I checked on Gameworks and I don't see any firmware up for the tube version, but question are you able to run adb reboot bootloader and does it present with a menu to unlock the bootloader like the other shields do? Idk how to get it to post to the pc but I wonder if it at least has a proper bootloader menu or what options it presentsIs there any way to get this method to root the Shield 2019 TUBE???
I have followed the new instructions and have achieved root on my shield pro 2019, however the ai upscaling is telling me no due to an unlocked bootloader. I am certain that I used the latest scripting solution for this activity. I selected the delta version to achieve root access, and the magisk-like root options seem to work as they have on other boxes where I have used magisk to achieve root. When I tried to lock the bootloader to see if that would enable ai upscaling, the shield wouldn't boot, and told me it couldn't find any operating system on my shield. Is there some configuration item(s) that I need to check to get ai upscaling to work properly on my shield? BTW, thanks to all of the people who worked on this rooting solution for the shield. I'm sure I just need to toggle some setting somewhere to get ai upscaling to work as shown in your example. lm32692@louforgiveno 100 Percent Confirmed! Disney + is in the playstore and the ai upscaling is functional without having to relock the boot loader, YAY! Haha. The guide has been updated with the steps. It was super easy thankfully
Now I am going to learn how to get the system pulled with all of this preinstalled so we never have to do this mess. again Idk how or how long it will take but it will happen. At least folks can use this for now
Hi there, the ai upscaler is currently not working with root enabled, and for right now the bootloader cannot be locked while rooted. Unfortunately you would have to revert back to the stock boot image in order for these features to work again. I tried to warn about this at the bottom of the OP but then again I put it at the bottomI have followed the new instructions and have achieved root on my shield pro 2019, however the ai upscaling is telling me no due to an unlocked bootloader. I am certain that I used the latest scripting solution for this activity. I selected the delta version to achieve root access, and the magisk-like root options seem to work as they have on other boxes where I have used magisk to achieve root. When I tried to lock the bootloader to see if that would enable ai upscaling, the shield wouldn't boot, and told me it couldn't find any operating system on my shield. Is there some configuration item(s) that I need to check to get ai upscaling to work properly on my shield? BTW, thanks to all of the people who worked on this rooting solution for the shield. I'm sure I just need to toggle some setting somewhere to get ai upscaling to work as shown in your example. lm32692
I was just surprised that the comment mentioned that the ai upscaler worked with root active. Since you have the source code now, it's only a matter of time that you can devote to the project, until you will identify what mods are needed to have a fully functional root implementation. I'll look forward to that future event., along with all of the other folks who like to modify devices to give them more capabilities. lm32692@lm32692 I made a mistake when I made that comment. At the time I wrote that, I did not understand how the AI upscaler worked, and misunderstood what a friend had said. This post explains the blunder Thank you and sorry for the mis-speak again!
All I can tell you is I did the above and it locked my bootloader...at least fastboot told me it's locked once I tried flashing sth. I never selected to lock my bootloader in fastboot mode... no idea how it happened.@trohn_javolta Hi there. No, it is not possible to "automatically" lock the bootloader by code or flashing on the shield, as it Requires External Input to confirm the selection. I am really not understanding what you are saying. So what I can suggest is to, unlock your bootloader again, then just dl the firmware you want from Nvidia Gameworks View attachment 5885799
and flash it normally. or patch your own boot from there if you still want to test root for your use case. No Twrp needed for any of these steps.
Thanks for your reply!@legend0s you can use a launcher app like wolf launcher to get rid of the apps and customize the back. There's other launchers out there too. I'm not personally trying to bring any fw backwards, would want to go forward personally, higher than what it is currently at on 9.1.1 but thats just ambitions. I'm not anywhere near there yet for that endeavor. If you are using a 2017 though, those can be flashed back to 8.0.0 or further to 6.0.0, just not the 2019s.
Hello mate. it is actually possible to downgrade Shield 2019 to OS 8.2.3. I used this guide and it worked flawlessly: https://florisse.nl/shield/Thanks for your reply!
I don't like all the launcher apps. So, i hope that it is possible to disable the discover tab and/or disable the ads in the future.
PS:
I have the 2019 version.
adb shell pm uninstall -k --user 0 com.google.android.speech.pumpkin & adb shell pm uninstall -k --user 0 com.google.android.tts & adb shell pm uninstall -k --user 0 com.google.android.videos & adb shell pm uninstall -k --user 0 com.google.android.tvrecommendations & adb shell pm uninstall -k --user 0 com.google.android.syncadapters.calendar & adb shell pm uninstall -k --user 0 com.google.android.backuptransport & adb shell pm uninstall -k --user 0 com.google.android.partnersetup & adb shell pm uninstall -k --user 0 com.google.android.inputmethod.korean & adb shell pm uninstall -k --user 0 com.google.android.inputmethod.pinyin & adb shell pm uninstall -k --user 0 com.google.android.apps.inputmethod.zhuyin & adb shell pm uninstall -k --user 0 com.google.android.tv & adb shell pm uninstall -k --user 0 com.google.android.tv.frameworkpackagestubs & adb shell pm uninstall -k --user 0 com.google.android.tv.bugreportsender & adb shell pm uninstall -k --user 0 com.google.android.backdrop & adb shell pm uninstall -k --user 0 com.google.android.leanbacklauncher.recommendations & adb shell pm uninstall -k --user 0 com.google.android.feedback & adb shell pm uninstall -k --user 0 com.google.android.leanbacklauncher & adb shell pm uninstall -k --user 0 com.google.android.apps.mediashell & adb shell pm uninstall -k --user 0 com.plexapp.android & adb shell pm uninstall -k --user 0 com.zattoo.player & adb shell pm uninstall -k --user 0 com.nvidia.tegrazone3 & adb shell pm uninstall -k --user 0 com.plexapp.mediaserver.smb & adb shell pm uninstall -k --user 0 com.google.android.play.games & adb shell pm uninstall -k --user 0 com.netflix.ninja & adb shell pm uninstall -k --user 0 com.amazon.amazonvideo.livingroom & adb shell pm uninstall -k --user 0 com.amazon.amazonvideo.livingroom.nvidia & adb shell pm uninstall -k --user 0 com.google.android.youtube.tvmusic & adb shell pm uninstall -k --user 0 com.android.vending & adb shell pm uninstall -k --user 0 com.google.android.gms
I downgraded my shield 2019 Pro to 8.2.3 today.Wow!
Amazing news!!
I will give it a try in the next few days.
Can't wait to downgrade to 8.2.3!
Thanks for the info! (-;
Best regards from germany
Set-ExecutionPolicy Bypass -Scope Process -Force; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072; iex ((New-Object System.Net.WebClient).DownloadString('https://community.chocolatey.org/install.ps1'))
choco install adb
fastboot erase boot
fastboot flash boot bootmod2.img
fastboot reboot
fastboot erase boot
fastboot flash boot bootmod1.img
fastboot reboot
@echo off
title [BOOTMOD]
color 0A
if "%1" neq "" ( goto %1)
:MENU
cls
echo BOOTMOD -- Version 2
echo =========================================
adb devices
echo =========================================
echo 1. Enter Bootloader Menu for Mod Flashing
echo 2. Enter APK Menu
echo 3. ADB Connect
echo 4. Reboot to System
echo 5. HELP
echo 6. EXIT BOOTMOD
echo =========================================
set /p answer= Please Enter your Selection:
if %answer%==1 goto BOOTLOADER
if %answer%==2 goto APK
if %answer%==3 goto ADB
if %answer%==4 goto REBOOT
if %answer%==5 goto HELP
if %answer%==6 goto EXIT
:ADB
cls
set /p answer= Type in SHIELD IP Address:
adb connect %answer%
goto MENU
:APK
cls
echo ===========
echo APK MENU
echo ===========
echo 1. Magisk by TopJohnWu
echo 2. Magisk Delta fork by HuskyDG
echo 3. Return to Main Menu
echo ================================
set /p answer= Please Enter your Selection:
if %answer%==1 goto MAGISKAPK
if %answer%==2 goto DELTAAPK
if %answer%==3 goto MENU
:MAGISKAPK
adb install magisk.apk
goto MENU
:DELTAAPK
adb install delta.apk
goto MENU
:HELP
cls
echo Adb must be installed on the computer and USB debugging must be enabled on the Shield.
echo You will need the Fastboot USB drivers installed on your PC.
echo Check the GUIDE on XDA for more help.
echo LINK: https://forum.xda-developers.com/t/bootmod-root-your-shield-in-1-minute-2015-2017-2019.4524873/
echo =====================================================================================
set /p answer=Press 1 to return to Main Menu:
if %answer%==1 goto MENU
:UNLOCK
cls
fastboot oem unlock
echo ==============================================================
echo Use your shield to select yes. Then press any key to continue
echo ==============================================================
pause
set /p answer=Press 1 to Enter Flash Menu or 2 to return to Main Menu:
if %answer%==1 goto FLASH
if %answer%==2 goto MENU
:BOOTLOADER
cls
adb reboot bootloader
pause
cls
echo =====================================================
fastboot devices
echo =====================================================
echo Is your device listed above?
echo =====================================================
set /p answer=Press 1 for yes or 2 for no or 3 for Help:
if %answer%==1 goto FLASH
if %answer%==2 goto BOOTLOADER
if %answer%==3 goto HELP
:FLASH
cls
echo How would you like to flash your boot today? Do you want to include:
echo ====================================================================
echo 1. TopJohnWu's Magisk
echo 2. HuskyDG's Magisk Delta
echo 3. Revert Back To Stock Boot Image
echo 4. Reboot Shield to System
echo 5. Return to Main Menu
echo ====================================
set /p answer=Select a number and press enter:
if %answer%==1 goto MAGISK
if %answer%==2 goto DELTA
if %answer%==3 goto STOCK
if %answer%==4 goto REBOOT
if %answer%==5 goto MENU
:MAGISK
cls
fastboot erase boot
fastboot flash boot bootmod1.img
fastboot reboot
echo =====================================
echo Wait for your Shield to fully Reboot.
echo =====================================
pause
adb install magisk.apk
goto MENU
:DELTA
cls
fastboot erase boot
fastboot flash boot bootmod2.img
fastboot reboot
echo =====================================
echo Wait for your Shield to fully Reboot.
echo =====================================
pause
adb install delta.apk
goto MENU
:STOCK
cls
fastboot erase boot
fastboot flash boot boot.img
echo ================================================================================
echo REMEMBER TO LOCK YOUR BOOTLOADER FOR AI UPSCALING AND DOLBY VISION FUNCTIONALITY
echo ================================================================================
echo 1. Reboot Shield to the System
echo 2. Return to Main Menu
echo =========================
set /p answer=Enter your selection:
if %answer%==1 goto REBOOT
if %answer%==2 goto MENU
:REBOOT
fastboot reboot
goto MENU
:EXIT
exit /b
Sorry I have no idea. I've never worked on Android before and I've spent like 30 minutes on this.Lastly "Or we lost some kind of DRM keys during the boot unlocking phase." Is this something we can obtain with a serial UART or JTAG adapter? I just got mine in and am not afraid to break the shield open here in a few days if there's something that could be obtained and shared there. I am new to all this so I appreciate everyone sharing the things
12-20 23:12:18.951 3725 3839 E WindowManager: Exception checking for game stream. Exception: android.content.pm.PackageManager$NameNotFoundException: ComponentInfo{com.android.tv.settings/.MainSettings}
12-20 23:12:18.951 3725 3839 I InputDispatcher: Dropped event because of pending overdue app switch.
12-20 23:12:18.953 3725 3864 E AudioService: Audioserver died.
12-20 23:12:18.982 4578 5347 D DolbyAudioService: IMs12 implementation died... Restoring settings after restart
12-20 23:12:18.983 4578 5347 D DolbyAudioService: Attempting to connect to IMs12
12-20 23:12:18.992 4578 12382 I DolbyAudioService: Waiting 1 second before attempting to connect to IMs12...
12-20 23:12:19.037 12385 12385 D audiohalservicemsd: main() Starting [email protected] from vendor/dolby.
12-20 23:12:19.050 12385 12385 D : Calling decrypt_blob. err(0)
12-20 23:12:19.056 3432 3432 E Ipprotectd: decrypt_blob: Error during launch operation. err(0xffff0011)
12-20 23:12:19.056 3432 3432 E Ipprotectd: Error occurred at decryption. err(ffff0011)
12-20 23:12:19.058 12385 12385 E : Decryption failed
12-20 23:12:19.058 12385 12385 E : decrypt_blob failed! err(0)
12-20 23:12:19.058 12385 12385 E : Failed to decrypt.
12-20 23:12:19.058 12385 12385 E : Failed decrypt .text section.
12-20 23:12:19.059 12385 12385 F libc : Fatal signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x4ec98e90 in tid 12385 (android.hardwar), pid 12385 (android.hardwar)
12-20 23:12:19.062 12384 12384 I ServiceManagement: Removing namespace from process name [email protected] to [email protected].