Problem with TR976 tablet - loop boot - Android Q&A, Help & Troubleshooting

Hello everyone,
I have a problem with my device - it does not load, because it loops with android logo. It does that because i edited vold.fstab incorrectly, but have the correct lines copy in comments within the file. Problem is i don't have any idea how to enter recovery mode ( if one exist at all at the device ). Device is running Android 4.2 . I managed to get the device to recovery mode by holding VOL+ and plugging in power supply.
ABD see the device as 0123456789ABCDEF
Device does not have shell command.
I managed to get list of some files on it :
adb.exe ls /
000041ed 00000000 569d35a2 .
000041ed 00000000 569d35a2 ..
000041ed 00000000 569d35a2 cache
000041ed 00000000 569d35a2 mnt
000081a4 00000888 00000000 ueventd.rk30board.rc
000081a4 00000fa7 00000000 ueventd.rc
000081a4 00000110 00000000 ueventd.goldfish.rc
000041fd 00000000 569d35a6 tmp
000041ed 00000000 00000000 system
000041ed 00000000 569d35a2 sys
000041e8 00000000 00000000 sbin
000081a4 00021b50 00000000 rk30xxnand_ko.ko.3.0.8+
000081a4 000242df 00000000 rk30xxnand_ko.ko.3.0.36+
000041ed 00000000 00000000 res
000081a4 000040e2 00000000 readahead_list.txt
0000416d 00000000 00000000 proc
000081e8 00000655 00000000 init.rc
000081e8 0001ab34 00000000 init
000041ed 00000000 00000000 etc
000081a4 00000b12 00000000 default.prop
000041ed 00000000 569d35c5 data
000081e8 0003a930 00000000 charger
000081a4 00000c17 00000000 at18.ko
000041c0 00000000 503c74fb root
000041ed 000009c4 569d35a6 dev
adb.exe ls /system
000041ed 00000000 00000000 .
000041ed 00000000 569d35a2 ..
adb.exe ls /etc
000041ed 00000000 00000000 .
000041ed 00000000 569d35a2 ..
000081a4 00000199 00000000 recovery.fstab
adb.exe ls /sys
000041ed 00000000 569d35a2 .
000041ed 00000000 569d35a2 ..
000041ed 00000000 569d3614 fs
000041ed 00000000 569d35a2 devices
000041ed 00000000 569d3614 dev
000041ed 00000000 569d3614 bus
000041ed 00000000 569d35a2 class
000041ed 00000000 569d3614 firmware
000041ed 00000000 569d3614 kernel
000041ed 00000000 569d3614 power
000041ed 00000000 569d3614 module
000041ed 00000000 569d35a2 block
000041ed 00000000 569d3614 android_gsensor
000041ed 00000000 569d3614 sd-sdio
Any help in finding vold.fstab to edit it back to the original is more than welcome !

Hi @Barton69
It looks like you are in Kernel ADB mode. I have T-Chip TR976Q PCB based tablet. Could you provide the following information:
adb.exe dmesg > dmesg.log
adb.exe logcat -> logcat.log

Wow - a response I will do that today

@Tarask1n
i have Android Debug Bridge version 1.0.39 Version 0.0.1-4500957
List of devices attached
0123456789ABCDEF recovery
dmesg.log
adb: usage: unknown command dmesg
logcat.log
- exec '/system/bin/sh' failed: No such file or directory (2) -

Related

Compiling Aircrack-ng-1.1 for Toshiba AC100

Hello,
I'm trying to cross-compile aircrack-ng 1.1 for a Toshiba AC100 in Ubuntu 12.04 x86_64 .
Android version:
4.1.2
CyanogenMod Version:
10-20121202-UNOFFICIAL-ac100
Kernel Version:
3.1.10+
[email protected] #1
Sun Dec 2 15:23:02 MSK 2012
GCC version:
arm-linux-androideabi-gcc (GCC) 4.6 20120106 (prerelease)
Copyright (C) 2011 Free Software Foundation, Inc.
I cross-compiled openssl 1.0.1c using the arm compiler found in ndk-r8d. The compiling process went smooth using this sources:
openssl.org/source/openssl-1.0.1c.tar.gz
The commands I typed to compile openssl were:
Code:
export TOOL_PREFIX=~/android/android-ndk-r8d/toolchains/arm-linux-androideabi-4.6/prebuilt/linux-x86/bin/arm-linux-androideabi-
export SYSROOT=~/android/android-ndk-r8d/platforms/android-14/arch-arm
export CC="$TOOL_PREFIX-gcc -march=armv7-a -mfloat-abi=softfp --sysroot=$SYSROOT"
./Configure android-armv7 shared no-asm
make
Then I compiled aircrack-ng-1.1 from sources (the previous exports need to be recast):
I also changed the aircrack-ng-1.1/src/Makefile to suite my needs:
line 7 replaced with
CFLAGS += -Iinclude -I~/android/openssl-1.0.1c/include
Click to expand...
Click to collapse
line 99 replaced with
LIBSSL = -L~/android/openssl-1.0.1c -l:libssl.so -l:libcrypto.so $(LDFLAGS)
Click to expand...
Click to collapse
"-lpthread" replaced with "-lc" allover the Makefile​
in file common.mak
line 70 replaced with
CFLAGS ?= -g -W -Wall -O3
Click to expand...
Click to collapse
line 59-61 replaced with
else
ifndef CC
CC = $(TOOL_PREFIX)gcc
endif
endif
Click to expand...
Click to collapse
[/INDENT]
<termios.h> substituted to <sys/termios.h> in ./src/aircrack-ng.c, ./src/airodump-ng.c and ./src/wesside-ng.c
The I moved the bins and libraries to the Toshiba using adb and set right permissions:
Code:
make sqlite=false
make install
I've checked aircrack-ng with a test .cap file and it does work.
To use airmon-ng I installed busybox and compiled iwpriv and iw since they are needed.
I tested it with busybox 5.2 and it does work. (airmon-ng script first line must be replaced with "#!/system/bin/sh")
airodump-ng starts correctly in the emulator but, when I try to run it onto the Toshiba AC100, it fails:
Code:
$ airodump-ng
Illegal instruction
Through DDMS I retrieved this log:
Code:
01-16 00:01:50.129: A/libc(1419): Fatal signal 4 (SIGILL) at 0x00013938 (code=1), thread 1419 (airodump-ng)
01-16 00:01:50.230: I/DEBUG(109): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
01-16 00:01:50.230: I/DEBUG(109): Build fingerprint: 'motorola/tervigon/wingray:4.0.4/IMM76/292727:user/release-keys'
01-16 00:01:50.230: I/DEBUG(109): pid: 1419, tid: 1419, name: airodump-ng >>> airodump-ng <<<
01-16 00:01:50.230: I/DEBUG(109): signal 4 (SIGILL), code 1 (ILL_ILLOPC), fault addr 00013938
01-16 00:01:50.280: I/DEBUG(109): r0 00000017 r1 40050b04 r2 0c7b2450 r3 00010fc4
01-16 00:01:50.280: I/DEBUG(109): r4 40051854 r5 00045114 r6 007f5008 r7 00000001
01-16 00:01:50.280: I/DEBUG(109): r8 00024810 r9 00045174 sl 00000000 fp be9f2bec
01-16 00:01:50.280: I/DEBUG(109): ip 00000208 sp be9f09d0 lr 00013934 pc 00013938 cpsr 60000010
01-16 00:01:50.280: I/DEBUG(109): d0 0000000000000000 d1 0000000000000000
01-16 00:01:50.280: I/DEBUG(109): d2 0000000000000000 d3 0000000000000000
01-16 00:01:50.280: I/DEBUG(109): d4 0000000000000000 d5 4186191710000000
01-16 00:01:50.280: I/DEBUG(109): d6 0012750000000000 d7 4132750080000000
01-16 00:01:50.280: I/DEBUG(109): d8 0000000000000000 d9 0000000000000000
01-16 00:01:50.280: I/DEBUG(109): d10 0000000000000000 d11 0000000000000000
01-16 00:01:50.280: I/DEBUG(109): d12 0000000000000000 d13 0000000000000000
01-16 00:01:50.280: I/DEBUG(109): d14 0000000000000000 d15 0000000000000000
01-16 00:01:50.280: I/DEBUG(109): scr 00000010
01-16 00:01:50.280: I/DEBUG(109): backtrace:
01-16 00:01:50.280: I/DEBUG(109): #00 pc 0000b938 /system/bin/airodump-ng (dump_initialize+1244)
01-16 00:01:50.280: I/DEBUG(109): #01 pc 0000b930 /system/bin/airodump-ng (dump_initialize+1236)
01-16 00:01:50.280: I/DEBUG(109): stack:
01-16 00:01:50.280: I/DEBUG(109): be9f0990 00045174
01-16 00:01:50.280: I/DEBUG(109): be9f0994 00000000
01-16 00:01:50.280: I/DEBUG(109): be9f0998 be9f2bec [stack]
01-16 00:01:50.280: I/DEBUG(109): be9f099c be9f095c [stack]
01-16 00:01:50.280: I/DEBUG(109): be9f09a0 be9f0a20 [stack]
01-16 00:01:50.280: I/DEBUG(109): be9f09a4 40051854
01-16 00:01:50.280: I/DEBUG(109): be9f09a8 00045114
01-16 00:01:50.280: I/DEBUG(109): be9f09ac 00000001
01-16 00:01:50.280: I/DEBUG(109): be9f09b0 00000001
01-16 00:01:50.280: I/DEBUG(109): be9f09b4 00024810 /system/bin/airodump-ng
01-16 00:01:50.280: I/DEBUG(109): be9f09b8 007f5008 [heap]
01-16 00:01:50.280: I/DEBUG(109): be9f09bc 40051854
01-16 00:01:50.280: I/DEBUG(109): be9f09c0 40051854
01-16 00:01:50.280: I/DEBUG(109): be9f09c4 00013934 /system/bin/airodump-ng (dump_initialize+1240)
01-16 00:01:50.280: I/DEBUG(109): be9f09c8 df0027ad
01-16 00:01:50.280: I/DEBUG(109): be9f09cc 00000000
01-16 00:01:50.280: I/DEBUG(109): #00 be9f09d0 00000010
01-16 00:01:50.280: I/DEBUG(109): ........ ........
01-16 00:01:50.280: I/DEBUG(109): #01 be9f09d0 00000010
01-16 00:01:50.280: I/DEBUG(109): be9f09d4 00000000
01-16 00:01:50.280: I/DEBUG(109): be9f09d8 00000001
01-16 00:01:50.280: I/DEBUG(109): be9f09dc 00000032
01-16 00:01:50.280: I/DEBUG(109): be9f09e0 00000000
01-16 00:01:50.280: I/DEBUG(109): be9f09e4 be9f2bf4 [stack]
01-16 00:01:50.280: I/DEBUG(109): be9f09e8 00023e1c /system/bin/airodump-ng
01-16 00:01:50.280: I/DEBUG(109): be9f09ec 00000000
01-16 00:01:50.280: I/DEBUG(109): be9f09f0 be9f0a20 [stack]
01-16 00:01:50.280: I/DEBUG(109): be9f09f4 00024810 /system/bin/airodump-ng
01-16 00:01:50.280: I/DEBUG(109): be9f09f8 00000000
01-16 00:01:50.280: I/DEBUG(109): be9f09fc 00000000
01-16 00:01:50.280: I/DEBUG(109): be9f0a00 00000000
01-16 00:01:50.280: I/DEBUG(109): be9f0a04 00000000
01-16 00:01:50.280: I/DEBUG(109): be9f0a08 00000000
01-16 00:01:50.280: I/DEBUG(109): be9f0a0c 00000000
01-16 00:01:50.280: I/DEBUG(109): memory near r1:
01-16 00:01:50.280: I/DEBUG(109): 40050ae4 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): 40050af4 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): 40050b04 0c7b2450 00000000 00000000 00000000 P${.............
01-16 00:01:50.280: I/DEBUG(109): 40050b14 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): 40050b24 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): memory near r2:
01-16 00:01:50.280: I/DEBUG(109): 0c7b2430 ffffffff ffffffff ffffffff ffffffff ................
01-16 00:01:50.280: I/DEBUG(109): 0c7b2440 ffffffff ffffffff ffffffff ffffffff ................
01-16 00:01:50.280: I/DEBUG(109): 0c7b2450 ffffffff ffffffff ffffffff ffffffff ................
01-16 00:01:50.280: I/DEBUG(109): 0c7b2460 ffffffff ffffffff ffffffff ffffffff ................
01-16 00:01:50.280: I/DEBUG(109): 0c7b2470 ffffffff ffffffff ffffffff ffffffff ................
01-16 00:01:50.280: I/DEBUG(109): memory near r3:
01-16 00:01:50.280: I/DEBUG(109): 00010fa4 e1a00003 ebffe197 e3a00000 ebffe18f ................
01-16 00:01:50.280: I/DEBUG(109): 00010fb4 e1a04008 e5880008 e3a00000 ebffe18b [email protected]
01-16 00:01:50.280: I/DEBUG(109): 00010fc4 e3a03000 e3e02000 e5883020 e5882018 .0... .. 0... ..
01-16 00:01:50.280: I/DEBUG(109): 00010fd4 e588201c e5883024 e5883028 e588302c . ..$0..(0..,0..
01-16 00:01:50.280: I/DEBUG(109): 00010fe4 e5883030 e5883034 e588000c eafff966 00..40......f...
01-16 00:01:50.280: I/DEBUG(109): memory near r4:
01-16 00:01:50.280: I/DEBUG(109): 40051834 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): 40051844 00000000 00000000 fffff1f0 00000001 ................
01-16 00:01:50.280: I/DEBUG(109): 40051854 00000032 00000001 00000000 00000010 2...............
01-16 00:01:50.280: I/DEBUG(109): 40051864 00000000 00000071 00000003 0000000f ....q...........
01-16 00:01:50.280: I/DEBUG(109): 40051874 00000000 00000e10 40057485 6f727545 [email protected]
01-16 00:01:50.280: I/DEBUG(109): memory near r5:
01-16 00:01:50.280: I/DEBUG(109): 000450f4 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): 00045104 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): 00045114 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): 00045124 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): 00045134 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): memory near r6:
01-16 00:01:50.280: I/DEBUG(109): 007f4fe8 ffffffff ffffffff ffffffff ffffffff ................
01-16 00:01:50.280: I/DEBUG(109): 007f4ff8 ffffffff ffffffff 00000000 0000020b ................
01-16 00:01:50.280: I/DEBUG(109): 007f5008 6f79656b 302d7475 2d363131 31303030 keyout-0116-0001
01-16 00:01:50.280: I/DEBUG(109): 007f5018 6b2e3035 00737965 00000000 00000000 50.keys.........
01-16 00:01:50.280: I/DEBUG(109): 007f5028 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): memory near r8:
01-16 00:01:50.280: I/DEBUG(109): 000247f0 000000c4 000000c8 000000cc 000000d0 ................
01-16 00:01:50.280: I/DEBUG(109): 00024800 000000d4 000000d8 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): 00024810 00000001 00000007 0000000d 00000002 ................
01-16 00:01:50.280: I/DEBUG(109): 00024820 00000008 00000003 0000000e 00000009 ................
01-16 00:01:50.280: I/DEBUG(109): 00024830 00000004 0000000a 00000005 0000000b ................
01-16 00:01:50.280: I/DEBUG(109): memory near r9:
01-16 00:01:50.280: I/DEBUG(109): 00045154 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): 00045164 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): 00045174 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): 00045184 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): 00045194 00000000 00000000 00000000 00000000 ................
01-16 00:01:50.280: I/DEBUG(109): memory near fp:
01-16 00:01:50.280: I/DEBUG(109): be9f2bcc 00000000 00000000 00009a74 00023cb8 ........t....<..
01-16 00:01:50.280: I/DEBUG(109): be9f2bdc 00023cb0 00023ca8 00023cc0 00000000 .<...<...<......
01-16 00:01:50.280: I/DEBUG(109): be9f2bec 400b33d5 00000001 be9f2cf0 00000000 [email protected],......
01-16 00:01:50.280: I/DEBUG(109): be9f2bfc be9f2cfc be9f2d16 be9f2d3e be9f2e6b .,...-..>-..k...
01-16 00:01:50.280: I/DEBUG(109): be9f2c0c be9f2ea8 be9f2ec1 be9f2ed4 be9f2ee9 ................
01-16 00:01:50.280: I/DEBUG(109): memory near sp:
01-16 00:01:50.280: I/DEBUG(109): be9f09b0 00000001 00024810 007f5008 40051854 [email protected]
01-16 00:01:50.280: I/DEBUG(109): be9f09c0 40051854 00013934 df0027ad 00000000 [email protected]'......
01-16 00:01:50.280: I/DEBUG(109): be9f09d0 00000010 00000000 00000001 00000032 ............2...
01-16 00:01:50.280: I/DEBUG(109): be9f09e0 00000000 be9f2bf4 00023e1c 00000000 .....+...>......
01-16 00:01:50.280: I/DEBUG(109): be9f09f0 be9f0a20 00024810 00000000 00000000 ....H..........
01-16 00:01:50.280: I/DEBUG(109): code around pc:
01-16 00:01:50.280: I/DEBUG(109): 00013918 e58dc004 e08f2002 e594c004 e58dc008 ..... ..........
01-16 00:01:50.280: I/DEBUG(109): 00013928 e594c000 e58dc00c ebffd6f3 e59f3c84 .............<..
01-16 00:01:50.280: I/DEBUG(109): 00013938 f2c00010 e2850078 e2852dc6 e08f3003 ....x....-...0..
01-16 00:01:50.280: I/DEBUG(109): 00013948 e285c068 e285e070 f440078f e5931000 [email protected]
01-16 00:01:50.280: I/DEBUG(109): 00013958 e30301b0 f3c71e1f e1c5a2b2 e151000a ..............Q.
01-16 00:01:50.280: I/DEBUG(109): code around lr:
01-16 00:01:50.280: I/DEBUG(109): 00013914 e59f2ca0 e58dc004 e08f2002 e594c004 .,....... ......
01-16 00:01:50.280: I/DEBUG(109): 00013924 e58dc008 e594c000 e58dc00c ebffd6f3 ................
01-16 00:01:50.280: I/DEBUG(109): 00013934 e59f3c84 f2c00010 e2850078 e2852dc6 .<......x....-..
01-16 00:01:50.280: I/DEBUG(109): 00013944 e08f3003 e285c068 e285e070 f440078f [email protected]
01-16 00:01:50.280: I/DEBUG(109): 00013954 e5931000 e30301b0 f3c71e1f e1c5a2b2 ................
01-16 00:01:50.280: I/DEBUG(109): memory map around fault addr 00013938:
01-16 00:01:50.290: I/DEBUG(109): (no map below)
01-16 00:01:50.290: I/DEBUG(109): 00008000-00023000 /system/bin/airodump-ng
01-16 00:01:50.290: I/DEBUG(109): 00023000-00024000 /system/bin/airodump-ng
01-16 00:01:50.300: I/BootReceiver(279): Copying /data/tombstones/tombstone_04 to DropBox (SYSTEM_TOMBSTONE)
What can I try now? I' not able to figure out which operation is the illegal one ...

Error while booting ubuntu phablet os on tf101

So earlier today I compiled Ubuntu Phone OS for my tf101.
When I flashed it, it booted to a blank screen so I got a logcat:
Code:
I/SurfaceFlinger( 138): SurfaceFlinger is starting
I/SurfaceFlinger( 138): SurfaceFlinger's main thread ready to run. Initializing graphics H/W...
E/libEGL ( 138): eglGetDisplay:121 error 300c (EGL_BAD_PARAMETER)
E/libEGL ( 138): eglInitialize:137 error 3008 (EGL_BAD_DISPLAY)
I/gralloc ( 138): using (fd=14)
I/gralloc ( 138): id = tegra_fb
I/gralloc ( 138): xres = 1280 px
I/gralloc ( 138): yres = 800 px
I/gralloc ( 138): xres_virtual = 1280 px
I/gralloc ( 138): yres_virtual = 1600 px
I/gralloc ( 138): bpp = 32
I/gralloc ( 138): r = 0:8
I/gralloc ( 138): g = 8:8
I/gralloc ( 138): b = 16:8
I/gralloc ( 138): width = 203 mm (160.157639 dpi)
I/gralloc ( 138): height = 127 mm (160.000000 dpi)
I/gralloc ( 138): refresh rate = 60.00 Hz
E/SurfaceFlinger( 138): hwcomposer module not found
W/SurfaceFlinger( 138): getting VSYNC period from fb HAL: 16666666
E/libEGL ( 138): validate_display:245 error 3008 (EGL_BAD_DISPLAY)
F/libc ( 138): Fatal signal 11 (SIGSEGV) at 0xdeadbaad (code=1), thread 139 (SurfaceFlinger)
I/DEBUG ( 89): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
I/DEBUG ( 89): Build fingerprint: 'asus/full_tf101/tf101:4.2.1/JOP40D/eng.david.20130224.182716:userdebug/test-keys'
I/DEBUG ( 89): Revision: '0'
I/DEBUG ( 89): pid: 138, tid: 139, name: SurfaceFlinger >>> /system/bin/surfaceflinger <<<
I/DEBUG ( 89): signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr deadbaad
I/DEBUG ( 89): r0 00000027 r1 00000001 r2 a0000000 r3 deadbaad
I/DEBUG ( 89): r4 00000000 r5 4058cd44 r6 4178db80 r7 4058cdc4
I/DEBUG ( 89): r8 00000000 r9 00003038 sl 00003038 fp 00003147
I/DEBUG ( 89): ip 401daff4 sp 4058cd40 lr 400c8ff3 pc 400c5724 cpsr 60050030
I/DEBUG ( 89): d0 404e000000000000 d1 3fdffffffffed720
I/DEBUG ( 89): d2 3fe0000000000000 d3 0000000000000000
I/DEBUG ( 89): d4 4024000000000000 d5 416fca0555555555
I/DEBUG ( 89): d6 41cdcd6500000000 d7 0000000042700000
I/DEBUG ( 89): d8 0000000000000000 d9 0000000000000000
I/DEBUG ( 89): d10 0000000000000000 d11 0000000000000000
I/DEBUG ( 89): d12 0000000000000000 d13 0000000000000000
I/DEBUG ( 89): d14 0000000000000000 d15 0000000000000000
I/DEBUG ( 89): scr 20000010
I/DEBUG ( 89):
I/DEBUG ( 89): backtrace:
I/DEBUG ( 89): #00 pc 0001a724 /system/lib/libc.so
I/DEBUG ( 89): #01 pc 0001dff1 /system/lib/libc.so (_fwalk+32)
I/DEBUG ( 89):
I/DEBUG ( 89): stack:
I/DEBUG ( 89): 4058cd00 400f4e0c
I/DEBUG ( 89): 4058cd04 00000050
I/DEBUG ( 89): 4058cd08 00000000
I/DEBUG ( 89): 4058cd0c 00000000
I/DEBUG ( 89): 4058cd10 00000063
I/DEBUG ( 89): 4058cd14 400bc37d /system/lib/libc.so (dlmalloc+4988)
I/DEBUG ( 89): 4058cd18 400f2254 /system/lib/libc.so
I/DEBUG ( 89): 4058cd1c 400f21b4 /system/lib/libc.so
I/DEBUG ( 89): 4058cd20 00000000
I/DEBUG ( 89): 4058cd24 400c8ff3 /system/lib/libc.so (_fwalk+34)
I/DEBUG ( 89): 4058cd28 400c82a1 /system/lib/libc.so (_cleanup)
I/DEBUG ( 89): 4058cd2c 4058cd44
I/DEBUG ( 89): 4058cd30 4178db80 [heap]
I/DEBUG ( 89): 4058cd34 4058cdc4
I/DEBUG ( 89): 4058cd38 df0027ad
I/DEBUG ( 89): 4058cd3c 00000000
I/DEBUG ( 89): #00 4058cd40 00000000
I/DEBUG ( 89): ........ ........
I/DEBUG ( 89): #01 4058cd40 00000000
I/DEBUG ( 89): 4058cd44 fffffbdf
I/DEBUG ( 89): 4058cd48 00000000
I/DEBUG ( 89): 4058cd4c 4178db80 [heap]
I/DEBUG ( 89): 4058cd50 4058cdc4
I/DEBUG ( 89): 4058cd54 00000000
I/DEBUG ( 89): 4058cd58 00003038
I/DEBUG ( 89): 4058cd5c 4058cdd4
I/DEBUG ( 89): 4058cd60 00000000
I/DEBUG ( 89): 4058cd64 400c2f7c /system/lib/libc.so (__pthread_clone)
I/DEBUG ( 89): 4058cd68 00000000
I/DEBUG ( 89): 4058cd6c 401d9925 /system/lib/libstdc++.so (operator new(unsigned int)+12)
I/DEBUG ( 89): 4058cd70 00000000
I/DEBUG ( 89): 4058cd74 4009a411 /system/lib/libsurfaceflinger.so (android::SurfaceFlinger::selectConfigForAttribute(void*, int const*, int, int, void**)+42)
I/DEBUG ( 89): 4058cd78 00000001
I/DEBUG ( 89): 4058cd7c 4058cda8
I/DEBUG ( 89):
I/DEBUG ( 89): memory near r2:
I/DEBUG ( 89): 9fffffe0 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 9ffffff0 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): a0000000 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): a0000010 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): a0000020 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): a0000030 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): a0000040 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): a0000050 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): a0000060 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): a0000070 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): a0000080 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): a0000090 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): a00000a0 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): a00000b0 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): a00000c0 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): a00000d0 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89):
I/DEBUG ( 89): memory near r5:
I/DEBUG ( 89): 4058cd24 400c8ff3 400c82a1 4058cd44 4178db80
I/DEBUG ( 89): 4058cd34 4058cdc4 df0027ad 00000000 00000000
I/DEBUG ( 89): 4058cd44 fffffbdf 00000000 4178db80 4058cdc4
I/DEBUG ( 89): 4058cd54 00000000 00003038 4058cdd4 00000000
I/DEBUG ( 89): 4058cd64 400c2f7c 00000000 401d9925 00000000
I/DEBUG ( 89): 4058cd74 4009a411 00000001 4058cda8 4058cdd4
I/DEBUG ( 89): 4058cd84 ffffffff 00000000 4020b5b9 4058cdd4
I/DEBUG ( 89): 4058cd94 4058cdd4 00000000 00003038 4058cdc4
I/DEBUG ( 89): 4058cda4 00000002 00003024 00003142 00003147
I/DEBUG ( 89): 4058cdb4 4009e8bd 4058cdc4 00000000 00000100
I/DEBUG ( 89): 4058cdc4 400bc37d 00100000 4058cdd4 00003022
I/DEBUG ( 89): 4058cdd4 400a7fe8 4178db80 00000007 00000000
I/DEBUG ( 89): 4058cde4 00000008 400a8644 4178d490 4058ce40
I/DEBUG ( 89): 4058cdf4 400a19c0 4178d820 4178d7a0 00100000
I/DEBUG ( 89): 4058ce04 40209ec1 4048d000 4009ea17 005011e3
I/DEBUG ( 89): 4058ce14 4058ce50 4020f8d8 4058ce50 4178d4a4
I/DEBUG ( 89):
I/DEBUG ( 89): memory near r6:
I/DEBUG ( 89): 4178db60 00000000 00000000 00000040 00000062
I/DEBUG ( 89): 4178db70 00000001 00000040 00000000 00000000
I/DEBUG ( 89): 4178db80 00003022 00000008 00003023 00000008
I/DEBUG ( 89): 4178db90 00003024 00000008 00003033 00000004
I/DEBUG ( 89): 4178dba0 00003142 00000001 00003147 00000001
I/DEBUG ( 89): 4178dbb0 00003038 00003038 00000000 00000000
I/DEBUG ( 89): 4178dbc0 00000000 00000000 00000000 00000c61
I/DEBUG ( 89): 4178dbd0 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 4178dbe0 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 4178dbf0 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 4178dc00 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 4178dc10 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 4178dc20 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 4178dc30 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 4178dc40 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 4178dc50 00000000 00000000 00000000 00000000
I/DEBUG ( 89):
I/DEBUG ( 89): memory near r7:
I/DEBUG ( 89): 4058cda4 00000002 00003024 00003142 00003147
I/DEBUG ( 89): 4058cdb4 4009e8bd 4058cdc4 00000000 00000100
I/DEBUG ( 89): 4058cdc4 400bc37d 00100000 4058cdd4 00003022
I/DEBUG ( 89): 4058cdd4 400a7fe8 4178db80 00000007 00000000
I/DEBUG ( 89): 4058cde4 00000008 400a8644 4178d490 4058ce40
I/DEBUG ( 89): 4058cdf4 400a19c0 4178d820 4178d7a0 00100000
I/DEBUG ( 89): 4058ce04 40209ec1 4048d000 4009ea17 005011e3
I/DEBUG ( 89): 4058ce14 4058ce50 4020f8d8 4058ce50 4178d4a4
I/DEBUG ( 89): 4058ce24 4178d7a0 00100000 4058ce50 00000000
I/DEBUG ( 89): 4058ce34 401e2757 400f5228 40209d9d 4178d490
I/DEBUG ( 89): 4058ce44 4178d4a4 401e7ebd 00080001 401e28a1
I/DEBUG ( 89): 4058ce54 00080001 401ea028 00080001 00000000
I/DEBUG ( 89): 4058ce64 00000000 401ea0c0 4178d4a4 00000001
I/DEBUG ( 89): 4058ce74 00000001 00000001 4178d4a4 4058cea0
I/DEBUG ( 89): 4058ce84 400a8644 400a8644 4178d7a0 00100000
I/DEBUG ( 89): 4058ce94 40209ec1 4048d000 4020a3e1 4178d4a4
I/DEBUG ( 89):
I/DEBUG ( 89): memory near r9:
I/DEBUG ( 89): 00003018 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003028 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003038 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003048 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003058 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003068 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003078 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003088 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003098 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000030a8 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000030b8 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000030c8 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000030d8 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000030e8 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000030f8 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003108 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89):
I/DEBUG ( 89): memory near sl:
I/DEBUG ( 89): 00003018 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003028 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003038 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003048 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003058 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003068 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003078 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003088 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003098 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000030a8 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000030b8 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000030c8 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000030d8 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000030e8 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000030f8 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003108 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89):
I/DEBUG ( 89): memory near fp:
I/DEBUG ( 89): 00003124 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003134 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003144 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003154 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003164 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003174 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003184 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003194 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000031a4 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000031b4 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000031c4 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000031d4 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000031e4 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 000031f4 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003204 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89): 00003214 ffffffff ffffffff ffffffff ffffffff
I/DEBUG ( 89):
I/DEBUG ( 89): memory near ip:
I/DEBUG ( 89): 401dafd4 00000000 00000000 00000000 400cc501
I/DEBUG ( 89): 401dafe4 400cc40d 400c3018 400c3038 400b7f85
I/DEBUG ( 89): 401daff4 400c2f74 400b7f99 400cc3b5 401db000
I/DEBUG ( 89): 401db004 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 401db014 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 401db024 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 401db034 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 401db044 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 401db054 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 401db064 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 401db074 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 401db084 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 401db094 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 401db0a4 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 401db0b4 00000000 00000000 00000000 00000000
I/DEBUG ( 89): 401db0c4 00000000 00000000 00000000 00000000
I/DEBUG ( 89):
I/DEBUG ( 89): memory near sp:
I/DEBUG ( 89): 4058cd20 00000000 400c8ff3 400c82a1 4058cd44
I/DEBUG ( 89): 4058cd30 4178db80 4058cdc4 df0027ad 00000000
I/DEBUG ( 89): 4058cd40 00000000 fffffbdf 00000000 4178db80
I/DEBUG ( 89): 4058cd50 4058cdc4 00000000 00003038 4058cdd4
I/DEBUG ( 89): 4058cd60 00000000 400c2f7c 00000000 401d9925
I/DEBUG ( 89): 4058cd70 00000000 4009a411 00000001 4058cda8
I/DEBUG ( 89): 4058cd80 4058cdd4 ffffffff 00000000 4020b5b9
I/DEBUG ( 89): 4058cd90 4058cdd4 4058cdd4 00000000 00003038
I/DEBUG ( 89): 4058cda0 4058cdc4 00000002 00003024 00003142
I/DEBUG ( 89): 4058cdb0 00003147 4009e8bd 4058cdc4 00000000
I/DEBUG ( 89): 4058cdc0 00000100 400bc37d 00100000 4058cdd4
I/DEBUG ( 89): 4058cdd0 00003022 400a7fe8 4178db80 00000007
I/DEBUG ( 89): 4058cde0 00000000 00000008 400a8644 4178d490
I/DEBUG ( 89): 4058cdf0 4058ce40 400a19c0 4178d820 4178d7a0
I/DEBUG ( 89): 4058ce00 00100000 40209ec1 4048d000 4009ea17
I/DEBUG ( 89): 4058ce10 005011e3 4058ce50 4020f8d8 4058ce50
I/DEBUG ( 89):
I/DEBUG ( 89): code around pc:
I/DEBUG ( 89): 400c5704 461ce00b 2b006823 e026d1fb b12468e4
I/DEBUG ( 89): 400c5714 21014a18 6011447a 4b1247a0 24002027
I/DEBUG ( 89): 400c5724 f7fc7018 2106eb32 ec94f7fd 5180f04f
I/DEBUG ( 89): 400c5734 91042006 460aa902 94039402 e87af7fd
I/DEBUG ( 89): 400c5744 46224629 f7fd2002 f7fce884 2106eb1e
I/DEBUG ( 89): 400c5754 ec80f7fd f7fc2001 6960e83e d1dc2800
I/DEBUG ( 89): 400c5764 bf00e7d4 deadbaad 0002c8ec ffffff84
I/DEBUG ( 89): 400c5774 0002fb58 0002fb3c 2400b510 4669b088
I/DEBUG ( 89): 400c5784 9002aa04 94014620 94039400 efd8f7fc
I/DEBUG ( 89): 400c5794 db0642a0 b1139b07 1c419806 98069106
I/DEBUG ( 89): 400c57a4 4620e000 bd10b008 4605b538 f7fc4c06
I/DEBUG ( 89): 400c57b4 42a8e96e d104447c 58e14b04 20006008
I/DEBUG ( 89): 400c57c4 f04fbd38 bd3830ff 0002c818 ffffff88
I/DEBUG ( 89): 400c57d4 460db538 b13db108 481be027 f7fc4478
I/DEBUG ( 89): 400c57e4 2800ed68 e00ed0f7 21024818 f0014478
I/DEBUG ( 89): 400c57f4 1e04fa63 4629db07 ebf2f7fc da052800
I/DEBUG ( 89):
I/DEBUG ( 89): code around lr:
I/DEBUG ( 89): 400c8fd0 4a0e4b0d 41f0e92d 447b4680 589c2600
I/DEBUG ( 89): 400c8fe0 686768a5 f9b5e007 2b00300c 4628dd02
I/DEBUG ( 89): 400c8ff0 430647c0 3f013554 6824d5f5 d1ef2c00
I/DEBUG ( 89): 400c9000 e8bd4630 bf0081f0 00028ff6 ffffffb0
I/DEBUG ( 89): 400c9010 43f0e92d f502fb01 4b16461e 4916460f
I/DEBUG ( 89): 400c9020 447bb087 46149001 aa012001 92039502
I/DEBUG ( 89): 400c9030 90049505 681a585b b1124698 f7ff4630
I/DEBUG ( 89): 400c9040 4630fa2e f7ffa903 4681fe9e 0000f8d8
I/DEBUG ( 89): 400c9050 4630b110 fa30f7ff 0f00f1b9 9c05d005
I/DEBUG ( 89): 400c9060 1b284639 ef4ef019 46204604 e8bdb007
I/DEBUG ( 89): 400c9070 bf0083f0 00028fae ffffff68 46036842
I/DEBUG ( 89): 400c9080 29001e51 da016041 bbacf000 f8126802
I/DEBUG ( 89): 400c9090 601a0b01 00004770 4a104b0f 4604b570
I/DEBUG ( 89): 400c90a0 589b447b 461e6819 f7ffb109 6860f9f8
I/DEBUG ( 89): 400c90b0 2d001e45 da046065 f0004620 4605fb93
I/DEBUG ( 89): 400c90c0 6822e003 5b01f812 68336022 4620b113
I/DEBUG ( 89):
I/DEBUG ( 89): memory map around fault addr deadbaad:
I/DEBUG ( 89): be7f4000-be815000 [stack]
I/DEBUG ( 89): (no map for address)
I/DEBUG ( 89): ffff0000-ffff1000 [vectors]
Does anyone know how to fix this?
cpu999 said:
So earlier today I compiled Ubuntu Phone OS for my tf101.
When I flashed it, it booted to a blank screen so I got a logcat:
...
Does anyone know how to fix this?
Click to expand...
Click to collapse
Same bug, got it on my Nook Color.

