Re: [How-To] Rooting LS670ZVD with GingerBreak (no reverting and
**(Update)** Read through ~50 posts and came up with the phone needing an sd card installed. Pulled a "music" card from my work phone and inserted it. Gingerbreak started counting up and seems to be continueing.
Below is my first attempt. It seems stuck on that last line. What is Gingerbreak telling me?
C:\>cd OptimusRootZVD
C:\OptimusRootZVD>dir
Volume in drive C has no label.
Volume Serial Number is A41B-ED34
Directory of C:\OptimusRootZVD
08/07/2011 11:34 AM <DIR> .
08/07/2011 11:34 AM <DIR> ..
03/30/2011 09:53 PM 410,911 adb.exe
03/30/2011 09:53 PM 96,256 AdbWinApi.dll
03/30/2011 09:53 PM 60,928 AdbWinUsbApi.dll
09/30/2010 01:44 AM 1,926,944 busybox
04/21/2011 05:41 AM 16,830 gingerbreak
09/30/2010 09:47 PM 26,264 su
02/29/2008 02:33 AM 94,728 Superuser.apk
7 File(s) 2,632,861 bytes
2 Dir(s) 21,031,809,024 bytes free
C:\OptimusRootZVD>adb shell
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
$ dir
dir
dir: permission denied
$ ls
ls
config
sdcard
acct
mnt
d
etc
persist
cache
system
sys
sbin
res
proc
init.thunderc.rc
init.rc
init.qcom.rc
init.qcom.post_boot.sh
init.goldfish.rc
init.cappuccino.rc
init
hpfwinit.rc
hpfsinit.rc
default.prop
data
chargerimages
bootimages
root
dev
$ cd /data/local/tmp
cd /data/local/tmp
$ ls
ls
$ cd ..
cd ..
$ ls
ls
tmp
$ cd ..
cd ..
$ ls
ls
opendir failed, Permission denied
$ cd ..
cd ..
$ ls
ls
config
sdcard
acct
mnt
d
etc
persist
cache
system
sys
sbin
res
proc
init.thunderc.rc
init.rc
init.qcom.rc
init.qcom.post_boot.sh
init.goldfish.rc
init.cappuccino.rc
init
hpfwinit.rc
hpfsinit.rc
default.prop
data
chargerimages
bootimages
root
dev
$ rm -r /data/local/tmp
rm -r /data/local/tmp
$ ls /data/local/tmp
ls /data/local/tmp
/data/local/tmp: No such file or directory
$ mkdir /data/local/tmp
mkdir /data/local/tmp
$ ls /data/local/tmp
ls /data/local/tmp
$ exit
exit
C:\OptimusRootZVD>adb push gingerbreak /data/local/tmp/gingerbreak
1051 KB/s (16830 bytes in 0.015s)
C:\OptimusRootZVD>adb push su /data/local/tmp/su
547 KB/s (26264 bytes in 0.046s)
C:\OptimusRootZVD>adb push busybox /data/local/tmp/busybox
1084 KB/s (1926944 bytes in 1.734s)
C:\OptimusRootZVD>adb push Superuser.apk /data/local/tmp/Superuser.apk
1184 KB/s (94728 bytes in 0.078s)
C:\OptimusRootZVD>adb shell
$ cd /data/local/tmp
cd /data/local/tmp
$ chmod 777 /data/local/tmp/*
chmod 777 /data/local/tmp/*
$ ./gingerbreak
./gingerbreak
[**] Gingerbreak/Honeybomb -- android 2.[2,3], 3.0 softbreak
[**] (C) 2010-2011 The Android Exploid Crew. All rights reserved.
[**] Kudos to jenzi, the #brownpants-party, the Open Source folks,
[**] Zynamics for ARM skills and Onkel Budi
[**] donate to
7-4-3-C@web.de if you like
[**] Exploit may take a while!
[+] Detected Froyo!
[+] Found system: 0xafd14129 strcmp: 0xafd1cb9d
[+] Found PT_DYNAMIC of size 264 (33 entries)
[+] Found GOT: 0x000142a8
[+] Using device /devices/platform/goldfish_mmc.0
[*] vold: 0065 GOT start: 0x000142a8 GOT end: 0x000142e8