FORUMS

Analysis & Opinion

[Root][4.4.2 ND7]GhettoRoot (Towelroot port) v0.3.2

21 posts
Thanks Meter: 64
 
By 25yvdgpo06, Junior Member on 1st September 2014, 05:22 AM
Post Reply Subscribe to Thread Email Thread
6th August 2015, 04:54 AM |#521  
Junior Member
Thanks Meter: 0
 
More
Continued: And here is the v0.2.2 debug.txt

Code:
  Can we start up ADB?
  Yes!

  Can a device be found?
  No. Cannot see your Android device.

*** USB CONNECTION CHECKLIST: (1/2)

* Have you unlocked your phone on the lockscreen?

* Have you tried switching USB modes via the USB notification?
  Try toggling between Camera and MTP mode.

* Have you downloaded and installed the proper drivers?
  - Try searching for and using: Koush Universal ADB driver

* Have you enabled USB debugging?
  - You can enable this by going to Settings, About device on your
    phone and tapping Build number several times. Then, go Back,
    enter Developer options, and check to enable USB debugging.



*** USB CONNECTION CHECKLIST: (2/2)

* Nothing is working!
  - One other thing to try is to access a hidden menu on your phone
    to change USB settings. Sometimes this helps. See below.

  - On the Verizon Galaxy Note 2 with 4.4.2 firmware, you can enter
    ##366633# and then try switching back and forth between Enable
    and Disable DM Mode, reconnecting your phone and/or toggling
    USB debugging in between. This is a last-ditch effort, but it
    might help.

  - Remember that USSD code and the original Enable/Disable value so
    that you can put it back when done.



  Can we start up ADB?
  Yes!

  Can a device be found?
  No. Cannot see your Android device.

*** USB CONNECTION CHECKLIST: (1/2)

* Have you unlocked your phone on the lockscreen?

* Have you tried switching USB modes via the USB notification?
  Try toggling between Camera and MTP mode.

* Have you downloaded and installed the proper drivers?
  - Try searching for and using: Koush Universal ADB driver

* Have you enabled USB debugging?
  - You can enable this by going to Settings, About device on your
    phone and tapping Build number several times. Then, go Back,
    enter Developer options, and check to enable USB debugging.



*** USB CONNECTION CHECKLIST: (2/2)

* Nothing is working!
  - One other thing to try is to access a hidden menu on your phone
    to change USB settings. Sometimes this helps. See below.

  - On the Verizon Galaxy Note 2 with 4.4.2 firmware, you can enter
    ##366633# and then try switching back and forth between Enable
    and Disable DM Mode, reconnecting your phone and/or toggling
    USB debugging in between. This is a last-ditch effort, but it
    might help.

  - Remember that USSD code and the original Enable/Disable value so
    that you can put it back when done.



  Can we start up ADB?
  Yes!

  Can a device be found?
  Yes!

  Can we communicate with a device?
  Yes! (This message came from your device.)

* READ the README file before continuing.

* WARNING: This process may void your warranty or cause unexpected damage
* to your device. By using this software, you are accepting these risks.

* This is your last chance to back out!


 * Cleaned!

push: ./scripts/../files/ghettoroot -> /data/local/tmp/ghetto/ghettoroot
push: ./scripts/../files/UPDATE-SuperSU.zip -> /data/local/tmp/ghetto/UPDATE-SuperSU.zip
push: ./scripts/../files/busybox -> /data/local/tmp/ghetto/busybox
3 files pushed. 0 files skipped.
10404 KB/s (3187157 bytes in 0.299s)

*** Necessary files pushed. Now run ./root.sh.
    Give it a few seconds or your device will be overwhelmed.

 * Preparation files transferred!


************************************************
native ghettoroot, aka cube-towel, aka towelroot
running with pid 10122
Kernel version: Linux version 3.0.31-1496113 (dpi@SWDD5710) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Thu May 8 01:19:38 KST 2014
Found matching phone: Linux version 3.0.31-

modstring: 1337 0 1 0 4 0
************************************************

[DEBUG] init_exploit:1208: function start
[DEBUG] send_magicmsg:817: function start
[DEBUG] make_socket:781: function start
[DEBUG] search_goodnum:938: function start
[DEBUG] search_goodnum:941: loop FUTEX_CMP_REQUEUE_PI
[DEBUG] accept_socket:1173: function start
[DEBUG] accept_socket:1195: Socket tastefully accepted.
[DEBUG] make_socket:804: function exit
[DEBUG] wake_actionthread:715: function start
[DEBUG] make_sigaction:669: function start
[DEBUG] wake_actionthread:739: loop while waiting for other thread
[DEBUG] make_sigaction:688: loop while waiting for other thread
[DEBUG] wake_actionthread:767: mutex unlock
[DEBUG] wake_actionthread:770: function exit
[DEBUG] wake_actionthread:715: function start
[DEBUG] make_sigaction:669: function start
[DEBUG] wake_actionthread:739: loop while waiting for other thread
[DEBUG] make_sigaction:688: loop while waiting for other thread
[DEBUG] wake_actionthread:767: mutex unlock
[DEBUG] wake_actionthread:770: function exit
[DEBUG] search_goodnum:957: single FUTEX_CMP_REQUEUE_PI
[DEBUG] search_goodnum:960: loop while waiting for other thread
[DEBUG] send_magicmsg:858: loop while waiting for other thread
[DEBUG] send_magicmsg:867: perform selected method
[INFO] search_goodnum:1003: starting the dangerous things
[DEBUG] setup_exploit:913: function start
[DEBUG] setup_exploit:920: function exit
[DEBUG] setup_exploit:913: function start
[DEBUG] setup_exploit:920: function exit
[DEBUG] search_goodnum:1007: MAGIC: a0000800
[DEBUG] search_goodnum:1008: MAGIC_ALT: 00100800
[DEBUG] search_goodnum:1011: magicval: a0000820
[DEBUG] wake_actionthread:715: function start
[DEBUG] make_sigaction:669: function start
[DEBUG] wake_actionthread:739: loop while waiting for other thread
[DEBUG] make_sigaction:688: loop while waiting for other thread
[DEBUG] wake_actionthread:767: mutex unlock
[DEBUG] wake_actionthread:770: function exit
[DEBUG] search_goodnum:1016: MAGIC = MAGIC_ALT;
[DEBUG] search_goodnum:1020: Entering while loop...
[DEBUG] setup_exploit:913: function start
[DEBUG] setup_exploit:920: function exit
[DEBUG] wake_actionthread:715: function start
[DEBUG] make_sigaction:669: function start
[DEBUG] wake_actionthread:739: loop while waiting for other thread
[DEBUG] make_sigaction:688: loop while waiting for other thread
[DEBUG] wake_actionthread:767: mutex unlock
[DEBUG] wake_actionthread:770: function exit
[DEBUG] search_goodnum:1031: 0xe97e6000 is a good number
[DEBUG] get_root:483: thread ID: 10129
[DEBUG] get_root:495: cpid1 resumed
[DEBUG] get_root:503: HACKS_fdm = 7 [/dev/pts/1]
[DEBUG] setup_exploit:913: function start
[DEBUG] setup_exploit:920: function exit
[DEBUG] wake_actionthread:715: function start
[DEBUG] make_sigaction:669: function start
[DEBUG] wake_actionthread:739: loop while waiting for other thread
[DEBUG] make_sigaction:688: loop while waiting for other thread
[DEBUG] wake_actionthread:767: mutex unlock
[DEBUG] wake_actionthread:770: function exit
[DEBUG] search_goodnum:1133: 0xcd84dd5c is also a good number
[DEBUG] setup_exploit:913: function start
[DEBUG] setup_exploit:920: function exit
[DEBUG] wake_actionthread:715: function start
[DEBUG] make_sigaction:669: function start
[DEBUG] wake_actionthread:739: loop while waiting for other thread
[DEBUG] make_sigaction:688: loop while waiting for other thread
[DEBUG] wake_actionthread:767: mutex unlock
[DEBUG] wake_actionthread:770: function exit
[DEBUG] get_root:483: thread ID: 10131
[DEBUG] search_goodnum:1150: Writing to HACKS_fdm...
[DEBUG] get_root:531: Writing new addr_limit to thread...
[DEBUG] write_pipe:297: dest:cd3fe008 src:0001701c count:4
[DEBUG] get_root:541: cpid3 resumed
[DEBUG] read_pipe:271: function start
[DEBUG] read_pipe:275: dest:412c9a44 src:cd3fe000 count:16
[DEBUG] read_pipe:288: function exit
[DEBUG] get_root:547: ti.task=e70dbfc0 .flags=00000200 .preempt_count=1 .addr_limit=ffffffff
[DEBUG] read_pipe:271: function start
[DEBUG] read_pipe:275: dest:412c9644 src:e70dbfc0 count:1024
[DEBUG] read_pipe:288: function exit
[INFO] get_root:551: Address limit successfully extended, seemingly
[DEBUG] get_root:557: Contents of taskbuf:
00000000 cd3fe000 00000002 00400040 00000000 00000000 00000001 00000001 00000082 00000082 00000082 00000000 c065fae0 00000000 0000006e 0253c825 00000001 e9c799c0 00000000 c316b5a0 e9c799cc 00000001 74a0dc90 00000071 000290e6 00000000 3e5e5d11 00000810 000290e6 00000000 00000000 00000000 00000000 00000000 0055db54 00000000 0000000e 00000000 005aed05 00000000 00000000 00000000 00000000 00000000 00000000 00000000 000283b8 00000000 000283b8 00000000 00000000 00000000 00000000 00000000 00007583 00000000 0000135e 00000000 00000000 00000000 00000006 00000000 00000000 00000000 00000000 00000000 00000000 00000000 0000000b 00000000 00000000 00000000 00000000 00000000 0000000b 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 c316b570 00000000 00000000 e70dc128 e70dc128 00000000 000000c8 00000001 00000000 00000000 c316b610 00000000 00000000 00000000 00000000 00000001 00000000 00000000 e70dc164 e70dc164 00000000 0000000d 00000000 005a9b51 00000000 74a0dc90 00000071 00000000 00000000 c0acfb40 e80dfd10 0000008c e70dc19c e70dc19c e70dc1a4 e70dc1a4 ea22e000 ea22e000 00000001 00000001 00000000 00000001 00000000 00000000 00000000 ffffffff 00000000 00000000 00800000 00000000 00002793 0000278a e80dfb40 e80dfb40 e70dc1f4 e70dc1f4 e70dc1fc e70dc1fc e9dd1980 e70dc208 e70dc208 e70dc210 e70dc210 00000000 e8da7388 e8da7380 e80dfda4 e70c7c8c e70c7c80 e80dfdb0 e70c7c90 e70c7c80 e9dd1bfc dbf617bc 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000001 0000000b 000001e7 10ca615c 000001e7 10ca615c 00000001 00000000 00000000 00000000 00000000 00000000 00000000 e70dc2a0 
[INFO] get_root:567: Supposedly found credential at taskbuf[184]: e825c300
[DEBUG] read_pipe:271: function start
[DEBUG] read_pipe:275: dest:412c95e8 src:e825c300 count:92
[DEBUG] read_pipe:288: function exit
[DEBUG] read_pipe:271: function start
[DEBUG] read_pipe:275: dest:412c95d0 src:cd1bb7c0 count:24
[DEBUG] read_pipe:288: function exit
[DEBUG] get_root:590: YOU ARE A SCARY PHONE
[DEBUG] write_pipe:297: dest:cd1bb7c0 src:412c95d0 count:24
[DEBUG] write_pipe:297: dest:e825c300 src:412c95e8 count:92
[DEBUG] write_pipe:297: dest:e70dc1e4 src:00017020 count:4
[INFO] postroot:386: Disabling Knox
[INFO] postroot:393: Setting SEAndroid Permissive
[INFO] postroot:396: Disabling Knox (again, just in case)
[INFO] postroot:402: Disabling Policy Updater
[WARN] postroot:405: LocalFota OTA Updates (com.LocalFota) not found
[WARN] postroot:408: FWUpgrade (com.sec.android.fwupgrade) not found
[WARN] postroot:411: Samsung Data Migration Tool (com.samsung.sdm) not found
[INFO] postroot:417: Remounting /system
[INFO] postroot:423: Remounting /
Archive:  /data/local/tmp/ghetto/UPDATE-SuperSU.zip
  inflating: META-INF/com/google/android/update-binary
  inflating: META-INF/com/google/android/updater-script

[INFO] postroot:447: About to run SuperSU install script
ui_print *********************
ui_print
ui_print SuperSU installer ZIP
ui_print
ui_print *********************
ui_print
ui_print - Mounting /system, /data and rootfs
ui_print
Usage: mount [-r] [-w] [-o options] [-t type] device directory
Usage: mount [-r] [-w] [-o options] [-t type] device directory
skip reached end of input
skip reached end of input
2+0 records in
2+0 records out
2 bytes transferred in 0.001 secs (2000 bytes/sec)
ui_print - Extracting files
ui_print
Archive:  /data/local/tmp/ghetto/UPDATE-SuperSU.zip
  inflating: META-INF/MANIFEST.MF
  inflating: META-INF/CERT.SF
  inflating: META-INF/CERT.RSA
  inflating: META-INF/com/google/android/update-binary
  inflating: META-INF/com/google/android/updater-script
  inflating: arm/chattr
  inflating: arm/chattr.pie
  inflating: arm/su
  inflating: common/99SuperSUDaemon
  inflating: common/Superuser.apk
  inflating: common/install-recovery.sh
  inflating: x86/chattr
  inflating: x86/chattr.pie
  inflating: x86/su
ui_print - Disabling OTA survival
ui_print
ui_print - Removing old files
ui_print
ui_print - Creating space
ui_print
ui_print - Placing files
ui_print
mkdir failed for /system/bin/.ext, File exists
cp: /system/etc/init.d/99SuperSUDaemon: No such file or directory
ui_print - Restoring files
ui_print
ui_print - Setting permissions
ui_print
Unable to chown /system/etc/init.d/99SuperSUDaemon: No such file or directory
Unable to chown /system/etc/init.d/99SuperSUDaemon: No such file or directory
Unable to chmod /system/etc/init.d/99SuperSUDaemon: No such file or directory
chcon:  Could not label /system/etc/init.d/99SuperSUDaemon with u:object_r:system_file:s0:  No such file or directory
chcon:  Could not label /system/etc/init.d/99SuperSUDaemon with u:object_r:system_file:s0:  No such file or directory
ui_print - Post-installation script
ui_print
ui_print - Unmounting /system and /data
ui_print
failed: Device or resource busy
failed: Device or resource busy
ui_print - Done !
ui_print
[INFO] postroot:453: SuperSU install script complete
[DEBUG] display_summary:362: Generating completion summary...
Completion summary:
  Successful tasks: root, disable-knox, disable-ota, mount-rw, sepermissive

 *** Thank you for choosing ghettoroot. Please enjoy your stay.

Your device will reboot in 10 seconds.
This is normal. Thanks for waiting.
Please make sure all programs are closed to avoid losing data.

10 seconds...


*** ghettoroot execution completed! Investigate the results...

* All that's left is a bit of cleanup, or press N to end this.

* When your phone has restarted (if applicable), press any key to clean
  out the temporary files on your phone that were used for the rooting
  process and are located at /data/local/tmp/ghetto.



UNLOCK your phone when it is started up again, before continuing.



* Cleaned!

*** Everything finished. I hope it worked for you!And here is the v0.2.2 debug.txt

Code:
  Can we start up ADB?
  Yes!

  Can a device be found?
  No. Cannot see your Android device.

*** USB CONNECTION CHECKLIST: (1/2)

* Have you unlocked your phone on the lockscreen?

* Have you tried switching USB modes via the USB notification?
  Try toggling between Camera and MTP mode.

* Have you downloaded and installed the proper drivers?
  - Try searching for and using: Koush Universal ADB driver

* Have you enabled USB debugging?
  - You can enable this by going to Settings, About device on your
    phone and tapping Build number several times. Then, go Back,
    enter Developer options, and check to enable USB debugging.



*** USB CONNECTION CHECKLIST: (2/2)

* Nothing is working!
  - One other thing to try is to access a hidden menu on your phone
    to change USB settings. Sometimes this helps. See below.

  - On the Verizon Galaxy Note 2 with 4.4.2 firmware, you can enter
    ##366633# and then try switching back and forth between Enable
    and Disable DM Mode, reconnecting your phone and/or toggling
    USB debugging in between. This is a last-ditch effort, but it
    might help.

  - Remember that USSD code and the original Enable/Disable value so
    that you can put it back when done.



  Can we start up ADB?
  Yes!

  Can a device be found?
  No. Cannot see your Android device.

*** USB CONNECTION CHECKLIST: (1/2)

* Have you unlocked your phone on the lockscreen?

* Have you tried switching USB modes via the USB notification?
  Try toggling between Camera and MTP mode.

* Have you downloaded and installed the proper drivers?
  - Try searching for and using: Koush Universal ADB driver

* Have you enabled USB debugging?
  - You can enable this by going to Settings, About device on your
    phone and tapping Build number several times. Then, go Back,
    enter Developer options, and check to enable USB debugging.



*** USB CONNECTION CHECKLIST: (2/2)

* Nothing is working!
  - One other thing to try is to access a hidden menu on your phone
    to change USB settings. Sometimes this helps. See below.

  - On the Verizon Galaxy Note 2 with 4.4.2 firmware, you can enter
    ##366633# and then try switching back and forth between Enable
    and Disable DM Mode, reconnecting your phone and/or toggling
    USB debugging in between. This is a last-ditch effort, but it
    might help.

  - Remember that USSD code and the original Enable/Disable value so
    that you can put it back when done.



  Can we start up ADB?
  Yes!

  Can a device be found?
  Yes!

  Can we communicate with a device?
  Yes! (This message came from your device.)

* READ the README file before continuing.

* WARNING: This process may void your warranty or cause unexpected damage
* to your device. By using this software, you are accepting these risks.

* This is your last chance to back out!


 * Cleaned!

push: ./scripts/../files/ghettoroot -> /data/local/tmp/ghetto/ghettoroot
push: ./scripts/../files/UPDATE-SuperSU.zip -> /data/local/tmp/ghetto/UPDATE-SuperSU.zip
push: ./scripts/../files/busybox -> /data/local/tmp/ghetto/busybox
3 files pushed. 0 files skipped.
10404 KB/s (3187157 bytes in 0.299s)

*** Necessary files pushed. Now run ./root.sh.
    Give it a few seconds or your device will be overwhelmed.

 * Preparation files transferred!


************************************************
native ghettoroot, aka cube-towel, aka towelroot
running with pid 10122
Kernel version: Linux version 3.0.31-1496113 (dpi@SWDD5710) (gcc version 4.4.3 (GCC) ) #1 SMP PREEMPT Thu May 8 01:19:38 KST 2014
Found matching phone: Linux version 3.0.31-

modstring: 1337 0 1 0 4 0
************************************************

[DEBUG] init_exploit:1208: function start
[DEBUG] send_magicmsg:817: function start
[DEBUG] make_socket:781: function start
[DEBUG] search_goodnum:938: function start
[DEBUG] search_goodnum:941: loop FUTEX_CMP_REQUEUE_PI
[DEBUG] accept_socket:1173: function start
[DEBUG] accept_socket:1195: Socket tastefully accepted.
[DEBUG] make_socket:804: function exit
[DEBUG] wake_actionthread:715: function start
[DEBUG] make_sigaction:669: function start
[DEBUG] wake_actionthread:739: loop while waiting for other thread
[DEBUG] make_sigaction:688: loop while waiting for other thread
[DEBUG] wake_actionthread:767: mutex unlock
[DEBUG] wake_actionthread:770: function exit
[DEBUG] wake_actionthread:715: function start
[DEBUG] make_sigaction:669: function start
[DEBUG] wake_actionthread:739: loop while waiting for other thread
[DEBUG] make_sigaction:688: loop while waiting for other thread
[DEBUG] wake_actionthread:767: mutex unlock
[DEBUG] wake_actionthread:770: function exit
[DEBUG] search_goodnum:957: single FUTEX_CMP_REQUEUE_PI
[DEBUG] search_goodnum:960: loop while waiting for other thread
[DEBUG] send_magicmsg:858: loop while waiting for other thread
[DEBUG] send_magicmsg:867: perform selected method
[INFO] search_goodnum:1003: starting the dangerous things
[DEBUG] setup_exploit:913: function start
[DEBUG] setup_exploit:920: function exit
[DEBUG] setup_exploit:913: function start
[DEBUG] setup_exploit:920: function exit
[DEBUG] search_goodnum:1007: MAGIC: a0000800
[DEBUG] search_goodnum:1008: MAGIC_ALT: 00100800
[DEBUG] search_goodnum:1011: magicval: a0000820
[DEBUG] wake_actionthread:715: function start
[DEBUG] make_sigaction:669: function start
[DEBUG] wake_actionthread:739: loop while waiting for other thread
[DEBUG] make_sigaction:688: loop while waiting for other thread
[DEBUG] wake_actionthread:767: mutex unlock
[DEBUG] wake_actionthread:770: function exit
[DEBUG] search_goodnum:1016: MAGIC = MAGIC_ALT;
[DEBUG] search_goodnum:1020: Entering while loop...
[DEBUG] setup_exploit:913: function start
[DEBUG] setup_exploit:920: function exit
[DEBUG] wake_actionthread:715: function start
[DEBUG] make_sigaction:669: function start
[DEBUG] wake_actionthread:739: loop while waiting for other thread
[DEBUG] make_sigaction:688: loop while waiting for other thread
[DEBUG] wake_actionthread:767: mutex unlock
[DEBUG] wake_actionthread:770: function exit
[DEBUG] search_goodnum:1031: 0xe97e6000 is a good number
[DEBUG] get_root:483: thread ID: 10129
[DEBUG] get_root:495: cpid1 resumed
[DEBUG] get_root:503: HACKS_fdm = 7 [/dev/pts/1]
[DEBUG] setup_exploit:913: function start
[DEBUG] setup_exploit:920: function exit
[DEBUG] wake_actionthread:715: function start
[DEBUG] make_sigaction:669: function start
[DEBUG] wake_actionthread:739: loop while waiting for other thread
[DEBUG] make_sigaction:688: loop while waiting for other thread
[DEBUG] wake_actionthread:767: mutex unlock
[DEBUG] wake_actionthread:770: function exit
[DEBUG] search_goodnum:1133: 0xcd84dd5c is also a good number
[DEBUG] setup_exploit:913: function start
[DEBUG] setup_exploit:920: function exit
[DEBUG] wake_actionthread:715: function start
[DEBUG] make_sigaction:669: function start
[DEBUG] wake_actionthread:739: loop while waiting for other thread
[DEBUG] make_sigaction:688: loop while waiting for other thread
[DEBUG] wake_actionthread:767: mutex unlock
[DEBUG] wake_actionthread:770: function exit
[DEBUG] get_root:483: thread ID: 10131
[DEBUG] search_goodnum:1150: Writing to HACKS_fdm...
[DEBUG] get_root:531: Writing new addr_limit to thread...
[DEBUG] write_pipe:297: dest:cd3fe008 src:0001701c count:4
[DEBUG] get_root:541: cpid3 resumed
[DEBUG] read_pipe:271: function start
[DEBUG] read_pipe:275: dest:412c9a44 src:cd3fe000 count:16
[DEBUG] read_pipe:288: function exit
[DEBUG] get_root:547: ti.task=e70dbfc0 .flags=00000200 .preempt_count=1 .addr_limit=ffffffff
[DEBUG] read_pipe:271: function start
[DEBUG] read_pipe:275: dest:412c9644 src:e70dbfc0 count:1024
[DEBUG] read_pipe:288: function exit
[INFO] get_root:551: Address limit successfully extended, seemingly
[DEBUG] get_root:557: Contents of taskbuf:
00000000 cd3fe000 00000002 00400040 00000000 00000000 00000001 00000001 00000082 00000082 00000082 00000000 c065fae0 00000000 0000006e 0253c825 00000001 e9c799c0 00000000 c316b5a0 e9c799cc 00000001 74a0dc90 00000071 000290e6 00000000 3e5e5d11 00000810 000290e6 00000000 00000000 00000000 00000000 00000000 0055db54 00000000 0000000e 00000000 005aed05 00000000 00000000 00000000 00000000 00000000 00000000 00000000 000283b8 00000000 000283b8 00000000 00000000 00000000 00000000 00000000 00007583 00000000 0000135e 00000000 00000000 00000000 00000006 00000000 00000000 00000000 00000000 00000000 00000000 00000000 0000000b 00000000 00000000 00000000 00000000 00000000 0000000b 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 c316b570 00000000 00000000 e70dc128 e70dc128 00000000 000000c8 00000001 00000000 00000000 c316b610 00000000 00000000 00000000 00000000 00000001 00000000 00000000 e70dc164 e70dc164 00000000 0000000d 00000000 005a9b51 00000000 74a0dc90 00000071 00000000 00000000 c0acfb40 e80dfd10 0000008c e70dc19c e70dc19c e70dc1a4 e70dc1a4 ea22e000 ea22e000 00000001 00000001 00000000 00000001 00000000 00000000 00000000 ffffffff 00000000 00000000 00800000 00000000 00002793 0000278a e80dfb40 e80dfb40 e70dc1f4 e70dc1f4 e70dc1fc e70dc1fc e9dd1980 e70dc208 e70dc208 e70dc210 e70dc210 00000000 e8da7388 e8da7380 e80dfda4 e70c7c8c e70c7c80 e80dfdb0 e70c7c90 e70c7c80 e9dd1bfc dbf617bc 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000001 0000000b 000001e7 10ca615c 000001e7 10ca615c 00000001 00000000 00000000 00000000 00000000 00000000 00000000 e70dc2a0 
[INFO] get_root:567: Supposedly found credential at taskbuf[184]: e825c300
[DEBUG] read_pipe:271: function start
[DEBUG] read_pipe:275: dest:412c95e8 src:e825c300 count:92
[DEBUG] read_pipe:288: function exit
[DEBUG] read_pipe:271: function start
[DEBUG] read_pipe:275: dest:412c95d0 src:cd1bb7c0 count:24
[DEBUG] read_pipe:288: function exit
[DEBUG] get_root:590: YOU ARE A SCARY PHONE
[DEBUG] write_pipe:297: dest:cd1bb7c0 src:412c95d0 count:24
[DEBUG] write_pipe:297: dest:e825c300 src:412c95e8 count:92
[DEBUG] write_pipe:297: dest:e70dc1e4 src:00017020 count:4
[INFO] postroot:386: Disabling Knox
[INFO] postroot:393: Setting SEAndroid Permissive
[INFO] postroot:396: Disabling Knox (again, just in case)
[INFO] postroot:402: Disabling Policy Updater
[WARN] postroot:405: LocalFota OTA Updates (com.LocalFota) not found
[WARN] postroot:408: FWUpgrade (com.sec.android.fwupgrade) not found
[WARN] postroot:411: Samsung Data Migration Tool (com.samsung.sdm) not found
[INFO] postroot:417: Remounting /system
[INFO] postroot:423: Remounting /
Archive:  /data/local/tmp/ghetto/UPDATE-SuperSU.zip
  inflating: META-INF/com/google/android/update-binary
  inflating: META-INF/com/google/android/updater-script

[INFO] postroot:447: About to run SuperSU install script
ui_print *********************
ui_print
ui_print SuperSU installer ZIP
ui_print
ui_print *********************
ui_print
ui_print - Mounting /system, /data and rootfs
ui_print
Usage: mount [-r] [-w] [-o options] [-t type] device directory
Usage: mount [-r] [-w] [-o options] [-t type] device directory
skip reached end of input
skip reached end of input
2+0 records in
2+0 records out
2 bytes transferred in 0.001 secs (2000 bytes/sec)
ui_print - Extracting files
ui_print
Archive:  /data/local/tmp/ghetto/UPDATE-SuperSU.zip
  inflating: META-INF/MANIFEST.MF
  inflating: META-INF/CERT.SF
  inflating: META-INF/CERT.RSA
  inflating: META-INF/com/google/android/update-binary
  inflating: META-INF/com/google/android/updater-script
  inflating: arm/chattr
  inflating: arm/chattr.pie
  inflating: arm/su
  inflating: common/99SuperSUDaemon
  inflating: common/Superuser.apk
  inflating: common/install-recovery.sh
  inflating: x86/chattr
  inflating: x86/chattr.pie
  inflating: x86/su
ui_print - Disabling OTA survival
ui_print
ui_print - Removing old files
ui_print
ui_print - Creating space
ui_print
ui_print - Placing files
ui_print
mkdir failed for /system/bin/.ext, File exists
cp: /system/etc/init.d/99SuperSUDaemon: No such file or directory
ui_print - Restoring files
ui_print
ui_print - Setting permissions
ui_print
Unable to chown /system/etc/init.d/99SuperSUDaemon: No such file or directory
Unable to chown /system/etc/init.d/99SuperSUDaemon: No such file or directory
Unable to chmod /system/etc/init.d/99SuperSUDaemon: No such file or directory
chcon:  Could not label /system/etc/init.d/99SuperSUDaemon with u:object_r:system_file:s0:  No such file or directory
chcon:  Could not label /system/etc/init.d/99SuperSUDaemon with u:object_r:system_file:s0:  No such file or directory
ui_print - Post-installation script
ui_print
ui_print - Unmounting /system and /data
ui_print
failed: Device or resource busy
failed: Device or resource busy
ui_print - Done !
ui_print
[INFO] postroot:453: SuperSU install script complete
[DEBUG] display_summary:362: Generating completion summary...
Completion summary:
  Successful tasks: root, disable-knox, disable-ota, mount-rw, sepermissive

 *** Thank you for choosing ghettoroot. Please enjoy your stay.

Your device will reboot in 10 seconds.
This is normal. Thanks for waiting.
Please make sure all programs are closed to avoid losing data.

10 seconds...


*** ghettoroot execution completed! Investigate the results...

* All that's left is a bit of cleanup, or press N to end this.

* When your phone has restarted (if applicable), press any key to clean
  out the temporary files on your phone that were used for the rooting
  process and are located at /data/local/tmp/ghetto.



UNLOCK your phone when it is started up again, before continuing.



* Cleaned!

*** Everything finished. I hope it worked for you!
    Try opening SuperSU to check if root works.
    If SuperSU isn't even there then, well, I guess it didn't work...


Bye!
Thanks to anyone who is able to help. I'm a super noob and don't really know where to begin finding the problem. My only experience with rooted phones is a Galaxy S3 from several years ago that came rooted with CyanogenMod when I bought it on eBay, so I don't know how to get from stock to root without help =( Try opening SuperSU to check if root works. If SuperSU isn't even there then, well, I guess it didn't work... Bye!
Thanks to anyone who is able to help. I'm a super noob and don't really know where to begin finding the problem. My only experience with rooted phones is a Galaxy S3 from several years ago that came rooted with CyanogenMod when I bought it on eBay, so I don't know how to get from stock to root without help =(
Last edited by economicist; 6th August 2015 at 05:02 AM.
 
 
16th August 2015, 11:00 PM |#522  
masterzoltar's Avatar
Senior Member
Thanks Meter: 17
 
More
ran, said super user successfully installed. fails root check. Cannot get this to root. Ive tried every version of this also.
Post Reply Subscribe to Thread
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes