Related
Hi everyone,
I''m facing a problem with my app. I alwys tested it with Android 4.1.2 on my galaxy note and it work perfectly, but since some days I updated my phone to android 4.3 and the application stopped to work: it works but it seems there is a problem with database. the view is blank and it seems that the db is empty.
I think theo problem is due to path and multi-users (available since Android 4.2, doesn't work also on Galaxy S4 of my friend with 4.2.2).
I tried to find a solution but doesn't found anything.
Even on the debug I haven't useful log. the only error I receive is the following:
API call with unopened database connection pointer
I think is due to a permission of the access the the right path, but it's very strange.
My phone is not rooted.
thank you for the help.
Maybe share the source code, where you open the db file?
shows us your source code
Hi,
i have strange problems using GCM service over xmpp
i just use the sample code provided bei Google here:
developer.android.com/google/gcm/ccs.html#implement
sometimes this code works fine, and i get the notification on my device
but sometime i just run into a SASLError:
Code:
SASL authentication PLAIN failed: text:
the cause for this error is, that Google GCM server returned an error:
Code:
text
which is unknown in the smack SASLError enum.
so first i don't know what the root cause is.
when i run this code in a loop, i can see that for n request in a row i receive this error, then after some time, the error is gone and messages are send.
again after some time, i receive the error again.
couldn't explain why,
could it be that there are some Google Servers not working properly ?
when i use the test url:
Code:
gcm-preprod.googleapis.com:5236
at least i don't get the SASLError, instead i just get not-authorized.
but the behavior is the same, n requests works n next requests doesn't
did someone have any idea why this happens ? or having the same problems ?
thanks a lot
https://developers.google.com/android/images#shamu
Direct link: https://dl.google.com/dl/android/aosp/shamu-nbd91p-factory-987282ff.zip
anything different?
Not really, but it is nice to see the Nexus 6 get a second Nougat image and update. There is also a Marshmellow update for the Nexus 6 with the November security patch as well. Personally, I think N runs a little better on the Nexus 6, especially with the Pixel Launcher that can be found in the Themes and Apps area.
bootloader is different
Anyone want to pull radio and bootloader and post just that? Work blocks dl.google.com and drive. :'(
Sent from my iPhone 6+s using Tapatalk
SynisterWolf said:
Anyone want to pull radio and bootloader and post just that? Work blocks dl.google.com and drive. :'(
Sent from my iPhone 6+s using Tapatalk
Click to expand...
Click to collapse
Attached bootloader to this post, but here is a second link: https://www.dropbox.com/s/f4olqe54mab8dp6/bootloader-shamu-moto-apq8084-72.01.img?dl=0
Radio: https://www.dropbox.com/s/3ji28xwkebk2siq/radio-shamu-d4.01-9625-05.42+fsg-9625-02.113.img?dl=0
Radio is the same.
AOSP Changelog for NBD91P/7.0.0_r19 from NBD90Z/7.0.0_r14 for Shamu:
project build/
bec256f NBD91P
cbd12e9 NBF25
86f539b NBD91O
8d4b434 NBF24
ab07e94 Update security string to 2016-11-06 for nyc
b253a56 NBD91N
18d1ae4 NBD91M
0ffb924 NDB91M
99b9cfa NBD91L
9f47494 NBD91K
bc5db48 NBE92
2efe2e5 NBD91J
5c85641 NBD91I
91eaf6a NBD91H
2f25f53 NBD91G
79af65b NBD91F
52257ea NBD91E
2c0132f Updating security string to 2016-11-05 on nyc-dev
b65367b Updating Security String to 2016-11-01 on nyc-dev
10eaafa NBE89
e060660 NBD91D
5bbdbab NBD91C
4aaa5d8 NBD91B
8547561 Updating security string to 2016-11-05 on nyc-dev
c806aef Updating Security String to 2016-11-01 on nyc-dev
project device/moto/shamu/
7bb3812 shamu: remove discard in fstab
a84b0eb Revert "Path fix for backend connection to FE upon call disconnection"
29a0aaa Revert "Path fix for backend connection to FE upon call disconnection"
6427d7c allow empty
4b8d27e Revert "Path fix for backend connection to FE upon call disconnection"
project external/chromium-webview/
fe818f1 resolve merge conflicts of e9d901a to nyc-dev
a59bede resolve merge conflicts of e9d901a to nyc-dev
project external/conscrypt/
87d7551 Fix typo in name of des-ede mapping
9e2cb54 Fix typo in name of des-ede mapping
project external/expat/
a300f14 Security Vulnerability - CVE-2012-6702 and CVE-2016-5300
f193e66 Security Vulnerability - CVE-2012-6702 and CVE-2016-5300
project external/libavc/
1136e78 Decoder: Fixes for handling errors in multi-slice MB Aff streams
8b2f1c9 Fix in the case of invalid SPS PPS
8a9474c Decoder: Fixes for handling errors in multi-slice MB Aff streams
0f6a66d Fix in the case of invalid SPS PPS
project external/skia/
3272ed3 Fix rewinding bug in SkJpegCodec (cherry picked from Skia)
project frameworks/av/
5c15486 IOMX: do not clear buffer if it's allocated by component
c283e75 IOMX: allow configuration after going to loaded state
1f3fb66 IOMX: do not convert ANWB to gralloc source in emptyBuffer
9c55146 IOMX: do not clear buffer if it's allocated by component
eeedb2d IOMX: allow configuration after going to loaded state
d06c60b IOMX: do not convert ANWB to gralloc source in emptyBuffer
36f4e00 Limit mp4 atom size to something reasonable
604b74f SampleIterator: clear members on seekTo error
2d500e6 Check mprotect result
5e4602b OMXNodeInstance: sanity check portIndex.
5888c28 Fix free-after-use for MediaHTTP
8a38d3a Radio: get service by value.
a03e793 SoundTrigger: get service by value.
09f8f64 Fix stack content leak vulnerability in mediaserver
d25dee8 Fix potential overflow in Visualizer effect
6f3283e DO NOT MERGE: IOMX: work against metadata buffer spoofing
34b14ca Limit mp4 atom size to something reasonable
075c936 SampleIterator: clear members on seekTo error
380e846 Check mprotect result
cf4e570 OMXNodeInstance: sanity check portIndex.
acb30c5 Fix free-after-use for MediaHTTP
ec795b4 Radio: get service by value.
cb129c1 SoundTrigger: get service by value.
eaaf2c6 Fix stack content leak vulnerability in mediaserver
4b38366 Fix potential overflow in Visualizer effect
707f2a4 DO NOT MERGE: IOMX: work against metadata buffer spoofing
project frameworks/base/
cd2f75a LocationManager - Handle Shutdown for right User
435b97b DO NOT MERGE ANYWHERE: ImageReader: Add discardFreeBuffers method
7d96a1a Fix NPE for WifiConfiguration in AccessPoint.
be965e1 DO NOT MERGE - fix truncated boot sound
e612ba0 LocationManager - Handle Shutdown for right User
63d556a DO NOT MERGE ANYWHERE: ImageReader: Add discardFreeBuffers method
76d2d22 Avoid crashing when downloading MitM'd PAC that is too big am: 7d2198b586 am: 9c1cb7a273 am: 6634e90ad7 am: 66ee2296a9
03cc966 Use "all_downloads" instead of "my_downloads".
20384cc DO NOT MERGE Check caller for sending media key to global priority session
7beb6c2 Fix build break due to automerge of 7d2198b5
c46705b Catch all exceptions when parsing IME meta data
084a5b4 Fix deadlock in AcitivityManagerService.
072b4bd Only return password for account session flow if the caller is signed with system key and have get_password permission.
7e2d478 Ensure munmap matches mmap
1e70481 Fix setPairingConfirmation permissions issue (2/2)
41cdd05 DO NOT MERGE) ExifInterface: Make saveAttributes throw an exception before change
d20378f Backport changes to whitelist sockets opened by the zygote.
d3c1438 DO NOT MERGE Stop work challenge freeform bypass
b8c8f07 DO NOT MERGE - fix truncated boot sound
6db2c83 LocationManager - Handle Shutdown for right User
af7c2a7 Avoid crashing when downloading MitM'd PAC that is too big am: 7d2198b586 am: 9c1cb7a273 am: 6634e90ad7 am: 66ee2296a9
8dacd6f DO NOT MERGE Check caller for sending media key to global priority session
a87d513 Fix build break due to automerge of 7d2198b5
f30cfcb Catch all exceptions when parsing IME meta data
df4b2f6 Fix deadlock in AcitivityManagerService.
aa8226a Only return password for account session flow if the caller is signed with system key and have get_password permission.
7dc3969 Ensure munmap matches mmap
5dd5769 Fix setPairingConfirmation permissions issue (2/2)
6ff2f44 DO NOT MERGE) ExifInterface: Make saveAttributes throw an exception before change
388c9b2 Backport changes to whitelist sockets opened by the zygote.
63c82e4 DO NOT MERGE Stop work challenge freeform bypass
df0de20 Use "all_downloads" instead of "my_downloads".
project frameworks/native/
1a54d9d DO NOT MERGE ANYWHERE: BufferQueue consumers: Add discardFreeBuffer method
8b2de34 DO NOT MERGE ANYWHERE: BufferQueue consumers: Add discardFreeBuffer method
fe92e27 DO NOT MERGE ANYWHERE: BufferQueue consumers: Add discardFreeBuffer method
project frameworks/opt/telephony/
27af576 Remove flag from intent sent from Catservice to StkApp.
423614c Remove flag from intent sent from Catservice to StkApp.
8ac0b81 Remove flag from intent sent from Catservice to StkApp.
project hardware/qcom/audio/
cd259b2 Fix potential overflow in Visualizer effect
e239efc Fix potential overflow in Visualizer effect
project libcore/
2ff5d78 sun.security.util: check lengths in DER encoding are non-negative
8376309 sun.security.util: check lengths in DER encoding are non-negative
project packages/apps/Bluetooth/
3f9497e Fix setPairingConfirmation permissions issue (1/2)
46cfeaa Fix setPairingConfirmation permissions issue (1/2)
project packages/apps/Launcher3/
b4810a3 Preventing a shortcut which requires permissions from being added to homescreen
93a28fa Preventing a shortcut which requires permissions from being added to homescreen
project packages/apps/Settings/
f04e4b7 Remove help links when device is not provisioned. DO NOT MERGE
9058c8c Null check intent before starting "learn more".
0b493c0 Remove help links when device is not provisioned. DO NOT MERGE
31d9b19 Null check intent before starting "learn more".
project packages/apps/Stk/
81eb827 Make stk app FBE aware.
aadea71 Make stk app FBE aware.
26159e7 Make stk app FBE aware.
project packages/providers/DownloadProvider/
fad2923 Enforce calling identity before clearing.
1db23ff Enforce calling identity before clearing.
project system/core/
87d2f2d liblog: add __android_log_close()
a3afe4b liblog: add __android_log_close()
project system/media/
0a1cd07 Fix potential overflow in Visualizer effect
07fa6a0 Fix potential overflow in Visualizer effect
project system/sepolicy/
68e9f19 DO NOT MERGE - fix truncated boot sound.
d2f8104 Allow the zygote to stat all files it opens.
d2d935b DO NOT MERGE - fix truncated boot sound.
539f03c Allow the zygote to stat all files it opens.
Is the Bluetooth bug fixed in this one?
Sent from my Nexus 6 using XDA-Developers mobile app
sorry but after fresh factory install can we root NBD91P? which supersu we should be using?
sunandoghosh said:
sorry but after fresh factory install can we root NBD91P? which supersu we should be using?
Click to expand...
Click to collapse
I did fresh install and rooted with SuperSU 2.78 SR3
can be found here: http://forum.xda-developers.com/apps/supersu/2014-09-02-supersu-v2-05-t2868133
TMG1961 said:
I did fresh install and rooted with SuperSU 2.78 SR3
can be found here: http://forum.xda-developers.com/apps/supersu/2014-09-02-supersu-v2-05-t2868133
Click to expand...
Click to collapse
I have not been able to get SuperSU 2.78 SR2 or SuperSU 2.78 SR3 to work on on the current (NBD91P) or initial (NBD90Z) releases of Nougat. SR1 works without issue. I can't figure out what I am doing wrong.
Thank you seniors for replying but based on last two replies i would request for reconfirmation...just scared at the thought of doing whole process again. Kindly confirm.
alryder said:
I have not been able to get SuperSU 2.78 SR2 or SuperSU 2.78 SR3 to work on on the current (NBD91P) or initial (NBD90Z) releases of Nougat. SR1 works without issue. I can't figure out what I am doing wrong.
Click to expand...
Click to collapse
I assume you finish the rom installation and then install twrp and flash supersu?
Never had any problems with installing supersu so have no experience with it not working
Curious. I currently have TWRP installed and am running the stock flashable NDB90Z build. Could I flash the OP zip and get back on with the OTA updates? I no longer care about superuser, root, and such. Thanks!
Wifi bug fix!!!
I am also interested to know if this fixes the wifi bug!
Thanks,
sandip_909 said:
Is the Bluetooth bug fixed in this one?
Sent from my Nexus 6 using XDA-Developers mobile app
Click to expand...
Click to collapse
I'm hoping this fixes my one and only major issue on 7.0: after certain usage the phone gets extremely sluggish until reboot. Happens every day or two.
Never had this on Marshmallow. Running stock no modifications after a full wipe, clean flash of 7.0, then full wipe again. Redid all settings manually.
Anyone else?
TMG1961 said:
I assume you finish the rom installation and then install twrp and flash supersu?
Never had any problems with installing supersu so have no experience with it not working
Click to expand...
Click to collapse
Yep, that's exactly what I do. It installs fine and my phone boots without issue but none of my apps are able to get root access. It's really weird.
After upgrading to this build I can't apple substratum themes anymore. Doing so will result in a bootloop and I have to remove the overlay folder with TWRP. Is this a general issue with substratum?
TMG1961 said:
I assume you finish the rom installation and then install twrp and flash supersu?
Never had any problems with installing supersu so have no experience with it not working
Click to expand...
Click to collapse
alryder said:
Yep, that's exactly what I do. It installs fine and my phone boots without issue but none of my apps are able to get root access. It's really weird.
Click to expand...
Click to collapse
I installed SR3 again, the phone rebooted twice which is normal from past installs I have done, but still no root access after fully booted. Manually rebooted again and I now have root access with SR3. I don't know why the extra reboot was needed but I'm glad its working now.
As title...
https://developers.google.com/android/ota#shamu - OTA image
https://developers.google.com/android/images#shamu - factory image
is in call echo while on speakerphone fixed?
I'm afraid I can't answer that - I've switched to Pure Nexus, and I've posted just for information.
Despite the promise from Google (https://code.google.com/p/android/i...tars Reporter Opened&groupby=&sort=&id=231764) in post 178 dated February 7th, there is still no update on progress, so maybe another member can confirm the fix after he/she installs it...?
FLaMpeR said:
is in call echo while on speakerphone fixed?
Click to expand...
Click to collapse
I'm on PN as well so can't tell you from personal experience...but a post on the Google support forum says it fixed the speakerphone echo.
Users on Reddit have said that speakerphone issue has been resolved. Audio is now only coming from the top speaker and no longer on both speakers.
Does someone has experience with ADB sideload with TWRP Recovery?
Yes. Extremely simple, no loss of data.
Has anyone already checked if update has new bootloader or radio?
Candy[MAN] said:
Users on Reddit have said that speakerphone issue has been resolved. Audio is now only coming from the top speaker and no longer on both speakers.
Click to expand...
Click to collapse
There seems to be some disagreement on the N6 subreddit as to whether it's actually fixed.
Loudspeaker fix also confirmed in this Google support thread:
https://code.google.com/p/android/i...tars Reporter Opened&groupby=&sort=&id=231764
"Just finished side loading Nexus 6 March security update N6F26U. Tested and echo problem is fixed while on speakerphone."
At last...
Nice!
Manual flash factory image (minus wipe, removed -w flag from flash-all.sh)and can confirm speakerphone is back to normal.
abaddon37 said:
Has anyone already checked if update has new bootloader or radio?
Click to expand...
Click to collapse
No changes to either bootloader or the radio.
Is the Bluetooth disconnecting bug fixed?
Hurray!!! Can't believe it took this long. I'm on Dirty Unicorns ROM which as many other Roms has the echo fix But glad to see that Google finally fixed it on stock too.
dberthia said:
There seems to be some disagreement on the N6 subreddit as to whether it's actually fixed.
Click to expand...
Click to collapse
custom kernels do not include the fix yet so flashing one will cause the issue to return.
dahawthorne said:
Loudspeaker fix also confirmed in this Google support thread:
https://code.google.com/p/android/i...tars Reporter Opened&groupby=&sort=&id=231764
"Just finished side loading Nexus 6 March security update N6F26U. Tested and echo problem is fixed while on speakerphone."
At last...
Click to expand...
Click to collapse
Good news! Though it seems that our N6 got EOL on 7.1.1, they left it fixed finally...
Note two bug fixes specifically for Nexus 6 shamu.
From N6F26R\7.1.1_r17 to N6F26U\7.1.1_r28
.
project bootable/recovery/
2c6c23f Add a checker for signature boundary in verifier
project build/
e22d5db N6F26U
722ccd6 N6F26T
88463b6 N6F26S
a6da47e Updating Security String to 2017-03-05 on nyc-dev
9aee59b Updating Security String to 2017-03-01 on nyc-dev
project device/moto/shamu/
67b5be4 Revert "Revert "Revert "Path fix for backend connection to FE upon call disconnection"""
8e88ad7 Revert "audio: fix headset + speaker path"
project external/boringssl/
54bf62a Rewrite BN_bn2dec.
project external/libavc/
6aac820 Decoder: Padded gau1_ih264d_top_left_mb_part_indx_mod to avoid an out of bound read
0a4463e Decoder: Fix in checking first_mb_in_slice
4a61d15 Decoder: Increase memory allocation for weights & offsets for interlaced clips
19814b7 Decoder: Fixed DoS in header decode when no PPS is present
0340381 Decoder: Initialize ps_cur_slice->u1_mbaff_frame_flag correctly for error cases
85c0ec4 Decoder: Fixed an out of bound access while parsing SEI
21851ea Decoder: Fix in MB count in MBAff error handling
aa78b96 Call ih264d_deblock_display only for valid process calls
ec9ab83 Decoder: Fixed allocation of ps_dec->ps_nbr_mb_row
fd9a12f Decoder: Fixed cur_mb_info initialization in error cases
a467b1f Decoder: Fix in error concealment in the case of Mbaff clips
0e8b1df Decoder: Fix in the case of error in the first MB in frame.
c4f1525 Decoder: Fix in returning incomplete frame error
3695b6b Decoder: Fix initialization of ps_next_dpb during reference list creation
project external/libgdx/
fba04a5 Fix buffer overflows
project external/libhevc/
dfa7251 Added check for invalid log2_max_transform_block_size in SPS
project external/libnfc-nci/
c67cc6a Fix native crash in nfc_ncif_proc_activate
project external/libvpx/
6f5927d libvpx: Cherry-pick 1961a92 from upstream
project external/skia/
8888cbf DO NOT MERGE Do not create an SkRawCodec with zero dimensions
project frameworks/av/
5cabe32 avc_utils: skip empty NALs from malformed bistreams
8415635 DO NOT MERGE - audioflinger: fix recursive mutex lock in EffectHandle.
bc62c08 Don't initialize sync sample parameters until the end
22e26d8 DO NOT MERGE - improve audio effect framwework thread safety
project frameworks/base/
7261a92 Fix issue with saving admins before finishing loading.
618391b resolve merge conflicts of ad4aa1ce7d3d to nyc-mr1-dev
d22261f Fix exploit where can hide the fact that a location was mocked am: a206a0f17e am: d417e54872 am: 3380a77516 am: 0a8978f04b am: 1684e5f344 am: d28eef0cc2 am: 1f458fdc66 am: d82f8a67fc am: 1ac8affd51 am: 56098f81b6 am: 7cec76de0f am: 2da05d0f9e
f4bed68 [DO NOT MERGE] Prevent crash from early Toast surface destruction.
5f621b5 Add @guardedBy annotation to PersistentDataBlockService#mIsWritable.
1c4d535 Prevent writing to FRP partition during factory reset.
project frameworks/ex/
7c824f1 resolve merge conflicts of 89cdd4cb to mnc-dev
project frameworks/opt/net/wifi/
41c42f5 configparse: do not delete passpoint configuration file
project packages/apps/CertInstaller/
1ad3b1e WifiInstaller: add permission for access downloaded files
1166ca8 WifiInstaller: remove the installation file
project packages/apps/Messaging/
3f98211 32764144 Security Vulnerability - heap buffer overflow in libgiftranscode.so in colorMap->Colors[colorIndex]
8ba22b4 33388925 Mismatched new vs delete in framesequence library
project packages/apps/PackageInstaller/
5c49b6b Prioritize package installer intent filter
anyone confirm OTA update status by each region ? Not yet in Vietnam now
Last month, I did not receive the Feb security OTA for 10 days (pure stock, no root, just unlocked bootloader) and decided to flash the whole image again. But flash all means need to backup and restore all, we should not do it every months like this, just want to check how many days we can receive the OTA after its official announcement
I noticed another very minor fix. Upon restarting, I have to enter a pin to finish turning on the phone. For the last several months, when the number pad comes up it would appear for 1-2 seconds, disappear briefly, and then return. Now with this update it is back to just appearing once, no bug.
Dare I say it, but it seems like Google has finally addressed all bugs on our venerable N6? Bluetooth turns on upon restart, speaker-echo is fixed, this update seems to be a true daily driver. Well done Google!
How can I check which Android Security Patches I am running under LineageOS? Under the "Trust" menu there is a section called "Android Security Patches", but other than telling me they are up-to-date I cannot find the current version that is installed. I would really like to be able manually verify whether I am running the August patches, since there seems to be a very severe WiFi vulnerability for Snapdragon devices currently: https://www.zdnet.com/article/qualp...chips-let-hackers-compromise-android-devices/
Also, I tried asking the same question on the LineageOS reddit, but it was automatically deleted. Does anyone know what's up with that?
In settings tap about phone and android level. There you see android and vendor levels. The linked article says: "The first issue was patched with a code fix in the Android operating system source code, while the second bug was patched with a code fix in Qualcomm's closed-source firmware that ships on a limited set of devices"
Closed source firmware refers to vendor level, that is typically far to old.