--------- beginning of main 06-18 20:56:19.917 533 533 W auditd : type=2000 audit(0.0:1): state=initialized audit_enabled=0 res=1 06-18 20:56:20.550 533 533 I auditd : type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295 06-18 20:56:20.560 1 1 I init : type=1400 audit(0.0:3): avc: denied { setcheckreqprot } for scontext=u:r:init:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1 06-18 20:56:20.560 1 1 I init : type=1400 audit(0.0:4): avc: denied { dac_read_search } for capability=2 scontext=u:r:init:s0 tcontext=u:r:init:s0 tclass=capability permissive=1 06-18 20:56:20.560 1 1 I init : type=1400 audit(0.0:5): avc: denied { create } for name="cgroup.procs" scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 06-18 20:56:20.560 1 1 I init : type=1400 audit(0.0:6): avc: denied { write } for path="/acct/uid_0/pid_521/cgroup.procs" dev="rootfs" ino=26783 scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 06-18 20:56:20.563 520 520 I init : type=1400 audit(0.0:7): avc: denied { map } for path="/plat_file_contexts" dev="rootfs" ino=12797 scontext=u:r:vendor_init:s0 tcontext=u:object_r:file_contexts_file:s0 tclass=file permissive=1 06-18 20:56:20.683 1 1 I init : type=1400 audit(0.0:8): avc: denied { setattr } for name="system" dev="rootfs" ino=13153 scontext=u:r:init:s0 tcontext=u:object_r:rootfs:s0 tclass=lnk_file permissive=1 06-18 20:56:20.686 1 1 I init : type=1400 audit(0.0:9): avc: denied { module_request } for kmod="fs-functionfs" scontext=u:r:init:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1 06-18 20:56:20.696 533 533 I init : type=1400 audit(0.0:10): avc: denied { entrypoint } for path="/sbin/logd" dev="rootfs" ino=13007 scontext=u:r:logd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 06-18 20:56:20.706 530 530 I hwservicemanage: type=1400 audit(0.0:16): avc: denied { read } for name="plat_hwservice_contexts" dev="rootfs" ino=12798 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1 06-18 20:56:20.706 530 530 I hwservicemanage: type=1400 audit(0.0:17): avc: denied { open } for path="/vendor_hwservice_contexts" dev="rootfs" ino=13284 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1 06-18 20:56:20.706 530 530 I hwservicemanage: type=1400 audit(0.0:18): avc: denied { getattr } for path="/vendor_hwservice_contexts" dev="rootfs" ino=13284 scontext=u:r:recovery:s0 tcontext=u:object_r:hwservice_contexts_file:s0 tclass=file permissive=1 06-18 20:56:20.710 530 530 I hwservicemanage: type=1400 audit(0.0:19): avc: denied { create } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1 06-18 20:56:20.710 530 530 I hwservicemanage: type=1400 audit(0.0:20): avc: denied { bind } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=netlink_selinux_socket permissive=1 06-18 20:56:20.710 530 530 I hwservicemanage: type=1400 audit(0.0:21): avc: denied { read } for name="perms" dev="selinuxfs" ino=67112181 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1 06-18 20:56:20.710 530 530 I hwservicemanage: type=1400 audit(0.0:22): avc: denied { open } for path="/sys/fs/selinux/class/hwservice_manager/perms" dev="selinuxfs" ino=67112181 scontext=u:r:recovery:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1 06-18 20:56:20.710 530 530 I hwservicemanage: type=1400 audit(0.0:23): avc: denied { compute_av } for scontext=u:r:recovery:s0 tcontext=u:object_r:kernel:s0 tclass=security permissive=1 06-18 20:56:20.710 530 530 I hwservicemanage: type=1400 audit(0.0:24): avc: denied { set_context_mgr } for scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=binder permissive=1 06-18 20:56:20.713 530 530 E SELinux : avc: denied { add } for interface=android.hidl.manager::IServiceManager sid=u:r:recovery:s0 pid=530 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_manager_hwservice:s0 tclass=hwservice_manager permissive=1 06-18 20:56:20.713 530 530 E SELinux : avc: denied { add } for interface=android.hidl.base::IBase sid=u:r:recovery:s0 pid=530 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_base_hwservice:s0 tclass=hwservice_manager permissive=1 06-18 20:56:20.713 530 530 E SELinux : avc: denied { add } for interface=android.hidl.token::ITokenManager sid=u:r:recovery:s0 pid=530 scontext=u:r:recovery:s0 tcontext=u:object_r:hidl_token_hwservice:s0 tclass=hwservice_manager permissive=1 06-18 20:56:20.718 530 530 I hwservicemanager: hwservicemanager is ready now. 06-18 20:56:20.727 554 554 D QSEECOMD: : qseecom listener services process entry PPID = 1 06-18 20:56:20.727 554 554 E QSEECOMD: : Listener: index = 0, hierarchy = 0 06-18 20:56:20.727 554 554 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds 06-18 20:56:20.727 554 554 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_init_service) succeeds 06-18 20:56:20.729 554 554 E rpmb_ufs: Found an applicable RPMB lun and its index is 2 06-18 20:56:20.729 554 554 I rpmb_ufs: RPMB Mult (512-byte sector) = 32768, Rel_sec_cnt = 64 06-18 20:56:20.730 554 554 E DrmLibRpmb: rpmb_init succeeded! with ret = 0 06-18 20:56:20.730 554 554 D QSEECOMD: : Init rpmb_init_service ret = 0 06-18 20:56:20.730 554 554 D QSEECOMD: : RPMB system services: init (Listener ID = 8192) 06-18 20:56:20.730 554 554 E QSEECOMD: : Listener: index = 1, hierarchy = 0 06-18 20:56:20.730 554 554 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds 06-18 20:56:20.730 554 554 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_init_service) succeeds 06-18 20:56:20.730 554 554 E SSD : ssd_init_service succeeded! 06-18 20:56:20.730 554 554 D QSEECOMD: : Init ssd_init_service ret = 0 06-18 20:56:20.730 554 554 D QSEECOMD: : SSD system services: init (Listener ID = 12288) 06-18 20:56:20.730 554 554 E QSEECOMD: : Listener: index = 2, hierarchy = 0 06-18 20:56:20.742 554 554 E QSEECOMD: : Init dlopen(libsecureui.so, RLTD_NOW) is failed.... dlopen failed: cannot locate symbol "_ZN7android8hardware23getOrCreateCachedBinderEPNS_4hidl4base4V1_05IBaseE" referenced by "/vendor/lib64/vendor.display.config@1.0.so"... 06-18 20:56:20.742 554 554 D QSEECOMD: : SEC_UI_INIT failed, shall not start secure ui listener 06-18 20:56:20.742 554 554 D QSEECOMD: : qseecom listener service threads starting!!! 06-18 20:56:20.742 554 554 D QSEECOMD: : Total listener services to start = 10 06-18 20:56:20.742 554 554 E QSEECOMD: : Listener: index = 0, hierarchy = 1 06-18 20:56:20.742 554 554 D QSEECOMD: : Init dlopen(librpmb.so, RTLD_NOW) succeeds 06-18 20:56:20.742 554 554 D QSEECOMD: : Init::Init dlsym(g_FSHandle rpmb_start) succeeds 06-18 20:56:20.742 554 554 D QSEECOMAPI: QSEECom_register_listener 8192 sb_length = 0x6400 06-18 20:56:20.743 554 554 E ion : ioctl c0044901 failed with code -1: Not a typewriter 06-18 20:56:20.743 554 554 D QSEECOMD: : Init rpmb_start ret = 0 06-18 20:56:20.743 554 554 D QSEECOMD: : RPMB system services: Started (Listener ID = 8192) 06-18 20:56:20.743 554 554 E QSEECOMD: : Listener: index = 1, hierarchy = 1 06-18 20:56:20.743 554 554 D QSEECOMD: : Init dlopen(libssd.so, RTLD_NOW) succeeds 06-18 20:56:20.743 554 554 D QSEECOMD: : Init::Init dlsym(g_FSHandle ssd_start) succeeds 06-18 20:56:20.743 554 554 D QSEECOMAPI: QSEECom_register_listener 12288 sb_length = 0x5000 06-18 20:56:20.744 554 554 D QSEECOMD: : Init ssd_start ret = 0 06-18 20:56:20.744 554 554 D QSEECOMD: : SSD system services: Started (Listener ID = 12288) 06-18 20:56:20.744 554 554 E QSEECOMD: : Listener: index = 2, hierarchy = 1 06-18 20:56:20.744 554 554 E QSEECOMD: : Init dlopen(libsecureui.so, RLTD_NOW) is failed.... dlopen failed: library "libhidlbase.so" not found 06-18 20:56:20.744 554 554 E QSEECOMD: : Listener: index = 3, hierarchy = 1 06-18 20:56:20.744 554 554 D QSEECOMD: : Init dlopen(libdrmtime.so, RTLD_NOW) succeeds 06-18 20:56:20.744 554 554 D QSEECOMD: : Init::Init dlsym(g_FSHandle atime_start) succeeds 06-18 20:56:20.744 554 554 D DrmLibTime: QSEE Time Listener: atime_start 06-18 20:56:20.744 554 554 D QSEECOMAPI: QSEECom_register_listener 11 sb_length = 0x5000 06-18 20:56:20.745 554 554 D DrmLibTime: registering fs service to QSEECom is done! 06-18 20:56:20.745 554 554 D DrmLibTime: begin to create a thread! 06-18 20:56:20.745 554 554 D DrmLibTime: Creating a pthread in atime_start is done! return 0 06-18 20:56:20.745 554 554 D QSEECOMD: : Init atime_start ret = 0 06-18 20:56:20.745 554 554 D QSEECOMD: : time services: Started (Listener ID = 11) 06-18 20:56:20.745 554 554 E QSEECOMD: : Listener: index = 4, hierarchy = 1 06-18 20:56:20.745 554 561 D DrmLibTime: QSEE Time Listener: dispatch 06-18 20:56:20.745 554 561 D DrmLibTime: before calling ioctl to read the next time_cmd 06-18 20:56:20.745 554 554 D QSEECOMD: : Init dlopen(libdrmfs.so, RTLD_NOW) succeeds 06-18 20:56:20.745 554 554 D QSEECOMD: : Init::Init dlsym(g_FSHandle fs_start) succeeds 06-18 20:56:20.745 554 554 D QSEECOMAPI: QSEECom_register_listener 10 sb_length = 0x5000 06-18 20:56:20.745 554 554 D QSEECOMD: : Init fs_start ret = 0 06-18 20:56:20.745 554 554 D QSEECOMD: : file system services: Started (Listener ID = 10) 06-18 20:56:20.745 554 554 E QSEECOMD: : Listener: index = 5, hierarchy = 1 06-18 20:56:20.745 554 554 D QSEECOMD: : Init dlopen(libdrmfs.so, RTLD_NOW) succeeds 06-18 20:56:20.745 554 554 D QSEECOMD: : Init::Init dlsym(g_FSHandle gpfs_start) succeeds 06-18 20:56:20.746 554 554 E DrmLibFs: Error: Invalid config file 06-18 20:56:20.746 554 554 E DrmLibFs: Data path not parsed: Using default data path: /data/vendor/tzstorage/ 06-18 20:56:20.746 554 554 E DrmLibFs: Persist path not parsed: Using default persist path: /mnt/vendor/persist/data/ 06-18 20:56:20.746 554 554 D QSEECOMAPI: QSEECom_register_listener 28672 sb_length = 0x7e000 06-18 20:56:20.746 554 554 D QSEECOMD: : Init gpfs_start ret = 0 06-18 20:56:20.746 554 554 D QSEECOMD: : gpfile system services: Started (Listener ID = 28672) 06-18 20:56:20.746 554 554 E QSEECOMD: : Listener: index = 6, hierarchy = 1 06-18 20:56:20.747 554 554 D QSEECOMD: : Init dlopen(libqisl.so, RTLD_NOW) succeeds 06-18 20:56:20.747 554 554 D QSEECOMD: : Init::Init dlsym(g_FSHandle qisl_start) succeeds --------- beginning of system 06-18 20:56:20.747 554 564 I QISL : QSEE Interrupt Service Listener Thread is started 06-18 20:56:20.747 554 564 D QSEECOMAPI: QSEECom_register_listener 36864 sb_length = 0x1f4 06-18 20:56:20.747 554 564 I QISL : QSEE Interrupt Service Listener was activated successfully 06-18 20:56:20.747 554 554 D QSEECOMD: : Init qisl_start ret = 0 06-18 20:56:20.747 554 554 D QSEECOMD: : interrupt services: Started (Listener ID = 36864) 06-18 20:56:20.747 554 554 E QSEECOMD: : Listener: index = 7, hierarchy = 1 06-18 20:56:20.747 554 554 D QSEECOMD: : Init dlopen(libspl.so, RTLD_NOW) succeeds 06-18 20:56:20.747 554 554 D QSEECOMD: : Init::Init dlsym(g_FSHandle spl_start) succeeds 06-18 20:56:20.747 554 554 D SPL : Call QSEECom_register_listener() 06-18 20:56:20.747 554 554 D QSEECOMAPI: QSEECom_register_listener 45056 sb_length = 0x400 06-18 20:56:20.748 554 554 D SPL : Registered listener sucessfully! 06-18 20:56:20.748 554 554 D SPL : pipe read-fd [29] write-fd [30] 06-18 20:56:20.748 554 554 D SPL : Create thread 06-18 20:56:20.748 554 554 D SPL : Thread created sucessfully. 06-18 20:56:20.748 554 554 D QSEECOMD: : Init spl_start ret = 0 06-18 20:56:20.748 554 565 D SPL : spl_dispatch() started 06-18 20:56:20.748 554 554 D QSEECOMD: : secure processor services: Started (Listener ID = 45056) 06-18 20:56:20.748 554 565 D SPL : ==== Wait For Request ====== 06-18 20:56:20.748 554 554 E QSEECOMD: : Listener: index = 8, hierarchy = 1 06-18 20:56:20.748 554 554 D QSEECOMD: : Init dlopen(libGPreqcancel.so, RTLD_NOW) succeeds 06-18 20:56:20.748 554 554 D QSEECOMD: : Init::Init dlsym(g_FSHandle gp_reqcancel_start) succeeds 06-18 20:56:20.748 554 554 D QSEECOMAPI: QSEECom_register_listener 4352 sb_length = 0x5000 06-18 20:56:20.749 554 554 D QSEECOMD: : Init gp_reqcancel_start ret = 0 06-18 20:56:20.749 554 554 D QSEECOMD: : gp request cancellation services: Started (Listener ID = 4352) 06-18 20:56:20.749 554 554 E QSEECOMD: : Listener: index = 9, hierarchy = 1 06-18 20:56:20.749 554 554 E QSEECOMD: : Init dlopen(libops.so, RLTD_NOW) is failed.... dlopen failed: library "libops.so" not found 06-18 20:56:20.751 554 554 D QSEECOMD: : QSEECOM DAEMON RUNNING 06-18 20:56:20.754 569 569 I SELinux : SELinux: Loaded service_contexts from: 06-18 20:56:20.754 569 569 I SELinux : /plat_service_contexts 06-18 20:56:20.754 569 569 I SELinux : /vendor_service_contexts 06-18 20:56:20.763 568 568 E cutils-trace: Error opening trace file: No such file or directory (2) 06-18 20:56:20.763 530 530 E cutils-trace: Error opening trace file: No such file or directory (2) 06-18 20:56:20.763 530 530 E SELinux : avc: denied { find } for interface=android.hardware.gatekeeper::IGatekeeper sid=u:r:recovery:s0 pid=568 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_gatekeeper_hwservice:s0 tclass=hwservice_manager permissive=1 06-18 20:56:20.764 530 530 W /sbin/hwservicemanager: Cannot open /system/manifest.xml 06-18 20:56:20.768 567 567 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000 06-18 20:56:20.768 567 567 D QSEECOMAPI: App is already loaded QSEE and app id = 1 06-18 20:56:20.768 567 567 E ion : ioctl c0044901 failed with code -1: Not a typewriter 06-18 20:56:20.770 567 567 E KeymasterUtils: TA API Major Version: 4 06-18 20:56:20.770 567 567 E KeymasterUtils: TA API Minor Version: 0 06-18 20:56:20.770 567 567 E KeymasterUtils: TA Major Version: 4 06-18 20:56:20.770 567 567 E KeymasterUtils: TA Minor Version: 526 06-18 20:56:20.774 567 567 I ServiceManagement: Removing namespace from process name android.hardware.keymaster@4.0-service-qti to keymaster@4.0-service-qti. 06-18 20:56:20.774 567 567 E cutils-trace: Error opening trace file: No such file or directory (2) 06-18 20:56:20.776 535 535 I ArmToArm64Assembler: generated scanline__00000077:03010101_00008001_00000000 [195 ipp] (241 ins) at [0x72da9003c0:0x72da900784] in 28750 ns 06-18 20:56:20.782 568 568 D vndksupport: Loading /vendor/lib64/hw/android.hardware.gatekeeper@1.0-impl-qti.so from current namespace instead of sphal namespace. 