[SOLVED]...... by writing erlier version of .kdz with uppercut.
My security patch level is December 1, 2016.
Instruction doesn't say before which YEAR it must be.
I use H990N10e_00_OPEN_HK_DS_OP_1208.kdz
with UPPERCUT. It returns phone to working state after failed attempt.
On windows RUNMEFIRST.bat
reports BEGINING OF CRUSH at the end of writing patch.
is this normal or something is wrong?
C:\adb>adb logcat -s dirtysanta
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
- waiting for device -
--------- beginning of system
--------- beginning of main
--------- beginning of crash
01-01 12:13:46.073 7344 7344 I dirtysanta: Starting Backup
01-01 12:13:47.502 7344 7344 I dirtysanta: Backup Complete.
01-01 12:13:52.502 7344 7344 I dirtysanta: Starting flash of Aboot!
01-01 12:13:52.674 7344 7344 I dirtysanta: Finished. Please run Step 2 now.
I dont receive any other error messages during commands execution.
But after i confirm Delete all user data twice phone reboots to broken screen.
It is even slightly broken during fastboot mode after stage2.bat. It has purple stripes at the top, but it works.
Ony terminal from Jack Palevich shows untrusted app when
#id.
Other terminals dont.
And it reports this even with fresh kdz and erased data.
So this is strange.
What causes fail?
Do I nee to downgrade or try another kdz?
Please need advice.
Detailed steps
flash with uppercot
H990N10e_00_OPEN_HK_DS_OP_1208.kdz
# db logcat | grep -a dirtysanta
* daemon not running; starting now at tcp:5037
* daemon started successfully
# adb push dirtysanta /storage/emulated/0
dirtysanta: 1 file pushed, 0 skipped. 7.0 MB/s (18760 bytes in 0.003s)
# adb push aboot.img /storage/emulated/0
aboot.img: 1 file pushed, 0 skipped. 324.6 MB/s (2097152 bytes in 0.006s)
# adb push dirtycow /data/local/tmp
dirtycow: 1 file pushed, 0 skipped. 4.1 MB/s (9984 bytes in 0.002s)
# adb push my-run-as /data/local/tmp
my-run-as: 1 file pushed, 0 skipped. 5.2 MB/s (13796 bytes in 0.003s)
# adb shell chmod 0777 /data/local/tmp/*
# adb shell /data/local/tmp/dirtycow /system/bin/run-as /data/local/tmp/my-run-as
warning: new file size (13796) and file old size (14360) differ
size 14360
[*] mmap 0x7bcead0000
[*] exploit (patch)
[*] currently 0x7bcead0000=10102464c457f
[*] madvise = 0x7bcead0000 14360
[*] madvise = 0 1048576
[*] /proc/self/mem -2122317824 1048576
[*] exploited 0x7bcead0000=10101464c457f
# adb shell /data/local/tmp/dirtycow /system/bin/applypatch /data/local/tmp/dirtycow
warning: new file size (9984) and file old size (165144) differ
size 165144
[*] mmap 0x7b3ebd7000
[*] exploit (patch)
[*] currently 0x7b3ebd7000=10102464c457f
[*] madvise = 0x7b3ebd7000 165144
[*] madvise = 0 1048576
[*] /proc/self/mem 1367343104 1048576
[*] exploited 0x7b3ebd7000=10102464c457f
# adb shell
elsa:/ $ run-as con
elsa:/ #
# chmod 0777 /storage/emulated/0/*
on phone
# applypatch /system/bin/atd /storage/emulated/0/dirtysanta
# adb reboot bootloader
# fastboot flash recovery twrp-3.0.2-1-h990.img
sleep 30
# fastboot flash recovery twrp-3.0.2-1-h990.img
sleep 30
# fastboot reboot