On Tue, Jul 12, 2022 at 08:59:25PM +0200, Denis 'GNUtoo' Carikli wrote: > On Mon, 11 Jul 2022 17:43:40 -0400 > "A. F. Cano" <af...@comcast.net> wrote: > > ... > It's also possible to know that by looking at LineageOS source code > instead. For instance I often look to the scripts that extract non-free > software from a device to understand what needs to be replaced with > free software or avoided. > > This makes it easy to evaluate devices for Replicant without even having > to buy them. And we don't ever need to download nonfree software to do > that. > > The file names of the nonfree software can also give us some > indications on the modem protocols being used.
Good to know that. I'll keep it mind for down the road. > ... > I think that it would be really useful to have free rooting software > because users should be in control. Managed to do it again. Details follow. This page shows all the official firmware versions available: https://desktop.firmware.mobi/device:411 The phone I have came with the original Android 7.0, security patch of 2017-05-01. In the process of experimenting I upgraded to the latest version, security patch 2018-03-01. All these versions (6 available) generate a page with the official images (recovery.img and boot.img) as well as a supposedly rooted (cf-auto-root) recovery.img and cache.img. I tried both the official and rooted images repeatedly for the 2017-05-01 and the 2018-03-01 versions. I could never get the rooted versions to do anything I was expecting, like installing su or the app to gain root access that I had seen the first time I did this. Going back to my notes, the images that worked are here: https://androidfilehost.com/?fid=962187416754464638 This is the file: CF-Auto-Root-zerofltetmo-zeroflteue-smgt920t.zip Inside this file are: -rw-r--r-- 1 afc afc 41955584 Aug 17 2017 cache.img -rw-r--r-- 1 afc afc 26632192 Aug 17 2017 recovery.img The dates match the original patch date, and so I re-installed that version (2017-05-01) and then flashed these two: heimdall flash --RECOVERY recovery.img --no-reboot and turned the phone off with VOL DOWN-HOME-POWER for a few seconds. Then: heimdall flash --CACHE cache.img After putting it again in download mode. Upon reboot there finally were lots of messages. This image was doing what was needed: patching, installing the Super SU app, su and whatever else was needed. After adb shell, I could su. Still adb root still claimed that it was not possible in a production environment. It is also possible that these images work with the next 2 releases, security patch 2017-07-01. > ... > A way to check would be to unpack the boot and recovery images you > were trying to flash and see what's in them. I suppose these images can be mounted as loop devices. While the phone was rooted I made tar balls of the cache, efs, sbfs, su and system partitions. I'll investigate what's there at some point. Couldn't tar the data partition as that was the only place I found where I could put the tar file and the exclude option to tar (to exclude the file I was creating) didn't work. The phone is now returned for replacement since it had hardware issues. I'll continue when I get the replacement. > ... > As for rooting, I think it would be super useful to be able to do that > with free software. And rooting software is not an issue for the > guidelines if it's free software and has no nonfree dependencies. Mmm... Is what I've found above free software? In any case, thank you very much for your help. Feel free to use the above in the "RootingDevices" wiki. > References: > ----------- > [1]https://redmine.replicant.us/projects/replicant/wiki/RootingDevices > [2]https://www.gnu.org/distros/free-system-distribution-guidelines.html > > Denis. Augustine _______________________________________________ Replicant mailing list Replicant@osuosl.org https://lists.osuosl.org/mailman/listinfo/replicant