--------- beginning of main 02-16 05:44:10.112 630 633 I adbd : initializing functionfs 02-16 05:44:10.112 630 633 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0 02-16 05:44:10.115 630 633 I adbd : functionfs successfully initialized 02-16 05:44:10.115 630 633 I adbd : registering usb transport 02-16 05:44:10.115 630 635 E cutils-trace: Error opening trace file: No such file or directory (2) 02-16 05:44:10.121 631 631 D QSEECOMD: : qseecom listener services process entry PPID = 1 02-16 05:44:10.121 631 631 E QSEECOMD: : Listener: index = 0, hierarchy = 0 02-16 05:44:10.121 631 631 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds 02-16 05:44:10.121 631 631 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_init_service) succeeds 02-16 05:44:10.122 631 631 I rpmb_ufs: RPMB Mult (512-byte sector) = 32768, Rel_sec_cnt = 64 02-16 05:44:10.123 631 631 E DrmLibRpmb: rpmb_init succeeded! with ret = 0 02-16 05:44:10.132 631 631 D QSEECOMD: : Init dlopen(libsecureui.so, RTLD_NOW) succeeds 02-16 05:44:10.132 631 631 D QSEECOMD: : Init::Init dlsym(g_FSHandle secure_ui_init) succeeds 02-16 05:44:10.132 631 631 D QSEECOMD: : Init secure_ui_init ret = 0 02-16 05:44:10.132 631 631 D QSEECOMD: : secure UI services: init (Listener ID = 16384) 02-16 05:44:10.132 631 631 D QSEECOMD: : qseecom listener service threads starting!!! 02-16 05:44:10.132 631 631 D QSEECOMD: : Total listener services to start = 9 02-16 05:44:10.132 631 631 E QSEECOMD: : Listener: index = 0, hierarchy = 1 02-16 05:44:10.132 631 631 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds 02-16 05:44:10.132 631 631 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_start) succeeds 02-16 05:44:10.132 631 631 D QSEECOMAPI: QSEECom_register_listener 8192 sb_length = 0x6400 02-16 05:44:10.133 631 631 D QSEECOMD: : Init rpmb_start ret = 0 02-16 05:44:10.133 631 631 D QSEECOMD: : RPMB system services: Started (Listener ID = 8192) 02-16 05:44:10.133 631 631 E QSEECOMD: : Listener: index = 1, hierarchy = 1 02-16 05:44:10.133 631 631 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds 02-16 05:44:10.133 631 631 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_start) succeeds 02-16 05:44:10.133 631 631 D QSEECOMAPI: QSEECom_register_listener 12288 sb_length = 0x5000 02-16 05:44:10.133 631 631 D QSEECOMD: : Init ssd_start ret = 0 02-16 05:44:10.133 631 631 D QSEECOMD: : SSD system services: Started (Listener ID = 12288) 02-16 05:44:10.133 631 631 E QSEECOMD: : Listener: index = 2, hierarchy = 1 02-16 05:44:10.133 631 631 D QSEECOMD: : Init dlopen(libsecureui.so, RTLD_NOW) succeeds 02-16 05:44:10.133 631 631 D QSEECOMD: : Init::Init dlsym(g_FSHandle secure_ui_start) succeeds 02-16 05:44:10.133 631 631 D QSEECOMAPI: QSEECom_register_listener 16384 sb_length = 0x10a8 02-16 05:44:10.133 631 631 D QSEECOMD: : Init secure_ui_start ret = 0 02-16 05:44:10.133 631 631 D QSEECOMD: : secure UI services: Started (Listener ID = 16384) 02-16 05:44:10.133 631 631 E QSEECOMD: : Listener: index = 3, hierarchy = 1 02-16 05:44:10.134 631 631 D QSEECOMD: : Init dlopen(libdrmtime.so, RTLD_NOW) succeeds 02-16 05:44:10.134 631 631 D QSEECOMD: : Init::Init dlsym(g_FSHandle atime_start) succeeds 02-16 05:44:10.134 631 631 D DrmLibTime: QSEE Time Listener: atime_start 02-16 05:44:10.134 631 631 D QSEECOMAPI: QSEECom_register_listener 11 sb_length = 0x5000 02-16 05:44:10.134 631 631 D DrmLibTime: registering fs service to QSEECom is done! 02-16 05:44:10.134 631 631 D DrmLibTime: begin to create a thread! 02-16 05:44:10.134 631 631 D DrmLibTime: Creating a pthread in atime_start is done! return 0 02-16 05:44:10.134 631 631 D QSEECOMD: : Init atime_start ret = 0 02-16 05:44:10.134 631 631 D QSEECOMD: : time services: Started (Listener ID = 11) 02-16 05:44:10.134 631 631 E QSEECOMD: : Listener: index = 4, hierarchy = 1 02-16 05:44:10.134 631 631 D QSEECOMD: : Init dlopen(libdrmfs.so, RTLD_NOW) succeeds 02-16 05:44:10.134 631 631 D QSEECOMD: : Init::Init dlsym(g_FSHandle fs_start) succeeds 02-16 05:44:10.134 631 631 D QSEECOMAPI: QSEECom_register_listener 10 sb_length = 0x5000 02-16 05:44:10.134 631 643 D DrmLibTime: QSEE Time Listener: dispatch 02-16 05:44:10.134 631 643 D DrmLibTime: before calling ioctl to read the next time_cmd 02-16 05:44:10.134 631 631 D QSEECOMD: : Init fs_start ret = 0 02-16 05:44:10.134 631 631 D QSEECOMD: : file system services: Started (Listener ID = 10) 02-16 05:44:10.134 631 631 E QSEECOMD: : Listener: index = 5, hierarchy = 1 02-16 05:44:10.134 631 631 D QSEECOMD: : Init dlopen(libdrmfs.so, RTLD_NOW) succeeds 02-16 05:44:10.134 631 631 D QSEECOMD: : Init::Init dlsym(g_FSHandle gpfs_start) succeeds 02-16 05:44:10.135 631 631 E DrmLibFs: Error: Invalid config file 02-16 05:44:10.135 631 631 E DrmLibFs: Data path not parsed: Using default data path: /data/vendor/tzstorage/ 02-16 05:44:10.135 631 631 E DrmLibFs: Persist path not parsed: Using default persist path: /mnt/vendor/persist/data/ 02-16 05:44:10.135 631 631 D QSEECOMAPI: QSEECom_register_listener 28672 sb_length = 0x7e000 02-16 05:44:10.136 631 631 D QSEECOMD: : Init gpfs_start ret = 0 02-16 05:44:10.136 631 631 D QSEECOMD: : gpfile system services: Started (Listener ID = 28672) 02-16 05:44:10.136 631 631 E QSEECOMD: : Listener: index = 6, hierarchy = 1 02-16 05:44:10.137 631 631 D QSEECOMD: : Init dlopen(libqisl.so, RTLD_NOW) succeeds 02-16 05:44:10.137 631 631 D QSEECOMD: : Init::Init dlsym(g_FSHandle qisl_start) succeeds --------- beginning of system 02-16 05:44:10.137 631 646 I QISL : QSEE Interrupt Service Listener Thread is started 02-16 05:44:10.137 631 646 D QSEECOMAPI: QSEECom_register_listener 36864 sb_length = 0x1f4 02-16 05:44:10.137 631 646 I QISL : QSEE Interrupt Service Listener was activated successfully 02-16 05:44:10.138 631 631 D QSEECOMD: : Init qisl_start ret = 0 02-16 05:44:10.138 631 631 D QSEECOMD: : interrupt services: Started (Listener ID = 36864) 02-16 05:44:10.138 631 631 E QSEECOMD: : Listener: index = 7, hierarchy = 1 02-16 05:44:10.138 631 631 D QSEECOMD: : Init dlopen(libspl.so, RTLD_NOW) succeeds 02-16 05:44:10.138 631 631 D QSEECOMD: : Init::Init dlsym(g_FSHandle spl_start) succeeds 02-16 05:44:10.139 631 631 D SPL : Call QSEECom_register_listener() 02-16 05:44:10.139 631 631 D QSEECOMAPI: QSEECom_register_listener 45056 sb_length = 0x400 02-16 05:44:03.715 629 629 W auditd : type=2000 audit(0.0:1): initialized 02-16 05:44:10.139 631 631 D SPL : Registered listener sucessfully! 02-16 05:44:10.139 631 631 D SPL : pipe read-fd [31] write-fd [32] 02-16 05:44:10.139 631 631 D SPL : Create thread 02-16 05:44:10.139 631 631 D SPL : Thread created sucessfully. 02-16 05:44:10.139 631 631 D QSEECOMD: : Init spl_start ret = 0 02-16 05:44:10.139 631 631 D QSEECOMD: : secure processor services: Started (Listener ID = 45056) 02-16 05:44:10.139 631 647 D SPL : spl_dispatch() started 02-16 05:44:10.139 631 631 E QSEECOMD: : Listener: index = 8, hierarchy = 1 02-16 05:44:10.139 631 647 D SPL : ==== Wait For Request ====== 02-16 05:44:10.139 631 631 D QSEECOMD: : Init dlopen(libGPreqcancel.so, RTLD_NOW) succeeds 02-16 05:44:10.139 631 631 D QSEECOMD: : Init::Init dlsym(g_FSHandle gp_reqcancel_start) succeeds 02-16 05:44:10.139 631 631 D QSEECOMAPI: QSEECom_register_listener 4352 sb_length = 0x5000 02-16 05:44:10.140 631 631 D QSEECOMD: : Init gp_reqcancel_start ret = 0 02-16 05:44:10.140 631 631 D QSEECOMD: : gp request cancellation services: Started (Listener ID = 4352) 02-16 05:44:10.140 631 631 D QSEECOMD: : QSEECOM DAEMON RUNNING 02-16 05:44:04.590 629 629 I auditd : type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295 02-16 05:44:04.590 629 629 W auditd : type=1404 audit(0.0:3): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 02-16 05:44:04.603 1 1 W init : type=1400 audit(0.0:4): avc: denied { setcheckreqprot } for scontext=u:r:init:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=0 02-16 05:44:05.083 1 1 W init : type=1400 audit(0.0:5): avc: denied { setattr } for name="system" dev="rootfs" ino=18803 scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=0 02-16 05:44:05.086 1 1 W init : type=1400 audit(0.0:6): avc: denied { module_request } for kmod="fs-functionfs" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=0 02-16 05:44:05.093 587 587 W init : type=1400 audit(0.0:7): avc: denied { entrypoint } for path="/sbin/logd" dev="rootfs" ino=18657 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=0 02-16 05:44:05.103 1 1 W init : type=1400 audit(0.0:8): avc: denied { module_request } for kmod="usbfunc:rndis_bam" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=0 02-16 05:44:05.103 1 1 W init : type=1400 audit(0.0:9): avc: denied { module_request } for kmod="usbfunc:rmnet_bam" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=0 02-16 05:44:05.103 1 1 W init : type=1400 audit(0.0:10): avc: denied { module_request } for kmod="usbfunc:rmnet_bam" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=0 02-16 05:44:10.096 629 629 I init : type=1400 audit(0.0:42): avc: denied { entrypoint } for path="/sbin/logd" dev="rootfs" ino=18657 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 02-16 05:44:10.096 629 629 I logd : type=1400 audit(0.0:43): avc: denied { read execute } for path="/sbin/logd" dev="rootfs" ino=18657 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 02-16 05:44:10.096 629 629 I logd : type=1400 audit(0.0:44): avc: denied { getattr } for path="/sbin/logd" dev="rootfs" ino=18657 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 02-16 05:44:10.096 629 629 I logd : type=1400 audit(0.0:45): avc: denied { open } for path="/sbin/ld.config.txt" dev="rootfs" ino=18559 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 02-16 05:44:10.120 631 631 I qseecomd: type=1400 audit(0.0:46): avc: denied { read } for name="sg8" dev="tmpfs" ino=2153 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 02-16 05:44:10.120 631 631 I qseecomd: type=1400 audit(0.0:47): avc: denied { open } for path="/dev/sg8" dev="tmpfs" ino=2153 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 02-16 05:44:10.120 631 631 I qseecomd: type=1400 audit(0.0:48): avc: denied { ioctl } for path="/dev/sg8" dev="tmpfs" ino=2153 ioctlcmd=5382 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 02-16 05:44:10.120 631 631 I qseecomd: type=1400 