Showing posts with label android. Show all posts
Showing posts with label android. Show all posts

Friday, April 18, 2014

ERROR: doTerminate: EGL count is 2 but managed count is 1

Problem:
"doTerminate: EGL count is 2 but managed count is 1"

If you found this error from your logcat, here's how to solve it.

Solve:
Make sure to uncheck "Don't keep activities" on Developer options menu

Monday, April 15, 2013

Install Facebook Home on Nexus 3

Wanna try new facebook app? They call it Facebook Home. Well, it will give you new experiences get in touch with friends in fancy way. At least for me... hehe...

Unfortunately, they only release this app for Samsung Galaxy S3, Galaxy S4 and Note 2, and the HTC One X, One X+ and new HTC One.  But with the beauty of Android community, they port it into other phone. I tried this on my lovely Nexus 3 and it work like a charm.  I cannot guarantee this app also work on your phone. But just give it a shot.  ;)


Monday, December 17, 2012

No-Odin Root Exploit Found for Exynos 4412 and 4210


source: http://www.xda-developers.com/android/no-odin-root-exploit-found-for-exynos-4412-and-4210/

Root exploits are often quite a good thing. There are many that only work on certain individual devices. However, there are some that work on a whole bunch of devices. An example of the latter is a root exploit by XDA Recognized Developer Bin4ry that works on a variety of devices. And now we have news of a dangerous, new exploit that works on Exynos 4210- and 4412-based devices.
XDA Forum Member alephzain released the exploit that affects pretty much any device with an Exynos 4412 or 4210 processor. This includes the Samsung Galaxy Note IISamsung Galaxy S IIIMeizu MX, and the Galaxy S II, among many others. Here’s how alephzain explains the root method:
Recently discover a way to obtain root on S3 without ODIN flashing.
The security hole is in kernel, exactly with the device /dev/exynos-mem.
This device is R/W by all users and give access to all physical memory … what’s wrong with Samsung ?
Its like /dev/mem but for all.
Three libraries seems to use /dev/exynos-mem:
/system/lib/hw/camera.smdk4x12.so
/system/lib/hw/gralloc.smdk4x12.so
/system/lib/libhdmi.so
Essentially, this exploit can be used to root any device with the aforementioned processors. What’s more, this method wouldn’t require an Odin flash like most current root methods. However, this exploit could be dangerous. Not only could be used to acquire root access, but for malicious applications as well. So developers will have a fun time helping to fix the issues while using the exploit for root.
For more details, check out the original thread. Do keep in mind, though, that this is posted in the new Samsung Galaxy Note II developer-only forum, so don’t post saying thanks or anything as the thread will be used for developers to develop things only.