Pixel XL run Android O: Core dump because of ATFWD-daemon can't find out the so - Android Q&A, Help & Troubleshooting

Here's part of the log info:
02:35:55.549 6528 6528 F DEBUG : ABI: 'arm64'
02:35:55.549 6528 6528 F DEBUG : pid: 6525, tid: 6525, name: ATFWD-daemon >>> /vendor/bin/ATFWD-daemon <<<
02:35:55.549 6528 6528 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
02:35:55.552 6528 6528 F DEBUG : Abort message: 'CANNOT LINK EXECUTABLE "/vendor/bin/ATFWD-daemon": library "[email protected]" not found'
02:35:55.553 6528 6528 F DEBUG : x0 0000000000000000 x1 000000000000197d x2 0000000000000006 x3 0000000000000008
02:35:55.553 6528 6528 F DEBUG : x4 0080000000808080 x5 0080000000808080 x6 0080000000808080 x7 0000000000000010
02:35:55.553 6528 6528 F DEBUG : x8 0000000000000083 x9 b604bf4045c4800d x10 0000000000000000 x11 0000000000000001
02:35:55.553 6528 6528 F DEBUG : x12 ffffffffffffffff x13 0000000000000001 x14 0000000000000000 x15 001c6810b7c5cc82
02:35:55.553 6528 6528 F DEBUG : x16 0000000000000016 x17 0834cff49920c743 x18 0000007e51a2c010 x19 000000000000197d
02:35:55.553 6528 6528 F DEBUG : x20 000000000000197d x21 0000005ad7e2af61 x22 0000007fdc4a0078 x23 0000005ad7e2fda0
02:35:55.553 6528 6528 F DEBUG : x24 0000007e51baa280 x25 0000007e51bab800 x26 0000007e51bab860 x27 0000007fdc4a1070
02:35:55.553 6528 6528 F DEBUG : x28 0000007e51bab000 x29 0000007fdc49fc40 x30 0000007e51b529ec
02:35:55.553 6528 6528 F DEBUG : sp 0000007fdc49fc00 pc 0000007e51b61e7c pstate 0000000060000000
02:35:55.560 6528 6528 F DEBUG :
02:35:55.560 6528 6528 F DEBUG : backtrace:
02:35:55.560 6528 6528 F DEBUG : #00 pc 000000000009fe7c /system/bin/linker64 (__dl_tgkill+8)
02:35:55.560 6528 6528 F DEBUG : #01 pc 00000000000909e8 /system/bin/linker64 (__dl_abort+88)
02:35:55.560 6528 6528 F DEBUG : #02 pc 00000000000268f4 /system/bin/linker64 (__dl___libc_fatal+116)
02:35:55.566 6528 6528 F DEBUG : #03 pc 000000000001b458 /system/bin/linker64 (__dl___linker_init+3368)
02:35:55.567 6528 6528 F DEBUG : #04 pc 000000000002166c /system/bin/linker64 (_start+4)
Does anyone has the same problem? It seems can't find the [email protected].
This happens repeatedly... very boring...

The same problem as u.

Related

[HELP][DEV] Android Native Crash debugging libandroid_runtime.so

Hi guys,
i'm currently facing a weird problem in my app.
I'm trying to create Previews of my android Wear Watchface, so everybody can see how his settings will look like.
--screens attached--
However, the app crashes if i change the fragment...
This is my code to change the fragment:
Code:
private void changeFragment(int index)
{
if(index != 7 && index != 0) {
showAd();
}
FragmentTransaction ft = getFragmentManager().beginTransaction();
switch (index) {
case 0:
WizardFrameHello fragment = new WizardFrameHello();
fragment.setParentActivity(this);
if (lastFragment != null)
ft.remove(lastFragment);
ft.add(R.id.frameWizard, (Fragment) fragment);
ft.commit();
lastFragment = fragment;
break;
case 7:
WizardFrameSelectProcedure fragment7 = new WizardFrameSelectProcedure();
fragment7.setParentActivity(this);
if (lastFragment != null)
ft.remove(lastFragment);
ft.add(R.id.frameWizard, (Fragment) fragment7);
ft.commit();
lastFragment = fragment7;
break;
[...]
case 11:
WizardFrameLanguages fragment11 = new WizardFrameLanguages();
fragment11.setParentActivity(this);
if (lastFragment != null)
ft.remove(lastFragment);
ft.add(R.id.frameWizard, (Fragment) fragment11);
ft.commit();
lastFragment = fragment11;
break;
}
}
public void prevStep() {
if (index == 5 && textResource.USE_SPECIFIC) {
index = 3;
changeFragment(index);
} else if (index == 4 || index == 3) {
index = 2;
changeFragment(index);
} else if (index > 0) {
index--;
changeFragment(index);
}
}
public void setStep(int step)
{
index = step;
changeFragment(index);
}
public void nextStep() {
if (index == 3)
index = 4;
if (index < maxindex) {
index++;
changeFragment(index);
}
}
These are the dumps i got:
Code:
10-10 13:12:05.681 19246-19246/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
10-10 13:12:05.681 19246-19246/? A/DEBUG: Build fingerprint: 'OnePlus/OnePlus2/OnePlus2:6.0.1/MMB29M/1447840920:user/release-keys'
10-10 13:12:05.681 19246-19246/? A/DEBUG: Revision: '0'
10-10 13:12:05.681 19246-19246/? A/DEBUG: ABI: 'arm64'
10-10 13:12:05.681 19246-19246/? A/DEBUG: pid: 19033, tid: 19040, name: FinalizerDaemon >>> com.kenfenheuer.fancytextwatchlite <<<
10-10 13:12:05.681 19246-19246/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x50
10-10 13:12:05.681 19246-19246/? A/DEBUG: x0 0000007f64ac3268 x1 0000000000000000 x2 0000000000000001 x3 0000000000000001
10-10 13:12:05.681 19246-19246/? A/DEBUG: x4 0000000000000000 x5 0000000000000001 x6 0000000000000000 x7 0000007f868d1560
10-10 13:12:05.681 19246-19246/? A/DEBUG: x8 0000007f64ac3200 x9 0000000000000000 x10 0000000000000000 x11 0000007f84a3e398
10-10 13:12:05.681 19246-19246/? A/DEBUG: x12 0000000000000001 x13 0000000000000000 x14 0000007f84a435bc x15 0000000000000000
10-10 13:12:05.681 19246-19246/? A/DEBUG: x16 0000007f883ce660 x17 0000007f88319340 x18 0000007f7ab1ee00 x19 0000007f6fe53e40
10-10 13:12:05.681 19246-19246/? A/DEBUG: x20 0000007f6fe53e40 x21 0000007f7ab1ee00 x22 00000000718bad10 x23 00000000132d22b0
10-10 13:12:05.681 19246-19246/? A/DEBUG: x24 0000007f83cc62a8 x25 000030dc09c11582 x26 0000000071f55947 x27 0000000071affdf0
10-10 13:12:05.681 19246-19246/? A/DEBUG: x28 0000007f7ab09900 x29 0000007f83cc5eb0 x30 0000007f88319420
10-10 13:12:05.681 19246-19246/? A/DEBUG: sp 0000007f83cc5eb0 pc 0000007f8831938c pstate 0000000080000000
10-10 13:12:05.683 19246-19246/? A/DEBUG: backtrace:
10-10 13:12:05.683 19246-19246/? A/DEBUG: #00 pc 00000000000eb38c /system/lib64/libandroid_runtime.so (_ZN7android6Bitmap12doFreePixelsEv+76)
10-10 13:12:05.683 19246-19246/? A/DEBUG: #01 pc 00000000000eb41c /system/lib64/libandroid_runtime.so (_ZN7android6BitmapD1Ev+16)
10-10 13:12:05.683 19246-19246/? A/DEBUG: #02 pc 00000000000eb4f4 /system/lib64/libandroid_runtime.so (_ZN7android6Bitmap14detachFromJavaEv+52)
10-10 13:12:05.683 19246-19246/? A/DEBUG: #03 pc 00000000022e87f0 /system/framework/arm64/boot.oat (offset 0x1f30000)
10-10 09:08:25.147 30686-30686/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
10-10 09:08:25.147 30686-30686/? A/DEBUG: Build fingerprint: 'OnePlus/OnePlus2/OnePlus2:6.0.1/MMB29M/1447840920:user/release-keys'
10-10 09:08:25.147 30686-30686/? A/DEBUG: Revision: '0'
10-10 09:08:25.147 30686-30686/? A/DEBUG: ABI: 'arm64'
10-10 09:08:25.148 30686-30686/? A/DEBUG: pid: 30593, tid: 30601, name: FinalizerDaemon >>> com.kenfenheuer.fancytextwatchlite <<<
10-10 09:08:25.148 30686-30686/? A/DEBUG: signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x7f61544160
10-10 09:08:25.149 30686-30686/? A/DEBUG: x0 0000007f61544160 x1 0000007f83cc5f04 x2 0000007f61544160 x3 0000000000570000
10-10 09:08:25.149 30686-30686/? A/DEBUG: x4 0000000000430000 x5 0000000000000000 x6 0000007f84a3a000 x7 0000007f84a3c9a8
10-10 09:08:25.149 30686-30686/? A/DEBUG: x8 0000000000000035 x9 0000007f7abafba8 x10 0000000000000001 x11 0000007f84a3e398
10-10 09:08:25.149 30686-30686/? A/DEBUG: x12 0000000000000002 x13 0000000000000000 x14 0000007f83cc5f90 x15 0000000000000000
10-10 09:08:25.149 30686-30686/? A/DEBUG: x16 0000007f883cc920 x17 0000007f88096df8 x18 0000007f7abafa00 x19 0000007f61544160
10-10 09:08:25.149 30686-30686/? A/DEBUG: x20 0000007f88319514 x21 0000007f7abafa00 x22 00000000718bad10 x23 0000000012c07970
10-10 09:08:25.150 30686-30686/? A/DEBUG: x24 0000007f83cc62a8 x25 00002392d5941beb x26 0000000071f55947 x27 0000000071affdf0
10-10 09:08:25.150 30686-30686/? A/DEBUG: x28 0000007f7ab09900 x29 0000007f83cc5eb0 x30 0000007f883194d4
10-10 09:08:25.150 30686-30686/? A/DEBUG: sp 0000007f83cc5eb0 pc 0000007f88096e00 pstate 0000000020000000
10-10 09:08:25.156 30686-30686/? A/DEBUG: backtrace:
