<moofree_>
yeah, delete that page and replace it with "Figure it out yourself, noobs.", you'd get a lot more notice and respect from kernel hackers then! <rolleyes>
<Galland>
looool, that's must be it
GeorgeJ has quit [Remote host closed the connection]
Topgun100 has quit [Quit: Topgun100]
Galland has quit [Quit: Saliendo]
vinifr has quit [Remote host closed the connection]
Astralix has joined #linux-rockchip
Astralix1 has quit [Ping timeout: 264 seconds]
hipboi has joined #linux-rockchip
rellla has joined #linux-rockchip
mmind00 has joined #linux-rockchip
Topgun100 has joined #linux-rockchip
Topgun100 has quit [Quit: Topgun100]
AstralixNB has quit [Ping timeout: 264 seconds]
AstralixNB has joined #linux-rockchip
hipboi has quit [Quit: Leaving]
<hramrach>
yeah, any documentation on Android is _very_ rare
<hramrach>
and when that f** PoS is pre-installed on your device it's quite useful to have docs on that, too
<hramrach>
but you need mirror of any android binaries. I found quite a few tutorials for my old tablet that were complete but for the binaries which were hosted already defunct server
Theueip has joined #linux-rockchip
AstralixNB has quit [Ping timeout: 264 seconds]
vinifr has joined #linux-rockchip
Galland has joined #linux-rockchip
<Galland>
hi
<moofree_>
howdy
<moofree_>
ugh, any idea why only root can get es2gears to run
<Galland>
yes
<moofree_>
/dev/ump and /dev/mali are chmodded to 666 and such
<Galland>
you sure of that?
<moofree_>
it was already in that script you say to put it in
<Galland>
that they are 666 when you execute es2gears (regardless of rc.local)
<Galland>
:)
<moofree_>
i've checked their perms and they looked right
<moofree_>
let me make sure
<Galland>
if the script somehow fails before reaching those lines, they won't be executed, for example
<moofree_>
yep, rwrwrw, that's 666 iirc
<Galland>
:S
<Galland>
and if you run it as user, does it say "Operation not permitted" or something else?
<Galland>
es2gears i mean
<moofree_>
EGLUT Failed to initialize eg display
<moofree_>
egl*
<Galland>
hmmm
<Galland>
type: ll /usr/lib | grep libMal
<Galland>
and make sure that the permissions listed are the same as in step 6 of: