[Q] Best way to install modules at boot? - G2 and Desire Z General

Edit: "Rom Development" is only meant for very advanced technical discussion directly related to ROM development activity and the delivery of actual ROMs and ROM components ONLY. Nothing else goes in here. Moved thread to "General." Please refer to "[REF] STOP! Read before posting!" ~TheRomMistress
Hi there,
I've permarooted my DZ using Visionary which worked fine.
Now I'd like to automatically install the overclock module at boot time.
What's the 'standard' way of doing this?
Regards,
Richard

I'd also like to know
Sent from Desire Z

You can have visionary auto run a script on boot, make a script to install the module and have it run that on boot.

Actually I have it setup but it doesn't work for some reason. Maybe visionary.sh needs extra line? Like !#sh or something.
I did chmod 755 already. It is in /data/local.
Sent from Desire Z

I've now tried this too but it looks like V12 Visionary doesn't execute the script if it detects that the phone is already rooted.
Just thinking, does it run the script with SU privileges or should su be the first command in the file?
R

dicko99 said:
Hi there,
I've permarooted my DZ using Visionary which worked fine.
Now I'd like to automatically install the overclock module at boot time.
What's the 'standard' way of doing this?
Click to expand...
Click to collapse
The best way, is to use an overclocked kernel now. You will need to flash an S-OFF bootloader first. All the details I have just posted in http://forum.xda-developers.com/showthread.php?t=834950

stridger said:
The best way, is to use an overclocked kernel now. You will need to flash an S-OFF bootloader first. All the details I have just posted in http://forum.xda-developers.com/showthread.php?t=834950
Click to expand...
Click to collapse
Hmm, not sure I'm ready for flashing and new kernels just yet...

I'm in the same boat. Don't really want to flash.. just wish this script would run at startup!
not a big deal due to "Fast boot".. since it stays around...

I notice an option in VISIONary 12 saying "Run visionary.sh after root"..
so i guess you can turn this on and it will work?
What do i put into the visionary.sh?

When i use ES File Exploirer and navigate to /Data - it says "No files"?
i expected to see a "Local" and then a visionary.sh?

aah had to enable "Root access" then the folder "local" shows up.
Not sure how to write a visionary.sh..

Related

How to confirm I have unrooted?

Okay unfortunately 5 mins after rooting my phone I noticed my replacement Vibrant has a bad screen. I used the one-click program to root, so I did the same thing to unroot. I downloaded ROM Manager after I unrooted to confirm the phone was unrooted and ROM Manager seems to think so (it told me to root my phone).
However, I am wondering if there is any way to *confirm* my phone has been unrooted (i.e. manually look for the root files and make sure they are not there)? I ask because I reset my phone to factory settings after unrooting, but updated.zip and chromemod folder were still present when I looked under files, which sort of scared me into thinking T-Mobile may be able to detect I had rooted.
Thanks for all the help and wish me luck for my *third* Vibrant.
DarkAgent said:
Okay unfortunately 5 mins after rooting my phone I noticed my replacement Vibrant has a bad screen. I used the one-click program to root, so I did the same thing to unroot. I downloaded ROM Manager after I unrooted to confirm the phone was unrooted and ROM Manager seems to think so (it told me to root my phone).
However, I am wondering if there is any way to *confirm* my phone has been unrooted (i.e. manually look for the root files and make sure they are not there)? I ask because I reset my phone to factory settings after unrooting, but updated.zip and chromemod folder were still present when I looked under files, which sort of scared me into thinking T-Mobile may be able to detect I had rooted.
Thanks for all the help and wish me luck for my *third* Vibrant.
Click to expand...
Click to collapse
You can test this to un-root.
https://www.dropbox.com/s/pyg5sypm9qto7rw/Galaxysroot.apk
I wrote it today. with help.
its posted on another thread.
Erm.. couldn't you just download Terminal Emulator (if it already isn't installed) and type in: "su" (without quotations)
zephiK said:
Erm.. couldn't you just download Terminal Emulator (if it already isn't installed) and type in: "su" (without quotations)
Click to expand...
Click to collapse
^^I second this, if you are not rooted, you will get a "su not found" type of error.
Also in this thread http://forum.xda-developers.com/showthread.php?t=728471 you will find
How to unroot
su
rm -r /system/app/Superuser.apk
rm -r /system/xbin/busybox
rm -r /system/bin/su
you could also do it from adb.
rhcp0112345 thanks for the app but I think the su way sounds easier.
Thanks zephiK and d_bot! I did the su thing and got a "su not found" error so I guess I am good.
Lakjin said:
rhcp0112345 thanks for the app but I think the su way sounds easier.
Thanks zephiK and d_bot! I did the su thing and got a "su not found" error so I guess I am good.
Click to expand...
Click to collapse
Yep, no su, no root
New to Andriod, sry for noob question, What are the benefits to Root, What changes on your phone??
30Glock said:
New to Andriod, sry for noob question, What are the benefits to Root, What changes on your phone??
Click to expand...
Click to collapse
Well, I know there will probably be a lot of people freaking out on me, but from how I use my phone the only use I've had so far is using cachemate to clear cache, and possibly modding the look of the os. I personally used to it to remove the annoying tmo boot and shutdown sounds/video.
30Glock said:
New to Andriod, sry for noob question, What are the benefits to Root, What changes on your phone??
Click to expand...
Click to collapse
Welcome to Android 30Glock
the main benefit of rooting is to be able to remove bloat-ware. Bloatware plagues the vibrant. Besides that there are other things you can do like custom roms(not many for the vibrant but they will come), with custom roms comes custom themes, also you can increase you cpu frequency. There are a few awesome apps out there that require root (Titanium Backup).
Basically think of it as you have just been given a new windows machine at work, and the admin gave you User permissions, so yeah you can do some cool stuff, but to really get in and have some fun you need admin permissions. To root/unroot this phone it is jaw dropping easy! Thank you samsung. Thank you DEVS!
Install Root Explorer and try to navigate to your system folder.
Moved to general section.

Still not be able to understand - root step

Guys,
Would you mind to write up a tutorial how you root your DHD ?
I'm a newbie for android and i have no idea.. been trying to read articles and i still cant understand.
I have downloaded the file called dhd_root.zip and now what ?
some people are mentioning about the gscript and blar blar blar.. what is all that about??
i have no idea what to do now... please help..
*please do not flame me for not using the search function as i read few of them and i do not understand at all*
Thanks
I personally used Evostance's guide, it was very simple and easy to follow: http://forum.xda-developers.com/showthread.php?t=834427
That's the link. I do believe there are simpler methods now using Visionary. Just check the Development sub-forum and they have more tutorials there
Sylpher said:
I personally used Evostance's guide, it was very simple and easy to follow: http://forum.xda-developers.com/showthread.php?t=834427
That's the link. I do believe there are simpler methods now using Visionary. Just check the Development sub-forum and they have more tutorials there
Click to expand...
Click to collapse
Hey Sylpher,
I did tried to read Evostance's guide but where is the guide?
Step By Step Guide - Download link below
11/11/10 V2
http://www.multiupload.com/KK66WUNUWS
See the main thread for details on the root:
http://forum.xda-developers.com/showthread.php?t=805327 ----> i do not understand at all... all those code like listed below
Go to adb shell, switch to root (su) and do the following:
insmod /sdcard/wp-(version).ko
for example: insmod /sdcard/wp_g5ed1769.ko
This will disable wp (will be enabled on reboot though...)
dd if=/sdcard/hboot_eng.nb0 of=/dev/block/mmcblk0p18
This will install engineering hboot
totally confused.
The link that he provides includes all the files + the tutorial (in a PDF file). So yeah just download that first and it should be quite straightforward from there on.
Sylpher said:
The link that he provides includes all the files + the tutorial (in a PDF file). So yeah just download that first and it should be quite straightforward from there on.
Click to expand...
Click to collapse
Sylpher,
Thank you so much for the info (The link that he provides includes all the files + the tutorial (in a PDF file).
I have no idea there is a tutorial file inside the zip.
I will give it a go when i got home and then pm you after that.
Thanks again.
No problems
You can try this too, a member here compile it. http://hemorrdroids.net/overclock-undervolt-your-desire-hd/
if you dont already have a file explorer then download astro from market place
download visonary r12 from here and copy apk file to sd card on the phone and install from there
http://android.modaco.com/content/h...722/10-nov-r12-test-visionary-one-click-root/
download superuser from market place and install on the phone
make sure usb debuggging is enabled on the, also unkown sources is allowed phone(settings/applications/development)
run visionary and don not check any of the 3 box on the screen
run temp root and let it finish
then attempt perm root it will ask for super user permission, allow this and the phone should root and reboot
to test it has work down load adfree from market place and see if it runs, if it does you have full root
simples
nmyseteroious said:
You can try this too, a member here compile it. http://hemorrdroids.net/overclock-undervolt-your-desire-hd/
Click to expand...
Click to collapse
that's a really good tutorial. I think i'll follow that one when i decide to root and s-off my DHD.
SupremeBeaver said:
that's a really good tutorial. I think i'll follow that one when i decide to root and s-off my DHD.
Click to expand...
Click to collapse
Although I wouldn't recommend anyone to rush into the act of rooting their device, do bare in mind, that the exploit we are using to obtain root will be patched sooner or later, so whilst thinking about it I would be very wary of applying any future OTA upgrades as so you may find you once more have an unrootable device

