See anything interesting?
[root@mzito ~]# lsusb Bus 001 Device 002: ID 8087:0024 Intel Corp. Integrated Rate Matching Hub Bus 002 Device 012: ID 8087:09ef Intel Corp. Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 003 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 009: ID 0fce:5182 Sony Ericsson Mobile Communications AB Bus 001 Device 003: ID 8087:07da Intel Corp. Bus 001 Device 004: ID 2232:1024
No? Neither did I. But one of those “Intel Corp.” devices is actually my Intel Yolo, booted in
droidboot mode. I hadn’t noticed it at first, but upon closer inspection I saw that indeed one of those was the Yolo, and it was detected with
[root@mzito ~]# fastboot -i 8087 devices MedfieldXXXXXXXX fastboot [root@mzito ~]# fastboot -i 8087 reboot rebooting... finished. total time: 0.116s
So rebooting works… cool. I won’t have time to test anything else for a week or so, and we don’t have any kernel source or stock ROM dumps, so there’s not much we can do yet anyways.
 Boot into droidboot mode either by powering on the handset while holding Volume Down (or Up also seems to work), or by issuing
adb reboot bootloader
8 thoughts on “Fastboot on the Intel Yolo”
Got myself one of these nice phones as well. But my first issue is getting myself a intel medfield drivers set. Do you think we will be able to obtain root trough any of the standard exploits (one-click root or anything similar).
I don’t think we’ll be able to get root via the “normal” methods as I don’t think any of those exploits work on Android 4.0+. Hopefully the bootloader isn’t locked, and we’ll be able to create and flash custom bootimages which install root for us. I have yet to locate the kernel source or any stock ROM dumps yet, so we are really working in the dark so far.
Jeps, you are completely right. Nice phone though. Screen is a bit of a disappointment but it’s crazy fast!
It’s Cyrus (cyb3rpunk.pc).
Finally I rooted my Xolo X500 AKA INTEL YOLO from safaricom..
I found the Local Root exploit ” Saurik’s offset exploit”
However i found GUI tool,
Also linux versions available..
Just droap the Su binary to $path..
As you are Linux user i think you can take care of rest.
However if any difficulty persists.. You can shoot me mail..
Hey can you do me a favour ?
We both have Clone Devices, however our carrier being different we have differnent system apps.
Can you Send me your list.
“ls -al /system/apk/”
And one other thing, please spread this trick as much as you can..
Wow, that’s really nice to have root after all these months, I’ll tell some people who will be glad to hear. I sold my device almost immediately after I got it, though (due to no root and no kernel source)! Has Intel released any kernel source yet?
not yet, but I belive that development of razr I or acer liquid would be ported to this device ..
Btw, check this tread on Modaco, medfield is medfield right? Think the biggest problem of modding roms is the fact that this is a x86 cpu, so requires some additional porting steps:
There is NO STANDARD WAY OF ROOTING DEVICE except FASTBOOT ..
RECOVERY IS LOCKED(Singature FAILURE)
X86 exploits dont work (Local Root Exploits)
NO Root for Restore exploit works …
Stuck with Phone !!!
Does OEM provide OEM UNLOCK FEATURE ?
Comments are closed.