wrongway213

TWRPCoralStuckSplashScreenAOSiPJune

Jun 6th, 2020
571
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 90.31 KB | None | 0 0
  1. 09-22 13:27:58.755   521   521 E libprocessgroup: Failed to read task profiles from /etc/task_profiles.json
  2. 09-22 13:27:58.165   521   521 W auditd  : type=2000 audit(0.0:1): state=initialized audit_enabled=0 res=1
  3. 09-22 13:27:58.583   521   521 I auditd  : type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295
  4. 09-22 13:27:58.583   521   521 W auditd  : type=1404 audit(0.0:3): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295
  5. 09-22 13:27:58.603   507   507 W init    : type=1400 audit(0.0:4): avc: denied { read } for name="bin" dev="rootfs" ino=15369 scontext=u:r:vendor_init:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=0
  6. 09-22 13:27:58.603   506   506 W init    : type=1400 audit(0.0:5): avc: denied { read } for name="bin" dev="rootfs" ino=15369 scontext=u:r:vendor_init:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=0
  7. 09-22 13:27:58.603     1     1 I init    : type=1400 audit(0.0:6): avc: denied { setenforce } for scontext=u:r:init:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1
  8. 09-22 13:27:58.603   521   521 W auditd  : type=1404 audit(0.0:7): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295
  9. 09-22 13:27:58.603   508   508 I init    : type=1400 audit(0.0:8): avc: denied { entrypoint } for path="/sbin/ueventd" dev="rootfs" ino=15335 scontext=u:r:ueventd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  10. 09-22 13:27:58.743     1     1 I init    : type=1400 audit(0.0:9): avc: denied { write } for name="warm_reset" dev="sysfs" ino=43617 scontext=u:r:init:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
  11. 09-22 13:27:58.743     1     1 I init    : type=1400 audit(0.0:10): avc: denied { open } for path="/sys/module/msm_poweroff/parameters/warm_reset" dev="sysfs" ino=43617 scontext=u:r:init:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
  12. 09-22 13:27:58.753   524   524 I modprobe: type=1400 audit(0.0:25): avc: denied { read } for name="modules" dev="proc" ino=4026532155 scontext=u:r:kernel:s0 tcontext=u:object_r:proc_modules:s0 tclass=file permissive=1
  13. 09-22 13:27:58.753   524   524 I modprobe: type=1400 audit(0.0:26): avc: denied { open } for path="/proc/modules" dev="proc" ino=4026532155 scontext=u:r:kernel:s0 tcontext=u:object_r:proc_modules:s0 tclass=file permissive=1
  14. 09-22 13:27:58.753   524   524 I modprobe: type=1400 audit(0.0:27): avc: denied { getattr } for path="/proc/modules" dev="proc" ino=4026532155 scontext=u:r:kernel:s0 tcontext=u:object_r:proc_modules:s0 tclass=file permissive=1
  15. 09-22 13:27:58.755   521   521 E libprocessgroup: Loading /etc/task_profiles.json for [521] failed
  16. 09-22 13:27:58.755   521   521 W libprocessgroup: Failed to find HighEnergySavingtask profile: No such file or directory
  17. 09-22 13:27:58.755   521   521 W libprocessgroup: Failed to find TimerSlackHightask profile: No such file or directory
  18. 09-22 13:27:58.755   521   525 W libprocessgroup: Failed to find HighEnergySavingtask profile: Success
  19. 09-22 13:27:58.755   521   525 W libprocessgroup: Failed to find TimerSlackHightask profile: Success
  20. 09-22 13:27:58.756   528   528 I insmod  : type=1400 audit(0.0:28): avc: denied { sys_module } for capability=16 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability permissive=1
  21. 09-22 13:27:58.756   528   528 I insmod  : type=1400 audit(0.0:29): avc: denied { module_load } for path="/sbin/videobuf2-vmalloc.ko" dev="rootfs" ino=15352 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=system permissive=1
  22. 09-22 13:27:58.783   531   531 I recovery: type=1400 audit(0.0:30): avc: denied { read } for name="backlight" dev="sysfs" ino=30006 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
  23. 09-22 13:27:58.783   531   531 I recovery: type=1400 audit(0.0:31): avc: denied { open } for path="/sys/class/backlight" dev="sysfs" ino=30006 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1
  24. 09-22 13:27:58.820   536   536 I insmod  : type=1400 audit(0.0:32): avc: denied { search } for name="ipc_logging" dev="debugfs" ino=1025 scontext=u:r:recovery:s0 tcontext=u:object_r:debugfs_ipc:s0 tclass=dir permissive=1
  25. 09-22 13:27:59.000   531   531 I recovery: type=1400 audit(0.0:50): avc: denied { read } for name="time" dev="sda2" ino=32 scontext=u:r:recovery:s0 tcontext=u:object_r:persist_time_file:s0 tclass=dir permissive=1
  26. 09-22 13:27:59.000   531   531 I recovery: type=1400 audit(0.0:51): avc: denied { open } for path="/persist/time" dev="sda2" ino=32 scontext=u:r:recovery:s0 tcontext=u:object_r:persist_time_file:s0 tclass=dir permissive=1
  27. 09-22 13:27:59.000   531   531 I recovery: type=1400 audit(0.0:52): avc: denied { read } for name="ats_2" dev="sda2" ino=266 scontext=u:r:recovery:s0 tcontext=u:object_r:persist_time_file:s0 tclass=file permissive=1
  28. 09-22 13:27:59.000   531   531 I recovery: type=1400 audit(0.0:53): avc: denied { open } for path="/persist/time/ats_2" dev="sda2" ino=266 scontext=u:r:recovery:s0 tcontext=u:object_r:persist_time_file:s0 tclass=file permissive=1
  29. 09-22 13:27:59.000   531   531 I recovery: type=1400 audit(0.0:54): avc: denied { getattr } for path="/persist/time/ats_2" dev="sda2" ino=266 scontext=u:r:recovery:s0 tcontext=u:object_r:persist_time_file:s0 tclass=file permissive=1
  30. 09-22 13:27:59.066   531   531 I recovery: type=1400 audit(0.0:33): avc: denied { execmem } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=process permissive=1
  31. 09-22 13:27:59.066   531   531 I recovery: type=1400 audit(0.0:34): avc: denied { execute } for path="/dev/ashmem" dev="tmpfs" ino=794 scontext=u:r:recovery:s0 tcontext=u:object_r:ashmem_device:s0 tclass=chr_file permissive=1
  32. 09-22 13:27:59.069   531   531 E ashmem  : Failed to dlopen() libashmemd_client.so: dlopen failed: library "libashmemd_client.so" not found
  33. 09-22 13:27:59.069   531   531 I ArmToArm64Assembler: generated scanline__00000077:03010101_00008001_00000000 [195 ipp] (241 ins) at [0x707ed003c0:0x707ed00784] in 31614 ns
  34. 09-22 13:27:59.093   531   531 I ArmToArm64Assembler: generated scanline__00000077:03545401_00000A01_00000000 [ 69 ipp] (113 ins) at [0x707ed00790:0x707ed00954] in 34479 ns
  35. 09-22 13:27:59.100   531   531 I recovery: type=1400 audit(0.0:35): avc: denied { write } for name="etc" dev="rootfs" ino=15559 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1
  36. 09-22 13:27:59.100   531   531 I recovery: type=1400 audit(0.0:36): avc: denied { add_name } for name="mtab" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1
  37. 09-22 13:27:59.100   531   531 I recovery: type=1400 audit(0.0:37): avc: denied { create } for name="mtab" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1
  38. 09-22 13:27:59.100   531   531 I recovery: type=1400 audit(0.0:38): avc: denied { create } for name="s" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1
  39. 09-22 13:27:59.100   531   531 I recovery: type=1400 audit(0.0:39): avc: denied { remove_name } for name="s" dev="rootfs" ino=5442 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1
  40. 09-22 13:27:59.100   531   531 I recovery: type=1400 audit(0.0:40): avc: denied { rmdir } for name="s" dev="rootfs" ino=5442 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1
  41. 09-22 13:27:59.100   531   531 I ArmToArm64Assembler: generated scanline__00000077:03545401_00000A08_00000000 [ 69 ipp] (116 ins) at [0x707ed00960:0x707ed00b30] in 28437 ns
  42. 09-22 13:27:59.103   531   531 I recovery: type=1400 audit(0.0:41): avc: denied { unlink } for name="persist" dev="rootfs" ino=14872 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1
  43. 09-22 13:27:59.103   531   531 I recovery: type=1400 audit(0.0:42): avc: denied { getattr } for path="/sys/devices/platform/soc/1d84000.ufshc/host0/target0:0:0/0:0:0:0/block/sda/sda2/partition" dev="sysfs" ino=64554 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
  44. 09-22 13:27:59.103   531   531 I recovery: type=1400 audit(0.0:43): avc: denied { read } for name="dev" dev="sysfs" ino=64130 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
  45. 09-22 13:27:59.103   531   531 I recovery: type=1400 audit(0.0:44): avc: denied { open } for path="/sys/devices/platform/soc/1d84000.ufshc/host0/target0:0:0/0:0:0:0/block/sda/dev" dev="sysfs" ino=64130 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_scsi_devices_0000:s0 tclass=file permissive=1
  46. 09-22 13:27:59.110   531   531 I recovery: type=1400 audit(0.0:45): avc: denied { search } for name="rtc" dev="sysfs" ino=47652 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=dir permissive=1
  47. 09-22 13:27:59.110   531   531 I recovery: type=1400 audit(0.0:46): avc: denied { read } for name="since_epoch" dev="sysfs" ino=62541 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=file permissive=1
  48. 09-22 13:27:59.110   531   531 I recovery: type=1400 audit(0.0:47): avc: denied { open } for path="/sys/devices/platform/soc/c440000.qcom,spmi/spmi-0/spmi0-00/c440000.qcom,spmi:qcom,pm8150@0:qcom,pm8150_rtc/rtc/rtc0/since_epoch" dev="sysfs" ino=62541 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=file permissive=1
  49. 09-22 13:27:59.110   531   531 I recovery: type=1400 audit(0.0:48): avc: denied { getattr } for path="/sys/devices/platform/soc/c440000.qcom,spmi/spmi-0/spmi0-00/c440000.qcom,spmi:qcom,pm8150@0:qcom,pm8150_rtc/rtc/rtc0/since_epoch" dev="sysfs" ino=62541 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=file permissive=1
  50. 09-22 13:27:59.110   531   531 I recovery: type=1400 audit(0.0:49): avc: denied { sys_time } for capability=25 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability permissive=1
  51. 06-06 23:16:52.066   531   531 I recovery: type=1400 audit(0.0:55): avc: denied { getattr } for path="/persist" dev="sda2" ino=2 scontext=u:r:recovery:s0 tcontext=u:object_r:persist_file:s0 tclass=dir permissive=1
  52. 06-06 23:16:52.070   531   531 I recovery: type=1400 audit(0.0:56): avc: denied { create } for name="fstab" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  53. 06-06 23:16:52.070   531   531 I recovery: type=1400 audit(0.0:57): avc: denied { write } for path="/system/etc/fstab" dev="rootfs" ino=6357 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  54. 06-06 23:16:52.073   531   531 I recovery: type=1400 audit(0.0:58): avc: denied { getattr } for path="/metadata" dev="sda11" ino=2 scontext=u:r:recovery:s0 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1
  55. 06-06 23:16:52.073   531   531 I recovery: type=1400 audit(0.0:59): avc: denied { ioctl } for path="/dev/block/sda3" dev="tmpfs" ino=778 ioctlcmd=0x1260 scontext=u:r:recovery:s0 tcontext=u:object_r:misc_block_device:s0 tclass=blk_file permissive=1
  56. 06-06 23:16:52.083   531   531 I recovery: type=1400 audit(0.0:60): avc: denied { create } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_kobject_uevent_socket permissive=1
  57. 06-06 23:16:52.083   531   531 I recovery: type=1400 audit(0.0:61): avc: denied { bind } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_kobject_uevent_socket permissive=1
