U-Boot SPL 2021.01-dirty (Sep 20 2022 - 11:13:23 +0800) SYSFW ABI: 3.1 (firmware rev 0x0008 '8.3.2--v08.03.02 (Jolly Jellyfi') Trying to boot from MMC2 U-Boot 2021.01-dirty (Sep 20 2022 - 11:13:23 +0800) SoC: AM62X SR1.0 Model: Texas Instruments AM625 SK EEPROM not available at 0x50, trying to read at 0x51 Board: AM62-SKEVM rev E3 DRAM: 2 GiB MMC: mmc@fa10000: 0, mmc@fa00000: 1, mmc@fa20000: 2 Loading Environment from MMC... OK In: serial@2800000 Out: serial@2800000 Err: serial@2800000 Net: eth0: ethernet@8000000port@1 switch to partitions #0, OK mmc1 is current device SD/MMC found on device 1 Failed to load 'boot.scr' 1575 bytes read in 4 ms (383.8 KiB/s) Loaded env from uEnv.txt Importing environment from mmc1 ... Running uenvcmd ... 1 bytes read in 3 ms (0 Bytes/s) Already setup. ## Error: "bootcmd_" not defined ## Error: "bootcmd_" not defined ## Error: "bootcmd_" not defined ## Error: "bootcmd_" not defined ## Error: "bootcmd_" not defined Hit any key to stop autoboot: 0 Verify GPT: success! Loading Android boot partition... switch to partitions #0, OK mmc0(part 0) is current device misc partition number:0x4 ANDROID: Booting slot: a A/B cmdline addition: androidboot.slot_suffix=_a Running without AVB... MMC read: dev # 0, block # 28672, count 81920 ... 81920 blocks read: OK Preparing FDT... Reading DTB for am62x_skevm... Running Android... ## Booting Android Image at 0x82000000 ... Kernel load addr 0x92000000 size 23893 KiB Kernel command line: no_console_suspend console=ttyS2,115200 printk.devkmsg=on androidboot.selinux=permig RAM disk load addr 0xe0000000 size 11145 KiB ## Flattened Device Tree blob at 88000000 Booting using the fdt blob at 0x88000000 Loading Kernel Image Loading Ramdisk to 8f51d000, end 8ffff2ad ... OK Loading Device Tree to 000000008f49a000, end 000000008f51cfff ... OK Starting kernel ... [ 0.000000] Booting Linux on physical CPU 0x0000000000 [0x410fd034] [ 0.000000] Linux version 5.10.109-android13-4-dirty (build-user@build-host) (Android (8508608, based2 [ 0.000000] Machine model: Texas Instruments AM625 SK [ 0.000000] efi: UEFI not found. [ 0.000000] Reserved memory: created DMA memory pool at 0x000000009cb00000, size 1 MiB [ 0.000000] OF: reserved mem: initialized node m4f-dma-memory@9cb00000, compatible id shared-dma-pool [ 0.000000] Reserved memory: created DMA memory pool at 0x000000009cc00000, size 15 MiB [ 0.000000] OF: reserved mem: initialized node m4f-memory@9cc00000, compatible id shared-dma-pool [ 0.000000] Reserved memory: created DMA memory pool at 0x000000009db00000, size 12 MiB [ 0.000000] OF: reserved mem: initialized node r5f-dma-memory@9db00000, compatible id shared-dma-pool [ 0.000000] Zone ranges: [ 0.000000] DMA [mem 0x0000000080000000-0x00000000ffffffff] [ 0.000000] DMA32 empty [ 0.000000] Normal empty [ 0.000000] Movable zone start for each node [ 0.000000] Early memory node ranges [ 0.000000] node 0: [mem 0x0000000080000000-0x000000009cafffff] [ 0.000000] node 0: [mem 0x000000009cb00000-0x000000009e6fffff] [ 0.000000] node 0: [mem 0x000000009e700000-0x000000009e77ffff] [ 0.000000] node 0: [mem 0x000000009e780000-0x000000009fffffff] [ 0.000000] node 0: [mem 0x00000000a0000000-0x00000000ffffffff] [ 0.000000] Initmem setup node 0 [mem 0x0000000080000000-0x00000000ffffffff] [ 0.000000] cma: Reserved 512 MiB at 0x00000000dd800000 [ 0.000000] psci: probing for conduit method from DT. [ 0.000000] psci: PSCIv1.1 detected in firmware. [ 0.000000] psci: Using standard PSCI v0.2 function IDs [ 0.000000] psci: Trusted OS migration not required [ 0.000000] psci: SMC Calling Convention v1.2 [ 0.000000] percpu: Embedded 32 pages/cpu s90392 r8192 d32488 u131072 [ 0.000000] Detected VIPT I-cache on CPU0 [ 0.000000] CPU features: detected: ARM erratum 845719 [ 0.000000] CPU features: detected: GIC system register CPU interface [ 0.000000] Built 1 zonelists, mobility grouping on. Total pages: 516096 [ 0.000000] Kernel command line: androidboot.serialno=0000000000000688 androidboot.slot_suffix=_a andg [ 0.000000] Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) [ 0.000000] Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) [ 0.000000] mem auto-init: stack:off, heap alloc:off, heap free:off [ 0.000000] Memory: 1434396K/2097152K available (14656K kernel code, 2004K rwdata, 5612K rodata, 1472) [ 0.000000] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 [ 0.000000] rcu: Preemptible hierarchical RCU implementation. [ 0.000000] rcu: RCU event tracing is enabled. [ 0.000000] rcu: RCU restricting CPUs from NR_CPUS=256 to nr_cpu_ids=4. [ 0.000000] Trampoline variant of Tasks RCU enabled. [ 0.000000] Tracing variant of Tasks RCU enabled. [ 0.000000] rcu: RCU calculated value of scheduler-enlistment delay is 25 jiffies. [ 0.000000] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 [ 0.000000] NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 [ 0.000000] GICv3: GIC: Using split EOI/Deactivate mode [ 0.000000] GICv3: 256 SPIs implemented [ 0.000000] GICv3: 0 Extended SPIs implemented [ 0.000000] GICv3: Distributor has no Range Selector support [ 0.000000] GICv3: 16 PPIs implemented [ 0.000000] GICv3: CPU0: found redistributor 0 region 0:0x0000000001880000 [ 0.000000] ITS [mem 0x01820000-0x0182ffff] [ 0.000000] GIC: enabling workaround for ITS: Socionext Synquacer pre-ITS [ 0.000000] ITS@0x0000000001820000: Devices Table too large, reduce ids 20->19 [ 0.000000] ITS@0x0000000001820000: allocated 524288 Devices @80800000 (flat, esz 8, psz 64K, shr 0) [ 0.000000] ITS: using cache flushing for cmd queue [ 0.000000] GICv3: using LPI property table @0x00000000800c0000 [ 0.000000] GIC: using cache flushing for LPI property table [ 0.000000] GICv3: CPU0: using allocated LPI pending table @0x00000000800d0000 [ 0.000000] random: get_random_bytes called from start_kernel+0x1d4/0x450 with crng_init=0 [ 0.000000] arch_timer: cp15 timer(s) running at 200.00MHz (phys). [ 0.000000] clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x2e2049d3e8, max_idle_s [ 0.000005] sched_clock: 56 bits at 200MHz, resolution 5ns, wraps every 4398046511102ns [ 0.000261] Console: colour dummy device 80x25 [ 0.000321] Calibrating delay loop (skipped), value calculated using timer frequency.. 400.00 BogoMIP) [ 0.000337] pid_max: default: 32768 minimum: 301 [ 0.000442] LSM: Security Framework initializing [ 0.000479] SELinux: Initializing. [ 0.000568] Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) [ 0.000592] Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) [ 0.002614] rcu: Hierarchical SRCU implementation. [ 0.002925] Platform MSI: msi-controller@1820000 domain created [ 0.003138] PCI/MSI: /bus@f0000/interrupt-controller@1800000/msi-controller@1820000 domain created [ 0.003238] EFI services will not be available. [ 0.003516] smp: Bringing up secondary CPUs ... [ 0.014905] Detected VIPT I-cache on CPU1 [ 0.014943] GICv3: CPU1: found redistributor 1 region 0:0x00000000018a0000 [ 0.014957] GICv3: CPU1: using allocated LPI pending table @0x00000000800e0000 [ 0.015020] CPU1: Booted secondary processor 0x0000000001 [0x410fd034] [ 0.026388] Detected VIPT I-cache on CPU2 [ 0.026415] GICv3: CPU2: found redistributor 2 region 0:0x00000000018c0000 [ 0.026427] GICv3: CPU2: using allocated LPI pending table @0x00000000800f0000 [ 0.026471] CPU2: Booted secondary processor 0x0000000002 [0x410fd034] [ 0.037734] Detected VIPT I-cache on CPU3 [ 0.037757] GICv3: CPU3: found redistributor 3 region 0:0x00000000018e0000 [ 0.037768] GICv3: CPU3: using allocated LPI pending table @0x0000000080100000 [ 0.037806] CPU3: Booted secondary processor 0x0000000003 [0x410fd034] [ 0.037894] smp: Brought up 1 node, 4 CPUs [ 0.037933] SMP: Total of 4 processors activated. [ 0.037940] CPU features: detected: 32-bit EL0 Support [ 0.037948] CPU features: detected: CRC32 instructions [ 0.047313] CPU: All CPU(s) started at EL2 [ 0.047344] alternatives: patching kernel code [ 0.054949] KASLR disabled due to lack of seed [ 0.055198] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100s [ 0.055217] futex hash table entries: 1024 (order: 4, 65536 bytes, linear) [ 0.080139] pinctrl core: initialized pinctrl subsystem [ 0.080841] DMI not present or invalid. [ 0.081341] NET: Registered protocol family 16 [ 0.083439] DMA: preallocated 256 KiB GFP_KERNEL pool for atomic allocations [ 0.083736] DMA: preallocated 256 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations [ 0.083826] audit: initializing netlink subsys (disabled) [ 0.084045] audit: type=2000 audit(0.060:1): state=initialized audit_enabled=0 res=1 [ 0.084657] thermal_sys: Registered thermal governor 'step_wise' [ 0.084662] thermal_sys: Registered thermal governor 'power_allocator' [ 0.085129] hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. [ 0.085266] ASID allocator initialised with 65536 entries [ 0.108762] HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages [ 0.108783] HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages [ 0.108790] HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages [ 0.108797] HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages [ 0.113507] k3-chipinfo 43000014.chipid: Family:AM62X rev:SR1.0 JTAGID[0x0bb7e02f] Detected [ 0.114032] vcc_5v0: supplied by vmain_pd [ 0.114578] vcc_3v3_sys: supplied by vmain_pd [ 0.115160] vcc_1v8: supplied by vcc_3v3_sys [ 0.116040] iommu: Default domain type: Translated [ 0.116456] SCSI subsystem initialized [ 0.116679] usbcore: registered new interface driver usbfs [ 0.116722] usbcore: registered new interface driver hub [ 0.116757] usbcore: registered new device driver usb [ 0.117091] mc: Linux media interface: v0.10 [ 0.117119] videodev: Linux video capture interface: v2.00 [ 0.117187] pps_core: LinuxPPS API ver. 1 registered [ 0.117194] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti [ 0.117211] PTP clock support registered [ 0.117249] EDAC MC: Ver: 3.0.0 [ 0.118115] omap-mailbox 29000000.mailbox: omap mailbox rev 0x66fc9100 [ 0.118625] FPGA manager framework [ 0.118739] Advanced Linux Sound Architecture Driver Initialized. [ 0.119701] clocksource: Switched to clocksource arch_sys_counter [ 0.202691] VFS: Disk quotas dquot_6.6.0 [ 0.202771] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [ 0.206479] NET: Registered protocol family 2 [ 0.206732] IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) [ 0.208109] tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) [ 0.208151] TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) [ 0.208283] TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) [ 0.208523] TCP: Hash tables configured (established 16384 bind 16384) [ 0.208722] UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) [ 0.208775] UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) [ 0.208952] NET: Registered protocol family 1 [ 0.208987] PCI: CLS 0 bytes, default 64 [ 0.209267] Trying to unpack rootfs image as initramfs... [ 0.662234] Freeing initrd memory: 11144K [ 0.663225] hw perfevents: enabled with armv8_cortex_a53 PMU driver, 7 counters available [ 0.666672] Initialise system trusted keyrings [ 0.666926] workingset: timestamp_bits=46 max_order=19 bucket_order=0 [ 0.671775] squashfs: version 4.0 (2009/01/31) Phillip Lougher [ 0.671972] fuse: init (API version 7.32) [ 0.672192] 9p: Installing v9fs 9p2000 file system support [ 0.704976] Key type asymmetric registered [ 0.704997] Asymmetric key parser 'x509' registered [ 0.705070] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 243) [ 0.705079] io scheduler mq-deadline registered [ 0.705086] io scheduler kyber registered [ 0.707006] pinctrl-single 4084000.pinctrl: 34 pins, size 136 [ 0.707528] pinctrl-single f4000.pinctrl: 171 pins, size 684 [ 0.709899] pwm-backlight backlight: supply power not found, using dummy regulator [ 0.713299] Serial: 8250/16550 driver, 10 ports, IRQ sharing enabled [ 0.716592] panel-lvds display0: [skyla] panel_lvds_probe [ 0.716611] (NULL device *): [skyla] devm_kzalloc pass [ 0.716618] panel-lvds display0: [skyla] lvds->width: 0 [ 0.716625] panel-lvds display0: [skyla] lvds->height: 0 [ 0.716632] panel-lvds display0: [skyla] lvds->label: (null) [ 0.716666] panel-lvds display0: [skyla] panel_lvds_parse_dt: 0 [ 0.726728] brd: module loaded [ 0.732754] loop: module loaded [ 0.733336] megasas: 07.714.04.00-rc1 [ 0.737594] tun: Universal TUN/TAP device driver, 1.6 [ 0.737967] igbvf: Intel(R) Gigabit Virtual Function Network Driver [ 0.737973] igbvf: Copyright (c) 2009 - 2012 Intel Corporation. [ 0.738055] sky2: driver version 1.30 [ 0.738711] PPP generic driver version 2.4.2 [ 0.738806] PPP BSD Compression module registered [ 0.738813] PPP Deflate Compression module registered [ 0.738847] PPP MPPE Compression module registered [ 0.738854] NET: Registered protocol family 24 [ 0.738859] PPTP driver version 0.8.5 [ 0.739278] VFIO - User Level meta-driver version: 0.3 [ 0.740112] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver [ 0.740126] ehci-pci: EHCI PCI platform driver [ 0.740158] ehci-platform: EHCI generic platform driver [ 0.740291] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver [ 0.740344] ohci-pci: OHCI PCI platform driver [ 0.740380] ohci-platform: OHCI generic platform driver [ 0.740569] usbcore: registered new interface driver usb-storage [ 0.740998] usbcore: registered new interface driver xpad [ 0.741028] usbcore: registered new interface driver usb_acecad [ 0.741057] usbcore: registered new interface driver aiptek [ 0.741085] usbcore: registered new interface driver gtco [ 0.741116] usbcore: registered new interface driver hanwang [ 0.741144] usbcore: registered new interface driver kbtab [ 0.741150] sis_ts_init ver. 3.01.03 [ 0.741881] i2c /dev entries driver [ 0.742694] device-mapper: uevent: version 1.0.3 [ 0.742840] device-mapper: ioctl: 4.44.0-ioctl (2021-02-01) initialised: dm-devel@redhat.com [ 0.743439] sdhci: Secure Digital Host Controller Interface driver [ 0.743447] sdhci: Copyright(c) Pierre Ossman [ 0.743779] sdhci-pltfm: SDHCI platform and OF driver helper [ 0.744864] ledtrig-cpu: registered to indicate activity on CPUs [ 0.745306] SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... [ 0.745366] hid: raw HID events driver (C) Jiri Kosina [ 0.747465] usbcore: registered new interface driver usbhid [ 0.747474] usbhid: USB HID core driver [ 0.747800] ashmem: initialized [ 0.749132] optee: probing for conduit method. [ 0.749174] optee: revision 3.12 (cac3fef2) [ 0.749534] optee: initialized driver [ 0.751137] netem: version 1.3 [ 0.751153] u32 classifier [ 0.751158] input device check on [ 0.751163] Actions configured [ 0.752197] xt_time: kernel timezone is -0000 [ 0.752340] gre: GRE over IPv4 demultiplexor driver [ 0.752347] IPv4 over IPsec tunneling driver [ 0.753189] Initializing XFRM netlink socket [ 0.753221] IPsec XFRM device driver [ 0.753579] NET: Registered protocol family 10 [ 0.754685] Segment Routing with IPv6 [ 0.754776] mip6: Mobile IPv6 [ 0.755515] sit: IPv6, IPv4 and MPLS over IPv4 tunneling driver [ 0.756406] NET: Registered protocol family 17 [ 0.756435] NET: Registered protocol family 15 [ 0.756468] l2tp_core: L2TP core driver, V2.0 [ 0.756480] l2tp_ppp: PPPoL2TP kernel driver, V2.0 [ 0.756581] 9pnet: Installing 9P2000 support [ 0.756974] registered taskstats version 1 [ 0.756995] Loading compiled-in X.509 certificates [ 0.757294] Key type ._fscrypt registered [ 0.757302] Key type .fscrypt registered [ 0.757308] Key type fscrypt-provisioning registered [ 0.762968] pwm-backlight backlight: supply power not found, using dummy regulator [ 0.765201] panel-lvds display0: [skyla] panel_lvds_probe [ 0.765222] (NULL device *): [skyla] devm_kzalloc pass [ 0.765230] panel-lvds display0: [skyla] lvds->width: 0 [ 0.765237] panel-lvds display0: [skyla] lvds->height: 0 [ 0.765244] panel-lvds display0: [skyla] lvds->label: (null) [ 0.765279] panel-lvds display0: [skyla] panel_lvds_parse_dt: 0 [ 0.769283] ti-sci 44043000.system-controller: ti,ctx-memory-region is required for suspend but not p. [ 0.769301] ti-sci 44043000.system-controller: ti_sci_init_suspend failed, mem suspend will be non-fu. [ 0.769311] ti-sci 44043000.system-controller: ABI: 3.1 (firmware rev 0x0008 '8.3.2--v08.03.02 (Jolly) [ 1.288420] davinci-mcasp 2b10000.mcasp: IRQ common not found [ 1.348476] omap_i2c 20000000.i2c: bus 0 rev0.12 at 400 kHz [ 1.355859] omap_i2c 20010000.i2c: bus 1 rev0.12 at 100 kHz [ 1.356654] ti-sci-intr 4210000.interrupt-controller: Interrupt Router 5 domain created [ 1.356815] ti-sci-intr bus@f0000:interrupt-controller@a00000: Interrupt Router 3 domain created [ 1.357088] ti-sci-inta 48000000.interrupt-controller: Interrupt Aggregator domain 28 created [ 1.358228] pwm-backlight backlight: supply power not found, using dummy regulator [ 1.384193] ti-bcdma 485c0100.dma-controller: Number of rings: 82 [ 1.386331] ti-bcdma 485c0100.dma-controller: Channels: 48 (bchan: 18, tchan: 12, rchan: 18) [ 1.389159] ti-pktdma 485c0000.dma-controller: Number of rings: 150 [ 1.389718] random: fast init done [ 1.393225] ti-pktdma 485c0000.dma-controller: Channels: 35 (tchan: 20, rchan: 15) [ 1.396184] printk: console [ttyS2] disabled [ 1.396265] 2800000.serial: ttyS2 at MMIO 0x2800000 (irq = 19, base_baud = 3000000) is a 8250 [ 2.905755] printk: console [ttyS2] enabled [ 2.911659] 2850000.serial: ttyS5 at MMIO 0x2850000 (irq = 20, base_baud = 3000000) is a 8250 [ 2.920908] panel-lvds display0: [skyla] panel_lvds_probe [ 2.926406] (NULL device *): [skyla] devm_kzalloc pass [ 2.931626] panel-lvds display0: [skyla] lvds->width: 0 [ 2.936931] panel-lvds display0: [skyla] lvds->height: 0 [ 2.942321] panel-lvds display0: [skyla] lvds->label: (null) [ 2.948085] panel-lvds display0: [skyla] panel_lvds_parse_dt: 0 [ 2.965553] tidss 30200000.dss: [skyla] print: dispc_init [ 2.971024] tidss 30200000.dss: [skyla] Enter dispc_softreset [ 2.976958] tidss 30200000.dss: [skyla] dispc_init_am65x_oldi_io_ctrl: ti,am625-oldi-io-ctrl [ 2.985480] tidss 30200000.dss: DSS fclk 250000000 Hz [ 3.044144] [drm] Initialized tidss 1.0.0 20180215 for 30200000.dss on minor 0 [ 3.051383] tidss 30200000.dss: [drm] Device has not been registered. [ 3.057816] tidss 30200000.dss: [drm] fb_helper is already set! [ 3.063860] tidss 30200000.dss: [drm] [skyla][drm_fb_helper.c] Enter drm_fb_helper_single_fb_probe [ 3.072809] tidss 30200000.dss: [drm] [skyla][drm_fb_helper.c] Enter client->name: fbdev [ 3.080888] tidss 30200000.dss: [drm] [skyla][drm_fb_helper.c] Enter drm_client_for_each_connector_itr [ 3.090269] tidss 30200000.dss: [drm] [skyla][drm_fb_helper.c] Enter drm_client_for_each_modeset [ 3.099043] tidss 30200000.dss: [drm] [skyla][drm_fb_helper.c] Enter drm_client_for_each_modeset [ 3.107816] tidss 30200000.dss: [drm] [skyla][drm_fb_helper.c] desired_mode->hdisplay: 1024 [ 3.116164] tidss 30200000.dss: [drm] [skyla][drm_fb_helper.c] desired_mode->vdisplay: 600 [ 3.124417] tidss 30200000.dss: [drm] [skyla][drm_fb_helper.c] x: 0 [ 3.130675] tidss 30200000.dss: [drm] [skyla][drm_fb_helper.c] y: 0 [ 3.136932] tidss 30200000.dss: [drm] [skyla][drm_fb_helper.c] print crtc_count: 1 [ 3.144490] tidss 30200000.dss: [drm] [skyla][drm_fb_helper.c] print sizes.fb_width: 1024 [ 3.152655] tidss 30200000.dss: [drm] [skyla][drm_fb_helper.c] print sizes.fb_height: 600 [ 3.191206] tidss 30200000.dss: [skyla] Enter: dispc_oldi_tx_power [ 3.191213] tidss 30200000.dss: [skyla] dispc->feat->subrev: 3 [ 3.191218] tidss 30200000.dss: [skyla] power: 1 [ 3.191222] tidss 30200000.dss: [skyla] dispc->oldi_mode: 1 [ 3.191227] tidss 30200000.dss: [skyla] OLDI_SINGLE_LINK_SINGLE_MODE_0 [ 3.191241] tidss 30200000.dss: dispc_enable_oldi: [skyla] print dispc->oldi_mode: 24 . [ 3.212584] graphics fb0: [fbmem.c] skyla Print depth: (efault)! [ 3.212589] [fbmem.c] skyla Print depth: (efault)! [ 3.212593] skyla Print nologo: (null)! [ 3.212596] skyla Print logos_freed: (null)! [ 3.212599] skyla Print depth: (efault)! [ 3.212604] graphics fb0: [fbmem.c] skyla pirnt fb_logo.logo: ! [ 3.231755] Console: switching to colour frame buffer device 128x37 [ 3.322527] tidss 30200000.dss: [drm] fb0: tidssdrmfb frame buffer device [ 3.348946] spi-nor spi0.0: s28hs512t (65536 Kbytes) [ 3.353990] 7 fixed-partitions partitions found on MTD device fc40000.spi.0 [ 3.360943] Creating 7 MTD partitions on "fc40000.spi.0": [ 3.366337] 0x000000000000-0x000000080000 : "ospi.tiboot3" [ 3.376707] 0x000000080000-0x000000280000 : "ospi.tispl" [ 3.384687] 0x000000280000-0x000000680000 : "ospi.u-boot" [ 3.392600] 0x000000680000-0x0000006c0000 : "ospi.env" [ 3.400600] 0x0000006c0000-0x000000700000 : "ospi.env.backup" [ 3.408585] 0x000000800000-0x000003fc0000 : "ospi.rootfs" [ 3.416583] 0x000003fc0000-0x000004000000 : "ospi.phypattern" [ 3.491733] davinci_mdio 8000f00.mdio: davinci mdio revision 9.7, bus freq 1000000 [ 3.502517] davinci_mdio 8000f00.mdio: phy[0]: device 8000f00.mdio:00, driver TI DP83867 [ 3.510618] davinci_mdio 8000f00.mdio: phy[1]: device 8000f00.mdio:01, driver TI DP83867 [ 3.518915] am65-cpsw-nuss 8000000.ethernet: initializing am65 cpsw nuss version 0x6BA01103, cpsw ver2 [ 3.533294] am65-cpsw-nuss 8000000.ethernet: set new flow-id-base 19 [ 3.540091] am65-cpsw-nuss 8000000.ethernet: initialized cpsw ale version 1.5 [ 3.547224] am65-cpsw-nuss 8000000.ethernet: ALE Table size 512 [ 3.559260] am65-cpsw-nuss 8000000.ethernet: CPTS ver 0x4e8a010c, freq:500000000, add_val:1 pps:0 [ 3.583857] rtc-ti-k3 2b1f0000.rtc: registered as rtc0 [ 3.589036] rtc-ti-k3 2b1f0000.rtc: setting system clock to 1970-01-01T00:00:11 UTC (11) [ 3.640760] davinci-mcasp 2b10000.mcasp: IRQ common not found [ 3.683398] mmc0: CQHCI version 5.10 [ 3.727774] mmc0: SDHCI controller on fa10000.mmc [fa10000.mmc] using ADMA 64-bit [ 3.735722] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 3.782876] reg-fixed-voltage regulator-6: Failed to register regulator: -517 [ 3.802610] pca953x 1-0022: supply vcc not found, using dummy regulator [ 3.809404] pca953x 1-0022: using AI [ 3.824913] mmc0: Command Queue Engine enabled [ 3.829400] mmc0: new HS200 MMC card at address 0001 [ 3.835149] mmcblk0: mmc0:0001 S0J56X 14.8 GiB [ 3.840012] mmcblk0boot0: mmc0:0001 S0J56X partition 1 31.5 MiB [ 3.842244] vdd_mmc1: supplied by vcc_3v3_sys [ 3.846217] mmcblk0boot1: mmc0:0001 S0J56X partition 2 31.5 MiB [ 3.852511] wlan_lten: supplied by vcc_3v3_sys [ 3.856335] mmcblk0rpmb: mmc0:0001 S0J56X partition 3 4.00 MiB, chardev (236:0) [ 3.861676] wlan_en: supplied by wlan_lten [ 3.871431] mmcblk0: p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 p13 [ 3.873123] sis_ts_probe [ 3.873178] mmc1: CQHCI version 5.10 [ 3.878790] mmc2: CQHCI version 5.10 [ 3.888587] sis_95xx_ts 0-005c: get reset pin ok [ 3.893220] sis_reset: reset [ 3.911698] sis_reset: reset low [ 3.915051] mmc1: SDHCI controller on fa00000.mmc [fa00000.mmc] using ADMA 64-bit [ 3.929410] mmc2: SDHCI controller on fa20000.mmc [fa20000.mmc] using ADMA 64-bit [ 3.942376] sdhci-am654 fa20000.mmc: card claims to support voltages below defined range [ 3.962624] mmc2: new high speed SDIO card at address 0001 [ 3.977255] mmc1: new high speed SDHC card at address 59b4 [ 3.983493] mmcblk1: mmc1:59b4 SD 7.36 GiB [ 3.989894] mmcblk1: p1 [ 4.019709] sis_reset: reset high [ 4.023269] input: sis_touch as /devices/virtual/input/input0 [ 4.029100] sis_ts_irq=462 [ 4.031881] sis_ts_probe: Start touchscreen sis_touch in interrupt mode [ 4.038488] sis_setup_chardev. [ 4.041549] sis_hydra_touch_device driver(major 510) installed. [ 4.047528] sis SIS_SLAVE_ADDR: 5c [ 4.051942] debugfs: Directory 'pd:182' with parent 'pm_genpd' already present! [ 4.228222] ALSA device list: [ 4.231209] No soundcards found. [ 4.236131] Freeing unused kernel memory: 1472K [ 4.240804] Run /init as init process [ 4.319775] init: init first stage started! [ 4.324238] init: Unable to open /lib/modules, skipping module loading. [ 4.331254] init: Copied ramdisk prop to /second_stage_resources/system/etc/ramdisk/build.prop [ 4.340472] init: Switching root to '/first_stage_ramdisk' [ 4.346625] init: [libfs_mgr]ReadFstabFromDt(): failed to read fstab from dt [ 4.354625] init: Using Android DT directory /proc/device-tree/firmware/android/ [ 4.404552] random: init: uninitialized urandom read (16 bytes read) [ 4.412500] init: [libfs_mgr]Created logical partition system_a on device /dev/block/dm-0 [ 4.420765] init: [libfs_mgr]Skipping zero-length logical partition: system_b [ 4.428132] random: init: uninitialized urandom read (16 bytes read) [ 4.435726] init: [libfs_mgr]Created logical partition vendor_a on device /dev/block/dm-1 [ 4.443936] init: [libfs_mgr]Skipping zero-length logical partition: vendor_b [ 4.451160] init: DSU not detected, proceeding with normal boot [ 4.460742] init: [libfs_mgr]superblock s_max_mnt_count:65535,/dev/block/dm-0 [ 4.470942] EXT4-fs (dm-0): mounted filesystem without journal. Opts: errors=panic [ 4.478743] init: [libfs_mgr]__mount(source=/dev/block/dm-0,target=/system,type=ext4)=0: Success [ 4.488246] init: Switching root to '/system' [ 4.498883] init: [libfs_mgr]superblock s_max_mnt_count:65535,/dev/block/dm-1 [ 4.509288] EXT4-fs (dm-1): mounted filesystem without journal. Opts: errors=panic [ 4.517057] init: [libfs_mgr]__mount(source=/dev/block/dm-1,target=/vendor,type=ext4)=0: Success [ 4.548995] init: Skipped setting INIT_AVB_VERSION (not in recovery mode) [ 4.580659] random: init: uninitialized urandom read (40 bytes read) [ 4.751422] init: DM_DEV_STATUS failed for system_ext_a: No such device or address [ 4.759087] init: Could not update logical partition [ 4.764328] init: DM_DEV_STATUS failed for product_a: No such device or address [ 4.771655] init: Could not update logical partition [ 4.776700] init: Opening SELinux policy [ 4.790627] init: Loading SELinux policy [ 4.824283] SELinux: Permission nlmsg_getneigh in class netlink_route_socket not defined in policy. [ 4.833581] SELinux: Permission bpf in class capability2 not defined in policy. [ 4.841000] SELinux: Permission checkpoint_restore in class capability2 not defined in policy. [ 4.849715] SELinux: Permission bpf in class cap2_userns not defined in policy. [ 4.857236] SELinux: Permission checkpoint_restore in class cap2_userns not defined in policy. [ 4.866103] SELinux: Class rpmsg_socket not defined in policy. [ 4.872065] SELinux: the above unknown classes and permissions will be denied [ 4.889011] SELinux: policy capability network_peer_controls=1 [ 4.895041] SELinux: policy capability open_perms=1 [ 4.900002] SELinux: policy capability extended_socket_class=1 [ 4.905936] SELinux: policy capability always_check_network=0 [ 4.911841] SELinux: policy capability cgroup_seclabel=0 [ 4.917279] SELinux: policy capability nnp_nosuid_transition=1 [ 4.923249] SELinux: policy capability genfs_seclabel_symlinks=0 [ 5.063804] audit: type=1403 audit(12.972:2): auid=4294967295 ses=4294967295 lsm=selinux res=1 [ 5.101485] selinux: SELinux: Loaded file_contexts [ 5.106369] selinux: [ 5.193072] init: init second stage started! [ 5.253211] init: Using Android DT directory /proc/device-tree/firmware/android/ [ 5.265717] init: Overriding previous property 'persist.sys.usb.config':'none' with new value 'adb' [ 5.275898] init: Overriding previous property 'persist.sys.usb.config':'adb' with new value 'none' [ 5.285134] init: Couldn't load property file '/vendor/default.prop': open() failed: No such file or y [ 5.300619] init: Overriding previous property 'dalvik.vm.usejit':'true' with new value 'false' [ 5.312376] init: Couldn't load property file '/odm_dlkm/etc/build.prop': open() failed: No such filey [ 5.329705] init: Setting product property ro.product.brand to 'TI' (from ro.product.product.brand) [ 5.338838] init: Setting product property ro.product.device to 'am62x' (from ro.product.product.devi) [ 5.348398] init: Setting product property ro.product.manufacturer to 'Texas Instruments' (from ro.pr) [ 5.359997] init: Setting product property ro.product.model to 'AOSP on AM62X EVM' (from ro.product.p) [ 5.370369] init: Setting product property ro.product.name to 'am62x' (from ro.product.product.name) [ 5.379871] init: Setting property 'ro.build.fingerprint' to 'TI/am62x/am62x:12/SP1A.211105.004/eng.r' [ 5.392678] init: Setting property 'ro.product.cpu.abilist' to 'arm64-v8a,armeabi-v7a,armeabi' [ 5.401326] init: Setting property 'ro.product.cpu.abilist32' to 'armeabi-v7a,armeabi' [ 5.409270] init: Setting property 'ro.product.cpu.abilist64' to 'arm64-v8a' [ 5.421161] selinux: SELinux: Loaded file_contexts [ 5.426069] selinux: [ 5.428424] init: Running restorecon... [ 5.452251] selinux: SELinux: Could not get canonical path for /metadata/ota/rollback-indicator resto. [ 5.464407] selinux: [ 5.466694] selinux: SELinux: Could not get canonical path for /metadata/gsi restorecon: No such file. [ 5.477124] selinux: [ 5.480786] init: Created socket '/dev/socket/property_service', mode 666, user 0, group 0 [ 5.496335] init: SetupMountNamespaces done [ 5.503482] init: Forked subcontext for 'u:r:vendor_init:s0' with pid 165 [ 5.513915] init: Parsing file /system/etc/init/hw/init.rc... [ 5.521442] init: Added '/init.environ.rc' to import list [ 5.527158] init: Added '/system/etc/init/hw/init.usb.rc' to import list [ 5.534086] init: Added '/init.am62x.rc' to import list [ 5.539475] init: Added '/vendor/etc/init/hw/init.am62x.rc' to import list [ 5.546407] init: Added '/system/etc/init/hw/init.usb.configfs.rc' to import list [ 5.553950] init: Added '/system/etc/init/hw/init.zygote64_32.rc' to import list [ 5.565484] init: Parsing file /init.environ.rc... [ 5.571294] init: Parsing file /system/etc/init/hw/init.usb.rc... [ 5.578617] init: Parsing file /init.am62x.rc... [ 5.583349] init: Unable to read config file '/init.am62x.rc': open() failed: No such file or directoy [ 5.593918] init: Parsing file /vendor/etc/init/hw/init.am62x.rc... [ 5.603025] init: Parsing file /system/etc/init/hw/init.usb.configfs.rc... [ 5.611480] init: Parsing file /system/etc/init/hw/init.zygote64_32.rc... [ 5.619115] init: Parsing directory /system/etc/init... [ 5.624893] init: Parsing file /system/etc/init/android.hidl.allocator@1.0-service.rc... [ 5.633732] init: Parsing file /system/etc/init/android.system.suspend@1.0-service.rc... [ 5.642418] init: Parsing file /system/etc/init/apexd.rc... [ 5.648556] init: Parsing file /system/etc/init/atrace.rc... [ 5.656639] init: Parsing file /system/etc/init/atrace_userdebug.rc... [ 5.663939] init: Parsing file /system/etc/init/audioserver.rc... [ 5.670840] init: Parsing file /system/etc/init/blank_screen.rc... [ 5.677705] init: Parsing file /system/etc/init/bootanim.rc... [ 5.684061] init: Parsing file /system/etc/init/bootstat-debug.rc... [ 5.690854] init: Parsing file /system/etc/init/bootstat.rc... [ 5.697463] init: Parsing file /system/etc/init/bpfloader.rc... [ 5.704087] init: Parsing file /system/etc/init/cameraserver.rc... [ 5.710846] init: Parsing file /system/etc/init/clean_scratch_files.rc... [ 5.718129] init: Parsing file /system/etc/init/cppreopts.rc... [ 5.724684] init: Parsing file /system/etc/init/credstore.rc... [ 5.731133] init: Parsing file /system/etc/init/drmserver.rc... [ 5.737520] init: Parsing file /system/etc/init/dumpstate.rc... [ 5.743975] init: Parsing file /system/etc/init/flags_health_check.rc... [ 5.751187] init: Parsing file /system/etc/init/gatekeeperd.rc... [ 5.757727] init: Parsing file /system/etc/init/gpuservice.rc... [ 5.764175] init: Parsing file /system/etc/init/gsid.rc... [ 5.770262] init: Parsing file /system/etc/init/heapprofd.rc... [ 5.776873] init: Parsing file /system/etc/init/hwservicemanager.rc... [ 5.783982] init: Parsing file /system/etc/init/idmap2d.rc... [ 5.790182] init: Parsing file /system/etc/init/incidentd.rc... [ 5.796609] init: Parsing file /system/etc/init/init-debug.rc... [ 5.803155] init: Parsing file /system/etc/init/installd.rc... [ 5.809899] init: Parsing file /system/etc/init/iorapd.rc... [ 5.816203] init: Parsing file /system/etc/init/keystore2.rc... [ 5.822627] init: Parsing file /system/etc/init/llkd-debuggable.rc... [ 5.829700] init: Parsing file /system/etc/init/llkd.rc... [ 5.835860] init: Parsing file /system/etc/init/lmkd.rc... [ 5.841861] init: Parsing file /system/etc/init/logcatd.rc... [ 5.848447] init: Parsing file /system/etc/init/logd.rc... [ 5.854578] init: Parsing file /system/etc/init/logtagd.rc... [ 5.860845] init: Parsing file /system/etc/init/lpdumpd.rc... [ 5.867181] init: Parsing file /system/etc/init/mdnsd.rc... [ 5.873260] init: Parsing file /system/etc/init/mediaextractor.rc... [ 5.880132] init: Parsing file /system/etc/init/mediametrics.rc... [ 5.886766] init: Parsing file /system/etc/init/mediaserver.rc... [ 5.893339] init: Parsing file /system/etc/init/mtpd.rc... [ 5.899342] init: Parsing file /system/etc/init/netd.rc... [ 5.905358] init: Parsing file /system/etc/init/odsign.rc... [ 5.911482] init: Parsing file /system/etc/init/otapreopt.rc... [ 5.917900] init: Parsing file /system/etc/init/perfetto.rc... [ 5.924516] init: Parsing file /system/etc/init/profcollectd.rc... [ 5.931332] init: Parsing file /system/etc/init/racoon.rc... [ 5.937512] init: Parsing file /system/etc/init/recovery-persist.rc... [ 5.944496] init: Parsing file /system/etc/init/recovery-refresh.rc... [ 5.951465] init: Parsing file /system/etc/init/rss_hwm_reset.rc... [ 5.958207] init: Parsing file /system/etc/init/servicemanager.rc... [ 5.965089] init: Parsing file /system/etc/init/snapuserd.rc... [ 5.971508] init: Parsing file /system/etc/init/storaged.rc... [ 5.977908] init: Parsing file /system/etc/init/surfaceflinger.rc... [ 5.984876] init: Parsing file /system/etc/init/tombstoned.rc... [ 5.991390] init: Parsing file /system/etc/init/traced_perf.rc... [ 5.998109] init: Parsing file /system/etc/init/uncrypt.rc... [ 6.004419] init: Parsing file /system/etc/init/update_engine.rc... [ 6.011182] init: Parsing file /system/etc/init/update_verifier.rc... [ 6.018164] init: Parsing file /system/etc/init/usbd.rc... [ 6.024143] init: Parsing file /system/etc/init/vdc.rc... [ 6.030020] init: Parsing file /system/etc/init/vendor-464xlat.rc... [ 6.036864] init: Parsing file /system/etc/init/vold.rc... [ 6.042822] init: Parsing file /system/etc/init/wait_for_keymaster.rc... [ 6.049993] init: Parsing file /system/etc/init/wifi.rc... [ 6.056337] init: Parsing file /system/etc/init/wificond.rc... [ 6.062862] init: Parsing directory /system_ext/etc/init... [ 6.068583] init: Parsing file /system_ext/etc/init/init.gsi.rc... [ 6.075345] init: Added '/system/system_ext/etc/init/init.vndk-31.rc' to import list [ 6.083163] init: Parsing file /system/system_ext/etc/init/init.vndk-31.rc... [ 6.090365] init: Unable to read config file '/system/system_ext/etc/init/init.vndk-31.rc': open() fay [ 6.102285] init: Parsing file /system_ext/etc/init/init.vndk-nodef.rc... [ 6.109540] init: Parsing directory /vendor/etc/init... [ 6.115016] init: Parsing file /vendor/etc/init/android.hardware.atrace@1.0-service.img.rc... [ 6.124246] init: Parsing file /vendor/etc/init/android.hardware.audio.service.rc... [ 6.132626] init: Parsing file /vendor/etc/init/android.hardware.boot@1.2-service.rc... [ 6.141171] init: Parsing file /vendor/etc/init/android.hardware.camera.provider@2.4-external-service. [ 6.151447] init: Parsing file /vendor/etc/init/android.hardware.cas@1.2-service.rc... [ 6.159883] init: Parsing file /vendor/etc/init/android.hardware.drm@1.4-service.clearkey.rc... [ 6.169273] init: Parsing file /vendor/etc/init/android.hardware.dumpstate@1.1-service.img.rc... [ 6.178548] init: Parsing file /vendor/etc/init/android.hardware.gatekeeper@1.0-service.software.rc... [ 6.188393] init: Parsing file /vendor/etc/init/android.hardware.graphics.allocator@4.0-service.img.r. [ 6.198547] init: Parsing file /vendor/etc/init/android.hardware.graphics.composer@2.4-service.rc... [ 6.208244] init: Parsing file /vendor/etc/init/android.hardware.health@2.1-service.rc... [ 6.216927] init: Parsing file /vendor/etc/init/android.hardware.keymaster@3.0-service.rc... [ 6.225895] init: Parsing file /vendor/etc/init/android.hardware.media.omx@1.0-service.rc... [ 6.234863] init: Parsing file /vendor/etc/init/android.hardware.memtrack.aidl.img.rc... [ 6.243397] init: Parsing file /vendor/etc/init/android.hardware.thermal@2.0-service.img.rc... [ 6.252547] init: Parsing file /vendor/etc/init/android.hardware.usb@1.2-service.generic.rc... [ 6.261733] init: Parsing file /vendor/etc/init/android.hardware.wifi.supplicant-service.rc... [ 6.270893] init: /vendor/etc/init/android.hardware.wifi.supplicant-service.rc: 8: Interface 'androidt [ 6.290585] init: /vendor/etc/init/android.hardware.wifi.supplicant-service.rc: 9: Interface 'androidt [ 6.310338] init: /vendor/etc/init/android.hardware.wifi.supplicant-service.rc: 3: ignored duplicate ' [ 6.322863] init: Parsing file /vendor/etc/init/boringssl_self_test.rc... [ 6.332513] init: Parsing file /vendor/etc/init/hostapd.android.rc... [ 6.339755] init: Parsing file /vendor/etc/init/init.am62x.usb.rc... [ 6.346757] init: Parsing file /vendor/etc/init/power-default.rc... [ 6.353563] init: Parsing file /vendor/etc/init/vendor_flash_recovery.rc... [ 6.361100] init: Parsing file /odm/etc/init... [ 6.365714] init: Unable to read config file '/odm/etc/init': open() failed: No such file or directory [ 6.375067] init: Parsing file /product/etc/init... [ 6.379973] init: Unable to read config file '/product/etc/init': open() failed: No such file or direy [ 6.390925] init: processing action (SetupCgroups) from (:0) [ 6.407317] init: processing action (SetKptrRestrict) from (:0) [ 6.415528] init: processing action (TestPerfEventSelinux) from (:0) [ 6.423408] init: Permissive SELinux boot, forcing sys.init.perf_lsm_hooks to 1. [ 6.431628] init: processing action (early-init) from (/system/etc/init/hw/init.rc:15) [ 6.443150] init: Command 'mkdir /acct/uid' action=early-init (/system/etc/init/hw/init.rc:30) took 1m [ 6.467269] init: starting service 'exec 1 (/system/bin/bootstrap/linkerconfig --target /linkerconfig. [ 6.481404] cgroup: init (1) created nested cgroup for controller "memory" which has incomplete hiera. [ 6.496229] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 6.512786] init: SVC_EXEC service 'exec 1 (/system/bin/bootstrap/linkerconfig --target /linkerconfig. [ 6.528514] init: Command 'exec -- /system/bin/bootstrap/linkerconfig --target /linkerconfig/bootstrad [ 6.546929] linkerconfig: Unable to access VNDK APEX at path: /apex/com.android.vndk.v31: No such fily [ 6.557571] linkerconfig: Unable to access VNDK APEX at path: /apex/com.android.vndk.v31: No such fily [ 6.573883] init: Service 'exec 1 (/system/bin/bootstrap/linkerconfig --target /linkerconfig/bootstras [ 6.588798] init: Sending signal 9 to service 'exec 1 (/system/bin/bootstrap/linkerconfig --target /l. [ 6.602765] libprocessgroup: Successfully killed process cgroup uid 0 pid 166 in 0ms [ 6.613987] init: starting service 'ueventd'... [ 6.629949] init: starting service 'apexd-bootstrap'... [ 6.646645] init: SVC_EXEC service 'apexd-bootstrap' pid 169 (uid 0 gid 1000+0 context default) start. [ 6.657484] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #282!!! [ 6.665707] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #10!!! [ 6.691776] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 6.699863] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 6.708236] ueventd: ueventd started! [ 6.716696] selinux: SELinux: Loaded file_contexts [ 6.721583] selinux: [ 6.724663] ueventd: Parsing file /system/etc/ueventd.rc... [ 6.731034] ueventd: Added '/vendor/etc/ueventd.rc' to import list [ 6.737274] ueventd: Added '/odm/etc/ueventd.rc' to import list [ 6.743944] ueventd: Parsing file /vendor/etc/ueventd.rc... [ 6.749587] ueventd: Unable to read config file '/vendor/etc/ueventd.rc': open() failed: No such filey [ 6.759977] ueventd: Parsing file /odm/etc/ueventd.rc... [ 6.765328] ueventd: Unable to read config file '/odm/etc/ueventd.rc': open() failed: No such file ory [ 6.775794] ueventd: Parsing file /vendor/ueventd.rc... [ 6.781967] ueventd: Parsing file /odm/ueventd.rc... [ 6.783465] apexd: Bootstrap subcommand detected [ 6.787042] ueventd: Unable to read config file '/odm/ueventd.rc': open() failed: No such file or diry [ 6.791708] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 6.801430] ueventd: Parsing file /ueventd.am62x.rc... [ 6.814596] ueventd: Unable to read config file '/ueventd.am62x.rc': open() failed: No such file or dy [ 6.815799] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 6.832668] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #82!!! [ 6.840804] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #282!!! [ 6.849016] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #282!!! [ 6.899770] ueventd: softdep lines in modules.softdep must have at least 4 entries [ 6.907393] ueventd: softdep lines in modules.softdep must have at least 4 entries [ 6.914971] ueventd: softdep lines in modules.softdep must have at least 4 entries [ 6.922546] ueventd: softdep lines in modules.softdep must have at least 4 entries [ 6.930120] ueventd: softdep lines in modules.softdep must have at least 4 entries [ 6.937696] ueventd: softdep lines in modules.softdep must have at least 4 entries [ 6.945269] ueventd: softdep lines in modules.softdep must have at least 4 entries [ 6.952842] ueventd: softdep lines in modules.softdep must have at least 4 entries [ 6.960417] ueventd: softdep lines in modules.softdep must have at least 4 entries [ 6.967991] ueventd: softdep lines in modules.softdep must have at least 4 entries [ 6.975563] ueventd: softdep lines in modules.softdep must have at least 4 entries [ 6.983144] ueventd: softdep lines in modules.softdep must have at least 4 entries [ 7.135163] ueventd: LoadWithAliases was unable to load of:NbacklightT(null)Cpwm-backlight [ 7.138094] ueventd: LoadWithAliases was unable to load of:Nregulator-4T(null)Cregulator-gpio [ 7.140761] ueventd: LoadWithAliases was unable to load of:Nl2-cache0T(null)Ccache [ 7.144492] ueventd: LoadWithAliases was unable to load of:Nregulator-0T(null)Cregulator-fixed [ 7.146091] ueventd: LoadWithAliases was unable to load mmc:block [ 7.155582] ueventd: LoadWithAliases was unable to load of:NopteeT(null)Clinaro,optee-tz [ 7.163196] ueventd: LoadWithAliases was unable to load platform:reg-dummy [ 7.171450] ueventd: LoadWithAliases was unable to load of:NpsciT(null)Carm,psci-1.0 [ 7.177267] ueventd: LoadWithAliases was unable to load platform:snd-soc-dummy [ 7.181344] ueventd: LoadWithAliases was unable to load of:NsysconT(null)CsysconCsimple-mfd [ 7.186349] ueventd: LoadWithAliases was unable to load of:Nregulator-7T(null)Cregulator-fixed [ 7.193559] ueventd: LoadWithAliases was unable to load of:Nregulator-2T(null)Cregulator-fixed [ 7.200609] ueventd: LoadWithAliases was unable to load of:NbusT(null)Csimple-bus [ 7.207439] ueventd: LoadWithAliases was unable to load of:Npower-controllerT(null)Cti,sci-pm-domain [ 7.208481] ueventd: Loading module /vendor/lib/modules/pvrsrvkm.ko with args '' [ 7.212315] ueventd: LoadWithAliases was unable to load platform:Fixed MDIO bus [ 7.215181] ueventd: LoadWithAliases was unable to load of:NledsT(null)Cgpio-leds [ 7.215546] ueventd: LoadWithAliases was unable to load of:NsramT(null)Cmmio-sram [ 7.218437] ueventd: LoadWithAliases was unable to load of:NmmcT(null)Cti,am62-sdhci [ 7.225982] ueventd: LoadWithAliases was unable to load of:Ni2cT(null)Cti,am64-i2cCti,omap4-i2c [ 7.234618] ueventd: LoadWithAliases was unable to load of:NspiT(null)Cti,am654-mcspiCti,omap4-mcspi [ 7.241609] ueventd: LoadWithAliases was unable to load of:NgpioT(null)Cti,tca6424 [ 7.257115] ueventd: LoadWithAliases was unable to load of:Ndss-oldi-io-ctrlT(null)Csyscon [ 7.267859] ueventd: Loading module /vendor/lib/modules/dwc3-am62.ko with args '' [ 7.272697] ueventd: LoadWithAliases was unable to load spi:spi-nor [ 7.288066] ueventd: LoadWithAliases was unable to load of:NphyT(null)Cti,am654-phy-gmii-sel [ 7.296040] pvrsrvkm: loading out-of-tree module taints kernel. [ 7.306840] ueventd: LoadWithAliases was unable to load of:NspiT(null)Cti,am654-ospiCcdns,qspi-nor [ 7.306844] ueventd: LoadWithAliases was unable to load of:Nclock-controllerT(null)Cti,k2g-sci-clk [ 7.311519] ueventd: LoadWithAliases was unable to load of:NbusT(null)Csimple-mfd [ 7.315490] ueventd: LoadWithAliases was unable to load of:Ninterrupt-controllerT(null)Cti,sci-inta [ 7.337904] ueventd: LoadWithAliases was unable to load of:Nreset-controllerT(null)Cti,sci-reset [ 7.346083] ueventd: LoadWithAliases was unable to load of:NethernetT(null)Cti,am642-cpsw-nuss [ 7.351931] ueventd: LoadWithAliases was unable to load of:NmcaspT(null)Cti,am33xx-mcasp-audio [ 7.360685] ueventd: LoadWithAliases was unable to load of:Nethernet-phyT(null) [ 7.370410] ueventd: Loading module /vendor/lib/modules/snd-soc-tlv320aic3x.ko with args '' [ 7.377036] ueventd: LoadWithAliases was unable to load of:NpinctrlT(null)Cpinctrl-single [ 7.383778] PVR_K: 172: Read BVNC 33.15.11.3 from HW device registers [ 7.398529] ueventd: Loading module /vendor/lib/modules/ti_k3_m4_remoteproc.ko with args '' [ 7.400555] PVR_K: 172: RGX Device registered with BVNC 33.15.11.3 [ 7.408155] ueventd: Loaded kernel module /vendor/lib/modules/dwc3-am62.ko [ 7.411824] ueventd: LoadWithAliases was unable to load of:NmailboxT(null)Cti,am654-secure-proxy [ 7.417065] ueventd: Loaded kernel module /vendor/lib/modules/snd-soc-tlv320aic3x.ko [ 7.417399] [drm] Initialized pvr 1.15.6133109 20170530 for fd00000.gpu on minor 1 [ 7.418273] ueventd: Loaded kernel module /vendor/lib/modules/pvrsrvkm.ko [ 7.421987] ueventd: LoadWithAliases was unable to load of:NgpioT(null)Cti,am64-gpioCti,keystone-gpio [ 7.428908] ueventd: LoadWithAliases was unable to load of:Nethernet-phyT(null) [ 7.433510] k3-m4-rproc 5000000.m4fss: assigned reserved memory node m4f-dma-memory@9cb00000 [ 7.437051] ueventd: LoadWithAliases was unable to load of:Ninterrupt-controllerT(null)Cti,sci-intr [ 7.440811] ueventd: LoadWithAliases was unable to load of:NspiT(null)Cti,am654-mcspiCti,omap4-mcspi [ 7.444562] ueventd: LoadWithAliases was unable to load of:NmmcT(null)Cti,am62-sdhci [ 7.450885] ueventd: LoadWithAliases was unable to load of:NbusT(null)Csimple-bus [ 7.452728] ueventd: LoadWithAliases was unable to load of:NmailboxT(null)Cti,am64-mailbox [ 7.454604] k3-m4-rproc 5000000.m4fss: configured M4 for remoteproc mode [ 7.455755] ueventd: LoadWithAliases was unable to load of:NclockT(null)Cti,am62-epwm-tbclkCsyscon [ 7.456358] ueventd: LoadWithAliases was unable to load mmc:block [ 7.458063] ueventd: LoadWithAliases was unable to load of:NbusT(null)Csimple-bus [ 7.458982] ueventd: LoadWithAliases was unable to load of:NgpioT(null)Cti,am64-gpioCti,keystone-gpio [ 7.462433] ueventd: LoadWithAliases was unable to load of:NgpioT(null)Cti,am64-gpioCti,keystone-gpio [ 7.464841] ueventd: LoadWithAliases was unable to load of:NspiT(null)Cti,am654-mcspiCti,omap4-mcspi [ 7.467436] ueventd: LoadWithAliases was unable to load of:Nsystem-controllerT(null)Cti,k2g-sci [ 7.469167] ueventd: Loading module /vendor/lib/modules/wlcore_sdio.ko with args '' [ 7.472759] ueventd: Loading module /vendor/lib/modules/videobuf2-dma-contig.ko with args '' [ 7.478155] k3-m4-rproc 5000000.m4fss: local reset is deasserted for device [ 7.481115] ueventd: LoadWithAliases was unable to load of:NdssT(null)Cti,am625-dss [ 7.486029] remoteproc remoteproc0: 5000000.m4fss is available [ 7.495563] ueventd: LoadWithAliases was unable to load of:NmmcT(null)Cti,am62-sdhci [ 7.502508] ueventd: Loaded kernel module /vendor/lib/modules/videobuf2-dma-contig.ko [ 7.503503] ueventd: Loaded kernel module /vendor/lib/modules/ti_k3_m4_remoteproc.ko [ 7.509576] remoteproc remoteproc0: Direct firmware load for am62-mcu-m4f0_0-fw failed with error -2 [ 7.511635] ueventd: Loading module /vendor/lib/modules/wlcore_sdio.ko with args '' [ 7.517989] ueventd: Loading module /vendor/lib/modules/j721e-csi2rx.ko with args '' [ 7.527283] ueventd: Loading module /vendor/lib/modules/pruss.ko with args '' [ 7.564707] ueventd: Loaded kernel module /vendor/lib/modules/wlcore_sdio.ko [ 7.566213] remoteproc remoteproc0: Falling back to sysfs fallback for: am62-mcu-m4f0_0-fw [ 7.568161] ueventd: LoadWithAliases was unable to load of:NtouchscreenT(null)Csis,9500-ts [ 7.571443] ueventd: LoadWithAliases was unable to load of:NserialT(null)Cti,am64-uartCti,am654-uart [ 7.573820] ueventd: LoadWithAliases was unable to load of:NbusT(null)Csimple-bus [ 7.579022] ueventd: LoadWithAliases was unable to load of:Ndisplay0T(null)Cpanel-lvds [ 7.581337] ueventd: Loading module /vendor/lib/modules/roles.ko with args '' [ 7.592373] ueventd: Loading module /vendor/lib/modules/crct10dif-ce.ko with args '' [ 7.612049] ueventd: Loaded kernel module /vendor/lib/modules/pruss.ko [ 7.620821] ueventd: Loaded kernel module /vendor/lib/modules/j721e-csi2rx.ko [ 7.625678] ueventd: Loaded kernel module /vendor/lib/modules/roles.ko [ 7.628676] ueventd: LoadWithAliases was unable to load of:Ni2cT(null)Cti,am64-i2cCti,omap4-i2c [ 7.634049] ueventd: LoadWithAliases was unable to load of:NchipidT(null)Cti,am654-chipid [ 7.638092] ueventd: LoadWithAliases was unable to load of:Ndma-controllerT(null)Cti,am64-dmss-pktdma [ 7.641655] ueventd: LoadWithAliases was unable to load of:Ndma-controllerT(null)Cti,am64-dmss-bcdma [ 7.642397] ueventd: Loaded kernel module /vendor/lib/modules/crct10dif-ce.ko [ 7.643816] ueventd: Loading module /vendor/lib/modules/typec.ko with args '' [ 7.649435] ueventd: Loaded kernel module /vendor/lib/modules/typec.ko [ 7.653658] ueventd: LoadWithAliases was unable to load of:Ntimer-cl0-cpu0T(null)Carm,armv8-timer [ 7.656001] ueventd: LoadWithAliases was unable to load platform:serial8250 [ 7.660097] ueventd: LoadWithAliases was unable to load of:NmdioT(null)Cti,cpsw-mdioCti,davinci_mdio [ 7.661509] ueventd: Loading module /vendor/lib/modules/crct10dif-ce.ko with args '' [ 7.662311] ueventd: Loading module /vendor/lib/modules/tps6598x.ko with args '' [ 7.668055] apexd: wait for '/dev/loop-control' took 793ms [ 7.673454] ueventd: LoadWithAliases was unable to load of:NpwmT(null)Cti,am64-epwmCti,am3352-ehrpwm [ 7.696949] apexd: Pre-allocated 14 loopback devices [ 7.699443] ueventd: LoadWithAliases was unable to load input:b0000v0000p0000e0000-e0,1,3,k14A,ra30,3w [ 7.706023] ueventd: LoadWithAliases was unable to load of:NspiT(null)Cti,am654-mcspiCti,omap4-mcspi [ 7.710460] apexd: Scanning /system/apex for pre-installed ApexFiles [ 7.720583] ueventd: LoadWithAliases was unable to load of:NspiT(null)Cti,am654-mcspiCti,omap4-mcspi [ 7.725239] apexd: Found pre-installed APEX /system/apex/com.android.resolv.capex [ 7.735641] ueventd: LoadWithAliases was unable to load of:NpinctrlT(null)Cpinctrl-single [ 7.746573] apexd: Found pre-installed APEX /system/apex/com.android.ipsec.capex [ 7.749992] ueventd: Loaded kernel module /vendor/lib/modules/tps6598x.ko [ 7.753179] ueventd: LoadWithAliases was unable to load of:Ninterrupt-controllerT(null)Cti,sci-intr [ 7.753183] ueventd: LoadWithAliases was unable to load of:NsysconT(null)CsysconCsimple-mfd [ 7.756179] ueventd: LoadWithAliases was unable to load of:NspinlockT(null)Cti,am64-hwspinlock [ 7.759178] ueventd: LoadWithAliases was unable to load of:Nregulator-3T(null)Cregulator-fixed [ 7.761674] apexd: Found pre-installed APEX /system/apex/com.android.media.capex [ 7.764750] apexd: Found pre-installed APEX /system/apex/com.android.extservices.capex [ 7.768408] apexd: Found pre-installed APEX /system/apex/com.android.vndk.current.apex [ 7.768832] ueventd: Loading module /vendor/lib/modules/dwc3-am62.ko with args '' [ 7.772404] ueventd: LoadWithAliases was unable to load of:NserialT(null)Cti,am64-uartCti,am654-uart [ 7.775574] ueventd: Loading module /vendor/lib/modules/cdns-dphy.ko with args '' [ 7.777698] ueventd: Loading module /vendor/lib/modules/snd-soc-simple-card-utils.ko with args '' [ 7.781525] apexd: Found pre-installed APEX /system/apex/com.android.scheduling.apex [ 7.787728] ueventd: Loaded kernel module /vendor/lib/modules/snd-soc-simple-card-utils.ko [ 7.795220] apexd: Found pre-installed APEX /system/apex/com.android.mediaprovider.capex [ 7.800923] ueventd: Loading module /vendor/lib/modules/snd-soc-simple-card.ko with args '' [ 7.808043] ueventd: Loaded kernel module /vendor/lib/modules/cdns-dphy.ko [ 7.811479] ueventd: Loading module /vendor/lib/modules/sa2ul.ko with args '' [ 7.813478] apexd: Found pre-installed APEX /system/apex/com.android.permission.capex [ 7.816573] apexd: Found pre-installed APEX /system/apex/com.android.conscrypt.apex [ 7.817247] apexd: Found pre-installed APEX /system/apex/com.android.neuralnetworks.capex [ 7.820590] apexd: Found pre-installed APEX /system/apex/com.android.tethering.capex [ 7.866213] ueventd: Loaded kernel module /vendor/lib/modules/sa2ul.ko [ 7.877704] apexd: Found pre-installed APEX /system/apex/com.android.os.statsd.apex [ 7.885547] ueventd: LoadWithAliases was unable to load of:NrtcT(null)Cti,am62-rtc [ 7.886477] ueventd: Loaded kernel module /vendor/lib/modules/snd-soc-simple-card.ko [ 7.891000] apexd: Found pre-installed APEX /system/apex/com.android.sdkext.apex [ 7.893012] ueventd: LoadWithAliases was unable to load of:Nregulator-6T(null)Cregulator-fixed [ 7.895658] ueventd: Loading module /vendor/lib/modules/crct10dif-ce.ko with args '' [ 7.899748] ueventd: LoadWithAliases was unable to load platform:alarmtimer [ 7.903920] apexd: Found pre-installed APEX /system/apex/com.android.wifi.capex [ 7.915517] ueventd: LoadWithAliases was unable to load of:Nregulator-5T(null)Cregulator-fixed [ 7.920950] apexd: Found pre-installed APEX /system/apex/com.android.media.swcodec.capex [ 7.931433] ueventd: LoadWithAliases was unable to load of:Nregulator-1T(null)Cregulator-fixed [ 7.940313] apexd: Found pre-installed APEX /system/apex/com.android.adbd.capex [ 7.948943] ueventd: LoadWithAliases was unable to load of:NpmuT(null)Carm,cortex-a53-pmu [ 7.956303] apexd: Found pre-installed APEX /system/apex/com.android.apex.cts.shim.apex [ 7.962697] ueventd: Loading module /vendor/lib/modules/crct10dif-ce.ko with args '' [ 7.969220] apexd: Found pre-installed APEX /system/apex/com.android.appsearch.apex [ 8.007487] ueventd: Coldboot took 1.012 seconds [ 8.009529] apexd: Found pre-installed APEX /system/apex/com.android.art.capex [ 8.028419] ueventd: Loading module /vendor/lib/modules/roles.ko with args '' [ 8.037594] apexd: Found pre-installed APEX /system/apex/com.android.runtime.apex [ 8.040861] ueventd: Loading module /vendor/lib/modules/dwc3.ko with args '' [ 8.048750] apexd: Found pre-installed APEX /system/apex/com.android.i18n.apex [ 8.103151] tps6598x 0-003f: Unable to find the interrupt, switching to polling [ 8.107042] apexd: Found pre-installed APEX /system/apex/com.android.tzdata.apex [ 8.107771] ueventd: Loaded kernel module /vendor/lib/modules/dwc3.ko [ 8.113446] ueventd: Loading module /vendor/lib/modules/dwc3-am62.ko with args '' [ 8.120917] apexd: Scanning /system_ext/apex for pre-installed ApexFiles [ 8.133378] ueventd: LoadWithAliases was unable to load of:NusbT(null)Csnps,dwc3 [ 8.135561] apexd: /system_ext/apex does not exist. Skipping [ 8.149086] ueventd: LoadWithAliases was unable to load of:Ndwc3-usbT(null)Cti,am62-usb [ 8.151393] apexd: Scanning /vendor/apex for pre-installed ApexFiles [ 8.172410] ueventd: Loading module /vendor/lib/modules/snd-soc-tlv320aic3x.ko with args '' [ 8.173244] apexd: /vendor/apex does not exist. Skipping [ 8.202534] ueventd: Loading module /vendor/lib/modules/pvrsrvkm.ko with args '' [ 8.205039] apexd: Scanning /system/apex looking for APEX packages. [ 8.238670] ueventd: Loading module /vendor/lib/modules/ti_k3_m4_remoteproc.ko with args '' [ 8.250134] apexd: Scanning /system_ext/apex looking for APEX packages. [ 8.267464] ueventd: Loading module /vendor/lib/modules/rfkill.ko with args '' [ 8.268105] apexd: ... does not exist. Skipping [ 8.317740] ueventd: Loaded kernel module /vendor/lib/modules/rfkill.ko [ 8.324107] apexd: Scanning /vendor/apex looking for APEX packages. [ 8.333844] ueventd: Loading module /vendor/lib/modules/cfg80211.ko with args '' [ 8.338822] apexd: ... does not exist. Skipping [ 8.404441] cfg80211: Loading compiled-in X.509 certificates for regulatory database [ 8.421399] EXT4-fs (loop1): mounted filesystem without journal. Opts: (null) [ 8.421688] apexd: Successfully mounted package /system/apex/com.android.vndk.current.apex on /apex/c2 [ 8.424748] audit: type=1400 audit(16.332:3): avc: denied { write } for pid=168 comm="ueventd" sco1 [ 8.424753] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' [ 8.429490] apexd: Successfully mounted package /system/apex/com.android.runtime.apex on /apex/com.an0 [ 8.436483] audit: type=1400 audit(16.332:4): avc: denied { search } for pid=155 comm="kworker/1:51 [ 8.441888] ueventd: Loaded kernel module /vendor/lib/modules/cfg80211.ko [ 8.456126] EXT4-fs (loop2): mounted filesystem without journal. Opts: (null) [ 8.456356] apexd: Successfully mounted package /system/apex/com.android.tzdata.apex on /apex/com.and7 [ 8.463949] ueventd: Loading module /vendor/lib/modules/mac80211.ko with args '' [ 8.466295] apexd: Successfully mounted package /system/apex/com.android.i18n.apex on /apex/com.andro7 [ 8.545161] ueventd: Loaded kernel module /vendor/lib/modules/mac80211.ko [ 8.552797] apexd: Activated 4 packages. [ 8.558402] ueventd: Loading module /vendor/lib/modules/wlcore.ko with args '' [ 8.580605] apexd: OnBootstrap done, duration=1788 [ 8.606024] ueventd: Loaded kernel module /vendor/lib/modules/wlcore.ko [ 8.614671] init: Service 'apexd-bootstrap' (pid 169) exited with status 0 waiting took 1.975000 secos [ 8.616063] ueventd: Loading module /vendor/lib/modules/wl18xx.ko with args '' [ 8.625410] init: Sending signal 9 to service 'apexd-bootstrap' (pid 169) process group... [ 8.641430] libprocessgroup: Successfully killed process cgroup uid 0 pid 169 in 0ms [ 8.694983] init: linkerconfig generated /linkerconfig with mounted APEX modules info [ 8.702952] init: Command 'update_linker_config' action=early-init (/system/etc/init/hw/init.rc:75) td [ 8.716213] wl18xx_driver wl18xx.1.auto: Direct firmware load for ti-connectivity/wl1271-nvs.bin fail2 [ 8.720504] ueventd: Loaded kernel module /vendor/lib/modules/wl18xx.ko [ 8.726981] wl18xx_driver wl18xx.1.auto: Falling back to sysfs fallback for: ti-connectivity/wl1271-nn [ 8.728455] init: processing action (ro.product.cpu.abilist32=* && early-init) from (/system/etc/init) [ 8.728971] init: starting service 'boringssl_self_test32'... [ 8.738918] ueventd: Loading module /vendor/lib/modules/wlcore_sdio.ko with args '' [ 8.739329] init: SVC_EXEC service 'boringssl_self_test32' pid 203 (uid 0 gid 0+0 context default) st. [ 8.789489] ueventd: firmware: loading 'am62-mcu-m4f0_0-fw' for '/devices/platform/bus@f0000/bus@f000' [ 8.795365] ueventd: LoadWithAliases was unable to load of:NcfgT(null)Cti,pruss-cfgCsyscon [ 8.822386] ueventd: Loading module /vendor/lib/modules/irq-pruss-intc.ko with args '' [ 8.832977] ueventd: Loaded kernel module /vendor/lib/modules/irq-pruss-intc.ko [ 8.848148] ueventd: Loading module /vendor/lib/modules/pruss.ko with args '' [ 8.855830] ueventd: Loading module /vendor/lib/modules/pru_rproc.ko with args '' [ 8.862508] init: Service 'boringssl_self_test32' (pid 203) exited with status 0 waiting took 0.13000s [ 8.873484] init: Sending signal 9 to service 'boringssl_self_test32' (pid 203) process group... [ 8.874585] remoteproc remoteproc1: 30074000.pru is available [ 8.882689] libprocessgroup: Successfully killed process cgroup uid 0 pid 203 in 0ms [ 8.888931] remoteproc remoteproc2: 30078000.pru is available [ 8.897606] init: processing action (ro.product.cpu.abilist64=* && early-init) from (/system/etc/init) [ 8.902357] ueventd: Loaded kernel module /vendor/lib/modules/pru_rproc.ko [ 8.912630] init: starting service 'boringssl_self_test64'... [ 8.924532] ueventd: LoadWithAliases was unable to load of:NpruT(null)Cti,am625-pru [ 8.934746] init: SVC_EXEC service 'boringssl_self_test64' pid 205 (uid 0 gid 0+0 context default) st. [ 8.938417] ueventd: LoadWithAliases was unable to load of:NprussT(null)Cti,am625-pruss [ 8.967674] ueventd: Loading module /vendor/lib/modules/v4l2-fwnode.ko with args '' [ 8.977716] ueventd: Loaded kernel module /vendor/lib/modules/v4l2-fwnode.ko [ 8.984973] ueventd: Loading module /vendor/lib/modules/cdns-csi2rx.ko with args '' [ 9.000815] cdns-csi2rx: probe of 30101000.csi-bridge failed with error -22 [ 9.008092] ueventd: Loaded kernel module /vendor/lib/modules/cdns-csi2rx.ko [ 9.027876] init: Service 'boringssl_self_test64' (pid 205) exited with status 0 waiting took 0.10000s [ 9.030186] ueventd: Loading module /vendor/lib/modules/videobuf2-dma-contig.ko with args '' [ 9.037972] init: Sending signal 9 to service 'boringssl_self_test64' (pid 205) process group... [ 9.046881] ueventd: Loading module /vendor/lib/modules/j721e-csi2rx.ko with args '' [ 9.055474] libprocessgroup: Successfully killed process cgroup uid 0 pid 205 in 0ms [ 9.072721] init: processing action (early-init) from (/init.environ.rc:2) [ 9.080050] init: processing action (ro.product.debugfs_restrictions.enabled=true && early-init) from) [ 9.094179] init: processing action (early-init) from (/system_ext/etc/init/init.vndk-nodef.rc:1) [ 9.104103] init: Command 'exec - root -- /system/bin/reboot bootloader' action=early-init (/system_e. [ 9.128673] ueventd: Loading module /vendor/lib/modules/cdns-dphy.ko with args '' [ 9.154859] init: processing action (ro.product.cpu.abilist32=* && early-init) from (/vendor/etc/init) [ 9.175194] ueventd: Loading module /vendor/lib/modules/rng-core.ko with args '' [ 9.213870] ueventd: Loaded kernel module /vendor/lib/modules/rng-core.ko [ 9.214063] init: starting service 'boringssl_self_test32_vendor'... [ 9.220810] ueventd: Loading module /vendor/lib/modules/omap-rng.ko with args '' [ 9.237041] init: SVC_EXEC service 'boringssl_self_test32_vendor' pid 207 (uid 0 gid 0+0 context defa. [ 9.237876] omap_rng 40910000.rng: Random Number Generator ver. 241b34c [ 9.237956] random: crng init done [ 9.237960] random: 7 urandom warning(s) missed due to ratelimiting [ 9.248664] init: Command 'exec_start boringssl_self_test32_vendor' action=ro.product.cpu.abilist32=*d [ 9.255902] ueventd: Loaded kernel module /vendor/lib/modules/omap-rng.ko [ 9.274527] init: Service 'boringssl_self_test32_vendor' (pid 207) exited with status 0 waiting took s [ 9.289453] ueventd: Loading module /vendor/lib/modules/sa2ul.ko with args '' [ 9.298784] init: Sending signal 9 to service 'boringssl_self_test32_vendor' (pid 207) process group.. [ 9.315848] libprocessgroup: Successfully killed process cgroup uid 0 pid 207 in 0ms [ 9.325690] init: processing action (ro.product.cpu.abilist64=* && early-init) from (/vendor/etc/init) [ 9.331063] ueventd: Loading module /vendor/lib/modules/snd-soc-simple-card-utils.ko with args '' [ 9.338102] init: starting service 'boringssl_self_test64_vendor'... [ 9.346623] ueventd: Loading module /vendor/lib/modules/snd-soc-simple-card.ko with args '' [ 9.362258] init: SVC_EXEC service 'boringssl_self_test64_vendor' pid 209 (uid 0 gid 0+0 context defa. [ 9.375004] ueventd: LoadWithAliases was unable to load of:NusbT(null)Csnps,dwc3 [ 9.396414] ueventd: Loading module /vendor/lib/modules/xhci-plat-hcd.ko with args '' [ 9.406494] init: Service 'boringssl_self_test64_vendor' (pid 209) exited with status 0 waiting took s [ 9.407115] xhci-hcd xhci-hcd.2.auto: xHCI Host Controller [ 9.417255] init: Sending signal 9 to service 'boringssl_self_test64_vendor' (pid 209) process group.. [ 9.422685] xhci-hcd xhci-hcd.2.auto: new USB bus registered, assigned bus number 1 [ 9.432396] libprocessgroup: Successfully killed process cgroup uid 0 pid 209 in 0ms [ 9.439971] xhci-hcd xhci-hcd.2.auto: hcc params 0x0258fe6d hci version 0x110 quirks 0x000000000001000 [ 9.449208] init: processing action (wait_for_coldboot_done) from (:0) [ 9.456906] xhci-hcd xhci-hcd.2.auto: irq 464, io mem 0x31100000 [ 9.464840] init: start_waiting_for_property("ro.cold_boot_done", "true"): already set [ 9.471493] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 5.10 [ 9.478833] init: processing action (SetMmapRndBits) from (:0) [ 9.486959] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.494852] init: processing action (KeychordInit) from (:0) [ 9.501380] usb usb1: Product: xHCI Host Controller [ 9.508677] init: processing action (init) from (/system/etc/init/hw/init.rc:119) [ 9.513292] usb usb1: Manufacturer: Linux 5.10.109-android13-4-dirty xhci-hcd [ 9.521706] init: Command 'copy /system/etc/prop.default /dev/urandom' action=init (/system/etc/init/y [ 9.527991] usb usb1: SerialNumber: xhci-hcd.2.auto [ 9.554176] hub 1-0:1.0: USB hub found [ 9.558276] hub 1-0:1.0: 1 port detected [ 9.562924] xhci-hcd xhci-hcd.2.auto: xHCI Host Controller [ 9.568519] xhci-hcd xhci-hcd.2.auto: new USB bus registered, assigned bus number 2 [ 9.569202] init: Command 'write /dev/blkio/blkio.weight 1000' action=init (/system/etc/init/hw/init.d [ 9.576257] xhci-hcd xhci-hcd.2.auto: Host supports USB 3.0 SuperSpeed [ 9.596398] init: Command 'write /dev/blkio/background/blkio.weight 200' action=init (/system/etc/inid [ 9.601775] usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. [ 9.623492] init: Command 'write /dev/blkio/background/blkio.bfq.weight 10' action=init (/system/etc/d [ 9.630744] usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 5.10 [ 9.652859] init: Command 'write /dev/blkio/blkio.group_idle 0' action=init (/system/etc/init/hw/initd [ 9.660216] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.680368] init: Command 'write /dev/blkio/background/blkio.group_idle 0' action=init (/system/etc/id [ 9.686772] usb usb2: Product: xHCI Host Controller [ 9.686777] usb usb2: Manufacturer: Linux 5.10.109-android13-4-dirty xhci-hcd [ 9.686781] usb usb2: SerialNumber: xhci-hcd.2.auto [ 9.687367] hub 2-0:1.0: USB hub found [ 9.729114] hub 2-0:1.0: config failed, hub doesn't have any ports! (err -19) [ 9.737262] ueventd: Loaded kernel module /vendor/lib/modules/xhci-plat-hcd.ko [ 9.750933] ueventd: LoadWithAliases was unable to load of:NusbT(null)Csnps,dwc3 [ 9.767230] init: starting service 'logd'... [ 9.771812] ueventd: Loading module /vendor/lib/modules/typec.ko with args '' [ 9.772770] init: Created socket '/dev/socket/logd', mode 666, user 1036, group 1036 [ 9.779816] ueventd: Loading module /vendor/lib/modules/tps6598x.ko with args '' [ 9.787572] init: Created socket '/dev/socket/logdr', mode 666, user 1036, group 1036 [ 9.802918] init: Created socket '/dev/socket/logdw', mode 222, user 1036, group 1036 [ 9.810699] ueventd: LoadWithAliases was unable to load platform:regulatory [ 9.811204] init: Opened file '/proc/kmsg', flags 0 [ 9.822942] init: Opened file '/dev/kmsg', flags 1 [ 9.841860] init: Command 'start logd' action=init (/system/etc/init/hw/init.rc:439) took 75ms and sud [ 9.841982] ueventd: LoadWithAliases was unable to load platform:wl18xx [ 9.852763] init: starting service 'lmkd'... [ 9.864845] init: Created socket '/dev/socket/lmkd', mode 660, user 1000, group 1000 [ 9.869221] ueventd: firmware: loading 'ti-connectivity/wl1271-nvs.bin' for '/devices/platform/bus@f0' [ 9.876984] ueventd: LoadWithAliases was unable to load of:Ninterrupt-controllerT(null)Cti,pruss-intc [ 9.886461] init: starting service 'servicemanager'... [ 9.905697] init: starting service 'hwservicemanager'... [ 9.924577] init: Command 'start vndservicemanager' action=init (/system/etc/init/hw/init.rc:450) tood [ 9.925779] ueventd: LoadWithAliases was unable to load of:NpruT(null)Cti,am625-pru [ 9.938779] init: processing action (ro.debuggable=1 && init) from (/system/etc/init/hw/init.rc:1214) [ 9.956837] init: starting service 'console'... [ 9.958664] ueventd: LoadWithAliases was unable to load of:NpruT(null)Cti,am625-pru [ 9.958990] logd.auditd: start [ 9.983391] init: processing action (init) from (/system/etc/init/hw/init.usb.rc:27) [ 9.994230] init: processing action (init) from (/vendor/etc/init/hw/init.am62x.rc:1) [ 10.004032] ueventd: LoadWithAliases was unable to load of:NrngT(null)Cinside-secure,safexcel-eip76 console:/ $ [ 10.025271] ueventd: LoadWithAliases was unable to load platform:xhci-hcd [ 10.044835] init: Command 'write /dev/cpuset/camera-daemon-high-group/cpus 0-4' action=init (/vendor/t [ 10.046218] ueventd: LoadWithAliases was unable to load usb:v1D6Bp0002d0510dc09dsc00dp01ic09isc00ip000 [ 10.074518] init: Command 'write /dev/cpuset/camera-daemon-mid-group/cpus 0-4' action=init (/vendor/et [ 10.084110] ueventd: LoadWithAliases was unable to load usb:v1D6Bp0002d0510dc09dsc00dp01ic09isc00ip000 [ 10.108343] init: Command 'write /dev/cpuset/camera-daemon-mid-high-group/cpus 0-4' action=init (/vent [ 10.124808] ueventd: LoadWithAliases was unable to load usb:v1D6Bp0003d0510dc09dsc00dp03ic09isc00ip000 [ 10.138290] init: processing action (init) from (/system/etc/init/audioserver.rc:62) [ 10.152977] ueventd: LoadWithAliases was unable to load platform:xhci-hcd [ 10.154855] init: processing action (late-init) from (/system/etc/init/hw/init.rc:468) [ 10.168093] init: processing action (late-init) from (/system/etc/init/atrace.rc:3) [ 10.197753] init: processing action (queue_property_triggers) from (:0) [ 10.206127] init: processing action (early-fs) from (/system/etc/init/hw/init.rc:504) [ 10.214666] init: starting service 'vold'... [ 10.229194] init: processing action (fs) from (/vendor/etc/init/hw/init.am62x.rc:66) [ 10.249139] init: processing action (fs) from (/system/etc/init/logd.rc:28) [ 10.257273] init: processing action (fs) from (/system/etc/init/wifi.rc:25) [ 10.265173] init: processing action (post-fs) from (/system/etc/init/hw/init.rc:508) [ 10.273989] init: starting service 'exec 3 (/system/bin/vdc checkpoint markBootAttempt)'... [ 10.291343] init: SVC_EXEC service 'exec 3 (/system/bin/vdc checkpoint markBootAttempt)' pid 222 (uid. [ 10.332722] init: Service 'exec 3 (/system/bin/vdc checkpoint markBootAttempt)' (pid 222) exited withs [ 10.345594] init: Sending signal 9 to service 'exec 3 (/system/bin/vdc checkpoint markBootAttempt)' (. [ 10.357702] libprocessgroup: Successfully killed process cgroup uid 1000 pid 222 in 0ms [ 10.380504] init: Command 'chown system cache /cache' action=post-fs (/system/etc/init/hw/init.rc:524m [ 10.395358] init: Command 'chmod 0770 /cache' action=post-fs (/system/etc/init/hw/init.rc:525) took 0m [ 10.413491] selinux: SELinux: Could not stat /metadata: No such file or directory. [ 10.421407] selinux: [ 10.428312] selinux: SELinux: Could not get canonical path for /metadata/apex restorecon: No such fil. [ 10.439206] selinux: [ 10.442398] init: processing action (post-fs) from (/vendor/etc/init/hw/init.am62x.rc:69) [ 10.452141] init: processing action (post-fs) from (/system/etc/init/atrace_userdebug.rc:7) [ 10.461475] init: processing action (post-fs) from (/system/etc/init/gsid.rc:8) [ 10.471228] init: processing action (post-fs) from (/system/etc/init/recovery-refresh.rc:1) [ 10.480521] init: starting service 'exec 4 (/system/bin/recovery-refresh)'... [ 10.496563] init: processing action (late-fs) from (/system/etc/init/hw/init.rc:581) [ 10.525021] init: starting service 'system_suspend'... [ 10.543263] init: starting service 'keystore2'... [ 10.567306] init: starting service 'atrace-hal-1-0'... [ 10.595832] init: starting service 'vendor.boot-hal-1-2'... [ 10.618512] init: starting service 'vendor.keymaster-3-0'... [ 10.650775] init: Command 'class_start early_hal' action=late-fs (/system/etc/init/hw/init.rc:588) tod [ 10.662929] init: Service 'exec 4 (/system/bin/recovery-refresh)' (pid 226) exited with status 254 ond [ 10.676819] init: Sending signal 9 to service 'exec 4 (/system/bin/recovery-refresh)' (pid 226) proce. [ 10.687903] libprocessgroup: Successfully killed process cgroup uid 1000 pid 226 in 0ms [ 10.698479] init: starting service 'exec 5 (/system/bin/fsverity_init --load-verified-keys)'... [ 10.718172] init: SVC_EXEC service 'exec 5 (/system/bin/fsverity_init --load-verified-keys)' pid 234 . [ 10.748728] type=1400 audit(18.652:5): avc: denied { view } for comm="fsverity_init" scontext=u:r:fsv1 [ 10.756935] init: Service 'exec 5 (/system/bin/fsverity_init --load-verified-keys)' (pid 234) exited s [ 10.776573] init: Sending signal 9 to service 'exec 5 (/system/bin/fsverity_init --load-verified-keys. [ 10.788913] libprocessgroup: Successfully killed process cgroup uid 0 pid 234 in 0ms [ 10.913318] init: Command 'mkdir /sys/kernel/tracing/instances/bootreceiver 0700 system system' actiod [ 10.934362] init: processing action (late-fs) from (/vendor/etc/init/hw/init.am62x.rc:79) [ 10.943644] init: starting service 'bootanim'... [ 10.962204] init: starting service 'surfaceflinger'... [ 10.968298] init: Could not create socket 'pdx/system/vr/display/client': Failed to bind socket 'pdx/y [ 10.982771] init: Could not create socket 'pdx/system/vr/display/manager': Failed to bind socket 'pdxy [ 10.998115] init: Could not create socket 'pdx/system/vr/display/vsync': Failed to bind socket 'pdx/sy [ 11.024353] init: starting service 'vendor.gralloc-4-0'... [ 11.043931] init: starting service 'vendor.hwcomposer-2-4'... [ 11.064857] init: Command 'class_start animation' action=late-fs (/vendor/etc/init/hw/init.am62x.rc:8d [ 11.081160] init: [libfs_mgr]Running /system/bin/fsck.f2fs -a -c 10000 --debug-cache /dev/block/mmcbl3 [ 11.124829] fsck.f2fs: Info: Fix the reported corruption. [ 11.130706] fsck.f2fs: Info: No support kernel version! [ 11.136119] fsck.f2fs: Info: Segments per section = 1 [ 11.141427] fsck.f2fs: Info: Sections per zone = 1 [ 11.146322] fsck.f2fs: Info: sector size = 512 [ 11.151256] fsck.f2fs: Info: total sectors = 21384927 (10441 MB) [ 11.157420] fsck.f2fs: Info: MKFS version [ 11.161536] fsck.f2fs: "4.15.0-142-generic" [ 11.166005] fsck.f2fs: Info: FSCK version [ 11.170171] fsck.f2fs: from "5.10.109-android13-4-dirty" [ 11.175802] fsck.f2fs: to "5.10.109-android13-4-dirty" [ 11.181470] fsck.f2fs: Info: superblock features = 1499 : encrypt verity extra_attr project_quota qud [ 11.185647] PVR_K: 242: RGX Firmware image 'rgx.fw.33.15.11.3' loaded [ 11.192170] fsck.f2fs: Info: superblock encrypt level = 0, salt = 00000000000000000000000000000000 [ 11.207648] fsck.f2fs: Info: total FS sectors = 20957184 (10233 MB) [ 11.208793] PVR_K: 242: Shader binary image 'rgx.sh.33.15.11.3' loaded [ 11.214079] fsck.f2fs: Info: CKPT version = 601182a2 [ 11.263480] fsck.f2fs: Info: checkpoint state = 46 : crc compacted_summary orphan_inodes sudden-powef [ 11.273369] fsck.f2fs: Info: No error was reported [ 11.278368] fsck.f2fs: [ 11.280951] fsck.f2fs: c, u, RA, CH, CM, Repl= [ 11.285513] fsck.f2fs: 10000 1639 6625 4986 1639 0 [ 11.293442] F2FS-fs (mmcblk0p13): Using encoding defined by superblock: utf8-12.1.0 with flags 0x0 [ 11.384765] F2FS-fs (mmcblk0p13): Mounted with checkpoint version = 601182a2 [ 11.393128] init: [libfs_mgr]__mount(source=/dev/block/platform/bus@f0000/fa10000.mmc/by-name/userdats [ 11.406504] init: [libfs_mgr]/data is file encrypted [ 11.428408] init: Userdata mounted using /vendor/etc/fstab.am62x result : 5 [ 11.435800] init: Keyring created with id 816326261 in process 1 [ 11.442900] init: Command 'mount_all /vendor/etc/fstab.${ro.hardware} --late' action=late-fs (/vendord [ 11.459082] init: start_waiting_for_property("hwservicemanager.ready", "true"): already set [ 11.467997] init: processing action (post-fs-data) from (/system/etc/init/hw/init.rc:602) [ 11.477106] init: starting service 'exec 6 (/system/bin/vdc checkpoint prepareCheckpoint)'... [ 11.495884] init: SVC_EXEC service 'exec 6 (/system/bin/vdc checkpoint prepareCheckpoint)' pid 267 (u. [ 11.528375] init: Service 'exec 6 (/system/bin/vdc checkpoint prepareCheckpoint)' (pid 267) exited wis [ 11.542032] init: Sending signal 9 to service 'exec 6 (/system/bin/vdc checkpoint prepareCheckpoint)'. [ 11.554903] libprocessgroup: Successfully killed process cgroup uid 1000 pid 267 in 0ms [ 11.569746] init: starting service 'exec 7 (/system/bin/vdc --wait cryptfs enablefilecrypto)'... [ 11.589824] init: SVC_EXEC service 'exec 7 (/system/bin/vdc --wait cryptfs enablefilecrypto)' pid 268. [ 11.649118] init: Service 'exec 7 (/system/bin/vdc --wait cryptfs enablefilecrypto)' (pid 268) exiteds [ 11.662545] init: Sending signal 9 to service 'exec 7 (/system/bin/vdc --wait cryptfs enablefilecrypt. [ 11.674950] libprocessgroup: Successfully killed process cgroup uid 0 pid 268 in 0ms [ 11.685684] init: Verified that /data/bootchart has the encryption policy 8786dbfd7bb2a35062a31189f612 [ 11.697836] fscrypt: AES-256-CTS-CBC using implementation "cts-cbc-aes-ce" [ 11.706976] fscrypt: AES-256-XTS using implementation "xts-aes-ce" [ 11.717048] init: Verified that /data/vendor has the encryption policy 8786dbfd7bb2a35062a31189f61d812 [ 11.728903] init: Not setting encryption policy on: /data/vendor_ce [ 11.736644] init: Not setting encryption policy on: /data/vendor_de [ 11.745943] init: Verified that /data/anr has the encryption policy 8786dbfd7bb2a35062a31189f61d81bc 2 [ 11.758596] init: Verified that /data/tombstones has the encryption policy 8786dbfd7bb2a35062a31189f62 [ 11.773157] init: starting service 'tombstoned'... [ 11.779110] init: Created socket '/dev/socket/tombstoned_crash', mode 666, user 1000, group 1000 [ 11.788969] init: Created socket '/dev/socket/tombstoned_intercept', mode 666, user 1000, group 1000 [ 11.799539] init: Created socket '/dev/socket/tombstoned_java_trace', mode 666, user 1000, group 1000 [ 11.825705] init: Command 'start tombstoned' action=post-fs-data (/system/etc/init/hw/init.rc:636) tod [ 11.837825] init: Control message: Processed ctl.start for 'bootanim' from pid: 241 (/system/bin/surf) [ 11.849102] init: Switched to default mount namespace [ 11.856320] init: Verified that /data/misc has the encryption policy 8786dbfd7bb2a35062a31189f61d81bc2 [ 11.873444] init: starting service 'exec 8 (/system/bin/vdc keymaster earlyBootEnded)'... [ 11.891632] init: SVC_EXEC service 'exec 8 (/system/bin/vdc keymaster earlyBootEnded)' pid 275 (uid 1. [ 11.976070] init: Service 'exec 8 (/system/bin/vdc keymaster earlyBootEnded)' (pid 275) exited with ss [ 11.988733] init: Sending signal 9 to service 'exec 8 (/system/bin/vdc keymaster earlyBootEnded)' (pi. [ 12.000574] libprocessgroup: Successfully killed process cgroup uid 1000 pid 275 in 0ms [ 12.010754] init: Not setting encryption policy on: /data/apex [ 12.019252] init: Inferred action different from explicit one, expected 0 but got 2 [ 12.029793] init: Verified that /data/apex/decompressed has the encryption policy 8786dbfd7bb2a35062a2 [ 12.044142] init: Inferred action different from explicit one, expected 0 but got 3 [ 12.053398] init: Verified that /data/app-staging has the encryption policy 8786dbfd7bb2a35062a31189f2 [ 12.065775] init: Inferred action different from explicit one, expected 0 but got 2 [ 12.075284] init: Verified that /data/apex/ota_reserved has the encryption policy 8786dbfd7bb2a35062a2 [ 12.090264] init: starting service 'apexd'... [ 12.159349] init: Verified that /data/local has the encryption policy 8786dbfd7bb2a35062a31189f61d81b2 [ 12.162154] apexd: Scanning /system/apex for pre-installed ApexFiles [ 12.178291] apexd: Found pre-installed APEX /system/apex/com.android.resolv.capex [ 12.188308] apexd: Found pre-installed APEX /system/apex/com.android.ipsec.capex [ 12.197338] apexd: Found pre-installed APEX /system/apex/com.android.media.capex [ 12.206831] apexd: Found pre-installed APEX /system/apex/com.android.extservices.capex [ 12.216560] apexd: Found pre-installed APEX /system/apex/com.android.vndk.current.apex [ 12.226087] apexd: Found pre-installed APEX /system/apex/com.android.scheduling.apex [ 12.235213] apexd: Found pre-installed APEX /system/apex/com.android.mediaprovider.capex [ 12.244884] apexd: Found pre-installed APEX /system/apex/com.android.permission.capex [ 12.254147] apexd: Found pre-installed APEX /system/apex/com.android.conscrypt.apex [ 12.263313] apexd: Found pre-installed APEX /system/apex/com.android.neuralnetworks.capex [ 12.273045] apexd: Found pre-installed APEX /system/apex/com.android.tethering.capex [ 12.282302] apexd: Found pre-installed APEX /system/apex/com.android.os.statsd.apex [ 12.291401] apexd: Found pre-installed APEX /system/apex/com.android.sdkext.apex [ 12.299500] init: Not setting encryption policy on: /data/preloads [ 12.300180] apexd: Found pre-installed APEX /system/apex/com.android.wifi.capex [ 12.314723] apexd: Found pre-installed APEX /system/apex/com.android.media.swcodec.capex [ 12.323894] init: Not setting encryption policy on: /data/data [ 12.324304] apexd: Found pre-installed APEX /system/apex/com.android.adbd.capex [ 12.338654] apexd: Found pre-installed APEX /system/apex/com.android.apex.cts.shim.apex [ 12.338970] init: Verified that /data/app-private has the encryption policy 8786dbfd7bb2a35062a31189f2 [ 12.348031] apexd: Found pre-installed APEX /system/apex/com.android.appsearch.apex [ 12.367164] init: Verified that /data/app-ephemeral has the encryption policy 8786dbfd7bb2a35062a31182 [ 12.367622] apexd: Found pre-installed APEX /system/apex/com.android.art.capex [ 12.387770] init: Verified that /data/app-asec has the encryption policy 8786dbfd7bb2a35062a31189f61d2 [ 12.388211] apexd: Found pre-installed APEX /system/apex/com.android.runtime.apex [ 12.407683] init: Verified that /data/app-lib has the encryption policy 8786dbfd7bb2a35062a31189f61d82 [ 12.408307] apexd: Found pre-installed APEX /system/apex/com.android.i18n.apex [ 12.427442] init: Verified that /data/app has the encryption policy 8786dbfd7bb2a35062a31189f61d81bc 2 [ 12.427918] apexd: Found pre-installed APEX /system/apex/com.android.tzdata.apex [ 12.447038] init: Verified that /data/property has the encryption policy 8786dbfd7bb2a35062a31189f61d2 [ 12.447290] apexd: Scanning /system_ext/apex for pre-installed ApexFiles [ 12.458973] init: Inferred action different from explicit one, expected 0 but got 2 [ 12.465709] apexd: /system_ext/apex does not exist. Skipping [ 12.479139] apexd: Scanning /product/apex for pre-installed ApexFiles [ 12.479427] init: Verified that /data/fonts/ has the encryption policy 8786dbfd7bb2a35062a31189f61d812 [ 12.485909] apexd: /product/apex does not exist. Skipping [ 12.502844] apexd: Scanning /vendor/apex for pre-installed ApexFiles [ 12.509719] apexd: /vendor/apex does not exist. Skipping [ 12.515792] apexd: Populating APEX database from mounts... [ 12.523354] apexd: 0 packages restored. [ 12.527853] apexd: Failed to migrate sessions to /metadata partition : Failed to stat /metadata/apex/y [ 12.540886] apexd: Marking APEXd as starting [ 12.541228] init: Verified that /data/dalvik-cache has the encryption policy 8786dbfd7bb2a35062a311892 [ 12.548048] apexd: Failed to stat /metadata/apex/sessions: No such file or directory [ 12.558792] init: Verified that /data/ota has the encryption policy 8786dbfd7bb2a35062a31189f61d81bc 2 [ 12.565296] apexd: Scanning /data/apex/sessions looking for sessions to be activated. [ 12.577770] init: Verified that /data/ota_package has the encryption policy 8786dbfd7bb2a35062a31189f2 [ 12.584425] apexd: Scanning /data/apex/active for data ApexFiles [ 12.597619] init: Verified that /data/resource-cache has the encryption policy 8786dbfd7bb2a35062a3112 [ 12.602730] apexd: Selecting APEX for activation [ 12.615156] init: Not setting encryption policy on: /data/lost+found [ 12.619319] apexd: Processing compressed APEX [ 12.627635] init: Verified that /data/drm has the encryption policy 8786dbfd7bb2a35062a31189f61d81bc 2 [ 12.630031] apexd: Processing compressed APEX /system/apex/com.android.resolv.capex [ 12.642730] init: Verified that /data/mediadrm has the encryption policy 8786dbfd7bb2a35062a31189f61d2 [ 12.660486] apexd: Skipping decompression for /system/apex/com.android.resolv.capex [ 12.660538] apexd: Processing compressed APEX /system/apex/com.android.ipsec.capex [ 12.669514] init: Verified that /data/nfc has the encryption policy 8786dbfd7bb2a35062a31189f61d81bc 2 [ 12.685532] apexd: Skipping decompression for /system/apex/com.android.ipsec.capex [ 12.689467] init: Verified that /data/backup has the encryption policy 8786dbfd7bb2a35062a31189f61d812 [ 12.694753] apexd: Processing compressed APEX /system/apex/com.android.tethering.capex [ 12.707465] init: Verified that /data/ss has the encryption policy 8786dbfd7bb2a35062a31189f61d81bc v2 [ 12.725007] apexd: Skipping decompression for /system/apex/com.android.tethering.capex [ 12.725752] init: Verified that /data/system has the encryption policy 8786dbfd7bb2a35062a31189f61d812 [ 12.733379] apexd: Processing compressed APEX /system/apex/com.android.adbd.capex [ 12.749242] init: Not setting encryption policy on: /data/system_de [ 12.759297] init: Not setting encryption policy on: /data/system_ce [ 12.763217] apexd: Skipping decompression for /system/apex/com.android.adbd.capex [ 12.766751] init: Not setting encryption policy on: /data/misc_de [ 12.773263] apexd: Processing compressed APEX /system/apex/com.android.neuralnetworks.capex [ 12.780338] init: Not setting encryption policy on: /data/misc_ce [ 12.794777] init: Not setting encryption policy on: /data/user [ 12.799271] apexd: Skipping decompression for /system/apex/com.android.neuralnetworks.capex [ 12.801657] init: Not setting encryption policy on: /data/user_de [ 12.809201] apexd: Processing compressed APEX /system/apex/com.android.mediaprovider.capex [ 12.816800] init: Command 'rm /data/user/0' action=post-fs-data (/system/etc/init/hw/init.rc:833) tooy [ 12.839136] apexd: Skipping decompression for /system/apex/com.android.mediaprovider.capex [ 12.848519] apexd: Processing compressed APEX /system/apex/com.android.media.capex [ 12.857955] init: Verified that /data/cache has the encryption policy 8786dbfd7bb2a35062a31189f61d81b2 [ 12.868528] apexd: Skipping decompression for /system/apex/com.android.media.capex [ 12.873085] init: Verified that /data/rollback has the encryption policy 8786dbfd7bb2a35062a31189f61d2 [ 12.877029] apexd: Processing compressed APEX /system/apex/com.android.permission.capex [ 12.889932] init: Verified that /data/rollback-observer has the encryption policy 8786dbfd7bb2a35062a2 [ 12.906417] apexd: Skipping decompression for /system/apex/com.android.permission.capex [ 12.909251] init: Inferred action different from explicit one, expected 2 but got 3 [ 12.917061] apexd: Processing compressed APEX /system/apex/com.android.extservices.capex [ 12.925793] init: Verified that /data/rollback-history has the encryption policy 8786dbfd7bb2a35062a32 [ 12.943479] apexd: Skipping decompression for /system/apex/com.android.extservices.capex [ 12.946457] init: Verified that /data/incremental has the encryption policy 8786dbfd7bb2a35062a31189f2 [ 12.953339] apexd: Processing compressed APEX /system/apex/com.android.art.capex [ 12.985635] apexd: Skipping decompression for /system/apex/com.android.art.capex [ 12.993239] apexd: Processing compressed APEX /system/apex/com.android.media.swcodec.capex [ 13.013875] apexd: Skipping decompression for /system/apex/com.android.media.swcodec.capex [ 13.022327] apexd: Processing compressed APEX /system/apex/com.android.wifi.capex [ 13.039910] apexd: Skipping decompression for /system/apex/com.android.wifi.capex [ 13.061163] EXT4-fs (loop4): mounted filesystem without journal. Opts: (null) [ 13.061954] EXT4-fs (loop5): mounted filesystem without journal. Opts: (null) [ 13.068874] apexd: Successfully mounted package /system/apex/com.android.vndk.current.apex on /apex/c9 [ 13.075958] apexd: Successfully mounted package /system/apex/com.android.os.statsd.apex on /apex/com.7 [ 13.104032] EXT4-fs (loop6): mounted filesystem without journal. Opts: (null) [ 13.111648] apexd: Successfully mounted package /system/apex/com.android.tzdata.apex on /apex/com.and0 [ 13.113655] EXT4-fs (loop7): mounted filesystem without journal. Opts: (null) [ 13.132187] apexd: Successfully mounted package /system/apex/com.android.conscrypt.apex on /apex/com.9 [ 13.136854] EXT4-fs (loop8): mounted filesystem without journal. Opts: (null) [ 13.152392] apexd: Successfully mounted package /system/apex/com.android.scheduling.apex on /apex/com6 [ 13.157193] EXT4-fs (loop9): mounted filesystem without journal. Opts: (null) [ 13.172748] apexd: Successfully mounted package /system/apex/com.android.apex.cts.shim.apex on /apex/5 [ 13.180416] EXT4-fs (loop10): mounted filesystem without journal. Opts: (null) [ 13.193685] apexd: Successfully mounted package /system/apex/com.android.runtime.apex on /apex/com.an6 [ 13.203855] EXT4-fs (loop11): mounted filesystem without journal. Opts: (null) [ 13.212881] apexd: Successfully mounted package /system/apex/com.android.appsearch.apex on /apex/com.1 [ 13.218076] EXT4-fs (loop12): mounted filesystem without journal. Opts: (null) [ 13.237149] apexd: Successfully mounted package /system/apex/com.android.sdkext.apex on /apex/com.and9 [ 13.253237] EXT4-fs (loop13): mounted filesystem without journal. Opts: (null) [ 13.255564] apexd: Loopback device 14 not ready. Waiting 50ms...: No such file or directory [ 13.261539] apexd: Successfully mounted package /system/apex/com.android.i18n.apex on /apex/com.andro3 [ 13.330486] apexd: Loopback device 15 not ready. Waiting 50ms...: No such file or directory [ 13.340535] device-mapper: verity: sha256 using implementation "sha256-sa2ul" [ 13.359392] EXT4-fs (dm-2): mounted filesystem without journal. Opts: (null) [ 13.366973] apexd: Successfully mounted package /data/apex/decompressed/com.android.resolv@319999900.4 [ 13.393967] apexd: Loopback device 16 not ready. Waiting 50ms...: No such file or directory [ 13.398487] device-mapper: verity: sha256 using implementation "sha256-sa2ul" [ 13.436837] EXT4-fs (dm-3): mounted filesystem without journal. Opts: (null) [ 13.444385] apexd: Successfully mounted package /data/apex/decompressed/com.android.ipsec@319999900.d2 [ 13.465233] apexd: Loopback device 17 not ready. Waiting 50ms...: No such file or directory [ 13.468547] device-mapper: verity: sha256 using implementation "sha256-sa2ul" [ 13.508909] EXT4-fs (dm-4): mounted filesystem without journal. Opts: (null) [ 13.516545] apexd: Successfully mounted package /data/apex/decompressed/com.android.tethering@31999991 [ 13.533547] device-mapper: verity: sha256 using implementation "sha256-sa2ul" [ 13.546347] apexd: Loopback device 18 not ready. Waiting 50ms...: No such file or directory [ 13.570283] EXT4-fs (dm-5): mounted filesystem without journal. Opts: (null) [ 13.578011] apexd: Successfully mounted package /data/apex/decompressed/com.android.adbd@319999999.de5 [ 13.614482] apexd: Loopback device 19 not ready. Waiting 50ms...: No such file or directory [ 13.624042] device-mapper: verity: sha256 using implementation "sha256-sa2ul" [ 13.659440] EXT4-fs (dm-6): mounted filesystem without journal. Opts: (null) [ 13.667050] apexd: Successfully mounted package /data/apex/decompressed/com.android.neuralnetworks@313 [ 13.693129] device-mapper: verity: sha256 using implementation "sha256-sa2ul" [ 13.695789] apexd: Loopback device 20 not ready. Waiting 50ms...: No such file or directory [ 13.714137] EXT4-fs (dm-7): mounted filesystem without journal. Opts: (null) [ 13.721670] apexd: Successfully mounted package /data/apex/decompressed/com.android.mediaprovider@3195 [ 13.763250] apexd: Loopback device 21 not ready. Waiting 50ms...: No such file or directory [ 13.768281] device-mapper: verity: sha256 using implementation "sha256-sa2ul" [ 13.806469] EXT4-fs (dm-8): mounted filesystem without journal. Opts: (null) [ 13.814076] apexd: Successfully mounted package /data/apex/decompressed/com.android.media@319999900.d1 [ 13.830961] device-mapper: verity: sha256 using implementation "sha256-sa2ul" [ 13.843319] apexd: Loopback device 22 not ready. Waiting 50ms...: No such file or directory [ 13.866190] EXT4-fs (dm-9): mounted filesystem without journal. Opts: (null) [ 13.873791] apexd: Successfully mounted package /data/apex/decompressed/com.android.permission@3199993 [ 13.911490] apexd: Loopback device 23 not ready. Waiting 50ms...: No such file or directory [ 13.925364] device-mapper: verity: sha256 using implementation "sha256-sa2ul" [ 13.938534] EXT4-fs (dm-10): mounted filesystem without journal. Opts: (null) [ 13.946096] apexd: Successfully mounted package /data/apex/decompressed/com.android.extservices@319995 [ 13.974567] apexd: Loopback device 24 not ready. Waiting 50ms...: No such file or directory [ 13.979041] device-mapper: verity: sha256 using implementation "sha256-sa2ul" [ 14.016240] EXT4-fs (dm-11): mounted filesystem without journal. Opts: (null) [ 14.024097] apexd: Successfully mounted package /data/apex/decompressed/com.android.art@319999900.dec1 [ 14.051009] apexd: Loopback device 25 not ready. Waiting 50ms...: No such file or directory [ 14.056550] device-mapper: verity: sha256 using implementation "sha256-sa2ul" [ 14.097488] EXT4-fs (dm-12): mounted filesystem without journal. Opts: (null) [ 14.105198] apexd: Successfully mounted package /data/apex/decompressed/com.android.media.swcodec@3190 [ 14.131854] device-mapper: verity: sha256 using implementation "sha256-sa2ul" [ 14.164824] EXT4-fs (dm-13): mounted filesystem without journal. Opts: (null) [ 14.172610] apexd: Successfully mounted package /data/apex/decompressed/com.android.wifi@319999900.de6 [ 14.190105] apexd: Activated 22 packages. [ 14.194560] apexd: OnStart done, duration=1649 [ 14.199847] AidlLazyServiceRegistrar: Registering service apexservice [ 14.265999] apexd: Can't open /system_ext/apex for reading : No such file or directory [ 14.274371] apexd: Can't open /product/apex for reading : No such file or directory [ 14.282340] apexd: Can't open /vendor/apex for reading : No such file or directory [ 14.304081] apexd: Marking APEXd as activated [ 14.309729] init: Wait for property 'apexd.status=activated' took 1338ms [ 14.339530] init: Parsing file /apex/com.android.adbd/etc/init.rc... [ 14.347498] init: Parsing file /apex/com.android.media.swcodec/etc/init.rc... [ 14.355634] init: Parsing file /apex/com.android.media/etc/init.rc... [ 14.363203] init: Parsing file /apex/com.android.os.statsd/etc/init.rc... [ 14.371433] init: Parsing file /apex/com.android.sdkext/etc/derive_classpath.rc... [ 14.380462] init: Parsing file /apex/com.android.sdkext/etc/derive_sdk.rc... [ 14.493896] init: linkerconfig generated /linkerconfig with mounted APEX modules info [ 14.502230] init: Command 'perform_apex_config' action=post-fs-data (/system/etc/init/hw/init.rc:882)d [ 14.515660] init: Not setting encryption policy on: /data/media [ 14.526384] init: starting service 'exec 9 (/system/bin/chattr +F /data/media)'... [ 14.552485] init: SVC_EXEC service 'exec 9 (/system/bin/chattr +F /data/media)' pid 358 (uid 1023 gid. [ 14.639931] init: Service 'exec 9 (/system/bin/chattr +F /data/media)' (pid 358) exited with status 0s [ 14.652172] init: Sending signal 9 to service 'exec 9 (/system/bin/chattr +F /data/media)' (pid 358) . [ 14.663482] libprocessgroup: Successfully killed process cgroup uid 1023 pid 358 in 0ms [ 14.674422] init: Verified that /data/media/obb has the encryption policy 8786dbfd7bb2a35062a31189f612 [ 14.688745] init: starting service 'derive_sdk'... [ 14.707147] init: SVC_EXEC service 'derive_sdk' pid 359 (uid 9999 gid 9999+0 context default) started. [ 14.754860] init: Service 'derive_sdk' (pid 359) exited with status 0 waiting took 0.057000 seconds [ 14.764359] init: Sending signal 9 to service 'derive_sdk' (pid 359) process group... [ 14.772845] libprocessgroup: Successfully killed process cgroup uid 9999 pid 359 in 0ms [ 14.785439] init: starting service 'exec 10 (/system/bin/vdc --wait cryptfs init_user0)'... [ 14.806207] init: SVC_EXEC service 'exec 10 (/system/bin/vdc --wait cryptfs init_user0)' pid 360 (uid. [ 15.021140] init: Service 'exec 10 (/system/bin/vdc --wait cryptfs init_user0)' (pid 360) exited withs [ 15.034180] init: Sending signal 9 to service 'exec 10 (/system/bin/vdc --wait cryptfs init_user0)' (. [ 15.046505] libprocessgroup: Successfully killed process cgroup uid 0 pid 360 in 0ms [ 15.059854] selinux: SELinux: Skipping restorecon on directory(/data) [ 15.066458] selinux: [ 15.070014] init: starting service 'derive_classpath'... [ 15.089645] init: SVC_EXEC service 'derive_classpath' pid 363 (uid 1000 gid 1000+1 context default) s. [ 15.175231] init: Service 'derive_classpath' (pid 363) exited with status 0 waiting took 0.095000 secs [ 15.185181] init: Sending signal 9 to service 'derive_classpath' (pid 363) process group... [ 15.194369] libprocessgroup: Successfully killed process cgroup uid 1000 pid 363 in 0ms [ 15.207192] init: starting service 'odsign'... [ 15.354518] type=1400 audit(23.260:6): avc: denied { view } for comm="fsverity_init" scontext=u:r:fsv1 [ 15.692341] init: Wait for property 'odsign.key.done=1' took 465ms [ 15.700120] init: starting service 'exec 11 (/system/bin/fsverity_init --lock)'... [ 15.718694] init: SVC_EXEC service 'exec 11 (/system/bin/fsverity_init --lock)' pid 367 (uid 0 gid 0+. [ 15.733962] init: Sending signal 9 to service 'odsign' (pid 364) process group... [ 15.752515] libprocessgroup: Successfully killed process cgroup uid 0 pid 364 in 10ms [ 15.763001] init: Control message: Processed ctl.stop for 'odsign' from pid: 364 (/system/bin/odsign) [ 15.772883] init: Service 'odsign' (pid 364) received signal 9 [ 15.781181] init: Service 'exec 11 (/system/bin/fsverity_init --lock)' (pid 367) exited with status 0s [ 15.793587] init: Sending signal 9 to service 'exec 11 (/system/bin/fsverity_init --lock)' (pid 367) . [ 15.804989] libprocessgroup: Successfully killed process cgroup uid 0 pid 367 in 0ms [ 15.816774] init: starting service 'apexd-snapshotde'... [ 15.835968] init: SVC_EXEC service 'apexd-snapshotde' pid 368 (uid 0 gid 1000+0 context default) star. [ 15.887497] apexd: Snapshot DE subcommand detected [ 15.895430] apexd: Failed to stat /metadata/apex/sessions: No such file or directory [ 15.903876] apexd: Marking APEXd as ready [ 15.915377] init: Service 'apexd-snapshotde' (pid 368) exited with status 0 waiting took 0.089000 secs [ 15.925419] init: Sending signal 9 to service 'apexd-snapshotde' (pid 368) process group... [ 15.934457] libprocessgroup: Successfully killed process cgroup uid 0 pid 368 in 0ms [ 15.946489] init: starting service 'exec 12 (/system/bin/tzdatacheck /apex/com.android.tzdata/etc/tz . [ 15.968520] init: SVC_EXEC service 'exec 12 (/system/bin/tzdatacheck /apex/com.android.tzdata/etc/tz . [ 16.024500] init: Service 'exec 12 (/system/bin/tzdatacheck /apex/com.android.tzdata/etc/tz /data/miss [ 16.040305] init: Sending signal 9 to service 'exec 12 (/system/bin/tzdatacheck /apex/com.android.tzd. [ 16.055383] libprocessgroup: Successfully killed process cgroup uid 1000 pid 370 in 0ms [ 16.068360] init: processing action (post-fs-data) from (/system/etc/init/hw/init.usb.rc:6) [ 16.082514] init: Verified that /data/adb has the encryption policy 8786dbfd7bb2a35062a31189f61d81bc 2 [ 16.094279] init: processing action (post-fs-data) from (/vendor/etc/init/hw/init.am62x.rc:90) [ 16.105956] init: processing action (post-fs-data) from (/system/etc/init/bootstat.rc:9) [ 16.131193] init: processing action (ro.debuggable=1 && post-fs-data) from (/system/etc/init/clean_sc) [ 16.143383] init: Command 'exec_background - root root -- /system/bin/clean_scratch_files' action=ro.. [ 16.199824] init: processing action (post-fs-data) from (/system/etc/init/gsid.rc:17) [ 16.212392] init: Not setting encryption policy on: /data/gsi [ 16.222381] init: processing action (post-fs-data) from (/system/etc/init/incidentd.rc:21) [ 16.232256] init: processing action (post-fs-data) from (/system/etc/init/iorapd.rc:29) [ 16.241726] init: processing action (post-fs-data) from (/system/etc/init/logtagd.rc:4) [ 16.255310] init: processing action (post-fs-data) from (/system/etc/init/otapreopt.rc:3) [ 16.264748] init: starting service 'exec 14 (/system/bin/otapreopt_slot)'... [ 16.281020] init: SVC_EXEC service 'exec 14 (/system/bin/otapreopt_slot)' pid 371 (uid 0 gid 0+0 cont. [ 16.370480] init: Service 'exec 14 (/system/bin/otapreopt_slot)' (pid 371) exited with status 0 waitis [ 16.382164] init: Sending signal 9 to service 'exec 14 (/system/bin/otapreopt_slot)' (pid 371) proces. [ 16.392800] libprocessgroup: Successfully killed process cgroup uid 0 pid 371 in 0ms [ 16.407880] selinux: SELinux: Skipping restorecon on directory(/data/dalvik-cache/arm) [ 16.415908] selinux: [ 16.421750] selinux: SELinux: Skipping restorecon on directory(/data/dalvik-cache/arm64) [ 16.430156] selinux: [ 16.433930] selinux: SELinux: Could not stat /data/dalvik-cache/mips: No such file or directory. [ 16.442982] selinux: [ 16.445872] selinux: SELinux: Could not stat /data/dalvik-cache/mips64: No such file or directory. [ 16.455069] selinux: [ 16.457968] selinux: SELinux: Could not stat /data/dalvik-cache/x86: No such file or directory. [ 16.466968] selinux: [ 16.469835] selinux: SELinux: Could not stat /data/dalvik-cache/x86_64: No such file or directory. [ 16.479037] selinux: [ 16.481670] init: Command 'restorecon_recursive /data/dalvik-cache/arm /data/dalvik-cache/arm64 /datad [ 16.506184] init: processing action (post-fs-data) from (/system/etc/init/perfetto.rc:73) [ 16.517983] init: Command 'rm /data/misc/perfetto-traces/.guardraildata' action=post-fs-data (/systemy [ 16.535531] init: processing action (post-fs-data) from (/system/etc/init/profcollectd.rc:15) [ 16.548976] init: processing action (post-fs-data) from (/system/etc/init/recovery-persist.rc:1) [ 16.559198] init: starting service 'exec 15 (/system/bin/recovery-persist)'... [ 16.576410] init: processing action (post-fs-data) from (/system/etc/init/wifi.rc:18) [ 16.588042] selinux: SELinux: Skipping restorecon on directory(/data/misc/apexdata/com.android.wifi) [ 16.597414] selinux: [ 16.600158] init: processing action (post-fs-data) from (/vendor/etc/init/hostapd.android.rc:9) [ 16.611041] init: Service 'exec 15 (/system/bin/recovery-persist)' (pid 374) exited with status 0 oned [ 16.624747] init: Sending signal 9 to service 'exec 15 (/system/bin/recovery-persist)' (pid 374) proc. [ 16.635913] libprocessgroup: Successfully killed process cgroup uid 1000 pid 374 in 0ms [ 16.648360] init: processing action (load_persist_props_action) from (/system/etc/init/hw/init.rc:458) [ 16.658442] init: Couldn't load property file '/data/local.prop': open() failed: No such file or direy [ 16.675302] init: Wait for property 'ro.persistent_properties.ready=true' took 16ms [ 16.684514] init: starting service 'logd-reinit'... [ 16.702011] init: processing action (load_persist_props_action) from (/system/etc/init/flags_health_c) [ 16.712418] init: Top-level directory needs encryption action, eg mkdir /data/server_configurable_flae [ 16.728646] init: Verified that /data/server_configurable_flags has the encryption policy 8786dbfd7bb2 [ 16.730721] logd: logd reinit [ 16.742878] init: starting service 'exec 16 (/system/bin/flags_health_check BOOT_FAILURE)'... [ 16.747444] logd: FrameworkListener: read() failed (Connection reset by peer) [ 16.763320] init: SVC_EXEC service 'exec 16 (/system/bin/flags_health_check BOOT_FAILURE)' pid 376 (u. [ 16.777907] init: Service 'logd-reinit' (pid 375) exited with status 0 oneshot service took 0.084000 d [ 16.789269] init: Sending signal 9 to service 'logd-reinit' (pid 375) process group... [ 16.797753] libprocessgroup: Successfully killed process cgroup uid 1036 pid 375 in 0ms [ 16.808482] init: Service 'exec 16 (/system/bin/flags_health_check BOOT_FAILURE)' (pid 376) exited wis [ 16.821567] init: Sending signal 9 to service 'exec 16 (/system/bin/flags_health_check BOOT_FAILURE)'. [ 16.833695] libprocessgroup: Successfully killed process cgroup uid 1000 pid 376 in 0ms [ 16.843324] init: processing action (load_persist_props_action) from (/system/etc/init/logcatd.rc:29) [ 16.856830] init: processing action (load_bpf_programs) from (/system/etc/init/bpfloader.rc:17) [ 16.869603] init: starting service 'bpfloader'... [ 16.887599] init: SVC_EXEC service 'bpfloader' pid 377 (uid 0 gid 0+0 context default) started; waiti. [ 17.279969] init: Service 'bpfloader' (pid 377) exited with status 0 waiting took 0.401000 seconds [ 17.289308] init: Sending signal 9 to service 'bpfloader' (pid 377) process group... [ 17.297719] libprocessgroup: Successfully killed process cgroup uid 0 pid 377 in 0ms [ 17.308986] init: processing action (ro.crypto.state=encrypted && ro.crypto.type=file && zygote-start) [ 17.322385] init: start_waiting_for_property("odsign.verification.done", "1"): already set [ 17.332464] init: starting service 'update_verifier_nonencrypted'... [ 17.351172] init: SVC_EXEC service 'update_verifier_nonencrypted' pid 378 (uid 0 gid 2001+1 context d. [ 17.387567] update_verifier: Started with arg 1: nonencrypted [ 17.399412] update_verifier: Booting slot 0: isSlotMarkedSuccessful=1 [ 17.406190] update_verifier: Leaving update_verifier. [ 17.415188] init: Service 'update_verifier_nonencrypted' (pid 378) exited with status 0 waiting took s [ 17.426057] init: Sending signal 9 to service 'update_verifier_nonencrypted' (pid 378) process group.. [ 17.436279] libprocessgroup: Successfully killed process cgroup uid 0 pid 378 in 0ms [ 17.448455] init: starting service 'statsd'... [ 17.454555] init: Created socket '/dev/socket/statsdw', mode 222, user 1066, group 1066 [ 17.483321] init: starting service 'netd'... [ 17.489503] init: Created socket '/dev/socket/dnsproxyd', mode 660, user 0, group 3003 [ 17.499155] init: Created socket '/dev/socket/mdns', mode 660, user 0, group 1000 [ 17.508660] init: Created socket '/dev/socket/fwmarkd', mode 660, user 0, group 3003 [ 17.533379] init: starting service 'zygote'... [ 17.540162] init: Created socket '/dev/socket/zygote', mode 660, user 0, group 1000 [ 17.549194] init: Created socket '/dev/socket/usap_pool_primary', mode 660, user 0, group 1000 [ 17.573244] init: starting service 'zygote_secondary'... [ 17.581166] init: Created socket '/dev/socket/zygote_secondary', mode 660, user 0, group 1000 [ 17.590950] init: Created socket '/dev/socket/usap_pool_secondary', mode 660, user 0, group 1000 [ 17.613815] init: processing action (zygote-start) from (/vendor/etc/init/hw/init.am62x.rc:132) [ 17.642624] init: processing action (firmware_mounts_complete) from (/system/etc/init/hw/init.rc:464) [ 17.652551] init: processing action (early-boot) from (/vendor/etc/init/hw/init.am62x.rc:54) [ 17.662772] init: Command 'verity_update_state' action=early-boot (/vendor/etc/init/hw/init.am62x.rc:d [ 17.668764] ueventd: firmware: could not find firmware for ti-connectivity/wl1271-nvs.bin [ 17.677472] init: processing action (early-boot) from (/system/etc/init/installd.rc:5) [ 17.692959] ueventd: firmware: could not find firmware for am62-mcu-m4f0_0-fw [ 17.703997] ueventd: firmware: attempted /etc/firmware/am62-mcu-m4f0_0-fw, open failed: No such file y [ 17.722825] ueventd: firmware: attempted /etc/firmware/ti-connectivity/wl1271-nvs.bin, open failed: Ny [ 17.743605] ueventd: firmware: attempted /odm/firmware/am62-mcu-m4f0_0-fw, open failed: No such file y [ 17.768476] ueventd: firmware: attempted /odm/firmware/ti-connectivity/wl1271-nvs.bin, open failed: Ny [ 17.777640] init: processing action (early-boot) from (/vendor/etc/init/init.am62x.usb.rc:1) [ 17.789133] ueventd: firmware: attempted /vendor/firmware/am62-mcu-m4f0_0-fw, open failed: No such fiy [ 17.804098] ueventd: firmware: attempted /vendor/firmware/ti-connectivity/wl1271-nvs.bin, open failedy [ 17.820005] ueventd: firmware: attempted /firmware/image/am62-mcu-m4f0_0-fw, open failed: No such fily [ 17.820661] file system registered [ 17.834938] ueventd: firmware: attempted /firmware/image/ti-connectivity/wl1271-nvs.bin, open failed:y [ 17.846527] using random self ethernet address [ 17.846536] using random host ethernet address [ 17.856186] remoteproc remoteproc0: powering up 5000000.m4fss [ 17.862830] ueventd: loading /devices/platform/bus@f0000/bus@f0000:bus@4000000/5000000.m4fss/remoteprs [ 17.876276] remoteproc remoteproc0: Direct firmware load for am62-mcu-m4f0_0-fw failed with error -2 [ 17.885640] remoteproc remoteproc0: Falling back to sysfs fallback for: am62-mcu-m4f0_0-fw [ 17.894327] init: starting service 'init-gadgethal-sh'... [ 17.898696] ueventd: loading /devices/platform/bus@f0000/fa20000.mmc/mmc_host/mmc2/mmc2:0001/mmc2:000s [ 17.928373] ueventd: firmware: loading 'am62-mcu-m4f0_0-fw' for '/devices/platform/bus@f0000/bus@f000' [ 17.947101] init: Command 'start init-gadgethal-sh' action=early-boot (/vendor/etc/init/init.am62x.usd [ 17.957431] ueventd: firmware: could not find firmware for am62-mcu-m4f0_0-fw [ 17.964191] init: processing action (ro.config.low_ram=true && boot) from (/system/etc/init/hw/init.r) [ 17.967945] ueventd: firmware: attempted /etc/firmware/am62-mcu-m4f0_0-fw, open failed: No such file y [ 17.986384] init: processing action (boot) from (/system/etc/init/hw/init.rc:980) [ 18.000006] ueventd: firmware: attempted /odm/firmware/am62-mcu-m4f0_0-fw, open failed: No such file y [ 18.014073] init: Command 'symlink /sys/fs/f2fs/${dev.mnt.blk.data} /dev/sys/fs/by-name/userdata' act' [ 18.027955] ueventd: firmware: attempted /vendor/firmware/am62-mcu-m4f0_0-fw, open failed: No such fiy [ 18.055968] ueventd: firmware: attempted /firmware/image/am62-mcu-m4f0_0-fw, open failed: No such fily [ 18.056365] init: Command 'symlink /sys/devices/virtual/block/${dev.mnt.blk.data} /dev/sys/block/by-n' [ 18.072363] remoteproc remoteproc0: request_firmware failed: -2 [ 18.098484] ueventd: loading /devices/platform/bus@f0000/bus@f0000:bus@4000000/5000000.m4fss/remoteprs [ 18.117943] init: starting service 'hidl_memory'... [ 18.143071] init: starting service 'vendor.audio-hal'... [ 18.174330] type=1400 audit(26.080:7): avc: denied { dac_read_search } for comm="chown" capability=2 1 [ 18.216400] init: starting service 'vendor.camera-provider-2-4-ext'... [ 18.247761] init: starting service 'vendor.cas-hal-1-2'... [ 18.284472] init: starting service 'vendor.drm-clearkey-hal-1-4'... [ 18.315495] init: starting service 'dumpstate-1-1'... [ 18.348143] init: starting service 'vendor.gatekeeper-1-0'... [ 18.354828] wlcore: wl18xx HW: 183x or 180x, PG 2.2 (ROM 0x11) [ 18.383677] ueventd: LoadWithAliases was unable to load platform:wl18xx [ 18.402669] wlcore: loaded [ 18.421794] init: starting service 'health-hal-2-1'... [ 18.456648] init: Opened file '/dev/kmsg', flags 1 [ 18.546333] init: starting service 'vendor.memtrack-default'... [ 18.578744] init: starting service 'vendor.thermal-hal-2-0'... [ 18.640007] init: starting service 'vendor.usb-hal-1-2'... [ 18.644632] healthd: No battery devices found [ 18.676606] init: starting service 'vendor.power-default'... [ 18.703148] init: Command 'class_start hal' action=boot (/system/etc/init/hw/init.rc:1082) took 586msd [ 18.715301] init: Service 'init-gadgethal-sh' (pid 389) exited with status 0 oneshot service took 0.8d [ 18.727670] init: Sending signal 9 to service 'init-gadgethal-sh' (pid 389) process group... [ 18.737002] libprocessgroup: Successfully killed process cgroup uid 0 pid 389 in 0ms [ 18.749945] init: starting service 'pvrsrvinit'... [ 18.756868] type=1400 audit(26.664:8): avc: denied { read } for comm="android.hardwar" name="vndbinde1 [ 18.774923] init: starting service 'audioserver'... [ 18.788331] type=1400 audit(26.692:9): avc: denied { write } for comm="android.hardwar" name="vndbind1 [ 18.808960] type=1400 audit(26.692:10): avc: denied { open } for comm="android.hardwar" path="/dev/bi1 [ 18.813586] healthd: battery none chg= [ 18.815319] init: starting service 'credstore'... [ 18.832663] type=1400 audit(26.692:11): avc: denied { ioctl } for comm="android.hardwar" path="/dev/b1 [ 18.839873] init: starting service 'gpu'... [ 18.862319] type=1400 audit(26.692:12): avc: denied { map } for comm="android.hardwar" path="/dev/bin1 [ 18.891312] init: Command 'class_start core' action=boot (/system/etc/init/hw/init.rc:1084) took 142md [ 18.903381] init: Service 'pvrsrvinit' (pid 423) exited with status 1 oneshot service took 0.144000 sd [ 18.914770] init: Sending signal 9 to service 'pvrsrvinit' (pid 423) process group... [ 18.923393] libprocessgroup: Successfully killed process cgroup uid 0 pid 423 in 0ms [ 18.935134] init: processing action (persist.sys.usb.config=* && boot) from (/system/etc/init/hw/init) [ 18.946793] init: processing action (boot) from (/vendor/etc/init/hw/init.am62x.rc:58) [ 18.958890] init: processing action (boot) from (/system/etc/init/dumpstate.rc:1) [ 18.968147] init: processing action (boot) from (/system/etc/init/gsid.rc:25) [ 18.968675] type=1400 audit(26.876:13): avc: denied { setattr } for comm="init" name="ext_csd" dev="d1 [ 18.976553] init: starting service 'exec 17 (/system/bin/gsid run-startup-tasks)'... [ 19.012986] init: processing action (boot) from (/vendor/etc/init/android.hardware.atrace@1.0-service) [ 19.025280] type=1400 audit(26.932:14): avc: denied { setattr } for comm="init" name="EnableFTraceGPU1 [ 19.027128] init: processing action (boot) from (/vendor/etc/init/android.hardware.usb@1.2-service.ge) [ 19.060902] init: processing action (boot) from (/vendor/etc/init/init.am62x.usb.rc:35) [ 19.072577] init: processing action (enable_property_trigger) from (:0) [ 19.081620] init: processing action (apexd.status=ready && ro.product.cpu.abilist32=*) from (/system/) [ 19.096090] init: starting service 'boringssl_self_test_apex32'... [ 19.119636] init: SVC_EXEC service 'boringssl_self_test_apex32' pid 431 (uid 0 gid 0+0 context defaul. [ 19.131405] init: Service 'exec 17 (/system/bin/gsid run-startup-tasks)' (pid 428) exited with statusd [ 19.145727] init: Sending signal 9 to service 'exec 17 (/system/bin/gsid run-startup-tasks)' (pid 428. [ 19.157774] libprocessgroup: Successfully killed process cgroup uid 0 pid 428 in 0ms [ 19.233081] init: Service 'boringssl_self_test_apex32' (pid 