It's working flawlessly on A400_03_0070_0132_ROW. :good:
CWM install works also.
Thanks man, I'm really happy
CWM install works also.
Thanks man, I'm really happy
It's working flawlessly on A400_03_0070_0132_ROW. :good:
CWM install works also.
Thanks man, I'm really happy
First, load this one: LINK
Its the Driver needed for the TPT to communicate with the PC over ADB protocol.
Go to your TPT Settings below inside Developer Options and check USB Debugging. Attach to your PC and hand the new unknown Device in Device manager the loaded ADB Driver. Then download and unzip everything from the Exploit into a directory; then run RootDebugfs.bat from that directory. This should do it for the rooting of the Stock Firmware. You can verify it by getting "Root Checker" from Play Store. If its green, next load this one: LINK and this one LINK. Its the ClockWorkMod aka modded Recovery Mode making it possible to flash unsigned Updates and making nice Full Backups and the JB Firmware itself.
Install this way from a windows console bein inside the folder where the adb.exe from the exploit is, Step one is making a backup of your previous Recovery Mode for future reverting if you want to do so. Step two is the actual install. You need to copy the loaded recovery.img from the CWM thread to the SD in your TPT, same goes for the JB ZIP File and maybe the 3G Patch for the 3G Card you might have.
BE SURE ALL FILES ARE COPIED ON THE SD AND ITS INSIDE THE TPT AGAIN!
Code:adb shell su dd if=/dev/block/mmcblk0p1 of=/mnt/external_sd/orig_recovery.img mount -o rw,remount /system mv /system/etc/install-recovery.sh /system/etc/install-recovery.sh.backup dd if=/mnt/external_sd/recovery.img of=/dev/block/mmcblk0p1 exit exit
This should be enough. Now reboot and while the Lenovo mini Logo shows up, push Vol UP rapidly. This should boot up CWM6, our modded recover Mode. Here Vol UP is upwards, Vol DOWN is downwards and ON/OFF is Enter. First thing, DO A FULL BACKUP TO EXTERNAL SD in "backup and restore", "backup" !!! Then let it do a "wipe data/factory reset", then select "install zip from sdcard" and in there "choose zip from external sdcard". Choose the CM10 JB ZIP first, then the 3G Patch for your Card.
Reboot and youre done.
I wonder... Arent ROW TPT's bootloaders unlocked by default anyway?? Thus there was a nvflash exploit weeks ago?
Correct me if i am wrong ^^
I flashed the CM v8 to my TPT (no problems). However, I seem to get a lot of random reboots so, I may have to restore my previous image until CM becomes more stable.
Hi guys,
Can you please tell me, do I need to connect the tablet in some kind of recovery mode (pardon my ignorance) while its turned off with holding Vol Up button or just connect it when its simply on is ok? I tried the last one and it doesnt do anything, it just launches the daemon and waits.
Thanks in advance!
Just connect is when its switched on and be sure you activated usb debugging.
emuandco, I thought ROM Manager was CWM? So what do I have to download (& where do I download it), & how do I install CWM? Thanks!
adb shell
su
dd if=/dev/block/mmcblk0p1 of=/mnt/external_sd/orig_recovery.img
mount -o rw,remount /system
mv /system/etc/install-recovery.sh /system/etc/install-recovery.sh.backup
dd if=/mnt/external_sd/recovery.img of=/dev/block/mmcblk0p1
exit
exit
Hey guys, I have good news for you all. I sat down these days and tried all kinds of exploits and one, normally for the Asus Transformer Prime really works!
Hi, can I have a link to those drivers? Having some trouble figuring out which ones are ok to use. I also got A400 WE and i'm at wit's end.after some trouble installing the adb drivers it worked fine on my WE tablet..finally, awesome, thanks
I just revived my Thinkpad recently and wanted to root it. I was not able to get the script to properly root my tablet so I figured I would share the process and steps outlined in the script that I ran manually.
First you need to determine where your /system is mounted. Do that by running the following
You are looking for something like this (This is an example, DO NOT COPY THIS YOURS WILL BE DIFFERENT. RUN THE MOUNT COMMAND ABOVE TO DETERMINE YOUR MOUNT LOCATION)Code:adb kill-server adb wait-for-device adb shell mount
/dev/block/mmcblk0p3 /system ext4 ro,relatime,user_xattr,acl,barrier=1,data=ordered
For the rest of this replace %MOUNT% with your mount location, see above.
Download and extract the Debugfs automated root zip file mentioned above in the quote.
From the extracted zip location, run.
Code:adb push debugfs /data/local/ adb push su /data/local/ adb push debugfsinput /data/local/ adb shell mv /data/local/tmp /data/local/tmp.bak adb shell ln -s %MOUNT% /data/local/tmp adb reboot
After the tablet reboots
Code:adb wait-for-device adb shell chmod 777 /data/local/debugfs adb shell "/data/local/debugfs -w %MOUNT% < /data/local/debugfsinput" adb shell rm /data/local/tmp adb shell mv /data/local/tmp.bak /data/local/tmp adb shell rm /data/local/su adb shell rm /data/local/debugfs adb shell rm /data/local/debugfsinput adb reboot
You should now have root. To check for root you can open an adb shell and type the su command.
You should start out with a shell that ends in a '$'. After running the su command you should have a shell that ends in '#'. If you do, congrats you are rooted.Code:adb wait-for-device adb shell su
Install the super user app and you are done.
Code:adb install Superuser.apk
adb shell "/data/local/debugfs -w /dev/block/mmcblk0p3 < /dat
a/local/debugfsinput"