06-18 20:56:20.782 530 530 E SELinux : avc: denied { add } for interface=android.hardware.keymaster::IKeymasterDevice sid=u:r:recovery:s0 pid=567 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1 06-18 20:56:20.783 568 568 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000 06-18 20:56:20.783 568 568 D QSEECOMAPI: App is already loaded QSEE and app id = 1 06-18 20:56:20.783 568 568 E ion : ioctl c0044901 failed with code -1: Not a typewriter 06-18 20:56:20.785 568 568 E KeymasterUtils: TA API Major Version: 4 06-18 20:56:20.785 568 568 E KeymasterUtils: TA API Minor Version: 0 06-18 20:56:20.785 568 568 E KeymasterUtils: TA Major Version: 4 06-18 20:56:20.785 568 568 E KeymasterUtils: TA Minor Version: 526 11-01 15:02:25.785 535 535 E cutils-trace: Error opening trace file: No such file or directory (2) 11-01 15:02:25.785 530 530 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest. 11-01 15:02:25.786 530 530 E SELinux : avc: denied { find } for interface=android.hardware.keymaster::IKeymasterDevice sid=u:r:recovery:s0 pid=535 scontext=u:r:recovery:s0 tcontext=u:object_r:hal_keymaster_hwservice:s0 tclass=hwservice_manager permissive=1 11-01 15:02:25.787 530 530 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest. 11-01 15:02:25.788 535 535 I /sbin/recovery: List of Keymaster HALs found: 11-01 15:02:25.788 535 535 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default 11-01 15:02:25.796 567 567 E KeyMasterHalDevice: Begin send cmd failed 11-01 15:02:25.796 567 567 E KeyMasterHalDevice: ret: 0 11-01 15:02:25.796 567 567 E KeyMasterHalDevice: resp->status: -62 11-01 15:02:25.806 530 530 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest. 11-01 15:02:25.807 530 530 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest. 11-01 15:02:25.808 535 535 I /sbin/recovery: List of Keymaster HALs found: 11-01 15:02:25.808 535 535 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default 11-01 15:02:25.810 567 567 E KeyMasterHalDevice: export_key 11-01 15:02:25.810 567 567 E KeyMasterHalDevice: ret: 0 11-01 15:02:25.810 567 567 E KeyMasterHalDevice: resp->status: -62 11-01 15:02:25.833 530 530 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest. 11-01 15:02:25.835 530 530 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest. 11-01 15:02:25.835 535 535 I /sbin/recovery: List of Keymaster HALs found: 11-01 15:02:25.835 535 535 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default 11-01 15:02:25.839 567 567 E KeyMasterHalDevice: Begin send cmd failed 11-01 15:02:25.840 567 567 E KeyMasterHalDevice: ret: 0 11-01 15:02:25.840 567 567 E KeyMasterHalDevice: resp->status: -62 11-01 15:02:25.849 530 530 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest. 11-01 15:02:25.851 530 530 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest. 11-01 15:02:25.851 535 535 I /sbin/recovery: List of Keymaster HALs found: 11-01 15:02:25.851 535 535 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default 11-01 15:02:25.853 567 567 E KeyMasterHalDevice: export_key 11-01 15:02:25.853 567 567 E KeyMasterHalDevice: ret: 0 11-01 15:02:25.853 567 567 E KeyMasterHalDevice: resp->status: -62 11-01 15:02:25.868 535 535 W libc : Unable to set property "ro.crypto.state" to "encrypted": error code: 0xb 11-01 15:02:26.679 535 535 I recovery: type=1400 audit(0.0:582): avc: denied { read } for name="misc" dev="sda31" ino=1835009 scontext=u:r:recovery:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1 11-01 15:02:26.679 535 535 I recovery: type=1400 audit(0.0:583): avc: denied { open } for path="/data/misc" dev="sda31" ino=1835009 scontext=u:r:recovery:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1 11-01 15:02:26.679 535 535 I recovery: type=1400 audit(0.0:584): avc: denied { getattr } for path="/data/misc/stats-active-metric" dev="sda31" ino=1835076 scontext=u:r:recovery:s0 tcontext=u:object_r:stats_data_file:s0 tclass=dir permissive=1 11-01 15:02:26.679 535 535 I recovery: type=1400 audit(0.0:585): avc: denied { read } for name="stats-active-metric" dev="sda31" ino=1835076 scontext=u:r:recovery:s0 tcontext=u:object_r:stats_data_file:s0 tclass=dir permissive=1 11-01 15:02:26.679 535 535 I recovery: type=1400 audit(0.0:586): avc: denied { open } for path="/data/misc/stats-active-metric" dev="sda31" ino=1835076 