[ROOT] Mempodroid root - ICS 9.4.2.11+

Search This thread

se1000

Senior Member
Feb 14, 2011
1,038
395
** This is completely unsupported!!!!!!! **

ALL credit goes to saurik for the root method, Jason A. Donenfeld (zx2c4) for finding the exploit, alpharevx for finding the offsets and initial confirmation on the Transformer Prime and viperboy for finding it and posting it in his thread. I did not research, find, or develop this root method!

Mods, if I've done anything wrong, please feel free to remove this thread.

You will need to know how to use ADB commands, otherwise, use viperMOD PrimeTime!!!!!!!!!!!!!!!!!!!!!!!!.
Downloads:

mempodroid binary
su binary


Root:

adb push mempodroid /data/local
adb push su /data/local
adb shell

chmod 777 /data/local/mempodroid
/data/local/mempodroid 0xd9ec 0xaf47 sh

** You should now be in a remote shell session with root (indicated by #)

mount -o remount,rw -t ext4 /dev/block/mmcblk0p1 /system

** IF you have previously rooted your Prime, run the following two commands. They may throw an error that the file a file was not found.

rm /system/bin/su
rm /system/xbin/su


cat /data/local/su > /system/xbin/su
chown 0.0 /system/xbin/su
chmod 06755 /system/xbin/su
rm /data/local/mempodroid
rm /data/local/su
exit
exit

adb reboot


After your Transformer Prime comes up, install Superuser from android market.

HOPEFULLY everyone has learned their lesson and will also install Voodoo Rootkeeper as well!!!!!!!!!!!!!!!!!!!! R

Enjoi!!!!!!!!!!!!!!!


** Feb 21 2012 Edit **

Works on 9.4.2.14


** Feb 09 2012 Edit **

Works on 9.4.2.13

** Jan 25 2012 Edit **

Changed the mount command - thanks viperboy!
Added steps to possibly resolve issues with previously rooted systems
Changed a few steps to be a little bit easier.


**Jan 24 2012 Edit **

Some people are reporting issues with this method. I suspect this is due to previously having root or other altered files. A method that has worked for some is to update to 9.4.2.11.1 and then following the above procedures. Please note, this firmware release is unofficial and at this time THERE IS NO DOWNGRADE PATH.
 
Last edited:

insane111

Member
Mar 29, 2011
29
3
i keep getting permission denied after

adb shell /data/local/mempodroid 0xd9ec 0xaf47 mount -o remount,rw '' /system
 

se1000

Senior Member
Feb 14, 2011
1,038
395
i missed a chmod step, add it just now.

run:
adb shell chmod 777 /data/local/mempodroid

and then pick up right where you left off.
 
  • Like
Reactions: nattylite

toby77jo

Member
Sep 29, 2008
15
0
as i am not root nor superuser .. i don't even get access

/ $ cd data
~ $ ls
ls: can't open '.': Permission denied
 

insane111

Member
Mar 29, 2011
29
3
after this command
adb shell /data/local/mempodroid 0xd9ec 0xaf47 sh
i got root@android:/ # but i cant type anything else in the dos windows after it.. can you explain further please
 

Tairen

Senior Member
Jul 21, 2010
99
21
after shell with root, i get the #, but i can't type anything afterwards. do i just repeat the process over?

edit: question was already asked, tried clicking on window, doesn't work.
 

Tairen

Senior Member
Jul 21, 2010
99
21
hmm did everything on your post, and rebooted. already had SU so i just opened up an app that requires root (titanium backup) and it says it wasn't able to attain root?

edit: confirmed with root checker that i still don't have root :(
 

se1000

Senior Member
Feb 14, 2011
1,038
395
hmm did everything on your post, and rebooted. already had SU so i just opened up an app that requires root (titanium backup) and it says it wasn't able to attain root?

edit: confirmed with root checker that i still don't have root :(
Try re-installing superuser? When I was rooted before, sometimes superuser wouldn't prompt me for SU on occasion too.
 

se1000

Senior Member
Feb 14, 2011
1,038
395
ahh i see the problem..

cat /data/local/su > /system/xbin/su
sh: cannot create /system/xbin/su: Read-only file system

how do i proceed?
Looks like something went wrong on the first mempodroid command. Go back and start from the begining just in case. Shouldn't hurt anything.
 

