Logcat Prev CSC Log
Logcat Prev CSC Log
04-06 19:51:30.607 D/lmkd ( 330): fetch chimera enabled flag :[0] from property
04-06 19:51:30.608 I/lmkd ( 330): Using psi monitors for memory pressure
detection
04-06 19:51:30.610 I/lmkd ( 330): set custom_sw_limit : 500
04-06 19:51:30.610 I/lmkd ( 330): set upgrade_pressure : 80
04-06 19:51:30.610 I/lmkd ( 330): set lmkd_freelimit_val : 13
04-06 19:51:30.610 I/lmkd ( 330): enable_upgrade_criadj : 1
04-06 19:51:30.610 I/lmkd ( 330): Process polling is supported
04-06 19:51:30.637 D/ProcessState( 331): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:30.648 I/SELinux ( 331): SELinux: Loaded service_contexts from:
04-06 19:51:30.648 I/SELinux ( 331): /system/etc/selinux/plat_service_contexts
04-06 19:51:30.648 I/SELinux ( 331):
/system_ext/etc/selinux/system_ext_service_contexts
04-06 19:51:30.648 I/SELinux ( 331):
/vendor/etc/selinux/vendor_service_contexts
04-06 19:51:30.649 I/servicemanager( 331): Adding 'u:r:servicemanager:s0' service
(manager:331)
04-06 19:51:30.651 D/hw-ProcessState( 332): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:30.659 I/hwservicemanager( 332): getFrameworkHalManifest: Reading
VINTF information.
04-06 19:51:30.662 D/ProcessState( 333): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:30.664 I/SELinux ( 333): SELinux: Loaded service_contexts from:
04-06 19:51:30.664 I/SELinux ( 333): /vendor/etc/selinux/vndservice_contexts
04-06 19:51:30.665 I/vndservicemanager( 333): Adding 'u:r:vndservicemanager:s0'
service (manager:333)
04-06 19:51:30.669 I/hwservicemanager( 332): getDeviceHalManifest: Reading VINTF
information.
04-06 19:51:30.687 I/hwservicemanager( 332): getDeviceHalManifest: Successfully
processed VINTF information
04-06 19:51:30.687 I/hwservicemanager( 332): getFrameworkHalManifest: Successfully
processed VINTF information
04-06 19:51:30.689 I/hwservicemanager( 332): hwservicemanager is ready now.
04-06 19:51:30.762 W/libc ( 293): Unable to set property "ro.debuggable" to
"1": error code: 0x18, try count : 1
04-06 19:51:30.763 W/libc ( 293): Unable to set property "ro.debuggable" to
"1": error code: 0x18, try count : 2
04-06 19:51:30.764 W/libc ( 293): Unable to set property "ro.debuggable" to
"1": error code: 0x18, try count : 3
04-06 19:51:30.765 W/libc ( 293): Unable to set property "service.adb.root" to
"1": error code: 0x18, try count : 1
04-06 19:51:30.765 W/libc ( 293): Unable to set property "service.adb.root" to
"1": error code: 0x18, try count : 2
04-06 19:51:30.766 W/libc ( 293): Unable to set property "service.adb.root" to
"1": error code: 0x18, try count : 3
--------- beginning of system
04-06 19:51:30.942 I/vold ( 342): Vold 3.0 (the awakening) firing up
04-06 19:51:30.943 D/vold ( 342): Detected support for: ext4 f2fs vfat
04-06 19:51:30.952 D/vold ( 342): Tearing down stale mount /mnt/sde
04-06 19:51:30.952 D/voldUtils( 342): /mnt/sde in unmounting procedure: Success
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named product
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named vendor-verity
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named vendor
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named system
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named odm-verity
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named product-
verity
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named prism-verity
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named optics-verity
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named odm
04-06 19:51:30.953 D/vold ( 342): Found unmanaged dm device named system-verity
04-06 19:51:30.954 D/vold ( 342): Found unmanaged loop device at
/dev/block/loop3 named apex:
04-06 19:51:30.954 D/vold ( 342): Found unmanaged loop device at
/dev/block/loop2 named apex:
04-06 19:51:30.954 D/vold ( 342): Found unmanaged loop device at
/dev/block/loop0 named apex:
04-06 19:51:30.954 D/vold ( 342): Found unmanaged loop device at
/dev/block/loop1 named apex:
04-06 19:51:30.955 D/vold ( 342): VolumeBase::create()++
04-06 19:51:30.955 D/vold ( 342): VolumeBase::create()--
04-06 19:51:30.958 I/epmlogd ( 342): EpmLog::EpmLog
04-06 19:51:30.958 D/epmd ( 342): EPM() - Device supports FBE!
04-06 19:51:30.958 I/vold ( 342): EnterprisePartitionManager created
04-06 19:51:30.960 D/vold ( 342): fstab record: system /system f2fs
04-06 19:51:30.960 D/vold ( 342): fstab record: system /system ext4
04-06 19:51:30.960 D/vold ( 342): fstab record: vendor /vendor f2fs
04-06 19:51:30.960 D/vold ( 342): fstab record: product/product f2fs
04-06 19:51:30.960 D/vold ( 342): fstab record: odm /odm f2fs
04-06 19:51:30.960 D/vold ( 342): fstab record: /dev/block/by-name/prism /prism
ext4
04-06 19:51:30.960 D/vold ( 342): fstab record: /dev/block/by-name/optics
/optics ext4
04-06 19:51:30.960 D/vold ( 342): fstab record: /dev/block/by-name/metadata
/metadata ext4
04-06 19:51:30.961 D/vold ( 342): fstab record: /dev/block/by-name/cache /cache
ext4
04-06 19:51:30.961 D/vold ( 342): fstab record: /dev/block/by-name/userdata
/data f2fs
04-06 19:51:30.961 D/vold ( 342): fstab record: /dev/block/by-name/efs
/mnt/vendor/efs ext4
04-06 19:51:30.961 D/vold ( 342): fstab record: /dev/block/by-name/cpefs
/mnt/vendor/cpefs ext4
04-06 19:51:30.961 D/vold ( 342): fstab record: /dev/block/by-name/misc /misc
emmc
04-06 19:51:30.961 D/vold ( 342): fstab record:
/devices/platform/13500000.dwmmc2/mmc_host* auto auto
04-06 19:51:30.961 D/vold ( 342): fstab record: /devices/platform/13600000.usb*
auto vfat
04-06 19:51:30.961 D/hw-ProcessState( 342): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:30.961 D/ProcessState( 342): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:30.962 I/servicemanager( 331): Adding 'u:r:vold:s0' service (vold:342)
04-06 19:51:30.963 D/vold ( 342): VoldNativeService::start() completed OK
04-06 19:51:31.000 D/vold ( 342): handleBlockEvent with action=1 major=179
minor=0 eventPath=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/
mmcblk0
04-06 19:51:31.000 D/NetlinkEvent( 342): NL param
'DEVPATH=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/mmcblk0'
04-06 19:51:31.000 D/NetlinkEvent( 342): NL param 'SYNTH_UUID=0'
04-06 19:51:31.000 D/NetlinkEvent( 342): NL param 'MAJOR=179'
04-06 19:51:31.000 D/NetlinkEvent( 342): NL param 'MINOR=0'
04-06 19:51:31.000 D/NetlinkEvent( 342): NL param 'DEVNAME=mmcblk0'
04-06 19:51:31.000 D/NetlinkEvent( 342): NL param 'DEVTYPE=disk'
04-06 19:51:31.001 D/vold ( 342): handleBlockEvent with action=1 major=179
minor=8 eventPath=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/
mmcblk0/mmcblk0boot0
04-06 19:51:31.002 D/NetlinkEvent( 342): NL param
'DEVPATH=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/
mmcblk0boot0'
04-06 19:51:31.002 D/NetlinkEvent( 342): NL param 'SYNTH_UUID=0'
04-06 19:51:31.002 D/NetlinkEvent( 342): NL param 'MAJOR=179'
04-06 19:51:31.002 D/NetlinkEvent( 342): NL param 'MINOR=8'
04-06 19:51:31.002 D/NetlinkEvent( 342): NL param 'DEVNAME=mmcblk0boot0'
04-06 19:51:31.002 D/NetlinkEvent( 342): NL param 'DEVTYPE=disk'
04-06 19:51:31.005 D/vold ( 342): handleBlockEvent with action=1 major=179
minor=16 eventPath=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/
block/mmcblk0/mmcblk0boot1
04-06 19:51:31.006 D/NetlinkEvent( 342): NL param
'DEVPATH=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/
mmcblk0boot1'
04-06 19:51:31.006 D/NetlinkEvent( 342): NL param 'SYNTH_UUID=0'
04-06 19:51:31.006 D/NetlinkEvent( 342): NL param 'MAJOR=179'
04-06 19:51:31.006 D/NetlinkEvent( 342): NL param 'MINOR=16'
04-06 19:51:31.006 D/NetlinkEvent( 342): NL param 'DEVNAME=mmcblk0boot1'
04-06 19:51:31.006 D/NetlinkEvent( 342): NL param 'DEVTYPE=disk'
04-06 19:51:31.010 W/libc ( 293): Unable to set property
"ro.crypto.fuse_sdcard" to "true": error code: 0x18, try count : 1
04-06 19:51:31.011 W/libc ( 293): Unable to set property
"ro.crypto.fuse_sdcard" to "true": error code: 0x18, try count : 2
04-06 19:51:31.012 W/libc ( 293): Unable to set property
"ro.crypto.fuse_sdcard" to "true": error code: 0x18, try count : 3
04-06 19:51:31.027 D/vold ( 342): handleBlockEvent with action=1 major=179
minor=8 eventPath=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/
mmcblk0/mmcblk0boot0
04-06 19:51:31.027 D/NetlinkEvent( 342): NL param
'DEVPATH=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/
mmcblk0boot0'
04-06 19:51:31.027 D/NetlinkEvent( 342): NL param 'SYNTH_UUID=0'
04-06 19:51:31.027 D/NetlinkEvent( 342): NL param 'MAJOR=179'
04-06 19:51:31.027 D/NetlinkEvent( 342): NL param 'MINOR=8'
04-06 19:51:31.027 D/NetlinkEvent( 342): NL param 'DEVNAME=mmcblk0boot0'
04-06 19:51:31.027 D/NetlinkEvent( 342): NL param 'DEVTYPE=disk'
04-06 19:51:31.070 E/libc ( 293): Access denied finding property
"persist.vendor.softdog"
04-06 19:51:31.088 D/vold ( 342): handleBlockEvent with action=1 major=179
minor=24 eventPath=/devices/platform/13500000.dwmmc2/mmc_host/mmc1/mmc1:aaaa/
block/mmcblk1
04-06 19:51:31.088 D/NetlinkEvent( 342): NL param
'DEVPATH=/devices/platform/13500000.dwmmc2/mmc_host/mmc1/mmc1:aaaa/block/mmcblk1'
04-06 19:51:31.088 D/NetlinkEvent( 342): NL param 'SYNTH_UUID=0'
04-06 19:51:31.088 D/NetlinkEvent( 342): NL param 'MAJOR=179'
04-06 19:51:31.088 D/NetlinkEvent( 342): NL param 'MINOR=24'
04-06 19:51:31.088 D/NetlinkEvent( 342): NL param 'DEVNAME=mmcblk1'
04-06 19:51:31.088 D/NetlinkEvent( 342): NL param 'DEVTYPE=disk'
04-06 19:51:31.088 D/vold ( 342): Disk::Disk
create(/devices/platform/13500000.dwmmc2/mmc_host/mmc1/mmc1:aaaa/block/mmcblk1,
sdcarddisk:179:24, flags:5)
04-06 19:51:31.100 I/vold ( 342): Found disk at
/devices/platform/13500000.dwmmc2/mmc_host/mmc1/mmc1:aaaa/block/mmcblk1 but
delaying scan due to user zero not having started
04-06 19:51:31.100 I/voldUtils( 342): Change Block IO Scheduler to SSG
04-06 19:51:31.100 I/voldUtils( 342): schedPath
/sys/devices/platform/13500000.dwmmc2/mmc_host/mmc1/mmc1:aaaa/block/mmcblk1/queue/
scheduler, sdcard
04-06 19:51:31.101 I/voldUtils( 342): SSG scheduler is not supported
04-06 19:51:31.112 D/vold ( 342): handleBlockEvent with action=1 major=179
minor=16 eventPath=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/
block/mmcblk0/mmcblk0boot1
04-06 19:51:31.113 D/NetlinkEvent( 342): NL param
'DEVPATH=/devices/platform/12100000.dwmmc0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/
mmcblk0boot1'
04-06 19:51:31.113 D/NetlinkEvent( 342): NL param 'SYNTH_UUID=0'
04-06 19:51:31.113 D/NetlinkEvent( 342): NL param 'MAJOR=179'
04-06 19:51:31.113 D/NetlinkEvent( 342): NL param 'MINOR=16'
04-06 19:51:31.113 D/NetlinkEvent( 342): NL param 'DEVNAME=mmcblk0boot1'
04-06 19:51:31.113 D/NetlinkEvent( 342): NL param 'DEVTYPE=disk'
04-06 19:51:31.272 D/io_stats( 366): !@ run in light-weight mode using
/sys/block/*/stat node
04-06 19:51:31.272 D/io_stats( 366): !@ Failed to open pios_enable node
04-06 19:51:31.273 D/io_stats( 366): !@ found device mmcblk0 (179,0) (size 119280
MBs) and set for logging.
04-06 19:51:31.274 D/io_stats( 366): !@ found device mmcblk1 (179,24) (size 30436
MBs) and set for logging.
04-06 19:51:31.386 E/scs ( 369): [main] scs running state INIT
04-06 19:51:31.387 D/scs ( 369): bUseSecPartition : true
04-06 19:51:31.389 D/scs ( 369): [getValuesFromFile] getValuesFromFile : CTI
04-06 19:51:31.389 D/scs ( 369): [amendSalesCode] salesCode : CTI
04-06 19:51:31.389 D/scs ( 369): [amendSalesCode] salesCode length : 3
04-06 19:51:31.389 D/scs ( 369): [amendSalesCode] mainPath:
/prism/etc/carriers
04-06 19:51:31.391 D/scs ( 369): [initData] SALES_CODE : CTI
04-06 19:51:31.392 D/scs ( 369): [getValuesFromFile] getValuesFromFile : CTI
04-06 19:51:31.392 D/scs ( 369): [amendOmcNwCode] SALES_CODE is single.
OMCNW_CODE should be the same
04-06 19:51:31.395 D/scs ( 369): [parseOmcData]netbased_code ARO
04-06 19:51:31.396 D/scs ( 369): [initData]SALES_CODE : CTI
04-06 19:51:31.397 D/scs ( 369): [initData]OMC_PATH :
/optics/configs/carriers/single/CTI/conf
04-06 19:51:31.397 D/scs ( 369): [initData]OMCNW_CODE : CTI
04-06 19:51:31.397 D/scs ( 369): [initData]OMCNW_PATH :
/optics/configs/carriers/single/CTI/conf
04-06 19:51:31.397 D/scs ( 369): [initData]OMC_RES_PATH : /omr/res
04-06 19:51:31.397 D/scs ( 369): [initData]OMC_ETC_PATH :
/prism/etc/carriers/single/CTI
04-06 19:51:31.397 D/scs ( 369): [initData]TSS_TYPE : NETBASED
04-06 19:51:31.397 E/scs ( 369): [startScsState] start scs running(0)
04-06 19:51:31.398 D/scs ( 369): [setOmcProperties] set sales code : CTI
04-06 19:51:31.398 D/scs ( 369): [setOmcProperties] set network code : CTI
04-06 19:51:31.398 D/scs ( 369): [setPreTssProperties]set Pre TSS Properties
04-06 19:51:31.398 D/scs ( 369): [setPreTssProperties]Support SIM Mobility
Framework Feature
04-06 19:51:31.400 D/scs ( 369): [checkVersionChanged]ro.omc.img_mount : 0
04-06 19:51:31.400 D/scs ( 369): [setCountryCode] setCountryCode from
customer.xml
04-06 19:51:31.400 D/scs ( 369): [setCountryCode] setCountryCode(customer
filepath) : /optics/configs/carriers/single/CTI/conf/customer.xml
04-06 19:51:31.402 D/scs ( 369): [setCountryCode] set country_code = Argentina
04-06 19:51:31.402 D/scs ( 369): [setCountryCode] set countryiso_code = AR
04-06 19:51:31.402 D/scs ( 369): [setScsRunningState] setScsRunningState : 1
04-06 19:51:31.402 E/scs ( 369): [startScsState] start scs running(1)
04-06 19:51:31.403 E/scs ( 369): [setDmRwProperties] persist properties set :
False
04-06 19:51:31.450 I/tzdaemon( 370): [Main] Logger was initialized
04-06 19:51:31.453 I/tzdaemon( 370): [Main] Current fds number: 32768; needed fds
number: 48; max fds number: 32768
04-06 19:51:31.453 D/tzdaemon( 370): [Main] init secure userland
04-06 19:51:31.453 I/tzdaemon( 370): [Main] Probe for TZ: 0
04-06 19:51:31.454 I/tzdaemon( 370): [Main] /vendor/bin/tzdaemon started with pid
370
04-06 19:51:31.454 D/tzdaemon( 370): [Main] create image loader thread: ok
04-06 19:51:31.454 D/tzdaemon( 370): [il] image loader on the go!
04-06 19:51:31.454 I/tzdaemon( 370): [ts] Failed to make directory
'/data/vendor/tee/srt': No such file or directory
04-06 19:51:31.455 D/tzdaemon( 370): [il] enotify_signalize(): val:0x1
04-06 19:51:31.455 D/tzdaemon( 370): [ts] enotify_wait(): waiting event:SWd
readiness
04-06 19:51:31.455 I/tzdaemon( 370): [ts] SWd readiness: got event:0x1
04-06 19:51:31.458 E/tzdaemon( 370): [tzdaemon] failed to open TA (00000005-0005-
0005-0505-050505050505) image: 2 (No such file or directory)
04-06 19:51:31.468 I/tzdaemon( 370): [ts] +++ Session established:
session_id:586ffc1c-0000-0000-0200-00103c73350c ++++
04-06 19:51:31.469 D/tzdaemon( 370): [ts] Root TA notified ACSD Ready
04-06 19:51:31.561 E/tzts_daemon( 373): [tzts_daemon] failed to open TA (00000007-
0007-0007-0707-070707070707) image: 2 (No such file or directory)
04-06 19:51:31.568 I/tzts_daemon( 373): [dl] Logger was initialized
04-06 19:51:31.568 I/tzts_daemon( 373): [dl] driver loader service
initialization...
04-06 19:51:31.571 I/tzts_daemon( 373): [dl] Trying to load: 00000000-0000-0000-
0000-494363447256
04-06 19:51:31.575 D/tzdaemon( 370): [ts]
======================================================
04-06 19:51:31.576 D/tzdaemon( 370): [ts] msgToCommsAgent->cmd_group = 5
04-06 19:51:31.576 D/tzdaemon( 370): [ts] msgToCommsAgent->szData = 20
04-06 19:51:31.576 D/tzdaemon( 370): [ts]
======================================================
04-06 19:51:31.576 D/tzdaemon( 370): [ts] msgToCommsAgent->command =
TS_CMD_READ_OBJ_LIST
04-06 19:51:31.576 D/tzdaemon( 370): [ts] Received : TS_CMD_READ_OBJ_LIST
04-06 19:51:31.576 D/tzdaemon( 370): [ts] UUID of the object owner is : 00000007-
0007-0007-0707-070707070707
04-06 19:51:31.576 D/tzdaemon( 370): [ts] Storage ID : 2147483648
04-06 19:51:31.577 D/tzdaemon( 370): [ts] Read resource
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707-2147483648 success,
size: 115
04-06 19:51:31.579 D/tzdaemon( 370): [ts]
======================================================
04-06 19:51:31.579 D/tzdaemon( 370): [ts] msgToCommsAgent->cmd_group = 5
04-06 19:51:31.579 D/tzdaemon( 370): [ts] msgToCommsAgent->szData = 36
04-06 19:51:31.579 D/tzdaemon( 370): [ts]
======================================================
04-06 19:51:31.579 D/tzdaemon( 370): [ts] msgToCommsAgent->command =
TS_CMD_READ_DATA
04-06 19:51:31.579 D/tzdaemon( 370): [ts] Received : TS_CMD_READ_DATA
04-06 19:51:31.579 D/tzdaemon( 370): [ts] UUID of the object owner is : 00000007-
0007-0007-0707-070707070707
04-06 19:51:31.579 D/tzdaemon( 370): [ts] Storage ID : -2147483648
04-06 19:51:31.579 D/tzdaemon( 370): [ts] Object path is :
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
04-06 19:51:31.579 D/tzdaemon( 370): [ts] Info offset is : 24
04-06 19:51:31.579 D/tzdaemon( 370): [ts] Storage metadata offset is : 24
04-06 19:51:31.580 D/tzdaemon( 370): [ts] Number of data chunks to read = 1 start-
chunk = 0 chunk-size = 16428
04-06 19:51:31.580 D/tzdaemon( 370): [ts] szdata = 24 size = 0
04-06 19:51:31.580 D/tzdaemon( 370): [ts] Calculating size of
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
obj_info of type 1
04-06 19:51:31.582 D/tzdaemon( 370): [ts] Read resource
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
obj_info success, size: 128
04-06 19:51:31.582 D/tzdaemon( 370): [ts] szdata = 156 size = 0
04-06 19:51:31.582 D/tzdaemon( 370): [ts] szdata = 160 size = 4
04-06 19:51:31.583 D/tzdaemon( 370): [ts] Read resource
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
data_chunk success, size: 16428
04-06 19:51:31.583 D/tzdaemon( 370): [ts] szdata = 16600 size = 4
04-06 19:51:31.585 D/tzdaemon( 370): [ts]
======================================================
04-06 19:51:31.585 D/tzdaemon( 370): [ts] msgToCommsAgent->cmd_group = 5
04-06 19:51:31.585 D/tzdaemon( 370): [ts] msgToCommsAgent->szData = 36
04-06 19:51:31.586 D/tzdaemon( 370): [ts]
======================================================
04-06 19:51:31.586 D/tzdaemon( 370): [ts] msgToCommsAgent->command =
TS_CMD_READ_DATA
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Received : TS_CMD_READ_DATA
04-06 19:51:31.586 D/tzdaemon( 370): [ts] UUID of the object owner is : 00000007-
0007-0007-0707-070707070707
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Storage ID : -2147483648
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Object path is :
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Info offset is : 24
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Storage metadata offset is : 24
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Number of data chunks to read = 1 start-
chunk = 0 chunk-size = 16428
04-06 19:51:31.586 D/tzdaemon( 370): [ts] szdata = 24 size = 0
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Calculating size of
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
obj_info of type 1
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Read resource
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
obj_info success, size: 128
04-06 19:51:31.586 D/tzdaemon( 370): [ts] szdata = 156 size = 0
04-06 19:51:31.586 D/tzdaemon( 370): [ts] szdata = 160 size = 4
04-06 19:51:31.586 D/tzdaemon( 370): [ts] Read resource
/mnt/vendor/efs/tee/srt/00000007-0007-0007-0707-070707070707/2147483648/c58d4a63/
data_chunk success, size: 16428
04-06 19:51:31.586 D/tzdaemon( 370): [ts] szdata = 16600 size = 4
04-06 19:51:31.593 D/tzts_daemon( 373): [dl] driver waiter thread created
04-06 19:51:31.593 I/tzts_daemon( 373): [dl] Trying to load: 00000000-0000-0000-
0000-564c544b4456
04-06 19:51:31.601 D/tzts_daemon( 373): [dl] driver waiter thread created
04-06 19:51:31.601 I/tzts_daemon( 373): [dl] Trying to load: 18d9f073-18a5-4ade-
9def-875e07f7f293_
04-06 19:51:31.601 I/tzts_daemon( 373): [dl] not a TA: wrong filename length
04-06 19:51:31.601 I/tzts_daemon( 373): [dl] 2 driver(s) were loaded
04-06 19:51:31.639 D/hw-ProcessState( 378): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:31.640 D/ProcessState( 378): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:31.641 I/servicemanager( 331): Adding 'u:r:system_suspend:s0' service
(suspend_control:378)
04-06 19:51:31.641 I/servicemanager( 331): Adding 'u:r:system_suspend:s0' service
(suspend_control_internal:378)
04-06 19:51:31.645 I/HidlServiceManagement( 378): Registered
[email protected]::ISystemSuspend/default
04-06 19:51:31.646 I/HidlServiceManagement( 378): Removing namespace from process
name [email protected] to [email protected].
04-06 19:51:31.656 I/fsverity_init( 382): LoadKeyFromFile
path=/system/etc/security/fsverity/fsverity-release.x509.der keyname=fsv_system_0
04-06 19:51:31.664 I/fsverity_init( 382): LoadKeyFromFile
path=/product/etc/security/fsverity/gms_fsverity_cert.der keyname=fsv_product_0
04-06 19:51:31.666 I/fsverity_init( 382): LoadKeyFromFile
path=/product/etc/security/fsverity/play_store_fsi_cert.der keyname=fsv_product_1
04-06 19:51:31.681 I/engmode_hidl_service( 381): engmode()
04-06 19:51:31.681 I/engmode_hidl_service( 381): e_server_hal service is started
04-06 19:51:31.684 I/HidlServiceManagement( 381): Registered
[email protected]::ISehEngmode/default
04-06 19:51:31.685 I/HidlServiceManagement( 381): Removing namespace from process
name [email protected] to [email protected].
04-06 19:51:31.694 D/INSTHK ( 385): Version = Ver 1.0
04-06 19:51:31.698 E/INSTHK ( 385): H Fail ...
04-06 19:51:31.714 I/hwservicemanager( 332): getTransport: Cannot find entry
[email protected]::IBootControl/default in either framework or device VINTF
manifest.
04-06 19:51:31.728 W/android.hardware.security.keymint-service( 380): Keymint 1.0
service start...
04-06 19:51:31.728 D/ProcessState( 380): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:31.728 W/android.hardware.security.keymint-service( 380): Add SKeymint
services
04-06 19:51:31.728 I/android.hardware.security.keymint-service( 380): adding
keymint service instance: android.hardware.security.keymint.IKeyMintDevice/default
04-06 19:51:31.729 I/servicemanager( 331): getDeviceHalManifest: Reading VINTF
information.
04-06 19:51:31.739 I/servicemanager( 331): getDeviceHalManifest: Successfully
processed VINTF information
04-06 19:51:31.739 I/servicemanager( 331): getFrameworkHalManifest: Reading VINTF
information.
04-06 19:51:31.742 I/servicemanager( 331): getFrameworkHalManifest: Successfully
processed VINTF information
04-06 19:51:31.742 I/servicemanager( 331): Found
android.hardware.security.keymint.IKeyMintDevice/default in device VINTF manifest.
04-06 19:51:31.742 I/servicemanager( 331): Adding 'u:r:hal_keymint_default:s0'
service (android.hardware.security.keymint.IKeyMintDevice/default:380)
04-06 19:51:31.742 I/android.hardware.security.keymint-service( 380): adding
keymint service instance:
android.hardware.security.secureclock.ISecureClock/default
04-06 19:51:31.743 I/servicemanager( 331): Found
android.hardware.security.secureclock.ISecureClock/default in device VINTF
manifest.
04-06 19:51:31.743 I/servicemanager( 331): Adding 'u:r:hal_keymint_default:s0'
service (android.hardware.security.secureclock.ISecureClock/default:380)
04-06 19:51:31.743 I/android.hardware.security.keymint-service( 380): adding
keymint service instance:
android.hardware.security.sharedsecret.ISharedSecret/default
04-06 19:51:31.744 I/servicemanager( 331): Found
android.hardware.security.sharedsecret.ISharedSecret/default in device VINTF
manifest.
04-06 19:51:31.744 I/servicemanager( 331): Adding 'u:r:hal_keymint_default:s0'
service (android.hardware.security.sharedsecret.ISharedSecret/default:380)
04-06 19:51:31.744 I/android.hardware.security.keymint-service( 380): adding
keymint service instance:
vendor.samsung.hardware.keymint.ISehKeyMintExtension/default
04-06 19:51:31.744 I/servicemanager( 331): Found
vendor.samsung.hardware.keymint.ISehKeyMintExtension/default in device VINTF
manifest.
04-06 19:51:31.744 I/servicemanager( 331): Adding 'u:r:hal_keymint_default:s0'
service (vendor.samsung.hardware.keymint.ISehKeyMintExtension/default:380)
04-06 19:51:31.745 I/android.hardware.security.keymint-service( 380): adding
keymint service instance:
vendor.samsung.hardware.keymint.ISehKeyMintFactory/default
04-06 19:51:31.745 I/servicemanager( 331): Found
vendor.samsung.hardware.keymint.ISehKeyMintFactory/default in device VINTF
manifest.
04-06 19:51:31.745 I/servicemanager( 331): Adding 'u:r:hal_keymint_default:s0'
service (vendor.samsung.hardware.keymint.ISehKeyMintFactory/default:380)
04-06 19:51:31.745 W/android.hardware.security.keymint-service( 380): Adding
SKeymint services is done
04-06 19:51:31.745 I/android.hardware.security.keymint-service( 380): trying to
open SKeyMint TA
04-06 19:51:31.745 I/keystore2( 379): keystore2_main: Keystore2 is starting.
04-06 19:51:31.745 W/keymint_tee( 380): [WRN]!@Open skeymint version 100.0.50
04-06 19:51:31.752 I/keystore2( 379): keystore2_main: Starting thread pool now.
04-06 19:51:31.753 I/keystore2( 379): getDeviceHalManifest: Reading VINTF
information.
04-06 19:51:31.753 D/ProcessState( 379): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:31.754 D/vold ( 342): fscrypt_mount_metadata_encrypted: /data
encrypt: 0 format: 0 with null
04-06 19:51:31.756 I/MetadataCrypt( 342): read_key
04-06 19:51:31.756 D/vold ( 342): metadata_key_dir/key:
/metadata/vold/metadata_encryption/key
04-06 19:51:31.756 I/MetadataCrypt( 342): read_key ++ dir :
/metadata/vold/metadata_encryption/key
04-06 19:51:31.756 E/KeyStorage( 342): retrieveKey :
/metadata/vold/metadata_encryption/key
04-06 19:51:31.758 I/servicemanager( 331): Since
'android.system.keystore2.IKeystoreService/default' could not be found, trying to
start it as a lazy AIDL service
04-06 19:51:31.759 W/keymint_tee( 380): [WRN]!@tz open success
04-06 19:51:31.760 W/keymint_tee( 380): [WRN]build type : user
04-06 19:51:31.762 I/tzdaemon( 370): [il] name of requested image: 00000000-0000-
0000-0000-0053545354ab; cmd type 1
04-06 19:51:31.763 D/tzdaemon( 370): [il] resolved full_name /vendor/tee/00000000-
0000-0000-0000-0053545354ab
04-06 19:51:31.763 I/tzdaemon( 370): [il] Found file:/vendor/tee/00000000-0000-
0000-0000-0053545354ab size:52005
04-06 19:51:31.764 I/tzdaemon( 370): [il] Created container shared memory
0xf1cd5000 size 52005
04-06 19:51:31.764 D/tzdaemon( 370): [il] reply.image.buf_desc.size 52005;
reply.image.buf_desc.id 4
04-06 19:51:31.764 D/tzdaemon( 370): [il] image_loader_event_loop(): going to send
reply (76 bytes) to sfd:9
04-06 19:51:31.766 I/keystore2( 379): getDeviceHalManifest: Successfully processed
VINTF information
04-06 19:51:31.766 I/keystore2( 379): keystore2::globals: In get_device_name :
"a13"
04-06 19:51:31.766 I/keystore2( 379): keystore2::globals: In set_keymint_version
100
04-06 19:51:31.773 I/tzdaemon( 370): [il] name of requested image: 00000000-0000-
0000-0000-0053545354ab; cmd type 1
04-06 19:51:31.773 D/tzdaemon( 370): [il] resolved full_name /vendor/tee/00000000-
0000-0000-0000-0053545354ab
04-06 19:51:31.773 I/tzdaemon( 370): [il] Found file:/vendor/tee/00000000-0000-
0000-0000-0053545354ab size:52005
04-06 19:51:31.774 I/tzdaemon( 370): [il] Created container shared memory
0xf1cd5000 size 52005
04-06 19:51:31.774 D/tzdaemon( 370): [il] reply.image.buf_desc.size 52005;
reply.image.buf_desc.id 4
04-06 19:51:31.774 D/tzdaemon( 370): [il] image_loader_event_loop(): going to send
reply (76 bytes) to sfd:9
04-06 19:51:31.782 I/tzdaemon( 370): [il] name of requested image: 00000000-0000-
0000-0000-0053545354ab; cmd type 1
04-06 19:51:31.783 D/tzdaemon( 370): [il] resolved full_name /vendor/tee/00000000-
0000-0000-0000-0053545354ab
04-06 19:51:31.783 I/tzdaemon( 370): [il] Found file:/vendor/tee/00000000-0000-
0000-0000-0053545354ab size:52005
04-06 19:51:31.783 I/tzdaemon( 370): [il] Created container shared memory
0xf1cd5000 size 52005
04-06 19:51:31.783 D/tzdaemon( 370): [il] reply.image.buf_desc.size 52005;
reply.image.buf_desc.id 4
04-06 19:51:31.783 D/tzdaemon( 370): [il] image_loader_event_loop(): going to send
reply (76 bytes) to sfd:9
04-06 19:51:31.792 I/tzdaemon( 370): [il] name of requested image: 00000000-0000-
0000-0000-0053545354ab; cmd type 1
04-06 19:51:31.792 D/tzdaemon( 370): [il] resolved full_name /vendor/tee/00000000-
0000-0000-0000-0053545354ab
04-06 19:51:31.792 I/tzdaemon( 370): [il] Found file:/vendor/tee/00000000-0000-
0000-0000-0053545354ab size:52005
04-06 19:51:31.793 I/tzdaemon( 370): [il] Created container shared memory
0xf1cd5000 size 52005
04-06 19:51:31.793 D/tzdaemon( 370): [il] reply.image.buf_desc.size 52005;
reply.image.buf_desc.id 4
04-06 19:51:31.793 D/tzdaemon( 370): [il] image_loader_event_loop(): going to send
reply (76 bytes) to sfd:9
04-06 19:51:31.801 I/tzdaemon( 370): [il] name of requested image: 00000000-0000-
0000-0000-0053545354ab; cmd type 1
04-06 19:51:31.801 D/tzdaemon( 370): [il] resolved full_name /vendor/tee/00000000-
0000-0000-0000-0053545354ab
04-06 19:51:31.802 I/tzdaemon( 370): [il] Found file:/vendor/tee/00000000-0000-
0000-0000-0053545354ab size:52005
04-06 19:51:31.802 I/tzdaemon( 370): [il] Created container shared memory
0xf1cd5000 size 52005
04-06 19:51:31.802 D/tzdaemon( 370): [il] reply.image.buf_desc.size 52005;
reply.image.buf_desc.id 4
04-06 19:51:31.802 D/tzdaemon( 370): [il] image_loader_event_loop(): going to send
reply (76 bytes) to sfd:9
04-06 19:51:31.810 D/android.hardware.security.keymint-service( 380):
nwd_configure: ret 0
04-06 19:51:31.811 W/keymint_tee( 380): [WRN]!@nwd_configure done
04-06 19:51:31.811 W/keymint_tee( 380): [WRN]!@nwd_open_connection done
04-06 19:51:31.811 I/android.hardware.security.keymint-service( 380): successfully
load skeymint
04-06 19:51:31.811 W/android.hardware.security.keymint-service( 380): SKeymint
initialization is completed
04-06 19:51:31.812 D/android.hardware.security.keymint-service( 380):
getSharedSecretParameters: ret 0
04-06 19:51:31.813 D/android.hardware.security.keymint-service( 380):
computeSharedSecret: ret 0
04-06 19:51:31.813 I/keystore2( 379): keystore2::shared_secret_negotiation: Shared
secret negotiation concluded successfully.
04-06 19:51:31.815 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.security.compat:379)
04-06 19:51:31.817 D/hw-ProcessState( 379): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:31.819 I/hwservicemanager( 332): getTransport: Cannot find entry
[email protected]::IKeymasterDevice/default in either framework or
device VINTF manifest.
04-06 19:51:31.820 I/hwservicemanager( 332): getTransport: Cannot find entry
[email protected]::IKeymasterDevice/default in either framework or
device VINTF manifest.
04-06 19:51:31.822 I/servicemanager( 331): Found
android.system.keystore2.IKeystoreService/default in framework VINTF manifest.
04-06 19:51:31.822 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.system.keystore2.IKeystoreService/default:379)
04-06 19:51:31.822 I/BpBinder( 331): onLastStrongRef automatically unlinking death
recipients: <uncached descriptor>
04-06 19:51:31.823 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.security.apc:379)
04-06 19:51:31.823 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.security.authorization:379)
04-06 19:51:31.824 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.security.maintenance:379)
04-06 19:51:31.824 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.security.metrics:379)
04-06 19:51:31.825 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.security.legacykeystore:379)
04-06 19:51:31.826 I/servicemanager( 331): Adding 'u:r:keystore:s0' service
(android.security.samsungattestation:379)
04-06 19:51:31.826 I/keystore2( 379): samsung_attestation: Successfully started
Samsung Keystore service.
04-06 19:51:31.826 I/keystore2( 379): keystore2_main: Successfully registered
Keystore 2.0 service.
04-06 19:51:31.826 I/keystore2( 379): keystore2_main: Joining thread pool now.
04-06 19:51:31.827 I/SELinux ( 379): SELinux: Loaded keystore2_key_contexts from:
04-06 19:51:31.827 I/SELinux ( 379):
/system/etc/selinux/plat_keystore2_key_contexts
04-06 19:51:31.829 W/keymint_tee( 380): [WRN]begin req PARAMS: BM32, PD1,
04-06 19:51:31.831 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:31.832 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:31.832 E/KeyStorage( 342): getRotStr rot value :
000100da9d9864cade367a107d144613
04-06 19:51:31.834 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:31.835 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:31.837 E/KeyStorage( 342): retrieveKey success :
/metadata/vold/metadata_encryption/key
04-06 19:51:31.837 I/MetadataCrypt( 342): create_crypto_blk_dev
04-06 19:51:31.837 I/MetadataCrypt( 342): create_crypto_blk_dev ++
04-06 19:51:31.940 I/MetadataCrypt( 342): create_crypto_blk_dev --
04-06 19:51:31.940 D/vold ( 342): Mounting metadata-encrypted filesystem:/data
04-06 19:51:31.940 I/MetadataCrypt( 342): Mounting metadata-encrypted filesystem :
/data
04-06 19:51:31.941 I/MetadataCrypt( 342): fs_mgr_do_mount ++
04-06 19:51:31.942 I/vold ( 342): [libfs_mgr]Running /system/bin/fsck.f2fs -a -
c 10000 --debug-cache -L data /dev/block/dm-10
04-06 19:51:33.275 D/io_stats( 366): !@ 179,0 r 7825 341943 w 651 7408 d 1 4 f 0 0
iot 2252 0 th 0 0 0 pt 0 inp 0 1 7.452
04-06 19:51:35.276 D/io_stats( 366): !@ 179,0 r 12796 384187 w 1271 43964 d 1 4 f
0 0 iot 3924 0 th 0 0 0 pt 0 inp 0 4 9.453
04-06 19:51:35.276 D/io_stats( 366): !@ MemInfo(KB): total 3783172 free 2981776
avail 3380920 actv(f) 32584 inactv(f) 377600 dirty 5280 wb 0 anonpg 20356 slab
82972
04-06 19:51:37.277 D/io_stats( 366): !@ 179,0 r 17444 433467 w 1722 90364 d 2 8 f
0 0 iot 5716 0 th 0 0 0 pt 0 inp 0 1 11.454
04-06 19:51:39.278 D/io_stats( 366): !@ 179,0 r 21026 500959 w 2055 157028 d 2 8 f
0 0 iot 7440 0 th 0 0 0 pt 0 inp 0 2 13.454
04-06 19:51:41.278 D/io_stats( 366): !@ 179,0 r 24294 591099 w 2380 245648 d 2 8 f
0 0 iot 9108 0 th 0 0 0 pt 0 inp 0 3 15.455
04-06 19:51:41.278 D/io_stats( 366): !@ MemInfo(KB): total 3783172 free 2593948
avail 3380976 actv(f) 69308 inactv(f) 716628 dirty 19040 wb 736 anonpg 20356 slab
95496
04-06 19:51:41.837 I/keystore2( 379): keystore2::watchdog: Watchdog thread idle ->
terminating. Have a great day.
04-06 19:51:43.279 D/io_stats( 366): !@ 179,0 r 27652 696947 w 2711 346208 d 2 8 f
0 0 iot 10848 0 th 0 0 0 pt 0 inp 0 16 17.456
04-06 19:51:43.279 D/io_stats( 366): !@ DiskUsage: /data 99.97 % used (3165 MB/
3165 MB)
04-06 19:51:45.280 D/io_stats( 366): !@ 179,0 r 31090 818619 w 3025 457876 d 2 8 f
0 0 iot 12628 0 th 0 0 0 pt 0 inp 0 13 19.457
04-06 19:51:45.280 D/io_stats( 366): !@ DiskUsage: /data 99.97 % used (3165 MB/
3165 MB)
04-06 19:51:47.280 D/io_stats( 366): !@ 179,0 r 34955 941607 w 3352 570952 d 2 8 f
0 0 iot 14480 0 th 0 0 0 pt 0 inp 0 6 21.457
04-06 19:51:47.281 D/io_stats( 366): !@ DiskUsage: /data 99.97 % used (3165 MB/
3165 MB)
04-06 19:51:47.281 D/io_stats( 366): !@ MemInfo(KB): total 3783172 free 1918936
avail 3380528 actv(f) 106332 inactv(f) 1338248 dirty 52100 wb 1132 anonpg 20364
slab 111772
04-06 19:51:48.196 I/vold ( 342): [libfs_mgr]__mount(source=/dev/block/dm-
10,target=/data,type=f2fs)=0: Success
04-06 19:51:48.196 I/vold ( 342): [libfs_mgr]__mount return 0(source=dm-
10,target=/data,type=f2fs,flags=406,options=discard,usrquota,grpquota,fsync_mode=no
barrier,reserve_root=32768,resgid=5678,whint_mode=fs-
based,inlinecrypt,checkpoint=disable:0%): Success
04-06 19:51:48.197 E/vold ( 342): [libfs_mgr]restorecon_sec_sysfsERROR readlink
:/dev/block/dm-10
04-06 19:51:48.197 I/MetadataCrypt( 342): fs_mgr_do_mount --
04-06 19:51:48.197 D/vold ( 342): Mounted /data
04-06 19:51:48.197 I/MetadataCrypt( 342): Mounted
04-06 19:51:48.198 I/MetadataCrypt( 342): fscrypt_mount_metadata_encrypted ---
04-06 19:51:48.198 D/vold ( 342): Disk at 253:10 changed
04-06 19:51:48.218 W/libc ( 331): Unable to set property "ctl.interface_start"
to "aidl/android.system.keystore2.IKeystoreService/default": error code: 0x20, try
count : 1
04-06 19:51:48.225 W/libc ( 331): Unable to set property "ctl.interface_start"
to "aidl/android.system.keystore2.IKeystoreService/default": error code: 0x20, try
count : 2
04-06 19:51:48.226 W/libc ( 331): Unable to set property "ctl.interface_start"
to "aidl/android.system.keystore2.IKeystoreService/default": error code: 0x20, try
count : 3
04-06 19:51:48.226 I/servicemanager( 331): Tried to start aidl service
android.system.keystore2.IKeystoreService/default as a lazy service, but was unable
to. Usually this happens when a service is not installed, but if the service is
intended to be used as a lazy service, then it may be configured incorrectly.
04-06 19:51:48.248 F/PA_DAEMON( 404): [PrintVersion:437] Version:
PA_Daemon,teegris,version_2.4.10,release,dpi
04-06 19:51:48.270 I/STORK_BIRD( 408): [Server] Storkbird version 1.0.3 start!!!
04-06 19:51:48.280 I/Checkpoint( 342): cp_prepareCheckpoint called
04-06 19:51:48.295 D/hw-ProcessState( 407): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:48.297 I/HidlServiceManagement( 407): Registered
[email protected]::ISehVaultKeeper/default
04-06 19:51:48.298 I/HidlServiceManagement( 407): Removing namespace from process
name [email protected] to [email protected]
service.
04-06 19:51:48.298 I/[email protected]
service( 407): vaultkeeper_hal service is started
04-06 19:51:48.310 I/vaultkeeper( 406): firing up. VaultKeeper.
04-06 19:51:48.330 E/vold ( 342): fbeEnable
04-06 19:51:48.330 D/FsCrypt ( 342): fscrypt_initialize_systemwide_keys
04-06 19:51:48.332 E/KeyStorage( 342): retrieveKey : /data/unencrypted/key
04-06 19:51:48.350 W/keymint_tee( 380): [WRN]begin req PARAMS: BM32, PD1,
04-06 19:51:48.352 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:48.352 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:48.353 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:48.354 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:48.355 E/KeyStorage( 342): retrieveKey success : /data/unencrypted/key
04-06 19:51:48.355 D/FsCrypt ( 342): fscrypt_initialize_systemwide_keys,
install_storage_key DATA_MNT_POINT
04-06 19:51:48.356 D/vold ( 342): Installed fscrypt key with ref
7c1e5b76978a436048160ef62c48b51d to /data
04-06 19:51:48.356 D/vold ( 342): Added fscrypt-provisioning key for
7c1e5b76978a436048160ef62c48b51d to session keyring
04-06 19:51:48.356 D/FsCrypt ( 342): key mode: aes-256-xts:aes-256-cts:v2, file
name: /data/unencrypted/mode
04-06 19:51:48.357 D/FsCrypt ( 342): ref_filename: /data/unencrypted/ref
04-06 19:51:48.358 D/FsCrypt ( 342): Wrote system DE key reference to:
/data/unencrypted/ref
04-06 19:51:48.358 D/vold ( 342): Generating standard storage key
04-06 19:51:48.358 D/vold ( 342): Installed fscrypt key with ref
ea7e0d1dcd960bb5cb3346e6680f4573 to /data
04-06 19:51:48.358 D/vold ( 342): Added fscrypt-provisioning key for
ea7e0d1dcd960bb5cb3346e6680f4573 to session keyring
04-06 19:51:48.359 D/FsCrypt ( 342): Wrote per boot key reference to:
/data/unencrypted/per_boot_ref
04-06 19:51:48.359 I/voldUtils( 342): PROP : security.fbe.fail_cause : , value
K00R
04-06 19:51:48.394 I/tombstoned( 419): tombstoned successfully initialized
04-06 19:51:48.407 I/incfs ( 342): Initial API level of the device: 31
04-06 19:51:48.407 I/incfs ( 342): ro.incremental.enable: yes
04-06 19:51:48.407 I/incfs ( 342): isFsAvailable: true
04-06 19:51:48.407 I/incfs ( 342): isFsAvailable: true
04-06 19:51:48.408 I/incfs ( 342): IncFs_Features: v2
04-06 19:51:48.409 I/keystore2( 379): keystore2::maintenance: In early_boot_ended.
04-06 19:51:48.494 D/android.hardware.security.keymint-service( 380):
addRngEntropy: ret 0
04-06 19:51:48.495 I/keystore2( 379): keystore2::globals: Touching Keystore 2.0
database for this first time since boot.
04-06 19:51:48.495 I/keystore2( 379): keystore2::globals: Calling cleanup
leftovers.
04-06 19:51:48.545 W/keymint_tee( 380): [WRN]ret OK PARAMS: PP2, D4, NAR1, A128,
KS256, CD2022.11.24,13:09:24.948,
04-06 19:51:48.545 D/android.hardware.security.keymint-service( 380):
getKeyCharacteristics: ret 0
04-06 19:51:48.546 W/keymint_tee( 380): [WRN]begin req PARAMS: D4,
04-06 19:51:48.547 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:48.549 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:48.549 I/keystore2( 379): keystore2::super_key: Starting boot level
watcher.
04-06 19:51:48.549 I/keystore2( 379): keystore2::super_key: Read
keystore.boot_level value 30
04-06 19:51:48.549 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 0), valid: true
04-06 19:51:48.549 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 0), valid: true
04-06 19:51:48.550 I/keystore2( 379): keystore2::super_key: Read
keystore.boot_level value 30
04-06 19:51:48.550 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:48.550 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:48.550 D/android.hardware.security.keymint-service( 380):
earlyBootEnded: ret 0
04-06 19:51:48.550 I/keystore2( 379): keystore2::maintenance: Call to
earlyBootEnded succeeded for security level TRUSTED_ENVIRONMENT.
04-06 19:51:48.552 I/hwservicemanager( 332): getTransport: Cannot find entry
[email protected]::IKeymasterDevice/default in either framework or
device VINTF manifest.
04-06 19:51:48.553 I/hwservicemanager( 332): getTransport: Cannot find entry
[email protected]::IKeymasterDevice/default in either framework or
device VINTF manifest.
04-06 19:51:48.553 E/keystore2( 379): keystore2::maintenance: Call to
earlyBootEnded failed for security level STRONGBOX: In call_with_watchdog: getting
keymint device.
04-06 19:51:48.553 E/keystore2( 379): keystore2::error: In call_with_watchdog:
getting keymint device
04-06 19:51:48.553 E/keystore2( 379):
04-06 19:51:48.553 E/keystore2( 379): Caused by:
04-06 19:51:48.553 E/keystore2( 379): 0: In get_keymint_device.
04-06 19:51:48.553 E/keystore2( 379): 1: In connect_keymint: Trying to get
Legacy wrapper.
04-06 19:51:48.553 E/keystore2( 379): 2: Error::Km(ErrorCode(-68))
04-06 19:51:48.553 E/vold ( 342): keystore2 Keystore earlyBootEnded returned
service specific error: -68
04-06 19:51:48.710 D/vold ( 342): Disk at 7:32 changed
04-06 19:51:48.715 D/vold ( 342): Disk at 7:40 changed
04-06 19:51:48.722 D/vold ( 342): Disk at 7:48 changed
04-06 19:51:48.723 D/vold ( 342): Disk at 7:56 changed
04-06 19:51:48.734 D/vold ( 342): Disk at 7:64 changed
04-06 19:51:48.736 D/vold ( 342): Disk at 7:72 changed
04-06 19:51:48.738 D/vold ( 342): Disk at 253:11 changed
04-06 19:51:48.738 D/vold ( 342): Disk at 253:12 changed
04-06 19:51:48.738 D/vold ( 342): Disk at 253:11 changed
04-06 19:51:48.738 D/vold ( 342): Disk at 253:12 changed
04-06 19:51:48.741 D/vold ( 342): Disk at 7:80 changed
04-06 19:51:48.743 D/vold ( 342): Disk at 253:13 changed
04-06 19:51:48.743 D/vold ( 342): Disk at 253:13 changed
04-06 19:51:48.747 D/vold ( 342): Disk at 253:14 changed
04-06 19:51:48.747 D/vold ( 342): Disk at 253:14 changed
04-06 19:51:48.846 D/vold ( 342): Disk at 7:88 changed
04-06 19:51:48.879 D/vold ( 342): Disk at 7:96 changed
04-06 19:51:48.882 D/vold ( 342): Disk at 7:104 changed
04-06 19:51:48.885 D/vold ( 342): Disk at 253:15 changed
04-06 19:51:48.886 D/vold ( 342): Disk at 253:15 changed
04-06 19:51:48.888 D/vold ( 342): Disk at 253:16 changed
04-06 19:51:48.888 D/vold ( 342): Disk at 253:16 changed
04-06 19:51:48.890 D/vold ( 342): Disk at 7:112 changed
04-06 19:51:48.896 D/vold ( 342): Disk at 253:17 changed
04-06 19:51:48.896 D/vold ( 342): Disk at 253:17 changed
04-06 19:51:48.914 D/vold ( 342): Disk at 7:120 changed
04-06 19:51:48.920 D/vold ( 342): Disk at 253:18 changed
04-06 19:51:48.920 D/vold ( 342): Disk at 253:18 changed
04-06 19:51:48.967 D/vold ( 342): Disk at 7:128 changed
04-06 19:51:48.968 D/vold ( 342): Disk at 7:136 changed
04-06 19:51:48.972 D/vold ( 342): Disk at 253:19 changed
04-06 19:51:48.972 D/vold ( 342): Disk at 253:19 changed
04-06 19:51:48.974 D/vold ( 342): Disk at 253:20 changed
04-06 19:51:48.974 D/vold ( 342): Disk at 253:20 changed
04-06 19:51:48.982 D/vold ( 342): Disk at 7:144 changed
04-06 19:51:48.988 D/vold ( 342): Disk at 253:21 changed
04-06 19:51:48.989 D/vold ( 342): Disk at 253:21 changed
04-06 19:51:49.006 D/vold ( 342): Disk at 7:152 changed
04-06 19:51:49.013 D/vold ( 342): Disk at 253:22 changed
04-06 19:51:49.013 D/vold ( 342): Disk at 253:22 changed
04-06 19:51:49.050 D/vold ( 342): Disk at 7:160 changed
04-06 19:51:49.054 D/vold ( 342): Disk at 7:168 changed
04-06 19:51:49.060 D/vold ( 342): Disk at 253:23 changed
04-06 19:51:49.060 D/vold ( 342): Disk at 253:23 changed
04-06 19:51:49.062 D/vold ( 342): Disk at 7:176 changed
04-06 19:51:49.070 D/vold ( 342): Disk at 7:184 changed
04-06 19:51:49.075 D/vold ( 342): Disk at 7:192 changed
04-06 19:51:49.077 D/vold ( 342): Disk at 253:24 changed
04-06 19:51:49.077 D/vold ( 342): Disk at 253:24 changed
04-06 19:51:49.081 D/vold ( 342): Disk at 253:25 changed
04-06 19:51:49.081 D/vold ( 342): Disk at 253:25 changed
04-06 19:51:49.099 D/vold ( 342): Disk at 7:200 changed
04-06 19:51:49.105 D/vold ( 342): Disk at 253:26 changed
04-06 19:51:49.105 D/vold ( 342): Disk at 253:26 changed
04-06 19:51:49.152 D/vold ( 342): Disk at 7:208 changed
04-06 19:51:49.154 D/vold ( 342): Disk at 7:216 changed
04-06 19:51:49.158 D/vold ( 342): Disk at 253:27 changed
04-06 19:51:49.159 D/vold ( 342): Disk at 253:27 changed
04-06 19:51:49.159 D/vold ( 342): Disk at 253:28 changed
04-06 19:51:49.160 D/vold ( 342): Disk at 253:28 changed
04-06 19:51:49.168 D/vold ( 342): Disk at 7:224 changed
04-06 19:51:49.175 D/vold ( 342): Disk at 7:232 changed
04-06 19:51:49.182 D/vold ( 342): Disk at 7:240 changed
04-06 19:51:49.189 D/vold ( 342): Disk at 253:29 changed
04-06 19:51:49.189 D/vold ( 342): Disk at 253:29 changed
04-06 19:51:49.257 I/servicemanager( 331): Adding 'u:r:apexd:s0' service
(apexservice:424)
04-06 19:51:49.281 D/io_stats( 366): !@ 179,0 r 35902 954987 w 4786 635360 d 130
1142792 f 0 0 iot 15916 0 th 0 0 0 pt 0 inp 0 0 23.458
04-06 19:51:49.311 I/vaultkeeper( 406): There is no
property(ro.factory.factory_binary)
04-06 19:51:49.311 I/VaultKeeper_COMMON( 406): VK 4.3.0 [Client]
/vendor/bin/vaultkeeperd. => [Vault] VK. [CMD NO.] 8869
04-06 19:51:49.311 I/VaultKeeper_COMMON( 406): [CMD:INITIALIZE]
04-06 19:51:49.805 I/vaultkeeper( 406): runCommand Success.(TA ret = 0)
04-06 19:51:49.806 I/vaultkeeper( 406): VAULTKEEPER SERVICE READY!
04-06 19:51:49.829 I/derive_sdk( 526): Read version 5 from 7
04-06 19:51:49.830 I/derive_sdk( 526): Read version 5 from 4
04-06 19:51:49.831 I/derive_sdk( 526): Read version 5 from 6
04-06 19:51:49.832 I/derive_sdk( 526): Read version 5 from 3
04-06 19:51:49.833 I/derive_sdk( 526): Read version 4 from 1
04-06 19:51:49.833 I/derive_sdk( 526): Read version 5 from 10
04-06 19:51:49.833 I/derive_sdk( 526): Read version 5 from 2
04-06 19:51:49.834 I/derive_sdk( 526): Read version 5 from 8
04-06 19:51:49.834 I/derive_sdk( 526): Read version 5 from 5
04-06 19:51:49.835 I/derive_sdk( 526): Read version 4 from 9
04-06 19:51:49.835 I/derive_sdk( 526): extension r version is 5
04-06 19:51:49.836 I/derive_sdk( 526): extension s version is 5
04-06 19:51:49.868 D/vold ( 342): initUser0
04-06 19:51:49.868 D/FsCrypt ( 342): fscrypt_init_user0
04-06 19:51:49.868 E/FsCrypt ( 342): Preparing: /data/misc/vold/user_keys
04-06 19:51:49.869 E/FsCrypt ( 342): Preparing: /data/misc/vold/user_keys/ce
04-06 19:51:49.873 E/FsCrypt ( 342): Preparing: /data/misc/vold/user_keys/de
04-06 19:51:49.877 E/FsCrypt ( 342): Preparing: /data/misc/vold/user_keys/ext
04-06 19:51:49.888 D/FsCrypt ( 342): load_all_de_keys
04-06 19:51:49.888 E/KeyStorage( 342): retrieveKey :
/data/misc/vold/user_keys/de/0
04-06 19:51:49.897 W/keymint_tee( 380): [WRN]begin req PARAMS: BM32, PD1,
04-06 19:51:49.898 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:49.898 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:49.899 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:49.901 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:49.901 E/KeyStorage( 342): retrieveKey success :
/data/misc/vold/user_keys/de/0
04-06 19:51:49.901 D/vold ( 342): Installed fscrypt key with ref
a31d1acdd84dfdddf74b5028dc12ccd2 to /data
04-06 19:51:49.902 D/vold ( 342): Added fscrypt-provisioning key for
a31d1acdd84dfdddf74b5028dc12ccd2 to session keyring
04-06 19:51:49.902 D/FsCrypt ( 342): Installed de key for user 0
04-06 19:51:49.902 D/FsCrypt ( 342): fscrypt_prepare_user_storage for volume null,
user 0, serial 0, flags 1
04-06 19:51:49.902 E/FsCrypt ( 342): Preparing: /data/system/users/0
04-06 19:51:49.903 E/FsCrypt ( 342): Preparing: /data/misc/profiles/cur/0
04-06 19:51:49.903 E/FsCrypt ( 342): Preparing: /data/system_de/0
04-06 19:51:49.903 E/FsCrypt ( 342): Preparing: /data/misc_de/0
04-06 19:51:49.904 E/FsCrypt ( 342): Preparing: /data/vendor_de/0
04-06 19:51:49.904 E/FsCrypt ( 342): Preparing: /data/user_de/0
04-06 19:51:49.904 D/FsCrypt ( 342): lookup_policy 0
04-06 19:51:49.904 I/vold ( 342): Verified that /data/system_de/0 has the
encryption policy a31d1acdd84dfdddf74b5028dc12ccd2 v2 modes 1/4 flags 0x2
04-06 19:51:49.905 I/vold ( 342): Verified that /data/misc_de/0 has the
encryption policy a31d1acdd84dfdddf74b5028dc12ccd2 v2 modes 1/4 flags 0x2
04-06 19:51:49.905 I/vold ( 342): Verified that /data/vendor_de/0 has the
encryption policy a31d1acdd84dfdddf74b5028dc12ccd2 v2 modes 1/4 flags 0x2
04-06 19:51:49.905 I/vold ( 342): Verified that /data/user_de/0 has the
encryption policy a31d1acdd84dfdddf74b5028dc12ccd2 v2 modes 1/4 flags 0x2
04-06 19:51:49.905 D/FsCrypt ( 342): prepare_subdirs
04-06 19:51:49.905 D/voldUtils( 342): /system/bin/vold_prepare_subdirs
04-06 19:51:49.905 D/voldUtils( 342): prepare
04-06 19:51:49.905 D/voldUtils( 342):
04-06 19:51:49.905 D/voldUtils( 342): 0
04-06 19:51:49.905 D/voldUtils( 342): 1
04-06 19:51:49.944 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 1000 gid
1000 context u:object_r:system_data_file:s0:c512,c768 on path: /data/user_de/0
04-06 19:51:49.945 D/vold_prepare_subdirs( 528): Setting up mode 700 uid 0 gid 0
context u:object_r:vold_data_file:s0 on path: /data/misc_de/0/vold
04-06 19:51:49.947 D/vold_prepare_subdirs( 528): Setting up mode 700 uid 0 gid 0
context u:object_r:storaged_data_file:s0 on path: /data/misc_de/0/storaged
04-06 19:51:49.953 D/vold_prepare_subdirs( 528): Setting up mode 700 uid 0 gid 0
context u:object_r:rollback_data_file:s0 on path: /data/misc_de/0/rollback
04-06 19:51:49.957 D/vold_prepare_subdirs( 528): Setting up mode 700 uid 0 gid 0
context u:object_r:apex_rollback_data_file:s0 on path: /data/misc_de/0/apexrollback
04-06 19:51:49.961 D/vold_prepare_subdirs( 528): Setting up mode 711 uid 0 gid 0
context u:object_r:apex_module_data_file:s0 on path: /data/misc_de/0/apexdata
04-06 19:51:49.964 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_wifi_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.wifi
04-06 19:51:49.968 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.tethering
04-06 19:51:49.971 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_permission_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.permission
04-06 19:51:49.972 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.samsung.android.shell
04-06 19:51:49.976 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.samsung.android.ipm
04-06 19:51:49.979 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.media.swcodec
04-06 19:51:49.981 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.os.statsd
04-06 19:51:49.983 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.resolv
04-06 19:51:49.985 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.mediaprovider
04-06 19:51:49.986 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.appsearch
04-06 19:51:49.988 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.extservices
04-06 19:51:49.990 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.neuralnetworks
04-06 19:51:49.992 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.ipsec
04-06 19:51:49.994 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.adbd
04-06 19:51:49.995 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.cellbroadcast
04-06 19:51:49.997 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.conscrypt
04-06 19:51:49.999 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.media
04-06 19:51:50.001 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.art
04-06 19:51:50.003 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.apex.cts.shim
04-06 19:51:50.004 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.sdkext
04-06 19:51:50.006 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.scheduling
04-06 19:51:50.008 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.tzdata
04-06 19:51:50.009 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.vndk.v31
04-06 19:51:50.011 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.i18n
04-06 19:51:50.013 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/com.android.runtime
04-06 19:51:50.015 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 0 gid
1000 context u:object_r:apex_module_data_file:s0 on path:
/data/misc_de/0/apexdata/sharedlibs
04-06 19:51:50.016 D/vold_prepare_subdirs( 528): Setting up mode 771 uid 1000 gid
1000 context u:object_r:user_profile_root_file:s0:c512,c768 on path:
/data/misc/profiles/cur/0
04-06 19:51:50.017 D/vold_prepare_subdirs( 528): Setting up mode 700 uid 1000 gid
1000 context u:object_r:fingerprint_vendor_data_file:s0 on path:
/data/vendor_de/0/fpdata
04-06 19:51:50.019 D/vold_prepare_subdirs( 528): Setting up mode 700 uid 1000 gid
1000 context u:object_r:face_vendor_data_file:s0 on path:
/data/vendor_de/0/facedata
04-06 19:51:50.021 D/vold ( 342): Detected support for
FS_IOC_ADD_ENCRYPTION_KEY
04-06 19:51:50.022 I/voldUtils( 342): PROP : security.fbe.fail_cause : , value
K00R
04-06 19:51:50.061 I/derive_classpath( 530): ParseFragments for bootclasspath
04-06 19:51:50.074 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.art/etc/classpaths/bootclasspath.pb
04-06 19:51:50.075 I/derive_classpath( 530): ReadClasspathFragment
/system/etc/classpaths/bootclasspath.pb
04-06 19:51:50.075 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.appsearch/etc/classpaths/bootclasspath.pb
04-06 19:51:50.076 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.conscrypt/etc/classpaths/bootclasspath.pb
04-06 19:51:50.076 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.i18n/etc/classpaths/bootclasspath.pb
04-06 19:51:50.076 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.ipsec/etc/classpaths/bootclasspath.pb
04-06 19:51:50.077 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.media/etc/classpaths/bootclasspath.pb
04-06 19:51:50.078 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.mediaprovider/etc/classpaths/bootclasspath.pb
04-06 19:51:50.079 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.os.statsd/etc/classpaths/bootclasspath.pb
04-06 19:51:50.080 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.permission/etc/classpaths/bootclasspath.pb
04-06 19:51:50.081 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.scheduling/etc/classpaths/bootclasspath.pb
04-06 19:51:50.082 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.sdkext/etc/classpaths/bootclasspath.pb
04-06 19:51:50.083 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.tethering/etc/classpaths/bootclasspath.pb
04-06 19:51:50.084 I/derive_classpath( 530): not installing
/apex/com.android.tethering/javalib/framework-connectivity-t.jar with
min_sdk_version 33
04-06 19:51:50.084 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.wifi/etc/classpaths/bootclasspath.pb
04-06 19:51:50.085 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.samsung.android.ipm/etc/classpaths/bootclasspath.pb
04-06 19:51:50.085 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.samsung.android.shell/etc/classpaths/bootclasspath.pb
04-06 19:51:50.086 I/derive_classpath( 530): ParseFragments for
systemserverclasspath
04-06 19:51:50.088 I/derive_classpath( 530): ReadClasspathFragment
/system/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.089 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.appsearch/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.090 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.art/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.090 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.media/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.090 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.os.statsd/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.091 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.permission/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.091 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.scheduling/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.092 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.android.tethering/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.092 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.samsung.android.ipm/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.093 I/derive_classpath( 530): ReadClasspathFragment
/apex/com.samsung.android.shell/etc/classpaths/systemserverclasspath.pb
04-06 19:51:50.094 I/derive_classpath( 530): WriteClasspathExports
/data/system/environ/classpath
04-06 19:51:50.094 I/derive_classpath( 530): WriteClasspathExports content
04-06 19:51:50.094 I/derive_classpath( 530): export BOOTCLASSPATH
/apex/com.android.art/javalib/core-oj.jar:/apex/com.android.art/javalib/core-
libart.jar:/apex/com.android.art/javalib/okhttp.jar:/apex/com.android.art/javalib/
bouncycastle.jar:/apex/com.android.art/javalib/apache-xml.jar:/system/framework/
framework.jar:/system/framework/framework-graphics.jar:/system/framework/ext.jar:/
system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/
framework/ims-common.jar:/system/framework/knoxsdk.jar:/system/framework/
knoxanalyticssdk.jar:/system/framework/drutils.jar:/system/framework/
uibc_java.jar:/system/framework/SmpsManager.jar:/system/framework/esecomm.jar:/
system/framework/sem-telephony-common.jar:/apex/com.android.i18n/javalib/core-
icu4j.jar:/apex/com.android.appsearch/javalib/framework-appsearch.jar:/apex/
com.android.conscrypt/javalib/conscrypt.jar:/apex/com.android.ipsec/javalib/
android.net.ipsec.ike.jar:/apex/com.android.media/javalib/updatable-media.jar:/
apex/com.android.mediaprovider/javalib/framework-mediaprovider.jar:/apex/
com.android.os.statsd/javalib/framework-statsd.jar:/apex/com.android.permission/
javalib/framework-permission.jar:/apex/com.android.permission/javalib/framework-
permission-s.jar:/apex/com.android.scheduling/javalib/framework-scheduling.jar:/
apex/com.android.sdkext/javalib/framework-sdkextensions.jar:/apex/
com.android.tethering/javalib/framework-connectivity.jar:/apex/
com.android.tethering/javalib/framework-tethering.jar:/apex/com.android.wifi/
javalib/framework-wifi.jar:/apex/com.samsung.android.ipm/javalib/framework-samsung-
ipm.jar:/apex/com.samsung.android.shell/javalib/framework-samsung-privilege.jar
04-06 19:51:50.094 I/derive_classpath( 530): export DEX2OATBOOTCLASSPATH
/apex/com.android.art/javalib/core-oj.jar:/apex/com.android.art/javalib/core-
libart.jar:/apex/com.android.art/javalib/okhttp.jar:/apex/com.android.art/javalib/
bouncycastle.jar:/apex/com.android.art/javalib/apache-xml.jar:/system/framework/
framework.jar:/system/framework/framework-graphics.jar:/system/framework/ext.jar:/
system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/
framework/ims-common.jar:/system/framework/knoxsdk.jar:/system/framework/
knoxanalyticssdk.jar:/system/framework/drutils.jar:/system/framework/
uibc_java.jar:/system/framework/SmpsManager.jar:/system/framework/esecomm.jar:/
system/framework/sem-telephony-common.jar:/apex/com.android.i18n/javalib/core-
icu4j.jar
04-06 19:51:50.094 I/derive_classpath( 530): export SYSTEMSERVERCLASSPATH
/system/framework/com.android.location.provider.jar:/system/framework/
services.jar:/system/framework/ethernet-service.jar:/system/framework/ssrm.jar:/
system/framework/semwifi-service.jar:/apex/com.android.appsearch/javalib/service-
appsearch.jar:/apex/com.android.art/javalib/service-art.jar:/apex/
com.android.media/javalib/service-media-s.jar:/apex/com.android.permission/
javalib/service-permission.jar:/apex/com.samsung.android.ipm/javalib/service-
samsung-ipm.jar:/apex/com.samsung.android.shell/javalib/service-samsung-
privilege.jar
04-06 19:51:50.094 I/derive_classpath( 530): export
STANDALONE_SYSTEMSERVER_JARS /apex/com.android.os.statsd/javalib/service-
statsd.jar:/apex/com.android.scheduling/javalib/service-scheduling.jar:/apex/
com.android.tethering/javalib/service-connectivity.jar
04-06 19:51:50.174 D/ProcessState( 531): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:50.176 I/odsign ( 531): Trying to retrieve existing HMAC key...
04-06 19:51:50.178 I/odsign ( 531): Trying to retrieve existing keystore key...
04-06 19:51:50.199 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:50.199 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:50.199 W/keymint_tee( 380): [WRN]begin req PARAMS: A128, D4,
04-06 19:51:50.201 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:50.201 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:50.202 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:50.203 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:50.204 I/odsign ( 531): Verified public key signature.
04-06 19:51:50.204 E/odsign ( 531): Initialized Keystore key.
04-06 19:51:50.211 I/odsign ( 531): Found and verified existing public key
certificate: /data/misc/odsign/key.cert
04-06 19:51:50.395 I/odrefresh( 533): ART APEX version 331413030
04-06 19:51:50.509 I/odrefresh( 533): Incomplete system_server artifacts. Missing
file:
'/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.odex'
04-06 19:51:50.517 I/odrefresh( 531): odrefresh terminated by exit(79)
04-06 19:51:50.519 I/odsign ( 531): /data/misc/odsign/odsign.info.signature
matches.
04-06 19:51:50.519 I/odsign ( 531): Loaded /data/misc/odsign/odsign.info
04-06 19:51:50.574 I/odsign ( 531): All root hashes match.
04-06 19:51:50.615 I/odrefresh( 534): ART APEX version 331413030
04-06 19:51:50.633 I/odrefresh( 534): Incomplete system_server artifacts. Missing
file:
'/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.odex'
04-06 19:51:50.641 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/cache-info.xml
04-06 19:51:50.642 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/boot.art
04-06 19:51:50.751 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/boot.oat
04-06 19:51:51.040 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/boot.vdex
04-06 19:51:51.095 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]
[email protected]
04-06 19:51:51.100 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]
[email protected]
04-06 19:51:51.120 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]
[email protected]
04-06 19:51:51.130 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@
classes.art
04-06 19:51:51.186 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@
classes.odex
04-06 19:51:51.282 D/io_stats( 366): !@ 179,0 r 38422 1001983 w 4871 649080 d 378
2580488 f 0 0 iot 17500 0 th 0 0 0 pt 0 inp 0 1 25.459
04-06 19:51:52.566 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@
classes.vdex
04-06 19:51:52.593 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@ethernet-
[email protected]
04-06 19:51:52.599 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@ethernet-
[email protected]
04-06 19:51:52.615 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@ethernet-
[email protected]
04-06 19:51:52.621 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@clas
ses.art
04-06 19:51:52.625 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@clas
ses.odex
04-06 19:51:52.639 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@clas
ses.vdex
04-06 19:51:52.643 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@semwifi-
[email protected]
04-06 19:51:52.650 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@semwifi-
[email protected]
04-06 19:51:52.788 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@semwifi-
[email protected]
04-06 19:51:52.793 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@jav
[email protected]@classes.art
04-06 19:51:52.802 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@jav
[email protected]@classes.odex
04-06 19:51:52.894 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@jav
[email protected]@classes.vdex
04-06 19:51:52.898 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib@s
[email protected]
04-06 19:51:52.905 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib@s
[email protected]
04-06 19:51:52.915 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib@s
[email protected]
04-06 19:51:52.922 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib
@[email protected]
04-06 19:51:52.928 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib
@[email protected]
04-06 19:51:52.950 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib
@[email protected]
04-06 19:51:52.952 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.art
04-06 19:51:52.959 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.odex
04-06 19:51:52.995 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.vdex
04-06 19:51:53.002 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.art
04-06 19:51:53.014 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.odex
04-06 19:51:53.042 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.vdex
04-06 19:51:53.044 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]
@[email protected]@classes.art
04-06 19:51:53.052 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]
@[email protected]@classes.odex
04-06 19:51:53.062 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]
@[email protected]@classes.vdex
04-06 19:51:53.067 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@jav
[email protected]@classes.art
04-06 19:51:53.074 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@jav
[email protected]@classes.odex
04-06 19:51:53.086 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@jav
[email protected]@classes.vdex
04-06 19:51:53.094 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.art
04-06 19:51:53.099 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.odex
04-06 19:51:53.135 I/odrefresh( 534): Refreshing
/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.vdex
04-06 19:51:53.204 I/odrefresh( 534): Compiling
/apex/com.android.tethering/javalib/service-connectivity.jar:
/apex/com.android.art/bin/dex2oat32
--dex-file=/apex/com.android.tethering/javalib/service-connectivity.jar --dex-fd=5
--android-root=out/empty --abort-on-hard-verifier-error --no-abort-on-soft-
verifier-error --compilation-reason=boot --image-format=lz4 --force-determinism --
resolve-startup-const-strings=true --avoid-storing-invocation --generate-mini-
debug-info --strip --instruction-set=arm --compiler-filter=speed --app-image-fd=6
--oat-fd=7 --output-vdex-fd=8
--oat-location=/data/misc/apexdata/com.android.art/dalvik-cache/arm/
[email protected]@[email protected]@classes.odex --runtime-
arg
-Xbootclasspath:/apex/com.android.art/javalib/core-oj.jar:/apex/com.android.art/
javalib/core-libart.jar:/apex/com.android.art/javalib/okhttp.jar:/apex/
com.android.art/javalib/bouncycastle.jar:/apex/com.android.art/javalib/apache-
xml.jar:/system/framework/framework.jar:/system/framework/framework-graphics.jar:/
system/framework/ext.jar:/system/framework/telephony-common.jar:/system/framework/
voip-common.jar:/system/framework/ims-common.jar:/system/framework/knoxsdk.jar:/
system/framework/knoxanalyticssdk.jar:/system/framework/drutils.jar:/system/
framework/uibc_java.jar:/system/framework/SmpsManager.jar:/system/framework/
esecomm.jar:/system/framework/sem-telephony-common.jar:/apex/com.android.i18n/
javalib/core-icu4j.jar:/apex/com.android.appsearch/javalib/framework-
appsearch.jar:/apex/com.android.conscrypt/javalib/conscrypt.jar:/apex/
com.android.ipsec/javalib/android.net.ipsec.ike.jar:/apex/com.android.media/
javalib/updatable-media.jar:/apex/com.android.mediaprovider/javalib/framework-
mediaprovider.jar:/apex/com.android.os.statsd/javalib/framework-statsd.jar:/apex/
com.android.permission/javalib/framework-permission.jar:/apex/
com.android.permission/javalib/framework-permission-s.jar:/apex/
com.android.scheduling/javalib/framework-scheduling.jar:/apex/com.android.sdkext/
javalib/framework-sdkextensions.jar:/apex/com.android.tethering/javalib/framework-
connectivity.jar:/apex/com.android.tethering/javalib/framework-tethering.jar:/
apex/com.android.wifi/javalib/framework-wifi.jar:/apex/com.samsung.android.ipm/
javalib/framework-samsung-ipm.jar:/apex/com.samsung.android.shell/javalib/
framework-samsung-privilege.jar --runtime-arg -Xbootclasspathfds:-1:-1:-1:-1:-
1:9:10:11:12:13:14:15:16:17:18:19:20:21:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-
1:-1 --runtime-arg -Xbootclasspathimagefds:22:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-
1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1 --runtime-arg -
Xbootclasspathoatfds:23:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-
1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1 --runtime-arg -Xbootclasspathvdexfds:24:-
1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-1:-
1:-1:-1:-1:-1:-1
--boot-image=/data/misc/apexdata/com.android.art/dalvik-cache/boot.art --class-
loader-context=PCL[];PCL[/system/framework/com.android.location.provider.jar:/
system/framework/services.jar:/system/framework/ethernet-service.jar:/system/
framework/ssrm.jar:/system/framework/semwifi-service.jar:/apex/
com.android.appsearch/javalib/service-appsearch.jar:/apex/com.android.art/javalib/
service-art.jar:/apex/com.android.media/javalib/service-media-s.jar:/apex/
com.android.permission/javalib/service-permission.jar:/apex/
com.samsung.android.ipm/javalib/service-samsung-ipm.jar:/apex/
com.samsung.android.shell/javalib/service-samsung-privilege.jar] --class-loader-
context-fds=25:26:27:28:29:30:31:32:33:34:35 [timeout 90s]
04-06 19:51:53.282 D/io_stats( 366): !@ 179,0 r 39448 1085991 w 6030 713872 d 546
3561480 f 0 0 iot 19416 0 th 0 0 0 pt 0 inp 0 10 27.459
04-06 19:51:53.283 D/io_stats( 366): !@ MemInfo(KB): total 3783172 free 2252108
avail 3359740 actv(f) 116324 inactv(f) 970984 dirty 36404 wb 344 anonpg 27200 slab
122144
04-06 19:51:53.433 W/dex2oat32( 542): Using default instruction set features for
ARM CPU variant (default) using conservative defaults
04-06 19:51:53.433 I/dex2oat32( 542): /apex/com.android.art/bin/dex2oat32 --dex-
file=/apex/com.android.tethering/javalib/service-connectivity.jar --dex-fd=5 --
android-root=out/empty --abort-on-hard-verifier-error --no-abort-on-soft-verifier-
error --compilation-reason=boot --force-determinism --resolve-startup-const-
strings=true --avoid-storing-invocation --generate-mini-debug-info --strip --
compiler-filter=speed --app-image-fd=6 --oat-fd=7 --output-vdex-fd=8 --oat-
location=/data/misc/apexdata/com.android.art/dalvik-cache/arm/
[email protected]@[email protected]@classes.odex --class-
loader-context=PCL[];PCL[/system/framework/com.android.location.provider.jar:/
system/framework/services.jar:/system/framework/ethernet-service.jar:/system/
framework/ssrm.jar:/system/framework/semwifi-service.jar:/apex/
com.android.appsearch/javalib/service-appsearch.jar:/apex/com.android.art/javalib/
service-art.jar:/apex/com.android.media/javalib/service-media-s.jar:/apex/
com.android.permission/javalib/service-permission.jar:/apex/
com.samsung.android.ipm/javalib/service-samsung-ipm.jar:/apex/
com.samsung.android.shell/javalib/service-samsung-privilege.jar] --class-loader-
context-fds=25:26:27:28:29:30:31:32:33:34:35
04-06 19:51:53.448 I/dex2oat32( 542): setting boot class path to
/apex/com.android.art/javalib/core-oj.jar:/apex/com.android.art/javalib/core-
libart.jar:/apex/com.android.art/javalib/okhttp.jar:/apex/com.android.art/javalib/
bouncycastle.jar:/apex/com.android.art/javalib/apache-xml.jar:/system/framework/
framework.jar:/system/framework/framework-graphics.jar:/system/framework/ext.jar:/
system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/
framework/ims-common.jar:/system/framework/knoxsdk.jar:/system/framework/
knoxanalyticssdk.jar:/system/framework/drutils.jar:/system/framework/
uibc_java.jar:/system/framework/SmpsManager.jar:/system/framework/esecomm.jar:/
system/framework/sem-telephony-common.jar:/apex/com.android.i18n/javalib/core-
icu4j.jar:/apex/com.android.appsearch/javalib/framework-appsearch.jar:/apex/
com.android.conscrypt/javalib/conscrypt.jar:/apex/com.android.ipsec/javalib/
android.net.ipsec.ike.jar:/apex/com.android.media/javalib/updatable-media.jar:/
apex/com.android.mediaprovider/javalib/framework-mediaprovider.jar:/apex/
com.android.os.statsd/javalib/framework-statsd.jar:/apex/com.android.permission/
javalib/framework-permission.jar:/apex/com.android.permission/javalib/framework-
permission-s.jar:/apex/com.android.scheduling/javalib/framework-scheduling.jar:/
apex/com.android.sdkext/javalib/framework-sdkextensions.jar:/apex/
com.android.tethering/javalib/framework-connectivity.jar:/apex/
com.android.tethering/javalib/framework-tethering.jar:/apex/com.android.wifi/
javalib/framework-wifi.jar:/apex/com.samsung.android.ipm/javalib/framework-samsung-
ipm.jar:/apex/com.samsung.android.shell/javalib/framework-samsung-privilege.jar
04-06 19:51:53.510 I/dex2oat32( 542): Using CollectorTypeCC GC.
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] Verification error
in void com.android.server.NsdService$NsdServiceConnector.binderDied()
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.binderDied(): [0x2] couldn't find
method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.binderDied(): [0x8] couldn't find
method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.binderDied(): [0xE] illegal
method access (call android.os.Message
android.net.connectivity.com.android.internal.util.StateMachine.obtainMessage(int,
java.lang.Object) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.binderDied() failed to verify:
void com.android.server.NsdService$NsdServiceConnector.binderDied(): [0xE] 'this'
argument 'Reference: com.android.server.NsdService$NsdStateMachine' not instance of
'Reference: android.net.connectivity.com.android.internal.util.StateMachine'
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125]
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] Verification error
in void com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo)
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo): [0x2] couldn't find method
com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo): [0x8] couldn't find method
com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo): [0xC]
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo): [0xE]
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo): [0xE] illegal method access (call void
com.android.server.NsdService$ListenerArgs.<init>(com.android.server.NsdService$Nsd
ServiceConnector, android.net.nsd.NsdServiceInfo) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo): [0x13] illegal method access (call
android.os.Message
android.net.connectivity.com.android.internal.util.StateMachine.obtainMessage(int,
int, int, java.lang.Object) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo) failed to verify: void
com.android.server.NsdService$NsdServiceConnector.discoverServices(int,
android.net.nsd.NsdServiceInfo): [0x13] 'this' argument 'Reference:
com.android.server.NsdService$NsdStateMachine' not instance of 'Reference:
android.net.connectivity.com.android.internal.util.StateMachine'
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125]
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] Verification error
in void com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo)
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo): [0x2] couldn't find method
com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo): [0x8] couldn't find method
com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo): [0xC]
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo): [0xE]
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo): [0xE] illegal method access (call void
com.android.server.NsdService$ListenerArgs.<init>(com.android.server.NsdService$Nsd
ServiceConnector, android.net.nsd.NsdServiceInfo) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo): [0x14] illegal method access (call
android.os.Message
android.net.connectivity.com.android.internal.util.StateMachine.obtainMessage(int,
int, int, java.lang.Object) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo) failed to verify: void
com.android.server.NsdService$NsdServiceConnector.registerService(int,
android.net.nsd.NsdServiceInfo): [0x14] 'this' argument 'Reference:
com.android.server.NsdService$NsdStateMachine' not instance of 'Reference:
android.net.connectivity.com.android.internal.util.StateMachine'
04-06 19:51:53.990 F/dex2oat32( 542): method_verifier.cc:5125]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] Verification error
in void com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo): [0x2] couldn't find method
com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo): [0x8] couldn't find method
com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo): [0xC]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo): [0xE]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo): [0xE] illegal method access (call void
com.android.server.NsdService$ListenerArgs.<init>(com.android.server.NsdService$Nsd
ServiceConnector, android.net.nsd.NsdServiceInfo) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo): [0x14] illegal method access (call
android.os.Message
android.net.connectivity.com.android.internal.util.StateMachine.obtainMessage(int,
int, int, java.lang.Object) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo) failed to verify: void
com.android.server.NsdService$NsdServiceConnector.resolveService(int,
android.net.nsd.NsdServiceInfo): [0x14] 'this' argument 'Reference:
com.android.server.NsdService$NsdStateMachine' not instance of 'Reference:
android.net.connectivity.com.android.internal.util.StateMachine'
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] Verification error
in void com.android.server.NsdService$NsdServiceConnector.startDaemon()
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.startDaemon(): [0x2] couldn't
find method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.startDaemon(): [0x8] couldn't
find method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.startDaemon(): [0xC]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.startDaemon(): [0xF]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.startDaemon(): [0xF] illegal
method access (call void
com.android.server.NsdService$ListenerArgs.<init>(com.android.server.NsdService$Nsd
ServiceConnector, android.net.nsd.NsdServiceInfo) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.startDaemon(): [0x14] illegal
method access (call android.os.Message
android.net.connectivity.com.android.internal.util.StateMachine.obtainMessage(int,
java.lang.Object) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.startDaemon() failed to verify:
void com.android.server.NsdService$NsdServiceConnector.startDaemon(): [0x14] 'this'
argument 'Reference: com.android.server.NsdService$NsdStateMachine' not instance of
'Reference: android.net.connectivity.com.android.internal.util.StateMachine'
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] Verification error
in void com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int): [0x2]
couldn't find method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int): [0x8]
couldn't find method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int): [0xC]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int): [0xF]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int): [0xF] illegal
method access (call void
com.android.server.NsdService$ListenerArgs.<init>(com.android.server.NsdService$Nsd
ServiceConnector, android.net.nsd.NsdServiceInfo) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int): [0x14]
illegal method access (call android.os.Message
android.net.connectivity.com.android.internal.util.StateMachine.obtainMessage(int,
int, int, java.lang.Object) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int) failed to
verify: void com.android.server.NsdService$NsdServiceConnector.stopDiscovery(int):
[0x14] 'this' argument 'Reference: com.android.server.NsdService$NsdStateMachine'
not instance of 'Reference:
android.net.connectivity.com.android.internal.util.StateMachine'
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] Verification error
in void com.android.server.NsdService$NsdServiceConnector.unregisterService(int)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int): [0x2]
couldn't find method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int): [0x8]
couldn't find method com.android.server.NsdService.-$$Nest$fgetmNsdStateMachine
(Lcom/android/server/NsdService;)Lcom/android/server/NsdService$NsdStateMachine;
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int): [0xC]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int): [0xF]
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int): [0xF]
illegal method access (call void
com.android.server.NsdService$ListenerArgs.<init>(com.android.server.NsdService$Nsd
ServiceConnector, android.net.nsd.NsdServiceInfo) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int): [0x15]
illegal method access (call android.os.Message
android.net.connectivity.com.android.internal.util.StateMachine.obtainMessage(int,
int, int, java.lang.Object) from Unresolved Reference:
com.android.server.NsdService$NsdServiceConnector)
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125] void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int) failed to
verify: void
com.android.server.NsdService$NsdServiceConnector.unregisterService(int): [0x15]
'this' argument 'Reference: com.android.server.NsdService$NsdStateMachine' not
instance of 'Reference:
android.net.connectivity.com.android.internal.util.StateMachine'
04-06 19:51:53.991 F/dex2oat32( 542): method_verifier.cc:5125]
04-06 19:51:54.271 F/dex2oat32( 542): compiler_driver.cc:863] Had a hard failure
verifying all classes, and was asked to abort in such situations. Please check the
log.
04-06 19:51:54.307 E/odrefresh( 534): Compilation of system_server failed:
04-06 19:51:54.312 I/odrefresh( 531): odrefresh terminated by exit(81)
04-06 19:51:54.312 I/odsign ( 531): odrefresh compiled partial artifacts,
returned 81
04-06 19:51:54.312 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/cache-info.xml" to fs-verity...
04-06 19:51:54.313 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.313 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.314 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.330 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.330 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.331 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.348 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.357 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/boot.art" to fs-verity...
04-06 19:51:54.379 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.379 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.380 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.395 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.396 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.397 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.412 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.444 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/boot.oat" to fs-verity...
04-06 19:51:54.493 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.493 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.494 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.510 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.510 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.511 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.526 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.581 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/boot.vdex" to fs-verity...
04-06 19:51:54.584 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.584 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.584 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.600 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.601 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.602 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.617 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.621 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected].
[email protected]" to fs-verity...
04-06 19:51:54.622 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.622 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.622 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.638 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.639 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.640 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.655 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.680 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected].
[email protected]" to fs-verity...
04-06 19:51:54.681 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.681 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.681 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.697 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.697 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.698 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.713 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.716 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected].
[email protected]" to fs-verity...
04-06 19:51:54.717 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.717 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.717 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.733 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.733 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.734 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.749 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.763 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]
@classes.art" to fs-verity...
04-06 19:51:54.764 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.764 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.764 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.780 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.781 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.781 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:54.797 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:54.799 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]
@classes.odex" to fs-verity...
04-06 19:51:54.969 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.969 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:54.969 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:54.985 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:54.986 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:54.987 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.002 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.283 D/io_stats( 366): !@ 179,0 r 39685 1099867 w 6538 736564 d 858
4472864 f 0 0 iot 20860 0 th 0 0 0 pt 0 inp 0 15 29.460
04-06 19:51:55.500 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]
@classes.vdex" to fs-verity...
04-06 19:51:55.502 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.502 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.502 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.518 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.518 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.519 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.535 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.541 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@ethernet-
[email protected]" to fs-verity...
04-06 19:51:55.542 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.542 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.542 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.558 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.558 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.559 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.574 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.577 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@ethernet-
[email protected]" to fs-verity...
04-06 19:51:55.578 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.579 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.579 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.595 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.595 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.596 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.611 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.617 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@ethernet-
[email protected]" to fs-verity...
04-06 19:51:55.618 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.618 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.618 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.634 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.635 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.636 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.651 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.653 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@cla
sses.art" to fs-verity...
04-06 19:51:55.654 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.655 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.655 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.671 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.671 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.672 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.687 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.694 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@cla
sses.odex" to fs-verity...
04-06 19:51:55.696 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.696 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.696 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.712 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.713 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.714 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.729 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.732 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@[email protected]@cla
sses.vdex" to fs-verity...
04-06 19:51:55.733 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.733 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.733 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.749 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.750 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.750 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.766 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.773 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@semwifi-
[email protected]" to fs-verity...
04-06 19:51:55.774 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.774 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.774 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.790 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.791 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.792 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.807 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.809 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@semwifi-
[email protected]" to fs-verity...
04-06 19:51:55.822 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.822 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.823 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.839 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.839 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.840 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.855 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.896 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/system@framework@semwifi-
[email protected]" to fs-verity...
04-06 19:51:55.897 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.897 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.897 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.913 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.914 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.915 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.930 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.932 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.art" to fs-verity...
04-06 19:51:55.933 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.933 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:55.934 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:55.950 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:55.950 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:55.951 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:55.969 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:55.991 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.odex" to fs-verity...
04-06 19:51:56.001 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.001 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.001 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.017 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.017 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.018 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.033 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.043 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.vdex" to fs-verity...
04-06 19:51:56.044 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.044 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.044 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.060 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.061 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.062 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.077 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.091 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib@
[email protected]" to fs-verity...
04-06 19:51:56.092 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.092 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.093 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.109 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.109 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.110 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.125 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.127 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib@
[email protected]" to fs-verity...
04-06 19:51:56.128 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.128 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.129 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.144 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.145 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.146 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.161 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.169 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javalib@
[email protected]" to fs-verity...
04-06 19:51:56.170 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.170 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.171 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.186 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.187 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.188 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.203 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.204 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javali
[email protected]@classes.art" to fs-verity...
04-06 19:51:56.205 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.206 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.206 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.222 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.222 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.223 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.238 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.245 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javali
[email protected]@classes.odex" to fs-verity...
04-06 19:51:56.246 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.246 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.246 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.262 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.262 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.263 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.278 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.281 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@javali
[email protected]@classes.vdex" to fs-verity...
04-06 19:51:56.282 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.282 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.282 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.298 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.298 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.301 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.316 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.321 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.art" to fs-verity...
04-06 19:51:56.322 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.322 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.323 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.338 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.339 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.340 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.355 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.357 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.odex" to fs-verity...
04-06 19:51:56.360 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.360 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.361 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.376 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.377 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.378 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.393 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.401 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.vdex" to fs-verity...
04-06 19:51:56.402 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.402 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.402 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.418 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.418 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.419 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.434 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.436 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@
[email protected]@classes.art" to fs-verity...
04-06 19:51:56.437 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.437 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.438 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.454 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.454 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.455 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.470 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.476 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@
[email protected]@classes.odex" to fs-verity...
04-06 19:51:56.478 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.479 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.479 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.495 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.495 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.496 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.511 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.514 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@
[email protected]@classes.vdex" to fs-verity...
04-06 19:51:56.515 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.515 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.516 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.531 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.532 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.533 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.548 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.551 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]
l@[email protected]@classes.art" to fs-verity...
04-06 19:51:56.552 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.552 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.552 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.568 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.568 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.569 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.584 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.586 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]
l@[email protected]@classes.odex" to fs-verity...
04-06 19:51:56.587 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.587 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.588 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.604 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.604 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.605 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.620 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.624 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]
l@[email protected]@classes.vdex" to fs-verity...
04-06 19:51:56.625 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.625 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.626 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.641 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.642 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.643 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.658 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.660 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.art" to fs-verity...
04-06 19:51:56.661 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.661 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.661 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.677 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.677 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.678 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.693 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.695 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.odex" to fs-verity...
04-06 19:51:56.697 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.697 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.697 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.713 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.713 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.714 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.729 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.731 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@ja
[email protected]@classes.vdex" to fs-verity...
04-06 19:51:56.732 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.732 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.733 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.749 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.749 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.750 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.765 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.769 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.art" to fs-verity...
04-06 19:51:56.770 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.770 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.771 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.786 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.787 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.788 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.803 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.805 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.odex" to fs-verity...
04-06 19:51:56.806 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.806 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.806 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.822 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.823 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.824 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.839 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.845 I/odsign ( 531): Adding
"/data/misc/apexdata/com.android.art/dalvik-cache/arm/[email protected]@j
[email protected]@classes.vdex" to fs-verity...
04-06 19:51:56.847 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.847 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.847 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.863 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.863 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.864 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.879 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.883 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.883 I/keystore2( 379): keystore2::boot_level_keys: In
level_accessible: (30, 30), valid: true
04-06 19:51:56.884 W/keymint_tee( 380): [WRN]begin req PARAMS: A1, D4, PD5,
04-06 19:51:56.899 D/android.hardware.security.keymint-service( 380): begin: ret 0
04-06 19:51:56.900 I/keystore2( 379): keystore2::security_level: In
create_operation. Success to create IKeystoreOperation. 0, None
04-06 19:51:56.901 D/android.hardware.security.keymint-service( 380): update: ret
0
04-06 19:51:56.917 D/android.hardware.security.keymint-service( 380): finish: ret
0
04-06 19:51:56.918 I/odsign ( 531): On-device signing done.
04-06 19:51:56.939 I/keystore2( 379): keystore2::super_key: keystore.boot_level
1000000000 hits maximum 1000000000, finishing.
04-06 19:51:57.005 I/tzdatacheck( 553): timezone distro dir
/data/misc/zoneinfo/current does not exist. No action required.
04-06 19:51:57.026 I/auditd ( 554): Starting up
04-06 19:51:57.027 I/auditd ( 554): Start at vold.decrypt: none,
ro.crypto.state : encrypted, ro.crypto.type : file
04-06 19:51:57.032 E/auditd ( 554): SELinux: [audit_filter] parsing error.
auditfilter fsck dm_device:blk_file ioctl 0x301;
04-06 19:51:57.032 E/auditd ( 554): is skipped.
04-06 19:51:57.032 E/auditd ( 554): SELinux: [audit_filter] audit_filter_table
is created successfully. filter table line count = 1223 / rule count(atomic) = 534
04-06 19:51:57.036 I/audit_log( 554): Previous audit logfile detected, rotating
04-06 19:51:57.044 E/audit ( 554): type=1403 audit(1680821488.187:11):
auid=4294967295 ses=4294967295 lsm=selinux res=1
04-06 19:51:57.044 E/audit ( 554): type=1300 audit(1680821488.187:11):
arch=40000028 syscall=4 per=8 success=yes exit=1141907 a0=5 a1=f68bf8c0 a2=116c93
a3=ffffffff items=0 ppid=0 pid=1 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0
egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="init" exe="/system/bin/init"
subj=u:r:kernel:s0 key=(null)
04-06 19:51:57.044 E/audit ( 554): type=1327 audit(1680821488.187:11):
proctitle=2F73797374656D2F62696E2F696E69740073656C696E75785F7365747570
04-06 19:51:57.045 E/audit ( 554): type=1404 audit(1680821488.383:12):
enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1
lsm=selinux res=1
04-06 19:51:57.045 E/audit ( 554): type=1300 audit(1680821488.383:12):
arch=40000028 syscall=4 per=8 success=yes exit=1 a0=5 a1=ffa7afa8 a2=1 a3=14
items=0 ppid=0 pid=1 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="init" exe="/system/bin/init"
subj=u:r:kernel:s0 key=(null)
04-06 19:51:57.045 E/audit ( 554): type=1327 audit(1680821488.383:12):
proctitle=2F73797374656D2F62696E2F696E69740073656C696E75785F7365747570
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.635:13): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop16"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.635:14): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop17"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.635:15): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop18"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.639:16): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop19"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.639:17): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop20"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.639:18): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop21"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.639:19): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop22"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.659:20): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop23"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.663:21): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop24"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.663:22): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop25"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.663:23): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop26"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.663:24): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop27"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.663:25): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop28"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.045 E/audit ( 554): type=1400 audit(1680821489.663:26): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop29"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.663:27): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop30"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.667:28): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop31"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.667:29): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop32"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.667:30): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop33"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.667:31): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop34"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.667:32): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop35"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.667:33): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop36"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.671:34): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop37"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.671:35): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop38"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.671:36): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop39"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.671:37): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop40"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.671:38): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop41"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.699:39): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop42"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.699:40): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop43"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821489.699:41): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop44"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1400 audit(1680821491.063:42): avc:
denied { read } for pid=293 comm="init" name="u:object_r:vendor_softdog_prop:s0"
dev="tmpfs" ino=7791 scontext=u:r:vendor_init:s0
tcontext=u:object_r:vendor_softdog_prop:s0 tclass=file permissive=0 SEPF_SM-
A135M_12_0001 audit_filtered
04-06 19:51:57.046 E/audit ( 554): type=1300 audit(1680821491.063:42):
arch=40000028 syscall=322 per=8 success=yes exit=4294967283 a0=ffffff9c a1=ffc181d8
a2=a8000 a3=0 items=1 ppid=1 pid=293 auid=4294967295 uid=0 gid=0 euid=0 suid=0
fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="init"
exe="/system/bin/init" subj=u:r:vendor_init:s0 key=(null)
04-06 19:51:57.046 E/audit ( 554): type=1302 audit(1680821491.063:42): item=0
name="/dev/__properties__/u:object_r:vendor_softdog_prop:s0" inode=7791 dev=00:10
mode=0100444 ouid=0 ogid=0 rdev=00:00 obj=u:object_r:vendor_softdog_prop:s0
nametype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0
04-06 19:51:57.047 E/audit ( 554): type=1327 audit(1680821491.063:42):
proctitle=2F73797374656D2F62696E2F696E697400737562636F6E7465787400753A723A76656E646
F725F696E69743A7330003135
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821491.831:43): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="dm-10" scontext=u:r:kernel:s0
tcontext=u:object_r:device:s0 tclass=blk_file permissive=0 SEPF_SM-A135M_12_0001
audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.691:44): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop45"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.691:45): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop46"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.691:46): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop47"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.691:47): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop48"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.695:48): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop49"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.695:49): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop50"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.695:50): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop51"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.695:51): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop52"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.699:52): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop53"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.699:53): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop54"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1400 audit(1680821508.699:54): avc:
denied { create } for pid=60 comm="kdevtmpfs" name="loop55"
scontext=u:r:kernel:s0 tcontext=u:object_r:device:s0 tclass=blk_file permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.047 E/audit ( 554): type=1305 audit(1680821517.031:81):
audit_pid=554 old=0 auid=4294967295 ses=4294967295 subj=u:r:auditd:s0 res=1
04-06 19:51:57.047 E/audit ( 554): type=1305 audit(1680821517.031:82):
audit_rate_limit=20 old=0 auid=4294967295 ses=4294967295 subj=u:r:auditd:s0 res=1
04-06 19:51:57.238 E/audit ( 554): type=1400 audit(1680821517.231:83): avc:
denied { transition } for pid=556 comm="init" path="/system/bin/sh" dev="dm-4"
ino=1200 scontext=u:r:init:s0 tcontext=u:r:su:s0 tclass=process permissive=0
SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.238 E/audit ( 554): type=1300 audit(1680821517.231:83):
arch=40000028 syscall=11 per=8 success=yes exit=4294967283 a0=f776a470 a1=f777e5e0
a2=f7773ff0 a3=10 items=1 ppid=1 pid=556 auid=4294967295 uid=1000 gid=1000
euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none)
ses=4294967295 comm="init" exe="/system/bin/init" subj=u:r:init:s0 key=(null)
04-06 19:51:57.238 E/audit ( 554): type=1302 audit(1680821517.231:83): item=0
name="/system/bin/sh" inode=1200 dev=fd:04 mode=0100755 ouid=0 ogid=2000 rdev=00:00
obj=u:object_r:shell_exec:s0 nametype=NORMAL cap_fp=0000000000000000
cap_fi=0000000000000000 cap_fe=0 cap_fver=0
04-06 19:51:57.238 E/audit ( 554): type=1327 audit(1680821517.231:83):
proctitle=2F73797374656D2F62696E2F696E6974007365636F6E645F7374616765
04-06 19:51:57.264 E/audit ( 554): type=1400 audit(1680821517.259:84): avc:
denied { create } for pid=293 comm="init" name="exynos"
scontext=u:r:vendor_init:s0 tcontext=u:object_r:system_data_file:s0 tclass=dir
permissive=0 SEPF_SM-A135M_12_0001 audit_filtered
04-06 19:51:57.264 E/audit ( 554): type=1300 audit(1680821517.259:84):
arch=40000028 syscall=323 per=8 success=yes exit=4294967283 a0=ffffff9c a1=f7a844a0
a2=1f9 a3=3 items=2 ppid=1 pid=293 auid=4294967295 uid=0 gid=0 euid=0 suid=0
fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="init"
exe="/system/bin/init" subj=u:r:vendor_init:s0 key=(null)
04-06 19:51:57.264 E/audit ( 554): type=1302 audit(1680821517.259:84): item=0
name="/data/" inode=3 dev=fd:0a mode=040771 ouid=1000 ogid=1000 rdev=00:00
obj=u:object_r:system_data_root_file:s0 nametype=PARENT cap_fp=0000000000000000
cap_fi=0000000000000000 cap_fe=0 cap_fver=0
04-06 19:51:57.264 E/audit ( 554): type=1302 audit(1680821517.259:84): item=1
name="/data/exynos" nametype=CREATE cap_fp=0000000000000000 cap_fi=0000000000000000
cap_fe=0 cap_fver=0
04-06 19:51:57.264 E/audit ( 554): type=1327 audit(1680821517.259:84):
proctitle=2F73797374656D2F62696E2F696E697400737562636F6E7465787400753A723A76656E646
F725F696E69743A7330003135
04-06 19:51:57.284 D/io_stats( 366): !@ 179,0 r 39906 1101567 w 6926 750892 d 2194
4495224 f 0 0 iot 21772 0 th 0 0 0 pt 0 inp 0 1 31.461
04-06 19:51:57.322 I/CASS_DEBUG( 557): Start Service... CASS v1.6.5
04-06 19:51:57.322 I/engmode_binder_server( 558): EngineeringMode version =
30.4.01
04-06 19:51:57.322 I/engmode_binder_server( 558): firing up.
EngineeringModeHandler.
04-06 19:51:57.322 D/ProcessState( 558): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:57.323 I/engmode_binder_server( 558): EngineeringModeHandler Service
instantiate()
04-06 19:51:57.323 I/engmode_binder_server( 558): EngineeringModeHandler created
04-06 19:51:57.325 I/engmode_steady( 558): read from steady(69632)
04-06 19:51:57.325 I/engmode_tlc( 558): EM version = 30.4.01
04-06 19:51:57.325 I/engmode_tlc( 558): EM C/C : 0000c021/00000000
04-06 19:51:57.326 I/engmode_tlc( 558): TA Thread is running(4080001504/0)
04-06 19:51:57.326 I/engmode_tlc( 558): em_tlc_send_teegris : No session..
04-06 19:51:57.326 I/engmode_tlc( 558): em_tlc_send_teegris : Try initialize
context..
04-06 19:51:57.327 I/engmode_tlc( 558): em_tlc_send_teegris : Initilize Context
Done..
04-06 19:51:57.337 I/engmode_tlc( 558): em_tlc_send_teegris : OpenSession Done..
04-06 19:51:57.338 I/engmode_tlc( 558): em_tlc_send_teegris : Allocate
SharedMemory(req_buf) Done..
04-06 19:51:57.338 I/engmode_tlc( 558): em_tlc_send_teegris : Allocate
SharedMemory(rsp_buf) Done..
04-06 19:51:57.340 I/engmode_tlc( 558): em_tlc_send_teegris : Invoke Command
Done..(0x00000000)
04-06 19:51:57.340 I/engmode_tlc( 558): em_tlc_send_teegris : Release
SharedMemory(req_buf) Done..
04-06 19:51:57.340 I/engmode_tlc( 558): em_tlc_send_teegris : Release
SharedMemory(rsp_buf) Done..
04-06 19:51:57.341 I/engmode_tlc( 558): em_tlc_teegris_clear : Close Session
Done..
04-06 19:51:57.342 I/engmode_tlc( 558): em_tlc_teegris_clear : Finalize Context
Done..
04-06 19:51:57.342 I/engmode_tlc( 558): Nwd api = 0x00000000, Swd internal =
0xf02d0010
04-06 19:51:57.342 I/engmode_tlc( 558): Wait kill signal
04-06 19:51:57.376 I/engmode_tlc( 558): TA reply response, pass waiting
04-06 19:51:57.376 I/engmode_tlc( 558): Done waiting thread(isTimeOut:FALSE)
04-06 19:51:57.376 I/engmode_tlc( 558): em tlc send result 0x00000000
04-06 19:51:57.376 I/engmode_tlc( 558): kill thread (4080001504)
04-06 19:51:57.376 I/engmode_tlc( 558): Got signal 10, tid: 4080001504
04-06 19:51:57.376 I/engmode_tlc( 558): tlc thr cleanup
04-06 19:51:57.376 E/engmode_world( 558): Failed to init core(0xf02d0010)
04-06 19:51:57.378 I/engmode_steady( 558): read from steady(11264)
04-06 19:51:57.378 I/engmode_tlc( 558): EM version = 30.4.01
04-06 19:51:57.378 I/engmode_tlc( 558): EM C/C : 0000c019/00000001
04-06 19:51:57.378 I/engmode_tlc( 558): TA Thread is running(4080001504/0)
04-06 19:51:57.378 I/engmode_tlc( 558): em_tlc_send_teegris : No session..
04-06 19:51:57.378 I/engmode_tlc( 558): em_tlc_send_teegris : Try initialize
context..
04-06 19:51:57.379 I/engmode_tlc( 558): em_tlc_send_teegris : Initilize Context
Done..
04-06 19:51:57.387 I/engmode_tlc( 558): em_tlc_send_teegris : OpenSession Done..
04-06 19:51:57.387 I/engmode_tlc( 558): em_tlc_send_teegris : Allocate
SharedMemory(req_buf) Done..
04-06 19:51:57.388 I/engmode_tlc( 558): em_tlc_send_teegris : Allocate
SharedMemory(rsp_buf) Done..
04-06 19:51:57.400 I/engmode_tlc( 558): em_tlc_send_teegris : Invoke Command
Done..(0x00000000)
04-06 19:51:57.400 I/engmode_tlc( 558): em_tlc_send_teegris : Release
SharedMemory(req_buf) Done..
04-06 19:51:57.401 I/engmode_tlc( 558): em_tlc_send_teegris : Release
SharedMemory(rsp_buf) Done..
04-06 19:51:57.402 I/engmode_tlc( 558): em_tlc_teegris_clear : Close Session
Done..
04-06 19:51:57.402 I/engmode_tlc( 558): em_tlc_teegris_clear : Finalize Context
Done..
04-06 19:51:57.402 I/engmode_tlc( 558): Nwd api = 0x00000000, Swd internal =
0x00000000
04-06 19:51:57.402 I/engmode_tlc( 558): Wait kill signal
04-06 19:51:57.417 I/flags_health_check( 563): ServerConfigurableFlagsReset
reset_mode value: 0
04-06 19:51:57.417 I/flags_health_check( 563): ServerConfigurableFlagsReset
attempted boot count is under threshold, skipping reset.
04-06 19:51:57.428 I/engmode_tlc( 558): TA reply response, pass waiting
04-06 19:51:57.428 I/engmode_tlc( 558): Done waiting thread(isTimeOut:FALSE)
04-06 19:51:57.428 I/engmode_tlc( 558): em tlc send result 0x00000000
04-06 19:51:57.428 I/engmode_tlc( 558): kill thread (4080001504)
04-06 19:51:57.428 I/engmode_tlc( 558): Got signal 10, tid: 4080001504
04-06 19:51:57.428 I/engmode_tlc( 558): tlc thr cleanup
04-06 19:51:57.431 I/engmode_steady( 558): read from steady(11264)
04-06 19:51:57.432 I/engmode_steady( 558): read from steady(69632)
04-06 19:51:57.432 I/engmode_world( 558): No server time
04-06 19:51:57.432 I/engmode_tlc( 558): EM version = 30.4.01
04-06 19:51:57.432 I/engmode_tlc( 558): EM C/C : 0000c003/00000002
04-06 19:51:57.432 I/engmode_tlc( 558): TA Thread is running(4080001504/0)
04-06 19:51:57.432 I/engmode_tlc( 558): em_tlc_send_teegris : No session..
04-06 19:51:57.432 I/engmode_tlc( 558): em_tlc_send_teegris : Try initialize
context..
04-06 19:51:57.433 I/engmode_tlc( 558): em_tlc_send_teegris : Initilize Context
Done..
04-06 19:51:57.441 I/engmode_tlc( 558): em_tlc_send_teegris : OpenSession Done..
04-06 19:51:57.441 I/engmode_tlc( 558): em_tlc_send_teegris : Allocate
SharedMemory(req_buf) Done..
04-06 19:51:57.442 I/engmode_tlc( 558): em_tlc_send_teegris : Allocate
SharedMemory(rsp_buf) Done..
04-06 19:51:57.444 I/engmode_tlc( 558): em_tlc_send_teegris : Invoke Command
Done..(0x00000000)
04-06 19:51:57.444 I/engmode_tlc( 558): em_tlc_send_teegris : Release
SharedMemory(req_buf) Done..
04-06 19:51:57.444 I/engmode_tlc( 558): em_tlc_send_teegris : Release
SharedMemory(rsp_buf) Done..
04-06 19:51:57.445 I/engmode_tlc( 558): em_tlc_teegris_clear : Close Session
Done..
04-06 19:51:57.445 E/scs ( 564): [main] scs running state 1
04-06 19:51:57.445 I/engmode_tlc( 558): em_tlc_teegris_clear : Finalize Context
Done..
04-06 19:51:57.445 I/engmode_tlc( 558): Nwd api = 0x00000000, Swd internal =
0xf02d0010
04-06 19:51:57.445 I/engmode_tlc( 558): Wait kill signal
04-06 19:51:57.445 D/scs ( 564): bUseSecPartition : true
04-06 19:51:57.447 D/scs ( 564): [getValuesFromFile] getValuesFromFile : CTI
04-06 19:51:57.447 D/scs ( 564): [amendSalesCode] salesCode : CTI
04-06 19:51:57.447 D/scs ( 564): [amendSalesCode] salesCode length : 3
04-06 19:51:57.447 D/scs ( 564): [amendSalesCode] mainPath:
/prism/etc/carriers
04-06 19:51:57.447 D/scs ( 564): [initData] SALES_CODE : CTI
04-06 19:51:57.448 D/scs ( 564): [getValuesFromFile] getValuesFromFile : CTI
04-06 19:51:57.448 D/scs ( 564): [amendOmcNwCode] SALES_CODE is single.
OMCNW_CODE should be the same
04-06 19:51:57.449 D/scs ( 564): [parseOmcData]netbased_code ARO
04-06 19:51:57.449 D/scs ( 564): [initData]SALES_CODE : CTI
04-06 19:51:57.449 D/scs ( 564): [initData]OMC_PATH :
/optics/configs/carriers/single/CTI/conf
04-06 19:51:57.449 D/scs ( 564): [initData]OMCNW_CODE : CTI
04-06 19:51:57.449 D/scs ( 564): [initData]OMCNW_PATH :
/optics/configs/carriers/single/CTI/conf
04-06 19:51:57.449 D/scs ( 564): [initData]OMC_RES_PATH : /omr/res
04-06 19:51:57.449 D/scs ( 564): [initData]OMC_ETC_PATH :
/prism/etc/carriers/single/CTI
04-06 19:51:57.449 D/scs ( 564): [initData]TSS_TYPE : NETBASED
04-06 19:51:57.449 E/scs ( 564): [startScsState] start scs running(1)
04-06 19:51:57.449 D/scs ( 564): [setDmRwProperties] persist : true
04-06 19:51:57.451 D/scs ( 564): [makeFirstBootCompletedFlag] firstBootCheck
file is created : A135MOWO2AVK2
04-06 19:51:57.452 D/scs ( 564): [setCustomerLocale] customer filepath :
/optics/configs/carriers/single/CTI/conf/customer.xml
04-06 19:51:57.453 D/scs ( 564): [setConvertLocale] pLocation is spanish_latin
04-06 19:51:57.453 D/scs ( 564): [setConvertLocale] convertLocaleFilePath
/system/etc/convert_locale_data.json
04-06 19:51:57.454 D/scs ( 564): [setConvertLocale] convertLocaleValue
spanish_latin
04-06 19:51:57.454 D/scs ( 564): [setConvertLocale] persist.sys.locale : es-US
04-06 19:51:57.454 D/scs ( 564): [setConvertLocale] locale property set
04-06 19:51:57.455 D/scs ( 564): [setCustomerLocale] pLocation:spanish_latin
04-06 19:51:57.463 D/scs ( 564): [setCarrierIdPath]Carrerid etc path : ARO
04-06 19:51:57.464 E/scs ( 564): [setDmRwProperties] persist properties set :
True
04-06 19:51:57.464 D/scs ( 564): [setScsRunningState] setScsRunningState : 2
04-06 19:51:57.465 E/scs ( 564): [startScsState] start scs running(2)
04-06 19:51:57.465 D/scs ( 564): [setTssCheckFlag]setTssCheckedFlag : 0
04-06 19:51:57.465 D/scs ( 564): [setTssCheckFlag]mdc.scs.tss_checked: 0
04-06 19:51:57.465 D/scs ( 564): [setActivatedId]singlesku is true
04-06 19:51:57.466 I/Vaultkeeper_MGR_system( 564): Got instance of
VaultKeeperManager
04-06 19:51:57.466 D/hw-ProcessState( 564): Binder ioctl to enable oneway spam
detection failed: Invalid argument
04-06 19:51:57.467 I/Vaultkeeper_MGR_system( 564): Got service of ISehVaultKeeper
04-06 19:51:57.468 I/VaultKeeper_HIDL_Service( 407): System client (//0/564)
04-06 19:51:57.468 I/VaultKeeper_COMMON( 406): VK 4.3.0 [Client] /system/bin/scs.
=> [Vault] AID. [CMD NO.] 1295
04-06 19:51:57.468 I/VaultKeeper_COMMON( 406): [CMD:CHECK_CLIENT_REGISTERED]
04-06 19:51:57.469 I/vaultkeeper( 406): runCommand Success.(TA ret = 0)
04-06 19:51:57.469 I/VaultKeeper_COMMON( 406): VK 4.3.0 [Client] /system/bin/scs.
=> [Vault] AID. [CMD NO.] 4626
04-06 19:51:57.469 I/VaultKeeper_COMMON( 406): [CMD:READ_UNSHELTERED]
04-06 19:51:57.482 I/engmode_tlc( 558): TA reply response, pass waiting
04-06 19:51:57.482 I/engmode_tlc( 558): Done waiting thread(isTimeOut:FALSE)
04-06 19:51:57.482 I/engmode_tlc( 558): em tlc send result 0x00000000
04-06 19:51:57.482 I/engmode_tlc( 558): kill thread (4080001504)
04-06 19:51:57.483 I/engmode_tlc( 558): Got signal 10, tid: 4080001504
04-06 19:51:57.483 I/engmode_tlc( 558): tlc thr cleanup
04-06 19:51:57.483 E/engmode_world( 558): Failed emIsTokenInstalled(0xf02d0010)
04-06 19:51:57.483 I/engmode_binder_server( 558): VERSION = 20/0xf02d0010
04-06 19:51:57.483 I/engmode_cache_list( 558): clist created(20)
04-06 19:51:57.483 I/engmode_cp_watcher( 558): Successfully create thread(0)
04-06 19:51:57.484 E/engmode_cp_watcher( 558): Failed to Connect_RILD, ret : 4
04-06 19:51:57.484 I/vndservicemanager( 333): Adding 'u:r:emservice:s0' service
(EngineeringModeService:558)
04-06 19:51:57.484 I/engmode_binder_server( 558): EngineeringModeHandlerService =
0
04-06 19:51:57.484 I/engmode_binder_server( 558): EngineeringModeHandler is now
ready
04-06 19:51:57.504 I/vaultkeeper( 406): runCommand Success.(TA ret = 0)
04-06 19:51:57.504 D/scs ( 564): [setActivatedId]check VaultKeeperManager read
result : 0
04-06 19:51:57.504 D/scs ( 564): [setActivatedId]set Activated ID : CTI
04-06 19:51:57.504 D/scs ( 564): [setActivatedId]set Activated ID
04-06 19:51:57.506 D/scs ( 564): [setActivatedId]sales code to activatedid
04-06 19:51:57.506 D/scs ( 564): [setActivatedId]set mdc.singlesku.activated :
true
04-06 19:51:57.507 D/scs ( 564): [setTssCheckFlag]setTssCheckedFlag : 1
04-06 19:51:57.507 D/scs ( 564): [setTssCheckFlag]mdc.scs.tss_checked: 1
04-06 19:51:57.507 E/scs ( 564): [setTssProperties]mdc.scs.tss_checked : 1
04-06 19:51:57.507 D/scs ( 564): [setScsRunningState] setScsRunningState : 3
04-06 19:51:57.507 E/scs ( 564): [startScsState] start scs running(3)
04-06 19:51:57.507 D/scs ( 564): [setRsProperties]setRsProperties
04-06 19:51:57.508 D/SecNativeFeatureCppIf( 564): encoded
04-06 19:51:57.508 D/SecNativeFeatureCppIf( 564): decoding and unzip finish
04-06 19:51:57.508 D/SecNativeFeatureCppIf( 564): use unCompDataBuff. encoded
04-06 19:51:57.508 D/SecNativeFeatureCppIf( 564): Free unCompDataBuff
04-06 19:51:57.508 D/scs ( 564): [setGmsProperty]setGmsProperty()
04-06 19:51:57.508 D/scs ( 564): [setGmsProperty]propBootReferenceId is set as
carrierId : ARO
04-06 19:51:57.510 D/scs ( 564): [isConfigEncoded] isConfigEncoded() :
/optics/configs/carriers/single/ARO/conf/system/cscfeature.xml
04-06 19:51:57.510 D/scs ( 564): [isConfigEncoded] isConfigEncoded() : true
04-06 19:51:57.510 D/scs ( 564): [setGmsProperty]Set GMS Client ID based on
ReferenceId ARO
04-06 19:51:57.510 D/scs ( 564): Xml is Encoded? 1
04-06 19:51:57.510 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.am
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.gmm
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.ms
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.yt
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.wal
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.cr
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.vs
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.pg
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.com.google.clientidbase.tx
04-06 19:51:57.511 D/scs ( 564): [setStsProperty]setStsProperty()
04-06 19:51:57.511 D/scs ( 564): [isConfigEncoded] isConfigEncoded() :
/optics/configs/carriers/single/CTI/conf/system/cscfeature.xml
04-06 19:51:57.511 D/scs ( 564): [isConfigEncoded] isConfigEncoded() : true
04-06 19:51:57.511 D/scs ( 564): [setStsProperty]Set STS property based on
CarrierId CTI
04-06 19:51:57.511 D/scs ( 564): Xml is Encoded? 1
04-06 19:51:57.511 D/scs ( 564): [setPropertyFromData]Failed to set
ro.sts.property
04-06 19:51:57.512 D/scs ( 564): [setFacebookProperty]setFacebookProperty()
04-06 19:51:57.512 D/scs ( 564): [setFacebookProperty]bSupportTss is true
04-06 19:51:57.512 D/scs ( 564): [setFacebookProperty]set partnerid from
activatedid
04-06 19:51:57.512 D/scs ( 564): [setFacebookProperty]Read OMC_B2B_FILE,
Change the path to B2C from B2B
04-06 19:51:57.513 D/scs ( 564): [setFacebookProperty]propCarrierId:CTI szB2C:
04-06 19:51:57.514 D/scs ( 564): [setFacebookProperty]conffilePath
:/prism/etc/carriers/single/CTI/appmanager.conf
04-06 19:51:57.515 D/scs ( 564): [setPropertyFromData]Set
ro.csc.facebook.partnerid : americamovil:5694bbfe-ff8b-4ea6-a106-e3e93b21c647
04-06 19:51:57.515 D/scs ( 564): [setAmazoneProperty]setAmazoneProperty()
04-06 19:51:57.515 D/scs ( 564): [setAmazoneProperty]bSupportTss is true
04-06 19:51:57.515 D/scs ( 564): [setAmazoneProperty]bootCarrierId:CTI
04-06 19:51:57.515 D/scs ( 564): [setAmazoneProperty]Amazon Config:
/system/etc/amzpartnerid.conf
04-06 19:51:57.515 D/scs ( 564): [setAmazoneProperty]Device doesn't have
Amazon conf corresponding to CTI
04-06 19:51:57.515 D/scs ( 564): [setSpotifyProperty]setSpotifyProperty
04-06 19:51:57.516 D/scs ( 564): [setSpotifyProperty]find logic start
04-06 19:51:57.516 D/scs ( 564): [setSpotifyProperty]logic : 1
04-06 19:51:57.516 D/scs ( 564): [setSpotifyProperty]find logic end
04-06 19:51:57.516 D/scs ( 564): [setSpotifyProperty]bSupportTss is true
04-06 19:51:57.516 D/scs ( 564): [setSpotifyProperty]setSpotifyProperty
country:AR
04-06 19:51:57.516 D/scs ( 564): [setSpotifyProperty]setSpotifyProperty
carrier:CTI
04-06 19:51:57.516 D/scs ( 564): [setSpotifyProperty]bootCarrierId:CTI
04-06 19:51:57.516 D/scs ( 564):
[setSpotifyProperty]conffilePath1:/prism/etc/carriers/CTI/spotify.preload
04-06 19:51:57.516 D/scs ( 564):
[setSpotifyProperty]conffilePath1:/prism/etc/carriers/single/CTI/spotify.preload
04-06 19:51:57.516 D/scs ( 564):
[setSpotifyProperty]conffilePath1:/system/etc/spotify.preload
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]spotify.conf start
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]Matching Country : AR
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]Matching Exclusion
Carrier : CTI
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]preloadPartner : samsung-
mobile-preload
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]preloadReferrer :
samsung-mobile-preload
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]exceptionReferrer :
samsung-mobile-no-promotion
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]NO PRELOAD Spotify !!!
04-06 19:51:57.517 D/scs ( 564): [setSpotifyProperty]spotify.conf end
04-06 19:51:57.517 D/scs ( 564): [setOathProperty]setOathProperty
04-06 19:51:57.517 D/scs ( 564): [setOathProperty]bSupportTss is true
04-06 19:51:57.517 D/scs ( 564): [setOathProperty]set partnerid from
activatedid: CTI
04-06 19:51:57.517 D/scs ( 564): [setOathProperty]bootReferenceId:CTI
04-06 19:51:57.517 D/scs ( 564):
[setOathProperty]conffilePath:/prism/etc/carriers/CTI/oathpartnerid.conf
04-06 19:51:57.517 D/scs ( 564):
[setOathProperty]conffilePath:/prism/etc/carriers/single/CTI/oathpartnerid.conf
04-06 19:51:57.517 D/scs ( 564):
[setOathProperty]conffilePath:/system/etc/oathpartnerid.conf
04-06 19:51:57.517 D/scs ( 564): [setOathProperty]Device doesn't have OATH
conf(OATH config) corresponding to bootReferenceId CTI
04-06 19:51:57.517 D/scs ( 564): [setNetflixProperty]setNetflixProperty
04-06 19:51:57.517 D/scs ( 564): [setNetflixProperty]bSupportTss is true
04-06 19:51:57.517 D/scs ( 564): [setNetflixProperty]set partnerid from
activatedid
04-06 19:51:57.517 D/scs ( 564): [setNetflixProperty]Read OMC_B2B_FILE, Change
the path to B2C from B2B
04-06 19:51:57.518 D/scs ( 564): [setNetflixProperty]propCarrierId:CTI szB2C:
04-06 19:51:57.518 D/scs ( 564):
[setNetflixProperty]conffilePath:/system/etc/netflixchid.conf
04-06 19:51:57.518 D/scs ( 564): [setNetflixProperty]netflixchid.conf start
04-06 19:51:57.519 D/scs ( 564): [setNetflixProperty]NO netflix channel ID !!!
04-06 19:51:57.519 D/scs ( 564): [setLinkedinProperty]setLinkedinProperty
04-06 19:51:57.519 D/scs ( 564): [setLinkedinProperty]setLinkedinProperty
sales_code : CTI
04-06 19:51:57.519 D/scs ( 564): [setLinkedinProperty]conffilePath :
/system/etc/linkedin.conf
04-06 19:51:57.520 D/scs ( 564): [setLinkedinProperty]linkedin.conf start
04-06 19:51:57.520 D/scs ( 564): [setLinkedinProperty]NOT PRELOADED
Linkedin !!!
04-06 19:51:57.520 D/scs ( 564): [setLinkedinProperty]linkedin.conf end
04-06 19:51:57.520 D/scs ( 564): [setOfficeProperty]setOfficeProperty
04-06 19:51:57.520 D/scs ( 564): [setOfficeProperty]setOfficeProperty
sales_code : CTI
04-06 19:51:57.520 D/scs ( 564): [setOfficeProperty]conffilePath :
/system/etc/Office.conf
04-06 19:51:57.520 D/scs ( 564): [setOfficeProperty]office.conf start
04-06 19:51:57.521 D/scs ( 564): [setOfficeProperty]PRELOADED Office !!!
04-06 19:51:57.521 D/scs ( 564): [setOfficeProperty]office.conf end
04-06 19:51:57.522 D/scs ( 564):
[setPartnerIdProperties]setPartnerIdProperties : parsing is success
04-06 19:51:57.522 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/1mg.conf
04-06 19:51:57.522 D/scs ( 564): [setPropertiesFromConfFile]1mg.conf,
deviceTrackerId, NONE, ro.trackingId.1mg, NONE
04-06 19:51:57.522 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.522 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/bm.conf
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]bm.conf,
deviceTrackerId, NONE, ro.trackingId.com.epi, NONE
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/booking.conf
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]booking.conf,
deviceTrackerId, NONE, ro.trackingId.booking, NONE
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/foodpanda.conf
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]foodpanda.conf,
deviceTrackerId, NONE, ro.trackingId.com.global.foodpanda.android, NONE
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/ivi.conf
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]ivi.conf,
deviceTrackerId, NONE, ro.trackingId.ru.ivi.client, NONE
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/kaspersky.com.conf
04-06 19:51:57.523 D/scs ( 564):
[setPropertiesFromConfFile]kaspersky.com.conf, deviceTrackerId, NONE,
ro.trackingId.com.kms.free, NONE
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.523 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/lazada.conf
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]lazada.conf,
deviceTrackerId, deviceChannelId, ro.trackingId.lazada, ro.channelId.lazada
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/TikTok.conf
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]TikTok.conf,
deviceTrackerId, deviceChannelId, ro.trackingId.com.ss.android.ugc.trill,
ro.channelId.com.ss.android.ugc.trill
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/TikTok.conf
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]TikTok.conf,
deviceTrackerIdeu, deviceChannelIdeu, ro.trackingId.com.zhiliaoapp.musically,
ro.channelId.com.zhiliaoapp.musically
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/twitter.conf
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]twitter.conf,
deviceTrackerId, deviceChannelId, ro.trackingId.com.twitter,
ro.channelId.com.twitter
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/vng-test.conf
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]vng-test.conf,
deviceTrackerId, NONE, ro.trackingId.com.vng.zing.zdice, NONE
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/zalo.conf
04-06 19:51:57.524 D/scs ( 564): [setPropertiesFromConfFile]zalo.conf,
deviceTrackerId, NONE, ro.trackingId.com.zing.zalo, NONE
04-06 19:51:57.525 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.525 D/scs ( 564): [setPropertiesFromConfFile]setProperty:
/prism/etc/carriers/single/CTI/zmp3.conf
04-06 19:51:57.525 D/scs ( 564): [setPropertiesFromConfFile]zmp3.conf,
deviceTrackerId, NONE, ro.trackingId.com.zing.mp3, NONE
04-06 19:51:57.525 D/scs ( 564): [setPropertiesFromConfFile]there is no conf
or parsing fail
04-06 19:51:57.525 D/scs ( 564): [setScsRunningState] setScsRunningState : 4
04-06 19:51:57.526 E/scs ( 564): [startScsState] start scs running(4)
04-06 19:51:57.526 D/scs ( 564): [startScsState] stopped : done
04-06 19:51:57.569 D/LibBpfLoader( 568): Loading optional ELF object
/apex/com.android.tethering/etc/bpf/test.o with license Apache 2.0
04-06 19:51:57.570 I/LibBpfLoader( 568): Section bpfloader_min_ver value is 2
[0x2]
04-06 19:51:57.570 I/LibBpfLoader( 568): Section bpfloader_max_ver value is 25
[0x19]
04-06 19:51:57.570 I/LibBpfLoader( 568): Section size_of_bpf_map_def value is 120
[0x78]
04-06 19:51:57.570 I/LibBpfLoader( 568): Section size_of_bpf_prog_def value is 92
[0x5c]
04-06 19:51:57.570 I/LibBpfLoader( 568): BpfLoader version 0x00002 processing ELF
object /apex/com.android.tethering/etc/bpf/test.o with ver [0x00002,0x00019)
04-06 19:51:57.571 D/LibBpfLoader( 568): Loaded code section 3
(xdp_drop_ipv4_udp_ether)
04-06 19:51:57.572 D/LibBpfLoader( 568): Adding section 3 to cs list
04-06 19:51:57.573 D/LibBpfLoader( 568): bpf_create_map name
tether_downstream6_map, ret: 7
04-06 19:51:57.573 D/LibBpfLoader( 568): bpf_create_map name bitmap, ret: 8
04-06 19:51:57.573 D/LibBpfLoader( 568): map_fd found at 0 is 7 in
/apex/com.android.tethering/etc/bpf/test.o
04-06 19:51:57.573 D/LibBpfLoader( 568): map_fd found at 1 is 8 in
/apex/com.android.tethering/etc/bpf/test.o
04-06 19:51:57.574 D/LibBpfLoader( 568): cs[0].name:xdp_drop_ipv4_udp_ether
min_kver:5090000 .max_kver:ffffffff (kvers:41300c6)
04-06 19:51:57.574 I/bpfloader( 568): Loaded object:
/apex/com.android.tethering/etc/bpf/test.o
04-06 19:51:57.577 D/LibBpfLoader( 568): Loading critical for Connectivity
(Tethering) ELF object /apex/com.android.tethering/etc/bpf/offload.o with license
Apache 2.0
04-06 19:51:57.577 I/LibBpfLoader( 568): Section bpfloader_min_ver value is 2
[0x2]
04-06 19:51:57.577 I/LibBpfLoader( 568): Section bpfloader_max_ver value is 25
[0x19]
04-06 19:51:57.577 I/LibBpfLoader( 568): Section size_of_bpf_map_def value is 120
[0x78]
04-06 19:51:57.577 I/LibBpfLoader( 568): Section size_of_bpf_prog_def value is 92
[0x5c]
04-06 19:51:57.577 I/LibBpfLoader( 568): BpfLoader version 0x00002 processing ELF
object /apex/com.android.tethering/etc/bpf/offload.o with ver [0x00002,0x00019)
04-06 19:51:57.583 D/LibBpfLoader( 568): Loaded code section 3
(schedcls_tether_downstream6_ether)
04-06 19:51:57.585 D/LibBpfLoader( 568): Loaded relo section 3
(.relschedcls/tether_downstream6_ether)
04-06 19:51:57.585 D/LibBpfLoader( 568): Adding section 3 to cs list
04-06 19:51:57.585 D/LibBpfLoader( 568): Loaded code section 5
(schedcls_tether_upstream6_ether)
04-06 19:51:57.586 D/LibBpfLoader( 568): Loaded relo section 5
(.relschedcls/tether_upstream6_ether)
04-06 19:51:57.586 D/LibBpfLoader( 568): Adding section 5 to cs list
04-06 19:51:57.587 D/LibBpfLoader( 568): Loaded code section 7
(schedcls_tether_downstream6_rawip$4_14)
04-06 19:51:57.588 D/LibBpfLoader( 568): Loaded relo section 7
(.relschedcls/tether_downstream6_rawip$4_14)
04-06 19:51:57.588 D/LibBpfLoader( 568): Adding section 7 to cs list
04-06 19:51:57.588 D/LibBpfLoader( 568): Loaded code section 9
(schedcls_tether_upstream6_rawip$4_14)
04-06 19:51:57.590 D/LibBpfLoader( 568): Loaded relo section 9
(.relschedcls/tether_upstream6_rawip$4_14)
04-06 19:51:57.590 D/LibBpfLoader( 568): Adding section 9 to cs list
04-06 19:51:57.590 D/LibBpfLoader( 568): Loaded code section 11
(schedcls_tether_downstream6_rawip$stub)
04-06 19:51:57.591 D/LibBpfLoader( 568): Adding section 11 to cs list
04-06 19:51:57.591 D/LibBpfLoader( 568): Loaded code section 12
(schedcls_tether_upstream6_rawip$stub)
04-06 19:51:57.592 D/LibBpfLoader( 568): Adding section 12 to cs list
04-06 19:51:57.592 D/LibBpfLoader( 568): Loaded code section 13
(schedcls_tether_downstream4_rawip$5_8)
04-06 19:51:57.595 D/LibBpfLoader( 568): Loaded relo section 13
(.relschedcls/tether_downstream4_rawip$5_8)
04-06 19:51:57.595 D/LibBpfLoader( 568): Adding section 13 to cs list
04-06 19:51:57.595 D/LibBpfLoader( 568): Loaded code section 15
(schedcls_tether_upstream4_rawip$5_8)
04-06 19:51:57.598 D/LibBpfLoader( 568): Loaded relo section 15
(.relschedcls/tether_upstream4_rawip$5_8)
04-06 19:51:57.598 D/LibBpfLoader( 568): Adding section 15 to cs list
04-06 19:51:57.598 D/LibBpfLoader( 568): Loaded code section 17
(schedcls_tether_downstream4_ether$5_8)
04-06 19:51:57.601 D/LibBpfLoader( 568): Loaded relo section 17
(.relschedcls/tether_downstream4_ether$5_8)
04-06 19:51:57.601 D/LibBpfLoader( 568): Adding section 17 to cs list
04-06 19:51:57.601 D/LibBpfLoader( 568): Loaded code section 19
(schedcls_tether_upstream4_ether$5_8)
04-06 19:51:57.603 D/LibBpfLoader( 568): Loaded relo section 19
(.relschedcls/tether_upstream4_ether$5_8)
04-06 19:51:57.603 D/LibBpfLoader( 568): Adding section 19 to cs list
04-06 19:51:57.604 D/LibBpfLoader( 568): Loaded code section 21
(schedcls_tether_downstream4_rawip$opt)
04-06 19:51:57.606 D/LibBpfLoader( 568): Loaded relo section 21
(.relschedcls/tether_downstream4_rawip$opt)
04-06 19:51:57.606 D/LibBpfLoader( 568): Adding section 21 to cs list
04-06 19:51:57.607 D/LibBpfLoader( 568): Loaded code section 23
(schedcls_tether_upstream4_rawip$opt)
04-06 19:51:57.609 D/LibBpfLoader( 568): Loaded relo section 23
(.relschedcls/tether_upstream4_rawip$opt)
04-06 19:51:57.609 D/LibBpfLoader( 568): Adding section 23 to cs list
04-06 19:51:57.610 D/LibBpfLoader( 568): Loaded code section 25
(schedcls_tether_downstream4_ether$opt)
04-06 19:51:57.612 D/LibBpfLoader( 568): Loaded relo section 25
(.relschedcls/tether_downstream4_ether$opt)
04-06 19:51:57.612 D/LibBpfLoader( 568): Adding section 25 to cs list
04-06 19:51:57.613 D/LibBpfLoader( 568): Loaded code section 27
(schedcls_tether_upstream4_ether$opt)
04-06 19:51:57.615 D/LibBpfLoader( 568): Loaded relo section 27
(.relschedcls/tether_upstream4_ether$opt)
04-06 19:51:57.615 D/LibBpfLoader( 568): Adding section 27 to cs list
04-06 19:51:57.616 D/LibBpfLoader( 568): Loaded code section 29
(schedcls_tether_downstream4_rawip$5_4)
04-06 19:51:57.618 D/LibBpfLoader( 568): Loaded relo section 29
(.relschedcls/tether_downstream4_rawip$5_4)
04-06 19:51:57.618 D/LibBpfLoader( 568): Adding section 29 to cs list
04-06 19:51:57.619 D/LibBpfLoader( 568): Loaded code section 31
(schedcls_tether_upstream4_rawip$5_4)
04-06 19:51:57.621 D/LibBpfLoader( 568): Loaded relo section 31
(.relschedcls/tether_upstream4_rawip$5_4)
04-06 19:51:57.621 D/LibBpfLoader( 568): Adding section 31 to cs list
04-06 19:51:57.621 D/LibBpfLoader( 568): Loaded code section 33
(schedcls_tether_downstream4_rawip$4_14)
04-06 19:51:57.624 D/LibBpfLoader( 568): Loaded relo section 33
(.relschedcls/tether_downstream4_rawip$4_14)
04-06 19:51:57.624 D/LibBpfLoader( 568): Adding section 33 to cs list
04-06 19:51:57.624 D/LibBpfLoader( 568): Loaded code section 35
(schedcls_tether_upstream4_rawip$4_14)
04-06 19:51:57.627 D/LibBpfLoader( 568): Loaded relo section 35
(.relschedcls/tether_upstream4_rawip$4_14)
04-06 19:51:57.627 D/LibBpfLoader( 568): Adding section 35 to cs list
04-06 19:51:57.628 D/LibBpfLoader( 568): Loaded code section 37
(schedcls_tether_downstream4_ether$4_14)
04-06 19:51:57.630 D/LibBpfLoader( 568): Loaded relo section 37
(.relschedcls/tether_downstream4_ether$4_14)
04-06 19:51:57.630 D/LibBpfLoader( 568): Adding section 37 to cs list
04-06 19:51:57.631 D/LibBpfLoader( 568): Loaded code section 39
(schedcls_tether_upstream4_ether$4_14)
04-06 19:51:57.635 D/LibBpfLoader( 568): Loaded relo section 39
(.relschedcls/tether_upstream4_ether$4_14)
04-06 19:51:57.635 D/LibBpfLoader( 568): Adding section 39 to cs list
04-06 19:51:57.635 D/LibBpfLoader( 568): Loaded code section 41
(schedcls_tether_downstream4_rawip$stub)
04-06 19:51:57.638 D/LibBpfLoader( 568): Adding section 41 to cs list
04-06 19:51:57.638 D/LibBpfLoader( 568): Loaded code section 42
(schedcls_tether_upstream4_rawip$stub)
04-06 19:51:57.641 D/LibBpfLoader( 568): Adding section 42 to cs list
04-06 19:51:57.641 D/LibBpfLoader( 568): Loaded code section 43
(schedcls_tether_downstream4_ether$stub)
04-06 19:51:57.644 D/LibBpfLoader( 568): Adding section 43 to cs list
04-06 19:51:57.645 D/LibBpfLoader( 568): Loaded code section 44
(schedcls_tether_upstream4_ether$stub)
04-06 19:51:57.648 D/LibBpfLoader( 568): Adding section 44 to cs list
04-06 19:51:57.648 D/LibBpfLoader( 568): Loaded code section 45
(xdp_tether_downstream_ether)
04-06 19:51:57.651 D/LibBpfLoader( 568): Adding section 45 to cs list
04-06 19:51:57.651 D/LibBpfLoader( 568): Loaded code section 46
(xdp_tether_downstream_rawip)
04-06 19:51:57.655 D/LibBpfLoader( 568): Adding section 46 to cs list
04-06 19:51:57.655 D/LibBpfLoader( 568): Loaded code section 47
(xdp_tether_upstream_ether)
04-06 19:51:57.658 D/LibBpfLoader( 568): Adding section 47 to cs list
04-06 19:51:57.658 D/LibBpfLoader( 568): Loaded code section 48
(xdp_tether_upstream_rawip)
04-06 19:51:57.661 D/LibBpfLoader( 568): Adding section 48 to cs list
04-06 19:51:57.666 D/LibBpfLoader( 568): bpf_create_map name tether_error_map,
ret: 7
04-06 19:51:57.667 D/LibBpfLoader( 568): bpf_create_map name tether_stats_map,
ret: 8
04-06 19:51:57.667 D/LibBpfLoader( 568): bpf_create_map name tether_limit_map,
ret: 9
04-06 19:51:57.667 D/LibBpfLoader( 568): bpf_create_map name
tether_downstream6_map, ret: 10
04-06 19:51:57.668 D/LibBpfLoader( 568): bpf_create_map name
tether_downstream64_map, ret: 11
04-06 19:51:57.668 D/LibBpfLoader( 568): bpf_create_map name tether_upstream6_map,
ret: 12
04-06 19:51:57.668 D/LibBpfLoader( 568): bpf_create_map name
tether_downstream4_map, ret: 13
04-06 19:51:57.668 D/LibBpfLoader( 568): bpf_create_map name tether_upstream4_map,
ret: 14
04-06 19:51:57.669 D/LibBpfLoader( 568): bpf_create_map name tether_dev_map, ret:
15
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 0 is 7 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 1 is 8 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 2 is 9 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 3 is 10 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 4 is 11 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 5 is 12 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 6 is 13 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 7 is 14 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.669 D/LibBpfLoader( 568): map_fd found at 8 is 15 in
/apex/com.android.tethering/etc/bpf/offload.o
04-06 19:51:57.672 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 296, insn offset 37 , insn 118
04-06 19:51:57.672 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 392, insn offset 49 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 528, insn offset 66 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 624, insn offset 78 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 744, insn offset 93 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 848, insn offset 106 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1144, insn offset 143 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1224, insn offset 153 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1296, insn offset 162 , insn 118
04-06 19:51:57.673 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1376, insn offset 172 , insn 118
04-06 19:51:57.674 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1440, insn offset 180 , insn 118
04-06 19:51:57.674 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1528, insn offset 191 , insn 118
04-06 19:51:57.674 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1800, insn offset 225 , insn 118
04-06 19:51:57.674 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 296, insn offset 37 , insn 118
04-06 19:51:57.674 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 392, insn offset 49 , insn 118
04-06 19:51:57.674 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 528, insn offset 66 , insn 118
04-06 19:51:57.674 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 624, insn offset 78 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 752, insn offset 94 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 864, insn offset 108 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 968, insn offset 121 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1184, insn offset 148 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1264, insn offset 158 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1336, insn offset 167 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1416, insn offset 177 , insn 118
04-06 19:51:57.675 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1480, insn offset 185 , insn 118
04-06 19:51:57.676 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1568, insn offset 196 , insn 118
04-06 19:51:57.676 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1840, insn offset 230 , insn 118
04-06 19:51:57.676 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 240, insn offset 30 , insn 118
04-06 19:51:57.676 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 336, insn offset 42 , insn 118
04-06 19:51:57.676 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 472, insn offset 59 , insn 118
04-06 19:51:57.676 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 568, insn offset 71 , insn 118
04-06 19:51:57.676 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 688, insn offset 86 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 792, insn offset 99 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 960, insn offset 120 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1040, insn offset 130 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1112, insn offset 139 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1192, insn offset 149 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1256, insn offset 157 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1344, insn offset 168 , insn 118
04-06 19:51:57.677 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1600, insn offset 200 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1760, insn offset 220 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1904, insn offset 238 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 240, insn offset 30 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 336, insn offset 42 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 472, insn offset 59 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 568, insn offset 71 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 696, insn offset 87 , insn 118
04-06 19:51:57.678 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 808, insn offset 101 , insn 118
04-06 19:51:57.679 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 912, insn offset 114 , insn 118
04-06 19:51:57.679 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1008, insn offset 126 , insn 118
04-06 19:51:57.679 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1088, insn offset 136 , insn 118
04-06 19:51:57.679 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1160, insn offset 145 , insn 118
04-06 19:51:57.679 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1240, insn offset 155 , insn 118
04-06 19:51:57.679 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1304, insn offset 163 , insn 118
04-06 19:51:57.679 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1392, insn offset 174 , insn 118
04-06 19:51:57.680 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1648, insn offset 206 , insn 118
04-06 19:51:57.680 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1808, insn offset 226 , insn 118
04-06 19:51:57.680 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 1952, insn offset 244 , insn 118
04-06 19:51:57.680 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 248, insn offset 31 , insn 118
04-06 19:51:57.680 D/LibBpfLoader( 568): applying relo to instruction at byte
offset: 632, insn offset 79 , insn 118