Thank You: LeshaK for his method of hiding su in a tmpfs (worked on the moment and works on the epic). Noobnl for his modification on mounting rootfs rw. Anonymous (2 testers who wish to remain anonymous) for all their extensive testing, they have the Epic. SDX for the great support and environment to make this possible.
Disclaimer: I don't have an Epic, but after extensive testing with users who do, this process should be flawless. We are ready to tweak if any OTAs are released or production phones turn out to be slightly different than the pre-released phones we've tested with.
Background: I will be able to allow you to keep root using the same method I used on the moment, with a few tweaks for the epic.
In the mean time, after the exploit is ran and root access is gained thru the adb binary, we will need to push a few files and scripts to guarantee our root environment is properly setup, until we are able to develop custom kernels and a custom recovery with root incorporated.
Description: This is a temporary patch to guarantee permanent root. Once custom kernels are released with root incorporated, this patch won't be required anymore.
For now, this patch will execute on every boot ensuring the root environment is correctly setup
Download:
http://www.joeyconway.com/epic/root/joeykrim-root.sh
http://www.joeyconway.com/epic/root/jk-su
http://www.joeyconway.com/epic/root/rageagainstthecage-arm5.bin
http://www.joeyconway.com/epic/root/playlogo
Directions:
Please follow all directions exactly. Copy/paste the commands.
Commands for copying downloaded files to phone:
adb push c:\downloads\rageagainstthecage-arm5.bin /data/local/tmp/rageagainstthecage-arm5.bin
adb push c:\downloads\joeykrim-root.sh /sdcard/joeykrim-root.sh
adb push c:\downloads\jk-su /sdcard/jk-su
adb push c:\downloads\playlogo /sdcard/playlogo
Commands for temporary root Exploit:
adb shell
chmod 755 /data/local/tmp/rageagainstthecage-arm5.bin
cd /data/local/tmp
./rageagainstthecage-arm5.bin
exit
exit will exit out of the adb shell, and then type adb shell again. this time it should drop you to # instead of $.
if it goes back to $, run the exploit again,
cd /data/local/tmp
./rageagainstthecage-arm5.bin
and exit out of adb and then adb shell again to see if its # .
if it doesnt work the first time, repeat 4-5 times. it will work!
Commands for permanent root:
after you type adb shell and have # (because of the exploit just ran), type these commands:
adb shell
mount -t rfs -o remount,rw /dev/block/stl9 /system
cat /sdcard/joeykrim-root.sh > /system/bin/joeykrim-root.sh
cat /sdcard/jk-su > /system/bin/jk-su
mv /system/bin/playlogo /system/bin/playlogo-orig
cat /sdcard/playlogo > /system/bin/playlogo
chmod 755 /system/bin/playlogo
chmod 755 /system/bin/joeykrim-root.sh
please reboot and type adb shell and then type su, it should drop you to root by changing the prompt from $ to #.
if this process, doesnt work for you, please post back. as time goes on, we will clean it up and hopefully once we have a custom recovery, it'll be easy for me to put this all into one update.zip.
personally confirmed - 2 epics rooted with this process
source
Popular Posts
- 199 iphone wall paper
- Scanbuy Announces Addition to Its Board of Directors
- Millions of Names Available for .Co Open Registration
- YouTube Mobile 3G Enhancements & Java Beta Launchd.
- What a wonderful Second Life!
- Google Wave: First impressions
- Nokia N8 + Bluetooth Keyboard + Mouse
- Developers unhappy over Oracle Android suit
- Caribou Coffee to Use Cellfire for Mobile Coupon Offer
- Catching up: 8 random things about me
0 comments:
Post a Comment