0% found this document useful (0 votes)
124 views19 pages

Fpsecrashlog

The document contains log messages from an Android application startup process. It records the application attaching threads, calling various lifecycle methods like onCreate, and initializing classes and libraries. Errors are encountered trying to open files due to missing permissions. The application then uncompresses shader files needed for graphics processing.

Uploaded by

tim lok
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
124 views19 pages

Fpsecrashlog

The document contains log messages from an Android application startup process. It records the application attaching threads, calling various lifecycle methods like onCreate, and initializing classes and libraries. Errors are encountered trying to open files due to missing permissions. The application then uncompresses shader files needed for graphics processing.

Uploaded by

tim lok
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd

--------- beginning of system

05-01 [Link].679 D/ActivityThread(32652): Attach thread to application


--------- beginning of main
05-01 [Link].711 I/chatty (32652): uid=10471([Link]) expire 6 lines
05-01 [Link].714 I/chatty (32652): uid=10471([Link]) expire 3 lines
05-01 [Link].725 I/chatty (32652): uid=10471([Link]) expire 2 lines
05-01 [Link].736 V/ActivityThread(32652): callActivityOnCreate
05-01 [Link].801 I/chatty (32652): uid=10471([Link]) expire 274 lines
05-01 [Link].805 W/[Link](32652): at
[Link](SourceFile:12712)
05-01 [Link].805 W/[Link](32652): at
[Link]([Link])
05-01 [Link].805 W/[Link](32652): at
[Link]([Link])
05-01 [Link].805 W/[Link](32652): at
[Link]([Link])
05-01 [Link].805 W/[Link](32652): at
[Link]([Link])
05-01 [Link].805 W/[Link](32652): at
[Link]([Link])
05-01 [Link].805 W/[Link](32652): at
[Link]([Link]
)
05-01 [Link].805 W/[Link](32652): at
[Link](TransactionExecu
[Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link]:
103)
05-01 [Link].806 W/[Link](32652): at
[Link]$[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): at [Link](Native
Method)
05-01 [Link].806 W/[Link](32652): at
[Link]$[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): Caused by: [Link]:
open failed: EACCES (Permission denied)
05-01 [Link].806 W/[Link](32652): at [Link](Native Method)
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]$[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): ... 20 more
05-01 [Link].808 E/CORES (32652): NB CORE:8
05-01 [Link].808 E/FPSE (32652): Model:VOG-L29
05-01 [Link].831 V/HwWidgetFactory(32652): : successes to get AllImpl object and
return....
05-01 [Link].834 D/ActivityThread(32652): add activity client record, r=
ActivityRecord{cf980b0 token=[Link]@69d725d
{[Link]/[Link]}} token= [Link]@69d725d
05-01 [Link].863 D/HiTouch_PressGestureDetector(32652): onAttached,
package=[Link], windowType=1, mHiTouchRestricted=false
05-01 [Link].864 I/iGraphics(32652): [0020080c] pn: [Link], p: 32652
05-01 [Link].866 I/iGraphics(32652): [0030050c] PV 10
05-01 [Link].868 I/iGraphics(32652): [0030050c] no element 'igfx'
05-01 [Link].868 I/iGraphics(32652): [0030050c] LoadCloudParams lib file success.
05-01 [Link].868 E/Parcel (32652): Reading a NULL string not supported here.
05-01 [Link].888 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].900 W/Gralloc3(32652): mapper 3.x is not supported
05-01 [Link].958 E/ (32652): APS:IFLoad:importExternalFunctions, search
function createNewHwApsUtils failed, dlsym err:undefined symbol:
createNewHwApsUtils
05-01 [Link].958 D/ (32652): APS:importExternalFunctions OK
05-01 [Link].966 I/HwViewRootImpl(32652): removeInvalidNode jank list is null
05-01 [Link].718 D/[Link](32652): not watching, wait.
05-01 [Link].126 E/FPSE (32652): Version n:803
05-01 [Link].159 D/HwFrameworkSecurityPartsFactory(32652):
HwFrameworkSecurityPartsFactory in.
05-01 [Link].159 I/HwFrameworkSecurityPartsFactory(32652): add
HwFrameworkSecurityPartsFactory to memory.
05-01 [Link].165 D/[Link](32652): restart watching
05-01 [Link].171 W/ActivityThread(32652): handleWindowVisibility: no activity for
token [Link]@6918476
05-01 [Link].175 V/ActivityThread(32652): callActivityOnCreate
05-01 [Link].179 D/ActivityThread(32652): add activity client record, r=
ActivityRecord{be53b49 token=[Link]@6918476
{[Link]/[Link]}} token= [Link]@6918476
05-01 [Link].194 D/HiTouch_PressGestureDetector(32652): onAttached,
package=[Link], windowType=1, mHiTouchRestricted=false
05-01 [Link].197 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].202 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].202 E/FPSE (32652): RENDERER:Mali-G76
05-01 [Link].258 I/OverScrollerOptimization(32652): start init
SmartSlideOverScroller and get the overscroller config
05-01 [Link].258 I/OverScrollerOptimization(32652): get the overscroller config
05-01 [Link].278 D/HiTouch_PressGestureDetector(32652): onAttached,
package=[Link], windowType=2, mHiTouchRestricted=false
05-01 [Link].287 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].365 W/libEGL (32652): EGLNativeWindowType 0xbbcd5808 disconnect
failed
05-01 [Link].367 W/libEGL (32652): EGLNativeWindowType 0xd7f5a788 disconnect
failed
05-01 [Link].376 D/ActivityThread(32652): Remove activity client record, r=
ActivityRecord{be53b49 token=[Link]@6918476
{[Link]/[Link]}} token= [Link]@6918476
05-01 [Link].591 W/Settings(32652): Setting device_provisioned has moved from
[Link] to [Link].
05-01 [Link].591 V/HiTouch_HiTouchSensor(32652): User setup is finished.
05-01 [Link].718 I/AwareBitmapCacher(32652): init lrucache size: 2097152
pid=32652
05-01 [Link].725 V/AudioManager(32652): querySoundEffectsEnabled...
05-01 [Link].754 W/libEGL (32652): EGLNativeWindowType 0xd7f5b8c8 disconnect
failed
05-01 [Link].754 D/OpenGLRenderer(32652): endAllActiveAnimators on 0xb5a13000
(RippleDrawable) with handle 0xba3033a0
05-01 [Link].766 D/HiTouch_PressGestureDetector(32652): onAttached,
package=[Link], windowType=2, mHiTouchRestricted=false
05-01 [Link].771 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].772 D/NetworkSecurityConfig(32652): No Network Security Config
specified, using platform default
05-01 [Link].731 W/[Link](32652): type=1400 audit(0.0:6612593): avc:
granted { write } for pid=32652 comm=4173796E635461736B202331 name="0"
dev="sdcardfs" ino=3390 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=dir
05-01 [Link].731 W/[Link](32652): type=1400 audit(0.0:6612594): avc:
granted { add_name } for pid=32652 comm=4173796E635461736B202331
name="[Link]" scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=dir
05-01 [Link].923 W/[Link](32652): type=1400 audit(0.0:6612597): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="[Link]" dev="sdcardfs" ino=400923
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].923 W/[Link](32652): type=1400 audit(0.0:6612598): avc:
granted { read open } for pid=32652 comm=4173796E635461736B202331
path="/storage/emulated/0/[Link]" dev="sdcardfs" ino=400923
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].927 V/Decompress(32652): Unzipping Cartoon_A.fsh
05-01 [Link].927 V/Decompress(32652): Unzipping Cartoon_A.vsh
05-01 [Link].928 V/Decompress(32652): Unzipping Cartoon_B.fsh
05-01 [Link].928 V/Decompress(32652): Unzipping Cartoon_B.vsh
05-01 [Link].928 V/Decompress(32652): Unzipping [Link]
05-01 [Link].929 V/Decompress(32652): Unzipping [Link]
05-01 [Link].929 V/Decompress(32652): Unzipping [Link]
05-01 [Link].929 V/Decompress(32652): Unzipping [Link]
05-01 [Link].929 V/Decompress(32652): Unzipping FXAA_natural_vision.fsh
05-01 [Link].929 V/Decompress(32652): Unzipping FXAA_natural_vision.vsh
05-01 [Link].930 V/Decompress(32652): Unzipping [Link]
05-01 [Link].930 V/Decompress(32652): Unzipping [Link]
05-01 [Link].930 V/Decompress(32652): Unzipping [Link]
05-01 [Link].944 V/Decompress(32652): Unzipping [Link]
05-01 [Link].965 V/Decompress(32652): Unzipping [Link]
05-01 [Link].983 V/Decompress(32652): Unzipping [Link]
05-01 [Link].000 V/Decompress(32652): Unzipping [Link]
05-01 [Link].003 V/Decompress(32652): Unzipping [Link]
05-01 [Link].006 V/Decompress(32652): Unzipping [Link]
05-01 [Link].009 V/Decompress(32652): Unzipping [Link]
05-01 [Link].035 W/[Link](32652): type=1400 audit(0.0:6612601): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="[Link]" dev="sdcardfs" ino=400923
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].038 V/Decompress(32652): Unzipping [Link]
05-01 [Link].038 V/Decompress(32652): Unzipping [Link]
05-01 [Link].038 V/Decompress(32652): Unzipping TV_HDR.fsh
05-01 [Link].038 V/Decompress(32652): Unzipping TV_HDR.vsh
05-01 [Link].039 V/Decompress(32652): Unzipping Cartoon_A.fsh
05-01 [Link].040 V/Decompress(32652): Unzipping Cartoon_A.vsh
05-01 [Link].040 V/Decompress(32652): Unzipping Cartoon_B.fsh
05-01 [Link].040 V/Decompress(32652): Unzipping Cartoon_B.vsh
05-01 [Link].040 V/Decompress(32652): Unzipping [Link]
05-01 [Link].041 V/Decompress(32652): Unzipping [Link]
05-01 [Link].041 V/Decompress(32652): Unzipping [Link]
05-01 [Link].041 V/Decompress(32652): Unzipping [Link]
05-01 [Link].041 V/Decompress(32652): Unzipping FXAA_natural_vision.fsh
05-01 [Link].042 V/Decompress(32652): Unzipping FXAA_natural_vision.vsh
05-01 [Link].042 V/Decompress(32652): Unzipping [Link]
05-01 [Link].042 V/Decompress(32652): Unzipping [Link]
05-01 [Link].042 V/Decompress(32652): Unzipping [Link]
05-01 [Link].048 V/Decompress(32652): Unzipping [Link]
05-01 [Link].059 V/Decompress(32652): Unzipping [Link]
05-01 [Link].071 V/Decompress(32652): Unzipping [Link]
05-01 [Link].086 V/Decompress(32652): Unzipping [Link]
05-01 [Link].088 V/Decompress(32652): Unzipping [Link]
05-01 [Link].090 V/Decompress(32652): Unzipping [Link]
05-01 [Link].091 V/Decompress(32652): Unzipping [Link]
05-01 [Link].115 V/Decompress(32652): Unzipping [Link]
05-01 [Link].116 V/Decompress(32652): Unzipping [Link]
05-01 [Link].116 V/Decompress(32652): Unzipping TV_HDR.fsh
05-01 [Link].116 V/Decompress(32652): Unzipping TV_HDR.vsh
05-01 [Link].125 W/libEGL (32652): EGLNativeWindowType 0xb9431008 disconnect
failed
05-01 [Link].298 D/HiTouch_PressGestureDetector(32652): onAttached,
package=[Link], windowType=2, mHiTouchRestricted=false
05-01 [Link].320 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].334 I/HwViewRootImpl(32652): removeInvalidNode all the node in jank
list is out of time
05-01 [Link].484 W/Settings(32652): Setting device_provisioned has moved from
[Link] to [Link].
05-01 [Link].484 V/HiTouch_HiTouchSensor(32652): User setup is finished.
05-01 [Link].594 V/AudioManager(32652): querySoundEffectsEnabled...
05-01 [Link].604 D/HwGalleryCacheManagerImpl(32652): mIsEffect:false
05-01 [Link].628 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].630 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].631 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].653 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].673 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].677 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].681 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].684 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].688 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].692 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].696 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].714 D/BitmapFactory(32652): decodeFile getCachedBitmap ok.
05-01 [Link].743 D/HiTouch_PressGestureDetector(32652): onAttached,
package=[Link], windowType=2, mHiTouchRestricted=false
05-01 [Link].767 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].801 I/HwViewRootImpl(32652): removeInvalidNode all the node in jank
list is out of time
05-01 [Link].827 W/libEGL (32652): EGLNativeWindowType 0xb9431008 disconnect
failed
05-01 [Link].827 D/OpenGLRenderer(32652): endAllActiveAnimators on 0xb5b30000
(RippleDrawable) with handle 0xba3036e0
05-01 [Link].503 W/Settings(32652): Setting device_provisioned has moved from
[Link] to [Link].
05-01 [Link].504 V/HiTouch_HiTouchSensor(32652): User setup is finished.
05-01 [Link].812 V/AudioManager(32652): querySoundEffectsEnabled...
05-01 [Link].833 W/libEGL (32652): EGLNativeWindowType 0xd7f5c4c8 disconnect
failed
05-01 [Link].833 D/OpenGLRenderer(32652): endAllActiveAnimators on 0xb5d7c800
(RippleDrawable) with handle 0xba3035f0
05-01 [Link].843 D/HiTouch_PressGestureDetector(32652): onAttached,
package=[Link], windowType=2, mHiTouchRestricted=false
05-01 [Link].847 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].623 W/[Link](32652): type=1400 audit(0.0:6612696): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331 name="0"
dev="sdcardfs" ino=3390 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=dir
05-01 [Link].623 W/[Link](32652): type=1400 audit(0.0:6612697): avc:
granted { read open } for pid=32652 comm=4173796E635461736B202331
path="/storage/emulated/0" dev="sdcardfs" ino=3390
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=dir
05-01 [Link].623 W/[Link](32652): type=1400 audit(0.0:6612698): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331 name="Huawei"
dev="sdcardfs" ino=3140 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=dir
05-01 [Link].971 W/[Link](32652): type=1400 audit(0.0:6614853): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="IMG_20190720_202149.jpg" dev="sdcardfs" ino=29890
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].971 W/[Link](32652): type=1400 audit(0.0:6614854): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="IMG_20190720_202343.jpg" dev="sdcardfs" ino=45927
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].971 W/[Link](32652): type=1400 audit(0.0:6614855): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="IMG_20190720_202736.jpg" dev="sdcardfs" ino=18998
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].971 W/[Link](32652): type=1400 audit(0.0:6614856): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="IMG_20190720_202424.jpg" dev="sdcardfs" ino=42670
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].971 W/[Link](32652): type=1400 audit(0.0:6614857): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="IMG_20190720_202426.jpg" dev="sdcardfs" ino=102756
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].975 W/[Link](32652): type=1400 audit(0.0:6618926): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331 name="IMG-20200208-
[Link]" dev="sdcardfs" ino=120965 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=file
05-01 [Link].975 W/[Link](32652): type=1400 audit(0.0:6618927): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331 name="IMG-20200208-
[Link]" dev="sdcardfs" ino=7112 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=file
05-01 [Link].975 W/[Link](32652): type=1400 audit(0.0:6618928): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331 name="IMG-20200208-
[Link]" dev="sdcardfs" ino=278017 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=file
05-01 [Link].975 W/[Link](32652): type=1400 audit(0.0:6618929): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331 name="IMG-20200208-
[Link]" dev="sdcardfs" ino=193912 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=file
05-01 [Link].975 W/[Link](32652): type=1400 audit(0.0:6618930): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331 name="IMG-20200208-
[Link]" dev="sdcardfs" ino=25228 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=file
05-01 [Link].979 W/[Link](32652): type=1400 audit(0.0:6629738): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="5d39fe3cb23768422769aad33af1c868" dev="sdcardfs" ino=130657
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].979 W/[Link](32652): type=1400 audit(0.0:6629739): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="41ec8966557125dbb716e3c09f8cba18" dev="sdcardfs" ino=130705
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].979 W/[Link](32652): type=1400 audit(0.0:6629740): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="2a1073f49ffe456fdac82503b2182274" dev="sdcardfs" ino=130734
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].979 W/[Link](32652): type=1400 audit(0.0:6629741): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="b601577fb2059f321a2446997481969a" dev="sdcardfs" ino=130735
