The hard nut has finally cracked! Root privileges have been gained on Motorola Droid 3 after a seriously long delay. The root method isn’t that “single click thingy” we have been seeing for sometime and requires you to have some ADB skills to do the deed. XDA Forum Member, Djrbliss, is responsible for this awesome work of rooting the Motorola Droid 3. According to the exploiter, he was able to identify a vulnerability specific to Motorola devices in the script parsed by the init thread.
And here’s how you gain root on your Droid 3. Before embarking on this one, you will need to have ADB installed on your PC and you can do it by following our comprehensive ADB setup and installation guide posted here.
Disclaimer: Please follow this guide at your own risk. AddictiveTips will not be liable if your device gets damaged or bricked during the process.
1. The first step is to connect your phone to the computer.
2. Now assuming that you have ADB already installed, launch command prompt and type “adb shell”.
3. Now type the following commands:
mv /data/local/12m /data/local/12m.bak
ln -s /data /data/local/12m
4. Once done, reboot your device by long pressing the power button.
5. Once your device reboots, again type ADB Shell in command prompt and this time, type the following commands:
mv /data/local/12m.bak /data/local/12m
mv /data/local.prop /data/local.prop.bak
echo "ro.sys.atvc_allow_netmon_usb=0" > /data/local.prop
echo "ro.sys.atvc_allow_netmon_ih=0" >> /data/local.prop
echo "ro.sys.atvc_allow_res_core=0" >> /data/local.prop
echo "ro.sys.atvc_allow_res_panic=0" >> /data/local.prop
echo "ro.sys.atvc_allow_all_adb=1" >> /data/local.prop
echo "ro.sys.atvc_allow_all_core=0" >> /data/local.prop
echo "ro.sys.atvc_allow_efem=0" >> /data/local.prop
echo "ro.sys.atvc_allow_bp_log=0" >> /data/local.prop
echo "ro.sys.atvc_allow_ap_mot_log=0" >> /data/local.prop
echo "ro.sys.atvc_allow_gki_log=0" >> /data/local.prop
6. After you have type all the commands mentioned above, reboot your device.
7. Once your device reboots, download Root Checker from Market and confirm root privileges.
All credits for the exploit and rooting instructions go to Drjbliss. In case you are facing any issue, want to to thank the developer or leave a donation, then head to the official XDA rooting thread posted here.