After my new Desire updated by OTA to 2.2, my HBoot upgraded to 0.93.001
As a result, I am no longer to root it again or flashing any cooked rom.... It is such a nightmare for me. So I decided went to HTC service center and asking for a factory restore to Android 2.1, unfortunately the guy stated that due to my personal's fault - to hack the bootloader, there is no way to downgrade the software anymore. I need to pay extra money for a circuit board replacement. I am so angry with the replied, my phone actaully working fine with OTA 2.2 version (it is official release for Taiwan), all I want to do is requested for downgrade to official 2.1, why I need to replace a circuit board????
Anyway after a few hours, I figure out a solution and now working fine with Hboot 0.8 and then re-flashed to customized cooked FroYo rom
Here is the steps: (be careful, I am not responisable for any demage due to these procedures, also you need to have basic knowledge on using Android adb tools)
0.) Download this good program: http://evo4g.me/downloads/evo-root.zip (Credit goes to djR3Z)
Download this file to "PB99IMG.zip" http://shipped-roms.com/shipped/Bra...8U_4.06.00.02_2_release_126984_signed_txt.zip
1.) Make a NEW Goldcard (best using FAT32 format micro SD 4GB or 2GB)
http://www.klutsh.com/dlfiles/GoldCardTool-0.0.5.rar
2.) Find your CID ==> e.g HTC__622 (someone said all 11111111 also worked, but if you can query, why not to input your own?)
fastboot oem boot <--- run this command, will show your own CID
3.) http://ks33673.kimsufi.com/misc/
and Create your own "mtd0.img"
>adb push flash_image /data/local/
>adb push rageagainstthecage-arm5.bin /data/local/tmp/
>adb push mtd0.img /sdcard/
>adb push PB99IMG.zip /sdcard/
>adb shell
chmod 0755 /data/local/tmp/rageagainstthecage-arm5.bin
chmod 0755 /data/local/flash_image
cd /data/local/tmp
./rageagainstthecage-arm5.bin
If you see:
[*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
[*] checking NPROC limit ...
[+] RLIMIT_NPROC={3319, 3319}
[*] Searching for adb ...
[+] Found adb as PID 74
[*] Spawning children. Dont type anything and wait for reset!
[*]
[*] If you like what we are doing you can send us PayPal money to
[*] [email protected] so we can compensate time, effort and HW costs.
[*] If you are a company and feel like you profit from our work,
[*] we also accept donations > 1000 USD!
[*]
[*] adb connection will be reset. restart adb server on desktop and re-login.
$
> adb shell
# <---- you will see this good prompt
cd /data/local
./flash_image misc /sdcard/mtd0.img <---- make sure your connected to PC not in Disk drive mode
5.Shutdown your device
6.Hold volume DOWN and press power button
7.Wait until PB99IMG.ZIP was found and verfied. If that fails, check if you named the file the right way and it’s located in the root of your SD.
8.Press volume UP to start the update.
9.Wait until all steps are done. DON’T POWER OFF YOUR DEVICE!
10.After the downgrade progress has finished press volume UP to reboot.
Now you back to 2.1 with HBoot 0.80
(Please remember to delete the file PB99IMG.zip from your SDcard / folder)
If you want root again:
Navigate to http://www.unrevoked.com for rooted as usual
Interesting, a root exploit for froyo has been found? Though any downgrade of hboot is unnecessary. The rooting allows you to fix the misc partition which will let you flash any RUU you want.
My Desire show : Main Version is older! Update Fail!
setupspeed said:
My Desire show : Main Version is older! Update Fail!
Click to expand...
Click to collapse
what is the issue?
tell me what steps being failed...
hkfriends said:
what is the issue?
tell me what steps being failed...
Click to expand...
Click to collapse
read PB99IMG.ZIP finish , then checking PB99IMG.ZIP => fail
setupspeed said:
read PB99IMG.ZIP finish , then checking PB99IMG.ZIP => fail
Click to expand...
Click to collapse
Have u flashed Mtd0.img ok?
hkfriends said:
Have u flashed Mtd0.img ok?
Click to expand...
Click to collapse
Mtd0.img ok , pursuant step => still fail
better add some screenshoot bro
I have got hboot 0.93 with vodafone froyo and an amoled-display (no slcd).
