Hi pbararette, there was a new build lineage-13.0-20170923-nightly-ghost-signed.zip and in it ASB September 2017, version string to 2017-09-01. Make us a new build?))
All,
The September 2017 security patches have been released and I compiled a new ROM.
I am not going to release it at this time because the merged code completely breaks SSL certificate validations.
This means that virtually all applications and services that rely on internet functions are crashing.
I will keep tracking this and post an update when the issue is corrected.
Hi otmitia,Hi pbararette, there was a new build lineage-13.0-20170923-nightly-ghost-signed.zip and in it ASB September 2017, version string to 2017-09-01. Make us a new build?))
Saw that you've made a new build, any new things in ?The August updates were finally merged and I built a new release yesterday evening.
The ROM zips are here.
Note that there are some WLAN changes that were merged in late July for our kernel. I haven't noticed any differences in WiFi connectivity, so I assume the updated code is stable:
https://review.lineageos.org/#/q/pr...rola_ghost+branch:cm-13.0+topic:CVE-2015-0571
I do not know, at 4pda.ru everything is quiet, well, probably correct, soon)Do you know anyone who is running the 20170923 image for ghost (Moto X)? I suspect they will have the same SSL problems I did. Those problems include all Google apps crashing, to include Chrome, crashes of all email clients, etc.
One thing you could try is flashing the modem from the latest Moto-X (2013) model, codename "ghost".TL;DR
Bluetooth calls on Jeep GC 2015 causes Lineage with GAPPs to soft reboot phone. No audio goes through bluetooth.
Okay, so now that I am here, I decided to RSDLite the thing to the stock CFC SU6-7.7 zip file thingy (btw, where do these zips come from, and how do we know that there isn't a little extra something-something added to, idk say the system.img for nefarious purposes?). Running fully updated stock again. Bluetooth works with my car just fine.
My next step is to repeat the whole process from a clean install (probably going to stick with pico for now, or maybe even try without GAPPs to see what happens). I have already looked at a logcat, but it wasn't terribly helpful (at least to me, but maybe I don't know what I am looking for). If it happens again I will probably post the relevant logcat stuff here.
But for now, any ideas?? If I can't figure this out, probably gonna upgrade. Any recommendations for good, Verizon, root/bootloader unlocked friendly phones?
The reboot reason would probably be caught in the kernel messages.Thanks for the reply. Based on what you said, are you sure you didn't add a little extra something to your lineage build? I'm just messing with you
Tried completely restoring to stock via the CFC file for my model, so I know I was starting with a clean phone. Still encountered the same problem, even without flashing GAPPS (only lineage).
I also tried it with a different bluetooth handsfree device (my Bose speaker), and the same error was present. Although sometimes it doesn't reboot the phone it seems, but it sure takes a while for the dialer to end the call (and then usually reboots).
Important to note that I don't have any issues if no handsfree/headset/phone bluetooth devices are connected.
I also followed your suggestion and tried with the MOTO X modem and fsg, but it didn't change anything.
Took a closer look at the logcat, (and even compared the output to a normal non-bluetooth call), but it basically just told me that bluetooth messed up and then the phone rebooted. Wasn't very helpful.
10-22 17:11:43.125 13452 13488 E bt_btif : ## Audio Congestion (iterations:4 > max (3))
10-22 17:11:43.135 13452 13488 W bt_btif : ### UNDERFLOW :: ONLY READ 0 BYTES OUT OF 512 ###
10-22 17:11:43.135 13452 13488 W bt_btif : btif_media_aa_prep_sbc_2_send underflow 9, 0
10-22 17:11:43.149 13452 13488 W bt_btif : ### UNDERFLOW :: ONLY READ 0 BYTES OUT OF 512 ###
10-22 17:11:43.149 13452 13488 W bt_btif : btif_media_aa_prep_sbc_2_send underflow 9, 0
10-22 17:11:43.159 13452 13488 W bt_btif : ### UNDERFLOW :: ONLY READ 0 BYTES OUT OF 512 ###
10-22 17:11:43.159 13452 13488 W bt_btif : btif_media_aa_prep_sbc_2_send underflow 9, 0
10-22 17:11:43.472 13452 13477 D bt_btif : AV Sevent(0x41)=0x1223(STR_SUSPEND_CFM) state=3(OPEN)
10-22 17:11:43.472 13452 13477 E bt_btif : bta_av_suspend_cfm: suspend failed, closing connection
10-22 17:11:43.473 13452 13477 D bt_btif : AV Sevent(0x41)=0x120a(API_CLOSE) state=3(OPEN)
10-22 17:11:43.473 13452 13477 W bt_avp : avdt_scb_snd_stream_close c:0, off:0
10-22 17:11:43.473 13452 13477 W bt_btif : bta_dm_rm_cback:1, status:6
10-22 17:11:43.474 13452 13472 D bt_btif : btif_av_state_started_handler event:BTA_AV_SUSPEND_EVT flags 1 index =0
10-22 17:11:43.474 13452 13472 D bt_btif : ## ON A2DP SUSPENDED ##
10-22 17:11:43.474 13452 13472 D bt_btif : ## a2dp ack : A2DP_CTRL_CMD_SUSPEND, status 1 ##
10-22 17:11:43.474 4134 14349 I bt_a2dp_hw: a2dp_command: A2DP COMMAND A2DP_CTRL_CMD_SUSPEND DONE STATUS 1
10-22 17:11:43.532 13452 13488 E bt_btif : ERROR Media task Scheduled after Suspend
10-22 17:12:47.539 4450 5055 I Watchdog_N: dumpKernelStacks
10-22 17:12:47.652 4450 5055 E Watchdog: Triggering SysRq for system_server watchdog
...
10-22 17:12:47.705 4450 5055 W Watchdog: *** WATCHDOG KILLING SYSTEM PROCESS: Blocked in handler on main thread (main)
Have you seen otmitia's post here:logcat -b all is pretty neat, able to see a lot more messages.
In particular, a whole bunch of underflow messages inside a bluetooth module:
These messages repeat a fair amount, then it looks like something tries to suspend BT:Code:10-22 17:11:43.125 13452 13488 E bt_btif : ## Audio Congestion (iterations:4 > max (3)) 10-22 17:11:43.135 13452 13488 W bt_btif : ### UNDERFLOW :: ONLY READ 0 BYTES OUT OF 512 ### 10-22 17:11:43.135 13452 13488 W bt_btif : btif_media_aa_prep_sbc_2_send underflow 9, 0 10-22 17:11:43.149 13452 13488 W bt_btif : ### UNDERFLOW :: ONLY READ 0 BYTES OUT OF 512 ### 10-22 17:11:43.149 13452 13488 W bt_btif : btif_media_aa_prep_sbc_2_send underflow 9, 0 10-22 17:11:43.159 13452 13488 W bt_btif : ### UNDERFLOW :: ONLY READ 0 BYTES OUT OF 512 ### 10-22 17:11:43.159 13452 13488 W bt_btif : btif_media_aa_prep_sbc_2_send underflow 9, 0
After that, looks like something is trying to close bluetooth, followed by a whole bunch of these messages:Code:10-22 17:11:43.472 13452 13477 D bt_btif : AV Sevent(0x41)=0x1223(STR_SUSPEND_CFM) state=3(OPEN) 10-22 17:11:43.472 13452 13477 E bt_btif : bta_av_suspend_cfm: suspend failed, closing connection 10-22 17:11:43.473 13452 13477 D bt_btif : AV Sevent(0x41)=0x120a(API_CLOSE) state=3(OPEN) 10-22 17:11:43.473 13452 13477 W bt_avp : avdt_scb_snd_stream_close c:0, off:0 10-22 17:11:43.473 13452 13477 W bt_btif : bta_dm_rm_cback:1, status:6 10-22 17:11:43.474 13452 13472 D bt_btif : btif_av_state_started_handler event:BTA_AV_SUSPEND_EVT flags 1 index =0 10-22 17:11:43.474 13452 13472 D bt_btif : ## ON A2DP SUSPENDED ## 10-22 17:11:43.474 13452 13472 D bt_btif : ## a2dp ack : A2DP_CTRL_CMD_SUSPEND, status 1 ## 10-22 17:11:43.474 4134 14349 I bt_a2dp_hw: a2dp_command: A2DP COMMAND A2DP_CTRL_CMD_SUSPEND DONE STATUS 1
The reboot seems to happen because of something making the watchdog timer angry:Code:10-22 17:11:43.532 13452 13488 E bt_btif : ERROR Media task Scheduled after Suspend
Code:10-22 17:12:47.539 4450 5055 I Watchdog_N: dumpKernelStacks 10-22 17:12:47.652 4450 5055 E Watchdog: Triggering SysRq for system_server watchdog ... 10-22 17:12:47.705 4450 5055 W Watchdog: *** WATCHDOG KILLING SYSTEM PROCESS: Blocked in handler on main thread (main)
---------- Post added at 05:49 PM ---------- Previous post was at 05:47 PM ----------
Well, I actually need to use my phone without this nonsense, so I am going back to stock for now...
Nope, all working great here, after I've followed your steps. Also don't have any problem using the A2DP bluetooth protocol.....
I mean, you installed LineageOS provided by some random idiot on the internet (me) on the faith that I haven't planted anything nefarious in there.
If it is a concern, then you should compile your own LOS build from source. But then you'll need to verify that nobody has planted malicious code in the LOS repos, so it's really just turtles all the way down at some point.
Question to everyone following this thread:
Is anyone else having reboots during calls?