rovo89 / XposedBridge

The Java part of the Xposed framework.
3.87k stars 1.1k forks source link

MIUI 9 Nougat #198

Open PsyMan47 opened 6 years ago

PsyMan47 commented 6 years ago

You are on the good way to fix the MIUI incompatibility. The log now shows just a few errors! Xposed installer shows "Installed but not active". Info: Xiaomi Mi Note 2 - scorpio MultiRom 7.9.21, 7.0 (deodexed) Xposed v88.1 Tried to disable resources from xposed installer, but the log shows exactly the same errors. Full log here:

xposed_error_20171011_014135.log

Ezalor commented 6 years ago

When I use adb to catch log, the command just gets stuck on "- waiting for device -". And I tried to install liveboot, but it cannot start on boot and no log saved, while without xposed it runs normally. The same with via Xposed, the "log_all" file is just empty.

So sorry for that... Is there anyone else who can get the logcat?

lhc489773346 commented 6 years ago

There is no PC at present. There's no way to provide logs. Mi 6 students quickly come to help

Hmmzzz commented 6 years ago

same issue like @Ezalor post above ,logcat(waiting devices)

fking22 commented 6 years ago

@Ezalor Me too. Only empty logcat. My device is MI 6, use the official ROM: MIUI 9 Global 7.10.22.

Hmmzzz commented 6 years ago

my device is Mix2 MIUI9 7.10.12 deodexed rom

j2u commented 6 years ago

before using adb logcat you need to open usb debug and trust the pc on you phone @Hmmzzz

Hmmzzz commented 6 years ago

@j2u same result . waiting devices

kullurumanoj commented 6 years ago

Tried many adb commands unable to create a log..getting any one of two errors 1.Waiting for device 2.Catlog read failure

moseay commented 6 years ago

@rovo89 Mi 5s bootloop MIUI 9 Android 7.0 (Odex) I had got locat.txt by adb. I don't know why I can't upload file here, So I upload it in my Github repository. Here is the logcat.txt's link: https://github.com/MXILSH/ID-num-operation/blob/master/logcat.txt

rovo89 commented 6 years ago

Thanks. I'm wondering where this path comes from: /system/frameworkboot-miui.art Note that there seems to be a slash missing, and that's probably the reason why it can't find the file. Could you please give me the output of this command: oatdump --oat-file=/system/framework/boot.oat --header-only

fking22 commented 6 years ago

@rovo89 MI 6,stuck on booting. ROM: official MIUI 9 Global 7.10.22 (Android 7.1.1), just root by SuperSU, no other modifications. Xposed: xposed-v88.2-sdk25-arm64-test3 Here's the log via adb: logcat.zip

Ezalor commented 6 years ago

My ROM is official experimental MIUI 9 7.10.13.

I used the boot.oat in /system/framework/arm64. Here is the output:

MAGIC:
oat
088

LOCATION:
/system/framework/arm64/boot.oat

CHECKSUM:
0x90571697

INSTRUCTION SET:
Arm64

INSTRUCTION SET FEATURES:
smp,a53

DEX FILE COUNT:
1

EXECUTABLE OFFSET:
0x005d6000

INTERPRETER TO INTERPRETER BRIDGE OFFSET:
0x00000000

INTERPRETER TO COMPILED CODE BRIDGE OFFSET:
0x00000000

JNI DLSYM LOOKUP OFFSET:
0x005d6000

QUICK GENERIC JNI TRAMPOLINE OFFSET:
0x005d6010

QUICK IMT CONFLICT TRAMPOLINE OFFSET:
0x005d6020

QUICK RESOLUTION TRAMPOLINE OFFSET:
0x005d6030

QUICK TO INTERPRETER BRIDGE OFFSET:
0x005d6040

IMAGE PATCH DELTA:
0 (0x00000000)

IMAGE FILE LOCATION OAT CHECKSUM:
0x00000000

IMAGE FILE LOCATION OAT BEGIN:
0x00000000

KEY VALUE STORE:
bootclasspath = /system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-core-libart.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-conscrypt.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-okhttp.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-core-junit.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-bouncycastle.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-ext.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-framework.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-telephony-common.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-voip-common.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-ims-common.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-apache-xml.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-org.apache.http.legacy.boot.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-tcmiface.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-telephony-ext.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-WfdCommon.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-oem-services.art:/system/framework/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-qcom.fmradio.art:/system/app/miui/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-miui.art:/system/app/miuisystem/out/target/product/sagit/dex_bootjars/system/framework/arm64/boot-miuisystem.art
compiler-filter = speed
debuggable = true
dex2oat-cmdline = --runtime-arg -Xms64m --runtime-arg -Xmx64m --image-classes=frameworks/base/preloaded-classes --dex-file=out/target/common/obj/JAVA_LIBRARIES/core-oj_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/core-libart_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/conscrypt_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/okhttp_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/core-junit_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/bouncycastle_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/ext_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/framework_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/telephony-common_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/voip-common_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/ims-common_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/apache-xml_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/org.apache.http.legacy.boot_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/tcmiface_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/telephony-ext_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/WfdCommon_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/oem-services_intermediates/javalib.jar --dex-file=out/target/common/obj/JAVA_LIBRARIES/qcom.fmradio_intermediates/javalib.jar --dex-file=out/target/common/obj/APPS/miui_intermediates/classes.dex --dex-file=out/target/common/obj/APPS/miuisystem_intermediates/classes.dex --dex-location=/system/framework/core-oj.jar --dex-location=/system/framework/core-libart.jar --dex-location=/system/framework/conscrypt.jar --dex-location=/system/framework/okhttp.jar --dex-location=/system/framework/core-junit.jar --dex-location=/system/framework/bouncycastle.jar --dex-location=/system/framework/ext.jar --dex-location=/system/framework/framework.jar --dex-location=/system/framework/telephony-common.jar --dex-location=/system/framework/voip-common.jar --dex-location=/system/framework/ims-common.jar --dex-location=/system/framework/apache-xml.jar --dex-location=/system/framework/org.apache.http.legacy.boot.jar --dex-location=/system/framework/tcmiface.jar --dex-location=/system/framework/telephony-ext.jar --dex-location=/system/framework/WfdCommon.jar --dex-location=/system/framework/oem-services.jar --dex-location=/system/framework/qcom.fmradio.jar --dex-location=/system/app/miui/miui.apk --dex-location=/system/app/miuisystem/miuisystem.apk --oat-symbols=out/target/product/sagit/symbols/system/framework/arm64/boot.oat --oat-file=out/target/product/sagit/dex_bootjars/system/framework/arm64/boot.oat --oat-location=/system/framework/arm64/boot.oat --image=out/target/product/sagit/dex_bootjars/system/framework/arm64/boot.art --base=0x70000000 --instruction-set=arm64 --instruction-set-variant=generic --instruction-set-features=default --android-root=out/target/product/sagit/system --include-patch-information --runtime-arg -Xnorelocate --no-generate-debug-info --multi-image --no-inline-from=core-oj.jar --generate-mini-debug-info --compile-pic
dex2oat-host = X86_64
has-patch-info = true
native-debuggable = false
pic = true

SIZE:
12145040
Hmmzzz commented 6 years ago

@fking22 can u help me with the logcat , waiting devices issue. sad

fking22 commented 6 years ago

@Hmmzzz In "Developer options", enable (USB debugging (Security settings)" (prompt to login MI account first), and then just follow steps mentioned by https://github.com/rovo89/XposedBridge/wiki/Bugs#how-can-i-get-logs

rovo89 commented 6 years ago

@Ezalor Thanks! Unfortunately, it doesn't contain all the information I hoped it would contain. Could you please try with oatdump --oat-file=/system/framework/arm64/boot.oat --list-classes?

Hmmzzz commented 6 years ago
* daemon not running. starting it now on port 5037 *
* daemon started successfully *
--------- beginning of main
02-25 03:15:30.981 W/auditd  (  581): type=2000 audit(0.0:1): initialized
02-25 03:15:32.569 I/auditd  (  581): type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295
02-25 03:15:32.569 W/auditd  (  581): type=1404 audit(0.0:3): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295
02-25 03:15:34.219 W/e2fsck  (  574): type=1400 audit(0.0:4): avc: denied { getattr } for path="/dev/block/sde42" dev="tmpfs" ino=22640 scontext=u:r:fsck:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=0
02-25 03:15:34.219 W/e2fsck  (  574): type=1400 audit(0.0:5): avc: denied { getattr } for path="/dev/block/sde42" dev="tmpfs" ino=22640 scontext=u:r:fsck:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=0
02-25 03:15:34.219 W/e2fsck  (  574): type=1400 audit(0.0:6): avc: denied { read write } for name="sde42" dev="tmpfs" ino=22640 scontext=u:r:fsck:s0 tcontext=u:object_r:block_device:s0 tclass=blk_file permissive=0
02-25 03:15:34.449 W/init    (    1): type=1400 audit(0.0:7): avc: denied { getattr } for path="/sys/kernel/debug/tracing/trace_marker" dev="tracefs" ino=10020 scontext=u:r:init:s0 tcontext=u:object_r:debugfs_trace_marker:s0 tclass=file permissive=0
02-25 03:15:34.497 D/QSEECOMD: (  591): qseecom listener services process entry PPID = 1
02-25 03:15:34.497 E/QSEECOMD: (  591): Listener: index = 0, hierarchy = 0
02-25 03:15:34.499 D/QSEECOMD: (  591): Init dlopen(librpmb.so, RTLD_NOW) succeeds
02-25 03:15:34.499 D/QSEECOMD: (  591): Init::Init dlsym(g_FSHandle rpmb_init_service) succeeds
02-25 03:15:34.500 I/rpmb_ufs(  591): RPMB Mult (512-byte sector) = 32768, Rel_sec_cnt = 64
02-25 03:15:34.500 E/DrmLibRpmb(  591): rpmb_init succeeded! with ret = 0
02-25 03:15:34.500 D/QSEECOMD: (  591): Init rpmb_init_service ret = 0
02-25 03:15:34.500 D/QSEECOMD: (  591): RPMB system services: init (Listener ID = 8192)
02-25 03:15:34.500 E/QSEECOMD: (  591): Listener: index = 1, hierarchy = 0
02-25 03:15:34.500 D/QSEECOMD: (  591): Init dlopen(libssd.so, RTLD_NOW) succeeds
02-25 03:15:34.501 D/QSEECOMD: (  591): Init::Init dlsym(g_FSHandle ssd_init_service) succeeds
02-25 03:15:34.501 E/SSD     (  591): ssd_init_service succeeded!
02-25 03:15:34.501 D/QSEECOMD: (  591): Init ssd_init_service ret = 0
02-25 03:15:34.501 D/QSEECOMD: (  591): SSD system services: init (Listener ID = 12288)
02-25 03:15:34.501 E/QSEECOMD: (  591): Listener: index = 2, hierarchy = 0
02-25 03:15:34.521 D/QSEECOMD: (  591): Init dlopen(libsecureui.so, RTLD_NOW) succeeds
02-25 03:15:34.521 D/QSEECOMD: (  591): Init::Init dlsym(g_FSHandle secure_ui_init) succeeds
02-25 03:15:34.521 D/QSEECOMD: (  591): Init secure_ui_init ret = 0
02-25 03:15:34.521 D/QSEECOMD: (  591): secure UI services: init (Listener ID = 16384)
02-25 03:15:34.522 D/QSEECOMD: (  591): Parent qseecom daemon process paused!! 
02-25 03:15:34.522 D/QSEECOMD: (  593): qseecom listener service threads starting!!! 
02-25 03:15:34.522 D/QSEECOMD: (  593): Total listener services to start = 9
02-25 03:15:34.522 E/QSEECOMD: (  593): Listener: index = 0, hierarchy = 1
02-25 03:15:34.522 D/QSEECOMD: (  593): Init dlopen(librpmb.so, RTLD_NOW) succeeds
02-25 03:15:34.522 D/QSEECOMD: (  593): Init::Init dlsym(g_FSHandle rpmb_start) succeeds
02-25 03:15:34.523 D/QSEECOMD: (  593): Init rpmb_start ret = 0
02-25 03:15:34.523 D/QSEECOMD: (  593): RPMB system services: Started (Listener ID = 8192)
02-25 03:15:34.523 E/QSEECOMD: (  593): Listener: index = 1, hierarchy = 1
02-25 03:15:34.523 D/QSEECOMD: (  593): Init dlopen(libssd.so, RTLD_NOW) succeeds
02-25 03:15:34.523 D/QSEECOMD: (  593): Init::Init dlsym(g_FSHandle ssd_start) succeeds
02-25 03:15:34.523 D/QSEECOMD: (  593): Init ssd_start ret = 0
02-25 03:15:34.523 D/QSEECOMD: (  593): SSD system services: Started (Listener ID = 12288)
02-25 03:15:34.523 E/QSEECOMD: (  593): Listener: index = 2, hierarchy = 1
02-25 03:15:34.523 D/QSEECOMD: (  593): Init dlopen(libsecureui.so, RTLD_NOW) succeeds
02-25 03:15:34.523 D/QSEECOMD: (  593): Init::Init dlsym(g_FSHandle secure_ui_start) succeeds
02-25 03:15:34.523 D/QSEECOMD: (  593): Init secure_ui_start ret = 0
02-25 03:15:34.523 D/QSEECOMD: (  593): secure UI services: Started (Listener ID = 16384)
02-25 03:15:34.523 E/QSEECOMD: (  593): Listener: index = 3, hierarchy = 1
02-25 03:15:34.525 D/QSEECOMD: (  593): Init dlopen(libdrmtime.so, RTLD_NOW) succeeds
02-25 03:15:34.525 D/QSEECOMD: (  593): Init::Init dlsym(g_FSHandle atime_start) succeeds
02-25 03:15:34.525 D/DrmLibTime(  593): QSEE Time Listener: atime_start
02-25 03:15:34.525 D/DrmLibTime(  593): registering fs service to QSEECom is done!
02-25 03:15:34.525 D/DrmLibTime(  593): begin to create a thread!
02-25 03:15:34.525 D/DrmLibTime(  593): Creating a pthread in atime_start is done! return 0
02-25 03:15:34.525 D/QSEECOMD: (  593): Init atime_start ret = 0
02-25 03:15:34.525 D/DrmLibTime(  593): QSEE Time Listener: dispatch
02-25 03:15:34.525 D/QSEECOMD: (  593): time services: Started (Listener ID = 11)
02-25 03:15:34.525 D/DrmLibTime(  593): before calling ioctl to read the next time_cmd
02-25 03:15:34.525 E/QSEECOMD: (  593): Listener: index = 4, hierarchy = 1
02-25 03:15:34.525 D/QSEECOMD: (  593): Init dlopen(libdrmfs.so, RTLD_NOW) succeeds
02-25 03:15:34.525 D/QSEECOMD: (  593): Init::Init dlsym(g_FSHandle fs_start) succeeds
02-25 03:15:34.526 D/QSEECOMD: (  593): Init fs_start ret = 0
02-25 03:15:34.526 D/QSEECOMD: (  593): file system services: Started (Listener ID = 10)
02-25 03:15:34.526 E/QSEECOMD: (  593): Listener: index = 5, hierarchy = 1
02-25 03:15:34.526 D/QSEECOMD: (  593): Init dlopen(libdrmfs.so, RTLD_NOW) succeeds
02-25 03:15:34.526 D/QSEECOMD: (  593): Init::Init dlsym(g_FSHandle gpfs_start) succeeds
02-25 03:15:34.526 D/QSEECOMD: (  593): Init gpfs_start ret = 0
02-25 03:15:34.526 D/QSEECOMD: (  593): gpfile system services: Started (Listener ID = 28672)
02-25 03:15:34.526 E/QSEECOMD: (  593): Listener: index = 6, hierarchy = 1
02-25 03:15:34.528 D/QSEECOMD: (  593): Init dlopen(libqisl.so, RTLD_NOW) succeeds
02-25 03:15:34.528 D/QSEECOMD: (  593): Init::Init dlsym(g_FSHandle qisl_start) succeeds
--------- beginning of system
02-25 03:15:34.528 I/QISL    (  593): QSEE Interrupt Service Listener Thread is started
02-25 03:15:34.528 I/QISL    (  593): QSEE Interrupt Service Listener was activated successfully
02-25 03:15:34.528 D/QSEECOMD: (  593): Init qisl_start ret = 0
02-25 03:15:34.528 D/QSEECOMD: (  593): interrupt services: Started (Listener ID = 36864)
02-25 03:15:34.528 E/QSEECOMD: (  593): Listener: index = 7, hierarchy = 1
02-25 03:15:34.529 D/QSEECOMD: (  593): Init dlopen(libspl.so, RTLD_NOW) succeeds
02-25 03:15:34.529 D/QSEECOMD: (  593): Init::Init dlsym(g_FSHandle spl_start) succeeds
02-25 03:15:34.529 D/SPL     (  593): Call QSEECom_register_listener()
02-25 03:15:34.529 D/SPL     (  593): Registered listener sucessfully!
02-25 03:15:34.529 D/SPL     (  593): pipe read-fd [31] write-fd [32]
02-25 03:15:34.529 D/SPL     (  593): Create thread
02-25 03:15:34.529 D/SPL     (  593): Thread created sucessfully.
02-25 03:15:34.529 D/SPL     (  593): spl_dispatch() started
02-25 03:15:34.529 D/QSEECOMD: (  593): Init spl_start ret = 0
02-25 03:15:34.529 D/SPL     (  593): ==== Wait For Request ======
02-25 03:15:34.529 D/QSEECOMD: (  593): secure processor services: Started (Listener ID = 45056)
02-25 03:15:34.529 E/QSEECOMD: (  593): Listener: index = 8, hierarchy = 1
02-25 03:15:34.530 D/QSEECOMD: (  593): Init dlopen(libGPreqcancel.so, RTLD_NOW) succeeds
02-25 03:15:34.530 D/QSEECOMD: (  593): Init::Init dlsym(g_FSHandle gp_reqcancel_start) succeeds
02-25 03:15:34.530 D/QSEECOMD: (  593): Init gp_reqcancel_start ret = 0
02-25 03:15:34.530 D/QSEECOMD: (  593): gp request cancellation services: Started (Listener ID = 4352)
02-25 03:15:34.532 D/QSEECOMD: (  593): QSEECOM DAEMON RUNNING 
02-25 03:15:34.701 I/MIUINDBG_HOOK(  627): hook_context_do_hook: start hook
02-25 03:15:34.701 I/MIUINDBG_HOOK(  627): replace pthread_setname_np succeed!
02-25 03:15:34.701 I/MIUINDBG_HOOK(  627): replace sigtimedwait succeed!
02-25 03:15:34.701 I/        (  627): debuggerd: starting
02-25 03:15:34.703 I/MIUINDBG_HOOK(  630): hook hook_pthread_setname_np name=debuggerd64:sig
02-25 03:15:34.703 I/MIUINDBG_HOOK(  630): replace syscall succeed!
02-25 03:15:34.748 I/MIUINDBG_HOOK(  626): hook_context_do_hook: start hook
02-25 03:15:34.749 I/MIUINDBG_HOOK(  626): replace pthread_setname_np succeed!
02-25 03:15:34.749 I/MIUINDBG_HOOK(  626): replace sigtimedwait succeed!
02-25 03:15:34.749 I/        (  626): debuggerd: starting
02-25 03:15:34.756 I/MIUINDBG_HOOK(  631): hook hook_pthread_setname_np name=debuggerd:sig
02-25 03:15:34.756 I/MIUINDBG_HOOK(  631): replace syscall succeed!
02-25 03:15:34.763 I/vold    (  628): Vold 3.0 (the awakening) firing up
02-25 03:15:34.763 V/vold    (  628): Detected support for: ext4 f2fs vfat exfat
02-25 03:15:35.040 D/vold    (  628): e4crypt_init_user0
02-25 03:15:35.040 D/vold    (  628): e4crypt_prepare_user_storage for volume null, user 0, serial 0, flags 1
02-25 03:15:35.040 D/vold    (  628): Preparing: /data/system/users/0
02-25 03:15:35.042 D/vold    (  628): Preparing: /data/misc/profiles/cur/0
02-25 03:15:35.043 D/vold    (  628): Preparing: /data/misc/profiles/cur/0/foreign-dex
02-25 03:15:35.043 D/vold    (  628): Preparing: /data/system_de/0
02-25 03:15:35.043 D/vold    (  628): Preparing: /data/misc_de/0
02-25 03:15:35.043 D/vold    (  628): Preparing: /data/user_de/0
02-25 03:15:35.044 D/vold    (  628): e4crypt_unlock_user_key 0 serial=0 token_present=0
02-25 03:15:35.045 I/vdc     (    1): 200 629 Command succeeded
02-25 03:15:35.070 I//system/bin/tzdatacheck(  635): tzdata file /data/misc/zoneinfo/current/tzdata does not exist. No action required.
02-25 03:15:35.095 E/ANDR-PERF-MPCTL(  636): Checking boot complete
02-25 03:15:35.096 I/launch_daemonsu(  638): (post-fs-data) start 
02-25 03:15:35.117 I/launch_daemonsu(  646): (post-fs-data) /su mode 
02-25 03:15:35.139 I/launch_daemonsu(  654): (post-fs-data) copying boot image backups from /cache to /data 
02-25 03:15:35.188 I/launch_daemonsu(  657): (post-fs-data) /su not mounted yet 
02-25 03:15:35.194 I/launch_daemonsu(  658): (post-fs-data) /data/su.img found 
02-25 03:15:35.231 I/launch_daemonsu(  661): (post-fs-data) /data/su.img: 100663296 bytes 
02-25 03:15:35.237 I/launch_daemonsu(  664): (post-fs-data) preparing mount 
02-25 03:15:35.269 D/vold    (  628): Disk at 7:0 changed
02-25 03:15:35.288 I/launch_daemonsu(  675): (post-fs-data) loopsetup(/data/su.img): /dev/block/loop0 
02-25 03:15:35.303 I/launch_daemonsu(  679): (post-fs-data) mount error (if any):  
02-25 03:15:35.316 I/launch_daemonsu(  686): (post-fs-data) mount succeeded 
02-25 03:15:35.341 I/launch_daemonsu(  691): (post-fs-data) bind mounting pre-existing su binaries 
02-25 03:15:35.364 I/launch_daemonsu(  695): (post-fs-data) fork daemonsu 
02-25 03:15:35.377 I/launch_daemonsu(  699): (post-fs-data) waiting for su.d 
02-25 03:15:35.795 I/supolicy(  702): --- SELinux policy patch start ---
02-25 03:15:35.795 I/supolicy(  702): --- SELinux policy patch end ---
02-25 03:15:35.799 I/auditd  (  590): type=1403 audit(0.0:8): policy loaded auid=4294967295 ses=4294967295
02-25 03:15:35.873 I/launch_daemonsu(  713): (post-fs-data) end 
02-25 03:15:36.054 I/BOOT    (  728): MSM target '', SoC 'CHIRON', HwID '292', SoC ver '131072' 
02-25 03:15:36.259 W/rmt_storage(  792): type=1400 audit(0.0:9): avc: denied { write } for name="rmts" dev="debugfs" ino=18008 scontext=u:r:rmt_storage:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
02-25 03:15:36.265 I/irsc_util(  791): Starting irsc tool
02-25 03:15:36.266 I/irsc_util(  791): Num of entries:292
02-25 03:15:36.266 I/irsc_util(  791): Ending irsc tool
02-25 03:15:36.269 I/rmt_storage(  792): Shared memory initialised successfully.
02-25 03:15:36.269 I/rmt_storage(  792): Registering modemst1: 0x4a /boot/modem_fs1
02-25 03:15:36.269 I/rmt_storage(  792): Registering modemst2: 0x4b /boot/modem_fs2
02-25 03:15:36.269 I/rmt_storage(  792): Registering fsc: 0xff /boot/modem_fsc
02-25 03:15:36.269 I/rmt_storage(  792): Registering fsg: 0x58 /boot/modem_fsg
02-25 03:15:36.269 I/rmt_storage(  792): 4 GPT partitions found
02-25 03:15:36.269 E/rmt_storage(  792): debug open failed with errno 13
02-25 03:15:36.269 I/rmt_storage(  792): Capset success!
02-25 03:15:36.275 I/tftp_server(  793): Starting...
02-25 03:15:36.279 I/tftp_server(  793): pid=793 tid=793 tftp-server : INF :[tftp_server.c, 597] Server waiting for client-connection.
02-25 03:15:36.287 I/PerMgrSrv(  801): Adding entry for modem : offTimeout : 500 ackTimeout : 200
02-25 03:15:36.287 I/PerMgrSrv(  801): Adding entry for spss : offTimeout : 5000 ackTimeout : 200
02-25 03:15:36.287 I/PerMgrSrv(  801): Adding entry for slpi : offTimeout : 5000 ackTimeout : 200
02-25 03:15:36.288 D/eSEPowerManagerServer(  799): loading eseservice
02-25 03:15:36.288 I/qcom-bluetooth(  810): /system/etc/init.qcom.bt.sh: init.qcom.bt.sh config = onboot 
02-25 03:15:36.298 I/lowmemorykiller(  805): Using in-kernel low memory killer interface
02-25 03:15:36.302 D/spdaemon(  802): Version 1.3 13-Jan-2017.
02-25 03:15:36.303 D/spdaemon(  802): Prod FW.
02-25 03:15:36.303 D/spdaemon(  802): firmware_type [112].
02-25 03:15:36.303 D/spdaemon(  802): Starting to get system info
02-25 03:15:36.303 D/spdaemon(  802): devinfo.num_additional_subsystems = 2
02-25 03:15:36.303 D/spdaemon(  802): devinfo.subsystem_list[0].type = 3
02-25 03:15:36.303 D/spdaemon(  802): Found spss subsystem.
02-25 03:15:36.303 D/spdaemon(  802): devinfo.subsystem_list[0].mdm_name = spss
02-25 03:15:36.304 I/pd-mapper-svc(  803): Starting pd-mapper service
02-25 03:15:36.304 I/pd-mapper-svc(  803): Parsing file :/firmware/image/adspr.jsn:
02-25 03:15:36.305 I/ServiceManager(  802): Waiting for service vendor.qcom.PeripheralManager...
02-25 03:15:36.305 I/pd-mapper-svc(  803): Parsing file :/firmware/image/adspua.jsn:
02-25 03:15:36.305 I/pd-mapper-svc(  803): Parsing file :/firmware/image/modemr.jsn:
02-25 03:15:36.306 I/pd-mapper-svc(  803): Parsing file :/firmware/image/slpir.jsn:
02-25 03:15:36.306 I/pd-mapper-svc(  803): Parsing file :/firmware/image/slpius.jsn:
02-25 03:15:36.310 I/pd-mapper-svc(  803): Parsing file :/firmware/image/modemuw.jsn:
02-25 03:15:36.310 E/DispSync(  807): Couldn't set SCHED_FIFO for DispSyncThread
02-25 03:15:36.311 I/SurfaceFlinger(  807): SurfaceFlinger is starting
02-25 03:15:36.312 I/Surf
ghost commented 6 years ago

@rovo89 There is the oatdump file. Thx! oatdump.txt

moseay commented 6 years ago

@rovo89 /system/frameworkboot-miui.art There isn't a path like this, but there are two paths cotain the file of boot-miui.art the one is /system/framework/arm/ another is /system/framework/arm64/ and oatdump --oat-file=/system/framework/arm64/boot.oat --list-classes this command's output is https://github.com/MXILSH/ID-num-operation/blob/master/outdump2.txt

j2u commented 6 years ago

Mi6 Miui 9 offical Chinese Version android 7.1.1 boot.oat dump file https://drive.google.com/open?id=0B4iXynaKpTUROFRmUmNhTkl4aWc

rovo89 commented 6 years ago

Thanks! My guess is that it's related to ExtractMultiImageLocations(): https://github.com/rovo89/android_art/blob/xposed-nougat-mr2/runtime/gc/space/image_space.cc#L1556

The boot class path is:

/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-core-libart.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-conscrypt.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-okhttp.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-core-junit.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-bouncycastle.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-ext.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-framework.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-telephony-common.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-voip-common.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-ims-common.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-apache-xml.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-org.apache.http.legacy.boot.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-tcmiface.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-telephony-ext.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-WfdCommon.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-oem-services.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-qcom.fmradio.art
/system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-qcmediaplayer.art
/system/app/miui/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-miui.art
/system/app/miuisystem/out/target/product/gemini/dex_bootjars/system/framework/arm64/boot-miuisystem.art

The function probably gets /system/framework/boot.art as input_image_file_name, so it checks the first item from the boot class path and determines /system/framework/out/target/product/gemini/dex_bootjars/system/framework/arm64 as common prefix. So it it removes 79 characters from each item and adds the remaining characters after the common prefix (/system/framework). That works fine for the standard items, but for their own stuff, they had the great idea of writing the output to a different folder. So the result of that function is:

/system/framework/boot.art
/system/framework/boot-core-libart.art
/system/framework/boot-conscrypt.art
/system/framework/boot-okhttp.art
/system/framework/boot-core-junit.art
/system/framework/boot-bouncycastle.art
/system/framework/boot-ext.art
/system/framework/boot-framework.art
/system/framework/boot-telephony-common.art
/system/framework/boot-voip-common.art
/system/framework/boot-ims-common.art
/system/framework/boot-apache-xml.art
/system/framework/boot-org.apache.http.legacy.boot.art
/system/framework/boot-tcmiface.art
/system/framework/boot-telephony-ext.art
/system/framework/boot-WfdCommon.art
/system/framework/boot-oem-services.art
/system/framework/boot-qcom.fmradio.art
/system/framework/boot-qcmediaplayer.art
/system/frameworkboot-miui.art
/system/frameworkarm64/boot-miuisystem.art

No idea whether they have modified ART somehow to handle these strange paths or why else it doesn't cause issues on stock. Anyway, I need to think about a good and reliable workaround for this strange situation.

gcjmail commented 6 years ago

MI 4S,stuck on booting. ROM: official MIUI 9 chinese version 7.10.16 (Android 7.0), just root by SuperSU, no other modifications. Xposed: xposed-v88.2-sdk24-arm64-test3 Here's the log via adb: logcat.zip

Hmmzzz commented 6 years ago

MIUI9 BEFORE 7.9.21 xposed 88.2 beta3 works great ,but MIUI9 after 7.9.21 xposed 88.2 beta3 will cause bootloop.(Device:MIX 2 and Mi 6).

NannuSiddik commented 6 years ago

Please do something for SDK 25 (snapdragon 835) devices. Waiting for Mi 6 support

rovo89 commented 6 years ago

Guys... have you ever heard the word "patience"? It's hard enough to analyze and fix the strange things that MIUI has done, and this issue has been open for just a few days.

Hmmzzz commented 6 years ago

be patient guys , good stuff needs time.

SailFlorve commented 6 years ago

official miui without deodex have no necessary to try it , bootloop certainly

Ezalor commented 6 years ago

@rovo89 Thanks for yor great efforts! I'm ready and glad to help if there'e something needed.

And to @SailFlorve , while the author is here taking efforts to solve the problem, what are you doing here? Just typing on the keyboard saying this is impossible that is impossible everything is impossible? What gives you the bravety to shout out here, and are you so blind to see the author's work? Please stop your funny behavior and please do not post stupid words like those again. Thanks.

SailFlorve commented 6 years ago

I just tell other people the truth. of course you can try it cause you are catching the log, and im glad to help. What's wrong with you? its such a good result that xposed can work on most deodexed miui. there are so many devices, have you ever thought that does the author have the energy and willing to make that work on offical miui? is there any trouble for you to deodexed manually?

rovo89 commented 6 years ago

OK, next attempt, this hopefully fixes the issues with boot-miui.art: https://www.dropbox.com/s/peebxzrtlqp8pkn/xposed-v88.2-sdk24-arm64-test4.zip?dl=0 https://www.dropbox.com/s/4s6xdewvixtuj3u/xposed-v88.2-sdk25-arm64-test4.zip?dl=0

kullurumanoj commented 6 years ago

screenshot_2017-10-17-22-46-12-816_de robv android xposed installer screenshot_2017-10-17-22-47-43-968_com android settings

@rovo89 Succesfully flashed the test version and its working...guys boot time is lil bit higher around five minutes My rom ;Official MIUI China Rom (Odexed) Device : Redmi Note-4X

Theliel commented 6 years ago

Bootloop on Mi6, with Official MIUI Global dev ROM

fawzy46 commented 6 years ago

guys, please make sure to wait for 5 minutes or even a little more as first boot takes a long time

Theliel commented 6 years ago

in my case, i'd waiting about 10 minutes :), so... bootloop

NannuSiddik commented 6 years ago

Bootloop on Mi 6 with Xiaomi.eu deodex rom. Waiting more than 14+ minutes and then used Uninstaller. By the way thank you so much for your hard work. We will wait no problem, take your time.

MHD-SY commented 6 years ago

Working fine on Redmi Not 4 SD with MIUIPRO 20171017_200438 20171017_200604

jodo-c commented 6 years ago

screenshot_2017-10-17-23-50-28-123_de robv android xposed installer screenshot_2017-10-17-23-50-33-735_com android settings Working on Miui Stock on my Redmi note 4(x). Miui 9 version is 7.9.15.

hizri6 commented 6 years ago

Works fine on xiaomi mi4s, while I do not observe any errors and drops of applications. I thank the development for the screenshot_2017-10-17-22-00-11-819_de robv android xposed installer screenshot_2017-10-17-22-00-21-753_com android settings

roberto-sartori-gl commented 6 years ago

If it doesn't work, please provide logs.

fawzy46 commented 6 years ago

guys could be the bootloop happens because dm-verification ?? can anyone who got bootloop flash the lazy flasher then try to flash the xposed

lhc489773346 commented 6 years ago

Mi6 Chinese development (Odex)is still the same to bootloop

rovo89 commented 6 years ago

Too bad that it still goes into bootloops for some people. But did it also help some people who had issues with v88. 1-test3, i.e. all those whose logs included the wrong path to boot-miui.art?

And remember: No logs = no fix.

Tushaarjadhav commented 6 years ago

Mi 5s plus 6gb 128G variant Miui 9 china mi-globe rom 7.9.21 88.3 test4 works well no bootloop all working great thanks

mymine commented 6 years ago

感谢rovo89努力与坚持。小米5s最新官方开发版。已经成功激活并运用。

mymine commented 6 years ago

@rovo89

moseay commented 6 years ago

Thanks for your hard efforts, it finally works. Mi5s MIUI9 Chinese version (Odex) Xposed v88.2-sdk24-test4

lhc489773346 commented 6 years ago

10-18 08:49:35.013 I/Xposed ( 866): -----------------10-18 08:49:35.013 I/Xposed ( 866): Starting Xposed version 88.2-test4, compiled for SDK 2510-18 08:49:35.013 I/Xposed ( 866): Device: MI 6 (Xiaomi), Android version 7.1.1 (SDK 25)10-18 08:49:35.013 I/Xposed ( 866): ROM: NMF26X10-18 08:49:35.013 I/Xposed ( 866): Build fingerprint: Xiaomi/sagit/sagit:7.1.1/NMF26X/7.10.12:user/release-keys10-18 08:49:35.013 I/Xposed ( 866): Platform: arm64-v8a, 64-bit binary, system server: yes10-18 08:49:35.013 I/Xposed ( 866): SELinux enabled: yes, enforcing: yes10-18 08:49:36.057 I/Xposed ( 866): -----------------10-18 08:49:36.057 I/Xposed ( 866): Added Xposed (/system/framework/XposedBridge.jar) to CLASSPATH

yujincheng08 commented 6 years ago

@lhc489773346 not a full log

j2u commented 6 years ago

log here ! https://drive.google.com/open?id=0B4iXynaKpTURSTFhbWNTeDZlbUU

Ezalor commented 6 years ago

After more than 10 minutes, it still cannot boot into system. Here is the log caught by liveboot: liveboot.log.zip

fanmengloo commented 6 years ago

@rovo89 it seems that only Mi6 and mix2 couldn't turn on. which log do you need ?rec ?