0% found this document useful (0 votes)
72 views6 pages

Fpsecrashlog

The document contains log messages from an Android application crash. It shows that the application "com.emulator.fpse" crashed with a SIGSEGV fault in thread GLThread. The crash dump includes the stack trace, register values, and build fingerprint information to help debug the crash. After the crash, the application restarts and its startup log messages are shown, including loading libraries and initializing the SandHook framework.

Uploaded by

Conta Padrao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views6 pages

Fpsecrashlog

The document contains log messages from an Android application crash. It shows that the application "com.emulator.fpse" crashed with a SIGSEGV fault in thread GLThread. The crash dump includes the stack trace, register values, and build fingerprint information to help debug the crash. After the crash, the application restarts and its startup log messages are shown, including loading libraries and initializing the SandHook framework.

Uploaded by

Conta Padrao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 6

--------- beginning of crash

10-09 14:07:56.978 F/libc (13702): Fatal signal 11 (SIGSEGV), code 1


(SEGV_MAPERR), fault addr 0x79061cdc in tid 13866 (GLThread), pid 13702
(m.emulator.fpse)
10-09 14:07:57.092 F/DEBUG (14174): *** *** *** *** *** *** *** *** *** *** ***
*** *** *** *** ***
10-09 14:07:57.092 F/DEBUG (14174): Native Crash TIME: 431471869
10-09 14:07:57.092 F/DEBUG (14174): *** *** *** *** *** *** *** *** *** *** ***
*** *** *** *** ***
10-09 14:07:57.093 F/DEBUG (14174): Build fingerprint:
'positivo/T810/T810:11/RP1A.201005.001/URBR2021092901:user/release-keys'
10-09 14:07:57.093 F/DEBUG (14174): Revision: '0'
10-09 14:07:57.093 F/DEBUG (14174): ABI: 'arm'
10-09 14:07:57.093 F/DEBUG (14174): Timestamp: 2022-10-09 14:07:57-0300
10-09 14:07:57.093 F/DEBUG (14174): pid: 13702, tid: 13866, name: GLThread >>>
com.emulator.fpse <<<
10-09 14:07:57.093 F/DEBUG (14174): uid: 10733
10-09 14:07:57.093 F/DEBUG (14174): signal 11 (SIGSEGV), code 1 (SEGV_MAPERR),
fault addr 0x79061cdc
10-09 14:07:57.093 F/DEBUG (14174): r0 0002f97a r1 800be5e8 r2 00000000
r3 0000000b
10-09 14:07:57.093 F/DEBUG (14174): r4 80000000 r5 00000001 r6 80130000
r7 00000003
10-09 14:07:57.093 F/DEBUG (14174): r8 80137604 r9 801ffe80 r10 fffffff2
r11 81e9dc18
10-09 14:07:57.093 F/DEBUG (14174): ip 800be5e8 sp 7b3d3174 lr 81753b20
pc 79061cdc
10-09 14:07:57.093 F/DEBUG (14174): backtrace:
10-09 14:07:57.093 F/DEBUG (14174): #00 pc 79061cdc <unknown>
10-09 14:07:57.093 F/DEBUG (14174): #01 pc 0004fb1c
/data/app/~~WrcP20SvXCatFtxDegMpJg==/com.emulator.fpse-loLAYHB28kxktyERqi0qnQ==/
lib/arm/libfpse.so
10-09 14:07:57.094 F/DEBUG (14174): #02 pc 00051690
/data/app/~~WrcP20SvXCatFtxDegMpJg==/com.emulator.fpse-loLAYHB28kxktyERqi0qnQ==/
lib/arm/libfpse.so
--------- beginning of main
10-11 14:58:07.240 W/m.emulator.fps( 1727): Using default instruction set features
for ARM CPU variant (generic) using conservative defaults
10-11 14:58:07.249 E/m.emulator.fps( 1727): Not starting debugger since process
cannot load the jdwp agent.
10-11 14:58:07.335 D/NetworkSecurityConfig( 1727): No Network Security Config
specified, using platform default
10-11 14:58:07.336 D/NetworkSecurityConfig( 1727): No Network Security Config
specified, using platform default
10-11 14:58:07.353 I/From ( 1727): Hook_so/armeabi-v7a/libIOHook.so
10-11 14:58:07.353 I/From2 ( 1727):
/data/user/0/com.emulator.fpse/app_libs/armeabi-v7a/libIOHook.so
10-11 14:58:07.358 I/From ( 1727): Hook_so/armeabi-v7a/libmocls.so
10-11 14:58:07.358 I/From2 ( 1727):
/data/user/0/com.emulator.fpse/app_libs/armeabi-v7a/libmocls.so
10-11 14:58:07.363 I/From ( 1727): Hook_so/armeabi-v7a/libsandhook.so
10-11 14:58:07.363 I/From2 ( 1727):
/data/user/0/com.emulator.fpse/app_libs/armeabi-v7a/libsandhook.so
10-11 14:58:07.371 I/From ( 1727): App_dex/Modex.txt
10-11 14:58:07.371 I/From2 ( 1727):
/data/user/0/com.emulator.fpse/app_libs/App_dex/Modex.txt
10-11 14:58:07.372 I/From ( 1727): App_dex/classes.dex
10-11 14:58:07.372 I/From2 ( 1727):
/data/user/0/com.emulator.fpse/app_libs/App_dex/classes.dex
10-11 14:58:07.375 D/ContentValues( 1727): supported api:armeabi-v7a armeabi
10-11 14:58:07.383 W/m.emulator.fps( 1727): Class com.minusoneapp.LoadLibraryUtil
failed lock verification and will run slower.
10-11 14:58:07.383 W/m.emulator.fps( 1727): Common causes for lock verification
issues are non-optimized dex code
10-11 14:58:07.383 W/m.emulator.fps( 1727): and incorrect proguard optimizations.
10-11 14:58:07.385 W/m.emulator.fpse( 1727): type=1400 audit(0.0:615997): avc:
granted { execute } for
path="/data/data/com.emulator.fpse/app_libs/armeabi-v7a/libmocls.so" dev="dm-10"
ino=490418 scontext=u:r:untrusted_app:s0:c221,c258,c512,c768
tcontext=u:object_r:app_data_file:s0:c221,c258,c512,c768 tclass=file
app=com.emulator.fpse
10-11 14:58:07.386 D/LoadLibraryUtil-MinusOne( 1727): dq systemLibDirs,size=2
10-11 14:58:07.436 W/m.emulator.fps( 1727): Opening an oat file without a class
loader. Are you using the deprecated DexFile APIs?
10-11 14:58:07.436 I/chatty ( 1727): uid=10733(com.emulator.fpse) identical 1 line
10-11 14:58:07.437 W/m.emulator.fps( 1727): Opening an oat file without a class
loader. Are you using the deprecated DexFile APIs?
10-11 14:58:07.439 I/System.out( 1727): 耗时:4 ms
10-11 14:58:07.441 W/m.emulator.fpse( 1727): type=1400 audit(0.0:615998): avc:
granted { execute } for
path="/data/data/com.emulator.fpse/app_libs/armeabi-v7a/libsandhook.so" dev="dm-10"
ino=489524 scontext=u:r:untrusted_app:s0:c221,c258,c512,c768
tcontext=u:object_r:app_data_file:s0:c221,c258,c512,c768 tclass=file
app=com.emulator.fpse
10-11 14:58:07.444 W/SandHook-Native( 1727): JNI Loaded
10-11 14:58:07.445 W/m.emulator.fps( 1727): Accessing hidden field
Ljava/lang/reflect/Executable;->accessFlags:I (greylist-max-o, reflection, denied)
10-11 14:58:07.445 W/m.emulator.fps( 1727): Accessing hidden field
Ljava/lang/reflect/Executable;->dexMethodIndex:I (greylist-max-o, reflection,
denied)
10-11 14:58:07.448 D/dlopen ( 1727): a8b28000-a8bf2000 r--p 00000000 fc:04 121
/apex/com.android.art/lib/libart.so
10-11 14:58:07.448 D/dlopen ( 1727):
10-11 14:58:07.448 I/nougat_dlfcn( 1727): /lib/libart.so loaded in Android at
0xa8b28000
10-11 14:58:07.456 D/dlopen ( 1727): a054e000-a05ad000 r--p 00000000 fc:04 118
/apex/com.android.art/lib/libart-compiler.so
10-11 14:58:07.456 D/dlopen ( 1727):
10-11 14:58:07.456 I/nougat_dlfcn( 1727): /lib/libart-compiler.so loaded in Android
at 0xa054e000
10-11 14:58:07.464 D/dlopen ( 1727): a054e000-a05ad000 r--p 00000000 fc:04 118
/apex/com.android.art/lib/libart-compiler.so
10-11 14:58:07.464 D/dlopen ( 1727):
10-11 14:58:07.464 I/nougat_dlfcn( 1727): /lib/libart-compiler.so loaded in Android
at 0xa054e000
10-11 14:58:07.464 I/nougat_dlfcn( 1727): jit_load found at 0xa05e6835
10-11 14:58:07.465 W/m.emulator.fps( 1727): Using default instruction set features
for ARM CPU variant (generic) using conservative defaults
10-11 14:58:07.467 D/dlopen ( 1727): a8b28000-a8bf2000 r--p 00000000 fc:04 121
/apex/com.android.art/lib/libart.so
10-11 14:58:07.467 D/dlopen ( 1727):
10-11 14:58:07.467 I/nougat_dlfcn( 1727): /lib/libart.so loaded in Android at
0xa8b28000
10-11 14:58:07.470 D/dlopen ( 1727): a8b28000-a8bf2000 r--p 00000000 fc:04 121
/apex/com.android.art/lib/libart.so
10-11 14:58:07.470 D/dlopen ( 1727):
10-11 14:58:07.470 I/nougat_dlfcn( 1727): /lib/libart.so loaded in Android at
0xa8b28000
10-11 14:58:07.473 D/dlopen ( 1727): a8b28000-a8bf2000 r--p 00000000 fc:04 121
/apex/com.android.art/lib/libart.so
10-11 14:58:07.473 D/dlopen ( 1727):
10-11 14:58:07.473 I/nougat_dlfcn( 1727): /lib/libart.so loaded in Android at
0xa8b28000
10-11 14:58:07.473 I/nougat_dlfcn( 1727):
_ZN3art9JavaVMExt16AddWeakGlobalRefEPNS_6ThreadENS_6ObjPtrINS_6mirror6ObjectEEE
found at 0xa8dbfbc5
10-11 14:58:07.475 D/dlopen ( 1727): a8b28000-a8bf2000 r--p 00000000 fc:04 121
/apex/com.android.art/lib/libart.so
10-11 14:58:07.475 D/dlopen ( 1727):
10-11 14:58:07.475 I/nougat_dlfcn( 1727): /lib/libart.so loaded in Android at
0xa8b28000
10-11 14:58:07.478 D/dlopen ( 1727): a8b28000-a8bf2000 r--p 00000000 fc:04 121
/apex/com.android.art/lib/libart.so
10-11 14:58:07.478 D/dlopen ( 1727):
10-11 14:58:07.478 I/nougat_dlfcn( 1727): /lib/libart.so loaded in Android at
0xa8b28000
10-11 14:58:07.479 I/nougat_dlfcn( 1727):
_ZN3art12ProfileSaver20ForceProcessProfilesEv found at 0xa8d9b3d9
10-11 14:58:07.488 E/nougat_dlfcn( 1727): /system/lib/libsandhook-native.so not
found in my userspace
10-11 14:58:07.494 E/nougat_dlfcn( 1727): /odm/lib/libsandhook-native.so not found
in my userspace
10-11 14:58:07.500 E/nougat_dlfcn( 1727): /vendor/lib/libsandhook-native.so not
found in my userspace
10-11 14:58:07.506 E/nougat_dlfcn( 1727): libsandhook-native.so not found in my
userspace
10-11 14:58:07.507 D/dlopen ( 1727): a8b28000-a8bf2000 r--p 00000000 fc:04 121
/apex/com.android.art/lib/libart.so
10-11 14:58:07.507 D/dlopen ( 1727):
10-11 14:58:07.507 I/nougat_dlfcn( 1727): /lib/libart.so loaded in Android at
0xa8b28000
10-11 14:58:07.508 I/nougat_dlfcn( 1727): _ZN3art7Runtime9instance_E found at
0xa9032a68
10-11 14:58:07.514 W/m.emulator.fps( 1727): Accessing hidden method
Ljava/lang/reflect/Proxy;->generateProxy(Ljava/lang/String;[Ljava/lang/
Class;Ljava/lang/ClassLoader;[Ljava/lang/reflect/Method;[[Ljava/lang/Class;)Ljava/
lang/Class; (greylist-max-o, reflection, denied)
10-11 14:58:07.515 W/System.err( 1727): java.lang.NoSuchMethodException:
java.lang.reflect.Proxy.generateProxy [class java.lang.String, class
[Ljava.lang.Class;, class java.lang.ClassLoader, class [Ljava.lang.reflect.Method;,
class [[Ljava.lang.Class;]
10-11 14:58:07.521 W/System.err( 1727): at
java.lang.Class.getMethod(Class.java:2072)
10-11 14:58:07.521 W/System.err( 1727): at
java.lang.Class.getDeclaredMethod(Class.java:2050)
10-11 14:58:07.521 W/System.err( 1727): at
com.swift.sandhook.wrapper.StubMethodsFactory.<clinit>(Unknown Source:34)
10-11 14:58:07.521 W/System.err( 1727): at
com.swift.sandhook.wrapper.StubMethodsFactory.getStubMethod(Unknown Source:0)
10-11 14:58:07.521 W/System.err( 1727): at
com.swift.sandhook.wrapper.HookWrapper.fillBackupMethod(Unknown Source:115)
10-11 14:58:07.521 W/System.err( 1727): at
com.swift.sandhook.wrapper.HookWrapper.addHookClass(Unknown Source:10)
10-11 14:58:07.521 W/System.err( 1727): at
com.swift.sandhook.wrapper.HookWrapper.addHookClass(Unknown Source:6)
10-11 14:58:07.521 W/System.err( 1727): at
com.swift.sandhook.wrapper.HookWrapper.addHookClass(Unknown Source:1)
10-11 14:58:07.521 W/System.err( 1727): at
com.swift.sandhook.SandHook.addHookClass(Unknown Source:0)
10-11 14:58:07.521 W/System.err( 1727): at
com.minusoneapp.HookApplication.HookSignature(Native Method)
10-11 14:58:07.521 W/System.err( 1727): at
com.minusoneapp.HookApplication.<clinit>(Unknown Source:11)
10-11 14:58:07.521 W/System.err( 1727): at java.lang.Class.newInstance(Native
Method)
10-11 14:58:07.521 W/System.err( 1727): at
android.app.AppComponentFactory.instantiateApplication(AppComponentFactory.java:76)
10-11 14:58:07.521 W/System.err( 1727): at
androidx.core.app.CoreComponentFactory.instantiateApplication(SourceFile:1)
10-11 14:58:07.521 W/System.err( 1727): at
android.app.Instrumentation.newApplication(Instrumentation.java:1158)
10-11 14:58:07.521 W/System.err( 1727): at
android.app.LoadedApk.makeApplication(LoadedApk.java:1268)
10-11 14:58:07.521 W/System.err( 1727): at
android.app.ActivityThread.handleBindApplication(ActivityThread.java:6879)
10-11 14:58:07.521 W/System.err( 1727): at
android.app.ActivityThread.access$1300(ActivityThread.java:260)
10-11 14:58:07.521 W/System.err( 1727): at
android.app.ActivityThread$H.handleMessage(ActivityThread.java:1955)
10-11 14:58:07.521 W/System.err( 1727): at
android.os.Handler.dispatchMessage(Handler.java:106)
10-11 14:58:07.521 W/System.err( 1727): at
android.os.Looper.loop(Looper.java:223)
10-11 14:58:07.521 W/System.err( 1727): at
android.app.ActivityThread.main(ActivityThread.java:7945)
10-11 14:58:07.521 W/System.err( 1727): at java.lang.reflect.Method.invoke(Native
Method)
10-11 14:58:07.521 W/System.err( 1727): at
com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:603)
10-11 14:58:07.521 W/System.err( 1727): at
com.android.internal.os.ZygoteInit.main(ZygoteInit.java:947)
10-11 14:58:07.524 D/dlopen ( 1727): a8b28000-a8bf2000 r--p 00000000 fc:04 121
/apex/com.android.art/lib/libart.so
10-11 14:58:07.524 D/dlopen ( 1727):
10-11 14:58:07.524 I/nougat_dlfcn( 1727): /lib/libart.so loaded in Android at
0xa8b28000
10-11 14:58:07.525 W/m.emulator.fpse( 1727): type=1400 audit(0.0:615999): avc:
granted { execute } for
path="/data/data/com.emulator.fpse/app_libs/armeabi-v7a/libIOHook.so" dev="dm-10"
ino=490212 scontext=u:r:untrusted_app:s0:c221,c258,c512,c768
tcontext=u:object_r:app_data_file:s0:c221,c258,c512,c768 tclass=file
app=com.emulator.fpse
10-11 14:58:07.525 I/nougat_dlfcn( 1727):
_ZN3art11ClassLinker20MarkClassInitializedEPNS_6ThreadENS_6HandleINS_6mirror5ClassE
EE found at 0xa8c65725
10-11 14:58:07.525 D/SandHook( 1727): method <public android.content.pm.PackageInfo
android.app.ApplicationPackageManager.getPackageInfo(java.lang.String,int) throws
android.content.pm.PackageManager$NameNotFoundException> hook <replacement>
success!
10-11 14:58:07.526 D/SandHook( 1727): method <public android.content.pm.PackageInfo
android.content.pm.IPackageManager$Stub$Proxy.getPackageInfo(java.lang.String,int,i
nt) throws android.os.RemoteException> hook <replacement> success!
10-11 14:58:07.529 I/Dobby ( 1727): [*] ================================
10-11 14:58:07.529 I/Dobby ( 1727): [*] Dobby
10-11 14:58:07.529 I/Dobby ( 1727): [*] ================================
10-11 14:58:07.529 I/Dobby ( 1727): [*] dobby in debug log mode, disable with
cmake flag "-DDOBBY_DEBUG=OFF"
10-11 14:58:07.533 I/Dobby ( 1727): [*] [DobbyHook] Initialize at 0xa986d1bd
10-11 14:58:07.533 I/Dobby ( 1727): [*] ================
FunctionInlineReplaceRouting Start ================
10-11 14:58:07.533 I/Dobby ( 1727): [*] [trampoline] Generate trampoline buffer
0xa986d1bd -> 0x82d201a5
10-11 14:58:07.533 I/Dobby ( 1727): [*] [insn relocate] origin 0xa986d1bc - 8
10-11 14:58:07.533 I/Dobby ( 1727): [*] [insn relocate] relocated 0xa2332001 - 28
10-11 14:58:07.533 I/Dobby ( 1727): [*] [intercept routing] Active patch
0xa986d1bc
10-11 14:58:07.533 I/Dobby ( 1727): [*] ================
FunctionInlineReplaceRouting End ================
10-11 14:58:07.533 I/Dobby ( 1727): [*] [DobbyHook] Initialize at 0xa986d375
10-11 14:58:07.533 I/Dobby ( 1727): [*] ================
FunctionInlineReplaceRouting Start ================
10-11 14:58:07.533 I/Dobby ( 1727): [*] [trampoline] Generate trampoline buffer
0xa986d375 -> 0x82d2020d
10-11 14:58:07.533 I/Dobby ( 1727): [*] [insn relocate] origin 0xa986d374 - 8
10-11 14:58:07.533 I/Dobby ( 1727): [*] [insn relocate] relocated 0xa233201d - 28
10-11 14:58:07.533 I/Dobby ( 1727): [*] [intercept routing] Active patch
0xa986d374
10-11 14:58:07.533 I/Dobby ( 1727): [*] ================
FunctionInlineReplaceRouting End ================
10-11 14:58:07.544 W/m.emulator.fps( 1727): Accessing hidden method
Ldalvik/system/VMRuntime;->setHiddenApiExemptions([Ljava/lang/String;)V
(blacklist,core-platform-api, reflection, denied)
10-11 14:58:07.550 W/m.emulator.fps( 1727): Accessing hidden method
Ldalvik/system/VMRuntime;->setHiddenApiExemptions([Ljava/lang/String;)V
(blacklist,core-platform-api, reflection, denied)
10-11 14:58:07.551 D/NetworkSecurityConfig( 1727): No Network Security Config
specified, using platform default
10-11 14:58:07.551 I/MultiDex( 1727): VM with version 2.1.0 has multidex support
10-11 14:58:07.551 I/MultiDex( 1727): Installing application
10-11 14:58:07.551 I/MultiDex( 1727): VM has multidex support, MultiDex support
library is disabled.
10-11 14:58:07.554 I/replaceApplication( 1727): Ok
10-11 14:58:07.554 W/CheckTime( 1727): App running slow: Executing
handleBindApplication : makeApplication took 219ms
10-11 14:58:07.594 E/FPse ( 1727): Device memory:1881Mb
10-11 14:58:07.594 V/Info ( 1727): CPU info available from file /proc/cpuinfo:
10-11 14:58:07.613 V/Info ( 1727): processor : 0
10-11 14:58:07.613 V/Info ( 1727): model name : ARMv8 Processor
10-11 14:58:07.613 V/Info ( 1727): BogoMIPS : 123.22
10-11 14:58:07.613 V/Info ( 1727): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt vfpd32 lpae evtstrm aes pmull sha1 sha2 crc32
10-11 14:58:07.613 V/Info ( 1727): CPU implementer : 0x41
10-11 14:58:07.613 V/Info ( 1727): CPU architecture: 8
10-11 14:58:07.613 V/Info ( 1727): CPU variant : 0x1
10-11 14:58:07.613 V/Info ( 1727): CPU part : 0xd05
10-11 14:58:07.613 V/Info ( 1727): CPU revision : 0
10-11 14:58:07.613 V/Info ( 1727):
10-11 14:58:07.613 V/Info ( 1727): processor : 1
10-11 14:58:07.613 V/Info ( 1727): model name : ARMv8 Processor
10-11 14:58:07.613 V/Info ( 1727): BogoMIPS : 123.22
10-11 14:58:07.613 V/Info ( 1727): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt vfpd32 lpae evtstrm aes pmull sha1 sha2 crc32
10-11 14:58:07.613 V/Info ( 1727): CPU implementer : 0x41
10-11 14:58:07.613 V/Info ( 1727): CPU architecture: 8
10-11 14:58:07.613 V/Info ( 1727): CPU variant : 0x1
10-11 14:58:07.613 V/Info ( 1727): CPU part : 0xd05
10-11 14:58:07.613 V/Info ( 1727): CPU revision : 0
10-11 14:58:07.613 V/Info ( 1727):
10-11 14:58:07.613 V/Info ( 1727): processor : 2
10-11 14:58:07.613 V/Info ( 1727): model name : ARMv8 Processor
10-11 14:58:07.613 V/Info ( 1727): BogoMIPS : 123.22
10-11 14:58:07.613 V/Info ( 1727): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt vfpd32 lpae evtstrm aes pmull sha1 sha2 crc32
10-11 14:58:07.613 V/Info ( 1727): CPU implementer : 0x41
10-11 14:58:07.613 V/Info ( 1727): CPU architecture: 8
10-11 14:58:07.613 V/Info ( 1727): CPU variant : 0x1
10-11 14:58:07.613 V/Info ( 1727): CPU part : 0xd05
10-11 14:58:07.613 V/Info ( 1727): CPU revision : 0
10-11 14:58:07.613 V/Info ( 1727):
10-11 14:58:07.613 V/Info ( 1727): processor : 3
10-11 14:58:07.613 V/Info ( 1727): model name : ARMv8 Processor
10-11 14:58:07.613 V/Info ( 1727): BogoMIPS : 84.72
10-11 14:58:07.613 V/Info ( 1727): Features : half thumb fastmult vfp edsp neon
vfpv3 tls vfpv4 idiva idivt vfpd32 lpae evtstrm aes pmull sha1 sha2 crc32
10-11 14:58:07.613 V/Info ( 1727): CPU implement
10-11 14:58:07.617 I/F_PATH ( 1727): CPU arch:armv7l
10-11 14:58:07.646 E/FPSE ( 1727): AudioFPB:960 AudioSR:48000
10-11 14:58:07.661 W/mount ( 1779): type=1400 audit(0.0:616000): avc: denied
{ getattr } for path="/mnt/vendor" dev="mmcblk0p1" ino=2
scontext=u:r:untrusted_app:s0:c221,c258,c512,c768 tcontext=u:object_r:prod_file:s0
tclass=dir permissive=0 app=com.emulator.fpse
10-11 14:58:07.661 W/mount ( 1779): type=1400 audit(0.0:616001): avc: denied
{ search } for name="/" dev="mmcblk0p1" ino=2
scontext=u:r:untrusted_app:s0:c221,c258,c512,c768 tcontext=u:object_r:prod_file:s0
tclass=dir permissive=0 app=com.emulator.fpse
10-11 14:58:07.661 W/mount ( 1779): type=1400 audit(0.0:616002): avc: denied
{ search } for name="/" dev="mmcblk0p1" ino=2
scontext=u:r:untrusted_app:s0:c221,c258,c512,c768 tcontext=u:object_r:prod_file:s0
tclass=dir permissive=0 app=com.emulator.fpse
10-11 14:58:07.765 E/FPse ( 1727): Available memory:1102Mb
10-11 14:58:07.765 E/FPSE ( 1727): Model:T810

You might also like