Guest underbeing Posted January 7, 2012 Report Posted January 7, 2012 z4root - just closes after about 30 sec. universal androot fails - 'no fu goo' - I have included the log file below. root checker - confirms that even temporary root isn't working. Without root i appear to be unable to get any further with this blade. Does the log (below) help diagnose the problem? Thanks v much, John P.S. My previous Gen1 blade presented no problems with root, cwm and TPT all working nicely. This one is a nightmare!!! Universal Androot Log: Go for root ! Version: Universal Androot - v1.6.2 beta 5 Detected OS version:10 ls -l /system/etc -rw-r--r-- root root 185995 2011-11-19 11:13 fw_4330b1.bin drwxr-xr-x root root 2011-11-19 11:13 bluetooth -rw-r--r-- root root 171 2011-11-19 11:13 init.wlanprop.sh -rw-r--r-- root root 157091 2011-11-19 11:13 fw_4330_b2_apsta.bin drwxr-xr-x root root 2011-11-19 11:13 ppp -rw-r--r-- root root 4741120 2011-11-19 11:13 pcsuite.iso -rw-r--r-- root root 1633 2011-11-19 11:13 vold.fstab -rw-r--r-- root root 3205 2011-11-19 11:13 init.bt.sh -rw-r--r-- root root 194078 2011-11-19 11:13 test_4330b1.bin -rw-r--r-- root root 70316 2011-11-19 11:13 NOTICE.html.gz drwxr-xr-x root root 2011-11-19 11:13 security -rw-r--r-- root root 44 2011-11-19 11:13 pointercal -rw-r--r-- root root 3327 2011-11-19 11:13 init.qcom.bt.sh -rw-r--r-- root root 845 2011-11-19 11:13 nv_4330b2.txt -rw-r--r-- root root 403902 2011-11-19 11:13 apns-conf.xml -rw-r--r-- root root 647 2011-11-19 11:13 pvplayer.cfg -r-xr-x--- root shell 1200 2011-11-19 11:13 init.goldfish.sh -rw-r--r-- root root 85 2011-11-19 11:13 01_qcomm_omx.cfg drwxr-xr-x root root 2011-11-19 11:13 updatecmds -rw-r--r-- root root 180507 2011-11-19 11:13 fw_4330_b1_apsta.bin -rw-r--r-- root root 38135 2011-11-19 11:13 BCM4330B1_002.001.032.0518.0520.hcd -rw-r--r-- root root 872 2011-11-19 11:13 gps.conf -rw-r--r-- root root 169372 2011-11-19 11:13 test_4330b2.bin -rw-r--r-- root root 14241 2011-11-19 11:13 voicemail-conf.xml drwxr-xr-x root root 2011-11-19 11:13 firmware -rw-r--r-- root root 1965 2011-11-19 11:13 init.qcom.post_boot.sh -rw-r--r-- root root 1804 2011-11-19 11:13 loc_parameter.ini drwxr-xr-x root root 2011-11-19 11:13 dhcpcd -rw-r--r-- root root 2672 2011-11-19 11:13 init.qcom.coex.sh -rw-r--r-- root root 2332 2011-11-19 11:13 init.qcom.sdio.sh drwxr-xr-x root root 2011-11-19 11:13 wifi -rw-r--r-- root root 157411 2011-11-19 11:13 fw_4330b2.bin drwxr-xr-x root root 2011-11-19 11:13 permissions drwxr-xr-x root root 2011-11-19 11:13 customize drwxr-xr-x root root 2011-11-19 11:13 custom_config -rw-r--r-- root root 845 2011-11-19 11:13 nv_4330b1.txt -rw-r--r-- root root 2132 2011-11-19 11:13 init.qcom.fm.sh -r--r----- bluetooth bluetooth 935 2011-11-19 11:13 dbus.conf -rw-r--r-- root root 11649 2011-11-19 11:13 event-log-tags -rw-r--r-- root root 6437 2011-11-19 11:13 LsOmaClientSettings.xml -rw-r--r-- root root 25 2011-11-19 11:13 hosts ls -l /system/bin/reboot lrwxr-xr-x root shell 2011-11-19 12:44 reboot -> toolbox cat /proc/sys/kernel/osrelease 2.6.35.7-perf+ getprop ro.product.model San Francisco II getprop ro.product.brand ZTE getprop ro.product.name P736V_OUK getprop ro.product.manufacturer ZTE getprop ro.build.product blade2 ls -l /sqlite_stmt_journals opendir failed, Permission denied ls -l /data/local/tmp opendir failed, Permission denied ls -l /app-cache /app-cache: No such file or directory run mount rootfs / rootfs ro,relatime 0 0 tmpfs /dev tmpfs rw,relatime,mode=755 0 0 devpts /dev/pts devpts rw,relatime,mode=600 0 0 proc /proc proc rw,relatime 0 0 sysfs /sys sysfs rw,relatime 0 0 none /acct cgroup rw,relatime,cpuacct 0 0 tmpfs /sqlite_stmt_journals tmpfs rw,relatime,size=4096k 0 0 tmpfs /mnt/asec tmpfs rw,relatime,mode=755,gid=1000 0 0 tmpfs /mnt/obb tmpfs rw,relatime,mode=755,gid=1000 0 0 /dev/block/mtdblock5 /system yaffs2 ro,relatime 0 0 /dev/block/mtdblock6 /data yaffs2 rw,nosuid,nodev,relatime 0 0 /dev/block/mtdblock4 /cache yaffs2 rw,nosuid,nodev,relatime 0 0 /dev/block/vold/179:1 /mnt/sdcard vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0 /dev/block/vold/179:1 /mnt/secure/asec vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0 tmpfs /mnt/sdcard/.android_secure tmpfs ro,relatime,size=0k,mode=000 0 0 run df Filesystem Size Used Free Blksize /dev 210M 32K 210M 4096 /sqlite_stmt_journals 4M 0K 4M 4096 /mnt/asec 210M 0K 210M 4096 /mnt/obb 210M 0K 210M 4096 /system 220M 204M 15M 4096 /data 162M 63M 99M 4096 /cache 57M 1M 56M 4096 /mnt/sdcard 1G 27M 1G 32768 /mnt/secure/asec: Permission denied Preparing Exploit ... :true Preparing busybox binary ... :true User selected: Eclair Preparing Su binary ... :true Preparing Superuser apk ... :true, resid:2131034118 Preparing root toolkit script ... :true Trying to get mount point:/data /dev/block/mtdblock6 /data yaffs2 rw,nosuid,nodev,relatime 0 0 Trying to get mount point:/system /dev/block/mtdblock5 /system yaffs2 ro,relatime 0 0 mount -o remount,rw -t yaffs2 /dev/block/mtdblock5 /system mkdir /system/xbin cat su > /system/xbin/su chmod 04755 /system/xbin/su ln -s /system/xbin/su /system/bin/su mount -o remount,ro -t yaffs2 /dev/block/mtdblock5 /system mount -o remount,rw,nosuid,nodev,relatime -t yaffs2 /dev/block/mtdblock6 /data mount -o remount,rw -t yaffs2 /dev/block/mtdblock5 /system rm /system/bin/su rm /system/xbin/su Preparing to execute exploit, do chmod Executing exploit.. cmd: /data/data/com.corner23.android.universalandroot/files/getroot /dev/block/mtdblock6 yaffs2 [*] Android local root exploid © The Android Exploid Crew [*] Modified by shakalaca for various devices [+] Using basedir=/data/data/com.corner23.android.universalandroot/files, path=/data/data/com.corner23.android.universalandroot/files/getroot [+] opening NETLINK_KOBJECT_UEVENT socket [+] sending add message ... [-] sendmsg: Connection refused Wifi enabled ... /sqlite_stmt_journals/rootshell missing .. /app-cache/rootshell missing .. /data/local/tmp/rootshell missing .. Install/Uninstall rootkit: false ls -l /sqlite_stmt_journals opendir failed, Permission denied ls -l /data/local/tmp opendir failed, Permission denied ls -l /app-cache /app-cache: No such file or directory run mount rootfs / rootfs ro,relatime 0 0 tmpfs /dev tmpfs rw,relatime,mode=755 0 0 devpts /dev/pts devpts rw,relatime,mode=600 0 0 proc /proc proc rw,relatime 0 0 sysfs /sys sysfs rw,relatime 0 0 none /acct cgroup rw,relatime,cpuacct 0 0 tmpfs /sqlite_stmt_journals tmpfs rw,relatime,size=4096k 0 0 tmpfs /mnt/asec tmpfs rw,relatime,mode=755,gid=1000 0 0 tmpfs /mnt/obb tmpfs rw,relatime,mode=755,gid=1000 0 0 /dev/block/mtdblock5 /system yaffs2 ro,relatime 0 0 /dev/block/mtdblock6 /data yaffs2 rw,nosuid,nodev,relatime 0 0 /dev/block/mtdblock4 /cache yaffs2 rw,nosuid,nodev,relatime 0 0 /dev/block/vold/179:1 /mnt/sdcard vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0 /dev/block/vold/179:1 /mnt/secure/asec vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0 tmpfs /mnt/sdcard/.android_secure tmpfs ro,relatime,size=0k,mode=000 0 0 run df Filesystem Size Used Free Blksize /dev 210M 32K 210M 4096 /sqlite_stmt_journals 4M 0K 4M 4096 /mnt/asec 210M 0K 210M 4096 /mnt/obb 210M 0K 210M 4096 /system 220M 204M 15M 4096 /data 162M 63M 99M 4096 /cache 57M 1M 56M 4096 /mnt/sdcard 1G 27M 1G 32768 /mnt/secure/asec: Permission denied
Guest Amphoras Posted January 7, 2012 Report Posted January 7, 2012 Hi, from those logs, you actually have a San Francisco II which is different from this phone. These root exploits wont work on it. You'll need to go to HTTP://crescent.modaco.com and look at the threads there.
Guest underbeing Posted January 7, 2012 Report Posted January 7, 2012 Hi, from those logs, you actually have a San Francisco II which is different from this phone. These root exploits wont work on it. You'll need to go to HTTP://crescent.modaco.com and look at the threads there. Ha ha ha. What an idiot! Thanks, John
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now