[App] [26.04.2011][v1.2] GingerBreak APK (root for GingerBread)

Search This thread

fangorious

Member
Oct 25, 2010
5
1
why would you need on a nexus s ??
it is one of the most simple phone to root and get superuser ...
there are many guides in the development section for the nexus s look there :)

Last time I checked you could only root a Nexus S with 2.3.3 by unlocking the bootloader, which wipes the whole phone including SD card. I want to root so I can do a full app data backup before I consider flashing CM7. But if rooting wipes my data ... stuck on stock.
 
  • Like
Reactions: ardyhardy

fosormic

Senior Member
Dec 22, 2005
183
11
fails on stock nexus one 2.3.3

Howdy,

Tried a couple times on my Nexus One stock 2.3.3, both from the APK and extracting manually. It runs but I get the same as someone else who posted it at http://pastebin.com/26R7xZAg.

This is what my logcat shows and simply stays there.


Code:
D/AudioHardwareQSD(   67): AudioHardware pcm playback is going to standby.
I/ActivityManager(   95): Starting: Intent { act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 cmp=eu.chainfire.gingerbreak/.MainActivity } from pid 185
I/ActivityManager(   95): Start proc eu.chainfire.gingerbreak for activity eu.chainfire.gingerbreak/.MainActivity: pid=648 uid=10086 gids={1007}
W/ResourceType(   95): Skipping entry 0x7f040007 in package table 0 because it is not complex!
W/ResourceType(   95): Skipping entry 0x7f040008 in package table 0 because it is not complex!
I/ActivityManager(   95): Displayed eu.chainfire.gingerbreak/.MainActivity: +375ms
E/GingerBreak(  648): [GingerBreak][SU+] rm /data/local/tmp/gingerbreak
E/GingerBreak(  648): [GingerBreak][SU+] cat "/data/data/eu.chainfire.gingerbreak/files/gingerbreak.png" > /data/local/tmp/gingerbreak
E/GingerBreak(  648): [GingerBreak][SU+] chmod 0755 /data/local/tmp/gingerbreak
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU+] rm /data/local/tmp/su
E/GingerBreak(  648): [GingerBreak][SU+] cat "/data/data/eu.chainfire.gingerbreak/files/su.png" > /data/local/tmp/su
E/GingerBreak(  648): [GingerBreak][SU+] chmod 0755 /data/local/tmp/su
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU+] rm /data/local/tmp/superuser.apk
E/GingerBreak(  648): [GingerBreak][SU+] cat "/data/data/eu.chainfire.gingerbreak/files/superuser.png" > /data/local/tmp/superuser.apk
E/GingerBreak(  648): [GingerBreak][SU+] chmod 0755 /data/local/tmp/superuser.apk
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU+] rm /data/local/tmp/install.sh
E/GingerBreak(  648): [GingerBreak][SU+] cat "/data/data/eu.chainfire.gingerbreak/files/install.png" > /data/local/tmp/install.sh
E/GingerBreak(  648): [GingerBreak][SU+] chmod 0755 /data/local/tmp/install.sh
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU+] ls "/data/local/tmp/gingerbreak"
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU*] /data/local/tmp/gingerbreak
E/GingerBreak(  648): [GingerBreak][SU+] ls "/data/local/tmp/su"
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU*] /data/local/tmp/su
E/GingerBreak(  648): [GingerBreak][SU+] ls "/data/local/tmp/superuser.apk"
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU*] /data/local/tmp/superuser.apk
E/GingerBreak(  648): [GingerBreak][SU+] ls "/data/local/tmp/install.sh"
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU-]
E/GingerBreak(  648): [GingerBreak][SU*] /data/local/tmp/install.sh
D/dalvikvm(  185): GC_EXPLICIT freed 25K, 49% free 3206K/6279K, external 5135K/6379K, paused 45ms
I/Digital Clock(  533): Update broadcast received.
D/dalvikvm(  648): GC_EXTERNAL_ALLOC freed 169K, 52% free 2623K/5447K, external 2091K/2137K, paused 27ms
E/GingerBreak(  648): [GingerBreak][SU+] /data/local/tmp/gingerbreak
E/DirectVolume(   62): Partition '/devices/platform/goldfish_mmc.0' has a different major than its disk!
D/dalvikvm(  533): GC_EXPLICIT freed 26K, 53% free 2542K/5379K, external 1625K/2137K, paused 63ms
E/DirectVolume(   62): Partition '/devices/platform/goldfish_mmc.0' has a different major than its disk!
E/DirectVolume(   62): Partition '/devices/platform/goldfish_mmc.0' has a different major than its disk!
E/DirectVolume(   62): Partition '/devices/platform/goldfish_mmc.0' has a different major than its disk!
E/DirectVolume(   62): Partition '/devices/platform/goldfish_mmc.0' has a different major than its disk!
E/DirectVolume(   62): Partition '/devices/platform/goldfish_mmc.0' has a different major than its disk!
E/DirectVolume(   62): Partition '/devices/platform/goldfish_mmc.0' has a different major than its disk!
E/DirectVolume(   62): Partition '/devices/platform/goldfish_mmc.0' has a different major than its disk!
E/DirectVolume(   62): Partition '/devices/platform/goldfish_mmc.0' has a different major than its disk!
E/DirectVolume(   62): Partition '/devices/platform/goldfish_mmc.0' has a different major than its disk!
E/DirectVolume(   62): Partition '/devices/platform/goldfish_mmc.0' has a different major than its disk!

etc etc etc (remains here)

Thank you and see you later, gotta run.
 
  • Like
Reactions: behzad185

MOzebra

Member
Aug 31, 2010
22
0
I'm downloading the SDK now to try that. I didn't realize that it was that much different to jailbreak Gingerbread as compared to Froyo.

I'm tired of the storage space restrictions so decided I need to root it.
 

Homesnake

Member
Feb 3, 2011
31
4
*subscribing to thread*

I am very interested in watching which devices this .apk will support in future updates. Hopefully it will work on the Droid X when we get our OTA to 2.3.3
;)
 

tjsomnia

New member
Nov 29, 2009
1
0
Hey, I'm not very active on this forum but I check it out from time to time. Just figured I'd let the op know that his GB root works on the DX .588 firmware. Credit to the finder of the exploit and op for making the .apk! thanks.
 

spinkston

New member
Jul 17, 2010
1
0
worked - droid x 2.3.3 - .588.mb810

had to do adb shell rmdir /data/local/tmp
adb shell mkdir /data/local/tmp
then worked perfectly
 

sarshadd

Senior Member
Dec 29, 2010
203
13
Using a Nexus One...
First I had the "could not extract assets" error so I did:

adb shell rmdir /data/local/tmp
adb shell mkdir /data/local/tmp

Now the exploit runs with no signs of succeeding...forever.

My logcat keeps showing this "system/bin/vold" thing a few other people had and the exploit never succeeds.

