[AT&T] First time rooting on 1.85


Last Updated:

  1. wrchad23

    wrchad23 Well-Known Member

    Is it possible right now? It seems everything says you have to have Bootloader unlocked but to unlock Bootloader you need to be rooted?

    Am I missing something?

    Advertisement
  2. wrchad23

    wrchad23 Well-Known Member

    I've been trying to unlock bootloader and it on the HTC Dev site it gives me an error 160 about my MDI when I run some of the tools out there on my MAC I get.


    ------------------
    MacBook-Pro:SuperCID-OneXL wrchad23$ chmod +x supercid..sh
    MacBook-Pro:SuperCID-OneXL wrchad23$ ./supercid..sh

    This script will give you SuperCID on the HTC One XL
    (the S4 version), which is necessary if you want to
    unlock the bootloader through HTCDev or if you want.
    to install an RUU for a different carrier.

    Although I have taken every precaution to make this script safe,
    I still can't take any responsibility if it bricks your phone!

    Finally, PLEASE make sure you understand the repercussions of
    changing your CID and unlocking your bootloader with HTCDev
    (ie. The unlock will probably void your warranty!)

    If you're still game, press any key to continue...
    Before you begin...
    Disable "fastboot" on the phone under Settings -> Power.
    Enable "USB Debugging" under Settings -> Developer Options.
    Make sure your USB cable is connected.

    When you're ready, press any key to continue...
    ./supercid..sh: line 43: ./adb: cannot execute binary file
    ./supercid..sh: line 44: ./adb: cannot execute binary file
    Copying your misc partition to your sdcard partition...
    ./supercid..sh: line 47: ./adb: cannot execute binary file
    Making a backup copy of the file, just in case...
    ./supercid..sh: line 50: ./adb: cannot execute binary file
    Copying the file to your computer so we can work with it...
    ./supercid..sh: line 53: ./adb: cannot execute binary file
    Making a backup copy here too...
    cp: tmp/mmcblk0p4: No such file or directory
    Converting the image file to text...
    xxd: tmp/mmcblk0p4: No such file or directory
    Checking to see what your CID is now...
    grep: tmp/mmcblk0p4.txt: No such file or directory
    grep: tmp/mmcblk0p4.txt: No such file or directory
    grep: tmp/mmcblk0p4.txt: No such file or directory
    Converting text back to an image file...
    xxd: tmp/mmcblk0p4.modified: No such file or directory
    Let's make sure the new file size matches the original...
    stat: illegal option -- c
    usage: stat [-FlLnqrsx] [-f format] [-t timefmt] [file ...]
    stat: illegal option -- c
    usage: stat [-FlLnqrsx] [-f format] [-t timefmt] [file ...]
    OK, the modified image file is the correct size.
    Pushing the modified image to the phone...
    ./supercid..sh: line 88: ./adb: cannot execute binary file
    Installing the modified partition...
    ./supercid..sh: line 91: ./adb: cannot execute binary file
    Rebooting the phone...
    ./supercid..sh: line 94: ./adb: cannot execute binary file
    OK, your HTC One XL now has SuperCID!

    HUGE thanks to Grankin01 for finding this exploit and same goes
    to all the amazing devs that worked on a solution! I <3 XDA!

Share This Page