--------- beginning of main 09-23 13:39:42.247 403 403 W auditd : type=2000 audit(0.0:1): initialized 09-23 13:39:44.699 403 403 I auditd : type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295 09-23 13:39:44.719 1 1 I init : type=1400 audit(0.0:3): avc: denied { setcheckreqprot } for scontext=u:r:init:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1 09-23 13:39:44.919 1 1 I init : type=1400 audit(0.0:4): avc: denied { create } for name="bin" scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=1 09-23 13:39:44.919 1 1 I init : type=1400 audit(0.0:5): avc: denied { create } for name="sh" scontext=u:r:init:s0 tcontext=u:object_r:shell_exec:s0 tclass=lnk_file permissive=1 09-23 13:39:44.919 1 1 I init : type=1400 audit(0.0:6): avc: denied { create } for name="manifest.xml" scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=lnk_file permissive=1 09-23 13:39:44.929 1 1 I init : type=1400 audit(0.0:7): avc: denied { module_request } for kmod="fs-functionfs" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1 09-23 13:39:44.929 403 403 I init : type=1400 audit(0.0:8): avc: denied { entrypoint } for path="/sbin/logd" dev="rootfs" ino=11431 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 09-23 13:39:44.929 403 403 I logd : type=1400 audit(0.0:9): avc: denied { read execute } for path="/sbin/logd" dev="rootfs" ino=11431 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 09-23 13:39:44.929 403 403 I logd : type=1400 audit(0.0:10): avc: denied { getattr } for path="/sbin/logd" dev="rootfs" ino=11431 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 09-23 13:39:44.949 407 407 I setenforce: type=1400 audit(0.0:12): avc: denied { write } for name="enforce" dev="selinuxfs" ino=4 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 09-23 13:39:44.959 400 400 I hwservicemanage: type=1400 audit(0.0:13): avc: denied { read } for name="plat_hwservice_contexts" dev="rootfs" ino=11219 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1 09-23 13:39:44.959 400 400 I hwservicemanage: type=1400 audit(0.0:14): avc: denied { open } for path="/vendor_hwservice_contexts" dev="rootfs" ino=11704 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1 09-23 13:39:44.959 400 400 I hwservicemanage: type=1400 audit(0.0:15): avc: denied { getattr } for path="/vendor_hwservice_contexts" dev="rootfs" ino=11704 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1 09-23 13:39:44.959 400 400 I hwservicemanage: type=1400 audit(0.0:16): avc: denied { create } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1 09-23 13:39:44.959 400 400 I hwservicemanage: type=1400 audit(0.0:17): avc: denied { bind } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1 09-23 13:39:44.959 400 400 I hwservicemanage: type=1400 audit(0.0:18): avc: denied { read } for name="perms" dev="selinuxfs" ino=67112181 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1 09-23 13:39:44.959 400 400 I hwservicemanage: type=1400 audit(0.0:19): avc: denied { open } for path="/sys/fs/selinux/class/hwservice_manager/perms" dev="selinuxfs" ino=67112181 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1 09-23 13:39:44.959 400 400 I hwservicemanage: type=1400 audit(0.0:20): avc: denied { compute_av } for scontext=u:r:recovery:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1 09-23 13:39:44.972 400 400 E SELinux : avc: denied { add } for interface=android.hidl.manager::IServiceManager sid=u:r:recovery:s0 pid=400 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_manager_hwservice:s0 tclass=hwservice_manager permissive=1 09-23 13:39:44.973 400 400 E SELinux : avc: denied { add } for interface=android.hidl.base::IBase sid=u:r:recovery:s0 pid=400 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1 09-23 13:39:44.973 400 400 E SELinux : avc: denied { add } for interface=android.hidl.token::ITokenManager sid=u:r:recovery:s0 pid=400 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_token_hwservice:s0 tclass=hwservice_manager permissive=1 09-23 13:39:44.974 400 400 I hwservicemanager: hwservicemanager is ready now. 09-23 13:39:45.000 426 426 D QSEECOMD: : qseecom listener services process entry PPID = 1 09-23 13:39:45.000 426 426 E QSEECOMD: : Listener: index = 0, hierarchy = 0 09-23 13:39:45.000 426 426 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds 09-23 13:39:45.000 426 426 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_init_service) succeeds 09-23 13:39:45.001 426 426 I rpmb_emmc: RPMB Mult (512-bytes sector) = 32768, Rel_sec_cnt = 32 09-23 13:39:45.001 426 426 E DrmLibRpmb: rpmb_init succeeded! with ret = 0 09-23 13:39:45.001 426 426 D QSEECOMD: : Init rpmb_init_service ret = 0 09-23 13:39:45.001 426 426 D QSEECOMD: : RPMB system services: init (Listener ID = 8192) 09-23 13:39:45.001 426 426 E QSEECOMD: : Listener: index = 1, hierarchy = 0 09-23 13:39:45.001 426 426 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds 09-23 13:39:45.001 426 426 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_init_service) succeeds 09-23 13:39:45.014 426 426 E QSEECOMD: : Init dlopen(libsecureui.so, RLTD_NOW) is failed.... dlopen failed: cannot locate symbol "_ZN7android8hardware23getOrCreateCachedBinderEPNS_4hidl4base4V1_05IBaseE" referenced by "/vendor/lib/vendor.display.config@1.0.so"... 09-23 13:39:45.014 426 426 D QSEECOMD: : SEC_UI_INIT failed, shall not start secure ui listener 09-23 13:39:45.014 426 426 D QSEECOMD: : qseecom listener service threads starting!!! 09-23 13:39:45.014 426 426 D QSEECOMD: : Total listener services to start = 10 09-23 13:39:45.014 426 426 E QSEECOMD: : Listener: index = 0, hierarchy = 1 09-23 13:39:45.014 426 426 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds 09-23 13:39:45.014 426 426 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_start) succeeds 09-23 13:39:45.014 426 426 D QSEECOMAPI: QSEECom_register_listener 8192 sb_length = 0x6400 09-23 13:39:45.015 426 426 D QSEECOMD: : Init rpmb_start ret = 0 09-23 13:39:45.015 426 426 D QSEECOMD: : RPMB system services: Started (Listener ID = 8192) 09-23 13:39:45.015 426 426 E QSEECOMD: : Listener: index = 1, hierarchy = 1 09-23 13:39:45.015 426 426 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds 09-23 13:39:45.015 426 426 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_start) succeeds 09-23 13:39:45.015 426 426 D QSEECOMAPI: QSEECom_register_listener 12288 sb_length = 0x5000 09-23 13:39:45.016 426 426 D QSEECOMD: : Init ssd_start ret = 0 09-23 13:39:45.016 426 426 D QSEECOMD: : SSD system services: Started (Listener ID = 12288) 09-23 13:39:45.016 426 426 E QSEECOMD: : Listener: index = 2, hierarchy = 1 09-23 13:39:45.016 426 426 E QSEECOMD: : Init dlopen(libsecureui.so, RLTD_NOW) is failed.... dlopen failed: library "libhidlbase.so" not found 09-23 13:39:45.016 426 426 E QSEECOMD: : Listener: index = 3, hierarchy = 1 09-23 13:39:45.017 426 426 D QSEECOMD: : Init dlopen(libdrmtime.so, RTLD_NOW) succeeds 09-23 13:39:45.017 426 426 D QSEECOMD: : Init::Init dlsym(g_FSHandle atime_start) succeeds 09-23 13:39:45.017 426 426 D DrmLibTime: QSEE Time Listener: atime_start 09-23 13:39:45.017 426 426 D QSEECOMAPI: QSEECom_register_listener 11 sb_length = 0x5000 09-23 13:39:45.017 426 426 D DrmLibTime: registering fs service to QSEECom is done! 09-23 13:39:45.017 426 426 D DrmLibTime: begin to create a thread! 09-23 13:39:45.018 426 426 D DrmLibTime: Creating a pthread in atime_start is done! return 0 09-23 13:39:45.018 426 426 D QSEECOMD: : Init atime_start ret = 0 09-23 13:39:45.018 426 426 D QSEECOMD: : time services: Started (Listener ID = 11) 09-23 13:39:45.018 426 426 E QSEECOMD: : Listener: index = 4, hierarchy = 1 09-23 13:39:45.018 426 431 D DrmLibTime: QSEE Time Listener: dispatch 09-23 13:39:45.018 426 426 D QSEECOMD: : Init dlopen(libdrmfs.so, RTLD_NOW) succeeds 09-23 13:39:45.018 426 431 D DrmLibTime: before calling ioctl to read the next time_cmd 09-23 13:39:45.018 426 426 D QSEECOMD: : Init::Init dlsym(g_FSHandle fs_start) succeeds 09-23 13:39:45.018 426 426 D QSEECOMAPI: QSEECom_register_listener 10 sb_length = 0x5000 09-23 13:39:45.018 426 426 D QSEECOMD: : Init fs_start ret = 0 09-23 13:39:45.018 426 426 D QSEECOMD: : file system services: Started (Listener ID = 10) 09-23 13:39:45.018 426 426 E QSEECOMD: : Listener: index = 5, hierarchy = 1 09-23 13:39:45.018 426 426 D QSEECOMD: : Init dlopen(libdrmfs.so, RTLD_NOW) succeeds 09-23 13:39:45.018 426 426 D QSEECOMD: : Init::Init dlsym(g_FSHandle gpfs_start) succeeds 09-23 13:39:45.019 426 426 D QSEECOMAPI: QSEECom_register_listener 28672 sb_length = 0x7e000 09-23 13:39:45.021 426 426 D QSEECOMD: : Init gpfs_start ret = 0 09-23 13:39:45.021 426 426 D QSEECOMD: : gpfile system services: Started (Listener ID = 28672) 09-23 13:39:45.021 426 426 E QSEECOMD: : Listener: index = 6, hierarchy = 1 09-23 13:39:45.022 426 426 D QSEECOMD: : Init dlopen(libqisl.so, RTLD_NOW) succeeds 09-23 13:39:45.022 426 426 D QSEECOMD: : Init::Init dlsym(g_FSHandle qisl_start) succeeds --------- beginning of system 09-23 13:39:45.022 426 434 I QISL : QSEE Interrupt Service Listener Thread is started 09-23 13:39:45.022 426 434 D QSEECOMAPI: QSEECom_register_listener 36864 sb_length = 0x1f4 09-23 13:39:45.023 426 434 I QISL : QSEE Interrupt Service Listener was activated successfully 09-23 13:39:45.023 426 426 D QSEECOMD: : Init qisl_start ret = 0 09-23 13:39:45.023 426 426 D QSEECOMD: : interrupt services: Started (Listener ID = 36864) 09-23 13:39:45.023 426 426 E QSEECOMD: : Listener: index = 7, hierarchy = 1 09-23 13:39:45.023 426 426 E QSEECOMD: : Init dlopen(libspl.so, RLTD_NOW) is failed.... dlopen failed: library "libspl.so" not found 09-23 13:39:45.023 426 426 E QSEECOMD: : Listener: index = 8, hierarchy = 1 09-23 13:39:45.023 426 426 D QSEECOMD: : Init dlopen(libGPreqcancel.so, RTLD_NOW) succeeds 09-23 13:39:45.023 426 426 D QSEECOMD: : Init::Init dlsym(g_FSHandle gp_reqcancel_start) succeeds 09-23 13:39:45.023 426 426 D QSEECOMAPI: QSEECom_register_listener 4352 sb_length = 0x5000 09-23 13:39:45.028 426 426 D QSEECOMD: : Init gp_reqcancel_start ret = 0 09-23 13:39:45.028 426 426 D QSEECOMD: : gp request cancellation services: Started (Listener ID = 4352) 09-23 13:39:45.028 426 426 E QSEECOMD: : Listener: index = 9, hierarchy = 1 09-23 13:39:45.028 426 426 E QSEECOMD: : Init dlopen(libops.so, RLTD_NOW) is failed.... dlopen failed: library "libops.so" not found 09-23 13:39:45.029 426 426 D QSEECOMD: : QSEECOM DAEMON RUNNING 09-23 13:39:45.048 439 439 I SELinux : SELinux: Loaded service_contexts from: 09-23 13:39:45.048 439 439 I SELinux : /plat_service_contexts 09-23 13:39:45.048 439 439 I SELinux : /vendor_service_contexts 09-23 13:39:45.051 438 438 E cutils-trace: Error opening trace file: No such file or directory (2) 09-23 13:39:45.051 400 400 E cutils-trace: Error opening trace file: No such file or directory (2) 09-23 13:39:45.052 400 400 E SELinux : avc: denied { find } for interface=android.hardware.gatekeeper::IGatekeeper sid=u:r:recovery:s0 pid=438 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1 09-23 13:39:45.056 437 437 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000 09-23 13:39:45.056 437 437 D QSEECOMAPI: App is already loaded QSEE and app id = 65537 09-23 13:39:45.059 437 437 E KeymasterUtils: TA API Major Version: 4 09-23 13:39:45.059 437 437 E KeymasterUtils: TA API Minor Version: 0 09-23 13:39:45.059 437 437 E KeymasterUtils: TA Major Version: 4 09-23 13:39:45.059 437 437 E KeymasterUtils: TA Minor Version: 157 09-23 13:39:45.059 438 438 D vndksupport: Loading /vendor/lib/hw/android.hardware.gatekeeper@1.0-impl-qti.so from current namespace instead of sphal namespace. 09-23 13:39:45.060 437 437 E KeyMasterHalDevice: Keymaster does not support date for security patch level 09-23 13:39:45.061 437 437 I ServiceManagement: Removing namespace from process name android.hardware.keymaster@4.0-service-qti to keymaster@4.0-service-qti. 09-23 13:39:45.061 437 437 E cutils-trace: Error opening trace file: No such file or directory (2) 09-23 13:39:45.062 400 400 E SELinux : avc: denied { add } for interface=android.hardware.keymaster::IKeymasterDevice sid=u:r:recovery:s0 pid=437 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1 09-23 13:39:45.064 438 438 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000 09-23 13:39:45.065 438 438 D QSEECOMAPI: App is already loaded QSEE and app id = 65537 09-23 13:39:45.065 438 438 E KeymasterUtils: TA API Major Version: 4 09-23 13:39:45.065 438 438 E KeymasterUtils: TA API Minor Version: 0 09-23 13:39:45.065 438 438 E KeymasterUtils: TA Major Version: 4 09-23 13:39:45.065 438 438 E KeymasterUtils: TA Minor Version: 157 09-23 13:39:45.066 438 438 I ServiceManagement: Removing namespace from process name android.hardware.gatekeeper@1.0-service-qti to gatekeeper@1.0-service-qti. 09-23 13:39:45.066 400 400 E SELinux : avc: denied { add } for interface=android.hardware.gatekeeper::IGatekeeper sid=u:r:recovery:s0 pid=438 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1 09-23 13:39:45.067 438 438 I android.hardware.gatekeeper@1.0-service: Registration complete for android.hardware.gatekeeper@1.0::IGatekeeper/default. 09-23 13:39:45.584 405 405 I ARMAssembler: generated scanline__00000077:03010101_00008001_00000000 [ 91 ipp] (112 ins) at [0xb18801f0:0xb18803b0] in 144583 ns 09-23 13:39:45.606 405 405 I ARMAssembler: generated scanline__00000077:03545401_00000A01_00000000 [ 37 ipp] (58 ins) at [0xb18803c0:0xb18804a8] in 75885 ns 09-23 13:39:45.611 405 405 I ARMAssembler: generated scanline__00000077:03545401_00000A08_00000000 [ 37 ipp] (59 ins) at [0xb18804b0:0xb188059c] in 58333 ns 07-22 09:27:05.425 405 405 I recovery: type=1400 audit(0.0:54): avc: denied { search } for name="unencrypted" dev="mmcblk0p62" ino=128513 scontext=u:r:recovery:s0 tcontext=u:object_r:unencrypted_data_file:s0 tclass=dir permissive=1 07-22 09:27:05.425 405 405 I recovery: type=1400 audit(0.0:55): avc: denied { getattr } for path="/data/unencrypted/key/version" dev="mmcblk0p62" ino=128515 scontext=u:r:recovery:s0 tcontext=u:object_r:unencrypted_data_file:s0 tclass=file permissive=1 07-22 09:27:05.425 405 405 I recovery: type=1400 audit(0.0:56): avc: denied { read } for name="version" dev="mmcblk0p62" ino=128515 scontext=u:r:recovery:s0 tcontext=u:object_r:unencrypted_data_file:s0 tclass=file permissive=1 07-22 09:27:05.425 405 405 I recovery: type=1400 audit(0.0:57): avc: denied { open } for path="/data/unencrypted/key/version" dev="mmcblk0p62" ino=128515 scontext=u:r:recovery:s0 tcontext=u:object_r:unencrypted_data_file:s0 tclass=file permissive=1 07-22 09:27:05.437 405 405 W libc : Unable to set property "ro.crypto.state" to "encrypted": error code: 0xb 07-22 09:27:05.438 405 405 W libc : Unable to set property "ro.crypto.type" to "file": error code: 0xb 07-22 09:27:05.440 405 405 E cutils-trace: Error opening trace file: No such file or directory (2) 07-22 09:27:05.447 400 400 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest. 07-22 09:27:05.448 400 400 E SELinux : avc: denied { find } for interface=android.hardware.keymaster::IKeymasterDevice sid=u:r:recovery:s0 pid=405 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1 07-22 09:27:05.450 400 400 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest. 07-22 09:27:05.451 405 405 I /sbin/recovery: List of Keymaster HALs found: 07-22 09:27:05.451 405 405 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default 07-22 09:27:05.455 405 405 I recovery: type=1400 audit(0.0:58): avc: denied { write } for scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=key permissive=1 07-22 09:27:05.456 437 437 E KeyMasterHalDevice: Begin send cmd failed 07-22 09:27:05.456 437 437 E KeyMasterHalDevice: ret: 0 07-22 09:27:05.456 437 437 E KeyMasterHalDevice: resp->status: -62 07-22 09:27:05.479 400 400 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest. 07-22 09:27:05.481 400 400 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest. 07-22 09:27:05.482 405 405 I /sbin/recovery: List of Keymaster HALs found: 07-22 09:27:05.482 405 405 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default 07-22 09:27:05.485 437 437 E KeyMasterHalDevice: Begin send cmd failed 07-22 09:27:05.485 437 437 E KeyMasterHalDevice: ret: 0 07-22 09:27:05.485 437 437 E KeyMasterHalDevice: resp->status: -62 07-22 09:27:05.495 405 405 W libc : Unable to set property "ro.crypto.state" to "encrypted": error code: 0xb 07-22 09:27:05.553 405 405 W libc : Unable to set property "ro.crypto.state" to "encrypted": error code: 0xb 07-22 09:27:06.435 405 405 I recovery: type=1400 audit(0.0:237): avc: denied { getattr } for path="/data/data/nxbzSAQKMTTTHH8btOgeEL4iFyO" dev="mmcblk0p62" ino=395249 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c56,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:06.435 405 405 I recovery: type=1400 audit(0.0:238): avc: denied { read } for name="nxbzSAQKMTTTHH8btOgeEL4iFyO" dev="mmcblk0p62" ino=395249 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c56,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:06.435 405 405 I recovery: type=1400 audit(0.0:239): avc: denied { open } for path="/data/data/nxbzSAQKMTTTHH8btOgeEL4iFyO" dev="mmcblk0p62" ino=395249 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c56,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:06.435 405 405 I recovery: type=1400 audit(0.0:240): avc: denied { search } for name="nxbzSAQKMTTTHH8btOgeEL4iFyO" dev="mmcblk0p62" ino=395249 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c56,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:06.445 405 405 I recovery: type=1400 audit(0.0:241): avc: denied { getattr } for path="/data/data/26qjOGI4jnOyhDSsC6jtZtvLiUvKnC+KLmfa0zVb4IH" dev="mmcblk0p62" ino=143269 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c48,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:07.485 405 405 I recovery: type=1400 audit(0.0:269): avc: denied { getattr } for path="/data/data/b6XOR7hrVJTbnqXyz1FsNBrO,4L" dev="mmcblk0p62" ino=128702 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c205,c256,c512,c768 tclass=lnk_file permissive=1 07-22 09:27:07.485 405 405 I recovery: type=1400 audit(0.0:270): avc: denied { getattr } for path="/data/data/3Y2AIeDd6xcf,+QpKLvj,M,PByAn8TjCVXvleqXbMaB" dev="mmcblk0p62" ino=648239 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c76,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:07.485 405 405 I recovery: type=1400 audit(0.0:271): avc: denied { read } for name="3Y2AIeDd6xcf,+QpKLvj,M,PByAn8TjCVXvleqXbMaB" dev="mmcblk0p62" ino=648239 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c76,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:07.485 405 405 I recovery: type=1400 audit(0.0:272): avc: denied { open } for path="/data/data/3Y2AIeDd6xcf,+QpKLvj,M,PByAn8TjCVXvleqXbMaB" dev="mmcblk0p62" ino=648239 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c76,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:07.485 405 405 I recovery: type=1400 audit(0.0:273): avc: denied { search } for name="3Y2AIeDd6xcf,+QpKLvj,M,PByAn8TjCVXvleqXbMaB" dev="mmcblk0p62" ino=648239 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c76,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:08.775 405 405 I recovery: type=1400 audit(0.0:330): avc: denied { getattr } for path="/data/data/262LmG07jax0Z9ejTcxEp8gntfBb8HHX2L8ZI4tom6J" dev="mmcblk0p62" ino=129025 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c176,c256,c512,c768 tclass=lnk_file permissive=1 07-22 09:27:08.775 405 405 I recovery: type=1400 audit(0.0:331): avc: denied { getattr } for path="/data/data/EhPA21SXiB8+2rjCpFC6KuiRU7J" dev="mmcblk0p62" ino=257474 scontext=u:r:recovery:s0 tcontext=u:object_r:shell_data_file:s0 tclass=dir permissive=1 07-22 09:27:08.775 405 405 I recovery: type=1400 audit(0.0:332): avc: denied { read } for name="EhPA21SXiB8+2rjCpFC6KuiRU7J" dev="mmcblk0p62" ino=257474 scontext=u:r:recovery:s0 tcontext=u:object_r:shell_data_file:s0 tclass=dir permissive=1 07-22 09:27:08.775 405 405 I recovery: type=1400 audit(0.0:333): avc: denied { open } for path="/data/data/EhPA21SXiB8+2rjCpFC6KuiRU7J" dev="mmcblk0p62" ino=257474 scontext=u:r:recovery:s0 tcontext=u:object_r:shell_data_file:s0 tclass=dir permissive=1 07-22 09:27:08.775 405 405 I recovery: type=1400 audit(0.0:334): avc: denied { search } for name="EhPA21SXiB8+2rjCpFC6KuiRU7J" dev="mmcblk0p62" ino=257474 scontext=u:r:recovery:s0 tcontext=u:object_r:shell_data_file:s0 tclass=dir permissive=1 07-22 09:27:09.429 475 476 I adbd : initializing functionfs 07-22 09:27:09.429 475 476 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0 07-22 09:27:09.432 475 476 I adbd : functionfs successfully initialized 07-22 09:27:09.432 475 476 I adbd : registering usb transport 07-22 09:27:09.433 475 477 E cutils-trace: Error opening trace file: No such file or directory (2) 07-22 09:27:09.975 405 405 I recovery: type=1400 audit(0.0:448): avc: denied { getattr } for path="/data/data/g2lMsscJjG4ZtBQ8vWUy+VN9EmB" dev="mmcblk0p62" ino=128760 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c224,c256,c512,c768 tclass=lnk_file permissive=1 07-22 09:27:10.005 405 405 I recovery: type=1400 audit(0.0:449): avc: denied { getattr } for path="/data/data/LGqjT+Fe1VK0IoFP2HZUNB" dev="mmcblk0p62" ino=643662 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c67,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:10.005 405 405 I recovery: type=1400 audit(0.0:450): avc: denied { read } for name="LGqjT+Fe1VK0IoFP2HZUNB" dev="mmcblk0p62" ino=643662 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c67,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:10.005 405 405 I recovery: type=1400 audit(0.0:451): avc: denied { open } for path="/data/data/LGqjT+Fe1VK0IoFP2HZUNB" dev="mmcblk0p62" ino=643662 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c67,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:10.005 405 405 I recovery: type=1400 audit(0.0:452): avc: denied { search } for name="LGqjT+Fe1VK0IoFP2HZUNB" dev="mmcblk0p62" ino=643662 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c67,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:10.985 405 405 I recovery: type=1400 audit(0.0:512): avc: denied { getattr } for path="/data/data/nCRZhYVd7Nd7M32zcaKERRsJu7ygLvO2Ke0XSrEXA7G" dev="mmcblk0p62" ino=132213 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c32,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:10.985 405 405 I recovery: type=1400 audit(0.0:513): avc: denied { read } for name="nCRZhYVd7Nd7M32zcaKERRsJu7ygLvO2Ke0XSrEXA7G" dev="mmcblk0p62" ino=132213 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c32,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:10.985 405 405 I recovery: type=1400 audit(0.0:514): avc: denied { open } for path="/data/data/nCRZhYVd7Nd7M32zcaKERRsJu7ygLvO2Ke0XSrEXA7G" dev="mmcblk0p62" ino=132213 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c32,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:10.985 405 405 I recovery: type=1400 audit(0.0:515): avc: denied { search } for name="nCRZhYVd7Nd7M32zcaKERRsJu7ygLvO2Ke0XSrEXA7G" dev="mmcblk0p62" ino=132213 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c32,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:10.995 405 405 I recovery: type=1400 audit(0.0:516): avc: denied { getattr } for path="/data/data/nCRZhYVd7Nd7M32zcaKERRsJu7ygLvO2Ke0XSrEXA7G/0VxvsZfoeNhs1irH7JmlBA/7vsppVAHfpgYQT5+c23iIC" dev="mmcblk0p62" ino=131866 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c32,c257,c512,c768 tclass=file permissive=1 07-22 09:27:12.005 405 405 I recovery: type=1400 audit(0.0:564): avc: denied { getattr } for path="/data/system/heapdump" dev="mmcblk0p62" ino=1029660 scontext=u:r:recovery:s0 tcontext=u:object_r:heapdump_data_file:s0 tclass=dir permissive=1 07-22 09:27:12.005 405 405 I recovery: type=1400 audit(0.0:565): avc: denied { read } for name="heapdump" dev="mmcblk0p62" ino=1029660 scontext=u:r:recovery:s0 tcontext=u:object_r:heapdump_data_file:s0 tclass=dir permissive=1 07-22 09:27:12.005 405 405 I recovery: type=1400 audit(0.0:566): avc: denied { open } for path="/data/system/heapdump" dev="mmcblk0p62" ino=1029660 scontext=u:r:recovery:s0 tcontext=u:object_r:heapdump_data_file:s0 tclass=dir permissive=1 07-22 09:27:12.005 405 405 I recovery: type=1400 audit(0.0:567): avc: denied { getattr } for path="/data/unencrypted" dev="mmcblk0p62" ino=128513 scontext=u:r:recovery:s0 tcontext=u:object_r:unencrypted_data_file:s0 tclass=dir permissive=1 07-22 09:27:12.015 405 405 I recovery: type=1400 audit(0.0:568): avc: denied { getattr } for path="/data/system_ce/0/TdLQJcSu45DqeWNSChMMkD/LjGGlqGf9qp+zYzAhOR,9B" dev="mmcblk0p62" ino=1028105 scontext=u:r:recovery:s0 tcontext=u:object_r:shortcut_manager_icons:s0 tclass=dir permissive=1 07-22 09:27:13.325 405 405 I recovery: type=1400 audit(0.0:1124): avc: denied { module_request } for kmod="fs-auto" scontext=u:r:recovery:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1 07-22 09:27:13.635 405 405 I recovery: type=1400 audit(0.0:1125): avc: denied { write } for name="fstab" dev="rootfs" ino=13403 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 07-22 09:27:13.635 405 405 I recovery: type=1400 audit(0.0:1126): avc: denied { create } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_kobject_uevent_socket permissive=1 07-22 09:27:13.635 405 405 I recovery: type=1400 audit(0.0:1127): avc: denied { bind } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_kobject_uevent_socket permissive=1 07-22 09:27:13.835 405 405 I recovery: type=1400 audit(0.0:1128): avc: denied { getattr } for path="/sdcard/CQ9k3rrgs8pBUgywjRggRA" dev="mmcblk0p62" ino=901543 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c109,c257,c512,c768 tclass=dir permissive=1 07-22 09:27:14.255 405 405 I ARMAssembler: generated scanline__00000077:03545401_00000000_00000000 [ 36 ipp] (50 ins) at [0xb18805a0:0xb1880668] in 53437 ns 07-22 09:27:24.405 405 405 I recovery: type=1400 audit(0.0:1213): avc: denied { read } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_kobject_uevent_socket permissive=1 07-22 09:28:13.265 405 405 I recovery: type=1400 audit(0.0:1214): avc: denied { write } for name="brightness" dev="sysfs" ino=28530 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 07-22 09:37:35.208 478 478 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 09:37:35.208 478 478 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 09:37:35.209 475 475 I adbd : closing functionfs transport 07-22 09:37:35.283 475 476 I adbd : initializing functionfs 07-22 09:37:35.283 475 476 I adbd : functionfs successfully initialized 07-22 09:37:35.283 475 476 I adbd : registering usb transport 07-22 09:45:41.725 506 506 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 09:45:41.725 506 506 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 09:45:41.726 475 475 I adbd : closing functionfs transport 07-22 09:45:41.793 475 476 I adbd : initializing functionfs 07-22 09:45:41.793 475 476 I adbd : functionfs successfully initialized 07-22 09:45:41.793 475 476 I adbd : registering usb transport 07-22 09:46:48.452 475 514 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 09:46:48.452 475 514 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 09:46:48.453 475 475 I adbd : closing functionfs transport 07-22 09:46:48.533 475 476 I adbd : initializing functionfs 07-22 09:46:48.533 475 476 I adbd : functionfs successfully initialized 07-22 09:46:48.533 475 476 I adbd : registering usb transport 07-22 09:54:03.411 517 517 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 09:54:03.411 517 517 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 09:54:03.412 475 475 I adbd : closing functionfs transport 07-22 09:54:03.483 475 476 I adbd : initializing functionfs 07-22 09:54:03.483 475 476 I adbd : functionfs successfully initialized 07-22 09:54:03.483 475 476 I adbd : registering usb transport 07-22 09:56:12.397 475 524 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 09:56:12.397 475 524 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 09:56:12.398 475 475 I adbd : closing functionfs transport 07-22 09:56:12.473 475 476 I adbd : initializing functionfs 07-22 09:56:12.473 475 476 I adbd : functionfs successfully initialized 07-22 09:56:12.473 475 476 I adbd : registering usb transport 07-22 10:12:15.418 527 527 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 10:12:15.418 527 527 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 10:12:15.419 475 475 I adbd : closing functionfs transport 07-22 10:12:15.493 475 476 I adbd : initializing functionfs 07-22 10:12:15.493 475 476 I adbd : functionfs successfully initialized 07-22 10:12:15.493 475 476 I adbd : registering usb transport 07-22 12:31:55.531 535 535 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 12:31:55.531 535 535 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 12:31:55.532 475 475 I adbd : closing functionfs transport 07-22 12:31:55.603 475 476 I adbd : initializing functionfs 07-22 12:31:55.603 475 476 I adbd : functionfs successfully initialized 07-22 12:31:55.603 475 476 I adbd : registering usb transport 07-22 13:23:38.619 475 587 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 13:23:38.619 475 587 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 13:23:38.619 475 475 I adbd : closing functionfs transport 07-22 13:23:38.693 475 476 I adbd : initializing functionfs 07-22 13:23:38.693 475 476 I adbd : functionfs successfully initialized 07-22 13:23:38.693 475 476 I adbd : registering usb transport 07-22 13:37:52.005 608 608 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 13:37:52.005 608 608 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 13:37:52.005 475 475 I adbd : closing functionfs transport 07-22 13:37:52.093 475 476 I adbd : initializing functionfs 07-22 13:37:52.093 475 476 I adbd : functionfs successfully initialized 07-22 13:37:52.093 475 476 I adbd : registering usb transport 07-22 13:42:16.952 617 617 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 13:42:16.952 617 617 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 13:42:16.953 475 475 I adbd : closing functionfs transport 07-22 13:42:17.033 475 476 I adbd : initializing functionfs 07-22 13:42:17.033 475 476 I adbd : functionfs successfully initialized 07-22 13:42:17.033 475 476 I adbd : registering usb transport 07-22 13:50:17.535 621 621 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 13:50:17.535 621 621 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 13:50:17.536 475 475 I adbd : closing functionfs transport 07-22 13:50:17.613 475 476 I adbd : initializing functionfs 07-22 13:50:17.613 475 476 I adbd : functionfs successfully initialized 07-22 13:50:17.613 475 476 I adbd : registering usb transport 07-22 13:51:16.783 475 627 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 13:51:16.783 475 627 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 13:51:16.784 475 475 I adbd : closing functionfs transport 07-22 13:51:16.863 475 476 I adbd : initializing functionfs 07-22 13:51:16.863 475 476 I adbd : functionfs successfully initialized 07-22 13:51:16.863 475 476 I adbd : registering usb transport 07-22 13:55:54.520 631 631 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 13:55:54.520 631 631 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 13:55:54.521 475 475 I adbd : closing functionfs transport 07-22 13:55:54.593 475 476 I adbd : initializing functionfs 07-22 13:55:54.593 475 476 I adbd : functionfs successfully initialized 07-22 13:55:54.593 475 476 I adbd : registering usb transport 07-22 14:49:05.295 405 405 I recovery: type=1400 audit(0.0:1215): avc: denied { read } for name="52857973570d786f.pwd" dev="mmcblk0p62" ino=128753 scontext=u:r:recovery:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=1 07-22 14:49:05.295 405 405 I recovery: type=1400 audit(0.0:1216): avc: denied { open } for path="/data/system_de/0/spblob/52857973570d786f.pwd" dev="mmcblk0p62" ino=128753 scontext=u:r:recovery:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=1 07-22 14:49:05.365 405 405 I recovery: type=1400 audit(0.0:1217): avc: denied { call } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1 07-22 14:49:05.365 400 400 I hwservicemanage: type=1400 audit(0.0:1218): avc: denied { transfer } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1 07-22 14:49:05.365 438 438 I gatekeeper@1.0-: type=1400 audit(0.0:1219): avc: denied { ioctl } for path="/dev/qseecom" dev="tmpfs" ino=13368 ioctlcmd=0x9703 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 07-22 14:49:05.385 405 405 I recovery: type=1400 audit(0.0:1220): avc: denied { create } for name="auth_token" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 07-22 14:49:05.385 405 405 I recovery: type=1400 audit(0.0:1221): avc: denied { read } for name="user_0" dev="mmcblk0p62" ino=385605 scontext=u:r:recovery:s0 tcontext=u:object_r:keystore_data_file:s0 tclass=dir permissive=1 07-22 14:49:05.390 426 429 I rpmb_emmc: rpmb_emmc_write: blk_cnt: 2, num_rpmb_tx: 1, frames_per_tx: 2, rel_wr_cnt: 32 07-22 14:49:05.394 426 429 I chatty : uid=0(root) /sbin/qseecomd identical 1 line 07-22 14:49:05.395 405 405 I recovery: type=1400 audit(0.0:1222): avc: denied { open } for path="/data/misc/keystore/user_0" dev="mmcblk0p62" ino=385605 scontext=u:r:recovery:s0 tcontext=u:object_r:keystore_data_file:s0 tclass=dir permissive=1 07-22 14:49:05.398 426 429 I rpmb_emmc: rpmb_emmc_write: blk_cnt: 2, num_rpmb_tx: 1, frames_per_tx: 2, rel_wr_cnt: 32 07-22 14:49:05.559 405 654 I ServiceManager: Waiting for service 'android.security.keystore' on '/dev/binder'... 07-22 14:49:05.614 655 655 E cutils-trace: Error opening trace file: No such file or directory (2) 07-22 14:49:05.614 400 400 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.1::IServiceManager/default in either framework or device manifest. 07-22 14:49:05.616 655 655 I keystore: found android.hardware.keymaster@4.0::IKeymasterDevice with interface name default and seclevel TRUSTED_ENVIRONMENT 07-22 14:49:05.618 439 439 E SELinux : avc: denied { add } for service=android.security.keystore pid=655 uid=0 scontext=u:r:recovery:s0 tcontext=u:object_r:keystore_service:s0 tclass=service_manager permissive=1 07-22 14:49:05.619 400 400 E SELinux : avc: denied { add } for interface=android.system.wifi.keystore::IKeystore sid=u:r:recovery:s0 pid=655 scontext=u:r:recovery:s0 tcontext=u:object_r:system_wifi_keystore_hwservice:s0 tclass=hwservice_manager permissive=1 07-22 14:49:05.660 439 439 E SELinux : avc: denied { find } for service=android.security.keystore pid=405 uid=0 scontext=u:r:recovery:s0 tcontext=u:object_r:keystore_service:s0 tclass=service_manager permissive=1 07-22 14:49:05.701 655 655 E SELinux : avc: denied { add_auth } for pid=657 uid=1000 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=keystore_key permissive=1 07-22 14:49:05.701 655 655 D keystore: AddAuthenticationToken: timestamp = 19329072, time_received = 19324 07-22 14:49:05.701 657 657 D : successfully added auth token to keystore 07-22 14:49:05.767 437 437 E KeyMasterHalDevice: get_key_characteristics 07-22 14:49:05.767 437 437 E KeyMasterHalDevice: ret: 0 07-22 14:49:05.767 437 437 E KeyMasterHalDevice: resp->status: -62 07-22 14:49:05.768 655 655 I keystore: upgradeKeyBlob USRPKEY_synthetic_password_52857973570d786f 0 07-22 14:49:05.781 655 655 I keystore: 1 0 07-22 14:49:05.784 655 655 I ServiceManager: Waiting for service 'dropbox' on '/dev/binder'... 07-22 14:49:10.594 655 655 I chatty : uid=0(root) /sbin/keystore identical 48 lines 07-22 14:49:10.694 655 655 I ServiceManager: Waiting for service 'dropbox' on '/dev/binder'... 07-22 14:49:10.794 655 655 W ServiceManager: Service dropbox didn't start. Returning NULL 07-22 14:49:10.795 405 405 I recovery: type=1400 audit(0.0:1232): avc: denied { read } for scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=file permissive=1 07-22 14:49:10.795 405 405 I recovery: type=1400 audit(0.0:1233): avc: denied { read } for scontext=u:r:recovery:s0 tcontext=u:r:kernel:s0 tclass=file permissive=1 07-22 14:49:10.795 405 405 I recovery: type=1400 audit(0.0:1234): avc: denied { search } for name="1" dev="proc" ino=11783 scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=dir permissive=1 07-22 14:49:10.795 405 405 I recovery: type=1400 audit(0.0:1235): avc: denied { open } for path="/proc/1/cmdline" dev="proc" ino=13389 scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=file permissive=1 07-22 14:49:10.795 405 405 I recovery: type=1400 audit(0.0:1236): avc: denied { getattr } for path="/proc/1/cmdline" dev="proc" ino=13389 scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=file permissive=1 07-22 14:49:10.803 439 439 I ServiceManager: service 'android.security.keystore' died 07-22 14:49:11.855 405 405 I recovery: type=1400 audit(0.0:1263): avc: denied { getattr } for path="/data/media/0" dev="mmcblk0p62" ino=257239 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=dir permissive=1 07-22 14:49:12.365 405 405 I recovery: type=1400 audit(0.0:1264): avc: denied { getattr } for path="/data/misc_de/0/storaged" dev="mmcblk0p62" ino=128545 scontext=u:r:recovery:s0 tcontext=u:object_r:storaged_data_file:s0 tclass=dir permissive=1 07-22 14:49:12.365 405 405 I recovery: type=1400 audit(0.0:1265): avc: denied { read } for name="storaged" dev="mmcblk0p62" ino=128545 scontext=u:r:recovery:s0 tcontext=u:object_r:storaged_data_file:s0 tclass=dir permissive=1 07-22 14:49:12.365 405 405 I recovery: type=1400 audit(0.0:1266): avc: denied { open } for path="/data/misc_de/0/storaged" dev="mmcblk0p62" ino=128545 scontext=u:r:recovery:s0 tcontext=u:object_r:storaged_data_file:s0 tclass=dir permissive=1 07-22 14:49:12.365 405 405 I recovery: type=1400 audit(0.0:1267): avc: denied { getattr } for path="/data/misc_de/0/vold" dev="mmcblk0p62" ino=128546 scontext=u:r:recovery:s0 tcontext=u:object_r:vold_data_file:s0 tclass=dir permissive=1 07-22 14:49:13.335 405 405 I recovery: type=1400 audit(0.0:1373): avc: denied { getattr } for path="/data/data/com.android.deskclock/files/miuisdk/modules/com.android.deskclocklib.res20190812.apk" dev="mmcblk0p62" ino=259066 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=lnk_file permissive=1 07-22 14:49:13.345 405 405 I recovery: type=1400 audit(0.0:1374): avc: denied { getattr } for path="/data/data/com.olacabs.customer" dev="mmcblk0p62" ino=129310 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c177,c256,c512,c768 tclass=lnk_file permissive=1 07-22 14:49:13.355 405 405 I recovery: type=1400 audit(0.0:1375): avc: denied { getattr } for path="/data/data/com.airbnb.android" dev="mmcblk0p62" ino=129304 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c211,c256,c512,c768 tclass=lnk_file permissive=1 07-22 14:49:13.395 405 405 I recovery: type=1400 audit(0.0:1376): avc: denied { getattr } for path="/data/data/com.zombodroid.imagecombinerfree/files/myimages/Zombodroid14072021051450.jpg" dev="mmcblk0p62" ino=389431 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c48,c257,c512,c768 tclass=file permissive=1 07-22 14:49:14.025 405 405 I recovery: type=1400 audit(0.0:1377): avc: denied { getattr } for path="/data/data/com.footej.camera2" dev="mmcblk0p62" ino=128702 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c205,c256,c512,c768 tclass=lnk_file permissive=1 07-22 14:49:14.815 405 405 I recovery: type=1400 audit(0.0:1378): avc: denied { getattr } for path="/data/data/com.mventus.selfcare.activity" dev="mmcblk0p62" ino=129025 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c176,c256,c512,c768 tclass=lnk_file permissive=1 07-22 14:49:14.825 405 405 I recovery: type=1400 audit(0.0:1379): avc: denied { getattr } for path="/data/data/com.ebay.mobile" dev="mmcblk0p62" ino=129202 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c217,c256,c512,c768 tclass=lnk_file permissive=1 07-22 14:49:14.835 405 405 I recovery: type=1400 audit(0.0:1380): avc: denied { getattr } for path="/data/data/com.teslacoilsw.launcher/lib" dev="mmcblk0p62" ino=129100 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c239,c256,c512,c768 tclass=lnk_file permissive=1 07-22 14:49:15.155 405 405 I recovery: type=1400 audit(0.0:1381): avc: denied { getattr } for path="/data/data/com.xiaomi.location.fused/lib" dev="mmcblk0p62" ino=128640 scontext=u:r:recovery:s0 tcontext=u:object_r:system_app_data_file:s0 tclass=lnk_file permissive=1 07-22 14:49:15.155 405 405 I recovery: type=1400 audit(0.0:1382): avc: denied { getattr } for path="/data/data/in.upstox.pro" dev="mmcblk0p62" ino=128584 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c206,c256,c512,c768 tclass=lnk_file permissive=1 07-22 14:49:15.835 405 405 I recovery: type=1400 audit(0.0:1429): avc: denied { getattr } for path="/data/data/com.teslacoilsw.launcher.prime" dev="mmcblk0p62" ino=129105 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c241,c256,c512,c768 tclass=dir permissive=1 07-22 14:49:15.835 405 405 I recovery: type=1400 audit(0.0:1430): avc: denied { read } for name="com.teslacoilsw.launcher.prime" dev="mmcblk0p62" ino=129105 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c241,c256,c512,c768 tclass=dir permissive=1 07-22 14:49:15.835 405 405 I recovery: type=1400 audit(0.0:1431): avc: denied { open } for path="/data/data/com.teslacoilsw.launcher.prime" dev="mmcblk0p62" ino=129105 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c241,c256,c512,c768 tclass=dir permissive=1 07-22 14:49:16.175 405 405 I recovery: type=1400 audit(0.0:1432): avc: denied { getattr } for path="/data/data/com.csam.icici.bank.imobile" dev="mmcblk0p62" ino=129164 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c220,c256,c512,c768 tclass=lnk_file permissive=1 07-22 14:49:16.185 405 405 I recovery: type=1400 audit(0.0:1433): avc: denied { getattr } for path="/data/data/com.camel.corp.universalcopy" dev="mmcblk0p62" ino=129408 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c110,c257,c512,c768 tclass=dir permissive=1 07-22 14:49:16.985 405 405 I recovery: type=1400 audit(0.0:1482): avc: denied { getattr } for path="/data/system/heapdump" dev="mmcblk0p62" ino=1029660 scontext=u:r:recovery:s0 tcontext=u:object_r:heapdump_data_file:s0 tclass=dir permissive=1 07-22 14:49:16.985 405 405 I recovery: type=1400 audit(0.0:1483): avc: denied { read } for name="heapdump" dev="mmcblk0p62" ino=1029660 scontext=u:r:recovery:s0 tcontext=u:object_r:heapdump_data_file:s0 tclass=dir permissive=1 07-22 14:49:16.985 405 405 I recovery: type=1400 audit(0.0:1484): avc: denied { open } for path="/data/system/heapdump" dev="mmcblk0p62" ino=1029660 scontext=u:r:recovery:s0 tcontext=u:object_r:heapdump_data_file:s0 tclass=dir permissive=1 07-22 14:49:16.985 405 405 I recovery: type=1400 audit(0.0:1485): avc: denied { getattr } for path="/data/unencrypted" dev="mmcblk0p62" ino=128513 scontext=u:r:recovery:s0 tcontext=u:object_r:unencrypted_data_file:s0 tclass=dir permissive=1 07-22 14:49:16.995 405 405 I recovery: type=1400 audit(0.0:1486): avc: denied { getattr } for path="/data/system_ce/0/shortcut_service/bitmaps" dev="mmcblk0p62" ino=1028105 scontext=u:r:recovery:s0 tcontext=u:object_r:shortcut_manager_icons:s0 tclass=dir permissive=1 07-22 14:49:18.015 405 405 I recovery: type=1400 audit(0.0:1906): avc: denied { read } for name="temp" dev="sysfs" ino=22004 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 07-22 14:49:18.015 405 405 I recovery: type=1400 audit(0.0:1907): avc: denied { open } for path="/sys/devices/virtual/thermal/thermal_zone0/temp" dev="sysfs" ino=22004 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 07-22 14:49:18.015 405 405 I recovery: type=1400 audit(0.0:1908): avc: denied { getattr } for path="/sys/devices/virtual/thermal/thermal_zone0/temp" dev="sysfs" ino=22004 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 07-22 14:49:18.305 405 405 I recovery: type=1400 audit(0.0:1909): avc: denied { read } for name="mmcblk0p59" dev="sysfs" ino=36493 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1 07-22 14:49:18.305 405 405 I recovery: type=1400 audit(0.0:1910): avc: denied { open } for path="/sys/devices/platform/soc/7824900.sdhci/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p59" dev="sysfs" ino=36493 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1 07-22 14:49:19.255 405 405 I recovery: type=1400 audit(0.0:1916): avc: denied { write } for name="fstab" dev="rootfs" ino=13403 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 07-22 14:49:20.265 405 405 I recovery: type=1400 audit(0.0:1917): avc: denied { write } for name="duration" dev="sysfs" ino=34969 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 07-22 14:49:20.715 405 405 I recovery: type=1400 audit(0.0:1918): avc: denied { fsetid } for capability=4 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability permissive=1 07-22 14:49:20.735 405 405 I recovery: type=1400 audit(0.0:1919): avc: denied { read } for name=".twrps" dev="mmcblk0p62" ino=257466 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1 07-22 14:49:20.735 405 405 I recovery: type=1400 audit(0.0:1920): avc: denied { open } for path="/data/media/0/TWRP/.twrps" dev="mmcblk0p62" ino=257466 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1 07-22 14:49:20.735 405 405 I recovery: type=1400 audit(0.0:1921): avc: denied { getattr } for path="/data/media/0/TWRP/.twrps" dev="mmcblk0p62" ino=257466 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1 07-22 14:49:20.853 703 705 I adbd : initializing functionfs 07-22 14:49:20.853 703 705 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0 07-22 14:49:20.873 703 705 I adbd : functionfs successfully initialized 07-22 14:49:20.873 703 705 I adbd : registering usb transport 07-22 14:49:20.874 703 706 E cutils-trace: Error opening trace file: No such file or directory (2) 07-22 14:49:21.035 405 405 I recovery: type=1400 audit(0.0:1922): avc: denied { create } for name="twadbfifo" scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1 07-22 14:49:21.035 405 405 I recovery: type=1400 audit(0.0:1923): avc: denied { read } for name="twadbfifo" dev="tmpfs" ino=19704 scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1 07-22 14:49:21.035 405 405 I recovery: type=1400 audit(0.0:1924): avc: denied { unlink } for name="orsin" dev="rootfs" ino=13407 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=fifo_file permissive=1 07-22 14:49:21.035 405 405 I recovery: type=1400 audit(0.0:1925): avc: denied { open } for path="/tmp/twadbfifo" dev="tmpfs" ino=19704 scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1 07-22 14:52:47.525 704 704 I recovery: type=1400 audit(0.0:1940): avc: denied { ioctl } for path="/dev/mtp_usb" dev="tmpfs" ino=14730 ioctlcmd=0x4d03 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1 --------- beginning of main 07-22 15:03:24.135 359 359 I kworker/u16:3: type=1400 audit(0.0:1941): avc: denied { kill } for capability=5 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=capability permissive=1 07-22 15:08:11.939 707 707 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 15:08:11.940 707 707 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 15:08:11.941 703 703 I adbd : closing functionfs transport 07-22 15:08:12.013 703 705 I adbd : initializing functionfs 07-22 15:08:12.013 703 705 I adbd : functionfs successfully initialized 07-22 15:08:12.013 703 705 I adbd : registering usb transport 07-22 15:08:22.304 703 758 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 07-22 15:08:22.304 703 758 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 07-22 15:08:22.305 703 703 I adbd : closing functionfs transport 07-22 15:08:22.373 703 705 I adbd : initializing functionfs 07-22 15:08:22.373 703 705 I adbd : functionfs successfully initialized 07-22 15:08:22.373 703 705 I adbd : registering usb transport