audit(0.0:49): avc: denied { setattr } for name="sg2" dev="tmpfs" ino=2154 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 02-16 05:44:10.120 631 631 I qseecomd: type=1400 audit(0.0:50): avc: denied { write } for name="sg2" dev="tmpfs" ino=2154 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1 02-16 05:44:10.130 631 631 I qseecomd: type=1400 audit(0.0:51): avc: denied { read } for name="ion" dev="tmpfs" ino=2161 scontext=u:r:recovery:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1 02-16 05:44:10.130 631 631 I qseecomd: type=1400 audit(0.0:52): avc: denied { open } for path="/dev/ion" dev="tmpfs" ino=2161 scontext=u:r:recovery:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1 02-16 05:44:10.130 631 631 I qseecomd: type=1400 audit(0.0:53): avc: denied { ioctl } for path="/dev/ion" dev="tmpfs" ino=2161 ioctlcmd=4900 scontext=u:r:recovery:s0 tcontext=u:object_r:ion_device:s0 tclass=chr_file permissive=1 02-16 05:44:10.130 631 631 I qseecomd: type=1400 audit(0.0:54): avc: denied { read } for name="vndbinder" dev="tmpfs" ino=12203 scontext=u:r:recovery:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1 02-16 05:44:10.130 631 631 I qseecomd: type=1400 audit(0.0:55): avc: denied { write } for name="vndbinder" dev="tmpfs" ino=12203 scontext=u:r:recovery:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1 02-16 05:44:10.130 631 631 I qseecomd: type=1400 audit(0.0:56): avc: denied { open } for path="/dev/vndbinder" dev="tmpfs" ino=12203 scontext=u:r:recovery:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1 02-16 05:44:10.130 631 631 I qseecomd: type=1400 audit(0.0:57): avc: denied { ioctl } for path="/dev/vndbinder" dev="tmpfs" ino=12203 ioctlcmd=6209 scontext=u:r:recovery:s0 tcontext=u:object_r:vndbinder_device:s0 tclass=chr_file permissive=1 02-16 05:44:10.146 653 653 I servicemanager: type=1400 audit(0.0:58): avc: denied { set_context_mgr } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1 02-16 05:44:10.146 653 653 I servicemanager: type=1400 audit(0.0:59): avc: denied { read } for name="plat_service_contexts" dev="rootfs" ino=18446 scontext=u:r:recovery:s0 tcontext=u:object_r:service_contexts_file:s0 tclass=file permissive=1 02-16 05:44:10.152 653 653 I SELinux : SELinux: Loaded service_contexts from: 02-16 05:44:10.153 653 653 I SELinux : /plat_service_contexts 02-16 05:44:10.153 653 653 I SELinux : /vendor_service_contexts 02-16 05:44:10.165 649 649 E SELinux : avc: denied { add } for interface=android.hidl.manager::IServiceManager sid=u:r:recovery:s0 pid=649 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_manager_hwservice:s0 tclass=hwservice_manager permissive=1 02-16 05:44:10.165 649 649 E SELinux : avc: denied { add } for interface=android.hidl.base::IBase sid=u:r:recovery:s0 pid=649 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1 02-16 05:44:10.165 649 649 E SELinux : avc: denied { add } for interface=android.hidl.token::ITokenManager sid=u:r:recovery:s0 pid=649 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_token_hwservice:s0 tclass=hwservice_manager permissive=1 02-16 05:44:10.165 649 649 I hwservicemanager: hwservicemanager is ready now. 02-16 05:44:10.166 649 649 E cutils-trace: Error opening trace file: No such file or directory (2) 02-16 05:44:10.166 649 649 W /sbin/hwservicemanager: Cannot open /system/manifest.xml 02-16 05:44:10.166 649 649 W /sbin/hwservicemanager: Cannot open /vendor/manifest.xml 02-16 05:44:10.166 649 649 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest. 02-16 05:44:10.167 649 649 E SELinux : avc: denied { find } for interface=android.hardware.keymaster::IKeymasterDevice sid=u:r:recovery:s0 pid=589 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1 02-16 05:44:10.167 649 649 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@4.0::IKeymasterDevice/default in either framework or device manifest. 