Advertisement
Guest User

Untitled

a guest
Apr 21st, 2020
27
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 34.62 KB | None | 0 0
  1. 04-21 11:13:09.704 17508 17508 I EventStreamServiceX: ## getBackgroundBehavior: Using Work Manager 04-21 11:13:09.704 17508 17508 I EventStreamServiceX: ## service is schedule to restart in 60000 millis, if network is connected 04-21 11:13:09.717 1790 1790 D InterruptionStateProvider: No alerting: suppressed due to group alert behavior 04-21 11:13:09.722 1790 1790 D InterruptionStateProvider: No heads up: unimportant notification: 0|im.vector.alpha|0|null|10113 04-21 11:13:09.723 1790 1790 D InterruptionStateProvider: No heads up: unimportant notification: 0|im.vector.alpha|0|null|10113 04-21 11:13:09.727 1790 1790 D InterruptionStateProvider: No alerting: suppressed due to group alert behavior 04-21 11:13:09.882 1315 1468 I InputReader: Reconfiguring input devices. changes=0x00000010 04-21 11:13:09.614 1831 3874 D TextClassifierService: No configured system TextClassifierService 04-21 11:13:09.885 1315 1315 I Telecom : DefaultDialerCache: Refreshing default dialer for user 0: now com.android.dialer: DDC.oR@AWA 04-21 11:13:09.885 1315 1315 I Telecom : DefaultDialerCache: Refreshing default dialer for user 10: now com.android.dialer: DDC.oR@AWA 04-21 11:13:09.890 2715 2715 D RegisteredNfcFServicesCache: Service unchanged, not updating 04-21 11:13:09.927 1778 1778 D CarrierSvcBindHelper: No carrier app for: 0 04-21 11:13:09.927 1778 1778 D ImsResolver: maybeAddedImsService, packageName: im.vector.alpha 04-21 11:13:09.933 1315 1340 W VoiceInteractionManagerService: no available voice interaction services found for user 0 04-21 11:13:17.201 856 923 D ASH : @ 7445.986: AP has been up: last 7145670623, now 7445986453 usec 04-21 11:13:17.222 856 923 D ASH : @ 7445.988: Sending to ASH storage: 0 163 0 04-21 11:13:17.543 1315 16981 I ActivityTaskManager: START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 cmp=com.nordea.mobiletoken/.view.SplashScreen bnds=[612,524][816,760]} from uid 10089 04-21 11:13:17.549 853 853 D android.hardware.power@1.3-service.pixel-libperfmgr: LAUNCH: 1 04-21 11:13:17.565 810 810 D Zygote : Forked child process 19503 04-21 11:13:17.567 1315 1342 I ActivityManager: Start proc 19503:com.nordea.mobiletoken/u0a164 for activity {com.nordea.mobiletoken/com.nordea.mobiletoken.view.SplashScreen} 04-21 11:13:17.572 19503 19503 E dea.mobiletoke: Not starting debugger since process cannot load the jdwp agent. 04-21 11:13:17.689 19503 19503 D AndroidRuntime: >>>>>> START com.android.internal.os.RuntimeInit uid 10164 <<<<<< 04-21 11:13:17.688 19503 19503 W dea.mobiletoken: type=1400 audit(0.0:12789): avc: denied { read } for name="u:object_r:device_config_runtime_native_boot_prop:s0" dev="tmpfs" ino=19726 scontext=u:r:untrusted_app_27:s0:c164,c256,c512,c768 tcontext=u:object_r:device_config_runtime_native_boot_prop:s0 tclass=file permissive=0 04-21 11:13:17.692 19503 19503 E libc : Access denied finding property "persist.device_config.runtime_native_boot.enable_apex_image" 04-21 11:13:17.692 19503 19503 I AndroidRuntime: Using default boot image 04-21 11:13:17.692 19503 19503 E libc : Access denied finding property "persist.device_config.runtime_native_boot.disable_lock_profiling" 04-21 11:13:17.692 19503 19503 I AndroidRuntime: Leaving lock profiling enabled 04-21 11:13:17.693 19503 19503 E libc : Access denied finding property "persist.device_config.runtime_native_boot.enable_generational_cc" 04-21 11:13:17.692 19503 19503 W dea.mobiletoken: type=1400 audit(0.0:12792): avc: denied { lock } for path="/system/framework/arm64/boot.art" dev="dm-3" ino=1729 scontext=u:r:untrusted_app_27:s0:c164,c256,c512,c768 tcontext=u:object_r:system_file:s0 tclass=file permissive=0 04-21 11:13:17.692 19503 19503 W dea.mobiletoken: type=1400 audit(0.0:12793): avc: denied { lock } for path="/system/framework/arm64/boot-core-libart.art" dev="dm-3" ino=1708 scontext=u:r:untrusted_app_27:s0:c164,c256,c512,c768 tcontext=u:object_r:system_file:s0 tclass=file permissive=0 04-21 11:13:17.776 19503 19503 D ICU : Time zone APEX file found: /apex/com.android.tzdata/etc/icu/icu_tzdata.dat 04-21 11:13:17.793 19503 19503 W com.nordea.mobiletoken: JNI RegisterNativeMethods: attempt to register 0 native methods for android.media.AudioAttributes 04-21 11:13:17.797 19503 19503 D AndroidRuntime: Calling main entry com.android.internal.os.ExecInit 04-21 11:13:17.797 19503 19503 D Zygote : begin preload 04-21 11:13:17.798 19503 19503 I Zygote : Calling ZygoteHooks.beginPreload() 04-21 11:13:17.798 19503 19503 I Zygote : Preloading shared libraries... 04-21 11:13:17.877 19503 19503 I Zygote : Called ZygoteHooks.endPreload() 04-21 11:13:17.890 19503 19503 I Zygote : Installed AndroidKeyStoreProvider in 13ms. 04-21 11:13:17.890 19503 19503 D Zygote : end preload 04-21 11:13:17.923 19503 19503 W asset : unable to execute idmap2: Permission denied 04-21 11:13:17.923 19503 19503 W AssetManager: 'idmap2 --scan' failed: no static="true" overlays targeting "android" will be loaded 04-21 11:13:17.978 19503 19536 I FA : App measurement is starting up, version: 19000 04-21 11:13:17.978 19503 19536 I FA : To enable debug logging run: adb shell setprop log.tag.FA VERBOSE 04-21 11:13:17.978 19503 19536 I FA : To enable faster debug mode event logging run: 04-21 11:13:17.978 19503 19536 I FA : adb shell setprop debug.firebase.analytics.app com.nordea.mobiletoken 04-21 11:13:17.983 19503 19503 W com.nordea.mobiletoken: Opening an oat file without a class loader. Are you using the deprecated DexFile APIs? 04-21 11:13:17.986 19503 19536 W FA : Service invalid 04-21 11:13:18.014 19503 19503 W com.nordea.mobiletoken: Opening an oat file without a class loader. Are you using the deprecated DexFile APIs? 04-21 11:13:18.016 19503 19503 I com.nordea.mobiletoken: Waiting for a blocking GC ClassLinker 04-21 11:13:18.090 19503 19503 F libc : Fatal signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x76ca079324 in tid 19503 (dea.mobiletoken), pid 19503 (dea.mobiletoken) 04-21 11:13:18.128 19568 19568 I crash_dump64: obtaining output fd from tombstoned, type: kDebuggerdTombstone 04-21 11:13:18.128 1082 1082 I /system/bin/tombstoned: received crash request for pid 19503 04-21 11:13:18.129 19568 19568 I crash_dump64: performing dump of process 19503 (target tid = 19503) 04-21 11:13:18.137 19568 19568 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 04-21 11:13:18.137 19568 19568 F DEBUG : Build fingerprint: 'Android/aosp_blueline/blueline:10/QQ2A.200405.005/2020.04.14.23:user/release-keys' 04-21 11:13:18.137 19568 19568 F DEBUG : Revision: 'MP1.0' 04-21 11:13:18.137 19568 19568 F DEBUG : ABI: 'arm64' 04-21 11:13:18.138 19568 19568 F DEBUG : Timestamp: 2020-04-21 11:13:18+0200 04-21 11:13:18.138 19568 19568 F DEBUG : pid: 19503, tid: 19503, name: dea.mobiletoken >>> com.nordea.mobiletoken <<<04-21 11:13:18.138 19568 19568 F DEBUG : uid: 10164 04-21 11:13:18.138 19568 19568 F DEBUG : signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x76ca079324 04-21 11:13:18.138 19568 19568 F DEBUG : Cause: execute-only (no-read) memory access error; likely due to data in .text. 04-21 11:13:18.138 19568 19568 F DEBUG : x0 00000076ca079324 x1 00000076cbb2e108 x2 0000000000000010 x3 0000000000000001 04-21 11:13:18.138 19568 19568 F DEBUG : x4 00000000fffffffe x5 6c616d0000000000 x6 00000000806d616c x7 6b606bff626e6b6b 04-21 11:13:18.138 19568 19568 F DEBUG : x8 000000000000015a x9 0000005d2032c420 x10 