· 6 years ago · Jan 04, 2020, 01:56 PM
1C:\adb>adb logcat
2--------- beginning of main
306-07 22:23:46.927 540 540 W auditd : type=2000 audit(0.0:1): state=initialized audit_enabled=0 res=1
406-07 22:23:47.533 540 540 I auditd : type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295
506-07 22:23:47.540 1 1 I init : type=1400 audit(0.0:3): avc: denied { setcheckreqprot } for scontext=u:r:init:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1
606-07 22:23:47.540 1 1 I init : type=1400 audit(0.0:4): avc: denied { dac_read_search } for capability=2 scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=capability permissive=1
706-07 22:23:47.540 1 1 I init : type=1400 audit(0.0:5): avc: denied { create } for name="cgroup.procs" scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
806-07 22:23:47.540 1 1 I init : type=1400 audit(0.0:6): avc: denied { write } for path="/acct/uid_0/pid_527/cgroup.procs" dev="rootfs" ino=27078 scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
906-07 22:23:47.543 525 525 I init : type=1400 audit(0.0:7): avc: denied { map } for path="/plat_file_contexts" dev="rootfs" ino=14049 scontext=u:r:vendor_init:s0 tcontext=u:object_r:file_contexts_file:s0 tclass=file permissive=1
1006-07 22:23:47.663 1 1 I init : type=1400 audit(0.0:8): avc: denied { setattr } for name="system" dev="rootfs" ino=14406 scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1
1106-07 22:23:47.670 1 1 I init : type=1400 audit(0.0:9): avc: denied { module_request } for kmod="fs-functionfs" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1
1206-07 22:23:47.673 540 540 I init : type=1400 audit(0.0:10): avc: denied { entrypoint } for path="/sbin/logd" dev="rootfs" ino=14260 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
1306-07 22:23:47.690 537 537 I hwservicemanage: type=1400 audit(0.0:16): avc: denied { read } for name="plat_hwservice_contexts" dev="rootfs" ino=14050 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
1406-07 22:23:47.690 537 537 I hwservicemanage: type=1400 audit(0.0:17): avc: denied { open } for path="/vendor_hwservice_contexts" dev="rootfs" ino=14537 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
1506-07 22:23:47.690 537 537 I hwservicemanage: type=1400 audit(0.0:18): avc: denied { getattr } for path="/vendor_hwservice_contexts" dev="rootfs" ino=14537 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
1606-07 22:23:47.690 561 561 I qseecomd: type=1400 audit(0.0:19): avc: denied { read write } for name="sg0" dev="tmpfs" ino=27128 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
1706-07 22:23:47.690 561 561 I qseecomd: type=1400 audit(0.0:20): avc: denied { open } for path="/dev/sg0" dev="tmpfs" ino=27128 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
1806-07 22:23:47.690 561 561 I qseecomd: type=1400 audit(0.0:21): avc: denied { ioctl } for path="/dev/sg0" dev="tmpfs" ino=27128 ioctlcmd=0x5382 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
1906-07 22:23:47.690 537 537 I hwservicemanage: type=1400 audit(0.0:22): avc: denied { create } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1
2006-07 22:23:47.690 537 537 I hwservicemanage: type=1400 audit(0.0:23): avc: denied { bind } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1
2106-07 22:23:47.690 537 537 I hwservicemanage: type=1400 audit(0.0:24): avc: denied { read } for name="perms" dev="selinuxfs" ino=67112181 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1
2206-07 22:23:47.692 561 561 D QSEECOMD: : qseecom listener services process entry PPID = 1
2306-07 22:23:47.692 561 561 E QSEECOMD: : Listener: index = 0, hierarchy = 0
2406-07 22:23:47.692 561 561 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds
2506-07 22:23:47.692 561 561 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_init_service) succeeds
2606-07 22:23:47.692 537 537 E SELinux : avc: denied { add } for interface=android.hidl.manager::IServiceManager sid=u:r:recovery:s0 pid=537 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_manager_hwservice:s0 tclass=hwservice_manager permissive=1
2706-07 22:23:47.692 537 537 E SELinux : avc: denied { add } for interface=android.hidl.base::IBase sid=u:r:recovery:s0 pid=537 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1
2806-07 22:23:47.692 537 537 E SELinux : avc: denied { add } for interface=android.hidl.token::ITokenManager sid=u:r:recovery:s0 pid=537 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_token_hwservice:s0 tclass=hwservice_manager permissive=1
2906-07 22:23:47.693 561 561 E rpmb_ufs: Found an applicable RPMB lun and its index is 2
3006-07 22:23:47.693 561 561 I rpmb_ufs: RPMB Mult (512-byte sector) = 32768, Rel_sec_cnt = 32
3106-07 22:23:47.694 537 537 I hwservicemanager: hwservicemanager is ready now.
3206-07 22:23:47.694 561 561 E DrmLibRpmb: rpmb_init succeeded! with ret = 0
3306-07 22:23:47.694 561 561 D QSEECOMD: : Init rpmb_init_service ret = 0
3406-07 22:23:47.694 561 561 D QSEECOMD: : RPMB system services: init (Listener ID = 8192)
3506-07 22:23:47.694 561 561 E QSEECOMD: : Listener: index = 1, hierarchy = 0
3606-07 22:23:47.694 561 561 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds
3706-07 22:23:47.694 561 561 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_init_service) succeeds
3806-07 22:23:47.694 561 561 E SSD : ssd_init_service succeeded!
3906-07 22:23:47.694 561 561 D QSEECOMD: : Init ssd_init_service ret = 0
4006-07 22:23:47.694 561 561 D QSEECOMD: : SSD system services: init (Listener ID = 12288)
4106-07 22:23:47.694 561 561 E QSEECOMD: : Listener: index = 2, hierarchy = 0
4206-07 22:23:47.706 561 561 E QSEECOMD: : Init dlopen(libsecureui.so, RLTD_NOW) is failed.... dlopen failed: cannot locate symbol "_ZN7android8hardware23getOrCreateCachedBinderEPNS_4hidl4base4V1_05IBaseE" referenced by "/vendor/lib64/vendor.display.config@1.0.so"...
4306-07 22:23:47.708 561 561 E QSEECOMD: : Init dlopen(libsecureui.so, RLTD_NOW) is failed.... dlopen failed: library "libhidlbase.so" not found
4406-07 22:23:47.708 561 561 E QSEECOMD: : Listener: index = 3, hierarchy = 1
4506-07 22:23:47.709 561 561 D QSEECOMD: : Init dlopen(libdrmtime.so, RTLD_NOW) succeeds
4606-07 22:23:47.709 561 561 D QSEECOMD: : Init::Init dlsym(g_FSHandle atime_start) succeeds
4706-07 22:23:47.709 561 561 D DrmLibTime: QSEE Time Listener: atime_start
4806-07 22:23:47.709 561 561 D QSEECOMAPI: QSEECom_register_listener 11 sb_length = 0x5000
4906-07 22:23:47.709 561 561 D DrmLibTime: registering fs service to QSEECom is done!
5006-07 22:23:47.709 561 561 D DrmLibTime: begin to create a thread!
5106-07 22:23:47.709 561 561 D DrmLibTime: Creating a pthread in atime_start is done! return 0
5206-07 22:23:47.709 561 561 D QSEECOMD: : Init atime_start ret = 0
5306-07 22:23:47.711 561 567 D QSEECOMAPI: QSEECom_register_listener 36864 sb_length = 0x1f4
54--------- beginning of system
5506-07 22:23:47.711 561 567 I QISL : QSEE Interrupt Service Listener was activated successfully
5606-07 22:23:47.711 561 561 D QSEECOMD: : Init qisl_start ret = 0
5706-07 22:23:47.711 561 561 D QSEECOMD: : interrupt services: Started (Listener ID = 36864)
5806-07 22:23:47.711 561 561 E QSEECOMD: : Listener: index = 7, hierarchy = 1
5906-07 22:23:47.711 561 561 D QSEECOMD: : Init dlopen(libspl.so, RTLD_NOW) succeeds
6006-07 22:23:47.711 561 561 D QSEECOMD: : Init::Init dlsym(g_FSHandle spl_start) succeeds
6106-07 22:23:47.711 561 561 D SPL : Call QSEECom_register_listener()
6206-07 22:23:47.711 561 561 D QSEECOMAPI: QSEECom_register_listener 45056 sb_length = 0x400
6306-07 22:23:47.712 561 561 D SPL : Registered listener sucessfully!
6406-07 22:23:47.712 561 561 D SPL : pipe read-fd [29] write-fd [30]
6506-07 22:23:47.712 561 561 D SPL : Create thread
6606-07 22:23:47.712 561 561 D SPL : Thread created sucessfully.
6706-07 22:23:47.712 561 561 D QSEECOMD: : Init spl_start ret = 0
6806-07 22:23:47.712 561 561 D QSEECOMD: : secure processor services: Started (Listener ID = 45056)
6906-07 22:23:47.712 561 561 E QSEECOMD: : Listener: index = 8, hierarchy = 1
7006-07 22:23:47.725 573 573 I SELinux : SELinux: Loaded service_contexts from:
7106-07 22:23:47.725 573 573 I SELinux : /plat_service_contexts
7206-07 22:23:47.725 573 573 I SELinux : /vendor_service_contexts
7306-07 22:23:47.726 572 572 E cutils-trace: Error opening trace file: No such file or directory (2)
7406-07 22:23:47.726 537 537 E cutils-trace: Error opening trace file: No such file or directory (2)
7506-07 22:23:47.727 537 537 E SELinux : avc: denied { find } for interface=android.hardware.gatekeeper::IGatekeeper sid=u:r:recovery:s0 pid=572 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1
7606-07 22:23:47.727 537 537 W /sbin/hwservicemanager: Cannot open /system/manifest.xml
7706-07 22:23:47.734 570 570 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000
7806-07 22:23:47.734 570 570 D QSEECOMAPI: App is already loaded QSEE and app id = 1
7906-07 22:23:47.734 570 570 E ion : ioctl c0044901 failed with code -1: Not a typewriter
8006-07 22:23:47.736 570 570 E KeymasterUtils: TA API Major Version: 4
8106-07 22:23:47.736 570 570 E KeymasterUtils: TA API Minor Version: 0
8206-07 22:23:47.736 570 570 E KeymasterUtils: TA Major Version: 4
8306-07 22:23:47.736 570 570 E KeymasterUtils: TA Minor Version: 526
8406-07 22:23:47.740 570 570 I ServiceManagement: Removing namespace from process name android.hardware.keymaster@4.0-service-qti to keymaster@4.0-service-qti.
8506-07 22:23:47.740 570 570 E cutils-trace: Error opening trace file: No such file or directory (2)
8606-07 22:23:47.746 572 572 D vndksupport: Loading /vendor/lib64/hw/android.hardware.gatekeeper@1.0-impl-qti.so from current namespace instead of sphal namespace.
8706-07 22:23:47.746 537 537 E SELinux : avc: denied { add } for interface=android.hardware.keymaster::IKeymasterDevice sid=u:r:recovery:s0 pid=570 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1
8806-07 22:23:47.749 542 542 I ArmToArm64Assembler: generated scanline__00000077:03010101_00008001_00000000 [195 ipp] (241 ins) at [0x72268073c0:0x7226807784] in 30729 ns
8906-07 22:23:47.750 572 572 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000
9006-07 22:23:47.750 572 572 D QSEECOMAPI: App is already loaded QSEE and app id = 1
9106-07 22:23:47.750 572 572 E ion : ioctl c0044901 failed with code -1: Not a typewriter
9206-07 22:23:47.752 572 572 E KeymasterUtils: TA API Major Version: 4
9306-07 22:23:47.752 572 572 E KeymasterUtils: TA API Minor Version: 0
9406-07 22:23:47.752 572 572 E KeymasterUtils: TA Major Version: 4
9506-07 22:23:47.752 572 572 E KeymasterUtils: TA Minor Version: 526
9606-07 22:23:47.753 572 572 I ServiceManagement: Removing namespace from process name android.hardware.gatekeeper@1.0-service-qti to gatekeeper@1.0-service-qti.
9706-07 22:23:47.753 537 537 E SELinux : avc: denied { add } for interface=android.hardware.gatekeeper::IGatekeeper sid=u:r:recovery:s0 pid=572 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1
9801-04 13:50:46.136 542 542 I recovery: type=1400 audit(0.0:62): avc: denied { search } for name="unencrypted" dev="sda31" ino=3407873 scontext=u:r:recovery:s0 tcontext=u:object_r:unencrypted_data_file:s0 tclass=dir permissive=1
9901-04 13:50:46.139 542 542 I recovery: type=1400 audit(0.0:63): avc: denied { getattr } for path="/data/unencrypted/key/version" dev="sda31" ino=3407875 scontext=u:r:recovery:s0 tcontext=u:object_r:unencrypted_data_file:s0 tclass=file permissive=1
10001-04 13:50:46.139 542 542 I recovery: type=1400 audit(0.0:64): avc: denied { read } for name="version" dev="sda31" ino=3407875 scontext=u:r:recovery:s0 tcontext=u:object_r:unencrypted_data_file:s0 tclass=file permissive=1
10101-04 13:50:46.139 542 542 I recovery: type=1400 audit(0.0:65): avc: denied { open } for path="/data/unencrypted/key/version" dev="sda31" ino=3407875 scontext=u:r:recovery:s0 tcontext=u:object_r:unencrypted_data_file:s0 tclass=file permissive=1
10201-04 13:50:46.143 542 542 E cutils-trace: Error opening trace file: No such file or directory (2)
10301-04 13:50:46.144 537 537 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest.
10401-04 13:50:46.144 537 537 E SELinux : avc: denied { find } for interface=android.hardware.keymaster::IKeymasterDevice sid=u:r:recovery:s0 pid=542 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1
10501-04 13:50:46.146 537 537 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest.
10601-04 13:50:46.146 542 542 I /sbin/recovery: List of Keymaster HALs found:
10701-04 13:50:46.146 542 542 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default
10801-04 13:50:46.154 570 570 E KeyMasterHalDevice: Begin send cmd failed
10901-04 13:50:46.154 570 570 E KeyMasterHalDevice: ret: 0
11001-04 13:50:46.154 570 570 E KeyMasterHalDevice: resp->status: -62
11101-04 13:50:46.164 537 537 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest.
11201-04 13:50:46.165 537 537 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest.
11301-04 13:50:46.166 542 542 I /sbin/recovery: List of Keymaster HALs found:
11401-04 13:50:46.166 542 542 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default
11501-04 13:50:46.168 570 570 E KeyMasterHalDevice: export_key
11601-04 13:50:46.168 570 570 E KeyMasterHalDevice: ret: 0
11701-04 13:50:46.168 570 570 E KeyMasterHalDevice: resp->status: -62
11801-04 13:50:46.173 542 542 I recovery: type=1400 audit(0.0:66): avc: denied { write } for scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=key permissive=1
11901-04 13:50:46.189 537 537 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest.
12001-04 13:50:46.191 537 537 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest.
12101-04 13:50:46.191 542 542 I /sbin/recovery: List of Keymaster HALs found:
12201-04 13:50:46.191 542 542 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default
12301-04 13:50:46.195 570 570 E KeyMasterHalDevice: Begin send cmd failed
12401-04 13:50:46.195 570 570 E KeyMasterHalDevice: ret: 0
12501-04 13:50:46.195 570 570 E KeyMasterHalDevice: resp->status: -62
12601-04 13:50:46.204 537 537 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest.
12701-04 13:50:46.206 537 537 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest.
12801-04 13:50:46.206 542 542 I /sbin/recovery: List of Keymaster HALs found:
12901-04 13:50:46.206 542 542 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default
13001-04 13:50:46.208 570 570 E KeyMasterHalDevice: export_key
13101-04 13:50:46.208 570 570 E KeyMasterHalDevice: ret: 0
13201-04 13:50:46.208 570 570 E KeyMasterHalDevice: resp->status: -62
13301-04 13:50:46.225 542 542 W libc : Unable to set property "ro.crypto.state" to "encrypted": error code: 0xb
13401-04 13:50:47.153 542 542 I recovery: type=1400 audit(0.0:716): avc: denied { getattr } for path="/data/data/Zj89R0MBHXugYRNM+qgPeWUMWNI9ZcpEclsupjIok5L/1YUN7YrYQVSdJFPbQxZ1vD/_8XV6WoOdjjYYI3fCI5k,nVK9YtNXOAWj/Uk+4uofj6jXRdekz8Gy6wgG2W6iFY92D44JOB8JbyKK" dev="sda31" ino=657758 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c169,c256,c512,c768 tclass=fifo_file permissive=1
13501-04 13:50:47.179 542 542 I recovery: type=1400 audit(0.0:717): avc: denied { getattr } for path="/data/data/a8eLqLsczOTkZki2oVtYnrUkFxzru2+54HEQXYxxf7A/AFBrZXoYNsi7DN1dnsJ7ND/tZcYmkBN7zfX2wv6mgyQj7WG9EF/WUSR0Y1T,OYZsY3zXu8SMA/Ev25ZlXoXn5HS7mFtbGUdR,Eh2eiSHQM" dev="sda31" ino=660022 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c151,c256,c512,c768 tclass=file permissive=1
13601-04 13:50:47.216 542 542 I recovery: type=1400 audit(0.0:718): avc: denied { getattr } for path="/data/data/a8eLqLsczOTkZki2oVtYnrUkFxzru2+54HEQXYxxf7A/fS36SUaBxoI4iaYYcwVn2B" dev="sda31" ino=655396 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c151,c256,c512,c768 tclass=lnk_file permissive=1
13701-04 13:50:48.066 542 542 I recovery: type=1400 audit(0.0:719): avc: denied { getattr } for path="/data/data/IjhNUywBdOsTGXDWFBxkIZd3QHL/GgWHnKF10t7C3tGt4bW35D/Y6GNJRbfKL6ULNPK7jPgVD" dev="sda31" ino=791901 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c150,c256,c512,c768 tclass=file permissive=1
13801-04 13:50:48.123 542 542 I recovery: type=1400 audit(0.0:720): avc: denied { getattr } for path="/data/data/fo6djhHStyk,BFFN+UpMmR0iSjM/TJlsrHzdEPY4dS0hsemQYA/FCFElT3EGFk7WhGxqp3D+B/EfDx7A2YOcnboiZYrZHf1xqgbXxAh,gUWoy+MQgQ9UJ" dev="sda31" ino=657025 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=fifo_file permissive=1
13901-04 13:50:48.339 542 542 I recovery: type=1400 audit(0.0:721): avc: denied { getattr } for path="/data/data/_Wd5Fuw19Du9kKTXyi4bLFjw8n8HG07ps" dev="sda31" ino=393477 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c25,c256,c512,c768 tclass=dir permissive=1
14001-04 13:50:48.339 542 542 I recovery: type=1400 audit(0.0:722): avc: denied { read } for name="_Wd5Fuw19Du9kKTXyi4bLFjw8n8HG07ps" dev="sda31" ino=393477 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c25,c256,c512,c768 tclass=dir permissive=1
14101-04 13:50:48.339 542 542 I recovery: type=1400 audit(0.0:723): avc: denied { open } for path="/data/data/_Wd5Fuw19Du9kKTXyi4bLFjw8n8HG07ps" dev="sda31" ino=393477 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c25,c256,c512,c768 tclass=dir permissive=1
14201-04 13:50:48.339 542 542 I recovery: type=1400 audit(0.0:724): avc: denied { search } for name="_Wd5Fuw19Du9kKTXyi4bLFjw8n8HG07ps" dev="sda31" ino=393477 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c25,c256,c512,c768 tclass=dir permissive=1
14301-04 13:50:48.349 542 542 I recovery: type=1400 audit(0.0:725): avc: denied { getattr } for path="/data/data/9vlnlAvKSrgFjICnevm6uzX6pne,FIdV0tNttmbZ5pJ/tGxkQeQmwYj0edyAeiivTB/EcuWqgR57s2Swpv5l9Ae8C" dev="sda31" ino=394110 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c119,c256,c512,c768 tclass=file permissive=1
14401-04 13:50:49.746 542 542 I recovery: type=1400 audit(0.0:726): avc: denied { getattr } for path="/data/data/Kq2EiZ6nw8wXMDYRoCnv+yncJYF/XbopOUN,0JckSKxtb+8vqA" dev="sda31" ino=393517 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c124,c256,c512,c768 tclass=lnk_file permissive=1
14501-04 13:50:49.873 542 542 I recovery: type=1400 audit(0.0:727): avc: denied { getattr } for path="/data/data/_8N4v,MAvDmnNJQLXvQfTQAmKOvoTtCUd/+myh1mfj65DjWatMv8p9hB/o7rp7beUUmMUAJlcV7zCVC/_Qd+1HoVuIL2bh7gpa0uUaN7mT+TpXZgM" dev="sda31" ino=537375 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c147,c256,c512,c768 tclass=file permissive=1
14601-04 13:50:49.883 542 542 I recovery: type=1400 audit(0.0:728): avc: denied { getattr } for path="/data/data/_c,HPDlN5y4GSN2LUa3YCfTlpO60omGJH" dev="sda31" ino=393287 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c135,c256,c512,c768 tclass=dir permissive=1
14701-04 13:50:49.883 542 542 I recovery: type=1400 audit(0.0:729): avc: denied { read } for name="_c,HPDlN5y4GSN2LUa3YCfTlpO60omGJH" dev="sda31" ino=393287 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c135,c256,c512,c768 tclass=dir permissive=1
14801-04 13:50:49.883 542 542 I recovery: type=1400 audit(0.0:730): avc: denied { open } for path="/data/data/_c,HPDlN5y4GSN2LUa3YCfTlpO60omGJH" dev="sda31" ino=393287 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c135,c256,c512,c768 tclass=dir permissive=1
14901-04 13:50:50.096 614 615 I adbd : initializing functionfs
15001-04 13:50:50.096 614 615 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0
15101-04 13:50:50.103 614 615 I adbd : functionfs successfully initialized
15201-04 13:50:50.103 614 615 I adbd : registering usb transport
15301-04 13:50:50.103 614 616 E cutils-trace: Error opening trace file: No such file or directory (2)
15401-04 13:50:50.926 542 542 I recovery: type=1400 audit(0.0:745): avc: denied { getattr } for path="/data/data/3u,pxSlsXjwiCl8UhzFkSzX6pne,FIdV0tNttC" dev="sda31" ino=393402 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c126,c256,c512,c768 tclass=dir permissive=1
15501-04 13:50:50.926 542 542 I recovery: type=1400 audit(0.0:746): avc: denied { read } for name="3u,pxSlsXjwiCl8UhzFkSzX6pne,FIdV0tNttC" dev="sda31" ino=393402 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c126,c256,c512,c768 tclass=dir permissive=1
15601-04 13:50:50.926 542 542 I recovery: type=1400 audit(0.0:747): avc: denied { open } for path="/data/data/3u,pxSlsXjwiCl8UhzFkSzX6pne,FIdV0tNttC" dev="sda31" ino=393402 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c126,c256,c512,c768 tclass=dir permissive=1
15701-04 13:50:50.926 542 542 I recovery: type=1400 audit(0.0:748): avc: denied { search } for name="3u,pxSlsXjwiCl8UhzFkSzX6pne,FIdV0tNttC" dev="sda31" ino=393402 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c126,c256,c512,c768 tclass=dir permissive=1
15801-04 13:50:50.943 542 542 I recovery: type=1400 audit(0.0:749): avc: denied { getattr } for path="/data/data/3,q58jZhoW1XLeUHeuoo+enXWiL/t9zQuxgwtdgsduSMu7Vh2PQFvhP/b+CyJqCSjVFWJgqHG8ov23iXn285e3JqK,G,yUIwGAN" dev="sda31" ino=393945 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c136,c256,c512,c768 tclass=file permissive=1
15901-04 13:50:51.949 542 542 I recovery: type=1400 audit(0.0:798): avc: denied { getattr } for path="/data/data/_Ucl3Vm6XRc9GPFPM8iuC4WW6Usvph6Zw" dev="sda31" ino=393221 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c39,c256,c512,c768 tclass=dir permissive=1
16001-04 13:50:51.949 542 542 I recovery: type=1400 audit(0.0:799): avc: denied { read } for name="_Ucl3Vm6XRc9GPFPM8iuC4WW6Usvph6Zw" dev="sda31" ino=393221 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c39,c256,c512,c768 tclass=dir permissive=1
16101-04 13:50:51.949 542 542 I recovery: type=1400 audit(0.0:800): avc: denied { open } for path="/data/data/_Ucl3Vm6XRc9GPFPM8iuC4WW6Usvph6Zw" dev="sda31" ino=393221 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c39,c256,c512,c768 tclass=dir permissive=1
16201-04 13:50:51.949 542 542 I recovery: type=1400 audit(0.0:801): avc: denied { search } for name="_Ucl3Vm6XRc9GPFPM8iuC4WW6Usvph6Zw" dev="sda31" ino=393221 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c39,c256,c512,c768 tclass=dir permissive=1
16301-04 13:50:51.953 542 542 I recovery: type=1400 audit(0.0:802): avc: denied { getattr } for path="/data/data/PT28RhpRejbgC,uJBNwZ11OSIBuXA4Hg" dev="sda31" ino=524769 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c144,c256,c512,c768 tclass=dir permissive=1
16401-04 13:50:53.363 542 542 I recovery: type=1400 audit(0.0:873): avc: denied { getattr } for path="/data/data/tFMk6YhYaarnL,DdoNX0Pi8bfnVC1aEc/yULvv9H0tV3tLLsiTVSd1C/_yp604X9BPrR7bZ4uvJiiqOibXtox8Dn9" dev="sda31" ino=655450 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c155,c256,c512,c768 tclass=file permissive=1
16501-04 13:50:53.389 542 542 I recovery: type=1400 audit(0.0:874): avc: denied { getattr } for path="/data/data/scGp9c5jSlHFFkrlSFqcAaHZsdyh6507,TXaBC" dev="sda31" ino=393635 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c75,c256,c512,c768 tclass=dir permissive=1
16601-04 13:50:53.389 542 542 I recovery: type=1400 audit(0.0:875): avc: denied { read } for name="scGp9c5jSlHFFkrlSFqcAaHZsdyh6507,TXaBC" dev="sda31" ino=393635 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c75,c256,c512,c768 tclass=dir permissive=1
16701-04 13:50:53.389 542 542 I recovery: type=1400 audit(0.0:876): avc: denied { open } for path="/data/data/scGp9c5jSlHFFkrlSFqcAaHZsdyh6507,TXaBC" dev="sda31" ino=393635 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c75,c256,c512,c768 tclass=dir permissive=1
16801-04 13:50:53.389 542 542 I recovery: type=1400 audit(0.0:877): avc: denied { search } for name="scGp9c5jSlHFFkrlSFqcAaHZsdyh6507,TXaBC" dev="sda31" ino=393635 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c75,c256,c512,c768 tclass=dir permissive=1
16901-04 13:50:54.173 542 542 I ArmToArm64Assembler: generated scanline__00000077:03545401_00000000_00000000 [ 65 ipp] (94 ins) at [0x7226807b40:0x7226807cb8] in 32708 ns
17001-04 13:50:54.176 542 542 I ArmToArm64Assembler: generated scanline__00000077:03545401_00000A05_00000000 [ 69 ipp] (113 ins) at [0x7226807cc0:0x7226807e84] in 13750 ns
17101-04 13:51:02.883 542 542 I recovery: type=1400 audit(0.0:1162): avc: denied { read } for name="bb2bc206746662b4.pwd" dev="sda31" ino=6029329 scontext=u:r:recovery:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=1
17201-04 13:51:02.883 542 542 I recovery: type=1400 audit(0.0:1163): avc: denied { open } for path="/data/system_de/0/spblob/bb2bc206746662b4.pwd" dev="sda31" ino=6029329 scontext=u:r:recovery:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=1
17301-04 13:51:02.926 542 542 I recovery: type=1400 audit(0.0:1164): avc: denied { search } for name="keystore" dev="sda31" ino=4194313 scontext=u:r:recovery:s0 tcontext=u:object_r:keystore_data_file:s0 tclass=dir permissive=1
17401-04 13:51:02.926 542 542 I recovery: type=1400 audit(0.0:1165): avc: denied { read } for name="user_0" dev="sda31" ino=4194374 scontext=u:r:recovery:s0 tcontext=u:object_r:keystore_data_file:s0 tclass=dir permissive=1
17501-04 13:51:02.926 542 542 I recovery: type=1400 audit(0.0:1166): avc: denied { open } for path="/data/misc/keystore/user_0" dev="sda31" ino=4194374 scontext=u:r:recovery:s0 tcontext=u:object_r:keystore_data_file:s0 tclass=dir permissive=1
17601-04 13:51:03.035 628 628 E cutils-trace: Error opening trace file: No such file or directory (2)
17701-04 13:51:03.035 537 537 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.1::IServiceManager/default in either framework or device manifest.
17801-04 13:51:03.036 628 628 I keystore: found android.hardware.keymaster@4.0::IKeymasterDevice with interface name default and seclevel TRUSTED_ENVIRONMENT
17901-04 13:51:03.036 573 573 E SELinux : avc: denied { add } for service=android.security.keystore pid=628 uid=0 scontext=u:r:recovery:s0 tcontext=u:object_r:keystore_service:s0 tclass=service_manager permissive=1
18001-04 13:51:03.036 537 537 E SELinux : avc: denied { add } for interface=android.system.wifi.keystore::IKeystore sid=u:r:recovery:s0 pid=628 scontext=u:r:recovery:s0 tcontext=u:object_r:system_wifi_keystore_hwservice:s0 tclass=hwservice_manager permissive=1
18101-04 13:51:03.096 573 573 E SELinux : avc: denied { find } for service=android.security.keystore pid=542 uid=0 scontext=u:r:recovery:s0 tcontext=u:object_r:keystore_service:s0 tclass=service_manager permissive=1
18201-04 13:51:03.131 628 628 E SELinux : avc: denied { add_auth } for pid=630 uid=1000 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=keystore_key permissive=1
18301-04 13:51:03.131 628 628 D keystore: AddAuthenticationToken: timestamp = 22447, time_received = 19
18401-04 13:51:03.131 630 630 D : successfully added auth token to keystore
18501-04 13:51:03.203 570 570 E KeyMasterHalDevice: get_key_characteristics
18601-04 13:51:03.204 570 570 E KeyMasterHalDevice: ret: 0
18701-04 13:51:03.204 570 570 E KeyMasterHalDevice: resp->status: -62
18801-04 13:51:03.204 628 628 I keystore: upgradeKeyBlob USRPKEY_synthetic_password_bb2bc206746662b4 0
18901-04 13:51:03.214 628 628 W keystore: key found but type doesn't match: 6 vs 5
19001-04 13:51:03.214 628 628 D keystore: Unable to read cached characteristics for key
19101-04 13:51:03.217 628 628 I keystore: 1 0
19201-04 13:51:04.122 628 628 I ServiceManager: Waiting for service dropbox...
19301-04 13:51:07.127 628 628 I chatty : uid=0(root) /sbin/keystore identical 3 lines
19401-04 13:51:08.129 628 628 I ServiceManager: Waiting for service dropbox...
19501-04 13:51:08.229 628 628 W ServiceManager: Service dropbox didn't start. Returning NULL
19601-04 13:51:08.231 573 573 I ServiceManager: service 'android.security.keystore' died
19701-04 13:51:08.236 542 542 I recovery: type=1400 audit(0.0:1178): avc: denied { read } for scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=file permissive=1
19801-04 13:51:08.236 542 542 I recovery: type=1400 audit(0.0:1179): avc: denied { read } for scontext=u:r:recovery:s0 tcontext=u:r:kernel:s0 tclass=file permissive=1
19901-04 13:51:08.236 542 542 I recovery: type=1400 audit(0.0:1180): avc: denied { search } for name="1" dev="proc" ino=27064 scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=dir permissive=1
20001-04 13:51:08.236 542 542 I recovery: type=1400 audit(0.0:1181): avc: denied { open } for path="/proc/1/cmdline" dev="proc" ino=6362 scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=file permissive=1
20101-04 13:51:08.236 542 542 I recovery: type=1400 audit(0.0:1182): avc: denied { getattr } for path="/proc/1/cmdline" dev="proc" ino=6362 scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=file permissive=1
20201-04 13:51:08.260 537 537 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest.
20301-04 13:51:08.261 537 537 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest.
20401-04 13:51:08.262 542 627 I /sbin/recovery: List of Keymaster HALs found:
20501-04 13:51:08.262 542 627 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default
20601-04 13:51:08.265 570 570 E KeyMasterHalDevice: export_key
20701-04 13:51:08.265 570 570 E KeyMasterHalDevice: ret: 0
20801-04 13:51:08.265 570 570 E KeyMasterHalDevice: resp->status: -62
20901-04 13:51:09.519 637 637 I sh : type=1400 audit(0.0:1209): avc: denied { getattr } for path="/dev/dri/card0" dev="tmpfs" ino=6299 scontext=u:r:recovery:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1
21001-04 13:51:09.533 542 542 I recovery: type=1400 audit(0.0:1210): avc: denied { getattr } for path="/data/system_de/0/ringtones" dev="sda31" ino=6029317 scontext=u:r:recovery:s0 tcontext=u:object_r:ringtone_file:s0 tclass=dir permissive=1
21101-04 13:51:09.533 542 542 I recovery: type=1400 audit(0.0:1211): avc: denied { read } for name="ringtones" dev="sda31" ino=6029317 scontext=u:r:recovery:s0 tcontext=u:object_r:ringtone_file:s0 tclass=dir permissive=1
21201-04 13:51:09.533 542 542 I recovery: type=1400 audit(0.0:1212): avc: denied { open } for path="/data/system_de/0/ringtones" dev="sda31" ino=6029317 scontext=u:r:recovery:s0 tcontext=u:object_r:ringtone_file:s0 tclass=dir permissive=1
21301-04 13:51:09.533 542 542 I recovery: type=1400 audit(0.0:1213): avc: denied { search } for name="ringtones" dev="sda31" ino=6029317 scontext=u:r:recovery:s0 tcontext=u:object_r:ringtone_file:s0 tclass=dir permissive=1
21401-04 13:51:11.219 542 542 I recovery: type=1400 audit(0.0:1591): avc: denied { getattr } for path="/data/data/com.windyty.android/files/favs.json" dev="sda31" ino=791901 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c150,c256,c512,c768 tclass=file permissive=1
21501-04 13:51:11.263 542 542 I recovery: type=1400 audit(0.0:1592): avc: denied { getattr } for path="/data/data/com.xda.labs.play/files/.realm.temp/17668474056489257207_realm.note" dev="sda31" ino=657025 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c512,c768 tclass=fifo_file permissive=1
21601-04 13:51:11.313 542 542 I recovery: type=1400 audit(0.0:1593): avc: denied { getattr } for path="/data/data/com.amazon.mp3/app_NORMAL_ANONYMOUS/1577990090065" dev="sda31" ino=657321 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c152,c256,c512,c768 tclass=file permissive=1
21701-04 13:51:11.436 542 542 I recovery: type=1400 audit(0.0:1594): avc: denied { getattr } for path="/data/data/com.android.companiondevicemanager" dev="sda31" ino=393278 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c67,c256,c512,c768 tclass=dir permissive=1
21801-04 13:51:11.436 542 542 I recovery: type=1400 audit(0.0:1595): avc: denied { read } for name="com.android.companiondevicemanager" dev="sda31" ino=393278 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c67,c256,c512,c768 tclass=dir permissive=1
21901-04 13:51:12.533 542 542 I recovery: type=1400 audit(0.0:1603): avc: denied { getattr } for path="/data/data/com.android.chrome/lib" dev="sda31" ino=393517 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c124,c256,c512,c768 tclass=lnk_file permissive=1
22001-04 13:51:12.639 542 542 I recovery: type=1400 audit(0.0:1604): avc: denied { getattr } for path="/data/data/com.google.android.apps.walletnfcrel/cache/picasso-cache/715dc109a2d5b4766b5ea0aa67a9b4cb.0" dev="sda31" ino=537375 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c147,c256,c512,c768 tclass=file permissive=1
22101-04 13:51:12.873 542 542 I recovery: type=1400 audit(0.0:1605): avc: denied { getattr } for path="/data/data/com.vanced.android.youtube/no_backup/com.google.InstanceId.properties" dev="sda31" ino=787743 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c163,c256,c512,c768 tclass=file permissive=1
22201-04 13:51:13.009 542 542 I recovery: type=1400 audit(0.0:1606): avc: denied { read } for name="temp" dev="sysfs" ino=45516 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
22301-04 13:51:13.009 542 542 I recovery: type=1400 audit(0.0:1607): avc: denied { open } for path="/sys/devices/virtual/thermal/thermal_zone0/temp" dev="sysfs" ino=45516 scontext=u:r:recovery:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
22401-04 13:51:14.246 542 542 I recovery: type=1400 audit(0.0:1615): avc: denied { getattr } for path="/data/data/com.android.theme.color.orchid" dev="sda31" ino=393713 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c37,c256,c512,c768 tclass=dir permissive=1
22501-04 13:51:14.246 542 542 I recovery: type=1400 audit(0.0:1616): avc: denied { read } for name="com.android.theme.color.orchid" dev="sda31" ino=393713 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c37,c256,c512,c768 tclass=dir permissive=1
22601-04 13:51:14.246 542 542 I recovery: type=1400 audit(0.0:1617): avc: denied { open } for path="/data/data/com.android.theme.color.orchid" dev="sda31" ino=393713 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c37,c256,c512,c768 tclass=dir permissive=1
22701-04 13:51:14.249 542 542 I recovery: type=1400 audit(0.0:1618): avc: denied { search } for name="com.android.theme.color.orchid" dev="sda31" ino=393713 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c37,c256,c512,c768 tclass=dir permissive=1
22801-04 13:51:14.253 542 542 I recovery: type=1400 audit(0.0:1619): avc: denied { getattr } for path="/data/data/com.android.internal.systemui.navbar.gestural_narrow_back" dev="sda31" ino=393749 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c40,c256,c512,c768 tclass=dir permissive=1
22901-04 13:51:15.443 542 542 I recovery: type=1400 audit(0.0:1643): avc: denied { getattr } for path="/data/misc/profman" dev="sda31" ino=4194346 scontext=u:r:recovery:s0 tcontext=u:object_r:profman_dump_data_file:s0 tclass=dir permissive=1
23001-04 13:51:15.443 542 542 I recovery: type=1400 audit(0.0:1644): avc: denied { read } for name="profman" dev="sda31" ino=4194346 scontext=u:r:recovery:s0 tcontext=u:object_r:profman_dump_data_file:s0 tclass=dir permissive=1
23101-04 13:51:15.443 542 542 I recovery: type=1400 audit(0.0:1645): avc: denied { open } for path="/data/misc/profman" dev="sda31" ino=4194346 scontext=u:r:recovery:s0 tcontext=u:object_r:profman_dump_data_file:s0 tclass=dir permissive=1
23201-04 13:51:15.443 542 542 I recovery: type=1400 audit(0.0:1646): avc: denied { search } for name="profman" dev="sda31" ino=4194346 scontext=u:r:recovery:s0 tcontext=u:object_r:profman_dump_data_file:s0 tclass=dir permissive=1
23301-04 13:51:15.446 542 542 I recovery: type=1400 audit(0.0:1647): avc: denied { getattr } for path="/data/misc/wmtrace" dev="sda31" ino=4194342 scontext=u:r:recovery:s0 tcontext=u:object_r:wm_trace_data_file:s0 tclass=dir permissive=1
23401-04 13:51:16.055 649 650 I adbd : initializing functionfs
23501-04 13:51:16.055 649 650 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0
23601-04 13:51:16.057 649 650 I adbd : functionfs successfully initialized
23701-04 13:51:16.057 649 650 I adbd : registering usb transport
23801-04 13:51:16.057 649 652 E cutils-trace: Error opening trace file: No such file or directory (2)
23901-04 13:51:16.836 648 648 I recovery: type=1400 audit(0.0:1717): avc: denied { write } for name="mtp_usb" dev="tmpfs" ino=6332 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
24001-04 13:51:16.836 648 648 I recovery: type=1400 audit(0.0:1718): avc: denied { open } for path="/dev/mtp_usb" dev="tmpfs" ino=6332 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
24101-04 13:51:16.836 648 648 I recovery: type=1400 audit(0.0:1719): avc: denied { read } for name="mtp_usb" dev="tmpfs" ino=6332 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
24201-04 13:51:16.836 648 648 I recovery: type=1400 audit(0.0:1720): avc: denied { getattr } for path="/data/media/0/Music" dev="sda31" ino=3145737 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c512,c768 tclass=dir permissive=1
24301-04 13:51:16.836 648 648 I recovery: type=1400 audit(0.0:1721): avc: denied { getattr } for path="/data/media/0/CarBit" dev="sda31" ino=3670030 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c175,c256,c512,c768 tclass=dir permissive=1
24401-04 13:51:41.626 542 542 I recovery: type=1400 audit(0.0:1724): avc: denied { read } for name="Download" dev="sda31" ino=3145744 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c512,c768 tclass=dir permissive=1
24501-04 13:51:41.626 542 542 I recovery: type=1400 audit(0.0:1725): avc: denied { open } for path="/sdcard/Download" dev="sda31" ino=3145744 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c512,c768 tclass=dir permissive=1
24601-04 13:51:41.629 542 542 I recovery: type=1400 audit(0.0:1726): avc: denied { search } for name="Download" dev="sda31" ino=3145744 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c512,c768 tclass=dir permissive=1
24701-04 13:51:51.216 542 542 I recovery: type=1400 audit(0.0:1730): avc: denied { read } for name="iMMENSITY-SDX55-RAPHAEL-Q-04-01-2020.zip" dev="sda31" ino=3181104 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c512,c768 tclass=file permissive=1
24801-04 13:51:51.216 542 542 I recovery: type=1400 audit(0.0:1731): avc: denied { open } for path="/sdcard/Download/iMMENSITY-SDX55-RAPHAEL-Q-04-01-2020.zip" dev="sda31" ino=3181104 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c512,c768 tclass=file permissive=1
24901-04 13:51:51.216 542 542 I recovery: type=1400 audit(0.0:1732): avc: denied { map } for path="/sdcard/Download/iMMENSITY-SDX55-RAPHAEL-Q-04-01-2020.zip" dev="sda31" ino=3181104 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c512,c768 tclass=file permissive=1
25001-04 13:51:51.253 663 663 I ps : type=1400 audit(0.0:1733): avc: denied { read } for scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=file permissive=1
251--------- beginning of crash
25201-04 13:51:51.627 705 705 F linker : CANNOT LINK EXECUTABLE "getprop": cannot locate symbol "__system_properties_init" referenced by "/system/lib64/libselinux.so"...
25301-04 13:51:58.412 877 877 F linker : CANNOT LINK EXECUTABLE "basename": cannot locate symbol "get_sched_policy" referenced by "/sbin/toybox"...
25401-04 13:51:58.496 893 893 I rm : type=1400 audit(0.0:1772): avc: denied { unlink } for name="zcip" dev="tmpfs" ino=802 scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=lnk_file permissive=1
25501-04 13:51:59.033 542 542 I recovery: type=1400 audit(0.0:1773): avc: denied { read } for name="/" dev="sda31" ino=2 scontext=u:r:recovery:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1
25601-04 13:51:59.036 542 542 I recovery: type=1400 audit(0.0:1775): avc: denied { getattr } for path="/data/system_de/0/ringtones" dev="sda31" ino=6029317 scontext=u:r:recovery:s0 tcontext=u:object_r:ringtone_file:s0 tclass=dir permissive=1
25701-04 13:51:59.503 542 542 I recovery: type=1400 audit(0.0:1928): avc: denied { getattr } for path="/data/user_de/0/com.twitter.android" dev="sda31" ino=3014812 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c160,c256,c512,c768 tclass=dir permissive=1
25801-04 13:51:59.503 542 542 I recovery: type=1400 audit(0.0:1929): avc: denied { read } for name="com.twitter.android" dev="sda31" ino=3014812 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c160,c256,c512,c768 tclass=dir permissive=1
25901-04 13:51:59.503 542 542 I recovery: type=1400 audit(0.0:1930): avc: denied { open } for path="/data/user_de/0/com.twitter.android" dev="sda31" ino=3014812 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c160,c256,c512,c768 tclass=dir permissive=1
26001-04 13:52:00.743 542 542 I recovery: type=1400 audit(0.0:2092): avc: denied { getattr } for path="/data/data/com.windyty.android/files/favs.json" dev="sda31" ino=791901 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c150,c256,c512,c768 tclass=file permissive=1
26101-04 13:52:00.973 542 542 I recovery: type=1400 audit(0.0:2093): avc: denied { getattr } for path="/data/data/com.google.android.calculator/databases/Expressions.db" dev="sda31" ino=394110 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c119,c256,c512,c768 tclass=file permissive=1
26201-04 13:52:00.979 542 542 I recovery: type=1400 audit(0.0:2094): avc: denied { getattr } for path="/data/data/com.android.chrome/shared_prefs/org.chromium.components.background_task_scheduler.xml" dev="sda31" ino=394100 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c124,c256,c512,c768 tclass=file permissive=1
26301-04 13:52:02.073 542 542 I recovery: type=1400 audit(0.0:2095): avc: denied { getattr } for path="/data/data/com.android.chrome/lib" dev="sda31" ino=393517 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c124,c256,c512,c768 tclass=lnk_file permissive=1
26401-04 13:52:02.179 542 542 I recovery: type=1400 audit(0.0:2096): avc: denied { getattr } for path="/data/data/com.google.android.apps.walletnfcrel/cache/picasso-cache/715dc109a2d5b4766b5ea0aa67a9b4cb.0" dev="sda31" ino=537375 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c147,c256,c512,c768 tclass=file permissive=1
26501-04 13:52:02.359 542 542 I recovery: type=1400 audit(0.0:2097): avc: denied { getattr } for path="/data/data/org.schabi.newpipe/cache/uil-images/8039098030" dev="sda31" ino=659632 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c157,c256,c512,c768 tclass=file permissive=1
26601-04 13:52:02.993 542 542 I recovery: type=1400 audit(0.0:2098): avc: denied { getattr } for path="/data/data/com.google.ar.core/app_phenotype_file/com.google.ar.core.services.pb" dev="sda31" ino=393945 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c136,c256,c512,c768 tclass=file permissive=1
26701-04 13:52:03.216 542 542 I recovery: type=1400 audit(0.0:2099): avc: denied { getattr } for path="/data/data/com.androidfung.drminfo/databases/google_app_measurement_local.db-journal" dev="sda31" ino=790511 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c167,c256,c512,c768 tclass=file permissive=1
26801-04 13:52:03.786 542 542 I recovery: type=1400 audit(0.0:2100): avc: denied { getattr } for path="/data/data/com.google.android.markup/cache/image_manager_disk_cache/480cf9d8fc1666ed5bb2bb92e91aa9955c5e2d2b849b269565d34aba50df0020.0" dev="sda31" ino=553219 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c118,c256,c512,c768 tclass=file permissive=1
26901-04 13:52:03.856 542 542 I recovery: type=1400 audit(0.0:2101): avc: denied { getattr } for path=2F646174612F646174612F636F6D2E6D6574656F636F6F6C2F6170705F776562766965772F5765622044617461 dev="sda31" ino=921027 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c172,c256,c512,c768 tclass=file permissive=1
27001-04 13:52:03.936 542 542 I recovery: type=1400 audit(0.0:2102): avc: denied { getattr } for path="/data/data/com.android.theme.color.ocean" dev="sda31" ino=393357 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c21,c256,c512,c768 tclass=dir permissive=1
27101-04 13:52:03.936 542 542 I recovery: type=1400 audit(0.0:2103): avc: denied { read } for name="com.android.theme.color.ocean" dev="sda31" ino=393357 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c21,c256,c512,c768 tclass=dir permissive=1
27201-04 13:52:03.936 542 542 I recovery: type=1400 audit(0.0:2104): avc: denied { open } for path="/data/data/com.android.theme.color.ocean" dev="sda31" ino=393357 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c21,c256,c512,c768 tclass=dir permissive=1
27301-04 13:52:03.936 542 542 I recovery: type=1400 audit(0.0:2105): avc: denied { search } for name="com.android.theme.color.ocean" dev="sda31" ino=393357 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c21,c256,c512,c768 tclass=dir permissive=1
27401-04 13:52:03.946 542 542 I recovery: type=1400 audit(0.0:2106): avc: denied { getattr } for path="/data/data/com.mgoogle.android.gms/shared_prefs/com.mgoogle.android.gms_preferences.xml" dev="sda31" ino=788674 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c162,c256,c512,c768 tclass=file permissive=1
27501-04 13:52:04.939 542 542 I recovery: type=1400 audit(0.0:2132): avc: denied { getattr } for path="/data/data/de.hafas.android.db.beta/no_backup/com.google.android.gms.appid-no-backup" dev="sda31" ino=655450 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c155,c256,c512,c768 tclass=file permissive=1
27601-04 13:52:04.973 542 542 I recovery: type=1400 audit(0.0:2133): avc: denied { getattr } for path="/data/misc/user" dev="sda31" ino=4194332 scontext=u:r:recovery:s0 tcontext=u:object_r:misc_user_data_file:s0 tclass=dir permissive=1
27701-04 13:52:10.013 542 542 I recovery: type=1400 audit(0.0:2225): avc: denied { write } for name="/" dev="sda23" ino=2 scontext=u:r:recovery:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=1