PMheart Posted February 8, 2017 Share Posted February 8, 2017 Working good on Asus x99 Glad to hear that. Thanks for your feedback! 1 Link to comment Share on other sites More sharing options...
jacoweb Posted February 8, 2017 Share Posted February 8, 2017 Hey guys! I wondering how i can get NVRam to work on my hack? If i save a variable and then reboot, it cant be saved. Is there any workarrounds here? See specs in my signature. 1 Link to comment Share on other sites More sharing options...
mfc88 Posted February 8, 2017 Share Posted February 8, 2017 Hey guys! I wondering how i can get NVRam to work on my hack? If i save a variable and then reboot, it cant be saved. Is there any workarrounds here? See specs in my signature. Do you have EmuVariableUefi-64.efi in your drivers64UEFI folder? If not, you'll want to it there. You can open your config.plist with Clover Configurator, go to the "Install Driver" tab and then select the above to install it into your EFI folder. If it's already there, then you'll want to use Clover EFI v2 r3xxx and check "Install for UEFI only", "Install clover in the ESP", and then toward the bottom, you'll want to select "Install RC scripts on target volume". What this will do is generate a nvram.plist, which should be housed beside the root EFI folder. Glad to hear that. Thanks for your feedback! Thank you for sharing! I'll be putting it through its paces over the weekend and following week. I want to see if its stable with my system in a 24/7 operation. 2 Link to comment Share on other sites More sharing options...
jacoweb Posted February 8, 2017 Share Posted February 8, 2017 Do you have EmuVariableUefi-64.efi in your drivers64UEFI folder? If not, you'll want to it there. You can open your config.plist with Clover Configurator, go to the "Install Driver" tab and then select the above to install it into your EFI folder. If it's already there, then you'll want to use Clover EFI v2 r3xxx and check "Install for UEFI only", "Install clover in the ESP", and then toward the bottom, you'll want to select "Install RC scripts on target volume". What this will do is generate a nvram.plist, which should be housed beside the root EFI folder. Thank you for sharing! I'll be putting it through its paces over the weekend and following week. I want to see if its stable with my system in a 24/7 operation. Thanks! Works perfect now Link to comment Share on other sites More sharing options...
Fergarth Posted February 8, 2017 Share Posted February 8, 2017 Do you have EmuVariableUefi-64.efi in your drivers64UEFI folder? If not, you'll want to it there. You can open your config.plist with Clover Configurator, go to the "Install Driver" tab and then select the above to install it into your EFI folder. If it's already there, then you'll want to use Clover EFI v2 r3xxx and check "Install for UEFI only", "Install clover in the ESP", and then toward the bottom, you'll want to select "Install RC scripts on target volume". What this will do is generate a nvram.plist, which should be housed beside the root EFI folder. Thank you for sharing! I'll be putting it through its paces over the weekend and following week. I want to see if its stable with my system in a 24/7 operation. You were very good, mcf. In each Clover installation, I also always select Emuvariable and "Install RC Scripts on target volume". Or rather, I just select, EmuVariable, OsxAptioFix and RC Scripts. Clover currently by default installs the DataHub and other drivers, but then I delete it, since I do not need it and I prefer EFI as thin as possible Link to comment Share on other sites More sharing options...
jacoweb Posted February 8, 2017 Share Posted February 8, 2017 Anyone here had any problems with Bluetooth? Apple Keyboard works perfect, but when i try to connect my Logictech Master it wont work. Works perfect on my Macbook. I use this dongle: belkin mini bluetooth v40 https://www.komplett.no/product/836955/pc-nettbrett/pc-tilbehoer/adapter/belkin-mini-bluetooth-v40-usb-adapter# Link to comment Share on other sites More sharing options...
Balamut Posted February 8, 2017 Share Posted February 8, 2017 Lags on the tab switch, scroll, windows move (beach ball), prevents the system from sleeping, slows down the system overall AND had quite few kernel crashes from Nvidia drivers when Firefox is open and any of the tabs is using gpu. What kind of issues? So far, the only issue I've had is that it's a bit slow. So I did some "about:config" tweaks and it seems to be running faster (although, admittedly, not as fast as Chrome). As for Chrome issues: I was getting a lot of update crashes. For some reason they set their update interval to something stupidly low (triggered quite a bit of update requests). Link to comment Share on other sites More sharing options...
mfc88 Posted February 8, 2017 Share Posted February 8, 2017 Lags on the tab switch, scroll, windows move (beach ball), prevents the system from sleeping, slows down the system overall AND had quite few kernel crashes from Nvidia drivers when Firefox is open and any of the tabs is using gpu. Good lawd! Makes sense not to use it. You were very good, mcf. In each Clover installation, I also always select Emuvariable and "Install RC Scripts on target volume". Or rather, I just select, EmuVariable, OsxAptioFix and RC Scripts. Clover currently by default installs the DataHub and other drivers, but then I delete it, since I do not need it and I prefer EFI as thin as possible Emuvariable is needed to store NVRAM variables (eg. nvda_drv=1). Patch RC scripts is needed if your board has problems with NVRAM variables persisting across boots (restarts/shutdowns). If you don't use any variables, then you probably don't need either. 1 Link to comment Share on other sites More sharing options...
Fergarth Posted February 8, 2017 Share Posted February 8, 2017 Emuvariable is needed to store NVRAM variables (eg. nvda_drv=1). Patch RC scripts is needed if your board has problems with NVRAM variables persisting across boots (restarts/shutdowns). If you don't use any variables, then you probably don't need either. But I know that and I also need to use it, notice what I said! "In each Clover installation, I also always select Emuvariable and" Install RC scripts on target volume ". Or rather, I just select, EmuVariable, OsxAptioFix and RC Scripts. " Link to comment Share on other sites More sharing options...
PMheart Posted February 8, 2017 Share Posted February 8, 2017 You were very good, mcf. In each Clover installation, I also always select Emuvariable and "Install RC Scripts on target volume". Or rather, I just select, EmuVariable, OsxAptioFix and RC Scripts. Clover currently by default installs the DataHub and other drivers, but then I delete it, since I do not need it and I prefer EFI as thin as possible I suggest you not do so. DataHub could be very useful in some cases. You can delete the following efi if you have no need for FireVault 2. AppleImageCodec-64.efi; AppleKeyAggregator-64.efi; FirmwareVolume-64.efi; AppleUITheme-64.efi Also. I saw that you were using kozlek's FakeSMC and thus you can delete SMCHelper-64.efi. Always keep DataHub, FSInject, HFSPlus/VboxHFS, Aptiofix, OsxFatBinaryDrv. 1 Link to comment Share on other sites More sharing options...
Fergarth Posted February 9, 2017 Share Posted February 9, 2017 I suggest you not do so. DataHub could be very useful in some cases. You can delete the following efi if you have no need for FireVault 2. AppleImageCodec-64.efi; AppleKeyAggregator-64.efi; FirmwareVolume-64.efi; AppleUITheme-64.efi Also. I saw that you were using kozlek's FakeSMC and thus you can delete SMCHelper-64.efi. Always keep DataHub, FSInject, HFSPlus/VboxHFS, Aptiofix, OsxFatBinaryDrv. Thank you again my dear friend for your suggestions and optimizations. At this moment, with your last corrections and the last Clover r4003, everything went back 100% to normal and I got back onboard ALC1150 sound. But after some tests I came to the conclusion that the system is more stable with the 4 XCPM patches. With time, I will still try to reduce them more, but as it is, all works perfect as you can see. On 64drivers, I do not feel or ever miss DataHub or the others. Because I do not use FireVault 2, but I'll take your warning into consideration . I have not yet installed the kexts in L/E, but the truth, is that they work perfectly in Clover EFI and as I like to have the OS as clean as possible, I prefer it! About TSCSync, just use it because sleep/wake works best. At times, I did some tests and without it, sleep/wake did not work correctly. For those who have hardware like mine (board, graphics card and use normal SSD), here is my EFI, thin but functional. Some of the kexts and patchs are embedded in FakeSMC, so whenever you update Clover, it's convenient to back up FakeSMC to apply later. EDIT: The MP61_freqV_w_iMac171.kext must be removed from Clover and installed in S/L/E EFI.rar 1 Link to comment Share on other sites More sharing options...
PMheart Posted February 9, 2017 Share Posted February 9, 2017 Thank you again my dear friend for your suggestions and optimizations. At this moment, with your last corrections and the last Clover r4003, everything went back 100% to normal and I got back onboard ALC1150 sound. But after some tests I came to the conclusion that the system is more stable with the 4 XCPM patches. With time, I will still try to reduce them more, but as it is, all works perfect as you can see. On 64drivers, I do not feel or ever miss DataHub or the others. Because I do not use FireVault 2, but I'll take your warning into consideration . I have not yet installed the kexts in L/E, but the truth, is that they work perfectly in Clover EFI and as I like to have the OS as clean as possible, I prefer it! About TSCSync, just use it because sleep/wake works best. At times, I did some tests and without it, sleep/wake did not work correctly. For those who have hardware like mine (board, graphics card and use normal SSD), here is my EFI, thin but functional. Some of the kexts and patchs are embedded in FakeSMC, so whenever you update Clover, it's convenient to back up FakeSMC to apply later. Nope. DataHub is not related to FV2. Actually I think it is essential! Anyways I suggest you keep it all the time. What else... Just congratulations! 1 Link to comment Share on other sites More sharing options...
mfc88 Posted February 9, 2017 Share Posted February 9, 2017 Thank you again my dear friend for your suggestions and optimizations. At this moment, with your last corrections and the last Clover r4003, everything went back 100% to normal and I got back onboard ALC1150 sound. But after some tests I came to the conclusion that the system is more stable with the 4 XCPM patches. With time, I will still try to reduce them more, but as it is, all works perfect as you can see. On 64drivers, I do not feel or ever miss DataHub or the others. Because I do not use FireVault 2, but I'll take your warning into consideration . I have not yet installed the kexts in L/E, but the truth, is that they work perfectly in Clover EFI and as I like to have the OS as clean as possible, I prefer it! About TSCSync, just use it because sleep/wake works best. At times, I did some tests and without it, sleep/wake did not work correctly. For those who have hardware like mine (board, graphics card and use normal SSD), here is my EFI, thin but functional. Some of the kexts and patchs are embedded in FakeSMC, so whenever you update Clover, it's convenient to back up FakeSMC to apply later. MP61_freqV_w_iMac171.kext ^^^ Is this injecting frequency vectors? Peaking at the code... it looks like it... so I'm assuming this is mainly to persist across updates? Also, I got HDMI/DP sound by removing AppleHDA/AppleHDA Controller patches in 10.12.3. Not sure if it'll flip back to a problem in 10.12.4. But I know that and I also need to use it, notice what I said! "In each Clover installation, I also always select Emuvariable and" Install RC scripts on target volume ". Or rather, I just select, EmuVariable, OsxAptioFix and RC Scripts. " But you don't need it (RC Scripts). You'll only need EmuVariable. Our boards keep NVRAM args across boots. 1 Link to comment Share on other sites More sharing options...
mfc88 Posted February 9, 2017 Share Posted February 9, 2017 Hi. Please excuse me. I don't have the desktops that are discussed at this topic but I have some ideas... Aptio-free2000 could be not reliable. I think OsxAptioFixDrv-64.efi (Aptio fix v1) can be a better choice. But I don't think the vanilla one which is contained in Clover pkg installer is okay enough cuz it has only too low memory size... And thus I enlarged it. (Enlarged to 512Mb instead of the original 128Mb.) Here it is. OsxAptioFixDrv-64.efi.zip To use this, some important notes: 1. Aptiofix v1 is not compatible with hibernation. So don't enable hibernating at all! (IMHO for desktops we always don't need it...) To disable hibernation, please run the following command in Terminal: sudo pmset -a hibernatemode 0 2. You need to replace my OsxAptioFixDrv-64.efi after updating Clover via Clover PKG Installer. Or try my simple trick: 1) Rename OsxAptioFixDrv-64.efi to any name with *.efi, for me I renamed it to OsxAptioFixDrv.efi. (Removed '-64') 2) Don't install OsxAptioFixDrv-64.efi from Clover PKG. Like this: Snip20170208_3.png Note: You must place my OsxAptioFixDrv-64.efi (and renamed to OsxAptioFixDrv.efi) into /EFI/CLOVER/drivers64UEFI !!! 3. Remove all other *Aptiofix* drivers! Does this require a minimum clover efi v2 version (currently running r3859). Link to comment Share on other sites More sharing options...
PMheart Posted February 9, 2017 Share Posted February 9, 2017 MP61_freqV_w_iMac171.kext ^^^ Is this injecting frequency vectors? Peaking at the code... it looks like it... so I'm assuming this is mainly to persist across updates? Yes. The injector mainly targets at injecting FrequencyVectors on-the-fly. Does this require a minimum clover efi v2 version (currently running r3859). No 1 Link to comment Share on other sites More sharing options...
PMheart Posted February 9, 2017 Share Posted February 9, 2017 Just noticed, in my system.log console (triggering every 10 seconds): Feb 8 20:38:03 M6Ds-Mac-Pro com.apple.xpc.launchd[1] (com.oracle.oss.mysql.mysqld): Service only ran for 0 seconds. Pushing respawn out by 10 seconds. Feb 8 20:38:13 M6Ds-Mac-Pro xpcproxy[1189]: libcoreservices: _dirhelper_userdir: 523: bootstrap_look_up returned 268435459 Feb 8 20:38:13 M6Ds-Mac-Pro com.apple.xpc.launchd[1] (com.oracle.oss.mysql.mysqld[1189]): Service could not initialize: Unable to set current working directory. error = 2: No such file or directory, path = /usr/local/mysql: 16D32: xpcproxy + 11211 [1356][286733C4-18D9-396D-B01B-A096BE5B1DC1]: 0x2 Feb 8 20:38:13 M6Ds-Mac-Pro com.apple.xpc.launchd[1] (com.oracle.oss.mysql.mysqld): Service only ran for 0 seconds. Pushing respawn out by 10 seconds. Feb 8 20:38:23 M6Ds-Mac-Pro xpcproxy[1192]: libcoreservices: _dirhelper_userdir: 523: bootstrap_look_up returned 268435459 Feb 8 20:38:23 M6Ds-Mac-Pro com.apple.xpc.launchd[1] (com.oracle.oss.mysql.mysqld[1192]): Service could not initialize: Unable to set current working directory. error = 2: No such file or directory, path = /usr/local/mysql: 16D32: xpcproxy + 11211 [1356][286733C4-18D9-396D-B01B-A096BE5B1DC1]: 0x2 Feb 8 20:38:23 M6Ds-Mac-Pro com.apple.xpc.launchd[1] (com.oracle.oss.mysql.mysqld): Service only ran for 0 seconds. Pushing respawn out by 10 seconds. Feb 8 20:38:33 M6Ds-Mac-Pro xpcproxy[1194]: libcoreservices: _dirhelper_userdir: 523: bootstrap_look_up returned 268435459 Feb 8 20:38:33 M6Ds-Mac-Pro com.apple.xpc.launchd[1] (com.oracle.oss.mysql.mysqld[1194]): Service could not initialize: Unable to set current working directory. It seems that this is related to mysql? Link to comment Share on other sites More sharing options...
mfc88 Posted February 9, 2017 Share Posted February 9, 2017 It seems that this is related to mysql? Just noticed that as I wrote it... my bad. Problem was left over from a mysql server uninstallation... 1 Link to comment Share on other sites More sharing options...
PMheart Posted February 9, 2017 Share Posted February 9, 2017 Just noticed that as I wrote it... my bad. Problem was left over from a mysql server uninstallation... That's all right. Glad to hear that. Link to comment Share on other sites More sharing options...
mfc88 Posted February 9, 2017 Share Posted February 9, 2017 That's all right. Glad to hear that. Got a KP on boot into OS. Unfortunately, I forgot to to copy/paste it from dmesg... will update if it happens again! Link to comment Share on other sites More sharing options...
PMheart Posted February 9, 2017 Share Posted February 9, 2017 Got a KP on boot into OS. Unfortunately, I forgot to to copy/paste it from dmesg... will update if it happens again!Waiting for your test here :-) Link to comment Share on other sites More sharing options...
Fergarth Posted February 9, 2017 Share Posted February 9, 2017 Finished the update for Sierra 12.4 beta 2 (16E154a) and Clover r4003.Everything works fine and stable except for NvidiaWebDrive. With the plist edited for 16E it recognizes the graphic card and has some resolutions, but without full acceleration...PMheart, as you suggested, I installed your MP61_freqV_w_iMac171.kext on SLE and erased it on Clover. And now it seems to me that it's your kext that's running the FreqVectors. I installed it before the OS update and yes, it survived Thanks friend 2 Link to comment Share on other sites More sharing options...
mfc88 Posted February 9, 2017 Share Posted February 9, 2017 Still testing PMheart's OsxAptioFixDrv-64.efi, so far so good. Just a side note about Google Chrome... for some reason, it defaults to check for an update every single bleepin' hour. Way overkill! Run this command in terminal to reduce it to every 24 hours: defaults write com.google.Keystone.Agent checkInterval 24 However, it'll still check for updates when it opens from dock. Recommend to uninstall it if you're like me and don't like things taking up unnecessary bandwidth/computer resources. Link to comment Share on other sites More sharing options...
PMheart Posted February 10, 2017 Share Posted February 10, 2017 Finished the update for Sierra 12.4 beta 2 (16E154a) and Clover r4003. Everything works fine and stable except for NvidiaWebDrive. With the plist edited for 16E it recognizes the graphic card and has some resolutions, but without full acceleration... PMheart, as you suggested, I installed your MP61_freqV_w_iMac171.kext on SLE and erased it on Clover. And now it seems to me that it's your kext that's running the FreqVectors. I installed it before the OS update and yes, it survived Thanks friend Congratulations Fergarth! 1 Link to comment Share on other sites More sharing options...
mfc88 Posted February 11, 2017 Share Posted February 11, 2017 Waiting for your test here :-) Been testing for about 2 solid days now. The only time I get kernel panics (so far) is when I switch between OsxAptioFixDrv-64 and OsxAptioFix2Drv-free2000 when shutting down. Instead of shutting down, it KPs then restarts. Otherwise, it's been stable so far. Unfortunately, I can't get the log for the KP, because it wipes clean thanks to these errors during every single boot: SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: bird(270) deny(1) mach-lookup com.apple.metadata.mds.legacy SandboxViolation: fontd(298) deny(1) file-issue-extension /Network/Library SandboxViolation: CalendarAgent(308) allow(0) mach-register com.apple.CalendarStore.lock.init SandboxViolation: fmfd(349) deny(1) mach-lookup com.apple.securityd.xpc SandboxViolation: cloudd(353) deny(1) mach-lookup com.apple.coreservices.launchservicesd SandboxViolation: fmfd(349) deny(1) file-write-create /Users/m6d/Library/Keychains/login.keychain-db.sb-48feff08-HPDMJ4 utun_start: ifnet_disable_output returned error 12 SandboxViolation: storeassetd(369) deny(1) mach-lookup com.apple.lsd.modifydb SandboxViolation: storeassetd(369) deny(1) mach-lookup com.apple.lsd.modifydb SandboxViolation: fontd(298) deny(1) file-issue-extension /Network/Library IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked. IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked. SandboxViolation: softwareupdate_n(407) deny(1) file-read-metadata /Users/m6d SandboxViolation: fontd(298) deny(1) file-issue-extension /Network/Library Link to comment Share on other sites More sharing options...
PMheart Posted February 11, 2017 Share Posted February 11, 2017 Been testing for about 2 solid days now. The only time I get kernel panics (so far) is when I switch between OsxAptioFixDrv-64 and OsxAptioFix2Drv-free2000 when shutting down. Instead of shutting down, it KPs then restarts. Otherwise, it's been stable so far. Unfortunately, I can't get the log for the KP, because it wipes clean thanks to these errors during every single boot: SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders SandboxViolation: bird(270) deny(1) mach-lookup com.apple.metadata.mds.legacy SandboxViolation: fontd(298) deny(1) file-issue-extension /Network/Library SandboxViolation: CalendarAgent(308) allow(0) mach-register com.apple.CalendarStore.lock.init SandboxViolation: fmfd(349) deny(1) mach-lookup com.apple.securityd.xpc SandboxViolation: cloudd(353) deny(1) mach-lookup com.apple.coreservices.launchservicesd SandboxViolation: fmfd(349) deny(1) file-write-create /Users/m6d/Library/Keychains/login.keychain-db.sb-48feff08-HPDMJ4 utun_start: ifnet_disable_output returned error 12 SandboxViolation: storeassetd(369) deny(1) mach-lookup com.apple.lsd.modifydb SandboxViolation: storeassetd(369) deny(1) mach-lookup com.apple.lsd.modifydb SandboxViolation: fontd(298) deny(1) file-issue-extension /Network/Library IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked. IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked. SandboxViolation: softwareupdate_n(407) deny(1) file-read-metadata /Users/m6d SandboxViolation: fontd(298) deny(1) file-issue-extension /Network/Library Sorry I can't tell you what's the exact problem according to your posted log... But anyway. I think my AptioFix v1 is more stable... Link to comment Share on other sites More sharing options...
Recommended Posts