Can you give me the adb dmesg and adb logcat?
It did work on the XZ2C
I get this message when I try to create dmesg.log:
1|H8266:/ $ adb shell su -c dmesg > dmesg.log
/system/bin/sh: can't create dmesg.log: Read-only file system
Can you give me the adb dmesg and adb logcat?
It did work on the XZ2C
I get this message when I try to create dmesg.log:
1|H8266:/ $ adb shell su -c dmesg > dmesg.log
/system/bin/sh: can't create dmesg.log: Read-only file system
Please either use "adb shell dmesg" or direct the output on your internal storage / sdcard.
127|H8266:/ $ dmesg > /sdcard/dmesg.log
dmesg: klogctl: Permission denied
i have a problem with 11.32, after boot twrp.img, the twrp cannot decrypt my xz2
Your DMESG is completely fine.
Are you sure it is from the freeze?
In your DMESG is a normal system start with google apps.
And if TWRP freeze I additionally need the /tmp/recovery.log file.
I don't know if my phone is special or something, but su and pull doesn't works for me.
H8266:/ $ pull /tmp/recovery.log > /sdcard/recovery.log
/system/bin/sh: pull: not found
127|H8266:/ $ su pull /tmp/recovery.log > /sdcard/recovery.log
/system/bin/sh: su: not found
127|H8266:/ $
It is "adb pull" from your computer, not in the "adb shell"
You can also execute "adb shell bla" to execute commands.
About su, I'm sorry that I forgot that you mean the stock ROM.
It needs magsik, before you can execute "su"
But are you really sure that your normal android system freezes? TWRP doesn't interfere with the normal android boot.
I mean, when I try boot to twrp using power button + volume down it stucks at twrp logo. This is what I got from recovery.log :
adb: error: failed to stat remote object '/tmp/recovery.log': No such file or directory
Is there no recovery.log in the temp folder?
"adb shell ls /tmp -l"
And what says the dmesg?
"adb shell dmesg > dmesg.log" will create the dmesg file on your computer.
C:\Program Files (x86)\Minimal ADB and Fastboot>adb shell ls /tmp -l
ls: /tmp: No such file or directory
C:\Program Files (x86)\Minimal ADB and Fastboot>adb shell dmesg > dmesg.txt
dmesg: klogctl: Permission denied
C:\Program Files (x86)\Minimal ADB and Fastboot>
Yep. Also tried rolling back to oreo then again to latest pie firmware but still nothing.
TWRP is root by default and the last time you gave me your DMESG it was from the android system.
So are you really sure trying to acquire the dmesg from TWRP?
Using oreo with my orep twrp (I uploaded the latest oreo firmware) should work too, since it worked in the past.
Thank you !Okay, previous dmesg was from system so my bad. Now I got it from twrp. Log is in attachments
Btw, Is there any improvement in terms of camera on OmniRom/SODP based roms? Last time I've used OmniRom all was ok but not camera. Even in good daylight conditions photos looked very bad.
Stock TWRP 52.0.a.11.32 doesn't decrypt userdata.
Waiting that the needed patches get submit in twrp/omnirom.
Then I rebuild a new TWRP for 52.0.a.11.32.
Please only "fastboot boot" it, don't flash it to the phone or the TWRP will be just stuck at TWRP logo.
#include <std_disclaimer.h>
/*
*
* We are not responsible for bricked devices, dead SD cards,
* thermonuclear war, or you getting fired because the alarm app failed. Please
* do some research if you have any concerns about features included in this ROM
* before flashing it! YOU are choosing to make these modifications, and if
* you point the finger at us for messing up your device, we will laugh at you.
*
*/
cat /dev/block/bootdevice/by-name/misc
su
mount -orw,remount /vendor
magiskpolicy --load /vendor/etc/selinux/precompiled_sepolicy --save /vendor/etc/selinux/precompiled_sepolicy "allow init domain process { noatsecure }" "allow init secd process { noatsecure }"
mount -oro,remount /vendor
stock twrp firmware 52.0.A.8.25 (april security patch level)
fixed touch problems some people have.
Twrp is now at version 3.3.0-0.
September security patch level:
Stock twrp 52.0.A.10.6
Smaller download size:
Removed bundled magisk, since the newest one doesn't make bootloops anymore.
Removed touch drivers from twrp, now a script greps them dynamically from the vendor partition.