02-16 05:44:10.168 649 649 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest. 02-16 05:44:10.187 649 649 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest. 02-16 05:44:10.187 649 649 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@4.0::IKeymasterDevice/default in either framework or device manifest. 02-16 05:44:10.188 649 649 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest. 02-16 05:44:10.199 649 649 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest. 02-16 05:44:10.205 649 649 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@4.0::IKeymasterDevice/default in either framework or device manifest. 02-16 05:44:10.206 649 649 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest. 02-16 05:44:11.379 674 675 I adbd : initializing functionfs 02-16 05:44:11.379 674 675 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0 02-16 05:44:11.386 674 675 I adbd : functionfs successfully initialized 02-16 05:44:11.386 674 675 I adbd : registering usb transport 02-16 05:44:11.386 674 676 E cutils-trace: Error opening trace file: No such file or directory (2) 02-16 05:44:11.856 589 589 I recovery: type=1400 audit(0.0:313): avc: denied { getattr } for path="/vndservice_contexts" dev="rootfs" ino=21723 scontext=u:r:recovery:s0 tcontext=u:object_r:vndservice_contexts_file:s0 tclass=file permissive=1 02-16 05:44:11.856 589 589 I recovery: type=1400 audit(0.0:314): avc: denied { getattr } for path="/vendor_seapp_contexts" dev="rootfs" ino=21721 scontext=u:r:recovery:s0 tcontext=u:object_r:seapp_contexts_file:s0 tclass=file permissive=1 02-16 05:44:11.856 589 589 I recovery: type=1400 audit(0.0:315): avc: denied { getattr } for path="/sepolicy" dev="rootfs" ino=18800 scontext=u:r:recovery:s0 tcontext=u:object_r:sepolicy_file:s0 tclass=file permissive=1 02-16 05:44:11.856 589 589 I recovery: type=1400 audit(0.0:316): avc: denied { getattr } for path="/init" dev="rootfs" ino=18417 scontext=u:r:recovery:s0 tcontext=u:object_r:init_exec:s0 tclass=file permissive=1 02-16 05:44:12.106 589 589 I recovery: type=1400 audit(0.0:317): avc: denied { open } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=12068 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 02-16 05:44:12.136 673 673 I recovery: type=1400 audit(0.0:404): avc: denied { write } for name="mtp_usb" dev="tmpfs" ino=25707 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1 02-16 05:44:12.136 673 673 I recovery: type=1400 audit(0.0:405): avc: denied { write open } for path="/dev/mtp_usb" dev="tmpfs" ino=25707 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1 02-16 05:44:12.136 673 673 I recovery: type=1400 audit(0.0:406): avc: denied { read } for name="mtp_usb" dev="tmpfs" ino=25707 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1 02-16 05:44:12.136 673 673 I recovery: type=1400 audit(0.0:407): avc: denied { read } for name="/" dev="mmcblk0p1" ino=1 scontext=u:r:recovery:s0 tcontext=u:object_r:vfat:s0 tclass=dir permissive=1 02-16 05:44:12.136 673 673 