Jump to content

[Guide] Mac OSX 10.12 and 10.13 with X99 Broadwell-E family and Haswell-E family


nmano
 Share

1,954 posts in this topic

Recommended Posts

Hey guys!

 

I wondering how i can get NVRam to work on my hack?

If i save a variable and then reboot, it cant be saved. Is there any workarrounds here?

 

See specs in my signature.

Do you have EmuVariableUefi-64.efi in your drivers64UEFI folder? If not, you'll want to it there. You can open your config.plist with Clover Configurator, go to the "Install Driver" tab and then select the above to install it into your EFI folder.

 

If it's already there, then you'll want to use Clover EFI v2 r3xxx and check "Install for UEFI only", "Install clover in the ESP", and then toward the bottom, you'll want to select "Install RC scripts on target volume". What this will do is generate a nvram.plist, which should be housed beside the root EFI folder.

kV91I71.png

Glad to hear that. Thanks for your feedback!

Thank you for sharing! I'll be putting it through its paces over the weekend and following week. I want to see if its stable with my system in a 24/7 operation.

  • Like 2
Link to comment
Share on other sites

Do you have EmuVariableUefi-64.efi in your drivers64UEFI folder? If not, you'll want to it there. You can open your config.plist with Clover Configurator, go to the "Install Driver" tab and then select the above to install it into your EFI folder.

 

If it's already there, then you'll want to use Clover EFI v2 r3xxx and check "Install for UEFI only", "Install clover in the ESP", and then toward the bottom, you'll want to select "Install RC scripts on target volume". What this will do is generate a nvram.plist, which should be housed beside the root EFI folder.

kV91I71.png

Thank you for sharing! I'll be putting it through its paces over the weekend and following week. I want to see if its stable with my system in a 24/7 operation.

 

Thanks! Works perfect now :)

Link to comment
Share on other sites

Do you have EmuVariableUefi-64.efi in your drivers64UEFI folder? If not, you'll want to it there. You can open your config.plist with Clover Configurator, go to the "Install Driver" tab and then select the above to install it into your EFI folder.

 

If it's already there, then you'll want to use Clover EFI v2 r3xxx and check "Install for UEFI only", "Install clover in the ESP", and then toward the bottom, you'll want to select "Install RC scripts on target volume". What this will do is generate a nvram.plist, which should be housed beside the root EFI folder.

kV91I71.png

Thank you for sharing! I'll be putting it through its paces over the weekend and following week. I want to see if its stable with my system in a 24/7 operation.

You were very good, mcf.

In each Clover installation, I also always select Emuvariable and "Install RC Scripts on target volume".

Or rather, I just select, EmuVariable, OsxAptioFix and RC Scripts.

Clover currently by default installs the DataHub and other drivers, but then I delete it, since I do not need it and I prefer EFI as thin as possible :P 

Link to comment
Share on other sites

Anyone here had any problems with Bluetooth? Apple Keyboard works perfect, but when i try to connect my

Logictech Master it wont work. Works perfect on my Macbook.

 

I use this dongle:

 

belkin mini bluetooth v40

 

https://www.komplett.no/product/836955/pc-nettbrett/pc-tilbehoer/adapter/belkin-mini-bluetooth-v40-usb-adapter#

Link to comment
Share on other sites

Lags on the tab switch, scroll, windows move (beach ball), prevents the system from sleeping, slows down the system overall AND had quite few kernel crashes from Nvidia drivers when Firefox is open and any of the tabs is using gpu.

 

 

What kind of issues?

 

So far, the only issue I've had is that it's a bit slow. So I did some "about:config" tweaks and it seems to be running faster (although, admittedly, not as fast as Chrome).

 

As for Chrome issues: I was getting a lot of update crashes. For some reason they set their update interval to something stupidly low (triggered quite a bit of update requests).

Link to comment
Share on other sites

Lags on the tab switch, scroll, windows move (beach ball), prevents the system from sleeping, slows down the system overall AND had quite few kernel crashes from Nvidia drivers when Firefox is open and any of the tabs is using gpu.

Good lawd! Makes sense not to use it. :hysterical:

You were very good, mcf.

In each Clover installation, I also always select Emuvariable and "Install RC Scripts on target volume".

Or rather, I just select, EmuVariable, OsxAptioFix and RC Scripts.

Clover currently by default installs the DataHub and other drivers, but then I delete it, since I do not need it and I prefer EFI as thin as possible :P 

Emuvariable is needed to store NVRAM variables (eg. nvda_drv=1). Patch RC scripts is needed if your board has problems with NVRAM variables persisting across boots (restarts/shutdowns). If you don't use any variables, then you probably don't need either.

  • Like 1
Link to comment
Share on other sites

Emuvariable is needed to store NVRAM variables (eg. nvda_drv=1). Patch RC scripts is needed if your board has problems with NVRAM variables persisting across boots (restarts/shutdowns). If you don't use any variables, then you probably don't need either.

But I know that and I also need to use it, notice what I said!

"In each Clover installation, I also always select Emuvariable and" Install RC scripts on target volume ".

Or rather, I just select, EmuVariable, OsxAptioFix and RC Scripts. " :)

Link to comment
Share on other sites

You were very good, mcf.

In each Clover installation, I also always select Emuvariable and "Install RC Scripts on target volume".

Or rather, I just select, EmuVariable, OsxAptioFix and RC Scripts.

Clover currently by default installs the DataHub and other drivers, but then I delete it, since I do not need it and I prefer EFI as thin as possible :P

I suggest you not do so. DataHub could be very useful in some cases.

You can delete the following efi if you have no need for FireVault 2.

  AppleImageCodec-64.efi; AppleKeyAggregator-64.efi; FirmwareVolume-64.efi; AppleUITheme-64.efi

Also. I saw that you were using kozlek's FakeSMC and thus you can delete SMCHelper-64.efi.

Always keep DataHub, FSInject, HFSPlus/VboxHFS, Aptiofix, OsxFatBinaryDrv.

  • Like 1
Link to comment
Share on other sites

I suggest you not do so. DataHub could be very useful in some cases.

You can delete the following efi if you have no need for FireVault 2.

  AppleImageCodec-64.efi; AppleKeyAggregator-64.efi; FirmwareVolume-64.efi; AppleUITheme-64.efi

Also. I saw that you were using kozlek's FakeSMC and thus you can delete SMCHelper-64.efi.

Always keep DataHub, FSInject, HFSPlus/VboxHFS, Aptiofix, OsxFatBinaryDrv.

Thank you again my dear friend for your suggestions and optimizations.

At this moment, with your last corrections and the last Clover r4003, everything went back 100% to normal and I got back onboard ALC1150 sound. But after some tests I came to the conclusion that the system is more stable with the 4 XCPM patches. With time, I will still try to reduce them more, but as it is, all works perfect as you can see.

On 64drivers, I do not feel or ever miss DataHub or the others. Because I do not use FireVault 2, but I'll take your warning into consideration :yes:.

I have not yet installed the kexts in L/E, but the truth, is that they work perfectly in Clover EFI and as I like to have the OS as clean as possible, I prefer it!

About TSCSync, just use it because sleep/wake works best. At times, I did some tests and without it, sleep/wake did not work correctly.

For those who have hardware like mine (board, graphics card and use normal SSD), here is my EFI, thin but functional. Some of the kexts and patchs are embedded in FakeSMC, so whenever you update Clover, it's convenient to back up FakeSMC to apply later.

 

EDIT: The MP61_freqV_w_iMac171.kext must be removed from Clover and installed in S/L/E

post-1313347-0-00176400-1486599646_thumb.png

post-1313347-0-88848100-1486599656_thumb.png

post-1313347-0-45049800-1486599663_thumb.png

EFI.rar

  • Like 1
Link to comment
Share on other sites

Thank you again my dear friend for your suggestions and optimizations.

