crDroid (crdrom v306) error - Android Q&A, Help & Troubleshooting

I'm not able to play Call of duty. whenever I open, it stays open for 1 minute and then closes. happens on the GSI crDroid (crDrom v306 ARM64-AB Gapps. Any solution?
logcat:
Spoiler
05-02 08:11:23.365 D/ConnectivityService(1849): requestNetwork for uid/pid:10351/9538 NetworkRequest [ TRACK_DEFAULT id=80, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ]
05-02 08:11:23.366 D/PhoneSwitcherNetworkRequstListener(2397): got request NetworkRequest [ TRACK_DEFAULT id=80, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ] with score 60 and providerId 6
05-02 08:11:23.367 D/WifiNetworkFactory(1849): got request NetworkRequest [ TRACK_DEFAULT id=80, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ] with score 60 and providerId 6
05-02 08:11:23.367 D/Ethernet(1849): got request NetworkRequest [ TRACK_DEFAULT id=80, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ] with score 60 and providerId 6
05-02 08:11:23.367 D/WIFI_AWARE_FACTORY(1849): got request NetworkRequest [ TRACK_DEFAULT id=80, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ] with score 60 and providerId 6
05-02 08:11:23.368 D/UntrustedWifiNetworkFactory(1849): got request NetworkRequest [ TRACK_DEFAULT id=80, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ] with score 60 and providerId 6
05-02 08:11:23.452 W/MidasComm<Log>(9538): get pkgName: com.activision.callofduty.shooter
05-02 08:11:23.461 D/MidasComm<Log>(9538): log dir: /storage/emulated/0/tencent/Midas/Log/com.activision.callofduty.shooter/
05-02 08:11:23.461 D/MidasComm<Log>(9538): log file: /storage/emulated/0/tencent/Midas/Log/com.activision.callofduty.shooter/20210502_1.txt
05-02 08:11:23.522 D/MidasComm<Log>(9538): open log file: /storage/emulated/0/tencent/Midas/Log/com.activision.callofduty.shooter/20210502_1.txt
05-02 08:11:23.647 I/Finsky (10151): [32] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:23.648 I/Finsky (10151): [32] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:23.660 I/Finsky (10151): [31] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:23.660 I/Finsky (10151): [31] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:23.674 I/Finsky (10151): [31] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:23.676 I/Finsky (10151): [31] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:23.682 I/Finsky (10151): [31] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:23.684 I/Finsky (10151): [31] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:24.060 W/com.activision.callofduty.shooter(10947): type=1400 audit(0.0:523): avc: granted { execute } for comm=4173796E635461736B202337 name="mycpuinfo" dev="sda29" ino=5243297 scontext=u:r:untrusted_app_29:s0:c95,c257,c512,c768 tcontext=ubject_r:app_data_file:s0:c95,c257,c512,c768 tclass=file app=com.activision.callofduty.shooter
05-02 08:11:24.060 W/com.activision.callofduty.shooter(10947): type=1400 audit(0.0:523): avc: denied { execute_no_trans } for comm=4173796E635461736B202337 path="/data/user/0/com.activision.callofduty.shooter/files/mycpuinfo" dev="sda29" ino=5243297 scontext=u:r:untrusted_app_29:s0:c95,c257,c512,c768 tcontext=ubject_r:app_data_file:s0:c95,c257,c512,c768 tclass=file permissive=0 app=com.activision.callofduty.shooter
05-02 08:11:24.060 W/com.activision.callofduty.shooter(10947): type=1300 audit(0.0:523): arch=40000028 syscall=11 per=8 success=no exit=-13 a0=9412b800 a1=9001b010 a2=ef5ae290 a3=2f items=0 ppid=9538 auid=4294967295 uid=10351 gid=10351 euid=10351 suid=10351 fsuid=10351 egid=10351 sgid=10351 fsgid=10351 tty=(none) ses=4294967295 comm=4173796E635461736B202337 exe="/system/bin/app_process32" subj=u:r:untrusted_app_29:s0:c95,c257,c512,c768 key=(null) app=com.activision.callofduty.shooter
05-02 08:11:24.060 W/auditd (541): type=1327 audit(0.0:523): proctitle="com.activision.callofduty.shooter"
05-02 08:11:24.710 W/tp_schedule2(9538): type=1400 audit(0.0:524): avc: denied { read } for name="max_user_watches" dev="proc" ino=97487 scontext=u:r:untrusted_app_29:s0:c95,c257,c512,c768 tcontext=ubject_rroc:s0 tclass=file permissive=0 app=com.activision.callofduty.shooter
05-02 08:11:24.710 W/tp_schedule2(9538): type=1300 audit(0.0:524): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=b9e88e04 a2=20000 a3=0 items=0 ppid=1435 auid=4294967295 uid=10351 gid=10351 euid=10351 suid=10351 fsuid=10351 egid=10351 sgid=10351 fsgid=10351 tty=(none) ses=4294967295 exe="/system/bin/app_process32" subj=u:r:untrusted_app_29:s0:c95,c257,c512,c768 key=(null) app=com.activision.callofduty.shooter
05-02 08:11:25.064 D/ConnectivityService(1849): requestNetwork for uid/pid:10351/9538 NetworkRequest [ TRACK_DEFAULT id=83, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ]
05-02 08:11:25.067 D/WIFI_AWARE_FACTORY(1849): got request NetworkRequest [ TRACK_DEFAULT id=83, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ] with score 60 and providerId 6
05-02 08:11:25.067 D/PhoneSwitcherNetworkRequstListener(2397): got request NetworkRequest [ TRACK_DEFAULT id=83, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ] with score 60 and providerId 6
05-02 08:11:25.068 D/Ethernet(1849): got request NetworkRequest [ TRACK_DEFAULT id=83, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ] with score 60 and providerId 6
05-02 08:11:25.068 D/WifiNetworkFactory(1849): got request NetworkRequest [ TRACK_DEFAULT id=83, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ] with score 60 and providerId 6
05-02 08:11:25.068 D/UntrustedWifiNetworkFactory(1849): got request NetworkRequest [ TRACK_DEFAULT id=83, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ] with score 60 and providerId 6
05-02 08:11:25.134 I/Unity (9538): TencentPay : productList:["com.activision.callofduty.shooter.tier_1","com.activision.callofduty.shooter.tier_5","com.activision.callofduty.shooter.tier_10","com.activision.callofduty.shooter.tier_25","com.activision.callofduty.shooter.tier_50","com.activision.callofduty.shooter.tier_100"]
05-02 08:11:25.210 W/AdWorker(Defaul( 9538): type=1400 audit(0.0:525): avc: granted { execute } for path="/data/user/0/com.activision.callofduty.shooter/app_pccache/2/DD62FACFD93177A03CEF4E2445AFC850CB2497B7/oat/arm/pcam.odex" dev="sda29" ino=5376988 scontext=u:r:untrusted_app_29:s0:c95,c257,c512,c768 tcontext=ubject_r:app_data_file:s0:c95,c257,c512,c768 tclass=file app=com.activision.callofduty.shooter
05-02 08:11:25.270 W/AdWorker(Defaul( 9538): type=1400 audit(0.0:526): avc: granted { execute } for path="/data/user/0/com.activision.callofduty.shooter/app_pccache/2/DD62FACFD93177A03CEF4E2445AFC850CB2497B7/pcam.jar" dev="sda29" ino=5374061 scontext=u:r:untrusted_app_29:s0:c95,c257,c512,c768 tcontext=ubject_r:app_data_file:s0:c95,c257,c512,c768 tclass=file app=com.activision.callofduty.shooter
05-02 08:11:25.290 I/Finsky (10151): [31] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:25.291 I/Finsky (10151): [31] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:25.294 I/Finsky (10151): [31] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:25.295 I/Finsky (10151): [31] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:25.303 I/Finsky (10151): [31] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:25.303 I/Finsky (10151): [31] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:25.305 I/Finsky (10151): [32] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:25.306 I/Finsky (10151): [32] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:25.316 I/Finsky (10151): [32] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:25.316 I/Finsky (10151): [32] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:25.321 I/Finsky (10151): [32] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:25.322 I/Finsky (10151): [32] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:25.331 D/APGWProductInfo(9538): callbackOut,response: {"ret":"0","msg":"success","productInfo":[{"productId":"com.activision.callofduty.shooter.tier_5","price":"R$ 18,90","currency":"BRL","microprice":18900000},{"productId":"com.activision.callofduty.shooter.tier_100","price":"R$ 379,90","currency":"BRL","microprice":379900000},{"productId":"com.activision.callofduty.shooter.tier_50","price":"R$ 159,99","currency":"BRL","microprice":159990000},{"productId":"com.activision.callofduty.shooter.tier_25","price":"R$ 94,90","currency":"BRL","microprice":94900000},{"productId":"com.activision.callofduty.shooter.tier_1","price":"R$ 3,90","currency":"BRL","microprice":3900000},{"productId":"com.activision.callofduty.shooter.tier_10","price":"R$ 37,90","currency":"BRL","microprice":37900000}]}
05-02 08:11:26.081 W/TelephonyPermissions(2397): reportAccessDeniedToReadIdentifiers:com.activision.callofduty.shooter:getDeviceId:1
05-02 08:11:30.073 E/WifiService(1849): Permission violation - getScanResults not allowed for uid=10351, packageName=com.activision.callofduty.shooter, reason=java.lang.SecurityException: UID 10351 has no location permission
05-02 08:11:30.702 I/Unity (9538): TencentPay : productList:["com.activision.callofduty.shooter.tier_18b","com.activision.callofduty.shooter.tier_1i","com.activision.callofduty.shooter.tier_1","com.activision.callofduty.shooter.tier_5","com.activision.callofduty.shooter.tier_10","com.activision.callofduty.shooter.tier_25","com.activision.callofduty.shooter.tier_50","com.activision.callofduty.shooter.tier_100"]
05-02 08:11:30.716 I/Finsky (10151): [32] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:30.718 I/Finsky (10151): [32] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:30.723 I/Finsky (10151): [32] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:30.724 I/Finsky (10151): [32] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:30.734 I/Finsky (10151): [32] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:30.736 I/Finsky (10151): [32] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:30.740 I/Finsky (10151): [32] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:30.742 I/Finsky (10151): [32] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:30.753 I/Finsky (10151): [32] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:30.754 I/Finsky (10151): [32] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:30.759 I/Finsky (10151): [32] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:30.760 I/Finsky (10151): [32] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:30.770 D/APGWProductInfo(9538): callbackOut,response: {"ret":"0","msg":"success","productInfo":[{"productId":"com.activision.callofduty.shooter.tier_5","price":"R$ 18,90","currency":"BRL","microprice":18900000},{"productId":"com.activision.callofduty.shooter.tier_100","price":"R$ 379,90","currency":"BRL","microprice":379900000},{"productId":"com.activision.callofduty.shooter.tier_50","price":"R$ 159,99","currency":"BRL","microprice":159990000},{"productId":"com.activision.callofduty.shooter.tier_18b","price":"R$ 69,90","currency":"BRL","microprice":69900000},{"productId":"com.activision.callofduty.shooter.tier_1i","price":"R$ 3,90","currency":"BRL","microprice":3900000},{"productId":"com.activision.callofduty.shooter.tier_25","price":"R$ 94,90","currency":"BRL","microprice":94900000},{"productId":"com.activision.callofduty.shooter.tier_1","price":"R$ 3,90","currency":"BRL","microprice":3900000},{"productId":"com.activision.callofduty.shooter.tier_10","price":"R$ 37,90","currency":"BRL","microprice":37900000}]}
05-02 08:11:32.019 I/Unity (9538): TencentPay : productList:["com.activision.callofduty.shooter.tier_18b","com.activision.callofduty.shooter.tier_1i","com.activision.callofduty.shooter.tier_1","com.activision.callofduty.shooter.tier_5","com.activision.callofduty.shooter.tier_10","com.activision.callofduty.shooter.tier_25","com.activision.callofduty.shooter.tier_50","com.activision.callofduty.shooter.tier_100"]
05-02 08:11:32.052 I/Finsky (10151): [31] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:32.053 I/Finsky (10151): [31] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:32.058 I/Finsky (10151): [31] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:32.059 I/Finsky (10151): [31] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:32.065 I/Finsky (10151): [31] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:32.067 I/Finsky (10151): [31] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:32.070 I/Finsky (10151): [31] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:32.071 I/Finsky (10151): [31] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:32.081 I/Finsky (10151): [31] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:32.081 I/Finsky (10151): [31] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:32.085 I/Finsky (10151): [32] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:32.085 I/Finsky (10151): [32] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:32.096 D/APGWProductInfo(9538): callbackOut,response: {"ret":"0","msg":"success","productInfo":[{"productId":"com.activision.callofduty.shooter.tier_5","price":"R$ 18,90","currency":"BRL","microprice":18900000},{"productId":"com.activision.callofduty.shooter.tier_100","price":"R$ 379,90","currency":"BRL","microprice":379900000},{"productId":"com.activision.callofduty.shooter.tier_50","price":"R$ 159,99","currency":"BRL","microprice":159990000},{"productId":"com.activision.callofduty.shooter.tier_18b","price":"R$ 69,90","currency":"BRL","microprice":69900000},{"productId":"com.activision.callofduty.shooter.tier_1i","price":"R$ 3,90","currency":"BRL","microprice":3900000},{"productId":"com.activision.callofduty.shooter.tier_25","price":"R$ 94,90","currency":"BRL","microprice":94900000},{"productId":"com.activision.callofduty.shooter.tier_1","price":"R$ 3,90","currency":"BRL","microprice":3900000},{"productId":"com.activision.callofduty.shooter.tier_10","price":"R$ 37,90","currency":"BRL","microprice":37900000}]}
