Download link for Verizon 5.1 full image is here - Verizon Motorola Droid Turbo General

Came across this today. I didn't upload it, so thank you to whoever did!
http://www.filefactory.com/file/1bh0acofnjf9/XT1254_QUARK_VERIZON_5.1_SU3TL-38_38_CFC.xml.zip
btw, file factory is slow so be patient.

downloading. Will check the build prop and re upload to file hosts that aren't capped at 50 kb/s in ~7hrs

Found this last night and downloaded overnight.
MEGA mirror: https://mega.co.nz/#!XABCUAKQ!XMAKu5xHTEl06-nXHXUp-R4HrI3NvqfP28pP7dYeXMY
SHA1: e569e17cefe7045c3424a8aae8c7dc0c51f51202
I was able to convert the system.img_sparsechunks by doing:
Code:
simg2img system.img_sparsechunk* system.img.raw
dd if=system.img.raw ibs=2048 skip=64 of=system.img
truncate -s 3539992576 system.img
I don't have enough posts to create a development thread (I'm a quiet dev) but I'll post the stock image + a rooted image once I get it all working.

firstEncounter said:
Found this last night and downloaded overnight.
MEGA mirror: https://mega.co.nz/#!XABCUAKQ!XMAKu5xHTEl06-nXHXUp-R4HrI3NvqfP28pP7dYeXMY
SHA1: e569e17cefe7045c3424a8aae8c7dc0c51f51202
I was able to convert the system.img_sparsechunks by doing:
Code:
simg2img system.img_sparsechunk* system.img.raw
dd if=system.img.raw ibs=2048 skip=64 of=system.img
truncate -s 3539992576 system.img
I don't have enough posts to create a development thread (I'm a quiet dev) but I'll post the stock image + a rooted image once I get it all working.
Click to expand...
Click to collapse
Just FYI - there is a utility that will convert the sparse chunks to a single image ext4 system.img:
http://forum.xda-developers.com/showthread.php?t=2749797
http://forum.xda-developers.com/showpost.php?p=61132614&postcount=3
But there is likely a header and a footer in the file as explained in that thread. Those have to be removed using a HEX Editor before you can flash it using mofo.exe. I wrote out the instructions on how to do that in that thread above.
Then you can root it using @btdownloads7's method found here:
http://forum.xda-developers.com/showpost.php?p=61132621&postcount=4
No need to reinvent the wheel if you have a device running TWRP you can just follow that method.
We have also learned that you have to delete the contents of both /data/dalvik-cache and /cache before you flash an image with Xposed for Lollipop baked into it. This has to do with the conversion from dalvik to ART.
If you are having trouble getting Xposed baked into your image, you can read about @mikeoswego's method here but check to make sure you are using the most recent Xposed files as there have been updates:
http://forum.xda-developers.com/showpost.php?p=61132732&postcount=7

Where does one go about getting these Verizon images? Is it something Verizon issues to the public? If not, how does one trust this image as not being tampered with?

crackd said:
Where does one go about getting these Verizon images? Is it something Verizon issues to the public? If not, how does one trust this image as not being tampered with?
Click to expand...
Click to collapse
They cannot be tampered with, or they cannot be flashed through the signature check, which is what verifies the integrity of the file as well. Mofo, however, does not verify signature for obvious reasons. Where this particular file popped up is hard to say.

http://i.imgur.com/x1OUS1H.png
Working on uploading the images now.

I cannot thank you for this enough. I removed the erase USERDATA line, and I'm hoping that fixes my issue. cross your fingers.

firstEncounter said:
http://i.imgur.com/x1OUS1H.png
Working on uploading the images now.
Click to expand...
Click to collapse
So it worked?

Koneesha said:
So it worked?
Click to expand...
Click to collapse
It did, and we retain the ability to downgrade to 4.4.

firstEncounter said:
It did, and we retain the ability to downgrade to 4.4.
Click to expand...
Click to collapse
how big is the ext4 file?

JulesJam said:
how big is the ext4 file?
Click to expand...
Click to collapse
3376MiB (3539992576 bytes)

firstEncounter said:
http://i.imgur.com/x1OUS1H.png
Working on uploading the images now.
Click to expand...
Click to collapse
Very cool!
I have an XT1225 so root was easy, glad to see Turbo guys can have some fun too.

firstEncounter said:
http://i.imgur.com/x1OUS1H.png
Working on uploading the images now.
Click to expand...
Click to collapse
How did you do it? If it is possible more in detail?

ilia3367 said:
How did you do it? If it is possible more in detail?
Click to expand...
Click to collapse
I posted some more information in this thread, once I get everything settled root-wise and the images uploaded, I'll make a more detailed guide.

firstEncounter said:
Found this last night and downloaded overnight.
MEGA mirror: https://mega.co.nz/#!XABCUAKQ!XMAKu5xHTEl06-nXHXUp-R4HrI3NvqfP28pP7dYeXMY
SHA1: e569e17cefe7045c3424a8aae8c7dc0c51f51202
I was able to convert the system.img_sparsechunks by doing:
Code:
simg2img system.img_sparsechunk* system.img.raw
dd if=system.img.raw ibs=2048 skip=64 of=system.img
truncate -s 3539992576 system.img
I don't have enough posts to create a development thread (I'm a quiet dev) but I'll post the stock image + a rooted image once I get it all working.
Click to expand...
Click to collapse
OMG thanks! i will add it to the main firmware thread!!!!

Related

[REQUEST] Help revert to stock rom (US - Wifi)

Hello,
Apart from /dev/block/mmcblk0p3 (/system), it seems that /dev/block/mmcblk0p6 (mounted to /flexrom) contains the information needed for Acer's update system. Since I have flashed the chineese update.zip, my flexrom data contains the chineese info that prohibits me from updating. I want to revert to stock. Flashing update.zip and then a system image is not enough, since you are left with the wrong data in the flexrom partition.
Could someone please upload a dump of his /dev/block/mmcblk0p6 and /dev/block/mmcblk0p3 while in ACER_A500_1.016.05_COM_GEN1?
Use the following commands:
dd if=/dev/block/mmcblk0p3 of=/sdcard/system.img
dd if=/dev/block/mmcblk0p6 of=/sdcard/flexrom.img
I think we need a way to be able to restore to stock!!!!
Thanks!
Noone can give me a dump?
I'LL try to help you.
Dumps performed. Trying to upload files somewhere
Same spot here
I would love to help you man but I am in thesame spot still trying to 100% restore the tablet... jejeje
CSeb95 said:
I'LL try to help you.
Dumps performed. Trying to upload files somewhere
Click to expand...
Click to collapse
thanks mate!
First file here (flexrom.img) : http://dl.free.fr/uQluj8M9P
100MB compressed into 1.71MB
The second one (system.img) is 600 compressed to about 341MB. it will take time to upload
Can you give me an email where i can send the upload notification?
Upload of system.img started, going to bed.
I'll post the link tomorrow morning.
Testing here...
Alright, I know its not my post but I am trying to get back to stock already too... I already have the system.img from another xda member... I have downloaded the flexrom.img (thanks for the upload!!!)
This is what I have done:
Opened terminal emulator and went SU
Here is the command and the response...
# dd if=/sdcard/flexrom.img of=/dev/block/mmcblk0p6
204800+0 records in
204800+0 records out
104857600 bytes transferred in 35.551 secs (2949497 bytes/sec)
#
Now... time for factory reset and see where this takes us... jejeje
UPDATE: I have restored the tablet to factory settings and came back (what I consider) 100% back to stock. The welcome screen was in english and everything. About to sign in and test gApps and stuff... THANKS GUYS!!! AWESOME!!!
hey thanks a lot man for detail manual) now i need to manage set up a system.img because ive always got stack at acer logo after placing system.img into mmcblkp0p3
Check this for your issues.
I have a post to do this over at ppc... I have a link there with the update.zip and the system.img I have. download it and use that one. I have what to do in my post...
http://forum.ppcgeeks.com/acer-iconia-a500/143732-unbrick-your-acer-a500-iconia-tablet.html = has the information for recovering (will update today with this information)
http://www.megaupload.com/?d=TJ32JBPQ = is the link for the files if you just want the system.img
mapaz04 said:
Alright, I know its not my post but I am trying to get back to stock already too... I already have the system.img from another xda member... I have downloaded the flexrom.img (thanks for the upload!!!)
This is what I have done:
Opened terminal emulator and went SU
Here is the command and the response...
# dd if=/sdcard/flexrom.img of=/dev/block/mmcblk0p6
204800+0 records in
204800+0 records out
104857600 bytes transferred in 35.551 secs (2949497 bytes/sec)
#
Now... time for factory reset and see where this takes us... jejeje
UPDATE: I have restored the tablet to factory settings and came back (what I consider) 100% back to stock. The welcome screen was in english and everything. About to sign in and test gApps and stuff... THANKS GUYS!!! AWESOME!!!
Click to expand...
Click to collapse
I am happy to hear that it worked. Where is this stock system.img? Can i download it from somewhere?
mapaz04 said:
I have a post to do this over at ppc... I have a link there with the update.zip and the system.img I have. download it and use that one. I have what to do in my post...
http://forum.ppcgeeks.com/acer-iconia-a500/143732-unbrick-your-acer-a500-iconia-tablet.html = has the information for recovering (will update today with this information)
http://www.megaupload.com/?d=TJ32JBPQ = is the link for the files if you just want the system.img
Click to expand...
Click to collapse
the link gives a 404
Lets try again... jejeje
Download link: http://www.megaupload.com/?d=TJ32JBPQ
I dont know why, I keep clicking it and it keeps taking me there correctly. They are my links so I dont know why they are not working for you.
I'm happy if it may be of any some help ;-)
Here is the system.img, gzipped (341MB):
hxxp://dl.free.fr/uzKqdLbGL <--- corrupt file
New one here :
http://dl.free.fr/kTg937kjM
Finally didn't go to bed too soon ;-)
CSeb95 said:
I'm happy if it may be of any some help ;-)
Here is the system.img, gzipped (341MB):
http://dl.free.fr/uzKqdLbGL
Finally didn't go to bed too soon ;-)
Click to expand...
Click to collapse
thanks!
10char
downloaded your link and when i extracted, I got an error. Thanks though. I will try again later. jejeje
Thanks gents, great work! This was the missing piece I needed for complete recovery, but I just didn't know it yet! I had already completely restored a few days ago with the Chinese zip and a US system.img, but didn't realize the flexrom partition was hosed as well. I just flashed that as well with no issues. A 100Mb partition zipped to 1.7Mb LOL. Again, great work!
In case some are wondering why in the world I would have to do this. I was doing some research trying to get the netflix apk to work by experimenting in /system with stagefright and OMX libraries from the CM distro that works. One of the new .so files I copied in hosed me up and I couldn't get past the acer boot image. I was somewhat fearless since we had the Chinese zip and I had my system.img. And it turned out it was pretty easy to recover, but I don't recommend this for newbs or the faint of heart LOL.
I'm looking for a stock system.img for Acer_A500_1.016.04_COM_GEN1 or Acer_A500_1.139.04_COM_GEN1. Australian model if anyone has one, as requested here: http://forum.xda-developers.com/showthread.php?t=1088063
Sorry if the archive is corrupted, I'll upload it again , it will be available in about two hours

