Ok guys that are using SOC or considering using this read:
SOC uses a new exploit called psneuter not rageagainstthecage (even though is still named rage).
// psneuter.c, written by scotty2.
// neuter the android property service.
// ashmem allows us to restrict permissions for a page further, but not relax them.
// adb relies on the ability to read ro.secure to know whether to drop its privileges or not;
// if it can't read the ro.secure property (because perhaps it couldn't map the ashmem page...
// then it will come up as root under the assumption that ro.secure is off.
// this will have the unfortunate side effect of rendering any of the bionic userspace that relies on the property
// service and things like dns broken.
// thus, we will want to use this, see if we can fix the misc partition, and downgrade the firmware as a whole to something more root friendly.
Read the above from the source code to it. For those of you who don't know what bionc is its the android libc.so or the C library that virtually every lib.so on the phone is linked with. The intention of this exploit was to be able to get root ONLY to downgrade the firmware version on the G2 as it screws up the property service.
For those that may be skeptical about this being the exploit used I'm sure you saw the text
"property service neutered" when you ran it
That comes from line 94 in code
Code:
[COLOR=black]printf([COLOR=#dd1144]"property service neutered.\n"[/COLOR]);[/COLOR]
full psneuter source code is here https://github.com/tmzt/g2root-kmod/blob/master/scotty2/psneuter/psneuter.c