|
参考:http://predev.wikidot.com/rooting ^9 l- R$ ?( b; e( [5 y3 ?% m0 U
webos内核下载地址:
5 ?8 C- d' D( x7 bhttp://palm.cdnetworks.net/rom/p ... orp100ewwsprint.jar3 }; h1 g$ B9 l& j4 P* X9 b7 o
请用下载工具3 Q% k! a% b6 d. X6 i. P
3 w& I, j3 r$ x+ i, K+ a G& @! F1 }2 w9 L; j9 G6 \8 V3 @8 \9 f
Enable Root Access 9 n8 T* k8 J9 Q0 {: S9 H, G
The pre has been rooted.It is actually a fairly simple rooting procedure. Look below.
: b+ K# _2 d& k# s" E- I+ n& k6 kRooted Pre
4 G7 _( g% F' k& k4 w7 {Rooting a Pre! p) A' }3 x: Y/ H) s0 p
Procedure:Windows:- Download the WebOS image
- Rename this file to .zip, and extract it
- set the Konami code on your pre (upupdowndownleftrightleftrightbastart), and put it into dev mode. Plug it into your windows laptop after it's booted
- Run the driver installer from the extracted file, it is: webosdoctorp100ewwsprint/resources/NovacomInstaller_x86.msi
- Install Python 2.6
- Get the rooter from subversion: http://svn.saurik.com/repos/webos-dev/trunk/rooter/
- Run talk.py inside of the rooter in subversion, it'll output a bunch of lines. If you see an error, join the irc (irc.freenode.net #webos-internals)
- Turn on the wifi on your pre. Get your pre's IP address, and you can telnet into it (username: root)
- Secure the network access once finished. See Securing the network
Mac OS X:- Download the WebOS image
- Rename this file to .zip, and extract it
- untar resources/NovacomInstaller.pkg.tar.gz (tar -xzvf)
- run NovacomInstaller.pkg
- click through the installer
- put your Pre in dev mode following instructions above
- connect to your mac via USB cable ( no need to select a mode, doesn't seem to matter )
- cd /opt/nova/bin
- ./novaterm
- At this point you should have root
Once you've done this, you can add a permanent backdoor by following the instructions on the wiki backdoor and then you can disable developer mode, but still have access to the Pre over the wifi link# r$ V! e, M+ x. U2 G' V
root@castle:/# lsbin dev etc lib md5sums mnt sbin tmp varboot dspbridge home lost+found media proc sys usrroot@castle:/# uname -aLinux castle 2.6.24-palm-joplin-3430 #1 175.1.15 armv7l unknownroot@castle:/# whoamiroot. @. w. |- E) q* l! U
Credit to Sargun for python script% o2 U# n; j" g( g
; p& p8 [5 G" q
[ 本帖最后由 xkaron001 于 2009-6-11 09:34 编辑 ] |
评分
-
查看全部评分
|