i did "fastboot oem unlock" and get fastboot bootloader unlocked code 3. i flash twrp, open revovery and reboot the bootloader to recovery. then when i reboot the os, twrp is gone and i get the recovery robot. is this because the phone is encrypted and code 3? i can load twrp and backup, then the next time i load twrp it finds the backup in restore. it seems that twrp works i just need to flash load it each time i want to use it, like when lineage comes out with 15.1 for the nex6. i am a novice at this and will this situation work to load a custom rom? thanks
The stock ROM is replacing the custom recovery with the stock recovery on boot. To prevent this, you must follow the TWRP install instructions found on the device page at the TWRP website (twrp.me).
The site appears to be down so basically, after flashing TWRP in fastboot, use the power button to turn off the device. Then reboot to bootloader using the key combination; power + volume up simultaneously. Use the volume buttons to find "recovery" then use the power button to select and enter TWRP. Once TWRP is launched, TWRP will patch the stock ROM to prevent the stock ROM from replacing TWRP again.
"Good judgment comes from experience, and a lot of that comes from bad judgment." - Will Rogers
ktmom said:
The stock ROM is replacing the custom recovery with the stock recovery on boot. To prevent this, you must follow the TWRP install instructions found on the device page at the TWRP website (twrp.me).
The site appears to be down so basically, after flashing TWRP in fastboot, use the power button to turn off the device. Then reboot to bootloader using the key combination; power + volume up simultaneously. Use the volume buttons to find "recovery" then use the power button to select and enter TWRP. Once TWRP is launched, TWRP will patch the stock ROM to prevent the stock ROM from replacing TWRP again.
"Good judgment comes from experience, and a lot of that comes from bad judgment." - Will Rogers
Click to expand...
Click to collapse
i flash it, when i go to fastboot, recovery, twrp loads it asks for a password, i put my pin # in i get get in red "unable to mount storage" then it loads the twrp interface. i tick reboot then power off. power key + volume down loads fast boot and i navigate to recovery and twrp repeats the the cycle. now i power down and boot the os. after that no more twrp in fastboot. so yes i did open twrp log off fastboot, log back into fastboot, log off and then reboot the os.
Did you change the encryption password from the default for your storage?
"Good judgment comes from experience, and a lot of that comes from bad judgment." - Will Rogers
ktmom said:
Did you change the encryption password from the default for your storage?
"Good judgment comes from experience, and a lot of that comes from bad judgment." - Will Rogers
Click to expand...
Click to collapse
it is a used phone from ebay. encryption in settings is on.
from what i read that encryption is part of the kernel. i was thinking to flash 15.1 unofficial which should give the phone a new kernel?
No, not like that. The kernel has "flag" that determines if it's possible to decrypt the device. But even if the kernel is "no force encrypt", you must wipe the internal storage (user data partition) to then have a decrypted device.
Doing a Wipe -> Format data ->Yes from within TWRP should fix the problem. It will lose everything on the internal storage though.
"Good judgment comes from experience, and a lot of that comes from bad judgment." - Will Rogers
not much in there i just got it up. so i will flash twrp an then wipe with format. data. just double checking before i go ahead.
i did the format, it showed a lot of red print. in the end i am back to the same place "unable to mount storage" and twrp does it's disappearing act.
There's not much to go on in that statement.
It's important to have the latest version of TWRP installed (twrp-3.2.1-0-shamu.img).
Without better information to help you, I would suggest fastboot flashing the last stock release from Google (Factory Images for Nexus and Pixel Devices ). The instructions on that page are good and accurate. The N6 is considered an older device and uses the command: "fastboot oem unlock"
"Good judgment comes from experience, and a lot of that comes from bad judgment." - Will Rogers
i did the fastboot oem unlock that is where i got bootloader unlocked "code 3". thanks for the help i will head on over to the factory image. during the format command it reported, if it helps
unable to mount storage
formatting data failed to mount data device or resource busy
unable to recreate /data/media/folder.
i am a never at this and i plan to install factory on my linux pc with the following.
fastboot oem unlock
cd /home/ [where i put the zip]
flash-all.sh shamu-n6f27m-factory-bf5cce08.zip
any problems? thanks
have i got it right? thanks
dr1445 said:
i did "fastboot oem unlock" and get fastboot bootloader unlocked code 3. i flash twrp, open revovery and reboot the bootloader to recovery. then when i reboot the os, twrp is gone and i get the recovery robot. is this because the phone is encrypted and code 3? i can load twrp and backup, then the next time i load twrp it finds the backup in restore. it seems that twrp works i just need to flash load it each time i want to use it, like when lineage comes out with 15.1 for the nex6. i am a novice at this and will this situation work to load a custom rom? thanks
Click to expand...
Click to collapse
I had similar problem:
install twrp and used it,
reboot the os,
launch again the recovery mode and twrp was gone.
I solved it by rooting the phone (with SuperSU) immediately after twrp installation (before the OS reboot!!)
in one attempt to install twrp i dropped back to v 2.8, it asked me if it wanted su, clicked ok and it failed, so did kingoapk. after looking at the factory google roms i see verizon has one. This phone was from ebay with an unknown carrier but it did come with a verizon sim card. that maybe what the code 3 comment next to "bootloader unlocked" is about. verizon likes to make boootloaders unlockable. if so, i may not not be able to do a factory reset with the code 3 in place.?
The code 3 is a status that the bootloader is unlocked. It's normal.
Dropping backwards to an old recovery is a mistake and the fact you tried to install su through it complicated the problems.
You need to follow a set of instructions without impatience and completely or you'll be stuck in this loop forever.
No N6 bootloader is unlockable, including Verizon. Use the newest release from Google as I stated before and return to full stock.
Go to this thread/post and read to the end: [HOW-TO] The Nexus 6 All-In-One Beginner's Guide. There is good information and old, incorrect information in the OP of that thread. It's why I'm sending you to the middle.
"Good judgment comes from experience, and a lot of that comes from bad judgment." - Will Rogers
not sure about that but then i am the one asking the questions. i first installed the latest twrp-3.2.1-0-shamu.img, logged off fastboot, logged back on fastboot then rebooted the os. did this several times each time i went back to fastboot twrp is gone. then i tried the older version. the "unable to mount storage" has persisted each time. if i have the code for my linux pc right i will give the factory install a try. thanks. edit; from the the link you sent it looks like i can use twrp from my pc an install either lineage 15.1 unofficial or wait for the official version without a problem. i would be ok with that?
Remember, you need to power off the phone then use the previously mentioned key combination and go straight back to recovery after flashing the TWRP image. Anything else and the stock ROM will overwrite recovery.
Here are the udev rules for an Ubuntu based PC.
Code:
/etc/udev/rules.d/99-android.rules
# Google Nexus 6 16 Gb
SUBSYSTEM=="usb", ATTRS{idVendor}=="18d1:4ee7", SYMLINK+="android_adb", MODE="0666" GROUP="plugdev" TEST=="/var/run/ConsoleKit/database", \RUN+="udev-acl --action=$env{action} --device=$env{DEVNAME}"
SUBSYSTEM=="usb", ATTR{idVendor}=="18d1", ATTR{idProduct}=="4ee1", MODE="0666", OWNER="" # MTP media (multimedia device) nexus 6
SUBSYSTEM=="usb", ATTR{idVendor}=="18d1", ATTR{idProduct}=="4ee2", MODE="0666", OWNER="" # MTP media with USB debug on(multimedia device) nexus 6
SUBSYSTEM=="usb", ATTR{idVendor}=="18d1", ATTR{idProduct}=="4ee5", MODE="0666", OWNER="" # PTP media (camera) nexus 6
SUBSYSTEM=="usb", ATTR{idVendor}=="18d1", ATTR{idProduct}=="4ee6", MODE="0666", OWNER="" # PTP media with USB debug on (camera) nexus 6
SUBSYSTEM=="usb", ATTR{idVendor}=="18d1", ATTR{idProduct}=="4ee0", MODE="0666", OWNER="" # Bootloader nexus 6
SUBSYSTEM=="usb", ATTR{idVendor}=="18d1", ATTR{idProduct}=="d001", MODE="0666", OWNER="" # Recovery nexus 6
Then restart the service
Code:
sudo service udev restart
or just restart the computer.
If you want, you can double check the vendor id and product id using "lsusb".
The script method of flashing is fine. If you run into problems, these next steps outline a manual method of flashing each partition. You need to extract the images from the compressed stock file first.
It's easiest if the stock rom is in the same directory as where place you put the fastboot binary. But you can just use the entire path to the location of the stock images. It's also less error prone to rename the stock images to just bootloader.img, radio.img, recovery.img, boot.img and system.img.
reboot to the bootloader
./fastboot reboot-bootloader
First flash the bootloader:
./fastboot flash bootloader /[PATH TO IMG]/bootloader.img
Again reboot the bootloader by typing
./fastboot reboot-bootloader
2nd flash the radio:
./fastboot flash radio /[PATH TO IMG]/radio.img
Again reboot the bootloader by typing
./fastboot reboot-bootloader
3rd flash stock recovery:
./fastboot flash recovery /[PATH TO IMG]/recovery.img
enter
Again reboot the bootloader by typing
./fastboot reboot-bootloader
4th flash boot partition:
./fastboot flash boot /[PATH TO IMG]/boot.img
Again reboot the bootloader by typing
./fastboot reboot-bootloader
5th flash the system: ( the -w cause the partiton to be wiped before flashing the new system image)
./fastboot -w flash system /[PATH TO IMG]/system.img
In your case (but probably not for everyone who stumbles on this post!)
6th wipe the user data partition: ( ** this clears internal memory!! **)
./fastboot erase userdata
Then clear the cache:
./fastboot erase cache
Finally, restart to the OS to make sure everything is working correctly.
./fastboot reboot
Now you can go back to flashing TWRP recovery, using the latest release and make sure to power off the device then use the key combinations to restart straight back to recovery.
Personally, once you achieve this point, I strongly recomend doing a back up of the EFS partiton in TWRP. If that partition is corrupted in any future process, you'll need that backup and it's specific to your device.
"Good judgment comes from experience, and a lot of that comes from bad judgment." - Will Rogers
I used to have the same problem, i.e. twrp disappearing and stock recovery overwriting it.
I did exactly what quizzina did, flashed twrp then entered twrp using volume buttons, flashed SuperSU in order to gain root access, then flashed twrp again and presto...
bare with me here @73 the mind works slow on the learning curve. i ran lsusb with my nex6 set for file trans and adb devices showing the nex. isusb reports it as a nexus 4 not 6. perhaps that is the problem. see below. also which su should i flash?
[email protected]:~$ lsusb
Bus 002 Device 004: ID 03f0:8911 Hewlett-Packard
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 008 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 007 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 006 Device 003: ID 04b3:3025 IBM Corp. NetVista Full Width Keyboard
Bus 006 Device 004: ID 046d:c016 Logitech, Inc. Optical Wheel Mouse
Bus 006 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 001 Device 043: ID 18d1:4ee2 Google Inc. Nexus 4 (debug)
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 005 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
dr1445 said:
bare with me here @73 the mind works slow on the learning curve. i ran lsusb with my nex6 set for file trans and adb devices showing the nex. isusb reports it as a nexus 4 not 6. perhaps that is the problem. see below. also which su should i flash?
[email protected]:~$ lsusb
Bus 002 Device 004: ID 03f0:8911 Hewlett-Packard
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 008 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 007 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 006 Device 003: ID 04b3:3025 IBM Corp. NetVista Full Width Keyboard
Bus 006 Device 004: ID 046d:c016 Logitech, Inc. Optical Wheel Mouse
Bus 006 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 001 Device 043: ID 18d1:4ee2 Google Inc. Nexus 4 (debug)
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 005 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Click to expand...
Click to collapse
Yes, that appears to be a nexus 4.
The N4 is made by LG where the N6 is made by Motorola. The N4 is 2.7" wide by 5.25" tall. The N6 is 3.25" wide by 6.25" tall.
Edit:
Sorry, I missed the question about rooting. I would recommend getting to the point where the basics are working before worrying about rooting. Yes, you can use that as a way to block stock from overwriting recovery, but you are currently in an indiscriminate state and you really should get things stable before introducing more stuff. On an N6, the steps I've outlined above work every time. It's probably similar on an N4 but the TWRP image your using is wrong, as well as the stock image.
"Good judgment comes from experience, and a lot of that comes from bad judgment." - Will Rogers
Related
Ok here's the deal...
Im running XP 32bit, and ever since I installed 5.0.2h my ADB Interface entry is missing from the Device Manager.
I'm constantly getting error: device not found when trying to connect through the command prompt and the device is showing up as a "disk drive" and under the USB Controllers as a "mass storage device" in the device manager.
No matter how many times I uninstall these, and delete the entries from the registry, it automatically adds it as a disk drive every time I connect.
I then successfully try to manually add the ADB driver and it constantly comes up saying the "device cannot be started"
Anyone find a solution to this problem?
Thanks.
Hmm. Rebooting, then disabling and re-enabling Debug Mode did the trick.
Weird.
when im trying to push font do i got into fastboot mode? because when i do then go into cmd and type adb remount it keeps sayin device not found
Ok.
I was running Ubuntu 11.04 64 bit.
Because of this, I wiped the system and am now running Ubuntu 12.04.
The issue persisted.
I did install the lib file, I forget the name, but it did install successfully.
I have an android rules file, labeled 51-android.rules, with +w+r+x access
{
SUBSYSTEM=="usb",ATTRS{idVendor}=="0bb4",MODE="0666",OWNER="root"
}
I have fully updated my SDK
I have set the path correctly for ADB.
When I plug in either my G1 or a MyTouch 3G, and run the command adb shell I get:
error: device not found
When I run the command $ adb devices I get:
List of devices attached
Debugging is enabled on both phones. I tried only the MyTouch 4G on another computer but am getting the same result.
My goal, as a noob, is to try my hand at App development. I know the AVD is a good resource but trying it live is nice.
I have rebooted the handset and restarted debugging.
The handsets are charging when plugged in.
Probably need to download the proper drivers
Sent from my HTC Vision using xda premium
I did not think Linux needed drivers.
Where you meaning that you sent me the drivers? Sorry friend.
I really appreciate the help.
to my understanding all operating systems need drivers, they just tend to come with them. im guessing you may have the wrong ones being recognized when you plug in your phone. try manually installing the right ones from the sdk website or updating all the drivers found in your sdk manager
---------- Post added at 05:37 PM ---------- Previous post was at 05:34 PM ----------
well felt like checking on this, here is the first link i found in a google search, looks like you will find your answers here
http://esausilva.com/2010/05/13/setting-up-adbusb-drivers-for-android-devices-in-linux-ubuntu/
@ demkantor
Your the MAN! Thank you sir. To be honest I am running out now to class, but I did skim through it and it looks very good. I am pretty sure my answer is in this list somewhere.
Now, I did a QUICK google search, and ill get back to it sometime this weekend, but off the top of anyone's head, do you happen to know the 51-android.rules line for precise pangolin? It refers to different ones, but I know its new and its not on that list. I have an HTC device so I know to use 0bb4 as the vendor ID.
This is a great forum, thank you guys.
http://www.joescat.com/linux/android_rules.html
This has been great information. I think I am getting closer to an answer.
I ran through both documents. Good information in there big time, Ill be keeping them handy.
Still, even after setting the rules and everything, I do not show a device. In fact, I tried even my very old G1 and am getting the same results
When I run lsusb (as root) I am getting no devices beyond the usual:
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 005 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 006 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 007 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 008 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 002 Device 004: ID 04f2:b090 Chicony Electronics Co., Ltd
Bus 006 Device 002: ID 04d9:1203 Holtek Semiconductor, Inc. Keyboard
Bus 006 Device 003: ID 0461:4d42 Primax Electronics, Ltd
Keyboard/Mouse/Hub. Even after plugging and unplugging the handsets I get the same result. This is the 2nd cable I have tried and both phones actually do charge, though even still I am not getting the SD option either, much less debugging. I tried this on another computer at work that I test other devices on and I am getting the same results.
Thank you again.
---------- Post added at 03:14 AM ---------- Previous post was at 03:07 AM ----------
Oh man.... 2 bad cables....
After writing my last response, I said "What the hay" and threw in another cable... Boom Bam there she blows!
I really appreciate everything though. Believe me, these docs will not go in vain. I still need to read through them THANK YOU dudes a great deal!
Hello,
I bricked my phone doing something quite silly... upgrading to stock firmware using OTA from custom ROM. Yes, I used to be an Iphone user, and with Iphones, a recovery would make the phone stock, no matter what state it was in previously.
Anyways, my HTC One Google play edition now has no OS, and no recovery available. I am also unable to use ADB commands to connect to the phone from my Windows 7 PC. However, if I load up my Linux CENTOS through Vmware (VMplayer), the OS recognizes the phone.
Can anyone provide details on the next steps? I don't care what version OS (stock or custom) the phone is fixed to, I just want to fix it and be able to use it again.
On a side note, I am willing to pay $100 USD (via paypal gift), to whoever can guide me through the process successfully. I can also provide remote desktop connection via Teamviewer or Cisco WebEx, if you prefer to just work on it remotely.
Thanks!
J
ca12bon said:
I am ... unable to use ADB commands to connect to the phone from my Windows 7 PC.
...I am willing to pay $100 USD (via paypal gift), to whoever can guide me through the process successfully.
Click to expand...
Click to collapse
You can keep the $100, just see if you can run fastboot getvar all and post the results here and I'm sure plenty of folks will be happy to chime in for free.
If you got adb working on windows 7, presumably you have a working install of the latest android SDK. Also you say you can get into HBOOT.
If so, you're not completely "bricked".
You should still be able to run some fastboot commands. That will be your way out.
Just to spell this out, connect the phone to your PC, boot into the bootloader, select fastboot (on the phone) and try running some of the fastboot commands (from a terminal window in the PC). Start with 'fastboot devices' to see if you are even talking. If your phone's serial number appears, proceed to 'fastboot getvar all' and post the results (edit out your imei and serial number) here.
You can do a lot from fastboot, such as flashing a fresh recovery or even an RUU.
"Brick" is a pretty extreme state. You're not bricked.
Sent from my HTC One using xda app-developers app
NxNW said:
You can keep the $100, just see if you can run fastboot getvar all and post the results here and I'm sure plenty of folks will be happy to chime in for free.
If you got adb working on windows 7, presumably you have a working install of the latest android SDK. Also you say you can get into HBOOT.
If so, you're not completely "bricked".
You should still be able to run some fastboot commands. That will be your way out.
Just to spell this out, connect the phone to your PC, boot into the bootloader, select fastboot (on the phone) and try running some of the fastboot commands (from a terminal window in the PC). Start with 'fastboot devices' to see if you are even talking. If your phone's serial number appears, proceed to 'fastboot getvar all' and post the results (edit out your imei and serial number) here.
You can do a lot from fastboot, such as flashing a fresh recovery or even an RUU.
"Brick" is a pretty extreme state. You're not bricked.
Sent from my HTC One using xda app-developers app
Click to expand...
Click to collapse
Hey man,
Thanks for the help, really appreciate it. My Windows is unable to recognize the phone via ADB, so I cannot run any fastboot commands. I will go home tonight and try again for the exact readout, but I couldn't perform any commands whatsoever.
However, when using CENTOS (through vmware), the OS recognizes the phone:
[[email protected] Desktop]# lsusb
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 002 Device 002: ID 0e0f:0003 VMware, Inc. Virtual Mouse
Bus 002 Device 003: ID 0e0f:0002 VMware, Inc. Virtual USB Hub
Bus 001 Device 003: ID 0bb4:0f91 HTC (High Tech Computer Corp.)
Screenshot of HBOOT:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
My "main" problem, is I do not know how to get ADB/fastboot installed to my CENTOS mounted on Vmplayer. I think if I can use ADB and fastboot commands, I can push a custom recovery to my phone and install a working ROM.
Regards,
John
Ah, I see, yes it looks like getting the computer to recognize the phone is the main obstacle at this point.
Not an expert on Linux, but I did just run across this reminder about windows 7:
matanlevanon said:
Well, being able to fastboot is crucial... next time you can just install HTC Sync which will update your drivers and then un-install it.
Click to expand...
Click to collapse
Do you have the latest drivers from HTC?
Sent from my HTC One using xda app-developers app
@nkk71's guide has some commands for Ubuntu that may help
Look at step 5
http://forum.xda-developers.com/showthread.php?t=2541082
ca12bon said:
Hey man,
Thanks for the help, really appreciate it. My Windows is unable to recognize the phone via ADB, so I cannot run any fastboot commands. I will go home tonight and try again for the exact readout, but I couldn't perform any commands whatsoever.
However, when using CENTOS (through vmware), the OS recognizes the phone:
[[email protected] Desktop]# lsusb
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 002 Device 002: ID 0e0f:0003 VMware, Inc. Virtual Mouse
Bus 002 Device 003: ID 0e0f:0002 VMware, Inc. Virtual USB Hub
Bus 001 Device 003: ID 0bb4:0f91 HTC (High Tech Computer Corp.)
Screenshot of HBOOT:
My "main" problem, is I do not know how to get ADB/fastboot installed to my CENTOS mounted on Vmplayer. I think if I can use ADB and fastboot commands, I can push a custom recovery to my phone and install a working ROM.
Regards,
John
Click to expand...
Click to collapse
Try this first:
1. install HTC Sync on your computer (this will install the latest drivers for you)
2. Create a folder in your C:\ drive naming it 'adb' or something like that.
4. Place the content of this folder (4 files) in your adb folder
5. when in bootloader hit "fastboot" (wait until all the drivers are installed on your PC, give it a good 5 min while the phone is connected and in fastboot mode) you should see at one point "fastboot usb" like in the attached photo:
6. if you don't see it, reboot your computer and try again.
7. your fastboot should work now, use the following guide to flash recovery (Section 3) and you can transfer your ROM and install it.
Use the $100 to buy your phone some nice accessories and remember me by them
I have often heard people recommend adding an additional step between 1) and 2) , let's call it step 1.a) uninstall the actual HTC Sync app (drivers will remain installed)
Is it still necessary?
Sent from my HTC One using xda app-developers app
ca12bon said:
Hello,
I bricked my phone doing something quite silly... upgrading to stock firmware using OTA from custom ROM. Yes, I used to be an Iphone user, and with Iphones, a recovery would make the phone stock, no matter what state it was in previously.
Anyways, my HTC One Google play edition now has no OS, and no recovery available. I am also unable to use ADB commands to connect to the phone from my Windows 7 PC. However, if I load up my Linux CENTOS through Vmware (VMplayer), the OS recognizes the phone.
Can anyone provide details on the next steps? I don't care what version OS (stock or custom) the phone is fixed to, I just want to fix it and be able to use it again.
On a side note, I am willing to pay $100 USD (via paypal gift), to whoever can guide me through the process successfully. I can also provide remote desktop connection via Teamviewer or Cisco WebEx, if you prefer to just work on it remotely.
Thanks!
J
Click to expand...
Click to collapse
uninstall all HTC drivers and software, then try these http://forum.xda-developers.com/showthread.php?t=2261088 drivers
Thanks very much for the input everyone, unfortunately I forgot to bring my phone to work today, I will try out all the suggestions at home tonight.
Hope you all have a great day
Okay I've tried all the methods posted above... but still having the same issue.
Although the phone had USB debugging mode enabled before I bricked it, not really sure if it's on now. Also, I read that I need to have S-OFF, but in order to do that, the phone needs to be recognized by the PC.
Anyone know how to install or download ADB to CENTOS Linux? (or any other Linux)? Since the Linux VMware OS recognizes the phone perfectly, I think that's my only chance at pushing a custom recovery and ROM to the phone.
Are you definitely in fastboot when you try to connect in windows? Also, make sure you disable any antivirus and windows firewall, as I have found them to cause connection issues.
HTC One, Unlocked, S-off, Super CID, ARHD ROM, ElementalX Kernel
I'm using Ubuntu Yakkety Yak, 16.10.
According to Android SDK manager: Android SDK Tools v 25.0.3 Android Build Tools v 25.0.2 Android SDK Tools v 25.2.5
My phone is a OnePlus 3t and I'm developing for it for a while, adb works normally, udev rules are configured. I enabled OEM boot, and manage to reboot in a way which looks like to me fastboot. After rebooting to "fastboot" the device's USB id is exactly the same as in normal boot, that's a red flag.
Regular USB ID is Bus 001 Device 024: ID 05c6:676c Qualcomm, Inc.
I get the desired fastboot one when I switch the USB mode to MTP (Bus 001 Device 013: ID 2a70:9011).
My final goal is to unlock my phone ans install TWRP (for DayDream mod). Since fastboot devices doesn't show any device I cannot issue fastboot oem unlock.
Do I need some USB driver for Linux for the MTP mode? The Bus 001 Device 013: ID 2a70:9011 doesn't show any OEM manufacturer string.
This should just work. I don't get it. I'm tearing my hair out.
android.stackexchange.com/questions/169509/why-fastboot-devices-is-empty-on-ubuntu-16-10
android.stackexchange.com/questions/166033/how-to-flash-and-root-oneplus-3t-on-linux?noredirect=1&lq=1
MrCsabaToth said:
I'm using Ubuntu Yakkety Yak, 16.10.
According to Android SDK manager: Android SDK Tools v 25.0.3 Android Build Tools v 25.0.2 Android SDK Tools v 25.2.5
My phone is a OnePlus 3t and I'm developing for it for a while, adb works normally, udev rules are configured. I enabled OEM boot, and manage to reboot in a way which looks like to me fastboot. After rebooting to "fastboot" the device's USB id is exactly the same as in normal boot, that's a red flag.
Regular USB ID is Bus 001 Device 024: ID 05c6:676c Qualcomm, Inc.
I get the desired fastboot one when I switch the USB mode to MTP (Bus 001 Device 013: ID 2a70:9011).
My final goal is to unlock my phone ans install TWRP (for DayDream mod). Since fastboot devices doesn't show any device I cannot issue fastboot oem unlock.
Do I need some USB driver for Linux for the MTP mode? The Bus 001 Device 013: ID 2a70:9011 doesn't show any OEM manufacturer string.
This should just work. I don't get it. I'm tearing my hair out.
android.stackexchange.com/questions/169509/why-fastboot-devices-is-empty-on-ubuntu-16-10
android.stackexchange.com/questions/166033/how-to-flash-and-root-oneplus-3t-on-linux?noredirect=1&lq=1
Click to expand...
Click to collapse
Just OEM unlock from the settings...
domsch1988 said:
Just OEM unlock from the settings...
Click to expand...
Click to collapse
I wish it was that easy. The Settings option is more precisely called "OEM unlocking" with the explanation "allow the bootloader to be unlocked". So it just allows it, but does not do the unlocking itself. I turned this option on. For the unlocking I should issue the fastboot oem unlock command. I did try to install TWRP BTW without it, but obviously it didn't succeed. I need to unlock first, just as other tutorials say. For that I first have to see my phone in the fastboot devices list, which is empty. I'm still tearing my hair out.
MrCsabaToth said:
I wish it was that easy. The Settings option is more precisely called "OEM unlocking" with the explanation "allow the bootloader to be unlocked". So it just allows it, but does not do the unlocking itself. I turned this option on. For the unlocking I should issue the fastboot oem unlock command. I did try to install TWRP BTW without it, but obviously it didn't succeed. I need to unlock first, just as other tutorials say. For that I first have to see my phone in the fastboot devices list, which is empty. I'm still tearing my hair out.
Click to expand...
Click to collapse
Try running
Code:
sudo fastboot devices
casual_kikoo said:
Try running
Code:
sudo fastboot devices
Click to expand...
Click to collapse
Yes, sudo didn't make any difference from the beginning.
Hello,
I too am going crazy trying to get fast boot to work on this OnePlus 3T. My research prior to purchasing indicated that this phone was friendly to rooting. I'm no on hour 6, and still can't get fast boot to work. Using Ubuntu 16.04, and the adb and fastboot packages installed from the standard repositories (apt-get install adb..)
sudo, sudo -s, udev rules, etc. nothing has worked.
If anyone has used this phone and os combination to get the unlocking working, please advise.
I've found out the root cause of my problem. I thought that fastboot is one step further from the "actual" fastboot screen. You have to issue the fastboot commands when you see the screen what is in my android stackexhange link.
So I could unlock the bootloader now, now when I try to flash TWRP I get:
Code:
[email protected]:~/Android/Sdk/platform-tools$ sudo ./fastboot flash recover twrp-3.0.3-1-oneplus3t.img
target reported max download size of 440401920 bytes
sending 'recover' (17588 KB)...
OKAY [ 0.560s]
writing 'recover'...
FAILED (remote: Partition flashing is not allowed)
finished. total time: 0.580s
The USB device I see is
Code:
Bus 001 Device 018: ID 18d1:d00d Google Inc.
and I set up udev rules for it.
Ok, it was just a typo: recover -> recovery
Finally!
Thank you MrCsabaToth!
After 2 more hours trying this following instructions for Windows 7, and OS X (after Ubuntu 16), MrCsabaToth's reply looks to be the way to get past the fastboot oem unlock step.
You have to run it while actually on the phone's boot screen where it gives you options of what type of boot to do, where the top line option is "fast boot". Only then, will the fastboot command from the terminal work.
Not even the oneplus web site tutorial, which is for this exact phone, mentions this. WTF......
Read this whole guide before starting.
This is for the 2nd gen Fire TV Stick (tank)
Current relase: amonet-tank-v1.2.2.zip
NOTE: Recent reports indicate a change that disables brom DL-mode
The change seems to have been introduced with devices that where manufactured in December 2019 or later.
The change is unrelated to the software-version and results in the device not showing up as a USB device when shorted.
Unfortunately these devices cannot currently be unlocked.
NOTE: If you are on version 1.0, don't update to 1.2.1 through TWRP, as there is a bug.
NOTE: This issue has been fixed in version 1.2.2
NOTE: When updating from version 1.0, don't install anything else before rebooting
To update to the current release if you are already unlocked, just flash the zip in TWRP.
What you need:
A Linux installation or live-system
A micro-USB cable
Something conductive (paperclip, tweezers etc)
Something to open the stick.
NOTE: Ideally you want to update your system to 5.2.6.9 before starting this process, since this flashes the 5.2.6.8 boot.img and people have reported issues with adb-authorization with older firmware.
Since version 1.2 this isn't required, because instead of flashing the 5.2.6.9 boot.img, your existing boot.img will be patched.
It is still recommended to first update to 5.2.6.9
Install python3, PySerial, adb and fastboot. For Debian/Ubuntu something like this should work:
Code:
sudo apt update
sudo add-apt-repository universe
sudo apt install python3 python3-serial android-tools-adb android-tools-fastboot
Make sure ModemManager is disabled or uninstalled:
Code:
sudo systemctl stop ModemManager
sudo systemctl disable ModemManager
NOTE: If you have issues running the scripts, you might have to run them using sudo.
Also try using different USB-ports (preferably USB-2.0-ports)
1. Extract the attached zip-file "amonet-tank-v1.2.2.zip" and open a terminal in that directory.
2. start the script:
Code:
./bootrom-step.sh
It should now say Waiting for bootrom.
Short CLK to GND (The metal shielding is also GND) according to the attached photo and plug it in.
NOTE:
In lsusb the boot-rom shows up as:
Code:
Bus 002 Device 013: ID [b]0e8d:0003[/b] MediaTek Inc. MT6227 phone
If it shows up as:
Code:
Bus 002 Device 014: ID [b]0e8d:2000[/b] MediaTek Inc. MT65xx Preloader
instead, you are in preloader-mode, try again.
dmesg lists the correct device as:
Code:
[ 6383.962057] usb 2-2: New USB device found, idVendor=[b]0e8d[/b], idProduct=[b]0003[/b], bcdDevice= 1.00
4. When the script asks you to remove the short, remove the short and press enter.
5. Wait for the script to finish.
If it stalls at some point, stop it and restart the process from step 2.
6. Your device should now reboot into unlocked fastboot state.
7. Run
Code:
./fastboot-step.sh
8. Wait for the device to reboot into TWRP.
9. Use TWRP to flash custom ROM, Magisk etc.
NOTE:
Only ever flash boot/recovery images using TWRP, if you use FlashFire or other methods that are not aware of the exploit,
your device will likely not boot anymore (unless you flashed a signed image).
TWRP will patch recovery/boot-images on the fly.
NOTE:
This process does not disable OTA or does any other modifications to your system.
You will have to do that according to the other guides in this forum.
Very special thanks to @xyz` for making all this possible and putting up with the countless questions I have asked, helping me finish this.
Thanks to @hwmod for doing initial investigations and providing the attached image.
Changelog
Version 1.2 (25.03.2019)
Update TWRP to twrp-9.0 sources
Implement downgrade-protection for LK/PL/TZ
Add scripts to enter fastboot/recovery in case of bootloop
Automatically restore boot-patch when you boot into recovery
Features.
Hacked fastboot mode lets you use all fastboot commands (flash etc).
Boots custom/unsigned kernel-images (need to be patched)
For the devs: sets printk.disable_uart=0 (enables debug-output over UART).
TWRP protects from accidental lk/preloader/tz downgrades
Set bootmode via preloader
NOTE: Hacked fastboot can be reached via TWRP.
NOTE: Hacked fastboot won't patch your boot/recovery-images, so you can easily go back to stock.
Use TWRP for autopatching.
There are three options for interacting with TWRP:
A mouse via USB-OTG
TWRP commandline via adb: https://twrp.me/faq/openrecoveryscript.html
Via /cache/recovery/command
Example for /cache/recovery/command:
Code:
echo "--update_package=/path/to/zipfile" > /cache/recovery/command
echo "--wipe_cache" >> /cache/recovery/command
reboot recovery
Should you somehow end in a bootloop you can boot into hacked fastboot or recovery using.
Code:
sudo ./boot-fastboot.sh
Code:
sudo ./boot-recovery.sh
NOTE:This will only work if the boot-exploit is still there.
Source Code:
https://github.com/chaosmaster/amonet
https://github.com/chaosmaster/android_bootable_recovery
how would you get to twrp after rebooting to system?
krsmit0 said:
how would you get to twrp after rebooting to system?
Click to expand...
Click to collapse
Code:
adb reboot recovery
k4y0z said:
Code:
adb reboot recovery
Click to expand...
Click to collapse
ok, made it to recovery. not sure how to navigate recovery.
krsmit0 said:
ok, made it to recovery. not sure how to navigate recovery.
Click to expand...
Click to collapse
Either via adb shell, or a mouse via USB-OTG
k4y0z said:
Either via adb shell, or a mouse via USB-OTG
Click to expand...
Click to collapse
found this, thanks, didnt know about this
https://twrp.me/faq/openrecoveryscript.html
Oh nice! I'll try it later today!
first one worked fine. second seemed to go ok but i cant get back in with adb. device unauthorized. i went through the process again to get back to recovery and i copied the adb_keys from the one that worked to the other one. permissions and ownership are the same, but it still says unauthorized. i also dont get the prompt to allow connection on the stick itself. i have connected with this stick through adb before this.
UPDATE: Factory reset didnt bring back the adb debug prompt. but an update did. I was on an older version.
krsmit0 said:
first one worked fine. second seemed to go ok but i cant get back in with adb. device unauthorized. i went through the process again to get back to recovery and i copied the adb_keys from the one that worked to the other one. permissions and ownership are the same, but it still says unauthorized. i also dont get the prompt to allow connection on the stick itself. i have connected with this stick through adb before this.
Click to expand...
Click to collapse
Mhh, what Firmware are you on?
Does it still boot normally?
Have you tried adb both over network and USB?
Can you make sure, adb is enabled in developer settings?
If that doesn't help could you try factory reset?
k4y0z said:
Either via adb shell, or a mouse via USB-OTG
Click to expand...
Click to collapse
k4y0z said:
Mhh, what Firmware are you on?
Does it still boot normally?
Have you tried adb both over network and USB?
Can you make sure, adb is enabled in developer settings?
If that doesn't help could you try factory reset?
Click to expand...
Click to collapse
it took an update to resolve it. factory reset didnt work. i was not getting the adb authorization prompt so i couldnt boot to recovery. i have it back up and running.
krsmit0 said:
it took an update to resolve it. factory reset didnt work. i was not getting the adb authorization prompt so i couldnt boot to recovery. i have it back up and running.
Click to expand...
Click to collapse
fastboot-step flashes the 5.2.6.8 boot.img, maybe that was causing an issue with older firmware.
Glad you got it solved. Now we also know updates are working fine (Allthough disabling OTA might not be the worst idea)
The photo has the points labeled but doesn't specify what gets shorted. Are you supposed to short CLK to GND?
AFTVnews.com said:
The photo has the points labeled but doesn't specify what gets shorted. Are you supposed to short CLK to GND?
Click to expand...
Click to collapse
Yes, exactly.
I have updated the OP.
Wow, nice one @k4y0z. I'm so happy this little device can now have an unlocked bootloader; it's going to open up many possibilities on a device that is so inexpensive.
My Firestick 4k bootloops
Sir i have a serious problem with my Firestick 4k. I experimented to sideload google play services on my FS 4k and it installed successfully. But when i restart my device it bootloops on and on to Firestick logo. Any solution sir? Damn i must have not do that. Please sir help me. I think i must hard reset the Firestick 4k but how?
Will the Playing with Fire pack work without any changes?
Any chance a similar exploit can be done on the 1st gen stick (montoya)?
k4y0z said:
Yes, exactly.
I have updated the OP.
Click to expand...
Click to collapse
It looks like there is a test point attached to the trace that looks like it's going to what's labeled as CLK. Is that what you can use to short, or do you have to short the thing you are pointing to?
Have you modified anything, or is this the stock stuff that the original exploit used? Are these .bin files what I would get if I were to compile everything from the github?
Make sure to read this guide completely before starting.
You will lose all data on the tablet, make a backup of important data before you start.
What you need:
- a Linux installation. Don't use a VM! Use a live USB, if you don't have Linux installed, but don't use a virtual machine.
- a microusb cable to connect your tablet to the PC
- (if you go with hw option) some way to open the tablet (pry tool, opening picks, etc)
- (if you go with hw option) something conductive (metal tweezers, a paper clip, a piece of wire, etc)
- (if you go with sw option) mtk-su from https://forum.xda-developers.com/android/development/amazing-temp-root-mediatek-armv8-t3922213
- amonet-mustang.zip from this post
- finalize.zip from this post
- update-kindle-NS6312_user_1827_0002517050244.bin: https://fireos-tablet-src.s3.amazon...ate-kindle-NS6312_user_1827_0002517050244.bin
- Magisk-v19.3.zip: https://github.com/topjohnwu/Magisk/releases/download/v19.3/Magisk-v19.3.zip
Install python3, PySerial, adb and fastboot. For Debian/Ubuntu something like this should work "sudo apt install python3 python3-serial android-tools-adb android-tools-fastboot".
0. Disconnect the tablet and all other Android devices from the PC.
1. Back up whatever important data you have on the device and perform a complete factory reset of the tablet. When going through the initial setup, don't connect to a network (see below on how to do that).
2. Disable or uninstall ModemManager from your Linux installation
3. At this point you need to get your tablet into the bootrom download mode. There are two ways it can be achieved.
a) If your tablet works, you can use the software method (which doesn't require opening the tablet) or the hardware method. Note that if something goes horribly wrong, you might still be required to open up the tablet.
b) If your tablet doesn't boot (bricked), you can only use the hardware method
----------------------------------------------------------------------------------------------------
Software method:
This will get you into bootrom mode by obtaining temporary root and temporarily bricking the device.
1. Download mtk-su from https://forum.xda-developers.com/android/development/amazing-temp-root-mediatek-armv8-t3922213
2. Enable developer mode and USB debugging on the tablet
3. Unzip the mtk-su archive
4. Transfer the executable to your tablet: "adb push arm/mtk-su /data/local/tmp"
5. Run "adb shell"
6. Keep the screen on and run the following commands in the shell on the device:
Code:
cd /data/local/tmp
./mtk-su
getenforce # Just to confirm it says Permissive
echo 0 > /sys/block/mmcblk0boot0/force_ro
dd if=/dev/zero of=/dev/block/mmcblk0boot0 bs=512 count=8
This is the sort of output you should see for that step:
Code:
[email protected]:~/Downloads/mtk-su $ adb shell
mustang:/ $ cd /data/local/tmp
mustang:/data/local/tmp $ ./mtk-su
New UID/GID: 0/0
mustang:/data/local/tmp # getenforce
Permissive
mustang:/data/local/tmp # echo 0 > /sys/block/mmcblk0boot0/force_ro
mustang:/data/local/tmp # dd if=/dev/zero of=/dev/block/mmcblk0boot0 bs=512 count=8
8+0 records in
8+0 records out
4096 bytes transferred in 0.001 secs (4096000 bytes/sec)
mustang:/data/local/tmp #
Don't close the console just yet.
Hardware method:
This will get you into bootrom mode by opening up the tablet and shorting a point to the ground.
1. Shut your device down and disconnect it from USB
2. Use a pry tool to remove the back shell from the tablet. Start at the bottom and work your way up. There are no cables between the back shell and the motherboard.
3. You will need to get something conductive and temporarily connect a point to the ground. A point suggested by @ggow is: https://forum.xda-developers.com/showpost.php?p=79683131&postcount=22. You will need to pop up the metallic shield to access it. Alternatively, there are multiple points on the back of the PCB which also work (marked as CLK/CMD/DAT0).
----------------------------------------------------------------------------------------------------
4. At this point if you went with software method, you should have a root shell open, and if you went with the hardware method you should have a capacitor or a testpoint grounded to the shield.
5. Now, open another terminal on your PC, extract amonet-mustang.zip, navigate to it, and run `sudo ./bootrom-step.sh`. It should print "Waiting for the bootrom".
6.
a) For the software method, you should already have the USB cable plugged in. Type "reboot" in the first terminal (the one you that's running "adb shell"). [If you're trying this for the second time because it didn't work for the first time, you won't have an "adb shell" terminal. In that case, just plugging the USB cable in should be enough.]
b) For the hardware method, ensure the short is applied and then plug in the USB cable.
7. You should see the following device appear in your "dmesg" log:
Code:
[1141765.113884] usb 3-1.4.3.1: USB disconnect, device number 59
[1141783.057101] usb 3-1.4.3.1: new full-speed USB device number 60 using xhci_hcd
[1141783.226498] usb 3-1.4.3.1: New USB device found, idVendor=0e8d, idProduct=0003, bcdDevice= 1.00
[1141783.226502] usb 3-1.4.3.1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[1141783.506877] cdc_acm 3-1.4.3.1:1.0: ttyACM0: USB ACM device
This *must* be the device you see. If you see a "preloader" device instead, your short probably didn't work (for the hw method), or your system inexinexplicably didn't brick (for the sw method). Unplug everything and try again. If the tablet doesn't shut down, you might need to open it up and disconnect the battery.
8. The script should now tell you to remove the short. If you went with hardware method, you do need to remove it first. Otherwise, just press Enter.
9. The script will now proceed to downgrade your device and flash some essential files. Just let it be, it will take about 4 minutes. You should see the following output:
Code:
[2019-06-30 02:48:59.334098] Waiting for bootrom
[2019-06-30 02:50:41.179571] Found port = /dev/ttyACM0
[2019-06-30 02:50:41.180204] Handshake
* * * If you have a short attached, remove it now * * *
* * * Press Enter to continue * * *
[2019-06-30 02:50:49.195782] Init crypto engine
[2019-06-30 02:50:49.214278] Disable caches
[2019-06-30 02:50:49.214801] Disable bootrom range checks
[2019-06-30 02:50:49.229877] Load payload from ../brom-payload/build/payload.bin = 0x46B8 bytes
[2019-06-30 02:50:49.233418] Send payload
[2019-06-30 02:50:49.958957] Let's rock
[2019-06-30 02:50:49.959812] Wait for the payload to come online...
[2019-06-30 02:50:50.904341] all good
[2019-06-30 02:50:50.904714] Check GPT
[2019-06-30 02:50:51.240034] gpt_parsed = {'proinfo': (1024, 6144), 'PMT': (7168, 9216), 'kb': (16384, 2048), 'dkb': (18432, 2048), 'lk': (20480, 2048), 'tee1': (22528, 10240), 'tee2': (32768, 10240), 'metadata': (43008, 80896), 'MISC': (123904, 1024), 'reserved': (124928, 16384), 'boot': (141312, 32768), 'recovery': (174080, 40960), 'system': (215040, 6354944), 'vendor': (6569984, 460800), 'cache': (7030784, 1024000), 'userdata': (8054784, 22722527)}
[2019-06-30 02:50:51.240157] Check boot0
[2019-06-30 02:50:51.485287] Check rpmb
[2019-06-30 02:50:51.695083] Downgrade rpmb
[2019-06-30 02:50:51.696759] Recheck rpmb
[2019-06-30 02:50:52.591407] rpmb downgrade ok
[2019-06-30 02:50:52.837668] Clear preloader 1
[1 / 1]
[2019-06-30 02:50:52.859908] Clear preloader 2
[1 / 1]
[2019-06-30 02:50:52.882059] Flash lk-payload
[4 / 4]
[2019-06-30 02:50:53.214382] Flash tz
[5547 / 5547]
[2019-06-30 02:52:51.150851] Flash lk
[651 / 651]
[2019-06-30 02:53:05.192112] Inject microloader
[4 / 4]
[2019-06-30 02:53:05.524154] Flash preloader
[271 / 271]
[2019-06-30 02:53:11.525329] Restore preloader
[8 / 8]
[2019-06-30 02:53:11.695348] Reboot to unlocked fastboot
If the script freezes at some point, you will have to restart it. Terminate the script, then immediately run `sudo ./bootrom-step.sh` again. The exploit it set up so that after about 40 seconds of inactivity it would reboot your device and drop you back into the bootrom mode, which the script is waiting for. If you cannot restart the process, you might have to open up the tablet and replug the battery to completely power off the device.
10. You should see a success message: "Reboot to unlocked fastboot". Only proceed if you see the message.
11. Once the device boots to fastboot (check with "fastboot devices"; you should also see amazon logo on the screen.), you can run "sudo ./fastboot-step.sh".
12. At this point the device should boot into recovery, however the screen will be off. Just press the power button twice and the screen should turn on.
13. Success! You now have a custom recovery installed that can be accessed by holding down power and volume down (the leftmost) buttons. At this point if you came here from a custom ROM thread you should probably follow the ROM installation instructions. Alternatively, the next steps will detail installing a stock firmware and rooting it with Magisk.
----------------------------------------------------------------------------------------------------
14. We'll now upload required files to the recovery. On your PC, do:
adb push update-kindle-NS6312_user_1827_0002517050244.bin /sdcard/fw.zip
adb push Magisk-v19.3.zip /sdcard
adb push finalize.zip /sdcard
15. In the recovery, go to "Install", navigate to "/sdcard" and flash fw.zip
16. Go to "Wipe" and do the default wipe, then reboot
17. At the Fire setup screen, select your language. On the next screen, Wifi setup, select any password-protected network, then instead of entering the password press "cancel". Now, back at the wifi setup screen, press "Skip setup" and "Skip" in the dialog pop-up again
18. Wait for the update to finish (wait until the updating fire notification disappears)
19. Hold down the power button, press Restart and hold volume down to boot into recovery.
20. In the recovery, go to "Install", navigate to "/sdcard" and flash Magisk-v19.3.zip
21. Press back, select finalize.zip and flash it
22. Once finalize.zip is flashed, press "Reboot System"
VERY IMPORTANT STUFF:
Only ever flash boot images from TWRP. Since nothing but TWRP is aware of the exploit, if you try to flash a boot image from Android, it won't have the exploit integrated into it! This includes Magisk as well, so do NOT install or uninstall it from Magisk Manager (However, installing modules should be fine; although it depends on the specific module).
Due to how the exploit works, it takes over the first 0x400 bytes of boot.img/recovery.img. When flashing zips from the recovery, it will transparently remove and then reinstall the exploit when needed. So long as you flash zips from the recovery, you should treat the boot image normally. However, this means that you cannot use any other apps (e.g. FlashFire) to flash the boot or recovery partitions.
To uninstall the hack and revert back to stock:
- Download an update package to your PC (the update-kindle-NS6312_user_1827_0002517050244.bin file)
- Flash revert-stock-mustang.zip from TWRP
- Perform the default wipe
- Reboot to recovery; you should see amazon recovery now
- Select "apply update from ADB" in the recovery menu
- Run "adb sideload update-kindle-NS6312_user_1827_0002517050244.bin" on your PC
Other misc information / troubleshooting:
- If you need to disconnect the battery, use a pair of tweezers to grab the wires and gently pull towards yourself. You can do bootrom-step.sh either with or without the battery connected, however fastboot-step.sh should be done with the battery connected.
- If your device is bricked (e.g. from a downgrade), just follow the steps as-is.
- If you're getting an error like "Serial protocol mismatch", or any other error in bootrom-step, try disabling or temporarily uninstalling ModemManager from your Linux
- To remount /system as rw use "mount -o rw,remount /system". ("mount -o remount,rw /system" will not work)
Thanks to: aftv2-tools contributors https://gitlab.com/zeroepoch/aftv2-tools: for an implementation of mtk download protocol, @diplomatic for mtk-su, @Michajin for testing the instructions.
Thanks for your work!
On a side note, I also had adaptive storage on during the process. I was having crashing issues after install. I re-installed the firmware-wiped and booted. I followed the steps to boot without setup. Then booted back into TWRP, flashed magisk, but did not flash finalize. I like access to some of the amazon apps. Once I rebooted (I stayed off wi-fi) I sideloaded a package disabler and disabled the OTA. I registered then disabled the amazon bloat I didn't want. I have installed my sd card as portable this time, just to be safe.
also, TWRP does not have backup and restore options, is this normal on this currently?
incredible, i will try that
Thanks. We will look if it's possible to compile LOS 14.1 since it has the same processor as the HD8 2018.
hello @xyz
Do you think i can try that throught a linux virtual machine on virtualbox ?
guizzzmo said:
hello @xyz
Do you think i can try that throught a linux virtual machine on virtualbox ?
Click to expand...
Click to collapse
I unlocked my 7th gen with virtualbox so yes.
Hi guys, Is there a chance there will be a Nexus ROM released for the Mustang version of the Fire? It's been my preferred ROM on my older Ford model so I'd like to keep using it if possible.
tangledweb said:
Hi guys, Is there a chance there will be a Nexus ROM released for the Mustang version of the Fire? It's been my preferred ROM on my older Ford model so I'd like to keep using it if possible.
Click to expand...
Click to collapse
Mustang uses a different kernel than Ford/Austin; custom ROMs will need to be spun up from different sources. Developer time is scarce; may or may not happen.
Finally bricked with software method.
I try to find a picture for where i can make my wire for hardware method.
SOLVED:
My battery was empty so i have just disconnect battery and plug usb with paperclip and i have got bootrom.
Great !!
much thanks for this, after some fiddling it works perfectly!!
i had some issues getting past the bootrom script part on both my galliumos & debian machines (serial error message, despite apt remove modemmanager) - until i tried an xubuntu liveusb, at which point everything went smoothly and as directed via the software method.
looking very forward to an aosp rom to replace stock and being able to make a twrp backup (i broke my install with magisk, but it was a simple recovery just reflashing fw.bin again). cheers!
Is it just me or is the hardware point picture coming up as a dead link? Can someone attach the correct point in another image?
rumblpak said:
Is it just me or is the hardware point picture coming up as a dead link? Can someone attach the correct point in another image?
Click to expand...
Click to collapse
The link (to the hardware shorting point) in the OP is indeed broken.
Try the following :
https://forum.xda-developers.com/showpost.php?p=79683131&postcount=22
Edit : The link in the OP is fixed now. (7/3/2019)
at the point where you issue 'reboot' for the software method. upon issuing that command, the device powers off, and is non responsive. cant get it to turn back on at all. Very strange. Any ideas?
wlewin said:
at the point where you issue 'reboot' for the software method. upon issuing that command, the device powers off, and is non responsive. cant get it to turn back on at all. Very strange. Any ideas?
Click to expand...
Click to collapse
Did the script run correctly? Did you get to the point where is says
* * * If you have a short attached, remove it now * * *
* * * Press Enter to continue * * *
Did you press enter and see the script run? Did it end;
[8 / 8]
[2019-06-30 02:53:11.695348] Reboot to unlocked fastboot
The reboot command puts your device into bootrom to inject the exploit. Upon completion TWRP is installed, i think you have to double click the power button. If all else fails, you might have to pry open and disconnect the battery. Were you in bootrom, because preloader can do this; run lsusb and you should see a phone connection or "dmesg" and you should see this device ;
[1141765.113884] usb 3-1.4.3.1: USB disconnect, device number 59
[1141783.057101] usb 3-1.4.3.1: new full-speed USB device number 60 using xhci_hcd
[1141783.226498] usb 3-1.4.3.1: New USB device found, idVendor=0e8d, idProduct=0003, bcdDevice= 1.00
[1141783.226502] usb 3-1.4.3.1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[1141783.506877] cdc_acm 3-1.4.3.1:1.0: ttyACM0: USB ACM device
Michajin said:
Did the script run correctly? Did you get to the point where is says
* * * If you have a short attached, remove it now * * *
* * * Press Enter to continue * * *
Did you press enter and see the script run? Did it end;
[8 / 8]
[2019-06-30 02:53:11.695348] Reboot to unlocked fastboot
The reboot command puts your device into bootrom to inject the exploit. Upon completion TWRP is installed, i think you have to double click the power button. If all else fails, you might have to pry open and disconnect the battery. Were you in bootrom, because preloader can do this; run lsusb and you should see a phone connection or "dmesg" and you should see this device ;
[1141765.113884] usb 3-1.4.3.1: USB disconnect, device number 59
[1141783.057101] usb 3-1.4.3.1: new full-speed USB device number 60 using xhci_hcd
[1141783.226498] usb 3-1.4.3.1: New USB device found, idVendor=0e8d, idProduct=0003, bcdDevice= 1.00
[1141783.226502] usb 3-1.4.3.1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[1141783.506877] cdc_acm 3-1.4.3.1:1.0: ttyACM0: USB ACM device
Click to expand...
Click to collapse
None of that seems clear in the steps.
the amonet script is in 'waiting for bootrom'. I then issued the reboot command, and the device blacked out, and nothing happened in terminal.
I have since disconnected the battery, and it still doesn't boot at all.
wlewin said:
None of that seems clear in the steps.
the amonet script is in 'waiting for bootrom'. I then issued the reboot command, and the device blacked out, and nothing happened in terminal.
I have since disconnected the battery, and it still doesn't boot at all.
Click to expand...
Click to collapse
My guess is you are bricked stuck in the preloader or something is wrong with your linux, and might have to do the shorting method now. Run lsusb and see if it sees your device, i believe it shows up as a phone. If you see preloader, you will have to short it. otherwise you might have to fix your linux. Make sure modemmanager is uninstalled ... I had issues trying to use ubuntu and ended up using Rasparian.
Michajin said:
My guess is you are bricked stuck in the preloader or something is wrong with your linux, and might have to do the shorting method now. Run lsusb and see if it sees your device, i believe it shows up as a phone. If you see preloader, you will have to short it. otherwise you might have to fix your linux. Make sure modemmanager is uninstalled ... I had issues trying to use ubuntu and ended up using Rasparian.
Click to expand...
Click to collapse
ah ha! Got it sorted. So, the screen going blank was very odd. turns out after sending reboot, that state is two things
1. blank screen with not indication of being powered on
2. persistent through cutting the power (disconnecting battery)
So, seemingly, the devices is totally non-functional. The issue was, in the linux VM I am using, I had to go manually select the USB devices because the identifier changed from the prior Amazon device to a mediatek device. So it was in the right state, I linux just didn't auto connect to the new USB device.
All good the in the hood. continued and worked just fine. Just PSA to others, that boot state seems like the device is just off!
2017 7" tablet too?
Will this work on my Kindle fire 7" 2017 Ed if I update to the latest software version?
Or do I have to buy a new tab to root and install custom roms on?
OP, i think you are linking to the magisk uninstaller in your original post btw. not the installer zip
PowerUser64 said:
Will this work on my Kindle fire 7" 2017 Ed if I update to the latest software version?
Or do I have to buy a new tab to root and install custom roms on?
Click to expand...
Click to collapse
WTF no. 7th gen can be unlocked and rooted. (Also there are ROMS for it: LOS 12.1, AOSP FIRE NEXUS, etc).
https://forum.xda-developers.com/amazon-fire/development/unlock-fire-t3899860