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].979 W/[Link](32652): type=1400 audit(0.0:6629742): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="00aa529b91a59774cc7db49ebee47aed" dev="sdcardfs" ino=130752
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].983 W/[Link](32652): type=1400 audit(0.0:6638606): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="883333324fc3f929120833b44f2f582c" dev="sdcardfs" ino=177591
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].983 W/[Link](32652): type=1400 audit(0.0:6638607): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="e774c86d6a6375acac73f7ec92c8ceae" dev="sdcardfs" ino=177788
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].983 W/[Link](32652): type=1400 audit(0.0:6638608): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="28aa1b9e4f5f34e7d3960a4107f2529b" dev="sdcardfs" ino=177829
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].983 W/[Link](32652): type=1400 audit(0.0:6638609): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="25b998a7669d89ced55f3df776c92886" dev="sdcardfs" ino=178314
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].983 W/[Link](32652): type=1400 audit(0.0:6638610): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="d3281b11051a84a7ba12d8fd3c00185e" dev="sdcardfs" ino=178559
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].987 W/[Link](32652): type=1400 audit(0.0:6642404): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="6e78e0879972e64eeaab431a936814a4" dev="sdcardfs" ino=65677
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].987 W/[Link](32652): type=1400 audit(0.0:6642405): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="dd4c01e4b206f489fe832138efb0f38e" dev="sdcardfs" ino=151850
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].987 W/[Link](32652): type=1400 audit(0.0:6642406): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="55ef85fb77c12ba61517b39696a73e75" dev="sdcardfs" ino=151915
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].987 W/[Link](32652): type=1400 audit(0.0:6642407): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="f074064254f464f67bab4e5780d61368" dev="sdcardfs" ino=151657
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].987 W/[Link](32652): type=1400 audit(0.0:6642408): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="3350aa472f65d2afbe3fccff954cafae" dev="sdcardfs" ino=151954
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].991 W/[Link](32652): type=1400 audit(0.0:6646434): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="9e447f93db2ad6ecdeb2017b8d733c9f" dev="sdcardfs" ino=221404
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].991 W/[Link](32652): type=1400 audit(0.0:6646435): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="64dfee8c6ce9a9a93e5f06c8e0057d9b" dev="sdcardfs" ino=221752
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].991 W/[Link](32652): type=1400 audit(0.0:6646436): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="a896434d0b6b0da1a155bf0fb662ede1" dev="sdcardfs" ino=222053
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].991 W/[Link](32652): type=1400 audit(0.0:6646437): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="2b97bdc88cbfcc19fa070c62fbef069e" dev="sdcardfs" ino=222203
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].991 W/[Link](32652): type=1400 audit(0.0:6646438): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="35b480cca68c2bff4421a4af550db50e" dev="sdcardfs" ino=222245
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].686 W/libEGL (32652): EGLNativeWindowType 0xd7f5a608 disconnect
failed
05-01 [Link].694 W/libEGL (32652): EGLNativeWindowType 0xb5a96948 disconnect
failed
05-01 [Link].995 W/[Link](32652): type=1400 audit(0.0:6649421): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="472d7d28d9b5e815e3a560190c41cb3a" dev="sdcardfs" ino=238019
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].995 W/[Link](32652): type=1400 audit(0.0:6649422): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="165bd0863703e770160592bd3067024a" dev="sdcardfs" ino=230243
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].995 W/[Link](32652): type=1400 audit(0.0:6649423): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="a431e362ae3514ec44a36f0d48db8316" dev="sdcardfs" ino=231510
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].995 W/[Link](32652): type=1400 audit(0.0:6649424): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="42f27fab5a4ab2472baf49ff7e03a012" dev="sdcardfs" ino=43878
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].995 W/[Link](32652): type=1400 audit(0.0:6649425): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="455b50cc7ae7159decc66a1fa880e62e" dev="sdcardfs" ino=206238
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].188 D/[Link](32652): not watching, wait.
05-01 [Link].320 D/ActivityThread(32652): Remove activity client record, r=
ActivityRecord{cf980b0 token=[Link]@69d725d
{[Link]/[Link]}} token= [Link]@69d725d
05-01 [Link].325 E/WindowManager(32652):
05-01 [Link].325 E/WindowManager(32652): [Link]: Activity
[Link] has leaked window DecorView@41d5d91[Main] that was
originally added here
05-01 [Link].325 E/WindowManager(32652): at
[Link].<init>([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]$[Link](SourceFile:4479)
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]$112$[Link](SourceFile:11796)
05-01 [Link].325 E/WindowManager(32652): at
[Link]$[Link](AlertControlle
[Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link](Native Method)
05-01 [Link].325 E/WindowManager(32652): at
[Link]$[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): Activity [Link] has
leaked IntentReceiver [Link]$101@ac0d21d that was originally
registered here. Are you missing a call to unregisterReceiver()?
05-01 [Link].333 E/ActivityThread(32652): [Link]:
Activity [Link] has leaked IntentReceiver
[Link]$101@ac0d21d that was originally registered here. Are you
missing a call to unregisterReceiver()?
05-01 [Link].333 E/ActivityThread(32652): at
[Link]$ReceiverDispatcher.<init>([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link].q(SourceFile:11119)
05-01 [Link].333 E/ActivityThread(32652): at
[Link]$j.a(SourceFile:8546)
05-01 [Link].333 E/ActivityThread(32652): at
[Link]$[Link](SourceFile:8333)
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]$900([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]$[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link](Native Method)
05-01 [Link].333 E/ActivityThread(32652): at
[Link]$[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].719 I/[Link]( 630): Reinit property: [Link]=
false
05-01 [Link].721 E/[Link]( 630): Not starting debugger since process
cannot load the jdwp agent.
05-01 [Link].731 D/ActivityThread( 630): Attach thread to application
05-01 [Link].771 I/[Link]( 630): The ClassLoaderContext is a special
shared library.
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::Init
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::StartWatch
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::WatchPackage:
/data/hotpatch/fwkhotpatch/
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::CheckAndWatchPatch:
/data/hotpatch/fwkhotpatch/[Link]
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::CheckAndWatchPatch:
/data/hotpatch/fwkhotpatch/all
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::Run
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::Reading
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::CheckNotifyEvent
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::CheckNotifyEvent
before read
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].777 I/HwApiCacheMangerEx( 630): apicache path=/storage/emulated/0
state=mounted key=[Link]#10471#256
05-01 [Link].777 I/HwApiCacheMangerEx( 630): apicache path=/storage/emulated/0
state=mounted key=[Link]#10471#0
05-01 [Link].779 I/AwareBitmapCacher( 630): init processName:[Link]
pid=630 uid=10471
05-01 [Link].780 E/AwareLog( 630): AtomicFileUtils: readFileLines file not
exist: [Link]@ad037d2
05-01 [Link].780 E/AwareLog( 630): AtomicFileUtils: readFileLines file not
exist: [Link]@a15f0a3
05-01 [Link].792 V/ActivityThread( 630): callActivityOnCreate
05-01 [Link].793 V/Info ( 630): CPU info available from file /proc/cpuinfo:
05-01 [Link].799 V/Info ( 630): Processor : AArch64 Processor rev 0 (aarch64)
05-01 [Link].799 V/Info ( 630): processor : 0
05-01 [Link].799 V/Info ( 630): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].799 V/Info ( 630): BogoMIPS : 3.84
05-01 [Link].799 V/Info ( 630): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt lpae evtstrm aes pmull sha1 sha2 crc32
05-01 [Link].799 V/Info ( 630): CPU implementer : 0x41
05-01 [Link].799 V/Info ( 630): CPU architecture: 8
05-01 [Link].799 V/Info ( 630): CPU variant : 0x1
05-01 [Link].799 V/Info ( 630): CPU part : 0xd05
05-01 [Link].799 V/Info ( 630): CPU revision : 0
05-01 [Link].799 V/Info ( 630):
05-01 [Link].799 V/Info ( 630): processor : 1
05-01 [Link].799 V/Info ( 630): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].799 V/Info ( 630): BogoMIPS : 3.84
05-01 [Link].799 V/Info ( 630): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt lpae evtstrm aes pmull sha1 sha2 crc32
05-01 [Link].799 V/Info ( 630): CPU implementer : 0x41
05-01 [Link].799 V/Info ( 630): CPU architecture: 8
05-01 [Link].799 V/Info ( 630): CPU variant : 0x1
05-01 [Link].799 V/Info ( 630): CPU part : 0xd05
05-01 [Link].799 V/Info ( 630): CPU revision : 0
05-01 [Link].799 V/Info ( 630):
05-01 [Link].799 V/Info ( 630): processor : 2
05-01 [Link].799 V/Info ( 630): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].799 V/Info ( 630): BogoMIPS : 3.84
05-01 [Link].799 V/Info ( 630): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt lpae evtstrm aes pmull sha1 sha2 crc32
05-01 [Link].799 V/Info ( 630): CPU implementer : 0x41
05-01 [Link].799 V/Info ( 630): CPU architecture: 8
05-01 [Link].799 V/Info ( 630): CPU variant : 0x1
05-01 [Link].799 V/Info ( 630): CPU part : 0xd05
05-01 [Link].799 V/Info ( 630): CPU revision : 0
05-01 [Link].799 V/Info ( 630):
05-01 [Link].799 V/Info ( 630): processor : 3
05-01 [Link].799 V/Info ( 630): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].799 V/Info ( 630): BogoMIPS : 3.84
05-01 [Link].799 V/Info ( 630): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idi
05-01 [Link].801 I/F_PATH ( 630): CPU arch:armv8l
05-01 [Link].803 E/FPSE ( 630): AudioFPB:960 AudioSR:44100
05-01 [Link].820 E/CORES ( 630): NB CORE:8
05-01 [Link].820 E/FPSE ( 630): Model:VOG-L29
05-01 [Link].967 E/FPSE ( 630): Version n:803
05-01 [Link].971 V/HwWidgetFactory( 630): : successes to get AllImpl object and
return....
05-01 [Link].033 I/AwareAppScheduleManager( 630): post cache drawable res id to
aware, resId = 2131165269, packagename = [Link], cost time = 30583854
05-01 [Link].041 I/OverScrollerOptimization( 630): start init
SmartSlideOverScroller and get the overscroller config
05-01 [Link].041 I/OverScrollerOptimization( 630): get the overscroller config
05-01 [Link].051 W/[Link]( 630): type=1400 audit(0.0:6651530): avc:
granted { read } for pid=630 comm=4173796E635461736B202331 name="0" dev="sdcardfs"
ino=3390 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=dir
05-01 [Link].051 W/[Link]( 630): type=1400 audit(0.0:6651531): avc:
granted { read open } for pid=630 comm=4173796E635461736B202331
path="/storage/emulated/0" dev="sdcardfs" ino=3390
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=dir
05-01 [Link].051 W/[Link]( 630): type=1400 audit(0.0:6651532): avc:
granted { read } for pid=630 comm=4173796E635461736B202331 name="Huawei"
dev="sdcardfs" ino=3140 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=dir
05-01 [Link].051 W/[Link]( 630): type=1400 audit(0.0:6651533): avc:
granted { read } for pid=630 comm=4173796E635461736B202331 name="Android"
dev="sdcardfs" ino=3956 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=dir
05-01 [Link].051 W/[Link]( 630): type=1400 audit(0.0:6651534): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="VTap_Troubleshooting_Logs.zip" dev="sdcardfs" ino=410120
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].057 D/HwGalleryCacheManagerImpl( 630): mIsEffect:false
05-01 [Link].072 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].072 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].073 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].089 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].104 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].107 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].111 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].114 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].117 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].120 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].123 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].138 I/AwareAppScheduleManager( 630): post cache drawable res id to
aware, resId = 2131165283, packagename = [Link], cost time = 10796355
05-01 [Link].163 D/ActivityThread( 630): add activity client record, r=
ActivityRecord{29b39d0 token=[Link]@69d725d
{[Link]/[Link]}} token= [Link]@69d725d
05-01 [Link].172 D/HiTouch_PressGestureDetector( 630): onAttached,
package=[Link], windowType=2, mHiTouchRestricted=false
05-01 [Link].176 I/iGraphics( 630): [0020080c] pn: [Link], p: 630
05-01 [Link].176 I/iGraphics( 630): [0030050c] PV 10
05-01 [Link].176 I/iGraphics( 630): [0030050c] no element 'igfx'
05-01 [Link].177 I/iGraphics( 630): [0030050c] LoadCloudParams lib file success.
05-01 [Link].177 E/Parcel ( 630): Reading a NULL string not supported here.
05-01 [Link].192 D/mali_winsys( 630): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].194 W/Gralloc3( 630): mapper 3.x is not supported
05-01 [Link].210 E/ ( 630): APS:IFLoad:importExternalFunctions, search
function createNewHwApsUtils failed, dlsym err:undefined symbol:
createNewHwApsUtils
05-01 [Link].210 D/ ( 630): APS:importExternalFunctions OK
05-01 [Link].212 D/HiTouch_PressGestureDetector( 630): onAttached,
package=[Link], windowType=1, mHiTouchRestricted=false
05-01 [Link].217 D/mali_winsys( 630): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].243 I/HwViewRootImpl( 630): removeInvalidNode jank list is null
05-01 [Link].055 W/[Link]( 630): type=1400 audit(0.0:6674615): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="51f25e7821c278e5bf2fd4224d2c96ea" dev="sdcardfs" ino=181348
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].055 W/[Link]( 630): type=1400 audit(0.0:6674616): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="fb7567930c2c8491443e2b3109e39b6b" dev="sdcardfs" ino=180861
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].055 W/[Link]( 630): type=1400 audit(0.0:6674617): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="5da0d55de04742135bb3b93188d4353e" dev="sdcardfs" ino=177687
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].055 W/[Link]( 630): type=1400 audit(0.0:6674618): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="0ae8563f919f2edf64eab435853745a9" dev="sdcardfs" ino=174719
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].055 W/[Link]( 630): type=1400 audit(0.0:6674619): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="101856911e690bb2ac23e8d94a60d82b" dev="sdcardfs" ino=191890
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].055 W/[Link]( 630): type=1400 audit(0.0:6691305): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="5fa18bff5d0b323752013d64afe873d5" dev="sdcardfs" ino=158445
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].059 W/[Link]( 630): type=1400 audit(0.0:6691306): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="c0d75a3a9ab225a45d525ff64f7ed3e5" dev="sdcardfs" ino=158458
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].059 W/[Link]( 630): type=1400 audit(0.0:6691307): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="a895c3f2d077aa2e17070f78992c8dbe" dev="sdcardfs" ino=158463
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].059 W/[Link]( 630): type=1400 audit(0.0:6691308): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="396b5f9a9923b535e8eb01dca2c75c03" dev="sdcardfs" ino=158551
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].059 W/[Link]( 630): type=1400 audit(0.0:6691309): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="4f034daa6cf53e2de1bb13f2988f13b1" dev="sdcardfs" ino=158574
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].896 W/Settings( 630): Setting device_provisioned has moved from
[Link] to [Link].
05-01 [Link].896 V/HiTouch_HiTouchSensor( 630): User setup is finished.
05-01 [Link].063 W/[Link]( 630): type=1400 audit(0.0:6695583): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="589571724a4fe0ab519f8d3688096fa4" dev="sdcardfs" ino=57438
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].063 W/[Link]( 630): type=1400 audit(0.0:6695584): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="ce4bbec24fc76d52ecd8574431a90488" dev="sdcardfs" ino=207703
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].063 W/[Link]( 630): type=1400 audit(0.0:6695585): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="cdc285fc6965a2eb1d057d99f52d145a" dev="sdcardfs" ino=204622
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].063 W/[Link]( 630): type=1400 audit(0.0:6695586): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="2b18d85d0108147460f956155decc34b" dev="sdcardfs" ino=87647
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].063 W/[Link]( 630): type=1400 audit(0.0:6695587): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="e166ba9d11006a36e6a5f7b897483915" dev="sdcardfs" ino=93904
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].067 W/[Link]( 630): type=1400 audit(0.0:6699621): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="17ccfbc5cd73f603ec6fde71d17e6021" dev="sdcardfs" ino=181606
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].067 W/[Link]( 630): type=1400 audit(0.0:6699622): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="f14c4d932b78a5cb86895316a6dd61fc" dev="sdcardfs" ino=172176
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].067 W/[Link]( 630): type=1400 audit(0.0:6699623): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="0989abcbab44860046ab71e075cc5e1d" dev="sdcardfs" ino=170806
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].067 W/[Link]( 630): type=1400 audit(0.0:6699624): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="0260dfd2184ac92620fecbdf39690340" dev="sdcardfs" ino=81638
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].067 W/[Link]( 630): type=1400 audit(0.0:6699625): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="f5f7507376979e7dc9a1691d3ac7f3a7" dev="sdcardfs" ino=202050
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].779 I/AwareBitmapCacher( 630): init lrucache size: 2097152 pid=630
05-01 [Link].783 D/[Link]( 630): not watching, wait.
05-01 [Link].959 W/libEGL ( 630): EGLNativeWindowType 0xd1974c48 disconnect
failed
05-01 [Link].971 W/libEGL ( 630): EGLNativeWindowType 0xd1974dc8 disconnect
failed
05-01 [Link].071 W/[Link]( 630): type=1400 audit(0.0:6702921): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="19a2072e5ccfa7114f82868217ca6e7d" dev="sdcardfs" ino=252651
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].071 W/[Link]( 630): type=1400 audit(0.0:6702922): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="99c4a0c9ddab8a6c2e695d3b8c63f183" dev="sdcardfs" ino=252699
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].071 W/[Link]( 630): type=1400 audit(0.0:6702923): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="d73088319dfbd95d78f7941a046273a3" dev="sdcardfs" ino=252727
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].071 W/[Link]( 630): type=1400 audit(0.0:6702924): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="9896c812f0f786d401bb6162d93ddb80" dev="sdcardfs" ino=252738
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].071 W/[Link]( 630): type=1400 audit(0.0:6702925): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="acf7b0bcb95b94cba15ed4a5b205447e" dev="sdcardfs" ino=252741
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].473 D/ActivityThread( 630): Remove activity client record, r=
ActivityRecord{29b39d0 token=[Link]@69d725d
{[Link]/[Link]}} token= [Link]@69d725d
05-01 [Link].479 E/WindowManager( 630):
05-01 [Link].479 E/WindowManager( 630): [Link]: Activity
[Link] has leaked window DecorView@934d983[Main] that was
originally added here
05-01 [Link].479 E/WindowManager( 630): at
[Link].<init>([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]$[Link](SourceFile:4479)
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link].q(SourceFile:12163)
05-01 [Link].479 E/WindowManager( 630): at
[Link].w(SourceFile:14821)
05-01 [Link].479 E/WindowManager( 630): at
[Link].v(SourceFile:14618)
05-01 [Link].479 E/WindowManager( 630): at
[Link](SourceFile:12960)
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link]
)
05-01 [Link].479 E/WindowManager( 630): at
[Link](TransactionExecu
[Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link]:
103)
05-01 [Link].479 E/WindowManager( 630): at
[Link]$[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link](Native Method)
05-01 [Link].479 E/WindowManager( 630): at
[Link]$[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): Activity [Link] has
leaked IntentReceiver [Link]$101@8eb30c0 that was originally
registered here. Are you missing a call to unregisterReceiver()?
05-01 [Link].490 E/ActivityThread( 630): [Link]:
Activity [Link] has leaked IntentReceiver
[Link]$101@8eb30c0 that was originally registered here. Are you
missing a call to unregisterReceiver()?
05-01 [Link].490 E/ActivityThread( 630): at
[Link]$ReceiverDispatcher.<init>([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link].q(SourceFile:11119)
05-01 [Link].490 E/ActivityThread( 630): at
[Link].w(SourceFile:14821)
05-01 [Link].490 E/ActivityThread( 630): at
[Link].v(SourceFile:14618)
05-01 [Link].490 E/ActivityThread( 630): at
[Link](SourceFile:12960)
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link]
)
05-01 [Link].490 E/ActivityThread( 630): at
[Link](TransactionExecu
[Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link]:
103)
05-01 [Link].490 E/ActivityThread( 630): at
[Link]$[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link](Native Method)
05-01 [Link].490 E/ActivityThread( 630): at
[Link]$[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].212 I/[Link]( 1179): Reinit property: [Link]=
false
05-01 [Link].217 E/[Link]( 1179): Not starting debugger since process
cannot load the jdwp agent.
05-01 [Link].231 D/ActivityThread( 1179): Attach thread to application
05-01 [Link].256 I/[Link]( 1179): The ClassLoaderContext is a special
shared library.
05-01 [Link].263 I/[Link]( 1179): QarthPatchMonintor::Init
05-01 [Link].263 I/[Link]( 1179):
05-01 [Link].263 I/[Link]( 1179): QarthPatchMonintor::StartWatch
05-01 [Link].263 I/[Link]( 1179):
05-01 [Link].263 I/[Link]( 1179): QarthPatchMonintor::WatchPackage:
/data/hotpatch/fwkhotpatch/
05-01 [Link].263 I/[Link]( 1179):
05-01 [Link].263 I/[Link]( 1179): QarthPatchMonintor::CheckAndWatchPatch:
/data/hotpatch/fwkhotpatch/[Link]
05-01 [Link].263 I/[Link]( 1179):
05-01 [Link].263 I/[Link]( 1179): QarthPatchMonintor::CheckAndWatchPatch:
/data/hotpatch/fwkhotpatch/all
05-01 [Link].263 I/[Link]( 1179):
05-01 [Link].263 I/[Link]( 1179): QarthPatchMonintor::Run
05-01 [Link].263 I/[Link]( 1179):
05-01 [Link].264 I/HwApiCacheMangerEx( 1179): apicache path=/storage/emulated/0
state=mounted key=[Link]#10471#256
05-01 [Link].264 I/HwApiCacheMangerEx( 1179): apicache path=/storage/emulated/0
state=mounted key=[Link]#10471#0
05-01 [Link].264 I/[Link]( 1179): QarthPatchMonintor::Reading
05-01 [Link].264 I/[Link]( 1179):
05-01 [Link].264 I/[Link]( 1179): QarthPatchMonintor::CheckNotifyEvent
05-01 [Link].264 I/[Link]( 1179):
05-01 [Link].264 I/[Link]( 1179): QarthPatchMonintor::CheckNotifyEvent
before read
05-01 [Link].264 I/[Link]( 1179):
05-01 [Link].266 I/AwareBitmapCacher( 1179): init processName:[Link]
pid=1179 uid=10471
05-01 [Link].271 E/AwareLog( 1179): AtomicFileUtils: readFileLines file not
exist: [Link]@ad037d2
05-01 [Link].271 E/AwareLog( 1179): AtomicFileUtils: readFileLines file not
exist: [Link]@a15f0a3
05-01 [Link].280 V/ActivityThread( 1179): callActivityOnCreate
05-01 [Link].281 V/Info ( 1179): CPU info available from file /proc/cpuinfo:
05-01 [Link].288 V/Info ( 1179): Processor : AArch64 Processor rev 0 (aarch64)
05-01 [Link].288 V/Info ( 1179): processor : 0
05-01 [Link].288 V/Info ( 1179): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].288 V/Info ( 1179): BogoMIPS : 3.84
05-01 [Link].288 V/Info ( 1179): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt lpae evtstrm aes pmull sha1 sha2 crc32
05-01 [Link].288 V/Info ( 1179): CPU implementer : 0x41
05-01 [Link].288 V/Info ( 1179): CPU architecture: 8
05-01 [Link].288 V/Info ( 1179): CPU variant : 0x1
05-01 [Link].288 V/Info ( 1179): CPU part : 0xd05
05-01 [Link].288 V/Info ( 1179): CPU revision : 0
05-01 [Link].288 V/Info ( 1179):
05-01 [Link].288 V/Info ( 1179): processor : 1
05-01 [Link].288 V/Info ( 1179): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].288 V/Info ( 1179): BogoMIPS : 3.84
05-01 [Link].288 V/Info ( 1179): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt lpae evtstrm aes pmull sha1 sha2 crc32
05-01 [Link].288 V/Info ( 1179): CPU implementer : 0x41
05-01 [Link].288 V/Info ( 1179): CPU architecture: 8
05-01 [Link].288 V/Info ( 1179): CPU variant : 0x1
05-01 [Link].288 V/Info ( 1179): CPU part : 0xd05
05-01 [Link].288 V/Info ( 1179): CPU revision : 0
05-01 [Link].288 V/Info ( 1179):
05-01 [Link].288 V/Info ( 1179): processor : 2
05-01 [Link].288 V/Info ( 1179): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].288 V/Info ( 1179): BogoMIPS : 3.84
05-01 [Link].288 V/Info ( 1179): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt lpae evtstrm aes pmull sha1 sha2 crc32
05-01 [Link].288 V/Info ( 1179): CPU implementer : 0x41
05-01 [Link].288 V/Info ( 1179): CPU architecture: 8
05-01 [Link].288 V/Info ( 1179): CPU variant : 0x1
05-01 [Link].288 V/Info ( 1179): CPU part : 0xd05
05-01 [Link].288 V/Info ( 1179): CPU revision : 0
05-01 [Link].288 V/Info ( 1179):
05-01 [Link].288 V/Info ( 1179): processor : 3
05-01 [Link].288 V/Info ( 1179): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].288 V/Info ( 1179): BogoMIPS : 3.84
05-01 [Link].288 V/Info ( 1179): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idi
05-01 [Link].290 I/F_PATH ( 1179): CPU arch:armv8l
05-01 [Link].291 E/FPSE ( 1179): AudioFPB:960 AudioSR:44100
05-01 [Link].308 E/CORES ( 1179): NB CORE:8
05-01 [Link].308 E/FPSE ( 1179): Model:VOG-L29

You might also like