Fastboot on the Intel Yolo

See anything interesting?

[root@mzito ~]# lsusb
Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub
Bus 002 Device 012: ID 8087:09ef Intel Corp. 
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 003 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 001 Device 009: ID 0fce:5182 Sony Ericsson Mobile Communications AB 
Bus 001 Device 003: ID 8087:07da Intel Corp. 
Bus 001 Device 004: ID 2232:1024

No? Neither did I. But one of those “Intel Corp.” devices is actually my Intel Yolo, booted in droidboot mode[1]. I hadn’t noticed it at first, but upon closer inspection I saw that indeed one of those was the Yolo, and it was detected with fastboot:

[root@mzito ~]# fastboot -i 8087 devices
MedfieldXXXXXXXX        fastboot
[root@mzito ~]# fastboot -i 8087 reboot

finished. total time: 0.116s

So rebooting works… cool. I won’t have time to test anything else for a week or so, and we don’t have any kernel source or stock ROM dumps, so there’s not much we can do yet anyways.

[1] Boot into droidboot mode either by powering on the handset while holding Volume Down (or Up also seems to work), or by issuing adb reboot bootloader

8 thoughts on “Fastboot on the Intel Yolo

  1. Hi Alan,

    Got myself one of these nice phones as well. But my first issue is getting myself a intel medfield drivers set. Do you think we will be able to obtain root trough any of the standard exploits (one-click root or anything similar).


    1. I don’t think we’ll be able to get root via the “normal” methods as I don’t think any of those exploits work on Android 4.0+. Hopefully the bootloader isn’t locked, and we’ll be able to create and flash custom bootimages which install root for us. I have yet to locate the kernel source or any stock ROM dumps yet, so we are really working in the dark so far.

      1. Jeps, you are completely right. Nice phone though. Screen is a bit of a disappointment but it’s crazy fast!

      2. Hi Alan

        It’s Cyrus (cyb3rpunk.pc).
        Finally I rooted my Xolo X500 AKA INTEL YOLO from safaricom..

        I found the Local Root exploit ” Saurik’s offset exploit”

        However i found GUI tool,

        Also linux versions available..

        Just droap the Su binary to $path..

        As you are Linux user i think you can take care of rest.
        However if any difficulty persists.. You can shoot me mail..

        Hey can you do me a favour ?
        We both have Clone Devices, however our carrier being different we have differnent system apps.

        Can you Send me your list.

        “ls -al /system/apk/”

        And one other thing, please spread this trick as much as you can..

        1. Wow, that’s really nice to have root after all these months, I’ll tell some people who will be glad to hear. I sold my device almost immediately after I got it, though (due to no root and no kernel source)! Has Intel released any kernel source yet?

        2. not yet, but I belive that development of razr I or acer liquid would be ported to this device ..



    X86 exploits dont work (Local Root Exploits)

    NO Root for Restore exploit works …
    Stuck with Phone !!!

    Does OEM provide OEM UNLOCK FEATURE ?

Comments are closed.