Unpack stock System.img?

Hello Moto
I've just downloaded Verizon Jelly Bean 4.1.1 by "Firmware Team".
Just to play with it a little, extract apks and test them on Galaxy SII Skyrocket.
The thing is i'm having a hard time opening system.img.
Now i've tried LinuxReader, Unyaffs and ext2explore/read but none of these can open it, they all say that it's an unrecognized image.
Do you guys know how to properly open a stock moto System.img?
lingowistico said:
Hello Moto
I've just downloaded Verizon Jelly Bean 4.1.1 by "Firmware Team".
Just to play with it a little, extract apks and test them on Galaxy SII Skyrocket.
The thing is i'm having a hard time opening system.img.
Now i've tried LinuxReader, Unyaffs and ext2explore/read but none of these can open it, they all say that it's an unrecognized image.
Do you guys know how to properly open a stock moto System.img?
Click to expand...
Click to collapse
Google for a tool called simg2img (I used the python script that appears in get first few results, there should be other versions as well). That will unpack the image into a plain ext4 image that you can mount with any Linux pc (I recommend using a virtual machine if you have windows or mac).
Happy hacking!
Sent from my XT907
aslomagic, did you try this with the firmware lingowistico is talking about? I also tried before to unpack system.img from this package, and system.img.ext4 from ICS package, and another ICS soft for XT897, and all of them give "Bad magic" error in simg2img. All of those softs are published by the same "Firmware Team" - maybe that's the case? I also tried dsixda kitchen (which also uses simg2img, but anyway...) and it also didn't work. Might be also some custom Motorola's approach to system.img....
Could you possibly help? Thanks.
micx_pl said:
aslomagic, did you try this with the firmware lingowistico is talking about? I also tried before to unpack system.img from this package, and system.img.ext4 from ICS package, and another ICS soft for XT897, and all of them give "Bad magic" error in simg2img. All of those softs are published by the same "Firmware Team" - maybe that's the case? I also tried dsixda kitchen (which also uses simg2img, but anyway...) and it also didn't work. Might be also some custom Motorola's approach to system.img....
Could you possibly help? Thanks.
Click to expand...
Click to collapse
Well, I know for a fact that those images are packed ext4, but I haven't tried specifically with that one.
Now that you mention, I think I remember signed images (like those ones) have some additional header, maybe that needs to be removed with an hex editor, or with dd of you like
If I get a chance, I'll try and report back...
Sent from my XT907
aslomagic said:
Well, I know for a fact that those images are packed ext4, but I haven't tried specifically with that one.
Now that you mention, I think I remember signed images (like those ones) have some additional header, maybe that needs to be removed with an hex editor, or with dd of you like
If I get a chance, I'll try and report back...
Click to expand...
Click to collapse
Ok, I tried, and yes, it complains it cannot find the magic (again, I'm using the python script). I modified the script to look for the magic value in the first 50Mb of the file, and if it finds it, it starts unpacking from there. Python scripts are very easy to play with
It seems to work for me, but I don't have a linux vm handy to see if it mounts correctly (I'm currently on a mac). micx_pl, can you give it a try and let me know?
I had to zip the file even though it's very small because the forum won't let me upload a .py file... who knows, just unzip it.
Holy cow! It works! You're the master I was looking for such solution everywhere, and was stunned to see barely few topics with similar problem, and no solution at all. Thanks!
micx_pl said:
Holy cow! It works! You're the master I was looking for such solution everywhere, and was stunned to see barely few topics with similar problem, and no solution at all. Thanks!
Click to expand...
Click to collapse
You're welcome, glad I could help!
Sent from my XT907
aslomagic said:
Ok, I tried, and yes, it complains it cannot find the magic (again, I'm using the python script). I modified the script to look for the magic value in the first 50Mb of the file, and if it finds it, it starts unpacking from there. Python scripts are very easy to play with
It seems to work for me, but I don't have a linux vm handy to see if it mounts correctly (I'm currently on a mac). micx_pl, can you give it a try and let me know?
I had to zip the file even though it's very small because the forum won't let me upload a .py file... who knows, just unzip it.
Click to expand...
Click to collapse
HOLY $#!+ THANKS!!! I've been trying to decompress the moto images for awhile and have never been able to do it until now
Would it be possible to modify make_ext4fs to re-sparse the image and copy the original signature?
Q9Nap said:
