[Root 4.4.X] Pie for Motorola devices

marcviado

Senior Member
Aug 7, 2010
621
93
0
Las Vegas
Getting this error
same issue on my end as well..running stock verizon android 4.4.2


C:\Android>adb shell /data/local/atvc/root.sh
rm failed for /data/local/atvc/blop.asec, No such file or directory
rm failed for /data/local/atvc/blop, No such file or directory
pie by jcase
want to buy me pie? paypal-> [email protected]


edit: i as well have root access,i installed supersu from the play store and installed rootchecker and it says congratulations device has root access.im guessing it worked? even if i got the fail as shown above?
 
Last edited:

underdog1799

Senior Member
Jan 18, 2013
83
27
0
Salt Lake City
Xposed Framework is not working on this. I understand that write protection is not disabled, but theoretically you should be able to do a soft reboot after installing xposed framework, but on my phone after it does the soft reboot it freezes and does a hard reboot on your phone. I am no expert at this by any means, but I don't think xposed framework is going to work
 

underdog1799

Senior Member
Jan 18, 2013
83
27
0
Salt Lake City
Xposed Framework is not working on this. I understand that write protection is not disabled, but theoretically you should be able to do a soft reboot after installing xposed framework, but on my phone after it does the soft reboot it freezes and does a hard reboot on your phone. I am no expert at this by any means, but I don't think xposed framework is going to work
Got it working... for some reason i had to do 2 soft reboots in a row, and then download and install a module and it didn't force my phone to hard reboot
 
  • Like
Reactions: dubyajaysmith

Jayrod76

Senior Member
Oct 6, 2012
821
795
0
Hey Jcase. Thanks for all that you do! I'm not in need of this since I got a Dev X but nonetheless, very cool of you to work on these increasingly more difficult exploits!
 

lulajardim

Member
Jun 19, 2011
33
11
0
Brazil / Maceio-AL
and jcase does it again! even if it is a tethered method, that still is a great achievement!

I'm just curious as to why you inteded to hold this exploit until August, but this is probably a personal issue, so no need to answer hehe.

grats and thanks!
 

thelogman

Senior Member
Jan 27, 2012
91
9
0
Sweet sally 2 d***s thanks man! Probably the greatest feeling ever was opening root checker and seeing that root was enabled. The middle man has been a no go for me both times and have been to broke for the Dev edition. Disable write protection and collect that bounty dude! But congrats and thanks none the less.

Sent from my XT1058 using XDA Free mobile app
 

reddawn71

Member
Oct 17, 2013
16
1
0
Thx for the exploit @jcase I'll downgrade to 19.5.3 tomorrow, verify root and make my bounty payment.. Thx again man!! I guarantee one thing that no one will ever catch my ass doing again.. Buy a carrier specific phone!!
 
Last edited:

xDroid4Lifex

Senior Member
Jan 28, 2014
375
180
0
Do not try to do the "classic install" with xposed, do the normal install then SOFT reboot. Profit.

Can't wait to see if a w/p exploit is released soon :D

Thanks jcase!