HACKINTOSH MONTRÉAL & FRANCE

Votre vrai Boot macOS Sierra ! - Page 2 Capt1051
Vous devez lire la charte et vous présenter avant de poster!
➤  La Charte du Forum

➤  Présentation

Rejoignez le forum, c’est rapide et facile

HACKINTOSH MONTRÉAL & FRANCE

Votre vrai Boot macOS Sierra ! - Page 2 Capt1051
Vous devez lire la charte et vous présenter avant de poster!
➤  La Charte du Forum

➤  Présentation
HACKINTOSH MONTRÉAL & FRANCE
Vous souhaitez réagir à ce message ? Créez un compte en quelques clics ou connectez-vous pour continuer.
Le Deal du moment : -30%
LEGO Icons 10318 – Le Concorde à ...
Voir le deal
139.99 €

Votre vrai Boot macOS Sierra !

+7
salutt
tom4
arcade33
Scooterl67
emax31
MilesTEG1
chris1111
11 participants

Page 2 sur 3 Précédent  1, 2, 3  Suivant

Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Votre vrai Boot macOS Sierra !

Message par chris1111 Dim 18 Déc - 15:39

Rappel du premier message :

Poster votre résultat  dans un code pour éviter de mettre un paquet de ligne sur votre sujet clin d'oeil
Voici un teste car vous aurez les reeeles INFOS du boot de votre Mac Very Happy
C'est exactement le boot en verbose ha1 +1

Taper ceci dans le terminal
sudo dmesg > ~/Desktop/dmesg.txt
vous aurez sur le bureau le fichier dmesg.txt

Voici ce que ça donne pour moi Smile

Code:

AppleACPICPU: ProcessorId=8 LocalApicId=7 Disabled
AppleACPICPU: ProcessorId=9 LocalApicId=8 Disabled
AppleACPICPU: ProcessorId=10 LocalApicId=9 Disabled
AppleACPICPU: ProcessorId=11 LocalApicId=10 Disabled
AppleACPICPU: ProcessorId=12 LocalApicId=11 Disabled
AppleACPICPU: ProcessorId=13 LocalApicId=12 Disabled
AppleACPICPU: ProcessorId=14 LocalApicId=13 Disabled
AppleACPICPU: ProcessorId=15 LocalApicId=14 Disabled
AppleACPICPU: ProcessorId=16 LocalApicId=15 Disabled
calling mpo_policy_init for TMSafetyNet
Security policy loaded: Safety net for Time Machine (TMSafetyNet)
calling mpo_policy_init for AMFI
Security policy loaded: Apple Mobile File Integrity (AMFI)
calling mpo_policy_init for Sandbox
Security policy loaded: Seatbelt sandbox policy (Sandbox)
calling mpo_policy_init for Quarantine
Security policy loaded: Quarantine policy (Quarantine)
Copyright (c) 1982, 1986, 1989, 1991, 1993
   The Regents of the University of California. All rights reserved.

MAC Framework successfully initialized
ulock_initialize>thread_max=10240, ull_hash_buckets=4096
using 16384 buffer headers and 10240 cluster IO buffer headers
AppleCredentialManager::start called
AppleKeyStore::start(IOResources) <1>
AppleKeyStore starting (BUILT: Nov 17 2016 21:25:42)
AICPM::start: calling i386_pmRegister()
CPU Data: size = 4, alignment = 64
Pkg Data: size = 0
CPU Data: size = 4, alignment = 64
Pkg Data: size = 0
CPU Data: size = 4, alignment = 64
Pkg Data: size = 0
CPU Data: size = 4, alignment = 64
Pkg Data: size = 0
AICPM::start: back from i386_pmRegister()
AICPM::start: calling i386_pmThreadInit()
Started cpu 1 (lapic id 00000002)
AICPM::start: back from i386_pmThreadInit()
AICPM::start: calling registerService()
AICPM::start: back from registerService()
AppleIntelCPUPowerManagement: ready
FakeSMCKeyStore: started
Started cpu 2 (lapic id 00000004)
Started cpu 3 (lapic id 00000006)
IOAPIC: Version 0x20 Vectors 64:87
ACPI: sleep states S3 S4 S5
CPUSensors: CPU family 0x6, model 0x2a, stepping 0x7, cores 4, threads 4, TJmax 98
CPUSensors: setting platform keys to [k62     ]
CPUSensors: base CPU multiplier is 33
CPUSensors: started
RTC: Only single RAM bank (128 bytes)
RTC: Only single RAM bank (128 bytes)
pci (build 20:33:53 Nov 17 2016), flags 0xe3000, pfm64 (36 cpu) 0xf80000000, 0x80000000
pci (build 20:33:53 Nov 17 2016), flags 0xe3000, pfm64 (36 cpu) 0xf80000000, 0x80000000
[ PCI configuration begin ]
kPEDisableScreen -1
HID: Legacy shim 2
FakeSMC v6.21.1412 Copyright 2015 netkas, slice, usr-sse2, kozlek, navi, THe KiNG, RehabMan. All rights reserved.
FakeSMC: 13 preconfigured keys added
hpet_init: Frequency =     14.318179MHz, hpetCvtt2n = 00000045.D75E0F7F, hpetCvtn2t = 00000000.03AA5B32
FakeSMC: 5 keys exported by Clover EFI
SMC: successfully initialized
AppleIntelCPUPowerManagement: Turbo Mode enabled
AppleIntelCPUPowerManagement: Turbo Ratios 1234
AppleIntelCPUPowerManagement: (built 20:34:56 Nov 17 2016) initialization complete
initialize_screen: b=F80000000, w=00000780, h=00000438, r=00001E00, d=00000001
kPEEnableScreen 1
console relocated to 0xf80000000
[ PCI configuration end, bridges 6, devices 13 ]
Controller: ATI RV810 (vendor ID: 1002, device ID: aa68)
Controller: Intel Cougar Point (vendor ID: 8086, device ID: 1c20)
[AHCI][PML][00000000]+IOAHCIPortMultiplierGlobals::IOAHCIPortMultiplierGlobals
[AHCI][PML][00000000]-IOAHCIPortMultiplierGlobals::IOAHCIPortMultiplierGlobals
[AHCI][HBA][00000000]+AppleAHCIGlobals::AppleAHCIGlobals
[AHCI][HBA][00000000]-AppleAHCIGlobals
*IOAHCIBlockStorageDriver::DetermineDeviceFeatures - !!!!! WARNING !!!!! - Force Data Set Management is set
*IOAHCIBlockStorageDriver::DetermineDeviceFeatures - !!!!! WARNING !!!!! - Force Data Set Management is set
000001.351637 AppleUSBLegacyRoot@: AppleUSBLegacyRoot::init: enabling legacy matching
mcache: 4 CPU(s), 64 bytes CPU cache line size
mbinit: done [128 MB total pool size, (85/42) split]
bsd_autoconf: calling kminit
000001.353488 PXSX@00000000: AppleUSBXHCI::createPorts: created port 1
000001.353622 PXSX@00000000: AppleUSBXHCI::createPorts: created port 2
000001.353704 PXSX@00000000: AppleUSBXHCI::createPorts: created port 3
000001.353778 PXSX@00000000: AppleUSBXHCI::createPorts: created port 4
000001.353872 PXSX@00000000: AppleUSBXHCI::createPorts: port 5 unsupported protocol USB  03.00
000001.353880 PXSX@00000000: AppleUSBXHCI::createPorts: created port 5
000001.353960 PXSX@00000000: AppleUSBXHCI::createPorts: port 6 unsupported protocol USB  03.00
000001.353969 PXSX@00000000: AppleUSBXHCI::createPorts: created port 6
000001.354046 PXSX@00000000: AppleUSBXHCI::createPorts: port 7 unsupported protocol USB  03.00
000001.354054 PXSX@00000000: AppleUSBXHCI::createPorts: created port 7
000001.354131 PXSX@00000000: AppleUSBXHCI::createPorts: port 8 unsupported protocol USB  03.00
000001.354139 PXSX@00000000: AppleUSBXHCI::createPorts: created port 8
000001.354268 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 0 sleepUnits 0
000001.354353 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 0 sleepUnits 0
000001.354443 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 0 sleepUnits 0
000001.354523 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 0 sleepUnits 0
000001.354568 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 150 sleepUnits 0
000001.354610 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 150 sleepUnits 0
000001.354650 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 150 sleepUnits 0
000001.354693 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 150 sleepUnits 0
000001.356825 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 100 sleepUnits 0
000001.357224 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 100 sleepUnits 0
com.apple.AppleFSCompressionTypeZlib kmod start
com.apple.AppleFSCompressionTypeDataless kmod start
com.apple.AppleFSCompressionTypeZlib load succeeded
com.apple.AppleFSCompressionTypeDataless load succeeded
rooting via boot-uuid from /chosen: F36BC478-832F-3E73-BC2F-B828F88B5988
AppleIntelCPUPowerManagementClient: ready
Waiting on <dict ID="0"><key>IOProviderClass</key><string ID="1">IOResources</string><key>IOResourceMatch</key><string ID="2">boot-uuid-media</string></dict>
Ethernet [IntelMausi]: TCP/IPv4 segmentation offload enabled.
Ethernet [IntelMausi]: TCP/IPv6 segmentation offload enabled.
Ethernet [IntelMausi]: TCP/IPv6 checksum offload enabled.
Ethernet [IntelMausi]: Version 2.0.0 using max interrupt rate 7000.
Got boot device = IOService:/AppleACPIPlatformExpert/PCI0@0/AppleACPIPCI/SATA@1F,2/AppleIntelPchSeriesAHCI/PRT0@0/IOAHCIDevice@0/AppleAHCIDiskDriver/IOAHCIBlockStorageDevice/IOBlockStorageDriver/KINGSTON SV300S37A240G Media/IOGUIDPartitionScheme/Untitled 2@2
BSD root: disk1s2, major 1, minor 3
hfs: mounted Macintosh-HD on device b(1, 3)
VM Swap Subsystem is ON
Ethernet [IntelMausi]: 82579LM (Rev. 4) at 0x<ptr>, 5c:f9:dd:6e:c9:21
Report bytes: input:8 output:1 feature:0Collections : 2Buttons     : input:2 output:1 feature:0Values      : input:0 output:0 feature:0Element value capacity 6656Report count: 1Report ID: 0 input:64 output:8 feature:0HID: Legacy shim 2
Report bytes: input:8 output:1 feature:0Collections : 2Buttons     : input:2 output:1 feature:0Values      : input:0 output:0 feature:0Element value capacity 6656Report count: 1Report ID: 0 input:64 output:8 feature:0HID: Legacy shim 2
*IOAHCIBlockStorageDriver::DetermineDeviceFeatures - !!!!! WARNING !!!!! - Force Data Set Management is set
Waiting for DSMOS...
IOGraphics flags 0x43
Report bytes: input:32 output:32 feature:1Collections : 4Buttons     : input:4 output:4 feature:0Values      : input:0 output:0 feature:0Element value capacity 4020Report count: 5Report ID: 0 input:0 output:0 feature:0Report ID: 16 input:56 output:56 feature:8Report ID: 17 input:160 output:160 feature:8Report ID: 32 input:120 output:120 feature:8Report ID: 33 input:256 output:256 feature:8000003.168172 IOUSBHostHIDDevice: IOUSBHostHIDDevice::handleStart: unable to open interface
000003.168182 IOUSBHostHIDDevice: IOUSBHostHIDDevice::start: unable to start IOHIDDevice
Apple16X50ACPI1: Identified Serial Port on ACPI Device=COM1
Previous shutdown cause: 5
Report bytes: input:8 output:1 feature:1Collections : 6Buttons     : input:6 output:0 feature:0Values      : input:4 output:0 feature:0Sound assertion in AppleHDAController at line 472
Sound assertion in AppleHDAController at line 421
Report bytes: input:8 output:1 feature:1Collections : 6Buttons     : input:6 output:0 feature:0Values      : input:4 output:0 feature:0Element value capacity 25304Element value capacity 25304Report count: 5Report ID: 0 input:0 output:0 feature:0Report ID: 2 input:64 output:8 feature:8Report ID: 3 input:40 output:8 feature:8Report ID: 4 input:16 output:8 feature:8Report ID: 8 input:16 output:8 feature:8Report count: 5Report ID: 0 input:0 output:0 feature:0Report ID: 2 input:64 output:8 feature:8Report ID: 3 input:40 output:8 feature:8Report ID: 4 input:16 output:8 feature:8Report ID: 8 input:16 output:8 feature:8Apple16X50UARTSync1: Detected 16550AF/C/CF FIFO=16 MaxBaud=115200
Report bytes: input:32 output:32 feature:1Collections : 4Buttons     : input:4 output:4 feature:0Values      : input:0 output:0 feature:0Element value capacity 4020Report count: 5Report ID: 0 input:0 output:0 feature:0Report ID: 16 input:56 output:56 feature:8Report ID: 17 input:160 output:160 feature:8Report ID: 32 input:120 output:120 feature:8Report ID: 33 input:256 output:256 feature:8virtual bool IOGraphicsAccelerator2::start(IOService *): configureDevice failed
Sound assertion in AppleHDAController at line 472
Sound assertion in AppleHDAController at line 421
000003.192917 IOUSBHostHIDDevice: IOUSBHostHIDDevice::handleStart: unable to open interface
000003.192928 IOUSBHostHIDDevice: IOUSBHostHIDDevice::start: unable to start IOHIDDevice
000003.192952 IOUSBHostHIDDevice: IOUSBHostHIDDevice::handleStart: unable to open interface
000003.192959 IOUSBHostHIDDevice: IOUSBHostHIDDevice::start: unable to start IOHIDDevice
DSMOS has arrived
[IOBluetoothFamily][start] -- completed
PMRD: prevent idle sleep list: IODisplayWrangler+ (1)
prevent idle sleep list: IODisplayWrangler+ (1)
HID: Legacy shim 2
HID: Legacy shim 2
hfs: mounted Mac OS X Snow Leopard on device disk0s2
hfs: mounted OS X Mavericks on device disk2s2
unexpected session: 100000 uid: -1 requested by: 34
AppleKeyStore: operation failed (pid: 34 sel: 7 ret: e00002c2 '-536870206', -1, 100000)
KLOG is already initialized
Accelerator successfully registered with controller.
AppleLPC::notifyPlatformASPM - registering with plugin with ASPM Support true
[AGPM Controller] build gpuDict by GPU PEGP.
[AGPM Controller] unknownPlatform
no Heuristic ID!
AGPM::start - publish fMinPowerState = 0 fMaxPowerState = 3
kPEDisableScreen 1
RadeonSensors (pci1): found ATI Radeon ID: 0x68e0, ATOM BIOS: 68F9HB.12.20.0.64.AS02
RadeonSensors (pci1): using device-id to resolve temperature sensor type
RadeonSensors (pci1): adding EverGreen thermal sensor
RadeonSensors (pci1): started
Ethernet [IntelMausi]: Link up on en0, 100-Megabit, Full-duplex, Rx/Tx flow-control
kPEDisableScreen 1
kPEEnableScreen 1
kPEDisableScreen 1
kPEEnableScreen 1
AppleKeyStore: set handle 1 as special bag -501
AppleKeyStore: Sending lock change 0 for handle -501
AppleKeyStore::ipc_device_state_transition: Device UnLock call(-501): lockstate=0, transientCnt=0, 93
AppleKeyStore::ipc_device_state_transition: Device UnLocked(-501): lockstate=0, 93
SandboxViolation: fmfd(377) deny(1) mach-lookup com.apple.securityd.xpc
SandboxViolation: bird(326) deny(1) mach-lookup com.apple.metadata.mds.legacy
SandboxViolation: fmfd(377) deny(1) file-write-create /Users/chris/Library/Keychains/login.keychain-db.sb-34c90625-Vip06U
SandboxViolation: cloudd(380) deny(1) mach-lookup com.apple.coreservices.launchservicesd
SandboxViolation: fontd(342) deny(1) file-issue-extension /Network/Library
utun_ctl_connect: creating interface utun0
utun_start: ifnet_disable_output returned error 12
SandboxViolation: swcd(430) deny(1) ipc-posix-shm-read-data /tmp/com.apple.csseed.120
SandboxViolation: appleeventsd(44) deny(1) mach-lookup com.apple.CoreServices.coreservicesd
SandboxViolation: fontd(342) deny(1) file-issue-extension /Network/Library
SandboxViolation: fontd(342) deny(1) file-issue-extension /Network/Library
SandboxViolation: AssetCacheLocato(435) deny(1) file-read-data /Users/chris/Library/Preferences/ByHost/.GlobalPreferences.D22F48C4-3412-5110-981B-087A09144741.plist
SandboxViolation: AssetCacheLocato(435) deny(1) file-read-data /Users/chris/Library/Preferences/.GlobalPreferences.plist
SandboxViolation: AssetCacheLocato(435) deny(1) mach-lookup com.apple.metadata.mds.legacy
SandboxViolation: cloudphotosd(325) deny(1) mach-lookup com.apple.logind
SandboxViolation: AssetCacheLocato(435) deny(1) mach-lookup com.apple.cookied
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
SandboxViolation: softwareupdate_n(460) deny(1) file-read-metadata /Users/chris
SandboxViolation: quicklookd(390) System Policy: allow(0) file-write* /Applications/TextEdit.app
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-#KEY-ui32
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-$Adr-ui32
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-$Num-ui8
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-RMde-char
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-RPlt-ch8*
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-RBr -ch8*
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-EPCI-ui32
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-REV -ch8*
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-BEMB-flag
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-BATP-flag
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-BNum-ui8
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-MSTc-ui8
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-MSAc-ui16
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-MSLD-ui8
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-MSWr-ui8
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-MSFW-ui8
SandboxViolation: TextEdit(470) deny(1) nvram-get fakesmc-key-MSPS-ui16
SandboxViolation: TextEdit(470) deny(1) nvram-get Clover.KeepBackupLimit
SandboxViolation: TextEdit(470) deny(1) nvram-get Clover.LogEveryBoot
SandboxViolation: TextEdit(470) deny(1) nvram-get Clover.LogLineCount
SandboxViolation: TextEdit(470) deny(1) nvram-get Clover.MountEFI
SandboxViolation: TextEdit(470) deny(1) nvram-get csr-active-config
SandboxViolation: TextEdit(470) deny(1) nvram-get prev-lang:kbd
SandboxViolation: TextEdit(470) deny(1) nvram-get security-mode
SandboxViolation: TextEdit(470) deny(1) nvram-get EFILoginHiDPI
SandboxViolation: TextEdit(470) deny(1) nvram-get flagstate
SandboxViolation: TextEdit(470) deny(1) nvram-get bootercfg
SandboxViolation: TextEdit(470) deny(1) nvram-get fmm-computer-name
USB Sound assertion in /BuildRoot/Library/Caches/com.apple.xbs/Sources/AppleUSBAudio/AppleUSBAudio-307.7/AppleUSBAudioControlInterface.cpp at line 357
**** [IOBluetoothFamily][SearchForTransportEventTimeOutHandler] -- Missing Bluetooth Controller Transport!
SandboxViolation: fontd(342) deny(1) file-issue-extension /Network/Library
SandboxViolation: fontd(342) deny(1) file-issue-extension /Network/Library
considerRebuildOfPrelinkedKernel org.netkas.driver.FakeSMC triggered rebuild
loginwindow is not entitledloginwindow is not entitledUserEventAgent is not entitledUserEventAgent is not entitle




Comme vous pouvez voir le turbo est pris en charge parfaitement et le FakeSMC aussi Laughing

FakeSMC v6.21.1412 Copyright 2015 netkas, slice, usr-sse2, kozlek, navi, THe KiNG, RehabMan. All rights reserved.
FakeSMC: 13 preconfigured keys added
hpet_init: Frequency =     14.318179MHz, hpetCvtt2n = 00000045.D75E0F7F, hpetCvtn2t = 00000000.03AA5B32
FakeSMC: 5 keys exported by Clover EFI
SMC: successfully initialized
AppleIntelCPUPowerManagement: Turbo Mode enabled
AppleIntelCPUPowerManagement: Turbo Ratios 1234
AppleIntelCPUPowerManagement: (built 20:34:56 Nov 17 2016) initialization complete
initialize_screen: b=F80000000, w=00000780, h=00000438, r=00001E00, d=00000001
kPEEnableScreen 1
console relocated to 0xf80000000


Dans Mavericks 10.9.5

Code:

Longterm timer threshold: 1000 ms
PMAP: PCID enabled
Darwin Kernel Version 13.4.0: Mon Jan 11 18:17:34 PST 2016; root:xnu-2422.115.15~1/RELEASE_X86_64
vm_page_bootstrap: 3889865 free pages and 271671 wired pages
kext submap [0xffffff7f807ab000 - 0xffffff8000000000], kernel text [0xffffff8000200000 - 0xffffff80007ab000]
zone leak detection enabled
"vm_compressor_mode" is 4
standard timeslicing quantum is 10000 us
standard background quantum is 2500 us
mig_table_max_displ = 74
TSC Deadline Timer supported and enabled
"name" not a kext
"FailedCLUT" not a kext
"FailedImage" not a kext
AppleACPICPU: ProcessorId=1 LocalApicId=0 Enabled
AppleACPICPU: ProcessorId=2 LocalApicId=2 Enabled
AppleACPICPU: ProcessorId=3 LocalApicId=4 Enabled
AppleACPICPU: ProcessorId=4 LocalApicId=6 Enabled
AppleACPICPU: ProcessorId=5 LocalApicId=4 Disabled
AppleACPICPU: ProcessorId=6 LocalApicId=5 Disabled
AppleACPICPU: ProcessorId=7 LocalApicId=6 Disabled
AppleACPICPU: ProcessorId=8 LocalApicId=7 Disabled
AppleACPICPU: ProcessorId=9 LocalApicId=8 Disabled
AppleACPICPU: ProcessorId=10 LocalApicId=9 Disabled
AppleACPICPU: ProcessorId=11 LocalApicId=10 Disabled
AppleACPICPU: ProcessorId=12 LocalApicId=11 Disabled
AppleACPICPU: ProcessorId=13 LocalApicId=12 Disabled
AppleACPICPU: ProcessorId=14 LocalApicId=13 Disabled
AppleACPICPU: ProcessorId=15 LocalApicId=14 Disabled
AppleACPICPU: ProcessorId=16 LocalApicId=15 Disabled
calling mpo_policy_init for TMSafetyNet
Security policy loaded: Safety net for Time Machine (TMSafetyNet)
calling mpo_policy_init for Sandbox
Security policy loaded: Seatbelt sandbox policy (Sandbox)
calling mpo_policy_init for Quarantine
Security policy loaded: Quarantine policy (Quarantine)
Copyright (c) 1982, 1986, 1989, 1991, 1993
   The Regents of the University of California. All rights reserved.

MAC Framework successfully initialized
using 16384 buffer headers and 10240 cluster IO buffer headers
AppleKeyStore starting (BUILT: Jan 11 2016 18:48:25)
FakeSMCKeyStore: started
IOAPIC: Version 0x20 Vectors 64:87
ACPI: sleep states S3 S4 S5
CPUSensors: CPU family 0x6, model 0x2a, stepping 0x7, cores 4, threads 4, TJmax 98
CPUSensors: setting platform keys to [k62     ]
CPUSensors: base CPU multiplier is 33
CPUSensors: started
pci (build 18:30:21 Jan 11 2016), flags 0x63008, pfm64 (36 cpu) 0xf80000000, 0x80000000
RTC: Only single RAM bank (128 bytes)
[ PCI configuration begin ]
AppleIntelCPUPowerManagement: Turbo Ratios 1234
AppleIntelCPUPowerManagement: (built 18:44:31 Jan 11 2016) initialization complete
FakeSMC v6.19.1406 Copyright 2015 netkas, slice, usr-sse2, kozlek, navi, THe KiNG, RehabMan. All rights reserved.
FakeSMC: 13 preconfigured keys added
FakeSMC: 5 keys exported by Clover EFI
SMC: successfully initialized
console relocated to 0xf80000000
[ PCI configuration end, bridges 6, devices 13 ]
mcache: 4 CPU(s), 64 bytes CPU cache line size
mbinit: done [128 MB total pool size, (85/42) split]
Pthread support ABORTS when sync kernel primitives misused
Ethernet [IntelMausi]: TCP/IPv4 segmentation offload enabled.
Ethernet [IntelMausi]: TCP/IPv6 segmentation offload enabled.
Ethernet [IntelMausi]: TCP/IPv6 checksum offload enabled.
Ethernet [IntelMausi]: Version 2.1.0 using max interrupt rate 7000. Please don't support TonyMACHIN.com!
Controller: ATI RV810 (vendor ID: 1002, device ID: aa68)
Controller: Intel Cougar Point (vendor ID: 8086, device ID: 1c20)
rooting via boot-uuid from /chosen: 512E3916-25A7-3507-8938-6F7F24209C4B
Waiting on <dict ID="0"><key>IOProviderClass</key><string ID="1">IOResources</string><key>IOResourceMatch</key><string ID="2">boot-uuid-media</string></dict>
com.apple.AppleFSCompressionTypeZlib kmod start
com.apple.AppleFSCompressionTypeLZVN kmod start
com.apple.AppleFSCompressionTypeDataless kmod start
com.apple.AppleFSCompressionTypeZlib load succeeded
com.apple.AppleFSCompressionTypeLZVN load succeeded
com.apple.AppleFSCompressionTypeDataless load succeeded
AppleIntelCPUPowerManagementClient: ready
USBF:    0.243    AppleUSBEHCI::CreateRootHubDevice  Bus 29 already taken
Ethernet [IntelMausi]: 82579LM (Rev. 4), 5c:f9:dd:6e:c9:21
Got boot device = IOService:/AppleACPIPlatformExpert/PCI0@0/AppleACPIPCI/RP05@1C,4/IOPP/PXSX@0/AppleAHCI/PRT1@1/IOAHCIDevice@0/AppleAHCIDiskDriver/IOAHCIBlockStorageDevice/IOBlockStorageDriver/OCZ-ARC100 Media/IOGUIDPartitionScheme/RESTORE@2
BSD root: disk2s2, major 1, minor 9
hfs: mounted OS X Mavericks on device root_device
hfs: mounted Mac OS X Snow Leopard on device disk0s2
init
probe
start
[IOBluetoothHCIController][start] -- completed
Apple16X50ACPI1: Identified Serial Port on ACPI Device=COM1
Sound assertion in AppleHDAController at line 461
Sound assertion in AppleHDAController at line 403
Sound assertion in AppleHDAController at line 461
Sound assertion in AppleHDAController at line 403
Apple16X50UARTSync1: Detected 16550AF/C/CF FIFO=16 MaxBaud=115200
Previous Shutdown Cause: 5
SMC::smcInitHelper ERROR: MMIO regMap == NULL - fall back to old SMC mode
DSMOS has arrived
hfs: mounted Macintosh-HD on device disk1s2
flow_divert_kctl_disconnect (0): disconnecting group 1
[AGPM Controller] unknownPlatform
flow_divert_kctl_disconnect (0): disconnecting group 1
VM Swap Subsystem is ON
Ethernet [IntelMausi]: Link up on en0, 100-Megabit, Full-duplex, Rx/Tx flow-control
RadeonSensors (pci1): found ATI Radeon ID: 0x68e0, ATOM BIOS: 68F9HB.12.20.0.64.AS02
RadeonSensors (pci1): using device-id to resolve temperature sensor type
RadeonSensors (pci1): adding EverGreen thermal sensor
RadeonSensors (pci1): started
AppleKeyStore:Sending lock change 0
AppleKeyStore:Sending lock change 0
**** [IOBluetoothHCIController][SearchForTransportEventTimeOutHandler] -- Missing Bluetooth Controller Transport!
considerRebuildOfPrelinkedKernel org.netkas.driver.FakeSMC triggered rebuild



Dans Mac OS X Snow Leopard ha1
Code:

npvhash=4095
Darwin Kernel Version 10.8.0: Tue Jun  7 16:32:41 PDT 2011; root:xnu-1504.15.3~1/RELEASE_X86_64
vm_page_bootstrap: 4048786 free pages and 112750 wired pages
kext submap [0xffffff7f80800000 - 0xffffff8000000000], kernel text [0xffffff8000200000 - 0xffffff8000800000]
standard timeslicing quantum is 10000 us
mig_table_max_displ = 73
TSC Deadline Timer supported and enabled
NullCPUPowerManagement::init: properties=0xffffff8023008c80
IntelCPUMonitor: Based on code by mercurysquad, superhai (C)2008
User defined TjMax=0
NullCPUPowerManagement::start
AppleACPICPU: ProcessorId=1 LocalApicId=0 Enabled
AppleACPICPU: ProcessorId=2 LocalApicId=2 Enabled
AppleACPICPU: ProcessorId=3 LocalApicId=4 Enabled
AppleACPICPU: ProcessorId=4 LocalApicId=6 Enabled
AppleACPICPU: ProcessorId=5 LocalApicId=4 Disabled
AppleACPICPU: ProcessorId=6 LocalApicId=5 Disabled
AppleACPICPU: ProcessorId=7 LocalApicId=6 Disabled
AppleACPICPU: ProcessorId=8 LocalApicId=7 Disabled
AppleACPICPU: ProcessorId=9 LocalApicId=8 Disabled
AppleACPICPU: ProcessorId=10 LocalApicId=9 Disabled
AppleACPICPU: ProcessorId=11 LocalApicId=10 Disabled
AppleACPICPU: ProcessorId=12 LocalApicId=11 Disabled
AppleACPICPU: ProcessorId=13 LocalApicId=12 Disabled
AppleACPICPU: ProcessorId=14 LocalApicId=13 Disabled
AppleACPICPU: ProcessorId=15 LocalApicId=14 Disabled
AppleACPICPU: ProcessorId=16 LocalApicId=15 Disabled
calling mpo_policy_init for TMSafetyNet
Security policy loaded: Safety net for Time Machine (TMSafetyNet)
calling mpo_policy_init for Quarantine
Security policy loaded: Quarantine policy (Quarantine)
calling mpo_policy_init for Sandbox
Security policy loaded: Seatbelt sandbox policy (Sandbox)
Copyright (c) 1982, 1986, 1989, 1991, 1993
   The Regents of the University of California. All rights reserved.

MAC Framework successfully initialized
using 16384 buffer headers and 4096 cluster IO buffer headers
IOAPIC: Version 0x20 Vectors 64:87
ACPI: System State [S0 S3 S4 S5] (S3)
PFM64 0xf10000000, 0xf0000000
[ PCI configuration begin ]
console relocated to 0xf10000000
PCI configuration changed (bridge=4 device=1 cardbus=0)
[ PCI configuration end, bridges 6 devices 13 ]
RTC: Only single RAM bank (128 bytes)
Controller: Intel Cougar Point (vendor ID: 8086, device ID: 1c20)
IntelCPUMonitor: CPU family 0x6, model 0x2a, stepping 0x7, cores 4, threads 4
IntelCPUMonitor: Using efi
IntelCPUMonitor: BusClock=99MHz FSB=399MHz
IntelCPUMonitor: Platform string T9
IntelCPUMonitor: CPU0 Tjmax 98
IntelCPUMonitor: CPU1 Tjmax 98
IntelCPUMonitor: CPU2 Tjmax 98
IntelCPUMonitor: CPU3 Tjmax 98
Controller: ATI RV810 (vendor ID: 1002, device ID: aa68)
 Found ATI Radeon 68e0
mbinit: done (128 MB memory set for mbuf pool)
rooting via boot-uuid from /chosen: 2F54A7CC-DFB2-37D0-92C8-54923688CD0C
Waiting on <dict ID="0"><key>IOProviderClass</key><string ID="1">IOResources</string><key>IOResourceMatch</key><string ID="2">boot-uuid-media</string></dict>
com.apple.AppleFSCompressionTypeZlib kmod start
com.apple.AppleFSCompressionTypeZlib load succeeded
vendor:device: 0x8086:0x1502.
AppleIntelE1000e(Info): changing MTU from 0 to 1500
Got boot device = IOService:/AppleACPIPlatformExpert/PCI0@0/AppleACPIPCI/SATA@1F,2/AppleIntelPchSeriesAHCI/PRT1@1/IOAHCIDevice@0/AppleAHCIDiskDriver/IOAHCIBlockStorageDevice/IOBlockStorageDriver/KINGSTON SUV400S37240G Media/IOGUIDPartitionScheme/Mac OS X Snow Leopard@2
BSD root: disk0s2, major 14, minor 2
Kernel is LP64
AppleIntelE1000e: Ethernet address 5c:f9:dd:6e:c9:21
systemShutdown false
Apple16X50ACPI1: Identified Serial Port on ACPI Device=COM1
Sound assertion "!fProvider->open ( this )" failed in AppleHDAController at line 344 goto Exit
Sound assertion "!fProvider->open ( this )" failed in AppleHDAController at line 344 goto Exit
Previous Shutdown Cause: 3
Apple16X50UARTSync1: Detected 16550AF/C/CF FIFO=16 MaxBaud=115200
DSMOS has arrived
AppleIntelE1000e(Info): Link is Up 100 Mbps Full Duplex, Flow Control: RX/TX
ACPI_SMC_PlatformPlugin::start - waitForService(resourceMatching(AppleIntelCPUPowerManagement) timed out
** Device in slot: SLOT--1 **


Dernière édition par chris1111 le Lun 19 Déc - 10:33, édité 1 fois
chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas


Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par chris1111 Jeu 22 Déc - 12:20

MilesTEG1 a écrit:
chris1111 a écrit:
Salut @MilesTEG1
Il ny a aucune raison d'utiliser le ACPI Plugins c'est pour ceux qui ont patcher des infos supplémentaire de HWMonitor dans le DSDT.aml ha26

Faut pas que tu prenne mon sujet comme un sujet de panique pour ton Boot ha27 Ce post ma permis de comprendre que mon smbios
pouvait ne pas me donner un résultat optimal dans Sierra
Je sait qu'il y a plusieurs utilisateur de Clover Configurator mais plusieurs personne influente dans le Hackintosh disent depuis plusieurs années pouvait ne pas données les bonnes infos, cela pour El Capitan et macOS Sierra car la sécurité est chnger ha26

Il ne faut pas paniquer pour ça mais simplement trouver notre solution ha39

La peuvent est que si j'utilise n'importe laquelle smbios compatible bien sur; dans Mavericks et bien j'ai toujours le même Boot Laughing
Car la sécurité est pas la même , il ny a pas de Sanbox -Violation BLA BLA BLA ...... tireur tireur
ha39 hello Smile
Je ne panique pas, j'en suis loin même. Mon hack fonctionne très bien Wink
Je vais re-enlever le ACPI du FakeSMC.kext Smile
Et tant pis pour les erreurs dans le dmseg Very Happy
Mais comme le tiens était si propre et si beau ha1 Very Happy default20
Le mien est sûrement du au fait que je n'utilise pas de smbios ´ seulement trust
Aussi Jai un dsdt et ssdt
chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par chris1111 Jeu 22 Déc - 15:44

Intéressant ici dans mon Front Panel SYBA El Capitan boot en PCIe Smile

Code:

Longterm timer threshold: 1000 ms
PMAP: PCID enabled
Darwin Kernel Version 15.6.0: Thu Sep  1 15:01:16 PDT 2016; root:xnu-3248.60.11~2/RELEASE_X86_64
vm_page_bootstrap: 4056823 free pages and 104713 wired pages
kext submap [0x<ptr> - 0x<ptr>], kernel text [0x<ptr> - 0x<ptr>]
zone leak detection enabled
"vm_compressor_mode" is 4
multiq scheduler config: deep-drain 0, ceiling 47, depth limit 4, band limit 127, sanity check 0
standard timeslicing quantum is 10000 us
standard background quantum is 2500 us
WQ[lt_init]: init linktable with max:262144 elements (8388608 bytes)
WQ[wqp_init]: init prepost table with max:262144 elements (8388608 bytes)
mig_table_max_displ = 16
TSC Deadline Timer supported and enabled
kdp_core zlib memory 0x7000
"name" not a kext
"FailedCLUT" not a kext
"FailedImage" not a kext
AppleACPICPU: ProcessorId=1 LocalApicId=0 Enabled
AppleACPICPU: ProcessorId=2 LocalApicId=2 Enabled
AppleACPICPU: ProcessorId=3 LocalApicId=4 Enabled
AppleACPICPU: ProcessorId=4 LocalApicId=6 Enabled
AppleACPICPU: ProcessorId=5 LocalApicId=4 Disabled
AppleACPICPU: ProcessorId=6 LocalApicId=5 Disabled
AppleACPICPU: ProcessorId=7 LocalApicId=6 Disabled
AppleACPICPU: ProcessorId=8 LocalApicId=7 Disabled
AppleACPICPU: ProcessorId=9 LocalApicId=8 Disabled
AppleACPICPU: ProcessorId=10 LocalApicId=9 Disabled
AppleACPICPU: ProcessorId=11 LocalApicId=10 Disabled
AppleACPICPU: ProcessorId=12 LocalApicId=11 Disabled
AppleACPICPU: ProcessorId=13 LocalApicId=12 Disabled
AppleACPICPU: ProcessorId=14 LocalApicId=13 Disabled
AppleACPICPU: ProcessorId=15 LocalApicId=14 Disabled
AppleACPICPU: ProcessorId=16 LocalApicId=15 Disabled
calling mpo_policy_init for TMSafetyNet
Security policy loaded: Safety net for Time Machine (TMSafetyNet)
calling mpo_policy_init for AMFI
Security policy loaded: Apple Mobile File Integrity (AMFI)
calling mpo_policy_init for Sandbox
Security policy loaded: Seatbelt sandbox policy (Sandbox)
calling mpo_policy_init for Quarantine
Security policy loaded: Quarantine policy (Quarantine)
Copyright (c) 1982, 1986, 1989, 1991, 1993
   The Regents of the University of California. All rights reserved.

MAC Framework successfully initialized
using 16384 buffer headers and 10240 cluster IO buffer headers
AppleCredentialManager::start called
AssertMacros: tmpData (value: 0x0),  file: /BuildRoot/Library/Caches/com.apple.xbs/Sources/AppleCredentialManager/AppleCredentialManager-83.40.3/AppleCredentialManager/AppleCredentialManager.cpp, line: 785
AppleKeyStore starting (BUILT: Sep  1 2016 16:10:39)
FakeSMCKeyStore: started
IOAPIC: Version 0x20 Vectors 64:87
ACPI: sleep states S3 S4 S5
CPUSensors: CPU family 0x6, model 0x2a, stepping 0x7, cores 4, threads 4, TJmax 98
CPUSensors: setting platform keys to [k62     ]
CPUSensors: base CPU multiplier is 33
CPUSensors: started
pci (build 22:47:21 Sep 25 2016), flags 0xe3000, pfm64 (36 cpu) 0xf80000000, 0x80000000
RTC: Only single RAM bank (128 bytes)
AppleIntelCPUPowerManagement: Turbo Ratios 1234
AppleIntelCPUPowerManagement: (built 15:16:39 Sep  1 2016) initialization complete
FakeSMC v6.23.1417 Copyright 2015 netkas, slice, usr-sse2, kozlek, navi, THe KiNG, RehabMan. All rights reserved.
FakeSMC: 13 preconfigured keys added
FakeSMC: 5 keys exported by Clover EFI
SMC: successfully initialized
000000.903220 AppleUSBLegacyRoot@: AppleUSBLegacyRoot::init: enabling legacy matching
[ PCI configuration begin ]
mcache: 4 CPU(s), 64 bytes CPU cache line size
mbinit: done [128 MB total pool size, (85/42) split]
console relocated to 0xf80000000
[ PCI configuration end, bridges 6, devices 13 ]
Controller: Intel Cougar Point (vendor ID: 8086, device ID: 1c20)
Ethernet [IntelMausi]: TCP/IPv4 segmentation offload enabled.
rooting via boot-uuid from /chosen: 3F530F0A-E79D-352B-BD72-69FBB3A6C86D
Waiting on <dict ID="0"><key>IOProviderClass</key><string ID="1">IOResources</string><key>IOResourceMatch</key><string ID="2">boot-uuid-media</string></dict>
Ethernet [IntelMausi]: TCP/IPv6 segmentation offload enabled.
Controller: ATI RV810 (vendor ID: 1002, device ID: aa68)
com.apple.AppleFSCompressionTypeZlib kmod start
com.apple.AppleFSCompressionTypeDataless kmod start
com.apple.AppleFSCompressionTypeZlib load succeeded
com.apple.AppleFSCompressionTypeDataless load succeeded
AppleIntelCPUPowerManagementClient: ready
000000.989276 PXSX@00000000: AppleUSBXHCI::createPorts: created port 1
000000.989365 PXSX@00000000: AppleUSBXHCI::createPorts: created port 2
000000.989452 PXSX@00000000: AppleUSBXHCI::createPorts: created port 3
000000.989564 PXSX@00000000: AppleUSBXHCI::createPorts: created port 4
000000.989686 PXSX@00000000: AppleUSBXHCI::createPorts: created port 5
000000.989805 PXSX@00000000: AppleUSBXHCI::createPorts: created port 6
000000.989860 PXSX@00000000: AppleUSBXHCI::createPorts: created port 7
000000.989911 PXSX@00000000: AppleUSBXHCI::createPorts: created port 8
*IOAHCIBlockStorageDriver::DetermineDeviceFeatures - !!!!! WARNING !!!!! - Force Data Set Management is set
*IOAHCIBlockStorageDriver::DetermineDeviceFeatures - !!!!! WARNING !!!!! - Force Data Set Management is set
*IOAHCIBlockStorageDriver::DetermineDeviceFeatures - !!!!! WARNING !!!!! - Force Data Set Management is set
*IOAHCIBlockStorageDriver::DetermineDeviceFeatures - !!!!! WARNING !!!!! - Force Data Set Management is set
Got boot device = IOService:/AppleACPIPlatformExpert/PCI0@0/AppleACPIPCI/RP05@1C,4/IOPP/PXSX@0/AppleAHCI/PRT0@0/IOAHCIDevice@0/AppleAHCIDiskDriver/IOAHCIBlockStorageDevice/IOBlockStorageDriver/KINGSTON SV300S37A240G Media/IOGUIDPartitionScheme/OS X El Capitan@2
BSD root: disk2s2, major 1, minor 9
Ethernet [IntelMausi]: TCP/IPv6 checksum offload enabled.
Ethernet [IntelMausi]: Version 2.0.0 using max interrupt rate 7000.
hfs: mounted OS X El Capitan on device root_device
VM Swap Subsystem is ON
Ethernet [IntelMausi]: 82579LM (Rev. 4) at 0x<ptr>, 5c:f9:dd:6e:c9:21
Waiting for DSMOS...
IOGraphics flags 0x43
Sound assertion in AppleHDAController at line 472
Apple16X50ACPI1: Identified Serial Port on ACPI Device=COM1
Previous shutdown cause: 5
Apple16X50UARTSync1: Detected 16550AF/C/CF FIFO=16 MaxBaud=115200
DSMOS has arrived
[IOBluetoothFamily][start] -- completed
000002.909759 IOUSBHostHIDDevice@: IOUSBHostHIDDevice::handleStart: unable to open interface
000002.909765 IOUSBHostHIDDevice@: IOUSBHostHIDDevice::start: unable to start IOHIDDevice
Sound assertion in AppleHDAController at line 421
Sound assertion in AppleHDAController at line 472
Sound assertion in AppleHDAController at line 421
hfs: mounted Mac OS X Snow Leopard on device disk0s2
hfs: mounted OS X Mavericks on device disk1s2
AppleLPC::notifyPlatformASPM - registering with plugin with ASPM Support true
** GPU Hardware VM is disabled (multispace: disabled, page table updates with DMA: disabled, non-contiguous VRAM: disabled)
in6_unlink_ifa: IPv6 address 0xb6e70f48b010c5c9 has no prefix
Ethernet [IntelMausi]: Link up on en0, 100-Megabit, Full-duplex, Rx/Tx flow-control
RadeonSensors (pci1): found ATI Radeon ID: 0x68e0, ATOM BIOS: 68F9HB.12.20.0.64.AS02
RadeonSensors (pci1): using device-id to resolve temperature sensor type
RadeonSensors (pci1): adding EverGreen thermal sensor
RadeonSensors (pci1): started
AppleKeyStore::handleUserClientCommandGated: asking for specific bag 501 (eff -501)

AppleKeyStore::handleUserClientCommandGated: set handle 1 as special bag -501
AppleKeyStore:Sending lock change 1 for handle 1
AppleKeyStore:Sending lock change 0 for handle -501
Sandbox: netbiosd(330) deny(1) file-read-metadata /usr
Sandbox: storeaccountd(430) deny(1) file-write-create /Users/chris/Library/Caches/com.apple.spotlight
Sandbox: storeaccountd(430) deny(1) file-write-create /Users/chris/Library/Caches/com.apple.spotlight
Sandbox: SocialPushAgent(382) deny(1) file-write-data /Users/chris/Library/Preferences/com.apple.socialpushagent.plist
Sandbox: SocialPushAgent(382) deny(1) file-write-data /Users/chris/Library/Preferences/com.apple.socialpushagent.plist
ignored is_io_service_close(0x100000428,IOHIDParamUserClient)
ignored is_io_service_close(0x100000428,IOHIDParamUserClient)
ignored is_io_service_close(0x100000428,IOHIDParamUserClient)
ignored is_io_service_close(0x100000428,IOHIDParamUserClient)
ignored is_io_service_close(0x100000428,IOHIDParamUserClient)
Sandbox: systemsoundserve(461) deny(1) file-read-data /private/var/root/Library/Preferences/.GlobalPreferences.plist


chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par tom4 Mer 11 Jan - 5:49

Hello tout le monde !

Je vois que meme quand on a un hack qui fonctionne bien on peut toujours avoir des erreurs ! curieux ! ha3

Alors, moi j'ai ca:

Code:
mCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: fontd(268) deny(1) file-issue-extension /Network/Library
SandboxViolation: CalendarAgent(288) allow(0) mach-register com.apple.CalendarStore.lock.init
utun_ctl_connect: creating interface utun0
utun_start: ifnet_disable_output returned error 12
SandboxViolation: fontd(268) deny(1) file-issue-extension /Network/Library
SandboxViolation: fmfd(300) deny(1) mach-lookup com.apple.securityd.xpc
[IOBluetoothHIDDriver][IOBluetoothHIDDriver][handleStart] staticPrepControlChannelAction returned error e00002bc
[IOBluetoothHIDDriver][IOBluetoothHIDDriver][handleStart] calling staticWillTerminateAction().
[IOBluetoothHIDDriver][IOBluetoothHIDDriver][handleStart] Failed.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
SandboxViolation: appleeventsd(44) deny(1) mach-lookup com.apple.CoreServices.coreservicesd
AMFI: code signature validation failed.
SandboxViolation: cloudd(436) deny(1) mach-lookup com.apple.coreservices.launchservicesd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: cloudpaird(417) deny(1) file-read-data /private/var/folders/qv/2ljcnz191l50gq2xd26f3dx00000gn/0/com.apple.LaunchServices-175-v2.csstore
SandboxViolation: cloudpaird(417) deny(1) file-read-data /Users/tom/Library/Preferences/com.apple.LaunchServices/com.apple.launchservices.secure.plist
SandboxViolation: cloudpaird(417) deny(1) file-read-data /Users/tom/Library/Preferences/com.apple.LaunchServices/com.apple.launchservices.secure.plist
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
loginwindow is not entitledUserEventAgent is not entitledSandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb


Je vois que mon dongle bluetooth ( et ptetre d'autres trucs ) est en cause mais je sais po pourquoi...

Un tit coup de main ? ha5
tom4
tom4
Super usr
Super usr

Date d'inscription : 01/07/2016
Age : 34
Localisation : France

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par chris1111 Mer 11 Jan - 8:24

tom4 a écrit:Hello tout le monde !

Je vois que meme quand on a un hack qui fonctionne bien on peut toujours avoir des erreurs ! curieux ! ha3

Alors, moi j'ai ca:

Code:
mCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: fontd(268) deny(1) file-issue-extension /Network/Library
SandboxViolation: CalendarAgent(288) allow(0) mach-register com.apple.CalendarStore.lock.init
utun_ctl_connect: creating interface utun0
utun_start: ifnet_disable_output returned error 12
SandboxViolation: fontd(268) deny(1) file-issue-extension /Network/Library
SandboxViolation: fmfd(300) deny(1) mach-lookup com.apple.securityd.xpc
[IOBluetoothHIDDriver][IOBluetoothHIDDriver][handleStart] staticPrepControlChannelAction returned error e00002bc
[IOBluetoothHIDDriver][IOBluetoothHIDDriver][handleStart] calling staticWillTerminateAction().
[IOBluetoothHIDDriver][IOBluetoothHIDDriver][handleStart] Failed.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
SandboxViolation: appleeventsd(44) deny(1) mach-lookup com.apple.CoreServices.coreservicesd
AMFI: code signature validation failed.
SandboxViolation: cloudd(436) deny(1) mach-lookup com.apple.coreservices.launchservicesd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: cloudpaird(417) deny(1) file-read-data /private/var/folders/qv/2ljcnz191l50gq2xd26f3dx00000gn/0/com.apple.LaunchServices-175-v2.csstore
SandboxViolation: cloudpaird(417) deny(1) file-read-data /Users/tom/Library/Preferences/com.apple.LaunchServices/com.apple.launchservices.secure.plist
SandboxViolation: cloudpaird(417) deny(1) file-read-data /Users/tom/Library/Preferences/com.apple.LaunchServices/com.apple.launchservices.secure.plist
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
loginwindow is not entitledUserEventAgent is not entitledSandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(417) deny(1) mach-lookup com.apple.lsd.modifydb


Je vois que mon dongle bluetooth ( et ptetre d'autres trucs ) est en cause mais je sais po pourquoi...

Un tit coup de main ? ha5

Essai de mettre un smbios qui concorde parfaitement avec ton pc
chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par tom4 Mer 11 Jan - 8:28

He bien j'utilise deja un SMBIOS de iMac14,2 ce qui semble revenir le plus souvent pour ma carte mere sur les divers forums que j'ai pu eplucher, du coup je vois pas trop quoi prendre.. ha26

EDIT: je joint mon config.plist
Fichiers joints
Votre vrai Boot macOS Sierra ! - Page 2 Attachment
config.plist.zip Vous n'avez pas la permission de télécharger les fichiers joints.(3 Ko) Téléchargé 7 fois
tom4
tom4
Super usr
Super usr

Date d'inscription : 01/07/2016
Age : 34
Localisation : France

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par chris1111 Mer 11 Jan - 14:37

essai celui la et avant de rebooter tape ces deux command dans le terminal

sudo touch "${3}/System/Library/Extensions/"

sudo kextcache -system-prelinked-kernel
Fichiers joints
Votre vrai Boot macOS Sierra ! - Page 2 Attachment
config.plist.zip Vous n'avez pas la permission de télécharger les fichiers joints.(3 Ko) Téléchargé 5 fois
chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par tom4 Mer 11 Jan - 15:11

chris1111 a écrit:essai celui la et avant de rebooter tape ces deux command dans le terminal

sudo touch "${3}/System/Library/Extensions/"

sudo kextcache -system-prelinked-kernel

Pas mieux !

Alors j'ai mis le config.plist de ta piece jointe dans EFI/Clover et tapées les deux lignes que tu m'as données. ( d'ailleurs elle font quoi ces ligne pour infos ? )

La premiere s'est deroulée correctement et l'autre m'a donné ca:

Votre vrai Boot macOS Sierra ! - Page 2 Captur11

Ensuite j'ai rebooté, ca m'a fait un kernel panic puis le poste a rebooté tout seul et a redémarré correctement.
J'ai tapée la ligne: sudo dmesg > ~/Desktop/dmesg.txt et ca m'a donné ca:

Code:
okup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: cloudpaird(413) deny(1) mach-lookup com.apple.lsd.mapdb
loginwindow is not entitledUserEventAgent is not entitle

Voila... ha26
tom4
tom4
Super usr
Super usr

Date d'inscription : 01/07/2016
Age : 34
Localisation : France

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par chris1111 Mer 11 Jan - 15:13

Sa dois venir du smbios j'en suis presque certain, ca me fesait presque pareil avec un iMac 14 2
chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par chris1111 Mer 11 Jan - 15:17

Tu peut tester celui ci, jai retirer les infos smbios Smile
jai laisser que trust/false

Voici le mien avec un parfait iMac 12.1 ha1


Code:

06222004 AMI  00010013)

ACPI: ACPI: SLIC 0x00000000CF786C18 000176 (v03 DELL  CBX3    06222004 MSFT 00010013)SLIC 0x00000000CF786C18 000176 (v03 DELL  CBX3    06222004 MSFT 00010013)

ACPI: ACPI: SSDT 0x00000000CF153000 000508 (v01 APPLE  CpuPm    00013900 INTL 20130117)SSDT 0x00000000CF153000 000508 (v01 APPLE  CpuPm    00013900 INTL 20130117)

ACPI: ACPI: SSDT 0x00000000CF152000 00054D (v01 PmRef  CpuPm    00003000 INTL 20120320)SSDT 0x00000000CF152000 00054D (v01 PmRef  CpuPm    00003000 INTL 20120320)

ACPI: ACPI: SSDT 0x00000000CF151000 0001A2 (v01 PmRefA CpuCst  00003000 INTL 20120320)SSDT 0x00000000CF151000 0001A2 (v01 PmRefA CpuCst  00003000 INTL 20120320)

ACPI Warning: ACPI Warning: Unsupported module-level executable opcode 0x70 at table offset 0x7587Unsupported module-level executable opcode 0x70 at table offset 0x7587 (20140828/psloop-11c)
 (20140828/psloop-11c)
ACPI Warning: ACPI Warning: Unsupported module-level executable opcode 0x70 at table offset 0x75C5Unsupported module-level executable opcode 0x70 at table offset 0x75C5 (20140828/psloop-11c)
 (20140828/psloop-11c)
ACPI Error: ACPI Error: [\134_SB_.PCI0.LPCB.TPM_][\134_SB_.PCI0.LPCB.TPM_] Namespace lookup failure, AE_ALREADY_EXISTS Namespace lookup failure, AE_ALREADY_EXISTS (20140828/dswload-1c5)
 (20140828/dswload-1c5)
ACPI Exception: AE_ALREADY_EXISTS, ACPI Exception: AE_ALREADY_EXISTS, During name lookup/catalogDuring name lookup/catalog (20140828/psobject-131)
 (20140828/psobject-131)
ACPI Error: ACPI Error: [\134_SB_.CPU0][\134_SB_.CPU0] Namespace lookup failure, AE_NOT_FOUND Namespace lookup failure, AE_NOT_FOUND (20140828/dswload-125)
 (20140828/dswload-125)
ACPI Exception: AE_NOT_FOUND, ACPI Exception: AE_NOT_FOUND, During name lookup/catalogDuring name lookup/catalog (20140828/psobject-131)
 (20140828/psobject-131)
ACPI: ACPI: All ACPI Tables successfully acquiredAll ACPI Tables successfully acquired

AppleFDEKeyStore::probe(IOResources)
AppleKeyStore::probe(IOResources)
AppleFDEKeyStore::start(IOResources) <1>
IOGetBootKeyStoreData: data at address 0 size 0
AppleACPICPU: ProcessorId=1 LocalApicId=0 Enabled
AppleACPICPU: ProcessorId=2 LocalApicId=2 Enabled
cpu_data_alloc(1) <ptr> desc_table: <ptr> ldt: <ptr> int_stack: 0x<ptr>-0x<ptr>
AppleACPICPU: ProcessorId=3 LocalApicId=4 Enabled
cpu_data_alloc(2) <ptr> desc_table: <ptr> ldt: <ptr> int_stack: 0x<ptr>-0x<ptr>
AppleACPICPU: ProcessorId=4 LocalApicId=6 Enabled
cpu_data_alloc(3) <ptr> desc_table: <ptr> ldt: <ptr> int_stack: 0x<ptr>-0x<ptr>
AppleACPICPU: ProcessorId=5 LocalApicId=4 Disabled
AppleACPICPU: ProcessorId=6 LocalApicId=5 Disabled
AppleACPICPU: ProcessorId=7 LocalApicId=6 Disabled
AppleACPICPU: ProcessorId=8 LocalApicId=7 Disabled
AppleACPICPU: ProcessorId=9 LocalApicId=8 Disabled
AppleACPICPU: ProcessorId=10 LocalApicId=9 Disabled
AppleACPICPU: ProcessorId=11 LocalApicId=10 Disabled
AppleACPICPU: ProcessorId=12 LocalApicId=11 Disabled
AppleACPICPU: ProcessorId=13 LocalApicId=12 Disabled
AppleACPICPU: ProcessorId=14 LocalApicId=13 Disabled
AppleACPICPU: ProcessorId=15 LocalApicId=14 Disabled
AppleACPICPU: ProcessorId=16 LocalApicId=15 Disabled
calling mpo_policy_init for TMSafetyNet
Security policy loaded: Safety net for Time Machine (TMSafetyNet)
calling mpo_policy_init for AMFI
Security policy loaded: Apple Mobile File Integrity (AMFI)
calling mpo_policy_init for Sandbox
Security policy loaded: Seatbelt sandbox policy (Sandbox)
calling mpo_policy_init for Quarantine
Security policy loaded: Quarantine policy (Quarantine)
Copyright (c) 1982, 1986, 1989, 1991, 1993
   The Regents of the University of California. All rights reserved.

MAC Framework successfully initialized
ulock_initialize>thread_max=10240, ull_hash_buckets=4096
using 16384 buffer headers and 10240 cluster IO buffer headers
AppleCredentialManager::start called
AppleKeyStore::start(IOResources) <1>
AppleKeyStore starting (BUILT: Nov 17 2016 21:25:42)
AICPM::start: calling i386_pmRegister()
CPU Data: size = 4, alignment = 64
Pkg Data: size = 0
CPU Data: size = 4, alignment = 64
Pkg Data: size = 0
CPU Data: size = 4, alignment = 64
Pkg Data: size = 0
CPU Data: size = 4, alignment = 64
Pkg Data: size = 0
AICPM::start: back from i386_pmRegister()
AICPM::start: calling i386_pmThreadInit()
Started cpu 1 (lapic id 00000002)
AICPM::start: back from i386_pmThreadInit()
AICPM::start: calling registerService()
AICPM::start: back from registerService()
AppleIntelCPUPowerManagement: ready
FakeSMCKeyStore: started
Started cpu 2 (lapic id 00000004)
Started cpu 3 (lapic id 00000006)
IOAPIC: Version 0x20 Vectors 64:87
ACPI: sleep states S3 S4 S5
CPUSensors: CPU family 0x6, model 0x2a, stepping 0x7, cores 4, threads 4, TJmax 98
CPUSensors: setting platform keys to [k62    ]
CPUSensors: base CPU multiplier is 33
CPUSensors: started
RTC: Only single RAM bank (128 bytes)
RTC: Only single RAM bank (128 bytes)
pci (build 20:33:53 Nov 17 2016), flags 0xe3000, pfm64 (36 cpu) 0xf80000000, 0x80000000
pci (build 20:33:53 Nov 17 2016), flags 0xe3000, pfm64 (36 cpu) 0xf80000000, 0x80000000
[ PCI configuration begin ]
kPEDisableScreen -1
hpet_init: Frequency =    14.318179MHz, hpetCvtt2n = 00000045.D75E0F7F, hpetCvtn2t = 00000000.03AA5B32
AppleIntelCPUPowerManagement: Turbo Mode enabled
AppleIntelCPUPowerManagement: Turbo Ratios 1234
AppleIntelCPUPowerManagement: (built 20:34:56 Nov 17 2016) initialization complete
FakeSMC v6.23.1417 Copyright 2015 netkas, slice, usr-sse2, kozlek, navi, THe KiNG, RehabMan. All rights reserved.
FakeSMC: 13 preconfigured keys added
FakeSMC: 5 keys exported by Clover EFI
SMC: successfully initialized
HID: Legacy shim 2
initialize_screen: b=F80000000, w=00000780, h=00000438, r=00001E00, d=00000001
kPEEnableScreen 1
console relocated to 0xf80000000
[ PCI configuration end, bridges 6, devices 13 ]
Controller: Intel Cougar Point (vendor ID: 8086, device ID: 1c20)
[AHCI][PML][00000000]+IOAHCIPortMultiplierGlobals::IOAHCIPortMultiplierGlobals
[AHCI][PML][00000000]-IOAHCIPortMultiplierGlobals::IOAHCIPortMultiplierGlobals
[AHCI][HBA][00000000]+AppleAHCIGlobals::AppleAHCIGlobals
[AHCI][HBA][00000000]-AppleAHCIGlobals
Controller: ATI RV810 (vendor ID: 1002, device ID: aa68)
000001.249560 AppleUSBLegacyRoot@: AppleUSBLegacyRoot::init: enabling legacy matching
mcache: 4 CPU(s), 64 bytes CPU cache line size
mbinit: done [128 MB total pool size, (85/42) split]
bsd_autoconf: calling kminit
000001.251301 PXSX@00000000: AppleUSBXHCI::createPorts: created port 1
000001.251417 PXSX@00000000: AppleUSBXHCI::createPorts: created port 2
000001.251504 PXSX@00000000: AppleUSBXHCI::createPorts: created port 3
000001.251583 PXSX@00000000: AppleUSBXHCI::createPorts: created port 4
000001.251676 PXSX@00000000: AppleUSBXHCI::createPorts: port 5 unsupported protocol USB  03.00
000001.251684 PXSX@00000000: AppleUSBXHCI::createPorts: created port 5
000001.251767 PXSX@00000000: AppleUSBXHCI::createPorts: port 6 unsupported protocol USB  03.00
000001.251775 PXSX@00000000: AppleUSBXHCI::createPorts: created port 6
000001.251857 PXSX@00000000: AppleUSBXHCI::createPorts: port 7 unsupported protocol USB  03.00
000001.251865 PXSX@00000000: AppleUSBXHCI::createPorts: created port 7
000001.251941 PXSX@00000000: AppleUSBXHCI::createPorts: port 8 unsupported protocol USB  03.00
000001.251949 PXSX@00000000: AppleUSBXHCI::createPorts: created port 8
000001.252077 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 0 sleepUnits 0
000001.252161 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 0 sleepUnits 0
000001.252243 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 0 sleepUnits 0
000001.252325 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 0 sleepUnits 0
000001.252368 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 150 sleepUnits 0
000001.252409 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 150 sleepUnits 0
000001.252450 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 150 sleepUnits 0
000001.252497 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 150 sleepUnits 0
000001.254851 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 100 sleepUnits 0
000001.255236 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 100 sleepUnits 0
com.apple.AppleFSCompressionTypeZlib kmod start
com.apple.AppleFSCompressionTypeDataless kmod start
com.apple.AppleFSCompressionTypeZlib load succeeded
com.apple.AppleFSCompressionTypeDataless load succeeded
rooting via boot-uuid from /chosen: 130AC23A-69B4-364C-AEEA-C0735AF9CF8D
AppleIntelCPUPowerManagementClient: ready
Waiting on <dict ID="0"><key>IOProviderClass</key><string ID="1">IOResources</string><key>IOResourceMatch</key><string ID="2">boot-uuid-media</string></dict>
Ethernet [IntelMausi]: TCP/IPv4 segmentation offload enabled.
Ethernet [IntelMausi]: TCP/IPv6 segmentation offload enabled.
Ethernet [IntelMausi]: TCP/IPv6 checksum offload enabled.
Ethernet [IntelMausi]: Version 2.0.0 using max interrupt rate 7000.
Got boot device = IOService:/AppleACPIPlatformExpert/PCI0@0/AppleACPIPCI/SATA@1F,2/AppleIntelPchSeriesAHCI/PRT0@0/IOAHCIDevice@0/AppleAHCIDiskDriver/IOAHCIBlockStorageDevice/IOBlockStorageDriver/KINGSTON SV300S37A240G Media/IOGUIDPartitionScheme/Untitled 2@2
BSD root: disk1s2, major 1, minor 4
hfs: mounted Macintosh-HD on device b(1, 4)
VM Swap Subsystem is ON
Ethernet [IntelMausi]: 82579LM (Rev. 4) at 0x<ptr>, 5c:f9:dd:6e:c9:21
hfs: Removed 0 orphaned / unlinked files and 4 directories
Report bytes: input:8 output:1 feature:0Collections : 2Buttons    : input:2 output:1 feature:0Values      : input:0 output:0 feature:0Element value capacity 6656Report count: 1Report ID: 0 input:64 output:8 feature:0HID: Legacy shim 2
Report bytes: input:8 output:1 feature:0Collections : 2Buttons    : input:2 output:1 feature:0Values      : input:0 output:0 feature:0Element value capacity 6656Report count: 1Report ID: 0 input:64 output:8 feature:0HID: Legacy shim 2
Waiting for DSMOS...
hfs: mounted Mac OS X Snow Leopard on device disk0s2
hfs: mounted OS X Mavericks on device disk2s2
IOGraphics flags 0x43
Sound assertion in AppleHDAController at line 472
Sound assertion in AppleHDAController at line 421
Report bytes: input:32 output:32 feature:1Collections : 4Buttons    : input:4 output:4 feature:0Values      : input:0 output:0 feature:0Element value capacity 4020Report bytes: input:8 output:1 feature:1Report count: 5Report ID: 0 input:0 output:0 feature:0Report ID: 16 input:56 output:56 feature:8Report ID: 17 input:160 output:160 feature:8Report ID: 32 input:120 output:120 feature:8Report ID: 33 input:256 output:256 feature:8000003.181879 IOUSBHostHIDDevice: IOUSBHostHIDDevice::handleStart: unable to open interface
000003.181889 IOUSBHostHIDDevice: IOUSBHostHIDDevice::start: unable to start IOHIDDevice
Report bytes: input:32 output:32 feature:1Collections : 4Buttons    : input:4 output:4 feature:0Values      : input:0 output:0 feature:0Element value capacity 4020Report count: 5Report ID: 0 input:0 output:0 feature:0Report ID: 16 input:56 output:56 feature:8Report ID: 17 input:160 output:160 feature:8Report ID: 32 input:120 output:120 feature:8Report ID: 33 input:256 output:256 feature:8Collections : 6Buttons    : input:6 output:0 feature:0Values      : input:4 output:0 feature:0Element value capacity 25304Report count: 5Report ID: 0 input:0 output:0 feature:0Report ID: 2 input:64 output:8 feature:8Report ID: 3 input:40 output:8 feature:8Report ID: 4 input:16 output:8 feature:8Report ID: 8 input:16 output:8 feature:8Report bytes: input:8 output:1 feature:1Collections : 6Buttons    : input:6 output:0 feature:0Values      : input:4 output:0 feature:0Element value capacity 25304Report count: 5Report ID: 0 input:0 output:0 feature:0Report ID: 2 input:64 output:8 feature:8Report ID: 3 input:40 output:8 feature:8Report ID: 4 input:16 output:8 feature:8Report ID: 8 input:16 output:8 feature:8virtual bool IOGraphicsAccelerator2::start(IOService *): configureDevice failed
Sound assertion in AppleHDAController at line 472
Sound assertion in AppleHDAController at line 421
000003.192051 IOUSBHostHIDDevice: IOUSBHostHIDDevice::handleStart: unable to open interface
000003.192065 IOUSBHostHIDDevice: IOUSBHostHIDDevice::start: unable to start IOHIDDevice
000003.192083 IOUSBHostHIDDevice: IOUSBHostHIDDevice::handleStart: unable to open interface
000003.192091 IOUSBHostHIDDevice: IOUSBHostHIDDevice::start: unable to start IOHIDDevice
000003.192181 IOUSBHostHIDDevice: IOUSBHostHIDDevice::handleStart: unable to open interface
000003.192191 IOUSBHostHIDDevice: IOUSBHostHIDDevice::start: unable to start IOHIDDevice
HID: Legacy shim 2
[IOBluetoothFamily][start] -- completed
PMRD: prevent idle sleep list: IODisplayWrangler+ (1)
prevent idle sleep list: IODisplayWrangler+ (1)
HID: Legacy shim 2
Previous shutdown cause: 5
DSMOS has arrived
unexpected session: 100000 uid: -1 requested by: 34
AppleKeyStore: operation failed (pid: 34 sel: 7 ret: e00002c2 '-536870206', -1, 100000)
KLOG is already initialized
Accelerator successfully registered with controller.
AppleLPC::notifyPlatformASPM - registering with plugin with ASPM Support true
[AGPM Controller] build gpuDict by GPU PEGP.
[AGPM Controller] unknownPlatform
no Heuristic ID!
AGPM::start - publish fMinPowerState = 0 fMaxPowerState = 3
Ethernet [IntelMausi]: Link up on en0, 100-Megabit, Full-duplex, Rx/Tx flow-control
kPEDisableScreen 1
RadeonSensors (pci1): found ATI Radeon ID: 0x68e0, ATOM BIOS: 68F9HB.12.20.0.64.AS02
RadeonSensors (pci1): using device-id to resolve temperature sensor type
RadeonSensors (pci1): adding EverGreen thermal sensor
RadeonSensors (pci1): started
kPEDisableScreen 1
kPEEnableScreen 1
kPEDisableScreen 1
kPEEnableScreen 1
AppleKeyStore: set handle 1 as special bag -501
AppleKeyStore: Sending lock change 0 for handle -501
AppleKeyStore::ipc_device_state_transition: Device UnLock call(-501): lockstate=0, transientCnt=0, 93
AppleKeyStore::ipc_device_state_transition: Device UnLocked(-501): lockstate=0, 93
SandboxViolation: fmfd(381) deny(1) file-write-create /Users/chris/Library/Keychains/login.keychain-db.sb-b9190068-9vYEyP
SandboxViolation: cloudd(386) deny(1) mach-lookup com.apple.coreservices.launchservicesd
SandboxViolation: bird(320) deny(1) mach-lookup com.apple.metadata.mds.legacy
utun_ctl_connect: creating interface utun0
utun_start: ifnet_disable_output returned error 12
SandboxViolation: fontd(326) deny(1) file-issue-extension /Network/Library
SandboxViolation: appleeventsd(44) deny(1) mach-lookup com.apple.CoreServices.coreservicesd
SandboxViolation: storeassetd(403) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: storeassetd(403) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: fontd(326) deny(1) file-issue-extension /Network/Library
SandboxViolation: AssetCacheLocato(437) deny(1) file-read-data /Users/chris/Library/Preferences/ByHost/.GlobalPreferences.096FE78B-E2D2-5904-8CC3-44A741CF8DAB.plist
SandboxViolation: AssetCacheLocato(437) deny(1) file-read-data /Users/chris/Library/Preferences/.GlobalPreferences.plist
SandboxViolation: AssetCacheLocato(437) deny(1) mach-lookup com.apple.metadata.mds.legacy
SandboxViolation: AssetCacheLocato(437) deny(1) mach-lookup com.apple.cookied
SandboxViolation: suggestd(433) deny(1) mach-lookup com.apple.metadata.mds
SandboxViolation: suggestd(433) deny(1) mach-lookup com.apple.metadata.mds
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
SandboxViolation: cloudphotosd(330) deny(1) mach-lookup com.apple.logind
SandboxViolation: softwareupdate_n(464) deny(1) file-read-metadata /Users/chris
loginwindow is not entitledloginwindow is not entitledUserEventAgent is not entitledUserEventAgent is not entitle


Fichiers joints
Votre vrai Boot macOS Sierra ! - Page 2 Attachment
config.plist.zip Vous n'avez pas la permission de télécharger les fichiers joints.(3 Ko) Téléchargé 3 fois
chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par tom4 Mer 11 Jan - 15:55

He ouais ca donne envie d'avoir le meme ! Laughing
J'ai bien vu plus haut que t'avais réussis a faire des merveilles ! Wink

Nan, pas mieux avec le SMBIOS vide:

Code:
398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
Google Chrome He[429] triggered unnest of range 0x7fffab200000->0x7fffab400000 of DYLD shared region in VM map 0xd19f5cbb58bd94c7. While not abnormal for debuggers, this increases system memory footprint until the target exits.
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
Google Chrome He[432] triggered unnest of range 0x7fffab200000->0x7fffab400000 of DYLD shared region in VM map 0xd19f5cbb58bd8547. While not abnormal for debuggers, this increases system memory footprint until the target exits.
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: cloudpaird(398) deny(1) mach-lookup com.apple.lsd.mapdb
Google Chrome He[433] triggered unnest of range 0x7fffab200000->0x7fffab400000 of DYLD shared region in VM map 0xd19f5cbb58bd8b17. While not abnormal for debuggers, this increases system memory footprint until the target exits.
SandboxViolation: cloudd(434) deny(1) mach-lookup com.apple.coreservices.launchservicesd
Google Chrome He[435] triggered unnest of range 0x7fffab200000->0x7fffab400000 of DYLD shared region in VM map 0xd19f5cbb58bd882f. While not abnormal for debuggers, this increases system memory footprint until the target exits.
Google Chrome He[436] triggered unnest of range 0x7fffab200000->0x7fffab400000 of DYLD shared region in VM map 0xd19f5cbb58bd95bf. While not abnormal for debuggers, this increases system memory footprint until the target exits.
Google Chrome He[437] triggered unnest of range 0x7fffab200000->0x7fffab400000 of DYLD shared region in VM map 0xd19f5cbb58bd8dff. While not abnormal for debuggers, this increases system memory footprint until the target exits.
loginwindow is not entitledUserEventAgent is not entitle

Ca veut dire quoi SandboxViolation ? enfin qu'est ce que ces lignes veulent dire tu crois ?
tom4
tom4
Super usr
Super usr

Date d'inscription : 01/07/2016
Age : 34
Localisation : France

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par chris1111 Mer 11 Jan - 15:57

Reboot encore voir, des fois sa prend un deuxième boot Cool
chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par chris1111 Mer 11 Jan - 16:16

tom4 a écrit:
chris1111 a écrit:Reboot encore voir, des fois sa prend un deuxième boot Cool

Nan, je viens de rebooter 2 fois et meme chose..



Je desespere.. No
Désolé jai virer ton log en éditant au lieu de Citer  ha26
Tu vas y arriver en cherchant tu veras Laughing
sandbox violation cest la sécurité dans OS X, plusieurs element peuvent être mis dans la sandbox Razz faut pas trop sen faire avec ca

Tu peut google sur la sandbox et tu auras beaucoup de lecture lol!
chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par tom4 Mer 11 Jan - 16:21

chris1111 a écrit:
tom4 a écrit:
chris1111 a écrit:Reboot encore voir, des fois sa prend un deuxième boot Cool

Nan, je viens de rebooter 2 fois et meme chose..



Je desespere.. No

Tu vas y arriver en cherchant tu veras Laughing
sandbox violation cest la sécurité dans OS X, plusieurs element peuvent être mis dans la sandbox Razz faut pas trop sen faire avec ca

Tu peut google sur la sandbox et tu auras beaucoup de lecture lol!
[/quote]

Oui je sens que je suis pas couché moi ! lol!
En gros ca veut un peu tout et rien dire quoi ? ^^

Le soucis c'est que c'est pas tres explicite ces lignes, tu les comprends toutes toi ? ha4
tom4
tom4
Super usr
Super usr

Date d'inscription : 01/07/2016
Age : 34
Localisation : France

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par chris1111 Mer 11 Jan - 16:30

tom4 a écrit:
chris1111 a écrit:
tom4 a écrit:
chris1111 a écrit:Reboot encore voir, des fois sa prend un deuxième boot Cool

Nan, je viens de rebooter 2 fois et meme chose..



Je desespere.. No

Tu vas y arriver en cherchant tu veras Laughing
sandbox violation cest la sécurité dans OS X, plusieurs element peuvent être mis dans la sandbox Razz faut pas trop sen faire avec ca

Tu peut google sur la sandbox et tu auras beaucoup de lecture lol!

Oui je sens que je suis pas couché moi ! lol!
En gros ca veut un peu tout et rien dire quoi ? ^^

Le soucis c'est que c'est pas tres explicite ces lignes, tu les comprends toutes toi ? ha4[/quote]
Pour le miennes j'en comprend pas mal oui Wink quand jai commencer a chercher mon boot (dmesg) avait la meme choses que toi ha26
jai fini par arriver un meilleur résultat pirat
chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par chris1111 Mer 11 Jan - 16:31

tom4 a écrit:
chris1111 a écrit:
tom4 a écrit:
chris1111 a écrit:Reboot encore voir, des fois sa prend un deuxième boot Cool

Nan, je viens de rebooter 2 fois et meme chose..



Je desespere.. No

Tu vas y arriver en cherchant tu veras Laughing
sandbox violation cest la sécurité dans OS X, plusieurs element peuvent être mis dans la sandbox Razz faut pas trop sen faire avec ca

Tu peut google sur la sandbox et tu auras beaucoup de lecture lol!

Oui je sens que je suis pas couché moi ! lol!
En gros ca veut un peu tout et rien dire quoi ? ^^
Le soucis c'est que c'est pas tres explicite ces lignes, tu les comprends toutes toi ? ha4
Pour le miennes j'en comprend pas mal  oui Wink  quand jai commencer a chercher mon boot (dmesg) j'avait la meme choses que toi ha26
jai fini par arriver un meilleur résultat pirat
chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par tom4 Mer 11 Jan - 16:40

Bon bin a moi de devenir aussi bon ! ^^
En tout cas merci pour tes coups de main, ca fait du bien d'avoir de l'aide ! ha28
tom4
tom4
Super usr
Super usr

Date d'inscription : 01/07/2016
Age : 34
Localisation : France

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par chris1111 Mer 11 Jan - 16:53

tom4 a écrit:Bon bin a moi de devenir aussi bon ! ^^
En tout cas merci pour tes coups de main, ca fait du bien d'avoir de l'aide ! ha28
c'est en cherchant que l'on arrive a comprendre
bien souvent c'est comme ca.
chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par tom4 Mer 11 Jan - 17:01

J'suis bien d'accord ! ca fait des semaines que j'épluche tous les forums et les sujets pour me faire une install aux petits oignons et complètement fonctionnelle, j'ai beaucoup appris sur le sujet et en grande partie grace au forum HMF ! ^^
tom4
tom4
Super usr
Super usr

Date d'inscription : 01/07/2016
Age : 34
Localisation : France

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par tom4 Mer 11 Jan - 19:52

Hello !

Bon y'a du mieux !!!

En cherchant sur Google une ligne de mon dmesg.txt je suis tombé sur un resultat ou dans le preview y'avait la mention " KernelPM " et ca m'a rappelé la petite coche dans Clover Configurator dans la section " Kernel and Kext Patches ", la coche: KernelPm !

Je l'ai donc cochée et rebooté !

Avant l'operation mon dmesg.txt ressemblait a ca:

Code:
ion: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: cloudpaird(388) deny(1) mach-lookup com.apple.lsd.mapdb
handleInformationResponse kBluetoothL2CAPInformationTypeExtendedFeatures deviceAccountPaired, check fixed channel support
[BNBMouseDevice::init][92] init is complete
[IOBluetoothDevice][moreIncomingData] -- ACL length (16) > (16 - 4)
[IOBluetoothDevice][moreIncomingData] -- ACL length (18) > (20 - 4)
[BNBDevice::staticKickStartTimerFired] Timer fired
[BNBDevice::staticKickStartTimerFired] ========= Forcing MT restart =========
[IOBluetoothHIDDriver][BNBMouseDevice][setReportWL][c4-2c-03-b6-e9-9e] _deviceReady is FALSE after command sleep
[BNBMouseDevice::_simpleSetReport][92] ERROR: setReport returned error 0xe00002d8 for reportID 0xF2
[BNBMouseDevice::_resetMultitouchDevice][92] ERROR: _simpleSetReport returned error 0xe00002d8
[IOBluetoothHIDDriver][BNBMouseDevice][handleStart] staticPrepControlChannelAction returned error e00002bc
[IOBluetoothHIDDriver][BNBMouseDevice][handleStart] calling staticWillTerminateAction().
[IOBluetoothHIDDriver][BNBMouseDevice][handleStart] Failed.
[BNBMouseDevice::handleStart][92] returning 0
SandboxViolation: softwareupdate_n(475) deny(1) file-read-metadata /Users/tom
[IOBluetoothHIDDriver][IOBluetoothHIDDriver][handleStart] staticPrepControlChannelAction returned error e00002bc
[IOBluetoothHIDDriver][IOBluetoothHIDDriver][handleStart] calling staticWillTerminateAction().
[IOBluetoothHIDDriver][IOBluetoothHIDDriver][handleStart] Failed.
handleInformationResponse kBluetoothL2CAPInformationTypeExtendedFeatures deviceAccountPaired, check fixed channel support
[BNBMouseDevice::init][92] init is complete
[IOBluetoothDevice][moreIncomingData] -- ACL length (16) > (16 - 4)
[IOBluetoothDevice][moreIncomingData] -- ACL length (18) > (20 - 4)
SandboxViolation: fontd(306) deny(1) file-issue-extension /Network/Library
[BNBDevice::staticKickStartTimerFired] Timer fired
[BNBDevice::staticKickStartTimerFired] ========= Forcing MT restart =========
[IOBluetoothHIDDriver][BNBMouseDevice][setReportWL][c4-2c-03-b6-e9-9e] _deviceReady is FALSE after command sleep
[BNBMouseDevice::_simpleSetReport][92] ERROR: setReport returned error 0xe00002d8 for reportID 0xF2
[BNBMouseDevice::_resetMultitouchDevice][92] ERROR: _simpleSetReport returned error 0xe00002d8
[IOBluetoothHIDDriver][BNBMouseDevice][handleStart] staticPrepControlChannelAction returned error e00002bc
[IOBluetoothHIDDriver][BNBMouseDevice][handleStart] calling staticWillTerminateAction().
[IOBluetoothHIDDriver][BNBMouseDevice][handleStart] Failed.
[BNBMouseDevice::handleStart][92] returning 0
[IOBluetoothHIDDriver][IOBluetoothHIDDriver][handleStart] staticPrepControlChannelAction returned error e00002bc
[IOBluetoothHIDDriver][IOBluetoothHIDDriver][handleStart] calling staticWillTerminateAction().
[IOBluetoothHIDDriver][IOBluetoothHIDDriver][handleStart] Failed.
loginwindow is not entitledUserEventAgent is not entitle

et maintenant il ressemble a ca:

Code:
leAHCI/PRT0@0/IOAHCIDevice@0/AppleAHCIDiskDriver/IOAHCIBlockStorageDevice/IOBlockStorageDriver/SanDisk SDSSDA240G Media/IOGUIDPartitionScheme/Untitled 2@2
BSD root: disk2s2, major 1, minor 4
Ethernet [AtherosE2200]: Killer E2200: (Rev. 16) at 0x<ptr>, fc:aa:14:22:96:ca
Ethernet [AtherosE2200]: Version 2.2.0 using max interrupt rate 5524.
hfs: mounted Sierra HD on device b(1, 4)
XCPM: registered
XCPM: registered
VM Swap Subsystem is ON
000001.316652 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 100 sleepUnits 0
Report bytes: input:8 output:1 feature:0Collections : 2Buttons     : input:2 output:1 feature:0Values      : input:0 output:0 feature:0Element value capacity 6608Report count: 1Report ID: 0 input:64 output:8 feature:0HID: Legacy shim 2
000001.655650 AppleUSBHostResources@: AppleUSBHostResources::allocateDownstreamBusCurrentGated: assuming successful wakeUnits 100 sleepUnits 0
Waiting for DSMOS...
IOGraphics flags 0x43
**** [IOBluetoothHostControllerUSBTransport][start] -- completed -- result = TRUE -- 0x1800 ****
**** [BroadcomBluetoothHostControllerUSBTransport][start] -- Completed (matched on Device) -- 0x1800 ****
Previous shutdown cause: 5
Sound assertion in AppleHDAController at line 472
Sound assertion in AppleHDAController at line 421
NVDAStartupWeb: Web
Report bytes: input:7 output:0 feature:0Collections : 3Buttons     : input:1 output:0 feature:0Values      : input:3 output:0 feature:0Element value capacity 412Report count: 1Report ID: 0 input:56 output:0 feature:0NVDAGM100HAL loaded and registered
nvAccelerator::attach provider NVDAgl parent display
nvAccelerator::probe enter provider: NVDAgl [score 130]
nvAccelerator::probe parent: display
nvAccelerator::probe return success <ptr>
nvAccelerator::probe remove "unmatched" property
nvAccelerator::detach provider NVDAgl parent display
nvAccelerator::attach provider NVDAgl parent display
nvAccelerator: ENTER ::start with provider: NVDAgl
nvAccelerator::start switch to parent: display
NVSPI::start starting!
DSMOS has arrived
[IOBluetoothFamily][staticBluetoothTransportShowsUp] -- Received Bluetooth Controller register service notification -- 0x1800
[IOBluetoothFamily][start] -- completed
[IOBluetoothHostController][start] -- completed
PMRD: prevent idle sleep list: IODisplayWrangler+ (1)
prevent idle sleep list: IODisplayWrangler+ (1)
HID: Legacy shim 2
Report bytes: input:4 output:1 feature:2Collections : 5Buttons     : input:17 output:0 feature:1Values      : input:0 output:0 feature:0Element value capacity 912Report count: 5Report ID: 0 input:0 output:0 feature:0Report ID: 1 input:16 output:8 feature:8Report ID: 3 input:32 output:8 feature:8Report ID: 2 input:16 output:8 feature:8Report ID: 4 input:16 output:8 feature:16HID: Legacy shim 2
[IOBluetoothHostController::setConfigState] calling registerService
**** [IOBluetoothFamily][ProcessBluetoothTransportShowsUpActionWL] -- calling IOBluetoothFamily's registerService() -- 0xa240 -- 0x0800 -- 0x1800 ****

**** [IOBluetoothFamily][ProcessBluetoothTransportShowsUpActionWL] -- Connected to the transport successfully -- 0xa240 -- 0x0800 -- 0x1800 ****

hmm.. mismatch sizes: 3100 vs 20
PPGTT is enabled
IOPPF: XCPM mode
IOPPF: XCPM mode
[AGPM Controller] build gpuDict by GPU display.
[AGPM Controller] unknownPlatform
no Heuristic ID!
AGPM::start - publish fMinPowerState = 0 fMaxPowerState = 3
[AGPM Controller] build gpuDict by GPU GFX0.
AGPM::start - publish fMinPowerState = 0 fMaxPowerState = 15
unexpected session: 100000 uid: -1 requested by: 34
AppleKeyStore: operation failed (pid: 34 sel: 7 ret: e00002c2 '-536870206', -1, 100000)
kPEDisableScreen 1
kPEDisableScreen 1
NTFS driver 3.13 [Flags: R/W].
NTFS volume name 525Go, version 3.1.
bool IOAccelDisplayPipe2::init_framebuffer_resource(uint32_t, IOAccelResource2 *): getCurrentDisplayMode for framebuffer 0 failed
bool IOAccelDisplayPipe2::init_framebuffer_resource(uint32_t, IOAccelResource2 *): getCurrentDisplayMode for framebuffer 1 failed
bool IOAccelDisplayPipe2::init_framebuffer_resource(uint32_t, IOAccelResource2 *): getCurrentDisplayMode for framebuffer 2 failed
NTFS volume name Re\M-L\M^Aserve\M-L\M^A au syste\M-L\M^@me, version 3.1.
kPEDisableScreen 1
NTFS volume name Windows 7, version 3.1.
kPEEnableScreen 1
NTFS-fs error (device /dev/disk0s2, pid 39): ntfs_inode_read(): Inode is not in use.
NTFS-fs error (device /dev/disk0s2, pid 39): ntfs_inode_read(): Failed (error 2) for inode 0x5be.  Run chkdsk.
kPEEnableScreen 1
NTFS-fs error (device /dev/disk1s1, pid 39): ntfs_inode_read(): Inode is not in use.
NTFS-fs error (device /dev/disk1s1, pid 39): ntfs_inode_read(): Failed (error 2) for inode 0x1878.  Run chkdsk.
kPEEnableScreen 1
kPEEnableScreen 1
kPEDisableScreen 1
kPEEnableScreen 1
kPEEnableScreen 1
kPEDisableScreen 1
Ethernet [AtherosE2200]: Link up on en0, 1-Gigabit, full-duplex, Rx/Tx flow-control, energy-efficient-ethernet
kPEEnableScreen 1
kPEEnableScreen 1
kPEEnableScreen 1
kPEEnableScreen 1
kPEDisableScreen 1
kPEEnableScreen 1
kPEEnableScreen 1
kPEEnableScreen 1
kPEEnableScreen 1
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
AppleKeyStore: set handle 1 as special bag -501
AppleKeyStore: Sending lock change 0 for handle -501
AppleKeyStore::ipc_device_state_transition: Device UnLock call(-501): lockstate=0, transientCnt=0, 94
AppleKeyStore::ipc_device_state_transition: Device UnLocked(-501): lockstate=0, 94
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CommCenter(265) deny(1) file-read-metadata /private/var/folders
SandboxViolation: CalendarAgent(298) allow(0) mach-register com.apple.CalendarStore.lock.init
utun_ctl_connect: creating interface utun0
utun_start: ifnet_disable_output returned error 12
SandboxViolation: fontd(323) deny(1) file-issue-extension /Network/Library
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
IOReturn IOAccelSurface2::surface_unlock_options(enum eLockType, uint32_t): surface is not locked.
SandboxViolation: fmfd(337) deny(1) mach-lookup com.apple.securityd.xpc
SandboxViolation: appleeventsd(44) deny(1) mach-lookup com.apple.CoreServices.coreservicesd
SandboxViolation: storeassetd(367) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: storeassetd(367) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: suggestd(308) deny(1) mach-lookup com.apple.metadata.mds
SandboxViolation: cloudd(391) deny(1) mach-lookup com.apple.coreservices.launchservicesd
loginwindow is not entitledUserEventAgent is not entitle

J'ai toujours mon bluetooth qui disfonctionne mais ca a deja une meilleure tete je trouve ! Very Happy
Qu'en penses-tu Chris ?
tom4
tom4
Super usr
Super usr

Date d'inscription : 01/07/2016
Age : 34
Localisation : France

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par chris1111 Mer 11 Jan - 20:03

@tom4 essai plutôt dans ton cas
<key>KernelHaswellE</key>
<true/>
Tu psut simplement aussi l'essayer par Clover

Option / Binaries Patch / Kernel Haswell E

Edit*****
c'est en essayant des choses et en les testant que l'on arrive a un résultat +1
chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par tom4 Jeu 12 Jan - 5:41

chris1111 a écrit:@tom4 essai plutôt dans ton cas
<key>KernelHaswellE</key>
<true/>
Tu psut simplement aussi l'essayer par Clover

Option / Binaries Patch / Kernel Haswell E

Edit*****
c'est en essayant des choses et en les testant que l'on arrive a un résultat +1


Haha ! oui ! +1

" Heu.. c'est normal que le pc fume ? "
" T'as fais quoi ? "
" Bin j'ai essayé de le brancher sur du 380 Volts pour le booster ! "
" Hum... "   Votre vrai Boot macOS Sierra ! - Page 2 1037447622

Dacc je vais essayer ! je décoche KernelPm aussi ou po ?
tom4
tom4
Super usr
Super usr

Date d'inscription : 01/07/2016
Age : 34
Localisation : France

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par chris1111 Jeu 12 Jan - 7:11

Oui décroche
chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par tom4 Jeu 12 Jan - 7:18

Ca m'a mit un Kernel Panic au reboot puis a rebooté correctement et maintenant j'ai ca dans dmesg.txt:

Code:
.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.ocspd
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.modifydb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: cloudpaird(415) deny(1) mach-lookup com.apple.lsd.mapdb
SandboxViolation: softwareupdate_n(477) deny(1) file-read-metadata /Users/tom
loginwindow is not entitledUserEventAgent is not entitle

Po mieux ! ^^

EDIT: J'ai l'impression que ce fameux SandBoxViolation m'empeche de charger mes kexts correctement, me trompe-je ?
tom4
tom4
Super usr
Super usr

Date d'inscription : 01/07/2016
Age : 34
Localisation : France

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par chris1111 Jeu 12 Jan - 8:18

Non ta sanbox semble etre sur le reseau Et le cloud je te l'ai dit faut pa s'en faire avec la sandbox
chris1111
chris1111
Admin
Admin

Date d'inscription : 18/12/2012
Localisation : Laval. Québec Canada

https://www.hackintosh-montreal.com

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par tom4 Jeu 12 Jan - 8:20

chris1111 a écrit:Non ta sanbox semble etre sur le reseau Et le cloud

Ha d'accord, pourtant niveau reseau tout va bien, et le cloud je m'en sert pas.

La seule fonctionnalité genante qui disfonctionne c'est le bluetooth ha26
tom4
tom4
Super usr
Super usr

Date d'inscription : 01/07/2016
Age : 34
Localisation : France

Revenir en haut Aller en bas

Votre vrai Boot macOS Sierra ! - Page 2 Empty Re: Votre vrai Boot macOS Sierra !

Message par Contenu sponsorisé


Contenu sponsorisé


Revenir en haut Aller en bas

Page 2 sur 3 Précédent  1, 2, 3  Suivant

Revenir en haut

- Sujets similaires

 
Permission de ce forum:
Vous ne pouvez pas répondre aux sujets dans ce forum