Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mitm password sniffing. Can't start #34

Closed
bruvv opened this issue Dec 6, 2014 · 18 comments
Closed

Mitm password sniffing. Can't start #34

bruvv opened this issue Dec 6, 2014 · 18 comments

Comments

@bruvv
Copy link

bruvv commented Dec 6, 2014

I just tried password sniffing and it shows a toast that it isn't able to start the sniffing. All the other sniffing works . where are the log files located?
Running on the oneplus one 4.4.4 AK kernel with stock rom.

@bruvv
Copy link
Author

bruvv commented Dec 6, 2014

Btw running the latest update of release (1.2.7 I belief)

@bruvv
Copy link
Author

bruvv commented Dec 7, 2014

Correction 1.2.3

@tux-mind
Copy link
Member

please post a logcat.

if you are not familiar with logcat do the following steps:

  1. install catlog from the playstore
  2. launch it and start recording
  3. open cSploit
  4. lead it to the bad behaviour
  5. click on the catlog notification to stop recording
  6. post/share the logcat found under /sdcard/catlog/

thanks in advance for your report.

@bruvv
Copy link
Author

bruvv commented Dec 10, 2014

--------- beginning of /dev/log/main
12-10 14:31:47.816 D/LocationFilter(2568): Forcing stable location. Original location:Location[fused 52.349466,4.819895 acc=36 et=+20h21m7s629ms] because SMD didn't trigger.
12-10 14:31:47.906 I/GCoreUlr(2568): Successfully inserted location
12-10 14:31:47.906 I/GCoreUlr(2568): Not calling LocationReporter, hasMoved: false, elapsed millis: 374309, request: Stationary(3600000)
12-10 14:31:49.356 I/Choreographer(4547): Skipped 94 frames! The application may be doing too much work on its main thread.
12-10 14:31:51.466 I/art (2041): Heap trim of managed (duration=6.612552ms, advised=5MB) and native (duration=3.081250ms, advised=356KB) heaps. Managed heap utilization of 27%.
--------- beginning of /dev/log/system
12-10 14:31:51.476 I/ActivityManager(1540): START u0 {act=com.android.systemui.recent.action.TOGGLE_RECENTS flg=0x10800000 cmp=com.android.systemui/.recent.RecentsActivity (has extras)} from pid 2041
12-10 14:31:51.656 I/art (1540): Heap trim of managed (duration=26.373594ms, advised=5MB) and native (duration=4.201875ms, advised=2MB) heaps. Managed heap utilization of 62%.
12-10 14:31:51.676 I/Timeline(2041): Timeline: Activity_idle id: android.os.BinderProxy@64bd55a8 time:35735999
12-10 14:31:51.696 I/art (2168): Heap trim of managed (duration=6.952812ms, advised=1468KB) and native (duration=14.017917ms, advised=628KB) heaps. Managed heap utilization of 46%.
12-10 14:31:51.886 I/Timeline(1540): Timeline: Activity_windows_visible id: ActivityRecord{65b6f038 u0 com.android.systemui/.recent.RecentsActivity t113} time:35736206
12-10 14:31:52.286 V/PhoneStatusBar(2041): setLightsOn(true)
12-10 14:31:52.446 I/Timeline(5376): Timeline: Activity_idle id: android.os.BinderProxy@64b60118 time:35736767
12-10 14:31:52.486 V/PhoneStatusBar(2041): setLightsOn(true)
12-10 14:31:52.756 I/Timeline(1540): Timeline: Activity_windows_visible id: ActivityRecord{64c26338 u0 com.nolanlawson.logcat/.LogcatActivity t110} time:35737076
12-10 14:31:55.246 I/ActivityManager(1540): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.HOME] flg=0x10200000 cmp=com.google.android.googlequicksearchbox/com.google.android.launcher.GEL} from pid 1540
12-10 14:31:55.316 I/art (1540): Heap trim of managed (duration=25.560417ms, advised=5MB) and native (duration=4.507239ms, advised=2MB) heaps. Managed heap utilization of 62%.
12-10 14:31:55.376 I/GEL (2293): handleIntent(Intent { act=android.intent.action.MAIN cat=[android.intent.category.HOME] flg=0x10600000 cmp=com.google.android.googlequicksearchbox/com.google.android.launcher.GEL })
12-10 14:31:55.386 W/HandlerScheduledExecuto(2293): Task does not implement UiTask. Consider using NamedUiRunnable for eww@64ce6408
12-10 14:31:55.426 I/Timeline(2293): Timeline: Activity_idle id: android.os.BinderProxy@64b60da8 time:35739749
12-10 14:31:55.876 I/Timeline(1540): Timeline: Activity_windows_visible id: ActivityRecord{65b0dcb8 u0 com.google.android.googlequicksearchbox/com.google.android.launcher.GEL t1} time:35740195
12-10 14:31:56.096 I/art (15156): Heap trim of managed (duration=13.718958ms, advised=336KB) and native (duration=2.817343ms, advised=80KB) heaps. Managed heap utilization of 68%.
12-10 14:31:58.146 I/Timeline(2293): Timeline: Activity_launch_request id:org.csploit.android time:35742464
12-10 14:31:58.146 I/ActivityManager(1540): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 cmp=org.csploit.android/.MainActivity bnds=[774,547][1008,809](has extras)} from pid 2293
12-10 14:31:58.206 W/BroadcastQueue(1540): Permission Denial: receiving Intent { act=com.android.launcher3.action.LAUNCH flg=0x10 (has extras) } to com.google.android.googlequicksearchbox/com.google.android.search.core.summons.icing.InternalIcingCorporaProvider$ApplicationLaunchReceiver requires com.android.launcher3.permission.RECEIVE_LAUNCH_BROADCASTS due to sender com.google.android.googlequicksearchbox (uid 10026)
12-10 14:31:58.226 W/art (273): Could not get current activity
12-10 14:31:58.236 I/ActivityManager(1540): Start proc org.csploit.android for activity org.csploit.android/.MainActivity: pid=7560 uid=10233 gids={50233, 3003, 1028, 1015}
12-10 14:31:58.386 I/art (1540): Heap trim of managed (duration=17.855208ms, advised=5MB) and native (duration=2.928437ms, advised=2MB) heaps. Managed heap utilization of 61%.
12-10 14:31:58.416 D/ActivityThread(7560): handleBindApplication:org.csploit.android
12-10 14:31:58.416 D/ActivityThread(7560): setTargetHeapUtilization:0.75
12-10 14:31:58.416 D/ActivityThread(7560): setTargetHeapMinFree:2097152
12-10 14:31:58.596 D/CSPLOITcore.System.init: initializing System...
12-10 14:31:58.876 D/CSPLOITMainActivity.onCreate: initializer thread created and started in 1 ms
12-10 14:31:58.886 D/CSPLOITcore.System.isARM: Build.CPU_ABI = armeabi-v7a
12-10 14:31:58.886 D/CSPLOITcore.ToolsInstaller.needed: Checking version file /data/data/org.csploit.android/files/tools/VERSION
12-10 14:31:58.886 D/CSPLOITcore.UpdateChecker.run: Service started.
12-10 14:31:58.896 D/CSPLOITnet.NetworkDiscovery.run: Network monitor started ...
12-10 14:31:58.906 D/CSPLOITnet.NetworkDiscovery$UdpProber.run: UdpProber started ...
12-10 14:31:58.906 D/CSPLOITnet.NetworkDiscovery$ArpReader.run: ArpReader started ...
12-10 14:31:58.946 D/CSPLOITnet.NetworkDiscovery$NBResolver.run: 192.168.2.95 was resolved to NAS
12-10 14:31:58.956 E/cSploitClient(7560): start_command: not authenticated
12-10 14:31:58.956 E/CSPLOITMainActivity$7.run: cannot start commands
12-10 14:31:58.956 E/cSploitClient(7560): connect_unix: connect: Connection refused
12-10 14:31:58.996 I/Adreno-EGL(7560): <qeglDrvAPI_eglInitialize:410>: EGL 1.4 QUALCOMM build: AU_LINUX_ANDROID_LNX.LA.3.5.2.2_RB1.04.04.04.087.028_msm8974_LNX.LA.3.5.2.2_RB1__release_AU ()
12-10 14:31:58.996 I/Adreno-EGL(7560): OpenGL ES Shader Compiler Version: E031.24.00.15
12-10 14:31:58.996 I/Adreno-EGL(7560): Build Date: 07/31/14 Thu
12-10 14:31:58.996 I/Adreno-EGL(7560): Local Branch:
12-10 14:31:58.996 I/Adreno-EGL(7560): Remote Branch: quic/LNX.LA.3.5.2.2_rb1
12-10 14:31:58.996 I/Adreno-EGL(7560): Local Patches: NONE
12-10 14:31:58.996 I/Adreno-EGL(7560): Reconstruct Branch: AU_LINUX_ANDROID_LNX.LA.3.5.2.2_RB1.04.04.04.087.028 + NOTHING
12-10 14:31:59.156 D/OpenGLRenderer(7560): Enabling debug mode 0
12-10 14:31:59.266 D/AndroidRuntime(7627):
12-10 14:31:59.266 D/AndroidRuntime(7627): >>>>>> AndroidRuntime START com.android.internal.os.RuntimeInit <<<<<<
12-10 14:31:59.266 D/AndroidRuntime(7627): CheckJNI is OFF
12-10 14:31:59.266 E/art (7627): Unrecognized option -XX:mainThreadStackSize=24K
12-10 14:31:59.296 W/art (7627): Failed to find ELF magic in /system/framework/am.odex: dey
12-10 14:31:59.306 D/CSPLOITnet.NetworkDiscovery$NBResolver.run: 192.168.2.104 was resolved to TIMO-LAPTOP
12-10 14:31:59.336 W/art (7627): JNI RegisterNativeMethods: attempt to register 0 native methods for android.content.res.Configuration
12-10 14:31:59.336 D/AndroidRuntime(7627): Calling main entry com.android.commands.am.Am
12-10 14:31:59.346 D/cSploitClient(7560): send_message: message sent (fd=31)
12-10 14:31:59.346 D/cSploitClient(7560): send_message: { seq = 0, size = 18, id = 0, data = '\x00android\x00DEADBEEF\x00' }
12-10 14:31:59.356 D/cSploitClient(7560): read_message: received a message (fd=31)
12-10 14:31:59.356 D/cSploitClient(7560): read_message: { seq = 0, size = 1, id = 0, data = '\x01' }
12-10 14:31:59.356 D/cSploitClient(7560): send_message: message sent (fd=31)
12-10 14:31:59.356 D/cSploitClient(7560): send_message: { seq = 1, size = 1, id = 0, data = '\x0A' }
12-10 14:31:59.356 D/cSploitClient(7560): read_message: received a message (fd=31)
12-10 14:31:59.356 D/cSploitClient(7560): read_message: { seq = 1, size = 75, id = 0, data = '\x0A\x06\x02tcpdump\x00\x01\x03raw\x00\x02\x02nmap\x00\x04\x02hydra\x00\x07\x02fusemounts\x00\x03\x02ettercap\x00\x00\x00blind\x00\x05\x02arpspoof\x00' }
12-10 14:31:59.356 D/cSploitClient(7560): on_handler_list: id=6, have_stdin=0, have_stdout=1, name="tcpdump"
12-10 14:31:59.356 D/cSploitClient(7560): on_handler_list: id=1, have_stdin=1, have_stdout=1, name="raw"
12-10 14:31:59.356 D/cSploitClient(7560): on_handler_list: id=2, have_stdin=0, have_stdout=1, name="nmap"
12-10 14:31:59.356 D/cSploitClient(7560): on_handler_list: id=4, have_stdin=0, have_stdout=1, name="hydra"
12-10 14:31:59.356 D/cSploitClient(7560): on_handler_list: id=7, have_stdin=0, have_stdout=1, name="fusemounts"
12-10 14:31:59.356 D/cSploitClient(7560): on_handler_list: id=3, have_stdin=0, have_stdout=1, name="ettercap"
12-10 14:31:59.356 D/cSploitClient(7560): on_handler_list: id=0, have_stdin=0, have_stdout=0, name="blind"
12-10 14:31:59.356 D/cSploitClient(7560): on_handler_list: id=5, have_stdin=0, have_stdout=1, name="arpspoof"
12-10 14:31:59.356 D/CSPLOITnet.NetworkDiscovery$ArpReader.run: 192.168.2.104 was DNS resolved to timo-laptop.home
12-10 14:31:59.366 D/AndroidRuntime(7627): Shutting down VM
12-10 14:31:59.546 I/Choreographer(7560): Skipped 38 frames! The application may be doing too much work on its main thread.
12-10 14:31:59.546 D/CSPLOITnet.NetworkDiscovery$ArpReader.run: 192.168.2.100 was DNS resolved to niels-pc.home
12-10 14:31:59.606 I/ActivityManager(1540): Displayed org.csploit.android/.MainActivity: +1s382ms
12-10 14:31:59.606 I/Timeline(1540): Timeline: Activity_windows_visible id: ActivityRecord{65c54948 u0 org.csploit.android/.MainActivity t114} time:35743923
12-10 14:31:59.616 D/CSPLOITnet.NetworkDiscovery$NBResolver.run: 192.168.2.91 was resolved to Netwerk_Printer
12-10 14:31:59.656 I/Timeline(7560): Timeline: Activity_idle id: android.os.BinderProxy@64b60178 time:35743974
12-10 14:31:59.676 D/CSPLOITcore.UpdateService.isUpdateAvailable: localVersion = 1.2.3
12-10 14:31:59.676 D/CSPLOITcore.UpdateService.isUpdateAvailable: remoteVersion = 1.2.3
12-10 14:31:59.716 D/CSPLOITnet.NetworkDiscovery$NBResolver.run: 192.168.2.100 was resolved to NIELS-PC
12-10 14:32:00.016 D/CSPLOITcore.System.readFirstLine: /data/data/org.csploit.android/files/msf/VERSION: open failed: ENOENT (No such file or directory)
12-10 14:32:00.016 D/CSPLOITnet.GitHubParser.getBranch: no branch has been selected yet
12-10 14:32:00.196 D/CSPLOITcore.UpdateChecker.run: Service stopped.
12-10 14:32:00.526 D/CSPLOITnet.NetworkDiscovery$ArpReader.run: 192.168.2.101 was DNS resolved to android-25d6547addcf1280.home
12-10 14:32:02.056 D/CSPLOITnet.NetworkDiscovery$ArpReader.run: 192.168.2.103 was DNS resolved to android-a189980eae240a52.home
12-10 14:32:03.076 W/InputMethodManagerService(1540): Window already focused, ignoring focus gain of: com.android.internal.view.IInputMethodClient$Stub$Proxy@65bd3460 attribute=null, token = android.os.BinderProxy@65fadfa8
12-10 14:32:05.386 I/Timeline(7560): Timeline: Activity_launch_request id:org.csploit.android time:35749708
12-10 14:32:05.396 I/ActivityManager(1540): START u0 {cmp=org.csploit.android/.ActionActivity} from pid 7560
12-10 14:32:05.486 V/WebViewChromiumFactoryProvider(7560): Binding Chromium to main looper Looper (main, tid 1) {64b5c928}
12-10 14:32:05.486 I/LibraryLoader(7560): Expected native library version number "",actual native library version number ""
12-10 14:32:05.486 I/chromium(7560): [INFO:library_loader_hooks.cc(116)] Chromium logging enabled: level = 0, default verbosity = 0
12-10 14:32:05.496 I/BrowserStartupController(7560): Initializing chromium process, renderers=0
12-10 14:32:05.496 W/art (7560): Attempt to remove local SIRT entry from IRT, ignoring
12-10 14:32:05.506 E/AudioManagerAndroid(7560): BLUETOOTH permission is missing!
12-10 14:32:05.536 W/art (7560): Thread[16,tid=7700,Native,Thread_=0x49895978,peer=0x65232360,"Thread-6445"] attached without supplying a name
12-10 14:32:05.546 W/art (7560): Thread[18,tid=7702,Native,Thread_=0x490aa960,peer=0x65233230,"Thread-6446"] attached without supplying a name
12-10 14:32:05.566 W/art (7560): Thread[20,tid=7695,Native,Thread*=0x4f804f88,peer=0x65235d38,"Thread-6447"] attached without supplying a name
12-10 14:32:05.596 D/CSPLOITnet.NetworkDiscovery.run: Network monitor stopped.
12-10 14:32:05.626 I/ActivityManager(1540): Displayed org.csploit.android/.ActionActivity: +216ms
12-10 14:32:05.656 I/Timeline(7560): Timeline: Activity_idle id: android.os.BinderProxy@6520ca68 time:35749979
12-10 14:32:05.956 I/Timeline(1540): Timeline: Activity_windows_visible id: ActivityRecord{65c5a230 u0 org.csploit.android/.ActionActivity t114} time:35750276
12-10 14:32:06.506 D/CSPLOITcore.System.setCurrentPlugin: Setting current plugin : MITM
12-10 14:32:06.506 I/Timeline(7560): Timeline: Activity_launch_request id:org.csploit.android time:35750828
12-10 14:32:06.506 I/ActivityManager(1540): START u0 {cmp=org.csploit.android/.plugins.mitm.MITM} from pid 7560
12-10 14:32:06.706 I/art (7560): GcCauseBackground sticky partial concurrent mark sweep GC freed 45695(1759KB) AllocSpace objects, 1(81KB) LOS objects, 15% free, 10MB/12MB, paused 10.429ms total 49.786ms
12-10 14:32:06.766 W/ResourceType(1540): Skipping entry 0x7f040000 in package table 0 because it is not complex!
12-10 14:32:06.776 W/ResourceType(1540): Skipping entry 0x7f040001 in package table 0 because it is not complex!
12-10 14:32:06.786 I/ActivityManager(1540): Displayed org.csploit.android/.plugins.mitm.MITM: +237ms
12-10 14:32:06.816 I/Timeline(7560): Timeline: Activity_idle id: android.os.BinderProxy@652421f0 time:35751139
12-10 14:32:06.916 I/art (2168): Heap trim of managed (duration=7.660312ms, advised=1400KB) and native (duration=13.032918ms, advised=628KB) heaps. Managed heap utilization of 46%.
12-10 14:32:07.216 I/Timeline(1540): Timeline: Activity_windows_visible id: ActivityRecord{65c6dbc8 u0 org.csploit.android/.plugins.mitm.MITM t114} time:35751533
12-10 14:32:07.906 I/Timeline(7560): Timeline: Activity_launch_request id:org.csploit.android time:35752223
12-10 14:32:07.906 I/ActivityManager(1540): START u0 {cmp=org.csploit.android/.plugins.mitm.PasswordSniffer} from pid 7560
12-10 14:32:08.046 I/ActivityManager(1540): Displayed org.csploit.android/.plugins.mitm.PasswordSniffer: +130ms
12-10 14:32:08.076 I/Timeline(7560): Timeline: Activity_idle id: android.os.BinderProxy@64e2b230 time:35752398
12-10 14:32:08.476 I/Timeline(1540): Timeline: Activity_windows_visible id: ActivityRecord{65d2e750 u0 org.csploit.android/.plugins.mitm.PasswordSniffer t114} time:35752791
12-10 14:32:09.806 D/CSPLOITcore.System.setForwarding: Setting ipv4 forwarding to false
12-10 14:32:09.806 D/cSploitClient(7560): parse_cmd: parsing "sh -c 'echo 0 > /proc/sys/net/ipv4/ip_forward'"
12-10 14:32:09.806 D/cSploitClient(7560): parse_cmd: argument found: start=0, end=2
12-10 14:32:09.806 D/cSploitClient(7560): parse_cmd: argument found: start=3, end=5
12-10 14:32:09.806 D/cSploitClient(7560): parse_cmd: argument found: start=7, end=45
12-10 14:32:09.806 D/cSploitClient(7560): send_message: message sent (fd=31)
12-10 14:32:09.806 D/cSploitClient(7560): send_message: { seq = 2, size = 48, id = 0, data = '\x03\x01\x03sh\x00-c\x00echo 0 > /proc/sys/net/ipv4/ip_forward\x00' }
12-10 14:32:09.806 D/cSploitClient(7560): read_message: received a message (fd=31)
12-10 14:32:09.806 D/cSploitClient(7560): read_message: { seq = 2, size = 4, id = 0, data = '\x04\x00\x01\x00' }
12-10 14:32:09.806 I/cSploitClient(7560): start_command: child #1 started
12-10 14:32:09.806 D/cSploitClient(7560): read_message: received a message (fd=31)
12-10 14:32:09.806 D/cSploitClient(7560): read_message: { seq = 2, size = 6, id = 0, data = '\x07\x00\x01\x00\x00\x00' }
12-10 14:32:09.806 D/CSPLOITcore.ChildManager.onEvent: received an event: ChildEnd: { exit_status=0 }
12-10 14:32:09.806 D/CSPLOITcore.ChildManager.onEvent: Child #1 exited ( exitValue=0 )
12-10 14:32:09.816 D/cSploitClient(7560): parse_cmd: parsing "-i wlan0 192.168.2.254"
12-10 14:32:09.816 D/cSploitClient(7560): parse_cmd: argument found: start=0, end=2
12-10 14:32:09.816 D/cSploitClient(7560): parse_cmd: argument found: start=3, end=8
12-10 14:32:09.816 D/cSploitClient(7560): parse_cmd: argument found: start=9, end=22
12-10 14:32:09.816 D/cSploitClient(7560): send_message: message sent (fd=31)
12-10 14:32:09.816 D/cSploitClient(7560): send_message: { seq = 3, size = 26, id = 0, data = '\x03\x05\x03-i\x00wlan0\x00192.168.2.254\x00' }
12-10 14:32:09.816 D/cSploitClient(7560): read_message: received a message (fd=31)
12-10 14:32:09.816 D/cSploitClient(7560): read_message: { seq = 3, size = 4, id = 0, data = '\x04\x00\x02\x00' }
12-10 14:32:09.816 I/cSploitClient(7560): start_command: child #2 started
12-10 14:32:09.816 D/cSploitClient(7560): parse_cmd: parsing "-Tpq -i wlan0 /// ///"
12-10 14:32:09.816 D/cSploitClient(7560): parse_cmd: argument found: start=0, end=4
12-10 14:32:09.816 D/cSploitClient(7560): parse_cmd: argument found: start=5, end=7
12-10 14:32:09.816 D/cSploitClient(7560): parse_cmd: argument found: start=8, end=13
12-10 14:32:09.816 D/cSploitClient(7560): parse_cmd: argument found: start=14, end=17
12-10 14:32:09.816 D/cSploitClient(7560): parse_cmd: argument found: start=18, end=21
12-10 14:32:09.816 D/cSploitClient(7560): send_message: message sent (fd=31)
12-10 14:32:09.816 D/cSploitClient(7560): send_message: { seq = 4, size = 25, id = 0, data = '\x03\x03\x05-Tpq\x00-i\x00wlan0\x00///\x00///\x00' }
12-10 14:32:09.816 D/cSploitClient(7560): read_message: received a message (fd=31)
12-10 14:32:09.816 D/cSploitClient(7560): read_message: { seq = 4, size = 1, id = 0, data = '\x05' }
12-10 14:32:09.816 W/cSploitClient(7560): start_command: cannot start command
12-10 14:32:09.816 D/cSploitClient(7560): send_message: message sent (fd=31)
12-10 14:32:09.816 D/cSploitClient(7560): send_message: { seq = 5, size = 8, id = 0, data = '\x06\x00\x02\x00\x02\x00\x00\x00' }
12-10 14:32:09.816 D/CSPLOITcore.System.setForwarding: Setting ipv4 forwarding to false
12-10 14:32:09.816 D/cSploitClient(7560): parse_cmd: parsing "sh -c 'echo 0 > /proc/sys/net/ipv4/ip_forward'"
12-10 14:32:09.816 D/cSploitClient(7560): parse_cmd: argument found: start=0, end=2
12-10 14:32:09.816 D/cSploitClient(7560): parse_cmd: argument found: start=3, end=5
12-10 14:32:09.816 D/cSploitClient(7560): parse_cmd: argument found: start=7, end=45
12-10 14:32:09.816 D/cSploitClient(7560): send_message: message sent (fd=31)
12-10 14:32:09.816 D/cSploitClient(7560): send_message: { seq = 6, size = 48, id = 0, data = '\x03\x01\x03sh\x00-c\x00echo 0 > /proc/sys/net/ipv4/ip_forward\x00' }
12-10 14:32:09.826 D/cSploitClient(7560): read_message: received a message (fd=31)
12-10 14:32:09.826 D/cSploitClient(7560): read_message: { seq = 6, size = 4, id = 0, data = '\x04\x00\x04\x00' }
12-10 14:32:09.826 I/cSploitClient(7560): start_command: child #4 started
12-10 14:32:09.826 D/cSploitClient(7560): read_message: received a message (fd=31)
12-10 14:32:09.826 D/cSploitClient(7560): read_message: { seq = 3, size = 6, id = 0, data = '\x07\x00\x04\x00\x00\x00' }
12-10 14:32:09.826 D/CSPLOITcore.ChildManager.onEvent: received an event: ChildEnd: { exit_status=0 }
12-10 14:32:09.826 D/CSPLOITcore.ChildManager.onEvent: Child #4 exited ( exitValue=0 )
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: cannot start commands
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: org.csploit.android.core.ChildManager$ChildNotStartedException: cannot start commands
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at org.csploit.android.core.ChildManager.async(ChildManager.java:83)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at org.csploit.android.tools.Tool.async(Tool.java:55)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at org.csploit.android.tools.Ettercap.dissect(Ettercap.java:77)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at org.csploit.android.plugins.mitm.SpoofSession.start(SpoofSession.java:125)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at org.csploit.android.plugins.mitm.SpoofSession.start(SpoofSession.java:137)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at org.csploit.android.plugins.mitm.PasswordSniffer.setStartedState(PasswordSniffer.java:261)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at org.csploit.android.plugins.mitm.PasswordSniffer.access$300(PasswordSniffer.java:51)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at org.csploit.android.plugins.mitm.PasswordSniffer$1.onClick(PasswordSniffer.java:215)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at android.view.View.performClick(View.java:4445)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at android.widget.CompoundButton.performClick(CompoundButton.java:100)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at android.view.View$PerformClick.run(View.java:18446)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at android.os.Handler.handleCallback(Handler.java:733)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at android.os.Handler.dispatchMessage(Handler.java:95)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at android.os.Looper.loop(Looper.java:136)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at android.app.ActivityThread.main(ActivityThread.java:5146)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at java.lang.reflect.Method.invoke(Native Method)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:796)
12-10 14:32:09.826 E/CSPLOITcore.System.errorLogging: at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:612)
12-10 14:32:09.826 D/cSploitClient(7560): read_message: received a message (fd=31)
12-10 14:32:09.826 D/cSploitClient(7560): read_message: { seq = 4, size = 8, id = 0, data = '\x08\x00\x02\x00\x02\x00\x00\x00' }
12-10 14:32:09.826 D/CSPLOITcore.ChildManager.onEvent: received an event: ChildDied: { signal=2 }
12-10 14:32:09.826 D/CSPLOITcore.ChildManager.onEvent: Child #2 died ( signal=2 )
12-10 14:32:12.166 I/art (2041): Heap trim of managed (duration=5.145938ms, advised=5MB) and native (duration=3.395573ms, advised=300KB) heaps. Managed heap utilization of 28%.
12-10 14:32:12.566 I/ActivityManager(1540): START u0 {act=com.android.systemui.recent.action.TOGGLE_RECENTS flg=0x10800000 cmp=com.android.systemui/.recent.RecentsActivity (has extras)} from pid 2041
12-10 14:32:12.746 I/Timeline(2041): Timeline: Activity_idle id: android.os.BinderProxy@64bd55a8 time:35757066
12-10 14:32:13.006 I/Timeline(1540): Timeline: Activity_windows_visible id: ActivityRecord{65b6f038 u0 com.android.systemui/.recent.RecentsActivity t113} time:35757326
12-10 14:32:13.496 I/art (1540): Heap trim of managed (duration=21.137760ms, advised=5MB) and native (duration=3.710781ms, advised=2MB) heaps. Managed heap utilization of 61%.
12-10 14:32:13.536 V/PhoneStatusBar(2041): setLightsOn(true)
12-10 14:32:13.766 I/Timeline(5376): Timeline: Activity_idle id: android.os.BinderProxy@64b60118 time:35758084
12-10 14:32:13.826 I/art (5376): GcCauseBackground sticky partial concurrent mark sweep GC freed 18299(869KB) AllocSpace objects, 4(104KB) LOS objects, 12% free, 7MB/9MB, paused 5.324ms total 30.212ms
12-10 14:32:14.076 I/Timeline(1540): Timeline: Activity_windows_visible id: ActivityRecord{64c26338 u0 com.nolanlawson.logcat/.LogcatActivity t110} time:35758396

@bruvv
Copy link
Author

bruvv commented Dec 10, 2014

Looks like there is s till a lot todo ;)
dsploit is working btw.
Fresh installation of csploit and dsploit on a Oneplus one running stock (4.4.4) with AK kernel.

@tux-mind
Copy link
Member

@nivong looks like ettercap cannot be started.

i'll tell you where you can find the cSploit.log that i need ASAP.

PS:
yes, there is a lot of TODO, we are still in alpha version, even if there is a release.
i'm doing my best to reach a stable version.

@bruvv
Copy link
Author

bruvv commented Dec 11, 2014

[DEBUG ] connection_writer: started (fd=1, tid=1204936)
[DEBUG ] connection_worker: started (fd=1, tid=1205520)
[DEBUG ] connection_reader: started (fd=1, tid=1206104)
[DEBUG ] read_message: received a message (fd=1)
[DEBUG ] read_message: { seq = 0, size = 18, id = 0, data = '\x00android\x00DEADBEEF\x00' }
[DEBUG ] on_auth_request: user "android" logged in
[DEBUG ] send_message: message sent (fd=1)
[DEBUG ] send_message: { seq = 0, size = 1, id = 0, data = '\x01' }
[DEBUG ] read_message: received a message (fd=1)
[DEBUG ] read_message: { seq = 1, size = 1, id = 0, data = '\x0A' }
[DEBUG ] send_message: message sent (fd=1)
[DEBUG ] send_message: { seq = 1, size = 75, id = 0, data = '\x0A\x06\x02tcpdump\x00\x01\x03raw\x00\x02\x02nmap\x00\x04\x02hydra\x00\x07\x02fusemounts\x00\x03\x02ettercap\x00\x00\x00blind\x00\x05\x02arpspoof\x00' }
[DEBUG ] read_message: received a message (fd=1)
[DEBUG ] read_message: { seq = 2, size = 48, id = 0, data = '\x03\x01\x03sh\x00-c\x00echo 0 > /proc/sys/net/ipv4/ip_forward\x00' }
[DEBUG ] on_cmd_start: successfully started a child for 'raw' (pid=7718)
[DEBUG ] handle_child: new child started. (name=raw, pid=7718)
[DEBUG ] send_message: message sent (fd=1)
[DEBUG ] send_message: { seq = 2, size = 4, id = 0, data = '\x04\x00\x01\x00' }
[DEBUG ] reaper: thread "handle_child(name=raw, pid=7718)" joined. (exit_val=0x0, tid=1206792)
[DEBUG ] send_message: message sent (fd=1)
[DEBUG ] send_message: { seq = 2, size = 6, id = 0, data = '\x07\x00\x01\x00\x00\x00' }
[DEBUG ] read_message: received a message (fd=1)
[DEBUG ] read_message: { seq = 3, size = 26, id = 0, data = '\x03\x05\x03-i\x00wlan0\x00192.168.2.254\x00' }
[DEBUG ] on_cmd_start: successfully started a child for 'arpspoof' (pid=7720)
[DEBUG ] send_message: message sent (fd=1)
[DEBUG ] send_message: { seq = 3, size = 4, id = 0, data = '\x04\x00\x02\x00' }
[DEBUG ] handle_child: new child started. (name=arpspoof, pid=7720)
[DEBUG ] read_message: received a message (fd=1)
[DEBUG ] read_message: { seq = 4, size = 25, id = 0, data = '\x03\x03\x05-Tpq\x00-i\x00wlan0\x00///\x00///\x00' }
[ERROR ] on_cmd_start: execvp: No such file or directory
[DEBUG ] on_cmd_start: { seq = 4, size = 25, id = 0, data = '\x03\x03\x05-Tpq\x00-i\x00wlan0\x00///\x00///\x00' }
[DEBUG ] send_message: message sent (fd=1)
[DEBUG ] send_message: { seq = 4, size = 1, id = 0, data = '\x05' }
[DEBUG ] read_message: received a message (fd=1)
[DEBUG ] read_message: { seq = 5, size = 8, id = 0, data = '\x06\x00\x02\x00\x02\x00\x00\x00' }
[DEBUG ] read_message: received a message (fd=1)
[DEBUG ] read_message: { seq = 6, size = 48, id = 0, data = '\x03\x01\x03sh\x00-c\x00echo 0 > /proc/sys/net/ipv4/ip_forward\x00' }
[DEBUG ] on_cmd_start: successfully started a child for 'raw' (pid=7723)
[DEBUG ] send_message: message sent (fd=1)
[DEBUG ] send_message: { seq = 6, size = 4, id = 0, data = '\x04\x00\x04\x00' }
[DEBUG ] handle_child: new child started. (name=raw, pid=7723)
[DEBUG ] send_message: message sent (fd=1)
[DEBUG ] send_message: { seq = 3, size = 6, id = 0, data = '\x07\x00\x04\x00\x00\x00' }
[DEBUG ] reaper: thread "handle_child(name=raw, pid=7723)" joined. (exit_val=0x0, tid=1207456)
[DEBUG ] send_message: message sent (fd=1)
[DEBUG ] send_message: { seq = 4, size = 8, id = 0, data = '\x08\x00\x02\x00\x02\x00\x00\x00' }
[DEBUG ] reaper: thread "handle_child(name=arpspoof, pid=7720)" joined. (exit_val=0x0, tid=1206808)
[DEBUG ] reaper: thread "connection_writer" joined. (exit_val=0x0, tid=1204936)
[DEBUG ] reaper: thread "connection_worker" joined. (exit_val=0x0, tid=1205520)
[DEBUG ] connection_reader: connection closed (fd=1)
[DEBUG ] reaper: thread "connection_reader" joined. (exit_val=0x0, tid=1206104)

@tux-mind
Copy link
Member

@nivong thanks for the log. it seems that it's related to the changes made from @cmayer0087 , i reverted these changes few hours ago. can you test the nightly ? thanks in advance.

@bruvv
Copy link
Author

bruvv commented Dec 18, 2014

I downloaded it and getting a message saying heart attack! Clicking ok closes the app. I'll post some logs soon.

@bruvv
Copy link
Author

bruvv commented Dec 18, 2014

Logcat

--------- beginning of /dev/log/main
12-18 09:03:46.760 F/libc (21145): Fatal signal 13 (SIGPIPE) at 0x00005299 (code=0), thread 21145 (logcat)
--------- beginning of /dev/log/system
12-18 09:03:46.760 I/ActivityManager(1496): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.HOME] flg=0x10200000 cmp=com.google.android.googlequicksearchbox/com.google.android.launcher.GEL} from pid 1496
12-18 09:03:46.820 I/GEL (2308): handleIntent(Intent { act=android.intent.action.MAIN cat=[android.intent.category.HOME] flg=0x10600000 cmp=com.google.android.googlequicksearchbox/com.google.android.launcher.GEL })
12-18 09:03:46.840 W/HandlerScheduledExecuto(2308): Task does not implement UiTask. Consider using NamedUiRunnable for eww@64c26498
12-18 09:03:46.870 I/DEBUG (281): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
12-18 09:03:46.870 I/DEBUG (281): Build fingerprint: 'oneplus/bacon/A0001:4.4.4/KTU84Q/XNPH44S:user/release-keys'
12-18 09:03:46.870 I/DEBUG (281): Revision: '0'
12-18 09:03:46.870 I/DEBUG (281): pid: 21145, tid: 21145, name: logcat >>> logcat <<<
12-18 09:03:46.870 I/DEBUG (281): AM write failure (32 / Broken pipe)
12-18 09:03:46.870 I/DEBUG (281): signal 13 (SIGPIPE), code -6 (SI_TKILL), fault addr --------
12-18 09:03:46.870 I/DEBUG (281): r0 ffffffe0 r1 bef8947c r2 00000027 r3 ff000000
12-18 09:03:46.870 I/DEBUG (281): r4 b6ef7384 r5 00000001 r6 00000001 r7 00000004
12-18 09:03:46.870 I/DEBUG (281): r8 00000005 r9 00000000 sl 00000000 fp b74a5050
12-18 09:03:46.870 I/DEBUG (281): ip 00000000 sp bef89478 lr b6f20fc9 pc b6ec928c cpsr 800f0010
12-18 09:03:46.870 I/DEBUG (281): d0 0000000000000000 d1 0000000000000000
12-18 09:03:46.870 I/DEBUG (281): d2 0000000000000000 d3 0000000000000000
12-18 09:03:46.870 I/DEBUG (281): d4 0000000000000000 d5 0000000000000000
12-18 09:03:46.870 I/DEBUG (281): d6 0000000000000000 d7 b165268000000000
12-18 09:03:46.870 I/DEBUG (281): d8 0000000000000000 d9 0000000000000000
12-18 09:03:46.870 I/DEBUG (281): d10 0000000000000000 d11 0000000000000000
12-18 09:03:46.870 I/DEBUG (281): d12 0000000000000000 d13 0000000000000000
12-18 09:03:46.870 I/DEBUG (281): d14 0000000000000000 d15 0000000000000000
12-18 09:03:46.870 I/DEBUG (281): d16 2d2d2d2d2d2d2d2d d17 6e6e69676562202d
12-18 09:03:46.870 I/DEBUG (281): d18 4187b99eb8000000 d19 0000000000000000
12-18 09:03:46.870 I/DEBUG (281): d20 0000000000000000 d21 0000000000000000
12-18 09:03:46.870 I/DEBUG (281): d22 0000000000000000 d23 0000000000000000
12-18 09:03:46.870 I/DEBUG (281): d24 0000000000000000 d25 0000000000000000
12-18 09:03:46.870 I/DEBUG (281): d26 0000000000000000 d27 0000000000000000
12-18 09:03:46.870 I/DEBUG (281): d28 0000000000000000 d29 0000000000000000
12-18 09:03:46.870 I/DEBUG (281): d30 0000000000000000 d31 0000000000000000
12-18 09:03:46.870 I/DEBUG (281): scr 00000010
12-18 09:03:46.870 I/DEBUG (281):
12-18 09:03:46.870 I/DEBUG (281): backtrace:
12-18 09:03:46.870 I/DEBUG (281): #00 pc 0002028c /system/lib/libc.so (write+12)
12-18 09:03:46.870 I/DEBUG (281): #1 pc 00000fc5 /system/bin/logcat
12-18 09:03:46.870 I/DEBUG (281): #2 pc 0000123d /system/bin/logcat
12-18 09:03:46.870 I/DEBUG (281): #3 pc 00001a33 /system/bin/logcat
12-18 09:03:46.870 I/DEBUG (281): #4 pc 0000e39b /system/lib/libc.so (__libc_init+50)
12-18 09:03:46.870 I/DEBUG (281): #5 pc 00000e94 /system/bin/logcat
12-18 09:03:46.870 I/DEBUG (281):
12-18 09:03:46.870 I/DEBUG (281): stack:
12-18 09:03:46.870 I/DEBUG (281): bef89438 b6f1a534 /system/bin/linker
12-18 09:03:46.870 I/DEBUG (281): bef8943c bef8944e [stack]
12-18 09:03:46.870 I/DEBUG (281): bef89440 00000000
12-18 09:03:46.870 I/DEBUG (281): bef89444 bef89404 [stack]
12-18 09:03:46.870 I/DEBUG (281): bef89448 00000005
12-18 09:03:46.870 I/DEBUG (281): bef8944c 00000000
12-18 09:03:46.870 I/DEBUG (281): bef89450 00000000
12-18 09:03:46.870 I/DEBUG (281): bef89454 00000000
12-18 09:03:46.870 I/DEBUG (281): bef89458 00000000
12-18 09:03:46.870 I/DEBUG (281): bef8945c 00000000
12-18 09:03:46.870 I/DEBUG (281): bef89460 00000000
12-18 09:03:46.870 I/DEBUG (281): bef89464 00000000
12-18 09:03:46.870 I/DEBUG (281): bef89468 00000400
12-18 09:03:46.870 I/DEBUG (281): bef8946c 00000001
12-18 09:03:46.870 I/DEBUG (281): bef89470 b6ef7384
12-18 09:03:46.870 I/DEBUG (281): bef89474 b6f20fbf /system/bin/logcat
12-18 09:03:46.870 I/DEBUG (281): #00 bef89478 b6f049e1 /system/lib/liblog.so
12-18 09:03:46.870 I/DEBUG (281): ........ ........
12-18 09:03:46.870 I/DEBUG (281): #1 bef89478 b6f049e1 /system/lib/liblog.so
12-18 09:03:46.870 I/DEBUG (281): bef8947c 2d2d2d2d
12-18 09:03:46.870 I/DEBUG (281): bef89480 2d2d2d2d
12-18 09:03:46.870 I/DEBUG (281): bef89484 6562202d
12-18 09:03:46.870 I/DEBUG (281): bef89488 6e6e6967
12-18 09:03:46.870 I/DEBUG (281): bef8948c 20676e69
12-18 09:03:46.870 I/DEBUG (281): bef89490 2f20666f
12-18 09:03:46.870 I/DEBUG (281): bef89494 2f766564
12-18 09:03:46.870 I/DEBUG (281): bef89498 2f676f6c
12-18 09:03:46.870 I/DEBUG (281): bef8949c 74737973
12-18 09:03:46.870 I/DEBUG (281): bef894a0 000a6d65
12-18 09:03:46.870 I/DEBUG (281): bef894a4 bef894c8 [stack]
12-18 09:03:46.870 I/DEBUG (281): bef894a8 bef894c8 [stack]
12-18 09:03:46.870 I/DEBUG (281): bef894ac 00080000
12-18 09:03:46.870 I/DEBUG (281): bef894b0 b6f0e2fb /system/bin/linker
12-18 09:03:46.870 I/DEBUG (281): bef894b4 00080000
12-18 09:03:46.870 I/DEBUG (281): ........ ........
12-18 09:03:46.870 I/DEBUG (281): #2 bef89890 b6f23f28 /system/bin/logcat
12-18 09:03:46.870 I/DEBUG (281): bef89894 b6f21a37 /system/bin/logcat
12-18 09:03:46.870 I/DEBUG (281):
12-18 09:03:46.870 I/DEBUG (281): memory near r1:
12-18 09:03:46.870 I/DEBUG (281): bef8945c 00000000 00000000 00000000 00000400
12-18 09:03:46.870 I/DEBUG (281): bef8946c 00000001 b6ef7384 b6f20fbf b6f049e1
12-18 09:03:46.870 I/DEBUG (281): bef8947c 2d2d2d2d 2d2d2d2d 6562202d 6e6e6967
12-18 09:03:46.870 I/DEBUG (281): bef8948c 20676e69 2f20666f 2f766564 2f676f6c
12-18 09:03:46.870 I/DEBUG (281): bef8949c 74737973 000a6d65 bef894c8 bef894c8
12-18 09:03:46.870 I/DEBUG (281): bef894ac 00080000 b6f0e2fb 00080000 00000005
12-18 09:03:46.870 I/DEBUG (281): bef894bc 00000000 b6f049e1 00000000 7379732f
12-18 09:03:46.870 I/DEBUG (281): bef894cc 2f6d6574 2f62696c 6d62696c 006f732e
12-18 09:03:46.870 I/DEBUG (281): bef894dc 6f732e2b bef89500 bef89570 ffffffff
12-18 09:03:46.870 I/DEBUG (281): bef894ec b6f11277 00000000 00000000 00000000
12-18 09:03:46.870 I/DEBUG (281): bef894fc 00000000 ffffffff b6f1ef20 b6f1a534
12-18 09:03:46.870 I/DEBUG (281): bef8950c bef8951e 00000000 00000000 00000005
12-18 09:03:46.870 W/NativeCrashListener(1496): Couldn't find ProcessRecord for pid 21145
12-18 09:03:46.880 I/DEBUG (281): bef8951c 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): bef8952c 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): bef8953c 00000000 00000000 b6f194a7 b6f2081b
12-18 09:03:46.880 I/DEBUG (281): bef8954c bef89598 b6f194a7 b6f1e678 b6f19391
12-18 09:03:46.880 I/DEBUG (281):
12-18 09:03:46.880 I/DEBUG (281): memory near r4:
12-18 09:03:46.880 I/DEBUG (281): b6ef7364 00001000 00001000 00010000 00200000
12-18 09:03:46.880 I/DEBUG (281): b6ef7374 00000003 00000000 bef89a78 bef89b29
12-18 09:03:46.880 I/DEBUG (281): b6ef7384 31038ad7 bef89a14 00000000 b6f1ecf0
12-18 09:03:46.880 I/DEBUG (281): b6ef7394 00000007 00000008 b6f1f154 00000000
12-18 09:03:46.880 I/DEBUG (281): b6ef73a4 b74a7000 00000009 0000000a 00000000
12-18 09:03:46.880 I/DEBUG (281): b6ef73b4 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): b6ef73c4 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): b6ef73d4 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): b6ef73e4 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): b6ef73f4 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): b6ef7404 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): b6ef7414 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): b6ef7424 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): b6ef7434 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): b6ef7444 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): b6ef7454 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281):
12-18 09:03:46.880 I/DEBUG (281): memory near fp:
12-18 09:03:46.880 I/DEBUG (281): b74a5030 00000000 0000001b 7665642f 676f6c2f
12-18 09:03:46.880 I/DEBUG (281): b74a5040 69616d2f 0000006e 00000000 00000023
12-18 09:03:46.880 I/DEBUG (281): b74a5050 b74a5038 00000000 00000004 00006d00
12-18 09:03:46.880 I/DEBUG (281): b74a5060 00000000 b74a5088 00000000 0000001b
12-18 09:03:46.880 I/DEBUG (281): b74a5070 7665642f 676f6c2f 7379732f 006d6574
12-18 09:03:46.880 I/DEBUG (281): b74a5080 00000000 00000023 b74a5070 00000000
12-18 09:03:46.880 I/DEBUG (281): b74a5090 00000005 00007301 b74a50a8 00000000
12-18 09:03:46.880 I/DEBUG (281): b74a50a0 00000000 00001413 000000c7 000005d8
12-18 09:03:46.880 I/DEBUG (281): b74a50b0 000007e8 54928a62 2d4ed659 74634104
12-18 09:03:46.880 I/DEBUG (281): b74a50c0 74697669 6e614d79 72656761 41545300
12-18 09:03:46.880 I/DEBUG (281): b74a50d0 75205452 617b2030 613d7463 6f72646e
12-18 09:03:46.880 I/DEBUG (281): b74a50e0 692e6469 6e65746e 63612e74 6e6f6974
12-18 09:03:46.880 I/DEBUG (281): b74a50f0 49414d2e 6163204e 615b3d74 6f72646e
12-18 09:03:46.880 I/DEBUG (281): b74a5100 692e6469 6e65746e 61632e74 6f676574
12-18 09:03:46.880 I/DEBUG (281): b74a5110 482e7972 5d454d4f 676c6620 3178303d
12-18 09:03:46.880 I/DEBUG (281): b74a5120 30303230 20303030 3d706d63 2e6d6f63
12-18 09:03:46.880 I/DEBUG (281):
12-18 09:03:46.880 I/DEBUG (281): memory near sp:
12-18 09:03:46.880 I/DEBUG (281): bef89458 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): bef89468 00000400 00000001 b6ef7384 b6f20fbf
12-18 09:03:46.880 I/DEBUG (281): bef89478 b6f049e1 2d2d2d2d 2d2d2d2d 6562202d
12-18 09:03:46.880 I/DEBUG (281): bef89488 6e6e6967 20676e69 2f20666f 2f766564
12-18 09:03:46.880 I/DEBUG (281): bef89498 2f676f6c 74737973 000a6d65 bef894c8
12-18 09:03:46.880 I/DEBUG (281): bef894a8 bef894c8 00080000 b6f0e2fb 00080000
12-18 09:03:46.880 I/DEBUG (281): bef894b8 00000005 00000000 b6f049e1 00000000
12-18 09:03:46.880 I/DEBUG (281): bef894c8 7379732f 2f6d6574 2f62696c 6d62696c
12-18 09:03:46.880 I/DEBUG (281): bef894d8 006f732e 6f732e2b bef89500 bef89570
12-18 09:03:46.880 I/DEBUG (281): bef894e8 ffffffff b6f11277 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): bef894f8 00000000 00000000 ffffffff b6f1ef20
12-18 09:03:46.880 I/DEBUG (281): bef89508 b6f1a534 bef8951e 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): bef89518 00000005 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): bef89528 00000000 00000000 00000000 00000000
12-18 09:03:46.880 I/DEBUG (281): bef89538 00000000 00000000 00000000 b6f194a7
12-18 09:03:46.880 I/DEBUG (281): bef89548 b6f2081b bef89598 b6f194a7 b6f1e678
12-18 09:03:46.880 I/DEBUG (281):
12-18 09:03:46.880 I/DEBUG (281): code around pc:
12-18 09:03:46.880 I/DEBUG (281): b6ec926c e1a0700c e3700a01 912fff1e e2600000
12-18 09:03:46.880 I/DEBUG (281): b6ec927c ea007511 e1a0c007 e3a07004 ef000000
12-18 09:03:46.880 I/DEBUG (281): b6ec928c e1a0700c e3700a01 912fff1e e2600000
12-18 09:03:46.880 I/DEBUG (281): b6ec929c ea007509 e1a0c00d e92d00f0 e89c0070
12-18 09:03:46.880 I/DEBUG (281): b6ec92ac e3a070b4 ef000000 e8bd00f0 e3700a01
12-18 09:03:46.880 I/DEBUG (281): b6ec92bc 912fff1e e2600000 ea0074ff e1a0c00d
12-18 09:03:46.880 I/DEBUG (281): b6ec92cc e92d00f0 e89c0070 e3a070b5 ef000000
12-18 09:03:46.880 I/DEBUG (281): b6ec92dc e8bd00f0 e3700a01 912fff1e e2600000
12-18 09:03:46.880 I/DEBUG (281): b6ec92ec ea0074f5 e1a0c007 e3a07005 ef000000
12-18 09:03:46.880 I/DEBUG (281): b6ec92fc e1a0700c e3700a01 912fff1e e2600000
12-18 09:03:46.880 I/DEBUG (281): b6ec930c ea0074ed e1a0c007 e59f7014 ef000000
12-18 09:03:46.880 I/DEBUG (281): b6ec931c e1a0700c e3700a01 912fff1e e2600000
12-18 09:03:46.880 I/DEBUG (281): b6ec932c ea0074e5 00000142 e1a0c007 e3a07006
12-18 09:03:46.880 I/DEBUG (281): b6ec933c ef000000 e1a0700c e3700a01 912fff1e
12-18 09:03:46.880 I/DEBUG (281): b6ec934c e2600000 ea0074dc e1a0c007 e3a07013
12-18 09:03:46.880 I/DEBUG (281): b6ec935c ef000000 e1a0700c e3700a01 912fff1e
12-18 09:03:46.880 I/DEBUG (281):
12-18 09:03:46.880 I/DEBUG (281): code around lr:
12-18 09:03:46.880 I/DEBUG (281): b6f20fa8 f7ff682b 4814ee36 6180f44f 68054478
12-18 09:03:46.880 I/DEBUG (281): b6f20fb8 f7ffa801 4602ee34 4628a901 ee34f7ff
12-18 09:03:46.880 I/DEBUG (281): b6f20fc8 da072800 4478480d ee34f7ff 30fff04f
12-18 09:03:46.880 I/DEBUG (281): b6f20fd8 ee36f7ff 1404f8dd 42916822 f7ffd001
12-18 09:03:46.880 I/DEBUG (281): b6f20fe8 b003ee36 6d80f50d bf00bd30 00002f8a
12-18 09:03:46.880 I/DEBUG (281): b6f20ff8 fffffff0 000012eb 0000304c 000012da
12-18 09:03:46.880 I/DEBUG (281): b6f21008 b9627b02 21014b06 447b7301 428a681a
12-18 09:03:46.880 I/DEBUG (281): b6f21018 4904dd05 680b4479 f7ffb90b 4770bfb1
12-18 09:03:46.880 I/DEBUG (281): b6f21028 0000341a 00003408 4604b510 ffe8f7ff
12-18 09:03:46.880 I/DEBUG (281): b6f21038 f5006920 685953a0 e8bd6121 f0004010
12-18 09:03:46.880 I/DEBUG (281): b6f21048 0000bdc9 4a534b52 f2adb5f0 447b4d3c
12-18 09:03:46.880 I/DEBUG (281): b6f21058 683b589f 3434f8cd 4a4fb158 6080f44f
12-18 09:03:46.880 I/DEBUG (281): b6f21068 9000ab0d a9054608 6812447a edfaf7ff
12-18 09:03:46.880 I/DEBUG (281): b6f21078 4608e003 f7ffa905 2800edfc 4c47db7d
12-18 09:03:46.880 I/DEBUG (281): b6f21088 9a07990a 6820447c edf8f7ff 4944b158
12-18 09:03:46.880 I/DEBUG (281): b6f21098 6820aa05 68094479 edf6f7ff da022800
12-18 09:03:46.880 I/BootReceiver(1496): Copying /data/tombstones/tombstone_00 to DropBox (SYSTEM_TOMBSTONE)
12-18 09:03:46.910 D/DropBoxFileObserver(3766): /data/system/dropbox/[email protected]
12-18 09:03:46.910 D/LogFetchServiceManager(3766): Received entry added
12-18 09:03:46.920 I/Timeline(2308): Timeline: Activity_idle id: android.os.BinderProxy@64b72840 time:28819825
12-18 09:03:47.000 I/art (2201): Heap trim of managed (duration=7.299271ms, advised=776KB) and native (duration=5.816719ms, advised=672KB) heaps. Managed heap utilization of 49%.
12-18 09:03:47.300 I/Timeline(1496): Timeline: Activity_windows_visible id: ActivityRecord{65848048 u0 com.google.android.googlequicksearchbox/com.google.android.launcher.GEL t1} time:28820203
12-18 09:03:48.370 I/Timeline(2308): Timeline: Activity_launch_request id:com.nolanlawson.logcat time:28821278
12-18 09:03:48.370 I/ActivityManager(1496): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 pkg=com.nolanlawson.logcat cmp=com.nolanlawson.logcat/.LogcatActivity bnds=[276,925][540,1260]} from pid 2308
12-18 09:03:48.390 W/BroadcastQueue(1496): Permission Denial: receiving Intent { act=com.android.launcher3.action.LAUNCH flg=0x10 (has extras) } to com.google.android.googlequicksearchbox/com.google.android.search.core.summons.icing.InternalIcingCorporaProvider$ApplicationLaunchReceiver requires com.android.launcher3.permission.RECEIVE_LAUNCH_BROADCASTS due to sender com.google.android.googlequicksearchbox (uid 10026)
12-18 09:03:48.430 V/PhoneStatusBar(2071): setLightsOn(true)
12-18 09:03:48.500 I/Timeline(20912): Timeline: Activity_idle id: android.os.BinderProxy@64c866f0 time:28821407
12-18 09:03:48.510 I/ActivityManager(1496): Displayed com.nolanlawson.logcat/.LogcatActivity: +98ms
12-18 09:03:48.650 D/AndroidRuntime(22547):
12-18 09:03:48.650 D/AndroidRuntime(22547): >>>>>> AndroidRuntime START com.android.internal.os.RuntimeInit <<<<<<
12-18 09:03:48.660 D/AndroidRuntime(22547): CheckJNI is OFF
12-18 09:03:48.660 E/art (22547): Unrecognized option -XX:mainThreadStackSize=24K
12-18 09:03:48.690 W/art (22547): Failed to find ELF magic in /system/framework/am.odex: dey
12-18 09:03:48.700 I/Timeline(1496): Timeline: Activity_windows_visible id: ActivityRecord{65d4dcd0 u0 com.nolanlawson.logcat/.LogcatActivity t53} time:28821609
12-18 09:03:48.740 W/art (22547): JNI RegisterNativeMethods: attempt to register 0 native methods for android.content.res.Configuration
12-18 09:03:48.750 D/AndroidRuntime(22547): Calling main entry com.android.commands.am.Am
12-18 09:03:48.790 D/AndroidRuntime(22547): Shutting down VM
12-18 09:03:48.990 D/AndroidRuntime(22567):
12-18 09:03:48.990 D/AndroidRuntime(22567): >>>>>> AndroidRuntime START com.android.internal.os.RuntimeInit <<<<<<
12-18 09:03:49.000 D/AndroidRuntime(22567): CheckJNI is OFF
12-18 09:03:49.000 E/art (22567): Unrecognized option -XX:mainThreadStackSize=24K
12-18 09:03:49.040 W/art (22567): Failed to find ELF magic in /system/framework/am.odex: dey
12-18 09:03:49.070 W/art (22567): JNI RegisterNativeMethods: attempt to register 0 native methods for android.content.res.Configuration
12-18 09:03:49.080 D/AndroidRuntime(22567): Calling main entry com.android.commands.am.Am
12-18 09:03:49.120 D/AndroidRuntime(22567): Shutting down VM
12-18 09:03:49.390 D/AndroidRuntime(22590):
12-18 09:03:49.390 D/AndroidRuntime(22590): >>>>>> AndroidRuntime START com.android.internal.os.RuntimeInit <<<<<<
12-18 09:03:49.390 D/AndroidRuntime(22590): CheckJNI is OFF
12-18 09:03:49.390 E/art (22590): Unrecognized option -XX:mainThreadStackSize=24K
12-18 09:03:49.460 W/art (22590): Failed to find ELF magic in /system/framework/am.odex: dey
12-18 09:03:49.520 W/art (22590): JNI RegisterNativeMethods: attempt to register 0 native methods for android.content.res.Configuration
12-18 09:03:49.530 D/AndroidRuntime(22590): Calling main entry com.android.commands.am.Am
12-18 09:03:49.560 I/art (19295): Heap trim of managed (duration=1.144062ms, advised=1264KB) and native (duration=910.104us, advised=40KB) heaps. Managed heap utilization of 24%.
12-18 09:03:49.560 D/AndroidRuntime(22590): Shutting down VM
12-18 09:03:49.660 D/AndroidRuntime(22609):
12-18 09:03:49.660 D/AndroidRuntime(22609): >>>>>> AndroidRuntime START com.android.internal.os.RuntimeInit <<<<<<
12-18 09:03:49.660 D/AndroidRuntime(22609): CheckJNI is OFF
12-18 09:03:49.660 E/art (22609): Unrecognized option -XX:mainThreadStackSize=24K
12-18 09:03:49.700 W/art (22609): Failed to find ELF magic in /system/framework/am.odex: dey
12-18 09:03:49.700 I/art (20912): GcCauseBackground sticky partial concurrent mark sweep GC freed 20708(913KB) AllocSpace objects, 6(96KB) LOS objects, 12% free, 7MB/9MB, paused 10.012ms total 21.045ms
12-18 09:03:49.740 W/art (22609): JNI RegisterNativeMethods: attempt to register 0 native methods for android.content.res.Configuration
12-18 09:03:49.750 D/AndroidRuntime(22609): Calling main entry com.android.commands.am.Am
12-18 09:03:49.800 D/AndroidRuntime(22609): Shutting down VM
12-18 09:03:50.850 I/ActivityManager(1496): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.HOME] flg=0x10200000 cmp=com.google.android.googlequicksearchbox/com.google.android.launcher.GEL} from pid 1496
12-18 09:03:50.900 I/GEL (2308): handleIntent(Intent { act=android.intent.action.MAIN cat=[android.intent.category.HOME] flg=0x10600000 cmp=com.google.android.googlequicksearchbox/com.google.android.launcher.GEL })
12-18 09:03:50.920 W/HandlerScheduledExecuto(2308): Task does not implement UiTask. Consider using NamedUiRunnable for eww@64c26498
12-18 09:03:50.950 I/Timeline(2308): Timeline: Activity_idle id: android.os.BinderProxy@64b72840 time:28823856
12-18 09:03:51.360 I/Timeline(1496): Timeline: Activity_windows_visible id: ActivityRecord{65848048 u0 com.google.android.googlequicksearchbox/com.google.android.launcher.GEL t1} time:28824268
12-18 09:03:51.630 I/art (2071): Heap trim of managed (duration=4.722136ms, advised=2MB) and native (duration=2.663958ms, advised=728KB) heaps. Managed heap utilization of 35%.
12-18 09:03:51.990 I/ActivityManager(1496): START u0 {act=com.android.systemui.recent.action.TOGGLE_RECENTS flg=0x10800000 cmp=com.android.systemui/.recent.RecentsActivity} from pid 2071
12-18 09:03:52.140 I/Timeline(2071): Timeline: Activity_idle id: android.os.BinderProxy@64c1ecc8 time:28825042
12-18 09:03:52.380 I/Timeline(1496): Timeline: Activity_windows_visible id: ActivityRecord{66178f78 u0 com.android.systemui/.recent.RecentsActivity t35} time:28825287
12-18 09:03:53.410 I/ActivityManager(1496): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.HOME] flg=0x10200000 cmp=com.google.android.googlequicksearchbox/com.google.android.launcher.GEL} from pid 1496
12-18 09:03:53.460 I/GEL (2308): handleIntent(Intent { act=android.intent.action.MAIN cat=[android.intent.category.HOME] flg=0x10600000 cmp=com.google.android.googlequicksearchbox/com.google.android.launcher.GEL })
12-18 09:03:53.470 W/HandlerScheduledExecuto(2308): Task does not implement UiTask. Consider using NamedUiRunnable for eww@64c26498
12-18 09:03:53.540 W/ResourceType(1496): Skipping entry 0x7f05000e in package table 0 because it is not complex!
12-18 09:03:53.550 W/ResourceType(1496): Skipping entry 0x7f05000f in package table 0 because it is not complex!
12-18 09:03:53.570 I/art (1496): Heap trim of managed (duration=44.790572ms, advised=4MB) and native (duration=2.834688ms, advised=3MB) heaps. Managed heap utilization of 67%.
12-18 09:03:53.580 I/Timeline(2308): Timeline: Activity_idle id: android.os.BinderProxy@64b72840 time:28826486
12-18 09:03:53.830 I/Timeline(1496): Timeline: Activity_windows_visible id: ActivityRecord{65848048 u0 com.google.android.googlequicksearchbox/com.google.android.launcher.GEL t1} time:28826739
12-18 09:03:54.280 I/Timeline(2308): Timeline: Activity_launch_request id:com.nolanlawson.logcat time:28827187
12-18 09:03:54.280 I/ActivityManager(1496): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 pkg=com.nolanlawson.logcat cmp=com.nolanlawson.logcat/.LogcatActivity bnds=[276,925][540,1260]} from pid 2308
12-18 09:03:54.300 W/BroadcastQueue(1496): Permission Denial: receiving Intent { act=com.android.launcher3.action.LAUNCH flg=0x10 (has extras) } to com.google.android.googlequicksearchbox/com.google.android.search.core.summons.icing.InternalIcingCorporaProvider$ApplicationLaunchReceiver requires com.android.launcher3.permission.RECEIVE_LAUNCH_BROADCASTS due to sender com.google.android.googlequicksearchbox (uid 10026)
12-18 09:03:54.330 V/PhoneStatusBar(2071): setLightsOn(true)
12-18 09:03:54.400 I/art (2201): Heap trim of managed (duration=3.883229ms, advised=784KB) and native (duration=7.257605ms, advised=672KB) heaps. Managed heap utilization of 49%.
12-18 09:03:54.430 V/PhoneStatusBar(2071): setLightsOn(true)
12-18 09:03:54.490 I/Timeline(20912): Timeline: Activity_idle id: android.os.BinderProxy@64c866f0 time:28827393
12-18 09:03:54.710 I/Timeline(1496): Timeline: Activity_windows_visible id: ActivityRecord{65d4dcd0 u0 com.nolanlawson.logcat/.LogcatActivity t53} time:28827613
12-18 09:04:00.080 D/AndroidRuntime(22650):
12-18 09:04:00.080 D/AndroidRuntime(22650): >>>>>> AndroidRuntime START com.android.internal.os.RuntimeInit <<<<<<
12-18 09:04:00.090 D/AndroidRuntime(22650): CheckJNI is OFF
12-18 09:04:00.090 E/art (22650): Unrecognized option -XX:mainThreadStackSize=24K
12-18 09:04:00.120 W/art (22650): Failed to find ELF magic in /system/framework/am.odex: dey
12-18 09:04:00.160 W/art (22650): JNI RegisterNativeMethods: attempt to register 0 native methods for android.content.res.Configuration
12-18 09:04:00.170 D/AndroidRuntime(22650): Calling main entry com.android.commands.am.Am
12-18 09:04:00.210 D/AndroidRuntime(22650): Shutting down VM
12-18 09:04:00.470 D/AndroidRuntime(22673):
12-18 09:04:00.470 D/AndroidRuntime(22673): >>>>>> AndroidRuntime START com.android.internal.os.RuntimeInit <<<<<<
12-18 09:04:00.480 D/AndroidRuntime(22673): CheckJNI is OFF
12-18 09:04:00.480 E/art (22673): Unrecognized option -XX:mainThreadStackSize=24K
12-18 09:04:00.500 W/art (22673): Failed to find ELF magic in /system/framework/am.odex: dey
12-18 09:04:00.540 W/art (22673): JNI RegisterNativeMethods: attempt to register 0 native methods for android.content.res.Configuration
12-18 09:04:00.540 I/Choreographer(20912): Skipped 40 frames! The application may be doing too much work on its main thread.
12-18 09:04:00.550 D/AndroidRuntime(22673): Calling main entry com.android.commands.am.Am
12-18 09:04:00.580 D/AndroidRuntime(22673): Shutting down VM
12-18 09:04:00.580 F/libc (22608): Fatal signal 13 (SIGPIPE) at 0x00005850 (code=0), thread 22608 (logcat)
12-18 09:04:00.680 I/DEBUG (281): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
12-18 09:04:00.680 I/DEBUG (281): Build fingerprint: 'oneplus/bacon/A0001:4.4.4/KTU84Q/XNPH44S:user/release-keys'
12-18 09:04:00.680 I/DEBUG (281): Revision: '0'
12-18 09:04:00.680 I/DEBUG (281): pid: 22608, tid: 22608, name: logcat >>> logcat <<<
12-18 09:04:00.680 I/DEBUG (281): signal 13 (SIGPIPE), code -6 (SI_TKILL), fault addr --------
12-18 09:04:00.680 I/DEBUG (281): r0 ffffffe0 r1 bea0921c r2 0000003d r3 b6fa3384
12-18 09:04:00.680 I/DEBUG (281): r4 b6fa3384 r5 bea0921c r6 b6fb3f60 r7 00000004
12-18 09:04:00.680 I/DEBUG (281): r8 b6fa3384 r9 00000001 sl 00000000 fp b7c4f050
12-18 09:04:00.680 I/DEBUG (281): ip bea09218 sp bea09210 lr b6fb2103 pc b6f7528c cpsr 600f0010
12-18 09:04:00.680 I/DEBUG (281): d0 0000000000015180 d1 0000000000000000
12-18 09:04:00.680 I/DEBUG (281): d2 0000000000000000 d3 0000000000000000
12-18 09:04:00.680 I/DEBUG (281): d4 0000000000000000 d5 0000000000000000
12-18 09:04:00.680 I/DEBUG (281): d6 0000000000000000 d7 b5ecd18000000000
12-18 09:04:00.680 I/DEBUG (281): d8 0000000000000000 d9 0000000000000000
12-18 09:04:00.680 I/DEBUG (281): d10 0000000000000000 d11 0000000000000000
12-18 09:04:00.680 I/DEBUG (281): d12 0000000000000000 d13 0000000000000000
12-18 09:04:00.680 I/DEBUG (281): d14 0000000000000000 d15 0000000000000000
12-18 09:04:00.680 I/DEBUG (281): d16 412f65706f727545 d17 6d6164726574736d
12-18 09:04:00.680 I/DEBUG (281): d18 41b91f1783000000 d19 0000000000000000
12-18 09:04:00.680 I/DEBUG (281): d20 0000000000000000 d21 0000000000000000
12-18 09:04:00.680 I/DEBUG (281): d22 0000000000000000 d23 0000000000000000
12-18 09:04:00.680 I/DEBUG (281): d24 0000000000000000 d25 0000000000000000
12-18 09:04:00.690 I/DEBUG (281): d26 0000000000000000 d27 0000000000000000
12-18 09:04:00.690 I/DEBUG (281): d28 0000000000000000 d29 0000000000000000
12-18 09:04:00.690 I/DEBUG (281): d30 0000000000000000 d31 0000000000000000
12-18 09:04:00.690 I/DEBUG (281): scr 00000010
12-18 09:04:00.690 I/DEBUG (281):
12-18 09:04:00.690 I/DEBUG (281): backtrace:
12-18 09:04:00.690 I/DEBUG (281): #00 pc 0002028c /system/lib/libc.so (write+12)
12-18 09:04:00.690 I/DEBUG (281): #1 pc 000020ff /system/lib/liblog.so (android_log_printLogLine+50)
12-18 09:04:00.690 I/DEBUG (281): #2 pc 000010a1 /system/bin/logcat
12-18 09:04:00.690 I/DEBUG (281): #3 pc 00001255 /system/bin/logcat
12-18 09:04:00.690 I/DEBUG (281): #4 pc 00001a33 /system/bin/logcat
12-18 09:04:00.690 I/DEBUG (281): #5 pc 0000e39b /system/lib/libc.so (__libc_init+50)
12-18 09:04:00.690 I/DEBUG (281): #6 pc 00000e94 /system/bin/logcat
12-18 09:04:00.690 I/DEBUG (281):
12-18 09:04:00.690 I/DEBUG (281): stack:
12-18 09:04:00.690 I/DEBUG (281): bea091d0 00000000
12-18 09:04:00.690 I/DEBUG (281): bea091d4 00000000
12-18 09:04:00.690 I/DEBUG (281): bea091d8 00000000
12-18 09:04:00.690 I/DEBUG (281): bea091dc 00000000
12-18 09:04:00.690 I/DEBUG (281): bea091e0 00000000
12-18 09:04:00.690 I/DEBUG (281): bea091e4 8ea5c0cf
12-18 09:04:00.690 I/DEBUG (281): bea091e8 00000000
12-18 09:04:00.690 I/DEBUG (281): bea091ec b6fa3384
12-18 09:04:00.690 I/DEBUG (281): bea091f0 00000001
12-18 09:04:00.690 I/DEBUG (281): bea091f4 b6fb3f60 /system/lib/liblog.so
12-18 09:04:00.690 I/DEBUG (281): bea091f8 bea09218 [stack]
12-18 09:04:00.690 I/DEBUG (281): bea091fc b6fa3384
12-18 09:04:00.690 I/DEBUG (281): bea09200 00000001
12-18 09:04:00.690 I/DEBUG (281): bea09204 00000000
12-18 09:04:00.690 I/DEBUG (281): bea09208 b7c4f050 [heap]
12-18 09:04:00.690 I/DEBUG (281): bea0920c b6fb20f5 /system/lib/liblog.so (android_log_printLogLine+40)
12-18 09:04:00.690 I/DEBUG (281): #00 bea09210 bea09218 [stack]
12-18 09:04:00.690 I/DEBUG (281): ........ ........
12-18 09:04:00.690 I/DEBUG (281): #1 bea09210 bea09218 [stack]
12-18 09:04:00.690 I/DEBUG (281): bea09214 00000000
12-18 09:04:00.690 I/DEBUG (281): bea09218 0000003d
12-18 09:04:00.690 I/DEBUG (281): bea0921c 312d3231
12-18 09:04:00.690 I/DEBUG (281): bea09220 39302038
12-18 09:04:00.690 I/DEBUG (281): bea09224 3a34303a
12-18 09:04:00.690 I/DEBUG (281): bea09228 352e3030
12-18 09:04:00.690 I/DEBUG (281): bea0922c 44203038
12-18 09:04:00.690 I/DEBUG (281): bea09230 646e412f
12-18 09:04:00.690 I/DEBUG (281): bea09234 64696f72
12-18 09:04:00.690 I/DEBUG (281): bea09238 746e7552
12-18 09:04:00.690 I/DEBUG (281): bea0923c 28656d69
12-18 09:04:00.690 I/DEBUG (281): bea09240 37363232
12-18 09:04:00.690 I/DEBUG (281): bea09244 203a2933
12-18 09:04:00.690 I/DEBUG (281): bea09248 74756853
12-18 09:04:00.690 I/DEBUG (281): bea0924c 676e6974
12-18 09:04:00.690 I/DEBUG (281): ........ ........
12-18 09:04:00.690 I/DEBUG (281): #2 bea09440 00000000
12-18 09:04:00.690 I/DEBUG (281): bea09444 bea09404 [stack]
12-18 09:04:00.690 I/DEBUG (281): bea09448 00000005
12-18 09:04:00.690 I/DEBUG (281): bea0944c 00000000
12-18 09:04:00.690 I/DEBUG (281): bea09450 00000000
12-18 09:04:00.690 I/DEBUG (281): bea09454 54928a70
12-18 09:04:00.690 I/DEBUG (281): bea09458 22944154
12-18 09:04:00.690 I/DEBUG (281): bea0945c 00000003
12-18 09:04:00.690 I/DEBUG (281): bea09460 00005891
12-18 09:04:00.690 I/DEBUG (281): bea09464 00005891
12-18 09:04:00.690 I/DEBUG (281): bea09468 b7c4f0bd [heap]
12-18 09:04:00.690 I/DEBUG (281): bea0946c 00000011
12-18 09:04:00.690 I/DEBUG (281): bea09470 b7c4f0cc [heap]
12-18 09:04:00.690 I/DEBUG (281): bea09474 b6fccfbf /system/bin/logcat
12-18 09:04:00.690 I/DEBUG (281): bea09478 b6fb09e1 /system/lib/liblog.so
12-18 09:04:00.690 I/DEBUG (281): bea0947c 2d2d2d2d
12-18 09:04:00.690 I/DEBUG (281): ........ ........
12-18 09:04:00.690 I/DEBUG (281):
12-18 09:04:00.690 I/DEBUG (281): memory near r1:
12-18 09:04:00.690 I/DEBUG (281): bea091fc b6fa3384 00000001 00000000 b7c4f050
12-18 09:04:00.690 I/DEBUG (281): bea0920c b6fb20f5 bea09218 00000000 0000003d
12-18 09:04:00.690 I/DEBUG (281): bea0921c 312d3231 39302038 3a34303a 352e3030
12-18 09:04:00.690 I/DEBUG (281): bea0922c 44203038 646e412f 64696f72 746e7552
12-18 09:04:00.690 I/DEBUG (281): bea0923c 28656d69 37363232 203a2933 74756853
12-18 09:04:00.690 I/DEBUG (281): bea0924c 676e6974 776f6420 4d56206e 6320000a
12-18 09:04:00.690 I/DEBUG (281): bea0925c 612e6d6f 6f72646e 632e6469 616d6d6f
12-18 09:04:00.690 I/DEBUG (281): bea0926c 2e73646e 412e6d61 20000a6d 206f6f74
12-18 09:04:00.690 I/DEBUG (281): bea0927c 6863756d 726f7720 6e6f206b 73746920
12-18 09:04:00.690 I/DEBUG (281): bea0928c 69616d20 6874206e 64616572 6f000a2e
12-18 09:04:00.690 I/DEBUG (281): bea0929c 6769666e 74617275 0a6e6f69 6e755200
12-18 09:04:00.690 I/DEBUG (281): bea092ac 656d6974 74696e49 3c3c3c20 0a3c3c3c
12-18 09:04:00.690 I/DEBUG (281): bea092bc 20000a00 6c697475 74617a69 206e6f69
12-18 09:04:00.690 I/DEBUG (281): bea092cc 3420666f 0a2e2539 786f6200 6d6f632f
12-18 09:04:00.690 I/DEBUG (281): bea092dc 6f6f672e 2e656c67 72646e61 2e64696f
12-18 09:04:00.690 I/DEBUG (281): bea092ec 72616573 632e6863 2e65726f 6d6d7573
12-18 09:04:00.690 I/DEBUG (281):
12-18 09:04:00.690 I/DEBUG (281): memory near r3:
12-18 09:04:00.690 I/DEBUG (281): b6fa3364 00001000 00001000 00010000 00200000
12-18 09:04:00.690 I/DEBUG (281): b6fa3374 00000003 00000000 bea09a78 bea09b29
12-18 09:04:00.690 I/DEBUG (281): b6fa3384 8ea5c0cf bea09a14 00000000 b6fcacf0
12-18 09:04:00.690 I/DEBUG (281): b6fa3394 00000007 00000008 b6fcb154 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33a4 b7c73000 00000009 0000000a 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33b4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33c4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33d4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33e4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33f4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3404 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3414 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3424 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3434 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3444 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3454 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281):
12-18 09:04:00.690 I/DEBUG (281): memory near r4:
12-18 09:04:00.690 I/DEBUG (281): b6fa3364 00001000 00001000 00010000 00200000
12-18 09:04:00.690 I/DEBUG (281): b6fa3374 00000003 00000000 bea09a78 bea09b29
12-18 09:04:00.690 I/DEBUG (281): b6fa3384 8ea5c0cf bea09a14 00000000 b6fcacf0
12-18 09:04:00.690 I/DEBUG (281): b6fa3394 00000007 00000008 b6fcb154 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33a4 b7c73000 00000009 0000000a 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33b4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33c4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33d4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33e4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33f4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3404 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3414 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3424 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3434 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3444 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3454 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281):
12-18 09:04:00.690 I/DEBUG (281): memory near r5:
12-18 09:04:00.690 I/DEBUG (281): bea091fc b6fa3384 00000001 00000000 b7c4f050
12-18 09:04:00.690 I/DEBUG (281): bea0920c b6fb20f5 bea09218 00000000 0000003d
12-18 09:04:00.690 I/DEBUG (281): bea0921c 312d3231 39302038 3a34303a 352e3030
12-18 09:04:00.690 I/DEBUG (281): bea0922c 44203038 646e412f 64696f72 746e7552
12-18 09:04:00.690 I/DEBUG (281): bea0923c 28656d69 37363232 203a2933 74756853
12-18 09:04:00.690 I/DEBUG (281): bea0924c 676e6974 776f6420 4d56206e 6320000a
12-18 09:04:00.690 I/DEBUG (281): bea0925c 612e6d6f 6f72646e 632e6469 616d6d6f
12-18 09:04:00.690 I/DEBUG (281): bea0926c 2e73646e 412e6d61 20000a6d 206f6f74
12-18 09:04:00.690 I/DEBUG (281): bea0927c 6863756d 726f7720 6e6f206b 73746920
12-18 09:04:00.690 I/DEBUG (281): bea0928c 69616d20 6874206e 64616572 6f000a2e
12-18 09:04:00.690 I/DEBUG (281): bea0929c 6769666e 74617275 0a6e6f69 6e755200
12-18 09:04:00.690 I/DEBUG (281): bea092ac 656d6974 74696e49 3c3c3c20 0a3c3c3c
12-18 09:04:00.690 I/DEBUG (281): bea092bc 20000a00 6c697475 74617a69 206e6f69
12-18 09:04:00.690 I/DEBUG (281): bea092cc 3420666f 0a2e2539 786f6200 6d6f632f
12-18 09:04:00.690 I/DEBUG (281): bea092dc 6f6f672e 2e656c67 72646e61 2e64696f
12-18 09:04:00.690 I/DEBUG (281): bea092ec 72616573 632e6863 2e65726f 6d6d7573
12-18 09:04:00.690 I/DEBUG (281):
12-18 09:04:00.690 I/DEBUG (281): memory near r6:
12-18 09:04:00.690 I/DEBUG (281): b6fb3f40 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fb3f50 00000000 b6fa3384 b6f9f184 b6f9f2dc
12-18 09:04:00.690 I/DEBUG (281): b6fb3f60 00000000 00000000 00000000 b6f7da41
12-18 09:04:00.690 I/DEBUG (281): b6fb3f70 b6f7d945 b6f6382c b6f829c5 b6f75334
12-18 09:04:00.690 I/DEBUG (281): b6fb3f80 b6f63930 b6f75564 b6f69449 b6f75b60
12-18 09:04:00.690 I/DEBUG (281): b6fb3f90 b6f7717c b6f8efa1 b6f7b3c9 b6f78281
12-18 09:04:00.690 I/DEBUG (281): b6fb3fa0 b6f66f2d b6f7d7d5 b6f77f19 b6f767e4
12-18 09:04:00.690 I/DEBUG (281): b6fb3fb0 b6f76f71 b6f7a7f1 b6f62c65 b6f62c51
12-18 09:04:00.690 I/DEBUG (281): b6fb3fc0 b6f8048d b6f804ad b6f804f1 b6f69a2d
12-18 09:04:00.690 I/DEBUG (281): b6fb3fd0 b6f73b39 b6f747f1 b6f62c3d b6f77ac1
12-18 09:04:00.690 I/DEBUG (281): b6fb3fe0 b6f8efc7 b6f75280 b6f753e4 b6f68419
12-18 09:04:00.690 I/DEBUG (281): b6fb3ff0 b6f75354 b6f67c81 b6f80125 b6f6aeb7
12-18 09:04:00.690 I/DEBUG (281): b6fb4000 b6fb4000 ffffffff ffffffff ffffffff
12-18 09:04:00.690 I/DEBUG (281): b6fb4010 ffffffff b6fb0fb1 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fb4020 00000006 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fb4030 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281):
12-18 09:04:00.690 I/DEBUG (281): memory near r8:
12-18 09:04:00.690 I/DEBUG (281): b6fa3364 00001000 00001000 00010000 00200000
12-18 09:04:00.690 I/DEBUG (281): b6fa3374 00000003 00000000 bea09a78 bea09b29
12-18 09:04:00.690 I/DEBUG (281): b6fa3384 8ea5c0cf bea09a14 00000000 b6fcacf0
12-18 09:04:00.690 I/DEBUG (281): b6fa3394 00000007 00000008 b6fcb154 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33a4 b7c73000 00000009 0000000a 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33b4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33c4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33d4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33e4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa33f4 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3404 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3414 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3424 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3434 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3444 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b6fa3454 00000000 00000000 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281):
12-18 09:04:00.690 I/DEBUG (281): memory near fp:
12-18 09:04:00.690 I/DEBUG (281): b7c4f030 00000000 0000001b 7665642f 676f6c2f
12-18 09:04:00.690 I/DEBUG (281): b7c4f040 69616d2f 0000006e 00000000 00000023
12-18 09:04:00.690 I/DEBUG (281): b7c4f050 b7c4f038 00000000 00000004 00006d01
12-18 09:04:00.690 I/DEBUG (281): b7c4f060 b7c4f0a8 b7c4f088 00000000 0000001b
12-18 09:04:00.690 I/DEBUG (281): b7c4f070 7665642f 676f6c2f 7379732f 006d6574
12-18 09:04:00.690 I/DEBUG (281): b7c4f080 00000000 00000023 b7c4f070 00000000
12-18 09:04:00.690 I/DEBUG (281): b7c4f090 00000005 00007301 00000000 00000000
12-18 09:04:00.690 I/DEBUG (281): b7c4f0a0 00000000 00001413 00000022 00005891
12-18 09:04:00.690 I/DEBUG (281): b7c4f0b0 00005891 54928a70 22944154 646e4103
12-18 09:04:00.690 I/DEBUG (281): b7c4f0c0 64696f72 746e7552 00656d69 74756853
12-18 09:04:00.690 I/DEBUG (281): b7c4f0d0 676e6974 776f6420 4d56206e 6300000a
12-18 09:04:00.690 I/DEBUG (281): b7c4f0e0 612e6d6f 6f72646e 632e6469 616d6d6f
12-18 09:04:00.690 I/DEBUG (281): b7c4f0f0 2e73646e 412e6d61 7400006d 73646f68
12-18 09:04:00.690 I/DEBUG (281): b7c4f100 726f6620 646e6120 64696f72 6e6f632e
12-18 09:04:00.690 I/DEBUG (281): b7c4f110 746e6574 7365722e 6e6f432e 75676966
12-18 09:04:00.690 I/DEBUG (281): b7c4f120 69746172 00006e6f 69766974 74207974
12-18 09:04:00.690 I/DEBUG (281):
12-18 09:04:00.690 I/DEBUG (281): memory near ip:
12-18 09:04:00.690 I/DEBUG (281): bea091f8 bea09218 b6fa3384 00000001 00000000
12-18 09:04:00.690 I/DEBUG (281): bea09208 b7c4f050 b6fb20f5 bea09218 00000000
12-18 09:04:00.690 I/DEBUG (281): bea09218 0000003d 312d3231 39302038 3a34303a
12-18 09:04:00.690 I/DEBUG (281): bea09228 352e3030 44203038 646e412f 64696f72
12-18 09:04:00.690 I/DEBUG (281): bea09238 746e7552 28656d69 37363232 203a2933
12-18 09:04:00.690 I/DEBUG (281): bea09248 74756853 676e6974 776f6420 4d56206e
12-18 09:04:00.690 I/DEBUG (281): bea09258 6320000a 612e6d6f 6f72646e 632e6469
12-18 09:04:00.690 I/DEBUG (281): bea09268 616d6d6f 2e73646e 412e6d61 20000a6d
12-18 09:04:00.690 I/DEBUG (281): bea09278 206f6f74 6863756d 726f7720 6e6f206b
12-18 09:04:00.690 I/DEBUG (281): bea09288 73746920 69616d20 6874206e 64616572
12-18 09:04:00.690 I/DEBUG (281): bea09298 6f000a2e 6769666e 74617275 0a6e6f69
12-18 09:04:00.690 I/DEBUG (281): bea092a8 6e755200 656d6974 74696e49 3c3c3c20
12-18 09:04:00.690 I/DEBUG (281): bea092b8 0a3c3c3c 20000a00 6c697475 74617a69
12-18 09:04:00.690 I/DEBUG (281): bea092c8 206e6f69 3420666f 0a2e2539 786f6200
12-18 09:04:00.690 I/DEBUG (281): bea092d8 6d6f632f 6f6f672e 2e656c67 72646e61
12-18 09:04:00.690 I/DEBUG (281): bea092e8 2e64696f 72616573 632e6863 2e65726f
12-18 09:04:00.690 I/DEBUG (281):
12-18 09:04:00.690 I/DEBUG (281): memory near sp:
12-18 09:04:00.690 I/DEBUG (281): bea091f0 00000001 b6fb3f60 bea09218 b6fa3384
12-18 09:04:00.690 I/DEBUG (281): bea09200 00000001 00000000 b7c4f050 b6fb20f5
12-18 09:04:00.690 I/DEBUG (281): bea09210 bea09218 00000000 0000003d 312d3231
12-18 09:04:00.690 I/DEBUG (281): bea09220 39302038 3a34303a 352e3030 44203038
12-18 09:04:00.690 I/DEBUG (281): bea09230 646e412f 64696f72 746e7552 28656d69
12-18 09:04:00.690 I/DEBUG (281): bea09240 37363232 203a2933 74756853 676e6974
12-18 09:04:00.690 I/DEBUG (281): bea09250 776f6420 4d56206e 6320000a 612e6d6f
12-18 09:04:00.690 I/DEBUG (281): bea09260 6f72646e 632e6469 616d6d6f 2e73646e
12-18 09:04:00.690 I/DEBUG (281): bea09270 412e6d61 20000a6d 206f6f74 6863756d
12-18 09:04:00.690 I/DEBUG (281): bea09280 726f7720 6e6f206b 73746920 69616d20
12-18 09:04:00.690 I/DEBUG (281): bea09290 6874206e 64616572 6f000a2e 6769666e
12-18 09:04:00.690 I/DEBUG (281): bea092a0 74617275 0a6e6f69 6e755200 656d6974
12-18 09:04:00.690 I/DEBUG (281): bea092b0 74696e49 3c3c3c20 0a3c3c3c 20000a00
12-18 09:04:00.690 I/DEBUG (281): bea092c0 6c697475 74617a69 206e6f69 3420666f
12-18 09:04:00.690 I/DEBUG (281): bea092d0 0a2e2539 786f6200 6d6f632f 6f6f672e
12-18 09:04:00.690 I/DEBUG (281): bea092e0 2e656c67 72646e61 2e64696f 72616573
12-18 09:04:00.690 I/DEBUG (281):
12-18 09:04:00.690 I/DEBUG (281): code around pc:
12-18 09:04:00.690 I/DEBUG (281): b6f7526c e1a0700c e3700a01 912fff1e e2600000
12-18 09:04:00.690 I/DEBUG (281): b6f7527c ea007511 e1a0c007 e3a07004 ef000000
12-18 09:04:00.690 I/DEBUG (281): b6f7528c e1a0700c e3700a01 912fff1e e2600000
12-18 09:04:00.690 I/DEBUG (281): b6f7529c ea007509 e1a0c00d e92d00f0 e89c0070
12-18 09:04:00.690 I/DEBUG (281): b6f752ac e3a070b4 ef000000 e8bd00f0 e3700a01
12-18 09:04:00.690 I/DEBUG (281): b6f752bc 912fff1e e2600000 ea0074ff e1a0c00d
12-18 09:04:00.690 I/DEBUG (281): b6f752cc e92d00f0 e89c0070 e3a070b5 ef000000
12-18 09:04:00.690 I/DEBUG (281): b6f752dc e8bd00f0 e3700a01 912fff1e e2600000
12-18 09:04:00.690 I/DEBUG (281): b6f752ec ea0074f5 e1a0c007 e3a07005 ef000000
12-18 09:04:00.690 I/DEBUG (281): b6f752fc e1a0700c e3700a01 912fff1e e2600000
12-18 09:04:00.690 I/DEBUG (281): b6f7530c ea0074ed e1a0c007 e59f7014 ef000000
12-18 09:04:00.690 I/DEBUG (281): b6f7531c e1a0700c e3700a01 912fff1e e2600000
12-18 09:04:00.690 I/DEBUG (281): b6f7532c ea0074e5 00000142 e1a0c007 e3a07006
12-18 09:04:00.690 I/DEBUG (281): b6f7533c ef000000 e1a0700c e3700a01 912fff1e
12-18 09:04:00.690 I/DEBUG (281): b6f7534c e2600000 ea0074dc e1a0c007 e3a07013
12-18 09:04:00.690 I/DEBUG (281): b6f7535c ef000000 e1a0700c e3700a01 912fff1e
12-18 09:04:00.690 I/DEBUG (281):
12-18 09:04:00.690 I/DEBUG (281): code around lr:
12-18 09:04:00.690 I/DEBUG (281): b6fb20e0 f44f58b4 68217200 46a09700 a9039183
12-18 09:04:00.690 I/DEBUG (281): b6fb20f0 fe2cf7ff b1d84605 46294648 f7fe683a
12-18 09:04:00.690 I/DEBUG (281): b6fb2100 1e04eefc f7feda27 6803ee6e d0f32b04
12-18 09:04:00.690 I/DEBUG (281): b6fb2110 4818e017 49184622 44795830 f7fe30a8
12-18 09:04:00.690 I/DEBUG (281): b6fb2120 aa03eea4 d0054295 f7fe4628 e001eeaa
12-18 09:04:00.690 I/DEBUG (281): b6fb2130 34fff04f 46209983 3000f8d8 d0104299
12-18 09:04:00.690 I/DEBUG (281): b6fb2140 4c0ce00d 490d6802 24005930 30a84479
12-18 09:04:00.690 I/DEBUG (281): b6fb2150 ee8af7fe 683be7e5 d2e2429c f7fee7d9
12-18 09:04:00.690 I/DEBUG (281): b6fb2160 f50dee66 e8bd7d05 bf0083f0 00001e7e
12-18 09:04:00.690 I/DEBUG (281): b6fb2170 fffffff4 fffffff8 0000095d 0000094e
12-18 09:04:00.690 I/DEBUG (281): b6fb2180 4d2ab570 fbc1f7ff 46044b29 447d4e29
12-18 09:04:00.690 I/DEBUG (281): b6fb2190 58ed4829 4478447e 462935a8 ee88f7fe
12-18 09:04:00.690 I/DEBUG (281): b6fb21a0 46204631 fc4ef7ff 46204924 f7ff4479
12-18 09:04:00.690 I/DEBUG (281): b6fb21b0 4923fc49 44794620 fc44f7ff 46204631
12-18 09:04:00.690 I/DEBUG (281): b6fb21c0 fc40f7ff 4620491f f7ff4479 491efc3b
12-18 09:04:00.690 I/DEBUG (281): b6fb21d0 44794620 fc36f7ff 4620491c f7ff4479
12-18 09:04:00.700 W/NativeCrashListener(1496): Couldn't find ProcessRecord for pid 22608
12-18 09:04:00.700 I/BootReceiver(1496): Copying /data/tombstones/tombstone_01 to DropBox (SYSTEM_TOMBSTONE)
12-18 09:04:00.720 D/LogFetchServiceManager(3766): Received entry added
12-18 09:04:00.730 D/DropBoxFileObserver(3766): /data/system/dropbox/[email protected]
12-18 09:04:00.780 D/AndroidRuntime(22699):
12-18 09:04:00.780 D/AndroidRuntime(22699): >>>>>> AndroidRuntime START com.android.internal.os.RuntimeInit <<<<<<
12-18 09:04:00.780 D/AndroidRuntime(22699): CheckJNI is OFF
12-18 09:04:00.780 E/art (22699): Unrecognized option -XX:mainThreadStackSize=24K
12-18 09:04:00.820 W/art (22699): Failed to find ELF magic in /system/framework/am.odex: dey
12-18 09:04:00.890 W/art (22699): JNI RegisterNativeMethods: attempt to register 0 native methods for android.content.res.Configuration
12-18 09:04:00.890 D/AndroidRuntime(22699): Calling main entry com.android.commands.am.Am
12-18 09:04:00.930 D/AndroidRuntime(22699): Shutting down VM
12-18 09:04:01.080 D/AndroidRuntime(22720):
12-18 09:04:01.080 D/AndroidRuntime(22720): >>>>>> AndroidRuntime START com.android.internal.os.RuntimeInit <<<<<<
12-18 09:04:01.080 D/AndroidRuntime(22720): CheckJNI is OFF
12-18 09:04:01.080 E/art (22720): Unrecognized option -XX:mainThreadStackSize=24K
12-18 09:04:01.120 W/art (22720): Failed to find ELF magic in /system/framework/am.odex: dey
12-18 09:04:01.160 W/art (22720): JNI RegisterNativeMethods: attempt to register 0 native methods for android.content.res.Configuration
12-18 09:04:01.160 D/AndroidRuntime(22720): Calling main entry com.android.commands.am.Am
12-18 09:04:01.200 D/AndroidRuntime(22720): Shutting down VM
12-18 09:04:01.430 D/AndroidRuntime(22741):
12-18 09:04:01.430 D/AndroidRuntime(22741): >>>>>> AndroidRuntime START com.android.internal.os.RuntimeInit <<<<<<
12-18 09:04:01.430 D/AndroidRuntime(22741): CheckJNI is OFF
12-18 09:04:01.430 E/art (22741): Unrecognized option -XX:mainThreadStackSize=24K
12-18 09:04:01.460 W/art (22741): Failed to find ELF magic in /system/framework/am.odex: dey
12-18 09:04:01.500 W/art (22741): JNI RegisterNativeMethods: attempt to register 0 native methods for android.content.res.Configuration
12-18 09:04:01.510 D/AndroidRuntime(22741): Calling main entry com.android.commands.am.Am
12-18 09:04:01.560 D/AndroidRuntime(22741): Shutting down VM
12-18 09:04:01.690 D/AndroidRuntime(22761):
12-18 09:04:01.690 D/AndroidRuntime(22761): >>>>>> AndroidRuntime START com.android.internal.os.RuntimeInit <<<<<<
12-18 09:04:01.700 D/AndroidRuntime(22761): CheckJNI is OFF
12-18 09:04:01.700 E/art (22761): Unrecognized option -XX:mainThreadStackSize=24K
12-18 09:04:01.730 W/art (22761): Failed to find ELF magic in /system/framework/am.odex: dey
12-18 09:04:01.760 W/art (22761): JNI RegisterNativeMethods: attempt to register 0 native methods for android.content.res.Configuration
12-18 09:04:01.790 D/AndroidRuntime(22761): Calling main entry com.android.commands.am.Am
12-18 09:04:01.830 D/AndroidRuntime(22761): Shutting down VM
12-18 09:04:02.720 I/ActivityManager(1496): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.HOME] flg=0x10200000 cmp=com.google.android.googlequicksearchbox/com.google.android.launcher.GEL} from pid 1496
12-18 09:04:02.740 I/GEL (2308): handleIntent(Intent { act=android.intent.action.MAIN cat=[android.intent.category.HOME] flg=0x10600000 cmp=com.google.android.googlequicksearchbox/com.google.android.launcher.GEL })
12-18 09:04:02.760 W/HandlerScheduledExecuto(2308): Task does not implement UiTask. Consider using NamedUiRunnable for eww@64c26498
12-18 09:04:02.800 I/Timeline(2308): Timeline: Activity_idle id: android.os.BinderProxy@64b72840 time:28835709
12-18 09:04:03.200 I/Timeline(1496): Timeline: Activity_windows_visible id: ActivityRecord{65848048 u0 com.google.android.googlequicksearchbox/com.google.android.launcher.GEL t1} time:28836102
12-18 09:04:05.420 I/Timeline(2308): Timeline: Activity_launch_request id:org.csploit.android time:28838322
12-18 09:04:05.420 I/ActivityManager(1496): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 cmp=org.csploit.android/.MainActivity bnds=[774,547][1008,809](has extras)} from pid 2308
12-18 09:04:05.430 W/BroadcastQueue(1496): Permission Denial: receiving Intent { act=com.android.launcher3.action.LAUNCH flg=0x10 (has extras) } to com.google.android.googlequicksearchbox/com.google.android.search.core.summons.icing.InternalIcingCorporaProvider$ApplicationLaunchReceiver requires com.android.launcher3.permission.RECEIVE_LAUNCH_BROADCASTS due to sender com.google.android.googlequicksearchbox (uid 10026)
12-18 09:04:05.450 W/art (284): Could not get current activity
12-18 09:04:05.450 I/ActivityManager(1496): Start proc org.csploit.android for activity org.csploit.android/.MainActivity: pid=22782 uid=10233 gids={50233, 3003, 1028, 1015}
12-18 09:04:05.510 I/art (1496): Heap trim of managed (duration=18.026614ms, advised=4MB) and native (duration=4.055261ms, advised=3MB) heaps. Managed heap utilization of 67%.
12-18 09:04:05.520 D/ActivityThread(22782): handleBindApplication:org.csploit.android
12-18 09:04:05.520 D/ActivityThread(22782): setTargetHeapUtilization:0.75
12-18 09:04:05.520 D/ActivityThread(22782): setTargetHeapMinFree:2097152
12-18 09:04:05.560 D/CSPLOITcore.System.init: initializing System...
12-18 09:04:05.720 I/art (22782): GcCauseBackground partial concurrent mark sweep GC freed 7380(492KB) AllocSpace objects, 2(32KB) LOS objects, 13% free, 4MB/5MB, paused 6.678ms total 19.986ms
12-18 09:04:05.760 D/CSPLOITMainActivity.onCreate: initializer thread created and started in 1 ms
12-18 09:04:05.770 D/CSPLOITcore.UpdateChecker.run: Service started.
12-18 09:04:05.770 D/CSPLOITcore.System.isARM: Build.CPU_ABI = armeabi-v7a
12-18 09:04:05.770 D/CSPLOITcore.ToolsInstaller.needed: Checking version file /data/data/org.csploit.android/files/tools/VERSION
12-18 09:04:05.770 D/CSPLOITnet.NetworkDiscovery.run: Network monitor started ...
12-18 09:04:05.770 D/CSPLOITnet.NetworkDiscovery$ArpReader.run: ArpReader started ...
12-18 09:04:05.770 D/CSPLOITnet.NetworkDiscovery$UdpProber.run: UdpProber started ...
12-18 09:04:05.810 E/cSploitClient(22782): connect_unix: connect: No such file or directory
12-18 09:04:05.860 E/cSploitClient(22782): start_command: not authenticated
12-18 09:04:05.870 E/CSPLOITMainActivity$7.run: cannot start commands
12-18 09:04:05.900 I/Adreno-EGL(22782): <qeglDrvAPI_eglInitialize:410>: EGL 1.4 QUALCOMM build: AU_LINUX_ANDROID_LNX.LA.3.5.2.2_RB1.04.04.04.087.028_msm8974_LNX.LA.3.5.2.2_RB1__release_AU ()
12-18 09:04:05.900 I/Adreno-EGL(22782): OpenGL ES Shader Compiler Version: E031.24.00.15
12-18 09:04:05.900 I/Adreno-EGL(22782): Build Date: 07/31/14 Thu
12-18 09:04:05.900 I/Adreno-EGL(22782): Local Branch:
12-18 09:04:05.900 I/Adreno-EGL(22782): Remote Branch: quic/LNX.LA.3.5.2.2_rb1
12-18 09:04:05.900 I/Adreno-EGL(22782): Local Patches: NONE
12-18 09:04:05.900 I/Adreno-EGL(22782): Reconstruct Branch: AU_LINUX_ANDROID_LNX.LA.3.5.2.2_RB1.04.04.04.087.028 + NOTHING
12-18 09:04:05.940 D/OpenGLRenderer(22782): Enabling debug mode 0
12-18 09:04:06.060 D/AndroidRuntime(22846):
12-18 09:04:06.060 D/AndroidRuntime(22846): >>>>>> AndroidRuntime START com.android.internal.os.RuntimeInit <<<<<<
12-18 09:04:06.060 D/AndroidRuntime(22846): CheckJNI is OFF
12-18 09:04:06.060 E/art (22846): Unrecognized option -XX:mainThreadStackSize=24K
12-18 09:04:06.080 I/art (22782): GcCauseBackground sticky partial concurrent mark sweep GC freed 18221(559KB) AllocSpace objects, 0(0B) LOS objects, 9% free, 7MB/8MB, paused 8.314ms total 36.625ms
12-18 09:04:06.090 W/art (22846): Failed to find ELF magic in /system/framework/am.odex: dey
12-18 09:04:06.130 W/art (22846): JNI RegisterNativeMethods: attempt to register 0 native methods for android.content.res.Configuration
12-18 09:04:06.140 D/AndroidRuntime(22846): Calling main entry com.android.commands.am.Am
12-18 09:04:06.170 E/cSploitClient(22782): connect_unix: connect: No such file or directory
12-18 09:04:06.170 E/CSPLOITMainActivity$2.run: cannot connect to core daemon
12-18 09:04:06.200 D/AndroidRuntime(22846): Shutting down VM
12-18 09:04:06.220 D/CSPLOITnet.NetworkDiscovery$NBResolver.run: 192.168.2.110 was resolved to NIELS-LAPTOP
12-18 09:04:06.260 I/ActivityManager(1496): Displayed org.csploit.android/.MainActivity: +813ms
12-18 09:04:06.260 I/Timeline(1496): Timeline: Activity_windows_visible id: ActivityRecord{65e7ffa0 u0 org.csploit.android/.MainActivity t54} time:28839161
12-18 09:04:06.270 D/CSPLOITnet.NetworkDiscovery$ArpReader.run: 192.168.2.110 was DNS resolved to niels-laptop.home
12-18 09:04:06.390 I/Timeline(22782): Timeline: Activity_idle id: android.os.BinderProxy@64b71170 time:28839295
12-18 09:04:06.410 D/CSPLOITnet.NetworkDiscovery$ArpReader.run: 192.168.2.107 was DNS resolved to android-a5ae517fa4e3a362.home
12-18 09:04:06.530 D/CSPLOITcore.UpdateService.isUpdateAvailable: localVersion = 1.2.3
12-18 09:04:06.530 D/CSPLOITcore.UpdateService.isUpdateAvailable: remoteVersion = 1.2.3
12-18 09:04:06.610 D/CSPLOITnet.NetworkDiscovery$NBResolver.run: 192.168.2.95 was resolved to NAS
12-18 09:04:07.040 D/CSPLOITcore.System.readFirstLine: /data/data/org.csploit.android/files/msf/VERSION: open failed: ENOENT (No such file or directory)
12-18 09:04:07.040 D/CSPLOITnet.GitHubParser.getBranch: no branch has been selected yet
12-18 09:04:07.210 D/CSPLOITcore.UpdateChecker.run: Service stopped.
12-18 09:04:09.980 W/HandlerScheduledExecuto(2308): Task does not implement UiTask. Consider using NamedUiRunnable for eww@64c26498
12-18 09:04:10.010 I/art (1496): WaitForConcurrentGcToComplete blocked for 33.294999ms
12-18 09:04:10.030 I/art (1496): Heap trim of managed (duration=18.412240ms, advised=4MB) and native (duration=2.824167ms, advised=4MB) heaps. Managed heap utilization of 66%.
12-18 09:04:10.150 I/Timeline(2308): Timeline: Activity_idle id: android.os.BinderProxy@64b72840 time:28843057
12-18 09:04:10.220 I/art (22782): GcCauseBackground sticky partial concurrent mark sweep GC freed 48191(2MB) AllocSpace objects, 8(150KB) LOS objects, 18% free, 10MB/12MB, paused 7.078ms total 78.347ms
12-18 09:04:10.570 I/Timeline(1496): Timeline: Activity_windows_visible id: ActivityRecord{65848048 u0 com.google.android.googlequicksearchbox/com.google.android.launcher.GEL t1} time:28843479
12-18 09:04:11.130 D/CSPLOITcore.System.setForwarding: Setting ipv4 forwarding to false
12-18 09:04:11.140 E/cSploitClient(22782): start_command: not authenticated
12-18 09:04:11.140 E/CSPLOITcore.System.setForwarding: cannot start commands
12-18 09:04:11.140 D/CSPLOITcore.System.clean: Releasing locks.
12-18 09:04:11.200 D/CSPLOITnet.NetworkDiscovery.run: Network monitor stopped.
12-18 09:04:13.170 I/ActivityManager(1496): START u0 {act=com.android.systemui.recent.action.TOGGLE_RECENTS flg=0x10800000 cmp=com.android.systemui/.recent.RecentsActivity} from pid 2071
12-18 09:04:13.250 W/InputMethodManagerService(1496): Window already focused, ignoring focus gain of: com.android.internal.view.IInputMethodClient$Stub$Proxy@65f97498 attribute=null, token = android.os.BinderProxy@65c200e8
12-18 09:04:13.260 W/HandlerScheduledExecuto(2308): Task does not implement UiTask. Consider using NamedUiRunnable for eww@64c26498
12-18 09:04:13.260 I/Timeline(2308): Timeline: Activity_idle id: android.os.BinderProxy@64b72840 time:28846164
12-18 09:04:15.240 I/ActivityManager(1496): START u0 {act=com.android.systemui.recent.action.TOGGLE_RECENTS flg=0x10800000 cmp=com.android.systemui/.recent.RecentsActivity} from pid 2071
12-18 09:04:15.360 I/ActivityManager(1496): Displayed com.android.systemui/.recent.RecentsActivity: +94ms
12-18 09:04:15.390 I/Timeline(2071): Timeline: Activity_idle id: android.os.BinderProxy@650758b0 time:28848299
12-18 09:04:15.430 I/art (2201): Heap trim of managed (duration=7.760990ms, advised=784KB) and native (duration=6.017708ms, advised=672KB) heaps. Managed heap utilization of 48%.
12-18 09:04:15.640 I/Timeline(1496): Timeline: Activity_windows_visible id: ActivityRecord{6631a2a0 u0 com.android.systemui/.recent.RecentsActivity t55} time:28848548
12-18 09:04:15.910 I/art (5033): GcCauseExplicit concurrent mark sweep GC freed 1611(80KB) AllocSpace objects, 0(0B) LOS objects, 8% free, 8MB/9MB, paused 5.568ms total 74.835ms
12-18 09:04:15.970 W/IInputConnectionWrapper(5033): showStatusIcon on inactive InputConnection
12-18 09:04:15.970 I/Timeline(5033): Timeline: Activity_idle id: android.os.BinderProxy@64c02078 time:28848878
12-18 09:04:16.170 W/ProcessCpuTracker(1496): Skipping unknown process pid 23197
12-18 09:04:16.170 W/ProcessCpuTracker(1496): Skipping unknown process pid 23204
12-18 09:04:16.170 W/ProcessCpuTracker(1496): Skipping unknown process pid 23217
12-18 09:04:16.170 W/ProcessCpuTracker(1496): Skipping unknown process pid 23222
12-18 09:04:16.170 W/ProcessCpuTracker(1496): Skipping unknown process pid 23224
12-18 09:04:16.280 D/SettingsProvider(1496): User 0 external modification to /data/data/com.android.providers.settings/databases/settings.db; event=8
12-18 09:04:16.280 D/SettingsProvider(1496): User 0 updating our caches for /data/data/com.android.providers.settings/databases/settings.db
12-18 09:04:16.300 I/Timeline(1496): Timeline: Activity_windows_visible id: ActivityRecord{65c18348 u0 com.af.synapse/.MainActivity t52} time:28849202
12-18 09:04:17.950 I/ActivityManager(1496): START u0 {act=com.android.systemui.recent.action.TOGGLE_RECENTS flg=0x10800000 cmp=com.android.systemui/.recent.RecentsActivity} from pid 2071
12-18 09:04:18.050 I/art (2071): Heap trim of managed (duration=2.610208ms, advised=2MB) and native (duration=2.206302ms, advised=724KB) heaps. Managed heap utilization of 37%.
12-18 09:04:18.080 I/Timeline(2071): Timeline: Activity_idle id: android.os.BinderProxy@650758b0 time:28850986
12-18 09:04:18.090 I/Timeline(1496): Timeline: Activity_windows_visible id: ActivityRecord{6631a2a0 u0 com.android.systemui/.recent.RecentsActivity t55} time:28850992
12-18 09:04:19.340 V/PhoneStatusBar(2071): setLightsOn(true)
12-18 09:04:19.380 I/art (1496): Heap trim of managed (duration=22.614062ms, advised=4MB) and native (duration=2.486720ms, advised=3MB) heaps. Managed heap utilization of 66%.
12-18 09:04:19.460 V/PhoneStatusBar(2071): setLightsOn(true)
12-18 09:04:19.500 I/Timeline(20912): Timeline: Activity_idle id: android.os.BinderProxy@64c866f0 time:28852408
12-18 09:04:19.720 I/Timeline(1496): Timeline: Activity_windows_visible id: ActivityRecord{65d4dcd0 u0 com.nolanlawson.logcat/.LogcatActivity t53} time:28852628

@bruvv
Copy link
Author

bruvv commented Dec 18, 2014

Csploit.log is empty.

@tux-mind
Copy link
Member

@nivong no useful info in your logcat.
check if /data/data/org.csploit.android/files/cSploitd.log exists, if yest post it ( pastebin or any extarnal paste tool preferred )

thanks for your time 😊

@bruvv
Copy link
Author

bruvv commented Dec 18, 2014

@tux-mind like I commented, it's empty ;)

@tux-mind
Copy link
Member

@nivong did you tried to uninstall and reinstall the app ?

due to some critical changes the app cannot been updated, it must reinstalled to update it's core.

@Mephistophiles
Copy link

I have the same problem. Here is my log.
http://pastebin.com/TuvjQUrF - catlog
http://pastebin.com/1eb9XmxL - cSploit log

@tux-mind
Copy link
Member

@Mephistophiles thanks for the log.
it seems that ettercap is not installed ( or it cannot locate some core library, like libcrypto.so ).

can you do the following from an adb shell:

cd /data/data/org.csploit.android/files/tools/ettercap
./ettercap --help

thanks in advance for your time 😊

@Mephistophiles
Copy link

@tux-mind
Copy link
Member

I found the bug reading carefully the execvp(3) man page.

...
The execlp(), execvp(), and execvpe() functions duplicate the actions of the  shell  in  searching
       for an executable file if the specified filename does not contain a slash (/) character.  The file
       is sought in the colon-separated list of directory pathnames specified  in  the  PATH  environment
       variable.
...

the other commands have a slash in their argv[0], while ettercap does not.
using ./ettercap instead of ettercap solve the problem.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants