Go Back   Android Forums > Android Phones > Samsung Galaxy Nexus > (Verizon) Galaxy Nexus - All Things Root

Like Tree11Likes

test: Reply
 
LinkBack Thread Tools
Old February 19th, 2012, 03:06 PM   #51 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by Paul1201 View Post
scary,

I tried the new script and still no joy (downloaded it after 3:30 EST). I uninstalled and reinstalled all the drivers for Windows, and uninstalled all the apps requiring root except Volume +. Cleared the log in Superuser and went ahead and removed Root Explorer also. When I run the unroot script Superuser is not uninstlled but the phone roboots and the script finishes by prompting me to press any button to continue.

I am starting to think it may be something with the 4.0.4 OTA not allowing this exploit unless you have verified that it works on 4.0.4.
Yeah, I'm guessing that the version of Linux in the kernel has been changed and it that the mempodroid exploit hole has been closed for 4.0.4?

Did you see the new output from the scripts where it tries to list whether the root files are now present (for rooting) or not present (for unrooting)?

The mempodroid exploit binary doesn't report success or failure, so its hard to tell that it works--that's why I added some new lines of code in the script.

Here's the root example output: windows-root-example.txt

Here's the unroot example output: windows-unroot-example.txt

Can you point me to the 4.0.4 OTA you used? If I have time tonight, I'll try installing that myself and see if our suspicions are true.

Thanks!

Advertisements
scary alien is online now  
Reply With Quote
sponsored links
Old February 19th, 2012, 04:54 PM   #52 (permalink)
Member
 
Join Date: Nov 2009
Location: Northern Virginia but from Southeast Ohio
Posts: 143
 
Device(s): Verizon Galaxy Nexus, Motorola Xoom 4G
Carrier: Not Provided

Thanks: 57
Thanked 54 Times in 43 Posts
Default

scary,

I used the file from seanmcnally over at android central. It is post 29 in this thread:

OTA Update IMM30B 4.04 - Page 3 - Android Forums at AndroidCentral.com

I attached a screen capture of the command window after the root script finished. Does that help?
Attached Images
File Type: jpg Root script results.jpg (142.9 KB, 16 views)
Paul1201 is offline  
Reply With Quote
Old February 19th, 2012, 07:48 PM   #53 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by Paul1201 View Post
scary,

I used the file from seanmcnally over at android central. It is post 29 in this thread:

OTA Update IMM30B 4.04 - Page 3 - Android Forums at AndroidCentral.com

I attached a screen capture of the command window after the root script finished. Does that help?
Paul,

Sorry for the delayed reply, I was AFK for a few hours...

Yeah, it certainly looks like the exploit is not invoking the scripts on the phone (notice that after the "running the exploit script..." there's no "remounting /system" which is produced by the script2-root.sh script.

So, that indeed does tell me that the exploit isn't viable for some reason on 4.0.4.

Now, an idea occurred to me that the exploit does indeed work, but the offsets for the exit() function are different and need to be adjusted. I'm not sure I know how to determine this--I'll have to go back and re-read the original root exploit information to see if its a value I can try to determine myself (the prior values that I used were already published for us).

So, we're not totally dead in the water, but we're certainly stymied at the moment.

Let me do some more research and such and I'll get back with you (I'm not likely to discover this tonight, given the semi-later hour ).

Cheers and sorry that the regaining root for 4.0.4 wasn't as straightforward.

I hope I can figure something out for everyone that will continue allowing them to gain root without unlocking your bootloader.

Thanks,
-SA
scary alien is online now  
Reply With Quote
The Following User Says Thank You to scary alien For This Useful Post:
Paul1201 (February 19th, 2012)
Old February 19th, 2012, 08:03 PM   #54 (permalink)
Member
 
Join Date: Nov 2009
Location: Northern Virginia but from Southeast Ohio
Posts: 143
 
Device(s): Verizon Galaxy Nexus, Motorola Xoom 4G
Carrier: Not Provided

Thanks: 57
Thanked 54 Times in 43 Posts
Default

Scary,

No problem. I was at my keyboard for a while and too busy to post so I totally understand. I'll keep watching the thread for any updates.
Paul1201 is offline  
Reply With Quote
The Following User Says Thank You to Paul1201 For This Useful Post:
scary alien (February 19th, 2012)
Old February 19th, 2012, 10:46 PM   #55 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Paul,

I've found something!

I've built and added a new autodetect-gnex-root.zip to the OP.

Try it out and let me know if it works for you (limited testing on my AOKP ROM shows that it works there, some I'm pretty confident it will work for you on 4.0.4!).

Lemme know .

Cheers!
scary alien is online now  
Reply With Quote
Old February 20th, 2012, 05:17 AM   #56 (permalink)
Member
 
Join Date: Nov 2009
Location: Northern Virginia but from Southeast Ohio
Posts: 143
 
Device(s): Verizon Galaxy Nexus, Motorola Xoom 4G
Carrier: Not Provided

Thanks: 57
Thanked 54 Times in 43 Posts
Default

scary,

The new scripts do not seem to work either.
Attached Images
File Type: jpg autodetect unroot script results.jpg (211.6 KB, 10 views)
File Type: jpg autodetect root script results.jpg (160.2 KB, 9 views)
Paul1201 is offline  
Reply With Quote
Old February 20th, 2012, 08:10 AM   #57 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by Paul1201 View Post
scary,

The new scripts do not seem to work either.
Yeah, looks like it...

Its actually getting a little farther with the auto-detect option: you can see that in both screen shots that /system was not able to be remounted as r/w (before, the script2-*.sh script was not even being invoked). So, the exploit is at least launching the script--its just not doing it with superuser/root permissions.

You can see that the su binary has been stripped of its SUID-bit in the permissions field (should be
"-rwsr-sr-x" vs. the "-rwxr-xr-x" you currently have).

Well, I might try to flash back to 4.0.2 stock and then install the 4.0.4 OTA tonight, but I'm thinking that might be a fruitless endeavor since you've done this for me, LOL...

Let me think and research this a little more (there's an IRC chat that one of the exploit researchers has offered-up that I might try to contact him about how to track-down what is happening).

Cheers!
-SA
scary alien is online now  
Last edited by scary alien; March 17th, 2012 at 01:37 PM. Reason: correct permission bit reference
Reply With Quote
The Following User Says Thank You to scary alien For This Useful Post:
Paul1201 (February 20th, 2012)
Old February 20th, 2012, 08:22 AM   #58 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Paul,

Also, I just remembered this, and even though this doesn't help you now since you've applied the 4.0.4 OTA, there's an app called OTA RootKeeper that will save a copy of the su binaries in a protected /system folder. After an OTA is applied, you'll be able to re-root via the app itself because it will use the saved su binary to reapply the su binaries to the proper, normal places.

Anyway, just wanted to throw that out there while I was thinking about it...

-SA
scary alien is online now  
Reply With Quote
The Following 2 Users Say Thank You to scary alien For This Useful Post:
Paul1201 (February 20th, 2012), PhilD (February 20th, 2012)
Old February 20th, 2012, 09:32 AM   #59 (permalink)
Member
 
Join Date: Nov 2009
Location: Northern Virginia but from Southeast Ohio
Posts: 143
 
Device(s): Verizon Galaxy Nexus, Motorola Xoom 4G
Carrier: Not Provided

Thanks: 57
Thanked 54 Times in 43 Posts
Default

Scary,

No problem. I'll wait until I hear from you if you are able to get it working on 4.0.4. If you can't I'll worry about fixing it then. I really wanted to do this without wiping or installing a custom bootloader. Anyhow my phone works and I'm on the leaked OTA so I'm fine for now. If you get it working I'll have to remember that app to preserve root. It might be a good idea to add that app recommendation to the OP for now.
Paul1201 is offline  
Reply With Quote
The Following User Says Thank You to Paul1201 For This Useful Post:
scary alien (February 20th, 2012)
Old February 20th, 2012, 10:02 AM   #60 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by Paul1201 View Post
If you get it working I'll have to remember that app to preserve root. It might be a good idea to add that app recommendation to the OP for now.
Yep! I'm on it [I wish I had remembered it before...]

Cheers and I'll keep working on this as I'm able.

Thanks,
-SA
scary alien is online now  
Reply With Quote
sponsored links
Old February 21st, 2012, 09:45 AM   #61 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Paul (and others, too ),

Just a quick update:

  • I restored back to stock 4.0.2 (again--#17 )
  • rooted w/this method
  • took a Nandroid to save me a little time in the future so I can revert back faster
  • downloaded/installed/ran OTA RootKeeper to save root for future
  • downloaded/installed the 4.0.4 OTA leak
  • took a 4.0.4 Nandroid (via soft-booting CWM)
  • tried the mempodroid exploit and verified that I'm getting the same behavior you were seeing (sh payload runs but isn't rooted)
  • finally regained rooted on 4.0.4 via OTA RootKeeper (works great!)

I launched an IRC chat session with the dev that provided the pre-compiled mempodroid exploit binary to talk with about how to figure-out the offsets we'll need for 4.0.4 (assuming exploit hasn't been patched); no answer last night or so far today.

I'll let you know what I find.

Cheers!
scary alien is online now  
Reply With Quote
The Following User Says Thank You to scary alien For This Useful Post:
Paul1201 (February 21st, 2012)
Old February 21st, 2012, 11:10 AM   #62 (permalink)
Member
 
Join Date: Nov 2009
Location: Northern Virginia but from Southeast Ohio
Posts: 143
 
Device(s): Verizon Galaxy Nexus, Motorola Xoom 4G
Carrier: Not Provided

Thanks: 57
Thanked 54 Times in 43 Posts
Default

No problem Scary. Kind of busy this week but will keep checking in.
Paul1201 is offline  
Reply With Quote
Old February 24th, 2012, 12:50 PM   #63 (permalink)
New Member
 
Join Date: Feb 2012
Posts: 2
 
Device(s):
Carrier: Not Provided

Thanks: 1
Thanked 0 Times in 0 Posts
Default

Quote:
Originally Posted by blackberrycubed View Post
It shows the big droid laying down and then I chose recovery and hit the power button, this brings me to another screen with small droid laying down with red triangle.... at this point no buttons work .... Help!


Edit: Ok I get it, now I am not seeing the update.zip file in there even though it had successfully copied over.... this is weird

Edit: Must have done something wrong, just redid all the steps and now I see the file. Update is being applied.

Thanks for these instructions and help.
This thread has been great and very helpful. I have successfully rooted my Gnex, but am still having trouble getting the 4.0.4 update applied.

I keep getting the small droid laying down after booting to recovery. I verified the update.zip is in /cache before rebooting to recovery. I tried getting into recovery from adb (adb reboot recovery) and from the hardware buttons, but in both cases I get that same icon (I think he is mocking me). There is no option from there and after a few minutes the phone boots normally.

Anyone have any thoughts or ideas what I may be doing wrong?

Thanks.
duperdog is offline  
Reply With Quote
Old February 24th, 2012, 12:56 PM   #64 (permalink)
New Member
 
Join Date: Mar 2010
Posts: 14
 
Device(s):
Carrier: Not Provided

Thanks: 2
Thanked 12 Times in 6 Posts
Default

Quote:
Originally Posted by duperdog View Post
This thread has been great and very helpful. I have successfully rooted my Gnex, but am still having trouble getting the 4.0.4 update applied.

I keep getting the small droid laying down after booting to recovery. I verified the update.zip is in /cache before rebooting to recovery. I tried getting into recovery from adb (adb reboot recovery) and from the hardware buttons, but in both cases I get that same icon (I think he is mocking me). There is no option from there and after a few minutes the phone boots normally.

Anyone have any thoughts or ideas what I may be doing wrong?

Thanks.
When are you at the android laying down, are you pressing the holding the power button and press the volume up to get in to the stock recovery?
diverbelow is offline  
Reply With Quote
The Following 2 Users Say Thank You to diverbelow For This Useful Post:
duperdog (February 24th, 2012), scary alien (February 24th, 2012)
Old February 24th, 2012, 02:57 PM   #65 (permalink)
New Member
 
Join Date: Feb 2012
Posts: 2
 
Device(s):
Carrier: Not Provided

Thanks: 1
Thanked 0 Times in 0 Posts
Default

Quote:
Originally Posted by diverbelow View Post
When are you at the android laying down, are you pressing the holding the power button and press the volume up to get in to the stock recovery?
Would help if I followed all of the directions wouldn't it? Thanks for the quick response, update is installing now.
duperdog is offline  
Reply With Quote
Old February 24th, 2012, 03:23 PM   #66 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

By the way, I've been in contact with saurik (Jay Freeman) re. determining the hex offsets for ICS 4.0.4 so that we'll be able to root it without also having to unlock the bootloader (I'm waiting on a reply from him, but also pursuing this information myself).

If you root in 4.0.2 with this method and wish to retain root in 4.0.4 (i.e., after accepting or installing the 4.0.4 OTA), then use OTA RootKeeper for now until we have/know the new hex offsets for the mempodroid exploit.

I'll update here when I found things out.

Thanks!
scary alien is online now  
Reply With Quote
The Following User Says Thank You to scary alien For This Useful Post:
Paul1201 (February 24th, 2012)
Old February 24th, 2012, 04:40 PM   #67 (permalink)
Member
 
Join Date: Nov 2009
Location: Northern Virginia but from Southeast Ohio
Posts: 143
 
Device(s): Verizon Galaxy Nexus, Motorola Xoom 4G
Carrier: Not Provided

Thanks: 57
Thanked 54 Times in 43 Posts
Default

Scary,

Awesome to hear that.
Paul1201 is offline  
Reply With Quote
Old February 24th, 2012, 07:14 PM   #68 (permalink)
Junior Member
 
eagle nexus's Avatar
 
Join Date: Feb 2012
Posts: 29
 
Device(s):
Carrier: Not Provided

Thanks: 3
Thanked 2 Times in 2 Posts
Smile Kind of Confused

Hi Scary! I'm kind of confused on step 4 for mac. Can you explain it to me better?
eagle nexus is offline  
Reply With Quote
Old February 24th, 2012, 07:22 PM   #69 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by eagle nexus View Post
Hi Scary! I'm kind of confused on step 4 for mac. Can you explain it to me better?
Welcome to the AndroidForums, eagle nexus!

I'll try--I don't have a Mac, but I know is a Linux/Unix-type system...

You're talking about the part where is says to "cd" (change directory), right?

So, I think you would start-up a Terminal session and then find / navigate to the folder where you extracted the contents of the .zip file.

I don't know too much about the Terminal session in the Mac world, but you would download and extract the .zip to a known folder location (say "/home/downloads" (I believe it should extract to the "simple-gnex-root-unroot" subfolder)), then startup your Terminal session, and type "cd /home/downloads/simple-gnex-root-unroot" before proceeding with step #5.

Does that help / make sense?

Apologies for not being more Mac-savvy...

Let me know .

Cheers!
scary alien is online now  
Reply With Quote
Old February 24th, 2012, 08:28 PM   #70 (permalink)
Junior Member
 
eagle nexus's Avatar
 
Join Date: Feb 2012
Posts: 29
 
Device(s):
Carrier: Not Provided

Thanks: 3
Thanked 2 Times in 2 Posts
Default

Quote:
Originally Posted by scary alien View Post
Welcome to the AndroidForums, eagle nexus!

I'll try--I don't have a Mac, but I know is a Linux/Unix-type system...

You're talking about the part where is says to "cd" (change directory), right?

So, I think you would start-up a Terminal session and then find / navigate to the folder where you extracted the contents of the .zip file.

I don't know too much about the Terminal session in the Mac world, but you would download and extract the .zip to a known folder location (say "/home/downloads" (I believe it should extract to the "simple-gnex-root-unroot" subfolder)), then startup your Terminal session, and type "cd /home/downloads/simple-gnex-root-unroot" before proceeding with step #5.

Does that help / make sense?

Apologies for not being more Mac-savvy...

Let me know .

Cheers!
I typed in "cd /home/downloads/simple-gnex-root-unroot" and pressed enter. It just said, "No such file or directory". Thank you for taking your time to read this.
eagle nexus is offline  
Reply With Quote
sponsored links
Old February 24th, 2012, 08:31 PM   #71 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by eagle nexus View Post
I typed in "cd /home/downloads/simple-gnex-root-unroot" and pressed enter. It just said, "No such file or directory". Thank you for taking your time to read this.
Oh, sorry...that was just an example directory name that I made up...your directory (folder) name will depend on where you downloaded and extracted the .zip file.

When you download the .zip file, can you identify where its located?

Then, if you extract it, can you tell where it gets extracted to?
scary alien is online now  
Reply With Quote
Old February 24th, 2012, 08:37 PM   #72 (permalink)
Junior Member
 
eagle nexus's Avatar
 
Join Date: Feb 2012
Posts: 29
 
Device(s):
Carrier: Not Provided

Thanks: 3
Thanked 2 Times in 2 Posts
Default

Quote:
Originally Posted by scary alien View Post
Oh, sorry...that was just an example directory name that I made up...your directory (folder) name will depend on where you downloaded and extracted the .zip file.

When you download the .zip file, can you identify where its located?

Then, if you extract it, can you tell where it gets extracted to?
It automatically unzips the file. Right now, i have the unzipped folder on my desktop. Would that be "cd /home/desktop/simple-gnex-root-unroot"?
eagle nexus is offline  
Reply With Quote
Old February 24th, 2012, 08:41 PM   #73 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by eagle nexus View Post
It automatically unzips the file. Right now, i have the unzipped folder on my desktop. Would that be "cd /home/desktop/simple-gnex-root-unroot"?
If that's the path where the file were extracted to, then yes sir!

Let me know!
scary alien is online now  
Reply With Quote
Old February 24th, 2012, 08:54 PM   #74 (permalink)
Junior Member
 
eagle nexus's Avatar
 
Join Date: Feb 2012
Posts: 29
 
Device(s):
Carrier: Not Provided

Thanks: 3
Thanked 2 Times in 2 Posts
Default

Quote:
Originally Posted by scary alien View Post
If that's the path where the file were extracted to, then yes sir!

Let me know!
I found that the path of the file is actually "/Users/patrickutz/Desktop". What should I type in terminal now?
eagle nexus is offline  
Reply With Quote
Old February 24th, 2012, 08:58 PM   #75 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by eagle nexus View Post
I found that the path of the file is actually "/Users/patrickutz/Desktop". What should I type in terminal now?
Well, the contents of the .zip file contain a folder with the same name (i.e., "simple-gnex-root-unroot"), so you'll probably have to type (in the Terminal window):

Code:
cd /Users/patrickutz/Desktop/simple-gnex-root-unroot
scary alien is online now  
Reply With Quote
Old February 24th, 2012, 09:06 PM   #76 (permalink)
Junior Member
 
eagle nexus's Avatar
 
Join Date: Feb 2012
Posts: 29
 
Device(s):
Carrier: Not Provided

Thanks: 3
Thanked 2 Times in 2 Posts
Default

Quote:
Originally Posted by scary alien View Post
Well, the contents of the .zip file contain a folder with the same name (i.e., "simple-gnex-root-unroot"), so you'll probably have to type (in the Terminal window):

Code:
cd /Users/patrickutz/Desktop/simple-gnex-root-unroot
I typed typed it in and now says, "new-host-4:simple-gnex-root-unroot patrickutz$". Is that correct? Do I now just type in, ". ./root-unroot-for-linux-osx.sh", and press enter?
eagle nexus is offline  
Reply With Quote
Old February 24th, 2012, 09:16 PM   #77 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by eagle nexus View Post
I typed typed it in and now says, "new-host-4:simple-gnex-root-unroot patrickutz$". Is that correct? Do I now just type in, ". ./root-unroot-for-linux-osx.sh", and press enter?
I hope/think so...that looks like a Unix prompt (i.e., where the prompt includes your current folder's name) and the "$" portion is a standard shell prompt.

You might be prompted with your administrator (root) password for your system (that's to make sure the adb-daemon is started-up with the proper permissions).
scary alien is online now  
Reply With Quote
Old February 24th, 2012, 09:21 PM   #78 (permalink)
Junior Member
 
eagle nexus's Avatar
 
Join Date: Feb 2012
Posts: 29
 
Device(s):
Carrier: Not Provided

Thanks: 3
Thanked 2 Times in 2 Posts
Smile

Quote:
Originally Posted by scary alien View Post
I hope/think so...that looks like a Unix prompt (i.e., where the prompt includes your current folder's name) and the "$" portion is a standard shell prompt.

You might be prompted with your administrator (root) password for your system (that's to make sure the adb-daemon is started-up with the proper permissions).
One last question, should the phone be on recovery mode, or can you just leave it on one of your home screens? Also, this does not wipe any of your phone's data, right? Thank you for all the help!
eagle nexus is offline  
Reply With Quote
Old February 24th, 2012, 09:25 PM   #79 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by eagle nexus View Post
One last question, should the phone be on recovery mode, or can you just leave it on one of your home screens? Also, this does not wipe any of your phone's data, right? Thank you for all the help!
It should work just fine while your booted-up in normal Android--as long as you've got USB debugging enabled.

Assuming all goes right, it will reboot your phone after it installs the root binaries.

No, it does not delete your phone's data--it simply pushes some work files to the /data/local directory, installs the su and Superuser.apk in the /system folder, and then cleans-up after itself (i.e., deletes the work files from /data/local).
scary alien is online now  
Reply With Quote
Old February 24th, 2012, 09:40 PM   #80 (permalink)
Junior Member
 
eagle nexus's Avatar
 
Join Date: Feb 2012
Posts: 29
 
Device(s):
Carrier: Not Provided

Thanks: 3
Thanked 2 Times in 2 Posts
Default

Quote:
Originally Posted by scary alien View Post
It should work just fine while your booted-up in normal Android--as long as you've got USB debugging enabled.

Assuming all goes right, it will reboot your phone after it installs the root binaries.

No, it does not delete your phone's data--it simply pushes some work files to the /data/local directory, installs the su and Superuser.apk in the /system folder, and then cleans-up after itself (i.e., deletes the work files from /data/local).
After typing root and pressing enter, this popped up, "-bash: typeset: -l: invalid option
typeset: usage: typeset [-afFirtx] [-p] name[=value] ...
-bash: ./root-unroot-for-linux-osx.sh: line 45: syntax error in conditional expression: unexpected token `('
-bash: ./root-unroot-for-linux-osx.sh: line 45: syntax error near `@(r'
-bash: ./root-unroot-for-linux-osx.sh: line 45: `if [[ "$function" = @(root|unroot) ]]; then'
new-host-4:simple-gnex-root-unroot patrickutz$". What should I type in next?
eagle nexus is offline  
Reply With Quote
sponsored links
Old February 24th, 2012, 09:50 PM   #81 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by eagle nexus View Post
After typing root and pressing enter, this popped up, "-bash: typeset: -l: invalid option
typeset: usage: typeset [-afFirtx] [-p] name[=value] ...
-bash: ./root-unroot-for-linux-osx.sh: line 45: syntax error in conditional expression: unexpected token `('
-bash: ./root-unroot-for-linux-osx.sh: line 45: syntax error near `@(r'
-bash: ./root-unroot-for-linux-osx.sh: line 45: `if [[ "$function" = @(root|unroot) ]]; then'
new-host-4:simple-gnex-root-unroot patrickutz$". What should I type in next?
Hmm, I don't exactly know...you're clearly running the script I wrote and it runs from the bash shell in Linux (Ubuntu 10.x) just fine...that script was actually modeled after one that I saw that was written by Dan Rosenberg (although I'll admit his was much simpler than mine in some ways) and it was for both Linux and Mac systems.

Since the script doesn't appear to be working for you and I won't have access to a Mac for at least another couple of weeks when my daughter comes home from college, you could try to do things manually. The manual process is documented in the first post underneath a couple of "Show" buttons (hide tags) in the "Original Thread Content" section.

Sorry that the script doesn't work for you, but it would be very difficult for me to debug it for you Mac system without having direct access to it (LOL, it was hard-enough on my laptop )--but all the pieces are there for you to try it manually if you are so inclined.

Good luck!
scary alien is online now  
Reply With Quote
The Following User Says Thank You to scary alien For This Useful Post:
eagle nexus (February 24th, 2012)
Old February 24th, 2012, 09:58 PM   #82 (permalink)
Junior Member
 
eagle nexus's Avatar
 
Join Date: Feb 2012
Posts: 29
 
Device(s):
Carrier: Not Provided

Thanks: 3
Thanked 2 Times in 2 Posts
Default

Thank you so much for trying to help me root my gnex. I think I'll just wait until you can fix it by gaining access to a macbook

Again, thank you!!!!!
eagle nexus is offline  
Reply With Quote
Old February 26th, 2012, 12:48 PM   #83 (permalink)
New Member
 
Join Date: Sep 2010
Posts: 4
 
Device(s):
Carrier: Not Provided

Thanks: 1
Thanked 4 Times in 2 Posts
Default

Eagle, this should work in Mac OS... I changed it to work on mine.

Code:
echo 
echo "# =========================================================================="
echo "# Samsung Galaxy Nexus Simple Root by AndroidForums 'scary alien'"
echo "#"
echo "# Written for and tested on Samsung Galaxy Nexus running stock Android 4.0.2"
echo "#"
echo "# This script will install the root binaries (su, Superuser.apk) on an"
echo "# unrooted GNex without needing to unlock the bootloader"
echo "#"
echo "# For additional details, credits, etc., please visit:"
echo "#"
echo "# http://androidforums.com/verizon-galaxy-nexus-all-things-root/499117-root-gnex-without-unlocking-bootloader-yep.html"
echo "#"
echo "# Instructions:"
echo "#"
echo "# 1) Make sure you have the adb USB device drivers installed"
echo "#"
echo "# 2) Make sure you have USB debugging enabled on your phone"
echo "#"
echo "# 3) Connect your phone and computer via your USB cable"
echo "#"
echo "# 4) Run this script from the same directory where the rest of the"
echo "#    files from the extracted .zip file are located"
echo "#"
echo "# =========================================================================="
echo "#"
systype=$(uname)   # what kind of system are we running?
if [[ "$systype" = "powerpc" ]]; then
 echo " *** Sorry, don't think this script will work on a PowerPC system"
 echo
 return 1
fi

if [[ "$systype" = "Darwin" ]]; then    # are we a Mac?
 adb="./adb-mac"
else
 adb="./adb-linux"     # must be Linux
fi
 
chmod a+x $adb    # make sure adb is executable

echo "Would you like to 'root' or 'unroot' your Galaxy Nexus?"
read answer
function="$answer"
if [[ "$function" = "root" || "$function" = "unroot" ]]; then
 noop=1    # good answer
else
 echo " *** Sorry, I don't understand '$answer' as an option"
 echo "     Please try again and respond with either 'root' or 'unroot'."
 echo
 exit 0
fi

echo
echo "Press the <enter> key to $function your Galaxy Nexus"
read -n 1 -s      # pause / wait for confirmation to continue
echo "[*] securing the adb utility..."
echo "#"
echo "[*] waiting for adb USB connectivity to your device"
sudo $adb wait-for-device
echo "#"
echo "[*] connectivity established! here we go! :)"
echo "#"
echo "[*] pushing our binaries and scripts over to the phone..."
$adb push mempodroid /data/local/mempodroid     # we need this to gain temporary root access
$adb push script1-${function}.sh /data/local/script1-${function}.sh
$adb push script2-${function}.sh /data/local/script2-${function}.sh
$adb shell chmod 777 /data/local/script1-${function}.sh
$adb shell chmod 777 /data/local/script2-${function}.sh
$adb shell chmod 777 /data/local/mempodroid

if [[ "$function" = "root" ]]; then
 $adb push su /data/local/su
 $adb push Superuser.apk /data/local/Superuser.apk
 echo "#"
 echo "[*] securing work files..."
 echo "#"
 echo "[*] rooting the phone..."
 $adb shell sh /data/local/script1-${function}.sh
 echo "#"
 echo "[*] cleaning-up /data/local..."
 $adb shell rm /data/local/su
 $adb shell rm /data/local/Superuser.apk
 echo "[*] rebooting your phone"
 $adb reboot
 echo "[*] waiting for reboot to complete"
 $adb wait-for-device
 echo "#"
 echo "# Congratulations, your GNex has just been rooted :)"
 echo "#"
 echo "# Use your new root powers carefully and wisely."
 echo "#"
fi
if [[ "$function" = "unroot" ]]; then
 echo "[*] un-rooting the phone..."
 $adb shell sh /data/local/script1-${function}.sh
 echo "[*] rebooting your phone"
 $adb reboot
 echo "[*] waiting for reboot to complete"
 $adb wait-for-device
 echo "#"
 echo
 echo "# your GNex has been un-rooted."
 echo
fi
echo "# final clean-up..."
$adb shell rm /data/local/mempodroid
$adb shell rm /data/local/script1-${function}.sh
$adb shell rm /data/local/script2-${function}.sh
echo
echo "# --- all done ---"
$adb kill-server
Now, if only I had read the post completely before rooting and installing 4.0.4. PLEASE remember to install the root keeper app as mentioned in the first post as this exploit doesn't work as-is in 4.0.4! I really hope the exploit still exists in 4.0.4 and someone can get the offsets needed, as I want root back for other shenanigans. Root will help ease the pain later when/if I decide to unlock the bootloader.
onfire4g05 is offline  
Reply With Quote
The Following 2 Users Say Thank You to onfire4g05 For This Useful Post:
eagle nexus (March 2nd, 2012), scary alien (February 26th, 2012)
Old February 26th, 2012, 12:59 PM   #84 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by onfire4g05 View Post
Eagle, this should work in Mac OS... I changed it to work on mine.

<code snipped>

Now, if only I had read the post completely before rooting and installing 4.0.4. PLEASE remember to install the root keeper app as mentioned in the first post as this exploit doesn't work as-is in 4.0.4! I really hope the exploit still exists in 4.0.4 and someone can get the offsets needed, as I want root back for other shenanigans. Root will help ease the pain later when/if I decide to unlock the bootloader.
onfire4g05,

That is awesome! Thank you for that .

If you don't mind, I'd like to update the .zip package to include your code (after I compare it to see what the differences and issues were, of course).

By the way, little update on the 4.0.4 root efforts: I was able to identify what I believe the proper offsets were for the 4.0.4 ICS on the GNex--unfortunately, they didn't work for me .

I'm still waiting to hear back from saurik regarding whether or not I've identified the proper offsets or not (I'm expecting he'll try to identify them himself like he did for 4.0.2). If he does and it still doesn't achieve root, then it might be the case that the exploit has been patched in 4.0.4 ().

I'll keep you all posted, of course.

Thanks again!
scary alien is online now  
Reply With Quote
Old February 26th, 2012, 01:11 PM   #85 (permalink)
New Member
 
Join Date: Sep 2010
Posts: 4
 
Device(s):
Carrier: Not Provided

Thanks: 1
Thanked 4 Times in 2 Posts
Default

Sure! I don't mind you doing that. :-) I got in the IRC and asked him for the offsets myself... waiting to hear back.

Do you mind posting the offsets you tried?
onfire4g05 is offline  
Reply With Quote
Old February 26th, 2012, 01:19 PM   #86 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by onfire4g05 View Post
Sure! I don't mind you doing that. :-) I got in the IRC and asked him for the offsets myself... waiting to hear back.

Do you mind posting the offsets you tried?
Not at all:

4.0.2 offsets (kindly provided by saurik): 0xd7f4 0xad4b

4.0.4 offsets (speculation on my part): 0xd7cc 0xad27

I didn't post them here because they didn't work for me and I didn't want to get anyone's hopes up.

Thank you for posting on the IRC area, too--hopefully, Jay will respond to one of us (I've exchanged a few emails with him, too, but he's indicated much prefers IRC--which is strange because he's never responded to me via IRC ).

Let me know if you have any luck (perhaps you'll have more success with a freshly-booted device (I tried many offsets prior to identifying the ones above--maybe that affected it somehow?)).

Cheers!
scary alien is online now  
Reply With Quote
Old February 26th, 2012, 02:48 PM   #87 (permalink)
New Member
 
Join Date: Sep 2010
Posts: 4
 
Device(s):
Carrier: Not Provided

Thanks: 1
Thanked 4 Times in 2 Posts
Default

Jay confirmed through IRC that they are the same as Nexux S (the same you used).

0xd7cc 0xad27

It isn't working for me either though, so I'm guessing Google may have patched the kernel.
onfire4g05 is offline  
Reply With Quote
The Following 2 Users Say Thank You to onfire4g05 For This Useful Post:
Paul1201 (February 26th, 2012), scary alien (February 26th, 2012)
Old February 26th, 2012, 03:04 PM   #88 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by onfire4g05 View Post
Jay confirmed through IRC that they are the same as Nexux S (the same you used).

0xd7cc 0xad27

It isn't working for me either though, so I'm guessing Google may have patched the kernel.
Wow, I hadn't noticed that...I'll try to extract the run-as binary from Nexus S 4.0.3 image and compare to the GNex 4.0.4 version (I'm guessing they'll be identical, but that does beg the question (to me at least), why doesn't this work on the GNex? -- unless the exploit hole was indeed patched ).

Glad he responded to you and thanks for the feedback!
scary alien is online now  
Reply With Quote
The Following User Says Thank You to scary alien For This Useful Post:
Paul1201 (February 26th, 2012)
Old February 26th, 2012, 05:36 PM   #89 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Okay guys, I did a little test to help confirm that the mempodipper exploit is indeed closed in 4.0.4 .

I installed the 4.0.2 run-as file in my 4.0.4 setup and was unable to achieve root with the mempodroid utility provided by saurik.

Nothing FC'd or anything for me in 4.0.4 with the 4.0.2 run-as file installed, but since I couldn't gain root, to me, that does confirm that the exploit has been closed in 4.0.4.

So, for now, it looks like if you want to get root with 4.0.4 (or higher), you'll need to carry root with you via OTA RootKeeper or root the traditional way via unlocking your bootloader, etc.

-SA
scary alien is online now  
Reply With Quote
The Following User Says Thank You to scary alien For This Useful Post:
onfire4g05 (February 26th, 2012)
Old February 27th, 2012, 05:54 AM   #90 (permalink)
Member
 
Join Date: Nov 2009
Location: Northern Virginia but from Southeast Ohio
Posts: 143
 
Device(s): Verizon Galaxy Nexus, Motorola Xoom 4G
Carrier: Not Provided

Thanks: 57
Thanked 54 Times in 43 Posts
Default

Just wanted to let everyone know that I restored to stock 4.0.2 and then rerooted using this script. I then installed OTA Rootkeeper and Root Explorer. Made sure OTA Rootkeeper was functioning and then reinstalled the 4.0.4 update by using Root Explorer to copy the file into the /cache partition after renaming it to update.zip and going into stock recovery. After the update completed I opened OTA Rootkeeper to reroot and then installed Titanium Backup. So I am finally where I wanted to be but with an unlocked bootloader and the knowledge how to restore to stock if needed.

Thanks again scary for all your help both here and in private messaging.
Paul1201 is offline  
Reply With Quote
The Following User Says Thank You to Paul1201 For This Useful Post:
scary alien (February 27th, 2012)
sponsored links
Old February 27th, 2012, 07:51 PM   #91 (permalink)
Junior Member
 
eagle nexus's Avatar
 
Join Date: Feb 2012
Posts: 29
 
Device(s):
Carrier: Not Provided

Thanks: 3
Thanked 2 Times in 2 Posts
Default

Should the verizon galaxy nexus already have received the ota 4.0.3 update? Mine is still 4.0.2 and i didn't root it yet (not enough time)
eagle nexus is offline  
Reply With Quote
Old February 27th, 2012, 07:54 PM   #92 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by eagle nexus View Post
Should the verizon galaxy nexus already have received the ota 4.0.3 update? Mine is still 4.0.2 and i didn't root it yet (not enough time)
I haven't heard that there's been an official OTA yet...for 4.0.3 or for what I'm guessing might actually be 4.0.4. I wouldn't think that it would be too much longer given how long the 4.0.4 leak has been out.

Cheers!
scary alien is online now  
Reply With Quote
Old March 2nd, 2012, 08:58 AM   #93 (permalink)
Member
 
Join Date: Nov 2011
Posts: 310
 
Device(s):
Carrier: Not Provided

Thanks: 566
Thanked 482 Times in 177 Posts
Send a message via AIM to lickwidravr
Default

Well, i would like to report that i am a major noob at rooting/unrooting/flashing/romming/blah blah blah. LOL. Well i took the plunge to root without unlocking given here by scary alien......thank you so much. My main priority was to test out 4.0.4 and see how the new radios work out. In my area i am on the border of good/bad service so i've had major battery issues in regards to that. I was skeptical to originally unlock the bootloader, then root, then update because i didn't want to wipe the SD by unlocking.

Thanks to this method, that wasn't needed. I rooted (extremely easy using the .bat, literally took 30 seconds and couldn't be easier), downloaded CWM, flashed recovery, copied the update to the sd, booted to recovery and updated.

The phone is finishing a reboot after updating and i'll report anything i find.

I cannot thank you enough Scary Alien!!!!!! :-)
lickwidravr is offline  
Reply With Quote
The Following User Says Thank You to lickwidravr For This Useful Post:
scary alien (March 2nd, 2012)
Old March 2nd, 2012, 09:20 AM   #94 (permalink)
New Member
 
Join Date: Mar 2010
Posts: 14
 
Device(s):
Carrier: Not Provided

Thanks: 2
Thanked 12 Times in 6 Posts
Default

Quote:
Originally Posted by eagle nexus View Post
Should the verizon galaxy nexus already have received the ota 4.0.3 update? Mine is still 4.0.2 and i didn't root it yet (not enough time)
4.0.3 is to bring tablets and Nexus S to current.

Now, if you want to bring your phone to 4.0.4 without rooting. Here is how I got 4.0.4 on my GN modifying some steps that SA first posted.
diverbelow is offline  
Reply With Quote
The Following User Says Thank You to diverbelow For This Useful Post:
scary alien (March 2nd, 2012)
Old March 2nd, 2012, 07:53 PM   #95 (permalink)
Junior Member
 
eagle nexus's Avatar
 
Join Date: Feb 2012
Posts: 29
 
Device(s):
Carrier: Not Provided

Thanks: 3
Thanked 2 Times in 2 Posts
Default

Before I attempt to root my phone again, one quick question, does this method also unlock the boot loader (without wiping data)? Also, I heard (in some forum) that if you root your phone without unlocking the boot loader, you can't flash custom roms.
eagle nexus is offline  
Reply With Quote
Old March 2nd, 2012, 08:10 PM   #96 (permalink)
Junior Member
 
eagle nexus's Avatar
 
Join Date: Feb 2012
Posts: 29
 
Device(s):
Carrier: Not Provided

Thanks: 3
Thanked 2 Times in 2 Posts
Default

I tried rooting my phone again but this popped up:"Would you like to 'root' or 'unroot' your Galaxy Nexus?
root
-bash: typeset: -l: invalid option
typeset: usage: typeset [-afFirtx] [-p] name[=value] ...
-bash: ./root-unroot-for-linux-osx.sh: line 45: syntax error in conditional expression: unexpected token `('
-bash: ./root-unroot-for-linux-osx.sh: line 45: syntax error near `@(r'
-bash: ./root-unroot-for-linux-osx.sh: line 45: `if [[ "$function" = @(root|unroot) ]]; then'
new-host-4:simple-gnex-root-unroot patrickutz$"
eagle nexus is offline  
Reply With Quote
Old March 2nd, 2012, 08:58 PM   #97 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by eagle nexus View Post
Before I attempt to root my phone again, one quick question, does this method also unlock the boot loader (without wiping data)? Also, I heard (in some forum) that if you root your phone without unlocking the boot loader, you can't flash custom roms.
No, this method does NOT unlock the bootloader--that's the beauty of it!

Having a locked bootloader prevents you from using fastboot to flash or soft-boot an image.

I hadn't really thought about whether it keeps you from flashing a custom ROM, but lickwidravr's post above says that it doesn't prevent you--and this rings true to me since I believe ROM Manager (lickwidravr said "CWM", but I think he meant ROM Manager was what he downloaded) uses flash_image to overwrite (flash) the recovery partition.

I'll double-check all of this and get back with you...

Quote:
Originally Posted by eagle nexus View Post
I tried rooting my phone again but this popped up:"Would you like to 'root' or 'unroot' your Galaxy Nexus?
root
-bash: typeset: -l: invalid option
typeset: usage: typeset [-afFirtx] [-p] name[=value] ...
-bash: ./root-unroot-for-linux-osx.sh: line 45: syntax error in conditional expression: unexpected token `('
-bash: ./root-unroot-for-linux-osx.sh: line 45: syntax error near `@(r'
-bash: ./root-unroot-for-linux-osx.sh: line 45: `if [[ "$function" = @(root|unroot) ]]; then'
new-host-4:simple-gnex-root-unroot patrickutz$"
eagle nexus, see the above post #83 by onfire4g05 (Galaxy Nexus root / un-root without unlocking bootloader) re. his tweaked version of the root-unroot-for-linux-osx.sh script.

Apologies for not getting the .zip package update to include his script...I'll do that now (or you can just copy and paste his script if you don't want to wait).

I'll probably have to separate the Linux script from the Mac script since the bash shell clearly doesn't like me using the typeset option in my scripts.

I'll update the first post, too for the instructions.

Give me a little bit and I'll bump the thread when I've finished updating it.

Thanks!
scary alien is online now  
Reply With Quote
The Following User Says Thank You to scary alien For This Useful Post:
lickwidravr (March 4th, 2012)
Old March 2nd, 2012, 09:03 PM   #98 (permalink)
Junior Member
 
eagle nexus's Avatar
 
Join Date: Feb 2012
Posts: 29
 
Device(s):
Carrier: Not Provided

Thanks: 3
Thanked 2 Times in 2 Posts
Default

Thank you, i'll wait until you update .zip file, I'm too noob to understand his script. Must learn more about script and programming.
eagle nexus is offline  
Reply With Quote
Old March 2nd, 2012, 09:31 PM   #99 (permalink)
not really so scary
Thread Author (OP)
 
scary alien's Avatar
 
Join Date: Mar 2010
Location: Indy
Posts: 17,468
 
Device(s): LG Nexus 5, Samsung Galaxy Nexus, Asus Nexus 7, Moto Droid X, HTC Droid Eris
Carrier: T-Mobile

Thanks: 33,032
Thanked 15,044 Times in 7,385 Posts
Default

Quote:
Originally Posted by eagle nexus View Post
Thank you, i'll wait until you update .zip file, I'm too noob to understand his script. Must learn more about script and programming.
No problem!

Okay, I've updated the first post to include onfire4g05's version of the shell script for Mac/OSX: root-unroot-for-mac-osx.sh.

Check it out and let me know...

I'm still working on your bootloader questions...I'm pretty sure that lickwidravr was spot-on, but it's good to have personal experience and confirmation .

Cheers!
scary alien is online now  
Reply With Quote
Old March 2nd, 2012, 10:03 PM   #100 (permalink)
Junior Member
 
eagle nexus's Avatar
 
Join Date: Feb 2012
Posts: 29
 
Device(s):
Carrier: Not Provided

Thanks: 3
Thanked 2 Times in 2 Posts
Default

Successfully rooted! Thank you soooooooooooooooo much!!!!!!!!!!!!
eagle nexus is offline  
Reply With Quote
The Following User Says Thank You to eagle nexus For This Useful Post:
scary alien (March 2nd, 2012)
Reply


Go Back   Android Forums > Android Phones > Samsung Galaxy Nexus > (Verizon) Galaxy Nexus - All Things Root
Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


LinkBacks (?)
LinkBack to this Thread: http://androidforums.com/verizon-galaxy-nexus-all-things-root/499117-galaxy-nexus-root-un-root-without-unlocking-bootloader.html
Posted By For Type Date
[Google Galaxy Nexus] Custom roms en Firmware - Google Android Smartphones - GoT This thread Refback March 27th, 2012 09:42 AM


All times are GMT -5. The time now is 09:45 PM.
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.