Učlanjen(a)
22.06.2011
Poruka
285
Na fabletu je po defaultu isključen USB debugging mod pa ga je potrebno uključiti a to ćemo uraditi tako što ćemo ići na "Settings":



pa na "About device":



pa odskrolovati do "Build number":



po kome ćemo tapnuti 7 puta ...to će nam omogućiti da, kada se vratimo u "Settings", uđemo u "Developer options" gde ćemo povući "USB debugging" slajder na položaj uključeno:



To je to, pomoću USB kabla ćemo povezati fablet sa računarom i nastaviti.

Prvi put kada sam rutovao Teslu pre nekih 20-tak dana, koristio sam win 10 enterprise lptb 64bit i neka 4 pojedinačna drajvera koje je na desetku bilo i problematično instalirati a i trebalo se restartovati u mod u kome OS ne vrši proveru potpisa drajvera jer su bili nepotpisani. Onda me toda81 zamolio da napišem ovaj tut a pošto mi je Deda Mraz u međuvremenu doneo SSD ja sam instalirao clean OS win 10 enterprise th2 64bit i našao potpisan drajver koji se instalira žmurećke i bez ikakvog cimanja ...dakle instalirate ga samo next-next:
Po instalaciji drajvera odlazite do Device managera da proverite da li je sve OK instalirano:



...ADB.rar otpakujete gde hoćete a kada to uradite onda dođete do mesta na kome ste raspakovali ADB.rar i to tako da otvorite folder ADB kako biste mogli da vidite njegov sadržaj a zatim na tastaturi stisnete shift+desni klik miša i iz kontekstnog menija koji se pojavio birate "Open Command Window Here":

...otvoriće vam se Command prompt u kome kucate (ili copy-paste) liniju po liniju teksta s tim što posle svake linije udarate enter:

Kod:
adb root
adb disable-verity
adb reboot



i uređaj se restartovao a onda kada se sistem inicijalizuje kucamo:

Kod:
adb root
adb push RootChuwiVi7 /data/local/tmp/



{ja sam prethodnu komandu ukucao i pre nego što se sistem potpuno inicijalizovao pa sam dobio grešku koja je na skrinšotu uokvirena crvenom bojom - ništa zato, malo sačekao pa ponovio i onda je sve bilo OK}:

