Anyone out there willing to help me out?
I just someone to run this command with their phone hooked up, USB Debugging ENABLED:
adb shell ls -l -R /sys/class > class_structure_DROID_TWO.txt
This will output a text file in whichever directory you run the command from, that will list the hardware capabilities of the phone for me - this would help me IMMENSELY from a development standpoint!
Check out the text file - zero personal / private information will be in there!
Thanks!
See attached.
Double post.
karnovaran said:
See attached.
Click to expand...
Click to collapse
Awesome, thank you! I'm assuming you're unrooted?
Doward said:
Awesome, thank you! I'm assuming you're unrooted?
Click to expand...
Click to collapse
Yep, no Droid 2 root available yet.
karnovaran said:
Yep, no Droid 2 root available yet.
Click to expand...
Click to collapse
You want to beta test something for me?
Doward said:
You want to beta test something for me?
Click to expand...
Click to collapse
Sure. I'm not a dev, but I've been using and modding Androids since last May.
karnovaran said:
Sure. I'm not a dev, but I've been using and modding Androids since last May.
Click to expand...
Click to collapse
Cool - I need 2 more files, though...
adb shell ls -l -R /sys/devices/platform > platform_structure_DROID_TWO.txt
and
adb shell ls -l -R /sys/devices/virtual > virtual_structure_DROID_TWO.txt
They are larger than XDA will allow.. PM your e-mail address?
karnovaran said:
They are larger than XDA will allow.. PM your e-mail address?
Click to expand...
Click to collapse
PM sent! 10char
would gladly help test anything as well on mine.
Hi there!
can someone on 4.2.1 post the content of INIT.RC?
Location is: rootdir/init.rc
I'm looking for the BOOTCLASSPATH
Thanks!
Nevermind..
4.1.1
Code:
export BOOTCLASSPATH /system/framework/core.jar:/system/framework/core-junit.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/framework2.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/apache-xml.jar
4.2.1
Code:
export BOOTCLASSPATH /system/framework/core.jar:/system/framework/core-junit.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/telephony-common.jar:/system/framework/mms-common.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/apache-xml.jar
xXlAinXx said:
Hi there!
can someone on 4.2.1 post the content of INIT.RC?
Location is: rootdir/init.rc
I'm looking for the BOOTCLASSPATH
Thanks!
Nevermind..
4.1.1
Code:
export BOOTCLASSPATH /system/framework/core.jar:/system/framework/core-junit.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/framework2.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/apache-xml.jar
4.2.1
Code:
export BOOTCLASSPATH /system/framework/core.jar:/system/framework/core-junit.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/telephony-common.jar:/system/framework/mms-common.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/apache-xml.jar
Click to expand...
Click to collapse
Great everything worked out :good:
Can you add SOLVED to the thread title
Thx Josh
I got the actual command from this thread.I've just created the flashable zip
YOU NEED S-OFF TO DO THIS
I hope scotty1223 doesn't mind
This zip just removes the tampered banner from the bootloader. I've also included a zip to revert it back just in case you want it(for some reason )
Just flash the zip from the recovery and you're done!
I was not sure if I should create a new thread or not. If any mods believe that I shouldn't just delete the thread.
************************************NOTE*********************************************
I've tested this only on International M8. If you want to make sure this is going to work on your variant then type this command in a terminal emulator or ADB Shell:
Code:
dd if=/dev/block/mmcblk0p6 of=/sdcard/mmcblk0p6.img
This will create a file in your SD Card. Upload the file here and I'll check and tell you whether this MOD is going to work for your variant.
UPDATE:
RemoveV2.zip does not work. Do not use it!.
UPDATE:
RemoveV3.zip fixes the garbage byte problem. Everyone should flash this one if Remove.zip does not work!.
andreasyeah said:
I got the actual command from this thread.I've just created the flashable zip
YOU NEED S-OFF TO DO THIS
I hope scotty1223 doesn't mind
This zip just removes the tampered banner from the bootloader. I've also included a zip to revert it back just in case you want it(for some reason )
Just flash the zip from the recovery and you're done!
I was not sure if I should create a new thread or not. If any mods believe that I shouldn't just delete the thread.
Click to expand...
Click to collapse
Thanks.:good:
andreasyeah said:
I got the actual command from this thread.I've just created the flashable zip
YOU NEED S-OFF TO DO THIS
I hope scotty1223 doesn't mind
This zip just removes the tampered banner from the bootloader. I've also included a zip to revert it back just in case you want it(for some reason )
Just flash the zip from the recovery and you're done!
I was not sure if I should create a new thread or not. If any mods believe that I shouldn't just delete the thread.
Click to expand...
Click to collapse
Thanks for this easy mod but I have a quick question, do I flash this on the TWRP recovery or the stock recovery? Thanks in advance
jpone7 said:
Thanks for this easy mod but I have a quick question, do I flash this on the TWRP recovery or the stock recovery? Thanks in advance
Click to expand...
