• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Root Stuck on Hboot 6.17

Yes , it came to the menu to reboot , and waited for it to reboot then did the cmd commands.

Now when I input : adb shell /data/local/tacoroot.sh --root
This is the response I get

TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by

both Justin Case and Dan Rosenberg (Rosenberg first). I believe unrevoked and
AlphaRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least on
ce after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Rebooting into root.
/data/local/tacoroot.sh: cannot create /data/local.prop: permission denied
 
im at work atm,but this may help you some. these are directions and a codebox for an inc 2 guide i have:

4)downgrade with adb
*from this point forward,all commands will be in bold you can copy,then paste them into the cmd window,one at a time. blue are just additional info/comments,and should not be copy/pasted


md5sums tacoroot.sh should return 6ec06d776feb212d8b2a55817eddf76d


adb devices should return your phones serial number. indicating drivers are working,and youre connected.

adb push tacoroot.sh /data/local/

adb shell chmod 755 /data/local/tacoroot.sh

adb shell /data/local/tacoroot.sh --setup

your phone will reboot,eventually ending up on the stock recovery screen,with a picture of a phone,red ! and triangle. press vol up and power. this should bring up some writing(menu options for stock recovery). dont select any of these options. hold vol up,vol down,and power until the phone reboots.

once your fully booted:


adb shell /data/local/tacoroot.sh --root

at this point your phone will become confused and unstable. it will reboot. maybe a couple of times.it may hang. it may start boot looping(what my phone did),or it may do other strange things as well. let the phone boot as far as its going to.

if it gets so far,and starts bootlooping,thats ok,continue on:

.
.
.(commands to flash misc version)
.
.
.

adb shell /data/local/tacoroot.sh --undo
at this point,your phone will reboot again. this time,it should boot fully back into the OS,and once again be stable. as soon as it does:


here is what the commands and responses will look like in your cmd window. red are my inputs,blue are simply additional comments:

Code:
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation.  All rights reserved.

C:\Users\Scott>[COLOR="Red"]cd c:\miniadb_inc2[/COLOR]

c:\miniadb_inc2>[COLOR="red"]md5sums RUU_Vivo_W_Gingerbread_S_VERIZON_WWE_2.18.605.3_Radio_1.
09.01.0622_NV_VZW1.92_release_199487_si.zip[/COLOR]

MD5sums 1.2 freeware for Win9x/ME/NT/2000/XP+
Copyright (C) 2001-2005 Jem Berkes - http://www.pc-tools.net/
Type md5sums -h for help

[Path] / filename                              MD5 sum
-------------------------------------------------------------------------------
[c:\miniadb_inc2\]
RUU_Vivo_W_Gingerbread_S_VERIZON_WWE_2... 100% cea499f51b40055ffd118960e1e73255

c:\miniadb_inc2>[COLOR="red"]md5sums 1.09.01.0312_vivow_Radio_PG32IMG.zip[/COLOR]

MD5sums 1.2 freeware for Win9x/ME/NT/2000/XP+
Copyright (C) 2001-2005 Jem Berkes - http://www.pc-tools.net/
Type md5sums -h for help

[Path] / filename                              MD5 sum
-------------------------------------------------------------------------------
[c:\miniadb_inc2\]
1.09.01.0312_vivow_Radio_PG32IMG.zip           ea6b98be48210d7797e62362f49ff751

c:\miniadb_inc2>[COLOR="red"]md5sums tacoroot.sh[/COLOR]

MD5sums 1.2 freeware for Win9x/ME/NT/2000/XP+
Copyright (C) 2001-2005 Jem Berkes - http://www.pc-tools.net/
Type md5sums -h for help

[Path] / filename                              MD5 sum
-------------------------------------------------------------------------------
[c:\miniadb_inc2\]
tacoroot.sh                                    6ec06d776feb212d8b2a55817eddf76d

c:\miniadb_inc2>[COLOR="red"]md5sums misc_version[/COLOR]

MD5sums 1.2 freeware for Win9x/ME/NT/2000/XP+
Copyright (C) 2001-2005 Jem Berkes - http://www.pc-tools.net/
Type md5sums -h for help

[Path] / filename                              MD5 sum
-------------------------------------------------------------------------------
[c:\miniadb_inc2\]
misc_version                                   050f55d34ddbcc860efa5982491437de

c:\miniadb_inc2>[COLOR="Red"]adb devices[/COLOR]
List of devices attached
HTxxxxxxxxxx    device


c:\miniadb_inc2>[COLOR="red"]adb push tacoroot.sh /data/local/[/COLOR]
297 KB/s (2129 bytes in 0.007s)

c:\miniadb_inc2>[COLOR="red"]adb shell chmod 755 /data/local/tacoroot.sh[/COLOR]

c:\miniadb_inc2>[COLOR="red"]adb shell /data/local/tacoroot.sh --setup[/COLOR]
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by

both Justin Case and Dan Rosenberg (Rosenberg first). I believe unrevoked and
AlpahRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least on
ce after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Rebooting into recovery, please press Volume+, Volume- and Power at the same tim
e, and reboot the system.
rm failed for /data/data/recovery/log, No such file or directory

[COLOR="Blue"]phone will reboot to stock recovery. press vol up and power to get stock recovery menu. press vol down,vol up,power to reboot[/COLOR]

c:\miniadb_inc2>[COLOR="red"]adb shell /data/local/tacoroot.sh --root[/COLOR]
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by

both Justin Case and Dan Rosenberg (Rosenberg first). I believe unrevoked and
AlpahRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least on
ce after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Rebooting into root.

[COLOR="blue"]phone will be unstable,and my reboot or bootloop. do not panic,its normal[/COLOR]

[COLOR="Blue"]*insert commands to flash misc image[/COLOR]


c:\miniadb_inc2>[COLOR="red"]adb shell /data/local/tacoroot.sh --undo[/COLOR]
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by

both Justin Case and Dan Rosenberg (Rosenberg first). I believe unrevoked and
AlpahRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least on
ce after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Root removed, rebooting

[COLOR="blue"]allow phone to fully boot[/COLOR]

c:\miniadb_inc2>[COLOR="red"]adb reboot bootloader[/COLOR]

c:\miniadb_inc2>[COLOR="Red"]fastboot devices[/COLOR]
HTxxxxxxxxxx    fastboot

c:\miniadb_inc2>[COLOR="red"]fastboot getvar mainver[/COLOR]
mainver: 2.18.605.3
finished. total time: 0.001s

c:\miniadb_inc2>[COLOR="red"]fastboot erase cache[/COLOR]
               erasing 'cache'... OKAY [  0.114s]
finished. total time: 0.114s

c:\miniadb_inc2>[COLOR="red"]fastboot oem rebootRUU[/COLOR]
                              ... OKAY [  0.213s]
finished. total time: 0.213s

c:\miniadb_inc2>[COLOR="red"]fastboot flash zip RUU_Vivo_W_Gingerbread_S_VERIZON_WWE_2.18.605
.3_Radio_1.09.01.0622_NV_VZW1.92_release_199487_si.zip[/COLOR]
     sending 'zip' (292817 KB)... OKAY [ 48.709s]
                 writing 'zip'... INFOzip header checking...
INFOshift signature_size for header checking...
INFOzip info parsing...
INFOchecking model ID...
INFOchecking custom ID...
INFOstart image[hboot] unzipping for pre-update check...
INFOstart image[hboot] unzipping & flushing...
INFO[RUU]UZ,hboot,0
INFO[RUU]UZ,hboot,100
INFO[RUU]WP,hboot,0
INFO[RUU]WP,hboot,100
INFOstart image[boot] unzipping & flushing...
INFO[RUU]UZ,boot,0
INFO[RUU]UZ,boot,31
INFO[RUU]UZ,boot,73
INFO[RUU]UZ,boot,100
INFO[RUU]WP,boot,0
INFO[RUU]WP,boot,99
INFO[RUU]WP,boot,100
INFOstart image[recovery] unzipping & flushing...
INFO[RUU]UZ,recovery,0
INFO[RUU]UZ,recovery,22
INFO[RUU]UZ,recovery,43
INFO[RUU]UZ,recovery,63
INFO[RUU]UZ,recovery,84
INFO[RUU]UZ,recovery,100
INFO[RUU]WP,recovery,0
INFO[RUU]WP,recovery,99
INFO[RUU]WP,recovery,100
INFOstart image[system] unzipping & flushing...
INFO[RUU]UZ,system,0
INFO[RUU]UZ,system,5
INFO[RUU]UZ,system,8
INFO[RUU]UZ,system,13
INFO[RUU]UZ,system,16
INFO[RUU]UZ,system,22
INFO[RUU]UZ,system,25
INFO[RUU]UZ,system,31
INFO[RUU]UZ,system,37
INFO[RUU]UZ,system,42
INFO[RUU]UZ,system,48
INFO[RUU]UZ,system,53
INFO[RUU]UZ,system,56
INFO[RUU]UZ,system,61
INFO[RUU]UZ,system,65
INFO[RUU]WP,system,0
INFO[RUU]WP,system,5
INFO[RUU]WP,system,8
INFO[RUU]WP,system,13
INFO[RUU]WP,system,16
INFO[RUU]WP,system,22
INFO[RUU]WP,system,25
INFO[RUU]WP,system,30
INFO[RUU]WP,system,33
INFO[RUU]WP,system,39
INFO[RUU]WP,system,42
INFO[RUU]WP,system,47
INFO[RUU]WP,system,50
INFO[RUU]WP,system,55
INFO[RUU]WP,system,59
INFO[RUU]WP,system,65
INFO[RUU]UZ,system,65
INFO[RUU]UZ,system,67
INFO[RUU]UZ,system,71
INFO[RUU]UZ,system,73
INFO[RUU]UZ,system,77
INFO[RUU]UZ,system,79
INFO[RUU]UZ,system,82
INFO[RUU]UZ,system,85
INFO[RUU]UZ,system,87
INFO[RUU]UZ,system,89
INFO[RUU]UZ,system,93
INFO[RUU]UZ,system,95
INFO[RUU]UZ,system,98
INFO[RUU]WP,system,65
INFO[RUU]WP,system,67
INFO[RUU]WP,system,70
INFO[RUU]WP,system,73
INFO[RUU]WP,system,76
INFO[RUU]WP,system,79
INFO[RUU]WP,system,82
INFO[RUU]WP,system,85
INFO[RUU]WP,system,88
INFO[RUU]WP,system,91
INFO[RUU]WP,system,94
INFO[RUU]WP,system,97
INFO[RUU]WP,system,100
INFOstart image[sp1] unzipping & flushing...
INFO[RUU]UZ,sp1,0
INFO[RUU]UZ,sp1,100
INFO[RUU]WP,sp1,0
INFO[RUU]WP,sp1,100
INFOstart image[dzdata] unzipping & flushing...
INFO[RUU]UZ,dzdata,0
INFO[RUU]UZ,dzdata,100
INFO[RUU]WP,dzdata,0
INFO[RUU]WP,dzdata,100
INFOstart image[tp] unzipping & flushing...
INFO[RUU]UZ,tp,0
INFO[RUU]UZ,tp,100
INFO[RUU]WP,tp,0
INFOstart image[tp] unzipping & flushing...
INFO[RUU]UZ,tp,0
INFO[RUU]UZ,tp,100
INFOstart image[radio] unzipping & flushing...
INFO[RUU]UZ,radio,0
INFO[RUU]UZ,radio,7
INFO[RUU]UZ,radio,13
INFO[RUU]UZ,radio,21
INFO[RUU]UZ,radio,27
INFO[RUU]UZ,radio,34
INFO[RUU]UZ,radio,42
INFO[RUU]UZ,radio,48
INFO[RUU]UZ,radio,55
INFO[RUU]UZ,radio,62
INFO[RUU]UZ,radio,69
INFO[RUU]UZ,radio,76
INFO[RUU]UZ,radio,83
INFO[RUU]UZ,radio,90
INFO[RUU]UZ,radio,97
INFO[RUU]UZ,radio,100
INFO[RUU]WP,radio,0
INFO[RUU]WP,radio,5
INFO[RUU]WP,radio,12
INFO[RUU]WP,radio,19
INFO[RUU]WP,radio,26
INFO[RUU]WP,radio,33
INFO[RUU]WP,radio,42
INFO[RUU]WP,radio,100
OKAY [160.164s]
finished. total time: 208.874s

c:\miniadb_inc2>[COLOR="red"]fastboot reboot-bootloader[/COLOR]
                     rebooting into bootloader... OKAY [  0.160s]
finished. total time: 0.156s

c:\miniadb_inc2>[COLOR="red"]fastboot reboot[/COLOR]
                     rebooting...
finished. total time: 0.161s


also,taco root is a somewhat complex root,IMO. when i was messing with it on the inc 2,seems like it worked about every other time,for some reason.
 
I am still am getting the same erros while attempting taco root.

unfortunately i have no idea. only thing that comes to my mind at this point,is do a factory reset and then attempt to run it again.

failing that,you could try to install an htcdev compatible hboot.
 
im at work atm,but this may help you some. these are directions and a codebox for an inc 2 guide i have:




here is what the commands and responses will look like in your cmd window. red are my inputs,blue are simply additional comments:

Code:
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation.  All rights reserved.

C:\Users\Scott>[COLOR="Red"]cd c:\miniadb_inc2[/COLOR]

c:\miniadb_inc2>[COLOR="red"]md5sums RUU_Vivo_W_Gingerbread_S_VERIZON_WWE_2.18.605.3_Radio_1.
09.01.0622_NV_VZW1.92_release_199487_si.zip[/COLOR]

MD5sums 1.2 freeware for Win9x/ME/NT/2000/XP+
Copyright (C) 2001-2005 Jem Berkes - http://www.pc-tools.net/
Type md5sums -h for help

[Path] / filename                              MD5 sum
-------------------------------------------------------------------------------
[c:\miniadb_inc2\]
RUU_Vivo_W_Gingerbread_S_VERIZON_WWE_2... 100% cea499f51b40055ffd118960e1e73255

c:\miniadb_inc2>[COLOR="red"]md5sums 1.09.01.0312_vivow_Radio_PG32IMG.zip[/COLOR]

MD5sums 1.2 freeware for Win9x/ME/NT/2000/XP+
Copyright (C) 2001-2005 Jem Berkes - http://www.pc-tools.net/
Type md5sums -h for help

[Path] / filename                              MD5 sum
-------------------------------------------------------------------------------
[c:\miniadb_inc2\]
1.09.01.0312_vivow_Radio_PG32IMG.zip           ea6b98be48210d7797e62362f49ff751

c:\miniadb_inc2>[COLOR="red"]md5sums tacoroot.sh[/COLOR]

MD5sums 1.2 freeware for Win9x/ME/NT/2000/XP+
Copyright (C) 2001-2005 Jem Berkes - http://www.pc-tools.net/
Type md5sums -h for help

[Path] / filename                              MD5 sum
-------------------------------------------------------------------------------
[c:\miniadb_inc2\]
tacoroot.sh                                    6ec06d776feb212d8b2a55817eddf76d

c:\miniadb_inc2>[COLOR="red"]md5sums misc_version[/COLOR]

MD5sums 1.2 freeware for Win9x/ME/NT/2000/XP+
Copyright (C) 2001-2005 Jem Berkes - http://www.pc-tools.net/
Type md5sums -h for help

[Path] / filename                              MD5 sum
-------------------------------------------------------------------------------
[c:\miniadb_inc2\]
misc_version                                   050f55d34ddbcc860efa5982491437de

c:\miniadb_inc2>[COLOR="Red"]adb devices[/COLOR]
List of devices attached
HTxxxxxxxxxx    device


c:\miniadb_inc2>[COLOR="red"]adb push tacoroot.sh /data/local/[/COLOR]
297 KB/s (2129 bytes in 0.007s)

c:\miniadb_inc2>[COLOR="red"]adb shell chmod 755 /data/local/tacoroot.sh[/COLOR]

c:\miniadb_inc2>[COLOR="red"]adb shell /data/local/tacoroot.sh --setup[/COLOR]
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by

both Justin Case and Dan Rosenberg (Rosenberg first). I believe unrevoked and
AlpahRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least on
ce after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Rebooting into recovery, please press Volume+, Volume- and Power at the same tim
e, and reboot the system.
rm failed for /data/data/recovery/log, No such file or directory

[COLOR="Blue"]phone will reboot to stock recovery. press vol up and power to get stock recovery menu. press vol down,vol up,power to reboot[/COLOR]

c:\miniadb_inc2>[COLOR="red"]adb shell /data/local/tacoroot.sh --root[/COLOR]
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by

both Justin Case and Dan Rosenberg (Rosenberg first). I believe unrevoked and
AlpahRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least on
ce after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Rebooting into root.

[COLOR="blue"]phone will be unstable,and my reboot or bootloop. do not panic,its normal[/COLOR]

[COLOR="Blue"]*insert commands to flash misc image[/COLOR]


c:\miniadb_inc2>[COLOR="red"]adb shell /data/local/tacoroot.sh --undo[/COLOR]
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by

both Justin Case and Dan Rosenberg (Rosenberg first). I believe unrevoked and
AlpahRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least on
ce after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Root removed, rebooting

[COLOR="blue"]allow phone to fully boot[/COLOR]

c:\miniadb_inc2>[COLOR="red"]adb reboot bootloader[/COLOR]

c:\miniadb_inc2>[COLOR="Red"]fastboot devices[/COLOR]
HTxxxxxxxxxx    fastboot

c:\miniadb_inc2>[COLOR="red"]fastboot getvar mainver[/COLOR]
mainver: 2.18.605.3
finished. total time: 0.001s

c:\miniadb_inc2>[COLOR="red"]fastboot erase cache[/COLOR]
               erasing 'cache'... OKAY [  0.114s]
finished. total time: 0.114s

c:\miniadb_inc2>[COLOR="red"]fastboot oem rebootRUU[/COLOR]
                              ... OKAY [  0.213s]
finished. total time: 0.213s

c:\miniadb_inc2>[COLOR="red"]fastboot flash zip RUU_Vivo_W_Gingerbread_S_VERIZON_WWE_2.18.605
.3_Radio_1.09.01.0622_NV_VZW1.92_release_199487_si.zip[/COLOR]
     sending 'zip' (292817 KB)... OKAY [ 48.709s]
                 writing 'zip'... INFOzip header checking...
INFOshift signature_size for header checking...
INFOzip info parsing...
INFOchecking model ID...
INFOchecking custom ID...
INFOstart image[hboot] unzipping for pre-update check...
INFOstart image[hboot] unzipping & flushing...
INFO[RUU]UZ,hboot,0
INFO[RUU]UZ,hboot,100
INFO[RUU]WP,hboot,0
INFO[RUU]WP,hboot,100
INFOstart image[boot] unzipping & flushing...
INFO[RUU]UZ,boot,0
INFO[RUU]UZ,boot,31
INFO[RUU]UZ,boot,73
INFO[RUU]UZ,boot,100
INFO[RUU]WP,boot,0
INFO[RUU]WP,boot,99
INFO[RUU]WP,boot,100
INFOstart image[recovery] unzipping & flushing...
INFO[RUU]UZ,recovery,0
INFO[RUU]UZ,recovery,22
INFO[RUU]UZ,recovery,43
INFO[RUU]UZ,recovery,63
INFO[RUU]UZ,recovery,84
INFO[RUU]UZ,recovery,100
INFO[RUU]WP,recovery,0
INFO[RUU]WP,recovery,99
INFO[RUU]WP,recovery,100
INFOstart image[system] unzipping & flushing...
INFO[RUU]UZ,system,0
INFO[RUU]UZ,system,5
INFO[RUU]UZ,system,8
INFO[RUU]UZ,system,13
INFO[RUU]UZ,system,16
INFO[RUU]UZ,system,22
INFO[RUU]UZ,system,25
INFO[RUU]UZ,system,31
INFO[RUU]UZ,system,37
INFO[RUU]UZ,system,42
INFO[RUU]UZ,system,48
INFO[RUU]UZ,system,53
INFO[RUU]UZ,system,56
INFO[RUU]UZ,system,61
INFO[RUU]UZ,system,65
INFO[RUU]WP,system,0
INFO[RUU]WP,system,5
INFO[RUU]WP,system,8
INFO[RUU]WP,system,13
INFO[RUU]WP,system,16
INFO[RUU]WP,system,22
INFO[RUU]WP,system,25
INFO[RUU]WP,system,30
INFO[RUU]WP,system,33
INFO[RUU]WP,system,39
INFO[RUU]WP,system,42
INFO[RUU]WP,system,47
INFO[RUU]WP,system,50
INFO[RUU]WP,system,55
INFO[RUU]WP,system,59
INFO[RUU]WP,system,65
INFO[RUU]UZ,system,65
INFO[RUU]UZ,system,67
INFO[RUU]UZ,system,71
INFO[RUU]UZ,system,73
INFO[RUU]UZ,system,77
INFO[RUU]UZ,system,79
INFO[RUU]UZ,system,82
INFO[RUU]UZ,system,85
INFO[RUU]UZ,system,87
INFO[RUU]UZ,system,89
INFO[RUU]UZ,system,93
INFO[RUU]UZ,system,95
INFO[RUU]UZ,system,98
INFO[RUU]WP,system,65
INFO[RUU]WP,system,67
INFO[RUU]WP,system,70
INFO[RUU]WP,system,73
INFO[RUU]WP,system,76
INFO[RUU]WP,system,79
INFO[RUU]WP,system,82
INFO[RUU]WP,system,85
INFO[RUU]WP,system,88
INFO[RUU]WP,system,91
INFO[RUU]WP,system,94
INFO[RUU]WP,system,97
INFO[RUU]WP,system,100
INFOstart image[sp1] unzipping & flushing...
INFO[RUU]UZ,sp1,0
INFO[RUU]UZ,sp1,100
INFO[RUU]WP,sp1,0
INFO[RUU]WP,sp1,100
INFOstart image[dzdata] unzipping & flushing...
INFO[RUU]UZ,dzdata,0
INFO[RUU]UZ,dzdata,100
INFO[RUU]WP,dzdata,0
INFO[RUU]WP,dzdata,100
INFOstart image[tp] unzipping & flushing...
INFO[RUU]UZ,tp,0
INFO[RUU]UZ,tp,100
INFO[RUU]WP,tp,0
INFOstart image[tp] unzipping & flushing...
INFO[RUU]UZ,tp,0
INFO[RUU]UZ,tp,100
INFOstart image[radio] unzipping & flushing...
INFO[RUU]UZ,radio,0
INFO[RUU]UZ,radio,7
INFO[RUU]UZ,radio,13
INFO[RUU]UZ,radio,21
INFO[RUU]UZ,radio,27
INFO[RUU]UZ,radio,34
INFO[RUU]UZ,radio,42
INFO[RUU]UZ,radio,48
INFO[RUU]UZ,radio,55
INFO[RUU]UZ,radio,62
INFO[RUU]UZ,radio,69
INFO[RUU]UZ,radio,76
INFO[RUU]UZ,radio,83
INFO[RUU]UZ,radio,90
INFO[RUU]UZ,radio,97
INFO[RUU]UZ,radio,100
INFO[RUU]WP,radio,0
INFO[RUU]WP,radio,5
INFO[RUU]WP,radio,12
INFO[RUU]WP,radio,19
INFO[RUU]WP,radio,26
INFO[RUU]WP,radio,33
INFO[RUU]WP,radio,42
INFO[RUU]WP,radio,100
OKAY [160.164s]
finished. total time: 208.874s

c:\miniadb_inc2>[COLOR="red"]fastboot reboot-bootloader[/COLOR]
                     rebooting into bootloader... OKAY [  0.160s]
finished. total time: 0.156s

c:\miniadb_inc2>[COLOR="red"]fastboot reboot[/COLOR]
                     rebooting...
finished. total time: 0.161s


also,taco root is a somewhat complex root,IMO. when i was messing with it on the inc 2,seems like it worked about every other time,for some reason.


Been trying multiple times for this . This is what I get from my cmd :

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Documents and Settings\Jae>cd C:\Documents and Settings\Jae\Desktop\android1

C:\Documents and Settings\Jae\Desktop\android1>adb devices
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
List of devices attached
HT098HL01242 device


C:\Documents and Settings\Jae\Desktop\android1>adb push tacoroot.sh /data/local/

133 KB/s (2129 bytes in 0.015s)

C:\Documents and Settings\Jae\Desktop\android1>adb shell chmod 755 /data/local/t
acoroot.sh

C:\Documents and Settings\Jae\Desktop\android1>adb shell /data/local/tacoroot.sh
--setup
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by

both Justin Case and Dan Rosenberg (Rosenberg first). I believe unrevoked and
AlphaRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least on
ce after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Rebooting into recovery, please press Volume+, Volume- and Power at the same tim
e, and reboot the system.
rm failed for /data/data/recovery/log, Permission denied
link failed File exists


C:\Documents and Settings\Jae\Desktop\android1>adb shell /data/local/tacoroot.sh
--root
TacoRoot: HTC Edition v1
By Justin Case (jcase)
Presented by TeamAndIRC, RootzWiki and AndroidPolice
With great assistance from Reid Holland (Erishasnobattery)
----------
TacoRoot: HTC Edition v1 is based on a vulnerability independently discovered by

both Justin Case and Dan Rosenberg (Rosenberg first). I believe unrevoked and
AlphaRev were also aware of it.
----------
Usage:
--recovery : For this exploit to work, you must have booted recovery at least on
ce after your last factory reset.
--setup : Setup the phone for root, must be done before --root.
--root : Root the phone.
--undo : Remove TacoRoot.
----------
Rebooting into root.
/data/local/tacoroot.sh: cannot create /data/local.prop: permission denied


I see that when you did the "adb shell /data/local/tacoroot.sh --setup" you got a similar response about it failing, but when you did "adb shell /data/local/tacoroot.sh --root" it allowed you to boot into root vs when i did it , the response was "permission denied"

This Hboot 6.17 is really messing me up, just for the heck of it tried running unrevoked 3 but it wouldn't take.... You guys think this is unrootable now that the tech update everything?

By the way THANKS for the input guys!:D Really appreciate it!
 
I see that when you did the "adb shell /data/local/tacoroot.sh --setup" you got a similar response about it failing, but when you did "adb shell /data/local/tacoroot.sh --root" it allowed you to boot into root vs when i did it , the response was "permission denied"

This Hboot 6.17 is really messing me up, just for the heck of it tried running unrevoked 3 but it wouldn't take.... You guys think this is unrootable now that the tech update everything?

By the way THANKS for the input guys!:D Really appreciate it!

yeah the tech did screw you up to some degree. if we can get a hold of a ruu for 5.07 then we should be fine, but there is not a ruu for it. not that i can find at least.

but i'll keep looking, and i hope that scotty knows where to get a ruu for you.
 
hey scotty i checked here:HTCdev - HTC Kernel Source Code and Binaries and could not find anything for the htc evo 4g. am i in the wrong place?

yep... just go to htcdev.com/bootloader and pick evo from the supported models list. the next screen should give the bootloader download.

you can also try an older version of unrevoked. we had good luck with this version working on gingerbread on the incredible. it wont give you s off,but it may give you root access so you can downgrade: 322_reflash_package.exe

try running it a couple times.

a user in the evo 3d forum used something called srsroot to get temp root on a 3d to change his main version. you can find the link to it in this post: http://androidforums.com/cdma-evo-3d-all-things-root/716278-htc-dev-unlock-help.html#post5810229

we just need to find something that will give you a # for long enuff to flash the new misc image.

you can also try the zergrush exploit(what revolutionary uses). follow this guide for the incredible: http://androidforums.com/incredible...ot-2-3-4-downgrade-get-s-off.html#post3308718

the flash_image binary i believe is universal,youll just need to made sure to use mtd-eng for the evo instead of mtd0. if zerg rush gets you a temp root,you could switch back to the evo taco root guide for the flash_image commands. just move zergrush from the miniadb_inc download into whatever folder youre using for adb/fastboot.

id prolly try things in this order(sorry for the randomness above):
1)zergrush
2)older unrevoked
3)htcdev
4)srsroot
5)whatever other exploits you we can think of or find with google ;)

there is also fe3vo,but i think its for emmc booting devices(originated for evo 3d and sensation),have to look into that one.
 
Finally was able to try this out, sorry for the late response, have been busy with new patients and new chief resident is a PIA. Still stuck, thinking about upgrading to a s3 or s4 but my evo has been with me for a while now, I really enjoyed it rooted.....dam sprint tech!!
yep... just go to htcdev.com/bootloader and pick evo from the supported models list. the next screen should give the bootloader download.

you can also try an older version of unrevoked. we had good luck with this version working on gingerbread on the incredible. it wont give you s off,but it may give you root access so you can downgrade: 322_reflash_package.exe

try running it a couple times.

a user in the evo 3d forum used something called srsroot to get temp root on a 3d to change his main version. you can find the link to it in this post: http://androidforums.com/cdma-evo-3d-all-things-root/716278-htc-dev-unlock-help.html#post5810229

we just need to find something that will give you a # for long enuff to flash the new misc image.

you can also try the zergrush exploit(what revolutionary uses). follow this guide for the incredible: http://androidforums.com/incredible...ot-2-3-4-downgrade-get-s-off.html#post3308718

the flash_image binary i believe is universal,youll just need to made sure to use mtd-eng for the evo instead of mtd0. if zerg rush gets you a temp root,you could switch back to the evo taco root guide for the flash_image commands. just move zergrush from the miniadb_inc download into whatever folder youre using for adb/fastboot.

id prolly try things in this order(sorry for the randomness above):
1)zergrush
2)older unrevoked
3)htcdev
4)srsroot
5)whatever other exploits you we can think of or find with google ;)

there is also fe3vo,but i think its for emmc booting devices(originated for evo 3d and sensation),have to look into that one.
 
Back
Top Bottom