· 6 years ago · Mar 20, 2020, 06:46 AM
1kd-pax0r@ubuntu:~/omni/out/target/product/channel$ adb logcat
2--------- beginning of main
301-01 03:41:08.798 440 440 W auditd : type=2000 audit(0.0:1): initialized
401-01 03:41:16.703 440 440 I auditd : type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295
501-01 03:41:16.810 1 1 I init : type=1400 audit(0.0:3): avc: denied { setcheckreqprot } for uid=0 scontext=u:r:init:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1
601-01 03:41:16.820 1 1 I init : type=1400 audit(0.0:4): avc: denied { create } for uid=0 name="cgroup.procs" scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
701-01 03:41:16.913 1 1 I init : type=1400 audit(0.0:5): avc: denied { write } for uid=0 path="/acct/uid_0/pid_421/cgroup.procs" dev="rootfs" ino=18448 scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
801-01 03:41:17.453 1 1 I init : type=1400 audit(0.0:6): avc: denied { setattr } for uid=0 name="system" dev="rootfs" ino=12733 scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1
901-01 03:41:17.503 1 1 I init : type=1400 audit(0.0:7): avc: denied { module_request } for uid=0 kmod="usbfunc:gsi" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1
1001-01 03:41:17.543 1 1 I init : type=1400 audit(0.0:8): avc: denied { mounton } for uid=0 path="/dev/usb-ffs/adb" dev="functionfs" ino=13059 scontext=u:r:init:s0 tcontext=u:object_r:functionfs:s0 tclass=dir permissive=1
1101-01 03:41:17.573 440 440 I init : type=1400 audit(0.0:9): avc: denied { entrypoint } for uid=0 path="/sbin/logd" dev="rootfs" ino=12586 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
1201-01 03:41:17.573 440 440 I logd : type=1400 audit(0.0:10): avc: denied { read execute } for uid=0 path="/sbin/logd" dev="rootfs" ino=12586 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
1301-01 03:41:17.593 440 440 I logd : type=1400 audit(0.0:11): avc: denied { getattr } for uid=0 path="/sbin/logd" dev="rootfs" ino=12586 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
1401-01 03:41:17.893 470 470 I insmod : type=1400 audit(0.0:25): avc: denied { module_load } for uid=0 path="/sbin/nova_36525_mmi.ko" dev="rootfs" ino=12620 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=system permissive=1
1501-01 03:41:18.206 477 477 I hwservicemanage: type=1400 audit(0.0:26): avc: denied { read } for uid=0 name="plat_hwservice_contexts" dev="rootfs" ino=12378 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
1601-01 03:41:18.206 477 477 I hwservicemanage: type=1400 audit(0.0:27): avc: denied { open } for uid=0 path="/vendor_hwservice_contexts" dev="rootfs" ino=12854 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
1701-01 03:41:18.206 477 477 I hwservicemanage: type=1400 audit(0.0:28): avc: denied { getattr } for uid=0 path="/vendor_hwservice_contexts" dev="rootfs" ino=12854 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1
1801-01 03:41:18.213 477 477 I hwservicemanage: type=1400 audit(0.0:29): avc: denied { create } for uid=0 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1
1901-01 03:41:18.213 477 477 I hwservicemanage: type=1400 audit(0.0:30): avc: denied { bind } for uid=0 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1
2001-01 03:41:18.213 477 477 I hwservicemanage: type=1400 audit(0.0:31): avc: denied { read } for uid=0 name="perms" dev="selinuxfs" ino=67112181 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1
2101-01 03:41:18.213 477 477 I hwservicemanage: type=1400 audit(0.0:32): avc: denied { open } for uid=0 path="/sys/fs/selinux/class/hwservice_manager/perms" dev="selinuxfs" ino=67112181 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1
2201-01 03:41:18.213 477 477 I hwservicemanage: type=1400 audit(0.0:33): avc: denied { compute_av } for uid=0 scontext=u:r:recovery:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1
2301-01 03:41:18.218 477 477 E SELinux : avc: denied { add } for interface=android.hidl.manager::IServiceManager sid=u:r:recovery:s0 pid=477 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_manager_hwservice:s0 tclass=hwservice_manager permissive=1
2401-01 03:41:18.218 477 477 E SELinux : avc: denied { add } for interface=android.hidl.base::IBase sid=u:r:recovery:s0 pid=477 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1
2501-01 03:41:18.218 477 477 E SELinux : avc: denied { add } for interface=android.hidl.token::ITokenManager sid=u:r:recovery:s0 pid=477 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_token_hwservice:s0 tclass=hwservice_manager permissive=1
2601-01 03:41:18.220 477 477 I hwservicemanager: hwservicemanager is ready now.
2701-01 03:41:18.220 478 478 E cutils-trace: Error opening trace file: No such file or directory (2)
2801-01 03:41:18.221 477 477 E cutils-trace: Error opening trace file: No such file or directory (2)
2901-01 03:41:18.221 477 477 W /sbin/hwservicemanager: Cannot open /system/manifest.xml
3001-01 03:41:18.232 478 478 D vndksupport: Loading /vendor/lib/hw/android.hardware.boot@1.0-impl.so from current namespace instead of sphal namespace.
3101-01 03:41:18.233 478 478 D vndksupport: Loading /vendor/lib/hw/bootctrl.msm8953.so from current namespace instead of sphal namespace.
3201-01 03:41:18.235 478 478 I ServiceManagement: Removing namespace from process name android.hardware.boot@1.0-service to boot@1.0-service.
3301-01 03:41:18.235 477 477 E SELinux : avc: denied { add } for interface=android.hardware.boot::IBootControl sid=u:r:recovery:s0 pid=478 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_bootctl_hwservice:s0 tclass=hwservice_manager permissive=1
3401-01 03:41:18.235 478 478 I android.hardware.boot@1.0-service: Registration complete for android.hardware.boot@1.0::IBootControl/default.
3501-01 03:41:18.475 493 493 W libc : Unable to set property "ro.build.version.release" to "9": error code: 0xb
3601-01 03:41:18.499 494 494 W libc : Unable to set property "ro.build.version.security_patch" to "2019-12-01": error code: 0xb
3701-01 03:41:19.390 442 442 I recovery: type=1400 audit(0.0:43): avc: denied { execmem } for uid=0 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=process permissive=1
3801-01 03:41:19.390 442 442 I recovery: type=1400 audit(0.0:44): avc: denied { execute } for uid=0 path="/dev/ashmem" dev="tmpfs" ino=18542 scontext=u:r:recovery:s0 tcontext=u:object_r:ashmem_device:s0 tclass=chr_file permissive=1
3901-01 03:41:19.393 442 442 I ARMAssembler: generated scanline__00000077:03010101_00008001_00000000 [ 91 ipp] (112 ins) at [0xf19001f0:0xf19003b0] in 76875 ns
4001-01 03:41:19.410 442 442 I ARMAssembler: generated scanline__00000077:03545401_00000A01_00000000 [ 37 ipp] (58 ins) at [0xf19003c0:0xf19004a8] in 63177 ns
4101-01 03:41:19.413 442 442 I ARMAssembler: generated scanline__00000077:03545401_00000A08_00000000 [ 37 ipp] (59 ins) at [0xf19004b0:0xf190059c] in 52500 ns
4201-01 03:41:19.456 442 442 I recovery: type=1400 audit(0.0:45): avc: denied { create } for uid=0 name="mtab" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1
4301-01 03:41:19.460 442 442 I recovery: type=1400 audit(0.0:46): avc: denied { remove_name } for uid=0 name="system" dev="rootfs" ino=12733 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1
4401-01 03:41:19.460 442 442 I recovery: type=1400 audit(0.0:47): avc: denied { unlink } for uid=0 name="system" dev="rootfs" ino=12733 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1
4507-10 21:18:04.073 556 556 D QSEECOMD: : qseecom listener services process entry PPID = 1
4607-10 21:18:04.073 556 556 E QSEECOMD: : Listener: index = 0, hierarchy = 0
4707-10 21:18:04.074 556 556 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds
4807-10 21:18:04.074 556 556 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_init_service) succeeds
4907-10 21:18:04.076 556 556 I rpmb_emmc: RPMB Mult (512-bytes sector) = 32768, Rel_sec_cnt = 32
5007-10 21:18:04.076 556 556 E DrmLibRpmb: rpmb_init succeeded! with ret = 0
5107-10 21:18:04.076 556 556 D QSEECOMD: : Init rpmb_init_service ret = 0
5207-10 21:18:04.076 556 556 D QSEECOMD: : RPMB system services: init (Listener ID = 8192)
5307-10 21:18:04.076 556 556 E QSEECOMD: : Listener: index = 1, hierarchy = 0
5407-10 21:18:04.077 556 556 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds
5507-10 21:18:04.077 556 556 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_init_service) succeeds
5607-10 21:18:04.077 556 556 E SSD : ssd_init_service succeeded!
5707-10 21:18:04.077 556 556 D QSEECOMD: : Init ssd_init_service ret = 0
5807-10 21:18:04.077 556 556 D QSEECOMD: : SSD system services: init (Listener ID = 12288)
5907-10 21:18:04.077 556 556 E QSEECOMD: : Listener: index = 2, hierarchy = 0
6007-10 21:18:04.079 556 556 E QSEECOMD: : Init dlopen(libsecureui.so, RLTD_NOW) is failed.... dlopen failed: library "vendor.display.config@1.0.so" not found
6107-10 21:18:04.089 556 556 D QSEECOMD: : Init rpmb_start ret = 0
6207-10 21:18:04.089 556 556 D QSEECOMD: : RPMB system services: Started (Listener ID = 8192)
6307-10 21:18:04.089 556 556 E QSEECOMD: : Listener: index = 1, hierarchy = 1
6407-10 21:18:04.089 556 556 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds
6507-10 21:18:04.089 556 556 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_start) succeeds
6607-10 21:18:04.089 556 556 D QSEECOMAPI: QSEECom_register_listener 12288 sb_length = 0x5000
6707-10 21:18:04.104 556 556 D QSEECOMD: : Init ssd_start ret = 0
6807-10 21:18:04.104 556 556 D QSEECOMD: : SSD system services: Started (Listener ID = 12288)
6907-10 21:18:04.104 556 556 E QSEECOMD: : Listener: index = 2, hierarchy = 1
7007-10 21:18:04.105 556 556 E QSEECOMD: : Init dlopen(libsecureui.so, RLTD_NOW) is failed.... dlopen failed: library "libhidlbase.so" not found
7107-10 21:18:04.105 556 556 E QSEECOMD: : Listener: index = 3, hierarchy = 1
7207-10 21:18:04.106 556 556 D QSEECOMD: : Init dlopen(libdrmtime.so, RTLD_NOW) succeeds
7307-10 21:18:04.106 556 556 D QSEECOMD: : Init::Init dlsym(g_FSHandle atime_start) succeeds
7407-10 21:18:04.106 556 556 D DrmLibTime: QSEE Time Listener: atime_start
7507-10 21:18:04.106 556 556 D QSEECOMAPI: QSEECom_register_listener 11 sb_length = 0x5000
7607-10 21:18:04.119 556 556 D DrmLibTime: registering fs service to QSEECom is done!
7707-10 21:18:04.119 556 556 D DrmLibTime: begin to create a thread!
7807-10 21:18:04.119 556 556 D DrmLibTime: Creating a pthread in atime_start is done! return 0
7907-10 21:18:04.119 556 556 D QSEECOMD: : Init atime_start ret = 0
8007-10 21:18:04.119 556 556 D QSEECOMD: : time services: Started (Listener ID = 11)
8107-10 21:18:04.119 556 556 E QSEECOMD: : Listener: index = 4, hierarchy = 1
8207-10 21:18:04.119 556 561 D DrmLibTime: QSEE Time Listener: dispatch
8307-10 21:18:04.119 556 556 D QSEECOMD: : Init dlopen(libdrmfs.so, RTLD_NOW) succeeds
8407-10 21:18:04.120 556 561 D DrmLibTime: before calling ioctl to read the next time_cmd
8507-10 21:18:04.120 556 556 D QSEECOMD: : Init::Init dlsym(g_FSHandle fs_start) succeeds
8607-10 21:18:04.120 556 556 D QSEECOMAPI: QSEECom_register_listener 10 sb_length = 0x5000
8707-10 21:18:04.134 556 556 D QSEECOMD: : Init fs_start ret = 0
8807-10 21:18:04.134 556 556 D QSEECOMD: : file system services: Started (Listener ID = 10)
8907-10 21:18:04.134 556 556 E QSEECOMD: : Listener: index = 5, hierarchy = 1
9007-10 21:18:04.134 556 556 D QSEECOMD: : Init dlopen(libdrmfs.so, RTLD_NOW) succeeds
9107-10 21:18:04.134 556 556 D QSEECOMD: : Init::Init dlsym(g_FSHandle gpfs_start) succeeds
9207-10 21:18:04.135 556 556 E DrmLibFs: Error: Invalid config file
9307-10 21:18:04.135 556 556 E DrmLibFs: Data path not parsed: Using default data path: /data/vendor/tzstorage/
9407-10 21:18:04.135 556 556 E DrmLibFs: Persist path not parsed: Using default persist path: /mnt/vendor/persist/data/
9507-10 21:18:04.135 556 556 D QSEECOMAPI: QSEECom_register_listener 28672 sb_length = 0x7e000
9607-10 21:18:04.149 556 556 D QSEECOMD: : Init gpfs_start ret = 0
9707-10 21:18:04.149 556 556 D QSEECOMD: : gpfile system services: Started (Listener ID = 28672)
9807-10 21:18:04.149 556 556 E QSEECOMD: : Listener: index = 6, hierarchy = 1
9907-10 21:18:04.150 556 556 D QSEECOMD: : Init dlopen(libqisl.so, RTLD_NOW) succeeds
10007-10 21:18:04.150 556 556 D QSEECOMD: : Init::Init dlsym(g_FSHandle qisl_start) succeeds
101--------- beginning of system
10207-10 21:18:04.150 556 564 I QISL : QSEE Interrupt Service Listener Thread is started
10307-10 21:18:04.151 556 564 D QSEECOMAPI: QSEECom_register_listener 36864 sb_length = 0x1f4
10407-10 21:18:04.172 556 564 I QISL : QSEE Interrupt Service Listener was activated successfully
10507-10 21:18:04.172 556 556 D QSEECOMD: : Init qisl_start ret = 0
10607-10 21:18:04.172 556 556 D QSEECOMD: : interrupt services: Started (Listener ID = 36864)
10707-10 21:18:04.172 556 556 E QSEECOMD: : Listener: index = 7, hierarchy = 1
10807-10 21:18:04.173 556 556 D QSEECOMD: : Init dlopen(libspl.so, RTLD_NOW) succeeds
10907-10 21:18:04.173 556 556 D QSEECOMD: : Init::Init dlsym(g_FSHandle spl_start) succeeds
11007-10 21:18:04.173 556 556 D SPL : Call QSEECom_register_listener()
11107-10 21:18:04.173 556 556 D QSEECOMAPI: QSEECom_register_listener 45056 sb_length = 0x400
11207-10 21:18:04.186 556 556 D SPL : Registered listener sucessfully!
11307-10 21:18:04.186 556 556 D SPL : pipe read-fd [28] write-fd [29]
11407-10 21:18:04.186 556 556 D SPL : Create thread
11507-10 21:18:04.186 556 556 D SPL : Thread created sucessfully.
11607-10 21:18:04.186 556 556 D QSEECOMD: : Init spl_start ret = 0
11707-10 21:18:04.186 556 556 D QSEECOMD: : secure processor services: Started (Listener ID = 45056)
11807-10 21:18:04.186 556 556 E QSEECOMD: : Listener: index = 8, hierarchy = 1
11907-10 21:18:04.186 556 565 D SPL : spl_dispatch() started
12007-10 21:18:04.186 556 565 D SPL : ==== Wait For Request ======
12107-10 21:18:04.187 556 556 D QSEECOMD: : Init dlopen(libGPreqcancel.so, RTLD_NOW) succeeds
12207-10 21:18:04.187 556 556 D QSEECOMD: : Init::Init dlsym(g_FSHandle gp_reqcancel_start) succeeds
12307-10 21:18:04.201 556 556 D QSEECOMD: : Init gp_reqcancel_start ret = 0
12407-10 21:18:04.202 556 556 D QSEECOMD: : gp request cancellation services: Started (Listener ID = 4352)
12507-10 21:18:04.202 556 556 D QSEECOMD: : QSEECOM DAEMON RUNNING
12607-10 21:18:04.229 569 569 I SELinux : SELinux: Loaded service_contexts from:
12707-10 21:18:04.230 569 569 I SELinux : /plat_service_contexts
12807-10 21:18:04.230 569 569 I SELinux : /vendor_service_contexts
12907-10 21:18:04.230 568 568 E cutils-trace: Error opening trace file: No such file or directory (2)
13007-10 21:18:04.231 477 477 E SELinux : avc: denied { find } for interface=android.hardware.gatekeeper::IGatekeeper sid=u:r:recovery:s0 pid=568 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1
13107-10 21:18:04.232 568 568 D vndksupport: Loading /vendor/lib/hw/android.hardware.gatekeeper@1.0-impl-qti.so from current namespace instead of sphal namespace.
13207-10 21:18:04.235 568 568 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000
13307-10 21:18:04.236 568 568 D QSEECOMAPI: App is already loaded QSEE and app id = 65537
13407-10 21:18:04.239 567 567 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000
13507-10 21:18:04.241 568 568 E KeymasterUtils: TA API Major Version: 4
13607-10 21:18:04.241 568 568 E KeymasterUtils: TA API Minor Version: 0
13707-10 21:18:04.241 568 568 E KeymasterUtils: TA Major Version: 4
13807-10 21:18:04.241 567 567 D QSEECOMAPI: App is already loaded QSEE and app id = 65537
13907-10 21:18:04.241 568 568 E KeymasterUtils: TA Minor Version: 162
14007-10 21:18:04.242 568 568 I ServiceManagement: Removing namespace from process name android.hardware.gatekeeper@1.0-service-qti to gatekeeper@1.0-service-qti.
14107-10 21:18:04.242 567 567 E KeymasterUtils: TA API Major Version: 4
14207-10 21:18:04.242 567 567 E KeymasterUtils: TA API Minor Version: 0
14307-10 21:18:04.242 567 567 E KeymasterUtils: TA Major Version: 4
14407-10 21:18:04.242 567 567 E KeymasterUtils: TA Minor Version: 162
14507-10 21:18:04.243 477 477 E SELinux : avc: denied { add } for interface=android.hardware.gatekeeper::IGatekeeper sid=u:r:recovery:s0 pid=568 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1
14607-10 21:18:04.243 568 568 I android.hardware.gatekeeper@1.0-service: Registration complete for android.hardware.gatekeeper@1.0::IGatekeeper/default.
14707-10 21:18:04.243 567 567 I ServiceManagement: Removing namespace from process name android.hardware.keymaster@4.0-service-qti to keymaster@4.0-service-qti.
14807-10 21:18:04.244 567 567 E cutils-trace: Error opening trace file: No such file or directory (2)
14907-10 21:18:04.244 477 477 E SELinux : avc: denied { add } for interface=android.hardware.keymaster::IKeymasterDevice sid=u:r:recovery:s0 pid=567 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1
15007-10 21:18:04.360 442 442 E cutils-trace: Error opening trace file: No such file or directory (2)
15107-10 21:18:04.360 477 477 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest.
15207-10 21:18:04.361 477 477 E SELinux : avc: denied { find } for interface=android.hardware.keymaster::IKeymasterDevice sid=u:r:recovery:s0 pid=442 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1
15307-10 21:18:04.362 477 477 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest.
15407-10 21:18:04.363 442 442 I /sbin/recovery: List of Keymaster HALs found:
15507-10 21:18:04.363 442 442 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default
15607-10 21:18:04.368 567 567 E KeyMasterHalDevice: Begin send cmd failed
15707-10 21:18:04.368 567 567 E KeyMasterHalDevice: ret: 0
15807-10 21:18:04.369 567 567 E KeyMasterHalDevice: resp->status: -62
15907-10 21:18:04.372 567 567 E KeyMasterHalDevice: Upgrade key send cmd failed
16007-10 21:18:04.372 567 567 E KeyMasterHalDevice: ret: 0
16107-10 21:18:04.372 567 567 E KeyMasterHalDevice: resp->status: -38
16207-10 21:18:04.375 477 477 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest.
16307-10 21:18:04.377 477 477 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest.
16407-10 21:18:04.377 442 442 I /sbin/recovery: List of Keymaster HALs found:
16507-10 21:18:04.378 442 442 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default
16607-10 21:18:04.379 567 567 E KeyMasterHalDevice: Begin send cmd failed
16707-10 21:18:04.379 567 567 E KeyMasterHalDevice: ret: 0
16807-10 21:18:04.379 567 567 E KeyMasterHalDevice: resp->status: -62
16907-10 21:18:04.382 567 567 E KeyMasterHalDevice: Upgrade key send cmd failed
17007-10 21:18:04.382 567 567 E KeyMasterHalDevice: ret: 0
17107-10 21:18:04.382 567 567 E KeyMasterHalDevice: resp->status: -38
17207-10 21:18:04.385 477 477 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest.
17307-10 21:18:04.387 477 477 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest.
17407-10 21:18:04.388 442 442 I /sbin/recovery: List of Keymaster HALs found:
17507-10 21:18:04.388 442 442 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default
17607-10 21:18:04.390 567 567 E KeyMasterHalDevice: Begin send cmd failed
17707-10 21:18:04.390 567 567 E KeyMasterHalDevice: ret: 0
17807-10 21:18:04.390 567 567 E KeyMasterHalDevice: resp->status: -62
17907-10 21:18:04.393 567 567 E KeyMasterHalDevice: Upgrade key send cmd failed
18007-10 21:18:04.393 567 567 E KeyMasterHalDevice: ret: 0
18107-10 21:18:04.393 567 567 E KeyMasterHalDevice: resp->status: -38
18207-10 21:18:04.394 477 477 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest.
18307-10 21:18:04.397 477 477 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest.
18407-10 21:18:04.397 442 442 I /sbin/recovery: List of Keymaster HALs found:
18507-10 21:18:04.398 442 442 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default
18607-10 21:18:04.399 567 567 E KeyMasterHalDevice: Begin send cmd failed
18707-10 21:18:04.399 567 567 E KeyMasterHalDevice: ret: 0
18807-10 21:18:04.399 567 567 E KeyMasterHalDevice: resp->status: -62
18907-10 21:18:04.402 567 567 E KeyMasterHalDevice: Upgrade key send cmd failed
19007-10 21:18:04.402 567 567 E KeyMasterHalDevice: ret: 0
19107-10 21:18:04.402 567 567 E KeyMasterHalDevice: resp->status: -38
19207-10 21:18:04.405 477 477 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest.
19307-10 21:18:04.407 477 477 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest.
19407-10 21:18:04.408 442 442 I /sbin/recovery: List of Keymaster HALs found:
19507-10 21:18:04.408 442 442 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default
19607-10 21:18:04.410 567 567 E KeyMasterHalDevice: Begin send cmd failed
19707-10 21:18:04.410 567 567 E KeyMasterHalDevice: ret: 0
19807-10 21:18:04.410 567 567 E KeyMasterHalDevice: resp->status: -62
19907-10 21:18:04.413 567 567 E KeyMasterHalDevice: Upgrade key send cmd failed
20007-10 21:18:04.413 567 567 E KeyMasterHalDevice: ret: 0
20107-10 21:18:04.413 567 567 E KeyMasterHalDevice: resp->status: -38
20207-10 21:18:04.416 477 477 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest.
20307-10 21:18:04.418 477 477 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest.
20407-10 21:18:04.419 442 442 I /sbin/recovery: List of Keymaster HALs found:
20507-10 21:18:04.419 442 442 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default
20607-10 21:18:04.420 567 567 E KeyMasterHalDevice: Begin send cmd failed
20707-10 21:18:04.420 567 567 E KeyMasterHalDevice: ret: 0
20807-10 21:18:04.421 567 567 E KeyMasterHalDevice: resp->status: -62
20907-10 21:18:04.424 567 567 E KeyMasterHalDevice: Upgrade key send cmd failed
21007-10 21:18:04.424 567 567 E KeyMasterHalDevice: ret: 0
21107-10 21:18:04.424 567 567 E KeyMasterHalDevice: resp->status: -38
21207-10 21:18:04.840 442 442 I recovery: type=1400 audit(0.0:72): avc: denied { write } for uid=0 name="by-name" dev="tmpfs" ino=17503 scontext=u:r:recovery:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1
21307-10 21:18:04.840 442 442 I recovery: type=1400 audit(0.0:73): avc: denied { add_name } for uid=0 name="boot" scontext=u:r:recovery:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1
21407-10 21:18:04.840 442 442 I recovery: type=1400 audit(0.0:74): avc: denied { create } for uid=0 name="boot" scontext=u:r:recovery:s0 tcontext=u:object_r:block_device:s0 tclass=lnk_file permissive=1
21507-10 21:18:04.840 442 442 I recovery: type=1400 audit(0.0:75): avc: denied { remove_name } for uid=0 name="boot" dev="tmpfs" ino=13111 scontext=u:r:recovery:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1
21607-10 21:18:04.840 442 442 I recovery: type=1400 audit(0.0:76): avc: denied { unlink } for uid=0 name="boot" dev="tmpfs" ino=13111 scontext=u:r:recovery:s0 tcontext=u:object_r:block_device:s0 tclass=lnk_file permissive=1
21707-10 21:18:05.884 442 442 I recovery: type=1400 audit(0.0:288): avc: denied { getattr } for uid=0 path="/data/data/MhFJtBXSskfbyiGQzrhQCF8oCtt43Hodq+jhX7snrbO" dev="mmcblk0p64" ino=2732 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c15,c256,c512,c768 tclass=dir permissive=1
21807-10 21:18:05.884 442 442 I recovery: type=1400 audit(0.0:289): avc: denied { read } for uid=0 name="MhFJtBXSskfbyiGQzrhQCF8oCtt43Hodq+jhX7snrbO" dev="mmcblk0p64" ino=2732 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c15,c256,c512,c768 tclass=dir permissive=1
21907-10 21:18:05.884 442 442 I recovery: type=1400 audit(0.0:290): avc: denied { open } for uid=0 path="/data/data/MhFJtBXSskfbyiGQzrhQCF8oCtt43Hodq+jhX7snrbO" dev="mmcblk0p64" ino=2732 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c15,c256,c512,c768 tclass=dir permissive=1
22007-10 21:18:05.884 442 442 I recovery: type=1400 audit(0.0:291): avc: denied { search } for uid=0 name="MhFJtBXSskfbyiGQzrhQCF8oCtt43Hodq+jhX7snrbO" dev="mmcblk0p64" ino=2732 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c15,c256,c512,c768 tclass=dir permissive=1
22107-10 21:18:05.887 442 442 I recovery: type=1400 audit(0.0:292): avc: denied { getattr } for uid=0 path="/data/data/_KgWuRAAAAAQEXH6YEr9fNiLGi2x3iE0q" dev="mmcblk0p64" ino=2738 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c131,c256,c512,c768 tclass=dir permissive=1
22207-10 21:18:06.649 587 588 I adbd : initializing functionfs
22307-10 21:18:06.649 587 588 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0
22407-10 21:18:06.653 587 588 I adbd : functionfs successfully initialized
22507-10 21:18:06.653 587 588 I adbd : registering usb transport
22607-10 21:18:06.654 587 589 E cutils-trace: Error opening trace file: No such file or directory (2)
22707-10 21:18:07.024 442 442 I recovery: type=1400 audit(0.0:520): avc: denied { read } for uid=0 name="0" dev="mmcblk0p64" ino=2515 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=dir permissive=1
22807-10 21:18:07.024 442 442 I recovery: type=1400 audit(0.0:521): avc: denied { open } for uid=0 path="/sdcard" dev="mmcblk0p64" ino=2515 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0 tclass=dir permissive=1
22907-10 21:18:07.027 442 442 I recovery: type=1400 audit(0.0:522): avc: denied { getattr } for uid=0 path="/sdcard/WmX4fA2TnYKMJ,WtBc60mD" dev="mmcblk0p64" ino=3246 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c512,c768 tclass=dir permissive=1
23007-10 21:18:07.257 442 442 I recovery: type=1400 audit(0.0:523): avc: denied { getattr } for uid=0 path="/vndservice_contexts" dev="rootfs" ino=12858 scontext=u:r:recovery:s0 tcontext=u:object_r:vndservice_contexts_file:s0 tclass=file permissive=1
23107-10 21:18:07.257 442 442 I recovery: type=1400 audit(0.0:524): avc: denied { getattr } for uid=0 path="/vendor_seapp_contexts" dev="rootfs" ino=12856 scontext=u:r:recovery:s0 tcontext=u:object_r:seapp_contexts_file:s0 tclass=file permissive=1
23207-10 21:18:07.683 590 590 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown
23307-10 21:18:07.683 590 590 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown
23407-10 21:18:07.686 587 587 I adbd : closing functionfs transport
23507-10 21:18:07.787 606 608 I adbd : initializing functionfs
23607-10 21:18:07.787 606 608 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0
23707-10 21:18:07.801 606 608 I adbd : functionfs successfully initialized
23807-10 21:18:07.801 606 608 I adbd : registering usb transport
23907-10 21:18:07.803 606 610 E cutils-trace: Error opening trace file: No such file or directory (2)
24007-10 21:18:07.845 442 442 I ARMAssembler: generated scanline__00000077:03545401_00000000_00000000 [ 36 ipp] (50 ins) at [0xf19005a0:0xf1900668] in 102031 ns
24107-10 21:18:08.487 605 605 I recovery: type=1400 audit(0.0:604): avc: denied { write } for uid=0 name="mtp_usb" dev="tmpfs" ino=13026 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
24207-10 21:18:08.487 605 605 I recovery: type=1400 audit(0.0:605): avc: denied { open } for uid=0 path="/dev/mtp_usb" dev="tmpfs" ino=13026 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
24307-10 21:18:08.487 605 605 I recovery: type=1400 audit(0.0:606): avc: denied { read } for uid=0 name="mtp_usb" dev="tmpfs" ino=13026 scontext=u:r:recovery:s0 tcontext=u:object_r:mtp_device:s0 tclass=chr_file permissive=1
24407-10 21:18:09.447 605 605 I recovery: type=1400 audit(0.0:607): avc: denied { read } for uid=0 name="WmX4fA2TnYKMJ,WtBc60mD" dev="mmcblk0p64" ino=3246 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c512,c768 tclass=dir permissive=1
24507-10 21:18:09.447 605 605 I recovery: type=1400 audit(0.0:608): avc: denied { open } for uid=0 path="/data/media/0/WmX4fA2TnYKMJ,WtBc60mD" dev="mmcblk0p64" ino=3246 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c512,c768 tclass=dir permissive=1
24607-10 21:18:09.497 605 605 I recovery: type=1400 audit(0.0:611): avc: denied { getattr } for uid=0 path="/data/media/0/WmX4fA2TnYKMJ,WtBc60mD/025BrUdSYkfZs00eejo+YA/aswJLoRgr8GivIbEeSFOf2,34Lq4Z79IOlAztC/LGQPvnh8O62X1kQUskh7UD" dev="mmcblk0p64" ino=4033 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c114,c256,c512,c768 tclass=dir permissive=1
24707-10 21:18:09.507 605 605 I recovery: type=1400 audit(0.0:612): avc: denied { getattr } for uid=0 path="/data/media/0/WmX4fA2TnYKMJ,WtBc60mD/025BrUdSYkfZs00eejo+YA/ksgsSXvuZ388t5invvL5P1,34Lq4Z79IOlAztC/JlXG0h+Tdc4EICXDWgt2UA" dev="mmcblk0p64" ino=5254 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c123,c256,c512,c768 tclass=dir permissive=1
24807-10 21:18:09.530 605 605 I recovery: type=1400 audit(0.0:613): avc: denied { read } for uid=0 name="LGQPvnh8O62X1kQUskh7UD" dev="mmcblk0p64" ino=4033 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c114,c256,c512,c768 tclass=dir permissive=1
24907-10 21:18:09.530 605 605 I recovery: type=1400 audit(0.0:614): avc: denied { open } for uid=0 path="/data/media/0/WmX4fA2TnYKMJ,WtBc60mD/025BrUdSYkfZs00eejo+YA/aswJLoRgr8GivIbEeSFOf2,34Lq4Z79IOlAztC/LGQPvnh8O62X1kQUskh7UD" dev="mmcblk0p64" ino=4033 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c114,c256,c512,c768 tclass=dir permissive=1
25007-10 21:18:09.530 605 605 I recovery: type=1400 audit(0.0:615): avc: denied { search } for uid=0 name="LGQPvnh8O62X1kQUskh7UD" dev="mmcblk0p64" ino=4033 scontext=u:r:recovery:s0 tcontext=u:object_r:media_rw_data_file:s0:c114,c256,c512,c768 tclass=dir permissive=1