  58. 06-06 23:16:52.090   531   531 I recovery: type=1400 audit(0.0:62): avc: denied { read } for name="zram0" dev="sysfs" ino=60374 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=dir permissive=1
  59. 06-06 23:16:52.090   531   531 I recovery: type=1400 audit(0.0:63): avc: denied { open } for path="/sys/devices/virtual/block/zram0" dev="sysfs" ino=60374 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=dir permissive=1
  60. 06-06 23:16:52.090   531   531 I recovery: type=1400 audit(0.0:64): avc: denied { search } for name="zram0" dev="sysfs" ino=60374 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_zram:s0 tclass=dir permissive=1
  61. 06-06 23:16:52.096   531   531 I /sbin/recovery: [libfs_mgr]Created logical partition system_a on device /dev/block/dm-0
  62. 06-06 23:16:52.097   531   531 I /sbin/recovery: [libfs_mgr]Created logical partition vendor_a on device /dev/block/dm-1
  63. 06-06 23:16:52.099   531   531 I /sbin/recovery: [libfs_mgr]Created logical partition product_a on device /dev/block/dm-2
  64. 06-06 23:16:52.101   531   531 I /sbin/recovery: [libfs_mgr]Created logical partition system_b on device /dev/block/dm-3
  65. 06-06 23:16:52.101   531   531 I /sbin/recovery: [libfs_mgr]Created logical partition vendor_b on device /dev/block/dm-4
  66. 06-06 23:16:52.103   531   531 I /sbin/recovery: [libfs_mgr]Created logical partition product_b on device /dev/block/dm-5
  67. 06-06 23:16:52.120   531   531 I recovery: type=1400 audit(0.0:65): avc: denied { ioctl } for path="/dev/block/sda14" dev="tmpfs" ino=5220 ioctlcmd=0x1260 scontext=u:r:recovery:s0 tcontext=u:object_r:super_block_device:s0 tclass=blk_file permissive=1
  68. 06-06 23:16:52.300   531   531 I recovery: type=1400 audit(0.0:66): avc: denied { search } for name="battery" dev="sysfs" ino=71118 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_batteryinfo:s0 tclass=dir permissive=1
  69. 06-06 23:16:52.723   531   531 I recovery: type=1400 audit(0.0:67): avc: denied { getattr } for path="/init" dev="rootfs" ino=14845 scontext=u:r:recovery:s0 tcontext=u:object_r:init_exec:s0 tclass=file permissive=1
  70. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:68): avc: denied { open } for path="/dev/__properties__/u:object_r:apexd_prop:s0" dev="tmpfs" ino=28914 scontext=u:r:recovery:s0 tcontext=u:object_r:apexd_prop:s0 tclass=file permissive=1
  71. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:69): avc: denied { getattr } for path="/dev/__properties__/u:object_r:apexd_prop:s0" dev="tmpfs" ino=28914 scontext=u:r:recovery:s0 tcontext=u:object_r:apexd_prop:s0 tclass=file permissive=1
  72. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:70): avc: denied { map } for path="/dev/__properties__/u:object_r:apexd_prop:s0" dev="tmpfs" ino=28914 scontext=u:r:recovery:s0 tcontext=u:object_r:apexd_prop:s0 tclass=file permissive=1
  73. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:71): avc: denied { open } for path="/dev/__properties__/u:object_r:bluetooth_a2dp_offload_prop:s0" dev="tmpfs" ino=28916 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_a2dp_offload_prop:s0 tclass=file permissive=1
  74. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:72): avc: denied { getattr } for path="/dev/__properties__/u:object_r:bluetooth_a2dp_offload_prop:s0" dev="tmpfs" ino=28916 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_a2dp_offload_prop:s0 tclass=file permissive=1
  75. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:73): avc: denied { map } for path="/dev/__properties__/u:object_r:bluetooth_a2dp_offload_prop:s0" dev="tmpfs" ino=28916 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_a2dp_offload_prop:s0 tclass=file permissive=1
  76. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:74): avc: denied { open } for path="/dev/__properties__/u:object_r:bluetooth_audio_hal_prop:s0" dev="tmpfs" ino=28917 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_audio_hal_prop:s0 tclass=file permissive=1
  77. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:75): avc: denied { getattr } for path="/dev/__properties__/u:object_r:bluetooth_audio_hal_prop:s0" dev="tmpfs" ino=28917 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_audio_hal_prop:s0 tclass=file permissive=1
  78. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:76): avc: denied { map } for path="/dev/__properties__/u:object_r:bluetooth_audio_hal_prop:s0" dev="tmpfs" ino=28917 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_audio_hal_prop:s0 tclass=file permissive=1
  79. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:77): avc: denied { open } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=28918 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1
  80. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:78): avc: denied { getattr } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=28918 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1
  81. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:79): avc: denied { map } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=28918 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1
  82. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:80): avc: denied { open } for path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=28920 scontext=u:r:recovery:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1
  83. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:81): avc: denied { getattr } for path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=28920 scontext=u:r:recovery:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1
  84. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:82): avc: denied { map } for path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=28920 scontext=u:r:recovery:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1
  85. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:83): avc: denied { open } for path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=28921 scontext=u:r:recovery:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1
  86. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:84): avc: denied { getattr } for path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=28921 scontext=u:r:recovery:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1
  87. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:85): avc: denied { map } for path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=28921 scontext=u:r:recovery:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1
  88. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:86): avc: denied { open } for path="/dev/__properties__/u:object_r:camera_prop:s0" dev="tmpfs" ino=28922 scontext=u:r:recovery:s0 tcontext=u:object_r:camera_prop:s0 tclass=file permissive=1
  89. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:87): avc: denied { getattr } for path="/dev/__properties__/u:object_r:camera_prop:s0" dev="tmpfs" ino=28922 scontext=u:r:recovery:s0 tcontext=u:object_r:camera_prop:s0 tclass=file permissive=1
  90. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:88): avc: denied { map } for path="/dev/__properties__/u:object_r:camera_prop:s0" dev="tmpfs" ino=28922 scontext=u:r:recovery:s0 tcontext=u:object_r:camera_prop:s0 tclass=file permissive=1
  91. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:89): avc: denied { open } for path="/dev/__properties__/u:object_r:camera_ro_prop:s0" dev="tmpfs" ino=28923 scontext=u:r:recovery:s0 tcontext=u:object_r:camera_ro_prop:s0 tclass=file permissive=1
  92. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:90): avc: denied { getattr } for path="/dev/__properties__/u:object_r:camera_ro_prop:s0" dev="tmpfs" ino=28923 scontext=u:r:recovery:s0 tcontext=u:object_r:camera_ro_prop:s0 tclass=file permissive=1
  93. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:91): avc: denied { map } for path="/dev/__properties__/u:object_r:camera_ro_prop:s0" dev="tmpfs" ino=28923 scontext=u:r:recovery:s0 tcontext=u:object_r:camera_ro_prop:s0 tclass=file permissive=1
  94. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:92): avc: denied { open } for path="/dev/__properties__/u:object_r:cnd_vendor_prop:s0" dev="tmpfs" ino=28924 scontext=u:r:recovery:s0 tcontext=u:object_r:cnd_vendor_prop:s0 tclass=file permissive=1
  95. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:93): avc: denied { getattr } for path="/dev/__properties__/u:object_r:cnd_vendor_prop:s0" dev="tmpfs" ino=28924 scontext=u:r:recovery:s0 tcontext=u:object_r:cnd_vendor_prop:s0 tclass=file permissive=1
  96. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:94): avc: denied { map } for path="/dev/__properties__/u:object_r:cnd_vendor_prop:s0" dev="tmpfs" ino=28924 scontext=u:r:recovery:s0 tcontext=u:object_r:cnd_vendor_prop:s0 tclass=file permissive=1
  97. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:95): avc: denied { open } for path="/dev/__properties__/u:object_r:cpu_variant_prop:s0" dev="tmpfs" ino=28927 scontext=u:r:recovery:s0 tcontext=u:object_r:cpu_variant_prop:s0 tclass=file permissive=1
  98. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:96): avc: denied { getattr } for path="/dev/__properties__/u:object_r:cpu_variant_prop:s0" dev="tmpfs" ino=28927 scontext=u:r:recovery:s0 tcontext=u:object_r:cpu_variant_prop:s0 tclass=file permissive=1
  99. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:97): avc: denied { map } for path="/dev/__properties__/u:object_r:cpu_variant_prop:s0" dev="tmpfs" ino=28927 scontext=u:r:recovery:s0 tcontext=u:object_r:cpu_variant_prop:s0 tclass=file permissive=1
  100. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:98): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_adbd_prop:s0" dev="tmpfs" ino=28928 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_adbd_prop:s0 tclass=file permissive=1
  101. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:99): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_adbd_prop:s0" dev="tmpfs" ino=28928 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_adbd_prop:s0 tclass=file permissive=1
  102. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:100): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_adbd_prop:s0" dev="tmpfs" ino=28928 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_adbd_prop:s0 tclass=file permissive=1
  103. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:101): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=28929 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=1
  104. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:102): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=28929 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=1
  105. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:103): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=28929 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=1
  106. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:104): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_bugreport_prop:s0" dev="tmpfs" ino=28930 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_bugreport_prop:s0 tclass=file permissive=1
  107. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:105): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_bugreport_prop:s0" dev="tmpfs" ino=28930 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_bugreport_prop:s0 tclass=file permissive=1
  108. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:106): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_bugreport_prop:s0" dev="tmpfs" ino=28930 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_bugreport_prop:s0 tclass=file permissive=1
  109. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:107): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_console_prop:s0" dev="tmpfs" ino=28931 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_console_prop:s0 tclass=file permissive=1
  110. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:108): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_console_prop:s0" dev="tmpfs" ino=28931 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_console_prop:s0 tclass=file permissive=1
  111. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:109): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_console_prop:s0" dev="tmpfs" ino=28931 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_console_prop:s0 tclass=file permissive=1
  112. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:110): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_default_prop:s0" dev="tmpfs" ino=28932 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_default_prop:s0 tclass=file permissive=1
  113. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:111): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_default_prop:s0" dev="tmpfs" ino=28932 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_default_prop:s0 tclass=file permissive=1
  114. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:112): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_default_prop:s0" dev="tmpfs" ino=28932 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_default_prop:s0 tclass=file permissive=1
  115. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:113): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_dumpstate_prop:s0" dev="tmpfs" ino=28933 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_dumpstate_prop:s0 tclass=file permissive=1
  116. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:114): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_dumpstate_prop:s0" dev="tmpfs" ino=28933 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_dumpstate_prop:s0 tclass=file permissive=1
  117. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:115): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_dumpstate_prop:s0" dev="tmpfs" ino=28933 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_dumpstate_prop:s0 tclass=file permissive=1
  118. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:116): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_fuse_prop:s0" dev="tmpfs" ino=28934 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_fuse_prop:s0 tclass=file permissive=1
  119. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:117): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_fuse_prop:s0" dev="tmpfs" ino=28934 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_fuse_prop:s0 tclass=file permissive=1
  120. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:118): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_fuse_prop:s0" dev="tmpfs" ino=28934 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_fuse_prop:s0 tclass=file permissive=1
  121. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:119): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_gsid_prop:s0" dev="tmpfs" ino=28935 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_gsid_prop:s0 tclass=file permissive=1
  122. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:120): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_gsid_prop:s0" dev="tmpfs" ino=28935 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_gsid_prop:s0 tclass=file permissive=1
  123. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:121): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_gsid_prop:s0" dev="tmpfs" ino=28935 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_gsid_prop:s0 tclass=file permissive=1
  124. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:122): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_interface_restart_prop:s0" dev="tmpfs" ino=28936 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_interface_restart_prop:s0 tclass=file permissive=1
  125. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:123): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_interface_restart_prop:s0" dev="tmpfs" ino=28936 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_interface_restart_prop:s0 tclass=file permissive=1
  126. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:124): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_interface_restart_prop:s0" dev="tmpfs" ino=28936 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_interface_restart_prop:s0 tclass=file permissive=1
  127. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:125): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_interface_start_prop:s0" dev="tmpfs" ino=28937 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_interface_start_prop:s0 tclass=file permissive=1
  128. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:126): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_interface_start_prop:s0" dev="tmpfs" ino=28937 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_interface_start_prop:s0 tclass=file permissive=1
  129. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:127): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_interface_start_prop:s0" dev="tmpfs" ino=28937 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_interface_start_prop:s0 tclass=file permissive=1
  130. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:128): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_interface_stop_prop:s0" dev="tmpfs" ino=28938 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_interface_stop_prop:s0 tclass=file permissive=1
  131. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:129): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_interface_stop_prop:s0" dev="tmpfs" ino=28938 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_interface_stop_prop:s0 tclass=file permissive=1
  132. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:130): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_interface_stop_prop:s0" dev="tmpfs" ino=28938 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_interface_stop_prop:s0 tclass=file permissive=1
  133. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:131): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=28939 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1
  134. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:132): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=28939 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1
  135. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:133): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=28939 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1
  136. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:134): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=28940 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1
  137. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:135): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=28940 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1
  138. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:136): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=28940 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1
  139. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:137): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=28941 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1
  140. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:138): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=28941 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1
  141. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:139): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=28941 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1
  142. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:140): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=28942 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1
  143. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:141): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=28942 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1
  144. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:142): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=28942 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1
  145. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:143): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_start_prop:s0" dev="tmpfs" ino=28943 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_start_prop:s0 tclass=file permissive=1
  146. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:144): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_start_prop:s0" dev="tmpfs" ino=28943 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_start_prop:s0 tclass=file permissive=1
  147. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:145): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_start_prop:s0" dev="tmpfs" ino=28943 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_start_prop:s0 tclass=file permissive=1
  148. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:146): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=28944 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1
  149. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:147): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=28944 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1
  150. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:148): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=28944 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1
  151. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:149): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_vendor_rmt_storage_prop:s0" dev="tmpfs" ino=28945 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_vendor_rmt_storage_prop:s0 tclass=file permissive=1
  152. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:150): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_vendor_rmt_storage_prop:s0" dev="tmpfs" ino=28945 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_vendor_rmt_storage_prop:s0 tclass=file permissive=1
  153. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:151): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_vendor_rmt_storage_prop:s0" dev="tmpfs" ino=28945 scontext=u:r:recovery:s0 tcontext=u:object_r:ctl_vendor_rmt_storage_prop:s0 tclass=file permissive=1
  154. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:152): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=28950 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1
  155. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:153): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=28950 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1
  156. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:154): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=28950 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1
