Manual Method:
Used superoneclick 1.7 (google it; I believe that v.1.9.1 is now out) with rageagainstthecage exploit (NOT psneuter) to get a shell root (i.e., a temporary root).
Then, used following manual method to do permanent root (with included Superuser.apk and RootExplorer.apk (best purchase [Yes, have to purchase this one] from Android Market); DroidXCon suggested using supermanager.apk as a substitute for RootExplorer.apk, but I have not tried that methodology) with following commands (commands are from a Windows 7 command prompt, with proper adb install):
[Enable phone's /system to have files copied and deleted]
adb shell
[Make sure a "#" shows up as a prompt; if you only get a "$", your phone is NOT enabled with temporary root, so you need to re-root it with superoneclick]
mount -o remount,rw -t yaffs2 /system /system
exit
[Copy appropriate files to phone's /system]
adb push su /system/bin
adb push busybox /system/bin
adb push Superuser.apk /system/app
adb push RootExplorer.apk /system/app
[Please note that it is VERY important to install a properly purchased RootExplorer.apk (or an acceptable substitute) to /system/app (and not via market to /data/app), as I believe from experience that ATT has installed an app (probably the ATT Application Manager, though it could be another of the dozen+ crapware .apks that I got rid of after RootExplorer got root permissions) that blocks applications in /data/app from getting root permissions.]
[Set appropriate permissions for su and busybox]
adb shell
cd /system/bin
chmod 4755 su
chmod 555 busybox
exit
[Reboot to kick out temporary root exploit and allow permanent root to take over]
adb reboot
Your phone should now be rooted.
You may want to test your root by opening your Root Explorer (or suitable substitute), and deleting (or renaming) some of the crapware that ATT installed on the phone (found in /system/app), most notably the ATT Application Manager .apk.
Not to belabor the obvious, but the above information is provided "AS-IS" with no warranty or representation of any kind, and all warranties, whether express, implied or statutory, including without limitation warranties therein of fitness for a particular purpose, noninfringement, merchantibility and title, are disclaimed to the maximum extent permitted by applicable law. IN OTHER WORDS, I AM NOT RESPONSIBLE IF YOU BRING ANY HARM TO YOUR PHONE USING ANY OR ALL OF THE INFORMATION I PROVIDE ABOVE.
I cannot wait for LG to release source code and/or someone more talented than me to prepare and release a custom recovery to be provided so that we can have a little more margin for error with this phone.
Used superoneclick 1.7 (google it; I believe that v.1.9.1 is now out) with rageagainstthecage exploit (NOT psneuter) to get a shell root (i.e., a temporary root).
Then, used following manual method to do permanent root (with included Superuser.apk and RootExplorer.apk (best purchase [Yes, have to purchase this one] from Android Market); DroidXCon suggested using supermanager.apk as a substitute for RootExplorer.apk, but I have not tried that methodology) with following commands (commands are from a Windows 7 command prompt, with proper adb install):
[Enable phone's /system to have files copied and deleted]
adb shell
[Make sure a "#" shows up as a prompt; if you only get a "$", your phone is NOT enabled with temporary root, so you need to re-root it with superoneclick]
mount -o remount,rw -t yaffs2 /system /system
exit
[Copy appropriate files to phone's /system]
adb push su /system/bin
adb push busybox /system/bin
adb push Superuser.apk /system/app
adb push RootExplorer.apk /system/app
[Please note that it is VERY important to install a properly purchased RootExplorer.apk (or an acceptable substitute) to /system/app (and not via market to /data/app), as I believe from experience that ATT has installed an app (probably the ATT Application Manager, though it could be another of the dozen+ crapware .apks that I got rid of after RootExplorer got root permissions) that blocks applications in /data/app from getting root permissions.]
[Set appropriate permissions for su and busybox]
adb shell
cd /system/bin
chmod 4755 su
chmod 555 busybox
exit
[Reboot to kick out temporary root exploit and allow permanent root to take over]
adb reboot
Your phone should now be rooted.
You may want to test your root by opening your Root Explorer (or suitable substitute), and deleting (or renaming) some of the crapware that ATT installed on the phone (found in /system/app), most notably the ATT Application Manager .apk.
Not to belabor the obvious, but the above information is provided "AS-IS" with no warranty or representation of any kind, and all warranties, whether express, implied or statutory, including without limitation warranties therein of fitness for a particular purpose, noninfringement, merchantibility and title, are disclaimed to the maximum extent permitted by applicable law. IN OTHER WORDS, I AM NOT RESPONSIBLE IF YOU BRING ANY HARM TO YOUR PHONE USING ANY OR ALL OF THE INFORMATION I PROVIDE ABOVE.
I cannot wait for LG to release source code and/or someone more talented than me to prepare and release a custom recovery to be provided so that we can have a little more margin for error with this phone.
Last edited: