[TEMP-ROOT][AUG-8] Temporary Root Method Desire 610

589 posts
Thanks Meter: 971
 
By AdriVelazquez, Senior Member on 8th August 2014, 08:38 PM
Post Reply Email Thread
Hi All,

This is the .zip to grant temporary root to your device. Currently this is only tested on the BrightStart device. You can see the software number in the file name.

The boot.img is located inside.

Steps:

1. Unlock bootloader via htcdev.com (I was able to do it when originally testing; however, I've heard other people have had issues.
2. Download file below.
3. Boot into fastboot
4.
Code:
fastboot oem rebootRUU
5.
Code:
fastboot flash zip A3_root_boot.zip reboot
Your device should now have temporary root. This temporary root is a little different than most. You can perform
Code:
adb remount
to access the system folders without superSU; however, none will stick after reboot due to the write protection.


NOTE
This is more of a starter for other developers to begin work, but please Thank Me and reference here if you utilize this at all.

Also, the process was a little easier for me since I was working with HTC and eventually was using s-off devices.
Attached Files
File Type: zip A3_root_boot.zip - [Click for QR Code] (7.01 MB, 6090 views)
The Following 6 Users Say Thank You to AdriVelazquez For This Useful Post: [ View ] Gift AdriVelazquez Ad-Free
8th August 2014, 08:52 PM |#2  
ClearD's Avatar
Inactive Recognized Developer
Flag Gallipolis
Thanks Meter: 1,444
 
Donate to Me
More
Beautiful, thank you!

Edit: with that, I wonder if this module could enable permanent root for us by disabling write protection? It says it can be hex edited to change to our kernel version and might work:

http://forum.xda-developers.com/show....php?t=2230341

Edit 2: if we can remount, we should be able to take a full image backup of the phone as well I believe... Maybe we can do that, then push the full root boot image with the module above back to the device. After the module is hex edited to work with our kernel version of course, which is currently 3.4.0-gb799e00
11th August 2014, 08:27 PM |#3  
AdriVelazquez's Avatar
OP Senior Member
Flag New York, NY
Thanks Meter: 971
 
Donate to Me
More
Quote:
Originally Posted by ClearD

Beautiful, thank you!

Edit: with that, I wonder if this module could enable permanent root for us by disabling write protection? It says it can be hex edited to change to our kernel version and might work:

http://forum.xda-developers.com/show....php?t=2230341

Edit 2: if we can remount, we should be able to take a full image backup of the phone as well I believe... Maybe we can do that, then push the full root boot image with the module above back to the device. After the module is hex edited to work with our kernel version of course, which is currently 3.4.0-gb799e00

That logic is sound; however slight differences in the model maybe.

Currently in the M8 this file is located in block/blk-core.c, which has the following.

Code:
#ifdef CONFIG_MMC_MUST_PREVENT_WP_VIOLATION
    sprintf(wp_ptn, "mmcblk0p%d", get_partition_num_by_name("system"));
    if (!strcmp(bdevname(bio->bi_bdev, b), wp_ptn) && !board_mfg_mode() &&
            (get_tamper_sf() == 1) && (bio->bi_rw & WRITE)) {
        pr_info("blk-core: Attempt to write protected partition %s block %Lu \n",
                bdevname(bio->bi_bdev, b), (unsigned long long)bio->bi_sector);
        err = 0;
        goto wp_end_io;
    } else if (atomic_read(&emmc_reboot) && (bio->bi_rw & WRITE)) {
        pr_info("%s: Attempt to write eMMC, %s block %Lu \n", current->comm,
                bdevname(bio->bi_bdev, b), (unsigned long long)bio->bi_sector);
        err = -EROFS;
        goto wp_end_io;
    }
#endif
That line of code will need to be intercepted at boot to allow permanent root.

I haven't checked recently, but is the source for desire 610 posted?
11th August 2014, 09:01 PM |#4  
ClearD's Avatar
Inactive Recognized Developer
Flag Gallipolis
Thanks Meter: 1,444
 
Donate to Me
More
Another dev just said source is released, so couldn't we just remove that and build?
29th August 2014, 06:45 PM |#5  
Member
Thanks Meter: 0
 
More
help!
I get the following message when entering "fastboot flash zip A3_root_boot.zip reboot":

"FAILED (remote: 41 model id check fail)"

any ideas

thanks
29th August 2014, 08:37 PM |#6  
ClearD's Avatar
Inactive Recognized Developer
Flag Gallipolis
Thanks Meter: 1,444
 
Donate to Me
More
Yep. Don't use that method and instead read the unlock and root guide. You need to pull the image out of the zip and flash it manually, however this method is outdated and unnecessary.
11th September 2014, 10:55 AM |#7  
Hackerpunk1's Avatar
Senior Member
Flag Vacoas
Thanks Meter: 65
 
More
Maybe you could flash this kernel, since it disable write protection feature.
11th September 2014, 12:47 PM |#8  
ClearD's Avatar
Inactive Recognized Developer
Flag Gallipolis
Thanks Meter: 1,444
 
Donate to Me
More
That won't help him, the issue is that we're not s-off. The security check is what's stopping it from flashing. Manual flashing will work though. Removing it from the zip and flashing the other way as stated in the unlock and root thread. Also, this is deprecated, as it isn't an actual root method either. Only shell root.
10th November 2014, 02:51 AM |#9  
morepr's Avatar
Senior Member
Thanks Meter: 95
 
More
Does this method might work on desire 510???

Sent from my HTC Desire 510 using XDA Premium 4 mobile app
10th November 2014, 03:30 AM |#10  
ClearD's Avatar
Inactive Recognized Developer
Flag Gallipolis
Thanks Meter: 1,444
 
Donate to Me
More
Doubtful. It's an entire boot image made for the 610. You may brick your device by flashing it without a full backup.
Post Reply Subscribe to Thread

Tags
development

Guest Quick Reply (no urls or BBcode)
Message:
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes