Access Denied finding property "hwservicemanager.ready" - ADM mode (logcat) - EMUI Bugs and Issues

Hi dears,
I have a HONOR 7A Build number AUM-L29 8.0.0.153(C185) and in ADB mode the mentioned error message appears repeatedly.
Could you help me how I can solve this case?
Thanks
You could logcat details in below:
11-13 15:05:29.602 895 895 W chargemonitor: type=1400 audit(0.0:123739): avc: denied { read } for name="ubject_r:hwservicemanager_prop:s0" dev="tmpfs" ino=682 scontext=u:r:chargemonitor:s0 tcontext=ubject_r:hwservicemanager_prop:s0 tclass=file permissive=0
11-13 15:05:29.605 895 895 W /system/bin/chargemonitor: Waited for hwservicemanager.ready for a second, waiting another...
11-13 15:05:29.605 895 895 E libc : Access denied finding property "hwservicemanager.ready"
11-13 15:05:29.606 895 895 E libc : Access denied finding property "hwservicemanager.ready"
11-13 15:05:29.602 895 895 W chargemonitor: type=1400 audit(0.0:123740): avc: denied { read } for name="ubject_r:hwservicemanager_prop:s0" dev="tmpfs" ino=682 scontext=u:r:chargemonitor:s0 tcontext=ubject_r:hwservicemanager_prop:s0 tclass=file permissive=0
11-13 15:05:30.605 895 895 W /system/bin/chargemonitor: Waited for hwservicemanager.ready for a second, waiting another...
11-13 15:05:30.602 895 895 W chargemonitor: type=1400 audit(0.0:123741): avc: denied { read } for name="ubject_r:hwservicemanager_prop:s0" dev="tmpfs" ino=682 scontext=u:r:chargemonitor:s0 tcontext=ubject_r:hwservicemanager_prop:s0 tclass=file permissive=0
11-13 15:05:30.606 895 895 E libc : Access denied finding property "hwservicemanager.ready"
11-13 15:05:30.606 895 895 E libc : Access denied finding property "hwservicemanager.ready"
11-13 15:05:30.602 895 895 W chargemonitor: type=1400 audit(0.0:123742): avc: denied { read } for name="ubject_r:hwservicemanager_prop:s0" dev="tmpfs" ino=682 scontext=u:r:chargemonitor:s0 tcontext=ubject_r:hwservicemanager_prop:s0 tclass=file permissive=0
11-13 15:05:31.606 895 895 W chargemonitor: type=1400 audit(0.0:123743): avc: denied { read } for name="ubject_r:hwservicemanager_prop:s0" dev="tmpfs" ino=682 scontext=u:r:chargemonitor:s0 tcontext=ubject_r:hwservicemanager_prop:s0 tclass=file permissive=0
11-13 15:05:31.606 895 895 W chargemonitor: type=1400 audit(0.0:123744): avc: denied { read } for name="ubject_r:hwservicemanager_prop:s0" dev="tmpfs" ino=682 scontext=u:r:chargemonitor:s0 tcontext=ubject_r:hwservicemanager_prop:s0 tclass=file permissive=0
11-13 15:05:31.606 895 895 W /system/bin/chargemonitor: Waited for hwservicemanager.ready for a second, waiting another...
11-13 15:05:31.606 895 895 E libc : Access denied finding property "hwservicemanager.ready"
11-13 15:05:31.606 895 895 E libc : Access denied finding property "hwservicemanager.ready"

[email protected]
تم الإرسال من COR-L29 باستخدام Tapatalk

Related

Help with nfc.apk

I can toggle nfc on and off but when rom first installs I get nfc service has stopped.
Here is log.
---- Aug 1, 2016 6:07:24 PM ----
08-01 18:06:02.964 628 628 I ServiceManager: service 'nfc' died
08-01 18:06:12.924 651 651 I drsd : relabeling: /data/data/com.android.nfc,com.android.nfc,platform,1027
08-01 18:06:15.864 27494 27494 I ActivityManager: Start proc com.android.nfc for added application com.android.nfc: pid=28260 uid=1027 gids={41027, 9997, 3002, 3001, 1028, 1015, 1023} abi=armeabi-v7a
08-01 18:06:15.884 2148 2148 E audit : type=1400 msg=audit(1470089175.884:5689): avc: denied { dyntransition } for pid=28260 comm="main" scontext=u:r:init:s0 tcontext=u:r:s_nfc:s0 tclass=process
08-01 18:06:15.884 2148 2148 E audit : type=1300 msg=audit(1470089175.884:5689): arch=40000028 syscall=4 per=800000 success=yes exit=13 a0=1a a1=ab69cab0 a2=d a3=b6f4225c items=0 ppid=27286 ppcomm=main pid=28260 auid=4294967295 uid=1027 gid=1027 euid=1027 suid=1027 fsuid=1027 egid=1027 sgid=1027 fsgid=1027 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process32_xposed" subj=u:r:s_nfc:s0 key=(null)
08-01 18:06:16.134 28260 28260 W ResourcesManager: Asset path '/system/framework/com.broadcom.nfc.jar' does not exist or contains no resources.
08-01 18:06:28.030 27925 27925 W ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:1686 android.content.ContextWrapper.sendBroadcast:391 android.content.ContextWrapper.sendBroadcast:391 com.android.settings.nfc.SBeamEnabler.updateState:-1 com.android.settings.nfc.SBeamEnabler.saveSbeamOn:-1
08-01 18:06:41.810 28260 30428 E SnepServer: at com.android.nfc.dhimpl.NativeLlcpServiceSocket.accept(NativeLlcpServiceSocket.java)
08-01 18:06:41.810 28260 30428 E SnepServer: at com.android.nfc.snep.SnepServer$ServerThread.run(SnepServer.java)
08-01 18:06:41.810 28260 30429 E NdefPushServer: at com.android.nfc.dhimpl.NativeLlcpServiceSocket.accept(NativeLlcpServiceSocket.java)
08-01 18:06:41.810 28260 30429 E NdefPushServer: at com.android.nfc.ndefpush.NdefPushServer$ServerThread.run(NdefPushServer.java)
08-01 18:06:41.810 28260 30431 E HandoverServer: at com.android.nfc.dhimpl.NativeLlcpServiceSocket.accept(NativeLlcpServiceSocket.java)
08-01 18:06:41.810 28260 30431 E HandoverServer: at com.android.nfc.handover.HandoverServer$ServerThread.run(HandoverServer.java)
08-01 18:06:45.180 31418 31495 I AMMetaDataParserService: Resource data:Loop for running activitycom.android.settings.nfc.NfcAdvancedRoutingSetting
08-01 18:06:45.240 31418 31495 I AMMetaDataParserService: Resource data:Loop for running activitycom.android.settings.nfc.PaymentDefaultDialog
08-01 18:06:46.070 27925 27925 W ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:1686 android.content.ContextWrapper.sendBroadcast:391 android.content.ContextWrapper.sendBroadcast:391 com.android.settings.nfc.SBeamEnabler.updateState:-1 com.android.settings.nfc.SBeamStateReceiver.onReceive:-1
08-01 18:06:49.790 27925 27925 W ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:1686 android.content.ContextWrapper.sendBroadcast:391 android.content.ContextWrapper.sendBroadcast:391 com.android.settings.nfc.SBeamEnabler.updateState:-1 com.android.settings.nfc.SBeamEnabler.saveSbeamOn:-1
---- Aug 1, 2016 6:07:24 PM ----

Flashed GDev 7.1.19 - Keystore error. Can I still find what fp sensor i have?

I was on LP GStable 8.0.6.0 (Unofficial unlocked). Recovery Flashed Gdev 7.1.19. All ok except keystore error.
Can I still correctly Identify what my fp sensor is ? I exported bug report and found below lines after respective searches
Search for FPC1020
Code:
Line 368826: [ 2.618751] Macle fpc1020_probe failed as fpsensor=2(1=fp)
Line 368827: [ 2.618763] fpc1020: probe of fpc_fpc1020.108 failed with error -1
Line 368827: [ 2.618763] fpc1020: probe of fpc_fpc1020.108 failed with error -1
Search for Goodix
Code:
Line 4784: <6>[33561.031162] [info] goodix_fb_state_chg_callback go to the goodix_fb_state_chg_callback value = 16
Line 4784: <6>[33561.031162] [info] goodix_fb_state_chg_callback go to the goodix_fb_state_chg_callback value = 16
Line 324954: [persist.sys.fp.goodix]: [0]
Line 365603: I:Unable to unlink '/data/property/persist.sys.fp.goodix'
Line 368838: [ 2.619637] goodix_fp goodix_gf318m.109: goodix fp irq gpio (0)
Line 368838: [ 2.619637] goodix_fp goodix_gf318m.109: goodix fp irq gpio (0)
Line 368838: [ 2.619637] goodix_fp goodix_gf318m.109: goodix fp irq gpio (0)
Search for Fingerprint
Code:
Line 10511: 01-23 22:01:51.096 596 596 W otad : type=1400 audit(0.0:42): avc: denied { getattr } for path="/system/bin/fingerprintd" dev="mmcblk0p24" ino=381 scontext=u:r:otad:s0 tcontext=u:object_r:fingerprintd_exec:s0 tclass=file permissive=0
Line 10511: 01-23 22:01:51.096 596 596 W otad : type=1400 audit(0.0:42): avc: denied { getattr } for path="/system/bin/fingerprintd" dev="mmcblk0p24" ino=381 scontext=u:r:otad:s0 tcontext=u:object_r:fingerprintd_exec:s0 tclass=file permissive=0
Line 10846: 01-23 22:01:52.196 593 593 I art : option[41]=-Xfingerprint:Xiaomi/kenzo/kenzo:6.0.1/MMB29M/7.1.19:user/release-keys
Line 10893: 01-23 22:01:52.355 592 592 I art : option[41]=-Xfingerprint:Xiaomi/kenzo/kenzo:6.0.1/MMB29M/7.1.19:user/release-keys
Line 13230: 01-23 22:02:04.245 1445 1445 W PackageManager: Unknown permission com.fingerprints.service.ACCESS_FINGERPRINT_MANAGER in package com.android.keyguard
Line 13230: 01-23 22:02:04.245 1445 1445 W PackageManager: Unknown permission com.fingerprints.service.ACCESS_FINGERPRINT_MANAGER in package com.android.keyguard
Line 14899: 01-23 22:02:08.964 1445 1445 E FingerprintService: Macle fpc
Line 14900: 01-23 22:02:08.965 625 625 D PermissionCache: checking android.permission.MANAGE_FINGERPRINT for uid=1000 => granted (344 us)
Line 14901: 01-23 22:02:08.965 625 625 V fingerprintd: nativeOpenHal()
Line 14902: 01-23 22:02:08.967 625 625 E HAL : hw_get_module_by_class: module name fingerprint
Line 14903: 01-23 22:02:08.968 625 625 E HAL : hw_get_module_by_class: module name fingerprint
Line 14904: 01-23 22:02:08.970 625 625 D fpc_fingerprint_hal: fpc_module_open
Line 14939: 01-23 22:02:08.985 625 625 E fpc_fingerprint_hal: fpc_module_open failed 8
Line 17853: 01-23 22:02:12.227 4717 4717 E fingerprints_service: fpce_connect() failed
Line 17856: 01-23 22:02:12.228 4717 4717 W System.err: at com.fingerprints.system.FpcD.<init>(FpcD.java:168)
Line 17857: 01-23 22:02:12.228 4717 4717 W System.err: at com.fingerprints.system.FpcD.open(FpcD.java:162)
Line 17858: 01-23 22:02:12.228 4717 4717 W System.err: at com.fingerprints.service.ServiceImpl.open(ServiceImpl.java:57)
Line 17859: 01-23 22:02:12.228 4717 4717 W System.err: at com.fingerprints.service.FingerprintService.onCreate(FingerprintService.java:48)
Line 17859: 01-23 22:02:12.228 4717 4717 W System.err: at com.fingerprints.service.FingerprintService.onCreate(FingerprintService.java:48)
Line 17859: 01-23 22:02:12.228 4717 4717 W System.err: at com.fingerprints.service.FingerprintService.onCreate(FingerprintService.java:48)
Line 20481: 01-23 22:02:15.095 3714 3727 D miui_keyguard_fingerprint: FingerprintHardware is Available :false
Line 20481: 01-23 22:02:15.095 3714 3727 D miui_keyguard_fingerprint: FingerprintHardware is Available :false
Line 20495: 01-23 22:02:15.113 3714 3727 D miui_keyguard_fingerprint: start fingerprint identify in onSystemReady
Line 20495: 01-23 22:02:15.113 3714 3727 D miui_keyguard_fingerprint: start fingerprint identify in onSystemReady
Line 21801: 01-23 22:02:16.767 3714 3714 D miui_keyguard_fingerprint: start fingerprint identify in handleShow
Line 21801: 01-23 22:02:16.767 3714 3714 D miui_keyguard_fingerprint: start fingerprint identify in handleShow
Line 21808: 01-23 22:02:16.785 1445 4104 I FingerprintState: Macle update_xml_for_fpc
Line 21809: 01-23 22:02:16.785 1445 4104 I FingerprintState: Macle we need update xml from exist xml for fpc
Line 21810: 01-23 22:02:16.785 1445 4104 I FingerprintState: Macle No settings_fingerprint
Line 21810: 01-23 22:02:16.785 1445 4104 I FingerprintState: Macle No settings_fingerprint
Line 21811: 01-23 22:02:16.785 1445 4104 I FingerprintState: Macle fpc fingerprint
Line 21811: 01-23 22:02:16.785 1445 4104 I FingerprintState: Macle fpc fingerprint
Line 208647: 01-23 22:01:51.096 596 596 I auditd : type=1400 audit(0.0:42): avc: denied { getattr } for comm="otad" path="/system/bin/fingerprintd" dev="mmcblk0p24" ino=381 scontext=u:r:otad:s0 tcontext=u:object_r:fingerprintd_exec:s0 tclass=file permissive=0
Line 208647: 01-23 22:01:51.096 596 596 I auditd : type=1400 audit(0.0:42): avc: denied { getattr } for comm="otad" path="/system/bin/fingerprintd" dev="mmcblk0p24" ino=381 scontext=u:r:otad:s0 tcontext=u:object_r:fingerprintd_exec:s0 tclass=file permissive=0
Line 324776: [init.svc.fingerprintd]: [running]
Line 325013: [ro.bootimage.build.fingerprint]: [Xiaomi/kenzo/kenzo:6.0.1/MMB29M/7.1.19:user/test-keys]
Line 325023: [ro.build.fingerprint]: [Xiaomi/kenzo/kenzo:6.0.1/MMB29M/7.1.19:user/release-keys]
Line 367538: ro.build.fingerprint=Xiaomi/kenzo/kenzo:6.0.1/MMB29T/d1795cba2f:eng/test-keys
Line 367569: ro.bootimage.build.fingerprint=Xiaomi/kenzo/kenzo:6.0.1/MMB29T/d1795cba2f:eng/test-keys
Line 368120: -permissive:fingerprint_prop=ok
Line 369747: [ 8.058762] init: Starting service 'fingerprintd'...
Line 369842: [ 8.584103] type=1400 audit(1485088674.930:41): avc: denied { getattr } for pid=629 comm="otad" path="/system/bin/fingerprintd" dev="mmcblk0p24" ino=381 scontext=u:r:otad:s0 tcontext=u:object_r:fingerprintd_exec:s0 tclass=file permissive=0
Line 369842: [ 8.584103] type=1400 audit(1485088674.930:41): avc: denied { getattr } for pid=629 comm="otad" path="/system/bin/fingerprintd" dev="mmcblk0p24" ino=381 scontext=u:r:otad:s0 tcontext=u:object_r:fingerprintd_exec:s0 tclass=file permissive=0
Line 370012: [ 8.584103] type=1400 audit(1485088674.930:41): avc: denied { getattr } for pid=629 comm="otad" path="/system/bin/fingerprintd" dev="mmcblk0p24" ino=381 scontext=u:r:otad:s0 tcontext=u:object_r:fingerprintd_exec:s0 tclass=file permissive=0
Line 370012: [ 8.584103] type=1400 audit(1485088674.930:41): avc: denied { getattr } for pid=629 comm="otad" path="/system/bin/fingerprintd" dev="mmcblk0p24" ino=381 scontext=u:r:otad:s0 tcontext=u:object_r:fingerprintd_exec:s0 tclass=file permissive=0
@B!GBOY
there are lots and lots of discussions about sensor type and how to determine yours here on xda which you can search and read for yourself also i just googled it and found this:
http://en.miui.com/thread-415270-1-1.html
i linked it here as it's a relatively easy way that doesn't required root.

