Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- I/ActivityManager( 273): Starting: Intent { act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 cmp=com.apedroid.oneclickrecovery/.OneClickRecovery } from pid 373
- I/ActivityManager( 273): Start proc com.apedroid.oneclickrecovery:three for activity com.apedroid.oneclickrecovery/.OneClickRecovery: pid=798 uid=10089 gids={}
- W/ResourceType( 273): Skipping entry 0x7f040007 in package table 0 because it is not complex!
- W/ResourceType( 273): Skipping entry 0x7f040008 in package table 0 because it is not complex!
- D/dalvikvm( 798): GC_EXTERNAL_ALLOC freed 70K, 54% free 2513K/5379K, external 0K/0K, paused 63ms
- I/ActivityManager( 273): Displayed com.apedroid.oneclickrecovery/.OneClickRecovery: +432ms (total +1m46s25ms)
- I/ActivityManager( 273): Starting: Intent { cmp=com.apedroid.oneclickrecovery/.Phase1 } from pid 798
- D/dalvikvm( 798): Trying to load lib /data/data/com.apedroid.oneclickrecovery/lib/libandroidterm.so 0x405170b8
- D/dalvikvm( 798): Added shared lib /data/data/com.apedroid.oneclickrecovery/lib/libandroidterm.so 0x405170b8
- I/Exec ( 798): JNI_OnLoad
- I/AAA ( 798): Got processid: 807
- I/AAA ( 798): $
- I/AAA ( 798): chmod 777 /data/data/com.apedroid.oneclickrecovery/files/rageagainstthecage
- I/AAA ( 798): $ /data/data/com.apedroid.oneclickrecovery/files/rageagainstthecage
- I/AAA ( 798): [*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
- I/AAA ( 798):
- I/AAA ( 798): [*] checking NPROC limit ...
- I/AAA ( 798): [+] RLIMIT_NPROC={3329, 3329}
- I/AAA ( 798): [*] Searching for adb ...
- I/AAA ( 798): [+] Found adb as PID 230
- I/AAA ( 798): [*] Spawning children. Dont type anything and wait for reset!
- I/AAA ( 798): [*]
- I/AAA ( 798): [*] If you like what we are doing you can send us PayPal money to
- I/AAA ( 798): [*] 7-4-3-C@web.de so we can compensate time, effort and HW costs.
- I/AAA ( 798): [*] If you are a company and feel like you profit from our work,
- I/AAA ( 798): [*] we also accept donations > 1000 USD!
- I/AAA ( 798): [*]
- I/AAA ( 798): [*] adb connection will be reset. restart adb server on desktop and re-login.
- I/ActivityManager( 273): Displayed com.apedroid.oneclickrecovery/.Phase1: +195ms
- I/AAA ( 798): $
- D/dalvikvm( 373): GC_EXPLICIT freed 83K, 52% free 3058K/6343K, external 4321K/5268K, paused 52ms
- I/AAA ( 798):
- I/AAA ( 798): [+] Forked 3316 childs.
- I/BBB ( 798): FORKED FOUND!
- D/dalvikvm( 661): GC_EXPLICIT freed 61K, 51% free 3359K/6727K, external 0K/0K, paused 94ms
- E/dalvikvm( 4130): cannot setuid(10089): Try again
- E/dalvikvm( 4130): VM aborting
- I/DEBUG ( 219): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
- I/DEBUG ( 219): Build fingerprint: 'google/passion/passion:2.3.3/GRI40/102588:user/release-keys'
- I/DEBUG ( 219): pid: 4130, tid: 4130 >>> zygote <<<
- I/DEBUG ( 219): signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr deadd00d
- I/DEBUG ( 219): r0 fffffe88 r1 deadd00d r2 00000026 r3 00000000
- I/DEBUG ( 219): r4 aca9e5fc r5 00000000 r6 00000000 r7 00000000
- I/DEBUG ( 219): r8 aca12200 r9 0000ce68 10 4214fed8 fp bea00ad0
- I/DEBUG ( 219): ip aca9e708 sp bea00770 lr afd1953d pc aca3fc2e cpsr 20000030
- I/DEBUG ( 219): d0 400000003eaaaaab d1 0000002e00000000
- I/DEBUG ( 219): d2 4d73fcf04239c20b d3 00540ff04a1c2700
- I/DEBUG ( 219): d4 3fbc71c7002709c0 d5 3fcef049fb9094d1
- I/DEBUG ( 219): d6 401c000000000000 d7 4000000000000000
- I/DEBUG ( 219): d8 0000000000000000 d9 0000000000000000
- I/DEBUG ( 219): d10 0000000000000000 d11 0000000000000000
- I/DEBUG ( 219): d12 0000000000000000 d13 0000000000000000
- I/DEBUG ( 219): d14 0000000000000000 d15 0000000000000000
- I/DEBUG ( 219): scr 80000010
- I/DEBUG ( 219):
- I/ActivityManager( 273): Start proc com.apedroid.oneclickrecovery:remote for broadcast com.apedroid.oneclickrecovery/.AlarmReceiver: pid=4130 uid=10089 gids={}
- I/DEBUG ( 219): #00 pc 0003fc2e /system/lib/libdvm.so (dvmAbort)
- I/DEBUG ( 219): #01 pc 0005f9fc /system/lib/libdvm.so
- I/DEBUG ( 219): #02 pc 0005fb46 /system/lib/libdvm.so
- I/DEBUG ( 219): #03 pc 00017244 /system/lib/libdvm.so
- I/DEBUG ( 219): #04 pc 0001c3d8 /system/lib/libdvm.so (dvmMterpStd)
- I/DEBUG ( 219): #05 pc 0001b2d4 /system/lib/libdvm.so (dvmInterpret)
- I/DEBUG ( 219): #06 pc 0005953a /system/lib/libdvm.so (dvmCallMethodV)
- I/DEBUG ( 219): #07 pc 00045b3c /system/lib/libdvm.so
- I/DEBUG ( 219): #08 pc 000338c8 /system/lib/libandroid_runtime.so
- I/DEBUG ( 219): #09 pc 00034666 /system/lib/libandroid_runtime.so (_ZN7android14AndroidRuntime5startEPKcb)
- I/DEBUG ( 219): #10 pc 00008ca2 /system/bin/app_process
- I/DEBUG ( 219): #11 pc 00015000 /system/lib/libc.so (__libc_init)
- I/DEBUG ( 219):
- I/DEBUG ( 219): code around pc:
- I/DEBUG ( 219): aca3fc0c 2006447a ed62f7d1 20004c09 ee5af7d1
- I/DEBUG ( 219): aca3fc1c 447c4808 6bdb5823 d0002b00 49064798
- I/DEBUG ( 219): aca3fc2c 700a2226 eed8f7d1 000436ed 000452ab
- I/DEBUG ( 219): aca3fc3c 0005e9da fffffe88 deadd00d b510b40e
- I/DEBUG ( 219): aca3fc4c 4c0a4b09 b083447b aa05591b ca026b5b
- I/DEBUG ( 219):
- I/DEBUG ( 219): code around lr:
- I/DEBUG ( 219): afd1951c 447b4a0d 589cb083 90012600 686768a5
- I/DEBUG ( 219): afd1952c 220ce008 2b005eab 1c28d003 47889901
- I/DEBUG ( 219): afd1953c 35544306 d5f43f01 2c006824 b003d1ee
- I/DEBUG ( 219): afd1954c bdf01c30 00027fe2 ffffff88 1c0fb5f0
- I/DEBUG ( 219): afd1955c b0871c3d a9044355 1c16ac01 604d9004
- I/DEBUG ( 219):
- I/DEBUG ( 219): stack:
- I/DEBUG ( 219): bea00730 00000015
- I/DEBUG ( 219): bea00734 afd185d3 /system/lib/libc.so
- I/DEBUG ( 219): bea00738 afd4270c /system/lib/libc.so
- I/DEBUG ( 219): bea0073c afd426b8 /system/lib/libc.so
- I/DEBUG ( 219): bea00740 00000000
- I/DEBUG ( 219): bea00744 afd1953d /system/lib/libc.so
- I/DEBUG ( 219): bea00748 bea00760
- I/DEBUG ( 219): bea0074c afd185a5 /system/lib/libc.so
- I/DEBUG ( 219): bea00750 aca9e5fc /system/lib/libdvm.so
- I/DEBUG ( 219): bea00754 0005e9da [heap]
- I/DEBUG ( 219): bea00758 00000000
- I/DEBUG ( 219): bea0075c 00000000
- I/DEBUG ( 219): bea00760 00000000
- I/DEBUG ( 219): bea00764 afd18603 /system/lib/libc.so
- I/DEBUG ( 219): bea00768 df002777
- I/DEBUG ( 219): bea0076c e3a070ad
- I/DEBUG ( 219): #00 bea00770 aca9e5fc /system/lib/libdvm.so
- I/DEBUG ( 219): bea00774 aca5fa01 /system/lib/libdvm.so
- I/DEBUG ( 219): #01 bea00778 afd471ec
- I/DEBUG ( 219): bea0077c 0000ce68 [heap]
- I/DEBUG ( 219): bea00780 4003b7f0 /dev/ashmem/dalvik-heap (deleted)
- I/DEBUG ( 219): bea00784 ad3487c1 /system/lib/libandroid_runtime.so
- I/DEBUG ( 219): bea00788 421bef5c /dev/ashmem/dalvik-LinearAlloc (deleted)
- I/DEBUG ( 219): bea0078c 0000ce68 [heap]
- I/DEBUG ( 219): bea00790 00000000
- I/DEBUG ( 219): bea00794 00000000
- I/DEBUG ( 219): bea00798 4214febc
- I/DEBUG ( 219): bea0079c 00002769
- I/DEBUG ( 219): bea007a0 00002769
- I/DEBUG ( 219): bea007a4 00000001
- I/DEBUG ( 219): bea007a8 00000000
- I/DEBUG ( 219): bea007ac 00000000
- I/DEBUG ( 219): bea007b0 00000001
- I/DEBUG ( 219): bea007b4 bea00820
- I/DEBUG ( 219): bea007b8 4214ff14
- I/DEBUG ( 219): bea007bc bea00818
- I/DEBUG ( 219): bea007c0 40178738 /dev/ashmem/dalvik-heap (deleted)
- I/DEBUG ( 219): bea007c4 aca5fb4b /system/lib/libdvm.so
- I/BootReceiver( 273): Copying /data/tombstones/tombstone_03 to DropBox (SYSTEM_TOMBSTONE)
- D/Zygote ( 221): Process 4130 terminated by signal (11)
- D/dalvikvm( 273): GC_CONCURRENT freed 1217K, 39% free 6256K/10119K, external 4714K/5064K, paused 5ms+24ms
- D/dalvikvm( 273): GC_CONCURRENT freed 1316K, 37% free 6982K/10951K, external 1624K/2136K, paused 15ms+28ms
- W/ProcessStats( 273): Skipping unknown process pid 4130
- W/ActivityManager( 273): Timeout of broadcast BroadcastRecord{408d7cc8 null} - receiver=null, started 10008ms ago
- I/Process ( 273): Sending signal. PID: 4130 SIG: 9
- W/ActivityManager( 273): Receiver during timeout: ResolveInfo{408d7c40 com.apedroid.oneclickrecovery.AlarmReceiver p=0 o=0 m=0x0}
- W/ActivityManager( 273): finishReceiver called but none active
- W/ActivityManager( 273): Process ProcessRecord{409237e0 4130:com.apedroid.oneclickrecovery:remote/10089} failed to attach
- I/Process ( 273): Sending signal. PID: 4130 SIG: 3
- I/Process ( 273): Sending signal. PID: 273 SIG: 3
- I/dalvikvm( 273): threadid=4: reacting to signal 3
- I/dalvikvm( 273): Wrote stack traces to '/data/anr/traces.txt'
- I/Process ( 273): Sending signal. PID: 362 SIG: 3
- I/dalvikvm( 362): threadid=4: reacting to signal 3
- I/dalvikvm( 362): Wrote stack traces to '/data/anr/traces.txt'
- I/Process ( 273): Sending signal. PID: 333 SIG: 3
- I/dalvikvm( 333): threadid=4: reacting to signal 3
- I/dalvikvm( 333): Wrote stack traces to '/data/anr/traces.txt'
- D/dalvikvm( 273): GC_CONCURRENT freed 1034K, 34% free 7500K/11207K, external 1624K/2136K, paused 5ms+35ms
- D/dalvikvm( 273): GC_CONCURRENT freed 1108K, 33% free 8053K/11847K, external 1624K/2136K, paused 15ms+24ms
- D/dalvikvm( 273): GC_FOR_MALLOC freed 1161K, 31% free 8694K/12551K, external 1624K/2136K, paused 282ms
- D/dalvikvm( 273): GC_CONCURRENT freed 261K, 30% free 8854K/12551K, external 1624K/2136K, paused 22ms+58ms
- D/dalvikvm( 273): GC_CONCURRENT freed 1275K, 30% free 9532K/13511K, external 1624K/2136K, paused 5ms+21ms
- W/ResourceType( 273): Skipping entry 0x7f040006 in package table 0 because it is not complex!
- W/ResourceType( 273): Skipping entry 0x7f040005 in package table 0 because it is not complex!
- I/ActivityManager( 273): No longer want com.google.android.apps.maps:FriendService (pid 652): hidden #16
- D/dalvikvm( 273): GC_CONCURRENT freed 1320K, 29% free 10242K/14279K, external 1624K/2136K, paused 5ms+30ms
- D/dalvikvm( 273): GC_EXPLICIT freed 784K, 26% free 10631K/14279K, external 1624K/2136K, paused 319ms
- E/ActivityManager( 273): ANR in com.apedroid.oneclickrecovery:remote
- E/ActivityManager( 273): Reason: Broadcast of Intent { flg=0x4 cmp=com.apedroid.oneclickrecovery/.AlarmReceiver (has extras) }
- E/ActivityManager( 273): Load: 0.0 / 0.0 / 0.0
- E/ActivityManager( 273): CPU usage from 0ms to 10709ms later:
- E/ActivityManager( 273): 50% 813/rageagainstthecage: 13% user + 36% kernel / faults: 2 minor
- E/ActivityManager( 273): 42% 273/system_server: 30% user + 11% kernel / faults: 1903 minor 1 major
- E/ActivityManager( 273): 3.9% 228/akmd2: 3.7% user + 0.1% kernel
- E/ActivityManager( 273): 0.2% 373/android.process.acore: 0.2% user + 0% kernel / faults: 378 minor
- E/ActivityManager( 273): 0.4% 812/rageagainstthecage: 0.3% user + 0% kernel
- E/ActivityManager( 273): 0% 4/events/0: 0% user + 0% kernel
- E/ActivityManager( 273): 0% 798/com.apedroid.oneclickrecovery:three: 0% user + 0% kernel / faults: 6 minor
- E/ActivityManager( 273): 0% 351/com.swype.android.inputmethod: 0% user + 0% kernel / faults: 2 minor
- E/ActivityManager( 273): +0% 4131/rageagainstthec: 0% user + 0% kernel
- E/ActivityManager( 273): 100% TOTAL: 50% user + 49% kernel
- E/ActivityManager( 273): CPU usage from 8769ms to 9984ms later:
- E/ActivityManager( 273): 67% 813/rageagainstthecage: 13% user + 53% kernel
- E/ActivityManager( 273): 27% 273/system_server: 12% user + 15% kernel / faults: 1 minor
- E/ActivityManager( 273): 27% 295/ActivityManager: 12% user + 15% kernel
- E/ActivityManager( 273): 3.2% 228/akmd2: 3.2% user + 0% kernel
- E/ActivityManager( 273): 4% 290/akmd2: 4% user + 0% kernel
- E/ActivityManager( 273): 0.2% 4/events/0: 0.1% user + 0.1% kernel
- E/ActivityManager( 273): 0.8% 812/rageagainstthecage: 0.8% user + 0% kernel
- E/ActivityManager( 273): 100% TOTAL: 30% user + 69% kernel
- I/Process ( 273): Sending signal. PID: 4130 SIG: 9
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement