Related
2 days ago my g4 started to reboot without any further explaination. I tried to factory reset, wiping. Jump on another ROM. Currently running Cyanogenmod 13.
It didnt change. Sometimes i just freezes from waking up. Sometimes it reboots itself. Can be 5 minutes or 30 seconds.
I tried adb logcat and filtered fatal
Code:
$ adb logcat *:F
- waiting for device -
--------- beginning of main
--------- beginning of system
--------- beginning of crash
02-03 11:59:16.008 456 456 F libc : page record for 0xf71c604c was not found (block_size=64)
02-03 11:59:51.001 3360 3360 F libc : Fatal signal 13 (SIGPIPE), code 0 in tid 3360 (strings)
02-03 11:59:51.118 424 424 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
02-03 11:59:51.118 424 424 F DEBUG : Build fingerprint: 'lge/p1_global_com/p1:6.0/MRA58K/152940055675e:user/release-keys'
02-03 11:59:51.118 424 424 F DEBUG : Revision: '0'
02-03 11:59:51.118 424 424 F DEBUG : ABI: 'arm64'
02-03 11:59:51.118 424 424 F DEBUG : pid: 3360, tid: 3360, name: strings >>> strings <<<
02-03 11:59:51.118 424 424 F DEBUG : signal 13 (SIGPIPE), code 0 (SI_USER), fault addr --------
02-03 11:59:51.119 424 424 F DEBUG : x0 ffffffffffffffe0 x1 0000007fa4398000 x2 0000000000000009 x3 0000000000001000
02-03 11:59:51.119 424 424 F DEBUG : x4 0000000000000000 x5 0000000000000009 x6 0000007fa465ff9c x7 0000000000004001
02-03 11:59:51.119 424 424 F DEBUG : x8 0000000000000040 x9 0000000000004000 x10 0000000000000000 x11 0000000000004000
02-03 11:59:51.120 424 424 F DEBUG : x12 0000000000004001 x13 0000000000000000 x14 0000000000000001 x15 0000007fc3cee710
02-03 11:59:51.120 424 424 F DEBUG : x16 0000007fa46c34b0 x17 0000007fa465608c x18 0000000000000004 x19 0000000000000009
02-03 11:59:51.120 424 424 F DEBUG : x20 0000007fa46c6480 x21 0000000000000009 x22 0000007fa4398000 x23 0000000000681000
02-03 11:59:51.120 424 424 F DEBUG : x24 0000000000000004 x25 0000005568970bb8 x26 0000000000000fff x27 0000000000681134
02-03 11:59:51.120 424 424 F DEBUG : x28 0000000000000004 x29 0000007fc3cee670 x30 0000007fa465ffec
02-03 11:59:51.120 424 424 F DEBUG : sp 0000007fc3cee670 pc 0000007fa4656094 pstate 0000000020000000
02-03 11:59:51.123 424 424 F DEBUG :
02-03 11:59:51.123 424 424 F DEBUG : backtrace:
02-03 11:59:51.123 424 424 F DEBUG : #00 pc 0000000000069094 /system/lib64/libc.so (write+8)
02-03 11:59:51.123 424 424 F DEBUG : #01 pc 0000000000072fe8 /system/lib64/libc.so (__swrite+76)
02-03 11:59:51.123 424 424 F DEBUG : #02 pc 0000000000054ea0 /system/lib64/libc.so (__sflush+104)
02-03 11:59:51.123 424 424 F DEBUG : #03 pc 0000000000054f5c /system/lib64/libc.so (fflush+108)
02-03 11:59:51.123 424 424 F DEBUG : #04 pc 000000000000f564 /system/bin/toybox
02-03 11:59:51.123 424 424 F DEBUG : #05 pc 000000000003fa64 /system/bin/toybox
02-03 11:59:51.123 424 424 F DEBUG : #06 pc 000000000000e2b4 /system/bin/toybox
02-03 11:59:51.123 424 424 F DEBUG : #07 pc 000000000000c64c /system/bin/toybox
02-03 11:59:51.123 424 424 F DEBUG : #08 pc 000000000000c224 /system/bin/toybox
02-03 11:59:51.123 424 424 F DEBUG : #09 pc 000000000000c6c0 /system/bin/toybox (main+108)
02-03 11:59:51.123 424 424 F DEBUG : #10 pc 000000000001bcd8 /system/lib64/libc.so (__libc_init+100)
02-03 11:59:51.123 424 424 F DEBUG : #11 pc 000000000000c150 /system/bin/toybox
02-03 11:59:51.141 424 424 F DEBUG :
02-03 11:59:51.141 424 424 F DEBUG : Tombstone written to: /data/tombstones/tombstone_00
After writing this it already restarted again
this is the output from the last restart
Code:
02-03 12:09:08.518 981 2767 F libc : Fatal signal 4 (SIGILL), code 1, fault addr 0x7f9a010e8c in tid 2767 (Binder_A)
02-03 12:09:08.519 5950 6041 F libc : Fatal signal 11 (SIGSEGV), code 1, fault addr 0x58 in tid 6041 (AsyncTask #5)
02-03 12:09:08.526 3270 3943 F libc : Fatal signal 11 (SIGSEGV), code 1, fault addr 0xd5 in tid 3943 (SensorBatchThre)
02-03 12:09:08.526 981 996 F libc : Fatal signal 11 (SIGSEGV), code 1, fault addr 0xd5 in tid 996 (android.ui)
02-03 12:09:08.529 5950 5981 F libc : Fatal signal 11 (SIGSEGV), code 2, fault addr 0x7fb0ac2954 in tid 5981 (RenderThread)
02-03 12:09:08.538 1681 3545 F libc : Fatal signal 11 (SIGSEGV), code 1, fault addr 0x140 in tid 3545 (AudioIn_F)
This happened to mine and the result was a motherboard change. If a clean install of stock ROM does not fix it, then it is RMA time.
