I updated OTA to 2.2.1 on my Droid X....
I had not previously tried rooting my phone - just was going through different apps and manual procedures available for rooting and besides I came to know about the 2.2.1 availability, so waited till it was available...
So now I followed the manual instructions found all over the internet:
I'm just doing a copy-paste of the same:
I tried these steps from a linux box. I'm able to push the required files onto the sdcard as well as the tmp directory. I'm also able to chmod the binary to make it executable. Also the application successfully kicks me out of the adb shell.
But adb is not able to identify my device from then on even after restarting the adb daemon lot of times. If I reboot the phone, adb is able to discover the device again but the exploit becomes unusable after the reboot.
Does any one else face the same issue ? Any other suggestions on what I might be missing ?
I even tried keeping my USB mode in both Phone Mode as well as Charge-only mode.
I know there are standalone and one-click apps available out there which does the rooting, but I prefer to know what is going on just to make sure I can cleanly unroot the phone if required in the future.
Thanks.
I had not previously tried rooting my phone - just was going through different apps and manual procedures available for rooting and besides I came to know about the 2.2.1 availability, so waited till it was available...
So now I followed the manual instructions found all over the internet:
I'm just doing a copy-paste of the same:
- Open command prompt
- cd C:\android-sdk-windows\tools
- adb devices (to verify the connection)
- adb push Superuser.apk /sdcard/Superuser.apk
- adb push su /sdcard/su
- adb push busybox /sdcard/busybox
- adb push rageagainstthecage-arm5.bin /data/local/tmp/rageagainstthecage-arm5.bin
- adb shell
- cd data/local/tmp
- chmod 0755 rageagainstthecage-arm5.bin
- ./rageagainstthecage-arm5.bin
- let the process run until it 'kicks' you out (may take a minute or two) to C:\android-sdk-windows\tools
- cd C:\android-sdk-windows\tools
- adb kill-server
- adb devices (to verify the connection)
- adb shell (you should now have a # prompt, if not return to ./rage step above)
- mount -o rw,remount -t ext3 /dev/block/mmcblk1p21 /system
- cp /sdcard/Superuser.apk /system/app/Superuser.apk
- cp /sdcard/su /system/bin/su
- cp /sdcard/busybox /system/bin/busybox
- chmod 4755 /system/bin/su
- chmod 4755 /system/bin/busybox
- mount -o ro,remount -t ext3 /dev/block/mmcblk1p21 /system
- exit
- exit
I tried these steps from a linux box. I'm able to push the required files onto the sdcard as well as the tmp directory. I'm also able to chmod the binary to make it executable. Also the application successfully kicks me out of the adb shell.
But adb is not able to identify my device from then on even after restarting the adb daemon lot of times. If I reboot the phone, adb is able to discover the device again but the exploit becomes unusable after the reboot.
Does any one else face the same issue ? Any other suggestions on what I might be missing ?
I even tried keeping my USB mode in both Phone Mode as well as Charge-only mode.
I know there are standalone and one-click apps available out there which does the rooting, but I prefer to know what is going on just to make sure I can cleanly unroot the phone if required in the future.
Thanks.