Kod:
adb shell /system/bin/sh -x /data/local/tmp/vi7root
adb reboot

...posle ove komande bude puno dešavanja u konzoli pa je zato neću skrinšotovati već ću kopirati tekst pod spojler kako biste znali šta očekujete da vidite posle ovog poteza:
Kod:
C:\Users\Marko\ADB>adb shell /system/bin/sh -x /data/local/tmp/vi7root
+ SU_DIR=/data/local/tmp
+ ARCH=x86
+ echo '- Rooting Chuwi Vi7'
- Rooting Chuwi Vi7
+ '[' ! -f /data/local/tmp/x86/supolicy ']'
+ mount -o rw,remount /system
+ touch /system/casacristo
+ '[' ! -f /system/casacristo ']'
+ rm /system/casacristo
+ '[' ! -e /system/app/SuperSU ']'
+ echo 'creating /system/app/SuperSU'
creating /system/app/SuperSU
+ mkdir -p /system/app/SuperSU
+ cp_chmod_chcon /data/local/tmp/common/Superuser.apk /system/app/SuperSU/SuperSU.apk 0644 u:object_r:system_file:s0
+ cp /data/local/tmp/common/Superuser.apk /system/app/SuperSU/SuperSU.apk
+ chmod 0644 /system/app/SuperSU/SuperSU.apk
+ chcon u:object_r:system_file:s0 /system/app/SuperSU/SuperSU.apk
+ cp_chmod_chcon /data/local/tmp/common/install-recovery.sh /system/etc/install-recovery.sh 0755 u:object_r:toolbox_exec:s0
+ cp /data/local/tmp/common/install-recovery.sh /system/etc/install-recovery.sh
+ chmod 0755 /system/etc/install-recovery.sh
+ chcon u:object_r:toolbox_exec:s0 /system/etc/install-recovery.sh
+ '[' ! -e /system/app/rootverifier ']'
+ '[' ! -f /system/etc/install-recovery-2.sh ']'
+ echo 'preserving factory install-recovery.sh'
preserving factory install-recovery.sh
+ cp /system/bin/install-recovery.sh /system/etc/install-recovery-2.sh
cp: /system/bin/install-recovery.sh: No such file or directory
+ rm /system/bin/install-recovery.sh
rm: /system/bin/install-recovery.sh: No such file or directory
+ ln -s /system/etc/install-recovery.sh /system/bin/install-recovery.sh
+ chmod 0755 /system/etc/install-recovery.sh
+ '[' ! -f /system/xbin/su.factory ']'
+ '[' ! -e /system/bin/.ext ']'
+ echo 'creating /system/bin/.ext'
creating /system/bin/.ext
+ mkdir -p /system/bin/.ext
+ cp_chmod_chcon /data/local/tmp/x86/su /system/xbin/su 0755 u:object_r:system_file:s0
+ cp /data/local/tmp/x86/su /system/xbin/su
+ chmod 0755 /system/xbin/su
+ chcon u:object_r:system_file:s0 /system/xbin/su
+ cp_chmod_chcon /data/local/tmp/x86/su /system/bin/.ext/.su 0755 u:object_r:system_file:s0
+ cp /data/local/tmp/x86/su /system/bin/.ext/.su
+ chmod 0755 /system/bin/.ext/.su
+ chcon u:object_r:system_file:s0 /system/bin/.ext/.su
+ cp_chmod_chcon /data/local/tmp/x86/su /system/xbin/daemonsu 0755 u:object_r:system_file:s0
+ cp /data/local/tmp/x86/su /system/xbin/daemonsu
+ chmod 0755 /system/xbin/daemonsu
+ chcon u:object_r:system_file:s0 /system/xbin/daemonsu
+ cp_chmod_chcon /data/local/tmp/x86/su /system/xbin/sugote 0755 u:object_r:zygote_exec:s0
+ cp /data/local/tmp/x86/su /system/xbin/sugote
+ chmod 0755 /system/xbin/sugote
+ chcon u:object_r:zygote_exec:s0 /system/xbin/sugote
+ cp_chmod_chcon /data/local/tmp/x86/supolicy /system/xbin/supolicy 0755 u:object_r:system_file:s0
+ cp /data/local/tmp/x86/supolicy /system/xbin/supolicy
+ chmod 0755 /system/xbin/supolicy
+ chcon u:object_r:system_file:s0 /system/xbin/supolicy
+ cp_chmod_chcon /data/local/tmp/x86/libsupol.so /system/lib/libsupol.so 0644 u:object_r:system_file:s0
+ cp /data/local/tmp/x86/libsupol.so /system/lib/libsupol.so
+ chmod 0644 /system/lib/libsupol.so
+ chcon u:object_r:system_file:s0 /system/lib/libsupol.so
