Advertisement
Guest User

Untitled

a guest
Apr 19th, 2011
831
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 12.40 KB | None | 0 0
  1. I/ActivityManager( 273): Starting: Intent { act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 cmp=com.apedroid.oneclickrecovery/.OneClickRecovery } from pid 373
  2.  
  3. I/ActivityManager( 273): Start proc com.apedroid.oneclickrecovery:three for activity com.apedroid.oneclickrecovery/.OneClickRecovery: pid=798 uid=10089 gids={}
  4.  
  5. W/ResourceType( 273): Skipping entry 0x7f040007 in package table 0 because it is not complex!
  6.  
  7. W/ResourceType( 273): Skipping entry 0x7f040008 in package table 0 because it is not complex!
  8.  
  9. D/dalvikvm( 798): GC_EXTERNAL_ALLOC freed 70K, 54% free 2513K/5379K, external 0K/0K, paused 63ms
  10.  
  11. I/ActivityManager( 273): Displayed com.apedroid.oneclickrecovery/.OneClickRecovery: +432ms (total +1m46s25ms)
  12.  
  13. I/ActivityManager( 273): Starting: Intent { cmp=com.apedroid.oneclickrecovery/.Phase1 } from pid 798
  14.  
  15. D/dalvikvm( 798): Trying to load lib /data/data/com.apedroid.oneclickrecovery/lib/libandroidterm.so 0x405170b8
  16.  
  17. D/dalvikvm( 798): Added shared lib /data/data/com.apedroid.oneclickrecovery/lib/libandroidterm.so 0x405170b8
  18.  
  19. I/Exec ( 798): JNI_OnLoad
  20.  
  21. I/AAA ( 798): Got processid: 807
  22.  
  23. I/AAA ( 798): $
  24.  
  25. I/AAA ( 798): chmod 777 /data/data/com.apedroid.oneclickrecovery/files/rageagainstthecage
  26.  
  27.  
  28. I/AAA ( 798): $ /data/data/com.apedroid.oneclickrecovery/files/rageagainstthecage
  29.  
  30.  
  31. I/AAA ( 798): [*] CVE-2010-EASY Android local root exploit (C) 2010 by 743C
  32.  
  33.  
  34. I/AAA ( 798):
  35.  
  36.  
  37. I/AAA ( 798): [*] checking NPROC limit ...
  38.  
  39.  
  40. I/AAA ( 798): [+] RLIMIT_NPROC={3329, 3329}
  41.  
  42.  
  43. I/AAA ( 798): [*] Searching for adb ...
  44.  
  45.  
  46. I/AAA ( 798): [+] Found adb as PID 230
  47.  
  48.  
  49. I/AAA ( 798): [*] Spawning children. Dont type anything and wait for reset!
  50.  
  51.  
  52. I/AAA ( 798): [*]
  53.  
  54.  
  55. I/AAA ( 798): [*] If you like what we are doing you can send us PayPal money to
  56.  
  57.  
  58. I/AAA ( 798): [*] 7-4-3-C@web.de so we can compensate time, effort and HW costs.
  59.  
  60.  
  61. I/AAA ( 798): [*] If you are a company and feel like you profit from our work,
  62.  
  63.  
  64. I/AAA ( 798): [*] we also accept donations > 1000 USD!
  65.  
  66.  
  67. I/AAA ( 798): [*]
  68.  
  69.  
  70. I/AAA ( 798): [*] adb connection will be reset. restart adb server on desktop and re-login.
  71.  
  72.  
  73. I/ActivityManager( 273): Displayed com.apedroid.oneclickrecovery/.Phase1: +195ms
  74.  
  75. I/AAA ( 798): $
  76.  
  77. D/dalvikvm( 373): GC_EXPLICIT freed 83K, 52% free 3058K/6343K, external 4321K/5268K, paused 52ms
  78.  
  79. I/AAA ( 798):
  80.  
  81. I/AAA ( 798): [+] Forked 3316 childs.
  82.  
  83. I/BBB ( 798): FORKED FOUND!
  84.  
  85. D/dalvikvm( 661): GC_EXPLICIT freed 61K, 51% free 3359K/6727K, external 0K/0K, paused 94ms
  86.  
  87. E/dalvikvm( 4130): cannot setuid(10089): Try again
  88.  
  89. E/dalvikvm( 4130): VM aborting
  90.  
  91. I/DEBUG ( 219): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
  92.  
  93. I/DEBUG ( 219): Build fingerprint: 'google/passion/passion:2.3.3/GRI40/102588:user/release-keys'
  94.  
  95. I/DEBUG ( 219): pid: 4130, tid: 4130 >>> zygote <<<
  96.  
  97. I/DEBUG ( 219): signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr deadd00d
  98.  
  99. I/DEBUG ( 219): r0 fffffe88 r1 deadd00d r2 00000026 r3 00000000
  100.  
  101. I/DEBUG ( 219): r4 aca9e5fc r5 00000000 r6 00000000 r7 00000000
  102.  
  103. I/DEBUG ( 219): r8 aca12200 r9 0000ce68 10 4214fed8 fp bea00ad0
  104.  
  105. I/DEBUG ( 219): ip aca9e708 sp bea00770 lr afd1953d pc aca3fc2e cpsr 20000030
  106.  
  107. I/DEBUG ( 219): d0 400000003eaaaaab d1 0000002e00000000
  108.  
  109. I/DEBUG ( 219): d2 4d73fcf04239c20b d3 00540ff04a1c2700
  110.  
  111. I/DEBUG ( 219): d4 3fbc71c7002709c0 d5 3fcef049fb9094d1
  112.  
  113. I/DEBUG ( 219): d6 401c000000000000 d7 4000000000000000
  114.  
  115. I/DEBUG ( 219): d8 0000000000000000 d9 0000000000000000
  116.  
  117. I/DEBUG ( 219): d10 0000000000000000 d11 0000000000000000
  118.  
  119. I/DEBUG ( 219): d12 0000000000000000 d13 0000000000000000
  120.  
  121. I/DEBUG ( 219): d14 0000000000000000 d15 0000000000000000
  122.  
  123. I/DEBUG ( 219): scr 80000010
  124.  
  125. I/DEBUG ( 219):
  126.  
  127. I/ActivityManager( 273): Start proc com.apedroid.oneclickrecovery:remote for broadcast com.apedroid.oneclickrecovery/.AlarmReceiver: pid=4130 uid=10089 gids={}
  128.  
  129. I/DEBUG ( 219): #00 pc 0003fc2e /system/lib/libdvm.so (dvmAbort)
  130.  
  131. I/DEBUG ( 219): #01 pc 0005f9fc /system/lib/libdvm.so
  132.  
  133. I/DEBUG ( 219): #02 pc 0005fb46 /system/lib/libdvm.so
  134.  
  135. I/DEBUG ( 219): #03 pc 00017244 /system/lib/libdvm.so
  136.  
  137. I/DEBUG ( 219): #04 pc 0001c3d8 /system/lib/libdvm.so (dvmMterpStd)
  138.  
  139. I/DEBUG ( 219): #05 pc 0001b2d4 /system/lib/libdvm.so (dvmInterpret)
  140.  
  141. I/DEBUG ( 219): #06 pc 0005953a /system/lib/libdvm.so (dvmCallMethodV)
  142.  
  143. I/DEBUG ( 219): #07 pc 00045b3c /system/lib/libdvm.so
  144.  
  145. I/DEBUG ( 219): #08 pc 000338c8 /system/lib/libandroid_runtime.so
  146.  
  147. I/DEBUG ( 219): #09 pc 00034666 /system/lib/libandroid_runtime.so (_ZN7android14AndroidRuntime5startEPKcb)
  148.  
  149. I/DEBUG ( 219): #10 pc 00008ca2 /system/bin/app_process
  150.  
  151. I/DEBUG ( 219): #11 pc 00015000 /system/lib/libc.so (__libc_init)
  152.  
  153. I/DEBUG ( 219):
  154.  
  155. I/DEBUG ( 219): code around pc:
  156.  
  157. I/DEBUG ( 219): aca3fc0c 2006447a ed62f7d1 20004c09 ee5af7d1
  158.  
  159. I/DEBUG ( 219): aca3fc1c 447c4808 6bdb5823 d0002b00 49064798
  160.  
  161. I/DEBUG ( 219): aca3fc2c 700a2226 eed8f7d1 000436ed 000452ab
  162.  
  163. I/DEBUG ( 219): aca3fc3c 0005e9da fffffe88 deadd00d b510b40e
  164.  
  165. I/DEBUG ( 219): aca3fc4c 4c0a4b09 b083447b aa05591b ca026b5b
  166.  
  167. I/DEBUG ( 219):
  168.  
  169. I/DEBUG ( 219): code around lr:
  170.  
  171. I/DEBUG ( 219): afd1951c 447b4a0d 589cb083 90012600 686768a5
  172.  
  173. I/DEBUG ( 219): afd1952c 220ce008 2b005eab 1c28d003 47889901
  174.  
  175. I/DEBUG ( 219): afd1953c 35544306 d5f43f01 2c006824 b003d1ee
  176.  
  177. I/DEBUG ( 219): afd1954c bdf01c30 00027fe2 ffffff88 1c0fb5f0
  178.  
  179. I/DEBUG ( 219): afd1955c b0871c3d a9044355 1c16ac01 604d9004
  180.  
  181. I/DEBUG ( 219):
  182.  
  183. I/DEBUG ( 219): stack:
  184.  
  185. I/DEBUG ( 219): bea00730 00000015
  186.  
  187. I/DEBUG ( 219): bea00734 afd185d3 /system/lib/libc.so
  188.  
  189. I/DEBUG ( 219): bea00738 afd4270c /system/lib/libc.so
  190.  
  191. I/DEBUG ( 219): bea0073c afd426b8 /system/lib/libc.so
  192.  
  193. I/DEBUG ( 219): bea00740 00000000
  194.  
  195. I/DEBUG ( 219): bea00744 afd1953d /system/lib/libc.so
  196.  
  197. I/DEBUG ( 219): bea00748 bea00760
  198.  
  199. I/DEBUG ( 219): bea0074c afd185a5 /system/lib/libc.so
  200.  
  201. I/DEBUG ( 219): bea00750 aca9e5fc /system/lib/libdvm.so
  202.  
  203. I/DEBUG ( 219): bea00754 0005e9da [heap]
  204.  
  205. I/DEBUG ( 219): bea00758 00000000
  206.  
  207. I/DEBUG ( 219): bea0075c 00000000
  208.  
  209. I/DEBUG ( 219): bea00760 00000000
  210.  
  211. I/DEBUG ( 219): bea00764 afd18603 /system/lib/libc.so
  212.  
  213. I/DEBUG ( 219): bea00768 df002777
  214.  
  215. I/DEBUG ( 219): bea0076c e3a070ad
  216.  
  217. I/DEBUG ( 219): #00 bea00770 aca9e5fc /system/lib/libdvm.so
  218.  
  219. I/DEBUG ( 219): bea00774 aca5fa01 /system/lib/libdvm.so
  220.  
  221. I/DEBUG ( 219): #01 bea00778 afd471ec
  222.  
  223. I/DEBUG ( 219): bea0077c 0000ce68 [heap]
  224.  
  225. I/DEBUG ( 219): bea00780 4003b7f0 /dev/ashmem/dalvik-heap (deleted)
  226.  
  227. I/DEBUG ( 219): bea00784 ad3487c1 /system/lib/libandroid_runtime.so
  228.  
  229. I/DEBUG ( 219): bea00788 421bef5c /dev/ashmem/dalvik-LinearAlloc (deleted)
  230.  
  231. I/DEBUG ( 219): bea0078c 0000ce68 [heap]
  232.  
  233. I/DEBUG ( 219): bea00790 00000000
  234.  
  235. I/DEBUG ( 219): bea00794 00000000
  236.  
  237. I/DEBUG ( 219): bea00798 4214febc
  238.  
  239. I/DEBUG ( 219): bea0079c 00002769
  240.  
  241. I/DEBUG ( 219): bea007a0 00002769
  242.  
  243. I/DEBUG ( 219): bea007a4 00000001
  244.  
  245. I/DEBUG ( 219): bea007a8 00000000
  246.  
  247. I/DEBUG ( 219): bea007ac 00000000
  248.  
  249. I/DEBUG ( 219): bea007b0 00000001
  250.  
  251. I/DEBUG ( 219): bea007b4 bea00820
  252.  
  253. I/DEBUG ( 219): bea007b8 4214ff14
  254.  
  255. I/DEBUG ( 219): bea007bc bea00818
  256.  
  257. I/DEBUG ( 219): bea007c0 40178738 /dev/ashmem/dalvik-heap (deleted)
  258.  
  259. I/DEBUG ( 219): bea007c4 aca5fb4b /system/lib/libdvm.so
  260.  
  261. I/BootReceiver( 273): Copying /data/tombstones/tombstone_03 to DropBox (SYSTEM_TOMBSTONE)
  262.  
  263. D/Zygote ( 221): Process 4130 terminated by signal (11)
  264.  
  265. D/dalvikvm( 273): GC_CONCURRENT freed 1217K, 39% free 6256K/10119K, external 4714K/5064K, paused 5ms+24ms
  266.  
  267. D/dalvikvm( 273): GC_CONCURRENT freed 1316K, 37% free 6982K/10951K, external 1624K/2136K, paused 15ms+28ms
  268.  
  269. W/ProcessStats( 273): Skipping unknown process pid 4130
  270.  
  271. W/ActivityManager( 273): Timeout of broadcast BroadcastRecord{408d7cc8 null} - receiver=null, started 10008ms ago
  272.  
  273. I/Process ( 273): Sending signal. PID: 4130 SIG: 9
  274.  
  275. W/ActivityManager( 273): Receiver during timeout: ResolveInfo{408d7c40 com.apedroid.oneclickrecovery.AlarmReceiver p=0 o=0 m=0x0}
  276.  
  277. W/ActivityManager( 273): finishReceiver called but none active
  278.  
  279. W/ActivityManager( 273): Process ProcessRecord{409237e0 4130:com.apedroid.oneclickrecovery:remote/10089} failed to attach
  280.  
  281. I/Process ( 273): Sending signal. PID: 4130 SIG: 3
  282.  
  283. I/Process ( 273): Sending signal. PID: 273 SIG: 3
  284.  
  285. I/dalvikvm( 273): threadid=4: reacting to signal 3
  286.  
  287. I/dalvikvm( 273): Wrote stack traces to '/data/anr/traces.txt'
  288.  
  289. I/Process ( 273): Sending signal. PID: 362 SIG: 3
  290.  
  291. I/dalvikvm( 362): threadid=4: reacting to signal 3
  292.  
  293. I/dalvikvm( 362): Wrote stack traces to '/data/anr/traces.txt'
  294.  
  295. I/Process ( 273): Sending signal. PID: 333 SIG: 3
  296.  
  297. I/dalvikvm( 333): threadid=4: reacting to signal 3
  298.  
  299. I/dalvikvm( 333): Wrote stack traces to '/data/anr/traces.txt'
  300.  
  301. D/dalvikvm( 273): GC_CONCURRENT freed 1034K, 34% free 7500K/11207K, external 1624K/2136K, paused 5ms+35ms
  302.  
  303. D/dalvikvm( 273): GC_CONCURRENT freed 1108K, 33% free 8053K/11847K, external 1624K/2136K, paused 15ms+24ms
  304.  
  305. D/dalvikvm( 273): GC_FOR_MALLOC freed 1161K, 31% free 8694K/12551K, external 1624K/2136K, paused 282ms
  306.  
  307. D/dalvikvm( 273): GC_CONCURRENT freed 261K, 30% free 8854K/12551K, external 1624K/2136K, paused 22ms+58ms
  308.  
  309. D/dalvikvm( 273): GC_CONCURRENT freed 1275K, 30% free 9532K/13511K, external 1624K/2136K, paused 5ms+21ms
  310.  
  311. W/ResourceType( 273): Skipping entry 0x7f040006 in package table 0 because it is not complex!
  312.  
  313. W/ResourceType( 273): Skipping entry 0x7f040005 in package table 0 because it is not complex!
  314.  
  315. I/ActivityManager( 273): No longer want com.google.android.apps.maps:FriendService (pid 652): hidden #16
  316.  
  317. D/dalvikvm( 273): GC_CONCURRENT freed 1320K, 29% free 10242K/14279K, external 1624K/2136K, paused 5ms+30ms
  318.  
  319. D/dalvikvm( 273): GC_EXPLICIT freed 784K, 26% free 10631K/14279K, external 1624K/2136K, paused 319ms
  320.  
  321. E/ActivityManager( 273): ANR in com.apedroid.oneclickrecovery:remote
  322.  
  323. E/ActivityManager( 273): Reason: Broadcast of Intent { flg=0x4 cmp=com.apedroid.oneclickrecovery/.AlarmReceiver (has extras) }
  324.  
  325. E/ActivityManager( 273): Load: 0.0 / 0.0 / 0.0
  326.  
  327. E/ActivityManager( 273): CPU usage from 0ms to 10709ms later:
  328.  
  329. E/ActivityManager( 273): 50% 813/rageagainstthecage: 13% user + 36% kernel / faults: 2 minor
  330.  
  331. E/ActivityManager( 273): 42% 273/system_server: 30% user + 11% kernel / faults: 1903 minor 1 major
  332.  
  333. E/ActivityManager( 273): 3.9% 228/akmd2: 3.7% user + 0.1% kernel
  334.  
  335. E/ActivityManager( 273): 0.2% 373/android.process.acore: 0.2% user + 0% kernel / faults: 378 minor
  336.  
  337. E/ActivityManager( 273): 0.4% 812/rageagainstthecage: 0.3% user + 0% kernel
  338.  
  339. E/ActivityManager( 273): 0% 4/events/0: 0% user + 0% kernel
  340.  
  341. E/ActivityManager( 273): 0% 798/com.apedroid.oneclickrecovery:three: 0% user + 0% kernel / faults: 6 minor
  342.  
  343. E/ActivityManager( 273): 0% 351/com.swype.android.inputmethod: 0% user + 0% kernel / faults: 2 minor
  344.  
  345. E/ActivityManager( 273): +0% 4131/rageagainstthec: 0% user + 0% kernel
  346.  
  347. E/ActivityManager( 273): 100% TOTAL: 50% user + 49% kernel
  348.  
  349. E/ActivityManager( 273): CPU usage from 8769ms to 9984ms later:
  350.  
  351. E/ActivityManager( 273): 67% 813/rageagainstthecage: 13% user + 53% kernel
  352.  
  353. E/ActivityManager( 273): 27% 273/system_server: 12% user + 15% kernel / faults: 1 minor
  354.  
  355. E/ActivityManager( 273): 27% 295/ActivityManager: 12% user + 15% kernel
  356.  
  357. E/ActivityManager( 273): 3.2% 228/akmd2: 3.2% user + 0% kernel
  358.  
  359. E/ActivityManager( 273): 4% 290/akmd2: 4% user + 0% kernel
  360.  
  361. E/ActivityManager( 273): 0.2% 4/events/0: 0.1% user + 0.1% kernel
  362.  
  363. E/ActivityManager( 273): 0.8% 812/rageagainstthecage: 0.8% user + 0% kernel
  364.  
  365. E/ActivityManager( 273): 100% TOTAL: 30% user + 69% kernel
  366.  
  367. I/Process ( 273): Sending signal. PID: 4130 SIG: 9
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement