Unlock bootloader + root

Diskussion i 'Android TV' startad av Konstigt, 27 nov 2014.

  1. Konstigt

    Konstigt Senior Droid Medlem

    Blev medlem:
    27 feb 2010
    Inlägg:
    1 105
    Mottagna gillanden:
    145

    MINA ENHETER

    Last edited: 30 nov 2014
  2. Konstigt

    Konstigt Senior Droid Medlem

    Blev medlem:
    27 feb 2010
    Inlägg:
    1 105
    Mottagna gillanden:
    145

    MINA ENHETER

    Liten miniguide för unlock bootloader som jag precis körde

    Kod:
    1. Koppla USB-kabel till dator.
    2. Boota upp NP med knappen nedhållen, släpp när vita led-lampan blinkar (pulsar)
    3. Verifiera att den är i fastboot
    
    $ fastboot devices
    764FEE1B    fastboot
    
    4. Lås upp, 2x!
    
    $ fastboot oem unlock
    ...
    FAILED (remote: To confirm, send the unlock command one more time)
    finished. total time: 0.614s
    $ fastboot oem unlock
    ...
    OKAY [  6.457s]
    finished. total time: 6.457s
    
    5. Klart.. boota om.
    
    
     
  3. Konstigt

    Konstigt Senior Droid Medlem

    Blev medlem:
    27 feb 2010
    Inlägg:
    1 105
    Mottagna gillanden:
    145

    MINA ENHETER

    Liten miniguide för root, hämta zip-filen i XDA-inlägget här

    Kod:
    $ = shell of my computer (Mac/Linux)
    # = shell of my NP, as root
    ## = Comment
    
    $ fastboot devices
    764FEE1B    fastboot
    $ fastboot flash boot root-boot.img 
    target reported max download size of 536870912 bytes
    sending 'boot' (5424 KB)...
    OKAY [  1.375s]
    writing 'boot'...
    OKAY [  1.359s]
    finished. total time: 2.735s
    $ fastboot reboot
    rebooting...
    
    finished. total time: 0.606s
    
    ## Wait for launcher to appear on the TV
    
    $ adb devices
    List of devices attached 
    764FEE1B    device
    
    $ adb root adb
    adbd is already running as root
    
    $ adb shell
    
    # mount -o remount,rw /system
    
    ## Remove some files that aren't part of stock Android
    
    # rm -fr /system/bin/su
    # rm -fr /system/xbin/su
    # rm -fr /system/xbin/daemonsu
    # rm -fr /system/xbin/sugote
    # rm -fr /system/xbin/sugote-mksh
    # rm -fr /system/xbin/supolicy
    # rm -fr /system/lib/libsupol.so
    # rm -fr /system/lib64/libsupol.so
    # rm -fr /system/bin/.ext
    # rm -fr /system/bin/install-recovery.sh
    # rm -fr /system/etc/install-recovery.sh
    # rm -fr /system/etc/init.d/99SuperSUDaemon
    # rm -fr /system/app/Superuser.*
    # rm -fr /system/app/Supersu.*
    # rm -fr /system/app/superuser.*
    # rm -fr /system/app/supersu.*
    # rm -fr /system/app/SuperUser.*
    # rm -fr /system/app/SuperSU.*
    # rm -fr /system/app/Superuser
    # rm -fr /system/app/Supersu
    # rm -fr /system/app/superuser
    # rm -fr /system/app/supersu
    # rm -fr /system/app/SuperUser
    # rm -fr /system/app/SuperSU
    
    # mkdir /system/app/SuperSU
    # mkdir /system/bin/.ext
    # exit
    
    ## Exit to computer console
    
    $ adb push SuperSU/SuperSU.apk /system/app/SuperSU/
    $ adb push x86/su /system/xbin/su
    $ adb push x86/supolicy /system/xbin/supolicy
    $ adb push x86/libsupol.so /system/lib/libsupol.so
    $ adb push x86/99SuperSUDaemon /system/etc/init.d/99SuperSUDaemon
    $ adb push x86/install-recovery.sh /system/etc/install-recovery.sh
    
    $ adb shell
    
    # cp system/xbin/su /system/bin/.ext/.su
    # cp system/xbin/su /system/xbin/daemonsu
    # cp system/xbin/su /system/xbin/sugote
    # cp system/bin/sh /system/xbin/sugote-mksh
    # ln -s /system/xbin/su /system/bin/su
    # ln -s /system/etc/install-recovery.sh /system/bin/install-recovery.sh
    # rm /system/bin/app_process
    # ln -s /system/xbin/daemonsu /system/bin/app_process
    # mv /system/bin/app_process32 /system/bin/app_process32_original
    # ln -s /system/xbin/daemonsu /system/bin/app_process32
    # cp /system/bin/app_process32_original /system/bin/app_process_init
    
    # chmod 0755 /system/app/SuperSU
    # chmod 0644 /system/app/SuperSU/SuperSU.apk
    # chmod 0755 /system/xbin/su
    # chmod 0644 /system/lib/libsupol.so
    # chmod 0777 /system/bin/.ext
    # chmod 0755 /system/bin/.ext/.su
    # chmod 0755 /system/etc/init.d/99SuperSUDaemon
    # chmod 0755 /system/xbin/daemonsu
    # chmod 0755 /system/xbin/sugote
    # chmod 0755 /system/xbin/sugote-mksh
    # chmod 0755 /system/etc/install-recovery.sh
    # chmod 0755 /system/xbin/supolicy
    # chmod 0755 /system/bin/app_process32_original
    # chmod 755 /system/bin/app_process_init
    # /system/bin/toolbox chcon u:object_r:system_file:s0 /system/xbin/su
    # /system/bin/toolbox chcon u:object_r:system_file:s0 /system/bin/.ext/.su
    # /system/bin/toolbox chcon u:object_r:system_file:s0 /system/lib/libsupol.so
    # /system/bin/toolbox chcon u:object_r:system_file:s0 /system/etc/init.d/99SuperSUDaemon
    # /system/bin/toolbox chcon u:object_r:system_file:s0 /system/bin/sh
    # /system/bin/toolbox chcon u:object_r:zygote_exec:s0 /system/xbin/sugote
    # /system/bin/toolbox chcon u:object_r:system_file:s0 /system/xbin/supolicy
    # /system/bin/toolbox chcon u:object_r:system_file:s0 /system/xbin/sugote-mksh
    # /system/bin/toolbox chcon u:object_r:zygote_exec:s0 /system/bin/app_process32_original
    # /system/bin/toolbox chcon u:object_r:system_file:s0 /system/bin/app_process_init
    # exit
    
    $ adb reboot