10-10 09:08:25.156 30686-30686/? A/DEBUG: #00 pc 0000000000066e00 /system/lib64/libc.so (pthread_mutex_lock+8)
10-10 09:08:25.157 30686-30686/? A/DEBUG: #01 pc 00000000000eb4d0 /system/lib64/libandroid_runtime.so (_ZN7android6Bitmap14detachFromJavaEv+16)
10-10 09:08:25.157 30686-30686/? A/DEBUG: #02 pc 00000000022e87f0 /system/framework/arm64/boot.oat (offset 0x1f30000)
10-10 12:31:11.088 11195-11195/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
10-10 12:31:11.089 11195-11195/? A/DEBUG: Build fingerprint: 'OnePlus/OnePlus2/OnePlus2:6.0.1/MMB29M/1447840920:user/release-keys'
10-10 12:31:11.089 11195-11195/? A/DEBUG: Revision: '0'
10-10 12:31:11.089 11195-11195/? A/DEBUG: ABI: 'arm64'
10-10 12:31:11.089 11195-11195/? A/DEBUG: pid: 10958, tid: 10966, name: FinalizerDaemon >>> com.kenfenheuer.fancytextwatchlite <<<
10-10 12:31:11.089 11195-11195/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x50
10-10 12:31:11.089 11195-11195/? A/DEBUG: x0 0000007f65453e68 x1 0000000000000000 x2 0000000000000001 x3 0000000000000001
10-10 12:31:11.089 11195-11195/? A/DEBUG: x4 0000000000000000 x5 0000000000000001 x6 0000000000000000 x7 0000007f868d1560
10-10 12:31:11.089 11195-11195/? A/DEBUG: x8 0000007f65453e00 x9 0000000000000000 x10 0000000000000000 x11 0000007f84a3e398
10-10 12:31:11.089 11195-11195/? A/DEBUG: x12 0000000000000001 x13 0000000000000000 x14 0000007f84a435bc x15 0000000000000000
10-10 12:31:11.089 11195-11195/? A/DEBUG: x16 0000007f883ce660 x17 0000007f88319340 x18 0000007f84efe200 x19 0000007f6fe53e40
10-10 12:31:11.089 11195-11195/? A/DEBUG: x20 0000007f6fe53e40 x21 0000007f84efe200 x22 00000000718bad10 x23 00000000130e5b50
10-10 12:31:11.089 11195-11195/? A/DEBUG: x24 0000007f83cc62a8 x25 00002ea373d55b2b x26 0000000071f55947 x27 0000000071affdf0
10-10 12:31:11.089 11195-11195/? A/DEBUG: x28 0000007f7ab09900 x29 0000007f83cc5eb0 x30 0000007f88319420
10-10 12:31:11.089 11195-11195/? A/DEBUG: sp 0000007f83cc5eb0 pc 0000007f8831938c pstate 0000000080000000
10-10 12:31:11.092 11195-11195/? A/DEBUG: backtrace:
10-10 12:31:11.092 11195-11195/? A/DEBUG: #00 pc 00000000000eb38c /system/lib64/libandroid_runtime.so (_ZN7android6Bitmap12doFreePixelsEv+76)
10-10 12:31:11.092 11195-11195/? A/DEBUG: #01 pc 00000000000eb41c /system/lib64/libandroid_runtime.so (_ZN7android6BitmapD1Ev+16)
10-10 12:31:11.092 11195-11195/? A/DEBUG: #02 pc 00000000000eb4f4 /system/lib64/libandroid_runtime.so (_ZN7android6Bitmap14detachFromJavaEv+52)
10-10 12:31:11.092 11195-11195/? A/DEBUG: #03 pc 00000000022e87f0 /system/framework/arm64/boot.oat (offset 0x1f30000)
i've already tried to get some info with android ndk-stack but no luck.
This is the output:
Code:
********** Crash dump: **********
Build fingerprint: 'OnePlus/OnePlus2/OnePlus2:6.0.1/MMB29M/1447840920:user/release-keys'
pid: 19033, tid: 19040, name: FinalizerDaemon >>> com.kenfenheuer.fancytextwatchlite <<<
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x50
Stack frame 10-10 13:12:05.683 19246-19246/? A/DEBUG: #00 pc 00000000000eb38c /system/lib64/libandroid_runtime.so (_ZN7android6Bitmap12doFreePixelsEv+76)
Stack frame 10-10 13:12:05.683 19246-19246/? A/DEBUG: #01 pc 00000000000eb41c /system/lib64/libandroid_runtime.so (_ZN7android6BitmapD1Ev+16)
Stack frame 10-10 13:12:05.683 19246-19246/? A/DEBUG: #02 pc 00000000000eb4f4 /system/lib64/libandroid_runtime.so (_ZN7android6Bitmap14detachFromJavaEv+52)
Stack frame 10-10 13:12:05.683 19246-19246/? A/DEBUG: #03 pc 00000000022e87f0 /system/framework/arm64/boot.oat (offset 0x1f30000)
which is quite saying nothing to me. it should look more like this (example):
Code:
********** Crash dump: **********
Build fingerprint: 'generic/google_sdk/generic/:2.2/FRF91/43546:eng/test-keys'
pid: 351, tid: 351 >>> /data/local/ndk-tests/crasher <<<
signal 11 (SIGSEGV), fault addr 0d9f00d8
Stack frame #00 pc 0000841e /data/local/ndk-tests/crasher : Routine zoo in /tmp/foo/crasher/jni/zoo.c:13
Stack frame #01 pc 000083fe /data/local/ndk-tests/crasher : Routine bar in /tmp/foo/crasher/jni/bar.c:5
Stack frame #02 pc 000083f6 /data/local/ndk-tests/crasher : Routine my_comparison in /tmp/foo/crasher/jni/foo.c:9
Stack frame #03 pc 000191ac /system/lib/libc.so
Stack frame #04 pc 000083ea /data/local/ndk-tests/crasher : Routine foo in /tmp/foo/crasher/jni/foo.c:14
Stack frame #05 pc 00008458 /data/local/ndk-tests/crasher : Routine main in /tmp/foo/crasher/jni/main.c:19
Stack frame #06 pc 0000d362 /system/lib/libc.so
Can you help me ?
Getting the function thats causing the error would be great.
Thanks,
Maximilian
Solved
Well,
this bug was actually caused trough Gson.
I serialized a class containing the settings and a preview bitmap, which was then deserialized to display all available settings,
once the bitmaps were getting destroyed trough garbage collector, the whole system crashed.
I got this error on my tablet, which finally let me dig deeper in my bitmap usages:
Code:
10-11 08:15:24.887 14818-14827/? E/AndroidRuntime: FATAL EXCEPTION: FinalizerWatchdogDaemon
Process: com.kenfenheuer.fancytextwatchlite, PID: 14818
java.util.concurrent.TimeoutException: android.graphics.Bitmap$BitmapFinalizer.finalize() timed out after 10 seconds
at android.graphics.Bitmap.nativeDestructor(Native Method)
at android.graphics.Bitmap.-wrap1(Bitmap.java)
at android.graphics.Bitmap$BitmapFinalizer.finalize(Bitmap.java:1668)
at java.lang.Daemons$FinalizerDaemon.doFinalize(Daemons.java:202)
at java.lang.Daemons$FinalizerDaemon.run(Daemons.java:185)
at java.lang.Thread.run(Thread.java:818)
I solved this, trough by adding transient to my bitmap:
Code:
public transient Bitmap preview;
However,
thanks for everyone who may have had a look into this.
Cheers,
Maximilian

Some APPS crashing with MTK6580 Port

Dear all,
i ported nougat to our MTK6580 Device "Cubot Note S". It works fine all, just have some issues with few apps.
I use lineage OS 14.1
They crashing and i don't know why. For Example Google Play Store crashing if i swipe to "Libary" and Opera hangs heavy into crash.
i created a logcat file with the both problems. can someone give me a hint whats the problem could be?
tell me if you need some more information
Has someone an idea how to fix this issue? i analyzed the log now and the fatal error is the main problem:
Fatal signal 6
01-17 21:51:20.102 3919 5155 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 5155 (RenderThread)
01-17 21:51:20.188 5194 5194 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
01-17 21:51:20.189 5194 5194 F DEBUG : LineageOS Version: '14.1-20180107-UNOFFICIAL-Note_S'
01-17 21:51:20.189 5194 5194 F DEBUG : Build fingerprint: 'Homtom/lineage_HT16/HT16:7.1.2/NJH47F/a9ae3a28c1:userdebug/test-keys'
01-17 21:51:20.189 5194 5194 F DEBUG : Revision: '0'
01-17 21:51:20.189 5194 5194 F DEBUG : ABI: 'arm'
01-17 21:51:20.189 5194 5194 F DEBUG : pid: 3919, tid: 5155, name: RenderThread >>> com.android.vending <<<
01-17 21:51:20.189 5194 5194 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
01-17 21:51:20.194 5194 5194 F DEBUG : Abort message: 'GL errors! frameworks/base/libs/hwui/renderthread/CanvasContext.cpp:550'
01-17 21:51:20.194 5194 5194 F DEBUG : r0 00000000 r1 00001423 r2 00000006 r3 00000008
01-17 21:51:20.194 5194 5194 F DEBUG : r4 9737f978 r5 00000006 r6 9737f920 r7 0000010c
01-17 21:51:20.194 5194 5194 F DEBUG : r8 9bbb4e40 r9 9737f83c sl 9b2c2c48 fp 00000000
01-17 21:51:20.194 5194 5194 F DEBUG : ip 0000000b sp 9737eee8 lr b5cdedd7 pc b5ce1634 cpsr 200e0010
01-17 21:51:20.211 5194 5194 F DEBUG :
01-17 21:51:20.211 5194 5194 F DEBUG : backtrace:
01-17 21:51:20.211 5194 5194 F DEBUG : #00 pc 0004a634 /system/lib/libc.so (tgkill+12)
01-17 21:51:20.211 5194 5194 F DEBUG : #01 pc 00047dd3 /system/lib/libc.so (pthread_kill+34)
01-17 21:51:20.212 5194 5194 F DEBUG : #02 pc 0001d635 /system/lib/libc.so (raise+10)
01-17 21:51:20.212 5194 5194 F DEBUG : #03 pc 00019181 /system/lib/libc.so (__libc_android_abort+34)
01-17 21:51:20.212 5194 5194 F DEBUG : #04 pc 00017138 /system/lib/libc.so (abort+4)
01-17 21:51:20.212 5194 5194 F DEBUG : #05 pc 0000c1b1 /system/lib/libcutils.so (__android_log_assert+112)
01-17 21:51:20.212 5194 5194 F DEBUG : #06 pc 00024187 /system/lib/libhwui.so
01-17 21:51:20.212 5194 5194 F DEBUG : #07 pc 00025b83 /system/lib/libhwui.so
01-17 21:51:20.212 5194 5194 F DEBUG : #08 pc 000291b1 /system/lib/libhwui.so (_ZN7android10uirenderer12renderthread12RenderThread10threadLoopEv+172)
01-17 21:51:20.212 5194 5194 F DEBUG : #09 pc 0000e3fd /system/lib/libutils.so (_ZN7android6Thread11_threadLoopEPv+140)
01-17 21:51:20.212 5194 5194 F DEBUG : #10 pc 00066d5d /system/lib/libandroid_runtime.so (_ZN7android14AndroidRuntime15javaThreadShellEPv+80)
01-17 21:51:20.212 5194 5194 F DEBUG : #11 pc 000478a3 /system/lib/libc.so (_ZL15__pthread_startPv+22)
01-17 21:51:20.212 5194 5194 F DEBUG : #12 pc 00019bcd /system/lib/libc.so (__start_thread+6)
Click to expand...
Click to collapse
it's a gpu problem but i dont know which file i have to fix. maybe the system\lib\egl or the system\lib\libhwui?
The device is working with the mm kernel: 3.18.19 and the egl file is "libGLES_mali" (1.151mb) from Stock ROM (Android 6)
"Workarround "is to set the smallest width to 720 and the apps working without problems..

app on android 6.0.1 does not work, but on android 8.0 if

Hello everyone, I made a small app with packed flask for android with python-for-android. The funny thing is that the app compiled for armeabi-v7a, in android 8.0 works perfectly, but in android 6.0.1 it does not work (the phone with android 8.0 is an arm-64 and the phone with 6.0.1 is an armeabi-v7a) . I have connected by ADB and I have extracted the logcat. As I have been able to interpret there is a process that gives error, but I do not finish understanding why it fails.
Code:
cat logcat | grep 765
04-25 22:33:36.733 765 765 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
04-25 22:33:36.733 765 765 F DEBUG : Build fingerprint: 'samsung/trltexx/trlte:6.0.1/MMB29M/N910FXXU1DQL2:user/release-keys'
04-25 22:33:36.733 765 765 F DEBUG : Revision: '0'
04-25 22:33:36.733 765 765 F DEBUG : ABI: 'arm'
04-25 22:33:36.733 765 765 F DEBUG : pid: 23699, tid: 23978, name: PythonThread >>> org.sanelectric.sanelectric <<<
04-25 22:33:36.733 765 765 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
04-25 22:33:36.753 765 765 F DEBUG : r0 00000000 r1 00005daa r2 00000006 r3 9cfc2978
04-25 22:33:36.753 765 765 F DEBUG : r4 9cfc2980 r5 9cfc2930 r6 00000000 r7 0000010c
04-25 22:33:36.753 765 765 F DEBUG : r8 00000002 r9 9def988a sl 9cfc2148 fp 9cfc1e78
04-25 22:33:36.753 765 765 F DEBUG : ip 00000006 sp 9cfc1e00 lr b6d1dc11 pc b6d20000 cpsr 400f0010
04-25 22:33:36.763 765 765 F DEBUG :
04-25 22:33:36.763 765 765 F DEBUG : backtrace:
04-25 22:33:36.763 765 765 F DEBUG : #00 pc 00042000 /system/lib/libc.so (tgkill+12)
04-25 22:33:36.763 765 765 F DEBUG : #01 pc 0003fc0d /system/lib/libc.so (pthread_kill+32)
04-25 22:33:36.763 765 765 F DEBUG : #02 pc 0001c397 /system/lib/libc.so (raise+10)
04-25 22:33:36.763 765 765 F DEBUG : #03 pc 00019615 /system/lib/libc.so (__libc_android_abort+34)
04-25 22:33:36.763 765 765 F DEBUG : #04 pc 00017568 /system/lib/libc.so (abort+4)
04-25 22:33:36.763 765 765 F DEBUG : #05 pc 001c7db8 /data/app/org.sanelectric.sanelectric-1/lib/arm/libpython3.7m.so (offset 0x83000)
04-25 22:33:37.873 765 765 F DEBUG :
04-25 22:33:37.873 765 765 F DEBUG : Tombstone written to: /data/tombstones/tombstone_06
04-25 22:33:37.873 765 765 E DEBUG : AM write failed: Broken pipe
04-25 22:33:37.873 765 765 E : ro.product_ship = true
04-25 22:33:37.873 765 765 E : ro.debug_level = 0x4f4c
04-25 22:33:37.873 765 765 E : sys.mobilecare.preload = false
Code:
cat logcat | grep PythonThread
04-25 22:33:36.663 23699 23978 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 23978 (PythonThread)
04-25 22:33:36.733 765 765 F DEBUG : pid: 23699, tid: 23978, name: PythonThread >>> org.sanelectric.sanelectric <<<
04-25 22:33:37.883 3953 3953 E audit : type=1701 msg=audit(1556224417.873:2372): auid=4294967295 uid=10248 gid=10248 ses=4294967295 subj=u:r:untrusted_app:s0:c512,c768 pid=23978 comm="PythonThread" reason="memory violation" sig=6
Thanks in advance

Random system crashes on OnePlus 5T apparently caused by camera

The system randomly crashes on my OnePlus 5T, it just hangs for a few seconds and then does a reboot (sometimes only a soft reboot). I'm running OxygenOS Open Beta 33 (Android 9) with ElementalX, Magisk and EdXposed. I've finally managed to capture a logcat and it seems like it's something related to the camera, even though I don't actively use it when the crash happens, and I don't have any camera-specific mods installed.
Logcat
07-23 12:27:29.692 1834 11714 F libc : Fatal signal 6 (SIGABRT), code -6 (SI_TKILL) in tid 11714 (Binder:1834_1B), pid 1834 (system_server)
07-23 12:27:29.896 1834 7981 W ActivityManager: Permission Denial: Accessing service ComponentInfo{com.google.android.music/com.google.android.music.dial.DialMediaRoutePro viderService} from pid=4124, uid=10023 that is not exported from uid 10068
07-23 12:27:29.902 15952 15952 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
07-23 12:27:29.902 15952 15952 F DEBUG : Build fingerprint: 'OnePlus/OnePlus5T/OnePlus5T:9/PKQ1.180716.001/1906100000:user/release-keys'
07-23 12:27:29.902 15952 15952 F DEBUG : Revision: '0'
07-23 12:27:29.902 15952 15952 F DEBUG : ABI: 'arm64'
07-23 12:27:29.902 15952 15952 F DEBUG : pid: 1834, tid: 11714, name: Binder:1834_1B >>> system_server <<<
07-23 12:27:29.902 15952 15952 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
07-23 12:27:29.902 15952 15952 F DEBUG : Abort message: 'monitor.cc:1157] Invalid monitor state ForwardingAddress'
07-23 12:27:29.902 15952 15952 F DEBUG : x0 0000000000000000 x1 0000000000002dc2 x2 0000000000000006 x3 0000000000000008
07-23 12:27:29.902 15952 15952 F DEBUG : x4 000000713de59100 x5 000000713de59100 x6 000000713de59100 x7 000000713de59380
07-23 12:27:29.902 15952 15952 F DEBUG : x8 0000000000000083 x9 46f83f518cc1e292 x10 0000000000000000 x11 fffffffc7ffffbdf
07-23 12:27:29.902 15952 15952 F DEBUG : x12 0000000000000001 x13 000000713de594c0 x14 0000000000000000 x15 00000071e72dd000
07-23 12:27:29.902 15952 15952 F DEBUG : x16 00000071e72d12a8 x17 00000071e71f0954 x18 0000000000000000 x19 000000000000072a
07-23 12:27:29.902 15952 15952 F DEBUG : x20 0000000000002dc2 x21 0000007132592380 x22 00000071324ab000 x23 000000716131d608
07-23 12:27:29.902 15952 15952 F DEBUG : x24 000000000000000b x25 000000716131f048 x26 0000000000000000 x27 00000000c2dc8004
07-23 12:27:29.902 15952 15952 F DEBUG : x28 0000007132fff588 x29 0000007132ffe760
07-23 12:27:29.902 15952 15952 F DEBUG : sp 0000007132ffe720 lr 00000071e71e4084 pc 00000071e71e40ac
07-23 12:27:29.910 1834 1966 E NotificationService: Suppressing notification from package by user request. Package: net.dinglisch.android.taskerm isGroupBlocked: false isRankingImportanceNone: true isRecordImportanceNone: false
07-23 12:27:29.973 15952 15952 F DEBUG :
07-23 12:27:29.973 15952 15952 F DEBUG : backtrace:
07-23 12:27:29.973 15952 15952 F DEBUG : #00 pc 00000000000220ac /system/lib64/libc.so (abort+116)
07-23 12:27:29.973 15952 15952 F DEBUG : #01 pc 00000000004645d8 /system/lib64/libart.so (offset 0x43d000) (art::Runtime::Abort(char const*)+1196)
07-23 12:27:29.973 15952 15952 F DEBUG : #02 pc 0000000000008ce0 /system/lib64/libbase.so (android::base::LogMessage::~LogMessage()+724)
07-23 12:27:29.973 15952 15952 F DEBUG : #03 pc 00000000003be624 /system/lib64/libart.so (offset 0x374000) (art::Monitor::MonitorEnter(art::Thread*, art::mirror:bject*, bool)+1456)
07-23 12:27:29.973 15952 15952 F DEBUG : #04 pc 0000000000514b90 /system/lib64/libart.so (offset 0x43e000) (artLockObjectFromCode+36)
07-23 12:27:29.973 15952 15952 F DEBUG : #05 pc 0000000000555c98 /system/lib64/libart.so (offset 0x43e000) (art_quick_lock_object+152)
07-23 12:27:29.973 15952 15952 F DEBUG : #06 pc 0000000000abf000 /system/framework/arm64/boot-framework.oat (offset 0x3da000) (android.os.BaseBundle.writeToParcelInner+160)
07-23 12:27:29.973 15952 15952 F DEBUG : #07 pc 0000000000c1bba0 /system/framework/arm64/boot-framework.oat (offset 0x3da000) (android.os.Bundle.writeToParcel+128)
07-23 12:27:29.973 15952 15952 F DEBUG : #08 pc 0000000000ad8d54 /system/framework/arm64/boot-framework.oat (offset 0x3da000) (android.os.Parcel.writeBundle+116)
07-23 12:27:29.973 15952 15952 F DEBUG : #09 pc 0000000000a19440 /system/framework/arm64/boot-framework.oat (offset 0x3da000) (android.content.ContentProviderNative.onTransact+2272)
07-23 12:27:29.973 15952 15952 F DEBUG : #10 pc 0000000000c17e18 /system/framework/arm64/boot-framework.oat (offset 0x3da000) (android.os.Binder.execTransact+600)
07-23 12:27:29.973 15952 15952 F DEBUG : #11 pc 0000000000555788 /system/lib64/libart.so (offset 0x43e000) (art_quick_invoke_stub+584)
07-23 12:27:29.973 15952 15952 F DEBUG : #12 pc 00000000000cf6c8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)
07-23 12:27:29.973 15952 15952 F DEBUG : #13 pc 000000000045cd00 /system/lib64/libart.so (offset 0x374000) (art:anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art:anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)
07-23 12:27:29.973 15952 15952 F DEBUG : #14 pc 000000000045e094 /system/lib64/libart.so (offset 0x374000) (art::InvokeVirtualOrInterfaceWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+440)
07-23 12:27:29.973 15952 15952 F DEBUG : #15 pc 0000000000333df0 /system/lib64/libart.so (offset 0x20c000) (art::JNI::CallBooleanMethodV(_JNIEnv*, _jobject*, _jmethodID*, std::__va_list)+656)
07-23 12:27:29.973 15952 15952 F DEBUG : #16 pc 00000000000c5ec8 /system/lib64/libandroid_runtime.so (_JNIEnv::CallBooleanMethod(_jobject*, _jmethodID*, ...)+116)
07-23 12:27:29.973 15952 15952 F DEBUG : #17 pc 00000000001376dc /system/lib64/libandroid_runtime.so (JavaBBinder:nTransact(unsigned int, android:arcel const&, android:arcel*, unsigned int)+156)
07-23 12:27:29.973 15952 15952 F DEBUG : #18 pc 000000000004fd2c /system/lib64/libbinder.so (android::BBinder::transact(unsigned int, android:arcel const&, android:arcel*, unsigned int)+136)
07-23 12:27:29.973 15952 15952 F DEBUG : #19 pc 000000000005d558 /system/lib64/libbinder.so (android::IPCThreadState::executeCommand(int)+520)
07-23 12:27:29.973 15952 15952 F DEBUG : #20 pc 000000000005d29c /system/lib64/libbinder.so (android::IPCThreadState::getAndExecuteCommand()+156)
07-23 12:27:29.973 15952 15952 F DEBUG : #21 pc 000000000005d98c /system/lib64/libbinder.so (android::IPCThreadState::joinThreadPool(bool)+108)
07-23 12:27:29.973 15952 15952 F DEBUG : #22 pc 0000000000080074 /system/lib64/libbinder.so (android:oolThread::threadLoop()+24)
07-23 12:27:29.973 15952 15952 F DEBUG : #23 pc 00000000000100dc /system/lib64/libutils.so (android::Thread::_threadLoop(void*)+284)
07-23 12:27:29.973 15952 15952 F DEBUG : #24 pc 00000000000b5aa0 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::javaThreadShell(void*)+140)
07-23 12:27:29.973 15952 15952 F DEBUG : #25 pc 000000000008ffc8 /system/lib64/libc.so (__pthread_start(void*)+36)
07-23 12:27:29.973 15952 15952 F DEBUG : #26 pc 0000000000023968 /system/lib64/libc.so (__start_thread+68)
07-23 12:27:31.348 1047 15920 F libc : Fatal signal 6 (SIGABRT), code -6 (SI_TKILL) in tid 15920 (CAM_strmDatProc), pid 1047 ([email protected])
07-23 12:27:31.480 16052 16052 I wificond: wificond is starting up...
07-23 12:27:31.534 16045 16045 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
07-23 12:27:31.534 16045 16045 F DEBUG : Build fingerprint: 'OnePlus/OnePlus5T/OnePlus5T:9/PKQ1.180716.001/1906100000:user/release-keys'
07-23 12:27:31.534 16045 16045 F DEBUG : Revision: '0'
07-23 12:27:31.534 16045 16045 F DEBUG : ABI: 'arm'
07-23 12:27:31.534 16045 16045 F DEBUG : pid: 1047, tid: 15920, name: CAM_strmDatProc >>> /vendor/bin/hw/[email protected] <<<
07-23 12:27:31.534 16045 16045 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
07-23 12:27:31.534 16045 16045 F DEBUG : Abort message: 'Status.cpp:142] Attempted to retrieve value from failed HIDL call: Status(EX_TRANSACTION_FAILED): 'DEAD_OBJECT: ''
07-23 12:27:31.534 16045 16045 F DEBUG : r0 00000000 r1 00003e30 r2 00000006 r3 00000008
07-23 12:27:31.534 16045 16045 F DEBUG : r4 00000417 r5 00003e30 r6 dc99b644 r7 0000010c
07-23 12:27:31.534 16045 16045 F DEBUG : r8 dc99b9c8 r9 00000000 r10 f4c31d4c r11 e1ec4cc0
07-23 12:27:31.534 16045 16045 F DEBUG : ip f47233cc sp dc99b630 lr f468eb7d pc f4684fde
07-23 12:27:31.565 16045 16045 F DEBUG :
07-23 12:27:31.565 16045 16045 F DEBUG : backtrace:
07-23 12:27:31.565 16045 16045 F DEBUG : #00 pc 0001cfde /system/lib/libc.so (abort+58)
07-23 12:27:31.565 16045 16045 F DEBUG : #01 pc 000069f7 /system/lib/vndk-sp-28/libbase.so (android::base:efaultAborter(char const*)+6)
07-23 12:27:31.565 16045 16045 F DEBUG : #02 pc 00007267 /system/lib/vndk-sp-28/libbase.so (android::base::LogMessage::~LogMessage()+494)
07-23 12:27:31.565 16045 16045 F DEBUG : #03 pc 00006ba3 /system/lib/vndk-sp-28/libhidlbase.so (android::hardware::details::return_status::assertOk() const+162)
07-23 12:27:31.565 16045 16045 F DEBUG : #04 pc 0000d615 /vendor/lib/[email protected] (android::hardware::camera::device::V1_0::implementation::CameraDevice::sEnqueueBuffer(preview_stream_ops*, native_handle const**)+160)
07-23 12:27:31.565 16045 16045 F DEBUG : #05 pc 000a3c61 /vendor/lib/hw/camera.msm8998.so (qcamera::QCameraGrallocMemory::enqueueBuffer(unsigned int, long long)+92)
07-23 12:27:31.565 16045 16045 F DEBUG : #06 pc 000b91d9 /vendor/lib/hw/camera.msm8998.so (qcamera::QCamera2HardwareInterface:review_stream_cb_routine(mm_camera_super_buf_t*, qcamera::QCameraStream*, void*)+1124)
07-23 12:27:31.565 16045 16045 F DEBUG : #07 pc 000ad541 /vendor/lib/hw/camera.msm8998.so (qcamera::QCameraStream::dataProcRoutine(void*)+148)
07-23 12:27:31.565 16045 16045 F DEBUG : #08 pc 00072c51 /system/lib/libc.so (__pthread_start(void*)+22)
07-23 12:27:31.565 16045 16045 F DEBUG : #09 pc 0001e005 /system/lib/libc.so (__start_thread+24)
07-23 12:27:32.251 16052 16052 W wificond: No handler for scan result notification from interface with index: 26
07-23 12:27:32.270 16049 16092 F libc : Fatal signal 6 (SIGABRT), code -6 (SI_TKILL) in tid 16092 (HwBinder:16049_), pid 16049 (cameraserver)
07-23 12:27:32.323 16145 16145 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
07-23 12:27:32.323 16145 16145 F DEBUG : Build fingerprint: 'OnePlus/OnePlus5T/OnePlus5T:9/PKQ1.180716.001/1906100000:user/release-keys'
07-23 12:27:32.323 16145 16145 F DEBUG : Revision: '0'
07-23 12:27:32.323 16145 16145 F DEBUG : ABI: 'arm'
07-23 12:27:32.323 16145 16145 F DEBUG : pid: 16049, tid: 16092, name: HwBinder:16049_ >>> /system/bin/cameraserver <<<
07-23 12:27:32.323 16145 16145 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
07-23 12:27:32.323 16145 16145 F DEBUG : r0 00000000 r1 00003edc r2 00000006 r3 f4e13180
07-23 12:27:32.323 16145 16145 F DEBUG : r4 f4e13180 r5 f5d03ff5 r6 f69e24d0 r7 0000010c
07-23 12:27:32.323 16145 16145 F DEBUG : r8 f4083408 r9 f3f81920 r10 00000001 r11 f3f8192c
07-23 12:27:32.323 16145 16145 F DEBUG : ip f69b6125 sp f3f816e0 lr f5d03fd3 pc f68d5a94
07-23 12:27:32.938 16145 16145 F DEBUG :
07-23 12:27:32.938 16145 16145 F DEBUG : backtrace:
07-23 12:27:32.938 16145 16145 F DEBUG : #00 pc 00062a94 /system/lib/libc.so (tgkill+12)
07-23 12:27:32.938 16145 16145 F DEBUG : #01 pc 00096fcf /system/lib/libcameraservice.so (android::CameraProviderManager:roviderInfo::serviceDied(unsigned long long, android::wp<android::hidl::base::V1_0::IBase> const&)+74)
07-23 12:27:32.938 16145 16145 F DEBUG : #02 pc 00097001 /system/lib/libcameraservice.so (_ZTv0_n16_N7android21CameraProviderManager12ProviderInfo11serviceDiedEyRKNS_2wpINS_4hidl4base4V1_05IBaseEEE+12)
07-23 12:27:32.938 16145 16145 F DEBUG : #03 pc 0001c167 /system/lib/libhidltransport.so (android::hardware::hidl_binder_death_recipient::binderDied(android::wp<android::hardware::IBinder> const&)+66)
07-23 12:27:32.938 16145 16145 F DEBUG : #04 pc 0000dda5 /system/lib/libhwbinder.so (android::hardware::BpHwBinder::reportOneDeath(android::hardware::BpHwBinder:bituary const&)+80)
07-23 12:27:32.938 16145 16145 F DEBUG : #05 pc 0000dd3d /system/lib/libhwbinder.so (android::hardware::BpHwBinder::sendObituary()+336)
07-23 12:27:32.938 16145 16145 F DEBUG : #06 pc 00014253 /system/lib/libhwbinder.so (android::hardware::IPCThreadState::executeCommand(int)+1022)
07-23 12:27:32.938 16145 16145 F DEBUG : #07 pc 00013d57 /system/lib/libhwbinder.so (android::hardware::IPCThreadState::getAndExecuteCommand()+98)
07-23 12:27:32.938 16145 16145 F DEBUG : #08 pc 0000e461 /system/lib/libhwbinder.so (android::hardware::IPCThreadState::joinThreadPool(bool)+64)
07-23 12:27:32.938 16145 16145 F DEBUG : #09 pc 00011355 /system/lib/libhwbinder.so
07-23 12:27:32.938 16145 16145 F DEBUG : #10 pc 0000c6af /system/lib/libutils.so (android::Thread::_threadLoop(void*)+202)
07-23 12:27:32.938 16145 16145 F DEBUG : #11 pc 00072c51 /system/lib/libc.so (__pthread_start(void*)+22)
07-23 12:27:32.938 16145 16145 F DEBUG : #12 pc 0001e005 /system/lib/libc.so (__start_thread+24)
Click to expand...
Click to collapse

Unable to disable verity on Pixel 2 running locally built Android 11

I have built the android-11.0.0_r1 branch for Pixel 2 and successfully managed to flash the system build. Everything seems to work fine, but when I try to disable verity so I can get write access to partitions, I get a crash during boot.
I run the following commands after flashing the system images:
adb root
adb disable-verity
adb reboot
During boot, I get stuck in a loop with the following crash:
09-23 10:05:55.521 1809 1809 F DEBUG : Build fingerprint: 'Android/aosp_walleye/walleye:11/RP1A.200720.009/eng.eweste.20200909.110018:userdebug/test-keys'
09-23 10:05:55.521 1809 1809 F DEBUG : Revision: 'MP1'
09-23 10:05:55.521 1809 1809 F DEBUG : ABI: 'arm64'
09-23 10:05:55.521 1809 1809 F DEBUG : Timestamp: 2020-09-23 10:05:55+0200
09-23 10:05:55.521 1809 1809 F DEBUG : pid: 1801, tid: 1801, name: surfaceflinger >>> /system/bin/surfaceflinger <<<
09-23 10:05:55.521 1809 1809 F DEBUG : uid: 1000
09-23 10:05:55.521 1809 1809 F DEBUG : signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------
09-23 10:05:55.521 1809 1809 F DEBUG : Abort message: 'eglQueryStringImplementationANDROID(EGL_VERSION) failed'
09-23 10:05:55.521 1809 1809 F DEBUG : x0 0000000000000000 x1 0000000000000709 x2 0000000000000006 x3 0000007fd98b0aa0
09-23 10:05:55.521 1809 1809 F DEBUG : x4 fefefefefefefeff x5 fefefefefefefeff x6 fefefefefefefeff x7 7f7f7f7f7f7f7f7f
09-23 10:05:55.521 1809 1809 F DEBUG : x8 00000000000000f0 x9 00000075de4667f8 x10 ffffff80ffffffdf x11 0000000000000001
09-23 10:05:55.521 1809 1809 F DEBUG : x12 0000007fd98b0a70 x13 0000000000000038 x14 0000007fd98b0c40 x15 001e3838963d3b74
09-23 10:05:55.521 1809 1809 F DEBUG : x16 00000075de4ffc80 x17 00000075de4e0f20 x18 00000075df930000 x19 00000000000000ac
09-23 10:05:55.521 1809 1809 F DEBUG : x20 0000000000000709 x21 00000000000000b2 x22 0000000000000709 x23 00000000ffffffff
09-23 10:05:55.521 1809 1809 F DEBUG : x24 0000000000000002 x25 0000000000000001 x26 0000000000000000 x27 0000000000000000
09-23 10:05:55.521 1809 1809 F DEBUG : x28 0000000000000000 x29 0000007fd98b0b20
09-23 10:05:55.521 1809 1809 F DEBUG : lr 00000075de4940c4 sp 0000007fd98b0a80 pc 00000075de4940f4 pst 0000000000000000
09-23 10:05:55.534 1809 1809 F DEBUG : backtrace:
09-23 10:05:55.535 1809 1809 F DEBUG : #00 pc 000000000004e0f4 /apex/com.android.runtime/lib64/bionic/libc.so (abort+180) (BuildId: c78cdff5b820a550771130d6bde95081)
09-23 10:05:55.535 1809 1809 F DEBUG : #01 pc 0000000000006334 /system/lib64/liblog.so (__android_log_default_aborter+12) (BuildId: c92329feece7a2d7fa4d9fb6acc815f9)
09-23 10:05:55.535 1809 1809 F DEBUG : #02 pc 0000000000006ec8 /system/lib64/liblog.so (__android_log_assert+336) (BuildId: c92329feece7a2d7fa4d9fb6acc815f9)
09-23 10:05:55.535 1809 1809 F DEBUG : #03 pc 000000000018b900 /system/lib64/libsurfaceflinger.so (android::renderengine::gl::GLESRenderEngine::create(android::renderengine::RenderEngineCreationArgs const&)+4000) (BuildId: ec25c5bad8ba139118d5f31ae1ba154c)
09-23 10:05:55.535 1809 1809 F DEBUG : #04 pc 000000000018a808 /system/lib64/libsurfaceflinger.so (android::renderengine::RenderEngine::create(android::renderengine::RenderEngineCreationArgs const&)+168) (BuildId: ec25c5bad8ba139118d5f31ae1ba154c)
09-23 10:05:55.535 1809 1809 F DEBUG : #05 pc 000000000010a280 /system/lib64/libsurfaceflinger.so (android::SurfaceFlinger::init()+184) (BuildId: ec25c5bad8ba139118d5f31ae1ba154c)
09-23 10:05:55.535 1809 1809 F DEBUG : #06 pc 00000000000021a8 /system/bin/surfaceflinger (main+352) (BuildId: 90f19aac502ae7e05183738dd9ef97d1)
09-23 10:05:55.535 1809 1809 F DEBUG : #07 pc 00000000000495b4 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: c78cdff5b820a550771130d6bde95081)
If I enable verity again (using adb enable-verity) I can successfully boot the device.
Does anyone know how I can get past this?
When it comes to mod / hack Android 8 and higher as 1st thing of all things dm-verity must get disabled in order to tamper files in /system and/or /vendor partition.
That's how I would do it:
Code:
adb devices
adb shell "getenforce"
adb shell "getprop partition.system.verified"
adb shell "getprop partition.vendor.verified"
adb reboot
If output of 2nd subcommand is Enforcing then you must toogle SELinux policy
If output of the last 2 subcommands is 1 then you must disable dm-verity
Code:
adb devices
adb root
adb shell "setenforce 0"
adb disable-verity
adb shell "setprop partition.system.verified 0"
adb shell "setprop partition.vendor.verified 0"
adb reboot
Thank you very much for the quick response, disabling SELinux did the trick! Case closed.
jwoegerbauer said:
When it comes to mod / hack Android 8 and higher as 1st thing of all things dm-verity must get disabled in order to tamper files in /system and/or /vendor partition.
That's how I would do it:
Code:
adb devices
adb shell "getenforce"
adb shell "getprop partition.system.verified"
adb shell "getprop partition.vendor.verified"
adb reboot
If output of 2nd subcommand is Enforcing then you must toogle SELinux policy
If output of the last 2 subcommands is 1 then you must disable dm-verity
Code:
adb devices
adb root
adb shell "setenforce 0"
adb disable-verity
adb shell "setprop partition.system.verified 0"
adb shell "setprop partition.vendor.verified 0"
adb reboot
Click to expand...
Click to collapse

Categories

Resources