Do the method of
android-tutorials.org/dev/?page_id=78
work (sorry, can't post the hole link because I an new registered, add www)?
Or do I have to use the method from post #1 in this thread?
cordezz said:
I have got hboot 0.93 with vodafone froyo and an amoled-display (no slcd).
Do the method of
android-tutorials.org/dev/?page_id=78
work (sorry, can't post the hole link because I an new registered, add www)?
Or do I have to use the method from post #1 in this thread?
Click to expand...
Click to collapse
Try teppic74's tool, i think it will be more easy and the same as mine too!
http://forum.xda-developers.com/showthread.php?t=768256
C:\adb>adb push flash_image /data/local/
adb server is out of date. killing...
* daemon started successfully *
774 KB/s (26172 bytes in 0.033s)
C:\adb>adb push rageagainstthecage-arm5.bin /data/local/tmp/
478 KB/s (5392 bytes in 0.011s)
C:\adb>adb push mtd0.img /sdcard/
1807 KB/s (655360 bytes in 0.354s)
C:\adb>adb push PB99IMG.zip /sdcard/
1550 KB/s (144169877 bytes in 90.807s)
C:\adb>adb shell
$ chmod 0755 /data/local/tmp/rageagainstthecage-arm5.bin
chmod 0755 /data/local/tmp/rageagainstthecage-arm5.bin
$ chmod 0755 /data/local/flash_image
chmod 0755 /data/local/flash_image
$ cd /data/local/tmp
cd /data/local/tmp
$ ./rageagainstthecage-arm5.bin
./rageagainstthecage-arm5.bin
[*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
[*] checking NPROC limit ...
[+] RLIMIT_NPROC={3319, 3319}
[*] Searching for adb ...
[+] Found adb as PID 671
[*] Spawning children. Dont type anything and wait for reset!
[*]
[*] If you like what we are doing you can send us PayPal money to
[*] [email protected] so we can compensate time, effort and HW costs.
[*] If you are a company and feel like you profit from our work,
[*] we also accept donations > 1000 USD!
[*]
[*] adb connection will be reset. restart adb server on desktop and re-login.
$
C:\adb>adb shell
adb server is out of date. killing...
* daemon started successfully *
# cd /data/local
cd /data/local
# ./flash_image misc /sdcard/mtd0.img
./flash_image misc /sdcard/mtd0.img
# exit
exit
C:\adb>
-------------------------------------------------------------
my step , correct?
Yes, seems corrected..
have you made gold card?
what is your phone? OEM or branded?
what is the original Hboot version?
setupspeed said:
C:\adb>adb push flash_image /data/local/
adb server is out of date. killing...
* daemon started successfully *
774 KB/s (26172 bytes in 0.033s)
C:\adb>adb push rageagainstthecage-arm5.bin /data/local/tmp/
478 KB/s (5392 bytes in 0.011s)
C:\adb>adb push mtd0.img /sdcard/
1807 KB/s (655360 bytes in 0.354s)
C:\adb>adb push PB99IMG.zip /sdcard/
1550 KB/s (144169877 bytes in 90.807s)
C:\adb>adb shell
$ chmod 0755 /data/local/tmp/rageagainstthecage-arm5.bin
chmod 0755 /data/local/tmp/rageagainstthecage-arm5.bin
$ chmod 0755 /data/local/flash_image
chmod 0755 /data/local/flash_image
$ cd /data/local/tmp
cd /data/local/tmp
$ ./rageagainstthecage-arm5.bin
./rageagainstthecage-arm5.bin
[*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
[*] checking NPROC limit ...
[+] RLIMIT_NPROC={3319, 3319}
[*] Searching for adb ...
[+] Found adb as PID 671
[*] Spawning children. Dont type anything and wait for reset!
[*]
[*] If you like what we are doing you can send us PayPal money to
[*] [email protected] so we can compensate time, effort and HW costs.
[*] If you are a company and feel like you profit from our work,
[*] we also accept donations > 1000 USD!
[*]
[*] adb connection will be reset. restart adb server on desktop and re-login.
$
C:\adb>adb shell
adb server is out of date. killing...
* daemon started successfully *
# cd /data/local
cd /data/local
# ./flash_image misc /sdcard/mtd0.img
./flash_image misc /sdcard/mtd0.img
# exit
exit
C:\adb>
-------------------------------------------------------------
my step , correct?
Click to expand...
Click to collapse
hkfriends said:
Yes, seems corrected..
have you made gold card?
what is your phone? OEM or branded?
what is the original Hboot version?
Click to expand...
Click to collapse
gold card => yes
My phone => HTC Desire
Hboot version => 0.93.0001
i have this error "error writing misc: Permission denied"
in this step: "./flash_image misc /sdcard/mtd0.img"
Noob question
Using your method wont brick my phone right? My phone details are below:
Unit: HTC Desire
ROM: FroYo OTA (Unbranded)
BOOTLoader: 0.93
Software:2.13.707.1
Kernel:2.6.32.15
Just use my tool instead, it's much easier.
Doesn't Unrevoked3, the tool that is used to root phones, support hboot 0.93 on unbranded / unlocked phones? So this step is un-necessary on unbranded / unlocked phones?
Did it work at all?
Hi,
I too want to downgrade my HTC Desire from 2.2 to 2.1 because after the upgrade to 2.2 with hboot 0.93 my desire has stopped connecting to the H or 3g network.
Did this guide work for anyone at all?
HI
CAN SOME HELP ME TO GET THE ROM IMAGE VERSION 2.13.707.1 I NEED THE EXE. FILE THATS THE ONLY WAY I KNOW TO INSTALL THE ROM!!!!
MY PHONE TRIED TO UPGRADE FROM THE PHONE SOMETHING WENT WRONG AND IT SWITCH ON AND GET STUCK IN WHITE SCREEN WITH htc GREEN LOGO . . . I TRIED TO INSTALL THE ROM FROM MY COMPUTER THE LATEST BUT THE IMAGE ON THAT IS 2.10.405.2 . I REALLY APPRECIATE IF SOMEONE CAN HELP ME
black screen
I got a black screen after downgrade. Also after restart the phone
Desire
Hi Guys,
I have a bit of a problem, I want to install a custom rom on my HTC Legend. But I am a kinda noobish. I followed a couple tutorials from a site called hxxp://theunlockr.com/2010/06/07/how-to-root-the-htc-legend There it says that I have to downgrade my HTC Legend to 1.31. Before the downgrading proces you have to make a goldcard, I am managed to make one. But I get stuck with the Downgrading
It says I have to follow these couple things
III. Make Phone Downgrade-able
1. On your phone, make sure that USB Debugging is checked ON in Settings > Applications > Development.
Done
2. Plug in your phone and make sure it is connected as Charge Only NOT Disk Drive or something else.
Done
3. Download the Downgrading Tools and extract them to your AndroidSDK\tools\ folder (all of the files need to be in the tools folder with adb).
Done
4. Open a command prompt on your computer by clicking on the Start button and typing cmd and hitting enter in the search box.
Done
5. In the command prompt, type the following with hitting enter at the end of each line:
cd c:\AndroidSDK\tools\
crackin.bat
Done
6. The phone will reboot 5 times, be patient.
Done
7. After it is done, you will see a bunch of error messages, that is normal.
Done
8. Look for the following line, if you see it (the date and time can be different)
you are ready to continue, if not then reboot your phone, factory reset it, and try again:
crwxrwxrwx 1 1001 2002 90, 0 Jul 19 16:19 /dev/mtd/mtd0
This part doesnt work for me! This is what I get in CMD.exe:
Microsoft Windows [versie 6.0.6002]
Copyright (c) 2006 Microsoft Corporation. Alle rechten voorbehouden.
C:\Users\Gebruiker>cd c:\AndroidSDK\tools
c:\AndroidSDK\tools>crackin.bat
"Copying tools"
1418 KB/s (698452 bytes in 0.481s)
1237 KB/s (76044 bytes in 0.060s)
2051 KB/s (655360 bytes in 0.312s)
"Freeing primary PERM linker"
rm failed for /data/DxDrm/fuse/*, No such file or directory
rm failed for /data/DxDrm/fuse, No such file or directory
rmdir failed for /data/DxDrm/fuse/, No such file or directory
cannot create /data/DxDrm/fuse: directory nonexistent
Unable to chmod /data/DxDrm/fuse: No such file or directory
"Freeing secondary PERM linker"
rmdir failed for /data/DxDrm/fuse/, No such file or directory
rmdir failed for /data/DxDrm, No such file or directory
link failed Permission denied
"Rebooting to normal mode to unlock CHMOD links"
rmdir failed for /data/dontpanic, Permission denied
rm failed for /data/DxDrm, No such file or directory
link failed File exists
link failed Permission denied
"Rebooting to normal mode to downgrade ROM"
/dev/mtd/mtd0: Permission denied
cr--rw---- 1 1001 2002 90, 0 Jan 6 22:06 /dev/mtd/mtd0
error writing misc: Permission denied
"Freeing links"
rm failed for /data/DxDrm, No such file or directory
rm failed for /data/dontpanic, Permission denied
c:\AndroidSDK\tools>
What do I have to do? Is there anything wrong with my goldcard? Or is it something else?
PLEASE HELP!
Thanks in advance Tom
....same
http://forum.xda-developers.com/showthread.php?t=725430
Hi!
My phone is LG Optimus One. It's v10e.
I am new at this. This is my first android phone. I want to move the applications to SD Card. Because phone memory is not enough. So, i am trying to root my phone. Aldready 4 days. It's killing me. I aldready tried to root with different ways approximately 100 times. Every time same problems.
1- I tried to root 30-35 times with SuperOneClick 1.7
The problem is; when i hit the "Root" button, it's coming down to "Running psneuter..." and then, nothing! Nothing happens. Nothing changes. There is the details;
SuperOneClick v1.7.0.0
Killing ADB Server...
* server not running *
OK
Starting ADB Server...
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
OK
Waiting for device...
OK
Pushing psneuter...
1529 KB/s (585731 bytes in 0.374s)
OK
chmod psneuter...
OK
Running psneuter...
OK
***IF IT KEEPS LOOPING, TRY DISABLING USB DEBUGGING NOW***
Killing ADB Server...
OK
Starting ADB Server...
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
OK
Waiting for device...
OK
Running psneuter...
Click to expand...
Click to collapse
This is what i have with SuperOneClick 1.7. Is there any way to handle this? Please tell me, how can i figure it out?
2- I tried to root approximately 70 times with "Android SDK, OptimusRoot, then opening CMD window" way.
There was some guides from some forums. The guides are approximately same. I can't post the the links because, posting outside links not permitted for new users. I don't know how to post links.
I did everything in that guide. Every prerequisites fulfilled. Than opened a CMD window. Then, this...
C:\Users\Seyhan>cd c:\android-sdk-windows\platform-tools
c:\android-sdk-windows\platform-tools>adb push rageagainstthecage-arm5.bin /data
/local/tmp/rageagainstthecage
43 KB/s (5392 bytes in 0.120s)
c:\android-sdk-windows\platform-tools>adb push su /data/local/tmp/
641 KB/s (26264 bytes in 0.040s)
c:\android-sdk-windows\platform-tools>adb push busybox /data/local/tmp/
1710 KB/s (1926944 bytes in 1.100s)
c:\android-sdk-windows\platform-tools>adb shell
$ chmod 4755 /data/local/tmp/rageagainstthecage
chmod 4755 /data/local/tmp/rageagainstthecage
$ chmod 4755 /data/local/tmp/busybox
chmod 4755 /data/local/tmp/busybox
$ cd /data/local/tmp
cd /data/local/tmp
$ ./rageagainstthecage
./rageagainstthecage
[*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
[*] checking NPROC limit ...
[+] RLIMIT_NPROC={3341, 3341}
[*] Searching for adb ...
[+] Found adb as PID 1927
[*] Spawning children. Dont type anything and wait for reset!
[*]
[*] If you like what we are doing you can send us PayPal money to
[*] so we can compensate time, effort and HW costs.
[*] If you are a company and feel like you profit from our work,
[*] we also accept donations > 1000 USD!
[*]
[*] adb connection will be reset. restart adb server on desktop and re-login.
$
c:\android-sdk-windows\platform-tools>adb shell
error: device not found
c:\android-sdk-windows\platform-tools>
Click to expand...
Click to collapse
it's coming to here;
[*] adb connection will be reset. restart adb server on desktop and re-login.
then nothing happens. Usb connection is removing itself, but not connecting after remove. Every time same problem. I can't get the "#". If anyone knows something about this, please help me. This is already a death battle for me. If anybody can help me with root my phone, i can't explain how i will be thankful.
Thanks for your interests.
did u try with z4root?
may be this will help
i think you will have to downgrade from v10e.
try the official forum in xda
I already tried z4root but its not working on v10e. Where can i open a thread for downgrade from v10e?
Every script I've tried fails ... I guess whatever was being exploited was fixed?
Is it possible with a stock system to downgrade to a version that can be rooted?
Try this method...
http://forum.xda-developers.com/showthread.php?p=26918790
Just make sure that you don't try to flash recovery unless your bootloater is unlocked, for it may hard brick you.
[Resolved] I'm dumb, I figured put why it failed
My system has adb.exe and its DLL's in the system path.
the script also provided an adb.exe and the 2 dll's.
Every time I ran it (or the others) adb kept saying it
was not right and killing server. After I deleted
the 3 files, to ran to completion. I guess the
system got confused with two sets of files.
the script said uid was 0 gid was 0
but when I ran titanium backup
it could not get root. I updated
the superuser.apk from Google
play and reloaded titanium backup
it requested and was granted root
rights!
Everything seems to be working
as expected now.
Waiting for device to be detected...
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
Step 1 - Pushing files...
1188 KB/s (1862336 bytes in 1.530s)
727 KB/s (22364 bytes in 0.030s)
6 KB/s (142 bytes in 0.020s)
Rebooting...
Press any key to continue . . .
Step 2 - Rooting...
debugfs 1.42 (29-Nov-2011)
debugfs: rm: File not found by ext2_lookup while trying to resolve filename
debugfs: rm: File not found by ext2_lookup while trying to resolve filename
debugfs: debugfs: Allocated inode: 1453
debugfs: debugfs: debugfs: debugfs:
Rebooting...
Testing superuser...
uid=0(root) gid=0(root) groups=1003(graphics),1004(input),1007(log),1009(mount),1011(adb),
1015(sdcard_rw),3001(net_bt_admin),3002(net_bt),3003(inet),3006(net_bw_stats)
uid and gid should both be 0.
Are they? (y/n): y
Installing Superuser.apk...
1069 KB/s (843503 bytes in 0.770s)
pkg: /data/local/tmp/Superuser.apk
Success
Rebooting...
Once your Prime reboots, it will be rooted!
Press any key to continue . . .
I had to reinstall superuser.apk
from Google play, but then Titanium
requested and was granted root rights.
It worked!
Click to expand...
Click to collapse
See my post here : http://forum.xda-developers.com/showthread.php?p=28173187
Sent from my GT-N7000
Try it, i did it yesterday and very easy....
http://forum.xda-developers.com/showthread.php?t=1689193
Made a mistake and updated my Droid 4 with the Jellybean OTA, so I needed to reroot my phone. I attempted to reroot with the script below:
http://forum.xda-developers.com/showthread.php?t=2207384
but it's failing here at the point below. My question is if I select option 1 of the script (Think it's failing because I didn't unroot the ICS version) will it wipe all data off my phone? Including the personal stuff. Or will it just wipe the root folders? Thanks a lot.
/system/bin/sh: can't create /data/data/com.motorola.contextual.fw/files/DataCle
arJarDex.jar: Permission denied[*] Rebooting device...[*] Waiting for phone to reboot.[*] Phase three (this will take a minute)...
failed on '/data/logger' - Permission denied
mkdir failed for /data/logger, File exists
Unable to chmod /data/logger: Operation not permitted
link failed File exists[*] Rebooting device...[*] Waiting for phone to reboot.[*] Phase four...
3559 KB/s (543080 bytes in 0.149s)
3597 KB/s (1867568 bytes in 0.507s)
3144 KB/s (476557 bytes in 0.148s)
2308 KB/s (63838 bytes in 0.027s)[*] Cleaning up...
/system/bin/sh: su: not found
/system/bin/sh: can't create /data/data/com.motorola.contextual.fw/files/DataCle
arJarDex.jar: Permission denied[*] Rebooting...[*] Exploit complete!