Jump to content

Unable to root gen2 blade


Recommended Posts

Guest underbeing
Posted

z4root - just closes after about 30 sec.

universal androot fails - 'no fu goo' - I have included the log file below.

root checker - confirms that even temporary root isn't working.

Without root i appear to be unable to get any further with this blade.

Does the log (below) help diagnose the problem?

Thanks v much,

John

P.S. My previous Gen1 blade presented no problems with root, cwm and TPT all working nicely. This one is a nightmare!!!

Universal Androot Log:

Go for root !

Version: Universal Androot - v1.6.2 beta 5

Detected OS version:10

ls -l /system/etc

-rw-r--r-- root root 185995 2011-11-19 11:13 fw_4330b1.bin

drwxr-xr-x root root 2011-11-19 11:13 bluetooth

-rw-r--r-- root root 171 2011-11-19 11:13 init.wlanprop.sh

-rw-r--r-- root root 157091 2011-11-19 11:13 fw_4330_b2_apsta.bin

drwxr-xr-x root root 2011-11-19 11:13 ppp

-rw-r--r-- root root 4741120 2011-11-19 11:13 pcsuite.iso

-rw-r--r-- root root 1633 2011-11-19 11:13 vold.fstab

-rw-r--r-- root root 3205 2011-11-19 11:13 init.bt.sh

-rw-r--r-- root root 194078 2011-11-19 11:13 test_4330b1.bin

-rw-r--r-- root root 70316 2011-11-19 11:13 NOTICE.html.gz

drwxr-xr-x root root 2011-11-19 11:13 security

-rw-r--r-- root root 44 2011-11-19 11:13 pointercal

-rw-r--r-- root root 3327 2011-11-19 11:13 init.qcom.bt.sh

-rw-r--r-- root root 845 2011-11-19 11:13 nv_4330b2.txt

-rw-r--r-- root root 403902 2011-11-19 11:13 apns-conf.xml

-rw-r--r-- root root 647 2011-11-19 11:13 pvplayer.cfg

-r-xr-x--- root shell 1200 2011-11-19 11:13 init.goldfish.sh

-rw-r--r-- root root 85 2011-11-19 11:13 01_qcomm_omx.cfg

drwxr-xr-x root root 2011-11-19 11:13 updatecmds

-rw-r--r-- root root 180507 2011-11-19 11:13 fw_4330_b1_apsta.bin

-rw-r--r-- root root 38135 2011-11-19 11:13 BCM4330B1_002.001.032.0518.0520.hcd

-rw-r--r-- root root 872 2011-11-19 11:13 gps.conf

-rw-r--r-- root root 169372 2011-11-19 11:13 test_4330b2.bin

-rw-r--r-- root root 14241 2011-11-19 11:13 voicemail-conf.xml

drwxr-xr-x root root 2011-11-19 11:13 firmware

-rw-r--r-- root root 1965 2011-11-19 11:13 init.qcom.post_boot.sh

-rw-r--r-- root root 1804 2011-11-19 11:13 loc_parameter.ini

drwxr-xr-x root root 2011-11-19 11:13 dhcpcd

-rw-r--r-- root root 2672 2011-11-19 11:13 init.qcom.coex.sh

-rw-r--r-- root root 2332 2011-11-19 11:13 init.qcom.sdio.sh

drwxr-xr-x root root 2011-11-19 11:13 wifi

-rw-r--r-- root root 157411 2011-11-19 11:13 fw_4330b2.bin

drwxr-xr-x root root 2011-11-19 11:13 permissions

drwxr-xr-x root root 2011-11-19 11:13 customize

drwxr-xr-x root root 2011-11-19 11:13 custom_config

-rw-r--r-- root root 845 2011-11-19 11:13 nv_4330b1.txt

-rw-r--r-- root root 2132 2011-11-19 11:13 init.qcom.fm.sh

-r--r----- bluetooth bluetooth 935 2011-11-19 11:13 dbus.conf

-rw-r--r-- root root 11649 2011-11-19 11:13 event-log-tags

-rw-r--r-- root root 6437 2011-11-19 11:13 LsOmaClientSettings.xml

-rw-r--r-- root root 25 2011-11-19 11:13 hosts

ls -l /system/bin/reboot

lrwxr-xr-x root shell 2011-11-19 12:44 reboot -> toolbox

cat /proc/sys/kernel/osrelease

2.6.35.7-perf+

getprop ro.product.model

San Francisco II

getprop ro.product.brand

ZTE

getprop ro.product.name

P736V_OUK

getprop ro.product.manufacturer

ZTE

getprop ro.build.product

blade2

ls -l /sqlite_stmt_journals

opendir failed, Permission denied

ls -l /data/local/tmp

opendir failed, Permission denied

ls -l /app-cache

/app-cache: No such file or directory

run mount

rootfs / rootfs ro,relatime 0 0

tmpfs /dev tmpfs rw,relatime,mode=755 0 0

devpts /dev/pts devpts rw,relatime,mode=600 0 0

proc /proc proc rw,relatime 0 0

sysfs /sys sysfs rw,relatime 0 0

none /acct cgroup rw,relatime,cpuacct 0 0

tmpfs /sqlite_stmt_journals tmpfs rw,relatime,size=4096k 0 0

tmpfs /mnt/asec tmpfs rw,relatime,mode=755,gid=1000 0 0

tmpfs /mnt/obb tmpfs rw,relatime,mode=755,gid=1000 0 0

/dev/block/mtdblock5 /system yaffs2 ro,relatime 0 0

/dev/block/mtdblock6 /data yaffs2 rw,nosuid,nodev,relatime 0 0

/dev/block/mtdblock4 /cache yaffs2 rw,nosuid,nodev,relatime 0 0

/dev/block/vold/179:1 /mnt/sdcard vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0

/dev/block/vold/179:1 /mnt/secure/asec vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0

tmpfs /mnt/sdcard/.android_secure tmpfs ro,relatime,size=0k,mode=000 0 0

run df

Filesystem Size Used Free Blksize

/dev 210M 32K 210M 4096

/sqlite_stmt_journals 4M 0K 4M 4096

/mnt/asec 210M 0K 210M 4096

/mnt/obb 210M 0K 210M 4096

/system 220M 204M 15M 4096

/data 162M 63M 99M 4096

/cache 57M 1M 56M 4096

/mnt/sdcard 1G 27M 1G 32768

/mnt/secure/asec: Permission denied

Preparing Exploit ... :true

Preparing busybox binary ... :true

User selected: Eclair

Preparing Su binary ... :true

Preparing Superuser apk ... :true, resid:2131034118

Preparing root toolkit script ... :true

Trying to get mount point:/data

/dev/block/mtdblock6 /data yaffs2 rw,nosuid,nodev,relatime 0 0

Trying to get mount point:/system

/dev/block/mtdblock5 /system yaffs2 ro,relatime 0 0

mount -o remount,rw -t yaffs2 /dev/block/mtdblock5 /system

mkdir /system/xbin

cat su > /system/xbin/su

chmod 04755 /system/xbin/su

ln -s /system/xbin/su /system/bin/su

mount -o remount,ro -t yaffs2 /dev/block/mtdblock5 /system

mount -o remount,rw,nosuid,nodev,relatime -t yaffs2 /dev/block/mtdblock6 /data

mount -o remount,rw -t yaffs2 /dev/block/mtdblock5 /system

rm /system/bin/su

rm /system/xbin/su

Preparing to execute exploit, do chmod

Executing exploit..

cmd: /data/data/com.corner23.android.universalandroot/files/getroot /dev/block/mtdblock6 yaffs2

[*] Android local root exploid © The Android Exploid Crew

[*] Modified by shakalaca for various devices

[+] Using basedir=/data/data/com.corner23.android.universalandroot/files, path=/data/data/com.corner23.android.universalandroot/files/getroot

[+] opening NETLINK_KOBJECT_UEVENT socket

[+] sending add message ...

[-] sendmsg: Connection refused

Wifi enabled ...

/sqlite_stmt_journals/rootshell missing ..

/app-cache/rootshell missing ..

/data/local/tmp/rootshell missing ..

Install/Uninstall rootkit: false

ls -l /sqlite_stmt_journals

opendir failed, Permission denied

ls -l /data/local/tmp

opendir failed, Permission denied

ls -l /app-cache

/app-cache: No such file or directory

run mount

rootfs / rootfs ro,relatime 0 0

tmpfs /dev tmpfs rw,relatime,mode=755 0 0

devpts /dev/pts devpts rw,relatime,mode=600 0 0

proc /proc proc rw,relatime 0 0

sysfs /sys sysfs rw,relatime 0 0

none /acct cgroup rw,relatime,cpuacct 0 0

tmpfs /sqlite_stmt_journals tmpfs rw,relatime,size=4096k 0 0

tmpfs /mnt/asec tmpfs rw,relatime,mode=755,gid=1000 0 0

tmpfs /mnt/obb tmpfs rw,relatime,mode=755,gid=1000 0 0

/dev/block/mtdblock5 /system yaffs2 ro,relatime 0 0

/dev/block/mtdblock6 /data yaffs2 rw,nosuid,nodev,relatime 0 0

/dev/block/mtdblock4 /cache yaffs2 rw,nosuid,nodev,relatime 0 0

/dev/block/vold/179:1 /mnt/sdcard vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0

/dev/block/vold/179:1 /mnt/secure/asec vfat rw,dirsync,nosuid,nodev,noexec,relatime,uid=1000,gid=1015,fmask=0702,dmask=0702,allow_utime=0020,codepage=cp437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro 0 0

tmpfs /mnt/sdcard/.android_secure tmpfs ro,relatime,size=0k,mode=000 0 0

run df

Filesystem Size Used Free Blksize

/dev 210M 32K 210M 4096

/sqlite_stmt_journals 4M 0K 4M 4096

/mnt/asec 210M 0K 210M 4096

/mnt/obb 210M 0K 210M 4096

/system 220M 204M 15M 4096

/data 162M 63M 99M 4096

/cache 57M 1M 56M 4096

/mnt/sdcard 1G 27M 1G 32768

/mnt/secure/asec: Permission denied

Guest Amphoras
Posted

Hi, from those logs, you actually have a San Francisco II which is different from this phone. These root exploits wont work on it. You'll need to go to HTTP://crescent.modaco.com and look at the threads there.

Guest underbeing
Posted

Hi, from those logs, you actually have a San Francisco II which is different from this phone. These root exploits wont work on it. You'll need to go to HTTP://crescent.modaco.com and look at the threads there.

Ha ha ha. What an idiot!

Thanks, John

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.