.
.
.
.
>> Adding CG37 0xE4400000-0xEFFFFFFF
>> waiting for phone: Connected.
>> uploading RDL03: 100%
-- OK
>> verifying ramloader
-- OK
>> executing ramloader
-- OK
>> waiting for Phone: Connected
>> sending erase
RX(7): [02]ERR[1e][ab][03]
!!failed
>>rebooting
and now? has anyone an idea???
---------------------------------------------
Milestone 2 A953 (Europe/Germany) with Retail Latin American R01 Android 2.3.6
Skreelink saw the same error using the Droid X. I tried it and also got an error issuing an erase with CG37. However, when I extracted the SBF and flashed something already in the SBF (like recovery) it went through with no issues. Same goes for a regular SBF flash. I suspect the RDL file simply does not contain the command to erase CG37, as SBFing does not wipe the userdata regularly. I would have thought the XT610 (Droid Pro) would be the same, but I haven't had a chance to download the SBF they're going off of to see.
I tried using the milestone rom and lost data connectivity and phone always showed roaming I wasn't able to *228 either I kept getting a message telling me there was a error processing
Sent from my DROIDX using XDA
Hi! I just created this thread to let you know that thanks to user dettofatto and me, there's a new root method for Motorola Android Phones (I don't know if it will work for other brands).
NOTE: I tried this method with Gingerbread, I don't know if this will work with other versions.
The method is far from easy, but it works if none of the existing exploits and tricks don't.
Ok, there are some simple-like steps to root your phones:
1. If you have an unrooted gingerbread, ask for a rooted gingerbread userdata partition image (aka CG37) with a modified local.prop file and USB debugging enabled.
The value that you need to modify is ro.sys.atvc_allow_all_adb from 0 to 1.
IMPORTANT: The best you can do is to double wipe the phone and then modify local.prop an allow USB debugging, so the data partition doesn't have any of your personal information.
Then you can create a userdata partition image by typing this in the shell (with root access)
Code:dd if=/dev/block/userdata of=/sdcard/CG37.smg
or
Code:busybox dd if=/dev/block/userdata of=/sdcard/CG37.smg
and let it do its work.
2. Once you got your CG37.smg in the SD card, you will have to boot into linux (so you can use sbf_flash).
3. When you are in linux, you need to extract the folder contained in the zip that you can download here mediafire.com/?n100jj66130lgra
4. Then you need to copy the CG37.smg and your original SBF (the non rooted one) to that folder.
5. Now you'll have to start a terminal with root permissions, and move to the folder by typing
(where folder is the folder I just mentioned, without the <>, you can drag the folder to the terminal if you don't want to type its address)Code:cd <folder>
4. Then you need to resize that partition to 200 Mb, since sbf_flash won't allow you to flash a big image (approx. 1,1 Gb). You have to type this
Code:efsck -f CG37.smg resize2fs CG37.smg 200M
5. Then you need to type
Code:chmod +x sbf_flash
and then you need to start your phone into bootloader and connect it to the computer, then you type
(where ORIGINAL corresponds to the name of your SBF)Code:./sbf_flash -r --userdata CG37.smg ORIGINAL.sbf
and let it its work.
5. Once the phone started up, you now need to run this command
Code:bash finishroot.sh
And let it finish the work.
6. Now you have your phone rooted. You can just reboot into recovery mode and do a double wipe, because the files that we needed are now in system partition.
Hi! I just created this thread to let you know that thanks to user dettofatto and me, there's a new root method for Motorola Android Phones (I don't know if it will work for other brands).
NOTE: I tried this method with Gingerbread, I don't know if this will work with other versions.
The method is far from easy, but it works if none of the existing exploits and tricks don't.
Ok, there are some simple-like steps to root your phones:
1. If you have an unrooted gingerbread, ask for a rooted gingerbread userdata partition image (aka CG37) with a modified local.prop file and USB debugging enabled.
The value that you need to modify is ro.sys.atvc_allow_all_adb from 0 to 1.
IMPORTANT: The best you can do is to double wipe the phone and then modify local.prop an allow USB debugging, so the data partition doesn't have any of your personal information.
Then you can create a userdata partition image by typing this in the shell (with root access)
Code:dd if=/dev/block/userdata of=/sdcard/CG37.smg
or
Code:busybox dd if=/dev/block/userdata of=/sdcard/CG37.smg
and let it do its work.
2. Once you got your CG37.smg in the SD card, you will have to boot into linux (so you can use sbf_flash).
3. When you are in linux, you need to extract the folder contained in the zip that you can download here mediafire.com/?n100jj66130lgra
4. Then you need to copy the CG37.smg and your original SBF (the non rooted one) to that folder.
5. Now you'll have to start a terminal with root permissions, and move to the folder by typing
(where folder is the folder I just mentioned, without the <>, you can drag the folder to the terminal if you don't want to type its address)Code:cd <folder>
4. Then you need to resize that partition to 200 Mb, since sbf_flash won't allow you to flash a big image (approx. 1,1 Gb). You have to type this
Code:efsck -f CG37.smg resize2fs CG37.smg 200M
5. Then you need to type
Code:chmod +x sbf_flash
and then you need to start your phone into bootloader and connect it to the computer, then you type
(where ORIGINAL corresponds to the name of your SBF)Code:./sbf_flash -r --userdata CG37.smg ORIGINAL.sbf
and let it its work.
5. Once the phone started up, you now need to run this command
Code:bash finishroot.sh
And let it finish the work.
6. Now you have your phone rooted. You can just reboot into recovery mode and do a double wipe, because the files that we needed are now in system partition.
dd if=/dev/block/userdata of=/sdcard/CG37.smg
busybox dd if=/dev/block/userdata of=/sdcard/CG37.smg
cd <folder>
efsck -f CG37.smg
resize2fs CG37.smg 200M
chmod +x sbf_flash
./sbf_flash -r --userdata CG37.smg ORIGINAL.sbf
bash finishroot.sh
system.zipCould it be possible to re-upload the required files? The mediafire link in the OP says it has been removed for violation... I was going to try this method for a DX 621, despite having the 604 root method, it would be nice to actually have the 621 kernel.3. When you are in linux, you need to extract the folder contained in the zip that you can download here mediafire.com/?n100jj66130lgra