I've been researching this for the past few days and haven't found anything particularly helpful and I'm just curious to see if anyone else has tried this or has a solution. Running the "screencap" command as root on my 2 XL running 8.1 no longer works, regardless of any options; if I did my research correctly, it's complaining about the gralloc HAL not running in passthrough mode, but I don't know what to do with this information. If anyone is familiar with gralloc, here's the logcat:
Code:
12-17 21:17:18.070 6854 6854 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
12-17 21:17:18.070 6854 6854 F DEBUG : Build fingerprint: 'google/taimen/taimen:8.1.0/OPM1.171019.011/4448085:user/release-keys'
12-17 21:17:18.070 6854 6854 F DEBUG : Revision: 'rev_10'
12-17 21:17:18.070 6854 6854 F DEBUG : ABI: 'arm64'
12-17 21:17:18.070 6854 6854 F DEBUG : pid: 6850, tid: 6850, name: screencap >>> screencap <<<
12-17 21:17:18.070 6854 6854 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
12-17 21:17:18.071 6854 6854 F DEBUG : Abort message: 'gralloc-mapper must be in passthrough mode'
12-17 21:17:18.071 6854 6854 F DEBUG : x0 0000000000000000 x1 0000000000001ac2 x2 0000000000000006 x3 0000000000000008
12-17 21:17:18.071 6854 6854 F DEBUG : x4 0000000000000000 x5 0000000000000000 x6 0000000000000000 x7 7f7f7f7f7f7f7f7f
12-17 21:17:18.071 6854 6854 F DEBUG : x8 0000000000000083 x9 0000000010000000 x10 0000007fc90b9860 x11 0000000000000001
12-17 21:17:18.071 6854 6854 F DEBUG : x12 0000007fc90b9980 x13 ffffffffffffffff x14 ff00000000000000 x15 ffffffffffffffff
12-17 21:17:18.071 6854 6854 F DEBUG : x16 0000007811ed62e8 x17 0000007811e33178 x18 0000000000000001 x19 0000000000001ac2
12-17 21:17:18.071 6854 6854 F DEBUG : x20 0000000000001ac2 x21 0000000000000083 x22 0000000000000001 x23 0000000000000b40
12-17 21:17:18.071 6854 6854 F DEBUG : x24 00000000000005a0 x25 000000778f66f1c0 x26 0000007812849a40 x27 0000000000000010
12-17 21:17:18.071 6854 6854 F DEBUG : x28 0000007fc90b9f39 x29 0000007fc90b98a0 x30 0000007811e28760
12-17 21:17:18.071 6854 6854 F DEBUG : sp 0000007fc90b9860 pc 0000007811e28788 pstate 0000000060000000
12-17 21:17:18.079 6854 6854 F DEBUG :
12-17 21:17:18.079 6854 6854 F DEBUG : backtrace:
12-17 21:17:18.079 6854 6854 F DEBUG : #00 pc 000000000001d788 /system/lib64/libc.so (abort+120)
12-17 21:17:18.079 6854 6854 F DEBUG : #01 pc 0000000000007f08 /system/lib64/liblog.so (__android_log_assert+296)
12-17 21:17:18.079 6854 6854 F DEBUG : #02 pc 0000000000014290 /system/lib64/libui.so (android::Gralloc2::Mapper::Mapper()+256)
12-17 21:17:18.079 6854 6854 F DEBUG : #03 pc 0000000000017ab0 /system/lib64/libui.so (android::GraphicBufferMapper::GraphicBufferMapper()+28)
12-17 21:17:18.079 6854 6854 F DEBUG : #04 pc 00000000000154c0 /system/lib64/libui.so (android::GraphicBuffer::GraphicBuffer()+140)
12-17 21:17:18.079 6854 6854 F DEBUG : #05 pc 00000000000156d8 /system/lib64/libui.so (android::GraphicBuffer::GraphicBuffer(unsigned int, unsigned int, int, unsigned int, unsigned long, std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char>>)+68)
12-17 21:17:18.079 6854 6854 F DEBUG : #06 pc 0000000000057c60 /system/lib64/libgui.so (android::BufferQueueProducer::dequeueBuffer(int*, android::sp<android::Fence>*, unsigned int, unsigned int, int, unsigned long, unsigned long*, android::FrameEventHistoryDelta*)+2264)
12-17 21:17:18.079 6854 6854 F DEBUG : #07 pc 000000000006ba50 /system/lib64/libgui.so (android::BnGraphicBufferProducer::onTransact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+448)
12-17 21:17:18.079 6854 6854 F DEBUG : #08 pc 000000000004ae38 /system/lib64/libbinder.so (android::BBinder::transact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+136)
12-17 21:17:18.079 6854 6854 F DEBUG : #09 pc 0000000000054dec /system/lib64/libbinder.so (android::IPCThreadState::executeCommand(int)+528)
12-17 21:17:18.079 6854 6854 F DEBUG : #10 pc 00000000000556a0 /system/lib64/libbinder.so (android::IPCThreadState::waitForResponse(android::Parcel*, int*)+340)
12-17 21:17:18.079 6854 6854 F DEBUG : #11 pc 00000000000553ec /system/lib64/libbinder.so (android::IPCThreadState::transact(int, unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+224)
12-17 21:17:18.079 6854 6854 F DEBUG : #12 pc 000000000004c230 /system/lib64/libbinder.so (android::BpBinder::transact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+72)
12-17 21:17:18.079 6854 6854 F DEBUG : #13 pc 0000000000072ab4 /system/lib64/libgui.so (android::BpSurfaceComposer::captureScreen(android::sp<android::IBinder> const&, android::sp<android::IGraphicBufferProducer> const&, android::Rect, unsigned int, unsigned int, int, int, bool, android::ISurfaceComposer::Rotation)+364)
12-17 21:17:18.079 6854 6854 F DEBUG : #14 pc 00000000000865ac /system/lib64/libgui.so (android::ScreenshotClient::update(android::sp<android::IBinder> const&, android::Rect, unsigned int, unsigned int, int, int, bool, unsigned int)+284)
12-17 21:17:18.079 6854 6854 F DEBUG : #15 pc 0000000000001dc4 /system/bin/screencap (main+572)
12-17 21:17:18.079 6854 6854 F DEBUG : #16 pc 00000000000a1cec /system/lib64/libc.so (__libc_init+88)
12-17 21:17:18.079 6854 6854 F DEBUG : #17 pc 0000000000001ae8 /system/bin/screencap (_start_main+80)
I just flashed my mobile with LineageOS 14.1
To my surprise I see the crashes that they dont show full stack trace.
Only this:
01-03 22:44:01.189 12773 12807 F libc : Fatal signal 11 (SIGSEGV), code 1, fault addr 0x42424242 in tid 12807 (hci_thread)
Do I have to enable it somehow?
I would expect to see something like this (this I remember from Cyanogenmod and Stock Android)
02-05 16:45:13.279 307 1231 F libc : Fatal signal 11 (SIGSEGV), code 1, fault addr 0x1 in tid 1231 (netmgrd)
02-05 16:45:13.351 6570 6570 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
02-05 16:45:13.352 6570 6570 F DEBUG : CM Version: '14.1-20170131-NIGHTLY-osprey'
02-05 16:45:13.352 6570 6570 F DEBUG : Build fingerprint: 'motorola/osprey_retus_2gb/osprey_u2:6.0.1/MPI24.107-55/33:user/release-keys'
02-05 16:45:13.352 6570 6570 F DEBUG : Revision: '0'
02-05 16:45:13.352 6570 6570 F DEBUG : ABI: 'arm'
02-05 16:45:13.352 6570 6570 F DEBUG : pid: 307, tid: 1231, name: netmgrd >>> /system/bin/netmgrd <<<
02-05 16:45:13.352 6570 6570 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x1
02-05 16:45:13.352 6570 6570 F DEBUG : r0 b6b01f10 r1 00000001 r2 b6b06560 r3 00000040
02-05 16:45:13.352 6570 6570 F DEBUG : r4 b647f3fc r5 b6b06eac r6 b6b01f10 r7 b6b02d07
02-05 16:45:13.352 6570 6570 F DEBUG : r8 b5f07520 r9 b5f07500 sl 00000001 fp b6f7ea49
02-05 16:45:13.352 6570 6570 F DEBUG : ip 00000000 sp b647f000 lr b6af9ba5 pc b6af9bce cpsr 20070030
02-05 16:45:13.363 6570 6570 F DEBUG :
02-05 16:45:13.363 6570 6570 F DEBUG : backtrace:
02-05 16:45:13.363 6570 6570 F DEBUG : #00 pc 00007bce /system/vendor/lib/libnetmgr.so (netmgr_nl_decode_nlmsg+269)
02-05 16:45:13.363 6570 6570 F DEBUG : #01 pc 00020f7d /system/bin/netmgrd
02-05 16:45:13.363 6570 6570 F DEBUG : #02 pc 00033893 /system/bin/netmgrd
02-05 16:45:13.364 6570 6570 F DEBUG : #03 pc 00041b09 /system/bin/netmgrd
02-05 16:45:13.364 6570 6570 F DEBUG : #04 pc 0000bef9 /system/vendor/lib/libdsutils.so (stm2_process_input+632)
02-05 16:45:13.364 6570 6570 F DEBUG : #05 pc 0000c7dd /system/vendor/lib/libdsutils.so (stm2_instance_process_input+204)
02-05 16:45:13.364 6570 6570 F DEBUG : #06 pc 0001213d /system/bin/netmgrd
02-05 16:45:13.364 6570 6570 F DEBUG : #07 pc 00003f9f /system/vendor/lib/libdsutils.so
02-05 16:45:13.364 6570 6570 F DEBUG : #08 pc 000477d3 /system/lib/libc.so (_ZL15__pthread_startPv+22)
02-05 16:45:13.364 6570 6570 F DEBUG : #09 pc 00019b7d /system/lib/libc.so (__start_thread+6)
Thanks,
marcinguy said:
I just flashed my mobile with LineageOS 14.1...
Click to expand...
Click to collapse
I don't have this device but, your best bet is to post this question within the following Official LineageOS thread for your device.
https://forum.xda-developers.com/showthread.php?t=3466246
Good Luck!
~~~~~~~~~~~~~~~
I DO NOT provide support via PM unless asked/requested by myself. PLEASE keep it in the threads where everyone can share.
Thanks!
Actually it is a general Question in regards to LineageOS 14.1.
The device I use is S3 Neo+ GT-9301I
I pasted sample output as I it remember from Motorola device.
So on my device, as stated I just get:
Code:
12-31 13:11:00.180 8059 8096 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 8096 (bt_workqueue)
12-31 13:11:00.181 209 209 W : debuggerd: handling request: pid=8059 uid=1002 gid=1002 tid=8096
12-31 13:11:00.220 8059 8096 F libc : failed to resend signal during crash: Operation not permitted
12-31 13:11:00.229 8335 8335 E DEBUG : unexpected waitpid response: n=8096, status=00000000
12-31 13:11:00.229 8335 8335 E : debuggerd: timed out waiting for signal
12-31 13:11:00.231 8335 8335 E : debuggerd: ptrace detach from 8096 failed: No such process
12-31 13:11:00.233 8335 8335 E : debuggerd: failed to kill process 8059: No such process
12-31 13:11:00.236 778 810 I BootReceiver: Copying /data/tombstones/tombstone_09 to DropBox (SYSTEM_TOMBSTONE)
Any ideas?
Where there is "Operation not permitted"?
Ibuprophen said:
I don't have this device but, your best bet is to post this question within the following Official LineageOS thread for your device.
https://forum.xda-developers.com/showthread.php?t=3466246
Good Luck!
~~~~~~~~~~~~~~~
I DO NOT provide support via PM unless asked/requested by myself. PLEASE keep it in the threads where everyone can share.
Click to expand...
Click to collapse
Narrowed it down to this:
int rc = syscall(SYS_rt_tgsigqueueinfo, getpid(), gettid(), signal_number, info);
if (rc != 0) {
__libc_format_log(ANDROID_LOG_FATAL, "libc", "failed to resend signal during crash: %s",
strerror(errno));
_exit(0);
}
12-31 14:35:20.070 14851 14881 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 14881 (bt_workqueue)
12-31 14:35:20.070 16288 16288 W : debuggerd: handling request: pid=14851 uid=1002 gid=1002 tid=14881
12-31 14:35:20.100 14851 14881 F libc : failed to resend signal during crash: Operation not permitted
Wondering why it gets Operation not permitted?
marcinguy said:
Thanks!
Actually it is a general Question in regards to LineageOS 14.1.
The device I use is S3 Neo+ GT-9301I
I pasted sample output as I it remember from Motorola device.
