Problem installing Super SU on HTC One M8 - SuperSU

I've successfully unlocked the bootloader of my HTC One M8 (Android 6.0) and installed TWRP 3.4.0.1 but I am unable to install any version of SuperSU by flashing the zip through TWRP
Here is a copy of the TWRP log illustrating problems when I tried to install Super SU via TWRP
(I also tried v2.78, v2.79, v2.82 with similar outcomes)
I:Set page: 'install'
I:Set page: 'flash_confirm'
I:Set page: 'flash_zip'
Iperation_start: 'Flashing'
Installing zip file '/external_sd/UPDATE-SuperSU-v2.76-20160630161323.zip'
Checking for Digest file...
Unmounting System...
I:Update binary zip
Verifying package compatibility...
Package doesn't contain compatibility.zip entry
I:Extracting updater binary 'META-INF/com/google/android/update-binary'
I:Zip does not contain SELinux file_contexts file in its root.
I:Legacy property environment not used in updater.
*****************
SuperSU installer
*****************
- Mounting /system, /data and rootfs
mount: '/dev/block/mmcblk0p47'->'/data': Device or resource busy
mount: '/' not in /proc/mounts
2+0 records in
2+0 records out
2 bytes transferred in 0.001 secs (2000 bytes/sec)
3+0 records in
3+0 records out
3 bytes transferred in 0.001 secs (3000 bytes/sec)
12+0 records in
12+0 records out
12 bytes transferred in 0.001 secs (12000 bytes/sec)
3+0 records in
3+0 records out
3 bytes transferred in 0.001 secs (3000 bytes/sec)
/tmp/updater[841]: /system/toolbox: not found
- Extracting files
Archive: /external_sd/UPDATE-SuperSU-v2.76-20160630161323.zip
inflating: common/chromeos/kernel_data_key.vbprivk
inflating: mips/supolicy
inflating: armv7/supolicy
inflating: arm/chattr.pie
inflating: common/chromeos/kernel.bootloader
inflating: x86/supolicy
inflating: arm64/libsupol.so
inflating: mips/sukernel
inflating: armv7/sukernel
inflating: common/chromeos/kernel.keyblock
inflating: mips64/libsupol.so
inflating: mips/libsupol.so
inflating: mips64/su
inflating: x86/chattr
inflating: x86/sukernel
inflating: x86/su
inflating: common/init.supersu.rc
inflating: common/99SuperSUDaemon
inflating: META-INF/MANIFEST.MF
inflating: arm64/chromeos/futility
inflating: x64/libsupol.so
inflating: META-INF/CERT.RSA
inflating: x86/chattr.pie
inflating: common/Superuser.apk
inflating: META-INF/com/google/android/update-binary
inflating: x86/su.pie
inflating: common/chromeos/kernel.config
inflating: META-INF/CERT.SF
inflating: common/000000deepsleep
inflating: mips64/supolicy
inflating: x64/supolicy
inflating: arm/libsupol.so
inflating: armv7/libsupol.so
inflating: mips/su
inflating: armv7/su
inflating: mips64/sukernel
inflating: x64/sukernel
inflating: x64/su
inflating: META-INF/com/google/android/updater-script
inflating: mips/chattr.pie
inflating: armv7/chattr.pie
inflating: arm/supolicy
inflating: arm/chattr
inflating: arm64/supolicy
inflating: x86/libsupol.so
inflating: arm/sukernel
inflating: arm64/sukernel
inflating: arm/su
inflating: common/launch_daemonsu.sh
inflating: arm64/su
inflating: common/install-recovery.sh
inflating: common/file_contexts_image
CANNOT LINK EXECUTABLE: cannot locate symbol "__aeabi_memcpy" referenced by "/sbin/liblog_htc_sbin.so"...
page record for 0xafcb402c was not found (block_size=16)
- Detecting system compatibility
CANNOT LINK EXECUTABLE: cannot locate symbol "__aeabi_memcpy" referenced by "/sbin/liblog_htc_sbin.so"...
page record for 0xac32802c was not found (block_size=16)
- System-less mode, boot image support required
- Creating image
CANNOT LINK EXECUTABLE: cannot locate symbol "__aeabi_memcpy" referenced by "/sbin/liblog_htc_sbin.so"...
page record for 0xb0b1903c was not found (block_size=16)
- Mounting image
mknod: /dev/block/loop0: File exists
I:Found no matching fstab entry for uevent device '/devices/virtual/block/loop0' - change
- Creating paths
mkdir: '/su/bin': File exists
mkdir: '/su/xbin': File exists
mkdir: '/su/lib': File exists
mkdir: '/su/etc': File exists
mkdir: '/su/su.d': File exists
- Removing old files
- Placing files
rm: /su/bin/su: No such file or directory
rm: /su/bin/daemonsu: No such file or directory
rm: /su/bin/supolicy_wrapped: No such file or directory
rm: /su/lib/libsupol.so: No such file or directory
rm: /su/bin/sukernel: No such file or directory
******************
Boot image patcher
******************
- Finding boot image
--- Boot image: /dev/block/mmcblk0p42
CANNOT LINK EXECUTABLE: cannot locate symbol "__aeabi_memcpy" referenced by "/sbin/liblog_htc_sbin.so"...
page record for 0xb5ae203c was not found (block_size=16)
- Extracting ramdisk
CANNOT LINK EXECUTABLE: cannot locate symbol "__aeabi_memcpy" referenced by "/sbin/liblog_htc_sbin.so"...
page record for 0xa82b103c was not found (block_size=16)
--- Failure, aborting
losetup: /dev/block/loop0: No such device or address
I:Found no matching fstab entry for uevent device '/devices/virtual/block/loop0' - change
*************************
IMPORTANT NOTICES
*************************
First reboot may take a
few minutes. It can also
loop a few times. Do not
interrupt the process!
*************************
- Unmounting /system
- Done !

Related

[Q] What files should be in a rom.zip file?

ETA: I tried to search but it was unavailable I'm starting to suspect the root cause of my issue here is a corrupted file. I am unable to easily unzip the PN07IMG_M7_UL_JB_50_BrightstarUS_WWE_1.29.1540.3.zip file I got off HTCdev to see what files are in it. Should I be able to unzip the file without issues?
When I try to unzip it on Windows 7 I get "the compressed (zipped) Folder <path\filename>' is invalid."
When I try by clicking on mac I get .cpgz file on my mac, but when I try in the terminal I get:
<path username> $ unzip path/PN07IMG_M7_UL_JB_50_BrightstarUS_WWE_1.29.1540.3.zip
Archive: <path>/PN07IMG_M7_UL_JB_50_BrightstarUS_WWE_1.29.1540.3.zip
warning [<path>/PN07IMG_M7_UL_JB_50_BrightstarUS_WWE_1.29.1540.3.zip]: 384 extra bytes at beginning or within zipfile
(attempting to process anyway)
file #1: bad zipfile offset (local header sig): 384
(attempting to re-compensate)
file #1: bad zipfile offset (local header sig): 384
file #2: bad zipfile offset (local header sig): 514439
(attempting to re-compensate)
file #2: bad zipfile offset (local header sig): 514439
file #3: bad zipfile offset (local header sig): 514998
inflating: rcdata.img
inflating: boot_signed.img
inflating: recovery_signed.img
error: invalid compressed data to inflate
inflating: system.img
error: invalid compressed data to inflate
inflating: splash1.nb0
inflating: dzdata_16g.img
inflating: dzdata_32g.img
error: invalid compressed data to inflate
inflating: dzdata_16g.hdr
inflating: sbl2.img
inflating: sbl3.img
inflating: tz.img
inflating: rpm.img
inflating: adsp.img
error: invalid compressed data to inflate
inflating: pg2fs_spcustom.img
inflating: ramdisk.img
inflating: tp_SYN3202.img
inflating: sbl1-1.img
inflating: sbl1-2.img
inflating: sbl1-3.img
inflating: dzdata_64g.hdr
inflating: dzdata_32g.hdr
inflating: dzdata_64g.img
Click to expand...
Click to collapse
Are these all the files that should be in a rom zip file?

[FLASHCAST ROM] [V1.1 - 11/29/13] PwnedCast ROM - Based on 13300

This ROM has been replaced with Eureka-ROM, which is available at http://forum.xda-developers.com/showthread.php?t=2578653
I am happy to announce my new ROM, PwnedCast ROM! This is a replacement for my current rooted ROM.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Now with 500+ installs and counting!
This ROM is based on the 13300 stock image, but with some cool features! The big improvement is the addition of my OTA update system called PwnedCast OTA.
This means that if I ever release an update for this ROM, your ChomeCast will automatically download and install the update!
For more info, click the link under Features. Don't worry though, ill still post updated links in this thread.
Features:
Root SSH/Telnet Access
Uses DHCP DNS Servers
Google OTA's Disabled
Custom Boot Image
PwnedCast OTA Update Engine! Read more Here: http://ota.team-eureka.com/
PwnedCast Recovery Image, which is based on FlashCast V1.1.1
KyoCast Built In!
More to Come?...
Install Instructions:
Setup and Install FlashCast V1.1.1 on a Jump Drive: http://forum.xda-developers.com/showthread.php?t=2452838
Rename the Zip to eureka_image.zip, and place in the root folder on the FlashCast Jump Drive.
Plug the FlashCast jump drive into the ChromeCast, hold the button, and plug in power to boot the device.
NOTE: If you try flashing with FlashCast V1.0, the install will fail.
Flashing will take 6~ minutes, be patient! As long as the ChromeCast LED is white, it is flashing.
Once done, the device will reboot.
Enjoy!
Downloads:
All New Versions: http://forum.xda-developers.com/showthread.php?t=2578653
1.1 [11/29/13]: http://pdl.team-eureka.com/ota/13300.010.zip
Thanks To:
death2all110
ften
GTVHacker
tchebb - Without him, this would have not been possible.
tvall
Anyone Else I Missed!
Changelog:
1.1 [11/29/13] - Updated recovery to flashcast 1.1.1, PwnedCast-OTA updated, KyoCast built in
1.0 [11/6/13] - Initial Release
Extras/Mods:
Disable PwnedCast OTA: http://pdl.team-eureka.com/ota/disable/eureka_image.zip
Re-Enable PwnedCast OTA: http://pdl.team-eureka.com/ota/enable/eureka_image.zip
Change DNS to UnLocator: http://forum.xda-developers.com/showthread.php?t=2455888
Source:
PwnedCast-ROM: https://github.com/team-eureka/PwnedCast-ROM
Thank you for this^^^^^^:thumbup:
Sent from my SAMSUNG-SGH-I317 using Tapatalk
Awesome man that OTA is great effort. Kudos
Does this work on the ones with the latest firmware?
Sent from the TermiNOTEr 2!
borijess said:
Does this work on the ones with the latest firmware?
Sent from the TermiNOTEr 2!
Click to expand...
Click to collapse
This ROM requires a exploitable device that can run FlashCast.
Nice work. The OTA updating works like a charm and it's nice to know that my 'casts will just update themselves when and as needed.
In light of Kynonz' release, perhaps a partnership is in order? Combine your OTA update capabilities with his custom whitelist feature. That would be a truly awesome ROM.
Croptop said:
Nice work. The OTA updating works like a charm and it's nice to know that my 'casts will just update themselves when and as needed.
In light of Kynonz' release, perhaps a partnership is in order? Combine your OTA update capabilities with his custom whitelist feature. That would be a truly awesome ROM.
Click to expand...
Click to collapse
Let's just say things are looking good ATM. But until anything happens, you can flash his mod over my firmware without any issues.
ddggttff3 said:
Let's just say things are looking good ATM. But until anything happens, you can flash his mod over my firmware without any issues.
Click to expand...
Click to collapse
Am I understanding you correctly? If I flash Kyonz's mod onto your OTA ROM, I'll get his custom whitelist AND still keep your OTA updates? If so, nice!
Croptop said:
Am I understanding you correctly? If I flash Kyonz's mod onto your OTA ROM, I'll get his custom whitelist AND still keep your OTA updates? If so, nice!
Click to expand...
Click to collapse
You will still get OTA updates, but an OTA would remove the feature, unless I have said mod added in my next release.
But for the good news, I don't have any new OTA's in the works atm, so there should be no need to worry
Actually, it might be a good idea for me to code-up a MOD saving feature, so mods could be auto downloaded/updated during the OTA process as well... guess I have some researching to do.
Tried flashing your new release. But it keeps failing for what I don't know? Did everything I did the first time.
It shouldn't be a problem just flashing this over the other Rom right?
Oooooh I did change to FlashCast 1.1 which worked perfect!:good:
But when I put the new Rom on the jumpdrive, then rename it like you said.
After powering on the device holding the button til the white light. Soon as I let go it turns red
this is what the log gave me:
Reading recovery parameters
Looking for mods on /dev/sda1
Resetting crash counter and boot mode
Clearing OTAs
Copying /usr/share/flasher/remove-ota to /tmp/tmp.GdFCjI
Flashing mod at /tmp/tmp.GdFCjI
Mounting cache (mtd4) at /tmp/tmp.kRpbiB
Removing temp-ota.zip and ota.zip from cache partition (/tmp/tmp.kRpbiB)
Unmounting /tmp/tmp.kRpbiB
Removing temporary mod directory /tmp/tmp.GdFCjI
Mounting /dev/sda1 to /tmp/tmp.zrwptd
Opened log file /tmp/tmp.zrwptd/flashcast-logs/flashcast-3.log
SETUP FAILED: No images found on /dev/sda1
Unmounting and removing /tmp/tmp.zrwptd
Bajanman said:
Tried flashing your new release. But it keeps failing for what I don't know? Did everything I did the first time.
It shouldn't be a problem just flashing this over the other Rom right?
Oooooh I did change to FlashCast 1.1 which worked perfect!:good:
But when I put the new Rom on the jumpdrive, then rename it like you said.
After powering on the device holding the button til the white light. Soon as I let go it turns red
this is what the log gave me:
Reading recovery parameters
Looking for mods on /dev/sda1
Resetting crash counter and boot mode
Clearing OTAs
Copying /usr/share/flasher/remove-ota to /tmp/tmp.GdFCjI
Flashing mod at /tmp/tmp.GdFCjI
Mounting cache (mtd4) at /tmp/tmp.kRpbiB
Removing temp-ota.zip and ota.zip from cache partition (/tmp/tmp.kRpbiB)
Unmounting /tmp/tmp.kRpbiB
Removing temporary mod directory /tmp/tmp.GdFCjI
Mounting /dev/sda1 to /tmp/tmp.zrwptd
Opened log file /tmp/tmp.zrwptd/flashcast-logs/flashcast-3.log
SETUP FAILED: No images found on /dev/sda1
Unmounting and removing /tmp/tmp.zrwptd
Click to expand...
Click to collapse
did you rename the ROM zip to eureka_image.zip, and place it on the root directory of the flashcast jump drive?
ddggttff3 said:
did you rename the ROM zip to eureka_image.zip, and place it on the root directory of the flashcast jump drive?
Click to expand...
Click to collapse
Yes. Have re-downloaded it about 4 times thinking I had bad downloads.
Going to keep trying
Sent from my SAMSUNG-SGH-I317 using Tapatalk
I am having problem too. I installed FlastCast V1.1 and it went perfect, the device rebooted. Then during the process of PwnedCast ROM the white led is flashing flashing and flashing. I waited for like good 20mins, the device didnt reboot and led kept flashing.
After disconnecting power, the here is my log file (link below). It seems everything went OK but the device just doesnt reboot.
https://dl.dropboxusercontent.com/u/9966680/flashcast-1.log
Now when i start chromecast in normal mode, the white led is still flashing. I am basically stuck.Please HELP!!!
NOTE: During the whole process home WiFi was off just in case.
Also i made minor modification to where i disabled OTA in image.sh file by removing the if-Then block.
paracha3 said:
I am having problem too. I installed FlastCast V1.1 and it went perfect, the device rebooted. Then during the process of PwnedCast ROM the white led is flashing flashing and flashing. I waited for like good 20mins, the device didnt reboot and led kept flashing.
After disconnecting power, the here is my log file (link below). It seems everything went OK but the device just doesnt reboot.
https://dl.dropboxusercontent.com/u/9966680/flashcast-1.log
Now when i start chromecast in normal mode, the white led is still flashing. I am basically stuck.Please HELP!!!
NOTE: During the whole process home WiFi was off just in case.
Click to expand...
Click to collapse
Similar to you. But if I just BOOT up my Chromecast it'll boot to the pwned screen with the older Rom.
Just wondering why I can't get the new one to load!
EDIT: just went looked at the old eureka image vs the new one. Here's what I GOT:
Sent from my SAMSUNG-SGH-I317 using Tapatalk
paracha3 said:
I am having problem too. I installed FlastCast V1.1 and it went perfect, the device rebooted. Then during the process of PwnedCast ROM the white led is flashing flashing and flashing. I waited for like good 20mins, the device didnt reboot and led kept flashing.
After disconnecting power, the here is my log file (link below). It seems everything went OK but the device just doesnt reboot.
https://dl.dropboxusercontent.com/u/9966680/flashcast-1.log
Now when i start chromecast in normal mode, the white led is still flashing. I am basically stuck.Please HELP!!!
NOTE: During the whole process home WiFi was off just in case.
Also i made minor modification to where i disabled OTA in image.sh file by removing the if-Then block.
Click to expand...
Click to collapse
if the white LED is flashing, that normally means the device is booting the system partition. Strange though, the log shows the flash went perfect. The modification to the flash file should not cause an issue tho.
Bajanman said:
Similar to you. But if I just BOOT up my Chromecast it'll boot to the pwned screen with the older Rom.
Just wondering why I can't get the new one to load!
Sent from my SAMSUNG-SGH-I317 using Tapatalk
Click to expand...
Click to collapse
The log you posted earlier showed that flashcast was not able to find the zip file, so make sure its named correctly, and you don't have your file extension name hidden. This can cause you to name it eureka_image.zip.zip http://windows.microsoft.com/en-us/...#show-hide-file-name-extensions=windows-vista
ddggttff3 said:
if the white LED is flashing, that normally means the device is booting the system partition. Strange though, the log shows the flash went perfect. The modification to the flash file should not cause an issue tho.
The log you posted earlier showed that flashcast was not able to find the zip file, so make sure its named correctly, and you don't have your file extension name hidden. This can cause you to name it eureka_image.zip.zip http://windows.microsoft.com/en-us/...#show-hide-file-name-extensions=windows-vista
Click to expand...
Click to collapse
This^^^^^^^^^^ HERE fixed it. Soon as I did the folder options. Plugged it back up worked first try:thumbup:. Finishing as I write this NOW....
Thank you thank you...
Sent from my SAMSUNG-SGH-I317 using Tapatalk
Bajanman said:
Similar to you. But if I just BOOT up my Chromecast it'll boot to the pwned screen with the older Rom.
Just wondering why I can't get the new one to load!
EDIT: just went looked at the old eureka image vs the new one. Here's what I GOT:
Sent from my SAMSUNG-SGH-I317 using Tapatalk
Click to expand...
Click to collapse
That is because I moved the mod files into the system.img file to make the ROM smaller, and it helps speed up the flashing process. If you want to see the files I have added, the source page for this ROM has all the raw files.
ddggttff3 said:
if the white LED is flashing, that normally means the device is booting the system partition. Strange though, the log shows the flash went perfect. The modification to the flash file should not cause an issue tho.
Click to expand...
Click to collapse
Redid the FlastCast V1.1 from start and this time it worked fine. I dont know what was wrong.
ddggttff3 said:
That is because I moved the mod files into the system.img file to make the ROM smaller, and it helps speed up the flashing process. If you want to see the files I have added, the source page for this ROM has all the raw files.
Click to expand...
Click to collapse
Oh ok I understand. And Thanks. I had just thought that was my problem with flashing. But you fixed it for me.
Thank you again @ddggttff3
Sent from my SAMSUNG-SGH-I317 using Tapatalk
Hi Mr. ddggttff3,
I am having the same issues reported earlier...
And I am pretty sure about the filename of the file, and that the version installed earlier was Flashcast 1.1.
Here you can check the first log file indicating a successful flash of the V1.1:
Code:
Clearing OTAs
Changing directory to /usr/share/flasher/remove-ota
Mounting cache (mtd4) at /tmp/tmp.i7zvxd
Removing temp-ota.zip and ota.zip from cache partition (/tmp/tmp.i7zvxd)
Unmounting /tmp/tmp.i7zvxd
Mounting /dev/sda1 to /tmp/tmp.MpeoDU
Opened log file /tmp/tmp.MpeoDU/flashcast-1.log
Found eureka_image.zip, using
Archive: /tmp/tmp.MpeoDU/eureka_image.zip
inflating: boot.img
creating: files/
inflating: files/adbd
inflating: files/busybox
inflating: files/clear_crash_counter
inflating: files/update_engine
inflating: imager.sh
creating: images/
inflating: images/logo1080p_10fps0000.png
inflating: images/logo1080p_10fps0001.png
inflating: images/logo1080p_10fps0002.png
inflating: images/logo1080p_10fps0003.png
inflating: images/logo1080p_10fps0004.png
inflating: images/logo1080p_10fps0005.png
inflating: images/logo1080p_10fps0006.png
inflating: images/logo1080p_10fps0007.png
inflating: images/logo1080p_10fps0008.png
inflating: images/logo1080p_10fps0009.png
inflating: images/logo1080p_10fps0010.png
inflating: images/logo1080p_10fps0011.png
inflating: images/logo1080p_10fps0012.png
inflating: images/logo1080p_10fps0013.png
inflating: images/logo1080p_10fps0014.png
inflating: images/logo1080p_10fps0015.png
inflating: images/logo1080p_10fps0016.png
inflating: images/logo1080p_10fps0017.png
inflating: images/logo1080p_10fps0018.png
inflating: images/logo1080p_10fps0019.png
inflating: images/logo1080p_10fps0020.png
inflating: images/logo1080p_10fps0021.png
inflating: images/logo1080p_10fps0022.png
inflating: images/logo1080p_10fps0023.png
inflating: images/logo1080p_10fps0024.png
inflating: images/logo1080p_10fps0025.png
inflating: images/logo1080p_10fps0026.png
inflating: images/logo1080p_10fps0027.png
inflating: images/logo1080p_10fps0028.png
inflating: images/logo1080p_10fps0029.png
inflating: images/logo1080p_10fps0030.png
inflating: images/logo1080p_10fps0031.png
inflating: images/logo1080p_10fps0032.png
inflating: images/logo1080p_10fps0033.png
inflating: images/logo1080p_10fps0034.png
inflating: images/logo1080p_10fps0035.png
inflating: images/logo1080p_10fps0036.png
inflating: images/logo1080p_10fps0037.png
inflating: images/logo1080p_10fps0038.png
inflating: images/logo1080p_10fps0039.png
inflating: images/logo1080p_10fps0040.png
inflating: images/logo1080p_10fps0041.png
inflating: images/logo1080p_10fps0042.png
inflating: images/logo1080p_10fps0043.png
inflating: images/logo1080p_10fps0044.png
inflating: images/logo1080p_10fps0045.png
inflating: images/logo1080p_10fps0046.png
inflating: images/logo1080p_10fps0047.png
inflating: images/logo1080p_10fps0048.png
inflating: images/logo1080p_10fps0049.png
inflating: images/logo1080p_10fps0050.png
inflating: images/logo1080p_10fps0051.png
inflating: images/logo1080p_10fps0052.png
inflating: images/logo1080p_10fps0053.png
inflating: images/logo1080p_10fps0054.png
inflating: images/logo1080p_10fps0055.png
inflating: images/logo1080p_10fps0056.png
inflating: images/logo1080p_10fps0057.png
inflating: images/logo1080p_10fps0058.png
inflating: images/logo1080p_10fps0059.png
inflating: images/logo480p_10fps0000.png
inflating: images/logo480p_10fps0001.png
inflating: images/logo480p_10fps0002.png
inflating: images/logo480p_10fps0003.png
inflating: images/logo480p_10fps0004.png
inflating: images/logo480p_10fps0005.png
inflating: images/logo480p_10fps0006.png
inflating: images/logo480p_10fps0007.png
inflating: images/logo480p_10fps0008.png
inflating: images/logo480p_10fps0009.png
inflating: images/logo480p_10fps0010.png
inflating: images/logo480p_10fps0011.png
inflating: images/logo480p_10fps0012.png
inflating: images/logo480p_10fps0013.png
inflating: images/logo480p_10fps0014.png
inflating: images/logo480p_10fps0015.png
inflating: images/logo480p_10fps0016.png
inflating: images/logo480p_10fps0017.png
inflating: images/logo480p_10fps0018.png
inflating: images/logo480p_10fps0019.png
inflating: images/logo480p_10fps0020.png
inflating: images/logo480p_10fps0021.png
inflating: images/logo480p_10fps0022.png
inflating: images/logo480p_10fps0023.png
inflating: images/logo480p_10fps0024.png
inflating: images/logo480p_10fps0025.png
inflating: images/logo480p_10fps0026.png
inflating: images/logo480p_10fps0027.png
inflating: images/logo480p_10fps0028.png
inflating: images/logo480p_10fps0029.png
inflating: images/logo480p_10fps0030.png
inflating: images/logo480p_10fps0031.png
inflating: images/logo480p_10fps0032.png
inflating: images/logo480p_10fps0033.png
inflating: images/logo480p_10fps0034.png
inflating: images/logo480p_10fps0035.png
inflating: images/logo480p_10fps0036.png
inflating: images/logo480p_10fps0037.png
inflating: images/logo480p_10fps0038.png
inflating: images/logo480p_10fps0039.png
inflating: images/logo480p_10fps0040.png
inflating: images/logo480p_10fps0041.png
inflating: images/logo480p_10fps0042.png
inflating: images/logo480p_10fps0043.png
inflating: images/logo480p_10fps0044.png
inflating: images/logo480p_10fps0045.png
inflating: images/logo480p_10fps0046.png
inflating: images/logo480p_10fps0047.png
inflating: images/logo480p_10fps0048.png
inflating: images/logo480p_10fps0049.png
inflating: images/logo480p_10fps0050.png
inflating: images/logo480p_10fps0051.png
inflating: images/logo480p_10fps0052.png
inflating: images/logo480p_10fps0053.png
inflating: images/logo480p_10fps0054.png
inflating: images/logo480p_10fps0055.png
inflating: images/logo480p_10fps0056.png
inflating: images/logo480p_10fps0057.png
inflating: images/logo480p_10fps0058.png
inflating: images/logo480p_10fps0059.png
inflating: images/logo720p_10fps0000.png
inflating: images/logo720p_10fps0001.png
inflating: images/logo720p_10fps0002.png
inflating: images/logo720p_10fps0003.png
inflating: images/logo720p_10fps0004.png
inflating: images/logo720p_10fps0005.png
inflating: images/logo720p_10fps0006.png
inflating: images/logo720p_10fps0007.png
inflating: images/logo720p_10fps0008.png
inflating: images/logo720p_10fps0009.png
inflating: images/logo720p_10fps0010.png
inflating: images/logo720p_10fps0011.png
inflating: images/logo720p_10fps0012.png
inflating: images/logo720p_10fps0013.png
inflating: images/logo720p_10fps0014.png
inflating: images/logo720p_10fps0015.png
inflating: images/logo720p_10fps0016.png
inflating: images/logo720p_10fps0017.png
inflating: images/logo720p_10fps0018.png
inflating: images/logo720p_10fps0019.png
inflating: images/logo720p_10fps0020.png
inflating: images/logo720p_10fps0021.png
inflating: images/logo720p_10fps0022.png
inflating: images/logo720p_10fps0023.png
inflating: images/logo720p_10fps0024.png
inflating: images/logo720p_10fps0025.png
inflating: images/logo720p_10fps0026.png
inflating: images/logo720p_10fps0027.png
inflating: images/logo720p_10fps0028.png
inflating: images/logo720p_10fps0029.png
inflating: images/logo720p_10fps0030.png
inflating: images/logo720p_10fps0031.png
inflating: images/logo720p_10fps0032.png
inflating: images/logo720p_10fps0033.png
inflating: images/logo720p_10fps0034.png
inflating: images/logo720p_10fps0035.png
inflating: images/logo720p_10fps0036.png
inflating: images/logo720p_10fps0037.png
inflating: images/logo720p_10fps0038.png
inflating: images/logo720p_10fps0039.png
inflating: images/logo720p_10fps0040.png
inflating: images/logo720p_10fps0041.png
inflating: images/logo720p_10fps0042.png
inflating: images/logo720p_10fps0043.png
inflating: images/logo720p_10fps0044.png
inflating: images/logo720p_10fps0045.png
inflating: images/logo720p_10fps0046.png
inflating: images/logo720p_10fps0047.png
inflating: images/logo720p_10fps0048.png
inflating: images/logo720p_10fps0049.png
inflating: images/logo720p_10fps0050.png
inflating: images/logo720p_10fps0051.png
inflating: images/logo720p_10fps0052.png
inflating: images/logo720p_10fps0053.png
inflating: images/logo720p_10fps0054.png
inflating: images/logo720p_10fps0055.png
inflating: images/logo720p_10fps0056.png
inflating: images/logo720p_10fps0057.png
inflating: images/logo720p_10fps0058.png
inflating: images/logo720p_10fps0059.png
inflating: system.img
Handing off control to imager.sh
Changing directory to /tmp/tmp.BZZIbw
ROOTED-13300-V1.1: Imager.sh now running.
ROOTED-13300-V1.1: Flashing Kernel...
Flashing boot.img to kernel (mtd2)
ROOTED-13300-V1.1: Flashing System...
Flashing system.img to rootfs (mtd3)
ROOTED-13300-V1.1: Deleting boot.img and system.img to free up space in /tmp so we can mount SquashFS.
ROOTED-13300-V1.1: Starting SquashFS Modification
Setting up squashfs union at /tmp/tmp.iwHWIu
ROOTED-13300-V1.1: Replacing Boot Animation
ROOTED-13300-V1.1: Disabling OTA Updates
ROOTED-13300-V1.1: Adding BusyBox Tools
ROOTED-13300-V1.1: Adding ADB
ROOTED-13300-V1.1: Enabling ADB & Telnet at system startup
ROOTED-13300-V1.1: Done editing SquashFS, Now compressing/saving.
Reflashing squashfs union at /tmp/tmp.iwHWIu
Parallel mksquashfs: Using 1 processor
Creating 4.0 filesystem on /tmp/tmp.iwHWIu/repack.sqfs, block size 131072.
Exportable Squashfs 4.0 filesystem, gzip compressed, data block size 131072
compressed data, compressed metadata, compressed fragments, no xattrs
duplicates are removed
Filesystem size 70978.88 Kbytes (69.32 Mbytes)
54.15% of uncompressed filesystem size (131068.61 Kbytes)
Inode table size 20273 bytes (19.80 Kbytes)
27.67% of uncompressed inode table size (73273 bytes)
Directory table size 19112 bytes (18.66 Kbytes)
43.26% of uncompressed directory table size (44175 bytes)
Number of duplicate files found 145
Number of inodes 1783
Number of files 1311
Number of fragments 75
Number of symbolic links 381
Number of device nodes 0
Number of fifo nodes 0
Number of socket nodes 0
Number of directories 91
Number of ids (unique uids + gids) 5
Number of uids 4
root (0)
default (1000)
unknown (1013)
unknown (1001)
Number of gids 5
root (0)
default (1000)
unknown (1013)
unknown (1001)
unknown (1006)
Flashing /tmp/tmp.iwHWIu/repack.sqfs to rootfs (mtd3)
ROOTED-13300-V1.1: Wiping data, AKA, factory reset.
Mounting userdata (mtd5) at /tmp/tmp.P1Eu5S
Clearing userdata partition (/tmp/tmp.P1Eu5S)
Unmounting /tmp/tmp.P1Eu5S
ROOTED-13300-V1.1: Script Finished!
Flashing succeeded
Rebooting
Unmounting and removing /tmp/tmp.MpeoDU
And here is the second log, telling me I am not updated:
Code:
Clearing OTAs
Changing directory to /usr/share/flasher/remove-ota
Mounting cache (mtd4) at /tmp/tmp.UZuHML
Removing temp-ota.zip and ota.zip from cache partition (/tmp/tmp.UZuHML)
Unmounting /tmp/tmp.UZuHML
Mounting /dev/sda1 to /tmp/tmp.hd1LsI
Opened log file /tmp/tmp.hd1LsI/flashcast-2.log
Found eureka_image.zip, using
Archive: /tmp/tmp.hd1LsI/eureka_image.zip
inflating: boot.img
inflating: eureka_recovery.img
inflating: imager.sh
inflating: system.img
Handing off control to imager.sh
Changing directory to /tmp/tmp.HpodAB
PwnedCast-13300-V1-R7: Imager.sh now running
IMAGER.SH FAILED: PwnedCast-13300-V1-R7: Installation Cancelled, Please Update to Flashcast Version 1.1 or Later.
Flashing failed
Unmounting and removing /tmp/tmp.hd1LsI
I have never set the chromecast up, so it may be that your script is expecting an already setup with internet Chromecast?
Thanks and cheers!!

Bootloop on Moto G 2014 after supersu install

I received a brandnew MOTO G 2014, updated all the way to the latest firmware 24.81.3_titan_retde_retdeall and unlocked bootloader. After installing supersu 2.78 from TWRP, the device will never leave the "bootloader unlocked"-Warning-Screen. In logcat, I receive lots of error messages like
Code:
12-08 09:23:17.458 2171 2171 W init : type=1400 audit(0.0:62): avc: denied { execute_no_trans } for uid=0 path="/system/xbin/daemonsu" dev="mmcblk0p36" ino=7892 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=0
In all what I found, that problem should be solved since 2015. I'm scratching my head as to what is going wrong. Tried an older version of supersu which gave the same problem. Here's a log of what I did with all version numbers:
Code:
./adb push UPDATE-SuperSU-v2.78-20160905010000.zip /sdcard/
./adb reboot bootloader
./mfastboot.exe boot twrp-3.0.2-4-titan.img
./adb shell
twrp install /sdcard/*.zip
Installing zip file '/sdcard/UPDATE-SuperSU-v2.78-20160905010000.zip'
Checking for MD5 file...
Skipping MD5 check: no MD5 file found
*****************
SuperSU installer
*****************
- Mounting /system, /data and rootfs
- Extracting files
- Detecting system compatibility
- System mode
- Disabling OTA survival
- Removing old files
- Creating space
- Placing files
- Restoring files
- Post-installation script
- Unmounting /system
- Done !
Done processing script file
./adb reboot
--- screen is still on bootloader, but after a while adb becomes available, stating:
Code:
12-08 09:23:17.458 2171 2171 W init : type=1400 audit(0.0:62): avc: denied { execute_no_trans } for uid=0 path="/system/xbin/daemonsu" dev="mmcblk0p36" ino=7892 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=0
I'm including the recovery.log, which to my opinion is fine, except for the failure of mounting /data - which I think is already mounted. Also, I tried lots of variations like installing TWRP, calling the update process from the GUI, all gave the same result.
Any clues?
Best wishes, Frank
*** recovery.log/SuperSU-Part
Code:
*****************
SuperSU installer
*****************
- Mounting /system, /data and rootfs
mount: mounting /dev/block/mmcblk0p38 on /data failed: Device or resource busy
2+0 records in
2+0 records out
2 bytes (2B) copied, 0.007579 seconds, 263B/s
3+0 records in
3+0 records out
3 bytes (3B) copied, 0.005303 seconds, 565B/s
12+0 records in
12+0 records out
12 bytes (12B) copied, 0.007254 seconds, 1.6KB/s
3+0 records in
3+0 records out
3 bytes (3B) copied, 0.027154 seconds, 110B/s
/tmp/updater: line 841: /system/toolbox: not found
- Extracting files
Archive: /sdcard/UPDATE-SuperSU-v2.78-20160905010000.zip
inflating: META-INF/MANIFEST.MF
inflating: META-INF/CERT.SF
inflating: META-INF/CERT.RSA
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
inflating: arm/chattr
inflating: arm/chattr.pie
inflating: arm/libsupol.so
inflating: arm/su
inflating: arm/sukernel
inflating: arm/supolicy
inflating: arm64/chromeos/futility
inflating: arm64/libsupol.so
inflating: arm64/su
inflating: arm64/sukernel
inflating: arm64/supolicy
inflating: armv7/chattr.pie
inflating: armv7/libsupol.so
inflating: armv7/su
inflating: armv7/sukernel
inflating: armv7/supolicy
inflating: common/000000deepsleep
inflating: common/99SuperSUDaemon
inflating: common/Superuser.apk
inflating: common/chromeos/kernel.bootloader
inflating: common/chromeos/kernel.config
inflating: common/chromeos/kernel.keyblock
inflating: common/chromeos/kernel_data_key.vbprivk
inflating: common/file_contexts_image
inflating: common/hexpatch
inflating: common/init.supersu.rc
inflating: common/install-recovery.sh
inflating: common/launch_daemonsu.sh
inflating: mips/chattr.pie
inflating: mips/libsupol.so
inflating: mips/su
inflating: mips/sukernel
inflating: mips/supolicy
inflating: mips64/libsupol.so
inflating: mips64/su
inflating: mips64/sukernel
inflating: mips64/supolicy
inflating: x64/libsupol.so
inflating: x64/su
inflating: x64/sukernel
inflating: x64/supolicy
inflating: x86/chattr
inflating: x86/chattr.pie
inflating: x86/libsupol.so
inflating: x86/su
inflating: x86/su.pie
inflating: x86/sukernel
inflating: x86/supolicy
(Android M policy compatibility mode)
supolicy v2.77 (ndk:armeabi-v7a) - Copyright (C) 2014-2016 - Chainfire
Patching policy ...
-permissive:adbd_socket=ok
-permissive:functionfs=ok
-permissive:wifip2p_service=ok
-permissive:hci_attach_exec=ok
-permissive:system_server=ok
-permissive:proc_uid_cputime_showstat=ok
-permissive:nfc=ok
-permissive:rild_debug_socket=ok
-permissive:file_type=ok
-permissive:fsck_tmpfs=ok
-permissive:exec_type=ok
-permissive:property_type=ok
-permissive:rtc_device=ok
-permissive:surfaceflinger_service=ok
-permissive:binderservicedomain=ok
-permissive:mdns_socket=ok
-permissive:network_score_service=ok
-permissive:node_type=ok
-permissive:registry_service=ok
-permissive:gatekeeperd_tmpfs=ok
-permissive:appwidget_service=ok
-permissive:platform_app=ok
-permissive:ram_device=ok
-permissive:perfprofd_data_file=ok
-permissive:port_type=ok
-permissive:rootfs=ok
-permissive:tmpfs=ok
-permissive:usbfs=ok
-permissive:bootanim_exec=ok
-permissive:gatekeeper_data_file=ok
-permissive:gpsd_tmpfs=ok
-permissive:installd_exec=ok
-permissive:su_tmpfs=ok
-permissive:processinfo_service=ok
-permissive:untrusted_app_tmpfs=ok
-permissive:cpuctl_device=ok
-permissive:launcherapps_service=ok
-permissive:country_detector_service=ok
-permissive:cgroup=ok
-permissive:drmserver_socket=ok
-permissive:ppp_device=ok
-permissive:wpa_socket=ok
-permissive:proc_net=ok
-permissive:vdc=ok
-permissive:clatd=ok
-permissive:netd=ok
-permissive:sdcardd=ok
-permissive:zygote=ok
-permissive:debuggerd=ok
-permissive:input_device=ok
-permissive:jobscheduler_service=ok
-permissive:mnt_user_file=ok
-permissive:mediaserver_tmpfs=ok
-permissive:sysfs_ksm=ok
-permissive:ueventd_tmpfs=ok
-permissive:serial_service=ok
-permissive:DockObserver_service=ok
-permissive:download_file=ok
-permissive:mtp=ok
-permissive:backup_data_file=ok
-permissive:servicemanager_tmpfs=ok
-permissive:su_exec=ok
-permissive:ppp_exec=ok
-permissive:tee_exec=ok
-permissive:vdc_exec=ok
-permissive:wpa_exec=ok
-permissive:dumpstate_tmpfs=ok
-permissive:mqueue=ok
-permissive:mtp_exec=ok
-permissive:system_ndebug_socket=ok
-permissive:tee=ok
-permissive:adb_data_file=ok
-permissive:anr_data_file=ok
-permissive:app_data_file=ok
-permissive:dhcp_data_file=ok
-permissive:logdr_socket=ok
-permissive:logdw_socket=ok
-permissive:net_data_file=ok
-permissive:shell_data_file=ok
-permissive:vold_data_file=ok
-permissive:vpn_data_file=ok
-permissive:adb_keys_file=ok
-permissive:dalvikcache_data_file=ok
-permissive:media_session_service=ok
-permissive:bluetooth_manager_service=ok
-permissive:keystore_tmpfs=ok
-permissive:fingerprint_service=ok
-permissive:kernel=ok
-permissive:servicediscovery_service=ok
-permissive:dhcp_tmpfs=ok
-permissive:platform_app_data_file=ok
-permissive:dhcp=ok
-permissive:mediaserver_service=ok
-permissive:recovery_block_device=ok
-permissive:dnsmasq=ok
-permissive:drmserver=ok
-permissive:drmserver_tmpfs=ok
-permissive:keystore=ok
-permissive:property_data_file=ok
-permissive:vold_exec=ok
-permissive:adbd=ok
-permissive:package_service=ok
-permissive:dumpstate=ok
-permissive:racoon_exec=ok
-permissive:usagestats_service=ok
-permissive:rild_exec=ok
-permissive:unlabeled=ok
-permissive:bluetooth=ok
-permissive:accessibility_service=ok
-permissive:uncrypt_tmpfs=ok
-permissive:inputflinger=ok
-permissive:dhcp_exec=ok
-permissive:vcs_device=ok
-permissive:fsck_exec=ok
-permissive:gpsd_exec=ok
-permissive:port=ok
-permissive:fuse=ok
-permissive:install_data_file=ok
-permissive:mkfs_exec=ok
-permissive:lmkd_exec=ok
-permissive:logd_exec=ok
-permissive:wifi_service=ok
-permissive:netd_exec=ok
-permissive:sgdisk=ok
-permissive:init_exec=ok
-permissive:media_router_service=ok
-permissive:asec_image_file=ok
-permissive:recovery=ok
-permissive:radio_tmpfs=ok
-permissive:tee_tmpfs=ok
-permissive:wpa=ok
-permissive:dev_type=ok
-permissive:runas=ok
-permissive:vdc_tmpfs=ok
-permissive:wpa_tmpfs=ok
-permissive:hostapd=ok
-permissive:system_prop=ok
-permissive:vfat=ok
-permissive:fs_type=ok
-permissive:sdcard_external=ok
-permissive:sdcard_internal=ok
-permissive:sdcardd_exec=ok
-permissive:owntty_device=ok
-permissive:selinuxfs=ok
-permissive:tty_device=ok
-permissive:tun_device=ok
-permissive:clatd_exec=ok
-permissive:installd_tmpfs=ok
-permissive:uio_device=ok
-permissive:bootanim_tmpfs=ok
-permissive:install_recovery_tmpfs=ok
-permissive:sysinit_exec=ok
-permissive:system_app_service=ok
-permissive:full_device=ok
-permissive:null_device=ok
-permissive:fuse_device=ok
-permissive:usb_device=ok
-permissive:wfd_app=ok
-permissive:camera_device=ok
-permissive:hostapd_exec=ok
-permissive:keystore_exec=ok
-permissive:netpolicy_service=ok
-permissive:power_service=ok
-permissive:user_service=ok
-permissive:persistent_data_block_service=ok
-permissive:tv_input_service=ok
-permissive:input_service=ok
-permissive:uncrypt=ok
-permissive:system_app_data_file=ok
-permissive:uimode_service=ok
-permissive:tee_device=ok
-permissive:uncrypt_exec=ok
-permissive:video_device=ok
-permissive:system_api_service=ok
-permissive:blkid_exec=ok
-permissive:labeledfs=ok
-permissive:midi_service=ok
-permissive:mtp_tmpfs=ok
-permissive:audio_device=ok
-permissive:radio_device=ok
-permissive:webviewupdate_service=ok
-permissive:nfc_tmpfs=ok
-permissive:userinit_exec=ok
-permissive:ptmx_device=ok
-permissive:restrictions_service=ok
-permissive:textservices_service=ok
-permissive:mdnsd_exec=ok
-permissive:system_app_tmpfs=ok
-permissive:wifiscanner_service=ok
-permissive:bluetooth_data_file=ok
-permissive:usbaccessory_device=ok
-permissive:userinit_data_exec=ok
-permissive:lvm_placeholder=ok
-permissive:rmt_placeholder=ok
-permissive:ffs_prop=ok
-permissive:nfc_prop=ok
-permissive:dex2oat_exec=ok
-permissive:socket_device=ok
-permissive:toolbox=ok
-permissive:IProxyService_service=ok
-permissive:bluetooth_tmpfs=ok
-permissive:sysfs_lowmemorykiller=ok
-permissive:installd_socket=ok
-permissive:netd_tmpfs=ok
-permissive:servicemanager_exec=ok
-permissive:mnt_media_rw_stub_file=ok
-permissive:proc=ok
-permissive:scheduling_policy_service=ok
-permissive:asec_public_file=ok
-permissive:proc_cpuinfo=ok
-permissive:tzdatacheck=ok
-permissive:usermodehelper=ok
-permissive:bluetooth_socket=ok
-permissive:installd=ok
-permissive:logcat_exec=ok
-permissive:debug_prop=ok
-permissive:inputflinger_exec=ok
-permissive:pan_result_prop=ok
-permissive:security_prop=ok
-permissive:fingerprintd=ok
-permissive:zygote_socket=ok
-permissive:system_server_tmpfs=ok
-permissive:bluetooth_prop=ok
-permissive:mkfs_tmpfs=ok
-permissive:bootchart_data_file=ok
-permissive:ctl_rildaemon_prop=ok
-permissive:system_radio_prop=ok
-permissive:input_method_service=ok
-permissive:fsck_untrusted=ok
-permissive:contextmount_type=ok
-permissive:lmkd_tmpfs=ok
-permissive:logd_tmpfs=ok
-permissive:uhid_device=ok
-permissive:lock_settings_service=ok
-permissive:ctl_dhcp_pan_prop=ok
-permissive:media_projection_service=ok
-permissive:racoon_socket=ok
-permissive:ctl_bootanim_prop=ok
-permissive:restorecon_prop=ok
-permissive:wallpaper_file=ok
-permissive:account_service=ok
-permissive:content_service=ok
-permissive:mount_service=ok
-permissive:print_service=ok
-permissive:install_recovery=ok
-permissive:net_radio_prop=ok
-permissive:location_service=ok
-permissive:commontime_management_service=ok
-permissive:asec_apk_file=ok
-permissive:telecom_service=ok
-permissive:console_device=ok
-permissive:userinit_prop=ok
-permissive:sensors_device=ok
-permissive:cameraproxy_service=ok
-permissive:heapdump_data_file=ok
-permissive:connectivity_service=ok
-permissive:notification_service=ok
-permissive:dhcp_prop=ok
-permissive:audio_prop=ok
-permissive:qtaguid_proc=ok
-permissive:ctl_bugreport_prop=ok
-permissive:healthd=ok
-permissive:init=ok
-permissive:sysinit=ok
-permissive:fingerprintd_tmpfs=ok
-permissive:keychain_data_file=ok
-permissive:kmem_device=ok
-permissive:netif_type=ok
-permissive:gps_control=ok
-permissive:logd_prop=ok
-permissive:init_tmpfs=ok
-permissive:device_policy_service=ok
-permissive:surfaceflinger_exec=ok
-permissive:kmsg_device=ok
-permissive:vold_prop=ok
-permissive:slideshow=ok
-permissive:dreams_service=ok
-permissive:imms_service=ok
-permissive:data_file_type=ok
-permissive:samplingprofiler_service=ok
-permissive:netif=ok
-permissive:bootanim=ok
-permissive:dalvik_prop=ok
-permissive:klog_device=ok
-permissive:zoneinfo_data_file=ok
-permissive:radio=ok
-permissive:inputflinger_service=ok
-permissive:mlstrustedobject=fail
-permissive:debuggerd_tmpfs=ok
-permissive:diskstats_service=ok
-permissive:usb_service=ok
-permissive:wallpaper_service=ok
-permissive:fscklogs=ok
-permissive:netd_socket=ok
-permissive:search_service=ok
-permissive:battery_service=ok
-permissive:task_service=ok
-permissive:zygote_tmpfs=ok
-permissive:mlstrustedsubject=fail
-permissive:graphicsstats_service=ok
-permissive:mediaserver=ok
-permissive:mediaserver_exec=ok
-permissive:ctl_fuse_prop=ok
-permissive:drmserver_service=ok
-permissive:fingerprintd_data_file=ok
-permissive:mtpd_socket=ok
-permissive:ctl_console_prop=ok
-permissive:debugfs=ok
-permissive:gatekeeperd_exec=ok
-permissive:hardware_service=ok
-permissive:keystore_service=ok
-permissive:mkfs=ok
-permissive:oemfs=ok
-permissive:pipefs=ok
-permissive:sockfs=ok
-permissive:sysfs=ok
-permissive:logd=ok
-permissive:procstats_service=ok
-permissive:pstorefs=ok
-permissive:trust_service=ok
-permissive:default_android_service=ok
-permissive:drmserver_exec=ok
-permissive:config_prop=ok
-permissive:binfmt_miscfs=ok
-permissive:inotify=ok
-permissive:vold_tmpfs=ok
-permissive:sap_uim_socket=ok
-permissive:bluetooth_service=ok
-permissive:fingerprintd_exec=ok
-permissive:alarm_service=ok
-permissive:sysfs_devices_system_cpu=ok
-permissive:rttmanager_service=ok
-permissive:sgdisk_exec=ok
-permissive:storage_file=ok
-permissive:debuggerd_exec=ok
-permissive:untrusted_app=ok
-permissive:appops_service=ok
-permissive:gps_socket=ok
-permissive:system_block_device=ok
-permissive:ueventd=ok
-permissive:node=ok
-permissive:proc_sysrq=ok
-permissive:gatekeeperd=ok
-permissive:adb_device=ok
-permissive:consumer_ir_service=ok
-permissive:shared_relro=ok
-permissive:sysfs_type=ok
-permissive:updatelock_service=ok
-permissive:system_data_file=ok
-permissive:alarm_device=ok
-permissive:camera_data_file=ok
-permissive:sysfs_bluetooth_writable=ok
-permissive:ctl_mdnsd_prop=ok
-permissive:hci_attach_tmpfs=ok
-permissive:devpts=ok
-permissive:sysfs_zram=ok
-permissive:audio_firmware_file=ok
-permissive:proc_bluetooth_writable=ok
-permissive:apk_data_file=ok
-permissive:audio_data_file=ok
-permissive:bluetooth_efs_file=ok
-permissive:dm_device=ok
-permissive:drm_data_file=ok
-permissive:gps_data_file=ok
-permissive:media_data_file=ok
-permissive:nfc_data_file=ok
-permissive:radio_data_file=ok
-permissive:tee_data_file=ok
-permissive:wifi_data_file=ok
-permissive:app_api_service=ok
-permissive:display_service=ok
-permissive:mdnsd_tmpfs=ok
-permissive:mnt_media_rw_file=ok
-permissive:system_app=ok
-permissive:misc_logd_file=ok
-permissive:dumpstate_socket=ok
-permissive:sdcard_type=ok
-permissive:system_file=ok
-permissive:apk_private_tmp_file=ok
-permissive:hci_attach_dev=ok
-permissive:su=ok
-permissive:statusbar_service=ok
-permissive:perfprofd_exec=ok
-permissive:racoon_tmpfs=ok
-permissive:apk_tmp_file=ok
-permissive:batterystats_service=ok
-permissive:proc_security=ok
-permissive:system_server_service=ok
-permissive:gps_device=ok
-permissive:gpu_device=ok
-permissive:mnt_expand_file=ok
-permissive:nfc_service=ok
-permissive:gpsd=ok
-permissive:mdnsd=ok
-permissive:device=ok
-permissive:storage_stub_file=ok
-permissive:system_wpa_socket=ok
-permissive:assetatlas_service=ok
-permissive:surfaceflinger=ok
-permissive:perfprofd_tmpfs=ok
-permissive:sysfs_nfc_power_writable=ok
-permissive:fsck=ok
-permissive:voiceinteraction_service=ok
-permissive:rild_tmpfs=ok
-permissive:sensorservice_service=ok
-permissive:cpuinfo_service=ok
-permissive:dbinfo_service=ok
-permissive:gfxinfo_service=ok
-permissive:meminfo_service=ok
-permissive:isolated_app_tmpfs=ok
-permissive:runas_exec=ok
-permissive:untrusted_app_devpts=ok
-permissive:dex2oat=ok
-permissive:gatekeeper_service=ok
-permissive:netstats_service=ok
-permissive:watchdogd=ok
-permissive:bluetoothdomain=ok
-permissive:dnsmasq_exec=ok
-permissive:fwmarkd_socket=ok
-permissive:qtaguid_device=ok
-permissive:tzdatacheck_exec=ok
-permissive:inputflinger_tmpfs=ok
-permissive:proc_drop_caches=ok
-permissive:shell_exec=ok
-permissive:activity_service=ok
-permissive:backup_service=ok
-permissive:hdmi_control_service=ok
-permissive:ppp=ok
-permissive:clipboard_service=ok
-permissive:dumpstate_exec=ok
-permissive:zero_device=ok
-permissive:ethernet_service=ok
-permissive:perfprofd=ok
-permissive:resourcecache_data_file=ok
-permissive:systemkeys_data_file=ok
-permissive:shared_relro_tmpfs=ok
-permissive:binder_device=ok
-permissive:procrank_exec=ok
-permissive:property_socket=ok
-permissive:hw_random_device=ok
-permissive:random_device=ok
-permissive:urandom_device=ok
-permissive:watchdog_device=ok
-permissive:ctl_default_prop=ok
-permissive:ctl_dumpstate_prop=ok
-permissive:security_file=ok
-permissive:userdata_block_device=ok
-permissive:tzdatacheck_tmpfs=ok
-permissive:media_rw_data_file=ok
-permissive:wfd_app_tmpfs=ok
-permissive:default_prop=ok
-permissive:procrank=ok
-permissive:proc_uid_cputime_removeuid=ok
-permissive:debuggerd_prop=ok
-permissive:shared_relro_file=ok
-permissive:install_recovery_exec=ok
-permissive:coredump_file=ok
-permissive:netdomain=ok
-permissive:cache_block_device=ok
-permissive:appdomain=ok
-permissive:lmkd_socket=ok
-permissive:racoon=ok
-permissive:graphics_device=ok
-permissive:serial_device=ok
-permissive:efs_file=ok
-permissive:boot_block_device=ok
-permissive:powerctl_prop=ok
-permissive:rild=ok
-permissive:vold=ok
-permissive:adbtcp_prop=ok
-permissive:toolbox_exec=ok
-permissive:iio_device=ok
-permissive:devicestoragemonitor_service=ok
-permissive:ion_device=ok
-permissive:permission_service=ok
-permissive:shell=ok
-permissive:tombstone_data_file=ok
-permissive:audio_service=ok
-permissive:radio_service=ok
-permissive:apk_private_data_file=ok
-permissive:mdnsd_socket=ok
-permissive:metadata_block_device=ok
-permissive:service_manager_type=ok
-permissive:unencrypted_data_file=ok
-permissive:healthd_service=ok
-permissive:root_block_device=ok
-permissive:swap_block_device=ok
-permissive:cache_backup_file=ok
-permissive:logd_socket=ok
-permissive:blkid_untrusted=ok
-permissive:toolbox_tmpfs=ok
-permissive:hci_attach=ok
-permissive:dalvikcache_profiles_data_file=ok
-permissive:sdcard_posix=ok
-permissive:vold_socket=ok
-permissive:block_device=ok
-permissive:zygote_exec=ok
-permissive:frp_block_device=ok
-permissive:radio_prop=ok
-permissive:loop_device=ok
-permissive:sysfs_writable=ok
-permissive:vold_device=ok
-permissive:properties_device=ok
-permissive:misc_user_data_file=ok
-permissive:surfaceflinger_tmpfs=ok
-permissive:sysfs_ioscheduler=ok
-permissive:lmkd=ok
-permissive:nfc_device=ok
-permissive:vibrator_service=ok
-permissive:deviceidle_service=ok
-permissive:servicemanager=ok
-permissive:window_service=ok
-permissive:dropbox_service=ok
-permissive:sysfs_wake_lock=ok
-permissive:dnsproxyd_socket=ok
-permissive:rild_socket=ok
-permissive:shell_prop=ok
-permissive:keystore_data_file=ok
-permissive:ashmem_device=ok
-permissive:isolated_app=ok
-permissive:sysinit_tmpfs=ok
-permissive:shm=ok
-permissive:platform_app_tmpfs=ok
-permissive:pmsg_device=ok
-permissive:rpmsg_device=ok
-permissive:shell_tmpfs=ok
-permissive:network_management_service=ok
-permissive:cache_file=ok
-permissive:fingerprint_prop=ok
-permissive:blkid=ok
-permissive:fingerprintd_service=ok
-permissive:mtp_device=ok
-permissive:mtd_device=ok
-permissive:log_device=ok
-permissive:domain=ok
- Success
- Detecting system compatibility
sukernel v2.77 (ndk:armeabi-v7a) - Copyright (C) 2014-2016 - Chainfire
Loading from [/dev/block/mmcblk0p31] ...
magic: [ANDROID!]
kernel: [6900000] (6901760) @ 0x00008000
ramdisk: [945792] (946176) @ 0x01000000
second: [0] (0) @ 0x00f00000
tags: @ 0x00000100
page size: 2048
unused: [0x001ab800] [0x00000000]
dtb(?): [1751040] (1751040)
name: []
command line: [console=ttyHSL0,115200,n8 androidboot.console=ttyHSL0 androidboot.hardware=qcom user_debug=31 msm_rtb.filter=0x37 vmalloc=400M utags.blkdev=/dev/block/platform/msm_sdcc.1/by-name/utags movablecore=160M]
extra command line: []
id: [0xd6faf3ce39b126255a3cb0c52c4f4a4c43ba0511000000000000000000000000]
Saving to [/sutmp/ramdisk.packed] ...
sukernel v2.77 (ndk:armeabi-v7a) - Copyright (C) 2014-2016 - Chainfire
Loading from [/sutmp/ramdisk.packed] ...
Decompressing [945792] --> [1774336]
Saving to [/sutmp/ramdisk] ...
sukernel v2.77 (ndk:armeabi-v7a) - Copyright (C) 2014-2016 - Chainfire
Loading from [/sutmp/ramdisk] ...
----- patch check -----
Loading from cpio:[init.rc] ...
Finding [daemonsu]
-!Found
Finding [SuperSU:PATCH]
-!Found
Result: not patched
sukernel v2.77 (ndk:armeabi-v7a) - Copyright (C) 2014-2016 - Chainfire
Loading from [/sutmp/ramdisk] ...
Saving to [/sutmp/fstab] ...
sukernel v2.77 (ndk:armeabi-v7a) - Copyright (C) 2014-2016 - Chainfire
Loading from [/sutmp/ramdisk] ...
Saving to [/sutmp/init] ...
sukernel v2.77 (ndk:armeabi-v7a) - Copyright (C) 2014-2016 - Chainfire
Loading from [/sutmp/ramdisk] ...
Saving to [/sutmp/sepolicy] ...
(Android M policy compatibility mode)
(Android M policy compatibility mode)
(Android M policy compatibility mode)
supolicy v2.77 (ndk:armeabi-v7a) - Copyright (C) 2014-2016 - Chainfire
Patching policy [/sutmp/sepolicy] --> [/data/security/current/sepolicy] ...
- Success
- System mode
- Disabling OTA survival
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /system/bin/su
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /system/xbin/su
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /system/bin/.ext/.su
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /system/sbin/su
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /vendor/sbin/su
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /vendor/bin/su
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /vendor/xbin/su
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /system/xbin/daemonsu
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /system/xbin/sugote
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /system/xbin/sugote_mksh
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /system/xbin/supolicy
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /system/xbin/ku.sud
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /system/xbin/.ku
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /system/xbin/.su
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /system/lib/libsupol.so
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /system/lib64/libsupol.so
/tmp/supersu/armv7/chattr.pie: No such file or directory while trying to stat /system/etc/install-recovery.sh
- Removing old files
rm: can't remove '/data/su.img': No such file or directory
rm: can't remove '/cache/su.img': No such file or directory
- Creating space
- Placing files
rm: can't remove '/system/bin/.ext/.su': No such file or directory
rm: can't remove '/system/xbin/su': No such file or directory
rm: can't remove '/system/xbin/daemonsu': No such file or directory
rm: can't remove '/system/xbin/supolicy': No such file or directory
rm: can't remove '/system/lib/libsupol.so': No such file or directory
rm: can't remove '/system/app/SuperSU/SuperSU.apk': No such file or directory
rm: can't remove '/system/etc/install-recovery.sh': No such file or directory
rm: can't remove '/system/bin/app_process_init': No such file or directory
rm: can't remove '/system/etc/init.d/99SuperSUDaemon': No such file or directory
/tmp/updater: line 1392: can't create /system/etc/init.d/99SuperSUDaemon: nonexistent directory
chown: /system/etc/init.d/99SuperSUDaemon: No such file or directory
chown: /system/etc/init.d/99SuperSUDaemon: No such file or directory
chmod: /system/etc/init.d/99SuperSUDaemon: No such file or directory
- Restoring files
rm: can't remove '/system/app/Maps/Maps.apk': No such file or directory
rm: can't remove '/system/app/YouTube/YouTube.apk': No such file or directory
- Post-installation script
rm: can't remove '/system/toybox': No such file or directory
rm: can't remove '/system/toolbox': No such file or directory
- Unmounting /system
- Done !
I:Updater process ended with RC=0
I:Legacy property environment disabled.
Done processing script file
I:Done reading ORS command from command line
I:TWFunc::Set_Brightness: Setting brightness control to 255
I:operation_end - status=0
I:Set page: 'main2'
I:TWFunc::Set_Brightness: Setting brightness control to 5
I:TWFunc::Set_Brightness: Setting brightness control t
o 0
Solved
Ok, after spending a day with that problem, I realized that UPDATE-SuperSU did not patch the bootimage (and maybe is not expected to). I patched the bootimage manually, works fine with root now.
Frank
fwuebbel said:
Ok, after spending a day with that problem, I realized that UPDATE-SuperSU did not patch the bootimage (and maybe is not expected to). I patched the bootimage manually, works fine with root now.
Frank
Click to expand...
Click to collapse
how fix you brother?
im in 6.0

Can't install SuperSU with TWRP, please see logfile

Hello XDA World!
iam a complete rookie to rooting, but it went quite well so far. However, now i got stuck installing SuperSU (already tried older versions, same result) via TWRP.
Rootcheck is always negative.
I would be grateful for any hints.
Regards, Rex
---
My system:
Sony Xperia Z3 compact (D5803)
Andoid Marshmallow 6.0.1
Kernel 3.4.0-perf-gc14c2d5
Here is my logfile from TWRP.
---
Installing zip file '/sdcard/SuperSU-v2.82-201705271822.zip'
Checking for MD5 file...
Skipping MD5 check: no MD5 file found
I:Zip does not contain SELinux file_contexts file in its root.
I:Legacy property environment initialized.
*****************
SuperSU installer
*****************
cat: can't open '/fstab.*': No such file or directory
- Mounting /system, /data and rootfs
mount: mounting /dev/block/mmcblk0p25 on /data failed: Device or resource busy
2+0 records in
2+0 records out
2 bytes (2B) copied, 0.004246 seconds, 471B/s
3+0 records in
3+0 records out
3 bytes (3B) copied, 0.000542 seconds, 5.4KB/s
12+0 records in
12+0 records out
12 bytes (12B) copied, 0.000949 seconds, 12.3KB/s
3+0 records in
3+0 records out
3 bytes (3B) copied, 0.001477 seconds, 2.0KB/s
/tmp/updater: line 989: /system/toolbox: not found
- Extracting files
Archive: /sdcard/SuperSU-v2.82-201705271822.zip
inflating: META-INF/MANIFEST.MF
inflating: META-INF/CERT.SF
inflating: META-INF/CERT.RSA
inflating: META-INF/com/google/android/update-binary
inflating: META-INF/com/google/android/updater-script
inflating: arm/chattr
inflating: arm/chattr.pie
inflating: arm/libsupol.so
inflating: arm/su
inflating: arm/suinit
inflating: arm/sukernel
inflating: arm/supolicy
inflating: arm64/chromeos/futility
inflating: arm64/libsupol.so
inflating: arm64/su
inflating: arm64/suinit
inflating: arm64/sukernel
inflating: arm64/supolicy
inflating: armv7/chattr.pie
inflating: armv7/libsupol.so
inflating: armv7/su
inflating: armv7/suinit
inflating: armv7/sukernel
inflating: armv7/supolicy
inflating: common/000000deepsleep
inflating: common/99SuperSUDaemon
inflating: common/Superuser.apk
inflating: common/chromeos/kernel.bootloader
inflating: common/chromeos/kernel.config
inflating: common/chromeos/kernel.keyblock
inflating: common/chromeos/kernel_data_key.vbprivk
inflating: common/file_contexts_image
inflating: common/frp_install
inflating: common/hexpatch
inflating: common/init.supersu.rc
inflating: common/init.supersu.rc.24
inflating: common/install-recovery.sh
inflating: common/launch_daemonsu.sh
inflating: mips/chattr.pie
inflating: mips/libsupol.so
inflating: mips/su
inflating: mips/suinit
inflating: mips/sukernel
inflating: mips/supolicy
inflating: mips64/libsupol.so
inflating: mips64/su
inflating: mips64/suinit
inflating: mips64/sukernel
inflating: mips64/supolicy
inflating: x64/libsupol.so
inflating: x64/su
inflating: x64/suinit
inflating: x64/sukernel
inflating: x64/supolicy
inflating: x86/chattr
inflating: x86/chattr.pie
inflating: x86/libsupol.so
inflating: x86/su
inflating: x86/su.pie
inflating: x86/suinit
inflating: x86/sukernel
inflating: x86/supolicy
supolicy v2.82 (ndk:armeabi-v7a) - Copyright (C) 2014-2017 - Chainfire & CCMT
Patching policy ...
(Android M policy compatibility mode)
-permissive:adbd_socket=ok
-permissive:camera_socket=ok
-permissive:functionfs=ok
-permissive:wifip2p_service=ok
-permissive:hci_attach_exec=ok
-permissive:system_server=ok
-permissiveroc_uid_cputime_showstat=ok
-permissive:nfc=ok
-permissive:rild_debug_socket=ok
-permissive:tad_socket=ok
-permissive:file_type=ok
-permissive:sysfs_performance=ok
-permissive:fsck_tmpfs=ok
-permissive:exec_type=ok
-permissiveroperty_type=ok
-permissive:rtc_device=ok
-permissive:surfaceflinger_service=ok
-permissive:binderservicedomain=ok
-permissiveroc_kernel_sched=ok
-permissive:mdns_socket=ok
-permissive:network_score_service=ok
-permissive:node_type=ok
-permissive:registry_service=ok
-permissive:smd_device=ok
-permissive:gatekeeperd_tmpfs=ok
-permissive:ssd_device=ok
-permissive:thermanager_tmpfs=ok
-permissive:ssr_device=ok
-permissive:appwidget_service=ok
-permissivelatform_app=ok
-permissive:ram_device=ok
-permissiveerfprofd_data_file=ok
-permissiveort_type=ok
-permissive:rootfs=ok
-permissive:tmpfs=ok
-permissive:usbfs=ok
-permissive:wcnss_service=ok
-permissive:bootanim_exec=ok
-permissive:gatekeeper_data_file=ok
-permissive:gpsd_tmpfs=ok
-permissive:installd_exec=ok
-permissive:su_tmpfs=ok
-permissiverocessinfo_service=ok
-permissive:untrusted_app_tmpfs=ok
-permissive:cpuctl_device=ok
-permissive:netmgrd_exec=ok
-permissive:launcherapps_service=ok
-permissive:country_detector_service=ok
-permissive:rng_device=ok
-permissive:cgroup=ok
-permissive:drmserver_socket=ok
-permissive:netmgrd_socket=ok
-permissive:qce_device=ok
-permissive:rmt_storage_tmpfs=ok
-permissivepp_device=ok
-permissive:wpa_socket=ok
-permissiveroc_net=ok
-permissive:vdc=ok
-permissive:clatd=ok
-permissive:netd=ok
-permissive:sdcardd=ok
-permissive:zygote=ok
-permissive:debuggerd=ok
-permissive:ipa_dev=ok
-permissive:input_device=ok
-permissive:jobscheduler_service=ok
-permissive:mnt_user_file=ok
-permissiveta_device=ok
-permissive:mediaserver_tmpfs=ok
-permissive:sysfs_ksm=ok
-permissive:sysfs_graphics=ok
-permissive:ueventd_tmpfs=ok
-permissive:serial_service=ok
-permissiveockObserver_service=ok
-permissive:download_file=ok
-permissive:mtp=ok
-permissive:backup_data_file=ok
-permissive:irsc_util_tmpfs=ok
-permissive:servicemanager_tmpfs=ok
-permissive:su_exec=ok
-permissivepp_exec=ok
-permissive:sct_exec=ok
-permissive:tad_exec=ok
-permissive:tee_exec=ok
-permissive:vdc_exec=ok
-permissive:wpa_exec=ok
-permissive:dumpstate_tmpfs=ok
-permissive:mqueue=ok
-permissive:mtp_exec=ok
-permissive:system_ndebug_socket=ok
-permissive:tee=ok
-permissive:sysfs_ssr=ok
-permissive:acdb_data_file=ok
-permissive:adb_data_file=ok
-permissive:anr_data_file=ok
-permissive:app_data_file=ok
-permissive:dhcp_data_file=ok
-permissive:logdr_socket=ok
-permissive:logdw_socket=ok
-permissive:net_data_file=ok
-permissive:shell_data_file=ok
-permissive:vold_data_file=ok
-permissive:vpn_data_file=ok
-permissive:adb_keys_file=ok
-permissive:dalvikcache_data_file=ok
-permissive:media_session_service=ok
-permissive:bluetooth_manager_service=ok
-permissive:keystore_tmpfs=ok
-permissive:fingerprint_service=ok
-permissive:kernel=ok
-permissive:servicediscovery_service=ok
-permissive:dhcp_tmpfs=ok
-permissive:rpmb_device=ok
-permissive:touchfusion_tmpfs=ok
-permissive:msm_irqbalance_socket=ok
-permissivelatform_app_data_file=ok
-permissive:sysfs_mpdecision=ok
-permissive:dhcp=ok
-permissive:hvdcp=ok
-permissive:mediaserver_service=ok
-permissive:recovery_block_device=ok
-permissive:dnsmasq=ok
-permissive:drmserver=ok
-permissive:drmserver_tmpfs=ok
-permissive:keystore=ok
-permissiveroperty_data_file=ok
-permissive:subsys_modem_device=ok
-permissive:vold_exec=ok
-permissive:adbd=ok
-permissive:netmgrd=ok
-permissiveackage_service=ok
-permissive:wcnss_service_tmpfs=ok
-permissive:dumpstate=ok
-permissive:racoon_exec=ok
-permissive:usagestats_service=ok
-permissive:rild_exec=ok
-permissive:unlabeled=ok
-permissive:sysfs_timekeep=ok
-permissiveer_mgr_exec=ok
-permissive:sysfs_fingerprintd_writable=ok
-permissive:bluetooth=ok
-permissive:accessibility_service=ok
-permissive:uncrypt_tmpfs=ok
-permissive:inputflinger=ok
-permissive:dhcp_exec=ok
-permissive:vcs_device=ok
-permissive:fsck_exec=ok
-permissiveer_mgr_service=ok
-permissive:gpsd_exec=ok
-permissive:sensors=ok
-permissiveort=ok
-permissive:qti_init_shell=ok
-permissive:fuse=ok
-permissive:install_data_file=ok
-permissive:mkfs_exec=ok
-permissive:lmkd_exec=ok
-permissive:logd_exec=ok
-permissive:wifi_service=ok
-permissive:netd_exec=ok
-permissive:sgdisk=ok
-permissive:init_exec=ok
-permissive:media_router_service=ok
-permissive:asec_image_file=ok
-permissive:recovery=ok
-permissive:qdsp_device=ok
-permissive:radio_tmpfs=ok
-permissive:tad_tmpfs=ok
-permissive:tee_tmpfs=ok
-permissive:wpa=ok
-permissive:dev_type=ok
-permissive:runas=ok
-permissive:vdc_tmpfs=ok
-permissive:wpa_tmpfs=ok
-permissive:hostapd=ok
-permissive:system_prop=ok
-permissive:vfat=ok
-permissive:fs_type=ok
-permissive:sdcard_external=ok
-permissive:sdcard_internal=ok
-permissive:sdcardd_exec=ok
-permissive:sensors_persist_file=ok
-permissivewntty_device=ok
-permissive:sct_tmpfs=ok
-permissive:selinuxfs=ok
-permissive:tty_device=ok
-permissive:tun_device=ok
-permissive:clatd_exec=ok
-permissive:installd_tmpfs=ok
-permissive:sysfs_thermal=ok
-permissive:uio_device=ok
-permissive:bootanim_tmpfs=ok
-permissive:install_recovery_tmpfs=ok
-permissive:sysinit_exec=ok
-permissive:system_app_service=ok
-permissive:full_device=ok
-permissive:null_device=ok
-permissive:ramdump_device=ok
-permissive:fuse_device=ok
-permissive:usb_device=ok
-permissive:wfd_app=ok
-permissive:camera_device=ok
-permissive:hostapd_exec=ok
-permissive:keystore_exec=ok
-permissive:netpolicy_service=ok
-permissiveower_service=ok
-permissive:user_service=ok
-permissiveersistent_data_block_service=ok
-permissive:tv_input_service=ok
-permissive:input_service=ok
-permissive:tad=ok
-permissive:uncrypt=ok
-permissive:system_app_data_file=ok
-permissive:uimode_service=ok
-permissive:tee_device=ok
-permissive:uncrypt_exec=ok
-permissive:video_device=ok
-permissive:system_api_service=ok
-permissive:timekeep_service=ok
-permissive:blkid_exec=ok
-permissive:labeledfs=ok
-permissive:midi_service=ok
-permissive:mtp_tmpfs=ok
-permissive:audio_device=ok
-permissive:radio_device=ok
-permissive:tfa_amp_exec=ok
-permissive:webviewupdate_service=ok
-permissive:nfc_tmpfs=ok
-permissive:ta_qmi_exec=ok
-permissive:userinit_exec=ok
-permissive:modem_efs_partition_device=ok
-permissivetmx_device=ok
-permissive:restrictions_service=ok
-permissive:textservices_service=ok
-permissive:mdnsd_exec=ok
-permissive:system_app_tmpfs=ok
-permissive:wifiscanner_service=ok
-permissive:bluetooth_data_file=ok
-permissive:tfa_amp_tmpfs=ok
-permissive:usbaccessory_device=ok
-permissive:userinit_data_exec=ok
-permissive:lvm_placeholder=ok
-permissive:rmt_placeholder=ok
-permissive:ffs_prop=ok
-permissive:nfc_prop=ok
-permissive:dex2oat_exec=ok
-permissive:socket_device=ok
-permissive:tee_prop=ok
-permissive:toolbox=ok
-permissive:IProxyService_service=ok
-permissive:bluetooth_tmpfs=ok
-permissive:sysfs_lowmemorykiller=ok
-permissive:system_health_monitor_device=ok
-permissive:installd_socket=ok
-permissive:netd_tmpfs=ok
-permissive:servicemanager_exec=ok
-permissive:irsc_util=ok
-permissive:mnt_media_rw_stub_file=ok
-permissiveroc=ok
-permissive:mlog_qmi_tmpfs=ok
-permissive:scheduling_policy_service=ok
-permissive:ta_qmi_tmpfs=ok
-permissive:asec_public_file=ok
-permissiveroc_cpuinfo=ok
-permissive:tzdatacheck=ok
-permissive:sysfs_usb_supply=ok
-permissive:usermodehelper=ok
-permissive:bluetooth_socket=ok
-permissive:voice_device=ok
-permissive:sensors_socket=ok
-permissive:installd=ok
-permissive:logcat_exec=ok
-permissive:debug_prop=ok
-permissive:netmgrd_tmpfs=ok
-permissive:inputflinger_exec=ok
-permissivean_result_prop=ok
-permissive:security_prop=ok
-permissive:fingerprintd=ok
-permissive:zygote_socket=ok
-permissive:system_server_tmpfs=ok
-permissive:bluetooth_prop=ok
-permissive:mkfs_tmpfs=ok
-permissive:bootchart_data_file=ok
-permissive:rmt_storage_exec=ok
-permissive:ctl_rildaemon_prop=ok
-permissive:irsc_util_exec=ok
-permissive:sysfs_subsys=ok
-permissive:system_radio_prop=ok
-permissive:input_method_service=ok
-permissive:fsck_untrusted=ok
-permissive:contextmount_type=ok
-permissive:lmkd_tmpfs=ok
-permissive:logd_tmpfs=ok
-permissive:uhid_device=ok
-permissive:lock_settings_service=ok
-permissive:ctl_dhcp_pan_prop=ok
-permissive:media_projection_service=ok
-permissive:racoon_socket=ok
-permissive:wcnss_device=ok
-permissive:ctl_bootanim_prop=ok
-permissive:hvdcp_exec=ok
-permissive:restorecon_prop=ok
-permissive:wallpaper_file=ok
-permissive:account_service=ok
-permissive:content_service=ok
-permissive:mount_service=ok
-permissiverint_service=ok
-permissive:sysfs_cpu_online=ok
-permissive:install_recovery=ok
-permissive:net_radio_prop=ok
-permissive:location_service=ok
-permissive:commontime_management_service=ok
-permissive:asec_apk_file=ok
-permissive:sysfs_battery_supply=ok
-permissive:telecom_service=ok
-permissive:console_device=ok
-permissive:userinit_prop=ok
-permissive:sensors_device=ok
-permissive:cameraproxy_service=ok
-permissive:heapdump_data_file=ok
-permissive:rmnet_device=ok
-permissive:sysfs_video=ok
-permissive:connectivity_service=ok
-permissive:notification_service=ok
-permissive:dhcp_prop=ok
-permissive:audio_prop=ok
-permissive:qtaguid_proc=ok
-permissive:ctl_bugreport_prop=ok
-permissive:healthd=ok
-permissive:init=ok
-permissive:qmuxd=ok
-permissive:sysinit=ok
-permissive:fingerprintd_tmpfs=ok
-permissive:keychain_data_file=ok
-permissive:kmem_device=ok
-permissive:avtimer_device=ok
-permissive:netif_type=ok
-permissive:netd_prop=ok
-permissive:gps_control=ok
-permissive:logd_prop=ok
-permissive:init_tmpfs=ok
-permissive:device_policy_service=ok
-permissive:surfaceflinger_exec=ok
-permissive:kmsg_device=ok
-permissive:vold_prop=ok
-permissive:slideshow=ok
-permissive:dreams_service=ok
-permissive:imms_service=ok
-permissive:data_file_type=ok
-permissive:samplingprofiler_service=ok
-permissive:netif=ok
-permissive:bootanim=ok
-permissive:dalvik_prop=ok
-permissive:klog_device=ok
-permissive:smem_log_device=ok
-permissive:zoneinfo_data_file=ok
-permissive:radio=ok
-permissive:inputflinger_service=ok
-permissive:mlstrustedobject=fail
-permissive:debuggerd_tmpfs=ok
-permissive:diskstats_service=ok
-permissiveer_mgr=ok
-permissive:usb_service=ok
-permissive:wallpaper_service=ok
-permissive:firmware_file=ok
-permissive:fscklogs=ok
-permissive:netd_socket=ok
-permissive:msm_irqbalanced_tmpfs=ok
-permissive:search_service=ok
-permissive:battery_service=ok
-permissive:qmuxd_socket=ok
-permissive:task_service=ok
-permissive:zygote_tmpfs=ok
-permissive:mlstrustedsubject=fail
-permissive:graphicsstats_service=ok
-permissive:timekeep_exec=ok
-permissive:mediaserver=ok
-permissive:mediaserver_exec=ok
-permissive:ctl_fuse_prop=ok
-permissive:drmserver_service=ok
-permissive:hvdcp_tmpfs=ok
-permissive:touchfusion_exec=ok
-permissive:fingerprintd_data_file=ok
-permissive:mtpd_socket=ok
-permissive:ctl_console_prop=ok
-permissive:debugfs=ok
-permissive:gatekeeperd_exec=ok
-permissive:hardware_service=ok
-permissive:keystore_service=ok
-permissive:mkfs=ok
-permissiveemfs=ok
-permissiveipefs=ok
-permissive:sockfs=ok
-permissive:sysfs=ok
-permissive:addrsetup_data_file=ok
-permissive:logd=ok
-permissiverocstats_service=ok
-permissivestorefs=ok
-permissive:trust_service=ok
-permissive:default_android_service=ok
-permissive:sensors_prop=ok
-permissive:drmserver_exec=ok
-permissive:config_prop=ok
-permissive:misc_partition=ok
-permissive:timekeep_data_file=ok
-permissive:binfmt_miscfs=ok
-permissive:device_latency=ok
-permissive:inotify=ok
-permissive:sysfs_socinfo=ok
-permissive:vold_tmpfs=ok
-permissive:mlog_qmi_exec=ok
-permissive:sap_uim_socket=ok
-permissive:bluetooth_service=ok
-permissive:fingerprintd_exec=ok
-permissive:alarm_service=ok
-permissive:touchfusion=ok
-permissive:sysfs_devices_system_cpu=ok
-permissive:sd_device=ok
-permissive:rttmanager_service=ok
-permissive:sgdisk_exec=ok
-permissive:storage_file=ok
-permissive:debuggerd_exec=ok
-permissive:untrusted_app=ok
-permissive:appops_service=ok
-permissive:data_qsee_file=ok
-permissive:gps_socket=ok
-permissive:system_block_device=ok
-permissive:ueventd=ok
-permissive:node=ok
-permissiveroc_sysrq=ok
-permissive:sysfs_rqstats=ok
-permissive:gatekeeperd=ok
-permissive:adb_device=ok
-permissive:timekeep=ok
-permissive:consumer_ir_service=ok
-permissive:shared_relro=ok
-permissive:sysfs_type=ok
-permissive:updatelock_service=ok
-permissive:addrsetup_tmpfs=ok
-permissive:system_data_file=ok
-permissive:alarm_device=ok
-permissive:camera_data_file=ok
-permissive:sysfs_bluetooth_writable=ok
-permissive:ctl_mdnsd_prop=ok
-permissive:hci_attach_tmpfs=ok
-permissive:devpts=ok
-permissive:sysfs_zram=ok
-permissive:audio_firmware_file=ok
-permissiveroc_bluetooth_writable=ok
-permissive:apk_data_file=ok
-permissive:audio_data_file=ok
-permissive:bluetooth_efs_file=ok
-permissive:dm_device=ok
-permissive:drm_data_file=ok
-permissive:dts_data_file=ok
-permissive:fm_data_file=ok
-permissive:gps_data_file=ok
-permissive:media_data_file=ok
-permissive:nfc_data_file=ok
-permissive:radio_data_file=ok
-permissive:ta_data_file=ok
-permissive:tee_data_file=ok
-permissive:wifi_data_file=ok
-permissive:app_api_service=ok
-permissive:display_service=ok
-permissive:mdnsd_tmpfs=ok
-permissive:mnt_media_rw_file=ok
-permissive:system_app=ok
-permissive:misc_logd_file=ok
-permissive:dumpstate_socket=ok
-permissive:sdcard_type=ok
-permissive:system_file=ok
-permissive:sensors_data_file=ok
-permissive:sct=ok
-permissive:apk_private_tmp_file=ok
-permissive:hci_attach_dev=ok
-permissive:su=ok
-permissive:statusbar_service=ok
-permissive:addrsetup=ok
-permissiveerfprofd_exec=ok
-permissive:qmuxd_exec=ok
-permissive:racoon_tmpfs=ok
-permissive:sensors_tmpfs=ok
-permissive:sysfs_power_management=ok
-permissive:apk_tmp_file=ok
-permissive:batterystats_service=ok
-permissiveroc_security=ok
-permissive:system_server_service=ok
-permissive:gps_device=ok
-permissive:gpu_device=ok
-permissive:mnt_expand_file=ok
-permissive:nfc_service=ok
-permissive:rfs_shared_hlos_file=ok
-permissive:gpsd=ok
-permissive:mdnsd=ok
-permissive:device=ok
-permissive:storage_stub_file=ok
-permissive:system_wpa_socket=ok
-permissive:assetatlas_service=ok
-permissive:surfaceflinger=ok
-permissiveerfprofd_tmpfs=ok
-permissive:sysfs_nfc_power_writable=ok
-permissive:fsck=ok
-permissive:voiceinteraction_service=ok
-permissive:mm-qcamerad_tmpfs=ok
-permissive:rild_tmpfs=ok
-permissive:sensorservice_service=ok
-permissive:cpuinfo_service=ok
-permissive:dbinfo_service=ok
-permissive:gfxinfo_service=ok
-permissive:meminfo_service=ok
-permissive:isolated_app_tmpfs=ok
-permissive:runas_exec=ok
-permissive:addrsetup_exec=ok
-permissive:untrusted_app_devpts=ok
-permissive:msm_irqbalanced=ok
-permissive:dex2oat=ok
-permissive:gatekeeper_service=ok
-permissive:netstats_service=ok
-permissive:watchdogd=ok
-permissive:bluetoothdomain=ok
-permissive:dnsmasq_exec=ok
-permissive:fwmarkd_socket=ok
-permissive:qtaguid_device=ok
-permissive:tzdatacheck_exec=ok
-permissive:inputflinger_tmpfs=ok
-permissiveroc_drop_caches=ok
-permissive:shell_exec=ok
-permissive:activity_service=ok
-permissive:backup_service=ok
-permissive:hdmi_control_service=ok
-permissivepp=ok
-permissive:clipboard_service=ok
-permissive:dumpstate_exec=ok
-permissive:hvdcp_device=ok
-permissive:zero_device=ok
-permissive:ethernet_service=ok
-permissiveerfprofd=ok
-permissive:resourcecache_data_file=ok
-permissive:systemkeys_data_file=ok
-permissive:shared_relro_tmpfs=ok
-permissive:wcnss_service_exec=ok
-permissive:binder_device=ok
-permissiverocrank_exec=ok
-permissiveroperty_socket=ok
-permissive:sysfs_smd_open_timeout=ok
-permissive:boot_animation_prop=ok
-permissive:hw_random_device=ok
-permissive:random_device=ok
-permissive:urandom_device=ok
-permissive:watchdog_device=ok
-permissive:sysfs_pronto=ok
-permissive:msm_irqbalance_prop=ok
-permissive:ctl_default_prop=ok
-permissive:ctl_dumpstate_prop=ok
-permissive:security_file=ok
-permissive:userdata_block_device=ok
-permissive:tzdatacheck_tmpfs=ok
-permissive:media_rw_data_file=ok
-permissive:wfd_app_tmpfs=ok
-permissive:default_prop=ok
-permissive:mm-qcamerad_exec=ok
-permissiveer_mgr_tmpfs=ok
-permissive:sysfs_uio=ok
-permissiverocrank=ok
-permissive:mm-qcamerad=ok
-permissiveroc_uid_cputime_removeuid=ok
-permissive:debuggerd_prop=ok
-permissive:shared_relro_file=ok
-permissive:install_recovery_exec=ok
-permissive:coredump_file=ok
-permissive:netdomain=ok
-permissive:cache_block_device=ok
-permissive:appdomain=ok
-permissive:lmkd_socket=ok
-permissive:racoon=ok
-permissive:tfa_amp=ok
-permissive:graphics_device=ok
-permissive:diag_device=ok
-permissive:rfs_file=ok
-permissive:serial_device=ok
-permissive:efs_file=ok
-permissive:boot_block_device=ok
-permissiveowerctl_prop=ok
-permissive:rild=ok
-permissive:vold=ok
-permissive:adbtcp_prop=ok
-permissive:sensors_exec=ok
-permissive:toolbox_exec=ok
-permissive:iio_device=ok
-permissive:devicestoragemonitor_service=ok
-permissive:ion_device=ok
-permissiveermission_service=ok
-permissive:shell=ok
-permissive:tombstone_data_file=ok
-permissive:audio_service=ok
-permissive:radio_service=ok
-permissive:apk_private_data_file=ok
-permissive:mdnsd_socket=ok
-permissive:qmuxd_tmpfs=ok
-permissive:metadata_block_device=ok
-permissive:service_manager_type=ok
-permissive:thermanager_exec=ok
-permissive:unencrypted_data_file=ok
-permissive:healthd_service=ok
-permissive:rmt_storage=ok
-permissive:root_block_device=ok
-permissive:swap_block_device=ok
-permissive:cache_backup_file=ok
-permissive:logd_socket=ok
-permissiveersist_display_file=ok
-permissive:blkid_untrusted=ok
-permissive:sysfs_addrsetup=ok
-permissive:toolbox_tmpfs=ok
-permissive:ta_qmi=ok
-permissiveersist_drm_file=ok
-permissive:hci_attach=ok
-permissive:timekeep_prop=ok
-permissive:dalvikcache_profiles_data_file=ok
-permissive:sdcard_posix=ok
-permissive:vold_socket=ok
-permissive:mlog_qmi=ok
-permissive:block_device=ok
-permissive:sysfs_rmt_storage=ok
-permissive:thermanager=ok
-permissive:timekeep_tmpfs=ok
-permissive:msm_irqbalanced_exec=ok
-permissive:zygote_exec=ok
-permissive:frp_block_device=ok
-permissive:radio_prop=ok
-permissive:tad_block_device=ok
-permissive:loop_device=ok
-permissive:sysfs_writable=ok
-permissive:vold_device=ok
-permissiveroperties_device=ok
-permissive:trim_area_partition_device=ok
-permissive:misc_user_data_file=ok
-permissive:surfaceflinger_tmpfs=ok
-permissive:sysfs_ioscheduler=ok
-permissive:lmkd=ok
-permissive:nfc_device=ok
-permissive:vibrator_service=ok
-permissive:deviceidle_service=ok
-permissive:servicemanager=ok
-permissive:window_service=ok
-permissive:dropbox_service=ok
-permissive:sysfs_wake_lock=ok
-permissive:dnsproxyd_socket=ok
-permissive:rild_socket=ok
-permissive:shell_prop=ok
-permissive:thermal_device=ok
-permissive:keystore_data_file=ok
-permissive:ashmem_device=ok
-permissive:sysfs_ssr_toggle=ok
-permissive:isolated_app=ok
-permissive:sysinit_tmpfs=ok
-permissive:shm=ok
-permissivelatform_app_tmpfs=ok
-permissiveersist_file=ok
-permissivemsg_device=ok
-permissive:rpmsg_device=ok
-permissive:shell_tmpfs=ok
-permissive:network_management_service=ok
-permissive:cache_file=ok
-permissive:fingerprint_prop=ok
-permissive:blkid=ok
-permissive:fingerprintd_service=ok
-permissive:mtp_device=ok
-permissive:mtd_device=ok
-permissive:camera_prop=ok
-permissive:log_device=ok
-permissive:domain=ok
- Success
- Detecting system compatibility
sukernel v2.82 (ndk:armeabi-v7a) - Copyright (C) 2014-2017 - Chainfire & CCMT
Loading from [/dev/block/mmcblk0p14] ...
Could not find header
- System-less mode, boot image support required
- Creating image
/data/su.img: 22/6144 files (0.0% non-contiguous), 1537/24576 blocks
- Mounting image
- Creating paths
mkdir: can't create directory '/su/bin': File exists
mkdir: can't create directory '/su/xbin': File exists
mkdir: can't create directory '/su/lib': File exists
mkdir: can't create directory '/su/etc': File exists
mkdir: can't create directory '/su/su.d': File exists
- Removing old files
- Placing files
rm: can't remove '/su/bin/su': No such file or directory
rm: can't remove '/su/bin/daemonsu': No such file or directory
rm: can't remove '/su/bin/supolicy_wrapped': No such file or directory
rm: can't remove '/su/lib/libsupol.so': No such file or directory
rm: can't remove '/su/bin/sukernel': No such file or directory
******************
Boot image patcher
******************
- Finding boot image
--- Boot image: /dev/block/mmcblk0p14
sukernel v2.82 (ndk:armeabi-v7a) - Copyright (C) 2014-2017 - Chainfire & CCMT
Loading from [/dev/block/mmcblk0p14] ...
Could not find header
- Extracting ramdisk
sukernel v2.82 (ndk:armeabi-v7a) - Copyright (C) 2014-2017 - Chainfire & CCMT
Loading from [/dev/block/mmcblk0p14] ...
Could not find header
--- Failure, aborting
*************************
IMPORTANT NOTICES
*************************
First reboot may take a
few minutes. It can also
loop a few times. Do not
interrupt the process!
*************************
- Unmounting /system
- Done !
Click to expand...
Click to collapse
[solved] sony elf 32 was the reason -> boot bridge
https://forum.xda-developers.com/crossdevice-dev/sony/mod-boot-bridge-sony-elf-t3506883

Cannot see Petnoires safetynet spoofer module after install done

This is the log:
Copying zip to temp directory
- Installing Petnoire's_SafetyNet_Spoofer.zip
- Device is system-as-root
Archive: /data/user/0/com.topjohnwu.magisk/cache/flash/install.zip
inflating: config.sh
inflating: module.prop
creating: common/
inflating: common/post-fs-data.sh
*******************************
PetNoire's SafetySpoofer
*******************************
******************************
Powered by Magisk (@topjohnwu)
******************************
update-binary: line 101: mount_magisk_img: not found
update-binary: line 104: log_start: not found
update-binary: line 106: install_check: not found
update-binary: line 108: check_bb: not found
- Extracting module files
Archive: /data/user/0/com.topjohnwu.magisk/cache/flash/install.zip
creating: system/
creating: system/xbin/
inflating: system/xbin/pnss
update-binary: line 147: script_install: not found
- Setting permissions
update-binary: line 157: unmount_magisk_img: not found
- Done
Phone is Xiaomi Mi 9T (davinci)
Magisk 20,4
LineageOS 17,1

Categories

Resources