Code:
I/DEBUG   ( 1235): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
I/DEBUG   ( 1235): Build fingerprint: 'google/passion/passion:2.3.3/GRI40/102588:user/release-keys'
I/DEBUG   ( 1235): pid: 1264, tid: 1265  >>> /system/bin/vold <<<
I/DEBUG   ( 1235): signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr fff528ac
I/DEBUG   ( 1235):  r0 fffcf187  r1 00000001  r2 fffcf187  r3 000000b3
I/DEBUG   ( 1235):  r4 00016268  r5 afd17ea1  r6 000153f0  r7 000000b3
I/DEBUG   ( 1235):  r8 00015330  r9 00000004  10 000000b3  fp afd17ea1
I/DEBUG   ( 1235):  ip fffffff6  sp 100ffc60  lr fff52884  pc 0000e5ba  cpsr 20000030
I/DEBUG   ( 1235):  d0  3035323235343331  d1  726f6674616c706c
I/DEBUG   ( 1235):  d2  6966646c6f672f64  d3  302e636d6d5f682f
I/DEBUG   ( 1235):  d4  636d6d2f322e6363  d5  6d6d2f74736f685f
I/DEBUG   ( 1235):  d6  3a31636d6d2f3163  d7  6f6c622f61616161
I/DEBUG   ( 1235):  d8  0000000000000000  d9  0000000000000000
I/DEBUG   ( 1235):  d10 0000000000000000  d11 0000000000000000
I/DEBUG   ( 1235):  d12 0000000000000000  d13 0000000000000000
I/DEBUG   ( 1235):  d14 0000000000000000  d15 0000000000000000
I/DEBUG   ( 1235):  d16 0000000000000000  d17 0000000000000000
I/DEBUG   ( 1235):  d18 0000000000000000  d19 0000000000000000
I/DEBUG   ( 1235):  d20 0000000000000000  d21 0000000000000000
I/DEBUG   ( 1235):  d22 0000000000000000  d23 0000000000000000
I/DEBUG   ( 1235):  d24 0000000000000000  d25 0000000000000000
I/DEBUG   ( 1235):  d26 0000000000000000  d27 0000000000000000
I/DEBUG   ( 1235):  d28 0000000000000000  d29 0000000000000000
I/DEBUG   ( 1235):  d30 0000000000000000  d31 0000000000000000
I/DEBUG   ( 1235):  scr 00000000
I/DEBUG   ( 1235): 
I/DEBUG   ( 1235):          #00  pc 0000e5ba  /system/bin/vold
I/DEBUG   ( 1235):          #01  pc 0000e7ee  /system/bin/vold
I/DEBUG   ( 1235):          #02  pc 0000aad8  /system/bin/vold
I/DEBUG   ( 1235):          #03  pc 0000d214  /system/bin/vold
I/DEBUG   ( 1235):          #04  pc 000025aa  /system/lib/libsysutils.so
I/DEBUG   ( 1235):          #05  pc 00001bf6  /system/lib/libsysutils.so
I/DEBUG   ( 1235):          #06  pc 00001d86  /system/lib/libsysutils.so
I/DEBUG   ( 1235):          #07  pc 000118e4  /system/lib/libc.so
I/DEBUG   ( 1235):          #08  pc 000114b0  /system/lib/libc.so
I/DEBUG   ( 1235): 
I/DEBUG   ( 1235): code around pc:
I/DEBUG   ( 1235): 0000e598 63e0bfc8 d009429f 20034a14 21064b14 
I/DEBUG   ( 1235): 0000e5a8 9600447a f7fa447b e013efb2 0e80eb04 
I/DEBUG   ( 1235): 0000e5b8 f8ce2101 fa115028 f894f200 ea2cc040 
I/DEBUG   ( 1235): 0000e5c8 f8840002 b9280040 2b066863 4620d002 
I/DEBUG   ( 1235): 0000e5d8 f982f7ff 81fce8bd 00003dc6 00003dc0 
I/DEBUG   ( 1235): 
I/DEBUG   ( 1235): code around lr:
I/DEBUG   ( 1235): fff52864 ffffffff ffffffff ffffffff ffffffff 
I/DEBUG   ( 1235): fff52874 ffffffff ffffffff ffffffff ffffffff 
I/DEBUG   ( 1235): fff52884 ffffffff ffffffff ffffffff ffffffff 
I/DEBUG   ( 1235): fff52894 ffffffff ffffffff ffffffff ffffffff 
I/DEBUG   ( 1235): fff528a4 ffffffff ffffffff ffffffff ffffffff 
I/DEBUG   ( 1235): 
I/DEBUG   ( 1235): stack:
I/DEBUG   ( 1235):     100ffc20  00000000  
I/DEBUG   ( 1235):     100ffc24  ffffff8c  
I/DEBUG   ( 1235):     100ffc28  00000000  
I/DEBUG   ( 1235):     100ffc2c  00000000  
I/DEBUG   ( 1235):     100ffc30  00000000  
I/DEBUG   ( 1235):     100ffc34  00016268  
I/DEBUG   ( 1235):     100ffc38  afd17ea1  /system/lib/libc.so
I/DEBUG   ( 1235):     100ffc3c  000153f0  
I/DEBUG   ( 1235):     100ffc40  000000b3  
I/DEBUG   ( 1235):     100ffc44  00015330  
I/DEBUG   ( 1235):     100ffc48  00000004  
I/DEBUG   ( 1235):     100ffc4c  000000b3  
I/DEBUG   ( 1235):     100ffc50  afd17ea1  /system/lib/libc.so
I/DEBUG   ( 1235):     100ffc54  afd1cc73  /system/lib/libc.so
I/DEBUG   ( 1235):     100ffc58  df002777  
I/DEBUG   ( 1235):     100ffc5c  e3a070ad  
I/DEBUG   ( 1235): #00 100ffc60  00016268  
I/DEBUG   ( 1235):     100ffc64  000153f0  
I/DEBUG   ( 1235):     100ffc68  00015330  
I/DEBUG   ( 1235):     100ffc6c  00014344  
I/DEBUG   ( 1235):     100ffc70  00016268  
I/DEBUG   ( 1235):     100ffc74  000153f0  
I/DEBUG   ( 1235):     100ffc78  00000000  
I/DEBUG   ( 1235):     100ffc7c  0000e7f3  /system/bin/vold
I/DEBUG   ( 1235): #01 100ffc80  afd17ea1  /system/lib/libc.so
I/DEBUG   ( 1235):     100ffc84  00000000  
I/DEBUG   ( 1235):     100ffc88  00000000  
I/DEBUG   ( 1235):     100ffc8c  7665642f  
I/DEBUG   ( 1235):     100ffc90  6f6c622f  
I/DEBUG   ( 1235):     100ffc94  762f6b63  
I/DEBUG   ( 1235):     100ffc98  2f646c6f  
I/DEBUG   ( 1235):     100ffc9c  3a393731  
I/DEBUG   ( 1235):     100ffca0  3433312d  
I/DEBUG   ( 1235):     100ffca4  35323235  
I/DEBUG   ( 1235):     100ffca8  00353530  
I/DEBUG   ( 1235):     100ffcac  00000000  
I/DEBUG   ( 1235):     100ffcb0  00000000  
I/DEBUG   ( 1235):     100ffcb4  00000000  
I/DEBUG   ( 1235):     100ffcb8  00000000  
I/DEBUG   ( 1235):     100ffcbc  00000000  
I/DEBUG   ( 1235):     100ffcc0  00000000  
I/DEBUG   ( 1235):     100ffcc4  00000000  
I/DEBUG   ( 1235):     100ffcc8  00000000  
I/DEBUG   ( 1235):     100ffccc  00000000  
I/DEBUG   ( 1235):     100ffcd0  00000000  
I/DEBUG   ( 1235):     100ffcd4  00000000  
I/DEBUG   ( 1235):     100ffcd8  00000000  
I/DEBUG   ( 1235):     100ffcdc  00000000  
I/DEBUG   ( 1235):     100ffce0  00000000  
I/DEBUG   ( 1235):     100ffce4  00000000  
I/DEBUG   ( 1235):     100ffce8  00000000  
I/DEBUG   ( 1235):     100ffcec  00000000  
I/DEBUG   ( 1235):     100ffcf0  00000000  
I/DEBUG   ( 1235):     100ffcf4  00000000  
I/DEBUG   ( 1235):     100ffcf8  00000000  
I/DEBUG   ( 1235):     100ffcfc  00000000  
I/DEBUG   ( 1235):     100ffd00  00000000  
I/DEBUG   ( 1235):     100ffd04  00000000  
I/DEBUG   ( 1235):     100ffd08  00000000  
I/DEBUG   ( 1235):     100ffd0c  00000000  
I/DEBUG   ( 1235):     100ffd10  00000000  
I/DEBUG   ( 1235):     100ffd14  00000000  
I/DEBUG   ( 1235):     100ffd18  00000000  
I/DEBUG   ( 1235):     100ffd1c  00000000  
I/DEBUG   ( 1235):     100ffd20  00000000  
I/DEBUG   ( 1235):     100ffd24  00000000  
I/DEBUG   ( 1235):     100ffd28  00000000  
I/DEBUG   ( 1235):     100ffd2c  00000000  
I/DEBUG   ( 1235):     100ffd30  00000000  
I/DEBUG   ( 1235):     100ffd34  00000000  
I/DEBUG   ( 1235):     100ffd38  00000000  
I/DEBUG   ( 1235):     100ffd3c  00000000  
I/DEBUG   ( 1235):     100ffd40  00000000  
I/DEBUG   ( 1235):     100ffd44  00000000  
I/DEBUG   ( 1235):     100ffd48  00000000  
I/DEBUG   ( 1235):     100ffd4c  00000000  
I/DEBUG   ( 1235):     100ffd50  00000000  
I/DEBUG   ( 1235):     100ffd54  0000000a  
I/DEBUG   ( 1235):     100ffd58  0000001b  
I/DEBUG   ( 1235):     100ffd5c  00015458  
I/DEBUG   ( 1235):     100ffd60  400090a1  
I/DEBUG   ( 1235):     100ffd64  00000000  
I/DEBUG   ( 1235):     100ffd68  aef02fdd  /system/lib/libsysutils.so
I/DEBUG   ( 1235):     100ffd6c  00000004  
I/DEBUG   ( 1235):     100ffd70  aef02fe5  /system/lib/libsysutils.so
I/DEBUG   ( 1235):     100ffd74  afd13ec7  /system/lib/libc.so
I/DEBUG   ( 1235):     100ffd78  400090a1  
I/DEBUG   ( 1235):     100ffd7c  0000000e  
I/DEBUG   ( 1235):     100ffd80  400090a1  
I/DEBUG   ( 1235):     100ffd84  aef02ff7  /system/lib/libsysutils.so
I/DEBUG   ( 1235):     100ffd88  aef02fdd  /system/lib/libsysutils.so
I/DEBUG   ( 1235):     100ffd8c  11ed6402  
I/DEBUG   ( 1235):     100ffd90  00010c9c  /system/bin/vold
I/DEBUG   ( 1235):     100ffd94  00016368  
I/DEBUG   ( 1235):     100ffd98  00015008  
I/DEBUG   ( 1235):     100ffd9c  00015330  
I/DEBUG   ( 1235):     100ffda0  00000080  
I/DEBUG   ( 1235):     100ffda4  aef02d98  /system/lib/libsysutils.so
I/DEBUG   ( 1235):     100ffda8  aef02dd7  /system/lib/libsysutils.so
I/DEBUG   ( 1235):     100ffdac  aef041cc  
I/DEBUG   ( 1235):     100ffdb0  aef02d98  /system/lib/libsysutils.so
I/DEBUG   ( 1235):     100ffdb4  0000aadb  /system/bin/vold

I've tried restarting the phone with no luck.
Do I need to adb shell rmdir again?

Many thanks,
 
Last edited:

pyee0124

Senior Member
Jan 20, 2010
119
7
BC
Howdy,

Tried a couple times on my Nexus One stock 2.3.3, both from the APK and extracting manually. It runs but I get the same as someone else who posted it at http://pastebin.com/26R7xZAg.

This is what my logcat shows and simply stays there.

Had the same problem with mine. Turns out I needed an SD card inserted to do it.


Anyway, Gingerbreak works for the BELL Motorola Atrix(OLYEM U4 1.4.2-Telstra SBF -- Android 2.2.2)

edit : Atrix instructions here http://xdaforums.com/showpost.php?p=13103420&postcount=2
 

sarshadd

Senior Member
Dec 29, 2010
203
13
figure i'd try it on my Nexus One manually and i either get sendmsg() failed? or volds forever.

i've formatted my sd card, mounted/unmounted, removed sd card, left it out- nothing seems to work.
 

foxdog66

Senior Member
Jul 28, 2010
471
53
worked after a fresh sbf_flash back to 2.2 on a droid 2

i did hafta rmdir /data/local/tmp and mkdir /data/local/tmp
 

sarshadd

Senior Member
Dec 29, 2010
203
13
I can't get my root to stick.

I have SuperUser.APK 2.3.6.1 installed ( my su is apparently out of date the .zip it placed on my SDcard is bad so i can't flash it). Is the out of date su the reason why superuser isn't granting, or asking to grant, things root?

or could su itself not have the right permission?
 
Last edited:

sarshadd

Senior Member
Dec 29, 2010
203
13
nexus one


i had to

Code:
# chmod 755 /system/bin
# chmod 4755 /system/bin/su
# chown root /system/bin/su

to get superuser to message me when i ran su because when i used

Code:
mount -o remount,rw -t yaffs2 /dev/block/mtdblock3 /system

alone i kept getting permission errors.

then when i

Code:
mount -o remount,ro /dev/block/mtdblock3 /system

it stopped working altogether again

nvm it was the outdated SU- i flashed the update manually now it works.
 
Last edited:

Top Liked Posts

  • There are no posts matching your filters.
  • 829
    NOTICE: Gingerbreak is an exploit that has been fixed in many of the latest Android versions and releases. If it does not work, it does not work. I can't "fix" the exploit, you will have to wait for a new exploit to come out, or root a different way!

    About
    The GingerBreak APK is a wrapper around the newly released GingerBreak exploit (credits to The Android Exploid Crew), which is meant to attain root access on GingerBread. This specific exploit may work on various Froyo and Honeycomb versions as well.

    What the APK and exploit do is as follows:
    - The APK puts the right files in the right place to run the exploit
    - The APK runs the exploit
    - The exploit attempts to attain root access
    - If it succeeds, the exploit remounts /system as read-write and runs the installer script
    - The installer script attempts to install the su binary and superuser APK, and reboots

    Some important things to know:
    - You must have USB debugging enabled on your device
    - You need to have an SD card (formatted and) inserted - if it doesn't work, try formatting the SD card in your computer, or switching it with a different (or old, etc) SD card
    - The APK must be installed to device, NOT SD card
    - The exploit may take a while to run, but not more than 10 minutes, if it does, get me a logcat, and reboot the device. In rare occasions, even if the device does not reboot, you may still have root. So check that out after you manually pull battery after 15 minutes or so of being stuck.
    - Always reboot between root attempts!
    - While (temporary?) root access may be attained, due to locked bootloaders, efuses, S-ON, and whatnot this may still not work on your device. For temproot purposes, use the raw binary exploit (linked below), not this APK.
    - The GingerBreak exploit should not be used to attain temproot and continue using the device. It fscks vold, you do not want to be running like that. You want to reboot! So if the root doesn't stick, you (still) have a problem.

    Installation
    - Optional: Press the Thanks button below this post :)
    - Make sure USB debugging is enabled
    - Make sure you have an SD card (formatted and) inserted
    - Get the APK on the phone somehow, and install it
    - Open the APK, press the root button
    - Wait a few minutes. If there are no problems, the device will reboot (note that the reboot itself can take like 10 minutes due to cache wipe)
    - Make sure the Superuser app is install and working
    - Optional: Install BusyBox from Market (I personally prefer the stericsson installer)
    - Optional: Uninstall GingerBreak, you don't need it on your phone anymore
    - Optional: Make a donation ;)

    WARNING: Apparently on some devices the root exploit causes the SD card (internal or external) to be formatted. Also, if it gets stuck but you do see the card mounting/unmounting, try formatting your SD card yourself and try again (or use a different SD card) - often this works (a fix for both issues is being looked at)

    NO IT DOES NOT WORK ON THE GALAXY ACE (yet ?)

    WORKS ON A RARE SGS2, BUT NOT ON MOST (seems to be only pre-release devices that are rootable this way)

    ACER A500 / ICONIA Look here (click). Will eventually be integrated, I guess :)

    Donate
    Donate to Chainfire by PayPal: click this link
    Donate to The Android Exploid Crew by PayPal: 7-4-3-C@web.de

    Report!
    Please report back if it does or doesn't work on specific devices. If it doesn't, don't forget to post your logcat as attachment, and mention your device details and GingerBreak version.

    Credits
    - I made the APK and did some slight modding to the exploit code to install from an APK
    - The exploit ("GingerBreak") itself is made by The Android Exploid Crew. Original code can be found here: http://c-skills.blogspot.com/2011/04/yummy-yummy-gingerbreak.html

    Manual rooting
    From v1.1 it is no longer possible to manually root the device over an ADB connection using the files from this APK. Please use the original binaries from the c-skills website to do this. There are several guides posted here on XDA about how to do this manually, some are mentioned/linked-to in the first few pages of this thread.

    Note
    GingerBreak is not specific to any device, but there is code in there that may not work on device X or Y. The exploit is generic, but that does not mean one size fits all, nor does it mean that there will be no firmwares out there that fix this exploit. A special version may need to be compiled for your device, ask your favorite hacker from your specific device's forum. This APK is meant to make the process easier, but also adds dependancies so that it may not work on your device.

    AGAIN, THIS DOES NOT WORK ON S-ON DEVICES !

    Changelog

    26.04.2011: v1.2
    - Removed some code that may break operation while the code itself isn't needed
    - Added UnRoot option
    - The APK now logs exploit output semi-live

    22.04.2011: v1.1
    - Modded exploit code to not need /data/local/tmp - this should fix the problem extracting assets as well as be more compatible with various devices (in theory). In case the APK notices that this cannot work, it will warn you about this.
    - Added some warnings and errors to the APK

    21.04.2011: v1.0
    - First release of APK
    - Slight mods to the exploit source to have it work better from APK
    95
    Sources

    Attached archive contains the modified sources for the exploit part of this APK. I will publish new versions only when it changes; the APK may be updated to a newer version, this does not necessarily mean the exploit has changed :)

    Also, apologies for the few days delay in posting the source.
    18
    Evo 3d

    Hey devs!
    I just wanted Tor know if it works ob the HTC EVO 3d CDMA with Android 2.3.4?
    If it does not work, are there any alternatives.
    18
    Are there any alternative apps avaiable?
    8
    Genius tool!

    PS: if you want it to work on Galaxy S II: extract in /app-cache instead of /data/local/tmp

    Will be looked at! (I'm sure it'll need more modifications for other devices as well, hehe)