I recovery: type=1400 audit(0.0:408): avc: denied { open } for path="/external_sd" dev="mmcblk0p1" ino=1 scontext=u:r:recovery:s0 tcontext=u:object_r:vfat:s0 tclass=dir permissive=1 02-16 05:44:14.096 589 589 I recovery: type=1400 audit(0.0:410): avc: denied { create } for name="twadbfifo" scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1 02-16 05:44:14.096 589 589 I recovery: type=1400 audit(0.0:411): avc: denied { read } for name="twadbfifo" dev="tmpfs" ino=26658 scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1 02-16 05:44:14.096 589 589 I recovery: type=1400 audit(0.0:412): avc: denied { open } for path="/tmp/twadbfifo" dev="tmpfs" ino=26658 scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1 02-16 05:44:14.106 589 589 I recovery: type=1400 audit(0.0:413): avc: denied { remove_name } for name="system" dev="rootfs" ino=27657 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1 02-16 05:44:14.106 589 589 I recovery: type=1400 audit(0.0:414): avc: denied { create } for name="system" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1 02-16 05:44:20.636 589 589 I recovery: type=1400 audit(0.0:417): avc: denied { rmdir } for name="dalvik-cache" dev="sda12" ino=1835009 scontext=u:r:recovery:s0 tcontext=u:object_r:dalvikcache_data_file:s0 tclass=dir permissive=1 02-16 05:44:20.646 589 589 I recovery: type=1400 audit(0.0:418): avc: denied { remove_name } for name="Fvo7W02MtF0o+XKQqBXGEB" dev="sda12" ino=2228228 scontext=u:r:recovery:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1 02-16 05:44:20.646 589 589 I recovery: type=1400 audit(0.0:419): avc: denied { rmdir } for name="pojY9G5YVVZSgsz7Tu6IFD" dev="sda12" ino=2228227 scontext=u:r:recovery:s0 tcontext=u:object_r:trace_data_file:s0 tclass=dir permissive=1 02-16 05:44:20.646 589 589 I recovery: type=1400 audit(0.0:420): avc: denied { rmdir } for name="WoiqzVH+hEUCbERzTO1hNA" dev="sda12" ino=2228226 scontext=u:r:recovery:s0 tcontext=u:object_r:shell_data_file:s0 tclass=dir permissive=1 02-16 05:44:20.646 589 589 I recovery: type=1400 audit(0.0:421): avc: denied { rmdir } for name="local" dev="sda12" ino=2228225 scontext=u:r:recovery:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1 02-16 05:44:29.966 589 589 I recovery: type=1400 audit(0.0:555): avc: denied { getattr } for path="/vndservice_contexts" dev="rootfs" ino=21723 scontext=u:r:recovery:s0 tcontext=u:object_r:vndservice_contexts_file:s0 tclass=file permissive=1 02-16 05:44:29.966 589 589 I recovery: type=1400 audit(0.0:556): avc: denied { getattr } for path="/sepolicy" dev="rootfs" ino=18800 scontext=u:r:recovery:s0 tcontext=u:object_r:sepolicy_file:s0 tclass=file permissive=1 02-16 05:44:31.686 589 589 I recovery: type=1400 audit(0.0:557): avc: denied { read } for scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=file permissive=1 02-16 05:44:31.686 589 589 I recovery: type=1400 audit(0.0:558): avc: denied { read } for scontext=u:r:recovery:s0 tcontext=u:r:kernel:s0 tclass=file permissive=1 02-16 05:44:31.686 589 589 I recovery: type=1400 audit(0.0:559): avc: denied { getattr } for path="/proc/fb" dev="proc" ino=4026531976 scontext=u:r:recovery:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1 02-16 05:44:31.686 589 589 I recovery: type=1400 audit(0.0:560): avc: denied { getattr } for path="/proc/kmsg" dev="proc" ino=4026532129 scontext=u:r:recovery:s0 tcontext=u:object_r:proc_kmsg:s0 tclass=file permissive=1 02-16 05:44:31.686 589 589 I recovery: type=1400 audit(0.0:561): avc: denied { getattr } for path="/proc/misc" dev="proc" ino=4026531977 scontext=u:r:recovery:s0 tcontext=u:object_r:proc_misc:s0 tclass=file permissive=1 02-16 05:44:31.686 589 589 I recovery: type=1400 audit(0.0:562): avc: denied { getattr } for path="/proc/stat" dev="proc" ino=4026532125 scontext=u:r:recovery:s0 tcontext=u:object_r:proc_stat:s0 tclass=file permissive=1 02-16 05:44:31.686 589 589 I recovery: type=1400 audit(0.0:563): avc: denied { getattr } for path="/proc/iomem" dev="proc" ino=4026532167 scontext=u:r:recovery:s0 tcontext=u:object_r:proc_iomem:s0 tclass=file permissive=1 02-16 05:44:31.686 589 589 I recovery: type=1400 audit(0.0:564): avc: denied { getattr } for path="/proc/uptime" dev="proc" ino=4026532126 scontext=u:r:recovery:s0 tcontext=u:object_r:proc_uptime:s0 tclass=file permissive=1 02-16 05:44:38.770 589 589 I recovery: type=1400 audit(0.0:593): avc: denied { getattr } for path="/vendor_service_contexts" dev="rootfs" ino=21722 scontext=u:r:recovery:s0 tcontext=u:object_r:nonplat_service_contexts_file:s0 tclass=file permissive=1 02-16 05:44:38.770 589 589 I recovery: type=1400 audit(0.0:594): avc: denied { getattr } for path="/vendor_seapp_contexts" dev="rootfs" ino=21721 scontext=u:r:recovery:s0 tcontext=u:object_r:seapp_contexts_file:s0 tclass=file permissive=1 02-16 05:44:38.770 589 589 I recovery: type=1400 audit(0.0:595): avc: denied { getattr } for path="/vendor_hwservice_contexts" dev="rootfs" ino=21719 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1 02-16 05:44:38.770 589 589 I recovery: type=1400 audit(0.0:596): avc: denied { getattr } for path="/plat_service_contexts" dev="rootfs" ino=18446 scontext=u:r:recovery:s0 tcontext=u:object_r:service_contexts_file:s0 tclass=file permissive=1 02-16 05:44:42.280 589 589 I recovery: type=1400 audit(0.0:597): avc: denied { read } for name="1" dev="proc" ino=12136 scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=dir permissive=1 02-16 05:44:42.280 589 589 I recovery: type=1400 audit(0.0:598): avc: denied { open } for path="/proc/1" dev="proc" ino=12136 scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=dir permissive=1 02-16 05:44:42.280 589 589 I recovery: type=1400 audit(0.0:599): avc: denied { search } for name="1" dev="proc" ino=12136 scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=dir permissive=1 02-16 05:44:42.280 589 589 I recovery: type=1400 audit(0.0:600): avc: denied { getattr } for path="/proc/1/environ" dev="proc" ino=24336 scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=file permissive=1 02-16 05:44:42.283 589 589 I recovery: type=1400 audit(0.0:601): avc: denied { read } for name="cwd" dev="proc" ino=24349 scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=lnk_file permissive=1 02-16 05:44:49.123 589 589 I recovery: type=1400 audit(0.0:602): avc: denied { read } for name="/" dev="pstore" ino=3136 scontext=u:r:recovery:s0 tcontext=u:object_r:pstorefs:s0 tclass=dir permissive=1 02-16 05:44:49.123 589 589 I recovery: type=1400 audit(0.0:603): avc: denied { open } for path="/sys/fs/pstore" dev="pstore" ino=3136 scontext=u:r:recovery:s0 tcontext=u:object_r:pstorefs:s0 tclass=dir permissive=1 02-16 05:44:49.123 589 589 I recovery: type=1400 audit(0.0:604): avc: denied { search } for name="/" dev="pstore" ino=3136 scontext=u:r:recovery:s0 tcontext=u:object_r:pstorefs:s0 tclass=dir permissive=1 02-16 05:45:17.707 677 677 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 02-16 05:45:17.707 677 677 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 02-16 05:45:17.708 674 674 I adbd : closing functionfs transport 02-16 05:45:17.739 674 675 I adbd : initializing functionfs 02-16 05:45:17.739 674 675 I adbd : functionfs successfully initialized 02-16 05:45:17.739 674 675 I adbd : registering usb transport 02-16 05:45:19.403 722 722 I recovery: type=1400 audit(0.0:605): avc: denied { read write } for name="0" dev="devpts" ino=3 scontext=u:r:recovery:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=1 02-16 05:45:19.403 722 722 I recovery: type=1400 audit(0.0:606): avc: denied { open } for path="/dev/pts/0" dev="devpts" ino=3 scontext=u:r:recovery:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=1 02-16 05:45:19.403 722 722 I recovery: type=1400 audit(0.0:607): avc: denied { ioctl } for path="/dev/pts/0" dev="devpts" ino=3 ioctlcmd=540e scontext=u:r:recovery:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=1 02-16 05:45:19.413 722 722 I sh : type=1400 audit(0.0:608): avc: denied { getattr } for path="/dev/pts/0" dev="devpts" ino=3 scontext=u:r:recovery:s0 tcontext=u:object_r:devpts:s0 tclass=chr_file permissive=1 02-16 05:45:20.211 717 717 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 02-16 05:45:20.211 717 717 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 02-16 05:45:20.211 674 674 I adbd : closing functionfs transport 02-16 05:45:20.245 674 675 I adbd : initializing functionfs 02-16 05:45:20.245 674 675 I adbd : functionfs successfully initialized 02-16 05:45:20.246 674 675 I adbd : registering usb transport 02-16 05:45:22.559 725 725 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 02-16 05:45:22.559 725 725 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 02-16 05:45:22.560 674 674 I adbd : closing functionfs transport 02-16 05:45:22.605 674 675 I adbd : initializing functionfs 02-16 05:45:22.605 674 675 I adbd : functionfs successfully initialized 02-16 05:45:22.605 674 675 I adbd : registering usb transport 02-16 05:46:09.990 748 748 I cat : type=1400 audit(0.0:609): avc: denied { read } for name="kmsg" dev="proc" ino=4026532129 scontext=u:r:recovery:s0 tcontext=u:object_r:proc_kmsg:s0 tclass=file permissive=1 02-16 05:46:09.990 748 748 I cat : type=1400 audit(0.0:610): avc: denied { open } for path="/proc/kmsg" dev="proc" ino=4026532129 scontext=u:r:recovery:s0 tcontext=u:object_r:proc_kmsg:s0 tclass=file permissive=1 02-16 05:46:09.990 748 748 I cat : type=1400 audit(0.0:611): avc: denied { syslog } for capability=34 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=capability2 permissive=1 02-16 05:46:09.990 748 748 I cat : type=1400 audit(0.0:612): avc: denied { syslog_mod } for scontext=u:r:recovery:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1 02-16 05:46:43.040 761 761 I cp : type=1400 audit(0.0:613): avc: denied { create } for name="kmsg" scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1 02-16 05:46:43.040 673 673 I recovery: type=1400 audit(0.0:614): avc: denied { getattr } for path="/data/media/kmsg" dev="sda12" ino=131073 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1 02-16 05:46:43.040 761 761 I cp : type=1400 audit(0.0:615): avc: denied { read write open } for path="/sdcard/kmsg" dev="sda12" ino=131073 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=file permissive=1