scontext=u:r:recovery:s0 tcontext=u:object_r:stats_data_file:s0 tclass=dir permissive=1 11-01 15:02:27.692 535 535 I recovery: type=1400 audit(0.0:735): avc: denied { getattr } for path="/data/data/_4Hnftw+1fW9fXw54,f3jyHJRD6Mr0vpG/CEBVI8mHauZaLo0XiXJ6DC/_GctdAgFnKMU7RMqBAMAUiMruAP+2mciQ" dev="sda31" ino=2621477 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c232,c256,c512,c768 tclass=file permissive=1 11-01 15:02:27.782 535 535 I recovery: type=1400 audit(0.0:736): avc: denied { getattr } for path="/data/data/Pk5LjUbix,515HjCjLQ7fjE4JnhPZ0IzqGKIBB/YiLQEzwuP9yy9ynSS+A72C/fvRDkADKFAlxgE31DY0,GNBzu7M" dev="sda31" ino=2495073 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c204,c256,c512,c768 tclass=file permissive=1 11-01 15:02:27.872 535 535 I recovery: type=1400 audit(0.0:737): avc: denied { getattr } for path="/data/data/W25jlYYxDMIJ6aghl9af+jc5hXIxGun1/KBx9Wb+11YabqXItoUtFND/Db3lNpPlsA2FIqahFtKZ8D" dev="sda31" ino=2886161 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c252,c256,c512,c768 tclass=file permissive=1 11-01 15:02:27.912 535 535 I recovery: type=1400 audit(0.0:738): avc: denied { getattr } for path="/data/data/+RMFvjFmLQzYXtIdNtBEVmGPEct3Nw,I" dev="sda31" ino=3407976 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c6,c257,c512,c768 tclass=dir permissive=1 11-01 15:02:27.912 535 535 I recovery: type=1400 audit(0.0:739): avc: denied { read } for name="+RMFvjFmLQzYXtIdNtBEVmGPEct3Nw,I" dev="sda31" ino=3407976 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c6,c257,c512,c768 tclass=dir permissive=1 11-01 15:02:28.715 535 535 I recovery: type=1400 audit(0.0:776): avc: denied { getattr } for path="/data/data/SY8hzS8Mh43nlAo,vHR4xC/QFG+bAOUVHb,PyEGa1ceFA/GZZS9T8QsXDQJuzH2S,pNPZtvoB" dev="sda31" ino=2885242 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c248,c256,c512,c768 tclass=file permissive=1 11-01 15:02:28.732 535 535 I recovery: type=1400 audit(0.0:777): avc: denied { getattr } for path="/data/data/100vx7mDAxR0o0RlxQaf6I30LbG/nFysJjndrTN9TQuP+WEE5A/_eSe6lsmuS9IIS7+1zdALZqdK29NtCdJv" dev="sda31" ino=2098048 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c118,c256,c512,c768 tclass=file permissive=1 11-01 15:02:28.739 535 535 I recovery: type=1400 audit(0.0:778): avc: denied { getattr } for path="/data/data/a,cCaGPX4rEDu1Pjmmve3D/ib14RTbopXnk9or2XKmoLD/M8JySon,KJKNotUYPLz7V2+Aykb2wEZp" dev="sda31" ino=2490613 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c196,c256,c512,c768 tclass=file permissive=1 11-01 15:02:28.775 535 535 I recovery: type=1400 audit(0.0:779): avc: denied { getattr } for path="/data/data/KxUXZiqGBpUFHv9hp7GNlgk7p9jF+dZ3/2DJHulUbnQh8U12KSYawcA/2UDLzum8JZYXaC4pHvS4rXQxaZJ4k2fc3,hd+r,H0lM" dev="sda31" ino=2491842 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c205,c256,c512,c768 tclass=file permissive=1 11-01 15:02:28.809 535 535 I recovery: type=1400 audit(0.0:780): avc: denied { getattr } for path="/data/data/WDVMDjK8zrQ5gI,arWgepfmta2QtoCcByi44CB" dev="sda31" ino=2884855 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c84,c256,c512,c768 tclass=dir permissive=1 11-01 15:02:29.789 535 535 I recovery: type=1400 audit(0.0:830): avc: denied { getattr } for path="/data/data/dMslB5bSwQpr69FbEQc2,s2FHj6gcQA6BH1oJD" dev="sda31" ino=2491648 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c210,c256,c512,c768 tclass=dir permissive=1 11-01 15:02:29.789 535 535 I recovery: type=1400 audit(0.0:831): avc: denied { read } for name="dMslB5bSwQpr69FbEQc2,s2FHj6gcQA6BH1oJD" dev="sda31" ino=2491648 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c210,c256,c512,c768 tclass=dir permissive=1 11-01 15:02:29.789 535 535 I recovery: type=1400 audit(0.0:832): avc: denied { open } for path="/data/data/dMslB5bSwQpr69FbEQc2,s2FHj6gcQA6BH1oJD" dev="sda31" ino=2491648 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c210,c256,c512,c768 tclass=dir permissive=1 11-01 15:02:29.789 535 535 I recovery: type=1400 audit(0.0:833): avc: denied { search } for name="dMslB5bSwQpr69FbEQc2,s2FHj6gcQA6BH1oJD" dev="sda31" ino=2491648 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c210,c256,c512,c768 tclass=dir permissive=1 11-01 15:02:29.789 535 535 I recovery: type=1400 audit(0.0:834): avc: denied { getattr } for path="/data/data/dMslB5bSwQpr69FbEQc2,s2FHj6gcQA6BH1oJD/9B1tYogbVOGlHmWfe,FIcNXS5HFz+cpuASfaFon0AFO/nonMEK2gE,nHUUIKDFG9+BeHYwYKDD2twkXD,B" dev="sda31" ino=2491668 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c210,c256,c512,c768 tclass=file permissive=1 11-01 15:02:30.629 620 621 I adbd : initializing functionfs 11-01 15:02:30.629 620 621 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0 11-01 15:02:30.635 620 621 I adbd : functionfs successfully initialized 11-01 15:02:30.635 620 621 I adbd : registering usb transport 11-01 15:02:30.636 620 622 E cutils-trace: Error opening trace file: No such file or directory (2) 11-01 15:02:30.839 535 535 I recovery: type=1400 audit(0.0:957): avc: denied { open } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=26701 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 11-01 15:02:30.839 535 535 I recovery: type=1400 audit(0.0:958): avc: denied { getattr } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=26701 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 11-01 15:02:30.839 535 535 I recovery: type=1400 audit(0.0:959): avc: denied { map } for path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=26701 scontext=u:r:recovery:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 11-01 15:02:30.839 535 535 I recovery: type=1400 audit(0.0:960): avc: denied { open } for path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=26703 scontext=u:r:recovery:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 11-01 15:02:30.839 535 535 I recovery: type=1400 audit(0.0:961): avc: denied { getattr } for path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=26703 scontext=u:r:recovery:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 11-01 15:02:30.845 535 535 I ArmToArm64Assembler: generated scanline__00000077:03545401_00000000_00000000 [ 65 ipp] (94 ins) at [0x72da900b40:0x72da900cb8] in 30886 ns 11-01 15:03:09.159 535 535 I recovery: type=1400 audit(0.0:1057): avc: denied { read } for name="0c0c8f85fd8ba7b4.pwd" dev="sda31" ino=1179661 scontext=u:r:recovery:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=1 11-01 15:03:09.159 535 535 I recovery: type=1400 audit(0.0:1058): avc: denied { open } for path="/data/system_de/0/spblob/0c0c8f85fd8ba7b4.pwd" dev="sda31" ino=1179661 scontext=u:r:recovery:s0 tcontext=u:object_r:system_data_file:s0 tclass=file permissive=1 11-01 15:03:09.205 535 535 I recovery: type=1400 audit(0.0:1059): avc: denied { create } for name="auth_token" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1 11-01 15:03:09.205 535 535 I recovery: type=1400 audit(0.0:1060): avc: denied { search } for name="keystore" dev="sda31" ino=1835017 scontext=u:r:recovery:s0 tcontext=u:object_r:keystore_data_file:s0 tclass=dir permissive=1 11-01 15:03:09.205 535 535 I recovery: type=1400 audit(0.0:1061): avc: denied { read } for name="user_0" dev="sda31" ino=1835078 scontext=u:r:recovery:s0 tcontext=u:object_r:keystore_data_file:s0 tclass=dir permissive=1 11-01 15:03:09.269 627 627 E cutils-trace: Error opening trace file: No such file or directory (2) 11-01 15:03:09.269 530 530 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.1::IServiceManager/default in either framework or device manifest. 11-01 15:03:09.270 627 627 I keystore: found android.hardware.keymaster@4.0::IKeymasterDevice with interface name default and seclevel TRUSTED_ENVIRONMENT 11-01 15:03:09.270 569 569 E SELinux : avc: denied { add } for service=android.security.keystore pid=627 uid=0 scontext=u:r:recovery:s0 tcontext=u:object_r:keystore_service:s0 tclass=service_manager permissive=1 11-01 15:03:09.271 530 530 E SELinux : avc: denied { add } for interface=android.system.wifi.keystore::IKeystore sid=u:r:recovery:s0 pid=627 scontext=u:r:recovery:s0 tcontext=u:object_r:system_wifi_keystore_hwservice:s0 tclass=hwservice_manager permissive=1 11-01 15:03:09.335 569 569 E SELinux : avc: denied { find } for service=android.security.keystore pid=535 uid=0 scontext=u:r:recovery:s0 tcontext=u:object_r:keystore_service:s0 tclass=service_manager permissive=1 11-01 15:03:09.366 627 627 E SELinux : avc: denied { add_auth } for pid=629 uid=1000 scontext=u:r:recovery:s0 tcontext=u:r:recovery:s0 tclass=keystore_key permissive=1 11-01 15:03:09.366 627 627 D keystore: AddAuthenticationToken: timestamp = 48109, time_received = 45 11-01 15:03:09.366 629 629 D : successfully added auth token to keystore 11-01 15:03:09.443 567 567 E KeyMasterHalDevice: get_key_characteristics 11-01 15:03:09.443 567 567 E KeyMasterHalDevice: ret: 0 11-01 15:03:09.443 567 567 E KeyMasterHalDevice: resp->status: -62 11-01 15:03:09.443 627 627 I keystore: upgradeKeyBlob USRPKEY_synthetic_password_c0c8f85fd8ba7b4 0 11-01 15:03:09.453 627 627 W keystore: key found but type doesn't match: 6 vs 5 11-01 15:03:09.453 627 627 D keystore: Unable to read cached characteristics for key 11-01 15:03:09.456 627 627 I keystore: 1 0 11-01 15:03:10.361 627 627 I ServiceManager: Waiting for service dropbox... 11-01 15:03:13.367 627 627 I chatty : uid=0(root) /sbin/keystore identical 3 lines 11-01 15:03:14.368 627 627 I ServiceManager: Waiting for service dropbox... 11-01 15:03:14.469 627 627 W ServiceManager: Service dropbox didn't start. Returning NULL 11-01 15:03:14.471 569 569 I ServiceManager: service 'android.security.keystore' died 11-01 15:03:14.479 535 535 I recovery: type=1400 audit(0.0:1072): avc: denied { read } for scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=file permissive=1 11-01 15:03:14.479 535 535 I recovery: type=1400 audit(0.0:1073): avc: denied { read } for scontext=u:r:recovery:s0 tcontext=u:r:kernel:s0 tclass=file permissive=1 11-01 15:03:14.479 535 535 I recovery: type=1400 audit(0.0:1074): avc: denied { search } for name="1" dev="proc" ino=26769 scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=dir permissive=1 11-01 15:03:14.479 535 535 I recovery: type=1400 audit(0.0:1075): avc: denied { open } for path="/proc/1/cmdline" dev="proc" ino=26574 scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=file permissive=1 11-01 15:03:14.479 535 535 I recovery: type=1400 audit(0.0:1076): avc: denied { getattr } for path="/proc/1/cmdline" dev="proc" ino=26574 scontext=u:r:recovery:s0 tcontext=u:r:init:s0 tclass=file permissive=1 11-01 15:03:14.500 530 530 W hwservicemanager: getTransport: Cannot find entry android.hidl.manager@1.0::IServiceManager/default in either framework or device manifest. 11-01 15:03:14.502 530 530 W hwservicemanager: getTransport: Cannot find entry android.hardware.keymaster@3.0::IKeymasterDevice/default in either framework or device manifest. 11-01 15:03:14.502 535 626 I /sbin/recovery: List of Keymaster HALs found: 11-01 15:03:14.503 535 626 I /sbin/recovery: Keymaster HAL #1: Keymaster HAL: 4 from QTI SecurityLevel: TRUSTED_ENVIRONMENT HAL: android.hardware.keymaster@4.0::IKeymasterDevice/default 11-01 15:03:14.506 567 567 E KeyMasterHalDevice: export_key 11-01 15:03:14.506 567 567 E KeyMasterHalDevice: ret: 0 11-01 15:03:14.506 567 567 E KeyMasterHalDevice: resp->status: -62 11-01 15:03:15.675 535 535 I recovery: type=1400 audit(0.0:1100): avc: denied { getattr } for path="/data/bootchart" dev="sda31" ino=524289 scontext=u:r:recovery:s0 tcontext=u:object_r:bootchart_data_file:s0 tclass=dir permissive=1 11-01 15:03:15.675 535 535 I recovery: type=1400 audit(0.0:1101): avc: denied { read } for name="bootchart" dev="sda31" ino=524289 scontext=u:r:recovery:s0 tcontext=u:object_r:bootchart_data_file:s0 tclass=dir permissive=1 11-01 15:03:15.675 535 535 I recovery: type=1400 audit(0.0:1102): avc: denied { open } for path="/data/bootchart" dev="sda31" ino=524289 scontext=u:r:recovery:s0 tcontext=u:object_r:bootchart_data_file:s0 tclass=dir permissive=1 11-01 15:03:15.679 535 535 I recovery: type=1400 audit(0.0:1103): avc: denied { getattr } for path="/data/cache/backup_stage" dev="sda31" ino=4849667 scontext=u:r:recovery:s0 tcontext=u:object_r:cache_backup_file:s0 tclass=dir permissive=1 11-01 15:03:15.679 535 535 I recovery: type=1400 audit(0.0:1104): avc: denied { read } for name="backup_stage" dev="sda31" ino=4849667 scontext=u:r:recovery:s0 tcontext=u:object_r:cache_backup_file:s0 tclass=dir permissive=1 11-01 15:03:16.679 535 535 I recovery: type=1400 audit(0.0:1450): avc: denied { getattr } for path="/data/misc/boottrace" dev="sda31" ino=1835042 scontext=u:r:recovery:s0 tcontext=u:object_r:boottrace_data_file:s0 tclass=dir permissive=1 11-01 15:03:16.679 535 535 I recovery: type=1400 audit(0.0:1451): avc: denied { read } for name="boottrace" dev="sda31" ino=1835042 scontext=u:r:recovery:s0 tcontext=u:object_r:boottrace_data_file:s0 tclass=dir permissive=1 11-01 15:03:16.679 535 535 I recovery: type=1400 audit(0.0:1452): avc: denied { open } for path="/data/misc/boottrace" dev="sda31" ino=1835042 scontext=u:r:recovery:s0 tcontext=u:object_r:boottrace_data_file:s0 tclass=dir permissive=1 11-01 15:03:16.679 535 535 I recovery: type=1400 audit(0.0:1453): avc: denied { search } for name="boottrace" dev="sda31" ino=1835042 scontext=u:r:recovery:s0 tcontext=u:object_r:boottrace_data_file:s0 tclass=dir permissive=1 11-01 15:03:16.679 535 535 I recovery: type=1400 audit(0.0:1454): avc: denied { getattr } for path="/data/misc/vpn" dev="sda31" ino=1835028 scontext=u:r:recovery:s0 tcontext=u:object_r:vpn_data_file:s0 tclass=dir permissive=1 11-01 15:03:17.682 535 535 I recovery: type=1400 audit(0.0:1502): avc: denied { getattr } for path="/data/data/com.android.theme.icon_pack.rounded.launcher" dev="sda31" ino=2097435 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c46,c256,c512,c768 tclass=dir permissive=1 11-01 15:03:17.682 535 535 I recovery: type=1400 audit(0.0:1503): avc: denied { read } for name="com.android.theme.icon_pack.rounded.launcher" dev="sda31" ino=2097435 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c46,c256,c512,c768 tclass=dir permissive=1 11-01 15:03:17.682 535 535 I recovery: type=1400 audit(0.0:1504): avc: denied { open } for path="/data/data/com.android.theme.icon_pack.rounded.launcher" dev="sda31" ino=2097435 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c46,c256,c512,c768 tclass=dir permissive=1 11-01 15:03:17.682 535 535 I recovery: type=1400 audit(0.0:1505): avc: denied { search } for name="com.android.theme.icon_pack.rounded.launcher" dev="sda31" ino=2097435 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c46,c256,c512,c768 tclass=dir permissive=1 11-01 15:03:17.739 535 535 I recovery: type=1400 audit(0.0:1506): avc: denied { getattr } for path="/data/data/yiuo.mobile.tv/app_webview/variations_seed_new" dev="sda31" ino=2771843 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c188,c256,c512,c768 tclass=file permissive=1 11-01 15:03:18.715 535 535 I recovery: type=1400 audit(0.0:1557): avc: denied { getattr } for path="/data/data/com.superthomaslab.hueessentials/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core/5DABE60800A1-0001-6485-476CFAF095D8BeginSession.cls" dev="sda31" ino=3147866 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c119,c256,c512,c768 tclass=file permissive=1 11-01 15:03:18.722 535 535 I recovery: type=1400 audit(0.0:1558): avc: denied { getattr } for path="/data/data/com.mixplorer/databases/packages" dev="sda31" ino=2622127 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c220,c256,c512,c768 tclass=file permissive=1 11-01 15:03:18.922 535 535 I recovery: type=1400 audit(0.0:1559): avc: denied { getattr } for path="/data/data/com.google.android.inputmethod.latin/no_backup/com.google.android.gms.appid-no-backup" dev="sda31" ino=2228574 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c114,c256,c512,c768 tclass=file permissive=1 11-01 15:03:18.999 535 535 I recovery: type=1400 audit(0.0:1560): avc: denied { getattr } for path="/data/data/com.google.android.apps.docs/app_apps_15532918130581242425506/app5385201941757380120.cache" dev="sda31" ino=2491668 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c210,c256,c512,c768 tclass=file permissive=1 11-01 15:03:19.045 535 535 I recovery: type=1400 audit(0.0:1561): avc: denied { getattr } for path="/data/data/com.android.gpstest.osmdroid/shared_prefs/WebViewChromiumPrefs.xml" dev="sda31" ino=2360524 scontext=u:r:recovery:s0 tcontext=u:object_r:app_data_file:s0:c179,c256,c512,c768 tclass=file permissive=1 11-01 15:03:19.701 623 623 E adbd : aio: got error event on read total bufs 1: Cannot send after transport endpoint shutdown 11-01 15:03:19.701 623 623 E adbd : remote usb: read terminated (message): Cannot send after transport endpoint shutdown 11-01 15:03:19.725 535 535 I recovery: type=1400 audit(0.0:1623): avc: denied { write } for name="sbin" dev="rootfs" ino=12810 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1 11-01 15:03:19.725 535 535 I recovery: type=1400 audit(0.0:1622): avc: denied { create } for name="twadbfifo" scontext=u:r:recovery:s0 tcontext=u:object_r:tmpfs:s0 tclass=fifo_file permissive=1 11-01 15:03:19.725 535 535 I recovery: type=1400 audit(0.0:1624): avc: denied { remove_name } for name="orsin" dev="rootfs" ino=26876 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1 11-01 15:03:19.725 535 535 I recovery: type=1400 audit(0.0:1625): avc: denied { unlink } for name="orsin" dev="rootfs" ino=26876 scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=fifo_file permissive=1 11-01 15:03:19.725 535 535 I recovery: type=1400 audit(0.0:1626): avc: denied { add_name } for name="orsin" scontext=u:r:recovery:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1 11-01 15:03:19.728 652 653 I adbd : initializing functionfs 11-01 15:03:19.728 652 653 I adbd : opening control endpoint /dev/usb-ffs/adb/ep0 11-01 15:03:19.731 652 653 I adbd : functionfs successfully initialized 11-01 15:03:19.731 652 653 I adbd : registering usb transport 11-01 15:03:19.732 652 657 E cutils-trace: Error opening trace file: No such file or directory (2) 11-01 15:04:02.229 535 535 I recovery: type=1400 audit(0.0:1639): avc: denied { getattr } for path="/persist" dev="sda23" ino=2 scontext=u:r:recovery:s0 tcontext=u:object_r:mnt_vendor_file:s0 tclass=dir permissive=1