Advertisement
Guest User

Untitled

a guest
Jan 17th, 2019
144
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 152.59 KB | None | 0 0
  1. D/SamsungAnalytics:DQA(17389): [Log Sender] insert
  2. D/InputTransport( 4910): Input channel constructed: fd=430
  3. D/InputTransport( 4910): Input channel constructed: fd=488
  4. V/MARsPolicyManager( 4910): handelAlertToastWindowStarted pkgName = com.topjohnwu.magisk, userId = 0
  5. I/SurfaceFlinger( 4485): id=411 createSurf (5920x5920),2 flag=4, 39c37be Toast#0
  6. I/Layer ( 4485): id=409 onRemoved Surface(name=80f12f3 Toast)/@0x76c8aba - animation-leash#0
  7. I/CocktailBarManagerServiceImpl( 4910): updateCocktail : no active host
  8. D/InputTransport( 4910): Input channel destroyed: fd=488
  9. D/InputTransport(18071): Input channel constructed: fd=74
  10. D/ViewRootImpl@41f6f97[Toast](18071): setView = android.widget.LinearLayout{b2cb584 V.E...... ......I. 0,0-0,0} TM=true MM=false
  11. V/Toast (18071): Text: bLog in android.widget.Toast$TN@96fb16d
  12. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672
  13. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672, networkInfo: [type: MOBILE[LTE], state: CONNECTED/CONNECTED, reason: (unspecified), extra: sp.koodo.com, failover: false, available: true, roaming: false]
  14. D/ViewRootImpl@41f6f97[Toast](18071): dispatchAttachedToWindow
  15. D/SamsungAlarmManager( 4910): Cancel Alarm calling from uid:10043 pid :6672 / op:PendingIntent{d73d01f: PendingIntentRecord{d221357 com.google.android.gms broadcastIntent}}
  16. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=169822
  17. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=169822
  18. V/WindowManager( 4910): Relayout Window{39c37be u0 Toast}: viewVisibility=0 req=1029x118 {(0,160)(wrapxwrap) gr=BOTTOM CENTER sim={adjust=pan} ty=TOAST fmt=TRANSLUCENT wanim=0x1030004
  19. V/WindowManager( 4910): fl=NOT_FOCUSABLE KEEP_SCREEN_ON WATCH_OUTSIDE_TOUCH HARDWARE_ACCELERATED naviIconColor=0}
  20. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  21. D/SurfaceFlinger( 4485): duplicate layer name: changing Toast[18071] to Toast[18071]#1
  22. I/SurfaceFlinger( 4485): id=412 createSurf (1029x118),1 flag=4, Toast[18071]#1
  23. D/SamsungAlarmManager( 4910): setInexact Intent (T:2/F:0/AC:false) 20190116T222508 - CU:10043/CP:6672
  24. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=169827
  25. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222459, SetElapsed=173529, nowELAPSED=169828
  26. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672
  27. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672, networkInfo: [type: MOBILE[LTE], state: CONNECTED/CONNECTED, reason: (unspecified), extra: sp.koodo.com, failover: false, available: true, roaming: false]
  28. D/ViewRootImpl@41f6f97[Toast](18071): Relayout returned: old=[0,60][1440,2960] new=[205,2682][1234,2800] result=0x47 surface={valid=true 505273319424} changed=true
  29. D/SamsungAlarmManager( 4910): Cancel Alarm calling from uid:10043 pid :6672 / op:PendingIntent{ab33f6c: PendingIntentRecord{d221357 com.google.android.gms broadcastIntent}}
  30. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=169831
  31. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222459, SetElapsed=173529, nowELAPSED=169831
  32. D/mali_winsys(18071): EGLint new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig, egl_winsys_surface **, EGLBoolean) returns 0x3000
  33. D/OpenGLRenderer(18071): eglCreateWindowSurface = 0x75a4acb300, 0x75a4a30010
  34. D/SamsungAlarmManager( 4910): setInexact Intent (T:2/F:0/AC:false) 20190116T222508 - CU:10043/CP:6672
  35. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=169836
  36. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=169836
  37. D/EdgeLightingManager( 4910): isCallingUserSupported : callingUserId=0, mUserId=0, isDualAppId=false
  38. D/EdgeLightingManager( 4910): showForNotification : isInteractive=true, isHeadUp=false, color=0, sbn = StatusBarNotification(pkg=com.sec.android.app.shealth user=UserHandle{0} id=105 tag=null key=0|com.sec.android.app.shealth|105|null|10245: Notification(channel=base.notification.channel.1.step pri=2 contentView=null vibrate=null sound=null defaults=0x0 flags=0x6a color=0x00000000 vis=PRIVATE semFlags=0x0 semPriority=0 semMissedCount=0))
  39. D/EdgeLightingClientManager( 4910): isAvailableEdgeLighting: condition=1 mCondition=3 mIsConnected=false0
  40. D/EdgeLightingPolicyManager( 4910): isAcceptableApplication: pkg=com.sec.android.app.shealth , range=256 , includeAllApp=false , userId=0 , infoRange=0 , infoCategory=0
  41. D/EdgeLightingPolicyManager( 4910): putNotification tickerText:false,titleText:true,text:true,sub:falsecn= + null
  42. D/EdgeLightingPolicyManager.NotificationGroup( 4910): updateNotificationData put :0|com.sec.android.app.shealth|105|null|10245,size=1
  43. D/EdgeLightingPolicyManager.NotificationGroup( 4910): 0|com.sec.android.app.shealth|105|null|10245:NotificationData time=1547695496307,
  44. D/EdgeLightingPolicyManager.NotificationGroup( 4910): 0|com.google.android.googlequicksearchbox|-814496063|n|10108:NotificationData time=1547695482849,
  45. D/EdgeLightingPolicyManager( 4910): isAcceptableApplication: pkg=com.sec.android.app.shealth , range=1 , includeAllApp=false , userId=0 , infoRange=0 , infoCategory=0
  46. D/EdgeLightingPolicyManager( 4910): isAcceptableApplication: getRejectablePolicy true
  47. I/AccessibilityManager( 4910): semStartFlashNotification notitype = null
  48. I/AccessibilityManagerService( 4910): semStartFlashNotificationInner() type=Default, pkgName=android, token=android.os.Binder@5e011ca
  49. D/AccessibilityManagerService( 4910): Can not use light notification
  50. E/FasUtils(17819): pkg=null userId=0 has no information
  51. E/FasUtils(17819): pkg=null userId=0 has no information
  52. W/SANotification4O( 7624): NotificationListener.onNotificationPosted : isSocketAvailable - false
  53. D/Notification.Badge( 6807): [invalid] onNotificationPosted : StatusBarNotification(pkg=com.sec.android.app.shealth user=UserHandle{0} id=105 tag=null key=0|com.sec.android.app.shealth|105|null|10245: Notification(channel=base.notification.channel.1.step pri=2 contentView=null vibrate=null sound=null defaults=0x0 flags=0x6a color=0x00000000 vis=PRIVATE semFlags=0x0 semPriority=0 semMissedCount=0))
  54. D/ORC/ScpmChannelUtil(18688): getLocalDBVersion() : 2018103113
  55. I/ORC/ScpmChannelUtil(18688): ScpmChannelUtil.initGlobalPwsChannelDB,Elapsed time : 1.221885 ms
  56. D/WindowManager( 4910): finishDrawingWindow: Window{39c37be u0 Toast} mDrawState=DRAW_PENDING
  57. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  58. I/WindowManager( 4910): commitFinishDrawingLocked: mDrawState=READY_TO_SHOW Surface(name=Toast[18071])/@0xd4ae658
  59. I/WindowManager( 4910): Cancelling animation restarting=true, leash=null, surface=Surface(name=39c37be Toast)/@0xb2313b1, parent=Surface(name=WindowToken{e384857 android.os.Binder@bf30dd6})/@0x157ed6b, caller=com.android.server.wm.SurfaceAnimator.startAnimation:114 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731
  60. I/WindowManager( 4910): Reparenting to leash, surface=Surface(name=39c37be Toast)/@0xb2313b1, caller=com.android.server.wm.SurfaceAnimator.startAnimation:122 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731
  61. I/SurfaceFlinger( 4485): id=413 createSurf (5920x5920),2 flag=4, Surface(name=39c37be Toast)/@0xb2313b1 - animation-leash#0
  62. D/SurfaceControl( 4910): reparent is called, sc=Surface(name=39c37be Toast)/@0xb2313b1, newParentHandle=android.os.BinderProxy@719a417, transaction=android.view.SurfaceControl$Transaction@6b41004, caller=com.android.server.wm.SurfaceAnimator.createAnimationLeash:368 com.android.server.wm.SurfaceAnimator.startAnimation:122 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731 com.android.server.wm.WindowStateAnimator.applyEnterAnimationLocked:1587
  63. V/WindowManager( 4910): performShowLocked: mDrawState=HAS_DRAWN in Window{39c37be u0 Toast}
  64. D/Layer ( 4485): [39c37be Toast#0]::reparent oldParent:[WindowToken{e384857 android.os.Binder@bf30dd6}#0], newParent:[Surface(name=39c37be Toast)/@0xb2313b1 - animation-leash#0]
  65. D/ViewRootImpl@41f6f97[Toast](18071): MSG_RESIZED: frame=Rect(205, 2682 - 1234, 2800) ci=Rect(0, 0 - 0, 0) vi=Rect(0, 0 - 0, 0) or=1
  66. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  67. W/PkgUtils(17819): p: com.samsung.android.themestore, u:0
  68. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672
  69. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672, networkInfo: [type: MOBILE[LTE], state: CONNECTED/CONNECTED, reason: (unspecified), extra: sp.koodo.com, failover: false, available: true, roaming: false]
  70. D/SamsungAlarmManager( 4910): Cancel Alarm calling from uid:10043 pid :6672 / op:PendingIntent{357b9a5: PendingIntentRecord{d221357 com.google.android.gms broadcastIntent}}
  71. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=169872
  72. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=169872
  73. D/StorageManagerService( 4910): getExternalStorageMountMode : 1
  74. D/StorageManagerService( 4910): getExternalStorageMountMode : 3
  75. D/StorageManagerService( 4910): getExternalStorageMountMode : final mountMode=1, uid : 10106, packageName : com.google.android.apps.turbo
  76. I/ApplicationPolicy( 4910): isApplicationExternalStorageWhitelisted:com.google.android.apps.turbo user:0
  77. D/ApplicationPolicy( 4910): isApplicationExternalStorageWhitelisted: DO is not enabled on user 0. Allowed.
  78. D/ActivityManager( 4910): package com.google.android.apps.turbo, user - 0 is SDcard whitelisted
  79. I/ApplicationPolicy( 4910): isApplicationExternalStorageBlacklisted:com.google.android.apps.turbo user:0
  80. D/ApplicationPolicy( 4910): isApplicationExternalStorageBlacklisted: DO is not enabled on user 0. Allowed.
  81. I/ApplicationPolicy( 4910): isApplicationExternalStorageBlacklisted:com.google.android.apps.turbo user:0
  82. D/ApplicationPolicy( 4910): isApplicationExternalStorageBlacklisted: DO is not enabled on user 0. Allowed.
  83. D/SamsungAlarmManager( 4910): setInexact Intent (T:2/F:0/AC:false) 20190116T222508 - CU:10043/CP:6672
  84. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=169882
  85. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=169882
  86. I/ActivityManager( 4910): Start proc 18852:com.google.android.apps.turbo/u0a106 for broadcast com.google.android.apps.turbo/.nudges.broadcasts.BatteryStatusChangedReceiver
  87. I/Vision ( 7148): Details: face_arm64_v8a.zip, 952adef6355342d44eeb2628bdd0fe04666deb12
  88. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672
  89. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672, networkInfo: [type: MOBILE[LTE], state: CONNECTED/CONNECTED, reason: (unspecified), extra: sp.koodo.com, failover: false, available: true, roaming: false]
  90. D/SamsungAlarmManager( 4910): Cancel Alarm calling from uid:10043 pid :6672 / op:PendingIntent{b55c107: PendingIntentRecord{d221357 com.google.android.gms broadcastIntent}}
  91. E/Zygote (18852): isWhitelistProcess - Process is Whitelisted
  92. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=169899
  93. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222459, SetElapsed=173529, nowELAPSED=169899
  94. I/Vision ( 7148): Engine already satisfied by existing download for face
  95. E/audit ( 4259): type=1400 audit(1547695496.366:34167): avc: denied { create } for pid=18852 comm="main" name="cgroup.procs" scontext=u:r:zygote:s0 tcontext=u:object_r:cgroup:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  96. E/audit ( 4259): type=1300 audit(1547695496.366:34167): arch=c00000b7 syscall=56 success=yes exit=45 a0=ffffff9c a1=75b2a74130 a2=88241 a3=1b6 items=0 ppid=4431 pid=18852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:zygote:s0 key=(null)
  97. E/audit ( 4259): type=1327 audit(1547695496.366:34167): proctitle="zygote64"
  98. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  99. W/ContextImpl( 4910): Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:1067 com.android.server.SEDenialService$AuditFileObserver.onEvent:78 android.os.FileObserver$ObserverThread.onEvent:123 android.os.FileObserver$ObserverThread.observe:-2 android.os.FileObserver$ObserverThread.run:86
  100. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  101. E/Zygote (18852): accessInfo : 1
  102. I/SELinux (18852): SELinux: seapp_context_lookup: seinfo=default, level=s0:c512,c768, pkgname=com.google.android.apps.turbo
  103. E/audit ( 4259): type=1400 audit(1547695496.370:34168): avc: denied { read } for pid=18852 comm="main" name="u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=14935 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  104. E/audit ( 4259): type=1300 audit(1547695496.370:34168): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  105. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  106. E/audit ( 4259): type=1327 audit(1547695496.370:34168): proctitle="zygote64"
  107. E/audit ( 4259): type=1400 audit(1547695496.370:34169): avc: denied { read } for pid=18852 comm="main" name="u:object_r:bootloader_boot_reason_prop:s0" dev="tmpfs" ino=14936 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:bootloader_boot_reason_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  108. E/audit ( 4259): type=1300 audit(1547695496.370:34169): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  109. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  110. E/audit ( 4259): type=1327 audit(1547695496.370:34169): proctitle="zygote64"
  111. E/audit ( 4259): type=1400 audit(1547695496.370:34170): avc: denied { read } for pid=18852 comm="main" name="u:object_r:boottime_prop:s0" dev="tmpfs" ino=14937 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  112. E/audit ( 4259): type=1300 audit(1547695496.370:34170): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  113. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  114. E/audit ( 4259): type=1327 audit(1547695496.370:34170): proctitle="zygote64"
  115. E/audit ( 4259): type=1400 audit(1547695496.370:34171): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ccm_prop:s0" dev="tmpfs" ino=14939 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ccm_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  116. E/audit ( 4259): type=1300 audit(1547695496.370:34171): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  117. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  118. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  119. E/audit ( 4259): type=1327 audit(1547695496.370:34171): proctitle="zygote64"
  120. E/audit ( 4259): type=1400 audit(1547695496.370:34172): avc: denied { read } for pid=18852 comm="main" name="u:object_r:compact_dump_prop:s0" dev="tmpfs" ino=14941 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:compact_dump_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  121. E/audit ( 4259): type=1300 audit(1547695496.370:34172): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  122. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  123. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  124. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  125. E/audit ( 4259): type=1327 audit(1547695496.370:34172): proctitle="zygote64"
  126. E/audit ( 4259): type=1400 audit(1547695496.370:34173): avc: denied { read } for pid=18852 comm="main" name="u:object_r:cp_reserved_mem_prop:s0" dev="tmpfs" ino=14943 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cp_reserved_mem_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  127. E/audit ( 4259): type=1300 audit(1547695496.370:34173): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  128. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  129. E/audit ( 4259): type=1327 audit(1547695496.370:34173): proctitle="zygote64"
  130. E/audit ( 4259): type=1400 audit(1547695496.370:34174): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_apexserver_prop:s0" dev="tmpfs" ino=14946 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_apexserver_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  131. E/audit ( 4259): type=1300 audit(1547695496.370:34174): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  132. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  133. E/audit ( 4259): type=1327 audit(1547695496.370:34174): proctitle="zygote64"
  134. E/audit ( 4259): type=1400 audit(1547695496.370:34175): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=14947 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  135. E/audit ( 4259): type=1300 audit(1547695496.370:34175): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  136. E/audit ( 4259): type=1327 audit(1547695496.370:34175): proctitle="zygote64"
  137. E/audit ( 4259): type=1400 audit(1547695496.370:34176): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_bugreport_prop:s0" dev="tmpfs" ino=14948 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_bugreport_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  138. E/audit ( 4259): type=1300 audit(1547695496.370:34176): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  139. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  140. E/audit ( 4259): type=1327 audit(1547695496.370:34176): proctitle="zygote64"
  141. E/audit ( 4259): type=1400 audit(1547695496.370:34177): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_console_prop:s0" dev="tmpfs" ino=14949 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_console_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  142. E/audit ( 4259): type=1300 audit(1547695496.370:34177): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  143. E/audit ( 4259): type=1327 audit(1547695496.370:34177): proctitle="zygote64"
  144. E/audit ( 4259): type=1400 audit(1547695496.370:34178): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_default_prop:s0" dev="tmpfs" ino=14950 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_default_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  145. E/audit ( 4259): type=1300 audit(1547695496.370:34178): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  146. E/roid.apps.turb(18852): Not starting debugger since process cannot load the jdwp agent.
  147. E/audit ( 4259): type=1327 audit(1547695496.370:34178): proctitle="zygote64"
  148. E/audit ( 4259): type=1400 audit(1547695496.370:34179): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_dumpstate_prop:s0" dev="tmpfs" ino=14951 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_dumpstate_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  149. E/audit ( 4259): type=1300 audit(1547695496.370:34179): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  150. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  151. E/audit ( 4259): type=1327 audit(1547695496.370:34179): proctitle="zygote64"
  152. E/audit ( 4259): type=1400 audit(1547695496.370:34180): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_factory_ssc_prop:s0" dev="tmpfs" ino=14952 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_factory_ssc_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  153. E/audit ( 4259): type=1300 audit(1547695496.370:34180): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  154. E/audit ( 4259): type=1327 audit(1547695496.370:34180): proctitle="zygote64"
  155. E/audit ( 4259): type=1400 audit(1547695496.370:34181): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_fuse_prop:s0" dev="tmpfs" ino=14953 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_fuse_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  156. E/audit ( 4259): type=1300 audit(1547695496.370:34181): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  157. E/audit ( 4259): type=1327 audit(1547695496.370:34181): proctitle="zygote64"
  158. E/audit ( 4259): type=1400 audit(1547695496.370:34182): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_interface_restart_prop:s0" dev="tmpfs" ino=14954 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_interface_restart_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  159. E/audit ( 4259): type=1300 audit(1547695496.370:34182): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  160. E/audit ( 4259): type=1327 audit(1547695496.370:34182): proctitle="zygote64"
  161. E/audit ( 4259): type=1400 audit(1547695496.370:34183): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_interface_start_prop:s0" dev="tmpfs" ino=14955 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_interface_start_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  162. E/audit ( 4259): type=1300 audit(1547695496.370:34183): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  163. E/audit ( 4259): type=1327 audit(1547695496.370:34183): proctitle="zygote64"
  164. E/audit ( 4259): type=1400 audit(1547695496.370:34184): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_interface_stop_prop:s0" dev="tmpfs" ino=14956 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_interface_stop_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  165. E/audit ( 4259): type=1300 audit(1547695496.370:34184): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  166. E/audit ( 4259): type=1327 audit(1547695496.370:34184): proctitle="zygote64"
  167. E/audit ( 4259): type=1400 audit(1547695496.370:34185): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=14957 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  168. I/Vision ( 7148): Details: barcode_arm64_v8a.zip, 7148dd7928c8eea7908dd940766a4073b9f639aa
  169. E/audit ( 4259): type=1300 audit(1547695496.370:34185): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  170. E/audit ( 4259): type=1327 audit(1547695496.370:34185): proctitle="zygote64"
  171. E/audit ( 4259): type=1400 audit(1547695496.370:34186): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_redsocks_prop:s0" dev="tmpfs" ino=14958 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_redsocks_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  172. E/audit ( 4259): type=1300 audit(1547695496.370:34186): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  173. E/audit ( 4259): type=1327 audit(1547695496.370:34186): proctitle="zygote64"
  174. E/audit ( 4259): type=1400 audit(1547695496.370:34187): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=14959 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  175. E/audit ( 4259): type=1300 audit(1547695496.370:34187): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  176. E/audit ( 4259): type=1327 audit(1547695496.370:34187): proctitle="zygote64"
  177. E/audit ( 4259): type=1400 audit(1547695496.370:34188): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=14960 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  178. E/audit ( 4259): type=1300 audit(1547695496.370:34188): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  179. E/audit ( 4259): type=1327 audit(1547695496.370:34188): proctitle="zygote64"
  180. E/audit ( 4259): type=1400 audit(1547695496.370:34189): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=14961 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  181. E/audit ( 4259): type=1300 audit(1547695496.370:34189): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  182. E/audit ( 4259): type=1327 audit(1547695496.370:34189): proctitle="zygote64"
  183. E/audit ( 4259): type=1400 audit(1547695496.370:34190): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_start_prop:s0" dev="tmpfs" ino=14962 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_start_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  184. I/Vision ( 7148): Engine already satisfied by existing download for barcode
  185. E/audit ( 4259): type=1300 audit(1547695496.370:34190): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  186. E/audit ( 4259): type=1327 audit(1547695496.370:34190): proctitle="zygote64"
  187. E/audit ( 4259): type=1400 audit(1547695496.370:34191): avc: denied { read } for pid=18852 comm="main" name="u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=14963 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  188. E/audit ( 4259): type=1300 audit(1547695496.370:34191): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18852 auid=4294967295 uid=10106 gid=10106 euid=10106 suid=10106 fsuid=10106 egid=10106 sgid=10106 fsgid=10106 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  189. E/audit ( 4259): type=1327 audit(1547695496.370:34191): proctitle="zygote64"
  190. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  191. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  192. I/Vision ( 7148): Details: ocr_arm64_v8a.zip, eef0f328b471a7ddd7197ba013d6462194ac8566
  193. I/chatty ( 4910): uid=1000(system) FileObserver identical 6 lines
  194. W/ContextImpl( 4910): Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:1067 com.android.server.SEDenialService$AuditFileObserver.onEvent:78 android.os.FileObserver$ObserverThread.onEvent:123 android.os.FileObserver$ObserverThread.observe:-2 android.os.FileObserver$ObserverThread.run:86
  195. D/SamsungAlarmManager( 4910): setInexact Intent (T:2/F:0/AC:false) 20190116T222508 - CU:10043/CP:6672
  196. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=169925
  197. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=169925
  198. I/ActivityManager( 4910): DSS on for com.google.android.apps.turbo and scale is 1.0
  199. I/SurfaceFlinger( 4485): Display 0 HWC layers:
  200. I/SurfaceFlinger( 4485): type | handle | flag | format | source crop (l,t,r,b) | frame | name
  201. I/SurfaceFlinger( 4485): ------------+--------------+------+-----------+----------------------------+---------------------+------
  202. I/SurfaceFlinger( 4485): Device | 0x734a864060 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 2960.0 | 0 0 1440 2960 | com.android.systemui.infinity.InfinityWallpaperBrown[5629]#0
  203. I/SurfaceFlinger( 4485): Device | 0x734a864680 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 2687.0 | 0 273 1440 2960 | com.teslacoilsw.launcher/com.teslacoilsw.launcher.NovaLauncher[6772]#0
  204. I/SurfaceFlinger( 4485): Device | 0x7357030460 | 0002 | RGBA_8888 | 0.0 0.0 1440.0 261.0 | 0 0 1440 261 | rs.pedjaapps.alogcatroot.app/rs.pedj[...]alogcatroot.app.LogActivity[15145]#1
  205. I/SurfaceFlinger( 4485): Device | 0x734a863a40 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 120.0 | 0 207 1440 327 | DockedStackDivider[5404]#0
  206. I/SurfaceFlinger( 4485): Device | 0x734a864d80 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 261.0 | 0 0 1440 261 | DividerClose[5404]#0
  207. I/SurfaceFlinger( 4485): Device | 0x7357645440 | 0000 | RG
  208. I/SurfaceFlinger( 4485): BA_8888 | 0.0 0.0 30.0 2664.0 | 0 148 30 2812 | [6834]#3
  209. I/SurfaceFlinger( 4485): Device | 0x73576449c0 | 0000 | RGBA_8888 | 0.0 0.0 30.0 2664.0 | 1410 148 1440 2812 | [6834]#4
  210. I/SurfaceFlinger( 4485): Device | 0x7357646160 | 0000 | RGBA_8888 | 0.0 0.0 30.0 1398.0 | 0 82 30 1480 | [10500]#0
  211. I/SurfaceFlinger( 4485): Device | 0x7357647f20 | 0000 | RGBA_8888 | 0.0 0.0 52.0 37.0 | 0 2923 52 2960 | [10500]#1
  212. I/SurfaceFlinger( 4485): SolidColor | | 0000 | Unknown | 0.0 0.0 -1.0 -1.0 | 0 0 1440 2960 | Dim Layer for - mAboveAppWindowsContainers#0
  213. I/SurfaceFlinger( 4485): Client | 0x734a863dc0 | 0000 | RGBA_8888 | 5.0 0.0 1445.0 501.0 | 0 2459 1440 2960 | Application Error: james.dsp#0
  214. I/SurfaceFlinger( 4485): Client | 0x7357646b00 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 60.0 | 0 0 1440 60 | StatusBar[5404]#0
  215. I/SurfaceFlinger( 4485): Client | 0x734a865720 | 0000 | RGBA_8888 | 0.0 0.0 1029.0 118.0 | 205 2682 1234 2800 | Toast[18071]#0
  216. I/SurfaceFlinger( 4485): Client | 0x734a8667c0 | 0000 | RGBA_8888 | 0.0 0.0 1029.0 118.0 | 205 2682 1234 2800 | Toast[18071]#1
  217. I/SurfaceFlinger( 4485): Cli
  218. I/SurfaceFlinger( 4485): ent | 0x7357642340 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 410.0 | 0 2550 1440 2960 | NavbarGestureHandler[5404]#0
  219. I/SurfaceFlinger( 4485):
  220. I/Vision ( 7148): Engine already satisfied by existing download for ocr
  221. D/GamePkgDataHelper( 4910): getGamePkgData(). rs.pedjaapps.alogcatroot.app
  222. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672
  223. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672, networkInfo: [type: MOBILE[LTE], state: CONNECTED/CONNECTED, reason: (unspecified), extra: sp.koodo.com, failover: false, available: true, roaming: false]
  224. D/SamsungAlarmManager( 4910): Cancel Alarm calling from uid:10043 pid :6672 / op:PendingIntent{494785d: PendingIntentRecord{d221357 com.google.android.gms broadcastIntent}}
  225. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=169939
  226. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=169939
  227. D/WifiPermissionsUtil( 4910): canAccessScanResults: pkgName = android, uid = 1000
  228. D/WifiNetworkScoreCache( 4910): updateScores list size=4
  229. D/WifiNetworkScoreCache( 4910): updateScores list size=4
  230. I/NetRec ( 6672): [400] ahtr.a: Completed rapid_refresh_scores_task score refresh task in 173 ms, returning 0
  231. D/SamsungAlarmManager( 4910): setInexact Intent (T:2/F:0/AC:false) 20190116T222508 - CU:10043/CP:6672
  232. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=169949
  233. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=169949
  234. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672
  235. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672, networkInfo: [type: MOBILE[LTE], state: CONNECTED/CONNECTED, reason: (unspecified), extra: sp.koodo.com, failover: false, available: true, roaming: false]
  236. D/SamsungAlarmManager( 4910): Cancel Alarm calling from uid:10043 pid :6672 / op:PendingIntent{4d1c5d2: PendingIntentRecord{d221357 com.google.android.gms broadcastIntent}}
  237. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=169966
  238. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=169966
  239. D/ConnectivityManager_URSP(18852): Ursp sIsUrsp=false, sIsCheckUrsp=false, uid=10106
  240. D/Proxy (18852): urspP is null: 10106
  241. D/SamsungAlarmManager( 4910): setInexact Intent (T:2/F:0/AC:false) 20190116T222540 - CU:10043/CP:6672
  242. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=169992
  243. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=169992
  244. I/roid.apps.turb(18852): The ClassLoaderContext is a special shared library.
  245. W/ChimeraUtils( 6672): Non Chimera context
  246. W/ChimeraUtils( 6672): Non Chimera context
  247. I/System.out( 7148): (HTTPLog)-Static: isSBSettingEnabled false
  248. I/System.out( 7148): (HTTPLog)-Static: isSBSettingEnabled false
  249. D/DnsProxyListener( 4430): DNSDBG::dns addrinfo af 2
  250. I/WindowManager( 4910): reset, Reparenting to original parent, shouldDeferScheduleAnimation=false, destroyLeash=true, surface=Surface(name=80f12f3 Toast)/@0x76c8aba, parent=Surface(name=WindowToken{e384857 android.os.Binder@bf30dd6})/@0x157ed6b, parentNativeHandle=android.os.BinderProxy@81fee1a, caller=com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65
  251. D/SurfaceControl( 4910): reparent is called, sc=Surface(name=80f12f3 Toast)/@0x76c8aba, newParentHandle=android.os.BinderProxy@81fee1a, transaction=android.view.SurfaceControl$Transaction@974d561, caller=com.android.server.wm.SurfaceAnimator.reset:317 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65 com.android.server.wm.-$$Lambda$LocalAnimationAdapter$X--EomqUvw4qy89IeeTFTH7aCMo.run:4
  252. D/SurfaceControl( 4910): destroy(case2), animation-leash is destroyed, sc=Surface(name=Surface(name=80f12f3 Toast)/@0x76c8aba - animation-leash)/@0xf7089d4, transaction=android.view.SurfaceControl$Transaction@974d561, caller=com.android.server.wm.SurfaceAnimator.reset:324 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65 com.android.server.wm.-$$Lambda$LocalAnimationAdapter$X--EomqUvw4qy89IeeTFTH7aCMo.run:4
  253. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  254. D/Layer ( 4485): [80f12f3 Toast#0]::reparent oldParent:[Surface(name=80f12f3 Toast)/@0x76c8aba - animation-leash#1], newParent:[WindowToken{e384857 android.os.Binder@bf30dd6}#0]
  255. I/SurfaceFlinger( 4485): id=410 Removed Surface(name=80f12f3 Toast)/@0x76c8aba - animation-leash#1 (1/96)
  256. I/WindowManager( 4910): Destroying surface Surface(name=Toast[18071])/@0x57deb4f called by com.android.server.wm.WindowStateAnimator.destroySurface:1826 com.android.server.wm.WindowStateAnimator.destroySurfaceLocked:804 com.android.server.wm.WindowState.destroySurfaceUnchecked:3656 com.android.server.wm.RootWindowContainer.performSurfacePlacement:848 com.android.server.wm.WindowSurfacePlacer.performSurfacePlacementLoop:211 com.android.server.wm.WindowSurfacePlacer.performSurfacePlacement:159 com.android.server.wm.WindowSurfacePlacer.performSurfacePlacement:149 com.android.server.wm.WindowSurfacePlacer.lambda$new$0:122
  257. I/SurfaceFlinger( 4485): id=408 Removed Toast[18071]#0 (0/95)
  258. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  259. I/SurfaceFlinger( 4485): id=407 Removed 80f12f3 Toast#0 (0/94)
  260. W/PrimesInit(18852): Primes instant initialization
  261. I/Layer ( 4485): id=407 onRemoved 80f12f3 Toast#0
  262. I/Layer ( 4485): id=408 onRemoved Toast[18071]#0
  263. I/Layer ( 4485): id=410 onRemoved Surface(name=80f12f3 Toast)/@0x76c8aba - animation-leash#1
  264. W/FileClientSessionCache( 7148): FileClientSessionCache: Error reading session data for googleads.g.doubleclick.net from /data/user/0/com.google.android.gms/app_sslcache/googleads.g.doubleclick.net.443.
  265. W/FileClientSessionCache( 7148): java.io.FileNotFoundException: /data/user/0/com.google.android.gms/app_sslcache/googleads.g.doubleclick.net.443 (No such file or directory)
  266. W/FileClientSessionCache( 7148): at java.io.FileInputStream.open0(Native Method)
  267. W/FileClientSessionCache( 7148): at java.io.FileInputStream.open(FileInputStream.java:231)
  268. W/FileClientSessionCache( 7148): at java.io.FileInputStream.<init>(FileInputStream.java:165)
  269. W/FileClientSessionCache( 7148): at com.google.android.gms.org.conscrypt.FileClientSessionCache$Impl.getSessionData(:com.google.android.gms@14799037@14.7.99 (100400-223214910):5)
  270. W/FileClientSessionCache( 7148): at com.google.android.gms.org.conscrypt.ClientSessionContext.getSession(:com.google.android.gms@14799037@14.7.99 (100400-223214910):4)
  271. W/FileClientSessionCache( 7148): at com.google.android.gms.org.conscrypt.ClientSessionContext.getCachedSession(:com.google.android.gms@14799037@14.7.99 (100400-223214910):1)
  272. W/FileClientSessionCache( 7148): at com.google.android.gms.org.conscrypt.ConscryptFileDescriptorSocket.startHandshake(:com.google.android.gms@14799037@14.7.99 (100400-223214910):6)
  273. W/FileClientSessionCache( 7148): at com.google.android.gms.common.net.SSLCertificateSocketFactory.verifyHostname(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  274. W/FileClientSessionCache( 7148): at com.google.android.gms.common.net.SSLCertificateSocketFactory.createSocket(:com.google.android.gms@14799037@14.7.99 (100400-223214910):6)
  275. W/FileClientSessionCache( 7148): at com.android.okhttp.internal.io.RealConnection.connectTls(RealConnection.java:1464)
  276. W/FileClientSessionCache( 7148): at com.android.okhttp.internal.io.RealConnection.connectSocket(RealConnection.java:1424)
  277. W/FileClientSessionCache( 7148): at com.android.okhttp.internal.io.RealConnection.connect(RealConnection.java:1368)
  278. W/FileClientSessionCache( 7148): at com.android.okhttp.internal.http.StreamAllocation.findConnection(StreamAllocation.java:219)
  279. W/FileClientSessionCache( 7148): at com.android.okhttp.internal.http.StreamAllocation.findHealthyConnection(StreamAllocation.java:142)
  280. W/FileClientSessionCache( 7148): at com.android.okhttp.internal.http.StreamAllocation.newStream(StreamAllocation.java:104)
  281. W/FileClientSessionCache( 7148): at com.android.okhttp.internal.http.HttpEngine.connect(HttpEngine.java:392)
  282. W/FileClientSessionCache( 7148): at com.android.okhttp.internal.http.HttpEngine.sendRequest(HttpEngine.java:325)
  283. W/FileClientSessionCache( 7148): at com.android.okhttp.internal.huc.HttpURLConnectionImpl.execute(HttpURLConnectionImpl.java:470)
  284. W/FileClientSessionCache( 7148): at com.android.okhttp.internal.huc.HttpURLConnectionImpl.getResponse(HttpURLConnectionImpl.java:416)
  285. W/FileClientSessionCache( 7148): at com.android.okhttp.internal.huc.HttpURLConnectionImpl.getResponseCode(HttpURLConnectionImpl.java:547)
  286. W/FileClientSessionCache( 7148): at com.android.okhttp.internal.huc.DelegatingHttpsURLConnection.getResponseCode(DelegatingHttpsURLConnection.java:105)
  287. W/FileClientSessionCache( 7148): at com.android.okhttp.internal.huc.HttpsURLConnectionImpl.getResponseCode(HttpsURLConnectionImpl.java:26)
  288. W/FileClientSessionCache( 7148): at com.google.android.gms.ads.social.a.a(:com.google.android.gms@14799037@14.7.99 (100400-223214910):10)
  289. W/FileClientSessionCache( 7148): at com.google.android.gms.ads.social.a.a(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  290. W/FileClientSessionCache( 7148): at com.google.android.gms.ads.social.a.a(:com.google.android.gms@14799037@14.7.99 (100400-223214910):34)
  291. W/FileClientSessionCache( 7148): at com.google.android.gms.ads.social.GcmSchedulerWakeupChimeraService.a(Unknown Source:20)
  292. W/FileClientSessionCache( 7148): at ynh.run(:com.google.android.gms@14799037@14.7.99 (100400-223214910):5)
  293. W/FileClientSessionCache( 7148): at qwc.run(:com.google.android.gms@14799037@14.7.99 (100400-223214910):21)
  294. W/FileClientSessionCache( 7148): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1167)
  295. W/FileClientSessionCache( 7148): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:641)
  296. W/FileClientSessionCache( 7148): at rbx.run(Unknown Source:7)
  297. W/FileClientSessionCache( 7148): at java.lang.Thread.run(Thread.java:764)
  298. W/Conscrypt( 7148): Could not set socket write timeout: java.net.SocketException: Socket closed
  299. W/Conscrypt( 7148): at com.google.android.gms.org.conscrypt.Platform.setSocketWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  300. W/Conscrypt( 7148): at com.google.android.gms.org.conscrypt.ConscryptFileDescriptorSocket.setSoWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  301. I/SurfaceFlinger( 4485): Display 0 HWC layers:
  302. I/SurfaceFlinger( 4485): type | handle | flag | format | source crop (l,t,r,b) | frame | name
  303. I/SurfaceFlinger( 4485): ------------+--------------+------+-----------+----------------------------+---------------------+------
  304. I/SurfaceFlinger( 4485): Device | 0x734a864060 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 2960.0 | 0 0 1440 2960 | com.android.systemui.infinity.InfinityWallpaperBrown[5629]#0
  305. I/SurfaceFlinger( 4485): Device | 0x734a864680 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 2687.0 | 0 273 1440 2960 | com.teslacoilsw.launcher/com.teslacoilsw.launcher.NovaLauncher[6772]#0
  306. I/SurfaceFlinger( 4485): Device | 0x7357030000 | 0002 | RGBA_8888 | 0.0 0.0 1440.0 261.0 | 0 0 1440 261 | rs.pedjaapps.alogcatroot.app/rs.pedj[...]alogcatroot.app.LogActivity[15145]#1
  307. I/SurfaceFlinger( 4485): Device | 0x734a863a40 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 120.0 | 0 207 1440 327 | DockedStackDivider[5404]#0
  308. I/SurfaceFlinger( 4485): Device | 0x734a864d80 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 261.0 | 0 0 1440 261 | DividerClose[5404]#0
  309. I/SurfaceFlinger( 4485): Device | 0x7357645440 | 0000 | RG
  310. I/SurfaceFlinger( 4485): BA_8888 | 0.0 0.0 30.0 2664.0 | 0 148 30 2812 | [6834]#3
  311. I/SurfaceFlinger( 4485): Device | 0x73576449c0 | 0000 | RGBA_8888 | 0.0 0.0 30.0 2664.0 | 1410 148 1440 2812 | [6834]#4
  312. I/SurfaceFlinger( 4485): Device | 0x7357646160 | 0000 | RGBA_8888 | 0.0 0.0 30.0 1398.0 | 0 82 30 1480 | [10500]#0
  313. I/SurfaceFlinger( 4485): Device | 0x7357647f20 | 0000 | RGBA_8888 | 0.0 0.0 52.0 37.0 | 0 2923 52 2960 | [10500]#1
  314. I/SurfaceFlinger( 4485): SolidColor | | 0000 | Unknown | 0.0 0.0 -1.0 -1.0 | 0 0 1440 2960 | Dim Layer for - mAboveAppWindowsContainers#0
  315. I/SurfaceFlinger( 4485): Client | 0x734a863dc0 | 0000 | RGBA_8888 | 5.0 0.0 1445.0 501.0 | 0 2459 1440 2960 | Application Error: james.dsp#0
  316. I/SurfaceFlinger( 4485): Client | 0x7357646b00 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 60.0 | 0 0 1440 60 | StatusBar[5404]#0
  317. I/SurfaceFlinger( 4485): Client | 0x734a8667c0 | 0000 | RGBA_8888 | 0.0 0.0 1029.0 118.0 | 205 2682 1234 2800 | Toast[18071]#1
  318. I/SurfaceFlinger( 4485): Client | 0x7357642340 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 410.0 | 0 2550 1440 2960 | NavbarGestureHandler[54
  319. I/SurfaceFlinger( 4485): 04]#0
  320. I/SurfaceFlinger( 4485):
  321. I/WindowManager( 4910): reset, Reparenting to original parent, shouldDeferScheduleAnimation=false, destroyLeash=true, surface=Surface(name=39c37be Toast)/@0xb2313b1, parent=Surface(name=WindowToken{e384857 android.os.Binder@bf30dd6})/@0x157ed6b, parentNativeHandle=android.os.BinderProxy@81fee1a, caller=com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65
  322. D/SurfaceControl( 4910): reparent is called, sc=Surface(name=39c37be Toast)/@0xb2313b1, newParentHandle=android.os.BinderProxy@81fee1a, transaction=android.view.SurfaceControl$Transaction@6b41004, caller=com.android.server.wm.SurfaceAnimator.reset:317 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65 com.android.server.wm.-$$Lambda$LocalAnimationAdapter$X--EomqUvw4qy89IeeTFTH7aCMo.run:4
  323. D/SurfaceControl( 4910): destroy(case2), animation-leash is destroyed, sc=Surface(name=Surface(name=39c37be Toast)/@0xb2313b1 - animation-leash)/@0xea439ed, transaction=android.view.SurfaceControl$Transaction@6b41004, caller=com.android.server.wm.SurfaceAnimator.reset:324 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65 com.android.server.wm.-$$Lambda$LocalAnimationAdapter$X--EomqUvw4qy89IeeTFTH7aCMo.run:4
  324. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  325. D/Layer ( 4485): [39c37be Toast#0]::reparent oldParent:[Surface(name=39c37be Toast)/@0xb2313b1 - animation-leash#0], newParent:[WindowToken{e384857 android.os.Binder@bf30dd6}#0]
  326. I/SurfaceFlinger( 4485): id=413 Removed Surface(name=39c37be Toast)/@0xb2313b1 - animation-leash#0 (1/93)
  327. W/Primes (18852): background initialization
  328. I/Layer ( 4485): id=413 onRemoved Surface(name=39c37be Toast)/@0xb2313b1 - animation-leash#0
  329. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  330. W/ComponentDiscovery(18852): Application info not found.
  331. W/ComponentDiscovery(18852): Could not retrieve metadata, returning empty list of registrars.
  332. I/.shealth:remot(14563): IncrementDisableThreadFlip blocked for 9.350ms
  333. W/Conscrypt( 7148): Could not set socket write timeout: java.net.SocketException: Socket closed
  334. W/Conscrypt( 7148): at com.google.android.gms.org.conscrypt.Platform.setSocketWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  335. W/Conscrypt( 7148): at com.google.android.gms.org.conscrypt.ConscryptFileDescriptorSocket.setSoWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  336. I/PrimesTesting(18852): GserviceFlagsSupplier.get()
  337. I/System.out( 7148): (HTTPLog)-Static: isSBSettingEnabled false
  338. I/System.out( 7148): (HTTPLog)-Static: isSBSettingEnabled false
  339. W/Conscrypt( 7148): Could not set socket write timeout: java.net.SocketException: Socket closed
  340. W/Conscrypt( 7148): at com.google.android.gms.org.conscrypt.Platform.setSocketWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  341. W/Conscrypt( 7148): at com.google.android.gms.org.conscrypt.ConscryptFileDescriptorSocket.setSoWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  342. W/Conscrypt( 7148): Could not set socket write timeout: java.net.SocketException: Socket closed
  343. W/Conscrypt( 7148): at com.google.android.gms.org.conscrypt.Platform.setSocketWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  344. W/Conscrypt( 7148): at com.google.android.gms.org.conscrypt.ConscryptFileDescriptorSocket.setSoWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  345. I/Telecom:SamsungPrebindingServiceImpl( 4910): isSktTPhoneMode supportTPhone: false
  346. I/Telecom:SamsungPrebindingServiceImpl( 4910): needToKeepBinding: false match not found
  347. W/roid.apps.turb(18852): Unsupported class loader
  348. W/roid.apps.turb(18852): Skipping duplicate class check due to unsupported classloader
  349. E/ActivityManager( 4910): getPackageFromAppProcesses, return null :16451
  350. E/ActivityManager( 4910): getPackageFromAppProcesses, return null :16553
  351. D/AndroidRuntime(16451): Shutting down VM
  352. D/EdgeLightingManager( 4910): isCallingUserSupported : callingUserId=0, mUserId=0, isDualAppId=false
  353. D/EdgeLightingManager( 4910): showForToast : packageName = com.topjohnwu.magisk
  354. D/EdgeLightingClientManager( 4910): isAvailableEdgeLighting: condition=1 mCondition=3 mIsConnected=false0
  355. D/EdgeLightingPolicyManager( 4910): isAcceptableApplication: pkg=com.topjohnwu.magisk , range=512 , includeAllApp=false , userId=0 , infoRange=0 , infoCategory=0
  356. D/EdgeLightingManager( 4910): showForToast : return false by isAcceptableApplication.
  357. E/ActivityManager( 4910): getPackageFromAppProcesses, return null :16553
  358. E/BufferQueueProducer( 4485): [Toast[18071]#1] disconnect: not connected (req=1)
  359. W/libEGL (18071): EGLNativeWindowType 0x75a4a30010 disconnect failed
  360. D/OpenGLRenderer(18071): eglDestroySurface = 0x75a4acb300, 0x75a4a30000
  361. D/ViewRootImpl@41f6f97[Toast](18071): dispatchDetachedFromWindow
  362. D/ViewRootImpl@41f6f97[Toast](18071): Surface release. android.view.ViewRootImpl.doDie:7931 android.view.ViewRootImpl.die:7899 android.view.WindowManagerGlobal.removeViewLocked:497 android.view.WindowManagerGlobal.removeView:435 android.view.WindowManagerImpl.removeViewImmediate:124 android.widget.Toast$TN.handleHide:1126 android.widget.Toast$TN$1.handleMessage:914 android.os.Handler.dispatchMessage:106
  363. D/io_stats( 6332): !@ 8,0 r 77961 4910396 w 24508 811256 d 1752 318204 f 9314 11925 iot 34636 32801 th 102400 0 0 pt 0 inp 0 0 170.550
  364. V/WindowManager( 4910): Remove Window{39c37be u0 Toast}: mSurfaceController=Surface(name=Toast[18071])/@0xd4ae658 mAnimatingExit=false mRemoveOnExit=false mHasSurface=true surfaceShowing=true isAnimationSet=false app-animation=false mWillReplaceWindow=false inPendingTransaction=false mDisplayFrozen=false callers=com.android.server.wm.WindowState.removeIfPossible:2626 com.android.server.wm.WindowManagerService.removeWindow:1908 com.android.server.wm.Session.remove:253 android.view.IWindowSession$Stub.onTransact:261 com.android.server.wm.Session.onTransact:186 android.os.Binder.execTransact:739
  365. D/io_stats( 6332): !@ 179,0 r 4537 41672 w 0 0 d 0 0 f 0 0 iot 3264 2956 th 102400 0 0 pt 0 inp 0 0 170.551
  366. I/WindowManager( 4910): Cancelling animation restarting=true, leash=null, surface=Surface(name=39c37be Toast)/@0xb2313b1, parent=Surface(name=WindowToken{e384857 android.os.Binder@bf30dd6})/@0x157ed6b, caller=com.android.server.wm.SurfaceAnimator.startAnimation:114 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731
  367. I/WindowManager( 4910): Reparenting to leash, surface=Surface(name=39c37be Toast)/@0xb2313b1, caller=com.android.server.wm.SurfaceAnimator.startAnimation:122 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731
  368. I/SurfaceFlinger( 4485): id=414 createSurf (5920x5920),2 flag=4, Surface(name=39c37be Toast)/@0xb2313b1 - animation-leash#0
  369. D/SurfaceControl( 4910): reparent is called, sc=Surface(name=39c37be Toast)/@0xb2313b1, newParentHandle=android.os.BinderProxy@7109532, transaction=android.view.SurfaceControl$Transaction@6b41004, caller=com.android.server.wm.SurfaceAnimator.createAnimationLeash:368 com.android.server.wm.SurfaceAnimator.startAnimation:122 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731 com.android.server.wm.WindowState.removeIfPossible:2720
  370. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  371. D/Layer ( 4485): [39c37be Toast#0]::reparent oldParent:[WindowToken{e384857 android.os.Binder@bf30dd6}#0], newParent:[Surface(name=39c37be Toast)/@0xb2313b1 - animation-leash#0]
  372. D/InputTransport( 4910): Input channel destroyed: fd=430
  373. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222459, SetElapsed=172546, nowELAPSED=170563
  374. D/SamsungAlarmManager( 4910): setExact Listener (T:2/F:0/AC:false) 20190116T222457 - CU:1000/CP:4910
  375. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222458, SetElapsed=171557, nowELAPSED=170563
  376. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  377. D/InputTransport(18071): Input channel destroyed: fd=74
  378. W/NotificationService( 4910): Toast already killed. pkg=com.topjohnwu.magisk callback=android.app.ITransientNotification$Stub$Proxy@cb85c39
  379. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222457, SetElapsed=170557, nowELAPSED=170568
  380. D/SamsungAlarmManager( 4910): setExact Listener (T:2/F:0/AC:false) 20190116T222502 - CU:1000/CP:4910
  381. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222457, SetElapsed=170557, nowELAPSED=170568
  382. D/SamsungAlarmManager( 4910): Expired : 4
  383. V/SamsungAlarmManager( 4910): Sending to uid : 1000 listener=android.app.AlarmManager$ListenerWrapper@309ecb alarm=Alarm{3aed27e type 2 when 170557 android}
  384. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222502, SetElapsed=175557, nowELAPSED=170569
  385. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=170569
  386. D/SamsungAlarmManager( 4910): setExact Listener (T:2/F:0/AC:false) 20190116T222503 - CU:1000/CP:4910
  387. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222502, SetElapsed=175557, nowELAPSED=170571
  388. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=170571
  389. D/InputTransport( 4910): Input channel constructed: fd=430
  390. D/InputTransport( 4910): Input channel constructed: fd=464
  391. V/MARsPolicyManager( 4910): handelAlertToastWindowStarted pkgName = com.topjohnwu.magisk, userId = 0
  392. D/StorageManagerService( 4910): getExternalStorageMountMode : 1
  393. D/StorageManagerService( 4910): getExternalStorageMountMode : 3
  394. D/StorageManagerService( 4910): getExternalStorageMountMode : final mountMode=1, uid : 10107, packageName : de.axelspringer.yana.zeropage
  395. I/ApplicationPolicy( 4910): isApplicationExternalStorageWhitelisted:de.axelspringer.yana.zeropage user:0
  396. D/ApplicationPolicy( 4910): isApplicationExternalStorageWhitelisted: DO is not enabled on user 0. Allowed.
  397. D/ActivityManager( 4910): package de.axelspringer.yana.zeropage, user - 0 is SDcard whitelisted
  398. I/ApplicationPolicy( 4910): isApplicationExternalStorageBlacklisted:de.axelspringer.yana.zeropage user:0
  399. D/ApplicationPolicy( 4910): isApplicationExternalStorageBlacklisted: DO is not enabled on user 0. Allowed.
  400. I/ApplicationPolicy( 4910): isApplicationExternalStorageBlacklisted:de.axelspringer.yana.zeropage user:0
  401. D/ApplicationPolicy( 4910): isApplicationExternalStorageBlacklisted: DO is not enabled on user 0. Allowed.
  402. I/SurfaceFlinger( 4485): id=415 createSurf (5920x5920),2 flag=4, efaab18 Toast#0
  403. D/HidDeviceService( 5359): handleMessage(): msg.what=8
  404. D/HidDeviceService( 5359): unregisterAppUid(): uid=10107
  405. D/HidDeviceService( 5359): unregisterAppUid(): caller UID doesn't match user UID
  406. D/InputTransport( 4910): Input channel destroyed: fd=464
  407. D/InputTransport(18071): Input channel constructed: fd=74
  408. D/ViewRootImpl@e62f769[Toast](18071): setView = android.widget.LinearLayout{bbb85ee V.E...... ......I. 0,0-0,0} TM=true MM=false
  409. V/Toast (18071): Text: bLog in android.widget.Toast$TN@5baba8f
  410. D/ViewRootImpl@e62f769[Toast](18071): dispatchAttachedToWindow
  411. V/WindowManager( 4910): Relayout Window{efaab18 u0 Toast}: viewVisibility=0 req=1029x118 {(0,160)(wrapxwrap) gr=BOTTOM CENTER sim={adjust=pan} ty=TOAST fmt=TRANSLUCENT wanim=0x1030004
  412. V/WindowManager( 4910): fl=NOT_FOCUSABLE KEEP_SCREEN_ON WATCH_OUTSIDE_TOUCH HARDWARE_ACCELERATED naviIconColor=0}
  413. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  414. I/ActivityManager( 4910): Start proc 18896:de.axelspringer.yana.zeropage/u0a107 for broadcast de.axelspringer.yana.zeropage/de.axelspringer.yana.samsungstub.check.SamsungUpdateCheckAlarmReceiver
  415. I/SurfaceFlinger( 4485): id=416 createSurf (1029x118),1 flag=4, Toast[18071]#0
  416. D/ViewRootImpl@e62f769[Toast](18071): Relayout returned: old=[0,60][1440,2960] new=[205,2682][1234,2800] result=0x47 surface={valid=true 505273319424} changed=true
  417. D/mali_winsys(18071): EGLint new_window_surface(egl_winsys_display *, void *, EGLSurface, EGLConfig, egl_winsys_surface **, EGLBoolean) returns 0x3000
  418. D/OpenGLRenderer(18071): eglCreateWindowSurface = 0x75a4acb480, 0x75a4a30010
  419. E/Zygote (18896): isWhitelistProcess - Process is Whitelisted
  420. E/Zygote (18896): accessInfo : 1
  421. I/SELinux (18896): SELinux: seapp_context_lookup: seinfo=default, level=s0:c512,c768, pkgname=de.axelspringer.yana.zeropage
  422. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222502, SetElapsed=175557, nowELAPSED=170619
  423. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=170619
  424. D/SamsungAlarmManager( 4910): setExact Listener (T:2/F:0/AC:false) 20190116T222503 - CU:1000/CP:4910
  425. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222502, SetElapsed=175557, nowELAPSED=170619
  426. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=170619
  427. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=170622
  428. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=170623
  429. D/SamsungAlarmManager( 4910): setInexact Listener (T:2/F:0/AC:false) 20190116T222521 - CU:1000/CP:4910
  430. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=170623
  431. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222459, SetElapsed=173529, nowELAPSED=170623
  432. E/r.yana.zeropag(18896): Not starting debugger since process cannot load the jdwp agent.
  433. D/WindowManager( 4910): finishDrawingWindow: Window{efaab18 u0 Toast} mDrawState=DRAW_PENDING
  434. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  435. I/WindowManager( 4910): commitFinishDrawingLocked: mDrawState=READY_TO_SHOW Surface(name=Toast[18071])/@0x22fc530
  436. I/WindowManager( 4910): Cancelling animation restarting=true, leash=null, surface=Surface(name=efaab18 Toast)/@0xf8bc5a9, parent=Surface(name=WindowToken{e384857 android.os.Binder@bf30dd6})/@0x157ed6b, caller=com.android.server.wm.SurfaceAnimator.startAnimation:114 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731
  437. I/WindowManager( 4910): Reparenting to leash, surface=Surface(name=efaab18 Toast)/@0xf8bc5a9, caller=com.android.server.wm.SurfaceAnimator.startAnimation:122 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731
  438. I/SurfaceFlinger( 4485): id=417 createSurf (5920x5920),2 flag=4, Surface(name=efaab18 Toast)/@0xf8bc5a9 - animation-leash#0
  439. D/SurfaceControl( 4910): reparent is called, sc=Surface(name=efaab18 Toast)/@0xf8bc5a9, newParentHandle=android.os.BinderProxy@e72d72e, transaction=android.view.SurfaceControl$Transaction@9d2cf, caller=com.android.server.wm.SurfaceAnimator.createAnimationLeash:368 com.android.server.wm.SurfaceAnimator.startAnimation:122 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731 com.android.server.wm.WindowStateAnimator.applyEnterAnimationLocked:1587
  440. W/roid.apps.turb(18852): Unsupported class loader
  441. V/WindowManager( 4910): performShowLocked: mDrawState=HAS_DRAWN in Window{efaab18 u0 Toast}
  442. D/Layer ( 4485): [efaab18 Toast#0]::reparent oldParent:[WindowToken{e384857 android.os.Binder@bf30dd6}#0], newParent:[Surface(name=efaab18 Toast)/@0xf8bc5a9 - animation-leash#0]
  443. D/ViewRootImpl@e62f769[Toast](18071): MSG_RESIZED: frame=Rect(205, 2682 - 1234, 2800) ci=Rect(0, 0 - 0, 0) vi=Rect(0, 0 - 0, 0) or=1
  444. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  445. I/ActivityManager( 4910): DSS on for de.axelspringer.yana.zeropage and scale is 1.0
  446. D/GamePkgDataHelper( 4910): getGamePkgData(). rs.pedjaapps.alogcatroot.app
  447. I/Auth ( 6672): [ReflectiveChannelBinder] Successfully bound channel!
  448. I/System.out( 6672): (HTTPLog)-Static: isSBSettingEnabled false
  449. I/System.out( 6672): (HTTPLog)-Static: isSBSettingEnabled false
  450. D/DnsProxyListener( 4430): DNSDBG::dns addrinfo af 2
  451. W/WindowManager( 4910): removeWindowToken: Attempted to remove non-existing token: android.os.Binder@a53d375
  452. I/SurfaceFlinger( 4485): Display 0 HWC layers:
  453. I/SurfaceFlinger( 4485): type | handle | flag | format | source crop (l,t,r,b) | frame | name
  454. I/SurfaceFlinger( 4485): ------------+--------------+------+-----------+----------------------------+---------------------+------
  455. I/SurfaceFlinger( 4485): Device | 0x734a864060 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 2960.0 | 0 0 1440 2960 | com.android.systemui.infinity.InfinityWallpaperBrown[5629]#0
  456. I/SurfaceFlinger( 4485): Device | 0x734a864300 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 2687.0 | 0 273 1440 2960 | com.teslacoilsw.launcher/com.teslacoilsw.launcher.NovaLauncher[6772]#0
  457. I/SurfaceFlinger( 4485): Device | 0x7357030000 | 0002 | RGBA_8888 | 0.0 0.0 1440.0 261.0 | 0 0 1440 261 | rs.pedjaapps.alogcatroot.app/rs.pedj[...]alogcatroot.app.LogActivity[15145]#1
  458. I/SurfaceFlinger( 4485): Device | 0x734a863a40 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 120.0 | 0 207 1440 327 | DockedStackDivider[5404]#0
  459. I/SurfaceFlinger( 4485): Device | 0x734a864d80 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 261.0 | 0 0 1440 261 | DividerClose[5404]#0
  460. I/SurfaceFlinger( 4485): Device | 0x7357645440 | 0000 | RG
  461. I/SurfaceFlinger( 4485): BA_8888 | 0.0 0.0 30.0 2664.0 | 0 148 30 2812 | [6834]#3
  462. I/SurfaceFlinger( 4485): Device | 0x73576449c0 | 0000 | RGBA_8888 | 0.0 0.0 30.0 2664.0 | 1410 148 1440 2812 | [6834]#4
  463. I/SurfaceFlinger( 4485): Device | 0x7357646160 | 0000 | RGBA_8888 | 0.0 0.0 30.0 1398.0 | 0 82 30 1480 | [10500]#0
  464. I/SurfaceFlinger( 4485): Device | 0x7357647f20 | 0000 | RGBA_8888 | 0.0 0.0 52.0 37.0 | 0 2923 52 2960 | [10500]#1
  465. I/SurfaceFlinger( 4485): SolidColor | | 0000 | Unknown | 0.0 0.0 -1.0 -1.0 | 0 0 1440 2960 | Dim Layer for - mAboveAppWindowsContainers#0
  466. I/SurfaceFlinger( 4485): Client | 0x734a863dc0 | 0000 | RGBA_8888 | 5.0 0.0 1445.0 501.0 | 0 2459 1440 2960 | Application Error: james.dsp#0
  467. I/SurfaceFlinger( 4485): Client | 0x7357646b00 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 60.0 | 0 0 1440 60 | StatusBar[5404]#0
  468. I/SurfaceFlinger( 4485): Client | 0x734a8667c0 | 0000 | RGBA_8888 | 0.0 0.0 1029.0 118.0 | 205 2682 1234 2800 | Toast[18071]#1
  469. I/SurfaceFlinger( 4485): Client | 0x7357646400 | 0000 | RGBA_8888 | 0.0 0.0 1029.0 118.0 | 205 2682 1234 2800 | Toast[18071]#0
  470. I/SurfaceFlinger( 4485): Cli
  471. I/SurfaceFlinger( 4485): ent | 0x7357642340 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 410.0 | 0 2550 1440 2960 | NavbarGestureHandler[5404]#0
  472. I/SurfaceFlinger( 4485):
  473. D/SamsungAlarmManager( 4910): Cancel Alarm calling from uid:10106 pid :18852 / op:PendingIntent{97acceb: PendingIntentRecord{c7b0a48 com.google.android.apps.turbo broadcastIntent}}
  474. W/Conscrypt( 6672): Could not set socket write timeout: java.net.SocketException: Socket closed
  475. W/Conscrypt( 6672): at com.google.android.gms.org.conscrypt.Platform.setSocketWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  476. W/Conscrypt( 6672): at com.google.android.gms.org.conscrypt.ConscryptFileDescriptorSocket.setSoWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  477. D/ConnectivityManager_URSP(18896): Ursp sIsUrsp=false, sIsCheckUrsp=false, uid=10107
  478. D/Proxy (18896): urspP is null: 10107
  479. I/r.yana.zeropag(18896): The ClassLoaderContext is a special shared library.
  480. E/Watchdog( 4910): !@Sync 5 [2019-01-16 22:24:57.256] FD count : 542
  481. W/Conscrypt( 6672): Could not set socket write timeout: java.net.SocketException: Socket closed
  482. W/Conscrypt( 6672): at com.google.android.gms.org.conscrypt.Platform.setSocketWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  483. W/Conscrypt( 6672): at com.google.android.gms.org.conscrypt.ConscryptFileDescriptorSocket.setSoWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  484. I/WindowManager( 4910): reset, Reparenting to original parent, shouldDeferScheduleAnimation=false, destroyLeash=true, surface=Surface(name=39c37be Toast)/@0xb2313b1, parent=Surface(name=WindowToken{e384857 android.os.Binder@bf30dd6})/@0x157ed6b, parentNativeHandle=android.os.BinderProxy@81fee1a, caller=com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65
  485. D/SurfaceControl( 4910): reparent is called, sc=Surface(name=39c37be Toast)/@0xb2313b1, newParentHandle=android.os.BinderProxy@81fee1a, transaction=android.view.SurfaceControl$Transaction@6b41004, caller=com.android.server.wm.SurfaceAnimator.reset:317 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65 com.android.server.wm.-$$Lambda$LocalAnimationAdapter$X--EomqUvw4qy89IeeTFTH7aCMo.run:4
  486. D/SurfaceControl( 4910): destroy(case2), animation-leash is destroyed, sc=Surface(name=Surface(name=39c37be Toast)/@0xb2313b1 - animation-leash)/@0x630f283, transaction=android.view.SurfaceControl$Transaction@6b41004, caller=com.android.server.wm.SurfaceAnimator.reset:324 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65 com.android.server.wm.-$$Lambda$LocalAnimationAdapter$X--EomqUvw4qy89IeeTFTH7aCMo.run:4
  487. D/Layer ( 4485): [39c37be Toast#0]::reparent oldParent:[Surface(name=39c37be Toast)/@0xb2313b1 - animation-leash#0], newParent:[WindowToken{e384857 android.os.Binder@bf30dd6}#0]
  488. I/SurfaceFlinger( 4485): id=414 Removed Surface(name=39c37be Toast)/@0xb2313b1 - animation-leash#0 (1/96)
  489. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  490. I/WindowManager( 4910): Destroying surface Surface(name=Toast[18071])/@0xd4ae658 called by com.android.server.wm.WindowStateAnimator.destroySurface:1826 com.android.server.wm.WindowStateAnimator.destroySurfaceLocked:804 com.android.server.wm.WindowState.destroySurfaceUnchecked:3656 com.android.server.wm.RootWindowContainer.performSurfacePlacement:848 com.android.server.wm.WindowSurfacePlacer.performSurfacePlacementLoop:211 com.android.server.wm.WindowSurfacePlacer.performSurfacePlacement:159 com.android.server.wm.WindowSurfacePlacer.performSurfacePlacement:149 com.android.server.wm.WindowSurfacePlacer.lambda$new$0:122
  491. I/SurfaceFlinger( 4485): id=412 Removed Toast[18071]#1 (0/95)
  492. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  493. I/SurfaceFlinger( 4485): id=411 Removed 39c37be Toast#0 (0/94)
  494. I/SurfaceFlinger( 4485): Display 0 HWC layers:
  495. I/SurfaceFlinger( 4485): type | handle | flag | format | source crop (l,t,r,b) | frame | name
  496. I/SurfaceFlinger( 4485): ------------+--------------+------+-----------+----------------------------+---------------------+------
  497. I/SurfaceFlinger( 4485): Device | 0x734a864060 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 2960.0 | 0 0 1440 2960 | com.android.systemui.infinity.InfinityWallpaperBrown[5629]#0
  498. I/SurfaceFlinger( 4485): Device | 0x734a8643e0 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 2687.0 | 0 273 1440 2960 | com.teslacoilsw.launcher/com.teslacoilsw.launcher.NovaLauncher[6772]#0
  499. I/SurfaceFlinger( 4485): Device | 0x7357030000 | 0002 | RGBA_8888 | 0.0 0.0 1440.0 261.0 | 0 0 1440 261 | rs.pedjaapps.alogcatroot.app/rs.pedj[...]alogcatroot.app.LogActivity[15145]#1
  500. I/SurfaceFlinger( 4485): Device | 0x734a863a40 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 120.0 | 0 207 1440 327 | DockedStackDivider[5404]#0
  501. I/SurfaceFlinger( 4485): Device | 0x734a864d80 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 261.0 | 0 0 1440 261 | DividerClose[5404]#0
  502. I/SurfaceFlinger( 4485): Device | 0x7357645440 | 0000 | RG
  503. I/SurfaceFlinger( 4485): BA_8888 | 0.0 0.0 30.0 2664.0 | 0 148 30 2812 | [6834]#3
  504. I/SurfaceFlinger( 4485): Device | 0x73576449c0 | 0000 | RGBA_8888 | 0.0 0.0 30.0 2664.0 | 1410 148 1440 2812 | [6834]#4
  505. I/SurfaceFlinger( 4485): Device | 0x7357646160 | 0000 | RGBA_8888 | 0.0 0.0 30.0 1398.0 | 0 82 30 1480 | [10500]#0
  506. I/SurfaceFlinger( 4485): Device | 0x7357647f20 | 0000 | RGBA_8888 | 0.0 0.0 52.0 37.0 | 0 2923 52 2960 | [10500]#1
  507. I/SurfaceFlinger( 4485): SolidColor | | 0000 | Unknown | 0.0 0.0 -1.0 -1.0 | 0 0 1440 2960 | Dim Layer for - mAboveAppWindowsContainers#0
  508. I/SurfaceFlinger( 4485): Client | 0x734a863dc0 | 0000 | RGBA_8888 | 5.0 0.0 1445.0 501.0 | 0 2459 1440 2960 | Application Error: james.dsp#0
  509. I/SurfaceFlinger( 4485): Client | 0x7357646b00 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 60.0 | 0 0 1440 60 | StatusBar[5404]#0
  510. I/SurfaceFlinger( 4485): Client | 0x7357646400 | 0000 | RGBA_8888 | 0.0 0.0 1029.0 118.0 | 205 2682 1234 2800 | Toast[18071]#0
  511. I/SurfaceFlinger( 4485): Client | 0x7357642340 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 410.0 | 0 2550 1440 2960 | NavbarGestureHandler[54
  512. I/SurfaceFlinger( 4485): 04]#0
  513. I/SurfaceFlinger( 4485):
  514. I/Layer ( 4485): id=411 onRemoved 39c37be Toast#0
  515. I/Layer ( 4485): id=412 onRemoved Toast[18071]#1
  516. I/Layer ( 4485): id=414 onRemoved Surface(name=39c37be Toast)/@0xb2313b1 - animation-leash#0
  517. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672
  518. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672, networkInfo: [type: MOBILE[LTE], state: CONNECTED/CONNECTED, reason: (unspecified), extra: sp.koodo.com, failover: false, available: true, roaming: false]
  519. D/NetworkController.MobileSignalController(0/1)( 5404): onSignalStrengthsChanged signalStrength=SignalStrength: 2 99 -2 -200 -2 -200 -1 8 -103 -11 0 12 0 2147483647 2 11 -109 0x4000 P gsm|lte use_rsrp_and_rssnr_for_lte_level [-128, -118, -108, -98] [-115, -105, -95, -85] level=4
  520. D/NetworkController.MobileSignalController(0/1)( 5404): getMobileIconGroup(): 13
  521. D/NetworkController.MobileSignalController(0/1)( 5404): updateOYBMobileIconGroup(): 13
  522. W/DynamiteModule(18852): Local module descriptor class for com.google.android.gms.crash not found.
  523. I/WindowManager( 4910): reset, Reparenting to original parent, shouldDeferScheduleAnimation=false, destroyLeash=true, surface=Surface(name=efaab18 Toast)/@0xf8bc5a9, parent=Surface(name=WindowToken{e384857 android.os.Binder@bf30dd6})/@0x157ed6b, parentNativeHandle=android.os.BinderProxy@81fee1a, caller=com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65
  524. D/SurfaceControl( 4910): reparent is called, sc=Surface(name=efaab18 Toast)/@0xf8bc5a9, newParentHandle=android.os.BinderProxy@81fee1a, transaction=android.view.SurfaceControl$Transaction@9d2cf, caller=com.android.server.wm.SurfaceAnimator.reset:317 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65 com.android.server.wm.-$$Lambda$LocalAnimationAdapter$X--EomqUvw4qy89IeeTFTH7aCMo.run:4
  525. D/SurfaceControl( 4910): destroy(case2), animation-leash is destroyed, sc=Surface(name=Surface(name=efaab18 Toast)/@0xf8bc5a9 - animation-leash)/@0xd84045c, transaction=android.view.SurfaceControl$Transaction@9d2cf, caller=com.android.server.wm.SurfaceAnimator.reset:324 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65 com.android.server.wm.-$$Lambda$LocalAnimationAdapter$X--EomqUvw4qy89IeeTFTH7aCMo.run:4
  526. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  527. D/Layer ( 4485): [efaab18 Toast#0]::reparent oldParent:[Surface(name=efaab18 Toast)/@0xf8bc5a9 - animation-leash#0], newParent:[WindowToken{e384857 android.os.Binder@bf30dd6}#0]
  528. I/SurfaceFlinger( 4485): id=417 Removed Surface(name=efaab18 Toast)/@0xf8bc5a9 - animation-leash#0 (1/93)
  529. I/Layer ( 4485): id=417 onRemoved Surface(name=efaab18 Toast)/@0xf8bc5a9 - animation-leash#0
  530. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  531. I/FirebaseCrashApiImpl(18852): FirebaseCrashApiImpl created by ClassLoader ad[DexPathList[[zip file "/data/user_de/0/com.google.android.gms/app_chimera/m/0000000b/DynamiteModulesC.apk"],nativeLibraryDirectories=[/data/user_de/0/com.google.android.gms/app_chimera/m/0000000b/DynamiteModulesC.apk!/lib/arm64-v8a, /system/lib64]]]
  532. I/MultiDex(18896): VM with version 2.1.0 has multidex support
  533. I/MultiDex(18896): Installing application
  534. I/MultiDex(18896): VM has multidex support, MultiDex support library is disabled.
  535. I/System.out( 7148): (HTTPLog)-Static: isSBSettingEnabled false
  536. I/System.out( 7148): (HTTPLog)-Static: isSBSettingEnabled false
  537. D/InputReader( 4910): Input event(10): value=1 when=170.995273
  538. D/InputReader( 4910): Input event(10): value=1 when=170.995273
  539. I/InputReader( 4910): Touch event's action is 0x0 (deviceType=0) [pCnt=1, s=0.61 ] when=170.995273
  540. D/InputDispatcher( 4910): Inject motion (0): action=0x0, eventTime=170995273000, displayId=0
  541. I/InputDispatcher( 4910): Delivering touch to (6834): action: 0x4, displayId: 0, '4571efd', toolType: 1
  542. I/InputDispatcher( 4910): Delivering touch to (5404): action: 0x4, displayId: 0, 'c517271', toolType: 1
  543. I/InputDispatcher( 4910): Delivering touch to (18071): action: 0x4, displayId: 0, 'efaab18', toolType: 1
  544. I/InputDispatcher( 4910): Delivering touch to (5404): action: 0x4, displayId: 0, 'f5d42d0', toolType: 1
  545. I/clp-JNI ( 4910): CLP add process info start. (channel) 1517b33 Application Error: james.dsp (server) (pkg) AppWindowToken{3c92b10 token=Token{3ed53d3 ActivityRecord{28769c2 u0 com.teslacoilsw.launcher/.NovaLauncher t2}}} (action) 0
  546. I/clp-JNI ( 4910): CLP add process info end.
  547. I/InputDispatcher( 4910): Delivering touch to (4910): action: 0x0, displayId: 0, '1517b33', toolType: 1
  548. D/ViewRootImpl@c38ac97[dsp]( 4910): ViewPostIme pointer 0
  549. E/BufferQueueProducer( 4485): [Toast[18071]#0] disconnect: not connected (req=1)
  550. W/libEGL (18071): EGLNativeWindowType 0x75a4a30010 disconnect failed
  551. D/OpenGLRenderer(18071): eglDestroySurface = 0x75a4acb480, 0x75a4a30000
  552. D/ViewRootImpl@e62f769[Toast](18071): dispatchDetachedFromWindow
  553. D/ViewRootImpl@e62f769[Toast](18071): Surface release. android.view.ViewRootImpl.doDie:7931 android.view.ViewRootImpl.die:7899 android.view.WindowManagerGlobal.removeViewLocked:497 android.view.WindowManagerGlobal.removeView:435 android.view.WindowManagerImpl.removeViewImmediate:124 android.widget.Toast$TN.handleHide:1126 android.widget.Toast$TN$1.handleMessage:921 android.os.Handler.dispatchMessage:106
  554. I/DynamiteModule(18852): Considering local module com.google.android.gms.flags:2 and remote module com.google.android.gms.flags:3
  555. I/DynamiteModule(18852): Selected remote version of com.google.android.gms.flags, version >= 3
  556. V/WindowManager( 4910): Remove Window{efaab18 u0 Toast}: mSurfaceController=Surface(name=Toast[18071])/@0x22fc530 mAnimatingExit=false mRemoveOnExit=false mHasSurface=true surfaceShowing=true isAnimationSet=false app-animation=false mWillReplaceWindow=false inPendingTransaction=false mDisplayFrozen=false callers=com.android.server.wm.WindowState.removeIfPossible:2626 com.android.server.wm.WindowManagerService.removeWindow:1908 com.android.server.wm.Session.remove:253 android.view.IWindowSession$Stub.onTransact:261 com.android.server.wm.Session.onTransact:186 android.os.Binder.execTransact:739
  557. I/WindowManager( 4910): Cancelling animation restarting=true, leash=null, surface=Surface(name=efaab18 Toast)/@0xf8bc5a9, parent=Surface(name=WindowToken{e384857 android.os.Binder@bf30dd6})/@0x157ed6b, caller=com.android.server.wm.SurfaceAnimator.startAnimation:114 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731
  558. I/WindowManager( 4910): Reparenting to leash, surface=Surface(name=efaab18 Toast)/@0xf8bc5a9, caller=com.android.server.wm.SurfaceAnimator.startAnimation:122 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731
  559. I/SurfaceFlinger( 4485): id=418 createSurf (5920x5920),2 flag=4, Surface(name=efaab18 Toast)/@0xf8bc5a9 - animation-leash#0
  560. D/SurfaceControl( 4910): reparent is called, sc=Surface(name=efaab18 Toast)/@0xf8bc5a9, newParentHandle=android.os.BinderProxy@9846b19, transaction=android.view.SurfaceControl$Transaction@9d2cf, caller=com.android.server.wm.SurfaceAnimator.createAnimationLeash:368 com.android.server.wm.SurfaceAnimator.startAnimation:122 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731 com.android.server.wm.WindowState.removeIfPossible:2720
  561. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  562. D/Layer ( 4485): [efaab18 Toast#0]::reparent oldParent:[WindowToken{e384857 android.os.Binder@bf30dd6}#0], newParent:[Surface(name=efaab18 Toast)/@0xf8bc5a9 - animation-leash#0]
  563. D/InputTransport( 4910): Input channel destroyed: fd=430
  564. D/InputTransport(18071): Input channel destroyed: fd=74
  565. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  566. V/WindowManager( 4910): Remove Window{efaab18 u0 Toast EXITING}: mSurfaceController=Surface(name=Toast[18071])/@0x22fc530 mAnimatingExit=true mRemoveOnExit=true mHasSurface=true surfaceShowing=true isAnimationSet=true app-animation=false mWillReplaceWindow=false inPendingTransaction=false mDisplayFrozen=false callers=com.android.server.wm.WindowState.removeIfPossible:2626 com.android.server.wm.WindowToken.removeAllWindowsIfPossible:150 com.android.server.wm.WindowManagerService$LocalService.removeWindowToken:8264 com.android.server.notification.NotificationManagerService.finishTokenLocked:5909 com.android.server.notification.NotificationManagerService$12.finishToken:2509 android.app.INotificationManager$Stub.onTransact:117
  567. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  568. W/WindowManager( 4910): removeWindowToken: Attempted to remove non-existing token: android.os.Binder@bf30dd6
  569. I/NotificationService( 4910): cancelToast pkg=com.topjohnwu.magisk callback=android.app.ITransientNotification$Stub$Proxy@b6b0dbf
  570. W/WindowManager( 4910): removeWindowToken: Attempted to remove non-existing token: android.os.Binder@bf30dd6
  571. W/Conscrypt( 7148): Could not set socket write timeout: java.net.SocketException: Socket closed
  572. W/Conscrypt( 7148): at com.google.android.gms.org.conscrypt.Platform.setSocketWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  573. W/Conscrypt( 7148): at com.google.android.gms.org.conscrypt.ConscryptFileDescriptorSocket.setSoWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  574. I/ActivityManager( 4910): Killing 17033:com.samsung.android.stickercenter/1000 (adj 906): empty #31
  575. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  576. I/chatty ( 4910): uid=1000(system) ActivityManager identical 1 line
  577. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  578. W/DynamiteModule(18896): Local module descriptor class for com.google.firebase.auth not found.
  579. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  580. W/DynamiteModule(18852): Local module descriptor class for com.google.android.gms.crash not found.
  581. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  582. W/Conscrypt( 7148): Could not set socket write timeout: java.net.SocketException: Socket closed
  583. W/Conscrypt( 7148): at com.google.android.gms.org.conscrypt.Platform.setSocketWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  584. W/Conscrypt( 7148): at com.google.android.gms.org.conscrypt.ConscryptFileDescriptorSocket.setSoWriteTimeout(:com.google.android.gms@14799037@14.7.99 (100400-223214910):2)
  585. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  586. I/chatty ( 4910): uid=1000(system) ActivityManager identical 3 lines
  587. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  588. W/DynamiteModule(18896): Local module descriptor class for com.google.firebase.auth not found.
  589. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  590. D/InputReader( 4910): Input event(10): value=0 when=171.087315
  591. D/InputReader( 4910): Input event(10): value=0 when=171.087315
  592. I/InputReader( 4910): Touch event's action is 0x1 (deviceType=0) [pCnt=1, s=] when=171.087315
  593. D/InputDispatcher( 4910): Inject motion (0): action=0x1, eventTime=171087315000, displayId=0
  594. I/clp-JNI ( 4910): CLP add process info start. (channel) 1517b33 Application Error: james.dsp (server) (pkg) AppWindowToken{3c92b10 token=Token{3ed53d3 ActivityRecord{28769c2 u0 com.teslacoilsw.launcher/.NovaLauncher t2}}} (action) 1
  595. I/clp-JNI ( 4910): CLP add process info end.
  596. I/InputDispatcher( 4910): Delivering touch to (4910): action: 0x1, displayId: 0, '1517b33', toolType: 1
  597. D/ViewRootImpl@c38ac97[dsp]( 4910): ViewPostIme pointer 1
  598. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  599. W/ActivityManager( 4910): Force finishing activity james.dsp/.activity.DSPManager
  600. I/WindowManager( 4910): Cancelling animation restarting=false, leash=null, surface=Surface(name=AppWindowToken{a011207 token=Token{37f3046 ActivityRecord{58bf421 u0 james.dsp/.activity.DSPManager t323}}})/@0xe601fe7, parent=Surface(name=Task=323)/@0xc502794, caller=com.android.server.wm.SurfaceAnimator.cancelAnimation:177 com.android.server.wm.WindowContainer.cancelAnimation:1165 com.android.server.wm.AppWindowToken.cancelAnimation:2350 com.android.server.wm.AppWindowToken.onRemovedFromDisplay:776 com.android.server.wm.DisplayContent.removeAppToken:1040
  601. V/WindowManager( 4910): Remove Window{d2dd3a u0 james.dsp/james.dsp.activity.DSPManager}: mSurfaceController=null mAnimatingExit=false mRemoveOnExit=false mHasSurface=false surfaceShowing=false isAnimationSet=false app-animation=false mWillReplaceWindow=false inPendingTransaction=false mDisplayFrozen=false callers=com.android.server.wm.WindowState.removeIfPossible:2626 com.android.server.wm.WindowToken.removeAllWindowsIfPossible:150 com.android.server.wm.AppWindowToken.removeIfPossible:704 com.android.server.wm.AppWindowToken.onRemovedFromDisplay:780 com.android.server.wm.DisplayContent.removeAppToken:1040 com.android.server.wm.AppWindowContainerController.removeContainer:290
  602. E/BufferQueueProducer( 4485): [Application Error: james.dsp#0] disconnect: not connected (req=1)
  603. W/libEGL ( 4910): EGLNativeWindowType 0x757fce9010 disconnect failed
  604. D/OpenGLRenderer( 4910): eglDestroySurface = 0x7590f1d300, 0x757fce9000
  605. D/OpenGLRenderer( 4910): endAllActiveAnimators on 0x75749ca700 (RippleDrawable) with handle 0x756f778640
  606. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  607. D/ViewRootImpl@c38ac97[dsp]( 4910): dispatchDetachedFromWindow
  608. D/ViewRootImpl@c38ac97[dsp]( 4910): Surface release. android.view.ViewRootImpl.doDie:7931 android.view.ViewRootImpl.die:7899 android.view.WindowManagerGlobal.removeViewLocked:497 android.view.WindowManagerGlobal.removeView:435 android.view.WindowManagerImpl.removeViewImmediate:124 android.app.Dialog.dismissDialog:517 android.app.Dialog.dismiss:500 com.android.server.am.AppErrorDialog.dismiss:181
  609. I/SurfaceFlinger( 4485): id=395 Removed d2dd3a james.dsp/james.dsp.activity.DSPManager#0 (0/93)
  610. D/InputTransport( 4910): Input channel destroyed: fd=319
  611. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  612. V/WindowManager( 4910): Remove Window{1517b33 u0 Application Error: james.dsp}: mSurfaceController=Surface(name=Application Error: james.dsp)/@0x99a827f mAnimatingExit=false mRemoveOnExit=false mHasSurface=true surfaceShowing=true isAnimationSet=false app-animation=false mWillReplaceWindow=false inPendingTransaction=false mDisplayFrozen=false callers=com.android.server.wm.WindowState.removeIfPossible:2626 com.android.server.wm.WindowManagerService.removeWindow:1908 com.android.server.wm.Session.remove:253 android.view.ViewRootImpl.dispatchDetachedFromWindow:4511 android.view.ViewRootImpl.doDie:7931 android.view.ViewRootImpl.die:7899
  613. I/WindowManager( 4910): Cancelling animation restarting=true, leash=null, surface=Surface(name=1517b33 Application Error: james.dsp)/@0x91a0295, parent=Surface(name=WindowToken{f9012a2 android.view.ViewRootImpl$W@c38ac97})/@0x11aafaa, caller=com.android.server.wm.SurfaceAnimator.startAnimation:114 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731
  614. I/WindowManager( 4910): Reparenting to leash, surface=Surface(name=1517b33 Application Error: james.dsp)/@0x91a0295, caller=com.android.server.wm.SurfaceAnimator.startAnimation:122 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731
  615. I/SurfaceFlinger( 4485): id=419 createSurf (5920x5920),2 flag=4, Surface(name=1517b33 Application Error: james.dsp)/@0x91a0295 - animation-leash#0
  616. I/Layer ( 4485): id=395 onRemoved d2dd3a james.dsp/james.dsp.activity.DSPManager#0
  617. D/SurfaceControl( 4910): reparent is called, sc=Surface(name=1517b33 Application Error: james.dsp)/@0x91a0295, newParentHandle=android.os.BinderProxy@c0f6451, transaction=android.view.SurfaceControl$Transaction@30e6738, caller=com.android.server.wm.SurfaceAnimator.createAnimationLeash:368 com.android.server.wm.SurfaceAnimator.startAnimation:122 com.android.server.wm.WindowContainer.startAnimation:1157 com.android.server.wm.WindowState.startAnimation:5628 com.android.server.wm.WindowState.startAnimation:5611 com.android.server.wm.WindowStateAnimator.applyAnimationLocked:1731 com.android.server.wm.WindowState.removeIfPossible:2720
  618. D/StatusBarManagerService( 4910): notifyRequestedSystemKey recent=false home=false
  619. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  620. D/Navbar.SecNavigationBarView( 5404): notifyRequestedSystemKey requested = 0
  621. D/Navbar.ImmersiveController( 5404): handleEvent - HIDDEN, REQUESTED_SYSTEM_KEY_CHANGED
  622. D/Navbar.NavBarGestureDetector( 5404): setKeyInjectionInfos
  623. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  624. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  625. I/WindowManager( 4910): Cancelling animation restarting=true, leash=null, surface=Surface(name=Dim Layer for - mAboveAppWindowsContainers)/@0x4c1c76, parent=Surface(name=mAboveAppWindowsContainers)/@0x4b86a27, caller=com.android.server.wm.SurfaceAnimator.startAnimation:114 com.android.server.wm.-$$Lambda$yACUZqn1Ak-GL14-Nu3kHUSaLX0.startAnimation:0 com.android.server.wm.Dimmer.startAnim:399 com.android.server.wm.Dimmer.startDimExit:386 com.android.server.wm.Dimmer.updateDims:349
  626. I/WindowManager( 4910): Reparenting to leash, surface=Surface(name=Dim Layer for - mAboveAppWindowsContainers)/@0x4c1c76, caller=com.android.server.wm.SurfaceAnimator.startAnimation:122 com.android.server.wm.-$$Lambda$yACUZqn1Ak-GL14-Nu3kHUSaLX0.startAnimation:0 com.android.server.wm.Dimmer.startAnim:399 com.android.server.wm.Dimmer.startDimExit:386 com.android.server.wm.Dimmer.updateDims:349
  627. I/SurfaceFlinger( 4485): id=420 createSurf (5920x5920),2 flag=4, Surface(name=Dim Layer for - mAboveAppWindowsContainers)/@0x4c1c76 - animation-leash#0
  628. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10106, pid: 18852
  629. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10106, pid: 18852, networkInfo: [type: MOBILE[LTE], state: CONNECTED/CONNECTED, reason: (unspecified), extra: sp.koodo.com, failover: false, available: true, roaming: false]
  630. D/SurfaceControl( 4910): reparent is called, sc=Surface(name=Dim Layer for - mAboveAppWindowsContainers)/@0x4c1c76, newParentHandle=android.os.BinderProxy@5c6f5b7, transaction=android.view.SurfaceControl$Transaction@e09167d, caller=com.android.server.wm.SurfaceAnimator.createAnimationLeash:368 com.android.server.wm.SurfaceAnimator.startAnimation:122 com.android.server.wm.-$$Lambda$yACUZqn1Ak-GL14-Nu3kHUSaLX0.startAnimation:0 com.android.server.wm.Dimmer.startAnim:399 com.android.server.wm.Dimmer.startDimExit:386 com.android.server.wm.Dimmer.updateDims:349 com.android.server.wm.DisplayContent$NonAppWindowContainers.prepareSurfaces:4820
  631. D/Layer ( 4485): [1517b33 Application Error: james.dsp#0]::reparent oldParent:[WindowToken{f9012a2 android.view.ViewRootImpl$W@c38ac97}#0], newParent:[Surface(name=1517b33 Application Error: james.dsp)/@0x91a0295 - animation-leash#0]
  632. I/SurfaceFlinger( 4485): id=390 Removed AppWindowToken{a011207 token=Token{37f3046 ActivityRecord{58bf421 u0 james.dsp/.activity.DSPManager t323}}}#0 (0/94)
  633. D/InputDispatcher( 4910): Focus left window (4910): 1517b33 0
  634. D/InputDispatcher( 4910): Focus entered window (6772): 57843f5 0
  635. D/InputTransport( 4910): Input channel destroyed: fd=491
  636. D/InputTransport( 4910): Input channel destroyed: fd=492
  637. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  638. D/Layer ( 4485): [Dim Layer for - mAboveAppWindowsContainers#0]::reparent oldParent:[mAboveAppWindowsContainers#0], newParent:[Surface(name=Dim Layer for - mAboveAppWindowsContainers)/@0x4c1c76 - animation-leash#0]
  639. I/SurfaceFlinger( 4485): id=389 Removed Task=323#0 (1/93)
  640. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  641. I/SurfaceFlinger( 4485): id=388 Removed animation background stackId=14#0 (0/92)
  642. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  643. I/SurfaceFlinger( 4485): id=387 Removed Stack=14#0 (3/91)
  644. I/ActivityManager( 4910): Killing 18779:james.dsp/u0a35 (adj 0): crash
  645. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  646. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  647. I/Layer ( 4485): id=388 onRemoved animation background stackId=14#0
  648. I/Layer ( 4485): id=389 onRemoved Task=323#0
  649. I/Layer ( 4485): id=390 onRemoved AppWindowToken{a011207 token=Token{37f3046 ActivityRecord{58bf421 u0 james.dsp/.activity.DSPManager t323}}}#0
  650. I/Layer ( 4485): id=387 onRemoved Stack=14#0
  651. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  652. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8008
  653. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  654. D/WindowManager( 4910): setSystemUiVisibility: vis= 0x8708, fullscreenVis= 0x0, dockedVis= 0x0, win=Window{57843f5 u0 com.teslacoilsw.launcher/com.teslacoilsw.launcher.NovaLauncher}
  655. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8708
  656. D/InputManager-JNI( 4910): setSystemUiVisibility dexmode: false changed: true displayid: 0 visibility: 0x8708 DD: 0x8708 OD: 0x0
  657. V/APM_AudioPolicyManager( 4483): AudioPolicyManager:setRecordSilenced(uid:10035, silenced:1)
  658. D/ForegroundUtils( 5730): could not check pending caller
  659. D/ViewRootImpl@c853e0e[NovaLauncher]( 6772): MSG_WINDOW_FOCUS_CHANGED 1 1
  660. D/LightBarController( 5404): onNavigationVisibilityChanged : vis = 8708, nbModeChanged = false navigationBarMode = 4
  661. D/InputMethodManager( 6772): prepareNavigationBarInfo() DecorView@a77e02f[NovaLauncher]
  662. D/InputMethodManager( 6772): getNavigationBarColor() 0
  663. D/HidDeviceService( 5359): handleMessage(): msg.what=8
  664. D/HidDeviceService( 5359): unregisterAppUid(): uid=10035
  665. D/HidDeviceService( 5359): unregisterAppUid(): caller UID doesn't match user UID
  666. E/ViewRootImpl( 4910): sendUserActionEvent() returned.
  667. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  668. D/InputMethodManagerService( 4910): startInputOrWindowGainedFocus : windowGainedFocus
  669. D/InputMethodManagerService( 4910): windowGainedFocus: destinationUserId (getCallingUid) = 0
  670. D/InputMethodManagerService( 4910): windowGainedFocus: currentUserId=0
  671. D/InputMethodManagerService( 4910): windowGainedFocus: mCurrentFocusedUserId=0
  672. D/InputMethodManagerService( 4910): windowGainedFocus : lock - currentUserId = 0 destinationUserId = 0
  673. D/InputMethodManagerService( 4910): windowGainedFocus : mCurrentFocusedUserId - 0 and mSecureKeypadEnabled - false, userSwitched - false
  674. W/InputMethodManagerService( 4910): Window already focused, ignoring focus gain of: com.android.internal.view.IInputMethodClient$Stub$Proxy@e14f48d attribute=null, token = android.os.BinderProxy@d595d2c
  675. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  676. I/chatty ( 4910): uid=1000(system) ActivityManager identical 1 line
  677. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  678. D/NetworkSecurityConfig(18896): No Network Security Config specified, using platform default
  679. W/ActivityManager( 4910): setHasOverlayUi called on unknown pid: 18779
  680. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  681. I/Zygote ( 4432): Process 18779 exited due to signal (9)
  682. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  683. I/chatty ( 4910): uid=1000(system) ActivityManager identical 5 lines
  684. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  685. I/SurfaceFlinger( 4485): Display 0 HWC layers:
  686. I/SurfaceFlinger( 4485): type | handle | flag | format | source crop (l,t,r,b) | frame | name
  687. I/SurfaceFlinger( 4485): ------------+--------------+------+-----------+----------------------------+---------------------+------
  688. I/SurfaceFlinger( 4485): Device | 0x734a864060 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 2960.0 | 0 0 1440 2960 | com.android.systemui.infinity.InfinityWallpaperBrown[5629]#0
  689. I/SurfaceFlinger( 4485): Device | 0x734a8643e0 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 2687.0 | 0 273 1440 2960 | com.teslacoilsw.launcher/com.teslacoilsw.launcher.NovaLauncher[6772]#0
  690. I/SurfaceFlinger( 4485): Device | 0x7357646cc0 | 0002 | RGBA_8888 | 0.0 0.0 1440.0 261.0 | 0 0 1440 261 | rs.pedjaapps.alogcatroot.app/rs.pedj[...]alogcatroot.app.LogActivity[15145]#1
  691. I/SurfaceFlinger( 4485): Device | 0x734a863a40 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 120.0 | 0 207 1440 327 | DockedStackDivider[5404]#0
  692. I/SurfaceFlinger( 4485): Device | 0x734a864d80 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 261.0 | 0 0 1440 261 | DividerClose[5404]#0
  693. I/SurfaceFlinger( 4485): Device | 0x7357645440 | 0000 | RG
  694. I/SurfaceFlinger( 4485): BA_8888 | 0.0 0.0 30.0 2664.0 | 0 148 30 2812 | [6834]#3
  695. I/SurfaceFlinger( 4485): Device | 0x73576449c0 | 0000 | RGBA_8888 | 0.0 0.0 30.0 2664.0 | 1410 148 1440 2812 | [6834]#4
  696. I/SurfaceFlinger( 4485): Device | 0x7357646160 | 0000 | RGBA_8888 | 0.0 0.0 30.0 1398.0 | 0 82 30 1480 | [10500]#0
  697. I/SurfaceFlinger( 4485): Device | 0x7357647f20 | 0000 | RGBA_8888 | 0.0 0.0 52.0 37.0 | 0 2923 52 2960 | [10500]#1
  698. I/SurfaceFlinger( 4485): SolidColor | | 0000 | Unknown | 0.0 0.0 -1.0 -1.0 | 0 0 1440 2960 | Dim Layer for - mAboveAppWindowsContainers#0
  699. I/SurfaceFlinger( 4485): Device | 0x7357646b00 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 60.0 | 0 0 1440 60 | StatusBar[5404]#0
  700. I/SurfaceFlinger( 4485): Client | 0x7357646400 | 0000 | RGBA_8888 | 0.0 0.0 1029.0 118.0 | 205 2682 1234 2800 | Toast[18071]#0
  701. I/SurfaceFlinger( 4485): Client | 0x7357642340 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 410.0 | 0 2550 1440 2960 | NavbarGestureHandler[5404]#0
  702. I/SurfaceFlinger( 4485):
  703. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672
  704. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672, networkInfo: [type: MOBILE[LTE], state: CONNECTED/CONNECTED, reason: (unspecified), extra: sp.koodo.com, failover: false, available: true, roaming: false]
  705. D/SamsungAlarmManager( 4910): Cancel Alarm calling from uid:10043 pid :6672 / op:PendingIntent{8459b90: PendingIntentRecord{d221357 com.google.android.gms broadcastIntent}}
  706. I/FirebaseCrashApiImpl(18852): FirebaseCrash reporting API initialized
  707. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=171195
  708. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=171195
  709. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  710. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  711. I/FIAM.Headless(18896): Starting InAppMessaging runtime with Instance ID d3Apra6MdBQ
  712. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  713. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  714. I/FirebaseAuth(18896): [FirebaseAuth:] Loading module via FirebaseOptions.
  715. I/FirebaseAuth(18896): [FirebaseAuth:] Preparing to create service connection to gms implementation
  716. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  717. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  718. D/ApplicationPolicy( 4910): isStatusBarNotificationAllowedAsUser: packageName = com.sec.android.app.shealth,userId = 0
  719. D/API test( 4910): getContainerInfo: value is
  720. D/ApplicationPolicy( 4910): isStatusBarNotificationAllowedAsUser: packageName = com.sec.android.app.shealth,userId = 0
  721. D/API test( 4910): getContainerInfo: value is
  722. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  723. D/SamsungAlarmManager( 4910): setInexact Intent (T:2/F:0/AC:false) 20190116T222540 - CU:10043/CP:6672
  724. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=171234
  725. I/VacuumService( 6672): Vacuum at: now=1547695497704 tag=VacuumService
  726. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=171234
  727. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  728. I/chatty ( 4910): uid=1000(system) ActivityManager identical 2 lines
  729. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  730. W/Settings(18896): Setting airplane_mode_on has moved from android.provider.Settings.System to android.provider.Settings.Global, returning read-only value.
  731. W/libprocessgroup( 4910): kill(-17033, 9) failed: No such process
  732. E/libprocessgroup( 4910): Failed to kill process cgroup uid 1000 pid 17033 in 232ms, 1 processes remain
  733. W/libprocessgroup( 4910): kill(-18779, 9) failed: No such process
  734. I/libprocessgroup( 4910): Successfully killed process cgroup uid 10035 pid 18779 in 0ms
  735. I/CocktailBarManagerServiceImpl( 4910): updateCocktail : no active host
  736. I/WindowManager( 4910): reset, Reparenting to original parent, shouldDeferScheduleAnimation=false, destroyLeash=true, surface=Surface(name=efaab18 Toast)/@0xf8bc5a9, parent=Surface(name=WindowToken{e384857 android.os.Binder@bf30dd6})/@0x157ed6b, parentNativeHandle=android.os.BinderProxy@81fee1a, caller=com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65
  737. D/SurfaceControl( 4910): reparent is called, sc=Surface(name=efaab18 Toast)/@0xf8bc5a9, newParentHandle=android.os.BinderProxy@81fee1a, transaction=android.view.SurfaceControl$Transaction@9d2cf, caller=com.android.server.wm.SurfaceAnimator.reset:317 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65 com.android.server.wm.-$$Lambda$LocalAnimationAdapter$X--EomqUvw4qy89IeeTFTH7aCMo.run:4
  738. D/SurfaceControl( 4910): destroy(case2), animation-leash is destroyed, sc=Surface(name=Surface(name=efaab18 Toast)/@0xf8bc5a9 - animation-leash)/@0x45967de, transaction=android.view.SurfaceControl$Transaction@9d2cf, caller=com.android.server.wm.SurfaceAnimator.reset:324 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65 com.android.server.wm.-$$Lambda$LocalAnimationAdapter$X--EomqUvw4qy89IeeTFTH7aCMo.run:4
  739. I/WindowManager( 4910): reset, Reparenting to original parent, shouldDeferScheduleAnimation=false, destroyLeash=true, surface=Surface(name=1517b33 Application Error: james.dsp)/@0x91a0295, parent=Surface(name=WindowToken{f9012a2 android.view.ViewRootImpl$W@c38ac97})/@0x11aafaa, parentNativeHandle=android.os.BinderProxy@13ae550, caller=com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65
  740. D/SurfaceControl( 4910): reparent is called, sc=Surface(name=1517b33 Application Error: james.dsp)/@0x91a0295, newParentHandle=android.os.BinderProxy@13ae550, transaction=android.view.SurfaceControl$Transaction@30e6738, caller=com.android.server.wm.SurfaceAnimator.reset:317 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65 com.android.server.wm.-$$Lambda$LocalAnimationAdapter$X--EomqUvw4qy89IeeTFTH7aCMo.run:4
  741. D/SurfaceControl( 4910): destroy(case2), animation-leash is destroyed, sc=Surface(name=Surface(name=1517b33 Application Error: james.dsp)/@0x91a0295 - animation-leash)/@0xac494b6, transaction=android.view.SurfaceControl$Transaction@30e6738, caller=com.android.server.wm.SurfaceAnimator.reset:324 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65 com.android.server.wm.-$$Lambda$LocalAnimationAdapter$X--EomqUvw4qy89IeeTFTH7aCMo.run:4
  742. I/WindowManager( 4910): reset, Reparenting to original parent, shouldDeferScheduleAnimation=false, destroyLeash=true, surface=Surface(name=Dim Layer for - mAboveAppWindowsContainers)/@0x4c1c76, parent=Surface(name=mAboveAppWindowsContainers)/@0x4b86a27, parentNativeHandle=android.os.BinderProxy@81bb05, caller=com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65
  743. D/SurfaceControl( 4910): reparent is called, sc=Surface(name=Dim Layer for - mAboveAppWindowsContainers)/@0x4c1c76, newParentHandle=android.os.BinderProxy@81bb05, transaction=android.view.SurfaceControl$Transaction@e09167d, caller=com.android.server.wm.SurfaceAnimator.reset:317 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65 com.android.server.wm.-$$Lambda$LocalAnimationAdapter$X--EomqUvw4qy89IeeTFTH7aCMo.run:4
  744. D/SurfaceControl( 4910): destroy(case2), animation-leash is destroyed, sc=Surface(name=Surface(name=Dim Layer for - mAboveAppWindowsContainers)/@0x4c1c76 - animation-leash)/@0x71e9124, transaction=android.view.SurfaceControl$Transaction@e09167d, caller=com.android.server.wm.SurfaceAnimator.reset:324 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$0:89 com.android.server.wm.-$$Lambda$SurfaceAnimator$SIBia0mND666K8lMCPsoid8pUTI.run:4 com.android.server.wm.SurfaceAnimator.lambda$getFinishedCallback$1:96 com.android.server.wm.-$$Lambda$SurfaceAnimator$vdRZk66hQVbQCvVXEaQCT1kVmFc.onAnimationFinished:4 com.android.server.wm.LocalAnimationAdapter.lambda$startAnimation$0:65 com.android.server.wm.-$$Lambda$LocalAnimationAdapter$X--EomqUvw4qy89IeeTFTH7aCMo.run:4
  745. I/SurfaceFlinger( 4485): id=400 Removed Dim Layer for - mAboveAppWindowsContainers#0 (0/90)
  746. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672
  747. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10043, pid: 6672, networkInfo: [type: MOBILE[LTE], state: CONNECTED/CONNECTED, reason: (unspecified), extra: sp.koodo.com, failover: false, available: true, roaming: false]
  748. D/SamsungAlarmManager( 4910): Cancel Alarm calling from uid:10043 pid :6672 / op:PendingIntent{9c169f9: PendingIntentRecord{d221357 com.google.android.gms broadcastIntent}}
  749. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=171274
  750. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=171274
  751. D/FirebaseApp(18896): com.google.firebase.crash.FirebaseCrash is not linked. Skipping initialization.
  752. I/FirebaseInitProvider(18896): FirebaseApp initialization successful
  753. I/Layer ( 4485): id=400 onRemoved Dim Layer for - mAboveAppWindowsContainers#0
  754. D/Layer ( 4485): [1517b33 Application Error: james.dsp#0]::reparent oldParent:[Surface(name=1517b33 Application Error: james.dsp)/@0x91a0295 - animation-leash#0], newParent:[WindowToken{f9012a2 android.view.ViewRootImpl$W@c38ac97}#0]
  755. D/Layer ( 4485): [efaab18 Toast#0]::reparent oldParent:[Surface(name=efaab18 Toast)/@0xf8bc5a9 - animation-leash#0], newParent:[WindowToken{e384857 android.os.Binder@bf30dd6}#0]
  756. W/SurfaceFlinger( 4485): Attempting to set client state on removed layer: Dim Layer for - mAboveAppWindowsContainers#0
  757. I/SurfaceFlinger( 4485): id=418 Removed Surface(name=efaab18 Toast)/@0xf8bc5a9 - animation-leash#0 (1/89)
  758. I/SurfaceFlinger( 4485): id=419 Removed Surface(name=1517b33 Application Error: james.dsp)/@0x91a0295 - animation-leash#0 (1/88)
  759. W/SurfaceFlinger( 4485): Attempting to destroy on removed layer: Dim Layer for - mAboveAppWindowsContainers#0
  760. I/SurfaceFlinger( 4485): id=420 Removed Surface(name=Dim Layer for - mAboveAppWindowsContainers)/@0x4c1c76 - animation-leash#0 (0/87)
  761. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8708
  762. I/SurfaceFlinger( 4485): Display 0 HWC layers:
  763. I/SurfaceFlinger( 4485): type | handle | flag | format | source crop (l,t,r,b) | frame | name
  764. I/SurfaceFlinger( 4485): ------------+--------------+------+-----------+----------------------------+---------------------+------
  765. I/SurfaceFlinger( 4485): Device | 0x734a864060 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 2960.0 | 0 0 1440 2960 | com.android.systemui.infinity.InfinityWallpaperBrown[5629]#0
  766. I/SurfaceFlinger( 4485): Device | 0x734a8643e0 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 2687.0 | 0 273 1440 2960 | com.teslacoilsw.launcher/com.teslacoilsw.launcher.NovaLauncher[6772]#0
  767. I/SurfaceFlinger( 4485): Device | 0x7357646cc0 | 0002 | RGBA_8888 | 0.0 0.0 1440.0 261.0 | 0 0 1440 261 | rs.pedjaapps.alogcatroot.app/rs.pedj[...]alogcatroot.app.LogActivity[15145]#1
  768. I/SurfaceFlinger( 4485): Device | 0x734a863a40 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 120.0 | 0 207 1440 327 | DockedStackDivider[5404]#0
  769. I/SurfaceFlinger( 4485): Device | 0x734a864d80 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 261.0 | 0 0 1440 261 | DividerClose[5404]#0
  770. I/SurfaceFlinger( 4485): Device | 0x7357645440 | 0000 | RG
  771. I/SurfaceFlinger( 4485): BA_8888 | 0.0 0.0 30.0 2664.0 | 0 148 30 2812 | [6834]#3
  772. I/SurfaceFlinger( 4485): Device | 0x73576449c0 | 0000 | RGBA_8888 | 0.0 0.0 30.0 2664.0 | 1410 148 1440 2812 | [6834]#4
  773. I/SurfaceFlinger( 4485): Device | 0x7357646160 | 0000 | RGBA_8888 | 0.0 0.0 30.0 1398.0 | 0 82 30 1480 | [10500]#0
  774. I/SurfaceFlinger( 4485): Device | 0x7357647f20 | 0000 | RGBA_8888 | 0.0 0.0 52.0 37.0 | 0 2923 52 2960 | [10500]#1
  775. I/SurfaceFlinger( 4485): Device | 0x7357646b00 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 60.0 | 0 0 1440 60 | StatusBar[5404]#0
  776. I/SurfaceFlinger( 4485): Device | 0x7357642340 | 0000 | RGBA_8888 | 0.0 0.0 1440.0 410.0 | 0 2550 1440 2960 | NavbarGestureHandler[5404]#0
  777. I/SurfaceFlinger( 4485):
  778. I/WindowManager( 4910): Destroying surface Surface(name=Application Error: james.dsp)/@0x99a827f called by com.android.server.wm.WindowStateAnimator.destroySurface:1826 com.android.server.wm.WindowStateAnimator.destroySurfaceLocked:804 com.android.server.wm.WindowState.destroySurfaceUnchecked:3656 com.android.server.wm.RootWindowContainer.performSurfacePlacement:848 com.android.server.wm.WindowSurfacePlacer.performSurfacePlacementLoop:211 com.android.server.wm.WindowSurfacePlacer.performSurfacePlacement:159 com.android.server.wm.WindowSurfacePlacer.performSurfacePlacement:149 com.android.server.wm.WindowSurfacePlacer.lambda$new$0:122
  779. I/SurfaceFlinger( 4485): id=398 Removed Application Error: james.dsp#0 (0/86)
  780. I/WindowManager( 4910): Destroying surface Surface(name=Toast[18071])/@0x22fc530 called by com.android.server.wm.WindowStateAnimator.destroySurface:1826 com.android.server.wm.WindowStateAnimator.destroySurfaceLocked:804 com.android.server.wm.WindowState.destroySurfaceUnchecked:3656 com.android.server.wm.RootWindowContainer.performSurfacePlacement:848 com.android.server.wm.WindowSurfacePlacer.performSurfacePlacementLoop:211 com.android.server.wm.WindowSurfacePlacer.performSurfacePlacement:159 com.android.server.wm.WindowSurfacePlacer.performSurfacePlacement:149 com.android.server.wm.WindowSurfacePlacer.lambda$new$0:122
  781. I/SurfaceFlinger( 4485): id=416 Removed Toast[18071]#0 (0/85)
  782. D/PowerManagerService( 4910): [api] release WakeLock SCREEN_BRIGHT_WAKE_LOCK 'WindowManager' ON_AFTER_RELEASE ACQ=-1s686ms (uid=1000 pid=4910 ws=WorkSource{10194}) (0x0)
  783. D/EdgeLightingManager( 4910): hideForWakeLock packageName=android
  784. D/EdgeLightingManager( 4910): isCallingUserSupported : callingUserId=0, mUserId=0, isDualAppId=false
  785. D/EdgeLightingClientManager( 4910): isAvailableEdgeLighting: condition=2 mCondition=3 mIsConnected=false0
  786. D/EdgeLightingManager( 4910): hideForWakeLockInternal : return false by isAcceptableApplication.
  787. D/PowerManagerService( 4910): [api] applyWakeLockFlagsOnReleaseLocked : userActivityNoUpdateLocked is called : SCREEN_BRIGHT_WAKE_LOCK 'WindowManager' ON_AFTER_RELEASE (uid=1000 pid=4910 ws=WorkSource{10194})
  788. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8708
  789. I/SurfaceFlinger( 4485): id=406 Removed WindowToken{e384857 android.os.Binder@bf30dd6}#0 (15/84)
  790. I/SurfaceFlinger( 4485): id=396 Removed WindowToken{f9012a2 android.view.ViewRootImpl$W@c38ac97}#0 (11/82)
  791. W/SurfaceFlinger( 4485): Attempting to destroy on removed layer: 1517b33 Application Error: james.dsp#0
  792. W/SurfaceFlinger( 4485): Attempting to destroy on removed layer: efaab18 Toast#0
  793. I/Layer ( 4485): id=416 onRemoved Toast[18071]#0
  794. I/Layer ( 4485): id=418 onRemoved Surface(name=efaab18 Toast)/@0xf8bc5a9 - animation-leash#0
  795. I/Layer ( 4485): id=406 onRemoved WindowToken{e384857 android.os.Binder@bf30dd6}#0
  796. I/Layer ( 4485): id=415 onRemoved efaab18 Toast#0
  797. I/Layer ( 4485): id=396 onRemoved WindowToken{f9012a2 android.view.ViewRootImpl$W@c38ac97}#0
  798. I/Layer ( 4485): id=397 onRemoved 1517b33 Application Error: james.dsp#0
  799. I/Layer ( 4485): id=420 onRemoved Surface(name=Dim Layer for - mAboveAppWindowsContainers)/@0x4c1c76 - animation-leash#0
  800. I/Layer ( 4485): id=398 onRemoved Application Error: james.dsp#0
  801. I/Layer ( 4485): id=419 onRemoved Surface(name=1517b33 Application Error: james.dsp)/@0x91a0295 - animation-leash#0
  802. I/ActivityManager( 4910): Killing 17013:com.samsung.android.provider.stickerprovider/u0a96 (adj 906): empty #31
  803. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  804. D/SamsungAlarmManager( 4910): setInexact Intent (T:2/F:0/AC:false) 20190116T222540 - CU:10043/CP:6672
  805. I/SamsungAlarmManager( 4910): setLocked to kernel - T:2 / 20190116T222503, SetElapsed=176650, nowELAPSED=171311
  806. I/SamsungAlarmManager( 4910): setLocked to kernel - T:3 / 20190116T222500, SetElapsed=173529, nowELAPSED=171311
  807. I/chatty ( 4910): uid=1000(system) ActivityManager identical 1 line
  808. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  809. I/FA (18852): App measurement is starting up, version: 12662
  810. I/FA (18852): To enable debug logging run: adb shell setprop log.tag.FA VERBOSE
  811. I/FA (18852): To enable faster debug mode event logging run:
  812. I/FA (18852): adb shell setprop debug.firebase.analytics.app com.google.android.apps.turbo
  813. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  814. I/EdgeLightingManager( 4910): Alert once notification.
  815. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  816. D/Notification.Badge( 6807): [invalid] onNotificationPosted : StatusBarNotification(pkg=com.sec.android.app.shealth user=UserHandle{0} id=105 tag=null key=0|com.sec.android.app.shealth|105|null|10245: Notification(channel=base.notification.channel.1.step pri=2 contentView=null vibrate=null sound=null defaults=0x0 flags=0x6a color=0x00000000 vis=PRIVATE semFlags=0x0 semPriority=0 semMissedCount=0))
  817. W/SANotification4O( 7624): NotificationListener.onNotificationPosted : isSocketAvailable - false
  818. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  819. D/StorageManagerService( 4910): getExternalStorageMountMode : 3
  820. D/StorageManagerService( 4910): getExternalStorageMountMode : 3
  821. D/StorageManagerService( 4910): getExternalStorageMountMode : final mountMode=3, uid : 10043, packageName : com.google.android.gms
  822. I/chatty ( 4910): uid=1000(system) ActivityManager identical 2 lines
  823. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  824. I/ApplicationPolicy( 4910): isApplicationExternalStorageWhitelisted:com.google.android.gms user:0
  825. D/ApplicationPolicy( 4910): isApplicationExternalStorageWhitelisted: DO is not enabled on user 0. Allowed.
  826. D/ActivityManager( 4910): package com.google.android.gms, user - 0 is SDcard whitelisted
  827. I/ApplicationPolicy( 4910): isApplicationExternalStorageBlacklisted:com.google.android.gms user:0
  828. D/ApplicationPolicy( 4910): isApplicationExternalStorageBlacklisted: DO is not enabled on user 0. Allowed.
  829. I/ApplicationPolicy( 4910): isApplicationExternalStorageBlacklisted:com.google.android.gms user:0
  830. D/ApplicationPolicy( 4910): isApplicationExternalStorageBlacklisted: DO is not enabled on user 0. Allowed.
  831. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  832. I/ActivityManager( 4910): Start proc 18943:com.google.android.gms.unstable/u0a43 for service com.google.android.gms/.droidguard.DroidGuardService
  833. I/chatty ( 4910): uid=1000(system) ActivityManager identical 2 lines
  834. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  835. I/Magisk ( 4331): proc_monitor: com.google.android.gms/.droidguard.DroidGuardService PID=[18943] ns=[4026534333]
  836. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  837. I/chatty ( 4910): uid=1000(system) ActivityManager identical 2 lines
  838. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  839. W/ng.android.loo(17819): resources.arsc in APK '/data/app/com.maxmpz.audioplayer-6Zr_GC3wutHhphxTgkcRzQ==/base.apk' is compressed.
  840. D/ApplicationPolicy( 4910): isStatusBarNotificationAllowedAsUser: packageName = com.sec.android.app.shealth,userId = 0
  841. D/API test( 4910): getContainerInfo: value is
  842. D/ApplicationPolicy( 4910): isStatusBarNotificationAllowedAsUser: packageName = com.sec.android.app.shealth,userId = 0
  843. D/API test( 4910): getContainerInfo: value is
  844. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  845. I/CocktailBarManagerServiceImpl( 4910): updateCocktail : no active host
  846. W/ActivityManager( 4910): Scheduling restart of crashed service com.samsung.android.stickercenter/.StickerCenterService in 26114ms
  847. I/chatty ( 4910): uid=1000(system) ActivityManager identical 2 lines
  848. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  849. I/Zygote ( 4431): Process 17033 exited due to signal (9)
  850. D/ForegroundUtils( 5730): could not check pending caller
  851. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8708
  852. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  853. I/chatty ( 4910): uid=1000(system) ActivityManager identical 9 lines
  854. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  855. I/ControllerEventHandler( 7721): [#CMH#] nonJustShotRunningPossible pendingCount 0
  856. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  857. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  858. V/ServiceDisposer(18896): Register RemoteConfigService
  859. I/EdgeLightingManager( 4910): Alert once notification.
  860. I/droid.messagin(18688): Waiting for a blocking GC ProfileSaver
  861. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  862. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  863. W/SANotification4O( 7624): NotificationListener.onNotificationPosted : isSocketAvailable - false
  864. D/Notification.Badge( 6807): [invalid] onNotificationPosted : StatusBarNotification(pkg=com.sec.android.app.shealth user=UserHandle{0} id=105 tag=null key=0|com.sec.android.app.shealth|105|null|10245: Notification(channel=base.notification.channel.1.step pri=2 contentView=null vibrate=null sound=null defaults=0x0 flags=0x6a color=0x00000000 vis=PRIVATE semFlags=0x0 semPriority=0 semMissedCount=0))
  865. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  866. I/ControllerEventHandler( 7721): [#CMH#] nonJustShotRunningPossible pendingCount 0
  867. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  868. I/chatty ( 4910): uid=1000(system) ActivityManager identical 2 lines
  869. W/libprocessgroup( 4910): kill(-17013, 9) failed: No such process
  870. E/libprocessgroup( 4910): Failed to kill process cgroup uid 10096 pid 17013 in 231ms, 1 processes remain
  871. D/TspStateManagerInternal( 4910): update cmd=set_grip_data,1,40,10,10,0
  872. D/SamsungAlarmManager( 4910): Cancel Alarm calling from uid:10107 pid :18896 / op:PendingIntent{4836d1c: PendingIntentRecord{6dc2d25 de.axelspringer.yana.zeropage broadcastIntent}}
  873. W/ng.android.loo(17819): resources.arsc in APK '/data/app/com.mastercard.paywithrewards-tDdnRkHnPoF6KJtZxiiuFQ==/base.apk' is compressed.
  874. I/Zygote ( 4431): Process 17013 exited due to signal (9)
  875. D/ForegroundUtils( 5730): could not check pending caller
  876. D/SamsungPhoneWindowManager( 4910): adjustSystemUiVisibilityLw: vis=0x8708
  877. I/droid.messagin(18688): WaitForGcToComplete blocked ProfileSaver on ClassLinker for 250.031ms
  878. D/HidDeviceService( 5359): handleMessage(): msg.what=8
  879. D/HidDeviceService( 5359): unregisterAppUid(): uid=10096
  880. D/HidDeviceService( 5359): unregisterAppUid(): caller UID doesn't match user UID
  881. W/ng.android.loo(17819): resources.arsc in APK '/data/app/org.mozilla.testpilot.notes-BjQ3tjMHGKNQSwEKXEIHJw==/base.apk' is compressed.
  882. E/Zygote (18943): isWhitelistProcess - Process is Whitelisted
  883. E/audit ( 4259): type=1400 audit(1547695498.334:34355): avc: denied { create } for pid=18943 comm="main" name="cgroup.procs" scontext=u:r:zygote:s0 tcontext=u:object_r:cgroup:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  884. E/audit ( 4259): type=1300 audit(1547695498.334:34355): arch=c00000b7 syscall=56 success=yes exit=45 a0=ffffff9c a1=75b2a74130 a2=88241 a3=1b6 items=0 ppid=4431 pid=18943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:zygote:s0 key=(null)
  885. E/Zygote (18943): accessInfo : 1
  886. E/audit ( 4259): type=1327 audit(1547695498.334:34355): proctitle="zygote64"
  887. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  888. W/ContextImpl( 4910): Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:1067 com.android.server.SEDenialService$AuditFileObserver.onEvent:78 android.os.FileObserver$ObserverThread.onEvent:123 android.os.FileObserver$ObserverThread.observe:-2 android.os.FileObserver$ObserverThread.run:86
  889. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  890. I/SELinux (18943): SELinux: seapp_context_lookup: seinfo=gmscore, level=s0:c512,c768, pkgname=com.google.android.gms.unstable
  891. E/audit ( 4259): type=1400 audit(1547695498.346:34356): avc: denied { read } for pid=18943 comm="main" name="u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=14935 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  892. E/audit ( 4259): type=1300 audit(1547695498.346:34356): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  893. E/audit ( 4259): type=1327 audit(1547695498.346:34356): proctitle="zygote64"
  894. E/audit ( 4259): type=1400 audit(1547695498.346:34357): avc: denied { read } for pid=18943 comm="main" name="u:object_r:bootloader_boot_reason_prop:s0" dev="tmpfs" ino=14936 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:bootloader_boot_reason_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  895. E/audit ( 4259): type=1300 audit(1547695498.346:34357): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  896. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  897. E/audit ( 4259): type=1327 audit(1547695498.346:34357): proctitle="zygote64"
  898. E/audit ( 4259): type=1400 audit(1547695498.346:34358): avc: denied { read } for pid=18943 comm="main" name="u:object_r:boottime_prop:s0" dev="tmpfs" ino=14937 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  899. E/audit ( 4259): type=1300 audit(1547695498.346:34358): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  900. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  901. E/audit ( 4259): type=1327 audit(1547695498.346:34358): proctitle="zygote64"
  902. E/audit ( 4259): type=1400 audit(1547695498.350:34359): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ccm_prop:s0" dev="tmpfs" ino=14939 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ccm_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  903. E/audit ( 4259): type=1300 audit(1547695498.350:34359): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  904. E/audit ( 4259): type=1327 audit(1547695498.350:34359): proctitle="zygote64"
  905. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  906. E/audit ( 4259): type=1400 audit(1547695498.350:34360): avc: denied { read } for pid=18943 comm="main" name="u:object_r:compact_dump_prop:s0" dev="tmpfs" ino=14941 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:compact_dump_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  907. E/audit ( 4259): type=1300 audit(1547695498.350:34360): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  908. E/audit ( 4259): type=1327 audit(1547695498.350:34360): proctitle="zygote64"
  909. E/audit ( 4259): type=1400 audit(1547695498.350:34361): avc: denied { read } for pid=18943 comm="main" name="u:object_r:cp_reserved_mem_prop:s0" dev="tmpfs" ino=14943 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:cp_reserved_mem_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  910. E/audit ( 4259): type=1300 audit(1547695498.350:34361): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  911. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  912. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  913. E/audit ( 4259): type=1327 audit(1547695498.350:34361): proctitle="zygote64"
  914. E/audit ( 4259): type=1400 audit(1547695498.350:34362): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_apexserver_prop:s0" dev="tmpfs" ino=14946 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_apexserver_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  915. E/audit ( 4259): type=1300 audit(1547695498.350:34362): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  916. E/audit ( 4259): type=1327 audit(1547695498.350:34362): proctitle="zygote64"
  917. E/audit ( 4259): type=1400 audit(1547695498.350:34363): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=14947 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  918. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  919. E/audit ( 4259): type=1300 audit(1547695498.350:34363): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  920. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  921. E/audit ( 4259): type=1327 audit(1547695498.350:34363): proctitle="zygote64"
  922. E/audit ( 4259): type=1400 audit(1547695498.350:34364): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_bugreport_prop:s0" dev="tmpfs" ino=14948 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_bugreport_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  923. E/audit ( 4259): type=1300 audit(1547695498.350:34364): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  924. E/id.gms.unstabl(18943): Not starting debugger since process cannot load the jdwp agent.
  925. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  926. E/audit ( 4259): type=1327 audit(1547695498.350:34364): proctitle="zygote64"
  927. E/audit ( 4259): type=1400 audit(1547695498.350:34365): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_console_prop:s0" dev="tmpfs" ino=14949 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_console_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  928. E/audit ( 4259): type=1300 audit(1547695498.350:34365): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  929. E/audit ( 4259): type=1327 audit(1547695498.350:34365): proctitle="zygote64"
  930. E/audit ( 4259): type=1400 audit(1547695498.350:34366): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_default_prop:s0" dev="tmpfs" ino=14950 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_default_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  931. E/audit ( 4259): type=1300 audit(1547695498.350:34366): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  932. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  933. E/audit ( 4259): type=1327 audit(1547695498.350:34366): proctitle="zygote64"
  934. E/audit ( 4259): type=1400 audit(1547695498.350:34367): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_dumpstate_prop:s0" dev="tmpfs" ino=14951 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_dumpstate_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  935. E/audit ( 4259): type=1300 audit(1547695498.350:34367): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  936. E/audit ( 4259): type=1327 audit(1547695498.350:34367): proctitle="zygote64"
  937. E/audit ( 4259): type=1400 audit(1547695498.350:34368): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_factory_ssc_prop:s0" dev="tmpfs" ino=14952 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_factory_ssc_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  938. E/audit ( 4259): type=1300 audit(1547695498.350:34368): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  939. E/audit ( 4259): type=1327 audit(1547695498.350:34368): proctitle="zygote64"
  940. E/audit ( 4259): type=1400 audit(1547695498.350:34369): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_fuse_prop:s0" dev="tmpfs" ino=14953 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_fuse_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  941. E/audit ( 4259): type=1300 audit(1547695498.350:34369): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  942. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  943. E/audit ( 4259): type=1327 audit(1547695498.350:34369): proctitle="zygote64"
  944. E/audit ( 4259): type=1400 audit(1547695498.354:34370): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_interface_restart_prop:s0" dev="tmpfs" ino=14954 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_interface_restart_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  945. E/audit ( 4259): type=1300 audit(1547695498.354:34370): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  946. E/audit ( 4259): type=1327 audit(1547695498.354:34370): proctitle="zygote64"
  947. E/audit ( 4259): type=1400 audit(1547695498.354:34371): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_interface_start_prop:s0" dev="tmpfs" ino=14955 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_interface_start_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  948. E/audit ( 4259): type=1300 audit(1547695498.354:34371): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  949. E/audit ( 4259): type=1327 audit(1547695498.354:34371): proctitle="zygote64"
  950. E/audit ( 4259): type=1400 audit(1547695498.354:34372): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_interface_stop_prop:s0" dev="tmpfs" ino=14956 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_interface_stop_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  951. E/audit ( 4259): type=1300 audit(1547695498.354:34372): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  952. E/audit ( 4259): type=1327 audit(1547695498.354:34372): proctitle="zygote64"
  953. E/audit ( 4259): type=1400 audit(1547695498.354:34373): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=14957 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  954. E/audit ( 4259): type=1300 audit(1547695498.354:34373): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  955. E/audit ( 4259): type=1327 audit(1547695498.354:34373): proctitle="zygote64"
  956. E/audit ( 4259): type=1400 audit(1547695498.354:34374): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_redsocks_prop:s0" dev="tmpfs" ino=14958 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_redsocks_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  957. E/audit ( 4259): type=1300 audit(1547695498.354:34374): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  958. E/audit ( 4259): type=1327 audit(1547695498.354:34374): proctitle="zygote64"
  959. E/audit ( 4259): type=1400 audit(1547695498.354:34375): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=14959 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  960. E/audit ( 4259): type=1300 audit(1547695498.354:34375): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  961. D/SecurityLogAgent:SEDenialService( 4910): Got Modify Event and sending Denial Intent for audit.log / "zygote64"
  962. E/audit ( 4259): type=1327 audit(1547695498.354:34375): proctitle="zygote64"
  963. E/audit ( 4259): type=1400 audit(1547695498.358:34376): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=14960 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  964. E/audit ( 4259): type=1300 audit(1547695498.358:34376): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  965. E/audit ( 4259): type=1327 audit(1547695498.358:34376): proctitle="zygote64"
  966. E/audit ( 4259): type=1400 audit(1547695498.358:34377): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=14961 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  967. E/audit ( 4259): type=1300 audit(1547695498.358:34377): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  968. E/audit ( 4259): type=1327 audit(1547695498.358:34377): proctitle="zygote64"
  969. E/audit ( 4259): type=1400 audit(1547695498.358:34378): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_start_prop:s0" dev="tmpfs" ino=14962 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_start_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  970. E/audit ( 4259): type=1300 audit(1547695498.358:34378): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  971. E/audit ( 4259): type=1327 audit(1547695498.358:34378): proctitle="zygote64"
  972. E/audit ( 4259): type=1400 audit(1547695498.358:34379): avc: denied { read } for pid=18943 comm="main" name="u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=14963 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=0 SEPF_SM-N960F_9_0001 unfiltered
  973. E/audit ( 4259): type=1300 audit(1547695498.358:34379): arch=c00000b7 syscall=48 success=no exit=-13 a0=ffffff9c a1=7ff3242618 a2=4 a3=0 items=0 ppid=4431 pid=18943 auid=4294967295 uid=10043 gid=10043 euid=10043 suid=10043 fsuid=10043 egid=10043 sgid=10043 fsgid=10043 tty=(none) ses=4294967295 comm="main" exe="/system/bin/app_process64" subj=u:r:priv_app:s0:c512,c768 key=(null)
  974. E/audit ( 4259): type=1327 audit(1547695498.358:34379): proctitle="zygote64"
  975. D/SecurityLogAgent:SEDenialService( 4910): audit.ondenial set to 0 after sending samsung.intent.action.knox.DENIAL_NOTIFICATION intent
  976. I/chatty ( 4910): uid=1000(system) FileObserver identical 5 lines
  977. W/ContextImpl( 4910): Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:1067 com.android.server.SEDenialService$AuditFileObserver.onEvent:78 android.os.FileObserver$ObserverThread.onEvent:123 android.os.FileObserver$ObserverThread.observe:-2 android.os.FileObserver$ObserverThread.run:86
  978. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10107, pid: 18896
  979. D/ConnectivityService( 4910): filterNetworkStateForUid() uid: 10107, pid: 18896, networkInfo: [type: MOBILE[LTE], state: CONNECTED/CONNECTED, reason: (unspecified), extra: sp.koodo.com, failover: false, available: true, roaming: false]
  980. V/ServiceDisposer(18896): Register FirstActivityStartObserver
  981. I/ActivityManager( 4910): DSS on for com.google.android.gms and scale is 1.0
  982. D/GamePkgDataHelper( 4910): getGamePkgData(). rs.pedjaapps.alogcatroot.app
  983. D/ConnectivityManager_URSP(18943): Ursp sIsUrsp=false, sIsCheckUrsp=false, uid=10043
  984. D/Proxy (18943): urspP is null: 10043
  985. I/id.gms.unstabl(18943): The ClassLoaderContext is a special shared library.
  986. I/chatty (18943): uid=10043 com.google.android.gms.unstable identical 1 line
  987. I/id.gms.unstabl(18943): The ClassLoaderContext is a special shared library.
  988. W/GmsApplication(18943): Failed to invoke the SupplierSetterRegistry.
  989. I/StatementMeasurement(18896): +++ DURATION(0 ms) for injection.
  990. I/StatementMeasurement(18896): +++ DURATION(0 ms) for planting logging tree.
  991. V/ServiceDisposer(18896): Register UserLoginService
  992. V/ServiceDisposer(18896): Register AuthenticationService
  993. W/DynamiteModule(18943): Local module descriptor class for providerinstaller not found.
  994. D/com.facebook.FacebookSdk(18896): getGraphApiVersion: v3.0
  995. W/ProviderHelper(18943): Unknown dynamite feature providerinstaller
  996. I/DynamiteModule(18943): Considering local module providerinstaller:0 and remote module providerinstaller:0
  997. W/ProviderInstaller(18943): Failed to load providerinstaller module: No acceptable module found. Local version is 0 and remote version is 0.
  998. I/System.out(18896): (HTTPLog)-Static: isSBSettingEnabled false
  999. I/System.out(18896): (HTTPLog)-Static: isSBSettingEnabled false
  1000. D/DnsProxyListener( 4430): DNSDBG::dns addrinfo af 2
  1001. V/NativeCrypto(18943): Registering com/google/android/gms/org/conscrypt/NativeCrypto's 287 native methods...
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement