For those with 'partial' root after JB update - regain root!

Search This thread

hx4700 Killer

Senior Member
Oct 19, 2007
1,281
274
Texas
Wait, let me get this straight. You're saying right now there's no way for many of us to get a root access to our devices if the abovementioned method is not working, right?

As far as I know, unless someone is keeping a HUGE secret.

I should mention the unlocker from ASUS but i don't know if anyone has tried it on JellyBean
 
Last edited:
  • Like
Reactions: tontorus

hx4700 Killer

Senior Member
Oct 19, 2007
1,281
274
Texas
jamesh1979 confirmed his success with the unlocker on JB. http://xdaforums.com/showpost.php?p=32189475&postcount=19
BTW is it possible to root with the unlock tool? If so how?

It is more insidious than a straight unlock. You have to be unlocked to actually flash back to 4.0.3 stock asus firmware, then root. The people I read who kept root with OTA rootkeeper were using SuperSU after JB update.

So unlock, downgrade, root and use SuperSU, use OTA RootKeeper and then re-upgrade. This however isnt a guarantee. =/
 

mdpgc

Senior Member
Aug 22, 2010
588
261
DC-MDPGC-DMV
It is more insidious than a straight unlock. You have to be unlocked to actually flash back to 4.0.3 stock asus firmware, then root. The people I read who kept root with OTA rootkeeper were using SuperSU after JB update.

So unlock, downgrade, root and use SuperSU, use OTA RootKeeper and then re-upgrade. This however isnt a guarantee. =/

My tablet was not unlocked and I had just stock with root. I wasn't using SuperSU before the JB updates. I used Superuser and restored root with OTA Rootkeeper after the update. Once I shut down the tablet (on Thursday night) it forced me to do a full restore after bootlooping when I turned it back on at work Friday.

Once thenrz posted his thread, I noticed I had a partial root, I had Superuser.apk in system/app and I could see su in /system/bin/ but no su-backup. I used the FileManager not ES Explorer to look for these. Once I saw I had both of those, I went ahead with adb to push the files with the commands and I gained root access again.
 
Last edited:

hx4700 Killer

Senior Member
Oct 19, 2007
1,281
274
Texas
The thing that puzzles me the most is that I was using superuser elite not SuperSU when I used OTA Rootkeeper. Rootkeeper didnt offer a root restore after OTA update.

Even now though in ADB Shell if I type SU I can see in the superuser log it instantly shows SHELL Allowed. The prompt doesnt change to # though and I can't remount as RW etc... so I am stuch there.

If I open terminal on the device and type SU the log showed denied so WTF?
 

mdpgc

Senior Member
Aug 22, 2010
588
261
DC-MDPGC-DMV
The thing that puzzles me the most is that I was using superuser elite not SuperSU when I used OTA Rootkeeper. Rootkeeper didnt offer a root restore after OTA update.

Even now though in ADB Shell if I type SU I can see in the superuser log it instantly shows SHELL Allowed. The prompt doesnt change to # though and I can't remount as RW etc... so I am stuch there.

If I open terminal on the device and type SU the log showed denied so WTF?

If you have the files in there (Superuser.apk in system/app and su in system/bin) it should work for you...are those file there?
 

hx4700 Killer

Senior Member
Oct 19, 2007
1,281
274
Texas
If you have the files in there (Superuser.apk in system/app and su in system/bin) it should work for you...are those file there?

Nope.

I'm just puzzled at the "Allowed" in the log?!

In /data/local/tmp I do see a file _su what is that? If I try to execute the _su I get permission denied.
 
Last edited:

mdpgc

Senior Member
Aug 22, 2010
588
261
DC-MDPGC-DMV
Nope.

I'm just puzzled at the "Allowed" in the log?!

In /data/local/tmp I do see a file _su what is that? If I try to execute the _su I get permission denied.

That is puzzling. You just might have to unlock, downgrade, root and use SuperSU, use OTA RootKeeper and then re-upgrade. but i thought if your tablet had a unlocked bootloader then you could not get the update.
 

hx4700 Killer

Senior Member
Oct 19, 2007
1,281
274
Texas
That is puzzling. You just might have to unlock, downgrade, root and use SuperSU, use OTA RootKeeper and then re-upgrade. but i thought if your tablet had a unlocked bootloader then you could not get the update.

Hrm, found SU in the /system/xbin folder

and I kept the original dlpkgfile from the OTA update. I just don't want to void the warranty, the thing is a week old =/ Rather annoying.
 

thenrz

Senior Member
Dec 9, 2010
162
61
Nope.

I'm just puzzled at the "Allowed" in the log?!

In /data/local/tmp I do see a file _su what is that? If I try to execute the _su I get permission denied.


_su is a file used by one of the root methods out there. (bin4ry's i think) I think that's the su that is restored to /system by the exploit? Anyway, _su can't get us anywhere in this case. The lid on JB seems pretty tight.


ALSO! Make sure to keep a backup root with voodoo or super su after completing this guide! I have lost root after about 24 hours (VERY WELL may have been my own fault... too much poking around maybe?) Anyway, better safe than sorry!!!
 

ogg1e

Senior Member
Nov 9, 2009
110
9
Hrm, found SU in the /system/xbin folder

and I kept the original dlpkgfile from the OTA update. I just don't want to void the warranty, the thing is a week old =/ Rather annoying.

I'm in the exact same boat as you. I had root before the JB update. I also had voodoo rootkeeper installed and backed up. But now when I go into root keeper, I don't even get the option to restore.

I can't get the # at the prompt, can't mount /system as rw, and only have su in the xbin directory. Grrr....

I don't want to unlock/downgrade/root/upgrade/reroot only to be in the same position I'm in now.
 

thenrz

Senior Member
Dec 9, 2010
162
61
I'm in the exact same boat as you. I had root before the JB update. I also had voodoo rootkeeper installed and backed up. But now when I go into root keeper, I don't even get the option to restore.

I can't get the # at the prompt, can't mount /system as rw, and only have su in the xbin directory. Grrr....

I don't want to unlock/downgrade/root/upgrade/reroot only to be in the same position I'm in now.

In adb shell, copy and paste your output from $ ls -l /system/xbin

I am curious to the permissions in your case
 

ogg1e

Senior Member
Nov 9, 2009
110
9
In adb shell, copy and paste your output from $ ls -l /system/xbin

I am curious to the permissions in your case

shell@android:/system/xbin $ ls -l
-rwxr-xr-x root shell 59760 2012-09-28 07:19 dexdump
-rwx------ root root 5380 2012-09-28 07:19 ps3bttest
-rwxr-xr-x root shell 23592 2012-09-28 07:19 rfcomm
-rwxr-xr-x root shell 91980 2012-09-05 22:29 su
 

thenrz

Senior Member
Dec 9, 2010
162
61
shell@android:/system/xbin $ ls -l
-rwxr-xr-x root shell 59760 2012-09-28 07:19 dexdump
-rwx------ root root 5380 2012-09-28 07:19 ps3bttest
-rwxr-xr-x root shell 23592 2012-09-28 07:19 rfcomm
-rwxr-xr-x root shell 91980 2012-09-05 22:29 su

Can you do the same to /system/bin? Are you getting permission denied when you type su?
 

hx4700 Killer

Senior Member
Oct 19, 2007
1,281
274
Texas
Same Boat:
shell@android:/system/xbin $ ls -l
ls -l
-rwxr-xr-x root shell 497964 2012-09-26 21:25 busybox
-rwxr-xr-x root shell 59760 2012-09-27 11:18 dexdump
-rwx------ root root 5380 2012-09-27 11:18 ps3bttest
-rwxr-xr-x root shell 23592 2012-09-27 11:18 rfcomm
-rwxr-xr-x root shell 380532 2012-09-26 21:04 su

This is my output when I type SU

shell@android:/system/xbin $ su
su
1|shell@android:/system/xbin $
 
  • Like
Reactions: thenrz

thenrz

Senior Member
Dec 9, 2010
162
61
Same Boat:
shell@android:/system/xbin $ ls -l
ls -l
-rwxr-xr-x root shell 497964 2012-09-26 21:25 busybox
-rwxr-xr-x root shell 59760 2012-09-27 11:18 dexdump
-rwx------ root root 5380 2012-09-27 11:18 ps3bttest
-rwxr-xr-x root shell 23592 2012-09-27 11:18 rfcomm
-rwxr-xr-x root shell 380532 2012-09-26 21:04 su

This is my output when I type SU

shell@android:/system/xbin $ su
su
1|shell@android:/system/xbin $

Can anyone comment on the ownership of su and busybox by shell and not root? If you use a busy command, do you get output? ( busybox mount will show a bunch of info)
 
Last edited:

ogg1e

Senior Member
Nov 9, 2009
110
9
Can anyone comment on the ownership of su and busybox by shell and not root? If you use a busy command, do you get output? ( busybox mount will show a bunch of info)


Code:
shell@android:/ $ busybox mount                                                
rootfs on / type rootfs (ro,relatime)
tmpfs on /dev type tmpfs (rw,nosuid,relatime,mode=755)
devpts on /dev/pts type devpts (rw,relatime,mode=600)
proc on /proc type proc (rw,relatime)
sysfs on /sys type sysfs (rw,relatime)
debugfs on /sys/kernel/debug type debugfs (rw,relatime)
none on /acct type cgroup (rw,relatime,cpuacct)
tmpfs on /mnt/asec type tmpfs (rw,relatime,mode=755,gid=1000)
tmpfs on /mnt/obb type tmpfs (rw,relatime,mode=755,gid=1000)
none on /dev/cpuctl type cgroup (rw,relatime,cpu)
/dev/block/mmcblk0p1 on /system type ext4 (ro,relatime,user_xattr,acl,barrier=1,data=ordered)
/dev/block/mmcblk0p2 on /cache type ext4 (rw,nosuid,nodev,noatime,errors=panic,user_xattr,acl,barrier=1,nomblk_io_submit,data=ordered)
/dev/block/mmcblk0p8 on /data type ext4 (rw,nosuid,nodev,noatime,errors=panic,user_xattr,acl,barrier=1,nomblk_io_submit,data=ordered)
tmpfs on /Removable type tmpfs (rw,relatime,mode=755,gid=1000)
/dev/fuse on /storage/sdcard0 type fuse (rw,nosuid,nodev,relatime,user_id=1023,group_id=1023,default_permissions,allow_other)
/dev/block/dm-0 on /mnt/asec/com.Phosphor.Horn.Paid-1 type ext4 (ro,dirsync,nosuid,nodev,noatime,user_xattr,acl,barrier=1)
/dev/block/dm-1 on /mnt/asec/com.teslacoilsw.launcher.prime-1 type ext4 (ro,dirsync,nosuid,nodev,noatime,user_xattr,acl,barrier=1)
/dev/block/dm-2 on /mnt/asec/com.zeptolab.ctr.hd.google.paid-1 type ext4 (ro,dirsync,nosuid,nodev,noatime,user_xattr,acl,barrier=1)
/dev/block/dm-3 on /mnt/asec/air.com.sarahnorthway.rebuild2-1 type ext4 (ro,dirsync,nosuid,nodev,noatime,user_xattr,acl,barrier=1)
/dev/block/vold/179:49 on /Removable/MicroSD type vfat (rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0000,dmask=0000,allow_utime=0022,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro)
/dev/block/dm-4 on /mnt/asec/com.shazam.encore.android-1 type ext4 (ro,dirsync,nosuid,nodev,noatime,user_xattr,acl,barrier=1)
shell@android:/ $

and /system/bin:

Code:
shell@android:/system/bin $ ls -l
lrwxrwxrwx root     root              2012-07-08 22:23 [ -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 [[ -> /system/bin/busybox
-rwxr-xr-x root     shell       96360 2012-09-28 07:15 adb
-rwxr-xr-x root     shell         191 2011-11-22 10:40 am
-rwxr-xr-x root     shell        9500 2012-09-28 07:15 app_process
-rwxr-xr-x root     shell       49452 2012-09-28 07:15 applypatch
lrwxrwxrwx root     root              2012-07-08 22:23 ash -> /system/bin/busybox
-rwxr-xr-x root     shell        9508 2008-08-01 09:00 atrace
lrwxrwxrwx root     root              2012-07-08 22:23 awk -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 base64 -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 basename -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 blkid -> /system/bin/busybox
-rwxr-xr-x root     shell        5108 2012-09-28 07:15 bluetoothd
-rwxr-xr-x root     shell         199 2011-11-22 10:40 bmgr
-rwxr-xr-x root     shell       21788 2012-09-28 07:15 bootanimation
-rwxr-xr-x root     shell       14004 2012-09-28 07:15 brcm_patchram_plus
-rwxr-xr-x root     shell        1747 2008-08-01 09:00 bt_firmware_loader.sh
-rwxr-xr-x root     shell         156 2008-08-01 09:00 bu
-rwxr-xr-x root     shell         954 2008-08-01 09:00 bugmailer.sh
-rwxr-xr-x root     shell        5352 2012-09-28 07:15 bugreport
lrwxrwxrwx root     root              2012-07-08 22:23 bunzip2 -> /system/bin/busybox
-rwxr-xr-x root     shell      863436 2012-09-18 21:29 busybox
lrwxrwxrwx root     root              2012-09-18 21:29 bzcat -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 bzip2 -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 cal -> /system/bin/busybox
-rwxr-xr-x root     shell        5352 2008-08-01 09:00 camera_fw_check
lrwxr-xr-x root     shell             2011-11-22 10:43 cat -> toolbox
-rwxr-xr-x root     shell      587981 2008-08-01 09:00 chat
lrwxrwxrwx root     root              2012-07-08 22:23 chattr -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 chgrp -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 chmod -> toolbox
lrwxr-xr-x root     shell             2011-11-22 10:43 chown -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 chroot -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 chrt -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 cksum -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 clear -> /system/bin/busybox
-rwxr-xr-x root     shell          37 2011-11-22 10:40 cluster
-rwxr-xr-x root     shell          44 2011-11-22 10:40 cluster_get.sh
-rwxr-xr-x root     shell          50 2011-11-22 10:40 cluster_set.sh
lrwxr-xr-x root     shell             2011-11-22 10:43 cmp -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 comm -> /system/bin/busybox
-rwxr-xr-x root     shell         207 2008-08-01 09:00 content
lrwxrwxrwx root     root              2012-07-08 22:23 cp -> /system/bin/busybox
lrwxrwxrwx root     root              2012-09-18 21:29 cpio -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 crond -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 crontab -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 cut -> /system/bin/busybox
-rwxr-xr-x root     shell        5352 2012-09-28 07:15 dalvikvm
lrwxr-xr-x root     shell             2011-11-22 10:43 date -> toolbox
-rwxr-xr-x root     shell      132440 2012-09-28 07:15 dbus-daemon
-rwxr-xr-x root     shell          43 2011-11-22 10:40 dcc
lrwxr-xr-x root     shell             2011-11-22 10:43 dd -> toolbox
-rwxr-xr-x root     shell       21736 2012-09-28 07:15 debuggerd
lrwxrwxrwx root     root              2012-07-08 22:23 depmod -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 devmem -> /system/bin/busybox
-rwxr-xr-x root     shell        9396 2012-09-28 07:15 dexopt
lrwxr-xr-x root     shell             2011-11-22 10:43 df -> toolbox
-rwxr-xr-x root     shell       58788 2012-09-28 07:15 dhcpcd
lrwxrwxrwx root     root              2012-07-08 22:23 diff -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 dirname -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 dmesg -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 dnsd -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 dnsdomainname -> /system/bin/busybox
-rwxr-xr-x root     shell      105816 2012-09-28 07:15 dnsmasq
lrwxrwxrwx root     root              2012-07-08 22:23 dos2unix -> /system/bin/busybox
-rwxr-xr-x root     shell       26060 2012-09-28 07:15 downloader
lrwxrwxrwx root     root              2012-09-18 21:29 dpkg -> /system/bin/busybox
lrwxrwxrwx root     root              2012-09-18 21:29 dpkg-deb -> /system/bin/busybox
-rwxr-xr-x root     shell       50460 2012-09-28 07:15 drmserver
lrwxrwxrwx root     root              2012-07-08 22:23 du -> /system/bin/busybox
-rwxr-xr-x root     shell       38184 2012-09-28 07:15 dumpstate
-rwxr-xr-x root     shell        9448 2012-09-28 07:15 dumpsys
-rwxr-xr-x root     shell      122500 2008-08-01 09:00 e2fsck
lrwxrwxrwx root     root              2012-07-08 22:23 echo -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 egrep -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 env -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 ether-wake -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 expand -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 expr -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 fakeidentd -> /system/bin/busybox
lrwxrwxrwx root     root              2012-09-18 21:29 fbset -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 fdflush -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 fdformat -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 fdisk -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 fgrep -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 find -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 fold -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 free -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 freeramdisk -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 fsck -> /system/bin/busybox
-rwxr-xr-x root     shell       26148 2012-09-28 07:15 fsck_msdos
lrwxrwxrwx root     root              2012-07-08 22:23 fsync -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 ftpd -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 ftpget -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 ftpput -> /system/bin/busybox
-rwxr-xr-x root     shell      605137 2012-09-28 07:15 fu
lrwxr-xr-x root     shell             2011-11-22 10:43 getevent -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 getopt -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 getprop -> toolbox
-rwxr-xr-x root     shell     1154080 2012-09-28 07:15 glgps
lrwxrwxrwx root     root              2012-07-08 22:23 grep -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 groups -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 gunzip -> /system/bin/busybox
-rwxr-xr-x root     shell        9448 2012-09-28 07:15 gzip
-rwxr-xr-x root     shell       27176 2012-09-28 07:15 hciattach
lrwxr-xr-x root     shell             2011-11-22 10:43 hd -> toolbox
-rwxr-xr-x root     shell       10024 2012-09-28 07:15 hdcp_test
lrwxrwxrwx root     root              2012-07-08 22:23 head -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 hexdump -> /system/bin/busybox
-rwxr-xr-x root     shell      272688 2012-09-28 07:15 hostapd
lrwxrwxrwx root     root              2012-07-08 22:23 hostid -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 hostname -> /system/bin/busybox
-rwxr-xr-x root     shell          64 2011-11-22 10:40 hotplug
lrwxrwxrwx root     root              2012-07-08 22:23 httpd -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 hwclock -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 id -> toolbox
lrwxr-xr-x root     shell             2011-11-22 10:43 ifconfig -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 ifenslave -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 iftop -> toolbox
-rwxr-xr-x root     shell         194 2011-11-22 10:40 ime
lrwxrwxrwx root     root              2012-07-08 22:23 inetd -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 inotifyd -> /system/bin/busybox
-rwxr-xr-x root     shell         201 2011-11-22 10:40 input
lrwxr-xr-x root     shell             2011-11-22 10:43 insmod -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 install -> /system/bin/busybox
-rwxr-xr-x root     shell       22012 2012-09-28 07:15 installd
lrwxr-xr-x root     shell             2011-11-22 10:43 ioctl -> toolbox
lrwxr-xr-x root     shell             2011-11-22 10:43 ionice -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 iostat -> /system/bin/busybox
-rwxr-xr-x root     shell      136672 2012-09-28 07:15 ip
-rwxr-xr-x root     shell      187372 2012-09-28 07:15 ip6tables
lrwxrwxrwx root     root              2012-07-08 22:23 ipaddr -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 ipcalc -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 iplink -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 iproute -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 iprule -> /system/bin/busybox
-rwxr-xr-x root     shell      196260 2012-09-28 07:16 iptables
lrwxrwxrwx root     root              2012-07-08 22:23 iptunnel -> /system/bin/busybox
-rwxr-xr-x root     shell       13596 2012-09-28 07:16 isp_fw_update
-rwxr-xr-x root     shell       14232 2012-09-28 07:16 keystore
lrwxr-xr-x root     shell             2011-11-22 10:43 kill -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 killall -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 killall5 -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 less -> /system/bin/busybox
-rwxr-xr-x root     shell       79908 2012-09-28 07:16 linker
lrwxr-xr-x root     shell             2011-11-22 10:43 ln -> toolbox
lrwxr-xr-x root     shell             2011-11-22 10:43 log -> toolbox
-rwxr-xr-x root     shell       13600 2012-09-28 07:16 logcat
lrwxrwxrwx root     root              2012-07-08 22:23 logname -> /system/bin/busybox
-rwxr-xr-x root     shell        9516 2012-09-28 07:16 logwrapper
lrwxrwxrwx root     root              2012-07-08 22:23 losetup -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 ls -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 lsattr -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 lsmod -> toolbox
lrwxr-xr-x root     shell             2011-11-22 10:43 lsof -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 lsusb -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 lzop -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 lzopcat -> /system/bin/busybox
-rwxr-xr-x root     shell       10436 2012-09-28 07:16 make_ext4fs
lrwxrwxrwx root     root              2012-09-28 07:23 md5 -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 md5sum -> /system/bin/busybox
-rwxr-xr-x root     shell      259452 2008-08-01 09:00 mdnsd
-rwxr-xr-x root     shell        5300 2012-09-28 07:16 mediaserver
lrwxrwxrwx root     root              2012-07-08 22:23 microcom -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 mkdir -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 mkdosfs -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 mke2fs -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 mkfifo -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 mkfs.ext2 -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 mkfs.vfat -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 mknod -> /system/bin/busybox
-rwxr-xr-x root     shell      153344 2012-09-28 07:16 mksh
lrwxrwxrwx root     root              2012-07-08 22:23 mkswap -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 modinfo -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 modprobe -> /system/bin/busybox
-rwxr-xr-x root     shell         217 2011-11-22 10:40 monkey
lrwxrwxrwx root     root              2012-07-08 22:23 more -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 mount -> toolbox
-rwxr-xr-x root     shell          60 2011-11-22 10:40 mount_debugfs.sh
lrwxrwxrwx root     root              2012-09-18 21:29 mountpoint -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 mt -> /system/bin/busybox
-rwxr-xr-x root     shell       17856 2012-09-28 07:16 mtpd
lrwxr-xr-x root     shell             2011-11-22 10:43 mv -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 nameif -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 nanddump -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 nandread -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 nandwrite -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 nc -> /system/bin/busybox
-rwxr-xr-x root     shell        5304 2012-09-28 07:16 ndc
-rwxr-s--- root     inet         5484 2012-09-28 07:16 netcfg
-rwxr-xr-x root     shell       71200 2012-09-28 07:16 netd
lrwxr-xr-x root     shell             2011-11-22 10:43 netstat -> toolbox
lrwxr-xr-x root     shell             2011-11-22 10:43 newfs_msdos -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 nice -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 nmeter -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 notify -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 nslookup -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 ntpd -> /system/bin/busybox
-rwxr-xr-x root     shell        5304 2012-09-28 07:16 nv_hciattach
-rwxr-xr-x root     shell       13492 2008-08-01 09:00 nvcap_test
-rwxr-xr-x root     shell        5424 2008-08-01 09:00 nvremotell
-rwxr-xr-x root     shell        5420 2012-09-28 07:16 nvtest
lrwxrwxrwx root     root              2012-07-08 22:23 od -> /system/bin/busybox
-rwxr-xr-x root     shell       18188 2012-09-28 07:16 pand
lrwxrwxrwx root     root              2012-07-08 22:23 patch -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 pgrep -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 pidof -> /system/bin/busybox
-rwxr-sr-x root     net_raw     26056 2012-09-28 07:16 ping
lrwxrwxrwx root     root              2012-07-08 22:23 ping6 -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 pkill -> /system/bin/busybox
-rwxr-xr-x root     shell         191 2011-11-22 10:40 pm
lrwxrwxrwx root     root              2012-07-08 22:23 pmap -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 powertop -> /system/bin/busybox
-rwxr-xr-x root     shell      141868 2012-09-28 07:16 pppd
-rwxr-xr-x root     shell      141868 2012-09-28 07:16 pppd_btdun
lrwxr-xr-x root     shell             2011-11-22 10:43 printenv -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:23 printf -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 ps -> toolbox
-rwxr-xr-x root     shell        1014 2012-09-28 07:16 ps3service
lrwxrwxrwx root     root              2012-07-08 22:23 pscan -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 pwd -> /system/bin/busybox
-rwxr-xr-x root     shell        5320 2012-09-28 07:16 python
-rwxr-xr-x root     shell      166808 2012-09-28 07:16 racoon
lrwxrwxrwx root     root              2012-07-08 22:23 rdate -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 rdev -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 readahead -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:23 readlink -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 realpath -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 reboot -> toolbox
lrwxr-xr-x root     shell             2011-11-22 10:43 renice -> toolbox
-rwxr-xr-x root     shell         188 2008-08-01 09:00 requestsync
lrwxrwxrwx root     root              2012-07-08 22:24 reset -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 rev -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 rfkill -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 rm -> toolbox
-rwxr-xr-x root     shell        5376 2008-08-01 09:00 rm_ts_server
lrwxr-xr-x root     shell             2011-11-22 10:43 rmdir -> toolbox
lrwxr-xr-x root     shell             2011-11-22 10:43 rmmod -> toolbox
lrwxr-xr-x root     shell             2011-11-22 10:43 route -> toolbox
-rwsr-s--- root     shell        9448 2012-09-28 07:16 run-as
lrwxrwxrwx root     root              2012-07-08 22:24 run-parts -> /system/bin/busybox
-rwxr-xr-x root     shell        5304 2012-09-28 07:16 schedtest
lrwxr-xr-x root     shell             2011-11-22 10:43 schedtop -> toolbox
-rwxr-xr-x root     shell        9396 2012-09-28 07:16 screencap
-rwxr-xr-x root     shell       34168 2012-09-28 07:16 screenshot
lrwxrwxrwx root     root              2012-07-08 22:24 script -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 scriptreplay -> /system/bin/busybox
-rwxr-xr-x root     shell       13600 2012-09-28 07:16 sdcard
-rwxr-xr-x root     shell       45920 2012-09-28 07:16 sdptool
lrwxrwxrwx root     root              2012-07-08 22:24 sed -> /system/bin/busybox
-rwxr-xr-x root     shell         173 2008-08-01 09:00 send_bug
lrwxr-xr-x root     shell             2011-11-22 10:43 sendevent -> toolbox
lrwxrwxrwx root     root              2012-09-18 21:29 sendmail -> /system/bin/busybox
-rwxr-xr-x root     shell       13492 2012-09-28 07:16 sensors-config
-rwxr-xr-x root     shell        5352 2012-09-28 07:16 sensorservice
lrwxrwxrwx root     root              2012-07-08 22:24 seq -> /system/bin/busybox
-rwxr-xr-x root     shell       13544 2012-09-28 07:16 service
-rwxr-xr-x root     shell        9608 2012-09-28 07:16 servicemanager
lrwxr-xr-x root     shell             2011-11-22 10:43 setconsole -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:24 setkeycodes -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 setlogcons -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 setprop -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:24 setsid -> /system/bin/busybox
-rwxr-xr-x root     shell        5352 2008-08-01 09:00 setup_fs
lrwxrwxrwx root     root              2012-01-11 18:40 sh -> mksh
lrwxrwxrwx root     root              2012-07-08 22:24 sha1sum -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 sha256sum -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 sha512sum -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 showkey -> /system/bin/busybox
-rwxr-xr-x root     shell        9524 2012-09-28 07:16 sixpair
lrwxr-xr-x root     shell             2011-11-22 10:43 sleep -> toolbox
lrwxr-xr-x root     shell             2011-11-22 10:43 smd -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:24 smemcap -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 sort -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 split -> /system/bin/busybox
-rwxr-xr-x root     shell       46364 2012-09-28 07:16 stagefright
lrwxr-xr-x root     shell             2011-11-22 10:43 start -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:24 stat -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 stop -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:24 strings -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 stty -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 sum -> /system/bin/busybox
-rwxr-xr-x root     shell        5352 2012-09-28 07:16 surfaceflinger
-rwxr-xr-x root     shell         192 2011-11-22 10:40 svc
lrwxrwxrwx root     root              2012-07-08 22:24 swapoff -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 swapon -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 sync -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:24 sysctl -> /system/bin/busybox
-rwxr-xr-x root     shell        5300 2012-09-28 07:16 system_server
lrwxrwxrwx root     root              2012-07-08 22:24 tac -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 tail -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 tar -> /system/bin/busybox
-rwxr-xr-x root     shell       67096 2012-09-28 07:16 tc
lrwxrwxrwx root     root              2012-07-08 22:24 tee -> /system/bin/busybox
-rwxr-xr-x root     shell       17640 2012-09-28 07:16 tegrastats
lrwxrwxrwx root     root              2012-07-08 22:24 telnet -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 telnetd -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 test -> /system/bin/busybox
-rwxr-xr-x root     shell       13904 2012-09-28 07:16 tf_daemon
lrwxrwxrwx root     root              2012-07-08 22:24 tftp -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 tftpd -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 time -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 timeout -> /system/bin/busybox
-rwxr-xr-x root     shell      104964 2012-09-28 07:16 toolbox
lrwxr-xr-x root     shell             2011-11-22 10:43 top -> toolbox
lrwxrwxrwx root     root              2012-01-11 18:40 touch -> toolbox
-rwxr-xr-x root     shell       91820 2012-09-28 07:16 touch_fw_update
lrwxrwxrwx root     root              2012-07-08 22:24 tr -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 traceroute -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 traceroute6 -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 tty -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 ttysize -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 tunctl -> /system/bin/busybox
-rwxr-xr-x root     shell        3391 2008-08-01 09:00 uiautomator
lrwxr-xr-x root     shell             2011-11-22 10:43 umount -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:24 uname -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 uncompress -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 unexpand -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 uniq -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 unix2dos -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 unlzop -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 unzip -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 uptime -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:24 usleep -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 uudecode -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 uuencode -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 vconfig -> /system/bin/busybox
-rwxr-xr-x root     shell        5304 2012-09-28 07:16 vdc
lrwxrwxrwx root     root              2012-07-08 22:24 vi -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 vmstat -> toolbox
-rwxr-xr-x root     shell       75288 2012-09-28 07:16 vold
lrwxrwxrwx root     root              2012-07-08 22:24 watch -> /system/bin/busybox
lrwxr-xr-x root     shell             2011-11-22 10:43 watchprops -> toolbox
lrwxrwxrwx root     root              2012-07-08 22:24 wc -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 wget -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 which -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 who -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 whoami -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 whois -> /system/bin/busybox
-rwxr-xr-x root     shell        9480 2012-09-28 07:16 wifimacwriter
lrwxr-xr-x root     shell             2011-11-22 10:43 wipe -> toolbox
-rwxr-xr-x root     shell       45904 2012-09-28 07:16 wminput
-rwxr-xr-x root     shell      608680 2012-09-28 07:16 wpa_supplicant
-rwxr-xr-x root     shell       21788 2012-09-28 07:16 wvdrmserver
-rwxr-xr-x root     shell       17644 2012-09-28 07:16 xaplay
lrwxrwxrwx root     root              2012-07-08 22:24 xargs -> /system/bin/busybox
lrwxrwxrwx root     root              2012-07-08 22:24 zcat -> /system/bin/busybox
shell@android:/system/bin $
 
Last edited:
  • Like
Reactions: thenrz

thenrz

Senior Member
Dec 9, 2010
162
61
Thank you for posting all that! I find it really interesting that our root setups are totally different (I assume different root method, choice of maker where to put things?) yet both of us lost root (but I still had # after wipe). Good info for the future in terms of protecting root from OTAs.

Heres my xbin:
Code:
u0_a84@android:/ $ export PATH=/data/local/bin:$PATH
u0_a84@android:/ $ ls -l /system/xbin
-rwsr-xr-x root     root       497964 2012-09-29 04:16 busybox
-rwxr-xr-x root     shell       59760 2012-09-28 00:24 dexdump
-rwx------ root     root         5380 2012-09-28 00:24 ps3bttest
-rwxr-xr-x root     shell       23592 2012-09-28 00:24 rfcomm
u0_a84@android:/ $
 
Last edited:

BlueHawk

Senior Member
Aug 17, 2009
351
61
Toronto
I thought I had lost root and could not use the methods described here. I could not get the root prompt as per the instructions. However, I had SuperSU installed and found that if I disabled Superuser in the settings for SuperSU (it was enabled from before the OTA update), and then enabled it again (unticking and ticking that box in the settings for SuperSU), I had root restored. Lucky too since I found that Voodoo OTA rootkeeper did bugger all. :D
 

Top Liked Posts

  • There are no posts matching your filters.
  • 29
    This will only work if you can access a root prompt (#) in adb shell! THIS WAS DONE AFTER DOING A WIPE FROM THE VOLUME DOWN MENU WHEN BOOTING THE PRIME! I do not know if this will work without the wipe, but it very well may. Maybe someone more knowledgeable can chime in here.

    It may be possible to restore from a su-backup if you have a su binary still in /system/bin or xbin. Even if you can't access a root prompt (#) by just typing su, read starting at page 6. Places to look for a su-backup include /system/ /system/usr/we-need-root/ and /system/bin/

    I have a batch script in the works that will determine if you can re-root and take the appropriate steps to do so if possible.

    I had to do a voldown wipe after my update to JB. My prime would reboot after 5-10 seconds into the homescreen after boot. After wiping, I thought for sure my root was screwed until a new exploit was found.

    I accessed my device through adb, and realized that I could invoke a root prompt using the su command at the $ prompt. Using ES file explorer, I could see su in /system/bin/ but no su-backup or superuser.apk in /system/app/.

    I tried simply installing superuser from the market, but it did not work. The busybox installer would not work, either.


    ATTACHED ARE THE EXACT THREE FILES I USED. I do not know if using different version will affect the process!

    Here is what worked for me:

    1. adb shell
    2. su
    (# - you should see this now! This will not work without this specific prompt!)
    3. type 'exit' press enter, and then 'exit' again. You will now be back at the regular command prompt.
    4. adb push C:\(location of attached files)\superuser.apk /data/local/tmp
    5. adb push C:\(location of attached files)\su /data/local/tmp
    6. adb push C:\(location of attached files)\busybox /data/local/tmp
    7. Access the adb shell again, and type su
    8. chmod 644 /data/local/tmp/superuser.apk
    9. chmod 755 /data/local/tmp/busybox
    10. chmod 6755 /data/local/tmp/su
    11. mount -o remount,rw /system
    12. dd if=/data/local/tmp/Superuser.apk of=/system/app/Superuser.apk
    13. dd if=/data/local/tmp/busybox of=/system/bin/busybox
    14. dd if=/data/local/tmp/busybox of=/system/xbin/busybox
    14a. Chmod 755 /system/bin/busybox
    14b. Chmod 755 /system/xbin/busybox
    15. Reserved
    16. busybox rm /system/bin/su
    17. busybox cp /data/local/tmp/su /system/bin
    18. type su once again to assure you still have access to the # prompt
    18a. Chmod 644 /system/app/superuser.apk
    18b. mount -o remount,ro /system
    19. type exit, and exit again, returning to the regular windows command prompt.
    20. type 'adb reboot' (without quotes)
    NOTE - you will not need to install the superuser.apk app in the normal sense. It will be installed upon the reboot as a system app automatically!
    21. Once your prime has rebooted, go download root checker basic or the like from the play store. Open it, and wait for your superuser prompt! :)
    22. Get the busybox installer from the play store as well, and use that to get the newest version of busybox.
    23. Get SuperSU from the market. It seems to be the safest method to keep root with JB...

    ALSO! Make sure to keep a backup root with voodoo or super su after completing this guide! I have lost root (VERY WELL may have been my own fault... too much poking around) Anyway, better safe than sorry!!!

    Thanks to daymz from the debugfs thread in development for the basic instructions of what needed to be done!! And also thanks to all before me who got us root in the first place!


    I will answer questions to the best of my ability. I am not a developer and do not try to present myself as so... I can tinker with the best, and after losing root, I set out to see if I could figure it out!

    Changes made as per tsmt971
    5
    I have fellow this method and it was failed at step 16 in my case because of the permission issue but I managed to make it move and regained the root. The details of the issue as below.

    Step 16 failed because step 13, 14 which will copy busybox to /system/bin and /system/xbin with a wrong executive permission.
    To correct in my case: after step 13, 14 follow those steps below:
    - chmod 755 /system/bin/busybox
    - chmod 755 /system/xbin/busybox
    - skip step 15
    - continue steps 16, 17, 18
    - chmod 644 /system/app/Superuser.apk
    - continue step 19, 20, 21, 22

    Then you will get your root back, it worked in my case. Good luck guys.
    To the OP, please verify and update those steps if necessary.
    4
    I just figured something out. I found a su-backup in /system/usr/we-need-root . I have lost root again since making this guide. My permissions were screwed up on su. I was able to restore root by doing the following:

    Code:
    adb shell:
    $ cd /system/usr/we-need-root
    $./su-backup; su  (that is a semicolon immediately after the ./su-backup)
    # mount -o remount,rw /system
    (do what needs to be done)
    #exit
    ...

    su-backup must have permissions as such: (get permissions by typing this into adb shell: ls -l /system/usr/we-need-root ) If you get an error, than this specifically won't work for you.

    Code:
    Required su-backup permissions for manual root restore
    $ ls -l /system/usr/we-need-root/su-backup
    -rwsr-sr-x  root  ...

    basically, if you can find a su-backup with proper permissions (and cannot restore root with voodoo or supersu), you can manually use that to repair your root access configuration. Maybe this is well known... but to those who don't this could be useful.
    1
    Wait, let me get this straight. You're saying right now there's no way for many of us to get a root access to our devices if the abovementioned method is not working, right?

    As far as I know, unless someone is keeping a HUGE secret.

    I should mention the unlocker from ASUS but i don't know if anyone has tried it on JellyBean
    1
    Same Boat:
    shell@android:/system/xbin $ ls -l
    ls -l
    -rwxr-xr-x root shell 497964 2012-09-26 21:25 busybox
    -rwxr-xr-x root shell 59760 2012-09-27 11:18 dexdump
    -rwx------ root root 5380 2012-09-27 11:18 ps3bttest
    -rwxr-xr-x root shell 23592 2012-09-27 11:18 rfcomm
    -rwxr-xr-x root shell 380532 2012-09-26 21:04 su

    This is my output when I type SU

    shell@android:/system/xbin $ su
    su
    1|shell@android:/system/xbin $