购物车中没有商品
2020年4月3日 3:54:32

Howto: Rooting DJI Crystal Sky

11 months ago
#1120 引用
Richie wrote:
Confirmed, after a reboot the dji.pilot.pad is still present in that file after several reboots.


And today, for some unknown reason, the custom GO4 app has vanished again and I had to pm-enable it once more :(

Do we think the xml file is being overwritten by a backup / cached copy?

If so, do we know where that is stored?

Can we script something  to run the "pm enable" each time the CS boots?

(or make a one-click android app??)
0
11 months ago
#1231 引用
Can this be done on a Mac or must it be a windows pc?

Thanks
Allan
0
7 months ago
#3892 引用
It's done , my root is done !
My DJI GO, Litchy & Pix4D apps works great on the Mavic Pro 1 + CrystalSky5,5'
- Downgrade of the drone firmware to 01.03.0700 against Altitude Limiter & Geofence.
- Together with the NLD GO 4.1.22 CS App for CrystalSky

Thanks DJI, CantRepeat and NoLimitDronez =)
0
5 months ago
#4216 引用
Thanks a lot for this absolutely great Guide!
I have done the rooting and everything worked fine for me.

But now i get the offer via Google Play  to update my Go4 App to the latest Version.
I am a little bit concerned to do this .
Can anyone confirm that this is a good thing or is there any risk of problems with G4 or to brick the Device?

Thanks a lot in advance for your answer.
0
5 months ago
#4225 引用
bash$ ./copy.sh
checking if adb device is present
List of devices attached
1TSB3YW039      device

copying files to device
tmp\: 10 files pushed. 3.7 MB/s (8310310 bytes in 2.151s)
/system/bin/sh: chmod: not found
/system/bin/sh: chmod: not found
/system/bin/sh: chmod: not found
bash$


that I'm stuck..
0
2 months ago
#5074 引用
is there a way the new version v3.0.2.0. to root?
0
20 days ago
#5180 引用
I was able to root v3.0.2.0 with csfire, standard method from Linux.
Nothing was different from the instructions and older versions.
No idea who is spreading fake news that the new update made rooting
impossible. It is still an old Android 5.1.1 with 3.10 kernel, so lordroot
and dirtycow methods are still possible.

The only thing I noticed is that adb drivers on Windows are now not compatible
with v3.0.2.0, because the new image reports a different USB VID/PID codes.
So on Win7/Win10 you won't see attached devices on the USB adb bridge.
Use a Linux virtual machine for that (Virtualbox) and the problem is sovled.



DJI Pilot is updated to 1.7.0,
DJI Go 4 is 4.3.16. That's basically all about this "update".
0
18 days ago
#5183 引用
droni wrote:
I was able to root v3.0.2.0 with csfire, standard method from Linux.
Nothing was different from the instructions and older versions.
No idea who is spreading fake news that the new update made rooting
impossible. It is still an old Android 5.1.1 with 3.10 kernel, so lordroot
and dirtycow methods are still possible.

The only thing I noticed is that adb drivers on Windows are now not compatible
with v3.0.2.0, because the new image reports a different USB VID/PID codes.
So on Win7/Win10 you won't see attached devices on the USB adb bridge.
Use a Linux virtual machine for that (Virtualbox) and the problem is sovled.



DJI Pilot is updated to 1.7.0,
DJI Go 4 is 4.3.16. That's basically all about this "update".


Did you use the lordroot on the new firmware? I just want to make sure before I update this.
0
18 days ago
#5185 引用
Yes, as you can see from the build.prop it is 20191209, which corresponds to v3.0.2.0.
0
16 days ago
#5186 引用
To install unathorized .apks not signed by DJI, you need to first patch their
annoying installd which checks for whitelisted set of apps, even when you try
to adb install via root adb shell you still have to call the system installd.
Otherwise you will get an ERR_UNAUTHORIZED_APK message in logcat.
I don't know if this step was necessary on previous versions since this is the first
time I got the CS and wanted to make all the work done on the latest firmware.

I will soon upload a patched installd once I verify it doesn't cause instability or other issues. This will also eliminate the need of various "flashers" that are not
open source and unmaintained. Just click any apk from explorer and install it.
I haven't tested it with open-gapps (Google Play services) but Litchi works fine
with Mapbox.
The idea was to prevent any data leaks to DJI servers and any other 3d party - and there are lots, much more than expected when I saw the traffic logs. This was prevented by a local firewall rule only allowing api.mapbox.com and nothing else.

Also I won't be testing any NLD apks, NFZs, signal boosts etc since they are not compatible with my model (Matrice 200).

As goes for the  regulatory domain hack (5Ghz) - you don't actually need root, all you need is to connect the drone to a WiFi AP which has the country flag set to
the area you want. Then the system will update the /data/property/persist.country.code file with the corresponding code from the access point and open the bands allowed for that specific country. OpenWRT router firmware allows that for example:


config wifi-device 'radio0'
        option type 'mac80211'
        option channel '36'
        option hwmode '11a'
        option country 'US'
        option path 'pci0000:00/0000:00:00.0'
        option htmode 'VHT80'
        option doth '0'
        option txpower '20'
        option txpower_max '20'
        option band '5G'
        option disabled '0'
        option org_htmode 'VHT80'
        option noscan '0'

but that's a whole different topic.
0