Well, that's the easy part done. The DROID X2 has been rooted, huzzah! The device was found to be vulnerable to one of the known root exploits out there (Gingerbreak) - apparently Moto couldn't be bothered to patch up the hole (the fix has been backported to 2.2 from AOSP, according to our own Justin Case.) This hasn't been fully confirmed yet, but it seems plausible, given that all previous Motorola Froyo builds have been susceptible to this exploit.
Next on the list: cracking open that bootloader (good luck.)
Droid-life Read More
Well, that was fast. It hasn't been very long since the vold exploit was found that allowed root access to Gingerbread and Honeycomb systems, but Google has already patched it and moved the fix into the AOSP code (see these commits: , , , ). This means that once this update is pushed, we will need to find another route to achieve root access on devices running Gingerbread and Honeycomb.
Don't let this stop you from buying a new device right now, though, because it's far from certain when this fix will actually end up hitting devices. Read More
Neither z4root nor SuperOneClick is currently working on the Charge (though I'm sure someone will come up with a one-click method soon enough), but guess what - Gingerbreak sure does. Follow these instructions, and you should have root and full /system unlock on your Droid Charge in a few minutes. Credit goes to the Exploid Crew and unnamed testers.
No custom recovery, such as ClockworkMod or RA, is available yet, but it is surely going to arrive very soon.
- Permanent root
- Read/write access to /system
- The bootloader is factory unlocked, so no additional fiddling is required
- All Droid Charges survived testing
- No data wipe is needed
Android Police and Team AndIRC disclaim all liability for any harm that may befall your device, including, but not limited to: bricked phones, voided manufacturer warranties, exploding batteries, etc.