Would it be possible to modify make_ext4fs to re-sparse the image and copy the original signature?
Click to expand...
Click to collapse
You're welcome to try ... my guess is that it could be made to work if the image was an official, originally signed image that was unpacked by the script above or equivalent, but if you want to modify it, re-pack it and re-attach the signature, most likely the signature won't match the content. But I may be wrong, so if somebody is willing to try, best of luck to you
If your goal is just to create a packed image, but not necessarily signed (needs bootloader unlock), then I'd say it's definitely possible, search around here.
aslomagic said:
You're welcome to try ... my guess is that it could be made to work if the image was an official, originally signed image that was unpacked by the script above or equivalent, but if you want to modify it, re-pack it and re-attach the signature, most likely the signature won't match the content. But I may be wrong, so if somebody is willing to try, best of luck to you
If your goal is just to create a packed image, but not necessarily signed (needs bootloader unlock), then I'd say it's definitely possible, search around here.
Click to expand...
Click to collapse
i'm sure you're right about the signature not working on a modified image; it was just wishful thinking. the idea of course would be to inject superuser.apk and su, which wouldn't be necessary on a bootloader unlocked device.
for bootloader unlocked devices though, the ability to repack a modified image does give you another way to build custom roms. here's the code to unpack and repack images with simg2img.py and make_ext4fs:
Code:
mkdir system
./simg2img.py system.img.ext4 system.raw
sudo mount -t ext4 -o loop system.raw system/
#make changes, then:
wc -c system.raw #lists size in bytes of system.raw
sudo make_ext4fs -s -l 1234567890 -a system system.img system/ #where 1234567890 is output from wc -c
sudo umount system
rm -rf system
i've used this proecess with samsung system images, should work for moto images now too (bootloader unlocked, of course)
Yep, it's a good cheat sheet reference
Besides, on razr m and hd at least, you can also use this with safestrap without unlocking the bootloader.
aslomagic said:
Besides, on razr m and hd at least, you can also use this with safestrap without unlocking the bootloader.
Click to expand...
Click to collapse
Not sure what you mean by this; do you mean you could mount a modified system.img with safestrap? I guess it's possible since safestrap uses a system.img on the emmc, interesting idea
Q9Nap said:
Not sure what you mean by this; do you mean you could mount a modified system.img with safestrap? I guess it's possible since safestrap uses a system.img on the emmc, interesting idea
Click to expand...
Click to collapse
Yes, that's what I mean, more or less. You don't need safestrap to just mount it (use the terminal and "mount"), but you can use it to boot from it and try it.
I did this to try the Telstra image that pjcons dumped, which is pre-rooted and not signed (there it's no official signed image to date), and with a few tricks it worked without me having to unlock the bootloader.
Sent from my XT907
aslomagic said:
Google for a tool called simg2img (I used the python script that appears in get first few results, there should be other versions as well). That will unpack the image into a plain ext4 image that you can mount with any Linux pc (I recommend using a virtual machine if you have windows or mac).
Happy hacking!
Sent from my XT907
Click to expand...
Click to collapse
hello, i cant find anything on the basics of how this works, could you point me somewhere that explains it step by step or do one here. sorry of the noob question
TheWhiteChallenger said:
hello, i cant find anything on the basics of how this works, could you point me somewhere that explains it step by step or do one here. sorry of the noob question
Click to expand...
Click to collapse
http://forum.xda-developers.com/showthread.php?t=1588461
CNexus said:
http://forum.xda-developers.com/showthread.php?t=1588461
Click to expand...
Click to collapse
Thanks for the link I need to go learn Linux now. Lol I dontbgt the virtual machine thing at all. Its basically a Linux emulator right?
Sent from my XT1080 using XDA Premium 4 mobile app
TheWhiteChallenger said:
Thanks for the link I need to go learn Linux now. Lol I dontbgt the virtual machine thing at all. Its basically a Linux emulator right?
Sent from my XT1080 using XDA Premium 4 mobile app
Click to expand...
Click to collapse
No need to
http://sourceforge.net/projects/androidicsjbext/
CNexus said:
No need to
http://sourceforge.net/projects/androidicsjbext/
Click to expand...
Click to collapse
oh damn it. ok first i do appreciate the help. but that sucked. that was the frist program i tryed and it gives me "unknown file format" have i just been screwing up from the begining?

MoFo Root for Moto X 2013 4.4.4 is Coming - Need Help Making Rooted system.img file

So the DT 4.4.4 has root now, but it does not turn off write protection. It is a different kind of root in that what it lets you do is flash a pre-rooted system image (system.img). So you have to make any mods to the image BEFORE you flash, which is not something your average joe or joette knows how to do.
But for me at least, the Moto X didn't need much modding, just Xposed with Gravity Box, Root Cloaker and Moto Tether.
I have a Dev Ed so I don't need this exploit but I did pull all of the system images from my rooted Dev Ed. The only thing I don't know how to do is to put those into a flashable image file. Does anyone here know how to do that?
I also have the TWRP ext4 system file if that helps.
JulesJam said:
So the DT 4.4.4 has root now, but it does not turn off write protection. It is a different kind of root in that what it lets you do is flash a pre-rooted system image. So you have to make any mods to the image BEFORE you flash, which is not something your average joe or joette knows how to do.
But for me at least, the Moto X didn't need much modding, just Xposed with Gravity Box, Root Cloaker and Moto Tether.
I have a Dev Ed so I don't need this exploit but I did pull all of the system images from my rooted Dev Ed. The only thing I don't know how to do is to put those into a flashable image file. Does anyone here know how to do that?
I also have the TWRP ext4 system file if that helps.
Click to expand...
Click to collapse
thats not a boot unlock and not a write protection disable ... its just ability to install rooted custom system img ....... i think
Javajohn said:
thats not a boot unlock and not a write protection disable
Click to expand...
Click to collapse
Yes I know what it is.
Javajohn said:
... its just ability to install rooted custom system img ....... i think
Click to expand...
Click to collapse
Yes that is what I said it is.
Do you know how I can use the files I have from the system dump and TWRP nandroid ext4 file to create a flashable rooted system.img? That is what I am asking.
JulesJam said:
...
Do you know how I can use the files I have from the system dump and TWRP nandroid ext4 file to create a flashable rooted system.img? That is what I am asking.
Click to expand...
Click to collapse
edit: I misunderstood the question. Of course a CWM/TWRP flashable .zip is not a fastboot flashable system.img...
I'll 'take a stab at this'. I've done it a few times... (I'm sure there is a better guide, but I didn't attempt to find it...) You asked - please don't blame (or hate) me if I help you brick your phone... If you only modify /system, you should be able to restore using CWM/TWRP.
First, find a CWM/TWPR flashable .zip to use it's /META-INFO/ directory as a template. It's best to use a .zip made for your model (so the system mount and format work), and if you can find one for your android version even better. (Do not use an OTA .zip for this template.)
This template will likely [at least] do the following in the "/META-INFO/com/google/android/updater-script" script:
1) mount /system
2) format /system
3) copy /system directory from .zip (need to replace this directory)
4) create symlinks (might need work)
5) set permissions (probably needs work)
If you are only working on /system, then you should remove all superfluous sections (like flashing boot or the modem.)
So, first you need to prepare your new /system: In linux, take your dumped (or backup) /system and copy it to a new /system directory without symlinks. Now you have the new /system for your new flashable .zip
Then you need to modify the "updater-script" script and handle the creation of the symlinks. The easiest way to find this part of the script is locate a flashable zip (or OTA) that patches to your current model/android version. This will handle the bulk of the symlinks.
Next you need to handle the permissions in the "updater-script" script. The aforementioned .zip will also have the permissions scripted, but the root files may not be handled properly. You can find those script commands in a modern flashable zip with root 'baked in.'
Finally take your new /system and new "updater-script" and dump them in your template.... BACKUP (copy off phone) and test.
Good luck...
Ctrl-Freak said:
I'll 'take a stab at this'. I've done it a few times... (I'm sure there is a better guide, but I didn't attempt to find it...) You asked - please don't blame (or hate) me if I help you brick your phone... If you only modify /system, you should be able to restore using CWM/TWRP.
Click to expand...
Click to collapse
Yeah, I am not worrying about a brick as I can wipe my OS entirely and still get into bootloader and recovery so all is good.
Ctrl-Freak said:
First, find a CWM/TWPR flashable .zip to use it's /META-INFO/ directory as a template.
Click to expand...
Click to collapse
My TWRP nandroid of the rooted 4.4.4 system has a meta-info folder with 3 files in it - manifest.mf, cert.sf and cert.rsa.
Ctrl-Freak said:
/META-INFO/com/google/android/updater-script
Click to expand...
Click to collapse
What is this?
Ctrl-Freak said:
So, first you need to prepare your new /system: In linux, take your dumped (or backup) /system and copy it to a new /system directory without symlinks. Now you have the new /system for your new flashable .zip
Click to expand...
Click to collapse
Guess I need to learn what a symlink is first, lol!
JulesJam said:
My TWRP nandroid of the rooted 4.4.4 system has a meta-info folder with 3 files in it - manifest.mf, cert.sf and cert.rsa. !
Click to expand...
Click to collapse
I did not mean your nandroid. Find a flashable zip (made for your device/version) by someone to flash a [custom] ROM. If it flashes a ROM for your device/version, it should be a good starting point.
I looked under xda -> droid turbo and this was the only ROM I found: http://forum.xda-developers.com/dro.../moto-maxx-xt1225-cm12-0-pre-release-t3060089 It says it is for a Moto Maxx xt1225, but again it is only a template, and it might be close.
/META-INFO/com/google/android/updater-script is a text based script that controls what/how CWM / TWRP flashes. AFAIK it is within all flashable zips.
Ctrl-Freak said:
I did not mean your nandroid. Find a flashable zip (made for your device/version) by someone to flash a [custom] ROM. If it flashes a ROM for your device/version, it should be a good starting point.
Click to expand...
Click to collapse
OK thanks, I am doing this for the Moto X 2013, not DT.
Ctrl-Freak said:
/META-INFO/com/google/android/updater-script is a text based script that controls what/how CWM / TWRP flashes. AFAIK it is within all flashable zips.
Click to expand...
Click to collapse
got it.
If this is successful, would there be a way to do it on the AT&T Moto 2013 running 4.4.4?
Sent from my XT1058 using XDA Free mobile app
hexbox117 said:
If this is successful, would there be a way to do it on the AT&T Moto 2013 running 4.4.4?
Click to expand...
Click to collapse
yes, if someone has a GSM Moto X Dev Ed. I don't.
JulesJam said:
yes, if someone has a GSM Moto X Dev Ed. I don't.
Click to expand...
Click to collapse
And would we be able to use Xposed?
Sent from my XT1058 using XDA Free mobile app
hexbox117 said:
And would we be able to use Xposed?
Click to expand...
Click to collapse
Someone has to create a pre-rooted system image with Xposed installed. I think you can then add modules as long as you only do soft reboots. If you do hard reboots, you lose the modules as write protection is still on.
But someone could make a pre-rooted system image with Xposed and the modules you want installed, then it would survive hard reboots AFAIK.
I am still working on how to make a pre-rooted flashable system image, lol!
JulesJam said:
Someone has to create a pre-rooted system image with Xposed installed. I think you can then add modules as long as you only do soft reboots. If you do hard reboots, you lose the modules as write protection is still on.
But someone could make a pre-rooted system image with Xposed and the modules you want installed, then it would survive hard reboots AFAIK.
I am still working on how to make a pre-rooted flashable system image, lol!
Click to expand...
Click to collapse
Interesting. I think you should take a look at this, it sounds like it could be better than what you're trying to accomplish.
http://forum.xda-developers.com/showthread.php?p=59702152
Sent from my XT1058 using XDA Free mobile app
hexbox117 said:
Interesting. I think you should take a look at this, it sounds like it could be better than what you're trying to accomplish.
http://forum.xda-developers.com/showthread.php?p=59702152
Sent from my XT1058 using XDA Free mobile app
Click to expand...
Click to collapse
That was discussed on the DT forums, there is a problem with that on 4.4.4.
For now, the only hope is maiko1's exploit on 4.4.4.
JulesJam said:
That was discussed on the DT forums, there is a problem with that on 4.4.4.
For now, the only hope is maiko1's exploit on 4.4.4.
Click to expand...
Click to collapse
I'm not familiar with what the exploit is. Do you think you could explain it or link me to his post?
Sent from my XT1058 using XDA Free mobile app
hexbox117 said:
I'm not familiar with what the exploit is. Do you think you could explain it or link me to his post?
Click to expand...
Click to collapse
http://forum.xda-developers.com/general/paid-software/mofo-root-turbo-t3064404
So far, it is for the DT only. I want to test it on the Moto X 2013 and then the Moto X 2014. But first, a pre-rooted flashable system.img needs to be created for the Moto X 2013.
JulesJam said:
OK thanks, I am doing this for the Moto X 2013, not DT.
Click to expand...
Click to collapse
If you modify the updater-script to remove the flashing of the kernel (below), then this .zip should be perfect for your testing pleasure:
http://forum.xda-developers.com/moto-x/development/rom-krypton-v1-2-v1-3b1-6-9-2014-t2716657 (download 4.4.4 Krypton v1.4.1 )
Remove this line:
Code:
package_extract_file("boot.img", "/dev/block/platform/msm_sdcc.1/by-name/boot");
Good testing...
Ctrl-Freak said:
If you modify the updater-script to remove the flashing of the kernel (below), then this .zip should be perfect for your testing pleasure:
http://forum.xda-developers.com/moto-x/development/rom-krypton-v1-2-v1-3b1-6-9-2014-t2716657 (download 4.4.4 Krypton v1.4.1 )
Remove this line:
Code:
package_extract_file("boot.img", "/dev/block/platform/msm_sdcc.1/by-name/boot");
Good testing...
Click to expand...
Click to collapse
Thanks, I took a look at the Eclipse Moto X, which is 4.4.4 kitkat based.
http://forum.xda-developers.com/moto-x/development/rom-eclipse-moto-x-v3-2-2-4-4-2-blur-t2521509
But now that I am thinking about it, do these custom ROMs need specific kernels or can you just flash the system w/o flashing the kernel? I guess I will try it and see what happens.
If someone will give me a detailed instruction how to flash a pre-rooted firmware with xposed installed I will try to do so on my AT&T XT1053
RabbitRu said:
If someone will give me a detailed instruction how to flash a pre-rooted firmware with xposed installed I will try to do so on my AT&T XT1053
Click to expand...
Click to collapse
You have to pay $20 to get set up with the exploit, but for now, the guy is only doing Droid Turbos. It is on the paid software forum.
I am trying to see if the exploit works on the Moto X. The dev needs to get back to me but first, I need to try to create a pre-rooted system image.
JulesJam said:
You have to pay $20 to get set up with the exploit, but for now, the guy is only doing Droid Turbos. It is on the paid software forum.
I am trying to see if the exploit works on the Moto X. The dev needs to get back to me but first, I need to try to create a pre-rooted system image.
Click to expand...
Click to collapse
I don't think it will work on the 2013 X... see -> http://forum.xda-developers.com/mot...e-protection-motowpnomo-t2551113/post59731261
And remember, Beaups had an hand in the root exploit and tool for the Droid Turbo along with Jcase... So if Beaups says no, it wont help the 2013 X with 4.4.4, its a pretty sure bet that it wont.

XT1060 4.4.4 system files in sparse chunks

Does anyone have a copy of or know where I can download a copy of the XT1060 4.4.4 system files broken down into sparse chunks?
I am trying to make a pre-rooted ext4 image for the XT1060 to use MoFo and need the sparse chunks. Thanks!
I do at home on my build box, never mind, not broken down into chunks, sorry
JulesJam said:
Does anyone have a copy of or know where I can download a copy of the XT1060 4.4.4 system files broken down into sparse chunks?
I am trying to make a pre-rooted ext4 image for the XT1060 and need the sparse chunks. Thanks!
Click to expand...
Click to collapse
Are you talking like the messaging, camera, calendar, etc.? I'm trying to figure out what exactly you're trying to do here. I've heard of pre-rooted roms (when I had my Samsung phone) but the ext4 is throwing me off a bit here.
cindylike24 said:
Are you talking like the messaging, camera, calendar, etc.? I'm trying to figure out what exactly you're trying to do here. I've heard of pre-rooted roms (when I had my Samsung phone) but the ext4 is throwing me off a bit here.
Click to expand...
Click to collapse
No, I am talking about the system image in sparsechunks. It is for MoFo - search xda paid software mofo for more info. It is a root method.
JulesJam said:
No, I am talking about the system image in sparsechunks. It is for MoFo - search xda paid software mofo for more info. It is a root method.
Click to expand...
Click to collapse
OK. Thanks for clearing that up for me.

Rooting ideas and discussion

I just had an idea. What if someone roots a system.img by extracting it from a kdz and then mounting it in linux copying the root files setting the permissions and then flashing that with download mode? A simple
Code:
dd if=/data/local/tmp/system.img of=/dev/block/platform/??????/by-name/system
should do the trick to flash the system.img file replacing the ?????? with the correct directory.
Just a thought.
Wouldn't you have to have read/write access in order to push the system.img?
Impossible,without root.
Sent from my LG-D802 using Tapatalk
l33tlinuxh4x0r said:
I just had an idea. What if someone roots a system.img by extracting it from a kdz and then mounting it in linux copying the root files setting the permissions and then flashing that with download mode? A simple
Code:
dd if=/data/tmp/system.img of=/dev/block/platform/??????/by-name/system
should do the trick to flash the system.img file replacing the ?????? with the correct directory.
-
Click to expand...
Click to collapse
Dennisg34 said:
There's already a thread to discuss root. Please search before posting, thanks.
Sent from my G4 using your mom
Click to expand...
Click to collapse
I think both of the previous threads discussing root have been closed. I haven't seen another - did I miss it?
Already tried something similar. Requires root unless you're one of the lucky few who have such advanced knowledge of hacking bootloaders/exploits....which I unfortunately am not. LOL
rfarrah said:
I think both of the previous threads discussing root have been closed. I haven't seen another - did I miss it?
Click to expand...
Click to collapse
Apologies, I forgot they were.
Hello,
It is possible to rooter lg g4 with : V10B LGH815
thank you :fingers-crossed:
dydyfr said:
Hello,
It is possible to rooter lg g4 with : V10B LGH815
thank you :fingers-crossed:
Click to expand...
Click to collapse
Yes, look in the developer section.
It is possible to dd to partitions using download mode. The only real problem is that the root method would be huge having to include a system.img.
l33tlinuxh4x0r said:
It is possible to dd to partitions using download mode. The only real problem is that the root method would be huge having to include a system.img.
Click to expand...
Click to collapse
Additionally, you'd need a separate one for every carrier/variant.
I guess if it worked though, who cares how many we need or how big they are. Except with dd, one typo and you've got yourself a brick.
tabp0le said:
Additionally, you'd need a separate one for every carrier/variant.
I guess if it worked though, who cares how many we need or how big they are. Except with dd, one typo and you've got yourself a brick.
Click to expand...
Click to collapse
very true.
tabp0le said:
Additionally, you'd need a separate one for every carrier/variant.
I guess if it worked though, who cares how many we need or how big they are. Except with dd, one typo and you've got yourself a brick.
Click to expand...
Click to collapse
l33tlinuxh4x0r said:
very true.
Click to expand...
Click to collapse
Though...wouldn't it still be able to get into download mode? I could be wrong, but that's not on the system partition from my understanding.
I'm on linux and am familiar with dd (I'm a distro-hopper and have no optical drive, so everything gets dd'ed onto usb drive).
Wouldn't we have to specify a block size on that? I know at least on linux distro, if block size isn't specified, I end up in non-boot.
geoff5093 said:
Yes, look in the developer section.
Click to expand...
Click to collapse
Good
Thank's
Sent from my Iconia A3-A20 FHD using XDA Free mobile app
Th3Bill said:
Though...wouldn't it still be able to get into download mode? I could be wrong, but that's not on the system partition from my understanding.
I'm on linux and am familiar with dd (I'm a distro-hopper and have no optical drive, so everything gets dd'ed onto usb drive).
Wouldn't we have to specify a block size on that? I know at least on linux distro, if block size isn't specified, I end up in non-boot.
Click to expand...
Click to collapse
Actually you are correct. The laf partition is the download mode. Flashing recovery is where we have to worry about losing download mode. (I never understood why, but at least with the G2 download mode broke when flashing custom recovery without a certain patch)
The previous root threads were locked because peopel wouldn't stay on topic after multiple warnings...
Eagle1337 said:
The previous root threads were locked because peopel wouldn't stay on topic after multiple warnings...
Click to expand...
Click to collapse
Correction, they were closed per OP request
This one is now clean, lets try to stay on topic,
If anyone feels the urge to regurgitate further horse crap... we'll see what happens
l33tlinuxh4x0r said:
It is possible to dd to partitions using download mode. The only real problem is that the root method would be huge having to include a system.img.
Click to expand...
Click to collapse
How can you confirm being able to dd to partitions using download mode? In download mode isn't the dd running from /system/bin that is mounted as ro. How could you replace /system while it is mounted and running dd from it?
gbgadgets said:
How can you confirm being able to dd to partitions using download mode? In download mode isn't the dd running from /system/bin that is mounted as ro. How could you replace /system while it is mounted and running dd from it?
Click to expand...
Click to collapse
linux loads commands that you are in the process of running into ram. You can even delete a file that you are running and still be able to use it until you close it. Once you close it is when the problem would occur but by that time you would already have the new file in place. Also do NOT run a
Code:
dd if=/dev/zero of=/dev/block/platform/??????/by-name/system
just skip that step otherwise you would lose the ability to dd.
Go directly for a
Code:
dd if=/data/local/tmp/system.img of=/dev/block/platform/??????/by-name/system
also to get a system.img instead of extracting from a kdz you could run
Code:
dd if=/dev/block/platform/??????/by-name/system of=/data/local/tmp/system.img
docfreed said:
Wouldn't you have to have read/write access in order to push the system.img?
Click to expand...
Click to collapse
you can push to /data/local/tmp using adb without root.

Categories

Resources