+ cp_chmod_chcon /system/bin/sh /system/xbin/sugote-mksh 0755 u:object_r:system_file:s0
+ cp /system/bin/sh /system/xbin/sugote-mksh
+ chmod 0755 /system/xbin/sugote-mksh
+ chcon u:object_r:system_file:s0 /system/xbin/sugote-mksh
+ cp_chmod_chcon /system/bin/app_process32 /system/bin/app_process32_original 0755 u:object_r:zygote_exec:s0
+ cp /system/bin/app_process32 /system/bin/app_process32_original
+ chmod 0755 /system/bin/app_process32_original
+ chcon u:object_r:zygote_exec:s0 /system/bin/app_process32_original
+ cp_chmod_chcon /system/bin/app_process32 /system/bin/app_process_init 0755 u:object_r:system_file:s0
+ cp /system/bin/app_process32 /system/bin/app_process_init
+ chmod 0755 /system/bin/app_process_init
+ chcon u:object_r:system_file:s0 /system/bin/app_process_init
+ rm /system/bin/app_process
+ ln -s /system/xbin/daemonsu /system/bin/app_process
+ rm /system/bin/app_process32
+ ln -s /system/xbin/daemonsu /system/bin/app_process32
+ touch /system/etc/.installed_su_daemon
+ chmod 0644 /system/etc/.installed_su_daemon
+ chcon u:object_r:system_file:s0 /system/etc/.installed_su_daemon
+ rm -f /system/bin/su
+ rm -f /system/sbin/su
+ rm -f /vendor/sbin/su
+ rm -f /vendor/bin/su
+ rm -f /system/etc/init.d/99SuperSUDaemon
+ rm -f /system/app/Superuser.apk
+ rm -f /system/app/Superuser.odex
+ rm -f /system/app/SuperUser.apk
+ rm -f /system/app/SuperUser.odex
+ rm -f /system/app/superuser.apk
+ rm -f /system/app/superuser.odex
+ rm -f /system/app/Supersu.apk
+ rm -f /system/app/Supersu.odex
+ rm -f /system/app/SuperSU.apk
+ rm -f /system/app/SuperSU.odex
+ rm -f /system/app/supersu.apk
+ rm -f /system/app/supersu.odex
+ rm -f /system/app/VenomSuperUser.apk
+ rm -f /system/app/VenomSuperUser.odex
+ rm -rf /system/app/VenomSuperUser
+ rm -f '/data/dalvik-cache/*com.noshufou.android.su*'
+ rm -f '/data/dalvik-cache/*/*com.noshufou.android.su*'
+ rm -f '/data/dalvik-cache/*com.koushikdutta.superuser*'
+ rm -f '/data/dalvik-cache/*/*com.koushikdutta.superuser*'
+ rm -f '/data/dalvik-cache/*com.mgyun.shua.su*'
+ rm -f '/data/dalvik-cache/*/*com.mgyun.shua.su*'
+ rm -f '/data/dalvik-cache/*com.m0narx.su*'
+ rm -f '/data/dalvik-cache/*/*com.m0narx.su*'
+ rm -f '/data/dalvik-cache/*Superuser.apk*'
+ rm -f '/data/dalvik-cache/*/*Superuser.apk*'
+ rm -f '/data/dalvik-cache/*SuperUser.apk*'
+ rm -f '/data/dalvik-cache/*/*SuperUser.apk*'
+ rm -f '/data/dalvik-cache/*superuser.apk*'
+ rm -f '/data/dalvik-cache/*/*superuser.apk*'
+ rm -f '/data/dalvik-cache/*VenomSuperUser.apk*'
+ rm -f '/data/dalvik-cache/*/*VenomSuperUser.apk*'
+ rm -f '/data/dalvik-cache/*eu.chainfire.supersu*'
+ rm -f '/data/dalvik-cache/*/*eu.chainfire.supersu*'
+ rm -f '/data/dalvik-cache/*Supersu.apk*'
+ rm -f '/data/dalvik-cache/*/*Supersu.apk*'
+ rm -f '/data/dalvik-cache/*SuperSU.apk*'
+ rm -f '/data/dalvik-cache/*/*SuperSU.apk*'
+ rm -f '/data/dalvik-cache/*supersu.apk*'
+ rm -f '/data/dalvik-cache/*/*supersu.apk*'
+ rm -f '/data/dalvik-cache/*.oat'
+ rm -f '/data/app/com.noshufou.android.su*'
+ rm -f '/data/app/com.koushikdutta.superuser*'
+ rm -f '/data/app/com.mgyun.shua.su*'
+ rm -f '/data/app/com.m0narx.su*'
+ rm -f '/data/app/eu.chainfire.supersu-*'
+ rm -f /data/app/eu.chainfire.supersu.apk
+ echo '- Post-installation script'
- Post-installation script
+ /system/xbin/su --install
+ rm -R /data/local/tmp/common /data/local/tmp/init.rc /data/local/tmp/vi7root /data/local/tmp/x86
+ echo '- Done, now reboot !'
- Done, now reboot !
+ exit 0

C:\Users\Marko\ADB>adb reboot

C:\Users\Marko\ADB>


Uređaj se opet reboot-uje a kada se sistem podigne otići ćemo u app drawer i pokrenuti aplikaciju Root Verifier u kojoj ćemo videti da smo uspešno rutovali uređaj:



 
Poslednja izmena:
Član
Učlanjen(a)
15.04.2011
Poruka
1.374
Prijatelju, posle ovako dobrog i detaljnog uputstva nemoguce je da ne uspe root.
USPEO SAM! :)
HVALA PUNO JOŠ JEDNOM!
Rootcheker kaze da je tel root-ovan, ali se samo javlja mali problem kada hocu da udjem u su jer nece da instalira binarni kod. Da li i ti imas taj problem?
 
Član
Učlanjen(a)
22.06.2009
Poruka
4.880
instaliraj recovery cwm ili twrp i preko toga flešuj supersu.zip

postoje 6 stvari koje bi trebalo da imaš da bi tel, tab , fab imali punu funkciju


1. root supersu
2. cwm ili twrp recovery
3. busy box
4. lucky patcher
5. play prodavnica patched
6. exposed

posle toga imaš neograničenu mogućnost
 
Poslednja izmena:
Član
Učlanjen(a)
15.04.2011
Poruka
1.374
Hvala na savetu @vladcepesh. Sve to imam na telefonu, a moracu znaci i na tabletu. Ima puno dobrih xposed modula
 
Član
Učlanjen(a)
09.08.2012
Poruka
10
Na fabletu je po defaultu isključen USB debugging mod pa ga je potrebno uključiti a to ćemo uraditi tako što ćemo ići na "Settings":



pa na "About device":



pa odskrolovati do "Build number":



po kome ćemo tapnuti 7 puta ...to će nam omogućiti da, kada se vratimo u "Settings", uđemo u "Developer options" gde ćemo povući "USB debugging" slajder na položaj uključeno:



To je to, pomoću USB kabla ćemo povezati fablet sa računarom i nastaviti.

Prvi put kada sam rutovao Teslu pre nekih 20-tak dana, koristio sam win 10 enterprise lptb 64bit i neka 4 pojedinačna drajvera koje je na desetku bilo i problematično instalirati a i trebalo se restartovati u mod u kome OS ne vrši proveru potpisa drajvera jer su bili nepotpisani. Onda me toda81 zamolio da napišem ovaj tut a pošto mi je Deda Mraz u međuvremenu doneo SSD ja sam instalirao clean OS win 10 enterprise th2 64bit i našao potpisan drajver koji se instalira žmurećke i bez ikakvog cimanja ...dakle instalirate ga samo next-next:
Po instalaciji drajvera odlazite do Device managera da proverite da li je sve OK instalirano:



...ADB.rar otpakujete gde hoćete a kada to uradite onda dođete do mesta na kome ste raspakovali ADB.rar i to tako da otvorite folder ADB kako biste mogli da vidite njegov sadržaj a zatim na tastaturi stisnete shift+desni klik miša i iz kontekstnog menija koji se pojavio birate "Open Command Window Here":

...otvoriće vam se Command prompt u kome kucate (ili copy-paste) liniju po liniju teksta s tim što posle svake linije udarate enter:

Kod:
adb root
adb disable-verity
adb reboot



i uređaj se restartovao a onda kada se sistem inicijalizuje kucamo:

Kod:
adb root
adb push RootChuwiVi7 /data/local/tmp/



{ja sam prethodnu komandu ukucao i pre nego što se sistem potpuno inicijalizovao pa sam dobio grešku koja je na skrinšotu uokvirena crvenom bojom - ništa zato, malo sačekao pa ponovio i onda je sve bilo OK}:

Kod:
adb shell /system/bin/sh -x /data/local/tmp/vi7root
adb reboot

...posle ove komande bude puno dešavanja u konzoli pa je zato neću skrinšotovati već ću kopirati tekst pod spojler kako biste znali šta očekujete da vidite posle ovog poteza:
Kod:
C:\Users\Marko\ADB>adb shell /system/bin/sh -x /data/local/tmp/vi7root
+ SU_DIR=/data/local/tmp
+ ARCH=x86
+ echo '- Rooting Chuwi Vi7'
- Rooting Chuwi Vi7
+ '[' ! -f /data/local/tmp/x86/supolicy ']'
+ mount -o rw,remount /system
+ touch /system/casacristo
+ '[' ! -f /system/casacristo ']'
+ rm /system/casacristo
+ '[' ! -e /system/app/SuperSU ']'
+ echo 'creating /system/app/SuperSU'
creating /system/app/SuperSU
+ mkdir -p /system/app/SuperSU
+ cp_chmod_chcon /data/local/tmp/common/Superuser.apk /system/app/SuperSU/SuperSU.apk 0644 u:object_r:system_file:s0
+ cp /data/local/tmp/common/Superuser.apk /system/app/SuperSU/SuperSU.apk
+ chmod 0644 /system/app/SuperSU/SuperSU.apk
+ chcon u:object_r:system_file:s0 /system/app/SuperSU/SuperSU.apk
+ cp_chmod_chcon /data/local/tmp/common/install-recovery.sh /system/etc/install-recovery.sh 0755 u:object_r:toolbox_exec:s0
+ cp /data/local/tmp/common/install-recovery.sh /system/etc/install-recovery.sh
+ chmod 0755 /system/etc/install-recovery.sh
+ chcon u:object_r:toolbox_exec:s0 /system/etc/install-recovery.sh
+ '[' ! -e /system/app/rootverifier ']'
+ '[' ! -f /system/etc/install-recovery-2.sh ']'
+ echo 'preserving factory install-recovery.sh'
preserving factory install-recovery.sh
+ cp /system/bin/install-recovery.sh /system/etc/install-recovery-2.sh
cp: /system/bin/install-recovery.sh: No such file or directory
+ rm /system/bin/install-recovery.sh
rm: /system/bin/install-recovery.sh: No such file or directory
+ ln -s /system/etc/install-recovery.sh /system/bin/install-recovery.sh
+ chmod 0755 /system/etc/install-recovery.sh
+ '[' ! -f /system/xbin/su.factory ']'
+ '[' ! -e /system/bin/.ext ']'
+ echo 'creating /system/bin/.ext'
creating /system/bin/.ext
+ mkdir -p /system/bin/.ext
+ cp_chmod_chcon /data/local/tmp/x86/su /system/xbin/su 0755 u:object_r:system_file:s0
+ cp /data/local/tmp/x86/su /system/xbin/su
+ chmod 0755 /system/xbin/su
+ chcon u:object_r:system_file:s0 /system/xbin/su
+ cp_chmod_chcon /data/local/tmp/x86/su /system/bin/.ext/.su 0755 u:object_r:system_file:s0
+ cp /data/local/tmp/x86/su /system/bin/.ext/.su
+ chmod 0755 /system/bin/.ext/.su
+ chcon u:object_r:system_file:s0 /system/bin/.ext/.su
+ cp_chmod_chcon /data/local/tmp/x86/su /system/xbin/daemonsu 0755 u:object_r:system_file:s0
+ cp /data/local/tmp/x86/su /system/xbin/daemonsu
+ chmod 0755 /system/xbin/daemonsu
+ chcon u:object_r:system_file:s0 /system/xbin/daemonsu
+ cp_chmod_chcon /data/local/tmp/x86/su /system/xbin/sugote 0755 u:object_r:zygote_exec:s0
+ cp /data/local/tmp/x86/su /system/xbin/sugote
+ chmod 0755 /system/xbin/sugote
+ chcon u:object_r:zygote_exec:s0 /system/xbin/sugote
+ cp_chmod_chcon /data/local/tmp/x86/supolicy /system/xbin/supolicy 0755 u:object_r:system_file:s0
+ cp /data/local/tmp/x86/supolicy /system/xbin/supolicy
+ chmod 0755 /system/xbin/supolicy
+ chcon u:object_r:system_file:s0 /system/xbin/supolicy
+ cp_chmod_chcon /data/local/tmp/x86/libsupol.so /system/lib/libsupol.so 0644 u:object_r:system_file:s0
+ cp /data/local/tmp/x86/libsupol.so /system/lib/libsupol.so
+ chmod 0644 /system/lib/libsupol.so
+ chcon u:object_r:system_file:s0 /system/lib/libsupol.so
+ cp_chmod_chcon /system/bin/sh /system/xbin/sugote-mksh 0755 u:object_r:system_file:s0
+ cp /system/bin/sh /system/xbin/sugote-mksh
+ chmod 0755 /system/xbin/sugote-mksh
+ chcon u:object_r:system_file:s0 /system/xbin/sugote-mksh
+ cp_chmod_chcon /system/bin/app_process32 /system/bin/app_process32_original 0755 u:object_r:zygote_exec:s0
+ cp /system/bin/app_process32 /system/bin/app_process32_original
+ chmod 0755 /system/bin/app_process32_original
+ chcon u:object_r:zygote_exec:s0 /system/bin/app_process32_original
+ cp_chmod_chcon /system/bin/app_process32 /system/bin/app_process_init 0755 u:object_r:system_file:s0
+ cp /system/bin/app_process32 /system/bin/app_process_init
+ chmod 0755 /system/bin/app_process_init
+ chcon u:object_r:system_file:s0 /system/bin/app_process_init
+ rm /system/bin/app_process
+ ln -s /system/xbin/daemonsu /system/bin/app_process
+ rm /system/bin/app_process32
+ ln -s /system/xbin/daemonsu /system/bin/app_process32
+ touch /system/etc/.installed_su_daemon
+ chmod 0644 /system/etc/.installed_su_daemon
+ chcon u:object_r:system_file:s0 /system/etc/.installed_su_daemon
+ rm -f /system/bin/su
+ rm -f /system/sbin/su
+ rm -f /vendor/sbin/su
+ rm -f /vendor/bin/su
+ rm -f /system/etc/init.d/99SuperSUDaemon
+ rm -f /system/app/Superuser.apk
+ rm -f /system/app/Superuser.odex
+ rm -f /system/app/SuperUser.apk
+ rm -f /system/app/SuperUser.odex
+ rm -f /system/app/superuser.apk
+ rm -f /system/app/superuser.odex
+ rm -f /system/app/Supersu.apk
+ rm -f /system/app/Supersu.odex
+ rm -f /system/app/SuperSU.apk
+ rm -f /system/app/SuperSU.odex
+ rm -f /system/app/supersu.apk
+ rm -f /system/app/supersu.odex
+ rm -f /system/app/VenomSuperUser.apk
+ rm -f /system/app/VenomSuperUser.odex
+ rm -rf /system/app/VenomSuperUser
+ rm -f '/data/dalvik-cache/*com.noshufou.android.su*'
+ rm -f '/data/dalvik-cache/*/*com.noshufou.android.su*'
+ rm -f '/data/dalvik-cache/*com.koushikdutta.superuser*'
+ rm -f '/data/dalvik-cache/*/*com.koushikdutta.superuser*'
+ rm -f '/data/dalvik-cache/*com.mgyun.shua.su*'
+ rm -f '/data/dalvik-cache/*/*com.mgyun.shua.su*'
+ rm -f '/data/dalvik-cache/*com.m0narx.su*'
+ rm -f '/data/dalvik-cache/*/*com.m0narx.su*'
+ rm -f '/data/dalvik-cache/*Superuser.apk*'
+ rm -f '/data/dalvik-cache/*/*Superuser.apk*'
+ rm -f '/data/dalvik-cache/*SuperUser.apk*'
+ rm -f '/data/dalvik-cache/*/*SuperUser.apk*'
+ rm -f '/data/dalvik-cache/*superuser.apk*'
+ rm -f '/data/dalvik-cache/*/*superuser.apk*'
+ rm -f '/data/dalvik-cache/*VenomSuperUser.apk*'
+ rm -f '/data/dalvik-cache/*/*VenomSuperUser.apk*'
+ rm -f '/data/dalvik-cache/*eu.chainfire.supersu*'
+ rm -f '/data/dalvik-cache/*/*eu.chainfire.supersu*'
+ rm -f '/data/dalvik-cache/*Supersu.apk*'
+ rm -f '/data/dalvik-cache/*/*Supersu.apk*'
+ rm -f '/data/dalvik-cache/*SuperSU.apk*'
+ rm -f '/data/dalvik-cache/*/*SuperSU.apk*'
+ rm -f '/data/dalvik-cache/*supersu.apk*'
+ rm -f '/data/dalvik-cache/*/*supersu.apk*'
+ rm -f '/data/dalvik-cache/*.oat'
+ rm -f '/data/app/com.noshufou.android.su*'
+ rm -f '/data/app/com.koushikdutta.superuser*'
+ rm -f '/data/app/com.mgyun.shua.su*'
+ rm -f '/data/app/com.m0narx.su*'
+ rm -f '/data/app/eu.chainfire.supersu-*'
+ rm -f /data/app/eu.chainfire.supersu.apk
+ echo '- Post-installation script'
- Post-installation script
+ /system/xbin/su --install
+ rm -R /data/local/tmp/common /data/local/tmp/init.rc /data/local/tmp/vi7root /data/local/tmp/x86
+ echo '- Done, now reboot !'
- Done, now reboot !
+ exit 0

C:\Users\Marko\ADB>adb reboot

C:\Users\Marko\ADB>


Uređaj se opet reboot-uje a kada se sistem podigne otići ćemo u app drawer i pokrenuti aplikaciju Root Verifier u kojoj ćemo videti da smo uspešno rutovali uređaj:




linkovi mrtvi, ako mogu novi ako nije problem
 
Član
Učlanjen(a)
27.10.2009
Poruka
358
instaliraj recovery cwm ili twrp i preko toga flešuj supersu.zip

postoje 6 stvari koje bi trebalo da imaš da bi tel, tab , fab imali punu funkciju


1. root supersu
2. cwm ili twrp recovery
3. busy box
4. lucky patcher
5. play prodavnica patched
6. exposed

posle toga imaš neograničenu mogućnost

Drug, može li pojašnjenje, što dobivam sa play prodavnicom patch-iranom i ovaj exposed ne znam šta je...root-ovan mi je svaki uređaj čak mi je cyanogemod 12.1 na mobitelu ali nisam nikada koristio ove zadnje dvije stavke! Hvala unaprijed
 
Natrag
Top