[ROM][7.1.1] AOSP-caf [RA Kernel & OMS] - Zuk Z1 Original Android Development

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Code:
#include
/*
*
* I am not responsible for bricked devices, dead SD cards,
* thermonuclear war, or you getting fired because the alarm app failed. Please
* do some research if you have any concerns about features included in this ROM
* before flashing it! YOU are choosing to make these modifications, and if
* you point the finger at me for messing up your device, I will laugh at you very hard.
*/
What's AOSP?
AOSP is Android as Google publish without other modifications. More or less AOSP is the Nexus devices stock rom without gapps.
We added few non-AOSP features for a better user experience and we are NOT going to add any other features.
What's CodeAurora Forums (CAF)?
Code Aurora Forum (CAF) is a consortium of companies with projects serving the mobile wireless industry. Software projects it concerns itself with are e.g. Android for MSM, Femto Linux Project, LLVM, MSM WLAN and Linux-MSM. Code Aurora is basically AOSP plus all Qualcomm specific enhancements and optimization.
This Rom:-
This Rom is a pure AOSP 7.1.1 Based On AOSP-CAF by @Men_in_black007
What is working:-
WiFi
RIL
Display
Auto Rotation
Audio
Camera
Video Recording
Bluetooth
GPS
Portable Hotspot
Sensors
What is Not Working or buggy ?
U tell me
If you want any bug to be fixed please write here on xda in detail with Logcats (otherwise I will ignore), mention if any mods and kernels, if used and please be specific about it.
How to install ?
Place ROM, Gapps and SuperSU/Magisk in your SD Card/Internal Memory
Reboot into recovery mode
Wipe cache/Dalvik cache/system/data
Flash ROM/Gapps
Reboot
Setup Wizard
Reboot into recovery again
Flash SuperSU/Magisk & reboot
Thanks
-LineageOS team
-CodeAurora Forums
@Men_in_black007 for CAF source repo
@acuicultor for kernel
@OrdenKrieger for bringing nougat to ham
@shashwat_biren
-: Downloads :-
ROM
gapps
XDA:DevDB Information
AOSP-caf ROM for ZUK Z1, ROM for the Lenovo Zuk Z1
Contributors
tech mashido, martichou
Source Code: https://github.com/AOSP-CAF/platform_manifest
ROM OS Version: 7.x Nougat
ROM Kernel: Linux 3.4.x
ROM Firmware Required: Unlocked Bootloader
Based On: AOSP-caf
Version Information
Status: Stable
Stable Release Date: 2017-04-07
Created 2017-04-07
Last Updated 2017-06-07

Reserved

Reserved

Good Job.

Screenshots please

hi is there any app to capture detailed log for bug reporting without connecting to computer.?
---------- Post added at 09:28 PM ---------- Previous post was at 08:56 PM ----------
build.board: MSM8974
build.bootloader: K9#CM_86BC499
build.brand: ZUK
build.cpu_abi: armeabi-v7a
build.cpu_abi2: armeabi
build.device: Z1
build.display: aosp_ham-userdebug 7.1.1 NMF26X eng.techma.20170407.120504 test-keys
build.fingerprint: ZUK/aosp_ham/ham:7.1.1/NMF26X/techma04071205:userdebug/test-keys
build.hardware: qcom
build.host: vpsgen
build.id: NMF26X
build.manufacturer: ZUK
build.model: ZUK Z1
build.product: ham
build.radio: unknown
build.serial: cb7eec1d
build.tags: test-keys
build.time: 1491566704000
build.type: userdebug
build.user: techmashido
version.codename: REL
version.incremental: eng.techma.20170407.120504
version.release: 7.1.1
version.sdk_int: 25
--------- beginning of main
04-08 00:31:32.327 W/System (4024): ClassLoader referenced unknown path: /data/app/com.nolanlawson.logcat-1/lib/arm
04-08 00:31:32.834 I/com.nolanlawson.logcat(4091): type=1400 audit(0.0:2353): avc: denied { execute } for comm=4173796E635461736B202331 name="su" dev="mmcblk0p22" ino=2214 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:su_exec:s0 tclass=file permissive=1
04-08 00:31:32.834 I/com.nolanlawson.logcat(4091): type=1400 audit(0.0:2354): avc: denied { read open } for comm=4173796E635461736B202331 name="su" dev="mmcblk0p22" ino=2214 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:su_exec:s0 tclass=file permissive=1
04-08 00:31:32.834 I/com.nolanlawson.logcat(4091): type=1400 audit(0.0:2355): avc: denied { execute_no_trans } for comm=4173796E635461736B202331 path="/system/xbin/su" dev="mmcblk0p22" ino=2214 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:su_exec:s0 tclass=file permissive=1
04-08 00:31:43.262 W/System (4024): ClassLoader referenced unknown path: /system/framework/QPerformance.jar
04-08 00:31:43.269 E/BoostFramework(4024): BoostFramework() : Exception_1 = java.lang.ClassNotFoundException: Didn't find class "com.qualcomm.qti.Performance" on path: DexPathList[[],nativeLibraryDirectories=[/system/lib, /vendor/lib]]
04-08 00:31:43.269 V/BoostFramework(4024): BoostFramework() : mPerf = null
04-08 00:32:00.417 W/IInputConnectionWrapper(4024): reportFullscreenMode on inexistent InputConnection
04-08 00:36:06.937 W/InputEventReceiver(4024): Attempted to finish an input event but the input event receiver has already been disposed.
04-08 00:41:53.453 W/InputEventReceiver(4024): Attempted to finish an input event but the input event receiver has already been disposed.
04-08 00:41:59.504 W/InputEventReceiver(4024): Attempted to finish an input event but the input event receiver has already been disposed.
04-08 00:42:16.589 W/InputEventReceiver(4024): Attempted to finish an input event but the input event receiver has already been disposed.
04-08 00:50:47.945 W/IInputConnectionWrapper(4024): reportFullscreenMode on inexistent InputConnection
04-08 00:50:47.945 W/IInputConnectionWrapper(4024): finishComposingText on inactive InputConnection

The rom is very good, only one issue found till now.
When opening camera video settings, the app force stop. As I report it to you trough Telegram.
I suggest you to try to put the snapdragon camera of LOS or any other LOS based rom into this AOSP-CAF rom. This would be awesome.
Thank you very much for this amazing pure stock rom.

Try installing Andy kernel
Sent from my ZUK Z1 using Tapatalk

prax31 said:
hi is there any app to capture detailed log for bug reporting without connecting to computer.?
---------- Post added at 09:28 PM ---------- Previous post was at 08:56 PM ----------
build.board: MSM8974
build.bootloader: K9#CM_86BC499
build.brand: ZUK
build.cpu_abi: armeabi-v7a
build.cpu_abi2: armeabi
build.device: Z1
build.display: aosp_ham-userdebug 7.1.1 NMF26X eng.techma.20170407.120504 test-keys
build.fingerprint: ZUK/aosp_ham/ham:7.1.1/NMF26X/techma04071205:userdebug/test-keys
build.hardware: qcom
build.host: vpsgen
build.id: NMF26X
build.manufacturer: ZUK
build.model: ZUK Z1
build.product: ham
build.radio: unknown
build.serial: cb7eec1d
build.tags: test-keys
build.time: 1491566704000
build.type: userdebug
build.user: techmashido
version.codename: REL
version.incremental: eng.techma.20170407.120504
version.release: 7.1.1
version.sdk_int: 25
--------- beginning of main
04-08 00:31:32.327 W/System (4024): ClassLoader referenced unknown path: /data/app/com.nolanlawson.logcat-1/lib/arm
04-08 00:31:32.834 I/com.nolanlawson.logcat(4091): type=1400 audit(0.0:2353): avc: denied { execute } for comm=4173796E635461736B202331 name="su" dev="mmcblk0p22" ino=2214 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:su_exec:s0 tclass=file permissive=1
04-08 00:31:32.834 I/com.nolanlawson.logcat(4091): type=1400 audit(0.0:2354): avc: denied { read open } for comm=4173796E635461736B202331 name="su" dev="mmcblk0p22" ino=2214 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:su_exec:s0 tclass=file permissive=1
04-08 00:31:32.834 I/com.nolanlawson.logcat(4091): type=1400 audit(0.0:2355): avc: denied { execute_no_trans } for comm=4173796E635461736B202331 path="/system/xbin/su" dev="mmcblk0p22" ino=2214 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=ubject_r:su_exec:s0 tclass=file permissive=1
04-08 00:31:43.262 W/System (4024): ClassLoader referenced unknown path: /system/framework/QPerformance.jar
04-08 00:31:43.269 E/BoostFramework(4024): BoostFramework() : Exception_1 = java.lang.ClassNotFoundException: Didn't find class "com.qualcomm.qti.Performance" on path: DexPathList[[],nativeLibraryDirectories=[/system/lib, /vendor/lib]]
04-08 00:31:43.269 V/BoostFramework(4024): BoostFramework() : mPerf = null
04-08 00:32:00.417 W/IInputConnectionWrapper(4024): reportFullscreenMode on inexistent InputConnection
04-08 00:36:06.937 W/InputEventReceiver(4024): Attempted to finish an input event but the input event receiver has already been disposed.
04-08 00:41:53.453 W/InputEventReceiver(4024): Attempted to finish an input event but the input event receiver has already been disposed.
04-08 00:41:59.504 W/InputEventReceiver(4024): Attempted to finish an input event but the input event receiver has already been disposed.
04-08 00:42:16.589 W/InputEventReceiver(4024): Attempted to finish an input event but the input event receiver has already been disposed.
04-08 00:50:47.945 W/IInputConnectionWrapper(4024): reportFullscreenMode on inexistent InputConnection
04-08 00:50:47.945 W/IInputConnectionWrapper(4024): finishComposingText on inactive InputConnection
Click to expand...
Click to collapse
use this site to paste log bro...https://hastebin.com/

Off topic:-
Hi guys...
DU (Dirty Unicorn) ROM is not allowed to post on XDA thread by ROM creator for any device so check my g+ profile/DU community group for builds .the latest build is DU_ham_7.1.2_20170413-1017.v11.3-UNOFFICIAL.zip which 3rd build of this ROM from me.
https://plus.google.com/+JaiKumarAcharya
Regards
tech mashido

Related

i9305: SELinux issues for some users

Hi!
Some users with the i9305 are having issues installing OmniROM due to SELinux issues. Others are having no problems at all.
The problem they see, according to the kmsg log is :
Code:
usb: usb_string_id cdev(0xf191f8a0)->next_string_id=1
usb: android_bind_enabled_functions f:adb
adb_bind_config
usb: usb_gadget_connect
warning: `daemonsu' uses 32-bit capabilities (legacy support in use)
mdm_modem_ioctl: Powering on mdm
request_boot_lock_set
mdm_modem_ioctl: mdm get boot protocol 0
EXT4-fs (mmcblk0p13): re-mounted. Opts: (null)
SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
type=1400 audit(1386604919.255:5): avc: denied { search } for pid=1995 comm="dd" name="/" dev=mmcblk0p11 ino=2 scontext=u:r:kickstart:s0 tcontext=u:object_r:tombstone_data_file:s0 tclass=dir
type=1400 audit(1386604919.255:6): avc: denied { search } for pid=1995 comm="dd" name="/" dev=mmcblk0p11 ino=2 scontext=u:r:kickstart:s0 tcontext=u:object_r:tombstone_data_file:s0 tclass=dir
type=1400 audit(1386604919.280:7): avc: denied { search } for pid=2013 comm="chmod" name="/" dev=mmcblk0p11 ino=2 scontext=u:r:kickstart:s0 tcontext=u:object_r:tombstone_data_file:s0 tclass=dir
type=1400 audit(1386604919.285:8): avc: denied { search } for pid=2029 comm="sh" name="/" dev=mmcblk0p11 ino=2 scontext=u:r:kickstart:s0 tcontext=u:object_r:tombstone_data_file:s0 tclass=dir
type=1400 audit(1386604919.295:9): avc: denied { search } for pid=2043 comm="dd" name="/" dev=mmcblk0p11 ino=2 scontext=u:r:kickstart:s0 tcontext=u:object_r:tombstone_data_file:s0 tclass=dir
type=1400 audit(1386604919.295:10): avc: denied { search } for pid=2043 comm="dd" name="/" dev=mmcblk0p11 ino=2 scontext=u:r:kickstart:s0 tcontext=u:object_r:tombstone_data_file:s0 tclass=dir
type=1400 audit(1386604919.300:11): avc: denied { search } for pid=2046 comm="sh" name="/" dev=mmcblk0p11 ino=2 scontext=u:r:kickstart:s0 tcontext=u:object_r:tombstone_data_file:s0 tclass=dir
type=1400 audit(1386604919.305:12): avc: denied { search } for pid=2049 comm="dd" name="/" dev=mmcblk0p11 ino=2 scontext=u:r:kickstart:s0 tcontext=u:object_r:tombstone_data_file:s0 tclass=dir
type=1400 audit(1386604919.305:13): avc: denied { search } for pid=2049 comm="dd" name="/" dev=mmcblk0p11 ino=2 scontext=u:r:kickstart:s0 tcontext=u:object_r:tombstone_data_file:s0 tclass=dir
mdm_modem_ioctl: mdm autopm request[release]
mdm_modem_ioctl: mdm autopm request[lock]
What could be the reason for some people seeing this issue and others not seeing it? Users have tried both TWRP and CWM recoveries with the same result.
The full logs are attached in a post here
http://jira.omnirom.org/browse/OMNI-131 created to track this issue formally
Sent from my GT-I9305 using Tapatalk

[THEME][CM12][CM12.1] Dark WhoAmI v1.2 (20150827) DISCONTINUED

Today, i will share the dark theme called "dark whoami"...Ofcourse this theme have a lot of bugs. so please report the bugs here and give me some suggestions
NB:
*Please forgive me if my theme has expired
**If you got error like can't install or fc please give me LOGCAT
Requirement :
Stock framework cm12/cm12.1
Latest build cm12/cm12.1
Changelog :
v1.0
initial release
v1.1
Improvement material dark
Fixed some background and text
Change some drawables
New font UI
etc
v1.2
Fixed issue can't install, reported by @Enoalife
Fixed QS tile in settings
Fixed music theme (eleven)
Themed sony apps (music, album, video)
Now you can't see material light
etc
Themed apps:
Almost all system apps
Root explorer
Greenify
Xperia Home
soon
Bug :
Greenify
tell me
Installation :
Just install as normal apk
Reboot after update
Enjoy
Screenshots and Download:
See second post​
Credit:
@mikeioannina and @Mardon for cm12.1 build :good:
@nicholaschum for awesome guide and help :good:
@Ambor for xperia themes port :good:
@gamzekal for guide and help :good:
@gianton for awesome font :good:
all users for test and report the issue :good:
Please pm me if i forgot
Simply press thank's button :good:
Screenshots and Download
Screenshots
v1.0
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
v1.1
v1.2
Download
v1.0 Click Here
v1.1 Click Here
v1.2 Click Here
It's failing to install
Sent from my Nexus 6 using XDA Free mobile app
bigstunta101 said:
It's failing to install
Sent from my Nexus 6 using XDA Free mobile app
Click to expand...
Click to collapse
Give me a logcat...
Nice work:good:
Can't install...temasek build , LG G2.
Envoyé de mon LG-D802 en utilisant Tapatalk
Updated
V1.1 Updated
Changelog :
Improvement material dark
Fixed some background and text
Change some drawables
New font UI
etc
Important note !!!
You must read the first post before download
Failed to install cm-12.1-20150825-NIGHTLY (Nexus 5)
Code:
s device.
W/Finsky ( 4043): [1] FinskyApp.getCurrentAccount: No account configured on thi
s device.
W/Finsky ( 4043): [1] FinskyApp.getCurrentAccount: No account configured on thi
s device.
W/Finsky ( 4043): [1] FinskyApp.getCurrentAccount: No account configured on thi
s device.
W/Finsky ( 4043): [1] FinskyApp.getCurrentAccount: No account configured on thi
s device.
W/Finsky ( 4043): [1] FinskyApp.getCurrentAccount: No account configured on thi
s device.
W/Finsky ( 4043): [1] FinskyApp.getCurrentAccount: No account configured on thi
s device.
W/Finsky ( 4043): [1] FinskyApp.getCurrentAccount: No account configured on thi
s device.
W/Finsky ( 4043): [1] FinskyApp.getCurrentAccount: No account configured on thi
s device.
W/Finsky ( 4043): [1] FinskyApp.getCurrentAccount: No account configured on thi
s device.
W/Finsky ( 4043): [1] FinskyApp.getCurrentAccount: No account configured on thi
s device.
W/Finsky ( 4043): [1] FinskyApp.getCurrentAccount: No account configured on thi
s device.
D/Finsky ( 4043): [1] DailyHygiene.goMakeHygieneIfDirty: No need to run daily h
ygiene.
I/ActivityManager( 687): Start proc 4079:com.google.android.gms:car/u0a22 for s
ervice com.google.android.gms/.car.CarService
W/Settings( 4043): Setting download_manager_max_bytes_over_mobile has moved from
android.provider.Settings.Secure to android.provider.Settings.Global.
W/Settings( 4043): Setting download_manager_recommended_max_bytes_over_mobile ha
s moved from android.provider.Settings.Secure to android.provider.Settings.Globa
l.
W/Finsky ( 4043): [1] FinskyApp.getCurrentAccount: No account configured on thi
s device.
W/Finsky ( 4043): [1] FinskyApp.getCurrentAccount: No account configured on thi
s device.
W/Finsky ( 4043): [1] FinskyApp.getDfeApi: No account configured on this device
.
D/Finsky ( 4043): [1] PackageVerificationReceiver.onReceive: Verification reque
sted, id = 1
D/Finsky ( 4043): [1] WorkerTask.onPreExecute: Verification Requested for id =
1, data=file:///storage/emulated/0/DarkWhoamI_v1.1.apk flags=16 fromVerification
Activity=false
W/ResourcesManager( 4079): Asset path '/system/framework/com.android.media.remot
edisplay.jar' does not exist or contains no resources.
W/ResourcesManager( 4079): Asset path '/system/framework/com.android.location.pr
ovider.jar' does not exist or contains no resources.
I/MultiDex( 4079): VM with version 2.1.0 has multidex support
I/MultiDex( 4079): install
I/MultiDex( 4079): VM has multidex support, MultiDex support library is disabled
.
V/JNIHelp ( 4079): Registering com/google/android/gms/org/conscrypt/NativeCrypto
's 227 native methods...
D/Finsky ( 4043): [1] GmsCoreHelper.cleanupNlp: result=false type=4
D/Finsky ( 4043): [1] RestoreTracker.stopServiceIfDone: Restore complete with 0
success and 0 failed.
I/ProviderInstaller( 4079): Installed default security provider GmsCore_OpenSSL
D/GCM ( 1477): GcmService start Intent { act=com.google.android.gms.INITIALI
ZE flg=0x10 pkg=com.google.android.gms cmp=com.google.android.gms/.gcm.GcmServic
e } com.google.android.gms.INITIALIZE
D/AuthorizationBluetoothService( 1477): Received GmsCore event: Intent { act=com
.google.android.gms.INITIALIZE flg=0x10 pkg=com.google.android.gms cmp=com.googl
e.android.gms/.auth.be.proximity.authorization.bt.AuthorizationBluetoothService$
AutoStarter }.
V/GmsCoreStatsServiceLauncher( 1835): Received broadcast intent Intent { act=com
.google.android.gms.INITIALIZE flg=0x10 pkg=com.google.android.gms cmp=com.googl
e.android.gms/.common.stats.GmsCoreStatsServiceLauncher }
D/WearableService( 1933): callingUid 10022, callindPid: 1933
E/MDM ( 1413): [144] b.run: Couldn't connect to Google API client: Connectio
nResult{statusCode=API_UNAVAILABLE, resolution=null}
D/LocationInitializer( 1835): Restart initialization of location
I/Timeline( 687): Timeline: Activity_windows_visible id: ActivityRecord{160be2c
1 u0 com.android.packageinstaller/.InstallAppProgress t17} time:386239
V/Finsky ( 4043): [1] GearheadStateMonitor.onReady: sIsProjecting:false
I/qtaguid ( 4043): Failed write_ctrl(u 36) res=-1 errno=22
I/qtaguid ( 4043): Untagging socket 36 failed errno=-22
W/NetworkManagementSocketTagger( 4043): untagSocket(36) failed with errno -22
D/Finsky ( 4043): [1] 1.onResponse: Verification id=1 response=0
D/Finsky ( 4043): [1] PackageVerificationReceiver.onReceive: Verification reque
sted, id = 1
D/DefContainer( 3537): Copying /storage/emulated/0/DarkWhoamI_v1.1.apk to base.a
pk
I/auditd ( 4122): Starting up
E/auditd ( 4122): Failed on audit_set_pid with error: Protocol not supported
I/auditd ( 4122): Exiting
D/audio_hw_primary( 197): disable_audio_route: reset and update mixer path: low
-latency-playback
D/audio_hw_primary( 197): disable_snd_device: snd_device(2: speaker)
D/PackageManager( 687): Renaming /data/app/vmdl500165273.tmp to /data/app/com.a
fah_me.dark.whoami-1
V/BackupManagerService( 687): restoreAtInstall pkg=com.afah_me.dark.whoami toke
n=2 restoreSet=0
V/BackupManagerService( 687): Finishing install immediately
W/Settings( 687): Setting install_non_market_apps has moved from android.provid
er.Settings.Global to android.provider.Settings.Secure, returning read-only valu
e.
I/InputReader( 687): Reconfiguring input devices. changes=0x00000020
D/BackupManagerService( 687): Received broadcast Intent { act=android.intent.ac
tion.PACKAGE_ADDED dat=package:com.afah_me.dark.whoami flg=0x4000010 (has extras
) }
W/BackupManagerService( 687): Removing schedule queue dupe of com.afah_me.dark.
whoami
D/installd( 198): aapt source_apk=/data/app/com.afah_me.dark.whoami-1/base.apk
internal_path=assets/icons/ out_restable=/data/resource-cache/com.afah_me.dark.w
hoami/icons uid=50070, pkgId=98, min_sdk_version=21, common_res_path=
D/Documents( 3712): Update found 6 roots in 63ms
E/cutils-trace( 4128): Error opening trace file: No such file or directory (2)
W/ResourcesManager( 1112): Asset path '/system/framework/com.google.android.medi
a.effects.jar' does not exist or contains no resources.
I/Launcher( 1112): Deferring update until onResume
I/art ( 687): Explicit concurrent mark sweep GC freed 122434(6MB) AllocSpac
e objects, 22(7MB) LOS objects, 32% free, 32MB/48MB, paused 79.554ms total 538.9
48ms
I/ActivityManager( 687): Start proc 4135:com.google.android.partnersetup/u0a25
for broadcast com.google.android.partnersetup/.RlzPingBroadcastReceiver
D/ChimeraCfgMgr( 1835): Loading module com.google.android.gms.games from APK com
.google.android.gms
D/ChimeraCfgMgr( 1835): Loading module com.google.android.gms.vision from APK co
m.google.android.gms
D/Vision ( 1835): Received broadcast Intent { act=android.intent.action.PACKAGE
_ADDED dat=package:com.afah_me.dark.whoami flg=0x4000010 cmp=com.google.android.
gms/.vision.DependencyBroadcastReceiverProxy (has extras) }
D/PackageBroadcastService( 1835): Received broadcast action=android.intent.actio
n.PACKAGE_ADDED and uri=com.afah_me.dark.whoami
D/Vision ( 1835): Failed to find package metadata for com.afah_me.dark.whoami
D/Vision ( 1835): No vision deps
I/ConfigService( 1477): onCreate
I/ConfigFetchService( 1835): onStartCommand Intent { act=android.intent.action.P
ACKAGE_ADDED dat=package:com.afah_me.dark.whoami cmp=com.google.android.gms/.con
fig.ConfigFetchService (has extras) }
I/ConfigFetchService( 1835): launchTask
I/ConfigFetchService( 1835): service connected
I/PeopleContactsSync( 1835): CP2 sync disabled
D/ConfigFetchService( 1835): ConfigApi connection successful.
V/ConfigFetchTask( 1835): ConfigFetchTask getDeviceDataVersionInfo(): ABFEt1XZ_s
LyAHRryZH2gS3VcNRc16ABP_sUsHwq2H_XUgOgq3hjuIiFHo9qgYEXHtGccGbpQLSdl4_OLMiSNUnylj
RlzvkqbxN7gpdRqCbNZzpw5jD-Ft8m-R4Pkc4B18LppXEEn7ByASg0oJbY6C6WVdCOCkmy8M79QL3_B9
GOso_g7TJvMZX-7ldsYEdcidxU0V1yjPXk6MdHduN8voL4D5p9qWQ4Y6fNNoPjgHwT1jynGWYzRRQ2B6
U8zb_b8sh_yS23ZLluCg8oRDywR8RXAoFt8f4ugnDwyveIkoH-d5Ixh9W6dUtltQqd0aZVX0ZxSSK4sx
wE8P_1YDAPINSnWKu1WK-sPKsVTGyMTMZ8G6KzHgUkK84
I/UpdateIcingCorporaServi( 2643): Updating corpora: APPS=com.afah_me.dark.whoami
, CONTACTS=MAYBE
I/GoogleURLConnFactory( 1835): Using platform SSLCertificateSocketFactory
I/UpdateIcingCorporaServi( 2643): UpdateCorporaTask done [took 26 ms] updated ap
ps [took 26 ms]
D/installd( 198): aapt source_apk=/data/app/com.afah_me.dark.whoami-1/base.apk
internal_path=assets/overlays/common/ out_restable=/data/resource-cache/com.afah
_me.dark.whoami/common uid=50070, pkgId=95, min_sdk_version=21, common_res_path=
E/cutils-trace( 4167): Error opening trace file: No such file or directory (2)
D/installd( 198): aapt source_apk=/data/app/com.afah_me.dark.whoami-1/base.apk
internal_path=assets/overlays/com.android.cellbroadcastreceiver/ out_restable=/d
ata/resource-cache/com.afah_me.dark.whoami/com.android.cellbroadcastreceiver uid
=50070, pkgId=97, min_sdk_version=21, common_res_path=/data/resource-cache/com.a
fah_me.dark.whoami/common/resources.apk
E/cutils-trace( 4168): Error opening trace file: No such file or directory (2)
D/installd( 198): idmap target_apk=/system/priv-app/CellBroadcastReceiver/CellB
roadcastReceiver.apk overlay_apk=/data/app/com.afah_me.dark.whoami-1/base.apk ca
che_path=/data/resource-cache/com.afah_me.dark.whoami/com.android.cellbroadcastr
eceiver uid=50005
I/ConfigFetchService( 1835): fetch service done; releasing wakelock
I/ConfigFetchService( 1835): stopping self
D/installd( 198): aapt source_apk=/data/app/com.afah_me.dark.whoami-1/base.apk
internal_path=assets/overlays/com.android.gallery3d/ out_restable=/data/resource
-cache/com.afah_me.dark.whoami/com.android.gallery3d uid=50070, pkgId=97, min_sd
k_version=21, common_res_path=/data/resource-cache/com.afah_me.dark.whoami/commo
n/resources.apk
E/cutils-trace( 4170): Error opening trace file: No such file or directory (2)
D/installd( 198): idmap target_apk=/system/app/Gallery2/Gallery2.apk overlay_ap
k=/data/app/com.afah_me.dark.whoami-1/base.apk cache_path=/data/resource-cache/c
om.afah_me.dark.whoami/com.android.gallery3d uid=50044
D/installd( 198): aapt source_apk=/data/app/com.afah_me.dark.whoami-1/base.apk
internal_path=assets/overlays/com.android.calendar/ out_restable=/data/resource-
cache/com.afah_me.dark.whoami/com.android.calendar uid=50070, pkgId=97, min_sdk_
version=21, common_res_path=/data/resource-cache/com.afah_me.dark.whoami/common/
resources.apk
E/cutils-trace( 4172): Error opening trace file: No such file or directory (2)
E/InstallTheme( 198): Failed to generate resource table for split ''
E/InstallTheme( 198): assets/overlays/com.android.calendar/res/values/drawables
.xml:4: error: Error: Resource is not public. (at 'list_primary_holo' with value
'@android:color/background_material_dark').
E/InstallTheme( 198):
E/installd( 198): aapt failed, status=0x0100
E/PackageManager( 687): Unable to process theme, uninstalling com.afah_me.dark.
whoami
E/PackageManager( 687): com.android.server.pm.PackageManagerService$AaptExcepti
on: Failed to run aapt
E/PackageManager( 687): at com.android.server.pm.PackageManagerService.c
ompileResourcesWithAapt(PackageManagerService.java:7071)
E/PackageManager( 687): at com.android.server.pm.PackageManagerService.c
ompileResources(PackageManagerService.java:6987)
E/PackageManager( 687): at com.android.server.pm.PackageManagerService.c
ompileResourcesIfNeeded(PackageManagerService.java:6976)
E/PackageManager( 687): at com.android.server.pm.PackageManagerService.c
ompileResourcesAndIdmapIfNeeded(PackageManagerService.java:6959)
E/PackageManager( 687): at com.android.server.pm.PackageManagerService.p
rocessThemeResources(PackageManagerService.java:14691)
E/PackageManager( 687): at android.app.ApplicationPackageManager.process
ThemeResources(ApplicationPackageManager.java:1859)
E/PackageManager( 687): at com.android.server.ThemeService$ResourceProce
ssingHandler.handleMessage(ThemeService.java:197)
E/PackageManager( 687): at android.os.Handler.dispatchMessage(Handler.ja
va:102)
E/PackageManager( 687): at android.os.Looper.loop(Looper.java:135)
E/PackageManager( 687): at android.os.HandlerThread.run(HandlerThread.ja
va:61)
I/ActivityManager( 687): Force stopping com.afah_me.dark.whoami appid=10070 use
r=-1: uninstall pkg
I/ActivityManager( 687): Force stopping com.afah_me.dark.whoami appid=10070 use
r=0: pkg removed
W/GeofencerStateMachine( 1413): Ignoring removeGeofence because network location
is disabled.
D/BackupManagerService( 687): Received broadcast Intent { act=android.intent.ac
tion.PACKAGE_REMOVED dat=package:com.afah_me.dark.whoami flg=0x4000010 (has extr
as) }
D/JobSchedulerService( 687): Receieved: android.intent.action.PACKAGE_REMOVED
I/InputReader( 687): Reconfiguring input devices. changes=0x00000020
I/art ( 3586): Explicit concurrent mark sweep GC freed 1563(112KB) AllocSpac
e objects, 0(0B) LOS objects, 24% free, 16MB/21MB, paused 212us total 18.477ms
I/Launcher( 1112): Deferring update until onResume
I/LatinIME:LogUtils( 965): Dictionary info: dictionary = ? ; version = 26 ; dat
e = 1351062238
D/Documents( 3712): Update found 6 roots in 48ms
D/VoicemailCleanupService( 2555): Cleaning up data for package: com.afah_me.dark
.whoami
I/Launcher( 1112): Deferring update until onResume
W/Launcher( 1112): setApplicationContext called twice! old=com.android.launcher3
[email protected] [email protected]
0c07
E/NetworkScheduler.SchedulerReceiver( 1477): Invalid parameter app
E/NetworkScheduler.SchedulerReceiver( 1477): Invalid package name : Perhaps you
didn't include a PendingIntent in the extras?
D/PackageBroadcastService( 1835): Received broadcast action=android.intent.actio
n.PACKAGE_REMOVED and uri=com.afah_me.dark.whoami
D/ChimeraCfgMgr( 1835): Loading module com.google.android.gms.games from APK com
.google.android.gms
D/AccountUtils( 1835): Clearing selected account for com.afah_me.dark.whoami
I/LocationSettingsChecker( 1835): Removing dialog suppression flag for package c
om.afah_me.dark.whoami
I/ConfigFetchService( 1835): onStartCommand Intent { act=android.intent.action.P
ACKAGE_REMOVED dat=package:com.afah_me.dark.whoami cmp=com.google.android.gms/.c
onfig.ConfigFetchService (has extras) }
D/GOOGLEHELP_CompatibleDatabase( 1835): Open SQLiteDatabase: /data/data/com.goog
le.android.gms/databases/metrics.db, release reference: 1
D/GOOGLEHELP_CompatibleDatabase( 1835): Acquire reference of SQLiteDatabase: /da
ta/data/com.google.android.gms/databases/metrics.db: 2
D/gH_MetricsDatabase( 1835): 0 metrics were deleted when clearing package com.af
ah_me.dark.whoami.
D/GOOGLEHELP_CompatibleDatabase( 1835): Release reference of SQLiteDatabase: /da
ta/data/com.google.android.gms/databases/metrics.db: 1
I/ConfigFetchService( 1835): service connected
I/PeopleContactsSync( 1835): CP2 sync disabled
D/GOOGLEHELP_CompatibleDatabase( 1835): Open SQLiteDatabase: /data/data/com.goog
le.android.gms/databases/help_responses.db, release reference: 1
D/GOOGLEHELP_CompatibleDatabase( 1835): Acquire reference of SQLiteDatabase: /da
ta/data/com.google.android.gms/databases/help_responses.db: 2
D/GOOGLEHELP_CompatibleDatabase( 1835): Release reference of SQLiteDatabase: /da
ta/data/com.google.android.gms/databases/help_responses.db: 1
D/GOOGLEHELP_CompatibleDatabase( 1835): Open SQLiteDatabase: /data/data/com.goog
le.android.gms/databases/auto_complete_suggestions.db, release reference: 1
D/GOOGLEHELP_CompatibleDatabase( 1835): Acquire reference of SQLiteDatabase: /da
ta/data/com.google.android.gms/databases/auto_complete_suggestions.db: 2
D/GOOGLEHELP_CompatibleDatabase( 1835): Release reference of SQLiteDatabase: /da
ta/data/com.google.android.gms/databases/auto_complete_suggestions.db: 1
D/GOOGLEHELP_CompatibleDatabase( 1835): Close SQLiteDatabase: /data/data/com.goo
gle.android.gms/databases/metrics.db, release reference: 0
D/GOOGLEHELP_CompatibleDatabase( 1835): Close SQLiteDatabase: /data/data/com.goo
gle.android.gms/databases/help_responses.db, release reference: 0
D/GOOGLEHELP_CompatibleDatabase( 1835): Close SQLiteDatabase: /data/data/com.goo
gle.android.gms/databases/auto_complete_suggestions.db, release reference: 0
I/Icing ( 1835): doRemovePackageData com.afah_me.dark.whoami
W/ContextImpl( 3686): Calling a method in the system process without a qualified
user: android.app.ContextImpl.startService:1721 android.content.ContextWrapper.
startService:522 android.content.ContextWrapper.startService:522 com.android.key
chain.KeyChainBroadcastReceiver.onReceive:12 android.app.ActivityThread.handleRe
ceiver:2641
I/UpdateIcingCorporaServi( 2643): Updating corpora: APPS=com.afah_me.dark.whoami
, CONTACTS=MAYBE
I/UpdateIcingCorporaServi( 2643): UpdateCorporaTask done [took 21 ms] updated ap
ps [took 21 ms]
I/art ( 687): Explicit concurrent mark sweep GC freed 17743(1297KB) AllocSp
ace objects, 14(5MB) LOS objects, 33% free, 27MB/41MB, paused 1.428ms total 173.
967ms
W/PackageManager( 687): Couldn't remove dex file for package: at location /dat
a/app/com.afah_me.dark.whoami-1/base.apk, retcode=-1
E/org.cyanogenmod.themes.provider.AppReceiver( 3586): Unable to update theme com
.afah_me.dark.whoami, result=-400
I/ActivityManager( 687): Killing 3733:com.android.externalstorage/u0a10 (adj 15
): empty #17
V/ActivityManager( 687): killProcessGroupAsync took 41 ms for PID 3733 on threa
d 17
I/auditd ( 4200): Starting up
E/auditd ( 4200): Failed on audit_set_pid with error: Protocol not supported
I/auditd ( 4200): Exiting
I/ConfigService( 1477): onDestroy
I/auditd ( 4202): Starting up
E/auditd ( 4202): Failed on audit_set_pid with error: Protocol not supported
I/auditd ( 4202): Exiting
^C
E:\Nexus5\Stock>
Fast Update
Changelog:
v1.2
Fixed issue can't install by @Enoalife
Fixed QS tile in settings
Fixed music theme (eleven)
Themed sony apps (music, album, video)
Now you can't see material light
etc
NB:
If not themed all please reboot or soft reboot
If still failed to install please give me logcat

All official Moto G boot animations and logos

I've collected all of the official Moto G boot animations from Motorola and Lenovo (and their matching logos) and put them in flashable zip files. They should be compatible with all Moto G models.
Downloads
Installation instructions
More details
So far I've tested with XT1034 (Moto G 2013 US AWS) and XT1540 (Moto G 2015 US). If it works for you as well, please post your model # (Settings → About phone → Hardware SKU) and which ROM you're using and I'll add it to my list.
thanks... personally i love the sticth one...
SenorChang said:
I've collected all of the official Moto G boot animations from Motorola (and their matching logos) and put them in flashable zip files. They should be compatible with all Moto G models, but only with stock ROMs since custom ROMs use a different boot animation format.
Downloads
Installation instructions
More details
So far I've tested with XT1034 (Moto G 2013 US AWS) and XT1540 (Moto G 2015 US). If it works for you as well, please post your model # (Settings → About phone → Hardware SKU) and I'll add it to my list.
I'm currently working on adding support for custom ROMs as well (Cyanogenmod, Omni, etc), but I'm running stock so I'd need someone to test before I'd feel comfortable releasing it. If anyone's interested, let me know.
Click to expand...
Click to collapse
A will test it
skooter32 said:
A will test it
Click to expand...
Click to collapse
Cool, thanks!
1. What device do you have?
2. What ROM are you using?
3. What's the logo that you have now (the one that shows as soon as you turn on the phone before the boot animation starts)?
I'll see if I can get something ready for you to test today.
SenorChang said:
Cool, thanks!
1. What device do you have?
2. What ROM are you using?
3. What's the logo that you have now (the one that shows as soon as you turn on the phone before the boot animation starts)?
I'll see if I can get something ready for you to test today.
Click to expand...
Click to collapse
OK xt1541 GB moto using official PAC rom 5.1.1 andcam using a custom boot.logo big M blue
---------- Post added at 09:10 PM ---------- Previous post was at 09:08 PM ----------
skooter32 said:
OK xt1541 GB moto using official PAC rom 5.1.1 andcam using a custom boot.logo big M blue
Click to expand...
Click to collapse
Pm me
Funcionando en moto g3 xt1543 LP 5.1.1
Is there any Motorola Boot Animation for Moto G 2015 - XT1550 ?
Also, could you kindly note down the steps to update the boot animation ?
1. What device do you have? - Moto G 2015 - XT1550 (India)
2. What ROM are you using? - Stock Marshmallow 6.0 (24.11.25.osprey_retasia_ds_2gb.retasia.en.03.retin)
3. What's the logo that you have now (the one that shows as soon as you turn on the phone before the boot animation starts)? - The stitching animation.
Thanks in advance.
Hey I need the /system/bin/bootanimation file from the XT1550 @soumyajit9
Device- Xt1550
Rom- CM13
Logo- warning boot loader unlocked (cuz I accidently deleted the Banimation file
Sent from my MotoG3 using XDA-Developers mobile app
SenorChang said:
Cool, thanks!
1. What device do you have?
2. What ROM are you using?
3. What's the logo that you have now (the one that shows as soon as you turn on the phone before the boot animation starts)?
I'll see if I can get something ready for you to test today.
Click to expand...
Click to collapse
I can also test. I have xt1541, official cm13.1 nightly and my bootlogo is the official Motorola stitch logo. I'd really like the stitch boot animation. Thanks
Sent from my MotoG3 using XDA Labs
tzzeri said:
I can also test. I have xt1541, official cm13.1 nightly and my bootlogo is the official Motorola stitch logo. I'd really like the stitch boot animation. Thanks
Sent from my MotoG3 using XDA Labs
Click to expand...
Click to collapse
Unfortunately I don't have time to work on this right now. In case you'd like to test this on your own, I'll post what I've got so far. If anyone figures it out I can update my flashable zip files.
First off, as you probably already know flashing the logo is pretty much the same no matter what ROM you're using, so that doesn't change.
Changing the boot animation is trickier. The boot animation is stored in /system/media/bootanimation.zip and is played by a binary file located at /system/bin/bootanimation.
If you look at the bootanimation.zip file from most Android ROMs, it contains a bunch of images. Motorola, however, uses MP4 video files. In order to allow these, they've made their own custom bootanimation binary that plays the video files.
On a Motorola ROM, all you have to change is /system/media/bootanimation.zip. But on other ROMs, you'll also need to change /system/bin/bootanimation. I tried this, however, and it hasn't seemed to work yet. I'm not sure what the problem is. My first thought was it relies on a dynamic library, but it appears to be a static binary:
Code:
$ ldd bootanimation
not a dynamic executable
So my guess at the moment is either I'm not successfully copying the bootanimation binary, or it isn't compatible for some other reason.
If you want to play around, I put my progress in a separate branch here:
https://github.com/bmaupin/motorola-boot-animations/tree/custom-roms
The Motorola bootanimation binary that needs to be copied is here (just click RAW to download it):
https://github.com/bmaupin/motorola-boot-animations/blob/custom-roms/bootanimation
You can get the stitch bootanimation.zip from here:
https://github.com/bmaupin/motorola-boot-animations/tree/custom-roms/boot-animations/stitch
And last but not least, the script I was working on to update the boot animation is here:
https://github.com/bmaupin/motorola...ms/META-INF/com/google/android/updater-script
Good luck, and let me know if I can be of any help.
SenorChang said:
Unfortunately I don't have time to work on this right now. In case you'd like to test this on your own, I'll post what I've got so far. If anyone figures it out I can update my flashable zip files.
First off, as you probably already know flashing the logo is pretty much the same no matter what ROM you're using, so that doesn't change.
Changing the boot animation is trickier. The boot animation is stored in /system/media/bootanimation.zip and is played by a binary file located at /system/bin/bootanimation.
If you look at the bootanimation.zip file from most Android ROMs, it contains a bunch of images. Motorola, however, uses MP4 video files. In order to allow these, they've made their own custom bootanimation binary that plays the video files.
On a Motorola ROM, all you have to change is /system/media/bootanimation.zip. But on other ROMs, you'll also need to change /system/bin/bootanimation. I tried this, however, and it hasn't seemed to work yet. I'm not sure what the problem is. My first thought was it relies on a dynamic library, but it appears to be a static binary:
So my guess at the moment is either I'm not successfully copying the bootanimation binary, or it isn't compatible for some other reason.
If you want to play around, I put my progress in a separate branch here:
https://github.com/bmaupin/motorola-boot-animations/tree/custom-roms
The Motorola bootanimation binary that needs to be copied is here (just click RAW to download it):
https://github.com/bmaupin/motorola-boot-animations/blob/custom-roms/bootanimation
You can get the stitch bootanimation.zip from here:
https://github.com/bmaupin/motorola-boot-animations/tree/custom-roms/boot-animations/stitch
And last but not least, the script I was working on to update the boot animation is here:
https://github.com/bmaupin/motorola...ms/META-INF/com/google/android/updater-script
Good luck, and let me know if I can be of any help.
Click to expand...
Click to collapse
People have gotten this working on kk and LP, there's multiple threads about it, though not on mm. However, I've found most of the Motorola boot animations converted to regular ones (images from the mp4), however I haven't found that for the stitch animation
Sent from my MotoG3 using XDA Labs
tzzeri said:
People have gotten this working on kk and LP, there's multiple threads about it, though not on mm. However, I've found most of the Motorola boot animations converted to regular ones (images from the mp4), however I haven't found that for the stitch animation
Sent from my MotoG3 using XDA Labs
Click to expand...
Click to collapse
I looked into converting the stitch animation to the AOSP format (with images). The problem is the resulting files are huge because the stitch animation has a textured background. The resulting file would be > 60 MB and the quality still isn't very good.
Looking further into getting the bootanimation binary file working, one issue could be SELinux. Here's something you could try:
Connect to your device
Code:
adb shell
su
Remount /system as read-write
Code:
mount -o remount,rw /system
List the security context and permissions of /system/bin/bootanimation and copy the result somewhere
Code:
ls -Z /system/bin/bootanimation
Back up /system/bin/bootanimation
Code:
cp -p /system/bin/bootanimation /system/bin/bootanimation.bak
Copy the Motorola bootanimation binary over (get it from https://github.com/bmaupin/motorola-boot-animations/blob/custom-roms/bootanimation)
Code:
adb push bootanimation /sdcard
cp /sdcard/bootanimation /system/bin/bootanimation
chmod 775 /system/bin/bootanimation
List the security context and permissions of /system/bin/bootanimation
Code:
ls -Z /system/bin/bootanimation
If it isn't the same as before, you may need to fix it. For example (this is from a Motorola stock ROM, yours may be different):
Code:
chown root:shell /system/bin/bootanimation
chcon u:object_r:bootanim_exec:s0 /system/bin/bootanimation
Lastly, copy the stitch bootanimation.zip file (get it from here: https://github.com/bmaupin/motorola-boot-animations/tree/custom-roms/boot-animations/stitch) to /system/media/bootanimation.zip and reboot.
I'm still not expecting it to work, but if you want to be my guinea pig you can try.
After rebooting, if it doesn't work, you can check to see if it's an SELinux issue like this:
Code:
adb shell su -c dmesg | grep 'avc: '
You could also try to run the bootanimation binary directly:
Code:
adb shell su /system/bin/bootanimation
I'm guessing that won't work either, but it may provide valuable feedback.
xkflowne said:
Funcionando en moto g3 xt1543 LP 5.1.1
Click to expand...
Click to collapse
Somehow I missed this before. Added to compatibility list. Thanks!
soumyajit9 said:
Is there any Motorola Boot Animation for Moto G 2015 - XT1550 ?
Also, could you kindly note down the steps to update the boot animation ?
Click to expand...
Click to collapse
The boot animations should be compatible with all variants of the Moto G, although only with the stock ROM right now.
As I mentioned in the first post, the installation instructions are here (including manual installation if you want to tinker):
https://github.com/bmaupin/motorola-boot-animations/wiki/Installation
SenorChang said:
I looked into converting the stitch animation to the AOSP format (with images). The problem is the resulting files are huge because the stitch animation has a textured background. The resulting file would be > 60 MB and the quality still isn't very good.
Looking further into getting the bootanimation binary file working, one issue could be SELinux. Here's something you could try:
Connect to your device
Remount /system as read-write
List the security context and permissions of /system/bin/bootanimation and copy the result somewhere
Back up /system/bin/bootanimation
Copy the Motorola bootanimation binary over (get it from https://github.com/bmaupin/motorola-boot-animations/blob/custom-roms/bootanimation)
List the security context and permissions of /system/bin/bootanimation
If it isn't the same as before, you may need to fix it. For example (this is from a Motorola stock ROM, yours may be different):
Lastly, copy the stitch bootanimation.zip file (get it from here: https://github.com/bmaupin/motorola-boot-animations/tree/custom-roms/boot-animations/stitch) to /system/media/bootanimation.zip and reboot.
I'm still not expecting it to work, but if you want to be my guinea pig you can try.
After rebooting, if it doesn't work, you can check to see if it's an SELinux issue like this:
You could also try to run the bootanimation binary directly:
I'm guessing that won't work either, but it may provide valuable feedback.
Click to expand...
Click to collapse
I haven't done the adb stuff yet, but I put the bootanimation file in system bin and the the boot animation zip in system media, set the right permissions, and then, when I set selinux as permissive, i get about half a second of the bootanimation, but then I just get a black screen. That's with a soft reboot, because I haven't found a way yet to set selinux as permissive without it being reset with a hard reboot. I'll hopefully try the advice stuff later.
Sent from my MotoG3 using XDA Labs
tzzeri said:
I haven't done the advice stuff yet, but I put the bootanimation file in system bin and the the boot animation zip in system media, set the right permissions, and then, when I set selinux as permissive, i get about half a second of the bootanimation, but then I just get a black screen. That's with a soft reboot, because I haven't found a way yet to set selinux as permissive without it being reset with a hard reboot. I'll hopefully try the advice stuff later.
Sent from my MotoG3 using XDA Labs
Click to expand...
Click to collapse
Okay, try this:
Connect to your device
Code:
adb shell
su
Remount /system as read-write
Code:
mount -o remount,rw /system
Run the following commands, and paste the output here
Code:
getenforce
restorecon -v /system/bin/bootanimation
restorecon -v /system/media/bootanimation.zip
grep /system/media/bootanimation.zip /file_contexts
grep /system/media /file_contexts
grep /system /file_contexts | head -n 1
ls -Z /system/media/bootanimation.zip
ls -l /system/media/bootanimation.zip
grep /system/bin/bootanimation /file_contexts
ls -Z /system/bin/bootanimation
ls -l /system/bin/bootanimation
ls -ld /data/local
ls -dZ /data/local/moodle
ls -ld /data/local/moodle
Leave SELinux enabled/enforcing and reboot the device normally and let me know what happens
If it fails:
Connect to your device again:
Code:
adb shell
Give me the output of this command:
Code:
dmesg | grep avc
And send me this file:
Code:
adb pull /sepolicy
SenorChang said:
I looked into converting the stitch animation to the AOSP format (with images). The problem is the resulting files are huge because the stitch animation has a textured background. The resulting file would be > 60 MB and the quality still isn't very good.
Looking further into getting the bootanimation binary file working, one issue could be SELinux. Here's something you could try:
Connect to your device
Remount /system as read-write
List the security context and permissions of /system/bin/bootanimation and copy the result somewhere
Back up /system/bin/bootanimation
Copy the Motorola bootanimation binary over (get it from https://github.com/bmaupin/motorola-boot-animations/blob/custom-roms/bootanimation)
List the security context and permissions of /system/bin/bootanimation
If it isn't the same as before, you may need to fix it. For example (this is from a Motorola stock ROM, yours may be different):
Lastly, copy the stitch bootanimation.zip file (get it from here: https://github.com/bmaupin/motorola-boot-animations/tree/custom-roms/boot-animations/stitch) to /system/media/bootanimation.zip and reboot.
I'm still not expecting it to work, but if you want to be my guinea pig you can try.
After rebooting, if it doesn't work, you can check to see if it's an SELinux issue like this:
You could also try to run the bootanimation binary directly:
I'm guessing that won't work either, but it may provide valuable feedback.
Click to expand...
Click to collapse
Running the binary from terminal emulator worked. But it's still not working when booting up, except for half a second when it shows the SOL image that's in the boot animation, but not the videos
Sent from my MotoG3 using XDA Labs
---------- Post added at 01:06 AM ---------- Previous post was at 01:03 AM ----------
[email protected]:/ # mount -o remount,rw /system
[email protected]:/ # ls -Z /system/bin/bootanimation
ubject_r:bootanim_exec:s0 /system/bin/bootanimation
[email protected]:/ # cp -p /system/bin/bootanimation /system/bin/bootanimation.bak
[email protected]:/ # adb push bootanimation /sdcard
sh: adb: not found
127|[email protected]:/ # cp /sdcard/bootanimation /system/bin/bootanimation
[email protected]:/ # chmod 775 /system/bin/bootanimation
[email protected]:/ # push bootanimation /sdcard
sh: push: not found
nimation /system/bin/bootanimation <
hmod 775 /system/bin/bootanimation <
[email protected]:/ # ls -Z /system/bin/bootanimation
ubject_r:bootanim_exec:s0 /system/bin/bootanimation
[email protected]:/ #
When pushing the files wasn't working, as it's terminal emulator, instead I did it manually
Sent from my MotoG3 using XDA Labs
---------- Post added at 01:32 AM ---------- Previous post was at 01:06 AM ----------
$ su
[email protected]:/ # dmesg | grep avc
[ 1607.158993,2] type=1400 audit(1462666189.002:2364): avc: denied { getattr } for uid=10118 pid=22653 comm="ps" path="/proc/1" dev="proc" ino=221057 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=dir permissive=1
[ 1607.159588,2] type=1400 audit(1462666189.002:2365): avc: denied { search } for uid=10118 pid=22653 comm="ps" name="1" dev="proc" ino=221057 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=dir permissive=1
[ 1607.159784,2] type=1400 audit(1462666189.002:2366): avc: denied { read } for uid=10118 pid=22653 comm="ps" name="cmdline" dev="proc" ino=222595 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=file permissive=1
[ 1607.159926,2] type=1400 audit(1462666189.002:2367): avc: denied { open } for uid=10118 pid=22653 comm="ps" path="/proc/1/cmdline" dev="proc" ino=222595 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=file permissive=1
[ 1607.160186,2] type=1400 audit(1462666189.002:2368): avc: denied { getattr } for uid=10118 pid=22653 comm="ps" path="/proc/2" dev="proc" ino=221058 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=1
[ 1607.160810,2] type=1400 audit(1462666189.002:2369): avc: denied { search } for uid=10118 pid=22653 comm="ps" name="2" dev="proc" ino=221058 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=1
[ 1607.161125,2] type=1400 audit(1462666189.002:2370): avc: denied { read } for uid=10118 pid=22653 comm="ps" name="cmdline" dev="proc" ino=218481 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=file permissive=1
[ 1607.161289,2] type=1400 audit(1462666189.002:2371): avc: denied { open } for uid=10118 pid=22653 comm="ps" path="/proc/2/cmdline" dev="proc" ino=218481 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=file permissive=1
[ 1607.192124,2] type=1400 audit(1462666189.035:2372): avc: denied { getattr } for uid=10118 pid=22653 comm="ps" path="/proc/217" dev="proc" ino=222221 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:ueventd:s0 tclass=dir permissive=1
[ 1607.192299,2] type=1400 audit(1462666189.035:2373): avc: denied { search } for uid=10118 pid=22653 comm="ps" name="217" dev="proc" ino=222221 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:ueventd:s0 tclass=dir permissive=1
[ 1607.193930,0] type=1400 audit(1462666189.035:2374): avc: denied { read } for uid=10118 pid=22653 comm="ps" name="cmdline" dev="proc" ino=222597 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:ueventd:s0 tclass=file permissive=1
[ 1607.226212,0] type=1400 audit(1462666189.035:2375): avc: denied { open } for uid=10118 pid=22653 comm="ps" path="/proc/217/cmdline" dev="proc" ino=222597 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:ueventd:s0 tclass=file permissive=1
[ 1607.226373,0] type=1400 audit(1462666189.039:2376): avc: denied { getattr } for uid=10118 pid=22653 comm="ps" path="/proc/233" dev="proc" ino=223001 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:logd:s0 tclass=dir permissive=1
[ 1607.226492,0] type=1400 audit(1462666189.039:2377): avc: denied { search } for uid=10118 pid=22653 comm="ps" name="233" dev="proc" ino=223001 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:logd:s0 tclass=dir permissive=1
[ 1607.226599,0] type=1400 audit(1462666189.039:2378): avc: denied { read } for uid=10118 pid=22653 comm="ps" name="cmdline" dev="proc" ino=223002 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:logd:s0 tclass=file permissive=1
[ 1607.226718,0] type=1400 audit(1462666189.042:2379): avc: denied { open } for uid=10118 pid=22653 comm="ps" path="/proc/233/cmdline" dev="proc" ino=223002 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:logd:s0 tclass=file permissive=1
[ 1607.226823,0] type=1400 audit(1462666189.062:2380): avc: denied { getattr } for uid=10118 pid=22653 comm="ps" path="/proc/240" dev="proc" ino=223009 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:vold:s0 tclass=dir permissive=1
[ 1607.227248,0] type=1400 audit(1462666189.062:2381): avc: denied { search } for uid=10118 pid=22653 comm="ps" name="240" dev="proc" ino=223009 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:vold:s0 tclass=dir permissive=1
[ 1607.227367,0] type=1400 audit(1462666189.062:2382): avc: denied { read } for uid=10118 pid=22653 comm="ps" name="cmdline" dev="proc" ino=223010 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:vold:s0 tclass=file permissive=1
[ 1607.227474,0] type=1400 audit(1462666189.062:2383): avc: denied { open } for uid=10118 pid=22653 comm="ps" path="/proc/240/cmdline" dev="proc" ino=223010 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:vold:s0 tclass=file permissive=1
[ 1607.227575,0] type=1400 audit(1462666189.062:2384): avc: denied { getattr } for uid=10118 pid=22653 comm="ps" path="/proc/297" dev="proc" ino=223021 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:healthd:s0 tclass=dir permissive=1
[ 1607.236611,0] type=1400 audit(1462666189.062:2385): avc: denied { search } for uid=10118 pid=22653 comm="ps" name="297" dev="proc" ino=223021 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:healthd:s0 tclass=dir permissive=1
[ 1607.244049,2] type=1400 audit(1462666189.062:2386): avc: denied { read } for uid=10118 pid=22653 comm="ps" name="cmdline" dev="proc" ino=223022 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:healthd:s0 tclass=file permissive=1
[ 1607.244245,2] type=1400 audit(1462666189.062:2387): avc: denied { open } for uid=10118 pid=22653 comm="ps" path="/proc/297/cmdline" dev="proc" ino=223022 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:healthd:s0 tclass=file permissive=1
[ 1607.244397,2] type=1400 audit(1462666189.062:2388): avc: denied { getattr } for uid=10118 pid=22653 comm="ps" path="/proc/298" dev="proc" ino=223025 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:lmkd:s0 tclass=dir permissive=1
[ 1607.244521,2] type=1400 audit(1462666189.062:2389): avc: denied { search } for uid=10118 pid=22653 comm="ps" name="298" dev="proc" ino=223025 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:lmkd:s0 tclass=dir permissive=1
[ 1607.244627,2] type=1400 audit(1462666189.062:2390): avc: denied { read } for uid=10118 pid=22653 comm="ps" name="cmdline" dev="proc" ino=223026 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:lmkd:s0 tclass=file permissive=1
[ 1607.244725,2] type=1400 audit(1462666189.062:2391): avc: denied { open } for uid=10118 pid=22653 comm="ps" path="/proc/298/cmdline" dev="proc" ino=223026 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:lmkd:s0 tclass=file permissive=1
[ 1607.244823,2] type=1400 audit(1462666189.062:2392): avc: denied { getattr } for uid=10118 pid=22653 comm="ps" path="/proc/299" dev="proc" ino=223029 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:servicemanager:s0 tclass=dir permissive=1
[ 1607.244917,2] type=1400 audit(1462666189.062:2393): avc: denied { search } for uid=10118 pid=22653 comm="ps" name="299" dev="proc" ino=223029 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:servicemanager:s0 tclass=dir permissive=1
[ 1676.748926,2] type=1400 audit(1462666258.589:2524): avc: denied { getattr } for uid=10118 pid=23092 comm="ps" path="/proc/1" dev="proc" ino=219080 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=dir permissive=1
[ 1676.749726,2] type=1400 audit(1462666258.589:2525): avc: denied { search } for uid=10118 pid=23092 comm="ps" name="1" dev="proc" ino=219080 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=dir permissive=1
[ 1676.749897,2] type=1400 audit(1462666258.589:2526): avc: denied { read } for uid=10118 pid=23092 comm="ps" name="cmdline" dev="proc" ino=228851 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=file permissive=1
[ 1676.750020,2] type=1400 audit(1462666258.589:2527): avc: denied { open } for uid=10118 pid=23092 comm="ps" path="/proc/1/cmdline" dev="proc" ino=228851 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=file permissive=1
[ 1676.750136,2] type=1400 audit(1462666258.589:2528): avc: denied { getattr } for uid=10118 pid=23092 comm="ps" path="/proc/2" dev="proc" ino=219081 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=1
[ 1676.750240,2] type=1400 audit(1462666258.589:2529): avc: denied { search } for uid=10118 pid=23092 comm="ps" name="2" dev="proc" ino=219081 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=1
[ 1676.753739,2] type=1400 audit(1462666258.595:2530): avc: denied { read } for uid=10118 pid=23092 comm="ps" name="cmdline" dev="proc" ino=228853 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=file permissive=1
[ 1676.753993,2] type=1400 audit(1462666258.595:2531): avc: denied { open } for uid=10118 pid=23092 comm="ps" path="/proc/2/cmdline" dev="proc" ino=228853 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=file permissive=1
[ 1676.789747,3] type=1400 audit(1462666258.632:2532): avc: denied { getattr } for uid=10118 pid=23092 comm="ps" path="/proc/217" dev="proc" ino=228437 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:ueventd:s0 tclass=dir permissive=1
[ 1676.790126,3] type=1400 audit(1462666258.632:2533): avc: denied { search } for uid=10118 pid=23092 comm="ps" name="217" dev="proc" ino=228437 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:ueventd:s0 tclass=dir permissive=1
[ 1676.790245,3] type=1400 audit(1462666258.632:2534): avc: denied { read } for uid=10118 pid=23092 comm="ps" name="cmdline" dev="proc" ino=225865 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:ueventd:s0 tclass=file permissive=1
[ 1676.790516,3] type=1400 audit(1462666258.632:2535): avc: denied { open } for uid=10118 pid=23092 comm="ps" path="/proc/217/cmdline" dev="proc" ino=225865 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:ueventd:s0 tclass=file permissive=1
[ 1676.790966,3] type=1400 audit(1462666258.635:2536): avc: denied { getattr } for uid=10118 pid=23092 comm="ps" path="/proc/233" dev="proc" ino=228448 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:logd:s0 tclass=dir permissive=1
[ 1676.791136,3] type=1400 audit(1462666258.635:2537): avc: denied { search } for uid=10118 pid=23092 comm="ps" name="233" dev="proc" ino=228448 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:logd:s0 tclass=dir permissive=1
[ 1676.791238,3] type=1400 audit(1462666258.635:2538): avc: denied { read } for uid=10118 pid=23092 comm="ps" name="cmdline" dev="proc" ino=225887 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:logd:s0 tclass=file permissive=1
[ 1676.791331,3] type=1400 audit(1462666258.635:2539): avc: denied { open } for uid=10118 pid=23092 comm="ps" path="/proc/233/cmdline" dev="proc" ino=225887 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:logd:s0 tclass=file permissive=1
[ 1676.801486,3] type=1400 audit(1462666258.635:2540): avc: denied { getattr } for uid=10118 pid=23092 comm="ps" path="/proc/240" dev="proc" ino=228450 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:vold:s0 tclass=dir permissive=1
[ 1676.801615,3] type=1400 audit(1462666258.635:2541): avc: denied { search } for uid=10118 pid=23092 comm="ps" name="240" dev="proc" ino=228450 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:vold:s0 tclass=dir permissive=1
[ 1676.801725,3] type=1400 audit(1462666258.635:2542): avc: denied { read } for uid=10118 pid=23092 comm="ps" name="cmdline" dev="proc" ino=225891 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:vold:s0 tclass=file permissive=1
[ 1676.801824,3] type=1400 audit(1462666258.635:2543): avc: denied { open } for uid=10118 pid=23092 comm="ps" path="/proc/240/cmdline" dev="proc" ino=225891 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:vold:s0 tclass=file permissive=1
[ 1691.719639,2] type=1400 audit(1462666273.562:2677): avc: denied { use } for uid=1003 pid=23280 comm="BootAnimation" path="/system/media/bootanimation.zip" dev="mmcblk0p41" ino=133009 scontext=u:r:mediaserver:s0 tcontext=u:r:bootanim:s0 tclass=fd permissive=1
[ 1744.664663,2] type=1400 audit(1462666326.496:2678): avc: denied { getattr } for uid=10118 pid=26298 comm="ps" path="/proc/1" dev="proc" ino=245185 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=dir permissive=1
[ 1744.665208,2] type=1400 audit(1462666326.496:2679): avc: denied { search } for uid=10118 pid=26298 comm="ps" name="1" dev="proc" ino=245185 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=dir permissive=1
[ 1744.665327,2] type=1400 audit(1462666326.496:2680): avc: denied { read } for uid=10118 pid=26298 comm="ps" name="cmdline" dev="proc" ino=245285 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=file permissive=1
[ 1744.665430,2] type=1400 audit(1462666326.496:2681): avc: denied { open } for uid=10118 pid=26298 comm="ps" path="/proc/1/cmdline" dev="proc" ino=245285 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=file permissive=1
[ 1744.665527,2] type=1400 audit(1462666326.496:2682): avc: denied { getattr } for uid=10118 pid=26298 comm="ps" path="/proc/2" dev="proc" ino=245186 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=1
[ 1744.665619,2] type=1400 audit(1462666326.496:2683): avc: denied { search } for uid=10118 pid=26298 comm="ps" name="2" dev="proc" ino=245186 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=dir permissive=1
[ 1744.665762,2] type=1400 audit(1462666326.496:2684): avc: denied { read } for uid=10118 pid=26298 comm="ps" name="cmdline" dev="proc" ino=245288 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=file permissive=1
[ 1744.665892,2] type=1400 audit(1462666326.496:2685): avc: denied { open } for uid=10118 pid=26298 comm="ps" path="/proc/2/cmdline" dev="proc" ino=245288 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:kernel:s0 tclass=file permissive=1
[ 1744.703291,2] type=1400 audit(1462666326.532:2686): avc: denied { getattr } for uid=10118 pid=26298 comm="ps" path="/proc/217" dev="proc" ino=245623 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:ueventd:s0 tclass=dir permissive=1
[ 1744.703495,2] type=1400 audit(1462666326.532:2687): avc: denied { search } for uid=10118 pid=26298 comm="ps" name="217" dev="proc" ino=245623 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:ueventd:s0 tclass=dir permissive=1
[ 1744.703965,2] type=1400 audit(1462666326.532:2688): avc: denied { read } for uid=10118 pid=26298 comm="ps" name="cmdline" dev="proc" ino=248932 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:ueventd:s0 tclass=file permissive=1
[ 1744.704091,2] type=1400 audit(1462666326.532:2689): avc: denied { open } for uid=10118 pid=26298 comm="ps" path="/proc/217/cmdline" dev="proc" ino=248932 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:ueventd:s0 tclass=file permissive=1
[ 1744.707259,1] type=1400 audit(1462666326.536:2690): avc: denied { getattr } for uid=10118 pid=26298 comm="ps" path="/proc/233" dev="proc" ino=245634 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:logd:s0 tclass=dir permissive=1
[ 1744.707401,1] type=1400 audit(1462666326.536:2691): avc: denied { search } for uid=10118 pid=26298 comm="ps" name="233" dev="proc" ino=245634 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:logd:s0 tclass=dir permissive=1
[ 1744.707511,1] type=1400 audit(1462666326.536:2692): avc: denied { read } for uid=10118 pid=26298 comm="ps" name="cmdline" dev="proc" ino=248965 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:logd:s0 tclass=file permissive=1
[ 1744.707606,1] type=1400 audit(1462666326.536:2693): avc: denied { open } for uid=10118 pid=26298 comm="ps" path="/proc/233/cmdline" dev="proc" ino=248965 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:logd:s0 tclass=file permissive=1
[ 1744.707699,1] type=1400 audit(1462666326.536:2694): avc: denied { getattr } for uid=10118 pid=26298 comm="ps" path="/proc/240" dev="proc" ino=245636 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:vold:s0 tclass=dir permissive=1
[ 1744.708280,1] type=1400 audit(1462666326.536:2695): avc: denied { search } for uid=10118 pid=26298 comm="ps" name="240" dev="proc" ino=245636 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:vold:s0 tclass=dir permissive=1
[ 1744.708378,1] type=1400 audit(1462666326.536:2696): avc: denied { read } for uid=10118 pid=26298 comm="ps" name="cmdline" dev="proc" ino=248971 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:vold:s0 tclass=file permissive=1
[ 1744.708478,1] type=1400 audit(1462666326.536:2697): avc: denied { open } for uid=10118 pid=26298 comm="ps" path="/proc/240/cmdline" dev="proc" ino=248971 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:vold:s0 tclass=file permissive=1
[ 1744.708564,1] type=1400 audit(1462666326.539:2698): avc: denied { getattr } for uid=10118 pid=26298 comm="ps" path="/proc/297" dev="proc" ino=245639 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:healthd:s0 tclass=dir permissive=1
[ 1744.708763,0] type=1400 audit(1462666326.539:2699): avc: denied { search } for uid=10118 pid=26298 comm="ps" name="297" dev="proc" ino=245639 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:healthd:s0 tclass=dir permissive=1
[ 1744.711513,3] type=1400 audit(1462666326.539:2700): avc: denied { read } for uid=10118 pid=26298 comm="ps" name="cmdline" dev="proc" ino=248980 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:healthd:s0 tclass=file permissive=1
[ 1744.711650,3] type=1400 audit(1462666326.539:2701): avc: denied { open } for uid=10118 pid=26298 comm="ps" path="/proc/297/cmdline" dev="proc" ino=248980 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:healthd:s0 tclass=file permissive=1
[ 1744.711762,3] type=1400 audit(1462666326.539:2702): avc: denied { getattr } for uid=10118 pid=26298 comm="ps" path="/proc/298" dev="proc" ino=245640 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:lmkd:s0 tclass=dir permissive=1
[ 1744.711865,3] type=1400 audit(1462666326.539:2703): avc: denied { search } for uid=10118 pid=26298 comm="ps" name="298" dev="proc" ino=245640 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:lmkd:s0 tclass=dir permissive=1
[ 1744.711960,3] type=1400 audit(1462666326.539:2704): avc: denied { read } for uid=10118 pid=26298 comm="ps" name="cmdline" dev="proc" ino=248983 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:lmkd:s0 tclass=file permissive=1
[ 1744.712053,3] type=1400 audit(1462666326.539:2705): avc: denied { open } for uid=10118 pid=26298 comm="ps" path="/proc/298/cmdline" dev="proc" ino=248983 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:lmkd:s0 tclass=file permissive=1
[ 1744.719235,3] type=1400 audit(1462666326.539:2706): avc: denied { getattr } for uid=10118 pid=26298 comm="ps" path="/proc/299" dev="proc" ino=245641 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:servicemanager:s0 tclass=dir permissive=1
[ 1744.719477,3] type=1400 audit(1462666326.539:2707): avc: denied { search } for uid=10118 pid=26298 comm="ps" name="299" dev="proc" ino=245641 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:servicemanager:s0 tclass=dir permissive=1
[ 1744.719598,3] type=1400 audit(1462666326.539:2708): avc: denied { read } for uid=10118 pid=26298 comm="ps" name="cmdline" dev="proc" ino=248986 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:servicemanager:s0 tclass=file permissive=1
[ 1744.719720,3] type=1400 audit(1462666326.539:2709): avc: denied { open } for uid=10118 pid=26298 comm="ps" path="/proc/299/cmdline" dev="proc" ino=248986 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:servicemanager:s0 tclass=file permissive=1
[ 1744.719978,3] type=1400 audit(1462666326.539:2710): avc: denied { getattr } for uid=10118 pid=26298 comm="ps" path="/proc/300" dev="proc" ino=245642 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:surfaceflinger:s0 tclass=dir permissive=1
[ 1744.720080,3] type=1400 audit(1462666326.539:2711): avc: denied { search } for uid=10118 pid=26298 comm="ps" name="300" dev="proc" ino=245642 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:surfaceflinger:s0 tclass=dir permissive=1
[ 1744.720178,3] type=1400 audit(1462666326.539:2712): avc: denied { read } for uid=10118 pid=26298 comm="ps" name="cmdline" dev="proc" ino=248989 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:surfaceflinger:s0 tclass=file permissive=1
[ 1744.720280,3] type=1400 audit(1462666326.539:2713): avc: denied { open } for uid=10118 pid=26298 comm="ps" path="/proc/300/cmdline" dev="proc" ino=248989 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:surfaceflinger:s0 tclass=file permissive=1
[ 1744.723034,3] type=1400 audit(1462666326.539:2714): avc: denied { getattr } for uid=10118 pid=26298 comm="ps" path="/proc/304" dev="proc" ino=245643 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:tee:s0 tclass=dir permissive=1
[ 1744.723253,3] type=1400 audit(1462666326.539:2715): avc: denied { search } for uid=10118 pid=26298 comm="ps" name="304" dev="proc" ino=245643 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:tee:s0 tclass=dir permissive=1
[ 1744.723446,3] type=1400 audit(1462666326.539:2716): avc: denied { read } for uid=10118 pid=26298 comm="ps" name="cmdline" dev="proc" ino=248992 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:tee:s0 tclass=file permissive=1
[ 1764.038555,3] type=1400 audit(1462666345.866:2834): avc: denied { ioctl } for uid=10031 pid=27173 comm="ChromiumNet" path="socket:[254696]" dev="sockfs" ino=254696 ioctlcmd=8b1b scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=udp_socket permissive=1
[ 1845.146282,1] type=1400 audit(1462666426.976:2835): avc: denied { search } for uid=99000 pid=28212 comm=4173796E635461736B202331 name="com.android.chrome" dev="mmcblk0p42" ino=2984 scontext=u:r:isolated_app:s0:c512,c768 tcontext=ubject_r:app_data_file:s0:c512,c768 tclass=dir permissive=1
[ 1846.056707,2] type=1400 audit(1462666427.886:2836): avc: denied { ioctl } for uid=99000 pid=28209 comm="Binder_1" path="socket:[274544]" dev="sockfs" ino=274544 ioctlcmd=7704 scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=unix_stream_socket permissive=1
[ 1846.058487,2] type=1400 audit(1462666427.886:2837): avc: denied { ioctl } for uid=99000 pid=28209 comm="Binder_1" path="/data/data/com.android.chrome/app_chrome/paks/en-GB.pak" dev="mmcblk0p42" ino=8441 ioctlcmd=7704 scontext=u:r:isolated_app:s0:c512,c768 tcontext=ubject_r:app_data_file:s0:c512,c768 tclass=file permissive=1
[ 1848.167268,0] type=1400 audit(1462666429.996:2838): avc: denied { write } for uid=0 pid=101 comm="kswapd0" path=2F6465762F6173686D656D202864656C6574656429 dev="tmpfs" ino=275679 scontext=u:r:kernel:s0 tcontext=ubject_r:untrusted_app_tmpfs:s0:c512,c768 tclass=file permissive=1
[email protected]:/ #
Sent from my MotoG3 using XDA Labs
I renamed sepolicy to sepolicy.txt so it will be a supported file type to upload.
I've had selinux disabled, though this method is applied only after boot, though it still didn't work with a soft boot, and then it's stays permissive
Sent from my MotoG3 using XDA Labs
@SenorChang
I took a log while soft rebooting. Here's the few logs that relate to the bootanimation. It seems like the problem is the media player.
Sent from my MotoG3 using XDA Labs
Ps, when I do a full reboot, it shows the SOL the whole time, and at the end it does the actual boot animation, though I think it's already booted by then as the screen can turn off in the middle, while with soft rebooting it shows the SOL for half a second as it should and then a black screen.
I can take a log of a full boot later
tzzeri said:
@SenorChang
I took a log while soft rebooting. Here's the few logs that relate to the bootanimation. It seems like the problem is the media player.
Sent from my MotoG3 using XDA Labs
Ps, when I do a full reboot, it shows the SOL the whole time, and at the end it does the actual boot animation, though I think it's already booted by then as the screen can turn off in the middle, while with soft rebooting it shows the SOL for half a second as it should and then a black screen.
I can take a log of a full boot later
Click to expand...
Click to collapse
Hmm, after doing some more research I think we'll need to try a different approach.
If I have any breakthroughs I'll let you know.

Stuck with root permissions

RemixOS player 1.0.109
Stuck with root permissions for Adaway. Any idea how to fix?
slawdos said:
RemixOS player 1.0.109
Stuck with root permissions for Adaway. Any idea how to fix?
Click to expand...
Click to collapse
I am experiencing the same issue. Everytime I run an app that request #superuser permissions the whole Player freezes and I can only shutdown. Any fix?
mariusmbp said:
I am experiencing the same issue. Everytime I run an app that request #superuser permissions the whole Player freezes and I can only shutdown. Any fix?
Click to expand...
Click to collapse
Same here
mariusmbp said:
I am experiencing the same issue. Everytime I run an app that request #superuser permissions the whole Player freezes and I can only shutdown. Any fix?
Click to expand...
Click to collapse
I have the same problem. The only app I can successfully run with root permissions is Solid Explorer. I have had immediate freezes on launching Titanium Backup, Helium and AdAway.
also experiencing this issue with titanium backup
I'm having these issues too..
Still no solution ?!
Having this problem on the latest version !
DebugLog :
Code:
/2017 10:11:30 PM [D] log:[ 73.308869] type=1400 audit(1493228489.999:73): avc: denied { execute } for pid=4060 comm="om.kingoapp.apk" name="su" dev="vda" ino=2312 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:su_exec:s0 tclass=file permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.313669] type=1400 audit(1493228489.999:74): avc: denied { read open } for pid=4060 comm="om.kingoapp.apk" path="/system/xbin/su" dev="vda" ino=2312 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:su_exec:s0 tclass=file permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.320442] type=1400 audit(1493228489.999:75): avc: denied { execute_no_trans } for pid=4060 comm="om.kingoapp.apk" path="/system/xbin/su" dev="vda" ino=2312 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:su_exec:s0 tclass=file permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.326090] type=1400 audit(1493228490.009:76): avc: denied { write } for pid=4061 comm="su" name="server" dev="tmpfs" ino=6290 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=sock_file permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.330104] type=1400 audit(1493228490.009:77): avc: denied { connectto } for pid=4061 comm="su" path="/dev/com.android.settings.daemon/server" scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:init:s0 tclass=unix_stream_socket permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.335748] type=1400 audit(1493228490.009:78): avc: denied { sys_ptrace } for pid=4063 comm="su" capability=19 scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=capability permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.339651] type=1400 audit(1493228490.009:79): avc: denied { use } for pid=4063 comm="su" path="pipe:[19896]" dev="pipefs" ino=19896 scontext=u:r:init:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=fd permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.344011] type=1400 audit(1493228490.009:80): avc: denied { read } for pid=4063 comm="su" path="pipe:[19896]" dev="pipefs" ino=19896 scontext=u:r:init:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=fifo_file permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.349321] type=1400 audit(1493228490.009:81): avc: denied { write } for pid=4063 comm="su" path="pipe:[19897]" dev="pipefs" ino=19897 scontext=u:r:init:s0 tcontext=u:r:untrusted_app:s0:c512,c768 tclass=fifo_file permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.354116] type=1400 audit(1493228490.019:82): avc: denied { lock } for pid=4065 comm="su" path="/data/data/com.android.settings/databases/su.sqlite" dev="vdc" ino=58052 scontext=u:r:init:s0 tcontext=u:object_r:system_app_data_file:s0 tclass=file permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.359894] type=1400 audit(1493228490.019:83): avc: denied { create } for pid=4065 comm="su" name=".socket4065" scontext=u:r:init:s0 tcontext=u:object_r:device:s0 tclass=sock_file permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.530894] type=1400 audit(1493228490.229:84): avc: denied { call } for pid=4066 comm="main" scontext=u:r:zygote:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.535319] type=1400 audit(1493228490.229:85): avc: denied { search } for pid=1209 comm="servicemanager" name="4066" dev="proc" ino=19330 scontext=u:r:servicemanager:s0 tcontext=u:r:zygote:s0 tclass=dir permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.539577] type=1400 audit(1493228490.229:86): avc: denied { read } for pid=1209 comm="servicemanager" name="current" dev="proc" ino=19967 scontext=u:r:servicemanager:s0 tcontext=u:r:zygote:s0 tclass=file permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.544665] type=1400 audit(1493228490.229:87): avc: denied { open } for pid=1209 comm="servicemanager" path="/proc/4066/attr/current" dev="proc" ino=19967 scontext=u:r:servicemanager:s0 tcontext=u:r:zygote:s0 tclass=file permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.549441] type=1400 audit(1493228490.229:88): avc: denied { getattr } for pid=1209 comm="servicemanager" scontext=u:r:servicemanager:s0 tcontext=u:r:zygote:s0 tclass=process permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.554682] type=1400 audit(1493228490.229:89): avc: denied { call } for pid=4066 comm="main" scontext=u:r:zygote:s0 tcontext=u:r:system_server:s0 tclass=binder permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.667794] type=1400 audit(1493228490.359:90): avc: denied { search } for pid=1209 comm="servicemanager" name="4089" dev="proc" ino=19368 scontext=u:r:servicemanager:s0 tcontext=u:r:init:s0 tclass=dir permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.673102] type=1400 audit(1493228490.359:91): avc: denied { getattr } for pid=1209 comm="servicemanager" scontext=u:r:servicemanager:s0 tcontext=u:r:init:s0 tclass=process permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.693811] type=1400 audit(1493228490.389:92): avc: denied { write } for pid=4097 comm="Thread-255" name=".socket4065" dev="tmpfs" ino=19329 scontext=u:r:system_app:s0 tcontext=u:object_r:device:s0 tclass=sock_file permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.915995] type=1400 audit(1493228490.609:93): avc: denied { unlink } for pid=4065 comm="su" name=".socket4065" dev="tmpfs" ino=19329 scontext=u:r:init:s0 tcontext=u:object_r:device:s0 tclass=sock_file permissive=1
4/26/2017 10:11:30 PM [D] log:[ 73.922194] init[1]: segfault at 10 ip 000000000040a697 sp 00007fff745c5fe0 error 4 in init[400000+14c000]
4/26/2017 10:11:30 PM [D] log:[ 73.925915] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
4/26/2017 10:11:30 PM [D] log:[ 73.925915]
4/26/2017 10:11:30 PM [D] log:##KBD: Full queue, lose event
4/26/2017 10:11:30 PM [D] log:##KBD: Full queue, lose event
I tried KingoRoot app ( just for test , same for all apps )

Permission bug? Or broken game?

Been trying to find out why this game Dokdo won't work on a brand new phone completely stock...
Try on my other phone still doesn't work made a log and noticed an error.
Code:
06-22 04:07:27.759 I/com.zzoo.dokdo(8871): type=1400 audit(0.0:328): avc: denied { read } for uid=10113 name="/" dev="tmpfs" ino=955 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1
The game has permission to access storage
Is it the game or the phone?
could anyone try installing this game on their phone and see if they have the same problem?

Categories

Resources