Has anyone tried the Kexec exploit on their Droid X?

This is a discussion on Has anyone tried the Kexec exploit on their Droid X? within the Droid X Hacks forums, part of the Droid X Development category; Alot of buzz on the forum-sphere regarding the Kexec bootloader bypass exploit allowing Droid Razr/DX4 users to load custom kernels onto their devices in spite ...


Results 1 to 6 of 6
Like Tree1Likes
  • 1 Post By Goose306

Thread: Has anyone tried the Kexec exploit on their Droid X?

  1. #1
    X Pursuant
    Points: 20,996, Level: 91
    Level completed: 30%, Points required for next Level: 354
    Overall activity: 0%
    Achievements:
    7 days registeredThree Friends100 Experience PointsYour first GroupCreated Album pictures
    Awards:
    Master Tagger
    AdamTomaino's Avatar
    Member #
    434
    Join Date
    Jul 2010
    Location
    Pittsburgh, Pa
    Posts
    683
    Liked
    32 times

    Question Has anyone tried the Kexec exploit on their Droid X?

    Alot of buzz on the forum-sphere regarding the Kexec bootloader bypass exploit allowing Droid Razr/DX4 users to load custom kernels onto their devices in spite of Moto's bootlocking. Seems really promising. Has anyone tried this on the DX yet?-AT

    If you are brave, let me know how it goes. PS you probably should not install a razr kernal on the DX: ) :
    http://www.eternityproject.eu/topic/49-bootloader-bypass-kexec-for-motorola-razr/
    <a href="http://www.eternityproject.eu/topic/49-bootloader-bypass-kexec-for-motorola-razr/" target="_blank">


    Last edited by AdamTomaino; 04-25-2012 at 07:17 AM.
    Knight AdamTomaino of The X Clan!

  2. Droid X Forums
    Ads


  3. #2
    X Conveyor
    Points: 2,956, Level: 33
    Level completed: 38%, Points required for next Level: 94
    Overall activity: 2.8%
    Achievements:
    500 Experience Points250 Experience Points31 days registered100 Experience Points7 days registered
    csphelps76's Avatar
    Member #
    53157
    Join Date
    Dec 2011
    Posts
    287
    Liked
    3 times
    this is for the razr only and will not work on the dx and may even permanently brick the phone...i highly suggest not trying this

    Sent from my Axiom AOKP Razr Maxx using Xparent ICS Blue Tapatalk 2
    ....because i said so....

  4. #3
    X Pursuant
    Points: 20,996, Level: 91
    Level completed: 30%, Points required for next Level: 354
    Overall activity: 0%
    Achievements:
    7 days registeredThree Friends100 Experience PointsYour first GroupCreated Album pictures
    Awards:
    Master Tagger
    AdamTomaino's Avatar
    Member #
    434
    Join Date
    Jul 2010
    Location
    Pittsburgh, Pa
    Posts
    683
    Liked
    32 times
    Quote Originally Posted by csphelps76 View Post
    this is for the razr only and will not work on the dx and may even permanently brick the phone...i highly suggest not trying this

    Sent from my Axiom AOKP Razr Maxx using Xparent ICS Blue Tapatalk 2
    I agree, I am merely asking if the same exploit will work using a "DX" specific kernel. I have seen postings that this same exploit is working for DX4 users.

    According to "kholk" the Admin over at http://www.eternityproject.eu this exploit can easily be ported over to all OMAP4430 device INCLUDING THE DROID X.
    Last edited by AdamTomaino; 04-25-2012 at 07:43 AM.
    Knight AdamTomaino of The X Clan!

  5. #4
    *Rescue Squad*
    Supporting Member
    Points: 8,909, Level: 63
    Level completed: 53%, Points required for next Level: 141
    Overall activity: 43.1%
    Achievements:
    500 Experience Points250 Experience PointsTagger Second Class7 days registered100 Experience Points
    Goose306's Avatar
    Member #
    55759
    Join Date
    Feb 2012
    Location
    Zootown, MT
    Posts
    1,340
    Liked
    79 times
    Quote Originally Posted by AdamTomaino View Post
    I agree, I am merely asking if the same exploit will work using a "DX" specific kernel. I have seen postings that this same exploit is working for DX4 users.

    According to "kholk" the Admin over at http://www.eternityproject.eu this exploit can easily be ported over to all OMAP4430 device INCLUDING THE DROID X.
    Its been discussed for awhile over @Rootz.

    First the DX isn't an OMAP 4430 device. The DX is a an OMAP 3630 device.

    OMAP - Wikipedia, the free encyclopedia

    Basically the kexec exploit for the RAZR isn't the same and won't work. Kexec does work on the DX but its a different process. The fine folks working the Defy (which is OMAP 3630) have exploited kexec, and that was quite awhile ago, but you run into pretty major issues. Like, radio not working, etc.

    kexec on the RAZR has pretty major issues too last I heard, like no working CDMA radio (only GSM) and only one core working atm. Last I heard the Defy folks had given up on it. OMAP 3630 just is no longer a viable development platform to try to work on bootloader bypassing... its not the latest and greatest. They have also tried on the OMAP 3430 platform, which is the original Milestone. Lots of work there.

    You can go here to see what had happened:

    start [And Developers]

    Quoted:
    Latest attempt: Yakk patched 2nd-boot to make it work on the Milestone, but his source code remains partly unpublished at this time. Status: boots another kernel, which Yakk has also patched to get serial output over the USB connector (using custom hardware to connect to it). Currently the booted kernel has some problems with USB and fails to initialize the phone's modem so it crashes. See published code and binaries: here (build number 1.03) and here (build number 2.31). All current development of 2ndboot now going here When GSM is disabled this kexec module is able to boot the system with the recompiled kernel, but it is not really useful as a phone then. WiFi works fine, though. Yakk is now trying to use 2ndboot to start a patched version of mbm, which should be able to initialize the modem and then pass control to a custom Linux kernel. This is still under development, so don't get too excited. We'll keep you posted.
    So, don't get your hopes too high, essentially.

  6. #5
    X Pursuant
    Points: 20,996, Level: 91
    Level completed: 30%, Points required for next Level: 354
    Overall activity: 0%
    Achievements:
    7 days registeredThree Friends100 Experience PointsYour first GroupCreated Album pictures
    Awards:
    Master Tagger
    AdamTomaino's Avatar
    Member #
    434
    Join Date
    Jul 2010
    Location
    Pittsburgh, Pa
    Posts
    683
    Liked
    32 times
    Quote Originally Posted by Goose306 View Post
    Its been discussed for awhile over @Rootz.

    First the DX isn't an OMAP 4430 device. The DX is a an OMAP 3630 device.

    OMAP - Wikipedia, the free encyclopedia

    Basically the kexec exploit for the RAZR isn't the same and won't work. Kexec does work on the DX but its a different process. The fine folks working the Defy (which is OMAP 3630) have exploited kexec, and that was quite awhile ago, but you run into pretty major issues. Like, radio not working, etc.

    kexec on the RAZR has pretty major issues too last I heard, like no working CDMA radio (only GSM) and only one core working atm. Last I heard the Defy folks had given up on it. OMAP 3630 just is no longer a viable development platform to try to work on bootloader bypassing... its not the latest and greatest. They have also tried on the OMAP 3430 platform, which is the original Milestone. Lots of work there.

    You can go here to see what had happened:

    start [And Developers]

    Quoted:


    So, don't get your hopes too high, essentially.
    Thanks for your AWESOME response. My dreams are crushed... time to upgrade
    Knight AdamTomaino of The X Clan!

  7. #6
    X Lurker
    Points: 2,056, Level: 27
    Level completed: 38%, Points required for next Level: 94
    Overall activity: 0%
    Achievements:
    250 Experience Points3 months registered100 Experience Points31 days registered7 days registered
    premodeja's Avatar
    Member #
    23397
    Join Date
    Dec 2010
    Posts
    24
    Liked
    0 times
    Just hop on Gummyjar ICS. I have had it as my phone rom for almost a month and I feel it has breathed new life into it.

Remove Ads

Ads

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

Similar Threads

  1. Exploit found for .621 perhaps?
    By dtroup64 in forum Droid X General Discussion
    Replies: 14
    Last Post: 03-19-2012, 09:52 AM
  2. D3 root exploit patched
    By corki2 in forum Droid X General Discussion
    Replies: 13
    Last Post: 11-22-2011, 04:16 PM
  3. Replies: 12
    Last Post: 08-18-2011, 06:11 AM
  4. Exploit.Linux.Lotoor.d??
    By Koopa Troopa in forum Hacking Help
    Replies: 3
    Last Post: 03-06-2011, 09:18 PM
  5. New droid x / 2 exploit uses voice actions @ lockscreen
    By fused2explod in forum Droid X Hacks
    Replies: 4
    Last Post: 10-17-2010, 02:45 PM

Search tags for this page

droid x bootloader unlock kexec
,

droid x kexec

,
droidx kexec
,
kexec android
,
kexec based boot droid x
,
kexec bootloader bypass
,

kexec droid x

,

kexec exploit

,
kexec razr maxx
,
moto x kexec
Click on a term to search our sites for related topics.

Tags for this Thread