Rooting MyTouch 4G Slide HBOOT 1.44.0006 - T-Mobile myTouch 4G Slide

So I know this is a stupid question, but I just go my MT4GS and lets just say it's not the run in the mill got it from the store. An HTC rep swapped my G2 for this phone since my G2 was dying on me. With that said, the MT4GS is running HBOOT 1.44.0006 which I realize isn't the standard .0007 HBOOT.
The thing is, the phone is already S-OFF'd however I can't flash clockwork onto it, even through the Fastboot method. So any help?

Appogee said:
So I know this is a stupid question, but I just go my MT4GS and lets just say it's not the run in the mill got it from the store. An HTC rep swapped my G2 for this phone since my G2 was dying on me. With that said, the MT4GS is running HBOOT 1.44.0006 which I realize isn't the standard .0007 HBOOT.
The thing is, the phone is already S-OFF'd however I can't flash clockwork onto it, even through the Fastboot method. So any help?
Click to expand...
Click to collapse
http://revolutionary.io
Sent from my Senseless Doubleshot using xda premium

Revolutionary only allows for 1.44.0007 HBOOT, which isn't 1.44.0006. Any other ways?

Not that i know of.
Sent from my MyTouch_4G_Slide using xda premium

Hi. I had the same problem...
Usb debugging must be checked and adb working.
To flash the recovery
1) use fre3vo for temp root
adb push fre3vo /local/data/
adb shell fre3vo
(wait)
2) copy the recovery to the device
adb push recovery.img /local/data
3) obtain privileges and copy the recovery to the right partition
adb shell
su
dd if=/data/local/recovery.img of=/dev/block/mmcblk0p21
It worked for me.

imateriali said:
Hi. I had the same problem...
Usb debugging must be checked and adb working.
To flash the recovery
1) use fre3vo for temp root
adb push fre3vo /local/data/
adb shell fre3vo
(wait)
2) copy the recovery to the device
adb push recovery.img /local/data
3) obtain privileges and copy the recovery to the right partition
adb shell
su
dd if=/data/local/recovery.img of=/dev/block/mmcblk0p21
It worked for me.
Click to expand...
Click to collapse
I learned something new today
Sent from my MyTouch_4G_Slide using xda premium

imateriali said:
Hi. I had the same problem...
Usb debugging must be checked and adb working.
To flash the recovery
1) use fre3vo for temp root
adb push fre3vo /local/data/
adb shell fre3vo
(wait)
2) copy the recovery to the device
adb push recovery.img /local/data
3) obtain privileges and copy the recovery to the right partition
adb shell
su
dd if=/data/local/recovery.img of=/dev/block/mmcblk0p21
It worked for me.
Click to expand...
Click to collapse
Well I get through the steps, it hasn't exactly been rooted yet. What do you mean obtain privs and copy the recovery to right partition?

Appogee said:
Well I get through the steps, it hasn't exactly been rooted yet. What do you mean obtain privs and copy the recovery to right partition?
Click to expand...
Click to collapse
OK.
First of all I downloaded the correct recovery image from the clockworkmod site. Then renamed it "recovery.img" and moved to the same folder of ADB.
In the step 3 when you type "su" from the adb shell you elevate privileges to root;
when you "dd if=/data/local/recovery.img of=/dev/block/mmcblk0p21" you copy the recovery image from /data/local to "mmcblk0p21" that is the recovery boot partition.
After that, to obtain permanent root, you shold copy the "su" file from http://downloads.androidsu.com/superuser/su-2.3.6.3-efgh-signed.zip to the doubleshot sd card and install from recovery (this is better explained in the s-off /root thread you can find in the developer section http://forum.xda-developers.com/showthread.php?t=1286324).
This is not a fail proof procedure but it worked for me use at your own risk.
By the way, sorry about my english.

imateriali said:
OK.
First of all I downloaded the correct recovery image from the clockworkmod site. Then renamed it "recovery.img" and moved to the same folder of ADB.
In the step 3 when you type "su" from the adb shell you elevate privileges to root;
when you "dd if=/data/local/recovery.img of=/dev/block/mmcblk0p21" you copy the recovery image from /data/local to "mmcblk0p21" that is the recovery boot partition.
After that, to obtain permanent root, you shold copy the "su" file from http://downloads.androidsu.com/superuser/su-2.3.6.3-efgh-signed.zip to the doubleshot sd card and install from recovery (this is better explained in the s-off /root thread you can find in the developer section http://forum.xda-developers.com/showthread.php?t=1286324).
This is not a fail proof procedure but it worked for me use at your own risk.
By the way, sorry about my english.
Click to expand...
Click to collapse
NEVERMIND! I Just finished rooting, THANK YOU SO MUCH!

Related

ClockworkMod Recovery 4.0.0.9 for the T-Mobile myTouch 4G Slide (MoDaCo edition)

Cool! I got a myTouch 4G Slide!
Not cool! No ClockworkMod recovery!
Solution! Make my own.
You must have a 'S-OFF' device to install this recovery image!
Here is my unofficial MoDaCo build of ClockworkMod for the T-Mobile myTouch 4G Slide / aka HTC Doubleshot. In order to flash this recovery, you need to have temproot or permanent root via Fr3evo (grab from here, push to /data/local, run via ADB then reconnect after it drops your connection for root access). If you need ADB, you can grab it here.
You use this image at your own risk! Proceed with caution!
To install, simply...
Download the ClockworkMod image file from here
Copy the file to /data/local ('adb push doubleshot.clockworkmod.4.0.0.9.modaco.img /data/local')
Write the image to the recovery partition ('dd if=/data/local/doubleshot.clockworkmod.4.0.0.9.modaco.img of=/dev/block/mmcblk0p21')
Do a recovery reboot to test ('adb reboot recovery').
That's it!
P
paulobrien said:
Cool! I got a myTouch 4G Slide!
Not cool! No ClockworkMod recovery!
Solution! Make my own.
You must have a 'S-OFF' device to install this recovery image!
Here is my unofficial MoDaCo build of ClockworkMod for the T-Mobile myTouch 4G Slide / aka HTC Doubleshot. In order to flash this recovery, you need to have temproot or permanent root via Fr3evo (grab from here, push to /data/local, run via ADB then reconnect after it drops your connection for root access). If you need ADB, you can grab it here.
You use this image at your own risk! Proceed with caution!
To install, simply...
Download the ClockworkMod image file from here
Copy the file to /data/local ('adb push doubleshot.clockworkmod.4.0.0.9.modaco.img /data/local')
Write the image to the recovery partition ('dd if=/data/local/doubleshot.clockworkmod.4.0.0.9.modaco.img of=/dev/block/mmcblk0p21')
Do a recovery reboot to test ('adb reboot recovery').
That's it!
P
Click to expand...
Click to collapse
Thanks for this! Man I wish I had mine in my hands already! I'm gonna give this a shot as soon as it arrives
Sent from my demonSPEED Glacier
Mine is S-ON :O
raycaster3 said:
Thanks for this! Man I wish I had mine in my hands already! I'm gonna give this a shot as soon as it arrives
Sent from my demonSPEED Glacier
Click to expand...
Click to collapse
Revolution said:
Mine is S-ON :O
Click to expand...
Click to collapse
Boo! Damn
Sent from my HTC Glacier
So what does hboot do to /dev/block/mmcblk0p21 after the phone is turned back on if you temp root and dd it?
thank you!
paulobrien said:
Cool! I got a myTouch 4G Slide!
Not cool! No ClockworkMod recovery!
Solution! Make my own.
You must have a 'S-OFF' device to install this recovery image!
Here is my unofficial MoDaCo build of ClockworkMod for the T-Mobile myTouch 4G Slide / aka HTC Doubleshot. In order to flash this recovery, you need to have temproot or permanent root via Fr3evo (grab from here, push to /data/local, run via ADB then reconnect after it drops your connection for root access). If you need ADB, you can grab it here.
You use this image at your own risk! Proceed with caution!
To install, simply...
Download the ClockworkMod image file from here
Copy the file to /data/local ('adb push doubleshot.clockworkmod.4.0.0.9.modaco.img /data/local')
Write the image to the recovery partition ('dd if=/data/local/doubleshot.clockworkmod.4.0.0.9.modaco.img of=/dev/block/mmcblk0p21')
Do a recovery reboot to test ('adb reboot recovery').
That's it!
P
Click to expand...
Click to collapse
what does this means 'dd if=/data/local/doubleshot.clockworkmod.4.0.0.9.modaco.img of=/dev/block/mmcblk0p21'
That line of code just copies the recovery image from a directory on the phone to the special place where a recovey image is supposed to be.
Sent from my myTouch_4G_Slide using XDA App
michaelmab88 said:
That line of code just copies the recovery image from a directory on the phone to the special place where a recovey image is supposed to be.
Sent from my myTouch_4G_Slide using XDA App
Click to expand...
Click to collapse
My device is ship s-off can't use this methods.so i used sdcard flash succeeded. Thanks!
Crossing my fingers that someone finds a way to get S-off on these. I'm too spoiled with CM7, I forgot what it's like to have a "stock" phone that you can't delete unwanted apps, overclock, tweak, etc.
I think I might just box up the MTS4G and continue to use my G2 until true root is available.
Can we get an hboot dump from someone with S-off? Just curious if it's possible to flash that to hboot with temp root?
masker2011 said:
what does this means 'dd if=/data/local/doubleshot.clockworkmod.4.0.0.9.modaco.img of=/dev/block/mmcblk0p21'
Click to expand...
Click to collapse
Specifically this command is a raw linux command that would work on almost any machine. It's telling the dd utility to copy the img file to the /dev/ mount in the specific block mmcblk0p21.
Every partition is grouped into blocks. Usually 512kbytes but it could be something else.
Akujin said:
Can we get an hboot dump from someone with S-off? Just curious if it's possible to flash that to hboot with temp root?
Click to expand...
Click to collapse
Nope. See the 'Bounties!' thread.
cberbes said:
Crossing my fingers that someone finds a way to get S-off on these. I'm too spoiled with CM7, I forgot what it's like to have a "stock" phone that you can't delete unwanted apps, overclock, tweak, etc.
I think I might just box up the MTS4G and continue to use my G2 until true root is available.
Click to expand...
Click to collapse
Are you forgetting the fact that the MT4GS is also a Sense phone? While I like Sense, the option to use regular old Android should always be there (I'm looking at YOU, Motorola).
In the bounty thread it had been noted that that there is no on board charging circuit on the phone and that if certain factors do not exist in recovery then the phone can not charge.
I was wondering if this has affected you, out you have already compensated for this. If you have that issue resolved it may be of help to nbetcher and others looking to give us s-off.
Sent from my myTouch_4G_Slide using XDA Premium App
I can't use the command dd if=/data/local/doubleshot.clockworkmod.4.0.0.9.modaco.img of=/dev/block/mmcblk0p21
Whats the fix for that?
electro_chef said:
I can't use the command dd if=/data/local/doubleshot.clockworkmod.4.0.0.9.modaco.img of=/dev/block/mmcblk0p21
Whats the fix for that?
Click to expand...
Click to collapse
Did you elevate yourself to root first?
If you're not sure. At the android prompt type su [enter]
Now you're root and can run anything.
masker2011 said:
what does this means 'dd if=/data/local/doubleshot.clockworkmod.4.0.0.9.modaco.img of=/dev/block/mmcblk0p21'
Click to expand...
Click to collapse
This line isn't working.
Is there a missing "ADB" or "ADB SHELL" that's supposed to go in front of the dd?
Or is this command supposed to be executed on the device itself?
jdmarko said:
This line isn't working.
Is there a missing "ADB" or "ADB SHELL" that's supposed to go in front of the dd?
Or is this command supposed to be executed on the device itself?
Click to expand...
Click to collapse
I believe its suppose to be executed on the device, however if the device doesn't have root, than its useless.
You can use fastboot to flash it.
I'm getting the same charging issue as everyone else.
If the phone is off, and you plug the charger in, the LED will light up. But the phone will not charge, it will freeze, and you must do a battery pull to get it to boot from that point.
Any idea for the fix?

[Q] Help with S-Off and Rooting my HTC Merge

I understand there are other threads about this however I do feel my situation is either unique or I've missed something in the other threads.
I've got an HTC Merge through US Cellular. I upgraded to Gingerbread 2.3.4 as soon as it was released through USC's website. Now I'd like to root and all that other stuff.
1.: I didn't S-off before the update. Does anyone know how to properly S-off 2.3.4 Gingerbread on a USC HTC Merge?
2.: I've never rooted a phone before, but I'm pretty sure I've read about it plenty and I'm ready to give it a shot. What's the best way to do this on my current phone?
3.: What are some good modded ROMs available for this device, if any exist at all? I've been interesting in Cyanogen Mod but as far as I've seen it's not supported on the Merge yet.
If anyone can assist me I'd appreciate it greatly. Thanks in advance. =)
if you have adb set up and working,and have some knowledge of it,you can use drellisdees directions in this post,along with the new zergRush temp root tool from alpharev/unrevoked. donate to them both if it works for you.
download the zergRush tool from this post:http://forum.xda-developers.com/showthread.php?t=1296916 and place the file thats inside the .zip into the same folder as your other exploits(tools or platform-tools in ost cases)
below is his post,modified slightly,with the zergRush directions(bold) in place of the originaly froyo directions.
i also removed the parts about downloading your carriers RUU,and backing up your system for vzw since you said you were USC.
assuming you want to remain on rooted GB,just use the same RUU that you used to upgrade at the end where it says to run your carriers RUU.
drellisdee said:
Well, ask and you shall receive!!!
I got s-off on vzw merge. However, altell or USC ones it will require supercid or a goldcard to flash ruu from another carrier.
Tested and working CWM recovery I made for merge and latest radio hboot zips after s-off.
You must verify all Md5sums after downloading to computer (don't even think about downloading on phone) before flashing or risk a brick!!!!! Windows users can get one here & linux users can just type md5sum (name of file) into terminal.
Md5's
8cd1ca796e755b6b72f35e5686dc973a PD42IMG_cw_recovery_gnm.zip
97e35ecc802081b67e27d6cc8323cf81 PD42IMG_radio_1.08.00.320.zip
cc2e7c077fddd017d7b0db614661c535 PD42IMG_1.49.605.1_no_system.zip
4fe37c64b21d1d4542a801779fad5c57 misc-downgrade.img
6d37a0f3526295ebb779f4465a328c96 rom.zip (leaked 1.23.605.1)
http://www.mediafire.com/file/6b2jatt0445h41g/PD42IMG_cw_recovery_gnm.zip
http://www.mediafire.com/file/gbayon7dkmaq98i/PD42IMG_radio_1.08.00.320.zip
I am exploring a goldcard method that will allow flashing of the vzw ruu 1.23.605.1 that can be s-off'ed to allow other carriers merge's to be able to downgrade to s-off.
How to on s-off will be coming soon .... stay posted
Ok how to guide for s-off.
Files needed:
MISCIMG Downgrade http://www.mediafire.com/file/f7c3boee7ixa3i9/misc-downgrade.img
VZW leak 1.23.605.1 ruu.zip http://forum.xda-developers.com/showpost.php?p=8237592&postcount=2
Exploits http://www.mediafire.com/file/e9w92clv6l71el3/exp.zip
HEADS UP: This guide will reflash your phone and cause loss of all non-backed up data
Goldcard is required for ALL NON-VZW phones
Read how to make one here : http://www.mikesouthby.co.uk/2010/0...yo-official-ota-for-network-branded-handsets/
I used the app goldcard helper from market and if you use it skip right to the step of "Go to this page and enter this new number into the SD Card Serial (CID) field" and enter the output of the sdcard cid for mmc2 into the goldcard generator site.
After goldcard is made via directions in link above or if on vzw branded device you can skip the goldcard part. Next rename the vzw leak ruu.zip to PD42IMG.zip and place it on root of sdcard.
Next from dir you downloaded stuff to unzip the exp.zip and copy the exp folder to your android sdk platform-tools dir (if using windows) linux users should have adb in path so this shouldn't be needed just open terminal from download dir. Make sure the phone is in usb mode charge-only from this point on with usb-debugging turned on (settings/applications/development).
Code:
[B]adb push zergRush /data/local/
adb shell[/B] [I]this will change your promt to a $[/I]
[B]chmod 755 /data/local/zergRush
/data/local/zergRush[/B]
Next we backup our existing misc partition.
Code:
adb shell
dd if=/dev/block/mmcblk0p17 of=/sdcard/misc-stock.img bs=4096
/data/local/busybox md5sum /sdcard/misc-stock.img
/data/local/busybox md5sum /dev/block/mmcblk0p17
Make sure the md5sum of the misc-stock.img matches the one from /dev/block/mmcblk0p17
Next we use temp root to flash a misc.img that I hex edited to allow downgrading FW. misc-downgrade.img needs to be in platform-tools dir for windows users.
Code:
adb push misc-downgrade.img /sdcard/
adb shell
dd if=/sdcard/misc-downgrade.img of=/dev/block/mmcblk0p17
sync
Next power off your phone and boot it holding vol_dn + power.
Let the PD42IMG.zip complete ( will do hboot + radio then self reboot and restart to finish the rest)
Once rebooted into the 1.23.605.1 firmware
Code:
adb push exp /data/local
adb shell
chmod 0755 /data/local/psneuter
chmod 0755 /data/local/wpthis
chmod 0755 /data/local/gfree
/data/local/psneuter (to get temp root again)
adb shell
/data/local/wpthis (to disable emmc write protect)
/data/local/gfree -f (this will supercid, simunlock, and s-off phone)
rm /sdcard/PD42IMG.zip (remove/delete the leaked FW so hboot wont load it again)
Reboot into bootloader and verify you have s-off
If so reboot into android and use your carrier's RUU to replace your FW. You will not lose s-off. If on vzw unzip the PD42IMG_1.49.605.1_no_system.zip and add your system.img from your memory card we dumped earlier to the zip. Rezip and rename to PD42IMG.zip and place on root of sdcard and reboot into hboot to flash it just like we did earlier. This will restore the shipped 1.49.605.1 hboot, radio, boot.img, stock recovery.img, and system.img.
After you have upgraded backup you can use the clockwork recovery.img I made and rename it to PD42IMG.zip (make sure to delete the old PD42IMG.zip on your sdcard) and place it on root of sdcard and flash via hboot just like the other PD42IMG.zip's. Then you will have s-off and a custom recovery. Remember to remove/rename/move the PD42IMG.zips when done as they will flash if you enter hboot. Recovery can be entered via bootloader by picking recovery or via "adb reboot recovery".
Flashing this zip via clockwork recovery will install root (su & superuser.apk), busybox & symlink applets, flash & dump image. signed_merge_su_eng_toolkit.zip
After you have root on your release firmware:
The following commands will restore your stock misc.img
from a root # shell: (will need to type su after adb shell and accept superuser pop-up)
Code:
adb shell
dd if=/sdcard/misc-stock.img of=/dev/block/mmcblk0p17
sync
Special thanks to Scotty2 & Tmzt who wrote and developed the wpthis & gfree exploits for the G2 without these s-off for lexikon wouldn't have been possible for me.
My donation link is below if anyone wants to toss me a donation. Took me about a week to port RA recovery to merge only to fail as it had issues then to setup the board files for lexikon for cm7 to do a clockwork recovery and not to mention dumping partitons and working on the s-off stuff and goldcard.
Click to expand...
Click to collapse
I got as far as the /data/local/zergRush and got this error:
[-] Cannot copy boomsh. : Permission denied.
adb push zergRush /data/local/
adb shell this will change your promt to a $
chmod 755 /data/local/zergRush
/data/local/zergRush
Any ideas?
Thanks
kclive said:
I got as far as the /data/local/zergRush and got this error:
[-] Cannot copy boomsh. : Permission denied.
adb push zergRush /data/local/
adb shell this will change your promt to a $
chmod 755 /data/local/zergRush
/data/local/zergRush
Any ideas?
Thanks
Click to expand...
Click to collapse
that error comes from running zergrush twice. http://androidforums.com/merge-all-...simunlock-supercid-htc-merge.html#post3522248
pls how can i run this commands with miniadb, i dont hav access to the whole android sdk tool...and besides, the zergrush binary link above aint workin..any other alternative dload link pls??
akins47 said:
pls how can i run this commands with miniadb, i dont hav access to the whole android sdk tool...and besides, the zergrush binary link above aint workin..any other alternative dload link pls??
Click to expand...
Click to collapse
zergrush is broken with newer builds. fre3vo worked for some. i would recomend you htcdev unlock in order to gain root access for downgrade.
follow directions here to htcdev unlock:
http://androidforums.com/merge-all-things-root/635459-unlock-htcdev.html
then follow directions here:
http://androidforums.com/merge-all-things-root/434029-root-s-off-simunlock-supercid-htc-merge.html
using the "htcdev" step 5 in post#2

[GUIDE] Official HBOOT v2.xx Downgrade to OLD HBOOT

UPDATED as of 18 DEC 2012 clarified and fixed some things..
Worldwide disclaimer not held responsible if something went wrong blah blah blah goes here..
Click to expand...
Click to collapse
THIS GUIDE WILL VOID YOUR WARRANTY BECAUSE OF THE HTC-DEV UNLOCK METHOD!!! And you can only use this guide if you are on HBOOT v2.xx
Click to expand...
Click to collapse
This guide may also be used for DEBRANDING your phone..
Click to expand...
Click to collapse
Check my sig first, then these for proper and additional information:
[GUIDE] Possible FIX for the infamous eMMC problem..
[Q] Bricked my phone?
NOTE:
RUUs with v1.xxx have HBOOTs with v0.98.000, while v2.xxx have HBOOTs with 2.00.002, and the ICS RUU has the only HBOOT v2.02.002
Click to expand...
Click to collapse
I will not supply the necessary files that is needed, you MUST know how to use SEARCH. I also suggest to give THANKS to those who originally made/uploaded the files.
Requirements:
Common Sense
- it helps A LOT
HTC Sync for Desire S - Installed
- for its drivers and such, or you may just install the "naked" drivers
Android Windows Tools - Installed
- for adb, fastboot commands
HTC-Dev unlocked
- to change recovery and ROM
Custom recovery
- to flash Root Access
SuperSU or SuperUser flashable zip
- to have Root Access
Root Access
- to change phone version
misc_version file (attached)
- file needed to change phone version
GoldCard
- to flash any version of RUUs
RUU executable file
- to DOWN/UPgrade
Click to expand...
Click to collapse
Quick tip:
Copy-Paste the cmd codes for you to not have any problem. 1 typo error (extra digit on misc_version) will render your phone unable to RUU.
Click to expand...
Click to collapse
Preparations
a. Create a folder "downsaga" on your C:
b. Copy misc_version, recovery.img(custom) on that folder.
c. Copy SuperSU's or SuperUser's flashable zip to your SD card.
Click to expand...
Click to collapse
Creating a Gold Card (use below or attn1's GoldCard Method)
a. Install Goldcard Helper from the market on your phone
b. Run it and copy the CID for MMC2, or email the info to yours
c. This number has already been reversed so go to http://psas.revskills.de/?q=goldcard, fill out the required fields.
d. Download the image file that was emailed to you.
e. Connect phone as a "Disk drive" using USB cable.
f. Use Gold Card Tool to flash your image file to your phone's SD card. (you might need to reformat it first with Panasonic's SD Formatter)
g. Disconnect safely from the PC.
NOTE:Your sd card is now a GoldCard unless you reformat it again. You should now be able to RUU to any version you would like given that the bootloader is LOCKED.
Click to expand...
Click to collapse
Unlocking the bootloader
a. Go to htcdev.com/bootloader
b. Proceed and follow every step on the guide
c. You just need to install Android Windows Tools files for it. No need to download the SDK and JAVA.
d. Once done, boot on bootloader and you should be able to notice if its UNLOCKED.
Click to expand...
Click to collapse
Flashing Custom Recovery
a. The phone must be on bootloader, then go to fastboot
b. Open up command prompt then type:
Code:
fastboot flash recovery C:\downsaga\recovery.img
fastboot reboot-bootloader
d. Access recovery
Click to expand...
Click to collapse
Flashing Root Access
a. Flash SuperSU or SuperUser
b. Reboot the phone normally
Click to expand...
Click to collapse
Modifying the version of your phone
a. Connect the phone using USB cable using "Charge ONLY" and USB Debugging is ON.
b. Open command prompt and input these codes:
Code:
adb push C:\downsaga\misc_version /data/local/tmp
adb shell chmod 777 /data/local/tmp/misc_version
adb shell
su
cd /data/local/tmp
./misc_version -s 1.27.405.6
exit
adb reboot-bootloader
c. Your phone should now be read as the version you've placed there (but not visible to settings)
Click to expand...
Click to collapse
Locking the bootloader
a. You should be on fastboot
c. In cmd use this command to lock the bootloader:
Code:
fastboot oem lock
c. You might receive an error message on your CMD but don't mind it. The phone should restart itself automatically on bootloader, and you should be able to notice at the top saying "***RE-LOCKED***", and might also has *Security Warning*. Just ignore.
Click to expand...
Click to collapse
Downgrading
a. Make sure you are still on fastboot with the above message.
b. Open the RUU that you've chosen to install on your phone
c. The RUU must detect your phone version as 1.27.405.6
d. If you have received errors, then you've done something wrong. Review everything that you've done and check the guide again.
Click to expand...
Click to collapse
If everything went well, you should have successfully downgraded your phone and your HBOOT.
Hey man it seems you did it! So HTC official unlocker can be handy after all.
Great job! I assume that now you will use Revolutionary to gain S-OFF and back to flashing?
amidabuddha said:
Hey man it seems you did it! So HTC official unlocker can be handy after all.
Great job! I assume that now you will use Revolutionary to gain S-OFF and back to flashing?
Click to expand...
Click to collapse
yes sir'ree!
And howto flash your hboot in recoverymode
Use flash_image to flash your hboot to older version.
flash_image /dev/block/mmcblk0p18 )(path to an older hboot file)
NikMel said:
Use flash_image to flash your hboot to older version.
flash_image /dev/block/mmcblk0p18 )(path to an older hboot file)
Click to expand...
Click to collapse
You wouldn't be able to do that on an official, latest S-ON HBOOT. I have already tried that but will just give you an INFOsignature error.
Skanob said:
Step 1: Creating a Gold Card
a. Install Goldcard Helper from the market
b. Run it and copy the CID for MMC2, or email the info to yours
c. This number has already been reversed so go to http://psas.revskills.de/?q=goldcard, fill out the required fields.
d. Download the image file that was emailed to you.
e. Connect phone as a "Disk drive" using USB cable.
f. Use Gold Card Tool to flash your image file to your phone's SD card. (you might need to reformat it first with Panasonic's SD Formatter and then format it with the Gold Card Tool again)
g. Disconnect safely from the PC, and disconnect the cable.
Click to expand...
Click to collapse
Why would you use such an obsolete method to make a gold card?
after temproot,
windows batch script ( example filename: gc.cmd ):
Code:
adb push goldcard /data/local/tmp/
adb shell chmod 777 /data/local/tmp/goldcard
adb shell cat /sys/class/mmc_host/mmc2/mmc2:*/cid > tcid
set/p cid= < tcid
del tcid
adb shell /data/local/tmp/goldcard -c %cid% -o /data/local/tmp/goldcard.img
adb shell dd if=/data/local/tmp/goldcard.img of=/dev/block/mmcblk1
Linux shell script (example filename: gc.sh ):
Code:
adb push goldcard /data/local/tmp/
adb shell chmod 777 /data/local/tmp/goldcard
cid=`adb shell cat /sys/class/mmc_host/mmc2/mmc2:*/cid`
adb shell /data/local/tmp/goldcard -c $cid -o /data/local/tmp/goldcard.img
adb shell dd if=/data/local/tmp/goldcard.img of=/dev/block/mmcblk1
get the android goldcard binary here:
Thanks to Revskills for the algorythm and to GenePoole for the Android binary.
With this, the entire process can be scripted.
Skanob said:
You wouldn't be able to do that on an official, latest S-ON HBOOT. I have already tried that but will just give you an INFOsignature error.
Click to expand...
Click to collapse
You can do that in recoverymode within adb shell #
I use 4ext recoverymode
attn1 said:
Why would you use such an obsolete method to make a gold card?
after temproot,
windows batch:
Code:
adb push goldcard /data/local/tmp/
adb shell chmod 777 /data/local/tmp/goldcard
adb shell cat /sys/class/mmc_host/mmc2/mmc2:*/cid > tcid
set/p cid= < tcid
del tcid
adb shell /data/local/tmp/goldcard -c %cid% -o /data/local/tmp/goldcard.img
adb shell dd if=/data/local/tmp/goldcard.img of=/dev/block/mmcblk1
Linux Shell:
Code:
adb push goldcard /data/local/tmp/
adb shell chmod 777 /data/local/tmp/goldcard
cid=`adb shell cat /sys/class/mmc_host/mmc2/mmc2:*/cid`
adb shell /data/local/tmp/goldcard -c $cid -o /data/local/tmp/goldcard.img
adb shell dd if=/data/local/tmp/goldcard.img of=/dev/block/mmcblk1
get the android goldcard binary here:
Thanks to Revskills for the algorythm and to GenePoole for the Android binary.
With this, the entire process can be scripted.
Click to expand...
Click to collapse
well, that obsolete-method for me is a hell-of-a-lot easier and noob-proof. no code needed. and also leaves you a copy of your goldcard.img
NikMel said:
You can do that in recoverymode within adb shell #
I use 4ext recoverymode
Click to expand...
Click to collapse
That didn't worked for me. Prior to downgrading, check my sig. I'm using the official S-ON, not the ENG S-OFF leaked.
Skanob said:
well, that obsolete-method for me is a hell-of-a-lot easier and noob-proof. no code needed. and also leaves you a copy of your goldcard.img
Click to expand...
Click to collapse
No way is it easier or noob proof. When I used this method on the Ace Hack Kit goldcard errors dropped to none. Since you are already running adb commands and pushing crap to the phone, what's the big deal with this?
With this, there is no need for hacky tools, not mounting/dismounting the sdcard (risking corruption from unflushed write buffers and improper dismounts), and no need to go to the revskills website.
This runs in about a second and it's done.
attn1 said:
No way is it easier or noob proof. When I used this method on the Ace Hack Kit goldcard errors dropped to none. Since you are already running adb commands and pushing crap to the phone, what's the big deal with this?
With this, there is no need for hacky tools, not mounting/dismounting the sdcard, and no need to go to the revskills website or copy files back from email. This runs in about second and it's done.
Click to expand...
Click to collapse
I believe that that is based on your preference. Which I observed really knows a lot about adb.
And what is in the guide is based on my own preference. Which for me does not know much about adb.
They still can follow which ever method they would like.
Well, it would still give us the same result. Having a GoldCard.
Skanob said:
I believe that that is based on your preference. Which I observed really knows a lot about adb.
And what is in the guide is based on my own preference. Which for me does not know much about adb.
They still can follow which ever method they would like.
Well, it would still give us the same result. Having a GoldCard.
Click to expand...
Click to collapse
Mine is based on real results after thousands of uses of the Ace Hack Kit, which formerly did things the obsolete way.
Yours is based on preference.
But you are right, either way will result in a goldcard if executed properly.
attn1 said:
Mine is based on real results after thousands of uses of the Ace Hack Kit, which formerly did things the obsolete way.
Yours is based on preference.
But you are right, either way will result in a goldcard if executed properly.
Click to expand...
Click to collapse
yeah. I'll update the guide with your method aswell. Thanks aswell!
High five!
Skanob said:
yeah. I'll update the guide with your method aswell. Thanks aswell!
High five!
Click to expand...
Click to collapse
You're welcome.
Make a note that those are the contents of a script - .cmd or .sh.
FYI, if you try this to make the goldcard image, the one generated should match the md5 of one you got from Revskills.
Once you do it this way, you will never go back.
@Scanob
Since you change your guide in step 6 to run RUU instead of PG88IMG.zip than the Goldcard is no longer needed isn't it?
misc_version not found error....
I don't know how to find this official recovery.img. (Yes I try to find it...)
Step 4: Flashing official recovery.img
amidabuddha said:
@Scanob
Since you change your guide in step 6 to run RUU instead of PG88IMG.zip than the Goldcard is no longer needed isn't it?
Click to expand...
Click to collapse
You will still need it. Even the PG88IMG.zip method uses checks as exactly the same as doing an RUU.
hekermeker said:
misc_version not found error....
Click to expand...
Click to collapse
barthdvs said:
I don't know how to find this official recovery.img. (Yes I try to find it...)
Step 4: Flashing official recovery.img
Click to expand...
Click to collapse
Re-check the guide after a few
@barthdvs
Getting the Official files
a. Download the HTC_EUROPE_2.10.401.5 RUU file.
b. Run the file and do not close
c. Go to your temp folder on your computer and find the rom.zip file.
d. Copy it somewhere else.
e. Extract the rom.zip and you should now have the official .img files from the RUU.
f. Use the respective files needed for the guide.
or the files is here (files exrtract from HTC_EUROPE_2.10.401.5 RUU file)
Boot.img : http://www.multiupload.com/JME2WRDQEQ
recovery.img : http://www.multiupload.com/MX64VDUICI

[Q] flash insecure boot image from CWM?

Is there a way to flash an insecure boot image from CWM recovery?
I rooted my transformer with nachoroot, and installed CWM with the one-click recovery installer. None of these methods unlocked the boot loader, obviously, so I can't use adb remount and friends.
I have a B70 tf101, with the .21 firmware if that helps.
I think you need to flash an insecure boot.img.
There are a few few threads kicking around in the dev section that explain this. rebound821 posted an excellent thread. I think this is exactly what moshi and brk's root tools do via nvflash.
In a nutshell:
1) extract your boot.img from your TF
2) unpack the boot.img to the kernel and ramdisk
3) unpack the ramdisk
4) edit default.prop to set ro.secure=0
5) re-assemble in reverse order
6) zip and flash
gee one said:
I think you need to flash an insecure boot.img.
There are a few few threads kicking around in the dev section that explain this. rebound821 posted an excellent thread. I think this is exactly what moshi and brk's root tools do via nvflash.
In a nutshell:
1) extract your boot.img from your TF
2) unpack the boot.img to the kernel and ramdisk
3) unpack the ramdisk
4) edit default.prop to set ro.secure=0
5) re-assemble in reverse order
6) zip and flash
Click to expand...
Click to collapse
thanks for the reply, but I was asking if after I've done that I could flash the boot img with CWM? I've heard that nvflash doesn't work on B70 transformers.
Sent from my HTC Vision using Tapatalk
Yup, in step 6, you would zip it up and flash it via cwm.
pm sent!!!
perquisitor_omnia said:
Is there a way to flash an insecure boot image from CWM recovery?
I rooted my transformer with nachoroot, and installed CWM with the one-click recovery installer. None of these methods unlocked the boot loader, obviously, so I can't use adb remount and friends.
I have a B70 tf101, with the .21 firmware if that helps.
Click to expand...
Click to collapse
If you have root you can do adb remount.
Start a shell in adb and use su to get root. Now you can remount.
I assume this is about remount /system
gls9 said:
If you have root you can do adb remount.
Start a shell in adb and use su to get root. Now you can remount.
I assume this is about remount /system
Click to expand...
Click to collapse
Yeah, but even if I remount /system using adb shell I can still can't do "adb push" to /system so I assume I need to set ro.secure=0 in the bootloader for this to work.
perquisitor_omnia said:
Yeah, but even if I remount /system using adb shell I can still can't do "adb push" to /system so I assume I need to set ro.secure=0 in the bootloader for this to work.
Click to expand...
Click to collapse
I dont know because I don't use adb much.
But why not do this from terminal emulator and just copy the file from sdcard ?
(or with adb shell)
Something like this:
su
mount -o remount,rw /system
cat [source] > [destination]
gls9 said:
I dont know because I don't use adb much.
But why not do this from terminal emulator and just copy the file from sdcard ?
(or with adb shell)
Something like this:
su
mount -o remount,rw /system
cat [source] > [destination]
Click to expand...
Click to collapse
Thats what I am doing at the moment, but it is annoying to have to stage all files to /data/local or /sdcard before copying files to /system from the tablet, when it is much easier to do
$ adb push <file> /system/
from the host computer. Anyway, if I make a insecure bootloader for my tablet that can be flashed from the recovery, I'll post it here as it might be useful to other people in my position.
I've got an insecure boot.img from the US 8.6.5.21 firmware if anyone is interested. It's just the boot in a zip file.
Maybe I'm misunderstanding, but I thought that any image you flashed with CWM recovery was using an insecure boot.img, unless flashing back stock recovery. Anyway, for adb push or adb pull for that matter to work you have to install Asus sync software and USB drivers under Windows and if in Linux, you can search xda for the thread that explains how to get adb working. Once you've got that and root you can adb push and adb pull all day long til you run out of space.
sidneyk said:
Maybe I'm misunderstanding, but I thought that any image you flashed with CWM recovery was using an insecure boot.img, unless flashing back stock recovery. Anyway, for adb push or adb pull for that matter to work you have to install Asus sync software and USB drivers under Windows and if in Linux, you can search xda for the thread that explains how to get adb working. Once you've got that and root you can adb push and adb pull all day long til you run out of space.
Click to expand...
Click to collapse
I have adb working properly (I use it with my G2 all the time), and I use linux.
But for some reason, with my Asus Transformer, when I do
Code:
$ adb remount
I get a 'permission denied' error.
Even if I remount /system rw from the shell, I still get 'permission denied' when trying to use 'adb push' to any directory besides /data/local or /sdcard on the tablet. Is this a bug with the recovery I flashed? or is this because the bootloader hasn't had ro.secure=0 set?
Sent from my Transformer TF101 using Tapatalk
Are you trying this in recovery or under the normal system? Try it under both.
sent from my transformer
I'm trying under the normal system, I will try under recovery when I get access to my desktop.
Sent from my Transformer TF101 using Tapatalk
OK, how about some testing:
from your PC:
adb version
adb shell grep secure /default.prop (or adb shell getprop ro.secure)
This will check your adb version and also see if your ro.secure flag is set.
I tested 'adb remount' and it worked as intended. I'm on adb version 1.0.29 with ro.secure=0.
Also, the recovery ramdisk has it's own default.prop and ro.secure flag, so these can actually be set independantly, but I think you would notice it immediately if recovery wasn't insecure.
Code:
$ adb version
Android Debug Bridge version 1.0.29
$ adb -s shell getprop ro.secure
1
so that would be the problem. can I set the ro.secure property in build.prop?
perquisitor_omnia said:
I have adb working properly (I use it with my G2 all the time), and I use linux.
But for some reason, with my Asus Transformer, when I do
Code:
$ adb remount
I get a 'permission denied' error.
Even if I remount /system rw from the shell, I still get 'permission denied' when trying to use 'adb push' to any directory besides /data/local or /sdcard on the tablet. Is this a bug with the recovery I flashed? or is this because the bootloader hasn't had ro.secure=0 set?
Sent from my Transformer TF101 using Tapatalk
Click to expand...
Click to collapse
I am familiar with errors kind of like this from Mac OS, dunno if it applies here but you might try repairing permissions from CWM. I have fund that quite a lot of ROMs do not have correct permissions set.
Cheers!
-M
Xda member since 2007
perquisitor_omnia said:
Code:
$ adb version
Android Debug Bridge version 1.0.29
$ adb -s shell getprop ro.secure
1
so that would be the problem. can I set the ro.secure property in build.prop?
Click to expand...
Click to collapse
Yeah, that would cause the issues. Not sure how to fix it, but some ideas:
1) flash an insecure boot.img via cwm
2) use the staging partition to flash a boot.img/blob
3) ???
I finally used the SBK detect tool, my B70 has a nvflashable firmware, so I will pull the boot loader with nvflash and make it insecure that way.
Sent from my HTC Vision using Tapatalk

RUU File for RADIO-26.17.14.11_M

Hi,
I have the HTC Inspire 4g with:
Software #: 3.20.502.52 710RD
Android Version 2.3.5
HTC Sense 3.0
Baseband version: 12.69a.60.29u_26.17.14.11_M
I have unlocked the bootloader using htcdev and have successfully rooted the the device but i'm still S-ON. I have tried installing some custom ROMs however after flashing the device did not boot. I understand that I have to flash the boot.img file located in the .zip file of the custome ROM. That I know how to do... My concern is that I want to try out some ROMs but as a precaution I would like to have the stock RUU file for the type device I have should I need to restore it.
I did create a backup of my ROM and have used it previously to restore the phone after installing the custom roms that haven't boot. I just want to know if I flash the boot.img file will a restore bring it back to where it was before the flash or do i need the RUU file to restore stock?
If the later please advice where I can find that particular file as I've searched but can't seem to find the one to use.
Thanks a million.
360fifa
360fifa said:
Hi,
I have the HTC Inspire 4g with:
Software #: 3.20.502.52 710RD
Android Version 2.3.5
HTC Sense 3.0
Baseband version: 12.69a.60.29u_26.17.14.11_M
I have unlocked the bootloader using htcdev and have successfully rooted the the device but i'm still S-ON. I have tried installing some custom ROMs however after flashing the device did not boot. I understand that I have to flash the boot.img file located in the .zip file of the custome ROM. That I know how to do... My concern is that I want to try out some ROMs but as a precaution I would like to have the stock RUU file for the type device I have should I need to restore it.
I did create a backup of my ROM and have used it previously to restore the phone after installing the custom roms that haven't boot. I just want to know if I flash the boot.img file will a restore bring it back to where it was before the flash or do i need the RUU file to restore stock?
If the later please advice where I can find that particular file as I've searched but can't seem to find the one to use.
Thanks a million.
360fifa
Click to expand...
Click to collapse
RUU 3.20.502.52
Thank you kindly for taking the time to respond and also help.
Hi Gizmoe,
is there a rooted and s-off RUU file I could use as well?
Thanks again..
360fifa said:
Hi Gizmoe,
is there a rooted and s-off RUU file I could use as well?
Thanks again..
Click to expand...
Click to collapse
RUU 's can not be modified. You will not lose s off however by running an ruu. After you run ruu just pd98img a recovery and flash away.
Gizmoe said:
RUU 's can not be modified. You will not lose s off however by running an ruu. After you run ruu just pd98img a recovery and flash away.
Click to expand...
Click to collapse
So are you saying that I would need to unlock the bootloader again then following the same steps I have now? I had the impression based off could threads I've read that there's a way to root the device while gaining S-OFF that will allow me to avoid having to manually flash the boot.IMG everytime i install a custom rom. If there's a thread I can read or a guide to follow please provide a link so that I can proceed. Oh, does all the pd98img file the same?
Thanks again.
360fifa
360fifa said:
So are you saying that I would need to unlock the bootloader again then following the same steps I have now? I had the impression based off could threads I've read that there's a way to root the device while gaining S-OFF that will allow me to avoid having to manually flash the boot.IMG everytime i install a custom rom. If there's a thread I can read or a guide to follow please provide a link so that I can proceed. Oh, does all the pd98img file the same?
Thanks again.
360fifa
Click to expand...
Click to collapse
Yeah that's right. Your not s off. Well here is the only method left for the inspire. It may be a bit intimidating but really isn't that hard. Here is link.
http://tau.shadowchild.nl/attn1/?cat=6
Gizmoe said:
Yeah that's right. Your not s off. Well here is the only method left for the inspire. It may be a bit intimidating but really isn't that hard. Here is link.
Click to expand...
Click to collapse
Your're right very intimidating, however I'm willing to try my only concern is what is dd highlighted below "High Level Steps (some detail deliberately NOT included)
htc dev unlock, install cwm recovery and root ONLY
dd the stock boot image to /data/local/tmp and pull it to your pc HD (/dev/block/mmcblk0p22 is boot)
adb shell dd if=/dev/block/mmcblk0p22 of=/data/local/tmp/boot.img
adb pull /data/local/tmp/boot.img"?
Also i navigated to the folder on my device however it doesn't show any boot.img file. Just a init.rc file. Could you explain just this part of it please?
Thanks again,
360fifa
360fifa said:
Your're right very intimidating, however I'm willing to try my only concern is what is dd highlighted below "High Level Steps (some detail deliberately NOT included)
htc dev unlock, install cwm recovery and root ONLY
dd the stock boot image to /data/local/tmp and pull it to your pc HD (/dev/block/mmcblk0p22 is boot)
adb shell dd if=/dev/block/mmcblk0p22 of=/data/local/tmp/boot.img
adb pull /data/local/tmp/boot.img"?
Also i navigated to the folder on my device however it doesn't show any boot.img file. Just a init.rc file. Could you explain just this part of it please?
Thanks again,
360fifa
Click to expand...
Click to collapse
DD is copy and convert. It will copy boot files and convert it into boot.img. Use adb shell to do it as shell works within phone directories. Then pull it from pc using adb pull. He is giving you the exact adb commands to do both.
Code:
adb shell
dd if=/dev/block/mmcblk0p22 of=/data/local/tmp/boot.img
adb pull /data/local/tmp/boot.img
Gizmoe said:
DD is copy and convert. It will copy boot files and convert it into boot.img. Use adb shell to do it as shell works within phone directories. Then pull it from pc using adb pull. He is giving you the exact adb commands to do both.
Code:
adb shell
dd if=/dev/block/mmcblk0p22 of=/data/local/tmp/boot.img
adb pull /data/local/tmp/boot.img
Click to expand...
Click to collapse
Lol... I figured those were the commands to use, was just wondering what dd stand for.. ( copy and convert ). So let me see if i understand whats happening in the code.
So firstly I need to have the the HTC drivers installed and have the Android SDK on the root of c drive. Basically the same folder used when I unlocked to bootloader. In that folder I have the adb files, should I also add the files listed in the zip file he provided? If so let me explain the code, if no please shed some light.
So adb shell starts the emulator with the device
dd if=/dev/block/mmcblk0p22 of=/data/local/tmp/boot will copy and convert the mmcblk0p22 file if it is found in the /dev/block folder on the device and place it to the /data/local/tmp/ folder and call it boot.img
adb pull /data/local/tmp/boot.img I'm thinking that the computer is going to pull the boot.IMG file from the /data/local/tmp folder however where is it putting it? In the same folder that I started the command prompt from? That is the Android folder on my c drive?
360fifa said:
Lol... I figured those were the commands to use, was just wondering what dd stand for.. ( copy and convert ). So let me see if i understand whats happening in the code.
So firstly I need to have the the HTC drivers installed and have the Android SDK on the root of c drive. Basically the same folder used when I unlocked to bootloader. In that folder I have the adb files, should I also add the files listed in the zip file he provided? If so let me explain the code, if no please shed some light.
So adb shell starts the emulator with the device
dd if=/dev/block/mmcblk0p22 of=/data/local/tmp/boot will copy and convert the mmcblk0p22 file if it is found in the /dev/block folder on the device and place it to the /data/local/tmp/ folder and call it boot.img
adb pull /data/local/tmp/boot.img I'm thinking that the computer is going to pull the boot.IMG file from the /data/local/tmp folder however where is it putting it? In the same folder that I started the command prompt from? That is the Android folder on my c drive?
Click to expand...
Click to collapse
You will want to work out of the platform-tools directory.
Yes adb pull will always pull to your working directory unless another path is specified. Adb shell will need root. So if you type adb shell and don't see a # sign type su to get it. When done in adb shell you will need exit so you can pull to computer. If you had to take two steps to get a # prompt then you will type exit twice.
Gizmoe said:
You will want to work out of the platform-tools directory.
Yes adb pull will always pull to your working directory unless another path is specified. Adb shell will need root. So if you type adb shell and don't see a # sign type su to get it. When done in adb shell you will need exit so you can pull to computer. If you had to take two steps to get a # prompt then you will type exit twice.
Click to expand...
Click to collapse
Kool, thats the directory i'm referring to... I'm sure i'm already rooted. But your saying that when i send the command "adb shell" if I don't see the # sign then i should type su. Are you then saying that if I had to type su twice then I need to hit exit twice to pull to pc?
Oh before I forget should i run ruu before attempting this or remain as is? Also, do I need cmw recovery installed or can i remain on twrp 2.6.0.0?
Thanks again bro..
360fifa
360fifa said:
Kool, thats the directory i'm referring to... I'm sure i'm already rooted. But your saying that when i send the command "adb shell" if I don't see the # sign then i should type su. Are you then saying that if I had to type su twice then I need to hit exit twice to pull to pc?
Oh before I forget should i run ruu or remain as is?
Thanks again bro..
360fifa
Click to expand...
Click to collapse
Yes you would need to type su to see #. Adb shell root access works independently of phone root. It needs root access over adb which without an UN-secure boot img will need the su command. Exit for each level. Once for su and once for shell itself. You want to exit until you are back at Windows directory. Adb shell is at the phones root directory. The dd command is moving files within the phone, while Adb pull would be used to copy from phone to pc. I would not run that ruu if you are going to try and s off. I would run 2.47.502.7. Which I posted a link in the att stock Rom thread.
---------- Post added at 05:35 PM ---------- Previous post was at 05:33 PM ----------
http://forum.xda-developers.com/showthread.php?p=50027824
Gizmoe said:
Yes you would need to type su to see #. Adb shell root access works independently of phone root. It needs root access over adb which without an UN-secure boot img will need the su command. Exit for each level. Once for su and once for shell itself. You want to exit until you are back at Windows directory. Adb shell is at the phones root directory. The dd command is moving files within the phone, while Adb pull would be used to copy from phone to pc. I would not run that ruu if you are going to try and s off. I would run 2.47.502.7. Which I posted a link in the att stock Rom thread.
---------- Post added at 05:35 PM ---------- Previous post was at 05:33 PM ----------
http://forum.xda-developers.com/showthread.php?p=50027824
Click to expand...
Click to collapse
Do i need to run a ruu or can I proceed as is? If so u recommend running the 2.47.502.7 ruu before going thru the adb commands, y?
Thanks again..
360fifa said:
Do i need to run a ruu or can I proceed as is? If so u recommend running the 2.47.502.7 ruu before going thru the adb commands, y?
Thanks again..
Click to expand...
Click to collapse
Yes go ahead and proceed as is. You should not have any issues. If not successful then try ruu. You may not be able to run the older ruu if your bootloader is newer. Which in that case just run the newer one. I beleive I used this process on a phone with the newer software but the older works for sure.
Gizmoe said:
Yes go ahead and proceed as is. You should not have any issues. If not successful then try ruu. You may not be able to run the older ruu if your bootloader is newer. Which in that case just run the newer one. I beleive I used this process on a phone with the newer software but the older works for sure.
Click to expand...
Click to collapse
Gizmoe you have been very patient and very helpful i thank you a million times. If i encounter any other issues I'll definitely let you know.
Thanks again..
360fifa
360fifa said:
Gizmoe you have been very patient and very helpful i thank you a million times. If i encounter any other issues I'll definitely let you know.
Thanks again..
360fifa
Click to expand...
Click to collapse
I encountered an issue while trying to pull the boot.img file from /data/local/tmp/. The command used was adb pull /data/local/tmp/boot.img I then got a msg saying the adb is not a command, if I remove the adb and send the command with just pull it says pull is not a command.
If I exit su "#" it brings me to $ and if I send the command again it says that I don't have permission. Can you advise what I might be doing wrong? Oh, I got the mmcblk0p22 file to copy and convert into the boot.img file. I was able to see it using ES File explorer on my phone.
Do I need to go in fastboot usb, does unknown sources need to be checked?
Thanks again.
360fifa said:
I encountered an issue while trying to pull the boot.img file from /data/local/tmp/. The command used was adb pull /data/local/tmp/boot.img I then got a msg saying the adb is not a command, if I remove the adb and send the command with just pull it says pull is not a command.
If I exit su "#" it brings me to $ and if I send the command again it says that I don't have permission. Can you advise what I might be doing wrong? Oh, I got the mmcblk0p22 file to copy and convert into the boot.img file. I was able to see it using ES File explorer on my phone.
Do I need to go in fastboot usb, does unknown sources need to be checked?
Thanks again.
Click to expand...
Click to collapse
You need to exit one more time so you can see c prompt with your platform tools folder. Your still in shell therefore still in phone and not actually pulling to your pc. Only the pc uses Adb commands so you have to be at your platform tools folder. If you restart your phone temp empties too so if you can't see boot img anymore that's why.
Gizmoe said:
You need to exit one more time so you can see c prompt with your platform tools folder. Your still in shell therefore still in phone and not actually pulling to your pc. Only the pc uses Adb commands so you have to be at your platform tools folder. If you restart your phone temp empties too so if you can't see boot img anymore that's why.
Click to expand...
Click to collapse
Okay.. I am going to try that now, I swore I did that as well but lets see.
360fifa said:
Okay.. I am going to try that now, I swore I did that as well but lets see.
Click to expand...
Click to collapse
Here's what it said "failed to copy '/data/local/tmp/boot.img' to ' ./boot.img': Permission denied

Categories

Resources