[STICKY][Patch][Rom]Malware Exploit for all pre-Gingerbread devices

Who is affected? All devices pre-gingerbread
Who should act? Users and developers using pre-gingerbread roms
How do I fix? Flash attached .zip at the bottom of this post
What if I think I was infected? Completely wipe your device, format sdard, go back to stock and re-apply rom, then flash the attached .zip (before installing any apps)
Why should I care? read below...
http://www.androidpolice.com/2011/0...your-phone-steal-your-data-and-open-backdoor/
Flash this with ClockWorkMod.... this is for any Pre Gingerbread ROM.... ie TNT anything, VEGAn 5.1.1 and below, Zpad anything, GAdam anything.
This is not necessary for any ROMS based off Gingerbread AOSP or CM7. Including VEGAn-TAB Experimentals.
Be Safe.
Even More Details here: http://www.androidpolice.com/2011/0...-android-nightmare-and-weve-got-more-details/
I checked out the zip and it just adds a blank text file (0 bytes) called profile to the /system/bin folder. So I am not sure what the fix is?
**EDIT** Nevermind it is a dummy file meant to prevent the virus. Thanks to the OP for providing this.
http://www.androidpolice.com/2011/0...your-phone-steal-your-data-and-open-backdoor/
Nasty stuff. I would say this patch is high priority and I'm already going through my own ROMs to add it in.
http://forum.xda-developers.com/showthread.php?t=977154
Link above has info on creating the file manually.
Jim
fyi -
http://www.pcworld.com/article/221213/keep_malware_off_your_android_phone_5_quick_tips.html
Lookout mobile security . In case you cannot find it via the market.
http://www.getjar.com/Lookout-Mobile-Security-with-Antivirus
Edit. I just installed the lookout app to scan my tab, everything was fine and then, i un-installed it since it was running on the background and taking 10% of the cpu..
Anyways, a nice app that can be used to do a quick scan..
I don't have a stock gtab but I'll ask anyways... how can our stock rom users be protected? Is there an alternate method?
Edit just saw the manual process. Im guess that's the way to go.
xmr405o said:
I don't have a stock gtab but I'll ask anyways... how can our stock rom users be protected? Is there an alternate method?
Edit just saw the manual process. Im guess that's the way to go.
Click to expand...
Click to collapse
I'd curious to see what all the vendors are going to do about this. Granted, they could just say that the Market is not there, but regardless the security hole is still there and needs to be plugged up.
Hi,
I hope that this isn't too offtopic, but I was trying to create /system/bin/profile using a term and su, and when i went into root explorer to make /system/bin R/W, root explorer showed the dir as R/W already, and as mounted on /dev/loop9.
Is that normal?
I haven't installed dataloop, at least intentionally, so it seems strange that /system/bin would be mounted there, plus it being R/W by default?
FYI, I use z4root to get temp root. Could that be why /system/bin is R/W?
Then again, that wouldn't explain the /dev/loop9 mount ...
Jim
jimcpl said:
Hi,
I hope that this isn't too offtopic, but I was trying to create /system/bin/profile using a term and su, and when i went into root explorer to make /system/bin R/W, root explorer showed the dir as R/W already, and as mounted on /dev/loop9.
Is that normal?
I haven't installed dataloop, at least intentionally, so it seems strange that /system/bin would be mounted there, plus it being R/W by default?
FYI, I use z4root to get temp root. Could that be why /system/bin is R/W?
Then again, that wouldn't explain the /dev/loop9 mount ...
Jim
Click to expand...
Click to collapse
Hi,
Creating the profile file manually, it wouldn't persist,i.e., it was gone after rebooting, so I installed gojimi's zip usung CWM, and that worked.
I also did a mount w/o getting temp root, and /system/bin is not on /dev/loop9, so I'm guessing that when z4root sets temp root, it might be remounting /system/bin on /dev/loop9 itself.
Jim
You would have to download one of those sketchy apps to really be affected anyways, right? Who would do that?!
Appreciate the patch. This highlights the two problems with android though, google fixed this security issue in 2.2.2, but most carriers still haven't released that update. And the market needs some oversight, not authoritarian apple like, but some.
Sent from my T-Mobile G2 using XDA App
Is it possible to sticky this thread
Mods is it possible to sticky this thread so that it is easily visible.
Thanks
Hello guys. Is there a way to find out if our tablet is infected or not?
I mean if we have installed any of the apps in the list that automatically means that we are infected or not?
If infected what is preferred to do wipe the tablet or go back to stock rom??
Is there any manual for windows 7 noobies users?
Thanks.
Doctor LeVa said:
Hello guys. Is there a way to find out if our tablet is infected or not?
I mean if we have installed any of the apps in the list that automatically means that we are infected or not?
If infected what is preferred to do wipe the tablet or go back to stock rom??
Is there any manual for windows 7 noobies users?
Thanks.
Click to expand...
Click to collapse
Please read the thread completely, it is stated you can download lookout security to run a scan to see if you are infected.
downloading.....see what happens
There is a DroidDreamKiller app that allows you to check to see if you are already infected and install the patch. There is also a beta test app that gives you other information. Just search the market for DroidDreamKiller.
To devs: Thank You
TO Everyone else DO THIS ASAP
How do I flash the zip file after downloading it?
Thanks
Start cwm using volume up while powering on.
Once menu comes up select install zip using vol buttons
Use home to select.
Navigate to where you saved zip file
Select it with home button
Once install complete reboot from cwmod
MODs Please make this a sticky . It is being overlooked.

[ROOT] Stock ICS Leak One-Click Root Tool

Hi all!
First off, I'm new to xda Developers so please excuse me if this is in the wrong forum! I thought I'd post information about a tool I wrote here which roots stock 4.0.3 leak on the A500, A501 and assumingly the A200 too. Its literally one click - just enable USB debugging. "ICS Root" also installs, optionally, FaceLock and Trebuchet (although FaceLock doesn't want to work. It lets you set it up though =P)
Since version 5.0.1 this also now works with the new 0.022.00 leak!
The full post is over at TegraOwners: http://forum.tegraowners.com/viewtopic.php?f=30&t=350
The only real system requirements are Windows (with .Net Framework 4) and an Iconia on the stock 4.0.3 leak. I hope somebody finds this useful its been tested by myself and a couple of TegraOwners users and it works well.
In terms of the technique used, it uses the great Jay Freeman's mempodroid exploit to gain root at which point it mounts /system rw and installs su, busybox and Superuser.apk so no real surprises there. Installing Trebuchet adds that apk to /system/app and installing FaceLock installs the apk to /system/app before installing the pittpatt folder to the flexrom (mounted as /system/vendor). I plan to open source it when all the requested features have been implemented and the code has been cleaned up.
Thanks!
~blackthund3r
EDIT 14/05/2012: ICS Root 7 is out enjoy!
Sent from my A500 using Tapatalk
cwm version?
why would it not work with cwm version?
With this tool does system remain writeable after rooting?
What about flashing CWM with acer recovery installer once rooted? I guess it would screw the bootloader...
lowsum said:
What about flashing CWM with acer recovery installer once rooted? I guess it would screw the bootloader...
Click to expand...
Click to collapse
If you are on the cwm with the HC boot loader it should work as Its Magic will be run..
if you are on the new boot loader as in the full non modded leak.. It will give you secure boot error ..
The new boot loader Blocks its magic.
Thanks
Hey this worked easy. I had to re-install USB drivers and make sure I had the latest from Google. Other then that, hit the button, wait about 1.5 minutes, and it rebooted! No problems thus far! Thanks Again!
JeanBubu said:
why would it not work with cwm version?
Click to expand...
Click to collapse
It would but the cwm one, afaik, is prerooted?
Sent from my A500 using Tapatalk
root doesnt work like its supposed to. i know its only half root due to the bootloader, but terminal emulator flat out says i'm not rooted after this despite sixasis working and titanium backup/root checker both saying i have root and busybox. i'm going to post this on TO as well for you incase you dont check here often.
nifterific said:
root doesnt work like its supposed to. i know its only half root due to the bootloader, but terminal emulator flat out says i'm not rooted after this despite sixasis working and titanium backup/root checker both saying i have root and busybox. i'm going to post this on TO as well for you incase you dont check here often.
Click to expand...
Click to collapse
That's storage cos terminal works for me and running su in an adb shell works great too.
Code:
[email protected]:/ $ export PATH=/data/local/bin:$PATH
[email protected]:/ $ su
# exit
[email protected]:/ $ su
#
Sent from my A500 using Tapatalk
SteamBishop said:
Hey this worked easy. I had to re-install USB drivers and make sure I had the latest from Google. Other then that, hit the button, wait about 1.5 minutes, and it rebooted! No problems thus far! Thanks Again!
Click to expand...
Click to collapse
You're welcome and I'm glad it worked!
Sent from my A500 using Tapatalk
After reading the other post, I have found that I cannot write to the system directory from the device itself. The folder attributes indicate that it is set to write, however File Explorer HD will not let me. I have tried to create a folder in the /system and it will not accept the addition. The strange thing is that Root Check says it is rooted, File Explorer HD accepts putting it into Root Explore, but that is it. It is odd. I will try to reapply the Root to see if that makes a difference.
SteamBishop said:
After reading the other post, I have found that I cannot write to the system directory from the device itself. The folder attributes indicate that it is set to write, however File Explorer HD will not let me. I have tried to create a folder in the /system and it will not accept the addition. The strange thing is that Root Check says it is rooted, File Explorer HD accepts putting it into Root Explore, but that is it. It is odd. I will try to reapply the Root to see if that makes a difference.
Click to expand...
Click to collapse
Please, read the op before bringing this up. This method is for half root, its the only way possible right now on stock leak ics. There is a special script you need to use to mpunt system. You can find it in the stock leak thread, run it in terminal or use rom toolbox and set it as a script to run at boot because rebooting loses write privileges.
nifterific said:
Please, read the op before bringing this up. This method is for half root, its the only way possible right now on stock leak ics. There is a special script you need to use to mpunt system. You can find it in the stock leak thread, run it in terminal or use rom toolbox and set it as a script to run at boot because rebooting loses write privileges.
Click to expand...
Click to collapse
Sorry for offending you and whoever else it did. Thank you for pointing that script out in that post. My intent was to offer a second comment to your assessment..
nifterific said:
Please, read the op before bringing this up. This method is for half root, its the only way possible right now on stock leak ics. There is a special script you need to use to mpunt system. You can find it in the stock leak thread, run it in terminal or use rom toolbox and set it as a script to run at boot because rebooting loses write privileges.
Click to expand...
Click to collapse
I have a better script which I'll be releasing as an update to the root app this morning hopefully. It'll be a terminal command to remount rw.
Sent from my A500 using Tapatalk
New update out!!
blackthund3r said:
I have a better script which I'll be releasing as an update to the root app this morning hopefully. It'll be a terminal command to remount rw.
Sent from my A500 using Tapatalk
Click to expand...
Click to collapse
Version 3 came out this morning
It features some bug fixes as well as a completely new remount menu which mounts /system rw properly on the fly. Tested with a busybox installer app
Enjoy!
Thanks for your tool blackthund3r !
I tried it with the new leak from this morning and it doesn't seem to work anymore
Edit :
Just to be a little more specific, the app says the process was OK and state that the tablet is rooted but the tablet doesn't reboot by itseld and su is not installed. I tried to install su manually but it's unable to find a previous su package on the system.
paugustin said:
Thanks for your tool blackthund3r !
I tried it with the new leak from this morning and it doesn't seem to work anymore
Edit :
Just to be a little more specific, the app says the process was OK and state that the tablet is rooted but the tablet doesn't reboot by itseld and su is not installed. I tried to install su manually but it's unable to find a previous su package on the system.
Click to expand...
Click to collapse
ah okay it appears a completely new leak has been released. It is possible that the mempodroid exploit has been patched up. I'm gonna look into it soon. I can't much tonight - I have school work. I'll see what can be done and what the differences between leaks are.
Sent from my A500 using Tapatalk
EDIT: mempodroid hasn't been patched See ICS Root v3.1
Hi blackthund3r
Thanks for the update 3.1 but could you please fix the problem on your hosting website? clicking on this file send to an error warning.
The other files can be downloaded though.
can someone post a mirror to the 3.1 version? current link is not working.
can somebody also confirm, if i root with this tool, i will be able to reinstall my clockworkmod recovery through 'acer recovery installer' and flash any other cwm rom? or do i have to downgrade to honeycomb 3.01, install iconiaroot for honeycomb and then acer recovery installer?
Gersma,
I'll be able to answer to your question as soon as I'll be able to download this tool and test it.

[Q] Rooting official 2.3.5 wirelessly

Hello!
How can one root official 2.3.5 rom without connecting to usb and adb?
The goal is to install custom ICS on U8800 that has no usb port - completely broken and even not charging phone. No warranty and repair cost is close to actual phone cost. So repairing is not an option.
Wireless adb app requires root first - so it is not an option for me also.
Any help is appreciated - I need ISC because I need ipsec vpn which is npt available in gingerbread.
I am ready to test any operation you suggest - I don't fear to brick the phone, need no backups.
It's impossible. I have one USB broken u8800 and that's why I use cm7 (.32) on it.
Sent from my U8800 using Tapatalk 2
Qqqxxxzzz said:
It's impossible. I have one USB broken u8800 and that's why I use cm7 (.32) on it.
Sent from my U8800 using Tapatalk 2
Click to expand...
Click to collapse
There is nothing impossible I believe
Maybe we could find the trick - gingerbreak works on some roms - another fine exploit maybe.
I don't know - worth a try I think.
tranced1 I might have 1 possible solution for you. I've rooted my 2.3.5 some time ago and I've done a backup of boot.img.
I remember with froyo we could root it with boot.img "rooted". I bet this won't work on 2.3.5, but who knows right?
If you want to give it a try, I upload that boot.img for you.
EDIT: darn! Totally forgot you can't access bootloader directory without root & damaged usb port
Can't remember another way out... sorry
tranced1 said:
There is nothing impossible I believe
Maybe we could find the trick - gingerbreak works on some roms - another fine exploit maybe.
I don't know - worth a try I think.
Click to expand...
Click to collapse
Gingerbreak and z4root doesn't work. Only solution is build your own exploit.
Sent from my U8800 using Tapatalk 2
Is there any way to flash zip from stock recovery? I saw this root method for some samsung phones.
Does anybody know how to compile such .zip file?
tranced1 said:
Is there any way to flash zip from stock recovery? I saw this root method for some samsung phones.
Does anybody know how to compile such .zip file?
Click to expand...
Click to collapse
compiling zip is easy. Your problem is that we don't know how to sign it correctly.
Sent from my GT-P1000 using Tapatalk 2
I believe that you can use terminal emulator and zergrush exploit to root the phone.
The automatic root methods basicaly push the needed files on /data/local change permissions etc... All can be done with linux commands which are available from a terminal emulator. So I don't think that you need the usb cable to root the device. You can try investigate the runme.bat file from doomlord's root method and give the commands manually after you have put the files from files directory on sdcard.
dancer_69 said:
I believe that you can use terminal emulator and zergrush exploit to root the phone.
The automatic root methods basicaly push the needed files on /data/local change permissions etc... All can be done with linux commands which are available from a terminal emulator. So I don't think that you need the usb cable to root the device. You can try investigate the runme.bat file from doomlord's root method and give the commands manually after you have put the files from files directory on sdcard.
Click to expand...
Click to collapse
adb can access the phone as root user - from terminal file system is read-only, so even first step permission denied
Yes, you have right about that.
But, check this thread:
http://forum.xda-developers.com/showthread.php?t=1716068
the last post.
EDIT:
After reading the discription on first post of gingerbreak, I had another Idea.
Seems that gingerbreak uses sd card to temporary store the necessary for root files. So, maybe you can replace these files(and especially the exploit) whith those of doomlord's root app, before you press the root button, so to use the working zergrush exploit.
This is the B528 root bat script:
http://pastebin.ca/raw/2163499
@adb wait-for-device
@echo --- DEVICE FOUND
@echo --- reboot to bootloader
@adb reboot-bootloader
@echo --- flash the rooted bootimage
@fastboot boot boot.img
@echo --- reboot to nomal mode
@fastboot reboot
@echo --- wait for adb connect
@adb wait-for-device
@echo --- DEVICE FOUND
@adb remount -t yaffs2 /dev/block/mtdblock3 /system
Click to expand...
Click to collapse
You're problem is in red... you have to flash the exploited boot image. The rest is just installing busybox, su and SuperUser.apk.
You have the stock recovery which allows you to flash .zip files, but they have to be signed correctly and I don't think that's possible.
VuDuCuRSe said:
This is the B528 root bat script:
http://pastebin.ca/raw/2163499
You're problem is in red... you have to flash the exploited boot image. The rest is just installing busybox, su and SuperUser.apk.
You have the stock recovery which allows you to flash .zip files, but they have to be signed correctly and I don't think that's possible.
Click to expand...
Click to collapse
To boot a different boot image, you have to use USB, atleast on fastboot.
dancer_69 said:
Yes, you have right about that.
But, check this thread:
http://forum.xda-developers.com/showthread.php?t=1716068
the last post.
EDIT:
After reading the discription on first post of gingerbreak, I had another Idea.
Seems that gingerbreak uses sd card to temporary store the necessary for root files. So, maybe you can replace these files(and especially the exploit) whith those of doomlord's root app, before you press the root button, so to use the working zergrush exploit.
Click to expand...
Click to collapse
Thanks for clues but seems there is no way - I cant execute exploit via ssh - permission denied I cant even chmod it.
Gingerbreak completely not working - no files created on sdcard.
Ι didn't find any other way on net. There are several discussions for this problem but not a solution. I think that the only way is to do it for an app. You can contact with the creator of gingerbreak or z4root to ask for it. Also I'll try to make an app myself, but my android developing knowledge is very basic, so don't count too much on this. If I have some kind of success I'll contact you via PM.
EDIT:
Try this mod, and if you are lucky...
dancer_69 said:
Ι didn't find any other way on net. There are several discussions for this problem but not a solution. I think that the only way is to do it for an app. You can contact with the creator of gingerbreak or z4root to ask for it. Also I'll try to make an app myself, but my android developing knowledge is very basic, so don't count too much on this. If I have some kind of success I'll contact you via PM.
EDIT:
Try this mod, and if you are lucky...
Click to expand...
Click to collapse
No I am obviously not the lucky one
My android development knowledge is zero, so if you can run zergRush from executable area it will be a very good start.
And I want to thank everybody for your support.
So, it doesn't work?
I just updated the file, so give it another try.
Also, check if you have logcat and usb debuging enabled(is needed for other methods, so maybe needed here too)
dancer_69 said:
So, it doesn't work?
I just updated the file, so give it another try.
Also, check if you have logcat and usb debuging enabled(is needed for other methods, so maybe needed here too)
Click to expand...
Click to collapse
Logcat: Cannot copy boomsh. : Permission Denied
I will revert to first beta now - and will test if it will work
I suppose this logat message is for z4root fail. Unfortunately I don't know what boomsh is. I just decompiled the apk and replaced the exploit, busybox, superuser, and su files with these from doomlord's root files directory.
So, easy solution didn't work. If I have something else I'll let you know.
EDIT:
I get some info about "cannot copy boomsh"
The exploit creates this file when run. This message appears when this file already exists and needed to be deleted from /data/local/tmp.
I checked z4root-mod on my device(which is already rooted and with ICS custom rom), and I get this message too.
The problem is that this file doesn't exist on my device, so I cannot delete it.
---------- Post added at 04:16 PM ---------- Previous post was at 03:17 PM ----------
I read on a forum that these apps(as z4root) run better after a fresh boot. So, install the latest apk(has newer files), reboot the device and run z4root again.
z4root is a froyo root exploit (I think) and seems "dead" for a long time.
Check Chainfire's Gingerbreak: http://forum.xda-developers.com/showthread.php?t=1044765

Categories

Resources