--------- beginning of radio 01-01 00:00:08.817 453 453 D RILD : **RIL Daemon Started** 01-01 00:00:08.818 453 453 D RILD : **RILd param count=8** 01-01 00:00:08.818 484 484 I flags_health_check: ServerConfigurableFlagsReset reset_mode value: 0 01-01 00:00:08.819 484 484 I flags_health_check: ServerConfigurableFlagsReset attempted boot count is under threshold, skipping reset. 01-01 00:00:08.837 483 483 I usbd : persistent prop is adb 01-01 00:00:08.839 469 489 I storaged: storaged: Start 01-01 00:00:08.872 470 470 I wificond: wificond is starting up... 01-01 00:00:08.881 0 0 I servicemanager: Could not find android.hardware.net.nlinterceptor.IInterceptor/default in the VINTF manifest. 01-01 00:00:08.883 0 0 I init : starting service 'adbd'... 01-01 00:00:08.876 453 453 D RILD : RIL_Init argc = 7 clientId = 0 01-01 00:00:08.877 470 470 I HidlServiceManagement: Registered android.system.wifi.keystore@1.0::IKeystore/default 01-01 00:00:08.883 0 0 I init : Created socket '/dev/socket/adbd', mode 660, user 1000, group 1000 01-01 00:00:08.880 453 453 D RILC : Quectel RIL Version: Quectel_Android_RIL_Driver_V3.6.24_master_Release_20231211_10_47 01-01 00:00:08.882 477 477 I gatekeeperd: Starting gatekeeperd... 01-01 00:00:08.883 246 246 I android.hardware.security.keymint-service.strongbox-thales: Failed to send data, try to initialize connection SE connection 01-01 00:00:08.883 246 246 E android.hardware.security.keymint-service.strongbox-thales: Failed to start omapiSeService null 01-01 00:00:08.883 246 246 E android.hardware.security.keymint-service.strongbox-thales: Failed to send data, initialization not completed 01-01 00:00:08.883 246 246 E javacard.keymint.device.strongbox-impl: Error in sending data in sendData. -85 01-01 00:00:08.883 246 246 E javacard.strongbox.keymint.operation-impl: Error in initializing javacard. 01-01 00:00:08.883 241 253 W keystore2: system/security/keystore2/src/shared_secret_negotiation.rs:252 - ParameterRetrieval { e: Binder(SERVICE_SPECIFIC, -85), p: Aidl("strongbox") } 01-01 00:00:08.883 241 253 W keystore2: system/security/keystore2/src/shared_secret_negotiation.rs:253 - Retrying in one second. 01-01 00:00:08.885 477 477 I ServiceManagerCppClient: Waiting for service 'android.hardware.gatekeeper.IGatekeeper/default' on '/dev/binder'... 01-01 00:00:08.888 453 453 D RIL_READ_CONF: original conf line: stop_sent_at=1 01-01 00:00:08.888 453 453 D RIL_READ_CONF: stop_sent_at = 1 01-01 00:00:08.888 453 453 D RIL_READ_CONF: original conf line: vzw_test=1 01-01 00:00:08.888 453 453 D RIL_READ_CONF: vzw_test = 1 01-01 00:00:08.888 453 453 D RILC : [ro.build.version.release]: [14] 01-01 00:00:08.888 453 453 E RILC : Unsupport Android Version 140 by Quectel Now!!!! 01-01 00:00:08.888 453 453 D RILC : Android Version: 140, RIL_VERSION: 0 / 12 01-01 00:00:08.888 453 453 E RILC : '/vendor/manifest.xml' not exist. 01-01 00:00:08.888 453 453 D RILC : __getIRadioVersion:673 IRadioVersion:5 01-01 00:00:08.888 453 453 D RILC : [ro.build.description]: [yukawa-userdebug 14 UP1A.231105.003.A1 eng.infine.20240306.114104 test-keys] 01-01 00:00:08.888 453 453 D RILC : [ro.hardware]: [yukawa] 01-01 00:00:08.888 453 453 D RILC : selinux maybe set Enforcing mode, use command getenforce to check 01-01 00:00:08.888 453 453 D RILC : selinux maybe set Enforcing mode, use command "setenforce 0" to disable 01-01 00:00:08.888 453 453 I RILC : Opening tty device /dev/ttyAML6 01-01 00:00:08.888 453 453 I RILC : cmux_speed = 115200 01-01 00:00:08.888 453 453 I RILC : clientID = 0 01-01 00:00:08.888 453 453 D RILC : hardware/rild/rild.c tell me /dev/ttyAML6 is AT port 01-01 00:00:08.889 453 453 E RILU : Cannot open directory:/sys/bus/pci/devices/ 01-01 00:00:08.889 453 453 D RILU : find_pci_device is 0 01-01 00:00:08.889 453 453 D RILD : RIL_Init rilInit completed 01-01 00:00:08.889 453 453 I RILC : Quectel_Android_Libril_v1.3.3_master_Release_20231211_10_47 01-01 00:00:08.889 453 453 I RILC : SIM_COUNT: 1 01-01 00:00:08.890 453 453 E RILC : RIL_register: RIL version 12 01-01 00:00:08.890 453 453 I RILC : s_registerCalled flag set, 1 01-01 00:00:08.890 453 453 I RILC : radio::registerService 01-01 00:00:08.890 453 494 I RILC : mainLoop Start 01-01 00:00:08.890 453 453 E rild : '/vendor/manifest.xml' not exist. 01-01 00:00:08.890 453 453 D rild : __getIRadioVersion:157 libril-IRadioVersion:5 01-01 00:00:08.890 453 453 D RIL_SERVICE_1_2: RadioImpl_1_2::RadioImpl_1_2() 01-01 00:00:08.890 453 453 I RIL_SERVICE_1_3: RadioImpl_1_3() 01-01 00:00:08.890 453 453 D RIL_SERVICE_1_4: RadioImpl_1_4() 01-01 00:00:08.890 453 453 D rild : new RadioImpl_1_5 01-01 00:00:08.890 453 453 D RIL_SERVICE_1_5: RadioImpl_1_5::registerAsService(slot1) 01-01 00:00:08.898 453 494 D MUXD : MUXD 2687:gsm0710muxd(): gsm0710muxd serialname = /dev/ttyAML6, gsm0710muxd_pid = 0 01-01 00:00:08.899 404 404 D radiocompat: Radio HAL compat service starting... 01-01 00:00:08.900 215 215 I hwservicemanager: Since android.hardware.radio.config@1.1::IRadioConfig/default is not registered, trying to start it as a lazy HAL (if it's not configured to be a lazy HAL, it may be stuck starting or still starting). 01-01 00:00:08.902 215 215 I hwservicemanager: Since android.hardware.radio.config@1.1::IRadioConfig/default is not registered, trying to start it as a lazy HAL (if it's not configured to be a lazy HAL, it may be stuck starting or still starting). 01-01 00:00:08.902 453 453 I HidlServiceManagement: Registered android.hardware.radio@1.5::IRadio/slot1 01-01 00:00:08.902 404 404 I HidlServiceManagement: getService: Trying again for android.hardware.radio.config@1.1::IRadioConfig/default... 01-01 00:00:08.902 453 453 D RIL_SERVICE_1_1: status = 0 01-01 00:00:08.902 453 453 I RILC : RILHIDL called registerService 01-01 00:00:08.902 453 453 D RILD : RIL_Init RIL_register completed 01-01 00:00:08.902 453 453 D RILD : RIL_register_socket started 01-01 00:00:08.902 453 453 D RIL_UIM_SOCKET: Adding socket with id: 0 01-01 00:00:08.902 453 453 D RILD : RIL_register_socket completed 01-01 00:00:08.906 215 498 W libc : Unable to set property "ctl.interface_start" to "android.hardware.radio.config@1.1::IRadioConfig/default": error code: 0x20 01-01 00:00:08.907 215 498 I hwservicemanager: Tried to start android.hardware.radio.config@1.1::IRadioConfig/default as a lazy service, but was unable to. Usually this happens when a service is not installed, but if the service is intended to be used as a lazy service, then it may be configured incorrectly. 01-01 00:00:08.907 215 496 W libc : Unable to set property "ctl.interface_start" to "android.hardware.radio.config@1.1::IRadioConfig/default": error code: 0x20 01-01 00:00:08.912 0 0 I init : ... started service 'adbd' has pid 493 01-01 00:00:08.907 215 496 I hwservicemanager: Tried to start android.hardware.radio.config@1.1::IRadioConfig/default as a lazy service, but was unable to. Usually this happens when a service is not installed, but if the service is intended to be used as a lazy service, then it may be configured incorrectly. 01-01 00:00:08.912 0 0 I init : Control message: Processed ctl.start for 'adbd' from pid: 483 (/system/bin/usbd) 01-01 00:00:08.912 0 0 I init : Service 'exec 16 (/system/bin/flags_health_check BOOT_FAILURE)' (pid 484) exited with status 0 waiting took 0.106000 seconds 01-01 00:00:08.912 0 0 I init : Sending signal 9 to service 'exec 16 (/system/bin/flags_health_check BOOT_FAILURE)' (pid 484) process group... 01-01 00:00:08.912 0 0 I libprocessgroup: Successfully killed process cgroup uid 1000 pid 484 in 0ms 01-01 00:00:08.913 0 0 E init : Control message: Could not find 'android.hardware.radio.config@1.1::IRadioConfig/default' for ctl.interface_start from pid: 215 (/system/bin/hwservicemanager) 01-01 00:00:08.913 0 0 I init : processing action (load_persist_props_action) from (/system/etc/init/logcatd.rc:29) 01-01 00:00:08.913 0 0 I servicemanager: Could not find android.hardware.usb.gadget.IUsbGadget/default in the VINTF manifest. 01-01 00:00:08.913 0 0 E init : Control message: Could not find 'android.hardware.radio.config@1.1::IRadioConfig/default' for ctl.interface_start from pid: 215 (/system/bin/hwservicemanager) 01-01 00:00:08.914 0 0 I init : processing action (llk.enable=0) from (/system/etc/init/llkd.rc:12) 01-01 00:00:08.914 0 0 I init : processing action (khungtask.enable=1) from (/system/etc/init/llkd.rc:18) 01-01 00:00:08.915 0 0 I init : processing action (llk.enable=0) from (/system/etc/init/llkd.rc:12) 01-01 00:00:08.910 483 483 I usbd : Usb HAL found. 01-01 00:00:08.910 399 399 I libusbconfigfs: setCurrentUsbFunctions None 01-01 00:00:08.910 399 399 I libusbconfigfs: Gadget cannot be pulled down 01-01 00:00:08.910 399 399 I android.hardware.usb.gadget@1.1-service.generic: mMonitor not running 01-01 00:00:08.910 399 399 I android.hardware.usb.gadget@1.1-service.generic: Returned from tearDown gadget 01-01 00:00:08.916 0 0 I init : processing action (khungtask.enable=0) from (/system/etc/init/llkd.rc:21) 01-01 00:00:08.918 0 0 I init : processing action (init.svc.media=*) from (/system/etc/init/mediaserver.rc:1) 01-01 00:00:08.919 0 0 I init : processing action (khungtask.enable=true) from (/system/etc/init/llkd.rc:25) 01-01 00:00:08.920 0 0 I init : processing action (khungtask.enable=false) from (/system/etc/init/llkd.rc:31) 01-01 00:00:08.920 0 0 I init : Service 'usbd' (pid 483) exited with status 0 oneshot service took 0.128000 seconds in background 01-01 00:00:08.920 0 0 I init : Sending signal 9 to service 'usbd' (pid 483) process group... 01-01 00:00:08.920 0 0 I libprocessgroup: Successfully killed process cgroup uid 0 pid 483 in 0ms 01-01 00:00:08.916 495 495 I auditd : type=1400 audit(0.0:23): avc: denied { execute_no_trans } for comm="sh" path="/vendor/bin/toybox_vendor" dev="overlay" ino=206 scontext=u:r:rild:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1 01-01 00:00:08.916 495 495 I sh : type=1400 audit(0.0:23): avc: denied { execute_no_trans } for path="/vendor/bin/toybox_vendor" dev="overlay" ino=206 scontext=u:r:rild:s0 tcontext=u:object_r:vendor_toolbox_exec:s0 tclass=file permissive=1 01-01 00:00:08.989 215 215 I hwservicemanager: getTransport: Cannot find entry android.hardware.audio.effect@7.1::IEffectsFactory/default in either framework or device VINTF manifest. 01-01 00:00:08.990 215 215 I hwservicemanager: getTransport: Cannot find entry android.hardware.audio@7.1::IDevicesFactory/default in either framework or device VINTF manifest. 01-01 00:00:08.998 467 479 I ServiceManagerCppClient: Waiting for service 'package_native' on '/dev/binder'... 01-01 00:00:09.002 405 405 I AudioFlinger: Using default 3000 mSec as standby time. 01-01 00:00:09.007 405 405 D audioserver: main: AudioFlinger created 01-01 00:00:09.008 505 505 I auditd : type=1400 audit(0.0:24): avc: denied { getattr } for comm="sh" path="/system/bin/toybox" dev="overlay" ino=521 scontext=u:r:rild:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 01-01 00:00:09.008 505 505 I sh : type=1400 audit(0.0:24): avc: denied { getattr } for path="/system/bin/toybox" dev="overlay" ino=521 scontext=u:r:rild:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 01-01 00:00:09.008 505 505 I auditd : type=1400 audit(0.0:25): avc: denied { execute } for comm="sh" name="toybox" dev="dm-0" ino=521 scontext=u:r:rild:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 01-01 00:00:09.008 505 505 I sh : type=1400 audit(0.0:25): avc: denied { execute } for name="toybox" dev="dm-0" ino=521 scontext=u:r:rild:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 01-01 00:00:09.008 505 505 I auditd : type=1400 audit(0.0:26): avc: denied { read open } for comm="sh" path="/system/bin/toybox" dev="overlay" ino=521 scontext=u:r:rild:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 01-01 00:00:09.008 505 505 I sh : type=1400 audit(0.0:26): avc: denied { read open } for path="/system/bin/toybox" dev="overlay" ino=521 scontext=u:r:rild:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 01-01 00:00:09.008 505 505 I auditd : type=1400 audit(0.0:27): avc: denied { execute_no_trans } for comm="sh" path="/system/bin/toybox" dev="overlay" ino=521 scontext=u:r:rild:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 01-01 00:00:09.008 505 505 I sh : type=1400 audit(0.0:27): avc: denied { execute_no_trans } for path="/system/bin/toybox" dev="overlay" ino=521 scontext=u:r:rild:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 01-01 00:00:09.008 505 505 I auditd : type=1400 audit(0.0:28): avc: denied { map } for comm="rm" path="/system/bin/toybox" dev="overlay" ino=521 scontext=u:r:rild:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 01-01 00:00:09.008 505 505 I rm : type=1400 audit(0.0:28): avc: denied { map } for path="/system/bin/toybox" dev="overlay" ino=521 scontext=u:r:rild:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 01-01 00:00:09.011 399 399 I libusbconfigfs: setCurrentUsbFunctions Adb 01-01 00:00:09.011 399 399 I libusbconfigfs: Service started 01-01 00:00:09.011 399 399 I android.hardware.usb.gadget@1.1-service.generic: Usb Gadget setcurrent functions called successfully 01-01 00:00:09.025 507 507 D MUXD : MUXD 2528:main(): Quectel CMUX Revision: Quectel_Linux_CMUX_Driver_V2.0.3 01-01 00:00:09.025 507 507 V MUXD : MUXD 2529:main(): Enter 01-01 00:00:09.026 507 507 D MUXD : MUXD 2638:main(): Called with following options: 01-01 00:00:09.026 507 507 D MUXD : MUXD 2639:main(): -d: Fork, get a daemon [yes] 01-01 00:00:09.026 507 507 D MUXD : MUXD 2640:main(): -v: Set verbose logging level. 0 (Silent) - 7 (Debug) [6] 01-01 00:00:09.026 507 507 D MUXD : MUXD 2641:main(): -s : Serial port device to connect to [/dev/ttyAML6] 01-01 00:00:09.026 507 507 D MUXD : MUXD 2642:main(): -c : Hardware flow control [disabled] 01-01 00:00:09.026 507 507 D MUXD : MUXD 2643:main(): -t : reset modem after this number of seconds of silence [0] 01-01 00:00:09.026 507 507 D MUXD : MUXD 2644:main(): -P : PIN code to unlock SIM [-1] 01-01 00:00:09.026 507 507 D MUXD : MUXD 2645:main(): -p : use ping and reset modem after this number of unanswered pings [0] 01-01 00:00:09.026 507 507 D MUXD : MUXD 2646:main(): -b : mode baudrate [115200] 01-01 00:00:09.026 507 507 D MUXD : MUXD 2647:main(): -m : Mode (basic, advanced) [basic] 01-01 00:00:09.026 507 507 D MUXD : MUXD 2648:main(): -f : Frame size [127] 01-01 00:00:09.026 507 507 D MUXD : MUXD 2649:main(): -n : Number of virtual ports to create, must be in range 1-4 [3] 01-01 00:00:09.026 507 507 D MUXD : MUXD 2650:main(): -o : Output log to /tmp/gsm0710muxd.log [no] 01-01 00:00:09.026 507 507 V MUXD : MUXD 2271:watchdog(): Enter 01-01 00:00:09.026 507 507 V MUXD : MUXD 2274:watchdog(): Serial state is 0 01-01 00:00:09.026 507 507 V MUXD : MUXD 2043:open_serial_device(): Enter 01-01 00:00:09.026 507 507 D MUXD : MUXD 2050:open_serial_device(): Opened serial port 01-01 00:00:09.026 507 507 D MUXD : MUXD 2068:open_serial_device(): Configured serial device 01-01 00:00:09.026 507 507 V MUXD : MUXD 2072:open_serial_device(): Switched Mux state to 1 01-01 00:00:09.026 507 507 D MUXD : MUXD 2282:watchdog(): Watchdog started 01-01 00:00:09.026 507 507 D MUXD : MUXD 2099:start_muxer(): Configuring modem 01-01 00:00:09.026 507 507 V MUXD : MUXD 1386:chat(): Enter 01-01 00:00:09.027 507 507 V MUXD : MUXD 732:syslogdump(): >s 00000000: 41 54 0d 0a . . . .- . . . . . . . . AT.. 01-01 00:00:09.027 507 507 V MUXD : MUXD 1393:chat(): Wrote 4 bytes 01-01 00:00:09.027 507 507 V MUXD : MUXD 1395:chat(): CHAT++++++++++++ 01-01 00:00:09.030 507 507 V MUXD : MUXD 1406:chat(): Selected 1 01-01 00:00:09.130 507 507 V MUXD : MUXD 1413:chat(): Read 7 bytes from serial device 01-01 00:00:09.130 507 507 V MUXD : MUXD 732:syslogdump(): (42): syscall readlinkat redefined here 01-01 00:00:09.224 466 466 W mediaextractor: libminijail[466]: compile_file: (38): previous definition here 01-01 00:00:09.224 493 512 I adbd : Waiting for persist.adb.tls_server.enable=1 01-01 00:00:09.224 493 493 I adbd : adbd started 01-01 00:00:09.224 493 514 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0 01-01 00:00:09.225 399 506 I libusbconfigfs: event=1 on fd=8 01-01 00:00:09.225 399 506 I libusbconfigfs: event=1 on fd=8 01-01 00:00:09.232 0 0 I : read descriptors 01-01 00:00:09.232 0 0 I : read strings 01-01 00:00:09.231 405 405 I AudioFlinger: openOutput() this 0xb400f04be47168a0, module 10 Device AUDIO_DEVICE_OUT_HDMI, @:, SamplingRate 48000, Format 0x000001, Channels 0x3, flags 0x2 01-01 00:00:09.231 493 514 I adbd : UsbFfsConnection constructed 01-01 00:00:09.232 387 430 I audio_hw_yukawa: adev_open_output_stream selects channels=2 rate=48000 format=0, devices=1024 01-01 00:00:09.232 493 516 I adbd : UsbFfs-monitor thread spawned 01-01 00:00:09.232 493 516 I adbd : USB event: FUNCTIONFS_BIND 01-01 00:00:09.237 0 0 I dwc2 ff400000.usb: bound driver configfs-gadget 01-01 00:00:09.234 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(1): syscall read redefined here 01-01 00:00:09.234 466 466 W mediaextractor: libminijail[466]: compile_file: (18): previous definition here 01-01 00:00:09.234 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(2): syscall write redefined here 01-01 00:00:09.234 466 466 W mediaextractor: libminijail[466]: compile_file: (6): previous definition here 01-01 00:00:09.234 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(3): syscall exit redefined here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: (27): previous definition here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(4): syscall rt_sigreturn redefined here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: (29): previous definition here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(5): syscall exit_group redefined here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: (28): previous definition here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(8): syscall futex redefined here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: (4): previous definition here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(9): syscall getrandom redefined here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: (32): previous definition here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(14): syscall openat redefined here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: (12): previous definition here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(15): syscall dup redefined here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: (9): previous definition here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(16): syscall close redefined here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: (8): previous definition here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(17): syscall lseek redefined here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: (23): previous definition here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(18): syscall getdents64 redefined here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: (41): previous definition here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(19): syscall faccessat redefined here 01-01 00:00:09.235 399 506 I libusbconfigfs: GADGET pulled up 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: (25): previous definition here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(28): syscall prctl redefined here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: (5): previous definition here 01-01 00:00:09.235 399 506 I libusbconfigfs: event=1 on fd=8 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(29): syscall madvise redefined here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: (14): previous definition here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(30): syscall mprotect redefined here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: (13): previous definition here 01-01 00:00:09.235 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(31): syscall munmap redefined here 01-01 00:00:09.236 466 466 W mediaextractor: libminijail[466]: compile_file: (11): previous definition here 01-01 00:00:09.236 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(32): syscall getuid redefined here 01-01 00:00:09.236 466 466 W mediaextractor: libminijail[466]: compile_file: (15): previous definition here 01-01 00:00:09.236 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(33): syscall fstat redefined here 01-01 00:00:09.236 466 466 W mediaextractor: libminijail[466]: compile_file: (16): previous definition here 01-01 00:00:09.236 466 466 W mediaextractor: libminijail[466]: compile_file: /apex/com.android.media/etc/seccomp_policy/crash_dump.arm64.policy(34): syscall mmap redefined here 01-01 00:00:09.236 466 466 W mediaextractor: libminijail[466]: compile_file: (10): previous definition here 01-01 00:00:09.242 466 466 W mediaextractor: libminijail[466]: logging seccomp filter failures 01-01 00:00:09.246 454 454 I cameraserver: ServiceManager: 0xb400e628a4817390 01-01 00:00:09.247 405 405 I AudioFlinger: HAL output buffer size 1024 frames, normal sink buffer size 1024 frames 01-01 00:00:09.248 215 215 I hwservicemanager: getTransport: Cannot find entry android.hardware.audio.effect@7.1::IEffectsFactory/default in either framework or device VINTF manifest. 01-01 00:00:09.248 215 215 I hwservicemanager: getTransport: Cannot find entry android.hardware.audio@7.1::IDevicesFactory/default in either framework or device VINTF manifest. 01-01 00:00:09.251 454 454 I CameraService: CameraService started (pid=454) 01-01 00:00:09.251 454 454 I CameraService: CameraService process starting 01-01 00:00:09.252 454 454 W BatteryNotifier: batterystats service unavailable! 01-01 00:00:09.253 454 454 W BatteryNotifier: batterystats service unavailable! 01-01 00:00:09.256 454 454 I cameraserver: Connecting to new camera provider: external/0, isRemote? 1 01-01 00:00:09.257 454 454 I CameraProviderManager: Camera provider external/0 ready with 0 camera devices 01-01 00:00:09.258 454 518 W CameraProviderManager: addHidlProviderLocked: Camera provider HAL with name 'external/0' already registered 01-01 00:00:09.266 454 454 I HidlServiceManagement: Registered android.frameworks.cameraservice.service@2.2::ICameraService/default 01-01 00:00:09.270 454 454 I CameraService: CameraService pinged cameraservice proxy 01-01 00:00:09.271 454 454 I cameraserver: ServiceManager: 0xb400e628a4817390 done instantiate 01-01 00:00:09.277 0 0 I servicemanager: Found android.frameworks.cameraservice.service.ICameraService/default in framework VINTF manifest. 01-01 00:00:09.277 0 0 I servicemanager: Found android.frameworks.cameraservice.service.ICameraService/default in framework VINTF manifest. 01-01 00:00:09.275 472 472 I android.hardware.media.omx@1.0-service: mediacodecservice starting 01-01 00:00:09.279 472 472 W android.hardware.media.omx@1.0-service: Could not read additional policy file '/vendor/etc/seccomp_policy/mediacodec.policy' 01-01 00:00:09.279 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: failed to get path of fd 5: No such file or directory 01-01 00:00:09.279 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: allowing syscall: clock_gettime 01-01 00:00:09.279 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: allowing syscall: connect 01-01 00:00:09.279 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: allowing syscall: fcntl64 01-01 00:00:09.279 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: allowing syscall: socket 01-01 00:00:09.279 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: allowing syscall: writev 01-01 00:00:09.279 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (59): syscall getrandom redefined here 01-01 00:00:09.279 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (15): previous definition here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(1): syscall read redefined here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (9): previous definition here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(2): syscall write redefined here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (5): previous definition here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(3): syscall exit redefined here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (40): previous definition here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(4): syscall rt_sigreturn redefined here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (45): previous definition here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(6): syscall exit_group redefined here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (44): previous definition here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(7): syscall clock_gettime redefined here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (7): previous definition here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(8): syscall gettimeofday redefined here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (47): previous definition here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(9): syscall futex redefined here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (3): previous definition here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(10): syscall getrandom redefined here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (15): previous definition here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(13): syscall ppoll redefined here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (13): previous definition here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(14): syscall pipe2 redefined here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (46): previous definition here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(15): syscall openat redefined here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (30): previous definition here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(16): syscall dup redefined here 01-01 00:00:09.282 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (12): previous definition here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(17): syscall close redefined here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (10): previous definition here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(18): syscall lseek redefined here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (50): previous definition here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(19): syscall getdents64 redefined here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (58): previous definition here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(20): syscall faccessat redefined here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (38): previous definition here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(26): syscall rt_sigprocmask redefined here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (41): previous definition here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(29): syscall prctl redefined here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (6): previous definition here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(30): syscall madvise redefined here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (29): previous definition here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(31): syscall mprotect redefined here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (28): previous definition here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(32): syscall munmap redefined here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (27): previous definition here 01-01 00:00:09.283 480 480 I update_engine: [INFO:BootControlClient.cpp(341)] AIDL IBootControl not available, falling back to HIDL. 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(33): syscall getuid32 redefined here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (34): previous definition here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(34): syscall fstat64 redefined here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (35): previous definition here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: /system/etc/seccomp_policy/crash_dump.arm.policy(35): syscall mmap2 redefined here 01-01 00:00:09.283 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: compile_file: (14): previous definition here 01-01 00:00:09.290 0 0 I servicemanager: Could not find android.hardware.boot.IBootControl/default in the VINTF manifest. 01-01 00:00:09.286 472 472 W android.hardware.media.omx@1.0-service: libminijail[472]: logging seccomp filter failures 01-01 00:00:09.288 472 472 E ProcessState: vndservicemanager is not started on this device, you can save resources/threads by not initializing ProcessState with /dev/vndbinder. 01-01 00:00:09.289 472 472 E vndksupport: Could not load libstagefrighthw.so from default namespace: dlopen failed: library "libstagefrighthw.so" not found. 01-01 00:00:09.297 472 472 I SoftOMXPlugin: createOMXPlugin 01-01 00:00:09.299 472 472 D MediaCodecsXmlParser: parsing /vendor/etc/media_codecs.xml... 01-01 00:00:09.301 472 472 D MediaCodecsXmlParser: parsing /vendor/etc/media_codecs_google_c2_audio.xml... 01-01 00:00:09.304 405 405 I BufferProvider: found effect "Multichannel Downmix To Stereo" from The Android Open Source Project 01-01 00:00:09.305 472 472 D MediaCodecsXmlParser: parsing /vendor/etc/media_codecs_google_c2_video.xml... 01-01 00:00:09.306 405 405 D AudioFlinger: Failed to add event callback 01-01 00:00:09.306 405 522 I AudioFlinger: AudioFlinger's thread 0xb400f04dcfa23930 tid=522 ready to run 01-01 00:00:09.307 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.307 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.307 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.307 405 405 V APM_AudioPolicyManager: checkAndSetVolume cannot set volume group 4 volume when is not requested for comm 01-01 00:00:09.307 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.307 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.307 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.307 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.308 405 522 W AudioFlinger: no wake lock to update, system not ready yet 01-01 00:00:09.308 405 522 D AudioFlinger: ro.audio.silent is ignored since no output device is set 01-01 00:00:09.308 405 522 W AudioFlinger: no wake lock to update, system not ready yet 01-01 00:00:09.308 405 522 D AudioFlinger: ro.audio.silent is ignored since no output device is set 01-01 00:00:09.309 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.309 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.309 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.309 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.309 472 472 I MediaCodecsXmlParser: Did not find media_codecs_performance.xml in search path 01-01 00:00:09.309 472 472 I MediaCodecsXmlParser: Did not find media_codecs_shaping.xml in search path 01-01 00:00:09.310 405 405 W AudioFlinger: moveEffects() bad srcOutput 0 01-01 00:00:09.310 405 405 V APM_AudioPolicyManager: selectOutputForMusicEffects selected output 13 01-01 00:00:09.310 405 405 V APM_AudioPolicyManager: setOutputDevices device {AUDIO_DEVICE_OUT_HDMI, @:} delayMs 0 01-01 00:00:09.310 405 405 V APM_AudioPolicyManager: setOutputDevices() prevDevice {AUDIO_DEVICE_OUT_HDMI, @:} 01-01 00:00:09.310 405 405 I APM::AudioPolicyEngine: getDevicesForStrategyInt no device found for strategy 1 01-01 00:00:09.310 405 405 I APM::AudioPolicyEngine: getDevicesForStrategyInt no device found for strategy 2 01-01 00:00:09.311 405 405 I APM::AudioPolicyEngine: getDevicesForStrategyInt no device found for strategy 9 01-01 00:00:09.311 405 405 I APM::AudioPolicyEngine: getDevicesForStrategyInt no device found for strategy 6 01-01 00:00:09.311 405 405 V APM_AudioPolicyManager: setOutputDevices changing device to {AUDIO_DEVICE_OUT_HDMI, @:} 01-01 00:00:09.311 472 472 I HidlServiceManagement: Registered android.hardware.media.omx@1.0::IOmx/default 01-01 00:00:09.311 472 472 I HidlServiceManagement: Removing namespace from process name android.hardware.media.omx@1.0-service to omx@1.0-service. 01-01 00:00:09.312 472 472 I android.hardware.media.omx@1.0-service: IOmx HAL service created. 01-01 00:00:09.312 472 472 I OmxStore: omx common prefix: 'OMX.google.' 01-01 00:00:09.312 472 472 D MediaCodecsXmlParser: parsing /vendor/etc/media_codecs.xml... 01-01 00:00:09.312 472 472 D MediaCodecsXmlParser: parsing /vendor/etc/media_codecs_google_c2_audio.xml... 01-01 00:00:09.313 472 472 D MediaCodecsXmlParser: parsing /vendor/etc/media_codecs_google_c2_video.xml... 01-01 00:00:09.313 472 472 I MediaCodecsXmlParser: Did not find media_codecs_performance.xml in search path 01-01 00:00:09.313 472 472 I MediaCodecsXmlParser: Did not find media_codecs_shaping.xml in search path 01-01 00:00:09.314 472 472 I HidlServiceManagement: Registered android.hardware.media.omx@1.0::IOmxStore/default 01-01 00:00:09.315 472 472 I HidlServiceManagement: Removing namespace from process name android.hardware.media.omx@1.0-service to omx@1.0-service. 01-01 00:00:09.339 480 480 I update_engine: [INFO:BootControlClient.cpp(354)] Using HIDL version 1.2 of IBootControl 01-01 00:00:09.358 0 0 I dwc2 ff400000.usb: new device is high-speed 01-01 00:00:09.354 405 522 D AudioFlinger: updateHalSupportedLatencyModes_l: thread(13) status -38 supported latency modes: { } 01-01 00:00:09.355 408 486 D libEGL : loaded /vendor/lib64/egl/libGLES_mali.so 01-01 00:00:09.356 405 405 V APM_AudioPolicyManager: setOutputDevices() AF::createAudioPatch returned 0 patchHandle 12 num_sources 1 num_sinks 1 01-01 00:00:09.356 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.356 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.356 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.356 405 405 V APM_AudioPolicyManager: checkAndSetVolume cannot set volume group 4 volume when is not requested for comm 01-01 00:00:09.357 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.357 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.357 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.357 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.357 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.357 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.357 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.357 405 405 E APM_AudioPolicyManager: invalid volume index range 01-01 00:00:09.357 387 430 E DevicesFactoryHAL: loadAudioInterface couldn't load audio hw module audio.a2dp (No such file or directory) 01-01 00:00:09.357 405 405 W DevicesFactoryHalHidl: The specified device name is not recognized: "a2dp" 01-01 00:00:09.357 405 405 E AudioFlinger: loadHwModule() error -22 loading module a2dp 01-01 00:00:09.358 405 405 W APM_AudioPolicyManager: could not load HW module a2dp 01-01 00:00:09.364 405 405 D AudioFlinger::MelReporter: activateHalSoundDoseComputation: Forcing use of internal MEL computation. 01-01 00:00:09.364 405 405 W AudioFlinger: loadHwModule() sound dose reporting is not available 01-01 00:00:09.365 405 405 I AudioFlinger: loadHwModule() Loaded bluetooth audio interface, handle 18 01-01 00:00:09.382 405 405 D AudioFlinger::MelReporter: activateHalSoundDoseComputation: Forcing use of internal MEL computation. 01-01 00:00:09.383 405 405 W AudioFlinger: loadHwModule() sound dose reporting is not available 01-01 00:00:09.383 405 405 I AudioFlinger: loadHwModule() Loaded usb audio interface, handle 26 01-01 00:00:09.383 405 405 V APM_AudioPolicyManager: onNewAudioModulesAvailableInt: Input device list is empty! for profile usb_device input 01-01 00:00:09.392 0 0 I android_work: sent uevent USB_STATE=CONNECTED 01-01 00:00:09.392 0 0 I dwc2 ff400000.usb: new address 14 01-01 00:00:09.396 480 480 I update_engine: [INFO:boot_control_android.cc(64)] Loaded boot control hal. 01-01 00:00:09.403 387 430 I r_submix: adev_open(name=audio_hw_if) 01-01 00:00:09.403 405 405 D AudioFlinger::MelReporter: activateHalSoundDoseComputation: Forcing use of internal MEL computation. 01-01 00:00:09.403 405 405 W AudioFlinger: loadHwModule() sound dose reporting is not available 01-01 00:00:09.404 387 430 I r_submix: adev_init_check() 01-01 00:00:09.404 405 405 I AudioFlinger: loadHwModule() Loaded r_submix audio interface, handle 34 01-01 00:00:09.404 387 430 D r_submix: adev_open_input_stream(addr=0) 01-01 00:00:09.404 387 430 I r_submix: adev_open_input_stream(): about to create pipe at index 9, rate 48000, pipe size 4096 01-01 00:00:09.404 387 430 D r_submix: submix_audio_device_create_pipe_l(addr=0, idx=9) 01-01 00:00:09.404 387 430 D r_submix: now using address 0 for route 9 01-01 00:00:09.410 399 506 I libusbconfigfs: event=1 on fd=8 01-01 00:00:09.410 493 516 I adbd : USB event: FUNCTIONFS_ENABLE 01-01 00:00:09.411 493 526 I adbd : UsbFfs-worker thread spawned 01-01 00:00:09.411 405 528 I AudioFlinger: AudioFlinger's thread 0xb400f04dcf9babb0 tid=528 ready to run 01-01 00:00:09.412 387 430 I r_submix: in_standby() 01-01 00:00:09.412 405 528 W AudioFlinger: no wake lock to update, system not ready yet 01-01 00:00:09.412 387 430 I r_submix: in_standby() 01-01 00:00:09.413 405 528 W AudioFlinger: no wake lock to update, system not ready yet 01-01 00:00:09.413 387 430 D r_submix: adev_close_input_stream() 01-01 00:00:09.413 387 430 D r_submix: submix_audio_device_release_pipe_l(idx=9) addr=0 01-01 00:00:09.413 387 430 D r_submix: submix_audio_device_destroy_pipe_l(): pipe destroyed 01-01 00:00:09.414 405 405 I APM::AudioPolicyEngine: getDevicesForStrategyInt no device found for strategy 1 01-01 00:00:09.414 405 405 I APM::AudioPolicyEngine: getDevicesForStrategyInt no device found for strategy 2 01-01 00:00:09.415 405 405 I APM::AudioPolicyEngine: getDevicesForStrategyInt no device found for strategy 9 01-01 00:00:09.415 405 405 I APM::AudioPolicyEngine: getDevicesForStrategyInt no device found for strategy 6 01-01 00:00:09.415 215 215 I hwservicemanager: getTransport: Cannot find entry android.hardware.audio.effect@7.1::IEffectsFactory/default in either framework or device VINTF manifest. 01-01 00:00:09.415 215 215 I hwservicemanager: getTransport: Cannot find entry android.hardware.audio@7.1::IDevicesFactory/default in either framework or device VINTF manifest. 01-01 00:00:09.419 0 0 I android_work: sent uevent USB_STATE=CONFIGURED 01-01 00:00:09.418 405 405 I audioserver: Waiting for activity service 01-01 00:00:09.450 408 486 I RenderEngine: Realtime priority unsupported, degrading gracefully to high priority 01-01 00:00:09.462 382 382 D AndroidRuntime: >>>>>> START com.android.internal.os.ZygoteInit uid 0 <<<<<< 01-01 00:00:09.462 480 480 I update_engine: [INFO:daemon_state_android.cc(44)] Booted in dev mode. 01-01 00:00:09.462 382 382 I boot_progress_start: 9462 01-01 00:00:09.524 480 480 E update_engine: [ERROR:update_attempter_android.cc(944)] prefs_->GetInt64(kPrefsPreviousSlot, &previous_slot) failed. 01-01 00:00:09.546 0 0 I init : Service 'exec 14 (/system/bin/profcollectctl reset)' (pid 410) exited with status 0 oneshot service took 1.561000 seconds in background 01-01 00:00:09.546 0 0 I init : Sending signal 9 to service 'exec 14 (/system/bin/profcollectctl reset)' (pid 410) process group... 01-01 00:00:09.546 0 0 I libprocessgroup: Successfully killed process cgroup uid 0 pid 410 in 0ms 01-01 00:00:09.543 408 486 I RenderEngine: OpenGL ES informations: 01-01 00:00:09.543 408 486 I RenderEngine: vendor : ARM 01-01 00:00:09.543 408 486 I RenderEngine: renderer : Mali-G52 01-01 00:00:09.543 408 486 I RenderEngine: version : OpenGL ES 3.2 v1.r16p0-01rel0-32c0b2f.a081bcdde22f85278903af76f9cc56e9 01-01 00:00:09.543 408 486 I RenderEngine: extensions: GL_EXT_debug_marker GL_ARM_rgba8 GL_ARM_mali_shader_binary GL_OES_depth24 GL_OES_depth_texture GL_OES_depth_texture_cube_map GL_OES_packed_depth_stencil GL_OES_rgb8_rgba8 GL_EXT_read_format_bgra GL_OES_compressed_paletted_texture GL_OES_compressed_ETC1_RGB8_texture GL_OES_standard_derivatives GL_OES_EGL_image GL_OES_EGL_image_external GL_OES_EGL_image_external_essl3 GL_OES_EGL_sync GL_OES_texture_npot GL_OES_vertex_half_float GL_OES_required_internalformat GL_OES_vertex_array_object GL_OES_mapbuffer GL_EXT_texture_format_BGRA8888 GL_EXT_texture_rg GL_EXT_texture_type_2_10_10_10_REV GL_OES_fbo_render_mipmap GL_OES_element_index_uint GL_EXT_shadow_samplers GL_OES_texture_compression_astc GL_KHR_texture_compression_astc_ldr GL_KHR_texture_compression_astc_hdr GL_KHR_texture_compression_astc_sliced_3d GL_EXT_texture_compression_astc_decode_mode GL_EXT_texture_compression_astc_decode_mode_rgb9e5 GL_KHR_debug GL_EXT_occlusion_query_boolean GL_EXT_disjoint_timer_query GL_EXT_blend_minmax GL_EXT_discard_ 01-01 00:00:09.543 408 486 I RenderEngine: GL_MAX_TEXTURE_SIZE = 8192 01-01 00:00:09.543 408 486 I RenderEngine: GL_MAX_VIEWPORT_DIMS = 8192 01-01 00:00:09.573 480 480 I update_engine: [INFO:update_attempter_android.cc(200)] OTAResult::NOT_ATTEMPTED 01-01 00:00:09.581 466 466 I MediaExtractorFactory: plugin directory not present (/system/lib64/extractors) 01-01 00:00:09.581 466 466 I MediaExtractorFactory: plugin directory not present (/system_ext/lib64/extractors) 01-01 00:00:09.615 215 215 I hwservicemanager: getTransport: Cannot find entry android.hardware.graphics.mapper@4.0::IMapper/default in either framework or device VINTF manifest. 01-01 00:00:09.615 396 396 I ComposerResources: failed to get mapper 4.0 service, falling back to mapper 3.0 01-01 00:00:09.615 215 215 I hwservicemanager: getTransport: Cannot find entry android.hardware.graphics.mapper@3.0::IMapper/default in either framework or device VINTF manifest. 01-01 00:00:09.615 396 396 I ComposerResources: failed to get mapper 3.0 service, falling back to mapper 2.0 01-01 00:00:09.620 0 0 I servicemanager: Could not find android.hardware.graphics.composer3.IComposer/default in the VINTF manifest. 01-01 00:00:09.621 480 480 I update_engine: [INFO:update_attempter_android.cc(836)] Clearing update complete marker. 01-01 00:00:09.642 408 408 E HWComposer: Error in fetching HDR conversion capabilities Unsupported 01-01 00:00:09.647 396 396 I hwc-buffer-info-getter: Using Graphics Memory Allocator Module gralloc module: ARM Ltd. 01-01 00:00:09.649 396 396 I hwc-resource-manager: Attaching connector HDMI-A-1 01-01 00:00:09.649 396 396 I hwc-drm-two: Attaching pipeline 'HDMI-A-1' to the display #0 (Primary) 01-01 00:00:09.651 396 396 I hwc-backend: Backend 'generic' for 'HDMI-A-1' and driver 'meson' was successfully set 01-01 00:00:09.666 480 480 I update_engine: [INFO:update_attempter_android.cc(1287)] Scheduling CleanupPreviousUpdateAction. 01-01 00:00:09.705 382 382 I AndroidRuntime: Using default boot image 01-01 00:00:09.705 382 382 I AndroidRuntime: Leaving lock profiling enabled 01-01 00:00:09.706 480 480 I update_engine: [INFO:action_processor.cc(51)] ActionProcessor: starting NoOpAction 01-01 00:00:09.719 468 468 I mediaserver: ServiceManager: 0xf63c0970 01-01 00:00:09.719 382 382 I zygote64: option[0]=-Xzygote 01-01 00:00:09.719 382 382 I zygote64: option[1]=-Xdeny-art-apex-data-files 01-01 00:00:09.719 382 382 I zygote64: option[2]=exit 01-01 00:00:09.719 382 382 I zygote64: option[3]=vfprintf 01-01 00:00:09.719 382 382 I zygote64: option[4]=sensitiveThread 01-01 00:00:09.719 382 382 I zygote64: option[5]=-verbose:gc 01-01 00:00:09.719 382 382 I zygote64: option[6]=-XX:PerfettoHprof=true 01-01 00:00:09.719 382 382 I zygote64: option[7]=-XX:PerfettoJavaHeapStackProf=true 01-01 00:00:09.719 382 382 I zygote64: option[8]=-Xprimaryzygote 01-01 00:00:09.719 382 382 I zygote64: option[9]=-Xms16m 01-01 00:00:09.719 382 382 I zygote64: option[10]=-Xmx512m 01-01 00:00:09.719 382 382 I zygote64: option[11]=-XX:HeapGrowthLimit=192m 01-01 00:00:09.719 382 382 I zygote64: option[12]=-XX:HeapMinFree=512k 01-01 00:00:09.719 382 382 I zygote64: option[13]=-XX:HeapMaxFree=8m 01-01 00:00:09.719 382 382 I zygote64: option[14]=-XX:HeapTargetUtilization=0.75 01-01 00:00:09.719 382 382 I zygote64: option[15]=-Xusejit:true 01-01 00:00:09.719 382 382 I zygote64: option[16]=-Xjitsaveprofilinginfo 01-01 00:00:09.719 382 382 I zygote64: option[17]=-XMadviseWillNeedVdexFileSize:104857600 01-01 00:00:09.719 382 382 I zygote64: option[18]=-XMadviseWillNeedOdexFileSize:104857600 01-01 00:00:09.719 382 382 I zygote64: option[19]=-XMadviseWillNeedArtFileSize:4294967295 01-01 00:00:09.719 382 382 I zygote64: option[20]=-XjdwpOptions:suspend=n,server=y 01-01 00:00:09.719 382 382 I zygote64: option[21]=-XjdwpProvider:default 01-01 00:00:09.719 382 382 I zygote64: option[22]=-Xopaque-jni-ids:swapable 01-01 00:00:09.719 382 382 I zygote64: option[23]=-Xlockprofthreshold:500 01-01 00:00:09.719 382 382 I zygote64: option[24]=-Xcompiler-option 01-01 00:00:09.719 382 382 I zygote64: option[25]=--instruction-set-variant=cortex-a53 01-01 00:00:09.719 382 382 I zygote64: option[26]=-Xcompiler-option 01-01 00:00:09.719 382 382 I zygote64: option[27]=--instruction-set-features=default 01-01 00:00:09.719 382 382 I zygote64: option[28]=-Xcompiler-option 01-01 00:00:09.719 382 382 I zygote64: option[29]=--generate-mini-debug-info 01-01 00:00:09.719 382 382 I zygote64: option[30]=-Ximage-compiler-option 01-01 00:00:09.720 382 382 I zygote64: option[31]=--runtime-arg 01-01 00:00:09.720 382 382 I zygote64: option[32]=-Ximage-compiler-option 01-01 00:00:09.720 382 382 I zygote64: option[33]=-Xms64m 01-01 00:00:09.720 382 382 I zygote64: option[34]=-Ximage-compiler-option 01-01 00:00:09.720 382 382 I zygote64: option[35]=--runtime-arg 01-01 00:00:09.720 382 382 I zygote64: option[36]=-Ximage-compiler-option 01-01 00:00:09.720 382 382 I zygote64: option[37]=-Xmx64m 01-01 00:00:09.720 382 382 I zygote64: option[38]=-Ximage-compiler-option 01-01 00:00:09.720 382 382 I zygote64: option[39]=--dirty-image-objects=/system/etc/dirty-image-objects 01-01 00:00:09.720 382 382 I zygote64: option[40]=-Ximage-compiler-option 01-01 00:00:09.720 382 382 I zygote64: option[41]=--instruction-set-variant=cortex-a53 01-01 00:00:09.720 382 382 I zygote64: option[42]=-Ximage-compiler-option 01-01 00:00:09.720 468 468 W BatteryNotifier: batterystats service unavailable! 01-01 00:00:09.720 382 382 I zygote64: option[43]=--instruction-set-features=default 01-01 00:00:09.720 382 382 I zygote64: option[44]=-Ximage-compiler-option 01-01 00:00:09.720 382 382 I zygote64: option[45]=--generate-mini-debug-info 01-01 00:00:09.720 382 382 I zygote64: option[46]=-Duser.locale=en-US 01-01 00:00:09.720 382 382 I zygote64: option[47]=--cpu-abilist=arm64-v8a 01-01 00:00:09.720 382 382 I zygote64: option[48]=-Xcore-platform-api-policy:just-warn 01-01 00:00:09.720 382 382 I zygote64: option[49]=-Xfingerprint:Android/yukawa/vim3:14/UP1A.231105.003.A1/eng.infine.20240306.114104:userdebug/test-keys 01-01 00:00:09.720 468 468 W BatteryNotifier: batterystats service unavailable! 01-01 00:00:09.728 382 382 W zygote64: ART APEX data files are untrusted. 01-01 00:00:09.728 382 382 I zygote64: Core platform API reporting enabled, enforcing=false 01-01 00:00:09.729 480 480 I update_engine: [INFO:action_processor.cc(116)] ActionProcessor: finished last action NoOpAction with code ErrorCode::kSuccess 01-01 00:00:09.729 382 382 I zygote64: Using CollectorTypeCC GC. 01-01 00:00:09.748 480 480 I update_engine: [INFO:update_attempter_android.cc(583)] Processing Done. 01-01 00:00:09.766 476 476 I mediaswcodec: media swcodec service starting 01-01 00:00:09.767 383 383 D AndroidRuntime: >>>>>> START com.android.internal.os.ZygoteInit uid 0 <<<<<< 01-01 00:00:09.770 476 476 W mediaswcodec: Could not read additional policy file '/vendor/etc/seccomp_policy/mediaswcodec.policy' 01-01 00:00:09.771 476 476 W mediaswcodec: libminijail[476]: failed to get path of fd 5: No such file or directory 01-01 00:00:09.771 476 476 W mediaswcodec: libminijail[476]: allowing syscall: connect 01-01 00:00:09.771 476 476 W mediaswcodec: libminijail[476]: allowing syscall: fcntl 01-01 00:00:09.771 476 476 W mediaswcodec: libminijail[476]: allowing syscall: sendto 01-01 00:00:09.771 476 476 W mediaswcodec: libminijail[476]: allowing syscall: socket 01-01 00:00:09.771 476 476 W mediaswcodec: libminijail[476]: allowing syscall: writev 01-01 00:00:09.772 476 476 W mediaswcodec: libminijail[476]: compile_file: (75): syscall munmap redefined here 01-01 00:00:09.772 476 476 W mediaswcodec: libminijail[476]: compile_file: (39): previous definition here 01-01 00:00:09.774 476 476 W mediaswcodec: libminijail[476]: logging seccomp filter failures 01-01 00:00:09.774 476 476 I CodecServiceRegistrant: Creating software Codec2 service... 01-01 00:00:09.782 476 476 D C2Store : Default ION heapmask = -1 01-01 00:00:09.782 476 476 D C2Store : Default ION flags = 0 01-01 00:00:09.782 476 476 D C2Store : Default ION align = 0 01-01 00:00:09.784 476 476 I HidlServiceManagement: Registered android.hardware.media.c2@1.2::IComponentStore/software 01-01 00:00:09.784 215 215 I hwservicemanager: getTransport: Cannot find entry android.hardware.media.c2@1.0::IComponentStore/default in either framework or device VINTF manifest. 01-01 00:00:09.784 476 476 I CodecServiceRegistrant: Preferred Codec2 store is defaulted to "software". 