  157. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:155): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=28951 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1
  158. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:156): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=28951 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1
  159. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:157): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=28951 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1
  160. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:158): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_input_native_boot_prop:s0" dev="tmpfs" ino=28952 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_input_native_boot_prop:s0 tclass=file permissive=1
  161. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:159): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_input_native_boot_prop:s0" dev="tmpfs" ino=28952 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_input_native_boot_prop:s0 tclass=file permissive=1
  162. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:160): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_input_native_boot_prop:s0" dev="tmpfs" ino=28952 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_input_native_boot_prop:s0 tclass=file permissive=1
  163. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:161): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_media_native_prop:s0" dev="tmpfs" ino=28953 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_media_native_prop:s0 tclass=file permissive=1
  164. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:162): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_media_native_prop:s0" dev="tmpfs" ino=28953 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_media_native_prop:s0 tclass=file permissive=1
  165. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:163): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_media_native_prop:s0" dev="tmpfs" ino=28953 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_media_native_prop:s0 tclass=file permissive=1
  166. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:164): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_netd_native_prop:s0" dev="tmpfs" ino=28954 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_netd_native_prop:s0 tclass=file permissive=1
  167. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:165): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_netd_native_prop:s0" dev="tmpfs" ino=28954 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_netd_native_prop:s0 tclass=file permissive=1
  168. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:166): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_netd_native_prop:s0" dev="tmpfs" ino=28954 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_netd_native_prop:s0 tclass=file permissive=1
  169. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:167): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_reset_performed_prop:s0" dev="tmpfs" ino=28955 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_reset_performed_prop:s0 tclass=file permissive=1
  170. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:168): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_reset_performed_prop:s0" dev="tmpfs" ino=28955 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_reset_performed_prop:s0 tclass=file permissive=1
  171. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:169): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_reset_performed_prop:s0" dev="tmpfs" ino=28955 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_reset_performed_prop:s0 tclass=file permissive=1
  172. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:170): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_runtime_native_boot_prop:s0" dev="tmpfs" ino=28956 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_runtime_native_boot_prop:s0 tclass=file permissive=1
  173. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:171): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_runtime_native_boot_prop:s0" dev="tmpfs" ino=28956 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_runtime_native_boot_prop:s0 tclass=file permissive=1
  174. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:172): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_runtime_native_boot_prop:s0" dev="tmpfs" ino=28956 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_runtime_native_boot_prop:s0 tclass=file permissive=1
  175. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:173): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_runtime_native_prop:s0" dev="tmpfs" ino=28957 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_runtime_native_prop:s0 tclass=file permissive=1
  176. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:174): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_runtime_native_prop:s0" dev="tmpfs" ino=28957 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_runtime_native_prop:s0 tclass=file permissive=1
  177. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:175): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_runtime_native_prop:s0" dev="tmpfs" ino=28957 scontext=u:r:recovery:s0 tcontext=u:object_r:device_config_runtime_native_prop:s0 tclass=file permissive=1
  178. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:176): avc: denied { open } for path="/dev/__properties__/u:object_r:device_logging_prop:s0" dev="tmpfs" ino=28958 scontext=u:r:recovery:s0 tcontext=u:object_r:device_logging_prop:s0 tclass=file permissive=1
  179. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:177): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_logging_prop:s0" dev="tmpfs" ino=28958 scontext=u:r:recovery:s0 tcontext=u:object_r:device_logging_prop:s0 tclass=file permissive=1
  180. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:178): avc: denied { map } for path="/dev/__properties__/u:object_r:device_logging_prop:s0" dev="tmpfs" ino=28958 scontext=u:r:recovery:s0 tcontext=u:object_r:device_logging_prop:s0 tclass=file permissive=1
  181. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:179): avc: denied { open } for path="/dev/__properties__/u:object_r:dumpstate_options_prop:s0" dev="tmpfs" ino=28960 scontext=u:r:recovery:s0 tcontext=u:object_r:dumpstate_options_prop:s0 tclass=file permissive=1
  182. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:180): avc: denied { getattr } for path="/dev/__properties__/u:object_r:dumpstate_options_prop:s0" dev="tmpfs" ino=28960 scontext=u:r:recovery:s0 tcontext=u:object_r:dumpstate_options_prop:s0 tclass=file permissive=1
  183. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:181): avc: denied { map } for path="/dev/__properties__/u:object_r:dumpstate_options_prop:s0" dev="tmpfs" ino=28960 scontext=u:r:recovery:s0 tcontext=u:object_r:dumpstate_options_prop:s0 tclass=file permissive=1
  184. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:182): avc: denied { open } for path="/dev/__properties__/u:object_r:dynamic_system_prop:s0" dev="tmpfs" ino=28962 scontext=u:r:recovery:s0 tcontext=u:object_r:dynamic_system_prop:s0 tclass=file permissive=1
  185. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:183): avc: denied { getattr } for path="/dev/__properties__/u:object_r:dynamic_system_prop:s0" dev="tmpfs" ino=28962 scontext=u:r:recovery:s0 tcontext=u:object_r:dynamic_system_prop:s0 tclass=file permissive=1
  186. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:184): avc: denied { map } for path="/dev/__properties__/u:object_r:dynamic_system_prop:s0" dev="tmpfs" ino=28962 scontext=u:r:recovery:s0 tcontext=u:object_r:dynamic_system_prop:s0 tclass=file permissive=1
  187. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:185): avc: denied { open } for path="/dev/__properties__/u:object_r:ecoservice_prop:s0" dev="tmpfs" ino=28963 scontext=u:r:recovery:s0 tcontext=u:object_r:ecoservice_prop:s0 tclass=file permissive=1
  188. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:186): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ecoservice_prop:s0" dev="tmpfs" ino=28963 scontext=u:r:recovery:s0 tcontext=u:object_r:ecoservice_prop:s0 tclass=file permissive=1
  189. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:187): avc: denied { map } for path="/dev/__properties__/u:object_r:ecoservice_prop:s0" dev="tmpfs" ino=28963 scontext=u:r:recovery:s0 tcontext=u:object_r:ecoservice_prop:s0 tclass=file permissive=1
  190. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:188): avc: denied { open } for path="/dev/__properties__/u:object_r:exported_audio_prop:s0" dev="tmpfs" ino=28972 scontext=u:r:recovery:s0 tcontext=u:object_r:exported_audio_prop:s0 tclass=file permissive=1
  191. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:189): avc: denied { getattr } for path="/dev/__properties__/u:object_r:exported_audio_prop:s0" dev="tmpfs" ino=28972 scontext=u:r:recovery:s0 tcontext=u:object_r:exported_audio_prop:s0 tclass=file permissive=1
  192. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:190): avc: denied { map } for path="/dev/__properties__/u:object_r:exported_audio_prop:s0" dev="tmpfs" ino=28972 scontext=u:r:recovery:s0 tcontext=u:object_r:exported_audio_prop:s0 tclass=file permissive=1
  193. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:191): avc: denied { open } for path="/dev/__properties__/u:object_r:exported_bluetooth_prop:s0" dev="tmpfs" ino=28973 scontext=u:r:recovery:s0 tcontext=u:object_r:exported_bluetooth_prop:s0 tclass=file permissive=1
  194. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:192): avc: denied { getattr } for path="/dev/__properties__/u:object_r:exported_bluetooth_prop:s0" dev="tmpfs" ino=28973 scontext=u:r:recovery:s0 tcontext=u:object_r:exported_bluetooth_prop:s0 tclass=file permissive=1
  195. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:193): avc: denied { map } for path="/dev/__properties__/u:object_r:exported_bluetooth_prop:s0" dev="tmpfs" ino=28973 scontext=u:r:recovery:s0 tcontext=u:object_r:exported_bluetooth_prop:s0 tclass=file permissive=1
  196. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:194): avc: denied { open } for path="/dev/__properties__/u:object_r:exported_overlay_prop:s0" dev="tmpfs" ino=28980 scontext=u:r:recovery:s0 tcontext=u:object_r:exported_overlay_prop:s0 tclass=file permissive=1
  197. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:195): avc: denied { getattr } for path="/dev/__properties__/u:object_r:exported_overlay_prop:s0" dev="tmpfs" ino=28980 scontext=u:r:recovery:s0 tcontext=u:object_r:exported_overlay_prop:s0 tclass=file permissive=1
  198. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:196): avc: denied { map } for path="/dev/__properties__/u:object_r:exported_overlay_prop:s0" dev="tmpfs" ino=28980 scontext=u:r:recovery:s0 tcontext=u:object_r:exported_overlay_prop:s0 tclass=file permissive=1
  199. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:197): avc: denied { open } for path="/dev/__properties__/u:object_r:exported_wifi_prop:s0" dev="tmpfs" ino=28987 scontext=u:r:recovery:s0 tcontext=u:object_r:exported_wifi_prop:s0 tclass=file permissive=1
  200. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:198): avc: denied { getattr } for path="/dev/__properties__/u:object_r:exported_wifi_prop:s0" dev="tmpfs" ino=28987 scontext=u:r:recovery:s0 tcontext=u:object_r:exported_wifi_prop:s0 tclass=file permissive=1
  201. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:199): avc: denied { map } for path="/dev/__properties__/u:object_r:exported_wifi_prop:s0" dev="tmpfs" ino=28987 scontext=u:r:recovery:s0 tcontext=u:object_r:exported_wifi_prop:s0 tclass=file permissive=1
  202. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:200): avc: denied { open } for path="/dev/__properties__/u:object_r:factory_ota_prop:s0" dev="tmpfs" ino=28988 scontext=u:r:recovery:s0 tcontext=u:object_r:factory_ota_prop:s0 tclass=file permissive=1
  203. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:201): avc: denied { getattr } for path="/dev/__properties__/u:object_r:factory_ota_prop:s0" dev="tmpfs" ino=28988 scontext=u:r:recovery:s0 tcontext=u:object_r:factory_ota_prop:s0 tclass=file permissive=1
  204. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:202): avc: denied { map } for path="/dev/__properties__/u:object_r:factory_ota_prop:s0" dev="tmpfs" ino=28988 scontext=u:r:recovery:s0 tcontext=u:object_r:factory_ota_prop:s0 tclass=file permissive=1
  205. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:203): avc: denied { open } for path="/dev/__properties__/u:object_r:firstboot_prop:s0" dev="tmpfs" ino=28991 scontext=u:r:recovery:s0 tcontext=u:object_r:firstboot_prop:s0 tclass=file permissive=1
  206. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:204): avc: denied { getattr } for path="/dev/__properties__/u:object_r:firstboot_prop:s0" dev="tmpfs" ino=28991 scontext=u:r:recovery:s0 tcontext=u:object_r:firstboot_prop:s0 tclass=file permissive=1
  207. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:205): avc: denied { map } for path="/dev/__properties__/u:object_r:firstboot_prop:s0" dev="tmpfs" ino=28991 scontext=u:r:recovery:s0 tcontext=u:object_r:firstboot_prop:s0 tclass=file permissive=1
  208. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:206): avc: denied { open } for path="/dev/__properties__/u:object_r:gsid_prop:s0" dev="tmpfs" ino=28992 scontext=u:r:recovery:s0 tcontext=u:object_r:gsid_prop:s0 tclass=file permissive=1
  209. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:207): avc: denied { getattr } for path="/dev/__properties__/u:object_r:gsid_prop:s0" dev="tmpfs" ino=28992 scontext=u:r:recovery:s0 tcontext=u:object_r:gsid_prop:s0 tclass=file permissive=1
  210. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:208): avc: denied { map } for path="/dev/__properties__/u:object_r:gsid_prop:s0" dev="tmpfs" ino=28992 scontext=u:r:recovery:s0 tcontext=u:object_r:gsid_prop:s0 tclass=file permissive=1
  211. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:209): avc: denied { open } for path="/dev/__properties__/u:object_r:heapprofd_enabled_prop:s0" dev="tmpfs" ino=28993 scontext=u:r:recovery:s0 tcontext=u:object_r:heapprofd_enabled_prop:s0 tclass=file permissive=1
  212. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:210): avc: denied { getattr } for path="/dev/__properties__/u:object_r:heapprofd_enabled_prop:s0" dev="tmpfs" ino=28993 scontext=u:r:recovery:s0 tcontext=u:object_r:heapprofd_enabled_prop:s0 tclass=file permissive=1
  213. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:211): avc: denied { map } for path="/dev/__properties__/u:object_r:heapprofd_enabled_prop:s0" dev="tmpfs" ino=28993 scontext=u:r:recovery:s0 tcontext=u:object_r:heapprofd_enabled_prop:s0 tclass=file permissive=1
  214. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:212): avc: denied { open } for path="/dev/__properties__/u:object_r:last_boot_reason_prop:s0" dev="tmpfs" ino=28996 scontext=u:r:recovery:s0 tcontext=u:object_r:last_boot_reason_prop:s0 tclass=file permissive=1
  215. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:213): avc: denied { getattr } for path="/dev/__properties__/u:object_r:last_boot_reason_prop:s0" dev="tmpfs" ino=28996 scontext=u:r:recovery:s0 tcontext=u:object_r:last_boot_reason_prop:s0 tclass=file permissive=1
  216. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:214): avc: denied { map } for path="/dev/__properties__/u:object_r:last_boot_reason_prop:s0" dev="tmpfs" ino=28996 scontext=u:r:recovery:s0 tcontext=u:object_r:last_boot_reason_prop:s0 tclass=file permissive=1
  217. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:215): avc: denied { open } for path="/dev/__properties__/u:object_r:llkd_prop:s0" dev="tmpfs" ino=28997 scontext=u:r:recovery:s0 tcontext=u:object_r:llkd_prop:s0 tclass=file permissive=1
  218. 06-06 23:16:52.826   531   531 I recovery: type=1400 audit(0.0:216): avc: denied { getattr } for path="/dev/__properties__/u:object_r:llkd_prop:s0" dev="tmpfs" ino=28997 scontext=u:r:recovery:s0 tcontext=u:object_r:llkd_prop:s0 tclass=file permissive=1
  219. 06-06 23:16:52.836   531   531 I recovery: type=1400 audit(0.0:217): avc: denied { create } for name="log.gz" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  220. 06-06 23:16:52.836   531   531 I recovery: type=1400 audit(0.0:218): avc: denied { write } for path="/data/cache/recovery/log.gz" dev="rootfs" ino=29431 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  221. 06-06 23:16:52.836   531   531 I recovery: type=1400 audit(0.0:219): avc: denied { setattr } for name="log.gz" dev="rootfs" ino=29431 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
  222. 06-06 23:16:52.836   531   531 I recovery: type=1400 audit(0.0:220): avc: denied { fsetid } for capability=4 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability permissive=1
  223. 06-06 23:16:52.840   531   531 I recovery: type=1400 audit(0.0:221): avc: denied { ioctl } for path="/dev/block/dm-3" dev="tmpfs" ino=6378 ioctlcmd=0x5331 scontext=u:r:recovery:s0 tcontext=u:object_r:dm_device:s0 tclass=blk_file permissive=1
  224. 06-06 23:16:52.840   531   531 I recovery: type=1400 audit(0.0:222): avc: denied { sys_rawio } for capability=17 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability permissive=1
  225. 06-06 23:16:52.846   531   531 I recovery: type=1400 audit(0.0:223): avc: denied { ioctl } for path="/dev/block/dm-4" dev="tmpfs" ino=6380 ioctlcmd=0x5331 scontext=u:r:recovery:s0 tcontext=u:object_r:dm_device:s0 tclass=blk_file permissive=1
  226. 06-06 23:16:52.850   531   531 I recovery: type=1400 audit(0.0:224): avc: denied { ioctl } for path="/dev/block/dm-5" dev="tmpfs" ino=6382 ioctlcmd=0x5331 scontext=u:r:recovery:s0 tcontext=u:object_r:dm_device:s0 tclass=blk_file permissive=1
  227. 06-06 23:16:52.873   531   531 I recovery: type=1400 audit(0.0:225): avc: denied { ioctl } for path="/dev/block/dm-3" dev="tmpfs" ino=6378 ioctlcmd=0x5331 scontext=u:r:recovery:s0 tcontext=u:object_r:dm_device:s0 tclass=blk_file permissive=1
  228. 06-06 23:16:53.060   531   531 I recovery: type=1400 audit(0.0:226): avc: denied { ioctl } for path="/dev/block/loop0" dev="tmpfs" ino=5348 ioctlcmd=0x4c00 scontext=u:r:recovery:s0 tcontext=u:object_r:loop_device:s0 tclass=blk_file permissive=1
  229. 06-06 23:16:53.060   531   531 I recovery: type=1400 audit(0.0:227): avc: denied { ioctl } for path="/dev/block/loop0" dev="tmpfs" ino=5348 ioctlcmd=0x4c04 scontext=u:r:recovery:s0 tcontext=u:object_r:loop_device:s0 tclass=blk_file permissive=1
  230. 06-06 23:16:53.080   581   581 I loop0   : type=1400 audit(0.0:228): avc: denied { use } for path="/sbin/com.android.runtime.release.apex" dev="rootfs" ino=5449 scontext=u:r:kernel:s0 tcontext=u:r:recovery:s0 tclass=fd permissive=1
  231. 06-06 23:16:53.083   531   531 I recovery: type=1400 audit(0.0:229): avc: denied { ioctl } for path="/dev/block/loop1" dev="tmpfs" ino=798 ioctlcmd=0x4c00 scontext=u:r:recovery:s0 tcontext=u:object_r:loop_device:s0 tclass=blk_file permissive=1
  232. 06-06 23:16:53.083   531   531 I recovery: type=1400 audit(0.0:230): avc: denied { ioctl } for path="/dev/block/loop1" dev="tmpfs" ino=798 ioctlcmd=0x4c04 scontext=u:r:recovery:s0 tcontext=u:object_r:loop_device:s0 tclass=blk_file permissive=1
  233. 06-06 23:16:53.100   531   531 I recovery: type=1400 audit(0.0:231): avc: denied { ioctl } for path="/dev/block/loop2" dev="tmpfs" ino=29779 ioctlcmd=0x4c00 scontext=u:r:recovery:s0 tcontext=u:object_r:loop_device:s0 tclass=blk_file permissive=1
  234. 06-06 23:16:53.100   531   531 I recovery: type=1400 audit(0.0:232): avc: denied { ioctl } for path="/dev/block/loop2" dev="tmpfs" ino=29779 ioctlcmd=0x4c04 scontext=u:r:recovery:s0 tcontext=u:object_r:loop_device:s0 tclass=blk_file permissive=1
  235. 06-06 23:16:53.126   531   531 I recovery: type=1400 audit(0.0:233): avc: denied { ioctl } for path="/dev/block/loop3" dev="tmpfs" ino=6304 ioctlcmd=0x4c00 scontext=u:r:recovery:s0 tcontext=u:object_r:loop_device:s0 tclass=blk_file permissive=1
  236. 06-06 23:16:53.126   531   531 I recovery: type=1400 audit(0.0:234): avc: denied { ioctl } for path="/dev/block/loop3" dev="tmpfs" ino=6304 ioctlcmd=0x4c04 scontext=u:r:recovery:s0 tcontext=u:object_r:loop_device:s0 tclass=blk_file permissive=1
  237. 06-06 23:16:53.146   531   531 I recovery: type=1400 audit(0.0:235): avc: denied { ioctl } for path="/dev/block/loop4" dev="tmpfs" ino=29195 ioctlcmd=0x4c00 scontext=u:r:recovery:s0 tcontext=u:object_r:loop_device:s0 tclass=blk_file permissive=1
  238. 06-06 23:16:53.146   531   531 I recovery: type=1400 audit(0.0:236): avc: denied { ioctl } for path="/dev/block/loop4" dev="tmpfs" ino=29195 ioctlcmd=0x4c04 scontext=u:r:recovery:s0 tcontext=u:object_r:loop_device:s0 tclass=blk_file permissive=1
  239. 06-06 23:16:53.213   531   531 I recovery: type=1400 audit(0.0:237): avc: denied { ioctl } for path="/dev/block/loop5" dev="tmpfs" ino=5349 ioctlcmd=0x4c00 scontext=u:r:recovery:s0 tcontext=u:object_r:loop_device:s0 tclass=blk_file permissive=1
  240. 06-06 23:16:53.213   531   531 I recovery: type=1400 audit(0.0:238): avc: denied { ioctl } for path="/dev/block/loop5" dev="tmpfs" ino=5349 ioctlcmd=0x4c04 scontext=u:r:recovery:s0 tcontext=u:object_r:loop_device:s0 tclass=blk_file permissive=1
  241. 06-06 23:16:53.246   531   531 I recovery: type=1400 audit(0.0:239): avc: denied { ioctl } for path="/dev/block/loop6" dev="tmpfs" ino=29778 ioctlcmd=0x4c00 scontext=u:r:recovery:s0 tcontext=u:object_r:loop_device:s0 tclass=blk_file permissive=1
  242. 06-06 23:16:53.246   531   531 I recovery: type=1400 audit(0.0:240): avc: denied { ioctl } for path="/dev/block/loop6" dev="tmpfs" ino=29778 ioctlcmd=0x4c04 scontext=u:r:recovery:s0 tcontext=u:object_r:loop_device:s0 tclass=blk_file permissive=1
  243. 06-06 23:16:53.273   531   531 I recovery: type=1400 audit(0.0:241): avc: denied { search } for name="gsi" dev="sda11" ino=16 scontext=u:r:recovery:s0 tcontext=u:object_r:gsi_metadata_file:s0 tclass=dir permissive=1
  244. 06-06 23:16:53.273   531   531 I recovery: type=1400 audit(0.0:242): avc: denied { read } for name="/" dev="sda11" ino=2 scontext=u:r:recovery:s0 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1
  245. 06-06 23:16:53.273   531   531 I recovery: type=1400 audit(0.0:243): avc: denied { open } for path="/metadata" dev="sda11" ino=2 scontext=u:r:recovery:s0 tcontext=u:object_r:metadata_file:s0 tclass=dir permissive=1
  246. 06-06 23:16:53.273   531   531 I recovery: type=1400 audit(0.0:244): avc: denied { getattr } for path="/metadata/vold" dev="sda11" ino=12 scontext=u:r:recovery:s0 tcontext=u:object_r:vold_metadata_file:s0 tclass=dir permissive=1
  247. 06-06 23:16:53.273   531   531 I recovery: type=1400 audit(0.0:245): avc: denied { read } for name="vold" dev="sda11" ino=12 scontext=u:r:recovery:s0 tcontext=u:object_r:vold_metadata_file:s0 tclass=dir permissive=1
  248. 06-06 23:16:53.273   531   531 I recovery: type=1400 audit(0.0:246): avc: denied { open } for path="/metadata/vold" dev="sda11" ino=12 scontext=u:r:recovery:s0 tcontext=u:object_r:vold_metadata_file:s0 tclass=dir permissive=1
  249. 06-06 23:16:53.277   531   531 E /sbin/recovery: fscrypt_mount_metadata_encrypted: /dev/block/sda15 /data 0
  250. 06-06 23:16:53.309   608   608 W libc    : Unable to set property "ro.build.version.release" to "10": error code: 0xb
  251. 06-06 23:16:53.314   609   609 W libc    : Unable to set property "ro.build.version.security_patch" to "2020-06-05": error code: 0xb
  252. 06-06 23:16:53.316   611   611 I servicemanager: type=1400 audit(0.0:247): avc: denied { set_context_mgr } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1
  253. 06-06 23:16:53.320   611   611 I servicemanager: type=1400 audit(0.0:248): avc: denied { read } for name="product_service_contexts" dev="dm-5" ino=329 scontext=u:r:recovery:s0 tcontext=u:object_r:service_contexts_file:s0 tclass=file permissive=1
  254. 06-06 23:16:53.320   611   611 I servicemanager: type=1400 audit(0.0:249): avc: denied { open } for path="/product/etc/selinux/product_service_contexts" dev="dm-5" ino=329 scontext=u:r:recovery:s0 tcontext=u:object_r:service_contexts_file:s0 tclass=file permissive=1
  255. 06-06 23:16:53.320   611   611 I servicemanager: type=1400 audit(0.0:250): avc: denied { getattr } for path="/product/etc/selinux/product_service_contexts" dev="dm-5" ino=329 scontext=u:r:recovery:s0 tcontext=u:object_r:service_contexts_file:s0 tclass=file permissive=1
  256. 06-06 23:16:53.320   613   613 I vndservicemanag: type=1400 audit(0.0:251): avc: denied { read write } for name="vndbinder" dev="tmpfs" ino=792 scontext=u:r:recovery:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
  257. 06-06 23:16:53.320   613   613 I vndservicemanag: type=1400 audit(0.0:252): avc: denied { open } for path="/dev/vndbinder" dev="tmpfs" ino=792 scontext=u:r:recovery:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
  258. 06-06 23:16:53.320   613   613 I vndservicemanag: type=1400 audit(0.0:253): avc: denied { ioctl } for path="/dev/vndbinder" dev="tmpfs" ino=792 ioctlcmd=0x6209 scontext=u:r:recovery:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
  259. 06-06 23:16:53.320   613   613 I vndservicemanag: type=1400 audit(0.0:254): avc: denied { map } for path="/dev/vndbinder" dev="tmpfs" ino=792 scontext=u:r:recovery:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1
  260. 06-06 23:16:53.323   612   612 I hwservicemanage: type=1400 audit(0.0:255): avc: denied { read } for name="product_hwservice_contexts" dev="dm-5" ino=323 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
  261. 06-06 23:16:53.323   612   612 I hwservicemanage: type=1400 audit(0.0:256): avc: denied { open } for path="/product/etc/selinux/product_hwservice_contexts" dev="dm-5" ino=323 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
  262. 06-06 23:16:53.323   612   612 I hwservicemanage: type=1400 audit(0.0:257): avc: denied { getattr } for path="/product/etc/selinux/product_hwservice_contexts" dev="dm-5" ino=323 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
  263. 06-06 23:16:53.323   612   612 I hwservicemanage: type=1400 audit(0.0:258): avc: denied { create } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1
  264. 06-06 23:16:53.323   612   612 I hwservicemanage: type=1400 audit(0.0:259): avc: denied { bind } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1
  265. 06-06 23:16:53.323   612   612 I hwservicemanage: type=1400 audit(0.0:260): avc: denied { read } for name="perms" dev="selinuxfs" ino=67112321 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1
  266. 06-06 23:16:53.323   612   612 I hwservicemanage: type=1400 audit(0.0:261): avc: denied { open } for path="/sys/fs/selinux/class/hwservice_manager/perms" dev="selinuxfs" ino=67112321 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1
  267. 06-06 23:16:53.323   612   612 I hwservicemanage: type=1400 audit(0.0:262): avc: denied { write } for name="access" dev="selinuxfs" ino=6 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1
  268. 06-06 23:16:53.323   612   612 I hwservicemanage: type=1400 audit(0.0:263): avc: denied { compute_av } for scontext=u:r:recovery:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1
  269. 06-06 23:16:53.323   531   531 I recovery: type=1400 audit(0.0:264): avc: denied { call } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1
  270. --------- beginning of crash
  271. 06-06 23:16:53.324   614   614 F linker  : CANNOT LINK EXECUTABLE "/sbin/qseecomd": library "libion.so" not found
  272. 06-06 23:16:53.325   611   611 I SELinux : SELinux: Loaded service_contexts from:
  273. 06-06 23:16:53.325   611   611 I SELinux :     /system/etc/selinux/plat_service_contexts
  274. 06-06 23:16:53.325   611   611 I SELinux :     /product/etc/selinux/product_service_contexts
  275. 06-06 23:16:53.326   613   613 I SELinux : SELinux: Loaded service_contexts from:
  276. 06-06 23:16:53.326   613   613 I SELinux :     /vendor/etc/selinux/vndservice_contexts
  277. 06-06 23:16:53.328   612   612 E SELinux : avc:  denied  { add } for interface=android.hidl.manager::IServiceManager sid=u:r:recovery:s0 pid=612 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_manager_hwservice:s0 tclass=hwservice_manager permissive=1
  278. 06-06 23:16:53.328   612   612 E SELinux : avc:  denied  { add } for interface=android.hidl.base::IBase sid=u:r:recovery:s0 pid=612 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1
  279. 06-06 23:16:53.328   612   612 E SELinux : avc:  denied  { add } for interface=android.hidl.token::ITokenManager sid=u:r:recovery:s0 pid=612 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_token_hwservice:s0 tclass=hwservice_manager permissive=1
  280. 06-06 23:16:53.329   612   612 I hwservicemanager: hwservicemanager is ready now.
  281. 06-06 23:16:53.329   531   531 E cutils-trace: Error opening trace file: No such file or directory (2)
  282. 06-06 23:16:53.329   612   612 E cutils-trace: Error opening trace file: No such file or directory (2)
  283. 06-06 23:16:53.330   615   615 E cutils-trace: Error opening trace file: No such file or directory (2)
  284. 06-06 23:16:53.333   612   612 I hwservicemanage: type=1400 audit(0.0:265): avc: denied { transfer } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1
  285. 06-06 23:16:53.336   625   625 I init    : type=1400 audit(0.0:266): avc: denied { entrypoint } for path="/vendor/bin/hw/android.hardware.keymaster@4.0-service.citadel" dev="dm-4" ino=152 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_citadel_exec:s0 tclass=file permissive=1
  286. 06-06 23:16:53.336   616   616 I time_daemon: type=1400 audit(0.0:267): avc: denied { search } for name="esoc" dev="sysfs" ino=50832 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_esoc:s0 tclass=dir permissive=1
  287. 06-06 23:16:53.336   616   616 I time_daemon: type=1400 audit(0.0:268): avc: denied { read } for name="devices" dev="sysfs" ino=50834 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_esoc:s0 tclass=dir permissive=1
  288. 06-06 23:16:53.336   616   616 I time_daemon: type=1400 audit(0.0:269): avc: denied { open } for path="/sys/bus/esoc/devices" dev="sysfs" ino=50834 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_esoc:s0 tclass=dir permissive=1
  289. 06-06 23:16:53.336   616   616 I time_daemon: type=1400 audit(0.0:270): avc: denied { search } for name="msm_subsys" dev="sysfs" ino=30117 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir permissive=1
  290. 06-06 23:16:53.336   616   616 I time_daemon: type=1400 audit(0.0:271): avc: denied { read } for name="devices" dev="sysfs" ino=30119 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir permissive=1
  291. 06-06 23:16:53.336   616   616 I time_daemon: type=1400 audit(0.0:272): avc: denied { open } for path="/sys/bus/msm_subsys/devices" dev="sysfs" ino=30119 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir permissive=1
  292. 06-06 23:16:53.336   616   616 I time_daemon: type=1400 audit(0.0:273): avc: denied { read } for name="name" dev="sysfs" ino=56267 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_ssr:s0 tclass=file permissive=1
  293. 06-06 23:16:53.336   616   616 I time_daemon: type=1400 audit(0.0:274): avc: denied { open } for path="/sys/devices/platform/soc/soc:qcom,kgsl-hyp/subsys8/name" dev="sysfs" ino=56267 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_ssr:s0 tclass=file permissive=1
  294. 06-06 23:16:53.337   612   612 E SELinux : avc:  denied  { find } for interface=android.hardware.keymaster::IKeymasterDevice sid=u:r:recovery:s0 pid=531 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1
  295. 06-06 23:16:53.337   615   615 D vndksupport: Loading /vendor/lib64/hw/android.hardware.boot@1.0-impl.so from current namespace instead of sphal namespace.
  296. 06-06 23:16:53.337   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  297. 06-06 23:16:53.338   531   623 E libprocessgroup: Failed to read task profiles from /etc/task_profiles.json
  298. 06-06 23:16:53.338   531   623 E libprocessgroup: Loading /etc/task_profiles.json for [531] failed
  299. 06-06 23:16:53.338   531   623 W libprocessgroup: Failed to find HighPerformancetask profile: No such file or directory
  300. 06-06 23:16:53.338   531   623 W libprocessgroup: Failed to find TimerSlackNormaltask profile: No such file or directory
  301. 06-06 23:16:53.338   615   615 D vndksupport: Loading /vendor/lib64/hw/bootctrl.msmnile.so from current namespace instead of sphal namespace.
  302. 06-06 23:16:53.339   621   621 E cutils-trace: Error opening trace file: No such file or directory (2)
  303. 06-06 23:16:53.339   612   612 E SELinux : avc:  denied  { find } for interface=android.hardware.gatekeeper::IGatekeeper sid=u:r:recovery:s0 pid=621 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1
  304. 06-06 23:16:53.339   621   621 D vndksupport: Loading /vendor/lib64/hw/android.hardware.gatekeeper@1.0-impl-qti.so from current namespace instead of sphal namespace.
  305. 06-06 23:16:53.339   612   612 E SELinux : avc:  denied  { add } for interface=android.hardware.boot::IBootControl sid=u:r:recovery:s0 pid=615 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_bootctl_hwservice:s0 tclass=hwservice_manager permissive=1
  306. 06-06 23:16:53.339   615   615 I ServiceManagement: Registered android.hardware.boot@1.0::IBootControl/default (start delay of 22ms)
  307. 06-06 23:16:53.339   615   615 I ServiceManagement: Removing namespace from process name android.hardware.boot@1.0-service to boot@1.0-service.
  308. 06-06 23:16:53.339   615   615 I android.hardware.boot@1.0-service: Registration complete for android.hardware.boot@1.0::IBootControl/default.
  309. 06-06 23:16:53.340   616   616 I time_daemon: type=1400 audit(0.0:275): avc: denied { search } for name="soc:qcom,faceauth_fws_b" dev="sysfs" ino=42257 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_faceauth:s0 tclass=dir permissive=1
  310. 06-06 23:16:53.340   616   616 I time_daemon: type=1400 audit(0.0:276): avc: denied { read } for name="name" dev="sysfs" ino=56389 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_faceauth:s0 tclass=file permissive=1
  311. 06-06 23:16:53.340   616   616 I time_daemon: type=1400 audit(0.0:277): avc: denied { open } for path="/sys/devices/platform/soc/soc:qcom,faceauth_fws_b/subsys10/name" dev="sysfs" ino=56389 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs_faceauth:s0 tclass=file permissive=1
  312. 06-06 23:16:53.340   616   616 I time_daemon: type=1400 audit(0.0:278): avc: denied { create } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=qipcrtr_socket permissive=1
  313. 06-06 23:16:53.340   616   616 I time_daemon: type=1400 audit(0.0:279): avc: denied { read } for name="rtc0" dev="tmpfs" ino=5272 scontext=u:r:recovery:s0 tcontext=u:object_r:rtc_device:s0 tclass=chr_file permissive=1
  314. 06-06 23:16:53.340   616   616 I time_daemon: type=1400 audit(0.0:280): avc: denied { open } for path="/dev/rtc0" dev="tmpfs" ino=5272 scontext=u:r:recovery:s0 tcontext=u:object_r:rtc_device:s0 tclass=chr_file permissive=1
  315. 06-06 23:16:53.340   616   616 I time_daemon: type=1400 audit(0.0:281): avc: denied { ioctl } for path="/dev/rtc0" dev="tmpfs" ino=5272 ioctlcmd=0x7009 scontext=u:r:recovery:s0 tcontext=u:object_r:rtc_device:s0 tclass=chr_file permissive=1
  316. 06-06 23:16:53.340   621   621 E ServiceManagement: Failed to dlopen android.hardware.gatekeeper@1.0-impl-qti.so: dlopen failed: library "libion.so" not found
  317. 06-06 23:16:53.340   621   621 E android.hardware.gatekeeper@1.0-service: Could not get passthrough implementation for android.hardware.gatekeeper@1.0::IGatekeeper/default.
  318. 06-06 23:16:53.344   616   616 D QC-time-services: Daemon:genoff_pre_init::Base = 0
  319. 06-06 23:16:53.344   616   616 D QC-time-services: Daemon:ats_rtc_init: Time read from RTC -- year = 70, month = 8,day = 22
  320. 06-06 23:16:53.344   616   616 D QC-time-services: Daemon ats_rtc_init: seconds = 22858080
  321. 06-06 23:16:53.344   616   616 D QC-time-services: Daemon:Value read from RTC seconds = 22858080000
  322. 06-06 23:16:53.344   616   616 D QC-time-services: Daemon:genoff_init_config: ATS_RTC initialized with rc: 0
  323. 06-06 23:16:53.344   616   616 D QC-time-services: Daemon:genoff_pre_init::Base = 1
  324. 06-06 23:16:53.344   616   616 D QC-time-services: Daemon: Storage Name: ats_1
  325. 06-06 23:16:53.344   616   616 D QC-time-services: Daemon:Opening File: /mnt/vendor/persist/time/ats_1 /data/vendor/time/ats_1
  326. 06-06 23:16:53.344   616   616 D QC-time-services: Daemon:time_persistent_memory_opr:Genoff Read operation
  327. 06-06 23:16:53.344   616   616 D QC-time-services: Daemon:Open File: /mnt/vendor/persist/time/ats_1
  328. 06-06 23:16:53.344   616   616 D QC-time-services: Daemon:Unable to open filefor read
  329. 06-06 23:16:53.346   620   620 I /sbin/android.hardware.oemlock@1.0-service.citadel: OemLock HAL service starting
  330. 06-06 23:16:53.346   620   620 I ServiceManager: Waiting for service 'android.hardware.citadel.ICitadeld' on '/dev/vndbinder'...
  331. 06-06 23:16:53.351   617   617 I /sbin/citadeld: Starting citadeld
  332. 06-06 23:16:53.352   617   627 I /sbin/citadeld: Event dispatcher startup.
  333. 06-06 23:16:53.352   613   613 E SELinux : avc:  denied  { add } for service=android.hardware.citadel.ICitadeld pid=617 uid=0 scontext=u:r:recovery:s0 tcontext=u:object_r:citadeld_service:s0 tclass=service_manager permissive=1
  334. 06-06 23:16:53.352   617   629 I /sbin/citadeld: waiting for powerstats service to appear
  335. 06-06 23:16:53.352   617   630 E libprocessgroup: Failed to read task profiles from /etc/task_profiles.json
  336. 06-06 23:16:53.352   617   630 E libprocessgroup: Loading /etc/task_profiles.json for [617] failed
  337. 06-06 23:16:53.352   617   630 W libprocessgroup: Failed to find HighPerformancetask profile: No such file or directory
  338. 06-06 23:16:53.352   617   630 W libprocessgroup: Failed to find TimerSlackNormaltask profile: No such file or directory
  339. 06-06 23:16:53.353   626   626 F linker  : CANNOT LINK EXECUTABLE "/sbin/android.hardware.keymaster@4.0-service-qti": library "libion.so" not found
  340. 06-06 23:16:53.355   625   625 I /vendor/bin/hw/android.hardware.keymaster@4.0-service.citadel: Keymaster HAL service starting
  341. 06-06 23:16:53.355   613   613 E SELinux : avc:  denied  { find } for service=android.hardware.citadel.ICitadeld pid=625 uid=0 scontext=u:r:recovery:s0 tcontext=u:object_r:citadeld_service:s0 tclass=service_manager permissive=1
  342. 06-06 23:16:53.355   617   630 D libnos_transport: Calling app 2 with params 0x0017
  343. 06-06 23:16:53.358   617   630 D libnos_transport: App 2 inspection status=0x00000000 reply_len=0 protocol=1 flags=0x0000
  344. 06-06 23:16:53.358   617   630 D libnos_transport: Send app 2 command data (13 bytes)
  345. 06-06 23:16:53.359   617   630 D libnos_transport: Send app 2 go command 0x00020017
  346. 06-06 23:16:53.359   617   630 D libnos_transport: Polling app 2
  347. 06-06 23:16:53.361   618   618 I /sbin/android.hardware.weaver@1.0-service.citadel: Weaver HAL service starting
  348. 06-06 23:16:53.362   618   618 E cutils-trace: Error opening trace file: No such file or directory (2)
  349. 06-06 23:16:53.362   612   612 E SELinux : avc:  denied  { add } for interface=android.hardware.weaver::IWeaver sid=u:r:recovery:s0 pid=618 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_weaver_hwservice:s0 tclass=hwservice_manager permissive=1
  350. 06-06 23:16:53.362   618   618 I ServiceManagement: Registered android.hardware.weaver@1.0::IWeaver/default (start delay of 35ms)
  351. 06-06 23:16:53.362   618   618 I ServiceManagement: Removing namespace from process name android.hardware.weaver@1.0-service.citadel to weaver@1.0-service.citadel.
  352. 06-06 23:16:53.367   617   630 D libnos_transport: App 2 polled=4 status=0x80000000 reply_len=0 flags=0x0000
  353. 06-06 23:16:53.367   617   630 D libnos_transport: App 2 returning 0x0
  354. 06-06 23:16:53.368   617   630 D libnos_transport: Calling app 2 with params 0x0018
  355. 06-06 23:16:53.370   617   630 D libnos_transport: App 2 inspection status=0x00000000 reply_len=0 protocol=1 flags=0x0000
  356. 06-06 23:16:53.370   617   630 D libnos_transport: Send app 2 command data (0 bytes)
  357. 06-06 23:16:53.371   617   630 D libnos_transport: Send app 2 go command 0x00020018
  358. 06-06 23:16:53.371   617   630 D libnos_transport: Polling app 2
  359. 06-06 23:16:53.375   617   630 D libnos_transport: App 2 polled=2 status=0x80000000 reply_len=4 flags=0x0000
  360. 06-06 23:16:53.375   617   630 D libnos_transport: Read app 2 reply data (4 bytes)
  361. 06-06 23:16:53.376   617   630 D libnos_transport: App 2 returning 0x0
  362. 06-06 23:16:53.376   625   625 E cutils-trace: Error opening trace file: No such file or directory (2)
  363. 06-06 23:16:53.377   612   612 E SELinux : avc:  denied  { add } for interface=android.hardware.keymaster::IKeymasterDevice sid=u:r:recovery:s0 pid=625 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1
  364. 06-06 23:16:53.377   625   625 I ServiceManagement: Registered android.hardware.keymaster@4.0::IKeymasterDevice/strongbox (start delay of 40ms)
  365. 06-06 23:16:53.377   625   625 I ServiceManagement: Removing namespace from process name android.hardware.keymaster@4.0-service.citadel to keymaster@4.0-service.citadel.
  366. 06-06 23:16:53.445   619   619 E cutils-trace: Error opening trace file: No such file or directory (2)
  367. 06-06 23:16:53.446   612   612 E SELinux : avc:  denied  { add } for interface=android.hardware.authsecret::IAuthSecret sid=u:r:recovery:s0 pid=619 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_authsecret_hwservice:s0 tclass=hwservice_manager permissive=1
  368. 06-06 23:16:53.446   619   619 I ServiceManagement: Registered android.hardware.authsecret@1.0::IAuthSecret/default (start delay of 119ms)
  369. 06-06 23:16:53.446   619   619 I ServiceManagement: Removing namespace from process name android.hardware.authsecret@1.0-service.citadel to authsecret@1.0-service.citadel.
  370. 06-06 23:16:53.446   620   620 E cutils-trace: Error opening trace file: No such file or directory (2)
  371. 06-06 23:16:53.447   612   612 E SELinux : avc:  denied  { add } for interface=android.hardware.oemlock::IOemLock sid=u:r:recovery:s0 pid=620 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_oemlock_hwservice:s0 tclass=hwservice_manager permissive=1
  372. 06-06 23:16:53.447   620   620 I ServiceManagement: Registered android.hardware.oemlock@1.0::IOemLock/default (start delay of 120ms)
  373. 06-06 23:16:53.447   620   620 I ServiceManagement: Removing namespace from process name android.hardware.oemlock@1.0-service.citadel to oemlock@1.0-service.citadel.
  374. 06-06 23:16:53.877   617   628 D libnos_transport: Calling app 0 with params 0x0200
  375. 06-06 23:16:53.880   617   628 D libnos_transport: App 0 inspection status=0x00000000 reply_len=0 protocol=1 flags=0x0000
  376. 06-06 23:16:53.880   617   628 D libnos_transport: Send app 0 command data (0 bytes)
  377. 06-06 23:16:53.880   617   628 D libnos_transport: Send app 0 go command 0x00000200
  378. 06-06 23:16:53.881   617   628 D libnos_transport: Polling app 0
  379. 06-06 23:16:53.885   617   628 D libnos_transport: App 0 polled=2 status=0x80000000 reply_len=80 flags=0x0000
  380. 06-06 23:16:53.885   617   628 D libnos_transport: Read app 0 reply data (80 bytes)
  381. 06-06 23:16:53.886   617   628 D libnos_transport: App 0 returning 0x0
  382. 06-06 23:16:54.338   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  383. 06-06 23:16:54.340   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  384. 06-06 23:16:55.341   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  385. 06-06 23:16:55.342   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  386. 06-06 23:16:56.343   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  387. 06-06 23:16:56.343   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  388. 06-06 23:16:56.722   640   641 I adbd    : opening control endpoint /dev/usb-ffs/adb/ep0
  389. 06-06 23:16:56.723   640   641 I adbd    : UsbFfsConnection constructed
  390. 06-06 23:16:56.725   640   642 I adbd    : USB event: FUNCTIONFS_BIND
  391. 06-06 23:16:57.210   640   642 I adbd    : USB event: FUNCTIONFS_ENABLE
  392. 06-06 23:16:57.343   531   531 I recovery: type=1400 audit(0.0:282): avc: denied { call } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1
  393. 06-06 23:16:57.345   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  394. 06-06 23:16:57.345   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  395. 06-06 23:16:57.679   640   640 I adbd    : UsbFfs: already offline
  396. 06-06 23:16:58.326   647   647 I time_daemon: type=1400 audit(0.0:283): avc: denied { read } for name="rtc0" dev="tmpfs" ino=5272 scontext=u:r:recovery:s0 tcontext=u:object_r:rtc_device:s0 tclass=chr_file permissive=1
  397. 06-06 23:16:58.326   647   647 I time_daemon: type=1400 audit(0.0:284): avc: denied { open } for path="/dev/rtc0" dev="tmpfs" ino=5272 scontext=u:r:recovery:s0 tcontext=u:object_r:rtc_device:s0 tclass=chr_file permissive=1
  398. 06-06 23:16:58.326   647   647 I time_daemon: type=1400 audit(0.0:285): avc: denied { ioctl } for path="/dev/rtc0" dev="tmpfs" ino=5272 ioctlcmd=0x7009 scontext=u:r:recovery:s0 tcontext=u:object_r:rtc_device:s0 tclass=chr_file permissive=1
  399. 06-06 23:16:58.328   646   646 F linker  : CANNOT LINK EXECUTABLE "/sbin/qseecomd": library "libion.so" not found
  400. 06-06 23:16:58.331   647   647 D QC-time-services: Daemon:genoff_pre_init::Base = 0
  401. 06-06 23:16:58.331   647   647 D QC-time-services: Daemon:ats_rtc_init: Time read from RTC -- year = 70, month = 8,day = 22
  402. 06-06 23:16:58.331   647   647 D QC-time-services: Daemon ats_rtc_init: seconds = 22858085
  403. 06-06 23:16:58.331   647   647 D QC-time-services: Daemon:Value read from RTC seconds = 22858085000
  404. 06-06 23:16:58.331   647   647 D QC-time-services: Daemon:genoff_init_config: ATS_RTC initialized with rc: 0
  405. 06-06 23:16:58.331   647   647 D QC-time-services: Daemon:genoff_pre_init::Base = 1
  406. 06-06 23:16:58.331   647   647 D QC-time-services: Daemon: Storage Name: ats_1
  407. 06-06 23:16:58.331   647   647 D QC-time-services: Daemon:Opening File: /mnt/vendor/persist/time/ats_1 /data/vendor/time/ats_1
  408. 06-06 23:16:58.331   647   647 D QC-time-services: Daemon:time_persistent_memory_opr:Genoff Read operation
  409. 06-06 23:16:58.331   647   647 D QC-time-services: Daemon:Open File: /mnt/vendor/persist/time/ats_1
  410. 06-06 23:16:58.331   647   647 D QC-time-services: Daemon:Unable to open filefor read
  411. 09-22 13:28:05.000   647   647 I time_daemon: type=1400 audit(0.0:286): avc: denied { getattr } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=qipcrtr_socket permissive=1
  412. 09-22 13:28:05.000   647   647 I time_daemon: type=1400 audit(0.0:287): avc: denied { write } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=qipcrtr_socket permissive=1
  413. 09-22 13:28:05.000   647   647 I time_daemon: type=1400 audit(0.0:288): avc: denied { read } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=qipcrtr_socket permissive=1
  414. 09-22 13:28:05.009   649   649 E cutils-trace: Error opening trace file: No such file or directory (2)
  415. 09-22 13:28:05.010   649   649 D vndksupport: Loading /vendor/lib64/hw/android.hardware.gatekeeper@1.0-impl-qti.so from current namespace instead of sphal namespace.
  416. 09-22 13:28:05.011   649   649 E ServiceManagement: Failed to dlopen android.hardware.gatekeeper@1.0-impl-qti.so: dlopen failed: library "libion.so" not found
  417. 09-22 13:28:05.011   649   649 E android.hardware.gatekeeper@1.0-service: Could not get passthrough implementation for android.hardware.gatekeeper@1.0::IGatekeeper/default.
  418. 09-22 13:28:05.013   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  419. 09-22 13:28:05.013   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  420. 09-22 13:28:05.014   650   650 F linker  : CANNOT LINK EXECUTABLE "/sbin/android.hardware.keymaster@4.0-service-qti": library "libion.so" not found
  421. 09-22 13:28:06.014   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  422. 09-22 13:28:06.015   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  423. 09-22 13:28:07.016   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  424. 09-22 13:28:07.017   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  425. 09-22 13:28:08.018   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  426. 09-22 13:28:08.019   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  427. 09-22 13:28:09.019   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  428. 09-22 13:28:09.020   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  429. 09-22 13:28:09.998   656   656 F linker  : CANNOT LINK EXECUTABLE "/sbin/qseecomd": library "libion.so" not found
  430. 09-22 13:28:10.010   657   657 E cutils-trace: Error opening trace file: No such file or directory (2)
  431. 09-22 13:28:10.011   657   657 D vndksupport: Loading /vendor/lib64/hw/android.hardware.gatekeeper@1.0-impl-qti.so from current namespace instead of sphal namespace.
  432. 09-22 13:28:10.012   657   657 E ServiceManagement: Failed to dlopen android.hardware.gatekeeper@1.0-impl-qti.so: dlopen failed: library "libion.so" not found
  433. 09-22 13:28:10.012   657   657 E android.hardware.gatekeeper@1.0-service: Could not get passthrough implementation for android.hardware.gatekeeper@1.0::IGatekeeper/default.
  434. 09-22 13:28:10.016   658   658 F linker  : CANNOT LINK EXECUTABLE "/sbin/android.hardware.keymaster@4.0-service-qti": library "libion.so" not found
  435. 09-22 13:28:10.020   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  436. 09-22 13:28:10.020   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  437. 09-22 13:28:11.021   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  438. 09-22 13:28:11.021   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  439. 09-22 13:28:12.022   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  440. 09-22 13:28:12.023   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  441. 09-22 13:28:13.024   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  442. 09-22 13:28:13.025   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  443. 09-22 13:28:14.026   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  444. 09-22 13:28:14.026   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  445. 09-22 13:28:15.000   667   667 F linker  : CANNOT LINK EXECUTABLE "/sbin/qseecomd": library "libion.so" not found
  446. 09-22 13:28:15.011   668   668 E cutils-trace: Error opening trace file: No such file or directory (2)
  447. 09-22 13:28:15.012   668   668 D vndksupport: Loading /vendor/lib64/hw/android.hardware.gatekeeper@1.0-impl-qti.so from current namespace instead of sphal namespace.
  448. 09-22 13:28:15.012   668   668 E ServiceManagement: Failed to dlopen android.hardware.gatekeeper@1.0-impl-qti.so: dlopen failed: library "libion.so" not found
  449. 09-22 13:28:15.012   668   668 E android.hardware.gatekeeper@1.0-service: Could not get passthrough implementation for android.hardware.gatekeeper@1.0::IGatekeeper/default.
  450. 09-22 13:28:15.017   669   669 F linker  : CANNOT LINK EXECUTABLE "/sbin/android.hardware.keymaster@4.0-service-qti": library "libion.so" not found
  451. 09-22 13:28:15.026   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  452. 09-22 13:28:15.027   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  453. 09-22 13:28:16.027   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  454. 09-22 13:28:16.028   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  455. 09-22 13:28:17.028   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  456. 09-22 13:28:17.029   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  457. 09-22 13:28:18.029   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  458. 09-22 13:28:18.029   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
  459. 09-22 13:28:19.030   531   531 W ServiceManagement: Waited one second for android.hardware.keymaster@4.0::IKeymasterDevice/default
  460. 09-22 13:28:19.030   531   531 I ServiceManagement: getService: Trying again for android.hardware.keymaster@4.0::IKeymasterDevice/default...
Add Comment
Please, Sign In to add comment