NFS module for Motorola defy froyo - Defy General

I just finished building an nfs kernel module for my motorola defy from source.
The module has dependencies to lockd.ko and sunrpc.ko, so you will need to load this prior to the nfs.ko.
These modules were tested against Motorola Defy Stock ROM Froyo (Linux version 2.6.32.9-ga28fcc4) and they work just fine.
You will require busybox's mount to mount nfs.
I will write a more detailed howto shortly.
have fun,
tuxx

tuxx42 said:
I just finished building an nfs kernel module for my motorola defy from source.
The module has dependencies to lockd.ko and sunrpc.ko, so you will need to load this prior to the nfs.ko.
These modules were tested against Motorola Defy Stock ROM Froyo (Linux version 2.6.32.9-ga28fcc4) and they work just fine.
You will require busybox's mount to mount nfs.
I will write a more detailed howto shortly.
have fun,
tuxx
Click to expand...
Click to collapse
can you pls tell me how to use these file to get nfs working in my defy..

run the following commands:
./adb push nfs.ko sunrpc.ko lockd.ko /sdcard
./adb shell
su
cd /sdcard
insmod lockd.ko
insmod sunrpc.ko
insmod nfs.ko
Click to expand...
Click to collapse
then use busybox's mount command to mount nfs as you would on any other linux

Hi,
tuxx42 said:
These modules were tested against Motorola Defy Stock ROM Froyo (Linux version 2.6.32.9-ga28fcc4) and they work just fine.
tuxx
Click to expand...
Click to collapse
big thanks for building these .
I am having a problem loading them on my defy running on this froyo kernel with cyanogenmod 7.
To verify that we are talking about the same files:
Code:
[email protected]:~/tmp$ wget 'http://forum.xda-developers.com/attachment.php?attachmentid=625029&d=1308059056' -O nfs.zip
--2011-07-17 10:47:37-- http://forum.xda-developers.com/attachment.php?attachmentid=625029&d=1308059056
Resolving forum.xda-developers.com... 50.23.231.72
Connecting to forum.xda-developers.com|50.23.231.72|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 122327 (119K) [application/zip]
Saving to: `nfs.zip'
100%[===================================================================================>] 122,327 54.4K/s in 2.2s
2011-07-17 10:47:39 (54.4 KB/s) - `nfs.zip' saved [122327/122327]
[email protected]:~/tmp$ md5sum nfs.zip
1af24766fa7fa43c014675c3744b1b28 nfs.zip
[email protected]:~/tmp$ unzip nfs.zip
Archive: nfs.zip
creating: nfs/
inflating: nfs/lockd.ko
inflating: nfs/nfs.ko
inflating: nfs/sunrpc.ko
[email protected]:~/tmp$ cd nfs
[email protected]:~/tmp/nfs$ md5sum *
20ba7c5a6b407347b0d58375894c63ba lockd.ko
8a4576594dd865f88d705f5fd6ce84e9 nfs.ko
84fd57a86e5778e3f72d15cedd167091 sunrpc.ko
[email protected]:~/tmp/nfs$ /sbin/modinfo *
filename: lockd.ko
license: GPL
description: NFS file locking service version 0.5.
author: Olaf Kirch <[email protected]>
depends: sunrpc
uts_release: 2.6.32.9
vermagic: 2.6.32.9 preempt mod_unload ARMv7
parm: nsm_use_hostnames:bool
parm: nlm_max_connections:uint
filename: nfs.ko
license: GPL
author: Olaf Kirch <[email protected]>
depends: sunrpc,lockd
uts_release: 2.6.32.9
vermagic: 2.6.32.9 preempt mod_unload ARMv7
parm: cache_getent:Path to the client cache upcall program (string)
parm: cache_getent_timeout:Timeout (in seconds) after which the cache upcall is assumed to have failed (ulong)
parm: enable_ino64:bool
filename: sunrpc.ko
license: GPL
depends:
uts_release: 2.6.32.9
vermagic: 2.6.32.9 preempt mod_unload ARMv7
parm: min_resvport:portnr
parm: max_resvport:portnr
parm: tcp_slot_table_entries:slot_table_size
parm: udp_slot_table_entries:slot_table_size
Copying them to the phone:
Code:
[email protected]:~/tmp/nfs$ adb push nfs.ko /sdcard/nfs.ko
2182 KB/s (103348 bytes in 0.046s)
[email protected]:~/tmp/nfs$ adb push lockd.ko /sdcard/lockd.ko
1752 KB/s (41696 bytes in 0.023s)
[email protected]:~/tmp/nfs$ adb push sunrpc.ko /sdcard/sunrpc.ko
2226 KB/s (130152 bytes in 0.057s)
Trying to load lockd:
Code:
[email protected]:~/tmp/nfs$ adb shell
# cd /sdcard
# insmod lockd.ko
insmod: init_module 'lockd.ko' failed (Exec format error)
# dmesg | tail -1
<4>[127361.915008] lockd: module has no symbols (stripped?)
Kernel version matches:
Code:
# uname -r
2.6.32.9-ga28fcc4
#
Since the kernel complains about lack of symbols, let's see them:
Code:
[email protected]:~/tmp/nfs$ objdump -t lockd.ko
BFD: lockd.ko: warning: sh_link not set for section `.ARM.exidx'
BFD: lockd.ko: warning: sh_link not set for section `.ARM.exidx.exit.text'
BFD: lockd.ko: warning: sh_link not set for section `.ARM.exidx.init.text'
lockd.ko: file format elf32-little
SYMBOL TABLE:
no symbols
[email protected]:~/tmp/nfs$
Let's see what objdump has to say about tun.ko present on the device:
Code:
[email protected]:~/tmp/nfs$ adb pull /system/lib/modules/tun.ko
167 KB/s (16220 bytes in 0.094s)
[email protected]:~/tmp/nfs$ objdump -t tun.ko
tun.ko: file format elf32-little
SYMBOL TABLE:
00000000 l d .text 00000000 .text
00000000 l d .init.text 00000000 .init.text
00000000 l d .rodata 00000000 .rodata
00000000 l d .rodata.str1.1 00000000 .rodata.str1.1
00000000 l d .data 00000000 .data
00000000 l d .bss 00000000 .bss
00000000 l F .text 00000024 tun_net_open
00000024 l F .text 00000024 tun_net_close
00000048 l F .text 00000004 tun_net_mclist
0000004c l F .text 00000028 tun_net_change_mtu
00000074 l F .text 0000002c tun_setup
00000568 l F .text 00000028 tun_free_netdev
000000a0 l F .text 00000008 tun_validate
000000a8 l F .text 0000003c tun_get_settings
000000e4 l F .text 00000008 tun_get_msglevel
000000ec l F .text 00000004 tun_set_msglevel
000000f0 l F .text 00000010 tun_get_link
00000100 l F .text 00000010 tun_get_rx_csum
00000110 l F .text 00000020 tun_set_rx_csum
000002e0 l F .text 000000dc tun_chr_fasync
000003bc l F .text 000000ec tun_chr_poll
000004a8 l F .text 000000c0 tun_chr_close
00000590 l F .text 00000060 tun_chr_open
000005f0 l F .text 00000078 tun_get_drvinfo
00000668 l F .text 0000000c tun_sock_destruct
00000674 l F .text 00000018 tun_show_group
0000068c l F .text 00000018 tun_show_owner
000006a4 l F .text 0000003c tun_show_flags
000006e0 l F .text 00000050 tun_net_uninit
00000730 l F .text 00000178 tun_net_xmit
00000a74 l F .text 0000007c tun_sock_write_space
00000af0 l F .text 000009c4 tun_chr_ioctl
000014b4 l F .text 00000434 tun_chr_aio_write
000018e8 l F .text 00000364 tun_chr_aio_read
00000000 l d .ARM.extab 00000000 .ARM.extab
00000000 l d .ARM.exidx 00000000 .ARM.exidx
00000000 l d .ARM.extab.init.text 00000000 .ARM.extab.init.text
00000000 l d .ARM.exidx.init.text 00000000 .ARM.exidx.init.text
00000000 l d .modinfo 00000000 .modinfo
00000000 l d .gnu.linkonce.this_module 00000000 .gnu.linkonce.this_module
00000000 l d .note.gnu.build-id 00000000 .note.gnu.build-id
00000000 l d .comment 00000000 .comment
00000000 l d .ARM.attributes 00000000 .ARM.attributes
00000000 *UND* 00000000 strcpy
00000000 *UND* 00000000 rtnl_unlock
00000000 *UND* 00000000 misc_deregister
00000000 *UND* 00000000 eth_mac_addr
00000000 *UND* 00000000 skb_put
00000000 *UND* 00000000 rtnl_is_locked
00000000 *UND* 00000000 skb_copy_datagram_from_iovec
00000000 g O .gnu.linkonce.this_module 00000144 __this_module
00000000 *UND* 00000000 __netif_schedule
00000000 *UND* 00000000 __aeabi_unwind_cpp_pr0
00000000 *UND* 00000000 skb_dequeue
00000000 *UND* 00000000 kill_fasync
00000000 *UND* 00000000 rtnl_link_register
00000130 g F .text 00000020 cleanup_module
00000000 *UND* 00000000 dev_alloc_name
00000000 *UND* 00000000 memcpy
00000000 *UND* 00000000 do_sync_write
00000000 *UND* 00000000 kfree
00000000 *UND* 00000000 add_wait_queue
00000000 *UND* 00000000 eth_validate_addr
00000000 *UND* 00000000 __wake_up
00000000 *UND* 00000000 bitrev32
00000000 *UND* 00000000 __dev_get_by_name
00000000 *UND* 00000000 ether_setup
00000000 *UND* 00000000 netdev_features_change
00000000 g F .init.text 0000008c init_module
00000000 *UND* 00000000 eth_type_trans
00000000 *UND* 00000000 local_bh_enable
00000000 *UND* 00000000 dump_stack
00000000 *UND* 00000000 do_sync_read
00000000 *UND* 00000000 kfree_skb
00000000 *UND* 00000000 schedule
00000000 *UND* 00000000 alloc_netdev_mq
00000000 *UND* 00000000 __put_user_4
00000000 *UND* 00000000 kmem_cache_alloc
00000000 *UND* 00000000 local_bh_disable
00000000 *UND* 00000000 capable
00000000 *UND* 00000000 skb_queue_tail
00000000 *UND* 00000000 unlock_kernel
00000000 *UND* 00000000 device_create_file
00000000 *UND* 00000000 rtnl_link_unregister
00000000 *UND* 00000000 preempt_schedule
00000000 *UND* 00000000 sk_free
00000000 *UND* 00000000 skb_copy_datagram_const_iovec
00000000 *UND* 00000000 crc32_le
00000000 *UND* 00000000 fasync_helper
00000000 *UND* 00000000 memcpy_toiovecend
00000000 *UND* 00000000 free_netdev
00000000 *UND* 00000000 lock_kernel
00000000 *UND* 00000000 printk
00000000 *UND* 00000000 sk_alloc
00000000 *UND* 00000000 dev_set_mac_address
00000000 *UND* 00000000 netif_rx_ni
00000000 *UND* 00000000 memset
00000000 *UND* 00000000 skb_queue_purge
00000000 *UND* 00000000 __memzero
00000000 *UND* 00000000 misc_register
00000000 *UND* 00000000 __f_setown
00000000 *UND* 00000000 default_wake_function
00000000 *UND* 00000000 __init_waitqueue_head
00000000 *UND* 00000000 jiffies
00000000 *UND* 00000000 sprintf
00000000 *UND* 00000000 skb_partial_csum_set
00000000 *UND* 00000000 memcpy_fromiovecend
00000000 *UND* 00000000 sock_alloc_send_pskb
00000000 *UND* 00000000 no_llseek
00000000 *UND* 00000000 rtnl_lock
00000000 *UND* 00000000 remove_wait_queue
00000000 *UND* 00000000 malloc_sizes
00000000 *UND* 00000000 get_random_bytes
00000000 *UND* 00000000 __wake_up_sync
00000000 *UND* 00000000 in_egroup_p
00000000 *UND* 00000000 __copy_to_user
00000000 *UND* 00000000 strchr
00000000 *UND* 00000000 unregister_netdevice
00000000 *UND* 00000000 __copy_from_user
00000000 *UND* 00000000 sock_init_data
00000000 *UND* 00000000 __kmalloc
00000000 *UND* 00000000 register_netdevice
[email protected]:~/tmp/nfs$
Are you sure that these modules work properly on your device? Maybe you have stripped them after putting them on your phone and before uploading them here?

I have the same problem... Did you find the way to mount nfs shares on the defy?

Related

Android on Asus P527??

first of all, p527 is an omap 850 device of 200mhz
i downloaded android for omap 850 devices from http://sourceforge.net/projects/wing-linux/
i installed wing-linux-0.4pre4-rootfs.cab in storage card
next to have default.txt, i installed wing-linux-0.4pre4-elf.cab
then i ran haret-0.5.2.exe. after few sec, the screen turned on white nd the device was hang up. m really anxious to start it on my p527... but just dont know how!
i m posting all the txt files, generated or installed during the procedure...
default.txt
Code:
set MTYPE 2372
set KERNEL "zImage"
set INITRD "initramfs.cpio.gz"
set CMDLINE "debug quiet psplash=false loglevel=7 init=/sbin/init console=tty0 video=omapfb:accel gsm-wizard.noreset=1 gsm-wizard.noload=1 4"
log "earlylog.txt"
bootlinux
disdump.txt
Code:
HaRET(2)# pdump 0xfffec000 0x20
fffec000 | f8000089 010104ef 302eb93f fe700007 | ........?..0..p.
fffec010 | ffffffd2 5c000000 fffffc00 fffffc19 | .......\........
HaRET(3)# pdump 0xfffee300 255
fffee300 | 00000000 00000000 00000000 00000000 | ................
fffee310 | 00000000 00000000 00000000 00000000 | ................
fffee320 | 00000000 00000000 00000000 00000000 | ................
fffee330 | 00000000 00000000 00000000 00000000 | ................
fffee340 | 00000000 00000000 00000000 00000000 | ................
fffee350 | 00000000 00000000 00000000 00000000 | ................
fffee360 | 00000000 00000000 00000000 00000000 | ................
fffee370 | 00000000 00000000 00000000 00000000 | ................
fffee380 | 00000000 00000000 00000000 00000000 | ................
fffee390 | 00000000 00000000 00000000 00000000 | ................
fffee3a0 | 00000000 00000000 00000000 00000000 | ................
fffee3b0 | 00000000 00000000 00000000 00000000 | ................
fffee3c0 | 0000a941 00000041 00002000 00000000 | A...A.... ......
fffee3d0 | 00002100 00000000 00000000 00000001 | .!..............
fffee3e0 | 00000010 00000001 00000000 00000000 | ................
fffee3f0 | 00000000 00000000 00006350 00000000 | ........Pc......
Cannot open script file
\Storage Card\linux\default.txt
Cannot open script file
\Storage Card\linux\default.txt
HaRET(1)# set MTYPE 2372
HaRET(2)# set KERNEL "zImage"
HaRET(3)# set INITRD "initramfs.cpio.gz"
HaRET(4)# set CMDLINE "debug quiet psplash=false loglevel=7 init=/sbin/init console=tty0 video=omapfb:accel gsm-wizard.noreset=1 gsm-wizard.noload=1 4"
HaRET(5)# log "earlylog.txt"
startup.txt
Code:
log "dispdump.txt"
pdump 0xfffec000 0x20
pdump 0xfffee300 255
and earlylog.txt was like this..
Code:
= *= ž: ›: ™8 “8
i doubt over default.txt with mtype for not booting up nd m abt to try with other devices' default.txt
i know nothin abt porting or emulating android on winmo devices.. nd i hope to get response over here...
pls comment
Nice initative, keep up the good work
this thred might be helpful
http://forum.xda-developers.com/showthread.php?t=496692
Did you try haret, default.txt and everything android on the root of the storage card?
BenGman said:
Did you try haret, default.txt and everything android on the root of the storage card?
Click to expand...
Click to collapse
yes i tried. ofcourse on root of storage card. no good... it needs a kind of programming knowledge.

FireTV Netflix APK

I was wondering if anyone has a copy of the FireTV Netflix apk or would be willing to make a backup of it and share?
ajb999 said:
I was wondering if anyone has a copy of the FireTV Netflix apk or would be willing to make a backup of it and share?
Click to expand...
Click to collapse
I went to try to pull it for you, but it seems they are hiding it under something not named netflix. Here's a list of all the packages installed:
Code:
pm list packages -f
package:/system/framework/framework-res.apk=android
package:/data/app/com.HBO-1.apk=com.HBO
package:/system/app/UnifiedSettingsProvider.apk=com.amazon.acos.providers.UnifiedSettingsProvider
package:/system/app/com.amazon.ags.app-platform_3016210.apk=com.amazon.ags.app
package:/system/app/ParentalControlProvider.apk=com.amazon.android.settings
package:/system/app/com.amazon.avod.apk=com.amazon.avod
package:/system/app/csApp-release-102910.apk=com.amazon.bueller.csapp
package:/system/app/BuellerDeviceService.apk=com.amazon.bueller.notification
package:/system/app/gallery-bueller-release_102520710.apk=com.amazon.bueller.photos
package:/system/app/AmazonSettings.apk=com.amazon.bueller.settings
package:/system/app/MetricsService-2045510.apk=com.amazon.client.metrics
package:/system/app/MetricsApi-2032010.apk=com.amazon.client.metrics.api
package:/system/app/com.amazon.communication.discovery.apk=com.amazon.communication.discovery
package:/system/app/com.amazon.dcp.apk=com.amazon.dcp
package:/system/app/com.amazon.dcp.contracts.framework.apk=com.amazon.dcp.contracts.framework.library
package:/system/app/com.amazon.dcp.contracts.apk=com.amazon.dcp.contracts.library
package:/system/app/com.amazon.device.bluetoothdfu.apk=com.amazon.device.bluetoothdfu
package:/system/app/ControllerManager.apk=com.amazon.device.controllermanager
package:/system/app/CrashManager-2046010.apk=com.amazon.device.crashmanager
package:/system/app/com.amazon.device.gmo-platform_23910.apk=com.amazon.device.gmo
package:/system/app/com.amazon.device.ims-service_204900.apk=com.amazon.device.ims
package:/system/app/LogManager-1048110.apk=com.amazon.device.logmanager
package:/system/app/LowStorageManager.apk=com.amazon.device.lowstoragemanager
package:/system/app/com.amazon.device.messaging.apk=com.amazon.device.messaging
package:/system/app/com.amazon.device.messaging.sdk.internal.apk=com.amazon.device.messaging.sdk.internal.library
package:/system/app/com.amazon.device.messaging.sdk.apk=com.amazon.device.messaging.sdk.library
package:/system/app/com.amazon.device.settings.apk=com.amazon.device.settings
package:/system/app/com.amazon.device.settings.sdk.internal.apk=com.amazon.device.settings.sdk.internal.library
package:/system/app/com.amazon.device.sync.apk=com.amazon.device.sync
package:/system/app/com.amazon.device.sync.sdk.internal.apk=com.amazon.device.sync.sdk.internal.library
package:/system/app/DeviceControlService.apk=com.amazon.devicecontrol
package:/system/app/com.amazon.dp.logger.apk=com.amazon.dp.logger
package:/system/app/MobileAuthenticationPlatformAndroid-001001000310.apk=com.amazon.identity.auth.device.authorization
package:/system/app/com.amazon.imp_130013510.apk=com.amazon.imp
package:/system/app/com.amazon.kindle.cms-service_30214410.apk=com.amazon.kindle.cms
package:/system/app/KindleFireDeviceControls_1.0.50.0_release-signed.apk=com.amazon.kindle.devicecontrols
package:/system/app/com.amazon.kor.demo-platform_41110.apk=com.amazon.kor.demo
package:/system/app/MetricsApi.apk=com.amazon.metrics.api
package:/system/app/ParentalControls_10139310.apk=com.amazon.parentalcontrols
package:/system/app/ContentSupportProvider.apk=com.amazon.providers.contentsupport
package:/data/app/com.amazon.sevzero-1.apk=com.amazon.sevzero
package:/system/app/MSTLightningServerAPK-1.0-release-signed.apk=com.amazon.storm.lightning.services
package:/system/app/com.amazon.tcomm.apk=com.amazon.tcomm
package:/system/app/com.amazon.communication.apk=com.amazon.tcomm.client
package:/system/app/BuellerDevice.apk=com.amazon.tv.device
package:/system/app/BuellerIME.apk=com.amazon.tv.ime
package:/system/app/com.amazon.tv.launcher.apk=com.amazon.tv.launcher
package:/system/app/com.amazon.tv.legal.notices.apk=com.amazon.tv.legal.notices
package:/system/app/com.amazon.tv.oobe.apk=com.amazon.tv.oobe
package:/system/app/WebCryptoTZService.apk=com.amazon.tz.webcryptotzservice
package:/system/app/BuellerShare.apk=com.amazon.unifiedshare.actionchooser
package:/system/app/AmazonApps_420003810.apk=com.amazon.venezia
package:/system/app/WhisperCastConnect.apk=com.amazon.wcast
package:/system/app/WhisperplayCore.apk=com.amazon.whisperlink.core.android
package:/system/app/WhisperplayQCSink.apk=com.amazon.whisperplay.cds
package:/system/app/WhisperlinkSdk.apk=com.amazon.whisperplay.contracts
package:/system/app/Bluetooth.apk=com.android.bluetooth
package:/system/app/CertInstaller.apk=com.android.certinstaller
package:/system/app/DefaultContainerService.apk=com.android.defcontainer
package:/system/app/InputDevices.apk=com.android.inputdevices
package:/system/app/KeyChain.apk=com.android.keychain
package:/system/app/FusedLocation.apk=com.android.location.fused
package:/system/app/PackageInstaller.apk=com.android.packageinstaller
package:/system/app/ApplicationsProvider.apk=com.android.providers.applications
package:/system/app/DownloadProvider.apk=com.android.providers.downloads
package:/system/app/DrmProvider.apk=com.android.providers.drm
package:/system/app/MediaProvider.apk=com.android.providers.media
package:/system/app/SettingsProvider.apk=com.android.providers.settings
package:/system/app/SharedStorageBackup.apk=com.android.sharedstoragebackup
package:/data/app/com.epicpixel.Grow-1.apk=com.epicpixel.Grow
package:/data/app/com.espn.gtv-1.apk=com.espn.gtv
package:/data/app/com.frogmind.badland-1.apk=com.frogmind.badland
package:/data/app/com.koushikdutta.cast.receiver-1.apk=com.koushikdutta.cast.receiver
package:/data/app/com.mxtech.videoplayer.ad-1.apk=com.mxtech.videoplayer.ad
package:/data/app/com.plexapp.android-2.apk=com.plexapp.android
package:/system/app/CABLService.apk=com.qualcomm.cabl
package:/system/app/PrivInit.apk=com.qualcomm.privinit
package:/system/app/WfdService.apk=com.qualcomm.wfd.service
package:/system/app/WfdP2pService.apk=com.qualcomm.wifip2p.service
package:/data/app/com.silicondust.mg.upnp-1.apk=com.silicondust.mg.upnp
package:/data/app/com.zaren.HomeRunTV-1.apk=com.zaren.HomeRunTV
package:/data/app/hb.doom_and_destiny-1.apk=hb.doom_and_destiny
package:/data/app/org.chromium.content_shell_apk-2.apk=org.chromium.content_shell_apk
package:/data/app/org.chromium.youtube_apk-2.apk=org.chromium.youtube_apk
And running processes with netflix running:
Code:
127|[email protected]:/sdcard $ ps
ps
USER PID PPID VSIZE RSS WCHAN PC NAME
root 1 0 480 344 ffffffff 00000000 S /init
root 2 0 0 0 ffffffff 00000000 S kthreadd
root 3 2 0 0 ffffffff 00000000 S ksoftirqd/0
root 6 2 0 0 ffffffff 00000000 S migration/0
root 10 2 0 0 ffffffff 00000000 S khelper
root 11 2 0 0 ffffffff 00000000 S suspend_sys_syn
root 12 2 0 0 ffffffff 00000000 S suspend
root 15 2 0 0 ffffffff 00000000 S irq/203-msmdata
root 16 2 0 0 ffffffff 00000000 S sync_supers
root 17 2 0 0 ffffffff 00000000 S bdi-default
root 18 2 0 0 ffffffff 00000000 S kblockd
root 19 2 0 0 ffffffff 00000000 S khubd
root 20 2 0 0 ffffffff 00000000 S irq/84-msm_iomm
root 21 2 0 0 ffffffff 00000000 S irq/84-msm_iomm
root 22 2 0 0 ffffffff 00000000 S irq/96-msm_iomm
root 23 2 0 0 ffffffff 00000000 S irq/96-msm_iomm
root 24 2 0 0 ffffffff 00000000 S irq/94-msm_iomm
root 25 2 0 0 ffffffff 00000000 S irq/94-msm_iomm
root 26 2 0 0 ffffffff 00000000 S irq/92-msm_iomm
root 27 2 0 0 ffffffff 00000000 S irq/92-msm_iomm
root 28 2 0 0 ffffffff 00000000 S irq/100-msm_iom
root 29 2 0 0 ffffffff 00000000 S irq/100-msm_iom
root 30 2 0 0 ffffffff 00000000 S irq/86-msm_iomm
root 31 2 0 0 ffffffff 00000000 S irq/86-msm_iomm
root 32 2 0 0 ffffffff 00000000 S irq/90-msm_iomm
root 33 2 0 0 ffffffff 00000000 S irq/90-msm_iomm
root 34 2 0 0 ffffffff 00000000 S irq/88-msm_iomm
root 35 2 0 0 ffffffff 00000000 S irq/102-msm_iom
root 36 2 0 0 ffffffff 00000000 S irq/102-msm_iom
root 37 2 0 0 ffffffff 00000000 S irq/98-msm_iomm
root 38 2 0 0 ffffffff 00000000 S irq/98-msm_iomm
root 39 2 0 0 ffffffff 00000000 S irq/243-msm_iom
root 40 2 0 0 ffffffff 00000000 S irq/243-msm_iom
root 41 2 0 0 ffffffff 00000000 S irq/269-msm_iom
root 42 2 0 0 ffffffff 00000000 S irq/269-msm_iom
root 43 2 0 0 ffffffff 00000000 S l2cap
root 44 2 0 0 ffffffff 00000000 S a2mp
root 45 2 0 0 ffffffff 00000000 S cfg80211
root 46 2 0 0 ffffffff 00000000 S rpciod
root 47 2 0 0 ffffffff 00000000 S modem_notifier
root 48 2 0 0 ffffffff 00000000 S smd_channel_clo
root 49 2 0 0 ffffffff 00000000 S smsm_cb_wq
root 51 2 0 0 ffffffff 00000000 S qmi
root 52 2 0 0 ffffffff 00000000 S nmea
root 53 2 0 0 ffffffff 00000000 S msm_ipc_router
root 54 2 0 0 ffffffff 00000000 S apr_driver
root 55 2 0 0 ffffffff 00000000 S kswapd0
root 56 2 0 0 ffffffff 00000000 S fsnotify_mark
root 57 2 0 0 ffffffff 00000000 S nfsiod
root 58 2 0 0 ffffffff 00000000 S cifsiod
root 59 2 0 0 ffffffff 00000000 S crypto
root 73 2 0 0 ffffffff 00000000 S mdp_dma_wq
root 74 2 0 0 ffffffff 00000000 S mdp_vsync_wq
root 75 2 0 0 ffffffff 00000000 S mdp_pipe_ctrl_w
root 76 2 0 0 ffffffff 00000000 S mdp_cursor_ctrl
root 77 2 0 0 ffffffff 00000000 S hdmi_hdcp
root 78 2 0 0 ffffffff 00000000 S irq/111-hdmi_ms
root 79 2 0 0 ffffffff 00000000 S dtv_work
root 80 2 0 0 ffffffff 00000000 S vidc_worker_que
root 81 2 0 0 ffffffff 00000000 S vidc_timer_wq
root 82 2 0 0 ffffffff 00000000 S smux_notify_wq
root 83 2 0 0 ffffffff 00000000 S smux_tx_wq
root 84 2 0 0 ffffffff 00000000 S smux_rx_wq
root 85 2 0 0 ffffffff 00000000 S smux_loopback_w
root 86 2 0 0 ffffffff 00000000 S k_hsuart
root 87 2 0 0 ffffffff 00000000 S diag_wq
root 88 2 0 0 ffffffff 00000000 S hsic_diag_wq
root 89 2 0 0 ffffffff 00000000 S hsic_2_diag_wq
root 90 2 0 0 ffffffff 00000000 S smux_diag_wq
root 91 2 0 0 ffffffff 00000000 S diag_cntl_wq
root 92 2 0 0 ffffffff 00000000 S diag_dci_wq
root 94 2 0 0 ffffffff 00000000 S kgsl-3d0
root 95 2 0 0 ffffffff 00000000 S spi_qsd.2
root 96 2 0 0 ffffffff 00000000 S usbnet
root 99 2 0 0 ffffffff 00000000 S mdm_bridge
root 100 2 0 0 ffffffff 00000000 S ks_bridge:1
root 101 2 0 0 ffffffff 00000000 S ks_bridge:2
root 102 2 0 0 ffffffff 00000000 S ks_bridge:3
root 103 2 0 0 ffffffff 00000000 S ks_bridge:4
root 104 2 0 0 ffffffff 00000000 S k_rmnet_mux_wor
root 105 2 0 0 ffffffff 00000000 S f_mtp
root 106 2 0 0 ffffffff 00000000 S file-storage
root 107 2 0 0 ffffffff 00000000 S uether
root 108 2 0 0 ffffffff 00000000 S kpsmoused
root 109 2 0 0 ffffffff 00000000 D dbs_sync/0
root 110 2 0 0 ffffffff 00000000 D dbs_sync/1
root 111 2 0 0 ffffffff 00000000 D dbs_sync/2
root 112 2 0 0 ffffffff 00000000 D dbs_sync/3
root 113 2 0 0 ffffffff 00000000 D kinteractiveup
root 115 2 0 0 ffffffff 00000000 S irq/662-msm-sdc
root 116 2 0 0 ffffffff 00000000 S binder
root 118 2 0 0 ffffffff 00000000 S mmcqd/0
root 119 2 0 0 ffffffff 00000000 S mmcqd/0boot0
root 120 2 0 0 ffffffff 00000000 S mmcqd/0boot1
root 121 2 0 0 ffffffff 00000000 S krfcommd
root 122 2 0 0 ffffffff 00000000 S msm-cpufreq
root 123 2 0 0 ffffffff 00000000 S rq_stats
root 124 2 0 0 ffffffff 00000000 S deferwq
root 125 2 0 0 ffffffff 00000000 D msm_dcvs/1
root 126 2 0 0 ffffffff 00000000 D msm_dcvs/2
root 127 2 0 0 ffffffff 00000000 D msm_dcvs/3
root 128 2 0 0 ffffffff 00000000 D msm_dcvs/4
root 129 1 384 200 ffffffff 00000000 S /sbin/ueventd
root 132 2 0 0 ffffffff 00000000 S jbd2/mmcblk0p18
root 133 2 0 0 ffffffff 00000000 S ext4-dio-unwrit
root 138 2 0 0 ffffffff 00000000 S jbd2/mmcblk0p20
root 139 2 0 0 ffffffff 00000000 S ext4-dio-unwrit
root 143 2 0 0 ffffffff 00000000 S jbd2/mmcblk0p1-
root 144 2 0 0 ffffffff 00000000 S ext4-dio-unwrit
root 145 2 0 0 ffffffff 00000000 S jbd2/mmcblk0p19
root 146 2 0 0 ffffffff 00000000 S ext4-dio-unwrit
system 263 1 1292 468 ffffffff 00000000 S /system/bin/servicemanager
root 264 1 4352 864 ffffffff 00000000 S /system/bin/vold
bluetooth 267 1 1720 1108 ffffffff 00000000 S /system/bin/dbus-daemon
system 269 1 2480 712 ffffffff 00000000 S /system/bin/qseecomd
root 270 1 11464 1732 ffffffff 00000000 S /system/bin/netd
root 271 1 6740 2232 ffffffff 00000000 S /system/bin/debuggerd
system 273 1 111580 9520 ffffffff 00000000 S /system/bin/surfaceflinger
root 274 1 466552 38852 ffffffff 00000000 S zygote
drm 275 1 15124 3704 ffffffff 00000000 S /system/bin/drmserver
media 276 1 35516 9132 ffffffff 00000000 S /system/bin/mediaserver
install 277 1 1436 812 ffffffff 00000000 S /system/bin/installd
keystore 278 1 2112 932 ffffffff 00000000 S /system/bin/keystore
root 282 1 28328 1032 ffffffff 00000000 S /system/bin/thermald
camera 286 1 7500 2236 ffffffff 00000000 S /system/bin/mm-qcamera-daemon
system 287 1 8288 2452 ffffffff 00000000 S /system/bin/cnd
system 290 1 2540 728 ffffffff 00000000 S /system/bin/mm-pp-daemon
nobody 293 1 2492 708 ffffffff 00000000 S /system/bin/rmt_storage
media_rw 294 1 2816 688 ffffffff 00000000 S /system/bin/sdcard
shell 295 1 7572 224 ffffffff 00000000 S /sbin/adbd
root 297 2 0 0 ffffffff 00000000 S k_gserial
root 299 2 0 0 ffffffff 00000000 S k_gsmd
root 300 2 0 0 ffffffff 00000000 S k_gbam
root 301 2 0 0 ffffffff 00000000 S gsmd_ctrl
system 389 269 4584 520 ffffffff 00000000 S /system/bin/qseecomd
root 489 1 2280 168 ffffffff 00000000 S /system/bin/cecdaemon
root 635 2 0 0 ffffffff 00000000 S IPCRTR
root 636 2 0 0 ffffffff 00000000 S ipc_rtr_q6_ipcr
system 644 274 587368 46460 ffffffff 00000000 S system_server
root 718 2 0 0 ffffffff 00000000 S ehci_wq
root 719 2 0 0 ffffffff 00000000 S irq/337-hsic_pe
root 736 2 0 0 ffffffff 00000000 S ath6kl
amz_a5 794 274 478532 22832 ffffffff 00000000 S android.process.media
amz_a3 801 274 477584 21128 ffffffff 00000000 S com.amazon.tv.ime
system 829 274 485688 24028 ffffffff 00000000 S com.amazon.bueller.notification
amz_a6 835 274 477268 20804 ffffffff 00000000 S android.process.acore
amz_a12 848 274 489248 22540 ffffffff 00000000 S com.amazon.device.logmanager
amz_a16 865 274 505452 27748 ffffffff 00000000 S com.amazon.client.metrics
system 878 274 475956 22712 ffffffff 00000000 S com.amazon.tz.webcryptotzservice
amz_a45 885 274 502016 31336 ffffffff 00000000 S com.amazon.tcomm
amz_a23 891 274 544080 37152 ffffffff 00000000 S com.amazon.whisperlink.core.android
amz_a9 921 274 483184 27996 ffffffff 00000000 S com.android.providers.downloads
amz_a42 936 274 489880 28796 ffffffff 00000000 S com.amazon.imp
amz_a46 941 274 611456 89160 ffffffff 00000000 S com.amazon.tv.launcher
amz_a10 968 274 473892 18424 ffffffff 00000000 S com.android.location.fused
amz_a43 995 274 520800 40052 ffffffff 00000000 S com.amazon.kindle.cms
log 1096 1 1164 484 ffffffff 00000000 S /system/bin/logwrapper
wifi 1098 1096 3048 1816 ffffffff 00000000 S /system/bin/wpa_supplicant
amz_a46 1212 274 498904 35124 ffffffff 00000000 S com.amazon.tv.launcher:GlobalNavProcess
amz_a26 1251 274 551388 57184 ffffffff 00000000 S com.amazon.avod
amz_a16 1281 865 1168 484 ffffffff 00000000 S logcat
amz_a34 1363 274 488040 31664 ffffffff 00000000 S com.amazon.device.messaging:TPHService
bluetooth 1607 274 487448 22288 ffffffff 00000000 S com.android.bluetooth
root 1692 1 6592 784 ffffffff 00000000 S /system/bin/mpdecision
bluetooth 1721 1 1340 708 ffffffff 00000000 S /system/bin/sh
bluetooth 1727 1721 2288 700 ffffffff 00000000 S /system/xbin/hciattach
root 1742 2 0 0 ffffffff 00000000 S irq/303-msm_hs_
root 1808 2 0 0 ffffffff 00000000 S hci0
log 1815 1 1164 484 ffffffff 00000000 S /system/bin/logwrapper
bluetooth 1816 1815 2784 1852 ffffffff 00000000 S /system/bin/bluetoothd
bluetooth 1921 1 1348 768 ffffffff 00000000 S /system/bin/sh
bluetooth 1935 1921 8380 1336 ffffffff 00000000 S /system/bin/abtfilt
root 2034 1 1564 592 ffffffff 00000000 S /system/bin/btremoted
amz_a50 19545 274 727824 14780 ffffffff 00000000 S com.amazon.bueller.photos
root 21541 2 0 0 ffffffff 00000000 S kworker/0:0
root 27103 2 0 0 ffffffff 00000000 S kworker/0:1
amz_a37 27699 274 485476 30484 ffffffff 00000000 S com.amazon.device.settings:Settings
amz_a2 27820 274 474304 19644 ffffffff 00000000 S com.amazon.tv.device
amz_a28 27844 274 484016 29852 ffffffff 00000000 S com.amazon.dcp:eek:TAService
amz_a28 27891 274 484992 28752 ffffffff 00000000 S com.amazon.dcp:eek:SMetrics
amz_a52 28147 274 482456 24004 ffffffff 00000000 S com.amazon.storm.lightning.services
amz_a24 28423 274 488716 24632 ffffffff 00000000 S com.amazon.whisperplay.cds:cds_services
system 28464 274 476192 21272 ffffffff 00000000 S com.qualcomm.wfd.service:wfd_service
root 29018 2 0 0 ffffffff 00000000 S flush-179:0
shell 29250 295 1348 792 c0108a6c 4021f9fc S /system/bin/sh
root 29424 2 0 0 ffffffff 00000000 S kworker/0:3
root 29575 2 0 0 ffffffff 00000000 S kworker/u:0
dhcp 29695 1 1264 592 ffffffff 00000000 S /system/bin/dhcpcd
root 30570 2 0 0 ffffffff 00000000 S kworker/0:2
root 30660 2 0 0 ffffffff 00000000 S kworker/u:2
amz_a6 30665 274 474084 17752 ffffffff 00000000 S com.amazon.device.controllermanager:BluetoothReceiver
root 30683 2 0 0 ffffffff 00000000 S khidpd_19490401
amz_a0 30700 274 562676 71768 ffffffff 00000000 R com.amazon.venezia
root 30817 2 0 0 ffffffff 00000000 S kworker/0:4
amz_a0 30836 274 492912 30000 ffffffff 00000000 S com.amazon.venezia:downloadService
root 30896 2 0 0 ffffffff 00000000 S kworker/0:5
amz_a28 31088 274 488112 29152 ffffffff 00000000 S com.amazon.dcp
u0_a1 31158 274 703156 118392 ffffffff 00000000 S org.chromium.content_shell_apk
amz_a67000 31210 274 563036 59780 ffffffff 00000000 S org.chromium.content_shell_apk:sandboxed_process0
shell 31516 29250 1428 592 00000000 4033cdd8 R ps
root 31517 2 0 0 ffffffff 00000000 S migration/1
root 31518 2 0 0 ffffffff 00000000 S kworker/1:0
root 31519 2 0 0 ffffffff 00000000 S ksoftirqd/1
root 31520 2 0 0 ffffffff 00000000 S kworker/1:1
root 32452 2 0 0 ffffffff 00000000 S kworker/u:1
[email protected]:/sdcard $k
Still trying to figure out the package name. But if you see something let me know
---------- Post added at 09:07 PM ---------- Previous post was at 08:42 PM ----------
Did some more looking around, I don't think there is any netflix app. I think it uses chromium. I watched logcat while launching it, and think it uses org.chromium.content_shell_apk (chromium shell?) and then makes all kinds of secure connections to amazon and netflix servers.
here's just a tiny portion of what it does:
Code:
D/Kiwi ( 3660): AbstractCommandTask: Command executed successfully
I/ShellManager( 3660): loadStartupUrl(): canConnectToNetflix() = true
I/ShellManager( 3660): dismissAlert(): Alert is not onscreen
I/ShellManager( 3660): loadStartupUrl(): urlToLoad = https://uiboot.netflix.com/apps/cadmiumtvui/upgrade_policy?v=2.0&first_boot=true&platform_id=nero&version_release=4.2.2&version_incremental=1.0&build_id=JDQ39&build_time=1397598677000&net
type=WIFI&video_height=1080&video_width=1920
I/ShellManager( 3660): Setting page load watchdog timer
E/WebCryptoJavascriptInterface( 3660): didStartLoading https://uiboot.netflix.com/apps/cadmiumtvui/upgrade_policy?v=2.0&first_boot=true&platform_id=nero&version_release=4.2.2&version_incremental=1.0&build_id=JDQ39&build_time=1397598677000&n
ettype=WIFI&video_height=1080&video_width=1920 [email protected]
W/WebCryptoJavascriptInterface( 3660): injectWebCryptoJavascriptInterfaceIntoPage called
W/WebCryptoJavascriptInterface( 3660): addWebCryptoJavascriptInterface called
E/TZService( 878): Create called
I/LibWebCryptoTZ( 878): LibWebCryptoTZ Init called
D/QSEECOMAPI: ( 878): QSEECom_start_app sb_length = 0xc8000
D/QSEECOMAPI: ( 878): App is not loaded in QSEE
I/ActivityManager( 644): Start proc org.chromium.content_shell_apk:sandboxed_process0 for service org.chromium.content_shell_apk/org.chromium.content.app.SandboxedProcessService0: pid=3723 uid=99001 gids={}
D/ChildProcessLauncher( 3660): Setting up connection to process: slot=0
W/WebCryptoJavascriptInterface( 3660): new WebCrypto done
W/WebCryptoJavascriptInterface( 3660): new WCJSInterface done
W/WebCryptoJavascriptInterface( 3660): addJavascriptInterface done
I/Choreographer( 3660): Skipped 67 frames! The application may be doing too much work on its main thread.
D/QSEECOMAPI: ( 878): Loaded image: APP id = 2
D/LibWebCryptoTZ( 878): TZService Loading app -webcrypto succeded
D/LibWebCryptoTZ( 878): TZService Loading app -webcrypto succeded, memory OK
E/TZService( 878): onBind called
D/ChildProcessLauncher( 3660): on connect callback, pid=3723 context=1479606120
E/WebCryptoJavascriptInterface( 3660): didStartLoading https://uiboot.netflix.com/apps/cadmiumtvui/upgrade_policy?v=2.0&first_boot=true&platform_id=nero&version_release=4.2.2&version_incremental=1.0&build_id=JDQ39&build_time=1397598677000&n
ettype=WIFI&video_height=1080&video_width=1920 [email protected]
W/WebCryptoJavascriptInterface( 3660): injectWebCryptoJavascriptInterfaceIntoPage called
W/WebCryptoJavascriptInterface( 3660): addWebCryptoJavascriptInterface called
W/WebCryptoJavascriptInterface( 3660): Try to create mWebCrypto again!!!
W/WebCryptoJavascriptInterface( 3660): Try to create mWebCrypto again, attach interface!!!
I/chromium( 3660): [3660:3660:0604/210058:488339499639:INFO:CONSOLE(0)] "The page at https://secure.netflix.com/us/htmltvui/cadmium-redirector-4/redirector.html?platform_id=nero&video_height=1080&nettype=WIFI&build_id=JDQ39&build_time=13975
98677000&version_release=4.2.2&version_incremental=1.0&video_width=1920 displayed insecure content from http://cdn-0.nflximg.com/us/ffe/htmltvui/plus/720/Loading_720_14fps_3.gif.
I/chromium( 3660): ", source:
You can visit the URL's, but only the netflix startup page displays :laugh:
App Backup of Netflix
wwwDOTdropboxDOTcom/s/
86mdav96fb81xg6/
Netflix-org.chromium.content_shell_apk-100011400-v1.0.0.apk
Join 3 lines together.(no links)
It installs on other android devices but will not launch without the amazon marketplace =/
Thanks everyone for the info and links. I am trying to use it with another device. The ouya to be specific. As stated above it won't launch without the amazon store. I installed this an purchased the app on the computer. It loads up and then pauses on the screen that's red and says Netflix with the animated squares. After comparing the firetv apk with the regular android one there's quite a bit more to the first one. Including a lot of calls to chromium. I'm not sure if the firetv one can be made to work with the ouya without a lot of work. I also tested on my nexus 7 2013 and nexus 5 with the same result.

[Q] S4 Mini Restarts.... Kernel Panic! Pls Help!

Hello Community,
i have about 20x Galaxy S4 Mini, there are all have random reboots.... all with the same failure..... I hope somebody can help me ....
What i have tried:
Many Firmwares ....
Other Kernels....
Custom Mods....
But nothing helps, after this i have readout the Logfile from the System(in the next Post)
Is there anything i can do? Change an IC or anything else?
I need to repair this phones .... i hope somebody can help me!
GREAT THANKS!!!
here is the LOG!
[ 0.186265] AXI: msm_bus_fabric_init_driver(): msm_bus_fabric_init_driver
[ 0.227926] msm_gpiomux_install: write failure: -22
[ 0.227956] msm_gpiomux_install: write failure: -22
[ 0.227956] msm_gpiomux_install: write failure: -22
[ 0.227956] msm_gpiomux_install: write failure: -22
[ 0.234671] pm8xxx-regulator pm8xxx-regulator.3: Failed to set supply 8921_l29
[ 0.234793] pm8xxx_vreg_probe: regulator_register failed: 8921_l29, rc=-16
[ 0.234793] pm8xxx_vreg_probe: error for 8921_l29, rc=-16
[ 0.242423] msm_rpm_get_status(): Status id 433 not defined for target
[ 0.242453] AXI: msm_bus_rpm_is_mem_interleaved(): Status read for interleaving returned: -22
[ 0.242453] Using interleaved memory by default
[ 0.242636] msm_rpm_get_status(): Status id 433 not defined for target
[ 0.242667] AXI: msm_bus_rpm_is_mem_interleaved(): Status read for interleaving returned: -22
[ 0.242667] Using interleaved memory by default
[ 0.242850] msm_rpm_get_status(): Status id 433 not defined for target
[ 0.242881] AXI: msm_bus_rpm_is_mem_interleaved(): Status read for interleaving returned: -22
[ 0.242881] Using interleaved memory by default
[ 0.243064] msm_rpm_get_status(): Status id 433 not defined for target
[ 0.243064] AXI: msm_bus_rpm_is_mem_interleaved(): Status read for interleaving returned: -22
[ 0.243094] Using interleaved memory by default
[ 0.243247] msm_rpm_get_status(): Status id 433 not defined for target
[ 0.243277] AXI: msm_bus_rpm_is_mem_interleaved(): Status read for interleaving returned: -22
[ 0.243277] Using interleaved memory by default
[ 0.460155] [CAMERA][msm8930_init_cam:1906] Start
[ 0.460552] [msm_camera_gpio_install:274] [Start]
[ 0.503372] qup_i2c qup_i2c.0: Could not get core_clk
[ 0.616664] smd_channel_probe_worker: allocation table not initialized
[ 0.634701] msm_iommu_dev: Could not find context <jpegd_src>
[ 0.635006] msm_iommu_dev: Could not find context <jpegd_dst>
[ 0.684816] [mdnie lite] start!
[ 0.685304] [mdnie lite] end!
[ 0.690920] hdmi_msm hdmi_msm.1: external_common_state_create: sysfs group dfae7808
[ 0.692415] Inside writeback_driver_init
[ 0.693117] Inside writeback_probe
[ 1.004974] wcd9xxx-i2c-core 8-0077: wcd9xxx_i2c_proberobe for other slaves
[ 1.004974] devices of codec I2C slave Addr = 77
[ 1.015840] wcd9xxx-i2c-core 8-0066: wcd9xxx_i2c_proberobe for other slaves
[ 1.015840] devices of codec I2C slave Addr = 66
[ 1.027529] wcd9xxx-i2c-core 8-0055: wcd9xxx_i2c_proberobe for other slaves
[ 1.027559] devices of codec I2C slave Addr = 55
[ 1.205432] Atmel MXT336S 3-004a: tsp_atmel/mxt336s_Serrano.fw
[ 1.205676] couldn't get usb power supply
[ 1.775888] Atmel MXT336S 3-004a: 555clear_cover_enable = 0
[ 1.792858] Atmel MXT336S 3-004a: [GDC] changed gdc_value Init -> Init
[ 1.813093] Atmel MXT336S 3-004a: [GDC] changed gdc_value Init -> Init
[ 1.833358] mpu6050_input_probe: mpu6050 probe failed
[ 1.892781] Atmel MXT336S 3-004a: [GDC] changed gdc_value Init -> Init
[ 1.961941] imx175 spi driver probe
[ 1.964962] imx175_spi_read_id: ReadID:0xf8, 0x12
[ 1.969357] imx175_spi_read : Enter - reg_addr : 0x40
[ 1.974759] imx175_spi_read : Enter - reg_addr : 0x1000
[ 1.979887] imx175_spi_read : Enter - reg_addr : 0x2000
[ 1.985106] imx175_spi_read : Enter - reg_addr : 0x300c
[ 1.995452] imx175_spi_read : Enter - reg_addr : 0x1200
[ 2.000274] imx175_spi_read : Enter - reg_addr : 0x1218
[ 2.010499] imx175_format_calibrationdata: is_all_supported= 1
[ 2.015809] [shchang : imx175_format_afdata] Little Endian!!
[ 2.021150] [shchang : imx175_format_wbdata] Little Endian!!
[ 2.028109] msm_sensor_i2c_probe s5k3h5xa probe succeeded
[ 2.032656] [teddy]msm_sensor_i2c_probe s5k3h5xa sensor_create_node
[ 2.039096] [teddy][/opt/jenkins/android/workspace/android/jellybean/kernel/samsung/msm8930-common/drivers/media/video/msm/sensors/s5k3h5xa.c::::S5K3H5XA_create_node][1]
[ 2.054051] [teddy][/opt/jenkins/android/workspace/android/jellybean/kernel/samsung/msm8930-common/drivers/media/video/msm/sensors/s5k3h5xa.c::::S5K3H5XA_create_node][2]
[ 2.069159] [teddy][/opt/jenkins/android/workspace/android/jellybean/kernel/samsung/msm8930-common/drivers/media/video/msm/sensors/s5k3h5xa.c::::S5K3H5XA_create_node][3]
[ 2.084632] msm_eeprom_probe probe_fail
[ 2.089363] msm_sensor_i2c_probe s5k6a3yx probe succeeded
[ 2.093911] msm_eeprom_probe probe_fail
[ 2.142560] mmc0: No card detect facilities available
[ 2.156905] mmc1: No card detect facilities available
[ 2.322997] soc-audio soc-audio.0: Failed to add Speaker Function: -16
[ 2.388768] tc360_probe start
[ 2.392247] tc360_init: init done 0
[ 2.395482] read_ocv_trim: program rev reg is 0x19
[ 2.399572] pm8921_is_usb_chg_plugged_in: called before init
[ 2.406836] pm8921_is_usb_chg_plugged_in: called before init
[ 2.411597] pm8921_is_batfet_closed: called before init
[ 2.446970] pm8921_is_usb_chg_plugged_in: called before init
[ 2.454051] pm8921_is_usb_chg_plugged_in: called before init
[ 2.458995] pm8921_is_batfet_closed: called before init
[ 2.486983] pm8921_is_usb_chg_plugged_in: called before init
[ 2.495223] pm8921_usb_ovp_disable: called before init
[ 2.499587] power_supply usb: driver failed to report `present' property: 4294967274
[ 2.507340] power_supply usb: driver failed to report `present' property: 4294967274
[ 2.514939] power_supply ac: driver failed to report `present' property: 4294967274
[ 2.522905] power_supply ac: driver failed to report `present' property: 4294967274
[ 2.539050] power_supply fuelgauge: driver failed to report `current_max' property: 4294967274
[ 2.550221] irda_device_init called!
[ 2.553364] barcode_emul_ice4: probe complete barcode_emul_probe
[ 2.559011] power_supply fuelgauge: driver failed to report `current_max' property: 4294967274
[ 2.668060] init: do_chown: Could not access /selinux/booleans
[ 2.884602] power_supply usb: driver failed to report `health' property: 4294967274
[ 2.894430] power_supply fuelgauge: driver failed to report `current_max' property: 4294967274
[ 2.925988] sec_jack_det_work_func : err det jack state 0
[ 2.930444] sec_jack:sec_jack_set_type return, same type reason 0
[ 2.936609] init: could not open /dev/keychord
[ 3.647947] tsu6721 15-0025: dev1: 0x0, dev2: 0x0, dev3: 0x0, ADC: 0x1f JigFF
[ 3.944788] wcnss: no space available for smd frame
[ 3.976316] wcnss: no space available for smd frame
[ 4.006317] wcnss: no space available for smd frame
[ 4.036349] wcnss: no space available for smd frame
[ 5.718937] init: no such service 'quipc_igsn'
[ 5.754188] init: no such service 'quipc_main'
[ 5.782847] init: no such service 'location_mq'
[ 5.802411] init: no such service 'lowi-server'
[ 5.963192] init: no such service 'battery_monitor'
[ 7.044651] [mdnie lite] is negative Mode On = 0
[ 7.044651] [mdnie lite] negative off when resume, tuning again!
[ 7.044651] [mdnie lite] mDNIe_Set_Mode start , mode(0), background(1)
[ 7.044651] [mdnie lite] = UI MODE =
[ 7.044681] [mdnie lite] = STANDARD MODE =
[ 7.044681] [mdnie lite] send tuning cmd!!
[ 7.077949] [mdnie lite] mDNIe_Set_Mode end , mode(0), background(1)
[ 10.643949] Notify: smsm init
[ 11.774942] diag: proc 0, msg mask update fail -12, tried 419
[ 14.976865] accel_open_calibration: Can't open calibration file
[ 25.216023] Atmel MXT336S 3-004a: [GDC] changed gdc_value Init -> Waiting
[ 28.649107] Atmel MXT336S 3-004a: [GDC] changed gdc_value Waiting -> Getting
[ 28.803631] Atmel MXT336S 3-004a: [GDC] changed gdc_value Getting -> Aquired
[ 29.215382] Atmel MXT336S 3-004a: [GDC] changed gdc_value Aquired -> Finish
[ 39.948206] NOHZ: local_softirq_pending 08
[ 40.158003] NOHZ: local_softirq_pending 08
[ 40.170151] NOHZ: local_softirq_pending 08
[ 40.180314] NOHZ: local_softirq_pending 08
[ 40.300228] NOHZ: local_softirq_pending 08
[ 40.338593] NOHZ: local_softirq_pending 08
[ 40.478681] NOHZ: local_softirq_pending 08
[ 41.278681] NOHZ: local_softirq_pending 08
[ 41.662627] NOHZ: local_softirq_pending 08
[ 41.808057] NOHZ: local_softirq_pending 08
[ 98.966976] [CAMERA][cameraflash_file_cmd_store:1715] [value::1]
[ 98.972226] [CAMERA][MIC2871YMK_set_flash:1575] [teddy][Torch flash]ON
[ 100.315550] [CAMERA][cameraflash_file_cmd_store:1715] [value::0]
[ 100.321043] [CAMERA][MIC2871YMK_set_flash:1571] [teddy][Torch flash]OFF
[ 110.878345] mdp4_dsi_video_wait4vsync timeout ret=0
[ 110.919639] dtv_pipe is not configured yet
[ 112.513566] tsu6721 15-0025: dev1: 0x0, dev2: 0x0, dev3: 0x0, ADC: 0x1f JigFF
[ 113.363985] tsu6721 15-0025: dev1: 0x0, dev2: 0x0, dev3: 0x0, ADC: 0x1f JigFF
[ 122.870624] tsu6721 15-0025: dev1: 0x4, dev2: 0x0, dev3: 0x2, ADC: 0x1f JigFF
[ 122.870929] pm_chg_usb_trim: trim_orig 61 write 0x47 index=2 value 0xa to USB_OVP_TRIM
[ 122.870959] pm8921_set_max_battery_charge_current: pm8921_set_max_battery_charge_current (475mA)--------
[ 122.871783] power_supply usb: driver failed to report `health' property: 4294967274
[ 122.979063] tsu6721 15-0025: dev1: 0x4, dev2: 0x0, dev3: 0x2, ADC: 0x1f JigFF
[ 122.979246] pm_batt_power_set_property: Same cable type, no need to change
[ 123.042972] get_prop_batt_status: get_prop_batt_status: Not enough charging SOC:49,3810mV
[ 123.232595] accel_open_calibration: Can't open calibration file
[ 123.534961] [mdnie lite] is negative Mode On = 0
[ 123.539661] [mdnie lite] negative off when resume, tuning again!
[ 123.544697] [mdnie lite] mDNIe_Set_Mode start , mode(0), background(1)
[ 123.551258] [mdnie lite] = UI MODE =
[ 123.554829] [mdnie lite] = STANDARD MODE =
[ 123.559041] [mdnie lite] send tuning cmd!!
[ 123.584953] [mdnie lite] mDNIe_Set_Mode end , mode(0), background(1)
[ 123.699923] tc360 16-0020: no button press interrupt(0x0)
[ 123.887532] Atmel MXT336S 3-004a: 555clear_cover_enable = 0
[ 123.903799] Atmel MXT336S 3-004a: [GDC] changed gdc_value Finish -> Aquired
[ 124.331573] Atmel MXT336S 3-004a: [GDC] changed gdc_value Aquired -> Finish
[ 244.310941] pm_chg_usb_trim: trim_orig 61 write 0x3d index=0 value 0x0 to USB_OVP_TRIM
[ 244.318357] power_supply usb: driver failed to report `health' property: 4294967274
[ 244.327147] pm_batt_power_set_property: Same cable type, no need to change
[ 244.336975] power_supply usb: driver failed to report `health' property: 4294967274
[ 244.579124] Atmel MXT336S 3-004a: 555clear_cover_enable = 0
[ 244.595605] Atmel MXT336S 3-004a: [GDC] changed gdc_value Finish -> Aquired
[ 244.954402] Atmel MXT336S 3-004a: [GDC] changed gdc_value Aquired -> Finish
[ 245.347932] power_supply usb: driver failed to report `health' property: 4294967274
[ 304.627163] ------------[ cut here ]------------
[ 304.630825] kernel BUG at /opt/jenkins/android/workspace/android/jellybean/kernel/samsung/msm8930-common/fs/ext4/indirect.c:666!
[ 304.642392] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM
[ 304.648222] Modules linked in: adsprpc
[ 304.651915] CPU: 1 Tainted: G W (3.4.0-cyanogenmod-g55208d9 #1)
[ 304.659087] PC is at ext4_ind_map_blocks+0x98/0x5d4
[ 304.663879] LR is at ext4_map_blocks+0x54/0x328
[ 304.668396] pc : [<c01ade70>] lr : [<c017cf4c>] psr: 00000013
[ 304.668396] sp : df58dc90 ip : 00000000 fp : dee12e68
[ 304.679841] r10: df58ddb0 r9 : 00000000 r8 : 00000001
[ 304.685121] r7 : 00001121 r6 : 00000000 r5 : 00000000 r4 : df58ddb0
[ 304.691561] r3 : 00080000 r2 : df58ddb0 r1 : dee12e68 r0 : 00000000
[ 304.698122] Flags: nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment kernel
[ 304.705447] Control: 10c5787d Table: 9dc6c06a DAC: 00000015
[ 304.711094]
[ 304.711094] PC: 0xc01addf0:
[ 304.715397] ddf0 e1a0b001 e592800c e58d302c e3a03000 e1a0a002 e58d3030 e58d3034 e1a00000
[ 304.723515] de10 ea000013 e58d6000 e1a03008 e514c008 e5140004 e1a0100b e1a02007 e12fff3c
[ 304.731664] de30 e4943008 e3530000 1afffff5 e1a0000d e3c02d7f e3c2203f e5923004 e2433001
[ 304.739813] de50 e5823004 e5923000 e3130002 0a000000 eb1565aa e51b3034 e3130702 0a000000
[ 304.747993] de70 e7f001f2 e3550000 1a000002 e3160001 0a000000 e7f001f2 e1a0000b e59a1008
[ 304.756142] de90 e28d2038 e28d3030 ebfffc34 e3500000 e58d0024 1a000005 e59a7008 e1ca40d0
[ 304.764291] deb0 e59a800c e59da02c e1a00000 ea000111 e28d302c e1a0000b e59d1024 e28d2038
[ 304.772470] ded0 e58d3000 e28d3048 ebfffd71 e2504000 1a00001f e59d1024 e3a0200c e28d0078
[ 304.780619]
[ 304.780619] LR: 0xc017cecc:
[ 304.784922] cecc 12844008 1affff94 eaffff9c e28dd018 e8bd8fd0 c0918c62 c0721a54 c0918cf8
[ 304.793041] ceec c091439b c0ac11dc c0b7e3c0 e92d4ff0 e1a07003 e3a03000 e2418010 e1a05001
[ 304.801190] cf0c e1a09000 e5823010 e1a00008 e24dd05c e1a04002 eb1626de e5153034 e1a00009
[ 304.809369] cf2c e1a01005 e1a02004 e3130702 e2073080 0a000001 eb0087d7 ea000000 eb00c3a2
[ 304.817518] cf4c e1a0a000 e1a00008 ebfc4683 e35a0000 ca000002 e3170001 1a000012 ea0000a3
[ 304.825667] cf6c e5943010 e3130020 0afffff9 e595301c e594200c e58d2000 e59301e8 e1c420d0
[ 304.833847] cf8c eb00b749 e3500000 1afffff1 e1a00005 e30011ef e1a02004 eb160ca2 e3500000
[ 304.841995] cfac 1a000099 eaffffea e35a0000 da000002 e5943010 e3130020 1a00008c e5943010
[ 304.850144]
[ 304.850144] SP: 0xdf58dc10:
[ 304.854417] dc10 00011200 df58dc38 c008a538 00011210 c0ac9c00 00000001 c0ac0ff8 c18d62a8
[ 304.862566] dc30 c18d9540 c01ade74 00000013 c000de14 00000000 c000dba8 00000000 dee12e68
[ 304.870715] dc50 df58ddb0 00080000 df58ddb0 00000000 00000000 00001121 00000001 00000000
[ 304.878895] dc70 df58ddb0 dee12e68 00000000 df58dc90 c017cf4c c01ade70 00000013 ffffffff
[ 304.887044] dc90 00000000 00000000 00000000 d87d0c40 00000400 000007fc 00000000 00000000
[ 304.895193] dcb0 00000000 00000000 00000001 fffffffb 00000000 00000000 00000000 00000000
[ 304.903372] dcd0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 304.911521] dcf0 00000000 00000000 c0b7804c df58ddb0 dee12e58 c0707f00 00000001 df58ddb0
[ 304.919700]
[ 304.919700] FP: 0xdee12de8:
[ 304.923943] 2de8 00000000 00000000 0000542f 00000351 00000000 00000000 00000000 00000000
[ 304.932092] 2e08 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 304.940271] 2e28 00000000 00000000 00000000 00080000 00000000 00000000 dee12e40 dee12e40
[ 304.948420] 2e48 dee12e48 dee12e48 0542f000 00000000 00000001 22432243 dee12e60 dee12e60
[ 304.956569] 2e68 00008180 00000000 00000000 00000000 ffffffff ffffffff c0721880 df9fd800
[ 304.964748] 2e88 dee12f38 df4763c0 00000008 00000001 00000000 00000000 00000000 00000000
[ 304.972897] 2ea8 00000000 00000000 00000000 00190019 00000000 00000000 0002a178 00000000
[ 304.981046] 2ec8 0542f000 00000000 00000000 00000000 00000001 00000000 dee12ee0 dee12ee0
[ 304.989226]
[ 304.989226] R1: 0xdee12de8:
[ 304.993468] 2de8 00000000 00000000 0000542f 00000351 00000000 00000000 00000000 00000000
[ 305.001617] 2e08 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 305.009797] 2e28 00000000 00000000 00000000 00080000 00000000 00000000 dee12e40 dee12e40
[ 305.017945] 2e48 dee12e48 dee12e48 0542f000 00000000 00000001 22432243 dee12e60 dee12e60
[ 305.026125] 2e68 00008180 00000000 00000000 00000000 ffffffff ffffffff c0721880 df9fd800
[ 305.034274] 2e88 dee12f38 df4763c0 00000008 00000001 00000000 00000000 00000000 00000000
[ 305.042423] 2ea8 00000000 00000000 00000000 00190019 00000000 00000000 0002a178 00000000
[ 305.050602] 2ec8 0542f000 00000000 00000000 00000000 00000001 00000000 dee12ee0 dee12ee0
[ 305.058751]
[ 305.058751] R2: 0xdf58dd30:
[ 305.062994] dd30 c18df9a0 00000000 00000002 00000046 c0a8b540 df29a6c0 00000000 d7675d80
[ 305.071173] dd50 00000000 00000000 0000003e 0000003e 00000000 00000002 ddf62000 c0ac882c
[ 305.079322] dd70 c0a88280 c0018244 c00091a0 fffffffe c0ac9c00 00000001 c0ac0ff8 00000000
[ 305.087471] dd90 00000000 df58ddf0 00000000 dee12e68 25bd5a1d 00000000 00000000 c017f040
[ 305.095650] ddb0 00000000 00000000 00001121 00000001 00000000 d7675d80 00000000 00000000
[ 305.103799] ddd0 dee12e68 dee12f38 00001121 25bd5a1d df9fd400 c014a1dc df58ddf0 00000000
[ 305.111948] ddf0 00000000 00000000 00000001 00000000 00000000 00000000 00001000 00000001
[ 305.120128] de10 000001dd 00000001 00000000 00000001 00000000 00000000 00000000 d87d0c40
[ 305.128277]
[ 305.128277] R4: 0xdf58dd30:
[ 305.132580] dd30 c18df9a0 00000000 00000002 00000046 c0a8b540 df29a6c0 00000000 d7675d80
[ 305.140698] dd50 00000000 00000000 0000003e 0000003e 00000000 00000002 ddf62000 c0ac882c
[ 305.148847] dd70 c0a88280 c0018244 c00091a0 fffffffe c0ac9c00 00000001 c0ac0ff8 00000000
[ 305.157027] dd90 00000000 df58ddf0 00000000 dee12e68 25bd5a1d 00000000 00000000 c017f040
[ 305.165176] ddb0 00000000 00000000 00001121 00000001 00000000 d7675d80 00000000 00000000
[ 305.173325] ddd0 dee12e68 dee12f38 00001121 25bd5a1d df9fd400 c014a1dc df58ddf0 00000000
[ 305.181504] ddf0 00000000 00000000 00000001 00000000 00000000 00000000 00001000 00000001
[ 305.189653] de10 000001dd 00000001 00000000 00000001 00000000 00000000 00000000 d87d0c40
[ 305.197802]
[ 305.197802] R10: 0xdf58dd30:
[ 305.202136] dd30 c18df9a0 00000000 00000002 00000046 c0a8b540 df29a6c0 00000000 d7675d80
[ 305.210315] dd50 00000000 00000000 0000003e 0000003e 00000000 00000002 ddf62000 c0ac882c
[ 305.218464] dd70 c0a88280 c0018244 c00091a0 fffffffe c0ac9c00 00000001 c0ac0ff8 00000000
[ 305.226613] dd90 00000000 df58ddf0 00000000 dee12e68 25bd5a1d 00000000 00000000 c017f040
[ 305.234793] ddb0 00000000 00000000 00001121 00000001 00000000 d7675d80 00000000 00000000
[ 305.242942] ddd0 dee12e68 dee12f38 00001121 25bd5a1d df9fd400 c014a1dc df58ddf0 00000000
[ 305.251121] ddf0 00000000 00000000 00000001 00000000 00000000 00000000 00001000 00000001
[ 305.259270] de10 000001dd 00000001 00000000 00000001 00000000 00000000 00000000 d87d0c40
[ 305.267419] Process jbd2/mmcblk0p24 (pid: 143, stack limit = 0xdf58c2f0)
[ 305.274103] Stack: (0xdf58dc90 to 0xdf58e000)
[ 305.278498] dc80: 00000000 00000000 00000000 d87d0c40
[ 305.286616] dca0: 00000400 000007fc 00000000 00000000 00000000 00000000 00000001 fffffffb
[ 305.294826] dcc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[ 305.302975] dce0: 00000000 00000000 00000000 00000000 00000000 00000000 c0b7804c df58ddb0
[ 305.311094] dd00: dee12e58 c0707f00 00000001 df58ddb0 dee12e68 df58ddf0 00000000 dee12e58
[ 305.319304] dd20: 00000000 00000000 00000000 c017cf4c c18df9a0 00000000 00000002 00000046
[ 305.327453] dd40: c0a8b540 df29a6c0 00000000 d7675d80 00000000 00000000 0000003e 0000003e
[ 305.335632] dd60: 00000000 00000002 ddf62000 c0ac882c c0a88280 c0018244 c00091a0 fffffffe
[ 305.343720] dd80: c0ac9c00 00000001 c0ac0ff8 00000000 00000000 df58ddf0 00000000 dee12e68
[ 305.351960] dda0: 25bd5a1d 00000000 00000000 c017f040 00000000 00000000 00001121 00000001
[ 305.360109] ddc0: 00000000 d7675d80 00000000 00000000 dee12e68 dee12f38 00001121 25bd5a1d
[ 305.368258] dde0: df9fd400 c014a1dc df58ddf0 00000000 00000000 00000000 00000001 00000000
[ 305.376377] de00: 00000000 00000000 00001000 00000001 000001dd 00000001 00000000 00000001
[ 305.384587] de20: 00000000 00000000 00000000 d87d0c40 000001dd 00001121 00000000 c017c53c
[ 305.392736] de40: c017f10c c017c4d0 54dd1ed1 df9fd400 df9fd400 df58de80 00001121 c0137eb4
[ 305.400854] de60: 00000000 c01ba348 df9fd600 df58df04 ffffffff c01ba864 00000000 df9fd43c
[ 305.409064] de80: 60000013 00000001 00000003 54dd1ed1 deeaf240 c01b3c14 54dd1ed1 25bd5a1d
[ 305.417213] dea0: df58df04 df9fd400 deeaf240 df9fd600 00100100 00000000 00000000 00000000
[ 305.425392] dec0: 00000000 c01b48dc 00000002 00000000 c0a8b540 df29a6c0 df9fd414 00000000
[ 305.433480] dee0: ffffffff deeaf274 00000008 df6b6000 ed3dde28 00000046 ed3dde28 00000046
[ 305.441690] df00: c0a88280 00000000 00000fc5 00006e1b 00000000 c008f1c4 ffffffff ddf62000
[ 305.449870] df20: 00000000 00000000 00000000 00000000 000001ce 00000002 00000000 00000000
[ 305.458019] df40: 91827364 df58df44 df58df44 df58df4c df58df4c 00000000 00000000 df9fd634
[ 305.466137] df60: df9fd414 df9fd46c df9fd454 df9fd400 df9fd414 df9fd46c df9fd454 df9fd634
[ 305.474347] df80: df58dfa0 c0c368e0 00000000 c01b84d4 c0ac0ff8 00000000 dea60340 c008a538
[ 305.482496] dfa0: df58dfa0 df58dfa0 df58dfcc df3a7d38 df9fd400 c01b842c 00000013 00000000
[ 305.490614] dfc0: 00000000 00000000 00000000 c0089d9c 00000000 df9fd400 00000000 00000000
[ 305.498824] dfe0: df58dfe0 df58dfe0 df3a7d38 c0089d18 c000e9e4 c000e9e4 00000000 00000000
[ 305.507004] [<c01ade70>] (ext4_ind_map_blocks+0x98/0x5d4) from [<c017cf4c>] (ext4_map_blocks+0x54/0x328)
[ 305.516435] [<c017cf4c>] (ext4_map_blocks+0x54/0x328) from [<c017f040>] (_ext4_get_block+0x9c/0x128)
[ 305.525560] [<c017f040>] (_ext4_get_block+0x9c/0x128) from [<c014a1dc>] (generic_block_bmap+0x44/0x54)
[ 305.534808] [<c014a1dc>] (generic_block_bmap+0x44/0x54) from [<c017c53c>] (ext4_bmap+0x6c/0xd8)
[ 305.543537] [<c017c53c>] (ext4_bmap+0x6c/0xd8) from [<c0137eb4>] (bmap+0x1c/0x3c)
[ 305.550984] [<c0137eb4>] (bmap+0x1c/0x3c) from [<c01ba348>] (jbd2_journal_bmap+0x28/0x98)
[ 305.559163] [<c01ba348>] (jbd2_journal_bmap+0x28/0x98) from [<c01ba864>] (jbd2_journal_get_descriptor_buffer+0x14/0x94)
[ 305.569906] [<c01ba864>] (jbd2_journal_get_descriptor_buffer+0x14/0x94) from [<c01b3c14>] (journal_submit_commit_record+0x3c/0x148)
[ 305.581718] [<c01b3c14>] (journal_submit_commit_record+0x3c/0x148) from [<c01b48dc>] (jbd2_journal_commit_transaction+0xb88/0x15e4)
[ 305.593529] [<c01b48dc>] (jbd2_journal_commit_transaction+0xb88/0x15e4) from [<c01b84d4>] (kjournald2+0xa8/0x250)
[ 305.603784] [<c01b84d4>] (kjournald2+0xa8/0x250) from [<c0089d9c>] (kthread+0x84/0x94)
[ 305.611628] [<c0089d9c>] (kthread+0x84/0x94) from [<c000e9e4>] (kernel_thread_exit+0x0/0x8)
[ 305.619990] Code: eb1565aa e51b3034 e3130702 0a000000 (e7f001f2)
[ 305.633419] ---[ end trace ba378b7bc393a79a ]---
[ 305.637112] Kernel panic - not syncing: Fatal exception
[ 305.642270] CPU0: stopping
[ 305.645017] [<c00133e4>] (unwind_backtrace+0x0/0xe0) from [<c00127e0>] (handle_IPI+0x100/0x1cc)
[ 305.653654] [<c00127e0>] (handle_IPI+0x100/0x1cc) from [<c0008684>] (gic_handle_irq+0x10c/0x128)
[ 305.662444] [<c0008684>] (gic_handle_irq+0x10c/0x128) from [<c000dcbc>] (__irq_usr+0x3c/0x60)
[ 305.670959] Exception stack(0xd6efbfb0 to 0xd6efbff8)
[ 305.675934] bfa0: 41f94210 59e82dd8 00000002 59e82dd9
[ 305.684144] bfc0: 41f9a63c 41f9a638 41f94210 00000001 00000008 1dcd64ff 41dec104 00000001
[ 305.692324] bfe0: 0000001d bed11ea0 40956f91 40956a00 00000030 ffffffff
[ 305.799114] Rebooting in 5 seconds..
[ 310.809461] Going down for restart now
[ 310.812421] msm_restart : clear reset flag
No errors detected

Question about the boot security of this device

Things have become more and more unclear for me regarding the nature of the boot process of many smartphones. Sometimes people misinterpret what I'm asking. Sometimes people only have vague knowledge of a particular smartphone's hardware-based restrictions or if it has any to begin with. In light of this, I will try to phrase this post as clearly as I can.
I remember reading that the bootloader from the Nexus 4 was able to work on the LG Optimus G, allowing arbitrary kernels to be loaded. I cannot remember if it was in an article by someone reporting on the hack or in a post by the developer of the hack. It was never specified if it was the first-stage bootloader. Assuming that it was the first-stage bootloader, then this would lead me to believe that the boot ROM, the immutable mask ROM that is part of most processors used in smartphones, on the LG Optimus G will load arbitrary (i.e., unsigned or signed with different private key) code. In other words, it leads me to believe that I can modify the LG Optimus G's official bootloader and it would not be rejected (at least by the processor).
Is this the case with the LG G4? Is the first-stage bootloader verified by the phone's processor on startup? Does anyone know the configuration of the fuses on the processor that it uses (assuming it has any)?
Anyone?
I thing same you
If we are may be flash bootloader H815 or G4 tmobile , my devices will unlock bootloader easy
Anyone at all?
Hello Master Melab.
I myself have almost zero Android dev knowledge but digging through this stuff as well. I learned some from http://newandroidbook.com/Articles/aboot.html
The boot process is like this: -> BootROM+SBL+radios->android bootloader -> kernel image + zRam (something like initramfs) -> init (services, shell, that zygote crap, dalvik/art vm, etc)
Reason I am trying to pick it up is learn more in the hopes that someway we can unlock the bootloader of the LG G4 whatever version.
Am running on an LG G4 H815 TWN (Taiwan carrier-free) and LG does not want to generate unlock.bin for me.
I found the root method via patching and flashing back modified bootimage, dumped in busybox started.
You are into crypto from your sig?
Below is the dump (hex) from the aboot of my H815 TWN - v10e Lollipop.
I just see random hex that is so making me rage... yep numbers make me angry
See if you can find any patterns/logic to this madness - so much fluff(guessing part of it is the signed stuff) in the beginning and right at the end, the ARM eaXXX instructions start (real beginning of the boot binary).
[email protected]:/mnt/shell/emulated/0 # dd if=/dev/block/platform/f9824900.sdhci/by-name/aboot of=./aboot.img <
4096+0 records in
4096+0 records out
2097152 bytes transferred in 0.110 secs (19065018 bytes/sec)
Click to expand...
Click to collapse
[email protected]:/mnt/shell/emulated/0 # od -A d -t x4 aboot.img |head -n 260 <
0000000 464c457f 00010101 00000000 00000000
0000016 00280002 00000001 0f900000 00000034
0000032 00000000 05000002 00200034 00280004
0000048 00000000 00000000 00000000 00000000
0000064 00000000 000000b4 00000000 07000000
0000080 00000000 00000000 00001000 0f976000
0000096 0f976000 000019a8 00002000 02200000
0000112 00001000 70000001 0007d808 0f975808
0000128 0f975808 00000020 00000020 00000004
0000144 00000004 00000001 00008000 0f900000
0000160 0f900000 00088de4 0009b488 00000007
0000176 00008000 00000000 00000000 00000000
0000192 00000000 00000000 00000000 00000000
*
0004096 00000000 00000003 00000000 0f976028
0004112 00001980 00000080 0f9760a8 00000100
0004128 0f9761a8 00001800 4dce3793 7d266b40
0004144 779a699b 8408c755 a7477930 07c072f1
0004160 ebc41fe2 9b9ecd06 00000000 00000000
0004176 00000000 00000000 00000000 00000000
0004192 00000000 00000000 26539b59 96228a1c
0004208 da200345 56d38638 3f7dd8fa 185f3113
0004224 d47b92fe ba05c846 ac538614 a03aaad3
0004240 e30c7d84 2203ad28 c7eea155 e3c724e4
0004256 619b56c6 45f8c1d9 a35ca403 03030704
0004272 1fc48d64 63d1aed7 f7a34348 77a65a8d
0004288 dabf1ea9 30501706 4e7d9ec0 dc8c205b
0004304 5e4b1fff ebb9ceff ff3664a5 b7cc3348
0004320 bb2ff543 6946392b b3bf5170 627fe97e
0004336 90fdb1f0 f6e029c3 3d588648 da6e01f8
0004352 d4b58268 4c12b41f 69a1b72b eaead5b2
0004368 f8aef7a1 4213aa6f ac0e89af 39ff4939
0004384 504df1e5 6cdf6e8f a3238cb5 27508741
0004400 cb6a46ce 863f72c6 dbab25c8 caeca06f
0004416 0a722955 b389ba04 20065795 30bbaf1b
0004432 d9a41c68 613e6846 d145c6e3 5818663b
0004448 86b855ef 005d289f e459cb53 3b6bca4a
0004464 8eea151e 73c3a904 33d1c525 406304b4
0004480 4e999179 8ee19a57 d25f5c68 55705e28
0004496 637f41b6 bab91985 c0215212 d9648784
0004512 51048ec6 62c361e9 12058230 fa038230
0004528 010203a0 0d030202 0d302f95 862a0906
0004544 0df78648 050b0101 81813000 19301b31
0004560 04550306 4c121303 61204547 73657474
0004576 69746174 43206e6f 30233141 55030621
0004592 1a130b04 656e6547 206c6172 2045474c
0004608 65747461 74617473 206e6f69 0c314143
0004624 03060a30 130a0455 45474c03 10301231
0004640 04550306 47091307 434d5545 4e4f4548
0004656 0c300e31 04550306 53051308 4c554f45
0004672 09300b31 04550306 4b021306 171e3052
0004688 3135310d 30373131 34343232 0d175a32
0004704 31313533 32303331 32343432 0182305a
0004720 30163150 55030614 0d130304 6f61687a
0004736 676e6566 6e61792e 30203167 5503061e
0004752 17130b04 656e6547 206c6172 2045474c
0004768 65747461 74617473 316e6f69 060a300c
0004784 0a045503 474c0313 30123145 55030610
0004800 09130704 4d554547 4f454843 300e314e
0004816 5503060c 05130804 554f4553 300b314c
0004832 55030609 02130604 1731524b 03061530
0004848 130b0455 2037300e 31303030 41485320
0004864 31363532 06173019 0b045503 3630100c
0004880 30303020 4f4d2030 5f4c4544 1c314449
0004896 03061a30 0c0b0455 20353013 30303030
0004912 38613030 5f575320 455a4953 15301731
0004928 04550306 300e0c0b 30302034 4f203133
0004944 495f4d45 30223144 55030620 19130b04
0004960 30203330 30303030 30303030 30303030
0004976 20323030 55424544 30223147 55030620
0004992 190c0b04 30203230 39363930 30314530
0005008 30313330 20303030 495f5748 30223144
0005024 55030620 190c0b04 30203130 30303030
0005040 30303030 30303030 20393030 495f5753
0005056 01823044 060d3022 48862a09 010df786
0005072 00050101 0f018203 01823000 0182020a
0005088 558b0001 c1184fa0 30084f74 d5170a05
0005104 f8f21578 85020ac7 8af5b59e 1651faa1
0005120 48ff1748 1eed55ba c575a0b4 3c3bb75c
0005136 6eddee82 b262b501 30925fc9 0cb77313
0005152 ec539932 cf2b71be a1399ac6 b6caa2ab
0005168 40d27314 98d03cf5 7826f5e6 99433bd1
0005184 97cfeb2b 5fe4f6ae 9c451d52 d80d2784
0005200 fa01108e cab53257 22b71266 e1411ce4
0005216 5ce1e123 c74de085 6d35d211 294229e3
0005232 256e3d8e 79ac9c96 d605aa75 90ef863e
0005248 0ec6dca2 fd13780e 15ce6859 329779a2
0005264 d381577d 2aa0bd4f 081eeb14 5ef564f9
0005280 4df2d097 11c9fa31 bb6b9106 f41200fc
0005296 3dc0ec81 820cc0f5 1c327c89 9a82592f
0005312 da220951 0668fbdd 7e4f0b36 2c866b7c
0005328 7ff4e576 bf0d8849 66aa6e81 7cea79b8
0005344 0302e91b a3010001 8130c081 9c8130bd
0005360 1d550306 94810423 80918130 f2b79f14
0005376 89e9d921 58da1681 169dec47 aac73b73
0005392 a476a1b1 31723074 06123014 03045503
0005408 474c0b13 4f522045 4320544f 301b3141
0005424 55030619 12130b04 656e6547 206c6172
0005440 2045474c 746f6f72 0c316163 03060a30
0005456 130a0455 45474c03 10301231 04550306
0005472 47091307 434d5545 4e4f4548 0c300e31
0005488 04550306 53051308 4c554f45 09300b31
0005504 04550306 4b021306 05018252 03060c30
0005520 01131d55 0204ff01 0e300030 1d550306
0005536 ff01010f 02030404 0d30f004 862a0906
0005552 0df78648 050b0101 01820300 f3340001
0005568 60064bb4 1c6f6f85 a7348105 f155462d
0005584 0ba8a8be e0b64772 bcf8c135 a6f147e8
0005600 79b22b66 2a9ade5a b1ae9aff b6fc0b9b
0005616 2f843340 decfa200 b3e0313e 2cec5820
0005632 7b1c3dfa f2102bfb b00499a4 4bfd8c07
0005648 11844799 7f9a16fc 3b4bbaed 76fd2436
0005664 df2a0168 adfb34c2 a8824431 dadabbbb
0005680 52025923 2fa251bd 2d44a13b 996a3824
0005696 81ba7f76 808c8a8a eb0dd21a 110c49e4
0005712 dcade241 db412d59 541bc959 0227ce08
0005728 81dbed2e ba88015b c5cb5195 1e802308
0005744 5fb54a4f d36a2bfa 1c4f88da d86cf99f
0005760 154f7a65 3db33d80 6bd19fde 04806598
0005776 af1cd4b7 25873324 809a4abf b45c7306
0005792 dd1ad455 59625cf6 53434f4c 7e990137
0005808 2bdd1d16 83629435 9dd634aa 82304cc3
0005824 82305304 03a03b03 02020102 0d300501
0005840 862a0906 0df78648 050b0101 31723000
0005856 06123014 03045503 474c0b13 4f522045
0005872 4320544f 301b3141 55030619 12130b04
0005888 656e6547 206c6172 2045474c 746f6f72
0005904 0c316163 03060a30 130a0455 45474c03
0005920 10301231 04550306 47091307 434d5545
0005936 4e4f4548 0c300e31 04550306 53051308
0005952 4c554f45 09300b31 04550306 4b021306
0005968 171e3052 3034310d 30303339 34363230
0005984 0d175a30 39303433 30303532 30343632
0006000 8181305a 19301b31 04550306 4c121303
0006016 61204547 73657474 69746174 43206e6f
0006032 30233141 55030621 1a130b04 656e6547
0006048 206c6172 2045474c 65747461 74617473
0006064 206e6f69 0c314143 03060a30 130a0455
0006080 45474c03 10301231 04550306 47091307
0006096 434d5545 4e4f4548 0c300e31 04550306
0006112 53051308 4c554f45 09300b31 04550306
0006128 4b021306 01823052 060d3020 48862a09
0006144 010df786 00050101 0d018203 01823000
0006160 01820208 b5bc0001 74fc08d7 f29875a8
0006176 68944d14 8ee10453 48b29679 d715b100
0006192 7f51d49e 46bd5da2 be1faa16 b28677fb
0006208 d179bd23 67f1d599 fdef4a5a e18dd04c
0006224 483ef50b 25bb4f5d 052b8d88 65f4adcf
0006240 5e8f7535 4cda563c 648db91c b2eb9704
0006256 a3dd3121 c11f5771 2d5be4bf 3fa08747
0006272 5194b92e c4ffb4e1 5b747270 a5c87aff
0006288 941b985d f4c9a03d 9398c233 f8654a14
0006304 c5109d2a 493c1b7a ba202f25 bba102c1
0006320 d3d32105 c02d0b9b 337789dd 83e44f35
0006336 9e47120a 91d13f9c 0c25fb88 cb8d5fef
0006352 596b4681 d32da104 05832736 60f42f7a
0006368 4dbc2836 658cb765 8c151dce 275c51af
0006384 9a4c505e 71d1ed9c c11a89eb 75e4d97d
0006400 639b4b6f 5d327d2d de2e53b1 f12a014a
0006416 b4d5eed7 01026714 e581a303 30e28130
0006432 03069c81 04231d55 81309481 8e148091
0006448 073d1095 26fe008b e58a027f b40c77b8
0006464 a13ad8f3 3074a476 30143172 55030612
0006480 0b130304 2045474c 544f4f52 31414320
0006496 0619301b 0b045503 65471213 6172656e
0006512 474c206c 6f722045 6163746f 0a300c31
0006528 04550306 4c03130a 12314547 03061030
0006544 13070455 55454709 4548434d 0e314e4f
0006560 03060c30 13080455 4f455305 0b314c55
0006576 03060930 13060455 82524b02 1d300101
0006592 1d550306 0416040e f2b79f14 89e9d921
0006608 58da1681 169dec47 aac73b73 061230b1
0006624 131d5503 04ff0101 01063008 0102ff01
0006640 060e3000 0f1d5503 04ff0101 01020304
0006656 060d3006 48862a09 010df786 00050b01
0006672 01018203 40be6f00 de48db62 a3df9124
0006688 89482f95 02ccd954 efbb9ae4 93ec32c7
0006704 82a24da2 8aef539f f608d9af 190482d4
0006720 e3ff7116 b6d76d4c 2cdedf8e 283c021f
0006736 5101fbbe 0ed0fa5c 62c4d961 917b3b36
0006752 85c94bb3 787333bc 33404b52 7254d4de
0006768 82f3b85c 6fbdb650 fbbe5fde 17e6dcb8
0006784 1ea87112 6bbb8a76 17a8ed71 61d282e4
0006800 cc15cbe9 4068898f 5c9f06b1 54087ba0
0006816 c00d4831 dcaa301d 6ae47eba c461ae74
0006832 94611f1c dc04b3e8 20244494 215f6ae5
0006848 4136c8e2 0f68bf98 d3159751 cf2b3221
0006864 3429f70e 3a9dc421 f05f3a0e 732b386c
0006880 6bfbb8bf 99960e63 94f92a7b d3779c9f
0006896 24eb3497 2d5d3650 a54e06b2 e1c6a02b
0006912 a6843448 7eeff94f 85f77cbf 4be4eec7
0006928 57be20f1 03823083 0282309f 0203a087
0006944 01020201 060d3001 48862a09 010df786
0006960 00050b01 14317230 03061230 13030455
0006976 45474c0b 4f4f5220 41432054 19301b31
0006992 04550306 4712130b 72656e65 4c206c61
0007008 72204547 63746f6f 300c3161 5503060a
0007024 03130a04 3145474c 06103012 07045503
0007040 45470913 48434d55 314e4f45 060c300e
0007056 08045503 45530513 314c554f 0609300b
0007072 06045503 524b0213 0d171e30 39303431
0007088 30303033 30343632 330d175a 32393034
0007104 32303035 5a303436 14317230 03061230
0007120 13030455 45474c0b 4f4f5220 41432054
0007136 19301b31 04550306 4712130b 72656e65
0007152 4c206c61 72204547 63746f6f 300c3161
0007168 5503060a 03130a04 3145474c 06103012
0007184 07045503 45470913 48434d55 314e4f45
0007200 060c300e 08045503 45530513 314c554f
0007216 0609300b 06045503 524b0213 20018230
0007232 09060d30 8648862a 01010df7 03000501
0007248 000d0182 08018230 01018202 2605bb00
0007264 ee06e780 1e971259 8b4e1d5d 9038c5e4
0007280 0a659df6 64717568 a994bd1c e6a55f97
0007296 af195474 1257c9d1 b3e61d85 98ed97da
0007312 3ebe3ef6 014c0ef2 064731a7 97e4eff9
0007328 39a752eb 12308d75 0de2dca2 9b9bf248
0007344 498cd73e 975645d9 f7031836 8d6ea152
0007360 cb19ef5a e8e61a52 8286c83c 2c71aab1
0007376 f0cf1af6 51ef50bc 0e16d787 5b43df5f
0007392 5394eb0e 06ff63e6 5fc782f2 ea5fde02
0007408 ab908825 cb163af7 0e4a2c3f 7d783b67
0007424 cf710260 6e0d3593 70c80613 91dca12f
0007440 c0b54006 b21be68f 21732ee2 64bd5a2a
0007456 c31cdfe5 38ddd6d4 9d61b67b 5a36af47
0007472 59f7811e c77174f4 166a409a 0ae07886
0007488 9d63962b c74e4bdc 20a8e7ea 0fcfa949
0007504 aebd5a5a e5bea090 989c6d6b 03010221
0007520 403042a3 03061d30 040e1d55 8e140416
0007536 073d1095 26fe008b e58a027f b40c77b8
0007552 303ad8f3 5503060f 0101131d 300504ff
0007568 ff010103 03060e30 010f1d55 0404ff01
0007584 06010203 09060d30 8648862a 01010df7
0007600 0300050b 00010182 395b3a11 da9b813e
0007616 31a9dbcc dbc66acd 24a29f40 41f48985
0007632 d30142ab 2fff3448 08aed94e ef8cb36a
0007648 d138c6d6 2f02ba8a efd83412 58647be8
0007664 0007c5df bc121004 f04384fa 2cca9764
0007680 1b2af619 e70d9c38 bbdd76de b36c98dc
0007696 bb40525a 8684bdf7 9df44bb0 1bfc7020
0007712 129ac6a7 2b4256c0 9eaba15c e1539232
0007728 3ceea60b 900624d7 14858ccd eaf33c35
0007744 aa7a6e38 3b4bc7fb d45b8d31 b9d4bc13
0007760 0e682b52 4f41a202 88394c0c e2069441
0007776 94e8f75e 2b17870a 21f8994f b1d06147
0007792 a64bd28e 19d44612 3326915c 235aec64
0007808 fdd4733b 7eb2b20b 1b711d41 44b6c621
0007824 5c7bf273 c84fb52a 6eee87d8 f61f4430
0007840 b55a8208 815bbec1 59b7c0fa d2d28a60
0007856 5b405c82 0ff491f6 ffffffff ffffffff
0007872 ffffffff ffffffff ffffffff ffffffff
*
0010656 ffffffff ffffffff 00000000 00000000
0010672 00000000 00000000 00000000 00000000
*
0032768 ea000006 ea00a463 ea00a469 ea00a46f
0032784 ea00a475 ea00a47b ea00a47b ea00a492
0032800 ee110f10 e3c00a0b e3c00005 e3c00002
0032816 e3800020 ee010f10 e1a0000f e2400040
0032832 e59f1020 e1500001 0a000009 e59f2018
Click to expand...
Click to collapse
I wanna know if its possible to steal the lg signature and sign our own modified kernals and roms and recovery images. How does flashfire manage to flash exposed and. I have high expectations for flash fire in the development of g4. Like g3 used flasify
29y6145 said:
I thing same you
If we are may be flash bootloader H815 or G4 tmobile , my devices will unlock bootloader easy
Click to expand...
Click to collapse
Really? This cannot be done on a PC?
Anyone? Bueller?
I dont know the exact order of boot. But i know the bootloader does have q fuses which are blown. And the bootloader partition is encrypted 256bit keys.
Even if i could flash a 815 loader. lg the the key to unlock it no one else can unlock them

Redmi 1S strange crash

I'm trying to run a simple test app on a Redmi 1S (model HM 1SW) running stock ROM. The only thing that's been done to is updating it to Miui 9.2.3.0 (Kitkat). The app does absolutely nothing and requires no special permissions - just a hello world test app I wrote after seeing another of my apps also crash the same way.
App was installed using adb over USB. On the phone, Developer Options > Install via USB is enabled (and I have a Mi account). I have installed apps on that device in the past before it was updated to Miui 9.2.3.0 and they worked just fine.
I keep getting the following crash from both my apps as soon as they are launched:
07-05 22:36:40.594 12828-12828/? W/dalvikvm: JNI WARNING: NewStringUTF input is not valid Modified UTF-8: illegal start byte 0xff
string: 'en_Latn_US_�_US'
in Llibcore/icu/ICU;.addLikelySubtagsLjava/lang/StringLjava/lang/String; (NewStringUTF)
07-05 22:36:40.594 12828-12828/? I/dalvikvm: "main" prio=5 tid=1 NATIVE
| group="main" sCount=0 dsCount=0 obj=0x417cce58 self=0x416ec860
| sysTid=12828 nice=0 sched=0/0 cgrp=apps handle=1074737492
| state=R schedstat=( 23951922 9541301 72 ) utm=2 stm=0 core=1
Click to expand...
Click to collapse
Anybody know what this problem is? To me, the exception stack looks like a bug in Miui. But then again, I can install absolutely any app from Play Store and it runs fine. It just seems to be my locally installed apps that see this crash. Any idea what I should change in my apps, if anything, to make them work?
Here's the full exception stack and dump from logcat:
07-05 22:36:40.564 1402-1468/? I/WtProcessController: FOREGROUND INFO: name=com.example.miuitestapp uid=10003 pid=12828 TaskId:16
07-05 22:36:40.594 12828-12828/? W/dalvikvm: JNI WARNING: NewStringUTF input is not valid Modified UTF-8: illegal start byte 0xff
string: 'en_Latn_US_�_US'
in Llibcore/icu/ICU;.addLikelySubtagsLjava/lang/StringLjava/lang/String; (NewStringUTF)
07-05 22:36:40.594 12828-12828/? I/dalvikvm: "main" prio=5 tid=1 NATIVE
| group="main" sCount=0 dsCount=0 obj=0x417cce58 self=0x416ec860
| sysTid=12828 nice=0 sched=0/0 cgrp=apps handle=1074737492
| state=R schedstat=( 23951922 9541301 72 ) utm=2 stm=0 core=1
07-05 22:36:40.614 12828-12828/? I/dalvikvm: #00 pc 0000132e /system/lib/libcorkscrew.so (unwind_backtrace_thread+29)
#01 pc 00063502 /system/lib/libdvm.so (dvmDumpNativeStack(DebugOutputTarget const*, int)+33)
#02 pc 000574e8 /system/lib/libdvm.so (dvmDumpThreadEx(DebugOutputTarget const*, Thread*, bool)+395)
#03 pc 00057556 /system/lib/libdvm.so (dvmDumpThread(Thread*, bool)+25)
#04 pc 0003b65c /system/lib/libdvm.so
#05 pc 0003ca94 /system/lib/libdvm.so
#06 pc 0003ee66 /system/lib/libdvm.so
#07 pc 0001432e /system/lib/libjavacore.so
#08 pc 00014b12 /system/lib/libjavacore.so
#09 pc 0002034c /system/lib/libdvm.so (dvmPlatformInvoke+112)
#10 pc 00050fce /system/lib/libdvm.so (dvmCallJNIMethod(unsigned int const*, JValue*, Method const*, Thread*)+397)
#11 pc 000297e0 /system/lib/libdvm.so
#12 pc 00030c6c /system/lib/libdvm.so (dvmMterpStd(Thread*)+76)
#13 pc 0002e304 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#14 pc 00063714 /system/lib/libdvm.so (dvmInvokeMethod(Object*, Method const*, ArrayObject*, ArrayObject*, ClassObject*, bool)+391)
#15 pc 0006b6c2 /system/lib/libdvm.so
#16 pc 000297e0 /system/lib/libdvm.so
#17 pc 00030c6c /system/lib/libdvm.so (dvmMterpStd(Thread*)+76)
#18 pc 0002e304 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#19 pc 00063430 /system/lib/libdvm.so (dvmCallMethodV(Thread*, Method const*, Object*, bool, JValue*, std::__va_list)+335)
#20 pc 0004cbb6 /system/lib/libdvm.so
#21 pc 0004e4e8 /system/lib/libandroid_runtime.so
#22 pc 0004f216 /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, char const*, bool)+357)
#23 pc 00001062 /system/bin/app_process
#24 pc 0000e4c0 /system/lib/libc.so (__libc_init+47)
at libcore.icu.ICU.addLikelySubtags(Native Method)
07-05 22:36:40.614 355-605/? I/ThermalEngine: Sensor:batt_temp:35500 mC
07-05 22:36:40.614 12828-12828/? I/dalvikvm: at android.text.TextUtils.getLayoutDirectionFromLocale(TextUtils.java:1740)
at android.content.res.Configuration.setLayoutDirection(Configuration.java:1326)
at android.content.res.Configuration.updateFrom(Configuration.java:834)
at android.content.res.Resources.updateConfiguration(Resources.java:1580)
at android.content.res.MiuiResources.updateConfiguration(MiuiResources.java:301)
at android.content.res.Resources.updateConfiguration(Resources.java:1534)
at android.content.res.Resources.<init>(Resources.java:205)
at android.content.res.MiuiResources.<init>(MiuiResources.java:110)
at android.app.ResourcesManager.getTopLevelResources(ResourcesManager.java:202)
at android.app.ActivityThread.getTopLevelResources(ActivityThread.java:1550)
at android.app.LoadedApk.getResources(LoadedApk.java:480)
at android.app.ContextImpl.<init>(ContextImpl.java:2064)
at android.app.ContextImpl.createAppContext(ContextImpl.java:2021)
at android.app.ActivityThread.handleBindApplication(ActivityThread.java:4202)
at android.app.ActivityThread.access$1500(ActivityThread.java:141)
at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1272)
at android.os.Handler.dispatchMessage(Handler.java:102)
at android.os.Looper.loop(Looper.java:136)
at android.app.ActivityThread.main(ActivityThread.java:5052)
at java.lang.reflect.Method.invokeNative(Native Method)
at java.lang.reflect.Method.invoke(Method.java:515)
at com.android.internal.os.ZygoteInit$MethodAndArgsCaller.run(ZygoteInit.java:796)
at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:612)
at dalvik.system.NativeStart.main(Native Method)
07-05 22:36:40.614 12828-12828/? E/dalvikvm: VM aborting
07-05 22:36:40.614 12828-12828/? A/libc: Fatal signal 6 (SIGABRT) at 0x0000321c (code=-6), thread 12828 (eak.miuitestapp)
07-05 22:36:40.714 208-208/? I/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'Xiaomi/armani/armani:4.4.4/KTU84P/V9.2.3.0.KHCMIEK:user/release-keys'
Revision: '0'
pid: 12828, tid: 12828, name: eak.miuitestapp >>> com.example.miuitestapp <<<
signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
07-05 22:36:40.804 208-208/? I/DEBUG: r0 00000000 r1 0000321c r2 00000006 r3 00000000
r4 00000006 r5 00000016 r6 0000321c r7 0000010c
r8 4178f5b0 r9 417903b3 sl 417b2e18 fp 417904af
ip 417903a7 sp be975f58 lr 401101d1 pc 4011f12c cpsr 000f0010
d0 0000000000000000 d1 0000000000000000
d2 0000000000000000 d3 0000000000000000
d4 8000000000000000 d5 5f4a51a95f4a27c9
d6 3e4ccccd002029d0 d7 3f8000003f4ccccd
d8 0000000000000000 d9 0000000000000000
d10 0000000000000000 d11 0000000000000000
d12 0000000000000000 d13 0000000000000000
d14 0000000000000000 d15 0000000000000000
d16 2065766974614e28 d17 0a29646f6874654d
d18 65747379732f2020 d19 696c2f62696c2f6d
d20 64696f72646e6162 d21 656d69746e75725f
d22 646e6128206f732e d23 6e413a3a64696f72
d24 3fc74721cad6b0ed d25 3fc2f112df3e5244
d26 40026bb1bbb55516 d27 4000000000000000
d28 40008df2d49d41f1 d29 3fb0f4a31edab38b
d30 3ff0000000000000 d31 3f4de16b9c24a98f
scr 60000010
backtrace:
07-05 22:36:40.814 208-208/? I/DEBUG: #00 pc 0002212c /system/lib/libc.so (tgkill+12)
#01 pc 000131cd /system/lib/libc.so (pthread_kill+48)
#02 pc 000133e1 /system/lib/libc.so (raise+10)
#03 pc 000120a3 /system/lib/libc.so
#04 pc 000219e0 /system/lib/libc.so (abort+4)
#05 pc 00048b1f /system/lib/libdvm.so (dvmAbort+78)
#06 pc 0003ca95 /system/lib/libdvm.so
#07 pc 0003ee67 /system/lib/libdvm.so
#08 pc 00014331 /system/lib/libjavacore.so
#09 pc 00014b13 /system/lib/libjavacore.so
#10 pc 0002034c /system/lib/libdvm.so (dvmPlatformInvoke+112)
#11 pc 00050fcf /system/lib/libdvm.so (dvmCallJNIMethod(unsigned int const*, JValue*, Method const*, Thread*)+398)
#12 pc 000297e0 /system/lib/libdvm.so
#13 pc 00030c6c /system/lib/libdvm.so (dvmMterpStd(Thread*)+76)
#14 pc 0002e304 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#15 pc 00063715 /system/lib/libdvm.so (dvmInvokeMethod(Object*, Method const*, ArrayObject*, ArrayObject*, ClassObject*, bool)+392)
#16 pc 0006b6c3 /system/lib/libdvm.so
#17 pc 000297e0 /system/lib/libdvm.so
#18 pc 00030c6c /system/lib/libdvm.so (dvmMterpStd(Thread*)+76)
#19 pc 0002e304 /system/lib/libdvm.so (dvmInterpret(Thread*, Method const*, JValue*)+184)
#20 pc 00063431 /system/lib/libdvm.so (dvmCallMethodV(Thread*, Method const*, Object*, bool, JValue*, std::__va_list)+336)
#21 pc 0004cbb7 /system/lib/libdvm.so
#22 pc 0004e4eb /system/lib/libandroid_runtime.so
#23 pc 0004f217 /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, char const*, bool)+358)