01-01 00:00:09.784 476 476 I CodecServiceRegistrant: Software Codec2 service created and registered. 01-01 00:00:09.789 480 480 I update_engine: [INFO:update_attempter_android.cc(836)] Clearing update complete marker. 01-01 00:00:09.803 480 480 I update_engine: [INFO:update_attempter_android.cc(731)] Terminating cleanup previous update. 01-01 00:00:09.852 408 408 I HWComposer: Switching to legacy multi-display mode 01-01 00:00:09.853 383 383 I AndroidRuntime: Using default boot image 01-01 00:00:09.853 383 383 I AndroidRuntime: Leaving lock profiling enabled 01-01 00:00:09.856 408 408 E HWComposer: getDisplayConnectionType: getDisplayConnectionType failed for display 0: Unsupported (8) 01-01 00:00:09.856 408 408 I SurfaceFlinger: Connecting display 0 (HAL ID 0) 01-01 00:00:09.858 408 408 W HwcComposer: getPerFrameMetadataKeys failed with 8 01-01 00:00:09.860 215 215 I hwservicemanager: getTransport: Cannot find entry android.hardware.configstore@1.1::ISurfaceFlingerConfigs/default in either framework or device VINTF manifest. 01-01 00:00:09.863 215 215 I hwservicemanager: getTransport: Cannot find entry android.hardware.graphics.mapper@4.0::IMapper/default in either framework or device VINTF manifest. 01-01 00:00:09.863 408 408 I Gralloc4: mapper 4.x is not supported 01-01 00:00:09.863 215 215 I hwservicemanager: getTransport: Cannot find entry android.hardware.graphics.mapper@3.0::IMapper/default in either framework or device VINTF manifest. 01-01 00:00:09.863 408 408 W Gralloc3: mapper 3.x is not supported 01-01 00:00:09.863 383 383 I zygote : option[0]=-Xzygote 01-01 00:00:09.863 383 383 I zygote : option[1]=-Xdeny-art-apex-data-files 01-01 00:00:09.863 383 383 I zygote : option[2]=exit 01-01 00:00:09.863 383 383 I zygote : option[3]=vfprintf 01-01 00:00:09.863 383 383 I zygote : option[4]=sensitiveThread 01-01 00:00:09.863 383 383 I zygote : option[5]=-verbose:gc 01-01 00:00:09.863 383 383 I zygote : option[6]=-XX:PerfettoHprof=true 01-01 00:00:09.863 383 383 I zygote : option[7]=-XX:PerfettoJavaHeapStackProf=true 01-01 00:00:09.869 0 0 I servicemanager: Could not find android.hardware.graphics.allocator.IAllocator/default in the VINTF manifest. 01-01 00:00:09.863 383 383 I zygote : option[8]=-Xms16m 01-01 00:00:09.863 383 383 I zygote : option[9]=-Xmx512m 01-01 00:00:09.863 383 383 I zygote : option[10]=-XX:HeapGrowthLimit=192m 01-01 00:00:09.863 383 383 I zygote : option[11]=-XX:HeapMinFree=512k 01-01 00:00:09.863 383 383 I zygote : option[12]=-XX:HeapMaxFree=8m 01-01 00:00:09.863 383 383 I zygote : option[13]=-XX:HeapTargetUtilization=0.75 01-01 00:00:09.863 383 383 I zygote : option[14]=-Xusejit:true 01-01 00:00:09.863 383 383 I zygote : option[15]=-Xjitsaveprofilinginfo 01-01 00:00:09.863 383 383 I zygote : option[16]=-XMadviseWillNeedVdexFileSize:104857600 01-01 00:00:09.863 383 383 I zygote : option[17]=-XMadviseWillNeedOdexFileSize:104857600 01-01 00:00:09.864 383 383 I zygote : option[18]=-XMadviseWillNeedArtFileSize:4294967295 01-01 00:00:09.864 383 383 I zygote : option[19]=-XjdwpOptions:suspend=n,server=y 01-01 00:00:09.864 383 383 I zygote : option[20]=-XjdwpProvider:default 01-01 00:00:09.864 383 383 I zygote : option[21]=-Xopaque-jni-ids:swapable 01-01 00:00:09.864 383 383 I zygote : option[22]=-Xlockprofthreshold:500 01-01 00:00:09.864 383 383 I zygote : option[23]=-Xcompiler-option 01-01 00:00:09.864 383 383 I zygote : option[24]=--instruction-set-variant=cortex-a53 01-01 00:00:09.864 383 383 I zygote : option[25]=-Xcompiler-option 01-01 00:00:09.864 383 383 I zygote : option[26]=--instruction-set-features=default 01-01 00:00:09.864 383 383 I zygote : option[27]=-Xcompiler-option 01-01 00:00:09.864 383 383 I zygote : option[28]=--generate-mini-debug-info 01-01 00:00:09.864 383 383 I zygote : option[29]=-Ximage-compiler-option 01-01 00:00:09.864 383 383 I zygote : option[30]=--runtime-arg 01-01 00:00:09.864 383 383 I zygote : option[31]=-Ximage-compiler-option 01-01 00:00:09.864 383 383 I zygote : option[32]=-Xms64m 01-01 00:00:09.864 383 383 I zygote : option[33]=-Ximage-compiler-option 01-01 00:00:09.864 383 383 I zygote : option[34]=--runtime-arg 01-01 00:00:09.864 383 383 I zygote : option[35]=-Ximage-compiler-option 01-01 00:00:09.864 383 383 I zygote : option[36]=-Xmx64m 01-01 00:00:09.864 383 383 I zygote : option[37]=-Ximage-compiler-option 01-01 00:00:09.864 383 383 I zygote : option[38]=--dirty-image-objects=/system/etc/dirty-image-objects 01-01 00:00:09.864 383 383 I zygote : option[39]=-Ximage-compiler-option 01-01 00:00:09.864 383 383 I zygote : option[40]=--instruction-set-variant=cortex-a53 01-01 00:00:09.864 383 383 I zygote : option[41]=-Ximage-compiler-option 01-01 00:00:09.864 383 383 I zygote : option[42]=--instruction-set-features=default 01-01 00:00:09.864 383 383 I zygote : option[43]=-Ximage-compiler-option 01-01 00:00:09.864 383 383 I zygote : option[44]=--generate-mini-debug-info 01-01 00:00:09.864 383 383 I zygote : option[45]=-Duser.locale=en-US 01-01 00:00:09.864 383 383 I zygote : option[46]=--cpu-abilist=armeabi-v7a,armeabi 01-01 00:00:09.864 383 383 I zygote : option[47]=-Xcore-platform-api-policy:just-warn 01-01 00:00:09.864 383 383 I zygote : option[48]=-Xfingerprint:Android/yukawa/vim3:14/UP1A.231105.003.A1/eng.infine.20240306.114104:userdebug/test-keys 01-01 00:00:09.876 383 383 W zygote : ART APEX data files are untrusted. 01-01 00:00:09.876 383 383 W zygote : Could not reserve sentinel fault page 01-01 00:00:09.880 383 383 I zygote : Core platform API reporting enabled, enforcing=false 01-01 00:00:09.884 246 246 I android.hardware.security.keymint-service.strongbox-thales: Failed to send data, try to initialize connection SE connection 01-01 00:00:09.884 383 383 I zygote : Using CollectorTypeCC GC. 01-01 00:00:09.884 246 246 E android.hardware.security.keymint-service.strongbox-thales: Failed to start omapiSeService null 01-01 00:00:09.884 246 246 E android.hardware.security.keymint-service.strongbox-thales: Failed to send data, initialization not completed 01-01 00:00:09.884 246 246 E javacard.keymint.device.strongbox-impl: Error in sending data in sendData. -85 01-01 00:00:09.884 246 246 E javacard.strongbox.keymint.operation-impl: Error in initializing javacard. 01-01 00:00:09.885 241 253 W keystore2: system/security/keystore2/src/shared_secret_negotiation.rs:252 - ParameterRetrieval { e: Binder(SERVICE_SPECIFIC, -85), p: Aidl("strongbox") } 01-01 00:00:09.885 241 253 W keystore2: system/security/keystore2/src/shared_secret_negotiation.rs:253 - Retrying in one second. 01-01 00:00:09.891 453 491 D RILC : dlopen /vendor/lib64/hw/radio.quectel.module.so failed: dlopen failed: library "/vendor/lib64/hw/radio.quectel.module.so" not found 01-01 00:00:09.891 453 491 D RILC : start the service through api... 01-01 00:00:09.891 453 491 D RILC : ql_radio_config_init start 01-01 00:00:09.891 453 491 E RadioConfigFactory: '/vendor/manifest.xml' not exist. 01-01 00:00:09.891 453 491 D RadioConfigImpl: RadioConfigImpl() 01-01 00:00:09.891 453 491 D RadioConfigImpl_1_2: RadioConfigImpl_1_2:registerAsService(default) 01-01 00:00:09.892 453 491 I HidlServiceManagement: Registered android.hardware.radio.config@1.1::IRadioConfig/default 01-01 00:00:09.892 453 491 D RadioConfigFactory: radio_config_register_service status=0 01-01 00:00:09.892 453 491 D RILC : ql_radio_config_init finish 01-01 00:00:09.892 453 491 D RILC : ql_radio_sap_init start 01-01 00:00:09.892 453 491 D RIL_SAP_1_2: ql_radio_sap_init() start. 01-01 00:00:09.893 215 215 I hw-BpHwBinder: onLastStrongRef automatically unlinking death recipients 01-01 00:00:09.893 453 491 I HidlServiceManagement: Registered android.hardware.radio@1.2::ISap/slot1 01-01 00:00:09.893 453 491 D RIL_SAP_1_2: radio_sap_register_service status=0 01-01 00:00:09.893 453 491 D RILC : ql_radio_sap_init finish 01-01 00:00:09.895 404 404 I radiocompat: Found 1 slot(s) 01-01 00:00:09.901 0 0 I servicemanager: Found android.hardware.radio.config.IRadioConfig/default in device VINTF manifest. 01-01 00:00:09.898 404 404 I radiocompat: android.hardware.radio.data.IRadioData/slot1 is not declared in VINTF (this may be intentional) 01-01 00:00:09.899 404 404 I radiocompat: android.hardware.radio.messaging.IRadioMessaging/slot1 is not declared in VINTF (this may be intentional) 01-01 00:00:09.905 0 0 I servicemanager: Could not find android.hardware.radio.data.IRadioData/slot1 in the VINTF manifest. 01-01 00:00:09.906 0 0 I servicemanager: Could not find android.hardware.radio.messaging.IRadioMessaging/slot1 in the VINTF manifest. 01-01 00:00:09.900 404 404 I radiocompat: android.hardware.radio.modem.IRadioModem/slot1 is not declared in VINTF (this may be intentional) 01-01 00:00:09.900 404 404 I radiocompat: android.hardware.radio.network.IRadioNetwork/slot1 is not declared in VINTF (this may be intentional) 01-01 00:00:09.900 404 404 I radiocompat: android.hardware.radio.sim.IRadioSim/slot1 is not declared in VINTF (this may be intentional) 01-01 00:00:09.901 404 404 I radiocompat: android.hardware.radio.voice.IRadioVoice/slot1 is not declared in VINTF (this may be intentional) 01-01 00:00:09.901 404 404 I hw-BpHwBinder: onLastStrongRef automatically unlinking death recipients 01-01 00:00:09.901 404 404 D radiocompat: Radio HAL compat service is operational 01-01 00:00:09.907 0 0 I servicemanager: Could not find android.hardware.radio.modem.IRadioModem/slot1 in the VINTF manifest. 01-01 00:00:09.907 0 0 I servicemanager: Could not find android.hardware.radio.network.IRadioNetwork/slot1 in the VINTF manifest. 01-01 00:00:09.907 0 0 I servicemanager: Could not find android.hardware.radio.sim.IRadioSim/slot1 in the VINTF manifest. 01-01 00:00:09.908 0 0 I servicemanager: Could not find android.hardware.radio.voice.IRadioVoice/slot1 in the VINTF manifest. 01-01 00:00:09.911 493 493 I adbd : UsbFfs: already offline 01-01 00:00:09.911 493 493 I adbd : authentication not required 01-01 00:00:09.936 395 395 I [Gralloc]: Using DMA-BUF Heaps. 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:29): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:aac_drc_prop:s0" dev="tmpfs" ino=40 scontext=u:r:shell:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:29): avc: denied { open } for path="/dev/__properties__/u:object_r:aac_drc_prop:s0" dev="tmpfs" ino=40 scontext=u:r:shell:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:30): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:aac_drc_prop:s0" dev="tmpfs" ino=40 scontext=u:r:shell:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:30): avc: denied { getattr } for path="/dev/__properties__/u:object_r:aac_drc_prop:s0" dev="tmpfs" ino=40 scontext=u:r:shell:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:31): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:aac_drc_prop:s0" dev="tmpfs" ino=40 scontext=u:r:shell:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:31): avc: denied { map } for path="/dev/__properties__/u:object_r:aac_drc_prop:s0" dev="tmpfs" ino=40 scontext=u:r:shell:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:32): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ab_update_gki_prop:s0" dev="tmpfs" ino=42 scontext=u:r:shell:s0 tcontext=u:object_r:ab_update_gki_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:32): avc: denied { open } for path="/dev/__properties__/u:object_r:ab_update_gki_prop:s0" dev="tmpfs" ino=42 scontext=u:r:shell:s0 tcontext=u:object_r:ab_update_gki_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:33): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ab_update_gki_prop:s0" dev="tmpfs" ino=42 scontext=u:r:shell:s0 tcontext=u:object_r:ab_update_gki_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:33): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ab_update_gki_prop:s0" dev="tmpfs" ino=42 scontext=u:r:shell:s0 tcontext=u:object_r:ab_update_gki_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:34): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ab_update_gki_prop:s0" dev="tmpfs" ino=42 scontext=u:r:shell:s0 tcontext=u:object_r:ab_update_gki_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:34): avc: denied { map } for path="/dev/__properties__/u:object_r:ab_update_gki_prop:s0" dev="tmpfs" ino=42 scontext=u:r:shell:s0 tcontext=u:object_r:ab_update_gki_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:35): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:adaptive_haptics_prop:s0" dev="tmpfs" ino=43 scontext=u:r:shell:s0 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:35): avc: denied { open } for path="/dev/__properties__/u:object_r:adaptive_haptics_prop:s0" dev="tmpfs" ino=43 scontext=u:r:shell:s0 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:36): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:adaptive_haptics_prop:s0" dev="tmpfs" ino=43 scontext=u:r:shell:s0 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:36): avc: denied { getattr } for path="/dev/__properties__/u:object_r:adaptive_haptics_prop:s0" dev="tmpfs" ino=43 scontext=u:r:shell:s0 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:37): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:adaptive_haptics_prop:s0" dev="tmpfs" ino=43 scontext=u:r:shell:s0 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:37): avc: denied { map } for path="/dev/__properties__/u:object_r:adaptive_haptics_prop:s0" dev="tmpfs" ino=43 scontext=u:r:shell:s0 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:38): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:adbd_prop:s0" dev="tmpfs" ino=45 scontext=u:r:shell:s0 tcontext=u:object_r:adbd_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:38): avc: denied { open } for path="/dev/__properties__/u:object_r:adbd_prop:s0" dev="tmpfs" ino=45 scontext=u:r:shell:s0 tcontext=u:object_r:adbd_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:39): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:adbd_prop:s0" dev="tmpfs" ino=45 scontext=u:r:shell:s0 tcontext=u:object_r:adbd_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:39): avc: denied { getattr } for path="/dev/__properties__/u:object_r:adbd_prop:s0" dev="tmpfs" ino=45 scontext=u:r:shell:s0 tcontext=u:object_r:adbd_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:40): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:adbd_prop:s0" dev="tmpfs" ino=45 scontext=u:r:shell:s0 tcontext=u:object_r:adbd_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:40): avc: denied { map } for path="/dev/__properties__/u:object_r:adbd_prop:s0" dev="tmpfs" ino=45 scontext=u:r:shell:s0 tcontext=u:object_r:adbd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 408 408 I Scheduler: Display 0 is the pacesetter 01-01 00:00:09.952 408 552 W EventThread: Ignoring VSYNC request while display is disconnected 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:41): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:apexd_config_prop:s0" dev="tmpfs" ino=47 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:41): avc: denied { open } for path="/dev/__properties__/u:object_r:apexd_config_prop:s0" dev="tmpfs" ino=47 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:42): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:apexd_config_prop:s0" dev="tmpfs" ino=47 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:42): avc: denied { getattr } for path="/dev/__properties__/u:object_r:apexd_config_prop:s0" dev="tmpfs" ino=47 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:43): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:apexd_config_prop:s0" dev="tmpfs" ino=47 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:43): avc: denied { map } for path="/dev/__properties__/u:object_r:apexd_config_prop:s0" dev="tmpfs" ino=47 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:44): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:apexd_payload_metadata_prop:s0" dev="tmpfs" ino=48 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_payload_metadata_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:44): avc: denied { open } for path="/dev/__properties__/u:object_r:apexd_payload_metadata_prop:s0" dev="tmpfs" ino=48 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_payload_metadata_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:45): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:apexd_payload_metadata_prop:s0" dev="tmpfs" ino=48 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_payload_metadata_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:45): avc: denied { getattr } for path="/dev/__properties__/u:object_r:apexd_payload_metadata_prop:s0" dev="tmpfs" ino=48 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_payload_metadata_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:46): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:apexd_payload_metadata_prop:s0" dev="tmpfs" ino=48 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_payload_metadata_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:46): avc: denied { map } for path="/dev/__properties__/u:object_r:apexd_payload_metadata_prop:s0" dev="tmpfs" ino=48 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_payload_metadata_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:47): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:apexd_prop:s0" dev="tmpfs" ino=49 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:47): avc: denied { open } for path="/dev/__properties__/u:object_r:apexd_prop:s0" dev="tmpfs" ino=49 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:48): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:apexd_prop:s0" dev="tmpfs" ino=49 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:48): avc: denied { getattr } for path="/dev/__properties__/u:object_r:apexd_prop:s0" dev="tmpfs" ino=49 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:49): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:apexd_prop:s0" dev="tmpfs" ino=49 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:49): avc: denied { map } for path="/dev/__properties__/u:object_r:apexd_prop:s0" dev="tmpfs" ino=49 scontext=u:r:shell:s0 tcontext=u:object_r:apexd_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:50): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:apk_verity_prop:s0" dev="tmpfs" ino=51 scontext=u:r:shell:s0 tcontext=u:object_r:apk_verity_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:50): avc: denied { open } for path="/dev/__properties__/u:object_r:apk_verity_prop:s0" dev="tmpfs" ino=51 scontext=u:r:shell:s0 tcontext=u:object_r:apk_verity_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:51): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:apk_verity_prop:s0" dev="tmpfs" ino=51 scontext=u:r:shell:s0 tcontext=u:object_r:apk_verity_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:51): avc: denied { getattr } for path="/dev/__properties__/u:object_r:apk_verity_prop:s0" dev="tmpfs" ino=51 scontext=u:r:shell:s0 tcontext=u:object_r:apk_verity_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:52): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:apk_verity_prop:s0" dev="tmpfs" ino=51 scontext=u:r:shell:s0 tcontext=u:object_r:apk_verity_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:52): avc: denied { map } for path="/dev/__properties__/u:object_r:apk_verity_prop:s0" dev="tmpfs" ino=51 scontext=u:r:shell:s0 tcontext=u:object_r:apk_verity_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:53): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:audio_config_prop:s0" dev="tmpfs" ino=53 scontext=u:r:shell:s0 tcontext=u:object_r:audio_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:53): avc: denied { open } for path="/dev/__properties__/u:object_r:audio_config_prop:s0" dev="tmpfs" ino=53 scontext=u:r:shell:s0 tcontext=u:object_r:audio_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:54): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:audio_config_prop:s0" dev="tmpfs" ino=53 scontext=u:r:shell:s0 tcontext=u:object_r:audio_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:54): avc: denied { getattr } for path="/dev/__properties__/u:object_r:audio_config_prop:s0" dev="tmpfs" ino=53 scontext=u:r:shell:s0 tcontext=u:object_r:audio_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:55): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:audio_config_prop:s0" dev="tmpfs" ino=53 scontext=u:r:shell:s0 tcontext=u:object_r:audio_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:55): avc: denied { map } for path="/dev/__properties__/u:object_r:audio_config_prop:s0" dev="tmpfs" ino=53 scontext=u:r:shell:s0 tcontext=u:object_r:audio_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:56): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:bluetooth_a2dp_offload_prop:s0" dev="tmpfs" ino=58 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_a2dp_offload_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:56): avc: denied { open } for path="/dev/__properties__/u:object_r:bluetooth_a2dp_offload_prop:s0" dev="tmpfs" ino=58 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_a2dp_offload_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:57): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:bluetooth_a2dp_offload_prop:s0" dev="tmpfs" ino=58 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_a2dp_offload_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:57): avc: denied { getattr } for path="/dev/__properties__/u:object_r:bluetooth_a2dp_offload_prop:s0" dev="tmpfs" ino=58 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_a2dp_offload_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:58): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:bluetooth_a2dp_offload_prop:s0" dev="tmpfs" ino=58 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_a2dp_offload_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:58): avc: denied { map } for path="/dev/__properties__/u:object_r:bluetooth_a2dp_offload_prop:s0" dev="tmpfs" ino=58 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_a2dp_offload_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:59): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:bluetooth_audio_hal_prop:s0" dev="tmpfs" ino=59 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_audio_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:59): avc: denied { open } for path="/dev/__properties__/u:object_r:bluetooth_audio_hal_prop:s0" dev="tmpfs" ino=59 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_audio_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:60): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:bluetooth_audio_hal_prop:s0" dev="tmpfs" ino=59 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_audio_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:60): avc: denied { getattr } for path="/dev/__properties__/u:object_r:bluetooth_audio_hal_prop:s0" dev="tmpfs" ino=59 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_audio_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:61): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:bluetooth_audio_hal_prop:s0" dev="tmpfs" ino=59 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_audio_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:61): avc: denied { map } for path="/dev/__properties__/u:object_r:bluetooth_audio_hal_prop:s0" dev="tmpfs" ino=59 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_audio_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:62): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=61 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:62): avc: denied { open } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=61 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:63): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=61 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:63): avc: denied { getattr } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=61 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:64): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=61 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:64): avc: denied { map } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=61 scontext=u:r:shell:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:65): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:bootanim_config_prop:s0" dev="tmpfs" ino=63 scontext=u:r:shell:s0 tcontext=u:object_r:bootanim_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:65): avc: denied { open } for path="/dev/__properties__/u:object_r:bootanim_config_prop:s0" dev="tmpfs" ino=63 scontext=u:r:shell:s0 tcontext=u:object_r:bootanim_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:66): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:bootanim_config_prop:s0" dev="tmpfs" ino=63 scontext=u:r:shell:s0 tcontext=u:object_r:bootanim_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:66): avc: denied { getattr } for path="/dev/__properties__/u:object_r:bootanim_config_prop:s0" dev="tmpfs" ino=63 scontext=u:r:shell:s0 tcontext=u:object_r:bootanim_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:67): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:bootanim_config_prop:s0" dev="tmpfs" ino=63 scontext=u:r:shell:s0 tcontext=u:object_r:bootanim_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:67): avc: denied { map } for path="/dev/__properties__/u:object_r:bootanim_config_prop:s0" dev="tmpfs" ino=63 scontext=u:r:shell:s0 tcontext=u:object_r:bootanim_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:68): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:bootanim_system_prop:s0" dev="tmpfs" ino=64 scontext=u:r:shell:s0 tcontext=u:object_r:bootanim_system_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:68): avc: denied { open } for path="/dev/__properties__/u:object_r:bootanim_system_prop:s0" dev="tmpfs" ino=64 scontext=u:r:shell:s0 tcontext=u:object_r:bootanim_system_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:69): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:bootanim_system_prop:s0" dev="tmpfs" ino=64 scontext=u:r:shell:s0 tcontext=u:object_r:bootanim_system_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:69): avc: denied { getattr } for path="/dev/__properties__/u:object_r:bootanim_system_prop:s0" dev="tmpfs" ino=64 scontext=u:r:shell:s0 tcontext=u:object_r:bootanim_system_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:70): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:bootanim_system_prop:s0" dev="tmpfs" ino=64 scontext=u:r:shell:s0 tcontext=u:object_r:bootanim_system_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:70): avc: denied { map } for path="/dev/__properties__/u:object_r:bootanim_system_prop:s0" dev="tmpfs" ino=64 scontext=u:r:shell:s0 tcontext=u:object_r:bootanim_system_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:71): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=67 scontext=u:r:shell:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:71): avc: denied { open } for path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=67 scontext=u:r:shell:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:72): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=67 scontext=u:r:shell:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:72): avc: denied { getattr } for path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=67 scontext=u:r:shell:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:73): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=67 scontext=u:r:shell:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:73): avc: denied { map } for path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=67 scontext=u:r:shell:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:74): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:boottime_public_prop:s0" dev="tmpfs" ino=68 scontext=u:r:shell:s0 tcontext=u:object_r:boottime_public_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:74): avc: denied { open } for path="/dev/__properties__/u:object_r:boottime_public_prop:s0" dev="tmpfs" ino=68 scontext=u:r:shell:s0 tcontext=u:object_r:boottime_public_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:75): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:boottime_public_prop:s0" dev="tmpfs" ino=68 scontext=u:r:shell:s0 tcontext=u:object_r:boottime_public_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:75): avc: denied { getattr } for path="/dev/__properties__/u:object_r:boottime_public_prop:s0" dev="tmpfs" ino=68 scontext=u:r:shell:s0 tcontext=u:object_r:boottime_public_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:76): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:boottime_public_prop:s0" dev="tmpfs" ino=68 scontext=u:r:shell:s0 tcontext=u:object_r:boottime_public_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:76): avc: denied { map } for path="/dev/__properties__/u:object_r:boottime_public_prop:s0" dev="tmpfs" ino=68 scontext=u:r:shell:s0 tcontext=u:object_r:boottime_public_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:77): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=69 scontext=u:r:shell:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:77): avc: denied { open } for path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=69 scontext=u:r:shell:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:78): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=69 scontext=u:r:shell:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:78): avc: denied { getattr } for path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=69 scontext=u:r:shell:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:79): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=69 scontext=u:r:shell:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:79): avc: denied { map } for path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=69 scontext=u:r:shell:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:80): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:build_attestation_prop:s0" dev="tmpfs" ino=71 scontext=u:r:shell:s0 tcontext=u:object_r:build_attestation_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:80): avc: denied { open } for path="/dev/__properties__/u:object_r:build_attestation_prop:s0" dev="tmpfs" ino=71 scontext=u:r:shell:s0 tcontext=u:object_r:build_attestation_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:81): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:build_attestation_prop:s0" dev="tmpfs" ino=71 scontext=u:r:shell:s0 tcontext=u:object_r:build_attestation_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:81): avc: denied { getattr } for path="/dev/__properties__/u:object_r:build_attestation_prop:s0" dev="tmpfs" ino=71 scontext=u:r:shell:s0 tcontext=u:object_r:build_attestation_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:82): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:build_attestation_prop:s0" dev="tmpfs" ino=71 scontext=u:r:shell:s0 tcontext=u:object_r:build_attestation_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:82): avc: denied { map } for path="/dev/__properties__/u:object_r:build_attestation_prop:s0" dev="tmpfs" ino=71 scontext=u:r:shell:s0 tcontext=u:object_r:build_attestation_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:83): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:build_config_prop:s0" dev="tmpfs" ino=73 scontext=u:r:shell:s0 tcontext=u:object_r:build_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:83): avc: denied { open } for path="/dev/__properties__/u:object_r:build_config_prop:s0" dev="tmpfs" ino=73 scontext=u:r:shell:s0 tcontext=u:object_r:build_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:84): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:build_config_prop:s0" dev="tmpfs" ino=73 scontext=u:r:shell:s0 tcontext=u:object_r:build_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:84): avc: denied { getattr } for path="/dev/__properties__/u:object_r:build_config_prop:s0" dev="tmpfs" ino=73 scontext=u:r:shell:s0 tcontext=u:object_r:build_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I auditd : type=1400 audit(0.0:85): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:build_config_prop:s0" dev="tmpfs" ino=73 scontext=u:r:shell:s0 tcontext=u:object_r:build_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.948 549 549 I getprop : type=1400 audit(0.0:85): avc: denied { map } for path="/dev/__properties__/u:object_r:build_config_prop:s0" dev="tmpfs" ino=73 scontext=u:r:shell:s0 tcontext=u:object_r:build_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:86): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:charger_config_prop:s0" dev="tmpfs" ino=81 scontext=u:r:shell:s0 tcontext=u:object_r:charger_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:86): avc: denied { open } for path="/dev/__properties__/u:object_r:charger_config_prop:s0" dev="tmpfs" ino=81 scontext=u:r:shell:s0 tcontext=u:object_r:charger_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:87): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:charger_config_prop:s0" dev="tmpfs" ino=81 scontext=u:r:shell:s0 tcontext=u:object_r:charger_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:87): avc: denied { getattr } for path="/dev/__properties__/u:object_r:charger_config_prop:s0" dev="tmpfs" ino=81 scontext=u:r:shell:s0 tcontext=u:object_r:charger_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:88): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:charger_config_prop:s0" dev="tmpfs" ino=81 scontext=u:r:shell:s0 tcontext=u:object_r:charger_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:88): avc: denied { map } for path="/dev/__properties__/u:object_r:charger_config_prop:s0" dev="tmpfs" ino=81 scontext=u:r:shell:s0 tcontext=u:object_r:charger_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:89): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:charger_prop:s0" dev="tmpfs" ino=82 scontext=u:r:shell:s0 tcontext=u:object_r:charger_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:89): avc: denied { open } for path="/dev/__properties__/u:object_r:charger_prop:s0" dev="tmpfs" ino=82 scontext=u:r:shell:s0 tcontext=u:object_r:charger_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:90): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:charger_prop:s0" dev="tmpfs" ino=82 scontext=u:r:shell:s0 tcontext=u:object_r:charger_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:90): avc: denied { getattr } for path="/dev/__properties__/u:object_r:charger_prop:s0" dev="tmpfs" ino=82 scontext=u:r:shell:s0 tcontext=u:object_r:charger_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:91): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:charger_prop:s0" dev="tmpfs" ino=82 scontext=u:r:shell:s0 tcontext=u:object_r:charger_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:91): avc: denied { map } for path="/dev/__properties__/u:object_r:charger_prop:s0" dev="tmpfs" ino=82 scontext=u:r:shell:s0 tcontext=u:object_r:charger_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:92): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:charger_status_prop:s0" dev="tmpfs" ino=83 scontext=u:r:shell:s0 tcontext=u:object_r:charger_status_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:92): avc: denied { open } for path="/dev/__properties__/u:object_r:charger_status_prop:s0" dev="tmpfs" ino=83 scontext=u:r:shell:s0 tcontext=u:object_r:charger_status_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:93): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:charger_status_prop:s0" dev="tmpfs" ino=83 scontext=u:r:shell:s0 tcontext=u:object_r:charger_status_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:93): avc: denied { getattr } for path="/dev/__properties__/u:object_r:charger_status_prop:s0" dev="tmpfs" ino=83 scontext=u:r:shell:s0 tcontext=u:object_r:charger_status_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:94): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:charger_status_prop:s0" dev="tmpfs" ino=83 scontext=u:r:shell:s0 tcontext=u:object_r:charger_status_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:94): avc: denied { map } for path="/dev/__properties__/u:object_r:charger_status_prop:s0" dev="tmpfs" ino=83 scontext=u:r:shell:s0 tcontext=u:object_r:charger_status_prop:s0 tclass=file permissive=1 01-01 00:00:09.967 0 0 W audit_log_start: 1 callbacks suppressed 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:95): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:cold_boot_done_prop:s0" dev="tmpfs" ino=85 scontext=u:r:shell:s0 tcontext=u:object_r:cold_boot_done_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:95): avc: denied { open } for path="/dev/__properties__/u:object_r:cold_boot_done_prop:s0" dev="tmpfs" ino=85 scontext=u:r:shell:s0 tcontext=u:object_r:cold_boot_done_prop:s0 tclass=file permissive=1 01-01 00:00:09.967 0 0 W audit : audit_backlog=65 > audit_backlog_limit=64 01-01 00:00:09.967 0 0 W audit : audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 01-01 00:00:09.967 0 0 E audit : backlog limit exceeded 01-01 00:00:09.967 0 0 W audit : audit_backlog=65 > audit_backlog_limit=64 01-01 00:00:09.967 0 0 W audit : audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 01-01 00:00:09.967 0 0 E audit : backlog limit exceeded 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:96): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:cold_boot_done_prop:s0" dev="tmpfs" ino=85 scontext=u:r:shell:s0 tcontext=u:object_r:cold_boot_done_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:96): avc: denied { getattr } for path="/dev/__properties__/u:object_r:cold_boot_done_prop:s0" dev="tmpfs" ino=85 scontext=u:r:shell:s0 tcontext=u:object_r:cold_boot_done_prop:s0 tclass=file permissive=1 01-01 00:00:09.967 0 0 W audit : audit_backlog=65 > audit_backlog_limit=64 01-01 00:00:09.967 0 0 W audit : audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 01-01 00:00:09.967 0 0 E audit : backlog limit exceeded 01-01 00:00:09.967 0 0 W audit : audit_backlog=65 > audit_backlog_limit=64 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:97): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:cold_boot_done_prop:s0" dev="tmpfs" ino=85 scontext=u:r:shell:s0 tcontext=u:object_r:cold_boot_done_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:97): avc: denied { map } for path="/dev/__properties__/u:object_r:cold_boot_done_prop:s0" dev="tmpfs" ino=85 scontext=u:r:shell:s0 tcontext=u:object_r:cold_boot_done_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:98): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:composd_vm_art_prop:s0" dev="tmpfs" ino=86 scontext=u:r:shell:s0 tcontext=u:object_r:composd_vm_art_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:98): avc: denied { open } for path="/dev/__properties__/u:object_r:composd_vm_art_prop:s0" dev="tmpfs" ino=86 scontext=u:r:shell:s0 tcontext=u:object_r:composd_vm_art_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:99): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:composd_vm_art_prop:s0" dev="tmpfs" ino=86 scontext=u:r:shell:s0 tcontext=u:object_r:composd_vm_art_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:99): avc: denied { getattr } for path="/dev/__properties__/u:object_r:composd_vm_art_prop:s0" dev="tmpfs" ino=86 scontext=u:r:shell:s0 tcontext=u:object_r:composd_vm_art_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:100): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:composd_vm_art_prop:s0" dev="tmpfs" ino=86 scontext=u:r:shell:s0 tcontext=u:object_r:composd_vm_art_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:100): avc: denied { map } for path="/dev/__properties__/u:object_r:composd_vm_art_prop:s0" dev="tmpfs" ino=86 scontext=u:r:shell:s0 tcontext=u:object_r:composd_vm_art_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:101): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:composd_vm_vendor_prop:s0" dev="tmpfs" ino=87 scontext=u:r:shell:s0 tcontext=u:object_r:composd_vm_vendor_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:101): avc: denied { open } for path="/dev/__properties__/u:object_r:composd_vm_vendor_prop:s0" dev="tmpfs" ino=87 scontext=u:r:shell:s0 tcontext=u:object_r:composd_vm_vendor_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:102): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:composd_vm_vendor_prop:s0" dev="tmpfs" ino=87 scontext=u:r:shell:s0 tcontext=u:object_r:composd_vm_vendor_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:102): avc: denied { getattr } for path="/dev/__properties__/u:object_r:composd_vm_vendor_prop:s0" dev="tmpfs" ino=87 scontext=u:r:shell:s0 tcontext=u:object_r:composd_vm_vendor_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:103): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:composd_vm_vendor_prop:s0" dev="tmpfs" ino=87 scontext=u:r:shell:s0 tcontext=u:object_r:composd_vm_vendor_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:103): avc: denied { map } for path="/dev/__properties__/u:object_r:composd_vm_vendor_prop:s0" dev="tmpfs" ino=87 scontext=u:r:shell:s0 tcontext=u:object_r:composd_vm_vendor_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:104): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:cpu_variant_prop:s0" dev="tmpfs" ino=90 scontext=u:r:shell:s0 tcontext=u:object_r:cpu_variant_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:104): avc: denied { open } for path="/dev/__properties__/u:object_r:cpu_variant_prop:s0" dev="tmpfs" ino=90 scontext=u:r:shell:s0 tcontext=u:object_r:cpu_variant_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:105): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:cpu_variant_prop:s0" dev="tmpfs" ino=90 scontext=u:r:shell:s0 tcontext=u:object_r:cpu_variant_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:105): avc: denied { getattr } for path="/dev/__properties__/u:object_r:cpu_variant_prop:s0" dev="tmpfs" ino=90 scontext=u:r:shell:s0 tcontext=u:object_r:cpu_variant_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:106): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:cpu_variant_prop:s0" dev="tmpfs" ino=90 scontext=u:r:shell:s0 tcontext=u:object_r:cpu_variant_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:106): avc: denied { map } for path="/dev/__properties__/u:object_r:cpu_variant_prop:s0" dev="tmpfs" ino=90 scontext=u:r:shell:s0 tcontext=u:object_r:cpu_variant_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:107): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_adbd_prop:s0" dev="tmpfs" ino=91 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_adbd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:107): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_adbd_prop:s0" dev="tmpfs" ino=91 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_adbd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:108): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_adbd_prop:s0" dev="tmpfs" ino=91 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_adbd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:108): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_adbd_prop:s0" dev="tmpfs" ino=91 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_adbd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:109): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_adbd_prop:s0" dev="tmpfs" ino=91 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_adbd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:109): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_adbd_prop:s0" dev="tmpfs" ino=91 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_adbd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:110): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_apex_load_prop:s0" dev="tmpfs" ino=92 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_apex_load_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:110): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_apex_load_prop:s0" dev="tmpfs" ino=92 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_apex_load_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:111): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_apex_load_prop:s0" dev="tmpfs" ino=92 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_apex_load_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:111): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_apex_load_prop:s0" dev="tmpfs" ino=92 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_apex_load_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:112): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_apex_load_prop:s0" dev="tmpfs" ino=92 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_apex_load_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:112): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_apex_load_prop:s0" dev="tmpfs" ino=92 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_apex_load_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:113): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_apexd_prop:s0" dev="tmpfs" ino=93 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_apexd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:113): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_apexd_prop:s0" dev="tmpfs" ino=93 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_apexd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:114): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_apexd_prop:s0" dev="tmpfs" ino=93 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_apexd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:114): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_apexd_prop:s0" dev="tmpfs" ino=93 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_apexd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:115): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_apexd_prop:s0" dev="tmpfs" ino=93 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_apexd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:115): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_apexd_prop:s0" dev="tmpfs" ino=93 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_apexd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:116): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=94 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:116): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=94 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:117): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=94 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:117): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=94 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:118): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=94 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:118): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=94 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:119): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_console_prop:s0" dev="tmpfs" ino=96 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_console_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:119): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_console_prop:s0" dev="tmpfs" ino=96 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_console_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:120): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_console_prop:s0" dev="tmpfs" ino=96 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_console_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:120): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_console_prop:s0" dev="tmpfs" ino=96 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_console_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:121): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_console_prop:s0" dev="tmpfs" ino=96 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_console_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:121): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_console_prop:s0" dev="tmpfs" ino=96 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_console_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:122): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_default_prop:s0" dev="tmpfs" ino=97 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_default_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:122): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_default_prop:s0" dev="tmpfs" ino=97 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_default_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:123): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_default_prop:s0" dev="tmpfs" ino=97 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_default_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:123): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_default_prop:s0" dev="tmpfs" ino=97 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_default_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:124): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_default_prop:s0" dev="tmpfs" ino=97 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_default_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:124): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_default_prop:s0" dev="tmpfs" ino=97 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_default_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:125): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_fuse_prop:s0" dev="tmpfs" ino=99 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_fuse_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:125): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_fuse_prop:s0" dev="tmpfs" ino=99 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_fuse_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:126): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_fuse_prop:s0" dev="tmpfs" ino=99 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_fuse_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:126): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_fuse_prop:s0" dev="tmpfs" ino=99 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_fuse_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:127): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_fuse_prop:s0" dev="tmpfs" ino=99 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_fuse_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:127): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_fuse_prop:s0" dev="tmpfs" ino=99 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_fuse_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:128): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_interface_restart_prop:s0" dev="tmpfs" ino=101 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_restart_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:128): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_interface_restart_prop:s0" dev="tmpfs" ino=101 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_restart_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:129): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_interface_restart_prop:s0" dev="tmpfs" ino=101 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_restart_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:129): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_interface_restart_prop:s0" dev="tmpfs" ino=101 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_restart_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:130): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_interface_restart_prop:s0" dev="tmpfs" ino=101 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_restart_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:130): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_interface_restart_prop:s0" dev="tmpfs" ino=101 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_restart_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:131): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_interface_start_prop:s0" dev="tmpfs" ino=102 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:131): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_interface_start_prop:s0" dev="tmpfs" ino=102 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:132): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_interface_start_prop:s0" dev="tmpfs" ino=102 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:132): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_interface_start_prop:s0" dev="tmpfs" ino=102 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:133): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_interface_start_prop:s0" dev="tmpfs" ino=102 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:133): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_interface_start_prop:s0" dev="tmpfs" ino=102 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:134): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_interface_stop_prop:s0" dev="tmpfs" ino=103 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_stop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:134): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_interface_stop_prop:s0" dev="tmpfs" ino=103 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_stop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:135): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_interface_stop_prop:s0" dev="tmpfs" ino=103 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_stop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:135): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_interface_stop_prop:s0" dev="tmpfs" ino=103 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_stop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:136): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_interface_stop_prop:s0" dev="tmpfs" ino=103 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_stop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:136): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_interface_stop_prop:s0" dev="tmpfs" ino=103 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_interface_stop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:137): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=104 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:137): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=104 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:138): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=104 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:138): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=104 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:139): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=104 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:139): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=104 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:140): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_mediatranscoding_prop:s0" dev="tmpfs" ino=105 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_mediatranscoding_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:140): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_mediatranscoding_prop:s0" dev="tmpfs" ino=105 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_mediatranscoding_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:141): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_mediatranscoding_prop:s0" dev="tmpfs" ino=105 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_mediatranscoding_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:141): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_mediatranscoding_prop:s0" dev="tmpfs" ino=105 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_mediatranscoding_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:142): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_mediatranscoding_prop:s0" dev="tmpfs" ino=105 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_mediatranscoding_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:142): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_mediatranscoding_prop:s0" dev="tmpfs" ino=105 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_mediatranscoding_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:143): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_odsign_prop:s0" dev="tmpfs" ino=106 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_odsign_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:143): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_odsign_prop:s0" dev="tmpfs" ino=106 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_odsign_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:144): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_odsign_prop:s0" dev="tmpfs" ino=106 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_odsign_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:144): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_odsign_prop:s0" dev="tmpfs" ino=106 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_odsign_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:145): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_odsign_prop:s0" dev="tmpfs" ino=106 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_odsign_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:145): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_odsign_prop:s0" dev="tmpfs" ino=106 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_odsign_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:146): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=107 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:146): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=107 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:147): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=107 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:147): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=107 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:148): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=107 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:148): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=107 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:149): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=108 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:149): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=108 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:150): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=108 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:150): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=108 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:151): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=108 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:151): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=108 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:152): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=109 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:152): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=109 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:153): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=109 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:153): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=109 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:154): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=109 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:154): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=109 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:155): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_start_prop:s0" dev="tmpfs" ino=111 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:155): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_start_prop:s0" dev="tmpfs" ino=111 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:156): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_start_prop:s0" dev="tmpfs" ino=111 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:156): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_start_prop:s0" dev="tmpfs" ino=111 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:157): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_start_prop:s0" dev="tmpfs" ino=111 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:157): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_start_prop:s0" dev="tmpfs" ino=111 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:158): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=112 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:158): avc: denied { open } for path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=112 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:159): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=112 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:159): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=112 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:160): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=112 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:160): avc: denied { map } for path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=112 scontext=u:r:shell:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:161): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:debugfs_restriction_prop:s0" dev="tmpfs" ino=119 scontext=u:r:shell:s0 tcontext=u:object_r:debugfs_restriction_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:161): avc: denied { open } for path="/dev/__properties__/u:object_r:debugfs_restriction_prop:s0" dev="tmpfs" ino=119 scontext=u:r:shell:s0 tcontext=u:object_r:debugfs_restriction_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:162): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:debugfs_restriction_prop:s0" dev="tmpfs" ino=119 scontext=u:r:shell:s0 tcontext=u:object_r:debugfs_restriction_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:162): avc: denied { getattr } for path="/dev/__properties__/u:object_r:debugfs_restriction_prop:s0" dev="tmpfs" ino=119 scontext=u:r:shell:s0 tcontext=u:object_r:debugfs_restriction_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:163): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:debugfs_restriction_prop:s0" dev="tmpfs" ino=119 scontext=u:r:shell:s0 tcontext=u:object_r:debugfs_restriction_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:163): avc: denied { map } for path="/dev/__properties__/u:object_r:debugfs_restriction_prop:s0" dev="tmpfs" ino=119 scontext=u:r:shell:s0 tcontext=u:object_r:debugfs_restriction_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:164): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=122 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:164): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=122 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:165): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=122 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:165): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=122 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:166): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=122 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:166): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=122 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:167): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=123 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:167): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=123 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:168): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=123 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:168): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=123 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:169): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=123 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:169): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=123 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:170): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_camera_native_prop:s0" dev="tmpfs" ino=124 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_camera_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:170): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_camera_native_prop:s0" dev="tmpfs" ino=124 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_camera_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:171): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_camera_native_prop:s0" dev="tmpfs" ino=124 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_camera_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:171): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_camera_native_prop:s0" dev="tmpfs" ino=124 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_camera_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:172): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_camera_native_prop:s0" dev="tmpfs" ino=124 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_camera_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:172): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_camera_native_prop:s0" dev="tmpfs" ino=124 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_camera_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:173): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_configuration_prop:s0" dev="tmpfs" ino=125 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_configuration_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:173): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_configuration_prop:s0" dev="tmpfs" ino=125 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_configuration_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:174): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_configuration_prop:s0" dev="tmpfs" ino=125 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_configuration_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:174): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_configuration_prop:s0" dev="tmpfs" ino=125 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_configuration_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:175): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_configuration_prop:s0" dev="tmpfs" ino=125 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_configuration_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:175): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_configuration_prop:s0" dev="tmpfs" ino=125 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_configuration_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:176): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_connectivity_prop:s0" dev="tmpfs" ino=126 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_connectivity_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:176): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_connectivity_prop:s0" dev="tmpfs" ino=126 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_connectivity_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:177): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_connectivity_prop:s0" dev="tmpfs" ino=126 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_connectivity_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:177): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_connectivity_prop:s0" dev="tmpfs" ino=126 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_connectivity_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:178): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_connectivity_prop:s0" dev="tmpfs" ino=126 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_connectivity_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:178): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_connectivity_prop:s0" dev="tmpfs" ino=126 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_connectivity_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:179): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_edgetpu_native_prop:s0" dev="tmpfs" ino=127 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_edgetpu_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:179): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_edgetpu_native_prop:s0" dev="tmpfs" ino=127 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_edgetpu_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:180): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_edgetpu_native_prop:s0" dev="tmpfs" ino=127 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_edgetpu_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:180): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_edgetpu_native_prop:s0" dev="tmpfs" ino=127 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_edgetpu_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:181): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_edgetpu_native_prop:s0" dev="tmpfs" ino=127 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_edgetpu_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:181): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_edgetpu_native_prop:s0" dev="tmpfs" ino=127 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_edgetpu_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:182): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_input_native_boot_prop:s0" dev="tmpfs" ino=128 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_input_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:182): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_input_native_boot_prop:s0" dev="tmpfs" ino=128 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_input_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:183): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_input_native_boot_prop:s0" dev="tmpfs" ino=128 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_input_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:183): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_input_native_boot_prop:s0" dev="tmpfs" ino=128 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_input_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:184): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_input_native_boot_prop:s0" dev="tmpfs" ino=128 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_input_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:184): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_input_native_boot_prop:s0" dev="tmpfs" ino=128 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_input_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:185): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_lmkd_native_prop:s0" dev="tmpfs" ino=129 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_lmkd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:185): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_lmkd_native_prop:s0" dev="tmpfs" ino=129 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_lmkd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:186): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_lmkd_native_prop:s0" dev="tmpfs" ino=129 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_lmkd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:186): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_lmkd_native_prop:s0" dev="tmpfs" ino=129 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_lmkd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:187): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_lmkd_native_prop:s0" dev="tmpfs" ino=129 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_lmkd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:187): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_lmkd_native_prop:s0" dev="tmpfs" ino=129 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_lmkd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:188): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_mglru_native_prop:s0" dev="tmpfs" ino=133 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_mglru_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:188): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_mglru_native_prop:s0" dev="tmpfs" ino=133 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_mglru_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:189): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_mglru_native_prop:s0" dev="tmpfs" ino=133 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_mglru_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:189): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_mglru_native_prop:s0" dev="tmpfs" ino=133 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_mglru_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:190): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_mglru_native_prop:s0" dev="tmpfs" ino=133 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_mglru_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:190): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_mglru_native_prop:s0" dev="tmpfs" ino=133 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_mglru_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:191): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_netd_native_prop:s0" dev="tmpfs" ino=134 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_netd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:191): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_netd_native_prop:s0" dev="tmpfs" ino=134 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_netd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:192): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_netd_native_prop:s0" dev="tmpfs" ino=134 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_netd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:192): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_netd_native_prop:s0" dev="tmpfs" ino=134 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_netd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:193): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_netd_native_prop:s0" dev="tmpfs" ino=134 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_netd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:193): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_netd_native_prop:s0" dev="tmpfs" ino=134 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_netd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:194): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_profcollect_native_boot_prop:s0" dev="tmpfs" ino=136 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_profcollect_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:194): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_profcollect_native_boot_prop:s0" dev="tmpfs" ino=136 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_profcollect_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:195): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_profcollect_native_boot_prop:s0" dev="tmpfs" ino=136 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_profcollect_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:195): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_profcollect_native_boot_prop:s0" dev="tmpfs" ino=136 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_profcollect_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:196): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_profcollect_native_boot_prop:s0" dev="tmpfs" ino=136 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_profcollect_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:196): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_profcollect_native_boot_prop:s0" dev="tmpfs" ino=136 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_profcollect_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:197): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_remote_key_provisioning_native_prop:s0" dev="tmpfs" ino=137 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_remote_key_provisioning_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:197): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_remote_key_provisioning_native_prop:s0" dev="tmpfs" ino=137 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_remote_key_provisioning_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:198): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_remote_key_provisioning_native_prop:s0" dev="tmpfs" ino=137 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_remote_key_provisioning_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:198): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_remote_key_provisioning_native_prop:s0" dev="tmpfs" ino=137 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_remote_key_provisioning_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:199): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_remote_key_provisioning_native_prop:s0" dev="tmpfs" ino=137 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_remote_key_provisioning_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:199): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_remote_key_provisioning_native_prop:s0" dev="tmpfs" ino=137 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_remote_key_provisioning_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:200): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_reset_performed_prop:s0" dev="tmpfs" ino=138 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_reset_performed_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:200): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_reset_performed_prop:s0" dev="tmpfs" ino=138 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_reset_performed_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:201): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_reset_performed_prop:s0" dev="tmpfs" ino=138 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_reset_performed_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:201): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_reset_performed_prop:s0" dev="tmpfs" ino=138 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_reset_performed_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:202): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_reset_performed_prop:s0" dev="tmpfs" ino=138 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_reset_performed_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:202): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_reset_performed_prop:s0" dev="tmpfs" ino=138 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_reset_performed_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:203): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_statsd_native_boot_prop:s0" dev="tmpfs" ino=141 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_statsd_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:203): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_statsd_native_boot_prop:s0" dev="tmpfs" ino=141 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_statsd_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:204): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_statsd_native_boot_prop:s0" dev="tmpfs" ino=141 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_statsd_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:204): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_statsd_native_boot_prop:s0" dev="tmpfs" ino=141 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_statsd_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:205): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_statsd_native_boot_prop:s0" dev="tmpfs" ino=141 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_statsd_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:205): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_statsd_native_boot_prop:s0" dev="tmpfs" ino=141 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_statsd_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:206): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_statsd_native_prop:s0" dev="tmpfs" ino=142 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_statsd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:206): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_statsd_native_prop:s0" dev="tmpfs" ino=142 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_statsd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:207): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_statsd_native_prop:s0" dev="tmpfs" ino=142 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_statsd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:207): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_statsd_native_prop:s0" dev="tmpfs" ino=142 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_statsd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I auditd : type=1400 audit(0.0:208): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_statsd_native_prop:s0" dev="tmpfs" ino=142 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_statsd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.952 549 549 I getprop : type=1400 audit(0.0:208): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_statsd_native_prop:s0" dev="tmpfs" ino=142 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_statsd_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:209): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_storage_native_boot_prop:s0" dev="tmpfs" ino=143 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_storage_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:209): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_storage_native_boot_prop:s0" dev="tmpfs" ino=143 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_storage_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:210): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_storage_native_boot_prop:s0" dev="tmpfs" ino=143 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_storage_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:210): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_storage_native_boot_prop:s0" dev="tmpfs" ino=143 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_storage_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:211): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_storage_native_boot_prop:s0" dev="tmpfs" ino=143 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_storage_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.976 408 552 W EventThread: Ignoring VSYNC request while display is disconnected 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:211): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_storage_native_boot_prop:s0" dev="tmpfs" ino=143 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_storage_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:212): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_surface_flinger_native_boot_prop:s0" dev="tmpfs" ino=144 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_surface_flinger_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:212): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_surface_flinger_native_boot_prop:s0" dev="tmpfs" ino=144 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_surface_flinger_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:213): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_surface_flinger_native_boot_prop:s0" dev="tmpfs" ino=144 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_surface_flinger_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:213): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_surface_flinger_native_boot_prop:s0" dev="tmpfs" ino=144 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_surface_flinger_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:214): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_surface_flinger_native_boot_prop:s0" dev="tmpfs" ino=144 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_surface_flinger_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:214): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_surface_flinger_native_boot_prop:s0" dev="tmpfs" ino=144 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_surface_flinger_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:215): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_swcodec_native_prop:s0" dev="tmpfs" ino=145 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_swcodec_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:215): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_swcodec_native_prop:s0" dev="tmpfs" ino=145 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_swcodec_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.976 408 553 W EventThread: Ignoring VSYNC request while display is disconnected 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:216): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_swcodec_native_prop:s0" dev="tmpfs" ino=145 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_swcodec_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:216): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_swcodec_native_prop:s0" dev="tmpfs" ino=145 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_swcodec_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:217): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_swcodec_native_prop:s0" dev="tmpfs" ino=145 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_swcodec_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:217): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_swcodec_native_prop:s0" dev="tmpfs" ino=145 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_swcodec_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.977 408 553 W EventThread: Ignoring VSYNC request while display is disconnected 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:218): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_sys_traced_prop:s0" dev="tmpfs" ino=146 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_sys_traced_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:218): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_sys_traced_prop:s0" dev="tmpfs" ino=146 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_sys_traced_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:219): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_sys_traced_prop:s0" dev="tmpfs" ino=146 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_sys_traced_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:219): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_sys_traced_prop:s0" dev="tmpfs" ino=146 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_sys_traced_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:220): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_sys_traced_prop:s0" dev="tmpfs" ino=146 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_sys_traced_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:220): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_sys_traced_prop:s0" dev="tmpfs" ino=146 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_sys_traced_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:221): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_tethering_u_or_later_native_prop:s0" dev="tmpfs" ino=147 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_tethering_u_or_later_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:221): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_tethering_u_or_later_native_prop:s0" dev="tmpfs" ino=147 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_tethering_u_or_later_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:222): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_tethering_u_or_later_native_prop:s0" dev="tmpfs" ino=147 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_tethering_u_or_later_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:222): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_tethering_u_or_later_native_prop:s0" dev="tmpfs" ino=147 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_tethering_u_or_later_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:223): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_tethering_u_or_later_native_prop:s0" dev="tmpfs" ino=147 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_tethering_u_or_later_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:223): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_tethering_u_or_later_native_prop:s0" dev="tmpfs" ino=147 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_tethering_u_or_later_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:224): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_vendor_system_native_boot_prop:s0" dev="tmpfs" ino=148 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_vendor_system_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:224): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_vendor_system_native_boot_prop:s0" dev="tmpfs" ino=148 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_vendor_system_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:225): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_vendor_system_native_boot_prop:s0" dev="tmpfs" ino=148 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_vendor_system_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:225): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_vendor_system_native_boot_prop:s0" dev="tmpfs" ino=148 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_vendor_system_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.978 408 408 I Scheduler: Display 0 is the pacesetter 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:226): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_vendor_system_native_boot_prop:s0" dev="tmpfs" ino=148 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_vendor_system_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:226): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_vendor_system_native_boot_prop:s0" dev="tmpfs" ino=148 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_vendor_system_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:227): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_vendor_system_native_prop:s0" dev="tmpfs" ino=149 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_vendor_system_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:227): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_vendor_system_native_prop:s0" dev="tmpfs" ino=149 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_vendor_system_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:228): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_vendor_system_native_prop:s0" dev="tmpfs" ino=149 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_vendor_system_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:228): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_vendor_system_native_prop:s0" dev="tmpfs" ino=149 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_vendor_system_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:229): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_vendor_system_native_prop:s0" dev="tmpfs" ino=149 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_vendor_system_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:229): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_vendor_system_native_prop:s0" dev="tmpfs" ino=149 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_vendor_system_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.978 408 556 W SurfaceFlinger: Failed to set thread name on dispatch thread 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:230): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_virtualization_framework_native_prop:s0" dev="tmpfs" ino=150 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_virtualization_framework_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:230): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_virtualization_framework_native_prop:s0" dev="tmpfs" ino=150 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_virtualization_framework_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:231): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_virtualization_framework_native_prop:s0" dev="tmpfs" ino=150 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_virtualization_framework_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:231): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_virtualization_framework_native_prop:s0" dev="tmpfs" ino=150 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_virtualization_framework_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:232): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_virtualization_framework_native_prop:s0" dev="tmpfs" ino=150 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_virtualization_framework_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:232): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_virtualization_framework_native_prop:s0" dev="tmpfs" ino=150 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_virtualization_framework_native_prop:s0 tclass=file permissive=1 01-01 00:00:09.981 408 408 D SurfaceFlinger: Setting power mode 2 on display 0 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:233): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_window_manager_native_boot_prop:s0" dev="tmpfs" ino=151 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_window_manager_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:233): avc: denied { open } for path="/dev/__properties__/u:object_r:device_config_window_manager_native_boot_prop:s0" dev="tmpfs" ino=151 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_window_manager_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:234): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_window_manager_native_boot_prop:s0" dev="tmpfs" ino=151 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_window_manager_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:234): avc: denied { getattr } for path="/dev/__properties__/u:object_r:device_config_window_manager_native_boot_prop:s0" dev="tmpfs" ino=151 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_window_manager_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:235): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:device_config_window_manager_native_boot_prop:s0" dev="tmpfs" ino=151 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_window_manager_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:235): avc: denied { map } for path="/dev/__properties__/u:object_r:device_config_window_manager_native_boot_prop:s0" dev="tmpfs" ino=151 scontext=u:r:shell:s0 tcontext=u:object_r:device_config_window_manager_native_boot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:236): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:dmesgd_start_prop:s0" dev="tmpfs" ino=154 scontext=u:r:shell:s0 tcontext=u:object_r:dmesgd_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:236): avc: denied { open } for path="/dev/__properties__/u:object_r:dmesgd_start_prop:s0" dev="tmpfs" ino=154 scontext=u:r:shell:s0 tcontext=u:object_r:dmesgd_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:237): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:dmesgd_start_prop:s0" dev="tmpfs" ino=154 scontext=u:r:shell:s0 tcontext=u:object_r:dmesgd_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:237): avc: denied { getattr } for path="/dev/__properties__/u:object_r:dmesgd_start_prop:s0" dev="tmpfs" ino=154 scontext=u:r:shell:s0 tcontext=u:object_r:dmesgd_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:238): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:dmesgd_start_prop:s0" dev="tmpfs" ino=154 scontext=u:r:shell:s0 tcontext=u:object_r:dmesgd_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:238): avc: denied { map } for path="/dev/__properties__/u:object_r:dmesgd_start_prop:s0" dev="tmpfs" ino=154 scontext=u:r:shell:s0 tcontext=u:object_r:dmesgd_start_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:239): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:drm_service_config_prop:s0" dev="tmpfs" ino=155 scontext=u:r:shell:s0 tcontext=u:object_r:drm_service_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:239): avc: denied { open } for path="/dev/__properties__/u:object_r:drm_service_config_prop:s0" dev="tmpfs" ino=155 scontext=u:r:shell:s0 tcontext=u:object_r:drm_service_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:240): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:drm_service_config_prop:s0" dev="tmpfs" ino=155 scontext=u:r:shell:s0 tcontext=u:object_r:drm_service_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:240): avc: denied { getattr } for path="/dev/__properties__/u:object_r:drm_service_config_prop:s0" dev="tmpfs" ino=155 scontext=u:r:shell:s0 tcontext=u:object_r:drm_service_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:241): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:drm_service_config_prop:s0" dev="tmpfs" ino=155 scontext=u:r:shell:s0 tcontext=u:object_r:drm_service_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:241): avc: denied { map } for path="/dev/__properties__/u:object_r:drm_service_config_prop:s0" dev="tmpfs" ino=155 scontext=u:r:shell:s0 tcontext=u:object_r:drm_service_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:242): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:dumpstate_options_prop:s0" dev="tmpfs" ino=156 scontext=u:r:shell:s0 tcontext=u:object_r:dumpstate_options_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:242): avc: denied { open } for path="/dev/__properties__/u:object_r:dumpstate_options_prop:s0" dev="tmpfs" ino=156 scontext=u:r:shell:s0 tcontext=u:object_r:dumpstate_options_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:243): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:dumpstate_options_prop:s0" dev="tmpfs" ino=156 scontext=u:r:shell:s0 tcontext=u:object_r:dumpstate_options_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:243): avc: denied { getattr } for path="/dev/__properties__/u:object_r:dumpstate_options_prop:s0" dev="tmpfs" ino=156 scontext=u:r:shell:s0 tcontext=u:object_r:dumpstate_options_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:244): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:dumpstate_options_prop:s0" dev="tmpfs" ino=156 scontext=u:r:shell:s0 tcontext=u:object_r:dumpstate_options_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:244): avc: denied { map } for path="/dev/__properties__/u:object_r:dumpstate_options_prop:s0" dev="tmpfs" ino=156 scontext=u:r:shell:s0 tcontext=u:object_r:dumpstate_options_prop:s0 tclass=file permissive=1 01-01 00:00:09.982 408 408 D SurfaceFlinger: Finished setting power mode 2 on display 0 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:245): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:exported_bluetooth_prop:s0" dev="tmpfs" ino=160 scontext=u:r:shell:s0 tcontext=u:object_r:exported_bluetooth_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:245): avc: denied { open } for path="/dev/__properties__/u:object_r:exported_bluetooth_prop:s0" dev="tmpfs" ino=160 scontext=u:r:shell:s0 tcontext=u:object_r:exported_bluetooth_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:246): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:exported_bluetooth_prop:s0" dev="tmpfs" ino=160 scontext=u:r:shell:s0 tcontext=u:object_r:exported_bluetooth_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:246): avc: denied { getattr } for path="/dev/__properties__/u:object_r:exported_bluetooth_prop:s0" dev="tmpfs" ino=160 scontext=u:r:shell:s0 tcontext=u:object_r:exported_bluetooth_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:247): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:exported_bluetooth_prop:s0" dev="tmpfs" ino=160 scontext=u:r:shell:s0 tcontext=u:object_r:exported_bluetooth_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:247): avc: denied { map } for path="/dev/__properties__/u:object_r:exported_bluetooth_prop:s0" dev="tmpfs" ino=160 scontext=u:r:shell:s0 tcontext=u:object_r:exported_bluetooth_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:248): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:exported_overlay_prop:s0" dev="tmpfs" ino=164 scontext=u:r:shell:s0 tcontext=u:object_r:exported_overlay_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:248): avc: denied { open } for path="/dev/__properties__/u:object_r:exported_overlay_prop:s0" dev="tmpfs" ino=164 scontext=u:r:shell:s0 tcontext=u:object_r:exported_overlay_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:249): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:exported_overlay_prop:s0" dev="tmpfs" ino=164 scontext=u:r:shell:s0 tcontext=u:object_r:exported_overlay_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:249): avc: denied { getattr } for path="/dev/__properties__/u:object_r:exported_overlay_prop:s0" dev="tmpfs" ino=164 scontext=u:r:shell:s0 tcontext=u:object_r:exported_overlay_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:250): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:exported_overlay_prop:s0" dev="tmpfs" ino=164 scontext=u:r:shell:s0 tcontext=u:object_r:exported_overlay_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:250): avc: denied { map } for path="/dev/__properties__/u:object_r:exported_overlay_prop:s0" dev="tmpfs" ino=164 scontext=u:r:shell:s0 tcontext=u:object_r:exported_overlay_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:251): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:fastbootd_protocol_prop:s0" dev="tmpfs" ino=167 scontext=u:r:shell:s0 tcontext=u:object_r:fastbootd_protocol_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:251): avc: denied { open } for path="/dev/__properties__/u:object_r:fastbootd_protocol_prop:s0" dev="tmpfs" ino=167 scontext=u:r:shell:s0 tcontext=u:object_r:fastbootd_protocol_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:252): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:fastbootd_protocol_prop:s0" dev="tmpfs" ino=167 scontext=u:r:shell:s0 tcontext=u:object_r:fastbootd_protocol_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:252): avc: denied { getattr } for path="/dev/__properties__/u:object_r:fastbootd_protocol_prop:s0" dev="tmpfs" ino=167 scontext=u:r:shell:s0 tcontext=u:object_r:fastbootd_protocol_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:253): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:fastbootd_protocol_prop:s0" dev="tmpfs" ino=167 scontext=u:r:shell:s0 tcontext=u:object_r:fastbootd_protocol_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:253): avc: denied { map } for path="/dev/__properties__/u:object_r:fastbootd_protocol_prop:s0" dev="tmpfs" ino=167 scontext=u:r:shell:s0 tcontext=u:object_r:fastbootd_protocol_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:254): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:ffs_control_prop:s0" dev="tmpfs" ino=169 scontext=u:r:shell:s0 tcontext=u:object_r:ffs_control_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:254): avc: denied { open } for path="/dev/__properties__/u:object_r:ffs_control_prop:s0" dev="tmpfs" ino=169 scontext=u:r:shell:s0 tcontext=u:object_r:ffs_control_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:255): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:ffs_control_prop:s0" dev="tmpfs" ino=169 scontext=u:r:shell:s0 tcontext=u:object_r:ffs_control_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:255): avc: denied { getattr } for path="/dev/__properties__/u:object_r:ffs_control_prop:s0" dev="tmpfs" ino=169 scontext=u:r:shell:s0 tcontext=u:object_r:ffs_control_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:256): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:ffs_control_prop:s0" dev="tmpfs" ino=169 scontext=u:r:shell:s0 tcontext=u:object_r:ffs_control_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:256): avc: denied { map } for path="/dev/__properties__/u:object_r:ffs_control_prop:s0" dev="tmpfs" ino=169 scontext=u:r:shell:s0 tcontext=u:object_r:ffs_control_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:257): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:firstboot_prop:s0" dev="tmpfs" ino=171 scontext=u:r:shell:s0 tcontext=u:object_r:firstboot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:257): avc: denied { open } for path="/dev/__properties__/u:object_r:firstboot_prop:s0" dev="tmpfs" ino=171 scontext=u:r:shell:s0 tcontext=u:object_r:firstboot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:258): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:firstboot_prop:s0" dev="tmpfs" ino=171 scontext=u:r:shell:s0 tcontext=u:object_r:firstboot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:258): avc: denied { getattr } for path="/dev/__properties__/u:object_r:firstboot_prop:s0" dev="tmpfs" ino=171 scontext=u:r:shell:s0 tcontext=u:object_r:firstboot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:259): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:firstboot_prop:s0" dev="tmpfs" ino=171 scontext=u:r:shell:s0 tcontext=u:object_r:firstboot_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:259): avc: denied { map } for path="/dev/__properties__/u:object_r:firstboot_prop:s0" dev="tmpfs" ino=171 scontext=u:r:shell:s0 tcontext=u:object_r:firstboot_prop:s0 tclass=file permissive=1 01-01 00:00:09.988 0 0 I init : starting service 'bootanim'... 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:260): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:framework_watchdog_config_prop:s0" dev="tmpfs" ino=173 scontext=u:r:shell:s0 tcontext=u:object_r:framework_watchdog_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:260): avc: denied { open } for path="/dev/__properties__/u:object_r:framework_watchdog_config_prop:s0" dev="tmpfs" ino=173 scontext=u:r:shell:s0 tcontext=u:object_r:framework_watchdog_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:261): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:framework_watchdog_config_prop:s0" dev="tmpfs" ino=173 scontext=u:r:shell:s0 tcontext=u:object_r:framework_watchdog_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:261): avc: denied { getattr } for path="/dev/__properties__/u:object_r:framework_watchdog_config_prop:s0" dev="tmpfs" ino=173 scontext=u:r:shell:s0 tcontext=u:object_r:framework_watchdog_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:262): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:framework_watchdog_config_prop:s0" dev="tmpfs" ino=173 scontext=u:r:shell:s0 tcontext=u:object_r:framework_watchdog_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:262): avc: denied { map } for path="/dev/__properties__/u:object_r:framework_watchdog_config_prop:s0" dev="tmpfs" ino=173 scontext=u:r:shell:s0 tcontext=u:object_r:framework_watchdog_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:263): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:future_pm_prop:s0" dev="tmpfs" ino=174 scontext=u:r:shell:s0 tcontext=u:object_r:future_pm_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:263): avc: denied { open } for path="/dev/__properties__/u:object_r:future_pm_prop:s0" dev="tmpfs" ino=174 scontext=u:r:shell:s0 tcontext=u:object_r:future_pm_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:264): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:future_pm_prop:s0" dev="tmpfs" ino=174 scontext=u:r:shell:s0 tcontext=u:object_r:future_pm_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:264): avc: denied { getattr } for path="/dev/__properties__/u:object_r:future_pm_prop:s0" dev="tmpfs" ino=174 scontext=u:r:shell:s0 tcontext=u:object_r:future_pm_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:265): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:future_pm_prop:s0" dev="tmpfs" ino=174 scontext=u:r:shell:s0 tcontext=u:object_r:future_pm_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:265): avc: denied { map } for path="/dev/__properties__/u:object_r:future_pm_prop:s0" dev="tmpfs" ino=174 scontext=u:r:shell:s0 tcontext=u:object_r:future_pm_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:266): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:gesture_prop:s0" dev="tmpfs" ino=175 scontext=u:r:shell:s0 tcontext=u:object_r:gesture_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:266): avc: denied { open } for path="/dev/__properties__/u:object_r:gesture_prop:s0" dev="tmpfs" ino=175 scontext=u:r:shell:s0 tcontext=u:object_r:gesture_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:267): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:gesture_prop:s0" dev="tmpfs" ino=175 scontext=u:r:shell:s0 tcontext=u:object_r:gesture_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:267): avc: denied { getattr } for path="/dev/__properties__/u:object_r:gesture_prop:s0" dev="tmpfs" ino=175 scontext=u:r:shell:s0 tcontext=u:object_r:gesture_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:268): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:gesture_prop:s0" dev="tmpfs" ino=175 scontext=u:r:shell:s0 tcontext=u:object_r:gesture_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:268): avc: denied { map } for path="/dev/__properties__/u:object_r:gesture_prop:s0" dev="tmpfs" ino=175 scontext=u:r:shell:s0 tcontext=u:object_r:gesture_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:269): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:gsid_prop:s0" dev="tmpfs" ino=178 scontext=u:r:shell:s0 tcontext=u:object_r:gsid_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:269): avc: denied { open } for path="/dev/__properties__/u:object_r:gsid_prop:s0" dev="tmpfs" ino=178 scontext=u:r:shell:s0 tcontext=u:object_r:gsid_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:270): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:gsid_prop:s0" dev="tmpfs" ino=178 scontext=u:r:shell:s0 tcontext=u:object_r:gsid_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:270): avc: denied { getattr } for path="/dev/__properties__/u:object_r:gsid_prop:s0" dev="tmpfs" ino=178 scontext=u:r:shell:s0 tcontext=u:object_r:gsid_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:271): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:gsid_prop:s0" dev="tmpfs" ino=178 scontext=u:r:shell:s0 tcontext=u:object_r:gsid_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:271): avc: denied { map } for path="/dev/__properties__/u:object_r:gsid_prop:s0" dev="tmpfs" ino=178 scontext=u:r:shell:s0 tcontext=u:object_r:gsid_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:272): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:hal_dumpstate_config_prop:s0" dev="tmpfs" ino=180 scontext=u:r:shell:s0 tcontext=u:object_r:hal_dumpstate_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:272): avc: denied { open } for path="/dev/__properties__/u:object_r:hal_dumpstate_config_prop:s0" dev="tmpfs" ino=180 scontext=u:r:shell:s0 tcontext=u:object_r:hal_dumpstate_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:273): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:hal_dumpstate_config_prop:s0" dev="tmpfs" ino=180 scontext=u:r:shell:s0 tcontext=u:object_r:hal_dumpstate_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:273): avc: denied { getattr } for path="/dev/__properties__/u:object_r:hal_dumpstate_config_prop:s0" dev="tmpfs" ino=180 scontext=u:r:shell:s0 tcontext=u:object_r:hal_dumpstate_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:274): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:hal_dumpstate_config_prop:s0" dev="tmpfs" ino=180 scontext=u:r:shell:s0 tcontext=u:object_r:hal_dumpstate_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:274): avc: denied { map } for path="/dev/__properties__/u:object_r:hal_dumpstate_config_prop:s0" dev="tmpfs" ino=180 scontext=u:r:shell:s0 tcontext=u:object_r:hal_dumpstate_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:275): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:hypervisor_restricted_prop:s0" dev="tmpfs" ino=188 scontext=u:r:shell:s0 tcontext=u:object_r:hypervisor_restricted_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:275): avc: denied { open } for path="/dev/__properties__/u:object_r:hypervisor_restricted_prop:s0" dev="tmpfs" ino=188 scontext=u:r:shell:s0 tcontext=u:object_r:hypervisor_restricted_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:276): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:hypervisor_restricted_prop:s0" dev="tmpfs" ino=188 scontext=u:r:shell:s0 tcontext=u:object_r:hypervisor_restricted_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:276): avc: denied { getattr } for path="/dev/__properties__/u:object_r:hypervisor_restricted_prop:s0" dev="tmpfs" ino=188 scontext=u:r:shell:s0 tcontext=u:object_r:hypervisor_restricted_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:277): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:hypervisor_restricted_prop:s0" dev="tmpfs" ino=188 scontext=u:r:shell:s0 tcontext=u:object_r:hypervisor_restricted_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:277): avc: denied { map } for path="/dev/__properties__/u:object_r:hypervisor_restricted_prop:s0" dev="tmpfs" ino=188 scontext=u:r:shell:s0 tcontext=u:object_r:hypervisor_restricted_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:278): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:incremental_prop:s0" dev="tmpfs" ino=189 scontext=u:r:shell:s0 tcontext=u:object_r:incremental_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:278): avc: denied { open } for path="/dev/__properties__/u:object_r:incremental_prop:s0" dev="tmpfs" ino=189 scontext=u:r:shell:s0 tcontext=u:object_r:incremental_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:279): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:incremental_prop:s0" dev="tmpfs" ino=189 scontext=u:r:shell:s0 tcontext=u:object_r:incremental_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:279): avc: denied { getattr } for path="/dev/__properties__/u:object_r:incremental_prop:s0" dev="tmpfs" ino=189 scontext=u:r:shell:s0 tcontext=u:object_r:incremental_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:280): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:incremental_prop:s0" dev="tmpfs" ino=189 scontext=u:r:shell:s0 tcontext=u:object_r:incremental_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:280): avc: denied { map } for path="/dev/__properties__/u:object_r:incremental_prop:s0" dev="tmpfs" ino=189 scontext=u:r:shell:s0 tcontext=u:object_r:incremental_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:281): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:init_storage_prop:s0" dev="tmpfs" ino=193 scontext=u:r:shell:s0 tcontext=u:object_r:init_storage_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:281): avc: denied { open } for path="/dev/__properties__/u:object_r:init_storage_prop:s0" dev="tmpfs" ino=193 scontext=u:r:shell:s0 tcontext=u:object_r:init_storage_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:282): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:init_storage_prop:s0" dev="tmpfs" ino=193 scontext=u:r:shell:s0 tcontext=u:object_r:init_storage_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:282): avc: denied { getattr } for path="/dev/__properties__/u:object_r:init_storage_prop:s0" dev="tmpfs" ino=193 scontext=u:r:shell:s0 tcontext=u:object_r:init_storage_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:283): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:init_storage_prop:s0" dev="tmpfs" ino=193 scontext=u:r:shell:s0 tcontext=u:object_r:init_storage_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:283): avc: denied { map } for path="/dev/__properties__/u:object_r:init_storage_prop:s0" dev="tmpfs" ino=193 scontext=u:r:shell:s0 tcontext=u:object_r:init_storage_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:284): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:init_svc_debug_prop:s0" dev="tmpfs" ino=194 scontext=u:r:shell:s0 tcontext=u:object_r:init_svc_debug_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:284): avc: denied { open } for path="/dev/__properties__/u:object_r:init_svc_debug_prop:s0" dev="tmpfs" ino=194 scontext=u:r:shell:s0 tcontext=u:object_r:init_svc_debug_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:285): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:init_svc_debug_prop:s0" dev="tmpfs" ino=194 scontext=u:r:shell:s0 tcontext=u:object_r:init_svc_debug_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:285): avc: denied { getattr } for path="/dev/__properties__/u:object_r:init_svc_debug_prop:s0" dev="tmpfs" ino=194 scontext=u:r:shell:s0 tcontext=u:object_r:init_svc_debug_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:286): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:init_svc_debug_prop:s0" dev="tmpfs" ino=194 scontext=u:r:shell:s0 tcontext=u:object_r:init_svc_debug_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:286): avc: denied { map } for path="/dev/__properties__/u:object_r:init_svc_debug_prop:s0" dev="tmpfs" ino=194 scontext=u:r:shell:s0 tcontext=u:object_r:init_svc_debug_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:287): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:keyguard_config_prop:s0" dev="tmpfs" ino=195 scontext=u:r:shell:s0 tcontext=u:object_r:keyguard_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:287): avc: denied { open } for path="/dev/__properties__/u:object_r:keyguard_config_prop:s0" dev="tmpfs" ino=195 scontext=u:r:shell:s0 tcontext=u:object_r:keyguard_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:288): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:keyguard_config_prop:s0" dev="tmpfs" ino=195 scontext=u:r:shell:s0 tcontext=u:object_r:keyguard_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:288): avc: denied { getattr } for path="/dev/__properties__/u:object_r:keyguard_config_prop:s0" dev="tmpfs" ino=195 scontext=u:r:shell:s0 tcontext=u:object_r:keyguard_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:289): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:keyguard_config_prop:s0" dev="tmpfs" ino=195 scontext=u:r:shell:s0 tcontext=u:object_r:keyguard_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:289): avc: denied { map } for path="/dev/__properties__/u:object_r:keyguard_config_prop:s0" dev="tmpfs" ino=195 scontext=u:r:shell:s0 tcontext=u:object_r:keyguard_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:290): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:keystore_config_prop:s0" dev="tmpfs" ino=196 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:290): avc: denied { open } for path="/dev/__properties__/u:object_r:keystore_config_prop:s0" dev="tmpfs" ino=196 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:291): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:keystore_config_prop:s0" dev="tmpfs" ino=196 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:291): avc: denied { getattr } for path="/dev/__properties__/u:object_r:keystore_config_prop:s0" dev="tmpfs" ino=196 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:292): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:keystore_config_prop:s0" dev="tmpfs" ino=196 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:292): avc: denied { map } for path="/dev/__properties__/u:object_r:keystore_config_prop:s0" dev="tmpfs" ino=196 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:293): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:keystore_crash_prop:s0" dev="tmpfs" ino=197 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_crash_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:293): avc: denied { open } for path="/dev/__properties__/u:object_r:keystore_crash_prop:s0" dev="tmpfs" ino=197 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_crash_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:294): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:keystore_crash_prop:s0" dev="tmpfs" ino=197 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_crash_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:294): avc: denied { getattr } for path="/dev/__properties__/u:object_r:keystore_crash_prop:s0" dev="tmpfs" ino=197 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_crash_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:295): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:keystore_crash_prop:s0" dev="tmpfs" ino=197 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_crash_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:295): avc: denied { map } for path="/dev/__properties__/u:object_r:keystore_crash_prop:s0" dev="tmpfs" ino=197 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_crash_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:296): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:keystore_listen_prop:s0" dev="tmpfs" ino=198 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_listen_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:296): avc: denied { open } for path="/dev/__properties__/u:object_r:keystore_listen_prop:s0" dev="tmpfs" ino=198 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_listen_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:297): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:keystore_listen_prop:s0" dev="tmpfs" ino=198 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_listen_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:297): avc: denied { getattr } for path="/dev/__properties__/u:object_r:keystore_listen_prop:s0" dev="tmpfs" ino=198 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_listen_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:298): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:keystore_listen_prop:s0" dev="tmpfs" ino=198 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_listen_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:298): avc: denied { map } for path="/dev/__properties__/u:object_r:keystore_listen_prop:s0" dev="tmpfs" ino=198 scontext=u:r:shell:s0 tcontext=u:object_r:keystore_listen_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:299): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:llkd_prop:s0" dev="tmpfs" ino=201 scontext=u:r:shell:s0 tcontext=u:object_r:llkd_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:299): avc: denied { open } for path="/dev/__properties__/u:object_r:llkd_prop:s0" dev="tmpfs" ino=201 scontext=u:r:shell:s0 tcontext=u:object_r:llkd_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:300): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:llkd_prop:s0" dev="tmpfs" ino=201 scontext=u:r:shell:s0 tcontext=u:object_r:llkd_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:300): avc: denied { getattr } for path="/dev/__properties__/u:object_r:llkd_prop:s0" dev="tmpfs" ino=201 scontext=u:r:shell:s0 tcontext=u:object_r:llkd_prop:s0 tclass=file permissive=1 01-01 00:00:09.994 0 0 I init : ... started service 'bootanim' has pid 558 01-01 