Great! Thank you! I don't have the SH-12C but I will try this once my brother returns - or once I get my hands on my friend's SH-12C. Meanwhile, other owners of the SH-12C can try this and report.
Last edited:
cd 初回導入用 ***(just cd into this directory, copy and paste the Japanese into the command prompt or rename the folder to something memorable in English)***
adb shell mkdir /data/local/bin/
adb push flash_image /data/local/bin/
adb shell chmod 755 /data/local/bin/flash_image
adb push Superuser2.3.6.3\su /data/local/bin/
adb push autoexec.sh /data/local/bin/
To begin with, the root package is now impossible to find. I did manage to find it a couple of weeks ago (not from the original download location) and have uploaded it to my website for those who might need it.
Where is this 初回導入用 folder? I don't have it in the package I downloaded. What's supposed to be in it?
I skipped this line, and continued with the other commands. These three seem to execute without problems:
Code:adb shell mkdir /data/local/bin/ adb push flash_image /data/local/bin/ adb shell chmod 755 /data/local/bin/flash_image
But this one doesn't make sense:Code:adb push Superuser2.3.6.3¥su /data/local/bin/
The Superuser I have in the package is just "Superuser.apk", the version isn't part of the name, although the file seems to be this exact version.
Then, the Yen sign (¥)... What does it mean? I have no way to write this sign in my CMD window, and pasting it doesn't work (a question mark is pasted instead).
After that I rebooted. Launched SHBreak4 once. Tapped the "Exit" button after a few (ten-twenty) seconds. Then waited for more than 30 seconds. Tapping on SHBreak4 does nothing. I can't seem to launch it again. I tried this a couple of times (after rebooting). In one attempt, SHBreak4 appeared in the list of running apps (tap the right hand side button of the Home launcher). But nothing afterwards...
Yo I'll try to help you out!
Good luck and sorry for totally missing that Yen sign! Let us know how it goes!
su
mount _sd
mount _data
flash_image recovery /mnt/sdcard/mtdbackup/recovery.img
flash_image boot /mnt/data/local/boot_rescue0910.img
◆
◆ Key functions
◆
・Key functions before entering rescue mode
POWER key : Boot from NAND
CAMERA key : Boot from SDHC (if the files are in /mnt/sdcard/sdboot/)
HOME key : Switch to rescue mode
SEARCH key : Enable the su in adb (flashing button until the end) until the start of the boot. Does not enter rescue mode. Primarily for debugging.
・Key functions in rescue mode
POWER key : Boot from NAND to exit the rescue mode
CAMERA key : Boot from SDHC to exit rescue mode (if the files are in /mnt/sdcard/sdboot/)
HOME key : Boot from NAND, exit the rescue mode
SEARCH key : Restart adbd. Primarily for debugging.
You will see $. Now type
The cursor will change to #. You now have SU.
Now type:
If you get a "can't open" error and you are sure the folder and file exist, just change the file's permissions:
Sorry a cold has knocked me out for the past few days, glad you were able to get out of boot loop!
From the sound of it it looks like you're saying that you will not normally have root on your phone now. However, I think that su does reside in your system folder (not positive cause I don't have your exact model of phone). Somewhere in this thread somebody posted a link to a widget apk that you could install that supposedly would allow you to flip su on and off at will. Might not hurt to check it out!
Again, sorry for the delay!
Try downloading the package from my dropbox here:
https://www.dropbox.com/s/gwhxsvdcmmkcczr/sh12c_boot_rescue0910.zip
If you still can't download it I'll email you!
Sorry..i have a sh-12c locked pattern...plz help me find out the way to unlock...google mail account didnot help
Sent from my LT18i using xda premium
Okay, so with the help of xerxesnet and the USB drivers last night, I had a bit of a fiddle around and this is what I found out. I'm sure it's nothing we don't already know. I used a WIndows 7 x64 machine, by the way:
1. Not sure if this is just limited to me or not, but I could only get USB debugging to enable under MTP mode. Sending adb and fastboot commands in other modes would have no effect, as the device can't be found.
2. adb works, and I could access the recovery easily enough. There are no menu items in the recovery, though. I tried tapping all over the screen, all the hardware buttons and quite a few different combinations, but couldn't make any options of any type appear.
3. I couldn't adb or fastboot reboot into the bootloader. It just boots straight into the OS every time. It seems strange that there would be zero access at all.
4. Obviously, fastboot oem unlock didn't work. However, I got an infinite 'waiting for device' loop rather than an error. All drivers were properly installed, so not sure whether the oem unlock command may actually work or not.
I'll have a crack at SuperOneClick tonight, with both psneuter and GingerBreak exploits. I'll also see if I can make any headway with pushing the oem unlock command. It'd be nice if that was all that was standing in the way of removing the NAND lock, although I'm not too hopeful.
I'll have a bit more of a poke around adb and fastboot also, try some of the other commands and see what I turn up. I'll report back in the morning.
Cheers!
I've read cheeseus post about how to restore from boot loop. I tried using his method but it didn't work. My sh12c cannot boot into recovery.
I've bricked my phone when I tried to root it by SHBreak and do a factory reset, after that it won't boot anymore. It stuck in a docomo screen, and not even passing to the AQUOS screen.
Could somebody help me.
(I'd not did backup my phone before it's bricked and the firmware link in "http://xdaforums.com/showthread.php?t=1332375" won't working. Could somebody please upload it again?)
Does anyone here know how to sniff wifi packets?
I'm guessing it must be accessing some file on the net which says which base version the update needs. If we know the web address and the contents of the file, we could probably redirect the access to our own file which fakes the version so we can update without first going to 1.0.6.