431) exited with status 0 waiting took 0.s [ 19.247454] init: Sending signal 9 to service 'boringssl_self_test_apex32' (pid 431) process group... [ 19.257562] libprocessgroup: Successfully killed process cgroup uid 0 pid 431 in 0ms [ 19.270290] init: processing action (apexd.status=ready && ro.product.cpu.abilist64=*) from (/system/) [ 19.288746] init: starting service 'boringssl_self_test_apex64'... [ 19.309691] init: SVC_EXEC service 'boringssl_self_test_apex64' pid 434 (uid 0 gid 0+0 context defaul. [ 19.394820] init: Service 'boringssl_self_test_apex64' (pid 434) exited with status 0 waiting took 0.s [ 19.412239] init: Sending signal 9 to service 'boringssl_self_test_apex64' (pid 434) process group... [ 19.424674] libprocessgroup: Successfully killed process cgroup uid 0 pid 434 in 0ms [ 19.443233] init: processing action (net.tcp_def_init_rwnd=*) from (/system/etc/init/hw/init.rc:1145) [ 19.454696] init: processing action (sys.init.perf_lsm_hooks=1) from (/system/etc/init/hw/init.rc:115) [ 19.465909] init: processing action (security.perf_harden=1) from (/system/etc/init/hw/init.rc:1170) [ 19.480640] init: processing action (ro.debuggable=1) from (/system/etc/init/hw/init.rc:1205) [ 19.490491] init: processing action (init.svc.audioserver=running) from (/system/etc/init/audioserver) [ 19.500946] init: Command 'start vendor.audio-hal-4-0-msd' action=init.svc.audioserver=running (/systd [ 19.518995] init: Command 'start audio_proxy_service' action=init.svc.audioserver=running (/system/etd [ 19.536553] init: Command 'start vendor.audio-hal-2-0' action=init.svc.audioserver=running (/system/ed [ 19.560291] init: Command 'start audio-hal-2-0' action=init.svc.audioserver=running (/system/etc/initd [ 19.584202] init: processing action (ro.persistent_properties.ready=true) from (/system/etc/init/boot) [ 19.601016] init: processing action (ro.persistent_properties.ready=true) from (/system/etc/init/boot) [ 19.612985] init: starting service 'exec 18 (/system/bin/bootstat --set_system_boot_reason)'... [ 19.635975] init: processing action (persist.heapprofd.enable= && traced.lazy.heapprofd=) from (/syst) [ 19.650499] init: processing action (ro.debuggable=1) from (/system/etc/init/llkd-debuggable.rc:1) [ 19.666999] init: processing action (ro.debuggable=*) from (/system/etc/init/llkd.rc:2) [ 19.679668] init: processing action (debug.atrace.user_initiated= && persist.traced.enable=1) from (/) [ 19.692894] init: starting service 'traced_probes'... [ 19.698381] init: Opened file '/dev/kmsg', flags 1 [ 19.750899] init: Command 'start traced_probes' action=debug.atrace.user_initiated= && persist.tracedd [ 19.780249] init: Service 'exec 18 (/system/bin/bootstat --set_system_boot_reason)' (pid 435) exited d [ 19.795622] init: Sending signal 9 to service 'exec 18 (/system/bin/bootstat --set_system_boot_reason. [ 19.808308] libprocessgroup: Successfully killed process cgroup uid 1000 pid 435 in 0ms [ 19.818215] init: processing action (persist.traced.enable=1) from (/system/etc/init/perfetto.rc:50) [ 19.834408] init: starting service 'traced'... [ 19.841138] init: Created socket '/dev/socket/traced_consumer', mode 666, user 0, group 0 [ 19.851623] init: Created socket '/dev/socket/traced_producer', mode 666, user 0, group 0 [ 19.879067] init: processing action (persist.traced_perf.enable= && sys.init.perf_lsm_hooks=1 && trac) [ 19.908989] init: processing action (ro.boot.slot_suffix=*) from (/system/etc/init/update_engine.rc:8) [ 19.924321] init: processing action (nonencrypted) from (/system/etc/init/hw/init.rc:1086) [ 19.933910] init: starting service 'cameraserver'... [ 19.960597] init: starting service 'idmap2d'... [ 20.016676] init: starting service 'incidentd'... [ 20.063214] init: starting service 'installd'... [ 20.082386] init: starting service 'mediaextractor'... [ 20.117536] init: starting service 'mediametrics'... [ 20.148605] init: starting service 'media'... [ 20.175432] init: starting service 'storaged'... [ 20.181453] type=1400 audit(28.088:15): avc: denied { read } for comm="init" name="ext_csd" dev="debu1 [ 20.181805] init: Opened file '/d/mmc0/mmc0:0001/ext_csd', flags 0 [ 20.201057] type=1400 audit(28.088:16): avc: denied { open } for comm="init" path="/sys/kernel/debug/1 [ 20.222350] init: starting service 'wificond'... [ 20.237157] type=1400 audit(28.140:17): avc: denied { read } for comm="storaged" path="/sys/kernel/de1 [ 20.249558] init: starting service 'vendor.media.omx'... [ 20.302857] init: Could not start service 'vendor_flash_recovery' as part of class 'main': Cannot finy [ 20.322112] init: starting service 'media.swcodec'... [ 20.390453] init: Command 'class_start main' action=nonencrypted (/system/etc/init/hw/init.rc:1087) td [ 20.421754] init: starting service 'gatekeeperd'... [ 20.453803] init: starting service 'update_engine'... [ 20.489192] init: starting service 'usbd'... [ 20.515545] init: Command 'class_start late_start' action=nonencrypted (/system/etc/init/hw/init.rc:1d [ 20.532941] init: processing action (llk.enable=1) from (/system/etc/init/llkd.rc:9) [ 20.542606] init: processing action (khungtask.enable=1) from (/system/etc/init/llkd.rc:18) [ 20.554007] init: processing action (llk.enable=0) from (/system/etc/init/llkd.rc:12) [ 20.566330] init: processing action (khungtask.enable=0) from (/system/etc/init/llkd.rc:21) [ 20.581510] init: processing action (init.svc.media=*) from (/system/etc/init/mediaserver.rc:1) [ 20.598350] init: processing action (llk.enable=true) from (/system/etc/init/llkd.rc:34) [ 20.609803] init: starting service 'llkd-1'... [ 20.615589] init: Opened file '/dev/kmsg', flags 1 [ 20.620991] init: Opened file '/proc/sysrq-trigger', flags 1 [ 20.652300] init: processing action (khungtask.enable=true) from (/system/etc/init/llkd.rc:25) [ 20.668190] init: processing action (khungtask.enable=false) from (/system/etc/init/llkd.rc:31) [ 20.729320] init: starting service 'adbd'... [ 20.749878] init: Created socket '/dev/socket/adbd', mode 660, user 1000, group 1000 [ 20.847130] init: Control message: Processed ctl.start for 'adbd' from pid: 472 (/system/bin/usbd) [ 20.905738] init: Service 'usbd' (pid 472) exited with status 0 oneshot service took 0.406000 secondsd [ 20.942849] init: Sending signal 9 to service 'usbd' (pid 472) process group... [ 20.954843] libprocessgroup: Successfully killed process cgroup uid 0 pid 472 in 0ms [ 21.105422] read descriptors [ 21.110634] read strings [ 21.316692] android_work: sent uevent USB_STATE=CONNECTED [ 21.608718] android_work: sent uevent USB_STATE=CONFIGURED [ 22.857408] type=1400 audit(30.756:18): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 22.900261] type=1400 audit(30.756:19): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 22.933124] type=1400 audit(30.756:20): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 22.959002] audit: audit_backlog=65 > audit_backlog_limit=64 [ 22.964547] type=1400 audit(30.764:21): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 22.971827] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 22.993304] type=1400 audit(30.772:22): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 22.997794] audit: backlog limit exceeded [ 23.021346] audit: audit_backlog=65 > audit_backlog_limit=64 [ 23.024956] type=1400 audit(30.772:23): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 23.027276] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 23.055895] audit: backlog limit exceeded [ 23.056623] type=1400 audit(30.772:24): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 23.060522] audit: audit_backlog=65 > audit_backlog_limit=64 [ 23.082019] type=1400 audit(30.772:25): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 23.092550] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 23.108255] type=1400 audit(30.772:26): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 23.123836] audit: backlog limit exceeded [ 23.135982] type=1400 audit(30.772:27): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 23.144477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 23.160942] type=1400 audit(30.772:28): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 23.188765] type=1400 audit(30.772:29): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 23.211020] type=1400 audit(30.772:30): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 23.232642] type=1400 audit(30.772:31): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 23.254385] type=1400 audit(30.772:32): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 23.275517] type=1400 audit(30.772:33): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 23.297559] type=1400 audit(30.772:34): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 23.319811] type=1400 audit(30.772:35): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 23.338619] logd: logdr: UID=2000 GID=2000 PID=533 b tail=0 logMask=99 pid=0 start=0ns deadline=0ns [ 23.341592] type=1400 audit(30.772:36): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 23.372818] logd: logdr: UID=2000 GID=2000 PID=535 b tail=0 logMask=99 pid=0 start=0ns deadline=0ns [ 23.384445] type=1400 audit(30.772:37): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 23.480303] type=1400 audit(30.772:38): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 23.524343] logd: logdr: UID=2000 GID=2000 PID=542 b tail=0 logMask=99 pid=0 start=0ns deadline=0ns [ 23.555188] type=1400 audit(30.772:39): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 23.581488] type=1400 audit(30.772:40): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 23.619086] type=1400 audit(30.772:41): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 23.661387] type=1400 audit(30.772:42): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 23.697099] type=1400 audit(30.772:43): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 23.721567] type=1400 audit(30.772:44): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 23.745826] type=1400 audit(30.772:45): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 23.769385] type=1400 audit(30.772:46): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 23.792090] type=1400 audit(30.772:47): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 23.814206] type=1400 audit(30.772:48): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 23.837556] type=1400 audit(30.772:49): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 23.860926] type=1400 audit(30.772:50): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 23.886478] type=1400 audit(30.772:51): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 23.910242] type=1400 audit(30.772:52): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 23.933909] type=1400 audit(30.772:53): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 23.957801] type=1400 audit(30.776:54): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 23.980180] type=1400 audit(30.776:55): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.002358] type=1400 audit(30.776:56): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.024393] type=1400 audit(30.776:57): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 24.047593] type=1400 audit(30.780:58): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.070927] type=1400 audit(30.780:59): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.094048] type=1400 audit(30.780:60): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 24.117338] type=1400 audit(30.784:61): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.140699] type=1400 audit(30.784:62): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.163969] type=1400 audit(30.784:63): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 24.187973] type=1400 audit(30.784:64): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.210783] type=1400 audit(30.784:65): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.233284] type=1400 audit(30.784:66): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 24.256895] type=1400 audit(30.784:67): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.280702] type=1400 audit(30.784:68): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.304188] type=1400 audit(30.784:69): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 24.328393] type=1400 audit(30.784:70): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.352782] type=1400 audit(30.784:71): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.375793] type=1400 audit(30.784:72): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 24.397530] type=1400 audit(30.784:73): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.420908] type=1400 audit(30.784:74): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.442502] type=1400 audit(30.784:75): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 24.465601] type=1400 audit(30.788:76): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.491584] type=1400 audit(30.788:77): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.515229] type=1400 audit(30.788:78): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 24.538197] type=1400 audit(30.788:79): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.561273] type=1400 audit(30.788:80): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.584934] type=1400 audit(30.788:81): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 24.607328] type=1400 audit(30.788:82): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.629856] type=1400 audit(30.788:83): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.652124] type=1400 audit(30.792:84): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 24.674265] type=1400 audit(30.792:85): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.696473] type=1400 audit(30.792:86): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.718054] type=1400 audit(30.792:87): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 24.739841] type=1400 audit(30.792:88): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.762811] type=1400 audit(30.792:89): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.787940] type=1400 audit(30.796:90): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 24.810332] type=1400 audit(30.796:91): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.832960] type=1400 audit(30.796:92): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.855408] type=1400 audit(30.796:93): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 24.877817] type=1400 audit(30.796:94): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.900229] type=1400 audit(30.796:95): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.922620] type=1400 audit(30.796:96): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 24.945730] type=1400 audit(30.800:97): avc: denied { getattr } for comm="getprop" path="/dev/__prope1 [ 24.968628] type=1400 audit(30.800:98): avc: denied { map } for comm="getprop" path="/dev/__propertie1 [ 24.982463] init: Service 'bootanim' (pid 240) exited with status 0 oneshot service took 14.031000 sed [ 24.990828] type=1400 audit(30.800:99): avc: denied { open } for comm="getprop" path="/dev/__properti1 [ 25.012857] init: Sending signal 9 to service 'bootanim' (pid 240) process group... [ 25.022804] type=1400 audit(30.800:100): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 25.048520] libprocessgroup: Successfully killed process cgroup uid 1003 pid 240 in 0ms [ 25.052023] type=1400 audit(30.800:101): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 25.081347] type=1400 audit(30.804:102): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 25.105458] type=1400 audit(30.804:103): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 25.129819] type=1400 audit(30.804:104): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 25.153884] type=1400 audit(30.808:105): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 25.177657] type=1400 audit(30.808:106): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 25.201724] type=1400 audit(30.808:107): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 25.225372] type=1400 audit(30.808:108): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 25.248819] type=1400 audit(30.808:109): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 25.272461] type=1400 audit(30.808:110): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 25.295826] type=1400 audit(30.808:111): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 25.317732] type=1400 audit(30.808:112): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 25.339859] type=1400 audit(30.808:113): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 25.361743] type=1400 audit(30.808:114): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 25.385585] type=1400 audit(30.808:115): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 25.409733] type=1400 audit(30.808:116): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 25.434088] type=1400 audit(30.808:117): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 25.456266] type=1400 audit(30.808:118): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 25.478516] type=1400 audit(30.808:119): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 25.500483] type=1400 audit(30.808:120): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 25.522772] type=1400 audit(30.808:121): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 25.545291] type=1400 audit(30.808:122): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 25.567487] type=1400 audit(30.808:123): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 25.591117] type=1400 audit(30.808:124): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 25.613941] type=1400 audit(30.808:125): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 25.637663] type=1400 audit(30.808:126): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 25.660470] type=1400 audit(30.808:127): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 25.683081] type=1400 audit(30.808:128): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 25.705262] type=1400 audit(30.808:129): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 25.727243] type=1400 audit(30.816:130): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 25.749424] type=1400 audit(30.816:131): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 25.771304] type=1400 audit(30.816:132): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 25.793038] type=1400 audit(30.816:133): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 25.815232] type=1400 audit(30.816:134): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 25.837806] type=1400 audit(30.820:135): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 25.859028] type=1400 audit(30.820:136): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 25.880343] type=1400 audit(30.820:137): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 25.901439] type=1400 audit(30.820:138): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 25.925303] type=1400 audit(30.820:139): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 25.949445] type=1400 audit(30.820:140): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 25.973232] type=1400 audit(30.820:141): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 26.000919] type=1400 audit(30.820:142): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 26.028871] type=1400 audit(30.820:143): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 26.056386] type=1400 audit(30.820:144): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 26.081075] type=1400 audit(30.820:145): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 26.105880] type=1400 audit(30.820:146): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 26.130381] type=1400 audit(30.820:147): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 26.155389] type=1400 audit(30.820:148): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 26.180695] type=1400 audit(30.820:149): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 26.205632] type=1400 audit(30.820:150): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 26.230675] type=1400 audit(30.820:151): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 26.255839] type=1400 audit(30.820:152): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 26.280629] type=1400 audit(30.820:153): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 26.306508] type=1400 audit(30.820:154): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 26.332547] type=1400 audit(30.820:155): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 26.358177] type=1400 audit(30.820:156): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 26.383083] type=1400 audit(30.820:157): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 26.408161] type=1400 audit(30.820:158): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 26.432936] type=1400 audit(30.820:159): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 26.457602] type=1400 audit(30.820:160): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 26.482560] type=1400 audit(30.820:161): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 26.507145] type=1400 audit(30.820:162): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 26.533913] type=1400 audit(30.820:163): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 26.560967] type=1400 audit(30.820:164): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 26.587659] type=1400 audit(30.824:165): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 26.613201] type=1400 audit(30.824:166): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 26.638905] type=1400 audit(30.824:167): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 26.664217] type=1400 audit(30.824:168): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 26.690089] type=1400 audit(30.824:169): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 26.716237] type=1400 audit(30.824:170): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 26.742090] type=1400 audit(30.824:171): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 26.767185] type=1400 audit(30.824:172): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 26.792515] type=1400 audit(30.824:173): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 26.817500] type=1400 audit(30.824:174): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 26.843752] type=1400 audit(30.824:175): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 26.870089] type=1400 audit(30.824:176): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 26.896291] type=1400 audit(30.824:177): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 26.921640] type=1400 audit(30.832:178): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 26.948407] type=1400 audit(30.832:179): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 26.981925] type=1400 audit(30.832:180): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.006564] type=1400 audit(30.832:181): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 27.031355] type=1400 audit(30.832:182): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 27.055849] type=1400 audit(30.836:183): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.083136] type=1400 audit(30.836:184): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 27.110635] type=1400 audit(30.836:185): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 27.137809] type=1400 audit(30.836:186): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.161216] type=1400 audit(30.836:187): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 27.184881] type=1400 audit(30.836:188): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 27.208213] type=1400 audit(30.836:189): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.231452] type=1400 audit(30.844:190): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 27.254966] type=1400 audit(30.844:191): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 27.278096] type=1400 audit(30.844:192): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.301508] type=1400 audit(30.844:193): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 27.325170] type=1400 audit(30.844:194): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 27.348499] type=1400 audit(30.844:195): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.371589] type=1400 audit(30.844:196): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 27.394893] type=1400 audit(30.844:197): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 27.417971] type=1400 audit(30.844:198): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.441519] type=1400 audit(30.844:199): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 27.465348] type=1400 audit(30.844:200): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 27.488790] type=1400 audit(30.844:201): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.511104] type=1400 audit(30.844:202): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 27.533674] type=1400 audit(30.844:203): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 27.555950] type=1400 audit(30.844:204): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.577888] type=1400 audit(30.844:205): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 27.600172] type=1400 audit(30.844:206): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 27.622028] type=1400 audit(30.844:207): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.646750] type=1400 audit(30.844:208): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 27.671861] type=1400 audit(30.844:209): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 27.696481] type=1400 audit(30.844:210): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.717628] type=1400 audit(30.844:211): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 27.738934] type=1400 audit(30.844:212): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 27.760014] type=1400 audit(30.844:213): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.783825] type=1400 audit(30.844:214): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 27.807944] type=1400 audit(30.844:215): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 27.831889] type=1400 audit(30.848:216): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.854152] type=1400 audit(30.848:217): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 27.876800] type=1400 audit(30.848:218): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 27.899133] type=1400 audit(30.848:219): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.921895] type=1400 audit(30.848:220): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 27.944922] type=1400 audit(30.848:221): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 27.967891] type=1400 audit(30.848:222): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 27.990921] type=1400 audit(30.848:223): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.014226] type=1400 audit(30.848:224): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.037237] type=1400 audit(30.848:225): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 28.060264] type=1400 audit(30.848:226): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.083446] type=1400 audit(30.848:227): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.106124] type=1400 audit(30.848:228): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 28.129123] type=1400 audit(30.848:229): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.152345] type=1400 audit(30.848:230): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.175264] type=1400 audit(30.852:231): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 28.196399] type=1400 audit(30.852:232): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.217799] type=1400 audit(30.852:233): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.239941] type=1400 audit(30.852:234): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 28.261077] type=1400 audit(30.852:235): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.282460] type=1400 audit(30.852:236): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.304434] type=1400 audit(30.856:237): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 28.328192] type=1400 audit(30.856:238): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.352176] type=1400 audit(30.856:239): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.375859] type=1400 audit(30.856:240): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 28.397378] type=1400 audit(30.856:241): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.419125] type=1400 audit(30.856:242): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.440511] type=1400 audit(30.864:243): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 28.463684] type=1400 audit(30.864:244): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.487117] type=1400 audit(30.864:245): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.510808] type=1400 audit(30.864:246): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 28.531609] type=1400 audit(30.864:247): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.552859] type=1400 audit(30.864:248): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.573710] type=1400 audit(30.864:249): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 28.598010] type=1400 audit(30.864:250): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.622538] type=1400 audit(30.864:251): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.646760] type=1400 audit(30.864:252): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 28.669927] type=1400 audit(30.864:253): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.693309] type=1400 audit(30.864:254): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.716382] type=1400 audit(30.864:255): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 28.737984] type=1400 audit(30.864:256): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.759977] type=1400 audit(30.864:257): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.781537] type=1400 audit(30.864:258): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 28.804945] type=1400 audit(30.864:259): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.828668] type=1400 audit(30.864:260): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.852310] type=1400 audit(30.864:261): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 28.873686] type=1400 audit(30.864:262): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.895239] type=1400 audit(30.864:263): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.916431] type=1400 audit(30.864:264): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 28.938463] type=1400 audit(30.864:265): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 28.960719] type=1400 audit(30.864:266): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 28.982582] type=1400 audit(30.928:267): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 29.004258] type=1400 audit(30.928:268): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 29.025580] type=1400 audit(30.968:269): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 29.050400] type=1400 audit(30.968:270): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 29.074845] type=1400 audit(31.052:271): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 29.100206] type=1400 audit(31.052:272): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 29.125272] type=1400 audit(31.052:273): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 29.147551] type=1400 audit(31.076:274): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 29.169810] type=1400 audit(31.392:275): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 29.191374] type=1400 audit(31.392:276): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 29.213087] type=1400 audit(31.392:277): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 29.234758] type=1400 audit(31.392:278): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 29.257400] type=1400 audit(31.392:279): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 29.280284] type=1400 audit(31.392:280): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 29.302816] type=1400 audit(31.392:281): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 29.323948] type=1400 audit(31.392:282): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 29.345237] type=1400 audit(31.392:283): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 29.366239] type=1400 audit(31.412:284): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 29.390079] type=1400 audit(32.280:285): avc: denied { open } for comm="BootAnimation" path="/dev/__p1 [ 29.413874] type=1400 audit(32.280:286): avc: denied { getattr } for comm="BootAnimation" path="/dev/1 [ 29.437975] type=1400 audit(32.280:287): avc: denied { map } for comm="BootAnimation" path="/dev/__pr1 [ 29.461700] type=1400 audit(32.628:288): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 29.486468] type=1400 audit(32.628:289): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 29.511584] type=1400 audit(32.628:290): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 29.536235] type=1400 audit(32.628:291): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 29.561311] type=1400 audit(32.628:292): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 29.586745] type=1400 audit(32.628:293): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 29.611790] type=1400 audit(32.628:294): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 29.636618] type=1400 audit(32.628:295): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 29.662730] type=1400 audit(32.628:296): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 29.687686] type=1400 audit(32.628:297): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 29.714307] type=1400 audit(32.628:298): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 29.740358] type=1400 audit(32.628:299): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 29.766089] type=1400 audit(32.628:300): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 29.791155] type=1400 audit(32.628:301): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 29.816544] type=1400 audit(32.628:302): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 29.842307] type=1400 audit(32.628:303): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 29.867324] type=1400 audit(32.628:304): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 29.892457] type=1400 audit(32.628:305): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 29.917052] type=1400 audit(32.628:306): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 29.942425] type=1400 audit(32.628:307): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 29.968308] type=1400 audit(32.628:308): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 29.993676] type=1400 audit(32.628:309): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 30.020104] type=1400 audit(32.628:310): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 30.046272] type=1400 audit(32.628:311): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 30.072136] type=1400 audit(32.628:312): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 30.097178] type=1400 audit(32.628:313): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 30.122539] type=1400 audit(32.628:314): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 30.147598] type=1400 audit(32.628:315): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 30.172864] type=1400 audit(32.628:316): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 30.198481] type=1400 audit(32.628:317): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 30.223642] type=1400 audit(32.628:318): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 30.248352] type=1400 audit(32.628:319): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 30.273295] type=1400 audit(32.628:320): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 30.298003] type=1400 audit(32.628:321): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 30.320352] audit_log_start: 509 callbacks suppressed [ 30.320368] audit: audit_backlog=65 > audit_backlog_limit=64 [ 30.325506] type=1400 audit(32.628:322): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 30.330047] audit: audit_lost=174 audit_rate_limit=0 audit_backlog_limit=64 [ 30.330069] audit: backlog limit exceeded [ 30.336303] type=1400 audit(32.628:323): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 30.363418] audit: audit_backlog=65 > audit_backlog_limit=64 [ 30.370561] type=1400 audit(32.628:324): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 30.373925] audit: audit_lost=175 audit_rate_limit=0 audit_backlog_limit=64 [ 30.373932] audit: backlog limit exceeded [ 30.374037] audit: audit_backlog=65 > audit_backlog_limit=64 [ 30.401310] type=1400 audit(32.628:325): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 30.406733] audit: audit_lost=176 audit_rate_limit=0 audit_backlog_limit=64 [ 30.429866] type=1400 audit(32.628:326): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 30.436202] audit: backlog limit exceeded [ 30.436660] audit: audit_backlog=65 > audit_backlog_limit=64 [ 30.442239] type=1400 audit(32.632:327): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 30.531693] type=1400 audit(32.632:328): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 30.555587] type=1400 audit(32.632:329): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 30.579047] type=1400 audit(32.636:330): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 30.601986] type=1400 audit(32.636:331): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 30.625125] type=1400 audit(32.636:332): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 30.647953] type=1400 audit(32.636:333): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 30.671213] type=1400 audit(33.740:334): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 30.693305] type=1400 audit(33.740:335): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 30.715802] type=1400 audit(33.740:336): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 30.737932] type=1400 audit(33.740:337): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 30.760498] type=1400 audit(33.740:338): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 30.783329] type=1400 audit(33.740:339): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 30.805732] type=1400 audit(33.740:340): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 30.828419] type=1400 audit(33.740:341): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 30.851438] type=1400 audit(33.740:342): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 30.874196] type=1400 audit(33.740:343): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 30.896508] type=1400 audit(33.740:344): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 30.919247] type=1400 audit(33.740:345): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 30.942411] type=1400 audit(33.740:346): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 30.964486] type=1400 audit(33.740:347): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 30.986723] type=1400 audit(33.740:348): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.008591] type=1400 audit(33.740:349): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.030465] type=1400 audit(33.740:350): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 31.052580] type=1400 audit(33.740:351): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.075338] type=1400 audit(33.740:352): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.096390] type=1400 audit(33.740:353): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 31.117773] type=1400 audit(33.740:354): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.138888] type=1400 audit(33.740:355): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.167048] type=1400 audit(33.740:356): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 31.195347] type=1400 audit(33.740:357): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.223245] type=1400 audit(33.748:358): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.244916] type=1400 audit(33.748:359): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 31.266992] type=1400 audit(33.748:360): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.288683] type=1400 audit(33.748:361): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.312530] type=1400 audit(33.748:362): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 31.336657] type=1400 audit(33.748:363): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.360266] type=1400 audit(33.748:364): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.384439] type=1400 audit(33.748:365): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 31.409304] type=1400 audit(33.748:366): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.433562] type=1400 audit(33.748:367): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.456386] type=1400 audit(33.748:368): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 31.478387] type=1400 audit(33.748:369): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.500083] type=1400 audit(33.748:370): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.522471] type=1400 audit(33.748:371): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 31.545195] type=1400 audit(33.748:372): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.567941] type=1400 audit(33.748:373): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.591444] type=1400 audit(33.748:374): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 31.615145] type=1400 audit(33.748:375): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.638485] type=1400 audit(33.752:376): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.660509] type=1400 audit(33.752:377): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 31.682848] type=1400 audit(33.752:378): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.704843] type=1400 audit(33.752:379): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.727361] type=1400 audit(33.752:380): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 31.750057] type=1400 audit(33.752:381): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.772438] type=1400 audit(34.864:382): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.794182] type=1400 audit(34.864:383): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 31.816295] type=1400 audit(34.864:384): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.837997] type=1400 audit(34.864:385): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.860008] type=1400 audit(34.864:386): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 31.882262] type=1400 audit(34.864:387): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.904214] type=1400 audit(34.864:388): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.926721] type=1400 audit(34.864:389): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 31.949481] type=1400 audit(34.864:390): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 31.971952] type=1400 audit(34.864:391): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 31.994328] type=1400 audit(34.864:392): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.017011] type=1400 audit(34.864:393): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 32.039243] type=1400 audit(34.868:394): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 32.062132] type=1400 audit(34.868:395): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.085253] type=1400 audit(34.868:396): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 32.108228] type=1400 audit(34.868:397): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 32.131574] type=1400 audit(34.868:398): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.155184] type=1400 audit(34.868:399): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 32.178429] type=1400 audit(34.868:400): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 32.201481] type=1400 audit(34.868:401): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.224893] type=1400 audit(34.868:402): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 32.248033] type=1400 audit(34.868:403): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 32.270242] type=1400 audit(34.868:404): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.292721] type=1400 audit(34.868:405): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 32.314919] type=1400 audit(34.868:406): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 32.336759] type=1400 audit(34.868:407): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.358932] type=1400 audit(34.868:408): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 32.380748] type=1400 audit(35.968:409): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 32.402677] type=1400 audit(35.968:410): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.425853] type=1400 audit(35.968:411): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 32.447559] type=1400 audit(35.968:412): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 32.471672] type=1400 audit(35.968:413): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.496109] type=1400 audit(35.968:414): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 32.520119] type=1400 audit(35.968:415): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 32.543904] type=1400 audit(35.968:416): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.567908] type=1400 audit(35.968:417): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 32.591538] type=1400 audit(35.968:418): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 32.615088] type=1400 audit(35.968:419): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.638893] type=1400 audit(35.968:420): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 32.662350] type=1400 audit(35.968:421): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 32.684268] type=1400 audit(35.968:422): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.706512] type=1400 audit(35.968:423): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 32.728509] type=1400 audit(35.968:424): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 32.752387] type=1400 audit(35.968:425): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.776498] type=1400 audit(35.968:426): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 32.800340] type=1400 audit(35.968:427): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 32.821898] type=1400 audit(35.968:428): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.843760] type=1400 audit(35.968:429): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 32.865270] type=1400 audit(35.968:430): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 32.888815] type=1400 audit(35.968:431): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.911271] type=1400 audit(35.968:432): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 32.934373] type=1400 audit(35.968:433): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 32.956185] type=1400 audit(35.968:434): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 32.978307] type=1400 audit(35.968:435): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 33.000393] type=1400 audit(37.080:436): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 33.034009] type=1400 audit(37.080:437): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 33.061363] type=1400 audit(37.080:438): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 33.084981] type=1400 audit(37.080:439): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 33.121285] type=1400 audit(37.080:440): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 33.147655] type=1400 audit(37.080:441): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 33.171610] type=1400 audit(37.080:442): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 33.194520] type=1400 audit(37.080:443): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 33.218005] type=1400 audit(37.080:444): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 33.240703] type=1400 audit(37.080:445): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 33.265483] type=1400 audit(37.080:446): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 33.290845] type=1400 audit(37.080:447): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 33.315955] type=1400 audit(37.080:448): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 33.341025] type=1400 audit(37.080:449): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 33.370292] type=1400 audit(37.080:450): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 33.396633] type=1400 audit(37.080:451): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 33.419036] type=1400 audit(37.080:452): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 33.441814] type=1400 audit(37.080:453): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 33.464010] type=1400 audit(37.080:454): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 33.487988] type=1400 audit(37.080:455): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 33.512137] type=1400 audit(37.080:456): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 33.536245] type=1400 audit(38.208:457): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 33.557788] type=1400 audit(38.208:458): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 33.580390] type=1400 audit(38.208:459): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 33.601851] type=1400 audit(38.208:460): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 33.624443] type=1400 audit(38.208:461): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 33.647210] type=1400 audit(38.208:462): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 33.669604] type=1400 audit(38.208:463): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 33.690505] type=1400 audit(38.208:464): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 33.711816] type=1400 audit(38.208:465): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 33.732715] type=1400 audit(38.208:466): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 33.755863] type=1400 audit(38.208:467): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 33.778506] type=1400 audit(38.208:468): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 33.801920] type=1400 audit(38.208:469): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 33.823638] type=1400 audit(38.208:470): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 33.845394] type=1400 audit(38.208:471): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 33.866513] type=1400 audit(38.208:472): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 33.888576] type=1400 audit(38.208:473): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 33.911223] type=1400 audit(38.208:474): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 33.933377] type=1400 audit(38.208:475): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 33.956355] type=1400 audit(38.208:476): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 33.980395] type=1400 audit(38.208:477): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 34.002801] type=1400 audit(38.208:478): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 34.027033] type=1400 audit(38.208:479): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 34.051987] type=1400 audit(38.208:480): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 34.076162] type=1400 audit(38.208:481): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 34.100176] type=1400 audit(38.208:482): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 34.124191] type=1400 audit(38.208:483): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 34.147826] type=1400 audit(38.208:484): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 34.169755] type=1400 audit(38.208:485): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 34.192002] type=1400 audit(38.208:486): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 34.213817] type=1400 audit(38.208:487): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 34.236679] type=1400 audit(38.208:488): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 34.259991] type=1400 audit(38.208:489): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 34.282795] type=1400 audit(38.208:490): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 34.305875] type=1400 audit(38.208:491): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 34.329389] type=1400 audit(38.208:492): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 34.352366] type=1400 audit(38.208:493): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 34.380092] type=1400 audit(38.208:494): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 34.405711] type=1400 audit(38.208:495): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 34.427630] type=1400 audit(38.208:496): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 34.452067] type=1400 audit(38.208:497): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 34.475286] type=1400 audit(38.208:498): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 34.498466] type=1400 audit(38.208:499): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 34.522136] type=1400 audit(38.208:500): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 34.546386] type=1400 audit(38.208:501): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 34.569432] type=1400 audit(38.208:502): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 34.592018] type=1400 audit(38.208:503): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 34.614837] type=1400 audit(38.208:504): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 34.637133] type=1400 audit(38.208:505): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 34.660013] type=1400 audit(38.208:506): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 34.683200] type=1400 audit(38.208:507): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 34.705996] type=1400 audit(38.208:508): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 34.721032] apexd: Can't open /system_ext/apex for reading : No such file or directory [ 34.728807] type=1400 audit(38.208:509): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 34.737396] apexd: Can't open /product/apex for reading : No such file or directory [ 34.759115] type=1400 audit(38.208:510): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 34.766733] apexd: Can't open /vendor/apex for reading : No such file or directory [ 34.788909] type=1400 audit(38.208:511): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 34.818400] type=1400 audit(38.208:512): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 34.841012] type=1400 audit(38.208:513): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 34.865533] type=1400 audit(38.208:514): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 34.889389] type=1400 audit(38.208:515): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 34.912525] type=1400 audit(38.208:516): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 34.936208] type=1400 audit(38.208:517): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 34.959083] type=1400 audit(38.208:518): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 34.981916] type=1400 audit(38.208:519): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 35.005273] type=1400 audit(38.208:520): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 35.019253] AidlLazyServiceRegistrar: Process has 1 (of 1 available) client(s) in use after notificat1 [ 35.029843] type=1400 audit(38.208:521): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 35.040068] AidlLazyServiceRegistrar: Shutdown prevented by forcePersist override flag. [ 35.063825] type=1400 audit(38.208:522): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 35.095991] type=1400 audit(38.208:523): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 35.122550] type=1400 audit(38.208:524): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 35.148462] type=1400 audit(38.208:525): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 35.176730] type=1400 audit(38.208:526): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 35.201880] type=1400 audit(38.208:527): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 35.226387] type=1400 audit(38.208:528): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 35.248967] type=1400 audit(38.208:529): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 35.271396] type=1400 audit(38.208:530): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 35.293924] type=1400 audit(38.208:531): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 35.316279] type=1400 audit(38.208:532): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 35.340398] type=1400 audit(38.208:533): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 35.367668] type=1400 audit(38.208:534): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 35.392777] type=1400 audit(38.208:535): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 35.418911] type=1400 audit(38.208:536): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 35.445631] type=1400 audit(38.208:537): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 35.471196] type=1400 audit(38.208:538): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 35.496151] type=1400 audit(38.208:539): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 35.529227] type=1400 audit(38.208:540): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 35.549683] audit_log_start: 986 callbacks suppressed [ 35.549695] audit: audit_backlog=65 > audit_backlog_limit=64 [ 35.552919] type=1400 audit(38.208:541): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 35.559366] audit: audit_lost=506 audit_rate_limit=0 audit_backlog_limit=64 [ 35.563982] type=1400 audit(38.208:542): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 35.586849] audit: backlog limit exceeded [ 35.592056] type=1400 audit(38.208:543): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 35.613630] audit: audit_backlog=65 > audit_backlog_limit=64 [ 35.617692] type=1400 audit(38.208:544): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 35.638415] audit: audit_lost=507 audit_rate_limit=0 audit_backlog_limit=64 [ 35.648026] type=1400 audit(38.208:545): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 35.667880] audit: backlog limit exceeded [ 35.674867] type=1400 audit(38.208:546): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 35.698408] audit: audit_backlog=65 > audit_backlog_limit=64 [ 35.702402] type=1400 audit(38.208:547): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 35.724999] audit: audit_lost=508 audit_rate_limit=0 audit_backlog_limit=64 [ 35.734823] type=1400 audit(38.208:548): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 35.752197] audit: backlog limit exceeded [ 35.762316] type=1400 audit(38.208:549): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 35.781827] audit: audit_backlog=65 > audit_backlog_limit=64 [ 35.792407] type=1400 audit(38.208:550): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 35.835546] type=1400 audit(38.208:551): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 35.858194] type=1400 audit(38.208:552): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 35.880865] type=1400 audit(38.208:553): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 35.904065] type=1400 audit(38.208:554): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 35.927398] type=1400 audit(38.208:555): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 35.950090] type=1400 audit(38.208:556): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 35.972918] type=1400 audit(38.208:557): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 35.996929] type=1400 audit(38.208:558): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 36.019384] type=1400 audit(38.208:559): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 36.041355] type=1400 audit(38.208:560): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.064167] type=1400 audit(38.208:561): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 36.086055] type=1400 audit(38.208:562): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 36.107989] type=1400 audit(38.208:563): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.130275] type=1400 audit(38.208:564): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 36.152092] type=1400 audit(38.208:565): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 36.173184] type=1400 audit(38.208:566): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.194564] type=1400 audit(38.208:567): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 36.215606] type=1400 audit(38.272:568): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.239933] type=1400 audit(38.272:569): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 36.265235] type=1400 audit(38.284:570): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.296502] type=1400 audit(38.344:571): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 36.322290] type=1400 audit(38.344:572): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.352318] type=1400 audit(38.356:573): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 36.377588] type=1400 audit(39.452:574): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 36.399255] type=1400 audit(39.452:575): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.424394] type=1400 audit(39.452:576): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 36.445895] type=1400 audit(39.452:577): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 36.468499] type=1400 audit(39.452:578): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.491467] type=1400 audit(39.452:579): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 36.514107] type=1400 audit(39.452:580): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 36.535379] type=1400 audit(39.452:581): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.556809] type=1400 audit(39.452:582): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 36.577833] type=1400 audit(39.452:583): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 36.600415] type=1400 audit(39.452:584): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.623334] type=1400 audit(39.452:585): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 36.645845] type=1400 audit(39.452:586): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 36.668361] type=1400 audit(39.452:587): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.692553] type=1400 audit(39.452:588): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 36.713834] type=1400 audit(39.452:589): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 36.736268] type=1400 audit(39.452:590): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.758756] type=1400 audit(39.452:591): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 36.780803] type=1400 audit(39.452:592): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 36.803382] type=1400 audit(39.452:593): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.826231] type=1400 audit(39.452:594): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 36.848534] type=1400 audit(39.452:595): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 36.872868] type=1400 audit(39.452:596): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.901226] type=1400 audit(39.452:597): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 36.926174] type=1400 audit(39.452:598): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 36.960453] type=1400 audit(39.452:599): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 36.985764] type=1400 audit(39.452:600): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 37.009406] type=1400 audit(39.452:601): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 37.031446] type=1400 audit(39.452:602): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 37.053618] type=1400 audit(39.452:603): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 37.075500] type=1400 audit(39.452:604): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 37.098622] type=1400 audit(39.452:605): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 37.121912] type=1400 audit(39.452:606): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 37.144863] type=1400 audit(39.452:607): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 37.167975] type=1400 audit(39.452:608): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 37.191192] type=1400 audit(39.452:609): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 37.214120] type=1400 audit(39.452:610): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 37.235945] type=1400 audit(39.452:611): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 37.257962] type=1400 audit(39.452:612): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 37.279665] type=1400 audit(39.452:613): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 37.302700] type=1400 audit(39.452:614): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 37.325930] type=1400 audit(39.452:615): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 37.348840] type=1400 audit(39.452:616): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 37.372016] type=1400 audit(39.452:617): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 37.395498] type=1400 audit(39.452:618): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 37.420000] type=1400 audit(41.496:619): avc: denied { read } for comm="Binder:227_2" name="wakeup2" 1 [ 37.439090] type=1400 audit(41.496:620): avc: denied { open } for comm="Binder:227_2" path="/sys/devi1 [ 37.464468] type=1400 audit(41.496:621): avc: denied { read } for comm="Binder:227_2" name="event_cou1 [ 37.483872] type=1400 audit(41.496:622): avc: denied { open } for comm="Binder:227_2" path="/sys/devi1 [ 37.510385] type=1400 audit(41.496:623): avc: denied { getattr } for comm="Binder:227_2" path="/sys/d1 [ 37.537346] type=1400 audit(42.296:624): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 37.559659] type=1400 audit(42.296:625): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 37.582171] type=1400 audit(42.296:626): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 37.604380] type=1400 audit(42.296:627): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 37.626329] type=1400 audit(42.296:628): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 37.648547] type=1400 audit(42.296:629): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 37.670396] type=1400 audit(42.296:630): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 37.692877] type=1400 audit(42.296:631): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 37.715637] type=1400 audit(42.296:632): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 37.738020] type=1400 audit(42.296:633): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 37.760306] type=1400 audit(42.296:634): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 37.782987] type=1400 audit(42.296:635): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 37.805225] type=1400 audit(42.296:636): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 37.828159] type=1400 audit(42.296:637): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 37.851230] type=1400 audit(42.296:638): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 37.873902] type=1400 audit(42.296:639): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 37.896383] type=1400 audit(42.296:640): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 37.919079] type=1400 audit(42.296:641): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 37.941373] type=1400 audit(42.296:642): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 37.963479] type=1400 audit(42.296:643): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 37.985742] type=1400 audit(42.296:644): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 38.007858] type=1400 audit(42.296:645): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 38.029844] type=1400 audit(42.296:646): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 38.053409] type=1400 audit(42.296:647): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 38.075317] type=1400 audit(42.300:648): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 38.096745] type=1400 audit(42.300:649): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 38.118141] type=1400 audit(42.300:650): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 38.141423] type=1400 audit(42.300:651): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 38.165967] type=1400 audit(42.300:652): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 38.190204] type=1400 audit(42.300:653): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 38.215231] type=1400 audit(42.300:654): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 38.243363] type=1400 audit(42.300:655): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 38.271627] type=1400 audit(42.300:656): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 38.299488] type=1400 audit(42.300:657): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 38.324309] type=1400 audit(42.300:658): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 38.350658] type=1400 audit(42.300:659): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 38.375525] type=1400 audit(42.300:660): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 38.401071] type=1400 audit(42.300:661): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 38.426951] type=1400 audit(42.300:662): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 38.452593] type=1400 audit(42.300:663): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 38.477980] type=1400 audit(42.300:664): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 38.504162] type=1400 audit(42.300:665): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 38.529431] type=1400 audit(42.300:666): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 38.555684] type=1400 audit(42.300:667): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 38.582327] type=1400 audit(42.300:668): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 38.609326] type=1400 audit(42.300:669): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 38.635312] type=1400 audit(42.300:670): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 38.661268] type=1400 audit(42.300:671): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 38.686491] type=1400 audit(42.300:672): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 38.713831] type=1400 audit(42.300:673): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 38.741951] type=1400 audit(42.300:674): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 38.772200] type=1400 audit(42.300:675): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 38.797701] type=1400 audit(42.300:676): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 38.823528] type=1400 audit(42.300:677): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 38.849732] type=1400 audit(42.300:678): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 38.876476] type=1400 audit(42.300:679): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 38.903290] type=1400 audit(42.300:680): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 38.929273] type=1400 audit(42.300:681): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 38.954526] type=1400 audit(42.300:682): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 38.980122] type=1400 audit(42.300:683): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 39.005267] type=1400 audit(42.300:684): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 39.031544] type=1400 audit(42.300:685): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 39.058027] type=1400 audit(42.300:686): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 39.084180] type=1400 audit(42.300:687): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 39.124511] type=1400 audit(42.300:688): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 39.150720] type=1400 audit(42.300:689): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 39.176062] type=1400 audit(42.300:690): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 39.200756] type=1400 audit(42.300:691): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 39.225928] type=1400 audit(42.300:692): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 39.250477] type=1400 audit(42.304:693): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 39.278006] type=1400 audit(42.304:694): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 39.305733] type=1400 audit(42.304:695): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 39.333119] type=1400 audit(42.304:696): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 39.356875] type=1400 audit(42.304:697): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 39.380704] type=1400 audit(42.304:698): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 39.405489] type=1400 audit(42.304:699): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 39.430052] type=1400 audit(42.304:700): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 39.455529] type=1400 audit(42.304:701): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 39.479097] type=1400 audit(42.304:702): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 39.503201] type=1400 audit(42.304:703): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 39.527070] type=1400 audit(42.304:704): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 39.550654] type=1400 audit(42.304:705): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 39.574208] type=1400 audit(42.304:706): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 39.598011] type=1400 audit(42.304:707): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 39.621403] type=1400 audit(42.304:708): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 39.643795] type=1400 audit(42.304:709): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 39.666415] type=1400 audit(42.304:710): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 39.688677] type=1400 audit(42.308:711): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 39.712105] type=1400 audit(42.308:712): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 39.712539] type=1400 audit(42.308:713): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 39.754950] type=1400 audit(42.308:714): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 39.778719] type=1400 audit(42.308:715): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 39.802695] type=1400 audit(42.308:716): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 39.826338] type=1400 audit(42.308:717): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 39.849208] type=1400 audit(42.308:718): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 39.872311] type=1400 audit(42.308:719): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 39.895075] type=1400 audit(42.308:720): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 39.918198] type=1400 audit(42.308:721): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 39.941700] type=1400 audit(42.308:722): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 39.964764] type=1400 audit(42.308:723): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 39.987871] type=1400 audit(42.308:724): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 40.011233] type=1400 audit(42.308:725): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 40.019429] AidlLazyServiceRegistrar: Process has 0 (of 1 available) client(s) in use after notificat0 [ 40.034163] type=1400 audit(42.308:726): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.045970] AidlLazyServiceRegistrar: Shutdown prevented by forcePersist override flag. [ 40.067801] type=1400 audit(42.308:727): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 40.097610] type=1400 audit(42.308:728): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 40.119947] type=1400 audit(42.308:729): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.120413] type=1400 audit(42.308:730): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 40.163376] type=1400 audit(42.308:731): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 40.185062] type=1400 audit(42.312:732): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.207978] type=1400 audit(42.312:733): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 40.231097] type=1400 audit(42.312:734): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 40.253832] type=1400 audit(42.316:735): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.277967] type=1400 audit(42.316:736): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 40.302360] type=1400 audit(42.316:737): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 40.326699] type=1400 audit(42.316:738): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.348291] type=1400 audit(42.316:739): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 40.370183] type=1400 audit(42.316:740): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 40.392121] type=1400 audit(42.316:741): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.414446] type=1400 audit(43.448:742): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.436869] type=1400 audit(43.448:743): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 40.459545] type=1400 audit(43.448:744): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 40.481821] type=1400 audit(43.448:745): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.505304] type=1400 audit(43.448:746): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 40.528984] type=1400 audit(43.448:747): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 40.552464] type=1400 audit(43.448:748): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.575224] type=1400 audit(43.448:749): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 40.598393] type=1400 audit(43.448:750): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 40.621136] type=1400 audit(43.448:751): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.642721] type=1400 audit(43.448:752): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 40.664459] type=1400 audit(43.448:753): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 40.685875] type=1400 audit(43.448:754): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.708541] type=1400 audit(43.448:755): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 40.731458] type=1400 audit(43.448:756): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 40.754022] type=1400 audit(43.448:757): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.776759] type=1400 audit(43.448:758): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 40.800862] type=1400 audit(43.448:759): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 40.823621] type=1400 audit(43.448:760): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.845950] type=1400 audit(43.448:761): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 40.868534] type=1400 audit(43.448:762): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 40.890616] type=1400 audit(43.448:763): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.912881] type=1400 audit(43.448:764): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 40.935361] type=1400 audit(43.448:765): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 40.958606] type=1400 audit(43.448:766): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 40.980265] type=1400 audit(43.448:767): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 41.002325] type=1400 audit(43.448:768): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 41.025406] type=1400 audit(43.448:769): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 41.050512] type=1400 audit(43.452:770): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 41.057958] init: Control message: Processed ctl.start for 'idmap2d' from pid: 561 (system_server) [ 41.074703] type=1400 audit(43.452:771): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 41.107171] type=1400 audit(43.452:772): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 41.130744] type=1400 audit(43.452:773): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 41.154541] type=1400 audit(43.452:774): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 41.180257] type=1400 audit(43.452:775): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 41.200812] healthd: battery none chg= [ 41.207302] type=1400 audit(43.452:776): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 41.231617] type=1400 audit(43.452:777): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 41.255081] type=1400 audit(43.452:778): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 41.277748] type=1400 audit(43.452:779): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 41.300633] type=1400 audit(43.452:780): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 41.322531] type=1400 audit(43.452:781): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 41.352662] type=1400 audit(43.452:782): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 41.387353] type=1400 audit(43.452:783): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 41.412270] type=1400 audit(43.456:784): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 41.434208] type=1400 audit(43.456:785): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 41.456081] type=1400 audit(43.456:786): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 41.477510] type=1400 audit(43.520:787): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 41.499335] type=1400 audit(43.520:788): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 41.518866] audit_log_start: 32 callbacks suppressed [ 41.518877] audit: audit_backlog=65 > audit_backlog_limit=64 [ 41.521214] type=1400 audit(43.520:789): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 41.527555] audit: audit_lost=520 audit_rate_limit=0 audit_backlog_limit=64 [ 41.531982] type=1400 audit(43.604:790): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 41.554870] audit: backlog limit exceeded [ 41.560222] type=1400 audit(43.604:791): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 41.608462] type=1400 audit(43.604:792): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 41.631478] type=1400 audit(43.688:793): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 41.656502] type=1400 audit(43.688:794): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 41.681993] type=1400 audit(43.688:795): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 41.706853] type=1400 audit(43.712:796): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 41.736852] type=1400 audit(44.844:797): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 41.763422] type=1400 audit(44.844:798): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 41.788161] type=1400 audit(44.844:799): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 41.813350] type=1400 audit(44.844:800): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 41.837948] type=1400 audit(44.844:801): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 41.862136] type=1400 audit(44.844:802): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 41.890743] type=1400 audit(44.844:803): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 41.913529] type=1400 audit(44.844:804): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 41.936823] type=1400 audit(44.844:805): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 41.959082] type=1400 audit(44.844:806): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 41.982333] type=1400 audit(44.844:807): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 42.005706] type=1400 audit(44.844:808): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 42.029039] type=1400 audit(44.844:809): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 42.060171] type=1400 audit(44.844:810): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 42.083665] type=1400 audit(44.844:811): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 42.106619] type=1400 audit(44.852:812): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 42.131664] type=1400 audit(44.852:813): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 42.156884] type=1400 audit(44.852:814): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 42.181708] type=1400 audit(44.852:815): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 42.204272] type=1400 audit(44.852:816): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 42.227427] type=1400 audit(44.852:817): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 42.248832] type=1400 audit(44.852:818): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 42.273306] type=1400 audit(44.852:819): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 42.297915] type=1400 audit(44.852:820): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 42.323052] type=1400 audit(47.076:821): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 42.346569] type=1400 audit(47.076:822): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 42.368970] type=1400 audit(47.076:823): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 42.390883] type=1400 audit(47.084:824): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 42.416299] type=1400 audit(47.084:825): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 42.440432] type=1400 audit(47.084:826): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 42.463966] type=1400 audit(47.084:827): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 42.485110] init: processing action (sys.sysctl.extra_free_kbytes=*) from (/system/etc/init/hw/init.r) [ 42.496166] type=1400 audit(47.084:828): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 42.518353] type=1400 audit(47.084:829): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 42.549434] type=1400 audit(49.384:830): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 42.571256] type=1400 audit(49.384:831): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 42.593277] type=1400 audit(49.384:832): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 42.615082] type=1400 audit(49.384:833): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 42.637827] type=1400 audit(49.384:834): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 42.662154] type=1400 audit(49.384:835): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 42.688904] type=1400 audit(49.384:836): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 42.712783] type=1400 audit(49.384:837): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 42.732146] audit: audit_backlog=65 > audit_backlog_limit=64 [ 42.738892] type=1400 audit(49.384:838): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 42.739251] audit: audit_lost=521 audit_rate_limit=0 audit_backlog_limit=64 [ 42.763168] type=1400 audit(49.384:839): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 42.766686] audit: backlog limit exceeded [ 42.793652] audit: audit_backlog=65 > audit_backlog_limit=64 [ 42.794416] type=1400 audit(49.384:840): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 42.799480] audit: audit_lost=522 audit_rate_limit=0 audit_backlog_limit=64 [ 42.823047] type=1400 audit(49.384:841): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 42.828682] audit: backlog limit exceeded [ 42.852150] type=1400 audit(49.384:842): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 42.855022] audit: audit_backlog=65 > audit_backlog_limit=64 [ 42.876619] type=1400 audit(49.384:843): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 42.903050] type=1400 audit(49.384:844): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 42.925015] type=1400 audit(49.384:845): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 42.947796] type=1400 audit(49.384:846): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 42.973308] type=1400 audit(49.384:847): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 42.996059] type=1400 audit(49.384:848): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 43.019022] type=1400 audit(49.384:849): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 43.041845] type=1400 audit(49.384:850): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 43.064356] type=1400 audit(49.384:851): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 43.087833] type=1400 audit(49.384:852): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 43.112366] type=1400 audit(49.384:853): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 43.135418] type=1400 audit(49.384:854): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 43.158682] type=1400 audit(49.384:855): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 43.182269] type=1400 audit(49.384:856): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 43.205377] type=1400 audit(49.408:857): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 43.227657] type=1400 audit(49.408:858): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 43.250092] type=1400 audit(49.408:859): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 43.272585] type=1400 audit(49.408:860): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 43.295023] type=1400 audit(49.408:861): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 43.317636] type=1400 audit(49.408:862): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 43.339949] type=1400 audit(49.408:863): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 43.362631] type=1400 audit(49.408:864): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 43.385655] type=1400 audit(49.408:865): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 43.408403] type=1400 audit(49.408:866): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 43.431231] type=1400 audit(49.408:867): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 43.454153] type=1400 audit(49.408:868): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 43.476516] type=1400 audit(49.408:869): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 43.498652] type=1400 audit(49.408:870): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 43.521058] type=1400 audit(49.408:871): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 43.543037] type=1400 audit(49.408:872): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 43.564935] type=1400 audit(49.408:873): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 43.587203] type=1400 audit(49.408:874): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 43.608888] type=1400 audit(49.408:875): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 43.633699] type=1400 audit(49.408:876): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 43.660036] type=1400 audit(49.408:877): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 43.684730] type=1400 audit(49.408:878): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 43.710075] type=1400 audit(49.408:879): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 43.735555] type=1400 audit(49.408:880): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 43.760711] type=1400 audit(49.408:881): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 43.785993] type=1400 audit(49.408:882): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 43.811282] type=1400 audit(49.408:883): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 43.836286] type=1400 audit(49.408:884): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 43.862868] type=1400 audit(49.408:885): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 43.889090] type=1400 audit(49.408:886): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 43.915090] type=1400 audit(49.408:887): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 43.940395] type=1400 audit(49.408:888): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 43.965760] type=1400 audit(49.408:889): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 43.990926] type=1400 audit(49.408:890): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 44.016026] type=1400 audit(49.408:891): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 44.041260] type=1400 audit(49.408:892): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 44.066912] type=1400 audit(49.408:893): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 44.094330] type=1400 audit(49.408:894): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 44.124790] type=1400 audit(49.408:895): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 44.151858] type=1400 audit(49.408:896): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 44.178895] type=1400 audit(49.408:897): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 44.204828] type=1400 audit(49.408:898): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 44.231786] type=1400 audit(49.408:899): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 44.258075] type=1400 audit(49.408:900): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 44.284752] type=1400 audit(49.408:901): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 44.310954] type=1400 audit(49.408:902): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 44.336618] type=1400 audit(49.408:903): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 44.363307] type=1400 audit(49.408:904): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 44.389380] type=1400 audit(49.408:905): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 44.419218] type=1400 audit(49.408:906): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 44.446011] type=1400 audit(49.408:907): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 44.473739] type=1400 audit(49.408:908): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 44.499159] type=1400 audit(49.408:909): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 44.524668] type=1400 audit(49.408:910): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 44.550012] type=1400 audit(49.408:911): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 44.574810] type=1400 audit(49.408:912): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 44.600739] type=1400 audit(49.408:913): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 44.627620] type=1400 audit(49.408:914): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 44.656835] type=1400 audit(49.408:915): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 44.710046] type=1400 audit(49.408:916): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 44.739383] type=1400 audit(49.408:917): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 44.769127] type=1400 audit(49.408:918): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 44.795062] type=1400 audit(49.408:919): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 44.824117] type=1400 audit(49.408:920): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 44.829256] read descriptors [ 44.847958] type=1400 audit(49.408:921): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 44.863662] read strings [ 44.874174] type=1400 audit(49.408:922): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 44.883822] read descriptors [ 44.900783] type=1400 audit(49.408:923): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 44.908728] read strings [ 44.924936] type=1400 audit(49.408:924): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 44.958891] type=1400 audit(49.408:925): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 44.986211] type=1400 audit(49.408:926): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 45.011794] type=1400 audit(49.408:927): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 45.038635] type=1400 audit(49.408:928): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 45.070436] type=1400 audit(49.408:929): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 45.094753] type=1400 audit(49.408:930): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 45.120461] type=1400 audit(49.408:931): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 45.176388] type=1400 audit(49.408:932): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 45.200015] type=1400 audit(49.408:933): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 45.228398] type=1400 audit(49.408:934): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 45.252104] type=1400 audit(49.408:935): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 45.274543] type=1400 audit(49.408:936): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 45.301202] type=1400 audit(49.408:937): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 45.323343] type=1400 audit(49.408:938): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 45.348129] type=1400 audit(49.408:939): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 45.374494] type=1400 audit(49.408:940): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 45.399762] type=1400 audit(49.408:941): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 45.423791] type=1400 audit(49.408:942): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 45.449109] type=1400 audit(49.408:943): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 45.473090] type=1400 audit(49.408:944): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 45.495543] type=1400 audit(49.408:945): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 45.518917] type=1400 audit(49.408:946): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 45.541862] type=1400 audit(49.408:947): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 45.564936] type=1400 audit(49.408:948): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 45.588420] type=1400 audit(49.408:949): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 45.622501] type=1400 audit(49.408:950): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 45.646143] type=1400 audit(49.408:951): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 45.669772] type=1400 audit(49.408:952): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 45.693044] type=1400 audit(49.408:953): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 45.716315] type=1400 audit(49.408:954): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 45.741800] type=1400 audit(49.408:955): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 45.765063] type=1400 audit(49.408:956): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 45.789105] type=1400 audit(49.408:957): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 45.813484] type=1400 audit(49.408:958): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 45.837340] type=1400 audit(49.408:959): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 45.859993] type=1400 audit(49.408:960): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 45.882365] type=1400 audit(49.408:961): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 45.910074] type=1400 audit(49.408:962): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 45.931905] type=1400 audit(49.408:963): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 45.956949] type=1400 audit(49.408:964): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 45.979777] type=1400 audit(49.408:965): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 45.994020] TI DP83867 8000f00.mdio:00: attached PHY driver [TI DP83867] (mii_bus:phy_addr=8000f00.md) [ 46.007599] type=1400 audit(49.408:966): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 46.018207] am65-cpsw-nuss 8000000.ethernet eth0: Link is Down [ 46.044740] type=1400 audit(49.408:967): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 46.071524] type=1400 audit(49.408:968): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 46.100869] type=1400 audit(49.408:969): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 46.125003] type=1400 audit(49.408:970): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 46.152126] type=1400 audit(49.408:971): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 46.182007] type=1400 audit(49.408:972): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 46.204452] type=1400 audit(49.408:973): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 46.227195] type=1400 audit(49.408:974): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 46.250362] type=1400 audit(49.408:975): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 46.273599] type=1400 audit(49.408:976): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 46.296558] type=1400 audit(49.408:977): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 46.321448] type=1400 audit(49.408:978): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 46.346293] type=1400 audit(49.408:979): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 46.370602] type=1400 audit(49.408:980): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 46.393145] type=1400 audit(49.408:981): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 46.415113] type=1400 audit(49.408:982): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 46.436704] type=1400 audit(49.408:983): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 46.459097] type=1400 audit(49.408:984): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 46.484881] type=1400 audit(49.408:985): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 46.509208] type=1400 audit(49.408:986): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 46.541494] type=1400 audit(49.408:987): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 46.579414] type=1400 audit(49.408:988): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 46.603636] type=1400 audit(49.408:989): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 46.626789] type=1400 audit(49.408:990): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 46.649504] type=1400 audit(49.408:991): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 46.673269] type=1400 audit(49.408:992): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 46.697728] type=1400 audit(49.408:993): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 46.722712] type=1400 audit(49.408:994): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 46.745720] type=1400 audit(49.408:995): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 46.769480] type=1400 audit(49.408:996): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 46.793672] type=1400 audit(49.408:997): avc: denied { map } for comm="getprop" path="/dev/__properti1 [ 46.817803] type=1400 audit(49.408:998): avc: denied { open } for comm="getprop" path="/dev/__propert1 [ 46.839902] type=1400 audit(49.408:999): avc: denied { getattr } for comm="getprop" path="/dev/__prop1 [ 46.862112] type=1400 audit(49.408:1000): avc: denied { map } for comm="getprop" path="/dev/__propert1 [ 46.883644] type=1400 audit(49.408:1001): avc: denied { open } for comm="getprop" path="/dev/__proper1 [ 46.905140] type=1400 audit(49.408:1002): avc: denied { getattr } for comm="getprop" path="/dev/__pro1 [ 46.926881] type=1400 audit(49.408:1003): avc: denied { map } for comm="getprop" path="/dev/__propert1 [ 46.948125] type=1400 audit(49.408:1004): avc: denied { open } for comm="getprop" path="/dev/__proper1 [ 46.971747] type=1400 audit(49.408:1005): avc: denied { getattr } for comm="getprop" path="/dev/__pro1 [ 46.995414] type=1400 audit(49.408:1006): avc: denied { map } for comm="getprop" path="/dev/__propert1 [ 47.019213] type=1400 audit(49.408:1007): avc: denied { open } for comm="getprop" path="/dev/__proper1 [ 47.042701] type=1400 audit(49.408:1008): avc: denied { getattr } for comm="getprop" path="/dev/__pro1 [ 47.065613] type=1400 audit(49.408:1009): avc: denied { map } for comm="getprop" path="/dev/__propert1 [ 47.092312] type=1400 audit(49.408:1010): avc: denied { open } for comm="getprop" path="/dev/__proper1 [ 47.129692] type=1400 audit(49.408:1011): avc: denied { getattr } for comm="getprop" path="/dev/__pro1 [ 47.153137] type=1400 audit(49.408:1012): avc: denied { map } for comm="getprop" path="/dev/__propert1 [ 47.175880] type=1400 audit(49.408:1013): avc: denied { open } for comm="getprop" path="/dev/__proper1 [ 47.199450] type=1400 audit(49.408:1014): avc: denied { getattr } for comm="getprop" path="/dev/__pro1 [ 47.223445] type=1400 audit(49.408:1015): avc: denied { map } for comm="getprop" path="/dev/__propert1 [ 47.259258] type=1400 audit(49.408:1016): avc: denied { open } for comm="getprop" path="/dev/__proper1 [ 47.286229] type=1400 audit(49.408:1017): avc: denied { getattr } for comm="getprop" path="/dev/__pro1 [ 47.316611] type=1400 audit(49.408:1018): avc: denied { map } for comm="getprop" path="/dev/__propert1 [ 47.347870] type=1400 audit(49.408:1019): avc: denied { open } for comm="getprop" path="/dev/__proper1 [ 47.371881] type=1400 audit(49.408:1020): avc: denied { getattr } for comm="getprop" path="/dev/__pro1 [ 47.396188] type=1400 audit(49.408:1021): avc: denied { map } for comm="getprop" path="/dev/__propert1 [ 47.420257] type=1400 audit(49.408:1022): avc: denied { open } for comm="getprop" path="/dev/__proper1 [ 47.443111] type=1400 audit(49.408:1023): avc: denied { getattr } for comm="getprop" path="/dev/__pro1 [ 47.466738] type=1400 audit(49.408:1024): avc: denied { map } for comm="getprop" path="/dev/__propert1 [ 47.490809] type=1400 audit(49.408:1025): avc: denied { open } for comm="getprop" path="/dev/__proper1 [ 47.518143] type=1400 audit(49.408:1026): avc: denied { getattr } for comm="getprop" path="/dev/__pro1 [ 47.537461] audit_log_start: 599 callbacks suppressed [ 47.537471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 47.548443] type=1400 audit(49.408:1027): avc: denied { map } for comm="getprop" path="/dev/__propert1 [ 47.559822] audit: audit_lost=723 audit_rate_limit=0 audit_backlog_limit=64 [ 47.573970] type=1400 audit(49.408:1028): avc: denied { open } for comm="getprop" path="/dev/__proper1 [ 47.587791] audit: backlog limit exceeded [ 47.605317] audit: audit_backlog=65 > audit_backlog_limit=64 [ 47.615846] audit: audit_lost=724 audit_rate_limit=0 audit_backlog_limit=64 [ 47.625254] audit: backlog limit exceeded [ 47.628467] type=1400 audit(49.408:1029): avc: denied { getattr } for comm="getprop" path="/dev/__pro1 [ 47.651117] audit: audit_backlog=65 > audit_backlog_limit=64 [ 47.654034] type=1400 audit(49.408:1030): avc: denied { map } for comm="getprop" path="/dev/__propert1 [ 47.657186] audit: audit_lost=725 audit_rate_limit=0 audit_backlog_limit=64 [ 47.681141] type=1400 audit(49.408:1031): avc: denied { open } for comm="getprop" path="/dev/__proper1 [ 47.685030] audit: backlog limit exceeded [ 47.709133] type=1400 audit(49.408:1032): avc: denied { getattr } for comm="getprop" path="/dev/__pro1 [ 47.711417] audit: audit_backlog=65 > audit_backlog_limit=64 [ 47.733474] type=1400 audit(49.408:1033): avc: denied { map } for comm="getprop" path="/dev/__propert1 [ 47.762490] type=1400 audit(49.408:1034): avc: denied { open } for comm="getprop" path="/dev/__proper1 [ 47.786255] type=1400 audit(49.492:1035): avc: denied { map } for comm="getprop" path="/dev/__propert1 [ 47.809586] type=1400 audit(1663334346.864:1036): avc: denied { open } for comm="getprop" path="/dev/1 [ 47.833011] type=1400 audit(1663334346.864:1037): avc: denied { getattr } for comm="getprop" path="/d1 [ 47.855893] type=1400 audit(1663334346.864:1038): avc: denied { map } for comm="getprop" path="/dev/_1 [ 47.878369] type=1400 audit(1663334346.864:1039): avc: denied { open } for comm="getprop" path="/dev/1 [ 47.900316] type=1400 audit(1663334346.864:1040): avc: denied { getattr } for comm="getprop" path="/d1 [ 47.922520] type=1400 audit(1663334346.864:1041): avc: denied { map } for comm="getprop" path="/dev/_1 [ 47.944541] type=1400 audit(1663334346.864:1042): avc: denied { open } for comm="getprop" path="/dev/1 [ 47.970949] type=1400 audit(1663334346.864:1043): avc: denied { getattr } for comm="getprop" path="/d1 [ 48.004668] type=1400 audit(1663334346.864:1044): avc: denied { map } for comm="getprop" path="/dev/_1 [ 48.033387] type=1400 audit(1663334346.864:1045): avc: denied { open } for comm="getprop" path="/dev/1 [ 48.058297] type=1400 audit(1663334346.864:1046): avc: denied { getattr } for comm="getprop" path="/d1 [ 48.083520] type=1400 audit(1663334346.864:1047): avc: denied { map } for comm="getprop" path="/dev/_1 [ 48.109143] type=1400 audit(1663334346.868:1048): avc: denied { open } for comm="getprop" path="/dev/1 [ 48.133127] type=1400 audit(1663334346.868:1049): avc: denied { getattr } for comm="getprop" path="/d1 [ 48.156865] type=1400 audit(1663334346.868:1050): avc: denied { map } for comm="getprop" path="/dev/_1 [ 48.179566] type=1400 audit(1663334346.868:1051): avc: denied { open } for comm="getprop" path="/dev/1 [ 48.203498] type=1400 audit(1663334346.868:1052): avc: denied { getattr } for comm="getprop" path="/d1 [ 48.227639] type=1400 audit(1663334346.868:1053): avc: denied { map } for comm="getprop" path="/dev/_1 [ 48.251965] type=1400 audit(1663334346.868:1054): avc: denied { open } for comm="getprop" path="/dev/1 [ 48.277716] type=1400 audit(1663334346.868:1055): avc: denied { getattr } for comm="getprop" path="/d1 [ 48.303160] type=1400 audit(1663334346.868:1056): avc: denied { map } for comm="getprop" path="/dev/_1 [ 48.355474] type=1400 audit(1663334346.868:1057): avc: denied { open } for comm="getprop" path="/dev/1 [ 48.382378] type=1400 audit(1663334346.868:1058): avc: denied { getattr } for comm="getprop" path="/d1 [ 48.405540] type=1400 audit(1663334346.868:1059): avc: denied { map } for comm="getprop" path="/dev/_1 [ 48.435919] type=1400 audit(1663334346.868:1060): avc: denied { open } for comm="getprop" path="/dev/1 [ 48.482498] type=1400 audit(1663334346.868:1061): avc: denied { getattr } for comm="getprop" path="/d1 [ 48.523845] type=1400 audit(1663334346.868:1062): avc: denied { map } for comm="getprop" path="/dev/_1 [ 48.556509] type=1400 audit(1663334346.868:1063): avc: denied { open } for comm="getprop" path="/dev/1 [ 48.593256] type=1400 audit(1663334346.868:1064): avc: denied { getattr } for comm="getprop" path="/d1 [ 48.619214] type=1400 audit(1663334346.868:1065): avc: denied { map } for comm="getprop" path="/dev/_1 [ 48.643964] type=1400 audit(1663334346.868:1066): avc: denied { open } for comm="getprop" path="/dev/1 [ 48.670022] type=1400 audit(1663334346.868:1067): avc: denied { getattr } for comm="getprop" path="/d1 [ 48.695437] type=1400 audit(1663334346.868:1068): avc: denied { map } for comm="getprop" path="/dev/_1 [ 48.725771] type=1400 audit(1663334346.868:1069): avc: denied { open } for comm="getprop" path="/dev/1 [ 48.755132] type=1400 audit(1663334346.868:1070): avc: denied { getattr } for comm="getprop" path="/d1 [ 48.781556] type=1400 audit(1663334346.868:1071): avc: denied { map } for comm="getprop" path="/dev/_1 [ 48.829857] type=1400 audit(1663334346.868:1072): avc: denied { open } for comm="getprop" path="/dev/1 [ 48.862101] type=1400 audit(1663334346.868:1073): avc: denied { getattr } for comm="getprop" path="/d1 [ 48.916525] type=1400 audit(1663334346.868:1074): avc: denied { map } for comm="getprop" path="/dev/_1 [ 48.962111] type=1400 audit(1663334346.868:1075): avc: denied { open } for comm="getprop" path="/dev/1 [ 48.997868] type=1400 audit(1663334346.868:1076): avc: denied { getattr } for comm="getprop" path="/d1 [ 49.060353] type=1400 audit(1663334346.868:1077): avc: denied { map } for comm="getprop" path="/dev/_1 [ 49.120730] type=1400 audit(1663334346.868:1078): avc: denied { open } for comm="getprop" path="/dev/1 [ 49.145538] type=1400 audit(1663334346.868:1079): avc: denied { getattr } for comm="getprop" path="/d1 [ 49.175014] type=1400 audit(1663334346.868:1080): avc: denied { map } for comm="getprop" path="/dev/_1 [ 49.203886] type=1400 audit(1663334346.872:1081): avc: denied { open } for comm="getprop" path="/dev/1 [ 49.230099] type=1400 audit(1663334346.872:1082): avc: denied { getattr } for comm="getprop" path="/d1 [ 49.262862] type=1400 audit(1663334346.872:1083): avc: denied { map } for comm="getprop" path="/dev/_1 [ 49.296883] type=1400 audit(1663334346.932:1084): avc: denied { getattr } for comm="getprop" path="/d1 [ 49.332997] type=1400 audit(1663334346.932:1085): avc: denied { map } for comm="getprop" path="/dev/_1 [ 49.435837] type=1400 audit(1663334346.932:1086): avc: denied { open } for comm="getprop" path="/dev/1 [ 49.458564] type=1400 audit(1663334346.992:1087): avc: denied { map } for comm="getprop" path="/dev/_1 [ 49.484499] type=1400 audit(1663334346.992:1088): avc: denied { open } for comm="getprop" path="/dev/1 [ 49.509334] type=1400 audit(1663334347.020:1089): avc: denied { map } for comm="getprop" path="/dev/_1 [ 49.544789] type=1400 audit(1663334348.152:1090): avc: denied { open } for comm="getprop" path="/dev/1 [ 49.568964] type=1400 audit(1663334348.152:1091): avc: denied { getattr } for comm="getprop" path="/d1 [ 49.598895] type=1400 audit(1663334348.152:1092): avc: denied { map } for comm="getprop" path="/dev/_1 [ 49.624981] type=1400 audit(1663334348.152:1093): avc: denied { open } for comm="getprop" path="/dev/1 [ 49.648690] type=1400 audit(1663334348.152:1094): avc: denied { getattr } for comm="getprop" path="/d1 [ 49.674985] type=1400 audit(1663334348.152:1095): avc: denied { map } for comm="getprop" path="/dev/_1 [ 49.705182] type=1400 audit(1663334348.152:1096): avc: denied { open } for comm="getprop" path="/dev/1 [ 49.730704] type=1400 audit(1663334348.152:1097): avc: denied { getattr } for comm="getprop" path="/d1 [ 49.757616] type=1400 audit(1663334348.152:1098): avc: denied { map } for comm="getprop" path="/dev/_1 [ 49.787272] type=1400 audit(1663334348.152:1099): avc: denied { open } for comm="getprop" path="/dev/1 [ 49.816423] type=1400 audit(1663334348.152:1100): avc: denied { getattr } for comm="getprop" path="/d1 [ 49.841875] type=1400 audit(1663334348.152:1101): avc: denied { map } for comm="getprop" path="/dev/_1 [ 49.867934] type=1400 audit(1663334348.160:1102): avc: denied { open } for comm="getprop" path="/dev/1 [ 49.903621] type=1400 audit(1663334348.160:1103): avc: denied { getattr } for comm="getprop" path="/d1 [ 49.991132] type=1400 audit(1663334348.160:1104): avc: denied { map } for comm="getprop" path="/dev/_1 [ 50.015873] type=1400 audit(1663334348.160:1105): avc: denied { open } for comm="getprop" path="/dev/1 [ 50.021569] AidlLazyServiceRegistrar: Process has 1 (of 1 available) client(s) in use after notificat1 [ 50.040162] type=1400 audit(1663334348.160:1106): avc: denied { getattr } for comm="getprop" path="/d1 [ 50.052196] AidlLazyServiceRegistrar: Shutdown prevented by forcePersist override flag. [ 50.077008] type=1400 audit(1663334348.160:1107): avc: denied { map } for comm="getprop" path="/dev/_1 [ 50.087057] AidlLazyServiceRegistrar: Process has 0 (of 1 available) client(s) in use after notificat0 [ 50.108233] type=1400 audit(1663334348.164:1108): avc: denied { open } for comm="getprop" path="/dev/1 [ 50.120729] AidlLazyServiceRegistrar: Shutdown prevented by forcePersist override flag. [ 50.144402] type=1400 audit(1663334348.164:1109): avc: denied { getattr } for comm="getprop" path="/d1 [ 50.185348] type=1400 audit(1663334348.164:1110): avc: denied { map } for comm="getprop" path="/dev/_1 [ 50.237923] type=1400 audit(1663334348.164:1111): avc: denied { open } for comm="getprop" path="/dev/1 [ 50.293540] type=1400 audit(1663334348.164:1112): avc: denied { getattr } for comm="getprop" path="/d1 [ 50.331062] type=1400 audit(1663334348.164:1113): avc: denied { map } for comm="getprop" path="/dev/_1 [ 50.377769] type=1400 audit(1663334348.164:1114): avc: denied { open } for comm="getprop" path="/dev/1 [ 50.413056] type=1400 audit(1663334348.164:1115): avc: denied { getattr } for comm="getprop" path="/d1 [ 50.440326] type=1400 audit(1663334348.164:1116): avc: denied { map } for comm="getprop" path="/dev/_1 [ 50.463648] type=1400 audit(1663334348.172:1117): avc: denied { open } for comm="getprop" path="/dev/1 [ 50.504073] type=1400 audit(1663334348.172:1118): avc: denied { getattr } for comm="getprop" path="/d1 [ 50.549620] type=1400 audit(1663334348.172:1119): avc: denied { map } for comm="getprop" path="/dev/_1 [ 50.588122] type=1400 audit(1663334348.172:1120): avc: denied { open } for comm="getprop" path="/dev/1 [ 50.616705] type=1400 audit(1663334348.172:1121): avc: denied { getattr } for comm="getprop" path="/d1 [ 50.648968] type=1400 audit(1663334348.172:1122): avc: denied { map } for comm="getprop" path="/dev/_1 [ 50.675062] type=1400 audit(1663334348.172:1123): avc: denied { open } for comm="getprop" path="/dev/1 [ 50.701115] type=1400 audit(1663334348.172:1124): avc: denied { getattr } for comm="getprop" path="/d1 [ 50.731019] type=1400 audit(1663334348.172:1125): avc: denied { map } for comm="getprop" path="/dev/_1 [ 50.758362] type=1400 audit(1663334348.176:1126): avc: denied { open } for comm="getprop" path="/dev/1 [ 50.783128] type=1400 audit(1663334348.176:1127): avc: denied { getattr } for comm="getprop" path="/d1 [ 50.809073] type=1400 audit(1663334348.176:1128): avc: denied { map } for comm="getprop" path="/dev/_1 [ 50.840478] type=1400 audit(1663334349.344:1129): avc: denied { open } for comm="getprop" path="/dev/1 [ 50.865161] type=1400 audit(1663334349.344:1130): avc: denied { getattr } for comm="getprop" path="/d1 [ 50.889734] type=1400 audit(1663334349.344:1131): avc: denied { map } for comm="getprop" path="/dev/_1 [ 50.917201] type=1400 audit(1663334349.344:1132): avc: denied { open } for comm="getprop" path="/dev/1 [ 50.943210] type=1400 audit(1663334349.344:1133): avc: denied { getattr } for comm="getprop" path="/d1 [ 50.967584] type=1400 audit(1663334349.344:1134): avc: denied { map } for comm="getprop" path="/dev/_1 [ 51.004660] type=1400 audit(1663334349.344:1135): avc: denied { open } for comm="getprop" path="/dev/1 [ 51.040463] type=1400 audit(1663334349.344:1136): avc: denied { getattr } for comm="getprop" path="/d1 [ 51.077240] type=1400 audit(1663334349.344:1137): avc: denied { map } for comm="getprop" path="/dev/_1 [ 51.114663] type=1400 audit(1663334349.344:1138): avc: denied { open } for comm="getprop" path="/dev/1 [ 51.141345] type=1400 audit(1663334349.344:1139): avc: denied { getattr } for comm="getprop" path="/d1 [ 51.166102] init: Sending signal 9 to service 'idmap2d' (pid 445) process group... [ 51.167266] type=1400 audit(1663334349.344:1140): avc: denied { map } for comm="getprop" path="/dev/_1 [ 51.193865] libprocessgroup: Successfully killed process cgroup uid 1000 pid 445 in 12ms [ 51.210106] init: Control message: Processed ctl.stop for 'idmap2d' from pid: 561 (system_server) [ 51.213273] type=1400 audit(1663334349.344:1141): avc: denied { open } for comm="getprop" path="/dev/1 [ 51.227521] init: Service 'idmap2d' (pid 445) received signal 9 [ 51.242855] type=1400 audit(1663334349.344:1142): avc: denied { getattr } for comm="getprop" path="/d1 [ 51.280696] type=1400 audit(1663334349.344:1143): avc: denied { map } for comm="getprop" path="/dev/_1 [ 51.313328] type=1400 audit(1663334349.344:1144): avc: denied { open } for comm="getprop" path="/dev/1 [ 51.340111] type=1400 audit(1663334349.344:1145): avc: denied { getattr } for comm="getprop" path="/d1 [ 51.367929] type=1400 audit(1663334349.344:1146): avc: denied { map } for comm="getprop" path="/dev/_1 [ 51.393844] type=1400 audit(1663334349.348:1147): avc: denied { open } for comm="getprop" path="/dev/1 [ 51.420493] type=1400 audit(1663334349.348:1148): avc: denied { getattr } for comm="getprop" path="/d1 [ 51.447894] type=1400 audit(1663334349.348:1149): avc: denied { map } for comm="getprop" path="/dev/_1 [ 51.474168] type=1400 audit(1663334349.348:1150): avc: denied { open } for comm="getprop" path="/dev/1 [ 51.501462] type=1400 audit(1663334349.348:1151): avc: denied { getattr } for comm="getprop" path="/d1 [ 51.527475] type=1400 audit(1663334349.348:1152): avc: denied { map } for comm="getprop" path="/dev/_1 [ 51.554555] type=1400 audit(1663334349.348:1153): avc: denied { open } for comm="getprop" path="/dev/1 [ 51.581228] type=1400 audit(1663334349.348:1154): avc: denied { getattr } for comm="getprop" path="/d1 [ 51.608558] type=1400 audit(1663334349.348:1155): avc: denied { map } for comm="getprop" path="/dev/_1 [ 51.637713] type=1400 audit(1663334349.348:1156): avc: denied { open } for comm="getprop" path="/dev/1 [ 51.668907] type=1400 audit(1663334349.348:1157): avc: denied { getattr } for comm="getprop" path="/d1 [ 51.722120] type=1400 audit(1663334349.348:1158): avc: denied { map } for comm="getprop" path="/dev/_1 [ 51.747914] type=1400 audit(1663334349.348:1159): avc: denied { open } for comm="getprop" path="/dev/1 [ 51.773668] type=1400 audit(1663334349.348:1160): avc: denied { getattr } for comm="getprop" path="/d1 [ 51.800687] type=1400 audit(1663334349.348:1161): avc: denied { map } for comm="getprop" path="/dev/_1 [ 51.827437] type=1400 audit(1663334349.348:1162): avc: denied { open } for comm="getprop" path="/dev/1 [ 51.855212] type=1400 audit(1663334349.348:1163): avc: denied { getattr } for comm="getprop" path="/d1 [ 51.883065] type=1400 audit(1663334349.348:1164): avc: denied { map } for comm="getprop" path="/dev/_1 [ 51.915157] type=1400 audit(1663334349.348:1165): avc: denied { open } for comm="getprop" path="/dev/1 [ 51.941881] type=1400 audit(1663334349.348:1166): avc: denied { getattr } for comm="getprop" path="/d1 [ 51.971957] type=1400 audit(1663334349.348:1167): avc: denied { map } for comm="getprop" path="/dev/_1 [ 51.998644] type=1400 audit(1663334349.348:1168): avc: denied { open } for comm="getprop" path="/dev/1 [ 52.027399] type=1400 audit(1663334349.348:1169): avc: denied { getattr } for comm="getprop" path="/d1 [ 52.055285] type=1400 audit(1663334349.348:1170): avc: denied { map } for comm="getprop" path="/dev/_1 [ 52.085131] type=1400 audit(1663334349.348:1171): avc: denied { open } for comm="getprop" path="/dev/1 [ 52.129000] type=1400 audit(1663334349.348:1172): avc: denied { getattr } for comm="getprop" path="/d1 [ 52.157353] type=1400 audit(1663334349.348:1173): avc: denied { map } for comm="getprop" path="/dev/_1 [ 52.184437] type=1400 audit(1663334349.348:1174): avc: denied { open } for comm="getprop" path="/dev/1 [ 52.210656] type=1400 audit(1663334349.348:1175): avc: denied { getattr } for comm="getprop" path="/d1 [ 52.237881] type=1400 audit(1663334349.348:1176): avc: denied { map } for comm="getprop" path="/dev/_1 [ 52.266623] type=1400 audit(1663334349.348:1177): avc: denied { open } for comm="getprop" path="/dev/1 [ 52.302049] type=1400 audit(1663334349.348:1178): avc: denied { getattr } for comm="getprop" path="/d1 [ 52.343216] type=1400 audit(1663334349.348:1179): avc: denied { map } for comm="getprop" path="/dev/_1 [ 52.384557] type=1400 audit(1663334350.512:1180): avc: denied { open } for comm="getprop" path="/dev/1 [ 52.409404] type=1400 audit(1663334350.512:1181): avc: denied { getattr } for comm="getprop" path="/d1 [ 52.434261] type=1400 audit(1663334350.512:1182): avc: denied { map } for comm="getprop" path="/dev/_1 [ 52.462369] type=1400 audit(1663334350.512:1183): avc: denied { open } for comm="getprop" path="/dev/1 [ 52.485712] type=1400 audit(1663334350.512:1184): avc: denied { getattr } for comm="getprop" path="/d1 [ 52.508996] type=1400 audit(1663334350.512:1185): avc: denied { map } for comm="getprop" path="/dev/_1 [ 52.532234] type=1400 audit(1663334350.512:1186): avc: denied { open } for comm="getprop" path="/dev/1 [ 52.559467] type=1400 audit(1663334350.512:1187): avc: denied { getattr } for comm="getprop" path="/d1 [ 52.583638] type=1400 audit(1663334350.512:1188): avc: denied { map } for comm="getprop" path="/dev/_1 [ 52.607995] type=1400 audit(1663334350.512:1189): avc: denied { open } for comm="getprop" path="/dev/1 [ 52.634013] type=1400 audit(1663334350.512:1190): avc: denied { getattr } for comm="getprop" path="/d1 [ 52.658703] type=1400 audit(1663334350.512:1191): avc: denied { map } for comm="getprop" path="/dev/_1 [ 52.678065] audit_log_start: 3116 callbacks suppressed [ 52.678076] audit: audit_backlog=65 > audit_backlog_limit=64 [ 52.682811] type=1400 audit(1663334350.512:1192): avc: denied { open } for comm="getprop" path="/dev/1 [ 52.686978] audit: audit_lost=1725 audit_rate_limit=0 audit_backlog_limit=64 [ 52.695929] type=1400 audit(1663334350.512:1193): avc: denied { getattr } for comm="getprop" path="/d1 [ 52.715558] audit: backlog limit exceeded [ 52.723945] type=1400 audit(1663334350.512:1194): avc: denied { map } for comm="getprop" path="/dev/_1 [ 52.749443] audit: audit_backlog=65 > audit_backlog_limit=64 [ 52.775044] type=1400 audit(1663334350.516:1195): avc: denied { open } for comm="getprop" path="/dev/1 [ 52.777853] audit: audit_lost=1726 audit_rate_limit=0 audit_backlog_limit=64 [ 52.801178] type=1400 audit(1663334350.516:1196): avc: denied { getattr } for comm="getprop" path="/d1 [ 52.806874] audit: backlog limit exceeded [ 52.833425] audit: audit_backlog=65 > audit_backlog_limit=64 [ 52.833659] type=1400 audit(1663334350.516:1197): avc: denied { map } for comm="getprop" path="/dev/_1 [ 52.839212] audit: audit_lost=1727 audit_rate_limit=0 audit_backlog_limit=64 [ 52.868760] type=1400 audit(1663334350.516:1198): avc: denied { open } for comm="getprop" path="/dev/1 [ 52.868847] audit: backlog limit exceeded [ 52.894211] type=1400 audit(1663334350.516:1199): avc: denied { getattr } for comm="getprop" path="/d1 [ 52.897832] audit: audit_backlog=65 > audit_backlog_limit=64 [ 52.923336] type=1400 audit(1663334350.516:1200): avc: denied { map } for comm="getprop" path="/dev/_1 [ 52.952468] type=1400 audit(1663334350.516:1201): avc: denied { open } for comm="getprop" path="/dev/1 [ 52.980121] type=1400 audit(1663334350.516:1202): avc: denied { getattr } for comm="getprop" path="/d1 [ 53.008542] type=1400 audit(1663334350.516:1203): avc: denied { map } for comm="getprop" path="/dev/_1 [ 53.034127] type=1400 audit(1663334350.516:1204): avc: denied { open } for comm="getprop" path="/dev/1 [ 53.060726] type=1400 audit(1663334350.516:1205): avc: denied { getattr } for comm="getprop" path="/d1 [ 53.093361] type=1400 audit(1663334350.516:1206): avc: denied { map } for comm="getprop" path="/dev/_1 [ 53.118326] type=1400 audit(1663334350.516:1207): avc: denied { open } for comm="getprop" path="/dev/1 [ 53.143253] type=1400 audit(1663334350.516:1208): avc: denied { getattr } for comm="getprop" path="/d1 [ 53.166628] type=1400 audit(1663334350.516:1209): avc: denied { map } for comm="getprop" path="/dev/_1 [ 53.176674] TI DP83867 8000f00.mdio:01: attached PHY driver [TI DP83867] (mii_bus:phy_addr=8000f00.md) [ 53.189308] type=1400 audit(1663334350.516:1210): avc: denied { open } for comm="getprop" path="/dev/1 [ 53.213065] am65-cpsw-nuss 8000000.ethernet eth1: Link is Down [ 53.224352] type=1400 audit(1663334350.516:1211): avc: denied { getattr } for comm="getprop" path="/d1 [ 53.255484] type=1400 audit(1663334350.516:1212): avc: denied { map } for comm="getprop" path="/dev/_1 [ 53.282224] type=1400 audit(1663334350.516:1213): avc: denied { open } for comm="getprop" path="/dev/1 [ 53.304204] type=1400 audit(1663334350.516:1214): avc: denied { getattr } for comm="getprop" path="/d1 [ 53.327071] type=1400 audit(1663334350.516:1215): avc: denied { map } for comm="getprop" path="/dev/_1 [ 53.350348] type=1400 audit(1663334350.516:1216): avc: denied { open } for comm="getprop" path="/dev/1 [ 53.374933] type=1400 audit(1663334350.516:1217): avc: denied { getattr } for comm="getprop" path="/d1 [ 53.401522] type=1400 audit(1663334350.516:1218): avc: denied { map } for comm="getprop" path="/dev/_1 [ 53.426006] type=1400 audit(1663334350.516:1219): avc: denied { open } for comm="getprop" path="/dev/1 [ 53.454886] type=1400 audit(1663334350.516:1220): avc: denied { getattr } for comm="getprop" path="/d1 [ 53.484932] type=1400 audit(1663334350.516:1221): avc: denied { map } for comm="getprop" path="/dev/_1 [ 53.514022] type=1400 audit(1663334350.524:1222): avc: denied { open } for comm="getprop" path="/dev/1 [ 53.537439] type=1400 audit(1663334350.524:1223): avc: denied { getattr } for comm="getprop" path="/d1 [ 53.561209] type=1400 audit(1663334350.524:1224): avc: denied { map } for comm="getprop" path="/dev/_1 [ 53.584874] type=1400 audit(1663334350.524:1225): avc: denied { open } for comm="getprop" path="/dev/1 [ 53.612402] type=1400 audit(1663334350.524:1226): avc: denied { getattr } for comm="getprop" path="/d1 [ 53.637250] type=1400 audit(1663334351.672:1227): avc: denied { open } for comm="getprop" path="/dev/1 [ 53.659777] type=1400 audit(1663334351.672:1228): avc: denied { getattr } for comm="getprop" path="/d1 [ 53.683516] type=1400 audit(1663334351.672:1229): avc: denied { map } for comm="getprop" path="/dev/_1 [ 53.705828] type=1400 audit(1663334351.672:1230): avc: denied { open } for comm="getprop" path="/dev/1 [ 53.729061] type=1400 audit(1663334351.672:1231): avc: denied { getattr } for comm="getprop" path="/d1 [ 53.752710] type=1400 audit(1663334351.672:1232): avc: denied { map } for comm="getprop" path="/dev/_1 [ 53.776133] type=1400 audit(1663334351.672:1233): avc: denied { open } for comm="getprop" path="/dev/1 [ 53.797955] type=1400 audit(1663334351.672:1234): avc: denied { getattr } for comm="getprop" path="/d1 [ 53.820213] type=1400 audit(1663334351.672:1235): avc: denied { map } for comm="getprop" path="/dev/_1 [ 53.842233] type=1400 audit(1663334351.672:1236): avc: denied { open } for comm="getprop" path="/dev/1 [ 53.872178] type=1400 audit(1663334351.672:1237): avc: denied { getattr } for comm="getprop" path="/d1 [ 53.900929] type=1400 audit(1663334351.672:1238): avc: denied { map } for comm="getprop" path="/dev/_1 [ 53.924270] type=1400 audit(1663334351.672:1239): avc: denied { open } for comm="getprop" path="/dev/1 [ 53.954210] type=1400 audit(1663334351.672:1240): avc: denied { getattr } for comm="getprop" path="/d1 [ 53.984270] type=1400 audit(1663334351.672:1241): avc: denied { map } for comm="getprop" path="/dev/_1 [ 54.006998] type=1400 audit(1663334351.672:1242): avc: denied { open } for comm="getprop" path="/dev/1 [ 54.030046] type=1400 audit(1663334351.672:1243): avc: denied { getattr } for comm="getprop" path="/d1 [ 54.053426] type=1400 audit(1663334351.672:1244): avc: denied { map } for comm="getprop" path="/dev/_1 [ 54.079210] type=1400 audit(1663334351.672:1245): avc: denied { open } for comm="getprop" path="/dev/1 [ 54.104512] type=1400 audit(1663334351.672:1246): avc: denied { getattr } for comm="getprop" path="/d1 [ 54.149437] type=1400 audit(1663334351.672:1247): avc: denied { map } for comm="getprop" path="/dev/_1 [ 54.183905] type=1400 audit(1663334351.672:1248): avc: denied { open } for comm="getprop" path="/dev/1 [ 54.218615] type=1400 audit(1663334351.672:1249): avc: denied { getattr } for comm="getprop" path="/d1 [ 54.248596] type=1400 audit(1663334351.672:1250): avc: denied { map } for comm="getprop" path="/dev/_1 [ 54.275333] type=1400 audit(1663334351.672:1251): avc: denied { open } for comm="getprop" path="/dev/1 [ 54.312383] type=1400 audit(1663334351.672:1252): avc: denied { getattr } for comm="getprop" path="/d1 [ 54.337221] type=1400 audit(1663334351.672:1253): avc: denied { map } for comm="getprop" path="/dev/_1 [ 54.361726] type=1400 audit(1663334351.672:1254): avc: denied { open } for comm="getprop" path="/dev/1 [ 54.384368] type=1400 audit(1663334351.672:1255): avc: denied { getattr } for comm="getprop" path="/d1 [ 54.407695] type=1400 audit(1663334351.672:1256): avc: denied { map } for comm="getprop" path="/dev/_1 [ 54.430444] type=1400 audit(1663334351.672:1257): avc: denied { open } for comm="getprop" path="/dev/1 [ 54.454392] type=1400 audit(1663334351.672:1258): avc: denied { getattr } for comm="getprop" path="/d1 [ 54.478619] type=1400 audit(1663334351.672:1259): avc: denied { map } for comm="getprop" path="/dev/_1 [ 54.506829] type=1400 audit(1663334351.672:1260): avc: denied { open } for comm="getprop" path="/dev/1 [ 54.532100] type=1400 audit(1663334351.672:1261): avc: denied { getattr } for comm="getprop" path="/d1 [ 54.558599] type=1400 audit(1663334351.672:1262): avc: denied { map } for comm="getprop" path="/dev/_1 [ 54.582304] type=1400 audit(1663334351.672:1263): avc: denied { open } for comm="getprop" path="/dev/1 [ 54.605630] type=1400 audit(1663334351.672:1264): avc: denied { getattr } for comm="getprop" path="/d1 [ 54.632222] type=1400 audit(1663334351.672:1265): avc: denied { map } for comm="getprop" path="/dev/_1 [ 54.655813] type=1400 audit(1663334356.808:1452): avc: denied { open } for comm="getprop" path="/dev/1 [ 54.678208] type=1400 audit(1663334356.808:1453): avc: denied { getattr } for comm="getprop" path="/d1 [ 54.700833] type=1400 audit(1663334356.808:1454): avc: denied { map } for comm="getprop" path="/dev/_1 [ 54.725238] type=1400 audit(1663334356.808:1455): avc: denied { open } for comm="getprop" path="/dev/1 [ 54.749551] type=1400 audit(1663334356.808:1456): avc: denied { getattr } for comm="getprop" path="/d1 [ 54.775872] type=1400 audit(1663334356.808:1457): avc: denied { map } for comm="getprop" path="/dev/_1 [ 54.799614] type=1400 audit(1663334356.808:1458): avc: denied { open } for comm="getprop" path="/dev/1 [ 54.822604] type=1400 audit(1663334356.808:1459): avc: denied { getattr } for comm="getprop" path="/d1 [ 54.845168] type=1400 audit(1663334356.808:1460): avc: denied { map } for comm="getprop" path="/dev/_1 [ 54.867543] type=1400 audit(1663334356.812:1461): avc: denied { open } for comm="getprop" path="/dev/1 [ 54.891622] type=1400 audit(1663334356.812:1462): avc: denied { getattr } for comm="getprop" path="/d1 [ 54.917779] type=1400 audit(1663334356.812:1463): avc: denied { map } for comm="getprop" path="/dev/_1 [ 54.942668] type=1400 audit(1663334356.812:1464): avc: denied { open } for comm="getprop" path="/dev/1 [ 54.966155] type=1400 audit(1663334356.812:1465): avc: denied { getattr } for comm="getprop" path="/d1 [ 54.989028] type=1400 audit(1663334356.812:1466): avc: denied { map } for comm="getprop" path="/dev/_1 [ 55.011867] type=1400 audit(1663334356.812:1467): avc: denied { open } for comm="getprop" path="/dev/1 [ 55.041591] type=1400 audit(1663334356.812:1468): avc: denied { getattr } for comm="getprop" path="/d1 [ 55.065707] type=1400 audit(1663334356.812:1469): avc: denied { map } for comm="getprop" path="/dev/_1 [ 55.092414] type=1400 audit(1663334356.812:1470): avc: denied { open } for comm="getprop" path="/dev/1 [ 55.116288] type=1400 audit(1663334356.812:1471): avc: denied { getattr } for comm="getprop" path="/d1 [ 55.140113] type=1400 audit(1663334356.812:1472): avc: denied { map } for comm="getprop" path="/dev/_1 [ 55.163913] type=1400 audit(1663334356.812:1473): avc: denied { open } for comm="getprop" path="/dev/1 [ 55.189962] type=1400 audit(1663334356.812:1474): avc: denied { getattr } for comm="getprop" path="/d1 [ 55.216184] type=1400 audit(1663334356.812:1475): avc: denied { map } for comm="getprop" path="/dev/_1 [ 55.242449] type=1400 audit(1663334356.812:1476): avc: denied { open } for comm="getprop" path="/dev/1 [ 55.275664] type=1400 audit(1663334356.812:1477): avc: denied { getattr } for comm="getprop" path="/d1 [ 55.308719] type=1400 audit(1663334356.812:1478): avc: denied { map } for comm="getprop" path="/dev/_1 [ 55.333565] type=1400 audit(1663334356.812:1479): avc: denied { open } for comm="getprop" path="/dev/1 [ 55.360436] type=1400 audit(1663334356.812:1480): avc: denied { getattr } for comm="getprop" path="/d1 [ 55.384069] type=1400 audit(1663334356.812:1481): avc: denied { map } for comm="getprop" path="/dev/_1 [ 55.408994] type=1400 audit(1663334356.812:1482): avc: denied { open } for comm="getprop" path="/dev/1 [ 55.434472] type=1400 audit(1663334356.812:1483): avc: denied { getattr } for comm="getprop" path="/d1 [ 55.459163] type=1400 audit(1663334356.812:1484): avc: denied { map } for comm="getprop" path="/dev/_1 [ 55.484160] type=1400 audit(1663334356.812:1485): avc: denied { open } for comm="getprop" path="/dev/1 [ 55.525895] type=1400 audit(1663334356.812:1486): avc: denied { getattr } for comm="getprop" path="/d1 [ 55.552308] type=1400 audit(1663334356.812:1487): avc: denied { map } for comm="getprop" path="/dev/_1 [ 55.578641] type=1400 audit(1663334356.812:1488): avc: denied { open } for comm="getprop" path="/dev/1 [ 55.602855] type=1400 audit(1663334356.812:1489): avc: denied { getattr } for comm="getprop" path="/d1 [ 55.627323] type=1400 audit(1663334356.812:1490): avc: denied { map } for comm="getprop" path="/dev/_1 [ 55.651160] type=1400 audit(1663334356.812:1491): avc: denied { open } for comm="getprop" path="/dev/1 [ 55.675347] type=1400 audit(1663334356.812:1492): avc: denied { getattr } for comm="getprop" path="/d1 [ 55.700279] type=1400 audit(1663334356.812:1493): avc: denied { map } for comm="getprop" path="/dev/_1 [ 55.725037] type=1400 audit(1663334356.812:1494): avc: denied { open } for comm="getprop" path="/dev/1 [ 55.749532] type=1400 audit(1663334356.812:1495): avc: denied { getattr } for comm="getprop" path="/d1 [ 55.773905] type=1400 audit(1663334356.812:1496): avc: denied { map } for comm="getprop" path="/dev/_1 [ 55.798761] type=1400 audit(1663334356.812:1497): avc: denied { open } for comm="getprop" path="/dev/1 [ 55.822204] type=1400 audit(1663334356.812:1498): avc: denied { getattr } for comm="getprop" path="/d1 [ 55.846971] type=1400 audit(1663334356.812:1499): avc: denied { map } for comm="getprop" path="/dev/_1 [ 55.870305] type=1400 audit(1663334356.816:1500): avc: denied { open } for comm="getprop" path="/dev/1 [ 55.894615] type=1400 audit(1663334356.816:1501): avc: denied { getattr } for comm="getprop" path="/d1 [ 55.919381] type=1400 audit(1663334356.816:1502): avc: denied { map } for comm="getprop" path="/dev/_1 [ 55.948106] type=1400 audit(1663334356.816:1503): avc: denied { open } for comm="getprop" path="/dev/1 [ 55.972927] type=1400 audit(1663334356.816:1504): avc: denied { getattr } for comm="getprop" path="/d1 [ 56.009238] type=1400 audit(1663334356.816:1505): avc: denied { map } for comm="getprop" path="/dev/_1 [ 56.032896] type=1400 audit(1663334356.816:1506): avc: denied { open } for comm="getprop" path="/dev/1 [ 56.055358] type=1400 audit(1663334356.816:1507): avc: denied { getattr } for comm="getprop" path="/d1 [ 56.078082] type=1400 audit(1663334356.816:1508): avc: denied { map } for comm="getprop" path="/dev/_1 [ 56.100469] type=1400 audit(1663334356.816:1509): avc: denied { open } for comm="getprop" path="/dev/1 [ 56.134066] type=1400 audit(1663334356.816:1510): avc: denied { getattr } for comm="getprop" path="/d1 [ 56.158090] type=1400 audit(1663334356.816:1511): avc: denied { map } for comm="getprop" path="/dev/_1 [ 56.181790] type=1400 audit(1663334356.816:1512): avc: denied { open } for comm="getprop" path="/dev/1 [ 56.205932] type=1400 audit(1663334356.816:1513): avc: denied { getattr } for comm="getprop" path="/d1 [ 56.229907] type=1400 audit(1663334356.816:1514): avc: denied { map } for comm="getprop" path="/dev/_1 [ 56.253533] type=1400 audit(1663334356.816:1515): avc: denied { open } for comm="getprop" path="/dev/1 [ 56.276729] type=1400 audit(1663334358.296:1517): avc: denied { open } for comm="getprop" path="/dev/1 [ 56.299537] type=1400 audit(1663334358.296:1518): avc: denied { getattr } for comm="getprop" path="/d1 [ 56.322312] type=1400 audit(1663334358.296:1519): avc: denied { map } for comm="getprop" path="/dev/_1 [ 56.346088] type=1400 audit(1663334358.296:1520): avc: denied { open } for comm="getprop" path="/dev/1 [ 56.369683] type=1400 audit(1663334358.296:1521): avc: denied { getattr } for comm="getprop" path="/d1 [ 56.393497] type=1400 audit(1663334358.296:1522): avc: denied { map } for comm="getprop" path="/dev/_1 [ 56.416987] type=1400 audit(1663334358.296:1523): avc: denied { open } for comm="getprop" path="/dev/1 [ 56.438974] type=1400 audit(1663334358.296:1524): avc: denied { getattr } for comm="getprop" path="/d1 [ 56.461331] type=1400 audit(1663334358.296:1525): avc: denied { map } for comm="getprop" path="/dev/_1 [ 56.483356] type=1400 audit(1663334358.296:1526): avc: denied { open } for comm="getprop" path="/dev/1 [ 56.506838] type=1400 audit(1663334358.296:1527): avc: denied { getattr } for comm="getprop" path="/d1 [ 56.530618] type=1400 audit(1663334358.296:1528): avc: denied { map } for comm="getprop" path="/dev/_1 [ 56.558485] type=1400 audit(1663334358.296:1529): avc: denied { open } for comm="getprop" path="/dev/1 [ 56.580664] type=1400 audit(1663334358.296:1530): avc: denied { getattr } for comm="getprop" path="/d1 [ 56.603295] type=1400 audit(1663334358.296:1531): avc: denied { map } for comm="getprop" path="/dev/_1 [ 56.625732] type=1400 audit(1663334358.296:1532): avc: denied { open } for comm="getprop" path="/dev/1 [ 56.648715] type=1400 audit(1663334358.296:1533): avc: denied { getattr } for comm="getprop" path="/d1 [ 56.672184] type=1400 audit(1663334358.296:1534): avc: denied { map } for comm="getprop" path="/dev/_1 [ 56.696896] type=1400 audit(1663334358.296:1535): avc: denied { open } for comm="getprop" path="/dev/1 [ 56.722874] type=1400 audit(1663334358.296:1536): avc: denied { getattr } for comm="getprop" path="/d1 [ 56.746751] type=1400 audit(1663334358.296:1537): avc: denied { map } for comm="getprop" path="/dev/_1 [ 56.770478] type=1400 audit(1663334358.296:1538): avc: denied { open } for comm="getprop" path="/dev/1 [ 56.795885] type=1400 audit(1663334358.296:1539): avc: denied { getattr } for comm="getprop" path="/d1 [ 56.821413] type=1400 audit(1663334358.296:1540): avc: denied { map } for comm="getprop" path="/dev/_1 [ 56.850530] type=1400 audit(1663334358.296:1541): avc: denied { open } for comm="getprop" path="/dev/1 [ 56.877368] type=1400 audit(1663334358.296:1542): avc: denied { getattr } for comm="getprop" path="/d1 [ 56.904804] type=1400 audit(1663334358.296:1543): avc: denied { map } for comm="getprop" path="/dev/_1 [ 56.930878] type=1400 audit(1663334358.296:1544): avc: denied { open } for comm="getprop" path="/dev/1 [ 56.953940] type=1400 audit(1663334358.296:1545): avc: denied { getattr } for comm="getprop" path="/d1 [ 56.977419] type=1400 audit(1663334358.296:1546): avc: denied { map } for comm="getprop" path="/dev/_1 [ 57.000517] type=1400 audit(1663334358.296:1547): avc: denied { open } for comm="getprop" path="/dev/1 [ 57.028000] type=1400 audit(1663334358.296:1548): avc: denied { getattr } for comm="getprop" path="/d1 [ 57.052386] type=1400 audit(1663334358.296:1549): avc: denied { map } for comm="getprop" path="/dev/_1 [ 57.076252] type=1400 audit(1663334358.296:1550): avc: denied { open } for comm="getprop" path="/dev/1 [ 57.100620] type=1400 audit(1663334358.296:1551): avc: denied { getattr } for comm="getprop" path="/d1 [ 57.125027] type=1400 audit(1663334358.296:1552): avc: denied { map } for comm="getprop" path="/dev/_1 [ 57.150581] type=1400 audit(1663334358.296:1553): avc: denied { open } for comm="getprop" path="/dev/1 [ 57.175823] type=1400 audit(1663334358.296:1554): avc: denied { getattr } for comm="getprop" path="/d1 [ 57.201123] type=1400 audit(1663334358.296:1555): avc: denied { map } for comm="getprop" path="/dev/_1 [ 57.224776] type=1400 audit(1663334358.300:1556): avc: denied { open } for comm="getprop" path="/dev/1 [ 57.249058] type=1400 audit(1663334358.300:1557): avc: denied { getattr } for comm="getprop" path="/d1 [ 57.273970] type=1400 audit(1663334358.300:1558): avc: denied { map } for comm="getprop" path="/dev/_1 [ 57.301103] type=1400 audit(1663334358.300:1559): avc: denied { open } for comm="getprop" path="/dev/1 [ 57.326194] type=1400 audit(1663334358.300:1560): avc: denied { getattr } for comm="getprop" path="/d1 [ 57.351188] type=1400 audit(1663334358.300:1561): avc: denied { map } for comm="getprop" path="/dev/_1 [ 57.380300] type=1400 audit(1663334358.300:1562): avc: denied { open } for comm="getprop" path="/dev/1 [ 57.403698] type=1400 audit(1663334358.300:1563): avc: denied { getattr } for comm="getprop" path="/d1 [ 57.427292] type=1400 audit(1663334358.300:1564): avc: denied { map } for comm="getprop" path="/dev/_1 [ 57.450628] type=1400 audit(1663334358.300:1565): avc: denied { open } for comm="getprop" path="/dev/1 [ 57.475677] type=1400 audit(1663334358.300:1566): avc: denied { getattr } for comm="getprop" path="/d1 [ 57.500436] type=1400 audit(1663334358.300:1567): avc: denied { map } for comm="getprop" path="/dev/_1 [ 57.528225] type=1400 audit(1663334358.300:1568): avc: denied { open } for comm="getprop" path="/dev/1 [ 57.552418] type=1400 audit(1663334358.300:1569): avc: denied { getattr } for comm="getprop" path="/d1 [ 57.576748] type=1400 audit(1663334358.300:1570): avc: denied { map } for comm="getprop" path="/dev/_1 [ 57.601487] type=1400 audit(1663334358.300:1571): avc: denied { open } for comm="getprop" path="/dev/1 [ 57.624220] type=1400 audit(1663334358.300:1572): avc: denied { getattr } for comm="getprop" path="/d1 [ 57.649201] type=1400 audit(1663334358.300:1573): avc: denied { map } for comm="getprop" path="/dev/_1 [ 57.673161] type=1400 audit(1663334358.300:1574): avc: denied { open } for comm="getprop" path="/dev/1 [ 57.698235] type=1400 audit(1663334358.300:1575): avc: denied { getattr } for comm="getprop" path="/d1 [ 57.714207] audit_log_start: 1962 callbacks suppressed [ 57.714218] audit: audit_backlog=65 > audit_backlog_limit=64 [ 57.724704] type=1400 audit(1663334358.300:1576): avc: denied { map } for comm="getprop" path="/dev/_1 [ 57.726935] audit: audit_lost=2361 audit_rate_limit=0 audit_backlog_limit=64 [ 57.733965] type=1400 audit(1663334358.300:1577): avc: denied { open } for comm="getprop" path="/dev/1 [ 57.757388] audit: backlog limit exceeded [ 57.781063] type=1400 audit(1663334358.300:1578): avc: denied { getattr } for comm="getprop" path="/d1 [ 57.788120] audit: audit_backlog=65 > audit_backlog_limit=64 [ 57.793769] type=1400 audit(1663334358.300:1579): avc: denied { map } for comm="getprop" path="/dev/_1 [ 57.818766] audit: audit_lost=2362 audit_rate_limit=0 audit_backlog_limit=64 [ 57.842612] type=1400 audit(1663334358.300:1580): avc: denied { open } for comm="getprop" path="/dev/1 [ 57.853174] audit: backlog limit exceeded [ 57.872045] type=1400 audit(1663334358.300:1581): avc: denied { getattr } for comm="getprop" path="/d1 [ 57.881329] audit: audit_backlog=65 > audit_backlog_limit=64 [ 57.913944] type=1400 audit(1663334359.384:1582): avc: denied { read write } for comm="com.skyla.qbi"i [ 57.935569] audit: audit_lost=2363 audit_rate_limit=0 audit_backlog_limit=64 [ 57.941220] logd: start watching /data/system/packages.list ... [ 57.947400] audit: backlog limit exceeded [ 57.958582] audit: audit_backlog=65 > audit_backlog_limit=64 [ 57.984463] logd: ReadPackageList, total packages: 75 [ 58.006719] type=1400 audit(1663334359.384:1583): avc: denied { open } for comm="com.skyla.qbi" path=i [ 58.033084] type=1400 audit(1663334359.384:1584): avc: denied { ioctl } for comm="com.skyla.qbi" pathi [ 58.062747] type=1400 audit(1663334359.468:1585): avc: denied { open } for comm="getprop" path="/dev/1 [ 58.099184] type=1400 audit(1663334359.468:1586): avc: denied { getattr } for comm="getprop" path="/d1 [ 58.123265] type=1400 audit(1663334359.468:1587): avc: denied { map } for comm="getprop" path="/dev/_1 [ 58.165059] type=1400 audit(1663334359.472:1588): avc: denied { open } for comm="getprop" path="/dev/1 [ 58.193794] type=1400 audit(1663334359.472:1589): avc: denied { getattr } for comm="getprop" path="/d1 [ 58.221704] type=1400 audit(1663334359.472:1590): avc: denied { map } for comm="getprop" path="/dev/_1 [ 58.247135] type=1400 audit(1663334359.472:1591): avc: denied { open } for comm="getprop" path="/dev/1 [ 58.255357] init: processing action (sys.boot_completed=1) from (/system/etc/init/hw/init.rc:1127) [ 58.271307] type=1400 audit(1663334359.472:1592): avc: denied { getattr } for comm="getprop" path="/d1 [ 58.307522] init: starting service 'exec 19 (/bin/rm -rf /data/per_boot)'... [ 58.308533] type=1400 audit(1663334359.472:1593): avc: denied { map } for comm="getprop" path="/dev/_1 [ 58.332856] init: SVC_EXEC service 'exec 19 (/bin/rm -rf /data/per_boot)' pid 1220 (uid 1000 gid 1000. [ 58.340555] type=1400 audit(1663334359.472:1594): avc: denied { open } for comm="getprop" path="/dev/1 [ 58.374099] type=1400 audit(1663334359.472:1595): avc: denied { getattr } for comm="getprop" path="/d1 [ 58.398690] type=1400 audit(1663334359.472:1596): avc: denied { map } for comm="getprop" path="/dev/_1 [ 58.422185] type=1400 audit(1663334359.472:1597): avc: denied { open } for comm="getprop" path="/dev/1 [ 58.450803] type=1400 audit(1663334359.472:1598): avc: denied { getattr } for comm="getprop" path="/d1 [ 58.475515] type=1400 audit(1663334359.472:1599): avc: denied { map } for comm="getprop" path="/dev/_1 [ 58.489588] init: Service 'exec 19 (/bin/rm -rf /data/per_boot)' (pid 1220) exited with status 0 waits [ 58.498948] type=1400 audit(1663334359.472:1600): avc: denied { open } for comm="getprop" path="/dev/1 [ 58.524241] init: Sending signal 9 to service 'exec 19 (/bin/rm -rf /data/per_boot)' (pid 1220) proce. [ 58.532859] type=1400 audit(1663334359.472:1601): avc: denied { getattr } for comm="getprop" path="/d1 [ 58.552258] libprocessgroup: Successfully killed process cgroup uid 1000 pid 1220 in 1ms [ 58.565923] type=1400 audit(1663334359.472:1602): avc: denied { map } for comm="getprop" path="/dev/_1 [ 58.582096] selinux: SELinux: Skipping restorecon on directory(/data/system_ce/0) [ 58.584500] init: Encryption policy of /data/per_boot set to fd5c48a14182ae67f177aa36b41eb314 v2 mode2 [ 58.584742] init: processing action (sys.boot_completed=1) from (/vendor/etc/init/hw/init.am62x.rc:93) [ 58.597152] type=1400 audit(1663334359.472:1603): avc: denied { open } for comm="getprop" path="/dev/1 [ 58.605463] selinux: [ 58.615246] type=1400 audit(1663334359.472:1604): avc: denied { getattr } for comm="getprop" path="/d1 [ 58.632359] selinux: SELinux: Skipping restorecon on directory(/data/vendor_ce/0) [ 58.653862] type=1400 audit(1663334359.472:1605): avc: denied { map } for comm="getprop" path="/dev/_1 [ 58.671122] selinux: [ 58.691088] type=1400 audit(1663334359.472:1606): avc: denied { open } for comm="getprop" path="/dev/1 [ 58.706327] selinux: SELinux: Skipping restorecon on directory(/data/misc_ce/0) [ 58.733329] selinux: [ 58.748232] type=1400 audit(1663334359.472:1607): avc: denied { getattr } for comm="getprop" path="/d1 [ 58.797401] type=1400 audit(1663334359.472:1608): avc: denied { map } for comm="getprop" path="/dev/_1 [ 58.861220] type=1400 audit(1663334359.472:1609): avc: denied { open } for comm="getprop" path="/dev/1 [ 58.893008] type=1400 audit(1663334359.472:1610): avc: denied { getattr } for comm="getprop" path="/d1 [ 58.921045] type=1400 audit(1663334359.472:1611): avc: denied { map } for comm="getprop" path="/dev/_1 [ 58.923445] init: [libfs_mgr]Cannot write /dev/block/loop26 in: /sys/block/zram0/backing_dev: No suchy [ 58.946975] type=1400 audit(1663334359.476:1612): avc: denied { open } for comm="getprop" path="/dev/1 [ 58.980098] type=1400 audit(1663334359.476:1613): avc: denied { getattr } for comm="getprop" path="/d1 [ 59.006727] type=1400 audit(1663334359.476:1614): avc: denied { map } for comm="getprop" path="/dev/_1 [ 59.030188] type=1400 audit(1663334359.476:1615): avc: denied { open } for comm="getprop" path="/dev/1 [ 59.032021] init: [libfs_mgr]Failure of zram backing device file for '/dev/block/zram0' [ 59.058678] type=1400 audit(1663334359.476:1616): avc: denied { getattr } for comm="getprop" path="/d1 [ 59.068629] init: [libfs_mgr]Unable to open zram conf comp device /sys/block/zram0/max_comp_streams [ 59.087880] type=1400 audit(1663334359.476:1617): avc: denied { map } for comm="getprop" path="/dev/_1 [ 59.106418] init: Command 'swapon_all /vendor/etc/fstab.${ro.hardware}' action=sys.boot_completed=1 (d [ 59.129882] type=1400 audit(1663334359.476:1618): avc: denied { open } for comm="getprop" path="/dev/1 [ 59.164644] type=1400 audit(1663334359.476:1619): avc: denied { getattr } for comm="getprop" path="/d1 [ 59.177173] init: processing action (sys.boot_completed=1 && sys.bootstat.first_boot_completed=0) fro) [ 59.205483] type=1400 audit(1663334359.476:1620): avc: denied { map } for comm="getprop" path="/dev/_1 [ 59.210226] init: starting service 'exec 20 (/system/bin/bootstat --record_boot_complete --record_boo. [ 59.240729] type=1400 audit(1663334359.480:1621): avc: denied { open } for comm="getprop" path="/dev/1 [ 59.259473] init: processing action (sys.boot_completed=1) from (/system/etc/init/flags_health_check.) [ 59.288102] type=1400 audit(1663334359.480:1622): avc: denied { getattr } for comm="getprop" path="/d1 [ 59.302317] init: processing action (persist.dbg.keep_debugfs_mounted= && ro.product.debugfs_restrict) [ 59.312331] type=1400 audit(1663334359.480:1623): avc: denied { map } for comm="getprop" path="/dev/_1 [ 59.353791] init: Command 'umount /sys/kernel/debug' action=persist.dbg.keep_debugfs_mounted= && ro.py [ 59.359282] type=1400 audit(1663334359.480:1624): avc: denied { open } for comm="getprop" path="/dev/1 [ 59.380019] init: Service 'exec 20 (/system/bin/bootstat --record_boot_complete --record_boot_reason d [ 59.403130] type=1400 audit(1663334359.480:1625): avc: denied { getattr } for comm="getprop" path="/d1 [ 59.426877] init: Sending signal 9 to service 'exec 20 (/system/bin/bootstat --record_boot_complete -. [ 59.449100] type=1400 audit(1663334359.480:1626): avc: denied { map } for comm="getprop" path="/dev/_1 [ 59.487514] type=1400 audit(1663334359.480:1627): avc: denied { open } for comm="getprop" path="/dev/1 [ 59.513148] type=1400 audit(1663334359.480:1628): avc: denied { getattr } for comm="getprop" path="/d1 [ 59.525351] libprocessgroup: Successfully killed process cgroup uid 1000 pid 1247 in 0ms [ 59.556125] init: processing action (sys.boot_completed=1) from (/system/etc/init/logd.rc:33) [ 59.587446] init: starting service 'logd-auditctl'... [ 59.596029] type=1400 audit(1663334359.480:1629): avc: denied { map } for comm="getprop" path="/dev/_1 [ 59.613585] init: processing action (sys.boot_completed=1 && sys.wifitracing.started=0) from (/system) [ 59.674075] type=1400 audit(1663334359.480:1630): avc: denied { open } for comm="getprop" path="/dev/1 [ 59.705325] type=1400 audit(1663334359.480:1631): avc: denied { getattr } for comm="getprop" path="/d1 [ 59.756841] type=1400 audit(1663334359.480:1632): avc: denied { map } for comm="getprop" path="/dev/_1 [ 59.790441] type=1400 audit(1663334359.480:1633): avc: denied { open } for comm="getprop" path="/dev/1 [ 59.817264] type=1400 audit(1663334359.480:1634): avc: denied { getattr } for comm="getprop" path="/d1 [ 59.965443] type=1400 audit(1663334359.480:1635): avc: denied { map } for comm="getprop" path="/dev/_1 [ 59.990630] type=1400 audit(1663334359.480:1636): avc: denied { open } for comm="getprop" path="/dev/1 [ 60.020483] AidlLazyServiceRegistrar: Process has 1 (of 1 available) client(s) in use after notificat1 [ 60.026982] type=1400 audit(1663334359.480:1637): avc: denied { getattr } for comm="getprop" path="/d1 [ 60.049757] AidlLazyServiceRegistrar: Shutdown prevented by forcePersist override flag. [ 60.072410] AidlLazyServiceRegistrar: Process has 0 (of 1 available) client(s) in use after notificat0 [ 60.103831] AidlLazyServiceRegistrar: Shutdown prevented by forcePersist override flag. [ 60.128958] type=1400 audit(1663334359.480:1638): avc: denied { map } for comm="getprop" path="/dev/_1 [ 60.159057] type=1400 audit(1663334359.480:1639): avc: denied { open } for comm="getprop" path="/dev/1 [ 60.190929] type=1400 audit(1663334359.480:1640): avc: denied { getattr } for comm="getprop" path="/d1 [ 60.276633] init: Command 'mkdir /sys/kernel/debug/tracing/instances/wifi 711' action=sys.boot_compled [ 60.322129] init: Service 'logd-auditctl' (pid 1251) exited with status 0 oneshot service took 0.7190d [ 60.365988] type=1400 audit(1663334359.480:1641): avc: denied { map } for comm="getprop" path="/dev/_1 [ 60.380527] init: Sending signal 9 to service 'logd-auditctl' (pid 1251) process group... [ 60.413888] libprocessgroup: Successfully killed process cgroup uid 1036 pid 1251 in 2ms [ 60.442253] type=1400 audit(1663334359.480:1642): avc: denied { open } for comm="getprop" path="/dev/1 [ 60.489977] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 60.509061] type=1400 audit(1663334359.480:1643): avc: denied { getattr } for comm="getprop" path="/d1 [ 60.519788] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 60.540392] init: Command 'restorecon_recursive /sys/kernel/debug/tracing/instances/wifi' action=sys.d [ 60.576757] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 60.579851] type=1400 audit(1663334359.480:1644): avc: denied { map } for comm="getprop" path="/dev/_1 [ 60.612938] type=1400 audit(1663334359.484:1645): avc: denied { open } for comm="getprop" path="/dev/1 [ 60.627547] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 60.639145] type=1400 audit(1663334359.484:1646): avc: denied { getattr } for comm="getprop" path="/d1 [ 60.662567] init: Command 'write /sys/kernel/debug/tracing/instances/wifi/buffer_size_kb 1' action=syd [ 60.670987] type=1400 audit(1663334359.484:1647): avc: denied { map } for comm="getprop" path="/dev/_1 [ 60.713807] type=1400 audit(1663334359.484:1648): avc: denied { open } for comm="getprop" path="/dev/1 [ 60.730855] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 60.740379] type=1400 audit(1663334359.484:1649): avc: denied { getattr } for comm="getprop" path="/d1 [ 60.772023] type=1400 audit(1663334359.484:1650): avc: denied { map } for comm="getprop" path="/dev/_1 [ 60.812348] type=1400 audit(1663334359.484:1651): avc: denied { open } for comm="getprop" path="/dev/1 [ 60.815658] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 60.854055] init: Command 'write /sys/kernel/tracing/instances/wifi/buffer_size_kb 1' action=sys.bootd [ 60.871995] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 60.898684] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 60.928220] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 60.957552] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 60.986718] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.015879] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.042842] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.069355] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.096106] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.102375] init: Command 'write /sys/kernel/tracing/instances/wifi/events/net/filter name==${wifi.ind [ 61.121776] init: processing action (sys.user.0.ce_available=true) from (/system/etc/init/wifi.rc:21) [ 61.151086] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.161384] selinux: SELinux: Skipping restorecon on directory(/data/misc_ce/0/apexdata/com.android.w) [ 61.189209] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.204363] type=1400 audit(1663334359.484:1652): avc: denied { getattr } for comm="getprop" path="/d1 [ 61.218514] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.234432] selinux: [ 61.239592] init: Command 'restorecon_recursive /data/misc_ce/0/apexdata/com.android.wifi' action=sysd [ 61.266163] init: processing action (sys.boot_completed=1 && sys.wifitracing.started=1) from (/vendor) [ 61.274083] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.284453] type=1400 audit(1663334359.484:1653): avc: denied { map } for comm="getprop" path="/dev/_1 [ 61.284773] type=1400 audit(1663334359.484:1654): avc: denied { open } for comm="getprop" path="/dev/1 [ 61.288807] init: processing action (sys.boot_completed=1 && sys.wifitracing.started=1 && wifi.interf) [ 61.329333] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.356712] type=1400 audit(1663334359.484:1655): avc: denied { getattr } for comm="getprop" path="/d1 [ 61.383371] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.391036] type=1400 audit(1663334359.484:1656): avc: denied { map } for comm="getprop" path="/dev/_1 [ 61.404229] init: Command 'write /sys/kernel/debug/tracing/instances/wifi/events/net/filter name==${wd [ 61.426504] type=1400 audit(1663334359.484:1657): avc: denied { open } for comm="getprop" path="/dev/1 [ 61.464946] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.491196] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.520504] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.532581] init: Command 'write /sys/kernel/tracing/instances/wifi/events/net/filter name==${wifi.ind [ 61.549711] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.583528] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.612942] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.642290] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.671269] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.672880] type=1400 audit(1663334359.484:1658): avc: denied { getattr } for comm="getprop" path="/d1 [ 61.700311] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.728012] type=1400 audit(1663334359.484:1659): avc: denied { map } for comm="getprop" path="/dev/_1 [ 61.729531] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.756453] type=1400 audit(1663334359.484:1660): avc: denied { open } for comm="getprop" path="/dev/1 [ 61.779490] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.787258] type=1400 audit(1663334359.484:1661): avc: denied { getattr } for comm="getprop" path="/d1 [ 61.810972] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.826787] type=1400 audit(1663334359.484:1662): avc: denied { map } for comm="getprop" path="/dev/_1 [ 61.842317] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.854482] type=1400 audit(1663334359.484:1663): avc: denied { open } for comm="getprop" path="/dev/1 [ 61.905150] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.912190] type=1400 audit(1663334359.484:1664): avc: denied { getattr } for comm="getprop" path="/d1 [ 61.934362] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.965972] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 61.995163] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.024585] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.053905] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.073599] type=1400 audit(1663334359.484:1665): avc: denied { map } for comm="getprop" path="/dev/_1 [ 62.100931] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.103340] type=1400 audit(1663334359.484:1666): avc: denied { open } for comm="getprop" path="/dev/1 [ 62.153366] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.156535] type=1400 audit(1663334359.484:1667): avc: denied { getattr } for comm="getprop" path="/d1 [ 62.206233] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.224613] type=1400 audit(1663334359.484:1668): avc: denied { map } for comm="getprop" path="/dev/_1 [ 62.250732] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.277273] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.292403] type=1400 audit(1663334359.484:1669): avc: denied { open } for comm="getprop" path="/dev/1 [ 62.306800] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.345462] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.375001] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.384707] type=1400 audit(1663334359.484:1670): avc: denied { getattr } for comm="getprop" path="/d1 [ 62.411741] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.429255] type=1400 audit(1663334359.484:1671): avc: denied { map } for comm="getprop" path="/dev/_1 [ 62.455812] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.482015] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.483688] type=1400 audit(1663334359.484:1672): avc: denied { open } for comm="getprop" path="/dev/1 [ 62.533545] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.562689] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.591926] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.621158] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.650249] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.679956] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.706536] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.719938] type=1400 audit(1663334359.484:1673): avc: denied { getattr } for comm="getprop" path="/d1 [ 62.733308] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.758227] type=1400 audit(1663334359.484:1674): avc: denied { map } for comm="getprop" path="/dev/_1 [ 62.772038] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.809928] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.839138] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.868473] type=1400 audit(1663334359.484:1675): avc: denied { open } for comm="getprop" path="/dev/1 [ 62.868612] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.895317] type=1400 audit(1663334359.484:1676): avc: denied { getattr } for comm="getprop" path="/d1 [ 62.920033] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.940314] type=1400 audit(1663334359.484:1677): avc: denied { map } for comm="getprop" path="/dev/_1 [ 62.966043] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 62.974059] type=1400 audit(1663334359.484:1678): avc: denied { open } for comm="getprop" path="/dev/1 [ 62.999175] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.007155] type=1400 audit(1663334359.484:1679): avc: denied { getattr } for comm="getprop" path="/d1 [ 63.034368] type=1400 audit(1663334359.484:1680): avc: denied { map } for comm="getprop" path="/dev/_1 [ 63.059586] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.066624] type=1400 audit(1663334359.484:1681): avc: denied { open } for comm="getprop" path="/dev/1 [ 63.100056] type=1400 audit(1663334359.484:1682): avc: denied { getattr } for comm="getprop" path="/d1 [ 63.112815] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.128856] type=1400 audit(1663334359.484:1683): avc: denied { map } for comm="getprop" path="/dev/_1 [ 63.164949] type=1400 audit(1663334359.484:1684): avc: denied { open } for comm="getprop" path="/dev/1 [ 63.182798] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.190029] type=1400 audit(1663334359.484:1685): avc: denied { getattr } for comm="getprop" path="/d1 [ 63.220670] type=1400 audit(1663334359.484:1686): avc: denied { map } for comm="getprop" path="/dev/_1 [ 63.259094] type=1400 audit(1663334359.484:1687): avc: denied { open } for comm="getprop" path="/dev/1 [ 63.283184] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.309943] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.320438] type=1400 audit(1663334359.484:1688): avc: denied { getattr } for comm="getprop" path="/d1 [ 63.347793] type=1400 audit(1663334359.484:1689): avc: denied { map } for comm="getprop" path="/dev/_1 [ 63.362599] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.374844] type=1400 audit(1663334359.488:1690): avc: denied { open } for comm="getprop" path="/dev/1 [ 63.407985] type=1400 audit(1663334359.488:1691): avc: denied { getattr } for comm="getprop" path="/d1 [ 63.423058] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.432930] type=1400 audit(1663334359.488:1692): avc: denied { map } for comm="getprop" path="/dev/_1 [ 63.464521] type=1400 audit(1663334359.488:1693): avc: denied { open } for comm="getprop" path="/dev/1 [ 63.481918] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.488804] type=1400 audit(1663334359.488:1694): avc: denied { getattr } for comm="getprop" path="/d1 [ 63.519269] type=1400 audit(1663334359.488:1695): avc: denied { map } for comm="getprop" path="/dev/_1 [ 63.561192] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.568543] type=1400 audit(1663334359.488:1696): avc: denied { open } for comm="getprop" path="/dev/1 [ 63.611292] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.640670] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.668605] type=1400 audit(1663334359.488:1697): avc: denied { getattr } for comm="getprop" path="/d1 [ 63.670351] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.693785] type=1400 audit(1663334359.488:1698): avc: denied { map } for comm="getprop" path="/dev/_1 [ 63.743267] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.746380] type=1400 audit(1663334359.488:1699): avc: denied { open } for comm="getprop" path="/dev/1 [ 63.792244] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.819575] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.828103] type=1400 audit(1663334359.488:1700): avc: denied { getattr } for comm="getprop" path="/d1 [ 63.869217] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.896918] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.926172] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.956056] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 63.962446] type=1400 audit(1663334359.488:1701): avc: denied { map } for comm="getprop" path="/dev/_1 [ 63.962763] type=1400 audit(1663334359.488:1702): avc: denied { open } for comm="getprop" path="/dev/1 [ 64.010026] type=1400 audit(1663334359.488:1703): avc: denied { getattr } for comm="getprop" path="/d1 [ 64.051026] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.054371] type=1400 audit(1663334359.488:1704): avc: denied { map } for comm="getprop" path="/dev/_1 [ 64.100051] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.102381] type=1400 audit(1663334359.488:1705): avc: denied { open } for comm="getprop" path="/dev/1 [ 64.152975] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.159315] type=1400 audit(1663334359.488:1706): avc: denied { getattr } for comm="getprop" path="/d1 [ 64.188612] type=1400 audit(1663334359.488:1707): avc: denied { map } for comm="getprop" path="/dev/_1 [ 64.213943] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.240388] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.242496] type=1400 audit(1663334359.488:1708): avc: denied { open } for comm="getprop" path="/dev/1 [ 64.269339] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.289174] type=1400 audit(1663334359.488:1709): avc: denied { getattr } for comm="getprop" path="/d1 [ 64.299071] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.328519] type=1400 audit(1663334359.488:1710): avc: denied { map } for comm="getprop" path="/dev/_1 [ 64.350202] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.363939] type=1400 audit(1663334359.488:1711): avc: denied { open } for comm="getprop" path="/dev/1 [ 64.388595] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.393783] type=1400 audit(1663334359.488:1712): avc: denied { getattr } for comm="getprop" path="/d1 [ 64.437669] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.467330] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.496513] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.526032] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.555875] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.558679] type=1400 audit(1663334359.488:1713): avc: denied { map } for comm="getprop" path="/dev/_1 [ 64.596426] type=1400 audit(1663334359.488:1714): avc: denied { open } for comm="getprop" path="/dev/1 [ 64.606666] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.622205] type=1400 audit(1663334359.488:1715): avc: denied { getattr } for comm="getprop" path="/d1 [ 64.649064] type=1400 audit(1663334359.488:1716): avc: denied { map } for comm="getprop" path="/dev/_1 [ 64.675844] type=1400 audit(1663334359.492:1717): avc: denied { open } for comm="getprop" path="/dev/1 [ 64.690143] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.728795] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.758649] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.787809] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.817389] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.819441] type=1400 audit(1663334359.492:1718): avc: denied { getattr } for comm="getprop" path="/d1 [ 64.866699] type=1400 audit(1663334359.492:1719): avc: denied { map } for comm="getprop" path="/dev/_1 [ 64.891179] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.901637] type=1400 audit(1663334359.492:1720): avc: denied { open } for comm="getprop" path="/dev/1 [ 64.923794] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.934271] type=1400 audit(1663334359.492:1721): avc: denied { getattr } for comm="getprop" path="/d1 [ 64.957116] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 64.968718] type=1400 audit(1663334359.492:1722): avc: denied { map } for comm="getprop" path="/dev/_1 [ 64.983302] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.019583] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.021660] AidlLazyServiceRegistrar: Process has 1 (of 1 available) client(s) in use after notificat1 [ 65.038425] type=1400 audit(1663334359.492:1723): avc: denied { open } for comm="getprop" path="/dev/1 [ 65.062671] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.075077] type=1400 audit(1663334359.492:1724): avc: denied { getattr } for comm="getprop" path="/d1 [ 65.099912] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.101304] type=1400 audit(1663334359.492:1725): avc: denied { map } for comm="getprop" path="/dev/_1 [ 65.134487] type=1400 audit(1663334359.496:1726): avc: denied { open } for comm="getprop" path="/dev/1 [ 65.144275] AidlLazyServiceRegistrar: Shutdown prevented by forcePersist override flag. [ 65.166340] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.167243] type=1400 audit(1663334359.500:1727): avc: denied { open } for comm="getprop" path="/dev/1 [ 65.216141] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.239241] AidlLazyServiceRegistrar: Process has 0 (of 1 available) client(s) in use after notificat0 [ 65.245331] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.251519] AidlLazyServiceRegistrar: Shutdown prevented by forcePersist override flag. [ 65.270118] FAT-fs (mmcblk1p1): Volume was not properly unmounted. Some data may be corrupt. Please r. [ 65.280613] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.306796] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.328163] type=1400 audit(1663334360.636:1728): avc: denied { open } for comm="getprop" path="/dev/1 [ 65.335881] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.357186] type=1400 audit(1663334360.640:1729): avc: denied { getattr } for comm="getprop" path="/d1 [ 65.403628] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.432837] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.461873] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.490931] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.520110] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.540738] type=1400 audit(1663334360.640:1730): avc: denied { map } for comm="getprop" path="/dev/_1 [ 65.549148] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.590814] type=1400 audit(1663334360.640:1731): avc: denied { open } for comm="getprop" path="/dev/1 [ 65.595293] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.644253] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.654972] type=1400 audit(1663334360.640:1732): avc: denied { getattr } for comm="getprop" path="/d1 [ 65.697258] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.714287] type=1400 audit(1663334360.640:1733): avc: denied { map } for comm="getprop" path="/dev/_1 [ 65.724185] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.744363] type=1400 audit(1663334360.640:1734): avc: denied { open } for comm="getprop" path="/dev/1 [ 65.769539] type=1400 audit(1663334360.640:1735): avc: denied { getattr } for comm="getprop" path="/d1 [ 65.785168] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.821262] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.839681] type=1400 audit(1663334360.640:1736): avc: denied { map } for comm="getprop" path="/dev/_1 [ 65.850597] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.875662] type=1400 audit(1663334360.640:1737): avc: denied { open } for comm="getprop" path="/dev/1 [ 65.891234] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.914241] type=1400 audit(1663334360.640:1738): avc: denied { getattr } for comm="getprop" path="/d1 [ 65.925758] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.967444] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 65.997695] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.024018] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.053335] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.082581] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.084338] type=1400 audit(1663334360.640:1739): avc: denied { map } for comm="getprop" path="/dev/_1 [ 66.132078] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.141348] type=1400 audit(1663334360.640:1740): avc: denied { open } for comm="getprop" path="/dev/1 [ 66.182237] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.189099] type=1400 audit(1663334360.640:1741): avc: denied { getattr } for comm="getprop" path="/d1 [ 66.232033] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.263193] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.292408] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.319641] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.347166] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.376283] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.403600] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.407022] type=1400 audit(1663334360.640:1742): avc: denied { map } for comm="getprop" path="/dev/_1 [ 66.452461] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.453549] type=1400 audit(1663334360.640:1743): avc: denied { open } for comm="getprop" path="/dev/1 [ 66.502540] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.532796] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.559403] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.561098] type=1400 audit(1663334360.640:1744): avc: denied { getattr } for comm="getprop" path="/d1 [ 66.610236] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.639537] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.666353] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.695496] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.722464] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.751629] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.780846] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.810008] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.839233] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.868749] davinci-mcasp 2b10000.mcasp: Transmit buffer underflow [ 66.873848] type=1400 audit(1663334360.640:1745): avc: denied { map } for comm="getprop" path="/dev/_1 [ 66.906649] type=1400 audit(1663334360.640:1746): avc: denied { open } for comm="getprop" path="/dev/1 [ 66.932152] type=1400 audit(1663334360.640:1747): avc: denied { getattr } for comm="getprop" path="/d1 [ 66.976924] type=1400 audit(1663334360.640:1748): avc: denied { map } for comm="getprop" path="/dev/_1 [ 67.040016] type=1400 audit(1663334360.640:1749): avc: denied { open } for comm="getprop" path="/dev/1 [ 67.075219] type=1400 audit(1663334360.640:1750): avc: denied { getattr } for comm="getprop" path="/d1 [ 67.099070] type=1400 audit(1663334360.640:1751): avc: denied { map } for comm="getprop" path="/dev/_1 [ 67.122574] type=1400 audit(1663334360.640:1752): avc: denied { open } for comm="getprop" path="/dev/1 [ 67.150744] type=1400 audit(1663334360.640:1753): avc: denied { getattr } for comm="getprop" path="/d1 [ 67.183480] type=1400 audit(1663334360.640:1754): avc: denied { map } for comm="getprop" path="/dev/_1 [ 67.216175] type=1400 audit(1663334360.640:1755): avc: denied { open } for comm="getprop" path="/dev/1 [ 67.264657] type=1400 audit(1663334360.640:1756): avc: denied { getattr } for comm="getprop" path="/d1 [ 67.300181] type=1400 audit(1663334360.640:1757): avc: denied { map } for comm="getprop" path="/dev/_1 [ 67.408838] type=1400 audit(1663334360.640:1758): avc: denied { open } for comm="getprop" path="/dev/1 [ 67.597921] type=1400 audit(1663334360.640:1759): avc: denied { getattr } for comm="getprop" path="/d1 [ 67.623575] type=1400 audit(1663334360.640:1760): avc: denied { map } for comm="getprop" path="/dev/_1 [ 67.646851] type=1400 audit(1663334360.640:1761): avc: denied { open } for comm="getprop" path="/dev/1 [ 67.669643] type=1400 audit(1663334360.640:1762): avc: denied { getattr } for comm="getprop" path="/d1 [ 67.693597] type=1400 audit(1663334360.640:1763): avc: denied { map } for comm="getprop" path="/dev/_1 [ 67.716322] type=1400 audit(1663334360.644:1764): avc: denied { open } for comm="getprop" path="/dev/1 [ 67.752151] type=1400 audit(1663334360.644:1765): avc: denied { getattr } for comm="getprop" path="/d1 [ 67.785294] type=1400 audit(1663334360.644:1766): avc: denied { map } for comm="getprop" path="/dev/_1 [ 67.837087] type=1400 audit(1663334360.644:1767): avc: denied { open } for comm="getprop" path="/dev/1 [ 67.902274] type=1400 audit(1663334360.644:1768): avc: denied { getattr } for comm="getprop" path="/d1 [ 67.928114] ti-bcdma 485c0100.dma-controller: chan1 teardown timeout! [ 67.949016] type=1400 audit(1663334360.644:1769): avc: denied { map } for comm="getprop" path="/dev/_1 [ 67.973066] type=1400 audit(1663334360.644:1770): avc: denied { open } for comm="getprop" path="/dev/1 [ 67.999521] type=1400 audit(1663334360.644:1771): avc: denied { getattr } for comm="getprop" path="/d1 [ 68.075255] type=1400 audit(1663334360.644:1772): avc: denied { map } for comm="getprop" path="/dev/_1 [ 68.112126] type=1400 audit(1663334360.652:1773): avc: denied { open } for comm="getprop" path="/dev/1 [ 68.138415] type=1400 audit(1663334361.836:1774): avc: denied { open } for comm="getprop" path="/dev/1 [ 68.161216] type=1400 audit(1663334361.836:1775): avc: denied { getattr } for comm="getprop" path="/d1 [ 68.185003] type=1400 audit(1663334361.836:1776): avc: denied { map } for comm="getprop" path="/dev/_1 [ 68.208083] type=1400 audit(1663334361.836:1777): avc: denied { open } for comm="getprop" path="/dev/1 [ 68.279346] type=1400 audit(1663334361.836:1778): avc: denied { getattr } for comm="getprop" path="/d1 [ 68.309831] type=1400 audit(1663334361.836:1779): avc: denied { map } for comm="getprop" path="/dev/_1 [ 68.337495] type=1400 audit(1663334361.836:1780): avc: denied { open } for comm="getprop" path="/dev/1 [ 68.368783] type=1400 audit(1663334361.836:1781): avc: denied { getattr } for comm="getprop" path="/d1 [ 68.486582] alloc_contig_range: [e0100, e0358) PFNs busy [ 68.554984] type=1400 audit(1663334361.836:1782): avc: denied { map } for comm="getprop" path="/dev/_1 [ 68.959196] type=1400 audit(1663334361.836:1783): avc: denied { open } for comm="getprop" path="/dev/1 [ 68.996981] type=1400 audit(1663334361.836:1784): avc: denied { getattr } for comm="getprop" path="/d1 [ 69.089850] type=1400 audit(1663334361.836:1785): avc: denied { map } for comm="getprop" path="/dev/_1 [ 69.386307] type=1400 audit(1663334361.836:1786): avc: denied { open } for comm="getprop" path="/dev/1 [ 69.409363] type=1400 audit(1663334361.836:1787): avc: denied { getattr } for comm="getprop" path="/d1 [ 69.432719] type=1400 audit(1663334361.836:1788): avc: denied { map } for comm="getprop" path="/dev/_1 [ 69.455799] type=1400 audit(1663334361.836:1789): avc: denied { open } for comm="getprop" path="/dev/1 [ 69.479118] type=1400 audit(1663334361.836:1790): avc: denied { getattr } for comm="getprop" path="/d1 [ 69.504737] type=1400 audit(1663334361.836:1791): avc: denied { map } for comm="getprop" path="/dev/_1 [ 69.529012] type=1400 audit(1663334361.836:1792): avc: denied { open } for comm="getprop" path="/dev/1 [ 69.553350] type=1400 audit(1663334361.836:1793): avc: denied { getattr } for comm="getprop" path="/d1 [ 69.586754] type=1400 audit(1663334361.836:1794): avc: denied { map } for comm="getprop" path="/dev/_1 [ 69.652382] type=1400 audit(1663334361.836:1795): avc: denied { open } for comm="getprop" path="/dev/1 [ 69.745321] type=1400 audit(1663334361.836:1796): avc: denied { getattr } for comm="getprop" path="/d1 [ 69.823307] type=1400 audit(1663334361.836:1797): avc: denied { map } for comm="getprop" path="/dev/_1 [ 69.848158] type=1400 audit(1663334361.836:1798): avc: denied { open } for comm="getprop" path="/dev/1 [ 69.873109] type=1400 audit(1663334361.836:1799): avc: denied { getattr } for comm="getprop" path="/d1 [ 69.898381] type=1400 audit(1663334361.836:1800): avc: denied { map } for comm="getprop" path="/dev/_1 [ 69.924429] type=1400 audit(1663334361.836:1801): avc: denied { open } for comm="getprop" path="/dev/1 [ 69.948021] type=1400 audit(1663334361.836:1802): avc: denied { getattr } for comm="getprop" path="/d1 [ 69.971817] type=1400 audit(1663334361.836:1803): avc: denied { map } for comm="getprop" path="/dev/_1 [ 69.995295] type=1400 audit(1663334361.836:1804): avc: denied { open } for comm="getprop" path="/dev/1 [ 70.018837] type=1400 audit(1663334361.836:1805): avc: denied { getattr } for comm="getprop" path="/d1 [ 70.067017] type=1400 audit(1663334361.836:1806): avc: denied { map } for comm="getprop" path="/dev/_1 [ 70.093426] type=1400 audit(1663334361.836:1807): avc: denied { open } for comm="getprop" path="/dev/1 [ 70.123292] type=1400 audit(1663334361.836:1808): avc: denied { getattr } for comm="getprop" path="/d1 [ 70.153989] type=1400 audit(1663334361.836:1809): avc: denied { map } for comm="getprop" path="/dev/_1 [ 70.182480] type=1400 audit(1663334361.836:1810): avc: denied { open } for comm="getprop" path="/dev/1 [ 70.204815] type=1400 audit(1663334361.836:1811): avc: denied { getattr } for comm="getprop" path="/d1 [ 70.229394] type=1400 audit(1663334361.836:1812): avc: denied { map } for comm="getprop" path="/dev/_1 [ 70.286763] type=1400 audit(1663334361.836:1813): avc: denied { open } for comm="getprop" path="/dev/1 [ 70.312134] type=1400 audit(1663334361.836:1814): avc: denied { getattr } for comm="getprop" path="/d1 [ 74.318015] AidlLazyServiceRegistrar: Trying to shut down the service. No clients in use for any serv. [ 74.330502] AidlLazyServiceRegistrar: Unregistered all clients and exiting [ 74.347456] init: Service 'apexd' (pid 283) exited with status 0 oneshot service took 62.248001 second [ 74.359116] init: Sending signal 9 to service 'apexd' (pid 283) process group... [ 74.367578] libprocessgroup: Successfully killed process cgroup uid 0 pid 283 in 0ms [ 114.892754] type=1400 audit(1663334363.348:1829): avc: denied { open } for comm="getprop" path="/dev/1 [ 114.915386] type=1400 audit(1663334363.348:1830): avc: denied { getattr } for comm="getprop" path="/d1 [ 114.938242] type=1400 audit(1663334363.348:1831): avc: denied { map } for comm="getprop" path="/dev/_1 [ 114.960725] type=1400 audit(1663334363.348:1832): avc: denied { open } for comm="getprop" path="/dev/1 [ 114.984375] type=1400 audit(1663334363.348:1833): avc: denied { getattr } for comm="getprop" path="/d1 [ 115.008402] type=1400 audit(1663334363.348:1834): avc: denied { map } for comm="getprop" path="/dev/_1 [ 115.032106] type=1400 audit(1663334363.348:1835): avc: denied { open } for comm="getprop" path="/dev/1 [ 115.054622] type=1400 audit(1663334363.348:1836): avc: denied { getattr } for comm="getprop" path="/d1 [ 115.076776] type=1400 audit(1663334363.348:1837): avc: denied { map } for comm="getprop" path="/dev/_1 [ 115.100351] type=1400 audit(1663334363.348:1838): avc: denied { open } for comm="getprop" path="/dev/1 [ 115.123645] type=1400 audit(1663334363.348:1839): avc: denied { getattr } for comm="getprop" path="/d1 [ 115.147161] type=1400 audit(1663334363.348:1840): avc: denied { map } for comm="getprop" path="/dev/_1 [ 115.170319] type=1400 audit(1663334363.348:1841): avc: denied { open } for comm="getprop" path="/dev/1 [ 115.192441] type=1400 audit(1663334363.348:1842): avc: denied { getattr } for comm="getprop" path="/d1 [ 115.214745] type=1400 audit(1663334363.348:1843): avc: denied { map } for comm="getprop" path="/dev/_1 [ 115.236826] type=1400 audit(1663334363.348:1844): avc: denied { open } for comm="getprop" path="/dev/1 [ 115.259780] type=1400 audit(1663334363.348:1845): avc: denied { getattr } for comm="getprop" path="/d1 [ 115.283050] type=1400 audit(1663334363.348:1846): avc: denied { map } for comm="getprop" path="/dev/_1 [ 115.305878] type=1400 audit(1663334363.348:1847): avc: denied { open } for comm="getprop" path="/dev/1 [ 115.329239] type=1400 audit(1663334363.348:1848): avc: denied { getattr } for comm="getprop" path="/d1 [ 115.352781] type=1400 audit(1663334363.348:1849): avc: denied { map } for comm="getprop" path="/dev/_1 [ 115.376144] type=1400 audit(1663334363.348:1850): avc: denied { open } for comm="getprop" path="/dev/1 [ 115.401185] type=1400 audit(1663334363.348:1851): avc: denied { getattr } for comm="getprop" path="/d1 [ 115.426763] type=1400 audit(1663334363.348:1852): avc: denied { map } for comm="getprop" path="/dev/_1 [ 115.452076] type=1400 audit(1663334363.348:1853): avc: denied { open } for comm="getprop" path="/dev/1 [ 115.476820] type=1400 audit(1663334363.348:1854): avc: denied { getattr } for comm="getprop" path="/d1 [ 115.504062] type=1400 audit(1663334363.348:1855): avc: denied { map } for comm="getprop" path="/dev/_1 [ 115.530209] type=1400 audit(1663334363.348:1856): avc: denied { open } for comm="getprop" path="/dev/1 [ 115.554456] type=1400 audit(1663334363.348:1857): avc: denied { getattr } for comm="getprop" path="/d1 [ 115.578768] type=1400 audit(1663334363.348:1858): avc: denied { map } for comm="getprop" path="/dev/_1 [ 115.601623] type=1400 audit(1663334363.348:1859): avc: denied { open } for comm="getprop" path="/dev/1 [ 115.626067] type=1400 audit(1663334363.348:1860): avc: denied { getattr } for comm="getprop" path="/d1 [ 115.650820] type=1400 audit(1663334363.348:1861): avc: denied { map } for comm="getprop" path="/dev/_1 [ 115.674751] type=1400 audit(1663334363.348:1862): avc: denied { open } for comm="getprop" path="/dev/1 [ 115.698752] type=1400 audit(1663334363.348:1863): avc: denied { getattr } for comm="getprop" path="/d1 [ 115.723068] type=1400 audit(1663334363.348:1864): avc: denied { map } for comm="getprop" path="/dev/_1 [ 115.748253] type=1400 audit(1663334363.348:1865): avc: denied { open } for comm="getprop" path="/dev/1 [ 115.804366] type=1400 audit(1663334363.348:1866): avc: denied { getattr } for comm="getprop" path="/d1 [ 115.869657] type=1400 audit(1663334363.384:1867): avc: denied { open } for comm="getprop" path="/dev/1 [ 115.929874] type=1400 audit(1663334419.032:1868): avc: granted { execute } for comm="run-as" name="inn [ 115.966849] type=1400 audit(1663334419.032:1869): avc: granted { execute } for comm="install_server-"n [ 116.007418] type=1400 audit(1663334419.036:1870): avc: denied { getattr } for comm="install_server-" n [ 116.286322] type=1400 audit(1663334420.420:1871): avc: granted { execute } for comm="re-initialized>"n [ 129.143109] logd: logdr: UID=2000 GID=2000 PID=1951 b tail=0 logMask=99 pid=0 start=0ns deadline=0ns [ 140.915765] ti-bcdma 485c0100.dma-controller: chan1 teardown timeout! [ 159.891740] ti-bcdma 485c0100.dma-controller: chan1 teardown timeout!