cannot locate symbol referenced by

Hello, i just tried to build NitrogenOS Oreo from source and the build was successful but when i try to boot it it gets stuck in a bootloop.
i ran adb logcat and i got this
(btw im new into this)
Code:
CANNOT LINK EXECUTABLE "/system/bin/app_process32": cannot locate symbol "__android_log_security" referenced by "/system/lib/libandroid_runtime.so"...
05-17 03:14:04.859 1282 1282 W crash_dump32: type=1400 audit(0.0:92): avc: denied { execute_no_trans } for path="/system/bin/crash_dump32" dev="sde19" ino=298 scontext=u:r:crash_dump:s0 tcontext=u:object_r:crash_dump_exec:s0 tclass=file permissive=0
05-17 03:14:04.846 1269 1269 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 1269 (app_process32)
05-17 03:14:04.857 1270 1270 F libc : CANNOT LINK EXECUTABLE "/system/bin/drmserver": cannot locate symbol "__android_log_is_debuggable" referenced by "/system/lib/libcutils.so"...
05-17 03:14:04.858 1270 1270 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 1270 (drmserver)
05-17 03:14:04.862 1274 1274 F libc : CANNOT LINK EXECUTABLE "crash_dump32": cannot locate symbol "__android_log_is_loggable_len" referenced by "/system/lib/libpackagelistparser.so"...
05-17 03:14:04.862 1274 1274 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 1274 (crash_dump32)
05-17 03:14:04.864 1274 1274 F libc : crash_dump helper failed to exec
05-17 03:14:04.864 1274 1274 F libc : failed to wait for crash_dump helper: No child processes
05-17 03:14:04.865 1269 1269 F libc : crash_dump helper failed to exec
05-17 03:14:04.866 1269 1269 F libc : crash_dump helper crashed or stopped
05-17 03:14:04.869 1279 1279 F libc : CANNOT LINK EXECUTABLE "crash_dump32": cannot locate symbol "__android_log_is_loggable_len" referenced by "/system/lib/libpackagelistparser.so"...
05-17 03:14:04.869 1279 1279 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 1279 (crash_dump32)
05-17 03:14:04.859 1284 1284 W crash_dump32: type=1400 audit(0.0:93): avc: denied { execute_no_trans } for path="/system/bin/crash_dump32" dev="sde19" ino=298 scontext=u:r:crash_dump:s0 tcontext=u:object_r:crash_dump_exec:s0 tclass=file permissive=0
not quite sure how can i fix it :crying:
i was wondering if any of the developers had a similar problem when they were building a rom
i also get the same error while trying to boot CosmicOS
EDIT: I just successfully compile and boot CosmicOS nogaut version with surprisingly low amount of bugs for a first boot but it still remains to be seen if it's stable enough. It seems that the boot loop only occurs on Oreo

Boot stuck in tlk_daemon

Hello experts !!!
Built android(7.1.2) for Jetson TK1, using shieldtablet opensource binaries. The boot reaches till bootanimation and stays there for a while, then it reboots in a cycle till bootanimation, this process get repeated.
I have provided the log below, meanwhile the adb logcat stops with the messages below and adb shell no longer works.
01-01 00:25:07.690 602 602 E TLK_Daemon: failed to open device: /dev/tlk_device
01-01 00:25:12.735 603 603 E TLK_Daemon: failed to open device: /dev/tlk_device
Comparing the SERIAL LOG and LOGCAT information, the issue seems to come from TLK_DAEMON(not sure though).
There's this particular variable in BoardConfig
# Allow this variable to be overridden to n for non-secure OS build
SECURE_OS_BUILD ?= y
ifeq ($(SECURE_OS_BUILD),y)
SECURE_OS_BUILD := tlk
endif
-Tried setting it to n and built, boot stops before bootanimation.
-When android is built as secure OS (SECURE_OS_BUILD=y ) and the kernel is built with this config symbol CONFIG_TRUSTED_LITTLE_KERNEL=y . The kernel doesn't start at all.
-However when CONFIG_TRUSTED_LITTLE_KERNEL=n, android boots till bootanimation (The process I mentioned earlier ).
Is there any way to build a non-secure OS with shieldtablet binaries ?
Or someway to disable TLK_DAEMON ?
sorry couldn't post the full log, since this is my first post.
BOOT LOG:
[ 17.612341] android_work: sent uevent USB_STATE=CONNECTED
[ 17.615875] android_work: sent uevent USB_STATE=DISCONNECTED
[ 17.740329] android_work: sent uevent USB_STATE=CONNECTED
[ 17.742205] android_usb gadget: high-speed config #1: android
[ 17.742276] tegra-udc tegra-udc.0: connected to SDP
[ 17.742281] tegra-udc tegra-udc.0: notification status (0,1,0) (0x2, 0x2)
[ 17.742356] android_work: sent uevent USB_STATE=CONFIGURED
[ 18.000193] init: Starting service 'media'...
[ 18.005518] init: Starting service 'netd'...
[ 18.010719] init: Service 'logd-reinit' (pid 171) exited with status 0
[ 18.019533] init: Service 'setup_fs' (pid 173) exited with status 0
[ 18.026042] init: Service 'bt_loader' (pid 182) exited with status 0
[ 18.032668] init: Service 'tlk_daemon' (pid 183) exited with status 1
[ 18.039161] init: Service 'tlk_daemon' (pid 183) killing any children in process group
[ 18.047345] init: Service 'eks2_client' (pid 184) exited with status 234
[ 18.054461] init: Starting service 'gatekeeperd'...
[ 18.065623] init: Starting service 'perfprofd'...
[ 18.131387] healthd: No battery devices found
[ 18.135836] healthd: battery l=100 v=0 t=42.4 h=2 st=2 chg=a
[ 18.347651] type=1400 audit(1357005131.414:73): avc: denied { getattr } for pid=304 comm="chown" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.367490] type=1400 audit(1357005131.426:74): avc: denied { getattr } for pid=305 comm="chmod" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.387266] type=1400 audit(1357005131.446:75): avc: denied { getattr } for pid=309 comm="grep" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_0
[ 18.406915] type=1400 audit(1357005131.472:76): avc: denied { getattr } for pid=312 comm="chown" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.433964] type=1400 audit(1357005131.489:77): avc: denied { getattr } for pid=321 comm="chmod" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.453691] type=1400 audit(1357005131.494:78): avc: denied { getattr } for pid=323 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.485905] type=1400 audit(1357005131.516:79): avc: denied { getattr } for pid=324 comm="chown" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.507194] type=1400 audit(1357005131.539:80): avc: denied { getattr } for pid=328 comm="chmod" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.541901] type=1400 audit(1357005131.542:81): avc: denied { getattr } for pid=330 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.561670] type=1400 audit(1357005131.555:82): avc: denied { getattr } for pid=332 comm="chown" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.581603] type=1400 audit(1357005131.595:83): avc: denied { getattr } for pid=336 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.604342] type=1400 audit(1357005131.610:84): avc: denied { getattr } for pid=334 comm="chmod" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.631617] type=1400 audit(1357005131.624:85): avc: denied { getattr } for pid=340 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.664029] init: Service 'ussr_setup' (pid 185) exited with status 0
[ 18.664042] type=1400 audit(1357005131.650:86): avc: denied { getattr } for pid=344 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.664192] type=1400 audit(1357005131.683:87): avc: denied { getattr } for pid=350 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.664351] type=1400 audit(1357005131.691:88): avc: denied { getattr } for pid=347 comm="grep" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_0
[ 18.664503] type=1400 audit(1357005131.710:89): avc: denied { getattr } for pid=354 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.664648] type=1400 audit(1357005131.719:90): avc: denied { getattr } for pid=351 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=l0
[ 18.664798] type=1400 audit(1357005131.726:91): avc: denied { getattr } for pid=356 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.792378] type=1400 audit(1357005131.858:92): avc: denied { getattr } for pid=372 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.810004] audit: audit_lost=29 audit_rate_limit=20 audit_backlog_limit=64
[ 18.810007] audit: rate limit exceeded
[ 18.826679] init: Service 'set_hwui_params' (pid 180) exited with status 0
[ 19.200741] init: Starting service 'bootanim'...
[ 19.205365] tegradc tegradc.0: unblank
[ 19.346162] CPU3: unable to kill
[ 19.457901] type=1400 audit(1357005132.524:95): avc: denied { getattr } for pid=460 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=0
[ 19.489410] type=1400 audit(1357005132.556:96): avc: denied { getattr } for pid=464 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_0
[ 19.510796] type=1400 audit(1357005132.568:97): avc: denied { getattr } for pid=466 comm="ls" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_f0
[ 19.531785] type=1400 audit(1357005132.598:98): avc: denied { getattr } for pid=467 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_0
[ 19.552476] type=1400 audit(1357005132.613:99): avc: denied { getattr } for pid=473 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_0
[ 19.746283] CPU3: unable to kill
[ 19.838338] tegradc tegradc.0: blank - powerdown
[ 19.861535] tegradc tegradc.0: unblank
[ 19.862025] tegradc tegradc.0: Dev node doesn't have avdd_hdmi supply props
[ 19.862027] ------------[ cut here ]------------
[ 19.862037] WARNING: at drivers/regulator/core.c:1548 regulator_dev_lookup+0x13c/0x274()
[ 19.862040] Modules linked in:
[ 19.862044] CPU: 0 PID: 176 Comm: surfaceflinger Tainted: G W 3.10.96-nvidia-jetson-tk1 #2
[ 19.862056] [<c0016fc4>] (unwind_backtrace+0x0/0x13c) from [<c0013278>] (show_stack+0x18/0x1c)
[ 19.862064] [<c0013278>] (show_stack+0x18/0x1c) from [<c003c130>] (warn_slowpath_common+0x5c/0x74)
[ 19.862070] [<c003c130>] (warn_slowpath_common+0x5c/0x74) from [<c003c1fc>] (warn_slowpath_null+0x24/0x2c)
[ 19.862076] [<c003c1fc>] (warn_slowpath_null+0x24/0x2c) from [<c03f3e28>] (regulator_dev_lookup+0x13c/0x274)
[ 19.862083] [<c03f3e28>] (regulator_dev_lookup+0x13c/0x274) from [<c03f4f7c>] (_regulator_get+0x58/0x1cc)
[ 19.862089] [<c03f4f7c>] (_regulator_get+0x58/0x1cc) from [<c039ccac>] (dc_hdmi_out_enable+0x90/0x148)
[ 19.862097] [<c039ccac>] (dc_hdmi_out_enable+0x90/0x148) from [<c038714c>] (_tegra_dc_controller_enable+0x58/0x14c4)
[ 19.862103] [<c038714c>] (_tegra_dc_controller_enable+0x58/0x14c4) from [<c0388620>] (_tegra_dc_enable+0x68/0xa0)
[ 19.862108] [<c0388620>] (_tegra_dc_enable+0x68/0xa0) from [<c03888b0>] (tegra_dc_enable+0xf8/0x100)
[ 19.862114] [<c03888b0>] (tegra_dc_enable+0xf8/0x100) from [<c03dbd40>] (tegra_fb_blank+0xdc/0x150)
[ 19.862119] [<c03dbd40>] (tegra_fb_blank+0xdc/0x150) from [<c033f028>] (fb_blank+0x5c/0xb0)
[ 19.862124] [<c033f028>] (fb_blank+0x5c/0xb0) from [<c033f8a8>] (do_fb_ioctl+0x328/0x684)
[ 19.862130] [<c033f8a8>] (do_fb_ioctl+0x328/0x684) from [<c013c088>] (do_vfs_ioctl+0x408/0x5d4)
[ 19.862136] [<c013c088>] (do_vfs_ioctl+0x408/0x5d4) from [<c013c2ec>] (SyS_ioctl+0x98/0x1a0)
[ 19.862141] [<c013c2ec>] (SyS_ioctl+0x98/0x1a0) from [<c000f200>] (ret_fast_syscall+0x0/0x38)
[ 19.862144] ---[ end trace 1b75b31a2719ed25 ]---
[ 19.862203] tegradc tegradc.0: Dev node doesn't have avdd_hdmi_pll supply props
[ 19.862205] ------------[ cut here ]------------
[ 19.862210] WARNING: at drivers/regulator/core.c:1548 regulator_dev_lookup+0x13c/0x274()
[ 19.862212] Modules linked in:
[ 19.862215] CPU: 0 PID: 176 Comm: surfaceflinger Tainted: G W 3.10.96-nvidia-jetson-tk1 #2
[ 19.862222] [<c0016fc4>] (unwind_backtrace+0x0/0x13c) from [<c0013278>] (show_stack+0x18/0x1c)
[ 19.862228] [<c0013278>] (show_stack+0x18/0x1c) from [<c003c130>] (warn_slowpath_common+0x5c/0x74)
[ 19.862233] [<c003c130>] (warn_slowpath_common+0x5c/0x74) from [<c003c1fc>] (warn_slowpath_null+0x24/0x2c)
[ 19.862239] [<c003c1fc>] (warn_slowpath_null+0x24/0x2c) from [<c03f3e28>] (regulator_dev_lookup+0x13c/0x274)
[ 19.862245] [<c03f3e28>] (regulator_dev_lookup+0x13c/0x274) from [<c03f4f7c>] (_regulator_get+0x58/0x1cc)
[ 19.862250] [<c03f4f7c>] (_regulator_get+0x58/0x1cc) from [<c039ccec>] (dc_hdmi_out_enable+0xd0/0x148)
[ 19.862256] [<c039ccec>] (dc_hdmi_out_enable+0xd0/0x148) from [<c038714c>] (_tegra_dc_controller_enable+0x58/0x14c4)
[ 19.862262] [<c038714c>] (_tegra_dc_controller_enable+0x58/0x14c4) from [<c0388620>] (_tegra_dc_enable+0x68/0xa0)
[ 19.862267] [<c0388620>] (_tegra_dc_enable+0x68/0xa0) from [<c03888b0>] (tegra_dc_enable+0xf8/0x100)
[ 19.862273] [<c03888b0>] (tegra_dc_enable+0xf8/0x100) from [<c03dbd40>] (tegra_fb_blank+0xdc/0x150)
[ 19.862277] [<c03dbd40>] (tegra_fb_blank+0xdc/0x150) from [<c033f028>] (fb_blank+0x5c/0xb0)
[ 19.862280] [<c033f028>] (fb_blank+0x5c/0xb0) from [<c033f8a8>] (do_fb_ioctl+0x328/0x684)
[ 19.862285] [<c033f8a8>] (do_fb_ioctl+0x328/0x684) from [<c013c088>] (do_vfs_ioctl+0x408/0x5d4)
[ 19.862314] [<c013c088>] (do_vfs_ioctl+0x408/0x5d4) from [<c013c2ec>] (SyS_ioctl+0x98/0x1a0)
[ 19.862319] [<c013c2ec>] (SyS_ioctl+0x98/0x1a0) from [<c000f200>] (ret_fast_syscall+0x0/0x38)
[ 19.862322] ---[ end trace 1b75b31a2719ed26 ]---
[ 19.863945] tegradc tegradc.0: nominal-pclk:148500000 parent:594000000 div:4.0 pclk:148500000 147015000~161865000
[ 20.245921] nvhdcp: link verified!
[ 20.328526] CPU3: unable to kill
[ 20.368067] CPU2: unable to kill
[ 20.527061] CPU1: unable to kill
[ 21.567959] type=1400 audit(1357005134.634:100): avc: denied { getattr } for pid=569 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass0
[ 21.624625] type=1400 audit(1357005134.681:101): avc: denied { getattr } for pid=570 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 21.649339] type=1400 audit(1357005134.712:102): avc: denied { getattr } for pid=571 comm="ls" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_0
[ 21.679139] type=1400 audit(1357005134.745:103): avc: denied { getattr } for pid=572 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 21.703807] type=1400 audit(1357005134.770:104): avc: denied { getattr } for pid=575 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 21.784378] CPU3: unable to kill
[ 21.864165] CPU2: unable to kill
[ 21.950399] CPU1: unable to kill
[ 22.229558] init: Starting service 'tlk_daemon'...
[ 22.242494] init: Service 'tlk_daemon' (pid 579) exited with status 1
[ 22.253958] init: Service 'tlk_daemon' (pid 579) killing any children in process group
[ 23.721589] type=1400 audit(1357005136.788:105): avc: denied { getattr } for pid=580 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass0
[ 23.744310] type=1400 audit(1357005136.810:106): avc: denied { getattr } for pid=581 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 23.783015] type=1400 audit(1357005136.849:107): avc: denied { getattr } for pid=582 comm="ls" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_0
[ 23.817266] type=1400 audit(1357005136.883:108): avc: denied { getattr } for pid=583 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 23.849830] type=1400 audit(1357005136.916:109): avc: denied { getattr } for pid=586 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 24.150339] CPU3: unable to kill
[ 24.230425] CPU2: unable to kill
[ 24.370314] CPU1: unable to kill
[ 25.881747] type=1400 audit(1357005138.948:110): avc: denied { getattr } for pid=587 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 25.933957] type=1400 audit(1357005138.991:111): avc: denied { getattr } for pid=588 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass0
[ 25.954218] type=1400 audit(1357005139.000:112): avc: denied { getattr } for pid=589 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 25.976324] type=1400 audit(1357005139.042:113): avc: denied { getattr } for pid=590 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass0
[ 25.996335] type=1400 audit(1357005139.054:114): avc: denied { getattr } for pid=591 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass0
[ 26.016403] type=1400 audit(1357005139.066:115): avc: denied { getattr } for pid=592 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass0
[ 26.037536] type=1400 audit(1357005139.104:116): avc: denied { getattr } for pid=593 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass0
[ 26.057768] type=1400 audit(1357005139.104:117): avc: denied { getattr } for pid=596 comm="touch" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=l0
[ 26.077875] type=1400 audit(1357005139.124:118): avc: denied { getattr } for pid=597 comm="chown" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=l0
[ 26.097932] type=1400 audit(1357005139.124:119): avc: denied { getattr } for pid=598 comm="touch" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=l0
[ 26.106270] init: Service 'wifiloader' (pid 161) exited with status 0
[ 26.124410] type=1400 audit(1357005139.144:120): avc: denied { getattr } for pid=599 comm="chown" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=l0
[ 26.144190] type=1400 audit(1357005139.144:121): avc: denied { getattr } for pid=600 comm="cmp" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 26.258456] CPU3: unable to kill
[ 26.338135] CPU2: unable to kill
[ 26.458311] CPU1: unable to kill
[ 27.107491] init: Starting service 'tlk_daemon'...
[ 27.124910] init: Service 'tlk_daemon' (pid 601) exited with status 1
[ 27.131557] init: Service 'tlk_daemon' (pid 601) killing any children in process group
[ 32.152562] init: Starting service 'tlk_daemon'...
[ 32.174205] init: Service 'tlk_daemon' (pid 602) exited with status 1
[ 32.182700] init: Service 'tlk_daemon' (pid 602) killing any children in process group
[ 37.205623] init: Starting service 'tlk_daemon'...
[ 37.212594] init: Service 'tlk_daemon' (pid 603) exited with status 1
[ 37.219065] init: Service 'tlk_daemon' (pid 603) killing any children in process group
[ 37.662679] CPU3: unable to kill
[ 37.703433] CPU2: unable to kill
[ 37.747546] CPU1: unable to kill
[ 37.771129] android_work: sent uevent USB_STATE=DISCONNECTED
[ 37.843610] CPU2: unable to kill
[ 37.873924] android_work: sent uevent USB_STATE=CONNECTED
[ 37.879960] android_work: sent uevent USB_STATE=DISCONNECTED
[ 37.930559] CPU1: unable to kill
[ 38.001376] android_work: sent uevent USB_STATE=CONNECTED
[ 38.006937] android_usb gadget: high-speed config #1: android
[ 38.025141] android_work: sent uevent USB_STATE=CONFIGURED
[ 39.358295] mmc2: Timeout waiting for hardware interrupt.
[ 39.363682] sdhci: ================== REGISTER DUMP (mmc2)==================
[ 39.370715] sdhci: Sys addr[0x000]: 0x00000000 | Version[0x0fe]: 0x00000303
[ 39.377748] sdhci: Blk size[0x004]: 0x00000000 | Blk cnt[0x006]: 0x00000000
[ 39.384779] sdhci: Argument[0x008]: 0x00000c00 | Trn mode[0x00c]: 0x00000000
[ 39.391810] sdhci: Present[0x024]: 0x01fb00f1 | Host ctl[0x028]: 0x00000001
[ 39.398840] sdhci: Power[0x029]: 0x0000000f | Blk gap[0x02a]: 0x00000000
[ 39.405871] sdhci: Wake-up[0x02b]: 0x00000000 | Clock[0x02c]: 0x00000405
[ 39.412902] sdhci: Timeout[0x02e]: 0x00000000 | Int stat[0x030]: 0x00000000
[ 39.419934] sdhci: Int enab[0x034]: 0x00ff0003 | Sig enab[0x038]: 0x00fc0003
[ 39.426965] sdhci: AC12 err[0x03c]: 0x00000000 | Slot int[0x0fc]: 0x00000000
[ 39.433995] sdhci: Caps[0x040]: 0x376fd080 | Caps_1[0x044]: 0x10002f73
[ 39.441026] sdhci: Cmd[0x00e]: 0x0000341a | Max curr[0x048]: 0x00000000
[ 39.448054] sdhci: Host ctl2[0x03e]: 0x00003000
[ 39.452571] sdhci: ADMA Err[0x054]: 0x00000000 | ADMA Ptr[0x058]: 0x00000000
[ 39.459601] sdhci: Tap value: 0 | Trim value: 2
[ 39.464116] sdhci: SDMMC Interrupt status: 0x00000000
[ 39.469150] sdhci: =========================================================
Nougat in safe_mode
Succeeded in disabling TLK_DAEMON by not building its prebuilt executable. Now android boots to safe mode and displays the lock screen, but input devices (Mouse and Keyboard) aren't working.
Have read about the strictly enforced verified boot in nougat, but have no idea how to go about debugging the cause for safe mode.
The Log information that shows SAFE MODE
01-01 00:05:40.481: I/WindowManager(592): SAFE MODE ENABLED (menu=0 s=0 dpad=-1 trackball=-1)
It comes from the WindowManager, I tried reading the sources in frameworks directory, but didn't quite understand how things work.
How should one figure out the cause for safe mode, is it due to security issues in kernel or the android part (Sepolicy etc)?
There are couple of errors in the log, should I correct all the errors, does it solve the safeboot problem?
Kindly help !!
Finally solved the safe mode problem, it was enabled as android has sensed the volume down state as high, this state is one of conditions which determines if safemode is set, though there is no volume buttons in the board somehow the code reads it as high. Anyways the system hangs in lock-screen and keeps rebooting.
SOURCE CODE
WindowMangerService.java
mSafeMode = menuState > 0 || sState > 0 || dpadState > 0 || trackballState > 0 || volumeDownState > 0;
Just removed the volume down condition.
Any ideas on why android freezes in lock-screen everytime it boots ?
Working Nougat in jetson-tk1
Solved the system hang, the issue was related to SDHCI controller, had to make some changes in the kernel. Simply followed the instructions in this link
https://devtalk.nvidia.com/default/...g-for-hardware-interrupt-solved-with-issues-/
Now have a working android Nougat in jetson-tk1.
RMSprop said:
Working Nougat in jetson-tk1
Solved the system hang, the issue was related to SDHCI controller, had to make some changes in the kernel. Simply followed the instructions in this link
https://devtalk.nvidia.com/default/...g-for-hardware-interrupt-solved-with-issues-/
Now have a working android Nougat in jetson-tk1.
Click to expand...
Click to collapse
Any chance to get the link to this treasure?

[ROM][UNOFFICIAL][9.0][i9100] ViperOS V6.3[r35][BETA][20190413]

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
This is ViperOS​
Disclaimer:
We are not responsible for anything that may happen to your phone as a result of installing custom roms and/or kernels. you do so at your own risk and take the responsibility upon yourself.
"This is a user friendly thread. All feature requests will be heard and considered. I am not against anything that doesn't stray too far away from the original idea of the ROM! Helping one another is also encouraged! Please be respectful and you will always be treated the same way, we are all here for a good experience."
About:
We are a Brazilian team, ViperOS aims to bring stability and useful features. If you are looking for a stable ROM with true tested features, minimal bugs and no Lineage bloatwares, then this is the place to be.
Features:
Added OTA Services updater
Statusbar
QS settings
Clock statusbar settings
Battery style
Carrier label
Network traffic
VoLTE icon toggle
4G/LTE icon toggle
Rounded corner settings
QS for Reboot/Recovery
QS Screenshot full and partial
Recents
Style recents AOSP and QuickStep
Button clear and Membar for recents AOSP
Lockscreen
Face auto unlock
Fingerprint authentication vibration
WheaterClient
Battery info Charging
Ambient music ticker
System
Color engine
theme QS style
Styles switch
Styles clock lockscreen
Buttons and navbar settings
LED battery Charging
LED notifications colors
Power Menu advanced
Fonts packages
Pulse Navbar
VPapers new
Many other customizations, install and take a look
Download:
AFH: Download
GApps:
OpenGapps: OpenGApps
ViperGapps: ViperGApps
​
Credits & Thanks:
All ViperOS Team
LineageOS team
@rINanDO
And all other open source Devs/Teams I may have missed!​
Other links
Telegram channel
Telegram chat discussion
ROM source
Viper Project for i9100
Kernel source​​
XDA:DevDB Information
ViperOS Pie, ROM for the i9100
Contributors
linusdan
ROM OS Version: 9.x Pie
ROM Kernel: Linux 3.0.x
Based On: LineageOS
Version Information
Status: Beta
Created 2019-03-15
Last Updated 2019-04-13
EMULATED STORAGE IMPLEMENTED.
DON'T INSTALL BEFORE FOLLOW THESE INSTRUCTIONS!!!
A. Bugs
Did you find a bug or problem?
Make a logcat and put it in pastebin/hastebin. I'll look when I can
You will need a computer, adb installed, usb debugging enabled on the smartphone and a usb cable.
Here's how to do it here.
1. Open Command Prompt (Windows) or Terminal (Linux/macOS).
2. Type:
Code:
adb logcat -d > logcat-dd-mm-yyyy.txt
This will save the log to logcat-dd-mm-yyyy.txt.
B. Magisk
Please do not ask me about compatibility with Magisk.
The i9100 Kernel (3.0.101) does not support namespace to work. Use SuperSU if you want root access.
Changelog
13042019
* Viper v6.3
- Updated sources
- April security patch
- Snap camera inserted again
Fixes by @rINanDO:
* Fixed WiFi HotSpot
* Improvements in SELinux
* Ported FunctionFS to our kernel
* Enabled Call-recording (if allowed by your country)
* Enabled multi-user, because we're on emulated storage
Known issues:
- Slow start after GAPPS installation. Wait 10 minutes before setting up the appliance.
- Camera app is crashing sometimes.
Next build: December.
14032019
* Viper v6.2
- Initial build
Known issues:
Slow start after GAPPS installation. Wait 10 minutes before setting up the appliance.
reserved.
Thanks a lot for the hard works. Definitely will give it try.
The sheer number of ROMS you work on is just insane.That too on our amazing S2.
Dude,
Keep up the work.
Props to You
Root with addon and speaker level problem
Hi,
I am a brazilian and I will tell you in English for all in this group.
1 - Root LineageOS
I have installed 9.0 ViperOS and flashed LineageOS Addon Root ARM 32 bits. I selected root on Developer Options and tried to open a root app, but I hadn't have success on it. It doesn't show permission allow for root at each app and nothing works.
2 - Live speaker low
The second problem I have found is the speaker level when live speaker is active calling somenone. It's very low comparing last 8.1 version LineageOS I have tested.
Thank you very much!
danilomkt said:
Hi,
I am a brazilian and I will tell you in English for all in this group.
1 - Root LineageOS
I have installed 9.0 ViperOS and flashed LineageOS Addon Root ARM 32 bits. I selected root on Developer Options and tried to open a root app, but I hadn't have success on it. It doesn't show permission allow for root at each app and nothing works.
2 - Live speaker low
The second problem I have found is the speaker level when live speaker is active calling somenone. It's very low comparing last 8.1 version LineageOS I have tested.
Thank you very much!
Click to expand...
Click to collapse
Hi!
Thanks for the remarks.
Could it generate the logcat so I can check out with calm?
Instructions are in the second post
While at root, did you try with SuperSU? Maybe it works.
linusdan said:
Hi!
Thanks for the remarks.
Could it generate the logcat so I can check out with calm?
Instructions are in the second post
While at root, did you try with SuperSU? Maybe it works.
Click to expand...
Click to collapse
I will try SuperSU.
Check logcat:
--------- beginning of main
03-21 23:43:40.020 22584 22584 I pal.androidter: type=1400 audit(0.0:1337): avc: denied { read } for name="jit-22584.dump" dev=mmcblk0p10 ino=140238 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:method_trace_data_file:s0:c512,c768 tclass=file permissive=1
03-21 23:43:40.020 22584 22584 I pal.androidter: type=1400 audit(0.0:1338): avc: denied { execute } for path="/data/misc/trace/jit-22584.dump" dev=mmcblk0p10 ino=140238 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:method_trace_data_file:s0:c512,c768 tclass=file permissive=1
03-21 23:43:40.022 22584 22584 W pal.androidter: Using default instruction set features for ARM CPU variant (cortex-a9) using conservative defaults
03-21 23:43:41.123 22584 22611 D vndksupport: Loading /system/lib/egl/libEGL_mali.so from current namespace instead of sphal namespace.
03-21 23:43:41.139 22584 22584 V Term : onCreate
03-21 23:43:41.229 22584 22584 D OpenGLRenderer: Skia GL Pipeline
03-21 23:43:41.280 22614 22614 I RenderThread: type=1400 audit(0.0:1339): avc: denied { read } for name="cpu" dev=sysfs ino=26 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:sysfs_cpuinfo:s0 tclass=dir permissive=1
03-21 23:43:41.285 22614 22614 I RenderThread: type=1400 audit(0.0:1340): avc: denied { open } for name="cpu" dev=sysfs ino=26 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:sysfs_cpuinfo:s0 tclass=dir permissive=1
03-21 23:43:41.370 22584 22584 D Term : TermService started
03-21 23:43:41.374 22584 22584 I TermService: Activity called onBind()
03-21 23:43:41.401 22584 22584 I Term : Bound to TermService
03-21 23:43:41.401 22584 22584 I TermService: Activity binding to service
03-21 23:43:41.481 22584 22611 D libEGL : loaded /system/lib/egl/libEGL_mali.so
03-21 23:43:41.606 22584 22611 D vndksupport: Loading /system/lib/egl/libGLESv1_CM_mali.so from current namespace instead of sphal namespace.
03-21 23:43:41.609 22584 22611 D libEGL : loaded /system/lib/egl/libGLESv1_CM_mali.so
03-21 23:43:41.618 22584 22595 I pal.androidter: Background concurrent copying GC freed 7671(384KB) AllocSpace objects, 5(164KB) LOS objects, 28% free, 1286KB/1798KB, paused 14.110ms total 93.263ms
03-21 23:43:41.620 22616 22616 I sh : type=1400 audit(0.0:1341): avc: denied { search } for name="cpu" dev=sysfs ino=26 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:sysfs_cpuinfo:s0 tclass=dir permissive=1
03-21 23:43:41.620 22616 22616 I sh : type=1400 audit(0.0:1342): avc: denied { read } for name="online" dev=sysfs ino=27 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:sysfs_cpuinfo:s0 tclass=file permissive=1
03-21 23:43:41.620 22616 22616 I sh : type=1400 audit(0.0:1343): avc: denied { open } for name="online" dev=sysfs ino=27 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:sysfs_cpuinfo:s0 tclass=file permissive=1
03-21 23:43:41.805 22584 22584 I libjackpal-androidterm: JNI_OnLoad
03-21 23:43:42.008 22584 22626 I Term : waiting for: 22616
03-21 23:43:42.023 22584 22611 D vndksupport: Loading /system/lib/egl/libGLESv2_mali.so from current namespace instead of sphal namespace.
03-21 23:43:42.025 22584 22611 D libEGL : loaded /system/lib/egl/libGLESv2_mali.so
03-21 23:43:42.299 22584 22614 E : Device driver API match
03-21 23:43:42.299 22584 22614 E : Device driver API version: 29
03-21 23:43:42.299 22584 22614 E : User space API version: 29
03-21 23:43:42.299 22584 22614 E : mali: REVISION=Linux-r3p2-01rel3 BUILD_DATE=Tue Jul 22 19:59:34 KST 2014
03-21 23:43:42.323 22584 22614 D vndksupport: Loading /vendor/lib/hw/gralloc.exynos4.so from current namespace instead of sphal namespace.
03-21 23:43:42.396 22584 22614 I ConfigStore: android::hardware::configstore::V1_0::ISurfaceFlingerConfigs::hasWideColorDisplay retrieved: 0
03-21 23:43:42.396 22584 22614 I ConfigStore: android::hardware::configstore::V1_0::ISurfaceFlingerConfigs::hasHDRDisplay retrieved: 0
03-21 23:43:42.396 22584 22614 I OpenGLRenderer: Initialized EGL, version 1.4
03-21 23:43:42.397 22584 22614 D OpenGLRenderer: Swap behavior 1
03-21 23:43:42.525 22614 22614 W RenderThread: type=1400 audit(0.0:1345): avc: granted { write } for name="ion" dev=tmpfs ino=1535 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:ion_device:s0 tclass=chr_file
03-21 23:43:42.525 22614 22614 W RenderThread: type=1400 audit(0.0:1346): avc: granted { write } for name="ion" dev=tmpfs ino=1535 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:ion_device:s0 tclass=chr_file
03-21 23:43:42.530 22584 22614 D vndksupport: Loading /vendor/lib/hw/[email protected] from current namespace instead of sphal namespace.
03-21 23:43:42.532 22584 22614 D vndksupport: Loading /vendor/lib/hw/gralloc.exynos4.so from current namespace instead of sphal namespace.
03-21 23:43:42.736 22584 22614 I OpenGLRenderer: Davey! duration=1310ms; Flags=0, IntendedVsync=6843398097392, Vsync=6843631430716, OldestInputEvent=9223372036854775807, NewestInputEvent=0, HandleInputStart=6843634018652, AnimationStart=6843634080861, PerformTraversalsStart=6843634084944, DrawStart=6844520429361, SyncQueued=6844563290861, SyncStart=6844566390736, IssueDrawCommandsStart=6844566672361, SwapBuffers=6844699250736, FrameCompleted=6844711554445, DequeueBufferDuration=0, QueueBufferDuration=596000,
03-21 23:43:43.175 22584 22595 I pal.androidter: Background concurrent copying GC freed 3132(293KB) AllocSpace objects, 0(0B) LOS objects, 25% free, 1505KB/2017KB, paused 3.310ms total 356.415ms
03-21 23:43:57.507 22584 22595 I pal.androidter: Background concurrent copying GC freed 5982(518KB) AllocSpace objects, 0(0B) LOS objects, 27% free, 1370KB/1882KB, paused 223us total 148.321ms
03-21 23:44:27.657 22584 22610 I pal.androidter: Waiting for a blocking GC ProfileSaver
03-21 23:44:27.686 22584 22595 I pal.androidter: Background concurrent copying GC freed 4983(441KB) AllocSpace objects, 0(0B) LOS objects, 27% free, 1365KB/1877KB, paused 14.198ms total 48.977ms
03-21 23:44:27.686 22584 22610 I pal.androidter: WaitForGcToComplete blocked ProfileSaver on HeapTrim for 29.039ms
03-21 23:44:41.990 22814 22814 I ls : type=1400 audit(0.0:1350): avc: denied { read } for name="/" dev=rootfs ino=1 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:rootfs:s0 tclass=dir permissive=1
03-21 23:44:41.990 22814 22814 I ls : type=1400 audit(0.0:1351): avc: denied { open } for name="/" dev=rootfs ino=1 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:rootfs:s0 tclass=dir permissive=1
03-21 23:44:41.990 22814 22814 I ls : type=1400 audit(0.0:1352): avc: denied { getattr } for path="/preload" dev=mmcblk0p12 ino=2 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:unlabeled:s0 tclass=dir permissive=1
03-21 23:44:41.990 22814 22814 I ls : type=1400 audit(0.0:1353): avc: denied { getattr } for path="/efs" dev=mmcblk0p1 ino=2 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:efs_device_file:s0 tclass=dir permissive=1
03-21 23:44:41.990 22814 22814 I ls : type=1400 audit(0.0:1354): avc: denied { getattr } for path="/vndservice_contexts" dev=rootfs ino=1193 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:vndservice_contexts_file:s0 tclass=file permissive=1
03-21 23:44:59.542 22584 22595 I pal.androidter: Background concurrent copying GC freed 3993(397KB) AllocSpace objects, 0(0B) LOS objects, 24% free, 1645KB/2MB, paused 867us total 212.663ms
03-21 23:45:54.050 23045 23045 I logcat : type=1400 audit(0.0:1366): avc: denied { search } for name="cpu" dev=sysfs ino=26 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:sysfs_cpuinfo:s0 tclass=dir permissive=1
03-21 23:45:54.050 23045 23045 I logcat : type=1400 audit(0.0:1367): avc: denied { read } for name="online" dev=sysfs ino=27 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:sysfs_cpuinfo:s0 tclass=file permissive=1
03-21 23:45:54.050 23045 23045 I logcat : type=1400 audit(0.0:1368): avc: denied { open } for name="online" dev=sysfs ino=27 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:sysfs_cpuinfo:s0 tclass=file permissive=1
03-21 23:45:54.050 23045 23045 I logcat : type=1400 audit(0.0:1369): avc: denied { getattr } for path="/sys/devices/system/cpu/online" dev=sysfs ino=27 scontext=u:r:untrusted_app_25:s0:c512,c768 tcontext=ubject_r:sysfs_cpuinfo:s0 tclass=file permissive=1
danilomkt said:
I will try SuperSU.
Check logcat:
Click to expand...
Click to collapse
Root: works with SuperSU!
Audio with speaker: It will be fixed in the next build
linusdan said:
Root: works with SuperSU!
Audio with speaker: It will be fixed in the next build
Click to expand...
Click to collapse
Don't quote the whole logcat, please! It's horrible on XDA Labs app because it ignores the "hide" tag...
BTW: Thanks for your continuous work and support!
guest4711 said:
Don't quote the whole logcat, please! It's horrible on XDA Labs app because it ignores the "hide" tag...
BTW: Thanks for your continuous work and support!
Click to expand...
Click to collapse
Well remembered! I was sleepy when I did this
I excluded the part. Thank you!
Is this ROM fast?
NEW BUILD IS UP!
Changelogs here.
whitch rom?
Hello,
No I have an older Lineage OS 16. I am not sure if it is bedder to update this, or installing the Viper Rom Whitch one is bedder in performance? I use it with talkback.
Is USB connection as storrage with Windows PC working in viper os?
is the google Assistant working if I Install Gapps nano? Should I use open Gapps or Viper gapps, whitch one of them?
Is OTA (update without flashing) working? I mean for the next update, not for the first installation.
Is it OK to do factory reset, than installing viper rom and than gapps?
Thanks and best regards
Sebastian
Migrate
Hello.
Thank you so much for your work! I used to have your Resurrection Remix Nougat on my i9100 for a couple of years. I want to try Viper OS but have problem with migration. I walk through all steps from the link in your second post but phone wont boot - I end up watching viper tongue-tickling itself for whatever time. I made logcat of the process there is loop of "Failure starting system services" i put it on hastebin.com in the end with /raw/aqapewokib (i can't post links). Maybe you can help with this if you have time. Anyway, thank you for your work!
Thread closed by OP request.

Categories

Resources