A better solution has been released, please update using it.
Warning: Don't attempt to use this on a device that isn't Motorola.
Lets break this sub forum open with a good one.
See: http://www.androidpolice.com/2013/09...mini-and-maxx/ for the story
Bounty payouts or donations can be paypaled to [email protected], or use the donate button to the left. If its for the bounty, please reply below with confirmation number or pm me.
These files are not to be mirrored elsewhere, no included in other packages. Its simple already, no need to repackage it.
#Filename differs per firmware, get MotoRoot-1-att.apk for AT&T, MotoRoot-1-vzw.apk for Verizon, etc the -r paramenter is required if installing with adb
adb install -r <filename>
Run MotoRoot app
Install Supersu app
Phone will reboot, and you will be rooted as soon as device is fully booted.
Uninstalling the app will disable root until reinstalled
supersu is not able to update su yet, this will be fixed in an update shortly.
su is maintained in a ext4 img at /data/xbin.img and mounted over /system/xbin at BOOT_COMPLETE.
su is not available for the first few seconds of boot, im working on this.
/system is write protected, even with unlocked bootloaders you can not write to it while booted in Android.
Two choices, factory reset, or press the unroot menu option in the app.
Run into a problem? try hittung unroot then re-rooting
We use two vulns in this app, first being 9695860 to gain system user, then a symlink attack of mine to get root from system.
xIndirect (nick) for assisting me from start to finish
Whoever originally found bug 9695860
Saurik for his description of 9695860
Ryan Welton for his 9695860 tool
Dave Kover for yet another kick butt icon
and Anthony Fox/Droid-Hive for great help with getting the device to me today