot flash recovery twrp-olympus-2.0.0RC0.img[/B]
sending 'recovery' (4172 KB)...
OKAY [ 0.266s]
writing 'recovery'...
OKAY [ 0.719s]
finished. total time: 1.000s
$ [B]fastboot reboot[/B]
rebooting...
finished. total time: 0.000s
If you haven't installed any other custom recoveries you may need to delete or backup the following file: /system/etc/install-recovery.sh
In short, I'm looking for a backup that can be used to restore a SCH-i905 (Verizon LTE) to Honeycomb 3.2. A rooted backup is ideal, but anything that works is better than the soft bricked device I have now. =)
History follows. I received this device from a client in the US to test an Android app on Honeycomb. It came with Honeycomb 3.0.1, but many apps were failing to boot, including the App I'm developing. Figuring it was the OS, I tried to upgrade it but this proved difficult. I can not get OTA updates outside of the US, and I am on a Mac without bootcamp so I can not use Odin. Heimdall failed. Kies probably does not work with Mountain Lion, although I should have checked.
The tablet was manually rooted using adb. CWM was installed with ROM Manager. An assert failed when trying to install CyanogenMod for Verizon. ROM Manager downloaded CyanogenMod for the wifi tablet. I flashed that instead and it worked but there was no sound. I figured if one wifi ROM works, another will probably work, so I flash CleanRom 2.0. Big mistake. It wiped out CWM recovery and the device gets stuck on the Samsung splash screen. I made backups but did not transfer them off of my phone (another mistake).
I can get into download mode and fastboot. Download mode is useless for me because Heimdall is not cooperating and I do not have access to a Windows machine. That leaves me with fastboot. Could anyone point me to a backup that I can use to restore my SCH-i905 to Android 3.2 with fastboot? (FWIW, the threads I have read tend to have broken links.)
EDIT: SCH-i905 (Verizon LTE). The title can not be changed.
I found a tar file containing the EG01 firmware here [To prevent spam on the XDA forums, ALL new users prevented from posting outside links in their messages. After approximately 10 posts, you will be able to post outside links. Thank you for understanding!].
After flashing with fastboot and rebooting, I'm still stuck on the Samsung logo screen. This is what I did:
Code:
$ tar -tvf PDA_HC31_EG01Ba_AP352081user_CP1033580_LTE20110704_0708.tar
-rwxr-xr-x 0 0 0 4485120 Jan 1 2009 recovery.img
-rwxr-xr-x 0 0 0 327200196 Jan 1 2009 system.img
-rwxr-xr-x 0 0 0 9376048 May 2 2011 cache.img
-rwxr-xr-x 0 0 0 16 May 2 2011 fusetrigger.bin
-rwxr-xr-x 0 0 0 10747904 Jun 24 2011 lte_modem.bin
-rwxr-xr-x 0 0 0 3962240 Jul 4 2011 modem.bin
-rwxr-xr-x 0 0 0 4051200 Jul 8 2011 boot.img
$ tar -xvf PDA_HC31_EG01Ba_AP352081user_CP1033580_LTE20110704_0708.tar
x recovery.img
x system.img
x cache.img
x fusetrigger.bin
x lte_modem.bin
x modem.bin
x boot.img
$ fastboot devices
288414343FF52D7 fastboot
$ fastboot flash recovery recovery.img
sending 'recovery' (4380 KB)...
OKAY [ 0.241s]
writing 'recovery'...
OKAY [ 0.267s]
finished. total time: 0.508s
$ fastboot flash system system.img
sending 'system' (319531 KB)...
OKAY [ 17.336s]
writing 'system'...
OKAY [ 40.205s]
finished. total time: 57.541s
$ fastboot flash boot boot.img
sending 'boot' (3956 KB)...
OKAY [ 0.236s]
writing 'boot'...
OKAY [ 1.279s]
finished. total time: 1.515s
$ fastboot flash cache cache.img
sending 'cache' (9156 KB)...
OKAY [ 0.499s]
writing 'cache'...
OKAY [ 2.238s]
finished. total time: 2.737s
$ fastboot flash modem modem.bin
sending 'modem' (3869 KB)...
OKAY [ 0.212s]
writing 'modem'...
OKAY [ 0.304s]
finished. total time: 0.517s
$ fastboot flash lte_modem lte_modem.bin
sending 'lte_modem' (10496 KB)...
OKAY [ 0.576s]
writing 'lte_modem'...
FAILED (remote: (00030003))
finished. total time: 0.577s
$ fastboot flash fusetrigger fusetrigger.bin
sending 'fusetrigger' (0 KB)...
OKAY [ 0.001s]
writing 'fusetrigger'...
FAILED (remote: (00030003))
finished. total time: 0.013s
$ fastboot reboot
rebooting...
finished. total time: 0.000s
$
I'm not sure what lte_modem.bin and fusetrigger.bin are for, but there is no immediately obvious way to flash them.
[Q] Looking for a PIT File for the SCH-i905 (Verizon LTE)
Fastboot is not working, but I managed to get ODIN to work on Parallels. I've tried flashing a couple of ROMs, but both of them error out whenever they get to system.img. This appears to be partition problem. Can anyone point me to a PIT file for the SCH-i905 (Verizon LTE) tablet?
Getting frustrated with the likes of:
$ fastboot flash tombstones tombstones.img.ext4
sending 'tombstones' (114688 KB)...
OKAY [ 28.674s]
writing 'tombstones'...
FAILED (remote: size too large)
finished. total time: 28.679s
I was wondering if in all failed attempts to manually make space for such using:
$ fastboot erase system/cache/data/etc.,
I wouldn't be better off doing a:
$ fastboot oem format ?!?
Your mediapad bricked now.
You need linux-pc & try to use "dd" command for restore all partitions of your pad.
This is a general users guide to unbrick your Transformer tablet.
This guide will help you if your Asus tablet will only boot into recovery
and the command
Code:
adb reboot-bootloader
does not work to get you booted back to bootloader screen ..
If the above command works then skip to the first fastboot command ..
WHAT YOU NEED
An Asus tablet that will only boot into recovery …
Woking adb and fastboot on your PC
Windows drivers (if using Windows)
A fully charged tablet
Asus data cable
Stock firmware blob (from Asus's web site, make sure you get the right one)
_that's bootit.ko (unzipped and placed with fastboot.exe)
Downloads
Asus Stock firmware---MAKE SURE YOU GET THE CORRECT SKU FOR YOUR TRANSFORMER TABLET
click me
_that's bootit.ko----click me
INSTRUCTIONS
Extract your stock firmware in your downloads folder twice...You will see a blob file rename it boot.blob and move it to the same folder as your fastboot.exe or if in linux to your home folder
Unzip the bootit.ko and place it wth the above blob file.
Let start with this command to make sure that your PC can see your table as an ADB device in recovery
Code:
adb devices
OUTPUT
Code:
[email protected] ~ $ adb devices
List of devices attached
015c7d7a445c260c recovery
Then lets push the bootit.ko to the root of the device like this
Code:
adb push bootit.ko /
OUTPUT
Code:
[email protected] ~ $ adb push bootit.ko /
673 KB/s (27690 bytes in 0.040s)
Then lets insmod this .ko file
Code:
adb shell insmod /bootit.ko
This should reboot the tablet into the bootloader menu, lets verifiy.
Once in the bootloader screen lets make sure your PC can see the device in fastboot.
Code:
fastboot devices
OUTPUT
Code:
[email protected] ~ $ fastboot devices
015c7d7a445c260c fastboot
So now its time to erase the misc & cache partitions, as that is most likely the partitions that is making it boot to recovery...
Code:
fastboot erase misc
OUTPUT
Code:
[email protected] ~ $ fastboot erase misc
erasing 'misc'...
OKAY [ 1.021s]
finished. total time: 1.021s
Code:
fastboot erase cache
OUTPUT
Code:
[email protected] ~ $ fastboot erase cache
******** Did you mean to fastboot format this partition?
erasing 'cache'...
OKAY [ 2.096s]
finished. total time: 2.096s
Once these two command run with OKAY as the OUTPUT .
It is time to make sure we can reboot into the bootloader with the hardware buttons
So from where you are at in the bootloader screen use the VOL DOWN & POWER buttons to boot the tab back into the bootloader screen ..
Run these command in fastboot in this order
The next command is to just verify your computer can see your device
Code:
fastboot devices
OUTPUT
Code:
[email protected]:~ > fastboot devices
015d2bbce2501405 fastboot
Code:
fastboot erase system
OUTPUT
Code:
[email protected]:~ > fastboot erase system
******** Did you mean to fastboot format this partition?
erasing 'system'...
OKAY [ 2.954s]
finished. total time: 2.954s
Code:
fastboot erase recovery
OUTPUT
Code:
[email protected]:~ > fastboot erase recovery
erasing 'recovery'...
OKAY [ 1.945s]
finished. total time: 1.945s
Code:
fastboot -w
OUTPUT
Code:
[email protected]:~ > fastboot -w
erasing 'userdata'...
OKAY [ 23.188s]
formatting 'userdata' partition...
Creating filesystem with parameters:
Size: 29618601984
Block size: 4096
Blocks per group: 32768
Inodes per group: 8192
Inode size: 256
Journal blocks: 32768
Label:
Blocks: 7231104
Block groups: 221
Reserved block group size: 1024
Created filesystem with 11/1810432 inodes and 157662/7231104 blocks
sending 'userdata' (139133 KB)...
writing 'userdata'...
OKAY [ 26.358s]
erasing 'cache'...
At this point it will either hangs on erasing 'cache'
Or it will give you an error, either way you will need to
reboot the tablet back into fastboot with the hardware buttons
Once that is done continue on the path
Code:
fastboot erase boot
OUTPUT
Code:
[email protected]:~ > fastboot erase boot
erasing 'boot'...
OKAY [ 1.209s]
finished. total time: 1.209s
Code:
fastboot erase misc
OUTPUT
Code:
[email protected]:~ > fastboot erase misc
erasing 'misc'...
OKAY [ 0.978s]
finished. total time: 0.978s
Code:
fastboot erase cache
OUTPUT
Code:
[email protected]:~ > fastboot erase cache
******** Did you mean to fastboot format this partition?
erasing 'cache'...
OKAY [ 2.843s]
finished. total time: 2.843s
Code:
fastboot -i 0x0B05 flash system boot.blob
During the sending/writing process of this step you will get the blue bar on your screen.....
OUTPUT
Code:
[email protected]:~ > fastboot -i 0x0B05 flash system boot.blob
erasing 'system'...
OKAY [ 2.339s]
sending 'system' (800927 KB)...
OKAY [133.094s]
writing 'system'...
[OKAY [178.036s]
finished. total time: 313.469s
Code:
fastboot -i 0x0B05 reboot
OUTPUT
Code:
[email protected]:~ > fastboot -i 0x0B05 reboot
rebooting...
finished. total time: 0.020s
Let it boot into stock ROM ....
Credits
@_that for his bootit.ko
TEAM CROMBi and TEAM ZOMBi-X @sbdags @hardslog
Troubleshooting
Here is some troubleshooting
Check out this thread for fasboot.exe, adb.exe and driver help ...CLICK ME
A message from _that
_that said:
Here is the original thread where the bootit module was tested for the first time -> http://forum.xda-developers.com/showthread.php?t=2291974
The problem was that the installed recovery was too old and incompatible with the bootloader and so could not access the eMMC at all. The bootloader command to boot to recovery is stored in the MSC partition (mmcblk0p3), and the recovery could not clear it. Since the bootloader checks the MSC partition before checking for volume-down, it is impossible to get to fastboot without some additional kick in the butt (aka "bootit.ko").
The correct bootit.ko file to use is the one in "bootit-bootloader.zip": http://forum.xda-developers.com/attachment.php?attachmentid=1985941&d=1369339132 - the older version turned out to be too weak. Note that this is a zipped kernel module, not a recovery-installable ZIP. You need to unzip it on your PC before adb push.
After making it to the bootloader menu and working fastboot, you can fastboot flash a current version of TWRP and install the custom ROM of your choice. No real need for the stock blob, unless you want to make sure you have the current bootloader and a known working ROM.
Here is another thread where bootit.ko didn't help, maybe it was really a hardware problem. But lots of good background info from me. -> http://forum.xda-developers.com/showthread.php?t=2437376
And here is another success story -> http://forum.xda-developers.com/showthread.php?p=47525770
Click to expand...
Click to collapse
Thx for all your help @_that
I have used it this way for a nexus one:
NOTE: that only boot, recovery, and system will be flashed - bit misleading
1. Unzip zipped *.img files to a directory
Code:
unzip -d somedir passion.zip
I have these files: android-info.txt, radio.img, splash1.img, boot.img, recovery.img, system.img, hboot_8x50_0.35.0017_100610.nb0, spcustom.img, userdata.img
I used PASSIMG_Passion_Google_WWE_3.13.1700.1_GRK39F_release_signed.zip
2. cd into directory
Code:
cd somedir
3.
Code:
sudo ANDROID_PRODUCT_OUT="./" fastboot flashall
NOTE: ANDROID_PRODUCT_OUT variable is set to current directory "./" and only a space after this to fastboot command. This sets environment variable and runs command.
Code:
Example output
--------------------------------------------
Bootloader Version...: 0.35.0017
Baseband Version.....: 5.12.00.08
Serial Number........: HT9CPP80xxxx
--------------------------------------------
sending 'boot' (2322 KB)...
OKAY [ 0.376s]
writing 'boot'...
OKAY [ 0.979s]
sending 'recovery' (2560 KB)...
OKAY [ 0.403s]
writing 'recovery'...
OKAY [ 1.045s]
sending 'system' (135673 KB)...
OKAY [ 20.775s]
writing 'system'...
OKAY [ 47.087s]
rebooting...
finished. total time: 70.755s