[Q] Fedora x86 Zipalign Problem

Hello dear xda family,
I have problem to run zipalign process on my "Fedora x86" , here is my logs:
Code:
======= Backtrace: =========
/lib/libc.so.6(+0x6e2f3)[0xb756c2f3]
/lib/libc.so.6(+0x75e52)[0xb7573e52]
sort[0x8050fc1]
sort[0x804f27e]
sort[0x804f433]
sort[0x804f3a6]
sort[0x804f3a6]
sort[0x804f3a6]
sort[0x804f3a6]
sort[0x8052277]
sort[0x804bddc]
/lib/libc.so.6(__libc_start_main+0xf3)[0xb7517b73]
sort[0x804cf15]
======= Memory map: ========
08048000-08064000 r-xp 00000000 fd:00 1190103 /usr/bin/sort
08064000-08065000 r--p 0001b000 fd:00 1190103 /usr/bin/sort
08065000-08066000 rw-p 0001c000 fd:00 1190103 /usr/bin/sort
08fde000-08fff000 rw-p 00000000 00:00 0 [heap]
4e047000-4e062000 r-xp 00000000 fd:00 1182152 /usr/lib/libgcc_s-4.8.2-20131212.so.1
4e062000-4e063000 r--p 0001a000 fd:00 1182152 /usr/lib/libgcc_s-4.8.2-20131212.so.1
4e063000-4e064000 rw-p 0001b000 fd:00 1182152 /usr/lib/libgcc_s-4.8.2-20131212.so.1
b6edc000-b72fd000 rw-p 00000000 00:00 0
b72fd000-b74fd000 r--p 00000000 fd:00 1190858 /usr/lib/locale/locale-archive
b74fd000-b74fe000 rw-p 00000000 00:00 0
b74fe000-b76b6000 r-xp 00000000 fd:00 1179834 /usr/lib/libc-2.18.so
b76b6000-b76b8000 r--p 001b8000 fd:00 1179834 /usr/lib/libc-2.18.so
b76b8000-b76b9000 rw-p 001ba000 fd:00 1179834 /usr/lib/libc-2.18.so
b76b9000-b76bc000 rw-p 00000000 00:00 0
b76bc000-b76d3000 r-xp 00000000 fd:00 1180239 /usr/lib/libpthread-2.18.so
b76d3000-b76d4000 r--p 00016000 fd:00 1180239 /usr/lib/libpthread-2.18.so
b76d4000-b76d5000 rw-p 00017000 fd:00 1180239 /usr/lib/libpthread-2.18.so
b76e6000-b76e8000 rw-p 00000000 00:00 0
b76e8000-b76ef000 r--s 00000000 fd:00 1181174 /usr/lib/gconv/gconv-modules.cache
b76ef000-b76f0000 rw-p 00000000 00:00 0
b76f0000-b770f000 r-xp 00000000 fd:00 1185012 /usr/lib/ld-2.18.so
b770f000-b7710000 r-xp 00000000 00:00 0 [vdso]
b7710000-b7711000 r--p 0001f000 fd:00 1185012 /usr/lib/ld-2.18.so
b7711000-b7712000 rw-p 00020000 fd:00 1185012 /usr/lib/ld-2.18.so
bf997000-bf9b8000 rw-p 00000000 00:00 0 [stack]
Can someone help me?

Root Note 2 (I605) - 4.4.2 ND7 using Ubuntu 14.04LTS

GhettoRoot for the Samsung Galaxy Note 2 (I605) - 4.4.2 ND7 using Ubuntu 14.04LTS
May or may not work on other Linux distributions.
May or may not work for you:
NO GUARANTEES. USE AT YOUR OWN RISK.
I copied the following from the 'ghettoroot.bat' file in the GhettoRoot directory.
Credit goes to whoever is responsible for GhettoRoot.
NO GUARANTEES. USE AT YOUR OWN RISK.
Phone must be in 'Developer Mode'.
Connected to PC via a USB cable.
Adb must be installed on PC
Download 'ghettoroot.zip' from here:
http://forum.xda-developers.com/not...lroot-port-t2864125/post55210343#post55210343
Make sure no Ghettoroot or parts of GhettoRoot are already on your Note 2 by removing old root files.
adb shell "rm -f /data/local/tmp/cube-towel; rm -rf /data/local/tmp/META-INF; rm -rf /data/local/tmp/SuperSU; rm -f /data/local/tmp/*SuperSU*.zip; rm -f /data/local/tmp/busybox; rm -f /data/local/tmp/foo"
Check to see if successful:
adb shell ls -l /data/local/tmp
Pushing necessary files to your phone.:
adb push /(Path to GhettoRoot Directory)/libs/armeabi/ghettoroot /data/local/tmp/ghettoroot
adb push /(Path to GhettoRoot Directory)/data/local/tmp /data/local/tmp
Starting root exploit:
[email protected]:~$ adb push /(Path to GhettoRoot Directory)/GhettoRoot/libs/armeabi/ghettoroot /data/local/tmp/ghettoroot & adb shell "cd data/local/tmp; chmod 0755 ghettoroot; ./ghettoroot %*"
The following happened:
[2] 6579
************************************************
native ghettoroot, aka cube-towel, aka towelroot
running with pid 15545
kernel version: Linux version 3.0.31-1496113 ([email protected]) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Thu May 8 01:19:38 KST 2014
found matching phone: Linux version 3.0.31-
modstring: 1337 0 1 0 4 0
************************************************
Enter send_magicmsg (722)
Enter make_socket (681)
Enter search_goodnum (842)
Enter accept_socket (1072)
Socket tastefully accepted.
Exit make_socket (709)
Enter wake_actionthread (622)
Enter make_sigaction (579)
Exit wake_actionthread (675)
Enter wake_actionthread (622)
Enter make_sigaction (579)
Exit wake_actionthread (675)
starting the dangerous things
Enter setup_exploit (817)
Exit setup_exploit (824)
Enter setup_exploit (817)
Exit setup_exploit (824)
search_goodnum 908
MAGIC: a0000800
MAGIC_ALT: 00100800
magicval: a0000820
Enter wake_actionthread (622)
Enter make_sigaction (579)
Exit wake_actionthread (675)
MAGIC = MAGIC_ALT;
search_goodnum 920
Enter setup_exploit (817)
Exit setup_exploit (824)
Enter wake_actionthread (622)
Enter make_sigaction (579)
Exit wake_actionthread (675)
0xd527a000 is a good number
Enter get_root (310; tid: 3cc0)
get_root 315
cpid1 resumed
In get_root(329): HACKS_fdm = 7 [/dev/pts/1]
In get_root(349): ph->limit_offset == 0
Enter setup_exploit (817)
Exit setup_exploit (824)
Enter wake_actionthread (622)
Enter make_sigaction (579)
Exit wake_actionthread (675)
0xd2695d5c is also a good number
Enter setup_exploit (817)
Exit setup_exploit (824)
Enter wake_actionthread (622)
Enter make_sigaction (579)
Exit wake_actionthread (675)
Enter get_root (310; tid: 3cc2)
GOING
get_root 315
cpid3 resumed
In get_root(358): read(HACKS_fdm, readbuf, sizeof readbuf);
get_root 361
In write_pipe(258) dest:d2684008 src:00011000 count:4
get_root 364
get_root 367
WOOT
Enter read_pipe (233)
read_pipe(236) src:d2684000 dest:40b99a4c count:16
Exit read_pipe(248): len:16
ti.task=e85ce600 .flags=00000200 .preempt_count=1 .addr_limit=ffffffff
Enter read_pipe (233)
read_pipe(236) src:e85ce600 dest:40b9964c count:1024
Exit read_pipe(248): len:1024
00000000 d2684000 00000002 00400040 00000000 00000000 00000001 00000001 00000082 00000082 00000082 00000000 c065fae0 00000000 0000006e 0253c825 00000001 db605dc0 00000000 db605dcc c316b5a0 00000001 d109a1e4 000005fb 000363ff 00000000 fcfee913 000046f7 000363ff 00000000 00000000 00000000 00000000 00000000 005e33e2 00000000 0000000e 00000000 006d0313 00000000 00000000 00000000 00000000 00000000 00000000 00000000 000d42db 00000000 000f9377 00000000 00000000 00000000 00000000 00000000 00008ca0 00000000 00007ab9 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 0000000d 00000000 00000000 00000000 00000000 00000000 0000000d 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 c316b570 00000000 00000000 e85ce768 e85ce768 00000000 000000c8 00000001 00000000 00000000 c316b610 00000000 00000000 00000000 00000000 00000001 00000000 00000000 e85ce7a4 e85ce7a4 00000000 0000000d 00000000 006cd897 00000000 d109a1e4 000005fb 00000000 00000000 c0acfb40 db604e50 0000008c e85ce7dc e85ce7dc e85ce7e4 e85ce7e4 e8229d40 e8229d40 00000001 00000001 00000000 00000001 00000000 00000000 00000000 ffffffff 00000000 00000000 00800000 00000000 00003cc2 00003cb9 db604c80 db604c80 e85ce834 e85ce834 e85ce83c e85ce83c db600cc0 e85ce848 e85ce848 e85ce850 e85ce850 00000000 dbd11148 dbd11140 db604ee4 e4873fcc e4873fc0 db604ef0 e4873fd0 e4873fc0 db600f3c e85cecbc 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000002 0000000a 000019b3 05429f05 000059f2 078c169f 00000001 00000000 00000000 00000000 00000000 00000000 00000000 e85ce8e0
Supposedly found credential at taskbuf[184]: c73dd400
Enter read_pipe (233)
read_pipe(236) src:c73dd400 dest:40b995f0 count:92
Exit read_pipe(248): len:92
Enter read_pipe (233)
read_pipe(236) src:cd1c3f80 dest:40b995d8 count:24
Exit read_pipe(248): len:24
YOU ARE A SCARY PHONE
In write_pipe(258) dest:cd1c3f80 src:40b995d8 count:24
In write_pipe(258) dest:c73dd400 src:40b995f0 count:92
In write_pipe(258) dest:e85ce824 src:00011004 count:4
-rw-rw-rw- root root 0 2014-10-06 13:28 rooted
856 KB/s (34208 bytes in 0.039s)
Package com.sec.knox.seandroid new state: disabled
Disabling Knox: Success
Disabling SEAndroid: Success
Package com.sec.knox.seandroid new state: disabled
Disabling Knox (again): Success
Package com.policydm new state: disabled
Disabling Policy Updater: Success
Disabling Local OTA Updates: Success
Package com.sec.android.fwupgrade new state: disabled
Disabling FWUpgrade: Success
Disabling Samsung Data Migration tool: Success
Remounting /system: Success
Remounting /: Success
Archive: /data/local/tmp/UPDATE-SuperSU.zip
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
/system/bin/cp: /system/app/Maps.apk: No such file or directory
ui_print *********************
ui_print
ui_print SuperSU installer ZIP
ui_print
ui_print *********************
ui_print
ui_print - Mounting /system, /data and rootfs
ui_print
Usage: mount [-r] [-w] [-o options] [-t type] device directory
Usage: mount [-r] [-w] [-o options] [-t type] device directory
skip reached end of input
skip reached end of input
2+0 records in
2+0 records out
2 bytes transferred in 0.001 secs (2000 bytes/sec)
ui_print - Extracting files
ui_print
Archive: /data/local/tmp/UPDATE-SuperSU.zip
inflating: META-INF/MANIFEST.MF
inflating: META-INF/CERT.SF
inflating: META-INF/CERT.RSA
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
inflating: arm/chattr
inflating: arm/chattr.pie
inflating: arm/su
inflating: common/99SuperSUDaemon
inflating: common/Superuser.apk
inflating: common/install-recovery.sh
inflating: x86/chattr
inflating: x86/chattr.pie
inflating: x86/su
ui_print - Disabling OTA survival
ui_print
/tmp/supersu/arm/chattr: No such file or directory while trying to stat /system/xbin/su
/tmp/supersu/arm/chattr.pie: No such file or directory while trying to stat /system/xbin/su
/tmp/supersu/arm/chattr: No such file or directory while trying to stat /system/bin/.ext/.su
/tmp/supersu/arm/chattr.pie: No such file or directory while trying to stat /system/bin/.ext/.su
/tmp/supersu/arm/chattr: No such file or directory while trying to stat /system/xbin/daemonsu
/tmp/supersu/arm/chattr.pie: No such file or directory while trying to stat /system/xbin/daemonsu
/tmp/supersu/arm/chattr: No such file or directory while trying to stat /system/etc/install-recovery.sh
/tmp/supersu/arm/chattr.pie: No such file or directory while trying to stat /system/etc/install-recovery.sh
ui_print - Removing old files
ui_print
ui_print - Creating space
ui_print
cp: /system/app/Maps.apk: No such file or directory
rm failed for /system/app/Maps.apk, No such file or directory
ui_print - Placing files
ui_print
mkdir failed for /system/bin/.ext, File exists
cp: /system/etc/init.d/99SuperSUDaemon: No such file or directory
ui_print - Restoring files
ui_print
cp: /Maps.apk: No such file or directory
rm failed for /Maps.apk, No such file or directory
ui_print - Setting permissions
ui_print
Unable to chown /system/etc/init.d/99SuperSUDaemon: No such file or directory
Unable to chown /system/etc/init.d/99SuperSUDaemon: No such file or directory
Unable to chmod /system/etc/init.d/99SuperSUDaemon: No such file or directory
Unable to chown /system/app/Maps.apk: No such file or directory
Unable to chown /system/app/Maps.apk: No such file or directory
Unable to chmod /system/app/Maps.apk: No such file or directory
chcon: Could not label /system/etc/init.d/99SuperSUDaemon with ubject_r:system_file:s0: No such file or directory
chcon: Could not label /system/etc/init.d/99SuperSUDaemon with ubject_r:system_file:s0: No such file or directory
chcon: Could not label /system/app/Maps.apk with ubject_r:system_file:s0: No such file or directory
chcon: Could not label /system/app/Maps.apk with ubject_r:system_file:s0: No such file or directory
ui_print - Post-installation script
ui_print
ui_print - Unmounting /system and /data
ui_print
failed: Device or resource busy
failed: Device or resource busy
ui_print - Done !
ui_print
failed on '/system/app/Maps.apk.prespaz' - No such file or directory
get_root 550
: No such file or directory
User command failed (-1)Error running user command: 65280Thank you for choosing ghettoroot. Please enjoy your stay.
Your device will reboot in 10 seconds.
This is normal. Thanks for waiting.
10 seconds...
5 seconds...
Rebooting...
[1] Done adb push ~/Down*/Ghetto/GhettoRoot/libs/armeabi/ghettoroot /data/local/tmp/ghettoroot
[2]+ Done adb push ~/Down*/Ghetto/GhettoRoot/libs/armeabi/ghettoroot /data/local/tmp/ghettoroot
[email protected]:~$
IT WORKED FOR ME. MAY OR MAY NOT WORK FOR YOU.

how to get all kernel crash info from last_kmsg

how to get all kernel crash info from last_kmsg?
when i analysis the kernel crash log, i found the last_kmsg (adb shell cat proc/last_kmsg) is incomplete, like this:
Code:
[email protected]:/ $ cat proc/last_kmsg
ram console header, hw_status: 2, fiq step 41.
955e1c d7955e00 c06b8d84 c042be34 c06b8e78 d6590d88 d6590c00
[ 1247.123224]5e0c c1ff0c40 d7955e3c d7955e20 c06b8e00 c06b8d50 c02ab2b4 c02aa9ac d6590d88
[ 1247.123279]5e2c dcc00c80 d7955e4c d7955e40 c06b8e8c c06b8df0 d7955f1c d7955e50 c0040f80
[ 1247.123336]<0>-(0)[1377:kworker/0:2]
[ 1247.123336]<0>R7: 0xd6590b80:
[ 1247.123349]0b80 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 1247.123401]0ba0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 1247.123454]0bc0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 1247.123506]0be0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 1247.123558]0c00 00000000 746b746d 746d7773 00000000 00000000 00000000 00000000 ddcbaa00
[ 1247.123612]0c20 dcc1e4c0 c4af8224 d6590424 df347280 df8ff340 c0d484b8 dcc1e580 00000002
[ 1247.123666]0c40 00000007 00000000 00000000 00000001 00000000 d6590c54 d6590c54 00000000
[ 1247.123719]0c60 00000000 00000000 00000000 00000000 00000000 00000020 00000000 c4af827c
[ 1247.123775]<0>-(0)[1377:kworker/0:2]
[ 1247.123775]<0>R8: 0xc0db6970:
[ 1247.123788]6970 00000000 00000000 c0c97cb4 00000000 00000000 00000000 00000000 c0c97cc8
[ 1247.123841]6990 00000000 00000000 00000000 00000000 c0c97ce0 00000000 00000000 00000000
[ 1247.123894]69b0 00000000 c0c97cf0 00000000 00000000 00000000 00000000 c0c97d60 00000000
[ 1247.123947]69d0 00000000 00000000 00000000 c0c97d50 00000000 00000000 00000000 00000000
[ 1247.124000]69f0 c0c97da0 00000000 00000000 00000000 00000000 c0c97db8 00000000 00000000
[ 1247.124054]6a10 00000000 00000000 c0c97d88 00000000 00000000 00000000 00000000 c0c97d70
[ 1247.124106]6a30 00000000 00000000 00000000 00000000 c0c97dd0 00000000 00000000 00000000
[ 1247.124159]6a50 00000000 c0c980c8 00000001 00000000 00000000 df975548 c0c98090 00000000
[ 1247.124216]<0>-(0)[1377:kworker/0:2]
[ 1247.124216]<0>R9: 0xc1ff2780:
[ 1247.124228]2780 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 1247.124280]27a0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 1247.124333]27c0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 1247.124385]27e0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 1247.124438]2800 c1ff0c40 df812cc0 00000000 ffffffff 00000002 00000001 00000000 00000000
[ 1247.124491]2820 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 1247.124543]2840 00000000 00000000 00000000 00000000 00000001 00000100 c1ff2858 c1ff2858
[ 1247.124597]2860 df812cc0 c1ffa860 c1ff2868 c1ff2868 ffffffe0 c1ff2874 c1ff2874 c00408fc
[ 1247.124657]<0>-(0)[1377:kworker/0:2]Process kworker/0:2 (pid: 1377, stack limit = 0xd7954248)
[ 1247.124672]<0>-(0)[1377:kworker/0:2]Stack: (0xd7955d80 to 0xd7956000)
[ 1247.124692]<0>-(0)[1377:kworker/0:2]5d80: 00000000 d6590c00 d7955db4 d7955d98 c0431d00 c04e538c d6590c00 d6590c00
[ 1247.124711]<0>-(0)[1377:kworker/0:2]5da0: d7955e24 d7954010 d7955dfc d7955db8 c042be64 c0431cec d7955e4c c0b33cbe
[ 1247.124729]<0>-(0)[1377:kworker/0:2]5dc0: d7955e24 d7955dd0 c02aab20 00000000 00000000 d6590c00 d6590d68 d7955e24
[ 1247.124748]<0>-(0)[1377:kworker/0:2]5de0: d7954010 c0db69f0 c1ff2800 00000000 d7955e1c d7955e00 c06b8d84 c042be34
[ 1247.124767]<0>-(0)[1377:kworker/0:2]5e00: c06b8e78 d6590d88 d6590c00 c1ff0c40 d7955e3c d7955e20 c06b8e00 c06b8d50
[ 1247.124785]<0>-(0)[1377:kworker/0:2]5e20: c02ab2b4 c02aa9ac d6590d88 dcc00c80 d7955e4c d7955e40 c06b8e8c c06b8df0
[ 1247.124804]<0>-(0)[1377:kworker/0:2]5e40: d7955f1c d7955e50 c0040f80 c06b8e84 c00c22f8 c02b297c 183606ab c1ff2800
[ 1247.124822]<0>-(0)[1377:kworker/0:2]5e60: 1cc7c67f 00000121 00000000 00000000 72656874 5f6c616d 656e6f7a 7665645f
[ 1247.124841]<0>-(0)[1377:kworker/0:2]5e80: 5f656369 63656863 c0d0006b c0d27100 c0d27134 c0d04040 c00414f4 c092d5dc
[ 1247.124860]<0>-(0)[1377:kworker/0:2]5ea0: 60000013 f0222000 d7955ec4 d7955eb8 c00081d0 c000faac d7955f1c d7955ec8
[ 1247.124878]<0>-(0)[1377:kworker/0:2]5ec0: c000ecf8 c00081cc c1ff0c40 00000001 dd9e5000 00002181 dcc00c80 c1ff0c54
[ 1247.124897]<0>-(0)[1377:kworker/0:2]5ee0: dcc00c98 dcc00c80 c1ff0c54 dcc00c98 d7954000 dcc00c80 c1ff0c54 dcc00c98
[ 1247.124916]<0>-(0)[1377:kworker/0:2]5f00: d7954000 d7954020 d7954000 c1ff0c40 d7955f5c d7955f20 c0041438 c0040e1c
[ 1247.124934]<0>-(0)[1377:kworker/0:2]5f20: c092d5b0 df853e58 00000000 c0db6661 c00412fc df853e58 00000000 dcc00c80
[ 1247.124953]<0>-(0)[1377:kworker/0:2]5f40: c00412fc 00000000 00000000 00000000 d7955fac d7955f60 c0047b44 c0041308
[ 1247.124971]<0>-(0)[1377:kworker/0:2]5f60: c092d5e4 00000000 d7955f94 dcc00c80 00000000 00000000 d7955f78 d7955f78
[ 1247.124990]<0>-(0)[1377:kworker/0:2]5f80: 00000000 00000000 d7955f88 d7955f88 df853e58 c0047a88 00000000 00000000
[ 1247.125008]<0>-(0)[1377:kworker/0:2]5fa0: 00000000 d7955fb0 c000f2d8 c0047a94 00000000 00000000 00000000 00000000
[ 1247.125026]<0>-(0)[1377:kworker/0:2]5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 1247.125044]<0>-(0)[1377:kworker/0:2]5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 ff000000 ff000000
[ 1247.125054]Backtrace:
...
...
[ 1247.125406]<0>-(0)[1377:kworker/0:2][<c00412fc>] (worker_thread+0x0/0x3f0) from [<c0047b44>] (kthread+0xbc/0xc0)
[ 1247.125434]<0>-(0)[1377:kworker/0:2][<c0047a88>] (kthread+0x0/0xc0) from [<c000f2d8>] (ret_from_fork+0x14/0x3c)
[ 1247.125445] r7:00000000 r6:00000000 r5:c0047a88 r4:df853e58
[ 1247.125486]<0>-(0)[1377:kworker/0:2]Code: bad PC value
[ 1247.125504]<0>-(0)[1377:kworker/0:2]---[ end trace 912237b3a2fb65fb ]---
[ 1247.125519]<0>-(0)[1377:kworker/0:2]Kernel panic - not syncing: Fatal exception
[ 1247.125572]<0>-(0)[1377:kworker/0:2]mrdump: cpu[0] tsk:dd9e5000 ti:d7954000
[ 1254.517417]<0>-(0)[1377:kworker/0:2]
[ 1254.517417]<0> No log for WDT
[ 1254.533700]<0>-(0)[1377:kworker/0:2]ipanic_data_to_sd: dump SYS_WQ_LOG failed[-3]
[ 1254.533717]<0>-(0)[1377:kworker/0:2]ipanic_data_to_sd: dump SYS_MMPROFILE failed[-3]
[ 1254.572077]Rebooting in 1 seconds..machine_shutdown: start, Proess(kworker/0:2:1377). father kthreadd:2. grandfather swapper/0:0.
[ 1255.572166]<0>-(0)[1377:kworker/0:2]arch_reset: cmd = NULL
[ 1255.572194]<0>-(0)[1377:kworker/0:2]wdt_arch_reset [email protected] mode =
[ 1255.572237]<0>-(0)[1377:kworker/0:2]wdt_arch_reset called MTK_WDT_MODE =5d
[ 1255.572250]<0>-(0)[1377:kworker/0:2]wdt_arch_reset called end MTK_WDT_MODE =22000014
[ 1255.572363]<0>-(0)[1377:kworker/0:2]wdt_arch_reset: SW_reset happen
[ 1255.572375]<0>-(0)[1377:kworker/0:2]****************dump wdt reg start*************
[ 1255.572387]<0>-(0)[1377:kworker/0:2]MTK_WDT_MODE:0x14
[ 1255.572400]<0>-(0)[1377:kworker/0:2]MTK_WDT_LENGTH:0xf000
[ 1255.572412]<0>-(0)[1377:kworker/0:2]MTK_WDT_RESTART:0x0
[ 1255.572424]<0>-(0)[1377:kworker/0:2]MTK_WDT_STATUS:0x40000000
it lost most regs info, r0, r1... crash pc, lr ...
it's appear in arm32 except nexus
i find out some info, the phone manufacturers set the log file to 4kb, if the crash log is too long, it will overwrite old log.
Where can I get more information about last_kmsg file size?
how to change the crash log size and get all crash info from last_kmsg?
@idhyt Well, I'm not sure what platform you are on, but maybe something like this would help?
capt_planit said:
@idhyt Well, I'm not sure what platform you are on, but maybe something like this would help?
Click to expand...
Click to collapse
thank you replay, my phone is xiaomi-hm1s and meizu-mx4, also in most arm32 platform(except nexus), the link seems diff with my issue~
also i could't find the /efs/carrier/HiddenMenu in my phone...
@idhyt what does "cat /proc/sys/kernel/dmesg_restrict" (no quotes) say?

Categories

Resources