[How-To] Rooting LS670ZVD with GingerBreak (no reverting and OTA works too!)

When i try to use the adb shell it says "error: no device found
check to see if you have debug mode on your cell.. as well as check to see if you have ADB Interface in your device manager when your cell is connected to your computer.
 
i tried rooting with this guide..

i got further the first time around a couple days ago.. now when i try to redo it (my phone is not rooted, the first time was a fail). this happens:

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Documents and Settings\quit_hatin>cd C:\Documents and Settings\quit_hatin\My
Documents\OptimuskRootZVD

C:\Documents and Settings\quit_hatin\My Documents\OptimuskRootZVD>adb shell
$





anything i type after that dollar sign is just being echod
 
i tried rooting with this guide..

i got further the first time around a couple days ago.. now when i try to redo it (my phone is not rooted, the first time was a fail). this happens:

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Documents and Settings\quit_hatin>cd C:\Documents and Settings\quit_hatin\My
Documents\OptimuskRootZVD

C:\Documents and Settings\quit_hatin\My Documents\OptimuskRootZVD>adb shell
$





anything i type after that dollar sign is just being echod
ok.. if u cant do it via adb gimmie a shout on gmail. jondevere@gmail.com
 
  • Like
Reactions: symbiance
Rooting the LG Optimus S with software version LS670ZVD


Big Fat Disclaimer:
1) Make sure you read this guide in it's entirety before attempting root.
2) If you need clarification on any of the steps outlined in this guide, ask before experimenting!
3) As with all Android modifications/tweaks, there is ALWAYS a risk of bricking your device. Make sure you understand all of the steps in this guide before attempting to root your device.
4) Last but not least, I am not responsible for bricks due to your mistakes! You are performing these steps at your own risk.

This guide will work no matter how you updated to LS670ZVD. Therefore KP500 is NOT needed whatsoever!

WARNING: If you screw up on ANY of these instructions, you will have to reboot your phone and try again starting from step 1!!!

NO LONGER RELEVANT: This guide assumes you have added the Android SDK tools directory to your PATH variable. Instructions for Windows 2000/XP can be found here. Instructions for Windows Vista/7 can be found here. With the latest version of the Android SDK, the default tools folder is "platform-tools" which is in the "Android\android-sdk-windows" folder in Program Files. With some versions of the Android SDK the default tools folder is simply "tools" which is in the "Android\android-sdk-windows" folder in Program Files. Your mileage may vary.
Techneek TV (mrinehart93) has a great video tutorial on how to do this in Windows Vista/7. Watch it here.

The su, busybox and gingerbreak binaries as well as the Superuser app are included in OptimusRootZVD.zip, which is attached to this post. The ADB binary can also be found in this file (you won't need ADB in the Windows PATH variable). Thanks DroidXcon!
Make sure you extract the files to an easily accessible folder.

Much kudos to Sebastian for releasing this exploit.

Special thanks to Nick7, Zefie, Beezy, KSmithInNY, and everyone else who tries so hard to free this awesome device from the hands of LG. You guys rock.


Now, on to the guide.


1) Fire up a terminal (cmd.exe on Windows)

2) Change to the directory where you extracted the files from OptimusRootZVD.zip
3) Prepare the /data/local/tmp directory with write permissions (THIS IS REQUIRED!)4) Push the required files to the /data/local/tmp directory5) Fire up the shell
6) Change to the /data/local/tmp directory
7) Set correct permissions. REQUIRED: If you don't do this you will be slapped.
8) Run gingerbreak (this can take a while, so please be patient. If it gets stuck for more than a few minutes, reboot your phone and try again from step 1. This will automatically give you a root shell if successful.)
If that doesn't work, you can try
9) Mount the /system partition read-write
10) Change to the /data/local/tmp directory
11) Copy su and busybox to /system/bin
12) Set correct permissions on su and busybox
13) Exit the shell
14) You're done! You may now reboot and have fun with your rooted Optimus!
If you followed all of the instructions correctly, Superuser has already been installed.



CUSTOM RECOVERY

Now that your phone is rooted, you may now install the Xionia CWMA recovery kernel.

You may elect to use drellisdee's Custom Recovery, but it will cause issues if you have a device with the new LCD display (which means use Xionia CWMA unless you're feeling adventurous AND know exactly what you're doing).



NANDROID BACKUP


Now that your phone is rooted and has a custom recovery kernel, you need to make a nandroid backup. Boot your phone into recovery mode by firing up a Windows command prompt and issue the following command:Your phone will reboot to recovery mode. Once it fully boots to recovery mode, navigate to "backup and restore", then "backup" and your phone will make a nandroid backup for use when you screw something up by being a NOOB.

I get down to step 11 and type, cat su > /system/bin/su
cannot create /system/bin/su: read-only file system
Did I do something wrong?
 
I think I did something wrong. Here is what I have typed:

C:\Users\johnsd3\Desktop\LG>adb shell
$ rm -r /data/local/tmp
rm -r /data/local/tmp
$ mkdir /data/local/tmp
mkdir /data/local/tmp
$ exit
exit

C:\Users\johnsd3\Desktop\LG>adb push gingerbreak /data/local/tmp/gingerbreak
632 KB/s (16830 bytes in 0.026s)

C:\Users\johnsd3\Desktop\LG>adb push su /data/local/tmp/su
827 KB/s (26264 bytes in 0.031s)

C:\Users\johnsd3\Desktop\LG>adb push busybox /data/local/tmp/busybox
586 KB/s (1926944 bytes in 3.208s)

C:\Users\johnsd3\Desktop\LG>adb push Superuser.apk /data/local/tmp/Superuser.apk

734 KB/s (94728 bytes in 0.126s)

C:\Users\johnsd3\Desktop\LG>adb shell
$ cd /data/local/tmp
cd /data/local/tmp
$ chmod 777 /data/local/tmp/*
chmod 777 /data/local/tmp/*
$ ./gingerbreak
./gingerbreak

[**] Gingerbreak/Honeybomb -- android 2.[2,3], 3.0 softbreak
[**] (C) 2010-2011 The Android Exploid Crew. All rights reserved.
[**] Kudos to jenzi, the #brownpants-party, the Open Source folks,
[**] Zynamics for ARM skills and Onkel Budi

[**] donate to 7-4-3-C@web.de if you like
[**] Exploit may take a while!

[+] Detected Froyo!
[+] Found system: 0xafd14129 strcmp: 0xafd1cb9d
[+] Found PT_DYNAMIC of size 264 (33 entries)
[+] Found GOT: 0x000142a8
[+] Using device /devices/platform/goldfish_mmc.0
[*] vold: 0065 GOT start: 0x000142a8 GOT end: 0x000142e8
[*] vold: 0065 idx: -3072 fault addr: 0x000131d8
[+] fault address in range (0x000131d8,idx=-3072)
[+] Calculated idx: -1996
[*] vold: 0923 idx: -0001996
[*] vold: 0923 idx: -0001995
[*] vold: 0923 idx: -0001994
[*] vold: 0923 idx: -0001993
[*] vold: 0923 idx: -0001992
[*] vold: 0923 idx: -0001991
[*] vold: 0923 idx: -0001990
[*] vold: 0923 idx: -0001989
[*] vold: 0923 idx: -0001988
[*] vold: 0923 idx: -0001987
[*] vold: 0923 idx: -0001986
[*] vold: 0923 idx: -0001985
[*] vold: 0923 idx: -0001984
[*] vold: 0923 idx: -0001983
[*] vold: 0923 idx: -0001982
[*] vold: 0923 idx: -0001981
[*] vold: 0923 idx: -0001980
[*] vold: 0923 idx: -0001979
[*] vold: 0923 idx: -0001978
[*] vold: 0923 idx: -0001977
[*] vold: 0923 idx: -0001976
[*] vold: 0923 idx: -0001975
[*] vold: 0923 idx: -0001974
[*] vold: 0923 idx: -0001973
[*] vold: 0923 idx: -0001972


[!] dance forever my only one
# mount -o remount,rw-t yaffs2 /system /system
mount -o remount,rw-t yaffs2 /system /system
Usage: mount [-r] [-w] [-o options] [-t type] device directory
# cd /data/local/tmp
cd /data/local/tmp
# cat su> /system/bin/su
cat su> /system/bin/su
cannot create /system/bin/su: read-only file system
# cat su > /system/bin/su
cat su > /system/bin/su
cannot create /system/bin/su: read-only file system
# cat su > /system/bin/su
cat su > /system/bin/su
cannot create /system/bin/su: read-only file system
# cat su>/system/bin/su
cat su>/system/bin/su
cannot create /system/bin/su: read-only file system
#
 
I think I did something wrong. Here is what I have typed:

C:\Users\johnsd3\Desktop\LG>adb shell
$ rm -r /data/local/tmp
rm -r /data/local/tmp
$ mkdir /data/local/tmp
mkdir /data/local/tmp
$ exit
exit

C:\Users\johnsd3\Desktop\LG>adb push gingerbreak /data/local/tmp/gingerbreak
632 KB/s (16830 bytes in 0.026s)

C:\Users\johnsd3\Desktop\LG>adb push su /data/local/tmp/su
827 KB/s (26264 bytes in 0.031s)

C:\Users\johnsd3\Desktop\LG>adb push busybox /data/local/tmp/busybox
586 KB/s (1926944 bytes in 3.208s)

C:\Users\johnsd3\Desktop\LG>adb push Superuser.apk /data/local/tmp/Superuser.apk

734 KB/s (94728 bytes in 0.126s)

C:\Users\johnsd3\Desktop\LG>adb shell
$ cd /data/local/tmp
cd /data/local/tmp
$ chmod 777 /data/local/tmp/*
chmod 777 /data/local/tmp/*
$ ./gingerbreak
./gingerbreak

[**] Gingerbreak/Honeybomb -- android 2.[2,3], 3.0 softbreak
[**] (C) 2010-2011 The Android Exploid Crew. All rights reserved.
[**] Kudos to jenzi, the #brownpants-party, the Open Source folks,
[**] Zynamics for ARM skills and Onkel Budi

[**] donate to 7-4-3-C@web.de if you like
[**] Exploit may take a while!

[+] Detected Froyo!
[+] Found system: 0xafd14129 strcmp: 0xafd1cb9d
[+] Found PT_DYNAMIC of size 264 (33 entries)
[+] Found GOT: 0x000142a8
[+] Using device /devices/platform/goldfish_mmc.0
[*] vold: 0065 GOT start: 0x000142a8 GOT end: 0x000142e8
[*] vold: 0065 idx: -3072 fault addr: 0x000131d8
[+] fault address in range (0x000131d8,idx=-3072)
[+] Calculated idx: -1996
[*] vold: 0923 idx: -0001996
[*] vold: 0923 idx: -0001995
[*] vold: 0923 idx: -0001994
[*] vold: 0923 idx: -0001993
[*] vold: 0923 idx: -0001992
[*] vold: 0923 idx: -0001991
[*] vold: 0923 idx: -0001990
[*] vold: 0923 idx: -0001989
[*] vold: 0923 idx: -0001988
[*] vold: 0923 idx: -0001987
[*] vold: 0923 idx: -0001986
[*] vold: 0923 idx: -0001985
[*] vold: 0923 idx: -0001984
[*] vold: 0923 idx: -0001983
[*] vold: 0923 idx: -0001982
[*] vold: 0923 idx: -0001981
[*] vold: 0923 idx: -0001980
[*] vold: 0923 idx: -0001979
[*] vold: 0923 idx: -0001978
[*] vold: 0923 idx: -0001977
[*] vold: 0923 idx: -0001976
[*] vold: 0923 idx: -0001975
[*] vold: 0923 idx: -0001974
[*] vold: 0923 idx: -0001973
[*] vold: 0923 idx: -0001972


[!] dance forever my only one
# mount -o remount,rw-t yaffs2 /system /system
mount -o remount,rw-t yaffs2 /system /system
Usage: mount [-r] [-w] [-o options] [-t type] device directory
# cd /data/local/tmp
cd /data/local/tmp
# cat su> /system/bin/su
cat su> /system/bin/su
cannot create /system/bin/su: read-only file system
# cat su > /system/bin/su
cat su > /system/bin/su
cannot create /system/bin/su: read-only file system
# cat su > /system/bin/su
cat su > /system/bin/su
cannot create /system/bin/su: read-only file system
# cat su>/system/bin/su
cat su>/system/bin/su
cannot create /system/bin/su: read-only file system
#

Spaceing is wrong when you mounted the. System

rw -t

Not

rw-t

Sent from my SCH-I500 using Tapatalk
 
So this will work even after the android 2.3 update is pushed?

That's unconfirmed but very unlikely, any software change almost certainly requires a different rooting method.

Best bet is to either wait for a rooting method that has tested to be posted before accepting the OTA update.

Or wait for a 2.3 rom to be posted which will already have root.
 
Hey drew why dont we throw the Shell script in here to make it easier for those who choose to go this route with rooting to make the final steps easier?
 
noobuser1992 said:
one question if i upgrade my phone to 2.3 from 2.2.2 will i have to reroot my hone?

Look back one page ;)

sblood86 said:
That's unconfirmed but very unlikely, any software change almost certainly requires a different rooting method.

Best bet is to either wait for a rooting method that has tested to be posted before accepting the OTA update.

Or wait for a 2.3 rom to be posted which will already have root.

EDIT: That was in reply to whether the rooting method will work, but it applies in this instance as well.
 
Microsoft Windows [Version 6.0.6002]
Copyright (c) 2006 Microsoft Corporation. All rights reserved.

C:\Users\VGARCIA>cd C:\Users\VGARCIA\Desktop\root

C:\Users\VGARCIA\Desktop\root>adb shell
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
$ rm -r /data/local/tmp
rm -r /data/local/tmp
$ mkdir /data/local/tmp
mkdir /data/local/tmp
$ exit
exit

C:\Users\VGARCIA\Desktop\root>adb push gingerbreak /data/local/tmp/gingerbreak
1027 KB/s (16830 bytes in 0.016s)

C:\Users\VGARCIA\Desktop\root>adb push su /data/local/tmp/su
269 KB/s (26264 bytes in 0.095s)

C:\Users\VGARCIA\Desktop\root>adb push busybox /data/local/tmp/busybox
386 KB/s (1926944 bytes in 4.863s)

C:\Users\VGARCIA\Desktop\root>adb push Superuser.apk /data/local/tmp/Superuser.a
pk
848 KB/s (94728 bytes in 0.109s)

C:\Users\VGARCIA\Desktop\root>adb shell
$ cd /data/local/tmp
cd /data/local/tmp
$ chmod 777 /data/local/tmp/*
chmod 777 /data/local/tmp/*
$ ./gingerbreak
./gingerbreak

[**] Gingerbreak/Honeybomb -- android 2.[2,3], 3.0 softbreak
[**] (C) 2010-2011 The Android Exploid Crew. All rights reserved.
[**] Kudos to jenzi, the #brownpants-party, the Open Source folks,
[**] Zynamics for ARM skills and Onkel Budi

[**] donate to 7-4-3-C@web.de if you like
[**] Exploit may take a while!

[+] Detected Froyo!
[+] Found system: 0xafd14129 strcmp: 0xafd1cb9d
[+] Found PT_DYNAMIC of size 264 (33 entries)
[+] Found GOT: 0x000142a8
[+] Using device /devices/platform/goldfish_mmc.0
[*] vold: 0066 GOT start: 0x000142a8 GOT end: 0x000142e8
[*] vold: 0066 idx: -3072 fault addr: 0x000131d8
[+] fault address in range (0x000131d8,idx=-3072)
[+] Calculated idx: -1996
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 23473 idx: -0001996
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 23482 idx: -0001995
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 23506 idx: -0001994
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 23524 idx: -0001993
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 23613 idx: -0001992
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 23760 idx: -0001991
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 23833 idx: -0001990
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 23845 idx: -0001989
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 23984 idx: -0001988
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 24020 idx: -0001987
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 24066 idx: -0001986
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 24074 idx: -0001985
[-] sendmsg() failed?
[*] vold: 24080 idx: -0001984
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 24121 idx: -0001983
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 24135 idx: -0001982
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 24181 idx: -0001981
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[-] sendmsg() failed?
[*] vold: 24217 idx: -0001980
[*] vold: 24217 idx: -0001979
[*] vold: 24217 idx: -0001978
[*] vold: 24217 idx: -0001977
[*] vold: 24217 idx: -0001976
[*] vold: 24217 idx: -0001975
[*] vold: 24217 idx: -0001974
[*] vold: 24217 idx: -0001973
[*] vold: 24217 idx: -0001972


[!] dance forever my only one
# mount -o remount,rw -t yaffs2 /system /system
mount -o remount,rw -t yaffs2 /system /system
# cd /data/local/tmp
cd /data/local/tmp
# cat su > /system/bin/su
cat su > /system/bin/su
# cat busybox > /system/bin/busybox
cat busybox > /system/bin/busybox
# cat Superuser.apk > /data/app/Superuser.apk
cat Superuser.apk > /data/app/Superuser.apk
# chmod 4755 /system/bin/su
chmod 4755 /system/bin/su
# chmod 4755 /system/bin/busybox
chmod 4755 /system/bin/busybox
# exit
exit
$ exit
exit

am i rooted? how do i install a custom rom and which would be best?
 
reboot your phone, go to adb shell, then type su (watch your phone-and allow when super user pops up) then you have to install a custom recovery(see signature), from there, pick the rom you want to install and follow the directions in the guide :)
 
Hey drew why dont we throw the Shell script in here to make it easier for those who choose to go this route with rooting to make the final steps easier?

I will, just not yet. Still working on a few small issues before that awesomeness gets released. It involves a modified gingerbreak so just wanna make sure I get this right before unleashing the beast.
 

Trending Posts

Forum statistics

Threads
956,613
Messages
6,969,183
Members
3,163,588
Latest member
hooram95