--------- beginning of system
05-01 [Link].679 D/ActivityThread(32652): Attach thread to application
--------- beginning of main
05-01 [Link].711 I/chatty (32652): uid=10471([Link]) expire 6 lines
05-01 [Link].714 I/chatty (32652): uid=10471([Link]) expire 3 lines
05-01 [Link].725 I/chatty (32652): uid=10471([Link]) expire 2 lines
05-01 [Link].736 V/ActivityThread(32652): callActivityOnCreate
05-01 [Link].801 I/chatty (32652): uid=10471([Link]) expire 274 lines
05-01 [Link].805 W/[Link](32652): at
[Link](SourceFile:12712)
05-01 [Link].805 W/[Link](32652): at
[Link]([Link])
05-01 [Link].805 W/[Link](32652): at
[Link]([Link])
05-01 [Link].805 W/[Link](32652): at
[Link]([Link])
05-01 [Link].805 W/[Link](32652): at
[Link]([Link])
05-01 [Link].805 W/[Link](32652): at
[Link]([Link])
05-01 [Link].805 W/[Link](32652): at
[Link]([Link]
)
05-01 [Link].805 W/[Link](32652): at
[Link](TransactionExecu
[Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link]:
103)
05-01 [Link].806 W/[Link](32652): at
[Link]$[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): at [Link](Native
Method)
05-01 [Link].806 W/[Link](32652): at
[Link]$[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): Caused by: [Link]:
open failed: EACCES (Permission denied)
05-01 [Link].806 W/[Link](32652): at [Link](Native Method)
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]$[Link]([Link])
05-01 [Link].806 W/[Link](32652): at
[Link]([Link])
05-01 [Link].806 W/[Link](32652): ... 20 more
05-01 [Link].808 E/CORES (32652): NB CORE:8
05-01 [Link].808 E/FPSE (32652): Model:VOG-L29
05-01 [Link].831 V/HwWidgetFactory(32652): : successes to get AllImpl object and
return....
05-01 [Link].834 D/ActivityThread(32652): add activity client record, r=
ActivityRecord{cf980b0 token=[Link]@69d725d
{[Link]/[Link]}} token= [Link]@69d725d
05-01 [Link].863 D/HiTouch_PressGestureDetector(32652): onAttached,
package=[Link], windowType=1, mHiTouchRestricted=false
05-01 [Link].864 I/iGraphics(32652): [0020080c] pn: [Link], p: 32652
05-01 [Link].866 I/iGraphics(32652): [0030050c] PV 10
05-01 [Link].868 I/iGraphics(32652): [0030050c] no element 'igfx'
05-01 [Link].868 I/iGraphics(32652): [0030050c] LoadCloudParams lib file success.
05-01 [Link].868 E/Parcel (32652): Reading a NULL string not supported here.
05-01 [Link].888 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].900 W/Gralloc3(32652): mapper 3.x is not supported
05-01 [Link].958 E/ (32652): APS:IFLoad:importExternalFunctions, search
function createNewHwApsUtils failed, dlsym err:undefined symbol:
createNewHwApsUtils
05-01 [Link].958 D/ (32652): APS:importExternalFunctions OK
05-01 [Link].966 I/HwViewRootImpl(32652): removeInvalidNode jank list is null
05-01 [Link].718 D/[Link](32652): not watching, wait.
05-01 [Link].126 E/FPSE (32652): Version n:803
05-01 [Link].159 D/HwFrameworkSecurityPartsFactory(32652):
HwFrameworkSecurityPartsFactory in.
05-01 [Link].159 I/HwFrameworkSecurityPartsFactory(32652): add
HwFrameworkSecurityPartsFactory to memory.
05-01 [Link].165 D/[Link](32652): restart watching
05-01 [Link].171 W/ActivityThread(32652): handleWindowVisibility: no activity for
token [Link]@6918476
05-01 [Link].175 V/ActivityThread(32652): callActivityOnCreate
05-01 [Link].179 D/ActivityThread(32652): add activity client record, r=
ActivityRecord{be53b49 token=[Link]@6918476
{[Link]/[Link]}} token= [Link]@6918476
05-01 [Link].194 D/HiTouch_PressGestureDetector(32652): onAttached,
package=[Link], windowType=1, mHiTouchRestricted=false
05-01 [Link].197 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].202 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].202 E/FPSE (32652): RENDERER:Mali-G76
05-01 [Link].258 I/OverScrollerOptimization(32652): start init
SmartSlideOverScroller and get the overscroller config
05-01 [Link].258 I/OverScrollerOptimization(32652): get the overscroller config
05-01 [Link].278 D/HiTouch_PressGestureDetector(32652): onAttached,
package=[Link], windowType=2, mHiTouchRestricted=false
05-01 [Link].287 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].365 W/libEGL (32652): EGLNativeWindowType 0xbbcd5808 disconnect
failed
05-01 [Link].367 W/libEGL (32652): EGLNativeWindowType 0xd7f5a788 disconnect
failed
05-01 [Link].376 D/ActivityThread(32652): Remove activity client record, r=
ActivityRecord{be53b49 token=[Link]@6918476
{[Link]/[Link]}} token= [Link]@6918476
05-01 [Link].591 W/Settings(32652): Setting device_provisioned has moved from
[Link] to [Link].
05-01 [Link].591 V/HiTouch_HiTouchSensor(32652): User setup is finished.
05-01 [Link].718 I/AwareBitmapCacher(32652): init lrucache size: 2097152
pid=32652
05-01 [Link].725 V/AudioManager(32652): querySoundEffectsEnabled...
05-01 [Link].754 W/libEGL (32652): EGLNativeWindowType 0xd7f5b8c8 disconnect
failed
05-01 [Link].754 D/OpenGLRenderer(32652): endAllActiveAnimators on 0xb5a13000
(RippleDrawable) with handle 0xba3033a0
05-01 [Link].766 D/HiTouch_PressGestureDetector(32652): onAttached,
package=[Link], windowType=2, mHiTouchRestricted=false
05-01 [Link].771 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].772 D/NetworkSecurityConfig(32652): No Network Security Config
specified, using platform default
05-01 [Link].731 W/[Link](32652): type=1400 audit(0.0:6612593): avc:
granted { write } for pid=32652 comm=4173796E635461736B202331 name="0"
dev="sdcardfs" ino=3390 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=dir
05-01 [Link].731 W/[Link](32652): type=1400 audit(0.0:6612594): avc:
granted { add_name } for pid=32652 comm=4173796E635461736B202331
name="[Link]" scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=dir
05-01 [Link].923 W/[Link](32652): type=1400 audit(0.0:6612597): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="[Link]" dev="sdcardfs" ino=400923
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].923 W/[Link](32652): type=1400 audit(0.0:6612598): avc:
granted { read open } for pid=32652 comm=4173796E635461736B202331
path="/storage/emulated/0/[Link]" dev="sdcardfs" ino=400923
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].927 V/Decompress(32652): Unzipping Cartoon_A.fsh
05-01 [Link].927 V/Decompress(32652): Unzipping Cartoon_A.vsh
05-01 [Link].928 V/Decompress(32652): Unzipping Cartoon_B.fsh
05-01 [Link].928 V/Decompress(32652): Unzipping Cartoon_B.vsh
05-01 [Link].928 V/Decompress(32652): Unzipping [Link]
05-01 [Link].929 V/Decompress(32652): Unzipping [Link]
05-01 [Link].929 V/Decompress(32652): Unzipping [Link]
05-01 [Link].929 V/Decompress(32652): Unzipping [Link]
05-01 [Link].929 V/Decompress(32652): Unzipping FXAA_natural_vision.fsh
05-01 [Link].929 V/Decompress(32652): Unzipping FXAA_natural_vision.vsh
05-01 [Link].930 V/Decompress(32652): Unzipping [Link]
05-01 [Link].930 V/Decompress(32652): Unzipping [Link]
05-01 [Link].930 V/Decompress(32652): Unzipping [Link]
05-01 [Link].944 V/Decompress(32652): Unzipping [Link]
05-01 [Link].965 V/Decompress(32652): Unzipping [Link]
05-01 [Link].983 V/Decompress(32652): Unzipping [Link]
05-01 [Link].000 V/Decompress(32652): Unzipping [Link]
05-01 [Link].003 V/Decompress(32652): Unzipping [Link]
05-01 [Link].006 V/Decompress(32652): Unzipping [Link]
05-01 [Link].009 V/Decompress(32652): Unzipping [Link]
05-01 [Link].035 W/[Link](32652): type=1400 audit(0.0:6612601): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="[Link]" dev="sdcardfs" ino=400923
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].038 V/Decompress(32652): Unzipping [Link]
05-01 [Link].038 V/Decompress(32652): Unzipping [Link]
05-01 [Link].038 V/Decompress(32652): Unzipping TV_HDR.fsh
05-01 [Link].038 V/Decompress(32652): Unzipping TV_HDR.vsh
05-01 [Link].039 V/Decompress(32652): Unzipping Cartoon_A.fsh
05-01 [Link].040 V/Decompress(32652): Unzipping Cartoon_A.vsh
05-01 [Link].040 V/Decompress(32652): Unzipping Cartoon_B.fsh
05-01 [Link].040 V/Decompress(32652): Unzipping Cartoon_B.vsh
05-01 [Link].040 V/Decompress(32652): Unzipping [Link]
05-01 [Link].041 V/Decompress(32652): Unzipping [Link]
05-01 [Link].041 V/Decompress(32652): Unzipping [Link]
05-01 [Link].041 V/Decompress(32652): Unzipping [Link]
05-01 [Link].041 V/Decompress(32652): Unzipping FXAA_natural_vision.fsh
05-01 [Link].042 V/Decompress(32652): Unzipping FXAA_natural_vision.vsh
05-01 [Link].042 V/Decompress(32652): Unzipping [Link]
05-01 [Link].042 V/Decompress(32652): Unzipping [Link]
05-01 [Link].042 V/Decompress(32652): Unzipping [Link]
05-01 [Link].048 V/Decompress(32652): Unzipping [Link]
05-01 [Link].059 V/Decompress(32652): Unzipping [Link]
05-01 [Link].071 V/Decompress(32652): Unzipping [Link]
05-01 [Link].086 V/Decompress(32652): Unzipping [Link]
05-01 [Link].088 V/Decompress(32652): Unzipping [Link]
05-01 [Link].090 V/Decompress(32652): Unzipping [Link]
05-01 [Link].091 V/Decompress(32652): Unzipping [Link]
05-01 [Link].115 V/Decompress(32652): Unzipping [Link]
05-01 [Link].116 V/Decompress(32652): Unzipping [Link]
05-01 [Link].116 V/Decompress(32652): Unzipping TV_HDR.fsh
05-01 [Link].116 V/Decompress(32652): Unzipping TV_HDR.vsh
05-01 [Link].125 W/libEGL (32652): EGLNativeWindowType 0xb9431008 disconnect
failed
05-01 [Link].298 D/HiTouch_PressGestureDetector(32652): onAttached,
package=[Link], windowType=2, mHiTouchRestricted=false
05-01 [Link].320 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].334 I/HwViewRootImpl(32652): removeInvalidNode all the node in jank
list is out of time
05-01 [Link].484 W/Settings(32652): Setting device_provisioned has moved from
[Link] to [Link].
05-01 [Link].484 V/HiTouch_HiTouchSensor(32652): User setup is finished.
05-01 [Link].594 V/AudioManager(32652): querySoundEffectsEnabled...
05-01 [Link].604 D/HwGalleryCacheManagerImpl(32652): mIsEffect:false
05-01 [Link].628 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].630 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].631 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].653 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].673 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].677 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].681 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].684 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].688 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].692 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].696 E/BitmapFactory(32652): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].714 D/BitmapFactory(32652): decodeFile getCachedBitmap ok.
05-01 [Link].743 D/HiTouch_PressGestureDetector(32652): onAttached,
package=[Link], windowType=2, mHiTouchRestricted=false
05-01 [Link].767 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].801 I/HwViewRootImpl(32652): removeInvalidNode all the node in jank
list is out of time
05-01 [Link].827 W/libEGL (32652): EGLNativeWindowType 0xb9431008 disconnect
failed
05-01 [Link].827 D/OpenGLRenderer(32652): endAllActiveAnimators on 0xb5b30000
(RippleDrawable) with handle 0xba3036e0
05-01 [Link].503 W/Settings(32652): Setting device_provisioned has moved from
[Link] to [Link].
05-01 [Link].504 V/HiTouch_HiTouchSensor(32652): User setup is finished.
05-01 [Link].812 V/AudioManager(32652): querySoundEffectsEnabled...
05-01 [Link].833 W/libEGL (32652): EGLNativeWindowType 0xd7f5c4c8 disconnect
failed
05-01 [Link].833 D/OpenGLRenderer(32652): endAllActiveAnimators on 0xb5d7c800
(RippleDrawable) with handle 0xba3035f0
05-01 [Link].843 D/HiTouch_PressGestureDetector(32652): onAttached,
package=[Link], windowType=2, mHiTouchRestricted=false
05-01 [Link].847 D/mali_winsys(32652): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].623 W/[Link](32652): type=1400 audit(0.0:6612696): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331 name="0"
dev="sdcardfs" ino=3390 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=dir
05-01 [Link].623 W/[Link](32652): type=1400 audit(0.0:6612697): avc:
granted { read open } for pid=32652 comm=4173796E635461736B202331
path="/storage/emulated/0" dev="sdcardfs" ino=3390
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=dir
05-01 [Link].623 W/[Link](32652): type=1400 audit(0.0:6612698): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331 name="Huawei"
dev="sdcardfs" ino=3140 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=dir
05-01 [Link].971 W/[Link](32652): type=1400 audit(0.0:6614853): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="IMG_20190720_202149.jpg" dev="sdcardfs" ino=29890
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].971 W/[Link](32652): type=1400 audit(0.0:6614854): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="IMG_20190720_202343.jpg" dev="sdcardfs" ino=45927
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].971 W/[Link](32652): type=1400 audit(0.0:6614855): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="IMG_20190720_202736.jpg" dev="sdcardfs" ino=18998
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].971 W/[Link](32652): type=1400 audit(0.0:6614856): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="IMG_20190720_202424.jpg" dev="sdcardfs" ino=42670
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].971 W/[Link](32652): type=1400 audit(0.0:6614857): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="IMG_20190720_202426.jpg" dev="sdcardfs" ino=102756
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].975 W/[Link](32652): type=1400 audit(0.0:6618926): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331 name="IMG-20200208-
[Link]" dev="sdcardfs" ino=120965 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=file
05-01 [Link].975 W/[Link](32652): type=1400 audit(0.0:6618927): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331 name="IMG-20200208-
[Link]" dev="sdcardfs" ino=7112 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=file
05-01 [Link].975 W/[Link](32652): type=1400 audit(0.0:6618928): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331 name="IMG-20200208-
[Link]" dev="sdcardfs" ino=278017 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=file
05-01 [Link].975 W/[Link](32652): type=1400 audit(0.0:6618929): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331 name="IMG-20200208-
[Link]" dev="sdcardfs" ino=193912 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=file
05-01 [Link].975 W/[Link](32652): type=1400 audit(0.0:6618930): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331 name="IMG-20200208-
[Link]" dev="sdcardfs" ino=25228 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=file
05-01 [Link].979 W/[Link](32652): type=1400 audit(0.0:6629738): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="5d39fe3cb23768422769aad33af1c868" dev="sdcardfs" ino=130657
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].979 W/[Link](32652): type=1400 audit(0.0:6629739): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="41ec8966557125dbb716e3c09f8cba18" dev="sdcardfs" ino=130705
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].979 W/[Link](32652): type=1400 audit(0.0:6629740): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="2a1073f49ffe456fdac82503b2182274" dev="sdcardfs" ino=130734
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].979 W/[Link](32652): type=1400 audit(0.0:6629741): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="b601577fb2059f321a2446997481969a" dev="sdcardfs" ino=130735
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].979 W/[Link](32652): type=1400 audit(0.0:6629742): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="00aa529b91a59774cc7db49ebee47aed" dev="sdcardfs" ino=130752
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].983 W/[Link](32652): type=1400 audit(0.0:6638606): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="883333324fc3f929120833b44f2f582c" dev="sdcardfs" ino=177591
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].983 W/[Link](32652): type=1400 audit(0.0:6638607): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="e774c86d6a6375acac73f7ec92c8ceae" dev="sdcardfs" ino=177788
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].983 W/[Link](32652): type=1400 audit(0.0:6638608): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="28aa1b9e4f5f34e7d3960a4107f2529b" dev="sdcardfs" ino=177829
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].983 W/[Link](32652): type=1400 audit(0.0:6638609): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="25b998a7669d89ced55f3df776c92886" dev="sdcardfs" ino=178314
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].983 W/[Link](32652): type=1400 audit(0.0:6638610): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="d3281b11051a84a7ba12d8fd3c00185e" dev="sdcardfs" ino=178559
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].987 W/[Link](32652): type=1400 audit(0.0:6642404): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="6e78e0879972e64eeaab431a936814a4" dev="sdcardfs" ino=65677
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].987 W/[Link](32652): type=1400 audit(0.0:6642405): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="dd4c01e4b206f489fe832138efb0f38e" dev="sdcardfs" ino=151850
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].987 W/[Link](32652): type=1400 audit(0.0:6642406): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="55ef85fb77c12ba61517b39696a73e75" dev="sdcardfs" ino=151915
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].987 W/[Link](32652): type=1400 audit(0.0:6642407): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="f074064254f464f67bab4e5780d61368" dev="sdcardfs" ino=151657
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].987 W/[Link](32652): type=1400 audit(0.0:6642408): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="3350aa472f65d2afbe3fccff954cafae" dev="sdcardfs" ino=151954
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].991 W/[Link](32652): type=1400 audit(0.0:6646434): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="9e447f93db2ad6ecdeb2017b8d733c9f" dev="sdcardfs" ino=221404
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].991 W/[Link](32652): type=1400 audit(0.0:6646435): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="64dfee8c6ce9a9a93e5f06c8e0057d9b" dev="sdcardfs" ino=221752
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].991 W/[Link](32652): type=1400 audit(0.0:6646436): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="a896434d0b6b0da1a155bf0fb662ede1" dev="sdcardfs" ino=222053
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].991 W/[Link](32652): type=1400 audit(0.0:6646437): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="2b97bdc88cbfcc19fa070c62fbef069e" dev="sdcardfs" ino=222203
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].991 W/[Link](32652): type=1400 audit(0.0:6646438): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="35b480cca68c2bff4421a4af550db50e" dev="sdcardfs" ino=222245
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].686 W/libEGL (32652): EGLNativeWindowType 0xd7f5a608 disconnect
failed
05-01 [Link].694 W/libEGL (32652): EGLNativeWindowType 0xb5a96948 disconnect
failed
05-01 [Link].995 W/[Link](32652): type=1400 audit(0.0:6649421): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="472d7d28d9b5e815e3a560190c41cb3a" dev="sdcardfs" ino=238019
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].995 W/[Link](32652): type=1400 audit(0.0:6649422): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="165bd0863703e770160592bd3067024a" dev="sdcardfs" ino=230243
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].995 W/[Link](32652): type=1400 audit(0.0:6649423): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="a431e362ae3514ec44a36f0d48db8316" dev="sdcardfs" ino=231510
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].995 W/[Link](32652): type=1400 audit(0.0:6649424): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="42f27fab5a4ab2472baf49ff7e03a012" dev="sdcardfs" ino=43878
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].995 W/[Link](32652): type=1400 audit(0.0:6649425): avc:
granted { read } for pid=32652 comm=4173796E635461736B202331
name="455b50cc7ae7159decc66a1fa880e62e" dev="sdcardfs" ino=206238
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].188 D/[Link](32652): not watching, wait.
05-01 [Link].320 D/ActivityThread(32652): Remove activity client record, r=
ActivityRecord{cf980b0 token=[Link]@69d725d
{[Link]/[Link]}} token= [Link]@69d725d
05-01 [Link].325 E/WindowManager(32652):
05-01 [Link].325 E/WindowManager(32652): [Link]: Activity
[Link] has leaked window DecorView@41d5d91[Main] that was
originally added here
05-01 [Link].325 E/WindowManager(32652): at
[Link].<init>([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]$[Link](SourceFile:4479)
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]$112$[Link](SourceFile:11796)
05-01 [Link].325 E/WindowManager(32652): at
[Link]$[Link](AlertControlle
[Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link](Native Method)
05-01 [Link].325 E/WindowManager(32652): at
[Link]$[Link]([Link])
05-01 [Link].325 E/WindowManager(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): Activity [Link] has
leaked IntentReceiver [Link]$101@ac0d21d that was originally
registered here. Are you missing a call to unregisterReceiver()?
05-01 [Link].333 E/ActivityThread(32652): [Link]:
Activity [Link] has leaked IntentReceiver
[Link]$101@ac0d21d that was originally registered here. Are you
missing a call to unregisterReceiver()?
05-01 [Link].333 E/ActivityThread(32652): at
[Link]$ReceiverDispatcher.<init>([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link].q(SourceFile:11119)
05-01 [Link].333 E/ActivityThread(32652): at
[Link]$j.a(SourceFile:8546)
05-01 [Link].333 E/ActivityThread(32652): at
[Link]$[Link](SourceFile:8333)
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]$900([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]$[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link](Native Method)
05-01 [Link].333 E/ActivityThread(32652): at
[Link]$[Link]([Link])
05-01 [Link].333 E/ActivityThread(32652): at
[Link]([Link])
05-01 [Link].719 I/[Link]( 630): Reinit property: [Link]=
false
05-01 [Link].721 E/[Link]( 630): Not starting debugger since process
cannot load the jdwp agent.
05-01 [Link].731 D/ActivityThread( 630): Attach thread to application
05-01 [Link].771 I/[Link]( 630): The ClassLoaderContext is a special
shared library.
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::Init
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::StartWatch
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::WatchPackage:
/data/hotpatch/fwkhotpatch/
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::CheckAndWatchPatch:
/data/hotpatch/fwkhotpatch/[Link]
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::CheckAndWatchPatch:
/data/hotpatch/fwkhotpatch/all
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::Run
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::Reading
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::CheckNotifyEvent
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].776 I/[Link]( 630): QarthPatchMonintor::CheckNotifyEvent
before read
05-01 [Link].776 I/[Link]( 630):
05-01 [Link].777 I/HwApiCacheMangerEx( 630): apicache path=/storage/emulated/0
state=mounted key=[Link]#10471#256
05-01 [Link].777 I/HwApiCacheMangerEx( 630): apicache path=/storage/emulated/0
state=mounted key=[Link]#10471#0
05-01 [Link].779 I/AwareBitmapCacher( 630): init processName:[Link]
pid=630 uid=10471
05-01 [Link].780 E/AwareLog( 630): AtomicFileUtils: readFileLines file not
exist: [Link]@ad037d2
05-01 [Link].780 E/AwareLog( 630): AtomicFileUtils: readFileLines file not
exist: [Link]@a15f0a3
05-01 [Link].792 V/ActivityThread( 630): callActivityOnCreate
05-01 [Link].793 V/Info ( 630): CPU info available from file /proc/cpuinfo:
05-01 [Link].799 V/Info ( 630): Processor : AArch64 Processor rev 0 (aarch64)
05-01 [Link].799 V/Info ( 630): processor : 0
05-01 [Link].799 V/Info ( 630): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].799 V/Info ( 630): BogoMIPS : 3.84
05-01 [Link].799 V/Info ( 630): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt lpae evtstrm aes pmull sha1 sha2 crc32
05-01 [Link].799 V/Info ( 630): CPU implementer : 0x41
05-01 [Link].799 V/Info ( 630): CPU architecture: 8
05-01 [Link].799 V/Info ( 630): CPU variant : 0x1
05-01 [Link].799 V/Info ( 630): CPU part : 0xd05
05-01 [Link].799 V/Info ( 630): CPU revision : 0
05-01 [Link].799 V/Info ( 630):
05-01 [Link].799 V/Info ( 630): processor : 1
05-01 [Link].799 V/Info ( 630): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].799 V/Info ( 630): BogoMIPS : 3.84
05-01 [Link].799 V/Info ( 630): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt lpae evtstrm aes pmull sha1 sha2 crc32
05-01 [Link].799 V/Info ( 630): CPU implementer : 0x41
05-01 [Link].799 V/Info ( 630): CPU architecture: 8
05-01 [Link].799 V/Info ( 630): CPU variant : 0x1
05-01 [Link].799 V/Info ( 630): CPU part : 0xd05
05-01 [Link].799 V/Info ( 630): CPU revision : 0
05-01 [Link].799 V/Info ( 630):
05-01 [Link].799 V/Info ( 630): processor : 2
05-01 [Link].799 V/Info ( 630): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].799 V/Info ( 630): BogoMIPS : 3.84
05-01 [Link].799 V/Info ( 630): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt lpae evtstrm aes pmull sha1 sha2 crc32
05-01 [Link].799 V/Info ( 630): CPU implementer : 0x41
05-01 [Link].799 V/Info ( 630): CPU architecture: 8
05-01 [Link].799 V/Info ( 630): CPU variant : 0x1
05-01 [Link].799 V/Info ( 630): CPU part : 0xd05
05-01 [Link].799 V/Info ( 630): CPU revision : 0
05-01 [Link].799 V/Info ( 630):
05-01 [Link].799 V/Info ( 630): processor : 3
05-01 [Link].799 V/Info ( 630): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].799 V/Info ( 630): BogoMIPS : 3.84
05-01 [Link].799 V/Info ( 630): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idi
05-01 [Link].801 I/F_PATH ( 630): CPU arch:armv8l
05-01 [Link].803 E/FPSE ( 630): AudioFPB:960 AudioSR:44100
05-01 [Link].820 E/CORES ( 630): NB CORE:8
05-01 [Link].820 E/FPSE ( 630): Model:VOG-L29
05-01 [Link].967 E/FPSE ( 630): Version n:803
05-01 [Link].971 V/HwWidgetFactory( 630): : successes to get AllImpl object and
return....
05-01 [Link].033 I/AwareAppScheduleManager( 630): post cache drawable res id to
aware, resId = 2131165269, packagename = [Link], cost time = 30583854
05-01 [Link].041 I/OverScrollerOptimization( 630): start init
SmartSlideOverScroller and get the overscroller config
05-01 [Link].041 I/OverScrollerOptimization( 630): get the overscroller config
05-01 [Link].051 W/[Link]( 630): type=1400 audit(0.0:6651530): avc:
granted { read } for pid=630 comm=4173796E635461736B202331 name="0" dev="sdcardfs"
ino=3390 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=dir
05-01 [Link].051 W/[Link]( 630): type=1400 audit(0.0:6651531): avc:
granted { read open } for pid=630 comm=4173796E635461736B202331
path="/storage/emulated/0" dev="sdcardfs" ino=3390
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=dir
05-01 [Link].051 W/[Link]( 630): type=1400 audit(0.0:6651532): avc:
granted { read } for pid=630 comm=4173796E635461736B202331 name="Huawei"
dev="sdcardfs" ino=3140 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=dir
05-01 [Link].051 W/[Link]( 630): type=1400 audit(0.0:6651533): avc:
granted { read } for pid=630 comm=4173796E635461736B202331 name="Android"
dev="sdcardfs" ino=3956 scontext=u:r:untrusted_app_27:s0:c512,c768
tcontext=u:object_r:sdcardfs:s0 tclass=dir
05-01 [Link].051 W/[Link]( 630): type=1400 audit(0.0:6651534): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="VTap_Troubleshooting_Logs.zip" dev="sdcardfs" ino=410120
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].056 D/PROCINFO( 630): Neon instructions detected
05-01 [Link].056 E/libfpse ( 630): CPU architecture:8
05-01 [Link].057 D/HwGalleryCacheManagerImpl( 630): mIsEffect:false
05-01 [Link].072 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].072 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].073 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].089 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].104 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].107 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].111 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].114 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].117 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].120 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].123 E/BitmapFactory( 630): Unable to decode stream:
[Link]:
/data/user/0/[Link]/files/skin/[Link]: open failed: ENOENT (No
such file or directory)
05-01 [Link].138 I/AwareAppScheduleManager( 630): post cache drawable res id to
aware, resId = 2131165283, packagename = [Link], cost time = 10796355
05-01 [Link].163 D/ActivityThread( 630): add activity client record, r=
ActivityRecord{29b39d0 token=[Link]@69d725d
{[Link]/[Link]}} token= [Link]@69d725d
05-01 [Link].172 D/HiTouch_PressGestureDetector( 630): onAttached,
package=[Link], windowType=2, mHiTouchRestricted=false
05-01 [Link].176 I/iGraphics( 630): [0020080c] pn: [Link], p: 630
05-01 [Link].176 I/iGraphics( 630): [0030050c] PV 10
05-01 [Link].176 I/iGraphics( 630): [0030050c] no element 'igfx'
05-01 [Link].177 I/iGraphics( 630): [0030050c] LoadCloudParams lib file success.
05-01 [Link].177 E/Parcel ( 630): Reading a NULL string not supported here.
05-01 [Link].192 D/mali_winsys( 630): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].194 W/Gralloc3( 630): mapper 3.x is not supported
05-01 [Link].210 E/ ( 630): APS:IFLoad:importExternalFunctions, search
function createNewHwApsUtils failed, dlsym err:undefined symbol:
createNewHwApsUtils
05-01 [Link].210 D/ ( 630): APS:importExternalFunctions OK
05-01 [Link].212 D/HiTouch_PressGestureDetector( 630): onAttached,
package=[Link], windowType=1, mHiTouchRestricted=false
05-01 [Link].217 D/mali_winsys( 630): EGLint
new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig,
egl_winsys_surface **, EGLBoolean) returns 0x3000
05-01 [Link].243 I/HwViewRootImpl( 630): removeInvalidNode jank list is null
05-01 [Link].055 W/[Link]( 630): type=1400 audit(0.0:6674615): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="51f25e7821c278e5bf2fd4224d2c96ea" dev="sdcardfs" ino=181348
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].055 W/[Link]( 630): type=1400 audit(0.0:6674616): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="fb7567930c2c8491443e2b3109e39b6b" dev="sdcardfs" ino=180861
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].055 W/[Link]( 630): type=1400 audit(0.0:6674617): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="5da0d55de04742135bb3b93188d4353e" dev="sdcardfs" ino=177687
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].055 W/[Link]( 630): type=1400 audit(0.0:6674618): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="0ae8563f919f2edf64eab435853745a9" dev="sdcardfs" ino=174719
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].055 W/[Link]( 630): type=1400 audit(0.0:6674619): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="101856911e690bb2ac23e8d94a60d82b" dev="sdcardfs" ino=191890
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].055 W/[Link]( 630): type=1400 audit(0.0:6691305): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="5fa18bff5d0b323752013d64afe873d5" dev="sdcardfs" ino=158445
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].059 W/[Link]( 630): type=1400 audit(0.0:6691306): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="c0d75a3a9ab225a45d525ff64f7ed3e5" dev="sdcardfs" ino=158458
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].059 W/[Link]( 630): type=1400 audit(0.0:6691307): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="a895c3f2d077aa2e17070f78992c8dbe" dev="sdcardfs" ino=158463
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].059 W/[Link]( 630): type=1400 audit(0.0:6691308): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="396b5f9a9923b535e8eb01dca2c75c03" dev="sdcardfs" ino=158551
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].059 W/[Link]( 630): type=1400 audit(0.0:6691309): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="4f034daa6cf53e2de1bb13f2988f13b1" dev="sdcardfs" ino=158574
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].896 W/Settings( 630): Setting device_provisioned has moved from
[Link] to [Link].
05-01 [Link].896 V/HiTouch_HiTouchSensor( 630): User setup is finished.
05-01 [Link].063 W/[Link]( 630): type=1400 audit(0.0:6695583): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="589571724a4fe0ab519f8d3688096fa4" dev="sdcardfs" ino=57438
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].063 W/[Link]( 630): type=1400 audit(0.0:6695584): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="ce4bbec24fc76d52ecd8574431a90488" dev="sdcardfs" ino=207703
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].063 W/[Link]( 630): type=1400 audit(0.0:6695585): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="cdc285fc6965a2eb1d057d99f52d145a" dev="sdcardfs" ino=204622
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].063 W/[Link]( 630): type=1400 audit(0.0:6695586): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="2b18d85d0108147460f956155decc34b" dev="sdcardfs" ino=87647
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].063 W/[Link]( 630): type=1400 audit(0.0:6695587): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="e166ba9d11006a36e6a5f7b897483915" dev="sdcardfs" ino=93904
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].067 W/[Link]( 630): type=1400 audit(0.0:6699621): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="17ccfbc5cd73f603ec6fde71d17e6021" dev="sdcardfs" ino=181606
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].067 W/[Link]( 630): type=1400 audit(0.0:6699622): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="f14c4d932b78a5cb86895316a6dd61fc" dev="sdcardfs" ino=172176
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].067 W/[Link]( 630): type=1400 audit(0.0:6699623): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="0989abcbab44860046ab71e075cc5e1d" dev="sdcardfs" ino=170806
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].067 W/[Link]( 630): type=1400 audit(0.0:6699624): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="0260dfd2184ac92620fecbdf39690340" dev="sdcardfs" ino=81638
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].067 W/[Link]( 630): type=1400 audit(0.0:6699625): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="f5f7507376979e7dc9a1691d3ac7f3a7" dev="sdcardfs" ino=202050
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].779 I/AwareBitmapCacher( 630): init lrucache size: 2097152 pid=630
05-01 [Link].783 D/[Link]( 630): not watching, wait.
05-01 [Link].959 W/libEGL ( 630): EGLNativeWindowType 0xd1974c48 disconnect
failed
05-01 [Link].971 W/libEGL ( 630): EGLNativeWindowType 0xd1974dc8 disconnect
failed
05-01 [Link].071 W/[Link]( 630): type=1400 audit(0.0:6702921): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="19a2072e5ccfa7114f82868217ca6e7d" dev="sdcardfs" ino=252651
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].071 W/[Link]( 630): type=1400 audit(0.0:6702922): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="99c4a0c9ddab8a6c2e695d3b8c63f183" dev="sdcardfs" ino=252699
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].071 W/[Link]( 630): type=1400 audit(0.0:6702923): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="d73088319dfbd95d78f7941a046273a3" dev="sdcardfs" ino=252727
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].071 W/[Link]( 630): type=1400 audit(0.0:6702924): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="9896c812f0f786d401bb6162d93ddb80" dev="sdcardfs" ino=252738
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].071 W/[Link]( 630): type=1400 audit(0.0:6702925): avc:
granted { read } for pid=630 comm=4173796E635461736B202331
name="acf7b0bcb95b94cba15ed4a5b205447e" dev="sdcardfs" ino=252741
scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sdcardfs:s0
tclass=file
05-01 [Link].473 D/ActivityThread( 630): Remove activity client record, r=
ActivityRecord{29b39d0 token=[Link]@69d725d
{[Link]/[Link]}} token= [Link]@69d725d
05-01 [Link].479 E/WindowManager( 630):
05-01 [Link].479 E/WindowManager( 630): [Link]: Activity
[Link] has leaked window DecorView@934d983[Main] that was
originally added here
05-01 [Link].479 E/WindowManager( 630): at
[Link].<init>([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]$[Link](SourceFile:4479)
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link].q(SourceFile:12163)
05-01 [Link].479 E/WindowManager( 630): at
[Link].w(SourceFile:14821)
05-01 [Link].479 E/WindowManager( 630): at
[Link].v(SourceFile:14618)
05-01 [Link].479 E/WindowManager( 630): at
[Link](SourceFile:12960)
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link]
)
05-01 [Link].479 E/WindowManager( 630): at
[Link](TransactionExecu
[Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link]:
103)
05-01 [Link].479 E/WindowManager( 630): at
[Link]$[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link](Native Method)
05-01 [Link].479 E/WindowManager( 630): at
[Link]$[Link]([Link])
05-01 [Link].479 E/WindowManager( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): Activity [Link] has
leaked IntentReceiver [Link]$101@8eb30c0 that was originally
registered here. Are you missing a call to unregisterReceiver()?
05-01 [Link].490 E/ActivityThread( 630): [Link]:
Activity [Link] has leaked IntentReceiver
[Link]$101@8eb30c0 that was originally registered here. Are you
missing a call to unregisterReceiver()?
05-01 [Link].490 E/ActivityThread( 630): at
[Link]$ReceiverDispatcher.<init>([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link].q(SourceFile:11119)
05-01 [Link].490 E/ActivityThread( 630): at
[Link].w(SourceFile:14821)
05-01 [Link].490 E/ActivityThread( 630): at
[Link].v(SourceFile:14618)
05-01 [Link].490 E/ActivityThread( 630): at
[Link](SourceFile:12960)
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link]
)
05-01 [Link].490 E/ActivityThread( 630): at
[Link](TransactionExecu
[Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link]:
103)
05-01 [Link].490 E/ActivityThread( 630): at
[Link]$[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link](Native Method)
05-01 [Link].490 E/ActivityThread( 630): at
[Link]$[Link]([Link])
05-01 [Link].490 E/ActivityThread( 630): at
[Link]([Link])
05-01 [Link].212 I/[Link]( 1179): Reinit property: [Link]=
false
05-01 [Link].217 E/[Link]( 1179): Not starting debugger since process
cannot load the jdwp agent.
05-01 [Link].231 D/ActivityThread( 1179): Attach thread to application
05-01 [Link].256 I/[Link]( 1179): The ClassLoaderContext is a special
shared library.
05-01 [Link].263 I/[Link]( 1179): QarthPatchMonintor::Init
05-01 [Link].263 I/[Link]( 1179):
05-01 [Link].263 I/[Link]( 1179): QarthPatchMonintor::StartWatch
05-01 [Link].263 I/[Link]( 1179):
05-01 [Link].263 I/[Link]( 1179): QarthPatchMonintor::WatchPackage:
/data/hotpatch/fwkhotpatch/
05-01 [Link].263 I/[Link]( 1179):
05-01 [Link].263 I/[Link]( 1179): QarthPatchMonintor::CheckAndWatchPatch:
/data/hotpatch/fwkhotpatch/[Link]
05-01 [Link].263 I/[Link]( 1179):
05-01 [Link].263 I/[Link]( 1179): QarthPatchMonintor::CheckAndWatchPatch:
/data/hotpatch/fwkhotpatch/all
05-01 [Link].263 I/[Link]( 1179):
05-01 [Link].263 I/[Link]( 1179): QarthPatchMonintor::Run
05-01 [Link].263 I/[Link]( 1179):
05-01 [Link].264 I/HwApiCacheMangerEx( 1179): apicache path=/storage/emulated/0
state=mounted key=[Link]#10471#256
05-01 [Link].264 I/HwApiCacheMangerEx( 1179): apicache path=/storage/emulated/0
state=mounted key=[Link]#10471#0
05-01 [Link].264 I/[Link]( 1179): QarthPatchMonintor::Reading
05-01 [Link].264 I/[Link]( 1179):
05-01 [Link].264 I/[Link]( 1179): QarthPatchMonintor::CheckNotifyEvent
05-01 [Link].264 I/[Link]( 1179):
05-01 [Link].264 I/[Link]( 1179): QarthPatchMonintor::CheckNotifyEvent
before read
05-01 [Link].264 I/[Link]( 1179):
05-01 [Link].266 I/AwareBitmapCacher( 1179): init processName:[Link]
pid=1179 uid=10471
05-01 [Link].271 E/AwareLog( 1179): AtomicFileUtils: readFileLines file not
exist: [Link]@ad037d2
05-01 [Link].271 E/AwareLog( 1179): AtomicFileUtils: readFileLines file not
exist: [Link]@a15f0a3
05-01 [Link].280 V/ActivityThread( 1179): callActivityOnCreate
05-01 [Link].281 V/Info ( 1179): CPU info available from file /proc/cpuinfo:
05-01 [Link].288 V/Info ( 1179): Processor : AArch64 Processor rev 0 (aarch64)
05-01 [Link].288 V/Info ( 1179): processor : 0
05-01 [Link].288 V/Info ( 1179): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].288 V/Info ( 1179): BogoMIPS : 3.84
05-01 [Link].288 V/Info ( 1179): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt lpae evtstrm aes pmull sha1 sha2 crc32
05-01 [Link].288 V/Info ( 1179): CPU implementer : 0x41
05-01 [Link].288 V/Info ( 1179): CPU architecture: 8
05-01 [Link].288 V/Info ( 1179): CPU variant : 0x1
05-01 [Link].288 V/Info ( 1179): CPU part : 0xd05
05-01 [Link].288 V/Info ( 1179): CPU revision : 0
05-01 [Link].288 V/Info ( 1179):
05-01 [Link].288 V/Info ( 1179): processor : 1
05-01 [Link].288 V/Info ( 1179): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].288 V/Info ( 1179): BogoMIPS : 3.84
05-01 [Link].288 V/Info ( 1179): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt lpae evtstrm aes pmull sha1 sha2 crc32
05-01 [Link].288 V/Info ( 1179): CPU implementer : 0x41
05-01 [Link].288 V/Info ( 1179): CPU architecture: 8
05-01 [Link].288 V/Info ( 1179): CPU variant : 0x1
05-01 [Link].288 V/Info ( 1179): CPU part : 0xd05
05-01 [Link].288 V/Info ( 1179): CPU revision : 0
05-01 [Link].288 V/Info ( 1179):
05-01 [Link].288 V/Info ( 1179): processor : 2
05-01 [Link].288 V/Info ( 1179): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].288 V/Info ( 1179): BogoMIPS : 3.84
05-01 [Link].288 V/Info ( 1179): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt lpae evtstrm aes pmull sha1 sha2 crc32
05-01 [Link].288 V/Info ( 1179): CPU implementer : 0x41
05-01 [Link].288 V/Info ( 1179): CPU architecture: 8
05-01 [Link].288 V/Info ( 1179): CPU variant : 0x1
05-01 [Link].288 V/Info ( 1179): CPU part : 0xd05
05-01 [Link].288 V/Info ( 1179): CPU revision : 0
05-01 [Link].288 V/Info ( 1179):
05-01 [Link].288 V/Info ( 1179): processor : 3
05-01 [Link].288 V/Info ( 1179): model name : ARMv8 Processor rev 0 (v8l)
05-01 [Link].288 V/Info ( 1179): BogoMIPS : 3.84
05-01 [Link].288 V/Info ( 1179): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idi
05-01 [Link].290 I/F_PATH ( 1179): CPU arch:armv8l
05-01 [Link].291 E/FPSE ( 1179): AudioFPB:960 AudioSR:44100
05-01 [Link].308 E/CORES ( 1179): NB CORE:8
05-01 [Link].308 E/FPSE ( 1179): Model:VOG-L29