So on my device, as stated I just get:
Code:
12-31 13:11:00.180 8059 8096 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 8096 (bt_workqueue)
12-31 13:11:00.181 209 209 W : debuggerd: handling request: pid=8059 uid=1002 gid=1002 tid=8096
12-31 13:11:00.220 8059 8096 F libc : failed to resend signal during crash: Operation not permitted
12-31 13:11:00.229 8335 8335 E DEBUG : unexpected waitpid response: n=8096, status=00000000
12-31 13:11:00.229 8335 8335 E : debuggerd: timed out waiting for signal
12-31 13:11:00.231 8335 8335 E : debuggerd: ptrace detach from 8096 failed: No such process
12-31 13:11:00.233 8335 8335 E : debuggerd: failed to kill process 8059: No such process
12-31 13:11:00.236 778 810 I BootReceiver: Copying /data/tombstones/tombstone_09 to DropBox (SYSTEM_TOMBSTONE)
Any ideas?
Where there is "Operation not permitted"?
Click to expand...
Click to collapse
Figured it out.
Had to modify debbugerd (bionic) and adjust selinux.
Now debuggerd can attach to the process and show the debug info and backtrace.
marcinguy said:
Narrowed it down to this:
int rc = syscall(SYS_rt_tgsigqueueinfo, getpid(), gettid(), signal_number, info);
if (rc != 0) {
__libc_format_log(ANDROID_LOG_FATAL, "libc", "failed to resend signal during crash: %s",
strerror(errno));
_exit(0);
}
12-31 14:35:20.070 14851 14881 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 14881 (bt_workqueue)
12-31 14:35:20.070 16288 16288 W : debuggerd: handling request: pid=14851 uid=1002 gid=1002 tid=14881
12-31 14:35:20.100 14851 14881 F libc : failed to resend signal during crash: Operation not permitted
Wondering why it gets Operation not permitted?
Click to expand...
Click to collapse
Hello, I'm trying to update my pixel 2xl to the latest Android 11 using Magisk Cannary 20426 and everytime I've tried to either patch boot.img or install the magisk,zip using TWP I'm getting this similar error in my `adb logcat`. I'm able to still aceess the phone after a failure to flash the new boot.img but flashing the stock. This means that I donot have root on my phone anymore.
Things I've tried:
Reinstalling the magisk app using cannary
different usb port / cable
updated platformtools
any advice to assist in debugging this would be greatly appreciated
Code:
12-31 19:42:47.054 2244 2244 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
12-31 19:42:47.054 2244 2244 F DEBUG : Build fingerprint: 'google/taimen/taimen:11/RP1A.200720.009/6720564:user/release-keys'
12-31 19:42:47.054 2244 2244 F DEBUG : Revision: 'rev_10'
12-31 19:42:47.054 2244 2244 F DEBUG : ABI: 'arm'
12-31 19:42:47.055 2244 2244 F DEBUG : Timestamp: 1969-12-31 19:42:47-0500
12-31 19:42:47.055 2244 2244 F DEBUG : pid: 2209, tid: 2209, name: app_process32 >>> /system/bin/app_process32 <<<
12-31 19:42:47.055 2244 2244 F DEBUG : uid: 0
12-31 19:42:47.055 2244 2244 F DEBUG : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x3
12-31 19:42:47.055 2244 2244 F DEBUG : Cause: null pointer dereference
12-31 19:42:47.055 2244 2244 F DEBUG : r0 00000003 r1 00000003 r2 00000000 r3 00000005
12-31 19:42:47.055 2244 2244 F DEBUG : r4 ff955690 r5 f646837c r6 00000300 r7 f5f42f50
12-31 19:42:47.055 2244 2244 F DEBUG : r8 00000003 r9 00000000 r10 f6468680 r11 f6468310
12-31 19:42:47.055 2244 2244 F DEBUG : ip 80000000 sp ff955618 lr f63dc38b pc f644595a
12-31 19:42:47.056 2244 2244 F DEBUG : backtrace:
12-31 19:42:47.056 2244 2244 F DEBUG : #00 pc 0008395a /apex/com.android.runtime/bin/linker!ld-android.so (offset 0x1a000) (__dl_strlen_a15+22) (BuildId: 24c8b5ac82b22718002810e56f914352)
12-31 19:42:47.056 2244 2244 F DEBUG : #01 pc 0001a387 /apex/com.android.runtime/bin/linker (__dl__ZNSt3__112basic_stringIcNS_11char_traitsIcEENS_9allocatorIcEEEC2IDnEEPKc+18) (BuildId: 24c8b5ac82b22718002810e56f914352)
12-31 19:42:47.060 1203 1203 I ServiceManager: Waiting for service 'package_native' on '/dev/binder'...
12-31 19:42:47.060 1267 1267 I ServiceManager: Waiting for service 'sensorservice' on '/dev/binder'...
12-31 19:42:47.060 2178 2240 D audio_hw_primary: out_set_parameters: enter: usecase(29: audio-playback-voip) kvpairs: routing=2
12-31 19:42:47.063 2185 2185 I AudioFlinger: openOutput() this 0x7c12bc8a30, module 10 Device type:0x10000,@:, SamplingRate 48000, Format 0x000001, Channels 0x3, flags 0x10000
12-31 19:42:47.063 2178 2240 E voice_extn: voice_extn_check_and_set_incall_music_usecase: Invalid session id 0
12-31 19:42:47.064 2185 2185 I AudioFlinger: HAL output buffer size 240 frames, normal sink buffer size 960 frames
12-31 19:42:47.065 2185 2185 E AudioFlinger: Failed to add event callback
12-31 19:42:47.065 2185 2251 I AudioFlinger: AudioFlinger's thread 0x7d94509040 tid=2251 ready to run
12-31 19:42:47.065 2185 2251 W AudioFlinger: no wake lock to update, system not ready yet
12-31 19:42:47.065 2185 2251 D AudioFlinger: ro.audio.silent is ignored since no output device is set
12-31 19:42:47.065 2185 2251 W AudioFlinger: no wake lock to update, system not ready yet
12-31 19:42:47.065 2185 2251 D AudioFlinger: ro.audio.silent is ignored since no output device is set
12-31 19:42:47.094 2178 2240 D audio_hw_primary: out_set_parameters: enter: usecase(31: incall-music-uplink) kvpairs: routing=65536
12-31 19:42:47.097 2185 2252 I AudioFlinger: AudioFlinger's thread 0x7d93ddd040 tid=2252 ready to run
12-31 19:42:47.097 2185 2252 W AudioFlinger: no wake lock to update, system not ready yet
12-31 19:42:47.098 2185 2252 W AudioFlinger: no wake lock to update, system not ready yet
12-31 19:42:47.099 2185 2254 I AudioFlinger: AudioFlinger's thread 0x7d93ddd040 tid=2254 ready to run
12-31 19:42:47.100 2185 2254 W AudioFlinger: no wake lock to update, system not ready yet
12-31 19:42:47.100 2185 2254 W AudioFlinger: no wake lock to update, system not ready yet
12-31 19:42:47.101 2185 2256 I AudioFlinger: AudioFlinger's thread 0x7d93ddd040 tid=2256 ready to run
12-31 19:42:47.101 2185 2256 W AudioFlinger: no wake lock to update, system not ready yet
12-31 19:42:47.101 2185 2256 W AudioFlinger: no wake lock to update, system not ready yet
12-31 19:42:47.101 2185 2185 E APM_AudioPolicyManager: onNewAudioModulesAvailableInt: Input device list is empty!
12-31 19:42:47.103 2244 2244 E crash_dump32: unable to connect to activity manager: Connection refused
12-31 19:42:47.103 2185 2259 I AudioFlinger: AudioFlinger's thread 0x7d93ddd040 tid=2259 ready to run
12-31 19:42:47.103 2185 2258 E FastThread: did not receive expected priority boost on time
12-31 19:42:47.103 928 928 E tombstoned: Tombstone written to: /data/tombstones/tombstone_17
12-31 19:42:47.103 2246 2246 I crash_dump64: performing dump of process 2208 (target tid = 2208)
12-31 19:42:47.108 2246 2246 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
12-31 19:42:47.108 2246 2246 F DEBUG : Build fingerprint: 'google/taimen/taimen:11/RP1A.200720.009/6720564:user/release-keys'
12-31 19:42:47.108 2246 2246 F DEBUG : Revision: 'rev_10'
12-31 19:42:47.108 2246 2246 F DEBUG : ABI: 'arm64'
12-31 19:42:47.109 2185 2261 I AudioFlinger: AudioFlinger's thread 0x7d93ddd040 tid=2261 ready to run
12-31 19:42:47.109 2246 2246 F DEBUG : Timestamp: 1969-12-31 19:42:47-0500
12-31 19:42:47.109 2246 2246 F DEBUG : pid: 2208, tid: 2208, name: app_process64 >>> /system/bin/app_process64 <<<
12-31 19:42:47.109 2246 2246 F DEBUG : uid: 0
12-31 19:42:47.109 2246 2246 F DEBUG : signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x7e54c33f08
12-31 19:42:47.109 2185 2261 W AudioFlinger: no wake lock to update, system not ready yet
12-31 19:42:47.109 2246 2246 F DEBUG : x0 0000007bef61a210 x1 0000000000000101 x2 0000000000000000 x3 0000007e54891db8
12-31 19:42:47.109 2246 2246 F DEBUG : x4 0000000000000000 x5 0000007e55dc41a8 x6 f2aa9131d283ec11 x7 d61f0220f2c00fd1
12-31 19:42:47.109 2246 2246 F DEBUG : x8 0000007e54c34000 x9 0000000000000031 x10 0000007bef61a210 x11 0000000000000000
12-31 19:42:47.109 2246 2246 F DEBUG : x12 00000000000000c4 x13 f4beda67985e8bfb x14 0000000000000008 x15 0000000000000001
12-31 19:42:47.109 2246 2246 F DEBUG : x16 0000007e4ffda130 x17 0000007e54891f60 x18 0000007e54803c50 x19 95440998b0b39c01
12-31 19:42:47.109 2246 2246 F DEBUG : x20 0000007bef61a210 x21 0000007bef61a210 x22 0000007e54ad0000 x23 0000007e54ad0000
12-31 19:42:47.109 2246 2246 F DEBUG : x24 0000007e54748508 x25 0000007e5085edc2 x26 0000007e5087a000 x27 0000007d1f61128b
12-31 19:42:47.109 2246 2246 F DEBUG : x28 0000007e5085eda5 x29 0000007fc5dc2fe0
12-31 19:42:47.109 2246 2246 F DEBUG : lr 0000007e54891f98 sp 0000007fc5dc2f80 pc 0000007e54c33f08 pst 0000000000000000
trying this in the morning
https://forum.xda-developers.com/pixel-2-xl/help/stuck-flashing-patched-magisk-t4019013
Are you flashing the debug.zip (magisk)?
You could try changing the A/B slot.
Also, boot twrp.img, do not install it.
I dunno why people insist on doing things the hard way...moving the boot image to and from the device and patching it manually with magisk
If you fastboot TWRP, and just flash the magisk zip file, guess what it knows what to do and none of that slot swapping and other nonsense
Copy twrp-*.img and magisk-*.zip to folder on PC with platform tools (fastboot and adb etc), then:
Code:
ren magisk*.zip magisk.zip
ren twrp*.img twrp.img
adb reboot bootloader
fastboot boot twrp.img
adb push magisk.zip /tmp
adb shell twrp install /tmp/magisk.zip
adb reboot
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Code:
*** Disclaimer
I am not responsible for any damage you made to your device
You have been warned
crDroid is designed to increase performance and reliability over stock Android for your device
also attempting to bringing many of the best features existent today
Features:: Click Here
Flashing Instructions:: Click Here (Thanks to @mukesh22584 )
Sources::
ROM: https://github.com/crdroidandroid
Kernel: Click Here
Download::
ROM: Click Here
Changelog:: Initial Build
GAPPS: Already Included
Visit official website @ crDroid.net
Donate to help our team pay server costs
crDroid Community Telegram
crDroid Updates Channel
Hi.
Device tree for "hotdog" are you using branch 11.0?
"My way" for installing this ROM (may be working on other custom ROMs)
Originally you required to format phone - this bring problem for copying all media up and down - i have > 130 Gb photos and videos
Phone rooted, was on crDroid A11
Found working on 7T PRO TWRP - https://androidfilehost.com/?fid=17825722713688250768
Extracted boot.img and run it through Magisk - got patched boot.img
Than all is very simple - install full ROM .zip through TWRP or sideload, reboot, reboot to TWRP and install new boot.img
That's all - everything working, rooted, all files, settings and progs in place!
All took time around 10 min (copying media to PC took ages!)
This TWRP booting very slowly - ~30 sec, but managed to decrypt everything and make backups
PS! Everybody welcome to try, but i'm not responsible for any bad outcome - do it on your own risk!
In anyway you have to format phone (install fresh stock ROM through MSM will take extra 15 min)
ROM is very good, fast and stable!
Addy-95 said:
GAPPS: Already Included
Click to expand...
Click to collapse
Can you build without them?
I used to always use CrDroid 7 (android 11), and always had some issues with VERY slow storage..
Then when KOSP was released on Android 12, I used that for a while and noticed the faster storage
The difference was very much noticeable, CrDroid gives me around 5MB/s over Wifi, KOSP around 55MB/s
So I hoped this was an android 11 quirk, but after flashing this CrDroid 12 version, I noticed the same slow transfer speeds..
Since I still wanted to flash Magisk, I had to flash a boot.img anyway... and thus I chose to flash the KOSP boot.img (magisk patched), and noticed the instant higher transfer speeds
I'm not sure what's different between the two kernels, I have not tested other functionality of the KOSP kernel on CrDroid ROM, but a quick test of Wifi, Mobile (data), Bluetooth and camera all seem fine
Giblet-dono said:
I used to always use CrDroid 7 (android 11), and always had some issues with VERY slow storage..
Click to expand...
Click to collapse
The same story with A11!
But with installing A12 "My way" got full speed!
ADB file transfer over 100Mps
USB-3 cable to USB-3 port on PC
WiFi over 50Mps
There is a problem with the link. can you check ?
Cemk91 said:
There is a problem with the link. can you check ?
Click to expand...
Click to collapse
Links works fine for me, make sure you choose the ROM download link, not the ROM Source link
NFC not working
logcat:
Code:
01-21 17:35:50.074 934 12901 F libc : Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 12901 ([email protected]), pid 934 ([email protected])
01-21 17:35:50.201 12921 12921 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
01-21 17:35:50.201 12921 12921 F DEBUG : Build fingerprint: 'OnePlus/OnePlus7TPro/OnePlus7TPro:11/RKQ1.201022.002/2108161818:user/release-keys'
01-21 17:35:50.201 12921 12921 F DEBUG : Revision: '0'
01-21 17:35:50.201 12921 12921 F DEBUG : ABI: 'arm64'
01-21 17:35:50.201 12921 12921 F DEBUG : Timestamp: 2022-01-21 17:35:50.148935910+0300
01-21 17:35:50.202 12921 12921 F DEBUG : Process uptime: 0s
01-21 17:35:50.202 12921 12921 F DEBUG : Cmdline: /vendor/bin/hw/[email protected]
01-21 17:35:50.202 12921 12921 F DEBUG : pid: 934, tid: 12901, name: [email protected] >>> /vendor/bin/hw/[email protected] <<<
01-21 17:35:50.202 12921 12921 F DEBUG : uid: 1027
01-21 17:35:50.202 12921 12921 F DEBUG : signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------
01-21 17:35:50.202 12921 12921 F DEBUG : x0 0000000000000000 x1 0000000000003265 x2 0000000000000006 x3 00000075aa8077c0
01-21 17:35:50.202 12921 12921 F DEBUG : x4 0000007636788000 x5 0000007636788000 x6 0000007636788000 x7 0000000000098e74
01-21 17:35:50.202 12921 12921 F DEBUG : x8 00000000000000f0 x9 00000000000003a6 x10 ffffff00ffffffdf x11 ffffff80ffffffdf
01-21 17:35:50.202 12921 12921 F DEBUG : x12 00000075aa807290 x13 0000000000000028 x14 00000075aa807418 x15 000048d2fca3d898
01-21 17:35:50.202 12921 12921 F DEBUG : x16 000000762e93f258 x17 000000762e914f80 x18 00000075aa612000 x19 00000000000003a6
01-21 17:35:50.202 12921 12921 F DEBUG : x20 0000000000003265 x21 00000000ffffffff x22 00000075aa807892 x23 00000075aa808010
01-21 17:35:50.202 12921 12921 F DEBUG : x24 00000075aa8078a0 x25 0000000000000009 x26 0000007630afd430 x27 0000007630adb1a5
01-21 17:35:50.202 12921 12921 F DEBUG : x28 0000007630afdd70 x29 00000075aa807840
01-21 17:35:50.202 12921 12921 F DEBUG : lr 000000762e8c2cf8 sp 00000075aa8077a0 pc 000000762e8c2d28 pst 0000000000000000
01-21 17:35:50.202 12921 12921 F DEBUG : backtrace:
01-21 17:35:50.202 12921 12921 F DEBUG : #00 pc 0000000000099d28 /apex/com.android.runtime/lib64/bionic/libc.so (abort+168) (BuildId: 89026beeb59556e9546bb64e92aedf90)
01-21 17:35:50.202 12921 12921 F DEBUG : #01 pc 0000000000029a3c /vendor/lib64/nfc_nci_nxp.so (phNxpNciHal_emergency_recovery()+60) (BuildId: d9a8fcfdb46a77277369241588022875)
01-21 17:35:50.202 12921 12921 F DEBUG : #02 pc 0000000000022050 /vendor/lib64/nfc_nci_nxp.so (phNxpNciHal_ext_process_nfc_init_rsp(unsigned char*, unsigned short*)+784) (BuildId: d9a8fcfdb46a77277369241588022875)
01-21 17:35:50.202 12921 12921 F DEBUG : #03 pc 0000000000021758 /vendor/lib64/nfc_nci_nxp.so (phNxpNciHal_process_ext_rsp(unsigned char*, unsigned short*)+2664) (BuildId: d9a8fcfdb46a77277369241588022875)
01-21 17:35:50.203 12921 12921 F DEBUG : #04 pc 000000000001a6ac /vendor/lib64/nfc_nci_nxp.so (phNxpNciHal_read_complete(void*, phTmlNfc_TransactInfo*)+316) (BuildId: d9a8fcfdb46a77277369241588022875)
01-21 17:35:50.203 12921 12921 F DEBUG : #05 pc 000000000001a3e8 /vendor/lib64/nfc_nci_nxp.so (phNxpNciHal_client_thread(void*)+328) (BuildId: d9a8fcfdb46a77277369241588022875)
01-21 17:35:50.203 12921 12921 F DEBUG : #06 pc 0000000000104b8c /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+204) (BuildId: 89026beeb59556e9546bb64e92aedf90)
01-21 17:35:50.203 12921 12921 F DEBUG : #07 pc 000000000009b440 /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64) (BuildId: 89026beeb59556e9546bb64e92aedf90)
01-21 17:35:50.214 1128 2274 W NativeCrashListener: Couldn't find ProcessRecord for pid 934
01-21 17:35:50.224 3732 4016 F libc : Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 4016 (HwBinder:3732_1), pid 3732 (com.android.nfc)
01-21 17:35:50.240 1128 1823 I BootReceiver: Copying /data/tombstones/tombstone_00 to DropBox (SYSTEM_TOMBSTONE)
01-21 17:35:50.241 1128 1823 I DropBoxManagerService: add tag=SYSTEM_TOMBSTONE isTagEnabled=true flags=0x6
01-21 17:35:50.250 1128 1564 W BroadcastQueue: Background execution not allowed: receiving Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } to com.google.android.gms/.stats.service.DropBoxEntryAddedReceiver
01-21 17:35:50.250 1128 1564 W BroadcastQueue: Background execution not allowed: receiving Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } to com.google.android.gms/.chimera.GmsIntentOperationService$PersistentTrustedReceiver
01-21 17:35:50.255 1128 1823 E NativeTombstoneManager: Tombstone's UID (1027) not an app, ignoring
01-21 17:35:50.256 1128 1823 I DropBoxManagerService: add tag=SYSTEM_TOMBSTONE_PROTO isTagEnabled=true flags=0x4
01-21 17:35:50.261 1128 1564 W BroadcastQueue: Background execution not allowed: receiving Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } to com.google.android.gms/.stats.service.DropBoxEntryAddedReceiver
01-21 17:35:50.261 1128 1564 W BroadcastQueue: Background execution not allowed: receiving Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } to com.google.android.gms/.chimera.GmsIntentOperationService$PersistentTrustedReceiver
01-21 17:35:50.817 12933 12933 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
01-21 17:35:50.818 12933 12933 F DEBUG : Build fingerprint: 'OnePlus/OnePlus7TPro/OnePlus7TPro:11/RKQ1.201022.002/2108161818:user/release-keys'
01-21 17:35:50.818 12933 12933 F DEBUG : Revision: '0'
01-21 17:35:50.818 12933 12933 F DEBUG : ABI: 'arm64'
01-21 17:35:50.818 12933 12933 F DEBUG : Timestamp: 2022-01-21 17:35:50.396693539+0300
01-21 17:35:50.818 12933 12933 F DEBUG : Process uptime: 0s
01-21 17:35:50.818 12933 12933 F DEBUG : Cmdline: com.android.nfc
01-21 17:35:50.818 12933 12933 F DEBUG : pid: 3732, tid: 4016, name: HwBinder:3732_1 >>> com.android.nfc <<<
01-21 17:35:50.818 12933 12933 F DEBUG : uid: 1027
01-21 17:35:50.818 12933 12933 F DEBUG : signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------
01-21 17:35:50.818 12933 12933 F DEBUG : x0 0000000000000000 x1 0000000000000fb0 x2 0000000000000006 x3 0000006ffa2c3690
01-21 17:35:50.818 12933 12933 F DEBUG : x4 0000007059797080 x5 0000007059797080 x6 0000007059797080 x7 0000007059642dc0
01-21 17:35:50.818 12933 12933 F DEBUG : x8 00000000000000f0 x9 0000000000000e94 x10 ffffff00fffffbdf x11 ffffff80fffffbdf
01-21 17:35:50.818 12933 12933 F DEBUG : x12 0000006ffc94d22c x13 0000000000000007 x14 0000006ffa2c32e8 x15 00002c8ea875aa5a
01-21 17:35:50.818 12933 12933 F DEBUG : x16 00000070f8fd2258 x17 00000070f8fa7f80 x18 0000006ff9eb4008 x19 0000000000000e94
01-21 17:35:50.818 12933 12933 F DEBUG : x20 0000000000000fb0 x21 00000000ffffffff x22 0000006ffa4e9790 x23 000000008008720f
01-21 17:35:50.818 12933 12933 F DEBUG : x24 0000006ffa2c4000 x25 0000006ffa2c3cb0 x26 0000006ffa2c3ff8 x27 00000000000fc000
01-21 17:35:50.818 12933 12933 F DEBUG : x28 0000006ffa1cb000 x29 0000006ffa2c3710
01-21 17:35:50.818 12933 12933 F DEBUG : lr 00000070f8f55cf8 sp 0000006ffa2c3670 pc 00000070f8f55d28 pst 0000000000000000
01-21 17:35:50.818 12933 12933 F DEBUG : backtrace:
01-21 17:35:50.818 12933 12933 F DEBUG : #00 pc 0000000000099d28 /apex/com.android.runtime/lib64/bionic/libc.so (abort+168) (BuildId: 89026beeb59556e9546bb64e92aedf90)
01-21 17:35:50.818 12933 12933 F DEBUG : #01 pc 00000000000c8994 /system/lib64/libnfc-nci.so (NfcHalDeathRecipient::serviceDied(unsigned long, android::wp<android::hidl::base::V1_0::IBase> const&)+260) (BuildId: 8cbb444ca1caaf151c08c91dde2fd826)
01-21 17:35:50.818 12933 12933 F DEBUG : #02 pc 0000000000056a80 /system/lib64/libhidlbase.so (android::hardware::hidl_binder_death_recipient::binderDied(android::wp<android::hardware::IBinder> const&)+112) (BuildId: 3c8aaa4d61f2720f45004b0dcbd3cd17)
01-21 17:35:50.818 12933 12933 F DEBUG : #03 pc 0000000000078c0c /system/lib64/libhidlbase.so (android::hardware::BpHwBinder::reportOneDeath(android::hardware::BpHwBinder::Obituary const&)+124) (BuildId: 3c8aaa4d61f2720f45004b0dcbd3cd17)
01-21 17:35:50.818 12933 12933 F DEBUG : #04 pc 0000000000078b04 /system/lib64/libhidlbase.so (android::hardware::BpHwBinder::sendObituary()+196) (BuildId: 3c8aaa4d61f2720f45004b0dcbd3cd17)
01-21 17:35:50.818 12933 12933 F DEBUG : #05 pc 00000000000769fc /system/lib64/libhidlbase.so (android::hardware::IPCThreadState::getAndExecuteCommand()+2860) (BuildId: 3c8aaa4d61f2720f45004b0dcbd3cd17)
01-21 17:35:50.818 12933 12933 F DEBUG : #06 pc 0000000000075df0 /system/lib64/libhidlbase.so (android::hardware::IPCThreadState::joinThreadPool(bool)+96) (BuildId: 3c8aaa4d61f2720f45004b0dcbd3cd17)
01-21 17:35:50.818 12933 12933 F DEBUG : #07 pc 0000000000075d78 /system/lib64/libhidlbase.so (android::hardware::PoolThread::threadLoop()+24) (BuildId: 3c8aaa4d61f2720f45004b0dcbd3cd17)
01-21 17:35:50.818 12933 12933 F DEBUG : #08 pc 00000000000123a4 /system/lib64/libutils.so (android::Thread::_threadLoop(void*)+260) (BuildId: 976956de34b149071d3fc12c09b86d86)
01-21 17:35:50.818 12933 12933 F DEBUG : #09 pc 00000000000bc950 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::javaThreadShell(void*)+144) (BuildId: bfc9c365ddfcf8f1bd2511d931bc86a3)
01-21 17:35:50.818 12933 12933 F DEBUG : #10 pc 0000000000011bf4 /system/lib64/libutils.so (thread_data_t::trampoline(thread_data_t const*)+404) (BuildId: 976956de34b149071d3fc12c09b86d86)
01-21 17:35:50.818 12933 12933 F DEBUG : #11 pc 0000000000104b8c /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+204) (BuildId: 89026beeb59556e9546bb64e92aedf90)
01-21 17:35:50.818 12933 12933 F DEBUG : #12 pc 000000000009b440 /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+64) (BuildId: 89026beeb59556e9546bb64e92aedf90)
01-21 17:35:50.852 1128 1823 I BootReceiver: Copying /data/tombstones/tombstone_01 to DropBox (SYSTEM_TOMBSTONE)
01-21 17:35:50.852 1128 1823 I DropBoxManagerService: add tag=SYSTEM_TOMBSTONE isTagEnabled=true flags=0x6
01-21 17:35:50.859 1128 1564 W BroadcastQueue: Background execution not allowed: receiving Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } to com.google.android.gms/.stats.service.DropBoxEntryAddedReceiver
01-21 17:35:50.859 1128 1564 W BroadcastQueue: Background execution not allowed: receiving Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } to com.google.android.gms/.chimera.GmsIntentOperationService$PersistentTrustedReceiver
01-21 17:35:50.875 1128 1823 E NativeTombstoneManager: Tombstone's UID (1027) not an app, ignoring
01-21 17:35:50.876 1128 1823 I DropBoxManagerService: add tag=SYSTEM_TOMBSTONE_PROTO isTagEnabled=true flags=0x4
01-21 17:35:50.900 1128 1564 W BroadcastQueue: Background execution not allowed: receiving Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } to com.google.android.gms/.stats.service.DropBoxEntryAddedReceiver
01-21 17:35:50.900 1128 1564 W BroadcastQueue: Background execution not allowed: receiving Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } to com.google.android.gms/.chimera.GmsIntentOperationService$PersistentTrustedReceiver
01-21 17:35:50.937 1128 12768 I ActivityManager: Process com.android.nfc (pid 3732) has died: pers PER
01-21 17:35:50.939 1128 12768 W ActivityManager: Re-adding persistent process ProcessRecord{71f2edb 3732:com.android.nfc/1027}
01-21 17:35:50.941 1128 12768 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 1027; state: DISABLED
Problem with SELinux:
[ 1571.481815] [20220121_17:35:44.954532]@2 type=1400 audit(1642775744.951:355): avc: denied { write } for comm="[email protected]" name="nfc" dev="dm-10" ino=273 scontext=u:r:hal_nfc_default:s0 tcontext=ubject_r:vendor_nfc_vendor_data_file:s0 tclass=dir permissive=0
Click to expand...
Click to collapse
All SELinux denials:
# dmesg | grep avc: | grep -v untrusted
hotdog:/ # dmesg | grep avc: | grep -v untrusted - Pastebin.com
Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.
pastebin.com
This commit kills [email protected]. It needs to be rolled back.
In sepolicy/vendor/hal_nfc_default.te need to add
Code:
allow hal_nfc_default vendor_nfc_vendor_data_file:dir rw_dir_perms;
At the moment, for me, the service does not fall, but payment does not occur either. The terminal began to give an error (before my changes, the terminal did not connect to the phone at all)
Perhaps they just didn't implement proper support for Google Pay on A12 ROMs yet.
I'm on Xtended and get the same behavior, NFC works but payment doesn't trigger.
I fixed the NFC. I'll post the fixes a little later.
ShevT said:
I fixed the NFC. I'll post the fixes a little later.
Click to expand...
Click to collapse
@Addy-95
Commits · 12.0 · ShEV / proprietary_vendor_oneplus_sm8150-common · GitLab
Forked from https://github.com/crdroidandroid/proprietary_vendor_oneplus_sm8150-common
gitlab.com
Commits · 12.0 · ShEV / android_device_oneplus_sm8150-common · GitLab
Fork: https://github.com/crdroidandroid/android_device_oneplus_sm8150-common
gitlab.com
Magisk module for fix nfc
@Gwolf2u, @Addy-95 - no guys, this is my job, not yours.
sm8150-common: nfc: pin firmware and update config hash (d3177598) · Commits · crDroid Android / proprietary_vendor_oneplus_sm8150-common · GitLab
GitLab.com
gitlab.com
Please correct copyright
The conflict is over. Thank you for your work!
@ShevT thanks a million for looking into and fixing the NFC regression.
And also supplying a flashable magisk fix for other roms, now that's what I call respect.
Unfortunately I've already reverted back to OOS (due to the lack of Google Pay), but I'll probably go back to A12 and flash your ROM this coming weekend!
Installed flawlessly, will start set up now. Thank your for A12.
Hi together,
Somebody know if this build will be get offical? I want to update from 7.12
Thanks a lot
@Addy-95, If you don't have time to support the project, I can take care of it.
ShevT said:
@Addy-95, If you don't have time to support the project, I can take care of it.
Click to expand...
Click to collapse
ofcourse