00000000000000d9 x11 0000000000000003 04-21 11:13:18.138 19568 19568 F DEBUG : x12 0000000000000000 x13 ffffffffffffffff x14 0000000000000006 x15 ffffffffffffffff 04-21 11:13:18.138 19568 19568 F DEBUG : x16 00000076c7520140 x17 00000076ccc2e31c x18 0000000000000000 x19 0000007fc7b050f0 04-21 11:13:18.138 19568 19568 F DEBUG : x20 0000005d20525380 x21 0000005d20521000 x22 0000005d20524000 x23 0000007fc7b055d0 04-21 11:13:18.138 19568 19568 F DEBUG : x24 0000005d2051e000 x25 00000000000000d2 x26 000000000000019f x27 0000005d20522000 04-21 11:13:18.138 19568 19568 F DEBUG : x28 0000005d2051feb0 x29 0000007fc7b06de0 04-21 11:13:18.138 19568 19568 F DEBUG : sp 0000007fc7b050f0 lr 0000000000000000 pc 0000005d2032c420 04-21 11:13:18.378 1790 1790 D ImageWallpaper: wallpaper visibility changes to: false 04-21 11:13:18.393 665 665 E Layer : [Surface(name=AppWindowToken{50ad0c0 token=Token{21c4243 ActivityRecord{edc4bf2 u0 com.android.launcher3/.Launcher t447}}})/@0x4c27bb5 - animation-leash#0] No local sync point found 04-21 11:13:18.393 665 665 E Layer : [Surface(name=AppWindowToken{a97d095 token=Token{882b84c ActivityRecord{e24207f u0 com.nordea.mobiletoken/.view.SplashScreen t491}}})/@0xd86a149 - animation-leash#0] No local sync point found 04-21 11:13:18.605 19568 19568 F DEBUG : 04-21 11:13:18.605 19568 19568 F DEBUG : backtrace: 04-21 11:13:18.605 19568 19568 F DEBUG : #00 pc 0000000000721420 /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/lib/arm64/libidp-shared.so 04-21 11:13:18.605 19568 19568 F DEBUG : #01 pc 0000000000185160 /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/lib/arm64/libidp-shared.so 04-21 11:13:18.605 19568 19568 F DEBUG : #02 pc 00000000001847a4 /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/lib/arm64/libidp-shared.so 04-21 11:13:18.605 19568 19568 F DEBUG : #03 pc 000000000000fdb0 /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/lib/arm64/libjnidispatch.so 04-21 11:13:18.606 19568 19568 F DEBUG : #04 pc 000000000000f5a0 /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/lib/arm64/libjnidispatch.so 04-21 11:13:18.606 19568 19568 F DEBUG : #05 pc 0000000000005bc0 /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/lib/arm64/libjnidispatch.so 04-21 11:13:18.606 19568 19568 F DEBUG : #06 pc 00000000000079dc /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/lib/arm64/libjnidispatch.so 04-21 11:13:18.606 19568 19568 F DEBUG : #07 pc 0000000001232938 /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/oat/arm64/base.odex (art_jni_trampoline+216) 04-21 11:13:18.606 19568 19568 F DEBUG : #08 pc 0000000001227280 /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/oat/arm64/base.odex (com.sun.jna.Function.invoke+3216) 04-21 11:13:18.606 19568 19568 F DEBUG : #09 pc 0000000001225dcc /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/oat/arm64/base.odex (com.sun.jna.Function.invoke+1340) 04-21 11:13:18.606 19568 19568 F DEBUG : #10 pc 0000000000a7653c /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/oat/arm64/base.odex (com.sun.jna.Library$Handler.invoke+1260) 04-21 11:13:18.606 19568 19568 F DEBUG : #11 pc 00000000009fbccc /system/framework/arm64/boot.oat (java.lang.reflect.Proxy.invoke+92) (BuildId: 4ff3cdec73f2b7ed37c22f9e525a7ad2e39b7ded) 04-21 11:13:18.606 19568 19568 F DEBUG : #12 pc 00000000001365b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #13 pc 0000000000145100 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #14 pc 00000000004b90e0 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #15 pc 00000000004b9db0 /apex/com.android.runtime/lib64/libart.so (art::InvokeWithJValues(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, jvalue const*)+420) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #16 pc 00000000003b5fb8 /apex/com.android.runtime/lib64/libart.so (art::JNI::CallStaticObjectMethodA(_JNIEnv*, _jclass*, _jmethodID*, jvalue const*)+640) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #17 pc 000000000057b280 /apex/com.android.runtime/lib64/libart.so (art::InvokeProxyInvocationHandler(art::ScopedObjectAccessAlreadyRunnable&, char const*, _jobject*, _jobject*, std::__1::vector<jvalue, std::__1::allocator<jvalue>>&)+664) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #18 pc 000000000059c970 /apex/com.android.runtime/lib64/libart.so (artQuickProxyInvokeHandler+1124) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #19 pc 000000000013eefc /apex/com.android.runtime/lib64/libart.so (art_quick_proxy_invoke_handler+76) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #20 pc 0000000000b32e4c /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/oat/arm64/base.odex (o.afs.ˊ+2876) 04-21 11:13:18.606 19568 19568 F DEBUG : #21 pc 0000000001841ce4 /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/oat/arm64/base.odex (o.bjw.ˋ+132) 04-21 11:13:18.606 19568 19568 F DEBUG : #22 pc 0000000001847f74 /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/oat/arm64/base.odex (o.bjz.ˊ+2308) 04-21 11:13:18.606 19568 19568 F DEBUG : #23 pc 0000000000fb7ac8 /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/oat/arm64/base.odex (o.ﹳ.ˋ+184) 04-21 11:13:18.606 19568 19568 F DEBUG : #24 pc 0000000000f37968 /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/oat/arm64/base.odex (o.ᓶ.ˋॱ+392) 04-21 11:13:18.606 19568 19568 F DEBUG : #25 pc 0000000000f36858 /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/oat/arm64/base.odex (o.ᓶ.<init>+424) 04-21 11:13:18.606 19568 19568 F DEBUG : #26 pc 0000000000f21a6c /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/oat/arm64/base.odex (o.ᐸ.<init>+1644) 04-21 11:13:18.606 19568 19568 F DEBUG : #27 pc 0000000000a6e2ec /data/app/com.nordea.mobiletoken-lmaMwBdX9YmpcEHtEeM4JQ==/oat/arm64/base.odex (com.nordea.mobiletoken.view.BankApplication.onCreate+2012) 04-21 11:13:18.606 19568 19568 F DEBUG : #28 pc 0000000002274a24 /system/framework/arm64/boot-framework.oat (android.app.Instrumentation.callApplicationOnCreate+52) (BuildId: 6daeb892feef43ab8f3dfb695e93e4a6488f2289) 04-21 11:13:18.606 19568 19568 F DEBUG : #29 pc 0000000002354f64 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.handleBindApplication+7508) (BuildId: 6daeb892feef43ab8f3dfb695e93e4a6488f2289) 04-21 11:13:18.606 19568 19568 F DEBUG : #30 pc 000000000234c350 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread$H.handleMessage+6976) (BuildId: 6daeb892feef43ab8f3dfb695e93e4a6488f2289) 04-21 11:13:18.606 19568 19568 F DEBUG : #31 pc 00000000025c0464 /system/framework/arm64/boot-framework.oat (android.os.Handler.dispatchMessage+180) (BuildId: 6daeb892feef43ab8f3dfb695e93e4a6488f2289) 04-21 11:13:18.606 19568 19568 F DEBUG : #32 pc 00000000025c3a00 /system/framework/arm64/boot-framework.oat (android.os.Looper.loop+1440) (BuildId: 6daeb892feef43ab8f3dfb695e93e4a6488f2289) 04-21 11:13:18.606 19568 19568 F DEBUG : #33 pc 000000000235b6b4 /system/framework/arm64/boot-framework.oat (android.app.ActivityThread.main+756) (BuildId: 6daeb892feef43ab8f3dfb695e93e4a6488f2289) 04-21 11:13:18.606 19568 19568 F DEBUG : #34 pc 00000000001365b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #35 pc 0000000000145100 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #36 pc 00000000004b90e0 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #37 pc 00000000004babc8 /apex/com.android.runtime/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1580) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #38 pc 000000000044569c /apex/com.android.runtime/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #39 pc 00000000005776b4 /system/framework/arm64/boot.oat (art_jni_trampoline+180) (BuildId: 4ff3cdec73f2b7ed37c22f9e525a7ad2e39b7ded) 04-21 11:13:18.606 19568 19568 F DEBUG : #40 pc 00000000028306f8 /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+136) (BuildId: 6daeb892feef43ab8f3dfb695e93e4a6488f2289) 04-21 11:13:18.606 19568 19568 F DEBUG : #41 pc 0000000001b21148 /system/framework/arm64/boot-framework.oat (com.android.internal.os.ExecInit.main+360) (BuildId: 6daeb892feef43ab8f3dfb695e93e4a6488f2289) 04-21 11:13:18.606 19568 19568 F DEBUG : #42 pc 00000000001365b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #43 pc 0000000000145100 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #44 pc 00000000004b90e0 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #45 pc 00000000004b8d4c /apex/com.android.runtime/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+428) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #46 pc 00000000003c2434 /apex/com.android.runtime/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+648) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.606 19568 19568 F DEBUG : #47 pc 00000000000bf56c /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120) (BuildId: 13f93770fcc3555ceadf31e86be5055a) 04-21 11:13:18.606 19568 19568 F DEBUG : #48 pc 00000000000bf424 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::callMain(android::String8 const&, _jclass*, android::Vector<android::String8> const&)+336) (BuildId: 13f93770fcc3555ceadf31e86be5055a) 04-21 11:13:18.606 19568 19568 F DEBUG : #49 pc 000000000000393c /system/bin/app_process64 (android::AppRuntime::onStarted()+68) (BuildId: 58c560d5ca8007c7d760e42db40fa004) 04-21 11:13:18.607 19568 19568 F DEBUG : #50 pc 00000000008dd420 /system/framework/arm64/boot-framework.oat (art_jni_trampoline+144) (BuildId: 6daeb892feef43ab8f3dfb695e93e4a6488f2289) 04-21 11:13:18.607 19568 19568 F DEBUG : #51 pc 0000000001b2b6d8 /system/framework/arm64/boot-framework.oat (com.android.internal.os.RuntimeInit.main+184) (BuildId: 6daeb892feef43ab8f3dfb695e93e4a6488f2289) 04-21 11:13:18.607 19568 19568 F DEBUG : #52 pc 00000000001365b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.607 19568 19568 F DEBUG : #53 pc 0000000000145100 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+276) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.607 19568 19568 F DEBUG : #54 pc 00000000004b90e0 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.607 19568 19568 F DEBUG : #55 pc 00000000004b8d4c /apex/com.android.runtime/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+428) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.607 19568 19568 F DEBUG : #56 pc 00000000003c2434 /apex/com.android.runtime/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+648) (BuildId: 1f682c60a1fb8ceb385127b1eecb46a9) 04-21 11:13:18.607 19568 19568 F DEBUG : #57 pc 00000000000bf56c /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120) (BuildId: 13f93770fcc3555ceadf31e86be5055a) 04-21 11:13:18.607 19568 19568 F DEBUG : #58 pc 00000000000c27b8 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+808) (BuildId: 13f93770fcc3555ceadf31e86be5055a) 04-21 11:13:18.607 19568 19568 F DEBUG : #59 pc 0000000000003550 /system/bin/app_process64 (main+1280) (BuildId: 58c560d5ca8007c7d760e42db40fa004) 04-21 11:13:18.607 19568 19568 F DEBUG : #60 pc 000000000003c1e0 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: a8aa4907f28a6f1a933774b1c1773e89) 04-21 11:13:18.812 1315 19571 W ActivityTaskManager: Force finishing activity com.nordea.mobiletoken/.view.SplashScreen 04-21 11:13:18.812 1315 19572 I DropBoxManagerService: add tag=data_app_native_crash isTagEnabled=true flags=0x2 04-21 11:13:18.822 1082 1082 E /system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_02 04-21 11:13:18.823 1315 1333 I ActivityManager: Showing crash dialog for package com.nordea.mobiletoken u0 04-21 11:13:18.824 1315 1333 E system_server: Invalid ID 0x00000000. 04-21 11:13:18.828 1315 1357 I BootReceiver: Copying /data/tombstones/tombstone_02 to DropBox (SYSTEM_TOMBSTONE) 04-21 11:13:18.829 1315 1357 I DropBoxManagerService: add tag=SYSTEM_TOMBSTONE isTagEnabled=true flags=0x2 04-21 11:13:18.914 1315 3699 E libc : Access denied finding property "vendor.debug.egl.changepixelformat" 04-21 11:13:18.955 1315 3699 E libc : Access denied finding property "vendor.debug.egl.swapinterval" 04-21 11:13:18.979 1315 2737 I ActivityManager: Process com.nordea.mobiletoken (pid 19503) has died: fore TOP 04-21 11:13:18.958 1315 3699 E libc : Access denied finding property "vendor.debug.egl.swapinterval" 04-21 11:13:18.981 810 810 I Zygote : Process 19503 exited due to signal 11 (Segmentation fault) 04-21 11:13:18.992 1315 1343 I libprocessgroup: Successfully killed process cgroup uid 10164 pid 19503 in 11ms 04-21 11:13:18.996 1315 1336 W WindowManager: Failed looking up window callers=com.android.server.wm.WindowManagerService.windowForClientLocked:5302 com.android.server.wm.WindowManagerService.removeWindow:1774 com.android.server.wm.Session.remove:176 04-21 11:13:19.011 1790 1790 D ImageWallpaper: wallpaper visibility changes to: true 04-21 11:13:19.025 853 853 D android.hardware.power@1.3-service.pixel-libperfmgr: LAUNCH: 0 04-21 11:13:19.313 1315 1335 W ActivityTaskManager: Activity top resumed state loss timeout for ActivityRecord{e24207f u0 com.nordea.mobiletoken/.view.SplashScreen t-1 f} 04-21 11:13:20.464 2549 2575 I QcrilOemhookMsgTunnel: [0]processOemHookIndication length=21 04-21 11:13:20.464 2549 2549 D QcrilMsgTunnelIfaceManager: handleMessage what = 0 04-21 11:13:20.502 772 1150 I netd : trafficSwapActiveStatsMap() <0.42ms> 04-21 11:13:20.507 772 1150 I netd : tetherGetStats() <3.49ms> 04-21 11:13:20.534 1315 1549 I LocationAccessPolicy: Allowing org.thoughtcrime.securesms fine because it doesn't target API 29 yet. Please fix this app. Called from TelephonyRegistry push 04-21 11:13:20.535 1315 1549 I LocationAccessPolicy: org.chromium.chrome is aware of fine but the app-ops permission is specifically denied. 04-21 11:13:20.535 1315 1549 I LocationAccessPolicy: org.chromium.chrome is aware of coarse but the app-ops permission is specifically denied. 04-21 11:13:20.535 1315 1549 I LocationAccessPolicy: Allowing im.vector.alpha fine because it doesn't target API 29 yet. Please fix this app. Called from TelephonyRegistry push 04-21 11:13:20.539 1778 1778 D ServiceStateProvider: subId=1 04-21 11:13:20.543 8394 8394 D CellBroadcastReceiver: onReceive Intent { act=android.intent.action.SERVICE_STATE flg=0x1000010 cmp=com.android.cellbroadcastreceiver/.CellBroadcastReceiver (has extras) } 04-21 11:13:20.545 1688 1996 I QCNEJ/CndHalConnector: -> SND notifyWwanSubtypeChanged(13) 04-21 11:13:20.547 1688 1996 I QCNEJ/CndHalConnector: -> SND notifyMobileDataEnabledChanged(true) 04-21 11:13:25.905 1315 3699 E libc : Access denied finding property "vendor.debug.egl.swapinterval" 04-21 11:13:25.968 1315 19571 W ActivityManager: Ignoring remove of inactive process: ProcessRecord{aee2526 0:com.nordea.mobiletoken/u0a164} 04-21 11:13:25.967 1315 3699 E libc : Access denied finding property "vendor.debug.egl.swapinterval" 04-21 11:13:25.970 1315 3699 D OpenGLRenderer: endAllActiveAnimators on 0x697c9a1600 (RippleDrawable) with handle 0x60a1bcadb0 04-21 11:13:25.987 1315 16981 E InputDispatcher: Window handle Window{8f786d1 u0 Application Error: com.nordea.mobiletoken} has no registered input channel PS C:\platform-tools>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement