Hello,
I have had my MyTouch 4G since January of 2011, and today I decided to finally root my phone (growing sick and tired of HTC sense and the tremendous bloatware lag with it). I still like the phone itself (perfect size), and so I was came across CM7, it looks like it is the most stable and popular rom for the MyTouch.
Of course, I myself, I am an IT professional, but have no idea on what the rooting process is, so I have been following the steps CM team has posted on rooting my android device (wiki(dot)cyanogenmod(dot)org/w/Install_CM_for_glacier). I was currently in the process of downgrading the android version, and came across an error. So according to this guide, it said if you come across an $, your exploit has failed, if # you have gained temporary root.
That being said, I have came across the $ sign, which I assume is the exploit. I don't know why I have come across this error, and so, I have posted all the notes from my command line:
C:\adt-bundle-windows-x86-20130729\sdk\platform-tools> ad
local/tmp
1366 KB/s (9796 bytes in 0.007s)
C:\adt-bundle-windows-x86-20130729\sdk\platform-tools> ad
/data/local/tmp
1882 KB/s (589849 bytes in 0.306s)
C:\adt-bundle-windows-x86-20130729\sdk\platform-tools> ad
/local/tmp
1753 KB/s (712688 bytes in 0.397s)
C:\adt-bundle-windows-x86-20130729\sdk\platform-tools> ad
chmod 777 /data/local/tmp/fre3vo
chmod 777 /data/local/tmp/misc_version
chmod 777 /data/local/tmp/flashgc
/data/local/tmp/fre3vo -debug -start FAA90000 -end FFFFF
adb shell
cd /data/local/tmp
./misc_version -s 1.00.000.0
./flashgc
exit $ chmod 777 /data/local/tmp/fre3vo
./misc_version -s 1.00.000.0
./flashgc
$ chmod 777 /data/local/tmp/misc_version
$ chmod 777 /data/local/tmp/flashgc
$ /data/local/tmp/fre3vo -debug -start FAA90000 -end FFF
fre3vo by #teamwin
Please wait...
Attempting to modify ro.secure property...
fb_fix_screeninfo:
id: msmfb
smem_start: 2fd00000
smem_len: 300000
type: 0
type_aux: 0
visual: 2
xpanstep: 0
ypanstep: 1
line_length: 1920
mmio_start: 0
accel: 0
fb_var_screeninfo:
xres: 480
yres: 800
xres_virtual: 480
yres_virtual: 1600
xoffset: 0
yoffset: 800
bits_per_pixel: 32
activate: 16
height: 80
width: 48
rotate: 0
grayscale: 0
nonstd: 0
accel_flags: 0
pixclock: 0
left_margin: 0
right_margin: 0
upper_margin: 0
lower_margin: 0
hsync_len: 0
vsync_len: 0
sync: 0
vmode: 0
Frame Buffer handle: 4
Buffer offset: 002ee000
Buffer size: 8192
Scanning region faa90000...
Scanning region fab80000...
Scanning region fac70000...
Scanning region fad60000...
Scanning region fae50000...
Scanning region faf40000...
Scanning region fb030000...
Scanning region fb120000...
Scanning region fb210000...
Scanning region fb300000...
Scanning region fb3f0000...
Scanning region fb4e0000...
Scanning region fb5d0000...
Scanning region fb6c0000...
Scanning region fb7b0000...
Scanning region fb8a0000...
Scanning region fb990000...
Scanning region fba80000...
Scanning region fbb70000...
Potential exploit area found at address fbbb5600:1a00.
Exploiting device...
I hope someone can help me out on this one... would be awesome if I can manage to root my phone and install the ROM all by today...
Thanks!
Bump bump bump bump bump
please i need help!!
UPDATE: I HAVE GONE PAST THIS ERROR.
Now, my current situation, I had followed the root guide that was stickied on this forums, and it looks like my "S=Off" is on the HBoot loader thing (when you press power + volume down). But, when I try to follow the steps of flashing an actual ROM (through clockworkmod) it says I am not rooted? Any idea on how to fix that?
Been working on this phone for over 15 hours... and will only go to sleep once I know I will have my ROM installed.
How can clockworkmod tell you your not rooted? Have you already flashed a recovery?
Also try this to re-root
http://forum.xda-developers.com/showthread.php?t=1343114
Then install the 4ext app and let it install the recovery.
N_otori0us_ said:
How can clockworkmod tell you your not rooted? Have you already flashed a recovery?
Also try this to re-root
http://forum.xda-developers.com/showthread.php?t=1343114
Then install the 4ext app and let it install the recovery.
Click to expand...
Click to collapse
Actually, I have no idea why is that O.O
But I will follow those steps on that link you send me, and post an update if it all works out!!
Thanks a lot!
So, after trying out that link that was posted earlier, it looks like I have found my real problem now.
My S=off looks like is permanent. But my root is not (I dunno why, no flash or anything yet)
So when I try to connect my phone to my PC (USB Debug Mode on, USB Tethering) it doesn't connect anymore, nor show up on ADB. And in fact my PDAnet driver does not detect it either!
Any idea on what can be the problem?
Update:
I am done!! I installed cm10!! It works
omg, this is awesome!!
sorry for making this thread, i managed to re-root it and now it all worked out.
I love you xda developers, i apologize for making a thread, i managed to research all my information and it worked after 25+ hours of working on my phone.
darkgiant said:
Update:
I am done!! I installed cm10!! It works
omg, this is awesome!!
sorry for making this thread, i managed to re-root it and now it all worked out.
I love you xda developers, i apologize for making a thread, i managed to research all my information and it worked after 25+ hours of working on my phone.
Click to expand...
Click to collapse
You thought the mytouch was hard to root. Try the Panache lol.
Sent from my HTC Glacier using xda app-developers app
N_otori0us_ said:
You thought the mytouch was hard to root. Try the Panache lol.
Sent from my HTC Glacier using xda app-developers app
Click to expand...
Click to collapse
haha, that is the older version right?
Honestly, it was not hard at all, the fact is that the information provided, is all cluttered around the interwebz (requireing actual hours of researching) and to find that perfect stable rom is another animal... haha.
I don't feel like buying another smartphone, I know that the mytouch 4g is still capable of competing with smartphones in the market (of course, it has no fancy camera or gimmicks like the S4) but it works!
darkgiant said:
haha, that is the older version right?
Honestly, it was not hard at all, the fact is that the information provided, is all cluttered around the interwebz (requireing actual hours of researching) and to find that perfect stable rom is another animal... haha.
I don't feel like buying another smartphone, I know that the mytouch 4g is still capable of competing with smartphones in the market (of course, it has no fancy camera or gimmicks like the S4) but it works!
Click to expand...
Click to collapse
Naa it's not the older version... Its the Canadian version
Sent from my HTC Glacier using xda app-developers app
I guess for any moderators preference, I am open to compiling how I went about my situations and such if this is a persistent issue! If not, feel free to close this topic, as my problems are now all solved (THANKFULLY!)
~Darkgiants
Related
Thanks for the move orb3000
EDIT:
Apparently I can't post links either... what gives??? Going to have to do this the ghetto way I guess..
Anyway, I made a nice little .bat to temp-root the 2.3.4 OTA for the T-Mobile G2 (HTC Vision) for all you lazy people out there, or the people who are just tired of playing with the cmd (like myself).
It's on media fire... www(dot)mediafire(dot)com/?xwurdlpcw61oxiz
Just unzip and run "rootg2.bat"
It uses fre3vo, as it is the only method that currently works. If this for some reason does NOT work for you, edit rootg2.bat and change the address set to one of the following after a reboot
FAA90000 -end FFFFFFFF
10000000 -end 1FFFFFFF
20000000 -end 2FFFFFFF
30000000 -end 3FFFFFFF
F0000000 -end FFFFFFFF
E0000000 -end EFFFFFFF
Find one that works?? Great! Now you have a bat juuuuuust for you.
Long time lurker, first time poster, micro sized developer.
how to install
hi, i'm not very good with this. can you let me know how to install the g2root file on my g2? by the way, is this a permanent root? thx
tntx said:
hi, i'm not very good with this. can you let me know how to install the g2root file on my g2? by the way, is this a permanent root? thx
Click to expand...
Click to collapse
It says in the title this is a temporary root, not permanent. Check the [REF] Sticky is either General or Development for guides that will help you through the proces. DO NOT attempt root until you are sure you know what you are doing. READ and SEARCH!
Does anyone know of a way to temp-root on-device, without having to hook up to a PC?
After the message "daemon started successfully" the adb just hangs at that line, no crash, just doesn't advance any further. I can't input any commands either. I waited for over an hour to see if it would proceed, but not as such. Any ideas?
RebelScum75 said:
Does anyone know of a way to temp-root on-device, without having to hook up to a PC?
Click to expand...
Click to collapse
Hi!
I know that there is none
Have fun - Guhl
will this also work for the desire z ?
no dude ive been looking forever "finally had a reason to root the darn thing but i dont think there is one at least not that i have found--i work for verizon now anyways left my tmo--lol-----
dianlb50 said:
will this also work for the desire z ?
Click to expand...
Click to collapse
yes, basically same phone
Did this work for anyone?
Sent from my T-Mobile G2 using XDA App
I'm having issues getting this to work. I have tried the various addresses with no solid confirmation of whether it worked or not, aside from running the app "Root Check" or attempting to use an app that requires root, and finding that the phone is indeed, not rooted.
The results vary however at best, the process appears to have gone through smoothly. Daemon was successful, it successfully locates the region, and finally successfully dismounts and and remounts, which leaves us at the stage where it says press any key to continue.
Are there additional steps? What conditions must be met in order for this to work other than turning on debugging mode? Must the usb cord remain connected? Does the temp root end once the cord is unplugged? The guide above didn't exactly give any clear cut step-by-step directions and so I am feeling as if I'm not doing something because the guide doesn't mention it.
Can someone who has successfully temp-rooted their G2 v2.3.4 post a list of steps needed from start to finish? Example:
1) Enable USB debugging on phone.
2) Plug phone into computer via USB cord.
3) Unzip g2root.zip into a folder of your choice.
4) Run g2root.bat.
5) If successful, you will see (fill in the blank)
6) If successful, go to step 7, if unsuccessful, reboot computer/phone and retry step 1
Something like the above direct would be extremely useful to a few of us. Thanks!
-HobbesG2
Hello, I think this is my first post over here.
enable usb debugging on the phone
Plug phone into computer via USB
kill adb if it is already running:
Code:
./adb kill-server
start adb server as root:
Code:
sudo ./adb start-server
sample output:
Code:
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
Code:
./adb wait-for-device
and wait for this command to exit
Code:
./adb push /PUT/PATH/TO/G2ROOT/HERE/fre3vo /data/local/tmp
sample output:
Code:
218 KB/s (9796 bytes in 0.043s)
Code:
./adb -d shell chmod 777 /data/local/tmp/fre3vo
Code:
./adb -d shell /data/local/tmp/fre3vo -debug -start fb040000 -end FFFFFFFF
sample output:
Code:
fre3vo by #teamwin
Please wait...
Attempting to modify ro.secure property...
fb_fix_screeninfo:
id: msmfb
smem_start: 2fd00000
smem_len: 300000
type: 0
type_aux: 0
visual: 2
xpanstep: 0
ypanstep: 1
line_length: 1920
mmio_start: 0
accel: 0
fb_var_screeninfo:
xres: 480
yres: 800
xres_virtual: 480
yres_virtual: 1600
xoffset: 0
yoffset: 0
bits_per_pixel: 32
activate: 16
height: 80
width: 48
rotate: 0
grayscale: 0
nonstd: 0
accel_flags: 0
pixclock: 0
left_margin: 0
right_margin: 0
upper_margin: 0
lower_margin: 0
hsync_len: 0
vsync_len: 0
sync: 0
vmode: 0
Frame Buffer handle: 4
Buffer offset: 002ee000
Buffer size: 8192
Scanning region fb040000...
Scanning region fb130000...
Scanning region fb220000...
Scanning region fb310000...
Scanning region fb400000...
Scanning region fb4f0000...
Scanning region fb5e0000...
Scanning region fb6d0000...
Scanning region fb7c0000...
Scanning region fb8b0000...
Scanning region fb9a0000...
Scanning region fba90000...
Potential exploit area found at address fbb54e00:1200.
Exploiting device...
Code:
adb wait-for-device
Code:
./adb -d remount
sample output:
Code:
remount succeeded
verify you have root:
Code:
./adb -d shell id
output:
Code:
uid=0(root) gid=0(root)
Or you could verify it worked by executing 'adb shell' and if you have a # prompt rather than $, it worked.
This will stick until you reboot. Unplugging the cable will not affect it (unless you're currently running the commands)
This is not exactly a true temp-root, as it just gives adb root access, but you should be able to remount /system as rw and push su and SuperUser.apk to the right places to get a proper temp-root.
-Nipqer
Nipqer said:
you should be able to remount /system as rw and push su and SuperUser.apk to the right places to get a proper temp-root.
Click to expand...
Click to collapse
could you please describe how to do that? where do i get these packages from?
Getting closer but still not quite there. The reason why I was not having confirmations before was because I was running the rootg2.bat file directly rather than doing it through the cmd prompt, aka Start --> Run --> [type cmd]. After having ran the .bat file via the cmd prompt, I was able to apply, and confirm via the steps that were mentioned.
Problem is, I'm still not exactly truly temp-rooted, as none of my apps that require root or are designed to check root, show me as rooted. Is this because superuser and/or busybox are not operating as if they are rooted due to something I'm not aware of?
I already have the latest Superuser/Elite and BusyBox installed onto my phone via the Market. Do I have to push them into a specific folder that simply installing them from market wont do automatically?
Any thoughts?
After I get this nailed down, I will write a comprehensive explaination for others to do this as well.
Here is a true temp-root which works with fre3vo.
Just read the readme file.
-Nipqer
any update on this one?
i hope this makes rooting easier...
Nipqer said:
Here is a true temp-root which works with fre3vo.
Just read the readme file.
-Nipqer
Click to expand...
Click to collapse
I see this method listed for the Sensation, has it been proven to work for G2, stock OTA 2.3.4?
Wondering the same.
If you are running 2.3.x, and use fre3vo, then run that zip I posted, you will have proper temp-root.
It will stick until a reboot, but then you can just redo everything.
Yes it's proven to work.
-Nipqer
Let me first say sorry if I am posting where I should not. I'm a noob and completely frustrated. I successfully rooted and unrooted a MT4g on 2.2.1 which I shipped back to Tmobile for a replacement. I now have a new shiny MT4g on 2.3.4. I originally mistakenly tried to root using visionary. I was then stuck on splash screen. I found the 2.3.4 PD15IMG that I booted from SDcard from bootloader. I then ran the downgrade successfully or at least I believe successfully. I am again now stuck on the splash screen and really need a hand. When I run the 2.2.1 stock it changes the hboot to what ever it should 0.86.0000 or something like that but the rom never boots. I can intermittently get into the 2.3.4 rom after flashing and hboot changes to 0.89.0005 but the moment the phone is turned off BAM splash screen again. Any help is greatly appreciated.
yres: 800
xres_virtual: 480
yres_virtual: 1600
xoffset: 0
yoffset: 800
bits_per_pixel: 32
activate: 16
height: 80
width: 48
rotate: 0
grayscale: 0
nonstd: 0
accel_flags: 0
pixclock: 0
left_margin: 0
right_margin: 0
upper_margin: 0
lower_margin: 0
hsync_len: 0
vsync_len: 0
sync: 0
vmode: 0
Buffer offset: 00000000
Buffer size: 8192
Scanning region faa90000...
Scanning region fab80000...
Scanning region fac70000...
Scanning region fad60000...
Scanning region fae50000...
Scanning region faf40000...
Scanning region fb030000...
Scanning region fb120000...
Scanning region fb210000...
Scanning region fb300000...
Scanning region fb3f0000...
Scanning region fb4e0000...
Scanning region fb5d0000...
Scanning region fb6c0000...
Scanning region fb7b0000...
Scanning region fb8a0000...
Scanning region fb990000...
Scanning region fba80000...
Potential exploit area found at address fbb55c00:400.
Exploiting device...
C:\android-sdk\platform-tools>adb shell
# exit
exit
C:\android-sdk\platform-tools>adb push misc_version /data/local/tmp/misc_version
198 KB/s (15837 bytes in 0.078s)
C:\android-sdk\platform-tools>adb push flashgc /data/local/tmp/flashgc
1362 KB/s (712688 bytes in 0.511s)
C:\android-sdk\platform-tools>adb shell
# cd /data/local/tmp
cd /data/local/tmp
# ./misc_version -s 1.00.000.0
./misc_version -s 1.00.000.0
./misc_version: permission denied
#
C:\android-sdk\platform-tools>adb push misc_version /data/local/tmp/misc_version
1189 KB/s (15837 bytes in 0.013s)
C:\android-sdk\platform-tools>adb push flashgc /data/local/tmp/flashgc
1599 KB/s (712688 bytes in 0.435s)
C:\android-sdk\platform-tools>adb shell
# cd /data/local/tmp
cd /data/local/tmp
# ./misc_version -s 1.00.000.0
./misc_version -s 1.00.000.0
./misc_version: permission denied
# dd if=/dev/block/mcblk0p17 bs=1 skip=160 count=10
dd if=/dev/block/mcblk0p17 bs=1 skip=160 count=10
/dev/block/mcblk0p17: cannot open for read: No such file or directory
# exit
exit
C:\android-sdk\platform-tools>adb push fre3vo /data/local/tmp
797 KB/s (9796 bytes in 0.012s)
C:\android-sdk\platform-tools>adb shell
# chmod 777 /data/local/tmp/fre3vo
chmod 777 /data/local/tmp/fre3vo
# /data/local/tmp/fre3vo -debug -start FAA90000 -end FFFFFFFF
/data/local/tmp/fre3vo -debug -start FAA90000 -end FFFFFFFF
fre3vo by #teamwin
Please wait...
Attempting to modify ro.secure property...
fb_fix_screeninfo:
id: msmfb
smem_start: 802160640
smem_len: 3145728
type: 0
type_aux: 0
visual: 2
xpanstep: 0
ypanstep: 1
line_length: 1920
mmio_start: 0
accel: 0
fb_var_screeninfo:
xres: 480
yres: 800
xres_virtual: 480
yres_virtual: 1600
xoffset: 0
yoffset: 0
bits_per_pixel: 32
activate: 16
height: 80
width: 48
rotate: 0
grayscale: 0
nonstd: 0
accel_flags: 0
pixclock: 0
left_margin: 0
right_margin: 0
upper_margin: 0
lower_margin: 0
hsync_len: 0
vsync_len: 0
sync: 0
vmode: 0
Buffer offset: 00000000
Buffer size: 8192
Scanning region faa90000...
Scanning region fab80000...
Scanning region fac70000...
Scanning region fad60000...
Scanning region fae50000...
Scanning region faf40000...
Scanning region fb030000...
Scanning region fb120000...
Scanning region fb210000...
Scanning region fb300000...
Scanning region fb3f0000...
Scanning region fb4e0000...
Scanning region fb5d0000...
Scanning region fb6c0000...
Scanning region fb7b0000...
Scanning region fb8a0000...
Scanning region fb990000...
Scanning region fba80000...
Potential exploit area found at address fbb55c00:400.
Payload verification failed.
Scanning region fbb70000...
Scanning region fbc60000...
Scanning region fbd50000...
Scanning region fbe40000...
Scanning region fbf30000...
Scanning region fc020000...
Scanning region fc110000...
Scanning region fc200000...
Scanning region fc2f0000...
Scanning region fc3e0000...
Scanning region fc4d0000...
Scanning region fc5c0000...
Scanning region fc6b0000...
Scanning region fc7a0000...
Scanning region fc890000...
Scanning region fc980000...
Scanning region fca70000...
Scanning region fcb60000...
Scanning region fcc50000...
Scanning region fcd40000...
Scanning region fce30000...
Scanning region fcf20000...
Scanning region fd010000...
Scanning region fd100000...
Scanning region fd1f0000...
Scanning region fd2e0000...
Scanning region fd3d0000...
Scanning region fd4c0000...
Scanning region fd5b0000...
Scanning region fd6a0000...
Scanning region fd790000...
Scanning region fd880000...
Scanning region fd970000...
Scanning region fda60000...
Scanning region fdb50000...
Scanning region fdc40000...
Scanning region fdd30000...
Scanning region fde20000...
Scanning region fdf10000...
Scanning region fe000000...
Scanning region fe0f0000...
Scanning region fe1e0000...
Scanning region fe2d0000...
Scanning region fe3c0000...
Scanning region fe4b0000...
Scanning region fe5a0000...
Scanning region fe690000...
Scanning region fe780000...
Scanning region fe870000...
Scanning region fe960000...
Scanning region fea50000...
Scanning region feb40000...
Scanning region fec30000...
Scanning region fed20000...
Scanning region fee10000...
Scanning region fef00000...
Scanning region feff0000...
Scanning region ff0e0000...
Scanning region ff1d0000...
Scanning region ff2c0000...
Scanning region ff3b0000...
Scanning region ff4a0000...
Scanning region ff590000...
Scanning region ff680000...
Scanning region ff770000...
Scanning region ff860000...
Scanning region ff950000...
Scanning region ffa40000...
Scanning region ffb30000...
Scanning region ffc20000...
Scanning region ffd10000...
Scanning region ffe00000...
Scanning region ffef0000...
Scanning region fffe0000...
# adb shell
adb shell
adb: not found
# exit
exit
C:\android-sdk\platform-tools>adb push misc_version /data/local/tmp/misc_version
1189 KB/s (15837 bytes in 0.013s)
C:\android-sdk\platform-tools>adb push flashgc /data/local/tmp/flashgc
1661 KB/s (712688 bytes in 0.419s)
C:\android-sdk\platform-tools>adb shell
# cd /data/local/tmp
cd /data/local/tmp
# ./misc_version -s 1.00.000.0
./misc_version -s 1.00.000.0
./misc_version: permission denied
# exit
exit
C:\android-sdk\platform-tools>adb push misc_version /data/local/tmp/misc_version
1405 KB/s (15837 bytes in 0.011s)
C:\android-sdk\platform-tools>adb push flashgc /data/local/tmp/flashgc
1611 KB/s (712688 bytes in 0.432s)
C:\android-sdk\platform-tools>adb shell chmod 777 /data/local/tmp/*
C:\android-sdk\platform-tools>adb shell
# cd /data/local/tmp
cd /data/local/tmp
# ./misc_version -s 1.00.000.0
./misc_version -s 1.00.000.0
--set_version set. VERSION will be changed to: 1.00.000.0
Patching and backing up partition 17...
# ./flashgc
./flashgc
Backing up sd-card MBR to file "./sdcardMbr-backup.img".
Making sd-card golden.
Writing gold-card to sd-card (/dev/block/mmcblk1) ...
SUCCESS: SD-card is golden.
# dd if=/dev/block/mmcblk0p17 bs=1 skip=160 count=10
dd if=/dev/block/mmcblk0p17 bs=1 skip=160 count=10
1.00.000.010+0 records in
10+0 records out
10 bytes transferred in 0.003 secs (3333 bytes/sec)
# exit
exit
C:\android-sdk\platform-tools>adb push su /data/local/tmp/
278 KB/s (22228 bytes in 0.078s)
C:\android-sdk\platform-tools>adb push busybox /data/local/tmp/
1616 KB/s (1372660 bytes in 0.829s)
C:\android-sdk\platform-tools>adb push fixsu.sh /data/local/tmp/
13 KB/s (594 bytes in 0.042s)
C:\android-sdk\platform-tools>adb install SuperUser.apk
1004 KB/s (196521 bytes in 0.191s)
pkg: /data/local/tmp/SuperUser.apk
Success
Ok so are you saying you ran visionary before downgrading to the PD15IMG(2.2.1)?
Sent from my HTC Glacier using xda premium
Yes. I didn't realize that the new MT4G that Tmobile shipped was on 2.3.4 so I just went in and followed the GFree Root process using visionary so that I could downgrade.
Currently:
Glacier PVT Ship S-Off
Hboot - 0.89.005 - this changes when i flash the 2.2.1 or the 2.3.4 PD15IMG
microp-0429
Radio -26.11.04.03_m
emmc -boot
every now and again when I flash the 2.3.4 PD15IMG I can get the phone booted, but as soon as it powers down splash screen. additionally, it now gets the green circle when going into recovery for 30 seconds or so and then the red triangle. further feedback is greatly appreciated.
ihackback said:
Yes. I didn't realize that the new MT4G that Tmobile shipped was on 2.3.4 so I just went in and followed the GFree Root process using visionary so that I could downgrade.
Click to expand...
Click to collapse
You cannot root 2.3.4. You need to downgrade to 2.2.1. Please see my noob thread in my signature. It has all of the information you need, on that and other topics you might want to check prior to rooting your phone.
Understood. The issue I am having is that I tried to root using visionary gfree with 2.3.4 and have been having issues since. I am now trying to determine if my phn is done. I brought it back to life briefly after flashing the 2.3.4 gingerbread which was stock on the new phn, I then followed the down grade process and flashed back to 2.2.1 which booted up fine. The phone then powered down and now I can't get passed the splash screen. I've tried flashing back to 2.3.4 and to 2.2.1 and the only thing that happens is the hboot number changes, but the rom never boots.
ihackback said:
I've tried flashing back to 2.3.4 and to 2.2.1 and the only thing that happens is the hboot number changes, but the rom never boots.
Click to expand...
Click to collapse
You have good matching MD5SUMs?
Dunno, can you further explain MD5SUMs?
He is saying you probably had bad download and I know you can't even check because you can't pass the the splach screen so what I would do is download the PD15IMG for 2.3.4 (again) and it should erase anything you have done and try again that way.
Sent from my HTC Glacier using XDA App
Yeah, try redownloading. Your connection was probably interrupted during the download.
ihackback said:
Dunno, can you further explain MD5SUMs?
Click to expand...
Click to collapse
Was your replacement s=off when you received it or did you manage to get it s=off with gfree process?
To answer your question about md5sum. It is the alpha numeric code you get after hashing the file. It's purpose is to make sure the received download file matches the original.
Sent from my HTC Glacier using xda premium
I managed to get S-Off using the visionary / gfree method on the 2.3.4 gingerbread. The phone just got all flaky after that. I got access, downgraded, flashed rom, and it just keep getting stuck on the splash. Appreciate all the help. Tmobile rocks. They sent me another, no questions asked. I got the new one up and running after a downgrade (1st). I missed the downgrade part last time round. Thanks again.
help error!!
C:\android-sdk-windows\platform-tools>fastboot-windows devices
SH13PRM05225 fastboot
C:\android-sdk-windows\platform-tools>fastboot-windows oem rebootRUU
... OKAY
C:\android-sdk-windows\platform-tools>fastboot-windows flash zip StockRom.zip
sending 'zip' (319593 KB)... OKAY
writing 'zip'... INFOadopting the signature contained in this image...
INFOsignature checking...
INFOzip header checking...
INFOzip info parsing...
INFOchecking model ID...
INFOchecking custom ID...
INFOchecking main version...
FAILED (remote: 43 main version check fail)
C:\android-sdk-windows\platform-tools>fastboot-windows flash zip StockRom.zip
sending 'zip' (319593 KB)... OKAY
writing 'zip'... INFOadopting the signature contained in this image...
INFOsignature checking...
INFOzip header checking...
INFOzip info parsing...
INFOchecking model ID...
INFOchecking custom ID...
INFOchecking main version...
FAILED (remote: 43 main version check fail)
C:\android-sdk-windows\platform-tools>fastboot-windows flash zip StockRom.zip
sending 'zip' (319593 KB)... OKAY
writing 'zip'... INFOadopting the signature contained in this image...
INFOsignature checking...
INFOzip header checking...
INFOzip info parsing...
INFOchecking model ID...
INFOchecking custom ID...
INFOchecking main version...
FAILED (remote: 43 main version check fail)
C:\android-sdk-windows\platform-tools>adb reboot bootloader
adb server is out of date. killing...
* daemon started successfully *
error: device not found
C:\android-sdk-windows\platform-tools>fastboot-windows flash zip StockRom
error: cannot load 'StockRom'
C:\android-sdk-windows\platform-tools>fastboot-windows flash zip StockRom.zip
sending 'zip' (319593 KB)... OKAY
writing 'zip'... INFOadopting the signature contained in this image...
INFOsignature checking...
INFOzip header checking...
INFOzip info parsing...
INFOchecking model ID...
INFOchecking custom ID...
INFOchecking main version...
FAILED (remote: 43 main version check fail)
C:\android-sdk-windows\platform-tools>
I have spent hours on xda, downloading gfree, trying to downgrade, trying taco root. I even unlocked bootloader at htc dev and cannot get my phone perm rooted
I have 2.3.4
software 2.32.531.1
i used the guide on how to downgrade to 2.2.1 for the visionary exploit
i keep getting permission denied
Potential exploit area found at address fbb80e00:200.
I am sorry for sounding like "noob" but i wasted the day trying to do this and have given up
Someone please help me, ill even donate a cup of coffee to whoever helps me fix this. No joke from 9 am to 530 pm, i have been going in circles, i downloaded the htc easy root tool all failed
the farthest i made it was getting temp root with taco root, but there are no clear cut instructions for what to do after, these guides are over a year old prior to my version of android
I'm not sure where your going wrong but the guides work fine. I used them to downgrade, perm root, and flash the engineering bootloader. Have you tried asking in the q and a section? I'm sure you will find a solution, if you ask in the proper place.
Sent from my HTC Glacier using Tapatalk
I would try this guide http://forum.xda-developers.com/showthread.php?p=15851661
Sent from my HTC Glacier using xda premium
i have been on here for 9 hours going through the q/a this is a brand new str8 from t-mobile mytouch 4g with the newest possible rom, a year ago i successfully did this dozens of time with visionary, its this new rom thats the problem, i put virtuous rom successfully on my first mytouch a year ago, and ive rooted my hd2 for friends and family, so i know my way around xda, this is the first time im truly stuck
cnote 74 i tried that guide my expolit area "fbb80e00:200" is not covered by that guide, if you look at the 5 or 6 lines
$ /data/local/tmp/fre3vo -debug -start 10000000 -end 1FFFFFFF
$ /data/local/tmp/fre3vo -debug -start 20000000 -end 2FFFFFFF
$ /data/local/tmp/fre3vo -debug -start 30000000 -end 3FFFFFFF
$ /data/local/tmp/fre3vo -debug -start F0000000 -end FFFFFFFF
$ /data/local/tmp/fre3vo -debug -start E0000000 -end EFFFFFFF
mine is different than all of these
this is what ive been getting, i followed the guide to the T
C:\AndroidSDK\platform-tools>adb shell cat /dev/msm_rotator
adb server is out of date. killing...
* daemon started successfully *
/dev/msm_rotator: invalid length
C:\AndroidSDK\platform-tools>adb push fre3vo /data/local/tmp
869 KB/s (9796 bytes in 0.011s)
C:\AndroidSDK\platform-tools>adb shell
$ chmod 777 /data/local/tmp/fre3vo
chmod 777 /data/local/tmp/fre3vo
$ /data/local/tmp/fre3vo -debug -start FAA90000 -end FFFFFFFF
/data/local/tmp/fre3vo -debug -start FAA90000 -end FFFFFFFF
fre3vo by #teamwin
Please wait...
Attempting to modify ro.secure property...
fb_fix_screeninfo:
id: msmfb
smem_start: 802160640
smem_len: 3145728
type: 0
type_aux: 0
visual: 2
xpanstep: 0
ypanstep: 1
line_length: 1920
mmio_start: 0
accel: 0
fb_var_screeninfo:
xres: 480
yres: 800
xres_virtual: 480
yres_virtual: 1600
xoffset: 0
yoffset: 800
bits_per_pixel: 32
activate: 16
height: 80
width: 48
rotate: 0
grayscale: 0
nonstd: 0
accel_flags: 0
pixclock: 0
left_margin: 0
right_margin: 0
upper_margin: 0
lower_margin: 0
hsync_len: 0
vsync_len: 0
sync: 0
vmode: 0
Buffer offset: 00000000
Buffer size: 8192
Scanning region faa90000...
Scanning region fab80000...
Scanning region fac70000...
Scanning region fad60000...
Scanning region fae50000...
Scanning region faf40000...
Scanning region fb030000...
Scanning region fb120000...
Scanning region fb210000...
Scanning region fb300000...
Scanning region fb3f0000...
Scanning region fb4e0000...
Scanning region fb5d0000...
Scanning region fb6c0000...
Scanning region fb7b0000...
Scanning region fb8a0000...
Scanning region fb990000...
Scanning region fba80000...
Potential exploit area found at address fbb6c400:c00.
Exploiting device...
C:\AndroidSDK\platform-tools>adb shell
adb server is out of date. killing...
* daemon started successfully *
# exit
exit
C:\AndroidSDK\platform-tools>adb push misc_version /data/local/tmp/misc_version
1718 KB/s (15837 bytes in 0.009s)
C:\AndroidSDK\platform-tools>adb shell chmod 777 /data/local/tmp/
C:\AndroidSDK\platform-tools>adb shell
# cd /data/local/tmp
cd /data/local/tmp
# ./misc_version -s 1.00.000.0
./misc_version -s 1.00.000.0
./misc_version: permission denied
#
1st off.......THIS IS THE DEVELOPMENT SECTION! NOT Q&A! THATS WHAT THE Q&A IS FOR!
2nd....its because you unlocked via htcdev, which we have warned users multiple times if you did read the Q&A and General forums.
Htcdev method makes it harder to root/flash a ROM. We warned you. And then you complain and post in the wrong section!
Edit: also.....If you knew to put "DON'T MOVE THREAD", why did you post it here in the first place?
Sent from my HoneySmartDroid Port using XDA Premium.
Edit: I like that better /\
Sent from my HTC Glacier using Tapatalk
Chek this out bro hope it help ;-) http://forum.xda-developers.com/showthread.php?p=9551846
Sent from my HTC Mytouch 4G using xda premium
still stuck invasion2 you have a solution
michael.racelli said:
still stuck invasion2 you have a solution
Click to expand...
Click to collapse
Sorryf for flaming.....anyway I did find something... http://www.forum.xda-developers.com/showthread.php?p=21563546
Sent from my HoneySmartDroid Port using XDA Premium.
michael.racelli said:
I have spent hours on xda, downloading gfree, trying to downgrade, trying taco root. I even unlocked bootloader at htc dev and cannot get my phone perm rooted
I have 2.3.4
software 2.32.531.1
i used the guide on how to downgrade to 2.2.1 for the visionary exploit
i keep getting permission denied
Potential exploit area found at address fbb80e00:200.
I am sorry for sounding like "noob" but i wasted the day trying to do this and have given up
Someone please help me, ill even donate a cup of coffee to whoever helps me fix this. No joke from 9 am to 530 pm, i have been going in circles, i downloaded the htc easy root tool all failed
the farthest i made it was getting temp root with taco root, but there are no clear cut instructions for what to do after, these guides are over a year old prior to my version of android
Click to expand...
Click to collapse
no need to downgrade
http://forum.xda-developers.com/showthread.php?t=803682
I relocked the bootloader, still the same thing permission denied, am i the only one who has encountered this issue, i cannot root downgrade right now if my life depended on it right now
adb push misc_version /data/local/tmp/misc_version
> adb push flashgc /data/local/tmp/flashgc
> adb shell chmod 777 /data/local/tmp/* <--------(THIS LINE IS YOUR MISTAKE)
> adb shell
# cd /data/local/tmp
# ./misc_version -s 1.00.000.0
--set_version set. VERSION will be changed to: 1.00.000.0
Patching and backing up partition 17...
# ./flashgc
Click to expand...
Click to collapse
Click to expand...
Click to collapse
From what I gathered on your post, I am thinking you did a pastebin which is good. If you did, and it copied straight from you command prompt, than you are missing an (*) at the end of the adb chmod 777 /data/local/tmp/.
I recently used the guide to downgrade/root/flash e-bootloader/flash rom on 2 brand new 2.3.4 mytouch 4gs 2 weeks ago.
Also if you can manage to safe some time and headache reformat your SD card with the PD15IMG on to to fat32. If you dont you have a very likely chance that when you attempt to flash the PD15IMG to get a no image or bad image error in your bootloader when downgrading.
Slow down, step away from the computer, take a break and come back and START OVER. I spent 2 days getting that damned error on the pd15img.
edit:The quoted text is from the downgrading guide.
thank you for responding but that link you sent me shows up as a dead link, didnt go anywhere bro
michael.racelli said:
thank you for responding but that link you sent me shows up as a dead link, didnt go anywhere bro
Click to expand...
Click to collapse
http://forum.xda-developers.com/showthread.php?p=15851661
This is the downgrading guide that I believe you have been using. Its the same I used. Like I said start over, and make sure every line in your cmd is typed exactly the way it is written in the thread.
If you feel you must, you can even copy and paste line by line into command prompt
Heh, sorry. Here you are! http://forum.xda-developers.com/showthread.php?p=21563546
hellmonger said:
no need to downgrade
http://forum.xda-developers.com/showthread.php?t=803682
Click to expand...
Click to collapse
Hellmonger, I never got superoneclick to work on 2.3.4 mytouch 4g. Tried it and it gets stuck on the psneuter
---------- Post added at 06:48 PM ---------- Previous post was at 06:46 PM ----------
invasion2 said:
Heh, sorry. Here you are! http://forum.xda-developers.com/showthread.php?p=21563546
Click to expand...
Click to collapse
This is for the desire/g2 it wont work. Use the link I posted.
. . .
knew someone was gonna take me the wrong way. deleted.
seeing from what other users have posted, it seems that you have "unlocked" your bootloader the Official HTC way. then there's not much anyone here can do for you, since that way wasn't recommended anyway.
but since your bootloader is now "unlocked", i don't see why you need to follow the downgrade procedure anymore. from looking at other device forums, i see that all you gotta do is get a custom recovery on there somehow, flash a rooted ROM, flash the boot image of that ROM (since you decided to do it the HTC way) and that's pretty much it...
Contacting a mod at once...
^^^^^^^ I did the same -______-
downgrading problem
every thing goes good till i get to here im on mytouch 4g help me
i use this guide
http://forum.xda-developers.com/showthread.php?t=1178912
# ./misc_version -s 1.00.000.0
./misc_version -s 1.00.000.0
./misc_version: permission denied
adb shell chmod 777 /data/local/tmp/*
You didn't do that or didn't successfully do that.
Redo that. COPY the command AS IS.
If you want, you can do it just before running ./misc_version, while being in the shell. In this case you just need to type chmod 777 *.
C:\android-sdk\platform-tools>adb shell cat /dev/msm_rotator
/dev/msm_rotator: invalid length
C:\android-sdk\platform-tools>adb push fre3vo /data/local/tmp
push: fre3vo/__MACOSX/._fre3vo -> /data/local/tmp/__MACOSX/._fre3vo
push: fre3vo/fre3vo -> /data/local/tmp/fre3vo
2 files pushed. 0 files skipped.
222 KB/s (10025 bytes in 0.043s)
C:\android-sdk\platform-tools>adb shell
$ chmod 777 /data/local/tmp/fre3vo
chmod 777 /data/local/tmp/fre3vo
$ /data/local/tmp/fre3vo -debug -start FAA90000 -end FFFFFFFF
/data/local/tmp/fre3vo -debug -start FAA90000 -end FFFFFFFF
fre3vo by #teamwin
Please wait...
Attempting to modify ro.secure property...
fb_fix_screeninfo:
id: msmfb
smem_start: 802160640
smem_len: 3145728
type: 0
type_aux: 0
visual: 2
xpanstep: 0
ypanstep: 1
line_length: 1920
mmio_start: 0
accel: 0
fb_var_screeninfo:
xres: 480
yres: 800
xres_virtual: 480
yres_virtual: 1600
xoffset: 0
yoffset: 0
bits_per_pixel: 32
activate: 16
height: 80
width: 48
rotate: 0
grayscale: 0
nonstd: 0
accel_flags: 0
pixclock: 0
left_margin: 0
right_margin: 0
upper_margin: 0
lower_margin: 0
hsync_len: 0
vsync_len: 0
sync: 0
vmode: 0
Buffer offset: 00000000
Buffer size: 8192
Scanning region faa90000...
Scanning region fab80000...
Scanning region fac70000...
Scanning region fad60000...
Scanning region fae50000...
Scanning region faf40000...
Scanning region fb030000...
Scanning region fb120000...
Scanning region fb210000...
Scanning region fb300000...
Scanning region fb3f0000...
Scanning region fb4e0000...
Scanning region fb5d0000...
Scanning region fb6c0000...
Scanning region fb7b0000...
Scanning region fb8a0000...
Scanning region fb990000...
Scanning region fba80000...
Scanning region fbb70000...
Potential exploit area found at address fbb80e00:200.
Exploiting device...
C:\android-sdk\platform-tools>adb shell
# exit
exit
C:\android-sdk\platform-tools>adb push misc_version /data/local/tmp/misc_version
push: misc_version/misc_version.c -> /data/local/tmp/misc_version/misc_version.c
push: misc_version/misc_version -> /data/local/tmp/misc_version/misc_version
push: misc_version/gopt.h -> /data/local/tmp/misc_version/gopt.h
push: misc_version/gopt.c -> /data/local/tmp/misc_version/gopt.c
4 files pushed. 0 files skipped.
341 KB/s (31399 bytes in 0.089s)
C:\android-sdk\platform-tools>adb push flashgc /data/local/tmp/flashgc
push: flashgc/flashgc -> /data/local/tmp/flashgc/flashgc
1 file pushed. 0 files skipped.
1566 KB/s (712688 bytes in 0.444s)
C:\android-sdk\platform-tools>adb shell chmod 777 /data/local/tmp/*
C:\android-sdk\platform-tools>adb shell
# cd /data/local/tmp
cd /data/local/tmp
# ./misc_version -s 1.00.000.0
./misc_version -s 1.00.000.0
./misc_version: permission denied
#
Click to expand...
Click to collapse
this is what i did
Jack_R1 said:
adb shell chmod 777 /data/local/tmp/*
You didn't do that or didn't successfully do that.
Redo that. COPY the command AS IS.
If you want, you can do it just before running ./misc_version, while being in the shell. In this case you just need to type chmod 777 *.
Click to expand...
Click to collapse
# chmod 777 /*
chmod 777 /*
Unable to chmod /bootcomplete.rc: Read-only file system
# ./misc_version -s 1.00.000.0
./misc_version -s 1.00.000.0
./misc_version: permission denied
# ./misc_version -s 1.00.000.0
./misc_version -s 1.00.000.0
./misc_version: permission denied
# chmod 777 *
chmod 777 *
# ./misc_version -s 1.00.000.0
./misc_version -s 1.00.000.0
./misc_version: permission denied
# chmod 777 *.
chmod 777 *.
Unable to chmod *.: No such file or directory
#
i just dont see what im i dong wrong
You unzipped the ZIP file misc_version in another subfolder, rather than locally.
When you're pushing misc_version, you're pushing subfolder instead of the file. This makes the executable file misc_version to be at /data/local/tmp/misc_version/misc_version and not /data/local/tmp/misc_version, as it should have been. The log is clear as a sun and shows it in a very visible way. Of course it means that the simple earlier step that says "extract the files here" wasn't executed properly, and you couldn't see this mistake of yours.
Of course, since the file isn't in the correct place, the command doesn't work.
Execute the commands as follows:
C:\android-sdk\platform-tools>adb shell chmod 777 /data/local/tmp/misc_version/*
C:\android-sdk\platform-tools>adb shell
# cd /data/local/tmp/misc_version
# ./misc_version -s 1.00.000.0
C:\android-sdk\platform-tools>adb shell cat /dev/msm_rotator
/dev/msm_rotator: invalid length
C:\android-sdk\platform-tools>adb push fre3vo /data/local/tmp
push: fre3vo/__MACOSX/._fre3vo -> /data/local/tmp/__MACOSX/._fre3vo
push: fre3vo/fre3vo -> /data/local/tmp/fre3vo
2 files pushed. 0 files skipped.
113 KB/s (10025 bytes in 0.085s)
C:\android-sdk\platform-tools>adb shell
$ chmod 777 /data/local/tmp/fre3vo
chmod 777 /data/local/tmp/fre3vo
$ /data/local/tmp/fre3vo -debug -start FAA90000 -end FFFFFFFF
/data/local/tmp/fre3vo -debug -start FAA90000 -end FFFFFFFF
fre3vo by #teamwin
Please wait...
Attempting to modify ro.secure property...
fb_fix_screeninfo:
id: msmfb
smem_start: 802160640
smem_len: 3145728
type: 0
type_aux: 0
visual: 2
xpanstep: 0
ypanstep: 1
line_length: 1920
mmio_start: 0
accel: 0
fb_var_screeninfo:
xres: 480
yres: 800
xres_virtual: 480
yres_virtual: 1600
xoffset: 0
yoffset: 0
bits_per_pixel: 32
activate: 16
height: 80
width: 48
rotate: 0
grayscale: 0
nonstd: 0
accel_flags: 0
pixclock: 0
left_margin: 0
right_margin: 0
upper_margin: 0
lower_margin: 0
hsync_len: 0
vsync_len: 0
sync: 0
vmode: 0
Buffer offset: 00000000
Buffer size: 8192
Scanning region faa90000...
Scanning region fab80000...
Scanning region fac70000...
Scanning region fad60000...
Scanning region fae50000...
Scanning region faf40000...
Scanning region fb030000...
Scanning region fb120000...
Scanning region fb210000...
Scanning region fb300000...
Scanning region fb3f0000...
Scanning region fb4e0000...
Scanning region fb5d0000...
Scanning region fb6c0000...
Scanning region fb7b0000...
Scanning region fb8a0000...
Scanning region fb990000...
Scanning region fba80000...
Scanning region fbb70000...
Potential exploit area found at address fbb80e00:200.
Exploiting device...
C:\android-sdk\platform-tools>adb shell
# exit
exit
C:\android-sdk\platform-tools>adb push misc_version /data/local/tmp/misc_version
push: misc_version/misc_version.c -> /data/local/tmp/misc_version/misc_version.c
push: misc_version/misc_version -> /data/local/tmp/misc_version/misc_version
push: misc_version/gopt.h -> /data/local/tmp/misc_version/gopt.h
push: misc_version/gopt.c -> /data/local/tmp/misc_version/gopt.c
4 files pushed. 0 files skipped.
268 KB/s (31399 bytes in 0.114s)
C:\android-sdk\platform-tools>adb push flashgc /data/local/tmp/flashgc
push: flashgc/flashgc -> /data/local/tmp/flashgc/flashgc
1 file pushed. 0 files skipped.
1322 KB/s (712688 bytes in 0.526s)
C:\android-sdk\platform-tools>adb shell chmod 777 /data/local/tmp/*
C:\android-sdk\platform-tools>adb shell chmod 777 /data/local/tmp/misc_version/*
C:\android-sdk\platform-tools>adb shell
# cd /data/local/tmp/misc_version
cd /data/local/tmp/misc_version
# ./misc_version -s 1.00.000.0
./misc_version -s 1.00.000.0
--set_version set. VERSION will be changed to: 1.00.000.0
Patching and backing up partition 17...
#
Click to expand...
Click to collapse
thx man we need to fix the guide
./flashgc
./flashgc: permission denied
#
C:\android-sdk\platform-tools>
The guide isn't wrong, you are. Probably hundreds or thousands of people used this guide for downgrading, here you come and the guide is suddenly wrong? And the same applies to the next failure - it's EXACTLY the same. Why is it so hard to make a single small step yourself?
Plus, you don't need flashgc. You can proceed with downgrading now.
thx jack_R1 you the man im perma root and s-off now i just have to see how to flash roms
Install custom recovery, boot into it, copy the ROM on SD card, wipe everything, flash.
These are the approximate steps. You can search for each step, or just search "mytouch 4g flash custom rom" in Youtube, you'll likely find a guide.
Hi
I am a noob and google translation is my friend but is not 100% reliable, so be patient.
I want to downgrade but when I do adb shell commands have errors and something you are wrong:
C:\android-sdk-windows\platform-tools>adb push fre3vo /data/local/tmp
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
1195 KB/s (9796 bytes in 0.008s)
C:\android-sdk-windows\platform-tools>adb push misc_version /data/local/tmp
2209 KB/s (15837 bytes in 0.007s)
C:\android-sdk-windows\platform-tools>adb shell
$ chmod 777 /data/local/tmp/fre3vo
chmod 777 /data/local/tmp/fre3vo
$ chmod 777 /data/local/tmp/misc_version/data/local/tmp/fre3vo -debug -start FAA
90000 -end FFFFFFFF
chmod 777 /data/local/tmp/misc_version/data/local/tmp/fre3vo -debug -start FAA90
000 -end FFFFFFFF
Unable to chmod /data/local/tmp/misc_version/data/local/tmp/fre3vo: Not a direct
ory
$
C:\android-sdk-windows\platform-tools>
I think the installation of the adb is correct but I can not find the problem.
You accidentally put 2 commands together
chmod 777 /data/local/tmp/misc_version/data/local/tmp/fre3vo -debug -start FAA90000 -end FFFFFFFF
Should be:
chmod 777 /data/local/tmp/misc_version
/data/local/tmp/fre3vo -debug -start FAA90000 -end FFFFFFFF
-Nipqer
upss
I will try, thank you
Now i got this:
C:\android-sdk-windows\platform-tools>adb push fre3vo /data/local/tmp
1195 KB/s (9796 bytes in 0.008s)
C:\android-sdk-windows\platform-tools>adb shell
$ chmod 777 /data/local/tmp/fre3vo
chmod 777 /data/local/tmp/fre3vo
$ /data/local/tmp/fre3vo -debug -start FAA90000 -end FFFFFFFF
/data/local/tmp/fre3vo -debug -start FAA90000 -end FFFFFFFF
fre3vo by #teamwin
Please wait...
Attempting to modify ro.secure property...
fb_fix_screeninfo:
id: msmfb
smem_start: 802160640
smem_len: 3145728
type: 0
type_aux: 0
visual: 2
xpanstep: 0
ypanstep: 1
line_length: 1920
mmio_start: 0
accel: 0
fb_var_screeninfo:
xres: 480
yres: 800
xres_virtual: 480
yres_virtual: 1600
xoffset: 0
yoffset: 800
bits_per_pixel: 32
activate: 16
height: 80
width: 48
rotate: 0
grayscale: 0
nonstd: 0
accel_flags: 0
pixclock: 0
left_margin: 0
right_margin: 0
upper_margin: 0
lower_margin: 0
hsync_len: 0
vsync_len: 0
sync: 0
vmode: 0
Buffer offset: 00000000
Buffer size: 8192
Scanning region faa90000...
Scanning region fab80000...
Scanning region fac70000...
Scanning region fad60000...
Scanning region fae50000...
Scanning region faf40000...
Scanning region fb030000...
Scanning region fb120000...
Scanning region fb210000...
Scanning region fb300000...
Scanning region fb3f0000...
Scanning region fb4e0000...
Scanning region fb5d0000...
Scanning region fb6c0000...
Scanning region fb7b0000...
Scanning region fb8a0000...
Scanning region fb990000...
Scanning region fba80000...
Potential exploit area found at address fbb55c00:400.
Exploiting device...
C:\android-sdk-windows\platform-tools>
Is normal?
I got # when i type the command adb shell
# in the shell means you have escalated acess (root/super user).
$ means normal access.
What method are you using?
It's been a long time since I went through it, but I believe all you've done is gained temp root access. You still need to S-OFF, hboot, and install a recovery which will then allow you to flash different ROMs.
I'm using this method: http://wiki.cyanogenmod.com/wiki/HTC_Desire_Z:_Firmware_Downgrade_(Gingerbread)
I need downgrade my phone for root, I can not have the root with the gingerbread.
Use flashgc from this guide
The 'Gaining SuperCID with a Goldcard' part
-Nipqer
I'm in 2.2 now , thank you all, what tutorial you suggest?
I'd recommend either the XDA Wiki, or the Cyanogenmod Wiki
Both guides are identical for the method, but the XDA wiki has a lot of information, explaining what is happening, whereas the cm wiki is just commands.
-Nipqer
I already root and the s-off, thank you for the help
Silence7887 said:
I already root and the s-off, thank you for the help
Click to expand...
Click to collapse
can u explain me the way u tried?
Use this method: http://forum.xda-developers.com/showthread.php?t=1178912
For me, I had no root, I had the s-off and recovery install but not the root! Try and if you also have the s-off and recovery install but without the root, then I would try to help you.