05-02 08:11:41.568 I/Unity (9538): TencentPay : productList:["com.activision.callofduty.shooter.tier_18b","com.activision.callofduty.shooter.tier_1i","com.activision.callofduty.shooter.tier_1","com.activision.callofduty.shooter.tier_5","com.activision.callofduty.shooter.tier_10","com.activision.callofduty.shooter.tier_25","com.activision.callofduty.shooter.tier_50","com.activision.callofduty.shooter.tier_100"]
05-02 08:11:41.576 I/Finsky (10151): [32] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:41.577 I/Finsky (10151): [32] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:41.581 I/Finsky (10151): [31] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:41.581 I/Finsky (10151): [31] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:41.585 I/Finsky (10151): [31] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:41.585 I/Finsky (10151): [31] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:41.587 I/Finsky (10151): [31] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:41.587 I/Finsky (10151): [31] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:41.595 I/Finsky (10151): [32] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:41.596 I/Finsky (10151): [32] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:41.598 I/Finsky (10151): [32] jto.a(14): com.activision.callofduty.shooter: Account determined from installer data - [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:41.607 I/Finsky (10151): [32] jto.a(59): Billing preferred account via installer for com.activision.callofduty.shooter: [4_EQ20ps6aPMVG0ZHwv5Nz7X2EsoacDyTPgIznUpqxw]
05-02 08:11:41.622 D/APGWProductInfo(9538): callbackOut,response: {"ret":"0","msg":"success","productInfo":[{"productId":"com.activision.callofduty.shooter.tier_5","price":"R$ 18,90","currency":"BRL","microprice":18900000},{"productId":"com.activision.callofduty.shooter.tier_100","price":"R$ 379,90","currency":"BRL","microprice":379900000},{"productId":"com.activision.callofduty.shooter.tier_50","price":"R$ 159,99","currency":"BRL","microprice":159990000},{"productId":"com.activision.callofduty.shooter.tier_18b","price":"R$ 69,90","currency":"BRL","microprice":69900000},{"productId":"com.activision.callofduty.shooter.tier_1i","price":"R$ 3,90","currency":"BRL","microprice":3900000},{"productId":"com.activision.callofduty.shooter.tier_25","price":"R$ 94,90","currency":"BRL","microprice":94900000},{"productId":"com.activision.callofduty.shooter.tier_1","price":"R$ 3,90","currency":"BRL","microprice":3900000},{"productId":"com.activision.callofduty.shooter.tier_10","price":"R$ 37,90","currency":"BRL","microprice":37900000}]}
05-02 08:11:43.893 F/lofduty.shoote(9538): runtime.cc:655] native: #14 pc 00b4cd34 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so!libunity.so (offset 641000) (???)
05-02 08:11:43.894 F/lofduty.shoote(9538): runtime.cc:655] native: #03 pc 006410c0 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so!libunity.so (offset 641000) (???)
05-02 08:11:43.894 F/lofduty.shoote(9538): runtime.cc:655] native: #04 pc 00649034 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so!libunity.so (offset 641000) (???)
05-02 08:11:43.898 F/lofduty.shoote(9538): runtime.cc:655] native: #03 pc 0002c553 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libTDataMaster.so (???)
05-02 08:11:43.898 F/lofduty.shoote(9538): runtime.cc:655] native: #04 pc 0002bc21 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libTDataMaster.so (???)
05-02 08:11:43.900 F/lofduty.shoote(9538): runtime.cc:655] native: #03 pc 0002c553 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libTDataMaster.so (???)
05-02 08:11:43.900 F/lofduty.shoote(9538): runtime.cc:655] native: #04 pc 0002bc21 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libTDataMaster.so (???)
05-02 08:11:43.900 F/lofduty.shoote(9538): runtime.cc:655] native: #03 pc 0003ab03 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libapm.so (GCloud::APM::comitter_thread(void*)+162)
05-02 08:11:43.901 F/lofduty.shoote(9538): runtime.cc:655] native: #03 pc 000776cf /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libMSDKCore.so (???)
05-02 08:11:43.901 F/lofduty.shoote(9538): runtime.cc:655] native: #04 pc 00077565 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libMSDKCore.so (???)
05-02 08:11:43.902 F/lofduty.shoote(9538): runtime.cc:655] native: #02 pc 000364b3 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libtersafe.so (???)
05-02 08:11:43.902 F/lofduty.shoote(9538): runtime.cc:655] native: #03 pc 00035aef /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libtersafe.so (???)
05-02 08:11:43.902 F/lofduty.shoote(9538): runtime.cc:655] native: #04 pc 0002eee1 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libtersafe.so (???)
05-02 08:11:43.902 F/lofduty.shoote(9538): runtime.cc:655] native: #05 pc 000a33f1 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libtersafe.so!libtersafe.so (offset 5d000) (???)
05-02 08:11:43.902 F/lofduty.shoote(9538): runtime.cc:655] native: #03 pc 00125ca0 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so (???)
05-02 08:11:43.902 F/lofduty.shoote(9538): runtime.cc:655] native: #04 pc 0042647c /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so (???)
05-02 08:11:43.902 F/lofduty.shoote(9538): runtime.cc:655] native: #05 pc 005a5d1c /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so (???)
05-02 08:11:43.902 F/lofduty.shoote(9538): runtime.cc:655] native: #06 pc 005af244 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so (???)
05-02 08:11:43.902 F/lofduty.shoote(9538): runtime.cc:655] native: #07 pc 005a5cd0 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so (???)
05-02 08:11:43.902 F/lofduty.shoote(9538): runtime.cc:655] native: #08 pc 00425210 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so (???)
05-02 08:11:43.902 F/lofduty.shoote(9538): runtime.cc:655] native: #03 pc 0004df6d /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libgcloudcore.so (ABase::OperationQueueImp:nThreadProc(void*)+252)
05-02 08:11:43.903 F/lofduty.shoote(9538): runtime.cc:655] native: #03 pc 000a3873 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libtersafe.so!libtersafe.so (offset 5d000) (???)
05-02 08:11:43.903 F/lofduty.shoote(9538): runtime.cc:655] native: #04 pc 000264eb /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libtersafe.so (???)
05-02 08:11:43.903 F/lofduty.shoote(9538): runtime.cc:655] native: #05 pc 000a33f1 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libtersafe.so!libtersafe.so (offset 5d000) (???)
05-02 08:11:43.907 F/lofduty.shoote(9538): runtime.cc:655] native: #02 pc 00040cdd /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libapm.so (GCloud::APM::interval_sampler(void*)+1424)
05-02 08:11:43.907 F/lofduty.shoote(9538): runtime.cc:655] native: #02 pc 00029233 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libtersafe.so (???)
05-02 08:11:43.907 F/lofduty.shoote(9538): runtime.cc:655] native: #03 pc 000a33f1 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libtersafe.so!libtersafe.so (offset 5d000) (???)
05-02 08:11:43.909 F/lofduty.shoote(9538): runtime.cc:655] native: #02 pc 0002f375 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libtersafe.so (???)
05-02 08:11:43.909 F/lofduty.shoote(9538): runtime.cc:655] native: #03 pc 000a33f1 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libtersafe.so!libtersafe.so (offset 5d000) (???)
05-02 08:11:43.911 F/lofduty.shoote(9538): runtime.cc:655] native: #12 pc 00b4cd34 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so!libunity.so (offset 641000) (???)
05-02 08:11:44.260 W/tp_schedule2(9538): type=1400 audit(0.0:527): avc: denied { read } for name="tcp6" dev="proc" ino=4026533172 scontext=u:r:untrusted_app_29:s0:c95,c257,c512,c768 tcontext=ubject_rroc_net_tcp_udp:s0 tclass=file permissive=0 app=com.activision.callofduty.shooter
05-02 08:11:44.270 W/tp_schedule2(9538): type=1400 audit(0.0:528): avc: denied { read } for name="tcp6" dev="proc" ino=4026533172 scontext=u:r:untrusted_app_29:s0:c95,c257,c512,c768 tcontext=ubject_rroc_net_tcp_udp:s0 tclass=file permissive=0 app=com.activision.callofduty.shooter
05-02 08:11:44.590 E/CRASH (9538): pid: 9538, tid: 10618, name: UnityMain >>> com.activision.callofduty.shooter <<<
05-02 08:11:44.657 E/CRASH (9538): #10 pc 0050bd34 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so
05-02 08:11:44.700 E/CRASH (9538): bcdf27fc b9363d38 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so
05-02 08:11:44.700 E/CRASH (9538): bcdf2804 b937b848 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so
05-02 08:11:44.701 E/CRASH (9538): bcdf2810 b98fcbf4 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so
05-02 08:11:44.702 E/CRASH (9538): bcdf281c b937b8e4 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so
05-02 08:11:44.702 E/CRASH (9538): bcdf2820 b98fcbf4 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so
05-02 08:11:44.702 E/CRASH (9538): bcdf2828 b937b848 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so
05-02 08:11:44.703 E/CRASH (9538): bcdf2830 b937b848 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so
05-02 08:11:44.703 E/CRASH (9538): bcdf2834 b937b848 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libunity.so
05-02 08:11:44.703 E/CRASH (9538): bcdf283c b9cb5964 /data/app/~~5DIQ6Kv_J7nv2T1Ne03wNA==/com.activision.callofduty.shooter-6Zfix8-YSS4Dl0uvqtGfcA==/lib/arm/libtersafe.so
05-02 08:11:44.803 E/AndroidRuntime(9538): Process: com.activision.callofduty.shooter, PID: 9538
05-02 08:11:44.803 E/AndroidRuntime(9538): pid: 9538, tid: 10618, name: UnityMain >>> com.activision.callofduty.shooter <<<
05-02 08:11:44.857 W/ActivityTaskManager(1849): Force finishing activity com.activision.callofduty.shooter/com.tencent.tmgp.cod.CODMainActivity
05-02 08:11:45.250 D/ConnectivityService(1849): ConnectivityService NetworkRequestInfo binderDied(NetworkRequest [ LISTEN id=81, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&FOREGROUND Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ], [email protected])
05-02 08:11:45.251 D/ConnectivityService(1849): ConnectivityService NetworkRequestInfo binderDied(NetworkRequest [ LISTEN id=82, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VPN&FOREGROUND Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ], [email protected])
05-02 08:11:45.251 D/ConnectivityService(1849): ConnectivityService NetworkRequestInfo binderDied(NetworkRequest [ TRACK_DEFAULT id=80, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ], [email protected])
05-02 08:11:45.252 D/ConnectivityService(1849): ConnectivityService NetworkRequestInfo binderDied(NetworkRequest [ TRACK_DEFAULT id=83, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ], [email protected])
05-02 08:11:45.253 D/ConnectivityService(1849): releasing NetworkRequest [ TRACK_DEFAULT id=80, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ] (release request)
05-02 08:11:45.256 D/ConnectivityService(1849): releasing NetworkRequest [ TRACK_DEFAULT id=83, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED Uid: 10351 AdministratorUids: [] RequestorUid: 10351 RequestorPackageName: com.activision.callofduty.shooter] ] (release request)
05-02 08:11:45.260 I/ActivityManager(1849): Process com.activision.callofduty.shooter (pid 9538) has died: prcp TOP
05-02 08:11:45.263 I/WindowManager(1849): WIN DEATH: Window{4977e16 u0 com.activision.callofduty.shooter/com.tencent.tmgp.cod.CODMainActivity}
05-02 08:11:45.264 W/InputDispatcher(1849): Attempted to unregister already unregistered input channel '4977e16 com.activision.callofduty.shooter/com.tencent.tmgp.cod.CODMainActivity (server)'
05-02 08:11:45.291 W/ActivityManager(1849): Exception when unbinding service com.activision.callofduty.shooter/org.chromium.content.app.SandboxedProcessService0:0
05-02 08:11:45.293 W/ActivityManager(1849): Scheduling restart of crashed service com.activision.callofduty.shooter/com.tencent.tmgp.headphonedetectlib.HeadsetMonitorService in 1000ms for start-requested
05-02 08:11:45.375 W/ActivityTaskManager(1849): Activity top resumed state loss timeout for ActivityRecord{168af2e u0 com.activision.callofduty.shooter/com.tencent.tmgp.cod.CODMainActivity t-1 f}}
05-02 08:11:46.301 I/ActivityManager(1849): Start proc 11175:com.activision.callofduty.shooter/u0a351 for service {com.activision.callofduty.shooter/com.tencent.tmgp.headphonedetectlib.HeadsetMonitorService}
05-02 08:11:46.486 I/FA (11175): adb shell setprop debug.firebase.analytics.app com.activision.callofduty.shooter
05-02 08:11:49.484 I/TetheringManager(11175): registerTetheringEventCallback:com.activision.callofduty.shooter
05-02 08:11:49.655 I/ActivityManager(1849): Start proc 11262:com.google.android.webview:sandboxed_process0rg.chromium.content.app.SandboxedProcessService0:0/u0i7 for {com.activision.callofduty.shooter/org.chromium.content.app.SandboxedProcessService0:0}

Related

WIFI doesn't work,please help,thanks

WIFI can not find any wifi resources,its states show inactive,and bellow was adb logcat‘s log,please help to find out what happen to my wifi, thanks!
D/PowerManagerService( 2928): buttonValue 0
D/PowerManagerService( 2928): keyboardValue 0
I/wpa_supplicant( 9130): CTRL-EVENT-STATE-CHANGE id=-1 state=2 BSSID=00:00:00:00
:00:00
I/WifiMonitor( 2928): Event [CTRL-EVENT-STATE-CHANGE id=-1 state=2 BSSID=00:00:0
0:00:00:00]
V/WifiStateTracker( 2928): Changing supplicant state: INACTIVE ==> SCANNING
D/NetworkStateTracker( 2928): setDetailed state, old =IDLE and new state=SCANNIN
G
D/ConnectivityService( 2928): Dropping ConnectivityChange for WIFI: DISCONNECTED
/SCANNING
D/NetworkCollector( 7838): moved
D/WifiService( 2928): ACTION_SCREEN_ON
I/wpa_supplicant( 9130): CTRL-EVENT-STATE-CHANGE id=-1 state=1 BSSID=00:00:00:00
:00:00
I/WifiMonitor( 2928): Event [CTRL-EVENT-STATE-CHANGE id=-1 state=1 BSSID=00:00:0
0:00:00:00]
V/WifiStateTracker( 2928): Changing supplicant state: SCANNING ==> INACTIVE
D/NetworkStateTracker( 2928): setDetailed state, old =SCANNING and new state=IDL
E
D/ConnectivityService( 2928): Dropping ConnectivityChange for WIFI: DISCONNECTED
/IDLE
D/WifiSettings( 6435): updateConnectionState state(SCANNING) hasError (false)
D/WifiSettings( 6435): updateConnectionState state(IDLE) hasError (false)
E/ActivityThread( 7914): Failed to find provider info for com.maxmpz.audioplayer
D/dalvikvm( 6435): GC_FOR_MALLOC freed 10469 objects / 577808 bytes in 41ms
I/PowerManagerService( 2928): Light Animator Finished curIntValue=70
I/wpa_supplicant( 9130): CTRL-EVENT-SCAN-RESULTS
I/wpa_supplicant( 9130): CTRL-EVENT-STATE-CHANGE id=-1 state=1 BSSID=00:00:00:00
:00:00
I/WifiMonitor( 2928): Event [ SCAN-RESULTS ]
I/WifiMonitor( 2928): Event [CTRL-EVENT-STATE-CHANGE id=-1 state=1 BSSID=00:00:0
0:00:00:00]
D/WifiSettings( 6435): updateAccessPoints(), WifiConfigureation list updated
D/WifiSettings( 6435): updateAccessPoints(), ScanResult list updated
V/WifiStateTracker( 2928): Changing supplicant state: INACTIVE ==> INACTIVE
V/WindowManager( 2928): Dsptch > Window{4858ded8 com.android.settings/com.androi
d.settings.wifi.WifiSettings paused=false}
V/InputDevice( 2928): ID[0]=0(0) Dn(0=>1)
V/WindowManager( 2928): Dsptch > Window{4858ded8 com.android.settings/com.androi
d.settings.wifi.WifiSettings paused=false}
V/InputDevice( 2928): ID[0]=0(0) Up(1=>0)
I/WifiService( 2928): setShowAccessPointListDialog():false
I/WifiService( 2928): setWifiEnabledDialog(): false
V/WifiSettings( 6435): resetRetryDialogVariable
I/WifiHW ( 2928): wifi_stop_supplicant: Enter
I/WifiHW ( 2928): wifi_stop_supplicant: connecting supplicant is done
I/WifiHW ( 2928): wifi_stop_supplicant: status of supplicant(connected), count
(49)
I/wpa_supplicant( 9130): CTRL-EVENT-TERMINATING - signal 15 received
I/wpa_supplicant( 9130): CTRL-EVENT-TERMINATING - signal 0 received
I/WifiMonitor( 2928): Event [CTRL-EVENT-TERMINATING - signal 15 received]
V/WifiStateTracker( 2928): Connection to supplicant lost
I/wpa_supplicant( 9130): CTRL-EVENT-STATE-CHANGE id=-1 state=0 BSSID=00:00:00:00
:00:00
I/WifiHW ( 2928): wifi_stop_supplicant: exit normally
D/WifiStateTracker( 2928): Reset connections and stopping DHCP
I/WifiHW ( 2928): wifi_close_supplicant_connection: enter
I/WifiHW ( 2928): wifi_close_supplicant_connection: exit
D/NetworkStateTracker( 2928): setDetailed state, old =IDLE and new state=DISCONN
ECTED
D/ConnectivityService( 2928): Dropping ConnectivityChange for WIFI: DISCONNECTED
/DISCONNECTED
I/UNA ( 5075): SUPPLICANT_CONNECTION_CHANGE : IDLE
D/WifiStateTracker( 2928): Disabling inte**ce
I/WifiHW ( 2928): wifi_unload_driver: enter
try this out
flash it
bosina said:
try this out
flash it
Click to expand...
Click to collapse
thx
but no works

A rare Wi-Fi/Bluetooth problem. I can't turn them on!

Hello,
I bought a phone from China (UMI CROSS) I gave it to someone to change IMEI. After few days he gave me phone back but Wi-Fi and Bluetooth weren't working. (He insist he is innocent but i don't think so :laugh When i swipe to turn on, it goes back to turn off immediately.
Here is the Cat Log
build.board: V6
build.bootloader: unknown
build.brand: UMI_C1
build.cpu_abi: armeabi-v7a
build.cpu_abi2: armeabi
build.device: V6
build.display: CM11 4.4.2
build.fingerprint: UMI_X2/V6/V6:4.2.1/JOP40D/1377829453:user/test-keys
build.hardware: mt6589
build.host: cyanogenmod
build.id: JCampano
build.manufacturer: UMI C1
build.model: UMI C1
build.product: V6
build.radio: unknown
build.serial: 0123456789ABCDEF
build.tags: test-keys
build.time: 1382145375000
build.type: user
build.user: scm
version.codename: REL
version.incremental: eng.scm.1382145295
version.release: 4.2.2
version.sdk_int: 17
01-24 00:24:27.838 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:27.839 D/QuickSettingsConnectionModel(631): onReceive called, action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:27.839 I/StateTracker(631): com.android.systemui.[email protected]42c24a28setImageViewResources state is -1
01-24 00:24:28.453 E/Hald (134): Set "/dev/wmtWifi" [1] failed
01-24 00:24:28.454 D/WifiCommon(541): Hal cmd response code: "400"
01-24 00:24:28.454 E/WifiStateMachine(541): Failed to load driver!
01-24 00:24:28.454 D/WifiStateMachine(541): setWifiState: unknown state
01-24 00:24:28.454 V/ActivityManager(541): Broadcast sticky: Intent { act=android.net.wifi.WIFI_STATE_CHANGED flg=0x8000010 (has extras) } ordered=false userid=-1
01-24 00:24:28.455 D/BluetoothA2dpService(541): Receive WifiManager.WIFI_STATE_CHANGED_ACTION.
01-24 00:24:28.455 D/WifiStateMachine(541): DriverLoadingState{ what=131076 when=-1ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:28.455 D/WifiStateMachine(541): DriverUnloadedState
01-24 00:24:28.455 E/WifiStateMachine(541): DriverFailedState
01-24 00:24:28.455 D/WifiStateMachine(541): DriverFailedState{ what=131083 when=-10m44s282ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:28.456 D/WifiStateMachine(541): DriverUnloadedState{ what=131083 when=-10m44s282ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:28.456 D/NetworkControllerGemini(631): onReceive, intent action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:28.456 D/NetworkControllerGemini(631): updateWifiState: mWifiLevel = 0 mWifiRssi=0 mWifiConnected is false
01-24 00:24:28.457 D/WifiStateMachine(541): DefaultState{ what=131083 when=-10m44s284ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:28.458 D/WifiStateMachine(541): DriverFailedState{ what=131144 when=-10m44s284ms arg1=1 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:28.458 D/WifiStateMachine(541): DriverUnloadedState{ what=131144 when=-10m44s285ms arg1=1 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:28.458 D/WifiStateMachine(541): DefaultState{ what=131144 when=-10m44s285ms arg1=1 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:28.458 D/WifiStateMachine(541): DriverFailedState{ what=131085 when=-10m44s285ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:28.458 D/WifiStateMachine(541): DriverUnloadedState{ what=131085 when=-10m44s285ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:28.458 D/WifiStateMachine(541): DefaultState{ what=131085 when=-10m44s285ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:28.458 D/SettingsAppWidgetProvider(1571): onReceive , action = android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:28.461 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:28.463 D/WifiReceiver(698): wifiState:4
01-24 00:24:28.463 D/WifiReceiver(698): [onReceive] unknown...
01-24 00:24:28.464 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:28.464 D/QuickSettingsConnectionModel(631): onReceive called, action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:28.464 I/StateTracker(631): com.android.systemui.[email protected]42c24a28setImageViewResources state is 0
01-24 00:24:28.464 D/QuickSettingsConnectionModel(631): wifi mIsAirlineMode is false, mIsUserSwitching is false
01-24 00:24:28.464 I/StateTracker(631): com.android.systemui.[email protected]42c24a28 mIsUserSwitching is false
01-24 00:24:32.392 D/dalvikvm(4271): threadid=11 (WifiManager): calling run()
01-24 00:24:32.400 D/WifiService(541): New client listening to asynchronous messages
01-24 00:24:32.422 D/dalvikvm(4271): threadid=12 (WifiManager): calling run()
01-24 00:24:32.428 D/WifiService(541): New client listening to asynchronous messages
01-24 00:24:40.381 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:41.074 D/QuickSettingsConnectionModel(631): wifi mIsAirlineMode is false, mIsUserSwitching is true
01-24 00:24:41.074 I/StateTracker(631): com.android.systemui.[email protected]42c24a28 mIsUserSwitching is true
01-24 00:24:41.074 D/WifiService(541): setWifiEnabled: true pid=631, uid=10072
01-24 00:24:41.074 E/WifiService(541): Invoking mWifiStateMachine.setWifiEnabled
01-24 00:24:41.075 V/Provider/Settings(541): Global.putString(name=wifi_on, value=1 for 0
01-24 00:24:41.075 D/Provider/Settings(541): put string name = wifi_on , value = 1 userHandle = 0
01-24 00:24:41.075 V/SettingsProvider(541): call_put(global:wifi_on=1) for 0
01-24 00:24:41.075 D/WifiStateMachine(541): DriverFailedState{ what=131073 when=0 arg1=2 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:41.075 D/WifiStateMachine(541): DriverUnloadedState{ what=131073 when=-1ms arg1=2 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:41.075 D/WifiStateMachine(541): DriverLoadingState
01-24 00:24:41.076 D/WifiStateMachine(541): DriverLoadingState{ what=131073 when=-10m56s903ms arg1=2 }
01-24 00:24:41.076 D/WifiStateMachine(541): DriverLoadingState{ what=131083 when=-2ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:41.076 D/PowerManagerService(541): acquireWakeLockInternal: lock=1124860240, flags=0x1, tag="WifiStateMachine", ws=null, uid=1000, pid=541
01-24 00:24:41.077 D/WifiStateMachine(541): setWifiState: enabling
01-24 00:24:41.077 V/ActivityManager(541): Broadcast sticky: Intent { act=android.net.wifi.WIFI_STATE_CHANGED flg=0x8000010 (has extras) } ordered=false userid=-1
01-24 00:24:41.077 D/WifiCommon(541): wifi_load_driver
01-24 00:24:41.077 D/WifiCommon(541): wifi_set_power on!
01-24 00:24:41.078 D/BluetoothA2dpService(541): Receive WifiManager.WIFI_STATE_CHANGED_ACTION.
01-24 00:24:41.078 D/WifiCommon(541): Hal cmd: "hal load wifi"
01-24 00:24:41.078 D/FrameworkListener(134): dispatchCommand data = (hal load wifi)
01-24 00:24:41.078 D/Hald (134): cmd <load wifi>
01-24 00:24:41.078 D/Hald (134): Start load wifi driver.
01-24 00:24:41.081 D/SettingsAppWidgetProvider(1571): onReceive , action = android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:41.085 D/WifiReceiver(698): wifiState:2
01-24 00:24:41.085 D/WifiReceiver(698): [onReceive] connecting...
01-24 00:24:41.102 D/NetworkControllerGemini(631): onReceive, intent action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:41.103 D/NetworkControllerGemini(631): updateWifiState: mWifiLevel = 0 mWifiRssi=0 mWifiConnected is false
01-24 00:24:41.105 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:41.107 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:41.107 D/QuickSettingsConnectionModel(631): onReceive called, action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:41.107 I/StateTracker(631): com.android.systemui.[email protected]42c24a28setImageViewResources state is -1
01-24 00:24:41.703 E/Hald (134): Set "/dev/wmtWifi" [1] failed
01-24 00:24:41.704 D/WifiCommon(541): Hal cmd response code: "400"
01-24 00:24:41.704 E/WifiStateMachine(541): Failed to load driver!
01-24 00:24:41.704 D/WifiStateMachine(541): setWifiState: unknown state
01-24 00:24:41.704 V/ActivityManager(541): Broadcast sticky: Intent { act=android.net.wifi.WIFI_STATE_CHANGED flg=0x8000010 (has extras) } ordered=false userid=-1
01-24 00:24:41.705 D/WifiStateMachine(541): DriverLoadingState{ what=131076 when=0 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:41.705 D/BluetoothA2dpService(541): Receive WifiManager.WIFI_STATE_CHANGED_ACTION.
01-24 00:24:41.705 D/WifiStateMachine(541): DriverUnloadedState
01-24 00:24:41.706 D/NetworkControllerGemini(631): onReceive, intent action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:41.706 D/NetworkControllerGemini(631): updateWifiState: mWifiLevel = 0 mWifiRssi=0 mWifiConnected is false
01-24 00:24:41.708 D/SettingsAppWidgetProvider(1571): onReceive , action = android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:41.708 E/WifiStateMachine(541): DriverFailedState
01-24 00:24:41.708 D/WifiStateMachine(541): DriverFailedState{ what=131083 when=-10m57s535ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:41.708 D/WifiStateMachine(541): DriverUnloadedState{ what=131083 when=-10m57s535ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:41.708 D/WifiStateMachine(541): DefaultState{ what=131083 when=-10m57s535ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:41.709 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:41.713 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:41.713 D/WifiReceiver(698): wifiState:4
01-24 00:24:41.713 D/WifiReceiver(698): [onReceive] unknown...
01-24 00:24:41.713 D/QuickSettingsConnectionModel(631): onReceive called, action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:41.713 I/StateTracker(631): com.android.systemui.[email protected]42c24a28setImageViewResources state is 0
01-24 00:24:41.713 D/QuickSettingsConnectionModel(631): wifi mIsAirlineMode is false, mIsUserSwitching is false
01-24 00:24:41.713 I/StateTracker(631): com.android.systemui.[email protected]42c24a28 mIsUserSwitching is false
01-24 00:24:42.386 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:42.841 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:43.027 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:43.044 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:43.054 D/agps (143): [agps][n][AGPS] [dump] cid=20114342 lac=45504 imsi=[286032130603521] mccmnc=[28603] ip=[10.56.101.19] wifi connected=0
01-24 00:24:43.089 D/agps (143): [agps][n][AGPS] [dump] cid=20114342 lac=45504 imsi=[286032130603521] mccmnc=[28603] ip=[10.56.101.19] wifi connected=0
01-24 00:24:43.392 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:44.391 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:44.863 D/WifiService(541): onReceive, action:android.intent.action.BATTERY_CHANGED
01-24 00:24:44.863 V/Provider/Settings(541): from settings cache , name = wifi_idle_ms , value = null
01-24 00:24:44.863 D/WifiService(541): ACTION_BATTERY_CHANGED pluggedType: 2
01-24 00:24:45.393 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:45.457 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:45.504 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:45.516 D/agps (143): [agps][n][AGPS] [dump] cid=20114342 lac=45504 imsi=[286032130603521] mccmnc=[28603] ip=[10.56.101.19] wifi connected=0
01-24 00:24:45.530 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:45.536 D/agps (143): [agps][n][AGPS] [dump] cid=20114342 lac=45504 imsi=[286032130603521] mccmnc=[28603] ip=[10.56.101.19] wifi connected=0
01-24 00:24:46.396 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:47.186 D/WifiService(541): acquireWifiLockLocked: WifiLock{NetworkLocationLocator type=2 [email protected]}
01-24 00:24:47.186 D/WifiService(541): There is WifiLock being held!
01-24 00:24:47.186 V/Provider/Settings(541): from settings cache , name = airplane_mode_radios , value = cell,bluetooth,wifi,nfc,wimax
01-24 00:24:47.186 D/WifiService(541): updateWifiState, wifiShouldBeEnabled:true, wifiShouldBeStarted:true, mWifiIpoOff:false
01-24 00:24:47.187 D/WifiStateMachine(541): DriverFailedState{ what=131073 when=0 arg1=2 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.187 D/WifiStateMachine(541): DriverUnloadedState{ what=131073 when=-1ms arg1=2 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.187 D/WifiStateMachine(541): DriverLoadingState
01-24 00:24:47.188 D/WifiStateMachine(541): DriverLoadingState{ what=131073 when=-11m3s15ms arg1=2 }
01-24 00:24:47.188 D/WifiStateMachine(541): DriverLoadingState{ what=131083 when=-2ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.188 D/PowerManagerService(541): acquireWakeLockInternal: lock=1124860240, flags=0x1, tag="WifiStateMachine", ws=null, uid=1000, pid=541
01-24 00:24:47.188 D/WifiStateMachine(541): DriverLoadingState{ what=131144 when=-2ms arg1=1 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.188 D/WifiStateMachine(541): DriverLoadingState{ what=131085 when=-2ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.188 D/WifiStateMachine(541): DriverLoadingState{ what=131149 when=-2ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.188 D/WifiStateMachine(541): setWifiState: enabling
01-24 00:24:47.189 D/WifiStateMachine(541): DefaultState{ what=131149 when=-2ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.189 D/WifiStateMachine(541): setSuspendOptimizations: 2 true
01-24 00:24:47.189 D/WifiStateMachine(541): mSuspendOptNeedsDisabled 4
01-24 00:24:47.189 V/ActivityManager(541): Broadcast sticky: Intent { act=android.net.wifi.WIFI_STATE_CHANGED flg=0x8000010 (has extras) } ordered=false userid=-1
01-24 00:24:47.189 D/WifiCommon(541): wifi_load_driver
01-24 00:24:47.189 D/WifiCommon(541): wifi_set_power on!
01-24 00:24:47.189 D/WifiCommon(541): Hal cmd: "hal load wifi"
01-24 00:24:47.190 D/FrameworkListener(134): dispatchCommand data = (hal load wifi)
01-24 00:24:47.190 D/Hald (134): cmd <load wifi>
01-24 00:24:47.190 D/Hald (134): Start load wifi driver.
01-24 00:24:47.190 D/BluetoothA2dpService(541): Receive WifiManager.WIFI_STATE_CHANGED_ACTION.
01-24 00:24:47.191 D/NetworkControllerGemini(631): onReceive, intent action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:47.191 D/NetworkControllerGemini(631): updateWifiState: mWifiLevel = 0 mWifiRssi=0 mWifiConnected is false
01-24 00:24:47.193 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:47.194 D/SettingsAppWidgetProvider(1571): onReceive , action = android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:47.200 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:47.200 D/QuickSettingsConnectionModel(631): onReceive called, action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:47.200 I/StateTracker(631): com.android.systemui.[email protected]42c24a28setImageViewResources state is -1
01-24 00:24:47.212 D/WifiReceiver(698): wifiState:2
01-24 00:24:47.212 D/WifiReceiver(698): [onReceive] connecting...
01-24 00:24:47.240 D/WifiService(541): releaseWifiLockLocked: WifiLock{NetworkLocationLocator type=2 [email protected]}
01-24 00:24:47.240 V/Provider/Settings(541): from settings cache , name = airplane_mode_radios , value = cell,bluetooth,wifi,nfc,wimax
01-24 00:24:47.240 D/WifiService(541): updateWifiState, wifiShouldBeEnabled:true, wifiShouldBeStarted:true, mWifiIpoOff:false
01-24 00:24:47.240 D/WifiStateMachine(541): DriverLoadingState{ what=131073 when=0 arg1=2 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.241 D/WifiStateMachine(541): DriverLoadingState{ what=131083 when=0 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.241 D/WifiStateMachine(541): DriverLoadingState{ what=131144 when=-1ms arg1=1 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.241 D/WifiStateMachine(541): DriverLoadingState{ what=131085 when=-1ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.241 D/WifiStateMachine(541): DriverLoadingState{ what=131149 when=-1ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.241 D/WifiStateMachine(541): DefaultState{ what=131149 when=-1ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.241 D/WifiStateMachine(541): setSuspendOptimizations: 2 true
01-24 00:24:47.241 D/WifiStateMachine(541): mSuspendOptNeedsDisabled 4
01-24 00:24:47.398 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:47.813 E/Hald (134): Set "/dev/wmtWifi" [1] failed
01-24 00:24:47.814 D/WifiCommon(541): Hal cmd response code: "400"
01-24 00:24:47.814 E/WifiStateMachine(541): Failed to load driver!
01-24 00:24:47.814 D/WifiStateMachine(541): setWifiState: unknown state
01-24 00:24:47.814 V/ActivityManager(541): Broadcast sticky: Intent { act=android.net.wifi.WIFI_STATE_CHANGED flg=0x8000010 (has extras) } ordered=false userid=-1
01-24 00:24:47.814 D/BluetoothA2dpService(541): Receive WifiManager.WIFI_STATE_CHANGED_ACTION.
01-24 00:24:47.815 D/WifiStateMachine(541): DriverLoadingState{ what=131076 when=0 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.815 D/WifiStateMachine(541): DriverUnloadedState
01-24 00:24:47.815 E/WifiStateMachine(541): DriverFailedState
01-24 00:24:47.815 D/WifiStateMachine(541): DriverFailedState{ what=131083 when=-11m3s642ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.815 D/WifiStateMachine(541): DriverUnloadedState{ what=131083 when=-11m3s642ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.816 D/WifiStateMachine(541): DefaultState{ what=131083 when=-11m3s642ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.816 D/WifiStateMachine(541): DriverFailedState{ what=131144 when=-11m3s643ms arg1=1 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.816 D/WifiStateMachine(541): DriverUnloadedState{ what=131144 when=-11m3s643ms arg1=1 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.816 D/WifiStateMachine(541): DefaultState{ what=131144 when=-11m3s643ms arg1=1 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.816 D/WifiStateMachine(541): DriverFailedState{ what=131085 when=-11m3s643ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.816 D/WifiStateMachine(541): DriverUnloadedState{ what=131085 when=-11m3s643ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.816 D/NetworkControllerGemini(631): onReceive, intent action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:47.816 D/WifiStateMachine(541): DefaultState{ what=131085 when=-11m3s643ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.816 D/NetworkControllerGemini(631): updateWifiState: mWifiLevel = 0 mWifiRssi=0 mWifiConnected is false
01-24 00:24:47.816 D/WifiStateMachine(541): DriverFailedState{ what=131073 when=-11m3s643ms arg1=2 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.816 D/WifiStateMachine(541): DriverUnloadedState{ what=131073 when=-11m3s643ms arg1=2 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.817 D/WifiStateMachine(541): DriverLoadingState
01-24 00:24:47.818 D/SettingsAppWidgetProvider(1571): onReceive , action = android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:47.819 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:47.821 D/WifiStateMachine(541): DriverLoadingState{ what=131083 when=-11m3s647ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.821 D/WifiStateMachine(541): DriverLoadingState{ what=131073 when=-11m3s647ms arg1=2 }
01-24 00:24:47.821 D/PowerManagerService(541): acquireWakeLockInternal: lock=1124860240, flags=0x1, tag="WifiStateMachine", ws=null, uid=1000, pid=541
01-24 00:24:47.821 D/WifiStateMachine(541): DriverLoadingState{ what=131144 when=-11m3s648ms arg1=1 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.821 D/WifiStateMachine(541): setWifiState: enabling
01-24 00:24:47.821 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:47.821 D/QuickSettingsConnectionModel(631): onReceive called, action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:47.822 V/ActivityManager(541): Broadcast sticky: Intent { act=android.net.wifi.WIFI_STATE_CHANGED flg=0x8000010 (has extras) } ordered=false userid=-1
01-24 00:24:47.823 D/BluetoothA2dpService(541): Receive WifiManager.WIFI_STATE_CHANGED_ACTION.
01-24 00:24:47.824 D/WifiStateMachine(541): DriverLoadingState{ what=131085 when=-11m3s648ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:47.824 D/WifiReceiver(698): wifiState:4
01-24 00:24:47.824 D/WifiReceiver(698): [onReceive] unknown...
01-24 00:24:47.824 I/StateTracker(631): com.android.systemui.[email protected]42c24a28setImageViewResources state is -1
01-24 00:24:47.825 D/WifiCommon(541): wifi_load_driver
01-24 00:24:47.825 D/WifiCommon(541): wifi_set_power on!
01-24 00:24:47.825 D/WifiCommon(541): Hal cmd: "hal load wifi"
01-24 00:24:47.826 D/FrameworkListener(134): dispatchCommand data = (hal load wifi)
01-24 00:24:47.826 D/Hald (134): cmd <load wifi>
01-24 00:24:47.826 D/Hald (134): Start load wifi driver.
01-24 00:24:47.829 D/SettingsAppWidgetProvider(1571): onReceive , action = android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:47.835 D/NetworkControllerGemini(631): onReceive, intent action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:47.835 D/NetworkControllerGemini(631): updateWifiState: mWifiLevel = 0 mWifiRssi=0 mWifiConnected is false
01-24 00:24:47.837 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:47.839 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:47.839 D/QuickSettingsConnectionModel(631): onReceive called, action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:47.839 I/StateTracker(631): com.android.systemui.[email protected]42c24a28setImageViewResources state is -1
01-24 00:24:47.843 D/WifiReceiver(698): wifiState:2
01-24 00:24:47.843 D/WifiReceiver(698): [onReceive] connecting...
01-24 00:24:48.048 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:48.400 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:48.453 E/Hald (134): Set "/dev/wmtWifi" [1] failed
01-24 00:24:48.454 D/WifiCommon(541): Hal cmd response code: "400"
01-24 00:24:48.454 E/WifiStateMachine(541): Failed to load driver!
01-24 00:24:48.454 D/WifiStateMachine(541): setWifiState: unknown state
01-24 00:24:48.454 V/ActivityManager(541): Broadcast sticky: Intent { act=android.net.wifi.WIFI_STATE_CHANGED flg=0x8000010 (has extras) } ordered=false userid=-1
01-24 00:24:48.455 D/BluetoothA2dpService(541): Receive WifiManager.WIFI_STATE_CHANGED_ACTION.
01-24 00:24:48.455 D/WifiStateMachine(541): DriverLoadingState{ what=131076 when=-1ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:48.455 D/NetworkControllerGemini(631): onReceive, intent action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:48.455 D/NetworkControllerGemini(631): updateWifiState: mWifiLevel = 0 mWifiRssi=0 mWifiConnected is false
01-24 00:24:48.458 D/SettingsAppWidgetProvider(1571): onReceive , action = android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:48.459 D/WifiStateMachine(541): DriverUnloadedState
01-24 00:24:48.459 E/WifiStateMachine(541): DriverFailedState
01-24 00:24:48.459 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:48.459 D/WifiStateMachine(541): DriverFailedState{ what=131083 when=-11m4s286ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:48.459 D/WifiStateMachine(541): DriverUnloadedState{ what=131083 when=-11m4s286ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:48.459 D/WifiStateMachine(541): DefaultState{ what=131083 when=-11m4s286ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:48.459 D/WifiStateMachine(541): DriverFailedState{ what=131144 when=-11m4s286ms arg1=1 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:48.459 D/WifiStateMachine(541): DriverUnloadedState{ what=131144 when=-11m4s286ms arg1=1 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:48.459 D/WifiStateMachine(541): DefaultState{ what=131144 when=-11m4s286ms arg1=1 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:48.460 D/WifiStateMachine(541): DriverFailedState{ what=131085 when=-11m4s286ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:48.460 D/WifiStateMachine(541): DriverUnloadedState{ what=131085 when=-11m4s287ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:48.460 D/WifiStateMachine(541): DefaultState{ what=131085 when=-11m4s287ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4306ec50} }
01-24 00:24:48.462 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-24 00:24:48.462 D/QuickSettingsConnectionModel(631): onReceive called, action is android.net.wifi.WIFI_STATE_CHANGED
01-24 00:24:48.462 I/StateTracker(631): com.android.systemui.[email protected]42c24a28setImageViewResources state is 0
01-24 00:24:48.463 D/QuickSettingsConnectionModel(631): wifi mIsAirlineMode is false, mIsUserSwitching is false
01-24 00:24:48.463 I/StateTracker(631): com.android.systemui.[email protected]42c24a28 mIsUserSwitching is false
01-24 00:24:48.465 D/WifiReceiver(698): wifiState:4
01-24 00:24:48.465 D/WifiReceiver(698): [onReceive] unknown...
01-24 00:24:50.650 D/SignalClusterViewGemini(631): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
Eheh sorry i don't know where it start so i copied all logs which includes "wifi" word. Can anybody help me? A phone without Wi-Fi so annoying... I'm open for all suggestions. I hope somebody can help me
p.s: i tried factory reset and flashing another roms already. Couldn't solve problem.

			
				
up
I saw "/dev/wmtWifi" in your log, and I search it on the Internet.Then I found you use an MTK cellphone.The file "/dev/wmtWifi" is a wifi driver,so there might be something wrong with your "/dev/wmtWifi".You can check if the permission of it is right.Then if the errors still exist, you can copy a "/dev/wmtWifi" from your friends' MTK cellphones~
Hope helpful
I couldn't find wmtwifi file on internet
Problem still continues. I couldn't solve problem. Here is shorter logcat.
01-28 12:09:21.145 I/StateTracker(682): com.android.systemui.[email protected]43203430 mIsUserSwitching is true
01-28 12:09:21.149 D/WifiService(553): setWifiEnabled: true pid=682, uid=10080
01-28 12:09:21.149 E/WifiService(553): Invoking mWifiStateMachine.setWifiEnabled
01-28 12:09:21.149 V/Provider/Settings(553): Global.putString(name=wifi_on, value=1 for 0
01-28 12:09:21.149 D/Provider/Settings(553): put string name = wifi_on , value = 1 userHandle = 0
01-28 12:09:21.149 V/SettingsProvider(553): call_put(global:wifi_on=1) for 0
01-28 12:09:21.150 D/WifiStateMachine(553): DriverFailedState{ what=131073 when=-1ms arg1=2 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4356eeb8} }
01-28 12:09:21.150 D/WifiStateMachine(553): DriverUnloadedState{ what=131073 when=-1ms arg1=2 target=Handler (com.android.internal.util.StateMachine$SmHandler) {4356eeb8} }
01-28 12:09:21.150 D/WifiStateMachine(553): DriverLoadingState
01-28 12:09:21.152 D/WifiStateMachine(553): DriverLoadingState{ what=131073 when=-9h32m5s326ms arg1=2 }
01-28 12:09:21.152 D/PowerManagerService(553): acquireWakeLockInternal: lock=1130201176, flags=0x1, tag="WifiStateMachine", ws=null, uid=1000, pid=553
01-28 12:09:21.153 D/WifiStateMachine(553): DriverLoadingState{ what=131083 when=-4ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4356eeb8} }
01-28 12:09:21.155 D/WifiStateMachine(553): setWifiState: enabling
01-28 12:09:21.155 V/ActivityManager(553): Broadcast sticky: Intent { act=android.net.wifi.WIFI_STATE_CHANGED flg=0x8000010 (has extras) } ordered=false userid=-1
01-28 12:09:21.157 D/WifiCommon(553): wifi_load_driver
01-28 12:09:21.157 D/WifiCommon(553): wifi_set_power on!
01-28 12:09:21.157 D/BluetoothA2dpService(553): Receive WifiManager.WIFI_STATE_CHANGED_ACTION.
01-28 12:09:21.158 D/WifiCommon(553): Hal cmd: "hal load wifi"
01-28 12:09:21.158 D/FrameworkListener(134): dispatchCommand data = (hal load wifi)
01-28 12:09:21.158 D/Hald (134): cmd <load wifi>
01-28 12:09:21.158 D/Hald (134): Start load wifi driver.
01-28 12:09:21.161 V/SettingsProvider(553): global <- value=1 name=wifi_on for user 0
01-28 12:09:21.167 V/SettingsProvider(553): notifying for -1: content://settings/global/wifi_on
01-28 12:09:21.177 D/WifiService(553): onReceive, action:android.intent.action.BATTERY_CHANGED
01-28 12:09:21.178 V/SettingsProvider(553): call(global:wifi_idle_ms) for 0
01-28 12:09:21.178 D/SettingsProvider(553): lookupValue table global cache contains Key wifi_idle_ms , value = null
01-28 12:09:21.178 D/SettingsProvider(553): lookupValue table global cache.fullyMatchesDisk() wifi_idle_ms
01-28 12:09:21.178 V/Provider/Settings(553): from db cache, name = wifi_idle_ms , value = null
01-28 12:09:21.178 D/WifiService(553): ACTION_BATTERY_CHANGED pluggedType: 0
01-28 12:09:21.187 D/NetworkControllerGemini(682): onReceive, intent action is android.net.wifi.WIFI_STATE_CHANGED
01-28 12:09:21.187 D/NetworkControllerGemini(682): updateWifiState: mWifiLevel = 0 mWifiRssi=0 mWifiConnected is false
01-28 12:09:21.198 D/SignalClusterViewGemini(682): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-28 12:09:21.202 D/WifiReceiver(750): wifiState:2
01-28 12:09:21.202 D/WifiReceiver(750): [onReceive] connecting...
01-28 12:09:21.202 D/SignalClusterViewGemini(682): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-28 12:09:21.202 D/QuickSettingsConnectionModel(682): onReceive called, action is android.net.wifi.WIFI_STATE_CHANGED
01-28 12:09:21.202 I/StateTracker(682): com.android.systemui.[email protected]43203430setImageViewResources state is -1
01-28 12:09:21.216 D/SettingsAppWidgetProvider(11893): onReceive , action = android.net.wifi.WIFI_STATE_CHANGED
01-28 12:09:21.480 D/SignalClusterViewGemini(682): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-28 12:09:21.786 E/Hald (134): Set "/dev/wmtWifi" [1] failed
01-28 12:09:21.786 D/WifiCommon(553): Hal cmd response code: "400"
01-28 12:09:21.786 E/WifiStateMachine(553): Failed to load driver!
01-28 12:09:21.786 D/WifiStateMachine(553): setWifiState: unknown state
01-28 12:09:21.786 V/ActivityManager(553): Broadcast sticky: Intent { act=android.net.wifi.WIFI_STATE_CHANGED flg=0x8000010 (has extras) } ordered=false userid=-1
01-28 12:09:21.788 D/BluetoothA2dpService(553): Receive WifiManager.WIFI_STATE_CHANGED_ACTION.
01-28 12:09:21.792 D/NetworkControllerGemini(682): onReceive, intent action is android.net.wifi.WIFI_STATE_CHANGED
01-28 12:09:21.792 D/NetworkControllerGemini(682): updateWifiState: mWifiLevel = 0 mWifiRssi=0 mWifiConnected is false
01-28 12:09:21.793 D/WifiStateMachine(553): DriverLoadingState{ what=131076 when=-6ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4356eeb8} }
01-28 12:09:21.793 D/WifiStateMachine(553): DriverUnloadedState
01-28 12:09:21.793 E/WifiStateMachine(553): DriverFailedState
01-28 12:09:21.793 D/WifiStateMachine(553): DriverFailedState{ what=131083 when=-9h32m5s967ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4356eeb8} }
01-28 12:09:21.793 D/SettingsAppWidgetProvider(11893): onReceive , action = android.net.wifi.WIFI_STATE_CHANGED
01-28 12:09:21.793 D/WifiStateMachine(553): DriverUnloadedState{ what=131083 when=-9h32m5s968ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4356eeb8} }
01-28 12:09:21.793 D/WifiStateMachine(553): DefaultState{ what=131083 when=-9h32m5s968ms target=Handler (com.android.internal.util.StateMachine$SmHandler) {4356eeb8} }
01-28 12:09:21.795 D/SignalClusterViewGemini(682): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-28 12:09:21.799 D/WifiReceiver(750): wifiState:4
01-28 12:09:21.799 D/WifiReceiver(750): [onReceive] unknown...
01-28 12:09:21.800 D/SignalClusterViewGemini(682): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-28 12:09:21.800 D/QuickSettingsConnectionModel(682): onReceive called, action is android.net.wifi.WIFI_STATE_CHANGED
01-28 12:09:21.800 I/StateTracker(682): com.android.systemui.[email protected]43203430setImageViewResources state is 0
01-28 12:09:21.800 D/QuickSettingsConnectionModel(682): wifi mIsAirlineMode is false, mIsUserSwitching is false
01-28 12:09:21.800 I/StateTracker(682): com.android.systemui.[email protected]43203430 mIsUserSwitching is false
01-28 12:09:23.146 D/SignalClusterViewGemini(682): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-28 12:09:25.648 D/SignalClusterViewGemini(682): apply, mMobileVisible=true, mWifiVisible=false, mIsAirplaneMode=false
01-28 12:09:26.748 D/WifiService(553): onReceive, action:android.intent.action.BATTERY_CHANGED
01-28 12:09:26.748 V/Provider/Settings(553): from settings cache , name = wifi_idle_ms , value = null
01-28 12:09:26.748 D/WifiService(553): ACTION_BATTERY_CHANGED pluggedType: 0

I9500 L PREVIEW BUILD BOOT ERROR

Can anyone help with this logcat. Can also upload the build. Used L PREVIEW source
I/art ( 4067): option[9]=-Xlockprofthreshold:500
I/art ( 4067): option[10]=-Xstacktracefile:/data/anr/traces.txt
I/art ( 4067): option[11]=-Duser.language=en
I/art ( 4067): option[12]=-Duser.region=US
I/mediaserver( 4066): ServiceManager: 0xb756e460
I/AudioFlinger( 4066): Using default 3000 mSec as standby time.
I/CameraService( 4066): CameraService started (pid=4066)
W/ip6tables( 4092): type=1300 audit(0.0:693): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=29 a2=40 a3=b7e25938 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:693):
I/CameraService( 4066): Loaded "Exynos5410 Camera Wrapper" camera module
W/rild ( 4070): type=1400 audit(0.0:694): avc: denied { write } for name="waketime" dev="sysfs" ino=19445 scontext=u:r:rild:s0 tcontext=ubject_r:sysfs:s0 tclass=file
W/rild ( 4070): type=1300 audit(0.0:694): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6da7824 a2=20241 a3=1b6 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:694): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:694): item=0 name="/sys/devices/virtual/misc/multipdp/waketime" inode=19445 dev=00:0d mode=0100644 ouid=1001 ogid=1001 rdev=00:00 obj=ubject_r:sysfs:s0
W/auditd ( 2663): type=1320 audit(0.0:694):
W/rild ( 4070): type=1400 audit(0.0:695): avc: denied { write } for name="accept_ra_defrtr" dev="proc" ino=3673 scontext=u:r:rild:s0 tcontext=ubject_rroc_net:s0 tclass=file
W/rild ( 4070): type=1300 audit(0.0:695): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6815bb4 a2=20001 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:695): cwd="/"
I/DEBUG ( 2571): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
I/DEBUG ( 2571): Build fingerprint: 'samsung/aosp_i9500/i9500:4.4.3.43.43.43/AOSP/alvin07220435:userdebug/test-keys'
I/DEBUG ( 2571): Revision: '10'
I/DEBUG ( 2571): ABI: 'arm'
I/DEBUG ( 2571): signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
W/auditd ( 2663): type=1302 audit(0.0:695): item=0 name="/proc/sys/net/ipv6/conf/rmnet0/accept_ra_defrtr" inode=3673 dev=00:03 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=ubject_rroc_net:s0
W/auditd ( 2663): type=1320 audit(0.0:695):
W/rild ( 4070): type=1400 audit(0.0:696): avc: denied { write } for name="accept_ra_defrtr" dev="proc" ino=3674 scontext=u:r:rild:s0 tcontext=ubject_rroc_net:s0 tclass=file
W/rild ( 4070): type=1300 audit(0.0:696): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6815bb4 a2=20001 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:696): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:696): item=0 name="/proc/sys/net/ipv6/conf/rmnet1/accept_ra_defrtr" inode=3674 dev=00:03 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=ubject_rroc_net:s0
W/auditd ( 2663): type=1320 audit(0.0:696):
W/rild ( 4070): type=1400 audit(0.0:697): avc: denied { write } for name="accept_ra_defrtr" dev="proc" ino=3675 scontext=u:r:rild:s0 tcontext=ubject_rroc_net:s0 tclass=file
W/rild ( 4070): type=1300 audit(0.0:697): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6815bb4 a2=20001 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:697): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:697): item=0 name="/proc/sys/net/ipv6/conf/rmnet2/accept_ra_defrtr" inode=3675 dev=00:03 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=ubject_rroc_net:s0
W/auditd ( 2663): type=1320 audit(0.0:697):
W/rild ( 4070): type=1400 audit(0.0:698): avc: denied { write } for name="accept_ra_defrtr" dev="proc" ino=3676 scontext=u:r:rild:s0 tcontext=ubject_rroc_net:s0 tclass=file
W/rild ( 4070): type=1300 audit(0.0:698): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6815bb4 a2=20001 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:698): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:698): item=0 name="/proc/sys/net/ipv6/conf/rmnet3/accept_ra_defrtr" inode=3676 dev=00:03 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=ubject_rroc_net:s0
W/auditd ( 2663): type=1320 audit(0.0:698):
W/rild ( 4070): type=1400 audit(0.0:699): avc: denied { write } for name="autoconf" dev="proc" ino=3677 scontext=u:r:rild:s0 tcontext=ubject_rroc_net:s0 tclass=file
W/rild ( 4070): type=1300 audit(0.0:699): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6815bb4 a2=20001 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:699): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:699): item=0 name="/proc/sys/net/ipv6/conf/rmnet0/autoconf" inode=3677 dev=00:03 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=ubject_rroc_net:s0
W/auditd ( 2663): type=1320 audit(0.0:699):
W/rild ( 4070): type=1400 audit(0.0:700): avc: denied { write } for name="autoconf" dev="proc" ino=3678 scontext=u:r:rild:s0 tcontext=ubject_rroc_net:s0 tclass=file
W/rild ( 4070): type=1300 audit(0.0:700): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6815bb4 a2=20001 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:700): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:700): item=0 name="/proc/sys/net/ipv6/conf/rmnet1/autoconf" inode=3678 dev=00:03 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=ubject_rroc_net:s0
W/auditd ( 2663): type=1320 audit(0.0:700):
W/rild ( 4070): type=1400 audit(0.0:701): avc: denied { write } for name="autoconf" dev="proc" ino=3679 scontext=u:r:rild:s0 tcontext=ubject_rroc_net:s0 tclass=file
W/rild ( 4070): type=1300 audit(0.0:701): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6815bb4 a2=20001 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:701): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:701): item=0 name="/proc/sys/net/ipv6/conf/rmnet2/autoconf" inode=3679 dev=00:03 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=ubject_rroc_net:s0
W/auditd ( 2663): type=1320 audit(0.0:701):
W/rild ( 4070): type=1400 audit(0.0:702): avc: denied { write } for name="autoconf" dev="proc" ino=3680 scontext=u:r:rild:s0 tcontext=ubject_rroc_net:s0 tclass=file
W/rild ( 4070): type=1300 audit(0.0:702): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6815bb4 a2=20001 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:702): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:702): item=0 name="/proc/sys/net/ipv6/conf/rmnet3/autoconf" inode=3680 dev=00:03 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=ubject_rroc_net:s0
W/auditd ( 2663): type=1320 audit(0.0:702):
W/rild ( 4070): type=1400 audit(0.0:703): avc: denied { write } for name="accept_ra" dev="proc" ino=3605 scontext=u:r:rild:s0 tcontext=ubject_rroc_net:s0 tclass=file
W/rild ( 4070): type=1300 audit(0.0:703): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6815bd4 a2=20001 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:703): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:703): item=0 name="/proc/sys/net/ipv6/conf/default/accept_ra" inode=3605 dev=00:03 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=ubject_rroc_net:s0
W/auditd ( 2663): type=1320 audit(0.0:703):
W/rild ( 4070): type=1400 audit(0.0:704): avc: denied { read write } for name="umts_boot0" dev="tmpfs" ino=4228 scontext=u:r:rild:s0 tcontext=ubject_r:device:s0 tclass=chr_file
W/rild ( 4070): type=1300 audit(0.0:704): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6dacc45 a2=20002 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:704): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:704): item=0 name="/dev/umts_boot0" inode=4228 dev=00:0c mode=020660 ouid=1000 ogid=1001 rdev=0a:23 obj=ubject_r:device:s0
W/auditd ( 2663): type=1320 audit(0.0:704):
W/rild ( 4070): type=1400 audit(0.0:705): avc: denied { read write } for name="umts_boot0" dev="tmpfs" ino=4228 scontext=u:r:rild:s0 tcontext=ubject_r:device:s0 tclass=chr_file
W/rild ( 4070): type=1300 audit(0.0:705): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6dacc45 a2=20002 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:705): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:705): item=0 name="/dev/umts_boot0" inode=4228 dev=00:0c mode=020660 ouid=1000 ogid=1001 rdev=0a:23 obj=ubject_r:device:s0
W/auditd ( 2663): type=1320 audit(0.0:705):
W/rild ( 4070): type=1400 audit(0.0:706): avc: denied { read write } for name="umts_boot0" dev="tmpfs" ino=4228 scontext=u:r:rild:s0 tcontext=ubject_r:device:s0 tclass=chr_file
W/rild ( 4070): type=1300 audit(0.0:706): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6dacc45 a2=20002 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:706): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:706): item=0 name="/dev/umts_boot0" inode=4228 dev=00:0c mode=020660 ouid=1000 ogid=1001 rdev=0a:23 obj=ubject_r:device:s0
W/auditd ( 2663): type=1320 audit(0.0:706):
W/rild ( 4070): type=1400 audit(0.0:707): avc: denied { read write } for name="umts_boot0" dev="tmpfs" ino=4228 scontext=u:r:rild:s0 tcontext=ubject_r:device:s0 tclass=chr_file
W/rild ( 4070): type=1300 audit(0.0:707): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6dacc45 a2=20002 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:707): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:707): item=0 name="/dev/umts_boot0" inode=4228 dev=00:0c mode=020660 ouid=1000 ogid=1001 rdev=0a:23 obj=ubject_r:device:s0
W/auditd ( 2663): type=1320 audit(0.0:707):
W/rild ( 4070): type=1400 audit(0.0:708): avc: denied { read write } for name="umts_boot0" dev="tmpfs" ino=4228 scontext=u:r:rild:s0 tcontext=ubject_r:device:s0 tclass=chr_file
W/rild ( 4070): type=1300 audit(0.0:708): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6dacc45 a2=20002 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:708): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:708): item=0 name="/dev/umts_boot0" inode=4228 dev=00:0c mode=020660 ouid=1000 ogid=1001 rdev=0a:23 obj=ubject_r:device:s0
W/auditd ( 2663): type=1320 audit(0.0:708):
W/rild ( 4070): type=1400 audit(0.0:709): avc: denied { read write } for name="umts_boot0" dev="tmpfs" ino=4228 scontext=u:r:rild:s0 tcontext=ubject_r:device:s0 tclass=chr_file
W/rild ( 4070): type=1300 audit(0.0:709): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6dacc45 a2=20002 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:709): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:709): item=0 name="/dev/umts_boot0" inode=4228 dev=00:0c mode=020660 ouid=1000 ogid=1001 rdev=0a:23 obj=ubject_r:device:s0
W/auditd ( 2663): type=1320 audit(0.0:709):
W/rild ( 4070): type=1400 audit(0.0:710): avc: denied { read write } for name="umts_boot0" dev="tmpfs" ino=4228 scontext=u:r:rild:s0 tcontext=ubject_r:device:s0 tclass=chr_file
W/rild ( 4070): type=1300 audit(0.0:710): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6dacc45 a2=20002 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:710): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:710): item=0 name="/dev/umts_boot0" inode=4228 dev=00:0c mode=020660 ouid=1000 ogid=1001 rdev=0a:23 obj=ubject_r:device:s0
W/auditd ( 2663): type=1320 audit(0.0:710):
W/rild ( 4070): type=1400 audit(0.0:711): avc: denied { read write } for name="umts_boot0" dev="tmpfs" ino=4228 scontext=u:r:rild:s0 tcontext=ubject_r:device:s0 tclass=chr_file
W/rild ( 4070): type=1300 audit(0.0:711): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6dacc45 a2=20002 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
W/auditd ( 2663): type=1307 audit(0.0:711): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:711): item=0 name="/dev/umts_boot0" inode=4228 dev=00:0c mode=020660 ouid=1000 ogid=1001 rdev=0a:23 obj=ubject_r:device:s0
W/auditd ( 2663): type=1320 audit(0.0:711):
W/rild ( 4070): type=1400 audit(0.0:712): avc: denied { read write } for name="umts_boot0" dev="tmpfs" ino=4228 scontext=u:r:rild:s0 tcontext=ubject_r:device:s0 tclass=chr_file
I/DEBUG ( 2571): r0 00000000 r1 00000fdf r2 00000006 r3 00000000
W/rild ( 4070): type=1300 audit(0.0:712): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6dacc45 a2=20002 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
I/DEBUG ( 2571): r4 b6faa274 r5 00000006 r6 00000002 r7 0000010c
I/DEBUG ( 2571): r8 00000000 r9 00000000 sl 00000000 fp beb70afc
I/DEBUG ( 2571): ip 00000fdf sp beb70948 lr b6f3fdd9 pc b6f64d10 cpsr 600f0010
I/DEBUG ( 2571): d0 ffffffffffffffff d1 62656d6172662067
I/DEBUG ( 2571): d2 62696c2079622075 d3 696c22207972616d
W/auditd ( 2663): type=1307 audit(0.0:712): cwd="/"
I/DEBUG ( 2571): d2 62696c2079622075 d3 696c22207972616d
I/DEBUG ( 2571): d4 732e77657263736b d5 656465656e20226f
I/DEBUG ( 2571): d6 7267222079622064 d7 78652e636f6c6c61
I/DEBUG ( 2571): d8 0000000000000000 d9 0000000000000000
I/DEBUG ( 2571): d10 0000000000000000 d11 0000000000000000
I/DEBUG ( 2571): d12 0000000000000000 d13 0000000000000000
I/DEBUG ( 2571): d14 0000000000000000 d15 0000000000000000
I/DEBUG ( 2571): d16 0000000000000000 d17 0000000000000fff
I/DEBUG ( 2571): d18 0000000000000000 d19 0000000000000000
I/DEBUG ( 2571): d20 0000000000000000 d21 0000000000000000
I/DEBUG ( 2571): d22 0000000000000000 d23 0000000000000000
I/DEBUG ( 2571): d24 0000000000000000 d25 0000000000000000
I/DEBUG ( 2571): d26 0000000000000000 d27 0000000000000000
I/DEBUG ( 2571): d28 0000000000000000 d29 0000000000000000
I/DEBUG ( 2571): d30 0000000000000000 d31 0000000000000000
I/DEBUG ( 2571): scr 00000000
I/DEBUG ( 2571):
I/DEBUG ( 2571): backtrace:
I/DEBUG ( 2571): #00 pc 00037d10 /system/lib/libc.so (tgkill+12)
I/DEBUG ( 2571): #01 pc 00012dd5 /system/lib/libc.so (pthread_kill+52)
I/DEBUG ( 2571): #02 pc 0001387f /system/lib/libc.so (raise+10)
I/DEBUG ( 2571): #03 pc 00010385 /system/lib/libc.so (__libc_android_abort+36)
I/DEBUG ( 2571): #04 pc 0000ea24 /system/lib/libc.so (abort+4)
I/DEBUG ( 2571): #05 pc 0001e901 /system/lib/libsurfaceflinger.so
I/DEBUG ( 2571): #06 pc 00019d1f /system/lib/libsurfaceflinger.so (android::SurfaceFlinger::init()+78)
I/DEBUG ( 2571): #07 pc 000007e1 /system/bin/surfaceflinger
I/DEBUG ( 2571): #08 pc 0000e905 /system/lib/libc.so (__libc_init+44)
I/DEBUG ( 2571): #09 pc 000008d8 /system/bin/surfaceflinger
W/auditd ( 2663): type=1302 audit(0.0:712): item=0 name="/dev/umts_boot0" inode=4228 dev=00:0c mode=020660 ouid=1000 ogid=1001 rdev=0a:23 obj=ubject_r:device:s0
W/auditd ( 2663): type=1320 audit(0.0:712):
E/HAL ( 4066): load: module=/system/lib/hw/camera.vendor.universal5410.so
E/HAL ( 4066): dlopen failed: could not load library "libexynoscamera.so" needed by "camera.vendor.universal5410.so"; caused by cannot locate symbol "_ZN7android13DurationTimer5startEv" referenced by "libexynoscamera.so"...
E/CameraWrapper( 4066): failed to open vendor camera module
W/rild ( 4070): type=1400 audit(0.0:713): avc: denied { read write } for name="umts_boot0" dev="tmpfs" ino=4228 scontext=u:r:rild:s0 tcontext=ubject_r:device:s0 tclass=chr_file
W/rild ( 4070): type=1300 audit(0.0:713): arch=40000028 syscall=322 per=800000 success=no exit=-13 a0=ffffff9c a1=b6dacc45 a2=20002 a3=0 items=1 ppid=1 auid=4294967295 uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001 fsgid=1001 tty=(none) ses=4294967295 exe="/system/bin/rild" subj=u:r:rild:s0 key=(null)
I/AudioPolicyManagerBase( 4066): loadAudioPolicyConfig() loaded /system/etc/audio_policy.conf
I/DEBUG ( 2571): --------- tail end of log main
W/auditd ( 2663): type=1307 audit(0.0:713): cwd="/"
W/auditd ( 2663): type=1302 audit(0.0:713): item=0 name="/dev/umts_boot0" inode=4228 dev=00:0c mode=020660 ouid=1000 ogid=1001 rdev=0a:23 obj=ubject_r:device:s0
W/auditd ( 2663): type=1320 audit(0.0:713):
W/auditd ( 2663): type=1325 audit(0.0:714): table=filter family=2 entries=18
W/iptables( 4106): type=1300 audit(0.0:714): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=0 a2=40 a3=b7449408 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:714):
W/auditd ( 2663): type=1325 audit(0.0:715): table=filter family=10 entries=18
W/ip6tables( 4107): type=1300 audit(0.0:715): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=29 a2=40 a3=b795e930 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:715):
W/auditd ( 2663): type=1325 audit(0.0:716): table=filter family=2 entries=17
W/iptables( 4109): type=1300 audit(0.0:716): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=0 a2=40 a3=b790f268 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:716):
W/auditd ( 2663): type=1325 audit(0.0:717): table=filter family=10 entries=17
W/ip6tables( 4110): type=1300 audit(0.0:717): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=29 a2=40 a3=b74a7700 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:717):
W/auditd ( 2663): type=1325 audit(0.0:718): table=filter family=2 entries=17
W/iptables( 4111): type=1300 audit(0.0:718): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=0 a2=40 a3=b7bce268 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:718):
W/auditd ( 2663): type=1325 audit(0.0:719): table=filter family=10 entries=17
W/ip6tables( 4113): type=1300 audit(0.0:719): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=29 a2=40 a3=b7f00700 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:719):
W/auditd ( 2663): type=1325 audit(0.0:720): table=filter family=2 entries=15
W/iptables( 4124): type=1300 audit(0.0:720): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=0 a2=40 a3=b8eef0a8 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:720):
E/memtrack( 4067): Couldn't load memtrack module (No such file or directory)
E/android.os.Debug( 4067): failed to load memtrack module: -2
W/auditd ( 2663): type=1325 audit(0.0:721): table=filter family=10 entries=15
W/ip6tables( 4126): type=1300 audit(0.0:721): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=29 a2=40 a3=b8d624d0 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:721):
I/SamplingProfilerIntegration( 4067): Profiling disabled.
D/Zygote ( 4067): begin preload
I/Zygote ( 4067): Preloading classes...
I/art ( 4067): Explicit concurrent mark sweep GC freed 1519(80KB) AllocSpace objects, 0(0B) LOS objects, 89% free, 119KB/2MB, paused 175us total 4.705ms
W/auditd ( 2663): type=1325 audit(0.0:722): table=filter family=2 entries=17
W/iptables( 4129): type=1300 audit(0.0:722): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=0 a2=40 a3=b7789410 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:722):
W/auditd ( 2663): type=1325 audit(0.0:723): table=filter family=10 entries=17
W/ip6tables( 4131): type=1300 audit(0.0:723): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=29 a2=40 a3=b7913938 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:723):
W/auditd ( 2663): type=1325 audit(0.0:724): table=filter family=2 entries=18
W/iptables( 4133): type=1300 audit(0.0:724): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=0 a2=40 a3=b7cba408 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:724):
I/art ( 4067): Explicit concurrent mark sweep GC freed 668(38KB) AllocSpace objects, 0(0B) LOS objects, 87% free, 146KB/2MB, paused 155us total 2.610ms
I/art ( 4067): Explicit concurrent mark sweep GC freed 788(48KB) AllocSpace objects, 0(0B) LOS objects, 87% free, 146KB/2MB, paused 158us total 1.689ms
W/auditd ( 2663): type=1325 audit(0.0:725): table=filter family=10 entries=18
W/ip6tables( 4135): type=1300 audit(0.0:725): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=29 a2=40 a3=b7af6930 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:725):
W/auditd ( 2663): type=1325 audit(0.0:726): table=filter family=2 entries=17
W/iptables( 4138): type=1300 audit(0.0:726): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=0 a2=40 a3=b817a268 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:726):
W/auditd ( 2663): type=1325 audit(0.0:727): table=filter family=10 entries=17
W/ip6tables( 4141): type=1300 audit(0.0:727): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=29 a2=40 a3=b70ca700 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:727):
I/art ( 4067): Explicit concurrent mark sweep GC freed 386(24KB) AllocSpace objects, 0(0B) LOS objects, 85% free, 171KB/2MB, paused 171us total 2.829ms
I/DEBUG ( 2571): --------- log main
I/DEBUG ( 2571):
I/DEBUG ( 2571): Tombstone written to: /data/tombstones/tombstone_02
W/surfaceflinger( 4063): type=1701 audit(0.0:728): auid=4294967295 uid=1000 gid=1003 ses=4294967295 subj=u:r:surfaceflinger:s0 reason="memory violation" sig=6
W/auditd ( 2663): type=1325 audit(0.0:729): table=filter family=2 entries=17
W/iptables( 4144): type=1300 audit(0.0:729): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=0 a2=40 a3=b7d191f0 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:729):
W/auditd ( 2663): type=1325 audit(0.0:730): table=filter family=10 entries=17
W/ip6tables( 4146): type=1300 audit(0.0:730): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=29 a2=40 a3=b7c6a688 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:730):
W/auditd ( 2663): type=1325 audit(0.0:731): table=filter family=2 entries=15
W/iptables( 4149): type=1300 audit(0.0:731): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=0 a2=40 a3=b7b8e0a8 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:731):
W/auditd ( 2663): type=1325 audit(0.0:732): table=filter family=10 entries=15
W/ip6tables( 4151): type=1300 audit(0.0:732): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=29 a2=40 a3=b7e774d0 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:732):
W/auditd ( 2663): type=1325 audit(0.0:733): table=filter family=2 entries=17
W/iptables( 4153): type=1300 audit(0.0:733): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=0 a2=40 a3=b7e10410 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:733):
W/auditd ( 2663): type=1325 audit(0.0:734): table=filter family=10 entries=17
W/ip6tables( 4155): type=1300 audit(0.0:734): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=29 a2=40 a3=b7d0f938 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:734):
W/auditd ( 2663): type=1325 audit(0.0:735): table=filter family=2 entries=18
W/iptables( 4160): type=1300 audit(0.0:735): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=0 a2=40 a3=b7a933c8 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:735):
W/auditd ( 2663): type=1325 audit(0.0:736): table=filter family=2 entries=18
W/iptables( 4163): type=1300 audit(0.0:736): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=0 a2=40 a3=b89b33c8 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:736):
W/auditd ( 2663): type=1325 audit(0.0:737): table=filter family=2 entries=16
W/iptables( 4166): type=1300 audit(0.0:737): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=0 a2=40 a3=b7590208 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:737):
W/auditd ( 2663): type=1325 audit(0.0:738): table=filter family=10 entries=18
W/ip6tables( 4168): type=1300 audit(0.0:738): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=29 a2=40 a3=b73718d0 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
E/ ( 4066): Cannot open 'libsecril-client.so'
I/AudioFlinger( 4066): loadHwModule() Loaded primary audio interface from JA audio HW HAL (audio) handle 1
I/AudioFlinger( 4066): HAL output buffer size 240 frames, normal mix buffer size 960 frames
W/auditd ( 2663): type=1320 audit(0.0:738):
I/AudioMixer( 4066): found effect "Multichannel Downmix To Stereo" from The Android Open Source Project
E/MonoPipe( 4066): Failed to fetch local time frequency when constructing a MonoPipe (res = -32). getNextWriteTimestamp calls will be non-functional
W/auditd ( 2663): type=1325 audit(0.0:739): table=filter family=2 entries=18
W/iptables( 4172): type=1300 audit(0.0:739): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=0 a2=40 a3=b78bf570 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/iptables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:739):
W/auditd ( 2663): type=1325 audit(0.0:740): table=filter family=10 entries=20
W/ip6tables( 4174): type=1300 audit(0.0:740): arch=40000028 syscall=294 per=800000 success=yes exit=0 a0=7 a1=29 a2=40 a3=b7038d38 items=0 ppid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 exe="/system/bin/ip6tables" subj=u:r:netd:s0 key=(null)
W/auditd ( 2663): type=1320 audit(0.0:740):
I/ServiceManager( 2565): service 'media.audio_flinger' died
I/ServiceManager( 2565): service 'media.player' died
I/ServiceManager( 2565): service 'media.camera' died
[email protected]:~$
Camera is the only error i see, is it that whats causing the no boot.
XDA:DevDB Information
I9500 L PREVIEW BUILD, ROM for the Samsung Galaxy S 4
Contributors
alvin14
ROM Firmware Required: L PREVIEW
Version Information
Status: Testing
Created 2014-07-23
Last Updated 2014-07-23
That source for now is useless because not complete.
Just in case: don't think about porting a different Android version using another as base, will never work... Ports can work only when base and target are of the same Android version, for example base 4.4 target (ported rom) 4.4
Now we have Android Lollipop final, with source code
Upload it pls. I think i can fix it with 4.4.4 Files
i have almost working version of lollipop for i9500
http://forum.xda-developers.com/showthread.php?t=2936556
Android L Discussion (CM12/AOSP/all other builds...)
if vendor files work correctly the device will boot.
@AntaresOne can you give @doga.ozkaraca 's thread a quick glance and help him squash some bugs?
Sent from my GT-I9500 using Tapatalk

Troubleshooting Vodafone vfd 1100 custom rom bootloops

I have a vodafone vfd 1100 running android 6.0, kernel 3.18.19 . I tried porting xos chameleon v2.0, lineage os and cm 13. All the above mentioned are bootlooping.I have managed to pull the logcat from the xos chameleon
and now I need help debugging the issue. I have the stock rom and also the custom roms. here is what i pulled from the logcat files:
[ 08-23 10:36:44.355 14336:14336 F/art ]
art/runtime/jni_internal.cc:2173] Failed to register native method dalvik.system.VMRuntime.isEngMode()Z in /system/framework/core-libart.jar
[ 08-23 10:36:44.356 14336:14336 F/art ]
art/runtime/jni_internal.cc:2178] ----- class 'Ldalvik/system/VMRuntime;' cl=0x0 -----
[ 08-23 10:36:44.356 14336:14336 F/art ]
art/runtime/jni_internal.cc:2178] objectSize=600 (440 from super)
[ 08-23 10:36:44.356 14336:14336 F/art ]
art/runtime/jni_internal.cc:2178] access=0x0008.0011
[ 08-23 10:36:44.356 14336:14336 F/art ]
art/runtime/jni_internal.cc:2178] super='java.lang.Class<java.lang.Object>' (cl=0x0)
[ 08-23 10:36:44.356 14336:14336 F/art ]
art/runtime/jni_internal.cc:2178] vtable (38 entries, 11 in super):
[ 08-23 10:36:44.356 14336:14336 F/art ]
art/runtime/jni_internal.cc:2178] 0: long dalvik.system.VMRuntime.addressOf!(java.lang.Object)
[ 08-23 10:36:44.356 14336:14336 F/art ]
art/runtime/jni_internal.cc:2178] 1: java.lang.String dalvik.system.VMRuntime.bootClassPath()
[ 08-23 10:36:44.356 14336:14336 F/art ]
art/runtime/jni_internal.cc:2178] 2: void dalvik.system.VMRuntime.clampGrowthLimit()
[ 08-23 10:36:44.356 14336:14336 F/art ]
art/runtime/jni_internal.cc:2178] 3: java.lang.String dalvik.system.VMRuntime.classPath()
[ 08-23 10:36:44.356 14336:14336 F/art ]
art/runtime/jni_internal.cc:2178] 4: void dalvik.system.VMRuntime.clearGrowthLimit()
[ 08-23 10:36:44.356 14336:14336 F/art ]
art/runtime/jni_internal.cc:2178] 5: void dalvik.system.VMRuntime.concurrentGC()
[ 08-23 10:36:44.357 14336:14336 F/art ]
art/runtime/jni_internal.cc:2178] 6: void dalvik.system.VMRuntime.disableJitCompilation()
[ 08-23 10:36:44.357 14336:14336 F/art ]
art/runtime/jni_internal.cc:2178] 7: void dalvik.system.VMRuntime.gcSoftReferences()
[ 08-23 10:36:44.359 14336:14336 F/art ]
art/runtime/jni_internal.cc:2178]
[ 08-23 10:36:44.364 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.364 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp enter
[ 08-23 10:36:44.381 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.381 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp enter
[ 08-23 10:36:44.394 14336:14336 W/art ]
Attempted to destroy barrier with non zero count -1
[ 08-23 10:36:44.394 14336:14336 F/art ]
art/runtime/runtime.cc:366] Runtime aborting...
[ 08-23 10:36:44.394 14336:14336 F/art ]
art/runtime/runtime.cc:366] Aborting thread:
[ 08-23 10:36:44.394 14336:14336 F/art ]
art/runtime/runtime.cc:366] "main" prio=5 tid=1 Runnable (still starting up)
[ 08-23 10:36:44.394 14336:14336 F/art ]
art/runtime/runtime.cc:366] | group="" sCount=0 dsCount=0 obj=0x0 self=0xb4836a00
[ 08-23 10:36:44.394 14336:14336 F/art ]
art/runtime/runtime.cc:366] | sysTid=14336 nice=0 cgrp=default sched=0/0 handle=0xb6fa0de4
[ 08-23 10:36:44.394 14336:14336 F/art ]
art/runtime/runtime.cc:366] | state=R schedstat=( 1182080543 94537310 625 ) utm=106 stm=12 core=1 HZ=100
[ 08-23 10:36:44.394 14336:14336 F/art ]
art/runtime/runtime.cc:366] | stack=0xbe2ae000-0xbe2b0000 stackSize=8MB
[ 08-23 10:36:44.394 14336:14336 F/art ]
art/runtime/runtime.cc:366] | held mutexes= "abort lock" "mutator lock"(shared held)
[ 08-23 10:36:44.394 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #00 pc 0035d61f /system/lib/libart.so (_ZN3art15DumpNativeStackERNSt3__113basic_ostreamIcNS0_11char_traitsIcEEEEiPKcPNS_9ArtMethodEPv+126)
[ 08-23 10:36:44.394 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #01 pc 0033e4b7 /system/lib/libart.so (_ZNK3art6Thread4DumpERNSt3__113basic_ostreamIcNS1_11char_traitsIcEEEE+138)
[ 08-23 10:36:44.394 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #02 pc 00322625 /system/lib/libart.so (_ZNK3art10AbortState10DumpThreadERNSt3__113basic_ostreamIcNS1_11char_traitsIcEEEEPNS_6ThreadE+20)
[ 08-23 10:36:44.395 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #03 pc 003228f3 /system/lib/libart.so (_ZN3art7Runtime5AbortEv+622)
[ 08-23 10:36:44.395 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #04 pc 000f3fa9 /system/lib/libart.so (_ZN3art10LogMessageD2Ev+2092)
[ 08-23 10:36:44.395 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #05 pc 0028443f /system/lib/libart.so (_ZN3art3JNI21RegisterNativeMethodsEP7_JNIEnvP7_jclassPK15JNINativeMethodib+1942)
[ 08-23 10:36:44.395 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #06 pc 00284d75 /system/lib/libart.so (_ZN3art21RegisterNativeMethodsEP7_JNIEnvPKcPK15JNINativeMethodi+36)
[ 08-23 10:36:44.395 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #07 pc 0031e40b /system/lib/libart.so (_ZN3art7Runtime28RegisterRuntimeNativeMethodsEP7_JNIEnv+18)
[ 08-23 10:36:44.395 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #08 pc 00320bed /system/lib/libart.so (_ZN3art7Runtime17InitNativeMethodsEv+108)
[ 08-23 10:36:44.395 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #09 pc 0032143f /system/lib/libart.so (_ZN3art7Runtime5StartEv+1146)
[ 08-23 10:36:44.395 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #10 pc 002519d7 /system/lib/libart.so (JNI_CreateJavaVM+658)
[ 08-23 10:36:44.395 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #11 pc 000617ef /system/lib/libandroid_runtime.so (_ZN7android14AndroidRuntime7startVmEPP7_JavaVMPP7_JNIEnvb+2370)
[ 08-23 10:36:44.395 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #12 pc 00061bd7 /system/lib/libandroid_runtime.so (_ZN7android14AndroidRuntime5startEPKcRKNS_6VectorINS_7String8EEEb+250)
[ 08-23 10:36:44.395 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #13 pc 00001721 /system/bin/app_process32 (???)
[ 08-23 10:36:44.395 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #14 pc 000173fd /system/lib/libc.so (__libc_init+44)
[ 08-23 10:36:44.395 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #15 pc 00001868 /system/bin/app_process32 (???)
[ 08-23 10:36:44.396 14336:14336 F/art ]
art/runtime/runtime.cc:366] (no managed stack frames)
[ 08-23 10:36:44.396 14336:14336 F/art ]
art/runtime/runtime.cc:366] Dumping all threads without appropriate locks held: thread list lock
[ 08-23 10:36:44.396 14336:14336 F/art ]
art/runtime/runtime.cc:366] All threads:
[ 08-23 10:36:44.396 14336:14336 F/art ]
art/runtime/runtime.cc:366] DALVIK THREADS (1):
[ 08-23 10:36:44.396 14336:14336 F/art ]
art/runtime/runtime.cc:366] "main" prio=5 tid=1 Runnable (still starting up)
[ 08-23 10:36:44.396 14336:14336 F/art ]
art/runtime/runtime.cc:366] | group="" sCount=0 dsCount=0 obj=0x0 self=0xb4836a00
[ 08-23 10:36:44.396 14336:14336 F/art ]
art/runtime/runtime.cc:366] | sysTid=14336 nice=0 cgrp=default sched=0/0 handle=0xb6fa0de4
[ 08-23 10:36:44.396 14336:14336 F/art ]
art/runtime/runtime.cc:366] | state=R schedstat=( 1202080081 94537310 625 ) utm=107 stm=13 core=1 HZ=100
[ 08-23 10:36:44.396 14336:14336 F/art ]
art/runtime/runtime.cc:366] | stack=0xbe2ae000-0xbe2b0000 stackSize=8MB
[ 08-23 10:36:44.396 14336:14336 F/art ]
art/runtime/runtime.cc:366] | held mutexes= "abort lock" "mutator lock"(shared held)
[ 08-23 10:36:44.396 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #00 pc 0035d61f /system/lib/libart.so (_ZN3art15DumpNativeStackERNSt3__113basic_ostreamIcNS0_11char_traitsIcEEEEiPKcPNS_9ArtMethodEPv+126)
[ 08-23 10:36:44.396 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #01 pc 0033e4b7 /system/lib/libart.so (_ZNK3art6Thread4DumpERNSt3__113basic_ostreamIcNS1_11char_traitsIcEEEE+138)
[ 08-23 10:36:44.396 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #02 pc 00347c49 /system/lib/libart.so (_ZN3art14DumpCheckpoint3RunEPNS_6ThreadE+532)
[ 08-23 10:36:44.396 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #03 pc 0034874d /system/lib/libart.so (_ZN3art10ThreadList13RunCheckpointEPNS_7ClosureE+200)
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #04 pc 00348c51 /system/lib/libart.so (_ZN3art10ThreadList4DumpERNSt3__113basic_ostreamIcNS1_11char_traitsIcEEEE+124)
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #05 pc 00322815 /system/lib/libart.so (_ZN3art7Runtime5AbortEv+400)
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #06 pc 000f3fa9 /system/lib/libart.so (_ZN3art10LogMessageD2Ev+2092)
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #07 pc 0028443f /system/lib/libart.so (_ZN3art3JNI21RegisterNativeMethodsEP7_JNIEnvP7_jclassPK15JNINativeMethodib+1942)
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #08 pc 00284d75 /system/lib/libart.so (_ZN3art21RegisterNativeMethodsEP7_JNIEnvPKcPK15JNINativeMethodi+36)
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #09 pc 0031e40b /system/lib/libart.so (_ZN3art7Runtime28RegisterRuntimeNativeMethodsEP7_JNIEnv+18)
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #10 pc 00320bed /system/lib/libart.so (_ZN3art7Runtime17InitNativeMethodsEv+108)
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #11 pc 0032143f /system/lib/libart.so (_ZN3art7Runtime5StartEv+1146)
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #12 pc 002519d7 /system/lib/libart.so (JNI_CreateJavaVM+658)
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #13 pc 000617ef /system/lib/libandroid_runtime.so (_ZN7android14AndroidRuntime7startVmEPP7_JavaVMPP7_JNIEnvb+2370)
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #14 pc 00061bd7 /system/lib/libandroid_runtime.so (_ZN7android14AndroidRuntime5startEPKcRKNS_6VectorINS_7String8EEEb+250)
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #15 pc 00001721 /system/bin/app_process32 (???)
[ 08-23 10:36:44.397 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #16 pc 000173fd /system/lib/libc.so (__libc_init+44)
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] native: #17 pc 00001868 /system/bin/app_process32 (???)
[ 08-23 10:36:44.397 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp enter
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366] (no managed stack frames)
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366]
[ 08-23 10:36:44.397 14336:14336 F/art ]
art/runtime/runtime.cc:366]
[ 08-23 10:36:44.398 14336:14336 F/libc ]
Fatal signal 6 (SIGABRT), code -6 in tid 14336 (main)
[ 08-23 10:36:44.398 212: 212 D/AEE/AED ]
$===AEE===AEE===AEE===$
[ 08-23 10:36:44.398 212: 212 D/AEE/AED ]
p 0 poll events 1 revents 0
[ 08-23 10:36:44.398 212: 212 D/AEE/AED ]
not know revents:0
[ 08-23 10:36:44.398 212: 212 D/AEE/AED ]
p 1 poll events 1 revents 0
[ 08-23 10:36:44.398 212: 212 D/AEE/AED ]
not know revents:0
[ 08-23 10:36:44.398 212: 212 D/AEE/AED ]
p 2 poll events 1 revents 1
[ 08-23 10:36:44.399 212: 212 D/AEE/AED ]
aed_main_fork_worker: generator 0xb6b46090, worker 0xbeda48a8, recv_fd 0
[ 08-23 10:36:44.400 14416:14416 I/AEE/AED ]
handle_request(0)
[ 08-23 10:36:44.400 212: 212 D/AEE/AED ]
aee handle:-1, cpu cores:4, online:4
[ 08-23 10:36:44.400 212: 212 D/AEE/AED ]
p 3 poll events 1 revents 0
[ 08-23 10:36:44.400 212: 212 D/AEE/AED ]
not know revents:0
[ 08-23 10:36:44.400 212: 212 D/AEE/AED ]
p 4 poll events 1 revents 0
[ 08-23 10:36:44.400 212: 212 D/AEE/AED ]
not know revents:0
[ 08-23 10:36:44.400 212: 212 D/AEE/AED ]
p 5 poll events 0 revents 0
[ 08-23 10:36:44.400 212: 212 D/AEE/AED ]
not know revents:0
[ 08-23 10:36:44.400 14416:14416 I/AEE/AED ]
check process 14336 name:main
[ 08-23 10:36:44.401 14416:14416 I/AEE/AED ]
tid 14336 abort msg address is:0xb120c000, si_code is:0 (request from -6:14336)
[ 08-23 10:36:44.401 14416:14416 I/AEE/AED ]
BOOM: pid=14336 uid=0 gid=0 tid=14336
[ 08-23 10:36:44.402 14416:14416 I/AEE/AED ]
[OnPurpose Redunant in void preset_info(aed_report_record*, int, int)] pid: 14336, tid: 14336, name: main >>> zygote <<<
[ 08-23 10:36:44.416 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.416 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp enter
[ 08-23 10:36:44.431 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.454 14416:14416 F/AEE/DEBUG ]
Revision: '0'
[ 08-23 10:36:44.454 14416:14416 F/AEE/DEBUG ]
ABI: 'arm'
[ 08-23 10:36:44.454 14416:14416 F/AEE/DEBUG ]
pid: 14336, tid: 14336, name: main >>> zygote <<<
[ 08-23 10:36:44.455 14416:14416 F/AEE/DEBUG ]
signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr -------
#07 pc 0028443f /system/lib/libart.so (_ZN3art3JNI21RegisterNativeMethodsEP7_JNIEnvP7_jclassPK15JNINativeMethodib+1942)
[ 08-23 10:36:44.498 14416:14416 F/AEE/DEBUG ]
#08 pc 00284d75 /system/lib/libart.so (_ZN3art21RegisterNativeMethodsEP7_JNIEnvPKcPK15JNINativeMethodi+36)
[ 08-23 10:36:44.498 14416:14416 F/AEE/DEBUG ]
#09 pc 0031e40b /system/lib/libart.so (_ZN3art7Runtime28RegisterRuntimeNativeMethodsEP7_JNIEnv+18)
[ 08-23 10:36:44.498 14416:14416 F/AEE/DEBUG ]
#10 pc 00320bed /system/lib/libart.so (_ZN3art7Runtime17InitNativeMethodsEv+108)
[ 08-23 10:36:44.499 14416:14416 F/AEE/DEBUG ]
#11 pc 0032143f /system/lib/libart.so (_ZN3art7Runtime5StartEv+1146)
[ 08-23 10:36:44.499 14416:14416 F/AEE/DEBUG ]
#12 pc 002519d7 /system/lib/libart.so (JNI_CreateJavaVM+658)
[ 08-23 10:36:44.499 14416:14416 F/AEE/DEBUG ]
#13 pc 000617ef /system/lib/libandroid_runtime.so (_ZN7android14AndroidRuntime7startVmEPP7_JavaVMPP7_JNIEnvb+2370)
[ 08-23 10:36:44.499 14416:14416 F/AEE/DEBUG ]
#14 pc 00061bd7 /system/lib/libandroid_runtime.so (_ZN7android14AndroidRuntime5startEPKcRKNS_6VectorINS_7String8EEEb+250)
[ 08-23 10:36:44.499 14416:14416 F/AEE/DEBUG ]
#15 pc 00001721 /system/bin/app_process32
[ 08-23 10:36:44.499 14416:14416 F/AEE/DEBUG ]
#16 pc 000173fd /system/lib/libc.so (__libc_init+44)
[ 08-23 10:36:44.499 14416:14416 F/AEE/DEBUG ]
#17 pc 00001868 /system/bin/app_process32
[ 08-23 10:36:44.511 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.511 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp enter
[ 08-23 10:36:44.527 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.527 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp enter
[ 08-23 10:36:44.543 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.543 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp enter
[ 08-23 10:36:44.560 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.560 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp enter
[ 08-23 10:36:44.570 200: 200 I/SurfaceFlinger ]
[Built-in Screen (type:0)] fps:11.968853,dur:1002.60,max:92.95,min:74.19
[ 08-23 10:36:44.577 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.578 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp enter
[ 08-23 10:36:44.594 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.594 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp enter
[ 08-23 10:36:44.610 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.610 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp enter
[ 08-23 10:36:44.627 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.627 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp enter
[ 08-23 10:36:44.643 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.643 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp enter
[ 08-23 10:36:44.660 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp exit
[ 08-23 10:36:44.661 14265:14265 I/Netd ]
execIptablesCommand android_fork_execvp enter
[ 08-23 10:36:44.665 14416:14416 F/AEE/DEBUG ]
Tombstone written to: /data/tombstones/tombstone_07
[ 08-23 10:36:44.665 14416:14416 E/AEE/AED ]
request.action: 0
[ 08-23 10:36:44.665 14416:14416 V/AEE/AED ]
dashboard_record_update() : rec->module = zygote
[ 08-23 10:36:44.666 14416:14416 D/AEE/AED ]
Skip duplicated exception !
[ 08-23 10:36:44.666 14416:14416 D/AEE/AED ]
Exception Class: 3
[ 08-23 10:36:44.666 14416:14416 D/AEE/AED ]
Module: zygote
[ 08-23 10:36:44.666 14416:14416 D/AEE/AED ]
Count: 118
[ 08-23 10:36:44.666 14416:14416 D/AEE/AED ]
Last exception time: 1503484600
[ 08-23 10:36:44.666 14416:14416 V/aee/ne_session ]
aed_ne_session() - skipped
[ 08-23 10:36:44.667 212: 212 D/AEE/AED ]
$===AEE===AEE===AEE===$
[ 08-23 10:36:44.668 212: 212 D/AEE/AED ]
p 0 poll events 1 revents 0
[ 08-23 10:36:44.668 212: 212 D/AEE/AED ]
not know revents:0
[ 08-23 10:36:44.668 212: 212 D/AEE/AED ]
p 1 poll events 1 revents 0
[ 08-23 10:36:44.668 212: 212 D/AEE/AED ]
not know revents:0
[ 08-23 10:36:44.668 212: 212 D/AEE/AED ]
p 2 poll events 1 revents 0
[ 08-23 10:36:44.668 212: 212 D/AEE/AED ]
not know revents:0
[ 08-23 10:36:44.668 212: 212 D/AEE/AED ]
p 3 poll events 1 revents 0
[ 08-23 10:36:44.668 212: 212 D/AEE/AED ]
not know revents:0
[ 08-23 10:36:44.668 212: 212 D/AEE/AED ]
p 4 poll events 1 revents 0
[ 08-23 10:36:44.668 212: 212 D/AEE/AED ]
not know revents:0
[ 08-23 10:36:44.668 212: 212 D/AEE/AED ]
p 5 poll events 0 revents 0
[ 08-23 10:36:44.668 212: 212 D/AEE/AED ]
not know revents:0
[ 08-23 10:36:44.678 199: 199 I/ServiceManager ]
service 'media.audio_flinger' died
[ 08-23 10:36:44.678 199: 199 I/ServiceManager ]
service 'media.player' died
[ 08-23 10:36:44.678 199: 199 I/ServiceManager ]
service 'media.resource_manager' died
[ 08-23 10:36:44.678 199: 199 I/ServiceManager ]
service 'memory_dumper' died
[ 08-23 10:36:44.678 199: 199 I/ServiceManager ]
service 'media.camera' died
[ 08-23 10:36:44.679 199: 199 I/ServiceManager ]
service 'media.audio_policy' died
[ 08-23 10:36:44.679 199: 199 I/ServiceManager ]
service 'media.sound_trigger_hw' died
[ 08-23 10:36:44.679 199: 199 I/ServiceManager ]
service 'media.radio' died
[ 08-23 10:36:44.679 199: 199 I/ServiceManager ]
service 'media.mmsdk' died
[ 08-23 10:36:45.308 200: 377 I/BufferQueueProducer ]
[BootAnimation](this:0xb4c9dc00,id:1,api:1,p:410,c:200) queueBuffer: fps=9.99 dur=1001.42 max=250.92 min=83.18
[ 08-23 10:36:45.338 230: 363 D/agps ]
[agps] WARNING: [CP] cp2_fd_1_req_sim_num_timeout
[ 08-23 10:36:45.338 230: 340 D/agps ]
[agps][n][CP] [MD_1] write sim_info_req
[ 08-23 10:36:45.338 230: 340 E/agps ]
[agps] ERR: [Utility] safe_write reason=[No such device]19
[ 08-23 10:36:45.573 200: 200 I/SurfaceFlinger ]
[Built-in Screen (type:0)] fps:9.970710,dur:1002.94,max:241.88,min:74.24
[ 08-23 10:36:46.310 200: 377 I/BufferQueueProducer ]
[BootAnimation](this:0xb4c9dc00,id:1,api:1,p:410,c:200) queueBuffer: fps=11.98 dur=1001.59 max=86.01 min=80.86
[ 08-23 10:36:46.610 242: 242 I/thermal_repeater ]
socket -1
[ 08-23 10:36:46.680 14433:14433 W/init ]
type=1400 audit(0.0:253): avc: denied { execute_no_trans } for path="/system/bin/wland" dev="mmcblk0p20" ino=24771 scontext=u:r:init:s0 tcontext=ubject_r:system_file:s0 tclass=file permissive=0
[ 08-23 10:36:46.813 200: 200 I/SurfaceFlinger ]
[Built-in Screen (type:0)] fps:10.483727,dur:1240.02,max:241.81,min:74.25
[ 08-23 10:36:46.841 255: 255 I/sn ]
Retry 59
[ 08-23 10:36:46.842 255: 255 I/sn ]
Fail to access err=2
[ 08-23 10:36:46.842 255: 255 I/sn ]
Fail to access err=2
[ 08-23 10:36:46.842 255: 255 I/sn ]
Fail to access err=2
[ 08-23 10:36:47.312 200: 880 I/BufferQueueProducer ]
[BootAnimation](this:0xb4c9dc00,id:1,api:1,p:410,c:200) queueBuffer: fps=9.98 dur=1002.22 max=250.98 min=82.80
[ 08-23 10:36:47.339 230: 340 D/agps ]
[agps][n][CP] [MD_1] write sim_info_req
Thanks in advance and all suggestions are welcome..

Boot stuck in tlk_daemon

Hello experts !!!
Built android(7.1.2) for Jetson TK1, using shieldtablet opensource binaries. The boot reaches till bootanimation and stays there for a while, then it reboots in a cycle till bootanimation, this process get repeated.
I have provided the log below, meanwhile the adb logcat stops with the messages below and adb shell no longer works.
01-01 00:25:07.690 602 602 E TLK_Daemon: failed to open device: /dev/tlk_device
01-01 00:25:12.735 603 603 E TLK_Daemon: failed to open device: /dev/tlk_device
Comparing the SERIAL LOG and LOGCAT information, the issue seems to come from TLK_DAEMON(not sure though).
There's this particular variable in BoardConfig
# Allow this variable to be overridden to n for non-secure OS build
SECURE_OS_BUILD ?= y
ifeq ($(SECURE_OS_BUILD),y)
SECURE_OS_BUILD := tlk
endif
-Tried setting it to n and built, boot stops before bootanimation.
-When android is built as secure OS (SECURE_OS_BUILD=y ) and the kernel is built with this config symbol CONFIG_TRUSTED_LITTLE_KERNEL=y . The kernel doesn't start at all.
-However when CONFIG_TRUSTED_LITTLE_KERNEL=n, android boots till bootanimation (The process I mentioned earlier ).
Is there any way to build a non-secure OS with shieldtablet binaries ?
Or someway to disable TLK_DAEMON ?
sorry couldn't post the full log, since this is my first post.
BOOT LOG:
[ 17.612341] android_work: sent uevent USB_STATE=CONNECTED
[ 17.615875] android_work: sent uevent USB_STATE=DISCONNECTED
[ 17.740329] android_work: sent uevent USB_STATE=CONNECTED
[ 17.742205] android_usb gadget: high-speed config #1: android
[ 17.742276] tegra-udc tegra-udc.0: connected to SDP
[ 17.742281] tegra-udc tegra-udc.0: notification status (0,1,0) (0x2, 0x2)
[ 17.742356] android_work: sent uevent USB_STATE=CONFIGURED
[ 18.000193] init: Starting service 'media'...
[ 18.005518] init: Starting service 'netd'...
[ 18.010719] init: Service 'logd-reinit' (pid 171) exited with status 0
[ 18.019533] init: Service 'setup_fs' (pid 173) exited with status 0
[ 18.026042] init: Service 'bt_loader' (pid 182) exited with status 0
[ 18.032668] init: Service 'tlk_daemon' (pid 183) exited with status 1
[ 18.039161] init: Service 'tlk_daemon' (pid 183) killing any children in process group
[ 18.047345] init: Service 'eks2_client' (pid 184) exited with status 234
[ 18.054461] init: Starting service 'gatekeeperd'...
[ 18.065623] init: Starting service 'perfprofd'...
[ 18.131387] healthd: No battery devices found
[ 18.135836] healthd: battery l=100 v=0 t=42.4 h=2 st=2 chg=a
[ 18.347651] type=1400 audit(1357005131.414:73): avc: denied { getattr } for pid=304 comm="chown" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.367490] type=1400 audit(1357005131.426:74): avc: denied { getattr } for pid=305 comm="chmod" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.387266] type=1400 audit(1357005131.446:75): avc: denied { getattr } for pid=309 comm="grep" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_0
[ 18.406915] type=1400 audit(1357005131.472:76): avc: denied { getattr } for pid=312 comm="chown" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.433964] type=1400 audit(1357005131.489:77): avc: denied { getattr } for pid=321 comm="chmod" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.453691] type=1400 audit(1357005131.494:78): avc: denied { getattr } for pid=323 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.485905] type=1400 audit(1357005131.516:79): avc: denied { getattr } for pid=324 comm="chown" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.507194] type=1400 audit(1357005131.539:80): avc: denied { getattr } for pid=328 comm="chmod" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.541901] type=1400 audit(1357005131.542:81): avc: denied { getattr } for pid=330 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.561670] type=1400 audit(1357005131.555:82): avc: denied { getattr } for pid=332 comm="chown" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.581603] type=1400 audit(1357005131.595:83): avc: denied { getattr } for pid=336 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.604342] type=1400 audit(1357005131.610:84): avc: denied { getattr } for pid=334 comm="chmod" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.631617] type=1400 audit(1357005131.624:85): avc: denied { getattr } for pid=340 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.664029] init: Service 'ussr_setup' (pid 185) exited with status 0
[ 18.664042] type=1400 audit(1357005131.650:86): avc: denied { getattr } for pid=344 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.664192] type=1400 audit(1357005131.683:87): avc: denied { getattr } for pid=350 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.664351] type=1400 audit(1357005131.691:88): avc: denied { getattr } for pid=347 comm="grep" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_0
[ 18.664503] type=1400 audit(1357005131.710:89): avc: denied { getattr } for pid=354 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.664648] type=1400 audit(1357005131.719:90): avc: denied { getattr } for pid=351 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:ussr_setup:s0 tcontext=ubject_r:rootfs:s0 tclass=l0
[ 18.664798] type=1400 audit(1357005131.726:91): avc: denied { getattr } for pid=356 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.792378] type=1400 audit(1357005131.858:92): avc: denied { getattr } for pid=372 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:set_hwui:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 18.810004] audit: audit_lost=29 audit_rate_limit=20 audit_backlog_limit=64
[ 18.810007] audit: rate limit exceeded
[ 18.826679] init: Service 'set_hwui_params' (pid 180) exited with status 0
[ 19.200741] init: Starting service 'bootanim'...
[ 19.205365] tegradc tegradc.0: unblank
[ 19.346162] CPU3: unable to kill
[ 19.457901] type=1400 audit(1357005132.524:95): avc: denied { getattr } for pid=460 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=0
[ 19.489410] type=1400 audit(1357005132.556:96): avc: denied { getattr } for pid=464 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_0
[ 19.510796] type=1400 audit(1357005132.568:97): avc: denied { getattr } for pid=466 comm="ls" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_f0
[ 19.531785] type=1400 audit(1357005132.598:98): avc: denied { getattr } for pid=467 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_0
[ 19.552476] type=1400 audit(1357005132.613:99): avc: denied { getattr } for pid=473 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_0
[ 19.746283] CPU3: unable to kill
[ 19.838338] tegradc tegradc.0: blank - powerdown
[ 19.861535] tegradc tegradc.0: unblank
[ 19.862025] tegradc tegradc.0: Dev node doesn't have avdd_hdmi supply props
[ 19.862027] ------------[ cut here ]------------
[ 19.862037] WARNING: at drivers/regulator/core.c:1548 regulator_dev_lookup+0x13c/0x274()
[ 19.862040] Modules linked in:
[ 19.862044] CPU: 0 PID: 176 Comm: surfaceflinger Tainted: G W 3.10.96-nvidia-jetson-tk1 #2
[ 19.862056] [<c0016fc4>] (unwind_backtrace+0x0/0x13c) from [<c0013278>] (show_stack+0x18/0x1c)
[ 19.862064] [<c0013278>] (show_stack+0x18/0x1c) from [<c003c130>] (warn_slowpath_common+0x5c/0x74)
[ 19.862070] [<c003c130>] (warn_slowpath_common+0x5c/0x74) from [<c003c1fc>] (warn_slowpath_null+0x24/0x2c)
[ 19.862076] [<c003c1fc>] (warn_slowpath_null+0x24/0x2c) from [<c03f3e28>] (regulator_dev_lookup+0x13c/0x274)
[ 19.862083] [<c03f3e28>] (regulator_dev_lookup+0x13c/0x274) from [<c03f4f7c>] (_regulator_get+0x58/0x1cc)
[ 19.862089] [<c03f4f7c>] (_regulator_get+0x58/0x1cc) from [<c039ccac>] (dc_hdmi_out_enable+0x90/0x148)
[ 19.862097] [<c039ccac>] (dc_hdmi_out_enable+0x90/0x148) from [<c038714c>] (_tegra_dc_controller_enable+0x58/0x14c4)
[ 19.862103] [<c038714c>] (_tegra_dc_controller_enable+0x58/0x14c4) from [<c0388620>] (_tegra_dc_enable+0x68/0xa0)
[ 19.862108] [<c0388620>] (_tegra_dc_enable+0x68/0xa0) from [<c03888b0>] (tegra_dc_enable+0xf8/0x100)
[ 19.862114] [<c03888b0>] (tegra_dc_enable+0xf8/0x100) from [<c03dbd40>] (tegra_fb_blank+0xdc/0x150)
[ 19.862119] [<c03dbd40>] (tegra_fb_blank+0xdc/0x150) from [<c033f028>] (fb_blank+0x5c/0xb0)
[ 19.862124] [<c033f028>] (fb_blank+0x5c/0xb0) from [<c033f8a8>] (do_fb_ioctl+0x328/0x684)
[ 19.862130] [<c033f8a8>] (do_fb_ioctl+0x328/0x684) from [<c013c088>] (do_vfs_ioctl+0x408/0x5d4)
[ 19.862136] [<c013c088>] (do_vfs_ioctl+0x408/0x5d4) from [<c013c2ec>] (SyS_ioctl+0x98/0x1a0)
[ 19.862141] [<c013c2ec>] (SyS_ioctl+0x98/0x1a0) from [<c000f200>] (ret_fast_syscall+0x0/0x38)
[ 19.862144] ---[ end trace 1b75b31a2719ed25 ]---
[ 19.862203] tegradc tegradc.0: Dev node doesn't have avdd_hdmi_pll supply props
[ 19.862205] ------------[ cut here ]------------
[ 19.862210] WARNING: at drivers/regulator/core.c:1548 regulator_dev_lookup+0x13c/0x274()
[ 19.862212] Modules linked in:
[ 19.862215] CPU: 0 PID: 176 Comm: surfaceflinger Tainted: G W 3.10.96-nvidia-jetson-tk1 #2
[ 19.862222] [<c0016fc4>] (unwind_backtrace+0x0/0x13c) from [<c0013278>] (show_stack+0x18/0x1c)
[ 19.862228] [<c0013278>] (show_stack+0x18/0x1c) from [<c003c130>] (warn_slowpath_common+0x5c/0x74)
[ 19.862233] [<c003c130>] (warn_slowpath_common+0x5c/0x74) from [<c003c1fc>] (warn_slowpath_null+0x24/0x2c)
[ 19.862239] [<c003c1fc>] (warn_slowpath_null+0x24/0x2c) from [<c03f3e28>] (regulator_dev_lookup+0x13c/0x274)
[ 19.862245] [<c03f3e28>] (regulator_dev_lookup+0x13c/0x274) from [<c03f4f7c>] (_regulator_get+0x58/0x1cc)
[ 19.862250] [<c03f4f7c>] (_regulator_get+0x58/0x1cc) from [<c039ccec>] (dc_hdmi_out_enable+0xd0/0x148)
[ 19.862256] [<c039ccec>] (dc_hdmi_out_enable+0xd0/0x148) from [<c038714c>] (_tegra_dc_controller_enable+0x58/0x14c4)
[ 19.862262] [<c038714c>] (_tegra_dc_controller_enable+0x58/0x14c4) from [<c0388620>] (_tegra_dc_enable+0x68/0xa0)
[ 19.862267] [<c0388620>] (_tegra_dc_enable+0x68/0xa0) from [<c03888b0>] (tegra_dc_enable+0xf8/0x100)
[ 19.862273] [<c03888b0>] (tegra_dc_enable+0xf8/0x100) from [<c03dbd40>] (tegra_fb_blank+0xdc/0x150)
[ 19.862277] [<c03dbd40>] (tegra_fb_blank+0xdc/0x150) from [<c033f028>] (fb_blank+0x5c/0xb0)
[ 19.862280] [<c033f028>] (fb_blank+0x5c/0xb0) from [<c033f8a8>] (do_fb_ioctl+0x328/0x684)
[ 19.862285] [<c033f8a8>] (do_fb_ioctl+0x328/0x684) from [<c013c088>] (do_vfs_ioctl+0x408/0x5d4)
[ 19.862314] [<c013c088>] (do_vfs_ioctl+0x408/0x5d4) from [<c013c2ec>] (SyS_ioctl+0x98/0x1a0)
[ 19.862319] [<c013c2ec>] (SyS_ioctl+0x98/0x1a0) from [<c000f200>] (ret_fast_syscall+0x0/0x38)
[ 19.862322] ---[ end trace 1b75b31a2719ed26 ]---
[ 19.863945] tegradc tegradc.0: nominal-pclk:148500000 parent:594000000 div:4.0 pclk:148500000 147015000~161865000
[ 20.245921] nvhdcp: link verified!
[ 20.328526] CPU3: unable to kill
[ 20.368067] CPU2: unable to kill
[ 20.527061] CPU1: unable to kill
[ 21.567959] type=1400 audit(1357005134.634:100): avc: denied { getattr } for pid=569 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass0
[ 21.624625] type=1400 audit(1357005134.681:101): avc: denied { getattr } for pid=570 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 21.649339] type=1400 audit(1357005134.712:102): avc: denied { getattr } for pid=571 comm="ls" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_0
[ 21.679139] type=1400 audit(1357005134.745:103): avc: denied { getattr } for pid=572 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 21.703807] type=1400 audit(1357005134.770:104): avc: denied { getattr } for pid=575 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 21.784378] CPU3: unable to kill
[ 21.864165] CPU2: unable to kill
[ 21.950399] CPU1: unable to kill
[ 22.229558] init: Starting service 'tlk_daemon'...
[ 22.242494] init: Service 'tlk_daemon' (pid 579) exited with status 1
[ 22.253958] init: Service 'tlk_daemon' (pid 579) killing any children in process group
[ 23.721589] type=1400 audit(1357005136.788:105): avc: denied { getattr } for pid=580 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass0
[ 23.744310] type=1400 audit(1357005136.810:106): avc: denied { getattr } for pid=581 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 23.783015] type=1400 audit(1357005136.849:107): avc: denied { getattr } for pid=582 comm="ls" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk_0
[ 23.817266] type=1400 audit(1357005136.883:108): avc: denied { getattr } for pid=583 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 23.849830] type=1400 audit(1357005136.916:109): avc: denied { getattr } for pid=586 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 24.150339] CPU3: unable to kill
[ 24.230425] CPU2: unable to kill
[ 24.370314] CPU1: unable to kill
[ 25.881747] type=1400 audit(1357005138.948:110): avc: denied { getattr } for pid=587 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 25.933957] type=1400 audit(1357005138.991:111): avc: denied { getattr } for pid=588 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass0
[ 25.954218] type=1400 audit(1357005139.000:112): avc: denied { getattr } for pid=589 comm="log" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 25.976324] type=1400 audit(1357005139.042:113): avc: denied { getattr } for pid=590 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass0
[ 25.996335] type=1400 audit(1357005139.054:114): avc: denied { getattr } for pid=591 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass0
[ 26.016403] type=1400 audit(1357005139.066:115): avc: denied { getattr } for pid=592 comm="setprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass0
[ 26.037536] type=1400 audit(1357005139.104:116): avc: denied { getattr } for pid=593 comm="getprop" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass0
[ 26.057768] type=1400 audit(1357005139.104:117): avc: denied { getattr } for pid=596 comm="touch" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=l0
[ 26.077875] type=1400 audit(1357005139.124:118): avc: denied { getattr } for pid=597 comm="chown" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=l0
[ 26.097932] type=1400 audit(1357005139.124:119): avc: denied { getattr } for pid=598 comm="touch" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=l0
[ 26.106270] init: Service 'wifiloader' (pid 161) exited with status 0
[ 26.124410] type=1400 audit(1357005139.144:120): avc: denied { getattr } for pid=599 comm="chown" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=l0
[ 26.144190] type=1400 audit(1357005139.144:121): avc: denied { getattr } for pid=600 comm="cmp" path="/vendor" dev="rootfs" ino=6976 scontext=u:r:wifi_loader:s0 tcontext=ubject_r:rootfs:s0 tclass=lnk0
[ 26.258456] CPU3: unable to kill
[ 26.338135] CPU2: unable to kill
[ 26.458311] CPU1: unable to kill
[ 27.107491] init: Starting service 'tlk_daemon'...
[ 27.124910] init: Service 'tlk_daemon' (pid 601) exited with status 1
[ 27.131557] init: Service 'tlk_daemon' (pid 601) killing any children in process group
[ 32.152562] init: Starting service 'tlk_daemon'...
[ 32.174205] init: Service 'tlk_daemon' (pid 602) exited with status 1
[ 32.182700] init: Service 'tlk_daemon' (pid 602) killing any children in process group
[ 37.205623] init: Starting service 'tlk_daemon'...
[ 37.212594] init: Service 'tlk_daemon' (pid 603) exited with status 1
[ 37.219065] init: Service 'tlk_daemon' (pid 603) killing any children in process group
[ 37.662679] CPU3: unable to kill
[ 37.703433] CPU2: unable to kill
[ 37.747546] CPU1: unable to kill
[ 37.771129] android_work: sent uevent USB_STATE=DISCONNECTED
[ 37.843610] CPU2: unable to kill
[ 37.873924] android_work: sent uevent USB_STATE=CONNECTED
[ 37.879960] android_work: sent uevent USB_STATE=DISCONNECTED
[ 37.930559] CPU1: unable to kill
[ 38.001376] android_work: sent uevent USB_STATE=CONNECTED
[ 38.006937] android_usb gadget: high-speed config #1: android
[ 38.025141] android_work: sent uevent USB_STATE=CONFIGURED
[ 39.358295] mmc2: Timeout waiting for hardware interrupt.
[ 39.363682] sdhci: ================== REGISTER DUMP (mmc2)==================
[ 39.370715] sdhci: Sys addr[0x000]: 0x00000000 | Version[0x0fe]: 0x00000303
[ 39.377748] sdhci: Blk size[0x004]: 0x00000000 | Blk cnt[0x006]: 0x00000000
[ 39.384779] sdhci: Argument[0x008]: 0x00000c00 | Trn mode[0x00c]: 0x00000000
[ 39.391810] sdhci: Present[0x024]: 0x01fb00f1 | Host ctl[0x028]: 0x00000001
[ 39.398840] sdhci: Power[0x029]: 0x0000000f | Blk gap[0x02a]: 0x00000000
[ 39.405871] sdhci: Wake-up[0x02b]: 0x00000000 | Clock[0x02c]: 0x00000405
[ 39.412902] sdhci: Timeout[0x02e]: 0x00000000 | Int stat[0x030]: 0x00000000
[ 39.419934] sdhci: Int enab[0x034]: 0x00ff0003 | Sig enab[0x038]: 0x00fc0003
[ 39.426965] sdhci: AC12 err[0x03c]: 0x00000000 | Slot int[0x0fc]: 0x00000000
[ 39.433995] sdhci: Caps[0x040]: 0x376fd080 | Caps_1[0x044]: 0x10002f73
[ 39.441026] sdhci: Cmd[0x00e]: 0x0000341a | Max curr[0x048]: 0x00000000
[ 39.448054] sdhci: Host ctl2[0x03e]: 0x00003000
[ 39.452571] sdhci: ADMA Err[0x054]: 0x00000000 | ADMA Ptr[0x058]: 0x00000000
[ 39.459601] sdhci: Tap value: 0 | Trim value: 2
[ 39.464116] sdhci: SDMMC Interrupt status: 0x00000000
[ 39.469150] sdhci: =========================================================
Nougat in safe_mode
Succeeded in disabling TLK_DAEMON by not building its prebuilt executable. Now android boots to safe mode and displays the lock screen, but input devices (Mouse and Keyboard) aren't working.
Have read about the strictly enforced verified boot in nougat, but have no idea how to go about debugging the cause for safe mode.
The Log information that shows SAFE MODE
01-01 00:05:40.481: I/WindowManager(592): SAFE MODE ENABLED (menu=0 s=0 dpad=-1 trackball=-1)
It comes from the WindowManager, I tried reading the sources in frameworks directory, but didn't quite understand how things work.
How should one figure out the cause for safe mode, is it due to security issues in kernel or the android part (Sepolicy etc)?
There are couple of errors in the log, should I correct all the errors, does it solve the safeboot problem?
Kindly help !!
Finally solved the safe mode problem, it was enabled as android has sensed the volume down state as high, this state is one of conditions which determines if safemode is set, though there is no volume buttons in the board somehow the code reads it as high. Anyways the system hangs in lock-screen and keeps rebooting.
SOURCE CODE
WindowMangerService.java
mSafeMode = menuState > 0 || sState > 0 || dpadState > 0 || trackballState > 0 || volumeDownState > 0;
Just removed the volume down condition.
Any ideas on why android freezes in lock-screen everytime it boots ?
Working Nougat in jetson-tk1
Solved the system hang, the issue was related to SDHCI controller, had to make some changes in the kernel. Simply followed the instructions in this link
https://devtalk.nvidia.com/default/...g-for-hardware-interrupt-solved-with-issues-/
Now have a working android Nougat in jetson-tk1.
RMSprop said:
Working Nougat in jetson-tk1
Solved the system hang, the issue was related to SDHCI controller, had to make some changes in the kernel. Simply followed the instructions in this link
https://devtalk.nvidia.com/default/...g-for-hardware-interrupt-solved-with-issues-/
Now have a working android Nougat in jetson-tk1.
Click to expand...
Click to collapse
Any chance to get the link to this treasure?

Categories

Resources