#24 pc 00001063 /system/bin/app_process
#25 pc 0000e4c3 /system/lib/libc.so (__libc_init+50)
#26 pc 00000d80 /system/bin/app_process
stack:
be975f18 be9762ac [stack]
be975f1c 417904b0 /system/lib/libdvm.so
be975f20 417903a7 /system/lib/libdvm.so
be975f24 4178f5b0 /system/lib/libdvm.so
be975f28 417903b3 /system/lib/libdvm.so
be975f2c 417b2e18 /system/lib/libdvm.so
be975f30 417904af /system/lib/libdvm.so
be975f34 401235a9 /system/lib/libc.so (snprintf+80)
be975f38 00000000
be975f3c 00000000
be975f40 be975fb4 [stack]
be975f44 00000000
be975f48 00000000
be975f4c 00000000
be975f50 00004000
be975f54 be975fc2 [stack]
#00 be975f58 00000006
be975f5c 00000016
be975f60 0000321c
be975f64 417903a7 /system/lib/libdvm.so
be975f68 417903a7 /system/lib/libdvm.so
be975f6c 401101d1 /system/lib/libc.so (pthread_kill+52)
#01 be975f70 00000006
be975f74 00000000
be975f78 417904b0 /system/lib/libdvm.so
be975f7c 401103e5 /system/lib/libc.so (raise+14)
#02 be975f80 be975f8c [stack]
be975f84 4010f0a7 /system/lib/libc.so
07-05 22:36:40.824 208-208/? I/DEBUG: memory near r1:
000031fc ffffffff ffffffff ffffffff ffffffff
0000320c ffffffff ffffffff ffffffff ffffffff
0000321c ffffffff ffffffff ffffffff ffffffff
0000322c ffffffff ffffffff ffffffff ffffffff
0000323c ffffffff ffffffff ffffffff ffffffff
0000324c ffffffff ffffffff ffffffff ffffffff
0000325c ffffffff ffffffff ffffffff ffffffff
0000326c ffffffff ffffffff ffffffff ffffffff
0000327c ffffffff ffffffff ffffffff ffffffff
0000328c ffffffff ffffffff ffffffff ffffffff
0000329c ffffffff ffffffff ffffffff ffffffff
000032ac ffffffff ffffffff ffffffff ffffffff
000032bc ffffffff ffffffff ffffffff ffffffff
000032cc ffffffff ffffffff ffffffff ffffffff
000032dc ffffffff ffffffff ffffffff ffffffff
000032ec ffffffff ffffffff ffffffff ffffffff
memory near r6:
000031fc ffffffff ffffffff ffffffff ffffffff
0000320c ffffffff ffffffff ffffffff ffffffff
0000321c ffffffff ffffffff ffffffff ffffffff
0000322c ffffffff ffffffff ffffffff ffffffff
0000323c ffffffff ffffffff ffffffff ffffffff
0000324c ffffffff ffffffff ffffffff ffffffff
0000325c ffffffff ffffffff ffffffff ffffffff
0000326c ffffffff ffffffff ffffffff ffffffff
0000327c ffffffff ffffffff ffffffff ffffffff
0000328c ffffffff ffffffff ffffffff ffffffff
0000329c ffffffff ffffffff ffffffff ffffffff
000032ac ffffffff ffffffff ffffffff ffffffff
000032bc ffffffff ffffffff ffffffff ffffffff
000032cc ffffffff ffffffff ffffffff ffffffff
000032dc ffffffff ffffffff ffffffff ffffffff
000032ec ffffffff ffffffff ffffffff ffffffff
memory near r8:
4178f590 3e646c6c 61640000 6b69766c 2e6d762e
4178f5a0 6f6c6c61 61725463 72656b63 0078614d
4178f5b0 766c6164 6d766b69 6e674900 6e69726f
4178f5c0 73252067 73252720 2d2d2027 6e69202d
4178f5d0 696c6176 67490064 69726f6e 2520676e
4178f5e0 25272073 2d202773 6e202d2d 7020746f
4178f5f0 7265776f 20666f20 006f7774 62616e45
4178f600 676e696c 6c6c6120 7420636f 6b636172
4178f610 28207265 65206425 6972746e 202c7365
4178f620 66206425 656d6172 2d2d2073 6425203e
4178f630 74796220 00297365 6f6c6c61 72742063
4178f640 656b6361 6e203a72 6874206f 64616572
4178f650 69614600 2064656c 6f6c6c61 69746163
4178f660 7020676e 746e696f 73207265 00737465
4178f670 73616c63 64252073 2c64252f 74656d20
4178f680 20646f68 252f6425 66202c64 20656c69
memory near r9:
41790390 6e203a47 74616765 20657669 7a69736a
417903a0 25282065 42002973 5a534943 706d6662
417903b0 75007645 6f6e6b6e 63206e77 6b636568
417903c0 726f6620 2074616d 63657073 65696669
417903d0 63252072 28702500 41564e49 2944494c
417903e0 74707600 76004900 004c4500 0070004a
417903f0 004a7045 0045004c 00560062 00707345
41790400 3a494e4a 69616620 2064656c 72617567
41790410 20646564 79706f63 65686320 69206b63
41790420 6552206e 7361656c 72745365 43676e69
41790430 69746972 006c6163 72706145 70614500
41790440 49734500 45007049 63450070 70634500
41790450 61450049 00704949 61007a45 49614500
41790460 6145004c 7a450049 45004c63 73450061
41790470 4e4a0075 66203a49 656c6961 75672064
41790480 65647261 6f632064 63207970 6b636568
memory near sl:
417b2df8 00000000 00000000 00000000 00000000
417b2e08 00000000 00000000 00000000 00000000
417b2e18 416ec338 416ec328 00800000 10000000
417b2e28 06000000 00000000 00000000 3fe80000
417b2e38 00200000 00800000 00004000 00006000
417b2e48 00000001 00000101 00000002 00000001
417b2e58 00000000 00000000 00000000 00000002
417b2e68 00000000 402243a9 402245e1 00000000
417b2e78 40224391 00000000 00000000 416ec6e8
417b2e88 00000000 00000002 00000003 00000001
417b2e98 00000001 00000100 00000100 00000000
417b2ea8 416ec638 00000003 00000000 416ec628
417b2eb8 417bbb68 00000000 00000000 416ecfc0
417b2ec8 50000ec9 58721008 00000000 58b23cd0
417b2ed8 58b23cf0 417bc1e8 417bc2a8 417bc350
417b2ee8 417bc3f8 417bc4a0 417bc548 417bc5f0
memory near fp:
4179048c 6b636568 206e6920 656c6552 53657361
4179049c 6e697274 46545567 72616843 00750073
417904ac 45007345 00730075 3a494e4a 69616620
417904bc 2064656c 72617567 20646564 79706f63
417904cc 65686320 69206b63 6552206e 7361656c
417904dc 72745365 43676e69 73726168 7a704500
417904ec 66634500 63450044 45004666 004a6663
417904fc 49666345 66634500 63450053 45004366
4179050c 00426663 5a666345 66634500 6345004c
4179051c 00440066 00530046 00420043 6345005a
4179052c 66007575 6d634500 006d002e 44664c45
4179053c 664c4500 4c450046 45004a66 0049664c
4179054c 53664c45 664c4500 4c450043 45004266
4179055c 005a664c 4c664c45 664c4500 634c4500
4179056c 45002e6d 002e6d4c 00634c45 49450063
4179057c 4c4c4500 494e4a00 52415720 474e494e
memory near ip:
41790384 4e4a0029 41572049 4e494e52 6e203a47
41790394 74616765 20657669 7a69736a 25282065
417903a4 42002973 5a534943 706d6662 75007645
417903b4 6f6e6b6e 63206e77 6b636568 726f6620
417903c4 2074616d 63657073 65696669 63252072
417903d4 28702500 41564e49 2944494c 74707600
417903e4 76004900 004c4500 0070004a 004a7045
417903f4 0045004c 00560062 00707345 3a494e4a
41790404 69616620 2064656c 72617567 20646564
41790414 79706f63 65686320 69206b63 6552206e
41790424 7361656c 72745365 43676e69 69746972
41790434 006c6163 72706145 70614500 49734500
41790444 45007049 63450070 70634500 61450049
41790454 00704949 61007a45 49614500 6145004c
41790464 7a450049 45004c63 73450061 4e4a0075
41790474 66203a49 656c6961 75672064 65647261
memory near sp:
be975f38 00000000 00000000 be975fb4 00000000
be975f48 00000000 00000000 00004000 be975fc2
be975f58 00000006 00000016 0000321c 417903a7
be975f68 417903a7 401101d1 00000006 00000000
be975f78 417904b0 401103e5 be975f8c 4010f0a7
be975f88 00000000 ffffffdf 401472c4 4014722c
be975f98 00000000 40111c93 417b2e18 417b2e18
be975fa8 be9762ac 4011e9e4 00000000 41737b23
be975fb8 00000000 6c756e28 0000296c 00000000
be975fc8 00000000 00000000 00000000 00000000
be975fd8 00000000 00000000 00000000 00000000
be975fe8 00000000 00000000 00000000 00000000
be975ff8 00000000 00000000 00000000 00000000
be976008 00000000 00000000 00000000 00000000
be976018 00000000 00000000 00000000 00000000
be976028 00000000 00000000 00000000 00000000
code around pc:
4011f10c e8bd00f0 e3700a01 912fff1e e2600000
4011f11c ea006e05 e92d50f0 e3a07f43 ef000000
4011f12c e8bd50f0 e3700a01 912fff1e e2600000
4011f13c ea006dfd e92d50f0 e3a070ee ef000000
4011f14c e8bd50f0 e3700a01 912fff1e e2600000
4011f15c ea006df5 f200429a bf0080b9 f040f891
4011f16c 4001e92d f2c02a04 2a1080a5 8093f2c0
4011f17c f2c02a20 2a408088 ea4fdb7f f1bc1c92
4011f18c dd6c0f0a 0600e92d 0f40f1bc f500dd4a
4011f19c f5016e80 ebae7920 ea4f0e09 ea4f5e4e
4011f1ac f50e5e5e ebbc7e20 dd3b1f9e f04fbfc4
4011f1bc ebd9090a dd35199e 0a0eeb01 0a3ff02a
4011f1cc 1c9eebac bfd245e1 0c09ebac f04f46e1
4011f1dc f8910c00 f891f240 f921f280 f921028d
4011f1ec f8da428d f1b93000 f9000901 f900028d
4011f1fc f10a428d d1ee0a40 0f00f1bc f5bcd02b
code around lr:
401101b0 447b4b13 42b3e010 6a1ed10e 44784811
401101c0 ec4af7fb e9e6f00d 46224631 efa8f00e
401101d0 d00a3001 e00b2400 2b00681b 480ad1eb
401101e0 44782403 ec38f7fb f001e002 6804f9ff
401101f0 f9fcf001 46206005 bf00bd70 0003b206
40110200 0003b1fa 0003b1f2 0003b1ce bf7ef7ff
40110210 4a3e4b3d e92d447b b08b43f0 4606589c
40110220 6823460d 930946a1 f9e0f001 8000f8d0
40110230 d0482d00 f0104628 280ff8f5 d8444604
40110240 ffe4f7ff d1064286 4629200f e8b0f00d
40110250 d03c2800 482ee02e f7fb4478 482deb7c
40110260 e0154478 d11342b0 482b6a06 f7fb4478
40110270 4a2aebf4 46332120 a801447a f96cf013
40110280 a8012101 fc8af01a 46061c42 e011d104
40110290 28006800 e02cd1e6 46294630 f00d4622
401102a0 1c43e8ec d11e4607 f9a0f001 29046801
07-05 22:36:40.904 1402-1468/? I/WtProcessController: Receive am_crash event for pid: 1077 pkg = com.example.miuitestapp
Click to expand...
Click to collapse

Categories

Resources