As you see in this post : http://forum.xda-developers.com/showthread.php?t=1162971 , a method to downgrade (or update) when having the error ... so the thing is Gingerbreak was patched in 2.3.5 , or other older versions so the only simple thing is to use another exploit , lets cut through into it , and please post your feedback :
For whoever wants temproot for the use of superuser , Option 1 is the only option for Locked BL+S-ON , but after finishing option 1 , your sdcard will be unmounted (mount it from settings) , and bluetooth won't work unless the phone is rebooted , which means when the root is gone , Option 1 can't allow you to flash CWM , or generally edit /system by any way , but stuff more like SetCPU , Titanium Backup , and similar root apps work ...
OPTION 1
IF you aren't seeing the # in the command prompt that is because you aren't rooted , so you have to use zergRush or Tacoroot , but zergrush is easier :
1. download the temproot.zip and extract it somewhere
2. enable USB debugging on your Wildfire S
3. go to market and download superuser ( doesn't root your phone but it may help )
4. plug your phone and run temproot
5. just watch it , if you see between the lines overseer found a path ,then it worked
6. now to make sure you gained root , try turning on bluetooth , if it did then you are not rooted , also when you open the command prompt , if you type in "adb shell" and seen # , then it worked , if you saw $ , type in the cmd "su" , it should change to # , if it didn't check your phone (superuser will ask to allow or not , just allow it)
This is what i got , please tell if it worked , because it worked for me so it should for you !
I am new to xda in posting and replying stuff , but i know how forums work , so if i asked a question of how this forum works , plz answer .
OPTION 2
I've Got feedback earlier that zergRush didn't work , then this method will state the second root option which is kinda harder and picky-er , so let's cut through into it ...
This exploit is called Tacoroot , and it is mostly used for adb shell root purposes , not for superuser purposes
1. Extract the Tacoroot simple.zip somewhere and enable USB Debugging at settings >applications>development
2. Enable USB debugging from Settings> Applications > Development
3. Now run Step1
4. After the phone reboots to recovery , press both vol + and power button in the same time until a menu of four shows up , then make sure you got reboot system is highlighted (it may not be called reboot system , but something similar) and press the power button
5. when the phone boots , run Step2
6. Redo step 4
7. Now after it boots run step3
8. That's It ! you got root ! now open up a cmd , cd to the adb directory , and type in adb shell , then su , and it should show # , which confirms the root
!
WARNING : you will have a bootloop now while you have the adb root , and if you have finished what you need with the root , to get unrooted and boot normally just run Undo .
For whoever wants temproot for the use of superuser , Option 1 is the only option for Locked BL+S-ON , but after finishing option 1 , your sdcard will be unmounted (mount it from settings) , and bluetooth won't work unless the phone is rebooted , which means when the root is gone , Option 1 can't allow you to flash CWM , or generally edit /system by any way , but stuff more like SetCPU , Titanium Backup , and similar root apps work ...
OPTION 1
IF you aren't seeing the # in the command prompt that is because you aren't rooted , so you have to use zergRush or Tacoroot , but zergrush is easier :
1. download the temproot.zip and extract it somewhere
2. enable USB debugging on your Wildfire S
3. go to market and download superuser ( doesn't root your phone but it may help )
4. plug your phone and run temproot
5. just watch it , if you see between the lines overseer found a path ,then it worked
6. now to make sure you gained root , try turning on bluetooth , if it did then you are not rooted , also when you open the command prompt , if you type in "adb shell" and seen # , then it worked , if you saw $ , type in the cmd "su" , it should change to # , if it didn't check your phone (superuser will ask to allow or not , just allow it)
This is what i got , please tell if it worked , because it worked for me so it should for you !
I am new to xda in posting and replying stuff , but i know how forums work , so if i asked a question of how this forum works , plz answer .
OPTION 2
I've Got feedback earlier that zergRush didn't work , then this method will state the second root option which is kinda harder and picky-er , so let's cut through into it ...
This exploit is called Tacoroot , and it is mostly used for adb shell root purposes , not for superuser purposes
1. Extract the Tacoroot simple.zip somewhere and enable USB Debugging at settings >applications>development
2. Enable USB debugging from Settings> Applications > Development
3. Now run Step1
4. After the phone reboots to recovery , press both vol + and power button in the same time until a menu of four shows up , then make sure you got reboot system is highlighted (it may not be called reboot system , but something similar) and press the power button
5. when the phone boots , run Step2
6. Redo step 4
7. Now after it boots run step3
8. That's It ! you got root ! now open up a cmd , cd to the adb directory , and type in adb shell , then su , and it should show # , which confirms the root
!
WARNING : you will have a bootloop now while you have the adb root , and if you have finished what you need with the root , to get unrooted and boot normally just run Undo .
Attachments
-
1,001.5 KB Views: 2,621
Last edited: