[ 7.029734] [ T1] init: Parsing file /vendor/etc/init/android.hardware.security.keymint-service.optee.rc... [ 7.029893] [ T1] init: Parsing file /vendor/etc/init/android.hardware.thermal-service.rockchip.rc... [ 7.030049] [ T1] init: Parsing file /vendor/etc/init/android.hardware.tv.hdmi.cec-service.rc... [ 7.030208] [ T1] init: Parsing file /vendor/etc/init/android.hardware.tv.hdmi.connection-service.rc... [ 7.030366] [ T1] init: Parsing file /vendor/etc/init/android.hardware.usb-service.rc... [ 7.030615] [ T1] init: Parsing file /vendor/etc/init/android.hardware.usb.gadget-service.rockchip.rc... [ 7.030784] [ T1] init: Parsing file /vendor/etc/init/android.hardware.weaver-service.optee.rc... [ 7.030943] [ T1] init: Parsing file /vendor/etc/init/android.hardware.wifi-service.rc... [ 7.031099] [ T1] init: Parsing file /vendor/etc/init/boringssl_self_test.rc... [ 7.031331] [ T1] init: Parsing file /vendor/etc/init/cas-default.rc... [ 7.031496] [ T1] init: Parsing file /vendor/etc/init/hostapd.android.rc... [ 7.031672] [ T1] init: Parsing file /vendor/etc/init/hwc3-rk.rc... [ 7.031833] [ T1] init: Parsing file /vendor/etc/init/init.hdcp2-host.rc... [ 7.031998] [ T1] init: Parsing file /vendor/etc/init/init.pq-init.rc... [ 7.032158] [ T1] init: Parsing file /vendor/etc/init/init.rockchip.akmd.rc... [ 7.032320] [ T1] init: Parsing file /vendor/etc/init/init.rockchip_udc_detector.rc... [ 7.032482] [ T1] init: Parsing file /vendor/etc/init/init.tee-supplicant.rc... [ 7.032602] [ T1] init: Parsing file /vendor/etc/init/init.tune_io.rc... [ 7.032738] [ T1] init: Parsing file /vendor/etc/init/lights-rockchip.rc... [ 7.032859] [ T1] init: Parsing file /vendor/etc/init/power-aidl-rockchip.rc... [ 7.032977] [ T1] init: Parsing file /vendor/etc/init/rockchip.hardware.outputmanager@1.0-service.rc... [ 7.033092] [ T1] init: Parsing file /vendor/etc/init/rockchip.hardware.rockit.hw@1.0-service.rc... [ 7.033219] [ T1] init: 'writepid /dev/cpuset/foreground/tasks' is converted into 'task_profiles ProcessCapacityHigh' for service vendor.rockit-hal-1-0 [ 7.033227] [ T1] init: Parsing file /vendor/etc/init/vendor_flash_recovery.rc... [ 7.033343] [ T1] init: Parsing file /vendor/etc/init/vndservicemanager.rc... [ 7.033482] [ T1] init: Parsing file /odm/etc/init... [ 7.033493] [ T1] init: Unable to read config file '/odm/etc/init': open() failed: No such file or directory [ 7.033507] [ T1] init: Parsing file /product/etc/init... [ 7.033516] [ T1] init: Unable to read config file '/product/etc/init': open() failed: No such file or directory [ 7.033959] [ T1] init: processing action (SetupCgroups) from (:0) [ 7.036522] [ T1] cgroup: Unknown subsys name 'memoryapps' [ 7.036543] [ T1] libprocessgroup: Failed to mount optional controller memoryapps: Invalid argument [ 7.036571] [ T1] cgroup: Unknown subsys name 'schedtune' [ 7.036580] [ T1] libprocessgroup: Failed to mount optional controller schedtune: Invalid argument [ 7.039974] [ T1] init: processing action (SetKptrRestrict) from (:0) [ 7.040095] [ T1] init: processing action (TestPerfEventSelinux) from (:0) [ 7.040113] [ T1] init: Permissive SELinux boot, forcing sys.init.perf_lsm_hooks to 1. [ 7.040280] [ T1] init: processing action (ConnectEarlyStageSnapuserd) from (:0) [ 7.040318] [ T1] init: processing action (early-init) from (/system/etc/init/hw/init.rc:15) [ 7.041002] [ T1] init: Command 'mkdir /acct/uid' action=early-init (/system/etc/init/hw/init.rc:30) took 0ms and failed: mkdir() failed on /acct/uid: Read-only file system [ 7.042220] [ T1] init: starting service 'ueventd'... [ 7.051355] [ T1] init: ... started service 'ueventd' has pid 217 [ 7.051677] [ T1] init: starting service 'apexd-bootstrap'... [ 7.053331] [ T1] init: ... started service 'apexd-bootstrap' has pid 219 [ 7.053352] [ T1] init: SVC_EXEC service 'apexd-bootstrap' pid 219 (uid 0 gid 1000+0 context default) started; waiting... [ 7.075210] [ T217] ueventd: ueventd started! [ 7.078514] [ T217] selinux: SELinux: Loaded file context from: [ 7.078543] [ T217] selinux: /system/etc/selinux/plat_file_contexts [ 7.078555] [ T217] selinux: /system_ext/etc/selinux/system_ext_file_contexts [ 7.078565] [ T217] selinux: /vendor/etc/selinux/vendor_file_contexts [ 7.078966] [ T217] ueventd: Parsing file /system/etc/ueventd.rc... [ 7.079315] [ T217] ueventd: Added '/vendor/etc/ueventd.rc' to import list [ 7.079333] [ T217] ueventd: Added '/odm/etc/ueventd.rc' to import list [ 7.079577] [ T217] ueventd: Parsing file /vendor/etc/ueventd.rc... [ 7.079976] [ T217] ueventd: Added '/vendor/etc/ueventd.car.rc' to import list [ 7.080413] [ T217] ueventd: Parsing file /vendor/etc/ueventd.car.rc... [ 7.080438] [ T217] ueventd: Unable to read config file '/vendor/etc/ueventd.car.rc': open() failed: No such file or directory [ 7.080458] [ T217] ueventd: Parsing file /odm/etc/ueventd.rc... [ 7.080475] [ T217] ueventd: Unable to read config file '/odm/etc/ueventd.rc': open() failed: No such file or directory [ 7.082007] [ T219] apexd: Bootstrap subcommand detected [ 7.082474] [ T219] cutils-trace: Error opening trace file: No such file or directory (2) [ 7.082572] [ T219] apexd-bootstrap: Scanning /system/apex for pre-installed ApexFiles [ 7.082855] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.ondevicepersonalization.capex [ 7.084152] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.ipsec.capex [ 7.085213] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.devicelock.apex [ 7.086153] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.media.swcodec.capex [ 7.087224] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.configinfrastructure.capex [ 7.088543] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.adbd.capex [ 7.089804] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.appsearch.capex [ 7.090930] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.rkpd.apex [ 7.091708] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.conscrypt.capex [ 7.092864] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.runtime.apex [ 7.093987] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.media.capex [ 7.095191] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.vndk.current.apex [ 7.095953] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.os.statsd.apex [ 7.096999] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.art.capex [ 7.098217] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.tethering.capex [ 7.099925] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.extservices.capex [ 7.101201] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.scheduling.capex [ 7.102301] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.neuralnetworks.capex [ 7.103545] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.virt.apex [ 7.104289] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.mediaprovider.capex [ 7.105770] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.btservices.apex [ 7.106622] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.healthfitness.apex [ 7.107554] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.permission.capex [ 7.109053] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.sdkext.apex [ 7.109911] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.i18n.apex [ 7.110822] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.apex.cts.shim.apex [ 7.111746] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.wifi.capex [ 7.113189] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.adservices.capex [ 7.114597] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.tzdata.apex [ 7.115382] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.resolv.capex [ 7.116770] [ T219] apexd-bootstrap: Found pre-installed APEX /system/apex/com.android.uwb.capex [ 7.118185] [ T219] apexd-bootstrap: Scanning /system_ext/apex for pre-installed ApexFiles [ 7.118213] [ T219] apexd-bootstrap: /system_ext/apex does not exist. Skipping [ 7.118221] [ T219] apexd-bootstrap: Scanning /product/apex for pre-installed ApexFiles [ 7.118238] [ T219] apexd-bootstrap: /product/apex does not exist. Skipping [ 7.118245] [ T219] apexd-bootstrap: Scanning /vendor/apex for pre-installed ApexFiles [ 7.118587] [ T219] apexd-bootstrap: Found pre-installed APEX /vendor/apex/com.rockchip.hardware.sensors.apex [ 7.119548] [ T219] apexd-bootstrap: Found bootstrap APEX /system/apex/com.android.i18n.apex [ 7.119561] [ T219] apexd-bootstrap: Found bootstrap APEX /system/apex/com.android.vndk.current.apex [ 7.119569] [ T219] apexd-bootstrap: Found bootstrap APEX /system/apex/com.android.tzdata.apex [ 7.119577] [ T219] apexd-bootstrap: Found bootstrap APEX /system/apex/com.android.runtime.apex [ 7.119598] [ T219] apexd-bootstrap: Need to pre-allocate 36 loop devices for 32 APEX packages [ 7.119645] [ T219] apexd-bootstrap: No block apex metadata partition found, not adding block apexes [ 7.177146] [ T219] apexd-bootstrap: wait for '/dev/loop-control' took 57ms [ 7.177473] [ T68] audit: type=1400 audit(1758284065.040:10): avc: denied { create } for pid=66 comm="kdevtmpfs" name="loop16" scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=1 [ 7.211276] [ T219] apexd-bootstrap: Found 16 idle loopback devices that were pre-allocated by kernel. Allocated 20 more. [ 7.219476] [ T261] loop0: detected capacity change from 0 to 78584 [ 7.220210] [ T262] loop1: detected capacity change from 0 to 84448 [ 7.220705] [ T263] loop2: detected capacity change from 0 to 1616 [ 7.221494] [ T264] loop3: detected capacity change from 0 to 20424 [ 7.243468] [ T264] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 7.243514] [ T264] apexd-bootstrap: Successfully mounted package /system/apex/com.android.runtime.apex on /apex/com.android.runtime@1 duration=24 [ 7.244205] [ T263] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 7.244237] [ T263] apexd-bootstrap: Successfully mounted package /system/apex/com.android.tzdata.apex on /apex/com.android.tzdata@340090000 duration=24 [ 7.245808] [ T262] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 7.245867] [ T262] apexd-bootstrap: Successfully mounted package /system/apex/com.android.vndk.current.apex on /apex/com.android.vndk.v34@1 duration=26 [ 7.246217] [ T261] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 7.246248] [ T261] apexd-bootstrap: Successfully mounted package /system/apex/com.android.i18n.apex on /apex/com.android.i18n@1 duration=27 [ 7.247160] [ T219] apexd-bootstrap: Activated 4 packages. [ 7.250823] [ T219] apexd-bootstrap: OnBootstrap done, duration=168 [ 7.252515] [ T1] init: Service 'apexd-bootstrap' (pid 219) exited with status 0 waiting took 0.200000 seconds [ 7.252532] [ T1] init: Sending signal 9 to service 'apexd-bootstrap' (pid 219) process group... [ 7.252602] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 219 in 0ms [ 7.296650] [ T1] init: linkerconfig generated /linkerconfig with mounted APEX modules info [ 7.301373] [ T1] init: processing action (early-init) from (/init.environ.rc:2) [ 7.301489] [ T1] init: processing action (early-init) from (/vendor/etc/init/hw/init.rockchip.rc:6) [ 7.302364] [ T1] init: starting service 'vendor.insmod_sh'... [ 7.306663] [ T1] init: ... started service 'vendor.insmod_sh' has pid 270 [ 7.306741] [ T1] init: processing action (ro.debuggable=1 && early-init) from (/vendor/etc/init/hw/init.rockchip.rc:77) [ 7.313824] [ T1] init: processing action (early-init) from (/vendor/etc/init/hw/init.rk3588.rc:89) [ 7.337971] [ T217] ueventd: Coldboot took 0.257 seconds [ 7.351449] [ T1] init: processing action (ro.product.debugfs_restrictions.enabled=true && early-init) from (/system/etc/init/init-debug.rc:10) [ 7.351514] [ T1] init: Command 'mount debugfs debugfs /sys/kernel/debug' action=ro.product.debugfs_restrictions.enabled=true && early-init (/system/etc/init/init-debug.rc:11) took 0ms and failed: mount() failed: Device or resource busy [ 7.351547] [ T1] init: processing action (early-init) from (/system/etc/init/prng_seeder.rc:5) [ 7.351663] [ T1] init: starting service 'prng_seeder'... [ 7.351809] [ T1] init: Created socket '/dev/socket/prng_seeder', mode 666, user 1092, group 1092 [ 7.353718] [ T1] init: ... started service 'prng_seeder' has pid 273 [ 7.353745] [ T1] init: processing action (ro.product.cpu.abilist32=* && early-init) from (/vendor/etc/init/boringssl_self_test.rc:2) [ 7.353875] [ T1] init: starting service 'boringssl_self_test32_vendor'... [ 7.355280] [ T1] init: ... started service 'boringssl_self_test32_vendor' has pid 274 [ 7.355296] [ T1] init: SVC_EXEC service 'boringssl_self_test32_vendor' pid 274 (uid 0 gid 0+0 context default) started; waiting... [ 7.435937] [ T1] init: Service 'boringssl_self_test32_vendor' (pid 274) exited with status 0 waiting took 0.081000 seconds [ 7.435958] [ T1] init: Sending signal 9 to service 'boringssl_self_test32_vendor' (pid 274) process group... [ 7.436021] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 274 in 0ms [ 7.436265] [ T1] init: processing action (ro.product.cpu.abilist64=* && early-init) from (/vendor/etc/init/boringssl_self_test.rc:4) [ 7.436450] [ T1] init: starting service 'boringssl_self_test64_vendor'... [ 7.437781] [ T1] init: ... started service 'boringssl_self_test64_vendor' has pid 280 [ 7.437797] [ T1] init: SVC_EXEC service 'boringssl_self_test64_vendor' pid 280 (uid 0 gid 0+0 context default) started; waiting... [ 7.438513] [ T1] init: Service 'vendor.insmod_sh' (pid 270) exited with status 0 oneshot service took 0.134000 seconds in background [ 7.438524] [ T1] init: Sending signal 9 to service 'vendor.insmod_sh' (pid 270) process group... [ 7.438583] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 270 in 0ms [ 7.478027] [ T1] init: Service 'boringssl_self_test64_vendor' (pid 280) exited with status 0 waiting took 0.040000 seconds [ 7.478043] [ T1] init: Sending signal 9 to service 'boringssl_self_test64_vendor' (pid 280) process group... [ 7.478103] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 280 in 0ms [ 7.478293] [ T1] init: processing action (wait_for_coldboot_done) from (:0) [ 7.478305] [ T1] init: start_waiting_for_property("ro.cold_boot_done", "true"): already set [ 7.478320] [ T1] init: processing action (SetMmapRndBits) from (:0) [ 7.478493] [ T1] init: processing action (KeychordInit) from (:0) [ 7.478556] [ T1] init: EVIOCSMASK not supported: Invalid argument [ 7.478832] [ T1] init: processing action (init) from (/system/etc/init/hw/init.rc:97) [ 7.478989] [ T1] init: Command 'copy /system/etc/prop.default /dev/urandom' action=init (/system/etc/init/hw/init.rc:102) took 0ms and failed: Could not read input file '/system/etc/prop.default': open() failed: No such file or directory [ 7.481790] [ T1] init: Command 'write /dev/blkio/blkio.weight 1000' action=init (/system/etc/init/hw/init.rc:238) took 0ms and failed: Unable to write to file '/dev/blkio/blkio.weight': open() failed: Permission denied [ 7.481893] [ T1] init: Command 'write /dev/blkio/background/blkio.weight 200' action=init (/system/etc/init/hw/init.rc:239) took 0ms and failed: Unable to write to file '/dev/blkio/background/blkio.weight': open() failed: Permission denied [ 7.482086] [ T1] init: Command 'write /dev/blkio/blkio.group_idle 0' action=init (/system/etc/init/hw/init.rc:241) took 0ms and failed: Unable to write to file '/dev/blkio/blkio.group_idle': open() failed: Permission denied [ 7.482187] [ T1] init: Command 'write /dev/blkio/background/blkio.group_idle 0' action=init (/system/etc/init/hw/init.rc:242) took 0ms and failed: Unable to write to file '/dev/blkio/background/blkio.group_idle': open() failed: Permission denied [ 7.489639] [ T1] Registered swp emulation handler [ 7.490161] [ T1] init: starting service 'logd'... [ 7.490268] [ T1] init: Created socket '/dev/socket/logd', mode 666, user 1036, group 1036 [ 7.490342] [ T1] init: Created socket '/dev/socket/logdr', mode 666, user 1036, group 1036 [ 7.490426] [ T1] init: Created socket '/dev/socket/logdw', mode 222, user 1036, group 1036 [ 7.492334] [ T1] init: ... started service 'logd' has pid 281 [ 7.492603] [ T1] init: starting service 'lmkd'... [ 7.492723] [ T1] init: Created socket '/dev/socket/lmkd', mode 660, user 1000, group 1000 [ 7.494667] [ T1] init: ... started service 'lmkd' has pid 282 [ 7.494812] [ T1] init: starting service 'servicemanager'... [ 7.496655] [ T1] init: ... started service 'servicemanager' has pid 283 [ 7.496796] [ T1] init: starting service 'hwservicemanager'... [ 7.498202] [ T284] libprocessgroup: SetCgroup::ExecuteForProcess: failed to open /dev/stune/foreground/cgroup.procs: No such file or directory [ 7.498217] [ T284] libprocessgroup: Failed to apply HighPerformance process profile [ 7.498223] [ T284] init: failed to set task profiles [ 7.498474] [ T1] init: ... started service 'hwservicemanager' has pid 284 [ 7.498615] [ T1] init: starting service 'vndservicemanager'... [ 7.500424] [ T1] init: ... started service 'vndservicemanager' has pid 285 [ 7.500458] [ T1] init: processing action (ro.product.cpu.abilist32=* && init) from (/system/etc/init/hw/init.rc:484) [ 7.500576] [ T1] init: starting service 'boringssl_self_test32'... [ 7.502485] [ T1] init: ... started service 'boringssl_self_test32' has pid 287 [ 7.502508] [ T1] init: SVC_EXEC service 'boringssl_self_test32' pid 287 (uid 9999 gid 0+0 context default) started; waiting... [ 7.508782] [ T215] init: Unable to set property 'ro.logd.kernel' from uid:1036 gid:1036 pid:281: Read-only property was already set [ 7.515623] [ T283] servicemanager: Starting sm instance on /dev/binder [ 7.518696] [ T281] logd.auditd: start [ 7.518711] [ T281] logd.klogd: 4182369751 [ 7.520788] [ T283] SELinux: SELinux: Loaded service context from: [ 7.520853] [ T283] SELinux: /system/etc/selinux/plat_service_contexts [ 7.520881] [ T283] SELinux: /system_ext/etc/selinux/system_ext_service_contexts [ 7.520907] [ T283] SELinux: /vendor/etc/selinux/vendor_service_contexts [ 7.524499] [ T281] logd: Loaded bug_map file: /system_ext/etc/selinux/bug_map [ 7.524535] [ T281] logd: Loaded bug_map file: /vendor/etc/selinux/selinux_denial_metadata [ 7.524734] [ T281] logd: Loaded bug_map file: /system/etc/selinux/bug_map [ 7.538440] [ T285] vndservicemanager: Starting sm instance on /dev/vndbinder [ 7.538996] [ T285] SELinux: SELinux: Loaded vndservice context from: [ 7.539003] [ T285] SELinux: /vendor/etc/selinux/vndservice_contexts [ 7.557241] [ T1] init: Service 'boringssl_self_test32' (pid 287) exited with status 0 waiting took 0.055000 seconds [ 7.557257] [ T1] init: Sending signal 9 to service 'boringssl_self_test32' (pid 287) process group... [ 7.557318] [ T1] libprocessgroup: Successfully killed process cgroup uid 9999 pid 287 in 0ms [ 7.557682] [ T1] init: processing action (ro.product.cpu.abilist64=* && init) from (/system/etc/init/hw/init.rc:486) [ 7.557786] [ T1] init: starting service 'boringssl_self_test64'... [ 7.559529] [ T1] init: ... started service 'boringssl_self_test64' has pid 296 [ 7.559571] [ T1] init: SVC_EXEC service 'boringssl_self_test64' pid 296 (uid 9999 gid 0+0 context default) started; waiting... [ 7.590302] [ T1] init: Service 'boringssl_self_test64' (pid 296) exited with status 0 waiting took 0.031000 seconds [ 7.590320] [ T1] init: Sending signal 9 to service 'boringssl_self_test64' (pid 296) process group... [ 7.590372] [ T1] libprocessgroup: Successfully killed process cgroup uid 9999 pid 296 in 0ms [ 7.590761] [ T1] init: processing action (ro.debuggable=1 && init) from (/system/etc/init/hw/init.rc:1315) [ 7.590882] [ T1] init: starting service 'console'... [ 7.592750] [ T1] init: ... started service 'console' has pid 297 [ 7.592823] [ T1] init: processing action (init) from (/system/etc/init/hw/init.usb.rc:27) [ 7.593009] [ T1] init: processing action (init) from (/vendor/etc/init/hw/init.rk30board.rc:20) [ 7.593671] [ T295] type=1400 audit(1758284065.456:14): avc: denied { write } for comm="init" name="enable" dev="debugfs" ino=1134 scontext=u:r:vendor_init:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1 [ 7.593703] [ T295] type=1400 audit(1758284065.456:15): avc: denied { open } for comm="init" path="/sys/kernel/debug/regulator/vcc5v0_host/enable" dev="debugfs" ino=1134 scontext=u:r:vendor_init:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1 [ 7.594839] [ T1] init: processing action (init) from (/vendor/etc/init/hw/init.rk30board.environment.rc:1) [ 7.594939] [ T1] init: processing action (init) from (/vendor/etc/init/hw/init.mount_all.rc:3) [ 7.595122] [ T1] init: starting service 'tee-supplicant'... [ 7.598703] [ T1] init: ... started service 'tee-supplicant' has pid 298 [ 7.599684] [ T1] init: starting service 'vendor.keymint-default'... [ 7.603038] [ T1] init: ... started service 'vendor.keymint-default' has pid 299 [ 7.603214] [ T1] init: Command 'start vendor.keymaster-4-0' action=init (/vendor/etc/init/hw/init.mount_all.rc:6) took 0ms and failed: service vendor.keymaster-4-0 not found [ 7.603258] [ T1] init: processing action (init) from (/vendor/etc/init/hw/init.rk3588.rc:71) [ 7.604722] [ T1] init: Command 'chmod 0666 /sys/class/devfreq/dmc/system_status' action=init (/vendor/etc/init/hw/init.rk3588.rc:80) took 0ms and failed: fchmodat() failed: Operation not supported on transport endpoint [ 7.605680] [ T1] init: processing action (init) from (/system/etc/init/audioserver.rc:58) [ 7.606322] [ T1] init: processing action (late-init) from (/system/etc/init/hw/init.rc:532) [ 7.606397] [ T1] init: processing action (late-init) from (/system/etc/init/atrace.rc:3) [ 7.610303] [ T295] type=1400 audit(1758284065.472:16): avc: denied { write } for comm="tee-supplicant" name="property_service" dev="tmpfs" ino=366 scontext=u:r:tee:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=1 [ 7.610417] [ T295] type=1400 audit(1758284065.472:17): avc: denied { connectto } for comm="tee-supplicant" path="/dev/socket/property_service" scontext=u:r:tee:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket permissive=1 [ 7.610445] [ T295] type=1107 audit(1758284065.472:18): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.security.tee_supplicant pid=298 uid=0 gid=0 scontext=u:r:tee:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=1' [ 7.615885] [ T1] init: Command 'copy /system/etc/ftrace_synthetic_events.conf /sys/kernel/tracing/synthetic_events' action=late-init (/system/etc/init/atrace.rc:294) took 0ms and failed: Could not write to output file '/sys/kernel/tracing/synthetic_events': open() failed: Permission denied [ 7.615977] [ T1] init: Command 'copy /system/etc/ftrace_synthetic_events.conf /sys/kernel/debug/tracing/synthetic_events' action=late-init (/system/etc/init/atrace.rc:295) took 0ms and failed: Could not write to output file '/sys/kernel/debug/tracing/synthetic_events': open() failed: Permission denied [ 7.616059] [ T1] init: processing action (queue_property_triggers) from (:0) [ 7.616084] [ T1] init: processing action (early-fs) from (/system/etc/init/hw/init.rc:565) [ 7.616174] [ T1] init: starting service 'vold'... [ 7.617700] [ T1] init: ... started service 'vold' has pid 301 [ 7.617725] [ T1] init: processing action (early-fs) from (/vendor/etc/init/hw/init.mount_all.rc:8) [ 7.617779] [ T1] init: service 'vold' requested start, but it is already running (flags: 2052) [ 7.617789] [ T1] init: processing action (early-fs) from (/vendor/etc/init/init.rockchip_udc_detector.rc:8) [ 7.617908] [ T1] init: starting service 'rockchip_udc_detector'... [ 7.619491] [ T1] init: ... started service 'rockchip_udc_detector' has pid 302 [ 7.619628] [ T1] init: processing action (fs) from (/vendor/etc/init/hw/init.mount_all.rc:11) [ 7.620907] [ T1] init: [libfs_mgr] superblock s_max_mnt_count:65535,/dev/block/by-name/cache [ 7.621042] [ T1] EXT4-fs: Ignoring removed nomblk_io_submit option [ 7.630653] [ T1] EXT4-fs (mmcblk0p11): mounted filesystem with ordered data mode. Quota mode: none. [ 7.630710] [ T1] init: [libfs_mgr] check_fs(): mount(/dev/block/by-name/cache,/cache,ext4)=0: Success [ 7.632189] [ T1] EXT4-fs (mmcblk0p11): unmounting filesystem. [ 7.634170] [ T1] init: [libfs_mgr] umount_retry(): unmount(/cache) succeeded [ 7.634406] [ T1] init: [libfs_mgr] Running /system/bin/e2fsck on /dev/block/mmcblk0p11 [ 7.652028] [ T1] e2fsck: e2fsck 1.46.6 (1-Feb-2023) [ 7.656777] [ T1] e2fsck: /dev/block/by-name/cache: clean, 37/98304 files, 16743/98304 blocks [ 7.661809] [ T1] EXT4-fs (mmcblk0p11): mounted filesystem with ordered data mode. Quota mode: none. [ 7.661879] [ T1] init: [libfs_mgr] __mount(source=/dev/block/by-name/cache,target=/cache,type=ext4)=0: Success [ 7.663619] [ T1] init: [libfs_mgr] superblock s_max_mnt_count:65535,/dev/block/by-name/custom [ 7.663701] [ T1] EXT4-fs: Ignoring removed nomblk_io_submit option [ 7.670136] [ T1] EXT4-fs (mmcblk0p9): mounted filesystem with ordered data mode. Quota mode: none. [ 7.670211] [ T1] init: [libfs_mgr] check_fs(): mount(/dev/block/by-name/custom,/vendor/custom,ext4)=0: Success [ 7.672453] [ T1] EXT4-fs (mmcblk0p9): unmounting filesystem. [ 7.674743] [ T1] init: [libfs_mgr] umount_retry(): unmount(/vendor/custom) succeeded [ 7.674880] [ T1] init: [libfs_mgr] Running /system/bin/e2fsck on /dev/block/mmcblk0p9 [ 7.681557] [ T1] e2fsck: e2fsck 1.46.6 (1-Feb-2023) [ 7.682500] [ T1] e2fsck: /dev/block/by-name/custom: clean, 17/6400 files, 1444/25600 blocks [ 7.686024] [ T295] type=1400 audit(1758284065.548:19): avc: denied { read } for comm="android.hardwar" name="u:object_r:serialno_prop:s0" dev="tmpfs" ino=280 scontext=u:r:hal_keymint_default:s0 tcontext=u:object_r:serialno_prop:s0 tclass=file permissive=1 [ 7.686129] [ T295] type=1400 audit(1758284065.548:20): avc: denied { open } for comm="android.hardwar" path="/dev/__properties__/u:object_r:serialno_prop:s0" dev="tmpfs" ino=280 scontext=u:r:hal_keymint_default:s0 tcontext=u:object_r:serialno_prop:s0 tclass=file permissive=1 [ 7.686197] [ T295] type=1400 audit(1758284065.548:21): avc: denied { getattr } for comm="android.hardwar" path="/dev/__properties__/u:object_r:serialno_prop:s0" dev="tmpfs" ino=280 scontext=u:r:hal_keymint_default:s0 tcontext=u:object_r:serialno_prop:s0 tclass=file permissive=1 [ 7.686259] [ T295] type=1400 audit(1758284065.548:22): avc: denied { map } for comm="android.hardwar" path="/dev/__properties__/u:object_r:serialno_prop:s0" dev="tmpfs" ino=280 scontext=u:r:hal_keymint_default:s0 tcontext=u:object_r:serialno_prop:s0 tclass=file permissive=1 [ 7.686319] [ T295] type=1400 audit(1758284065.548:23): avc: denied { read } for comm="android.hardwar" name="u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_keymint_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 7.686395] [ T295] type=1400 audit(1758284065.548:24): avc: denied { open } for comm="android.hardwar" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_keymint_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 7.686456] [ T295] type=1400 audit(1758284065.548:25): avc: denied { getattr } for comm="android.hardwar" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_keymint_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 7.686516] [ T295] type=1400 audit(1758284065.548:26): avc: denied { map } for comm="android.hardwar" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_keymint_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 7.686719] [ T283] servicemanager: getDeviceHalManifest: Reading VINTF information. [ 7.687088] [ T1] EXT4-fs (mmcblk0p9): mounted filesystem with ordered data mode. Quota mode: none. [ 7.687149] [ T1] init: [libfs_mgr] __mount(source=/dev/block/by-name/custom,target=/vendor/custom,type=ext4)=0: Success [ 7.690707] [ T283] servicemanager: getDeviceHalManifest: Successfully processed VINTF information [ 7.690717] [ T283] servicemanager: getFrameworkHalManifest: Reading VINTF information. [ 7.691358] [ T283] servicemanager: getFrameworkHalManifest: Successfully processed VINTF information [ 7.691373] [ T283] servicemanager: Found android.hardware.security.keymint.IKeyMintDevice/default in device VINTF manifest. [ 7.691615] [ T283] servicemanager: Found android.hardware.security.secureclock.ISecureClock/default in device VINTF manifest. [ 7.691728] [ T283] servicemanager: Found android.hardware.security.sharedsecret.ISharedSecret/default in device VINTF manifest. [ 7.691842] [ T283] servicemanager: Found android.hardware.security.keymint.IRemotelyProvisionedComponent/default in device VINTF manifest. [ 7.693377] [ T1] init: Command 'mount_all /vendor/etc/fstab.${ro.hardware} --early' action=fs (/vendor/etc/init/hw/init.mount_all.rc:12) took 73ms and succeeded [ 7.693471] [ T1] init: Service 'rockchip_udc_detector' (pid 302) exited with status 0 oneshot service took 0.074000 seconds in background [ 7.693499] [ T1] init: Sending signal 9 to service 'rockchip_udc_detector' (pid 302) process group... [ 7.693623] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 302 in 0ms [ 7.696405] [ T1] init: processing action (fs) from (/system/etc/init/logd.rc:29) [ 7.696775] [ T1] init: processing action (fs) from (/system/etc/init/wifi.rc:25) [ 7.696987] [ T1] init: processing action (post-fs) from (/system/etc/init/hw/init.rc:569) [ 7.697296] [ T1] init: starting service 'exec 1 (/system/bin/vdc checkpoint markBootAttempt)'... [ 7.700842] [ T1] init: ... started service 'exec 1 (/system/bin/vdc checkpoint markBootAttempt)' has pid 323 [ 7.700893] [ T1] init: SVC_EXEC service 'exec 1 (/system/bin/vdc checkpoint markBootAttempt)' pid 323 (uid 1000 gid 1000+0 context default) started; waiting... [ 7.721421] [ T1] init: Service 'exec 1 (/system/bin/vdc checkpoint markBootAttempt)' (pid 323) exited with status 0 waiting took 0.022000 seconds [ 7.721467] [ T1] init: Sending signal 9 to service 'exec 1 (/system/bin/vdc checkpoint markBootAttempt)' (pid 323) process group... [ 7.721601] [ T1] libprocessgroup: Successfully killed process cgroup uid 1000 pid 323 in 0ms [ 7.769588] [ T1] init: processing action (post-fs) from (/vendor/etc/init/hw/init.rockchip.rc:10) [ 7.770453] [ T1] init: processing action (post-fs) from (/system/etc/init/atrace_userdebug.rc:7) [ 7.770946] [ T1] init: processing action (post-fs) from (/system/etc/init/gsid.rc:8) [ 7.779178] [ T1] init: processing action (post-fs) from (/vendor/etc/init/android.hardware.usb-service.rc:7) [ 7.784158] [ T1] init: processing action (post-fs) from (/vendor/etc/init/init.hdcp2-host.rc:2) [ 7.784469] [ T1] init: starting service 'hdcp2_hdmi'... [ 7.788552] [ T1] init: ... started service 'hdcp2_hdmi' has pid 324 [ 7.788653] [ T1] init: processing action (post-fs) from (/vendor/etc/init/init.tee-supplicant.rc:2) [ 7.788763] [ T1] init: service 'tee-supplicant' requested start, but it is already running (flags: 4) [ 7.788866] [ T1] init: processing action (late-fs) from (/system/etc/init/hw/init.rc:643) [ 7.789528] [ T1] init: starting service 'system_suspend'... [ 7.793196] [ T1] init: ... started service 'system_suspend' has pid 325 [ 7.793565] [ T1] init: starting service 'keystore2'... [ 7.798543] [ T1] init: ... started service 'keystore2' has pid 326 [ 7.798605] [ T1] init: service 'vendor.keymint-default' requested start, but it is already running (flags: 4) [ 7.798932] [ T1] init: starting service 'exec 2 (/system/bin/fsverity_init --load-verified-keys)'... [ 7.802126] [ T1] init: ... started service 'exec 2 (/system/bin/fsverity_init --load-verified-keys)' has pid 327 [ 7.802192] [ T1] init: SVC_EXEC service 'exec 2 (/system/bin/fsverity_init --load-verified-keys)' pid 327 (uid 0 gid 0+0 context default) started; waiting... [ 7.810353] [ T1] init: Service 'exec 2 (/system/bin/fsverity_init --load-verified-keys)' (pid 327) exited with status 0 waiting took 0.009000 seconds [ 7.810408] [ T1] init: Sending signal 9 to service 'exec 2 (/system/bin/fsverity_init --load-verified-keys)' (pid 327) process group... [ 7.810548] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 327 in 0ms [ 7.810842] [ T1] init: processing action (late-fs) from (/system/etc/init/hw/init.rc:664) [ 7.811155] [ T1] init: processing action (late-fs) from (/vendor/etc/init/hw/init.mount_all.rc:14) [ 7.811313] [ T1] init: service 'servicemanager' requested start, but it is already running (flags: 2084) [ 7.811677] [ T1] init: starting service 'vendor.gralloc-v1'... [ 7.816100] [ T1] init: ... started service 'vendor.gralloc-v1' has pid 328 [ 7.816141] [ T1] init: Service 'hdcp2_hdmi' (pid 324) exited with status 1 oneshot service took 0.029000 seconds in background [ 7.816151] [ T1] init: Sending signal 9 to service 'hdcp2_hdmi' (pid 324) process group... [ 7.816208] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 324 in 0ms [ 7.816601] [ T1] init: Command 'start vendor.rockchip_hwcproxy_aidl' action=late-fs (/vendor/etc/init/hw/init.mount_all.rc:18) took 0ms and failed: service vendor.rockchip_hwcproxy_aidl not found [ 7.816746] [ T1] init: starting service 'hwcomposer-3'... [ 7.818490] [ T1] init: ... started service 'hwcomposer-3' has pid 329 [ 7.818672] [ T1] init: starting service 'surfaceflinger'... [ 7.818844] [ T1] init: Could not create socket 'pdx/system/vr/display/client': Failed to bind socket 'pdx/system/vr/display/client': No such file or directory [ 7.818920] [ T1] init: Could not create socket 'pdx/system/vr/display/manager': Failed to bind socket 'pdx/system/vr/display/manager': No such file or directory [ 7.819064] [ T1] init: Could not create socket 'pdx/system/vr/display/vsync': Failed to bind socket 'pdx/system/vr/display/vsync': No such file or directory [ 7.820760] [ T330] libprocessgroup: SetCgroup::ExecuteForProcess: failed to open /dev/stune/foreground/cgroup.procs: No such file or directory [ 7.820772] [ T330] libprocessgroup: Failed to apply HighPerformance process profile [ 7.820778] [ T330] init: failed to set task profiles [ 7.821245] [ T1] init: ... started service 'surfaceflinger' has pid 330 [ 7.821413] [ T1] init: starting service 'bootanim'... [ 7.821633] [ T283] servicemanager: Found android.system.suspend.ISystemSuspend/default in framework VINTF manifest. [ 7.823394] [ T333] libprocessgroup: SetCgroup::ExecuteForProcess: failed to open /dev/stune/top-app/cgroup.procs: No such file or directory [ 7.823406] [ T333] libprocessgroup: Failed to apply MaxPerformance process profile [ 7.823411] [ T333] init: failed to set task profiles [ 7.823793] [ T1] init: ... started service 'bootanim' has pid 333 [ 7.823900] [ T1] init: Command 'exec_start wait_for_optee' action=late-fs (/vendor/etc/init/hw/init.mount_all.rc:23) took 0ms and failed: Service not found [ 7.824267] [ T1] init: Calling: /system/bin/vdc checkpoint needsCheckpoint [ 7.849144] [ T334] vdc: Waited 0ms for vold [ 7.849437] [ T283] servicemanager: Could not find android.hardware.boot.IBootControl/default in the VINTF manifest. [ 7.849997] [ T301] vold: Error getting bootctrl v1.0 module. [ 7.850664] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 7.854274] [ T1] init: [libfs_mgr] Running /system/bin/fsck.f2fs -a -c 10000 --debug-cache /dev/block/mmcblk0p16 [ 7.875615] [ T1] fsck.f2fs: Info: Fix the reported corruption. [ 7.876728] [ T1] fsck.f2fs: Info: not exist /proc/version! [ 7.876959] [ T295] type=1400 audit(1758284065.740:27): avc: denied { search } for comm="fsck.f2fs" name="mmc0" dev="sysfs" ino=43316 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs_mmc:s0 tclass=dir permissive=1 [ 7.876997] [ T295] type=1400 audit(1758284065.740:28): avc: denied { getattr } for comm="fsck.f2fs" path="/sys/devices/platform/fe2e0000.mmc/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p16/partition" dev="sysfs" ino=45759 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs_mmc:s0 tclass=file permissive=1 [ 7.877017] [ T295] type=1400 audit(1758284065.740:29): avc: denied { read } for comm="fsck.f2fs" name="zoned" dev="sysfs" ino=45324 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs_mmc:s0 tclass=file permissive=1 [ 7.877036] [ T295] type=1400 audit(1758284065.740:30): avc: denied { open } for comm="fsck.f2fs" path="/sys/devices/platform/fe2e0000.mmc/mmc_host/mmc0/mmc0:0001/block/mmcblk0/queue/zoned" dev="sysfs" ino=45324 scontext=u:r:fsck:s0 tcontext=u:object_r:sysfs_mmc:s0 tclass=file permissive=1 [ 7.879058] [ T1] fsck.f2fs: Info: MKFS version [ 7.879064] [ T1] fsck.f2fs: "6.1.57" [ 7.879067] [ T1] fsck.f2fs: Info: FSCK version [ 7.879070] [ T1] fsck.f2fs: from "6.1.57" [ 7.879073] [ T1] fsck.f2fs: to "6.1.57" [ 7.879077] [ T1] fsck.f2fs: Info: superblock features = 1499 : encrypt verity extra_attr project_quota quota_ino casefold [ 7.879080] [ T1] fsck.f2fs: Info: superblock encrypt level = 0, salt = 00000000000000000000000000000000 [ 7.879084] [ T1] fsck.f2fs: Info: Segments per section = 1 [ 7.879087] [ T1] fsck.f2fs: Info: Sections per zone = 1 [ 7.879090] [ T1] fsck.f2fs: Info: total FS sectors = 113478592 (55409 MB) [ 7.883709] [ T1] fsck.f2fs: Info: CKPT version = 68444695 [ 7.883718] [ T1] fsck.f2fs: Info: version timestamp cur: 0, prev: 0 [ 7.883754] [ T1] fsck.f2fs: [update_superblock: 775] Info: Done to update superblock [ 7.888592] [ T1] fsck.f2fs: Info: checkpoint state = 185 : trimmed nat_bits compacted_summary unmount [ 7.888601] [ T1] fsck.f2fs: Info: No error was reported [ 7.888631] [ T1] fsck.f2fs: [ 7.888636] [ T1] fsck.f2fs: c, u, RA, CH, CM, Repl= [ 7.888641] [ T1] fsck.f2fs: 10000 9 9 0 9 0 [ 7.893476] [ T1] F2FS-fs (mmcblk0p16): Using encoding defined by superblock: utf8-12.1.0 with flags 0x0 [ 7.925747] [ T1] F2FS-fs (mmcblk0p16): Found nat_bits in checkpoint [ 7.954288] [ T283] servicemanager: Found android.system.keystore2.IKeystoreService/default in framework VINTF manifest. [ 8.117835] [ T1] F2FS-fs (mmcblk0p16): Mounted with checkpoint version = 68444695 [ 8.117933] [ T1] init: [libfs_mgr] __mount(source=/dev/block/by-name/userdata,target=/data,type=f2fs)=0: Success [ 8.122324] [ T1] init: Userdata mounted using /vendor/etc/fstab.rk30board result : 0 [ 8.122706] [ T1] init: Command 'mount_all /vendor/etc/fstab.${ro.hardware} --late' action=late-fs (/vendor/etc/init/hw/init.mount_all.rc:25) took 298ms and succeeded [ 8.123575] [ T1] init: processing action (late-fs) from (/vendor/etc/init/init.tune_io.rc:1) [ 8.124478] [ T1] init: processing action (post-fs-data) from (/system/etc/init/hw/init.rc:678) [ 8.124572] [ T1] init: starting service 'exec 3 (/system/bin/vdc checkpoint prepareCheckpoint)'... [ 8.125836] [ T1] init: ... started service 'exec 3 (/system/bin/vdc checkpoint prepareCheckpoint)' has pid 349 [ 8.125855] [ T1] init: SVC_EXEC service 'exec 3 (/system/bin/vdc checkpoint prepareCheckpoint)' pid 349 (uid 1000 gid 1000+0 context default) started; waiting... [ 8.132078] [ T1] init: Service 'exec 3 (/system/bin/vdc checkpoint prepareCheckpoint)' (pid 349) exited with status 0 waiting took 0.006000 seconds [ 8.132095] [ T1] init: Sending signal 9 to service 'exec 3 (/system/bin/vdc checkpoint prepareCheckpoint)' (pid 349) process group... [ 8.132159] [ T1] libprocessgroup: Successfully killed process cgroup uid 1000 pid 349 in 0ms [ 8.152009] [ T1] init: Command 'copy /data/system/entropy.dat /dev/urandom' action=post-fs-data (/system/etc/init/hw/init.rc:700) took 0ms and failed: Could not read input file '/data/system/entropy.dat': open() failed: No such file or directory [ 8.198621] [ T295] type=1400 audit(1758284066.060:31): avc: denied { read } for comm="android.hardwar" name="u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_graphics_composer_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 8.198737] [ T295] type=1400 audit(1758284066.060:32): avc: denied { open } for comm="android.hardwar" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_graphics_composer_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 8.198805] [ T295] type=1400 audit(1758284066.060:33): avc: denied { getattr } for comm="android.hardwar" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_graphics_composer_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 8.198868] [ T295] type=1400 audit(1758284066.060:34): avc: denied { map } for comm="android.hardwar" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_graphics_composer_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 8.204436] [ T1] init: starting service 'tombstoned'... [ 8.204595] [ T1] init: Created socket '/dev/socket/tombstoned_crash', mode 666, user 1000, group 1000 [ 8.204672] [ T1] init: Created socket '/dev/socket/tombstoned_intercept', mode 666, user 1000, group 1000 [ 8.204751] [ T1] init: Created socket '/dev/socket/tombstoned_java_trace', mode 666, user 1000, group 1000 [ 8.206630] [ T1] init: ... started service 'tombstoned' has pid 355 [ 8.206712] [ T1] init: Switched to default mount namespace [ 8.209528] [ T329] dwhdmi-rockchip fde80000.hdmi: use tmds mode [ 8.218926] [ T295] type=1400 audit(1758284066.080:35): avc: denied { open } for comm="surfaceflinger" path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=333 scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 [ 8.219034] [ T295] type=1400 audit(1758284066.080:36): avc: denied { getattr } for comm="surfaceflinger" path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=333 scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 [ 8.219099] [ T295] type=1400 audit(1758284066.080:37): avc: denied { map } for comm="surfaceflinger" path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=333 scontext=u:r:surfaceflinger:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 [ 8.219771] [ T283] servicemanager: Found android.hardware.graphics.composer3.IComposer/default in device VINTF manifest. [ 8.220962] [ T1] init: starting service 'exec 4 (/system/bin/vdc keymaster earlyBootEnded)'... [ 8.222414] [ T1] init: ... started service 'exec 4 (/system/bin/vdc keymaster earlyBootEnded)' has pid 363 [ 8.222436] [ T1] init: SVC_EXEC service 'exec 4 (/system/bin/vdc keymaster earlyBootEnded)' pid 363 (uid 1000 gid 1000+0 context default) started; waiting... [ 8.226612] [ T347] mali fb000000.gpu: Loading Mali firmware 0x1010000 [ 8.227537] [ T347] mali fb000000.gpu: Mali firmware git_sha: 221d2b3e5f4cf47df6227ccb24c82c4e4baa986e [ 8.274952] [ T283] servicemanager: Found android.hardware.graphics.composer3.IComposer/default in device VINTF manifest. [ 8.289890] [ T301] vold: keystore2 Keystore earlyBootEnded returned service specific error: -68 [ 8.290711] [ T1] init: Service 'exec 4 (/system/bin/vdc keymaster earlyBootEnded)' (pid 363) exited with status 0 waiting took 0.068000 seconds [ 8.290725] [ T1] init: Sending signal 9 to service 'exec 4 (/system/bin/vdc keymaster earlyBootEnded)' (pid 363) process group... [ 8.290796] [ T1] libprocessgroup: Successfully killed process cgroup uid 1000 pid 363 in 0ms [ 8.294778] [ T215] init: Could not load single persistent property file, trying legacy directory: Unable to read persistent property file: open() failed: No such file or directory [ 8.301057] [ T215] init: Wait for property 'ro.persistent_properties.ready=true' took 6ms [ 8.301201] [ T1] init: service 'logd' requested start, but it is already running (flags: 4) [ 8.301446] [ T1] init: starting service 'logd-reinit'... [ 8.305729] [ T1] init: ... started service 'logd-reinit' has pid 371 [ 8.305827] [ T1] init: Not setting encryption policy on: /data/apex [ 8.307544] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 8.311107] [ T293] logd: logd reinit [ 8.311171] [ T293] logd: Cannot read /data/misc/logd/event-log-tags [ 8.311745] [ T293] logd: FrameworkListener: read() failed (Connection reset by peer) [ 8.313919] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 8.314748] [ T1] init: Service 'logd-reinit' (pid 371) exited with status 0 oneshot service took 0.011000 seconds in background [ 8.314778] [ T1] init: Sending signal 9 to service 'logd-reinit' (pid 371) process group... [ 8.314901] [ T1] libprocessgroup: Successfully killed process cgroup uid 1036 pid 371 in 0ms [ 8.318904] [ T283] servicemanager: Since 'SurfaceFlingerAIDL' could not be found, trying to start it as a lazy AIDL service. (if it's not configured to be a lazy service, it may be stuck starting or still starting). [ 8.321174] [ T1] init: Control message: Could not find 'aidl/SurfaceFlingerAIDL' for ctl.interface_start from pid: 283 (/system/bin/servicemanager) [ 8.321450] [ T375] servicemanager: Tried to start aidl service SurfaceFlingerAIDL as a lazy service, but was unable to. Usually this happens when a service is not installed, but if the service is intended to be used as a lazy service, then it may be configured incorrectly. [ 8.327451] [ T1] init: service 'bootanim' requested start, but it is already running (flags: 134) [ 8.327470] [ T1] init: Control message: Processed ctl.start for 'bootanim' from pid: 330 (/system/bin/surfaceflinger) [ 8.327720] [ T329] dwhdmi-rockchip fde80000.hdmi: use tmds mode [ 8.327916] [ T283] BpBinder: onLastStrongRef automatically unlinking death recipients: [ 8.335599] [ T1] init: starting service 'apexd'... [ 8.339737] [ T1] init: ... started service 'apexd' has pid 384 [ 8.343219] [ T1] init: Command 'copy /data/misc/recovery/ro.build.fingerprint /data/misc/recovery/ro.build.fingerprint.1' action=post-fs-data (/system/etc/init/hw/init.rc:774) took 0ms and failed: Could not read input file '/data/misc/recovery/ro.build.fingerprint': open() failed: No such file or directory [ 8.350880] [ T1] init: Command 'copy /data/misc/recovery/proc/version /data/misc/recovery/proc/version.1' action=post-fs-data (/system/etc/init/hw/init.rc:781) took 0ms and failed: Could not read input file '/data/misc/recovery/proc/version': open() failed: No such file or directory [ 8.363020] [ T384] apexd: Scanning /system/apex for pre-installed ApexFiles [ 8.363140] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.ondevicepersonalization.capex [ 8.363303] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.ipsec.capex [ 8.363377] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.devicelock.apex [ 8.363488] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.media.swcodec.capex [ 8.363567] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.configinfrastructure.capex [ 8.363635] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.adbd.capex [ 8.363707] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.appsearch.capex [ 8.363776] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.rkpd.apex [ 8.363850] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.conscrypt.capex [ 8.363919] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.runtime.apex [ 8.363998] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.media.capex [ 8.364068] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.vndk.current.apex [ 8.364142] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.os.statsd.apex [ 8.364218] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.art.capex [ 8.364288] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.tethering.capex [ 8.364377] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.extservices.capex [ 8.364448] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.scheduling.capex [ 8.364514] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.neuralnetworks.capex [ 8.364583] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.virt.apex [ 8.364662] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.mediaprovider.capex [ 8.364732] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.btservices.apex [ 8.364815] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.healthfitness.apex [ 8.364891] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.permission.capex [ 8.364956] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.sdkext.apex [ 8.365028] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.i18n.apex [ 8.365107] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.apex.cts.shim.apex [ 8.365176] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.wifi.capex [ 8.365242] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.adservices.capex [ 8.365311] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.tzdata.apex [ 8.365384] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.resolv.capex [ 8.365453] [ T384] apexd: Found pre-installed APEX /system/apex/com.android.uwb.capex [ 8.365523] [ T384] apexd: Scanning /system_ext/apex for pre-installed ApexFiles [ 8.365534] [ T384] apexd: /system_ext/apex does not exist. Skipping [ 8.365538] [ T384] apexd: Scanning /product/apex for pre-installed ApexFiles [ 8.365545] [ T384] apexd: /product/apex does not exist. Skipping [ 8.365549] [ T384] apexd: Scanning /vendor/apex for pre-installed ApexFiles [ 8.365585] [ T384] apexd: Found pre-installed APEX /vendor/apex/com.rockchip.hardware.sensors.apex [ 8.365699] [ T384] apexd: No block apex metadata partition found, not adding block apexes [ 8.365705] [ T384] apexd: Populating APEX database from mounts... [ 8.365906] [ T384] apexd: 0 packages restored. [ 8.365955] [ T384] apexd: Marking APEXd as starting [ 8.366607] [ T384] apexd: Scanning /metadata/apex/sessions looking for sessions to be activated. [ 8.366717] [ T384] apexd: Scanning /data/apex/active for data ApexFiles [ 8.366890] [ T384] apexd: Selecting APEX for activation [ 8.366935] [ T384] apexd: Processing compressed APEX [ 8.366952] [ T384] apexd: Processing compressed APEX /system/apex/com.android.configinfrastructure.capex [ 8.367048] [ T384] apexd: Decompressing/system/apex/com.android.configinfrastructure.capex to /data/apex/decompressed/com.android.configinfrastructure@340090000.decompressed.apex [ 8.381713] [ T384] apexd: Processing compressed APEX /system/apex/com.android.ipsec.capex [ 8.381756] [ T384] apexd: Decompressing/system/apex/com.android.ipsec.capex to /data/apex/decompressed/com.android.ipsec@340090000.decompressed.apex [ 8.401078] [ T384] apexd: Processing compressed APEX /system/apex/com.android.ondevicepersonalization.capex [ 8.401137] [ T384] apexd: Decompressing/system/apex/com.android.ondevicepersonalization.capex to /data/apex/decompressed/com.android.ondevicepersonalization@340090000.decompressed.apex [ 8.425994] [ T384] apexd: Processing compressed APEX /system/apex/com.android.tethering.capex [ 8.426052] [ T384] apexd: Decompressing/system/apex/com.android.tethering.capex to /data/apex/decompressed/com.android.tethering@340090000.decompressed.apex [ 8.567398] [ T384] apexd: Processing compressed APEX /system/apex/com.android.mediaprovider.capex [ 8.567444] [ T384] apexd: Decompressing/system/apex/com.android.mediaprovider.capex to /data/apex/decompressed/com.android.mediaprovider@340090000.decompressed.apex [ 8.630074] [ T384] apexd: Processing compressed APEX /system/apex/com.android.adservices.capex [ 8.630123] [ T384] apexd: Decompressing/system/apex/com.android.adservices.capex to /data/apex/decompressed/com.android.adservices@340090000.decompressed.apex [ 8.637108] [ T1] init: starting service 'exec 5 (/bin/rm -rf /data/misc/virtualizationservice)'... [ 8.642021] [ T1] init: ... started service 'exec 5 (/bin/rm -rf /data/misc/virtualizationservice)' has pid 390 [ 8.642098] [ T1] init: SVC_EXEC service 'exec 5 (/bin/rm -rf /data/misc/virtualizationservice)' pid 390 (uid 1081 gid 1000+0 context default) started; waiting... [ 8.654478] [ T1] init: Service 'exec 5 (/bin/rm -rf /data/misc/virtualizationservice)' (pid 390) exited with status 0 waiting took 0.015000 seconds [ 8.654532] [ T1] init: Sending signal 9 to service 'exec 5 (/bin/rm -rf /data/misc/virtualizationservice)' (pid 390) process group... [ 8.654683] [ T1] libprocessgroup: Successfully killed process cgroup uid 1081 pid 390 in 0ms [ 8.659509] [ T1] init: Not setting encryption policy on: /data/preloads [ 8.748870] [ T384] apexd: Processing compressed APEX /system/apex/com.android.scheduling.capex [ 8.748919] [ T384] apexd: Decompressing/system/apex/com.android.scheduling.capex to /data/apex/decompressed/com.android.scheduling@340090000.decompressed.apex [ 8.756139] [ T384] apexd: Processing compressed APEX /system/apex/com.android.adbd.capex [ 8.756184] [ T384] apexd: Decompressing/system/apex/com.android.adbd.capex to /data/apex/decompressed/com.android.adbd@340090000.decompressed.apex [ 8.776035] [ T295] type=1400 audit(1758284066.636:38): avc: denied { open } for comm="BootAnimation" path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=333 scontext=u:r:bootanim:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 [ 8.776084] [ T295] type=1400 audit(1758284066.636:39): avc: denied { getattr } for comm="BootAnimation" path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=333 scontext=u:r:bootanim:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 [ 8.776105] [ T295] type=1400 audit(1758284066.636:40): avc: denied { map } for comm="BootAnimation" path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=333 scontext=u:r:bootanim:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 [ 8.776877] [ T295] type=1107 audit(1758284066.640:41): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=sys.gmali.version pid=333 uid=1003 gid=1003 scontext=u:r:bootanim:s0 tcontext=u:object_r:system_prop:s0 tclass=property_service permissive=1' [ 8.804900] [ T1] init: Not setting encryption policy on: /data/lost+found [ 8.805580] [ T384] apexd: Processing compressed APEX /system/apex/com.android.media.swcodec.capex [ 8.805625] [ T384] apexd: Decompressing/system/apex/com.android.media.swcodec.capex to /data/apex/decompressed/com.android.media.swcodec@340090000.decompressed.apex [ 8.851747] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 8.854857] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 8.871006] [ T283] servicemanager: Found android.hardware.power.IPower/default in device VINTF manifest. [ 8.871067] [ T283] servicemanager: Since 'android.hardware.power.IPower/default' could not be found, trying to start it as a lazy AIDL service. (if it's not configured to be a lazy service, it may be stuck starting or still starting). [ 8.874478] [ T1] init: Control message: Could not find 'aidl/android.hardware.power.IPower/default' for ctl.interface_start from pid: 283 (/system/bin/servicemanager) [ 8.874709] [ T397] servicemanager: Tried to start aidl service android.hardware.power.IPower/default as a lazy service, but was unable to. Usually this happens when a service is not installed, but if the service is intended to be used as a lazy service, then it may be configured incorrectly. [ 8.887594] [ T1] init: Not setting encryption policy on: /data/media [ 8.896204] [ T1] init: Not setting encryption policy on: /data/misc_ce [ 8.900214] [ T1] init: Not setting encryption policy on: /data/misc_de [ 8.902825] [ T1] init: Not setting encryption policy on: /data/system_ce [ 8.905404] [ T1] init: Not setting encryption policy on: /data/system_de [ 8.908044] [ T1] init: Not setting encryption policy on: /data/user [ 8.910754] [ T1] init: Not setting encryption policy on: /data/user_de [ 8.915411] [ T1] init: Not setting encryption policy on: /data/vendor_ce [ 8.918313] [ T1] init: Not setting encryption policy on: /data/vendor_de [ 8.921374] [ T1] init: starting service 'exec 6 (/system/bin/chattr +F /data/media)'... [ 8.926535] [ T1] init: ... started service 'exec 6 (/system/bin/chattr +F /data/media)' has pid 398 [ 8.926609] [ T1] init: SVC_EXEC service 'exec 6 (/system/bin/chattr +F /data/media)' pid 398 (uid 1023 gid 1023+0 context default) started; waiting... [ 8.942114] [ T384] apexd: Processing compressed APEX /system/apex/com.android.wifi.capex [ 8.942169] [ T384] apexd: Decompressing/system/apex/com.android.wifi.capex to /data/apex/decompressed/com.android.wifi@340090000.decompressed.apex [ 8.943238] [ T1] init: Service 'exec 6 (/system/bin/chattr +F /data/media)' (pid 398) exited with status 0 waiting took 0.019000 seconds [ 8.943276] [ T1] init: Sending signal 9 to service 'exec 6 (/system/bin/chattr +F /data/media)' (pid 398) process group... [ 8.943416] [ T1] libprocessgroup: Successfully killed process cgroup uid 1023 pid 398 in 0ms [ 8.989670] [ T384] apexd: Processing compressed APEX /system/apex/com.android.appsearch.capex [ 8.989717] [ T384] apexd: Decompressing/system/apex/com.android.appsearch.capex to /data/apex/decompressed/com.android.appsearch@340090000.decompressed.apex [ 9.019622] [ T384] apexd: Processing compressed APEX /system/apex/com.android.media.capex [ 9.019671] [ T384] apexd: Decompressing/system/apex/com.android.media.capex to /data/apex/decompressed/com.android.media@340090000.decompressed.apex [ 9.058881] [ T384] apexd: Processing compressed APEX /system/apex/com.android.neuralnetworks.capex [ 9.058932] [ T384] apexd: Decompressing/system/apex/com.android.neuralnetworks.capex to /data/apex/decompressed/com.android.neuralnetworks@340090000.decompressed.apex [ 9.105439] [ T384] apexd: Processing compressed APEX /system/apex/com.android.conscrypt.capex [ 9.105488] [ T384] apexd: Decompressing/system/apex/com.android.conscrypt.capex to /data/apex/decompressed/com.android.conscrypt@340090000.decompressed.apex [ 9.141129] [ T384] apexd: Processing compressed APEX /system/apex/com.android.permission.capex [ 9.141180] [ T384] apexd: Decompressing/system/apex/com.android.permission.capex to /data/apex/decompressed/com.android.permission@340090000.decompressed.apex [ 9.224463] [ T384] apexd: Processing compressed APEX /system/apex/com.android.uwb.capex [ 9.224512] [ T384] apexd: Decompressing/system/apex/com.android.uwb.capex to /data/apex/decompressed/com.android.uwb@340090000.decompressed.apex [ 9.249632] [ T384] apexd: Processing compressed APEX /system/apex/com.android.extservices.capex [ 9.249683] [ T384] apexd: Decompressing/system/apex/com.android.extservices.capex to /data/apex/decompressed/com.android.extservices@340090000.decompressed.apex [ 9.398500] [ T384] apexd: Processing compressed APEX /system/apex/com.android.art.capex [ 9.398549] [ T384] apexd: Decompressing/system/apex/com.android.art.capex to /data/apex/decompressed/com.android.art@340090000.decompressed.apex [ 9.664965] [ T384] apexd: Processing compressed APEX /system/apex/com.android.resolv.capex [ 9.665015] [ T384] apexd: Decompressing/system/apex/com.android.resolv.capex to /data/apex/decompressed/com.android.resolv@340090000.decompressed.apex [ 9.693006] [ T400] loop4: detected capacity change from 0 to 20424 [ 9.693596] [ T399] loop5: detected capacity change from 0 to 10472 [ 9.694139] [ T401] loop6: detected capacity change from 0 to 680 [ 9.694480] [ T402] loop7: detected capacity change from 0 to 49896 [ 9.695050] [ T403] loop8: detected capacity change from 0 to 84448 [ 9.695277] [ T405] loop9: detected capacity change from 0 to 22072 [ 9.695581] [ T404] loop10: detected capacity change from 0 to 2232 [ 9.695828] [ T406] loop11: detected capacity change from 0 to 6736 [ 9.696222] [ T409] loop12: detected capacity change from 0 to 78584 [ 9.696588] [ T408] loop13: detected capacity change from 0 to 1616 [ 9.697194] [ T407] loop14: detected capacity change from 0 to 536 [ 9.697785] [ T411] loop15: detected capacity change from 0 to 1520 [ 9.698070] [ T410] loop16: detected capacity change from 0 to 536 [ 9.711152] [ T413] loop17: detected capacity change from 0 to 1624 [ 9.722119] [ T412] loop18: detected capacity change from 0 to 536 [ 9.722438] [ T408] EXT4-fs (loop13): mounted filesystem without journal. Quota mode: none. [ 9.722564] [ T408] apexd: Successfully mounted package /system/apex/com.android.tzdata.apex on /apex/com.android.tzdata@340090000 duration=29 [ 9.722813] [ T403] EXT4-fs (loop8): mounted filesystem without journal. Quota mode: none. [ 9.722904] [ T403] apexd: Successfully mounted package /system/apex/com.android.vndk.current.apex on /apex/com.android.vndk.v34@1 duration=29 [ 9.726624] [ T406] EXT4-fs (loop11): mounted filesystem without journal. Quota mode: none. [ 9.726683] [ T406] apexd: Successfully mounted package /system/apex/com.android.os.statsd.apex on /apex/com.android.os.statsd@340090000 duration=33 [ 9.738061] [ T407] EXT4-fs (loop14): mounted filesystem without journal. Quota mode: none. [ 9.738169] [ T407] apexd: Successfully mounted package /vendor/apex/com.rockchip.hardware.sensors.apex on /apex/com.rockchip.hardware.sensors@1 duration=44 [ 9.738595] [ T411] EXT4-fs (loop15): mounted filesystem without journal. Quota mode: none. [ 9.738670] [ T411] apexd: Successfully mounted package /system/apex/com.android.sdkext.apex on /apex/com.android.sdkext@340090000 duration=45 [ 9.738767] [ T402] EXT4-fs (loop7): mounted filesystem without journal. Quota mode: none. [ 9.738802] [ T402] apexd: Successfully mounted package /system/apex/com.android.btservices.apex on /apex/com.android.btservices@340090000 duration=45 [ 9.739535] [ T400] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 9.739564] [ T400] apexd: Successfully mounted package /system/apex/com.android.runtime.apex on /apex/com.android.runtime@1 duration=46 [ 9.740229] [ T409] EXT4-fs (loop12): mounted filesystem without journal. Quota mode: none. [ 9.740262] [ T409] apexd: Successfully mounted package /system/apex/com.android.i18n.apex on /apex/com.android.i18n@1 duration=46 [ 9.740959] [ T414] loop19: detected capacity change from 0 to 4672 [ 9.741816] [ T405] EXT4-fs (loop9): mounted filesystem without journal. Quota mode: none. [ 9.741844] [ T405] apexd: Successfully mounted package /system/apex/com.android.healthfitness.apex on /apex/com.android.healthfitness@340090000 duration=48 [ 9.742258] [ T399] EXT4-fs (loop5): mounted filesystem without journal. Quota mode: none. [ 9.742283] [ T399] apexd: Successfully mounted package /system/apex/com.android.devicelock.apex on /apex/com.android.devicelock@1 duration=49 [ 9.742360] [ T410] EXT4-fs (loop16): mounted filesystem without journal. Quota mode: none. [ 9.742390] [ T410] apexd: Successfully mounted package /system/apex/com.android.apex.cts.shim.apex on /apex/com.android.apex.cts.shim@1 duration=48 [ 9.742828] [ T401] EXT4-fs (loop6): mounted filesystem without journal. Quota mode: none. [ 9.742854] [ T401] apexd: Successfully mounted package /system/apex/com.android.virt.apex on /apex/com.android.virt@2 duration=49 [ 9.743745] [ T404] EXT4-fs (loop10): mounted filesystem without journal. Quota mode: none. [ 9.743824] [ T404] apexd: Successfully mounted package /system/apex/com.android.rkpd.apex on /apex/com.android.rkpd@1 duration=50 [ 9.749520] [ T413] device-mapper: verity: sha256 using implementation "sha256-ce" [ 9.750163] [ T295] type=1400 audit(1758284067.612:42): avc: denied { create } for comm="kdevtmpfs" name="dm-37" scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=1 [ 9.750210] [ T295] type=1400 audit(1758284067.612:43): avc: denied { setattr } for comm="kdevtmpfs" name="dm-37" dev="devtmpfs" ino=281 scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=1 [ 9.773519] [ T414] device-mapper: verity: sha256 using implementation "sha256-ce" [ 9.775279] [ T412] device-mapper: verity: sha256 using implementation "sha256-ce" [ 9.865318] [ T415] loop20: detected capacity change from 0 to 45304 [ 9.865759] [ T413] EXT4-fs (dm-37): mounting with "discard" option, but the device does not support discard [ 9.865770] [ T413] EXT4-fs (dm-37): mounted filesystem without journal. Quota mode: none. [ 9.865836] [ T413] apexd: Successfully mounted package /data/apex/decompressed/com.android.ipsec@340090000.decompressed.apex on /apex/com.android.ipsec@340090000 duration=172 [ 9.865902] [ T414] EXT4-fs (dm-36): mounting with "discard" option, but the device does not support discard [ 9.865908] [ T414] EXT4-fs (dm-36): mounted filesystem without journal. Quota mode: none. [ 9.865943] [ T414] apexd: Successfully mounted package /data/apex/decompressed/com.android.ondevicepersonalization@340090000.decompressed.apex on /apex/com.android.ondevicepersonalization@340090000 duration=172 [ 9.867467] [ T412] EXT4-fs (dm-39): mounting with "discard" option, but the device does not support discard [ 9.867482] [ T412] EXT4-fs (dm-39): mounted filesystem without journal. Quota mode: none. [ 9.867542] [ T412] apexd: Successfully mounted package /data/apex/decompressed/com.android.configinfrastructure@340090000.decompressed.apex on /apex/com.android.configinfrastructure@340090000 duration=173 [ 9.871547] [ T283] servicemanager: Since 'android.hardware.power.IPower/default' could not be found, trying to start it as a lazy AIDL service. (if it's not configured to be a lazy service, it may be stuck starting or still starting). [ 9.872126] [ T1] init: Control message: Could not find 'aidl/android.hardware.power.IPower/default' for ctl.interface_start from pid: 283 (/system/bin/servicemanager) [ 9.872283] [ T452] servicemanager: Tried to start aidl service android.hardware.power.IPower/default as a lazy service, but was unable to. Usually this happens when a service is not installed, but if the service is intended to be used as a lazy service, then it may be configured incorrectly. [ 9.883370] [ T415] device-mapper: verity: sha256 using implementation "sha256-ce" [ 9.928745] [ T416] loop21: detected capacity change from 0 to 19592 [ 9.929400] [ T415] EXT4-fs (dm-35): mounting with "discard" option, but the device does not support discard [ 9.929420] [ T415] EXT4-fs (dm-35): mounted filesystem without journal. Quota mode: none. [ 9.929520] [ T415] apexd: Successfully mounted package /data/apex/decompressed/com.android.tethering@340090000.decompressed.apex on /apex/com.android.tethering@340090000 duration=235 [ 9.951448] [ T416] device-mapper: verity: sha256 using implementation "sha256-ce" [ 10.068441] [ T417] loop22: detected capacity change from 0 to 44696 [ 10.076070] [ T416] EXT4-fs (dm-34): mounting with "discard" option, but the device does not support discard [ 10.076105] [ T416] EXT4-fs (dm-34): mounted filesystem without journal. Quota mode: none. [ 10.076230] [ T416] apexd: Successfully mounted package /data/apex/decompressed/com.android.mediaprovider@340090000.decompressed.apex on /apex/com.android.mediaprovider@340090000 duration=382 [ 10.076295] [ T421] loop23: detected capacity change from 0 to 536 [ 10.119437] [ T421] device-mapper: verity: sha256 using implementation "sha256-ce" [ 10.122297] [ T417] device-mapper: verity: sha256 using implementation "sha256-ce" [ 10.131026] [ T422] loop24: detected capacity change from 0 to 16824 [ 10.142139] [ T421] EXT4-fs (dm-29): mounting with "discard" option, but the device does not support discard [ 10.142164] [ T421] EXT4-fs (dm-29): mounted filesystem without journal. Quota mode: none. [ 10.142237] [ T421] apexd: Successfully mounted package /data/apex/decompressed/com.android.scheduling@340090000.decompressed.apex on /apex/com.android.scheduling@340090000 duration=448 [ 10.157296] [ T422] device-mapper: verity: sha256 using implementation "sha256-ce" [ 10.249956] [ T417] EXT4-fs (dm-32): mounting with "discard" option, but the device does not support discard [ 10.250041] [ T417] EXT4-fs (dm-32): mounted filesystem without journal. Quota mode: none. [ 10.250149] [ T417] apexd: Successfully mounted package /data/apex/decompressed/com.android.adservices@340090000.decompressed.apex on /apex/com.android.adservices@340090000 duration=556 [ 10.293772] [ T422] EXT4-fs (dm-26): mounting with "discard" option, but the device does not support discard [ 10.293799] [ T422] EXT4-fs (dm-26): mounted filesystem without journal. Quota mode: none. [ 10.293877] [ T422] apexd: Successfully mounted package /data/apex/decompressed/com.android.adbd@340090000.decompressed.apex on /apex/com.android.adbd@340090000 duration=599 [ 10.294647] [ T419] loop25: detected capacity change from 0 to 51104 [ 10.319336] [ T419] device-mapper: verity: sha256 using implementation "sha256-ce" [ 10.345765] [ T420] loop26: detected capacity change from 0 to 17136 [ 10.363279] [ T420] device-mapper: verity: sha256 using implementation "sha256-ce" [ 10.384085] [ T419] EXT4-fs (dm-27): mounting with "discard" option, but the device does not support discard [ 10.384111] [ T419] EXT4-fs (dm-27): mounted filesystem without journal. Quota mode: none. [ 10.384202] [ T419] apexd: Successfully mounted package /data/apex/decompressed/com.android.media.swcodec@340090000.decompressed.apex on /apex/com.android.media.swcodec@340090000 duration=689 [ 10.384327] [ T418] loop27: detected capacity change from 0 to 7312 [ 10.386527] [ T420] EXT4-fs (dm-24): mounting with "discard" option, but the device does not support discard [ 10.386540] [ T420] EXT4-fs (dm-24): mounted filesystem without journal. Quota mode: none. [ 10.386606] [ T420] apexd: Successfully mounted package /data/apex/decompressed/com.android.wifi@340090000.decompressed.apex on /apex/com.android.wifi@340090000 duration=692 [ 10.415640] [ T418] device-mapper: verity: sha256 using implementation "sha256-ce" [ 10.429958] [ T423] loop28: detected capacity change from 0 to 13192 [ 10.438487] [ T418] EXT4-fs (dm-23): mounting with "discard" option, but the device does not support discard [ 10.438512] [ T418] EXT4-fs (dm-23): mounted filesystem without journal. Quota mode: none. [ 10.438584] [ T418] apexd: Successfully mounted package /data/apex/decompressed/com.android.appsearch@340090000.decompressed.apex on /apex/com.android.appsearch@340090000 duration=744 [ 10.451315] [ T423] device-mapper: verity: sha256 using implementation "sha256-ce" [ 10.481823] [ T424] loop29: detected capacity change from 0 to 15752 [ 10.501770] [ T423] EXT4-fs (dm-19): mounting with "discard" option, but the device does not support discard [ 10.501797] [ T423] EXT4-fs (dm-19): mounted filesystem without journal. Quota mode: none. [ 10.501900] [ T423] apexd: Successfully mounted package /data/apex/decompressed/com.android.media@340090000.decompressed.apex on /apex/com.android.media@340090000 duration=807 [ 10.511270] [ T424] device-mapper: verity: sha256 using implementation "sha256-ce" [ 10.525217] [ T425] loop30: detected capacity change from 0 to 12120 [ 10.555434] [ T425] device-mapper: verity: sha256 using implementation "sha256-ce" [ 10.561431] [ T427] loop31: detected capacity change from 0 to 7512 [ 10.562207] [ T424] EXT4-fs (dm-17): mounting with "discard" option, but the device does not support discard [ 10.562221] [ T424] EXT4-fs (dm-17): mounted filesystem without journal. Quota mode: none. [ 10.562297] [ T424] apexd: Successfully mounted package /data/apex/decompressed/com.android.neuralnetworks@340090000.decompressed.apex on /apex/com.android.neuralnetworks@340090000 duration=867 [ 10.577975] [ T425] EXT4-fs (dm-31): mounting with "discard" option, but the device does not support discard [ 10.577984] [ T425] EXT4-fs (dm-31): mounted filesystem without journal. Quota mode: none. [ 10.578014] [ T425] apexd: Successfully mounted package /data/apex/decompressed/com.android.conscrypt@340090000.decompressed.apex on /apex/com.android.conscrypt@340090000 duration=883 [ 10.603349] [ T427] device-mapper: verity: sha256 using implementation "sha256-ce" [ 10.674351] [ T426] loop32: detected capacity change from 0 to 37008 [ 10.684510] [ T427] EXT4-fs (dm-14): mounting with "discard" option, but the device does not support discard [ 10.684533] [ T427] EXT4-fs (dm-14): mounted filesystem without journal. Quota mode: none. [ 10.684622] [ T427] apexd: Successfully mounted package /data/apex/decompressed/com.android.uwb@340090000.decompressed.apex on /apex/com.android.uwb@340090000 duration=990 [ 10.703216] [ T426] device-mapper: verity: sha256 using implementation "sha256-ce" [ 10.835017] [ T426] EXT4-fs (dm-13): mounting with "discard" option, but the device does not support discard [ 10.835046] [ T426] EXT4-fs (dm-13): mounted filesystem without journal. Quota mode: none. [ 10.835153] [ T426] apexd: Successfully mounted package /data/apex/decompressed/com.android.permission@340090000.decompressed.apex on /apex/com.android.permission@340090000 duration=1140 [ 10.860642] [ T429] loop33: detected capacity change from 0 to 57160 [ 10.872061] [ T283] servicemanager: Since 'android.hardware.power.IPower/default' could not be found, trying to start it as a lazy AIDL service. (if it's not configured to be a lazy service, it may be stuck starting or still starting). [ 10.872608] [ T1] init: Control message: Could not find 'aidl/android.hardware.power.IPower/default' for ctl.interface_start from pid: 283 (/system/bin/servicemanager) [ 10.872675] [ T479] servicemanager: Tried to start aidl service android.hardware.power.IPower/default as a lazy service, but was unable to. Usually this happens when a service is not installed, but if the service is intended to be used as a lazy service, then it may be configured incorrectly. [ 10.883176] [ T429] device-mapper: verity: sha256 using implementation "sha256-ce" [ 10.891759] [ T430] loop34: detected capacity change from 0 to 8184 [ 10.905627] [ T429] EXT4-fs (dm-15): mounting with "discard" option, but the device does not support discard [ 10.905648] [ T429] EXT4-fs (dm-15): mounted filesystem without journal. Quota mode: none. [ 10.905724] [ T429] apexd: Successfully mounted package /data/apex/decompressed/com.android.extservices@340090000.decompressed.apex on /apex/com.android.extservices@340090000 duration=1210 [ 10.931168] [ T430] device-mapper: verity: sha256 using implementation "sha256-ce" [ 11.129650] [ T430] EXT4-fs (dm-8): mounting with "discard" option, but the device does not support discard [ 11.129681] [ T430] EXT4-fs (dm-8): mounted filesystem without journal. Quota mode: none. [ 11.129793] [ T430] apexd: Successfully mounted package /data/apex/decompressed/com.android.resolv@340090000.decompressed.apex on /apex/com.android.resolv@340090000 duration=1434 [ 11.213513] [ T428] loop35: detected capacity change from 0 to 99864 [ 11.231125] [ T428] device-mapper: verity: sha256 using implementation "sha256-ce" [ 11.254612] [ T428] EXT4-fs (dm-16): mounting with "discard" option, but the device does not support discard [ 11.254634] [ T428] EXT4-fs (dm-16): mounted filesystem without journal. Quota mode: none. [ 11.254715] [ T428] apexd: Successfully mounted package /data/apex/decompressed/com.android.art@340090000.decompressed.apex on /apex/com.android.art@340090000 duration=1559 [ 11.255726] [ T384] apexd: Activated 32 packages. [ 11.255775] [ T384] apexd: OnStart done, duration=2889 [ 11.255854] [ T384] AidlLazyServiceRegistrar: Registering service apexservice [ 11.263081] [ T384] apexd: Marking APEXd as activated [ 11.263370] [ T215] init: Wait for property 'apexd.status=activated' took 2244ms [ 11.374084] [ T1] init: Parsing file /apex/com.android.adbd/etc/init.rc... [ 11.374703] [ T1] init: Parsing file /apex/com.android.art/etc/init.rc... [ 11.375208] [ T1] init: Parsing file /apex/com.android.media.swcodec/etc/mediaswcodec.32rc... [ 11.375600] [ T1] init: Parsing file /apex/com.android.media/etc/mediatranscoding.32rc... [ 11.376032] [ T1] init: Parsing file /apex/com.android.os.statsd/etc/init.rc... [ 11.376625] [ T1] init: Parsing file /apex/com.android.sdkext/etc/derive_classpath.rc... [ 11.376996] [ T1] init: Parsing file /apex/com.android.sdkext/etc/derive_sdk.rc... [ 11.377305] [ T1] init: Parsing file /apex/com.rockchip.hardware.sensors/etc/com.rockchip.hardware.sensors.rc... [ 11.419891] [ T1] init: linkerconfig generated /linkerconfig with mounted APEX modules info [ 11.420002] [ T1] init: Command 'perform_apex_config' action=post-fs-data (/system/etc/init/hw/init.rc:1010) took 156ms and succeeded [ 11.424033] [ T1] init: starting service 'derive_sdk'... [ 11.428428] [ T1] init: ... started service 'derive_sdk' has pid 489 [ 11.428478] [ T1] init: SVC_EXEC service 'derive_sdk' pid 489 (uid 9999 gid 9999+0 context default) started; waiting... [ 11.440924] [ T1] init: Service 'derive_sdk' (pid 489) exited with status 0 waiting took 0.014000 seconds [ 11.440973] [ T1] init: Sending signal 9 to service 'derive_sdk' (pid 489) process group... [ 11.441111] [ T1] libprocessgroup: Successfully killed process cgroup uid 9999 pid 489 in 0ms [ 11.441832] [ T1] init: starting service 'exec 7 (/system/bin/vdc --wait cryptfs init_user0)'... [ 11.444924] [ T1] init: ... started service 'exec 7 (/system/bin/vdc --wait cryptfs init_user0)' has pid 490 [ 11.444981] [ T1] init: SVC_EXEC service 'exec 7 (/system/bin/vdc --wait cryptfs init_user0)' pid 490 (uid 0 gid 0+0 context default) started; waiting... [ 11.452557] [ T490] vdc: Waited 0ms for vold [ 11.601433] [ T1] init: Service 'exec 7 (/system/bin/vdc --wait cryptfs init_user0)' (pid 490) exited with status 0 waiting took 0.157000 seconds [ 11.601480] [ T1] init: Sending signal 9 to service 'exec 7 (/system/bin/vdc --wait cryptfs init_user0)' (pid 490) process group... [ 11.601606] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 490 in 0ms [ 11.671148] [ T1] selinux: SELinux: Skipping restorecon on directory(/data/system/shutdown-checkpoints) [ 11.687875] [ T1] init: Command 'restorecon --recursive --skip-ce /data' action=post-fs-data (/system/etc/init/hw/init.rc:1020) took 85ms and succeeded [ 11.688007] [ T1] init: starting service 'derive_classpath'... [ 11.689807] [ T1] init: ... started service 'derive_classpath' has pid 493 [ 11.689825] [ T1] init: SVC_EXEC service 'derive_classpath' pid 493 (uid 1000 gid 1000+1 context default) started; waiting... [ 11.726102] [ T1] init: Service 'derive_classpath' (pid 493) exited with status 0 waiting took 0.037000 seconds [ 11.726124] [ T1] init: Sending signal 9 to service 'derive_classpath' (pid 493) process group... [ 11.726198] [ T1] libprocessgroup: Successfully killed process cgroup uid 1000 pid 493 in 0ms [ 11.727278] [ T1] init: starting service 'art_boot'... [ 11.728986] [ T1] init: ... started service 'art_boot' has pid 494 [ 11.729001] [ T1] init: SVC_EXEC service 'art_boot' pid 494 (uid 0 gid 0+0 context default) started; waiting... [ 11.746222] [ T1] init: Service 'art_boot' (pid 494) exited with status 0 waiting took 0.018000 seconds [ 11.746238] [ T1] init: Sending signal 9 to service 'art_boot' (pid 494) process group... [ 11.746296] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 494 in 0ms [ 11.746688] [ T1] init: starting service 'odsign'... [ 11.748145] [ T1] init: ... started service 'odsign' has pid 495 [ 11.872458] [ T283] servicemanager: Since 'android.hardware.power.IPower/default' could not be found, trying to start it as a lazy AIDL service. (if it's not configured to be a lazy service, it may be stuck starting or still starting). [ 11.872736] [ T1] init: Control message: Could not find 'aidl/android.hardware.power.IPower/default' for ctl.interface_start from pid: 283 (/system/bin/servicemanager) [ 11.872804] [ T496] servicemanager: Tried to start aidl service android.hardware.power.IPower/default as a lazy service, but was unable to. Usually this happens when a service is not installed, but if the service is intended to be used as a lazy service, then it may be configured incorrectly. [ 12.028260] [ T295] type=1400 audit(1758284069.888:44): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:aac_drc_prop:s0" dev="tmpfs" ino=58 scontext=u:r:odrefresh:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1 [ 12.028410] [ T295] type=1400 audit(1758284069.888:45): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:aac_drc_prop:s0" dev="tmpfs" ino=58 scontext=u:r:odrefresh:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1 [ 12.028477] [ T295] type=1400 audit(1758284069.888:46): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:aac_drc_prop:s0" dev="tmpfs" ino=58 scontext=u:r:odrefresh:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1 [ 12.028623] [ T295] type=1400 audit(1758284069.888:47): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ab_update_gki_prop:s0" dev="tmpfs" ino=60 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ab_update_gki_prop:s0 tclass=file permissive=1 [ 12.028705] [ T295] type=1400 audit(1758284069.888:48): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ab_update_gki_prop:s0" dev="tmpfs" ino=60 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ab_update_gki_prop:s0 tclass=file permissive=1 [ 12.028805] [ T295] type=1400 audit(1758284069.888:49): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ab_update_gki_prop:s0" dev="tmpfs" ino=60 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ab_update_gki_prop:s0 tclass=file permissive=1 [ 12.028868] [ T295] type=1400 audit(1758284069.888:50): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:adaptive_haptics_prop:s0" dev="tmpfs" ino=61 scontext=u:r:odrefresh:s0 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1 [ 12.028966] [ T295] type=1400 audit(1758284069.888:51): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:adaptive_haptics_prop:s0" dev="tmpfs" ino=61 scontext=u:r:odrefresh:s0 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1 [ 12.029029] [ T295] type=1400 audit(1758284069.888:52): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:adaptive_haptics_prop:s0" dev="tmpfs" ino=61 scontext=u:r:odrefresh:s0 tcontext=u:object_r:adaptive_haptics_prop:s0 tclass=file permissive=1 [ 12.029089] [ T295] type=1400 audit(1758284069.888:53): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:adbd_config_prop:s0" dev="tmpfs" ino=62 scontext=u:r:odrefresh:s0 tcontext=u:object_r:adbd_config_prop:s0 tclass=file permissive=1 [ 12.029184] [ T295] type=1400 audit(1758284069.888:54): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:adbd_config_prop:s0" dev="tmpfs" ino=62 scontext=u:r:odrefresh:s0 tcontext=u:object_r:adbd_config_prop:s0 tclass=file permissive=1 [ 12.029272] [ T295] type=1400 audit(1758284069.888:55): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:adbd_config_prop:s0" dev="tmpfs" ino=62 scontext=u:r:odrefresh:s0 tcontext=u:object_r:adbd_config_prop:s0 tclass=file permissive=1 [ 12.029348] [ T295] type=1400 audit(1758284069.888:56): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:adbd_prop:s0" dev="tmpfs" ino=63 scontext=u:r:odrefresh:s0 tcontext=u:object_r:adbd_prop:s0 tclass=file permissive=1 [ 12.029447] [ T295] type=1400 audit(1758284069.888:57): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:adbd_prop:s0" dev="tmpfs" ino=63 scontext=u:r:odrefresh:s0 tcontext=u:object_r:adbd_prop:s0 tclass=file permissive=1 [ 12.029511] [ T295] type=1400 audit(1758284069.888:58): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:adbd_prop:s0" dev="tmpfs" ino=63 scontext=u:r:odrefresh:s0 tcontext=u:object_r:adbd_prop:s0 tclass=file permissive=1 [ 12.029608] [ T295] type=1400 audit(1758284069.892:59): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:apexd_config_prop:s0" dev="tmpfs" ino=65 scontext=u:r:odrefresh:s0 tcontext=u:object_r:apexd_config_prop:s0 tclass=file permissive=1 [ 12.029670] [ T295] type=1400 audit(1758284069.892:60): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:apexd_config_prop:s0" dev="tmpfs" ino=65 scontext=u:r:odrefresh:s0 tcontext=u:object_r:apexd_config_prop:s0 tclass=file permissive=1 [ 12.029772] [ T295] type=1400 audit(1758284069.892:61): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:apexd_config_prop:s0" dev="tmpfs" ino=65 scontext=u:r:odrefresh:s0 tcontext=u:object_r:apexd_config_prop:s0 tclass=file permissive=1 [ 12.029871] [ T295] type=1400 audit(1758284069.892:62): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:apexd_payload_metadata_prop:s0" dev="tmpfs" ino=66 scontext=u:r:odrefresh:s0 tcontext=u:object_r:apexd_payload_metadata_prop:s0 tclass=file permissive=1 [ 12.029937] [ T295] type=1400 audit(1758284069.892:63): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:apexd_payload_metadata_prop:s0" dev="tmpfs" ino=66 scontext=u:r:odrefresh:s0 tcontext=u:object_r:apexd_payload_metadata_prop:s0 tclass=file permissive=1 [ 12.030035] [ T295] type=1400 audit(1758284069.892:64): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:apexd_payload_metadata_prop:s0" dev="tmpfs" ino=66 scontext=u:r:odrefresh:s0 tcontext=u:object_r:apexd_payload_metadata_prop:s0 tclass=file permissive=1 [ 12.030137] [ T295] type=1400 audit(1758284069.892:65): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:apexd_prop:s0" dev="tmpfs" ino=67 scontext=u:r:odrefresh:s0 tcontext=u:object_r:apexd_prop:s0 tclass=file permissive=1 [ 12.030224] [ T295] type=1400 audit(1758284069.892:66): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:apexd_prop:s0" dev="tmpfs" ino=67 scontext=u:r:odrefresh:s0 tcontext=u:object_r:apexd_prop:s0 tclass=file permissive=1 [ 12.030310] [ T295] type=1400 audit(1758284069.892:67): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:apexd_prop:s0" dev="tmpfs" ino=67 scontext=u:r:odrefresh:s0 tcontext=u:object_r:apexd_prop:s0 tclass=file permissive=1 [ 12.030396] [ T295] type=1400 audit(1758284069.892:68): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:apk_verity_prop:s0" dev="tmpfs" ino=69 scontext=u:r:odrefresh:s0 tcontext=u:object_r:apk_verity_prop:s0 tclass=file permissive=1 [ 12.030494] [ T295] type=1400 audit(1758284069.892:69): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:apk_verity_prop:s0" dev="tmpfs" ino=69 scontext=u:r:odrefresh:s0 tcontext=u:object_r:apk_verity_prop:s0 tclass=file permissive=1 [ 12.030555] [ T295] type=1400 audit(1758284069.892:70): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:apk_verity_prop:s0" dev="tmpfs" ino=69 scontext=u:r:odrefresh:s0 tcontext=u:object_r:apk_verity_prop:s0 tclass=file permissive=1 [ 12.030615] [ T295] type=1400 audit(1758284069.892:71): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:audio_config_prop:s0" dev="tmpfs" ino=71 scontext=u:r:odrefresh:s0 tcontext=u:object_r:audio_config_prop:s0 tclass=file permissive=1 [ 12.030712] [ T295] type=1400 audit(1758284069.892:72): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:audio_config_prop:s0" dev="tmpfs" ino=71 scontext=u:r:odrefresh:s0 tcontext=u:object_r:audio_config_prop:s0 tclass=file permissive=1 [ 12.030809] [ T295] type=1400 audit(1758284069.892:73): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:audio_config_prop:s0" dev="tmpfs" ino=71 scontext=u:r:odrefresh:s0 tcontext=u:object_r:audio_config_prop:s0 tclass=file permissive=1 [ 12.030872] [ T295] type=1400 audit(1758284069.892:74): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:bluetooth_a2dp_offload_prop:s0" dev="tmpfs" ino=76 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bluetooth_a2dp_offload_prop:s0 tclass=file permissive=1 [ 12.030965] [ T295] type=1400 audit(1758284069.892:75): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:bluetooth_a2dp_offload_prop:s0" dev="tmpfs" ino=76 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bluetooth_a2dp_offload_prop:s0 tclass=file permissive=1 [ 12.031064] [ T295] type=1400 audit(1758284069.892:76): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:bluetooth_a2dp_offload_prop:s0" dev="tmpfs" ino=76 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bluetooth_a2dp_offload_prop:s0 tclass=file permissive=1 [ 12.031156] [ T295] type=1400 audit(1758284069.892:77): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:bluetooth_audio_hal_prop:s0" dev="tmpfs" ino=77 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bluetooth_audio_hal_prop:s0 tclass=file permissive=1 [ 12.031247] [ T295] type=1400 audit(1758284069.892:78): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:bluetooth_audio_hal_prop:s0" dev="tmpfs" ino=77 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bluetooth_audio_hal_prop:s0 tclass=file permissive=1 [ 12.031339] [ T295] type=1400 audit(1758284069.892:79): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:bluetooth_audio_hal_prop:s0" dev="tmpfs" ino=77 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bluetooth_audio_hal_prop:s0 tclass=file permissive=1 [ 12.031430] [ T295] type=1400 audit(1758284069.892:80): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=79 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 [ 12.031526] [ T295] type=1400 audit(1758284069.892:81): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=79 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 [ 12.031623] [ T295] type=1400 audit(1758284069.892:82): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=79 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=1 [ 12.031685] [ T295] type=1400 audit(1758284069.892:83): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:bootanim_config_prop:s0" dev="tmpfs" ino=81 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bootanim_config_prop:s0 tclass=file permissive=1 [ 12.031782] [ T295] type=1400 audit(1758284069.892:84): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:bootanim_config_prop:s0" dev="tmpfs" ino=81 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bootanim_config_prop:s0 tclass=file permissive=1 [ 12.031882] [ T295] type=1400 audit(1758284069.892:85): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:bootanim_config_prop:s0" dev="tmpfs" ino=81 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bootanim_config_prop:s0 tclass=file permissive=1 [ 12.031986] [ T295] type=1400 audit(1758284069.892:86): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:bootloader_boot_reason_prop:s0" dev="tmpfs" ino=83 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bootloader_boot_reason_prop:s0 tclass=file permissive=1 [ 12.032086] [ T295] type=1400 audit(1758284069.892:87): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:bootloader_boot_reason_prop:s0" dev="tmpfs" ino=83 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bootloader_boot_reason_prop:s0 tclass=file permissive=1 [ 12.032187] [ T295] type=1400 audit(1758284069.892:88): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:bootloader_boot_reason_prop:s0" dev="tmpfs" ino=83 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bootloader_boot_reason_prop:s0 tclass=file permissive=1 [ 12.032288] [ T295] type=1400 audit(1758284069.892:89): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=85 scontext=u:r:odrefresh:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 [ 12.032557] [ T295] type=1400 audit(1758284069.892:90): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=85 scontext=u:r:odrefresh:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 [ 12.032658] [ T295] type=1400 audit(1758284069.892:91): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=85 scontext=u:r:odrefresh:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 [ 12.032746] [ T295] type=1400 audit(1758284069.892:92): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:boottime_public_prop:s0" dev="tmpfs" ino=86 scontext=u:r:odrefresh:s0 tcontext=u:object_r:boottime_public_prop:s0 tclass=file permissive=1 [ 12.032844] [ T295] type=1400 audit(1758284069.892:93): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:boottime_public_prop:s0" dev="tmpfs" ino=86 scontext=u:r:odrefresh:s0 tcontext=u:object_r:boottime_public_prop:s0 tclass=file permissive=1 [ 12.032953] [ T295] type=1400 audit(1758284069.892:94): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:boottime_public_prop:s0" dev="tmpfs" ino=86 scontext=u:r:odrefresh:s0 tcontext=u:object_r:boottime_public_prop:s0 tclass=file permissive=1 [ 12.033052] [ T295] type=1400 audit(1758284069.892:95): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=87 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1 [ 12.033129] [ T295] type=1400 audit(1758284069.892:96): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=87 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1 [ 12.033215] [ T295] type=1400 audit(1758284069.892:97): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=87 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1 [ 12.033313] [ T295] type=1400 audit(1758284069.892:98): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_attestation_prop:s0" dev="tmpfs" ino=89 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_attestation_prop:s0 tclass=file permissive=1 [ 12.033404] [ T295] type=1400 audit(1758284069.892:99): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_attestation_prop:s0" dev="tmpfs" ino=89 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_attestation_prop:s0 tclass=file permissive=1 [ 12.033502] [ T295] type=1400 audit(1758284069.892:100): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_attestation_prop:s0" dev="tmpfs" ino=89 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_attestation_prop:s0 tclass=file permissive=1 [ 12.033625] [ T295] type=1400 audit(1758284069.892:101): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_bootimage_prop:s0" dev="tmpfs" ino=90 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_bootimage_prop:s0 tclass=file permissive=1 [ 12.033724] [ T295] type=1400 audit(1758284069.892:102): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_bootimage_prop:s0" dev="tmpfs" ino=90 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_bootimage_prop:s0 tclass=file permissive=1 [ 12.033859] [ T295] type=1400 audit(1758284069.892:103): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_bootimage_prop:s0" dev="tmpfs" ino=90 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_bootimage_prop:s0 tclass=file permissive=1 [ 12.033957] [ T295] type=1400 audit(1758284069.892:104): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_config_prop:s0" dev="tmpfs" ino=91 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_config_prop:s0 tclass=file permissive=1 [ 12.034021] [ T295] type=1400 audit(1758284069.892:105): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_config_prop:s0" dev="tmpfs" ino=91 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_config_prop:s0 tclass=file permissive=1 [ 12.034081] [ T295] type=1400 audit(1758284069.892:106): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_config_prop:s0" dev="tmpfs" ino=91 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_config_prop:s0 tclass=file permissive=1 [ 12.034143] [ T295] type=1400 audit(1758284069.892:107): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:camera2_extensions_prop:s0" dev="tmpfs" ino=95 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camera2_extensions_prop:s0 tclass=file permissive=1 [ 12.034241] [ T295] type=1400 audit(1758284069.892:108): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:camera2_extensions_prop:s0" dev="tmpfs" ino=95 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camera2_extensions_prop:s0 tclass=file permissive=1 [ 12.034319] [ T295] type=1400 audit(1758284069.892:109): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:camera2_extensions_prop:s0" dev="tmpfs" ino=95 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camera2_extensions_prop:s0 tclass=file permissive=1 [ 12.034405] [ T295] type=1400 audit(1758284069.892:110): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:camera_calibration_prop:s0" dev="tmpfs" ino=96 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camera_calibration_prop:s0 tclass=file permissive=1 [ 12.034468] [ T295] type=1400 audit(1758284069.892:111): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:camera_calibration_prop:s0" dev="tmpfs" ino=96 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camera_calibration_prop:s0 tclass=file permissive=1 [ 12.034567] [ T295] type=1400 audit(1758284069.892:112): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:camera_calibration_prop:s0" dev="tmpfs" ino=96 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camera_calibration_prop:s0 tclass=file permissive=1 [ 12.034666] [ T295] type=1400 audit(1758284069.892:113): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:camerax_extensions_prop:s0" dev="tmpfs" ino=98 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camerax_extensions_prop:s0 tclass=file permissive=1 [ 12.034766] [ T295] type=1400 audit(1758284069.892:114): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:camerax_extensions_prop:s0" dev="tmpfs" ino=98 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camerax_extensions_prop:s0 tclass=file permissive=1 [ 12.034866] [ T295] type=1400 audit(1758284069.892:115): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:camerax_extensions_prop:s0" dev="tmpfs" ino=98 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camerax_extensions_prop:s0 tclass=file permissive=1 [ 12.034966] [ T295] type=1400 audit(1758284069.892:116): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:charger_config_prop:s0" dev="tmpfs" ino=99 scontext=u:r:odrefresh:s0 tcontext=u:object_r:charger_config_prop:s0 tclass=file permissive=1 [ 12.035065] [ T295] type=1400 audit(1758284069.892:117): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:charger_config_prop:s0" dev="tmpfs" ino=99 scontext=u:r:odrefresh:s0 tcontext=u:object_r:charger_config_prop:s0 tclass=file permissive=1 [ 12.035164] [ T295] type=1400 audit(1758284069.892:118): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:charger_config_prop:s0" dev="tmpfs" ino=99 scontext=u:r:odrefresh:s0 tcontext=u:object_r:charger_config_prop:s0 tclass=file permissive=1 [ 12.035263] [ T295] type=1400 audit(1758284069.892:119): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:charger_prop:s0" dev="tmpfs" ino=100 scontext=u:r:odrefresh:s0 tcontext=u:object_r:charger_prop:s0 tclass=file permissive=1 [ 12.035327] [ T295] type=1400 audit(1758284069.892:120): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:charger_prop:s0" dev="tmpfs" ino=100 scontext=u:r:odrefresh:s0 tcontext=u:object_r:charger_prop:s0 tclass=file permissive=1 [ 12.035387] [ T295] type=1400 audit(1758284069.892:121): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:charger_prop:s0" dev="tmpfs" ino=100 scontext=u:r:odrefresh:s0 tcontext=u:object_r:charger_prop:s0 tclass=file permissive=1 [ 12.035484] [ T295] type=1400 audit(1758284069.892:122): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:charger_status_prop:s0" dev="tmpfs" ino=101 scontext=u:r:odrefresh:s0 tcontext=u:object_r:charger_status_prop:s0 tclass=file permissive=1 [ 12.035583] [ T295] type=1400 audit(1758284069.892:123): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:charger_status_prop:s0" dev="tmpfs" ino=101 scontext=u:r:odrefresh:s0 tcontext=u:object_r:charger_status_prop:s0 tclass=file permissive=1 [ 12.035682] [ T295] type=1400 audit(1758284069.892:124): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:charger_status_prop:s0" dev="tmpfs" ino=101 scontext=u:r:odrefresh:s0 tcontext=u:object_r:charger_status_prop:s0 tclass=file permissive=1 [ 12.035780] [ T295] type=1400 audit(1758284069.892:125): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:codec2_config_prop:s0" dev="tmpfs" ino=102 scontext=u:r:odrefresh:s0 tcontext=u:object_r:codec2_config_prop:s0 tclass=file permissive=1 [ 12.035882] [ T295] type=1400 audit(1758284069.892:126): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:codec2_config_prop:s0" dev="tmpfs" ino=102 scontext=u:r:odrefresh:s0 tcontext=u:object_r:codec2_config_prop:s0 tclass=file permissive=1 [ 12.035982] [ T295] type=1400 audit(1758284069.892:127): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:codec2_config_prop:s0" dev="tmpfs" ino=102 scontext=u:r:odrefresh:s0 tcontext=u:object_r:codec2_config_prop:s0 tclass=file permissive=1 [ 12.036046] [ T295] type=1400 audit(1758284069.892:128): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:cold_boot_done_prop:s0" dev="tmpfs" ino=103 scontext=u:r:odrefresh:s0 tcontext=u:object_r:cold_boot_done_prop:s0 tclass=file permissive=1 [ 12.036143] [ T295] type=1400 audit(1758284069.892:129): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:cold_boot_done_prop:s0" dev="tmpfs" ino=103 scontext=u:r:odrefresh:s0 tcontext=u:object_r:cold_boot_done_prop:s0 tclass=file permissive=1 [ 12.036243] [ T295] type=1400 audit(1758284069.892:130): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:cold_boot_done_prop:s0" dev="tmpfs" ino=103 scontext=u:r:odrefresh:s0 tcontext=u:object_r:cold_boot_done_prop:s0 tclass=file permissive=1 [ 12.036358] [ T295] type=1400 audit(1758284069.892:131): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:composd_vm_art_prop:s0" dev="tmpfs" ino=104 scontext=u:r:odrefresh:s0 tcontext=u:object_r:composd_vm_art_prop:s0 tclass=file permissive=1 [ 12.036459] [ T295] type=1400 audit(1758284069.892:132): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:composd_vm_art_prop:s0" dev="tmpfs" ino=104 scontext=u:r:odrefresh:s0 tcontext=u:object_r:composd_vm_art_prop:s0 tclass=file permissive=1 [ 12.036557] [ T295] type=1400 audit(1758284069.892:133): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:composd_vm_art_prop:s0" dev="tmpfs" ino=104 scontext=u:r:odrefresh:s0 tcontext=u:object_r:composd_vm_art_prop:s0 tclass=file permissive=1 [ 12.036656] [ T295] type=1400 audit(1758284069.892:134): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:composd_vm_vendor_prop:s0" dev="tmpfs" ino=105 scontext=u:r:odrefresh:s0 tcontext=u:object_r:composd_vm_vendor_prop:s0 tclass=file permissive=1 [ 12.036757] [ T295] type=1400 audit(1758284069.892:135): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:composd_vm_vendor_prop:s0" dev="tmpfs" ino=105 scontext=u:r:odrefresh:s0 tcontext=u:object_r:composd_vm_vendor_prop:s0 tclass=file permissive=1 [ 12.036856] [ T295] type=1400 audit(1758284069.892:136): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:composd_vm_vendor_prop:s0" dev="tmpfs" ino=105 scontext=u:r:odrefresh:s0 tcontext=u:object_r:composd_vm_vendor_prop:s0 tclass=file permissive=1 [ 12.036954] [ T295] type=1400 audit(1758284069.892:137): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:cpu_variant_prop:s0" dev="tmpfs" ino=108 scontext=u:r:odrefresh:s0 tcontext=u:object_r:cpu_variant_prop:s0 tclass=file permissive=1 [ 12.037053] [ T295] type=1400 audit(1758284069.892:138): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:cpu_variant_prop:s0" dev="tmpfs" ino=108 scontext=u:r:odrefresh:s0 tcontext=u:object_r:cpu_variant_prop:s0 tclass=file permissive=1 [ 12.037152] [ T295] type=1400 audit(1758284069.892:139): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:cpu_variant_prop:s0" dev="tmpfs" ino=108 scontext=u:r:odrefresh:s0 tcontext=u:object_r:cpu_variant_prop:s0 tclass=file permissive=1 [ 12.037250] [ T295] type=1400 audit(1758284069.892:140): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_adbd_prop:s0" dev="tmpfs" ino=109 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_adbd_prop:s0 tclass=file permissive=1 [ 12.037314] [ T295] type=1400 audit(1758284069.892:141): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_adbd_prop:s0" dev="tmpfs" ino=109 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_adbd_prop:s0 tclass=file permissive=1 [ 12.037410] [ T295] type=1400 audit(1758284069.892:142): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_adbd_prop:s0" dev="tmpfs" ino=109 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_adbd_prop:s0 tclass=file permissive=1 [ 12.037507] [ T295] type=1400 audit(1758284069.892:143): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_apex_load_prop:s0" dev="tmpfs" ino=110 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_apex_load_prop:s0 tclass=file permissive=1 [ 12.037605] [ T295] type=1400 audit(1758284069.892:144): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_apex_load_prop:s0" dev="tmpfs" ino=110 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_apex_load_prop:s0 tclass=file permissive=1 [ 12.037668] [ T295] type=1400 audit(1758284069.892:145): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_apex_load_prop:s0" dev="tmpfs" ino=110 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_apex_load_prop:s0 tclass=file permissive=1 [ 12.037770] [ T295] type=1400 audit(1758284069.892:146): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_apexd_prop:s0" dev="tmpfs" ino=111 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_apexd_prop:s0 tclass=file permissive=1 [ 12.037868] [ T295] type=1400 audit(1758284069.892:147): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_apexd_prop:s0" dev="tmpfs" ino=111 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_apexd_prop:s0 tclass=file permissive=1 [ 12.037932] [ T295] type=1400 audit(1758284069.892:148): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_apexd_prop:s0" dev="tmpfs" ino=111 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_apexd_prop:s0 tclass=file permissive=1 [ 12.037993] [ T295] type=1400 audit(1758284069.892:149): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=112 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=1 [ 12.038092] [ T295] type=1400 audit(1758284069.892:150): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=112 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=1 [ 12.038156] [ T295] type=1400 audit(1758284069.892:151): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_bootanim_prop:s0" dev="tmpfs" ino=112 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_bootanim_prop:s0 tclass=file permissive=1 [ 12.038216] [ T295] type=1400 audit(1758284069.892:152): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_bugreport_prop:s0" dev="tmpfs" ino=113 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_bugreport_prop:s0 tclass=file permissive=1 [ 12.038314] [ T295] type=1400 audit(1758284069.892:153): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_bugreport_prop:s0" dev="tmpfs" ino=113 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_bugreport_prop:s0 tclass=file permissive=1 [ 12.038413] [ T295] type=1400 audit(1758284069.892:154): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_bugreport_prop:s0" dev="tmpfs" ino=113 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_bugreport_prop:s0 tclass=file permissive=1 [ 12.038477] [ T295] type=1400 audit(1758284069.892:155): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_console_prop:s0" dev="tmpfs" ino=114 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_console_prop:s0 tclass=file permissive=1 [ 12.038578] [ T295] type=1400 audit(1758284069.892:156): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_console_prop:s0" dev="tmpfs" ino=114 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_console_prop:s0 tclass=file permissive=1 [ 12.038654] [ T295] type=1400 audit(1758284069.896:157): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_console_prop:s0" dev="tmpfs" ino=114 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_console_prop:s0 tclass=file permissive=1 [ 12.038744] [ T295] type=1400 audit(1758284069.896:158): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_default_prop:s0" dev="tmpfs" ino=115 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_default_prop:s0 tclass=file permissive=1 [ 12.038835] [ T295] type=1400 audit(1758284069.896:159): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_default_prop:s0" dev="tmpfs" ino=115 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_default_prop:s0 tclass=file permissive=1 [ 12.038913] [ T295] type=1400 audit(1758284069.896:160): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_default_prop:s0" dev="tmpfs" ino=115 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_default_prop:s0 tclass=file permissive=1 [ 12.038974] [ T295] type=1400 audit(1758284069.896:161): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_dumpstate_prop:s0" dev="tmpfs" ino=116 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_dumpstate_prop:s0 tclass=file permissive=1 [ 12.039072] [ T295] type=1400 audit(1758284069.896:162): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_dumpstate_prop:s0" dev="tmpfs" ino=116 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_dumpstate_prop:s0 tclass=file permissive=1 [ 12.039170] [ T295] type=1400 audit(1758284069.896:163): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_dumpstate_prop:s0" dev="tmpfs" ino=116 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_dumpstate_prop:s0 tclass=file permissive=1 [ 12.039232] [ T295] type=1400 audit(1758284069.896:164): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_fuse_prop:s0" dev="tmpfs" ino=117 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_fuse_prop:s0 tclass=file permissive=1 [ 12.039330] [ T295] type=1400 audit(1758284069.896:165): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_fuse_prop:s0" dev="tmpfs" ino=117 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_fuse_prop:s0 tclass=file permissive=1 [ 12.039393] [ T295] type=1400 audit(1758284069.896:166): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_fuse_prop:s0" dev="tmpfs" ino=117 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_fuse_prop:s0 tclass=file permissive=1 [ 12.039490] [ T295] type=1400 audit(1758284069.896:167): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_gsid_prop:s0" dev="tmpfs" ino=118 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_gsid_prop:s0 tclass=file permissive=1 [ 12.039587] [ T295] type=1400 audit(1758284069.896:168): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_gsid_prop:s0" dev="tmpfs" ino=118 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_gsid_prop:s0 tclass=file permissive=1 [ 12.039686] [ T295] type=1400 audit(1758284069.896:169): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_gsid_prop:s0" dev="tmpfs" ino=118 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_gsid_prop:s0 tclass=file permissive=1 [ 12.039786] [ T295] type=1400 audit(1758284069.896:170): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_interface_restart_prop:s0" dev="tmpfs" ino=119 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_interface_restart_prop:s0 tclass=file permissive=1 [ 12.039886] [ T295] type=1400 audit(1758284069.896:171): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_interface_restart_prop:s0" dev="tmpfs" ino=119 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_interface_restart_prop:s0 tclass=file permissive=1 [ 12.039952] [ T295] type=1400 audit(1758284069.896:172): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_interface_restart_prop:s0" dev="tmpfs" ino=119 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_interface_restart_prop:s0 tclass=file permissive=1 [ 12.040039] [ T295] type=1400 audit(1758284069.896:173): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_interface_start_prop:s0" dev="tmpfs" ino=120 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_interface_start_prop:s0 tclass=file permissive=1 [ 12.040138] [ T295] type=1400 audit(1758284069.896:174): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_interface_start_prop:s0" dev="tmpfs" ino=120 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_interface_start_prop:s0 tclass=file permissive=1 [ 12.040242] [ T295] type=1400 audit(1758284069.896:175): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_interface_start_prop:s0" dev="tmpfs" ino=120 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_interface_start_prop:s0 tclass=file permissive=1 [ 12.040329] [ T295] type=1400 audit(1758284069.896:176): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_interface_stop_prop:s0" dev="tmpfs" ino=121 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_interface_stop_prop:s0 tclass=file permissive=1 [ 12.040448] [ T295] type=1400 audit(1758284069.896:177): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_interface_stop_prop:s0" dev="tmpfs" ino=121 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_interface_stop_prop:s0 tclass=file permissive=1 [ 12.040535] [ T295] type=1400 audit(1758284069.896:178): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_interface_stop_prop:s0" dev="tmpfs" ino=121 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_interface_stop_prop:s0 tclass=file permissive=1 [ 12.040619] [ T295] type=1400 audit(1758284069.896:179): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=122 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1 [ 12.040703] [ T295] type=1400 audit(1758284069.896:180): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=122 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1 [ 12.040787] [ T295] type=1400 audit(1758284069.896:181): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=122 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1 [ 12.040872] [ T295] type=1400 audit(1758284069.896:182): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_mediatranscoding_prop:s0" dev="tmpfs" ino=123 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_mediatranscoding_prop:s0 tclass=file permissive=1 [ 12.040958] [ T295] type=1400 audit(1758284069.896:183): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_mediatranscoding_prop:s0" dev="tmpfs" ino=123 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_mediatranscoding_prop:s0 tclass=file permissive=1 [ 12.041043] [ T295] type=1400 audit(1758284069.896:184): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_mediatranscoding_prop:s0" dev="tmpfs" ino=123 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_mediatranscoding_prop:s0 tclass=file permissive=1 [ 12.041127] [ T295] type=1400 audit(1758284069.896:185): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_odsign_prop:s0" dev="tmpfs" ino=124 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_odsign_prop:s0 tclass=file permissive=1 [ 12.041211] [ T295] type=1400 audit(1758284069.896:186): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_odsign_prop:s0" dev="tmpfs" ino=124 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_odsign_prop:s0 tclass=file permissive=1 [ 12.041295] [ T295] type=1400 audit(1758284069.896:187): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_odsign_prop:s0" dev="tmpfs" ino=124 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_odsign_prop:s0 tclass=file permissive=1 [ 12.041378] [ T295] type=1400 audit(1758284069.896:188): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=125 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1 [ 12.041462] [ T295] type=1400 audit(1758284069.896:189): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=125 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1 [ 12.041546] [ T295] type=1400 audit(1758284069.896:190): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=125 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1 [ 12.041629] [ T295] type=1400 audit(1758284069.896:191): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=126 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1 [ 12.041713] [ T295] type=1400 audit(1758284069.896:192): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=126 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1 [ 12.041797] [ T295] type=1400 audit(1758284069.896:193): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=126 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1 [ 12.041881] [ T295] type=1400 audit(1758284069.896:194): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=127 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1 [ 12.041965] [ T295] type=1400 audit(1758284069.896:195): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=127 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1 [ 12.042050] [ T295] type=1400 audit(1758284069.896:196): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=127 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1 [ 12.042134] [ T295] type=1400 audit(1758284069.896:197): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_snapuserd_prop:s0" dev="tmpfs" ino=128 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_snapuserd_prop:s0 tclass=file permissive=1 [ 12.042217] [ T295] type=1400 audit(1758284069.896:198): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_snapuserd_prop:s0" dev="tmpfs" ino=128 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_snapuserd_prop:s0 tclass=file permissive=1 [ 12.042302] [ T295] type=1400 audit(1758284069.896:199): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_snapuserd_prop:s0" dev="tmpfs" ino=128 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_snapuserd_prop:s0 tclass=file permissive=1 [ 12.042387] [ T295] type=1400 audit(1758284069.896:200): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_start_prop:s0" dev="tmpfs" ino=129 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_start_prop:s0 tclass=file permissive=1 [ 12.042471] [ T295] type=1400 audit(1758284069.896:201): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_start_prop:s0" dev="tmpfs" ino=129 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_start_prop:s0 tclass=file permissive=1 [ 12.042554] [ T295] type=1400 audit(1758284069.896:202): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_start_prop:s0" dev="tmpfs" ino=129 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_start_prop:s0 tclass=file permissive=1 [ 12.042638] [ T295] type=1400 audit(1758284069.896:203): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=130 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1 [ 12.042722] [ T295] type=1400 audit(1758284069.896:204): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=130 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1 [ 12.042805] [ T295] type=1400 audit(1758284069.896:205): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=130 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1 [ 12.042889] [ T295] type=1400 audit(1758284069.896:206): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:dck_prop:s0" dev="tmpfs" ino=135 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dck_prop:s0 tclass=file permissive=1 [ 12.042973] [ T295] type=1400 audit(1758284069.896:207): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:dck_prop:s0" dev="tmpfs" ino=135 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dck_prop:s0 tclass=file permissive=1 [ 12.043056] [ T295] type=1400 audit(1758284069.896:208): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:dck_prop:s0" dev="tmpfs" ino=135 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dck_prop:s0 tclass=file permissive=1 [ 12.043141] [ T295] type=1400 audit(1758284069.896:209): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:debugfs_restriction_prop:s0" dev="tmpfs" ino=137 scontext=u:r:odrefresh:s0 tcontext=u:object_r:debugfs_restriction_prop:s0 tclass=file permissive=1 [ 12.043226] [ T295] type=1400 audit(1758284069.896:210): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:debugfs_restriction_prop:s0" dev="tmpfs" ino=137 scontext=u:r:odrefresh:s0 tcontext=u:object_r:debugfs_restriction_prop:s0 tclass=file permissive=1 [ 12.043312] [ T295] type=1400 audit(1758284069.896:211): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:debugfs_restriction_prop:s0" dev="tmpfs" ino=137 scontext=u:r:odrefresh:s0 tcontext=u:object_r:debugfs_restriction_prop:s0 tclass=file permissive=1 [ 12.043368] [ T497] audit_log_start: 3 callbacks suppressed [ 12.043371] [ T497] audit: audit_backlog=65 > audit_backlog_limit=64 [ 12.043386] [ T497] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 12.043394] [ T497] audit: backlog limit exceeded [ 12.043398] [ T295] type=1400 audit(1758284069.896:212): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=140 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1 [ 12.043420] [ T497] audit: audit_backlog=65 > audit_backlog_limit=64 [ 12.043428] [ T497] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 12.043436] [ T497] audit: backlog limit exceeded [ 12.043484] [ T295] type=1400 audit(1758284069.896:213): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=140 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1 [ 12.043497] [ T497] audit: audit_backlog=65 > audit_backlog_limit=64 [ 12.043507] [ T497] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 12.043514] [ T497] audit: backlog limit exceeded [ 12.043524] [ T497] audit: audit_backlog=65 > audit_backlog_limit=64 [ 12.043571] [ T295] type=1400 audit(1758284069.896:214): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=140 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1 [ 12.043657] [ T295] type=1400 audit(1758284069.896:215): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=141 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1 [ 12.043742] [ T295] type=1400 audit(1758284069.896:216): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=141 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1 [ 12.043828] [ T295] type=1400 audit(1758284069.896:217): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=141 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1 [ 12.043914] [ T295] type=1400 audit(1758284069.896:218): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_camera_native_prop:s0" dev="tmpfs" ino=142 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_camera_native_prop:s0 tclass=file permissive=1 [ 12.043999] [ T295] type=1400 audit(1758284069.896:219): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_camera_native_prop:s0" dev="tmpfs" ino=142 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_camera_native_prop:s0 tclass=file permissive=1 [ 12.044084] [ T295] type=1400 audit(1758284069.896:220): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_camera_native_prop:s0" dev="tmpfs" ino=142 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_camera_native_prop:s0 tclass=file permissive=1 [ 12.044170] [ T295] type=1400 audit(1758284069.896:221): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_configuration_prop:s0" dev="tmpfs" ino=143 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_configuration_prop:s0 tclass=file permissive=1 [ 12.044256] [ T295] type=1400 audit(1758284069.896:222): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_configuration_prop:s0" dev="tmpfs" ino=143 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_configuration_prop:s0 tclass=file permissive=1 [ 12.044355] [ T295] type=1400 audit(1758284069.896:223): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_configuration_prop:s0" dev="tmpfs" ino=143 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_configuration_prop:s0 tclass=file permissive=1 [ 12.044430] [ T295] type=1400 audit(1758284069.896:224): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_connectivity_prop:s0" dev="tmpfs" ino=144 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_connectivity_prop:s0 tclass=file permissive=1 [ 12.044499] [ T295] type=1400 audit(1758284069.896:225): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_connectivity_prop:s0" dev="tmpfs" ino=144 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_connectivity_prop:s0 tclass=file permissive=1 [ 12.044569] [ T295] type=1400 audit(1758284069.896:226): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_connectivity_prop:s0" dev="tmpfs" ino=144 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_connectivity_prop:s0 tclass=file permissive=1 [ 12.044655] [ T295] type=1400 audit(1758284069.896:227): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_edgetpu_native_prop:s0" dev="tmpfs" ino=145 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_edgetpu_native_prop:s0 tclass=file permissive=1 [ 12.044782] [ T295] type=1400 audit(1758284069.896:228): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_edgetpu_native_prop:s0" dev="tmpfs" ino=145 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_edgetpu_native_prop:s0 tclass=file permissive=1 [ 12.044810] [ T295] type=1400 audit(1758284069.896:229): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_edgetpu_native_prop:s0" dev="tmpfs" ino=145 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_edgetpu_native_prop:s0 tclass=file permissive=1 [ 12.044833] [ T295] type=1400 audit(1758284069.896:230): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_input_native_boot_prop:s0" dev="tmpfs" ino=146 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_input_native_boot_prop:s0 tclass=file permissive=1 [ 12.044856] [ T295] type=1400 audit(1758284069.896:231): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_input_native_boot_prop:s0" dev="tmpfs" ino=146 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_input_native_boot_prop:s0 tclass=file permissive=1 [ 12.044879] [ T295] type=1400 audit(1758284069.896:232): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_input_native_boot_prop:s0" dev="tmpfs" ino=146 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_input_native_boot_prop:s0 tclass=file permissive=1 [ 12.044902] [ T295] type=1400 audit(1758284069.896:233): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_lmkd_native_prop:s0" dev="tmpfs" ino=147 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_lmkd_native_prop:s0 tclass=file permissive=1 [ 12.045162] [ T295] type=1400 audit(1758284069.896:234): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_lmkd_native_prop:s0" dev="tmpfs" ino=147 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_lmkd_native_prop:s0 tclass=file permissive=1 [ 12.045187] [ T295] type=1400 audit(1758284069.896:235): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_lmkd_native_prop:s0" dev="tmpfs" ino=147 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_lmkd_native_prop:s0 tclass=file permissive=1 [ 12.045210] [ T295] type=1400 audit(1758284069.896:236): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_mglru_native_prop:s0" dev="tmpfs" ino=151 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_mglru_native_prop:s0 tclass=file permissive=1 [ 12.045234] [ T295] type=1400 audit(1758284069.896:237): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_mglru_native_prop:s0" dev="tmpfs" ino=151 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_mglru_native_prop:s0 tclass=file permissive=1 [ 12.045256] [ T295] type=1400 audit(1758284069.896:238): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_mglru_native_prop:s0" dev="tmpfs" ino=151 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_mglru_native_prop:s0 tclass=file permissive=1 [ 12.045279] [ T295] type=1400 audit(1758284069.896:239): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_netd_native_prop:s0" dev="tmpfs" ino=152 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_netd_native_prop:s0 tclass=file permissive=1 [ 12.045301] [ T295] type=1400 audit(1758284069.896:240): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_netd_native_prop:s0" dev="tmpfs" ino=152 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_netd_native_prop:s0 tclass=file permissive=1 [ 12.045323] [ T295] type=1400 audit(1758284069.896:241): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_netd_native_prop:s0" dev="tmpfs" ino=152 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_netd_native_prop:s0 tclass=file permissive=1 [ 12.045346] [ T295] type=1400 audit(1758284069.896:242): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_nnapi_native_prop:s0" dev="tmpfs" ino=153 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_nnapi_native_prop:s0 tclass=file permissive=1 [ 12.045367] [ T295] type=1400 audit(1758284069.896:243): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_nnapi_native_prop:s0" dev="tmpfs" ino=153 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_nnapi_native_prop:s0 tclass=file permissive=1 [ 12.045419] [ T295] type=1400 audit(1758284069.896:244): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_nnapi_native_prop:s0" dev="tmpfs" ino=153 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_nnapi_native_prop:s0 tclass=file permissive=1 [ 12.045442] [ T295] type=1400 audit(1758284069.896:245): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_profcollect_native_boot_prop:s0" dev="tmpfs" ino=154 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_profcollect_native_boot_prop:s0 tclass=file permissive=1 [ 12.045465] [ T295] type=1400 audit(1758284069.896:246): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_profcollect_native_boot_prop:s0" dev="tmpfs" ino=154 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_profcollect_native_boot_prop:s0 tclass=file permissive=1 [ 12.045487] [ T295] type=1400 audit(1758284069.896:247): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_profcollect_native_boot_prop:s0" dev="tmpfs" ino=154 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_profcollect_native_boot_prop:s0 tclass=file permissive=1 [ 12.045510] [ T295] type=1400 audit(1758284069.896:248): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_remote_key_provisioning_native_prop:s0" dev="tmpfs" ino=155 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_remote_key_provisioning_native_prop:s0 tclass=file permissive=1 [ 12.045703] [ T295] type=1400 audit(1758284069.896:249): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_remote_key_provisioning_native_prop:s0" dev="tmpfs" ino=155 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_remote_key_provisioning_native_prop:s0 tclass=file permissive=1 [ 12.045729] [ T295] type=1400 audit(1758284069.896:250): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_remote_key_provisioning_native_prop:s0" dev="tmpfs" ino=155 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_remote_key_provisioning_native_prop:s0 tclass=file permissive=1 [ 12.045752] [ T295] type=1400 audit(1758284069.896:251): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_reset_performed_prop:s0" dev="tmpfs" ino=156 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_reset_performed_prop:s0 tclass=file permissive=1 [ 12.045775] [ T295] type=1400 audit(1758284069.896:252): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_reset_performed_prop:s0" dev="tmpfs" ino=156 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_reset_performed_prop:s0 tclass=file permissive=1 [ 12.045798] [ T295] type=1400 audit(1758284069.896:253): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_reset_performed_prop:s0" dev="tmpfs" ino=156 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_reset_performed_prop:s0 tclass=file permissive=1 [ 12.045820] [ T295] type=1400 audit(1758284069.896:254): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_statsd_native_boot_prop:s0" dev="tmpfs" ino=159 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_statsd_native_boot_prop:s0 tclass=file permissive=1 [ 12.045873] [ T295] type=1400 audit(1758284069.896:255): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_statsd_native_boot_prop:s0" dev="tmpfs" ino=159 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_statsd_native_boot_prop:s0 tclass=file permissive=1 [ 12.045895] [ T295] type=1400 audit(1758284069.896:256): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_statsd_native_boot_prop:s0" dev="tmpfs" ino=159 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_statsd_native_boot_prop:s0 tclass=file permissive=1 [ 12.045918] [ T295] type=1400 audit(1758284069.896:257): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_statsd_native_prop:s0" dev="tmpfs" ino=160 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_statsd_native_prop:s0 tclass=file permissive=1 [ 12.045941] [ T295] type=1400 audit(1758284069.896:258): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_statsd_native_prop:s0" dev="tmpfs" ino=160 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_statsd_native_prop:s0 tclass=file permissive=1 [ 12.045963] [ T295] type=1400 audit(1758284069.896:259): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_statsd_native_prop:s0" dev="tmpfs" ino=160 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_statsd_native_prop:s0 tclass=file permissive=1 [ 12.045985] [ T295] type=1400 audit(1758284069.896:260): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_storage_native_boot_prop:s0" dev="tmpfs" ino=161 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_storage_native_boot_prop:s0 tclass=file permissive=1 [ 12.046008] [ T295] type=1400 audit(1758284069.896:261): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_storage_native_boot_prop:s0" dev="tmpfs" ino=161 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_storage_native_boot_prop:s0 tclass=file permissive=1 [ 12.046030] [ T295] type=1400 audit(1758284069.896:262): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_storage_native_boot_prop:s0" dev="tmpfs" ino=161 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_storage_native_boot_prop:s0 tclass=file permissive=1 [ 12.046053] [ T295] type=1400 audit(1758284069.896:263): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_surface_flinger_native_boot_prop:s0" dev="tmpfs" ino=162 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_surface_flinger_native_boot_prop:s0 tclass=file permissive=1 [ 12.046075] [ T295] type=1400 audit(1758284069.900:264): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_surface_flinger_native_boot_prop:s0" dev="tmpfs" ino=162 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_surface_flinger_native_boot_prop:s0 tclass=file permissive=1 [ 12.046098] [ T295] type=1400 audit(1758284069.900:265): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_surface_flinger_native_boot_prop:s0" dev="tmpfs" ino=162 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_surface_flinger_native_boot_prop:s0 tclass=file permissive=1 [ 12.046120] [ T295] type=1400 audit(1758284069.900:266): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_swcodec_native_prop:s0" dev="tmpfs" ino=163 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_swcodec_native_prop:s0 tclass=file permissive=1 [ 12.046142] [ T295] type=1400 audit(1758284069.900:267): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_swcodec_native_prop:s0" dev="tmpfs" ino=163 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_swcodec_native_prop:s0 tclass=file permissive=1 [ 12.046165] [ T295] type=1400 audit(1758284069.900:268): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_swcodec_native_prop:s0" dev="tmpfs" ino=163 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_swcodec_native_prop:s0 tclass=file permissive=1 [ 12.046187] [ T295] type=1400 audit(1758284069.900:269): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_sys_traced_prop:s0" dev="tmpfs" ino=164 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_sys_traced_prop:s0 tclass=file permissive=1 [ 12.046209] [ T295] type=1400 audit(1758284069.900:270): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_sys_traced_prop:s0" dev="tmpfs" ino=164 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_sys_traced_prop:s0 tclass=file permissive=1 [ 12.046231] [ T295] type=1400 audit(1758284069.900:271): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_sys_traced_prop:s0" dev="tmpfs" ino=164 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_sys_traced_prop:s0 tclass=file permissive=1 [ 12.046254] [ T295] type=1400 audit(1758284069.900:272): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_tethering_u_or_later_native_prop:s0" dev="tmpfs" ino=165 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_tethering_u_or_later_native_prop:s0 tclass=file permissive=1 [ 12.046276] [ T295] type=1400 audit(1758284069.900:273): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_tethering_u_or_later_native_prop:s0" dev="tmpfs" ino=165 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_tethering_u_or_later_native_prop:s0 tclass=file permissive=1 [ 12.046328] [ T295] type=1400 audit(1758284069.900:274): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_tethering_u_or_later_native_prop:s0" dev="tmpfs" ino=165 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_tethering_u_or_later_native_prop:s0 tclass=file permissive=1 [ 12.046351] [ T295] type=1400 audit(1758284069.900:275): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_vendor_system_native_boot_prop:s0" dev="tmpfs" ino=166 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_vendor_system_native_boot_prop:s0 tclass=file permissive=1 [ 12.046373] [ T295] type=1400 audit(1758284069.900:276): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_vendor_system_native_boot_prop:s0" dev="tmpfs" ino=166 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_vendor_system_native_boot_prop:s0 tclass=file permissive=1 [ 12.046396] [ T295] type=1400 audit(1758284069.900:277): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_vendor_system_native_boot_prop:s0" dev="tmpfs" ino=166 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_vendor_system_native_boot_prop:s0 tclass=file permissive=1 [ 12.046418] [ T295] type=1400 audit(1758284069.900:278): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_vendor_system_native_prop:s0" dev="tmpfs" ino=167 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_vendor_system_native_prop:s0 tclass=file permissive=1 [ 12.046441] [ T295] type=1400 audit(1758284069.900:279): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_vendor_system_native_prop:s0" dev="tmpfs" ino=167 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_vendor_system_native_prop:s0 tclass=file permissive=1 [ 12.046464] [ T295] type=1400 audit(1758284069.900:280): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_vendor_system_native_prop:s0" dev="tmpfs" ino=167 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_vendor_system_native_prop:s0 tclass=file permissive=1 [ 12.046486] [ T295] type=1400 audit(1758284069.900:281): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_virtualization_framework_native_prop:s0" dev="tmpfs" ino=168 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_virtualization_framework_native_prop:s0 tclass=file permissive=1 [ 12.046509] [ T295] type=1400 audit(1758284069.900:282): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_virtualization_framework_native_prop:s0" dev="tmpfs" ino=168 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_virtualization_framework_native_prop:s0 tclass=file permissive=1 [ 12.046532] [ T295] type=1400 audit(1758284069.900:283): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_virtualization_framework_native_prop:s0" dev="tmpfs" ino=168 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_virtualization_framework_native_prop:s0 tclass=file permissive=1 [ 12.046554] [ T295] type=1400 audit(1758284069.900:284): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_window_manager_native_boot_prop:s0" dev="tmpfs" ino=169 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_window_manager_native_boot_prop:s0 tclass=file permissive=1 [ 12.046576] [ T295] type=1400 audit(1758284069.900:285): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_window_manager_native_boot_prop:s0" dev="tmpfs" ino=169 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_window_manager_native_boot_prop:s0 tclass=file permissive=1 [ 12.046599] [ T295] type=1400 audit(1758284069.900:286): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_window_manager_native_boot_prop:s0" dev="tmpfs" ino=169 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_window_manager_native_boot_prop:s0 tclass=file permissive=1 [ 12.046621] [ T295] type=1400 audit(1758284069.900:287): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_logging_prop:s0" dev="tmpfs" ino=170 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_logging_prop:s0 tclass=file permissive=1 [ 12.046643] [ T295] type=1400 audit(1758284069.900:288): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_logging_prop:s0" dev="tmpfs" ino=170 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_logging_prop:s0 tclass=file permissive=1 [ 12.046665] [ T295] type=1400 audit(1758284069.900:289): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_logging_prop:s0" dev="tmpfs" ino=170 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_logging_prop:s0 tclass=file permissive=1 [ 12.046687] [ T295] type=1400 audit(1758284069.900:290): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:dmesgd_start_prop:s0" dev="tmpfs" ino=172 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dmesgd_start_prop:s0 tclass=file permissive=1 [ 12.046709] [ T295] type=1400 audit(1758284069.900:291): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:dmesgd_start_prop:s0" dev="tmpfs" ino=172 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dmesgd_start_prop:s0 tclass=file permissive=1 [ 12.046731] [ T295] type=1400 audit(1758284069.900:292): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:dmesgd_start_prop:s0" dev="tmpfs" ino=172 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dmesgd_start_prop:s0 tclass=file permissive=1 [ 12.046782] [ T295] type=1400 audit(1758284069.900:293): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:drm_service_config_prop:s0" dev="tmpfs" ino=173 scontext=u:r:odrefresh:s0 tcontext=u:object_r:drm_service_config_prop:s0 tclass=file permissive=1 [ 12.046804] [ T295] type=1400 audit(1758284069.900:294): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:drm_service_config_prop:s0" dev="tmpfs" ino=173 scontext=u:r:odrefresh:s0 tcontext=u:object_r:drm_service_config_prop:s0 tclass=file permissive=1 [ 12.046826] [ T295] type=1400 audit(1758284069.900:295): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:drm_service_config_prop:s0" dev="tmpfs" ino=173 scontext=u:r:odrefresh:s0 tcontext=u:object_r:drm_service_config_prop:s0 tclass=file permissive=1 [ 12.046848] [ T295] type=1400 audit(1758284069.900:296): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:dumpstate_options_prop:s0" dev="tmpfs" ino=174 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dumpstate_options_prop:s0 tclass=file permissive=1 [ 12.046870] [ T295] type=1400 audit(1758284069.900:297): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:dumpstate_options_prop:s0" dev="tmpfs" ino=174 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dumpstate_options_prop:s0 tclass=file permissive=1 [ 12.046891] [ T295] type=1400 audit(1758284069.900:298): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:dumpstate_options_prop:s0" dev="tmpfs" ino=174 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dumpstate_options_prop:s0 tclass=file permissive=1 [ 12.046914] [ T295] type=1400 audit(1758284069.900:299): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:dynamic_system_prop:s0" dev="tmpfs" ino=176 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dynamic_system_prop:s0 tclass=file permissive=1 [ 12.046935] [ T295] type=1400 audit(1758284069.900:300): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:dynamic_system_prop:s0" dev="tmpfs" ino=176 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dynamic_system_prop:s0 tclass=file permissive=1 [ 12.046957] [ T295] type=1400 audit(1758284069.900:301): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:dynamic_system_prop:s0" dev="tmpfs" ino=176 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dynamic_system_prop:s0 tclass=file permissive=1 [ 12.046979] [ T295] type=1400 audit(1758284069.900:302): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:exported_bluetooth_prop:s0" dev="tmpfs" ino=178 scontext=u:r:odrefresh:s0 tcontext=u:object_r:exported_bluetooth_prop:s0 tclass=file permissive=1 [ 12.047001] [ T295] type=1400 audit(1758284069.900:303): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:exported_bluetooth_prop:s0" dev="tmpfs" ino=178 scontext=u:r:odrefresh:s0 tcontext=u:object_r:exported_bluetooth_prop:s0 tclass=file permissive=1 [ 12.047023] [ T295] type=1400 audit(1758284069.900:304): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:exported_bluetooth_prop:s0" dev="tmpfs" ino=178 scontext=u:r:odrefresh:s0 tcontext=u:object_r:exported_bluetooth_prop:s0 tclass=file permissive=1 [ 12.047045] [ T295] type=1400 audit(1758284069.900:305): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:exported_overlay_prop:s0" dev="tmpfs" ino=182 scontext=u:r:odrefresh:s0 tcontext=u:object_r:exported_overlay_prop:s0 tclass=file permissive=1 [ 12.047067] [ T295] type=1400 audit(1758284069.900:306): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:exported_overlay_prop:s0" dev="tmpfs" ino=182 scontext=u:r:odrefresh:s0 tcontext=u:object_r:exported_overlay_prop:s0 tclass=file permissive=1 [ 12.047089] [ T295] type=1400 audit(1758284069.900:307): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:exported_overlay_prop:s0" dev="tmpfs" ino=182 scontext=u:r:odrefresh:s0 tcontext=u:object_r:exported_overlay_prop:s0 tclass=file permissive=1 [ 12.047110] [ T295] type=1400 audit(1758284069.900:308): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:fastbootd_protocol_prop:s0" dev="tmpfs" ino=185 scontext=u:r:odrefresh:s0 tcontext=u:object_r:fastbootd_protocol_prop:s0 tclass=file permissive=1 [ 12.047132] [ T295] type=1400 audit(1758284069.900:309): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:fastbootd_protocol_prop:s0" dev="tmpfs" ino=185 scontext=u:r:odrefresh:s0 tcontext=u:object_r:fastbootd_protocol_prop:s0 tclass=file permissive=1 [ 12.047154] [ T295] type=1400 audit(1758284069.900:310): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:fastbootd_protocol_prop:s0" dev="tmpfs" ino=185 scontext=u:r:odrefresh:s0 tcontext=u:object_r:fastbootd_protocol_prop:s0 tclass=file permissive=1 [ 12.047176] [ T295] type=1400 audit(1758284069.900:311): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ffs_control_prop:s0" dev="tmpfs" ino=187 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ffs_control_prop:s0 tclass=file permissive=1 [ 12.047227] [ T295] type=1400 audit(1758284069.900:312): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ffs_control_prop:s0" dev="tmpfs" ino=187 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ffs_control_prop:s0 tclass=file permissive=1 [ 12.047250] [ T295] type=1400 audit(1758284069.900:313): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ffs_control_prop:s0" dev="tmpfs" ino=187 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ffs_control_prop:s0 tclass=file permissive=1 [ 12.047271] [ T295] type=1400 audit(1758284069.900:314): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:firstboot_prop:s0" dev="tmpfs" ino=189 scontext=u:r:odrefresh:s0 tcontext=u:object_r:firstboot_prop:s0 tclass=file permissive=1 [ 12.047293] [ T295] type=1400 audit(1758284069.900:315): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:firstboot_prop:s0" dev="tmpfs" ino=189 scontext=u:r:odrefresh:s0 tcontext=u:object_r:firstboot_prop:s0 tclass=file permissive=1 [ 12.047314] [ T295] type=1400 audit(1758284069.900:316): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:firstboot_prop:s0" dev="tmpfs" ino=189 scontext=u:r:odrefresh:s0 tcontext=u:object_r:firstboot_prop:s0 tclass=file permissive=1 [ 12.047336] [ T295] type=1400 audit(1758284069.900:317): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:framework_watchdog_config_prop:s0" dev="tmpfs" ino=191 scontext=u:r:odrefresh:s0 tcontext=u:object_r:framework_watchdog_config_prop:s0 tclass=file permissive=1 [ 12.047359] [ T295] type=1400 audit(1758284069.900:318): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:framework_watchdog_config_prop:s0" dev="tmpfs" ino=191 scontext=u:r:odrefresh:s0 tcontext=u:object_r:framework_watchdog_config_prop:s0 tclass=file permissive=1 [ 12.047381] [ T295] type=1400 audit(1758284069.900:319): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:framework_watchdog_config_prop:s0" dev="tmpfs" ino=191 scontext=u:r:odrefresh:s0 tcontext=u:object_r:framework_watchdog_config_prop:s0 tclass=file permissive=1 [ 12.047402] [ T295] type=1400 audit(1758284069.900:320): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:future_pm_prop:s0" dev="tmpfs" ino=192 scontext=u:r:odrefresh:s0 tcontext=u:object_r:future_pm_prop:s0 tclass=file permissive=1 [ 12.047424] [ T295] type=1400 audit(1758284069.900:321): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:future_pm_prop:s0" dev="tmpfs" ino=192 scontext=u:r:odrefresh:s0 tcontext=u:object_r:future_pm_prop:s0 tclass=file permissive=1 [ 12.047445] [ T295] type=1400 audit(1758284069.900:322): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:future_pm_prop:s0" dev="tmpfs" ino=192 scontext=u:r:odrefresh:s0 tcontext=u:object_r:future_pm_prop:s0 tclass=file permissive=1 [ 12.047467] [ T295] type=1400 audit(1758284069.900:323): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:gesture_prop:s0" dev="tmpfs" ino=193 scontext=u:r:odrefresh:s0 tcontext=u:object_r:gesture_prop:s0 tclass=file permissive=1 [ 12.047488] [ T295] type=1400 audit(1758284069.900:324): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:gesture_prop:s0" dev="tmpfs" ino=193 scontext=u:r:odrefresh:s0 tcontext=u:object_r:gesture_prop:s0 tclass=file permissive=1 [ 12.047510] [ T295] type=1400 audit(1758284069.900:325): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:gesture_prop:s0" dev="tmpfs" ino=193 scontext=u:r:odrefresh:s0 tcontext=u:object_r:gesture_prop:s0 tclass=file permissive=1 [ 12.047531] [ T295] type=1400 audit(1758284069.900:326): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:gsid_prop:s0" dev="tmpfs" ino=196 scontext=u:r:odrefresh:s0 tcontext=u:object_r:gsid_prop:s0 tclass=file permissive=1 [ 12.047552] [ T295] type=1400 audit(1758284069.900:327): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:gsid_prop:s0" dev="tmpfs" ino=196 scontext=u:r:odrefresh:s0 tcontext=u:object_r:gsid_prop:s0 tclass=file permissive=1 [ 12.047574] [ T295] type=1400 audit(1758284069.900:328): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:gsid_prop:s0" dev="tmpfs" ino=196 scontext=u:r:odrefresh:s0 tcontext=u:object_r:gsid_prop:s0 tclass=file permissive=1 [ 12.047596] [ T295] type=1400 audit(1758284069.900:329): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:hal_dumpstate_config_prop:s0" dev="tmpfs" ino=198 scontext=u:r:odrefresh:s0 tcontext=u:object_r:hal_dumpstate_config_prop:s0 tclass=file permissive=1 [ 12.047618] [ T295] type=1400 audit(1758284069.900:330): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:hal_dumpstate_config_prop:s0" dev="tmpfs" ino=198 scontext=u:r:odrefresh:s0 tcontext=u:object_r:hal_dumpstate_config_prop:s0 tclass=file permissive=1 [ 12.047669] [ T295] type=1400 audit(1758284069.900:331): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:hal_dumpstate_config_prop:s0" dev="tmpfs" ino=198 scontext=u:r:odrefresh:s0 tcontext=u:object_r:hal_dumpstate_config_prop:s0 tclass=file permissive=1 [ 12.047691] [ T295] type=1400 audit(1758284069.900:332): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:heapprofd_enabled_prop:s0" dev="tmpfs" ino=201 scontext=u:r:odrefresh:s0 tcontext=u:object_r:heapprofd_enabled_prop:s0 tclass=file permissive=1 [ 12.047713] [ T295] type=1400 audit(1758284069.900:333): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:heapprofd_enabled_prop:s0" dev="tmpfs" ino=201 scontext=u:r:odrefresh:s0 tcontext=u:object_r:heapprofd_enabled_prop:s0 tclass=file permissive=1 [ 12.047735] [ T295] type=1400 audit(1758284069.900:334): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:heapprofd_enabled_prop:s0" dev="tmpfs" ino=201 scontext=u:r:odrefresh:s0 tcontext=u:object_r:heapprofd_enabled_prop:s0 tclass=file permissive=1 [ 12.047756] [ T295] type=1400 audit(1758284069.900:335): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=204 scontext=u:r:odrefresh:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1 [ 12.047777] [ T295] type=1400 audit(1758284069.900:336): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=204 scontext=u:r:odrefresh:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1 [ 12.047799] [ T295] type=1400 audit(1758284069.900:337): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:hwservicemanager_prop:s0" dev="tmpfs" ino=204 scontext=u:r:odrefresh:s0 tcontext=u:object_r:hwservicemanager_prop:s0 tclass=file permissive=1 [ 12.047820] [ T295] type=1400 audit(1758284069.900:338): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:hypervisor_prop:s0" dev="tmpfs" ino=205 scontext=u:r:odrefresh:s0 tcontext=u:object_r:hypervisor_prop:s0 tclass=file permissive=1 [ 12.047842] [ T295] type=1400 audit(1758284069.900:339): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:hypervisor_prop:s0" dev="tmpfs" ino=205 scontext=u:r:odrefresh:s0 tcontext=u:object_r:hypervisor_prop:s0 tclass=file permissive=1 [ 12.047863] [ T295] type=1400 audit(1758284069.900:340): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:hypervisor_prop:s0" dev="tmpfs" ino=205 scontext=u:r:odrefresh:s0 tcontext=u:object_r:hypervisor_prop:s0 tclass=file permissive=1 [ 12.047885] [ T295] type=1400 audit(1758284069.900:341): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:hypervisor_restricted_prop:s0" dev="tmpfs" ino=206 scontext=u:r:odrefresh:s0 tcontext=u:object_r:hypervisor_restricted_prop:s0 tclass=file permissive=1 [ 12.047907] [ T295] type=1400 audit(1758284069.900:342): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:hypervisor_restricted_prop:s0" dev="tmpfs" ino=206 scontext=u:r:odrefresh:s0 tcontext=u:object_r:hypervisor_restricted_prop:s0 tclass=file permissive=1 [ 12.047929] [ T295] type=1400 audit(1758284069.900:343): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:hypervisor_restricted_prop:s0" dev="tmpfs" ino=206 scontext=u:r:odrefresh:s0 tcontext=u:object_r:hypervisor_restricted_prop:s0 tclass=file permissive=1 [ 12.047950] [ T295] type=1400 audit(1758284069.900:344): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:incremental_prop:s0" dev="tmpfs" ino=207 scontext=u:r:odrefresh:s0 tcontext=u:object_r:incremental_prop:s0 tclass=file permissive=1 [ 12.047972] [ T295] type=1400 audit(1758284069.900:345): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:incremental_prop:s0" dev="tmpfs" ino=207 scontext=u:r:odrefresh:s0 tcontext=u:object_r:incremental_prop:s0 tclass=file permissive=1 [ 12.047994] [ T295] type=1400 audit(1758284069.900:346): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:incremental_prop:s0" dev="tmpfs" ino=207 scontext=u:r:odrefresh:s0 tcontext=u:object_r:incremental_prop:s0 tclass=file permissive=1 [ 12.048016] [ T295] type=1400 audit(1758284069.900:347): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_perf_lsm_hooks_prop:s0" dev="tmpfs" ino=208 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_perf_lsm_hooks_prop:s0 tclass=file permissive=1 [ 12.048038] [ T295] type=1400 audit(1758284069.900:348): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_perf_lsm_hooks_prop:s0" dev="tmpfs" ino=208 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_perf_lsm_hooks_prop:s0 tclass=file permissive=1 [ 12.048060] [ T295] type=1400 audit(1758284069.900:349): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_perf_lsm_hooks_prop:s0" dev="tmpfs" ino=208 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_perf_lsm_hooks_prop:s0 tclass=file permissive=1 [ 12.048110] [ T295] type=1400 audit(1758284069.900:350): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_storage_prop:s0" dev="tmpfs" ino=211 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_storage_prop:s0 tclass=file permissive=1 [ 12.048132] [ T295] type=1400 audit(1758284069.900:351): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_storage_prop:s0" dev="tmpfs" ino=211 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_storage_prop:s0 tclass=file permissive=1 [ 12.048153] [ T295] type=1400 audit(1758284069.900:352): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_storage_prop:s0" dev="tmpfs" ino=211 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_storage_prop:s0 tclass=file permissive=1 [ 12.048175] [ T295] type=1400 audit(1758284069.900:353): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_svc_debug_prop:s0" dev="tmpfs" ino=212 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_svc_debug_prop:s0 tclass=file permissive=1 [ 12.048196] [ T295] type=1400 audit(1758284069.900:354): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_svc_debug_prop:s0" dev="tmpfs" ino=212 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_svc_debug_prop:s0 tclass=file permissive=1 [ 12.048217] [ T295] type=1400 audit(1758284069.900:355): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_svc_debug_prop:s0" dev="tmpfs" ino=212 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_svc_debug_prop:s0 tclass=file permissive=1 [ 12.048238] [ T295] type=1400 audit(1758284069.900:356): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:keyguard_config_prop:s0" dev="tmpfs" ino=213 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keyguard_config_prop:s0 tclass=file permissive=1 [ 12.048259] [ T295] type=1400 audit(1758284069.900:357): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:keyguard_config_prop:s0" dev="tmpfs" ino=213 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keyguard_config_prop:s0 tclass=file permissive=1 [ 12.048281] [ T295] type=1400 audit(1758284069.900:358): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:keyguard_config_prop:s0" dev="tmpfs" ino=213 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keyguard_config_prop:s0 tclass=file permissive=1 [ 12.048302] [ T295] type=1400 audit(1758284069.900:359): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_config_prop:s0" dev="tmpfs" ino=214 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_config_prop:s0 tclass=file permissive=1 [ 12.048323] [ T295] type=1400 audit(1758284069.900:360): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_config_prop:s0" dev="tmpfs" ino=214 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_config_prop:s0 tclass=file permissive=1 [ 12.048607] [ T295] type=1400 audit(1758284069.900:361): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_config_prop:s0" dev="tmpfs" ino=214 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_config_prop:s0 tclass=file permissive=1 [ 12.048631] [ T295] type=1400 audit(1758284069.904:362): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_crash_prop:s0" dev="tmpfs" ino=215 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_crash_prop:s0 tclass=file permissive=1 [ 12.048653] [ T295] type=1400 audit(1758284069.904:363): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_crash_prop:s0" dev="tmpfs" ino=215 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_crash_prop:s0 tclass=file permissive=1 [ 12.048675] [ T295] type=1400 audit(1758284069.904:364): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_crash_prop:s0" dev="tmpfs" ino=215 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_crash_prop:s0 tclass=file permissive=1 [ 12.048696] [ T295] type=1400 audit(1758284069.904:365): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_listen_prop:s0" dev="tmpfs" ino=216 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_listen_prop:s0 tclass=file permissive=1 [ 12.048718] [ T295] type=1400 audit(1758284069.904:366): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_listen_prop:s0" dev="tmpfs" ino=216 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_listen_prop:s0 tclass=file permissive=1 [ 12.048739] [ T295] type=1400 audit(1758284069.904:367): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_listen_prop:s0" dev="tmpfs" ino=216 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_listen_prop:s0 tclass=file permissive=1 [ 12.048761] [ T295] type=1400 audit(1758284069.904:368): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:last_boot_reason_prop:s0" dev="tmpfs" ino=217 scontext=u:r:odrefresh:s0 tcontext=u:object_r:last_boot_reason_prop:s0 tclass=file permissive=1 [ 12.048783] [ T295] type=1400 audit(1758284069.904:369): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:last_boot_reason_prop:s0" dev="tmpfs" ino=217 scontext=u:r:odrefresh:s0 tcontext=u:object_r:last_boot_reason_prop:s0 tclass=file permissive=1 [ 12.048804] [ T295] type=1400 audit(1758284069.904:370): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:last_boot_reason_prop:s0" dev="tmpfs" ino=217 scontext=u:r:odrefresh:s0 tcontext=u:object_r:last_boot_reason_prop:s0 tclass=file permissive=1 [ 12.048825] [ T295] type=1400 audit(1758284069.904:371): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:llkd_prop:s0" dev="tmpfs" ino=219 scontext=u:r:odrefresh:s0 tcontext=u:object_r:llkd_prop:s0 tclass=file permissive=1 [ 12.048846] [ T295] type=1400 audit(1758284069.904:372): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:llkd_prop:s0" dev="tmpfs" ino=219 scontext=u:r:odrefresh:s0 tcontext=u:object_r:llkd_prop:s0 tclass=file permissive=1 [ 12.048868] [ T295] type=1400 audit(1758284069.904:373): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:llkd_prop:s0" dev="tmpfs" ino=219 scontext=u:r:odrefresh:s0 tcontext=u:object_r:llkd_prop:s0 tclass=file permissive=1 [ 12.048898] [ T295] type=1400 audit(1758284069.904:374): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:lmkd_prop:s0" dev="tmpfs" ino=221 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lmkd_prop:s0 tclass=file permissive=1 [ 12.048920] [ T295] type=1400 audit(1758284069.904:375): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:lmkd_prop:s0" dev="tmpfs" ino=221 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lmkd_prop:s0 tclass=file permissive=1 [ 12.048942] [ T295] type=1400 audit(1758284069.904:376): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:lmkd_prop:s0" dev="tmpfs" ino=221 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lmkd_prop:s0 tclass=file permissive=1 [ 12.048964] [ T295] type=1400 audit(1758284069.904:377): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:logpersistd_logging_prop:s0" dev="tmpfs" ino=228 scontext=u:r:odrefresh:s0 tcontext=u:object_r:logpersistd_logging_prop:s0 tclass=file permissive=1 [ 12.048986] [ T295] type=1400 audit(1758284069.904:378): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:logpersistd_logging_prop:s0" dev="tmpfs" ino=228 scontext=u:r:odrefresh:s0 tcontext=u:object_r:logpersistd_logging_prop:s0 tclass=file permissive=1 [ 12.049007] [ T295] type=1400 audit(1758284069.904:379): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:logpersistd_logging_prop:s0" dev="tmpfs" ino=228 scontext=u:r:odrefresh:s0 tcontext=u:object_r:logpersistd_logging_prop:s0 tclass=file permissive=1 [ 12.049059] [ T295] type=1400 audit(1758284069.904:380): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:lower_kptr_restrict_prop:s0" dev="tmpfs" ino=229 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lower_kptr_restrict_prop:s0 tclass=file permissive=1 [ 12.049081] [ T295] type=1400 audit(1758284069.904:381): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:lower_kptr_restrict_prop:s0" dev="tmpfs" ino=229 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lower_kptr_restrict_prop:s0 tclass=file permissive=1 [ 12.049103] [ T295] type=1400 audit(1758284069.904:382): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:lower_kptr_restrict_prop:s0" dev="tmpfs" ino=229 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lower_kptr_restrict_prop:s0 tclass=file permissive=1 [ 12.049124] [ T295] type=1400 audit(1758284069.904:383): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:lowpan_prop:s0" dev="tmpfs" ino=230 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lowpan_prop:s0 tclass=file permissive=1 [ 12.049146] [ T295] type=1400 audit(1758284069.904:384): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:lowpan_prop:s0" dev="tmpfs" ino=230 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lowpan_prop:s0 tclass=file permissive=1 [ 12.049168] [ T295] type=1400 audit(1758284069.904:385): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:lowpan_prop:s0" dev="tmpfs" ino=230 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lowpan_prop:s0 tclass=file permissive=1 [ 12.049189] [ T295] type=1400 audit(1758284069.904:386): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:lpdumpd_prop:s0" dev="tmpfs" ino=231 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lpdumpd_prop:s0 tclass=file permissive=1 [ 12.049210] [ T295] type=1400 audit(1758284069.904:387): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:lpdumpd_prop:s0" dev="tmpfs" ino=231 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lpdumpd_prop:s0 tclass=file permissive=1 [ 12.049232] [ T295] type=1400 audit(1758284069.904:388): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:lpdumpd_prop:s0" dev="tmpfs" ino=231 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lpdumpd_prop:s0 tclass=file permissive=1 [ 12.049253] [ T295] type=1400 audit(1758284069.904:389): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:media_config_prop:s0" dev="tmpfs" ino=232 scontext=u:r:odrefresh:s0 tcontext=u:object_r:media_config_prop:s0 tclass=file permissive=1 [ 12.049274] [ T295] type=1400 audit(1758284069.904:390): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:media_config_prop:s0" dev="tmpfs" ino=232 scontext=u:r:odrefresh:s0 tcontext=u:object_r:media_config_prop:s0 tclass=file permissive=1 [ 12.049296] [ T295] type=1400 audit(1758284069.904:391): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:media_config_prop:s0" dev="tmpfs" ino=232 scontext=u:r:odrefresh:s0 tcontext=u:object_r:media_config_prop:s0 tclass=file permissive=1 [ 12.049318] [ T295] type=1400 audit(1758284069.904:392): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:media_variant_prop:s0" dev="tmpfs" ino=233 scontext=u:r:odrefresh:s0 tcontext=u:object_r:media_variant_prop:s0 tclass=file permissive=1 [ 12.049339] [ T295] type=1400 audit(1758284069.904:393): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:media_variant_prop:s0" dev="tmpfs" ino=233 scontext=u:r:odrefresh:s0 tcontext=u:object_r:media_variant_prop:s0 tclass=file permissive=1 [ 12.049360] [ T295] type=1400 audit(1758284069.904:394): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:media_variant_prop:s0" dev="tmpfs" ino=233 scontext=u:r:odrefresh:s0 tcontext=u:object_r:media_variant_prop:s0 tclass=file permissive=1 [ 12.049382] [ T295] type=1400 audit(1758284069.904:395): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:mm_events_config_prop:s0" dev="tmpfs" ino=235 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mm_events_config_prop:s0 tclass=file permissive=1 [ 12.049403] [ T295] type=1400 audit(1758284069.904:396): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:mm_events_config_prop:s0" dev="tmpfs" ino=235 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mm_events_config_prop:s0 tclass=file permissive=1 [ 12.049425] [ T295] type=1400 audit(1758284069.904:397): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:mm_events_config_prop:s0" dev="tmpfs" ino=235 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mm_events_config_prop:s0 tclass=file permissive=1 [ 12.049446] [ T295] type=1400 audit(1758284069.904:398): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:mmc_prop:s0" dev="tmpfs" ino=236 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mmc_prop:s0 tclass=file permissive=1 [ 12.049497] [ T295] type=1400 audit(1758284069.904:399): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:mmc_prop:s0" dev="tmpfs" ino=236 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mmc_prop:s0 tclass=file permissive=1 [ 12.049518] [ T295] type=1400 audit(1758284069.904:400): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:mmc_prop:s0" dev="tmpfs" ino=236 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mmc_prop:s0 tclass=file permissive=1 [ 12.049540] [ T295] type=1400 audit(1758284069.904:401): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:mock_ota_prop:s0" dev="tmpfs" ino=237 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mock_ota_prop:s0 tclass=file permissive=1 [ 12.049561] [ T295] type=1400 audit(1758284069.904:402): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:mock_ota_prop:s0" dev="tmpfs" ino=237 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mock_ota_prop:s0 tclass=file permissive=1 [ 12.049583] [ T295] type=1400 audit(1758284069.904:403): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:mock_ota_prop:s0" dev="tmpfs" ino=237 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mock_ota_prop:s0 tclass=file permissive=1 [ 12.049604] [ T295] type=1400 audit(1758284069.904:404): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_464xlat_fromvendor_prop:s0" dev="tmpfs" ino=239 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_464xlat_fromvendor_prop:s0 tclass=file permissive=1 [ 12.049627] [ T295] type=1400 audit(1758284069.904:405): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_464xlat_fromvendor_prop:s0" dev="tmpfs" ino=239 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_464xlat_fromvendor_prop:s0 tclass=file permissive=1 [ 12.049649] [ T295] type=1400 audit(1758284069.904:406): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_464xlat_fromvendor_prop:s0" dev="tmpfs" ino=239 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_464xlat_fromvendor_prop:s0 tclass=file permissive=1 [ 12.049670] [ T295] type=1400 audit(1758284069.904:407): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_connectivity_prop:s0" dev="tmpfs" ino=240 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_connectivity_prop:s0 tclass=file permissive=1 [ 12.049692] [ T295] type=1400 audit(1758284069.904:408): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_connectivity_prop:s0" dev="tmpfs" ino=240 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_connectivity_prop:s0 tclass=file permissive=1 [ 12.049714] [ T295] type=1400 audit(1758284069.904:409): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_connectivity_prop:s0" dev="tmpfs" ino=240 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_connectivity_prop:s0 tclass=file permissive=1 [ 12.049735] [ T295] type=1400 audit(1758284069.904:410): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_dns_prop:s0" dev="tmpfs" ino=241 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_dns_prop:s0 tclass=file permissive=1 [ 12.049757] [ T295] type=1400 audit(1758284069.904:411): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_dns_prop:s0" dev="tmpfs" ino=241 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_dns_prop:s0 tclass=file permissive=1 [ 12.049778] [ T295] type=1400 audit(1758284069.904:412): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_dns_prop:s0" dev="tmpfs" ino=241 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_dns_prop:s0 tclass=file permissive=1 [ 12.049800] [ T295] type=1400 audit(1758284069.904:413): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:netd_stable_secret_prop:s0" dev="tmpfs" ino=243 scontext=u:r:odrefresh:s0 tcontext=u:object_r:netd_stable_secret_prop:s0 tclass=file permissive=1 [ 12.049822] [ T295] type=1400 audit(1758284069.904:414): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:netd_stable_secret_prop:s0" dev="tmpfs" ino=243 scontext=u:r:odrefresh:s0 tcontext=u:object_r:netd_stable_secret_prop:s0 tclass=file permissive=1 [ 12.049844] [ T295] type=1400 audit(1758284069.904:415): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:netd_stable_secret_prop:s0" dev="tmpfs" ino=243 scontext=u:r:odrefresh:s0 tcontext=u:object_r:netd_stable_secret_prop:s0 tclass=file permissive=1 [ 12.049866] [ T295] type=1400 audit(1758284069.904:416): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:nnapi_ext_deny_product_prop:s0" dev="tmpfs" ino=245 scontext=u:r:odrefresh:s0 tcontext=u:object_r:nnapi_ext_deny_product_prop:s0 tclass=file permissive=1 [ 12.049887] [ T295] type=1400 audit(1758284069.904:417): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:nnapi_ext_deny_product_prop:s0" dev="tmpfs" ino=245 scontext=u:r:odrefresh:s0 tcontext=u:object_r:nnapi_ext_deny_product_prop:s0 tclass=file permissive=1 [ 12.049909] [ T295] type=1400 audit(1758284069.904:418): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:nnapi_ext_deny_product_prop:s0" dev="tmpfs" ino=245 scontext=u:r:odrefresh:s0 tcontext=u:object_r:nnapi_ext_deny_product_prop:s0 tclass=file permissive=1 [ 12.049959] [ T295] type=1400 audit(1758284069.904:419): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:odsign_prop:s0" dev="tmpfs" ino=246 scontext=u:r:odrefresh:s0 tcontext=u:object_r:odsign_prop:s0 tclass=file permissive=1 [ 12.049977] [ T295] type=1400 audit(1758284069.904:420): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:odsign_prop:s0" dev="tmpfs" ino=246 scontext=u:r:odrefresh:s0 tcontext=u:object_r:odsign_prop:s0 tclass=file permissive=1 [ 12.049994] [ T295] type=1400 audit(1758284069.904:421): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:odsign_prop:s0" dev="tmpfs" ino=246 scontext=u:r:odrefresh:s0 tcontext=u:object_r:odsign_prop:s0 tclass=file permissive=1 [ 12.050011] [ T295] type=1400 audit(1758284069.904:422): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:oem_unlock_prop:s0" dev="tmpfs" ino=247 scontext=u:r:odrefresh:s0 tcontext=u:object_r:oem_unlock_prop:s0 tclass=file permissive=1 [ 12.050027] [ T295] type=1400 audit(1758284069.904:423): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:oem_unlock_prop:s0" dev="tmpfs" ino=247 scontext=u:r:odrefresh:s0 tcontext=u:object_r:oem_unlock_prop:s0 tclass=file permissive=1 [ 12.050044] [ T295] type=1400 audit(1758284069.904:424): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:oem_unlock_prop:s0" dev="tmpfs" ino=247 scontext=u:r:odrefresh:s0 tcontext=u:object_r:oem_unlock_prop:s0 tclass=file permissive=1 [ 12.050061] [ T295] type=1400 audit(1758284069.904:425): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:overlay_prop:s0" dev="tmpfs" ino=249 scontext=u:r:odrefresh:s0 tcontext=u:object_r:overlay_prop:s0 tclass=file permissive=1 [ 12.050078] [ T295] type=1400 audit(1758284069.904:426): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:overlay_prop:s0" dev="tmpfs" ino=249 scontext=u:r:odrefresh:s0 tcontext=u:object_r:overlay_prop:s0 tclass=file permissive=1 [ 12.050095] [ T295] type=1400 audit(1758284069.904:427): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:overlay_prop:s0" dev="tmpfs" ino=249 scontext=u:r:odrefresh:s0 tcontext=u:object_r:overlay_prop:s0 tclass=file permissive=1 [ 12.050111] [ T295] type=1400 audit(1758284069.904:428): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:packagemanager_config_prop:s0" dev="tmpfs" ino=250 scontext=u:r:odrefresh:s0 tcontext=u:object_r:packagemanager_config_prop:s0 tclass=file permissive=1 [ 12.050129] [ T295] type=1400 audit(1758284069.904:429): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:packagemanager_config_prop:s0" dev="tmpfs" ino=250 scontext=u:r:odrefresh:s0 tcontext=u:object_r:packagemanager_config_prop:s0 tclass=file permissive=1 [ 12.050146] [ T295] type=1400 audit(1758284069.904:430): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:packagemanager_config_prop:s0" dev="tmpfs" ino=250 scontext=u:r:odrefresh:s0 tcontext=u:object_r:packagemanager_config_prop:s0 tclass=file permissive=1 [ 12.050163] [ T295] type=1400 audit(1758284069.904:431): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:perf_drop_caches_prop:s0" dev="tmpfs" ino=252 scontext=u:r:odrefresh:s0 tcontext=u:object_r:perf_drop_caches_prop:s0 tclass=file permissive=1 [ 12.050180] [ T295] type=1400 audit(1758284069.904:432): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:perf_drop_caches_prop:s0" dev="tmpfs" ino=252 scontext=u:r:odrefresh:s0 tcontext=u:object_r:perf_drop_caches_prop:s0 tclass=file permissive=1 [ 12.050196] [ T295] type=1400 audit(1758284069.904:433): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:perf_drop_caches_prop:s0" dev="tmpfs" ino=252 scontext=u:r:odrefresh:s0 tcontext=u:object_r:perf_drop_caches_prop:s0 tclass=file permissive=1 [ 12.050214] [ T295] type=1400 audit(1758284069.904:434): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:persist_sysui_builder_extras_prop:s0" dev="tmpfs" ino=255 scontext=u:r:odrefresh:s0 tcontext=u:object_r:persist_sysui_builder_extras_prop:s0 tclass=file permissive=1 [ 12.050231] [ T295] type=1400 audit(1758284069.904:435): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:persist_sysui_builder_extras_prop:s0" dev="tmpfs" ino=255 scontext=u:r:odrefresh:s0 tcontext=u:object_r:persist_sysui_builder_extras_prop:s0 tclass=file permissive=1 [ 12.050249] [ T295] type=1400 audit(1758284069.904:436): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:persist_sysui_builder_extras_prop:s0" dev="tmpfs" ino=255 scontext=u:r:odrefresh:s0 tcontext=u:object_r:persist_sysui_builder_extras_prop:s0 tclass=file permissive=1 [ 12.050266] [ T295] type=1400 audit(1758284069.904:437): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:persist_vendor_debug_wifi_prop:s0" dev="tmpfs" ino=256 scontext=u:r:odrefresh:s0 tcontext=u:object_r:persist_vendor_debug_wifi_prop:s0 tclass=file permissive=1 [ 12.050284] [ T295] type=1400 audit(1758284069.904:438): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:persist_vendor_debug_wifi_prop:s0" dev="tmpfs" ino=256 scontext=u:r:odrefresh:s0 tcontext=u:object_r:persist_vendor_debug_wifi_prop:s0 tclass=file permissive=1 [ 12.050301] [ T295] type=1400 audit(1758284069.904:439): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:persist_vendor_debug_wifi_prop:s0" dev="tmpfs" ino=256 scontext=u:r:odrefresh:s0 tcontext=u:object_r:persist_vendor_debug_wifi_prop:s0 tclass=file permissive=1 [ 12.050318] [ T295] type=1400 audit(1758284069.904:440): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:persist_wm_debug_prop:s0" dev="tmpfs" ino=257 scontext=u:r:odrefresh:s0 tcontext=u:object_r:persist_wm_debug_prop:s0 tclass=file permissive=1 [ 12.050335] [ T295] type=1400 audit(1758284069.904:441): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:persist_wm_debug_prop:s0" dev="tmpfs" ino=257 scontext=u:r:odrefresh:s0 tcontext=u:object_r:persist_wm_debug_prop:s0 tclass=file permissive=1 [ 12.050352] [ T295] type=1400 audit(1758284069.904:442): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:persist_wm_debug_prop:s0" dev="tmpfs" ino=257 scontext=u:r:odrefresh:s0 tcontext=u:object_r:persist_wm_debug_prop:s0 tclass=file permissive=1 [ 12.050399] [ T295] type=1400 audit(1758284069.904:443): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:persistent_properties_ready_prop:s0" dev="tmpfs" ino=258 scontext=u:r:odrefresh:s0 tcontext=u:object_r:persistent_properties_ready_prop:s0 tclass=file permissive=1 [ 12.050417] [ T295] type=1400 audit(1758284069.904:444): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:persistent_properties_ready_prop:s0" dev="tmpfs" ino=258 scontext=u:r:odrefresh:s0 tcontext=u:object_r:persistent_properties_ready_prop:s0 tclass=file permissive=1 [ 12.050434] [ T295] type=1400 audit(1758284069.904:445): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:persistent_properties_ready_prop:s0" dev="tmpfs" ino=258 scontext=u:r:odrefresh:s0 tcontext=u:object_r:persistent_properties_ready_prop:s0 tclass=file permissive=1 [ 12.050451] [ T295] type=1400 audit(1758284069.904:446): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:power_debug_prop:s0" dev="tmpfs" ino=260 scontext=u:r:odrefresh:s0 tcontext=u:object_r:power_debug_prop:s0 tclass=file permissive=1 [ 12.050468] [ T295] type=1400 audit(1758284069.904:447): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:power_debug_prop:s0" dev="tmpfs" ino=260 scontext=u:r:odrefresh:s0 tcontext=u:object_r:power_debug_prop:s0 tclass=file permissive=1 [ 12.050485] [ T295] type=1400 audit(1758284069.904:448): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:power_debug_prop:s0" dev="tmpfs" ino=260 scontext=u:r:odrefresh:s0 tcontext=u:object_r:power_debug_prop:s0 tclass=file permissive=1 [ 12.050502] [ T295] type=1400 audit(1758284069.904:449): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:profcollectd_node_id_prop:s0" dev="tmpfs" ino=262 scontext=u:r:odrefresh:s0 tcontext=u:object_r:profcollectd_node_id_prop:s0 tclass=file permissive=1 [ 12.050519] [ T295] type=1400 audit(1758284069.904:450): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:profcollectd_node_id_prop:s0" dev="tmpfs" ino=262 scontext=u:r:odrefresh:s0 tcontext=u:object_r:profcollectd_node_id_prop:s0 tclass=file permissive=1 [ 12.050536] [ T295] type=1400 audit(1758284069.904:451): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:profcollectd_node_id_prop:s0" dev="tmpfs" ino=262 scontext=u:r:odrefresh:s0 tcontext=u:object_r:profcollectd_node_id_prop:s0 tclass=file permissive=1 [ 12.050553] [ T295] type=1400 audit(1758284069.904:452): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:provisioned_prop:s0" dev="tmpfs" ino=264 scontext=u:r:odrefresh:s0 tcontext=u:object_r:provisioned_prop:s0 tclass=file permissive=1 [ 12.050570] [ T295] type=1400 audit(1758284069.904:453): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:provisioned_prop:s0" dev="tmpfs" ino=264 scontext=u:r:odrefresh:s0 tcontext=u:object_r:provisioned_prop:s0 tclass=file permissive=1 [ 12.050587] [ T295] type=1400 audit(1758284069.904:454): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:provisioned_prop:s0" dev="tmpfs" ino=264 scontext=u:r:odrefresh:s0 tcontext=u:object_r:provisioned_prop:s0 tclass=file permissive=1 [ 12.050603] [ T295] type=1400 audit(1758284069.904:455): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:qemu_hw_prop:s0" dev="tmpfs" ino=265 scontext=u:r:odrefresh:s0 tcontext=u:object_r:qemu_hw_prop:s0 tclass=file permissive=1 [ 12.050774] [ T295] type=1400 audit(1758284069.904:456): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:qemu_hw_prop:s0" dev="tmpfs" ino=265 scontext=u:r:odrefresh:s0 tcontext=u:object_r:qemu_hw_prop:s0 tclass=file permissive=1 [ 12.050793] [ T295] type=1400 audit(1758284069.904:457): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:qemu_hw_prop:s0" dev="tmpfs" ino=265 scontext=u:r:odrefresh:s0 tcontext=u:object_r:qemu_hw_prop:s0 tclass=file permissive=1 [ 12.050810] [ T295] type=1400 audit(1758284069.904:458): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:qemu_sf_lcd_density_prop:s0" dev="tmpfs" ino=266 scontext=u:r:odrefresh:s0 tcontext=u:object_r:qemu_sf_lcd_density_prop:s0 tclass=file permissive=1 [ 12.050860] [ T295] type=1400 audit(1758284069.904:459): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:quick_start_prop:s0" dev="tmpfs" ino=267 scontext=u:r:odrefresh:s0 tcontext=u:object_r:quick_start_prop:s0 tclass=file permissive=1 [ 12.050877] [ T295] type=1400 audit(1758284069.904:460): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:radio_cdma_ecm_prop:s0" dev="tmpfs" ino=268 scontext=u:r:odrefresh:s0 tcontext=u:object_r:radio_cdma_ecm_prop:s0 tclass=file permissive=1 [ 12.050893] [ T295] type=1400 audit(1758284069.904:461): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:rebootescrow_hal_prop:s0" dev="tmpfs" ino=271 scontext=u:r:odrefresh:s0 tcontext=u:object_r:rebootescrow_hal_prop:s0 tclass=file permissive=1 [ 12.050911] [ T295] type=1400 audit(1758284069.904:462): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:rebootescrow_hal_prop:s0" dev="tmpfs" ino=271 scontext=u:r:odrefresh:s0 tcontext=u:object_r:rebootescrow_hal_prop:s0 tclass=file permissive=1 [ 12.050928] [ T295] type=1400 audit(1758284069.904:463): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:recovery_usb_config_prop:s0" dev="tmpfs" ino=273 scontext=u:r:odrefresh:s0 tcontext=u:object_r:recovery_usb_config_prop:s0 tclass=file permissive=1 [ 12.050944] [ T295] type=1400 audit(1758284069.904:464): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:retaildemo_prop:s0" dev="tmpfs" ino=276 scontext=u:r:odrefresh:s0 tcontext=u:object_r:retaildemo_prop:s0 tclass=file permissive=1 [ 12.050961] [ T295] type=1400 audit(1758284069.904:465): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:safemode_prop:s0" dev="tmpfs" ino=278 scontext=u:r:odrefresh:s0 tcontext=u:object_r:safemode_prop:s0 tclass=file permissive=1 [ 12.050978] [ T295] type=1400 audit(1758284069.904:466): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:safemode_prop:s0" dev="tmpfs" ino=278 scontext=u:r:odrefresh:s0 tcontext=u:object_r:safemode_prop:s0 tclass=file permissive=1 [ 12.050995] [ T295] type=1400 audit(1758284069.904:467): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:serialno_prop:s0" dev="tmpfs" ino=280 scontext=u:r:odrefresh:s0 tcontext=u:object_r:serialno_prop:s0 tclass=file permissive=1 [ 12.051012] [ T295] type=1400 audit(1758284069.904:468): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:smart_idle_maint_enabled_prop:s0" dev="tmpfs" ino=284 scontext=u:r:odrefresh:s0 tcontext=u:object_r:smart_idle_maint_enabled_prop:s0 tclass=file permissive=1 [ 12.051030] [ T295] type=1400 audit(1758284069.908:469): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:smart_idle_maint_enabled_prop:s0" dev="tmpfs" ino=284 scontext=u:r:odrefresh:s0 tcontext=u:object_r:smart_idle_maint_enabled_prop:s0 tclass=file permissive=1 [ 12.051047] [ T295] type=1400 audit(1758284069.908:470): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:snapuserd_prop:s0" dev="tmpfs" ino=285 scontext=u:r:odrefresh:s0 tcontext=u:object_r:snapuserd_prop:s0 tclass=file permissive=1 [ 12.051063] [ T295] type=1400 audit(1758284069.908:471): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:storage_config_prop:s0" dev="tmpfs" ino=289 scontext=u:r:odrefresh:s0 tcontext=u:object_r:storage_config_prop:s0 tclass=file permissive=1 [ 12.051080] [ T295] type=1400 audit(1758284069.908:472): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:storage_config_prop:s0" dev="tmpfs" ino=289 scontext=u:r:odrefresh:s0 tcontext=u:object_r:storage_config_prop:s0 tclass=file permissive=1 [ 12.051097] [ T295] type=1400 audit(1758284069.908:473): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:surfaceflinger_display_prop:s0" dev="tmpfs" ino=292 scontext=u:r:odrefresh:s0 tcontext=u:object_r:surfaceflinger_display_prop:s0 tclass=file permissive=1 [ 12.051114] [ T295] type=1400 audit(1758284069.908:474): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:suspend_prop:s0" dev="tmpfs" ino=294 scontext=u:r:odrefresh:s0 tcontext=u:object_r:suspend_prop:s0 tclass=file permissive=1 [ 12.051131] [ T295] type=1400 audit(1758284069.908:475): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:suspend_prop:s0" dev="tmpfs" ino=294 scontext=u:r:odrefresh:s0 tcontext=u:object_r:suspend_prop:s0 tclass=file permissive=1 [ 12.051148] [ T295] type=1400 audit(1758284069.908:476): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:suspend_prop:s0" dev="tmpfs" ino=294 scontext=u:r:odrefresh:s0 tcontext=u:object_r:suspend_prop:s0 tclass=file permissive=1 [ 12.051164] [ T295] type=1400 audit(1758284069.908:477): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:system_adbd_prop:s0" dev="tmpfs" ino=295 scontext=u:r:odrefresh:s0 tcontext=u:object_r:system_adbd_prop:s0 tclass=file permissive=1 [ 12.051181] [ T295] type=1400 audit(1758284069.908:478): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:system_adbd_prop:s0" dev="tmpfs" ino=295 scontext=u:r:odrefresh:s0 tcontext=u:object_r:system_adbd_prop:s0 tclass=file permissive=1 [ 12.051198] [ T295] type=1400 audit(1758284069.908:479): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:system_adbd_prop:s0" dev="tmpfs" ino=295 scontext=u:r:odrefresh:s0 tcontext=u:object_r:system_adbd_prop:s0 tclass=file permissive=1 [ 12.051215] [ T295] type=1400 audit(1758284069.908:480): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:system_trace_prop:s0" dev="tmpfs" ino=300 scontext=u:r:odrefresh:s0 tcontext=u:object_r:system_trace_prop:s0 tclass=file permissive=1 [ 12.051231] [ T295] type=1400 audit(1758284069.908:481): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:system_trace_prop:s0" dev="tmpfs" ino=300 scontext=u:r:odrefresh:s0 tcontext=u:object_r:system_trace_prop:s0 tclass=file permissive=1 [ 12.051249] [ T295] type=1400 audit(1758284069.908:482): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:system_user_mode_emulation_prop:s0" dev="tmpfs" ino=301 scontext=u:r:odrefresh:s0 tcontext=u:object_r:system_user_mode_emulation_prop:s0 tclass=file permissive=1 [ 12.051296] [ T295] type=1400 audit(1758284069.908:483): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:system_user_mode_emulation_prop:s0" dev="tmpfs" ino=301 scontext=u:r:odrefresh:s0 tcontext=u:object_r:system_user_mode_emulation_prop:s0 tclass=file permissive=1 [ 12.051453] [ T295] type=1400 audit(1758284069.908:484): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:system_user_mode_emulation_prop:s0" dev="tmpfs" ino=301 scontext=u:r:odrefresh:s0 tcontext=u:object_r:system_user_mode_emulation_prop:s0 tclass=file permissive=1 [ 12.051472] [ T295] type=1400 audit(1758284069.908:485): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:test_boot_reason_prop:s0" dev="tmpfs" ino=305 scontext=u:r:odrefresh:s0 tcontext=u:object_r:test_boot_reason_prop:s0 tclass=file permissive=1 [ 12.051490] [ T295] type=1400 audit(1758284069.908:486): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:test_boot_reason_prop:s0" dev="tmpfs" ino=305 scontext=u:r:odrefresh:s0 tcontext=u:object_r:test_boot_reason_prop:s0 tclass=file permissive=1 [ 12.051507] [ T295] type=1400 audit(1758284069.908:487): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:test_boot_reason_prop:s0" dev="tmpfs" ino=305 scontext=u:r:odrefresh:s0 tcontext=u:object_r:test_boot_reason_prop:s0 tclass=file permissive=1 [ 12.051524] [ T295] type=1400 audit(1758284069.908:488): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:test_harness_prop:s0" dev="tmpfs" ino=306 scontext=u:r:odrefresh:s0 tcontext=u:object_r:test_harness_prop:s0 tclass=file permissive=1 [ 12.051541] [ T295] type=1400 audit(1758284069.908:489): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:test_harness_prop:s0" dev="tmpfs" ino=306 scontext=u:r:odrefresh:s0 tcontext=u:object_r:test_harness_prop:s0 tclass=file permissive=1 [ 12.051558] [ T295] type=1400 audit(1758284069.908:490): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:test_harness_prop:s0" dev="tmpfs" ino=306 scontext=u:r:odrefresh:s0 tcontext=u:object_r:test_harness_prop:s0 tclass=file permissive=1 [ 12.051574] [ T295] type=1400 audit(1758284069.908:491): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:theme_prop:s0" dev="tmpfs" ino=307 scontext=u:r:odrefresh:s0 tcontext=u:object_r:theme_prop:s0 tclass=file permissive=1 [ 12.051591] [ T295] type=1400 audit(1758284069.908:492): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:theme_prop:s0" dev="tmpfs" ino=307 scontext=u:r:odrefresh:s0 tcontext=u:object_r:theme_prop:s0 tclass=file permissive=1 [ 12.051608] [ T295] type=1400 audit(1758284069.908:493): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:theme_prop:s0" dev="tmpfs" ino=307 scontext=u:r:odrefresh:s0 tcontext=u:object_r:theme_prop:s0 tclass=file permissive=1 [ 12.051624] [ T295] type=1400 audit(1758284069.908:494): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:time_prop:s0" dev="tmpfs" ino=308 scontext=u:r:odrefresh:s0 tcontext=u:object_r:time_prop:s0 tclass=file permissive=1 [ 12.051641] [ T295] type=1400 audit(1758284069.908:495): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:tombstone_config_prop:s0" dev="tmpfs" ino=311 scontext=u:r:odrefresh:s0 tcontext=u:object_r:tombstone_config_prop:s0 tclass=file permissive=1 [ 12.051658] [ T295] type=1400 audit(1758284069.908:496): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:tombstone_config_prop:s0" dev="tmpfs" ino=311 scontext=u:r:odrefresh:s0 tcontext=u:object_r:tombstone_config_prop:s0 tclass=file permissive=1 [ 12.051675] [ T295] type=1400 audit(1758284069.908:497): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:tombstone_config_prop:s0" dev="tmpfs" ino=311 scontext=u:r:odrefresh:s0 tcontext=u:object_r:tombstone_config_prop:s0 tclass=file permissive=1 [ 12.051691] [ T295] type=1400 audit(1758284069.908:498): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_enabled_prop:s0" dev="tmpfs" ino=312 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_enabled_prop:s0 tclass=file permissive=1 [ 12.051708] [ T295] type=1400 audit(1758284069.908:499): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_enabled_prop:s0" dev="tmpfs" ino=312 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_enabled_prop:s0 tclass=file permissive=1 [ 12.051757] [ T295] type=1400 audit(1758284069.908:500): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_enabled_prop:s0" dev="tmpfs" ino=312 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_enabled_prop:s0 tclass=file permissive=1 [ 12.051773] [ T295] type=1400 audit(1758284069.908:501): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_lazy_prop:s0" dev="tmpfs" ino=313 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_lazy_prop:s0 tclass=file permissive=1 [ 12.051790] [ T295] type=1400 audit(1758284069.908:502): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_lazy_prop:s0" dev="tmpfs" ino=313 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_lazy_prop:s0 tclass=file permissive=1 [ 12.051807] [ T295] type=1400 audit(1758284069.908:503): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_lazy_prop:s0" dev="tmpfs" ino=313 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_lazy_prop:s0 tclass=file permissive=1 [ 12.051824] [ T295] type=1400 audit(1758284069.908:504): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_oome_heap_session_count_prop:s0" dev="tmpfs" ino=314 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_oome_heap_session_count_prop:s0 tclass=file permissive=1 [ 12.051841] [ T295] type=1400 audit(1758284069.908:505): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_oome_heap_session_count_prop:s0" dev="tmpfs" ino=314 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_oome_heap_session_count_prop:s0 tclass=file permissive=1 [ 12.051859] [ T295] type=1400 audit(1758284069.908:506): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_oome_heap_session_count_prop:s0" dev="tmpfs" ino=314 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_oome_heap_session_count_prop:s0 tclass=file permissive=1 [ 12.051876] [ T295] type=1400 audit(1758284069.908:507): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_perf_enabled_prop:s0" dev="tmpfs" ino=315 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_perf_enabled_prop:s0 tclass=file permissive=1 [ 12.051893] [ T295] type=1400 audit(1758284069.908:508): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_perf_enabled_prop:s0" dev="tmpfs" ino=315 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_perf_enabled_prop:s0 tclass=file permissive=1 [ 12.051910] [ T295] type=1400 audit(1758284069.908:509): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_perf_enabled_prop:s0" dev="tmpfs" ino=315 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_perf_enabled_prop:s0 tclass=file permissive=1 [ 12.051926] [ T295] type=1400 audit(1758284069.908:510): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:tuner_config_prop:s0" dev="tmpfs" ino=316 scontext=u:r:odrefresh:s0 tcontext=u:object_r:tuner_config_prop:s0 tclass=file permissive=1 [ 12.051943] [ T295] type=1400 audit(1758284069.908:511): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:tuner_config_prop:s0" dev="tmpfs" ino=316 scontext=u:r:odrefresh:s0 tcontext=u:object_r:tuner_config_prop:s0 tclass=file permissive=1 [ 12.051960] [ T295] type=1400 audit(1758284069.908:512): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:tuner_config_prop:s0" dev="tmpfs" ino=316 scontext=u:r:odrefresh:s0 tcontext=u:object_r:tuner_config_prop:s0 tclass=file permissive=1 [ 12.051977] [ T295] type=1400 audit(1758284069.908:513): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:tuner_server_ctl_prop:s0" dev="tmpfs" ino=317 scontext=u:r:odrefresh:s0 tcontext=u:object_r:tuner_server_ctl_prop:s0 tclass=file permissive=1 [ 12.051994] [ T295] type=1400 audit(1758284069.908:514): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:tuner_server_ctl_prop:s0" dev="tmpfs" ino=317 scontext=u:r:odrefresh:s0 tcontext=u:object_r:tuner_server_ctl_prop:s0 tclass=file permissive=1 [ 12.052010] [ T295] type=1400 audit(1758284069.908:515): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:tuner_server_ctl_prop:s0" dev="tmpfs" ino=317 scontext=u:r:odrefresh:s0 tcontext=u:object_r:tuner_server_ctl_prop:s0 tclass=file permissive=1 [ 12.052027] [ T295] type=1400 audit(1758284069.908:516): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:usb_uvc_enabled_prop:s0" dev="tmpfs" ino=321 scontext=u:r:odrefresh:s0 tcontext=u:object_r:usb_uvc_enabled_prop:s0 tclass=file permissive=1 [ 12.052044] [ T295] type=1400 audit(1758284069.908:517): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:usb_uvc_enabled_prop:s0" dev="tmpfs" ino=321 scontext=u:r:odrefresh:s0 tcontext=u:object_r:usb_uvc_enabled_prop:s0 tclass=file permissive=1 [ 12.052060] [ T295] type=1400 audit(1758284069.908:518): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:usb_uvc_enabled_prop:s0" dev="tmpfs" ino=321 scontext=u:r:odrefresh:s0 tcontext=u:object_r:usb_uvc_enabled_prop:s0 tclass=file permissive=1 [ 12.052077] [ T295] type=1400 audit(1758284069.908:519): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vehicle_hal_prop:s0" dev="tmpfs" ino=328 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vehicle_hal_prop:s0 tclass=file permissive=1 [ 12.052094] [ T295] type=1400 audit(1758284069.908:520): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vehicle_hal_prop:s0" dev="tmpfs" ino=328 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vehicle_hal_prop:s0 tclass=file permissive=1 [ 12.052110] [ T295] type=1400 audit(1758284069.908:521): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vehicle_hal_prop:s0" dev="tmpfs" ino=328 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vehicle_hal_prop:s0 tclass=file permissive=1 [ 12.052127] [ T295] type=1400 audit(1758284069.908:522): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_base_prop:s0" dev="tmpfs" ino=329 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_base_prop:s0 tclass=file permissive=1 [ 12.052143] [ T295] type=1400 audit(1758284069.908:523): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_base_prop:s0" dev="tmpfs" ino=329 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_base_prop:s0 tclass=file permissive=1 [ 12.052160] [ T295] type=1400 audit(1758284069.908:524): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_base_prop:s0" dev="tmpfs" ino=329 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_base_prop:s0 tclass=file permissive=1 [ 12.052208] [ T295] type=1400 audit(1758284069.908:525): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_boot_complete_prop:s0" dev="tmpfs" ino=330 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_boot_complete_prop:s0 tclass=file permissive=1 [ 12.052225] [ T295] type=1400 audit(1758284069.908:526): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_boot_complete_prop:s0" dev="tmpfs" ino=330 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_boot_complete_prop:s0 tclass=file permissive=1 [ 12.052242] [ T295] type=1400 audit(1758284069.908:527): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_boot_complete_prop:s0" dev="tmpfs" ino=330 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_boot_complete_prop:s0 tclass=file permissive=1 [ 12.052259] [ T295] type=1400 audit(1758284069.908:528): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_camera_prop:s0" dev="tmpfs" ino=331 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_camera_prop:s0 tclass=file permissive=1 [ 12.052276] [ T295] type=1400 audit(1758284069.908:529): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_camera_prop:s0" dev="tmpfs" ino=331 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_camera_prop:s0 tclass=file permissive=1 [ 12.052292] [ T295] type=1400 audit(1758284069.908:530): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_camera_prop:s0" dev="tmpfs" ino=331 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_camera_prop:s0 tclass=file permissive=1 [ 12.052309] [ T295] type=1400 audit(1758284069.908:531): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_cec_prop:s0" dev="tmpfs" ino=332 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_cec_prop:s0 tclass=file permissive=1 [ 12.052325] [ T295] type=1400 audit(1758284069.908:532): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_cec_prop:s0" dev="tmpfs" ino=332 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_cec_prop:s0 tclass=file permissive=1 [ 12.052349] [ T295] type=1400 audit(1758284069.908:533): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_cec_prop:s0" dev="tmpfs" ino=332 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_cec_prop:s0 tclass=file permissive=1 [ 12.052366] [ T295] type=1400 audit(1758284069.908:534): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=333 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 [ 12.052383] [ T295] type=1400 audit(1758284069.908:535): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=333 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 [ 12.052400] [ T295] type=1400 audit(1758284069.908:536): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=333 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 [ 12.052416] [ T295] type=1400 audit(1758284069.908:537): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_hwc_prop:s0" dev="tmpfs" ino=334 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_hwc_prop:s0 tclass=file permissive=1 [ 12.052433] [ T295] type=1400 audit(1758284069.908:538): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_hwc_prop:s0" dev="tmpfs" ino=334 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_hwc_prop:s0 tclass=file permissive=1 [ 12.052449] [ T295] type=1400 audit(1758284069.908:539): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_hwc_prop:s0" dev="tmpfs" ino=334 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_hwc_prop:s0 tclass=file permissive=1 [ 12.052466] [ T295] type=1400 audit(1758284069.908:540): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_omx_prop:s0" dev="tmpfs" ino=335 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_omx_prop:s0 tclass=file permissive=1 [ 12.052482] [ T295] type=1400 audit(1758284069.908:541): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_omx_prop:s0" dev="tmpfs" ino=335 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_omx_prop:s0 tclass=file permissive=1 [ 12.052498] [ T295] type=1400 audit(1758284069.908:542): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_omx_prop:s0" dev="tmpfs" ino=335 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_omx_prop:s0 tclass=file permissive=1 [ 12.052515] [ T295] type=1400 audit(1758284069.908:543): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_power_prop:s0" dev="tmpfs" ino=336 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_power_prop:s0 tclass=file permissive=1 [ 12.052531] [ T295] type=1400 audit(1758284069.908:544): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_power_prop:s0" dev="tmpfs" ino=336 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_power_prop:s0 tclass=file permissive=1 [ 12.052548] [ T295] type=1400 audit(1758284069.908:545): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_power_prop:s0" dev="tmpfs" ino=336 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_power_prop:s0 tclass=file permissive=1 [ 12.052565] [ T295] type=1400 audit(1758284069.908:546): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_security_patch_level_prop:s0" dev="tmpfs" ino=337 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_security_patch_level_prop:s0 tclass=file permissive=1 [ 12.052582] [ T295] type=1400 audit(1758284069.908:547): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_security_patch_level_prop:s0" dev="tmpfs" ino=337 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_security_patch_level_prop:s0 tclass=file permissive=1 [ 12.052600] [ T295] type=1400 audit(1758284069.908:548): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_security_patch_level_prop:s0" dev="tmpfs" ino=337 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_security_patch_level_prop:s0 tclass=file permissive=1 [ 12.052621] [ T295] type=1400 audit(1758284069.908:549): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_system_public_prop:s0" dev="tmpfs" ino=339 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_system_public_prop:s0 tclass=file permissive=1 [ 12.052939] [ T295] type=1400 audit(1758284069.908:550): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_system_public_prop:s0" dev="tmpfs" ino=339 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_system_public_prop:s0 tclass=file permissive=1 [ 12.052957] [ T295] type=1400 audit(1758284069.908:551): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_system_public_prop:s0" dev="tmpfs" ino=339 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_system_public_prop:s0 tclass=file permissive=1 [ 12.052974] [ T295] type=1400 audit(1758284069.908:552): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_tv_input_prop:s0" dev="tmpfs" ino=340 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_tv_input_prop:s0 tclass=file permissive=1 [ 12.052991] [ T295] type=1400 audit(1758284069.908:553): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_tv_input_prop:s0" dev="tmpfs" ino=340 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_tv_input_prop:s0 tclass=file permissive=1 [ 12.053007] [ T295] type=1400 audit(1758284069.908:554): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_tv_input_prop:s0" dev="tmpfs" ino=340 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_tv_input_prop:s0 tclass=file permissive=1 [ 12.053025] [ T295] type=1400 audit(1758284069.908:555): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=341 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1 [ 12.053043] [ T295] type=1400 audit(1758284069.908:556): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=341 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1 [ 12.053059] [ T295] type=1400 audit(1758284069.908:557): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_usb_config_prop:s0" dev="tmpfs" ino=341 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_usb_config_prop:s0 tclass=file permissive=1 [ 12.053076] [ T295] type=1400 audit(1758284069.908:558): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_usb_prop:s0" dev="tmpfs" ino=342 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_usb_prop:s0 tclass=file permissive=1 [ 12.053093] [ T295] type=1400 audit(1758284069.908:559): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_usb_prop:s0" dev="tmpfs" ino=342 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_usb_prop:s0 tclass=file permissive=1 [ 12.053111] [ T295] type=1400 audit(1758284069.908:560): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_usb_prop:s0" dev="tmpfs" ino=342 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_usb_prop:s0 tclass=file permissive=1 [ 12.053128] [ T295] type=1400 audit(1758284069.908:561): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_vts_status_prop:s0" dev="tmpfs" ino=343 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_vts_status_prop:s0 tclass=file permissive=1 [ 12.053145] [ T295] type=1400 audit(1758284069.908:562): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_vts_status_prop:s0" dev="tmpfs" ino=343 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_vts_status_prop:s0 tclass=file permissive=1 [ 12.053162] [ T295] type=1400 audit(1758284069.908:563): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_vts_status_prop:s0" dev="tmpfs" ino=343 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_vts_status_prop:s0 tclass=file permissive=1 [ 12.053179] [ T295] type=1400 audit(1758284069.908:564): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_wifi_prop:s0" dev="tmpfs" ino=344 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_wifi_prop:s0 tclass=file permissive=1 [ 12.053196] [ T295] type=1400 audit(1758284069.908:565): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_wifi_prop:s0" dev="tmpfs" ino=344 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_wifi_prop:s0 tclass=file permissive=1 [ 12.053212] [ T295] type=1400 audit(1758284069.908:566): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vendor_wifi_prop:s0" dev="tmpfs" ino=344 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vendor_wifi_prop:s0 tclass=file permissive=1 [ 12.053229] [ T295] type=1400 audit(1758284069.908:567): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:verity_status_prop:s0" dev="tmpfs" ino=345 scontext=u:r:odrefresh:s0 tcontext=u:object_r:verity_status_prop:s0 tclass=file permissive=1 [ 12.053246] [ T295] type=1400 audit(1758284069.908:568): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:verity_status_prop:s0" dev="tmpfs" ino=345 scontext=u:r:odrefresh:s0 tcontext=u:object_r:verity_status_prop:s0 tclass=file permissive=1 [ 12.053263] [ T295] type=1400 audit(1758284069.908:569): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:verity_status_prop:s0" dev="tmpfs" ino=345 scontext=u:r:odrefresh:s0 tcontext=u:object_r:verity_status_prop:s0 tclass=file permissive=1 [ 12.053279] [ T295] type=1400 audit(1758284069.908:570): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_ab_prop:s0" dev="tmpfs" ino=346 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_ab_prop:s0 tclass=file permissive=1 [ 12.053296] [ T295] type=1400 audit(1758284069.908:571): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_ab_prop:s0" dev="tmpfs" ino=346 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_ab_prop:s0 tclass=file permissive=1 [ 12.053313] [ T295] type=1400 audit(1758284069.908:572): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_ab_prop:s0" dev="tmpfs" ino=346 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_ab_prop:s0 tclass=file permissive=1 [ 12.053331] [ T295] type=1400 audit(1758284069.908:573): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_face_hal_prop:s0" dev="tmpfs" ino=347 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_face_hal_prop:s0 tclass=file permissive=1 [ 12.053348] [ T295] type=1400 audit(1758284069.908:574): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_face_hal_prop:s0" dev="tmpfs" ino=347 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_face_hal_prop:s0 tclass=file permissive=1 [ 12.053365] [ T295] type=1400 audit(1758284069.908:575): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_face_hal_prop:s0" dev="tmpfs" ino=347 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_face_hal_prop:s0 tclass=file permissive=1 [ 12.053382] [ T295] type=1400 audit(1758284069.908:576): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_fingerprint_hal_prop:s0" dev="tmpfs" ino=348 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_fingerprint_hal_prop:s0 tclass=file permissive=1 [ 12.053399] [ T295] type=1400 audit(1758284069.908:577): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_fingerprint_hal_prop:s0" dev="tmpfs" ino=348 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_fingerprint_hal_prop:s0 tclass=file permissive=1 [ 12.053416] [ T295] type=1400 audit(1758284069.908:578): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_fingerprint_hal_prop:s0" dev="tmpfs" ino=348 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_fingerprint_hal_prop:s0 tclass=file permissive=1 [ 12.053433] [ T295] type=1400 audit(1758284069.908:579): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtualizationservice_prop:s0" dev="tmpfs" ino=349 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtualizationservice_prop:s0 tclass=file permissive=1 [ 12.053450] [ T295] type=1400 audit(1758284069.908:580): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtualizationservice_prop:s0" dev="tmpfs" ino=349 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtualizationservice_prop:s0 tclass=file permissive=1 [ 12.053468] [ T295] type=1400 audit(1758284069.908:581): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtualizationservice_prop:s0" dev="tmpfs" ino=349 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtualizationservice_prop:s0 tclass=file permissive=1 [ 12.053484] [ T295] type=1400 audit(1758284069.908:582): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:vold_post_fs_data_prop:s0" dev="tmpfs" ino=352 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vold_post_fs_data_prop:s0 tclass=file permissive=1 [ 12.053501] [ T295] type=1400 audit(1758284069.908:583): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:vold_post_fs_data_prop:s0" dev="tmpfs" ino=352 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vold_post_fs_data_prop:s0 tclass=file permissive=1 [ 12.053518] [ T295] type=1400 audit(1758284069.908:584): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:vold_post_fs_data_prop:s0" dev="tmpfs" ino=352 scontext=u:r:odrefresh:s0 tcontext=u:object_r:vold_post_fs_data_prop:s0 tclass=file permissive=1 [ 12.053535] [ T295] type=1400 audit(1758284069.912:585): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_config_prop:s0" dev="tmpfs" ino=357 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_config_prop:s0 tclass=file permissive=1 [ 12.053551] [ T295] type=1400 audit(1758284069.912:586): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_config_prop:s0" dev="tmpfs" ino=357 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_config_prop:s0 tclass=file permissive=1 [ 12.053568] [ T295] type=1400 audit(1758284069.912:587): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_config_prop:s0" dev="tmpfs" ino=357 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_config_prop:s0 tclass=file permissive=1 [ 12.053585] [ T295] type=1400 audit(1758284069.912:588): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_hal_prop:s0" dev="tmpfs" ino=358 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_hal_prop:s0 tclass=file permissive=1 [ 12.053601] [ T295] type=1400 audit(1758284069.912:589): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_hal_prop:s0" dev="tmpfs" ino=358 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_hal_prop:s0 tclass=file permissive=1 [ 12.053618] [ T295] type=1400 audit(1758284069.912:590): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_hal_prop:s0" dev="tmpfs" ino=358 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_hal_prop:s0 tclass=file permissive=1 [ 12.053634] [ T295] type=1400 audit(1758284069.912:591): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_prop:s0" dev="tmpfs" ino=360 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_prop:s0 tclass=file permissive=1 [ 12.053651] [ T295] type=1400 audit(1758284069.912:592): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_prop:s0" dev="tmpfs" ino=360 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_prop:s0 tclass=file permissive=1 [ 12.053668] [ T295] type=1400 audit(1758284069.912:593): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_prop:s0" dev="tmpfs" ino=360 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_prop:s0 tclass=file permissive=1 [ 12.053684] [ T295] type=1400 audit(1758284069.912:594): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:zram_config_prop:s0" dev="tmpfs" ino=361 scontext=u:r:odrefresh:s0 tcontext=u:object_r:zram_config_prop:s0 tclass=file permissive=1 [ 12.053701] [ T295] type=1400 audit(1758284069.912:595): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:zram_config_prop:s0" dev="tmpfs" ino=361 scontext=u:r:odrefresh:s0 tcontext=u:object_r:zram_config_prop:s0 tclass=file permissive=1 [ 12.053717] [ T295] type=1400 audit(1758284069.912:596): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:zram_config_prop:s0" dev="tmpfs" ino=361 scontext=u:r:odrefresh:s0 tcontext=u:object_r:zram_config_prop:s0 tclass=file permissive=1 [ 12.053734] [ T295] type=1400 audit(1758284069.912:597): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:zram_control_prop:s0" dev="tmpfs" ino=362 scontext=u:r:odrefresh:s0 tcontext=u:object_r:zram_control_prop:s0 tclass=file permissive=1 [ 12.053751] [ T295] type=1400 audit(1758284069.912:598): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:zram_control_prop:s0" dev="tmpfs" ino=362 scontext=u:r:odrefresh:s0 tcontext=u:object_r:zram_control_prop:s0 tclass=file permissive=1 [ 12.053767] [ T295] type=1400 audit(1758284069.912:599): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:zram_control_prop:s0" dev="tmpfs" ino=362 scontext=u:r:odrefresh:s0 tcontext=u:object_r:zram_control_prop:s0 tclass=file permissive=1 [ 12.066986] [ T295] type=1400 audit(1758284069.928:600): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:bootloader_boot_reason_prop:s0" dev="tmpfs" ino=83 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bootloader_boot_reason_prop:s0 tclass=file permissive=1 [ 12.067156] [ T295] type=1400 audit(1758284069.928:601): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:bootloader_boot_reason_prop:s0" dev="tmpfs" ino=83 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bootloader_boot_reason_prop:s0 tclass=file permissive=1 [ 12.067258] [ T295] type=1400 audit(1758284069.928:602): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:bootloader_boot_reason_prop:s0" dev="tmpfs" ino=83 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bootloader_boot_reason_prop:s0 tclass=file permissive=1 [ 12.067360] [ T295] type=1400 audit(1758284069.928:603): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=85 scontext=u:r:odrefresh:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 [ 12.067518] [ T295] type=1400 audit(1758284069.928:604): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=85 scontext=u:r:odrefresh:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 [ 12.067581] [ T295] type=1400 audit(1758284069.928:605): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:boottime_prop:s0" dev="tmpfs" ino=85 scontext=u:r:odrefresh:s0 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=1 [ 12.067642] [ T295] type=1400 audit(1758284069.928:606): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:boottime_public_prop:s0" dev="tmpfs" ino=86 scontext=u:r:odrefresh:s0 tcontext=u:object_r:boottime_public_prop:s0 tclass=file permissive=1 [ 12.067703] [ T295] type=1400 audit(1758284069.928:607): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:boottime_public_prop:s0" dev="tmpfs" ino=86 scontext=u:r:odrefresh:s0 tcontext=u:object_r:boottime_public_prop:s0 tclass=file permissive=1 [ 12.067763] [ T295] type=1400 audit(1758284069.928:608): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:boottime_public_prop:s0" dev="tmpfs" ino=86 scontext=u:r:odrefresh:s0 tcontext=u:object_r:boottime_public_prop:s0 tclass=file permissive=1 [ 12.067823] [ T295] type=1400 audit(1758284069.928:609): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=87 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1 [ 12.067884] [ T295] type=1400 audit(1758284069.928:610): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=87 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1 [ 12.067944] [ T295] type=1400 audit(1758284069.928:611): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:bpf_progs_loaded_prop:s0" dev="tmpfs" ino=87 scontext=u:r:odrefresh:s0 tcontext=u:object_r:bpf_progs_loaded_prop:s0 tclass=file permissive=1 [ 12.068072] [ T295] type=1400 audit(1758284069.928:612): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_attestation_prop:s0" dev="tmpfs" ino=89 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_attestation_prop:s0 tclass=file permissive=1 [ 12.068210] [ T295] type=1400 audit(1758284069.928:613): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_attestation_prop:s0" dev="tmpfs" ino=89 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_attestation_prop:s0 tclass=file permissive=1 [ 12.068326] [ T295] type=1400 audit(1758284069.928:614): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_attestation_prop:s0" dev="tmpfs" ino=89 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_attestation_prop:s0 tclass=file permissive=1 [ 12.068487] [ T295] type=1400 audit(1758284069.928:615): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_bootimage_prop:s0" dev="tmpfs" ino=90 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_bootimage_prop:s0 tclass=file permissive=1 [ 12.068549] [ T295] type=1400 audit(1758284069.928:616): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_bootimage_prop:s0" dev="tmpfs" ino=90 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_bootimage_prop:s0 tclass=file permissive=1 [ 12.068610] [ T295] type=1400 audit(1758284069.928:617): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_bootimage_prop:s0" dev="tmpfs" ino=90 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_bootimage_prop:s0 tclass=file permissive=1 [ 12.068670] [ T295] type=1400 audit(1758284069.928:618): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_config_prop:s0" dev="tmpfs" ino=91 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_config_prop:s0 tclass=file permissive=1 [ 12.068730] [ T295] type=1400 audit(1758284069.928:619): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_config_prop:s0" dev="tmpfs" ino=91 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_config_prop:s0 tclass=file permissive=1 [ 12.068789] [ T295] type=1400 audit(1758284069.928:620): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:build_config_prop:s0" dev="tmpfs" ino=91 scontext=u:r:odrefresh:s0 tcontext=u:object_r:build_config_prop:s0 tclass=file permissive=1 [ 12.068850] [ T295] type=1400 audit(1758284069.928:621): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:camera2_extensions_prop:s0" dev="tmpfs" ino=95 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camera2_extensions_prop:s0 tclass=file permissive=1 [ 12.068912] [ T295] type=1400 audit(1758284069.928:622): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:camera2_extensions_prop:s0" dev="tmpfs" ino=95 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camera2_extensions_prop:s0 tclass=file permissive=1 [ 12.068973] [ T295] type=1400 audit(1758284069.928:623): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:camera2_extensions_prop:s0" dev="tmpfs" ino=95 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camera2_extensions_prop:s0 tclass=file permissive=1 [ 12.069034] [ T295] type=1400 audit(1758284069.928:624): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:camera_calibration_prop:s0" dev="tmpfs" ino=96 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camera_calibration_prop:s0 tclass=file permissive=1 [ 12.069095] [ T295] type=1400 audit(1758284069.928:625): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:camera_calibration_prop:s0" dev="tmpfs" ino=96 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camera_calibration_prop:s0 tclass=file permissive=1 [ 12.069156] [ T295] type=1400 audit(1758284069.928:626): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:camera_calibration_prop:s0" dev="tmpfs" ino=96 scontext=u:r:odrefresh:s0 tcontext=u:object_r:camera_calibration_prop:s0 tclass=file permissive=1 [ 12.069216] [ T295] type=1400 audit(1758284069.928:627): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:charger_prop:s0" dev="tmpfs" ino=100 scontext=u:r:odrefresh:s0 tcontext=u:object_r:charger_prop:s0 tclass=file permissive=1 [ 12.069276] [ T295] type=1400 audit(1758284069.928:628): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:charger_prop:s0" dev="tmpfs" ino=100 scontext=u:r:odrefresh:s0 tcontext=u:object_r:charger_prop:s0 tclass=file permissive=1 [ 12.069335] [ T295] type=1400 audit(1758284069.928:629): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:charger_prop:s0" dev="tmpfs" ino=100 scontext=u:r:odrefresh:s0 tcontext=u:object_r:charger_prop:s0 tclass=file permissive=1 [ 12.069396] [ T295] type=1400 audit(1758284069.928:630): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:codec2_config_prop:s0" dev="tmpfs" ino=102 scontext=u:r:odrefresh:s0 tcontext=u:object_r:codec2_config_prop:s0 tclass=file permissive=1 [ 12.069456] [ T295] type=1400 audit(1758284069.928:631): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:codec2_config_prop:s0" dev="tmpfs" ino=102 scontext=u:r:odrefresh:s0 tcontext=u:object_r:codec2_config_prop:s0 tclass=file permissive=1 [ 12.069516] [ T295] type=1400 audit(1758284069.928:632): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:codec2_config_prop:s0" dev="tmpfs" ino=102 scontext=u:r:odrefresh:s0 tcontext=u:object_r:codec2_config_prop:s0 tclass=file permissive=1 [ 12.069589] [ T295] type=1400 audit(1758284069.928:633): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:cold_boot_done_prop:s0" dev="tmpfs" ino=103 scontext=u:r:odrefresh:s0 tcontext=u:object_r:cold_boot_done_prop:s0 tclass=file permissive=1 [ 12.069651] [ T295] type=1400 audit(1758284069.928:634): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:cold_boot_done_prop:s0" dev="tmpfs" ino=103 scontext=u:r:odrefresh:s0 tcontext=u:object_r:cold_boot_done_prop:s0 tclass=file permissive=1 [ 12.069712] [ T295] type=1400 audit(1758284069.928:635): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:cold_boot_done_prop:s0" dev="tmpfs" ino=103 scontext=u:r:odrefresh:s0 tcontext=u:object_r:cold_boot_done_prop:s0 tclass=file permissive=1 [ 12.069772] [ T295] type=1400 audit(1758284069.928:636): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:composd_vm_art_prop:s0" dev="tmpfs" ino=104 scontext=u:r:odrefresh:s0 tcontext=u:object_r:composd_vm_art_prop:s0 tclass=file permissive=1 [ 12.069833] [ T295] type=1400 audit(1758284069.928:637): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:composd_vm_art_prop:s0" dev="tmpfs" ino=104 scontext=u:r:odrefresh:s0 tcontext=u:object_r:composd_vm_art_prop:s0 tclass=file permissive=1 [ 12.069894] [ T295] type=1400 audit(1758284069.928:638): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:composd_vm_art_prop:s0" dev="tmpfs" ino=104 scontext=u:r:odrefresh:s0 tcontext=u:object_r:composd_vm_art_prop:s0 tclass=file permissive=1 [ 12.069954] [ T295] type=1400 audit(1758284069.928:639): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:composd_vm_vendor_prop:s0" dev="tmpfs" ino=105 scontext=u:r:odrefresh:s0 tcontext=u:object_r:composd_vm_vendor_prop:s0 tclass=file permissive=1 [ 12.070014] [ T295] type=1400 audit(1758284069.928:640): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:composd_vm_vendor_prop:s0" dev="tmpfs" ino=105 scontext=u:r:odrefresh:s0 tcontext=u:object_r:composd_vm_vendor_prop:s0 tclass=file permissive=1 [ 12.070074] [ T295] type=1400 audit(1758284069.928:641): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:composd_vm_vendor_prop:s0" dev="tmpfs" ino=105 scontext=u:r:odrefresh:s0 tcontext=u:object_r:composd_vm_vendor_prop:s0 tclass=file permissive=1 [ 12.070135] [ T295] type=1400 audit(1758284069.928:642): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=122 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1 [ 12.070195] [ T295] type=1400 audit(1758284069.928:643): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=122 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1 [ 12.070255] [ T295] type=1400 audit(1758284069.928:644): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_mdnsd_prop:s0" dev="tmpfs" ino=122 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_mdnsd_prop:s0 tclass=file permissive=1 [ 12.070316] [ T295] type=1400 audit(1758284069.928:645): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_mediatranscoding_prop:s0" dev="tmpfs" ino=123 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_mediatranscoding_prop:s0 tclass=file permissive=1 [ 12.070378] [ T295] type=1400 audit(1758284069.928:646): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_mediatranscoding_prop:s0" dev="tmpfs" ino=123 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_mediatranscoding_prop:s0 tclass=file permissive=1 [ 12.070439] [ T295] type=1400 audit(1758284069.928:647): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_mediatranscoding_prop:s0" dev="tmpfs" ino=123 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_mediatranscoding_prop:s0 tclass=file permissive=1 [ 12.070500] [ T295] type=1400 audit(1758284069.928:648): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_odsign_prop:s0" dev="tmpfs" ino=124 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_odsign_prop:s0 tclass=file permissive=1 [ 12.070560] [ T295] type=1400 audit(1758284069.928:649): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_odsign_prop:s0" dev="tmpfs" ino=124 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_odsign_prop:s0 tclass=file permissive=1 [ 12.070620] [ T295] type=1400 audit(1758284069.928:650): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_odsign_prop:s0" dev="tmpfs" ino=124 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_odsign_prop:s0 tclass=file permissive=1 [ 12.070680] [ T295] type=1400 audit(1758284069.928:651): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=125 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1 [ 12.070741] [ T295] type=1400 audit(1758284069.928:652): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=125 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1 [ 12.070801] [ T295] type=1400 audit(1758284069.928:653): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_restart_prop:s0" dev="tmpfs" ino=125 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_restart_prop:s0 tclass=file permissive=1 [ 12.070868] [ T295] type=1400 audit(1758284069.928:654): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=126 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1 [ 12.070929] [ T295] type=1400 audit(1758284069.928:655): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=126 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1 [ 12.070989] [ T295] type=1400 audit(1758284069.928:656): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_rildaemon_prop:s0" dev="tmpfs" ino=126 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_rildaemon_prop:s0 tclass=file permissive=1 [ 12.071049] [ T295] type=1400 audit(1758284069.928:657): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=127 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1 [ 12.071197] [ T295] type=1400 audit(1758284069.928:658): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=127 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1 [ 12.071261] [ T295] type=1400 audit(1758284069.928:659): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_sigstop_prop:s0" dev="tmpfs" ino=127 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_sigstop_prop:s0 tclass=file permissive=1 [ 12.071326] [ T295] type=1400 audit(1758284069.928:660): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=130 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1 [ 12.071387] [ T295] type=1400 audit(1758284069.928:661): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=130 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1 [ 12.071474] [ T295] type=1400 audit(1758284069.928:662): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:ctl_stop_prop:s0" dev="tmpfs" ino=130 scontext=u:r:odrefresh:s0 tcontext=u:object_r:ctl_stop_prop:s0 tclass=file permissive=1 [ 12.071537] [ T295] type=1400 audit(1758284069.928:663): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:dck_prop:s0" dev="tmpfs" ino=135 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dck_prop:s0 tclass=file permissive=1 [ 12.071598] [ T295] type=1400 audit(1758284069.928:664): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:dck_prop:s0" dev="tmpfs" ino=135 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dck_prop:s0 tclass=file permissive=1 [ 12.071753] [ T295] type=1400 audit(1758284069.928:665): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:dck_prop:s0" dev="tmpfs" ino=135 scontext=u:r:odrefresh:s0 tcontext=u:object_r:dck_prop:s0 tclass=file permissive=1 [ 12.071818] [ T295] type=1400 audit(1758284069.928:666): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:debugfs_restriction_prop:s0" dev="tmpfs" ino=137 scontext=u:r:odrefresh:s0 tcontext=u:object_r:debugfs_restriction_prop:s0 tclass=file permissive=1 [ 12.071885] [ T295] type=1400 audit(1758284069.928:667): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:debugfs_restriction_prop:s0" dev="tmpfs" ino=137 scontext=u:r:odrefresh:s0 tcontext=u:object_r:debugfs_restriction_prop:s0 tclass=file permissive=1 [ 12.071948] [ T295] type=1400 audit(1758284069.928:668): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:debugfs_restriction_prop:s0" dev="tmpfs" ino=137 scontext=u:r:odrefresh:s0 tcontext=u:object_r:debugfs_restriction_prop:s0 tclass=file permissive=1 [ 12.072039] [ T295] type=1400 audit(1758284069.928:669): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=140 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1 [ 12.072103] [ T295] type=1400 audit(1758284069.928:670): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=140 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1 [ 12.072166] [ T295] type=1400 audit(1758284069.928:671): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_activity_manager_native_boot_prop:s0" dev="tmpfs" ino=140 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_activity_manager_native_boot_prop:s0 tclass=file permissive=1 [ 12.072228] [ T295] type=1400 audit(1758284069.928:672): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=141 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1 [ 12.072289] [ T295] type=1400 audit(1758284069.928:673): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=141 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1 [ 12.072582] [ T295] type=1400 audit(1758284069.928:674): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_boot_count_prop:s0" dev="tmpfs" ino=141 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_boot_count_prop:s0 tclass=file permissive=1 [ 12.072649] [ T295] type=1400 audit(1758284069.928:675): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_camera_native_prop:s0" dev="tmpfs" ino=142 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_camera_native_prop:s0 tclass=file permissive=1 [ 12.072712] [ T295] type=1400 audit(1758284069.928:676): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_camera_native_prop:s0" dev="tmpfs" ino=142 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_camera_native_prop:s0 tclass=file permissive=1 [ 12.072773] [ T295] type=1400 audit(1758284069.928:677): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_camera_native_prop:s0" dev="tmpfs" ino=142 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_camera_native_prop:s0 tclass=file permissive=1 [ 12.072840] [ T295] type=1400 audit(1758284069.928:678): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_configuration_prop:s0" dev="tmpfs" ino=143 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_configuration_prop:s0 tclass=file permissive=1 [ 12.072928] [ T295] type=1400 audit(1758284069.928:679): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_configuration_prop:s0" dev="tmpfs" ino=143 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_configuration_prop:s0 tclass=file permissive=1 [ 12.073082] [ T295] type=1400 audit(1758284069.928:680): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_configuration_prop:s0" dev="tmpfs" ino=143 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_configuration_prop:s0 tclass=file permissive=1 [ 12.073147] [ T295] type=1400 audit(1758284069.928:681): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_connectivity_prop:s0" dev="tmpfs" ino=144 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_connectivity_prop:s0 tclass=file permissive=1 [ 12.073210] [ T295] type=1400 audit(1758284069.928:682): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_connectivity_prop:s0" dev="tmpfs" ino=144 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_connectivity_prop:s0 tclass=file permissive=1 [ 12.073276] [ T295] type=1400 audit(1758284069.928:683): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_connectivity_prop:s0" dev="tmpfs" ino=144 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_connectivity_prop:s0 tclass=file permissive=1 [ 12.074189] [ T295] type=1400 audit(1758284069.928:684): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_edgetpu_native_prop:s0" dev="tmpfs" ino=145 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_edgetpu_native_prop:s0 tclass=file permissive=1 [ 12.074256] [ T295] type=1400 audit(1758284069.928:685): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_edgetpu_native_prop:s0" dev="tmpfs" ino=145 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_edgetpu_native_prop:s0 tclass=file permissive=1 [ 12.074323] [ T295] type=1400 audit(1758284069.928:686): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:device_config_edgetpu_native_prop:s0" dev="tmpfs" ino=145 scontext=u:r:odrefresh:s0 tcontext=u:object_r:device_config_edgetpu_native_prop:s0 tclass=file permissive=1 [ 12.074385] [ T295] type=1400 audit(1758284069.928:687): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_storage_prop:s0" dev="tmpfs" ino=211 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_storage_prop:s0 tclass=file permissive=1 [ 12.074445] [ T295] type=1400 audit(1758284069.928:688): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_storage_prop:s0" dev="tmpfs" ino=211 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_storage_prop:s0 tclass=file permissive=1 [ 12.074506] [ T295] type=1400 audit(1758284069.928:689): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_storage_prop:s0" dev="tmpfs" ino=211 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_storage_prop:s0 tclass=file permissive=1 [ 12.074761] [ T295] type=1400 audit(1758284069.928:690): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_svc_debug_prop:s0" dev="tmpfs" ino=212 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_svc_debug_prop:s0 tclass=file permissive=1 [ 12.074828] [ T295] type=1400 audit(1758284069.928:691): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_svc_debug_prop:s0" dev="tmpfs" ino=212 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_svc_debug_prop:s0 tclass=file permissive=1 [ 12.074894] [ T295] type=1400 audit(1758284069.928:692): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:init_svc_debug_prop:s0" dev="tmpfs" ino=212 scontext=u:r:odrefresh:s0 tcontext=u:object_r:init_svc_debug_prop:s0 tclass=file permissive=1 [ 12.074978] [ T295] type=1400 audit(1758284069.928:693): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:keyguard_config_prop:s0" dev="tmpfs" ino=213 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keyguard_config_prop:s0 tclass=file permissive=1 [ 12.075042] [ T295] type=1400 audit(1758284069.928:694): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:keyguard_config_prop:s0" dev="tmpfs" ino=213 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keyguard_config_prop:s0 tclass=file permissive=1 [ 12.075191] [ T295] type=1400 audit(1758284069.928:695): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:keyguard_config_prop:s0" dev="tmpfs" ino=213 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keyguard_config_prop:s0 tclass=file permissive=1 [ 12.075255] [ T295] type=1400 audit(1758284069.928:696): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_config_prop:s0" dev="tmpfs" ino=214 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_config_prop:s0 tclass=file permissive=1 [ 12.075321] [ T295] type=1400 audit(1758284069.928:697): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_config_prop:s0" dev="tmpfs" ino=214 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_config_prop:s0 tclass=file permissive=1 [ 12.075382] [ T295] type=1400 audit(1758284069.928:698): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_config_prop:s0" dev="tmpfs" ino=214 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_config_prop:s0 tclass=file permissive=1 [ 12.075442] [ T295] type=1400 audit(1758284069.928:699): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_crash_prop:s0" dev="tmpfs" ino=215 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_crash_prop:s0 tclass=file permissive=1 [ 12.075503] [ T295] type=1400 audit(1758284069.928:700): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_crash_prop:s0" dev="tmpfs" ino=215 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_crash_prop:s0 tclass=file permissive=1 [ 12.075563] [ T295] type=1400 audit(1758284069.928:701): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_crash_prop:s0" dev="tmpfs" ino=215 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_crash_prop:s0 tclass=file permissive=1 [ 12.075828] [ T295] type=1400 audit(1758284069.928:702): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_listen_prop:s0" dev="tmpfs" ino=216 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_listen_prop:s0 tclass=file permissive=1 [ 12.075891] [ T295] type=1400 audit(1758284069.928:703): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_listen_prop:s0" dev="tmpfs" ino=216 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_listen_prop:s0 tclass=file permissive=1 [ 12.075956] [ T295] type=1400 audit(1758284069.928:704): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:keystore_listen_prop:s0" dev="tmpfs" ino=216 scontext=u:r:odrefresh:s0 tcontext=u:object_r:keystore_listen_prop:s0 tclass=file permissive=1 [ 12.076095] [ T295] type=1400 audit(1758284069.928:705): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:last_boot_reason_prop:s0" dev="tmpfs" ino=217 scontext=u:r:odrefresh:s0 tcontext=u:object_r:last_boot_reason_prop:s0 tclass=file permissive=1 [ 12.076162] [ T295] type=1400 audit(1758284069.928:706): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:last_boot_reason_prop:s0" dev="tmpfs" ino=217 scontext=u:r:odrefresh:s0 tcontext=u:object_r:last_boot_reason_prop:s0 tclass=file permissive=1 [ 12.076228] [ T295] type=1400 audit(1758284069.928:707): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:last_boot_reason_prop:s0" dev="tmpfs" ino=217 scontext=u:r:odrefresh:s0 tcontext=u:object_r:last_boot_reason_prop:s0 tclass=file permissive=1 [ 12.076289] [ T295] type=1400 audit(1758284069.928:708): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:llkd_prop:s0" dev="tmpfs" ino=219 scontext=u:r:odrefresh:s0 tcontext=u:object_r:llkd_prop:s0 tclass=file permissive=1 [ 12.076367] [ T295] type=1400 audit(1758284069.928:709): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:llkd_prop:s0" dev="tmpfs" ino=219 scontext=u:r:odrefresh:s0 tcontext=u:object_r:llkd_prop:s0 tclass=file permissive=1 [ 12.076431] [ T295] type=1400 audit(1758284069.928:710): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:llkd_prop:s0" dev="tmpfs" ino=219 scontext=u:r:odrefresh:s0 tcontext=u:object_r:llkd_prop:s0 tclass=file permissive=1 [ 12.076491] [ T295] type=1400 audit(1758284069.928:711): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:lmkd_prop:s0" dev="tmpfs" ino=221 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lmkd_prop:s0 tclass=file permissive=1 [ 12.076741] [ T295] type=1400 audit(1758284069.928:712): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:lmkd_prop:s0" dev="tmpfs" ino=221 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lmkd_prop:s0 tclass=file permissive=1 [ 12.076808] [ T295] type=1400 audit(1758284069.928:713): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:lmkd_prop:s0" dev="tmpfs" ino=221 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lmkd_prop:s0 tclass=file permissive=1 [ 12.076870] [ T295] type=1400 audit(1758284069.928:714): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:logpersistd_logging_prop:s0" dev="tmpfs" ino=228 scontext=u:r:odrefresh:s0 tcontext=u:object_r:logpersistd_logging_prop:s0 tclass=file permissive=1 [ 12.076932] [ T295] type=1400 audit(1758284069.928:715): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:logpersistd_logging_prop:s0" dev="tmpfs" ino=228 scontext=u:r:odrefresh:s0 tcontext=u:object_r:logpersistd_logging_prop:s0 tclass=file permissive=1 [ 12.077028] [ T295] type=1400 audit(1758284069.928:716): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:logpersistd_logging_prop:s0" dev="tmpfs" ino=228 scontext=u:r:odrefresh:s0 tcontext=u:object_r:logpersistd_logging_prop:s0 tclass=file permissive=1 [ 12.077095] [ T295] type=1400 audit(1758284069.928:717): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:lowpan_prop:s0" dev="tmpfs" ino=230 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lowpan_prop:s0 tclass=file permissive=1 [ 12.077155] [ T295] type=1400 audit(1758284069.928:718): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:lowpan_prop:s0" dev="tmpfs" ino=230 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lowpan_prop:s0 tclass=file permissive=1 [ 12.077214] [ T295] type=1400 audit(1758284069.928:719): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:lowpan_prop:s0" dev="tmpfs" ino=230 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lowpan_prop:s0 tclass=file permissive=1 [ 12.077274] [ T295] type=1400 audit(1758284069.928:720): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:lpdumpd_prop:s0" dev="tmpfs" ino=231 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lpdumpd_prop:s0 tclass=file permissive=1 [ 12.077334] [ T295] type=1400 audit(1758284069.928:721): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:lpdumpd_prop:s0" dev="tmpfs" ino=231 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lpdumpd_prop:s0 tclass=file permissive=1 [ 12.077394] [ T295] type=1400 audit(1758284069.928:722): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:lpdumpd_prop:s0" dev="tmpfs" ino=231 scontext=u:r:odrefresh:s0 tcontext=u:object_r:lpdumpd_prop:s0 tclass=file permissive=1 [ 12.077454] [ T295] type=1400 audit(1758284069.928:723): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:media_config_prop:s0" dev="tmpfs" ino=232 scontext=u:r:odrefresh:s0 tcontext=u:object_r:media_config_prop:s0 tclass=file permissive=1 [ 12.078115] [ T295] type=1400 audit(1758284069.928:724): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:media_config_prop:s0" dev="tmpfs" ino=232 scontext=u:r:odrefresh:s0 tcontext=u:object_r:media_config_prop:s0 tclass=file permissive=1 [ 12.078207] [ T295] type=1400 audit(1758284069.928:725): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:media_config_prop:s0" dev="tmpfs" ino=232 scontext=u:r:odrefresh:s0 tcontext=u:object_r:media_config_prop:s0 tclass=file permissive=1 [ 12.078291] [ T295] type=1400 audit(1758284069.932:726): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:media_variant_prop:s0" dev="tmpfs" ino=233 scontext=u:r:odrefresh:s0 tcontext=u:object_r:media_variant_prop:s0 tclass=file permissive=1 [ 12.078357] [ T295] type=1400 audit(1758284069.932:727): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:media_variant_prop:s0" dev="tmpfs" ino=233 scontext=u:r:odrefresh:s0 tcontext=u:object_r:media_variant_prop:s0 tclass=file permissive=1 [ 12.078439] [ T295] type=1400 audit(1758284069.932:728): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:media_variant_prop:s0" dev="tmpfs" ino=233 scontext=u:r:odrefresh:s0 tcontext=u:object_r:media_variant_prop:s0 tclass=file permissive=1 [ 12.078506] [ T295] type=1400 audit(1758284069.932:729): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:mmc_prop:s0" dev="tmpfs" ino=236 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mmc_prop:s0 tclass=file permissive=1 [ 12.078567] [ T295] type=1400 audit(1758284069.932:730): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:mmc_prop:s0" dev="tmpfs" ino=236 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mmc_prop:s0 tclass=file permissive=1 [ 12.078627] [ T295] type=1400 audit(1758284069.932:731): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:mmc_prop:s0" dev="tmpfs" ino=236 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mmc_prop:s0 tclass=file permissive=1 [ 12.078686] [ T295] type=1400 audit(1758284069.932:732): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:mock_ota_prop:s0" dev="tmpfs" ino=237 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mock_ota_prop:s0 tclass=file permissive=1 [ 12.078785] [ T295] type=1400 audit(1758284069.932:733): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:mock_ota_prop:s0" dev="tmpfs" ino=237 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mock_ota_prop:s0 tclass=file permissive=1 [ 12.078846] [ T295] type=1400 audit(1758284069.932:734): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:mock_ota_prop:s0" dev="tmpfs" ino=237 scontext=u:r:odrefresh:s0 tcontext=u:object_r:mock_ota_prop:s0 tclass=file permissive=1 [ 12.078909] [ T295] type=1400 audit(1758284069.932:735): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_464xlat_fromvendor_prop:s0" dev="tmpfs" ino=239 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_464xlat_fromvendor_prop:s0 tclass=file permissive=1 [ 12.078971] [ T295] type=1400 audit(1758284069.932:736): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_464xlat_fromvendor_prop:s0" dev="tmpfs" ino=239 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_464xlat_fromvendor_prop:s0 tclass=file permissive=1 [ 12.079033] [ T295] type=1400 audit(1758284069.932:737): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_464xlat_fromvendor_prop:s0" dev="tmpfs" ino=239 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_464xlat_fromvendor_prop:s0 tclass=file permissive=1 [ 12.079145] [ T295] type=1400 audit(1758284069.932:738): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_connectivity_prop:s0" dev="tmpfs" ino=240 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_connectivity_prop:s0 tclass=file permissive=1 [ 12.079207] [ T295] type=1400 audit(1758284069.932:739): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_connectivity_prop:s0" dev="tmpfs" ino=240 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_connectivity_prop:s0 tclass=file permissive=1 [ 12.079268] [ T295] type=1400 audit(1758284069.932:740): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_connectivity_prop:s0" dev="tmpfs" ino=240 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_connectivity_prop:s0 tclass=file permissive=1 [ 12.079333] [ T295] type=1400 audit(1758284069.932:741): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_dns_prop:s0" dev="tmpfs" ino=241 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_dns_prop:s0 tclass=file permissive=1 [ 12.079396] [ T295] type=1400 audit(1758284069.932:742): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_dns_prop:s0" dev="tmpfs" ino=241 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_dns_prop:s0 tclass=file permissive=1 [ 12.079456] [ T295] type=1400 audit(1758284069.932:743): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:net_dns_prop:s0" dev="tmpfs" ino=241 scontext=u:r:odrefresh:s0 tcontext=u:object_r:net_dns_prop:s0 tclass=file permissive=1 [ 12.079516] [ T295] type=1400 audit(1758284069.932:744): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_enabled_prop:s0" dev="tmpfs" ino=312 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_enabled_prop:s0 tclass=file permissive=1 [ 12.079575] [ T295] type=1400 audit(1758284069.932:745): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_enabled_prop:s0" dev="tmpfs" ino=312 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_enabled_prop:s0 tclass=file permissive=1 [ 12.079635] [ T295] type=1400 audit(1758284069.932:746): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_enabled_prop:s0" dev="tmpfs" ino=312 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_enabled_prop:s0 tclass=file permissive=1 [ 12.079694] [ T295] type=1400 audit(1758284069.932:747): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_lazy_prop:s0" dev="tmpfs" ino=313 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_lazy_prop:s0 tclass=file permissive=1 [ 12.079754] [ T295] type=1400 audit(1758284069.932:748): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_lazy_prop:s0" dev="tmpfs" ino=313 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_lazy_prop:s0 tclass=file permissive=1 [ 12.079814] [ T295] type=1400 audit(1758284069.932:749): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:traced_lazy_prop:s0" dev="tmpfs" ino=313 scontext=u:r:odrefresh:s0 tcontext=u:object_r:traced_lazy_prop:s0 tclass=file permissive=1 [ 12.079875] [ T295] type=1400 audit(1758284069.932:750): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_ab_prop:s0" dev="tmpfs" ino=346 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_ab_prop:s0 tclass=file permissive=1 [ 12.079934] [ T295] type=1400 audit(1758284069.932:751): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_ab_prop:s0" dev="tmpfs" ino=346 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_ab_prop:s0 tclass=file permissive=1 [ 12.079994] [ T295] type=1400 audit(1758284069.932:752): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_ab_prop:s0" dev="tmpfs" ino=346 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_ab_prop:s0 tclass=file permissive=1 [ 12.080053] [ T295] type=1400 audit(1758284069.932:753): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_face_hal_prop:s0" dev="tmpfs" ino=347 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_face_hal_prop:s0 tclass=file permissive=1 [ 12.080113] [ T295] type=1400 audit(1758284069.932:754): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_face_hal_prop:s0" dev="tmpfs" ino=347 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_face_hal_prop:s0 tclass=file permissive=1 [ 12.080174] [ T295] type=1400 audit(1758284069.932:755): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_face_hal_prop:s0" dev="tmpfs" ino=347 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_face_hal_prop:s0 tclass=file permissive=1 [ 12.080235] [ T295] type=1400 audit(1758284069.932:756): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_fingerprint_hal_prop:s0" dev="tmpfs" ino=348 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_fingerprint_hal_prop:s0 tclass=file permissive=1 [ 12.080296] [ T295] type=1400 audit(1758284069.932:757): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_fingerprint_hal_prop:s0" dev="tmpfs" ino=348 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_fingerprint_hal_prop:s0 tclass=file permissive=1 [ 12.080416] [ T295] type=1400 audit(1758284069.932:758): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtual_fingerprint_hal_prop:s0" dev="tmpfs" ino=348 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtual_fingerprint_hal_prop:s0 tclass=file permissive=1 [ 12.080482] [ T295] type=1400 audit(1758284069.932:759): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtualizationservice_prop:s0" dev="tmpfs" ino=349 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtualizationservice_prop:s0 tclass=file permissive=1 [ 12.080545] [ T295] type=1400 audit(1758284069.932:760): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtualizationservice_prop:s0" dev="tmpfs" ino=349 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtualizationservice_prop:s0 tclass=file permissive=1 [ 12.080606] [ T295] type=1400 audit(1758284069.932:761): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:virtualizationservice_prop:s0" dev="tmpfs" ino=349 scontext=u:r:odrefresh:s0 tcontext=u:object_r:virtualizationservice_prop:s0 tclass=file permissive=1 [ 12.080667] [ T295] type=1400 audit(1758284069.932:762): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_config_prop:s0" dev="tmpfs" ino=357 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_config_prop:s0 tclass=file permissive=1 [ 12.080727] [ T295] type=1400 audit(1758284069.932:763): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_config_prop:s0" dev="tmpfs" ino=357 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_config_prop:s0 tclass=file permissive=1 [ 12.080787] [ T295] type=1400 audit(1758284069.932:764): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_config_prop:s0" dev="tmpfs" ino=357 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_config_prop:s0 tclass=file permissive=1 [ 12.080847] [ T295] type=1400 audit(1758284069.932:765): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_hal_prop:s0" dev="tmpfs" ino=358 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_hal_prop:s0 tclass=file permissive=1 [ 12.080907] [ T295] type=1400 audit(1758284069.932:766): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_hal_prop:s0" dev="tmpfs" ino=358 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_hal_prop:s0 tclass=file permissive=1 [ 12.081121] [ T295] type=1400 audit(1758284069.932:767): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_hal_prop:s0" dev="tmpfs" ino=358 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_hal_prop:s0 tclass=file permissive=1 [ 12.081184] [ T295] type=1400 audit(1758284069.932:768): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_prop:s0" dev="tmpfs" ino=360 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_prop:s0 tclass=file permissive=1 [ 12.081244] [ T295] type=1400 audit(1758284069.932:769): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_prop:s0" dev="tmpfs" ino=360 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_prop:s0 tclass=file permissive=1 [ 12.081304] [ T295] type=1400 audit(1758284069.932:770): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:wifi_prop:s0" dev="tmpfs" ino=360 scontext=u:r:odrefresh:s0 tcontext=u:object_r:wifi_prop:s0 tclass=file permissive=1 [ 12.081364] [ T295] type=1400 audit(1758284069.932:771): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:zram_config_prop:s0" dev="tmpfs" ino=361 scontext=u:r:odrefresh:s0 tcontext=u:object_r:zram_config_prop:s0 tclass=file permissive=1 [ 12.081424] [ T295] type=1400 audit(1758284069.932:772): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:zram_config_prop:s0" dev="tmpfs" ino=361 scontext=u:r:odrefresh:s0 tcontext=u:object_r:zram_config_prop:s0 tclass=file permissive=1 [ 12.081483] [ T295] type=1400 audit(1758284069.932:773): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:zram_config_prop:s0" dev="tmpfs" ino=361 scontext=u:r:odrefresh:s0 tcontext=u:object_r:zram_config_prop:s0 tclass=file permissive=1 [ 12.081544] [ T295] type=1400 audit(1758284069.932:774): avc: denied { open } for comm="odrefresh" path="/dev/__properties__/u:object_r:zram_control_prop:s0" dev="tmpfs" ino=362 scontext=u:r:odrefresh:s0 tcontext=u:object_r:zram_control_prop:s0 tclass=file permissive=1 [ 12.081603] [ T295] type=1400 audit(1758284069.932:775): avc: denied { getattr } for comm="odrefresh" path="/dev/__properties__/u:object_r:zram_control_prop:s0" dev="tmpfs" ino=362 scontext=u:r:odrefresh:s0 tcontext=u:object_r:zram_control_prop:s0 tclass=file permissive=1 [ 12.081663] [ T295] type=1400 audit(1758284069.932:776): avc: denied { map } for comm="odrefresh" path="/dev/__properties__/u:object_r:zram_control_prop:s0" dev="tmpfs" ino=362 scontext=u:r:odrefresh:s0 tcontext=u:object_r:zram_control_prop:s0 tclass=file permissive=1 [ 12.146202] [ T495] fs-verity: sha256 using implementation "sha256-ce" [ 12.162238] [ T215] init: Wait for property 'odsign.key.done=1' took 414ms [ 12.162426] [ T1] init: starting service 'exec 8 (/system/bin/fsverity_init --lock)'... [ 12.163702] [ T1] init: ... started service 'exec 8 (/system/bin/fsverity_init --lock)' has pid 499 [ 12.163721] [ T1] init: SVC_EXEC service 'exec 8 (/system/bin/fsverity_init --lock)' pid 499 (uid 0 gid 0+0 context default) started; waiting... [ 12.163891] [ T1] init: Sending signal 9 to service 'odsign' (pid 495) process group... [ 12.169019] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 495 in 5ms [ 12.169319] [ T1] init: Control message: Processed ctl.stop for 'odsign' from pid: 495 (/system/bin/odsign) [ 12.169418] [ T1] init: Service 'odsign' (pid 495) received signal 9 [ 12.169896] [ T1] init: Service 'exec 8 (/system/bin/fsverity_init --lock)' (pid 499) exited with status 0 waiting took 0.006000 seconds [ 12.169923] [ T1] init: Sending signal 9 to service 'exec 8 (/system/bin/fsverity_init --lock)' (pid 499) process group... [ 12.169999] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 499 in 0ms [ 12.170545] [ T1] init: starting service 'apexd-snapshotde'... [ 12.174102] [ T1] init: ... started service 'apexd-snapshotde' has pid 500 [ 12.174144] [ T1] init: SVC_EXEC service 'apexd-snapshotde' pid 500 (uid 0 gid 1000+0 context default) started; waiting... [ 12.182255] [ T500] apexd: Snapshot DE subcommand detected [ 12.183027] [ T500] apexd-snapshotde: Marking APEXd as ready [ 12.184502] [ T1] init: Service 'apexd-snapshotde' (pid 500) exited with status 0 waiting took 0.012000 seconds [ 12.184532] [ T1] init: Sending signal 9 to service 'apexd-snapshotde' (pid 500) process group... [ 12.184662] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 500 in 0ms [ 12.193618] [ T1] init: Command 'verity_update_state' action=post-fs-data (/system/etc/init/hw/init.rc:1068) took 0ms and failed: fs_mgr_load_verity_state() failed [ 12.193655] [ T1] init: processing action (post-fs-data) from (/system/etc/init/hw/init.usb.rc:6) [ 12.199537] [ T1] init: processing action (post-fs-data) from (/vendor/etc/init/hw/init.rk30board.rc:10) [ 12.211371] [ T1] init: processing action (post-fs-data) from (/system/etc/init/bootstat.rc:9) [ 12.215035] [ T1] init: processing action (ro.debuggable=1 && post-fs-data) from (/system/etc/init/clean_scratch_files.rc:1) [ 12.215328] [ T1] init: starting service 'exec 9 (/system/bin/clean_scratch_files)'... [ 12.218465] [ T1] init: ... started service 'exec 9 (/system/bin/clean_scratch_files)' has pid 501 [ 12.218528] [ T1] init: processing action (post-fs-data) from (/system/etc/init/dumpstate.rc:40) [ 12.218768] [ T1] init: starting service 'dump_kernel_panic'... [ 12.219176] [ T1] init: Created socket '/dev/socket/dumpstate', mode 660, user 2000, group 1007 [ 12.223095] [ T1] init: ... started service 'dump_kernel_panic' has pid 502 [ 12.223174] [ T1] init: processing action (post-fs-data) from (/system/etc/init/gsid.rc:17) [ 12.232629] [ T1] init: Not setting encryption policy on: /data/gsi [ 12.241583] [ T1] init: Service 'exec 9 (/system/bin/clean_scratch_files)' (pid 501) exited with status 0 oneshot service took 0.024000 seconds in background [ 12.241626] [ T1] init: Sending signal 9 to service 'exec 9 (/system/bin/clean_scratch_files)' (pid 501) process group... [ 12.241753] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 501 in 0ms [ 12.250204] [ T1] init: processing action (post-fs-data) from (/system/etc/init/incidentd.rc:21) [ 12.254049] [ T1] init: Service 'dump_kernel_panic' (pid 502) exited with status 0 oneshot service took 0.033000 seconds in background [ 12.254083] [ T1] init: Sending signal 9 to service 'dump_kernel_panic' (pid 502) process group... [ 12.254186] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 502 in 0ms [ 12.254901] [ T1] init: processing action (post-fs-data) from (/system/etc/init/init.rockchip.rc:1) [ 12.260046] [ T1] init: processing action (post-fs-data) from (/system/etc/init/logtagd.rc:4) [ 12.265951] [ T1] init: processing action (post-fs-data) from (/system/etc/init/perfetto.rc:73) [ 12.266012] [ T1] init: Command 'rm /data/misc/perfetto-traces/.guardraildata' action=post-fs-data (/system/etc/init/perfetto.rc:74) took 0ms and failed: unlink() failed: No such file or directory [ 12.266043] [ T1] init: processing action (post-fs-data) from (/system/etc/init/profcollectd.rc:9) [ 12.276142] [ T1] init: processing action (post-fs-data) from (/system/etc/init/recovery-persist.rc:1) [ 12.276505] [ T1] init: starting service 'exec 10 (/system/bin/recovery-persist)'... [ 12.279978] [ T1] init: ... started service 'exec 10 (/system/bin/recovery-persist)' has pid 503 [ 12.280047] [ T1] init: processing action (post-fs-data) from (/system/etc/init/wifi.rc:18) [ 12.281229] [ T1] selinux: SELinux: Skipping restorecon on directory(/data/misc/apexdata/com.android.wifi) [ 12.281280] [ T1] init: processing action (post-fs-data) from (/vendor/etc/init/hostapd.android.rc:9) [ 12.288421] [ T1] init: Service 'exec 10 (/system/bin/recovery-persist)' (pid 503) exited with status 0 oneshot service took 0.010000 seconds in background [ 12.288457] [ T1] init: Sending signal 9 to service 'exec 10 (/system/bin/recovery-persist)' (pid 503) process group... [ 12.288597] [ T1] libprocessgroup: Successfully killed process cgroup uid 1000 pid 503 in 0ms [ 12.291026] [ T1] init: processing action (post-fs-data) from (/vendor/etc/init/init.pq-init.rc:2) [ 12.291330] [ T1] init: starting service 'pq-init'... [ 12.295085] [ T1] init: ... started service 'pq-init' has pid 504 [ 12.295214] [ T1] init: processing action (sys.init.perf_lsm_hooks=1 && load_bpf_programs) from (/system/etc/init/hw/init.rc:1253) [ 12.295656] [ T1] init: processing action (load_bpf_programs) from (/system/etc/init/bpfloader.rc:17) [ 12.295909] [ T1] init: starting service 'bpfloader'... [ 12.300182] [ T1] init: ... started service 'bpfloader' has pid 505 [ 12.300223] [ T1] init: SVC_EXEC service 'bpfloader' pid 505 (uid 0 gid 0+7 context default) started; waiting... [ 12.306572] [ T505] WARNING: Unprivileged eBPF is enabled, data leaks possible via Spectre v2 BHB attacks! [ 12.307888] [ T505] LibBpfLoader: Loading optional ELF object /apex/com.android.tethering/etc/bpf/test.o with license Apache 2.0 [ 12.307906] [ T505] LibBpfLoader: Section bpfloader_min_ver value is 2 [0x2] [ 12.307923] [ T505] LibBpfLoader: Section bpfloader_max_ver value is 25 [0x19] [ 12.307937] [ T505] LibBpfLoader: Couldn't find section bpfloader_min_required_ver (defaulting to 0 [0x0]). [ 12.307951] [ T505] LibBpfLoader: Section size_of_bpf_map_def value is 120 [0x78] [ 12.307966] [ T505] LibBpfLoader: Section size_of_bpf_prog_def value is 92 [0x5c] [ 12.307970] [ T505] LibBpfLoader: BpfLoader version 0x00026 ignoring ELF object /apex/com.android.tethering/etc/bpf/test.o with max ver 0x00019 [ 12.307979] [ T505] bpfloader: Loaded object: /apex/com.android.tethering/etc/bpf/test.o [ 12.309655] [ T505] LibBpfLoader: Loading critical for Connectivity (Tethering) ELF object /apex/com.android.tethering/etc/bpf/offload.o with license Apache 2.0 [ 12.309673] [ T505] LibBpfLoader: Section bpfloader_min_ver value is 2 [0x2] [ 12.309693] [ T505] LibBpfLoader: Section bpfloader_max_ver value is 25 [0x19] [ 12.309710] [ T505] LibBpfLoader: Couldn't find section bpfloader_min_required_ver (defaulting to 0 [0x0]). [ 12.309727] [ T505] LibBpfLoader: Section size_of_bpf_map_def value is 120 [0x78] [ 12.309746] [ T505] LibBpfLoader: Section size_of_bpf_prog_def value is 92 [0x5c] [ 12.309749] [ T505] LibBpfLoader: BpfLoader version 0x00026 ignoring ELF object /apex/com.android.tethering/etc/bpf/offload.o with max ver 0x00019 [ 12.309757] [ T505] bpfloader: Loaded object: /apex/com.android.tethering/etc/bpf/offload.o [ 12.310020] [ T505] LibBpfLoader: Loading optional ELF object /apex/com.android.tethering/etc/bpf/test@btf.o with license Apache 2.0 [ 12.310034] [ T505] LibBpfLoader: Section bpfloader_min_ver value is 25 [0x19] [ 12.310049] [ T505] LibBpfLoader: Section bpfloader_max_ver value is 65536 [0x10000] [ 12.310062] [ T505] LibBpfLoader: Couldn't find section bpfloader_min_required_ver (defaulting to 0 [0x0]). [ 12.310075] [ T505] LibBpfLoader: Section size_of_bpf_map_def value is 120 [0x78] [ 12.310090] [ T505] LibBpfLoader: Section size_of_bpf_prog_def value is 92 [0x5c] [ 12.310094] [ T505] LibBpfLoader: BpfLoader version 0x00026 processing ELF object /apex/com.android.tethering/etc/bpf/test@btf.o with ver [0x00019,0x10000) [ 12.310225] [ T505] LibBpfLoader: Loaded code section 3 (xdp_drop_ipv4_udp_ether) [ 12.310283] [ T505] LibBpfLoader: Adding section 3 to cs list [ 12.310451] [ T505] LibBpfLoader: Couldn't find section btf_min_bpfloader_ver (defaulting to 0 [0x0]). [ 12.310463] [ T505] LibBpfLoader: Couldn't find section btf_min_kernel_ver (defaulting to 0 [0x0]). [ 12.319545] [ T505] LibBpfLoader: bpf_create_map name tether_downstream6_map, ret: 6 [ 12.319593] [ T505] LibBpfLoader: map /sys/fs/bpf/tethering/map_test_tether_downstream6_map id 1 [ 12.319612] [ T505] LibBpfLoader: bpf_create_map name bitmap, ret: 8 [ 12.319630] [ T505] LibBpfLoader: map /sys/fs/bpf/tethering/map_test_bitmap id 2 [ 12.319640] [ T505] LibBpfLoader: map_fd found at 0 is 6 in /apex/com.android.tethering/etc/bpf/test@btf.o [ 12.319643] [ T505] LibBpfLoader: map_fd found at 1 is 8 in /apex/com.android.tethering/etc/bpf/test@btf.o [ 12.319718] [ T505] LibBpfLoader: cs[0].name:xdp_drop_ipv4_udp_ether min_kver:5090000 .max_kver:ffffffff (kvers:6010039) [ 12.319721] [ T505] LibBpfLoader: cs[0].name:xdp_drop_ipv4_udp_ether requires bpfloader version [0x00019,0x10000) [ 12.320273] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/test@btf.o (xdp_drop_ipv4_udp_ether) returned fd: 7 (no error) [ 12.320364] [ T505] LibBpfLoader: prog /sys/fs/bpf/tethering/prog_test_xdp_drop_ipv4_udp_ether id 1 [ 12.320391] [ T505] bpfloader: Loaded object: /apex/com.android.tethering/etc/bpf/test@btf.o [ 12.323699] [ T505] LibBpfLoader: Loading critical for Connectivity (Tethering) ELF object /apex/com.android.tethering/etc/bpf/offload@btf.o with license Apache 2.0 [ 12.323718] [ T505] LibBpfLoader: Section bpfloader_min_ver value is 25 [0x19] [ 12.323738] [ T505] LibBpfLoader: Section bpfloader_max_ver value is 65536 [0x10000] [ 12.323754] [ T505] LibBpfLoader: Couldn't find section bpfloader_min_required_ver (defaulting to 0 [0x0]). [ 12.323770] [ T505] LibBpfLoader: Section size_of_bpf_map_def value is 120 [0x78] [ 12.323787] [ T505] LibBpfLoader: Section size_of_bpf_prog_def value is 92 [0x5c] [ 12.323792] [ T505] LibBpfLoader: BpfLoader version 0x00026 processing ELF object /apex/com.android.tethering/etc/bpf/offload@btf.o with ver [0x00019,0x10000) [ 12.325076] [ T505] LibBpfLoader: Loaded code section 3 (schedcls_tether_downstream6_ether) [ 12.325143] [ T505] LibBpfLoader: Loaded relo section 3 (.relschedcls/tether_downstream6_ether) [ 12.325146] [ T505] LibBpfLoader: Adding section 3 to cs list [ 12.325174] [ T505] LibBpfLoader: Loaded code section 5 (schedcls_tether_upstream6_ether) [ 12.325262] [ T505] LibBpfLoader: Loaded relo section 5 (.relschedcls/tether_upstream6_ether) [ 12.325265] [ T505] LibBpfLoader: Adding section 5 to cs list [ 12.325290] [ T505] LibBpfLoader: Loaded code section 7 (schedcls_tether_downstream6_rawip$4_14) [ 12.325383] [ T505] LibBpfLoader: Loaded relo section 7 (.relschedcls/tether_downstream6_rawip$4_14) [ 12.325385] [ T505] LibBpfLoader: Adding section 7 to cs list [ 12.325411] [ T505] LibBpfLoader: Loaded code section 9 (schedcls_tether_upstream6_rawip$4_14) [ 12.325520] [ T505] LibBpfLoader: Loaded relo section 9 (.relschedcls/tether_upstream6_rawip$4_14) [ 12.325522] [ T505] LibBpfLoader: Adding section 9 to cs list [ 12.325546] [ T505] LibBpfLoader: Loaded code section 11 (schedcls_tether_downstream6_rawip$stub) [ 12.325687] [ T505] LibBpfLoader: Adding section 11 to cs list [ 12.325705] [ T505] LibBpfLoader: Loaded code section 12 (schedcls_tether_upstream6_rawip$stub) [ 12.325827] [ T505] LibBpfLoader: Adding section 12 to cs list [ 12.325879] [ T505] LibBpfLoader: Loaded code section 13 (schedcls_tether_downstream4_rawip$5_8) [ 12.326032] [ T505] LibBpfLoader: Loaded relo section 13 (.relschedcls/tether_downstream4_rawip$5_8) [ 12.326034] [ T505] LibBpfLoader: Adding section 13 to cs list [ 12.326064] [ T505] LibBpfLoader: Loaded code section 15 (schedcls_tether_upstream4_rawip$5_8) [ 12.326214] [ T505] LibBpfLoader: Loaded relo section 15 (.relschedcls/tether_upstream4_rawip$5_8) [ 12.326216] [ T505] LibBpfLoader: Adding section 15 to cs list [ 12.326242] [ T505] LibBpfLoader: Loaded code section 17 (schedcls_tether_downstream4_ether$5_8) [ 12.326406] [ T505] LibBpfLoader: Loaded relo section 17 (.relschedcls/tether_downstream4_ether$5_8) [ 12.326408] [ T505] LibBpfLoader: Adding section 17 to cs list [ 12.326435] [ T505] LibBpfLoader: Loaded code section 19 (schedcls_tether_upstream4_ether$5_8) [ 12.326615] [ T505] LibBpfLoader: Loaded relo section 19 (.relschedcls/tether_upstream4_ether$5_8) [ 12.326617] [ T505] LibBpfLoader: Adding section 19 to cs list [ 12.326645] [ T505] LibBpfLoader: Loaded code section 21 (schedcls_tether_downstream4_rawip$opt) [ 12.326837] [ T505] LibBpfLoader: Loaded relo section 21 (.relschedcls/tether_downstream4_rawip$opt) [ 12.326840] [ T505] LibBpfLoader: Adding section 21 to cs list [ 12.326870] [ T505] LibBpfLoader: Loaded code section 23 (schedcls_tether_upstream4_rawip$opt) [ 12.327077] [ T505] LibBpfLoader: Loaded relo section 23 (.relschedcls/tether_upstream4_rawip$opt) [ 12.327079] [ T505] LibBpfLoader: Adding section 23 to cs list [ 12.327106] [ T505] LibBpfLoader: Loaded code section 25 (schedcls_tether_downstream4_ether$opt) [ 12.327327] [ T505] LibBpfLoader: Loaded relo section 25 (.relschedcls/tether_downstream4_ether$opt) [ 12.327329] [ T505] LibBpfLoader: Adding section 25 to cs list [ 12.327355] [ T505] LibBpfLoader: Loaded code section 27 (schedcls_tether_upstream4_ether$opt) [ 12.327591] [ T505] LibBpfLoader: Loaded relo section 27 (.relschedcls/tether_upstream4_ether$opt) [ 12.327593] [ T505] LibBpfLoader: Adding section 27 to cs list [ 12.327617] [ T505] LibBpfLoader: Loaded code section 29 (schedcls_tether_downstream4_rawip$5_4) [ 12.327866] [ T505] LibBpfLoader: Loaded relo section 29 (.relschedcls/tether_downstream4_rawip$5_4) [ 12.327868] [ T505] LibBpfLoader: Adding section 29 to cs list [ 12.327891] [ T505] LibBpfLoader: Loaded code section 31 (schedcls_tether_upstream4_rawip$5_4) [ 12.328157] [ T505] LibBpfLoader: Loaded relo section 31 (.relschedcls/tether_upstream4_rawip$5_4) [ 12.328159] [ T505] LibBpfLoader: Adding section 31 to cs list [ 12.328183] [ T505] LibBpfLoader: Loaded code section 33 (schedcls_tether_downstream4_rawip$4_14) [ 12.328474] [ T505] LibBpfLoader: Loaded relo section 33 (.relschedcls/tether_downstream4_rawip$4_14) [ 12.328480] [ T505] LibBpfLoader: Adding section 33 to cs list [ 12.328504] [ T505] LibBpfLoader: Loaded code section 35 (schedcls_tether_upstream4_rawip$4_14) [ 12.328796] [ T505] LibBpfLoader: Loaded relo section 35 (.relschedcls/tether_upstream4_rawip$4_14) [ 12.328798] [ T505] LibBpfLoader: Adding section 35 to cs list [ 12.328822] [ T505] LibBpfLoader: Loaded code section 37 (schedcls_tether_downstream4_ether$4_14) [ 12.329131] [ T505] LibBpfLoader: Loaded relo section 37 (.relschedcls/tether_downstream4_ether$4_14) [ 12.329133] [ T505] LibBpfLoader: Adding section 37 to cs list [ 12.329157] [ T505] LibBpfLoader: Loaded code section 39 (schedcls_tether_upstream4_ether$4_14) [ 12.329481] [ T505] LibBpfLoader: Loaded relo section 39 (.relschedcls/tether_upstream4_ether$4_14) [ 12.329483] [ T505] LibBpfLoader: Adding section 39 to cs list [ 12.329507] [ T505] LibBpfLoader: Loaded code section 41 (schedcls_tether_downstream4_rawip$stub) [ 12.329844] [ T505] LibBpfLoader: Adding section 41 to cs list [ 12.329861] [ T505] LibBpfLoader: Loaded code section 42 (schedcls_tether_upstream4_rawip$stub) [ 12.330204] [ T505] LibBpfLoader: Adding section 42 to cs list [ 12.330221] [ T505] LibBpfLoader: Loaded code section 43 (schedcls_tether_downstream4_ether$stub) [ 12.330571] [ T505] LibBpfLoader: Adding section 43 to cs list [ 12.330586] [ T505] LibBpfLoader: Loaded code section 44 (schedcls_tether_upstream4_ether$stub) [ 12.330944] [ T505] LibBpfLoader: Adding section 44 to cs list [ 12.330960] [ T505] LibBpfLoader: Loaded code section 45 (xdp_tether_downstream_ether) [ 12.331328] [ T505] LibBpfLoader: Adding section 45 to cs list [ 12.331344] [ T505] LibBpfLoader: Loaded code section 46 (xdp_tether_downstream_rawip) [ 12.331709] [ T505] LibBpfLoader: Adding section 46 to cs list [ 12.331725] [ T505] LibBpfLoader: Loaded code section 47 (xdp_tether_upstream_ether) [ 12.332110] [ T505] LibBpfLoader: Adding section 47 to cs list [ 12.332127] [ T505] LibBpfLoader: Loaded code section 48 (xdp_tether_upstream_rawip) [ 12.332523] [ T505] LibBpfLoader: Adding section 48 to cs list [ 12.333162] [ T505] LibBpfLoader: Couldn't find section btf_min_bpfloader_ver (defaulting to 0 [0x0]). [ 12.333176] [ T505] LibBpfLoader: Couldn't find section btf_min_kernel_ver (defaulting to 0 [0x0]). [ 12.338695] [ T505] LibBpfLoader: bpf_create_map name tether_error_map, ret: 6 [ 12.338728] [ T505] LibBpfLoader: map /sys/fs/bpf/tethering/map_offload_tether_error_map id 3 [ 12.338757] [ T505] LibBpfLoader: bpf_create_map name tether_stats_map, ret: 8 [ 12.338771] [ T505] LibBpfLoader: map /sys/fs/bpf/tethering/map_offload_tether_stats_map id 4 [ 12.338787] [ T505] LibBpfLoader: bpf_create_map name tether_limit_map, ret: 9 [ 12.338800] [ T505] LibBpfLoader: map /sys/fs/bpf/tethering/map_offload_tether_limit_map id 5 [ 12.338818] [ T505] LibBpfLoader: bpf_create_map name tether_downstream6_map, ret: 10 [ 12.338830] [ T505] LibBpfLoader: map /sys/fs/bpf/tethering/map_offload_tether_downstream6_map id 6 [ 12.338884] [ T505] LibBpfLoader: bpf_create_map name tether_downstream64_map, ret: 11 [ 12.338898] [ T505] LibBpfLoader: map /sys/fs/bpf/tethering/map_offload_tether_downstream64_map id 7 [ 12.338915] [ T505] LibBpfLoader: bpf_create_map name tether_upstream6_map, ret: 12 [ 12.338928] [ T505] LibBpfLoader: map /sys/fs/bpf/tethering/map_offload_tether_upstream6_map id 8 [ 12.338985] [ T505] LibBpfLoader: bpf_create_map name tether_downstream4_map, ret: 13 [ 12.338998] [ T505] LibBpfLoader: map /sys/fs/bpf/tethering/map_offload_tether_downstream4_map id 9 [ 12.339047] [ T505] LibBpfLoader: bpf_create_map name tether_upstream4_map, ret: 14 [ 12.339060] [ T505] LibBpfLoader: map /sys/fs/bpf/tethering/map_offload_tether_upstream4_map id 10 [ 12.360844] [ T505] LibBpfLoader: bpf_create_map name tether_dev_map, ret: 15 [ 12.360869] [ T505] LibBpfLoader: map /sys/fs/bpf/tethering/map_offload_tether_dev_map id 11 [ 12.360891] [ T505] LibBpfLoader: map_fd found at 0 is 6 in /apex/com.android.tethering/etc/bpf/offload@btf.o [ 12.360894] [ T505] LibBpfLoader: map_fd found at 1 is 8 in /apex/com.android.tethering/etc/bpf/offload@btf.o [ 12.360896] [ T505] LibBpfLoader: map_fd found at 2 is 9 in /apex/com.android.tethering/etc/bpf/offload@btf.o [ 12.360898] [ T505] LibBpfLoader: map_fd found at 3 is 10 in /apex/com.android.tethering/etc/bpf/offload@btf.o [ 12.360899] [ T505] LibBpfLoader: map_fd found at 4 is 11 in /apex/com.android.tethering/etc/bpf/offload@btf.o [ 12.360902] [ T505] LibBpfLoader: map_fd found at 5 is 12 in /apex/com.android.tethering/etc/bpf/offload@btf.o [ 12.360904] [ T505] LibBpfLoader: map_fd found at 6 is 13 in /apex/com.android.tethering/etc/bpf/offload@btf.o [ 12.360906] [ T505] LibBpfLoader: map_fd found at 7 is 14 in /apex/com.android.tethering/etc/bpf/offload@btf.o [ 12.360908] [ T505] LibBpfLoader: map_fd found at 8 is 15 in /apex/com.android.tethering/etc/bpf/offload@btf.o [ 12.366561] [ T505] LibBpfLoader: cs[0].name:schedcls_tether_downstream6_ether min_kver:0 .max_kver:ffffffff (kvers:6010039) [ 12.366565] [ T505] LibBpfLoader: cs[0].name:schedcls_tether_downstream6_ether requires bpfloader version [0x00019,0x10000) [ 12.367392] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/offload@btf.o (schedcls_tether_downstream6_ether) returned fd: 7 (no error) [ 12.367491] [ T505] LibBpfLoader: prog /sys/fs/bpf/tethering/prog_offload_schedcls_tether_downstream6_ether id 2 [ 12.367500] [ T505] LibBpfLoader: cs[1].name:schedcls_tether_upstream6_ether min_kver:0 .max_kver:ffffffff (kvers:6010039) [ 12.367504] [ T505] LibBpfLoader: cs[1].name:schedcls_tether_upstream6_ether requires bpfloader version [0x00019,0x10000) [ 12.368238] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/offload@btf.o (schedcls_tether_upstream6_ether) returned fd: 16 (no error) [ 12.368322] [ T505] LibBpfLoader: prog /sys/fs/bpf/tethering/prog_offload_schedcls_tether_upstream6_ether id 3 [ 12.368329] [ T505] LibBpfLoader: cs[2].name:schedcls_tether_downstream6_rawip$4_14 min_kver:40e0000 .max_kver:ffffffff (kvers:6010039) [ 12.368331] [ T505] LibBpfLoader: cs[2].name:schedcls_tether_downstream6_rawip$4_14 requires bpfloader version [0x00019,0x10000) [ 12.368946] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/offload@btf.o (schedcls_tether_downstream6_rawip$4_14) returned fd: 17 (no error) [ 12.369026] [ T505] LibBpfLoader: prog /sys/fs/bpf/tethering/prog_offload_schedcls_tether_downstream6_rawip id 4 [ 12.369035] [ T505] LibBpfLoader: cs[3].name:schedcls_tether_upstream6_rawip$4_14 min_kver:40e0000 .max_kver:ffffffff (kvers:6010039) [ 12.369038] [ T505] LibBpfLoader: cs[3].name:schedcls_tether_upstream6_rawip$4_14 requires bpfloader version [0x00019,0x10000) [ 12.369621] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/offload@btf.o (schedcls_tether_upstream6_rawip$4_14) returned fd: 18 (no error) [ 12.369708] [ T505] LibBpfLoader: prog /sys/fs/bpf/tethering/prog_offload_schedcls_tether_upstream6_rawip id 5 [ 12.369714] [ T505] LibBpfLoader: cs[4].name:schedcls_tether_downstream6_rawip$stub min_kver:0 .max_kver:40e0000 (kvers:6010039) [ 12.369717] [ T505] LibBpfLoader: cs[5].name:schedcls_tether_upstream6_rawip$stub min_kver:0 .max_kver:40e0000 (kvers:6010039) [ 12.369719] [ T505] LibBpfLoader: cs[6].name:schedcls_tether_downstream4_rawip$5_8 min_kver:5080000 .max_kver:ffffffff (kvers:6010039) [ 12.369722] [ T505] LibBpfLoader: cs[6].name:schedcls_tether_downstream4_rawip$5_8 requires bpfloader version [0x00019,0x10000) [ 12.369904] [ T295] type=1400 audit(1758284070.232:777): avc: denied { read } for comm="pq_init" name="u:object_r:vendor_system_public_prop:s0" dev="tmpfs" ino=339 scontext=u:r:pq_init:s0 tcontext=u:object_r:vendor_system_public_prop:s0 tclass=file permissive=1 [ 12.370063] [ T295] type=1400 audit(1758284070.232:778): avc: denied { open } for comm="pq_init" path="/dev/__properties__/u:object_r:vendor_system_public_prop:s0" dev="tmpfs" ino=339 scontext=u:r:pq_init:s0 tcontext=u:object_r:vendor_system_public_prop:s0 tclass=file permissive=1 [ 12.370151] [ T295] type=1400 audit(1758284070.232:779): avc: denied { getattr } for comm="pq_init" path="/dev/__properties__/u:object_r:vendor_system_public_prop:s0" dev="tmpfs" ino=339 scontext=u:r:pq_init:s0 tcontext=u:object_r:vendor_system_public_prop:s0 tclass=file permissive=1 [ 12.370229] [ T295] type=1400 audit(1758284070.232:780): avc: denied { map } for comm="pq_init" path="/dev/__properties__/u:object_r:vendor_system_public_prop:s0" dev="tmpfs" ino=339 scontext=u:r:pq_init:s0 tcontext=u:object_r:vendor_system_public_prop:s0 tclass=file permissive=1 [ 12.370963] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/offload@btf.o (schedcls_tether_downstream4_rawip$5_8) returned fd: 19 (no error) [ 12.371057] [ T505] LibBpfLoader: prog /sys/fs/bpf/tethering/prog_offload_schedcls_tether_downstream4_rawip id 6 [ 12.371065] [ T505] LibBpfLoader: cs[7].name:schedcls_tether_upstream4_rawip$5_8 min_kver:5080000 .max_kver:ffffffff (kvers:6010039) [ 12.371068] [ T505] LibBpfLoader: cs[7].name:schedcls_tether_upstream4_rawip$5_8 requires bpfloader version [0x00019,0x10000) [ 12.372188] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/offload@btf.o (schedcls_tether_upstream4_rawip$5_8) returned fd: 20 (no error) [ 12.372274] [ T505] LibBpfLoader: prog /sys/fs/bpf/tethering/prog_offload_schedcls_tether_upstream4_rawip id 7 [ 12.372281] [ T505] LibBpfLoader: cs[8].name:schedcls_tether_downstream4_ether$5_8 min_kver:5080000 .max_kver:ffffffff (kvers:6010039) [ 12.372284] [ T505] LibBpfLoader: cs[8].name:schedcls_tether_downstream4_ether$5_8 requires bpfloader version [0x00019,0x10000) [ 12.373302] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/offload@btf.o (schedcls_tether_downstream4_ether$5_8) returned fd: 21 (no error) [ 12.373383] [ T505] LibBpfLoader: prog /sys/fs/bpf/tethering/prog_offload_schedcls_tether_downstream4_ether id 8 [ 12.373390] [ T505] LibBpfLoader: cs[9].name:schedcls_tether_upstream4_ether$5_8 min_kver:5080000 .max_kver:ffffffff (kvers:6010039) [ 12.373393] [ T505] LibBpfLoader: cs[9].name:schedcls_tether_upstream4_ether$5_8 requires bpfloader version [0x00019,0x10000) [ 12.374360] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/offload@btf.o (schedcls_tether_upstream4_ether$5_8) returned fd: 22 (no error) [ 12.374451] [ T505] LibBpfLoader: prog /sys/fs/bpf/tethering/prog_offload_schedcls_tether_upstream4_ether id 9 [ 12.374458] [ T505] LibBpfLoader: cs[10].name:schedcls_tether_downstream4_rawip$opt min_kver:40e0000 .max_kver:5080000 (kvers:6010039) [ 12.374461] [ T505] LibBpfLoader: cs[11].name:schedcls_tether_upstream4_rawip$opt min_kver:40e0000 .max_kver:5080000 (kvers:6010039) [ 12.374463] [ T505] LibBpfLoader: cs[12].name:schedcls_tether_downstream4_ether$opt min_kver:40e0000 .max_kver:5080000 (kvers:6010039) [ 12.374466] [ T505] LibBpfLoader: cs[13].name:schedcls_tether_upstream4_ether$opt min_kver:40e0000 .max_kver:5080000 (kvers:6010039) [ 12.374468] [ T505] LibBpfLoader: cs[14].name:schedcls_tether_downstream4_rawip$5_4 min_kver:5040000 .max_kver:5080000 (kvers:6010039) [ 12.374471] [ T505] LibBpfLoader: cs[15].name:schedcls_tether_upstream4_rawip$5_4 min_kver:5040000 .max_kver:5080000 (kvers:6010039) [ 12.374473] [ T505] LibBpfLoader: cs[16].name:schedcls_tether_downstream4_rawip$4_14 min_kver:40e0000 .max_kver:5040000 (kvers:6010039) [ 12.374476] [ T505] LibBpfLoader: cs[17].name:schedcls_tether_upstream4_rawip$4_14 min_kver:40e0000 .max_kver:5040000 (kvers:6010039) [ 12.374478] [ T505] LibBpfLoader: cs[18].name:schedcls_tether_downstream4_ether$4_14 min_kver:40e0000 .max_kver:5080000 (kvers:6010039) [ 12.374481] [ T505] LibBpfLoader: cs[19].name:schedcls_tether_upstream4_ether$4_14 min_kver:40e0000 .max_kver:5080000 (kvers:6010039) [ 12.374483] [ T505] LibBpfLoader: cs[20].name:schedcls_tether_downstream4_rawip$stub min_kver:0 .max_kver:5040000 (kvers:6010039) [ 12.374486] [ T505] LibBpfLoader: cs[21].name:schedcls_tether_upstream4_rawip$stub min_kver:0 .max_kver:5040000 (kvers:6010039) [ 12.374488] [ T505] LibBpfLoader: cs[22].name:schedcls_tether_downstream4_ether$stub min_kver:0 .max_kver:40e0000 (kvers:6010039) [ 12.374490] [ T505] LibBpfLoader: cs[23].name:schedcls_tether_upstream4_ether$stub min_kver:0 .max_kver:40e0000 (kvers:6010039) [ 12.374493] [ T505] LibBpfLoader: cs[24].name:xdp_tether_downstream_ether min_kver:5090000 .max_kver:ffffffff (kvers:6010039) [ 12.374496] [ T505] LibBpfLoader: cs[24].name:xdp_tether_downstream_ether requires bpfloader version [0x00019,0x10000) [ 12.374843] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/offload@btf.o (xdp_tether_downstream_ether) returned fd: 23 (no error) [ 12.374906] [ T505] LibBpfLoader: prog /sys/fs/bpf/tethering/prog_offload_xdp_tether_downstream_ether id 10 [ 12.374914] [ T505] LibBpfLoader: cs[25].name:xdp_tether_downstream_rawip min_kver:5090000 .max_kver:ffffffff (kvers:6010039) [ 12.374917] [ T505] LibBpfLoader: cs[25].name:xdp_tether_downstream_rawip requires bpfloader version [0x00019,0x10000) [ 12.375254] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/offload@btf.o (xdp_tether_downstream_rawip) returned fd: 24 (no error) [ 12.375318] [ T505] LibBpfLoader: prog /sys/fs/bpf/tethering/prog_offload_xdp_tether_downstream_rawip id 11 [ 12.375324] [ T505] LibBpfLoader: cs[26].name:xdp_tether_upstream_ether min_kver:5090000 .max_kver:ffffffff (kvers:6010039) [ 12.375326] [ T505] LibBpfLoader: cs[26].name:xdp_tether_upstream_ether requires bpfloader version [0x00019,0x10000) [ 12.375631] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/offload@btf.o (xdp_tether_upstream_ether) returned fd: 25 (no error) [ 12.375695] [ T505] LibBpfLoader: prog /sys/fs/bpf/tethering/prog_offload_xdp_tether_upstream_ether id 12 [ 12.375700] [ T505] LibBpfLoader: cs[27].name:xdp_tether_upstream_rawip min_kver:5090000 .max_kver:ffffffff (kvers:6010039) [ 12.375703] [ T505] LibBpfLoader: cs[27].name:xdp_tether_upstream_rawip requires bpfloader version [0x00019,0x10000) [ 12.376000] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/offload@btf.o (xdp_tether_upstream_rawip) returned fd: 26 (no error) [ 12.376061] [ T505] LibBpfLoader: prog /sys/fs/bpf/tethering/prog_offload_xdp_tether_upstream_rawip id 13 [ 12.376138] [ T505] bpfloader: Loaded object: /apex/com.android.tethering/etc/bpf/offload@btf.o [ 12.383167] [ T505] LibBpfLoader: Loading critical for Connectivity and netd ELF object /apex/com.android.tethering/etc/bpf/netd_shared/netd.o with license Apache 2.0 [ 12.383186] [ T505] LibBpfLoader: Section bpfloader_min_ver value is 13 [0xd] [ 12.383204] [ T505] LibBpfLoader: Section bpfloader_max_ver value is 65536 [0x10000] [ 12.383219] [ T505] LibBpfLoader: Couldn't find section bpfloader_min_required_ver (defaulting to 0 [0x0]). [ 12.383233] [ T505] LibBpfLoader: Section size_of_bpf_map_def value is 120 [0x78] [ 12.383249] [ T505] LibBpfLoader: Section size_of_bpf_prog_def value is 92 [0x5c] [ 12.383253] [ T505] LibBpfLoader: BpfLoader version 0x00026 processing ELF object /apex/com.android.tethering/etc/bpf/netd_shared/netd.o with ver [0x0000d,0x10000) [ 12.385420] [ T505] LibBpfLoader: Loaded code section 3 (cgroupskb_ingress_stats$trace) [ 12.385480] [ T505] LibBpfLoader: Loaded relo section 3 (.relcgroupskb/ingress/stats$trace) [ 12.385484] [ T505] LibBpfLoader: Adding section 3 to cs list [ 12.385506] [ T505] LibBpfLoader: Loaded code section 5 (cgroupskb_ingress_stats$4_19) [ 12.385575] [ T505] LibBpfLoader: Loaded relo section 5 (.relcgroupskb/ingress/stats$4_19) [ 12.385578] [ T505] LibBpfLoader: Adding section 5 to cs list [ 12.385599] [ T505] LibBpfLoader: Loaded code section 7 (cgroupskb_ingress_stats$4_14) [ 12.385681] [ T505] LibBpfLoader: Loaded relo section 7 (.relcgroupskb/ingress/stats$4_14) [ 12.385685] [ T505] LibBpfLoader: Adding section 7 to cs list [ 12.385706] [ T505] LibBpfLoader: Loaded code section 9 (cgroupskb_egress_stats$trace) [ 12.385801] [ T505] LibBpfLoader: Loaded relo section 9 (.relcgroupskb/egress/stats$trace) [ 12.385803] [ T505] LibBpfLoader: Adding section 9 to cs list [ 12.385824] [ T505] LibBpfLoader: Loaded code section 11 (cgroupskb_egress_stats$4_19) [ 12.385931] [ T505] LibBpfLoader: Loaded relo section 11 (.relcgroupskb/egress/stats$4_19) [ 12.385933] [ T505] LibBpfLoader: Adding section 11 to cs list [ 12.385954] [ T505] LibBpfLoader: Loaded code section 13 (cgroupskb_egress_stats$4_14) [ 12.386074] [ T505] LibBpfLoader: Loaded relo section 13 (.relcgroupskb/egress/stats$4_14) [ 12.386076] [ T505] LibBpfLoader: Adding section 13 to cs list [ 12.386098] [ T505] LibBpfLoader: Loaded code section 15 (skfilter_egress_xtbpf) [ 12.386229] [ T505] LibBpfLoader: Loaded relo section 15 (.relskfilter/egress/xtbpf) [ 12.386231] [ T505] LibBpfLoader: Adding section 15 to cs list [ 12.386252] [ T505] LibBpfLoader: Loaded code section 17 (skfilter_ingress_xtbpf) [ 12.386397] [ T505] LibBpfLoader: Loaded relo section 17 (.relskfilter/ingress/xtbpf) [ 12.386398] [ T505] LibBpfLoader: Adding section 17 to cs list [ 12.386420] [ T505] LibBpfLoader: Loaded code section 19 (schedact_ingress_account) [ 12.386577] [ T505] LibBpfLoader: Loaded relo section 19 (.relschedact/ingress/account) [ 12.386580] [ T505] LibBpfLoader: Adding section 19 to cs list [ 12.386602] [ T505] LibBpfLoader: Loaded code section 21 (skfilter_allowlist_xtbpf) [ 12.386772] [ T505] LibBpfLoader: Loaded relo section 21 (.relskfilter/allowlist/xtbpf) [ 12.386774] [ T505] LibBpfLoader: Adding section 21 to cs list [ 12.386797] [ T505] LibBpfLoader: Loaded code section 23 (skfilter_denylist_xtbpf) [ 12.386979] [ T505] LibBpfLoader: Loaded relo section 23 (.relskfilter/denylist/xtbpf) [ 12.386981] [ T505] LibBpfLoader: Adding section 23 to cs list [ 12.387027] [ T505] LibBpfLoader: Loaded code section 25 (cgroupsock_inet_create) [ 12.387222] [ T505] LibBpfLoader: Loaded relo section 25 (.relcgroupsock/inet/create) [ 12.387224] [ T505] LibBpfLoader: Adding section 25 to cs list [ 12.387675] [ T505] LibBpfLoader: Couldn't find section btf_min_bpfloader_ver (defaulting to 0 [0x0]). [ 12.387687] [ T505] LibBpfLoader: Couldn't find section btf_min_kernel_ver (defaulting to 0 [0x0]). [ 12.392873] [ T505] LibBpfLoader: map configuration_map selinux_context [fs_bpf_netd_readonly ] -> 5 -> 'fs_bpf_netd_readonly' (netd_readonly/) [ 12.392924] [ T505] LibBpfLoader: bpf_create_map name configuration_map, ret: 6 [ 12.392978] [ T505] LibBpfLoader: map /sys/fs/bpf/netd_shared/map_netd_configuration_map id 12 [ 12.393277] [ T505] LibBpfLoader: bpf_create_map name cookie_tag_map, ret: 8 [ 12.393305] [ T505] LibBpfLoader: map /sys/fs/bpf/netd_shared/map_netd_cookie_tag_map id 13 [ 12.393312] [ T505] LibBpfLoader: map uid_counterset_map selinux_context [fs_bpf_net_shared ] -> 4 -> 'fs_bpf_net_shared' (net_shared/) [ 12.393427] [ T505] LibBpfLoader: bpf_create_map name uid_counterset_map, ret: 9 [ 12.393466] [ T505] LibBpfLoader: map /sys/fs/bpf/netd_shared/map_netd_uid_counterset_map id 14 [ 12.393472] [ T505] LibBpfLoader: map app_uid_stats_map selinux_context [fs_bpf_net_shared ] -> 4 -> 'fs_bpf_net_shared' (net_shared/) [ 12.393797] [ T505] LibBpfLoader: bpf_create_map name app_uid_stats_map, ret: 10 [ 12.393822] [ T505] LibBpfLoader: map /sys/fs/bpf/netd_shared/map_netd_app_uid_stats_map id 15 [ 12.394003] [ T505] LibBpfLoader: bpf_create_map name stats_map_A, ret: 11 [ 12.394033] [ T505] LibBpfLoader: map /sys/fs/bpf/netd_shared/map_netd_stats_map_A id 16 [ 12.394039] [ T505] LibBpfLoader: map stats_map_B selinux_context [fs_bpf_netd_readonly ] -> 5 -> 'fs_bpf_netd_readonly' (netd_readonly/) [ 12.394217] [ T505] LibBpfLoader: bpf_create_map name stats_map_B, ret: 12 [ 12.394240] [ T505] LibBpfLoader: map /sys/fs/bpf/netd_shared/map_netd_stats_map_B id 17 [ 12.394245] [ T505] LibBpfLoader: map iface_stats_map selinux_context [fs_bpf_net_shared ] -> 4 -> 'fs_bpf_net_shared' (net_shared/) [ 12.394289] [ T505] LibBpfLoader: bpf_create_map name iface_stats_map, ret: 13 [ 12.394308] [ T505] LibBpfLoader: map /sys/fs/bpf/netd_shared/map_netd_iface_stats_map id 18 [ 12.394312] [ T505] LibBpfLoader: map uid_owner_map selinux_context [fs_bpf_net_shared ] -> 4 -> 'fs_bpf_net_shared' (net_shared/) [ 12.394419] [ T505] LibBpfLoader: bpf_create_map name uid_owner_map, ret: 14 [ 12.394439] [ T505] LibBpfLoader: map /sys/fs/bpf/netd_shared/map_netd_uid_owner_map id 19 [ 12.394543] [ T505] LibBpfLoader: bpf_create_map name uid_permission_map, ret: 15 [ 12.394557] [ T505] LibBpfLoader: map /sys/fs/bpf/netd_shared/map_netd_uid_permission_map id 20 [ 12.394567] [ T505] LibBpfLoader: map iface_index_name_map selinux_context [fs_bpf_net_shared ] -> 4 -> 'fs_bpf_net_shared' (net_shared/) [ 12.394608] [ T505] LibBpfLoader: bpf_create_map name iface_index_name_map, ret: 16 [ 12.394629] [ T505] LibBpfLoader: map /sys/fs/bpf/netd_shared/map_netd_iface_index_name_map id 21 [ 12.394634] [ T505] LibBpfLoader: map packet_trace_enabled_map selinux_context [fs_bpf_net_shared ] -> 4 -> 'fs_bpf_net_shared' (net_shared/) [ 12.394644] [ T505] LibBpfLoader: bpf_create_map name packet_trace_enabled_map, ret: 17 [ 12.394663] [ T505] LibBpfLoader: map /sys/fs/bpf/netd_shared/map_netd_packet_trace_enabled_map id 22 [ 12.394667] [ T505] LibBpfLoader: map packet_trace_ringbuf selinux_context [fs_bpf_net_shared ] -> 4 -> 'fs_bpf_net_shared' (net_shared/) [ 12.394689] [ T505] LibBpfLoader: bpf_create_map name packet_trace_ringbuf, ret: 18 [ 12.394723] [ T505] LibBpfLoader: map /sys/fs/bpf/netd_shared/map_netd_packet_trace_ringbuf id 23 [ 12.394741] [ T505] LibBpfLoader: map_fd found at 0 is 6 in /apex/com.android.tethering/etc/bpf/netd_shared/netd.o [ 12.394743] [ T505] LibBpfLoader: map_fd found at 1 is 8 in /apex/com.android.tethering/etc/bpf/netd_shared/netd.o [ 12.394745] [ T505] LibBpfLoader: map_fd found at 2 is 9 in /apex/com.android.tethering/etc/bpf/netd_shared/netd.o [ 12.394747] [ T505] LibBpfLoader: map_fd found at 3 is 10 in /apex/com.android.tethering/etc/bpf/netd_shared/netd.o [ 12.394749] [ T505] LibBpfLoader: map_fd found at 4 is 11 in /apex/com.android.tethering/etc/bpf/netd_shared/netd.o [ 12.394751] [ T505] LibBpfLoader: map_fd found at 5 is 12 in /apex/com.android.tethering/etc/bpf/netd_shared/netd.o [ 12.394754] [ T505] LibBpfLoader: map_fd found at 6 is 13 in /apex/com.android.tethering/etc/bpf/netd_shared/netd.o [ 12.394756] [ T505] LibBpfLoader: map_fd found at 7 is 14 in /apex/com.android.tethering/etc/bpf/netd_shared/netd.o [ 12.394758] [ T505] LibBpfLoader: map_fd found at 8 is 15 in /apex/com.android.tethering/etc/bpf/netd_shared/netd.o [ 12.394759] [ T505] LibBpfLoader: map_fd found at 9 is 16 in /apex/com.android.tethering/etc/bpf/netd_shared/netd.o [ 12.394761] [ T505] LibBpfLoader: map_fd found at 10 is 17 in /apex/com.android.tethering/etc/bpf/netd_shared/netd.o [ 12.394763] [ T505] LibBpfLoader: map_fd found at 11 is 18 in /apex/com.android.tethering/etc/bpf/netd_shared/netd.o [ 12.396294] [ T505] LibBpfLoader: cs[0].name:cgroupskb_ingress_stats$trace min_kver:5080000 .max_kver:ffffffff (kvers:6010039) [ 12.396298] [ T505] LibBpfLoader: cs[0].name:cgroupskb_ingress_stats$trace requires bpfloader version [0x00021,0x10000) [ 12.396301] [ T505] LibBpfLoader: prog cgroupskb_ingress_stats$trace selinux_context [fs_bpf_netd_readonly ] -> 5 -> 'fs_bpf_netd_readonly' (netd_readonly/) [ 12.397711] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/netd_shared/netd.o (cgroupskb_ingress_stats$trace) returned fd: 7 (no error) [ 12.397815] [ T505] LibBpfLoader: prog /sys/fs/bpf/netd_shared/prog_netd_cgroupskb_ingress_stats id 14 [ 12.397824] [ T505] LibBpfLoader: cs[1].name:cgroupskb_ingress_stats$4_19 min_kver:4130000 .max_kver:ffffffff (kvers:6010039) [ 12.397828] [ T505] LibBpfLoader: cs[1].name:cgroupskb_ingress_stats$4_19 requires bpfloader version [0x0000d,0x10000) [ 12.397830] [ T505] LibBpfLoader: prog cgroupskb_ingress_stats$4_19 selinux_context [fs_bpf_netd_readonly ] -> 5 -> 'fs_bpf_netd_readonly' (netd_readonly/) [ 12.397843] [ T505] LibBpfLoader: New bpf prog load reusing prog /sys/fs/bpf/netd_shared/prog_netd_cgroupskb_ingress_stats, ret: 19 (no error) [ 12.397845] [ T505] LibBpfLoader: prog /sys/fs/bpf/netd_shared/prog_netd_cgroupskb_ingress_stats id 14 [ 12.397850] [ T505] LibBpfLoader: cs[2].name:cgroupskb_ingress_stats$4_14 min_kver:0 .max_kver:4130000 (kvers:6010039) [ 12.397852] [ T505] LibBpfLoader: cs[3].name:cgroupskb_egress_stats$trace min_kver:5080000 .max_kver:ffffffff (kvers:6010039) [ 12.397855] [ T505] LibBpfLoader: cs[3].name:cgroupskb_egress_stats$trace requires bpfloader version [0x00021,0x10000) [ 12.397857] [ T505] LibBpfLoader: prog cgroupskb_egress_stats$trace selinux_context [fs_bpf_netd_readonly ] -> 5 -> 'fs_bpf_netd_readonly' (netd_readonly/) [ 12.398851] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/netd_shared/netd.o (cgroupskb_egress_stats$trace) returned fd: 20 (no error) [ 12.398937] [ T505] LibBpfLoader: prog /sys/fs/bpf/netd_shared/prog_netd_cgroupskb_egress_stats id 15 [ 12.398943] [ T505] LibBpfLoader: cs[4].name:cgroupskb_egress_stats$4_19 min_kver:4130000 .max_kver:ffffffff (kvers:6010039) [ 12.398946] [ T505] LibBpfLoader: cs[4].name:cgroupskb_egress_stats$4_19 requires bpfloader version [0x0000d,0x10000) [ 12.398948] [ T505] LibBpfLoader: prog cgroupskb_egress_stats$4_19 selinux_context [fs_bpf_netd_readonly ] -> 5 -> 'fs_bpf_netd_readonly' (netd_readonly/) [ 12.398959] [ T505] LibBpfLoader: New bpf prog load reusing prog /sys/fs/bpf/netd_shared/prog_netd_cgroupskb_egress_stats, ret: 21 (no error) [ 12.398963] [ T505] LibBpfLoader: prog /sys/fs/bpf/netd_shared/prog_netd_cgroupskb_egress_stats id 15 [ 12.398967] [ T505] LibBpfLoader: cs[5].name:cgroupskb_egress_stats$4_14 min_kver:0 .max_kver:4130000 (kvers:6010039) [ 12.398970] [ T505] LibBpfLoader: cs[6].name:skfilter_egress_xtbpf min_kver:0 .max_kver:ffffffff (kvers:6010039) [ 12.398972] [ T505] LibBpfLoader: cs[6].name:skfilter_egress_xtbpf requires bpfloader version [0x0000d,0x10000) [ 12.399463] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/netd_shared/netd.o (skfilter_egress_xtbpf) returned fd: 22 (no error) [ 12.399544] [ T505] LibBpfLoader: prog /sys/fs/bpf/netd_shared/prog_netd_skfilter_egress_xtbpf id 16 [ 12.399551] [ T505] LibBpfLoader: cs[7].name:skfilter_ingress_xtbpf min_kver:0 .max_kver:ffffffff (kvers:6010039) [ 12.399553] [ T505] LibBpfLoader: cs[7].name:skfilter_ingress_xtbpf requires bpfloader version [0x0000d,0x10000) [ 12.399950] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/netd_shared/netd.o (skfilter_ingress_xtbpf) returned fd: 23 (no error) [ 12.400016] [ T505] LibBpfLoader: prog /sys/fs/bpf/netd_shared/prog_netd_skfilter_ingress_xtbpf id 17 [ 12.400022] [ T505] LibBpfLoader: cs[8].name:schedact_ingress_account min_kver:0 .max_kver:ffffffff (kvers:6010039) [ 12.400025] [ T505] LibBpfLoader: cs[8].name:schedact_ingress_account requires bpfloader version [0x0000d,0x10000) [ 12.400028] [ T505] LibBpfLoader: prog schedact_ingress_account selinux_context [fs_bpf_net_shared ] -> 4 -> 'fs_bpf_net_shared' (net_shared/) [ 12.400381] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/netd_shared/netd.o (schedact_ingress_account) returned fd: 24 (no error) [ 12.400459] [ T505] LibBpfLoader: prog /sys/fs/bpf/netd_shared/prog_netd_schedact_ingress_account id 18 [ 12.400465] [ T505] LibBpfLoader: cs[9].name:skfilter_allowlist_xtbpf min_kver:0 .max_kver:ffffffff (kvers:6010039) [ 12.400467] [ T505] LibBpfLoader: cs[9].name:skfilter_allowlist_xtbpf requires bpfloader version [0x0000d,0x10000) [ 12.400787] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/netd_shared/netd.o (skfilter_allowlist_xtbpf) returned fd: 25 (no error) [ 12.400852] [ T505] LibBpfLoader: prog /sys/fs/bpf/netd_shared/prog_netd_skfilter_allowlist_xtbpf id 19 [ 12.400857] [ T505] LibBpfLoader: cs[10].name:skfilter_denylist_xtbpf min_kver:0 .max_kver:ffffffff (kvers:6010039) [ 12.400860] [ T505] LibBpfLoader: cs[10].name:skfilter_denylist_xtbpf requires bpfloader version [0x0000d,0x10000) [ 12.401159] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/netd_shared/netd.o (skfilter_denylist_xtbpf) returned fd: 26 (no error) [ 12.401223] [ T505] LibBpfLoader: prog /sys/fs/bpf/netd_shared/prog_netd_skfilter_denylist_xtbpf id 20 [ 12.401228] [ T505] LibBpfLoader: cs[11].name:cgroupsock_inet_create min_kver:40e0000 .max_kver:ffffffff (kvers:6010039) [ 12.401231] [ T505] LibBpfLoader: cs[11].name:cgroupsock_inet_create requires bpfloader version [0x0000d,0x10000) [ 12.401233] [ T505] LibBpfLoader: prog cgroupsock_inet_create selinux_context [fs_bpf_netd_readonly ] -> 5 -> 'fs_bpf_netd_readonly' (netd_readonly/) [ 12.401544] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/netd_shared/netd.o (cgroupsock_inet_create) returned fd: 27 (no error) [ 12.401615] [ T505] LibBpfLoader: prog /sys/fs/bpf/netd_shared/prog_netd_cgroupsock_inet_create id 21 [ 12.401683] [ T505] bpfloader: Loaded object: /apex/com.android.tethering/etc/bpf/netd_shared/netd.o [ 12.408203] [ T505] LibBpfLoader: Loading critical for Connectivity ELF object /apex/com.android.tethering/etc/bpf/net_shared/dscpPolicy.o with license Apache 2.0 [ 12.408221] [ T505] LibBpfLoader: Section bpfloader_min_ver value is 13 [0xd] [ 12.408240] [ T505] LibBpfLoader: Section bpfloader_max_ver value is 65536 [0x10000] [ 12.408253] [ T505] LibBpfLoader: Couldn't find section bpfloader_min_required_ver (defaulting to 0 [0x0]). [ 12.408267] [ T505] LibBpfLoader: Section size_of_bpf_map_def value is 120 [0x78] [ 12.408282] [ T505] LibBpfLoader: Section size_of_bpf_prog_def value is 92 [0x5c] [ 12.408287] [ T505] LibBpfLoader: BpfLoader version 0x00026 processing ELF object /apex/com.android.tethering/etc/bpf/net_shared/dscpPolicy.o with ver [0x0000d,0x10000) [ 12.408428] [ T505] LibBpfLoader: Loaded code section 3 (schedcls_set_dscp_ether) [ 12.408481] [ T505] LibBpfLoader: Loaded relo section 3 (.relschedcls/set_dscp_ether) [ 12.408483] [ T505] LibBpfLoader: Adding section 3 to cs list [ 12.408671] [ T505] LibBpfLoader: Couldn't find section btf_min_bpfloader_ver (defaulting to 0 [0x0]). [ 12.408682] [ T505] LibBpfLoader: Couldn't find section btf_min_kernel_ver (defaulting to 0 [0x0]). [ 12.412396] [ T295] type=1400 audit(1758284070.272:781): avc: denied { read } for comm="pq_init" name="u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:pq_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 12.412501] [ T295] type=1400 audit(1758284070.272:782): avc: denied { open } for comm="pq_init" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:pq_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 12.412568] [ T295] type=1400 audit(1758284070.272:783): avc: denied { getattr } for comm="pq_init" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:pq_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 12.412628] [ T295] type=1400 audit(1758284070.272:784): avc: denied { map } for comm="pq_init" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:pq_init:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 12.412812] [ T295] type=1400 audit(1758284070.276:785): avc: denied { write } for comm="pq_init" name="property_service" dev="tmpfs" ino=366 scontext=u:r:pq_init:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=1 [ 12.412886] [ T295] type=1400 audit(1758284070.276:786): avc: denied { connectto } for comm="pq_init" path="/dev/socket/property_service" scontext=u:r:pq_init:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket permissive=1 [ 12.413193] [ T295] type=1107 audit(1758284070.276:787): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.tvinput.rkpq.version pid=504 uid=1000 gid=1000 scontext=u:r:pq_init:s0 tcontext=u:object_r:vendor_tv_input_prop:s0 tclass=property_service permissive=1' [ 12.413423] [ T295] type=1400 audit(1758284070.276:788): avc: denied { open } for comm="pq_init" path="/sys/devices/platform/fecc0000.otp/rockchip-otp0/nvmem" dev="sysfs" ino=22242 scontext=u:r:pq_init:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [ 12.413490] [ T295] type=1400 audit(1758284070.276:789): avc: denied { getattr } for comm="pq_init" path="/sys/devices/platform/fecc0000.otp/rockchip-otp0/nvmem" dev="sysfs" ino=22242 scontext=u:r:pq_init:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [ 12.422056] [ T505] LibBpfLoader: bpf_create_map name socket_policy_cache_map, ret: 6 [ 12.422089] [ T505] LibBpfLoader: map /sys/fs/bpf/net_shared/map_dscpPolicy_socket_policy_cache_map id 24 [ 12.422106] [ T505] LibBpfLoader: bpf_create_map name ipv4_dscp_policies_map, ret: 8 [ 12.422128] [ T505] LibBpfLoader: map /sys/fs/bpf/net_shared/map_dscpPolicy_ipv4_dscp_policies_map id 25 [ 12.422140] [ T505] LibBpfLoader: bpf_create_map name ipv6_dscp_policies_map, ret: 9 [ 12.422158] [ T505] LibBpfLoader: map /sys/fs/bpf/net_shared/map_dscpPolicy_ipv6_dscp_policies_map id 26 [ 12.422169] [ T505] LibBpfLoader: map_fd found at 0 is 6 in /apex/com.android.tethering/etc/bpf/net_shared/dscpPolicy.o [ 12.422171] [ T505] LibBpfLoader: map_fd found at 1 is 8 in /apex/com.android.tethering/etc/bpf/net_shared/dscpPolicy.o [ 12.422173] [ T505] LibBpfLoader: map_fd found at 2 is 9 in /apex/com.android.tethering/etc/bpf/net_shared/dscpPolicy.o [ 12.422329] [ T505] LibBpfLoader: cs[0].name:schedcls_set_dscp_ether min_kver:50f0000 .max_kver:ffffffff (kvers:6010039) [ 12.422333] [ T505] LibBpfLoader: cs[0].name:schedcls_set_dscp_ether requires bpfloader version [0x0000d,0x10000) [ 12.432644] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/net_shared/dscpPolicy.o (schedcls_set_dscp_ether) returned fd: 7 (no error) [ 12.432747] [ T505] LibBpfLoader: prog /sys/fs/bpf/net_shared/prog_dscpPolicy_schedcls_set_dscp_ether id 22 [ 12.432785] [ T505] bpfloader: Loaded object: /apex/com.android.tethering/etc/bpf/net_shared/dscpPolicy.o [ 12.433404] [ T505] LibBpfLoader: Loading critical for ConnectivityNative ELF object /apex/com.android.tethering/etc/bpf/net_shared/block.o with license Apache 2.0 [ 12.433420] [ T505] LibBpfLoader: Section bpfloader_min_ver value is 13 [0xd] [ 12.433436] [ T505] LibBpfLoader: Section bpfloader_max_ver value is 65536 [0x10000] [ 12.433450] [ T505] LibBpfLoader: Couldn't find section bpfloader_min_required_ver (defaulting to 0 [0x0]). [ 12.433463] [ T505] LibBpfLoader: Section size_of_bpf_map_def value is 120 [0x78] [ 12.433478] [ T505] LibBpfLoader: Section size_of_bpf_prog_def value is 92 [0x5c] [ 12.433482] [ T505] LibBpfLoader: BpfLoader version 0x00026 processing ELF object /apex/com.android.tethering/etc/bpf/net_shared/block.o with ver [0x0000d,0x10000) [ 12.433617] [ T505] LibBpfLoader: Loaded code section 3 (bind4_block_port) [ 12.433668] [ T505] LibBpfLoader: Loaded relo section 3 (.relbind4/block_port) [ 12.433671] [ T505] LibBpfLoader: Adding section 3 to cs list [ 12.433690] [ T505] LibBpfLoader: Loaded code section 5 (bind6_block_port) [ 12.433752] [ T505] LibBpfLoader: Loaded relo section 5 (.relbind6/block_port) [ 12.433754] [ T505] LibBpfLoader: Adding section 5 to cs list [ 12.433928] [ T505] LibBpfLoader: Couldn't find section btf_min_bpfloader_ver (defaulting to 0 [0x0]). [ 12.433939] [ T505] LibBpfLoader: Couldn't find section btf_min_kernel_ver (defaulting to 0 [0x0]). [ 12.446635] [ T505] LibBpfLoader: bpf_create_map name blocked_ports_map, ret: 6 [ 12.446662] [ T505] LibBpfLoader: map /sys/fs/bpf/net_shared/map_block_blocked_ports_map id 27 [ 12.446675] [ T505] LibBpfLoader: map_fd found at 0 is 6 in /apex/com.android.tethering/etc/bpf/net_shared/block.o [ 12.446786] [ T505] LibBpfLoader: cs[0].name:bind4_block_port min_kver:5040000 .max_kver:ffffffff (kvers:6010039) [ 12.446789] [ T505] LibBpfLoader: cs[0].name:bind4_block_port requires bpfloader version [0x0000d,0x10000) [ 12.447289] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/net_shared/block.o (bind4_block_port) returned fd: 7 (no error) [ 12.447367] [ T505] LibBpfLoader: prog /sys/fs/bpf/net_shared/prog_block_bind4_block_port id 23 [ 12.447374] [ T505] LibBpfLoader: cs[1].name:bind6_block_port min_kver:5040000 .max_kver:ffffffff (kvers:6010039) [ 12.447377] [ T505] LibBpfLoader: cs[1].name:bind6_block_port requires bpfloader version [0x0000d,0x10000) [ 12.447811] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/net_shared/block.o (bind6_block_port) returned fd: 8 (no error) [ 12.447880] [ T505] LibBpfLoader: prog /sys/fs/bpf/net_shared/prog_block_bind6_block_port id 24 [ 12.447905] [ T505] bpfloader: Loaded object: /apex/com.android.tethering/etc/bpf/net_shared/block.o [ 12.449099] [ T505] LibBpfLoader: Loading critical for Connectivity ELF object /apex/com.android.tethering/etc/bpf/net_shared/clatd.o with license Apache 2.0 [ 12.449116] [ T505] LibBpfLoader: Section bpfloader_min_ver value is 13 [0xd] [ 12.449132] [ T505] LibBpfLoader: Section bpfloader_max_ver value is 65536 [0x10000] [ 12.449145] [ T505] LibBpfLoader: Couldn't find section bpfloader_min_required_ver (defaulting to 0 [0x0]). [ 12.449159] [ T505] LibBpfLoader: Section size_of_bpf_map_def value is 120 [0x78] [ 12.449174] [ T505] LibBpfLoader: Section size_of_bpf_prog_def value is 92 [0x5c] [ 12.449178] [ T505] LibBpfLoader: BpfLoader version 0x00026 processing ELF object /apex/com.android.tethering/etc/bpf/net_shared/clatd.o with ver [0x0000d,0x10000) [ 12.449377] [ T505] LibBpfLoader: Loaded code section 3 (schedcls_ingress6_clat_ether$4_14) [ 12.449431] [ T505] LibBpfLoader: Loaded relo section 3 (.relschedcls/ingress6/clat_ether$4_14) [ 12.449435] [ T505] LibBpfLoader: Adding section 3 to cs list [ 12.449458] [ T505] LibBpfLoader: Loaded code section 5 (schedcls_ingress6_clat_ether$4_9) [ 12.449523] [ T505] LibBpfLoader: Loaded relo section 5 (.relschedcls/ingress6/clat_ether$4_9) [ 12.449525] [ T505] LibBpfLoader: Adding section 5 to cs list [ 12.449549] [ T505] LibBpfLoader: Loaded code section 7 (schedcls_ingress6_clat_rawip$4_14) [ 12.449626] [ T505] LibBpfLoader: Loaded relo section 7 (.relschedcls/ingress6/clat_rawip$4_14) [ 12.449628] [ T505] LibBpfLoader: Adding section 7 to cs list [ 12.449649] [ T505] LibBpfLoader: Loaded code section 9 (schedcls_ingress6_clat_rawip$4_9) [ 12.449742] [ T505] LibBpfLoader: Loaded relo section 9 (.relschedcls/ingress6/clat_rawip$4_9) [ 12.449744] [ T505] LibBpfLoader: Adding section 9 to cs list [ 12.449765] [ T505] LibBpfLoader: Loaded code section 11 (schedcls_egress4_clat_rawip) [ 12.449869] [ T505] LibBpfLoader: Loaded relo section 11 (.relschedcls/egress4/clat_rawip) [ 12.449871] [ T505] LibBpfLoader: Adding section 11 to cs list [ 12.450095] [ T505] LibBpfLoader: Couldn't find section btf_min_bpfloader_ver (defaulting to 0 [0x0]). [ 12.450107] [ T505] LibBpfLoader: Couldn't find section btf_min_kernel_ver (defaulting to 0 [0x0]). [ 12.454830] [ T295] type=1107 audit(1758284070.316:790): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=persist.vendor.rkpq.version pid=504 uid=1000 gid=1000 scontext=u:r:pq_init:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=1' [ 12.463665] [ T295] type=1400 audit(1758284070.324:791): avc: denied { write } for comm="pq_init" name="/" dev="mmcblk0p16" ino=3 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1 [ 12.463692] [ T505] LibBpfLoader: bpf_create_map name clat_ingress6_map, ret: 6 [ 12.463719] [ T505] LibBpfLoader: map /sys/fs/bpf/net_shared/map_clatd_clat_ingress6_map id 28 [ 12.463741] [ T505] LibBpfLoader: bpf_create_map name clat_egress4_map, ret: 8 [ 12.463747] [ T295] type=1400 audit(1758284070.324:792): avc: denied { add_name } for comm="pq_init" name="dump" scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1 [ 12.463775] [ T505] LibBpfLoader: map /sys/fs/bpf/net_shared/map_clatd_clat_egress4_map id 29 [ 12.463787] [ T505] LibBpfLoader: map_fd found at 0 is 6 in /apex/com.android.tethering/etc/bpf/net_shared/clatd.o [ 12.463790] [ T505] LibBpfLoader: map_fd found at 1 is 8 in /apex/com.android.tethering/etc/bpf/net_shared/clatd.o [ 12.463807] [ T295] type=1400 audit(1758284070.324:793): avc: denied { create } for comm="pq_init" name="dump" scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1 [ 12.463989] [ T505] LibBpfLoader: cs[0].name:schedcls_ingress6_clat_ether$4_14 min_kver:40e0000 .max_kver:ffffffff (kvers:6010039) [ 12.463993] [ T505] LibBpfLoader: cs[0].name:schedcls_ingress6_clat_ether$4_14 requires bpfloader version [0x0000d,0x10000) [ 12.464783] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/net_shared/clatd.o (schedcls_ingress6_clat_ether$4_14) returned fd: 7 (no error) [ 12.464868] [ T505] LibBpfLoader: prog /sys/fs/bpf/net_shared/prog_clatd_schedcls_ingress6_clat_ether id 25 [ 12.464877] [ T505] LibBpfLoader: cs[1].name:schedcls_ingress6_clat_ether$4_9 min_kver:0 .max_kver:40e0000 (kvers:6010039) [ 12.464880] [ T505] LibBpfLoader: cs[2].name:schedcls_ingress6_clat_rawip$4_14 min_kver:40e0000 .max_kver:ffffffff (kvers:6010039) [ 12.464883] [ T505] LibBpfLoader: cs[2].name:schedcls_ingress6_clat_rawip$4_14 requires bpfloader version [0x0000d,0x10000) [ 12.465565] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/net_shared/clatd.o (schedcls_ingress6_clat_rawip$4_14) returned fd: 9 (no error) [ 12.465638] [ T505] LibBpfLoader: prog /sys/fs/bpf/net_shared/prog_clatd_schedcls_ingress6_clat_rawip id 26 [ 12.465645] [ T505] LibBpfLoader: cs[3].name:schedcls_ingress6_clat_rawip$4_9 min_kver:0 .max_kver:40e0000 (kvers:6010039) [ 12.465648] [ T505] LibBpfLoader: cs[4].name:schedcls_egress4_clat_rawip min_kver:0 .max_kver:ffffffff (kvers:6010039) [ 12.465650] [ T505] LibBpfLoader: cs[4].name:schedcls_egress4_clat_rawip requires bpfloader version [0x0000d,0x10000) [ 12.466216] [ T505] LibBpfLoader: bpf_prog_load lib call for /apex/com.android.tethering/etc/bpf/net_shared/clatd.o (schedcls_egress4_clat_rawip) returned fd: 10 (no error) [ 12.466286] [ T505] LibBpfLoader: prog /sys/fs/bpf/net_shared/prog_clatd_schedcls_egress4_clat_rawip id 27 [ 12.466315] [ T505] bpfloader: Loaded object: /apex/com.android.tethering/etc/bpf/net_shared/clatd.o [ 12.467213] [ T505] LibBpfLoader: Loading optional ELF object /system/etc/bpf/timeInState.o with license GPL [ 12.467229] [ T505] LibBpfLoader: Section bpfloader_min_ver value is 28 [0x1c] [ 12.467246] [ T505] LibBpfLoader: Section bpfloader_max_ver value is 65536 [0x10000] [ 12.467260] [ T505] LibBpfLoader: Couldn't find section bpfloader_min_required_ver (defaulting to 0 [0x0]). [ 12.467273] [ T505] LibBpfLoader: Section size_of_bpf_map_def value is 120 [0x78] [ 12.467288] [ T505] LibBpfLoader: Section size_of_bpf_prog_def value is 92 [0x5c] [ 12.467292] [ T505] LibBpfLoader: BpfLoader version 0x00026 processing ELF object /system/etc/bpf/timeInState.o with ver [0x0001c,0x10000) [ 12.467835] [ T505] LibBpfLoader: Loaded code section 3 (tracepoint_sched_sched_switch) [ 12.467891] [ T505] LibBpfLoader: Loaded relo section 3 (.reltracepoint/sched/sched_switch) [ 12.467894] [ T505] LibBpfLoader: Adding section 3 to cs list [ 12.467916] [ T505] LibBpfLoader: Loaded code section 5 (tracepoint_power_cpu_frequency) [ 12.467984] [ T505] LibBpfLoader: Loaded relo section 5 (.reltracepoint/power/cpu_frequency) [ 12.467988] [ T505] LibBpfLoader: Adding section 5 to cs list [ 12.468010] [ T505] LibBpfLoader: Loaded code section 7 (tracepoint_sched_sched_process_free) [ 12.468093] [ T505] LibBpfLoader: Loaded relo section 7 (.reltracepoint/sched/sched_process_free) [ 12.468096] [ T505] LibBpfLoader: Adding section 7 to cs list [ 12.468476] [ T505] LibBpfLoader: Couldn't find section btf_min_bpfloader_ver (defaulting to 0 [0x0]). [ 12.468489] [ T505] LibBpfLoader: Couldn't find section btf_min_kernel_ver (defaulting to 0 [0x0]). [ 12.482380] [ T505] LibBpfLoader: bpf_create_map name total_time_in_state_map, ret: 6 [ 12.482424] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_total_time_in_state_map id 30 [ 12.483164] [ T505] LibBpfLoader: bpf_create_map name uid_time_in_state_map, ret: 8 [ 12.483197] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_uid_time_in_state_map id 31 [ 12.483888] [ T505] LibBpfLoader: bpf_create_map name uid_concurrent_times_map, ret: 9 [ 12.483911] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_uid_concurrent_times_map id 32 [ 12.483955] [ T505] LibBpfLoader: bpf_create_map name uid_last_update_map, ret: 10 [ 12.483969] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_uid_last_update_map id 33 [ 12.483984] [ T505] LibBpfLoader: bpf_create_map name cpu_last_update_map, ret: 11 [ 12.483998] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_cpu_last_update_map id 34 [ 12.484012] [ T505] LibBpfLoader: bpf_create_map name cpu_last_pid_map, ret: 12 [ 12.484024] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_cpu_last_pid_map id 35 [ 12.484036] [ T505] LibBpfLoader: bpf_create_map name cpu_policy_map, ret: 13 [ 12.484048] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_cpu_policy_map id 36 [ 12.484061] [ T505] LibBpfLoader: bpf_create_map name policy_freq_idx_map, ret: 14 [ 12.484073] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_policy_freq_idx_map id 37 [ 12.484152] [ T505] LibBpfLoader: bpf_create_map name freq_to_idx_map, ret: 15 [ 12.484171] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_freq_to_idx_map id 38 [ 12.484188] [ T505] LibBpfLoader: bpf_create_map name nr_active_map, ret: 16 [ 12.484206] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_nr_active_map id 39 [ 12.484219] [ T505] LibBpfLoader: bpf_create_map name policy_nr_active_map, ret: 17 [ 12.484236] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_policy_nr_active_map id 40 [ 12.484253] [ T505] LibBpfLoader: bpf_create_map name pid_tracked_hash_map, ret: 18 [ 12.484270] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_pid_tracked_hash_map id 41 [ 12.484285] [ T505] LibBpfLoader: bpf_create_map name pid_tracked_map, ret: 19 [ 12.484304] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_pid_tracked_map id 42 [ 12.484356] [ T505] LibBpfLoader: bpf_create_map name pid_task_aggregation_map, ret: 20 [ 12.484375] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_pid_task_aggregation_map id 43 [ 12.485142] [ T505] LibBpfLoader: bpf_create_map name pid_time_in_state_map, ret: 21 [ 12.485169] [ T505] LibBpfLoader: map /sys/fs/bpf/map_timeInState_pid_time_in_state_map id 44 [ 12.485192] [ T505] LibBpfLoader: map_fd found at 0 is 6 in /system/etc/bpf/timeInState.o [ 12.485194] [ T505] LibBpfLoader: map_fd found at 1 is 8 in /system/etc/bpf/timeInState.o [ 12.485196] [ T505] LibBpfLoader: map_fd found at 2 is 9 in /system/etc/bpf/timeInState.o [ 12.485198] [ T505] LibBpfLoader: map_fd found at 3 is 10 in /system/etc/bpf/timeInState.o [ 12.485200] [ T505] LibBpfLoader: map_fd found at 4 is 11 in /system/etc/bpf/timeInState.o [ 12.485201] [ T505] LibBpfLoader: map_fd found at 5 is 12 in /system/etc/bpf/timeInState.o [ 12.485203] [ T505] LibBpfLoader: map_fd found at 6 is 13 in /system/etc/bpf/timeInState.o [ 12.485205] [ T505] LibBpfLoader: map_fd found at 7 is 14 in /system/etc/bpf/timeInState.o [ 12.485207] [ T505] LibBpfLoader: map_fd found at 8 is 15 in /system/etc/bpf/timeInState.o [ 12.485209] [ T505] LibBpfLoader: map_fd found at 9 is 16 in /system/etc/bpf/timeInState.o [ 12.485211] [ T505] LibBpfLoader: map_fd found at 10 is 17 in /system/etc/bpf/timeInState.o [ 12.485213] [ T505] LibBpfLoader: map_fd found at 11 is 18 in /system/etc/bpf/timeInState.o [ 12.485215] [ T505] LibBpfLoader: map_fd found at 12 is 19 in /system/etc/bpf/timeInState.o [ 12.485217] [ T505] LibBpfLoader: map_fd found at 13 is 20 in /system/etc/bpf/timeInState.o [ 12.485218] [ T505] LibBpfLoader: map_fd found at 14 is 21 in /system/etc/bpf/timeInState.o [ 12.485323] [ T295] type=1400 audit(1758284070.348:794): avc: denied { read } for comm="pq_init" name="u:object_r:system_prop:s0" dev="tmpfs" ino=299 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=1 [ 12.485401] [ T295] type=1400 audit(1758284070.348:795): avc: denied { open } for comm="pq_init" path="/dev/__properties__/u:object_r:system_prop:s0" dev="tmpfs" ino=299 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=1 [ 12.485462] [ T295] type=1400 audit(1758284070.348:796): avc: denied { getattr } for comm="pq_init" path="/dev/__properties__/u:object_r:system_prop:s0" dev="tmpfs" ino=299 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=1 [ 12.485523] [ T295] type=1400 audit(1758284070.348:797): avc: denied { map } for comm="pq_init" path="/dev/__properties__/u:object_r:system_prop:s0" dev="tmpfs" ino=299 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=1 [ 12.485610] [ T295] type=1107 audit(1758284070.348:798): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=sys.gmali.version pid=504 uid=1000 gid=1000 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_prop:s0 tclass=property_service permissive=1' [ 12.486181] [ T505] LibBpfLoader: cs[0].name:tracepoint_sched_sched_switch min_kver:0 .max_kver:ffffffff (kvers:6010039) [ 12.486185] [ T505] LibBpfLoader: cs[0].name:tracepoint_sched_sched_switch requires bpfloader version [0x0001c,0x10000) [ 12.488512] [ T505] LibBpfLoader: bpf_prog_load lib call for /system/etc/bpf/timeInState.o (tracepoint_sched_sched_switch) returned fd: 7 (no error) [ 12.488623] [ T505] LibBpfLoader: prog /sys/fs/bpf/prog_timeInState_tracepoint_sched_sched_switch id 28 [ 12.488637] [ T505] LibBpfLoader: cs[1].name:tracepoint_power_cpu_frequency min_kver:0 .max_kver:ffffffff (kvers:6010039) [ 12.488641] [ T505] LibBpfLoader: cs[1].name:tracepoint_power_cpu_frequency requires bpfloader version [0x0001c,0x10000) [ 12.489126] [ T505] LibBpfLoader: bpf_prog_load lib call for /system/etc/bpf/timeInState.o (tracepoint_power_cpu_frequency) returned fd: 22 (no error) [ 12.489197] [ T505] LibBpfLoader: prog /sys/fs/bpf/prog_timeInState_tracepoint_power_cpu_frequency id 29 [ 12.489204] [ T505] LibBpfLoader: cs[2].name:tracepoint_sched_sched_process_free min_kver:0 .max_kver:ffffffff (kvers:6010039) [ 12.489207] [ T505] LibBpfLoader: cs[2].name:tracepoint_sched_sched_process_free requires bpfloader version [0x0001c,0x10000) [ 12.489786] [ T505] LibBpfLoader: bpf_prog_load lib call for /system/etc/bpf/timeInState.o (tracepoint_sched_sched_process_free) returned fd: 23 (no error) [ 12.489856] [ T505] LibBpfLoader: prog /sys/fs/bpf/prog_timeInState_tracepoint_sched_sched_process_free id 30 [ 12.489912] [ T505] bpfloader: Loaded object: /system/etc/bpf/timeInState.o [ 12.493065] [ T505] LibBpfLoader: Loading optional ELF object /system/etc/bpf/gpuMem.o with license Apache 2.0 [ 12.493080] [ T505] LibBpfLoader: Section bpfloader_min_ver value is 28 [0x1c] [ 12.493097] [ T505] LibBpfLoader: Section bpfloader_max_ver value is 65536 [0x10000] [ 12.493110] [ T505] LibBpfLoader: Couldn't find section bpfloader_min_required_ver (defaulting to 0 [0x0]). [ 12.493123] [ T505] LibBpfLoader: Section size_of_bpf_map_def value is 120 [0x78] [ 12.493137] [ T505] LibBpfLoader: Section size_of_bpf_prog_def value is 92 [0x5c] [ 12.493142] [ T505] LibBpfLoader: BpfLoader version 0x00026 processing ELF object /system/etc/bpf/gpuMem.o with ver [0x0001c,0x10000) [ 12.493256] [ T505] LibBpfLoader: Loaded code section 3 (tracepoint_gpu_mem_gpu_mem_total) [ 12.493309] [ T505] LibBpfLoader: Loaded relo section 3 (.reltracepoint/gpu_mem/gpu_mem_total) [ 12.493312] [ T505] LibBpfLoader: Adding section 3 to cs list [ 12.493467] [ T505] LibBpfLoader: Couldn't find section btf_min_bpfloader_ver (defaulting to 0 [0x0]). [ 12.493478] [ T505] LibBpfLoader: Couldn't find section btf_min_kernel_ver (defaulting to 0 [0x0]). [ 12.506660] [ T505] LibBpfLoader: bpf_create_map name gpu_mem_total_map, ret: 6 [ 12.506694] [ T505] LibBpfLoader: map /sys/fs/bpf/map_gpuMem_gpu_mem_total_map id 45 [ 12.506708] [ T505] LibBpfLoader: map_fd found at 0 is 6 in /system/etc/bpf/gpuMem.o [ 12.506817] [ T505] LibBpfLoader: cs[0].name:tracepoint_gpu_mem_gpu_mem_total min_kver:0 .max_kver:ffffffff (kvers:6010039) [ 12.506821] [ T505] LibBpfLoader: cs[0].name:tracepoint_gpu_mem_gpu_mem_total requires bpfloader version [0x0001c,0x10000) [ 12.507372] [ T505] LibBpfLoader: bpf_prog_load lib call for /system/etc/bpf/gpuMem.o (tracepoint_gpu_mem_gpu_mem_total) returned fd: 7 (no error) [ 12.507475] [ T505] LibBpfLoader: prog /sys/fs/bpf/prog_gpuMem_tracepoint_gpu_mem_gpu_mem_total id 31 [ 12.507504] [ T505] bpfloader: Loaded object: /system/etc/bpf/gpuMem.o [ 12.510270] [ T505] LibBpfLoader: Loading optional ELF object /system/etc/bpf/gpuWork.o with license Apache 2.0 [ 12.510286] [ T505] LibBpfLoader: Section bpfloader_min_ver value is 28 [0x1c] [ 12.510302] [ T505] LibBpfLoader: Section bpfloader_max_ver value is 65536 [0x10000] [ 12.510315] [ T505] LibBpfLoader: Couldn't find section bpfloader_min_required_ver (defaulting to 0 [0x0]). [ 12.510329] [ T505] LibBpfLoader: Section size_of_bpf_map_def value is 120 [0x78] [ 12.510344] [ T505] LibBpfLoader: Section size_of_bpf_prog_def value is 92 [0x5c] [ 12.510349] [ T505] LibBpfLoader: BpfLoader version 0x00026 processing ELF object /system/etc/bpf/gpuWork.o with ver [0x0001c,0x10000) [ 12.510480] [ T505] LibBpfLoader: Loaded code section 3 (tracepoint_power_gpu_work_period) [ 12.510538] [ T505] LibBpfLoader: Loaded relo section 3 (.reltracepoint/power/gpu_work_period) [ 12.510540] [ T505] LibBpfLoader: Adding section 3 to cs list [ 12.510725] [ T505] LibBpfLoader: Couldn't find section btf_min_bpfloader_ver (defaulting to 0 [0x0]). [ 12.510741] [ T505] LibBpfLoader: Couldn't find section btf_min_kernel_ver (defaulting to 0 [0x0]). [ 12.510819] [ T505] LibBpfLoader: bpf_create_map name gpu_work_map, ret: 6 [ 12.510846] [ T505] LibBpfLoader: map /sys/fs/bpf/map_gpuWork_gpu_work_map id 46 [ 12.510863] [ T505] LibBpfLoader: bpf_create_map name gpu_work_global_data, ret: 7 [ 12.510881] [ T505] LibBpfLoader: map /sys/fs/bpf/map_gpuWork_gpu_work_global_data id 47 [ 12.510887] [ T505] LibBpfLoader: map_fd found at 0 is 6 in /system/etc/bpf/gpuWork.o [ 12.510889] [ T505] LibBpfLoader: map_fd found at 1 is 7 in /system/etc/bpf/gpuWork.o [ 12.511000] [ T505] LibBpfLoader: cs[0].name:tracepoint_power_gpu_work_period min_kver:0 .max_kver:ffffffff (kvers:6010039) [ 12.511003] [ T505] LibBpfLoader: cs[0].name:tracepoint_power_gpu_work_period requires bpfloader version [0x0001c,0x10000) [ 12.511595] [ T505] LibBpfLoader: bpf_prog_load lib call for /system/etc/bpf/gpuWork.o (tracepoint_power_gpu_work_period) returned fd: 8 (no error) [ 12.511664] [ T505] LibBpfLoader: prog /sys/fs/bpf/prog_gpuWork_tracepoint_power_gpu_work_period id 32 [ 12.511683] [ T505] bpfloader: Loaded object: /system/etc/bpf/gpuWork.o [ 12.516762] [ T505] LibBpfLoader: Loading critical for BPF Ringbuf test ELF object /system/etc/bpf/bpfRingbufProg.o with license Apache 2.0 [ 12.516779] [ T505] LibBpfLoader: Section bpfloader_min_ver value is 28 [0x1c] [ 12.516796] [ T505] LibBpfLoader: Section bpfloader_max_ver value is 65536 [0x10000] [ 12.516809] [ T505] LibBpfLoader: Couldn't find section bpfloader_min_required_ver (defaulting to 0 [0x0]). [ 12.516822] [ T505] LibBpfLoader: Section size_of_bpf_map_def value is 120 [0x78] [ 12.516837] [ T505] LibBpfLoader: Section size_of_bpf_prog_def value is 92 [0x5c] [ 12.516842] [ T505] LibBpfLoader: BpfLoader version 0x00026 processing ELF object /system/etc/bpf/bpfRingbufProg.o with ver [0x0001c,0x10000) [ 12.516958] [ T505] LibBpfLoader: Loaded code section 3 (skfilter_ringbuf_test) [ 12.517011] [ T505] LibBpfLoader: Loaded relo section 3 (.relskfilter/ringbuf_test) [ 12.517013] [ T505] LibBpfLoader: Adding section 3 to cs list [ 12.517161] [ T505] LibBpfLoader: Couldn't find section btf_min_bpfloader_ver (defaulting to 0 [0x0]). [ 12.517172] [ T505] LibBpfLoader: Couldn't find section btf_min_kernel_ver (defaulting to 0 [0x0]). [ 12.517211] [ T505] LibBpfLoader: bpf_create_map name test_ringbuf, ret: 6 [ 12.517232] [ T505] LibBpfLoader: map /sys/fs/bpf/map_bpfRingbufProg_test_ringbuf id 48 [ 12.517238] [ T505] LibBpfLoader: map_fd found at 0 is 6 in /system/etc/bpf/bpfRingbufProg.o [ 12.517305] [ T505] LibBpfLoader: cs[0].name:skfilter_ringbuf_test min_kver:5080000 .max_kver:ffffffff (kvers:6010039) [ 12.517307] [ T505] LibBpfLoader: cs[0].name:skfilter_ringbuf_test requires bpfloader version [0x0001c,0x10000) [ 12.517763] [ T505] LibBpfLoader: bpf_prog_load lib call for /system/etc/bpf/bpfRingbufProg.o (skfilter_ringbuf_test) returned fd: 7 (no error) [ 12.517832] [ T505] LibBpfLoader: prog /sys/fs/bpf/prog_bpfRingbufProg_skfilter_ringbuf_test id 33 [ 12.517849] [ T505] bpfloader: Loaded object: /system/etc/bpf/bpfRingbufProg.o [ 12.520274] [ T505] LibBpfLoader: Loading optional ELF object /system/etc/bpf/fuseMedia.o with license GPL [ 12.520289] [ T505] LibBpfLoader: Section bpfloader_min_ver value is 28 [0x1c] [ 12.520306] [ T505] LibBpfLoader: Section bpfloader_max_ver value is 65536 [0x10000] [ 12.520319] [ T505] LibBpfLoader: Couldn't find section bpfloader_min_required_ver (defaulting to 0 [0x0]). [ 12.520333] [ T505] LibBpfLoader: Section size_of_bpf_map_def value is 120 [0x78] [ 12.520357] [ T505] LibBpfLoader: Section size_of_bpf_prog_def value is 92 [0x5c] [ 12.520362] [ T505] LibBpfLoader: BpfLoader version 0x00026 processing ELF object /system/etc/bpf/fuseMedia.o with ver [0x0001c,0x10000) [ 12.520569] [ T505] LibBpfLoader: Loaded code section 3 (fuse_media) [ 12.520618] [ T505] LibBpfLoader: Adding section 3 to cs list [ 12.520776] [ T505] LibBpfLoader: No maps section could be found in elf object [ 12.520782] [ T505] LibBpfLoader: cs[0].name:fuse_media min_kver:0 .max_kver:ffffffff (kvers:6010039) [ 12.520784] [ T505] LibBpfLoader: cs[0].name:fuse_media requires bpfloader version [0x0001c,0x10000) [ 12.521460] [ T505] LibBpfLoader: bpf_prog_load lib call for /system/etc/bpf/fuseMedia.o (fuse_media) returned fd: 6 (no error) [ 12.521537] [ T505] LibBpfLoader: prog /sys/fs/bpf/prog_fuseMedia_fuse_media id 34 [ 12.521554] [ T505] bpfloader: Loaded object: /system/etc/bpf/fuseMedia.o [ 12.522821] [ T1] init: Service 'bpfloader' (pid 505) exited with status 0 waiting took 0.225000 seconds [ 12.522854] [ T1] init: Sending signal 9 to service 'bpfloader' (pid 505) process group... [ 12.522975] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 505 in 0ms [ 12.523738] [ T1] init: processing action (ro.crypto.state=unsupported && zygote-start) from (/system/etc/init/hw/init.rc:1081) [ 12.523777] [ T1] init: start_waiting_for_property("odsign.verification.done", "1"): already set [ 12.523858] [ T1] init: Command 'exec_start update_verifier_nonencrypted' action=ro.crypto.state=unsupported && zygote-start (/system/etc/init/hw/init.rc:1084) took 0ms and failed: Service not found [ 12.525119] [ T1] init: starting service 'statsd'... [ 12.525549] [ T1] init: Created socket '/dev/socket/statsdw', mode 222, user 1066, group 1066 [ 12.530664] [ T1] init: ... started service 'statsd' has pid 525 [ 12.530993] [ T1] init: starting service 'netd'... [ 12.531420] [ T1] init: Created socket '/dev/socket/dnsproxyd', mode 660, user 0, group 3003 [ 12.531945] [ T1] init: Created socket '/dev/socket/mdns', mode 660, user 0, group 1000 [ 12.532278] [ T1] init: Created socket '/dev/socket/fwmarkd', mode 660, user 0, group 3003 [ 12.535988] [ T1] init: ... started service 'netd' has pid 526 [ 12.536150] [ T1] init: starting service 'zygote'... [ 12.536314] [ T1] init: Created socket '/dev/socket/zygote', mode 660, user 0, group 1000 [ 12.536411] [ T1] init: Created socket '/dev/socket/usap_pool_primary', mode 660, user 0, group 1000 [ 12.539205] [ T527] libprocessgroup: SetCgroup::ExecuteForProcess: failed to open /dev/stune/top-app/cgroup.procs: No such file or directory [ 12.539222] [ T527] libprocessgroup: Failed to apply MaxPerformance process profile [ 12.539227] [ T527] init: failed to set task profiles [ 12.539366] [ T1] init: ... started service 'zygote' has pid 527 [ 12.539497] [ T1] init: starting service 'zygote_secondary'... [ 12.539632] [ T1] init: Created socket '/dev/socket/zygote_secondary', mode 660, user 0, group 1000 [ 12.539715] [ T1] init: Created socket '/dev/socket/usap_pool_secondary', mode 660, user 0, group 1000 [ 12.544113] [ T528] libprocessgroup: SetCgroup::ExecuteForProcess: failed to open /dev/stune/top-app/cgroup.procs: No such file or directory [ 12.544156] [ T528] libprocessgroup: Failed to apply MaxPerformance process profile [ 12.544178] [ T528] init: failed to set task profiles [ 12.544495] [ T1] init: ... started service 'zygote_secondary' has pid 528 [ 12.544590] [ T1] init: processing action (zygote-start) from (/vendor/etc/init/hw/init.connectivity.rc:2) [ 12.564610] [ T295] type=1400 audit(1758284070.428:799): avc: denied { setattr } for comm="init" name="nfc" dev="mmcblk0p16" ino=141 scontext=u:r:vendor_init:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1 [ 12.564639] [ T1] init: processing action (firmware_mounts_complete) from (/system/etc/init/hw/init.rc:528) [ 12.564678] [ T1] init: processing action (early-boot) from (/vendor/etc/init/hw/init.rk30board.usb.rc:1) [ 12.568850] [ T216] file system registered [ 12.574671] [ T216] using random self ethernet address [ 12.574682] [ T216] using random host ethernet address [ 12.576216] [ T216] using random self ethernet address [ 12.576237] [ T216] using random host ethernet address [ 12.586467] [ T1] init: processing action (early-boot) from (/system/etc/init/installd.rc:7) [ 12.591355] [ T1] init: processing action (boot) from (/system/etc/init/hw/init.rc:1104) [ 12.594348] [ T1] init: starting service 'hidl_memory'... [ 12.599073] [ T1] init: ... started service 'hidl_memory' has pid 532 [ 12.599435] [ T1] init: starting service 'vendor.audio-hal'... [ 12.605148] [ T533] libprocessgroup: SetCgroup::ExecuteForProcess: failed to open /dev/stune/foreground/cgroup.procs: No such file or directory [ 12.605193] [ T533] libprocessgroup: Failed to apply HighPerformance process profile [ 12.605211] [ T533] init: failed to set task profiles [ 12.605451] [ T1] init: ... started service 'vendor.audio-hal' has pid 533 [ 12.605724] [ T1] init: starting service 'vendor.bluetooth-1-0'... [ 12.611381] [ T534] libprocessgroup: SetCgroup::ExecuteForProcess: failed to open /dev/stune/foreground/cgroup.procs: No such file or directory [ 12.611425] [ T534] libprocessgroup: Failed to apply HighPerformance process profile [ 12.611448] [ T534] init: failed to set task profiles [ 12.611660] [ T1] init: ... started service 'vendor.bluetooth-1-0' has pid 534 [ 12.611968] [ T1] init: starting service 'vendor.camera.provider-ext'... [ 12.617471] [ T535] libprocessgroup: SetCgroup::ExecuteForProcess: failed to open /dev/stune/top-app/cgroup.procs: No such file or directory [ 12.617492] [ T535] libprocessgroup: Failed to apply MaxPerformance process profile [ 12.617498] [ T535] init: failed to set task profiles [ 12.617870] [ T1] init: ... started service 'vendor.camera.provider-ext' has pid 535 [ 12.617985] [ T1] init: starting service 'vendor.camera-provider-rk'... [ 12.620033] [ T536] libprocessgroup: SetCgroup::ExecuteForProcess: failed to open /dev/stune/camera-daemon/cgroup.procs: No such file or directory [ 12.620055] [ T536] libprocessgroup: Failed to apply CameraServicePerformance process profile [ 12.620060] [ T536] init: failed to set task profiles [ 12.620117] [ T1] init: ... started service 'vendor.camera-provider-rk' has pid 536 [ 12.620453] [ T1] init: starting service 'vendor.drm-clearkey-service'... [ 12.625356] [ T1] init: ... started service 'vendor.drm-clearkey-service' has pid 537 [ 12.625494] [ T1] init: starting service 'vendor.gatekeeper_default'... [ 12.627519] [ T1] init: ... started service 'vendor.gatekeeper_default' has pid 538 [ 12.627540] [ T1] init: service 'vendor.gralloc-v1' requested start, but it is already running (flags: 4) [ 12.627670] [ T1] init: starting service 'vendor.health-rockchip'... [ 12.629787] [ T1] init: ... started service 'vendor.health-rockchip' has pid 539 [ 12.629917] [ T1] init: starting service 'android-hardware-media-c2-hal-1-1'... [ 12.632242] [ T1] init: ... started service 'android-hardware-media-c2-hal-1-1' has pid 540 [ 12.632394] [ T1] init: starting service 'vendor.thermal-rockchip'... [ 12.635533] [ T1] init: ... started service 'vendor.thermal-rockchip' has pid 541 [ 12.635668] [ T1] init: starting service 'vendor.cec-default'... [ 12.637565] [ T1] init: ... started service 'vendor.cec-default' has pid 542 [ 12.637706] [ T1] init: starting service 'vendor.hdmi-default'... [ 12.639724] [ T1] init: ... started service 'vendor.hdmi-default' has pid 543 [ 12.639846] [ T1] init: starting service 'vendor.usb'... [ 12.641739] [ T1] init: ... started service 'vendor.usb' has pid 544 [ 12.641879] [ T1] init: starting service 'vendor.usb_gadget_default'... [ 12.643729] [ T1] init: ... started service 'vendor.usb_gadget_default' has pid 545 [ 12.643873] [ T1] init: starting service 'vendor.weaver_default'... [ 12.646320] [ T1] init: ... started service 'vendor.weaver_default' has pid 546 [ 12.646458] [ T1] init: starting service 'vendor.wifi_hal_legacy'... [ 12.648787] [ T1] init: ... started service 'vendor.wifi_hal_legacy' has pid 547 [ 12.648917] [ T1] init: starting service 'vendor.cas-default'... [ 12.650574] [ T1] init: ... started service 'vendor.cas-default' has pid 548 [ 12.650596] [ T1] init: service 'hwcomposer-3' requested start, but it is already running (flags: 4) [ 12.650605] [ T1] init: service 'pq-init' requested start, but it is already running (flags: 134) [ 12.650717] [ T1] init: starting service 'vendor.light-rockchip'... [ 12.652878] [ T1] init: ... started service 'vendor.light-rockchip' has pid 549 [ 12.653027] [ T1] init: starting service 'vendor.power-aidl-rockchip'... [ 12.654880] [ T1] init: ... started service 'vendor.power-aidl-rockchip' has pid 550 [ 12.655002] [ T1] init: starting service 'vendor.outputmanager-1-0'... [ 12.656780] [ T1] init: ... started service 'vendor.outputmanager-1-0' has pid 551 [ 12.656889] [ T1] init: starting service 'vendor.rockit-hal-1-0'... [ 12.658805] [ T1] init: ... started service 'vendor.rockit-hal-1-0' has pid 552 [ 12.665122] [ T295] type=1400 audit(1758284070.528:800): avc: denied { write } for comm="pq_init" name="rkalgo" dev="mmcblk0p16" ino=340 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1 [ 12.665218] [ T295] type=1400 audit(1758284070.528:801): avc: denied { add_name } for comm="pq_init" name="pq_io_0.1.0.3210_cl.bin" scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1 [ 12.665278] [ T295] type=1400 audit(1758284070.528:802): avc: denied { create } for comm="pq_init" name="pq_io_0.1.0.3210_cl.bin" scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=file permissive=1 [ 12.669008] [ T283] servicemanager: getDeviceHalManifest: Reloading VINTF information. [ 12.669073] [ T283] servicemanager: getDeviceHalManifest: Reading VINTF information. [ 12.670536] [ T283] servicemanager: getDeviceHalManifest: Successfully processed VINTF information [ 12.670558] [ T283] servicemanager: Found android.hardware.cas.IMediaCasService/default in device VINTF manifest. [ 12.676886] [ T283] servicemanager: Found android.hardware.thermal.IThermal/default in device VINTF manifest. [ 12.679857] [ T1] init: starting service 'vendor.sensors-default'... [ 12.681509] [ T1] init: ... started service 'vendor.sensors-default' has pid 557 [ 12.681533] [ T1] init: Command 'class_start hal' action=boot (/system/etc/init/hw/init.rc:1210) took 87ms and succeeded [ 12.681567] [ T1] init: service 'ueventd' requested start, but it is already running (flags: 2084) [ 12.681576] [ T1] init: service 'console' requested start, but it is already running (flags: 2196) [ 12.681618] [ T1] init: Could not start service 'displayd' as part of class 'core': Cannot find '/system/bin/displayd': No such file or directory [ 12.681633] [ T1] init: service 'apexd' requested start, but it is already running (flags: 134) [ 12.681740] [ T1] init: starting service 'audioserver'... [ 12.683683] [ T1] init: ... started service 'audioserver' has pid 558 [ 12.683686] [ T558] libprocessgroup: SetCgroup::ExecuteForProcess: failed to open /dev/stune/foreground/cgroup.procs: No such file or directory [ 12.683702] [ T558] libprocessgroup: Failed to apply HighPerformance process profile [ 12.683709] [ T558] init: failed to set task profiles [ 12.683716] [ T1] init: service 'bootanim' requested start, but it is already running (flags: 134) [ 12.683988] [ T1] init: starting service 'credstore'... [ 12.686197] [ T1] init: ... started service 'credstore' has pid 559 [ 12.686314] [ T1] init: starting service 'gpu'... [ 12.688362] [ T1] init: ... started service 'gpu' has pid 560 [ 12.688384] [ T1] init: service 'lmkd' requested start, but it is already running (flags: 36) [ 12.688399] [ T1] init: service 'servicemanager' requested start, but it is already running (flags: 2084) [ 12.688408] [ T1] init: service 'surfaceflinger' requested start, but it is already running (flags: 4) [ 12.688416] [ T1] init: service 'vold' requested start, but it is already running (flags: 2052) [ 12.688431] [ T1] init: service 'tee-supplicant' requested start, but it is already running (flags: 4) [ 12.688439] [ T1] init: service 'vndservicemanager' requested start, but it is already running (flags: 2052) [ 12.688467] [ T1] init: processing action (persist.sys.usb.config=* && boot) from (/system/etc/init/hw/init.usb.rc:108) [ 12.688555] [ T1] init: processing action (boot) from (/vendor/etc/init/hw/init.rk30board.rc:37) [ 12.693226] [ T295] type=1400 audit(1758284070.556:803): avc: denied { write open } for comm="pq_init" path="/data/rkalgo/pq_io_0.1.0.3210_cl.bin" dev="mmcblk0p16" ino=344 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=file permissive=1 [ 12.693448] [ T295] type=1400 audit(1758284070.556:804): avc: denied { getattr } for comm="pq_init" path="/data/rkalgo/pq_io_0.1.0.3210_cl.bin" dev="mmcblk0p16" ino=344 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=file permissive=1 [ 12.694680] [ T1] init: Command 'write /sys/module/pm_domains/parameters/keepon_startup 0' action=boot (/vendor/etc/init/hw/init.rk30board.rc:248) took 0ms and failed: Unable to write to file '/sys/module/pm_domains/parameters/keepon_startup': open() failed: Permission denied [ 12.694706] [ T1] init: processing action (boot) from (/vendor/etc/init/hw/init.rk30board.usb.rc:188) [ 12.695723] [ T1] init: processing action (boot) from (/vendor/etc/init/hw/init.rk3588.rc:46) [ 12.698775] [ T295] type=1400 audit(1758284070.560:805): avc: denied { write } for comm="init" name="/" dev="debugfs" ino=1 scontext=u:r:vendor_init:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=1 [ 12.698818] [ T295] type=1400 audit(1758284070.560:806): avc: denied { add_name } for comm="init" name="sched_features" scontext=u:r:vendor_init:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=1 [ 12.698838] [ T295] type=1400 audit(1758284070.560:807): avc: denied { create } for comm="init" name="sched_features" scontext=u:r:vendor_init:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1 [ 12.698838] [ T1] init: Command 'write /sys/kernel/debug/sched_features NO_ENERGY_AWARE' action=boot (/vendor/etc/init/hw/init.rk3588.rc:58) took 0ms and failed: Unable to write to file '/sys/kernel/debug/sched_features': open() failed: Permission denied [ 12.699089] [ T295] type=1400 audit(1758284070.560:808): avc: denied { write } for comm="init" name="sched_util_clamp_min_rt_default" dev="proc" ino=32993 scontext=u:r:vendor_init:s0 tcontext=u:object_r:proc_sched:s0 tclass=file permissive=1 [ 12.699360] [ T295] type=1400 audit(1758284070.560:809): avc: denied { write } for comm="init" name="dirty_background_ratio" dev="proc" ino=32995 scontext=u:r:vendor_init:s0 tcontext=u:object_r:proc_dirty:s0 tclass=file permissive=1 [ 12.699541] [ T1] init: processing action (boot) from (/system/etc/init/dumpstate.rc:1) [ 12.699633] [ T295] type=1400 audit(1758284070.560:810): avc: denied { setattr } for comm="init" name="ext_csd" dev="debugfs" ino=15596 scontext=u:r:init:s0 tcontext=u:object_r:debugfs_mmc:s0 tclass=file permissive=1 [ 12.699648] [ T1] init: processing action (boot) from (/system/etc/init/gsid.rc:25) [ 12.699811] [ T1] init: starting service 'exec 11 (/system/bin/gsid run-startup-tasks)'... [ 12.701235] [ T1] init: ... started service 'exec 11 (/system/bin/gsid run-startup-tasks)' has pid 573 [ 12.701282] [ T1] init: processing action (persist.device_config.profcollect_native_boot.enabled= && boot) from (/system/etc/init/profcollectd.rc:19) [ 12.701418] [ T1] init: starting service 'exec 12 (/system/bin/profcollectctl reset)'... [ 12.702784] [ T1] init: ... started service 'exec 12 (/system/bin/profcollectctl reset)' has pid 574 [ 12.702836] [ T1] init: processing action (enable_property_trigger) from (:0) [ 12.703059] [ T1] init: processing action (apexd.status=ready && ro.product.cpu.abilist32=*) from (/system/etc/init/hw/init.rc:488) [ 12.705248] [ T283] servicemanager: Found android.hardware.light.ILights/default in device VINTF manifest. [ 12.707163] [ T539] healthd: BatteryCycleCountPath not found [ 12.707194] [ T539] healthd: batteryStateOfHealthPath not found [ 12.707204] [ T539] healthd: batteryHealthStatusPath not found [ 12.707214] [ T539] healthd: batteryManufacturingDatePath not found [ 12.707224] [ T539] healthd: batteryFirstUsageDatePath not found [ 12.707233] [ T539] healthd: chargingStatePath not found [ 12.707243] [ T539] healthd: chargingPolicyPath not found [ 12.708646] [ T283] servicemanager: Found android.hardware.power.IPower/default in device VINTF manifest. [ 12.708962] [ T283] servicemanager: Found android.hardware.health.IHealth/default in device VINTF manifest. [ 12.709069] [ T283] BpBinder: onLastStrongRef automatically unlinking death recipients: [ 12.710642] [ T539] healthd: battery l=50 v=3300 t=2.6 h=2 st=3 c=-1600 fc=100 chg=au [ 12.713279] [ T295] type=1400 audit(1758284070.576:811): avc: denied { read write } for comm="binder:543_2" name="cec0" dev="tmpfs" ino=456 scontext=u:r:hal_tv_hdmi_connection_default:s0 tcontext=u:object_r:cec_device:s0 tclass=chr_file permissive=1 [ 12.713426] [ T295] type=1400 audit(1758284070.576:812): avc: denied { open } for comm="binder:543_2" path="/dev/cec0" dev="tmpfs" ino=456 scontext=u:r:hal_tv_hdmi_connection_default:s0 tcontext=u:object_r:cec_device:s0 tclass=chr_file permissive=1 [ 12.713748] [ T283] servicemanager: Found android.hardware.tv.hdmi.connection.IHdmiConnection/default in device VINTF manifest. [ 12.714599] [ T295] type=1400 audit(1758284070.576:813): avc: denied { ioctl } for comm="HdmiConnectionT" path="/dev/cec0" dev="tmpfs" ino=456 ioctlcmd=0x6107 scontext=u:r:hal_tv_hdmi_connection_default:s0 tcontext=u:object_r:cec_device:s0 tclass=chr_file permissive=1 [ 12.714718] [ T295] type=1400 audit(1758284070.576:814): avc: denied { read } for comm="HdmiConnectionT" name="status" dev="sysfs" ino=49113 scontext=u:r:hal_tv_hdmi_connection_default:s0 tcontext=u:object_r:sysfs_hdmi:s0 tclass=file permissive=1 [ 12.714760] [ T295] type=1400 audit(1758284070.576:815): avc: denied { open } for comm="HdmiConnectionT" path="/sys/devices/platform/display-subsystem/drm/card0/card0-HDMI-A-1/status" dev="sysfs" ino=49113 scontext=u:r:hal_tv_hdmi_connection_default:s0 tcontext=u:object_r:sysfs_hdmi:s0 tclass=file permissive=1 [ 12.719950] [ T1] init: starting service 'boringssl_self_test_apex32'... [ 12.722037] [ T1] init: ... started service 'boringssl_self_test_apex32' has pid 580 [ 12.722067] [ T1] init: SVC_EXEC service 'boringssl_self_test_apex32' pid 580 (uid 9999 gid 0+0 context default) started; waiting... [ 12.722687] [ T295] type=1400 audit(1758284070.584:816): avc: denied { read write } for comm="binder:542_2" name="cec0" dev="tmpfs" ino=456 scontext=u:r:hal_tv_hdmi_cec_default:s0 tcontext=u:object_r:cec_device:s0 tclass=chr_file permissive=1 [ 12.722877] [ T295] type=1400 audit(1758284070.584:817): avc: denied { open } for comm="binder:542_2" path="/dev/cec0" dev="tmpfs" ino=456 scontext=u:r:hal_tv_hdmi_cec_default:s0 tcontext=u:object_r:cec_device:s0 tclass=chr_file permissive=1 [ 12.723055] [ T295] type=1400 audit(1758284070.584:818): avc: denied { write } for comm="binder:542_2" name="property_service" dev="tmpfs" ino=366 scontext=u:r:hal_tv_hdmi_cec_default:s0 tcontext=u:object_r:property_socket:s0 tclass=sock_file permissive=1 [ 12.723130] [ T295] type=1400 audit(1758284070.584:819): avc: denied { connectto } for comm="binder:542_2" path="/dev/socket/property_service" scontext=u:r:hal_tv_hdmi_cec_default:s0 tcontext=u:r:init:s0 tclass=unix_stream_socket permissive=1 [ 12.723315] [ T295] type=1107 audit(1758284070.584:820): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.sys.hdmicec.version pid=542 uid=1000 gid=1000 scontext=u:r:hal_tv_hdmi_cec_default:s0 tcontext=u:object_r:vendor_cec_prop:s0 tclass=property_service permissive=1' [ 12.723997] [ T283] servicemanager: Found android.hardware.tv.hdmi.cec.IHdmiCec/default in device VINTF manifest. [ 12.733316] [ T1] init: Service 'exec 11 (/system/bin/gsid run-startup-tasks)' (pid 573) exited with status 0 oneshot service took 0.032000 seconds in background [ 12.733334] [ T1] init: Sending signal 9 to service 'exec 11 (/system/bin/gsid run-startup-tasks)' (pid 573) process group... [ 12.733418] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 573 in 0ms [ 12.736856] [ T283] servicemanager: Found android.hardware.usb.gadget.IUsbGadget/default in device VINTF manifest. [ 12.737210] [ T283] servicemanager: Found android.hardware.usb.IUsb/default in device VINTF manifest. [ 12.751909] [ T329] dwhdmi-rockchip fde80000.hdmi: use tmds mode [ 12.756052] [ T283] servicemanager: Found android.hardware.drm.IDrmFactory/clearkey in device VINTF manifest. [ 12.756292] [ T283] servicemanager: Found android.hardware.sensors.ISensors/default in device VINTF manifest. [ 12.781345] [ T283] servicemanager: Found android.hardware.gatekeeper.IGatekeeper/default in device VINTF manifest. [ 12.783789] [ T283] servicemanager: Found android.hardware.weaver.IWeaver/default in device VINTF manifest. [ 12.845636] [ T547] bcmdhd: loading out-of-tree module taints kernel. [ 12.854359] [ T547] [dhd] _dhd_module_init: in Dongle Host Driver, version 101.10.591.52.27 (20240409-1)(20240411-2)(d83d8d7) [ 12.854359] [ T547] /home/xiong/work/edge2-14/external/wifi_driver/bcmdhd compiled on Jul 8 2025 at 18:30:03 [ 12.854359] [ T547] [ 12.854372] [ T547] [dhd] ANDROID_VERSION = 14 [ 12.854376] [ T547] [dhd] STATIC-MSG) dhd_static_buf_init : 101.10.361.36 (wlan=r892223-20231107-1) [ 12.854477] [ T547] [dhd] STATIC-MSG) dhd_init_wlan_mem : prealloc ok for index 0: 8212480(8020K) [ 12.854481] [ T547] [WLAN_RFKILL]: rockchip_wifi_get_oob_irq: Enter [ 12.854502] [ T547] [dhd] dhd_wlan_init_gpio: WL_HOST_WAKE=-1, oob_irq=143, oob_irq_flags=0x4 [ 12.854505] [ T547] [dhd] dhd_wlan_init_gpio: WL_REG_ON=-1 [ 12.854508] [ T547] [dhd] dhd_wifi_platform_load: Enter [ 12.854512] [ T547] [dhd] wifi_platform_bus_enumerate device present 1 [ 12.854516] [ T547] [dhd] ======== Card detection to detect PCIE card! ======== [ 12.854661] [ T547] [dhd] dhdpcie_pci_probe : no mutex held [ 12.854665] [ T547] [dhd] dhdpcie_pci_probe : set mutex lock [ 12.854668] [ T547] [dhd] PCI_PROBE: bus 0x41, slot 0x0,vendor 0x14E4, device 0x449D(good PCI location) [ 12.854673] [ T547] [dhd] dhdpcie_init: found adapter info 'DHD generic adapter' [ 12.854677] [ T547] [dhd] STATIC-MSG) dhd_wlan_mem_prealloc : section 3, size 139264 [ 12.854686] [ T547] [dhd] succeed to alloc static buf [ 12.854689] [ T547] [dhd] STATIC-MSG) dhd_wlan_mem_prealloc : section 4, size 0 [ 12.854727] [ T547] pcieh 0004:41:00.0: enabling device (0000 -> 0002) [ 12.855125] [ T547] [dhd] Disable CTO [ 12.855985] [ T547] [dhd] DHD: dongle ram size is set to 1310720(orig 1310720) at 0x170000 [ 12.856001] [ T547] [dhd] STATIC-MSG) dhd_wlan_mem_prealloc : section 7, size 44352 [ 12.856011] [ T547] [dhd] dhd_conf_set_chiprev : devid=0x449d, chip=0xaae8, chiprev=2, svid=0x14e4, ssid=0xaae8 [ 12.857233] [ T547] [dhd] dhd_check_htput_chip: htput_support:1 [ 12.857243] [ T547] [dhd] STATIC-MSG) dhd_wlan_mem_prealloc : section 0, size 5152 [ 12.865802] [ T547] [dhd] dhd_ioctl_entry_local invalid parameter net 0000000000000000 dev_priv 00000000d89bf42b [ 12.865814] [ T547] [dhd] CFG80211-ERROR) wl_is_fils_supported : FILS NOT supported, err -22 [ 12.866851] [ T547] [dhd] STATIC-MSG) dhd_wlan_mem_prealloc : section 5, size 65536 [ 12.867321] [ T547] [dhd] CFG80211-ERROR) wl_is_fils_supported : FILS NOT supported, err -19 [ 12.867387] [ T547] [dhd] STATIC-MSG) dhd_wlan_mem_prealloc : section 19, size 65720 [ 12.867400] [ T547] [dhd] dhd_log_dump_init: kernel log buf size = 512KB; logdump_prsrv_tailsize = 80KB; limit prsrv tail size to = 76KB [ 12.867404] [ T547] [dhd] STATIC-MSG) dhd_wlan_mem_prealloc : section 15, size 4194304 [ 12.867594] [ T547] [dhd] STATIC-MSG) dhd_wlan_mem_prealloc : section 16, size 8192 [ 12.867635] [ T547] [dhd] mask: [ 12.867639] [ T547] [dhd] 0000: ff ff [ 12.867641] [ T547] [dhd] pattern: [ 12.867644] [ T547] [dhd] 0000: 88 8e [ 12.867648] [ T547] [dhd] mask: [ 12.867651] [ T547] [dhd] 0000: ff ff [ 12.867653] [ T547] [dhd] pattern: [ 12.867656] [ T547] [dhd] 0000: 08 06 [ 12.867661] [ T547] [dhd] mask: [ 12.867664] [ T547] [dhd] 0000: ff ff ff 00 00 00 00 00 00 00 00 ff [ 12.867666] [ T547] [dhd] pattern: [ 12.867669] [ T547] [dhd] 0000: 08 00 45 00 00 00 00 00 00 00 00 01 [ 12.867675] [ T547] [dhd] mask: [ 12.867678] [ T547] [dhd] 0000: ff ff f0 00 00 00 00 00 ff [ 12.867681] [ T547] [dhd] pattern: [ 12.867683] [ T547] [dhd] 0000: 86 dd 60 00 00 00 00 00 3a [ 12.867692] [ T547] [dhd] mask: [ 12.867695] [ T547] [dhd] 0000: ff ff ff 00 00 00 00 00 00 00 00 ff 00 00 00 00 [ 12.867698] [ T547] [dhd] 0010: 00 00 00 00 00 00 ff ff ff ff [ 12.867701] [ T547] [dhd] pattern: [ 12.867704] [ T547] [dhd] 0000: 08 00 45 00 00 00 00 00 00 00 00 11 00 00 00 00 [ 12.867707] [ T547] [dhd] 0010: 00 00 00 00 00 00 00 43 00 44 [ 12.867718] [ T547] [dhd] mask: [ 12.867721] [ T547] [dhd] 0000: ff ff ff 00 00 00 00 00 00 00 00 ff 00 00 00 00 [ 12.867725] [ T547] [dhd] 0010: 00 00 00 00 00 00 ff ff ff ff [ 12.867727] [ T547] [dhd] pattern: [ 12.867730] [ T547] [dhd] 0000: 08 00 45 00 00 00 00 00 00 00 00 11 00 00 00 00 [ 12.867733] [ T547] [dhd] 0010: 00 00 00 00 00 00 00 44 00 43 [ 12.867736] [ T547] [dhd] dhd_os_attach_pktlog(): dhd_os_attach_pktlog attach [ 12.868022] [ T547] [dhd] dhd_attach(): thread:dhd_watchdog_thread:258 started [ 12.868031] [ T547] [dhd] dhd_deferred_work_init: work queue initialized [ 12.868036] [ T547] [dhd] dhd_tcpack_suppress_set: TCP ACK Suppress mode 0 -> mode 3 [ 12.868039] [ T547] [dhd] dhd_tcpack_suppress_set: TCPACK_INFO_MAXNUM=40, TCPDATA_INFO_MAXNUM=40 [ 12.868054] [ T547] [dhd] dhd_cpumasks_init CPU masks primary(big)=0xf0 secondary(little)=0xe [ 12.868074] [ T22] [dhd] dhd_cpu_startup_callback(): LB data is not initialized yet. [ 12.868110] [ T23] [dhd] dhd_cpu_startup_callback(): LB data is not initialized yet. [ 12.868160] [ T29] [dhd] dhd_cpu_startup_callback(): LB data is not initialized yet. [ 12.868194] [ T35] [dhd] dhd_cpu_startup_callback(): LB data is not initialized yet. [ 12.868215] [ T41] [dhd] dhd_cpu_startup_callback(): LB data is not initialized yet. [ 12.868232] [ T48] [dhd] dhd_cpu_startup_callback(): LB data is not initialized yet. [ 12.868246] [ T54] [dhd] dhd_cpu_startup_callback(): LB data is not initialized yet. [ 12.868261] [ T60] [dhd] dhd_cpu_startup_callback(): LB data is not initialized yet. [ 12.868296] [ T547] [dhd] dhd_get_memdump_info: MEMDUMP ENABLED = 3 [ 12.868302] [ T547] [dhd] dhdpcie_bus_attach: making DHD_BUS_DOWN [ 12.868307] [ T547] [dhd] dhdpcie_init: rc_dev from dev->bus->self (1d87:3588) is 0000000000000000 [ 12.868434] [ T547] [dhd] dhdpcie_init: rc_ep_aspm_cap: 1 rc_ep_l1ss_cap: 1 [ 12.868444] [ T547] [dhd] dhdpcie_request_irq: INTx enabled, irq=104 [ 12.868464] [ T547] [dhd] dhd_bus_download_firmware: firmware path=fw_bcmdhd.bin, nvram path=nvram.txt [ 12.868477] [ T547] [dhd] dhd_conf_set_path_params : Final fw_path=/fw_bcm43752a2_pcie_ag.bin [ 12.868480] [ T547] [dhd] dhd_conf_set_path_params : Final nv_path=/nvram_ap6275p.txt [ 12.868483] [ T547] [dhd] dhd_conf_set_path_params : Final clm_path=/clm_bcm43752a2_pcie_ag.blob [ 12.868486] [ T547] [dhd] dhd_conf_set_path_params : Final conf_path=/config.txt [ 12.873461] [ T547] [dhd] dhd_os_get_img_fwreq: /config.txt (42 bytes) open success [ 12.873501] [ T547] [dhd] dhd_conf_read_others : wl_suspend = 3=0 [ 12.873505] [ T547] [dhd] dhd_conf_read_others : wl_resume = 2=0 [ 12.873509] [ T547] [dhd] dhd_conf_read_pm_params : insuspend = 0x7 [ 12.873514] [ T547] [dhd] d2h_intr_method -> PCIE_INTX(0); d2h_intr_control -> D2H_INTMASK(0) [ 12.873612] [ T547] [dhd] dhdpcie_download_code_file: dhd_tcm_test_enable 0, dhd_tcm_test_status 0, dhd_tcm_test_mode 2 [ 12.873617] [ T547] [dhd] dhdpcie_download_code_file: download firmware /fw_bcm43752a2_pcie_ag.bin [ 12.881046] [ T547] [dhd] dhd_os_get_img_fwreq: /fw_bcm43752a2_pcie_ag.bin (940225 bytes) open success [ 12.890547] [ T295] type=1107 audit(1758284070.752:821): uid=0 auid=4294967295 ses=4294967295 subj=u:r:init:s0 msg='avc: denied { set } for property=vendor.vehicle.camera.count pid=535 uid=1047 gid=1005 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=property_service permissive=1' [ 12.891256] [ T283] servicemanager: Found android.hardware.camera.provider.ICameraProvider/external/0 in device VINTF manifest. [ 12.894764] [ T295] type=1400 audit(1758284070.756:822): avc: denied { read } for comm="android.hardwar" name="u:object_r:system_prop:s0" dev="tmpfs" ino=299 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=1 [ 12.894864] [ T295] type=1400 audit(1758284070.756:823): avc: denied { open } for comm="android.hardwar" path="/dev/__properties__/u:object_r:system_prop:s0" dev="tmpfs" ino=299 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=1 [ 12.894926] [ T295] type=1400 audit(1758284070.756:824): avc: denied { getattr } for comm="android.hardwar" path="/dev/__properties__/u:object_r:system_prop:s0" dev="tmpfs" ino=299 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=1 [ 12.894988] [ T295] type=1400 audit(1758284070.756:825): avc: denied { map } for comm="android.hardwar" path="/dev/__properties__/u:object_r:system_prop:s0" dev="tmpfs" ino=299 scontext=u:r:hal_camera_default:s0 tcontext=u:object_r:system_prop:s0 tclass=file permissive=1 [ 12.898019] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 12.898040] [ T607] rkcif_scale_ch1: update sensor info failed -19 [ 12.898098] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 12.898108] [ T607] rkcif_tools_id2: update sensor info failed -19 [ 12.906504] [ T283] servicemanager: Found android.system.net.netd.INetd/default in framework VINTF manifest. [ 12.956116] [ T1] init: Service 'boringssl_self_test_apex32' (pid 580) exited with status 0 waiting took 0.235000 seconds [ 12.956144] [ T1] init: Sending signal 9 to service 'boringssl_self_test_apex32' (pid 580) process group... [ 12.956234] [ T1] libprocessgroup: Successfully killed process cgroup uid 9999 pid 580 in 0ms [ 12.967908] [ T1] init: Control message: Could not find 'android.hardware.audio@7.1::IDevicesFactory/default' for ctl.interface_start from pid: 284 (/system/bin/hwservicemanager) [ 12.967943] [ T1] init: processing action (apexd.status=ready && ro.product.cpu.abilist64=*) from (/system/etc/init/hw/init.rc:490) [ 12.968169] [ T1] init: starting service 'boringssl_self_test_apex64'... [ 12.970212] [ T1] init: ... started service 'boringssl_self_test_apex64' has pid 632 [ 12.970241] [ T1] init: SVC_EXEC service 'boringssl_self_test_apex64' pid 632 (uid 9999 gid 0+0 context default) started; waiting... [ 12.970317] [ T1] init: Control message: Could not find 'android.hardware.audio@7.1::IDevicesFactory/default' for ctl.interface_start from pid: 284 (/system/bin/hwservicemanager) [ 12.980609] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[3] get remote terminal sensor failed! [ 12.980632] [ T607] stream_cif_mipi_id3: update sensor info failed -19 [ 12.982354] [ T547] [dhd] dhd_os_get_img_fwreq: /nvram_ap6275p.txt (7458 bytes) open success [ 12.982389] [ T547] [dhd] # AP6275P_NVRAM_V1.3_20230109A [ 12.988378] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 12.988400] [ T607] rkcif_tools_id0: update sensor info failed -19 [ 12.988479] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 12.988492] [ T607] stream_cif_mipi_id2: update sensor info failed -19 [ 12.988545] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 12.988556] [ T607] stream_cif_mipi_id1: update sensor info failed -19 [ 12.988602] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 12.988613] [ T607] rkcif_scale_ch2: update sensor info failed -19 [ 12.992334] [ T607] rkisp0-vir0: rkisp_enum_frameintervals Not active sensor [ 12.992589] [ T607] rkisp0-vir0: rkisp_enum_frameintervals Not active sensor [ 12.992918] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[3] get remote terminal sensor failed! [ 12.992931] [ T607] rkcif_scale_ch3: update sensor info failed -19 [ 12.995794] [ T607] rkisp1-vir0: rkisp_enum_frameintervals Not active sensor [ 12.996016] [ T607] rkisp1-vir0: rkisp_enum_frameintervals Not active sensor [ 13.001353] [ T547] [dhd] dhdpcie_bus_write_vars: Download, Upload and compare of NVRAM succeeded. [ 13.001368] [ T547] [dhd] dhdpcie_bus_write_vars: New varsize is 6040, length token(nvram_csm)=0xfa1905e6 [ 13.001505] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 13.001519] [ T607] rkcif_tools_id1: update sensor info failed -19 [ 13.001596] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 13.001608] [ T607] rkcif_scale_ch0: update sensor info failed -19 [ 13.001842] [ T547] [dhd] Download and compare of TLV 0xfeedc0de succeeded (size 128, addr 2ae7dc). [ 13.001960] [ T547] [dhd] dhdpcie_bus_download_state: Took ARM out of Reset [ 13.003976] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 13.003996] [ T607] rkcif_tools_id0: update sensor info failed -19 [ 13.004052] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 13.004063] [ T607] rkcif_tools_id2: update sensor info failed -19 [ 13.004115] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 13.004125] [ T607] rkcif_scale_ch1: update sensor info failed -19 [ 13.004255] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[3] get remote terminal sensor failed! [ 13.004266] [ T607] rkcif_scale_ch3: update sensor info failed -19 [ 13.004321] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 13.004331] [ T607] stream_cif_mipi_id1: update sensor info failed -19 [ 13.004401] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 13.004412] [ T607] rkcif_scale_ch2: update sensor info failed -19 [ 13.004482] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 13.004493] [ T607] stream_cif_mipi_id1: update sensor info failed -19 [ 13.004545] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 13.004555] [ T607] rkcif_tools_id1: update sensor info failed -19 [ 13.004612] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 13.004623] [ T607] rkcif_tools_id1: update sensor info failed -19 [ 13.004674] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[3] get remote terminal sensor failed! [ 13.004685] [ T607] stream_cif_mipi_id3: update sensor info failed -19 [ 13.011674] [ T607] rkisp0-vir1: rkisp_enum_frameintervals Not active sensor [ 13.011920] [ T607] rkisp0-vir1: rkisp_enum_frameintervals Not active sensor [ 13.012290] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 13.012313] [ T607] rkcif_tools_id0: update sensor info failed -19 [ 13.012460] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 13.012488] [ T607] stream_cif_mipi_id0: update sensor info failed -19 [ 13.012553] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 13.012563] [ T607] rkcif_tools_id2: update sensor info failed -19 [ 13.012653] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 13.012663] [ T607] stream_cif_mipi_id2: update sensor info failed -19 [ 13.012716] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[3] get remote terminal sensor failed! [ 13.012726] [ T607] stream_cif_mipi_id3: update sensor info failed -19 [ 13.012776] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 13.012786] [ T607] rkcif_scale_ch1: update sensor info failed -19 [ 13.012850] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 13.012861] [ T607] rkcif_scale_ch0: update sensor info failed -19 [ 13.018739] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 13.018760] [ T607] rkcif_scale_ch0: update sensor info failed -19 [ 13.018876] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 13.018889] [ T607] rkcif_scale_ch2: update sensor info failed -19 [ 13.019028] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 13.019041] [ T607] stream_cif_mipi_id0: update sensor info failed -19 [ 13.019791] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 13.019800] [ T607] stream_cif_mipi_id0: update sensor info failed -19 [ 13.019844] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[3] get remote terminal sensor failed! [ 13.019847] [ T607] rkcif_scale_ch3: update sensor info failed -19 [ 13.020266] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 13.020270] [ T607] stream_cif_mipi_id2: update sensor info failed -19 [ 13.036203] [ T1] init: Control message: Could not find 'android.hardware.audio.effect@7.0::IEffectsFactory/default' for ctl.interface_start from pid: 284 (/system/bin/hwservicemanager) [ 13.036680] [ T1] init: Control message: Could not find 'android.hardware.audio.effect@7.0::IEffectsFactory/default' for ctl.interface_start from pid: 284 (/system/bin/hwservicemanager) [ 13.100478] [ T547] [dhd] dhdpcie_readshared: addr=0x20c0f4 nvram_csm=0xfa1905e6 [ 13.100492] [ T547] [dhd] ### Total time ARM OOR to Readshared pass took 98587 usec ### [ 13.100497] [ T547] [dhd] dhdpcie_readshared: PCIe shared addr (0x0020c0f4) read took 100000 usec before dongle is ready [ 13.100760] [ T547] [dhd] FW supports DAR ? N [ 13.100904] [ T547] [dhd] dhdpcie_readshared: max H2D queues 64 [ 13.100909] [ T547] [dhd] FW supports MD ring ? N [ 13.100935] [ T547] [dhd] dhd_bus_init: Enabling bus->intr_enabled [ 13.100940] [ T547] [dhd] dhdpcie_oob_intr_register OOB irq=143 flags=0x4 [ 13.100965] [ T547] [dhd] dhdpcie_oob_intr_register: enable_irq_wake [ 13.100999] [ T547] [dhd] STATIC-MSG) dhd_wlan_mem_prealloc : section 9, size 32896 [ 13.101006] [ T547] [dhd] dhd_prot_init:4146: h2d_max_txpost = 512 [ 13.101010] [ T547] [dhd] dhd_prot_init:4152: h2d_htput_max_txpost = 2048 [ 13.101131] [ T547] [dhd] dhd_prot_init: max_rxbufpost:511 rx_buf_burst:64 rx_bufpost_threshold:64 [ 13.101135] [ T547] [dhd] ENABLING DW:0 [ 13.101160] [ T547] [dhd] dhd_prot_d2h_sync_init(): D2H sync mechanism is XORCSUM [ 13.101174] [ T547] [dhd] dhd_bus_hostready : Read PCICMD Reg: 0x00100006 [ 13.101199] [ T547] [dhd] dhd_bus_hostready: Ring Hostready:1 [ 13.101203] [ T547] [dhd] Attach flowrings pool for 64 rings [ 13.101338] [ T547] [dhd] trying to send create d2h info ring: id 70 [ 13.101343] [ T547] [dhd] dhd_send_d2h_ringcreate ringid: 3 idx: 70 max_h2d: 67 [ 13.102090] [ T1] init: Service 'boringssl_self_test_apex64' (pid 632) exited with status 0 waiting took 0.132000 seconds [ 13.102104] [ T1] init: Sending signal 9 to service 'boringssl_self_test_apex64' (pid 632) process group... [ 13.102169] [ T1] libprocessgroup: Successfully killed process cgroup uid 9999 pid 632 in 0ms [ 13.102535] [ C0] [dhd] dhd_prot_process_d2h_ring_create_complete ring create Response status = 0 ring 3, id 0xfffc [ 13.102643] [ C0] [dhd] info buffer post after ring create [ 13.104553] [ T547] [dhd] wlc_ver_major 12, wlc_ver_minor 1 [ 13.104559] [ T547] [dhd] dhd_get_memdump_info: MEMDUMP ENABLED = 3 [ 13.105974] [ T547] [dhd] dhd_sync_with_dongle: GET_REVINFO device 0x449d, vendor 0x14e4, chipnum 0xaae8 [ 13.106550] [ T547] [dhd] dhd_sync_with_dongle: RxBuf Post : 2048 [ 13.106553] [ T547] [dhd] dhd_sync_with_dongle: RxBuf Post Alloc : 2048 [ 13.109350] [ T547] [dhd] dhd_preinit_ioctls: preinit_status IOVAR not supported, use legacy preinit [ 13.109358] [ T547] [dhd] dhd_tcpack_suppress_set 378: already set to 3 [ 13.110165] [ T547] [dhd] dhd_legacy_preinit_ioctls: hostwake_oob enabled [ 13.111547] [ T547] [dhd] dhd_legacy_preinit_ioctls: use firmware generated mac_address 70:f7:54:b8:ac:57 [ 13.121258] [ T547] [dhd] dhd_os_get_img_fwreq: /clm_bcm43752a2_pcie_ag.blob (32297 bytes) open success [ 13.121720] [ T1] init: processing action (bootreceiver.enable=1 && ro.product.cpu.abilist64=*) from (/system/etc/init/hw/init.rc:668) [ 13.122178] [ T283] servicemanager: Found android.hardware.camera.provider.ICameraProvider/internal/0 in device VINTF manifest. [ 13.123648] [ T547] [dhd] dhd_check_current_clm_data: ----- This FW is not included CLM data ----- [ 13.162014] [ T547] [dhd] dhd_apply_default_clm: CLM download succeeded [ 13.164675] [ T547] [dhd] dhd_check_current_clm_data: ----- This FW is included CLM data ----- [ 13.173206] [ T547] [dhd] Firmware up: op_mode=0x0005, MAC=70:f7:54:b8:ac:57 [ 13.185791] [ T547] [dhd] dhd_legacy_preinit_ioctls: event_log_max_sets: 26 ret: 0 [ 13.199668] [ T547] [dhd] arp_enable:1 arp_ol:0 [ 13.200505] [ T1] init: Command 'mkdir /sys/kernel/tracing/instances/bootreceiver 0700 system system' action=bootreceiver.enable=1 && ro.product.cpu.abilist64=* (/system/etc/init/hw/init.rc:672) took 78ms and succeeded [ 13.200703] [ T283] servicemanager: Found android.hardware.bluetooth.audio.IBluetoothAudioProviderFactory/default in device VINTF manifest. [ 13.201783] [ T1] init: processing action (net.tcp_def_init_rwnd=*) from (/system/etc/init/hw/init.rc:1242) [ 13.201879] [ T1] init: processing action (security.perf_harden=1) from (/system/etc/init/hw/init.rc:1267) [ 13.202080] [ T1] init: processing action (ro.debuggable=1) from (/system/etc/init/hw/init.rc:1304) [ 13.202154] [ T1] init: processing action (persist.sys.ext_ram=*) from (/vendor/etc/init/hw/init.rk30board.rc:257) [ 13.202690] [ T1] init: processing action (ro.boot.noril=true) from (/vendor/etc/init/hw/init.rk30board.rc:278) [ 13.202889] [ T1] init: Command 'stop ril-daemon' action=ro.boot.noril=true (/vendor/etc/init/hw/init.rk30board.rc:280) took 0ms and failed: service ril-daemon not found [ 13.202899] [ T1] init: processing action (ro.boot.serialno=*) from (/vendor/etc/init/hw/init.rk30board.rc:283) [ 13.209836] [ T1] init: starting service 'adbd'... [ 13.210044] [ T1] init: Created socket '/dev/socket/adbd', mode 660, user 1000, group 1000 [ 13.211803] [ T1] init: ... started service 'adbd' has pid 642 [ 13.211856] [ T1] init: processing action (init.svc.audioserver=running) from (/system/etc/init/audioserver.rc:35) [ 13.211870] [ T1] init: service 'vendor.audio-hal' requested start, but it is already running (flags: 4) [ 13.211891] [ T1] init: Command 'start vendor.audio-hal-aidl' action=init.svc.audioserver=running (/system/etc/init/audioserver.rc:37) took 0ms and failed: service vendor.audio-hal-aidl not found [ 13.211903] [ T1] init: Command 'start vendor.audio-effect-hal-aidl' action=init.svc.audioserver=running (/system/etc/init/audioserver.rc:38) took 0ms and failed: service vendor.audio-effect-hal-aidl not found [ 13.211915] [ T1] init: Command 'start vendor.audio-hal-4-0-msd' action=init.svc.audioserver=running (/system/etc/init/audioserver.rc:39) took 0ms and failed: service vendor.audio-hal-4-0-msd not found [ 13.211925] [ T1] init: Command 'start audio_proxy_service' action=init.svc.audioserver=running (/system/etc/init/audioserver.rc:40) took 0ms and failed: service audio_proxy_service not found [ 13.211934] [ T1] init: processing action (ro.persistent_properties.ready=true) from (/system/etc/init/bootstat.rc:57) [ 13.212018] [ T1] init: processing action (ro.persistent_properties.ready=true) from (/system/etc/init/bootstat.rc:61) [ 13.212158] [ T1] init: starting service 'exec 13 (/system/bin/bootstat --set_system_boot_reason)'... [ 13.213662] [ T1] init: ... started service 'exec 13 (/system/bin/bootstat --set_system_boot_reason)' has pid 643 [ 13.213710] [ T1] init: processing action (bootreceiver.enable=1 && ro.product.cpu.abilist64=*) from (/system/etc/init/dmesgd.rc:7) [ 13.213743] [ T547] [dhd] Driver: 101.10.591.52.27 (20240409-1)(20240411-2) [ 13.213743] [ T547] [dhd] Firmware: wl0: Sep 20 2023 17:20:09 version 18.35.387.23.206 (g711dd630) FWID 01-c17ee42e [ 13.213743] [ T547] [dhd] CLM: 9.9.20_SS (2022-11-21 17:26:58) [ 13.215223] [ T547] [dhd] dhd_pno_init: Support Android Location Service [ 13.216842] [ T547] [dhd] rtt_do_get_ioctl: failed to send getbuf proxd iovar (CMD ID : 1), status=-23 [ 13.216863] [ T547] [dhd] dhd_rtt_init : FTM is not supported [ 13.216872] [ T547] [dhd] dhd_rtt_init EXIT, err = 0 [ 13.218456] [ T1] init: Command 'rm /data/misc/dmesgd/sent_reports.txt' action=bootreceiver.enable=1 && ro.product.cpu.abilist64=* (/system/etc/init/dmesgd.rc:9) took 0ms and failed: unlink() failed: No such file or directory [ 13.218474] [ T1] init: processing action (drm.service.enabled=true) from (/system/etc/init/drmserver.rc:8) [ 13.218604] [ T1] init: starting service 'drm'... [ 13.221329] [ T1] init: ... started service 'drm' has pid 644 [ 13.221395] [ T1] init: processing action (persist.heapprofd.enable= && traced.lazy.heapprofd=) from (/system/etc/init/heapprofd.rc:49) [ 13.222798] [ T1] init: processing action (ro.debuggable=1) from (/system/etc/init/llkd-debuggable.rc:1) [ 13.223610] [ T1] init: Service 'exec 12 (/system/bin/profcollectctl reset)' (pid 574) exited with status 0 oneshot service took 0.521000 seconds in background [ 13.223652] [ T1] init: Sending signal 9 to service 'exec 12 (/system/bin/profcollectctl reset)' (pid 574) process group... [ 13.223811] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 574 in 0ms [ 13.224800] [ T1] init: processing action (ro.debuggable=*) from (/system/etc/init/llkd.rc:2) [ 13.225183] [ T1] init: processing action (debug.atrace.user_initiated= && persist.traced.enable=1) from (/system/etc/init/perfetto.rc:47) [ 13.225567] [ T1] init: starting service 'traced_probes'... [ 13.227481] [ T1] init: ... started service 'traced_probes' has pid 645 [ 13.227534] [ T1] init: processing action (persist.traced.enable=1) from (/system/etc/init/perfetto.rc:50) [ 13.252027] [ T1] init: starting service 'traced'... [ 13.252188] [ T1] init: Created socket '/dev/socket/traced_consumer', mode 666, user 0, group 0 [ 13.252263] [ T1] init: Created socket '/dev/socket/traced_producer', mode 666, user 0, group 0 [ 13.263911] [ T547] [dhd] dhd_legacy_preinit_ioctls: d3_hostwake_delay IOVAR not present, proceed [ 13.286677] [ T1] init: ... started service 'traced' has pid 646 [ 13.286736] [ T1] init: service 'traced_probes' requested start, but it is already running (flags: 132) [ 13.286748] [ T1] init: processing action (ro.persistent_properties.ready=true) from (/system/etc/init/perfetto.rc:116) [ 13.286766] [ T1] init: processing action (persist.traced_perf.enable= && sys.init.perf_lsm_hooks=1 && traced.lazy.traced_perf=) from (/system/etc/init/traced_perf.rc:43) [ 13.287076] [ T1] init: processing action (vendor.usb.controller=*) from (/vendor/etc/init/init.rockchip_udc_detector.rc:11) [ 13.287363] [ T1] init: processing action (nonencrypted) from (/system/etc/init/hw/init.rc:1214) [ 13.287434] [ T1] init: Could not start service 'bplus_helper' as part of class 'main': Cannot find '/system/bin/bplus_helper': No such file or directory [ 13.287562] [ T1] init: Could not start service 'up_eth0' as part of class 'main': File /system/bin/busybox(labeled "u:object_r:system_file:s0") has incorrect label or no domain transition from u:r:init:s0 to another SELinux domain defined. Have you configured your service correctly? https://source.android.com/security/selinux/device-policy#label_new_services_and_address_denials. Note: this error shows up even in permissive mode in order to make auditing denials possible. [ 13.287592] [ T1] init: Could not start service 'rk_store_keybox' as part of class 'main': Cannot find '/vendor/bin/rk_store_keybox': No such file or directory [ 13.287609] [ T1] init: service 'zygote_secondary' requested start, but it is already running (flags: 4) [ 13.287615] [ T1] init: service 'zygote' requested start, but it is already running (flags: 4) [ 13.287673] [ T1] init: starting service 'cameraserver'... [ 13.289303] [ T655] libprocessgroup: SetCgroup::ExecuteForProcess: failed to open /dev/stune/top-app/cgroup.procs: No such file or directory [ 13.289317] [ T655] libprocessgroup: Failed to apply MaxPerformance process profile [ 13.289323] [ T655] init: failed to set task profiles [ 13.289806] [ T1] init: ... started service 'cameraserver' has pid 655 [ 13.289826] [ T1] init: service 'drm' requested start, but it is already running (flags: 132) [ 13.289954] [ T1] init: starting service 'idmap2d'... [ 13.291608] [ T295] type=1400 audit(1758284071.152:826): avc: denied { write } for comm="pq_init" name="rkalgo" dev="mmcblk0p16" ino=340 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1 [ 13.291660] [ T295] type=1400 audit(1758284071.152:827): avc: denied { add_name } for comm="pq_init" name="pq_csc_0.1.0.3210_cl.bin" scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1 [ 13.291681] [ T295] type=1400 audit(1758284071.152:828): avc: denied { create } for comm="pq_init" name="pq_csc_0.1.0.3210_cl.bin" scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=file permissive=1 [ 13.291975] [ T1] init: ... started service 'idmap2d' has pid 657 [ 13.292086] [ T1] init: starting service 'incidentd'... [ 13.294116] [ T1] init: ... started service 'incidentd' has pid 658 [ 13.294226] [ T1] init: starting service 'installd'... [ 13.295366] [ C0] [dhd] dhd_update_interface_flow_info: ifindex:0 previous role:0 new role:0 [ 13.295394] [ C0] [dhd] dhd_rx_frame: net device is NOT registered. drop event packet [ 13.295913] [ T1] init: ... started service 'installd' has pid 659 [ 13.296020] [ T1] init: starting service 'mediaextractor'... [ 13.297816] [ T1] init: ... started service 'mediaextractor' has pid 660 [ 13.297934] [ T1] init: starting service 'mediametrics'... [ 13.299085] [ T547] [dhd] dhd_conf_set_country : set country CN, revision 0 [ 13.299494] [ T1] init: ... started service 'mediametrics' has pid 661 [ 13.299534] [ T661] libprocessgroup: SetCgroup::ExecuteForProcess: failed to open /dev/stune/foreground/cgroup.procs: No such file or directory [ 13.299564] [ T661] libprocessgroup: Failed to apply HighPerformance process profile [ 13.299582] [ T661] init: failed to set task profiles [ 13.300073] [ T1] init: starting service 'media'... [ 13.300141] [ T295] type=1400 audit(1758284071.160:829): avc: denied { write open } for comm="pq_init" path="/data/rkalgo/pq_csc_0.1.0.3210_cl.bin" dev="mmcblk0p16" ino=357 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=file permissive=1 [ 13.301095] [ T295] type=1400 audit(1758284071.164:830): avc: denied { getattr } for comm="pq_init" path="/data/rkalgo/pq_csc_0.1.0.3210_cl.bin" dev="mmcblk0p16" ino=357 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=file permissive=1 [ 13.301910] [ T662] libprocessgroup: SetCgroup::ExecuteForProcess: failed to open /dev/stune/foreground/cgroup.procs: No such file or directory [ 13.301953] [ T662] libprocessgroup: Failed to apply HighPerformance process profile [ 13.301972] [ T662] init: failed to set task profiles [ 13.301979] [ T1] init: ... started service 'media' has pid 662 [ 13.302002] [ T1] init: service 'netd' requested start, but it is already running (flags: 4) [ 13.302129] [ T1] init: starting service 'storaged'... [ 13.302253] [ T295] type=1400 audit(1758284071.164:831): avc: denied { read } for comm="init" name="ext_csd" dev="debugfs" ino=15596 scontext=u:r:init:s0 tcontext=u:object_r:debugfs_mmc:s0 tclass=file permissive=1 [ 13.302344] [ T295] type=1400 audit(1758284071.164:832): avc: denied { open } for comm="init" path="/sys/kernel/debug/mmc0/mmc0:0001/ext_csd" dev="debugfs" ino=15596 scontext=u:r:init:s0 tcontext=u:object_r:debugfs_mmc:s0 tclass=file permissive=1 [ 13.304165] [ T547] [dhd] dhd_conf_set_country : Country code: CN (CN/0) [ 13.306644] [ T1] init: ... started service 'storaged' has pid 663 [ 13.306788] [ T1] init: starting service 'wificond'... [ 13.308844] [ T1] init: ... started service 'wificond' has pid 664 [ 13.309004] [ T1] init: starting service 'akmd'... [ 13.310735] [ T1] init: ... started service 'akmd' has pid 665 [ 13.310872] [ T1] init: starting service 'vendor_flash_recovery'... [ 13.312695] [ T1] init: ... started service 'vendor_flash_recovery' has pid 666 [ 13.315095] [ T295] type=1400 audit(1758284071.176:833): avc: denied { write } for comm="pq_init" name="rkalgo" dev="mmcblk0p16" ino=340 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1 [ 13.315180] [ T295] type=1400 audit(1758284071.176:834): avc: denied { add_name } for comm="pq_init" name="pq_dci_0.1.0.3210_cl.bin" scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1 [ 13.315366] [ T547] [dhd] Dongle Host Driver, version 101.10.591.52.27 (20240409-1)(20240411-2)(d83d8d7) [ 13.315366] [ T547] /home/xiong/work/edge2-14/external/wifi_driver/bcmdhd compiled on Jul 8 2025 at 18:30:03 [ 13.315366] [ T547] [ 13.316286] [ T295] type=1400 audit(1758284071.176:835): avc: denied { read } for comm="storaged" path="/sys/kernel/debug/mmc0/mmc0:0001/ext_csd" dev="debugfs" ino=15596 scontext=u:r:storaged:s0 tcontext=u:object_r:debugfs_mmc:s0 tclass=file permissive=1 [ 13.320498] [ T547] [dhd] Register interface [wlan0] MAC: 70:f7:54:b8:ac:57 [ 13.320498] [ T547] [ 13.320540] [ T547] [dhd] dhd_tcpack_suppress_set: TCP ACK Suppress mode 3 -> mode 0 [ 13.320543] [ T547] [dhd] dhd_tcpack_suppress_set: TCPACK_INFO_MAXNUM=40, TCPDATA_INFO_MAXNUM=40 [ 13.320549] [ T547] [dhd] [wlan0] wl_android_wifi_off : g_wifi_on=1 force_off=1 [ 13.320559] [ T547] [dhd] dhd_bus_devreset: == Power OFF == [ 13.320563] [ T547] [dhd] dhdpcie_advertise_bus_cleanup: DB7 Not sent!!! [ 13.320578] [ T547] [dhd] dhd_bus_stop: making DHD_BUS_DOWN [ 13.320713] [ T547] [dhd] dhd_dpc_kill: tasklet disabled [ 13.321785] [ T547] [dhd] dhd_bus_devreset: making DHD_BUS_DOWN [ 13.321794] [ T547] [dhd] dhd_bus_devreset: WLAN OFF Done [ 13.321799] [ T547] [dhd] wifi_platform_set_power = 0, delay: 10 msec [ 13.321803] [ T547] [dhd] ======== PULL WL_REG_ON(-1) LOW! ======== [ 13.321806] [ T547] [WLAN_RFKILL]: rockchip_wifi_power: 0 [ 13.321810] [ T547] [WLAN_RFKILL]: rockchip_wifi_power: toggle = false [ 13.321814] [ T547] wifi power off [ 13.329100] [ T1] init: starting service 'media.swcodec'... [ 13.330528] [ T1] init: ... started service 'media.swcodec' has pid 667 [ 13.330552] [ T1] init: service 'statsd' requested start, but it is already running (flags: 4) [ 13.330604] [ T1] init: Service 'exec 13 (/system/bin/bootstat --set_system_boot_reason)' (pid 643) exited with status 0 oneshot service took 0.117000 seconds in background [ 13.330615] [ T1] init: Sending signal 9 to service 'exec 13 (/system/bin/bootstat --set_system_boot_reason)' (pid 643) process group... [ 13.330677] [ T1] libprocessgroup: Successfully killed process cgroup uid 1000 pid 643 in 0ms [ 13.330914] [ T1] init: starting service 'gatekeeperd'... [ 13.332583] [ T1] init: ... started service 'gatekeeperd' has pid 668 [ 13.332611] [ T1] init: service 'traced' requested start, but it is already running (flags: 132) [ 13.332619] [ T1] init: service 'traced_probes' requested start, but it is already running (flags: 132) [ 13.332754] [ T1] init: starting service 'usbd'... [ 13.334205] [ T1] init: ... started service 'usbd' has pid 669 [ 13.334269] [ T1] init: processing action (load_persist_props_action) from (/system/etc/init/flags_health_check.rc:1) [ 13.353550] [ T1] init: Service 'akmd' (pid 665) exited with status 254 oneshot service took 0.043000 seconds in background [ 13.353569] [ T1] init: Sending signal 9 to service 'akmd' (pid 665) process group... [ 13.353641] [ T1] libprocessgroup: Successfully killed process cgroup uid 1000 pid 665 in 0ms [ 13.361315] [ T1] init: starting service 'exec 14 (/system/bin/flags_health_check BOOT_FAILURE)'... [ 13.362709] [ T1] init: ... started service 'exec 14 (/system/bin/flags_health_check BOOT_FAILURE)' has pid 676 [ 13.362736] [ T1] init: SVC_EXEC service 'exec 14 (/system/bin/flags_health_check BOOT_FAILURE)' pid 676 (uid 1000 gid 1000+0 context default) started; waiting... [ 13.398996] [ T684] read descriptors [ 13.399036] [ T684] read strings [ 13.413793] [ T283] servicemanager: Found android.hardware.health.IHealth/default in device VINTF manifest. [ 13.415450] [ T283] servicemanager: Could not find android.hardware.net.nlinterceptor.IInterceptor/default in the VINTF manifest. [ 13.423320] [ T283] servicemanager: Found android.hardware.gatekeeper.IGatekeeper/default in device VINTF manifest. [ 13.428350] [ T547] [WLAN_RFKILL]: rockchip_wifi_power: toggle = false [ 13.428360] [ T547] [WLAN_RFKILL]: wifi shut off power [GPIO20-0] [ 13.437353] [ T295] type=1400 audit(1758284071.300:836): avc: denied { write } for comm="pq_init" name="rkalgo" dev="mmcblk0p16" ino=340 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1 [ 13.437404] [ T295] type=1400 audit(1758284071.300:837): avc: denied { add_name } for comm="pq_init" name="pq_acm_0.1.0.3210_cl.bin" scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1 [ 13.437425] [ T295] type=1400 audit(1758284071.300:838): avc: denied { create } for comm="pq_init" name="pq_acm_0.1.0.3210_cl.bin" scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=file permissive=1 [ 13.438810] [ T547] [dhd] wifi_platform_set_power = 0, sleep done: 10 msec [ 13.438829] [ T547] [dhd] [wlan0] wl_android_wifi_off : out [ 13.438840] [ T547] [dhd] wl_android_post_init: 0 [ 13.438850] [ T547] [dhd] dhdpcie_pci_probe : mutex is released. [ 13.439032] [ T547] [dhd] _dhd_module_init: Exit err=0 [ 13.456106] [ T295] type=1400 audit(1758284071.316:839): avc: denied { write open } for comm="pq_init" path="/data/rkalgo/pq_acm_0.1.0.3210_cl.bin" dev="mmcblk0p16" ino=363 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=file permissive=1 [ 13.456167] [ T295] type=1400 audit(1758284071.316:840): avc: denied { getattr } for comm="pq_init" path="/data/rkalgo/pq_acm_0.1.0.3210_cl.bin" dev="mmcblk0p16" ino=363 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=file permissive=1 [ 13.483652] [ T1] init: service 'adbd' requested start, but it is already running (flags: 132) [ 13.483671] [ T1] init: Control message: Processed ctl.start for 'adbd' from pid: 669 (/system/bin/usbd) [ 13.484145] [ T283] servicemanager: Found android.hardware.usb.gadget.IUsbGadget/default in device VINTF manifest. [ 13.484160] [ T1] init: starting service 'mdnsd'... [ 13.485289] [ T1] init: Created socket '/dev/socket/mdnsd', mode 660, user 1020, group 3003 [ 13.486494] [ T283] servicemanager: Found android.hardware.wifi.IWifi/default in device VINTF manifest. [ 13.496990] [ T1] init: ... started service 'mdnsd' has pid 698 [ 13.497024] [ T1] init: Control message: Processed ctl.start for 'mdnsd' from pid: 642 (/apex/com.android.adbd/bin/adbd --root_seclabel=u:r:su:s0) [ 13.497072] [ T1] init: Service 'usbd' (pid 669) exited with status 0 oneshot service took 0.163000 seconds in background [ 13.497079] [ T1] init: Sending signal 9 to service 'usbd' (pid 669) process group... [ 13.497148] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 669 in 0ms [ 13.497641] [ T1] init: Service 'exec 14 (/system/bin/flags_health_check BOOT_FAILURE)' (pid 676) exited with status 0 waiting took 0.135000 seconds [ 13.497672] [ T1] init: Sending signal 9 to service 'exec 14 (/system/bin/flags_health_check BOOT_FAILURE)' (pid 676) process group... [ 13.497794] [ T1] libprocessgroup: Successfully killed process cgroup uid 1000 pid 676 in 0ms [ 13.498141] [ T1] init: processing action (load_persist_props_action) from (/system/etc/init/logcatd.rc:29) [ 13.498707] [ T1] init: processing action (llk.enable=0) from (/system/etc/init/llkd.rc:12) [ 13.498914] [ T1] init: processing action (khungtask.enable=1) from (/system/etc/init/llkd.rc:18) [ 13.499123] [ T1] init: processing action (llk.enable=0) from (/system/etc/init/llkd.rc:12) [ 13.499379] [ T1] init: processing action (khungtask.enable=0) from (/system/etc/init/llkd.rc:21) [ 13.500330] [ T1] init: processing action (init.svc.media=*) from (/system/etc/init/mediaserver.rc:1) [ 13.501420] [ T1] init: processing action (wlan.driver.status=ok) from (/vendor/etc/init/hw/init.connectivity.rc:60) [ 13.502093] [ T1] init: processing action (wlan.driver.status=ok) from (/vendor/etc/init/hw/init.connectivity.rc:60) [ 13.502188] [ T283] servicemanager: Found android.frameworks.cameraservice.service.ICameraService/default in framework VINTF manifest. [ 13.502375] [ T283] servicemanager: Found android.frameworks.cameraservice.service.ICameraService/default in framework VINTF manifest. [ 13.502488] [ T1] init: processing action (khungtask.enable=true) from (/system/etc/init/llkd.rc:25) [ 13.510653] [ T1] init: processing action (khungtask.enable=false) from (/system/etc/init/llkd.rc:31) [ 13.513126] [ T539] healthd: battery l=50 v=3300 t=2.6 h=2 st=3 c=-1600 fc=100 chg=au [ 13.732730] [ T132] Freeing drm_logo memory: 2816K [ 13.767047] [ T295] type=1400 audit(1758284071.628:841): avc: denied { create } for comm="pq_init" name="pq_zme_0.1.0.3210_cl.bin" scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=file permissive=1 [ 13.806891] [ T295] type=1400 audit(1758284071.668:842): avc: denied { write open } for comm="pq_init" path="/data/rkalgo/pq_zme_0.1.0.3210_cl.bin" dev="mmcblk0p16" ino=366 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=file permissive=1 [ 13.807073] [ T295] type=1400 audit(1758284071.668:843): avc: denied { getattr } for comm="pq_init" path="/data/rkalgo/pq_zme_0.1.0.3210_cl.bin" dev="mmcblk0p16" ino=366 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=file permissive=1 [ 13.892499] [ T295] type=1400 audit(1758284071.756:844): avc: denied { write } for comm="pq_init" name="rkalgo" dev="mmcblk0p16" ino=340 scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1 [ 13.892549] [ T295] type=1400 audit(1758284071.756:845): avc: denied { add_name } for comm="pq_init" name="pq_shp_0.1.0.3210_cl.bin" scontext=u:r:pq_init:s0 tcontext=u:object_r:system_data_root_file:s0 tclass=dir permissive=1 [ 13.930470] [ T295] type=1400 audit(1758284071.792:846): avc: denied { search } for comm="pq_init" name="block" dev="tmpfs" ino=12 scontext=u:r:pq_init:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=1 [ 13.930525] [ T295] type=1400 audit(1758284071.792:847): avc: denied { read write } for comm="pq_init" name="mmcblk0p14" dev="tmpfs" ino=533 scontext=u:r:pq_init:s0 tcontext=u:object_r:baseparameter_block_device:s0 tclass=blk_file permissive=1 [ 13.930545] [ T295] type=1400 audit(1758284071.792:848): avc: denied { open } for comm="pq_init" path="/dev/block/mmcblk0p14" dev="tmpfs" ino=533 scontext=u:r:pq_init:s0 tcontext=u:object_r:baseparameter_block_device:s0 tclass=blk_file permissive=1 [ 14.000787] [ T721] dwc3 fc000000.usb: device reset [ 14.074789] [ T295] type=1400 audit(1758284071.936:849): avc: denied { read } for comm="pq_init" name="u:object_r:vendor_tv_input_prop:s0" dev="tmpfs" ino=340 scontext=u:r:pq_init:s0 tcontext=u:object_r:vendor_tv_input_prop:s0 tclass=file permissive=1 [ 14.074910] [ T295] type=1400 audit(1758284071.936:850): avc: denied { open } for comm="pq_init" path="/dev/__properties__/u:object_r:vendor_tv_input_prop:s0" dev="tmpfs" ino=340 scontext=u:r:pq_init:s0 tcontext=u:object_r:vendor_tv_input_prop:s0 tclass=file permissive=1 [ 14.074977] [ T295] type=1400 audit(1758284071.936:851): avc: denied { getattr } for comm="pq_init" path="/dev/__properties__/u:object_r:vendor_tv_input_prop:s0" dev="tmpfs" ino=340 scontext=u:r:pq_init:s0 tcontext=u:object_r:vendor_tv_input_prop:s0 tclass=file permissive=1 [ 14.075038] [ T295] type=1400 audit(1758284071.936:852): avc: denied { map } for comm="pq_init" path="/dev/__properties__/u:object_r:vendor_tv_input_prop:s0" dev="tmpfs" ino=340 scontext=u:r:pq_init:s0 tcontext=u:object_r:vendor_tv_input_prop:s0 tclass=file permissive=1 [ 14.114435] [ T21] android_work: sent uevent USB_STATE=CONNECTED [ 14.129198] [ T1] init: Service 'pq-init' (pid 504) exited with status 0 oneshot service took 1.835000 seconds in background [ 14.129251] [ T1] init: Sending signal 9 to service 'pq-init' (pid 504) process group... [ 14.129426] [ T1] libprocessgroup: Successfully killed process cgroup uid 1000 pid 504 in 0ms [ 14.130714] [ T21] android_work: sent uevent USB_STATE=CONFIGURED [ 14.387211] [ T1] init: Service 'vendor_flash_recovery' (pid 666) exited with status 0 oneshot service took 1.075000 seconds in background [ 14.387269] [ T1] init: Sending signal 9 to service 'vendor_flash_recovery' (pid 666) process group... [ 14.388529] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 666 in 1ms [ 14.487973] [ T539] healthd: battery l=50 v=3300 t=2.6 h=2 st=3 c=-1600 fc=100 chg=au [ 14.801749] [ T539] healthd: battery l=50 v=3300 t=2.6 h=2 st=3 c=-1600 fc=100 chg=au [ 15.634602] [ T283] servicemanager: Notifying apexservice they do (previously: don't) have clients when service is guaranteed to be in use [ 15.634797] [ T487] AidlLazyServiceRegistrar: Process has 1 (of 1 available) client(s) in use after notification apexservice has clients: 1 [ 15.634815] [ T487] AidlLazyServiceRegistrar: Shutdown prevented by forcePersist override flag. [ 15.634933] [ T487] apexd: getActivePackages received by ApexService [ 15.649736] [ T283] servicemanager: Could not find android.hardware.power.stats.IPowerStats/default in the VINTF manifest. [ 15.651405] [ T283] servicemanager: Found android.frameworks.stats.IStats/default in framework VINTF manifest. [ 15.651766] [ T283] servicemanager: Could not find android.hardware.memtrack.IMemtrack/default in the VINTF manifest. [ 15.709587] [ T295] type=1400 audit(1758284073.572:853): avc: denied { read } for comm="binder:325_2" name="wakeup4" dev="sysfs" ino=37988 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=dir permissive=1 [ 15.709636] [ T295] type=1400 audit(1758284073.572:854): avc: denied { open } for comm="binder:325_2" path="/sys/devices/platform/feaa0000.i2c/i2c-2/2-0051/rtc/rtc0/alarmtimer.4.auto/wakeup/wakeup4" dev="sysfs" ino=37988 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=dir permissive=1 [ 15.709707] [ T295] type=1400 audit(1758284073.572:855): avc: denied { read } for comm="binder:325_2" name="event_count" dev="sysfs" ino=37998 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=file permissive=1 [ 15.709727] [ T295] type=1400 audit(1758284073.572:856): avc: denied { open } for comm="binder:325_2" path="/sys/devices/platform/feaa0000.i2c/i2c-2/2-0051/rtc/rtc0/alarmtimer.4.auto/wakeup/wakeup4/event_count" dev="sysfs" ino=37998 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=file permissive=1 [ 15.709747] [ T295] type=1400 audit(1758284073.572:857): avc: denied { getattr } for comm="binder:325_2" path="/sys/devices/platform/feaa0000.i2c/i2c-2/2-0051/rtc/rtc0/alarmtimer.4.auto/wakeup/wakeup4/event_count" dev="sysfs" ino=37998 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=file permissive=1 [ 15.709765] [ T295] type=1400 audit(1758284073.572:858): avc: denied { read } for comm="binder:325_2" name="wakeup38" dev="sysfs" ino=58747 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1 [ 15.709783] [ T295] type=1400 audit(1758284073.572:859): avc: denied { open } for comm="binder:325_2" path="/sys/devices/platform/fe190000.pcie/pci0004:40/0004:40:00.0/0004:41:00.0/wakeup/wakeup38" dev="sysfs" ino=58747 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1 [ 15.709801] [ T295] type=1400 audit(1758284073.572:860): avc: denied { read } for comm="binder:325_2" name="event_count" dev="sysfs" ino=58754 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [ 15.709818] [ T295] type=1400 audit(1758284073.572:861): avc: denied { open } for comm="binder:325_2" path="/sys/devices/platform/fe190000.pcie/pci0004:40/0004:40:00.0/0004:41:00.0/wakeup/wakeup38/event_count" dev="sysfs" ino=58754 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [ 15.709836] [ T295] type=1400 audit(1758284073.572:862): avc: denied { getattr } for comm="binder:325_2" path="/sys/devices/platform/fe190000.pcie/pci0004:40/0004:40:00.0/0004:41:00.0/wakeup/wakeup38/event_count" dev="sysfs" ino=58754 scontext=u:r:system_suspend:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [ 15.742835] [ T283] servicemanager: Found android.hardware.power.IPower/default in device VINTF manifest. [ 15.745264] [ T283] servicemanager: Found android.hardware.light.ILights/default in device VINTF manifest. [ 15.810577] [ T487] apexd: getAllPackages received by ApexService [ 19.050951] [ T1] init: service 'idmap2d' requested start, but it is already running (flags: 4) [ 19.051010] [ T1] init: Control message: Processed ctl.start for 'idmap2d' from pid: 731 (system_server) [ 19.164113] [ T283] servicemanager: Found android.hardware.sensors.ISensors/default in device VINTF manifest. [ 19.168880] [ T283] servicemanager: Found android.hardware.health.IHealth/default in device VINTF manifest. [ 19.172486] [ T539] healthd: battery l=50 v=3300 t=2.6 h=2 st=3 c=-1600 fc=100 chg=au [ 19.461485] [ T283] servicemanager: Could not find android.hardware.vibrator.IVibratorManager/default in the VINTF manifest. [ 19.461747] [ T283] servicemanager: Could not find android.hardware.vibrator.IVibrator/default in the VINTF manifest. [ 19.536734] [ T295] type=1400 audit(1758284077.400:863): avc: denied { read } for comm="android.ui" name="name" dev="sysfs" ino=48897 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [ 19.536780] [ T295] type=1400 audit(1758284077.400:864): avc: denied { open } for comm="android.ui" path="/sys/devices/platform/fde80000.hdmi/extcon/extcon4/cable.0/name" dev="sysfs" ino=48897 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [ 19.536802] [ T295] type=1400 audit(1758284077.400:865): avc: denied { getattr } for comm="android.ui" path="/sys/devices/platform/fde80000.hdmi/extcon/extcon4/cable.0/name" dev="sysfs" ino=48897 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [ 19.541924] [ T283] servicemanager: Found android.frameworks.sensorservice.ISensorManager/default in framework VINTF manifest. [ 19.593213] [ T1] init: processing action (sys.sysctl.extra_free_kbytes=*) from (/system/etc/init/hw/init.rc:1233) [ 19.593536] [ T1] init: starting service 'exec 15 (/system/bin/extra_free_kbytes.sh 24300)'... [ 19.594961] [ T1] init: ... started service 'exec 15 (/system/bin/extra_free_kbytes.sh 24300)' has pid 864 [ 19.594985] [ T1] init: SVC_EXEC service 'exec 15 (/system/bin/extra_free_kbytes.sh 24300)' pid 864 (uid 0 gid 0+0 context default) started; waiting... [ 19.615108] [ T283] servicemanager: Since 'artd' could not be found, trying to start it as a lazy AIDL service. (if it's not configured to be a lazy service, it may be stuck starting or still starting). [ 19.642302] [ T1] init: starting service 'artd'... [ 19.644381] [ T1] init: ... started service 'artd' has pid 875 [ 19.644440] [ T1] init: Control message: Processed ctl.interface_start for 'aidl/artd' from pid: 283 (/system/bin/servicemanager) [ 19.688954] [ T283] BpBinder: onLastStrongRef automatically unlinking death recipients: [ 19.693575] [ T283] servicemanager: Notifying artd they do (previously: don't) have clients when service is guaranteed to be in use [ 19.800230] [ T1] init: Service 'exec 15 (/system/bin/extra_free_kbytes.sh 24300)' (pid 864) exited with status 0 waiting took 0.205000 seconds [ 19.800255] [ T1] init: Sending signal 9 to service 'exec 15 (/system/bin/extra_free_kbytes.sh 24300)' (pid 864) process group... [ 19.800324] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 864 in 0ms [ 22.521660] [ T283] servicemanager: Notifying apexservice they don't (previously: do) have clients when we now have no record of a client [ 22.521833] [ T487] AidlLazyServiceRegistrar: Process has 0 (of 1 available) client(s) in use after notification apexservice has clients: 0 [ 22.521853] [ T487] AidlLazyServiceRegistrar: Shutdown prevented by forcePersist override flag. [ 24.036927] [ T97] platform es8316-sound: deferred probe pending [ 29.144554] [ T1] init: Sending signal 9 to service 'idmap2d' (pid 657) process group... [ 29.149920] [ T1] libprocessgroup: Successfully killed process cgroup uid 1000 pid 657 in 5ms [ 29.150417] [ T1] init: Control message: Processed ctl.stop for 'idmap2d' from pid: 731 (system_server) [ 29.150626] [ T1] init: Service 'idmap2d' (pid 657) received signal 9 [ 29.203506] [ T283] servicemanager: Could not find android.hardware.oemlock.IOemLock/default in the VINTF manifest. [ 29.355811] [ T283] servicemanager: Found android.hardware.wifi.IWifi/default in device VINTF manifest. [ 29.357097] [ T283] servicemanager: Found android.hardware.wifi.supplicant.ISupplicant/default in device VINTF manifest. [ 29.357851] [ T283] servicemanager: Found android.hardware.wifi.supplicant.ISupplicant/default in device VINTF manifest. [ 29.474983] [ T283] servicemanager: Found android.frameworks.location.altitude.IAltitudeService/default in framework VINTF manifest. [ 29.497761] [ T283] servicemanager: Could not find android.hardware.soundtrigger3.ISoundTriggerHw/default in the VINTF manifest. [ 29.508096] [ T283] servicemanager: Found android.hardware.thermal.IThermal/default in device VINTF manifest. [ 29.508747] [ T283] servicemanager: Found android.hardware.usb.gadget.IUsbGadget/default in device VINTF manifest. [ 29.509059] [ T824] read descriptors [ 29.509067] [ T824] read strings [ 29.509100] [ T824] read descriptors [ 29.509104] [ T824] read strings [ 29.510832] [ T283] servicemanager: Found android.hardware.usb.IUsb/default in device VINTF manifest. [ 29.545563] [ T295] type=1400 audit(1758284087.408:866): avc: denied { ioctl } for comm="binder:542_2" path="/dev/cec0" dev="tmpfs" ino=456 ioctlcmd=0x6103 scontext=u:r:hal_tv_hdmi_cec_default:s0 tcontext=u:object_r:cec_device:s0 tclass=chr_file permissive=1 [ 29.580906] [ T283] servicemanager: Could not find android.hardware.authsecret.IAuthSecret/default in the VINTF manifest. [ 29.601555] [ T557] gsensor_kxtj3 3-000e: set sensor poll time to 200ms [ 29.602488] [ T557] gsensor_kxtj3 3-000e: sensor on: starting poll sensor data 196ms [ 29.647616] [ T283] servicemanager: Found android.hardware.wifi.IWifi/default in device VINTF manifest. [ 29.658729] [ T283] servicemanager: Found android.hardware.health.IHealth/default in device VINTF manifest. [ 29.686622] [ T295] type=1400 audit(1758284087.548:867): avc: denied { ioctl } for comm="HdmiConnectionT" path="/dev/cec0" dev="tmpfs" ino=456 ioctlcmd=0x6107 scontext=u:r:hal_tv_hdmi_connection_default:s0 tcontext=u:object_r:cec_device:s0 tclass=chr_file permissive=1 [ 29.774377] [ T283] servicemanager: Notifying apexservice they do (previously: don't) have clients when service is guaranteed to be in use [ 29.774476] [ T487] AidlLazyServiceRegistrar: Process has 1 (of 1 available) client(s) in use after notification apexservice has clients: 1 [ 29.774486] [ T487] AidlLazyServiceRegistrar: Shutdown prevented by forcePersist override flag. [ 29.774574] [ T487] apexd: getSessions() received by ApexService [ 29.843367] [ T283] servicemanager: Found android.hardware.thermal.IThermal/default in device VINTF manifest. [ 29.963355] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 29.980367] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 30.628892] [ T283] servicemanager: Could not find android.hardware.gnss.IGnss/default in the VINTF manifest. [ 30.647168] [ T283] servicemanager: Could not find android.hardware.input.processor.IInputProcessor/default in the VINTF manifest. [ 30.652722] [ T1] init: starting service 'idmap2d'... [ 30.661910] [ T1] init: ... started service 'idmap2d' has pid 1231 [ 30.662328] [ T1] init: Control message: Processed ctl.start for 'idmap2d' from pid: 731 (system_server) [ 30.687919] [ T295] type=1400 audit(1758284088.548:868): avc: denied { ioctl } for comm="binder:542_2" path="/dev/cec0" dev="tmpfs" ino=456 ioctlcmd=0x6103 scontext=u:r:hal_tv_hdmi_cec_default:s0 tcontext=u:object_r:cec_device:s0 tclass=chr_file permissive=1 [ 30.767705] [ T295] type=1400 audit(1758284088.628:869): avc: granted { read } for comm="rkstack.process" name="psched" dev="proc" ino=4026532025 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file [ 30.767824] [ T295] type=1400 audit(1758284088.628:870): avc: granted { read open } for comm="rkstack.process" path="/proc/1235/net/psched" dev="proc" ino=4026532025 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file [ 30.767891] [ T295] type=1400 audit(1758284088.628:871): avc: granted { getattr } for comm="rkstack.process" path="/proc/1235/net/psched" dev="proc" ino=4026532025 scontext=u:r:network_stack:s0 tcontext=u:object_r:proc_net:s0 tclass=file [ 30.913228] [ T283] servicemanager: Found android.hardware.weaver.IWeaver/default in device VINTF manifest. [ 30.925597] [ T283] servicemanager: Could not find android.hardware.secure_element.ISecureElement/eSE1 in the VINTF manifest. [ 30.926802] [ T283] servicemanager: Could not find android.hardware.secure_element.ISecureElement/SIM1 in the VINTF manifest. [ 31.209616] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 31.212108] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 31.429425] [ T283] servicemanager: VINTF HALs require names in the format type/instance (e.g. some.package.foo.IFoo/default) but got: suspend_control [ 31.429855] [ T283] servicemanager: Could not find android.hardware.bluetooth.IBluetoothHci/default in the VINTF manifest. [ 31.434182] [ T295] type=1400 audit(1758284089.296:872): avc: denied { search } for comm="bluetooth@1.0-s" name="bluetooth" dev="mmcblk0p16" ino=35 scontext=u:r:hal_bluetooth_default:s0 tcontext=u:object_r:bluetooth_data_file:s0 tclass=dir permissive=1 [ 31.442555] [ T534] [BT_RFKILL]: bt shut off power [ 31.442682] [ T534] [BT_RFKILL]: rfkill_rk_set_power: set bt wake_host high! [ 31.442804] [ T295] type=1400 audit(1758284089.304:873): avc: denied { read } for comm="bluetooth@1.0-s" name="u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_bluetooth_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 31.442897] [ T295] type=1400 audit(1758284089.304:874): avc: denied { open } for comm="bluetooth@1.0-s" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_bluetooth_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 31.442963] [ T295] type=1400 audit(1758284089.304:875): avc: denied { getattr } for comm="bluetooth@1.0-s" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_bluetooth_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 31.443026] [ T295] type=1400 audit(1758284089.304:876): avc: denied { map } for comm="bluetooth@1.0-s" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_bluetooth_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 31.496370] [ T534] [BT_RFKILL]: rfkill_rk_set_power: set bt wake_host input! [ 31.496392] [ T534] [BT_RFKILL]: ENABLE UART_RTS [ 31.604416] [ T534] [BT_RFKILL]: DISABLE UART_RTS [ 31.604476] [ T534] [BT_RFKILL]: bt turn on power [ 31.604526] [ T534] [BT_RFKILL]: Request irq for bt wakeup host [ 31.604718] [ T534] [BT_RFKILL]: ** disable irq [ 31.605044] [ T534] of_dma_request_slave_channel: dma-names property of node '/serial@febc0000' missing or empty [ 31.605071] [ T534] dw-apb-uart febc0000.serial: failed to request DMA, use interrupt mode [ 31.847330] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 31.848494] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 32.130892] [ T557] gsensor_kxtj3 3-000e: set sensor poll time to 66ms [ 32.401434] [ C0] ax88179_178a 2-1:1.0 eth0: ax88179 - Link status is: 1 [ 32.406814] [ T21] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 32.521635] [ T283] servicemanager: Notifying apexservice they don't (previously: do) have clients when we now have no record of a client [ 32.521763] [ T283] servicemanager: Notifying artd they don't (previously: do) have clients when we now have no record of a client [ 32.521794] [ T487] AidlLazyServiceRegistrar: Process has 0 (of 1 available) client(s) in use after notification apexservice has clients: 0 [ 32.521813] [ T487] AidlLazyServiceRegistrar: Shutdown prevented by forcePersist override flag. [ 32.522205] [ T283] servicemanager: Unregistering artd [ 32.522235] [ T283] BpBinder: onLastStrongRef automatically unlinking death recipients: [ 32.527749] [ T1] init: Service 'artd' (pid 875) exited with status 0 oneshot service took 12.884000 seconds in background [ 32.527783] [ T1] init: Sending signal 9 to service 'artd' (pid 875) process group... [ 32.527976] [ T1] libprocessgroup: Successfully killed process cgroup uid 1082 pid 875 in 0ms [ 32.580779] [ T283] servicemanager: Could not find android.hardware.radio.data.IRadioData/slot1 in the VINTF manifest. [ 32.581094] [ T283] servicemanager: Could not find android.hardware.radio.messaging.IRadioMessaging/slot1 in the VINTF manifest. [ 32.581312] [ T283] servicemanager: Could not find android.hardware.radio.modem.IRadioModem/slot1 in the VINTF manifest. [ 32.581487] [ T283] servicemanager: Could not find android.hardware.radio.network.IRadioNetwork/slot1 in the VINTF manifest. [ 32.581656] [ T283] servicemanager: Could not find android.hardware.radio.sim.IRadioSim/slot1 in the VINTF manifest. [ 32.581818] [ T283] servicemanager: Could not find android.hardware.radio.voice.IRadioVoice/slot1 in the VINTF manifest. [ 32.581963] [ T283] servicemanager: Could not find android.hardware.radio.ims.IRadioIms/slot1 in the VINTF manifest. [ 32.583547] [ T283] servicemanager: Could not find android.hardware.radio.data.IRadioData/slot1 in the VINTF manifest. [ 32.583701] [ T283] servicemanager: Could not find android.hardware.radio.messaging.IRadioMessaging/slot1 in the VINTF manifest. [ 32.583809] [ T283] servicemanager: Could not find android.hardware.radio.modem.IRadioModem/slot1 in the VINTF manifest. [ 32.583910] [ T283] servicemanager: Could not find android.hardware.radio.network.IRadioNetwork/slot1 in the VINTF manifest. [ 32.584018] [ T283] servicemanager: Could not find android.hardware.radio.sim.IRadioSim/slot1 in the VINTF manifest. [ 32.584122] [ T283] servicemanager: Could not find android.hardware.radio.voice.IRadioVoice/slot1 in the VINTF manifest. [ 32.584236] [ T283] servicemanager: Could not find android.hardware.radio.ims.IRadioIms/slot1 in the VINTF manifest. [ 32.585578] [ T283] servicemanager: Could not find android.hardware.radio.ims.IRadioIms/slot1 in the VINTF manifest. [ 32.721909] [ T295] type=1400 audit(1758284090.584:877): avc: denied { read } for comm="HwBinder:533_3" name="u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 32.723929] [ T295] type=1400 audit(1758284090.584:878): avc: denied { open } for comm="HwBinder:533_3" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 32.724010] [ T295] type=1400 audit(1758284090.584:879): avc: denied { getattr } for comm="HwBinder:533_3" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 32.724091] [ T295] type=1400 audit(1758284090.584:880): avc: denied { map } for comm="HwBinder:533_3" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:hal_audio_default:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 32.770372] [ T295] type=1400 audit(1758284090.632:881): avc: denied { read } for comm="system_server" name="state" dev="sysfs" ino=48894 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [ 32.770466] [ T295] type=1400 audit(1758284090.632:882): avc: denied { open } for comm="system_server" path="/sys/devices/platform/fde80000.hdmi/extcon/extcon4/state" dev="sysfs" ino=48894 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [ 32.770488] [ T295] type=1400 audit(1758284090.632:883): avc: denied { getattr } for comm="system_server" path="/sys/devices/platform/fde80000.hdmi/extcon/extcon4/state" dev="sysfs" ino=48894 scontext=u:r:system_server:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [ 32.784440] [ T295] type=1400 audit(1758284090.644:884): avc: denied { ioctl } for comm="binder:542_2" path="/dev/cec0" dev="tmpfs" ino=456 ioctlcmd=0x6101 scontext=u:r:hal_tv_hdmi_cec_default:s0 tcontext=u:object_r:cec_device:s0 tclass=chr_file permissive=1 [ 32.806217] [ T283] servicemanager: Could not find android.hardware.input.processor.IInputProcessor/default in the VINTF manifest. [ 32.916429] [ C0] TCP: request_sock_TCP: Possible SYN flooding on port 5555. Sending cookies. Check SNMP counters. [ 35.336631] [ T295] type=1400 audit(1758284093.200:885): avc: denied { ioctl } for comm="binder:542_3" path="/dev/cec0" dev="tmpfs" ino=456 ioctlcmd=0x6105 scontext=u:r:hal_tv_hdmi_cec_default:s0 tcontext=u:object_r:cec_device:s0 tclass=chr_file permissive=1 [ 35.375485] [ T534] [BT_RFKILL]: bt shut off power [ 35.865532] [ T295] type=1400 audit(1758284093.728:886): avc: denied { add_name } for comm="HeapTaskDaemon" name="oat_primary" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0 tclass=dir permissive=1 [ 35.865586] [ T295] type=1400 audit(1758284093.728:887): avc: denied { create } for comm="HeapTaskDaemon" name="oat_primary" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=dir permissive=1 [ 35.868080] [ T295] type=1400 audit(1758284093.728:888): avc: denied { add_name } for comm="HeapTaskDaemon" name="arm64" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=dir permissive=1 [ 35.872587] [ T295] type=1400 audit(1758284093.736:889): avc: denied { create } for comm="HeapTaskDaemon" name="SecureElement.1317.tmp" scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1 [ 35.876677] [ T295] type=1400 audit(1758284093.740:890): avc: denied { write open } for comm="HeapTaskDaemon" path="/data/user/0/com.android.se/cache/oat_primary/arm64/SecureElement.1317.tmp" dev="mmcblk0p16" ino=2011 scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1 [ 35.879896] [ T295] type=1400 audit(1758284093.740:891): avc: denied { remove_name } for comm="HeapTaskDaemon" name="SecureElement.1317.tmp" dev="mmcblk0p16" ino=2011 scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=dir permissive=1 [ 35.880102] [ T295] type=1400 audit(1758284093.740:892): avc: denied { rename } for comm="HeapTaskDaemon" name="SecureElement.1317.tmp" dev="mmcblk0p16" ino=2011 scontext=u:r:secure_element:s0:c44,c260,c512,c768 tcontext=u:object_r:system_data_file:s0:c44,c260,c512,c768 tclass=file permissive=1 [ 39.873837] [ T133] binder: undelivered transaction 56982, process died. [ 39.873917] [ T133] binder: undelivered transaction 56977, process died. [ 39.874631] [ T1] init: Service 'bootanim' (pid 333) exited with status 0 oneshot service took 32.051998 seconds in background [ 39.874668] [ T1] init: Sending signal 9 to service 'bootanim' (pid 333) process group... [ 39.874880] [ T1] libprocessgroup: Successfully killed process cgroup uid 1003 pid 333 in 0ms [ 39.929445] [ T283] servicemanager: Found android.hardware.wifi.IWifi/default in device VINTF manifest. [ 39.929713] [ T283] servicemanager: Found android.hardware.wifi.IWifi/default in device VINTF manifest. [ 39.929911] [ T283] servicemanager: Found android.hardware.wifi.IWifi/default in device VINTF manifest. [ 39.930001] [ T283] servicemanager: Found android.hardware.wifi.IWifi/default in device VINTF manifest. [ 39.943191] [ T283] servicemanager: Notifying apexservice they do (previously: don't) have clients when service is guaranteed to be in use [ 39.943415] [ T487] AidlLazyServiceRegistrar: Process has 1 (of 1 available) client(s) in use after notification apexservice has clients: 1 [ 39.943440] [ T487] AidlLazyServiceRegistrar: Shutdown prevented by forcePersist override flag. [ 39.943776] [ T487] apexd: markBootCompleted() received by ApexService [ 39.949885] [ T1] init: processing action (sys.boot_completed=1) from (/system/etc/init/hw/init.rc:1224) [ 39.950092] [ T1] init: starting service 'exec 16 (/bin/rm -rf /data/per_boot)'... [ 39.951764] [ T1] init: ... started service 'exec 16 (/bin/rm -rf /data/per_boot)' has pid 1783 [ 39.951825] [ T1] init: SVC_EXEC service 'exec 16 (/bin/rm -rf /data/per_boot)' pid 1783 (uid 1000 gid 1000+0 context default) started; waiting... [ 39.959148] [ T1] init: Service 'exec 16 (/bin/rm -rf /data/per_boot)' (pid 1783) exited with status 0 waiting took 0.008000 seconds [ 39.959172] [ T1] init: Sending signal 9 to service 'exec 16 (/bin/rm -rf /data/per_boot)' (pid 1783) process group... [ 39.959260] [ T1] libprocessgroup: Successfully killed process cgroup uid 1000 pid 1783 in 0ms [ 39.968319] [ T1] init: processing action (sys.boot_completed=1) from (/vendor/etc/init/hw/init.rk30board.rc:251) [ 39.968928] [ T1] init: processing action (sys.boot_completed=1) from (/vendor/etc/init/hw/init.rk3588.rc:1) [ 39.973187] [ T295] type=1400 audit(1758284097.836:893): avc: denied { create } for comm="init" name="vehicle" scontext=u:r:vendor_init:s0 tcontext=u:object_r:device:s0 tclass=file permissive=1 [ 39.973239] [ T295] type=1400 audit(1758284097.836:894): avc: denied { write } for comm="init" path="/dev/vehicle" dev="tmpfs" ino=791 scontext=u:r:vendor_init:s0 tcontext=u:object_r:device:s0 tclass=file permissive=1 [ 39.973375] [ T1] init: processing action (sys.boot_completed=1) from (/vendor/etc/init/hw/init.rk3588.rc:101) [ 39.973476] [ T1] init: starting service 'preinstall'... [ 39.974432] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 39.974442] [ T607] rkcif_scale_ch1: update sensor info failed -19 [ 39.974468] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 39.974471] [ T607] rkcif_tools_id2: update sensor info failed -19 [ 39.975550] [ T1] init: ... started service 'preinstall' has pid 1787 [ 39.975610] [ T1] init: processing action (sys.boot_completed=1) from (/vendor/etc/init/hw/init.rk3588.rc:109) [ 39.975747] [ T1] init: starting service 'cmdserver'... [ 39.977860] [ T295] type=1400 audit(1758284097.840:895): avc: denied { entrypoint } for comm="init" path="/system/bin/preinstall.sh" dev="dm-0" ino=535 scontext=u:r:preinstall:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 [ 39.978215] [ T1] init: ... started service 'cmdserver' has pid 1789 [ 39.978280] [ T1] init: processing action (sys.boot_completed=1 && sys.bootstat.first_boot_completed=0) from (/system/etc/init/bootstat.rc:67) [ 39.978417] [ T1] init: starting service 'exec 17 (/system/bin/bootstat --record_boot_complete --record_boot_reason --record_time_since_factory_reset -l)'... [ 39.979886] [ T1] init: ... started service 'exec 17 (/system/bin/bootstat --record_boot_complete --record_boot_reason --record_time_since_factory_reset -l)' has pid 1797 [ 39.980777] [ T1] init: processing action (sys.boot_completed=1) from (/system/etc/init/dmesgd.rc:4) [ 39.981157] [ T295] type=1400 audit(1758284097.844:896): avc: denied { map } for comm="preinstall.sh" path="/system/bin/sh" dev="dm-0" ino=585 scontext=u:r:preinstall:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 [ 39.981177] [ T1] init: processing action (sys.boot_completed=1) from (/system/etc/init/flags_health_check.rc:7) [ 39.982096] [ T295] type=1400 audit(1758284097.844:897): avc: denied { read } for comm="preinstall.sh" path="/system/bin/sh" dev="dm-0" ino=585 scontext=u:r:preinstall:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 [ 39.982143] [ T295] type=1400 audit(1758284097.844:898): avc: denied { execute } for comm="preinstall.sh" path="/system/bin/sh" dev="dm-0" ino=585 scontext=u:r:preinstall:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 [ 39.982164] [ T295] type=1400 audit(1758284097.844:899): avc: denied { getattr } for comm="preinstall.sh" path="/system/bin/sh" dev="dm-0" ino=585 scontext=u:r:preinstall:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 [ 39.986391] [ T295] type=1400 audit(1758284097.848:900): avc: denied { open } for comm="preinstall.sh" path="/system/bin/preinstall.sh" dev="dm-0" ino=535 scontext=u:r:preinstall:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 [ 39.986560] [ T295] type=1400 audit(1758284097.848:901): avc: denied { getattr } for comm="preinstall.sh" path="/system/bin/toybox" dev="dm-0" ino=637 scontext=u:r:preinstall:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 [ 39.986705] [ T295] type=1400 audit(1758284097.848:902): avc: denied { execute } for comm="preinstall.sh" name="toybox" dev="dm-0" ino=637 scontext=u:r:preinstall:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 [ 39.987131] [ T295] type=1400 audit(1758284097.848:903): avc: denied { read open } for comm="preinstall.sh" path="/system/bin/toybox" dev="dm-0" ino=637 scontext=u:r:preinstall:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 [ 39.987211] [ T295] type=1400 audit(1758284097.848:904): avc: denied { execute_no_trans } for comm="preinstall.sh" path="/system/bin/toybox" dev="dm-0" ino=637 scontext=u:r:preinstall:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 [ 39.987534] [ T295] type=1400 audit(1758284097.848:905): avc: denied { map } for comm="find" path="/system/bin/toybox" dev="dm-0" ino=637 scontext=u:r:preinstall:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 [ 39.992130] [ T295] type=1400 audit(1758284097.852:906): avc: denied { create } for comm="cmdserver" scontext=u:r:cmdserver:s0 tcontext=u:r:cmdserver:s0 tclass=tcp_socket permissive=1 [ 39.992237] [ T295] type=1400 audit(1758284097.852:907): avc: denied { setopt } for comm="cmdserver" scontext=u:r:cmdserver:s0 tcontext=u:r:cmdserver:s0 tclass=tcp_socket permissive=1 [ 39.992299] [ T295] type=1400 audit(1758284097.852:908): avc: denied { bind } for comm="cmdserver" scontext=u:r:cmdserver:s0 tcontext=u:r:cmdserver:s0 tclass=tcp_socket permissive=1 [ 39.992387] [ T295] type=1400 audit(1758284097.852:909): avc: denied { node_bind } for comm="cmdserver" src=40000 scontext=u:r:cmdserver:s0 tcontext=u:object_r:node:s0 tclass=tcp_socket permissive=1 [ 39.992450] [ T295] type=1400 audit(1758284097.852:910): avc: denied { listen } for comm="cmdserver" lport=40000 scontext=u:r:cmdserver:s0 tcontext=u:r:cmdserver:s0 tclass=tcp_socket permissive=1 [ 39.992511] [ T295] type=1400 audit(1758284097.852:911): avc: denied { accept } for comm="cmdserver" lport=40000 scontext=u:r:cmdserver:s0 tcontext=u:r:cmdserver:s0 tclass=tcp_socket permissive=1 [ 39.993642] [ T295] type=1400 audit(1758284097.856:912): avc: denied { read } for comm="find" name="/" dev="dm-0" ino=2 scontext=u:r:preinstall:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1 [ 39.993734] [ T295] type=1400 audit(1758284097.856:913): avc: denied { open } for comm="find" path="/" dev="dm-0" ino=2 scontext=u:r:preinstall:s0 tcontext=u:object_r:rootfs:s0 tclass=dir permissive=1 [ 39.994384] [ T1] init: processing action (sys.boot_completed=1) from (/system/etc/init/logd.rc:34) [ 39.994528] [ T1] init: starting service 'logd-auditctl'... [ 39.996246] [ T295] type=1400 audit(1758284097.856:914): avc: denied { getattr } for comm="find" path="/system/preinstall/Chrome/Chrome.apk" dev="dm-0" ino=2638 scontext=u:r:preinstall:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1 [ 39.996585] [ T1] init: ... started service 'logd-auditctl' has pid 1821 [ 39.996650] [ T1] init: processing action (sys.boot_completed=1) from (/system/etc/init/perfetto.rc:130) [ 39.996841] [ T1] init: starting service 'exec 18 (/system/bin/perfetto -c /data/misc/perfetto-configs/stopboottracetrigger.pbtxt --txt)'... [ 39.997063] [ T295] type=1400 audit(1758284097.860:915): avc: denied { execute_no_trans } for comm="find" path="/system/bin/sh" dev="dm-0" ino=585 scontext=u:r:preinstall:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 [ 39.998467] [ T1] init: ... started service 'exec 18 (/system/bin/perfetto -c /data/misc/perfetto-configs/stopboottracetrigger.pbtxt --txt)' has pid 1826 [ 39.998493] [ T1] init: SVC_EXEC service 'exec 18 (/system/bin/perfetto -c /data/misc/perfetto-configs/stopboottracetrigger.pbtxt --txt)' pid 1826 (uid 0 gid 0+0 context default) started; waiting... [ 40.001691] [ T295] type=1400 audit(1758284097.864:916): avc: denied { read } for comm="sh" name="pm" dev="dm-0" ino=527 scontext=u:r:preinstall:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1 [ 40.001737] [ T295] type=1400 audit(1758284097.864:917): avc: denied { open } for comm="sh" path="/system/bin/pm" dev="dm-0" ino=527 scontext=u:r:preinstall:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1 [ 40.003445] [ T295] type=1400 audit(1758284097.864:918): avc: denied { execute } for comm="sh" name="cmd" dev="dm-0" ino=312 scontext=u:r:preinstall:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1 [ 40.008166] [ T295] type=1400 audit(1758284097.868:919): avc: denied { execute } for comm="sh" name="cmd" dev="dm-0" ino=312 scontext=u:r:preinstall:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1 [ 40.008218] [ T295] type=1400 audit(1758284097.868:920): avc: denied { read open } for comm="sh" path="/system/bin/cmd" dev="dm-0" ino=312 scontext=u:r:preinstall:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1 [ 40.008242] [ T295] type=1400 audit(1758284097.868:921): avc: denied { execute_no_trans } for comm="sh" path="/system/bin/cmd" dev="dm-0" ino=312 scontext=u:r:preinstall:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1 [ 40.008272] [ T1] init: Service 'exec 18 (/system/bin/perfetto -c /data/misc/perfetto-configs/stopboottracetrigger.pbtxt --txt)' (pid 1826) exited with status 1 waiting took 0.010000 seconds [ 40.008331] [ T1] init: Sending signal 9 to service 'exec 18 (/system/bin/perfetto -c /data/misc/perfetto-configs/stopboottracetrigger.pbtxt --txt)' (pid 1826) process group... [ 40.010085] [ T295] type=1400 audit(1758284097.872:922): avc: denied { map } for comm="cmd" path="/system/bin/cmd" dev="dm-0" ino=312 scontext=u:r:preinstall:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1 [ 40.010162] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 1826 in 0ms [ 40.010575] [ T1] init: processing action (sys.boot_completed=1 && sys.wifitracing.started=0) from (/system/etc/init/wifi.rc:28) [ 40.014229] [ T295] type=1400 audit(1758284097.876:923): avc: denied { getattr } for comm="cmd" path="/system/bin/cmd" dev="dm-0" ino=312 scontext=u:r:preinstall:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1 [ 40.033627] [ T295] type=1400 audit(1758284097.896:924): avc: denied { call } for comm="cmd" scontext=u:r:preinstall:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1 [ 40.053438] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[3] get remote terminal sensor failed! [ 40.053463] [ T607] stream_cif_mipi_id3: update sensor info failed -19 [ 40.058941] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 40.058967] [ T607] rkcif_tools_id0: update sensor info failed -19 [ 40.059019] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 40.059030] [ T607] stream_cif_mipi_id2: update sensor info failed -19 [ 40.059076] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 40.059086] [ T607] stream_cif_mipi_id1: update sensor info failed -19 [ 40.059132] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 40.059143] [ T607] rkcif_scale_ch2: update sensor info failed -19 [ 40.059431] [ T1] init: Service 'logd-auditctl' (pid 1821) exited with status 0 oneshot service took 0.063000 seconds in background [ 40.059444] [ T1] init: Sending signal 9 to service 'logd-auditctl' (pid 1821) process group... [ 40.059496] [ T1] libprocessgroup: Successfully killed process cgroup uid 1036 pid 1821 in 0ms [ 40.059914] [ T283] SELinux: avc: denied { find } for pid=1831 uid=0 name=package scontext=u:r:preinstall:s0 tcontext=u:object_r:package_service:s0 tclass=service_manager permissive=1 [ 40.060251] [ T295] type=1400 audit(1758284097.920:925): avc: denied { call } for comm="cmd" scontext=u:r:preinstall:s0 tcontext=u:r:system_server:s0 tclass=binder permissive=1 [ 40.060284] [ T295] type=1400 audit(1758284097.920:926): avc: denied { transfer } for comm="cmd" scontext=u:r:preinstall:s0 tcontext=u:r:system_server:s0 tclass=binder permissive=1 [ 40.061812] [ T295] type=1400 audit(1758284097.924:927): avc: denied { call } for comm="binder:731_C" scontext=u:r:system_server:s0 tcontext=u:r:preinstall:s0 tclass=binder permissive=1 [ 40.062207] [ T295] type=1400 audit(1758284097.924:928): avc: denied { read } for comm="cmd" name="enforce" dev="selinuxfs" ino=4 scontext=u:r:preinstall:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 [ 40.062237] [ T295] type=1400 audit(1758284097.924:929): avc: denied { open } for comm="cmd" path="/sys/fs/selinux/enforce" dev="selinuxfs" ino=4 scontext=u:r:preinstall:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 [ 40.062257] [ T295] type=1400 audit(1758284097.924:930): avc: denied { map } for comm="cmd" path="/sys/fs/selinux/status" dev="selinuxfs" ino=19 scontext=u:r:preinstall:s0 tcontext=u:object_r:selinuxfs:s0 tclass=file permissive=1 [ 40.062279] [ T1831] audit_log_lost: 122 callbacks suppressed [ 40.062283] [ T1831] audit: audit_lost=45 audit_rate_limit=5 audit_backlog_limit=64 [ 40.062300] [ T1831] audit: rate limit exceeded [ 40.062331] [ T295] type=1400 audit(1758284097.924:931): avc: denied { read } for comm="cmd" name="perms" dev="selinuxfs" ino=67112374 scontext=u:r:preinstall:s0 tcontext=u:object_r:selinuxfs:s0 tclass=dir permissive=1 [ 40.063061] [ T607] rkisp0-vir0: rkisp_enum_frameintervals Not active sensor [ 40.063284] [ T607] rkisp0-vir0: rkisp_enum_frameintervals Not active sensor [ 40.063600] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[3] get remote terminal sensor failed! [ 40.063613] [ T607] rkcif_scale_ch3: update sensor info failed -19 [ 40.066546] [ T607] rkisp1-vir0: rkisp_enum_frameintervals Not active sensor [ 40.066716] [ T1] init: processing action (sys.boot_completed=1) from (/vendor/etc/init/init.tune_io.rc:12) [ 40.066762] [ T607] rkisp1-vir0: rkisp_enum_frameintervals Not active sensor [ 40.067557] [ T1] init: processing action (persist.sys.zram_enabled=1 && sys-boot-completed-set) from (/vendor/etc/init/hw/init.rk30board.rc:264) [ 40.072562] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 40.072592] [ T607] rkcif_tools_id1: update sensor info failed -19 [ 40.072660] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 40.072672] [ T607] rkcif_scale_ch0: update sensor info failed -19 [ 40.075111] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 40.075141] [ T607] rkcif_tools_id0: update sensor info failed -19 [ 40.075199] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 40.075211] [ T607] rkcif_tools_id2: update sensor info failed -19 [ 40.075262] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 40.075273] [ T607] rkcif_scale_ch1: update sensor info failed -19 [ 40.075435] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[3] get remote terminal sensor failed! [ 40.075447] [ T607] rkcif_scale_ch3: update sensor info failed -19 [ 40.075501] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 40.075513] [ T607] stream_cif_mipi_id1: update sensor info failed -19 [ 40.075566] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 40.075577] [ T607] rkcif_scale_ch2: update sensor info failed -19 [ 40.075641] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 40.075652] [ T607] stream_cif_mipi_id1: update sensor info failed -19 [ 40.075705] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 40.075715] [ T607] rkcif_tools_id1: update sensor info failed -19 [ 40.075770] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 40.075780] [ T607] rkcif_tools_id1: update sensor info failed -19 [ 40.075831] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[3] get remote terminal sensor failed! [ 40.075842] [ T607] stream_cif_mipi_id3: update sensor info failed -19 [ 40.076768] [ T1] zram0: detected capacity change from 0 to 16328120 [ 40.082902] [ T607] rkisp0-vir1: rkisp_enum_frameintervals Not active sensor [ 40.083131] [ T607] rkisp0-vir1: rkisp_enum_frameintervals Not active sensor [ 40.083431] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 40.083443] [ T607] rkcif_tools_id0: update sensor info failed -19 [ 40.083494] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 40.083505] [ T607] stream_cif_mipi_id0: update sensor info failed -19 [ 40.083553] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 40.083563] [ T607] rkcif_tools_id2: update sensor info failed -19 [ 40.083646] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 40.083656] [ T607] stream_cif_mipi_id2: update sensor info failed -19 [ 40.083705] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[3] get remote terminal sensor failed! [ 40.083716] [ T607] stream_cif_mipi_id3: update sensor info failed -19 [ 40.083763] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[1] get remote terminal sensor failed! [ 40.083773] [ T607] rkcif_scale_ch1: update sensor info failed -19 [ 40.083823] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 40.083833] [ T607] rkcif_scale_ch0: update sensor info failed -19 [ 40.089553] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 40.089571] [ T607] rkcif_scale_ch0: update sensor info failed -19 [ 40.089662] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 40.089673] [ T607] rkcif_scale_ch2: update sensor info failed -19 [ 40.089797] [ T607] rkcif-mipi-lvds1: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 40.089808] [ T607] stream_cif_mipi_id0: update sensor info failed -19 [ 40.089919] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[0] get remote terminal sensor failed! [ 40.089930] [ T607] stream_cif_mipi_id0: update sensor info failed -19 [ 40.089978] [ T607] rkcif-mipi-lvds: rkcif_update_sensor_info: stream[3] get remote terminal sensor failed! [ 40.089988] [ T607] rkcif_scale_ch3: update sensor info failed -19 [ 40.091292] [ T607] rkcif-mipi-lvds2: rkcif_update_sensor_info: stream[2] get remote terminal sensor failed! [ 40.091304] [ T607] stream_cif_mipi_id2: update sensor info failed -19 [ 40.100829] [ T1] mkswap: Swapspace size: 8164056k, UUID=408aaa29-0d45-4fe7-9db2-9473cc2ba6de [ 40.103148] [ T1] Adding 8164056k swap on /dev/block/zram0. Priority:-2 extents:1 across:8164056k SS [ 40.103461] [ T1] init: Service 'exec 17 (/system/bin/bootstat --record_boot_complete --record_boot_reason --record_time_since_factory_reset -l)' (pid 1797) exited with status 0 oneshot service took 0.124000 seconds in background [ 40.103474] [ T1] init: Sending signal 9 to service 'exec 17 (/system/bin/bootstat --record_boot_complete --record_boot_reason --record_time_since_factory_reset -l)' (pid 1797) process group... [ 40.103567] [ T1] libprocessgroup: Successfully killed process cgroup uid 1000 pid 1797 in 0ms [ 40.103834] [ T1] init: processing action (bootreceiver.enable=1 && dmesgd.start=1 && ro.product.cpu.abilist64=*) from (/system/etc/init/dmesgd.rc:12) [ 40.103971] [ T1] init: starting service 'dmesgd'... [ 40.106073] [ T1] init: ... started service 'dmesgd' has pid 1847 [ 40.106491] [ T1] init: processing action (sys.boot_completed=1 && sys.wifitracing.started=1 && wifi.interface=*) from (/system/etc/init/wifi.rc:98) [ 40.328053] [ T1] init: processing action (sys.user.0.ce_available=true) from (/system/etc/init/wifi.rc:21) [ 40.380803] [ T1] init: Service 'dmesgd' (pid 1847) exited with status 0 oneshot service took 0.275000 seconds in background [ 40.380824] [ T1] init: Sending signal 9 to service 'dmesgd' (pid 1847) process group... [ 40.380904] [ T1] libprocessgroup: Successfully killed process cgroup uid 1086 pid 1847 in 0ms [ 40.511357] [ T487] apexd: destroyCeSnapshotsNotSpecified() received by ApexService user_id : 0 retain_rollback_ids : [] [ 40.604804] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 40.633427] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 40.764755] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 40.767011] [ T283] servicemanager: Found android.hardware.graphics.allocator.IAllocator/default in device VINTF manifest. [ 41.065856] [ T295] type=1400 audit(1758284098.928:951): avc: denied { read } for comm="HwBinder:540_6" name="u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:mediacodec:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 41.065937] [ T295] type=1400 audit(1758284098.928:952): avc: denied { open } for comm="HwBinder:540_6" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:mediacodec:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 41.065982] [ T295] type=1400 audit(1758284098.928:953): avc: denied { getattr } for comm="HwBinder:540_6" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:mediacodec:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 41.066025] [ T295] type=1400 audit(1758284098.928:954): avc: denied { map } for comm="HwBinder:540_6" path="/dev/__properties__/u:object_r:default_prop:s0" dev="tmpfs" ino=139 scontext=u:r:mediacodec:s0 tcontext=u:object_r:default_prop:s0 tclass=file permissive=1 [ 41.076335] [ T295] type=1400 audit(1758284098.936:955): avc: denied { read } for comm="binder:731_1" name="u:object_r:vendor_default_prop:s0" dev="tmpfs" ino=333 scontext=u:r:system_server:s0 tcontext=u:object_r:vendor_default_prop:s0 tclass=file permissive=1 [ 41.076656] [ T771] audit: audit_lost=64 audit_rate_limit=5 audit_backlog_limit=64 [ 41.076663] [ T771] audit: rate limit exceeded [ 41.265556] [ T384] apexd: Deleting unused dm device com.android.apex.cts.shim [ 41.265634] [ T384] apexd: Didn't generate uevent for [com.android.apex.cts.shim] removal [ 41.265642] [ T384] apexd: Failed to delete dm-device com.android.apex.cts.shim [ 41.265654] [ T384] apexd: Deleting unused dm device com.android.btservices [ 41.265691] [ T384] apexd: Didn't generate uevent for [com.android.btservices] removal [ 41.265696] [ T384] apexd: Failed to delete dm-device com.android.btservices [ 41.265707] [ T384] apexd: Deleting unused dm device com.android.devicelock [ 41.265742] [ T384] apexd: Didn't generate uevent for [com.android.devicelock] removal [ 41.265748] [ T384] apexd: Failed to delete dm-device com.android.devicelock [ 41.265757] [ T384] apexd: Deleting unused dm device com.android.healthfitness [ 41.265787] [ T384] apexd: Didn't generate uevent for [com.android.healthfitness] removal [ 41.265794] [ T384] apexd: Failed to delete dm-device com.android.healthfitness [ 41.265800] [ T384] apexd: Deleting unused dm device com.android.i18n [ 41.265842] [ T384] apexd: Didn't generate uevent for [com.android.i18n] removal [ 41.265848] [ T384] apexd: Failed to delete dm-device com.android.i18n [ 41.265862] [ T384] apexd: Deleting unused dm device com.android.os.statsd [ 41.265891] [ T384] apexd: Didn't generate uevent for [com.android.os.statsd] removal [ 41.265897] [ T384] apexd: Failed to delete dm-device com.android.os.statsd [ 41.265906] [ T384] apexd: Deleting unused dm device com.android.rkpd [ 41.265933] [ T384] apexd: Didn't generate uevent for [com.android.rkpd] removal [ 41.265939] [ T384] apexd: Failed to delete dm-device com.android.rkpd [ 41.265946] [ T384] apexd: Deleting unused dm device com.android.runtime [ 41.265974] [ T384] apexd: Didn't generate uevent for [com.android.runtime] removal [ 41.265979] [ T384] apexd: Failed to delete dm-device com.android.runtime [ 41.265987] [ T384] apexd: Deleting unused dm device com.android.sdkext [ 41.266017] [ T384] apexd: Didn't generate uevent for [com.android.sdkext] removal [ 41.266023] [ T384] apexd: Failed to delete dm-device com.android.sdkext [ 41.266030] [ T384] apexd: Deleting unused dm device com.android.tzdata [ 41.266058] [ T384] apexd: Didn't generate uevent for [com.android.tzdata] removal [ 41.266063] [ T384] apexd: Failed to delete dm-device com.android.tzdata [ 41.266071] [ T384] apexd: Deleting unused dm device com.android.virt [ 41.266109] [ T384] apexd: Didn't generate uevent for [com.android.virt] removal [ 41.266114] [ T384] apexd: Failed to delete dm-device com.android.virt [ 41.266120] [ T384] apexd: Deleting unused dm device com.android.vndk.v34 [ 41.266158] [ T384] apexd: Didn't generate uevent for [com.android.vndk.v34] removal [ 41.266164] [ T384] apexd: Failed to delete dm-device com.android.vndk.v34 [ 41.266172] [ T384] apexd: Deleting unused dm device com.rockchip.hardware.sensors [ 41.266199] [ T384] apexd: Didn't generate uevent for [com.rockchip.hardware.sensors] removal [ 41.266205] [ T384] apexd: Failed to delete dm-device com.rockchip.hardware.sensors [ 41.768837] [ T1] init: Sending signal 9 to service 'idmap2d' (pid 1231) process group... [ 41.774254] [ T1] libprocessgroup: Successfully killed process cgroup uid 1000 pid 1231 in 5ms [ 41.774824] [ T1] init: Control message: Processed ctl.stop for 'idmap2d' from pid: 731 (system_server) [ 41.775048] [ T1] init: Service 'idmap2d' (pid 1231) received signal 9 [ 42.521644] [ T283] servicemanager: Notifying apexservice they don't (previously: do) have clients when we now have no record of a client [ 42.521788] [ T384] AidlLazyServiceRegistrar: Process has 0 (of 1 available) client(s) in use after notification apexservice has clients: 0 [ 42.521802] [ T384] AidlLazyServiceRegistrar: Trying to shut down the service. No clients in use for any service in process. [ 42.522114] [ T283] servicemanager: Unregistering apexservice [ 42.522144] [ T283] BpBinder: onLastStrongRef automatically unlinking death recipients: [ 42.522198] [ T384] AidlLazyServiceRegistrar: Unregistered all clients and exiting [ 42.525033] [ T1] init: Service 'apexd' (pid 384) exited with status 0 oneshot service took 34.187000 seconds in background [ 42.525077] [ T1] init: Sending signal 9 to service 'apexd' (pid 384) process group... [ 42.525278] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 384 in 0ms [ 43.847662] [ T295] type=1400 audit(1758284101.708:959): avc: denied { open } for comm=62674578656375746F72202333 path="/sys/module/bifrost_kbase/parameters/large_page_conf" dev="sysfs" ino=19914 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.android.vending [ 43.847793] [ T295] type=1400 audit(1758284101.708:960): avc: denied { getattr } for comm=62674578656375746F72202333 path="/sys/module/bifrost_kbase/parameters/large_page_conf" dev="sysfs" ino=19914 scontext=u:r:priv_app:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 app=com.android.vending [ 43.847830] [ T2557] logd: start watching /data/system/packages.list ... [ 43.849745] [ T2557] logd: ReadPackageList, total packages: 99 [ 44.303414] [ T291] logd: logdr: UID=10053 GID=10053 PID=1698 n tail=0 logMask=4 pid=0 start=0ns deadline=0ns [ 44.716215] [ T2557] logd: start watching /data/system/packages.list ... [ 44.717258] [ T2557] logd: ReadPackageList, total packages: 100 [ 44.776799] [ T283] servicemanager: Since 'artd' could not be found, trying to start it as a lazy AIDL service. (if it's not configured to be a lazy service, it may be stuck starting or still starting). [ 44.789529] [ T1] init: starting service 'artd'... [ 44.795888] [ T1] init: ... started service 'artd' has pid 2648 [ 44.796028] [ T1] init: Control message: Processed ctl.interface_start for 'aidl/artd' from pid: 283 (/system/bin/servicemanager) [ 44.811635] [ T283] BpBinder: onLastStrongRef automatically unlinking death recipients: [ 44.812762] [ T283] servicemanager: Notifying artd they do (previously: don't) have clients when service is guaranteed to be in use [ 44.846248] [ T295] type=1400 audit(1758284102.708:961): avc: denied { read } for comm="binder:2397_2" name="u:object_r:system_adbd_prop:s0" dev="tmpfs" ino=295 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:system_adbd_prop:s0 tclass=file permissive=1 app=com.google.android.gms [ 44.846328] [ T2423] audit: audit_lost=67 audit_rate_limit=5 audit_backlog_limit=64 [ 44.846333] [ T2423] audit: rate limit exceeded [ 44.846355] [ T295] type=1400 audit(1758284102.708:962): avc: denied { open } for comm="binder:2397_2" path="/dev/__properties__/u:object_r:system_adbd_prop:s0" dev="tmpfs" ino=295 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:system_adbd_prop:s0 tclass=file permissive=1 app=com.google.android.gms [ 44.846388] [ T295] type=1400 audit(1758284102.708:963): avc: denied { getattr } for comm="binder:2397_2" path="/dev/__properties__/u:object_r:system_adbd_prop:s0" dev="tmpfs" ino=295 scontext=u:r:gmscore_app:s0:c512,c768 tcontext=u:object_r:system_adbd_prop:s0 tclass=file permissive=1 app=com.google.android.gms [ 45.001873] [ T295] type=1400 audit(1758284102.864:965): avc: denied { write } for comm="sh" name="enable" dev="sysfs" ino=37680 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [ 45.002017] [ T295] type=1400 audit(1758284102.864:966): avc: denied { open } for comm="sh" path="/sys/class/fan/enable" dev="sysfs" ino=37680 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1 [ 45.214991] [ T295] type=1400 audit(1758284103.076:967): avc: denied { open } for comm=".update.service" path="/dev/__properties__/u:object_r:serialno_prop:s0" dev="tmpfs" ino=280 scontext=u:r:system_app:s0 tcontext=u:object_r:serialno_prop:s0 tclass=file permissive=1 [ 45.215158] [ T295] type=1400 audit(1758284103.076:968): avc: denied { getattr } for comm=".update.service" path="/dev/__properties__/u:object_r:serialno_prop:s0" dev="tmpfs" ino=280 scontext=u:r:system_app:s0 tcontext=u:object_r:serialno_prop:s0 tclass=file permissive=1 [ 45.215238] [ T295] type=1400 audit(1758284103.076:969): avc: denied { map } for comm=".update.service" path="/dev/__properties__/u:object_r:serialno_prop:s0" dev="tmpfs" ino=280 scontext=u:r:system_app:s0 tcontext=u:object_r:serialno_prop:s0 tclass=file permissive=1 [ 45.389300] [ T283] servicemanager: Found android.hardware.security.keymint.IRemotelyProvisionedComponent/default in device VINTF manifest. [ 46.049162] [ T295] type=1400 audit(1758284103.912:970): avc: denied { search } for comm=4173796E635461736B202331 name="rtc" dev="sysfs" ino=22041 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=dir permissive=1 [ 46.049437] [ T295] type=1400 audit(1758284103.912:971): avc: denied { read write } for comm=4173796E635461736B202331 name="bootalarm" dev="sysfs" ino=38067 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=file permissive=1 [ 46.052362] [ T295] type=1400 audit(1758284103.912:972): avc: denied { open } for comm=4173796E635461736B202331 path="/sys/devices/platform/feaa0000.i2c/i2c-2/2-0051/rtc/rtc0/bootalarm" dev="sysfs" ino=38067 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=file permissive=1 [ 46.052414] [ T295] type=1400 audit(1758284103.912:973): avc: denied { getattr } for comm=4173796E635461736B202331 path="/sys/devices/platform/feaa0000.i2c/i2c-2/2-0051/rtc/rtc0/bootalarm" dev="sysfs" ino=38067 scontext=u:r:system_app:s0 tcontext=u:object_r:sysfs_rtc:s0 tclass=file permissive=1 [ 48.808283] [ T295] type=1400 audit(1758284106.668:974): avc: denied { call } for comm="binder:731_C" scontext=u:r:system_server:s0 tcontext=u:r:preinstall:s0 tclass=binder permissive=1 [ 48.814219] [ T295] type=1400 audit(1758284106.672:975): avc: denied { getattr } for comm="find" path="/system/preinstall/tts/tts.apk" dev="dm-0" ino=2640 scontext=u:r:preinstall:s0 tcontext=u:object_r:system_file:s0 tclass=file permissive=1 [ 48.815659] [ T3099] audit: audit_lost=68 audit_rate_limit=5 audit_backlog_limit=64 [ 48.815685] [ T3099] audit: rate limit exceeded [ 48.817805] [ T295] type=1400 audit(1758284106.676:976): avc: denied { execute } for comm="find" name="sh" dev="dm-0" ino=585 scontext=u:r:preinstall:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 [ 48.817844] [ T295] type=1400 audit(1758284106.676:977): avc: denied { read open } for comm="find" path="/system/bin/sh" dev="dm-0" ino=585 scontext=u:r:preinstall:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 [ 48.817872] [ T295] type=1400 audit(1758284106.676:978): avc: denied { execute_no_trans } for comm="find" path="/system/bin/sh" dev="dm-0" ino=585 scontext=u:r:preinstall:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 [ 48.817897] [ T295] type=1400 audit(1758284106.676:979): avc: denied { map } for comm="sh" path="/system/bin/sh" dev="dm-0" ino=585 scontext=u:r:preinstall:s0 tcontext=u:object_r:shell_exec:s0 tclass=file permissive=1 [ 49.890923] [ T1152] binder_alloc: 1698: binder_alloc_buf, no vma [ 49.890941] [ T1152] binder: cannot allocate buffer: vma cleared, target dead or dying [ 49.890944] [ T1152] binder: 731:1152 transaction async to 1698:0 failed 211565/29189/-3, size 740-8 line 3458 [ 49.901961] [ T128] binder: undelivered TRANSACTION_COMPLETE [ 49.901994] [ T128] binder: undelivered transaction 211455, process died. [ 49.902015] [ T128] binder: undelivered TRANSACTION_COMPLETE [ 49.902024] [ T128] binder: undelivered transaction 211457, process died. [ 49.902046] [ T128] binder: release 1698:2614 transaction 210524 out, still active [ 49.902056] [ T128] binder: undelivered TRANSACTION_COMPLETE [ 49.903792] [ T128] binder: undelivered transaction 211503, process died. [ 49.903819] [ T128] binder: undelivered transaction 211527, process died. [ 52.390005] [ T821] binder_alloc: 3150: binder_alloc_buf, no vma [ 52.521575] [ T283] servicemanager: Notifying artd they don't (previously: do) have clients when we now have no record of a client [ 52.522340] [ T283] servicemanager: Unregistering artd [ 52.522355] [ T283] BpBinder: onLastStrongRef automatically unlinking death recipients: [ 52.524688] [ T1] init: Service 'artd' (pid 2648) exited with status 0 oneshot service took 7.732000 seconds in background [ 52.524708] [ T1] init: Sending signal 9 to service 'artd' (pid 2648) process group... [ 52.524825] [ T1] libprocessgroup: Successfully killed process cgroup uid 1082 pid 2648 in 0ms [ 53.240456] [ T2557] logd: start watching /data/system/packages.list ... [ 53.241803] [ T2557] logd: ReadPackageList, total packages: 101 [ 53.345447] [ T283] servicemanager: Since 'artd' could not be found, trying to start it as a lazy AIDL service. (if it's not configured to be a lazy service, it may be stuck starting or still starting). [ 53.346847] [ T1] init: starting service 'artd'... [ 53.351251] [ T1] init: ... started service 'artd' has pid 3333 [ 53.351287] [ T1] init: Control message: Processed ctl.interface_start for 'aidl/artd' from pid: 283 (/system/bin/servicemanager) [ 53.393758] [ T283] BpBinder: onLastStrongRef automatically unlinking death recipients: [ 53.397368] [ T283] servicemanager: Notifying artd they do (previously: don't) have clients when service is guaranteed to be in use [ 54.082129] [ T295] type=1400 audit(1758284111.944:997): avc: denied { call } for comm="binder:731_9" scontext=u:r:system_server:s0 tcontext=u:r:preinstall:s0 tclass=binder permissive=1 [ 54.086493] [ T295] type=1400 audit(1758284111.948:998): avc: denied { getattr } for comm="preinstall.sh" path="/system/bin/toybox" dev="dm-0" ino=637 scontext=u:r:preinstall:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 [ 54.086560] [ T295] type=1400 audit(1758284111.948:999): avc: denied { execute } for comm="preinstall.sh" name="toybox" dev="dm-0" ino=637 scontext=u:r:preinstall:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 [ 54.087844] [ T295] type=1400 audit(1758284111.948:1000): avc: denied { read open } for comm="preinstall.sh" path="/system/bin/toybox" dev="dm-0" ino=637 scontext=u:r:preinstall:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 [ 54.087916] [ T295] type=1400 audit(1758284111.948:1001): avc: denied { execute_no_trans } for comm="preinstall.sh" path="/system/bin/toybox" dev="dm-0" ino=637 scontext=u:r:preinstall:s0 tcontext=u:object_r:toolbox_exec:s0 tclass=file permissive=1 [ 54.088140] [ T3357] audit: audit_lost=85 audit_rate_limit=5 audit_backlog_limit=64 [ 54.088146] [ T3357] audit: rate limit exceeded [ 54.099802] [ T1] init: Service 'preinstall' (pid 1787) exited with status 0 oneshot service took 14.125000 seconds in background [ 54.099826] [ T1] init: Sending signal 9 to service 'preinstall' (pid 1787) process group... [ 54.099935] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 1787 in 0ms [ 54.715133] [ T2557] logd: start watching /data/system/packages.list ... [ 54.716222] [ T2557] logd: ReadPackageList, total packages: 101 [ 56.262196] [ T1735] binder_debug: 34 callbacks suppressed [ 56.262202] [ T1735] binder: 1735:1669 cannot find target node [ 56.262290] [ T1735] binder: 1669:1735 transaction async to 0:0 failed 256512/29189/-22, size 448-0 line 3258 [ 57.392750] [ T1] init: starting service 'simple_bugreportd'... [ 57.393319] [ T1] init: Created socket '/dev/socket/dumpstate', mode 660, user 2000, group 1007 [ 57.397515] [ T1] init: ... started service 'simple_bugreportd' has pid 3504 [ 57.397544] [ T1] init: Control message: Processed ctl.start for 'simple_bugreportd' from pid: 731 (system_server) [ 57.485933] [ T291] logd: logdr: UID=0 GID=0 PID=3507 n tail=0 logMask=99 pid=0 start=0ns deadline=0ns [ 57.521579] [ T283] servicemanager: Notifying artd they don't (previously: do) have clients when we now have no record of a client [ 57.521904] [ T283] servicemanager: Unregistering artd [ 57.521915] [ T283] BpBinder: onLastStrongRef automatically unlinking death recipients: [ 57.525860] [ T1] init: Service 'artd' (pid 3333) exited with status 0 oneshot service took 4.176000 seconds in background [ 57.525883] [ T1] init: Sending signal 9 to service 'artd' (pid 3333) process group... [ 57.525986] [ T1] libprocessgroup: Successfully killed process cgroup uid 1082 pid 3333 in 0ms [ 57.676086] [ T291] logd: logdr: UID=0 GID=0 PID=3509 n tail=0 logMask=4 pid=0 start=0ns deadline=0ns [ 57.765586] [ T295] type=1400 audit(1758284115.628:1008): avc: denied { read } for comm="dumpstate" name="summary" dev="debugfs" ino=30853 scontext=u:r:dumpstate:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1 [ 57.765730] [ T295] type=1400 audit(1758284115.628:1009): avc: denied { open } for comm="dumpstate" path="/sys/kernel/debug/dri/0/summary" dev="debugfs" ino=30853 scontext=u:r:dumpstate:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1 [ 57.819715] [ T295] type=1400 audit(1758284115.680:1010): avc: denied { getattr } for comm="mount" path="/vendor/custom" dev="mmcblk0p9" ino=2 scontext=u:r:dumpstate:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=1 [ 57.820205] [ T295] type=1400 audit(1758284115.680:1011): avc: denied { search } for comm="mount" name="pass_through" dev="tmpfs" ino=16 scontext=u:r:dumpstate:s0 tcontext=u:object_r:mnt_pass_through_file:s0 tclass=dir permissive=1 [ 57.820293] [ T295] type=1400 audit(1758284115.680:1012): avc: denied { getattr } for comm="mount" path="/mnt/pass_through/0/emulated" dev="mmcblk0p16" ino=151 scontext=u:r:dumpstate:s0 tcontext=u:object_r:media_userdir_file:s0 tclass=dir permissive=1 [ 58.337658] [ T188] binder: undelivered TRANSACTION_COMPLETE [ 58.337677] [ T188] binder: undelivered transaction 274065, process died. [ 58.339395] [ T188] binder: undelivered transaction 274154, process died. [ 58.982086] [ T1] init: Service 'simple_bugreportd' (pid 3504) exited with status 0 oneshot service took 1.586000 seconds in background [ 58.982118] [ T1] init: Sending signal 9 to service 'simple_bugreportd' (pid 3504) process group... [ 58.982230] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 3504 in 0ms [ 59.438707] [ T1] init: starting service 'simple_bugreportd'... [ 59.439247] [ T1] init: Created socket '/dev/socket/dumpstate', mode 660, user 2000, group 1007 [ 59.444705] [ T1] init: ... started service 'simple_bugreportd' has pid 3587 [ 59.444838] [ T1] init: Control message: Processed ctl.start for 'simple_bugreportd' from pid: 731 (system_server) [ 59.515921] [ T291] logd: logdr: UID=0 GID=0 PID=3590 n tail=0 logMask=99 pid=0 start=0ns deadline=0ns [ 59.641597] [ T188] binder: undelivered TRANSACTION_COMPLETE [ 59.641614] [ T188] binder: undelivered transaction 283998, process died. [ 59.706364] [ T291] logd: logdr: UID=0 GID=0 PID=3609 n tail=0 logMask=4 pid=0 start=0ns deadline=0ns [ 59.783271] [ T295] type=1400 audit(1758284117.644:1013): avc: denied { read } for comm="dumpstate" name="summary" dev="debugfs" ino=30853 scontext=u:r:dumpstate:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1 [ 59.783404] [ T295] type=1400 audit(1758284117.644:1014): avc: denied { open } for comm="dumpstate" path="/sys/kernel/debug/dri/0/summary" dev="debugfs" ino=30853 scontext=u:r:dumpstate:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1 [ 59.824234] [ T295] type=1400 audit(1758284117.684:1015): avc: denied { getattr } for comm="mount" path="/vendor/custom" dev="mmcblk0p9" ino=2 scontext=u:r:dumpstate:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=1 [ 59.826023] [ T295] type=1400 audit(1758284117.688:1016): avc: denied { search } for comm="mount" name="pass_through" dev="tmpfs" ino=16 scontext=u:r:dumpstate:s0 tcontext=u:object_r:mnt_pass_through_file:s0 tclass=dir permissive=1 [ 59.826114] [ T295] type=1400 audit(1758284117.688:1017): avc: denied { getattr } for comm="mount" path="/mnt/pass_through/0/emulated" dev="mmcblk0p16" ino=151 scontext=u:r:dumpstate:s0 tcontext=u:object_r:media_userdir_file:s0 tclass=dir permissive=1 [ 60.919563] [ T1] init: Service 'simple_bugreportd' (pid 3587) exited with status 0 oneshot service took 1.477000 seconds in background [ 60.919629] [ T1] init: Sending signal 9 to service 'simple_bugreportd' (pid 3587) process group... [ 60.919833] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 3587 in 0ms [ 61.458968] [ T1] init: starting service 'simple_bugreportd'... [ 61.459489] [ T1] init: Created socket '/dev/socket/dumpstate', mode 660, user 2000, group 1007 [ 61.464631] [ T1] init: ... started service 'simple_bugreportd' has pid 3680 [ 61.465032] [ T1] init: Control message: Processed ctl.start for 'simple_bugreportd' from pid: 731 (system_server) [ 61.778199] [ T291] logd: logdr: UID=0 GID=0 PID=3683 n tail=0 logMask=99 pid=0 start=0ns deadline=0ns [ 61.979552] [ T291] logd: logdr: UID=0 GID=0 PID=3685 n tail=0 logMask=4 pid=0 start=0ns deadline=0ns [ 62.047971] [ T295] type=1400 audit(1758284119.908:1018): avc: denied { read } for comm="dumpstate" name="summary" dev="debugfs" ino=30853 scontext=u:r:dumpstate:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1 [ 62.048172] [ T295] type=1400 audit(1758284119.908:1019): avc: denied { open } for comm="dumpstate" path="/sys/kernel/debug/dri/0/summary" dev="debugfs" ino=30853 scontext=u:r:dumpstate:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1 [ 62.105861] [ T295] type=1400 audit(1758284119.968:1020): avc: denied { getattr } for comm="mount" path="/vendor/custom" dev="mmcblk0p9" ino=2 scontext=u:r:dumpstate:s0 tcontext=u:object_r:unlabeled:s0 tclass=dir permissive=1 [ 62.107676] [ T295] type=1400 audit(1758284119.968:1021): avc: denied { search } for comm="mount" name="pass_through" dev="tmpfs" ino=16 scontext=u:r:dumpstate:s0 tcontext=u:object_r:mnt_pass_through_file:s0 tclass=dir permissive=1 [ 62.107784] [ T295] type=1400 audit(1758284119.968:1022): avc: denied { getattr } for comm="mount" path="/mnt/pass_through/0/emulated" dev="mmcblk0p16" ino=151 scontext=u:r:dumpstate:s0 tcontext=u:object_r:media_userdir_file:s0 tclass=dir permissive=1 [ 63.169807] [ T1] init: Service 'simple_bugreportd' (pid 3680) exited with status 0 oneshot service took 1.707000 seconds in background [ 63.169870] [ T1] init: Sending signal 9 to service 'simple_bugreportd' (pid 3680) process group... [ 63.170088] [ T1] libprocessgroup: Successfully killed process cgroup uid 0 pid 3680 in 0ms [ 69.942752] [ T295] type=1400 audit(1758284127.804:1023): avc: denied { ioctl } for comm="binder:542_3" path="/dev/cec0" dev="tmpfs" ino=456 ioctlcmd=0x6105 scontext=u:r:hal_tv_hdmi_cec_default:s0 tcontext=u:object_r:cec_device:s0 tclass=chr_file permissive=1 [ 72.710479] [ T539] healthd: battery l=50 v=3300 t=2.6 h=2 st=3 c=-1600 fc=100 chg=au [ 104.070652] [ T721] dwc3 fc000000.usb: device disconnect [ 104.072879] [ T21] android_work: sent uevent USB_STATE=DISCONNECTED [ 104.074540] [ T539] healthd: battery l=50 v=3300 t=2.6 h=2 st=3 c=-1600 fc=100 chg=au [ 104.075975] [ T539] healthd: battery l=50 v=3300 t=2.6 h=2 st=3 c=-1600 fc=100 chg=au [ 104.199870] [ T130] android_work: did not send uevent (0 0 0000000000000000) [ 104.208866] [ T684] dwc3 fc000000.usb: request 0000000000000000 was not queued to ep0out [ 104.209025] [ T21] android_work: did not send uevent (0 0 0000000000000000) [ 104.209277] [ T684] read descriptors [ 104.209293] [ T684] read strings [ 104.838474] [ T155] android_work: did not send uevent (0 0 0000000000000000) [ 114.944208] [ T295] type=1400 audit(1758284172.804:1024): avc: denied { ioctl } for comm="binder:542_3" path="/dev/cec0" dev="tmpfs" ino=456 ioctlcmd=0x6105 scontext=u:r:hal_tv_hdmi_cec_default:s0 tcontext=u:object_r:cec_device:s0 tclass=chr_file permissive=1 [ 115.651994] [ T291] logd: logdr: UID=2000 GID=2000 PID=4065 b tail=0 logMask=99 pid=0 start=0ns deadline=0ns [ 129.531813] [ T120] binder: undelivered transaction 404632, process died. [ 129.755787] [ T3632] binder: 3632:3594 cannot find target node [ 129.755807] [ T3632] binder: 3594:3632 transaction async to 0:0 failed 405447/29189/-22, size 168-0 line 3258 [ 130.619229] [ T295] type=1400 audit(1758284188.480:1025): avc: denied { ioctl } for comm="binder:542_3" path="/dev/cec0" dev="tmpfs" ino=456 ioctlcmd=0x6105 scontext=u:r:hal_tv_hdmi_cec_default:s0 tcontext=u:object_r:cec_device:s0 tclass=chr_file permissive=1 [ 132.660704] [ T295] type=1400 audit(1758284190.520:1026): avc: denied { syslog_read } for comm="dmesg" scontext=u:r:shell:s0 tcontext=u:r:kernel:s0 tclass=system permissive=1