スポンサーリンク

LG G2 L-01F/わらうしかない...

これもだめ...ま~、ワンクリックツールをダメ元で試したので個人的にはダメージは有りませんが。
やっぱり名前の通り「LGL22_CwmTools」用でしたね。

Device detected: L-01F (JDQ39B)
Try without fb_mem_exploit fist…

Try to find address in memory…
Attempt msm_cameraconfig exploit…
Detected kernel physical address at 0x00008000 form iomem

You need to manage to get remap_pfn_range address.

Try copying kernel memory… It will take a long time.
Attempt get_user exploit…
Search address in memroy…
Using kallsyms_in_memroy…
Essential address are:
prepare_kernel_cred = 0xc00c37a8
commit_creds = 0xc00c329c
remap_pfn_range = 0xc0144c20
vmalloc_exec = 0xc01521dc
ptmx_fops = 0xc101c4d0

Device detected: L-01F (JDQ39B)
Mapping kernel memory…
Detected kernel physical address at 0x00008000 form iomem
Attempt acdb exploit…
L-01F (JDQ39B L01F11k) is not supported.
Attempt put_user exploit…
OK.

Dump kernel memory…
Finding kallsyms address in memory…
Checking kallsyms_in_memory working…
OK. Ready to unlock security module.

Essential symbols are:
prepare_kernel_cred = 0xc00c37a8
commit_creds = 0xc00c329c
remap_pfn_range = 0xc0144c20
vmalloc_exec = 0xc01521dc
ptmx_fops = 0xc101c4d0

Checking mmc_protect_part…
mmc_protect_part is not found.
Checking ccsecurity…
Found ccsecurity.
Already disabled??
Unlock anyway.
Unlocked LSM.

ここからもう「not supported」...最後の最後でコケられるより、早くに諦めが付きますね。

Device detected: L-01F (JDQ39B)
Attempt acdb exploit…
L-01F (JDQ39B L01F11k) is not supported.
Attempt fj_hdcp exploit…
Attempt msm_cameraconfig exploit…

おお、pushしているぞと思わせ振り…な動きしている。

Attempt put_user exploit…
/dev/block/platform/msm_sdcc.1/by-name/recvery: cannot open for read: No such fi
le or directory
2048+0 records in
2048+0 records out
1048576 bytes transferred in 0.037 secs (28339891 bytes/sec)
[+] loki_patch v2.1
[+] Detected target DoCoMo LG G2 build L-01F
[+] Original kernel address: 00008000
[+] Original ramdisk address: 05000000
[+] Writing device tree.
[+] Output file written to /data/local/tmp//recovery.lok
[+] loki_flash v2.1
[+] Loki validation passed, flashing image.
[+] Loki flashing complete!
Usage: /data/local/tmp//loki_patch [boot|recovery] [aboot.img] [in.img] [out.lok
]
[+] Usage: /data/local/tmp//loki_flash [boot|recovery] [in.lok]
remote object ‘/sdcard/recovery_org.img’ does not exist
恒久Root(with SuperSu)をを取得しますかぁ?(N/Y): y

Device detected: L-01F (JDQ39B)
Try without fb_mem_exploit fist…

アドレスは正常に取得されているようですね。

Essential address are:
prepare_kernel_cred = 0xc00c37a8
commit_creds = 0xc00c329c
remap_pfn_range = 0xc0144c20
vmalloc_exec = 0xc01521dc
ptmx_fops = 0xc101c4d0

Device detected: L-01F (JDQ39B)
Mapping kernel memory…
Attempt acdb exploit…
L-01F (JDQ39B L01F11k) is not supported.
Attempt put_user exploit…
OK.

Dump kernel memory…
Finding kallsyms address in memory…
Checking kallsyms_in_memory working…
OK. Ready to unlock security module.

Essential symbols are:
prepare_kernel_cred = 0xc00c37a8
commit_creds = 0xc00c329c
remap_pfn_range = 0xc0144c20
vmalloc_exec = 0xc01521dc
ptmx_fops = 0xc101c4d0

Checking mmc_protect_part…
mmc_protect_part is not found.
Checking ccsecurity…
Found ccsecurity.
Already disabled??
Unlock anyway.
Unlocked LSM.

でもでも、こっからが問題...ストレージに書き込めないぞ馬鹿野郎になる訳です。

Device detected: L-01F (JDQ39B)

Attempt acdb exploit…
L-01F (JDQ39B L01F11k) is not supported.
Attempt fj_hdcp exploit…
Attempt msm_cameraconfig exploit…

Attempt put_user exploit…
mount rw
mount: mounting /dev/block/platform/msm_sdcc.1/by-name/system on /system failed:
Device or resource busy

Device detected: L-01F (JDQ39B)
Attempt acdb exploit…
L-01F (JDQ39B L01F11k) is not supported.
Attempt fj_hdcp exploit…
Attempt msm_cameraconfig exploit…

Attempt put_user exploit…
終了しました。Let’s Enjoy!
同フォルダ内に純正リカバリがrecovery_org.imgとして保存
されていますので大切に保管してください。
続行するには何かキーを押してください . . .

となりますが「recovery_org.img」が保存されずです...正常終了をしない事が判り切っていているのに試さずにはいられない。
ダメージが無いと言えば嘘になりますね、純正のリカバリーが消えています。直せば良いだけ、文鎮になるよりは遥かにマシです。借り文鎮になっても戻せるので大した事は無いかな。焦らず、気長にゆっくりとでしょうか...

コメント

タイトルとURLをコピーしました