Top Liked Posts

  • There are no posts matching your filters.
  • 50
    ** This is completely unsupported!!!!!!! **

    ALL credit goes to saurik for the root method, Jason A. Donenfeld (zx2c4) for finding the exploit, alpharevx for finding the offsets and initial confirmation on the Transformer Prime and viperboy for finding it and posting it in his thread. I did not research, find, or develop this root method!

    Mods, if I've done anything wrong, please feel free to remove this thread.

    You will need to know how to use ADB commands, otherwise, use viperMOD PrimeTime!!!!!!!!!!!!!!!!!!!!!!!!.
    Downloads:

    mempodroid binary
    su binary


    Root:

    adb push mempodroid /data/local
    adb push su /data/local
    adb shell

    chmod 777 /data/local/mempodroid
    /data/local/mempodroid 0xd9ec 0xaf47 sh

    ** You should now be in a remote shell session with root (indicated by #)

    mount -o remount,rw -t ext4 /dev/block/mmcblk0p1 /system

    ** IF you have previously rooted your Prime, run the following two commands. They may throw an error that the file a file was not found.

    rm /system/bin/su
    rm /system/xbin/su


    cat /data/local/su > /system/xbin/su
    chown 0.0 /system/xbin/su
    chmod 06755 /system/xbin/su
    rm /data/local/mempodroid
    rm /data/local/su
    exit
    exit

    adb reboot


    After your Transformer Prime comes up, install Superuser from android market.

    HOPEFULLY everyone has learned their lesson and will also install Voodoo Rootkeeper as well!!!!!!!!!!!!!!!!!!!! R

    Enjoi!!!!!!!!!!!!!!!


    ** Feb 21 2012 Edit **

    Works on 9.4.2.14


    ** Feb 09 2012 Edit **

    Works on 9.4.2.13

    ** Jan 25 2012 Edit **

    Changed the mount command - thanks viperboy!
    Added steps to possibly resolve issues with previously rooted systems
    Changed a few steps to be a little bit easier.


    **Jan 24 2012 Edit **

    Some people are reporting issues with this method. I suspect this is due to previously having root or other altered files. A method that has worked for some is to update to 9.4.2.11.1 and then following the above procedures. Please note, this firmware release is unofficial and at this time THERE IS NO DOWNGRADE PATH.
    3
    Thanks for the download link to 11.1 guys. Downloading now to get my Prime to 100% stock. I hope to have a working PrimeTime root before I work in 2 hours :D
    2
    Possible since /data/local does not require root privileges.

    That is not really the issue, it is that run-as does not get to the point in the code that pushes the rooting exploit code into memory. That comes after the "are you root or shell" check, and it should therefore not be possible unless you are one of these users. My guess is that this individual either had root in his console already or is mistaken. Or maybe he will teach us all something.
    2
    ** This is completely unsupported!!!!!!! **

    ALL credit goes to saurik for the root method and viperboy for finding it and posting it in his thread. I did not research, find, or develop this root method!

    Mods, if I've done anything wrong, please feel free to remove this thread.

    You will need to know how to use ADB commands, otherwise, wait for a one click root using this method to be developed.

    Downloads:

    mempodroid binary
    su binary


    Root:

    adb push mempodroid /data/local
    adb push su /data/local
    adb shell chmod 777 /data/local/mempodroid
    adb shell /data/local/mempodroid 0xd9ec 0xaf47 mount -o remount,rw '' /system
    adb shell
    /data/local/mempodroid 0xd9ec 0xaf47 sh

    You should now be in a remote shell session with root (indicated by #)

    cat /data/local/su > /system/xbin/su
    chown 0.0 /system/xbin/su
    chmod 06755 /system/xbin/su
    exit
    exit

    adb shell rm /data/local/mempodroid
    adb shell rm /data/local/su
    adb reboot

    After your Transformer Prime comes up, install Superuser from android market.

    Enjoi!!!!!!!!!!!!!!!

    you forgot to mention alpharevx who actually put the effort in to confirm it was working, and finding the offsets required for mempodroid.

    also.
    Code:
    adb push mempodroid /data/local
    adb push su /data/local
    adb shell chmod 777 /data/local/mempodroid
    adb shell /data/local/mempodroid 0xd9ec 0xaf47 mount -o remount,rw '' /system
    adb shell
    /data/local/mempodroid 0xd9ec 0xaf47 sh

    could be done as
    Code:
    adb push mempodroid /data/local
    adb push su /data/local
    adb shell chmod 777 /data/local/mempodroid
    adb shell
    [INDENT]/data/local/mempodroid 0xd9ec 0xaf47 sh
    mount -o remount,rw '' /system[/INDENT]