Ok, spent A LOT of time today reading that thread by tucstwo....
Please Login or Register to see this Hidden Content
So, finally... Razr Maxx HD is rooted.
NOTE TO OTHER NOOBS: tucstwo's thread is a conglomerate of issues and fixes to the OP. So while it is worthwhile to read a lot of that thread, you should be able to root using the OP itself.
I then installed Voodoo OTA Rootkeeper from Google Play Store. I loaded the app and hit the button to "Protect root".
Question: Is this something I should do now, or do just before an OTA is expected (assuming I've turned off automatic updates by disabling "Motorola Services" app)?
Issue: Somewhere in the thread, SamuriHL says to go get an updated su and Superuser.apk from Chainfire, but when I so with the link provided, the date/time stamp on the new files, after extraction, was 5 yrs older than the current files (located in root directory of SamuriHL's motochopper utility). I decided not to update with the older files.
Success screen from RUN.BAT:
[*]
[*] Motochopper: Android root exploit (Windows version)
[*] v1.3
[*] by Dan Rosenberg (@djrbliss) - Updated by SamuriHL
[*]
[*] Tested on the Motorola Razr HD, Razr M, Razr Maxx HD, and Atrix HD.
[*] Supports lots of other devices as well. ;-)
[*]
[*] Before continuing, ensure that USB debugging is enabled, that you
[*] have the latest USB drivers installed, and that your phone
[*] is connected via USB.
[*]
[*] WARNING: This will likely void the warranty on your device. I am
[*] not responsible for any damage to your phone as a result using this
[*] tool.
[*]
[*] Press enter to root your phone...
Press any key to continue . . .
[*]
[*] Waiting for device...
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
[*] Device found.
[*] Rebooting to AP Fastboot mode...
[*] Checking for system.img or system.img.ext4 ...
[*] Flashing old boot.img
< waiting for device >
sending 'boot' (10240 KB)...
OKAY [ 0.790s]
writing 'boot'...
OKAY [ 5.540s]
finished. total time: 6.332s
[*] Rebooting...
rebooting...
finished. total time: 0.005s
[*] Waiting for device...
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
[*] Device found.
[*] Pushing exploit...
2258 KB/s (1283460 bytes in 0.555s)
[*] Pushing root tools...
2281 KB/s (112164 bytes in 0.048s)
2750 KB/s (1867568 bytes in 0.663s)
3106 KB/s (1953159 bytes in 0.614s)
pkg: /data/local/tmp/Superuser.apk
Success
[*] Rooting phone...
[+] This may take a few minutes.
[+] Success!
[*] Cleaning up...
[*] Exploit complete. Press enter to restore boot.img...
Press any key to continue . . .
[*] Rebooting to AP Fastboot mode...
[*] Restoring boot.img
< waiting for device >
sending 'boot' (10240 KB)...
OKAY [ 0.790s]
writing 'boot'...
OKAY [ 6.508s]
finished. total time: 7.298s
[*] Rebooting...
rebooting...
finished. total time: 0.006s
[*] Root complete. Press enter to exit...
Press any key to continue . . .
That's it. Thanks SamuriHL and Tucstwo and Dan, for all your hardwork. Kaos too
Steph