At this moment, with your last corrections and the last Clover r4003, everything went back 100% to normal and I got back onboard ALC1150 sound. But after some tests I came to the conclusion that the system is more stable with the 4 XCPM patches. With time, I will still try to reduce them more, but as it is, all works perfect as you can see.

On 64drivers, I do not feel or ever miss DataHub or the others. Because I do not use FireVault 2, but I'll take your warning into consideration :yes:.

I have not yet installed the kexts in L/E, but the truth, is that they work perfectly in Clover EFI and as I like to have the OS as clean as possible, I prefer it!

About TSCSync, just use it because sleep/wake works best. At times, I did some tests and without it, sleep/wake did not work correctly.

For those who have hardware like mine (board, graphics card and use normal SSD), here is my EFI, thin but functional. Some of the kexts and patchs are embedded in FakeSMC, so whenever you update Clover, it's convenient to back up FakeSMC to apply later.

Nope. DataHub is not related to FV2. Actually I think it is essential! Anyways I suggest you keep it all the time.

What else... Just congratulations!

  • Like 1
Link to comment
Share on other sites

Thank you again my dear friend for your suggestions and optimizations.

At this moment, with your last corrections and the last Clover r4003, everything went back 100% to normal and I got back onboard ALC1150 sound. But after some tests I came to the conclusion that the system is more stable with the 4 XCPM patches. With time, I will still try to reduce them more, but as it is, all works perfect as you can see.

On 64drivers, I do not feel or ever miss DataHub or the others. Because I do not use FireVault 2, but I'll take your warning into consideration :yes:.

I have not yet installed the kexts in L/E, but the truth, is that they work perfectly in Clover EFI and as I like to have the OS as clean as possible, I prefer it!

About TSCSync, just use it because sleep/wake works best. At times, I did some tests and without it, sleep/wake did not work correctly.

For those who have hardware like mine (board, graphics card and use normal SSD), here is my EFI, thin but functional. Some of the kexts and patchs are embedded in FakeSMC, so whenever you update Clover, it's convenient to back up FakeSMC to apply later.

MP61_freqV_w_iMac171.kext

^^^

Is this injecting frequency vectors? Peaking at the code... it looks like it... so I'm assuming this is mainly to persist across updates?

 

Also, I got HDMI/DP sound by removing AppleHDA/AppleHDA Controller patches in 10.12.3. Not sure if it'll flip back to a problem in 10.12.4.

 

But I know that and I also need to use it, notice what I said!

"In each Clover installation, I also always select Emuvariable and" Install RC scripts on target volume ".

Or rather, I just select, EmuVariable, OsxAptioFix and RC Scripts. " :)

But you don't need it (RC Scripts). :P

 

You'll only need EmuVariable. Our boards keep NVRAM args across boots.

  • Like 1
Link to comment
Share on other sites

Hi. Please excuse me. I don't have the desktops that are discussed at this topic but I have some ideas...

 

Aptio-free2000 could be not reliable. I think OsxAptioFixDrv-64.efi (Aptio fix v1) can be a better choice. But I don't think the vanilla one which is contained in Clover pkg installer is okay enough cuz it has only too low memory size... And thus I enlarged it. (Enlarged to 512Mb instead of the original 128Mb.) Here it is.

 

attachicon.gifOsxAptioFixDrv-64.efi.zip

 

To use this, some important notes:

1. Aptiofix v1 is not compatible with hibernation. So don't enable hibernating at all! (IMHO for desktops we always don't need it...) To disable hibernation, please run the following command in Terminal:

sudo pmset -a hibernatemode 0

2. You need to replace my OsxAptioFixDrv-64.efi after updating Clover via Clover PKG Installer. Or try my simple trick:

  1) Rename OsxAptioFixDrv-64.efi to any name with *.efi, for me I renamed it to OsxAptioFixDrv.efi. (Removed '-64')

  2) Don't install OsxAptioFixDrv-64.efi from Clover PKG. Like this:

  attachicon.gifSnip20170208_3.png

  Note: You must place my OsxAptioFixDrv-64.efi (and renamed to OsxAptioFixDrv.efi) into /EFI/CLOVER/drivers64UEFI !!!

 

3. Remove all other *Aptiofix* drivers!

Does this require a minimum clover efi v2 version (currently running r3859).

Link to comment
Share on other sites

MP61_freqV_w_iMac171.kext

^^^

Is this injecting frequency vectors? Peaking at the code... it looks like it... so I'm assuming this is mainly to persist across updates?

Yes. The injector mainly targets at injecting FrequencyVectors on-the-fly.

Does this require a minimum clover efi v2 version (currently running r3859).

No

  • Like 1
Link to comment
Share on other sites

 

Just noticed, in my system.log console (triggering every 10 seconds):

Feb  8 20:38:03 M6Ds-Mac-Pro com.apple.xpc.launchd[1] (com.oracle.oss.mysql.mysqld): Service only ran for 0 seconds. Pushing respawn out by 10 seconds.
Feb  8 20:38:13 M6Ds-Mac-Pro xpcproxy[1189]: libcoreservices: _dirhelper_userdir: 523: bootstrap_look_up returned 268435459
Feb  8 20:38:13 M6Ds-Mac-Pro com.apple.xpc.launchd[1] (com.oracle.oss.mysql.mysqld[1189]): Service could not initialize: Unable to set current working directory. error = 2: No such file or directory, path = /usr/local/mysql: 16D32: xpcproxy + 11211 [1356][286733C4-18D9-396D-B01B-A096BE5B1DC1]: 0x2
Feb  8 20:38:13 M6Ds-Mac-Pro com.apple.xpc.launchd[1] (com.oracle.oss.mysql.mysqld): Service only ran for 0 seconds. Pushing respawn out by 10 seconds.
Feb  8 20:38:23 M6Ds-Mac-Pro xpcproxy[1192]: libcoreservices: _dirhelper_userdir: 523: bootstrap_look_up returned 268435459
Feb  8 20:38:23 M6Ds-Mac-Pro com.apple.xpc.launchd[1] (com.oracle.oss.mysql.mysqld[1192]): Service could not initialize: Unable to set current working directory. error = 2: No such file or directory, path = /usr/local/mysql: 16D32: xpcproxy + 11211 [1356][286733C4-18D9-396D-B01B-A096BE5B1DC1]: 0x2
Feb  8 20:38:23 M6Ds-Mac-Pro com.apple.xpc.launchd[1] (com.oracle.oss.mysql.mysqld): Service only ran for 0 seconds. Pushing respawn out by 10 seconds.
Feb  8 20:38:33 M6Ds-Mac-Pro xpcproxy[1194]: libcoreservices: _dirhelper_userdir: 523: bootstrap_look_up returned 268435459
Feb  8 20:38:33 M6Ds-Mac-Pro com.apple.xpc.launchd[1] (com.oracle.oss.mysql.mysqld[1194]): Service could not initialize: Unable to set current working directory.

It seems that this is related to mysql?

Link to comment
Share on other sites

Finished the update for Sierra 12.4 beta 2 (16E154a) and Clover r4003.
Everything works fine and stable except for NvidiaWebDrive. With the plist edited for 16E it recognizes the graphic card and has some resolutions, but without full acceleration...
PMheart, as you suggested, I installed your MP61_freqV_w_iMac171.kext on SLE and erased it on Clover. And now it seems to me that it's your kext that's running the FreqVectors. I installed it before the OS update and yes, it survived :yes:

Thanks friend

post-1313347-0-55234500-1486664905_thumb.png

post-1313347-0-04196700-1486664927_thumb.png

post-1313347-0-78305500-1486664946_thumb.png

post-1313347-0-93202800-1486664956_thumb.png

post-1313347-0-81666500-1486664964_thumb.png

  • Like 2
Link to comment
Share on other sites

Still testing PMheart's OsxAptioFixDrv-64.efi, so far so good.
 
 
Just a side note about Google Chrome... for some reason, it defaults to check for an update every single bleepin' hour. Way overkill!
 
Run this command in terminal to reduce it to every 24 hours:

defaults write com.google.Keystone.Agent checkInterval 24

However, it'll still check for updates when it opens from dock. Recommend to uninstall it if you're like me and don't like things taking up unnecessary bandwidth/computer resources.

Link to comment
Share on other sites

Finished the update for Sierra 12.4 beta 2 (16E154a) and Clover r4003.

Everything works fine and stable except for NvidiaWebDrive. With the plist edited for 16E it recognizes the graphic card and has some resolutions, but without full acceleration...

PMheart, as you suggested, I installed your MP61_freqV_w_iMac171.kext on SLE and erased it on Clover. And now it seems to me that it's your kext that's running the FreqVectors. I installed it before the OS update and yes, it survived :yes:

Thanks friend

Congratulations Fergarth!  :thumbsup_anim:

  • Like 1
Link to comment
Share on other sites

Waiting for your test here :-)

Been testing for about 2 solid days now. The only time I get kernel panics (so far) is when I switch between OsxAptioFixDrv-64 and OsxAptioFix2Drv-free2000 when shutting down. Instead of shutting down, it KPs then restarts. Otherwise, it's been stable so far. :thumbsup_anim:

 

Unfortunately, I can't get the log for the KP, because it wipes clean thanks to these errors during every single boot:

SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: bird(270) deny(1) mach-lookup com.apple.metadata.mds.legacy
SandboxViolation: fontd(298) deny(1) file-issue-extension /Network/Library
SandboxViolation: CalendarAgent(308) allow(0) mach-register com.apple.CalendarStore.lock.init
SandboxViolation: fmfd(349) deny(1) mach-lookup com.apple.securityd.xpc
SandboxViolation: cloudd(353) deny(1) mach-lookup com.apple.coreservices.launchservicesd
SandboxViolation: fmfd(349) deny(1) file-write-create /Users/m6d/Library/Keychains/login.keychain-db.sb-48feff08-HPDMJ4
utun_start: ifnet_disable_output returned error 12
SandboxViolation: storeassetd(369) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: storeassetd(369) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: fontd(298) deny(1) file-issue-extension /Network/Library
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
SandboxViolation: softwareupdate_n(407) deny(1) file-read-metadata /Users/m6d
SandboxViolation: fontd(298) deny(1) file-issue-extension /Network/Library

Link to comment
Share on other sites

 

Been testing for about 2 solid days now. The only time I get kernel panics (so far) is when I switch between OsxAptioFixDrv-64 and OsxAptioFix2Drv-free2000 when shutting down. Instead of shutting down, it KPs then restarts. Otherwise, it's been stable so far. :thumbsup_anim:

 

Unfortunately, I can't get the log for the KP, because it wipes clean thanks to these errors during every single boot:

SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(256) deny(1) file-read-metadata /private/var/folders
SandboxViolation: bird(270) deny(1) mach-lookup com.apple.metadata.mds.legacy
SandboxViolation: fontd(298) deny(1) file-issue-extension /Network/Library
SandboxViolation: CalendarAgent(308) allow(0) mach-register com.apple.CalendarStore.lock.init
SandboxViolation: fmfd(349) deny(1) mach-lookup com.apple.securityd.xpc
SandboxViolation: cloudd(353) deny(1) mach-lookup com.apple.coreservices.launchservicesd
SandboxViolation: fmfd(349) deny(1) file-write-create /Users/m6d/Library/Keychains/login.keychain-db.sb-48feff08-HPDMJ4
utun_start: ifnet_disable_output returned error 12
SandboxViolation: storeassetd(369) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: storeassetd(369) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: fontd(298) deny(1) file-issue-extension /Network/Library
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
SandboxViolation: softwareupdate_n(407) deny(1) file-read-metadata /Users/m6d
SandboxViolation: fontd(298) deny(1) file-issue-extension /Network/Library

Sorry I can't tell you what's the exact problem according to your posted log... But anyway. I think my AptioFix v1 is more stable...

Link to comment
Share on other sites

 Share

×
×
  • Create New...