Click to collapse
You're welcome. You flash this on any custom recovery. Not stock
thanks
andreasyeah said:
I got the actual command from this thread.I've just created the flashable zip
YOU NEED S-OFF TO DO THIS
I hope scotty1223 doesn't mind
This zip just removes the tampered banner from the bootloader. I've also included a zip to revert it back just in case you want it(for some reason )
Just flash the zip from the recovery and you're done!
I was not sure if I should create a new thread or not. If any mods believe that I shouldn't just delete the thread.
Click to expand...
Click to collapse
anyone try this zip on sprint/m8 harman kardon/verizon series?
monyozt said:
anyone try this zip on sprint/m8 harman kardon/verizon series?
Click to expand...
Click to collapse
I think it works but if you want to make sure
in a terminal emulator or an adb shell type this:
dd if=/dev/block/mmcblk0p6 of=/sdcard/mmcblk0p6.img
Now there is a file on your sdcard with the name mmcblk0p6.img
Send me the file and I'll tell you if it's going to work
Working just great
M8 UL variant, S-Off working perfectly well. Thanks mate :good:
Edit: Harman-Kardon mod installed in case you need to know. Running Maximus HD 6.0.1 under KK 4.4.3.
No matter what i do its not working on international m8 here?
Great thanks... Worked a treat!
Sent from my HTC One_M8 using XDA Premium 4 mobile app
gavin-phelan said:
No matter what i do its not working on international m8 here?
Click to expand...
Click to collapse
Are you S-OFF?
Sent from my HTC One_M8 using XDA Premium 4 mobile app
andreasyeah said:
Are you S-OFF?
Sent from my HTC One_M8 using XDA Premium 4 mobile app
Click to expand...
Click to collapse
Lol yes i am
gavin-phelan said:
Lol yes i am
Click to expand...
Click to collapse
Did you try to do this before using the adb command and failed? I had a similar problem and scotty helped me on his thread.
Try the following. Flash the revert zip first to reset it in case of errors and try the remove zip afterwards
gavin-phelan said:
Lol yes i am
Click to expand...
Click to collapse
Could you please type this command in an adb shell or in terminal emulator?
Code:
dd if=/dev/block/mmcblk0p6 of=/sdcard/mmcblk0p6.img
Upload the mmcblk0p6.img here so I can check it or hex edit this for you
I'm not sure if it's essential but do you have busybox installed?
andreasyeah said:
Could you please type this command in an adb shell or in terminal emulator?
Code:
dd if=/dev/block/mmcblk0p6 of=/sdcard/mmcblk0p6.img
Upload the mmcblk0p6.img here so I can check it or hex edit this for you
I'm not sure if it's essential but do you have busybox installed?
Click to expand...
Click to collapse
Ok one minute please and no i dont jave busybox
---------- Post added at 05:01 PM ---------- Previous post was at 04:35 PM ----------
edit here u go https://docs.google.com/file/d/0B3qCG4HlT_xFakdZRkN4cENqd1E/edit?usp=docslist_api
gavin-phelan said:
Ok one minute please and no i dont jave busybox
---------- Post added at 05:01 PM ---------- Previous post was at 04:35 PM ----------
edit here u go https://docs.google.com/file/d/0B3qCG4HlT_xFakdZRkN4cENqd1E/edit?usp=docslist_api
Click to expand...
Click to collapse
The zip file did its job correctly. I've checked the file you sent me. Are you sure the "TAMPERED" banner is still visible in the bootloader? This does not remove the red text but only the TAMPERED banner. This script just changes one byte and it's already changed
Sent from my HTC One_M8 using XDA Premium 4 mobile app
Will this work on T-Mo M8?
andreasyeah said:
The zip file did its job correctly. I've checked the file you sent me. Are you sure the "TAMPERED" banner is still visible in the bootloader? This does not remove the red text but only the TAMPERED banner. This script just changes one byte and it's already changed
Sent from my HTC One_M8 using XDA Premium 4 mobile app
Click to expand...
Click to collapse
Oh my im sooo sorry i thought this is for the red text for the boot up screen lol
gavin-phelan said:
Oh my im sooo sorry i thought this is for the red text for the boot up screen lol
Click to expand...
Click to collapse
Check your PM
klbjr said:
Will this work on T-Mo M8?
Click to expand...
Click to collapse
Yes it works
I need someone who is good with adb and understands how to pull files and must be on latest OG5 Android 5.1.1. I need so files pulled to test with. Credit will be given in my rom thread.
What files I can try
pbedard said:
What files I can try
Click to expand...
Click to collapse
PM me please, actually I think I have you on hangouts already, what was your name on it again?
Paul bedard
hey may i please have some assistance? i pushed my dirty cow files to my tmobile lg v20 .....and when i do the chmod0777 command it says chmod not found ....please may i have some assistance?
danthesamsung said:
hey may i please have some assistance? i pushed my dirty cow files to my tmobile lg v20 .....and when i do the chmod0777 command it says chmod not found ....please may i have some assistance?
Click to expand...
Click to collapse
You have a screenshot?
Its chmod(space) 0777 not chmod0777