00:00:09.994 0 0 I init : Control message: Processed ctl.start for 'bootanim' from pid: 408 (/system/bin/surfaceflinger) 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:301): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:llkd_prop:s0" dev="tmpfs" ino=201 scontext=u:r:shell:s0 tcontext=u:object_r:llkd_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:301): avc: denied { map } for path="/dev/__properties__/u:object_r:llkd_prop:s0" dev="tmpfs" ino=201 scontext=u:r:shell:s0 tcontext=u:object_r:llkd_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:302): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:lmkd_prop:s0" dev="tmpfs" ino=203 scontext=u:r:shell:s0 tcontext=u:object_r:lmkd_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:302): avc: denied { open } for path="/dev/__properties__/u:object_r:lmkd_prop:s0" dev="tmpfs" ino=203 scontext=u:r:shell:s0 tcontext=u:object_r:lmkd_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:303): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:lmkd_prop:s0" dev="tmpfs" ino=203 scontext=u:r:shell:s0 tcontext=u:object_r:lmkd_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:303): avc: denied { getattr } for path="/dev/__properties__/u:object_r:lmkd_prop:s0" dev="tmpfs" ino=203 scontext=u:r:shell:s0 tcontext=u:object_r:lmkd_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:304): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:lmkd_prop:s0" dev="tmpfs" ino=203 scontext=u:r:shell:s0 tcontext=u:object_r:lmkd_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:304): avc: denied { map } for path="/dev/__properties__/u:object_r:lmkd_prop:s0" dev="tmpfs" ino=203 scontext=u:r:shell:s0 tcontext=u:object_r:lmkd_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:305): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:lower_kptr_restrict_prop:s0" dev="tmpfs" ino=211 scontext=u:r:shell:s0 tcontext=u:object_r:lower_kptr_restrict_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:305): avc: denied { open } for path="/dev/__properties__/u:object_r:lower_kptr_restrict_prop:s0" dev="tmpfs" ino=211 scontext=u:r:shell:s0 tcontext=u:object_r:lower_kptr_restrict_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:306): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:lower_kptr_restrict_prop:s0" dev="tmpfs" ino=211 scontext=u:r:shell:s0 tcontext=u:object_r:lower_kptr_restrict_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:306): avc: denied { getattr } for path="/dev/__properties__/u:object_r:lower_kptr_restrict_prop:s0" dev="tmpfs" ino=211 scontext=u:r:shell:s0 tcontext=u:object_r:lower_kptr_restrict_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:307): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:lower_kptr_restrict_prop:s0" dev="tmpfs" ino=211 scontext=u:r:shell:s0 tcontext=u:object_r:lower_kptr_restrict_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:307): avc: denied { map } for path="/dev/__properties__/u:object_r:lower_kptr_restrict_prop:s0" dev="tmpfs" ino=211 scontext=u:r:shell:s0 tcontext=u:object_r:lower_kptr_restrict_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:308): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:lowpan_prop:s0" dev="tmpfs" ino=212 scontext=u:r:shell:s0 tcontext=u:object_r:lowpan_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:308): avc: denied { open } for path="/dev/__properties__/u:object_r:lowpan_prop:s0" dev="tmpfs" ino=212 scontext=u:r:shell:s0 tcontext=u:object_r:lowpan_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:309): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:lowpan_prop:s0" dev="tmpfs" ino=212 scontext=u:r:shell:s0 tcontext=u:object_r:lowpan_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:309): avc: denied { getattr } for path="/dev/__properties__/u:object_r:lowpan_prop:s0" dev="tmpfs" ino=212 scontext=u:r:shell:s0 tcontext=u:object_r:lowpan_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:310): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:lowpan_prop:s0" dev="tmpfs" ino=212 scontext=u:r:shell:s0 tcontext=u:object_r:lowpan_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:310): avc: denied { map } for path="/dev/__properties__/u:object_r:lowpan_prop:s0" dev="tmpfs" ino=212 scontext=u:r:shell:s0 tcontext=u:object_r:lowpan_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:311): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:mm_events_config_prop:s0" dev="tmpfs" ino=217 scontext=u:r:shell:s0 tcontext=u:object_r:mm_events_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:311): avc: denied { open } for path="/dev/__properties__/u:object_r:mm_events_config_prop:s0" dev="tmpfs" ino=217 scontext=u:r:shell:s0 tcontext=u:object_r:mm_events_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:312): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:mm_events_config_prop:s0" dev="tmpfs" ino=217 scontext=u:r:shell:s0 tcontext=u:object_r:mm_events_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:312): avc: denied { getattr } for path="/dev/__properties__/u:object_r:mm_events_config_prop:s0" dev="tmpfs" ino=217 scontext=u:r:shell:s0 tcontext=u:object_r:mm_events_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:313): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:mm_events_config_prop:s0" dev="tmpfs" ino=217 scontext=u:r:shell:s0 tcontext=u:object_r:mm_events_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:313): avc: denied { map } for path="/dev/__properties__/u:object_r:mm_events_config_prop:s0" dev="tmpfs" ino=217 scontext=u:r:shell:s0 tcontext=u:object_r:mm_events_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:314): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:mmc_prop:s0" dev="tmpfs" ino=218 scontext=u:r:shell:s0 tcontext=u:object_r:mmc_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:314): avc: denied { open } for path="/dev/__properties__/u:object_r:mmc_prop:s0" dev="tmpfs" ino=218 scontext=u:r:shell:s0 tcontext=u:object_r:mmc_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:315): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:mmc_prop:s0" dev="tmpfs" ino=218 scontext=u:r:shell:s0 tcontext=u:object_r:mmc_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:315): avc: denied { getattr } for path="/dev/__properties__/u:object_r:mmc_prop:s0" dev="tmpfs" ino=218 scontext=u:r:shell:s0 tcontext=u:object_r:mmc_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:316): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:mmc_prop:s0" dev="tmpfs" ino=218 scontext=u:r:shell:s0 tcontext=u:object_r:mmc_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:316): avc: denied { map } for path="/dev/__properties__/u:object_r:mmc_prop:s0" dev="tmpfs" ino=218 scontext=u:r:shell:s0 tcontext=u:object_r:mmc_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:317): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:net_464xlat_fromvendor_prop:s0" dev="tmpfs" ino=221 scontext=u:r:shell:s0 tcontext=u:object_r:net_464xlat_fromvendor_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:317): avc: denied { open } for path="/dev/__properties__/u:object_r:net_464xlat_fromvendor_prop:s0" dev="tmpfs" ino=221 scontext=u:r:shell:s0 tcontext=u:object_r:net_464xlat_fromvendor_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:318): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:net_464xlat_fromvendor_prop:s0" dev="tmpfs" ino=221 scontext=u:r:shell:s0 tcontext=u:object_r:net_464xlat_fromvendor_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:318): avc: denied { getattr } for path="/dev/__properties__/u:object_r:net_464xlat_fromvendor_prop:s0" dev="tmpfs" ino=221 scontext=u:r:shell:s0 tcontext=u:object_r:net_464xlat_fromvendor_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:319): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:net_464xlat_fromvendor_prop:s0" dev="tmpfs" ino=221 scontext=u:r:shell:s0 tcontext=u:object_r:net_464xlat_fromvendor_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:319): avc: denied { map } for path="/dev/__properties__/u:object_r:net_464xlat_fromvendor_prop:s0" dev="tmpfs" ino=221 scontext=u:r:shell:s0 tcontext=u:object_r:net_464xlat_fromvendor_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:320): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:net_connectivity_prop:s0" dev="tmpfs" ino=222 scontext=u:r:shell:s0 tcontext=u:object_r:net_connectivity_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:320): avc: denied { open } for path="/dev/__properties__/u:object_r:net_connectivity_prop:s0" dev="tmpfs" ino=222 scontext=u:r:shell:s0 tcontext=u:object_r:net_connectivity_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:321): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:net_connectivity_prop:s0" dev="tmpfs" ino=222 scontext=u:r:shell:s0 tcontext=u:object_r:net_connectivity_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:321): avc: denied { getattr } for path="/dev/__properties__/u:object_r:net_connectivity_prop:s0" dev="tmpfs" ino=222 scontext=u:r:shell:s0 tcontext=u:object_r:net_connectivity_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I auditd : type=1400 audit(0.0:322): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:net_connectivity_prop:s0" dev="tmpfs" ino=222 scontext=u:r:shell:s0 tcontext=u:object_r:net_connectivity_prop:s0 tclass=file permissive=1 01-01 00:00:09.956 549 549 I getprop : type=1400 audit(0.0:322): avc: denied { map } for path="/dev/__properties__/u:object_r:net_connectivity_prop:s0" dev="tmpfs" ino=222 scontext=u:r:shell:s0 tcontext=u:object_r:net_connectivity_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:323): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:net_dns_prop:s0" dev="tmpfs" ino=223 scontext=u:r:shell:s0 tcontext=u:object_r:net_dns_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:323): avc: denied { open } for path="/dev/__properties__/u:object_r:net_dns_prop:s0" dev="tmpfs" ino=223 scontext=u:r:shell:s0 tcontext=u:object_r:net_dns_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:324): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:net_dns_prop:s0" dev="tmpfs" ino=223 scontext=u:r:shell:s0 tcontext=u:object_r:net_dns_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:324): avc: denied { getattr } for path="/dev/__properties__/u:object_r:net_dns_prop:s0" dev="tmpfs" ino=223 scontext=u:r:shell:s0 tcontext=u:object_r:net_dns_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:325): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:net_dns_prop:s0" dev="tmpfs" ino=223 scontext=u:r:shell:s0 tcontext=u:object_r:net_dns_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:325): avc: denied { map } for path="/dev/__properties__/u:object_r:net_dns_prop:s0" dev="tmpfs" ino=223 scontext=u:r:shell:s0 tcontext=u:object_r:net_dns_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:326): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:netd_stable_secret_prop:s0" dev="tmpfs" ino=225 scontext=u:r:shell:s0 tcontext=u:object_r:netd_stable_secret_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:326): avc: denied { open } for path="/dev/__properties__/u:object_r:netd_stable_secret_prop:s0" dev="tmpfs" ino=225 scontext=u:r:shell:s0 tcontext=u:object_r:netd_stable_secret_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:327): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:persistent_properties_ready_prop:s0" dev="tmpfs" ino=240 scontext=u:r:shell:s0 tcontext=u:object_r:persistent_properties_ready_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:327): avc: denied { open } for path="/dev/__properties__/u:object_r:persistent_properties_ready_prop:s0" dev="tmpfs" ino=240 scontext=u:r:shell:s0 tcontext=u:object_r:persistent_properties_ready_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:328): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:persistent_properties_ready_prop:s0" dev="tmpfs" ino=240 scontext=u:r:shell:s0 tcontext=u:object_r:persistent_properties_ready_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:328): avc: denied { getattr } for path="/dev/__properties__/u:object_r:persistent_properties_ready_prop:s0" dev="tmpfs" ino=240 scontext=u:r:shell:s0 tcontext=u:object_r:persistent_properties_ready_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:329): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:persistent_properties_ready_prop:s0" dev="tmpfs" ino=240 scontext=u:r:shell:s0 tcontext=u:object_r:persistent_properties_ready_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:329): avc: denied { map } for path="/dev/__properties__/u:object_r:persistent_properties_ready_prop:s0" dev="tmpfs" ino=240 scontext=u:r:shell:s0 tcontext=u:object_r:persistent_properties_ready_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:330): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:profcollectd_node_id_prop:s0" dev="tmpfs" ino=244 scontext=u:r:shell:s0 tcontext=u:object_r:profcollectd_node_id_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:330): avc: denied { open } for path="/dev/__properties__/u:object_r:profcollectd_node_id_prop:s0" dev="tmpfs" ino=244 scontext=u:r:shell:s0 tcontext=u:object_r:profcollectd_node_id_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:331): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:provisioned_prop:s0" dev="tmpfs" ino=246 scontext=u:r:shell:s0 tcontext=u:object_r:provisioned_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:331): avc: denied { open } for path="/dev/__properties__/u:object_r:provisioned_prop:s0" dev="tmpfs" ino=246 scontext=u:r:shell:s0 tcontext=u:object_r:provisioned_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:332): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:rebootescrow_hal_prop:s0" dev="tmpfs" ino=253 scontext=u:r:shell:s0 tcontext=u:object_r:rebootescrow_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:332): avc: denied { open } for path="/dev/__properties__/u:object_r:rebootescrow_hal_prop:s0" dev="tmpfs" ino=253 scontext=u:r:shell:s0 tcontext=u:object_r:rebootescrow_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:333): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:recovery_usb_config_prop:s0" dev="tmpfs" ino=255 scontext=u:r:shell:s0 tcontext=u:object_r:recovery_usb_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:333): avc: denied { open } for path="/dev/__properties__/u:object_r:recovery_usb_config_prop:s0" dev="tmpfs" ino=255 scontext=u:r:shell:s0 tcontext=u:object_r:recovery_usb_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:334): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:retaildemo_prop:s0" dev="tmpfs" ino=258 scontext=u:r:shell:s0 tcontext=u:object_r:retaildemo_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:334): avc: denied { open } for path="/dev/__properties__/u:object_r:retaildemo_prop:s0" dev="tmpfs" ino=258 scontext=u:r:shell:s0 tcontext=u:object_r:retaildemo_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:335): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:safemode_prop:s0" dev="tmpfs" ino=260 scontext=u:r:shell:s0 tcontext=u:object_r:safemode_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:335): avc: denied { open } for path="/dev/__properties__/u:object_r:safemode_prop:s0" dev="tmpfs" ino=260 scontext=u:r:shell:s0 tcontext=u:object_r:safemode_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:336): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:smart_idle_maint_enabled_prop:s0" dev="tmpfs" ino=266 scontext=u:r:shell:s0 tcontext=u:object_r:smart_idle_maint_enabled_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:336): avc: denied { open } for path="/dev/__properties__/u:object_r:smart_idle_maint_enabled_prop:s0" dev="tmpfs" ino=266 scontext=u:r:shell:s0 tcontext=u:object_r:smart_idle_maint_enabled_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:337): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:snapuserd_prop:s0" dev="tmpfs" ino=267 scontext=u:r:shell:s0 tcontext=u:object_r:snapuserd_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:337): avc: denied { open } for path="/dev/__properties__/u:object_r:snapuserd_prop:s0" dev="tmpfs" ino=267 scontext=u:r:shell:s0 tcontext=u:object_r:snapuserd_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:338): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:storage_config_prop:s0" dev="tmpfs" ino=271 scontext=u:r:shell:s0 tcontext=u:object_r:storage_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:338): avc: denied { open } for path="/dev/__properties__/u:object_r:storage_config_prop:s0" dev="tmpfs" ino=271 scontext=u:r:shell:s0 tcontext=u:object_r:storage_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:339): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:surfaceflinger_display_prop:s0" dev="tmpfs" ino=274 scontext=u:r:shell:s0 tcontext=u:object_r:surfaceflinger_display_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:339): avc: denied { open } for path="/dev/__properties__/u:object_r:surfaceflinger_display_prop:s0" dev="tmpfs" ino=274 scontext=u:r:shell:s0 tcontext=u:object_r:surfaceflinger_display_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:340): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:system_adbd_prop:s0" dev="tmpfs" ino=277 scontext=u:r:shell:s0 tcontext=u:object_r:system_adbd_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:340): avc: denied { open } for path="/dev/__properties__/u:object_r:system_adbd_prop:s0" dev="tmpfs" ino=277 scontext=u:r:shell:s0 tcontext=u:object_r:system_adbd_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:341): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:system_trace_prop:s0" dev="tmpfs" ino=282 scontext=u:r:shell:s0 tcontext=u:object_r:system_trace_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:341): avc: denied { open } for path="/dev/__properties__/u:object_r:system_trace_prop:s0" dev="tmpfs" ino=282 scontext=u:r:shell:s0 tcontext=u:object_r:system_trace_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:342): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:test_boot_reason_prop:s0" dev="tmpfs" ino=287 scontext=u:r:shell:s0 tcontext=u:object_r:test_boot_reason_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:342): avc: denied { open } for path="/dev/__properties__/u:object_r:test_boot_reason_prop:s0" dev="tmpfs" ino=287 scontext=u:r:shell:s0 tcontext=u:object_r:test_boot_reason_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:343): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:time_prop:s0" dev="tmpfs" ino=290 scontext=u:r:shell:s0 tcontext=u:object_r:time_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:343): avc: denied { open } for path="/dev/__properties__/u:object_r:time_prop:s0" dev="tmpfs" ino=290 scontext=u:r:shell:s0 tcontext=u:object_r:time_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:344): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:tombstone_config_prop:s0" dev="tmpfs" ino=293 scontext=u:r:shell:s0 tcontext=u:object_r:tombstone_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:344): avc: denied { map } for path="/dev/__properties__/u:object_r:tombstone_config_prop:s0" dev="tmpfs" ino=293 scontext=u:r:shell:s0 tcontext=u:object_r:tombstone_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:345): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:tuner_config_prop:s0" dev="tmpfs" ino=298 scontext=u:r:shell:s0 tcontext=u:object_r:tuner_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:345): avc: denied { open } for path="/dev/__properties__/u:object_r:tuner_config_prop:s0" dev="tmpfs" ino=298 scontext=u:r:shell:s0 tcontext=u:object_r:tuner_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:346): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:usb_uvc_enabled_prop:s0" dev="tmpfs" ino=303 scontext=u:r:shell:s0 tcontext=u:object_r:usb_uvc_enabled_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:346): avc: denied { open } for path="/dev/__properties__/u:object_r:usb_uvc_enabled_prop:s0" dev="tmpfs" ino=303 scontext=u:r:shell:s0 tcontext=u:object_r:usb_uvc_enabled_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:347): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:vehicle_hal_prop:s0" dev="tmpfs" ino=310 scontext=u:r:shell:s0 tcontext=u:object_r:vehicle_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:347): avc: denied { open } for path="/dev/__properties__/u:object_r:vehicle_hal_prop:s0" dev="tmpfs" ino=310 scontext=u:r:shell:s0 tcontext=u:object_r:vehicle_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:348): avc: denied { getattr } for comm="getprop" path="/dev/__properties__/u:object_r:vehicle_hal_prop:s0" dev="tmpfs" ino=310 scontext=u:r:shell:s0 tcontext=u:object_r:vehicle_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:348): avc: denied { getattr } for path="/dev/__properties__/u:object_r:vehicle_hal_prop:s0" dev="tmpfs" ino=310 scontext=u:r:shell:s0 tcontext=u:object_r:vehicle_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:349): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:vendor_sensors_prop:s0" dev="tmpfs" ino=313 scontext=u:r:shell:s0 tcontext=u:object_r:vendor_sensors_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:349): avc: denied { open } for path="/dev/__properties__/u:object_r:vendor_sensors_prop:s0" dev="tmpfs" ino=313 scontext=u:r:shell:s0 tcontext=u:object_r:vendor_sensors_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:350): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:virtual_face_hal_prop:s0" dev="tmpfs" ino=318 scontext=u:r:shell:s0 tcontext=u:object_r:virtual_face_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:350): avc: denied { open } for path="/dev/__properties__/u:object_r:virtual_face_hal_prop:s0" dev="tmpfs" ino=318 scontext=u:r:shell:s0 tcontext=u:object_r:virtual_face_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I auditd : type=1400 audit(0.0:351): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:vold_post_fs_data_prop:s0" dev="tmpfs" ino=323 scontext=u:r:shell:s0 tcontext=u:object_r:vold_post_fs_data_prop:s0 tclass=file permissive=1 01-01 00:00:09.960 549 549 I getprop : type=1400 audit(0.0:351): avc: denied { open } for path="/dev/__properties__/u:object_r:vold_post_fs_data_prop:s0" dev="tmpfs" ino=323 scontext=u:r:shell:s0 tcontext=u:object_r:vold_post_fs_data_prop:s0 tclass=file permissive=1 01-01 00:00:09.964 549 549 I auditd : type=1400 audit(0.0:352): avc: denied { open } for comm="getprop" path="/dev/__properties__/u:object_r:wifi_config_prop:s0" dev="tmpfs" ino=328 scontext=u:r:shell:s0 tcontext=u:object_r:wifi_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.964 549 549 I getprop : type=1400 audit(0.0:352): avc: denied { open } for path="/dev/__properties__/u:object_r:wifi_config_prop:s0" dev="tmpfs" ino=328 scontext=u:r:shell:s0 tcontext=u:object_r:wifi_config_prop:s0 tclass=file permissive=1 01-01 00:00:09.964 549 549 I auditd : type=1400 audit(0.0:353): avc: denied { map } for comm="getprop" path="/dev/__properties__/u:object_r:wifi_hal_prop:s0" dev="tmpfs" ino=329 scontext=u:r:shell:s0 tcontext=u:object_r:wifi_hal_prop:s0 tclass=file permissive=1 01-01 00:00:09.964 549 549 I getprop : type=1400 audit(0.0:353): avc: denied { map } for path="/dev/__properties__/u:object_r:wifi_hal_prop:s0" dev="tmpfs" ino=329 scontext=u:r:shell:s0 tcontext=u:object_r:wifi_hal_prop:s0 tclass=file permissive=1 01-01 00:00:10.128 507 507 V MUXD : MUXD 1406:chat(): Selected 0 01-01 00:00:10.128 507 507 W MUXD : MUXD 2104:start_muxer(): Modem does not respond to AT commands, trying close mux mode 01-01 00:00:10.128 507 507 V MUXD : MUXD 758:write_frame(): write_frame Enter 01-01 00:00:10.128 507 507 V MUXD : MUXD 766:write_frame(): Sending frame to channel 0 01-01 00:00:10.128 507 507 V MUXD : MUXD 732:syslogdump(): >s 00000000: f9 03 c3 01 40 f9 . .- . . . . . . . . ∙.├.@∙ 01-01 00:00:10.128 507 507 V MUXD : MUXD 810:write_frame(): Leave 01-01 00:00:10.128 507 507 V MUXD : MUXD 758:write_frame(): write_frame Enter 01-01 00:00:10.128 507 507 V MUXD : MUXD 766:write_frame(): Sending frame to channel 0 01-01 00:00:10.128 507 507 V MUXD : MUXD 732:syslogdump(): >s 00000000: f9 03 ef 05 c3 01 f2 f9- . . . . . . . . ∙.∩.├.≥∙ 01-01 00:00:10.129 507 507 V MUXD : MUXD 810:write_frame(): Leave 01-01 00:00:10.129 507 507 V MUXD : MUXD 1386:chat(): Enter 01-01 00:00:10.129 507 507 V MUXD : MUXD 732:syslogdump(): >s 00000000: 41 54 0d 0a . . . .- . . . . . . . . AT.. 01-01 00:00:10.129 507 507 V MUXD : MUXD 1393:chat(): Wrote 4 bytes 01-01 00:00:10.129 507 507 V MUXD : MUXD 1395:chat(): CHAT++++++++++++